User Guide for CISCO models including: Catalyst 9800 Series Wireless Controller Software, Catalyst 9800 Series, Wireless Controller Software, Controller Software, Software
Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x - Cisco
Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x First Published: 2023-07-31 Last Modified: 2023-07-31 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED "AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version. Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R) © 2023 Cisco Systems, Inc. All rights reserved. CONTENTS PREFACE CHAPTER 1 PART I CHAPTER 2 Preface xcix Document Conventions xcix Related Documentation ci Communications, Services, and Additional Information ci Cisco Bug Search Tool ci Documentation Feedback ci Overview of the Controller 1 Overview of Cisco 9800 Series Wireless Controllers 1 Elements of the New Configuration Model 1 Configuration Workflow 2 Initial Setup 3 Interactive Help 4 System Configuration 7 New Configuration Model 9 Information About New Configuration Model 9 Configuring a Wireless Profile Policy (GUI) 12 Configuring a Wireless Profile Policy (CLI) 12 Configuring a Flex Profile (GUI) 14 Configuring a Flex Profile 14 Configuring an AP Profile (GUI) 15 Configuring an AP Profile (CLI) 20 Configuring User for AP Management (CLI) 21 Setting a Private Configuration Key for Password Encryption 21 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x iii Contents Configuring an RF Profile (GUI) 22 Configuring an RF Profile (CLI) 22 Configuring a Site Tag (GUI) 24 Configuring a Site Tag (CLI) 24 Enhanced Site Tag-Based Load Balancing 25 Feature History for Enhanced Site Tag-Based Load Balancing 25 Information About Enhanced Site Tag-Based Load Balancing 26 Prerequisites for Enhanced Site Tag-Based Load Balancing 26 Use Cases 27 Configuring Site Load (CLI) 27 Verifying Enhanced Site Tag-Based Load Balancing Configuration 27 Configuring Policy Tag (GUI) 28 Configuring a Policy Tag (CLI) 28 Configuring Wireless RF Tag (GUI) 29 Configuring Wireless RF Tag (CLI) 30 Attaching a Policy Tag and Site Tag to an AP (GUI) 31 Attaching Policy Tag and Site Tag to an AP (CLI) 31 Configuring a Radio Profile 32 Information About Wireless Radio Profile 32 Configuring a Wireless Radio Profile (GUI) 33 Configuring a Radio Profile and Beam Selection 34 Configuring the Antenna Count in a Wireless Radio Profile 34 Configuring a Slot Per Radio in the RF Tag Profile 35 Verifying a Radio Profile 35 AP Filter 36 Introduction to AP Filter 36 Set Tag Priority (GUI) 37 Set Tag Priority 37 Create an AP Filter (GUI) 38 Create an AP Filter (CLI) 38 Set Up and Update Filter Priority (GUI) 39 Set Up and Update Filter Priority 39 Verify AP Filter Configuration 40 Configuring Access Point for Location Configuration 41 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x iv Contents CHAPTER 3 CHAPTER 4 CHAPTER 5 Information About Location Configuration 41 Prerequisite for Location Configuration 41 Configuring a Location for an Access Point (GUI) 41 Configuring a Location for an Access Point (CLI) 42 Adding an Access Point to the Location (GUI) 42 Adding an Access Point to the Location (CLI) 43 Configuring SNMP in Location Configuration 44 SNMP MIB 44 Verifying Location Configuration 44 Verifying Location Statistics 45 Wireless Management Interface 47 Information About Wireless Management Interface 47 Recommendations for Wireless Management Interface 48 Configuring your Controller with Wireless Management Interface (CLI) 49 Verifying Wireless Management Interface Settings 50 Information About Network Address Translation (NAT) 51 Information About CAPWAP Discovery 52 Configuring Wireless Management Interface with a NAT Public IP (CLI) 52 Configuring CAPWAP Discovery to Respond Only with Public or Private IP (CLI) 53 Configuring the Controller to Respond only with a Public IP (CLI) 53 Configuring the Controller to Respond only with a Private IP (CLI) 54 Verifying NAT Settings 54 BIOS Protection 57 BIOS Protection on the Controller 57 BIOS or ROMMON Upgrade with BIOS Protection 57 Upgrading BIOS 58 Smart Licensing Using Policy 59 Introduction to Smart Licensing Using Policy 59 Information About Smart Licensing Using Policy 60 Overview 60 Supported Products 60 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x v Contents Architecture 61 Product Instance 61 CSLU 61 CSSM 62 Controller 62 SSM On-Prem 63 Concepts 64 License Enforcement Types 64 License Duration 65 Authorization Code 65 Policy 65 RUM Report and Report Acknowledgement 67 Trust Code 68 Supported Topologies 69 Connected to CSSM Through CSLU 69 Connected Directly to CSSM 71 CSLU Disconnected from CSSM 73 Connected to CSSM Through a Controller 74 No Connectivity to CSSM and No CSLU 75 SSM On-Prem Deployment 77 Interactions with Other Features 80 High Availability 80 Upgrades 81 Downgrades 83 How to Configure Smart Licensing Using Policy: Workflows by Topology 86 Workflow for Topology: Connected to CSSM Through CSLU 86 Workflow for Topology: Connected Directly to CSSM 89 Workflow for Topology: CSLU Disconnected from CSSM 90 Workflow for Topology: Connected to CSSM Through a Controller 93 Workflow for Topology: No Connectivity to CSSM and No CSLU 94 Workflow for Topology: SSM On-Prem Deployment 95 Tasks for Product Instance-Initiated Communication 95 Tasks for SSM On-Prem Instance-Initiated Communication 98 Migrating to Smart Licensing Using Policy 100 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x vi Contents Example: Smart Licensing to Smart Licensing Using Policy 101 Example: SLR to Smart Licensing Using Policy 108 Example: Evaluation or Expired to Smart Licensing Using Policy 116 Migrating to a Version of SSM On-Prem That Supports Smart Licensing Using Policy 119 Task Library for Smart Licensing Using Policy 121 RUM Reporting and Acknowledgment Requirement for Cisco Catalyst 9800-CL Wireless Controller 121 Logging into Cisco (CSLU Interface) 124 Configuring a Smart Account and a Virtual Account (CSLU Interface) 124 Adding a Product-Initiated Product Instance in CSLU (CSLU Interface) 124 Ensuring Network Reachability for Product Instance-Initiated Communication 125 Adding a CSLU-Initiated Product Instance in CSLU (CSLU Interface) 126 Collecting Usage Reports: CSLU Initiated (CSLU Interface) 127 Export to CSSM (CSLU Interface) 128 Import from CSSM (CSLU Interface) 128 Ensuring Network Reachability for CSLU-Initiated Communication 129 Assigning a Smart Account and Virtual Account (SSM On-Prem UI) 133 Validating Devices (SSM On-Prem UI) 134 Ensuring Network Reachability for Product Instance-Initiated Communication 134 Retrieving the Transport URL (SSM On-Prem UI) 137 Exporting and Importing Usage Data (SSM On-Prem UI) 137 Adding One or More Product Instances (SSM On-Prem UI) 138 Ensuring Network Reachability for SSM On-Prem-Initiated Communication 139 Setting Up a Connection to CSSM 144 Configuring Smart Transport Through an HTTPs Proxy 146 Configuring the Call Home Service for Direct Cloud Access 147 Configuring the Call Home Service for Direct Cloud Access through an HTTPs Proxy Server 150 Removing and Returning an Authorization Code 151 Removing the Product Instance from CSSM 154 Generating a New Token for a Trust Code from CSSM 154 Installing a Trust Code 155 Downloading a Policy File from CSSM 156 Uploading Data or Requests to CSSM and Downloading a File 157 Installing a File on the Product Instance 158 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x vii Contents CHAPTER 6 CHAPTER 7 CHAPTER 8 CHAPTER 9 Setting the Transport Type, URL, and Reporting Interval 159 Configuring an AIR License 161 Sample Resource Utilization Measurement Report 164 Troubleshooting Smart Licensing Using Policy 164 System Message Overview 164 System Messages 166 Additional References for Smart Licensing Using Policy 176 Feature History for Smart Licensing Using Policy 176 Management over Wireless 181 Information About Management over Wireless 181 Restrictions on Management over Wireless 181 Enabling Management over Wireless on Controller (GUI) 182 Enabling Management over Wireless on Controller (CLI) 182 Boot Integrity Visibility 183 Overview of Boot Integrity Visibility 183 Verifying Software Image and Hardware 183 Verifying Platform Identity and Software Integrity 184 SUDI99 Certificate Support 187 SUDI99 Certificate Support 187 Disabling SUDI99 Migration (GUI) 189 Link Aggregation Group 191 Information About Link Aggregation Group 191 Link Aggregation Control Protocol 191 Configuring LAG Using LACP 192 Port Aggregation Protocol 192 Configuring LAG Using PAgP 192 Information About Port Channel Interface Number 192 Configuring LAG in ON Mode 193 Multichassis Link Aggregation Group 193 Prerequisites for Multi-LAG 193 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x viii CHAPTER 10 CHAPTER 11 PART II CHAPTER 12 CHAPTER 13 Restrictions for Multi-LAG 194 Supported Topologies 194 Configuring a Port Channel Interface (GUI) 195 Create a Port-Channel Interface 196 Configuring LAG in ON Mode 196 Add an Interface to a Port Channel (LACP) 197 Add an Interface to a Port Channel (PAgP) 198 Add a VLAN to a Port Channel 198 Remove a Port Channel Group from a Physical Interface 199 Verify the LAG Configuration 199 Reload Reason History 201 Feature History for Reload Reason History 201 Information About Reload Reason History 201 Verifying Reload Reason History 201 Requesting Reload Reason History using YANG 204 Best Practices 207 Introduction 207 System Upgrade 209 Upgrading the Cisco Catalyst 9800 Wireless Controller Software 211 Overview of Upgrading the Controller Software 211 Upgrading the Controller Software (GUI) 212 Upgrade the Controller Software (CLI) 213 Converting From Bundle-Mode to Install-Mode 214 Copying a WebAuth Tar Bundle to the Standby Controller 217 In-Service Software Upgrade 219 Information About In-Service Software Upgrade 219 Prerequisites for Performing In-Service Software Upgrade 220 Guidelines and Restrictions for In-Service Software Upgrade 220 Upgrading Software Using In-Service Software Upgrade 221 Contents Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x ix Contents CHAPTER 14 CHAPTER 15 Upgrading Software Using ISSU (GUI) 222 Upgrading Software Using In-Service Software Upgrade with Delayed Commit 223 Monitoring In-Service Software Upgrade 224 Troubleshooting ISSU 226 Software Maintenance Upgrade 229 Introduction to Software Maintenance Upgrade 229 Installing a SMU (GUI) 231 Installing SMU 232 Roll Back an Image (GUI) 233 Rollback SMU 233 Deactivate SMU 233 Configuration Examples for SMU 234 Information About AP Device Package 234 Installing AP Device Package (GUI) 235 Installing AP Device Package (CLI) 236 Verifying APDP on the Controller 236 Information About Per Site or Per AP Model Service Pack (APSP) 237 Rolling AP Upgrade 238 Rolling AP Upgrade Process 238 Installing AP Service Package (GUI) 239 Installing AP Service Package (CLI) 240 Adding a Site to a Filter 241 Deactivating an Image 241 Roll Back APSP 242 Canceling the Upgrade 242 Verifying the Upgrade 242 Verifying of AP Upgrade on the Controller 245 Efficient Image Upgrade 247 Efficient Image Upgrade 247 Enable Pre-Download (GUI) 248 Enable Pre-Download (CLI) 248 Configuring a Site Tag (CLI) 248 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x x Contents CHAPTER 16 CHAPTER 17 Attaching Policy Tag and Site Tag to an AP (CLI) 250 Trigger Predownload to a Site Tag 251 Feature History for Out-of-Band AP Image Download 253 Information About Out-of-Band AP Image Download 253 Restrictions for Out-of-Band AP Image Download 254 Download AP Image from Controller Using HTTPS (CLI) 254 Download AP Image from Controller Using HTTPS (GUI) 255 Verifying Image Upgrade 256 Predownloading an Image to an Access Point 259 Information About Predownloading an Image to an Access Point 259 Restrictions for Predownloading an Image to an Access Point 259 Predownloading an Image to Access Points (CLI) 260 Predownloading an Image to Access Points (GUI) 262 Predownloading an Image to Access Points (YANG) 263 Monitoring the Access Point Predownload Process 263 Information About AP Image Download Time Enhancement (OEAP or Teleworker Only) 264 Configuring AP Image Download Time Enhancement (GUI) 265 Configuring AP Image Download Time Enhancement (CLI) 266 Verifying AP Image Download Time Enhancement Configuration 266 N+1 Hitless Rolling AP Upgrade 269 N+1 Hitless Rolling AP Upgrade 269 Configuring Hitless Upgrade 270 Verifying Hitless Upgrade 271 Feature History for Site-Based Rolling AP Upgrade in N+1 Networks 272 Information About Site-Based Rolling AP Upgrade in N+1 Network 272 Prerequisites for Site-Based Rolling AP Upgrade in N+1 Networks 272 Restrictions for Site-Based Rolling AP Upgrade in N+1 Networks 273 Use Cases 273 N+1 Upgrade and Move to Destination Controller 273 N+1 Move to Destination Controller 275 Hitless Software Upgrade (N+1 Upgrade) 276 Verifying Site-based Rolling AP Upgrade in a N+1 Network 278 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xi Contents CHAPTER 18 CHAPTER 19 PART III CHAPTER 20 Information About Client Steering Enhancement 283 Deauthenticate Clients 284 NBAR Dynamic Protocol Pack Upgrade 285 NBAR Dynamic Protocol Pack Upgrade 285 Upgrading the NBAR2 Protocol Pack 286 Wireless Sub-Package for Switch 287 Introduction to Wireless Sub-package 287 Booting in Install Mode 288 Installing Sub-Package in a Single Step (GUI) 289 Installing Sub-Package in a Single Step 289 Multi-step Installation of Sub-Package 290 Installing on a Stack 290 Upgrading to a Newer Version of Wireless Package 291 Deactivating the Wireless Package 291 Enabling or Disabling Auto-Upgrade 291 Lightweight Access Points 293 Countries and Regulations 295 Information About Country Codes 295 Prerequisites for Configuring Country Codes 295 Configuring Country Codes (GUI) 296 Configuring Country Codes (CLI) 296 Configuration Examples for Configuring Country Codes 298 Viewing Channel List for Country Codes 298 Information About Regulatory Compliance Domain 299 Global Country-Level Domains 300 Restrictions on Regulatory Compliance Domain 302 Countries Supporting 6-GHz Radio Band 303 Rest of World Domain 308 Configuring Country Code for Rest of the World (CLI) 315 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xii Contents CHAPTER 21 Access Points Modes 317 Information about Sniffer 318 Information About XOR Radio Role Sniffer Support 318 Feature History for Sniffer Mode 319 Prerequisites for Sniffer 319 Restrictions on Sniffer 319 How to Configure Sniffer 320 Configuring an Access Point as Sniffer (GUI) 320 Configuring an Access Point as Sniffer (CLI) 320 Enabling or Disabling Sniffing on the Access Point (GUI) 321 Enabling or Disabling Sniffing on the Access Point (CLI) 321 Configuring XOR Radio Role Sniffer Support on the Access Point (CLI) 322 Verifying Sniffer Configurations 323 Verifying XOR Radio Role Sniffer Configuration 323 Examples for Sniffer Configurations and Monitoring 324 Introduction to Monitor Mode 324 Enable Monitor Mode (GUI) 325 Enable Monitor Mode (CLI) 325 Feature History for Management Mode Migration in Cisco Catalyst Wireless 916X Access Points 326 Information About Management Mode Migration in Cisco Catalyst Wireless 916X Series Access Points 326 Regulatory Domain 327 Configuring Management Mode Migration (GUI) 331 Exporting Meraki Management Mode-Migrated APs (GUI) 331 Configuring the AP Management Mode (CLI) 332 Verifying the Management Mode Migration Details 333 Information About FlexConnect 333 FlexConnect Authentication 335 Guidelines and Restrictions for FlexConnect 337 Configuring a Site Tag 341 Configuring a Policy Tag (CLI) 342 Attaching a Policy Tag and a Site Tag to an Access Point (GUI) 343 Attaching Policy Tag and Site Tag to an AP (CLI) 343 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xiii Contents Linking an ACL Policy to the Defined ACL (GUI) 344 Applying ACLs on FlexConnect 345 Configuring FlexConnect 346 Configuring a Switch at a Remote Site 346 Configuring the Controller for FlexConnect 347 Configuring Local Switching in FlexConnect Mode (GUI) 347 Configuring Local Switching in FlexConnect Mode (CLI) 348 Configuring Central Switching in FlexConnect Mode (GUI) 348 Configuring Central Switching in FlexConnect Mode 349 Configuring an Access Point for FlexConnect 349 Configuring an Access Point for Local Authentication on a WLAN (GUI) 349 Configuring an Access Point for Local Authentication on a WLAN (CLI) 350 Connecting Client Devices to WLANs 350 Configuring FlexConnect Ethernet Fallback 351 Information About FlexConnect Ethernet Fallback 351 Configuring FlexConnect Ethernet Fallback 351 Flex AP Local Authentication (GUI) 352 Flex AP Local Authentication (CLI) 353 Flex AP Local Authentication with External Radius Server 355 Configuration Example: FlexConnect with Central and Local Authentication 358 NAT-PAT for FlexConnect 358 Configuring NAT-PAT for a WLAN or a Remote LAN 358 Creating a WLAN 358 Configuring a Wireless Profile Policy and NAT-PAT (GUI) 359 Configuring a Wireless Profile Policy and NAT-PAT 359 Mapping a WLAN to a Policy Profile 360 Configuring a Site Tag 361 Attaching a Policy Tag and a Site Tag to an Access Point (GUI) 361 Attaching a Policy Tag and a Site Tag to an Access Point 362 Split Tunneling for FlexConnect 362 Configuring Split Tunneling for a WLAN or Remote LAN 363 Defining an Access Control List for Split Tunneling (GUI) 363 Defining an Access Control List for Split Tunneling 363 Linking an ACL Policy to the Defined ACL 364 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xiv Contents Creating a WLAN 365 Configuring a Wireless Profile Policy and a Split MAC ACL Name (GUI) 365 Configuring a Wireless Profile Policy and a Split MAC ACL Name 366 Mapping a WLAN to a Policy Profile (GUI) 367 Mapping WLAN to a Policy Profile 367 Configuring a Site Tag 368 Attaching a Policy Tag and Site Tag to an Access Point 368 VLAN-based Central Switching for FlexConnect 369 Configuring VLAN-based Central Switching (GUI) 369 Configuring VLAN-based Central Switching (CLI) 370 OfficeExtend Access Points for FlexConnect 371 Configuring OfficeExtend Access Points 372 Disabling OfficeExtend Access Point 372 Support for OEAP Personal SSID 373 Information About OEAP Personal SSID Support 373 Configuring OEAP Personal SSID (GUI) 373 Configuring OEAP Personal SSID (CLI) 374 Viewing OEAP Personal SSID Configuration 374 Clearing Personal SSID from an OfficeExtend Access Point 375 Example: Viewing OfficeExtend Configuration 375 Proxy ARP 376 Enabling Proxy ARP for FlexConnect APs (GUI) 376 Enabling Proxy ARP for FlexConnect APs 376 Overlapping Client IP Address in Flex Deployment 377 Overview of Overlapping Client IP Address in Flex Deployment 377 Enabling Overlapping Client IP Address in Flex Deployment (GUI) 377 Enabling Overlapping Client IP Address in Flex Deployment 378 Verifying Overlapping Client IP Address in Flex Deployment (GUI) 378 Verifying Overlapping Client IP Address in Flex Deployment 379 Information About FlexConnect High Scale Mode 380 Enabling PMK Propagation (CLI) 380 Flex Resilient with Flex and Bridge Mode Access Points 381 Information About Flex Resilient with Flex and Bridge Mode Access Points 381 Configuring a Flex Profile (GUI) 381 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xv Contents CHAPTER 22 Configuring a Flex Profile (CLI) 382 Configuring a Site Tag (CLI) 383 Configuring a Mesh Profile (CLI) 383 Associating Wireless Mesh to an AP Profile (CLI) 384 Attaching Site Tag to an Access Point (CLI) 385 Configuring Switch Interface for APs (CLI) 385 Verifying Flex Resilient with Flex and Bridge Mode Access Points Configuration 386 Feature History for OEAP Link Test 386 Information About OEAP Link Test 387 Configuring OEAP Link Test (CLI) 387 Performing OEAP Link Test (GUI) 388 Verifying OEAP Link Test 388 Feature History for Cisco OEAP Split Tunneling 388 Information About Cisco OEAP Split Tunneling 389 Prerequisites for Cisco OEAP Split Tunneling 390 Restrictions for Cisco OEAP Split Tunneling 390 Use Cases for Cisco OEAP Split Tunneling 391 Workflow to Configure Cisco OEAP Split Tunneling 391 Create an IP Address ACL (CLI) 391 Create a URL ACL (CLI) 392 Add an ACL to a FlexConnect Profile 393 Enable Split Tunnelling in a Policy Profile 394 Verifying the Cisco OEAP Split Tunnel Configuration 394 AP Survey Mode 395 Security 397 Information About Data Datagram Transport Layer Security 397 Configuring Data DTLS (GUI) 398 Configuring Data DTLS (CLI) 398 Introduction to the 802.1X Authentication 399 EAP-FAST Protocol 400 EAP-TLS/EAP-PEAP Protocol 400 Limitations of the 802.1X Authentication 400 Topology - Overview 401 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xvi Contents CHAPTER 23 CHAPTER 24 Configuring 802.1X Authentication Type and LSC AP Authentication Type (GUI) 401 Configuring 802.1X Authentication Type and LSC AP Authentication Type 402 Configuring the 802.1X Username and Password (GUI) 403 Configuring the 802.1X Username and Password (CLI) 403 Enabling 802.1X on the Switch Port 404 Verifying 802.1X on the Switch Port 406 Verifying the Authentication Type 406 AP Joining 407 Failover Priority for Access Points 407 Setting AP Priority (GUI) 408 Setting AP Priority 408 Overview of Access Point Plug-n-Play 408 Provisioning AP from PnP Server 409 Verifying AP Tag Configuration 409 Feature History for AP Fallback to Controllers Using AP Priming Profile 410 Information About AP Fallback to Controllers Using AP Priming Profile 410 Restrictions for AP Fallback to Controllers Using AP Priming Profile 410 Configure AP Priming Profile 411 Configure AP Priming Using Filters 412 Configure Per-AP Priming 413 Verify the Configuration 413 AP Management 415 AP Crash File Upload 416 Configuring AP Crash File Upload (CLI) 417 Information About LED States for Access Points 417 Configuring LED State in Access Points (GUI) 418 Configuring LED State for Access Points in the Global Configuration Mode (CLI) 418 Configuring LED State in the AP Profile 419 Verifying LED State for Access Points 419 Access Point Support Bundle 420 Exporting an AP Support Bundle (GUI) 420 Exporting an AP Support Bundle (CLI) 421 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xvii Contents Monitoring the Status of Support Bundle Export 421 Information About Access Point Memory Information 421 Verifying Access Point Memory Information 422 Information About Access Point Tag Persistency 422 Configuring AP Tag Persistency (GUI) 422 Saving Tags on an Access Point (GUI) 423 Deleting Saved Tags on the Access Point 423 Configuring AP Tag Persistency (CLI) 423 Verifying AP Tag Persistency 424 Feature History for AP Power Save 425 Information About AP Power Save 425 Access Point Power Policy 426 Power-Save Mode 426 PoE Profiles 426 Wakeup Threshold for Access Point Power Save Mode 430 AP Power Save Scenarios 430 Configuring Radio Spatial Streams (GUI) 433 Configuring Radio Spatial Streams (CLI) 434 Configuring a Calendar Profile (GUI) 436 Configuring a Calendar Profile (CLI) 437 Configuring a Power Policy in an AP Join Profile (GUI) 438 Mapping a Power Profile Under an AP Profile (CLI) 439 Configuring Client Wakeup Threshold (CLI) 440 Configuration Example of Power Profile 440 Verifying Access Point Power Policy (GUI) 441 441 Verifying the Access Point Power Profile 441 Verifying Radio Spatial Streams 442 Verifying Client Threshold 443 Information About Access Point Real-Time Statistics 443 Feature History for Real Time Access Point Statistics 443 Restrictions for AP Radio Monitoring Statistics 444 Configuring Access Point Real Time Statistics (GUI) 444 Configuring Real-Time Access Point Statistics (CLI) 445 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xviii Contents CHAPTER 25 Configuring AP Radio Monitoring Statistics 447 Monitoring Access Point Real-Time Statistics (GUI) 448 Verifying Access Point Real-Time Statistics 449 Feature History for Access Point Auto Location Support 449 Information About Access Point Auto Location Support 450 Configuring Access Point Geolocation Derivation Using Ranging (GUI) 451 Configuring Access Point Geolocation Derivation Using Ranging (CLI) 451 Configuring Access Point Ranging Parameters (GUI) 451 Configuring Access Point Ranging Parameters (CLI) 452 Configuring Access Point Coordinates and Floor Information (CLI) 453 Configuring On-Demand Access Point Ranging (CLI) 453 Verifying Access Point Geolocation Information 454 AP Configuration 457 Feature History for Configuring the Access Point Console 458 Information About Configuring the Access Point Console 458 Configuring the AP Console (GUI) 459 Configuring the AP Console (CLI) 459 Verifying the AP Console Status 459 Information About AP Audit Configuration 460 Restrictions for AP Audit Configuration 460 Configure AP Audit Parameters (CLI) 461 Verifying AP Audit Report Summary 461 Verifying AP Audit Report Detail 461 2.4-GHz Radio Support 462 Configuring 2.4-GHz Radio Support for the Specified Slot Number 462 5-GHz Radio Support 464 Configuring 5-GHz Radio Support for the Specified Slot Number 464 6-GHz Radio Support 466 Configuring 6-GHz Radio Support for the Specified Slot Number 466 Information About Dual-Band Radio Support 467 Configuring Default XOR Radio Support 468 Configuring XOR Radio Support for the Specified Slot Number (GUI) 471 Configuring XOR Radio Support for the Specified Slot Number 471 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xix Contents Receiver Only Dual-Band Radio Support 473 Information About Receiver Only Dual-Band Radio Support 473 Configuring Receiver Only Dual-Band Parameters for Access Points 473 Enabling CleanAir with Receiver Only Dual-Band Radio on a Cisco Access Point (GUI) 473 Enabling CleanAir with Receiver Only Dual-Band Radio on a Cisco Access Point 473 Disabling Receiver Only Dual-Band Radio on a Cisco Access Point (GUI) 474 Disabling Receiver Only Dual-Band Radio on a Cisco Access Point 474 Configuring Client Steering (CLI) 474 Verifying Cisco Access Points with Dual-Band Radios 476 Information About OFDMA Support for 11ax Access Points 476 Supported Modes on 11ax Access Points 476 Configuring 11AX (GUI) 477 Configuring Channel Width 477 Configuring 802.11ax Radio Parameters (GUI) 478 Configuring 802.11ax Radio Parameters (CLI) 478 Setting up the 802.11ax Radio Parameters 479 Configuring OFDMA on a WLAN 480 Verifying Channel Width 481 Verifying Client Details 482 Verifying Radio Configuration 483 Information About Cisco Flexible Antenna Port 486 Configuring a Cisco Flexible Antenna Port (GUI) 486 Configuring a Cisco Flexible Antenna Port (CLI) 486 Verifying Flexible Antenna Port Configuration 487 Feature History for Environmental Sensors in Access Points 487 Information About Environmental Sensors in Access Points 488 Use Cases 488 Configuring Environmental Sensors in an AP Profile (CLI) 488 Configuring Environment Sensors in Privileged EXEC Mode (CLI) 489 Verifying the AP Sensor Status 490 Information About CAPWAP LAG Support 490 Restrictions for CAPWAP LAG Support 491 Enabling CAPWAP LAG Support on Controller (GUI) 491 Enabling CAPWAP LAG Support on Controller 492 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xx Contents CHAPTER 26 CHAPTER 27 PART IV CHAPTER 28 Enabling CAPWAP LAG Globally on Controller 492 Disabling CAPWAP LAG Globally on Controller 492 Enabling CAPWAP LAG for an AP Profile (GUI) 493 Enabling CAPWAP LAG for an AP Profile 493 Disabling CAPWAP LAG for an AP Profile 494 Disabling CAPWAP LAG Support on Controller 494 Verifying CAPWAP LAG Support Configurations 495 Secure Data Wipe 497 Secure Data Wipe 497 Troubleshooting Lightweight Access Points 499 Overview 499 Support Articles 499 Feedback Request 500 Disclaimer and Caution 500 Radio Resource Management 501 Radio Resource Management 503 Information About Radio Resource Management 503 Radio Resource Monitoring 504 Information About RF Groups 504 RF Group Leader 505 RF Group Name 507 Rogue Access Point Detection in RF Groups 508 Secure RF Groups 508 Transmit Power Control 508 Overriding the TPC Algorithm with Minimum and Maximum Transmit Power Settings 508 Dynamic Channel Assignment 509 Dynamic Bandwidth Selection 511 Coverage Hole Detection and Correction 511 Cisco AI Enhanced RRM 511 Restrictions for Radio Resource Management 513 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xxi Contents How to Configure RRM 514 Configuring Neighbor Discovery Type (GUI) 514 Configuring Neighbor Discovery Type (CLI) 515 Configuring RF Groups 515 Configuring RF Group Selection Mode (GUI) 516 Configuring RF Group Selection Mode (CLI) 516 Configuring an RF Group Name (CLI) 517 Configuring a Secure RF Group (CLI) 517 Configuring Members in an 802.11 Static RF Group (GUI) 518 Configuring Members in an 802.11 Static RF Group (CLI) 518 Configuring Transmit Power Control 519 Configuring Transmit Power (GUI) 519 Configuring the Tx-Power Control Threshold (CLI) 519 Configuring the Tx-Power Level (CLI) 520 Configuring 802.11 RRM Parameters 521 Configuring Advanced 802.11 Channel Assignment Parameters (GUI) 521 Configuring Advanced 802.11 Channel Assignment Parameters (CLI) 523 Configuring 802.11 Coverage Hole Detection (GUI) 525 Configuring 802.11 Coverage Hole Detection (CLI) 525 Configuring 802.11 Event Logging (CLI) 527 Configuring 802.11 Statistics Monitoring (GUI) 528 Configuring 802.11 Statistics Monitoring (CLI) 528 Configuring the 802.11 Performance Profile (GUI) 530 Configuring the 802.11 Performance Profile (CLI) 530 Configuring Advanced 802.11 RRM 531 Enabling Channel Assignment (GUI) 531 Enabling Channel Assignment (CLI) 532 Restarting DCA Operation 532 Updating Power Assignment Parameters (GUI) 533 Updating Power Assignment Parameters (CLI) 533 Configuring Rogue Access Point Detection in RF Groups 533 Configuring Rogue Access Point Detection in RF Groups (CLI) 533 Monitoring RRM Parameters and RF Group Status 535 Monitoring RRM Parameters 535 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xxii CHAPTER 29 CHAPTER 30 CHAPTER 31 Verifying RF Group Status (CLI) 535 Examples: RF Group Configuration 536 Information About ED-RRM 536 Configuring ED-RRM on the Cisco Wireless LAN Controller (CLI) 537 Information About Rogue PMF Containment 538 Enabling Rogue PMF Containment 539 Verifying PMF Containment 539 Information About Rogue Channel Width 540 Configuring Rogue Channel