0% found this document useful (0 votes)
180 views182 pages

B Cisco Business Wifi 6 Admin Guide

Uploaded by

izi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
180 views182 pages

B Cisco Business Wifi 6 Admin Guide

Uploaded by

izi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 182

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version

10.2.2.0
First Published: 2021-12-01
Last Modified: 2022-07-19

Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.

THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.

The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.

NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.

IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.

All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.

Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.

The documentation set for this product strives to use bias-free language. For purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on
age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that
is hardcoded in the user interfaces of the product software, language used based on standards documentation, or language that is used by a referenced third-party product.

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
© 2022 Cisco Systems, Inc. All rights reserved.
The Java logo is a trademark or registered trademark of Sun Microsystems, Inc. in the U.S. or other countries.
© 2022 Cisco Systems, Inc. All rights reserved.
CONTENTS

CHAPTER 1 Cisco Business Wireless Wi-Fi 6 Overview 1

Cisco Business Wireless Wi-Fi 6 1

Supported Cisco Access Points 1


Supported Software Images 2
Supported Browsers 2
Related Documents 3

CHAPTER 2 Using Cisco Business Wireless Access Point GUI 5

Cisco Business Wireless GUI Overview 5

CHAPTER 3 Getting Started 9

Prerequisite for Setting up and Accessing Cisco Business Wireless AP 9


AP Deployment Models 10
Launching the Setup Wizard 12
Using the Setup Wizard 13
Logging into the Cisco Business Wireless AP 15
Adding New Subordinate APs 16
Adding Mesh Extenders 16

CHAPTER 4 Monitoring 19

About the Cisco Business Wireless AP Monitoring Service 19


Customizing the Network Summary View 20
Customizing Access Points Table View 22
Viewing Access Point Details 25
Viewing Client Details 30
Viewing Guest Client Details 35

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


v
Contents

Troubleshooting a Client 35
Perform a Client Ping Test 36
Perform a Connection Test 37
Generate an Event Log 38
Viewing Mesh Extender 38
Viewing Applications 39
Viewing Rogue Access Points 40
Configuring the Rogue AP States 41
Viewing Rogue Client Details 41
Viewing Interferer Details 42
Wireless Dashboard 42
Customizing the Access Point Performance View 44
Adding or Removing a Widget 46
Customizing the Client Performance View 47
Adding or Removing a Client Widget 47

CHAPTER 5 Wireless Settings 49


About WLANs in CBW Access Point Network 49
Setting Up WLANs and WLAN Users 49
Viewing WLANs 50
Adding and Modifying WLANs 52
Configuring General Details 53
Configuring the WLAN Security 54
Configuring VLAN and Firewall 62
Configuring Traffic Shaping 62
Configuring Advanced Options 64
Configuring Scheduling 66
Enabling and Disabling WLANs 67
Editing and Deleting WLANs 67
Viewing and Managing WLAN Users 68
Blocking and Unblocking Clients 69
Social Login for Guest Users 69
Personal PSK for Clients 70
Managing Associated Access Points 71

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


vi
Contents

Global AP Configuration 73
Administering Access Points 73
Access Point Groups 79
Setting a Login Page for WLAN Guest Users 79
Setting the Default Login Page 80
Setting a Customized Login Page 80
About Cisco Mesh 82
Convert Non-Mesh to Mesh Deployment 82
Mesh Network Components 83
Changing Mesh Parameters 85
Backhaul Client Access 85
Mesh Backhaul Radio Resource Management 85
Mesh Backhaul Slot 85
VLAN Transparent 86

CHAPTER 6 Management 87
About Management Access Interface 87
Setting Up Management Access Interface 87
Limitation of Web Based Management Sessions 88
Managing User Priority Order 88
Managing Admin Accounts 89
Adding an Admin Account 89
Editing an Admin Account 90
Deleting an Admin Account 91
Managing Guest Users using the Lobby Admin account 91
Creating a Guest User Account 91
Managing TACACS+ and RADIUS Servers 92
Adding TACACS+ Servers 92
Configuring RADIUS Servers 93
Adding RADIUS Servers 95
Viewing Auth Cached Users 95
Setting Date and Time 96
Using NTP Servers to Automatically Set the Date and Time 96
Adding and Editing NTP Servers 96

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


vii
Contents

Refreshing NTP Server Status 97


Deleting and Disabling NTP Servers 97
Configuring Date and Time Manually 97
Updating the CBW AP Software 98
Updating the Software using HTTP 100
Upgrading the Software for First Mesh Extender using HTTP 101
Updating the Software using TFTP 102
Updating the Software using SFTP 103
Updating the Software through Cisco Business Dashboard 104

CHAPTER 7 Services 105

Media Steam 105


About Multicast Domain Name System 108
Restrictions for Configuring Multicast DNS 110
Configuring Multicast DNS 110
Mapping mDNS Profile to WLAN 111
Configuring mDNS Policy 112
Cisco Umbrella Overview 113
Configuring Cisco Umbrella on Primary AP 114
Adding Policy to Umbrella Profile 114
Applying Cisco Umbrella Profile to WLAN 115

CHAPTER 8 Advanced 117

Managing SNMP 117


Configuring SNMP Access 117
SNMP Trap Receivers 118
Add an SNMPv3 User 118
Delete SNMPv3 User 120
Setting Up System Message Logs 120
System Logs 121
Optimizing RF Parameters 121
Advanced RF Parameters 121
Optimized Roaming 121
Restrictions for Optimized Roaming 122

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


viii
Contents

Configuring Optimized Roaming 122


Target Waketime and Broadcast TWT 124
RF Profiles 124
RF Parameter Optimization Settings 126
Troubleshooting in Primary AP 127
UI Indicator 127
Using Primary AP Tools 128
Restarting the Primary AP 128
Clearing the Primary AP Configuration and Resetting to Factory Defaults 128
Export and Import Primary AP Configuration 128
Saving the Primary AP Configuration 129
Troubleshooting Files 130
Troubleshooting Tools 130
Uploading Files 131
Security Settings 132
Configuring Access Control Lists (ACL) 133
Applying the ACL to WLAN at Pre-Auth Level 135
Applying the ACL to WLAN at Post-Auth Level 135
Configuring AAA Override in WLAN 136
Cisco Business Dashboard Settings 136

APPENDIX A Appendix - Supporting Topics 139


LAN port functionality for different models 139
LED Color Indicators for Cisco Business Wireless APs 139
LED Display Settings 141
Primary AP Failover and Election Process 142
Pre-downloading an Image to an Access Point 143
Creating a Guest Network 143
Resetting a Device to Factory Default 144
SNMP Traps in CBW AP 145
Deployment and Troubleshooting Guidelines 146
Access Point Configuration Files 150

APPENDIX B Appendix - Mounting and Grounding Access Points 151

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


ix
Contents

About Mounting 151


Preparing the AP for Installation 151
Mounting the CBW150AX 152
Mounting the CBW151AXM 156
Grounding an Access Point 157

APPENDIX C Appendix - Glossary of Terms 159


Cisco Business Wireless - Glossary Of Terms 159
0-9 159
802.1Q-based VLAN 159
802.1X Supplicant 159
A 159
ACL 159
Allowlist 160
Anti Clog Threshold 160
B 160
Band Steer 160
Bandwidth 160
Bandwidth Utilization 160
Basic Service Set (BSS) Coloring 160
Blocklist 160
C 160
Captive Portal 160
CBD Probe 161
Central web authentication (CWA) 161
Channel Isolation 161
Channel Width 161
Client QoS 161
Connection Speed 161
D 161
DCA 161
E 162
EAPol 162
Event Logging 162

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


x
Contents

F 162
Fast Roaming 162
H 162
HTTPS 162
I 162
IPv4 162
IPv6 162
ISE 163
L 163
LLDP 163
Load Balancing 163
Local Probe 163
M 163
Max Data Rate 163
Multiple SSIDs 163
MU-MIMO 163
N 164
Network Plug n Play 164
O 164
OFDMA 164
Operating Mode 164
P 164
PMF 164
PMKID 164
PoE-PD 164
PoE-PSE 164
Q 165
QoS 165
R 165
RADIUS Server 165
Radio Domains 165
Rogue AP Detection 165
S 165
Scheduler 165

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


xi
Contents

Signal Quality 165


Signal Strength 165
Spatial Streams 166
Spectrum Intelligence 166
SSID 166
SSID Broadcast 166
T 166
Target Waketime 166
V 166
VLAN 166
W 167
WDS 167

WPA/WPA2 167
WPA2 Enterprise 167
WPA3 167

APPENDIX D Appendix - Cisco Online Support 169


Cisco Business Online Support 169

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


xii
CHAPTER 1
Cisco Business Wireless Wi-Fi 6 Overview
This chapter contains the following sections:
• Cisco Business Wireless Wi-Fi 6, on page 1
• Supported Cisco Access Points, on page 1
• Supported Software Images, on page 2
• Supported Browsers, on page 2
• Related Documents, on page 3

Cisco Business Wireless Wi-Fi 6


A Cisco Business Wireless Wi-Fi 6 network contains at least one 802.11ax Cisco Business Series Access
Point (AP) with built-in software that manages other access points in the network.
In this guide, the term Primary AP is used for the specific AP that manages all other APs. All other Access
Points are referred to as the Subordinate AP.
The Primary AP has two roles:
• It controls all the Subordinate APs that join the network.
• It independently serves wireless clients like other Subordinate APs.

Note Your Cisco Business Wireless Wi-Fi 6 can interface with the Cisco Business Dashboard to monitor your
wireless network. For more details, refer to Cisco Business Dashboard Administration Guide.

Supported Cisco Access Points


The following Cisco Business Series APs are supported in the Cisco Business Wireless Wi-Fi 6 (CBW Wi-Fi
6) AP network:

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


1
Cisco Business Wireless Wi-Fi 6 Overview
Supported Software Images

Table 1: Cisco AP and Mesh Extenders supported in the CBW Wi-Fi 6 network

Primary Capable APs Subordinate APs and Mesh Extenders


Cisco Business 150AX Access Point Cisco Business 151AXM Mesh Extender

Cisco Business 150AX Access Point

Note This Administration Guide contains information for all Primary Capable APs, Subordinate APs, and Mesh
Extenders in this series.
While the Primary AP (CBW150AX) may be used as Subordinate AP, the Mesh Extender (CBW151AXM)
cannot be used as a Primary AP.
The APs listed under Primary APs can also function as Subordinate APs.

Important The CBW150AX and CBW151AXM are not compatible with the CBW140-240 series Access Points and
Mesh Extenders.

Supported Software Images


Updating the software of your access point is important to improve the performance and stability of devices.
The software update might offer new features or fix a vulnerability that was experienced in the previous
version of the software.
Go to https://software.cisco.com/download/navigator.html to download the CBW software for your AP model.
From the Software Download window, navigate to Wireless > > Access Points. Next navigate to the Business
100 Series Access Points page and select your model from the list. A list of all currently available software
is displayed with the latest version at the top. Choose the required version of the firmware image and proceed
with the download to update the software.

Supported Browsers
Cisco Business Wireless Access Points are administered through a web user interface. To use this interface,
your browser must be one of the following:
• Microsoft Internet Explorer 10 or above
• Apple Safari version 7 or above
• Mozilla Firefox version 33 or above
• Google Chrome version 38 or above

You can also use the Cisco Business App on your mobile phone to monitor and administer the Access Points.
You will need one of the following Operating Systems:

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


2
Cisco Business Wireless Wi-Fi 6 Overview
Related Documents

• Android version 5.0 or above


• iOS version 8.0 or above

Related Documents
The documentation for Cisco Business Wireless Wi-Fi 6 Access Points (AP) and Mesh Extenders are contained
in the guides listed below. You can access all these documents on Cisco.com. Select the support page for your
model and then select the product documentation page.

Resources Description
Administration Guide This guide provides details on performing configuration for Cisco Business
Wireless Wi-Fi 6 APs and also provides advanced options to manage and
monitor APs and Mesh Extenders in the Cisco Business Wireless Wi-Fi 6
network.
Refer to this guide for both Primary and Subordinate APs, and Mesh
Extenders of all models in this CBW Wi-Fi 6 series.

Quick Start Guide The Quick Start Guide provides details and directions on how to do the
initial setup and configuration for Cisco Business Wireless Wi-Fi 6 Access
Points (APs) and Mesh Extenders.

Release Notes Release Notes are a summary of the features and caveats for each software
build for Cisco Business Wireless Wi-Fi 6 APs and Mesh Extenders.

Open Source Documents This document contains the licenses and notices for any open source
(OSD) software that was used in this product.

Cisco Regulatory Compliance This document provides domestic and international regulatory compliance
and Safety Information and safety information for Cisco Business Wireless Wi-Fi 6 Access Points
(RCSI) (APs) and Mesh Extenders.

Translated End-User The Translated Administration Guides for all APs supported by the Cisco
Documents Business Wireless Wi-Fi 6 Access Points (APs) and Mesh Extenders are
available in the product pages on Cisco.com.

Web UI Setup Access this document on the Cisco.com product page when you want to
use the Web UI to set up your product with a wireless device.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


3
Cisco Business Wireless Wi-Fi 6 Overview
Related Documents

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


4
CHAPTER 2
Using Cisco Business Wireless Access Point GUI
This chapter contains the following sections:
• Cisco Business Wireless GUI Overview, on page 5

Cisco Business Wireless GUI Overview


This chapter provides an overview of the Cisco Business Wireless (CBW) Access Point GUI, and a description
of the navigation pane links and basic functions.

1. The Header toolbar is where the feature interface is displayed. See the Header toolbar table below for
details.
2. The Navigation pane provides access to the Cisco Business Wireless features. Each of these main feature
tabs comprises of sub-level tabs. Click to expand and view the sub-level tabs. See the Navigation Pane
Options table below for details.
3. The Work pane is the area where the features interface is displayed. When you click an option in the
Navigation pane, its corresponding window opens in this area.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


5
Using Cisco Business Wireless Access Point GUI
Cisco Business Wireless GUI Overview

Table 2: Cisco Business Wireless Access Point Home Page

Header toolbar

Icon Description

A hamburger icon (toggle button) for expanding and collapsing the navigation pane.

Product The header title of the web interface indicates the AP or Mesh Extender model on which the
Name integrated CBW functionality is currently operating.

Click this icon to view the Cisco Business Access Point or Mesh Extender Online Help
documentation.

Click this icon to search for an AP or client using its MAC address.

A notification icon that indicates if there was an incident of system crash or if a core dump is
present.

This download icon indicates when a new software update is available for your CBW APs on
cisco.com. Click this icon to redirect to the software update page in the UI and download the
latest firmware.

Click this icon to save the current CBW AP configuration to the NVRAM. For more details,
see Saving the Primary AP Configuration, on page 129.

Click this icon to toggle between Standard View and Expert View, which provides access
to advanced options. The default is set to standard view.
When in Standard View the arrows are green and will change to blue when you are in Expert
View.

Click this mail icon to send your feedback or request for new features to Cisco Business
Wireless Team.

Click this gear icon to view the current system information, or to log off the Primary AP web
interface. It also specifies the username of the user who is logged into the application.

Navigation Pane Options


The Navigation pane provides options to access the main Cisco Business Wireless AP and Mesh Extender
features. Each of these options comprises several sub-options used to perform various other tasks.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


6
Using Cisco Business Wireless Access Point GUI
Cisco Business Wireless GUI Overview

Table 3: Navigation Pane Options

Icon Name Description


Monitoring The Monitoring feature allows the Primary AP to monitor WLANs and all
the connected devices on the wireless network. For more details, refer to
About the Cisco Business Wireless AP Monitoring Service, on page 19.

Wireless The Wireless Settings page is used to administer associated APs, manage
Settings WLANs, WLAN user accounts, and guest user accounts.
For more details, refer to About WLANs in CBW Access Point Network, on
page 49.

Management The Management page allows you to set management access parameters,
manage admin accounts, manage network time, and perform software updates.
For more details, refer to Setting Up Management Access Interface, on page
87.

This page is only available in Expert View.


The Services page provides the mDNS service discovery feature and the
Services Cisco Umbrella network security feature.
For more details, refer to About Multicast Domain Name System, on page
108.

The Advanced page provides the capability to set SNMP, syslog, and log
Advanced configuration settings, and perform a reset to factory default.
For more details, refer to the Advanced, on page 117.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


7
Using Cisco Business Wireless Access Point GUI
Cisco Business Wireless GUI Overview

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


8
CHAPTER 3
Getting Started
This chapter contains the following sections:
• Prerequisite for Setting up and Accessing Cisco Business Wireless AP, on page 9
• AP Deployment Models, on page 10
• Launching the Setup Wizard, on page 12
• Using the Setup Wizard, on page 13
• Logging into the Cisco Business Wireless AP, on page 15
• Adding New Subordinate APs, on page 16
• Adding Mesh Extenders, on page 16

Prerequisite for Setting up and Accessing Cisco Business


Wireless AP
The following requirements must be met before setting up the CBW Wi-Fi 6 and Mesh Extender.
• For both setup and daily operation of a CBW Wi-Fi 6 network, there cannot be any other Primary AP
running in the network.

Important The Cisco Primary AP cannot inter-operate or co-exist with other Primary APs
in the same network.

• Decide on the AP that will be set up as the Primary AP, and the other APs can then connect to it as
Subordinate APs. This ensures that the pre-defined CiscoBusiness-Setup Service Set Identifier (SSID)
is broadcast only by the Primary AP and not by other APs.
• Ensure that the AP is installed as per the instructions in the Quick Start Guide for this model as found
on Cisco.com.
• The initial setup of the CBW AP can be performed using one of the following methods:
• Through the Primary AP Setup Wizard and over Wi-Fi.
• Use the Cisco Business Mobile app.
• Use Network Plug n Play via Cisco Business Dashboard application. For details, see section,
Network Plug and Play in the Cisco Business Dashboard Administration Guide.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


9
Getting Started
AP Deployment Models

• If you are not using the Cisco Business Mobile App, you will need a wireless device to connect to the
pre-defined CiscoBusiness-Setup SSID broadcast by the Primary AP. You cannot access this SSID
through a wired network.

Note Only one client is allowed to connect to the Ciscobusiness-Setup SSID for security
purposes. If the connection is refused it means another device may have joined
automatically. In this case, you should reboot the AP.

• Your wireless device should have a compatible browser. For a list of browsers compatible with the CBW
AP Web UI see Supported Browsers, on page 2.

AP Deployment Models
The following deployment models are supported in the Cisco Business Wireless AP network.
• Non-Mesh deployment (wired deployment only) — All the APs in the CBW AP network have a Wired
Uplink. The supported APs in the network are Primary Capable. One is the Primary AP and the others
operate as Subordinate APs in the CBW network.
Supported AP (Primary AP) — CBW150AX.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


10
Getting Started
AP Deployment Models

Note Ensure that the switch is powered on and connected to the router for Internet
access.

• Mesh deployment (wireless deployment with single/multiple wired uplink APs)— In this deployment
model, the CBW AP network comprises of both Primary and Subordinate APs (wired APs and wireless
Mesh Extenders). The APs that have a wired uplink act as Root AP (RAP) to which the Mesh Extenders
(MAP) joins wirelessly. The Primary AP will act in Bridge mode. To set up this deployment, refer to
About Cisco Mesh, on page 82.
To add wireless Mesh Extenders to the network, add the Ethernet MAC address of the Extenders in the
local MAC address table of the Primary AP. For details, refer to Adding Mesh Extenders, on page 16.
Wireless Mesh Extenders have the dynamic algorithm to select the best RAP based on the signal strength
and join the same.

Note Ensure that you enable Mesh while configuring the Initial Setup Wizard for
this deployment model.

Only the Mesh Extender (CBW151AXM) is required to be manually added to the allowlist.
The the Subordinate AP (CBW150AX) is connected via wired uplink and is automatically added to the
allowlist.
You can obtain the MAC address by reading the QR code on the back of the device with a QR Reader
app on a wireless device. You can also find the MAC address at the bottom of the AP Device.
Supported APs in Mesh deployment:
• Primary AP — CBW150AX
• Subordinate AP — CBW151AXM and CBW150AX

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


11
Getting Started
Launching the Setup Wizard

Note APs listed as Primary Capable can also function as Subordinate APs.

Launching the Setup Wizard

Note You can use the Cisco Business Mobile app instead of the Web UI to run the setup wizard.

Step 1 Turn on the power to the primary capable AP in your network.


After a delay of a few minutes, the CiscoBusiness-Setup SSID will start broadcasting. The AP status LED will cycle
through red, green, and off. This is normal and can take up to 6 minutes. The device is not ready until the LED is solid
green.

Step 2 Connect the wireless device to the CiscoBusiness-Setup SSID through Wi-Fi and enter the default password: cisco123.
The wireless device obtains an IP address from the subnet of the Primary AP.

Step 3 Launch a supported web browser, such as Chrome, Firefox, Safari, or Internet Explorer.
For Apple clients, after connecting to the CiscoBusiness-Setup SSID, the captive portal window may open with the
Welcome page followed by the initial Setup Wizard.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


12
Getting Started
Using the Setup Wizard

After connecting to the CiscoBusiness-Setup SSID and opening a web browser, you should automatically be redirected
to http://ciscobusiness.cisco. If not, type the URL: http://ciscobusiness.cisco in the address bar and press Enter.

Step 4 Click Start on the Cisco Business Wireless Access Point page to launch the Setup Wizard. You will be required to
create an admin account.
Only one client can be connected to the CiscoBusiness-Setup SSID at a time. If you see an invalid password error on
your client when connecting to CiscoBusiness-Setup SSID, it indicates that another client has been connected to the
SSID. The currently connected AP will display the LED status as solid green.
Turn off the connected client, and then proceed with the Setup Wizard configuration of your AP.

Using the Setup Wizard


The Setup Wizard helps you configure certain basic parameters on your Cisco Business Wireless AP (CBW
AP), and get your AP network running.
Once you have completed the steps in Launching the Setup Wizard, on page 12, use the following sections
as a reference for the data that you enter and then proceed with the configuration wizard pages.

Welcome Screen
Click the Start button in the Welcome screen. The Cisco Business Wireless Access Point page relevant to
your AP model is displayed.
1. Create an admin user account on the Primary AP. You can enter up to 24 ASCII characters.
The username is case sensitive and cannot be cisco or any variant.
2. Enter a password. The password can contain 8-127 ASCII characters. When specifying a password, ensure
the following:
• The password must include a combination of lowercase letters, uppercase letters, digits, or special
characters. The special characters can be ~, !, @, #, $, %, ^, &, *.
• No character in the password can be repeated more than three times consecutively.
• The new password cannot be the same or the reverse of the username.
• The password cannot be cisco, ocsic, or any variant obtained by changing the capitalization of the
letters in the word Cisco. For example, you cannot substitute 1, I, or ! for i, 0 for o, or $ for s.

3. Confirm the password and click Start.

Set Up Your Primary AP


Specify the following basic parameters for setting up your Primary AP:

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


13
Getting Started
Using the Setup Wizard

Field Description
Primary AP Name Enter the name that you want to assign to the Primary AP.
• A max of 24 characters is allowed.
• The characters can be upper/lowercase letters, numbers, dot, and hyphen.

Country Choose the country that matches the physical location of the CBW AP.
• The CBW AP will display only countries that are supported by the regulatory
domain of the AP. You can choose your country from the drop-down list.
• There are strict regulatory rules to operate under the proper country code
during usage.

Date and Time Specify the date. By default, your device's system time is applied. You can
manually edit the date and time, if required.

Timezone Select your time zone.


• You MUST select a timezone that is valid for the country where the device
is used. If you choose an invalid timezone, the deployment will not function.

Mesh To add Mesh Extenders to your AP network, enable the Mesh option. By default
this option is disabled.
You can add Mesh Extenders after deployment.

Would you like Static IP Enable this option if you want to configure a static IP address for the management
for your Primary AP interface. If not, the interface gets an IP address from your DHCP server (typically
(Management Network) your router). By default, this option is disabled.
• A management IP address should be within current subnet of your local
VLAN and not in the client pool issued by your DHCP server.
• If you choose to configure the static IP address, then you will be required
to enter data in the following fields. If not, proceed to the next section.

Even when a static IP address is selected for the Primary AP, a DHCP server is
still required to provide IP addresses to the Access Points and Clients. If the
device cannot find a DHCP server after completing the Day 0 setup sequence
and rebooting, it will not complete the bootup sequence and the LED will be
blinking red.

Management IP Address Enter the IP address for managing the Primary AP.

Subnet Mask Enter the subnet mask for the Primary AP.

Default Gateway Enter the default gateway or router IP address for the Primary AP.

Create your Wireless Networks


Specify the following parameters:

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


14
Getting Started
Logging into the Cisco Business Wireless AP

Field Description
Network Name Specify a SSID for your Wireless network. You can enter up to 31 characters in
this field.
Make a note of this SSID to connect a client and log into the CBW web user
interface which is detailed in the later section of this chapter. For details, refer to
Logging into the Cisco Business Wireless AP, on page 15.

Security By default, the SSID security is set to WPA2 Personal which uses a pre-shared
key (PSK) authentication.
Choose SSID security for your Wireless network. It can be one of the following
options:
• WPA2 Personal-This uses pre-shared key (PSK) handshake mechanism
for authentication.
• WPA2+WPA3 - Personal- This has both WPA2 and WPA3 enabled. WPA3
uses a reliable handshake mechanism called Simultaneous Authentication of
Equals (SAE).
This is only available after updating to FW release 10.4.1.0.

Passphrase Specify the passphrase or the pre-shared key (PSK). The passphrase should contain
8 - 63 ASCII characters.
Make a note of this passphrase to connect a client to the SSID and log into the
CBW web user interface (detailed in the later section of this chapter). For details,
refer to Logging into the Cisco Business Wireless AP, on page 15.

Confirm Passphrase Re-enter the passphrase or the pre-shared key (PSK) here.

Show Passphrase Enable this in order to display the passphrase in clear text for visible confirmation.

Once you complete the configuration settings, click Next to proceed or Back to modify the data in the previous
screens if needed. Confirm the settings and click Apply to save the configuration.
The Access Point will reboot. This may take up to 5 minutes. The booting process is complete when the LED
is consistently blinking or solid green.

Note For a detailed explanation on the LED behavior, see LED Color Indicators for Cisco Business Wireless APs,
on page 139.

Logging into the Cisco Business Wireless AP


Once you have completed the steps in Using the Setup Wizard, on page 13, follow the steps below to log into
the CBW AP web user interface (Web UI). You can monitor and manage the Access Point and associated
devices using this Web UI.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


15
Getting Started
Adding New Subordinate APs

Step 1 Connect to the new SSID that you created using the Setup Wizard > Create Your Wireless Network process.
Step 2 Open a supported web browser. In the address bar, type https://ciscobusiness.cisco or https://<ip address> and press
Enter to display the Cisco Business Wireless Access Point login page.
The CBW AP uses a self-signed certificate for HTTPS, so all browsers will display a warning and ask you whether you
wish to proceed with an exception when the certificate is presented to the browser. Accept the warning to access the
Primary AP login page.
Note If the Firefox browser displays an exception, navigate to Options > Privacy & security > Certificates >
View Certificates > Servers > Add exception, and add an exception for https://ciscobusiness.cisco.

Step 3 Click Login and enter the username and password you created during the set up process to begin managing your CBW
network.

What to do next
The default landing page is the Network Summary window when you log in. For more information, see
About the Cisco Business Wireless AP Monitoring Service, on page 19.

Adding New Subordinate APs


If you have a CBW Wi-Fi 6 network up and running, adding new wired APs to the network is easy.

Step 1 Plug the Wired uplink AP (CBW150AX) into the Ethernet LAN connected to the current Primary AP. The AP must be
on the same VLAN as the Primary AP.
Step 2 After the new AP boots up, it will automatically download and update the firmware to match the Primary AP.
Step 3 Copy the configuration information and then join the wireless network.
To manage the newly added AP, navigate to the Wireless Settings > Access Points page and use the Web UI.

Adding Mesh Extenders


You can add a Mesh Extender such as CBW151AXM to the wireless network.
Ensure that you have enabled the Mesh option in the initial setup wizard. If not, go to Wireless Settings >
Mesh, enable the Mesh toggle button and click Apply. For detailed information, refer to About Cisco Mesh,
on page 82.
Now add the MAC address of the Mesh Extender to the Local MAC Addresses table using one of the following
methods:

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


16
Getting Started
Adding Mesh Extenders

Using the Management Web UI


A Primary AP responds only to discovery requests from indoor radios that appear in its authorization list, so
you must enter the MAC address of all Mesh Extenders that you want to use in the mesh network with the
Primary AP.
To add the MAC Address in the Allowlist, follow these steps:
1. Navigate to Wireless Settings > WLAN Users > Local MAC Addresses.
2. Click Add MAC Address and select the correct address from the list.
3. In the Description field, enter a description for the Mesh Extender that will identify the mesh access point
on the Primary AP.

Note You might want to include an abbreviation of its name and the last few digits of the MAC address, such as
ap1522:62:39:10. You can also note details on its location physical such as interior west wall, or corner ceiling
by front door.

4. Choose to join or block an AP using the following steps:


• Choose the Type as Allowlist to join the access points to the Primary AP.
• Choose the Type as Blocklist to block a particular access point from joining the Primary AP.

Note Blocklisting a client or Mesh Extender that is currently joined to the network will
not take effect until it attempts to rejoin the network (after a disconnect or reboot).

5. Select the Profile Name from the drop-down list and click Apply. By default, the profile name is mapped
to Any WLAN.
Check to see if the MAC address you added has been listed in the AP network. Navigate to Wireless
Settings > Access Points. You should find the MAC address added in the column, AP Mac along with
the AP model under the AP Model column of the table.

Using the Cisco Business Mobile App


1. Connect to the SSID setup for the Primary AP and log into the Primary AP admin account.
2. Select Monitor my Network, then choose Add a device.
3. Scan the MAC address of the Mesh Extender using the QR code reader on the wireless device.

To troubleshoot issues with Mesh Extender, refer to Deployment and Troubleshooting Guidelines, on page
146.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


17
Getting Started
Adding Mesh Extenders

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


18
CHAPTER 4
Monitoring
This chapter contains the following sections:
• About the Cisco Business Wireless AP Monitoring Service, on page 19
• Customizing the Network Summary View, on page 20
• Customizing Access Points Table View, on page 22
• Viewing Access Point Details, on page 25
• Viewing Client Details, on page 30
• Viewing Guest Client Details, on page 35
• Troubleshooting a Client, on page 35
• Viewing Mesh Extender, on page 38
• Viewing Applications, on page 39
• Viewing Rogue Access Points, on page 40
• Viewing Interferer Details, on page 42
• Wireless Dashboard, on page 42
• Customizing the Access Point Performance View, on page 44
• Customizing the Client Performance View, on page 47

About the Cisco Business Wireless AP Monitoring Service


The Cisco Business Wireless AP Monitoring service enables the Primary AP to monitor the WLANs and all
the connected devices on the network.
The Monitoring service offers the following capabilities through the Network Summary and Wireless
Dashboard tabs:
• View details of configured WLANs.
• View list of top WLANs based on traffic and associated clients.
• View details of APs in the network.
• View details of clients operating actively at either 2.4GHz or 5GHz.
• View summary of client device, guest client device, operating systems, and applications running on these
devices.
• View a detailed list of rogue clients and APs.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


19
Monitoring
Customizing the Network Summary View

• View details of various interferers in the network on the 2.4GHz and 5GHz radio frequencies.
• Monitor the performance of APs in the network.
• Monitor the performance of clients and guest clients in the network.

Note • All the parameters on the Network Summary page are read-only parameters.
• This page is automatically refreshed every 30 seconds.

Customizing the Network Summary View


The Network Summary page displays data in a graphical format. You can customize the Network Summary
view by adding or removing the widgets. The data displayed in various widgets can be viewed either in the
doughnut view format or in the tabular view format by toggling the display icon on the top right of the
individual widgets.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


20
Monitoring
Customizing the Network Summary View

Note Each of the action icons available within the widget is described in the Customizing the Network Summary
View, on page 20 section.

The following widgets are on the Network Summary page.


• OPERATING SYSTEMS by clients
Displays the OS information of the clients such as Linux and Android etc., that are connected to the
WLAN. You have to enable Local Profiling in the WLAN to view this information.
• GUESTS by usage.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


21
Monitoring
Customizing Access Points Table View

Displays the Top 10 guest clients in the network based on the throughput and usage.
• ACCESS POINTS by usage
Displays the Top 10 access points in the network based on the number of clients connected, usage, and
throughput.
• APPLICATIONS by usage
Displays the Top 10 applications such as Gmail, YouTube, Facebook etc., based on the usage level of
clients connected in the network. You must enable the Application Visibility Control (AVC) option in
the WLAN to view this information.
• TOP WLANS by usage
Displays the top 10 WLANs in the network by usage and number of clients connected.
• CLIENTS by usage
Displays the top 10 clients in a network based on throughput and usage.

Using the icons


The following icons and options are available to customize and view data as needed.

Clear data This clears the usage data and resets it to zero.

