B Cisco Business Wifi 6 Admin Guide
B Cisco Business Wifi 6 Admin Guide
10.2.2.0
First Published: 2021-12-01
Last Modified: 2022-07-19
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
The documentation set for this product strives to use bias-free language. For purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on
age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that
is hardcoded in the user interfaces of the product software, language used based on standards documentation, or language that is used by a referenced third-party product.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
© 2022 Cisco Systems, Inc. All rights reserved.
The Java logo is a trademark or registered trademark of Sun Microsystems, Inc. in the U.S. or other countries.
© 2022 Cisco Systems, Inc. All rights reserved.
CONTENTS
CHAPTER 4 Monitoring 19
Troubleshooting a Client 35
Perform a Client Ping Test 36
Perform a Connection Test 37
Generate an Event Log 38
Viewing Mesh Extender 38
Viewing Applications 39
Viewing Rogue Access Points 40
Configuring the Rogue AP States 41
Viewing Rogue Client Details 41
Viewing Interferer Details 42
Wireless Dashboard 42
Customizing the Access Point Performance View 44
Adding or Removing a Widget 46
Customizing the Client Performance View 47
Adding or Removing a Client Widget 47
Global AP Configuration 73
Administering Access Points 73
Access Point Groups 79
Setting a Login Page for WLAN Guest Users 79
Setting the Default Login Page 80
Setting a Customized Login Page 80
About Cisco Mesh 82
Convert Non-Mesh to Mesh Deployment 82
Mesh Network Components 83
Changing Mesh Parameters 85
Backhaul Client Access 85
Mesh Backhaul Radio Resource Management 85
Mesh Backhaul Slot 85
VLAN Transparent 86
CHAPTER 6 Management 87
About Management Access Interface 87
Setting Up Management Access Interface 87
Limitation of Web Based Management Sessions 88
Managing User Priority Order 88
Managing Admin Accounts 89
Adding an Admin Account 89
Editing an Admin Account 90
Deleting an Admin Account 91
Managing Guest Users using the Lobby Admin account 91
Creating a Guest User Account 91
Managing TACACS+ and RADIUS Servers 92
Adding TACACS+ Servers 92
Configuring RADIUS Servers 93
Adding RADIUS Servers 95
Viewing Auth Cached Users 95
Setting Date and Time 96
Using NTP Servers to Automatically Set the Date and Time 96
Adding and Editing NTP Servers 96
F 162
Fast Roaming 162
H 162
HTTPS 162
I 162
IPv4 162
IPv6 162
ISE 163
L 163
LLDP 163
Load Balancing 163
Local Probe 163
M 163
Max Data Rate 163
Multiple SSIDs 163
MU-MIMO 163
N 164
Network Plug n Play 164
O 164
OFDMA 164
Operating Mode 164
P 164
PMF 164
PMKID 164
PoE-PD 164
PoE-PSE 164
Q 165
QoS 165
R 165
RADIUS Server 165
Radio Domains 165
Rogue AP Detection 165
S 165
Scheduler 165
WPA/WPA2 167
WPA2 Enterprise 167
WPA3 167
Note Your Cisco Business Wireless Wi-Fi 6 can interface with the Cisco Business Dashboard to monitor your
wireless network. For more details, refer to Cisco Business Dashboard Administration Guide.
Table 1: Cisco AP and Mesh Extenders supported in the CBW Wi-Fi 6 network
Note This Administration Guide contains information for all Primary Capable APs, Subordinate APs, and Mesh
Extenders in this series.
While the Primary AP (CBW150AX) may be used as Subordinate AP, the Mesh Extender (CBW151AXM)
cannot be used as a Primary AP.
The APs listed under Primary APs can also function as Subordinate APs.
Important The CBW150AX and CBW151AXM are not compatible with the CBW140-240 series Access Points and
Mesh Extenders.
Supported Browsers
Cisco Business Wireless Access Points are administered through a web user interface. To use this interface,
your browser must be one of the following:
• Microsoft Internet Explorer 10 or above
• Apple Safari version 7 or above
• Mozilla Firefox version 33 or above
• Google Chrome version 38 or above
You can also use the Cisco Business App on your mobile phone to monitor and administer the Access Points.
You will need one of the following Operating Systems:
Related Documents
The documentation for Cisco Business Wireless Wi-Fi 6 Access Points (AP) and Mesh Extenders are contained
in the guides listed below. You can access all these documents on Cisco.com. Select the support page for your
model and then select the product documentation page.
Resources Description
Administration Guide This guide provides details on performing configuration for Cisco Business
Wireless Wi-Fi 6 APs and also provides advanced options to manage and
monitor APs and Mesh Extenders in the Cisco Business Wireless Wi-Fi 6
network.
Refer to this guide for both Primary and Subordinate APs, and Mesh
Extenders of all models in this CBW Wi-Fi 6 series.
Quick Start Guide The Quick Start Guide provides details and directions on how to do the
initial setup and configuration for Cisco Business Wireless Wi-Fi 6 Access
Points (APs) and Mesh Extenders.
Release Notes Release Notes are a summary of the features and caveats for each software
build for Cisco Business Wireless Wi-Fi 6 APs and Mesh Extenders.
Open Source Documents This document contains the licenses and notices for any open source
(OSD) software that was used in this product.
Cisco Regulatory Compliance This document provides domestic and international regulatory compliance
and Safety Information and safety information for Cisco Business Wireless Wi-Fi 6 Access Points
(RCSI) (APs) and Mesh Extenders.
Translated End-User The Translated Administration Guides for all APs supported by the Cisco
Documents Business Wireless Wi-Fi 6 Access Points (APs) and Mesh Extenders are
available in the product pages on Cisco.com.
Web UI Setup Access this document on the Cisco.com product page when you want to
use the Web UI to set up your product with a wireless device.
1. The Header toolbar is where the feature interface is displayed. See the Header toolbar table below for
details.
2. The Navigation pane provides access to the Cisco Business Wireless features. Each of these main feature
tabs comprises of sub-level tabs. Click to expand and view the sub-level tabs. See the Navigation Pane
Options table below for details.
3. The Work pane is the area where the features interface is displayed. When you click an option in the
Navigation pane, its corresponding window opens in this area.
Header toolbar
Icon Description
A hamburger icon (toggle button) for expanding and collapsing the navigation pane.
Product The header title of the web interface indicates the AP or Mesh Extender model on which the
Name integrated CBW functionality is currently operating.
Click this icon to view the Cisco Business Access Point or Mesh Extender Online Help
documentation.
Click this icon to search for an AP or client using its MAC address.
A notification icon that indicates if there was an incident of system crash or if a core dump is
present.
This download icon indicates when a new software update is available for your CBW APs on
cisco.com. Click this icon to redirect to the software update page in the UI and download the
latest firmware.
Click this icon to save the current CBW AP configuration to the NVRAM. For more details,
see Saving the Primary AP Configuration, on page 129.
Click this icon to toggle between Standard View and Expert View, which provides access
to advanced options. The default is set to standard view.
When in Standard View the arrows are green and will change to blue when you are in Expert
View.
Click this mail icon to send your feedback or request for new features to Cisco Business
Wireless Team.
Click this gear icon to view the current system information, or to log off the Primary AP web
interface. It also specifies the username of the user who is logged into the application.
Wireless The Wireless Settings page is used to administer associated APs, manage
Settings WLANs, WLAN user accounts, and guest user accounts.
For more details, refer to About WLANs in CBW Access Point Network, on
page 49.
Management The Management page allows you to set management access parameters,
manage admin accounts, manage network time, and perform software updates.
For more details, refer to Setting Up Management Access Interface, on page
87.
The Advanced page provides the capability to set SNMP, syslog, and log
Advanced configuration settings, and perform a reset to factory default.
For more details, refer to the Advanced, on page 117.
Important The Cisco Primary AP cannot inter-operate or co-exist with other Primary APs
in the same network.
• Decide on the AP that will be set up as the Primary AP, and the other APs can then connect to it as
Subordinate APs. This ensures that the pre-defined CiscoBusiness-Setup Service Set Identifier (SSID)
is broadcast only by the Primary AP and not by other APs.
• Ensure that the AP is installed as per the instructions in the Quick Start Guide for this model as found
on Cisco.com.
• The initial setup of the CBW AP can be performed using one of the following methods:
• Through the Primary AP Setup Wizard and over Wi-Fi.
• Use the Cisco Business Mobile app.
• Use Network Plug n Play via Cisco Business Dashboard application. For details, see section,
Network Plug and Play in the Cisco Business Dashboard Administration Guide.
• If you are not using the Cisco Business Mobile App, you will need a wireless device to connect to the
pre-defined CiscoBusiness-Setup SSID broadcast by the Primary AP. You cannot access this SSID
through a wired network.
Note Only one client is allowed to connect to the Ciscobusiness-Setup SSID for security
purposes. If the connection is refused it means another device may have joined
automatically. In this case, you should reboot the AP.
• Your wireless device should have a compatible browser. For a list of browsers compatible with the CBW
AP Web UI see Supported Browsers, on page 2.
AP Deployment Models
The following deployment models are supported in the Cisco Business Wireless AP network.
• Non-Mesh deployment (wired deployment only) — All the APs in the CBW AP network have a Wired
Uplink. The supported APs in the network are Primary Capable. One is the Primary AP and the others
operate as Subordinate APs in the CBW network.
Supported AP (Primary AP) — CBW150AX.
Note Ensure that the switch is powered on and connected to the router for Internet
access.
• Mesh deployment (wireless deployment with single/multiple wired uplink APs)— In this deployment
model, the CBW AP network comprises of both Primary and Subordinate APs (wired APs and wireless
Mesh Extenders). The APs that have a wired uplink act as Root AP (RAP) to which the Mesh Extenders
(MAP) joins wirelessly. The Primary AP will act in Bridge mode. To set up this deployment, refer to
About Cisco Mesh, on page 82.
To add wireless Mesh Extenders to the network, add the Ethernet MAC address of the Extenders in the
local MAC address table of the Primary AP. For details, refer to Adding Mesh Extenders, on page 16.
Wireless Mesh Extenders have the dynamic algorithm to select the best RAP based on the signal strength
and join the same.
Note Ensure that you enable Mesh while configuring the Initial Setup Wizard for
this deployment model.
Only the Mesh Extender (CBW151AXM) is required to be manually added to the allowlist.
The the Subordinate AP (CBW150AX) is connected via wired uplink and is automatically added to the
allowlist.
You can obtain the MAC address by reading the QR code on the back of the device with a QR Reader
app on a wireless device. You can also find the MAC address at the bottom of the AP Device.
Supported APs in Mesh deployment:
• Primary AP — CBW150AX
• Subordinate AP — CBW151AXM and CBW150AX
Note APs listed as Primary Capable can also function as Subordinate APs.
Note You can use the Cisco Business Mobile app instead of the Web UI to run the setup wizard.
Step 2 Connect the wireless device to the CiscoBusiness-Setup SSID through Wi-Fi and enter the default password: cisco123.
The wireless device obtains an IP address from the subnet of the Primary AP.
Step 3 Launch a supported web browser, such as Chrome, Firefox, Safari, or Internet Explorer.
For Apple clients, after connecting to the CiscoBusiness-Setup SSID, the captive portal window may open with the
Welcome page followed by the initial Setup Wizard.
After connecting to the CiscoBusiness-Setup SSID and opening a web browser, you should automatically be redirected
to http://ciscobusiness.cisco. If not, type the URL: http://ciscobusiness.cisco in the address bar and press Enter.
Step 4 Click Start on the Cisco Business Wireless Access Point page to launch the Setup Wizard. You will be required to
create an admin account.
Only one client can be connected to the CiscoBusiness-Setup SSID at a time. If you see an invalid password error on
your client when connecting to CiscoBusiness-Setup SSID, it indicates that another client has been connected to the
SSID. The currently connected AP will display the LED status as solid green.
Turn off the connected client, and then proceed with the Setup Wizard configuration of your AP.
Welcome Screen
Click the Start button in the Welcome screen. The Cisco Business Wireless Access Point page relevant to
your AP model is displayed.
1. Create an admin user account on the Primary AP. You can enter up to 24 ASCII characters.
The username is case sensitive and cannot be cisco or any variant.
2. Enter a password. The password can contain 8-127 ASCII characters. When specifying a password, ensure
the following:
• The password must include a combination of lowercase letters, uppercase letters, digits, or special
characters. The special characters can be ~, !, @, #, $, %, ^, &, *.
• No character in the password can be repeated more than three times consecutively.
• The new password cannot be the same or the reverse of the username.
• The password cannot be cisco, ocsic, or any variant obtained by changing the capitalization of the
letters in the word Cisco. For example, you cannot substitute 1, I, or ! for i, 0 for o, or $ for s.
Field Description
Primary AP Name Enter the name that you want to assign to the Primary AP.
• A max of 24 characters is allowed.
• The characters can be upper/lowercase letters, numbers, dot, and hyphen.
Country Choose the country that matches the physical location of the CBW AP.
• The CBW AP will display only countries that are supported by the regulatory
domain of the AP. You can choose your country from the drop-down list.
• There are strict regulatory rules to operate under the proper country code
during usage.
Date and Time Specify the date. By default, your device's system time is applied. You can
manually edit the date and time, if required.
Mesh To add Mesh Extenders to your AP network, enable the Mesh option. By default
this option is disabled.
You can add Mesh Extenders after deployment.
Would you like Static IP Enable this option if you want to configure a static IP address for the management
for your Primary AP interface. If not, the interface gets an IP address from your DHCP server (typically
(Management Network) your router). By default, this option is disabled.
• A management IP address should be within current subnet of your local
VLAN and not in the client pool issued by your DHCP server.
• If you choose to configure the static IP address, then you will be required
to enter data in the following fields. If not, proceed to the next section.
Even when a static IP address is selected for the Primary AP, a DHCP server is
still required to provide IP addresses to the Access Points and Clients. If the
device cannot find a DHCP server after completing the Day 0 setup sequence
and rebooting, it will not complete the bootup sequence and the LED will be
blinking red.
Management IP Address Enter the IP address for managing the Primary AP.
Subnet Mask Enter the subnet mask for the Primary AP.
Default Gateway Enter the default gateway or router IP address for the Primary AP.
Field Description
Network Name Specify a SSID for your Wireless network. You can enter up to 31 characters in
this field.
Make a note of this SSID to connect a client and log into the CBW web user
interface which is detailed in the later section of this chapter. For details, refer to
Logging into the Cisco Business Wireless AP, on page 15.
Security By default, the SSID security is set to WPA2 Personal which uses a pre-shared
key (PSK) authentication.
Choose SSID security for your Wireless network. It can be one of the following
options:
• WPA2 Personal-This uses pre-shared key (PSK) handshake mechanism
for authentication.
• WPA2+WPA3 - Personal- This has both WPA2 and WPA3 enabled. WPA3
uses a reliable handshake mechanism called Simultaneous Authentication of
Equals (SAE).
This is only available after updating to FW release 10.4.1.0.
Passphrase Specify the passphrase or the pre-shared key (PSK). The passphrase should contain
8 - 63 ASCII characters.
Make a note of this passphrase to connect a client to the SSID and log into the
CBW web user interface (detailed in the later section of this chapter). For details,
refer to Logging into the Cisco Business Wireless AP, on page 15.
Confirm Passphrase Re-enter the passphrase or the pre-shared key (PSK) here.
Show Passphrase Enable this in order to display the passphrase in clear text for visible confirmation.
Once you complete the configuration settings, click Next to proceed or Back to modify the data in the previous
screens if needed. Confirm the settings and click Apply to save the configuration.
The Access Point will reboot. This may take up to 5 minutes. The booting process is complete when the LED
is consistently blinking or solid green.
Note For a detailed explanation on the LED behavior, see LED Color Indicators for Cisco Business Wireless APs,
on page 139.
Step 1 Connect to the new SSID that you created using the Setup Wizard > Create Your Wireless Network process.
Step 2 Open a supported web browser. In the address bar, type https://ciscobusiness.cisco or https://<ip address> and press
Enter to display the Cisco Business Wireless Access Point login page.
The CBW AP uses a self-signed certificate for HTTPS, so all browsers will display a warning and ask you whether you
wish to proceed with an exception when the certificate is presented to the browser. Accept the warning to access the
Primary AP login page.
Note If the Firefox browser displays an exception, navigate to Options > Privacy & security > Certificates >
View Certificates > Servers > Add exception, and add an exception for https://ciscobusiness.cisco.
Step 3 Click Login and enter the username and password you created during the set up process to begin managing your CBW
network.
What to do next
The default landing page is the Network Summary window when you log in. For more information, see
About the Cisco Business Wireless AP Monitoring Service, on page 19.
Step 1 Plug the Wired uplink AP (CBW150AX) into the Ethernet LAN connected to the current Primary AP. The AP must be
on the same VLAN as the Primary AP.
Step 2 After the new AP boots up, it will automatically download and update the firmware to match the Primary AP.
Step 3 Copy the configuration information and then join the wireless network.
To manage the newly added AP, navigate to the Wireless Settings > Access Points page and use the Web UI.
Note You might want to include an abbreviation of its name and the last few digits of the MAC address, such as
ap1522:62:39:10. You can also note details on its location physical such as interior west wall, or corner ceiling
by front door.
Note Blocklisting a client or Mesh Extender that is currently joined to the network will
not take effect until it attempts to rejoin the network (after a disconnect or reboot).
5. Select the Profile Name from the drop-down list and click Apply. By default, the profile name is mapped
to Any WLAN.
Check to see if the MAC address you added has been listed in the AP network. Navigate to Wireless
Settings > Access Points. You should find the MAC address added in the column, AP Mac along with
the AP model under the AP Model column of the table.
To troubleshoot issues with Mesh Extender, refer to Deployment and Troubleshooting Guidelines, on page
146.
• View details of various interferers in the network on the 2.4GHz and 5GHz radio frequencies.
• Monitor the performance of APs in the network.
• Monitor the performance of clients and guest clients in the network.
Note • All the parameters on the Network Summary page are read-only parameters.
• This page is automatically refreshed every 30 seconds.
Note Each of the action icons available within the widget is described in the Customizing the Network Summary
View, on page 20 section.
Displays the Top 10 guest clients in the network based on the throughput and usage.
• ACCESS POINTS by usage
Displays the Top 10 access points in the network based on the number of clients connected, usage, and
throughput.
• APPLICATIONS by usage
Displays the Top 10 applications such as Gmail, YouTube, Facebook etc., based on the usage level of
clients connected in the network. You must enable the Application Visibility Control (AVC) option in
the WLAN to view this information.
• TOP WLANS by usage
Displays the top 10 WLANs in the network by usage and number of clients connected.
• CLIENTS by usage
Displays the top 10 clients in a network based on throughput and usage.
Clear data This clears the usage data and resets it to zero.
Tabular Click this icon to change the display of data between tabular view or doughnut view.
Type Specifies if the AP is a Primary AP, Primary Capable AP, or a Mesh Extender.
IP Address The IPv4 address of the device. By default, this is not visible.
Usage The amount of data that has transferred between AP and the client devices.
Admin Status If this is enabled, it displays the configured status of the 2.4GHz / 5GHz Radio.
Channel Level of traffic including data and interference over the channel that is assigned on
Utilization the AP. Interference includes both Wi-Fi and non Wi-Fi signals. A high utilization
of a channel, for example above 50%, suggests a high level of interference.
This includes noise from nearby APs/clients/rogues on the same channel which
results in poor client performance. The values are represented in % format.
By default, this is not visible.
Throughput (Avg) This represents the amount of data that can be transferred from the AP to the client
device. By default, this is not visible.
Channel The channel number at which the radio of the AP is broadcasting the signal.
Transmit Power The logarithmic power level at which the AP is broadcasting the signal. The values
(Avg) are displayed in decibel-milliwatt (dBm) units.
Coverage Hole Coverage holes are areas where clients cannot receive a signal from the wireless
network. A coverage hole is considered to have occurred when client SNRs falls
below -80dBm of data RSSI. By default, this is not visible.