Width (CLI) 540 Configuring Rogue Classification Rules (GUI) 542 Verifying Rogue Channel Width 544 Coverage Hole Detection 547 Coverage Hole Detection and Correction 547 Configuring Coverage Hole Detection (GUI) 547 Configuring Coverage Hole Detection (CLI) 548 Configuring CHD for RF Tag Profile (GUI) 550 Configuring CHD for RF Profile (CLI) 550 Optimized Roaming 553 Optimized Roaming 553 Restrictions for Optimized Roaming 553 Configuring Optimized Roaming (GUI) 554 Configuring Optimized Roaming (CLI) 554 Cisco Flexible Radio Assignment 557 Information About Flexible Radio Assignment 557 Configuring an FRA Radio (GUI) 558 Enabling FRA (CLI) 560 Configuring Client FRA in RF Profile (CLI) 562 Verifying FRA XOR 5-GHz and 6-GHz Details 562 Flexible Radio Assignment (FRA) Action 563 Feature History for Flexible Radio Assignment Action 563 Information About Flexible Radio Assignment Action 564 Contents Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xxiii Contents CHAPTER 32 CHAPTER 33 CHAPTER 34 CHAPTER 35 Configuring FRA Action in Default RF Profile (CLI) 564 Configuring FRA Action in 2.4-GHz RF Profile (CLI) 564 Verifying FRA Action Configuration 565 XOR Radio Support 567 Information About Dual-Band Radio Support 567 Configuring Default XOR Radio Support 568 Configuring XOR Radio Support for the Specified Slot Number (GUI) 570 Configuring XOR Radio Support for the Specified Slot Number 571 Cisco Receiver Start of Packet 573 Information About Receiver Start of Packet Detection Threshold 573 Restrictions for Rx SOP 573 Configuring Rx SOP (CLI) 574 Customizing RF Profile (CLI) 574 Client Limit 577 Information About Client Limit 577 Limitations for Client Limit 577 Configuring Client Limit Per WLAN (GUI) 577 Configuring Client Limit Per WLAN (CLI) 578 Configuring Client Limit Per AP (GUI) 579 Configuring Client Limit Per AP (CLI) 579 Configuring Client Limit Per Radio (GUI) 580 Configuring Client Limit Per Radio (CLI) 580 Verifying Client Limit 581 IP Theft 583 Introduction to IP Theft 583 Configuring IP Theft (GUI) 584 Configuring IP Theft 584 Configuring the IP Theft Exclusion Timer 584 Adding Static Entries for Wired Hosts 585 Verifying IP Theft Configuration 586 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xxiv Contents CHAPTER 36 CHAPTER 37 CHAPTER 38 CHAPTER 39 Unscheduled Automatic Power Save Delivery 589 Information About Unscheduled Automatic Power Save Delivery 589 Viewing Unscheduled Automatic Power Save Delivery (CLI) 589 Target Wake Time 591 Target Wake Time 591 Extended Power-Savings Using Target Wake Time 591 Configuring Target Wake Time at the Radio Level (CLI) 592 Configuring Target Wake Time on WLAN 593 Enabling Target Wake Time on WLAN (CLI) 593 Disabling Target Wakeup Time on WLAN (CLI) 594 Configuring Target Wake Time (GUI) 595 Verifying Target Wakeup Time 595 Enabling USB Port on Access Points 597 USB Port as Power Source for Access Points 597 Configuring an AP Profile (CLI) 598 Configuring USB Settings for an Access Point (CLI) 599 Configuring USB Settings for an Access Point (GUI) 599 Monitoring USB Configurations for Access Points (CLI) 600 Dynamic Frequency Selection 601 Feature History for Channel Availability Check (CAC) 601 Information About Dynamic Frequency Selection 601 Information About Channel Availability Check (CAC) 602 Verifying DFS 602 Information About Zero Wait Dynamic Frequency Selection 603 Configuring Zero Wait Dynamic Frequency Selection Globally (CLI) 603 Configuring Zero Wait Dynamic Frequency Selection Globally (GUI) 603 Enabling Zero Wait Dynamic Frequency Selection on a RF Profile (CLI) 604 Enabling Zero Wait Dynamic Frequency Selection on a RF Profile (GUI) 604 Verifying Zero Wait Dynamic Frequency Selection Configuration 605 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xxv Contents CHAPTER 40 CHAPTER 41 CHAPTER 42 CHAPTER 43 Cisco Access Points with Tri-Radio 607 Cisco Access Points with Tri-Radio 607 Guidelines and Restrictions for Tri-Radio Access Points 609 Configuring Tri-Radio 609 Configuring Tri-Radio for AP (GUI) 609 Configuring the Tri-Radio (CLI) 609 Configuring 5-GHz Dual Radio Mode for AP (GUI) 610 Configuring the Dual Radio Mode and Enabling Slots (CLI) 610 Setting Radio Roles for Slots (CLI) 611 Configuring the Tri-Radio Dual Radio Role (CLI) 611 Verifying Tri-Radio Configuration on the Controller 612 Cisco DNA Center Assurance Wi-Fi 6 Dashboard 613 Cisco DNA Center Assurance Wi-Fi 6 Dashboard 613 Configuring Cisco DNA Center Assurance Wi-Fi 6 Dashboard Parameters (CLI) 614 Verifying AP DFS Counters (CLI) 615 Verifying Wi-Fi 6 Access Point Parameters 616 Antenna Disconnection Detection 617 Feature History for Antenna Disconnection Detection 617 Information About Antenna Disconnection Detection 617 Recommendations and Limitations 618 Configuring Antenna Disconnection Detection (CLI) 618 Configuring Antenna Disconnection Detection (GUI) 619 Detecting Broken Antenna Using SNMP Trap (CLI) 620 Detecting Broken Antenna Using SNMP Trap (GUI) 620 Verifying Antenna Disconnection Detection 621 Verifying Antenna Disconnection Detection (GUI) 622 Neighbor Discovery Protocol Mode on Access Points 623 Information About Neighbor Discovery Protocol Mode 623 Configuring RRM Neighbor Discovery Mode (GUI) 624 Configuring the Neighbor Discovery Protocol Mode (CLI) 624 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xxvi Contents CHAPTER 44 PART V CHAPTER 45 Configuring the Neighbor Discovery Protocol Type (CLI) 624 Configuring Neighbor Discovery Protocol Mode in the RF Profile (GUI) 625 Configuring Neighbor Discovery Protocol Mode in the RF Profile (CLI) 625 Monitoring Radio Statistics-NDP Capability and NDP Mode (GUI) 626 Verifying Neighbor Discovery Protocol Mode 627 6-GHz Band Operations 629 Configuring Preferred Scanning Channels in the RF Profile (GUI) 629 Configuring Preferred Scanning Channels in the RF Profile (CLI) 630 Configuring Broadcast Probe Response in RF Profile (GUI) 630 Configuring Broadcast Probe Response in RF Profile (CLI) 630 Configuring FILS Discovery Frames in the RF Profile (GUI) 631 Configuring FILS Discovery Frames in the RF Profile (CLI) 632 Configuring Multi BSSID Profile (GUI) 632 Configuring Multi BSSID Profile 633 Configuring Multi-BSSID in the RF Profile (GUI) 633 Configuring Multi-BSSID in the RF Profile (CLI) 634 Configuring Dynamic Channel Assignment Freeze (CLI) 634 Information About 6-GHz Client Steering 635 Configuring 6-GHz Client Steering in the Global Configuration Mode (GUI) 635 Configuring 6-GHz Client Steering in the Global Configuration Mode 635 Configuring 6-GHz Client Steering on the WLAN (GUI) 636 Configuring 6-GHz Client Steering on the WLAN 637 Verifying 6-GHz Client Steering 637 Network Management 639 AP Packet Capture 641 Introduction to AP Client Packet Capture 641 Enabling Packet Capture (GUI) 641 Enabling Packet Capture (CLI) 642 Create AP Packet Capture Profile and Map to an AP Join Profile (GUI) 642 Create AP Packet Capture Profile and Map to an AP Join Profile 643 Start or Stop Packet Capture 643 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xxvii Contents CHAPTER 46 CHAPTER 47 CHAPTER 48 DHCP Option82 645 Information About DHCP Option 82 645 Configuring DHCP Option 82 Global Interface 647 Configuring DHCP Option 82 Globally Through Server Override (CLI) 647 Configuring DHCP Option 82 Through Server Override (CLI) 647 Configuring DHCP Option 82 Globally Through Different SVIs (GUI) 648 Configuring DHCP Option 82 Globally Through Different SVIs (CLI) 648 Configuring DHCP Option 82 Format 649 Configuring DHCP Option82 Through a VLAN Interface 650 Configuring DHCP Option 82 Through Option-Insert Command (CLI) 650 Configuring DHCP Option 82 Through the server-ID-override Command (CLI) 651 Configuring DHCP Option 82 Through a Subscriber-ID (CLI) 652 Configuring DHCP Option 82 Through server-ID-override and subscriber-ID Commands (CLI) 653 Configuring DHCP Option 82 Through Different SVIs (CLI) 654 RADIUS Realm 657 Information About RADIUS Realm 657 Enabling RADIUS Realm 658 Configuring Realm to Match the RADIUS Server for Authentication and Accounting 658 Configuring the AAA Policy for a WLAN 659 Verifying the RADIUS-Realm Configuration 661 RADIUS Accounting 663 Information About RADIUS Accounting of AP Events 663 Configuring Accounting Method-List for an AP Profile 663 Verifying the AP Accounting Information 664 AAA Accounting 664 Configuring AAA Accounting Using Default Method List (CLI) 664 Configuring HTTP Command Accounting Using Named Method List (CLI) 665 Feature History for Device Ecosystem Data 665 Information About Device Ecosystem Data 666 Enable Device Ecosystem Data 666 Verify Device Ecosystem Data 667 xxviii Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x Contents CHAPTER 49 CHAPTER 50 CHAPTER 51 CHAPTER 52 CHAPTER 53 CHAPTER 54 RADIUS Call Station Identifier 669 RADIUS Call Station Identifier 669 Configuring a RADIUS Call Station Identifier 670 RADIUS VSA 671 Information About RADIUS VSA 671 Create an Attribute List 672 Create a AAA Policy and Map it to Attribute List 673 Map a AAA Policy to the WLAN Policy Profile 674 Map the WLAN Policy Profile to a WLAN 675 Cisco StadiumVision 677 Cisco StadiumVision Overview 677 Configure Parameters for Cisco StadiumVision (GUI) 678 Configure Parameters for Cisco StadiumVision (CLI) 678 Verify StadiumVision Configurations 679 Persistent SSID Broadcast 681 Persistent SSID Broadcast 681 Configuring Persistent SSID Broadcast 681 Verifying Persistent SSID Broadcast 682 Network Monitoring 683 Network Monitoring 683 Status Information Received Synchronously - Configuration Examples 683 Alarm and Event Information Received Asynchronously - Configuration Examples 685 Creating a Lobby Ambassador Account 687 Information About Lobby Ambassador Account 687 Creating a Lobby Ambassador User Account (GUI) 687 Creating a User Account 688 Logging In Using the Lobby Account 689 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xxix Contents CHAPTER 55 CHAPTER 56 CHAPTER 57 CHAPTER 58 Creating a Lobby Ambassador Account (CLI) 689 Lobby Ambassador Account 691 Information About Lobby Ambassador Account 691 Creating a Lobby Ambassador User Account (GUI) 692 Creating a User Account 692 Logging In Using the Lobby Account 693 Creating a Lobby Ambassador Account (CLI) 693 Configuring WLAN (GUI) 694 Client Allowed List 695 Restrictions for Client Allowed List 695 Creating a Client Allowed List (GUI) 695 Adding Single MAC Address to Allowed List 695 Adding Bulk MAC Address to Allowed List 696 Managing Guest Users 696 Viewing a Client Allowed List 697 Guest User Accounts 699 Information About Creating Guest User Accounts 699 Creating a Guest User Account (GUI) 699 Creating a Guest User Account (CLI) 700 Verifying Guest User Account 701 Assigning Username to Guest Users in a WLAN (CLI) 702 Link Local Bridging 703 Feature History for Link Local Bridging 703 Information About Link Local Bridging 703 Use Case for Link Local Bridging 704 Guidelines and Restrictions for Link Local Bridging 704 Enabling Link Local Bridging Per Policy Profile (GUI) 704 Enabling Link Local Bridging Per Policy Profile (CLI) 705 Verifying Link Local Bridging 705 Web Admin Settings 707 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xxx Contents CHAPTER 59 CHAPTER 60 PART VI CHAPTER 61 Information About Web Admin Settings 707 Configuring HTTP/HTTPS Access 707 Configuring HTTP Trust Point 708 Configuring Netconf Yang 709 Configuring Timeout Policy 709 Configuring VTY 710 Web UI Configuration Command Accounting in TACACS Server 713 Feature History for Web UI Configuration Command Accounting in TACACS+ Server 713 Information About Web UI Configuration Command Accounting in TACACS+ Server 713 Guidelines for Web UI Configuration Command Accounting in TACACS+ Server 714 Configuring AAA Accounting Using Default Method List (CLI) 714 Configuring HTTP Command Accounting Using Named Method List (CLI) 715 Embedded Packet Capture 717 Feature History for Embedded Packet Capture 717 Information About Embedded Packet Capture 717 Configuring Embedded Packet Capture (CLI) 718 Verifying Embedded Packet Capture 720 System Management 723 Network Mobility Services Protocol 725 Information About Network Mobility Services Protocol 725 Radioactive Tracing for NMSP 726 Enabling NMSP on Premises Services 726 Modifying the NMSP Notification Interval for Clients, RFID Tags, and Rogues 727 Modifying the NMSP Notification Threshold for Clients, RFID Tags, and Rogues 727 Configuring NMSP Strong Cipher 728 Verifying NMSP Settings 728 Examples: NMSP Settings Configuration 731 NMSP by AP Groups with Subscription List from CMX 731 Verifying NMSP by AP Groups with Subscription List from CMX 731 Probe RSSI Location 733 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xxxi Contents CHAPTER 62 CHAPTER 63 Configuring Probe RSSI 733 RFID Tag Support 735 Configuring RFID Tag Support 735 Verifying RFID Tag Support 736 Application Visibility and Control 739 Information About Application Visibility and Control 739 Prerequisites for Application Visibility and Control 741 Restrictions for Application Visibility and Control 741 AVC Configuration Overview 741 Create a Flow Monitor 742 Configuring a Flow Monitor (GUI) 744 Create a Flow Record 744 Create a Flow Exporter 746 Configuring a Policy Tag 747 Attaching a Policy Profile to a WLAN Interface (GUI) 748 Attaching a Policy Profile to a WLAN Interface (CLI) 748 Attaching a Policy Profile to an AP 749 Verify the AVC Configuration 750 Default DSCP on AVC 751 Configuring Default DSCP for AVC Profile (GUI) 751 Configuring Default DSCP for AVC Profile 751 Creating Class Map 751 Creating Policy Map 752 AVC-Based Selective Reanchoring 753 Restrictions for AVC-Based Selective Reanchoring 754 Configuring the Flow Exporter 754 Configuring the Flow Monitor 754 Configuring the AVC Reanchoring Profile 755 Configuring the Wireless WLAN Profile Policy 756 Verifying AVC Reanchoring 757 Software-Defined Application Visibility and Control 761 Information About Software-Defined Application Visibility and Control 761 xxxii Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x Contents CHAPTER 64 CHAPTER 65 CHAPTER 66 Enabling Software-Defined Application Visibility and Control on a WLAN (CLI) 762 Configuring Software-Defined Application Visibility and Control Global Parameters (CLI) 762 Cisco Hyperlocation 765 Information About Cisco Hyperlocation 765 Restrictions on Cisco Hyperlocation 767 Support for IPv6 in Cisco Hyperlocation or BLE Configuration 768 Configuring Cisco Hyperlocation (GUI) 768 Configuring Cisco Hyperlocation (CLI) 769 Configuring Hyperlocation BLE Beacon Parameters for AP (GUI) 770 Configuring Hyperlocation BLE Beacon Parameters for AP (CLI) 770 Configuring Hyperlocation BLE Beacon Parameters (CLI) 771 Information About AP Group NTP Server 772 Configuring an AP Group NTP Server 772 Configuring AP Timezone 773 Information About BLE Concurrent Scanning and Beaconing 773 Verifying BLE Concurrent Scanning and Beaconing 774 Verifying Cisco Hyperlocation 775 Verifying Hyperlocation BLE Beacon Configuration 779 Verifying Hyperlocation BLE Beacon Configuration for AP 779 FastLocate for Cisco Catalyst Series Access Points 781 Information About FastLocate 781 Restrictions on FastLocate 781 Supported Access Points 782 FastLocate Network Components 782 Configuring FastLocate (GUI) 783 Verifying FastLocate on Cisco Catalyst APs 783 IoT Services Management 785 Information About IoT Services Management 785 Enabling the Dot15 Radio 786 Configuring the gRPC Token 786 Enabling gRPC in an AP Profile 787 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xxxiii Contents CHAPTER 67 CHAPTER 68 CHAPTER 69 CHAPTER 70 CHAPTER 71 Verifying BLE State and Mode 787 Verifying BLE Details 788 Verifying gRPC Summary, Status, and Statistics 789 IoT Module Management in the Controller 791 Information About IoT Module Management in the Controller 791 Enabling a USB on the Controller 791 Verifying the USB Modules 792 Cisco Spaces 795 Cisco Spaces 795 Configuring Cisco Spaces 795 Verifying Cisco Spaces Configuration 796 EDCA Parameters 799 Enhanced Distributed Channel Access Parameters 799 Configuring EDCA Parameters (GUI) 799 Configuring EDCA Parameters (CLI) 800 Adaptive Client Load-Based EDCA 803 Feature History for Adaptive Client Load-Based EDCA 803 Information About Adaptive Client Load-Based EDCA 803 Restrictions for Adaptive Client Load-Based EDCA 804 Configuration Workflow 804 Configuring Adaptive Client Load-Based EDCA (GUI) 804 Configuring Adaptive Client Load-Based EDCA (CLI) 805 Verifying Adaptive Client Load-Based EDCA Configuration 805 802.11 parameters and Band Selection 807 Information About Configuring Band Selection, 802.11 Bands, and Parameters 807 Band Select 807 802.11 Bands 808 802.11n Parameters 808 xxxiv Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x Contents CHAPTER 72 CHAPTER 73 802.11h Parameters 808 Restrictions for Band Selection, 802.11 Bands, and Parameters 809 How to Configure 802.11 Bands and Parameters 809 Configuring Band Selection (GUI) 809 Configuring Band Selection (CLI) 810 Configuring the 802.11 Bands (GUI) 811 Configuring the 802.11 Bands (CLI) 812 Configuring a Band-Select RF Profile (GUI) 814 Configuring a Band-Select RF Profile (CLI) 815 Configuring 802.11n Parameters (GUI) 815 Configuring 802.11n Parameters (CLI) 816 Configuring 802.11h Parameters (CLI) 818 Monitoring Configuration Settings for Band Selection, 802.11 Bands, and Parameters 819 Verifying Configuration Settings Using Band Selection and 802.11 Bands Commands 819 Example: Viewing the Configuration Settings for the 6-GHz Band 819 Example: Viewing the Configuration Settings for the 5-GHz Band 821 Example: Viewing the Configuration Settings for the 2.4-GHz Band 822 Example: Viewing the status of 802.11h Parameters 824 Example: Verifying the Band-Selection Settings 824 Configuration Examples for Band Selection, 802.11 Bands, and Parameters 826 Examples: Band Selection Configuration 826 Examples: 802.11 Bands Configuration 827 Examples: 802.11n Configuration 827 Examples: 802.11h Configuration 828 NBAR Protocol Discovery 829 Introduction to NBAR Protocol Discovery 829 Configuring NBAR Protocol Discovery 829 Verifying Protocol Discovery Statistics 830 Conditional Debug, Radioactive Tracing, and Packet Tracing 831 Introduction to Conditional Debugging 831 Introduction to Radioactive Tracing 832 Conditional Debugging and Radioactive Tracing 832 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xxxv Contents CHAPTER 74 CHAPTER 75 CHAPTER 76 Location of Tracefiles 833 Configuring Conditional Debugging (GUI) 833 Configuring Conditional Debugging 834 Radioactive Tracing for L2 Multicast 835 Recommended Workflow for Trace files 835 Copying Tracefiles Off the Box 836 Configuration Examples for Conditional Debugging 836 Verifying Conditional Debugging 837 Example: Verifying Radioactive Tracing Log for SISF 837 Information About Packet Tracing 838 Configuring Conditional Debugging Packet Tracing 839 Configuring Conditional Debugging Packet Tracing per AP 840 Configuring Conditional Debugging Packet Tracing per Client (GUI) 841 Configuring Conditional Debugging Packet Tracing per Client 841 Verifying Conditional Debugging Packet Tracing Configuration 841 Feature History for Wireless Client Debug Bundle 842 Information About Wireless Client Debug Bundle 842 Types of Logs Collected 843 Collecting Wireless Client Debug Bundle (CLI) 843 Aggressive Client Load Balancing 845 Information About Aggressive Client Load Balancing 845 Enabling Aggressive Client Load Balancing (GUI) 846 Configuring Aggressive Client Load Balancing (GUI) 846 Configuring Aggressive Client Load Balancing (CLI) 847 RF based Automatic AP Load Balancing 849 Information about RF based Automatic AP Load Balancing 849 Configuring RF based Automatic AP Load Balancing 850 Disabling RF based Automatic AP Load Balancing 852 Verifying Automatic WNCd Load Balancing 853 Accounting Identity List 855 Configuring Accounting Identity List (GUI) 855 xxxvi Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x Contents CHAPTER 77 CHAPTER 78 CHAPTER 79 Configuring Accounting Identity List (CLI) 855 Configuring Client Accounting (GUI) 856 Configuring Client Accounting (CLI) 856 Support for Accounting Session ID 859 Information About Accounting Session ID 859 Configuring an Accounting Session ID (CLI) 859 Verifying an Account Session ID 860 Interim Accounting 863 Information About Interim Accounting 863 Disabling Interim Accounting (CLI) 864 Verifying Interim Accounting 864 Wireless Multicast 865 Information About Wireless Multicast 865 Multicast Optimization 866 IPv6 Global Policies 866 Information About IPv6 Snooping 866 IPv6 Neighbor Discovery Inspection 866 Prerequisites for Configuring Wireless Multicast 868 Restrictions on Configuring Wireless Multicast 869 Restrictions for IPv6 Snooping 869 Configuring Wireless Multicast 869 Configuring Wireless Multicast-MCMC Mode (CLI) 869 Configuring Wireless Multicast-MCUC Mode 870 Configuring Multicast Listener Discovery Snooping (GUI) 870 Configuring IPv6 MLD Snooping 871 Verifying the Multicast VLAN Configuration 871 IPv6 Multicast-over-Multicast 871 Configuring IPv6 Multicast-over-Multicast (GUI) 872 Configuring IPv6 Multicast-over-Multicast 873 Verifying IPv6 Multicast-over-Multicast 873 Verifying the Multicast Connection Between the Controller and the AP 873 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xxxvii Contents CHAPTER 80 CHAPTER 81 Directed Multicast Service 874 Configuring Directed Multicast Service(GUI) 874 Configuring Directed Multicast Service 874 Verifying the Directed Multicast Service Configuration 875 Wireless Broadcast, Non-IP Multicast and Multicast VLAN 876 Configuring Non-IP Wireless Multicast (CLI) 876 Configuring Wireless Broadcast (GUI) 877 Configuring Wireless Broadcast (CLI) 877 Configuring Multicast-over-Multicast for AP Multicast Groups (CLI) 878 Verifying Wireless Multicast 879 Multicast Optimization 879 Configuring IP Multicast VLAN for WLAN (GUI) 880 Configuring IP Multicast VLAN for WLAN 880 Verifying the Multicast VLAN Configuration 881 Multicast Filtering 882 Information About Multicast Filtering 882 Configuring Multicast Filtering 883 Verifying Multicast Filtering 883 Map-Server Per-Site Support 885 Information About Map Server Per Site Support 885 Configuring the Default Map Server (GUI) 886 Configuring the Default Map Server (CLI) 886 Configuring a Map Server Per Site (GUI) 887 Configuring a Map Server Per Site (CLI) 887 Creating a Map Server for Each VNID (GUI) 888 Creating a Map Server for Each VNID 888 Creating a Fabric Profile and Associating a Tag and VNID (GUI) 889 Creating a Fabric Profile and Associating a Tag and VNID (CLI) 889 Verifying the Map Server Configuration 890 Volume Metering 893 Volume Metering 893 Configuring Volume Metering 893 xxxviii Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x Contents CHAPTER 82 CHAPTER 83 CHAPTER 84 CHAPTER 85 CHAPTER 86 Enabling Syslog Messages in Access Points and Controller for Syslog Server 895 Information About Enabling Syslog Messages in Access Points and Controller for Syslog Server 895 Configuring Syslog Server for an AP Profile 897 Configuring Syslog Server for the Controller (GUI) 898 Configuring Syslog Server for the Controller 899 Information About Syslog Support for Client State Change 900 Configuring Syslog Support for Client State Change (CLI) 901 Sample Syslogs 901 Verifying Syslog Server Configurations 902 Login Banner 907 Information About Login Banner 907 Configuring a Login Banner (GUI) 907 Configuring a Login Banner 908 Wi-Fi Alliance Agile Multiband 909 Introduction to Wi-Fi Alliance Agile Multiband 909 Limitations of MBO 911 Configuring MBO on a WLAN 911 Verifying MBO Configuration 912 SNMP Traps 915 Information About Configuring SNMP Traps 915 Configuring SNMP Traps (GUI) 916 Enabling Access Points Traps (CLI) 916 Enabling Wireless Client Traps (CLI) 917 Enabling Mesh Traps (CLI) 917 Enabling RF Traps (CLI) 918 Enabling Rogue, Mobility, RRM, and General Traps (CLI) 918 Verifying SNMP Wireless Traps 919 Disabling Clients with Random MAC Address 921 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xxxix Contents CHAPTER 87 CHAPTER 88 Information About Disabling Clients with Random MAC Addresses 921 Configuring Random MAC Address Deny (CLI) 921 Verifying Denial of Clients with a Random MAC Address 922 Dataplane Packet Logging 925 Information About Dataplane Packet Logging 925 Enabling or Disabling Debug Level (CLI) 926 Enabling Packet Logging in Global and Filtered Buffer in Ingress Path (CLI) 926 Enabling Packet Logging in Global and Filtered Buffer in Punt-Inject Path (CLI) 927 Verifying Dataplane Packet Logging 928 Clearing Logs and Conditions in Global and Filtered Trace Buffers 929 Streaming Telemetry 931 Information About Streaming Telemetry 931 Gather Points 931 Subscription 932 Transport 932 Scale Considerations 933 Session 933 gNMI Dial-In-Mode 933 gRPC- Dial-Out-Mode 933 Configuring Telemetry on a Cisco Catalyst 9800 Series Wireless Controller 934 Enabling gNXI in Insecure Mode (CLI) 934 Enabling gNXI in Secure Mode (CLI) 935 Verifying the Status of a Telemetery Subscription on a Cisco Catalyst 9800 Series Wireless Controller 936 Managing Configured Subscriptions on a Cisco Catalyst 9800 Series Wireless Controller 937 On-Change Telemetry Support 938 Supported XPaths for On-Change Subscription 938 Cisco DNA Center Client Event and SSID Telemetry Filter 941 Feature History for Cisco DNA Center Client Event and SSID Telemetry Filter 941 Information About Cisco DNA Center Client Event and SSID Telemetry Filter 941 Restrictions for Cisco DNA Center Client Event and SSID Telemetry Filter 942 Supported Workflow for Cisco DNA Center Client Event and SSID Telemetry Filter 942 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xl CHAPTER 89 CHAPTER 90 CHAPTER 91 PART VII CHAPTER 92 Enabling iCAP Filtering in APs (CLI) 943 Disabling Client Telemetry Data for a WLAN (YANG) 943 Verifying Client Telemetry Data for a WLAN 944 Application Performance Monitoring 945 Feature History for Application Performance Monitoring 945 Information About Application Performance Monitoring 945 Restrictions for Application Performance Monitoring 946 Workflow 946 Create a Flow Monitor 946 Create a Wireless WLAN Profile Policy 947 Create a Policy Tag 949 Attach the Policy Profile to an AP 949 Verify Application Performance Monitoring 950 Wireless Clients ThresholdWarning 951 Information About Wireless Clients Threshold Warning 951 Configuring a Warning Period 951 Configuring Client Threshold 952 Intelligent Capture Hardening 953 Feature History for Cisco Intelligent Capture Hardening 953 Information About Cisco Intelligent Capture Hardening 953 Anomaly Detection 954 RF Statistics 954 Configuring Anomaly Detection in AP Profile (CLI) 954 Configuring Anomaly Detection in an Access Point (CLI) 955 Verifying Anomaly Detection and RF Statistics 956 Security 959 MAC Filtering 961 MAC Filtering 961 MAC Filtering Configuration Guidelines 961 Contents Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xli Contents CHAPTER 93 Configuring MAC Filtering for Local Authentication (CLI) 963 Configuring MAC Filtering (GUI) 964 Configuring MAB for External Authentication (CLI) 964 Web-Based Authentication 967 Local Web Authentication Overview 967 Device Roles 969 Authentication Process 970 Local Web Authentication Banner 971 Customized Local Web Authentication 973 Guidelines 974 Redirection URL for Successful Login Guidelines 975 How to Configure Local Web Authentication 975 Configuring Default Local Web Authentication 975 Information About the AAA Wizard 976 Configuring AAA Authentication (GUI) 980 Configuring AAA Authentication (CLI) 980 Configuring the HTTP/HTTPS Server (GUI) 982 Configuring the HTTP Server (CLI) 982 Allowing Special Characters for Serial Port 983 Allowing Special Characters for VTY Port 984 Configuring HTTP and HTTPS Requests for Web Authentication 985 Information About Configuring HTTP and HTTPS Requests for Web Authentication 985 Guidelines and Limitations 987 Configuring HTTP and HTTPS Requests for Web Authentication (CLI) 987 Creating a Parameter Map (GUI) 988 Creating Parameter Maps 988 Configuring Local Web Authentication (GUI) 988 Configuring the Internal Local Web Authentication (CLI) 989 Configuring the Customized Local Web Authentication (CLI) 990 Configuring the External Local Web Authentication (CLI) 991 Configuring the Web Authentication WLANs 993 Configuring Pre-Auth Web Authentication ACL (GUI) 994 Configuring Pre-Auth Web Authentication ACL (CLI) 994 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xlii Contents Configuring the Maximum Web Authentication Request Retries 996 Configuring a Local Banner in Web Authentication Page (GUI) 996 Configuring a Local Banner in Web Authentication Page (CLI) 997 Configuring Type WebAuth, Consent, or Both 997 Configuring Preauthentication ACL 998 Configuring TrustPoint for Local Web Authentication 999 Configuration Examples for Local Web Authentication 999 Example: Obtaining Web Authentication Certificate 999 Example: Displaying a Web Authentication Certificate 1001 Example: Choosing the Default Web Authentication Login Page 1001 Example: Choosing a Customized Web Authentication Login Page from an IPv4 External Web Server 1002 Example: Choosing a Customized Web Authentication Login Page from an IPv6 External Web Server 1002 Example: Assigning Login, Login Failure, and Logout Pages per WLAN 1003 Example: Configuring Preauthentication ACL 1003 Example: Configuring Webpassthrough 1003 Verifying Web Authentication Type 1004 External Web Authentication (EWA) 1005 Configuring EWA with Single WebAuth Server Address and Default Ports (80/443) (CLI) 1005 Configuring EWA with Multiple Web Servers and/or Ports Different than Default (80/443) 1007 Configuring Wired Guest EWA with Multiple Web Servers and/or Ports Different than Default (80/443) 1009 Authentication for Sleeping Clients 1010 Information About Authenticating Sleeping Clients 1010 Restrictions on Authenticating Sleeping Clients 1010 Configuring Authentication for Sleeping Clients (GUI) 1011 Configuring Authentication for Sleeping Clients (CLI) 1011 Sleeping Clients with Multiple Authentications 1012 Mobility Support for Sleeping Clients 1012 Supported Combinations