Tabular Click this icon to change the display of data between tabular view or doughnut view.

Save This exports the top 10 entries locally in Excel format.


All entries are exported for the Guests widget.

This removes the widget from the Monitoring page.

This adds the widget in the Monitoring page.

Customizing Access Points Table View


This section describes how to customize the view of all the APs in your network.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


22
Monitoring
Customizing Access Points Table View

1. Navigate to Monitoring > Network Summary > Access Points.


To see high level details of the AP, click on the count link in the Access Points summary section under
Monitoring > Network Summary page.
2. Toggle between the 2.4GHz and 5GHz tabs on the top of the page to view a tabular listing of the access
points operating at the respective radio frequencies. The following fields of information are displayed:
AP Name Displays the name of the AP.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


23
Monitoring
Customizing Access Points Table View

Role Pictorial representation of the type of AP.


• A Primary AP is depicted with a (P) attached to the AP icon.
• A Mesh Extender is represented by an (E) attached to the AP icon.
• A Primary Capable AP has no letter attached to the AP icon.

Type Specifies if the AP is a Primary AP, Primary Capable AP, or a Mesh Extender.

IP Address The IPv4 address of the device. By default, this is not visible.

Model Model of the CBW AP. By default, this is not visible.

Clients Number of client devices connected to the AP.

Usage The amount of data that has transferred between AP and the client devices.

Uptime Duration of how long the AP has been powered up.

Admin Status If this is enabled, it displays the configured status of the 2.4GHz / 5GHz Radio.

Operational Displays the running status of the 2.4GHz / 5GHz Radio.


Status

Channel Level of traffic including data and interference over the channel that is assigned on
Utilization the AP. Interference includes both Wi-Fi and non Wi-Fi signals. A high utilization
of a channel, for example above 50%, suggests a high level of interference.
This includes noise from nearby APs/clients/rogues on the same channel which
results in poor client performance. The values are represented in % format.
By default, this is not visible.

Throughput (Avg) This represents the amount of data that can be transferred from the AP to the client
device. By default, this is not visible.

Channel The channel number at which the radio of the AP is broadcasting the signal.

Transmit Power The logarithmic power level at which the AP is broadcasting the signal. The values
(Avg) are displayed in decibel-milliwatt (dBm) units.

Coverage Hole Coverage holes are areas where clients cannot receive a signal from the wireless
network. A coverage hole is considered to have occurred when client SNRs falls
below -80dBm of data RSSI. By default, this is not visible.

Interference (Avg) RF interference involves unwanted, interference of RF signals that disrupt normal
wireless operations, that creates potential network latency and poor client
performance. Interfering RF signals includes both Wi-Fi and non-Wi-Fi signals.
The values are represented in % format.

Noise Noise refers to any energy interference that degrades the quality of a wireless signal.
Noise can affect everything from radio transmissions to network speeds. The values
are displayed in decibel-milliwatt (dBm) units.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


24
Monitoring
Viewing Access Point Details

Rogues Any device that shares your channel and is not managed by your CBW network
can be considered as a Rogue. By default, this is not visible.

MAC Address The unique physical address of the device.

Mode Displays if the device is in AP Only mode or Mesh mode. By default, this is not
visible.

BSS Color Displays the BSS color configured for the corresponding radio. By default, this
column is not visible.

3. Click the down arrow on the top right of the column headers to customize the details displayed in the
table. You can choose to hide or show the desired columns, sort them in the order you wish, or filter the
table contents based on the desired parameters.

Viewing Access Point Details


Navigate to Monitoring > Network Summary > Access Points.
Click on a specific AP on the Access Point screen to display the Access Point View page. The following
details are displayed on the page.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


25
Monitoring
Viewing Access Point Details

GENERAL
AP Name The name of the Access Point.

If the physical location is configured, it will show the location. Otherwise, a default
Location
location will be shown.

MAC Address The unique physical address of the device.

The hardware (HW) address of the 2.4GHz and 5GHz radios. The address is the same
Base Radio MAC
for both the radios.

IP Address The IPv4 address is a 32-bit number that uniquely identifies an Access Point.

CDP / LLDP The name and the port of the switch the AP is connected to.
This field is applicable only for Primary Capable APs. (Those with wired uplinks).

Ethernet Speed This displays the current link speed of the switch port.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


26
Monitoring
Viewing Access Point Details

Model / Domain Model of the AP / radio domains.

Power Status Indicates the power level and mode of power.

Parent MAC Displays the Parent MAC address (AP to which it is connected wirelessly) This option
Address is available only for Mesh Extenders.

Nearest APs Displays the top 3 neighbor APs with high link SNR value. For more information see
Link SNR (dBM) in Viewing Mesh Extender, on page 38.
This field is helpful for determining the best location for APs and Mesh extenders
during installation. It would also help to troubleshoot connectivity issues.
The nearest AP field also displays Wireless Mesh Extenders.

Serial Number The unique number provided at the time of manufacturing.

Max Capabilities The radio domains, spatial streams, and maximum data rates of the Access Point.

Tech Support 1. Click Start to download the support bundle for individual APs, which includes
the AP boot-up logs and configurations. By default, this button is enabled.
2. Click Download to save the bundle locally. This button will be enabled only after
the bundle is generated.

Disable any Pop-up blockers in your browser settings to download the tech support
bundle for the AP.

Tech Support View the status of the support bundle generation. The status values are one of the
Status following:
• Not started: The bundle generation has not been triggered. This is the default
status.
• In Progress: The bundle generation is in progress.
• Completed: The bundle generation is complete. Download the bundle using
Download.

PERFORMANCE SUMMARY
This table provides the following information about the performance of the radios:
Number of clients The number of client devices connected to a specific AP.

Channels Channel number from where the AP radio is broadcasting the signal.
Number of channels will be 1, 2 and 4 for 20MHz, 40MHz and 80MHz respectively.

Configured Rate The default minimum and maximum data rates of the AP.

Usage Traffic The amount of data that has transferred between APs and the client devices.

Throughput This shows the amount of data that can be transferred from the AP to the client device.

Transmit Power The logarithmic power level at which the Access Point is broadcasting the signal.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


27
Monitoring
Viewing Access Point Details

Noise Noise refers to any energy interference that degrades the quality of a wireless signal.
Noise can affect everything from radio transmissions to network speeds.

Channel Utilization This is the level of traffic including data and interference over the assigned channel
on the AP. Interference includes both Wi-Fi and non Wi-Fi signals.
The high utilization of a channel, for example above 50%, suggests high level of
interference including noise from nearby APs/clients/rogues on the same channel
which results in poor client performance.

Interference RF interference disrupts normal wireless operations and can cause network latency
and poor performance. Interfering RF signals includes both Wi-Fi and non Wi-Fi
signals.

Traffic Shows the percentage of channel utilization traffic in 2.4GHz and 5GHz radios.

Admin Status Status of the Radios for 2.4GHz and 5GHz.

Interferer Detection Status of interferer detection for 2.4GHz and 5GHz radios.

AP {Name} DETAILS
This table provides the following details specific to the Access Point.
CLIENTS This table shows details about the clients that are connected to the AP. For field details,
refer to Viewing Client Details, on page 30.

RF Displays a visual representation of parameters that can affect the radio performance
TROUBLESHOOT of the AP, such as:
• NEIGHBOR AND ROGUE APS: Displays the Neighbor and Rogue APs on
the current and adjacent channels for a given radio and the signal strength they
are heard. This visualization allows you to quickly identify neighbor and rogue
APs that are causing interference and reducing the overall RF performance for
the cell.
• CLEAN AIR INTERFERERS: Displays the sources of non Wi-Fi interferers
and their severity on the current and adjacent channels for a given radio. This
visualization allows you to quickly identify non Wi-Fi sources of interference
that are reducing the overall RF performance for the cell.
• CLIENT DISTRIBUTION ON TOP NEIGHBOR APS: Displays the top 5
neighbor AP with signal strength greater than −70dBm on the APs current client
serving channel (2.4GHz and 5GHz). Tx power and number of clients associated
to this AP and its neighbor APs are shown. Number of clients is not available
for neighbor APs on different Primary AP.
• CLIENT DISTRIBUTION BY DATA RATES: Each client's throughput varies
depending on the data rate it is using (802.11 a/b/n/ac) at any given point in time,
and this data rate may vary every second. Various factors such as RSSI values,
RF interference, etc. may affect a client device's instantaneous data rate.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


28
Monitoring
Viewing Access Point Details

SPECTRUM By default, Spectrum Intelligence (SI) is disabled in order to reduce the CPU cycles
INTELLIGENCE and increase the performance.
Ensure that you enable the Interferer detection globally under Advanced > RF
Optimization in Expert View.
Enable the SI for the radio with the following steps:
1. Navigate to Wireless Settings > Access Points and select an AP.
2. Click Edit and choose either 2.4GHz or 5GHz radio.

ACTIVE Displays the Active Interferers of the Access Point for the selected radio. For further
INTERFERERS details of the table refer Viewing Details of Interferers under Viewing Interferers.

NON WI-FI Displays the Non Wi-fi Channel Utilization for the Access point of the selected radio.
CHANNEL
UTILIZATION

INTERFERENCE Shows the interference power for the AP on the selected radio.
POWER

TOOLS
This section of the UI consists of options to configure the LED states of the access points and also provides
details of the image in the description table.
AP LED DISABLE Use this tool to disable the LED on the AP. For more information, refer to LED
Display Settings, on page 141.

BLINK AP LED This tool changes the AP LED to blink Red/Green for 60 seconds. This is used to
identify the AP. For more information refer to LED Display Settings, on page 141.

RESTART AP You can reload AP if needed. The Primary AP does not have this option.

INTERCHANGE You can swap the primary version and backup version of the image. This will take
IMAGE effect only after the AP reloads.

FACTORY You can reset the AP to factory default settings if required. The AP that currently acts
DEFAULT as the Primary AP does not have this option.
To reset Primary AP to factory defaults refer to Clearing the Primary AP Configuration
and Resetting to Factory Defaults, on page 128.

EXPORT CONFIG You can download the running configuration of the AP to .TXT file format. By default
the file is saved as AP<macaddress>_config.txt in your downloads folder.
This option is available for the Primary AP and all the APs associated with the Primary
AP. See below for a sample AP Configuration file.

Sample AP Config file


APModel: CBW240AC-H
APLocation: default location
APMode: 7
APRole: Root
IPConfigMode: 0
IsBridgeAP: 1
NextPrimaryAP: 00:00:00:00:00:00

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


29
Monitoring
Viewing Client Details

IsPreferredPrimary 0
RogueDetectionStatus: 0
Radio0_AdminStatus: 1
Radio0_ChannelWidth: 20 MHz
Radio0_Channel: Automatic
Radio0_TransmitPower: Automatic
Radio0_InterfererDetection: 0
Radio1_AdminStatus: 1
Radio1_ChannelWidth: 80 MHz
Radio1_Channel: Automatic
Radio1_TransmitPower: Automatic
Radio1_InterfererDetection: 0
MeshRole: 1
MeshBackhaulSlot: 1
InstallMapping: 1
BridgeType: Indoor
BridgeGroupName: 00sasi
BackhaulInterface: 802.11a/n/ac
StrictMatchBGN: 0
EthernetBridge: 1
EthernetLinkStatus: UpDn
MeshInterface1_Name: GigabitEthernet1
MeshInterface1_Status: 0
MeshInterface1_VlanTagging 1
MeshInterface1_NativeVlanId 0

For more AP Config file details see: Access Point Configuration Files, on page 150.
IMPORT CONFIG Select this option to upload the configuration file (in .TXT file format) of the AP.
The configuration should match the AP model. This option is available for the Primary
AP and all associated APs.
You can also track the status of the configuration file uploaded in the TOOLS section
above.
• Non-mesh configuration files should not be imported to Mesh deployment APs.
• After uploading the configurations to the AP, it normally takes 1-2 minutes to
take effect. You can also see the LED of the AP change from solid/blinking green
to blinking green while applying the configurations. It will change back to
blinking blue once the upload is complete.

Note The Export/Import Config options in the Access Points page is specific to a particular AP. If you want to
change the configuration for the entire CBW network, refer to Export and Import Primary AP Configuration,
on page 128.

Viewing Client Details


To open and view information about a specific client follow the steps below.
Information about all the active clients is displayed in the Active Clients summary section. These clients are
either 802.11b/g/n clients operating at 2.4GHz, or 802.11a/n/ac clients operating at 5GHz.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


30
Monitoring
Viewing Client Details

1. Navigate to Monitoring > Network Summary.


You can also view this page by navigating via Monitoring > Network Summary > Clients.
2. In the Active Clients summary section, click the count display icon to view high-level details of the client
device or navigate to Monitoring > Network Summary > Clients. This section will give you an overview
of the connected clients and its parameters.

In the Clients page, there are three blocks that list the following information.
Clients This tile shows the number of clients currently connected.

Wireless This tile displays the number of clients for the 2.4GHz and 5GHz radio.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


31
Monitoring
Viewing Client Details

Apple This tile displays the number of clients that are connected to Apple clients. It also
includes more information as defined below.
• Fastlane: This tile displays the number of clients using Fastlane. Fastlane allows
iOS apps connected to CBW access points to be prioritized.
This means your voice, video, and real-time data gets to be first in line. To enable
Fastlane go to Wireless Settings > WLANs > Add/edit WLAN > Traffic
Shaping > Fastlane.
• Analytics: This tile displays the number of analytics-capable clients.

Client Details Table


Click the down-arrow on the top right of the column headers to customize the details displayed in the table.
You can choose to hide, show, or rearrange columns, sort, or filter the table contents based on the desired
parameters.
User Name The user name of the client connected to the Primary AP (Default: Unknown).

IPv4 Address The IPv4 address is a 32-bit number that uniquely identifies the client device.

AP Name The configured AP name to which the client associated will be displayed in this column.

Protocol The Wi-Fi standard through which the client is connected. It can be 802.11a/b/g/n/ac.

Hostname The MAC address of the client is displayed by default. Enable Wireless Settings >
Add/Edit WLAN > Local Profiling to view the hostname of the supported clients.

Client Type The client’s operating systems will be displayed in this column as Android or an Apple
Device.

Connection Speed The maximum data rate strength of the client connected to the access point. The values
are displayed in units of Mbps.

Status The active status of the client.

Signal Quality Signal quality is a value ranging from 0 to 100dB. This includes the noise generated
by interference sources and the signal strength.

Signal Strength Signal strength is the wireless signal power level received by the wireless client. Strong
signal strength results in more reliable connections and higher speeds. Signal strength
is represented in -dBm format, ranges from 0 to -100dBm. The closer the value to 0,
the stronger the signal.

Usage The amount of data consumed by the client.

WLAN SSID Shows to which SSID the client has connected.

Uptime The duration of how long the client is connected to the access point.

MAC Address The MAC hardware address of the connected client.

Frequency The radio on which the client is connected 2.4GHz or 5GHz.


Bandwidth

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


32
Monitoring
Viewing Client Details

WLAN Profile The profile name of the configured WLAN connected to the client.

AP MAC Radio MAC address of the corresponding access point to which the client is connected.

AP Group This column shows the access points groups to which it is configured.

IPv6 Address The IPv6 address of the client device.

Client View
Select a client from the list to display the following details.
User Name The user name of the client connected to the Primary AP (Default: Unknown).

Hostname The MAC address of the client is displayed by default. Enable Wireless Settings >
Add/Edit WLAN > Local Profiling to view the hostname of the clients supported.

MAC Address The MAC hardware address of the connected client.

Deauthenticate Click this green button next to the MAC address to disconnect the client.
Deauthenticating the client removes a client from the WLAN, but that client will be
able to rejoin unless their MAC address is added to the Blocklist.
To block the client permanently do the following:
1. Navigate to Wireless Settings > WLAN Users > Local MAC Addresses.
2. Click Add MAC address.
3. Select the type Blocklist.
4. Click Apply & Save.

Uptime The duration of how long the client is connected to the access point.

SSID Shows the SSID connected to the client.

AP Name The configured AP name associated to the client. To configure the AP name and
location, navigate to Wireless Settings > Access Points.

Nearest APs List of APs near the client based on signal strength.

Device Type The client’s operating systems is displayed in this column as an Android or Apple
Device.

Performance This shows the performance by Signal Strength, Signal Quality, Connection Speed,
and Channel Width.

Capabilities This gives information on which domain the client is associated to the AP and its Spatial
Stream.

Cisco Compatible Cisco Compatible state changes only when a Cisco client (which supports CCX
extensions of the IEEE standards) is associated to your AP.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


33
Monitoring
Viewing Client Details

Client connection Connection score is the connection quality between client and the access point displayed
score as a percentage. It indicates the current client data transfer speed. The higher the
percentage, the faster the data is being transferred. This value is based on the Client
Actual Rate divided by either the Client Max Capability or Max AP Configured
(whichever is lower).

CONNECTIVITY
This line graph represents the stages and current status of the associated client as in the Start, Association,
Authentication, DHCP, and Online stages.

TOP APPLICATIONS
The top applications that are being used by the client device are presented in a graphical or tabular format.
To use this, enable AVC in Wireless Settings > WLANs > > Add/Edit WLAN > Traffic Shaping >
Application Visibility Control.
To view this data make sure the Application Visibility Control (AVC) is active.

MOBILITY STATE
This shows the graphical flowchart of stages on how the client is connected to the Primary AP. You can open
the graph or table to view the following information:
• Name of the Primary AP, with its IP address and the model number of the AP on which it is running.
• Name of the AP client connected to the Primary AP, including the IP address, and model number.
• Nature of the connection between the AP and the client. (For example, a wireless 802.11n 5GHz
connection.)
• Name and type of client (such as Microsoft Workstation), VLAN ID and IP Address of the client.

NETWORK AND QOS


This shows client capability of some IEEE standards and user-configured parameters such as:
• IP address
• VLAN
• Source Group Tag
• Fastlane Client
• Mobility Role
• WMM
• U-APSD
• QoS Level

SECURITY & POLICY


This table shows the encryption type and security policies on the client associated to the access point such as:

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


34
Monitoring
Viewing Guest Client Details

• Policy (WPA2 or WPA3)


• Cipher
• Key Management
• EAP Type
• ACL (IP/IPv6)
• mDNS
• AAA Role
• User Authenticated by

Viewing Guest Client Details


The clients that are connected to the Guest WLANs are known as Guest Clients. To obtain Guest WLANs,
the Primary AP provides guest user access on WLANs specifically designated for use by guest users. For
details on creating a guest client refer to Creating a Guest User Account, on page 91.
1. Navigate to Monitoring > Network Summary > Guest Clients to display a summary of all active guest
clients.
These clients are either 802.11b/g/n clients operating at 2.4GHz or 802.11a/n/ac clients operating at 5GHz.
2. Click on the guest client from the list in the table to view the guest client details. For a description of the
parameters displayed for a guest client, refer to Viewing Client Details, on page 30.

Two tiles display a summary of the number of guest clients and recently connected clients to the Primary AP.
Each guest client detail can be viewed by clicking the specific client record.
Guest Clients / Displays the number of guest clients and recent clients connected to the network.
Recent Clients

Wireless Specifies the number of 802.11b/g/n guest clients connected and operating either at
2.4GHz or 5GHz.

Click the down-arrow on the top right of the column headers to customize the details displayed in the table.
You can choose to hide, show, or rearrange columns, sort, or filter the table contents based on the desired
parameters.

Note You can export CBW connected guest details and download them in Excel format using the Save icon in the
Guest Widget.

Troubleshooting a Client
This section describes in detail how to perform a client ping test and a connection test. These help to effectively
investigate and troubleshoot connection issues.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


35
Monitoring
Perform a Client Ping Test

To troubleshoot wireless client joining issues:


• Set the Logging level as Notifications to (5).
• Check the logs in the Primary AP UI under Management > Logging.

Perform a Client Ping Test


Perform a ping test on the client to determine the latency, or delay between the Primary AP and the client.
This is an Internet Control Message Protocol (ICMP) based test. Using the ping test will tell you the connectivity
as well as the latency between the Primary AP and the client.

To start the ping test follow the steps below.


1. Navigate to Monitoring > Network Summary > Clients.
2. Select the name of the client from the table.
3. Scroll down to the bottom of the Client View screen, and click the Ping tab.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


36
Monitoring
Perform a Connection Test

4. Click Start to begin the test. The latency in milliseconds is represented graphically.

Perform a Connection Test


Perform a connection test when the client fails to connect to a particular WLAN. This test takes about three
minutes. Attempting to connect during the three minute test period will generates diagnostic information to
aid in troubleshooting connection issues.

The results of the client connection establishment with the WLAN is displayed at each stage.

Step 1 Navigate to Monitoring > Network Summary > Clients.


Step 2 Click on the client MAC address that you want to debug.
Step 3 Scroll down to the Client Test and click Start in the Connection tab.
Step 4 Now disconnect the client from the WLAN and try re-connecting.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


37
Monitoring
Generate an Event Log

Generate an Event Log


Perform a complete debug session by enabling the Event Log feature that is available in the per client view
tab. The Event Log testing contains the time-stamp and message details that are exchanged between the client
and the Access Point. The message type helps to analyze and conclude if a client is able to successfully join
a WLAN or a reason for its failure.
Following is a sample output of a generated event log.

Step 1 Navigate to Monitoring > Network Summary > Clients.


Step 2 Click on the MAC address of the client that you want to debug.
Step 3 Scroll down to Client Test, and in the Event Log tab click the Start option.
Step 4 Now disconnect the client from the WLAN, and try to re-connect it again.
Step 5 Save the results by selecting the Save to Disk option in the Primary AP UI.

Viewing Mesh Extender


When you need to look at the details of a particular Mesh Extender, navigate to Monitoring > Network
Summary > Mesh Extender > > .
In the Mesh Extender page, you can view the following details.
AP name The name of the Mesh Extender.

AP Model The model of Mesh Extender.

Ethernet MAC The hardware MAC address of the Mesh Extender.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


38
Monitoring
Viewing Applications

Parent AP Name The AP name to which the Mesh Extender has joined wirelessly.

Hop The count of how far the Mesh Extender is operating from the Primary AP.

Link SNR (dBM) The signal to noise ratio calculated between the Mesh Extender and the Primary
AP.

Channel Utilization (%) Level of traffic including data and interference over the channel that is assigned
on the AP. The values are represented in % format.

Channel Channel number where the Mesh Extender’s radio is operating.

Clients Number of clients connected to this Mesh Extender.

Viewing Applications
Click the Applications menu to view the Top 10 applications used in client traffic. To see the usage, enable
the Application Visibility Control (AVC) option in at least one WLAN.
1. Navigate to Wireless Settings > WLANs > Add/Edit WLAN > Traffic Shaping > Application visibility
Control.
2. Select Enabled in the Application Visibility Control drop-down menu.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


39
Monitoring
Viewing Rogue Access Points

Viewing Rogue Access Points


Any device that shares your channel and is not managed by you is considered a Rogue. This includes Rogue
Access Points, Wireless Routers, and Rogue clients. CBW APs have the built-in intelligence to detect rogue
devices in both 2.4GHz and 5GHz radios.
The Rogue AP and Rogue Client Detection is Disabled on CBW APs by default. To enable Rogue Client
Detection:
1. Navigate to Wireless Settings > Access Points.
2. Click the edit icon next to the AP you want change.
3. Click the Rogue Detection toggle button in the General tab.
4. Click Apply to save and exit.

After applying the changes, Rogue detection will be enabled, and any Rogue APs will be reported to the
Primary AP.
To see any Rogue APs on your network, navigate to Monitoring > Rogues > Access Points. The screen
displays the following details of rogue devices which includes unmanaged neighboring Clients and Access
Points.
Click on the tiles at the top of the page to filter the list of Rogue Access Points by:
• 2.4GHz / 5GHz
• Unclassified
• Friendly
• Malicious

MAC Address MAC address of the Rogue AP.

SSID The name of the SSID, using which the Rogue AP is broadcasting.

Channels The channel in which the Rogue AP is operating.

Detecting APs Displays the number of APs where the Rogue AP is detected.
Count

Clients Number of clients connected to the Rogue AP.

State Displays the state of the Rogue AP. If the Rogue AP class is friendly, the state will be
Internal or External, or the state will be Alert.

Class The class of the Rogue AP. By default, all the Rogue APs are unclassified. You can
change the class of Rogue APs to Friendly, or Malicious.

Following are the classes that are supported by the CBW:


Unclassified The CBW AP discovers all the Rogue APs and marks them under the Unclassified
class by default. Also, the status of the Rogue AP remains as Alert since it remains
unknown to the CBW network.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


40
Monitoring
Configuring the Rogue AP States

Friendly You can move the Rogue AP to a Friendly state if you know the MAC address of the
Rogue AP.
Following are the options that are configurable:
• Internal—If the unknown Access Point is inside the network and poses no threat
to WLAN security, you would manually configure it as Friendly, Internal.
Example: An Access Point that exists within your premises.
• External—If the unknown Access Point is outside the network and poses no
threat to WLAN security, you would manually configure it as Friendly, External.
Example: An Access Point that belongs to a neighboring coffee shop.

Malicious You can move the Rogue AP to Malicious class when you do not know the particulars
of the AP. By default, the status remains as Alert since it remains unknown to the
CBW network.

Configuring the Rogue AP States

Step 1 Click Monitoring > Network Summary.


Step 2 Click on the Access Points in the Rogues tab.
Step 3 Click on one of the available Rogue APs that is detected by the CBW.
Step 4 Select the appropriate class in the Update class drop-down list box.
Step 5 Select the class as Friendly to configure the status as Internal or External. If you specify the AP as Malicious class,
then the status of the AP remains as Alert
Step 6 You can also move an AP from one state (such as Friendly) to another (such as Malicious) by selecting the AP from the
specific tabs.
Step 7 Click Apply to save the changes.

Viewing Rogue Client Details


Navigate to Monitoring > Rogues > Clients in Expert View.
Clients that are associated to Rogue APs are displayed along with the following details:
MAC address Rogue client’s MAC address.

AP MAC MAC address of the AP to which the Rogue client is connected.

SSID Displays the SSID connected to the client.

Radios Displays the number of radios in the Rogue client.

Last Seen Shows the time the Rogue client was detected.

State Displays the state of the Rogue client.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


41
Monitoring
Viewing Interferer Details

Wired Specifies if the detected Rogue client is Wired or Wireless.

Viewing Interferer Details


Interferers are non Wi-Fi devices that cause disruption to your wireless network. They may either be operating
at 2.4GHz or at 5GHz. To view these devices, do the following:

Step 1 Click Monitoring > Network Summary > Interferers.


A summary of all non Wi-Fi interfering devices is displayed in the Interferers summary window. These interferers may
either be operating at 2.4GHz or at 5GHz.

Step 2 In the Interferers summary window, click the count display icon. The following details are displayed.
• AP Name: The name of the Access Point where the interference device is detected.
• Radio Slot: Slot where the radio is installed.
• Interferer Type: Type of the interferers such as Microwave Oven, Jammer, WiMax Mobile, and so on
• Affected Channel: Channel that the device affects.
• Detected Time: Time at which the interference was detected.
• Severity: Severity index of the interfering device.
• Duty Cycle (%): Proportion of time during which the interfering device was active.
• RSSI: Receive signal strength indicator (RSSI) of the Access Point.
• Dev ID: Device identification number that uniquely identified the interfering device.
• Cluster ID: Cluster identification number that is unique which identifies the type of the device.

Note Ensure that you enable the Interferer detection globally under Advanced > RF Optimization (in Expert View).
Navigate to Wireless Settings > Access Points and select an AP. Click Edit and choose either 2.4GHz or
5GHz radio.

Wireless Dashboard
This page displays the capabilities of AP and the Client for 2.4GHz and 5GHz. Click the Close widget
icon on the top right of the widgets that you want to remove. To add the widget click the icon.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


42
Monitoring
Wireless Dashboard

AP CAPABILITY
Displays the capability details for the APs managed by the Primary AP:
Max Configured Displays the graph and table for maximum configured connection rate in Mbps.
Connection Rates
These are mapped to different ranges for both the radios (2.4GHz and 5GHz) for all
APs configured by the Primary AP.

AP Distribution by Displays the maximum configured Channel Width for all the APs configured by the
Channel Width Primary AP.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


43
Monitoring
Customizing the Access Point Performance View

CLIENT CAPABILITY
Displays the capability data for the clients managed by the Primary AP:
Client Capability by Displays the graph and table for the number of clients capable of a particular spatial
Spatial Stream stream for all the clients connected to the Primary AP.

Client Capability by Displays the graph and table for the number of clients based on the maximum data
Max Protocol rate protocol supported for all the clients connected to the Primary AP.

AP PERFORMANCE-CHANNEL UTILISATION
Display the Performance details for the APs managed by the Primary AP:
Channel Utilization Displays a graph and table for channel utilization as a percentage on all APs configured
by the Primary AP. This is mapped to different ranges for each of the 2.4GHz and
5GHz radios.

CLIENT PERFORMANCE
Displays the connected characteristic for the clients managed by the Primary AP:
Client by Displays the connection score percentages ranges for all clients connected to the
Connection Score Primary AP. The Connection Score is calculated as a percentage value based on the
Client Actual Rate divided by either Client Max Capability or Max AP Configured
(whichever is lower).
This ensures the Connection Score is always calculated based on the maximum possible
rate and the maximum rate capability of each device.

Client by Displays the graph and table for the number of clients based on the connected protocol
Connected Protocol for all the clients connected to the Primary AP.

AP DISTRIBUTION
Displays the distribution of APs managed by the Primary AP:
AP distribution by Displays the graph and table for all APs configured by the Primary AP. The graph
Model and table is updated based on the Model name of the AP to the radios (2.4GHz and
5GHz).
AP distribution by Displays the graph and table for all APs configured by Primary AP. The graph and
SpatialStream table is updated based on the SpatialStream that is connected for each of the radios
(2.4GHz and 5GHz). The center of the donut displays the maximum number of APs
with the particular SpatialStream.

Customizing the Access Point Performance View


You can customize the AP Performance view by adding or removing the widgets.
You can view the statistics below in both 2.4GHz and 5GHz type of radios by clicking directly on them.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


44
Monitoring
Customizing the Access Point Performance View

Widgets Description
CHANNEL This shows the level of traffic including data and interference over the channel that
UTILIZATION is assigned on the AP. Interference includes both Wi-Fi and non Wi-Fi signals.
-TOP APS High utilization of a channel, for example above 50% suggests a high level of
interference including noise from nearby APs/clients/rogues on the same channel.
This causes poor client performance.
Click to view the AP detail.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


45
Monitoring
Adding or Removing a Widget

Widgets Description
INTERFERENCE RF interference involves unwanted, interference of RF signals that disrupt normal
wireless operations which creates potential network latency and poor client
-TOP APS
performance. Interfering RF signals includes both Wi-Fi and non Wi-Fi signals.
Click to view the AP detail.

CLIENT LOAD Load indicator displays the current number of connected clients on each access point.
A higher load may impact performance. Use client load balancing to improve client
-TOP APS
distribution on the wireless network.

COVERAGE Coverage holes are areas where clients cannot receive a signal from the wireless
network. A coverage hole is considered to have occurred when client SNRs fall below
-BOTTOM APS
a predetermined level. A coverage hole event is when several clients are stuck in the
same coverage hole.

AP Join Failure This widget shows the number of APs that failed to join the Primary AP and the
Status associated error types during a specific day, week or month. Click a specific join error
to see the APs that have failed to join the Primary AP with the associated error type.
Click the setting to clear the AP Join statistics.

Adding or Removing a Widget

Step 1 Open Monitoring > Wireless Dashboard > AP Performance.

Step 2 To add a widget, click the icon on the top right of the AP Performance window.

Step 3 To remove a widget, click the icon on the top right of the widgets that you want to remove.
Step 4 Select from the widgets shown below:
• Channel Utilization: Top APs
• Interference: Top APs
• Client Load: Top APs
• Coverage: Bottom APs
• AP Join Failure Status: Bottom APs

Note • Top APs are APs with the maximum client load.
• Bottom APs are APs with low SNR values for the client.

Step 5 Click Close. The AP Performance window is refreshed with your changes.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


46
Monitoring
Customizing the Client Performance View

Customizing the Client Performance View


You can customize the Client Performance view by adding or removing the widgets.

Table 4: Client Performance

Numbers & Labels Description


Signal Strength Strong signal strength results in more reliable connections and higher speeds. Signal
strength is represented in -dBm format, ranges from 0 to -100dBm. The closer the value
to 0, the stronger the signal. Click to get a summary of clients.

Connection Rate Each client's throughput varies depending on the data rate used (802.11 a/b/n/ac) at
any time, and this data rate may vary every second. Various factors such as RSSI values,
RF interference, and so on, may affect a client device's instantaneous data rate.

Signal Quality Signal quality is a value ranging from 0 to 100dB. This includes the noise generated
by interference sources and the signal strength.

Client Connections Displays clients associated with the access points of any connectivity types.

Adding or Removing a Client Widget

Step 1 Open Monitoring > Wireless Dashboard > Client Performance.