Interference (Avg) RF interference involves unwanted, interference of RF signals that disrupt normal
wireless operations, that creates potential network latency and poor client
performance. Interfering RF signals includes both Wi-Fi and non-Wi-Fi signals.
The values are represented in % format.
Noise Noise refers to any energy interference that degrades the quality of a wireless signal.
Noise can affect everything from radio transmissions to network speeds. The values
are displayed in decibel-milliwatt (dBm) units.
Rogues Any device that shares your channel and is not managed by your CBW network
can be considered as a Rogue. By default, this is not visible.
Mode Displays if the device is in AP Only mode or Mesh mode. By default, this is not
visible.
BSS Color Displays the BSS color configured for the corresponding radio. By default, this
column is not visible.
3. Click the down arrow on the top right of the column headers to customize the details displayed in the
table. You can choose to hide or show the desired columns, sort them in the order you wish, or filter the
table contents based on the desired parameters.
GENERAL
AP Name The name of the Access Point.
If the physical location is configured, it will show the location. Otherwise, a default
Location
location will be shown.
The hardware (HW) address of the 2.4GHz and 5GHz radios. The address is the same
Base Radio MAC
for both the radios.
IP Address The IPv4 address is a 32-bit number that uniquely identifies an Access Point.
CDP / LLDP The name and the port of the switch the AP is connected to.
This field is applicable only for Primary Capable APs. (Those with wired uplinks).
Ethernet Speed This displays the current link speed of the switch port.
Parent MAC Displays the Parent MAC address (AP to which it is connected wirelessly) This option
Address is available only for Mesh Extenders.
Nearest APs Displays the top 3 neighbor APs with high link SNR value. For more information see
Link SNR (dBM) in Viewing Mesh Extender, on page 38.
This field is helpful for determining the best location for APs and Mesh extenders
during installation. It would also help to troubleshoot connectivity issues.
The nearest AP field also displays Wireless Mesh Extenders.
Max Capabilities The radio domains, spatial streams, and maximum data rates of the Access Point.
Tech Support 1. Click Start to download the support bundle for individual APs, which includes
the AP boot-up logs and configurations. By default, this button is enabled.
2. Click Download to save the bundle locally. This button will be enabled only after
the bundle is generated.
Disable any Pop-up blockers in your browser settings to download the tech support
bundle for the AP.
Tech Support View the status of the support bundle generation. The status values are one of the
Status following:
• Not started: The bundle generation has not been triggered. This is the default
status.
• In Progress: The bundle generation is in progress.
• Completed: The bundle generation is complete. Download the bundle using
Download.
PERFORMANCE SUMMARY
This table provides the following information about the performance of the radios:
Number of clients The number of client devices connected to a specific AP.
Channels Channel number from where the AP radio is broadcasting the signal.
Number of channels will be 1, 2 and 4 for 20MHz, 40MHz and 80MHz respectively.
Configured Rate The default minimum and maximum data rates of the AP.
Usage Traffic The amount of data that has transferred between APs and the client devices.
Throughput This shows the amount of data that can be transferred from the AP to the client device.
Transmit Power The logarithmic power level at which the Access Point is broadcasting the signal.
Noise Noise refers to any energy interference that degrades the quality of a wireless signal.
Noise can affect everything from radio transmissions to network speeds.
Channel Utilization This is the level of traffic including data and interference over the assigned channel
on the AP. Interference includes both Wi-Fi and non Wi-Fi signals.
The high utilization of a channel, for example above 50%, suggests high level of
interference including noise from nearby APs/clients/rogues on the same channel
which results in poor client performance.
Interference RF interference disrupts normal wireless operations and can cause network latency
and poor performance. Interfering RF signals includes both Wi-Fi and non Wi-Fi
signals.
Traffic Shows the percentage of channel utilization traffic in 2.4GHz and 5GHz radios.
Interferer Detection Status of interferer detection for 2.4GHz and 5GHz radios.
AP {Name} DETAILS
This table provides the following details specific to the Access Point.
CLIENTS This table shows details about the clients that are connected to the AP. For field details,
refer to Viewing Client Details, on page 30.
RF Displays a visual representation of parameters that can affect the radio performance
TROUBLESHOOT of the AP, such as:
• NEIGHBOR AND ROGUE APS: Displays the Neighbor and Rogue APs on
the current and adjacent channels for a given radio and the signal strength they
are heard. This visualization allows you to quickly identify neighbor and rogue
APs that are causing interference and reducing the overall RF performance for
the cell.
• CLEAN AIR INTERFERERS: Displays the sources of non Wi-Fi interferers
and their severity on the current and adjacent channels for a given radio. This
visualization allows you to quickly identify non Wi-Fi sources of interference
that are reducing the overall RF performance for the cell.
• CLIENT DISTRIBUTION ON TOP NEIGHBOR APS: Displays the top 5
neighbor AP with signal strength greater than −70dBm on the APs current client
serving channel (2.4GHz and 5GHz). Tx power and number of clients associated
to this AP and its neighbor APs are shown. Number of clients is not available
for neighbor APs on different Primary AP.
• CLIENT DISTRIBUTION BY DATA RATES: Each client's throughput varies
depending on the data rate it is using (802.11 a/b/n/ac) at any given point in time,
and this data rate may vary every second. Various factors such as RSSI values,
RF interference, etc. may affect a client device's instantaneous data rate.
SPECTRUM By default, Spectrum Intelligence (SI) is disabled in order to reduce the CPU cycles
INTELLIGENCE and increase the performance.
Ensure that you enable the Interferer detection globally under Advanced > RF
Optimization in Expert View.
Enable the SI for the radio with the following steps:
1. Navigate to Wireless Settings > Access Points and select an AP.
2. Click Edit and choose either 2.4GHz or 5GHz radio.
ACTIVE Displays the Active Interferers of the Access Point for the selected radio. For further
INTERFERERS details of the table refer Viewing Details of Interferers under Viewing Interferers.
NON WI-FI Displays the Non Wi-fi Channel Utilization for the Access point of the selected radio.
CHANNEL
UTILIZATION
INTERFERENCE Shows the interference power for the AP on the selected radio.
POWER
TOOLS
This section of the UI consists of options to configure the LED states of the access points and also provides
details of the image in the description table.
AP LED DISABLE Use this tool to disable the LED on the AP. For more information, refer to LED
Display Settings, on page 141.
BLINK AP LED This tool changes the AP LED to blink Red/Green for 60 seconds. This is used to
identify the AP. For more information refer to LED Display Settings, on page 141.
RESTART AP You can reload AP if needed. The Primary AP does not have this option.
INTERCHANGE You can swap the primary version and backup version of the image. This will take
IMAGE effect only after the AP reloads.
FACTORY You can reset the AP to factory default settings if required. The AP that currently acts
DEFAULT as the Primary AP does not have this option.
To reset Primary AP to factory defaults refer to Clearing the Primary AP Configuration
and Resetting to Factory Defaults, on page 128.
EXPORT CONFIG You can download the running configuration of the AP to .TXT file format. By default
the file is saved as AP<macaddress>_config.txt in your downloads folder.
This option is available for the Primary AP and all the APs associated with the Primary
AP. See below for a sample AP Configuration file.
IsPreferredPrimary 0
RogueDetectionStatus: 0
Radio0_AdminStatus: 1
Radio0_ChannelWidth: 20 MHz
Radio0_Channel: Automatic
Radio0_TransmitPower: Automatic
Radio0_InterfererDetection: 0
Radio1_AdminStatus: 1
Radio1_ChannelWidth: 80 MHz
Radio1_Channel: Automatic
Radio1_TransmitPower: Automatic
Radio1_InterfererDetection: 0
MeshRole: 1
MeshBackhaulSlot: 1
InstallMapping: 1
BridgeType: Indoor
BridgeGroupName: 00sasi
BackhaulInterface: 802.11a/n/ac
StrictMatchBGN: 0
EthernetBridge: 1
EthernetLinkStatus: UpDn
MeshInterface1_Name: GigabitEthernet1
MeshInterface1_Status: 0
MeshInterface1_VlanTagging 1
MeshInterface1_NativeVlanId 0
For more AP Config file details see: Access Point Configuration Files, on page 150.
IMPORT CONFIG Select this option to upload the configuration file (in .TXT file format) of the AP.
The configuration should match the AP model. This option is available for the Primary
AP and all associated APs.
You can also track the status of the configuration file uploaded in the TOOLS section
above.
• Non-mesh configuration files should not be imported to Mesh deployment APs.
• After uploading the configurations to the AP, it normally takes 1-2 minutes to
take effect. You can also see the LED of the AP change from solid/blinking green
to blinking green while applying the configurations. It will change back to
blinking blue once the upload is complete.
Note The Export/Import Config options in the Access Points page is specific to a particular AP. If you want to
change the configuration for the entire CBW network, refer to Export and Import Primary AP Configuration,
on page 128.
In the Clients page, there are three blocks that list the following information.
Clients This tile shows the number of clients currently connected.
Wireless This tile displays the number of clients for the 2.4GHz and 5GHz radio.
Apple This tile displays the number of clients that are connected to Apple clients. It also
includes more information as defined below.
• Fastlane: This tile displays the number of clients using Fastlane. Fastlane allows
iOS apps connected to CBW access points to be prioritized.
This means your voice, video, and real-time data gets to be first in line. To enable
Fastlane go to Wireless Settings > WLANs > Add/edit WLAN > Traffic
Shaping > Fastlane.
• Analytics: This tile displays the number of analytics-capable clients.
IPv4 Address The IPv4 address is a 32-bit number that uniquely identifies the client device.
AP Name The configured AP name to which the client associated will be displayed in this column.
Protocol The Wi-Fi standard through which the client is connected. It can be 802.11a/b/g/n/ac.
Hostname The MAC address of the client is displayed by default. Enable Wireless Settings >
Add/Edit WLAN > Local Profiling to view the hostname of the supported clients.
Client Type The client’s operating systems will be displayed in this column as Android or an Apple
Device.
Connection Speed The maximum data rate strength of the client connected to the access point. The values
are displayed in units of Mbps.
Signal Quality Signal quality is a value ranging from 0 to 100dB. This includes the noise generated
by interference sources and the signal strength.
Signal Strength Signal strength is the wireless signal power level received by the wireless client. Strong
signal strength results in more reliable connections and higher speeds. Signal strength
is represented in -dBm format, ranges from 0 to -100dBm. The closer the value to 0,
the stronger the signal.
Uptime The duration of how long the client is connected to the access point.
WLAN Profile The profile name of the configured WLAN connected to the client.
AP MAC Radio MAC address of the corresponding access point to which the client is connected.
AP Group This column shows the access points groups to which it is configured.
Client View
Select a client from the list to display the following details.
User Name The user name of the client connected to the Primary AP (Default: Unknown).
Hostname The MAC address of the client is displayed by default. Enable Wireless Settings >
Add/Edit WLAN > Local Profiling to view the hostname of the clients supported.
Deauthenticate Click this green button next to the MAC address to disconnect the client.
Deauthenticating the client removes a client from the WLAN, but that client will be
able to rejoin unless their MAC address is added to the Blocklist.
To block the client permanently do the following:
1. Navigate to Wireless Settings > WLAN Users > Local MAC Addresses.
2. Click Add MAC address.
3. Select the type Blocklist.
4. Click Apply & Save.
Uptime The duration of how long the client is connected to the access point.
AP Name The configured AP name associated to the client. To configure the AP name and
location, navigate to Wireless Settings > Access Points.
Nearest APs List of APs near the client based on signal strength.
Device Type The client’s operating systems is displayed in this column as an Android or Apple
Device.
Performance This shows the performance by Signal Strength, Signal Quality, Connection Speed,
and Channel Width.
Capabilities This gives information on which domain the client is associated to the AP and its Spatial
Stream.
Cisco Compatible Cisco Compatible state changes only when a Cisco client (which supports CCX
extensions of the IEEE standards) is associated to your AP.
Client connection Connection score is the connection quality between client and the access point displayed
score as a percentage. It indicates the current client data transfer speed. The higher the
percentage, the faster the data is being transferred. This value is based on the Client
Actual Rate divided by either the Client Max Capability or Max AP Configured
(whichever is lower).
CONNECTIVITY
This line graph represents the stages and current status of the associated client as in the Start, Association,
Authentication, DHCP, and Online stages.
TOP APPLICATIONS
The top applications that are being used by the client device are presented in a graphical or tabular format.
To use this, enable AVC in Wireless Settings > WLANs > > Add/Edit WLAN > Traffic Shaping >
Application Visibility Control.
To view this data make sure the Application Visibility Control (AVC) is active.
MOBILITY STATE
This shows the graphical flowchart of stages on how the client is connected to the Primary AP. You can open
the graph or table to view the following information:
• Name of the Primary AP, with its IP address and the model number of the AP on which it is running.
• Name of the AP client connected to the Primary AP, including the IP address, and model number.
• Nature of the connection between the AP and the client. (For example, a wireless 802.11n 5GHz
connection.)
• Name and type of client (such as Microsoft Workstation), VLAN ID and IP Address of the client.
Two tiles display a summary of the number of guest clients and recently connected clients to the Primary AP.
Each guest client detail can be viewed by clicking the specific client record.
Guest Clients / Displays the number of guest clients and recent clients connected to the network.
Recent Clients
Wireless Specifies the number of 802.11b/g/n guest clients connected and operating either at
2.4GHz or 5GHz.
Click the down-arrow on the top right of the column headers to customize the details displayed in the table.
You can choose to hide, show, or rearrange columns, sort, or filter the table contents based on the desired
parameters.
Note You can export CBW connected guest details and download them in Excel format using the Save icon in the
Guest Widget.
Troubleshooting a Client
This section describes in detail how to perform a client ping test and a connection test. These help to effectively
investigate and troubleshoot connection issues.
4. Click Start to begin the test. The latency in milliseconds is represented graphically.
The results of the client connection establishment with the WLAN is displayed at each stage.
Parent AP Name The AP name to which the Mesh Extender has joined wirelessly.
Hop The count of how far the Mesh Extender is operating from the Primary AP.
Link SNR (dBM) The signal to noise ratio calculated between the Mesh Extender and the Primary
AP.
Channel Utilization (%) Level of traffic including data and interference over the channel that is assigned
on the AP. The values are represented in % format.
Viewing Applications
Click the Applications menu to view the Top 10 applications used in client traffic. To see the usage, enable
the Application Visibility Control (AVC) option in at least one WLAN.
1. Navigate to Wireless Settings > WLANs > Add/Edit WLAN > Traffic Shaping > Application visibility
Control.
2. Select Enabled in the Application Visibility Control drop-down menu.
After applying the changes, Rogue detection will be enabled, and any Rogue APs will be reported to the
Primary AP.
To see any Rogue APs on your network, navigate to Monitoring > Rogues > Access Points. The screen
displays the following details of rogue devices which includes unmanaged neighboring Clients and Access
Points.
Click on the tiles at the top of the page to filter the list of Rogue Access Points by:
• 2.4GHz / 5GHz
• Unclassified
• Friendly
• Malicious
SSID The name of the SSID, using which the Rogue AP is broadcasting.
Detecting APs Displays the number of APs where the Rogue AP is detected.
Count
State Displays the state of the Rogue AP. If the Rogue AP class is friendly, the state will be
Internal or External, or the state will be Alert.
Class The class of the Rogue AP. By default, all the Rogue APs are unclassified. You can
change the class of Rogue APs to Friendly, or Malicious.
Friendly You can move the Rogue AP to a Friendly state if you know the MAC address of the
Rogue AP.
Following are the options that are configurable:
• Internal—If the unknown Access Point is inside the network and poses no threat
to WLAN security, you would manually configure it as Friendly, Internal.
Example: An Access Point that exists within your premises.
• External—If the unknown Access Point is outside the network and poses no
threat to WLAN security, you would manually configure it as Friendly, External.
Example: An Access Point that belongs to a neighboring coffee shop.
Malicious You can move the Rogue AP to Malicious class when you do not know the particulars
of the AP. By default, the status remains as Alert since it remains unknown to the
CBW network.
Last Seen Shows the time the Rogue client was detected.
Step 2 In the Interferers summary window, click the count display icon. The following details are displayed.
• AP Name: The name of the Access Point where the interference device is detected.
• Radio Slot: Slot where the radio is installed.
• Interferer Type: Type of the interferers such as Microwave Oven, Jammer, WiMax Mobile, and so on
• Affected Channel: Channel that the device affects.
• Detected Time: Time at which the interference was detected.
• Severity: Severity index of the interfering device.
• Duty Cycle (%): Proportion of time during which the interfering device was active.
• RSSI: Receive signal strength indicator (RSSI) of the Access Point.
• Dev ID: Device identification number that uniquely identified the interfering device.
• Cluster ID: Cluster identification number that is unique which identifies the type of the device.
Note Ensure that you enable the Interferer detection globally under Advanced > RF Optimization (in Expert View).
Navigate to Wireless Settings > Access Points and select an AP. Click Edit and choose either 2.4GHz or
5GHz radio.
Wireless Dashboard
This page displays the capabilities of AP and the Client for 2.4GHz and 5GHz. Click the Close widget
icon on the top right of the widgets that you want to remove. To add the widget click the icon.
AP CAPABILITY
Displays the capability details for the APs managed by the Primary AP:
Max Configured Displays the graph and table for maximum configured connection rate in Mbps.
Connection Rates
These are mapped to different ranges for both the radios (2.4GHz and 5GHz) for all
APs configured by the Primary AP.
AP Distribution by Displays the maximum configured Channel Width for all the APs configured by the
Channel Width Primary AP.
CLIENT CAPABILITY
Displays the capability data for the clients managed by the Primary AP:
Client Capability by Displays the graph and table for the number of clients capable of a particular spatial
Spatial Stream stream for all the clients connected to the Primary AP.
Client Capability by Displays the graph and table for the number of clients based on the maximum data
Max Protocol rate protocol supported for all the clients connected to the Primary AP.
AP PERFORMANCE-CHANNEL UTILISATION
Display the Performance details for the APs managed by the Primary AP:
Channel Utilization Displays a graph and table for channel utilization as a percentage on all APs configured
by the Primary AP. This is mapped to different ranges for each of the 2.4GHz and
5GHz radios.
CLIENT PERFORMANCE
Displays the connected characteristic for the clients managed by the Primary AP:
Client by Displays the connection score percentages ranges for all clients connected to the
Connection Score Primary AP. The Connection Score is calculated as a percentage value based on the
Client Actual Rate divided by either Client Max Capability or Max AP Configured
(whichever is lower).
This ensures the Connection Score is always calculated based on the maximum possible
rate and the maximum rate capability of each device.
Client by Displays the graph and table for the number of clients based on the connected protocol
Connected Protocol for all the clients connected to the Primary AP.
AP DISTRIBUTION
Displays the distribution of APs managed by the Primary AP:
AP distribution by Displays the graph and table for all APs configured by the Primary AP. The graph
Model and table is updated based on the Model name of the AP to the radios (2.4GHz and
5GHz).
AP distribution by Displays the graph and table for all APs configured by Primary AP. The graph and
SpatialStream table is updated based on the SpatialStream that is connected for each of the radios
(2.4GHz and 5GHz). The center of the donut displays the maximum number of APs
with the particular SpatialStream.
Widgets Description
CHANNEL This shows the level of traffic including data and interference over the channel that
UTILIZATION is assigned on the AP. Interference includes both Wi-Fi and non Wi-Fi signals.
-TOP APS High utilization of a channel, for example above 50% suggests a high level of
interference including noise from nearby APs/clients/rogues on the same channel.
This causes poor client performance.
Click to view the AP detail.
Widgets Description
INTERFERENCE RF interference involves unwanted, interference of RF signals that disrupt normal
wireless operations which creates potential network latency and poor client
-TOP APS
performance. Interfering RF signals includes both Wi-Fi and non Wi-Fi signals.
Click to view the AP detail.
CLIENT LOAD Load indicator displays the current number of connected clients on each access point.
A higher load may impact performance. Use client load balancing to improve client
-TOP APS
distribution on the wireless network.