of Multiple Authentications 1012 Configuring Sleeping Clients with Multiple Authentications 1013 Configuring WLAN for Dot1x and Local Web Authentication 1013 Configuring a WLAN for MAC Authentication Bypass and Local Web Authentication 1014 Configuring a WLAN for Local Web Authentication and MAC Filtering 1015 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xliii Contents CHAPTER 94 Configuring a PSK + LWA in a WLAN 1016 Configuring a Sleeping Client 1017 Verifying a Sleeping Client Configuration 1018 Multi Authentication Combination with 802.1X Authentication and Local Web Authentication 1018 Feature History for Multiauthentication Combination of 802.1X and Local Web Authentication 1018 Information About Multiauthentication Combination with 802.1X Authentication and Local Web Authentication 1018 Limitations for Multi Authentication Combination of 802.1X and Local Web Authentication 1019 Enabling the Multiauthentication Combination of 802.1X Authentication and Local Web Authentication (CLI) 1019 Verifying Multiauthentication Combination with 802.1X Authentication and Local Web Authentication 1020 Central Web Authentication 1021 Information About Central Web Authentication 1021 Prerequisites for Central Web Authentication 1022 How to Configure ISE 1022 Creating an Authorization Profile 1022 Creating an Authentication Rule 1022 Creating an Authorization Rule 1023 How to Configure Central Web Authentication on the Controller 1024 Configuring WLAN (GUI) 1024 Configuring WLAN (CLI) 1025 Configuring Policy Profile (CLI) 1026 Configuring a Policy Profile (GUI) 1027 Creating Redirect ACL 1028 Configuring AAA for Central Web Authentication 1029 Configuring Redirect ACL in Flex Profile (GUI) 1030 Configuring Redirect ACL in Flex Profile (CLI) 1030 Authentication for Sleeping Clients 1031 Information About Authenticating Sleeping Clients 1031 Restrictions on Authenticating Sleeping Clients 1032 Configuring Authentication for Sleeping Clients (GUI) 1032 Configuring Authentication for Sleeping Clients (CLI) 1033 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xliv Contents CHAPTER 95 CHAPTER 96 CHAPTER 97 Sleeping Clients with Multiple Authentications 1033 Mobility Support for Sleeping Clients 1033 Supported Combinations of Multiple Authentications 1034 Configuring Sleeping Clients with Multiple Authentications 1034 Configuring WLAN for Dot1x and Local Web Authentication 1034 Configuring a WLAN for MAC Authentication Bypass and Local Web Authentication 1035 Configuring a WLAN for Local Web Authentication and MAC Filtering 1036 Configuring a PSK + LWA in a WLAN 1037 Configuring a Sleeping Client 1038 Verifying a Sleeping Client Configuration 1039 Private Shared Key 1041 Information About Private Preshared Key 1041 Configuring a PSK in a WLAN (CLI) 1042 Configuring a PSK in a WLAN (GUI) 1043 Applying a Policy Profile to a WLAN (GUI) 1044 Applying a Policy Profile to a WLAN (CLI) 1044 Verifying a Private PSK 1045 Multi-Preshared Key 1049 Information About Multi-Preshared Key 1049 Restrictions on Multi-PSK 1050 Configuring Multi-Preshared Key (GUI) 1050 Configuring Multi-Preshared Key (CLI) 1053 Verifying Multi-PSK Configurations 1054 Multiple Authentications for a Client 1057 Information About Multiple Authentications for a Client 1057 Information About Supported Combination of Authentications for a Client 1057 Jumbo Frame Support for RADIUS Packets 1058 Combination of Authentications on MAC Failure Not Supported on a Client 1059 Configuring Multiple Authentications for a Client 1059 Configuring WLAN for 802.1X and Local Web Authentication (GUI) 1059 Configuring WLAN for 802.1X and Local Web Authentication (CLI) 1059 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xlv Contents CHAPTER 98 Configuring WLAN for Preshared Key (PSK) and Local Web Authentication (GUI) 1061 Configuring WLAN for Preshared Key (PSK) and Local Web Authentication 1061 Configuring WLAN for PSK or Identity Preshared Key (iPSK) and Central Web Authentication (GUI) 1063 Configuring WLAN for PSK or Identity Preshared Key (iPSK) and Central Web Authentication 1063 Configuring WLAN 1063 Applying Policy Profile to a WLAN 1064 Configure WLAN for Web Authentication on MAC Authentication Bypass Failure with Pre-Shared Key (CLI) 1065 Configure WLAN for Web Authentication on MAC Authentication Bypass Failure with OWE (CLI) 1067 Configure WLAN for Web Authentication on MAC Authentication Bypass Failure with Secure Agile Exchange (CLI) 1069 Configuring 802.1x and Central Web Authentication on Controller (CLIs) 1070 Creating AAA Authentication 1070 Configuring AAA Server for External Authentication 1071 Configuring AAA for Authentication 1072 Configuring Accounting Identity List 1073 Configuring AAA for Central Web Authentication 1073 Defining an Access Control List for Radius Server 1074 Configuration Example to Define an Access Control List for Radius Server 1074 Configuring WLAN 1075 Configuring Policy Profile 1075 Mapping WLAN and Policy Profile to Policy Tag 1076 Configuring ISE for Central Web Authentication with Dot1x (GUI) 1077 Defining Guest Portal 1077 Defining Authorization Profile for a Client 1077 Defining Authentication Rule 1077 Defining Authorization Rule 1078 Creating Rules to Match Guest Flow Condition 1078 Verifying Multiple Authentication Configurations 1079 Wi-Fi Protected Access 3 1083 Simultaneous Authentication of Equals 1083 Opportunistic Wireless Encryption 1084 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xlvi Contents Hash-to-Element (H2E) 1084 YANG (RPC model) 1085 Transition Disable 1086 WPA3 SAE iPSK 1087 Configuring SAE (WPA3+WPA2 Mixed Mode) 1087 Configuring WPA3 Enterprise (GUI) 1089 Configuring WPA3 Enterprise 1089 Configuring the WPA3 OWE 1090 Configuring WPA3 OWE Transition Mode (GUI) 1092 Configuring WPA3 OWE Transition Mode 1092 Configuring WPA3 SAE (GUI) 1094 Configuring WPA3 SAE 1094 Configuring WPA3 SAE iPSK (CLI) 1096 Configuring a WPA3 SAE iPSK WLAN Profile (CLI) 1096 Configuring a Policy Profile (CLI) 1097 Configuring a Passphrase in a Client Authorization Policy in the RADIUS Server(GUI) 1098 Configuring WPA3 SAE H2E (GUI) 1099 Configuring WPA3 SAE H2E 1099 Configuring WPA3 WLAN for Transition Disable 1101 Configuring Anti-Clogging and SAE Retransmission (GUI) 1101 Configuring Anti-Clogging and SAE Retransmission 1102 Verifying WPA3 SAE and OWE 1103 Verifying WPA3 SAE H2E Support in WLAN 1106 Verifying WPA3 Transition Disable in WLAN 1112 CHAPTER 99 IP Source Guard 1115 Information About IP Source Guard 1115 Configuring IP Source Guard (GUI) 1115 Configuring IP Source Guard 1116 CHAPTER 100 802.11w 1117 Information About 802.11w 1117 Prerequisites for 802.11w 1120 Restrictions for 802.11w 1120 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xlvii Contents How to Configure 802.11w 1121 Configuring 802.11w (GUI) 1121 Configuring 802.11w (CLI) 1121 Disabling 802.11w 1122 Monitoring 802.11w 1123 CHAPTER 101 Management Frame Protection 1125 Information About Management Frame Protection 1125 Restrictions for Management Frame Protection 1126 Configuring Management Frame Protection (CLI) 1127 Verifying Management Frame Protection Settings 1127 CHAPTER 102 IPv4 ACLs 1129 Information about Network Security with ACLs 1129 ACL Overview 1129 Access Control Entries 1129 ACL Supported Types 1130 Supported ACLs 1130 ACL Precedence 1130 Port ACLs 1130 Router ACLs 1131 ACEs and Fragmented and Unfragmented Traffic 1132 ACEs and Fragmented and Unfragmented Traffic Examples 1132 Standard and Extended IPv4 ACLs 1133 IPv4 ACL Switch Unsupported Features 1133 Access List Numbers 1133 Numbered Standard IPv4 ACLs 1134 Numbered Extended IPv4 ACLs 1135 Named IPv4 ACLs 1135 ACL Logging 1136 Hardware and Software Treatment of IP ACLs 1136 IPv4 ACL Interface Considerations 1137 Restrictions for Configuring IPv4 Access Control Lists 1137 How to Configure ACLs 1138 xlviii Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x Contents Configuring IPv4 ACLs (GUI) 1138 Configuring IPv4 ACLs 1138 Creating a Numbered Standard ACL (GUI) 1139 Creating a Numbered Standard ACL (CLI) 1139 Creating a Numbered Extended ACL (GUI) 1141 Creating a Numbered Extended ACL (CLI) 1141 Creating Named Standard ACLs (GUI) 1145 Creating Named Standard ACLs 1145 Creating Extended Named ACLs (GUI) 1147 Creating Extended Named ACLs 1147 Applying an IPv4 ACL to an Interface (GUI) 1149 Applying an IPv4 ACL to an Interface (CLI) 1149 Applying ACL to Policy Profile (GUI) 1150 Applying ACL to Policy Profile 1150 Configuration Examples for ACLs 1151 Examples: Including Comments in ACLs 1151 Examples: Applying an IPv4 ACL to a Policy Profile in a Wireless Environment 1151 IPv4 ACL Configuration Examples 1152 ACLs in a Small Networked Office 1152 Examples: ACLs in a Small Networked Office 1153 Example: Numbered ACLs 1153 Examples: Extended ACLs 1154 Examples: Named ACLs 1154 Monitoring IPv4 ACLs 1155 CHAPTER 103 Downloadable ACL 1157 Feature History for Downloadable ACL 1157 Information About Downloadable ACL 1158 Scale Considerations for Downloadable ACL 1158 Guidelines and Restrictions for Downloadable ACL 1158 Configuring dACL Name and Definition in Cisco ISE 1159 Configuring dACL in a Controller (CLI) 1159 Configuring Explicit Authorization Server List (CLI) 1160 Verifying dACL Configuration 1161 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xlix Contents CHAPTER 104 DNS-Based Access Control Lists 1163 Information About DNS-Based Access Control Lists 1163 Defining ACLs 1164 Applying ACLs 1165 Types of URL Filters 1165 Restrictions on DNS-Based Access Control Lists 1166 Flex Mode 1167 Defining URL Filter List 1167 Applying URL Filter List to Flex Profile 1167 Configuring ISE for Central Web Authentication (GUI) 1168 Local Mode 1169 Defining URL Filter List 1169 Applying URL Filter List to Policy Profile (GUI) 1170 Applying URL Filter List to Policy Profile 1170 Configuring ISE for Central Web Authentication 1171 Creating Authorization Profiles 1171 Mapping Authorization Profiles to Authentication Rule 1171 Mapping Authorization Profiles to Authorization Rule 1172 Viewing DNS-Based Access Control Lists 1172 Configuration Examples for DNS-Based Access Control Lists 1173 Verifying DNS Snoop Agent (DSA) 1174 Information About Flex Client IPv6 Support with WebAuth Pre and Post ACL 1175 Enabling Pre-Authentication ACL for LWA and EWA (GUI) 1176 Enabling Pre-Authentication ACL for LWA and EWA 1176 Enabling Post-Authentication ACL for LWA and EWA (GUI) 1178 Enabling Post-Authentication ACL for LWA and EWA 1178 Enabling DNS ACL for LWA and EWA (GUI) 1179 Enabling DNS ACL for LWA and EWA 1179 Verifying Flex Client IPv6 Support with WebAuth Pre and Post ACL 1180 CHAPTER 105 Allowed List of Specific URLs 1181 Allowed List of Specific URLs 1181 Adding URL to Allowed List 1181 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x l Verifying URLs on the Allowed List 1183 CHAPTER 106 Cisco Umbrella WLAN 1185 Information About Cisco Umbrella WLAN 1185 Registering Controller to Cisco Umbrella Account 1186 Configuring Cisco Umbrella WLAN 1187 Importing CA Certificate to the Trust Pool 1187 Creating a Local Domain RegEx Parameter Map 1189 Configuring Parameter Map Name in WLAN (GUI) 1189 Configuring the Umbrella Parameter Map 1190 Enabling or Disabling DNScrypt (GUI) 1190 Enabling or Disabling DNScrypt 1191 Configuring Timeout for UDP Sessions 1191 Configuring Parameter Map Name in WLAN (GUI) 1192 Configuring Parameter Map Name in WLAN 1192 Configuring the Umbrella Flex Profile 1193 Configuring the Umbrella Flex Profile (GUI) 1193 Configuring Umbrella Flex Parameters 1194 Configuring the Umbrella Flex Policy Profile (GUI) 1194 Verifying the Cisco Umbrella Configuration 1195 CHAPTER 107 RADIUS Server Load Balancing 1197 Information About RADIUS Server Load Balancing 1197 Prerequisites for RADIUS Server Load Balancing 1199 Restrictions for RADIUS Server Load Balancing 1199 Enabling Load Balancing for a Named RADIUS Server Group (CLI) 1199 CHAPTER 108 AAA Dead-Server Detection 1201 Information About AAA Dead-Server Detection 1201 Prerequisites for AAA Dead-Server Detection 1202 Restrictions for AAA Dead-Server Detection 1202 Configuring AAA Dead-Server Detection (CLI) 1202 Verifying AAA Dead-Server Detection 1203 Contents Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x li Contents CHAPTER 109 ISE Simplification and Enhancements 1205 Utilities for Configuring Security 1205 Configuring Multiple Radius Servers 1206 Verifying AAA and Radius Server Configurations 1207 Configuring Captive Portal Bypassing for Local and Central Web Authentication 1207 Information About Captive Bypassing 1207 Configuring Captive Bypassing for WLAN in LWA and CWA (GUI) 1208 Configuring Captive Bypassing for WLAN in LWA and CWA (CLI) 1209 Sending DHCP Options 55 and 77 to ISE 1210 Information about DHCP Option 55 and 77 1210 Configuration to Send DHCP Options 55 and 77 to ISE (GUI) 1210 Configuration to Send DHCP Options 55 and 77 to ISE (CLI) 1210 Configuring EAP Request Timeout (GUI) 1211 Configuring EAP Request Timeout 1212 Configuring EAP Request Timeout in Wireless Security (CLI) 1212 Captive Portal 1213 Captive Portal Configuration 1213 Configuring Captive Portal (GUI) 1213 Configuring Captive Portal 1214 Captive Portal Configuration - Example 1216 CHAPTER 110 RADIUS DTLS 1219 Information About RADIUS DTLS 1219 Prerequisites 1221 Configuring RADIUS DTLS Server 1221 Configuring RADIUS DTLS Connection Timeout 1222 Configuring RADIUS DTLS Idle Timeout 1222 Configuring Source Interface for RADIUS DTLS Server 1223 Configuring RADIUS DTLS Port Number 1224 Configuring RADIUS DTLS Connection Retries 1224 Configuring RADIUS DTLS Trustpoint 1225 Configuring DTLS Dynamic Author 1226 Enabling DTLS for Client 1226 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x lii Contents Configuring Client Trustpoint for DTLS 1227 Configuring DTLS Idle Timeout 1228 Configuring Server Trustpoint for DTLS 1228 Verifying the RADIUS DTLS Server Configuration 1229 Clearing RADIUS DTLS Specific Statistics 1229 CHAPTER 111 Policy Enforcement and Usage Monitoring 1231 Policy Enforcement and Usage Monitoring 1231 Configuring Policy Enforcement and Enabling Change-of-Authorization (CLI) 1231 Example: Configuring Policy Enforcement and Usage Monitoring 1232 Verifying Policy Usage and Enforcement 1233 CHAPTER 112 Local Extensible Authentication Protocol 1235 Information About Local EAP 1235 Restrictions for Local EAP 1236 Configuring Local EAP Profile (CLI) 1236 Configuring Local EAP profile (GUI) 1237 Configuring AAA Authentication (GUI) 1237 Configuring AAA Authorization Method (GUI) 1237 Configuring AAA Authorization Method (CLI) 1238 Configuring Local Advanced Methods (GUI) 1239 Configuring WLAN (GUI) 1239 Configuring WLAN (CLI) 1240 Creating a User Account (CLI) 1240 Attaching a Policy Profile to a WLAN Interface (GUI) 1241 Deploy Policy Tag to Access Points (GUI) 1242 CHAPTER 113 Local EAP Ciphersuite 1243 Information About Local EAP Ciphersuite 1243 Restrictions for Local EAP Ciphersuite 1244 Configuring Local EAP Ciphersuite (CLI) 1245 CHAPTER 114 Authentication and Authorization Between Multiple RADIUS Servers 1247 Information About Authentication and Authorization Between Multiple RADIUS Servers 1247 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x liii Contents Configuring 802.1X Security for WLAN with Split Authentication and Authorization Servers 1248 Configuring Explicit Authentication and Authorization Server List (GUI) 1248 Configuring Explicit Authentication Server List (GUI) 1249 Configuring Explicit Authentication Server List (CLI) 1249 Configuring Explicit Authorization Server List (GUI) 1250 Configuring Explicit Authorization Server List (CLI) 1251 Configuring Authentication and Authorization List for 802.1X Security (GUI) 1252 Configuring Authentication and Authorization List for 802.1X Security 1252 Configuring Web Authentication for WLAN with Split Authentication and Authorization Servers 1253 Configuring Authentication and Authorization List for Web Authentication (GUI) 1253 Configuring Authentication and Authorization List for Web Authentication 1254 Verifying Split Authentication and Authorization Configuration 1255 Configuration Examples 1256 CHAPTER 115 CUI Information in RADIUS Accounting 1257 CUI Information in RADIUS Accounting Request 1257 Adding CUI Information in a RADIUS Accounting Request 1258 Verifying CUI Information in a RADIUS Accounting Request 1258 CHAPTER 116 Secure LDAP 1259 Information About SLDAP 1259 Prerequisite for Configuring SLDAP 1261 Restrictions for Configuring SLDAP 1261 Configuring SLDAP 1261 Configuring an AAA Server Group (GUI) 1262 Configuring a AAA Server Group 1263 Configuring Search and Bind Operations for an Authentication Request 1264 Configuring a Dynamic Attribute Map on an SLDAP Server 1265 Verifying the SLDAP Configuration 1265 CHAPTER 117 Network Access Server Identifier 1267 Information About Network Access Server Identifier 1267 Creating a NAS ID Policy(GUI) 1268 Creating a NAS ID Policy 1268 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x liv Contents Attaching a Policy to a Tag (GUI) 1269 Attaching a Policy to a Tag (CLI) 1269 Verifying the NAS ID Configuration 1270 CHAPTER 118 Locally Significant Certificates 1273 Information About Locally Significant Certificates 1273 Certificate Provisioning in Controllers 1274 Device Certificate Enrollment Operation 1274 Certificate Provisioning on Lightweight Access Point 1274 Restrictions for Locally Significant Certificates 1275 Provisioning Locally Significant Certificates 1275 Configuring RSA Key for PKI Trustpoint 1275 Configuring PKI Trustpoint Parameters 1276 Authenticating and Enrolling a PKI Trustpoint (GUI) 1277 Authenticating and Enrolling the PKI Trustpoint with CA Server (CLI) 1277 Configuring AP Join Attempts with LSC Certificate (GUI) 1279 Configuring AP Join Attempts with LSC Certificate (CLI) 1279 Configuring Subject-Name Parameters in LSC Certificate 1279 Configuring Key Size for LSC Certificate 1280 Configuring Trustpoint for LSC Provisioning on an Access Point 1280 Configuring an AP LSC Provision List (GUI) 1281 Configuring an AP LSC Provision List (CLI) 1282 Configuring LSC Provisioning for all the APs (GUI) 1282 Configuring LSC Provisioning for All APs (CLI) 1283 Configuring LSC Provisioning for the APs in the Provision List 1283 Importing a CA Certificate to the Trustpool (GUI) 1284 Importing a CA Certificate to the Trustpool (CLI) 1284 Cleaning the CA Certificates Imported in Trustpool (GUI) 1285 Cleaning CA Certificates Imported in Trustpool (CLI) 1285 Creating a New Trustpoint Dedicated to a Single CA Certificate 1286 Verifying LSC Configuration 1287 Configuring Management Trustpoint to LSC (GUI) 1287 Configuring Management Trustpoint to LSC (CLI) 1288 Information About MIC and LSC Access Points Joining the Controller 1288 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x lv Contents Overview of Support for MIC and LSC Access Points Joining the Controller 1288 Recommendations and Limitations 1288 Configuration Workflow 1289 Configuring LSC on the Controller (CLI) 1289 Enabling the AP Certificate Policy on the APs (CLI) 1290 Configuring the AP Policy Certificate (GUI) 1291 Configuring the Allowed List of APs to Join the Controller (CLI) 1291 Verifying the Configuration Status 1292 LSC Fallback Access Points 1293 Information About LSC Fallback APs 1293 Troubleshooting LSC Fallback State 1293 Recovery Steps 1293 Configuring Controller Self-Signed Certificate for Wireless AP Join 1294 Use Cases 1294 Prerequisites 1295 Configuring Clock Calendar (CLI) 1295 Enabling HTTP Server (CLI) 1296 Configuring CA Server (CLI) 1296 Configuring Trustpoint (CLI) 1298 Authenticating and Enrolling the PKI TrustPoint with CA Server (CLI) 1299 Tagging Wireless Management TrustPoint Name (CLI) 1300 Verifying Controller Certificates for Wireless AP Join 1300 CHAPTER 119 Certificate Management 1303 About Public Key Infrastructure Management (GUI) 1303 Authenticating and Enrolling a PKI Trustpoint (GUI) 1303 Generating an AP Self-Signed Certificate (GUI) 1304 Adding the Certificate Authority Server (GUI) 1304 Adding an RSA or EC Key for PKI Trustpoint (GUI) 1305 Adding and Managing Certificates 1305 1306 CHAPTER 120 Controller Self-Signed Certificate for Wireless AP Join 1307 Use Cases 1307 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x lvi Contents Prerequisites 1308 Configuring Clock Calendar (CLI) 1308 Enabling HTTP Server (CLI) 1309 Configuring CA Server (CLI) 1309 Configuring Trustpoint (CLI) 1311 Authenticating and Enrolling the PKI TrustPoint with CA Server (CLI) 1312 Tagging Wireless Management TrustPoint Name (CLI) 1313 Verifying Controller Certificates for Wireless AP Join 1313 CHAPTER 121 Managing Rogue Devices 1315 Rogue Detection 1315 Rogue Devices 1315 Information About Rogue Containment (Protected Management Frames (PMF) Enabled) 1317 AP Impersonation Detection 1318 Configuring Rogue Detection (GUI) 1318 Configuring Rogue Detection (CLI) 1319 Configuring RSSI Deviation Notification Threshold for Rogue APs (CLI) 1320 Configuring Management Frame Protection (GUI) 1320 Configuring Management Frame Protection (CLI) 1320 Enabling Access Point Authentication 1321 Verifying Management Frame Protection 1322 Verifying Rogue Events 1322 Verifying Rogue Detection 1323 Examples: Rogue Detection Configuration 1324 Configuring Rogue Policies (GUI) 1325 Configuring Rogue Policies (CLI) 1325 Rogue Detection Security Level 1327 Setting Rogue Detection Security-level 1328 Wireless Service Assurance Rogue Events 1329 Monitoring Wireless Service Assurance Rogue Events 1329 Rogue Full Scale Quotas and Priorities 1330 Feature History for Rogue Full Scale Quotas and Priorities 1330 Rogue AP Scale Modes Per Class 1330 Configuring Rogue AP Scale (CLI) 1332 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x lvii Contents Verifying Rogue Scale Details 1332 CHAPTER 122 Classifying Rogue Access Points 1335 Information About Classifying Rogue Access Points 1335 Guidelines and Restrictions for Classifying Rogue Access Points 1337 How to Classify Rogue Access Points 1337 Classifying Rogue Access Points and Clients Manually (GUI) 1337 Classifying Rogue Access Points and Clients Manually (CLI) 1338 Configuring Rogue Classification Rules (GUI) 1339 Configuring Rogue Classification Rules (CLI) 1340 Monitoring Rogue Classification Rules 1343 Examples: Classifying Rogue Access Points 1343 CHAPTER 123 Advanced WIPS 1345 Feature History for Advanced WIPS 1345 Information About Advanced WIPS 1346 Guidelines and Restrictions 1348 Enabling Advanced WIPS 1349 Syslog Support for Advanced WIPS 1349 Advanced WIPS Solution Components 1350 Supported Modes and Platforms 1350 Enabling Advanced WIPS(GUI) 1351 Enabling Advanced WIPS (CLI) 1351 Configuring Syslog Threshold for Advanced WIPS (CLI) 1352 Viewing Advanced WIPS Alarms (GUI) 1352 Verifying Advanced WIPS 1353 Verifying Syslog Configuration for Advanced WIPS 1354 CHAPTER 124 Cisco TrustSec 1355 Information about Cisco TrustSec 1355 Cisco TrustSec Features 1356 Security Group Access Control List 1357 Inline Tagging 1359 Policy Enforcement 1359 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x lviii SGACL Support for Wireless Guest Access 1360 Enabling SGACL on the AP (GUI) 1360 Enabling SGACL on the AP 1361 Enabling SGACL Policy Enforcement Globally (CLI) 1362 Enabling SGACL Policy Enforcement Per Interface (CLI) 1363 Manually Configuring a Device STG (CLI) 1363 Configuring SGACL, Inline Tagging, and SGT in Local Mode (GUI) 1364 Configuring SGACL, Inline Tagging, and SGT in Local Mode 1364 Configuring ISE for TrustSec 1365 Verifying Cisco TrustSec Configuration 1366 CHAPTER 125 SGT Inline Tagging and SXPv4 1369 Introduction to SGT Inline Tagging on AP and SXPv4 1369 Creating an SXP Profile 1369 Configuring SGT Inline Tagging on Access Points 1370 Configuring an SXP Connection (GUI) 1370 Configuring an SXP Connection 1371 Verifying SGT Push to Access Points 1372 CHAPTER 126 Multiple Cipher Support 1375 Default Ciphersuites Supported for CAPWAP-DTLS 1375 Configuring Multiple Ciphersuites 1376 Setting Server Preference 1377 Verifying Operational Ciphersuites and Priority 1377 CHAPTER 127 Configuring Secure Shell 1379 Information About Configuring Secure Shell 1379 SSH and Device Access 1379 SSH Servers, Integrated Clients, and Supported Versions 1379 SSH Configuration Guidelines 1380 Secure Copy Protocol Overview 1380 Secure Copy Protocol 1381 SFTP Support 1381 Prerequisites for Configuring Secure Shell 1381 Contents Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x lix Contents Restrictions for Configuring Secure Shell 1382 How to Configure SSH 1382 Setting Up the Device to Run SSH 1382 Configuring the SSH Server 1383 Monitoring the SSH Configuration and Status 1385 CHAPTER 128 Encrypted Traffic Analytics 1387 Information About Encrypted Traffic Analytics 1387 Exporting Records to IPv4 Flow Export Destination 1388 Exporting Records to IPv6 Flow Export Destination 1389 Exporting Records to IPv4 and IPv6 Destination over IPFIX 1389 Allowed List of Traffic 1390 Configuring Source Interface for Record Export 1391 Configuring Source Interface for Record Export Without IPFIX 1392 Configuring ETA Flow Export Destination (GUI) 1393 Enabling In-Active Timer 1393 Enabling ETA on WLAN Policy Profile 1394 Attaching Policy Profile to VLAN (GUI) 1395 Attaching Policy Profile to VLAN 1395 Verifying ETA Configuration 1396 CHAPTER 129 FIPS 1401 FIPS 1401 Guidelines and Restrictions for FIPS 1402 FIPS Self-Tests 1402 Configuring FIPS 1403 Configuring FIPS in HA Setup 1404 Verifying FIPS Configuration 1405 CHAPTER 130 Internet Protocol Security 1407 Information about Internet Protocol Security 1407 Internet Key Exchange Version 1 Transform Sets 1408 Configure IPSec Using Internet Key Exchange Version 1 1409 Internet Key Exchange Version 2 Transform Sets 1411 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x lx Contents Configure IPSec Using Internet Key Exchange Version 2 1412 IPsec Transforms and Lifetimes 1414 Use of X.509 With Internet Key Exchange Version 1415 For IKEv2 Commands 1416 IPsec Session Interuption and Recovery 1416 Example: Configure IPSec Using ISAKMP 1417 Verifying IPSec Traffic 1417 Example: Configure IPSec Using Internet Key Exchange Version 2 1418 Verifying IPSec With Internet Key Exchange Version 2 Traffic 1419 CHAPTER 131 Transport Layer Security Tunnel Support 1423 Information About Transport Layer Security Tunnel Support 1423 Configuring a Transport Layer Security Tunnel 1424 Verifying a Transport Layer Security Tunnel 1425 CHAPTER 132 Configuring RFC 5580 Location Attributes 1429 Feature History for RFC 5580 Location Attributes 1429 Information About RFC 5580 Location Attributes 1430 Information About Location-Capable Attribute 1432 Restriction for Configuring RFC 5580 Location Attributes 1432 Configuring Location Delivery Based on Out-of-Band Agreement (CLI) 1432 Configuring Location-Capable Attribute (CLI) 1433 Creating Location Attributes 1433 Configuring a Civic Profile (CLI) 1433 Configuring a Geo Profile (CLI) 1435 Configuring an Operator Name (CLI) 1436 Associating Location Attributes with User Location (CLI) 1437 Associating Location Attributes with the NAS Location (CLI) 1438 Verifying RFC 5580 Location Attribute Configuration 1439 CHAPTER 133 IP MAC Binding 1441 Information About IP MAC Binding 1441 Use Cases for No IP MAC Binding 1441 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x lxi Contents CHAPTER 134 Disabling IP Learning in FlexConnect Mode 1443 Information About Disabling IP Learning in FlexConnect Mode 1443 Restrictions for Disabling IP Learning in FlexConnect Mode 1443 Disabling IP Learning in FlexConnect Mode (CLI) 1444 Verifying MAC Entries from Database 1444 CHAPTER 135 Disabling Device Tracking to Support NAC Devices 1445 Feature History for Disabling Device Tracking to Support NAC Devices 1445 Information About Disabling Device Tracking to Support NAC Devices 1445 Restrictions for Disabling Device Tracking to Support NAC Devices 1446 Disabling Device Tracking for Wireless Clients (CLI) 1446 Verifying ARP Broadcast 1447 CHAPTER 136 Disabling IP Learning in Local Mode 1449 Information About Disabling IP Learning in Local Mode 1449 Restrictions for Disabling IP Learning in Local Mode 1449 Disabling IP Learning in Local Mode (CLI) 1450 Verifying MAC Entries from Database 1451 Verifying ARP Broadcast 1451 PART VIII CHAPTER 137 Mobility 1453 Mobility 1455 Introduction to Mobility 1455 SDA Roaming 1458 Definitions of Mobility-related Terms 1459 Mobility Groups 1459 Guidelines and Restrictions 1460 Configuring Mobility (GUI) 1462 Configuring Mobility (CLI) 1463 Configuring Inter-Release Controller Mobility (GUI) 1465 Configuring Inter-Release Controller Mobility 1465 Verifying Mobility 1469 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x lxii Contents CHAPTER 138 NAT Support on Mobility Groups 1475 Information About NAT Support on Mobility Groups 1475 Restrictions for NAT Support on Mobility Groups 1476 Functionalities Supported on Mobility NAT 1476 Configuring a Mobility Peer 1477 Verifying NAT Support on Mobility Groups 1477 CHAPTER 139 Static IP Client Mobility 1479 Information About Static IP Client Mobility 1479 Restrictions 1479 Configuring Static IP Client Mobility (GUI) 1480 Configuring Static IP Client Mobility (CLI) 1480 Verifying Static IP Client Mobility 1481 CHAPTER 140 Mobility Domain ID - Dot11i Roaming 1483 Information about Mobility Domain ID - 802.11i Roaming 1483 Verifying Mobility Domain ID - 802.11i Roaming 1484 CHAPTER 141 802.11r Support for Flex Local Authentication 1485 Information About 802.11r Support for FlexConnect Local Authentication 1485 Support Guidelines 1485 Verifying 802.11r Support for Flex Local Authentication 1486 CHAPTER 142 Opportunistic Key Caching 1487 Information about Opportunistic Key Caching 1487 Enabling Opportunistic Key Caching 1488 Enabling Opportunistic Key Caching (GUI) 1488 Verifying Opportunistic Key Caching 1488 PART IX CHAPTER 143 High Availability 1491 High Availability 1493 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x lxiii Contents Feature History for High Availability 1494 Information About High Availability 1495 Prerequisites for High Availability 1496 Restrictions on High Availability 1497 Configuring