Step 2 Click the icon on the top right of the Client Performance window.

Step 3 To remove a widget, click the icon on the top right of the widgets that you want to remove.
Step 4 Select the widgets you want to add:
• Signal Strength
• Signal Quality
• Connection Rate
• Client Connections

Step 5 Click Close. The Client Performance window is refreshed with the new widgets.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


47
Monitoring
Adding or Removing a Client Widget

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


48
CHAPTER 5
Wireless Settings
This chapter contains the following sections:
• About WLANs in CBW Access Point Network, on page 49
• Setting Up WLANs and WLAN Users, on page 49
• Managing Associated Access Points, on page 71
• Setting a Login Page for WLAN Guest Users, on page 79
• About Cisco Mesh, on page 82

About WLANs in CBW Access Point Network


A Wireless Local Area Network (WLAN) is a network that allows devices to connect and communicate on
wireless mode.
You can create and manage WLANs using the WLANs screen. This is discussed in the following sections.

Setting Up WLANs and WLAN Users


Open Wireless Settings > WLANs.
The total number of active WLANs is displayed at the top of the WLANs window which includes a list of
WLANs currently configured on the Primary AP. The following details are displayed for each WLAN:
• Status of the WLAN (enabled or disabled)
• Name
• Security Policy
• Radio Policy

Setting Up Guidelines
• You can associate up to 16 WLANs with the CBW Primary AP and create a total of 16 WLANs. Cisco
recommends a maximum of 4 WLANs. The Primary AP assigns all the configured WLANs to all the
connected APs.
• Each WLAN has a unique WLAN ID, a unique profile name, and an SSID.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


49
Wireless Settings
Viewing WLANs

• The Profile name and SSID can have up to 31 characters.


• Each connected AP advertises only the WLANs that are in an Enabled state. The APs do not broadcast
disabled WLANs.
• Peer-to-peer blocking does not apply to multicast traffic.
• You cannot map a WLAN to VLAN0, and you cannot map VLANs 1002 to 1006.
• Dual-stack clients with static IPv4 addresses are not supported.
• Profile name and security type must be unique for each WLAN.

Viewing WLANs
To view details of configured WLANs, navigate to Wireless Settings > WLANs.
The WLANs window lists all the WLANs that are currently configured on the Primary AP. This screen
displays the following details for each WLAN:

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


50
Wireless Settings
Viewing WLANs

Action Provides the option to Edit or Delete the WLAN.

Active Shows the status of the WLAN as enabled or disabled.

Type Displays the type as WLAN.

Name Profile Name of the WLAN.


Several WLANs can be configured with the same SSID name but with a unique policy
name and security mechanisms.

SSID Service Set Identifier (SSID) name of the WLAN.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


51
Wireless Settings
Adding and Modifying WLANs

Security Policy Indicates the Security Type of the WLAN. It can be an Open network, WPA2 Personal,
WPA2+WPA3 (Personal), WPA3 Personal, WPA2 Enterprise, Central Web Auth
(CWA), or a guest network.

MAC filtering This option is displayed when you configure a Security Type with MAC Filtering
enabled in the previous field. For example, when you configure a Open WLAN with
the MAC Filtering enabled, then it displays Open+Macfilter.

Radio Policy Displays the Radio in which the WLAN is broadcasting. By default, it is All.

Note See About WLANs in CBW Access Point Network, on page 49 for a brief explanation on WLANs.

Tip The total number of active WLANs is displayed at the top of the page. If the list of WLANs spans multiple
pages, you can browse these pages by clicking the page number links or the forward and backward icons.

Adding and Modifying WLANs


This section describes how to add, modify, or delete a WLAN.

To add a WLAN
1. Navigate to Wireless Settings > WLANs.
2. In the WLANs window, click the Add new WLAN button to open the Add new WLAN window.
3. Click Yes in the pop-up message.
4. Open each tab and make your selections to set up the WLAN.
Each of the tabs in this window is explained in the following sections.
5. Click Apply to save the configurations or Cancel to discard the changes.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


52
Wireless Settings
Configuring General Details

To edit a WLAN

1. Click next to the WLAN you want to modify.

Note Editing the WLAN will disrupt the network momentarily.

2. Open each tab and make your edits to the WLAN.


3. Click Apply to save the configurations, or Cancel to discard the changes.

For details on how to delete WLANs see Editing and Deleting WLANs, on page 67.

Configuring General Details


Navigate to Wireless Settings > WLANs > Add new WLAN > General.
Under the General tab, set the following parameters:

WLAN ID From the drop-down list, choose an ID number for the WLAN.

Type Indicates if the type of network is WLAN. Choose WLAN option.

Profile Name The profile name must be unique and should not exceed 31 characters.

SSID The profile name also acts as the SSID. You can define an SSID that is different from
the WLAN profile name. The SSID must be unique and should not exceed 31 characters.

Enable Click this tab to enable/disable the WLAN.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


53
Wireless Settings
Configuring the WLAN Security

Radio Policy Click the drop-down list and choose from the following options:
• All—Configures the WLAN to support dual-band (2.4GHz and 5GHz) capable
clients.
• 2.4GHz only—Configures the WLAN to support 802.11b/g/n/ax capable clients
only.
• 5GHz only—Configures the WLAN to support 802.11a/n/ac/ax capable clients
only.

Broadcast SSID The default is Enabled for the SSID to be discovered. Use the toggle button to hide
the SSID.

Local Profiling By default, this option is disabled. Enable this option to view the Operating System
that is running on the Client or to see the User name.

Configuring the WLAN Security


Navigate to Wireless Settings > WLANs > Add new WLAN > WLAN Security.
Under the WLAN Security tab set the following parameters.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


54
Wireless Settings
Configuring the WLAN Security

Guest Network Guest user access can be provided on WLANs which are specifically designated for
use by guest users. If the Guest Network is enabled, then the WLAN is considered as
Guest WLAN. By default, this field is disabled.
The following fields are displayed when you Enable the Guest Network option. These
are applicable for WLANs and Guest WLANs.
For details on creating a Guest Network, refer to Creating a Guest Network, on page
143.

Captive Network This feature detects the presence of a captive portal by sending a web request on
Assistant connecting to a wireless network. This request is directed to a URL for iPhone models,
and if a response is received, then the Internet access is assumed available and no
further interaction is required.
If no response is received, then the Internet access is assumed to be blocked by the
captive portal and Apple’s Captive Network Assistant (CNA) auto-launches the
pseudo-browser to request portal login in a controlled window.

MAC Filtering You can also restrict or permit a particular client joining your network by enabling the
MAC Filtering feature. For details, refer to Blocking and Unblocking Clients, on page
69.
When MAC Filtering is enabled on the WLAN, the client MAC address must be added
to the Local MAC Addresses list by navigating to Wireless Settings > WLAN Users >
Local MAC Addresses with the Type as Allowlist for enabling the client to join the
network via that SSID.

Captive Portal This field is visible only when the Guest Network option is enabled. This is used to
select the type of web portal that can be used for authentication purposes. Following
are the types of web portals that you can choose.
• Internal Splash Page: Choose this option to have a default Cisco web portal
based authentication.
• External Splash Page: Choose this option to have external captive portal
authentication, using a web server outside your network. Also, select the URL of
the server in the Captive Portal URL field.

Ensure to add this URL rule in the configuring ACL name under Advanced >Security
Settings page.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


55
Wireless Settings
Configuring the WLAN Security

Access Type This field is visible only when the Guest Network option is enabled.
• Local User Account: This is the default option. Choose this option to authenticate
guests using the username and password which you can set for guest users of this
WLAN, under Wireless Settings > WLAN Users. For more information, see
Viewing and Managing WLAN Users, on page 68
• Web Consent: Choose this option to allow guests access to the WLAN upon
acceptance of displayed terms and conditions. This option allows guest users to
access the WLAN without entering a username and password.
• Email Address: Choose this option if you want guest users to be prompted for
their e-mail address when attempting to access the WLAN. Access to the Internet
is provided when a valid email address is entered. This option allows guest users
to access the WLAN without entering a username and password.
You can also collect the email address information by configuring Accounting
Radius Server under Management > Admin Accounts > Radius in Expert
View. By default, the email address will be sent to the first Radius server
configured.
• RADIUS: Refers to details on RADIUS in the Security Type-WPA2 Enterprise,
on page 58 section.
• WPA2 Personal: Refers to Security Type-Personal, on page 57 in the following
section.
• Social Login: Choose this option to allow guest access to WLAN upon
authentication by Google/Facebook using their personal credentials. Once the
user connects to this guest WLAN they will be redirected to Cisco default login
page where they can find the login buttons for Google and Facebook. Once the
user logs in using their Google/Facebook account, the user will get Internet access.
If Social Login Access type is selected, the two toggle options will be displayed:
• Facebook —Turn on this option when you want to allow a guest user access
only using Facebook accounts.
• Google—Turn on this option when you want to allow a guest user access
only using Google accounts.

By default both toggles are enabled, so guest users can use Facebook or Google
accounts for authentication.
Apple devices will not be able to sign-in via Google, if Captive Network Assistant
(CNA) is enabled with Social Login as Access Type. You will need to disable
CNA and sign-in via Google for Guest access.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


56
Wireless Settings
Configuring the WLAN Security

ACL Name(IPv4) This field is visible only when the Guest Network option is enabled.
For a detailed explanation on this feature refer to Configuring Access Control Lists
(ACL), on page 133. This description is applicable for WLAN and Guest WLAN.
Any ACL created through Advanced > Security Settings > Add new ACL is also
displayed here.
• None: No ACL is applied.
• Enable Social Login: This is a default setting. The user can map this when required
to configure a Guest WLAN with Social Login as Access type.

Enable Facebook The user can map to this when required to configure a Guest WLAN with Social Login
Login as Access type and the Facebook toggle is enabled.

Enable Google The user can map to this when required to configure a Guest WLAN with Social Login
Login as Access type and the Google toggle is enabled.

Enable Social This is a default setting. The user can map this when required to configure a Guest
Login WLAN with Social Login as Access type.

ACL Name(IPv6) This field is visible only when the Guest Network option is enabled.

Security Type For details on this option, refer to the following section.
Security Type is displayed when the Guest Network option is disabled.
Each of the options available in the Security Type drop-down is explained in detail
below.

Security Type-Open
This option stands for Open Authentication, which allows any device to authenticate and then attempt to
communicate with an AP. Using Open Authentication, any wireless device can authenticate with the AP.

Security Type-Personal
WPA2 This option stands for Wi-Fi Protected Access 2 with Pre-Shared Key (PSK). WPA2
Personal is a method used for securing your network with the use of a PSK
authentication. The PSK is configured separately both on the Primary AP, under the
WLAN security policy, and on the client. WPA2 Personal does not rely on an
authentication server on your network. By default, it is enabled.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


57
Wireless Settings
Configuring the WLAN Security

WPA3 This option stands for Wi-Fi Protected Access 3 (WPA3), the latest version of Wi-Fi
Protected Access (WPA), which is a suite of protocols and technologies that provide
authentication and encryption for Wi-Fi networks. WPA3 leverages Simultaneous
Authentication of Equals (SAE) to provide stronger protections for users against
password guessing attempts by third parties. When the client connects to the Access
Point, they perform an SAE exchange. If successful, they will each create a
cryptographically strong key, from which the session key will be derived. Typically,
a client and Access Point goes into phases of commit and then confirm. Once there is
a commitment, the client and Access Point can then go into the confirm states each
time there is a session key to be generated.
For advanced security, enable WPA3 in addition to WPA2. By default, the value is
disabled.
You can also enable WPA3 individually, provided the client is WPA3 compatible.

Passphrase Format Choose ASCII or HEX (hexadecimal range) from the PSK Format drop-down list and
then enter a pre-shared key in the text box. WPA pre-shared keys must contain 8 to 63
ASCII text characters or 64 hexadecimal characters.

Passphrase Create the password.


The PSK you enter is hidden under the dots for security purposes.

Confirm Retype the password to confirm it.


Passphrase
Show Passphrase Check the box if you would like to display the password that was entered for verification.

Password Expiry This option helps to enable password expiry for WLANs with WPA-PSK. By default,
the password expiry is disabled.

Expiry (Days) Set Value for expiry in days. Range: 1 - 180 days. By default, 180 days will be set as
expiry value. This field is displayed when you enable the Password Expiry toggle
switch.
Once the expiry value is exceeded, the WLAN will be disabled. If required, re-enable
the WLAN and set the expiry value.

Security Type-WPA2 Enterprise


This option stands for Wi-Fi Protected Access 2, with a local authentication server or a RADIUS server. When
you choose this option, you will see the following fields:

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


58
Wireless Settings
Configuring the WLAN Security

Authentication You can choose External Radius or AP. The default option is External Radius.
Server
• To have a local authentication method, choose AP in the Authentication Server
drop-down list. This option is a Local EAP authentication method that allows
users and wireless clients to be authenticated locally. The Primary AP serves as
the authentication server and the local user database, which removes dependency
on an external authentication server.
You will see a note specifying whether the Radius Server is configured for
Authentication and Accounting. Radius Server can be configured by navigating
to Admin Accounts > RADIUS in Expert view.
• To have a RADIUS server-based authentication method, choose External Radius
in the Authentication Server drop-down list. RADIUS is a client/server protocol
that enables communication with a central server to authenticate users and authorize
their access to the WLAN.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


59
Wireless Settings
Configuring the WLAN Security

Radius Profiling The Primary AP acts as the collector of the information and sends the RADIUS server
with the required data in an optimal form. Clients on the WLANS will be profiled as
soon as profiling is enabled.
• Profiling can be based on the following:

• Role defining the user type or the user group to which the user belongs.
• Device type, such as a Windows machine, Smart Phone, iPad, iPhone and Android
device.
• Username / password.
• Location based on the AP group to which the client is connected.
• Time of the day based on what time of the day the client is allowed on the network.

BYOD Cisco provides a comprehensive Bring Your Own Device (BYOD) solution
architecture, combining elements across the network for a unified approach to secure
device access. It is enabled when a user wants to connect their personal devices in a
more secure manner.

Security Type-Central Web Auth


It is a method of authentication in which the host’s Web browser is redirected to a RADIUS server. The
RADIUS server provides a web portal where the user can enter a username and password. If these credentials
are validated by the RADIUS server, the user is authenticated and is allowed access to the network. When
you choose this option, you will see the following fields:
Radius Profiling Refer to Radius Profiling in the table above for more information.

RADIUS Server RADIUS is a client/server protocol that enables communication with a central server
to authenticate users and authorize their access to the WLAN. To have a RADIUS
server-based authentication method, choose External Radius in the Authentication
Server drop-down list.
This section appears in UI, when you do the following:
• Set the WLAN security to WPA2 Enterprise with Authentication Server and
choose External Radius.
• Set the WLAN security to Central Web Auth.
• Set the WLAN security to WPA2/WPA3 Personal, and enable the MAC filtering
toggle button.

The following fields are visible for the Security Types WPA2 Enterprise and Central Web Auth.
Radius Server Provided for external authentication when you connect to a WLAN.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


60
Wireless Settings
Configuring the WLAN Security

Authentication This feature helps store the client information essential for authentication locally in
Caching the cache on the CBW. This happens when the authentication with the RADIUS Server
is successful. If the connectivity to the RADIUS server is lost, the information stored
in the cache is used for authenticating the clients. You can also configure cache when
the RADIUS Server is up and running. If the client details are not available locally,
the request for authentication is sent through the RADIUS Server disabled.
This is field is not visible for the security type Central Web Auth.
When you enable this option, the following fields are displayed.
• User Cache Timeout: Specifies the time period at which the authenticated
credential in the cache expires.
If the client's cache that expires is associated to the Primary AP, then it would get
de-authenticated
Any change in cache timeout value on the WLAN will affect only new client
associations and the existing clients won’t get impacted.
• User Cache Reuse: Use the credentials cache information before cache timeout.
By default this is disabled.
Local cache client entries are deleted in the following scenarios:
• The CBW Primary AP reboots
• The cache time expires
• The security of the WLAN changes
• A WLAN is deleted
• Authentication Caching is disabled on the WLAN

Add RADIUS Click this tab to add the following RADIUS Authentication Server details:
Authentication
• Server IP Address: Select the IP address of the RADIUS server from the drop
Server
down list.
• State: Shows the state of the RADIUS server.
• Port Number: Provided for communication with the RADIUS server. By default
it is 1812.

To map RADIUS server to WLAN, first configure the RADIUS server details under
Management > Admin Accounts > RADIUS in Expert View.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


61
Wireless Settings
Configuring VLAN and Firewall

Add RADIUS Select this tab to add the following RADIUS Accounting Server details:
Accounting Sever
• Server IP Address: Select the IP address of the RADIUS server from the drop
down list.
• State: Displays if the accounting server is in an enabled or disabled state.
• Port Number: It is used for communication with the RADIUS server. By default,
the value is 1813.

You can only add/delete the Radius server entries.


To map RADIUS server to WLAN, first configure the RADIUS server details under
Management > Admin Accounts > RADIUS in Expert View.

Configuring VLAN and Firewall


Navigate to Wireless Settings > WLANs > Add new WLAN > VLAN & Firewall.
Specify the following parameters:
1. Client IP Management—To assign an IP address to the client through external DHCP server.
2. Peer to Peer Block—It disables communication between clients that are connected in the same WLAN.
By default this is disabled.
For example, when you connect two clients (say A and B) on the same WLAN with Peer to Peer Blocking
enabled, then the client (A) will not be able to reach client (B) and vice versa.
3. Use VLAN Tagging—From the drop-down list, choose Yes to enable VLAN tagging of packets. By
default this field is set to No.
If you choose to enable VLAN Tagging, choose the VLAN ID in the VLAN ID field. By default, the
Native VLAN ID set to 1 will be mapped.
You can configure Native VLAN ID, under Wireless Settings > Access Points > Global AP configuration
> VLAN Tagging.
4. Enable Firewall—To enable a firewall for the WLAN based on Access Control Lists (ACLs), choose
Yes from the drop-down list. By default, this field is set to No. To create an ACL, refer to Configuring
Access Control Lists (ACL), on page 133 later in this section. When you enable the Enable Firewall
option, the following fields are displayed:
a. In the WLAN Post-auth ACL section, choose IPv4/IPv6 ACLs in the ACL Name(IPv4) / ACL
Name(IPv6) fields. These ACL rules are applied to the clients connected to the WLAN after successful
authentication.
b. In the VLAN ACL section, choose IPv4/IPv6 ACLs in the ACL Name(IPv4) and specify the ACL
Direction. The ingress (inbound) and egress (outbound) ACL specifies the types of network traffic
that are allowed in or out of the device in the network. Choose Both to allow ingres and egress traffic.

Configuring Traffic Shaping


Navigate to Wireless Settings > WLANs > Add new WLAN > Traffic Shaping. Configure the following
parameters:

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


62
Wireless Settings
Configuring Traffic Shaping

• Quality of service (QoS) —Qos refers to the capability of a network to provide better service to selected
network traffic over various technologies. The primary goal of QoS is to provide priority, including
dedicated bandwidth, controlled jitter and latency (required by some real-time and interactive traffic),
and improved loss characteristics.
The CBW Primary AP supports the following four QoS levels. Under the QoS tab, from the QoS
drop-down list, choose one of the following QoS levels:
• Platinum (Voice)—Ensures a high quality of service for voice over wireless.
• Gold (Video)—Supports high-quality video applications.
• Silver (Best Effort)—Supports normal bandwidth for clients.
• Bronze (Background)—Provides the lowest bandwidth for guest services.

• Specify the Rate limits per client and Rate limits per BSSID (in Kbps) using the following criteria:
• Average downstream bandwidth limit—Define the average data rate for downstream TCP traffic
by entering the rate in Kbps in the Average Data Rate text boxes.
• Average real-time downstream bandwidth limit—Define the average real-time rate for downstream
UDP traffic by entering the rate in Kbps in the Average Real-Time Rate text boxes.
• Average upstream bandwidth limit—Define the average data rate for upstream TCP traffic by
entering the rate in Kbps in the Average Data Rate text boxes.
• Average real-time upstream bandwidth limit—Define the average real-time rate for upstream
UDP traffic by entering the rate in Kbps in the Average Real-Time Rate text boxes.

Note Average Data Rate is used to measure TCP traffic while Average Real-time rate
is used for UDP traffic. They are measured in kbps for all the entries. The values
for Average Data Rate and Average Real-time rate can be different because they
are applied to different upper layer protocols such as TCP and UDP. These
different values for the rates do not impact the bandwidth.

• Fastlane—Wireless application traffic in real-time environments often needs to be prioritized by its type.
For example, due to real time application constraints, voice over Wi-Fi traffic needs a higher priority
than Safari web traffic.
Various standards exist to help network devices agree on how different types of traffic are marked to
make sure they are prioritized. QoS Fastlane greatly simplifies this agreement process so that network
congestion is minimized and time sensitive traffic (like voice or video) is delivered on time.
On enabling the fastlane, the QoS is set to platinum such that voice traffic has higher priority than any
other traffic.
• Application Visibility Control classifies applications using the Network-Based Application Recognition
(NBAR2) engine, and provides application-level visibility in wireless networks. Application Visibility
enables the Primary AP to detect and recognize more than 1000 applications and perform real-time
analysis, and monitor network congestion and network link usage. This feature contributes to the
Applications By Usage statistic in the Monitoring > Network Summary.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


63
Wireless Settings
Configuring Advanced Options

To enable Application Visibility Control, choose Enabled from the Application Visibility drop-down
list. Otherwise, choose Disabled which is the default option.
• AVC Profile—Displays the WLAN name.
• Add Rule—To allow/deny specific applications when the clients get connected to the specific WLAN.
• Application—List the applications that can be allowed/denied.
• Action— Choose Mark to allow the application process with priority, Drop to deny the application
and Rate limit to limit the rate (includes the Average Rate and Burst Rate) at which the application
runs.

Configuring Advanced Options

Note Switch to Expert View in the CBW Web-UI by clicking the bi-directional arrows toggle button on the top-right
corner of the window.

Navigate to Wireless Settings > WLANs > Add new WLAN > Advanced:
Allow AAA AAA Override option of a WLAN enables you to configure the WLAN for identity
Override networking. It enables you to apply VLAN, Access Control Lists (ACLs) and Quality
of Service (QoS) to individual WLANs on the returned RADIUS attributes from the
AAA server.

PMF This is specific to 802.11w protocol. The 802.11w protocol applies only to a set of
robust management frames that are protected by the Protected Management Frames
(PMF) service. These include Disassociation, De-authentication, and Robust Action
frames.
Note The PMF values are:
• Optional - For WPA2+WPA3 WLAN by default.
• Required - For WPA3 only WLAN by default.

Exclusion List When exclusion list is enabled for a WLAN, clients trying to associate with the
corresponding WLAN are put in a blocked list if they experience authentication failure
five times consecutively. The timeout for the clients to be in block list is 180 seconds.
By default, the Exclusion list is enabled for a WLAN.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


64
Wireless Settings
Configuring Advanced Options

SAE Anti-clog An anti-clogging token is a mechanism to protect entities from Denial of Service (DoS)
Threshold attack. The anti-clogging token is bound to the MAC address of the station (STA). The
length of the token cannot be more than 256 bytes.
You can configure anti-clogging threshold in terms of resource percentage. On hitting
the threshold for the resource, the primary AP starts to reject authentication commit
requests that come with anti-clogging token. Subsequent authentication commit requests
from the client must have the same token. The Primary AP processes only the
authentication commit requests that have valid anti-clogging tokens.
The valid range for the block limit is 0 to 90. If the anti-clogging threshold limit is 90,
the anti-clogging is enforced by the primary AP when the number of clients reach 90
percent of the supported number.
The threshold limit is set to 50 by default.

802.11r 802.11r enabled WLAN provides faster roaming for wireless client devices. It is desired
that 11r capable devices will be able to join a WLAN with 11r enabled for better
roaming experience. However, if 11r is enabled on a WLAN, the legacy devices (non-11r
clients) will not be able to join the WLAN.
• This feature help clients roam better by telling them when to roam and providing
them with information about neighboring APs so that no time is wasted scanning
when roaming is needed.
• This option is available only for WPA2/WPA3 Personal WLAN with the WPA2
toggle button alone enabled, or WPA2 Enterprise enabled WLANs. By default,
this option is Disabled.
The 802.11r and WPA3 are not compatible with each other.

Over The DS Click this button to enable or disable the fast roaming facility. By default, this is
Disabled.

Reassociation Enter the number of seconds after which the re-association attempt of a client to an AP
Timeout(secs) should time out. The valid range is 1 to 100 seconds. The default is 20 seconds.

DTIM Period Depending on the timing set for your AP, it “buffers” broadcast and multicast data and
802.11a/n (beacon let your mobile devices or clients know when to “wake up” to receive those data.
intervals)
DTIM Period Depending on the timing set for your AP, it “buffers” broadcast and multicast data and
802.11b/g/n let your mobile devices or clients know when to “wake up” to receive those data.
(beacon intervals)
Client Band Select Band selection enables client radios that are capable of dual-band (2.4 and 5GHz)
operation to move to a less congested band.

Client Load This feature can be used in order to load-balance clients across access points. Enabling
Balancing this will improve client distribution on the wireless network.
You cannot configure the number of clients per AP.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


65
Wireless Settings
Configuring Scheduling

Umbrella For details on these options refer to Configuring Cisco Umbrella on Primary AP, on
ProfileUmbrella page 114.
ModeUmbrella
DHC Override
mDNSmDNS For details on these options refer to Mapping mDNS Profile to WLAN, on page 111.
Profile
Multicast IP Enter the Multicast IP group address. By default, the field will be null.

Multicast Direct Enable the Multicast Direct toggle button to enhance the video streaming for wireless
clients by converting multicast packets to unicast at CBW AP. By default, this is
Disabled.
To enable this toggle, change the QoS value under the Traffic Shaping section to
Gold or Platinum.
For details, see Media Steam, on page 105.

802.11ax BSS Configuration


Down Link This toggle is used to enable/disable downlink (AP to Wireless Client) multi-user,
MU-MIMO multiple input, multiple output support for the WLAN. By default, this is Enabled.

Up Link This toggle is used to enable/disable uplink (Wireless Client to AP) multi-user, multiple
MU-MIMO input, multiple output support for the WLAN. By default, this is Enabled.

Down Link This toggle is used to enable/disable downlink (AP to Wireless Client) orthogonal
OFDMA frequency-division multiple access support for the WLAN. By default, this is Enabled.

Up Link OFDMA This toggle is used to enable/disable uplink (Wireless Client to AP) orthogonal
frequency-division multiple access support for the WLAN. By default, this is Enabled.

Configuring Scheduling
CBW supports an option to schedule availability for every WLAN. By default, all WLANs are available 24/7
when they are initially created. To schedule the WLAN availability, do the following:
1. Navigate to Wireless Settings > WLANs > Add new WLAN > Scheduling.
2. Schedule WLAN—You can choose one of the following options from the drop-down.
• Enable—This enables scheduling for a chosen WLAN.
• Disable—This disables scheduling for all the WLANs except the WLAN that is enabled.
• No Schedule—Scheduling is not applied to the WLAN.

Note You can also schedule the day/time for the WLAN to broadcast by enabling the corresponding Day and
mention the start and end time using the slider.
Enable the option Apply to all Weekdays to make changes for all the weekdays. By default, it is disabled.

3. Click Apply to save the changes.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


66
Wireless Settings
Enabling and Disabling WLANs

Enabling and Disabling WLANs


If for some reason you need to disable your WLAN or re-enable it, follow the steps below.

Step 1 Navigate to Wireless Settings > WLANs.

Step 2 In the WLANs window, click the icon next to the WLAN you want to enable or disable.
Step 3 In the Edit WLAN window, under General select Enabled or Disabled.
Step 4 Click Apply.
Note Clicking Apply after creating a new WLAN or editing an existing one always enables the WLAN irrespective
of whether it was previously enabled or disabled.

Editing and Deleting WLANs

Step 1 Choose Wireless Settings > WLANs.


Step 2 In the table of WLANs listed, perform one of the following actions as required:

• Click the next to the WLAN you want to modify.

• Click the next to the WLAN you want to delete.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


67
Wireless Settings
Viewing and Managing WLAN Users

Viewing and Managing WLAN Users


You can view and manage WLAN users only for WPA2 Enterprise and Guest WLAN with Local User
Accounts as access types. To use your Cisco Business Wireless network, a wireless client should connect to
a WLAN in the network. To connect to a WLAN, the wireless client will have to use the user credentials set
for that WLAN. If this WLAN uses WPA2-Personal as a Security Policy, then the user must provide the
appropriate WPA2-PSK set for that WLAN on the Primary AP. If the Security Policy is set to
WPA2-Enterprise/Local User Account, the user must provide a valid user identity and the corresponding
password
In the WLAN Users window, you can set up different users and their respective user credentials for the
different WLANs in the CBW AP wireless network. These are local users authenticated by the Primary AP
using WPA2-PSK.
To view and manage WLAN users, choose Wireless Settings > WLAN Users.
The WLAN Users window is displayed along with the total number of WLAN users configured on the Primary
AP. It also lists all the WLAN users in the network along with the following details:
• User name—Name of the WLAN user.
• Guest user— Indicates a guest user account if the toggle button is enabled. This user account is provided
with a limited validity of 86400 seconds (or 24 hours) from the time of its creation.
• WLAN Profile—The WLANs that the user can connect to.
• Password—The password to connect to a WLAN.
• Description—Additional details or comments about the user.

Adding a WLAN User


To add a WLAN user, click Add WLAN User and specify the following details:
User name Specify a name for the WLAN user account.

Guest user Enable the slider button if this is meant to be a guest WLAN user account. You can
also specify the validity of this account from the time of its creation, in seconds, in the
Lifetime field. The default value is 86400 seconds (that is, 24 hours). You can specify
a lifetime value from 60 to 31536000 seconds (that is, 1 minute to 1 year).

WLAN Profile Select the WLAN that this user can connect to. From the drop-down list, choose a
particular WLAN, or choose Any WLAN to apply this account for all WLANs set up
on the Primary AP.
This drop-down list is populated with the WLANs which have been configured under
Wireless Settings > WLANs.
For information on adding WLANs, see Adding and Modifying WLANs, on page 52.

Password The password to be used when connecting to a WLAN.

Description Add any additional details or comments for the user.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


68
Wireless Settings
Blocking and Unblocking Clients

Editing a WLAN User

To edit a WLAN user, click the next to the WLAN user whose details you want to modify and make
the necessary changes.

Deleting a WLAN User

To delete a WLAN user, click the next to the WLAN user you want to delete and click Ok in the
confirmation dialog box.

Blocking and Unblocking Clients


1. Navigate to Wireless Settings > WLAN Users > Local MAC Address.
2. Click Add MAC Address.
3. Enter the client MAC address.
4. In the Type option, select the checkbox next to Allowlist or Blocklist to allow or deny this client joining
your network.
• Select Blocklist to deny the client from joining your network.

Note Blocklisting a client or Mesh Extender that is currently joined to the network will
not take effect until it attempts to rejoin the network (after disconnect or reboot).

• Choose Allowlist to add the client. The MAC Filtering should be enabled on the WLAN to add
your client MAC to the Local MAC address. This helps the client to join the network.

5. Click Apply.

You can also import/export the Local MAC address list.

Social Login for Guest Users


This feature provides social login privileges for guest users that are connected using Google or Facebook
accounts. To enable this option, follow the steps below on your AP.
1. Navigate to Wireless Settings > WLANs > Add new WLAN.
2. Under the General tab, fill in the basic information for your WLAN. For details, see Adding and Modifying
WLANs, on page 52.
3. Click the WLAN Security tab and set up the following details:
• Select the Guest Network toggle button to turn it on.
• From the Access Type drop-down menu select Social Login.
• Enable Facebook or Google, or both.
• If the Facebook toggle alone is enabled, guest users are authenticated using Facebook accounts.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


69
Wireless Settings
Personal PSK for Clients

• If the Google toggle alone is enabled, guest users are authenticated using Google accounts.
• If both toggles are enabled, guest users are authenticated using Facebook or Google accounts.
By default, both toggles are enabled.

4. Click Apply to save the configuration.


5. When the new WLAN is created with the access type Social Login, the Enable_Social_Login Pre-auth
ACL is automatically mapped to the WLAN.

Note You can also add and edit your URLs by navigating to Enable_Social_Login in Advanced > Security
settings.

The Guest WLAN with an enabled Social login access type will be created. Once you connect to this guest
WLAN you will be redirected to the default login page where you will find the login buttons for Google, or
Facebook, or both depending on the toggle buttons enabled. Log in using the respective account and obtain
the Internet access.

Personal PSK for Clients


This feature provides the flexibility of configuring a different PSK passphrase for clients connecting to the
same WPA2 Personal WLAN with WPA2 policy enabled. CBW AP uses an AAA server to authenticate the
client.

Note This feature is not supported for WPA3 only WLANs.