COVERAGE Coverage holes are areas where clients cannot receive a signal from the wireless
network. A coverage hole is considered to have occurred when client SNRs fall below
-BOTTOM APS
a predetermined level. A coverage hole event is when several clients are stuck in the
same coverage hole.
AP Join Failure This widget shows the number of APs that failed to join the Primary AP and the
Status associated error types during a specific day, week or month. Click a specific join error
to see the APs that have failed to join the Primary AP with the associated error type.
Click the setting to clear the AP Join statistics.
Step 2 To add a widget, click the icon on the top right of the AP Performance window.
Step 3 To remove a widget, click the icon on the top right of the widgets that you want to remove.
Step 4 Select from the widgets shown below:
• Channel Utilization: Top APs
• Interference: Top APs
• Client Load: Top APs
• Coverage: Bottom APs
• AP Join Failure Status: Bottom APs
Note • Top APs are APs with the maximum client load.
• Bottom APs are APs with low SNR values for the client.
Step 5 Click Close. The AP Performance window is refreshed with your changes.
Connection Rate Each client's throughput varies depending on the data rate used (802.11 a/b/n/ac) at
any time, and this data rate may vary every second. Various factors such as RSSI values,
RF interference, and so on, may affect a client device's instantaneous data rate.
Signal Quality Signal quality is a value ranging from 0 to 100dB. This includes the noise generated
by interference sources and the signal strength.
Client Connections Displays clients associated with the access points of any connectivity types.
Step 2 Click the icon on the top right of the Client Performance window.
Step 3 To remove a widget, click the icon on the top right of the widgets that you want to remove.
Step 4 Select the widgets you want to add:
• Signal Strength
• Signal Quality
• Connection Rate
• Client Connections
Step 5 Click Close. The Client Performance window is refreshed with the new widgets.
Setting Up Guidelines
• You can associate up to 16 WLANs with the CBW Primary AP and create a total of 16 WLANs. Cisco
recommends a maximum of 4 WLANs. The Primary AP assigns all the configured WLANs to all the
connected APs.
• Each WLAN has a unique WLAN ID, a unique profile name, and an SSID.
Viewing WLANs
To view details of configured WLANs, navigate to Wireless Settings > WLANs.
The WLANs window lists all the WLANs that are currently configured on the Primary AP. This screen
displays the following details for each WLAN:
Security Policy Indicates the Security Type of the WLAN. It can be an Open network, WPA2 Personal,
WPA2+WPA3 (Personal), WPA3 Personal, WPA2 Enterprise, Central Web Auth
(CWA), or a guest network.
MAC filtering This option is displayed when you configure a Security Type with MAC Filtering
enabled in the previous field. For example, when you configure a Open WLAN with
the MAC Filtering enabled, then it displays Open+Macfilter.
Radio Policy Displays the Radio in which the WLAN is broadcasting. By default, it is All.
Note See About WLANs in CBW Access Point Network, on page 49 for a brief explanation on WLANs.
Tip The total number of active WLANs is displayed at the top of the page. If the list of WLANs spans multiple
pages, you can browse these pages by clicking the page number links or the forward and backward icons.
To add a WLAN
1. Navigate to Wireless Settings > WLANs.
2. In the WLANs window, click the Add new WLAN button to open the Add new WLAN window.
3. Click Yes in the pop-up message.
4. Open each tab and make your selections to set up the WLAN.
Each of the tabs in this window is explained in the following sections.
5. Click Apply to save the configurations or Cancel to discard the changes.
To edit a WLAN
For details on how to delete WLANs see Editing and Deleting WLANs, on page 67.
WLAN ID From the drop-down list, choose an ID number for the WLAN.
Profile Name The profile name must be unique and should not exceed 31 characters.
SSID The profile name also acts as the SSID. You can define an SSID that is different from
the WLAN profile name. The SSID must be unique and should not exceed 31 characters.
Radio Policy Click the drop-down list and choose from the following options:
• All—Configures the WLAN to support dual-band (2.4GHz and 5GHz) capable
clients.
• 2.4GHz only—Configures the WLAN to support 802.11b/g/n/ax capable clients
only.
• 5GHz only—Configures the WLAN to support 802.11a/n/ac/ax capable clients
only.
Broadcast SSID The default is Enabled for the SSID to be discovered. Use the toggle button to hide
the SSID.
Local Profiling By default, this option is disabled. Enable this option to view the Operating System
that is running on the Client or to see the User name.
Guest Network Guest user access can be provided on WLANs which are specifically designated for
use by guest users. If the Guest Network is enabled, then the WLAN is considered as
Guest WLAN. By default, this field is disabled.
The following fields are displayed when you Enable the Guest Network option. These
are applicable for WLANs and Guest WLANs.
For details on creating a Guest Network, refer to Creating a Guest Network, on page
143.
Captive Network This feature detects the presence of a captive portal by sending a web request on
Assistant connecting to a wireless network. This request is directed to a URL for iPhone models,
and if a response is received, then the Internet access is assumed available and no
further interaction is required.
If no response is received, then the Internet access is assumed to be blocked by the
captive portal and Apple’s Captive Network Assistant (CNA) auto-launches the
pseudo-browser to request portal login in a controlled window.
MAC Filtering You can also restrict or permit a particular client joining your network by enabling the
MAC Filtering feature. For details, refer to Blocking and Unblocking Clients, on page
69.
When MAC Filtering is enabled on the WLAN, the client MAC address must be added
to the Local MAC Addresses list by navigating to Wireless Settings > WLAN Users >
Local MAC Addresses with the Type as Allowlist for enabling the client to join the
network via that SSID.
Captive Portal This field is visible only when the Guest Network option is enabled. This is used to
select the type of web portal that can be used for authentication purposes. Following
are the types of web portals that you can choose.
• Internal Splash Page: Choose this option to have a default Cisco web portal
based authentication.
• External Splash Page: Choose this option to have external captive portal
authentication, using a web server outside your network. Also, select the URL of
the server in the Captive Portal URL field.
Ensure to add this URL rule in the configuring ACL name under Advanced >Security
Settings page.
Access Type This field is visible only when the Guest Network option is enabled.
• Local User Account: This is the default option. Choose this option to authenticate
guests using the username and password which you can set for guest users of this
WLAN, under Wireless Settings > WLAN Users. For more information, see
Viewing and Managing WLAN Users, on page 68
• Web Consent: Choose this option to allow guests access to the WLAN upon
acceptance of displayed terms and conditions. This option allows guest users to
access the WLAN without entering a username and password.
• Email Address: Choose this option if you want guest users to be prompted for
their e-mail address when attempting to access the WLAN. Access to the Internet
is provided when a valid email address is entered. This option allows guest users
to access the WLAN without entering a username and password.
You can also collect the email address information by configuring Accounting
Radius Server under Management > Admin Accounts > Radius in Expert
View. By default, the email address will be sent to the first Radius server
configured.
• RADIUS: Refers to details on RADIUS in the Security Type-WPA2 Enterprise,
on page 58 section.
• WPA2 Personal: Refers to Security Type-Personal, on page 57 in the following
section.
• Social Login: Choose this option to allow guest access to WLAN upon
authentication by Google/Facebook using their personal credentials. Once the
user connects to this guest WLAN they will be redirected to Cisco default login
page where they can find the login buttons for Google and Facebook. Once the
user logs in using their Google/Facebook account, the user will get Internet access.
If Social Login Access type is selected, the two toggle options will be displayed:
• Facebook —Turn on this option when you want to allow a guest user access
only using Facebook accounts.
• Google—Turn on this option when you want to allow a guest user access
only using Google accounts.
By default both toggles are enabled, so guest users can use Facebook or Google
accounts for authentication.
Apple devices will not be able to sign-in via Google, if Captive Network Assistant
(CNA) is enabled with Social Login as Access Type. You will need to disable
CNA and sign-in via Google for Guest access.
ACL Name(IPv4) This field is visible only when the Guest Network option is enabled.
For a detailed explanation on this feature refer to Configuring Access Control Lists
(ACL), on page 133. This description is applicable for WLAN and Guest WLAN.
Any ACL created through Advanced > Security Settings > Add new ACL is also
displayed here.
• None: No ACL is applied.
• Enable Social Login: This is a default setting. The user can map this when required
to configure a Guest WLAN with Social Login as Access type.
Enable Facebook The user can map to this when required to configure a Guest WLAN with Social Login
Login as Access type and the Facebook toggle is enabled.
Enable Google The user can map to this when required to configure a Guest WLAN with Social Login
Login as Access type and the Google toggle is enabled.
Enable Social This is a default setting. The user can map this when required to configure a Guest
Login WLAN with Social Login as Access type.
ACL Name(IPv6) This field is visible only when the Guest Network option is enabled.
Security Type For details on this option, refer to the following section.
Security Type is displayed when the Guest Network option is disabled.
Each of the options available in the Security Type drop-down is explained in detail
below.
Security Type-Open
This option stands for Open Authentication, which allows any device to authenticate and then attempt to
communicate with an AP. Using Open Authentication, any wireless device can authenticate with the AP.
Security Type-Personal
WPA2 This option stands for Wi-Fi Protected Access 2 with Pre-Shared Key (PSK). WPA2
Personal is a method used for securing your network with the use of a PSK
authentication. The PSK is configured separately both on the Primary AP, under the
WLAN security policy, and on the client. WPA2 Personal does not rely on an
authentication server on your network. By default, it is enabled.
WPA3 This option stands for Wi-Fi Protected Access 3 (WPA3), the latest version of Wi-Fi
Protected Access (WPA), which is a suite of protocols and technologies that provide
authentication and encryption for Wi-Fi networks. WPA3 leverages Simultaneous
Authentication of Equals (SAE) to provide stronger protections for users against
password guessing attempts by third parties. When the client connects to the Access
Point, they perform an SAE exchange. If successful, they will each create a
cryptographically strong key, from which the session key will be derived. Typically,
a client and Access Point goes into phases of commit and then confirm. Once there is
a commitment, the client and Access Point can then go into the confirm states each
time there is a session key to be generated.
For advanced security, enable WPA3 in addition to WPA2. By default, the value is
disabled.
You can also enable WPA3 individually, provided the client is WPA3 compatible.
Passphrase Format Choose ASCII or HEX (hexadecimal range) from the PSK Format drop-down list and
then enter a pre-shared key in the text box. WPA pre-shared keys must contain 8 to 63
ASCII text characters or 64 hexadecimal characters.
Password Expiry This option helps to enable password expiry for WLANs with WPA-PSK. By default,
the password expiry is disabled.
Expiry (Days) Set Value for expiry in days. Range: 1 - 180 days. By default, 180 days will be set as
expiry value. This field is displayed when you enable the Password Expiry toggle
switch.
Once the expiry value is exceeded, the WLAN will be disabled. If required, re-enable
the WLAN and set the expiry value.
Authentication You can choose External Radius or AP. The default option is External Radius.
Server
• To have a local authentication method, choose AP in the Authentication Server
drop-down list. This option is a Local EAP authentication method that allows
users and wireless clients to be authenticated locally. The Primary AP serves as
the authentication server and the local user database, which removes dependency
on an external authentication server.
You will see a note specifying whether the Radius Server is configured for
Authentication and Accounting. Radius Server can be configured by navigating
to Admin Accounts > RADIUS in Expert view.
• To have a RADIUS server-based authentication method, choose External Radius
in the Authentication Server drop-down list. RADIUS is a client/server protocol
that enables communication with a central server to authenticate users and authorize
their access to the WLAN.
Radius Profiling The Primary AP acts as the collector of the information and sends the RADIUS server
with the required data in an optimal form. Clients on the WLANS will be profiled as
soon as profiling is enabled.
• Profiling can be based on the following:
• Role defining the user type or the user group to which the user belongs.
• Device type, such as a Windows machine, Smart Phone, iPad, iPhone and Android
device.
• Username / password.
• Location based on the AP group to which the client is connected.
• Time of the day based on what time of the day the client is allowed on the network.
BYOD Cisco provides a comprehensive Bring Your Own Device (BYOD) solution
architecture, combining elements across the network for a unified approach to secure
device access. It is enabled when a user wants to connect their personal devices in a
more secure manner.
RADIUS Server RADIUS is a client/server protocol that enables communication with a central server
to authenticate users and authorize their access to the WLAN. To have a RADIUS
server-based authentication method, choose External Radius in the Authentication
Server drop-down list.
This section appears in UI, when you do the following:
• Set the WLAN security to WPA2 Enterprise with Authentication Server and
choose External Radius.
• Set the WLAN security to Central Web Auth.
• Set the WLAN security to WPA2/WPA3 Personal, and enable the MAC filtering
toggle button.
The following fields are visible for the Security Types WPA2 Enterprise and Central Web Auth.
Radius Server Provided for external authentication when you connect to a WLAN.
Authentication This feature helps store the client information essential for authentication locally in
Caching the cache on the CBW. This happens when the authentication with the RADIUS Server
is successful. If the connectivity to the RADIUS server is lost, the information stored
in the cache is used for authenticating the clients. You can also configure cache when
the RADIUS Server is up and running. If the client details are not available locally,
the request for authentication is sent through the RADIUS Server disabled.
This is field is not visible for the security type Central Web Auth.
When you enable this option, the following fields are displayed.
• User Cache Timeout: Specifies the time period at which the authenticated
credential in the cache expires.
If the client's cache that expires is associated to the Primary AP, then it would get
de-authenticated
Any change in cache timeout value on the WLAN will affect only new client
associations and the existing clients won’t get impacted.
• User Cache Reuse: Use the credentials cache information before cache timeout.
By default this is disabled.
Local cache client entries are deleted in the following scenarios:
• The CBW Primary AP reboots
• The cache time expires
• The security of the WLAN changes
• A WLAN is deleted
• Authentication Caching is disabled on the WLAN
Add RADIUS Click this tab to add the following RADIUS Authentication Server details:
Authentication
• Server IP Address: Select the IP address of the RADIUS server from the drop
Server
down list.
• State: Shows the state of the RADIUS server.
• Port Number: Provided for communication with the RADIUS server. By default
it is 1812.
To map RADIUS server to WLAN, first configure the RADIUS server details under
Management > Admin Accounts > RADIUS in Expert View.
Add RADIUS Select this tab to add the following RADIUS Accounting Server details:
Accounting Sever
• Server IP Address: Select the IP address of the RADIUS server from the drop
down list.
• State: Displays if the accounting server is in an enabled or disabled state.
• Port Number: It is used for communication with the RADIUS server. By default,
the value is 1813.
• Quality of service (QoS) —Qos refers to the capability of a network to provide better service to selected
network traffic over various technologies. The primary goal of QoS is to provide priority, including
dedicated bandwidth, controlled jitter and latency (required by some real-time and interactive traffic),
and improved loss characteristics.
The CBW Primary AP supports the following four QoS levels. Under the QoS tab, from the QoS
drop-down list, choose one of the following QoS levels:
• Platinum (Voice)—Ensures a high quality of service for voice over wireless.
• Gold (Video)—Supports high-quality video applications.
• Silver (Best Effort)—Supports normal bandwidth for clients.
• Bronze (Background)—Provides the lowest bandwidth for guest services.
• Specify the Rate limits per client and Rate limits per BSSID (in Kbps) using the following criteria:
• Average downstream bandwidth limit—Define the average data rate for downstream TCP traffic
by entering the rate in Kbps in the Average Data Rate text boxes.
• Average real-time downstream bandwidth limit—Define the average real-time rate for downstream
UDP traffic by entering the rate in Kbps in the Average Real-Time Rate text boxes.
• Average upstream bandwidth limit—Define the average data rate for upstream TCP traffic by
entering the rate in Kbps in the Average Data Rate text boxes.
• Average real-time upstream bandwidth limit—Define the average real-time rate for upstream
UDP traffic by entering the rate in Kbps in the Average Real-Time Rate text boxes.
Note Average Data Rate is used to measure TCP traffic while Average Real-time rate
is used for UDP traffic. They are measured in kbps for all the entries. The values
for Average Data Rate and Average Real-time rate can be different because they
are applied to different upper layer protocols such as TCP and UDP. These
different values for the rates do not impact the bandwidth.
• Fastlane—Wireless application traffic in real-time environments often needs to be prioritized by its type.
For example, due to real time application constraints, voice over Wi-Fi traffic needs a higher priority
than Safari web traffic.
Various standards exist to help network devices agree on how different types of traffic are marked to
make sure they are prioritized. QoS Fastlane greatly simplifies this agreement process so that network
congestion is minimized and time sensitive traffic (like voice or video) is delivered on time.
On enabling the fastlane, the QoS is set to platinum such that voice traffic has higher priority than any
other traffic.
• Application Visibility Control classifies applications using the Network-Based Application Recognition
(NBAR2) engine, and provides application-level visibility in wireless networks. Application Visibility
enables the Primary AP to detect and recognize more than 1000 applications and perform real-time
analysis, and monitor network congestion and network link usage. This feature contributes to the
Applications By Usage statistic in the Monitoring > Network Summary.
To enable Application Visibility Control, choose Enabled from the Application Visibility drop-down
list. Otherwise, choose Disabled which is the default option.
• AVC Profile—Displays the WLAN name.
• Add Rule—To allow/deny specific applications when the clients get connected to the specific WLAN.
• Application—List the applications that can be allowed/denied.
• Action— Choose Mark to allow the application process with priority, Drop to deny the application
and Rate limit to limit the rate (includes the Average Rate and Burst Rate) at which the application
runs.
Note Switch to Expert View in the CBW Web-UI by clicking the bi-directional arrows toggle button on the top-right
corner of the window.
Navigate to Wireless Settings > WLANs > Add new WLAN > Advanced:
Allow AAA AAA Override option of a WLAN enables you to configure the WLAN for identity
Override networking. It enables you to apply VLAN, Access Control Lists (ACLs) and Quality
of Service (QoS) to individual WLANs on the returned RADIUS attributes from the
AAA server.
PMF This is specific to 802.11w protocol. The 802.11w protocol applies only to a set of
robust management frames that are protected by the Protected Management Frames
(PMF) service. These include Disassociation, De-authentication, and Robust Action
frames.
Note The PMF values are:
• Optional - For WPA2+WPA3 WLAN by default.
• Required - For WPA3 only WLAN by default.
Exclusion List When exclusion list is enabled for a WLAN, clients trying to associate with the
corresponding WLAN are put in a blocked list if they experience authentication failure
five times consecutively. The timeout for the clients to be in block list is 180 seconds.
By default, the Exclusion list is enabled for a WLAN.
SAE Anti-clog An anti-clogging token is a mechanism to protect entities from Denial of Service (DoS)
Threshold attack. The anti-clogging token is bound to the MAC address of the station (STA). The
length of the token cannot be more than 256 bytes.
You can configure anti-clogging threshold in terms of resource percentage. On hitting
the threshold for the resource, the primary AP starts to reject authentication commit
requests that come with anti-clogging token. Subsequent authentication commit requests
from the client must have the same token. The Primary AP processes only the
authentication commit requests that have valid anti-clogging tokens.
The valid range for the block limit is 0 to 90. If the anti-clogging threshold limit is 90,
the anti-clogging is enforced by the primary AP when the number of clients reach 90
percent of the supported number.
The threshold limit is set to 50 by default.
802.11r 802.11r enabled WLAN provides faster roaming for wireless client devices. It is desired
that 11r capable devices will be able to join a WLAN with 11r enabled for better
roaming experience. However, if 11r is enabled on a WLAN, the legacy devices (non-11r
clients) will not be able to join the WLAN.
• This feature help clients roam better by telling them when to roam and providing
them with information about neighboring APs so that no time is wasted scanning
when roaming is needed.
• This option is available only for WPA2/WPA3 Personal WLAN with the WPA2
toggle button alone enabled, or WPA2 Enterprise enabled WLANs. By default,
this option is Disabled.
The 802.11r and WPA3 are not compatible with each other.
Over The DS Click this button to enable or disable the fast roaming facility. By default, this is
Disabled.