High Availability (CLI) 1498 Disabling High Availability 1499 Copying a WebAuth Tar Bundle to the Standby Controller 1500 System and Network Fault Handling 1502 Handling Recovery Mechanism 1506 Verifying High Availability Configurations 1507 Verifying AP or Client SSO Statistics 1507 Verifying High Availability 1509 High Availability Deployment for Application Centric Infrastructure (ACI) Network 1512 Information About Deploying ACI Network in Controller 1512 Prerequisite for Deploying the ACI Network in the Controller 1514 Disabling the Fast Switchover Notification Mechanism (CLI) 1514 Configuring Gratuitous ARP (GARP) Retransmit (CLI) 1515 Disabling Initial GARP (CLI) 1515 Information About Redundancy Management Interface 1516 Configuring Redundancy Management Interface (GUI) 1520 Configuring Redundancy Management Interface (CLI) 1521 Configuring Gateway Monitoring (CLI) 1523 Configuring Gateway Monitoring Interval (CLI) 1524 Gateway Reachability Detection 1524 Information About Gateway Reachability Detection 1524 Configuration Workflow 1525 Migrating to RMI IPv6 1525 Monitoring the Health of the Standby Controller 1525 Monitoring the Health of Standby Parameters Using SNMP 1527 Standby Monitoring Using Standby RMI IP 1527 Standby Monitoring Using the Active Controller 1527 Standby IOS Linux Syslogs 1528 Standby Interface Status Using Active SNMP 1528 Monitoring the Health of Standby Controller Using Programmatic Interfaces 1529 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x lxiv Monitoring the Health of Standby Controller Using CLI 1530 Verifying the Gateway-Monitoring Configuration 1533 Verifying the RMI IPv4 Configuration 1534 Verifying the RMI IPv6 Configuration 1535 Verifying Redundancy Port Interface Configuration 1535 Information About Auto-Upgrade 1538 Use Cases 1538 Configuration Workflow 1539 Configuring Auto-Upgrade (CLI) 1539 Use Case for Link Layer Discovery Protocol (LLDP) 1539 Enabling LLDP (CLI) 1540 Enabling LLDP Timers (CLI) 1540 Enabling LLDP TLV-Select (CLI) 1541 Verifying LLDP 1541 Feature History for Reload Reason History 1543 Information About Reload Reason History 1543 Verifying Reload Reason History 1543 Requesting Reload Reason History using YANG 1546 PART X CHAPTER 144 Quality of Service 1549 Quality of Service 1551 Wireless QoS Overview 1551 Wireless QoS Targets 1552 SSID Policies 1552 Client Policies 1552 Supported QoS Features on Wireless Targets 1552 Wireless QoS Mobility 1553 Precious Metal Policies for Wireless QoS 1553 Prerequisites for Wireless QoS 1554 Restrictions for QoS on Wireless Targets 1554 Metal Policy Format 1555 Metal Policy Map 1555 Class Maps 1557 Contents Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x lxv Contents DSCP to UP Mapping for Downstream Traffic 1558 Auto QoS Policy Format 1559 Architecture for Voice, Video and Integrated Data (AVVID) 1561 How to apply Bi-Directional Rate Limiting 1562 Information about Bi-Directional Rate Limiting 1562 Prerequisites for Bi-Directional Rate Limiting 1563 Configure Metal Policy on SSID 1564 Configure Metal Policy on Client 1564 Configure Bi-Directional Rate Limiting for All Traffic 1565 Configure Bi-Directional Rate Limiting Based on Traffic Classification 1565 Apply Bi-Directional Rate Limiting Policy Map to Policy Profile 1567 Apply Metal Policy with Bi-Directional Rate Limiting 1568 How to apply Per Client Bi-Directional Rate Limiting 1569 Information About Per Client Bi-Directional Rate Limiting 1569 Prerequisites for Per Client Bi-Directional Rate Limiting 1570 Restrictions on Per Client Bi-Directional Rate Limiting 1570 Configuring Per Client Bi-Directional Rate Limiting (GUI) 1570 Verifying Per Client Bi-Directional Rate Limiting 1571 Configuring BDRL Using AAA Override 1571 Verifying Bi-Directional Rate-Limit 1572 How to Configure Wireless QoS 1573 Configuring a Policy Map with Class Map (GUI) 1573 Configuring a Class Map (CLI) 1574 Configuring Policy Profile to Apply QoS Policy (GUI) 1575 Configuring Policy Profile to Apply QoS Policy (CLI) 1576 Applying Policy Profile to Policy Tag (GUI) 1576 Applying Policy Profile to Policy Tag (CLI) 1577 Attaching Policy Tag to an AP 1577 Configuring Custom QoS Mapping 1578 Configuring DSCP-to-User Priority Mapping Exception 1579 Configuring Trust Upstream DSCP Value 1581 CHAPTER 145 Wireless Auto-QoS 1583 Information About Auto QoS 1583 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x lxvi How to Configure Wireless AutoQoS 1584 Configuring Wireless AutoQoS on Profile Policy 1584 Disabling Wireless AutoQoS 1585 Rollback AutoQoS Configuration (GUI) 1585 Rollback AutoQoS Configuration 1585 Clearing Wireless AutoQoS Policy Profile (GUI) 1586 Clearing Wireless AutoQoS Policy Profile 1586 Viewing AutoQoS on policy profile 1587 CHAPTER 146 Native Profiling 1589 Information About Native Profiling 1589 Creating a Class Map (GUI) 1590 Creating a Class Map (CLI) 1591 Creating a Service Template (GUI) 1593 Creating a Service Template (CLI) 1594 Creating a Parameter Map 1595 Creating a Policy Map (GUI) 1595 Creating a Policy Map (CLI) 1596 Configuring Native Profiling in Local Mode 1598 Verifying Native Profile Configuration 1598 CHAPTER 147 Air Time Fairness 1601 Information About Air Time Fairness 1601 Restrictions on Cisco Air Time Fairness 1603 Cisco Air Time Fairness (ATF) Use Cases 1604 Configuring Cisco Air Time Fairness (ATF) 1604 Configuring Cisco Air Time Fairness 1604 Creating a Cisco ATF Profile (GUI) 1604 Creating Cisco ATF Profile (CLI) 1605 Attaching Cisco ATF Profile to a Policy Profile (GUI) 1606 Attaching Cisco ATF Profile to a Policy Profile (CLI) 1606 Enabling ATF in the RF Profile (GUI) 1607 Enabling ATF in the RF Profile (CLI) 1607 Verifying Cisco ATF Configurations 1608 Contents Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x lxvii Contents Verifying Cisco ATF Statistics 1608 CHAPTER 148 IPv6 Non-AVC QoS Support 1611 Information About IPv6 Non-AVC QoS Support 1611 Configuring IPv6 Non-AVC QoS 1611 Marking DSCP Values for an IPv6 Packet 1612 Dropping an IPv6 Packet with DSCP Values 1612 Policing IPv6 Traffic 1613 Verifying IPv6 Non-AVC QoS 1614 CHAPTER 149 QoS Basic Service Set Load 1615 Information About QoS Basic Set Service Load 1615 Configuring QBSS Load 1616 Configuring Wi-Fi Multimedia 1616 Enabling QoS Basic Set Service Load 1617 Verifying QoS Basic Set Service Load 1617 PART XI CHAPTER 150 IPv6 1619 IPv6 Client IP Address Learning 1621 Information About IPv6 Client Address Learning 1621 Address Assignment Using SLAAC 1621 Stateful DHCPv6 Address Assignment 1622 Router Solicitation 1623 Router Advertisement 1623 Neighbor Discovery 1623 Neighbor Discovery Suppression 1624 Router Advertisement Guard 1624 Router Advertisement Throttling 1625 Prerequisites for IPv6 Client Address Learning 1625 IPv6 Address Tracking for Wireless Clients 1625 Configuring Unknown Address Multicast Neighbor Solicitation Forwarding 1626 Configuring RA Throttle Policy (CLI) 1626 Applying RA Throttle Policy on VLAN (GUI) 1627 lxviii Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x Contents Applying RA Throttle Policy on a VLAN (CLI) 1628 Configuring IPv6 Interface on a Switch (GUI) 1628 Configuring IPv6 on Interface (CLI) 1629 Configuring DHCP Pool on Switch (GUI) 1630 Configuring DHCP Pool on Switch (CLI) 1630 Configuring Stateless Auto Address Configuration Without DHCP on Switch (CLI) 1631 Configuring Stateless Auto Address Configuration With DHCP on Switch 1632 Configuring Stateless Address Auto Configuration Without DHCP on Switch (CLI) 1634 Native IPv6 1635 Information About IPv6 1635 Configuring IPv6 Addressing 1636 Creating an AP Join Profile (GUI) 1637 Creating an AP Join Profile (CLI) 1637 Configuring the Primary and Backup Controller (GUI) 1638 Configuring Primary and Backup Controller (CLI) 1638 Verifying IPv6 Configuration 1639 CHAPTER 151 IPv6 ACL 1641 Information About IPv6 ACL 1641 Understanding IPv6 ACLs 1641 Types of ACL 1641 Per User IPv6 ACL 1641 Filter ID IPv6 ACL 1642 Prerequisites for Configuring IPv6 ACL 1642 Restrictions for Configuring IPv6 ACL 1642 Configuring IPv6 ACLs 1642 Default IPv6 ACL Configuration 1643 Interaction with Other Features and Switches 1643 How To Configure an IPv6 ACL 1643 Creating an IPv6 ACL (GUI) 1643 Creating an IPv6 ACL 1644 Creating WLAN IPv6 ACL (GUI) 1648 Creating WLAN IPv6 ACL 1648 Verifying IPv6 ACL 1648 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x lxix Contents Displaying IPv6 ACLs 1648 Configuration Examples for IPv6 ACL 1649 Example: Creating an IPv6 ACL 1649 Example: Applying an IPv6 ACL to a Policy Profile in a Wireless Environment 1649 Displaying IPv6 ACLs 1650 Example: Displaying IPv6 ACLs 1650 Example: Configuring RA Throttling 1651 CHAPTER 152 IPv6 Client Mobility 1653 Information About IPv6 Client Mobility 1653 Using Router Advertisment 1654 Router Advertisement Throttling 1654 IPv6 Address Learning 1655 Handling Multiple IP Addresses 1655 IPv6 Configuration 1655 Prerequisites for IPv6 Client Mobility 1655 Monitoring IPv6 Client Mobility 1656 CHAPTER 153 IPv6 Support on Flex and Mesh 1657 IPv6 Support on Flex + Mesh Deployment 1657 Configuring IPv6 Support for Flex + Mesh 1657 Configuring Preferred IP Address as IPv6 (GUI) 1658 Configuring Preferred IP Address as IPv6 1659 Verifying IPv6 on Flex+Mesh 1659 CHAPTER 154 IPv6 CAPWAP UDP Lite Support 1661 Information About UDP Lite 1661 Enabling UDP Lite Support 1661 Verifying UDP Lite Support Configuration 1662 CHAPTER 155 Neighbor Discovery Proxy 1663 Information About Neighbor Discovery 1663 Configure Neighbor Discovery Proxy (CLI) 1663 Configure Duplicate Address Detection Proxy (CLI) 1664 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x lxx Contents CHAPTER 156 Address Resolution Protocol Proxy 1667 Information About Address Resolution Protocol 1667 Configure Address Resolution Protocol Proxy (CLI) 1667 CHAPTER 157 IPv6 Ready Certification 1669 Feature History for IPv6-Ready Certification 1669 IPv6 Ready Certification 1669 Configuring IPv6 Route Information 1670 Verifying IPv6 Route Information 1670 PART XII CHAPTER 158 CleanAir 1671 Cisco CleanAir 1673 Information About Cisco CleanAir 1673 Cisco CleanAir-Related Terms 1674 Cisco CleanAir Components 1674 Interference Types that Cisco CleanAir can Detect 1675 EDRRM and AQR Update Mode 1676 Prerequisites for CleanAir 1676 Restrictions for CleanAir 1677 How to Configure CleanAir 1677 Enabling CleanAir for the 2.4-GHz Band (GUI) 1677 Enabling CleanAir for the 2.4-GHz Band (CLI) 1678 Configuring Interference Reporting for a 2.4-GHz Device (GUI) 1678 Configuring Interference Reporting for a 2.4-GHz Device (CLI) 1679 Enabling CleanAir for the 5-GHz Band (GUI) 1680 Enabling CleanAir for the 5-GHz Band (CLI) 1681 Configuring Interference Reporting for a 5-GHz Device (GUI) 1681 Configuring Interference Reporting for a 5-GHz Device (CLI) 1682 Configuring Event Driven RRM for a CleanAir Event (GUI) 1683 Configuring EDRRM for a CleanAir Event (CLI) 1684 CleanAir Pro Scanning 1685 Feature History for CleanAir Pro Scanning 1685 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x lxxi Contents Information About CleanAir Pro Scanning 1685 Enabling CleanAir Pro Scanning (CLI) 1686 Monitoring CleanAir Pro Statistics (GUI) 1687 Verifying CleanAir Pro Scanning Details 1687 Verifying CleanAir Parameters 1688 Monitoring Interference Devices 1689 Configuration Examples for CleanAir 1689 CleanAir FAQs 1690 CHAPTER 159 Bluetooth Low Energy 1691 Information About Bluetooth Low Energy 1691 Enabling Bluetooth Low Energy Beacon (GUI) 1692 Enabling Bluetooth Low Energy Beacon 1692 CHAPTER 160 Persistent Device Avoidance 1695 Information about Cisco Persistent Device Avoidance 1695 Configuring Persistent Device Avoidance (GUI) 1696 Configuring Persistent Device Avoidance (CLI) 1696 Verifying Persistent Device Avoidance 1696 CHAPTER 161 Spectrum Intelligence 1699 Spectrum Intelligence 1699 Configuring Spectrum Intelligence 1700 Verifying Spectrum Intelligence Information 1700 Debugging Spectrum Intelligence on Supported APs (CLI) 1701 CHAPTER 162 Spectrum Analysis 1703 Information About Spectrum Analysis 1703 Live Spectrum Analysis 1704 Performing AP Spectrum Analysis (GUI) 1704 Configuring Spectrum Analysis 1705 Verifying Spectrum Analysis 1705 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x lxxii Contents PART XIII CHAPTER 163 Mesh Access Points 1707 Mesh Access Points 1709 Introduction to the Mesh Network 1711 Restrictions for Mesh Access Points 1712 MAC Authorization 1713 Preshared Key Provisioning 1714 EAP Authentication 1714 Bridge Group Names 1715 Background Scanning 1716 Information About Background Scanning and MAP Fast Ancestor Find Mode 1716 Mesh Backhaul at 2.4 GHz and 5 GHz 1717 Information About Mesh Backhaul 1717 Information About Mesh Serial Backhaul 1718 Information About Mesh Backhaul RRM 1719 Dynamic Frequency Selection 1720 Country Codes 1720 Intrusion Detection System 1720 Mesh Interoperability Between Controllers 1720 Information About DHCP and NAT Functionality on Root AP (RAP) 1721 Mesh Convergence 1721 Noise-Tolerant Fast 1722 Ethernet Bridging 1722 Multicast Over Mesh Ethernet Bridging Network 1723 Radio Resource Management on Mesh 1723 Air Time Fairness on Mesh 1724 Spectrum Intelligence for Mesh 1724 Indoor Mesh Interoperability with Outdoor Mesh 1725 Workgroup Bridge 1725 Link Test 1725 Mesh Daisy Chaining 1726 Mesh Leaf Node 1726 Flex+Bridge Mode 1726 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x lxxiii Contents Backhaul Client Access 1727 Mesh CAC 1727 Prerequisites for Mesh Ethernet Daisy Chaining 1728 Restrictions for Mesh Ethernet Daisy Chaining 1728 Speeding up Mesh Network Recovery Through Fast Detection of Uplink Gateway Reachability Failure 1728 Fast Teardown for a Mesh Deployment 1729 Configuring MAC Authorization (GUI) 1729 Configuring MAC Authorization (CLI) 1730 Configuring MAP Authorization - EAP (GUI) 1731 Configuring MAP Authorization (CLI) 1731 Configuring PSK Provisioning (CLI) 1732 Configuring a Bridge Group Name (GUI) 1733 Configuring a Bridge Group Name (CLI) 1734 Configuring Background Scanning (GUI) 1734 Configuring Background Scanning 1735 Configuring AP Fast Ancestor Find Mode (GUI) 1735 Configuring Background Scanning and MAP Fast Ancestor Find Mode (CLI) 1736 Configuring Backhaul Client Access (GUI) 1736 Configuring Backhaul Client Access (CLI) 1737 Configuring Dot11ax Rates on Mesh Backhaul Per Access Point (GUI) 1737 Configuring Dot11ax Rates on Mesh Backhaul in Mesh Profile (GUI) 1738 Configuring Wireless Backhaul Data Rate (CLI) 1738 Configuring Data Rate Per AP (CLI) 1739 Configuring Data Rate Using Mesh Profile (CLI) 1740 Configuring Mesh Backhaul (CLI) 1740 Configuring Dynamic Frequency Selection (CLI) 1741 Configuring the Intrusion Detection System (CLI) 1741 Configuring Ethernet Bridging (GUI) 1742 Configuring Ethernet Bridging (CLI) 1742 Configuring Multicast Modes over Mesh 1744 Configuring RRM on Mesh Backhaul (CLI) 1744 Configuring RRM Channel Assignment for Root Access Points Globally 1745 1745 lxxiv Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x Configuring RRM Channel Assignment for an Access Point 1746 Selecting a Preferred Parent (GUI) 1746 Selecting a Preferred Parent (CLI) 1747 Changing the Role of an AP (GUI) 1748 Changing the Role of an AP (CLI) 1749 Configuring the Mesh Leaf Node (CLI) 1749 Configuring the Mesh Leaf Node (GUI) 1749 Configuring Subset Channel Synchronization 1750 Provisioning LSC for Bridge-Mode and Mesh APs (GUI) 1750 Provisioning LSC for Bridge-Mode and Mesh APs 1751 Specifying the Backhaul Slot for the Root AP (GUI) 1752 Specifying the Backhaul Slot for the Root AP (CLI) 1752 Using a Link Test on Mesh Backhaul (GUI) 1753 Using a Link Test on Mesh Backhaul 1753 Configuring Battery State for Mesh AP (GUI) 1754 Configuring Battery State for Mesh AP 1754 Configuring Mesh Convergence (CLI) 1754 Configuring DHCP Server on Root Access Point (RAP) 1755 Configuring Mesh Ethernet Daisy Chaining (CLI) 1756 Enabling Mesh Ethernet Daisy Chaining 1756 Configuring Mesh CAC (CLI) 1757 Configuring ATF on Mesh (GUI) 1757 Configuring ATF on Mesh 1758 Create an ATF Policy for a MAP 1758 Creating an ATF Policy (GUI) 1759 Adding an ATF to a Policy Profile (GUI) 1759 Enabling ATF Mode in an RF Profile (GUI) 1759 Enabling Wireless Mesh Profile 1760 Enabling Serial Backhaul in Radio Profile (GUI) 1760 Enabling Mesh Configurations in Radio Profile (CLI) 1761 Enabling Serial Backhaul (CLI) 1762 Configuration Example for Mesh Serial Backhaul 1763 Associating Wireless Mesh to an AP Profile (CLI) 1763 Configuring Fast Teardown for a Mesh AP Profile (GUI) 1763 Contents Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x lxxv Contents Configuring Fast Teardown for a Mesh AP Profile (CLI) 1764 Flex Resilient with Flex and Bridge Mode Access Points 1765 Information About Flex Resilient with Flex and Bridge Mode Access Points 1765 Configuring a Flex Profile (GUI) 1765 Configuring a Flex Profile (CLI) 1766 Configuring a Site Tag (CLI) 1767 Configuring a Mesh Profile (CLI) 1768 Associating Wireless Mesh to an AP Profile (CLI) 1768 Attaching Site Tag to an Access Point (CLI) 1769 Configuring Switch Interface for APs (CLI) 1770 Verifying Flex Resilient with Flex and Bridge Mode Access Points Configuration 1770 Verifying ATF Configuration on Mesh 1771 Verifying Mesh Ethernet Daisy Chaining 1772 Verifying Mesh Convergence 1772 Verifying DHCP Server for Root AP Configuration 1773 Verifying Mesh Backhaul 1773 Verifying Mesh Configuration 1774 Verifying Dot11ax Rates on Mesh Backhaul 1782 Verifying Mesh Serial Backhaul 1782 Verifying the RRM DCA Status 1783 Verifying Fast Teardown with Default Mesh Profile 1783 Verifying Background Scanning and MAP Fast Ancestor Find 1784 CHAPTER 164 Redundant Root Access Point (RAP) Ethernet Daisy Chaining 1785 Overview of Redundant RAP Ethernet Daisy Chaining 1785 Prerequisites for Redundant RAP Ethernet Daisy Chaining Support 1786 Configuring Redundant RAP Ethernet Daisy Chaining Support (CLI) 1786 Verifying Daisy Chain Redundancy (CLI) 1786 PART XIV CHAPTER 165 VideoStream 1789 VideoStream 1791 Information about Media Stream 1791 Prerequisites for Media Stream 1792 lxxvi Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x How to Configure Media Stream 1792 Configuring Multicast-Direct Globally for Media Stream (CLI) 1792 Configuring Media Stream for 802.11 Bands (CLI) 1793 Configuring a WLAN to Stream Video(GUI) 1795 Configuring a WLAN to Stream Video (CLI) 1795 Deleting a Media Stream (GUI) 1796 Deleting a Media Stream (CLI) 1796 Monitoring Media Streams 1797 Configuring the General Parameters for a Media Stream (GUI) 1798 Adding Media Stream (CLI) 1798 Enabling a Media Stream per WLAN (GUI) 1799 Enabling a Media Stream per WLAN (CLI) 1799 Configuring the General Parameters for a Media Stream (GUI) 1800 Configuring the General Parameters for a Media Stream (CLI) 1800 Configuring Multicast Direct Admission Control (GUI) 1801 Configuring Multicast Direct Admission Control (CLI) 1802 Create and Attach Policy-based QoS Profile 1803 Create a QoS Profile (GUI) 1804 Create a QoS Profile (CLI) 1804 Create a Service Template (GUI) 1805 Create a Service Template (CLI) 1805 Map the Service Template to the Policy Map (GUI) 1806 Map the Service Template to the Policy Map (CLI) 1807 Map the Policy Map (GUI) 1808 Map the Policy Map (CLI) 1808 Viewing Media Stream Information 1809 PART XV CHAPTER 166 Software-Defined Access Wireless 1813 Software-Defined Access Wireless 1815 Information to Software-Defined Access Wireless 1815 Configuring SD-Access Wireless 1818 Configuring Default Map Server (GUI) 1818 Configuring Default Map Server (CLI) 1819 Contents Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x lxxvii Contents Configuring SD-Access Wireless Profile (GUI) 1819 Configuring SD-Access Wireless Profile (CLI) 1820 Configuring Map Server in Site Tag (GUI) 1820 Configuring Map Server in Site Tag (CLI) 1821 Configuring Map Server per L2-VNID (GUI) 1821 Configuring Map Server per L2-VNID (CLI) 1822 Verifying SD-Access Wireless 1822 CHAPTER 167 Passive Client 1823 Information About Passive Clients 1823 Enabling Passive Client on WLAN Policy Profile (GUI) 1824 Enabling Passive Client on WLAN Policy Profile (CLI) 1824 Enabling ARP Broadcast on VLAN (GUI) 1825 Enabling ARP Broadcast on VLAN (CLI) 1825 Configuring Passive Client in Fabric Deployment 1825 Enabling Broadcast Underlay on VLAN 1826 Enabling ARP Flooding 1827 Verifying Passive Client Configuration 1829 CHAPTER 168 Fabric in a Box with External Fabric Edge 1831 Introduction to Fabric in a Box with External Fabric Edge 1831 Configuring a Fabric Profile (CLI) 1831 Configuring a Policy Profile (CLI) 1832 Configuring a Site Tag (CLI) 1833 Configuring a WLAN (CLI) 1834 Configuring a Policy Tag (CLI) 1834 Configuring an AP Profile 1835 Configuring Map Server and AP Subnet (CLI) 1835 Configuring Fabric on FiaB Node 1836 Configuring a Fabric Edge Node 1842 Verifying Fabric Configuration 1849 PART XVI VLAN 1855 lxxviii Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x Contents CHAPTER 169 VLANs 1857 Information About VLANs 1857 Logical Networks 1857 Supported VLANs 1857 VLAN Port Membership Modes 1857 VLAN Configuration Files 1858 Normal-Range VLAN Configuration Guidelines 1859 Extended-Range VLAN Configuration Guidelines 1859 Prerequisites for VLANs 1860 Restrictions for VLANs 1860 How to Configure VLANs 1861 How to Configure Normal-Range VLANs 1861 Creating or Modifying an Ethernet VLAN 1861 Assigning Static-Access Ports to a VLAN (GUI) 1862 Assigning Static-Access Ports to a VLAN 1862 How to Configure Extended-Range VLANs 1863 Creating an Extended-Range VLAN (GUI) 1864 Creating an Extended-Range VLAN 1864 Monitoring VLANs 1865 CHAPTER 170 VLAN Groups 1867 Information About VLAN Groups 1867 Prerequisites for VLAN Groups 1868 Restrictions for VLAN Groups 1868 Creating a VLAN Group (GUI) 1868 Creating a VLAN Group (CLI) 1869 Adding a VLAN Group to Policy Profile (GUI) 1869 Adding a VLAN Group to a Policy Profile 1870 Viewing the VLANs in a VLAN Group 1870 VLAN Group Support for DHCP and Static IP Clients 1871 Supported Features 1871 PART XVII WLAN 1873 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x lxxix Contents CHAPTER 171 WLANs 1875 Information About WLANs 1875 Band Selection 1876 Off-Channel Scanning Deferral 1876 DTIM Period 1876 WLAN Radio Policy 1877 Restrictions for WLAN Radio Policy 1877 Prerequisites for Configuring Cisco Client Extensions 1877 Peer-to-Peer Blocking 1878 Diagnostic Channel 1878 Prerequisites for WLANs 1878 Restrictions for WLANs 1878 How to Configure WLANs 1880 WLAN Wizard 1880 Local Mode 1880 FlexConnect Mode 1884 Guest CWA Mode 1888 Creating WLANs (GUI) 1891 Creating WLANs (CLI) 1891 Deleting WLANs (GUI) 1892 Deleting WLANs 1892 Searching WLANs (CLI) 1893 Enabling WLANs (GUI) 1893 Enabling WLANs (CLI) 1894 Disabling WLANs (GUI) 1894 Disabling WLANs (CLI) 1894 Configuring General WLAN Properties (CLI) 1895 Configuring Advanced WLAN Properties (CLI) 1896 Configuring Advanced WLAN Properties (GUI) 1898 Configuring WLAN Radio Policy (GUI) 1900 Configuring a WLAN Radio Policy (CLI) 1901 Verifying WLAN Properties (CLI) 1902 Verifying WLAN-VLAN Information for an AP 1902 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x lxxx Verifying a WLAN Radio Policy 1903 CHAPTER 172 WLAN Security 1905 Information About WPA1 and WPA2 1905 Information About AAA Override 1906 Configuring AAA Override 1906 Information About VLAN Override 1907 Configuring Override VLAN for Central Switching 1907 Configuring Override VLAN for Local Switching 1908 VLAN Override on Layer 3 Web Authentication 1909 Verifying VLAN Override on Layer 3 Web Authentication 1909 Prerequisites for Layer 2 Security 1909 Restrictions for WPA2 and WP3 1910 Feature History for Fallback for AAA-Overridden VLAN 1910 Information About Fallback for AAA- Overridden VLAN 1911 Central Switching and FlexConnect Mode Scenarios 1911 Configuring Fallback for AAA-Overridden VLAN (CLI) 1912 Verifying Fallback for AAA-Overridden VLAN 1912 How to Configure WLAN Security 1913 Configuring Static WEP Layer 2 Security Parameters (GUI) 1913 Configuring Static WEP Layer 2 Security Parameters (CLI) 1913 Configuring WPA + WPA2 Layer 2 Security Parameters (GUI) 1915 Configuring WPA + WPA2 Layer 2 Security Parameters (CLI) 1915 CHAPTER 173 Remote LANs 1919 Information About Remote LANs 1919 Configuring Remote LANs (RLANs) 1921 Enabling or Disabling all RLANs 1921 Creating RLAN Profile (GUI) 1921 Creating RLAN Profile (CLI) 1922 Configuring RLAN Profile Parameters (GUI) 1922 Configuring RLAN Profile Parameters (CLI) 1923 Creating RLAN Policy Profile (GUI) 1924 Creating RLAN Policy Profile (CLI) 1925 Contents Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x lxxxi Contents Configuring RLAN Policy Profile Parameters (GUI) 1925 Configuring RLAN Policy Profile Parameters (CLI) 1926 Configuring Policy Tag and Mapping an RLAN Policy Profile to an RLAN Profile (CLI) 1929 Configuring LAN Port (CLI) 1930 Attaching Policy Tag to an Access Point (GUI) 1930 Attaching Policy Tag to an Access Point (CLI) 1930 Verifying RLAN Configuration 1931 Information About RLAN Authentication Fallback 1934 Configuring RLAN Authentication Fallback (CLI) 1934 Modifying 802.1X EAP Timers for RLAN Clients 1935 Verifying RLAN Authentication Fallback 1936 CHAPTER 174 RLAN External Module 1937 Information About External Module 1937 Prerequisites for Configuring External Module 1937 Configuring External Module (GUI) 1937 Configuring External Module (CLI) 1938 Verifying External Module 1938 CHAPTER 175 802.11ax Per Virtual Access Point 1939 Information About 802.11ax Mode Per Virtual Access Point 1939 Configuring 802.11ax Mode Per Virtual Access Point (GUI) 1939 Configuring 802.11ax Mode Per Virtual Access Point 1940 Verifying 802.11ax Mode Per Virtual Access Point 1940 CHAPTER 176 BSS Coloring 1943 Information About BSS Coloring 1943 BSS Coloring 1944 OBSS-PD and Spatial Reuse 1944 Configuring BSS Color on AP (GUI) 1944 Configuring BSS Color in the Privileged EXEC Mode 1945 Configuring BSS Color Globally (GUI) 1945 Configuring BSS Color in the Configuration Mode 1946 Configuring Overlapping BSS Packet Detect (GUI) 1946 lxxxii Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x Contents Configuring OBSS-PD Spatial Reuse Globally (CLI) 1947 Configuring OBSS PD in an RF Profile (GUI) 1947 Configuring OBSS-PD Spatial Reuse in the RF Profile Mode (CLI) 1948 Verifying BSS Color and OBSS-PD 1948 CHAPTER 177 DHCP for WLANs 1951 Information About Dynamic Host Configuration Protocol 1951 Internal DHCP Servers 1951 External DHCP Servers 1952 DHCP Assignments 1952 DHCP Option 82 1953 Restrictions for Configuring DHCP for WLANs 1954 Guidelines for DHCP Relay Configuration 1954 How to Configure DHCP for WLANs 1955 Configuring DHCP Scopes (GUI) 1955 Configuring DHCP Scopes (CLI) 1956 Configuring the Internal DHCP Server 1957 Configuring the Internal DHCP Server Under Client VLAN SVI (GUI) 1957 Configuring the Internal DHCP Server Under Client VLAN SVI (CLI) 1957 Configuring the Internal DHCP Server Under a Wireless Policy Profile (GUI) 1960 Configuring the Internal DHCP Server Under a Wireless Policy Profile 1960 Configuring the Internal DHCP Server Globally (GUI) 1963 Configuring the Internal DHCP Server Globally (CLI) 1963 Verifying Internal DHCP Configuration 1965 Configuring DHCP-Required for FlexConnect 1967 Information About FlexConnect DHCP-Required 1967 Restrictions and Limitations for FlexConnect DHCP-Required 1967 Configuring FlexConnect DHCP-Required (GUI) 1967 Configuring FlexConnect DHCP-Required (CLI) 1968 Verifying FlexConnect DHCP-Required 1968 CHAPTER 178 Aironet Extensions IE (CCX IE) 1971 Information About Aironet Extensions Information Element 1971 Configuring Aironet Extensions IE (GUI) 1971 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x lxxxiii Contents Configuring Aironet Extensions IE (CLI) 1971 Verifying the Addition of AP Name 1972 CHAPTER 179 Device Analytics 1975 Device Analytics 1975 Information About Device Analytics 1975 Restrictions for Device Analytics 1975 Configuring Device Analytics (GUI) 1976 Configuring Device Analytics (CLI) 1976 Verifying Device Analytics 1977 Verifying Device Analytics Configuration 1978 Adaptive 802.11r 1979 Information About Adaptive 802.11r 1979 Configuring Adaptive 802.11r (GUI) 1980 Verifying Adaptive 802.11r 1980 CHAPTER 180 Device Classifier Dynamic XML Support 1981 Feature History for Device Classifier Dynamic XML Support 1981 Information About Device Classifier Dynamic XML Support 1982 Enabling Device Classifier (CLI) 1985 Updating Dynamic XML File 1985 Verifying TLV Values 1986 Clearing Old Classification Cache 1986 CHAPTER 181 BSSID Counters 1989 BSSID Counters 1989 Enabling BSSID Statistics and BSSID Neighbor Statistics 1989 Verifying BSSID Statistics on the Controller 1990 CHAPTER 182 Fastlane+ 1993 Information About Fastlane+ 1993 Configuring an Fastlane+ on a WLAN (CLI) 1993 Configuring an Fastlane+ on a WLAN (GUI) 1994 Monitoring Fastlane+ 1994 lxxxiv Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x Contents Verifying Fastlane+ 1995 CHAPTER 183 Workgroup Bridges 1997 Cisco Workgroup Bridges 1997 Configuring Workgroup Bridge on a WLAN 2000 Verifying the Status of a Workgroup Bridge on the Controller 2002 Configuring Access Points as Workgroup Bridge 2002 Turning Cisco Aironet 2700/3700/1572 Series AP into Autonomous Mode 2002 Configuring Cisco Wave 2 APs or 11AX APs in Workgroup Bridge or CAPWAP AP Mode (CLI) 2003 Configure an SSID Profile for Cisco Wave 2 and 11AX APs (CLI) 2003 Configuring the Authentication Server (CLI) 2005 Configuring a Dot1X Credential (CLI) 2005 Configuring an EAP Profile (CLI) 2006 Configuring Manual-Enrollment of a Trustpoint for Workgroup Bridge (CLI) 2007 Configuring Auto-Enrollment of a Trustpoint for Workgroup Bridge (CLI) 2008 Configuring Manual Certificate Enrolment Using TFTP Server (CLI) 2010 Importing the PKCS12 Format Certificates from the TFTP Server (CLI) 2011 Configuring Radio Interface for Workgroup Bridges (CLI) 2012 Configuring Workgroup Bridge Timeouts (CLI) 2015 Configuring Bridge Forwarding for Workgroup Bridge (CLI) 2016 Information About Simplifying WGB Configuration 2017 Configuring Multiple WGBs (CLI) 2018 Verifying WGB Configuration 2018 CHAPTER 184 