To enable this feature, switch to Expert View and configure the following on the Primary AP:

Step 1 Navigate to Wireless Settings > WLANs > Add new WLAN.
Step 2 Under the General tab, fill in the basic information for your WLAN. For more information see Adding and Modifying
WLANs, on page 52.
Step 3 Click the WLAN Security tab and specify the following details:
a. Enable MAC Filtering toggle button.
b. Under the Security Type drop-down list, select WPA2/WPA3 Personal.
c. Click the WPA2 toggle button to turn it on.
d. Select the Passphrase Format as either HEX or ASCII.
e. Enter the Passphrase.
f. Confirm the Passphrase. For more information see Adding and Modifying WLANs, on page 52.

Step 4 Under the Radius Server tab, map the radius server detail using the following steps.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


70
Wireless Settings
Managing Associated Access Points

a) Click Add RADIUS Authentication Server.


b) Click Add RADIUS Accounting Server .
c) Select the Radius Server IP address from the drop-down list.
d) Click Apply.
After a successful MAC authentication, RADIUS Server will display the following Cisco AVPair attributes:
• psk-mode – This contains the format of the Passphrase, it could be either ASCII, HEX, asciiEnc, or hexEnc.
• psk – This contains the Passphrase configured for the client on the RADIUS Server

Note The psk value could be a simple ASCII or HEX value or encrypted bytes in case of asciiEnc orhexEnc. The
algorithm used for encryption or decryption is as per RFC2865 (user-password section – 16 bytes authenticator
followed by encrypted key).
To configure radius server, navigate to Management > Admin Accounts > Radius (Expert View). For details,
refer to Managing TACACS+ and RADIUS Servers, on page 92

Step 5 Click the Authentication Caching toggle button.


a) Enter the User Cache Timeout in minutes
b) Enter theUser Cache Reuse if required.
By default, the User Cache Reuse is disabled. For more information see RADIUS Server table in Configuring the WLAN
Security, on page 54.
If Authentication caching is enabled, the PSK key is stored in the local cache along with the MAC Address and is used
for subsequent authentications. The CBW AP first checks if any local DB is available for authenticating the client otherwise
the request will be sent to Radius server for Authentication.
View the Auth cached clients at Management > Admin Accounts > Auth Cached Users (Expert View). For more
information see Viewing Auth Cached Users, on page 95

Step 6 Under the Advancedtab, click the AAA Override toggle button.
Step 7 Click Apply to save the WLAN updates.
Note • Devices with MAC addresses configured on Radius server will be able to connect to WLAN only with
PSK passphrase configured on Radius server.
• Devices with MAC addresses configured on Radius server will not be able to connect to WLAN with PSK
configured on WLAN.
• Devices with no MAC addresses configured on Radius server will be able to connect to WLAN with PSK
configured on WLAN only. Navigate to Wireless Settings > WLAN Users > Local MAC Addresses
and add the Client MAC in the Allowlist field. For more information see Blocking and Unblocking Clients,
on page 69.

Managing Associated Access Points


This section describes how to manage an assign roles to the AP in your network.
Navigate to Wireless Settings > Access Points.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


71
Wireless Settings
Managing Associated Access Points

In the Access Points Administration window, the number of APs associated with the CBW is displayed at
the top of the window, along with the following details:

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


72
Wireless Settings
Global AP Configuration

Manage The following icons indicate whether the AP is acting as a Primary AP or Primary
Capable AP or Mesh Extender.
Figure 1: Primary AP

Figure 2: Mesh Extender

Figure 3: Subordinate AP

Type Specifies if the AP is Primary Capable or a Mesh Extender.

Location The physical location of the AP.

Name The assigned name of the AP.

IP Address IP address of the AP.

AP MAC The MAC address of the AP.

Up Time Duration of how long the AP has been powered up.

AP Model The model number of the AP.

Note When an AP joins an AP group; or the RF profile of the AP group is changed, the AP rejoins the Primary AP.
The AP will receive new configuration specific to the new AP group or RF profile.

Global AP Configuration
This allows you to configure a Native VLAN ID.

Step 1 Navigate to Wireless Settings > Access Points.


Step 2 Click Global AP Configuration and configure the Native VLAN ID under the VLAN Tagging tab.
Step 3 Click Apply.

Administering Access Points


This section describes how to manage and define the APs in your network.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


73
Wireless Settings
Administering Access Points

1. Navigate to Wireless Settings > Access Points.

2. In the Access Points window, click the icon next to the AP you want to manage.

Note You can only administer those APs that are associated to the Primary AP.

General Tab

1. In the Edit, under the General tab, you can edit the following AP parameters:
Make me Primary This is available only for subordinate APs that are capable of participating in the
AP Primary Election process. Click this button, to make it the Primary AP.

IP Configuration Choose Obtain from DHCP to let the IP address of the AP be assigned by a DHCP
server on the network.
Choose to have a Static IP address. If you choose to have a static IP address, then
you can edit the IP Address, Subnet Mask, and Gateway fields.

AP Name Edit the name of the AP. This is a free text field.

Location Edit a location for the AP. This is a free text field.

Set as Preferred Select this to make the AP the preferred Primary.


Primary
Note Setting as Preferred Primary will not change the current network status.
In other words, it will not force the AP to take over as Primary, but it
will take effect next time the network reboots.

The following parameters are also displayed under the General tab, but can not be edited.
Operating Mode Displays the operating Mode of the AP.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


74
Wireless Settings
Administering Access Points

AP MAC address Displays the AP MAC address.

AP Model Displays the AP Model number.

IP Address IP Address of the Access Point.


This field is non-editable only if Obtain from DHCP has been selected.

Subnet Mask Subnet mask address.


This field is non-editable only if Obtain from DHCP has been selected.

Gateway Gateway address.


This field is non-editable only if Obtain from DHCP has been selected.

Primary Tab

For the Primary AP, you can manually edit the following parameters under the Primary tab.
Primary AP Name You can edit the Primary AP Name set during the initial configuration using the Setup
Wizard.

IP configuration You can configure either Static IP or obtain from DHCP.

IP Address This IP address can be used in the Login URL to access the Primary AP's web interface.
The URL is in the format http://<ip addr> or https://<ip addr>. If you change this
IP address, the login URL also changes.

Subnet Mask Subnet mask of the network.


IP Address, Subnet Mask and Gateway fields are editable only if Static IP Address
is selected.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


75
Wireless Settings
Administering Access Points

VRID Virtual Router Identifier, is a unique number used to identify a virtual router.
By default, the value of VRID is 1 and the configurable range is between 1-255. This
option is available only in Expert View.
Change the VRID only if a VRID conflict is detected in the network. To check if there
are any VRID conflicts, go to Advanced > Logging. In the Logs window, the following
message will be logged in Errors (3) level: "%CNFGR-3-VRRP_CONFLICT_DETECTED:
cnfgr.c:4856 VRRP group conflict detected with VRID <vrid number>!
Configure new VRID value under Wireless Settings > Access Points > Edit
AP > Primary AP in Expert View"

Country Code Select the country for your Primary AP. It is not advisable to change the country code
unless you have not configured the correct country in the initial setup wizard.
Changing a country code turns the radio down until the Primary AP is rebooted.

Radio 1 and Radio 2 Tabs

You can set the following parameters under the Radio 1 and Radio 2 tabs.

Note The Radio 1 tab corresponds to the 2.4GHz (802.11 b/g/n/ax) radio on all APs. The Radio 2 tab corresponds
to only the 5GHz (802.11 a/n/ac/ax) radio on all APs.
The radio tab name also indicates the operational radio band within brackets.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


76
Wireless Settings
Administering Access Points

Table 5: Radio 1 (2.4GHz)

2.4 GHz Channel Enable or Disable the corresponding radio on the AP.
For 2.4GHz radio, you can set this to Automatic, or set a value from 1 to 11.
Selecting Automatic enables Dynamic Channel Assignment. This means that
channels are dynamically assigned to each AP, under the control of the Primary AP.
This prevents neighboring APs from broadcasting over the same channel and prevents
interference and other communication problems. For the 2.4GHz radio, 11 channels
are offered in the U.S. and up to 14 in other parts of the world. However, only 1-6-11
can be considered non-overlapping if they are used by neighboring APs.
Assigning a specific value statically assigns a channel to that AP.

The channel width for 2.4GHz can only be 20MHz.

Table 6: Radio 2 (5GHz)

5 GHz Channel For 5GHz radio, you can set this to Automatic, 36, 40, 44, 48, 52, 56, 60, 64, 100,
104, 108, 112, 116, 132, 136, 140, 149, 153, 157, 161, or 165. Up to 23
non-overlapping channels are offered.
Assigning a specific value statically assigns a channel to that AP. DFS channels are
indicated with "(DFS)" tag along with the channel number in the drop-down list.
For Mesh backhaul Radio, the Automatic option is not supported in Mesh mode.

5 GHz Channel The channel width for 5GHz can be set to Automatic, or to 20, 40, or 80MHz, if
Width channel bonding is used. By default, it is set to 80MHz.
Channel bonding groups the channels by 2 or 4 for a single radio stream. This
increases the speed and the throughput. Because the number of channels is insufficient
in 2.4 GHz, channel bonding cannot be used to enable multiple non-overlapping
channels.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


77
Wireless Settings
Administering Access Points

Table 7: Radio 1 and Radio 2

Transmit Power You can set it to Automatic, or provide a value ranging from 100, 75, 50, 25, 12 (in
terms of percentages).
By default, it is set to 100% (maximum power).
Selecting Automatic adjusts the radio transmitter output power based on the varying
signal level at the receiver. This allows the transmitter to operate at less than
maximum power for most of the time; when fading conditions occur, transmit power
will be increased as required until the maximum is reached.
For Mesh backhaul Radio, the Automatic option is not supported in Mesh mode.
Nations apply their own RF emission regulations to the allowable channels, allowed
users and maximum power levels within these frequency ranges. As per the regulatory
rules, the DFS channels (52 – 144) have low TX power levels compared to non-DFS
channels (36-48, 149-165).
Please choose the non DFS channel for maximizing the coverage.
In Mesh Mode navigate to: Wireless Settings > Access Points and click the edit
icon at the left end of the row, then select Radio 2 and Channel.
In Non-mesh mode: (in Expert view) navigate to: Advanced > RF Optimization >
Select DCA channels > 5Ghz then unselect the DFS channel numbers.

Interferer Detection Enable this option to identify the non Wi-Fi devices.
Ensure that you enable the Interferer detection globally under Advanced > RF
Optimization (in Expert View).

BSS Color This drop-down is used to set BSS Color Configuration as Global or Custom. By
Configuration default, this is Global.
• Global- Global BSS Color Configuration set in Advanced > RF Optimization
(in Expert View) will be considered
• Custom - Selecting Custom will show up as "BSS Color Status".

BSS Color Status The toggle is used to enable/disable per AP Radio's BSS Color Status. By default,
this is disabled.
The "BSS Color" text box will appear when the BSS Color Status toggle is enabled.

BSS Color The text box is used to set the Custom BSS Color value for the AP Radio and it can
be assigned a value from 1 to 63. By default, the value is 1.

Note The channels in both the radios will change according to the country configured in the Primary AP.

When you are done with all your changes click Apply to save and exit.

Note For details on the Mesh tab, see Mesh Network Components, on page 83.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


78
Wireless Settings
Access Point Groups

Access Point Groups


By creating Access Point Groups you can control which SSIDs can be pushed to each AP group. Each access
point advertises the enabled WLANs that belong to its access point group. The access point does not advertise
disabled WLANs in its access point group or WLANs that belong to another group.
By default, there is a AP Group called default-group created on your Primary AP and all the WLANs are
mapped to this default group. All the access points are also mapped to this default-group. This means, WLAN
(ID 1-16) will be available in any of the APs belonging to the default group.

Note Any AP or Mesh extender added to the network is mapped to the default-group. If required, you can create
your own AP group and map the AP to the same.
For Mesh deployments, ensure both the Root AP and Mesh AP are mapped to the same Access Point Group.

To configure this, do the following:


1. Switch to Expert View by clicking the bi-directional icon on the top right of the Primary AP UI.
2. Navigate to Wireless Settings > Access Points Groups > Add New Group.
3. In the General tab, provide an AP Group Name and a description for your reference.
4. In the WLANs tab, select the WLAN that you want to push to the group.
5. In the Access Points tab, push the access point to the group that you created such that the WLANs is
advertised in only those particular APs.
6. Click Apply.

Setting a Login Page for WLAN Guest Users


Follow these steps to provide guest users with access to your network.

Step 1 Set up a new WLAN or decide on an existing WLAN, to which you will provide access for guest users.
You can specifically set up a WLAN exclusively for guest access. This is done by setting the WLAN Security as Guest
for that WLAN. For more information, see Adding and Modifying WLANs, on page 52.

Step 2 Set up a guest user account. Go to Wireless Settings > WLAN Users, and set up an account with the Guest User check
box selected. For more information, see Viewing and Managing WLAN Users, on page 68.
You can provide the Guest Users of your WLAN with one of the following login page options:
• A simple minimalist default login page with a few modification options. To configure this, see Setting the Default
Login Page, on page 80.
• A customized login page uploaded into the Primary AP. To configure this, see Setting a Customized Login Page,
on page 80.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


79
Wireless Settings
Setting the Default Login Page

Setting the Default Login Page


Right out of the box, the default login page contains a Cisco logo and Cisco-specific text. You can choose to
modify this default login page as described here.

Step 1 Navigate to Wireless Settings > Guest WLAN.


Step 2 In the Guest WLANs page, the number of Guest WLANs currently set up in the network is displayed at the top of the
page.
Step 3 Choose the Internal (Default) login page in the Page Type drop-down list.
Step 4 Set the following parameters to modify the default internal login page:
• Display Cisco Logo—This field is set to Yes by default. To hide the Cisco logo that appears at the top-right corner
of the default window, choose No. However, you do not have an option to display any other logo.
Navigate to Apply > Previewto preview the changes.
• Redirect URL After Login— To have guest users redirected to a particular URL (such as the URL for your company)
after login, enter the URL in this field. You can enter up to 254 characters.
• Page Headline—The default headline is Welcome to the Cisco Business Wireless. To create your own headline on
the login page, enter the desired text in this field. You can enter up to 127 characters.
• Page Message— The default message is displayed: Cisco is pleased to provide the Wireless LAN infrastructure for
your network. Please login and put your unified wireless solution to work.. To create your own message on the login
page, enter the desired text in this field, You can enter up to 2047 characters.

Step 5 Click Apply.

Setting a Customized Login Page


You can create a custom login page on a computer, compress the page and image files into a .TAR file, and
then upload it to the Primary AP. The upload is done via HTTP.

Note When you save the Primary AP's configuration, it does not include extra files or components, such as the web
authentication bundle, that you download and store on your Primary AP. So always manually save external
backup copies of such files.

Note Cisco TAC is not responsible for creating a custom web authentication bundle.

Before you begin


To create a custom login page on a computer make sure of the following:

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


80
Wireless Settings
Setting a Customized Login Page

• Name the login page login.html. The Primary AP prepares the web authentication URL based on
this name. If the server does not find this file after the web authentication bundle has been untarred, the
bundle is discarded, and an error message appears.
• The page should not contain more than 5 elements (including HTML, CSS, and Images). This is because
the internal Primary AP web server implements a DoS protection mechanism that limits each client to
open a maximum of 5 (five) concurrent TCP connections depending on the load. Some browsers may
try to open more than 5 TCP sessions at the same time if the page contains more elements and this may
result in the page loading slowly depending on how the browser handles the DoS protection.
• Include input text boxes for the username and the password.
• Extract and set the action URL in the page from the original URL.
• Include scripts to decode the return status code.
• All paths used in the main page (images, for example) are of relative type.
• No file names within the bundle are longer than 30 characters.

Compress the page and image files into a .TAR file. The maximum allowed size of the files in their
uncompressed state is 1 MB.
Cisco recommends that you use an application that complies with GNU standards to compress the.TAR file
(also referred to as the web authentication bundle.). If you load a web authentication bundle with a .TAR
compression application that is not GNU compliant, the Primary AP will not be able to extract the files in the
bundle.
The .TAR file enters the Primary AP’s file system as an untarred file.

Note If you have a complex customized web authentication bundle which does not comply with the aforementioned
prerequisites, then Cisco recommends that you host it on an external web server.

Step 1 Navigate to Wireless Settings > Guest WLAN.


The Guest WLANs page is displayed. The number of Guest WLANs currently set up in the network is displayed at the
top of the page.

Step 2 To upload a customized login page into the Primary AP, in the Page Type drop-down list, choose Customized.
Step 3 Click Upload and browse to upload the .TAR file of the customized web authentication bundle. While uploading the
.TAR file, the status of file upload is displayed on the same page.
Step 4 If you want the user to be directed to a particular URL (such as the URL for your company) after login, enter that URL
in the Redirect URL After Login text box. You can enter up to 254 characters.
Step 5 Click Apply.
Click Preview to view your customized web authentication login page.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


81
Wireless Settings
About Cisco Mesh

About Cisco Mesh


Cisco Mesh introduces a new paradigm of wireless internet access by providing high data rate service and
reliability. It is also a solution to reduce the complexity of wiring between each devices in a network. For a
stable network establishment, there must be a wireless interacting medium between each APs.
CBW indoor mesh brings these values to you:
• Not having to run Ethernet wiring to each AP.
• Network connectivity where wires cannot provide connectivity.
• Easy to deploy and provide flexibility in deployment.

This chapter summarizes the design details for deploying a Cisco Mesh Extender for indoor environments.
The indoor wireless access takes advantage of the growing popularity of inexpensive Wi-Fi clients, enabling
new service opportunities and applications that improve user productivity and responsiveness.

Adding a Mesh Extender


For details refer to Adding Mesh Extenders, on page 16.

Convert Non-Mesh to Mesh Deployment


For maintaining, the mesh state between the APs there must be a communication establishment between them
and this takes place through the backhaul radio (2.4GHz or 5GHz – user configurable). To configure the mesh
mode in the Primary AP, do the following:

Step 1 Navigate to Wireless Settings > Mesh.


Step 2 Enable the Mesh toggle button, and click Apply.
Step 3 The entire network will operate in the Mesh mode after the Primary AP reboots.
Step 4 Add the MAC address of the Mesh Extenders in the auth-list that you wish to join the network.
Note For details refer, Adding Mesh Extenders, on page 16.

For the wired access points (CBW150AX) the MAC address will be added automatically in the Local MAC Address
table, provided they exist in the same network.

Step 5 The automatic entry of the physical address of the wired AP can be verified by knowing its last few digits in the MAC
address.
For example, when a CBW150AX has joined the Primary AP, its MAC address will be displayed in the Local MAC
Address table with its corresponding description as (CBW150AX-0d6c). Here, 0d6c is the ending digits of its MAC
address F0:1D:2D:9E:0D:6C.

Step 6 Wait for few minutes and navigate to Wireless Settings>Access Points.
Step 7 Check if the Access Point has joined the Primary AP.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


82
Wireless Settings
Mesh Network Components

Mesh Network Components


Navigate to Wireless Settings > Access Points > Edit Access point. The following options are available
under the Mesh tab.
AP Role By default, the Primary/Primary Capable AP role is set to Root and the mesh extenders
role is set to Mesh. You can configure the AP Role for Primary Capable APs from
Root/Mesh to Mesh/Root. This option is configurable in Expert View. After changing
the AP Role, the Primary Capable AP will reload and join the Primary AP.
To check the AP role and type, navigate to Wireless Settings > Access Points.
If the Primary Capable AP role is changed from Root to Mesh, the type will be
displayed as Mesh Extender. The AP will join as a Wired Mesh Extender if a wired
uplink is present. If not present, the AP will join as Wireless Mesh Extender. In either
case, the functionality of Mesh Extender remains the same.
If the Primary Capable AP role is changed from Mesh to Root, the Type will be
displayed as Primary Capable.
• Only Primary Capable APs (CBW150AX) are allowed to change the AP role.
• Primary Capable APs that are operating with AP Role as Mesh, will not be
considered for Primary AP selection.

Bridge Type By default, it is set as indoor.

Bridge Group Bridge group names (BGNs) control the association of mesh access points. BGNs can
Name logically group radios to avoid two networks on the same channel from communicating
with each other. The setting is also useful if you have more than one Primary Capable
AP in your network in the same sector (area). Default BGN is set with first 10 character
of the configured SSID during initial setup wizard. This option is available in Expert
View.
Exercise caution when you configure a BGN on a live network. Always start a BGN
assignment from the farthest-most node (last node, bottom of mesh tree) and move up
toward the RAP to ensure that no mesh access points are dropped due to old and new
BGNs mixed within the same network.

Strict Matching When Strict Match BGN is enabled on the mesh AP, it will scan ten times to find the
BGN matched BGN parent. After ten scans, if the AP does not find the parent with matched
BGN, it will connect to the non-matched BGN and maintain the connection for 15
minutes. After 15 minutes, the AP will again scan ten times and this cycle continues.
The default BGN functionality remains the same when Strict Match BGN is enabled.
By default, it is disabled. This option is available in Expert View.

Backhaul Interface This displays the type of interface. It can be either 802.11a/n/ac if Mesh Backhaul Slot
is 5GHz and 802.11b/g, if Mesh Backhaul Slot is 2.4GHz.

Install Mapping on This option helps to broadcast the SSIDs in backhaul radio such that the client can join
Radio Backhaul the AP using the backhaul radio. By default it is Enabled. If you experience Mesh
performance or stability issues, you can disable this option to avoid wireless clients
joining the backhaul radio.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


83
Wireless Settings
Mesh Network Components

Mesh Backhaul The communication between each APs are carried over a particular radio and you can
Slot configure it in either 5GHz or 2.4GHz. By default, it is in 5GHz mode.
The Backhaul interface configuration done under Wireless Settings > Mesh > Mesh
Backhaul Slot is the global configuration. If you want to override it for selected Access
Points, you can change the Backhaul interface configuration by navigating to Wireless
Settings > Access Points (Edit) > Mesh > Mesh Backhaul Slot.

Preferred Parent This has to be computed from the Radio MAC of the Primary Capable AP which you
would like to set as preferred parent your Mesh AP. We need to add 11 in hex to last
two bytes of the Preferred Parent’s radio MAC. To obtain the Radio MAC of the
Primary Capable AP, go to Monitoring > Access Points, and the view the AP details
by selecting the AP you want. Note down the Radio MAC (xx:xx:xx:xx:xx:yy) and
compute the value to be set in Preferred Parent field. Refer the table below for sample
computation.
This field is present only in the Mesh Extender Mesh tab.

Before (yy) After adding (+11) (yy')


20 31

40 51

60 71

80 91

A0 B1

C0 D1

E0 F1

Ethernet Bridging Use this feature to access the Internet by connecting a wired client to the LAN ports
of the APs in the Mesh network. By default, it is Enabled.
A Primary Capable AP (CBW150AX) in Mesh mode with wireless backhaul connected
to a power injector supports Ethernet bridging.
1. Connect the AP output port of the Power injector to the primary capable AP in
mesh mode.
2. Connect the wired client to the other port in Power injector.
3. Check if you are able to access the Internet.
4. In the Mesh mode, the wired client connected to LAN ports will not be displayed
in the Primary AP UI.

Note The wired client connected to the Ethernet port of the Primary Capable AP
in Mesh mode with wireless backhaul will obtain the IP address in the AP
VLAN.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


84
Wireless Settings
Changing Mesh Parameters

Changing Mesh Parameters


Following are the several mesh configurations that are available in the Primary AP UI under Wireless Settings >
Mesh.

Backhaul Client Access


When Backhaul Client Access is enabled, it allows wireless client association over the backhaul radio. The
backhaul radio is a 5GHz radio for most of the Cisco Access Points. This means that a backhaul radio can
carry both backhaul and client traffic.
When Backhaul Client Access is disabled, only backhaul traffic is sent over the backhaul radio and client
association is over the second radio. By default, this option is Enabled.

Mesh Backhaul Radio Resource Management


The Radio Resource Management (RRM) software embedded in the Primary AP acts as a built-in RF engineer
to consistently provide real-time RF management of your wireless network. RRM enables the Primary AP to
continually monitor their associated lightweight access points for information on traffic load, interference,
noise, coverage and other nearby APs.
The RRM measurement in the mesh AP backhaul is enabled, if the wired Root AP has Ethernet uplink and
there is no Mesh Extender joined to it.

Mesh Backhaul Slot

Note The Backhaul interface configuration done under Wireless Settings > Mesh > Mesh Backhaul Slot is the
global configuration. If you want to override it for selected Access Points, you can change the Backhaul
interface configuration by navigating to Wireless Settings > Access Points > (Edit) > Mesh > Mesh Backhaul
Slot.

In certain countries, Mesh Network with 5GHz backhaul network is not allowed to use. Even in countries
which is permitted with 5GHz, customers may prefer to use 2.4GHz radio frequencies to achieve much larger
Mesh or Bridge distances.
When a Primary AP downlink backhaul is changed from 5GHz to 2.4GHz or from 2.4GHz to 5GHz, that
selection gets propagated from Primary AP to all the Subordinate APs and they will disconnect from the
previously configured channel to get reconnected to another channel. To do this, follow the instructions below:

Step 1 Navigate to Wireless Settings > Mesh > Mesh Backhaul Slot.
Step 2 Select the backhaul radio (either 5GHz or 2.4GHz) in the Primary AP to push the configuration to its subordinate APs
and have a better mesh coverage.
Note Only Primary Capable APs are configured with the backhaul frequency of 5GHz or 2.4GHz. Once the AP is
configured, the same frequency selection will propagate down the branch to all the Subordinate APs.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


85
Wireless Settings
VLAN Transparent

VLAN Transparent
This feature determines how a mesh access point handles VLAN tags for Ethernet bridged traffic. If VLAN
Transparent is enabled, then VLAN tags are not handled and packets are bridged as untagged packets.
To enable the VLAN Transparent, follow the steps below:

Step 1 Navigate to Wireless Settings > Mesh > Ethernet bridging.


Step 2 Enable VLAN Transparent.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


86
CHAPTER 6
Management
This chapter describes how to manage the network and upgrade the software. It contains the following topics:
• About Management Access Interface, on page 87
• Setting Up Management Access Interface, on page 87
• Limitation of Web Based Management Sessions, on page 88
• Managing User Priority Order, on page 88
• Managing Admin Accounts, on page 89
• Managing Guest Users using the Lobby Admin account, on page 91
• Managing TACACS+ and RADIUS Servers, on page 92
• Viewing Auth Cached Users, on page 95
• Setting Date and Time, on page 96
• Updating the CBW AP Software, on page 98

About Management Access Interface


The Management Access Interface is the default interface for in-band management of the Primary AP and
connectivity to enterprise services. It is also used for communication between the Primary AP and connected
access points (APs). The management interface has the consistently pingable in-band interface IP address on
the Primary AP. You can access the web interface of the Primary AP by entering the management interface
IP address of the Primary AP or using https://ciscobusiness.cisco in your browser's address bar.
For APs, the Primary AP requires one management interface to control all communications and one AP
manager interface to control all Primary AP-to-Access Point communications, regardless of the number of
ports.

Setting Up Management Access Interface


To enable or disable the different types of management access to the Primary AP, follow the steps below.

Step 1 Navigate to Management > Access.


The Access window is displayed. The number of enabled management types are displayed at the top of the window.

Step 2 You can enable or disable the following types of management access to the Primary AP, by toggling the switch buttons.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


87
Management
Limitation of Web Based Management Sessions

• HTTP Access—This enables the HTTP access mode, which allows you to access the Primary AP GUI using
http://<ip-address> or http://ciscobusiness.cisco through a web browser. By default, this is Enabled.

HTTP access mode is not a secure connection.


• HTTPs Access—A secure access for Primary AP UI, using https://<ip-address> or https://ciscobusiness.cisco.
By default, this is Enabled.
• HTTP-HTTPS Maximum Session—To set the maximum number of web sessions (HTTP/HTTPS). It can range
between 1-15. By default, you can support up to 15 sessions.
• WebAuth SecureWeb—Enable web based authentication for Guest WLAN in order to access or visit the Guest
authentication page over HTTPS.

Step 3 Click Apply to save your changes.


You can access the CBW AP UI via HTTP or HTTPS connection. By default, HTTP connection will be redirected to
HTTPS connection. If you enter ciscobusiness.cisco, you will be redirected to https://ciscobusiness.cisco which is a
secured connection.

HTTP Access HTTPS Access UI Accessibility


On On HTTP->HTTPS Redirect

Off On HTTPS only

On Off HTTP only

Off Off UI does not load

Limitation of Web Based Management Sessions


This feature helps to provision the number of sessions supported for the Primary AP UI. It is implemented
by limiting the number of UI management sessions based on the number of HTTP/HTTPS sessions configured
by the user.
1. Navigate to Management > Access.
2. In the HTTP-HTTPS Maximum Sessions field, set the number of allowed sessions between 1 and 15.
3. Click Apply to save the changes. Once configured, try to access the web sessions from the client using
management IP.

If the number of users exceeds the configured value, the session access is restricted and you will be prompted
for a reload of session.

Managing User Priority Order


When multiple databases are configured, it is important to configure the admin account user priority. To
configure the priority, follow the steps below.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


88
Management
Managing Admin Accounts

Step 1 Enable Expert View on the Primary AP UI. To switch to expert view, click the bidirectional arrow icon on the top right
of the home screen.
Step 2 Navigate to Management > Admin Accounts.
Step 3 Click Management User Priority Order.
By default, the local database is always queried first. If the username is not found, the Primary AP switches to the RADIUS
server if configured for RADIUS or to the TACACS+ server if configured for TACACS+. The default priority setting is
in the order of Local Admin Accounts and then RADIUS.

Step 4 To change the priority, between TACACS+ and RADIUS, click the drag icon and it move UP or DOWN.
Note Local Admin Accounts cannot be moved to Priority 3. It can be in the order of either 1 or 2 only.

Step 5 Click Apply to save the changes.

Managing Admin Accounts


You can manage the Cisco Business Wireless AP network through the Primary AP UI based on the privileges
assigned to your user account. This prevents unauthorized users from accessing or configuring the Primary
AP.
You can log in to the Primary AP UI using an admin account having one of the following access types:
Read/Write This administrative account has complete access to view and modify the Primary AP
configuration.

Read Only This limited access administrative account allows the user to only view the Primary
AP configuration. This user is restricted from making any changes to the configuration.

Lobby This restricted administrative account allows the user to only create and manage guest
Ambassador user accounts. The lobby ambassador can also print or email the guest user account
credentials.

For information about creating guest user accounts, see Creating a Guest User Account, on page 91.

Adding an Admin Account

Step 1 Navigate to Management > Admin Accounts.


The total count of admin accounts on the Primary AP is displayed at the top of this window while the table provides a
detailed listing of all the available admin accounts.

Step 2 Click Add New User to add a new admin user.


Step 3 In the Add/Edit Local admin account window, set the following parameters as required:
• Username—The login user name used by the administrative user. User name must be unique. You can enter up to
24 ASCII characters.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


89
Management
Editing an Admin Account

Note User names are case sensitive.

• Access—Set one of the following access privileges for the administrator:


• Read Only
• Read/Write
• Lobby Ambassador

• Password—The password is case sensitive and can contain 8-127 ASCII characters. When specifying a password,
ensure the following:
• The password must include a combination of lowercase letters, uppercase letters, digits, and special characters.
The special characters can be ~, !, @, #, $, %, ^, &, *.
• No character in the password can be repeated more than three times consecutively.
• The new password cannot be the same as the associated username or the username reversed.
• The password cannot be cisco, ocsic, or any variant obtained by changing the capitalization of the letters in the
word Cisco. In addition, you cannot substitute 1, I, or ! for i, 0 for o, or $ for s.

Step 4 Re-enter the same password in Confirm Password.


Step 5 Enable Show Password to view the password entered.
Step 6 Password Expiry—This option determines when passwords expire admin accounts. By default, the password expiry is
disabled and the expiry value is set to 0 (The Admin Account will remain constant until deleted). If the password expiry
is enabled, then the value is set to 180 days by default. You can set the value ranging from 1 - 180 days.
Note If the Primary AP UI is logged in with an admin account that has the password expiry enabled, a reminder
message will pop-up when you log in. This message will start popping up only when there are 7 days left for
password expiry.
When the expiry value is passed, the admin account will be deleted.

Step 7 Click Update to save your changes.

Editing an Admin Account

Step 1 Navigate to Management > Admin Accounts.


The Admin Accounts page is displayed, along with the list of all the admin accounts present on the Primary AP. The
total count of admin accounts on the Primary AP is displayed at the top of the page.

Step 2 Click the Edit icon adjacent to the account you want to edit.
Step 3 Modify the admin account parameters, as required. For descriptions of these parameters, see Adding an Admin Account,
on page 89.
Step 4 Click Update to modify the parameters.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


90
Management
Deleting an Admin Account

Deleting an Admin Account

Step 1 Navigate to Management > Admin Accounts.


The Admin Accounts window is displayed, along with the list of all the admin accounts present on the Primary AP. The
total count of admin accounts on the Primary AP is displayed at the top of the page.