Reassociation Enter the number of seconds after which the re-association attempt of a client to an AP
Timeout(secs) should time out. The valid range is 1 to 100 seconds. The default is 20 seconds.
DTIM Period Depending on the timing set for your AP, it “buffers” broadcast and multicast data and
802.11a/n (beacon let your mobile devices or clients know when to “wake up” to receive those data.
intervals)
DTIM Period Depending on the timing set for your AP, it “buffers” broadcast and multicast data and
802.11b/g/n let your mobile devices or clients know when to “wake up” to receive those data.
(beacon intervals)
Client Band Select Band selection enables client radios that are capable of dual-band (2.4 and 5GHz)
operation to move to a less congested band.
Client Load This feature can be used in order to load-balance clients across access points. Enabling
Balancing this will improve client distribution on the wireless network.
You cannot configure the number of clients per AP.
Umbrella For details on these options refer to Configuring Cisco Umbrella on Primary AP, on
ProfileUmbrella page 114.
ModeUmbrella
DHC Override
mDNSmDNS For details on these options refer to Mapping mDNS Profile to WLAN, on page 111.
Profile
Multicast IP Enter the Multicast IP group address. By default, the field will be null.
Multicast Direct Enable the Multicast Direct toggle button to enhance the video streaming for wireless
clients by converting multicast packets to unicast at CBW AP. By default, this is
Disabled.
To enable this toggle, change the QoS value under the Traffic Shaping section to
Gold or Platinum.
For details, see Media Steam, on page 105.
Up Link This toggle is used to enable/disable uplink (Wireless Client to AP) multi-user, multiple
MU-MIMO input, multiple output support for the WLAN. By default, this is Enabled.
Down Link This toggle is used to enable/disable downlink (AP to Wireless Client) orthogonal
OFDMA frequency-division multiple access support for the WLAN. By default, this is Enabled.
Up Link OFDMA This toggle is used to enable/disable uplink (Wireless Client to AP) orthogonal
frequency-division multiple access support for the WLAN. By default, this is Enabled.
Configuring Scheduling
CBW supports an option to schedule availability for every WLAN. By default, all WLANs are available 24/7
when they are initially created. To schedule the WLAN availability, do the following:
1. Navigate to Wireless Settings > WLANs > Add new WLAN > Scheduling.
2. Schedule WLAN—You can choose one of the following options from the drop-down.
• Enable—This enables scheduling for a chosen WLAN.
• Disable—This disables scheduling for all the WLANs except the WLAN that is enabled.
• No Schedule—Scheduling is not applied to the WLAN.
Note You can also schedule the day/time for the WLAN to broadcast by enabling the corresponding Day and
mention the start and end time using the slider.
Enable the option Apply to all Weekdays to make changes for all the weekdays. By default, it is disabled.
Step 2 In the WLANs window, click the icon next to the WLAN you want to enable or disable.
Step 3 In the Edit WLAN window, under General select Enabled or Disabled.
Step 4 Click Apply.
Note Clicking Apply after creating a new WLAN or editing an existing one always enables the WLAN irrespective
of whether it was previously enabled or disabled.
Guest user Enable the slider button if this is meant to be a guest WLAN user account. You can
also specify the validity of this account from the time of its creation, in seconds, in the
Lifetime field. The default value is 86400 seconds (that is, 24 hours). You can specify
a lifetime value from 60 to 31536000 seconds (that is, 1 minute to 1 year).
WLAN Profile Select the WLAN that this user can connect to. From the drop-down list, choose a
particular WLAN, or choose Any WLAN to apply this account for all WLANs set up
on the Primary AP.
This drop-down list is populated with the WLANs which have been configured under
Wireless Settings > WLANs.
For information on adding WLANs, see Adding and Modifying WLANs, on page 52.
To edit a WLAN user, click the next to the WLAN user whose details you want to modify and make
the necessary changes.
To delete a WLAN user, click the next to the WLAN user you want to delete and click Ok in the
confirmation dialog box.
Note Blocklisting a client or Mesh Extender that is currently joined to the network will
not take effect until it attempts to rejoin the network (after disconnect or reboot).
• Choose Allowlist to add the client. The MAC Filtering should be enabled on the WLAN to add
your client MAC to the Local MAC address. This helps the client to join the network.
5. Click Apply.
• If the Google toggle alone is enabled, guest users are authenticated using Google accounts.
• If both toggles are enabled, guest users are authenticated using Facebook or Google accounts.
By default, both toggles are enabled.
Note You can also add and edit your URLs by navigating to Enable_Social_Login in Advanced > Security
settings.
The Guest WLAN with an enabled Social login access type will be created. Once you connect to this guest
WLAN you will be redirected to the default login page where you will find the login buttons for Google, or
Facebook, or both depending on the toggle buttons enabled. Log in using the respective account and obtain
the Internet access.
To enable this feature, switch to Expert View and configure the following on the Primary AP:
Step 1 Navigate to Wireless Settings > WLANs > Add new WLAN.
Step 2 Under the General tab, fill in the basic information for your WLAN. For more information see Adding and Modifying
WLANs, on page 52.
Step 3 Click the WLAN Security tab and specify the following details:
a. Enable MAC Filtering toggle button.
b. Under the Security Type drop-down list, select WPA2/WPA3 Personal.
c. Click the WPA2 toggle button to turn it on.
d. Select the Passphrase Format as either HEX or ASCII.
e. Enter the Passphrase.
f. Confirm the Passphrase. For more information see Adding and Modifying WLANs, on page 52.
Step 4 Under the Radius Server tab, map the radius server detail using the following steps.
Note The psk value could be a simple ASCII or HEX value or encrypted bytes in case of asciiEnc orhexEnc. The
algorithm used for encryption or decryption is as per RFC2865 (user-password section – 16 bytes authenticator
followed by encrypted key).
To configure radius server, navigate to Management > Admin Accounts > Radius (Expert View). For details,
refer to Managing TACACS+ and RADIUS Servers, on page 92
Step 6 Under the Advancedtab, click the AAA Override toggle button.
Step 7 Click Apply to save the WLAN updates.
Note • Devices with MAC addresses configured on Radius server will be able to connect to WLAN only with
PSK passphrase configured on Radius server.
• Devices with MAC addresses configured on Radius server will not be able to connect to WLAN with PSK
configured on WLAN.
• Devices with no MAC addresses configured on Radius server will be able to connect to WLAN with PSK
configured on WLAN only. Navigate to Wireless Settings > WLAN Users > Local MAC Addresses
and add the Client MAC in the Allowlist field. For more information see Blocking and Unblocking Clients,
on page 69.
In the Access Points Administration window, the number of APs associated with the CBW is displayed at
the top of the window, along with the following details:
Manage The following icons indicate whether the AP is acting as a Primary AP or Primary
Capable AP or Mesh Extender.
Figure 1: Primary AP
Figure 3: Subordinate AP
Note When an AP joins an AP group; or the RF profile of the AP group is changed, the AP rejoins the Primary AP.
The AP will receive new configuration specific to the new AP group or RF profile.
Global AP Configuration
This allows you to configure a Native VLAN ID.
2. In the Access Points window, click the icon next to the AP you want to manage.
Note You can only administer those APs that are associated to the Primary AP.
General Tab
1. In the Edit, under the General tab, you can edit the following AP parameters:
Make me Primary This is available only for subordinate APs that are capable of participating in the
AP Primary Election process. Click this button, to make it the Primary AP.
IP Configuration Choose Obtain from DHCP to let the IP address of the AP be assigned by a DHCP
server on the network.
Choose to have a Static IP address. If you choose to have a static IP address, then
you can edit the IP Address, Subnet Mask, and Gateway fields.
AP Name Edit the name of the AP. This is a free text field.
Location Edit a location for the AP. This is a free text field.
The following parameters are also displayed under the General tab, but can not be edited.
Operating Mode Displays the operating Mode of the AP.
Primary Tab
For the Primary AP, you can manually edit the following parameters under the Primary tab.
Primary AP Name You can edit the Primary AP Name set during the initial configuration using the Setup
Wizard.
IP Address This IP address can be used in the Login URL to access the Primary AP's web interface.
The URL is in the format http://<ip addr> or https://<ip addr>. If you change this
IP address, the login URL also changes.
VRID Virtual Router Identifier, is a unique number used to identify a virtual router.
By default, the value of VRID is 1 and the configurable range is between 1-255. This
option is available only in Expert View.
Change the VRID only if a VRID conflict is detected in the network. To check if there
are any VRID conflicts, go to Advanced > Logging. In the Logs window, the following
message will be logged in Errors (3) level: "%CNFGR-3-VRRP_CONFLICT_DETECTED:
cnfgr.c:4856 VRRP group conflict detected with VRID <vrid number>!
Configure new VRID value under Wireless Settings > Access Points > Edit
AP > Primary AP in Expert View"
Country Code Select the country for your Primary AP. It is not advisable to change the country code
unless you have not configured the correct country in the initial setup wizard.
Changing a country code turns the radio down until the Primary AP is rebooted.
You can set the following parameters under the Radio 1 and Radio 2 tabs.
Note The Radio 1 tab corresponds to the 2.4GHz (802.11 b/g/n/ax) radio on all APs. The Radio 2 tab corresponds
to only the 5GHz (802.11 a/n/ac/ax) radio on all APs.
The radio tab name also indicates the operational radio band within brackets.
2.4 GHz Channel Enable or Disable the corresponding radio on the AP.
For 2.4GHz radio, you can set this to Automatic, or set a value from 1 to 11.
Selecting Automatic enables Dynamic Channel Assignment. This means that
channels are dynamically assigned to each AP, under the control of the Primary AP.
This prevents neighboring APs from broadcasting over the same channel and prevents
interference and other communication problems. For the 2.4GHz radio, 11 channels
are offered in the U.S. and up to 14 in other parts of the world. However, only 1-6-11
can be considered non-overlapping if they are used by neighboring APs.
Assigning a specific value statically assigns a channel to that AP.
5 GHz Channel For 5GHz radio, you can set this to Automatic, 36, 40, 44, 48, 52, 56, 60, 64, 100,
104, 108, 112, 116, 132, 136, 140, 149, 153, 157, 161, or 165. Up to 23
non-overlapping channels are offered.
Assigning a specific value statically assigns a channel to that AP. DFS channels are
indicated with "(DFS)" tag along with the channel number in the drop-down list.
For Mesh backhaul Radio, the Automatic option is not supported in Mesh mode.
5 GHz Channel The channel width for 5GHz can be set to Automatic, or to 20, 40, or 80MHz, if
Width channel bonding is used. By default, it is set to 80MHz.
Channel bonding groups the channels by 2 or 4 for a single radio stream. This
increases the speed and the throughput. Because the number of channels is insufficient
in 2.4 GHz, channel bonding cannot be used to enable multiple non-overlapping
channels.
Transmit Power You can set it to Automatic, or provide a value ranging from 100, 75, 50, 25, 12 (in
terms of percentages).
By default, it is set to 100% (maximum power).
Selecting Automatic adjusts the radio transmitter output power based on the varying
signal level at the receiver. This allows the transmitter to operate at less than
maximum power for most of the time; when fading conditions occur, transmit power
will be increased as required until the maximum is reached.
For Mesh backhaul Radio, the Automatic option is not supported in Mesh mode.
Nations apply their own RF emission regulations to the allowable channels, allowed
users and maximum power levels within these frequency ranges. As per the regulatory
rules, the DFS channels (52 – 144) have low TX power levels compared to non-DFS
channels (36-48, 149-165).
Please choose the non DFS channel for maximizing the coverage.
In Mesh Mode navigate to: Wireless Settings > Access Points and click the edit
icon at the left end of the row, then select Radio 2 and Channel.
In Non-mesh mode: (in Expert view) navigate to: Advanced > RF Optimization >
Select DCA channels > 5Ghz then unselect the DFS channel numbers.
Interferer Detection Enable this option to identify the non Wi-Fi devices.
Ensure that you enable the Interferer detection globally under Advanced > RF
Optimization (in Expert View).
BSS Color This drop-down is used to set BSS Color Configuration as Global or Custom. By
Configuration default, this is Global.
• Global- Global BSS Color Configuration set in Advanced > RF Optimization
(in Expert View) will be considered
• Custom - Selecting Custom will show up as "BSS Color Status".
BSS Color Status The toggle is used to enable/disable per AP Radio's BSS Color Status. By default,
this is disabled.
The "BSS Color" text box will appear when the BSS Color Status toggle is enabled.
BSS Color The text box is used to set the Custom BSS Color value for the AP Radio and it can
be assigned a value from 1 to 63. By default, the value is 1.
Note The channels in both the radios will change according to the country configured in the Primary AP.
When you are done with all your changes click Apply to save and exit.
Note For details on the Mesh tab, see Mesh Network Components, on page 83.
Note Any AP or Mesh extender added to the network is mapped to the default-group. If required, you can create
your own AP group and map the AP to the same.
For Mesh deployments, ensure both the Root AP and Mesh AP are mapped to the same Access Point Group.
Step 1 Set up a new WLAN or decide on an existing WLAN, to which you will provide access for guest users.
You can specifically set up a WLAN exclusively for guest access. This is done by setting the WLAN Security as Guest
for that WLAN. For more information, see Adding and Modifying WLANs, on page 52.
Step 2 Set up a guest user account. Go to Wireless Settings > WLAN Users, and set up an account with the Guest User check
box selected. For more information, see Viewing and Managing WLAN Users, on page 68.
You can provide the Guest Users of your WLAN with one of the following login page options:
• A simple minimalist default login page with a few modification options. To configure this, see Setting the Default
Login Page, on page 80.
• A customized login page uploaded into the Primary AP. To configure this, see Setting a Customized Login Page,
on page 80.
Note When you save the Primary AP's configuration, it does not include extra files or components, such as the web
authentication bundle, that you download and store on your Primary AP. So always manually save external
backup copies of such files.
Note Cisco TAC is not responsible for creating a custom web authentication bundle.
• Name the login page login.html. The Primary AP prepares the web authentication URL based on
this name. If the server does not find this file after the web authentication bundle has been untarred, the
bundle is discarded, and an error message appears.
• The page should not contain more than 5 elements (including HTML, CSS, and Images). This is because
the internal Primary AP web server implements a DoS protection mechanism that limits each client to
open a maximum of 5 (five) concurrent TCP connections depending on the load. Some browsers may
try to open more than 5 TCP sessions at the same time if the page contains more elements and this may
result in the page loading slowly depending on how the browser handles the DoS protection.
• Include input text boxes for the username and the password.
• Extract and set the action URL in the page from the original URL.
• Include scripts to decode the return status code.
• All paths used in the main page (images, for example) are of relative type.
• No file names within the bundle are longer than 30 characters.
Compress the page and image files into a .TAR file. The maximum allowed size of the files in their
uncompressed state is 1 MB.
Cisco recommends that you use an application that complies with GNU standards to compress the.TAR file
(also referred to as the web authentication bundle.). If you load a web authentication bundle with a .TAR
compression application that is not GNU compliant, the Primary AP will not be able to extract the files in the
bundle.
The .TAR file enters the Primary AP’s file system as an untarred file.
Note If you have a complex customized web authentication bundle which does not comply with the aforementioned
prerequisites, then Cisco recommends that you host it on an external web server.
Step 2 To upload a customized login page into the Primary AP, in the Page Type drop-down list, choose Customized.
Step 3 Click Upload and browse to upload the .TAR file of the customized web authentication bundle. While uploading the
.TAR file, the status of file upload is displayed on the same page.
Step 4 If you want the user to be directed to a particular URL (such as the URL for your company) after login, enter that URL
in the Redirect URL After Login text box. You can enter up to 254 characters.
Step 5 Click Apply.
Click Preview to view your customized web authentication login page.
This chapter summarizes the design details for deploying a Cisco Mesh Extender for indoor environments.
The indoor wireless access takes advantage of the growing popularity of inexpensive Wi-Fi clients, enabling
new service opportunities and applications that improve user productivity and responsiveness.
For the wired access points (CBW150AX) the MAC address will be added automatically in the Local MAC Address
table, provided they exist in the same network.
Step 5 The automatic entry of the physical address of the wired AP can be verified by knowing its last few digits in the MAC
address.
For example, when a CBW150AX has joined the Primary AP, its MAC address will be displayed in the Local MAC
Address table with its corresponding description as (CBW150AX-0d6c). Here, 0d6c is the ending digits of its MAC
address F0:1D:2D:9E:0D:6C.
Step 6 Wait for few minutes and navigate to Wireless Settings>Access Points.
Step 7 Check if the Access Point has joined the Primary AP.
Bridge Group Bridge group names (BGNs) control the association of mesh access points. BGNs can
Name logically group radios to avoid two networks on the same channel from communicating
with each other. The setting is also useful if you have more than one Primary Capable
AP in your network in the same sector (area). Default BGN is set with first 10 character
of the configured SSID during initial setup wizard. This option is available in Expert
View.
Exercise caution when you configure a BGN on a live network. Always start a BGN
assignment from the farthest-most node (last node, bottom of mesh tree) and move up
toward the RAP to ensure that no mesh access points are dropped due to old and new
BGNs mixed within the same network.
Strict Matching When Strict Match BGN is enabled on the mesh AP, it will scan ten times to find the
BGN matched BGN parent. After ten scans, if the AP does not find the parent with matched
BGN, it will connect to the non-matched BGN and maintain the connection for 15
minutes. After 15 minutes, the AP will again scan ten times and this cycle continues.
The default BGN functionality remains the same when Strict Match BGN is enabled.
By default, it is disabled. This option is available in Expert View.
Backhaul Interface This displays the type of interface. It can be either 802.11a/n/ac if Mesh Backhaul Slot
is 5GHz and 802.11b/g, if Mesh Backhaul Slot is 2.4GHz.
Install Mapping on This option helps to broadcast the SSIDs in backhaul radio such that the client can join
Radio Backhaul the AP using the backhaul radio. By default it is Enabled. If you experience Mesh
performance or stability issues, you can disable this option to avoid wireless clients
joining the backhaul radio.
Mesh Backhaul The communication between each APs are carried over a particular radio and you can
Slot configure it in either 5GHz or 2.4GHz. By default, it is in 5GHz mode.
The Backhaul interface configuration done under Wireless Settings > Mesh > Mesh
Backhaul Slot is the global configuration. If you want to override it for selected Access
Points, you can change the Backhaul interface configuration by navigating to Wireless
Settings > Access Points (Edit) > Mesh > Mesh Backhaul Slot.
Preferred Parent This has to be computed from the Radio MAC of the Primary Capable AP which you
would like to set as preferred parent your Mesh AP. We need to add 11 in hex to last
two bytes of the Preferred Parent’s radio MAC. To obtain the Radio MAC of the
Primary Capable AP, go to Monitoring > Access Points, and the view the AP details
by selecting the AP you want. Note down the Radio MAC (xx:xx:xx:xx:xx:yy) and
compute the value to be set in Preferred Parent field. Refer the table below for sample
computation.
This field is present only in the Mesh Extender Mesh tab.
40 51
60 71
80 91
A0 B1
C0 D1
E0 F1
Ethernet Bridging Use this feature to access the Internet by connecting a wired client to the LAN ports
of the APs in the Mesh network. By default, it is Enabled.
A Primary Capable AP (CBW150AX) in Mesh mode with wireless backhaul connected
to a power injector supports Ethernet bridging.
1. Connect the AP output port of the Power injector to the primary capable AP in
mesh mode.
2. Connect the wired client to the other port in Power injector.
3. Check if you are able to access the Internet.
4. In the Mesh mode, the wired client connected to LAN ports will not be displayed
in the Primary AP UI.
Note The wired client connected to the Ethernet port of the Primary Capable AP
in Mesh mode with wireless backhaul will obtain the IP address in the AP
VLAN.
Note The Backhaul interface configuration done under Wireless Settings > Mesh > Mesh Backhaul Slot is the
global configuration. If you want to override it for selected Access Points, you can change the Backhaul
interface configuration by navigating to Wireless Settings > Access Points > (Edit) > Mesh > Mesh Backhaul
Slot.