Peer-to-Peer Client Support 2021 Information About Peer-to-Peer Client Support 2021 Configure Peer-to-Peer Client Support 2021 CHAPTER 185 Deny Wireless Client Session Establishment Using Calendar Profiles 2023 Information About Denial of Wireless Client Session Establishment 2023 Configuring Daily Calendar Profile 2024 Configuring Weekly Calendar Profile 2025 Configuring Monthly Calendar Profile 2026 Mapping a Daily Calendar Profile to a Policy Profile 2027 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x lxxxv Contents Mapping a Weekly Calendar Profile to a Policy Profile 2028 Mapping a Monthly Calendar Profile to a Policy Profile 2029 Verifying Calendar Profile Configuration 2030 Verifying Policy Profile Configuration 2031 CHAPTER 186 Ethernet over GRE 2033 Introduction to EoGRE 2033 EoGRE Configuration Overview 2034 Create a Tunnel Gateway 2035 Configuring the Tunnel Gateway (GUI) 2036 Configuring a Tunnel Domain 2036 Configuring Tunnel Domain (GUI) 2037 Configuring EoGRE Global Parameters 2038 Configuring EoGRE Global Parameters (GUI) 2038 Configuring a Tunnel Profile 2039 Configuring the Tunnel Profile (GUI) 2040 Associating WLAN to a Wireless Policy Profile 2041 Attaching a Policy Tag and a Site Tag to an AP 2042 Verifying the EoGRE Tunnel Configuration 2042 CHAPTER 187 Wireless Guest Access 2051 Wireless Guest Access 2051 Foreign Map Overview 2054 Wireless Guest Access: Use Cases 2054 Load Balancing Among Multiple Guest Controllers 2055 Guidelines and Limitations for Wireless Guest Access 2055 Troubleshooting IPv6 2055 Configure Mobility Tunnel for Guest Access (GUI) 2056 Configure Mobility Tunnel for Guest Access (CLI) 2056 Configuring Guest Access Policy (GUI) 2056 Configuring Guest Access Policy (CLI) 2057 Viewing Guest Access Debug Information (CLI) 2059 Configure Guest Access Using Different Security Methods 2059 Open Authentication 2059 lxxxvi Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x Contents Configure a WLAN Profile for Guest Access with Open Authentication (GUI) 2059 Configure a WLAN Profile For Guest Access with Open Authentication (CLI) 2060 Configuring a Policy Profile 2061 Local Web Authentication 2061 Configure a Parameter Map (GUI) 2062 Configure a Parameter Map (CLI) 2062 Configure a WLAN Profile for Guest Access with Local Web Authentication (GUI) 2063 Configure a WLAN Profile for Guest Access with Local Web Authentication (CLI) 2063 Configure an AAA Server for Local Web Authentication (GUI) 2064 Configure an AAA Server for Local Web Authentication (CLI) 2064 Global Configuration 2064 Central Web Authentication 2065 Configure a WLAN Profile for Guest Access with Central Web Authentication (GUI) 2065 Configure a WLAN Profile for Guest Access with Central Web Authentication (CLI) 2066 AAA Server Configuration (GUI) 2067 AAA Server Configuration (CLI) 2067 Configuring 802.1x with Local Web Authentication 2068 Configuring Local Web Authentication with PSK Protocol 2069 Central Web Authentication with PSK Protocol 2070 Configure WLAN Profile for Central Web Authentication with PSK Protocol 2071 Central Web Authentication with iPSK Protocol 2071 Configure WLAN Profile for Central Web Authentication with iPSK Protocol 2072 Configure Web Authentication on MAC Address Bypass failure (GUI) 2072 Configure Web Authentication on MAC Address Bypass Failure (CLI) 2072 Configure WLAN for Web Authentication on MAC Authentication Bypass Failure with Pre-Shared Key (CLI) 2074 Configure WLAN for Web Authentication on MAC Authentication Bypass Failure with OWE (CLI) 2076 Configure WLAN for Web Authentication on MAC Authentication Bypass Failure with Secure Agile Exchange (CLI) 2077 Configuring WLAN for Web Authentication on MAC Authentication Failure with Dot1x (CLI) 2079 CHAPTER 188 Wired Guest Access 2081 Information About Wired Guest Access 2081 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x lxxxvii Contents Restrictions for Wired Guest Access 2084 Configuring Access Switch for Wired Guest Client 2084 Configuring Access Switch for Foreign Controller 2085 Configuring Foreign Controller with Open Authentication (GUI) 2086 Configuring Foreign Controller with Open Authentication 2086 Configuring Foreign Controller with Local Web Authentication (GUI) 2088 Configuring Foreign Controller with Local WEB Authentication 2089 Configuring Anchor Controller with Open Authentication (GUI) 2090 Configuring Anchor Controller with Open Authentication 2091 Configuring Anchor Controller with Local Web Authentication (GUI) 2092 Configuring Anchor Controller with Local Web Authentication 2093 Configuring Session Timeout for a Profile Policy 2094 Global Configuration (GUI) 2095 Verifying Wired Guest Configurations 2095 Wired Guest Access--Use Cases 2099 CHAPTER 189 Express Wi-Fi by Facebook 2101 Information About Express Wi-Fi by Facebook 2101 Restrictions for Express Wi-Fi by Facebook 2102 Enabling Express Wi-Fi by Facebook NAC for Policy Profile (GUI) 2102 Enabling Accounting RADIUS Server for Flex Profile (GUI) 2103 Configuring Captive Portal for Express Wi-Fi by Facebook (GUI) 2103 Configuring Captive Portal for Express Wi-Fi by Facebook (CLI) 2103 Configuring Express Wi-Fi by Facebook Policy on Controller (CLI) 2104 Configuring RADIUS Server for Accounting and Authentication in FlexConnect Profile (CLI) 2106 Verifying Express Wi-Fi by Facebook Configurations on Controller 2107 Verifying Express Wi-Fi by Facebook Configurations on the AP 2107 CHAPTER 190 User Defined Network 2111 Information About User Defined Network 2111 Restrictions for User Defined Network 2113 Configuring a User Defined Network 2113 Configuring a User Defined Network (GUI) 2114 Verifying User Defined Network Configuration 2115 lxxxviii Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x Contents CHAPTER 191 Hotspot 2.0 2119 Introduction to Hotspot 2.0 2119 Open Roaming 2121 Configuring Hotspot 2.0 2123 Configuring an Access Network Query Protocol Server 2123 Configuring ANQP Global Server Settings (GUI) 2126 Configuring Open Roaming (CLI) 2126 Configuring Open Roaming (GUI) 2127 Configuring NAI Realms (GUI) 2127 Configuring Organizational Identifier Alias (GUI) 2128 Configuring WAN Metrics (GUI) 2129 Configuring WAN Metrics 2129 Configuring Beacon Parameters (GUI) 2130 Configuring Authentication and Venue (GUI) 2131 Configuring 3GPP/Operator (GUI) 2132 Configuring OSU Provider (GUI) 2132 Configuring an Online Sign-Up Provider 2133 Configuring Hotspot 2.0 WLAN 2134 Configuring an Online Subscription with Encryption WLAN 2135 Attaching an ANQP Server to a Policy Profile 2136 Configuring Interworking for Hotspot 2.0 2136 Configuring the Generic Advertisement Service Rate Limit 2137 Configuring Global Settings 2138 Configuring Advice of Charge 2138 Configuring Terms and Conditions 2139 Defining ACL and URL Filter in AP for FlexConnect 2140 Configuring an OSEN WLAN (Single SSID) 2142 Verifying Hotspot 2.0 Configuration 2143 Verifying Client Details 2144 CHAPTER 192 Client Roaming Across Policy Profile 2145 Information about Client Roaming Policy Profile 2145 Configuring Client Roaming Across Policy Profile 2146 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x lxxxix Contents Verifying Client Roaming Across Policy Profiles 2147 CHAPTER 193 Assisted Roaming 2153 802.11k Neighbor List and Assisted Roaming 2153 Restrictions for Assisted Roaming 2154 How to Configure Assisted Roaming 2154 Configuring Assisted Roaming (GUI) 2154 Configuring Assisted Roaming (CLI) 2155 Verifying Assisted Roaming 2156 Configuration Examples for Assisted Roaming 2156 CHAPTER 194 802.11r BSS Fast Transition 2159 Feature History for 802.11r Fast Transition 2159 Information About 802.11r Fast Transition 2160 Information About 802.11r Fast Transition for SAE (FT-SAE) Authenticated Clients 2161 Restrictions for 802.11r Fast Transition 2162 Monitoring 802.11r Fast Transition (CLI) 2163 Configuring 802.11r BSS Fast Transition on a Dot1x Security Enabled WLAN (CLI) 2164 Configuring 802.11r Fast Transition in an Open WLAN (CLI) 2165 Configuring 802.11r Fast Transition on a PSK SecurityEnabled WLAN (CLI) 2167 Configuring 802.11r Fast Transition on a SAE Security-Enabled WLAN (GUI) 2168 Configuring 802.11r Fast Transition on an SAE Security-Enabled WLAN (CLI) 2168 Disabling 802.11r Fast Transition (GUI) 2170 Disabling 802.11r Fast Transition (CLI) 2170 Verifying 802.11r Fast Transition SAE 2170 CHAPTER 195 802.11v 2175 Information About 802.11v 2175 Enabling 802.11v Network Assisted Power Savings 2175 Prerequisites for Configuring 802.11v 2176 Restrictions for 802.11v 2176 Enabling 802.11v BSS Transition Management 2176 Configuring 802.11v BSS Transition Management (GUI) 2177 Configuring 802.11v BSS Transition Management (CLI) 2177 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xc Contents CHAPTER 196 Virtual Routing and Forwarding 2179 Information About VRF Support 2179 Guidelines and Restrictions for VRF Support 2180 Create a VRF Instance 2180 Map VRF to SVI 2181 Adding VRF Name Through Option 82 for DHCP Relay 2182 Adding VRF Name to DHCP Server for DHCP Relay 2182 Verify VRF Support 2183 PART XVIII CHAPTER 197 Cisco DNA Service for Bonjour 2187 Cisco DNA Service for Bonjour Solution Overview 2189 About the Cisco DNA Service for Bonjour Solution 2189 Solution Components 2190 Supported Platforms 2191 Supported Network Design 2192 Traditional Wired and Wireless Networks 2192 Wired Networks 2193 Wireless Networks 2195 Cisco SD-Access Wired and Wireless Networks 2196 BGP EVPN Networks 2198 CHAPTER 198 Configuring Local and Wide Area Bonjour Domains 2201 Cisco DNA Service for Bonjour Solution Overview 2201 Restrictions 2201 Cisco Wide Area Bonjour Service Workflow 2202 Cisco Wide Area Bonjour Supported Network Design 2203 Traditional Wired and Wireless Networks 2203 Cisco SD Access Wired and Wireless Networks 2204 Local and Wide Area Bonjour Policies 2204 Default mDNS Service Configurations 2211 HSRP-Aware mDNS Service-Routing 2211 mDNS Service-Gateway SSO Support 2212 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xci Contents Configuring Local and Wide Area Bonjour Domains 2213 How to configure Multicast DNS Mode for LAN and Wired Networks 2213 Enabling mDNS Gateway on the Device 2213 Creating Custom Service Definition (GUI) 2214 Creating Custom Service Definition 2215 Creating Service List (GUI) 2215 Creating Service List 2216 Creating Service Policy (GUI) 2217 Creating Service Policy 2217 Associating Service Policy to an Interface 2218 How to Configure Local Area Bonjour in Multicast DNS Mode for Wireless Networks 2220 Enabling mDNS Gateway on the Device 2221 Creating Custom Service Definition 2223 Creating Service List 2224 Creating Service Policy 2225 Associating Service Policy with Wireless Profile Policy 2226 Configuring Wide Area Bonjour Domain 2227 Enabling mDNS Gateway on the Device 2227 Creating Custom Service Definition 2228 Creating Service List 2229 Creating Service Policy 2230 Associating Service Policy with the Controller in Wide Area Bonjour Domain 2231 Configuring Hot Standby Router Protocol-aware (HSRP-aware) mDNS Service-Routing on SDG 2233 Configuring Hot Standby Router Protocol-aware (HSRP-aware) mDNS Service-Routing on Service-Peer (CLI) 2233 Verifying Local Area Bonjour in Multicast DNS Mode for LAN and Wireless Networks 2234 Verifying SDG-Agent Status 2234 Verifying Wide Area Bonjour Controller Status 2235 Verifying mDNS Cache Configurations 2236 Verifying Additional mDNS Cache Configurations 2238 Verifying Local Area Bonjour Configuration for LAN and Wireless Networks 2238 Additional References for DNA Service for Bonjour 2239 Feature History for Cisco DNA Service for Bonjour 2239 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xcii Contents CHAPTER 199 Configuring Local Area Bonjour for Wireless Local Mode 2243 Overview of Local Area Bonjour for Wireless Local Mode 2243 Prerequisites for Local Area Bonjour for Wireless Local Mode 2243 Restrictions for Local Area Bonjour for Wireless Local Mode 2244 Understanding Local Area Bonjour for Wireless Local Mode 2244 Configuring Wireless AP Multicast 2245 Configuring Wireless AP Multicast (GUI) 2246 Configuring Wireless AP Multicast (CLI) 2246 Configuring Multicast in IP Network (CLI) 2247 Configuring Local Area Bonjour for Wireless Local Mode 2248 Configuring mDNS Service Policy (GUI) 2248 Configuring mDNS Service Policy (CLI) 2249 Configuring Custom Service Definition (GUI) 2251 Configuring Custom Service Definition (CLI) 2252 Configuring mDNS Gateway on WLAN (GUI) 2252 Configuring mDNS Gateway on WLAN (CLI) 2253 Configuring Service-Routing on Service-Peer 2253 Configuring Location-Based mDNS on Service-Peer (GUI) 2255 Configuring Location-Based mDNS on Service-Peer (CLI) 2257 Verifying mDNS Gateway Configuration 2259 Reference 2261 CHAPTER 200 Configuring Local Area Bonjour for Wireless FlexConnect Mode 2263 Overview of Local Area Bonjour for Wireless FlexConnect Mode 2263 Restrictions for Local Area Bonjour for Wireless FlexConnect Mode 2263 Prerequisites for Local Area Bonjour for Wireless FlexConnect Mode 2264 Understanding mDNS Gateway Alternatives for Wireless FlexConnect Mode 2264 Understanding Local Area Bonjour for Wireless FlexConnect Mode 2266 Configuring Local Area Bonjour for Wireless FlexConnect Mode 2268 Configuring mDNS Gateway Mode (CLI) 2268 Configuring mDNS Service Policy (CLI) 2269 Configuring mDNS Location-Filter (CLI) 2273 Configuring Custom Service Definition (CLI) 2276 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xciii Contents Configuring Service-Routing on Service-Peer (CLI) 2277 Configuring Location-Based mDNS 2279 Configuring Service-Routing on SDG Agent (CLI) 2279 Verifying Local Area Bonjour in Service-Peer Mode 2281 Verifying Local Area Bonjour in SDG Agent Mode 2283 Reference 2285 CHAPTER 201 Configuration Example for Local Mode - Wireless and Wired 2287 Overview 2287 Configuring Wireless AP Multicast Mode 2288 Configuration Example for Default Service List and Policy in Wide Area Bonjour Between Multilayer Wired and Wireless Endpoints 2289 Example: Wired and Wireless Access Layer Service Peer Configuration 2289 Example: Wired and Wireless Distribution Layer SDG Agent Configuration 2290 Configuration Example for Customized Service List and Policy in Wide Area Bonjour Between Multilayer Wired and Wireless Endpoints 2291 Example: Wired and Wireless Access Layer Service Peer Configuration 2291 Example: Wired and Wireless Distribution Layer SDG Agent Configuration 2293 Cisco DNA Center Traditional Multilayer Wired and Wireless Configuration 2294 Configuring Service Filters for Traditional Multilayer Wired and Wireless - Local Mode (GUI) 2294 Configuring Source SDG Agents in Traditional Multilayer Wired and Wireless - Local Mode (GUI) 2295 Configuring Query SDG Agents in Traditional Multilayer Wired and Wireless - Local Mode (GUI) 2295 Verifying Wide Area Bonjour Between Multilayer Wired and Wireless Local Mode 2296 Verifying Wired Service-Peer Configuration 2296 Verifying Wired SDG Agent Configuration and Service-Routing Status 2298 Verifying Wireless Service-Peer Configuration and Service Status 2300 Verifying Wireless SDG Agent Configuration and Service-Routing Status 2301 Verifying Cisco DNA-Center Configuration and Service-Routing Status 2302 Reference 2303 CHAPTER 202 Configuration Example for FlexConnect Mode - Wireless and Wired 2305 Overview 2305 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xciv Contents Configuration Example for Default Service List and Policy in FlexConnect Mode - Wireless and Wired 2306 Example: Wired and Wireless Access Layer Service Peer Configuration 2306 Example: Wired and Wireless Distribution Layer SDG Agent Configuration 2308 Configuration Example for Customized Service List and Policy in FlexConnect Mode - Wireless and Wired 2309 Example: Wired and Wireless Access Layer Service Peer Configuration 2309 Example: Wired and Wireless Distribution Layer SDG Agent Configuration 2310 Cisco DNA Center Traditional Multilayer Wired and Wireless Configuration 2311 Configuring Service Filters for Traditional Multilayer Wired and Wireless FlexConnect LocalSwitching Mode (GUI) 2311 Configuring Source SDG Agents in Traditional Multilayer Wired and Wireless FlexConnect LocalSwitching Mode (GUI) 2312 Configuring Query SDG Agents in Traditional Multilayer Wired and Wireless FlexConnect LocalSwitching Mode (GUI) 2313 Verifying Configuration Example for FlexConnect Mode - Wireless and Wired 2313 Verifying Wired Service-Peer Configuration 2313 Verifying Wired SDG Agent Configuration and Service-Routing Status 2315 Verifying Cisco DNA Center Configuration and Service Routing Status 2317 Reference 2317 PART XIX CHAPTER 203 Multicast Domain Name System 2319 Multicast Domain Name System 2321 Introduction to mDNS Gateway 2322 Guidelines and Restrictions for Configuring mDNS AP 2322 Enabling mDNS Gateway (GUI) 2324 Enabling or Disabling mDNS Gateway (GUI) 2324 Enabling or Disabling mDNS Gateway (CLI) 2325 Creating Default Service Policy 2326 Creating Custom Service Definition (GUI) 2327 Creating Custom Service Definition 2327 Creating Service List (GUI) 2328 Creating Service List 2329 Creating Service Policy (GUI) 2330 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xcv Contents Creating Service Policy 2331 Configuring a Local or Native Profile for an mDNS Policy 2333 Configuring an mDNS Flex Profile (GUI) 2333 Configuring an mDNS Flex Profile (CLI) 2334 Applying an mDNS Flex Profile to a Wireless Flex Connect Profile (GUI) 2334 Applying an mDNS Flex Profile to a Wireless Flex Connect Profile (CLI) 2335 Enabling the mDNS Gateway on the VLAN Interface 2335 Location-Based Service Filtering 2336 Prerequisite for Location-Based Service Filtering 2336 Configuring mDNS Location-Based Filtering Using SSID 2336 Configuring mDNS Location-Based Filtering Using AP Name 2337 Configuring mDNS Location-Based Filtering Using AP Location 2338 Configuring mDNS Location-Based Filtering Using Regular Expression 2338 Configuring mDNS Location-Based Filtering Using Location Group 2339 Feature History for mDNS Location-Based Filtering Using Location Group (Microlocation) 2339 Information About mDNS Location-Based Filtering Using Location Group (Microlocation) 2339 Use Cases for mDNS Location-Based Filtering Using Location Group (Microlocation) 2340 Prerequisites for mDNS Location-Based Filtering Using Location Group (Microlocation) 2340 Enabling Location Group (CLI) 2340 Adding APs to a Location Group (CLI) 2341 Verifying AP Location 2343 Nearest mDNS-Based Wired Service Filtering 2343 Feature History for Nearest mDNS-Based Wired Service Filtering 2343 Information About Nearest mDNS-Based Wired Service Filtering 2344 Information About Custom Wired Service Policy Support for FlexConnect Mode 2346 Information About VLAN and MAC Based Wired Service Filtering 2346 Prerequisite for Nearest mDNS-Based Wired Service Filtering 2347 Use Cases 2347 Configuring Wired Service Policy Support in Flex Profile 2347 Creating Service List (CLI) 2347 Creating Service Policy (CLI) 2349 Configuring an mDNS Flex Profile (GUI) 2349 Configuring an mDNS Flex Profile (CLI) 2350 Configuring VLAN and MAC Based Wired Service Filtering (CLI) 2351 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xcvi Verifying mDNS-Based Wired Service Filtering 2353 Configuring mDNS AP 2354 Enabling mDNS Gateway on the RLAN Interface 2355 Enabling mDNS Gateway on Guest LAN Interface 2358 Associating mDNS Service Policy with Wireless Profile Policy (GUI) 2359 Associating mDNS Service Policy with Wireless Profile Policy 2359 Enabling or Disabling mDNS Gateway for WLAN (GUI) 2362 Enabling or Disabling mDNS Gateway for WLAN 2363 mDNS Gateway with Guest Anchor Support and mDNS Bridging 2364 Configuring mDNS Gateway on Guest Anchor 2364 Configuring mDNS Gateway on Guest Foreign (Guest LAN) 2365 Configuring mDNS Gateway on Guest Anchor 2365 Configuring mDNS Gateway on Guest Foreign (Guest WLAN) 2366 Verifying mDNS Gateway Configurations 2366 Contents Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xcvii Contents xcviii Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x Preface This preface describes the conventions of this document and information on how to obtain other documentation. It also provides information on what's new in Cisco product documentation. · Document Conventions , on page xcix · Related Documentation, on page ci · Communications, Services, and Additional Information, on page ci Document Conventions This document uses the following conventions: Convention ^ or Ctrl Description Both the ^ symbol and Ctrl represent the Control (Ctrl) key on a keyboard. For example, the key combination ^D or Ctrl-D means that you hold down the Control key while you press the D key. (Keys are indicated in capital letters but are not case sensitive.) bold font Commands and keywords and user-entered text appear in bold font. Italic font Document titles, new or emphasized terms, and arguments for which you supply values are in italic font. Courier font Bold Courier font [x] ... | Terminal sessions and information the system displays appear in courier font. Bold Courier font indicates text that the user must enter. Elements in square brackets are optional. An ellipsis (three consecutive nonbolded periods without spaces) after a syntax element indicates that the element can be repeated. A vertical line, called a pipe, indicates a choice within a set of keywords or arguments. [x | y] Optional alternative keywords are grouped in brackets and separated by vertical bars. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x xcix Preface Preface Convention {x | y} [x {y | z}] string <> [] !, # Description Required alternative keywords are grouped in braces and separated by vertical bars. Nested set of square brackets or braces indicate optional or required choices within optional or required elements. Braces and a vertical bar within square brackets indicate a required choice within an optional element. A nonquoted set of characters. Do not use quotation marks around the string or the string will include the quotation marks. Nonprinting characters such as passwords are in angle brackets. Default responses to system prompts are in square brackets. An exclamation point (!) or a pound sign (#) at the beginning of a line of code indicates a comment line. Reader Alert Conventions This document may use the following conventions for reader alerts: Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the manual. Tip Means the following information will help you solve a problem. Caution Means reader be careful. In this situation, you might do something that could result in equipment damage or loss of data. Timesaver Means the described action saves time. You can save time by performing the action described in the paragraph. Warning IMPORTANT SAFETY INSTRUCTIONS Before you work on any equipment, be aware of the hazards involved with electrical circuitry and be familiar with standard practices for preventing accidents. Read the installation instructions before using, installing, or connecting the system to the power source. Use the statement number provided at the end of each warning statement to locate its translation in the translated safety warnings for this device. Statement 1071 SAVE THESE INSTRUCTIONS Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x c Preface Related Documentation Related Documentation Note Before installing or upgrading the device, refer to the release notes at https://www.cisco.com/c/en/us/support/ wireless/catalyst-9800-series-wireless-controllers/products-release-notes-list.html. · Cisco Catalyst 9800-40 Wireless Controller documentation, located at: http://www.cisco.com/go/c9800 · Cisco Catalyst 9800-80 Wireless Controller documentation, located at: http://www.cisco.com/go/c9800 · Cisco Catalyst 9800-L Wireless Controller documentation, located at: http://www.cisco.com/go/c9800 Communications, Services, and Additional Information · To receive timely, relevant information from Cisco, sign up at Cisco Profile Manager. · To get the business impact you're looking for with the technologies that matter, visit Cisco Services. · To submit a service request, visit Cisco Support. · To discover and browse secure, validated enterprise-class apps, products, solutions, and services, visit Cisco DevNet. · To obtain general networking, training, and certification titles, visit Cisco Press. · To find warranty information for a specific product or product family, access Cisco Warranty Finder. Cisco Bug Search Tool Cisco Bug Search Tool (BST) is a gateway to the Cisco bug-tracking system, which maintains a comprehensive list of defects and vulnerabilities in Cisco products and software. The BST provides you with detailed defect information about your products and software. Documentation Feedback To provide feedback about Cisco technical documentation, use the feedback form available in the right pane of every online document. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x ci Documentation Feedback Preface Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x cii 1 C H A P T E R Overview of the Controller · Overview of Cisco 9800 Series Wireless Controllers , on page 1 · Elements of the New Configuration Model, on page 1 · Configuration Workflow, on page 2 · Initial Setup, on page 3 · Interactive Help, on page 4 Overview of Cisco 9800 Series Wireless Controllers Cisco Catalyst 9800 Series Wireless Controllers are the next generation of wireless controllers built for the Intent-based networking. The Cisco Catalyst 9800 Series Controllers controllers are IOS XE based and integrates the RF Excellence from Aironet with Intent-based Networking capabilities of IOS XE to create the best-in-class wireless experience for your evolving and growing organization. The controllers are deployable in physical and virtual (private and public cloud) form factors and can be managed using Cisco DNA Center, Netconf/YANG, Cisco Prime Infrastructure, web-based GUI, or CLI. The Cisco Catalyst 9800 Series Wireless Controllers are available in multiple form factors to cater to your deployment options: · Cisco Catalyst 9800 Series Wireless Controller Appliance · Cisco Catalyst 9800 Series Wireless Controller for Cloud · Cisco Catalyst 9800 Embedded Wireless for Switch The configuration data model is based on design principles of reusability, simplified provisioning, enhanced flexibility and modularization to help manage networks as they scale up and simplify the management of dynamically changing business and IT requirements. Elements of the New Configuration Model The following diagram depicts the elements of the new configuration model. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1 Configuration Workflow Overview of the Controller Tags The property of a tag is defined by the property of the policies associated to it, which in turn is inherited by an associated client or an AP. There are various type of tags, each of which is associated to different profiles. Every tag has a default that is created when the system boots up. Profiles Profiles represent a set of attributes that are applied to the clients associated to the APs or the APs themselves. Profiles are reusable entities that can be used across tags. Configuration Workflow The following set of steps defines the logical order of configuration. Apart from the WLAN profile, all the profiles and tags have a default object associated with it. 1. Create the following profiles: · WLAN · Policy · AP Join · Flex · RF 2. Create the following tags: · Policy · Site Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2 Overview of the Controller · RF 3. Associate tags to an AP. Figure 1: Configuration Workflow Initial Setup Initial Setup Setting up the Controller The initial configuration wizard in Cisco Catalyst 9800 Series Wireless Controller is a simplified, out-of-the-box installation and configuration interface for controller. This section provides instructions to set up a controller Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 3 Interactive Help Overview of the Controller to operate in a small, medium, or large network wireless environment, where access points can join and together as a simple solution provide various services, such as corporate employee or guest wireless access on the network. Setting Up the Controller Using GUI To set up the controller using GUI, see the Configuring Wireless Controller section in Cisco Catalyst 9800 Wireless Controller Series Web UI Deployment Guide. Note If you make configuration changes in the Command Line Interface (CLI) and in the GUI simultaneously, you must click the Refresh button in the GUI to synch both the changes. You should always click the Refresh button in the GUI, to update the changes done through CLI. Note The banner text is fetched from the controller when you land on the login page. You will be able to see this request on the RADIUS server. Setting Up the Controller Using CLI To set up the controller using CLI, see the Performing the Initial Configuration on the Controller section of your respective controller installation guides. · Cisco Catalyst 9800-80 Wireless Controller Hardware Installation Guide · Cisco Catalyst 9800-40 Wireless Controller Hardware Installation Guide · Cisco Catalyst 9800-L Wireless Controller Hardware Installation Guide · Cisco Catalyst 9800-CL Cloud Wireless Controller Installation Guide Interactive Help The Cisco Catalyst 9800 Series Wireless Controller GUI features an interactive help that walks you through the GUI and guides you through complex configurations. You can start the interactive help in the following ways: · By hovering your cursor over the blue flap at the right-hand corner of a window in the GUI and clicking Interactive Help. · By clicking Walk-me Thru in the left pane of a window in the GUI. · By clicking Show me How displayed in the GUI. Clicking Show me How triggers a specific interactive help that is relevant to the context you are in. For instance, Show me How in Configure > AAA walks you through the various steps for configuring a RADIUS server. Choose Configuration> Wireless Setup > Advanced and click Show me How to trigger the interactive help that walks you through the steps relating to various kinds of authentication. The following features have an associated interactive help: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 4 Overview of the Controller Interactive Help · Configuring AAA · Configuring FlexConnect Authentication · Configuring 802.1x Authentication · Configuring Local Web Authentication · Configuring OpenRoaming · Configuring Mesh APs Note If the WalkMe launcher is unavailable on Safari, modify the settings as follows: 1. Choose Preferences > Privacy. 