Step 2 Click the Delete icon adjacent to the account you want to delete.
Step 3 Click Ok in the confirmation dialog box.

Managing Guest Users using the Lobby Admin account


Guest user accounts are created to allow temporary access to the network. This network access is granted after
successful authentication of the guest account credentials.
You can create and manage guest user accounts using the lobby ambassador admin account. To know more
about lobby ambassador accounts, see Managing Admin Accounts, on page 89.

Creating a Guest User Account


Before you begin
You will need at least one lobby ambassador user account and one Guest WLAN with Local User Account
or RADIUS Access Type, before you create a guest user account. For information about creating a lobby
ambassador account, see Adding an Admin Account, on page 89.

Step 1 In your browser, navigate to the Primary AP UI.


Step 2 Login using valid Lobby Ambassador credentials.
Step 3 In the Lobby Ambassador Guest Management window, click Add Guest User.
Step 4 Enter the following details for the guest user account:
Option Description
User Name Specify an user name for the guest user account.

Wireless Network Select the desired guest WLANs that have already been configured for guest access to the
network.
To know more about creating a guest WLAN, see Creating a Guest Network, on page 143.

Permanent User Select this check box to allow the guest user account access to the network without time
restriction.

Expiry Date & Time Specify the date and time by clicking the calendar and clock icons respectively. The guest user
account gets disabled at the specified date and time preventing access to the guest network.
If the Permanent User check box is selected, then this field disappears from the dialog box.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


91
Management
Managing TACACS+ and RADIUS Servers

Option Description
Generate Password Click this radio button to automatically generate a password for the guest user account being
created.
If you prefer to manually specify a password for the guest user account, enter it in the Password
and Confirm Password fields.

Password Specify a password for the guest user account.

Confirm Password Ensure that this entry matches what you have typed in the Password field.

Description This field is optional. The user can specify a suitable description for the guest user account.

Step 5 Click Update.


You can choose to share the account credentials with the guest user either via email or by printing it out.
The username and password are case sensitive.
To modify or delete the Guest User account, click the Edit/Delete icons.

Managing TACACS+ and RADIUS Servers


Primary AP supports up to Six RADIUS and Three TACACS Servers. To configure RADIUS and TACACS+
Servers, click the bidirectional arrow icon on the top right of the home screen to enable Expert View on the
Primary AP UI.

Adding TACACS+ Servers

Step 1 Navigate to Management > Admin Accounts.


Step 2 Click the TACACS+ tab.
Step 3 Click Add TACACS+ Authentication Server button and enter the following:
Note To add the TACACS+ Accounting Server, choose Add TACACS+ Accounting Server and proceed with the
following instructions.

Server Index Select 1 through 3.

State Enable the state. By default this is Enabled.

Server IP Address Enter the IPv4 address of the TACACS+ server.

Shared Secret Enter the shared secret.

Port Number Enter the port number being used for communicating with the TACACS+ server. By default,
the port number is 49.

Server Timeout Enter the server timeout. By default, the timeout is 5 seconds.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


92
Management
Configuring RADIUS Servers

The Table displays the configured TACACS+ (authenticating, authorizing, accounting) servers.
You can also modify or delete TACACS+ servers by using the Edit/Delete icons.

Configuring RADIUS Servers

Step 1 Navigate to Management > Admin Accounts.


Step 2 To add the RADIUS servers, click RADIUS and enter data as specified in the following steps:
Step 3 Authentication Call Station ID Type—From the drop-down list, choose the option that is sent to the RADIUS server
in the Access-Request message. One of the following format types can be chosen as the Authentication Call Station
ID Type that is sent to the RADIUS server:
• IP Address
• Primary AP MAC Address
• AP MAC Address
• AP MAC Address:SSID
• AP Name:SSID
• AP Name
• AP Group
• Flex Group
• AP Location
• VLAN ID
• AP Ethernet MAC Address
• AP Ethernet MAC Address: SSID
• AP Label Address
• AP Label Address: SSID
• AP MAC:SSID AP Group
• AP Eth MAC:SSID AP Group

Step 4 Authentication MAC Delimiter—From the drop-down list, choose the option that is sent to the RADIUS server in
the Access-Request message. The delimiters can be one of the following:
• Colon
• Hyphen
• Single-hyphen
• No Delimiter

Step 5 Accounting Call Station ID Type—From the drop-down list, choose the option that is sent to the RADIUS server in
the Access-Request message. One of the following format types can be chosen as the Accounting Call Station ID Type
that is sent to the RADIUS server:
• IP Address
• Primary AP MAC Address
• AP MAC Address
• AP MAC Address:SSID
• AP Name:SSID

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


93
Management
Configuring RADIUS Servers

• AP Name
• AP Group
• Flex Group
• AP Location
• VLAN ID
• AP Ethernet MAC Address
• AP Ethernet MAC Address: SSID
• AP Label Address
• AP Label Address: SSID
• AP MAC:SSID AP Group
• AP Eth MAC:SSID AP Group

Step 6 Accounting MAC Delimiter—From the drop-down list, choose the option that is sent to the RADIUS server in the
Access-Request message. The delimiters can be one of the following:
• Colon
• Hyphen
• Single-hyphen
• No Delimiter

Step 7 Fallback Mode—Specify the RADIUS server fallback behavior from the drop-down list. It can be one of the following:

• Off Disables RADIUS server fallback.

Passive Causes the Primary AP to revert to a server with a lower priority from the available backup
servers without using extraneous probe messages. The Primary AP ignores all inactive
servers for a time period and retries later when a RADIUS message needs to be sent.

Active Causes the Primary AP to revert to a server with a lower priority from the available backup
servers by using RADIUS probe messages to proactively determine whether a server that
has been marked inactive is back online. The Primary AP ignores all inactive servers for
all active RADIUS requests. Once the primary server receives a response from the recovered
ACS server, the active fallback RADIUS server no longer sends probe messages to the
server requesting the active probe authentication.

Step 8 Username—If you enabled Active fallback mode, enter the name to be sent in the inactive server probes in the Username
field. You can enter up to 16 alphanumeric characters. The default value is cisco-probe.
Step 9 Interval—If you enabled Active fallback mode, enter the probe interval value (in seconds) in the Interval text box.
The interval serves as inactive time in passive mode and probe interval in active mode. The valid range is 180 to 3600
seconds, and the default value is 300 seconds.
Step 10 AP Events Accounting—Enable this toggle button to activate sending of accounting requests to RADIUS server.
During network issues, the APs join/disjoin from the Primary AP. Enabling this option ensures that these events are
monitored and the accounting requests are sent to the RADIUS server to help you detect the network issues.
Step 11 Click Apply to save the changes.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


94
Management
Adding RADIUS Servers

Adding RADIUS Servers

Step 1 Navigate to Management > Admin Accounts.


Step 2 Click RADIUS.
This page lists any RADIUS servers that have already been added. Choose to add one of the following:
• Add RADIUS Authentication Server
• Add RADIUS Accounting Server

Note The pages used to add authentication and accounting servers contain similar fields. The following instructions
are detailed for both the Add RADIUS Authentication Server and Add RADIUS Accounting Server pages.
The steps are the same for both pages.

• You can also modify or delete the Radius servers by using the Edit/Delete icons.

Step 3 Click Add RADIUS Authentication Server and enter the following:
Server Index Select 1 through 6.

State Enable the state. By default this is Enabled.

Server IP Address Enter the IPv4 address of the RADIUS server

Shared Secret Enter the shared secret

Port Number Enter the port number used for communicating with the RADIUS server. By default, the port
number of Authentication server is 1812, and the Accounting server is 1813.

Server Timeout Enter the server timeout. By default, the timeout is 5 seconds.

Viewing Auth Cached Users


Before you begin
To view the client entries which are connected to WLANs with Authentication Caching enabled follow the
steps below.

Step 1 Switch to Expert View and navigate to Management > Admin Accounts.
Step 2 In the Admin Accounts page, choose the Auth Cached Users tab.
Step 3 The client entries stored in the local cache of Primary AP are displayed in the table with the following details:
• MAC Address—Displays the MAC address of the client.
• Username—Displays the username of the client. The MAC address is shown by default.
• SSID—Displays the WLAN in use by the client.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


95
Management
Setting Date and Time

• Timeout (Minutes)—Displays the User Cache Timeout Value configured in the WLAN under Authentication
Caching. By default, the timeout interval is 1440 minutes.
• Remaining Time (Minutes)—Displays the amount of time the local cache client entry is valid.

Step 4 Double-click the listed auth cached user to view the details.
You can also delete the client entry from CBW Primary AP local cache by selecting the client and click Delete Selected.
If the client entry is removed from local cache, the authentication of the client will be done by Radius Server. For more
details see Authentication Server information in Configuring the WLAN Security, on page 54.

Setting Date and Time


The date and time on the Cisco Business Wireless Primary AP is first set when running the initial configuration
setup wizard. You can enter the date and time manually or you can specify a Network Time Protocol (NTP)
server that sets the time and date.

Using NTP Servers to Automatically Set the Date and Time


You can have up to three Network Time Protocol (NTP) servers that the Primary AP can automatically sync
to and set the date and time.
By default three NTP servers are automatically created. The default fully qualified domain names (FQDN)
of the NTP servers are:
• 0.ciscome.pool.ntp.org, with NTP Index value 1.
• 1.ciscome.pool.ntp.org, with NTP Index value 2.
• 2.ciscome.pool.ntp.org, with NTP Index value 3.

For adding and editing NTP server details, go to Management > Time. This opens the Time Settings page.

Adding and Editing NTP Servers


You can have up to three Network Time Protocol (NTP) servers that the Primary AP can automatically sync
to and set the date and time.

Step 1 Navigate to Management > Time.


The Time Settings window is displayed, with the set time zone shown at the top of the page. The current date and time
are displayed in the Set Time Manually field. If there are any existing NTP servers, they are listed in the order of their
NTP Index values.

Step 2 In the NTP Polling Interval field, specify the polling interval, in seconds.
Step 3 To edit an existing NTP server, click its Edit icon. To add a new NTP server, click Add NTP Server.
Step 4 You can add or edit the following values for an NTP server:

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


96
Management
Refreshing NTP Server Status

Option Description
NTP Index Specify an NTP Index value to set the priority of the NTP server. NTP Index values can be set
from 1 to 3, in the order of decreasing priority. The Primary AP will try and sync with the NTP
server with the highest priority first, until the specified polling interval time runs out.
If the sync is successful, the Primary AP will not try to sync with any of the remaining NTP
servers.
If the sync is unsuccessful, then the Primary AP will try to sync with the next NTP server.

NTP Server Specify the IPv4 address or the fully qualified domain name (FQDN) for the NTP server. When
you specify an FQDN, a DNS lookup is done. If the lookup fails, an error will be logged in the
Syslog server. The Primary AP will continue to resolve this FQDN and errors will be logged
until you change the NTP configuration or specify a valid FQDN.

Step 5 Click Apply.

Refreshing NTP Server Status


The NTP server table on the Time Settings page, displays the status of the connection to each NTP server in
the NTP Status column. The status may be one of the following:
• Not Tried—A sync has not been attempted yet.
• In Sync—The Primary AP time is in sync with the NTP server.
• Not Synched—The Primary AP time is not in sync with the NTP server.
• In Progress—A sync is being attempted.

The NTP status is automatically updated every minute.

Deleting and Disabling NTP Servers


To delete an NTP server:
1. Navigate to Management > Time.
2. In the Time Settings page, click the Delete icon of the NTP server you want to delete.
3. Click OK in the confirmation dialog box.
4. Click Apply.

To disable the option of setting up the date and time using NTP servers, you will need to delete all configured
NTP servers following the same process shown above.

Configuring Date and Time Manually

Step 1 Navigate to Management > Time.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


97
Management
Updating the CBW AP Software

The Time Settings window is displayed, with the set time zone shown at the top of the page. The current date and time
are displayed in the Set Time Manually field.

Step 2 From the Time Zone drop-down list, choose your local time zone.
When you choose a time zone that uses Daylight Saving Time (DST), the automatically sets its system clock to reflect
the time change when DST occurs. DST starts on the second Sunday in March, and ends on the first Sunday in November
in the U.S.

Step 3 Select the Set Time Automatically from Current Location check box to set the time based on the time zone specified.
Step 4 In the Set Time Manually field:
• Click the calendar icon and choose the month, day, and year.
• Click the clock icon and specify the time, in hours and minutes.

Step 5 Click Apply.

Updating the CBW AP Software

Note Refer to Image Update Prerequisite, on page 99 for updating a device later in this section.

To view the current software version of your Primary AP, you can choose the one of the following methods:
• Click the gear icon at the top-right corner of the web interface, and then click Primary AP Information.
• Choose Management > Software Update. The Software Update window is displayed with the current
software version number listed on the top.

You can update the CBW AP software using the Primary AP's web interface. Current configurations on the
Primary AP will not be deleted.
The following are the software update methods:
• Updating the Software using HTTP, on page 100
• Updating the Software using TFTP, on page 102
• Updating the Software using SFTP, on page 103
• Updating the Software through Cisco Business Dashboard, on page 104

A software update ensures that both the Primary AP software and the software on all the associated Subordinate
APs are updated. Newly joining APs will be upgraded to the current version of the software running on the
Primary AP.
The software download happens in the background, without impacting the network. The upgrades are
automatically sequenced to ensure that the network performance is not impacted by software update.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


98
Management
Updating the CBW AP Software

Note The software of up to three access points can be concurrently updated.

Image Update Prerequisite


Before updating the CBW APs, you are required to obtain the Primary AP firmware image and the Mesh
Extender (if your network has any Mesh Extenders) firmware image using the following steps:
• Navigate to the Cisco Download Software page: http://software.cisco.com/download/navigator.html
• From the Download Software window, browse to Wireless > Access Points. Navigate to Business 100
Series Access Points. Choose the model (CBW150AX), to view a list of currently available software,
with the latest displayed on the top.
• Choose a software release number.
• Click Download corresponding to the CBW-Bundle-10-x-2-0.zip file.
• Read the Cisco’s End User Software License Agreement and then click Agree to proceed.
• Save the ZIP file to the hard drive on your computer, and then extract the contents to a directory on your
computer.

CBW AP Series Software File to Select Image Size


CBW150AX (Primary Capable APs) ap1g8 ~100MB

CBW151AXM (Mesh Extenders) ap1g8-capwap ~70MB

Pre-download Image Status


You can monitor the status and progress of the update via HTTP/TFTP/SFTP/ on the Software Update page.
The following data is displayed as the update progresses:
• Total number of APs in the network.
• Number of APs that are currently being updated, waiting to be updated, being rebooted and those that
failed to update.

In addition to the summary above, each AP update progress is also shown with the following data:
• AP Name—The AP name.
• AP Type —Displays if the AP is a Primary AP or Primary Capable AP or Mesh Extender.
• AP Role— The operating role of the AP. It can be Root or Mesh. This field is available only in Mesh
deployments.
• AP Location—The AP location.
• Download Percentage— By default, it displays as NA. While pre-downloading the software, the
percentage of download is displayed.
• Last Update Error—In case of any error, during pre-download, the error is displayed here.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


99
Management
Updating the Software using HTTP

• State—Status of the pre-image download to the Mesh Extenders in the network. It can be one of the
following:
• None
• Initiated
• Pre-downloading
• Completed

• Retry Attempts—Number of Attempts re-tried.

Updating the Software using HTTP

Step 1 Obtain the ZIP file and extract the Primary AP software image and Mesh Extender (if your network has any Mesh
Extenders) firmware image.
Step 2 From the Primary AP web interface, navigate to Management > Software Update.
The Software Update window with the current software version number is displayed.

Step 3 In the Transfer Mode drop-down list, choose HTTP.


Note For Mesh deployments, you must upgrade the Mesh Extender image prior to the Primary AP image upgrade.

Important Proceed with Step 4-7 if you have Mesh Extenders in the CBW AP network.

Step 4 Enable Mesh Extender Image option to load the Mesh Extender image ap1g8-capwap. By default, this option will
be disabled.
Step 5 Click the Browse button adjacent to the Mesh Image File field, navigate to the folder having the unpacked ZIP file
contents, and choose ap1g8-capwap software file.
Note The file explorer that opens here is an operating system-specific explorer depending on the OS of your
computer.

Step 6 Click Update, and then click Ok in the confirmation dialog.


Caution The top section of the page indicates the status of the download. Do not manually power down or reset the
Primary AP or any AP during this process.

The Pre-Download Image Status section displays the status of the pre-image download to the Mesh Extenders in the
network.
You can abort a software update that is in progress, at any time before the Primary AP completes rebooting, by clicking
Abort.

Step 7 One Mesh Extender in the network obtains the image first and then shares the image to other Mesh Extenders. Once
all the Mesh Extenders in the network are pre-downloaded or moved to Complete status, Disable the Mesh Extender
Image option.
Step 8 Now, update the Primary AP and other Primary Capable APs in the network. To do so, click Browse adjacent to the
File field. Navigate to the folder having the unpacked ZIP file contents, and choose the ap1g8 software file.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


100
Management
Upgrading the Software for First Mesh Extender using HTTP

Step 9 Check the Auto Restart check box for the Primary AP and Mesh Extender to reboot automatically after the image
pre-download is complete for all the APs. By default, this option is Enabled.
Step 10 Click Update and then click Ok in the confirmation dialog.
The status of the download is displayed on top of the page.

Step 11 One Primary AP in the network obtains the image and shares the image to all other Primary capable APs.
Step 12 After all the APs’ state is moved to Complete, the Primary AP restarts (or reboots) to complete the software upgrade.
If you have not checked the Auto Restart check box, you can manually reboot the Primary AP, after the upgrade, by
choosing Advanced > Primary AP Tools, and clicking Restart Primary AP.
Step 13 Log in to the Primary AP UI (after clearing the cache) and verify the Primary AP software version in the Software
Update window.
Note • While adding the Mesh Extender to the existing Mesh deployment, the new Mesh Extender will obtain
the image from the existing connected Mesh Extender. This ensures efficient upgrade.
• The newly joining Mesh Extender can obtain the image from Cisco.com, TFTP/SFTP server, or via
CBD. Configure the Transfer Type accordingly to enable the new Mesh Extender obtain the image and
join the CBW network. You can also upgrade software through HTTP. For more information see
Upgrading the Software for First Mesh Extender using HTTP, on page 101

Upgrading the Software for First Mesh Extender using HTTP


You will be required to upgrade the software of first Mesh Extender that joins the CBW Primary AP. To add
a new Mesh Extender to the Primary AP, refer to Adding Mesh Extenders, on page 16.
Once you have added the MAC Address of the Mesh Extender in Local MAC Addresses list, check the
predownload status of the Mesh Extender by navigating to Network Summary > Management > Software
Update page.
If the Mesh Extender has not joined, the predownload status shows as ImageReq to AP failed. This requires
that you upgrade the software of the Mesh Extender to enable it join the network. Do the following to upgrade
the software using HTTP:

Step 1 Obtain the ZIP file and extract the Primary AP software image and Mesh Extender firmware image.
Step 2 From the Primary AP web interface, choose Management > Software Update. The Software Update window with the
current software version number is displayed.
Step 3 In the Transfer Mode drop-down list, choose HTTP.
Step 4 Enable the Mesh Extender Image option to load the Mesh Extender image ap1g8-capwap. By default, this option will
be Disabled.
Step 5 Click Browse adjacent to the Mesh Image File field, navigate to the folder containing the unpacked ZIP file contents,
and choose ap1g8-capwap software file.
Caution The top section of the page indicates the status of the image upload to Primary AP. Do not manually power
down or reset the Primary AP or any AP during this process.

Note The uploaded ap1g8-capwap image will be stored in temporary location of the Primary AP. So do not upgrade
or reload the Primary AP until the first Mesh Extender joins the network.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


101
Management
Updating the Software using TFTP

Step 6 Click Update, and then click Ok in the confirmation dialog.


Step 7 When the first Mesh Extenders attempts to joins the network, the Primary AP shares the ap1g8-capwap image to the
Mesh Extender.
The Pre-Download Image Status section displays the status of the image download to the Mesh Extenders in the
network.
Once the image is transferred, the Mesh Extender reloads and joins the CBW network.

Updating the Software using TFTP


Before you begin
• Prepare a TFTP server to host the CBW AP software file using the following guidelines:
• Ensure that the TFTP server supports extended TFTP for file sizes greater than 32 MB. Some TFTP
servers that support files of this size are tftpd32.
• If you attempt to download the Primary AP software and your TFTP server does not support the
file size, an error message is displayed: TFTP failure while storing in flash.

• A computer that can access Cisco.com and the TFTP server will be required.

Note Ensure that the TFTP server has the latest software bundle on Cisco.com.

Step 1 Obtain the ZIP file and extract the Primary AP software image and Mesh Extender (if your network has any Mesh
Extenders) firmware image. Copy the folder to the default directory on your TFTP server.
Step 2 From the Primary AP UI, navigate to Management > Software Update.
The Software Update window with the current software version number is displayed.

Step 3 In the Transfer Mode drop-down list, choose TFTP.


Step 4 In the IP Address (IPv4) field, enter the IP address of the TFTP server.
Step 5 In the File Path field, enter the TFTP server directory path of the software file.
Step 6 To set the Primary AP to automatically reboot after the image pre-download is complete, check the Auto Restart check
box. By default, this option is Enabled.
You can also manually reboot the Primary AP after the upgrade. Navigate to Advanced > Primary AP Tools and
click Restart Primary AP.

Step 7 Click Save to save the parameters that you have specified.
These parameters (IP address and File Path of the TFTP server) will remain saved unless you specifically change them
in future. You do not have to re-enter these parameters during the next software update.

Step 8 You can perform the update right away or schedule it for a later time.
• To proceed with the update right away, click Update, and then click Ok in the confirmation dialog.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


102
Management
Updating the Software using SFTP

• To perform the update later, up to a maximum of 5 days from the current date, enable Schedule Update and
specify the later date & time in the Set Update Time field.

The top section of the page indicates the status of the download. Do not manually power down or reset the Primary AP
or any AP during this process.
The Pre-Download Image Status section of the page displays the status of the pre-image download to the APs in the
network.
You can abort a software update that is in progress, at anytime before the Primary AP completes rebooting, by clicking
Abort.

Step 9 After you click Update, one Primary Capable AP and one Mesh Extender will obtain the image from the configured
TFTP server and share the images to other Primary Capable APs and Mesh Extenders correspondingly.
Step 10 After the image pre-download is Complete, the Primary AP must restarts (or reboots) to complete the software upgrade.
If you have not checked the Auto Restart check box, you can manually reboot the Primary AP, after the upgrade.
Navigate to Advanced > Primary AP Tools, and click Restart Primary AP.
Step 11 Clear the cache and log in to the Primary AP UI and verify the Primary AP software version in the Software Update
window.

Updating the Software using SFTP


Software update through SFTP Transfer Mode works for all Access Points supported in a CBW AP Deployment.
You would need a SFTP server which can communicate with the Primary Access Point to use this upgrade
method.

Step 1 Obtain the ZIP file and extract the Primary AP software image and Mesh Extender (if your network has any Mesh
Extenders) firmware image. Copy the folder to the default directory on your SFTP server.
Step 2 From the Primary AP web interface, navigate to Management > Software Update.
The Software Update window with the current software version number is displayed.

Step 3 In the Transfer Mode drop-down list, choose SFTP.


Step 4 In the IP Address (IPv4)/Name field, enter the IP address or the domain name of the SFTP server.
Step 5 In the Port Number field, enter the port number. The default is 22.
Step 6 In the File Path field, enter the SFTP server directory path of the software file.
Step 7 Enter the username and password to log in to the SFTP server.
Step 8 To set the Primary AP to automatically reboot after the image pre-download is complete, check the Auto Restart check
box. By default, this option is Enabled. You can also manually reboot the Primary AP, after the upgrade. Navigate to
Advanced > Primary AP Tools, and click Restart Primary AP.
Step 9 Click Save to save the parameters (IP address, file path, port number, username and password) that you have specified.
These parameters will remain saved until you change them in future. You do not have to re-enter these parameters for
the next software update.
Step 10 You can perform the update right away or schedule it for a later time.
• To proceed with the update right away, click Update, and then click Ok in the confirmation dialog.
• To perform the update at a later time, up to a maximum of 5 days from the current date, click the Schedule Update
and specify the later date & time in the Set Update Time field.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


103
Management
Updating the Software through Cisco Business Dashboard

Note The top of the page indicates the status of the download. Do not manually power down or reset the Primary
AP or any AP during this process.
The Predownload Image Status section of the page shows the status of image predownloaded to the APs
in the network.
You can abort a software update that is in progress, at anytime before the Primary AP completes rebooting,
by clicking Abort.

Step 11 After you click Update, one Primary Capable AP and one Mesh Extender will obtain the image from the configured
SFTP server, and share the images to other Primary capable APs and Mesh Extenders correspondingly.
Step 12 After all the APs’ state are moved to Complete state, the Primary AP restarts (or reboots) to complete the software
upgrade. If you have not checked the Auto Restart check box, you can manually reboot the Primary AP, after the
upgrade Navigate toAdvanced > Primary AP Tools and click Restart Primary AP.
Step 13 Clear the cache and log in to the Primary AP. Verify the Primary AP software version in the Software Update window.

Updating the Software through Cisco Business Dashboard


When you add a Mesh Extender(S) to your Access Point network for the first time, you may choose to upgrade
the firmware for the Mesh AP(s) through the Cisco Business Dashboard (CBD).
Updating the Software through Cisco Business Dashboard is possible, only if CBW is currently managed by
CBD.
Before you start the image upgrade for the Mesh AP in Cisco Business Dashboard, configure the Transfer
Mode in CBW interface.

Note 1. When the CBW is connected to CBD through direct management, then you can check the Connection
Status in CBW GUI under Advanced > CBD Settings and confirm if the connection is up/down.
2. If the CBW is managed by CBD Probe, then check the status of the device online/offline in CBD inventory
using the device’s serial number. Device serial number can be found in CBW GUI under Monitoring >
Access Points. Click on the AP name to view the information.

Step 1 From the Primary AP UI, navigate to Management > Software Update.
The Software Update window indicating the current software version number is displayed.

Step 2 From the Transfer Mode drop-down list, choose CBD-HTTPS to update the software through CBD.
Step 3 Click Save.
Step 4 Refer to Performing Device Actions, in the Cisco Business Dashboard Administration Guide and follow the instructions
to update the software.
Step 5 Click the Predownload Image Status arrows to display the status of the software update.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


104
CHAPTER 7
Services
Cisco Business Wireless Access Points provides the following services:
• Media Stream – The Media Stream (formerly VideoStream) feature makes the IP multicast stream
delivery reliable over the air, by converting the multicast frame to a unicast frame over the air. Each
Media Stream client acknowledges receiving a video IP multicast stream.
• mDNS – Multicast Domain Name System (mDNS) service discovery provides a way to announce and
discover the Apple services to the Wireless clients connected to the CBW AP.
• Cisco Umbrella – The Cisco Umbrella is a cloud-delivered network security solution. It provides real-time
insights that help protect devices from malware and breach.

This chapter contains the following sections:


• Media Steam, on page 105
• About Multicast Domain Name System, on page 108
• Cisco Umbrella Overview, on page 113

Media Steam
The IEEE 802.11 wireless multicast delivery mechanism does not provide a reliable way to acknowledge lost
or corrupted packets. As a result, if any multicast packet is lost in the air, it is not sent again which may lead
to poor quality of IP multicast stream.
The Media Stream (formerly VideoStream) feature makes the IP multicast stream delivery to the wireless
clients more reliable over the air and facilitates better usage of wireless bandwidth, by converting the multicast
frame to a unicast frame over the air. Each Media Stream client acknowledges receiving a video IP multicast
stream.

Configure Media Stream Parameters


Configure the global multicast parameters by the following steps:
1. Switch to Expert View by clicking the bidirectional arrow icon on the top right of the home screen in the
Web-UI of the Primary AP.
A message is displayed to confirm if you want to switch to the expert view.
2. Click Ok.
3. Navigate to Services > Media Stream.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


105
Services
Media Steam

4. Enable Global Multicast to support multicast traffic on Primary AP. The default value is Disabled.

Important Global multicast cannot be enabled without configuring IPv4 multicast address in WLAN page.

5. Enable Multicast Direct to enhance the video streaming for wireless clients. The default value is Disabled.

Note The wireless clients must re-join the multicast stream after enabling the multicast direct feature on the Primary
AP.

6. Select Session Announcement State toggle button to enable the session announcement mechanism. If
the session announcement state is enabled, clients are informed each time a Primary AP is not able to
serve the multicast direct data to the client. The following parameters need to be filled only if Session
Announcement State is enabled.
a. Session Announcement URL— Enter the URL where the client can find more information when an
error occurs during the multicast media stream transmission.
b. Session Announcement E-mail— Enter the e-mail address of the person who can be contacted.
c. Session Announcement Phone— Enter the phone number of the person who can be contacted.
d. Session Announcement Note— Enter a reason as to why a particular client cannot be served with a
multicast media.

7. Click Apply.

Configuring a New Media Stream


To add a new Media stream switch to Expert View and navigate to Services > Media Stream.
1. Click Add New Stream to configure a new media stream.
2. Enter the media stream name in the Stream Name text box. The stream name can be up to 64 characters.
3. Enter the starting IPv4 address of the multicast media stream in the Multicast Start IP Address text
box.
4. Enter the ending IPv4 address of the multicast media stream in the Multicast End IP Address text box.
5. Enter the maximum expected bandwidth that you want to assign to the media stream into the Maximum
Expected Bandwidth (Kbps) text box. The range is 1 to 35000 kbps.

Note We recommend that you use a template to add a media stream to the Primary AP.

6. From the Select from Predefined Templates drop-down list under Resource Reservation Control
(RRC) Parameters, choose one of the following options to specify the details about the resource
reservation control:
• Very Coarse (below 300 kbps)

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


106
Services
Media Steam

• Coarse (below 500 kbps)


• Ordinary (below 750 kbps)
• Low (below 1 Mbps)
• Medium (below 3 Mbps)
• High (below 5 Mbps)

Note When you select a predefined template from the drop-down list, the following text boxes under the Resource
Reservation Control (RRC) Parameters list their default values that are assigned with the template.

7. Specify the average packet size in the Average Packet Size field. The value can be in the range of 100
to 1500 bytes. The default value is 1200.
8. Enable the RRC (Resource Reservation Control Check) Periodic update in the RRC Periodic update
field. By default, this option is enabled.
RRC periodically updates the admission decision on the admitted stream according to the correct channel
load. As a result, it may deny certain low priority admitted stream requests.
9. Specify the priority bit set in the media stream in the RRC Priority field. The priority can be any number
between 1 and 8.
The larger the value means the priority is higher. For example, a priority of 1 is the lowest value and a
value of 8 is the highest value. The default priority is 4. The low priority stream may be denied in the
RRC periodic update.
10. Specify the action to perform in case of a violation after a re-RRC in the Traffic Profile Violation field.
Choose an action from the drop-down list. The possible values are as follows:
• Best Effort— Specifies that a stream is set to Best Effort class on periodic revaluation. This is the
default value.
• Drop— Specifies that a stream is dropped on periodic revaluation.

11. Click Apply.


The newly created Media stream is displayed in the table along with details of Stream Name, Start/End
IP Address, and Operation Status.

Viewing Media Stream Clients


Media stream clients will be displayed under this section with the following details:
• Client MAC—Displays the MAC address of the client.
• Stream Name—Shows the Media stream name. If the Multicast Direct toggle disabled, the Stream
Name will be null for clients that are connected to the WLAN.
• Multicast IP—Displays the Multicast Group Address configured in the WLAN page.
• AP Name—Displays the AP Name connected to the client.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


107
Services
About Multicast Domain Name System

• VLAN—Displays the Client VLAN.


• Type—Displays Multicast Only or Multicast Direct based on which toggle was configured in the
WLAN.

About Multicast Domain Name System


Multicast Domain Name System (mDNS)
Multicast Domain Name System (mDNS) service discovery provides a way to announce and discover the
services on the local network. The mDNS service discovery enables wireless clients to access Apple services
such as Apple Printer and Apple TV advertised in a different Layer 3 network.
mDNS performs DNS queries over IP multicast. mDNS supports zero-configuration IP networking. As a
standard, mDNS uses multicast IP address 224.0.0.251 as the destination address and 5353 as the UDP
destination port.

Bonjour Advertisements for CBW device discovery


The Cisco Business Wireless Access Point sends Bonjour Advertisements to the local network to support
CBW device discovery in the Cisco Business Dashboard probe. Using these advertisements, CBD probe
obtains details of individual AP and the Primary AP.

Note During the initial setup phase, if there is more than one Primary Capable AP in the network, only one AP will
get DHCP IP, and sends VRRP and Bonjour Advertisements. The rest of the APs will wait for the AP to be
configured and then join the Primary AP.