In certain countries, Mesh Network with 5GHz backhaul network is not allowed to use. Even in countries
which is permitted with 5GHz, customers may prefer to use 2.4GHz radio frequencies to achieve much larger
Mesh or Bridge distances.
When a Primary AP downlink backhaul is changed from 5GHz to 2.4GHz or from 2.4GHz to 5GHz, that
selection gets propagated from Primary AP to all the Subordinate APs and they will disconnect from the
previously configured channel to get reconnected to another channel. To do this, follow the instructions below:
Step 1 Navigate to Wireless Settings > Mesh > Mesh Backhaul Slot.
Step 2 Select the backhaul radio (either 5GHz or 2.4GHz) in the Primary AP to push the configuration to its subordinate APs
and have a better mesh coverage.
Note Only Primary Capable APs are configured with the backhaul frequency of 5GHz or 2.4GHz. Once the AP is
configured, the same frequency selection will propagate down the branch to all the Subordinate APs.
VLAN Transparent
This feature determines how a mesh access point handles VLAN tags for Ethernet bridged traffic. If VLAN
Transparent is enabled, then VLAN tags are not handled and packets are bridged as untagged packets.
To enable the VLAN Transparent, follow the steps below:
Step 2 You can enable or disable the following types of management access to the Primary AP, by toggling the switch buttons.
• HTTP Access—This enables the HTTP access mode, which allows you to access the Primary AP GUI using
http://<ip-address> or http://ciscobusiness.cisco through a web browser. By default, this is Enabled.
If the number of users exceeds the configured value, the session access is restricted and you will be prompted
for a reload of session.
Step 1 Enable Expert View on the Primary AP UI. To switch to expert view, click the bidirectional arrow icon on the top right
of the home screen.
Step 2 Navigate to Management > Admin Accounts.
Step 3 Click Management User Priority Order.
By default, the local database is always queried first. If the username is not found, the Primary AP switches to the RADIUS
server if configured for RADIUS or to the TACACS+ server if configured for TACACS+. The default priority setting is
in the order of Local Admin Accounts and then RADIUS.
Step 4 To change the priority, between TACACS+ and RADIUS, click the drag icon and it move UP or DOWN.
Note Local Admin Accounts cannot be moved to Priority 3. It can be in the order of either 1 or 2 only.
Read Only This limited access administrative account allows the user to only view the Primary
AP configuration. This user is restricted from making any changes to the configuration.
Lobby This restricted administrative account allows the user to only create and manage guest
Ambassador user accounts. The lobby ambassador can also print or email the guest user account
credentials.
For information about creating guest user accounts, see Creating a Guest User Account, on page 91.
• Password—The password is case sensitive and can contain 8-127 ASCII characters. When specifying a password,
ensure the following:
• The password must include a combination of lowercase letters, uppercase letters, digits, and special characters.
The special characters can be ~, !, @, #, $, %, ^, &, *.
• No character in the password can be repeated more than three times consecutively.
• The new password cannot be the same as the associated username or the username reversed.
• The password cannot be cisco, ocsic, or any variant obtained by changing the capitalization of the letters in the
word Cisco. In addition, you cannot substitute 1, I, or ! for i, 0 for o, or $ for s.
Step 2 Click the Edit icon adjacent to the account you want to edit.
Step 3 Modify the admin account parameters, as required. For descriptions of these parameters, see Adding an Admin Account,
on page 89.
Step 4 Click Update to modify the parameters.
Step 2 Click the Delete icon adjacent to the account you want to delete.
Step 3 Click Ok in the confirmation dialog box.
Wireless Network Select the desired guest WLANs that have already been configured for guest access to the
network.
To know more about creating a guest WLAN, see Creating a Guest Network, on page 143.
Permanent User Select this check box to allow the guest user account access to the network without time
restriction.
Expiry Date & Time Specify the date and time by clicking the calendar and clock icons respectively. The guest user
account gets disabled at the specified date and time preventing access to the guest network.
If the Permanent User check box is selected, then this field disappears from the dialog box.
Option Description
Generate Password Click this radio button to automatically generate a password for the guest user account being
created.
If you prefer to manually specify a password for the guest user account, enter it in the Password
and Confirm Password fields.
Confirm Password Ensure that this entry matches what you have typed in the Password field.
Description This field is optional. The user can specify a suitable description for the guest user account.
Port Number Enter the port number being used for communicating with the TACACS+ server. By default,
the port number is 49.
Server Timeout Enter the server timeout. By default, the timeout is 5 seconds.
The Table displays the configured TACACS+ (authenticating, authorizing, accounting) servers.
You can also modify or delete TACACS+ servers by using the Edit/Delete icons.
Step 4 Authentication MAC Delimiter—From the drop-down list, choose the option that is sent to the RADIUS server in
the Access-Request message. The delimiters can be one of the following:
• Colon
• Hyphen
• Single-hyphen
• No Delimiter
Step 5 Accounting Call Station ID Type—From the drop-down list, choose the option that is sent to the RADIUS server in
the Access-Request message. One of the following format types can be chosen as the Accounting Call Station ID Type
that is sent to the RADIUS server:
• IP Address
• Primary AP MAC Address
• AP MAC Address
• AP MAC Address:SSID
• AP Name:SSID
• AP Name
• AP Group
• Flex Group
• AP Location
• VLAN ID
• AP Ethernet MAC Address
• AP Ethernet MAC Address: SSID
• AP Label Address
• AP Label Address: SSID
• AP MAC:SSID AP Group
• AP Eth MAC:SSID AP Group
Step 6 Accounting MAC Delimiter—From the drop-down list, choose the option that is sent to the RADIUS server in the
Access-Request message. The delimiters can be one of the following:
• Colon
• Hyphen
• Single-hyphen
• No Delimiter
Step 7 Fallback Mode—Specify the RADIUS server fallback behavior from the drop-down list. It can be one of the following:
Passive Causes the Primary AP to revert to a server with a lower priority from the available backup
servers without using extraneous probe messages. The Primary AP ignores all inactive
servers for a time period and retries later when a RADIUS message needs to be sent.
Active Causes the Primary AP to revert to a server with a lower priority from the available backup
servers by using RADIUS probe messages to proactively determine whether a server that
has been marked inactive is back online. The Primary AP ignores all inactive servers for
all active RADIUS requests. Once the primary server receives a response from the recovered
ACS server, the active fallback RADIUS server no longer sends probe messages to the
server requesting the active probe authentication.
Step 8 Username—If you enabled Active fallback mode, enter the name to be sent in the inactive server probes in the Username
field. You can enter up to 16 alphanumeric characters. The default value is cisco-probe.
Step 9 Interval—If you enabled Active fallback mode, enter the probe interval value (in seconds) in the Interval text box.
The interval serves as inactive time in passive mode and probe interval in active mode. The valid range is 180 to 3600
seconds, and the default value is 300 seconds.
Step 10 AP Events Accounting—Enable this toggle button to activate sending of accounting requests to RADIUS server.
During network issues, the APs join/disjoin from the Primary AP. Enabling this option ensures that these events are
monitored and the accounting requests are sent to the RADIUS server to help you detect the network issues.
Step 11 Click Apply to save the changes.
Note The pages used to add authentication and accounting servers contain similar fields. The following instructions
are detailed for both the Add RADIUS Authentication Server and Add RADIUS Accounting Server pages.
The steps are the same for both pages.
• You can also modify or delete the Radius servers by using the Edit/Delete icons.
Step 3 Click Add RADIUS Authentication Server and enter the following:
Server Index Select 1 through 6.
Port Number Enter the port number used for communicating with the RADIUS server. By default, the port
number of Authentication server is 1812, and the Accounting server is 1813.
Server Timeout Enter the server timeout. By default, the timeout is 5 seconds.
Step 1 Switch to Expert View and navigate to Management > Admin Accounts.
Step 2 In the Admin Accounts page, choose the Auth Cached Users tab.
Step 3 The client entries stored in the local cache of Primary AP are displayed in the table with the following details:
• MAC Address—Displays the MAC address of the client.
• Username—Displays the username of the client. The MAC address is shown by default.
• SSID—Displays the WLAN in use by the client.
• Timeout (Minutes)—Displays the User Cache Timeout Value configured in the WLAN under Authentication
Caching. By default, the timeout interval is 1440 minutes.
• Remaining Time (Minutes)—Displays the amount of time the local cache client entry is valid.
Step 4 Double-click the listed auth cached user to view the details.
You can also delete the client entry from CBW Primary AP local cache by selecting the client and click Delete Selected.
If the client entry is removed from local cache, the authentication of the client will be done by Radius Server. For more
details see Authentication Server information in Configuring the WLAN Security, on page 54.
For adding and editing NTP server details, go to Management > Time. This opens the Time Settings page.
Step 2 In the NTP Polling Interval field, specify the polling interval, in seconds.
Step 3 To edit an existing NTP server, click its Edit icon. To add a new NTP server, click Add NTP Server.
Step 4 You can add or edit the following values for an NTP server:
Option Description
NTP Index Specify an NTP Index value to set the priority of the NTP server. NTP Index values can be set
from 1 to 3, in the order of decreasing priority. The Primary AP will try and sync with the NTP
server with the highest priority first, until the specified polling interval time runs out.
If the sync is successful, the Primary AP will not try to sync with any of the remaining NTP
servers.
If the sync is unsuccessful, then the Primary AP will try to sync with the next NTP server.
NTP Server Specify the IPv4 address or the fully qualified domain name (FQDN) for the NTP server. When
you specify an FQDN, a DNS lookup is done. If the lookup fails, an error will be logged in the
Syslog server. The Primary AP will continue to resolve this FQDN and errors will be logged
until you change the NTP configuration or specify a valid FQDN.
To disable the option of setting up the date and time using NTP servers, you will need to delete all configured
NTP servers following the same process shown above.
The Time Settings window is displayed, with the set time zone shown at the top of the page. The current date and time
are displayed in the Set Time Manually field.
Step 2 From the Time Zone drop-down list, choose your local time zone.
When you choose a time zone that uses Daylight Saving Time (DST), the automatically sets its system clock to reflect
the time change when DST occurs. DST starts on the second Sunday in March, and ends on the first Sunday in November
in the U.S.
Step 3 Select the Set Time Automatically from Current Location check box to set the time based on the time zone specified.
Step 4 In the Set Time Manually field:
• Click the calendar icon and choose the month, day, and year.
• Click the clock icon and specify the time, in hours and minutes.
Note Refer to Image Update Prerequisite, on page 99 for updating a device later in this section.
To view the current software version of your Primary AP, you can choose the one of the following methods:
• Click the gear icon at the top-right corner of the web interface, and then click Primary AP Information.
• Choose Management > Software Update. The Software Update window is displayed with the current
software version number listed on the top.
You can update the CBW AP software using the Primary AP's web interface. Current configurations on the
Primary AP will not be deleted.
The following are the software update methods:
• Updating the Software using HTTP, on page 100
• Updating the Software using TFTP, on page 102
• Updating the Software using SFTP, on page 103
• Updating the Software through Cisco Business Dashboard, on page 104
A software update ensures that both the Primary AP software and the software on all the associated Subordinate
APs are updated. Newly joining APs will be upgraded to the current version of the software running on the
Primary AP.
The software download happens in the background, without impacting the network. The upgrades are
automatically sequenced to ensure that the network performance is not impacted by software update.
In addition to the summary above, each AP update progress is also shown with the following data:
• AP Name—The AP name.
• AP Type —Displays if the AP is a Primary AP or Primary Capable AP or Mesh Extender.
• AP Role— The operating role of the AP. It can be Root or Mesh. This field is available only in Mesh
deployments.
• AP Location—The AP location.
• Download Percentage— By default, it displays as NA. While pre-downloading the software, the
percentage of download is displayed.
• Last Update Error—In case of any error, during pre-download, the error is displayed here.
• State—Status of the pre-image download to the Mesh Extenders in the network. It can be one of the
following:
• None
• Initiated
• Pre-downloading
• Completed
Step 1 Obtain the ZIP file and extract the Primary AP software image and Mesh Extender (if your network has any Mesh
Extenders) firmware image.
Step 2 From the Primary AP web interface, navigate to Management > Software Update.
The Software Update window with the current software version number is displayed.
Important Proceed with Step 4-7 if you have Mesh Extenders in the CBW AP network.
Step 4 Enable Mesh Extender Image option to load the Mesh Extender image ap1g8-capwap. By default, this option will
be disabled.
Step 5 Click the Browse button adjacent to the Mesh Image File field, navigate to the folder having the unpacked ZIP file
contents, and choose ap1g8-capwap software file.
Note The file explorer that opens here is an operating system-specific explorer depending on the OS of your
computer.
The Pre-Download Image Status section displays the status of the pre-image download to the Mesh Extenders in the
network.
You can abort a software update that is in progress, at any time before the Primary AP completes rebooting, by clicking
Abort.
Step 7 One Mesh Extender in the network obtains the image first and then shares the image to other Mesh Extenders. Once
all the Mesh Extenders in the network are pre-downloaded or moved to Complete status, Disable the Mesh Extender
Image option.
Step 8 Now, update the Primary AP and other Primary Capable APs in the network. To do so, click Browse adjacent to the
File field. Navigate to the folder having the unpacked ZIP file contents, and choose the ap1g8 software file.
Step 9 Check the Auto Restart check box for the Primary AP and Mesh Extender to reboot automatically after the image
pre-download is complete for all the APs. By default, this option is Enabled.
Step 10 Click Update and then click Ok in the confirmation dialog.
The status of the download is displayed on top of the page.
Step 11 One Primary AP in the network obtains the image and shares the image to all other Primary capable APs.
Step 12 After all the APs’ state is moved to Complete, the Primary AP restarts (or reboots) to complete the software upgrade.
If you have not checked the Auto Restart check box, you can manually reboot the Primary AP, after the upgrade, by
choosing Advanced > Primary AP Tools, and clicking Restart Primary AP.
Step 13 Log in to the Primary AP UI (after clearing the cache) and verify the Primary AP software version in the Software
Update window.
Note • While adding the Mesh Extender to the existing Mesh deployment, the new Mesh Extender will obtain
the image from the existing connected Mesh Extender. This ensures efficient upgrade.
• The newly joining Mesh Extender can obtain the image from Cisco.com, TFTP/SFTP server, or via
CBD. Configure the Transfer Type accordingly to enable the new Mesh Extender obtain the image and
join the CBW network. You can also upgrade software through HTTP. For more information see
Upgrading the Software for First Mesh Extender using HTTP, on page 101
Step 1 Obtain the ZIP file and extract the Primary AP software image and Mesh Extender firmware image.
Step 2 From the Primary AP web interface, choose Management > Software Update. The Software Update window with the
current software version number is displayed.
Step 3 In the Transfer Mode drop-down list, choose HTTP.
Step 4 Enable the Mesh Extender Image option to load the Mesh Extender image ap1g8-capwap. By default, this option will
be Disabled.
Step 5 Click Browse adjacent to the Mesh Image File field, navigate to the folder containing the unpacked ZIP file contents,
and choose ap1g8-capwap software file.
Caution The top section of the page indicates the status of the image upload to Primary AP. Do not manually power
down or reset the Primary AP or any AP during this process.
Note The uploaded ap1g8-capwap image will be stored in temporary location of the Primary AP. So do not upgrade
or reload the Primary AP until the first Mesh Extender joins the network.
• A computer that can access Cisco.com and the TFTP server will be required.
Note Ensure that the TFTP server has the latest software bundle on Cisco.com.
Step 1 Obtain the ZIP file and extract the Primary AP software image and Mesh Extender (if your network has any Mesh
Extenders) firmware image. Copy the folder to the default directory on your TFTP server.
Step 2 From the Primary AP UI, navigate to Management > Software Update.
The Software Update window with the current software version number is displayed.
Step 7 Click Save to save the parameters that you have specified.
These parameters (IP address and File Path of the TFTP server) will remain saved unless you specifically change them
in future. You do not have to re-enter these parameters during the next software update.
Step 8 You can perform the update right away or schedule it for a later time.
• To proceed with the update right away, click Update, and then click Ok in the confirmation dialog.
• To perform the update later, up to a maximum of 5 days from the current date, enable Schedule Update and
specify the later date & time in the Set Update Time field.
The top section of the page indicates the status of the download. Do not manually power down or reset the Primary AP
or any AP during this process.
The Pre-Download Image Status section of the page displays the status of the pre-image download to the APs in the
network.
You can abort a software update that is in progress, at anytime before the Primary AP completes rebooting, by clicking
Abort.
Step 9 After you click Update, one Primary Capable AP and one Mesh Extender will obtain the image from the configured
TFTP server and share the images to other Primary Capable APs and Mesh Extenders correspondingly.
Step 10 After the image pre-download is Complete, the Primary AP must restarts (or reboots) to complete the software upgrade.
If you have not checked the Auto Restart check box, you can manually reboot the Primary AP, after the upgrade.
Navigate to Advanced > Primary AP Tools, and click Restart Primary AP.
Step 11 Clear the cache and log in to the Primary AP UI and verify the Primary AP software version in the Software Update
window.
Step 1 Obtain the ZIP file and extract the Primary AP software image and Mesh Extender (if your network has any Mesh
Extenders) firmware image. Copy the folder to the default directory on your SFTP server.
Step 2 From the Primary AP web interface, navigate to Management > Software Update.
The Software Update window with the current software version number is displayed.
Note The top of the page indicates the status of the download. Do not manually power down or reset the Primary
AP or any AP during this process.
The Predownload Image Status section of the page shows the status of image predownloaded to the APs
in the network.
You can abort a software update that is in progress, at anytime before the Primary AP completes rebooting,
by clicking Abort.
Step 11 After you click Update, one Primary Capable AP and one Mesh Extender will obtain the image from the configured
SFTP server, and share the images to other Primary capable APs and Mesh Extenders correspondingly.
Step 12 After all the APs’ state are moved to Complete state, the Primary AP restarts (or reboots) to complete the software
upgrade. If you have not checked the Auto Restart check box, you can manually reboot the Primary AP, after the
upgrade Navigate toAdvanced > Primary AP Tools and click Restart Primary AP.
Step 13 Clear the cache and log in to the Primary AP. Verify the Primary AP software version in the Software Update window.
Note 1. When the CBW is connected to CBD through direct management, then you can check the Connection
Status in CBW GUI under Advanced > CBD Settings and confirm if the connection is up/down.
2. If the CBW is managed by CBD Probe, then check the status of the device online/offline in CBD inventory
using the device’s serial number. Device serial number can be found in CBW GUI under Monitoring >
Access Points. Click on the AP name to view the information.
Step 1 From the Primary AP UI, navigate to Management > Software Update.
The Software Update window indicating the current software version number is displayed.
Step 2 From the Transfer Mode drop-down list, choose CBD-HTTPS to update the software through CBD.
Step 3 Click Save.
Step 4 Refer to Performing Device Actions, in the Cisco Business Dashboard Administration Guide and follow the instructions
to update the software.
Step 5 Click the Predownload Image Status arrows to display the status of the software update.
Media Steam
The IEEE 802.11 wireless multicast delivery mechanism does not provide a reliable way to acknowledge lost
or corrupted packets. As a result, if any multicast packet is lost in the air, it is not sent again which may lead
to poor quality of IP multicast stream.
The Media Stream (formerly VideoStream) feature makes the IP multicast stream delivery to the wireless
clients more reliable over the air and facilitates better usage of wireless bandwidth, by converting the multicast
frame to a unicast frame over the air. Each Media Stream client acknowledges receiving a video IP multicast
stream.
4. Enable Global Multicast to support multicast traffic on Primary AP. The default value is Disabled.
Important Global multicast cannot be enabled without configuring IPv4 multicast address in WLAN page.
5. Enable Multicast Direct to enhance the video streaming for wireless clients. The default value is Disabled.
Note The wireless clients must re-join the multicast stream after enabling the multicast direct feature on the Primary
AP.