Location Specific Services


The processing of mDNS service advertisements and mDNS query packets support Location Specific Services
(LSS). All the valid mDNS service advertisements received by the Primary AP are tagged with the MAC
address of the AP that is associated with the service advertisement from the service provider while inserting
the new entry into the service provider, such as Apple TV database.
The response to the client query filters the wireless entries in the SP-DB using the MAC address of the AP
associated with the querying client. If LSS is disabled for any service, the wireless service provider database
entries are not filtered when they respond to any query from a wireless client for the service.
LSS applies only to wireless service provider entries. There is no location awareness for wired service provider
devices. The status of LSS cannot be enabled for services with the ORIGIN set to wired.

mDNS Policy
This section explains how you can define a policy to access a specific service provider. The access policy
explains the client attributes, the constructs, and the rule components that make up the policy, and how rules
and policies are evaluated. This helps in deciding whether the given service provider should be included in
the mDNS response for the client (that made the mDNS query).
When LSS is enabled, it provides the information only about nearby service providers. mDNS Policy enables
you to define a policy that is even more granular.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


108
Services
About Multicast Domain Name System

mDNS policies can be framed based on:


• User
• Role
• AP Name
• AP Location
• AP Group

mDNS Policy Limitations


The limitations of the mDNS policy are as follows:
• LSS cannot be applied in conjunction with the mDNS policy.
• If the keyword Any is used as a role parameter value, then that check is bypassed.
• mDNS Policy will be active only when mDNS Snooping is enabled.
• The maximum number of policies that can be configured per MAC address is five.

Client Attributes in an mDNS Policy


Any client initiating an mDNS query is associated with a set of attributes that describe the context of the
client. The list of attributes can be based on Role, User-id, associated AP Name, associated AP Location, and
associated AP Group.

mDNS AP
The mDNS AP feature allows the Primary AP to have visibility of the wired service providers. This is in-built
in the Primary AP.

Priority MAC Support


You can configure up to 50 MAC addresses per service. These MAC addresses are the service provider MAC
addresses that require priority. This guarantees that any service advertisements originating from these MAC
addresses for the configured services are learned even if the service provider database is full by deleting the
last non-priority service provider from the service that has the highest number of service providers.
When you configure the priority MAC address for a service, there is an optional parameter called ap-group,
which is applicable only to wired service providers to associate a sense of location to the wired service provider
devices. When a client mDNS query originates from this AP group, the wired entries with priority MAC and
AP group are looked up, and the wired entries are listed first in the aggregated response.

Origin-Based Service Discovery


You can configure a service to filter inbound traffic that is based on its wired or wireless origin. All the services
that are learned from an mDNS AP are treated as wired. When the origin is wired, the LSS cannot be enabled
for the service because LSS applies only to wireless services.
A service that has its origin set to wireless cannot be changed to wired if the LSS status is enabled for the
service because LSS is applicable only to wireless service provider devices. If you change the origin between
wired and wireless, the service provider database entries with the prior origin type are cleared.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


109
Services
Restrictions for Configuring Multicast DNS

Restrictions for Configuring Multicast DNS


• mDNS is not supported on access points in AP Only mode within a locally switched WLAN and mesh
access points.
• mDNS is not supported on remote LANs.
• Third-party mDNS servers or applications are not supported on the Primary AP using the mDNS feature.
Devices that are advertised by the third-party servers or applications are not populated on the mDNS
service or device table correctly on the Primary AP.
• In a Layer2 network, if Apple servers and clients are in the same subnet, mDNS snooping is not required
on the Primary AP. However, this relies on the function of switching network. If you use switches that
do not work as expected with mDNS snooping, you must enable mDNS on the Primary AP.
• Video is not supported on Apple iOS 6 with WMM in enabled state.
• mDNS APs cannot duplicate the same traffic for the same service or VLAN.
• LSS filtering is restricted to only wireless services.
• The mDNS AP, Priority MAC address, and origin-based discovery features cannot be configured using
the Primary AP Web-UI.
• mDNS user profile mobility is not supported in guest anchors.
• Apple devices such as iPads and iPhones can discover Apple TV through Bluetooth. This might result
in Apple TVs being visible to end users.

Configuring Multicast DNS


Configure the global mDNS parameters and the Primary Services Database by following these steps:

Step 1 Switch to Expert View by clicking the bidirectional arrow icon on the top right of the home screen in the Web-UI of the
Primary AP. A message is displayed to confirm if you want to switch to the expert view. Click Ok.
Step 2 Navigate to Services > mDNS.
Step 3 Use the mDNS Global Snooping toggle button to enable or disable snooping of mDNS packets, respectively.
Step 4 Use Bonjour Advertisements toggle button to enable or disable sending of bonjour advertisement packets to the local
network. By default it is enabled and advertisements will be sent every minute.
Note • By enabling this option, CBD probe can discover CBW APs in the network.
• CBW AP sends bonjour packets only in Native VLAN.
• CBW AP sends Goodbye bonjour message to CBD probe.
• If the Bonjour Advertisements toggle button is disabled.
• If the name of the AP joined to Primary AP is changed, or the Primary AP name is changed, a Goodbye
bonjour message is sent for the old name. A new name will be updated in Bonjour Advertisements
at the next interval. A Goodbye bonjour message on AP name change will be sent only if the Bonjour
Advertisement is enabled.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


110
Services
Mapping mDNS Profile to WLAN

Step 5 Use the mDNS Policy toggle button to enable or disable mDNS policy mapping.
Step 6 Enter the mDNS query interval in minutes. The query interval is the frequency at which the Primary AP queries for a
service. Default is 15 minutes.
Step 7 Click Add VLAN Id to add a list of VLANs for internal AP snooping.
Step 8 Complete the details in the following tabs:
a. Primary Services Database —To view the services listed in the Primary database. The Primary AP looks and learns
about the mDNS service advertisements only if the service is available in the Primary Services Database. The Primary
AP can check and learn a maximum of 64 services.
• Click the Add Service button to add a new service in the Primary database.
• In the Add/Edit mDNS Service window, specify the Service Name, Service String, Query Status, Location
Services, and Origin.
• Click Update.

b. mDNS Profiles —To view the list of mDNS profiles. By default, one mDNS profile will be available.
• Click the Add Profile button to add a new profile.
• In the Add/Edit mDNS profile window, enter the profile name that can be later mapped to the WLAN.

c. mDNS policy—To view the mDNS policies. By default, one mDNS policy will be available.
• Click Add mDNS policy to add a new policy.
• In the Edit mDNS policy window, enter the role name and user name.

d. Domain Names —To view domain names and add domain names from the discovered list.
e. mDNS Browser —To view the number of mDNS services running.
f. Click Apply.

Mapping mDNS Profile to WLAN


Switch to Expert View by clicking the bidirectional arrow icon on the top right of the home screen in the
Web-UI of Primary AP.

Step 1 Navigate to Wireless Settings > WLANs.


Step 2 Click Add new WLAN to create a new WLAN.
Step 3 In the Add new WLAN window, select Advanced to configure the mDNS.
Step 4 Use the mDNS toggle button to add the mDNS services to the WLAN.
Step 5 From the mDNS Profile drop-down list, choose a profile to map the required policy to the WLAN.
Step 6 Click Apply to save your changes.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


111
Services
Configuring mDNS Policy

Note The wireless Primary AP broadcasts the services from the wired devices such as Apple TVs learned over
VLANs, when:
• mDNS snooping is enabled in the WLAN Advanced options.
• mDNS profile is enabled either at the interface or WLAN.

Configuring mDNS Policy


Switch to Expert View by clicking the bidirectional arrow icon on the top right of the home screen in the
Web-UI of the Primary AP. A message is displayed to confirm if you want to switch to the expert view. Click
Ok.
To configure the mDNS policy, do the following:

Step 1 Navigate to Services > mDNS.


Step 2 Use the mDNS Global Snooping toggle button to enable or disable snooping of mDNS packets, respectively.
Step 3 Use the mDNS Policy toggle button to enable or disable mDNS policy, respectively.
Step 4 Enter the mDNS query interval in minutes. The query interval is the frequency at which the Primary AP queries for a
service. Default is 15 minutes.
Step 5 Click mDNS Policy. The number of mDNS policies are displayed.
Step 6 In the Add mDNS Policy window, you must add the mDNS Service Group
.
a. Enter the mDNS Service Group Name and the Description.
b. Click the Add Service Instance button. The Add Service Instance window is displayed. Complete the following
details to add a service instance:
• Mac Address—MAC address of the service provider such as Apple TV.
• Name—Add a name for the device.
• Location Type—Choose the Location Type by AP Group, AP Name, or AP Location.
• Location—Based on the Location Type selected.

c. Click Apply.

The service instance created is displayed in the mDNS Policy window.

Step 7 Enter the Policy/Rule and click Apply.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


112
Services
Cisco Umbrella Overview

Cisco Umbrella Overview


Cisco Umbrella is a cloud based security platform that provides the first line of defense against threats on the
Internet wherever users go. It acts as a gateway between the Internet and your systems and data to block
malware, botnets, and phishing over any port, protocol, or app.
At the Domain Name System (DNS) level, it provides real-time insights that help protect devices from malware
and breach.
The following points summarizes the way in which Cisco Umbrella works in the Primary AP:
• Wireless clients join a wireless access point and send DNS queries when they initiate traffic to the Internet.
Cisco Umbrella transparently intercepts the DNS traffic and redirects the DNS queries to the Cisco
Umbrella cloud servers.
• Security policies based on fully qualified domain names (FQDN) in a DNS query are defined in the Cisco
Umbrella cloud servers.
• Based on the FQDN in a DNS query, Cisco Umbrella returns one of the following responses:
• Malicious FQDN: Returns Cisco Umbrella-blocked page IP to the corresponding client.
• Safe FQDN: Returns Destination IP address.

Cisco Umbrella Support for the Primary AP


• Up to 10 different Cisco Umbrella profiles are supported, each with a unique device ID.
• In the context of mapping Cisco Umbrella profiles or device IDs to wireless entities, only WLAN level
mapping is supported.
• In the context of provisioning device IDs to APs, AP snoops the DNS packets and applies EDNS tags.
• Forced or Ignore Open modes are supported.

Limitations
This feature does not work with the following:
• Local-auth
• IPv6 addresses

Other limitations include:


• If an application or host uses an IP address directly, instead of using DNS to query domain names.
• If a client is connected to a web proxy and does not send a DNS query to resolve the server address.
• The application of wireless Cisco Umbrella profiles on wireless entities, like WLAN, through
configuration, is dependent on the success of the registration of the device.
• The Cisco Umbrella Cloud provides two IPv4 addresses. The AP uses the first server address that is
configured. It does not load balance across servers.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


113
Services
Configuring Cisco Umbrella on Primary AP

Configuring Cisco Umbrella on Primary AP


To configure Cisco Umbrella on the Primary AP, ensure the following:
• You should have an account with Cisco Umbrella.
• You should have an API token from Cisco Umbrella.

To generate the API token, do the following:


1. Login into your Cisco Umbrella Account
2. In the Umbrella dashboard, navigate to Admin > API Keys and click Create.
3. Select Legacy Network Devices and click Create.
4. Expand Legacy Network Devices and copy the API token Your Key. The API token is a lengthy string
of alphanumeric characters.

To configure Cisco Umbrella on the Primary AP, do the following:

Step 1 Switch to Expert View by clicking the bidirectional arrow icon on the top right of the home screen in the Web-UI of the
Primary AP.
A message is displayed to confirm if you want to switch to the expert view. Click Ok.
Step 2 Choose Services > Umbrella.
Step 3 Click the Umbrella Global Status toggle button to enable Umbrella status.
Step 4 Enter or paste the Umbrella API Token that you copied.
Step 5 Click Apply to enable Cisco Umbrella.
Step 6 Click Add Profile to create a new profile.
Step 7 In the Add Profile window, enter the Profile Name and click Apply.
A new profile is created.

Step 8 Verify that the State changes from Registration in Progress to Profile Registered. This may take a few seconds, and may
require you to refresh your browser window.
Step 9 In the Umbrella dashboard, navigate to Deployments > Core Identities > Network Devices. You can check if your
device is listed in this window.

Adding Policy to Umbrella Profile

Step 1 Browse to the Cisco Umbrella UI using your Cisco credentials. Add your device details to protect from breach and
malware.
Step 2 Navigate to Policies > All Policies to create rules and map this to your network device.
Step 3 Click Add to create new rules.
Step 4 Select Network Devices from the list of Identities and click Next. This helps add your APs in a way so that the whole
network is monitored by the umbrella.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


114
Services
Applying Cisco Umbrella Profile to WLAN

Step 5 You can configure the required Security Settings and Limit Content Access. These are user configurable and you can
select the type of attacks that you want to block such as phishing attack, malware, potentially harmful domains, web page
contents such as games, gambling, drugs etc.
Step 6 In the Application tab, select the applications that need to be blocked. You can limit access to certain applications like
YouTube, Facebook, Google-services, or others if you wish.
Step 7 Specify the Destination, File Analysis, and Block Pages in the network.
Destination List shows the global allowable list and global block list that you configured in the umbrella and Block
pages define the appearance and bypass options for your block pages.
Note These all are user configurable.

Step 8 Navigate to Deployments > Core Identities > Network Devices and verify if the Policy has been applied to your network
device.

Applying Cisco Umbrella Profile to WLAN

Step 1 Switch to Expert View by clicking the bidirectional arrow icon on the top right of the home screen in the Web-UI of the
Primary AP.
Step 2 Navigate to Wireless Settings > WLANs.
Step 3 Click Add new WLAN to open the Add new WLAN.
Step 4 Select Advanced.
Step 5 From the Umbrella Profile drop-down list, choose a profile that was created for the WLAN.
Step 6 From the drop-down list, choose Ignore or Forced.
When a client obtains DNS IPs, users can manually change them on the client device, thus bypassing Umbrella policy
enforcement.
To prevent this security compromise, configure Umbrella Mode to Forced. This ensures that Umbrella policy enforcement
cannot be overridden on the client device.

Step 7 Click the Umbrella DHCP Override toggle button to enable the Cisco Umbrella DHCP override.
The DNS IP addresses that a client obtains when connecting to the SSID are configured on the DHCP server. For Umbrella
enforcement to work, clients must send out DNS requests to Umbrella IP addresses (208.67.222.222, 208.67.220.220).
Umbrella DHCP Override ignores the DNS IPs configured via DHCP, and forces the Umbrella DNS IPs on the client
device. If you set Umbrella Mode to Forced, you do not need to enable Umbrella DHCP Override.

Step 8 Click Apply and then Save your configuration.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


115
Services
Applying Cisco Umbrella Profile to WLAN

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


116
CHAPTER 8
Advanced
This chapter contains the following sections:
• Managing SNMP, on page 117
• Setting Up System Message Logs, on page 120
• System Logs, on page 121
• Optimizing RF Parameters, on page 121
• Troubleshooting in Primary AP, on page 127
• Using Primary AP Tools, on page 128
• Troubleshooting Files, on page 130
• Security Settings, on page 132
• Cisco Business Dashboard Settings, on page 136

Managing SNMP
Simple Network Management Protocol (SNMP) is a popular network management protocol used for collecting
information from all the devices in the network and configuring and managing these devices. You can configure
both SNMPv2c and SNMPv3 access modes using the Primary AP web interface.

Configuring SNMP Access


You can configure the following SNMP access modes for the Primary AP:
• SNMPv2c only
• SNMPv3 only
• Both SNMPv2c and SNMPv3
• Neither SNMPv2c nor SNMPv3

Step 1 Navigate to Advanced > SNMP.


Step 2 In the SNMP window, enable SNMP Service option for querying the configuration using MIB browser. By default, the
SNMP service is disabled.
Step 3 Select the appropriate check box next to the SNMP Access to enable the desired SNMP mode. The SNMP access mode
is disabled by default.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


117
Advanced
SNMP Trap Receivers

The selected SNMP access mode is enabled.


For information about configuring SNMPv3 users using CBW AP, see topics on SNMPv3 later in this chapter.

Step 4 In the Read-Only Community field, enter the desired community name.
Step 5 In the Read-Write Community field, enter the desired community name.
Note The Read-Only / Read-Write Community field must contain a minimum of 8 characters in a combination of
lowercase/uppercase letters, digits, and special characters.

Step 6 Click Apply to save the SNMP access configurations.

SNMP Trap Receivers


A Simple Network Management Protocol (SNMP) Trap receiver captures, displays and logs SNMP Traps.
Traps are notices of events that are sent immediately to the SNMP client's trap receiver from the Primary AP
instead of waiting for a poll – a request – to the device by the SNMP client.
To add a SNMP Trap Receiver, do the following:

Step 1 Navigate to Advanced > SNMP > Add New SNMP Trap Receiver.
Step 2 In the Add SNMP Trap Receiver window, configure the following fields:
a) Receiver Name—Enter the desired username for the new Trap Receiver.
b) IP Address—Specify the IP address of the Trap Receiver to which you wish to connect.
c) Status—Enable/Disable the Trap Receiver. By default, it is enabled.
d) SNMPv3—If you have configured SNMP v3 access and have SNMPv3 User, then enable this option. By default, it
is disabled.
e) SNMPv3 User—Map the SNMPv3 User details for the Trap receiver entry, if SNMPv3 toggle is enabled.
The SNMP Trap Receiver table shows the list of SNMP Trap Receivers configured in the network.

Step 3 Click Apply.


To Edit/Delete the SNMP Trap Receivers, click the Edit/Delete icon in the row containing the SNMP Trap Receiver
whose details you wish to modify or delete.
The SNMP Trap Receivers table is refreshed and the updated entry appears in the table.
Note Few traps are enabled by default. For a complete list of available traps, refer to SNMP Traps in CBW AP, on
page 145.

Add an SNMPv3 User

Step 1 Navigate to Advanced > SNMP.


Step 2 Click the Add New SNMP v3 User button under the SNMP v3 Users section.
Step 3 In the Add SNMP v3 User window, enter the following details:

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


118
Advanced
Add an SNMPv3 User

Field Description
User Name Enter the desired username for the new SNMPv3 user.

Access Mode From the drop-down list, select one of the desired modes:
• Read Only
• Read/Write

The default is Read Only.

Authentication protocol From the Authentication Protocol drop-down list, select one of the options:
• HMAC-MD5
• HMAC-SHA
• None

The default authentication protocol is HMAC-SHA.

Authentication Password Enter the desired authentication password. Use a minimum password length of 12 - 31
characters.

Confirm Authentication Confirm the authentication password specified above.


Password
You can select the Show Password checkbox to display the entries in the Authentication
Password and the Confirm Authentication Password fields and verify if the characters
match.

Privacy Protocol From the drop-down list, select one of the options:
• CBC-DES
• CFB-AES-128
• None

The default privacy protocol is CFB-AES-128.

Privacy Password Enter the desired privacy password. Use a minimum password length of 12 - 31 characters.

Confirm Privacy Password Confirm the privacy password specified above.


Select the Show Password checkbox to display the entries in the Privacy Password and
the Confirm Privacy Password fields and verify if the characters match.

Step 4 Click Apply to create a new SNMPv3 user.


The newly added SNMP v3 User appears in the SNMP v3 Users table on the SNMP window. You can add up to a
maximum of 7 SNMPv3 users.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


119
Advanced
Delete SNMPv3 User

Delete SNMPv3 User

Step 1 Navigate to Advanced > SNMP.


Step 2 In the SNMP Setup, click the icon in the row containing the SNMPv3 user you wish to delete.
A warning message is displayed to confirm the action.

Step 3 Click Yes in the pop-up window.


The SNMP v3 Users table is refreshed and the deleted entry is removed from the table.

Setting Up System Message Logs


The System Message Log feature logs the system events to a remote server called a Syslog server. Each system
event triggers a Syslog message containing the details of that event.
If the System Message Logging feature is enabled, the Primary AP sends a message to the syslog server
configured on the Primary AP.

Before you begin


Set up a Syslog server in your network before you start the following procedure.

Step 1 Navigate to Advanced > Logging.


The Logging window appears.

Step 2 Click Add Server to add a new Syslog Server.


The System Message Log feature is enabled.

Step 3 In the Syslog Server IP field, enter the IPv4 address of the server to which the syslog messages are sent and click Apply.
The table displays the list of Syslog server configured in the network. You can delete the Syslog server if you wish.
Step 4 Set the severity level for filtering the syslog messages that are sent to the syslog server. From the Log Syslog Level
drop-down list, you can choose the severity level from one of the following (listed in the order of severity):
• Emergencies (0) (Highest severity)
• Alerts (1)
• Critical (2)
• Errors (3) (Default)
• Warnings (4)
• Notifications (5)
• Informational (6)
• Debugging (7) (Lowest severity)
Messages with a severity equal to or more than the set level are sent to the syslog server.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


120
Advanced
System Logs

Step 5 Click Apply.

System Logs
This feature is used to analyze the system logs depending upon the log level that the user sets. To view the
logs in Primary AP UI, do the following configurations.

Step 1 Navigate to Advanced > Logging. The Logging window is displayed.


Step 2 From the Log Buffer level drop-down list, choose the required log level for the system logs to be redirected to the logging
buffer.
The System logs will be displayed in the Logs section of the same page.
The wireless client events such as Assoc, Auth, Success, or failure logs will be logged in the Notification level (5).

Step 3 Click Clear to clear the logs displayed in the Primary AP UI.

Optimizing RF Parameters
To maximize your network's Wi-Fi performance, you can optimize the coverage and quality of the radio
frequency (RF) signals.

Step 1 Navigate to Advanced > RF Optimization.


Step 2 Enable the RF Optimization option to enhance your Wi-Fi performance by adjusting the radio parameters of the AP.
By default, Medium client density based RF settings is applied.

Step 3 Select the Client Density by moving the slider and choose the Traffic Type.
To know the values that are set when low, typical, or high client density type is selected, see RF Parameter Optimization
Settings, on page 126.

Step 4 Click Apply to save the changes.

Advanced RF Parameters
In addition to changing the client density and traffic type, you can also use the advanced parameters to maximize
your network's Wi-Fi performance. The following sections provide details for the same.

Optimized Roaming
Optimized roaming resolves the problem of sticky clients that remain associated to access points that are far
away and outbound clients that attempt to connect to a Wi-Fi network without having a stable connection.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


121
Advanced
Restrictions for Optimized Roaming

Optimized roaming allows clients to disassociate based on the RSSI of the client data packets and data rate.
The client is disassociated if the RSSI alarm condition is met and the current data rate of the client is lower
than the optimized roaming data rate threshold.
Optimized roaming also prevents client association when the client's RSSI is low by checking the RSSI of
the incoming client against the RSSI threshold. This check prevents the clients from connecting to a Wi-Fi
network unless the client has a viable connection. In many scenarios, even though clients can hear beacons
and connect to a Wi-Fi network, the signal might not be strong enough to support a stable connection.
You can also configure the client coverage reporting interval for a radio by using optimized roaming.
Optimized Roaming is useful in the following scenarios:
• To address the sticky client challenge by proactively disconnecting clients.
• To actively monitor data RSSI packets.
• To disassociate a client when the RSSI is lower than the set threshold.

Restrictions for Optimized Roaming


When BSS transition is sent to 802.11v capable clients before the disconnect timer expires, the client is
disconnected forcefully. BSS transition is enabled by default for 802.11v capable clients.

Configuring Optimized Roaming


Before you begin
Ensure you have switched to Expert View to be able to configure optimized roaming via Primary AP UI.

Step 1 Navigate to Advanced > RF Optimization. The RF Optimization page allows you to configure Optimized Roaming
parameters, Data Rates, Channels, Global Interferer detection.
Step 2 In the RF Optimization page, enable the 2.4GHz/5GHz Optimized Roaming toggle button to set interval and threshold
values.
If 2.4GHz/5GHz Optimized Roaming is enabled, the following parameters are displayed.
• 2.4GHz/ 5GHz Interval
• 2.4GHz/ 5GHz Threshold

Step 3 In the 2.4GHz Interval and 5GHz Interval text boxes, specify the values for the interval at which an access point reports
the client coverage statistics to the Primary AP.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


122
Advanced
Configuring Optimized Roaming

2.4GHz/5GHz Configures the client coverage reporting interval for 2.4GHz and 5GHz networks. The interval
Interval ranges from 5 seconds to 90 seconds (default). If you configure a low reporting interval, the
network can get overloaded with coverage report messages. The client coverage statistics
includes data packet RSSIs, Coverage Hole Detection and Mitigation (CHDM) pre-alarm
failures, retransmission requests, and current data rates.
• By default, the AP sends client statistics to the Primary AP every 90 seconds.
• If the Interval is set to a value other than the 90 second default, the client statistics will
be sent only during failure cases.

2.4GHz/5GHz Configures the threshold data rates for 2.4GHz and 5GHz. The Threshold values are disabled
Threshold by default.
• For 2.4GHz, the threshold values that can be configured are: 1, 2, 5.5, 6, 9, 11, 12, 18, 24,
36, 48, 54 Mbps.
Optimized roaming disassociates clients based on the RSSI of the client data packet and
data rate. The client is disassociated if the current data rate of the client is lower than the
Optimized Roaming Data Rate Threshold.
• For 5GHz, the threshold values that can be configured are: 6, 9, 12, 18, 24, 36, 48, 54
Mbps.

Event Driven RRM This toggle allows an AP in distress to bypass normal RRM intervals and immediately change
channels. This is a global setting and can be enabled or disabled.

Interferer detection This is a global setting which enables the Primary AP to detect the non Wi-Fi sources. By
default, it is disabled.

5GHz Channel Width This drop-down option controls how broad the signal is for transferring data as
20MHz/40MHz/80MHz/Best. By increasing the channel width, we can increase the speed and
throughput of a wireless broadcast. This Global setting is set to Best by default.

Step 4 Set the threshold data rates of the client by manipulating the 2.4GHz Data Rates and 5GHz Data Rates sliders.
The following data rates are available:
• 2.4GHz—1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, 54 Mbps
• 5GHz—6, 9, 12, 18, 24, 36, 48, 54 Mbps

Step 5 Select DCA Channels—One can select or click individual channels to be included in DCA for 2.4GHz and 5GHz band.
Note A green underline below the channel number indicates that it is selected. Click to unselect the same.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


123
Advanced
Target Waketime and Broadcast TWT

Target Waketime and Broadcast TWT


Target Waketime
Target Wake Time (TWT) is a power-saving mode that allows the client to stay asleep and to wake up only
at pre-scheduled (target) times to exchange data with the Access Point.
2.4GHz This toggle is used to globally enable/disable Target Waketime support for 2.4GHz
radio in all Wi-Fi 6 APs/Mesh Extenders in the network. By default, this is Enabled.

5GHz This toggle is used to globally enable/disable Target Waketime support for 5GHz
radio in all Wi-Fi 6 APs/Mesh Extenders in the network. By default, this is Enabled.

Broadcast TWT Support


2.4GHz This toggle is used to globally enable/disable Broadcast TWT support for 2.4GHz
radio in all Wi-Fi 6 APs/Mesh Extenders in the network. By default, this is Enabled.

5GHz This toggle is used to globally enable/disable Broadcast TWT support for 5GHz radio
in all Wi-Fi 6 APs/Mesh Extenders in the network. By default, this is Enabled.

BSS Color
2.4GHz This toggle is used to globally enable/disable BSS Color support for 2.4GHz radio in
all Wi-Fi 6 APs/Mesh Extenders in the network. By default, this is Enabled.

5GHz This toggle is used to globally enable/disable BSS Color support for 5GHz radio in
all Wi-Fi 6 APs/Mesh Extenders in the network. By default, this is Enabled.

BSS Color Auto Assignment


2.4GHz This drop-down is used to globally enable/disable BSS Color Auto Assignment for
2.4GHz radio in all Wi-Fi 6 APs/Mesh Extenders in the network. By default, this is
Enabled.

5GHz This toggle is used to globally enable/disable BSS Color support for 5GHz radio in
all Wi-Fi 6 APs/Mesh Extenders in the network. By default, this is Enabled.

RF Profiles
RF Profiles allows you to tune groups of APs that share a common coverage zone together and selectively
change how RRM will operates the APs within that coverage zone. For example, a university might deploy
a high density of APs in an area where a high number of users will congregate or meet. This situation requires
that you manipulate both data rates and power to address the cell density while managing the co-channel
interference. In adjacent areas, normal coverage is provided and such manipulation would result in a loss of
coverage.
Using RF profiles and AP groups allows you to optimize the RF settings for AP groups that operate in different
environments or coverage zones. RF profiles are created for the 802.11 radios. RF profiles are applied to all
APs that belong to a group, where all APs in that group will have the same profile settings.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


124
Advanced
RF Profiles

The RF profile gives you the control over the data rates and power (TPC) values. One can either associate a
built in RF Profile with AP Groups, or create a new RF Profile and then associate that with the AP Group.
To configure the RF Profile, do the following:

Step 1 Switch to Expert View in the CBW Web-UI by clicking the bi-directional arrows toggle button on the top-right.
Step 2 Navigate to Advanced > RF Profiles.
Step 3 Click Add New RF Profile.
Step 4 Under the General tab, configure the following:
• RF Profile Name—Provide a RF Profile name.
• RF Profile description—Provide an one-line reference for it.
• Band—Select the band 2.4GHz or 5GHz.
• Maximum Clients per radio—Select the maximum clients per radio. By default, it is 200. The maximum value
that is configurable is 200.
• Rx SOP Threshold—Receiver Start of Packet Detection Threshold (RxSOP) determines the Wi-Fi signal level in
dBm at which an access point's radio demodulates and decodes a packet. The default value is Auto.
As the Wi-Fi level increases, the radio sensitivity decreases and the receiver cell size becomes smaller. Reduction
of the cell size affects the distribution of clients in the network. RxSOP is used to address clients with weak RF
links, sticky clients, and client load balancing across access points. RxSOP helps to optimize the network performance
at high-density deployments (i.e larger number of clients) where access points need to optimize the nearest and
strongest clients.
• Multicast data rate—Use the Data rates option to specify the rate at which the multicast traffic can be transmitted
between the access points and the client. The default value is Auto.

Step 5 In the 802.11 tab, set the data rates and MCS for the RF profile.
• Data Rates—Use the Data rates option to specify the rate at which the data can be transmitted between the access
points and the client. The default rate is 11 Mbps.
• MCS Settings—The MCS settings determine the number of spatial streams, the modulation, the coding rate, and
the data rate values that are used. Ensure that all of the 0 to 31 MCS data rate indices are enabled (which is the
default setting).

Step 6 In the RRM tab, set the following parameters:


• Channel Width—By default, 20 MHz and cannot be changed.
• Select DCA Channels—The DCA dynamically manages channel assignment for an AP group. It also evaluates the
assignments on a per AP radio basis. The DCA makes decisions during an RSSI based cost metric function which
evaluates performance based on interference for each available channel.
It dynamically adjusts the channel plan to maintain performance of individual radios.

Step 7 In the Client Distribution tab, set the following parameters:


• Window—In the Window size text box, enter a value between 0 and 20. The default size is 5. The window size
becomes part of the algorithm that determines whether an access point is too heavily loaded to accept more client
associations.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


125
Advanced
RF Parameter Optimization Settings

The access point with the lowest number of clients has the lightest load. The window size and the number of clients
on the access point with the lightest load forms the threshold. Access points with more client associations than this
threshold is considered busy, and clients can associate only to access points with client counts lower than the threshold.
• Denial—In the Denial Count text box, enter a value between 1 and 10. The denial count sets the maximum number
of association denials during load balancing. The default size is 3.

Step 8 Click Apply.

RF Parameter Optimization Settings


Use this feature to select the appropriate RF Parameter Optimization settings for your deployment. The
following table shows the default values when low, typical, or high client density type is selected.

Note If you do not enable RF Parameter Optimization during the initial configuration wizard, then client density
is set to Typical (the default value), and RF traffic type is set to Data (the default value).
The TPC (Tx Power Control) algorithm determines whether the power of an AP needs to be adjusted down.
Reducing the power of an AP helps mitigate co-channel interference with another AP on same channel in
close proximity.

Table 8: RF Optimization Table

Parameter Dependency Typical (Default High Density (Where Low Density (For
Profile) throughput is most coverage in open
important) spaces)
TX Power Global per band Default Higher Highest

TPC Threshold, Specific RF profile TPC Threshold: TPC Threshold: TPC Threshold:
TPC Min, and TPC per band
• -70 dBm for 5 • -65 dB for • -60 dBm for
max (These
GHz 5GHz 5GHz
parameters are
equivalent to TX • -70 dBm for • -70 dB for 2.4 • -65 dBm for
Power) 2.4 GHz GHz 2.4 GHz

TPC Min: Default at TPC Min: +7 dBm TPC Min: -10 dBm
-10dBm for 2.4 GHz and -10
TPC Max: Default
dBm for 5GHz.
TPC Max: Default at 30 dBm
at 30 dBm TPC Max: Default
at 30 dB

RX Sensitivity Global per band Default (Automatic) Medium (RX-SOP) Low


(Advanced
RX-SOP) RF
profiles

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


126
Advanced
Troubleshooting in Primary AP

Parameter Dependency Typical (Default High Density (Where Low Density (For
Profile) throughput is most coverage in open
important) spaces)
CCA Threshold Global per band Default (0) Default (0) Default (0)
802.11a only
(hidden) RF Profiles

Coverage RSSI Global per band Default (Data: Default (Data: Default (Data:
Threshold Data and Voice -80dBm, Voice: -80dBm, Voice: -90dBm, Voice:
RSSI RF Profiles -80dBm) -80dBm) -80dBm)

Coverage Client Global per band Default (3 clients) Default (3 clients) Lower (2 clients)
Count (Coverage
Exception) RF
Profiles (Coverage
Hole Detection)

Data Rates Global per band 12 Mbp mandatory 12 Mbp mandatory CCK rates enabled
(network) RF
9Mbp supported 9Mbp supported 1, 2, 5.5, 6, 9, 11, 12
Profiles
Mbp enabled
1, 2, 5.5, 6, 11 Mbp 1, 2, 5.5, 6, 11 Mbp
disabled disabled

Troubleshooting in Primary AP
To troubleshoot in the Primary AP, there are features that allow you to check the connectivity, internet access,
radio admin state and to analyze the logs depending upon the log level setting. The following sections describe
these features.

UI Indicator
Once you login into the Primary AP GUI, navigate to Monitoring > Network Summary. Check the following
indicators:
• LAN Indicator—Shows if the default gateway IP of management interface is reachable.
• Internet Indicator—Shows if the public DNS (8.8.8.8) is reachable.
• Wireless Indicator—Checks the wireless connectivity by looping through all the APs present in Primary
AP for both the global networks provided both networks (A and B) are enabled. If any of the network is
down in any of the APs, the wireless status is considered to be down. Otherwise, the wireless indicator
is operational

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


127
Advanced
Using Primary AP Tools

Using Primary AP Tools

Note This feature is available only for administrative user accounts with read and write privileges.

You use the Primary AP Tools page to manage the following operations:

Restarting the Primary AP


Follow the steps below to restart the Primary AP.
1. Navigate to Advanced > Primary AP Tools.
2. Click Restart Primary AP.

Clearing the Primary AP Configuration and Resetting to Factory Defaults


This procedure resets your Primary AP to its factory-default configuration.

Step 1 Navigate to Advanced > Primary AP Tools.


Step 2 In the Primary AP Tools page, click Reset to Factory Default.
This erases the current Primary AP configuration, resets the configuration to the factory-default values, and reboots the
Primary AP.

Step 3 After the Primary AP reboots, proceed to Launching the Setup Wizard, on page 12.

Export and Import Primary AP Configuration


Exporting / Saving Primary AP Configuration
At any time, you can export the current Primary AP configuration to a .txt file format.
To export the current configuration follow the steps below.
1. Navigate to Advanced > Primary AP Tools.
2. Click Export Configuration under Configuration management.
3. Set the direction as download and Transfer Mode as HTTP.

The configuration file is saved on the device in which the Primary UI is being viewed. By default the file is
saved as config.txt in your downloads folder.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


128
Advanced
Saving the Primary AP Configuration

Importing / Restoring Primary AP Configuration


To import a configuration from a previously saved configuration file, which is in .TXT file format follow the
steps below.
1. Navigate to Advanced > Primary AP Tools.
2. Under Configuration management, select direction as Upload.
3. Select the Transfer mode as HTTP/TFTP/SFTP/FTP.

If HTTP is selected as Transfer mode, browse the file and click Apply.
If FTP/SFTP/TFTP is selected as Transfer mode, configure the IP address, File path, File name, and other
mandatory parameters and click Apply.

Note You can also do regular import of configuration file, by selecting FTP/SFTP/TFTP transfer mode and by
enabling Scheduled Update and configuring the Frequency, Time, window.
By default, the option is disabled.

The import causes all Primary AP-capable APs in the network to reboot. When the APs come back online,
the Primary AP Election process happens and a Primary AP comes online with the new imported Primary AP
configuration.
For more information about the Primary AP Election Process, see Primary AP Failover and Election Process,
on page 142.

Saving the Primary AP Configuration


Access points have two kinds of memory:
• The active, but volatile RAM
• The nonvolatile RAM (NVRAM)

During normal operation, the current configuration of the Cisco Business Wireless AP resides on the RAM
of the Primary AP. During a reboot, the volatile RAM is completely erased, but the data on the NVRAM is
retained.
You can save the Primary AP configuration from the RAM to the NVRAM. This ensures that in the event of
a reboot, the Primary AP can restart with the last saved configuration.
To save the Primary AP current configuration from the RAM to the NVRAM:
1. Click Save Configuration at the top-right of the Primary AP web interface.
2. Click Ok.

Upon successful saving of the configuration, a message conveying the same is displayed.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


129
Advanced
Troubleshooting Files

Troubleshooting Files
This section helps you to download the Support Bundle which includes configuration, logs and crash files for
trouble shooting.

Note Disable the Pop-up blocker in your browser settings so you can upload or download the configuration file.

Click Download Support Bundle for downloading support bundle to local machine.
The support bundle can also be downloaded via FTP Server if configured.
1. Specify the following:
• IP address
• File path
• Username
• password
• server port

2. Select Apply settings and Export.

Cisco Business Wireless will attempt to export troubleshooting files as soon as they are generated. If export
of troubleshooting files to FTP server is successful, the files are deleted from Cisco Business Wireless.

Troubleshooting Tools
The following tools can be used for troubleshooting:

SSHv2 Access
1. Switch to the Expert View, if you are currently in the Standard View.
2. Enable Secure Shell Version 2 (SSHv2) access mode for Primary AP console, that uses data encryption
and a secure channel for data transfer. By default, this is Disabled.

Note By default, SSH is disabled for all APs that are connected to the CBW network. SSH can be enabled only by
TAC for debugging purposes.

DNS Servers
• Choose Umbrella to use Public Open DNS Services
• Choose User Defined DNS to configure custom defined DNS Services.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


130
Advanced
Uploading Files

Ping Test
This is similar to the client ping test. You can use this test to check if a particular IP (IP received by sub-ordinate
APs or client or open DNS IP) is reachable.
Example: Ping 8.8.8.8

DNS
This feature is used to verify if a particular DNS entered is valid.
Example: Ping google.com

Radius Response
This operates like a simulation tool to verify if the Primary AP is able to reach the RADIUS server. For this,
you should have at least one WLAN with WPA2 Enterprise as the access type. It is also used to verify if the
username and password details exist in the RADIUS server.
Click Start to run all the tests above.

Uploading Files
This section details the process to upload files to the Primary AP from WebUI using the local file upload such
as (HTTP), FTP or TFTP.
To upload a file, follow the steps below:

Step 1 Navigate to Advanced > Primary AP Tools > Upload File.


Step 2 Select the File Type to upload. It can be one of the following:
OUI file This file contains list of device MAC-IDs and specific owner for the device MAC-ID. The latest
file can be downloaded from http://standards-oui.ieee.org/oui.txt. Only a .txt file format is
allowed.

EAP Device These are the certificates that are needed for Extensible Authentication Protocol (EAP) based
Certificate authentication of the device.
Once the certificate is uploaded successfully, reload the Primary AP to apply the new certificate.

EAP CA Certificate Certificate Authority (CA) Certificates that are needed for Extensible Authentication Protocol
(EAP) based authentication. Only a .pem, .crt file format are allowed.

CCO Root CA CloudCenter Orchestrator (CCO) Root CA based certificate for authentication of the device. Only
Certificate a .crt file format is allowed.
A CCO Root CA is a Certificate Authority that owns one or more trusted roots. That means that
they have roots in the trust stores of the major browsers.

CBD Serv CA The CA certs is used to establish a secure communication from CBW to CBD. If the CBD has
Certificate updated the self-signed certificate then that certificate file should be uploaded in the CBW.
If connection between CBW and CBD is based on CBD probe or if the CBD uses certificate
signed by a trusted certificate authority, CBD Server CA Certificate upload is not required. The
allowed certificate file formats are .pem, .crt, and .cert.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


131
Advanced
Security Settings

WEBAUTH This certificate is used for Captive portal. By default, CBW AP uses self-signed certificate for
Certificate guest users. You can also upload custom certificate for captive portal using this option. Only
.pem file format is allowed.

WEBADMIN This certificate used for CBW Primary AP UI Access. By default, CBW AP uses self-signed
Certificate certificate for management access page. You can also upload custom certificate for management
access using this option. Only .pem file format is allowed. Please ensure that CommonName
and SubjectAltName in the custom certificate is ciscobusiness.cisco.
For both Web Auth or Web Admin certificate to upload:
• When the certificate is uploaded successfully, the Primary AP has to be reloaded to apply
the new certificate.
• The root CA certificate has to be installed in the client browser.

Step 3 Select HTTP, FTP, or TFTP for the Transfer Mode and provide relevant details.
Step 4 If the Transfer Mode is HTTP (Local Machine), click Browse and upload the file. If the Transfer Mode is FTP/TFTP,
then please enter the server IP, filename, file path and upload the file.
Step 5 Enter the Certificate password.
This field is available only for EAP Device Certificate or Webauth Certificate or Webadmin Certificate File Type.
The fields Certificate name and Valid up to show the certificate name and the validity of the certificated that is used
by the CBW AP.

Step 6 Click Apply settings and Import to upload the new certificate.
The status of the certificate upload can be viewed in the same page. Once the certificate upload is successful, the Certificate
Name and Valid up to fields will be updated.

Security Settings
This section explains how to control the client traffic using the Primary AP UI, using the option to create ACL
rules and apply those rules at WLAN level.
This section also contains details about how to create and configure an ACL.

Access Control Lists


The Access Control Lists (ACLs) is a set of rules that is used to filter network traffic. ACLs contains a list of
conditions that categorize packets and help you determine when to allow or deny network traffic.
The ACLs on Cisco Business Wireless APs supports both IP based and domain based filtering. The rules can
be applied either before authentication (pre-Auth ACLs) or after authentication (post-Auth ACLs).
You can selectively allow URLs of your choice without authorizations. With this feature, more than one IP
can be learned for the FQDN configured in the URL rule, for both pre-auth and post-auth.
CBW AP supports the following:
• IPv4 and IPv6

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


132
Advanced
Configuring Access Control Lists (ACL)

• Wildcard match - Out of the 32 URL rules, a maximum of 20 characters can be wildcard matches.
• Allow/Deny Rules for any post-auth use.
• Configuration of ACL using the FQDN.
• 32 URL rules that can be configured per ACL name.

Note The features that are listed above are also applicable to post-auth.

The Primary AP is configured with the ACL name as per the WLAN, or an AP group, or an AP, or the data
returned by the AAA server. The data path of the AP, monitors the DNS requests or responses and learns the
IP address of the configured DNS names; and allows traffic for the IP addresses that have been learned.
If the ACL action Allow is used for a DNS response, the IP address will be added to the snooped list. For
post-auth ACL, if the URL action Deny is used, AP modifies the DNS response and sends the 0.0.0.0 IP
address to the client.
The two types of DNS ACL supported on Wave 2 APs are:
• Pre-Auth or Web-Auth DNS ACL: These ACLs have URLs set to Allow before the client authentication
phase. If the client has the URL rule set to Allow, then the client data is switched locally. If the URLs
do not match any rule, then all the packets are forwarded to the Primary AP.
By default, if the client data does not match any of the configured rules on the AP, the AP sends that
traffic to the Primary AP for L3 authorization.
• Post-Auth DNS ACL: These ACLs are applied when the client is running. Post-Auth ACL name can be
configured on the WLAN and it can be overridden by the ACL name configured on the AAA server for
a given client. If the ACL rule action is set to Deny for any URL, these URLs do not get any IP addresses
in the DNS response. The APs over-write the DNS response with 0.0.0.0 and sends it to the client.

Configuring Access Control Lists (ACL)


To configure Access Control Lists (ACLs) for pre-auth, follow the steps below:

Note • Enabling the policy ACL, will make the ACL to be added to default-flex-group and pushed down to APs.
• You can create a maximum of 32 IPv4 and IPv6 ACLs.
• You can also configure both IP and URL rules for the same ACL name.
• ACL rules are applied to the VLAN. Multiple WLANs can use the same VLAN and inherit ACL rules,
if any.

Step 1 Navigate to Advanced > Security Settings.


Step 2 In the Security Settings, click Add new ACL.
The Add ACL Rule window is displayed.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


133
Advanced
Configuring Access Control Lists (ACL)

Step 3 To add new ACL rules, do the following steps:


a) Choose the ACL Type. It can be either IPV4 or IPV6.
b) Enter the ACL Name.
c) Use the Policy ACL toggle button, to enable or disable the ACL policy.
The device that supports policy-based ACLs allows you to apply access control policies across object groups. An
object group is a group of IP addresses or a group of TCP or UDP ports. When you create a rule, you specify the
object groups rather than specifying IP addresses or ports.
d) Click the Add IP Rule button.
e) In the Add/Edit IP ACLs window, enter the following details and click Apply:
Action From the Action drop-down list, choose Deny for the ACL to Block packets or Permit for the
ACL to allow packets.
The default is set to Deny. The AP can permit or deny only IP packets in an ACL. Other types
of packets, such as ARP packets cannot be specified.

Protocol Specify the type of protocol. From the Protocol drop-down list, choose the protocol ID of the
IP packets to be used for this ACL. It can be one of the following or other layer 3 protocols.
• Any—Any protocol (this is the default value)
• TCP—Transmission Control Protocol
• UDP—User Datagram Protocol
• ICMP—Internet Control Message Protocol
• ESP—IP Encapsulating Security Payload
• AH—Authentication Header
• GRE—Generic Routing Encapsulation
• IP in IP—Internet Protocol (IP) in IP (permits or denies IP-in-IP packets)
• Eth Over IP—Ethernet-over-Internet Protocol
• OSPF—Open Shortest Path First

Other Any other Internet Assigned Numbers Authority (IANA) protocol. If you choose Other, enter
the number of the desired protocol in the Protocol text box. You can find a list of available
protocols in the IANA website.
When you specify Others as the protocol, you must specify the protocol number in the text
box that appears.

Source IP/Mask You can specify the starting range (here source IP) for applying the IP ACL.

Mask Masks are used with IP addresses in IP ACLs to specify what should be permitted and denied.
Example: 255.255.255.0

Source Port You can choose a single TCP/UDP source port to which packets are matched.

Dest. IP You can specify the ending range (destination IP) for applying the IP ACL.
Address/Mask

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


134
Advanced
Applying the ACL to WLAN at Pre-Auth Level

Dest. Port If you have chosen TCP or UDP, you will need to specify a Destination Port. This destination
port can be used by applications that send and receive data to and from the networking stack.
Some ports are designated for certain applications such as Telnet, SSH, HTTP, and so on.

DSCP From the DSCP drop-down list, choose one of these options to specify the differentiated services
code point (DSCP) value of this ACL. DSCP is an IP header text box that can be used to define
the quality of service across the Internet. You can choose:
• Any—Any DSCP (this is the default value).
• Specific—A specific DSCP ranging from 0 to 63, which you can specify in the DSCP edit
box.

f) After configuring all the above details, click Apply to configure IP ACL.
g) Click Add URL Rules.
h) In the Add/Edit URL ACLs window, enter the URL and specify to permit or deny in the Action field.
You cannot add the same URL in IPv4 and IPv6.
i) Click Apply.
On the Security Settings page, the ACL Type, ACL Name, and the Policy Name are listed. You can also view if the
policy names are mapped.

Applying the ACL to WLAN at Pre-Auth Level

Step 1 Navigate to Wireless Settings > WLANs.


Step 2 In the WLANs window, click the Edit icon next to the Guest WLAN where you want to add the ACL name.
Step 3 In the Edit WLAN window, under the WLAN Security tab, from the ACL Name (IPv4) and ACL Name (IPv6)
drop-down lists, choose a value.
Step 4 Click Apply.

Applying the ACL to WLAN at Post-Auth Level

Step 1 Navigate to Wireless Settings > WLANs.


Step 2 In the WLANs window, click the Edit icon next to the WLAN where you want to add ACL rules.
The Edit WLAN window is displayed.
Step 3 Under the VLAN & Firewall tab, in the Enable Firewall field, choose Yes to enable the firewall.
Step 4 In the WLAN Post-auth ACL section, select either ACL Name(IPv4) or ACL Name(IPv6), or both.
Step 5 Click Apply.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


135
Advanced
Configuring AAA Override in WLAN

Configuring AAA Override in WLAN


The Allow AAA Override option of a WLAN allows you to configure the WLAN for identity networking. It
allows you to apply VLAN tagging, QoS, and ACLs to individual clients based on the returned RADIUS
attributes from the AAA server.

Step 1 Switch to the Expert View, if you are currently in the Standard View.
Step 2 Navigate to Wireless Settings > WLANs.
Step 3 In the WLANs window, click the Edit icon next to the WLAN to select it.
Step 4 In the Edit WLAN window, choose the Advanced tab and enable the Allow the AAA Override toggle button.
Step 5 Click Apply.

Cisco Business Dashboard Settings


Cisco Business Dashboard Overview
Cisco Business Dashboard (CBD) is a network management tool for deploying and maintaining Cisco Business
Switches, Routers, and Wireless Access Points.

Configuring Cisco Business Dashboard Settings


You can connect CBW Access Points to Cisco Business Dashboard (CBD) by configuring the following
parameters under CBD Settings in the Primary AP UI.

Note The configuration shown below is not applicable if you are using a CBD probe to manage CBW.
When CBW is managed by CBD probe, you are required to configure the SNMP settings on the Primary AP.
Refer to Managing SNMP, on page 117 for more details.

1. Navigate to Advanced > CBD settings. The Cisco Business Dashboard window displays the following
parameters:
• Connection Status—Indicates if the connectivity status between the CBW and CBD is up or down.
• Agent Version—Specifies the CBD agent version. For example, version 2.4.0

Note To troubleshoot issues with CBD connection, refer to Resolving connection issues between CBW and CBD,
on page 150.

2. In the CBD settings page, configure the following fields.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


136
Advanced
Cisco Business Dashboard Settings

Note Ensure that the data you provide on this page matches with the data configured in the CBD application.
To login and verify the details as configured in the CBD application, refer to Cisco Business Dashboard
Administration Guide.

Dashboard To enable/disable the CBW connection with CBD application.


Connection Enabled

Dashboard Name or Specify the IP address or dashboard name to which you wish to connect.
IP
The name or IP address specified in this field must be listed in the
Subject-Alternative-Name field of the certificate on Cisco Business Dashboard.
Refer to the Managing Certificates in the Cisco Business Dashboard
Administration Guide for more information on configuring the certificate.

Dashboard Port The default HTTPS port is 443.

Organization Name Enter the organization name created in the CBD application.

Network Name Enter the organization name created in the CBD application.

Access Key ID Enter the access key id created in the CBD application.

Access Key Secret Enter the access key secret created in the CBD application.

3. Click Save to establish a connection between the CBW and CBD.

Note If the CBD is using a self-signed certificate, download a copy of that certificate from the CBD application.
Follow the instructions below to download:
1. In the CBD page, navigate to System > Certificate and select the Current Certificate tab.
2. Click Download at the bottom of the page. The certificate will be downloaded in PEM format by your
browser.

To upload the certificate, refer to Uploading Files, on page 131.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


137
Advanced
Cisco Business Dashboard Settings

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


138
APPENDIX A
Appendix - Supporting Topics
This appendix contains the following sections:
• LAN port functionality for different models, on page 139
• LED Color Indicators for Cisco Business Wireless APs, on page 139
• Primary AP Failover and Election Process, on page 142
• Pre-downloading an Image to an Access Point, on page 143
• Creating a Guest Network, on page 143
• Resetting a Device to Factory Default, on page 144
• SNMP Traps in CBW AP, on page 145
• Deployment and Troubleshooting Guidelines, on page 146
• Access Point Configuration Files, on page 150

LAN port functionality for different models


Cisco Business AP Type Wired Ethernet Ports AP Mode Mesh Mode
Model
CBW150AX Primary Capable AP 1 (Uplink POE-PD) NA Ethernet Bridging

CBW151AXM Mesh Extender NONE NA NA

LED Color Indicators for Cisco Business Wireless APs


This chapter provides information on the LED behavior for Primary APs and Mesh Extenders. It also details
the LED states during TFTP and HTTP upgrades.

LED behavior for Primary Capable Access Points


The Cisco access point has an LED indicator on the face of the unit for CBW150AX and CBW151AXM AP
models.
After you have mounted the access point, connect and power up the Access Point. Observe the LED state to
determine the device operation. The following table provides description for different states of the LED and
their patterns on the AP device.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


139
Appendix - Supporting Topics
Appendix - Supporting Topics

For normal Reload of Primary Capable APs, the LED states are as follows:

Table 9: LED behavior for Primary Capable Access Points

Stages of LED States CBW150AX


Stage — 1 White
POE cable plug in Then blinking green

Stage — 2 Blinking blue (below 20 secs)


Mode button pressed Solid red (after 20 secs when kept pressed)

Stage — 3 Off
Mode button released / Pressed for more than
60 seconds (Logs: Starting Image…)

Note The Mode Button functionality described in stages 1, 2, and 3 above are applicable for both Mesh
Extenders and Primary Capable Access Points.

Stage — 4 Blinking green (normal boot)


Sequence of boot up (Logs: Linux version….) Off (if stages 2 and 3 occur)

Stage — 5 Blinking green


Sequence of boot up (Logs: 5g radio Off (if stages 2 and 3 occur)
Domain...)

Stage — 6 Cycles through red, green, off


Radio Init stage and waiting for Uplink IP
config

Stage — 7 Cycles through green, red, off


IP assigned and Capwap Init (If a Primary AP
exists in network, it moves to stage 8 else
switchdriver process starts)

Stage — 8 Cycles through green, red, off


Capwap discovery to join state and image data If image version mismatch occurs it will blink blue.
response followed by image upgrade if version
mismatch and reload (LED stages1-7)

Stage — 9 Solid green


Capwap setup, configure and run without
clients connected (skip stage-8 if the image
version is same)

Stage — 10 Solid blue


At least one client connected

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


140
Appendix - Supporting Topics
LED Display Settings

LED behavior for Mesh Extenders


Stages 1-6 in the following table is similar for both the Primary Capable AP (CBW150AX) and Mesh Extender
(CBW151AXM). The different stages for mesh joining process is as follows:

Table 10: LED behavior for Mesh Extenders

Process Mesh Extender CBW151AXM


Mesh Stage —1
Cycles through red, green, off
Starting mesh and searching for parent

Mesh Stage — 2 Cycles through green, red, off


IP assigned and CAPWAP Init

Mesh Stage — 3 Blinking blue


Mesh AP image data
Note If the Mesh AP image version doesn’t match the Primary
AP version, the Mesh AP will begin to upgrade and then
reload. Reload will cycle through Primary Capable stages
1-6, and then Mesh stages 1 - 2.

Mesh Stage — 4 Solid green


Mesh AP image data - Version match

Mesh Stage — 5 Solid green


Mesh AP joined Primary AP

Stage — 6 Solid blue


At least one client connected

LED behavior during TFTP / HTTP Upgrade


When the AP or Mesh Extender starts to pre-download (TFTP or HTTP) the LED will begin blinking blue.

LED Display Settings


To enable, disable, or set the LED display to blink on an access point, do the following using the web UI:

Step 1 Navigate to Monitoring > Network Summary > Access Points.


Step 2 Click on the access point the list that you want to enable/disable the LED.
Step 3 Click Tools from the menu list.
Step 4 Click AP LED disable to turn off the LED display. By default the LED is ON.
Step 5 To identify a particular access point from a group of access points placed together, click Blink AP LED.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


141
Appendix - Supporting Topics
Primary AP Failover and Election Process

Primary AP Failover and Election Process


Primary AP Redundancy for Failover
In a Cisco Business Wireless network, not all APs have the capability to work as a Primary AP. See Supported
Cisco Access Points, on page 1 to know which AP models are capable of working as a Primary AP.
To enable a failover, your network must have two or more active APs with Primary AP capability. In the
event of a failover, one of these other APs will automatically be elected as a Primary. The newly elected
Primary will have the same IP and configuration as the original Primary. From an administrator perspective,
there will be no difference between the original Primary and the newly elected Primary in case of a failover.

Note Clients that connect to the Primary AP will lose connectivity during a failover.

Primary AP Forced Failover


You can manually force any AP that has the capability, to become the Primary AP. This forced failover of
the Primary AP to another Primary Capable AP of your choice can be performed using the Primary AP UI.
To perform a forced failover using the Primary AP UI:
1. Choose Navigate to Wireless Settings > Access Points.
2. In the Access Points window, click the Edit icon next to the AP you want to set as Primary.
The Edit window with the General tab is displayed.
3. Under the General tab, click Make Me Primary AP next to the Operating Mode field.

Note The Make Me Primary button is available only for the subordinate APs that are capable of participating in
the Primary election process.

When you force the failover of the Primary to an AP of your choice using the UI, the current Primary AP
reboots. The new AP takes over as the Primary AP with the IP address and configuration as the previous
Primary. When the reboot is complete the previous Primary comes back online and joins the new Primary AP
as a subordinate AP.

Note The forced failover causes downtime in the Cisco Business Wireless network. During this downtime, clients
associated to wired uplink APs will not face any disruption in service and no new clients can be connected.

Primary AP Election Process


In a Cisco Business Wireless network, when the Primary AP shuts down, one of the other Primary Capable
APs in this deployment is automatically designated as the Primary AP. The automatic selection of the Primary
AP among the Primary-capable APs is an internal automatic Primary election process. This process is used
to both detect the failure of the Primary AP and to designate the new Primary AP among the eligible APs.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


142
Appendix - Supporting Topics
Pre-downloading an Image to an Access Point

This process is based on Virtual Router Redundancy Protocol (VRRP) that algorithmically determines the
next Primary AP, based on the following parameters listed in the order of descending precedence:
• The AP configured as next-preferred Primary.
• The AP with the least load in terms of the number of associated clients.
• Among APs with a similar client load, the AP with the lowest MAC address.

Pre-downloading an Image to an Access Point


To minimize network outages, an upgrade software image is downloaded to the AP from the Primary AP
without resetting the access point or losing network connectivity. This means that the upgrade image to the
Primary AP is downloaded, and then the image is downloaded to all the Primary Capable APs and Mesh
Extenders while the network is still up.
When the Primary AP reboots, the APs are disassociated and reboot. The Primary AP comes up first, followed
by the APs, all with their upgraded images. Once the Primary AP responds to the discovery request sent by
an AP with its discovery response packet, the AP sends a join request.

Creating a Guest Network


Login to the Primary AP Web UI, and navigate to Wireless Settings > WLANs.

Step 1 Click Add new WLAN.


Step 2 Set Profile name and SSID under the General tab.
Step 3 Under WLAN Security tab, enable Guest Network using the slider toggle button.
Step 4 Choose the type of web portal in the Captive Portal option. It can be either Internal Splash Page or External Splash
Page.
Step 5 Choose one of the Access Type for Authentication.
For example, if you want your guests to use their Google/Facebook accounts for authenticating, use Social Login as the
Access Type for your Guest WLAN.

Step 6 Choose the ACL Name if you want the guest to access or block few sites / IP.
Step 7 Click Apply to create the Guest WLAN.
Once the Guest connects to your Guest WLAN, it pop ups an Authentication page, and the network access is provided
if successfully authenticated.
Note • You can also export Guest information by navigating to Monitoring > Network Summary > Guests
option.
• The login page of the Guest WLAN can be configured in Web UI under Wireless Settings > Guest WLAN
page. Refer to the section Setting a Login Page for WLAN Guest Users, on page 79.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


143
Appendix - Supporting Topics
Resetting a Device to Factory Default

Resetting a Device to Factory Default


To reset to factory default using the Mobile App:
• Select the … More icon on the bottom right of the screen, then select Reset to Factory Default.

To clear the Primary AP configuration and reset the entire network, see Clearing the Primary AP Configuration
and Resetting to Factory Defaults, on page 128.
To factory default a single AP, refer to the Factory Default section, under Tools in the Viewing Access Point
Details, on page 25.
To reset the AP or Mesh extender to factory default using the Mode button, follow the steps below.
1. Remove or unplug the power to the device.
2. Press and hold the Mode button while re-applying power to the device.
3. Once the LED pattern changes to solid red, release the Mode button and allow the device to continue
booting up.

The location of the Mode button on the CBW150AX and CBW151AXM models are shown below.
• CBW150AX: the mode button is located at the back of the device near the Ethernet port.

• CBW151AXM: the mode button is located at the side of the device near the Power button.

Note If the Mode button is pressed for over 60 seconds, the factory default reset is ignored. If the Mode button is
pressed after the device boots up, it is ignored.
After a few seconds, the device LED will begin blinking blue for 20 seconds, and then switch to solid red.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


144
Appendix - Supporting Topics
SNMP Traps in CBW AP

SNMP Traps in CBW AP


You can configure the SNMP trap receiver in CBW UI and receive the SNMP traps. The SNMP Trap receiver
can be configured using the Web UI by navigating to Advanced > SNMP. The following table lists the set
of SNMP traps available in CBW AP and the instance at which these traps are triggered:

Table 11: SNMP Traps in CBW AP

Category Trap Name Purpose


System/Primary AP Authentication Flag Sending traps with invalid SNMP access.

Multiple Users Flag Sending of traps when multiple logins of Primary


AP are active.

configsave Sending of traps when Primary AP save config


called by UI/CLI.

strong-pwd check Sending of traps when Primary AP user credential’s


password policy is changed.

802.11 client Excluded Wireless client exclusion trap; If any client


excluded by Primary AP, triggers this trap.

Max Client Wrning Threshold Triggers the trap when the system reaches 90% of
max client associated with this Primary AP.

Nac-Alert Traps Sending of traps when the client joined on NAC


enabled WLAN.

WebAuthUserLogin Guest user login on Guest WLAN.

WebAuthUserLogout Guest user logged out/client delete from Primary


AP.

Cisco AP AuthFailure Access point authentication failure trap while


Access point joining to the Primary AP it checks
the mac filter. It is applicable in Mesh mode.

Register Access point join/disjoin from the Primary AP.

InterfaceUp Access point radio interface up/down trap.

modeChange Any operational mode change.

802.11 Security WEP/WPA Decrypt Error Sending traps if any wep/wpa decrypt error detected
on any of the APs.

IDS Signature attack detected Sending traps if any IDS signature attack (Assoc,
deauth flood) is detected by the Access point .

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


145
Appendix - Supporting Topics
Deployment and Troubleshooting Guidelines

Category Trap Name Purpose


AAA auth Sending when an AAA authentication failure occurs
for management user, net user, or MAC filter.

servers sending when no RADIUS servers are responding.

Rogue Rogueap Sending trap when detects the Rogue AP

Auto-RF Client/Channels Load,Noise, Sending trap when failure or max threshold reached
Profiles(RRM) interference, coverage hole for the RRM measurements.

Txpower Send trap when Access points radio’s tx power


level changed.

Channel Send trap when Access points radio’s channel


changed.

Mesh auth failure Send trap when Mesh Extender’s authentication is


failed.

child excluded parent Sending trap if Mesh Extender excludes the parent
node.

parent change Send trap if mesh extender changes the parent.

child moved Send trap if mesh extender moved from this parent.

excessive parent change Send trap if mesh extender change parent rapidly.

onsetSnr Send trap if parent SNR is poor (less than 12).

abate SNR Send trap if parent SNR is high ( more than 60).

excessive association Send trap if mesh extender attempted too many


association (10 count without success).

excessive children Send trap if any node has more than 20 mesh
extenders (this will not hit for SMB customers).

Deployment and Troubleshooting Guidelines


This section provides details on deployment and troubleshooting issues.

Placing an AP/ Mesh Extender


Place the Mesh extenders in the line of sight of the Primary/Primary Capable AP or another Mesh Extender.
Walls and other objects between the Mesh Extender and the Primary/Primary Capable AP or other Mesh
Extenders may interfere or reduce connectivity.
Check the SSID signal strength of the Primary AP and place the Mesh Extender in a location that has enough
signal strength.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


146
Appendix - Supporting Topics
Appendix - Supporting Topics

The table below gives an approximate coverage area of CBW APs in the open space. The values can be reduced
by a factor of 20-30% in case of office/home deployments and the APs could be placed apart at a computed
distance.

AP Meters Feet
CBW150AX 15 to 18 50 to 60

CBW151AXM 15 to 18 50 to 60

Avoid placing the Mesh Extenders very close to each other and other Primary Capable APs.
Locate the Mesh Extenders where the Signal to Noise Ratio (SNR) value is good (more than 30).

Note Navigate to Monitoring > Network Summary > Mesh Extender to check the SNR value.

You can also identify the Nearest APs for each Mesh Extender by checking on Nearest APs field under
Monitoring > Access Points. Select the Mesh Extender and then refer to the General section in the Access
Point View page.