6. Select Session Announcement State toggle button to enable the session announcement mechanism. If
the session announcement state is enabled, clients are informed each time a Primary AP is not able to
serve the multicast direct data to the client. The following parameters need to be filled only if Session
Announcement State is enabled.
a. Session Announcement URL— Enter the URL where the client can find more information when an
error occurs during the multicast media stream transmission.
b. Session Announcement E-mail— Enter the e-mail address of the person who can be contacted.
c. Session Announcement Phone— Enter the phone number of the person who can be contacted.
d. Session Announcement Note— Enter a reason as to why a particular client cannot be served with a
multicast media.
7. Click Apply.
Note We recommend that you use a template to add a media stream to the Primary AP.
6. From the Select from Predefined Templates drop-down list under Resource Reservation Control
(RRC) Parameters, choose one of the following options to specify the details about the resource
reservation control:
• Very Coarse (below 300 kbps)
Note When you select a predefined template from the drop-down list, the following text boxes under the Resource
Reservation Control (RRC) Parameters list their default values that are assigned with the template.
7. Specify the average packet size in the Average Packet Size field. The value can be in the range of 100
to 1500 bytes. The default value is 1200.
8. Enable the RRC (Resource Reservation Control Check) Periodic update in the RRC Periodic update
field. By default, this option is enabled.
RRC periodically updates the admission decision on the admitted stream according to the correct channel
load. As a result, it may deny certain low priority admitted stream requests.
9. Specify the priority bit set in the media stream in the RRC Priority field. The priority can be any number
between 1 and 8.
The larger the value means the priority is higher. For example, a priority of 1 is the lowest value and a
value of 8 is the highest value. The default priority is 4. The low priority stream may be denied in the
RRC periodic update.
10. Specify the action to perform in case of a violation after a re-RRC in the Traffic Profile Violation field.
Choose an action from the drop-down list. The possible values are as follows:
• Best Effort— Specifies that a stream is set to Best Effort class on periodic revaluation. This is the
default value.
• Drop— Specifies that a stream is dropped on periodic revaluation.
Note During the initial setup phase, if there is more than one Primary Capable AP in the network, only one AP will
get DHCP IP, and sends VRRP and Bonjour Advertisements. The rest of the APs will wait for the AP to be
configured and then join the Primary AP.
mDNS Policy
This section explains how you can define a policy to access a specific service provider. The access policy
explains the client attributes, the constructs, and the rule components that make up the policy, and how rules
and policies are evaluated. This helps in deciding whether the given service provider should be included in
the mDNS response for the client (that made the mDNS query).
When LSS is enabled, it provides the information only about nearby service providers. mDNS Policy enables
you to define a policy that is even more granular.
mDNS AP
The mDNS AP feature allows the Primary AP to have visibility of the wired service providers. This is in-built
in the Primary AP.
Step 1 Switch to Expert View by clicking the bidirectional arrow icon on the top right of the home screen in the Web-UI of the
Primary AP. A message is displayed to confirm if you want to switch to the expert view. Click Ok.
Step 2 Navigate to Services > mDNS.
Step 3 Use the mDNS Global Snooping toggle button to enable or disable snooping of mDNS packets, respectively.
Step 4 Use Bonjour Advertisements toggle button to enable or disable sending of bonjour advertisement packets to the local
network. By default it is enabled and advertisements will be sent every minute.
Note • By enabling this option, CBD probe can discover CBW APs in the network.
• CBW AP sends bonjour packets only in Native VLAN.
• CBW AP sends Goodbye bonjour message to CBD probe.
• If the Bonjour Advertisements toggle button is disabled.
• If the name of the AP joined to Primary AP is changed, or the Primary AP name is changed, a Goodbye
bonjour message is sent for the old name. A new name will be updated in Bonjour Advertisements
at the next interval. A Goodbye bonjour message on AP name change will be sent only if the Bonjour
Advertisement is enabled.
Step 5 Use the mDNS Policy toggle button to enable or disable mDNS policy mapping.
Step 6 Enter the mDNS query interval in minutes. The query interval is the frequency at which the Primary AP queries for a
service. Default is 15 minutes.
Step 7 Click Add VLAN Id to add a list of VLANs for internal AP snooping.
Step 8 Complete the details in the following tabs:
a. Primary Services Database —To view the services listed in the Primary database. The Primary AP looks and learns
about the mDNS service advertisements only if the service is available in the Primary Services Database. The Primary
AP can check and learn a maximum of 64 services.
• Click the Add Service button to add a new service in the Primary database.
• In the Add/Edit mDNS Service window, specify the Service Name, Service String, Query Status, Location
Services, and Origin.
• Click Update.
b. mDNS Profiles —To view the list of mDNS profiles. By default, one mDNS profile will be available.
• Click the Add Profile button to add a new profile.
• In the Add/Edit mDNS profile window, enter the profile name that can be later mapped to the WLAN.
c. mDNS policy—To view the mDNS policies. By default, one mDNS policy will be available.
• Click Add mDNS policy to add a new policy.
• In the Edit mDNS policy window, enter the role name and user name.
d. Domain Names —To view domain names and add domain names from the discovered list.
e. mDNS Browser —To view the number of mDNS services running.
f. Click Apply.
Note The wireless Primary AP broadcasts the services from the wired devices such as Apple TVs learned over
VLANs, when:
• mDNS snooping is enabled in the WLAN Advanced options.
• mDNS profile is enabled either at the interface or WLAN.
c. Click Apply.
Limitations
This feature does not work with the following:
• Local-auth
• IPv6 addresses
Step 1 Switch to Expert View by clicking the bidirectional arrow icon on the top right of the home screen in the Web-UI of the
Primary AP.
A message is displayed to confirm if you want to switch to the expert view. Click Ok.
Step 2 Choose Services > Umbrella.
Step 3 Click the Umbrella Global Status toggle button to enable Umbrella status.
Step 4 Enter or paste the Umbrella API Token that you copied.
Step 5 Click Apply to enable Cisco Umbrella.
Step 6 Click Add Profile to create a new profile.
Step 7 In the Add Profile window, enter the Profile Name and click Apply.
A new profile is created.
Step 8 Verify that the State changes from Registration in Progress to Profile Registered. This may take a few seconds, and may
require you to refresh your browser window.
Step 9 In the Umbrella dashboard, navigate to Deployments > Core Identities > Network Devices. You can check if your
device is listed in this window.
Step 1 Browse to the Cisco Umbrella UI using your Cisco credentials. Add your device details to protect from breach and
malware.
Step 2 Navigate to Policies > All Policies to create rules and map this to your network device.
Step 3 Click Add to create new rules.
Step 4 Select Network Devices from the list of Identities and click Next. This helps add your APs in a way so that the whole
network is monitored by the umbrella.
Step 5 You can configure the required Security Settings and Limit Content Access. These are user configurable and you can
select the type of attacks that you want to block such as phishing attack, malware, potentially harmful domains, web page
contents such as games, gambling, drugs etc.
Step 6 In the Application tab, select the applications that need to be blocked. You can limit access to certain applications like
YouTube, Facebook, Google-services, or others if you wish.
Step 7 Specify the Destination, File Analysis, and Block Pages in the network.
Destination List shows the global allowable list and global block list that you configured in the umbrella and Block
pages define the appearance and bypass options for your block pages.
Note These all are user configurable.
Step 8 Navigate to Deployments > Core Identities > Network Devices and verify if the Policy has been applied to your network
device.
Step 1 Switch to Expert View by clicking the bidirectional arrow icon on the top right of the home screen in the Web-UI of the
Primary AP.
Step 2 Navigate to Wireless Settings > WLANs.
Step 3 Click Add new WLAN to open the Add new WLAN.
Step 4 Select Advanced.
Step 5 From the Umbrella Profile drop-down list, choose a profile that was created for the WLAN.
Step 6 From the drop-down list, choose Ignore or Forced.
When a client obtains DNS IPs, users can manually change them on the client device, thus bypassing Umbrella policy
enforcement.
To prevent this security compromise, configure Umbrella Mode to Forced. This ensures that Umbrella policy enforcement
cannot be overridden on the client device.
Step 7 Click the Umbrella DHCP Override toggle button to enable the Cisco Umbrella DHCP override.
The DNS IP addresses that a client obtains when connecting to the SSID are configured on the DHCP server. For Umbrella
enforcement to work, clients must send out DNS requests to Umbrella IP addresses (208.67.222.222, 208.67.220.220).
Umbrella DHCP Override ignores the DNS IPs configured via DHCP, and forces the Umbrella DNS IPs on the client
device. If you set Umbrella Mode to Forced, you do not need to enable Umbrella DHCP Override.
Managing SNMP
Simple Network Management Protocol (SNMP) is a popular network management protocol used for collecting
information from all the devices in the network and configuring and managing these devices. You can configure
both SNMPv2c and SNMPv3 access modes using the Primary AP web interface.
Step 4 In the Read-Only Community field, enter the desired community name.
Step 5 In the Read-Write Community field, enter the desired community name.
Note The Read-Only / Read-Write Community field must contain a minimum of 8 characters in a combination of
lowercase/uppercase letters, digits, and special characters.
Step 1 Navigate to Advanced > SNMP > Add New SNMP Trap Receiver.
Step 2 In the Add SNMP Trap Receiver window, configure the following fields:
a) Receiver Name—Enter the desired username for the new Trap Receiver.
b) IP Address—Specify the IP address of the Trap Receiver to which you wish to connect.
c) Status—Enable/Disable the Trap Receiver. By default, it is enabled.
d) SNMPv3—If you have configured SNMP v3 access and have SNMPv3 User, then enable this option. By default, it
is disabled.
e) SNMPv3 User—Map the SNMPv3 User details for the Trap receiver entry, if SNMPv3 toggle is enabled.
The SNMP Trap Receiver table shows the list of SNMP Trap Receivers configured in the network.
Field Description
User Name Enter the desired username for the new SNMPv3 user.
Access Mode From the drop-down list, select one of the desired modes:
• Read Only
• Read/Write
Authentication protocol From the Authentication Protocol drop-down list, select one of the options:
• HMAC-MD5
• HMAC-SHA
• None
Authentication Password Enter the desired authentication password. Use a minimum password length of 12 - 31
characters.
Privacy Protocol From the drop-down list, select one of the options:
• CBC-DES
• CFB-AES-128
• None
Privacy Password Enter the desired privacy password. Use a minimum password length of 12 - 31 characters.
Step 3 In the Syslog Server IP field, enter the IPv4 address of the server to which the syslog messages are sent and click Apply.
The table displays the list of Syslog server configured in the network. You can delete the Syslog server if you wish.
Step 4 Set the severity level for filtering the syslog messages that are sent to the syslog server. From the Log Syslog Level
drop-down list, you can choose the severity level from one of the following (listed in the order of severity):
• Emergencies (0) (Highest severity)
• Alerts (1)
• Critical (2)
• Errors (3) (Default)
• Warnings (4)
• Notifications (5)
• Informational (6)
• Debugging (7) (Lowest severity)
Messages with a severity equal to or more than the set level are sent to the syslog server.
System Logs
This feature is used to analyze the system logs depending upon the log level that the user sets. To view the
logs in Primary AP UI, do the following configurations.
Step 3 Click Clear to clear the logs displayed in the Primary AP UI.
Optimizing RF Parameters
To maximize your network's Wi-Fi performance, you can optimize the coverage and quality of the radio
frequency (RF) signals.
Step 3 Select the Client Density by moving the slider and choose the Traffic Type.
To know the values that are set when low, typical, or high client density type is selected, see RF Parameter Optimization
Settings, on page 126.
Advanced RF Parameters
In addition to changing the client density and traffic type, you can also use the advanced parameters to maximize
your network's Wi-Fi performance. The following sections provide details for the same.
Optimized Roaming
Optimized roaming resolves the problem of sticky clients that remain associated to access points that are far
away and outbound clients that attempt to connect to a Wi-Fi network without having a stable connection.
Optimized roaming allows clients to disassociate based on the RSSI of the client data packets and data rate.
The client is disassociated if the RSSI alarm condition is met and the current data rate of the client is lower
than the optimized roaming data rate threshold.
Optimized roaming also prevents client association when the client's RSSI is low by checking the RSSI of
the incoming client against the RSSI threshold. This check prevents the clients from connecting to a Wi-Fi
network unless the client has a viable connection. In many scenarios, even though clients can hear beacons
and connect to a Wi-Fi network, the signal might not be strong enough to support a stable connection.
You can also configure the client coverage reporting interval for a radio by using optimized roaming.
Optimized Roaming is useful in the following scenarios:
• To address the sticky client challenge by proactively disconnecting clients.
• To actively monitor data RSSI packets.
• To disassociate a client when the RSSI is lower than the set threshold.
Step 1 Navigate to Advanced > RF Optimization. The RF Optimization page allows you to configure Optimized Roaming
parameters, Data Rates, Channels, Global Interferer detection.
Step 2 In the RF Optimization page, enable the 2.4GHz/5GHz Optimized Roaming toggle button to set interval and threshold
values.
If 2.4GHz/5GHz Optimized Roaming is enabled, the following parameters are displayed.
• 2.4GHz/ 5GHz Interval
• 2.4GHz/ 5GHz Threshold
Step 3 In the 2.4GHz Interval and 5GHz Interval text boxes, specify the values for the interval at which an access point reports
the client coverage statistics to the Primary AP.
2.4GHz/5GHz Configures the client coverage reporting interval for 2.4GHz and 5GHz networks. The interval
Interval ranges from 5 seconds to 90 seconds (default). If you configure a low reporting interval, the
network can get overloaded with coverage report messages. The client coverage statistics
includes data packet RSSIs, Coverage Hole Detection and Mitigation (CHDM) pre-alarm
failures, retransmission requests, and current data rates.
• By default, the AP sends client statistics to the Primary AP every 90 seconds.
• If the Interval is set to a value other than the 90 second default, the client statistics will
be sent only during failure cases.
2.4GHz/5GHz Configures the threshold data rates for 2.4GHz and 5GHz. The Threshold values are disabled
Threshold by default.
• For 2.4GHz, the threshold values that can be configured are: 1, 2, 5.5, 6, 9, 11, 12, 18, 24,
36, 48, 54 Mbps.
Optimized roaming disassociates clients based on the RSSI of the client data packet and
data rate. The client is disassociated if the current data rate of the client is lower than the
Optimized Roaming Data Rate Threshold.
• For 5GHz, the threshold values that can be configured are: 6, 9, 12, 18, 24, 36, 48, 54
Mbps.
Event Driven RRM This toggle allows an AP in distress to bypass normal RRM intervals and immediately change
channels. This is a global setting and can be enabled or disabled.
Interferer detection This is a global setting which enables the Primary AP to detect the non Wi-Fi sources. By
default, it is disabled.
5GHz Channel Width This drop-down option controls how broad the signal is for transferring data as
20MHz/40MHz/80MHz/Best. By increasing the channel width, we can increase the speed and
throughput of a wireless broadcast. This Global setting is set to Best by default.
Step 4 Set the threshold data rates of the client by manipulating the 2.4GHz Data Rates and 5GHz Data Rates sliders.
The following data rates are available:
• 2.4GHz—1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, 54 Mbps
• 5GHz—6, 9, 12, 18, 24, 36, 48, 54 Mbps
Step 5 Select DCA Channels—One can select or click individual channels to be included in DCA for 2.4GHz and 5GHz band.
Note A green underline below the channel number indicates that it is selected. Click to unselect the same.
5GHz This toggle is used to globally enable/disable Target Waketime support for 5GHz
radio in all Wi-Fi 6 APs/Mesh Extenders in the network. By default, this is Enabled.
5GHz This toggle is used to globally enable/disable Broadcast TWT support for 5GHz radio
in all Wi-Fi 6 APs/Mesh Extenders in the network. By default, this is Enabled.
BSS Color
2.4GHz This toggle is used to globally enable/disable BSS Color support for 2.4GHz radio in
all Wi-Fi 6 APs/Mesh Extenders in the network. By default, this is Enabled.
5GHz This toggle is used to globally enable/disable BSS Color support for 5GHz radio in
all Wi-Fi 6 APs/Mesh Extenders in the network. By default, this is Enabled.
5GHz This toggle is used to globally enable/disable BSS Color support for 5GHz radio in
all Wi-Fi 6 APs/Mesh Extenders in the network. By default, this is Enabled.
RF Profiles
RF Profiles allows you to tune groups of APs that share a common coverage zone together and selectively
change how RRM will operates the APs within that coverage zone. For example, a university might deploy
a high density of APs in an area where a high number of users will congregate or meet. This situation requires
that you manipulate both data rates and power to address the cell density while managing the co-channel
interference. In adjacent areas, normal coverage is provided and such manipulation would result in a loss of
coverage.
Using RF profiles and AP groups allows you to optimize the RF settings for AP groups that operate in different
environments or coverage zones. RF profiles are created for the 802.11 radios. RF profiles are applied to all
APs that belong to a group, where all APs in that group will have the same profile settings.
The RF profile gives you the control over the data rates and power (TPC) values. One can either associate a
built in RF Profile with AP Groups, or create a new RF Profile and then associate that with the AP Group.
To configure the RF Profile, do the following:
Step 1 Switch to Expert View in the CBW Web-UI by clicking the bi-directional arrows toggle button on the top-right.
Step 2 Navigate to Advanced > RF Profiles.
Step 3 Click Add New RF Profile.
Step 4 Under the General tab, configure the following:
• RF Profile Name—Provide a RF Profile name.
• RF Profile description—Provide an one-line reference for it.
• Band—Select the band 2.4GHz or 5GHz.
• Maximum Clients per radio—Select the maximum clients per radio. By default, it is 200. The maximum value
that is configurable is 200.
• Rx SOP Threshold—Receiver Start of Packet Detection Threshold (RxSOP) determines the Wi-Fi signal level in
dBm at which an access point's radio demodulates and decodes a packet. The default value is Auto.
As the Wi-Fi level increases, the radio sensitivity decreases and the receiver cell size becomes smaller. Reduction
of the cell size affects the distribution of clients in the network. RxSOP is used to address clients with weak RF
links, sticky clients, and client load balancing across access points. RxSOP helps to optimize the network performance
at high-density deployments (i.e larger number of clients) where access points need to optimize the nearest and
strongest clients.
• Multicast data rate—Use the Data rates option to specify the rate at which the multicast traffic can be transmitted
between the access points and the client. The default value is Auto.
Step 5 In the 802.11 tab, set the data rates and MCS for the RF profile.
• Data Rates—Use the Data rates option to specify the rate at which the data can be transmitted between the access
points and the client. The default rate is 11 Mbps.
• MCS Settings—The MCS settings determine the number of spatial streams, the modulation, the coding rate, and
the data rate values that are used. Ensure that all of the 0 to 31 MCS data rate indices are enabled (which is the
default setting).
The access point with the lowest number of clients has the lightest load. The window size and the number of clients
on the access point with the lightest load forms the threshold. Access points with more client associations than this
threshold is considered busy, and clients can associate only to access points with client counts lower than the threshold.
• Denial—In the Denial Count text box, enter a value between 1 and 10. The denial count sets the maximum number
of association denials during load balancing. The default size is 3.
Note If you do not enable RF Parameter Optimization during the initial configuration wizard, then client density
is set to Typical (the default value), and RF traffic type is set to Data (the default value).
The TPC (Tx Power Control) algorithm determines whether the power of an AP needs to be adjusted down.
Reducing the power of an AP helps mitigate co-channel interference with another AP on same channel in
close proximity.
Parameter Dependency Typical (Default High Density (Where Low Density (For
Profile) throughput is most coverage in open
important) spaces)
TX Power Global per band Default Higher Highest
TPC Threshold, Specific RF profile TPC Threshold: TPC Threshold: TPC Threshold:
TPC Min, and TPC per band
• -70 dBm for 5 • -65 dB for • -60 dBm for
max (These
GHz 5GHz 5GHz
parameters are
equivalent to TX • -70 dBm for • -70 dB for 2.4 • -65 dBm for
Power) 2.4 GHz GHz 2.4 GHz
TPC Min: Default at TPC Min: +7 dBm TPC Min: -10 dBm
-10dBm for 2.4 GHz and -10
TPC Max: Default
dBm for 5GHz.
TPC Max: Default at 30 dBm
at 30 dBm TPC Max: Default
at 30 dB
Parameter Dependency Typical (Default High Density (Where Low Density (For
Profile) throughput is most coverage in open
important) spaces)
CCA Threshold Global per band Default (0) Default (0) Default (0)
802.11a only
(hidden) RF Profiles
Coverage RSSI Global per band Default (Data: Default (Data: Default (Data:
Threshold Data and Voice -80dBm, Voice: -80dBm, Voice: -90dBm, Voice:
RSSI RF Profiles -80dBm) -80dBm) -80dBm)
Coverage Client Global per band Default (3 clients) Default (3 clients) Lower (2 clients)
Count (Coverage
Exception) RF
Profiles (Coverage
Hole Detection)
Data Rates Global per band 12 Mbp mandatory 12 Mbp mandatory CCK rates enabled
(network) RF
9Mbp supported 9Mbp supported 1, 2, 5.5, 6, 9, 11, 12
Profiles
Mbp enabled
1, 2, 5.5, 6, 11 Mbp 1, 2, 5.5, 6, 11 Mbp
disabled disabled
Troubleshooting in Primary AP
To troubleshoot in the Primary AP, there are features that allow you to check the connectivity, internet access,
radio admin state and to analyze the logs depending upon the log level setting. The following sections describe
these features.
UI Indicator
Once you login into the Primary AP GUI, navigate to Monitoring > Network Summary. Check the following
indicators:
• LAN Indicator—Shows if the default gateway IP of management interface is reachable.
• Internet Indicator—Shows if the public DNS (8.8.8.8) is reachable.
• Wireless Indicator—Checks the wireless connectivity by looping through all the APs present in Primary
AP for both the global networks provided both networks (A and B) are enabled. If any of the network is
down in any of the APs, the wireless status is considered to be down. Otherwise, the wireless indicator
is operational
Note This feature is available only for administrative user accounts with read and write privileges.
You use the Primary AP Tools page to manage the following operations:
Step 3 After the Primary AP reboots, proceed to Launching the Setup Wizard, on page 12.
The configuration file is saved on the device in which the Primary UI is being viewed. By default the file is
saved as config.txt in your downloads folder.
If HTTP is selected as Transfer mode, browse the file and click Apply.
If FTP/SFTP/TFTP is selected as Transfer mode, configure the IP address, File path, File name, and other
mandatory parameters and click Apply.
Note You can also do regular import of configuration file, by selecting FTP/SFTP/TFTP transfer mode and by
enabling Scheduled Update and configuring the Frequency, Time, window.
By default, the option is disabled.
The import causes all Primary AP-capable APs in the network to reboot. When the APs come back online,
the Primary AP Election process happens and a Primary AP comes online with the new imported Primary AP
configuration.
For more information about the Primary AP Election Process, see Primary AP Failover and Election Process,
on page 142.
During normal operation, the current configuration of the Cisco Business Wireless AP resides on the RAM
of the Primary AP. During a reboot, the volatile RAM is completely erased, but the data on the NVRAM is
retained.
You can save the Primary AP configuration from the RAM to the NVRAM. This ensures that in the event of
a reboot, the Primary AP can restart with the last saved configuration.
To save the Primary AP current configuration from the RAM to the NVRAM:
1. Click Save Configuration at the top-right of the Primary AP web interface.
2. Click Ok.
Upon successful saving of the configuration, a message conveying the same is displayed.
Troubleshooting Files
This section helps you to download the Support Bundle which includes configuration, logs and crash files for
trouble shooting.
Note Disable the Pop-up blocker in your browser settings so you can upload or download the configuration file.
Click Download Support Bundle for downloading support bundle to local machine.
The support bundle can also be downloaded via FTP Server if configured.
1. Specify the following:
• IP address
• File path
• Username
• password
• server port
Cisco Business Wireless will attempt to export troubleshooting files as soon as they are generated. If export
of troubleshooting files to FTP server is successful, the files are deleted from Cisco Business Wireless.
Troubleshooting Tools
The following tools can be used for troubleshooting:
SSHv2 Access
1. Switch to the Expert View, if you are currently in the Standard View.
2. Enable Secure Shell Version 2 (SSHv2) access mode for Primary AP console, that uses data encryption
and a secure channel for data transfer. By default, this is Disabled.
Note By default, SSH is disabled for all APs that are connected to the CBW network. SSH can be enabled only by
TAC for debugging purposes.
DNS Servers
• Choose Umbrella to use Public Open DNS Services
• Choose User Defined DNS to configure custom defined DNS Services.
Ping Test
This is similar to the client ping test. You can use this test to check if a particular IP (IP received by sub-ordinate
APs or client or open DNS IP) is reachable.
Example: Ping 8.8.8.8
DNS
This feature is used to verify if a particular DNS entered is valid.
Example: Ping google.com
Radius Response
This operates like a simulation tool to verify if the Primary AP is able to reach the RADIUS server. For this,
you should have at least one WLAN with WPA2 Enterprise as the access type. It is also used to verify if the
username and password details exist in the RADIUS server.
Click Start to run all the tests above.
Uploading Files
This section details the process to upload files to the Primary AP from WebUI using the local file upload such
as (HTTP), FTP or TFTP.
To upload a file, follow the steps below:
EAP Device These are the certificates that are needed for Extensible Authentication Protocol (EAP) based
Certificate authentication of the device.
Once the certificate is uploaded successfully, reload the Primary AP to apply the new certificate.
EAP CA Certificate Certificate Authority (CA) Certificates that are needed for Extensible Authentication Protocol
(EAP) based authentication. Only a .pem, .crt file format are allowed.
CCO Root CA CloudCenter Orchestrator (CCO) Root CA based certificate for authentication of the device. Only
Certificate a .crt file format is allowed.
A CCO Root CA is a Certificate Authority that owns one or more trusted roots. That means that
they have roots in the trust stores of the major browsers.
CBD Serv CA The CA certs is used to establish a secure communication from CBW to CBD. If the CBD has
Certificate updated the self-signed certificate then that certificate file should be uploaded in the CBW.
If connection between CBW and CBD is based on CBD probe or if the CBD uses certificate
signed by a trusted certificate authority, CBD Server CA Certificate upload is not required. The
allowed certificate file formats are .pem, .crt, and .cert.
WEBAUTH This certificate is used for Captive portal. By default, CBW AP uses self-signed certificate for
Certificate guest users. You can also upload custom certificate for captive portal using this option. Only
.pem file format is allowed.
WEBADMIN This certificate used for CBW Primary AP UI Access. By default, CBW AP uses self-signed
Certificate certificate for management access page. You can also upload custom certificate for management
access using this option. Only .pem file format is allowed. Please ensure that CommonName
and SubjectAltName in the custom certificate is ciscobusiness.cisco.
For both Web Auth or Web Admin certificate to upload:
• When the certificate is uploaded successfully, the Primary AP has to be reloaded to apply
the new certificate.
• The root CA certificate has to be installed in the client browser.
Step 3 Select HTTP, FTP, or TFTP for the Transfer Mode and provide relevant details.
Step 4 If the Transfer Mode is HTTP (Local Machine), click Browse and upload the file. If the Transfer Mode is FTP/TFTP,
then please enter the server IP, filename, file path and upload the file.
Step 5 Enter the Certificate password.
This field is available only for EAP Device Certificate or Webauth Certificate or Webadmin Certificate File Type.
The fields Certificate name and Valid up to show the certificate name and the validity of the certificated that is used
by the CBW AP.
Step 6 Click Apply settings and Import to upload the new certificate.
The status of the certificate upload can be viewed in the same page. Once the certificate upload is successful, the Certificate
Name and Valid up to fields will be updated.
Security Settings
This section explains how to control the client traffic using the Primary AP UI, using the option to create ACL
rules and apply those rules at WLAN level.
This section also contains details about how to create and configure an ACL.
• Wildcard match - Out of the 32 URL rules, a maximum of 20 characters can be wildcard matches.
• Allow/Deny Rules for any post-auth use.
• Configuration of ACL using the FQDN.
• 32 URL rules that can be configured per ACL name.
Note The features that are listed above are also applicable to post-auth.
The Primary AP is configured with the ACL name as per the WLAN, or an AP group, or an AP, or the data
returned by the AAA server. The data path of the AP, monitors the DNS requests or responses and learns the
IP address of the configured DNS names; and allows traffic for the IP addresses that have been learned.
If the ACL action Allow is used for a DNS response, the IP address will be added to the snooped list. For
post-auth ACL, if the URL action Deny is used, AP modifies the DNS response and sends the 0.0.0.0 IP
address to the client.
The two types of DNS ACL supported on Wave 2 APs are:
• Pre-Auth or Web-Auth DNS ACL: These ACLs have URLs set to Allow before the client authentication
phase. If the client has the URL rule set to Allow, then the client data is switched locally. If the URLs
do not match any rule, then all the packets are forwarded to the Primary AP.
By default, if the client data does not match any of the configured rules on the AP, the AP sends that
traffic to the Primary AP for L3 authorization.
• Post-Auth DNS ACL: These ACLs are applied when the client is running. Post-Auth ACL name can be
configured on the WLAN and it can be overridden by the ACL name configured on the AAA server for
a given client. If the ACL rule action is set to Deny for any URL, these URLs do not get any IP addresses
in the DNS response. The APs over-write the DNS response with 0.0.0.0 and sends it to the client.
Note • Enabling the policy ACL, will make the ACL to be added to default-flex-group and pushed down to APs.
• You can create a maximum of 32 IPv4 and IPv6 ACLs.
• You can also configure both IP and URL rules for the same ACL name.
• ACL rules are applied to the VLAN. Multiple WLANs can use the same VLAN and inherit ACL rules,
if any.
Protocol Specify the type of protocol. From the Protocol drop-down list, choose the protocol ID of the
IP packets to be used for this ACL. It can be one of the following or other layer 3 protocols.
• Any—Any protocol (this is the default value)
• TCP—Transmission Control Protocol
• UDP—User Datagram Protocol
• ICMP—Internet Control Message Protocol
• ESP—IP Encapsulating Security Payload
• AH—Authentication Header
• GRE—Generic Routing Encapsulation
• IP in IP—Internet Protocol (IP) in IP (permits or denies IP-in-IP packets)
• Eth Over IP—Ethernet-over-Internet Protocol
• OSPF—Open Shortest Path First
Other Any other Internet Assigned Numbers Authority (IANA) protocol. If you choose Other, enter
the number of the desired protocol in the Protocol text box. You can find a list of available
protocols in the IANA website.
When you specify Others as the protocol, you must specify the protocol number in the text
box that appears.
Source IP/Mask You can specify the starting range (here source IP) for applying the IP ACL.
Mask Masks are used with IP addresses in IP ACLs to specify what should be permitted and denied.
Example: 255.255.255.0
Source Port You can choose a single TCP/UDP source port to which packets are matched.
Dest. IP You can specify the ending range (destination IP) for applying the IP ACL.
Address/Mask
Dest. Port If you have chosen TCP or UDP, you will need to specify a Destination Port. This destination
port can be used by applications that send and receive data to and from the networking stack.
Some ports are designated for certain applications such as Telnet, SSH, HTTP, and so on.
DSCP From the DSCP drop-down list, choose one of these options to specify the differentiated services
code point (DSCP) value of this ACL. DSCP is an IP header text box that can be used to define
the quality of service across the Internet. You can choose:
• Any—Any DSCP (this is the default value).
• Specific—A specific DSCP ranging from 0 to 63, which you can specify in the DSCP edit
box.
f) After configuring all the above details, click Apply to configure IP ACL.
g) Click Add URL Rules.
h) In the Add/Edit URL ACLs window, enter the URL and specify to permit or deny in the Action field.
You cannot add the same URL in IPv4 and IPv6.
i) Click Apply.
On the Security Settings page, the ACL Type, ACL Name, and the Policy Name are listed. You can also view if the
policy names are mapped.
Step 1 Switch to the Expert View, if you are currently in the Standard View.
Step 2 Navigate to Wireless Settings > WLANs.
Step 3 In the WLANs window, click the Edit icon next to the WLAN to select it.
Step 4 In the Edit WLAN window, choose the Advanced tab and enable the Allow the AAA Override toggle button.
Step 5 Click Apply.
Note The configuration shown below is not applicable if you are using a CBD probe to manage CBW.
When CBW is managed by CBD probe, you are required to configure the SNMP settings on the Primary AP.
Refer to Managing SNMP, on page 117 for more details.
1. Navigate to Advanced > CBD settings. The Cisco Business Dashboard window displays the following
parameters:
• Connection Status—Indicates if the connectivity status between the CBW and CBD is up or down.
• Agent Version—Specifies the CBD agent version. For example, version 2.4.0
Note To troubleshoot issues with CBD connection, refer to Resolving connection issues between CBW and CBD,
on page 150.
Note Ensure that the data you provide on this page matches with the data configured in the CBD application.
To login and verify the details as configured in the CBD application, refer to Cisco Business Dashboard
Administration Guide.
Dashboard Name or Specify the IP address or dashboard name to which you wish to connect.
IP
The name or IP address specified in this field must be listed in the
Subject-Alternative-Name field of the certificate on Cisco Business Dashboard.
Refer to the Managing Certificates in the Cisco Business Dashboard
Administration Guide for more information on configuring the certificate.
Organization Name Enter the organization name created in the CBD application.
Network Name Enter the organization name created in the CBD application.
Access Key ID Enter the access key id created in the CBD application.
Access Key Secret Enter the access key secret created in the CBD application.
Note If the CBD is using a self-signed certificate, download a copy of that certificate from the CBD application.
Follow the instructions below to download:
1. In the CBD page, navigate to System > Certificate and select the Current Certificate tab.
2. Click Download at the bottom of the page. The certificate will be downloaded in PEM format by your
browser.
For normal Reload of Primary Capable APs, the LED states are as follows:
Stage — 3 Off
Mode button released / Pressed for more than
60 seconds (Logs: Starting Image…)
Note The Mode Button functionality described in stages 1, 2, and 3 above are applicable for both Mesh
Extenders and Primary Capable Access Points.
Note Clients that connect to the Primary AP will lose connectivity during a failover.
Note The Make Me Primary button is available only for the subordinate APs that are capable of participating in
the Primary election process.
When you force the failover of the Primary to an AP of your choice using the UI, the current Primary AP
reboots. The new AP takes over as the Primary AP with the IP address and configuration as the previous
Primary. When the reboot is complete the previous Primary comes back online and joins the new Primary AP
as a subordinate AP.
Note The forced failover causes downtime in the Cisco Business Wireless network. During this downtime, clients
associated to wired uplink APs will not face any disruption in service and no new clients can be connected.
This process is based on Virtual Router Redundancy Protocol (VRRP) that algorithmically determines the
next Primary AP, based on the following parameters listed in the order of descending precedence:
• The AP configured as next-preferred Primary.
• The AP with the least load in terms of the number of associated clients.
• Among APs with a similar client load, the AP with the lowest MAC address.
Step 6 Choose the ACL Name if you want the guest to access or block few sites / IP.
Step 7 Click Apply to create the Guest WLAN.
Once the Guest connects to your Guest WLAN, it pop ups an Authentication page, and the network access is provided
if successfully authenticated.
Note • You can also export Guest information by navigating to Monitoring > Network Summary > Guests
option.
• The login page of the Guest WLAN can be configured in Web UI under Wireless Settings > Guest WLAN
page. Refer to the section Setting a Login Page for WLAN Guest Users, on page 79.
To clear the Primary AP configuration and reset the entire network, see Clearing the Primary AP Configuration
and Resetting to Factory Defaults, on page 128.
To factory default a single AP, refer to the Factory Default section, under Tools in the Viewing Access Point
Details, on page 25.
To reset the AP or Mesh extender to factory default using the Mode button, follow the steps below.
1. Remove or unplug the power to the device.
2. Press and hold the Mode button while re-applying power to the device.
3. Once the LED pattern changes to solid red, release the Mode button and allow the device to continue
booting up.
The location of the Mode button on the CBW150AX and CBW151AXM models are shown below.
• CBW150AX: the mode button is located at the back of the device near the Ethernet port.
• CBW151AXM: the mode button is located at the side of the device near the Power button.
Note If the Mode button is pressed for over 60 seconds, the factory default reset is ignored. If the Mode button is
pressed after the device boots up, it is ignored.
After a few seconds, the device LED will begin blinking blue for 20 seconds, and then switch to solid red.
Max Client Wrning Threshold Triggers the trap when the system reaches 90% of
max client associated with this Primary AP.
802.11 Security WEP/WPA Decrypt Error Sending traps if any wep/wpa decrypt error detected
on any of the APs.
IDS Signature attack detected Sending traps if any IDS signature attack (Assoc,
deauth flood) is detected by the Access point .
Auto-RF Client/Channels Load,Noise, Sending trap when failure or max threshold reached
Profiles(RRM) interference, coverage hole for the RRM measurements.
child excluded parent Sending trap if Mesh Extender excludes the parent
node.
child moved Send trap if mesh extender moved from this parent.
excessive parent change Send trap if mesh extender change parent rapidly.
abate SNR Send trap if parent SNR is high ( more than 60).
excessive children Send trap if any node has more than 20 mesh
extenders (this will not hit for SMB customers).
The table below gives an approximate coverage area of CBW APs in the open space. The values can be reduced
by a factor of 20-30% in case of office/home deployments and the APs could be placed apart at a computed
distance.
AP Meters Feet
CBW150AX 15 to 18 50 to 60
CBW151AXM 15 to 18 50 to 60
Avoid placing the Mesh Extenders very close to each other and other Primary Capable APs.
Locate the Mesh Extenders where the Signal to Noise Ratio (SNR) value is good (more than 30).
Note Navigate to Monitoring > Network Summary > Mesh Extender to check the SNR value.
You can also identify the Nearest APs for each Mesh Extender by checking on Nearest APs field under
Monitoring > Access Points. Select the Mesh Extender and then refer to the General section in the Access
Point View page.
• Choose non-DFS channels (36-48, 149-165) for maximizing the coverage, as DFS channels (channel 52
- 144) will have low power level. To change the channel for the AP:
In a Non-Mesh deployment:
1. Switch to Expert view.
2. Navigate to Advanced > RF optimization > Select DCA channels > 5Ghz.
3. Deselect the DFS channel numbers.
Note Nations apply their own RF emission regulations to the allowable channels, allowed users, and maximum
power levels within the frequency ranges.
10. In the pop-up Certificates window, select the Trusted Root Certification Authorities tab.
11. Click on the Import button to launch the Certificate Import Wizard.
12. Click Next.
13. Select Browse and use the explorer window to locate the certificate you exported in the earlier step.
14. Click Next and then Finish.
15. In the Security Warning pop-up window, click on Yes. You should see yet another pop-up letting you
know that the import was successful.
16. Restart Chrome, and navigate to the Primary AP UI using https://<managementip>. You should see a
closed padlock and Secure annotation to the left of the URL.
8. Drag the certificate you copied to the desktop into the list of certificates.
9. After the certificate is added to the System keychain, double-click to open it.
10. Expand the Trust section. For the first option, pick Always Trust.
11. Quit Chrome and all other browsers and navigate to the Primary AP UI using https://<managementip>.
You should see the closed padlock and Secure annotation to the left of the URL.
Note Use https://<managementip> to access the Primary AP UI, if the self-signed certificate is added to your
machine.
Primary AP Primary The default active image version of the Primary AP.
Image
Pre-download status If the access point is going for an software update the corresponding
pre-download status is displayed.
Pre-downloaded version Version of the pre-downloaded image during software upgrade process.
About Mounting
These mounting instructions describe the steps for mounting supported Cisco Business Wireless series Access
Points in several configurations, including on a suspended ceiling, on a hard ceiling or wall, and above a
suspended ceiling. The Mesh Extender can only be plugged into an AC outlet.