Setting Up Channel of Primary/Primary Capable APs


The Radio channel settings for Access Points and Mesh extenders default to Automatic. The channel settings
for an Access Point or Mesh Extender can be changed in the Web UI by navigating to Wireless Settings >
Access Points, and selecting the Edit AP action from the table. A pop-up window will have a tab for Radio
1 (2.4GHz) and Radio 2 (5GHz). For Mesh extenders, the backhaul radio channel is controlled by the Primary
AP (by default 5GHz) and cannot be changed in the Mesh Extender window.
Following are some of the instances in which you would need to change the channel of Primary/Primary
Capable APs for better performance.
By default, the APs in mesh deployment are configured with the mesh backhaul radio configured for channel
number 36 and channel width as 80MHz in 5GHz radio.
• If additional Primary Capable APs are deployed to primarily provide additional capacity, then they should
be deployed on a different channel than its neighboring Primary/ Primary Capable APs to minimize the
co-channel interference.
• If many Rogue APs are present in the APs current channel, then change the channel of the Primary
Capable APs. To view the Rogue APs, navigate to Monitoring > Rogues > Access Points.
• If Channel Utilization is high (greater than 75) and Interference is high in the serving channel, then
change the channel in the AP. You can view the following error logs by navigating to Advanced >
Logging > Logs.
Following is an example of a log displayed in the Logs window:

*RRM-DCLNT-5_0: Dec 25 16:51:34.543: %RRM-3-HIGHCHANNEL_UTIL: rrmLrad.c:7678


Interference is high on AP: APA453.0E1F.E480 [Level: 85] on Radio:
5Ghz(Radio2).Change Channel (Wireless->Access Points->Edit AP->Radio->Channel) to get
better/stable performance.

• Choose non-DFS channels (36-48, 149-165) for maximizing the coverage, as DFS channels (channel 52
- 144) will have low power level. To change the channel for the AP:

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


147
Appendix - Supporting Topics
Appendix - Supporting Topics

1. Navigate to Wireless Settings > Access Points.


2. Select the AP to edit in the channel.
3. Change the Channel under Radio 2 in Mesh deployments.

In a Non-Mesh deployment:
1. Switch to Expert view.
2. Navigate to Advanced > RF optimization > Select DCA channels > 5Ghz.
3. Deselect the DFS channel numbers.

Note Nations apply their own RF emission regulations to the allowable channels, allowed users, and maximum
power levels within the frequency ranges.

Recommendation on Mesh Hop Count


• Data Traffic: Maximum of 4 hops
• Voice Traffic: Maximum of 2 hops

Grouping Mesh Extenders using BGN name


You can deploy more than one Primary Capable AP in your network in the same sector (area), and can logically
group the Mesh Extenders by configuring BGN string under Wireless Settings > Access Points > Edit Access
point > Mesh tab. By default, the BGN value is set with first 10 characters of the configured SSID during
initial setup. If BGN is configured, then Mesh Extenders will select the same BGN configured Parent. If there
is no matched BGN configured parent, it will select any parent in the network and periodically disconnect
and check for matched BGN parent.

Note This option is available in Expert View only.

Best practices for HTTP Image Upgrade


• Prefer a wired client to do the image upgrade, or a wireless client with a good connection score.
• Place the wireless client near the Primary AP and ensure it is connected while trying to upgrade image
through HTTP image transfer method.
• Ensure your wireless client has high signal strength (greater than -65 dBm) and a good connection score
(higher than 75%) to avoid any image download failures.
• If the image upgrade constantly fails, then use the Cisco.com mode for the Image upgrade.
• When uploading the images using HTTP method, you see a Transfer fail error on the Chrome browser,
the self-signed certificate of Primary AP should be added in the Trusted Root Authority.

Adding Self-Signed certificate of Primary AP in Windows:

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


148
Appendix - Supporting Topics
Appendix - Supporting Topics

1. Navigate to the Primary AP UI using https://ciscobusiness.cisco or https://<managementip>, and click


through the usual warnings for untrusted certificates.
2. In the address bar, right click on the Not Secure red warning triangle. Select Certificate to display the
certificate.
3. In the pop-up window select the Details tab, and click Copy to File at the bottom right corner of the
tab.
4. This launches the Certificate Export Wizard. Click Next at the bottom of the screen.
5. In the radio-button dialogue select the format. Leave the default DER encoded binary X.509 (.CER)
and click Next.
6. Use Browse option to select a folder path to download the exported certificate. Click Next to export
the certificate and then click Finish.
7. Click OK in the pop-up window to confirm the export was successful.
8. In the original Certificate pop-up window, click OK again.
9. Open the Chrome Settings page and click Privacy and security tab on the left navigation pane.
a. Click the more arrow to expand this section.
b. Choose the Manage certificates area.

10. In the pop-up Certificates window, select the Trusted Root Certification Authorities tab.
11. Click on the Import button to launch the Certificate Import Wizard.
12. Click Next.
13. Select Browse and use the explorer window to locate the certificate you exported in the earlier step.
14. Click Next and then Finish.
15. In the Security Warning pop-up window, click on Yes. You should see yet another pop-up letting you
know that the import was successful.
16. Restart Chrome, and navigate to the Primary AP UI using https://<managementip>. You should see a
closed padlock and Secure annotation to the left of the URL.

Adding Self-signed certificate of Primary AP in macOS:


Navigate to the Primary AP UI using https://ciscobusiness.cisco or https://<managementip>. Do the following
in Chrome:
1. Navigate to Developer Tools > Security tab.
2. Click View Certificate to see the certificate.
3. Click and drag the image to your desktop.
4. Open the Keychain Access utility in OS X.
5. Select the System option on the left.
6. Click the lock icon on the upper-left to enable changes.
7. In the lower left corner of the screen select the Certificates option.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


149
Appendix - Supporting Topics
Access Point Configuration Files

8. Drag the certificate you copied to the desktop into the list of certificates.
9. After the certificate is added to the System keychain, double-click to open it.
10. Expand the Trust section. For the first option, pick Always Trust.
11. Quit Chrome and all other browsers and navigate to the Primary AP UI using https://<managementip>.
You should see the closed padlock and Secure annotation to the left of the URL.

Note Use https://<managementip> to access the Primary AP UI, if the self-signed certificate is added to your
machine.

Resolving connection issues between CBW and CBD


• If the connection is based on a CBD probe, please ensure that the SNMP configuration in CBD and CBW
are the same. To configure the SNMP details of the device on CBD, refer to Managing Device Credentials
in the Cisco Business Dashboard Administration Guide.
• If the connection between CBD and CBW is a direct management connection, ensure the following:
• Verify if the credentials specified in CBD Settings page, is the same as created in CBD.
• Verify if the correct certificate file is uploaded in CBW (in case CBD uses self-signed certificate).
• Verify that the name or IP address configured for the Dashboard in CBW is listed in the
Subject-Alternative-Name field of the dashboard's certificate
• Check the system logs in the logging page.

Access Point Configuration Files


Description Status Table

Primary AP Primary The default active image version of the Primary AP.
Image

Primary AP Backup The backup image version of the Primary AP.


Image

AP Primary Image The active image version of the access point.

AP Backup image The backup image version of the access point.

Pre-download status If the access point is going for an software update the corresponding
pre-download status is displayed.

Pre-downloaded version Version of the pre-downloaded image during software upgrade process.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


150
APPENDIX B
Appendix - Mounting and Grounding Access
Points
This appendix contains the following sections:
• About Mounting, on page 151
• Preparing the AP for Installation, on page 151
• Mounting the CBW150AX, on page 152
• Mounting the CBW151AXM, on page 156
• Grounding an Access Point, on page 157

About Mounting
These mounting instructions describe the steps for mounting supported Cisco Business Wireless series Access
Points in several configurations, including on a suspended ceiling, on a hard ceiling or wall, and above a
suspended ceiling. The Mesh Extender can only be plugged into an AC outlet.

Preparing the AP for Installation


Before you mount and deploy your Access Point, we recommend that you perform a site survey (or use the
site planning tool) to determine the best location to install your Access Point.
You should have the following information about your wireless network available:
• Access Point locations.
• Access Point mounting options: on a wall or a ceiling only.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


151
Appendix - Mounting and Grounding Access Points
Mounting the CBW150AX

Note You can mount the Access Point above a suspended ceiling but you must purchase additional mounting
hardware. For additional information, see mounting and grounding sections for individual Access Point models
in the later sections.
Access Points mounted in a building’s environmental airspace must be powered using PoE to comply with
safety regulations.
The CBW150AX Access Point model is powered through PoE and the CBW151AXM model is plugged
directly into an AC source.
Cisco recommends that you make a site map showing Access Point locations so that you can record the device
MAC addresses from each location and return them to the person who is planning or managing your wireless
network.

Mounting the CBW150AX


The Cisco Business Wireless 150AX Access Point Access Points can be mounted in several configurations;
on a suspended ceiling, on a hard ceiling or wall, or in the plenum air space above a suspended ceiling.

Note When mounting the Access Point in the plenum air space or above a suspended ceiling, it should be mounted
on a vertical wall or with the face of the Access Point (having the status LED) directed downwards.

Mounting the Hardware


Mounting hardware for access points consists of brackets, which connect to the bottom of the Access Point,
and ceiling grid clips, which connect the bracket to a suspended ceiling. The bracket that you need depends
on the mounting location for the Access Point. The ceiling grid clip that you need depends on the type of
suspended ceiling where you need to install the Access Point. You don’t need ceiling grid clips if you are
mounting the Access Point to a hard-surface ceiling or a wall.

Note The ceiling grid clip is not included in the original packaging and must be ordered separately.

Mounting Brackets
The standard mounting hardware supported by the Access Point is a mounting bracket (Part #74-123953-01)
for ceiling and wall with 4 expansion screws. You can fasten the bracket to the wall or ceiling using these
screws.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


152
Appendix - Mounting and Grounding Access Points
Appendix - Mounting and Grounding Access Points

Figure 4: Low-profile bracket installed on an Access Point

Mounting an Access Point on a Hard Ceiling or a Wall


This section describes the steps required to mount the Access Point on a ceiling or wall constructed of 3/4-in
(19.05-mm) or thicker plywood using #8 fasteners using the mounting bracket.

Note Access points with integrated antennas perform best when the Access Point is mounted on horizontal surfaces
such as a table top or ceiling. For advanced features such as voice, location, and rogue Access Point detection,
ceiling mounting is strongly recommended. However, for smaller areas such as conference rooms, kiosks,
transportation environments, or hot-spot usage where data coverage is the primary concern, the unit may be
wall mounted using wall anchors or screws.

To mount the Access Point on a solid ceiling or wall, follow the steps below.
1. Use the mounting bracket as a template to mark the locations of the mounting holes on the bracket.
• Be sure to mark all four locations. To ensure a safe and secure installation, make sure you are using
adequate fasteners and mount the Access Point using no less than four fasteners.
• Do not use plastic wall anchors or the keyhole slots on the mounting bracket for ceiling installations.
When mounting the Access Point on a hard ceiling, use four fasteners capable of maintaining a
minimum pullout force of 20 lbs (9 kgs).

2. Use a #29 drill (0.1360-in. [3.4772 mm]) bit to drill a pilot hole at the mounting hole locations you
marked.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


153
Appendix - Mounting and Grounding Access Points
Appendix - Mounting and Grounding Access Points

The pilot hole size varies according to the material and thickness you are fastening. Cisco recommends
that you test the material to determine the ideal hole size for your mounting application.
3. (Optional) Drill or cut a cable access hole large enough for the Ethernet cable and the building ground
wire.
4. (Optional) Use the ground screw to attach the building ground wire to the mounting bracket. See
Grounding an Access Point, on page 157 for general grounding instructions.
5. Position the mounting bracket mounting holes (with indents down) over the pilot holes.
6. Insert a fastener into each mounting hole and tighten.
7. Connect the Ethernet cable to the Access Point.
8. Align the bracket feet over the keyhole mounting slots on the Access Point.

9. Gently slide the Access Point onto the mounting bracket keyhole slots until it clicks into place.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


154
Appendix - Mounting and Grounding Access Points
Appendix - Mounting and Grounding Access Points

10. Fasten the Access Point to the bracket using the M2 x 5.5mm Torx security screw. Cover it with the
mylar label.

Mounting an Access Point Above a Suspended Ceiling


Using third-party accessories (not offered by Cisco) you can mount an Access Point above a suspended ceiling.

Note Install access points above ceiling tiles only when mounting below the ceiling is not an option. Mounting
access points above the ceiling can interfere with advanced wireless LAN features that depend on uniform
coverage, such as voice and location.

Figure 5: T-Bar Grid Mounting Bracket Parts

1. Suspended ceiling T-rail


2. Box hanger
3. Box hanger clip
4. Mounting bracket
5. Access Point
6. T-rail clip

To mount the Access Point above a suspended ceiling, follow the steps below.
1. Remove a ceiling tile next to the mounting location.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


155
Appendix - Mounting and Grounding Access Points
Mounting the CBW151AXM

2. Fasten the Access Point mounting bracket to the box hanger using the clip or screws provided with the
box hanger kit.
3. Connect the Ethernet cable to the Access Point.
4. Align the bracket feet over the keyhole mounting slots on the Access Point.
5. Slide the Access Point onto the mounting bracket until it clicks into place.
6. Attach the T-rail clips on each end of the T-bar box hanger to the ceiling rails. Make sure the clips are
securely attached to the T-rails.
7. Fasten the Access Point to the bracket using the M2 x 5.5mm Torx security screw. Cover it with the mylar
label.
8. Replace the ceiling tile.

Mounting the CBW151AXM

CBW151AXM Mesh Extender can be directly plugged into AC power wall socket power outlet, providing
120~240V AC, 50~60Hz power.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


156
Appendix - Mounting and Grounding Access Points
Grounding an Access Point

Grounding an Access Point


Grounding is not always required for indoor installations because Cisco Business Access Points are classified
as low-voltage devices and do not contain internal power supplies. We recommend that you check your local
and national electrical codes to see if grounding is a requirement.
Although grounding is not mandatory for indoor Access Points, it is required in certain scenarios. It has been
observed that an ungrounded indoor Access Point that is mounted too close to an electromagnetic source of
interference (such as a fluorescent light that is on) may reboot suddenly or suffer hardware damage. This
occurs even if the indoor AP is in close proximity to the electromagnetic source of interference, and not
touching the source. Grounding the corresponding Access Point or the mounting bracket helps prevent this
issue from occurring. We recommend that a certified electrical technician verify whether your installation
requires grounding.
If grounding is required in your area or you wish to ground your Access Point, do the following:

SUMMARY STEPS
1. Find a suitable building grounding point as close to the Access Point as possible.
2. Connect a user-supplied ground wire to the building grounding point. The wire should be a minimum of
#14AWG assuming a circuit length of 25 ft (30.5 cm). Consult your local electrical codes for additional
information.
3. Route the ground wire to the Access Point.
4. Attach the wire to a suitable grounding O-ring lug.
5. Crimp or solder the wire to the lug.
6. Insert the grounding post screw into the O-ring lug and install it on the mounting bracket as shown in the
figure above.
7. Use a Phillips screwdriver to tighten the ground screw.

DETAILED STEPS

Step 1 Find a suitable building grounding point as close to the Access Point as possible.
Step 2 Connect a user-supplied ground wire to the building grounding point. The wire should be a minimum of #14AWG
assuming a circuit length of 25 ft (30.5 cm). Consult your local electrical codes for additional information.
Step 3 Route the ground wire to the Access Point.
Step 4 Attach the wire to a suitable grounding O-ring lug.
Step 5 Crimp or solder the wire to the lug.
Step 6 Insert the grounding post screw into the O-ring lug and install it on the mounting bracket as shown in the figure above.
Step 7 Use a Phillips screwdriver to tighten the ground screw.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


157
Appendix - Mounting and Grounding Access Points
Grounding an Access Point

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


158
APPENDIX C
Appendix - Glossary of Terms
This appendix contains the following sections:
• Cisco Business Wireless - Glossary Of Terms, on page 159

Cisco Business Wireless - Glossary Of Terms


0-9

802.1Q-based VLAN
The IEEE 802.1Q specification establishes a standard method for tagging Ethernet frames with VLAN membership information, and
defines the operation of VLAN bridges that permit the definition, operation, and administration of VLAN topologies within a bridged
LAN infrastructure. The 802.1Q standard is intended to address the problem of how to divide large networks into smaller parts so
broadcast and multicast traffic does not use more bandwidth than necessary. The standard also helps provide a higher level of security
between segments of internal networks

802.1X Supplicant
Supplicant is one of the three roles in the 802.1X IEEE Standard. The 802.1X was developed to provide security in Layer 2 of the
OSI Model. It is composed of the following components: Supplicant, Authenticator, and Authentication Server. A Supplicant is the
client or software that connects to a network so that it can access resources on that network. It needs to provide credentials or certificates
to obtain an IP address and be part of that particular network. A Supplicant cannot have access to the network’s resources until it has
been authenticated.

A
ACL
An Access Control List (ACL) is a list of network traffic filters and correlated actions used to improve security. It blocks or allows
users to access specific resources. An ACL contains the hosts that are permitted or denied access to the network device. ACLs can
be defined in one of two ways: by IPv4 address or by IPv6 address.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


159
Appendix - Glossary of Terms
Allowlist

Allowlist
Allowlist is a list of Client/Mesh Extender MAC addresses that are allowed to join the network.

Anti Clog Threshold


Anti-clogging token is a mechanism to protect entities from Denial of Service (DoS) attack. Anti-clogging token is bound to MAC
address of the station (STA). The length of the token cannot be more than 256 bytes.
The threshold is configured in terms of resource percentage. On hitting the threshold for the resource, the primary AP starts to reject
authentication commit requests that come with anti-clogging token.

B
Band Steer
Advanced load balancing, better known as band steering, is a feature that detects devices capable of transmitting at 5GHz band. The
2.4GHz band is often congested and experiences interference from different devices such as Bluetooth, and even microwave ovens.
This feature allows your Access Point to steer and direct devices to a more optimal radio frequency, thus, improving network
performance

Bandwidth
Bandwidth is the measurement of the ability of a device to send and receive information.

Bandwidth Utilization
Bandwidth utilization allows you to place a threshold on the average successful data transfer through a communication path. Some
of the techniques used to improve this are bandwidth shaping, management, capping, and allocation.

Basic Service Set (BSS) Coloring


BSS Coloring is a method to differentiate between BSS (APs and their clients) on the same RF channel. Wi-Fi 6 enables each AP
radio to assign a value (from 1 to 63), known as the BSS color, to be included in the PHY header of all HE transmissions from devices
in its BSS.
With devices of each BSS transmitting a locally-unique color, a device can quickly and easily distinguish transmissions coming from
its BSS from those of a neighboring BSS.

Blocklist
A Blocklist is a list of Client/Mesh Extender MAC addresses that are denied to join the network.

C
Captive Portal
Captive Portal method forces LAN users or hosts on the network to see a special web page before they can access the public network
normally. Captive Portal turns a web browser into an authentication device. The web page requires user interaction or authentication
before the access is allowed to use the network.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


160
Appendix - Glossary of Terms
CBD Probe

CBD Probe
Cisco Business Dashboard Probe is installed at each site in the network and associated with the Dashboard. The probe performs
network discovery and communicates directly with each managed device.

Central web authentication (CWA)


CWA offers the possibility to have a central device that acts as a web portal. Once the user logs into the portal, it is possible to
re-authenticate the client so that a new Layer 2 MAC filtering occurs using the Change of Authorization (CoA). This way, the ISE
remembers that it was a webauth user and pushes the necessary authorization attributes to the Primary AP for accessing the network.

Channel Isolation
A device with channel management enabled, automatically assigns wireless radio channels to the other A2 devices in the cluster. The
automatic channel assignment reduces interference with other access points outside of its cluster and maximizes Wi-Fi bandwidth to
help maintain the efficiency of communication over the wireless network. Automatic channel assignments are supported in non-mesh
deployments.

Channel Width
Channel width controls how broad the signal is for transferring data. Think of it like a highway. The wider the road, the more traffic
(data) can pass through. On the other hand, the more cars (routers) you have on the road, the more congested the traffic becomes. By
increasing the channel width, we can increase the speed and throughput of a wireless broadcast. By default, the 2.4GHz frequency
uses a 20 MHz channel width. A 20MHz channel width is wide enough to span one channel.
A 40 MHz channel width bonds two 20 MHz channels together, forming a 40 MHz channel width; therefore, it allows for greater
speed and faster transfer rates.

Client QoS
The Client Quality of Service (QoS) Association is a section that provides additional options for customization of a wireless client’s
QoS. These options include the bandwidth allowed to send, receive, or guaranteed. Client QoS Association can further be manipulated
with the use of Access Control Lists (ACL).

Connection Speed
Connection speed is the speed that data is transferred between your client and the internet.

D
DCA
Dynamic Channel Assignment (DCA) can dynamically determine best bandwidth for each AP connected to the Primary AP. DCA
algorithm manages, evaluates the channel assignments on AP on per radio basis. It automatically adjusts the channel to maintain
performance of individual radios.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


161
Appendix - Glossary of Terms
E

E
EAPol
Extensible Authentication Protocol (EAP) over LAN (EAPoL) is a network port authentication protocol used in IEEE 802.1X (Port
Based Network Access Control) developed to give a generic network sign-on to access network resources.
EAPoL, is a simple encapsulation that can run over any LAN. The following are the three main components defined in EAP and
EAPoL to accomplish the authentication conversation:
• Supplicant—Port Authentication Entity (PAE) seeking access to network resources
• Authenticator—PAE that controls network access
• Authentication Server—RADIUS/AAA server

Event Logging
System events are activities in the system that may require attention and necessary actions to be taken in order to run the system
smoothly and prevent failures. These events are recorded as logs. System Logs enable the administrator to keep track of particular
events that take place on the device. Event logs are useful for network troubleshooting, debugging packet flow, and monitoring events.

F
Fast Roaming
Fast roaming between wireless access points permits a fast, secure, and uninterrupted wireless connectivity to achieve seamless
mobile experience for real-time applications such as FaceTime, Skype, and Cisco Jabber.

H
HTTPS
Hyper Text Transfer Protocol Secure (HTTPS) is a transfer protocol that is more secure than HTTP. The Access Point can be managed
through both HTTP and HTTPS connections when the HTTP/HTTPS servers are configured. Some web browsers use HTTP while
others use HTTPS. An Access Point must have a valid Secure Socket Layer (SSL) certificate to use HTTPS service.

I
IPv4
IPv4 is a 32-bit addressing system used to identify a device in a network. It is the addressing system used in most computer networks,
including the Internet.

IPv6
IPv6 is a 128-bit addressing system used to identify a device in a network. It is the successor to IPv4 and the most recent version of
the addressing system used in computer networks. IPv6 is currently being rolled out around the world. An IPv6 address is represented

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


162
Appendix - Glossary of Terms
ISE

in eight fields of hexadecimal numbers, each field containing 16 bits. An IPv6 address is divided into two parts, each part composed
of 64 bits. The first part being the Network Address, and the second part the Host Address.

ISE
Identity Services Engine (ISE) is a network administration product that enables the creation and enforcement of security and access
policies for endpoint devices connected to the company's routers and switches. The purpose is to simplify identity management across
diverse devices and applications.

L
LLDP
Link Layer Discovery Protocol (LLDP) is a discovery protocol that is defined in the IEEE 802.1AB standard. LLDP allows network
devices to advertise information about themselves to other devices on the network. LLDP uses the Logical Link Control (LLC)
services to transmit and receive information to and from other LLDP agents. LLC provides a Link Service Access Point (LSAP) for
access to LLDP. Each LLDP frame is transmitted as a single MAC service request. Each incoming LLDP frame is received at the
MAC Service Access Point (MSAP) by the LLC entity as a MAC service indication.

Load Balancing
Load balancing is a network terminology which is used to distribute the workload across multiple computers, network links, and
various other resources to achieve proper resource utilization, maximize throughput, response time, and mainly avoid the overload.

Local Probe
Local probe is the same as Cisco Business Dashboard Probe. This may be installed on the same host as Cisco Business Dashboard
in order to manage devices on the network that is local to the Dashboard.

M
Max Data Rate
Maximum Data rate is the max speed at which data is transferred between two devices, measured in mega bits per second (Mbps or
mbps)

Multiple SSIDs
You can configure several Service Set Identifiers (SSIDs) or Virtual Access Points (VAPs) on your Access Point and assign different
configuration settings to each SSID. All the SSIDs may be active at the same time. Client devices can associate to the Access Point
using any of the SSIDs.

MU-MIMO
MU-MIMO (multi-user, multiple input, multiple output) is a wireless technology that was introduced in the 802.11ac Wave 2 (Wi-Fi
5) standard. It allows a single Access Point (AP) to transmit data to multiple devices simultaneously. MU-MIMO dramatically
improves performance and efficiency when APs are transmitting to client devices that support Wi-Fi 5 or Wi-Fi 6.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


163
Appendix - Glossary of Terms
N

N
Network Plug n Play
Network Plug and Play is a service that works in conjunction with Network Plug and Play enabled devices to allow firmware and
configuration to be managed centrally, and to allow zero-touch deployment of new network devices. Devices may be deployed directly
using the Network Plug and Play protocol, or indirectly if discovered by a probe that is associated with the Dashboard.

O
OFDMA
OFDMA (orthogonal frequency-division multiple access), a technology in Wi-Fi 6, improves wireless network performance by
establishing independently modulating subcarriers within frequencies. This approach allows simultaneous transmissions to and from
multiple clients.

Operating Mode
The A2 Access points, CBW140, CBW240, CBW145 are Primary Capable and they can serve as Primary AP. CBW141, CBW142,
CBW143 are Mesh Extenders. The Primary Capable AP can serve as Mesh Extenders wirelessly, in addition to connecting the clients.
The A2 Access Points acting as Mesh Extenders helps in extending the network coverage.

P
PMF
This is specific to 802.11w protocol. The 802.11w protocol applies only to a set of robust management frames that are protected by
the Protected Management Frames (PMF) service. These include Disassociation, Deauthentication, and Robust Action frames.

PMKID
Pairwise Primary Key Identifier (PMKID) is the unique key identifier used by the Access Point to keep track of the PMK being used
for the client.

PoE-PD
Power Over Ethernet Powered Device. An Ethernet port that can receive power to provide network connectivity.

PoE-PSE
Power Over Ethernet Power Sourcing Equipment. An Etherent port that can supply power and provide network connectivity.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


164
Appendix - Glossary of Terms
Q

Q
QoS
Quality of Service (QoS) allows you to prioritize traffic for different applications, users or data flows. It can also be used to guarantee
performance to a specified level, thus, affecting the quality of service of the client. QoS is generally affected by the following factors:
jitter, latency, and packet loss.

R
RADIUS Server
Remote Authentication Dial-In User Service (RADIUS) is an authentication mechanism for devices to connect and use a network
service. It is used for centralized authentication, authorization, and accounting purposes. A RADIUS server regulates access to the
network by verifying the identity of the users through the login credentials entered. For example, a public Wi-Fi network is installed
in a university campus. Only those students who have the password can access these networks. The RADIUS server checks the
passwords entered by the users and grants or denies access as appropriate.

Radio Domains
Based on the regulatory domain of the AP, the carrier set values will be set for both 2.4GHz and 5GHz. For example, the radio
domains for US regulatory domain is –A for 2.4GHz and –B for 5GHz.

Rogue AP Detection
A rogue Access Point (AP) is an Access Point that has been installed on a network without explicit authorization from a system
administrator. Rogue access points pose a security threat because anyone with access to the area can knowingly or unknowingly
install a wireless Access Point that can allow unauthorized parties to access the network. The Rogue AP Detection feature on your
Access Point allows it to see these rogue access points that are within the range and it displays their information in the web-based
utility. You can add any authorized access points to the Trusted AP List

S
Scheduler
The wireless scheduler helps to schedule a time interval for a Virtual Access Point (VAP) or radio to be operational, which helps to
save power and increase security. You can associate up to 16 profiles to different VAPs or radio interfaces, but each interface is
allowed only one profile. Each profile can have a certain number of time rules that control the uptime of the associated VAP or
WLAN.

Signal Quality
Signal quality is a value ranging from 0 to 100, which considers, the noise generated by interference sources, along with signal
strength.

Signal Strength
The signal strength is the wireless signal power level received by the wireless client. Strong signal strength results in more reliable
connections and higher speeds. Signal strength is represented in -dBm format (0 to -100). This is the power ratio in decibels (dB) of

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


165
Appendix - Glossary of Terms
Spatial Streams

the measured power referenced to one milliwatt. The closer the value is to 0, the stronger the signal. For example, -41dBm is better
signal strength than -61dBm.

Spatial Streams
Wi-Fi Spatial streaming or multiplexing is a transmission technique used in multiple-input-multiple-output (MIMO) wireless
communication to transmit/receive independent and separately coded data signals (which are called as streams), from each of the
multiple transmit antennas.
In other words, wireless signals that are transmitted or received by the various antennae are multiplexed by using different spaces
within the same spectral channel. These spaces is known as spatial streams.

Spectrum Intelligence
Spectrum intelligence scans for non-Wi-Fi radio interference on 2.4-GHz and 5-GHz bands, and provides basic functions to detect
interferences of three types, namely microwave, continuous wave (like video bridge and baby monitor), Wi-Fi and frequency hopping
(Bluetooth and frequency-hopping spread spectrum (FHSS) cordless phone).

SSID
The Service Set Identifier (SSID) is a unique identifier that wireless clients can connect to or share among all devices in a wireless
network. It is case-sensitive and must not exceed 32 alphanumeric characters. This is also called Wireless Network Name.

SSID Broadcast
When a wireless device searches the area for wireless networks that it can connect to, it will detect the wireless networks within its
range through their network names or SSIDs. The broadcast of the SSID is enabled by default. However, you may also choose to
disable it.

T
Target Waketime
A new power-saving mode called Target Wake Time (TWT) allows the client to stay asleep and to wake up only at pre-scheduled
(target) times to exchange data with the Access Point. This offers significant energy savings for battery-operated devices, up to three
to four times the savings achieved by 802.11n and 802.11ac.

V
VLAN
A Virtual Local Area Network (VLAN) is a switched network that is logically segmented by function, area, or application, without
regard to the physical locations of the users. VLANs are a group of hosts or ports that can be located anywhere in a network but
communicate as if they are on the same physical segment. VLANs help to simplify network management by letting you move a
device to a new VLAN without changing any physical connections

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


166
Appendix - Glossary of Terms
W

W
WDS
Wireless Distribution System (WDS) is a feature which enables the wireless interconnection of access points in a network. It enables
the user to expand the network with multiple access points wirelessly. WDS also preserves the MAC addresses of client frames across
links between access points. This capability is critical because it provides a seamless experience for roaming clients and allows
management of multiple wireless networks.

WPA/WPA2
Wi-Fi Protected Access (WPA and WPA2) are security protocols used for wireless networks to protect privacy by encrypting the
transmitted data over the wireless network. This uses AES type of encryption. The encryption keys that are used for each client on
the network are unique and specific to that client. WPA and WPA2 are both forward compatible with IEEE 802.11e and 802.11i.
WPA and WPA2 have improved authentication and encryption features compared to the Wired.

WPA2 Enterprise
This mode of security will use EAP-FAST for authenticating the Wireless clients and AES for encryption. Cisco Secure ACS server
will be used as the external RADIUS server for authenticating the wireless clients.
In Enterprise mode of operation there is a mutual authentication between a client and an authentication server (Internal or External).
In addition,it removes the administrative burden and security issues surrounding static encryption keys.

WPA3
Wi-Fi Protected Access 3 (WPA3) is the third iteration of a security standard or protocol developed by the Wi-Fi Alliance. WPA3
was designed to replace the WPA2 security standard, adding several security enhancements and tackling security vulnerabilities of
the WPA2 to better secure personal and enterprise wireless networks. WPA3 uses a more powerful and robust encryption by AES
with the GCMP (Galois/Counter Mode Protocol) and uses more reliable handshake mechanism called Simultaneous Authentication
of Equals (SAE).

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


167
Appendix - Glossary of Terms
WPA3

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


168
APPENDIX D
Appendix - Cisco Online Support
This appendix contains the following sections:
• Cisco Business Online Support, on page 169

Cisco Business Online Support


For current support information, visit the following URLs:

Cisco Business

Cisco Business Home http://www.cisco.com/go/ciscobusiness

Support

Cisco Business Support Community http://www.cisco.com/go/cbcommunity


Cisco Business Support and Resources http://www.cisco.com/go/smallbizhelp
Cisco Business Phone Support http://www.cisco.com/go/cbphone
Cisco Business Chat Support http://www.cisco.com/go/cbchat
Cisco Business Firmware Downloads http://www.cisco.com/go/smallbizfirmware
Select a link to download the firmware for your Cisco
product. No login is required.

Cisco Business Open Source Requests If you wish to receive a copy of the source code to
which you are entitled under the applicable free/open
source license(s) (such as the GNU Lesser/General
Public License), please send your request to:
[email protected].
In your request, please include the Cisco product
name, version, and the 18 digit reference number (for
example: 7XEEX17D99-3X49X08 1) found in the
product open source documentation.

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


169
Appendix - Cisco Online Support
Appendix - Cisco Online Support

Cisco Business Wi-Fi 6 Access Point Administration Guide, Version 10.2.2.0


170

You might also like