Note You can mount the Access Point above a suspended ceiling but you must purchase additional mounting
hardware. For additional information, see mounting and grounding sections for individual Access Point models
in the later sections.
Access Points mounted in a building’s environmental airspace must be powered using PoE to comply with
safety regulations.
The CBW150AX Access Point model is powered through PoE and the CBW151AXM model is plugged
directly into an AC source.
Cisco recommends that you make a site map showing Access Point locations so that you can record the device
MAC addresses from each location and return them to the person who is planning or managing your wireless
network.
Note When mounting the Access Point in the plenum air space or above a suspended ceiling, it should be mounted
on a vertical wall or with the face of the Access Point (having the status LED) directed downwards.
Note The ceiling grid clip is not included in the original packaging and must be ordered separately.
Mounting Brackets
The standard mounting hardware supported by the Access Point is a mounting bracket (Part #74-123953-01)
for ceiling and wall with 4 expansion screws. You can fasten the bracket to the wall or ceiling using these
screws.
Note Access points with integrated antennas perform best when the Access Point is mounted on horizontal surfaces
such as a table top or ceiling. For advanced features such as voice, location, and rogue Access Point detection,
ceiling mounting is strongly recommended. However, for smaller areas such as conference rooms, kiosks,
transportation environments, or hot-spot usage where data coverage is the primary concern, the unit may be
wall mounted using wall anchors or screws.
To mount the Access Point on a solid ceiling or wall, follow the steps below.
1. Use the mounting bracket as a template to mark the locations of the mounting holes on the bracket.
• Be sure to mark all four locations. To ensure a safe and secure installation, make sure you are using
adequate fasteners and mount the Access Point using no less than four fasteners.
• Do not use plastic wall anchors or the keyhole slots on the mounting bracket for ceiling installations.
When mounting the Access Point on a hard ceiling, use four fasteners capable of maintaining a
minimum pullout force of 20 lbs (9 kgs).
2. Use a #29 drill (0.1360-in. [3.4772 mm]) bit to drill a pilot hole at the mounting hole locations you
marked.
The pilot hole size varies according to the material and thickness you are fastening. Cisco recommends
that you test the material to determine the ideal hole size for your mounting application.
3. (Optional) Drill or cut a cable access hole large enough for the Ethernet cable and the building ground
wire.
4. (Optional) Use the ground screw to attach the building ground wire to the mounting bracket. See
Grounding an Access Point, on page 157 for general grounding instructions.
5. Position the mounting bracket mounting holes (with indents down) over the pilot holes.
6. Insert a fastener into each mounting hole and tighten.
7. Connect the Ethernet cable to the Access Point.
8. Align the bracket feet over the keyhole mounting slots on the Access Point.
9. Gently slide the Access Point onto the mounting bracket keyhole slots until it clicks into place.
10. Fasten the Access Point to the bracket using the M2 x 5.5mm Torx security screw. Cover it with the
mylar label.
Note Install access points above ceiling tiles only when mounting below the ceiling is not an option. Mounting
access points above the ceiling can interfere with advanced wireless LAN features that depend on uniform
coverage, such as voice and location.
To mount the Access Point above a suspended ceiling, follow the steps below.
1. Remove a ceiling tile next to the mounting location.
2. Fasten the Access Point mounting bracket to the box hanger using the clip or screws provided with the
box hanger kit.
3. Connect the Ethernet cable to the Access Point.
4. Align the bracket feet over the keyhole mounting slots on the Access Point.
5. Slide the Access Point onto the mounting bracket until it clicks into place.
6. Attach the T-rail clips on each end of the T-bar box hanger to the ceiling rails. Make sure the clips are
securely attached to the T-rails.
7. Fasten the Access Point to the bracket using the M2 x 5.5mm Torx security screw. Cover it with the mylar
label.
8. Replace the ceiling tile.
CBW151AXM Mesh Extender can be directly plugged into AC power wall socket power outlet, providing
120~240V AC, 50~60Hz power.
SUMMARY STEPS
1. Find a suitable building grounding point as close to the Access Point as possible.
2. Connect a user-supplied ground wire to the building grounding point. The wire should be a minimum of
#14AWG assuming a circuit length of 25 ft (30.5 cm). Consult your local electrical codes for additional
information.
3. Route the ground wire to the Access Point.
4. Attach the wire to a suitable grounding O-ring lug.
5. Crimp or solder the wire to the lug.
6. Insert the grounding post screw into the O-ring lug and install it on the mounting bracket as shown in the
figure above.
7. Use a Phillips screwdriver to tighten the ground screw.
DETAILED STEPS
Step 1 Find a suitable building grounding point as close to the Access Point as possible.
Step 2 Connect a user-supplied ground wire to the building grounding point. The wire should be a minimum of #14AWG
assuming a circuit length of 25 ft (30.5 cm). Consult your local electrical codes for additional information.
Step 3 Route the ground wire to the Access Point.
Step 4 Attach the wire to a suitable grounding O-ring lug.
Step 5 Crimp or solder the wire to the lug.
Step 6 Insert the grounding post screw into the O-ring lug and install it on the mounting bracket as shown in the figure above.
Step 7 Use a Phillips screwdriver to tighten the ground screw.
802.1Q-based VLAN
The IEEE 802.1Q specification establishes a standard method for tagging Ethernet frames with VLAN membership information, and
defines the operation of VLAN bridges that permit the definition, operation, and administration of VLAN topologies within a bridged
LAN infrastructure. The 802.1Q standard is intended to address the problem of how to divide large networks into smaller parts so
broadcast and multicast traffic does not use more bandwidth than necessary. The standard also helps provide a higher level of security
between segments of internal networks
802.1X Supplicant
Supplicant is one of the three roles in the 802.1X IEEE Standard. The 802.1X was developed to provide security in Layer 2 of the
OSI Model. It is composed of the following components: Supplicant, Authenticator, and Authentication Server. A Supplicant is the
client or software that connects to a network so that it can access resources on that network. It needs to provide credentials or certificates
to obtain an IP address and be part of that particular network. A Supplicant cannot have access to the network’s resources until it has
been authenticated.
A
ACL
An Access Control List (ACL) is a list of network traffic filters and correlated actions used to improve security. It blocks or allows
users to access specific resources. An ACL contains the hosts that are permitted or denied access to the network device. ACLs can
be defined in one of two ways: by IPv4 address or by IPv6 address.
Allowlist
Allowlist is a list of Client/Mesh Extender MAC addresses that are allowed to join the network.
B
Band Steer
Advanced load balancing, better known as band steering, is a feature that detects devices capable of transmitting at 5GHz band. The
2.4GHz band is often congested and experiences interference from different devices such as Bluetooth, and even microwave ovens.
This feature allows your Access Point to steer and direct devices to a more optimal radio frequency, thus, improving network
performance
Bandwidth
Bandwidth is the measurement of the ability of a device to send and receive information.
Bandwidth Utilization
Bandwidth utilization allows you to place a threshold on the average successful data transfer through a communication path. Some
of the techniques used to improve this are bandwidth shaping, management, capping, and allocation.
Blocklist
A Blocklist is a list of Client/Mesh Extender MAC addresses that are denied to join the network.
C
Captive Portal
Captive Portal method forces LAN users or hosts on the network to see a special web page before they can access the public network
normally. Captive Portal turns a web browser into an authentication device. The web page requires user interaction or authentication
before the access is allowed to use the network.
CBD Probe
Cisco Business Dashboard Probe is installed at each site in the network and associated with the Dashboard. The probe performs
network discovery and communicates directly with each managed device.
Channel Isolation
A device with channel management enabled, automatically assigns wireless radio channels to the other A2 devices in the cluster. The
automatic channel assignment reduces interference with other access points outside of its cluster and maximizes Wi-Fi bandwidth to
help maintain the efficiency of communication over the wireless network. Automatic channel assignments are supported in non-mesh
deployments.
Channel Width
Channel width controls how broad the signal is for transferring data. Think of it like a highway. The wider the road, the more traffic
(data) can pass through. On the other hand, the more cars (routers) you have on the road, the more congested the traffic becomes. By
increasing the channel width, we can increase the speed and throughput of a wireless broadcast. By default, the 2.4GHz frequency
uses a 20 MHz channel width. A 20MHz channel width is wide enough to span one channel.
A 40 MHz channel width bonds two 20 MHz channels together, forming a 40 MHz channel width; therefore, it allows for greater
speed and faster transfer rates.
Client QoS
The Client Quality of Service (QoS) Association is a section that provides additional options for customization of a wireless client’s
QoS. These options include the bandwidth allowed to send, receive, or guaranteed. Client QoS Association can further be manipulated
with the use of Access Control Lists (ACL).
Connection Speed
Connection speed is the speed that data is transferred between your client and the internet.
D
DCA
Dynamic Channel Assignment (DCA) can dynamically determine best bandwidth for each AP connected to the Primary AP. DCA
algorithm manages, evaluates the channel assignments on AP on per radio basis. It automatically adjusts the channel to maintain
performance of individual radios.
E
EAPol
Extensible Authentication Protocol (EAP) over LAN (EAPoL) is a network port authentication protocol used in IEEE 802.1X (Port
Based Network Access Control) developed to give a generic network sign-on to access network resources.
EAPoL, is a simple encapsulation that can run over any LAN. The following are the three main components defined in EAP and
EAPoL to accomplish the authentication conversation:
• Supplicant—Port Authentication Entity (PAE) seeking access to network resources
• Authenticator—PAE that controls network access
• Authentication Server—RADIUS/AAA server
Event Logging
System events are activities in the system that may require attention and necessary actions to be taken in order to run the system
smoothly and prevent failures. These events are recorded as logs. System Logs enable the administrator to keep track of particular
events that take place on the device. Event logs are useful for network troubleshooting, debugging packet flow, and monitoring events.
F
Fast Roaming
Fast roaming between wireless access points permits a fast, secure, and uninterrupted wireless connectivity to achieve seamless
mobile experience for real-time applications such as FaceTime, Skype, and Cisco Jabber.
H
HTTPS
Hyper Text Transfer Protocol Secure (HTTPS) is a transfer protocol that is more secure than HTTP. The Access Point can be managed
through both HTTP and HTTPS connections when the HTTP/HTTPS servers are configured. Some web browsers use HTTP while
others use HTTPS. An Access Point must have a valid Secure Socket Layer (SSL) certificate to use HTTPS service.
I
IPv4
IPv4 is a 32-bit addressing system used to identify a device in a network. It is the addressing system used in most computer networks,
including the Internet.
IPv6
IPv6 is a 128-bit addressing system used to identify a device in a network. It is the successor to IPv4 and the most recent version of
the addressing system used in computer networks. IPv6 is currently being rolled out around the world. An IPv6 address is represented
in eight fields of hexadecimal numbers, each field containing 16 bits. An IPv6 address is divided into two parts, each part composed
of 64 bits. The first part being the Network Address, and the second part the Host Address.
ISE
Identity Services Engine (ISE) is a network administration product that enables the creation and enforcement of security and access
policies for endpoint devices connected to the company's routers and switches. The purpose is to simplify identity management across
diverse devices and applications.
L
LLDP
Link Layer Discovery Protocol (LLDP) is a discovery protocol that is defined in the IEEE 802.1AB standard. LLDP allows network
devices to advertise information about themselves to other devices on the network. LLDP uses the Logical Link Control (LLC)
services to transmit and receive information to and from other LLDP agents. LLC provides a Link Service Access Point (LSAP) for
access to LLDP. Each LLDP frame is transmitted as a single MAC service request. Each incoming LLDP frame is received at the
MAC Service Access Point (MSAP) by the LLC entity as a MAC service indication.
Load Balancing
Load balancing is a network terminology which is used to distribute the workload across multiple computers, network links, and
various other resources to achieve proper resource utilization, maximize throughput, response time, and mainly avoid the overload.
Local Probe
Local probe is the same as Cisco Business Dashboard Probe. This may be installed on the same host as Cisco Business Dashboard
in order to manage devices on the network that is local to the Dashboard.
M
Max Data Rate
Maximum Data rate is the max speed at which data is transferred between two devices, measured in mega bits per second (Mbps or
mbps)
Multiple SSIDs
You can configure several Service Set Identifiers (SSIDs) or Virtual Access Points (VAPs) on your Access Point and assign different
configuration settings to each SSID. All the SSIDs may be active at the same time. Client devices can associate to the Access Point
using any of the SSIDs.
MU-MIMO
MU-MIMO (multi-user, multiple input, multiple output) is a wireless technology that was introduced in the 802.11ac Wave 2 (Wi-Fi
5) standard. It allows a single Access Point (AP) to transmit data to multiple devices simultaneously. MU-MIMO dramatically
improves performance and efficiency when APs are transmitting to client devices that support Wi-Fi 5 or Wi-Fi 6.
N
Network Plug n Play
Network Plug and Play is a service that works in conjunction with Network Plug and Play enabled devices to allow firmware and
configuration to be managed centrally, and to allow zero-touch deployment of new network devices. Devices may be deployed directly
using the Network Plug and Play protocol, or indirectly if discovered by a probe that is associated with the Dashboard.
O
OFDMA
OFDMA (orthogonal frequency-division multiple access), a technology in Wi-Fi 6, improves wireless network performance by
establishing independently modulating subcarriers within frequencies. This approach allows simultaneous transmissions to and from
multiple clients.
Operating Mode
The A2 Access points, CBW140, CBW240, CBW145 are Primary Capable and they can serve as Primary AP. CBW141, CBW142,
CBW143 are Mesh Extenders. The Primary Capable AP can serve as Mesh Extenders wirelessly, in addition to connecting the clients.
The A2 Access Points acting as Mesh Extenders helps in extending the network coverage.
P
PMF
This is specific to 802.11w protocol. The 802.11w protocol applies only to a set of robust management frames that are protected by
the Protected Management Frames (PMF) service. These include Disassociation, Deauthentication, and Robust Action frames.
PMKID
Pairwise Primary Key Identifier (PMKID) is the unique key identifier used by the Access Point to keep track of the PMK being used
for the client.
PoE-PD
Power Over Ethernet Powered Device. An Ethernet port that can receive power to provide network connectivity.
PoE-PSE
Power Over Ethernet Power Sourcing Equipment. An Etherent port that can supply power and provide network connectivity.
Q
QoS
Quality of Service (QoS) allows you to prioritize traffic for different applications, users or data flows. It can also be used to guarantee
performance to a specified level, thus, affecting the quality of service of the client. QoS is generally affected by the following factors:
jitter, latency, and packet loss.
R
RADIUS Server
Remote Authentication Dial-In User Service (RADIUS) is an authentication mechanism for devices to connect and use a network
service. It is used for centralized authentication, authorization, and accounting purposes. A RADIUS server regulates access to the
network by verifying the identity of the users through the login credentials entered. For example, a public Wi-Fi network is installed
in a university campus. Only those students who have the password can access these networks. The RADIUS server checks the
passwords entered by the users and grants or denies access as appropriate.
Radio Domains
Based on the regulatory domain of the AP, the carrier set values will be set for both 2.4GHz and 5GHz. For example, the radio
domains for US regulatory domain is –A for 2.4GHz and –B for 5GHz.
Rogue AP Detection
A rogue Access Point (AP) is an Access Point that has been installed on a network without explicit authorization from a system
administrator. Rogue access points pose a security threat because anyone with access to the area can knowingly or unknowingly
install a wireless Access Point that can allow unauthorized parties to access the network. The Rogue AP Detection feature on your
Access Point allows it to see these rogue access points that are within the range and it displays their information in the web-based
utility. You can add any authorized access points to the Trusted AP List
S
Scheduler
The wireless scheduler helps to schedule a time interval for a Virtual Access Point (VAP) or radio to be operational, which helps to
save power and increase security. You can associate up to 16 profiles to different VAPs or radio interfaces, but each interface is
allowed only one profile. Each profile can have a certain number of time rules that control the uptime of the associated VAP or
WLAN.
Signal Quality
Signal quality is a value ranging from 0 to 100, which considers, the noise generated by interference sources, along with signal
strength.
Signal Strength
The signal strength is the wireless signal power level received by the wireless client. Strong signal strength results in more reliable
connections and higher speeds. Signal strength is represented in -dBm format (0 to -100). This is the power ratio in decibels (dB) of
the measured power referenced to one milliwatt. The closer the value is to 0, the stronger the signal. For example, -41dBm is better
signal strength than -61dBm.
Spatial Streams
Wi-Fi Spatial streaming or multiplexing is a transmission technique used in multiple-input-multiple-output (MIMO) wireless
communication to transmit/receive independent and separately coded data signals (which are called as streams), from each of the
multiple transmit antennas.
In other words, wireless signals that are transmitted or received by the various antennae are multiplexed by using different spaces
within the same spectral channel. These spaces is known as spatial streams.
Spectrum Intelligence
Spectrum intelligence scans for non-Wi-Fi radio interference on 2.4-GHz and 5-GHz bands, and provides basic functions to detect
interferences of three types, namely microwave, continuous wave (like video bridge and baby monitor), Wi-Fi and frequency hopping
(Bluetooth and frequency-hopping spread spectrum (FHSS) cordless phone).
SSID
The Service Set Identifier (SSID) is a unique identifier that wireless clients can connect to or share among all devices in a wireless
network. It is case-sensitive and must not exceed 32 alphanumeric characters. This is also called Wireless Network Name.
SSID Broadcast
When a wireless device searches the area for wireless networks that it can connect to, it will detect the wireless networks within its
range through their network names or SSIDs. The broadcast of the SSID is enabled by default. However, you may also choose to
disable it.
T
Target Waketime
A new power-saving mode called Target Wake Time (TWT) allows the client to stay asleep and to wake up only at pre-scheduled
(target) times to exchange data with the Access Point. This offers significant energy savings for battery-operated devices, up to three
to four times the savings achieved by 802.11n and 802.11ac.
V
VLAN
A Virtual Local Area Network (VLAN) is a switched network that is logically segmented by function, area, or application, without
regard to the physical locations of the users. VLANs are a group of hosts or ports that can be located anywhere in a network but
communicate as if they are on the same physical segment. VLANs help to simplify network management by letting you move a
device to a new VLAN without changing any physical connections
W
WDS
Wireless Distribution System (WDS) is a feature which enables the wireless interconnection of access points in a network. It enables
the user to expand the network with multiple access points wirelessly. WDS also preserves the MAC addresses of client frames across
links between access points. This capability is critical because it provides a seamless experience for roaming clients and allows
management of multiple wireless networks.
WPA/WPA2
Wi-Fi Protected Access (WPA and WPA2) are security protocols used for wireless networks to protect privacy by encrypting the
transmitted data over the wireless network. This uses AES type of encryption. The encryption keys that are used for each client on
the network are unique and specific to that client. WPA and WPA2 are both forward compatible with IEEE 802.11e and 802.11i.
WPA and WPA2 have improved authentication and encryption features compared to the Wired.
WPA2 Enterprise
This mode of security will use EAP-FAST for authenticating the Wireless clients and AES for encryption. Cisco Secure ACS server
will be used as the external RADIUS server for authenticating the wireless clients.
In Enterprise mode of operation there is a mutual authentication between a client and an authentication server (Internal or External).
In addition,it removes the administrative burden and security issues surrounding static encryption keys.
WPA3
Wi-Fi Protected Access 3 (WPA3) is the third iteration of a security standard or protocol developed by the Wi-Fi Alliance. WPA3
was designed to replace the WPA2 security standard, adding several security enhancements and tackling security vulnerabilities of
the WPA2 to better secure personal and enterprise wireless networks. WPA3 uses a more powerful and robust encryption by AES
with the GCMP (Galois/Counter Mode Protocol) and uses more reliable handshake mechanism called Simultaneous Authentication
of Equals (SAE).
Cisco Business
Support
Cisco Business Open Source Requests If you wish to receive a copy of the source code to
which you are entitled under the applicable free/open
source license(s) (such as the GNU Lesser/General
Public License), please send your request to:
[email protected].
In your request, please include the Cisco product
name, version, and the 18 digit reference number (for
example: 7XEEX17D99-3X49X08 1) found in the
product open source documentation.