2. In the Website tracking section, uncheck the Prevent cross-site tracking check box to disable this action. 3. In the Cookies and website data section, uncheck the Block all cookies check box to disable this action. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 5 Interactive Help Overview of the Controller Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 6 I P A R T System Configuration · New Configuration Model, on page 9 · Wireless Management Interface, on page 47 · BIOS Protection, on page 57 · Smart Licensing Using Policy, on page 59 · Management over Wireless, on page 181 · Boot Integrity Visibility, on page 183 · SUDI99 Certificate Support, on page 187 · Link Aggregation Group, on page 191 · Reload Reason History, on page 201 · Best Practices, on page 207 2 C H A P T E R New Configuration Model · Information About New Configuration Model, on page 9 · Configuring a Wireless Profile Policy (GUI), on page 12 · Configuring a Wireless Profile Policy (CLI), on page 12 · Configuring a Flex Profile (GUI), on page 14 · Configuring a Flex Profile, on page 14 · Configuring an AP Profile (GUI), on page 15 · Configuring an AP Profile (CLI), on page 20 · Configuring User for AP Management (CLI), on page 21 · Setting a Private Configuration Key for Password Encryption, on page 21 · Configuring an RF Profile (GUI), on page 22 · Configuring an RF Profile (CLI), on page 22 · Configuring a Site Tag (GUI), on page 24 · Configuring a Site Tag (CLI), on page 24 · Enhanced Site Tag-Based Load Balancing, on page 25 · Configuring Policy Tag (GUI), on page 28 · Configuring a Policy Tag (CLI), on page 28 · Configuring Wireless RF Tag (GUI), on page 29 · Configuring Wireless RF Tag (CLI), on page 30 · Attaching a Policy Tag and Site Tag to an AP (GUI), on page 31 · Attaching Policy Tag and Site Tag to an AP (CLI), on page 31 · Configuring a Radio Profile, on page 32 · AP Filter, on page 36 · Configuring Access Point for Location Configuration, on page 41 Information About New Configuration Model The configuration of Cisco Catalyst 9800 Series Wireless Controllers is simplified using different tags, namely rf-tag, policy-tag, and site-tag. The access points would derive their configuration from the profiles that are contained within the tags. Profiles are a collection of feature-specific attributes and parameters applied to tags. The rf-tag contains the radio profiles, the site-tag contains flex-profile and ap-join-profile, and the policy-tag contains the WLAN profile and policy profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 9 Information About New Configuration Model System Configuration The FlexConnect configuration helps the central controller to manage sites that are geo-distributed, for example, retail, campus, and so on. Policy Tag The policy tag constitutes mapping of the WLAN profile to the policy profile. The WLAN profile defines the wireless characteristics of the WLAN. The policy profile defines the network policies and the switching policies for the client (Quality of Service [QoS] is an exception which constitutes AP policies as well). The policy tag contains the map of WLAN policy profile. There are 16 such entries per policy tag. Changes to the map entries are effected based on the status of the WLAN profile and policy profile. For example, if a map (WLAN1 and Policy1) is added to the policy tag, and both the WLAN profile and the policy profile are enabled, the definitions are pushed to the APs using the policy tag. However, if one of them is in disabled state, the definition is not pushed to the AP. Similarly, if a WLAN profile is already being broadcast by an AP, it can be deleted using the no form of the command in the policy tag. Site Tag The site tag defines the properties of a site and contains the flex profile and the AP join profile. The attributes that are specific to the corresponding flex or remote site are part of the flex profile. Apart from the flex profile, the site tag also comprises attributes that are specific to the physical site (and hence cannot be a part of the profile that is a reusable entity). For example, the list of primary APs for efficient upgrade is a part of a site tag rather than that of a flex profile. If a flex profile name or an AP profile name is changed in the site tag, the AP is forced to rejoin the controller by disconnecting the Datagram Transport Layer Security (DTLS) session. When a site tag is created, the AP and flex profiles are set to default values (default-ap-profile and default-flex-profile). RF Tag The RF tag contains the 2.4 GHz, 5 GHz, and 6 GHz RF profiles. The default RF tag contains the global configuration for 2.4 and 5 GHz bands and default RF profile for 6 GHz band. All these profiles contain the same default values for global or RF profile parameters for the respective radios. Profiles Profiles are a collection of feature-specific attributes and parameters applied to tags. Profiles are reusable entities that can be used across tags. Profiles (used by tags) define the properties of the APs or its associated clients. WLAN Profile WLAN profiles are configured with same or different service set identifiers (SSIDs). An SSID identifies the specific wireless network for the controller to access. Creating WLANs with the same SSID allows to assign different Layer 2 security policies within the same wireless LAN. To distinguish WLANs having the same SSID, create a unique profile name for each WLAN. WLANs with the same SSID must have unique Layer 2 security policies so that clients can select a WLAN based on the information advertised in the beacon and probe responses. The switching and network policies are not part of the WLAN definition. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 10 System Configuration Information About New Configuration Model Policy Profile Policy profile broadly consists of network and switching policies. Policy profile is a reusable entity across tags. Anything that is a policy for a client that is applied on an AP or controller is moved to the policy profile, for example, VLAN, ACL, QoS, session timeout, idle timeout, AVC profile, bonjour profile, local profiling, device classification, BSSID QoS, and so on. However, all the wireless-related security attributes and features on the WLAN are grouped under the WLAN profile. Flex Profile Flex profile contains policy attributes and remote site-specific parameters. For example, the EAP profiles that can be used when the AP acts as an authentication server for local RADIUS server information, VLAN-ACL mapping, VLAN name-to-ID mapping, and so on. AP Join Profile The default AP join profile values will have the global AP parameters and the AP group parameters. The AP join profile contains attributes that are specific to AP, such as CAPWAP, IPv4 and IPv6, UDP Lite, High Availability, Retransmit config parameters, Global AP failover, Hyperlocation config parameters, Telnet and SSH, 11u parameters, and so on. Note Telnet is not supported for the following Cisco AP models: 1542D, 1542I, 1562D, 1562E, 1562I, 1562PS, 1800S, 1800T, 1810T, 1810W,1815M, 1815STAR, 1815TSN, 1815T, 1815W, 1832I, 1840I, 1852E, 1852I, 2802E, 2802I, 2802H, 3700C, 3800, 3802E, 3802I, 3802P, 4800, IW6300, ESW6300, 9105AXI, 9105AXW, 9115AXI, 9115AXE, 9117I, APVIRTUAL, 9120AXI, 9120AXE, 9124AXI, 9124AXD, 9130AXI, 9130AXE, 9136AXI, 9162I, 9164I, and 9166I. RF Profile RF profile contains the common radio configuration for the APs. RF profiles are applied to all the APs that belong to an AP group, where all the APs in that group have the same profile settings. Some of the 6-GHz band specific 802.11ax features like Unsolicited Broadcast Probe Response, FILS Discovery, Multi-BSSID reduce the overhead of management traffic in 6-GHz band channels. Prefered Scanning Channels is another feature in 6-GHz band which helps RRM to choose PSC channels to 6-GHz radios. Association of APs APs can be associated using different ways. The default option is by using Ethernet MAC address, where the MAC is associated with policy-tag, site tag, and RF tag. In filter-based association, APs are mapped using regular expressions. A regular expression (regex) is a pattern to match against an input string. Any number of APs matching that regex will have policy-tag, site tag, and RF tag mapped to them, which is created as part of the AP filter. In AP-based association, tag names are configured at the PnP server and the AP stores them and sends the tag name as part of discovery process. In location-based association, tags are mapped as per location and are pushed to any AP Ethernet MAC address mapped to that location. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 11 Configuring a Wireless Profile Policy (GUI) System Configuration Modifying AP Tags Modifying an AP tag results in DTLS connection reset, forcing the AP to rejoin the controller. If only one tag is specified in the configuration, default tags are used for other types, for example, if only policy tag is specified, the default-site-tag and default-rf-tag will be used for site tag and RF tag. Configuring a Wireless Profile Policy (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Choose Configuration > Tags & Profiles > Policy. On the Policy Profile page, click Add. In the Add Policy Profile window, in General tab, enter a name and description for the policy profile. The name can be ASCII characters from 32 to 126, without leading and trailing spaces. Do not use spaces as it causes system instability. To enable the policy profile, set Status as Enabled. Use the slider to enable or disable Passive Client and Encrypted Traffic Analytics. In the CTS Policy section, choose the appropriate status for the following: · Inline Tagging--a transport mechanism using which a controller or access point understands the source SGT. · SGACL Enforcement Specify a default SGT. The valid range is from 2 to 65519. In the WLAN Switching Policy section, choose the following, as required: · Central Switching: Tunnels both the wireless user traffic and all control traffic via CAPWAP to the centralized controller where the user traffic is mapped to a dynamic interface/VLAN on the controller. This is the normal CAPWAP mode of operation. · Central Authentication: Tunnels client data to the controller, as the controller handles client authentication. · Central DHCP: The DHCP packets received from AP are centrally switched to the controller and then forwarded to the corresponding VLAN based on the AP and the SSID. · Central Association Enable: When central association is enabled, all switching is done on the controller. · Flex NAT/PAT: Enables Network Address Translation(NAT) and Port Address Translation (PAT) mode. Click Save & Apply to Device. Configuring a Wireless Profile Policy (CLI) Follow the procedure given below to configure a wireless profile policy: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 12 System Configuration Configuring a Wireless Profile Policy (CLI) Note When a client moves from an old controller to a new controller (managed by Cisco Prime Infrastructure), the old IP address of the client is retained, if the IP address is learned by ARP or data gleaning. To avoid this scenario, ensure that you enable ipv4 dhcp required command in the policy profile. Otherwise, the IP address gets refreshed only after a period of 24 hours. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-policy Example: Configures WLAN policy profile and enters wireless policy configuration mode. Device(config)# wireless profile policy rr-xyz-policy-1 Step 3 idle-timeout timeout Example: Device(config-wireless-policy)# idle-timeout 1000 (Optional) Configures the duration of idle timeout, in seconds. Step 4 vlan vlan-id Configures VLAN name or VLAN ID. Example: Device(config-wireless-policy)# vlan 24 Step 5 accounting-list list-name Example: Device(config-wireless-policy)# accounting-list user1-list Sets the accounting list for IEEE 802.1x. Step 6 no shutdown Example: Device(config-wireless-policy)# no shutdown Saves the configuration and exits configuration mode and returns to privileged EXEC mode. Step 7 show wireless profile policy summary Example: Device# show wireless profile policy summary Displays the configured policy profiles. Note (Optional) To view detailed information about a policy profile, use the show wireless profile policy detailed policy-profile-name command. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 13 Configuring a Flex Profile (GUI) System Configuration Configuring a Flex Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > Flex. Click Add. Enter the Name of the Flex Profile. The name can be ASCII characters from 32 to 126, without leading and trailing spaces. In the Description field, enter a description for the Flex Profile. Click Apply to Device. Configuring a Flex Profile Follow the procedure given below to set a flex profile: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile flex flex-profile Example: Device(config)# wireless profile flex rr-xyz-flex-profile Configures a Flex profile and enters Flex profile configuration mode. Step 3 description Example: Device(config-wireless-flex-profile)# description xyz-default-flex-profile (Optional) Enables default parameters for the flex profile. Step 4 arp-caching Example: Device(config-wireless-flex-profile)# arp-caching (Optional) Enables ARP caching. Step 5 end Example: Device(config-wireless-flex-profile)# end Saves the configuration and exits configuration mode and returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 14 System Configuration Configuring an AP Profile (GUI) Step 6 Command or Action show wireless profile flex summary Example: Device# show wireless profile flex summary Purpose (Optional) Displays the flex-profile parameters. Note To view detailed parameters about the flex profile, use the show wireless profile flex detailed flex-profile-name command. Configuring an AP Profile (GUI) Before you begin The default AP join profile values will have the global AP parameters and the AP group parameters. The AP join profile contains attributes that are specific to AP, such as CAPWAP, IPv4/IPv6, UDP Lite, High Availability, retransmit configuration parameters, global AP failover, Hyperlocation configuration parameters, Telnet/SSH, 11u parameters, and so on. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Configuration > Tags & Profiles > AP Join. On the AP Join Profile page, click Add. The Add AP Join Profile page is displayed. Note DHCP fallback is enabled by default. So, if an AP is assigned a static IP address and unable to reach the controller, the AP falls back to the DHCP. To stop an AP from moving the static IP to DHCP, you must disable the DHCP fallback configuration in an AP join profile. In the General tab, enter a name and description for the AP join profile. The name can be ASCII characters from 32 to 126, without leading and trailing spaces. Check the LED State check box to set the LED state of all APs connected to the device to blink so that the APs are easily located. The LED state is enabled by default. In the Client tab and Statistics Timer section, enter the time in seconds that the AP sends its 802.11 statistics to the controller. In the TCP MSS Configuration section, check the Adjust MSS Enable check box to enter value for Adjust MSS. You can enter or update the maximum segment size (MSS) for transient packets that traverse a router. TCP MSS adjustment enables the configuration of the maximum segment size (MSS) for transient packets that traverse a router, specifically TCP segments with the SYN bit set. In a CAPWAP environment, a lightweight access point discovers a device by using CAPWAP discovery mechanisms, and then sends a CAPWAP join request to the device. The device sends a CAPWAP join response to the access point that allows the access point to join the device. When the access point joins the device, the device manages its configuration, firmware, control transactions, and data transactions. In the CAPWAP tab, you can configure the following: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 15 Configuring an AP Profile (GUI) System Configuration · High Availability You can configure primary and secondary backup controllers for all access points (which are used if primary, secondary, or tertiary controllers are not responsive) in this order: primary, secondary, tertiary, primary backup, and secondary backup. In addition, you can configure various timers, including heartbeat timers and discovery request timers. To reduce the controller failure detection time, you can configure the fast heartbeat interval (between the controller and the access point) with a smaller timeout value. When the fast heartbeat timer expires (at every heartbeat interval), the access point determines if any data packets have been received from the controller within the last interval. If no packets have been received, the access point sends a fast echo request to the controller. a) In the High Availability tab, enter the time (in seconds) in the Fast Heartbeat Timeout field to configure the heartbeat timer for all access points. Specifying a small heartbeat interval reduces the amount of time it takes to detect device failure. Note Configure Fast Heartbeat Timeout to assist AP in sending primary discovery request periodically to the configured backup controllers along with the primary, secondary, and tertiary-base controllers. b) In the Heartbeat Timeout field, enter the time (in seconds) to configure the heartbeat timer for all access points. Specifying a small heartbeat interval reduces the amount of time it takes to detect device failure. c) In the Discovery Timeout field, enter a value between 1 and 10 seconds (inclusive) to configure the AP discovery request timer. d) In the Primary Discovery Timeout field, enter a value between 30 and 3000 seconds (inclusive) to configure the access point primary discovery request timer. e) In the Primed Join Timeout field, enter a value between 120 and 43200 seconds (inclusive) to configure the access point primed join timeout. f) In the Retransmit Timers Count field, enter the number of times that you want the AP to retransmit the request to the device and vice-versa. Valid range is between 3 and 8. g) In the Retransmit Timers Interval field, enter the time duration between retransmission of requests. Valid range is between 2 and 5. h) Check the Enable Fallback check box to enable fallback. i) Enter the Primary Controller name and IP address. j) Enter the Secondary Controller name and IP address. k) Click Save & Apply to Device. Note The primary and secondary settings in the AP join profile are not used for AP fallback. This means that the AP will not actively probe for those controllers (which are a part of the AP join profile), when it has joined one of them. This setting is used only when the AP loses its connection with the controller, and then prioritizes which other controller it should join. These controllers have a priority of 4 and 5, following APs in the High Availability tab of the AP page. The APs that are added as the primary, secondary, and tertiary APs in the High Availability tab of the AP configuration page, are actively probed and are used for the AP fallback option. · Advanced a) In the Advanced tab, check the Enable VLAN Tagging check box to enable VLAN tagging. b) Check the Enable Data Encryption check box to enable Datagram Transport Layer Security (DTLS) data encryption. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 16 System Configuration Configuring an AP Profile (GUI) Step 8 c) Check the Enable Jumbo MTU to enable big maximum transmission unit (MTU). MTU is the largest physical packet size, measured in bytes, that a network can transmit. Any messages larger than the MTU are divided into smaller packets before transmission. Jumbo frames are frames that are bigger than the standard Ethernet frame size, which is 1518 bytes (including Layer 2 (L2) header and FCS). The definition of frame size is vendor-dependent, as these are not part of the IEEE standard. d) Use the Link Latency drop-down list to select the link latency. Link latency monitors the round-trip time of the CAPWAP heartbeat packets (echo request and response) from the AP to the controller and back. e) From the Preferred Mode drop-down list, choose the mode. f) Click Save & Apply to Device. In the AP tab, you can configure the following: · General a) In the General tab, check the Switch Flag check box to enable switches. b) Check the Power Injector State check box if power injector is being used. Power Injector increases wireless LAN deployment flexibility of APs by providing an alternative powering option to local power, inline power-capable multiport switches, and multiport power patch panels. Power Injector Selection parameter enables you to protect your switch port from an accidental overload if the power injector is inadvertently bypassed. c) From the Power Injector Type drop-down list, choose power injector type from the following options: · Installed--This option examines and remembers the MAC address of the currently connected switch port and assumes that a power injector is connected. Choose this option if your network contains older Cisco 6-Watt switches and you want to avoid possible overloads by forcing a double-check of any relocated access points. If you want to configure the switch MAC address, enter the MAC address in the Injector Switch MAC Address text box. If you want the access point to find the switch MAC address, leave the Injector Switch MAC Address text box blank. Note Each time an access point is relocated, the MAC address of the new switch port fails to match the remembered MAC address, and the access point remains in low-power mode. You must then physically verify the existence of a power injector and reselect this option to cause the new MAC address to be remembered. · Override--This option allows the access point to operate in high-power mode without first verifying a matching MAC address. You can use this option if your network does not contain any older Cisco 6-W switches that could be overloaded if connected directly to a 12-W access point. The advantage of this option is that if you relocate the access point, it continues to operate in high-power mode without any further configuration. The disadvantage of this option is that if the access point is connected directly to a 6-W switch, an overload occurs. d) In the Injector Switch MAC field, enter the MAC address of the switcheither in xx:xx:xx:xx:xx:xx, xx-xx-xx-xx-xx-xx, or xxxx.xxxx.xxxx format. e) From the EAP Type drop-down list, choose the EAP type as EAP-FAST, EAP-TLS, or EAP-PEAP. f) From the AP Authorization Type drop-down list, choose the type as either CAPWAP DTLS + or CAPWAP DTLS. g) In the Client Statistics Reporting Interval section, enter the interval for 5 GHz and 2.4 GHz radios in seconds. h) Check the Enable check box to enable extended module. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 17 Configuring an AP Profile (GUI) System Configuration Step 9 i) From the Profile Name drop-down list, choose a profile name for mesh. j) Click Save & Apply to Device. · Hyperlocation: Cisco Hyperlocation is a location solution that allows to track the location of wireless clients with the accuracy of one meter. Selecting this option disables all other fields in the screen, except NTP Server. a) In the Hyperlocation tab, check the Enable Hyperlocation check box. b) Enter the Detection Threshold value to filter out packets with low RSSI. The valid range is 100 dBm to 50 dBm. c) Enter the Trigger Threshold value to set the number of scan cycles before sending a BAR to clients. The valid range is 0 to 99. d) Enter the Reset Threshold value to reset value in scan cycles after trigger. The valid range is 0 to 99. e) Enter the NTP Server IP address. f) Click Save & Apply to Device. · BLE: If your APs are Bluetooth Low Energy (BLE) enabled, they can transmit beacon messages that are packets of data or attributes transmitted over a low energy link. These BLE beacons are frequently used for health monitoring, proximity detection, asset tracking, and in-store navigation. For each AP, you can customize BLE Beacon settings configured globally for all APs. a) In the BLE tab, enter a value in the Beacon Interval field to indicate how often you want your APs to send out beacon advertisements to nearby devices. The range is from 1 to 10, with a default of 1. b) In the Advertised Attenuation Level field, enter the attenuation level. The range is from 40 to 100, with a default of 59. c) Click Save & Apply to Device. · Packet Capture: Packet Capture feature allows to capture the packets on the AP for the wireless client troubleshooting. The packet capture operation is performed on the AP by the radio drivers on the current channel on which it is operational, based on the specified packet capture filter. a) In the Packet Capture tab, choose an AP Packet Capture Profile from the drop-down list. b) You can also create a new profile by clicking the + sign. c) Enter a name and description for the AP packet capture profile. d) Enter the Buffer Size. e) Enter the Duration. f) Enter the Truncate Length information. g) In the Server IP field, enter the IP address of the TFTP server. h) In the File Path field, enter the directory path. i) Enter the username and password details. j) From the Password Type drop-down list, choose the type. k) In the Packet Classifiers section, use the option to select or enter the packets to be captured. l) Click Save. m) Click Save & Apply to Device. In the Management tab, you can configure the following: · Device a) In the Device tab, enter the IPv4/IPv6 Address of the TFTP server, TFTP Downgrade section. b) In the Image File Name field, enter the name of the software image file. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 18 System Configuration Configuring an AP Profile (GUI) Step 10 Step 11 Step 12 Step 13 Step 14 Step 15 c) From the Facility Value drop-down list, choose the appropriate facility. d) Enter the IPv4 or IPv6 address of the host. e) Choose the appropriate Log Trap Value. f) Enable Telnet and/or SSH configuration, if required. g) Enable core dump, if required. h) Click Save & Apply to Device. · User a) In the User tab, enter username and password details. b) Choose the appropriate password type. c) In the Secret field, enter a custom secret code. d) Choose the appropriate secret type. e) Choose the appropriate encryption type. f) Click Save & Apply to Device. · Credentials a) In the Credentials tab, enter local username and password details. b) Choose the appropriate local password type. c) Enter 802.1x username and password details. d) Choose the appropriate 802.1x password type. e) Enter the time in seconds after which the session should expire. f) Enable local credentials and/or 802.1x credentials as required. g) Click Save & Apply to Device. · CDP Interface a) In the CDP Interface tab, enable the CDP state, if required. b) Click Save & Apply to Device. In the Rogue AP tab, check the Rogue Detection check box to enable rogue detection. In the Rogue Detection Minimum RSSI field, enter the RSSI value. This field specifies the minimum RSSI value for which a Rogue AP should be reported. All Rogue APs with RSSI lower than what is configured will not be reported to controller. In the Rogue Detection Transient Interval field, enter the transient interval value. This field indicates how long the Rogue AP should be seen before reporting the controller. In the Rogue Detection Report Interval field, enter the report interval value. This field indicates the frequency (in seconds) of Rogue reports sent from AP to controller. Check the Rogue Containment Automatic Rate Selection check box to enable rogue containment automatic rate selection. Here, the AP selects the best rate for the target Rogue, based on its RSSI. Check the Auto Containment on FlexConnect Standalone check box to enable the feature. Here, the AP will continue containment in case it moves to flexconnect standalone mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 19 Configuring an AP Profile (CLI) System Configuration Step 16 Click Save & Apply to Device. Configuring an AP Profile (CLI) Follow the procedure given below to configure and AP profile: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap profile ap-profile Configures an AP profile and enters AP profile Example: configuration mode. Device(config)# ap profile xyz-ap-profile Note In an AP profile, the EAP-FAST is the default EAP type. Note When you delete a named profile, the APs associated with that profile will not revert to the default profile. Step 3 Step 4 description ap-profile-name Adds a description for the ap profile. Example: Device(config-ap-profile)# description "xyz ap profile" ip dhcp fallback Example: Device(config-ap-profile)# ip dhcp fallback Configures DHCP fallback. Note DHCP fallback is enabled by default. So, if an AP is assigned a static IP address and unable to reach the controller, the AP falls back to the DHCP. To stop an AP from moving the static IP to DHCP, you must disable the DHCP fallback configuration in an AP join profile. Step 5 Step 6 cdp Example: Device(config-ap-profile)# cdp end Example: Enables CDP for all Cisco APs. Saves the configuration and exits configuration mode and returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 20 System Configuration Configuring User for AP Management (CLI) Step 7 Command or Action Device(config-ap-profile)# end Purpose show ap profile nameprofile-name detailed Example: Device# show ap profile name xyz-ap-profile detailed (Optional) Displays detailed information about an AP join profile. Configuring User for AP Management (CLI) Follow the procedure given below to configure a user for the AP management: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap profile ap-profile Example: Device(config)# ap profile default-ap-profile Configures an AP profile and enters AP profile configuration mode. Step 3 mgmtuser username <username> password Specifies the AP management username and {0 | 8} <password> password for managing all of the access points Example: configured to the controller. Device(config-ap-profile)# mgmtuser username myusername password 0 12345678 · 0: Specifies an UNENCRYPTED password. · 8: Specifies an AES encrypted password. Note While configuring an username, ensure that special characters are not used as it results in error with bad configuration. Step 4 end Example: Device(configure-ap-profile)# end Returns to privileged EXEC mode. Setting a Private Configuration Key for Password Encryption Follow the procedure given below to set a private configuration key for password encryption: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 21 Configuring an RF Profile (GUI) System Configuration Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 key config-key password encrypt key <config-key> Example: Device(config)# key config-key password-encrypt 12345678 Purpose Enters global configuration mode. Sets the password encryption keyword. Here, config-key refers to any key value with minimum 8 characters. Note The config-key value must not begin with the following special characters: !, #, and ; Step 3 Step 4 password encryption aes Enables the encrypted preshared key. Example: Device(config)# password encryption aes end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring an RF Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Configuration > Tags & Profiles > RF. On the RF Profile page, click Add. In the General tab, enter a name for the RF profile. The name can be ASCII characters from 32 to 126, without leading and trailing spaces. Choose the appropriate Radio Band. To enable the profile, set the status as Enable. Enter a Description for the RF profile. Click Save & Apply to Device. Configuring an RF Profile (CLI) Follow the procedure given below to configure an RF profile: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 22 System Configuration Configuring an RF Profile (CLI) Before you begin Ensure that you use the same RF profile name that you create here, when configuring the wireless RF tag too. If there is a mismatch in the RF profile name (for example, if the RF tag contains an RF profile that does not exist), the corresponding radios will not come up. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 24ghz rf-profile rf-profile Configures an RF profile and enters RF profile Example: configuration mode. Device(config)# ap dot11 24ghz rf-profile Note rfprof24_1 Use the 24ghz command to configure the 802.11b parameters. Use the 5ghz command to configure the 802.11a parameters. Use the 6ghz command to configure the 802.11 6-GHz parameters. Step 3 default Example: Device(config-rf-profile)# default (Optional) Enables default parameters for the RF profile. Step 4 no shutdown Enables the RF profile on the device. Example: Device(config-rf-profile)# no shutdown Step 5 end Example: Device(config-rf-profile)# end Exits configuration mode and returns to privileged EXEC mode. Step 6 show ap rf-profile summary Example: Device# show ap rf-profile summary (Optional) Displays the summary of the available RF profiles. Step 7 show ap rf-profile name rf-profile detail Example: Device# show ap rf-profile name rfprof24_1 detail (Optional) Displays detailed information about a particular RF profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 23 Configuring a Site Tag (GUI) System Configuration Configuring a Site Tag (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Choose Configuration > Tags & Profiles > Tags. On the Manage Tags page, click the Site tab. Click Add to view the Add Site Tag window. Enter a name and description for the site tag. The name can be ASCII characters from 32 to 126, without leading and trailing spaces. Choose the required AP Join Profile to be attached to the site tag. Choose the required Control Plane Name. If required, enable the Local Site. Disabling Local Site means that the site is remote and the deployment is FlexConnect mode. Click Save & Apply to Device. Configuring a Site Tag (CLI) Follow the procedure given below to configure a site tag: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless tag site site-name Example: Device(config)# wireless tag site rr-xyz-site Configures a site tag and enters site tag configuration mode. Step 3 flex-profile flex-profile-name Example: Device(config-site-tag)# flex-profile rr-xyz-flex-profile Configures a flex profile. Note You cannot remove the flex profile configuration from a site tag if local site is configured on the site tag. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 24 System Configuration Enhanced Site Tag-Based Load Balancing Step 4 Step 5 Step 6 Command or Action Purpose Note The no local-site command needs to be used to configure the Site Tag as Flexconnect, otherwise the Flex profile config does not take effect. description site-tag-name Example: Device(config-site-tag)# description "default site tag" Adds a description for the site tag. end Example: Device(config-site-tag)# end Saves the configuration and exits configuration mode and returns to privileged EXEC mode. show wireless tag site summary (Optional) Displays the number of site tags. Example: Note Device# show wireless tag site summary To view detailed information about a site, use the show wireless tag site detailed site-tag-name command. Note The output of the show wireless loadbalance tag affinity wncd wncd-instance-number command displays default tag (site-tag) type, if both site tag and policy tag are not configured. Enhanced Site Tag-Based Load Balancing Feature History for Enhanced Site Tag-Based Load Balancing This table provides release and related information for the feature explained in this module. This feature is also available in all the releases subsequent to the one in which they are introduced in, unless noted otherwise. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 25 Information About Enhanced Site Tag-Based Load Balancing System Configuration Table 1: Feature History for Enhanced Site Tag-Based Load Balancing Release Cisco IOS XE Dublin 17.10.1 Feature Enhanced Site Tag-Based Load Balancing Feature Information The Site Tag-based load balancing is available from Cisco IOS-XE Gibraltar 16.10.1 release. When the first AP from a site joins the controller, it takes the decision to load balance the entire site. However, this is done without knowing the site load. The enhancement to load balancing feature introduced in Cisco IOS-XE 17.10.1 specifies a site load to help with better load balancing. Information About Enhanced Site Tag-Based Load Balancing Load balancing of APs is done among session handling processes called Wireless Network Control Daemon (WNCD). The load balancer assigns APs to WNCDs based on site tags. The decision to load balance a site tag to a WNCD is taken when the first AP from that site tag joins the controller. Prior to this enhancement, the controller had no indication about the size of the site. Therefore, the site size is not taken into consideration for this load balancing decision. The system works well only if the sites are of approximately equal size. However, in case where you have sites of disparate sizes, it is possible for some WNCDs to be more loaded than the others. This enhancement allows you to configure a site load, thus allowing the system to take better load balancing decisions. The behavior of the load balancing feature in the controller reboot case is as follows: · After you have configured the feature in one or more site tags and rebooted the controller, after the reboot, even before any APs join, the load balancing feature retains the site tags that are used actively in persistent memory and load balances them during bootup. The load balancing during bootup occurs in descending order of the configured site load. · After you have configured the feature in a site tag with APs already joined, the load balancing will not change unless all APs in that site tag disconnect or the controller reboots. Prerequisites for Enhanced Site Tag-Based Load Balancing · You must have configured the site load. · We recommended that you configure all the named sites with a load value. Note The configured load is only an estimate. It will only be used for site load balancing. Specifically, it does not prevent APs, or clients from joining or associating. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 26 System Configuration Use Cases Use Cases To cater to a variety of use cases, the site load configuration is designed to be a load factor rather than an absolute number. Specifically, it need not be the number of APs in a site, although, for most practical purposes, the number of APs can be used as a good approximation of the load. The following are the two use cases: · Sites with normal client density and roaming load. You can use AP count as a good approximate site load in these cases. Examples of such sites are cubicle areas in offices and hospitals. · Sites with high client density and roaming load. For these, you can use a higher load configuration than the number of APs. For example, if the number of APs in such a site is 200, you can use a load factor of 300 or 400 to compensate for higher client load. Examples of such sites include stadiums, cafeterias, and conference floors. Configuring Site Load (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless tag site site-tag Example: Configures site tag and enters site tag configuration mode. Device(config)# wireless tag site area1 Step 3 load load Example: Device(config-site-tag)# load 200 Configures the site load. The load is the estimate of the relative load reserved for the site. Values range between 0 to 1000. The default value 0 means no load recommendation for the site. Step 4 end Example: Device(config-site-tag)# end Returns to privileged EXEC mode. Verifying Enhanced Site Tag-Based Load Balancing Configuration To view detailed information about a site, use the following command: Device# show wireless tag site detailed area1 Site Tag Name : area1 Description : ---------------------------------------- AP Profile : default-ap-profile Local-site : Yes Image Download Profile: default Fabric AP DHCP Broadcast : Disabled Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 27 Configuring Policy Tag (GUI) System Configuration Fabric Multicast Group IPv4 Address : 232.255.255.1 Site Load : 200 To view the default site tag type for WNCD instances, use the following command: Device# show wireless loadbalance tag affinity Tag Tag type No of AP's Joined Wncd Instance ----------------------------------------------------------------------- area1 SITE TAG 50 0 area2 SITE TAG 50 0 area3 SITE TAG 100 1 area4 SITE TAG 150 2 Configuring Policy Tag (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Tags & Profiles > Tags > Policy. Click Add to view the Add Policy Tag window. Enter a name and description for the policy tag. The name can be ASCII characters from 32 to 126, without leading and trailing spaces. Click Add to map WLAN and policy. Choose the WLAN profile to map with the appropriate policy profile, and click the tick icon. Click Save & Apply to Device. Configuring a Policy Tag (CLI) Follow the procedure given below to configure a policy tag: Procedure Step 1 Command or Action enable Example: Device> enable Step 2 configure terminal Example: Device# configure terminal Step 3 wireless tag policy policy-tag-name Example: Purpose Enables privileged EXEC mode. · Enter your password if prompted. Enters global configuration mode. Configures policy tag and enters policy tag configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 28 System Configuration Configuring Wireless RF Tag (GUI) Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action Purpose Device(config-policy-tag)# wireless tag Note policy default-policy-tag When performing LWA, the clients connected to a controller gets disconnected intermittently before session timeout. description description Adds a description to a policy tag. Example: Device(config-policy-tag)# description "default-policy-tag" remote-lan name policy profile-policy-name Maps a remote-LAN profile to a policy profile. {ext-module| port-id } Example: Device(config-policy-tag)# remote-lan rr-xyz-rlan-aa policy rr-xyz-rlan-policy1 port-id 2 wlan wlan-name policy profile-policy-name Example: Device(config-policy-tag)# wlan rr-xyz-wlan-aa policy rr-xyz-policy-1 Maps a policy profile to a WLAN profile. Note Ensure that the WLAN profile is not used by any other profiles. If the AP uses the default profile, ensure that the no central switching command is configured on other profiles. end Example: Device(config-policy-tag)# end Exits policy tag configuration mode, and returns to privileged EXEC mode. show wireless tag policy summary (Optional) Displays the configured policy tags. Example: Note Device# show wireless tag policy summary To view detailed information about a policy tag, use the show wireless tag policy detailed policy-tag-name command. Configuring Wireless RF Tag (GUI) Procedure Step 1 Step 2 a) Choose Configuration > Tags & Profiles > Tags > RF. Click Add to view the Add RF Tag window. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 29 Configuring Wireless RF Tag (CLI) System Configuration Step 3 Step 4 Step 5 Enter a name and description for the RF tag. The name can be ASCII characters from 32 to 126, without leading and trailing spaces. Choose the required 5 GHz Band RF Profile, 5 GHz Band RF Profile, and 2.4 GHz Band RF Profile to be associated with the RF tag. Click Update & Apply to Device. Configuring Wireless RF Tag (CLI) Follow the procedure given below to configure a wireless RF tag: Before you begin · You can use only two profiles (2.4-GHz and 5-GHz band RF profiles) in an RF tag. · You can use only three profiles (2.4-GHz, 5-GHz and 6GHz band RF profiles) in an RF tag. · Ensure that you use the same AP tag name that you created when configuring the AP tag task too. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless tag rf rf-tag Example: Creates an RF tag and enters wireless RF tag configuration mode. Device(config)# wireless tag rf rftag1 Step 3 24ghz-rf-policy rf-policy Example: Device(config-wireless-rf-tag)# 24ghz-rf-policy rfprof24_1 Attaches an IEEE 802.11b RF policy to the RF tag. To configure a dot11a policy, use the 5ghz-rf-policy command. To configure a 6GHz radio dot11 policy, use the 6ghz-rf-policy command. Step 4 description policy-description Example: Device(config-wireless-rf-tag)# description Test Adds a description for the RF tag. Step 5 end Example: Device(config-wireless-rf-tag)# end Exits configuration mode and returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 30 System Configuration Attaching a Policy Tag and Site Tag to an AP (GUI) Step 6 Step 7 Command or Action show wireless tag rf summary Example: Device# show wireless tag rf summary Purpose Displays the available RF tags. show wireless tag rf detailed rf-tag Example: Device# show wireless tag rf detailed rftag1 Displays detailed information of a particular RF tag. Attaching a Policy Tag and Site Tag to an AP (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Wireless > Access Points. The All Access Points section displays details of all the APs on your network. To edit the configuration details of an AP, select the row for that AP. The Edit AP window is displayed. In the General tab and Tags section, specify the appropriate policy, site, RF tags, and radio profile that you created on the Configuration > Tags & Profiles > Tags page. Click Update & Apply to Device. Attaching Policy Tag and Site Tag to an AP (CLI) Follow the procedure given below to attach a policy tag and a site tag to an AP: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap mac-address Example: Device(config)# ap F866.F267.7DFB Purpose Enters global configuration mode. Configures a Cisco AP and enters AP profile configuration mode. Note The mac-address should be a wired mac address. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 31 Configuring a Radio Profile System Configuration Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action policy-tag policy-tag-name Example: Device(config-ap-tag)# policy-tag rr-xyz-policy-tag Purpose Maps a policy tag to the AP. site-tag site-tag-name Example: Device(config-ap-tag)# site-tag rr-xyz-site Maps a site tag to the AP. rf-tag rf-tag-name Example: Device(config-ap-tag)# rf-tag rf-tag1 Associates the RF tag. end Example: Device(config-ap-tag)# end Saves the configuration, exits configuration mode, and returns to privileged EXEC mode. show ap tag summary Example: Device# show ap tag summary (Optional) Displays AP details and the tags associated to it. show ap name <ap-name> tag info Example: Device# show ap name ap-name tag info (Optional) Displays the AP name with tag information. show ap name <ap-name> tag detail Example: (Optional) Displays the AP name with tag detals. Device# show ap name ap-name tag detail Configuring a Radio Profile Information About Wireless Radio Profile From Cisco IOS XE Bengaluru 17.6.1 onwards, you can configure radio profiles for the slots in access points (APs). In this release, you can configure radio profiles for beam-selection APs with the C-ANT9104 antenna and configure antenna count for Cisco Catalyst 9124AXI/D outdoor Access Points. You can configure the antenna beam-selection for the 5-GHz slots--slot 1 and slot 2. Because there is no default value for the beam-selection configuration, you must explicitly configure the beam selection mode for APs with the C-ANT9104 antenna. The C-ANT9104 antenna-enabled Cisco Catalyst 9130AX Series APs have precise control over the antennae pattern. Therefore, a configuration knob in the controller in introduced to select the beam-steering direction Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 32 System Configuration Configuring a Wireless Radio Profile (GUI) for the antennae. The C-ANT9104 antenna-enabled Cisco Catalyst 9130AX Series APs can operate on the following beam-steering modes: · Wide beam · Narrow beam · Narrow beam with 10 degrees tilt · Narrow beam with 20 degrees tilt After creating the radio profile, you must link or attach the radio profile under the radio frequency (RF) tag configuration, so that the radio profile is applied to the APs. Note When you add Cisco ANT9104 antennas to the wireless controller, RRM configuration is not supported for these antennas. RRM features such as Dynamic Channel Assignment (DCA), Radio Transmit Power Control (TPC), Flexible Radio Assignment (FRA), and so on, are disabled on C-ANT9104 antenna-enabled Cisco Catalyst 9130 Series Access Points. The sections in this topic describe the steps to configure radio profile, beam selection, antenna count, and how to link the radio profile to the slots. Note Cisco Catalyst 9130 Series Access Points enabled with Cisco ANT9104 antenna are able to function with unsupported versions, for example, Cisco IOS XE Bengaluru 17.5.1. If the AP that is enabled with Cisco ANT9104 antenna, has a software version that is earlier than Cisco IOS XE 17.6.1, the AP joins the controller but the AP will not be functional as the operation status of the radios will be down. Configuring a Wireless Radio Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > RF/Radio. On the Radio Profile page, click Add. Enter a name for the Radio profile. Enter a description for the Radio profile. Choose the appropriate Antenna Beam selection. Note The antenna beam selection is set to Not Configured if no settings are detected. This option is to be configured for APs connected with the C-ANT9104 antenna. Enter the number in the Number of antenna to be enabled field. Note The option is available for the Cisco Catalyst 9124AXE Outdoor Access Points. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 33 Configuring a Radio Profile and Beam Selection System Configuration Step 6 Click Save & Apply to Device. Configuring a Radio Profile and Beam Selection Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile radio wireless-radio-profile Configures the radio profile. Enters the wireless Example: radio profile configuration mode. Device(config)# wireless profile radio wireless-radio-profile Step 3 antenna beam-selection { narrow tilt {10 | Configures the beam selection of the antenna 20} | wide} under the new radio profile. Example: Device(config-wireless-radio-profile)# antenna beam-selection narrow tilt 10 Configuring the Antenna Count in a Wireless Radio Profile To configure the number of antennae for each slot, complete the following steps: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile radio wireless-radio-profile Configures the radio profile. Enters the wireless Example: radio profile configuration mode. Device(config)# wireless profile radio wireless-radio-profile Step 3 antenna count <0 - 8> Example: Configures the number of antennas to be enabled under the new radio profile. Device(config-wireless-radio-profile)# antenna count 4 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 34 System Configuration Configuring a Slot Per Radio in the RF Tag Profile Configuring a Slot Per Radio in the RF Tag Profile It is mandatory to link radio profiles under an RF tag for the radio profile configurations to get applied. To configure a radio profile for each slot in an RF tag profile, complete the following steps: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless tag rf wireless-rf-tagname Example: Device(config)# wireless tag rf wireless-rf-tagname Configures the RF tag. Enters the wireless RF tag configuration mode. Step 3 dot11{ 24ghz slot0 | 5ghz { slot1 | slot2} radio-profile radio-profile-name} Example: Device(config-wireless-rf-tag)# dot11 5ghz slot1 radio-profile wireless-radio-profile Configures the 802.11a/802.11b radio profile. Verifying a Radio Profile To view the summary of all the configured radio profiles, use the following command: Device# show wireless profile radio summary Number of radio-profiles: 3 Antenna Profile Name Description ------------------------------------------------------------------------ radio-profile-1 Custom profile for Slot1 antenna-ewlc Add description default_radio_profile Preconfigured default radio profile To view detailed information about the parameters configured for a radio profile, use the following command: Device# show wireless profile radio detailed radio-profile-name Radio Profile name : radio-profile-1 Description : Custom profile for slot1 Beam-Selection : Wide beam To view radio profile and RF tag information, use the following command: Device # show ap name Cisco-AP tag info AP Name : Cisco-AP AP Mac : 04xx.40xx.XXXX Applied Tags : ------------------------------------------- Tag Type Tag Name ----------------------------------------- Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 35 AP Filter System Configuration RF Tag Site Tag Policy Tag test-rf default-site-tag default-policy-tag Tag/Profile Type Misconfigured ----------------------------------------RF Tag No Policy Tag No Site Tag No Flex profile No AP join profile No 2.4GHz Rf Profile No 5 GHz Rf Profile No 5 GHz Slot1 Radio Profile NO 5 GHz Slot2 Radio Profile Yes Resolved Tags : ------------------------------------------- Tag Source : Static Tag Type Tag Name ----------------------------------------- RF Tag test-rf Site Tag default-site-tag Policy Tag default-policy-tag To display beam selection and the number of antennas, run the following commands: Device# show wireless profile radio detailed radio-profile-1 Radio Profile name : radio-profile-1 Description : Custom profile for slot1 Beam-Selection : Wide beam Device# show ap name cisco-ap config slot 1 | section 11n 802.11n Antennas Number of Antennas selected :2 Supported Antenna modes : 1x1 2x2 4x4 Antenna port mapping : AB SIA Status : Not Present Device# show ap name cisco-ap config slot 1 | include beam Beam Selection : Narrow from centre 20 AP Filter Introduction to AP Filter The introduction of tags in the new configuration model in the Cisco Catalyst 9800 Series Wireless Controller has created multiple sources for tags to be associated with access points (APs). Tag sources can be static configuration, AP filter engine, per-AP PNP, or default tag sources. In addition to this, the precedence of the tags also plays an important role. The AP filter feature addresses these challenges in a seamless and intuitive manner. AP filters are similar to the access control lists (ACLs) used in the controller and are applied at the global level. You can add AP names as filters, and other attributes can be added as required. Add the filter criteria as part of the discovery requests. The AP Filter feature organizes tag sources with the right priority, based on the configuration. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 36 System Configuration Set Tag Priority (GUI) You cannot disable the AP filter feature. However, the relative priority of a tag source can be configured using ap filter-priority priority filter-name command. Note You can configure tag names at the PnP server (similar to the Flex group and AP group) and the AP stores and send the tag name as part of discovery and join requests. Set Tag Priority (GUI) Procedure Step 1 Step 2 Choose Configuration > Tags & Profiles > Tags > AP > Tag Source. Drag and Drop the Tag Sources to change priorities. Set Tag Priority Multiple tag sources might result in ambiguity for network administrators. To address this, you can define priority for tags. When an AP joins the controller, the tags are picked based on priority. If precedence is not set, the defaults are used. Use the following procedure to set tag priority: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters the global configuration mode. Step 2 ap tag-source-priority source-priority source Configures AP tag source priority. {filter | pnp} Note It is not mandatory to configure Example: AP filter. It comes with default Device(config)# ap tag-source-priority 2 source pnp priorities for Static, Filter, and PnP. Step 3 Step 4 end Example: Device(config)# end ap tag-sources revalidate Example: Exits configuration mode and returns to privileged EXEC mode. Revalidates AP tag sources. The priorities become active only after this command is run. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 37 Create an AP Filter (GUI) System Configuration Command or Action Device# ap tag-sources revalidate Purpose Note If you change the priorities for Filter and PnP, and want to evaluate them, run the revalidate command. Create an AP Filter (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Tags & Profiles > Tags > AP > Filter. Click Add. In the Associate Tags to AP dialog box which is displayed, enter the Rule Name, the AP name regex and the Priority. Optionally, you can also choose the policy tag from the Policy Tag Name drop-down list, the site tag from the Site Tag Name drop-down list and the RF tag from the RF Tag Name drop-down list. Click Apply to Device. Create an AP Filter (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters the global configuration mode. Step 2 ap filter name filter_name Example: Device(config)# ap filter filter-1 Configures an AP filter. Step 3 ap name-regex regular-expression Configures the AP filter based on regular Example: expression. Device(config-ap-filter)# ap name-regex For example, if you have named an AP as testany ap-lab-12, then you can configure the filter with a regular expression, such as ap-lab-\d+ , to match the AP name. Step 4 tag policy policy-tag Example: Device(config-ap-filter)# tag policy pol-tag1 Configures a policy tag for this filter. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 38 System Configuration Set Up and Update Filter Priority (GUI) Step 5 Step 6 Step 7 Command or Action Purpose tag rf rf-tag Configures an RF tag for this filter. Example: Device(config-ap-filter)# tag rf rf-tag1 tag site site-tag Configures a site tag for this filter. Example: Device(config-ap-filter)# tag site site1 end Example: Device(config-ap-filter)# end Exits configuration mode and returns to privileged EXEC mode. Set Up and Update Filter Priority (GUI) Procedure Step 1 Step 2 Choose Configuration > Tags & Profiles > Tags > AP > Filter. a) If you want to setup a new AP filter, then click Add. In the Associate Tags to AP dialog box which is displayed, enter the Rule Name, the AP name regex and the Priority. Optionally, you can also select the Policy Tag Name, the Site Tag Name and the RF Tag Name. Click Apply to Device. b) If you want to update the priority of an existing AP filter, click on the Filter and in the Edit Tags dialog box and change the Priority. In case the Filter is Inactive, no priority can be set to it. Click Update and Apply to Device. Set Up and Update Filter Priority Follow the procedure given below to set and update filter priority: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap filter priority priority filter-name filter-name Example: Device(config)# ap filter priority 10 filter-name test1 Configure AP filter priority. Valid values range from 0 to 1023; 0 is the highest priority. Note A filter without a priority is not active. Similarly, you cannot set a filter priority without a filter. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 39 Verify AP Filter Configuration System Configuration Step 3 Command or Action end Example: Device(config-ap)# end Purpose Exits configuration mode and returns to privileged EXEC mode. Verify AP Filter Configuration The following show commands are used to display tag sources and filters, and their priorities. To view the tag source priorities, use the following command: Device# show ap tag sources Priority Tag source -------------------------------0 Static 1 Filter 2 AP 3 Default To view the available filters, use the following command: Device# show ap filter all Filter Name regex Policy Tag RF Tag Site Tag ------------------------------------------------------------------------------------------------- first abcd pol-tag1 rf-tag1 site-tag1 test1 testany site1 filter1 testany To view the list of active filters, use the following command: Device# show ap filters active Priority Filter Name regex Policy Tag RF Tag Site Tag -------------------------------------------------------------------------------------------------------------------- 10 test1 testany site1 To view the source of an AP tag, use the following command: Device# show ap tag summary Number of APs: 4 AP Name AP Mac Site Tag Name Policy Tag Name RF Tag Name Misconfigured Tag Source --------------------------------------------------------------------------------------------------------------------- AP002A.1034.CA78 002a.1034.ca78 named-site-tag named-policy-tag named-rf-tag No Filter AP00A2.891C.2480 00a2.891c.2480 named-site-tag named-policy-tag named-rf-tag No Filter AP58AC.78DE.9946 58ac.78de.9946 default-site-tag default-policy-tag default-rf-tag No AP AP0081.C4F4.1F34 0081.c4f4.1f34 default-site-tag default-policy-tag default-rf-tag No Default Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 40 System Configuration Configuring Access Point for Location Configuration Configuring Access Point for Location Configuration Information About Location Configuration During location configuration, you can perform the following: · Configure a site or location for an AP. · Configure a set of tags for this location. · Add APs to this location. Any location comprises of the following components: · A set of unique tags, one for each kind, namely: Policy, RF and Site. · A set of ethernet MAC addresses that applies to the tags. This feature works in conjunction with the existing tag resolution scheme. The location is considered as a new tag source to the existing system. Similar, to the static tag source. Prerequisite for Location Configuration If you configure an access point in one location, you cannot configure the same access point in another location. Configuring a Location for an Access Point (GUI) Before you begin Note When you create local and remote sites in the Basic Setup workflow, corresponding policies and tags are created in the backend. These tags and policies that are created in the Basic Setup cannot be modified using the Advanced workflow, and vice versa. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Wireless Setup > Basic. On the Basic Wireless Setup page, click Add. In the General tab, enter a name and description for the location. Set the Location Type as either Local or Flex. Use the slider to set Client Density as Low, Typical or High. Click Apply. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 41 Configuring a Location for an Access Point (CLI) System Configuration Configuring a Location for an Access Point (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap location name location_name Example: Device(config)# ap location name location1 Configures a location for an access point. Run the no form of this command to remove location for an access point. Step 3 tag {policy policy_name| rf rf_name | site site_name} Configures tags for the location. Example: Device(config-ap-location)# tag policy policy_tag Device(config-ap-location)# tag rf rf_tag Device(config-ap-location)# tag site site_tag Step 4 location description Example: Device(config-ap-location)# location description Adds description to the location. Step 5 end Example: Device(config-ap-location)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Adding an Access Point to the Location (GUI) Note When the tag source is not set to location, the AP count and AP location tagging will not be correctly reflected on the web UI. To change static tag source on the AP, run the no ap ap-mac command on the controller to change AP tag source to default (which is location). Procedure Step 1 Step 2 Choose Configuration > Wireless Setup > Basic. On theBasic Wireless Setup page, click Add to configure the following: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 42 System Configuration Adding an Access Point to the Location (CLI) Step 3 Step 4 Step 5 · General · Wireless Networks · AP Provisioning In the AP Provisioning tab and Add/Select APs section, enter the AP MAC address and click the right arrow to add the AP to the associated list. The MAC address can be either in xx:xx:xx:xx:xx:xx, xx-xx-xx-xx-xx-xx, or xxxx.xxxx.xxxx format. You can also add a CSV file from your system. Ensure that the CSV has the MAC Address column. Use the search option in the Available AP List to select the APs from the Selected AP list and click the right arrow to add the AP to the associated list. Click Apply. Adding an Access Point to the Location (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap location name location_name Example: Device(config)# ap location name location1 Configures a location for an access point. Step 3 ap-eth-mac ap_ethernet_mac Adds an access point to the location. Example: Device(config-ap-location)# ap-eth-mac 188b.9dbe.6eac Step 4 end Example: Device(config-ap-location)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Note After adding an AP to a location, the AP may reset automatically to get the new configuration Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 43 Configuring SNMP in Location Configuration System Configuration Configuring SNMP in Location Configuration SNMP MIB The SNMP MIB provides information on a set of managed objects that represent logical and physical entities, and relationships between them. Table 2: MIB Objects and Notes MIB Objects cLApLocationName Notes Provides the name of the AP location. cLApLocationPolicyTag Provides the policy tag configured on the location. cLApLocationSitetag Provides the site tag configured on the location. cLApLocationRfTag Provides the RF tag configured on the location. cLAssociatedApsApMac Provides the configured APs on the location. Verifying Location Configuration To view the summary of AP location configuration, use the following command: Device# show ap location summary Location Name Description Policy Tag RF Tag Site Tag --------------------------------------------------------------------------------------------------- first first floor default-policy-tag default-rf-tag default-site-tag second second floor default-policy-tag default-rf-tag default-site-tag To view the AP location configuration details for a specific location, use the following command: Device# show ap location details first Location Name......................: first Location description...............: first floor Policy tag.........................: default-policy-tag Site tag...........................: default-site-tag RF tag.............................: default-rf-tag Configured list of APs 005b.3400.0af0 005b.3400.0bf0 To view the AP tag summary, use the following command: Device# show ap tag summary Number of APs: 4 AP Name AP Mac Site Tag Name Policy Tag Name RF Tag Name Misconfigured Tag Source -------------------------------------------------------------------------------------------------------------------- Asim_5-1 005b.3400.02f0 default-site-tag default-policy-tag default-rf-tag Yes Filter Asim_5-2 005b.3400.03f0 default-site-tag default-policy-tag default-rf-tag No Default Asim_5-9 005b.3400.0af0 default-site-tag default-policy-tag default-rf-tag No Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 44 System Configuration Verifying Location Statistics Location Asim_5-10 005b.3400.0bf0 default-site-tag default-policy-tag default-rf-tag No Location Verifying Location Statistics To view the AP location statistics, use the following command: Device# show ap location stats Location name APs joined Clients joined Clients on 11a Clients on 11b ----------------------------------------------------------------------------------------------- first 2 0 3 4 second 0 0 0 0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 45 Verifying Location Statistics System Configuration Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 46 3 C H A P T E R Wireless Management Interface · Information About Wireless Management Interface, on page 47 · Recommendations for Wireless Management Interface, on page 48 · Configuring your Controller with Wireless Management Interface (CLI), on page 49 · Verifying Wireless Management Interface Settings, on page 50 · Information About Network Address Translation (NAT), on page 51 · Information About CAPWAP Discovery, on page 52 · Configuring Wireless Management Interface with a NAT Public IP (CLI), on page 52 · Configuring CAPWAP Discovery to Respond Only with Public or Private IP (CLI), on page 53 · Verifying NAT Settings, on page 54 Information About Wireless Management Interface The Wireless Management Interface (WMI) is the mandatory Layer 3 interface on the Cisco Catalyst 9800 Wireless Controller. It is used for all communications between the controller and access points. Also, it is used for all CAPWAP or inter-controller mobility messaging and tunneling traffic. WMI is also the default interface for in-band management and connectivity to enterprise services, such as, AAA, syslog, SNMP, and so on. You can use the WMI IP address to remotely connect to the device using SSH or Telnet (or) access the Graphical User Interface (GUI) using HTTP or HTTPs by entering the wireless management interface IP address of the controller in the address field of your browser. The Cisco Catalyst 9800 Series Wireless Controller should be able to use Ethernet Service Port (SP) (Management Interface VRF/GigabitEthernet 0) for the below management/control plane protocols from release 17.6.1 onwards: · SNMP · RADIUS (both for user authentication to the box and wireless client authorization) · TACACS · Syslog · NTP · SSH/NETCONF/HTTPS · NetFlow Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 47 Recommendations for Wireless Management Interface System Configuration Recommendations for Wireless Management Interface The Wireless Management Interface is a Layer 3 interface, which can be configured only with a single IP address (IPv4 or IPv6) or using a dual-stack configuration. It is always recommended to use a wireless management VLAN and configure WMI as a Switched VLAN Interface (SVI). If the uplink port or port-channel to the next-hop switch is configured as a dot1q trunk, the wireless management VLAN would be one of the allowed tagged VLAN on the trunk. The recommendation is true, independent of the deployment mode of APs (local, FlexConnect, or SDA) with the following exceptions: · The WMI is configured as an L3 port for Cisco Catalyst 9800 Wireless Controller deployed in a Public Cloud environment. · The WMI is configured as a loopback interface for embedded wireless controller in Cisco Catalyst 9000 switches. It is always recommended to statically assign IPv6 address in WMI and not configure using the ipv6 auto-config command. Note The ipv6 auto-config command is not supported. Note You can use only one AP manager interface on Cisco Catalyst 9800 Wireless Controller called the WMI to terminate CAPWAP traffic. Note There is only one Wireless Management Interface (WMI) on the controller. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 48 System Configuration Configuring your Controller with Wireless Management Interface (CLI) Note Layer 3 interface is not supported in Cisco Catalyst 9800-CL Cloud Wireless Controller Guest anchor scenarios. Instead, it is recommended to use the Layer 2 interfaces and SVI for WMI. It is recommended to use Layer 3 interface for Public cloud deployments only and not for on-premise as it poses some limitations. The following are the sample Layer 3 and Layer 2 interface configurations: Layer 3 interface configuration: interface GigabitEthernet2 no switchport ip address <ip_address> <mask> negotiation auto no mop enabled no mop sysid end Layer 2 interface configuration: interface GigabitEthernet2 switchport trunk allowed vlan 25,169,504 switchport mode trunk negotiation auto no mop enabled no mop sysid end Configuring your Controller with Wireless Management Interface (CLI) You can configure the Wireless Management interface using CLI by directly accessing the physical console (for the Cisco Catalyst 9800 appliances) (or) using the virtual console in case of the Cisco Catalyst 9800-CL Cloud Wireless Controller. Note The example assumes that: · You have a Cisco Catalyst 9800-CL Cloud Wireless Controller and the GigabitEthernet 2 is connected to a trunk interface on the uplink switch. · You want to configure multiple VLANs and dedicate one for Wireless Management interface. Procedure Step 1 Step 2 Access the CLI using VGA or monitor console from the hypervisor of your choice. Terminate the configuration wizard. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 49 Verifying Wireless Management Interface Settings System Configuration Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Would you like to enter the initial configuration dialog? [yes/no]: no Would you like to terminate autoinstall? [yes]: yes Enter the configuration mode and add the login credentials using the following command: Device# conf t Enter configuration commands, one per line. End with CNTL/Z. Device(config)# username <name> privilege 15 password <yourpwd> (Optional) Set a hostname. Device(config)# hostname C9800 Configure the VLAN for wireless management interface: Device(config)# vlan 201 Device(config-vlan)# name wireless_management Configure the L3 SVI for wireless management interface: Device(config)# int vlan 201 Device(config-if)# description wireless-management-interface Device(config-if)# ip address 172.16.201.21 255.255.255.192 Device(config-if)# no shutdown Configure the interface GigabitEthernet 2 as trunk and allow the wireless management VLAN: Device(config-if)# interface GigabitEthernet2 Device(config-if)# switchport mode trunk Device(config-if)# switchport trunk allowed vlan 201,210,211 Device(config-if)# shut Device(config-if)# no shut Note VLANs 210 and 211 are added to the trunk to carry client traffic. Configure a default route (or a more specific route) to reach the device: Device(config-if)# ip route 0.0.0.0 0.0.0.0 172.16.201.1 At this point you can use SSH or Telnet, or GUI to access the device, or use the Cisco DNA Center or Cisco Prime to continue with the DAY 0 configuration. Verifying Wireless Management Interface Settings To verify if the Layer 3 interface is configured correctly, use the following command: Device# show run int vlan 201 Building configuration... Current configuration : 128 bytes ! Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 50 System Configuration Information About Network Address Translation (NAT) interface Vlan201 description wireless-management-interface ip address 172.16.201.21 255.255.255.0 no mop enabled no mop sysid end To verify if the wireless management VLAN is active on the uplink to the network, use the following command. In this case the uplink is a trunk interface, so the VLAN needs to be active and forwarding state. Device# show interfaces trunk Port Gi2 ..... Port Gi2 ..... Port Gi2 .... Port Gi2 .... Mode on Encapsulation Status 802.1q trunking Native vlan 1 Vlans allowed on trunk 201,210-211 Vlans allowed and active in management domain 201,210-211 Vlans in spanning tree forwarding state and not pruned 201,210-211 To verify if the wireless management interface is up, use the following command: Device# show ip int brief | i Vlan201 Vlan201 172.16.201.21 YES NVRAM up up To verify if the selected interface has been configured as wireless management, use the following command: Device# show wireless interface summary Wireless Interface Summary Interface Name Interface Type VLAN ID IP Address IP Netmask NAT-IP Address MAC Address -------------------------------------------------------------------------------------------------- Vlan201 Management 201 172.16.201.21 255.255.255.0 0.0.0.0 001e.e51c.a7ff Information About Network Address Translation (NAT) NAT enables private IP networks that use non-registered IP addresses to connect to the Internet. NAT operates on a device, usually connecting two networks. Before packets are forwarded onto another network, NAT translates the private (not globally unique) addresses from the internal network into public addresses. NAT can be configured to advertise to the outside world only few addresses for the entire internal network. This ability provides more security by effectively hiding the private network details. If you want to deploy your Cisco Catalyst 9800 Wireless Controller on a private network and make it reachable from internet, you need to have the controller behind a router, firewall, or other gateway device that uses one-to-one mapping Network Address Translation (NAT). To do so, perform the following: · Configure the NAT device with 1:1 static mapping of the Wireless Management interface IP address (private IP) to a unique external (public) IP address configured on the NAT device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 51 Information About CAPWAP Discovery System Configuration · Enable the NAT feature on the Wireless Controller and specify its external public IP address. This public IP is used in the discovery responses to APs, so that the APs can then send CAPWAP packets to the right destination. · Make sure that the external APs discover the public IP of the controller using DHCP, DNS, or PnP. Note You need not enable NAT if the Cisco Catalyst 9800 Wireless Controller is deployed with a public address. Instead you will need to configure the public IP directly on the Wireless Management Interface (WMI). Information About CAPWAP Discovery In a CAPWAP environment, a lightweight access point discovers a wireless controller by using CAPWAP discovery mechanisms, and then sends a CAPWAP join request to the controller. The controller sends a CAPWAP join response to the access point that allows the access point to join the controller. If the wireless controller is behind a NAT device, the controller responds to the discovery response in the following ways: · Using the public IP. · Using the private IP. · Using public and private IP. The Public IP needs to be mapped to the controller's Private IP using static 1:1 NAT configuration on the router or firewall performing the NAT translation. If your wireless controller manages only Access Points reachable through the public internet (external APs), you need to configure the controller so it responds with only the Public IP in the discovery response. If your wireless controller manages both internal and external APs, you need to configure the controller so it responds with both Public and Private IPs in the discovery response. Configuring Wireless Management Interface with a NAT Public IP (CLI) The first step is to configure the controller to use the public NAT IP (this is the public IP that has been configured on the NAT device to statically map 1:1 the WMI's private IP address). Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 52 System Configuration Configuring CAPWAP Discovery to Respond Only with Public or Private IP (CLI) Step 2 Step 3 Step 4 Command or Action Purpose wireless management interface interface-type Defines the management interface. interface-number Here, Example: Device(config)# wireless management interface vlan 20 · interface-type--Refers to the VLAN, Gigabit, or loopback types. · interface-number--Is the interface number. public-ip external-public-ip Defines the external NAT or Public IP. Example: Device(config-mgmt-interface)# public-ip 2.2.2.2 end Example: Device(config-mgmt-interface)# end Returns to privileged EXEC mode. Configuring CAPWAP Discovery to Respond Only with Public or Private IP (CLI) Note By default, if the wireless management interface is configured with a public IP, the controller responds with both Public and Private IP in the CAPWAP discovery response. The setting to determine the IP (private or public) to include in the discovery response is available in the AP Join profile. Configuring the Controller to Respond only with a Public IP (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap profile profile-name Example: Configures an AP profile and enters AP profile configuration mode. Device(config)# ap profile xyz-ap-profile Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 53 Configuring the Controller to Respond only with a Private IP (CLI) System Configuration Step 3 Step 4 Command or Action no capwap-discovery private Example: Device(config-ap-profile)# no capwap-discovery private end Example: Device(config-ap-profile)# end Purpose Instructs the controller to not respond with the internal IP. Enables AP to join the controller over Public IP only. Returns to privileged EXEC mode. Configuring the Controller to Respond only with a Private IP (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap profile profile-name Example: Configures an AP profile and enters AP profile configuration mode. Device(config)# ap profile xyz-ap-profile Step 3 no capwap-discovery public Example: Device(config-ap-profile)# no capwap-discovery public Instructs the controller to not respond with the public IP. Enables AP to join the controller over private IP only. Step 4 end Example: Device(config-ap-profile)# end Returns to privileged EXEC mode. Verifying NAT Settings To verify if the wireless management interface is configured with the correct NAT IP address or not, use the following command: Device# show wireless interface summary Wireless Interface Summary Interface Name Interface Type VLAN ID IP Address IP Netmask NAT-IP Address MAC Address -------------------------------------------------------------------------------------------------- Vlan20 Management 20 10.58.20.25 255.255.255.0 2.2.2.2 001e.4963.1cff Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 54 System Configuration To verify the settings in the AP join profile, use the following command Device# show run | b ap profile ap profile default-ap-profile no capwap-discovery private description "default ap profile" ... Verifying NAT Settings Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 55 Verifying NAT Settings System Configuration Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 56 4 C H A P T E R BIOS Protection · BIOS Protection on the Controller, on page 57 · BIOS or ROMMON Upgrade with BIOS Protection, on page 57 · Upgrading BIOS, on page 58 BIOS Protection on the Controller BIOS Protection enables you to protect and securely update BIOS flash for Intel-based platforms. If BIOS Protection is not used, the flash utility that stores the BIOS for an Intel platform is not write-protected. As a result, when BIOS updates are applied, malicious code also makes its way through. By default, BIOS Protection works by bundling the flash containing the BIOS image, and by accepting updates only through the BIOS capsules that enable writing on the BIOS Flash. BIOS or ROMMON Upgrade with BIOS Protection To upgrade BIOS or ROMMON use the BIOS Protection feature as follows: 1. The new BIOS image capsule bundled together with the ROMMON binary is inserted into the media of the Cisco device by the ROMMON upgrade scripts. 2. The Cisco device is then reset for the new BIOS/ROMMON upgrade to take place. 3. On reset, the original BIOS detects the updated capsule and determines if the updated BIOS is available. 4. The original BIOS then verifies the digital signature of the BIOS capsule. If the signature is valid, the original BIOS will remove write-protection from the flash utility and update the SPI flash with the new BIOS image. If the BIOS capsule is invalid, the SPI flash is not updated. 5. After the new BIOS/ROMMON image is written to the SPI flash, the required regions of the SPI flash are once again write-protected. 6. After the card is reset, the updated BIOS is rebooted. 7. The capsule is deleted by BIOS. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 57 Upgrading BIOS System Configuration Upgrading BIOS Procedure Use the upgrade rom-monitor filename command to update the BIOS capsule. Example: upgrade rom-monitor filename bootflash:capsule.pkg <slot> Example The following example shows you how to verify a BIOS Protection upgrade: Device# upgrade rom-monitor filename bootflash:qwlc-rommon-capsule-p106.pkg all Verifying the code signature of the ROMMON package... Chassis model AIR-CT5540-K9 has a single rom-monitor. Upgrade rom-monitor Target copying rom-monitor image file Secure update of the ROMMON image will occur after a reload. 8388608+0 records in 8388608+0 records out 8388608 bytes (8.4 MB, 8.0 MiB) copied, 11.9671 s, 701 kB/s 131072+0 records in 131072+0 records out 131072 bytes (131 kB, 128 KiB) copied, 0.414327 s, 316 kB/s Copying ROMMON environment 8388608+0 records in 8388608+0 records out 8388608 bytes (8.4 MB, 8.0 MiB) copied, 31.1199 s, 270 kB/s 131072+0 records in 131072+0 records out 131072 bytes (131 kB, 128 KiB) copied, 2.44015 s, 53.7 kB/s 131072+0 records in 131072+0 records out 131072 bytes (131 kB, 128 KiB) copied, 2.43394 s, 53.9 kB/s ROMMON upgrade complete. To make the new ROMMON permanent, you must restart the RP. Device#reload Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 58 5 C H A P T E R Smart Licensing Using Policy · Introduction to Smart Licensing Using Policy, on page 59 · Information About Smart Licensing Using Policy, on page 60 · How to Configure Smart Licensing Using Policy: Workflows by Topology , on page 86 · Migrating to Smart Licensing Using Policy, on page 100 · Task Library for Smart Licensing Using Policy, on page 121 · Troubleshooting Smart Licensing Using Policy, on page 164 · Additional References for Smart Licensing Using Policy, on page 176 · Feature History for Smart Licensing Using Policy, on page 176 Introduction to Smart Licensing Using Policy Smart Licensing Using Policy is an enhanced version of Smart Licensing, with the overarching objective of providing a licensing solution that does not interrupt the operations of your network, rather, one that enables a compliance relationship to account for the hardware and software licenses you purchase and use. Smart Licensing Using Policy is supported starting with Cisco IOS XE Amsterdam 17.3.2a. The primary benefits of this enhanced licensing model are: · Seamless day-0 operations After a license is ordered, no preliminary steps, such as registration or generation of keys etc., are required unless you use an export-controlled or enforced license. There are no export-controlled or enforced licenses on Cisco Catalyst Wireless Controllers and product features can be configured on the device right-away. · Consistency in Cisco IOS XE Campus and industrial ethernet switching, routing, and wireless devices that run Cisco IOS XE software, have a uniform licensing experience. · Visibility and manageability Tools, telemetry and product tagging, to know what is in-use. · Flexible, time series reporting to remain compliant Easy reporting options are available, whether you are directly or indirectly connected to Cisco Smart Software Manager (CSSM), or in an air-gapped network. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 59 Information About Smart Licensing Using Policy System Configuration This document provides conceptual, configuration, and troubleshooting information for Smart Licensing Using Policy on Cisco Catalyst Wireless Controllers. For a more detailed overview on Cisco Licensing, go to cisco.com/go/licensingguide. Information About Smart Licensing Using Policy This section provides conceptual information about Smart Licensing Using Policy, supported products, an overview of each supported topology, and explains how Smart Licensing Using Policy interacts, with other features. Overview Smart Licensing Using Policy is a software license management solution that provides a seamless experience with the various aspects of licensing. · Purchase licenses: Purchase licenses through the existing channels and use the Cisco Smart Software Manager (CSSM) portal to view product instances and licenses. Note For new hardware or software orders, Cisco simplifies the implementation of Smart Licensing Using Policy, by factory-installing the following (terms are explained in the Concepts, on page 64 section further below): · A custom policy, if available. · A trust code, which ensures authenticity of data sent to CSSM. This is installed starting with Cisco IOS XE Cupertino 17.7.1. This trust code cannot be used to communicate with CSSM. · Use: All licenses on Cisco Catalyst Wireless Controllers are unenforced. This means that you do not have to complete any licensing-specific operations, such as registering or generating keys before you start using the software and the licenses that are tied to it. License usage is recorded on your device with timestamps and the required workflows can be completed at a later date. · Report license usage to CSSM: Multiple options are available for license usage reporting. You can use Cisco Smart Licensing Utility (CSLU), or report usage information directly to CSSM. For air-gapped networks, a provision for offline reporting where you download usage information and upload it to CSSM, is also available.The usage report is in plain text XML format. See: Sample Resource Utilization Measurement Report, on page 164. · Reconcile: For situations where delta billing applies (purchased versus consumed). Supported Products This section provides information about the Cisco IOS-XE product instances that support Smart Licensing Using Policy. All models (Product IDs or PIDs) in a product series are supported unless indicated otherwise. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 60 System Configuration Architecture Table 3: Supported Product Instances: Cisco Catalyst Wireless Controllers Cisco Catalyst Wireless Controllers Cisco Catalyst 9800-40 Wireless Controller When Support for Smart Licensing Using Policy was Introduced Cisco IOS XE Amsterdam 17.3.2a Cisco Catalyst 9800-L Wireless Controller Cisco IOS XE Amsterdam 17.3.2a Cisco Catalyst 9800-CL Wireless Controller Cisco IOS XE Amsterdam 17.3.2a Cisco Catalyst 9800 embedded Wireless Controller Cisco IOS XE Amsterdam 17.3.2a Cisco Embedded Wireless Controller on Cisco Catalyst 9100 Cisco IOS XE Amsterdam 17.3.2a Access Points (EWC-AP) Architecture This section explains the various components that can be part of your implementation of Smart Licensing Using Policy. One or more components make up a topology. Product Instance A product instance is a single instance of a Cisco product, identified by a Unique Device Identifier (UDI). A product instance records and reports license usage (RUM reports), and provides alerts and system messages about overdue reports, communication failures, etc. RUM reports and usage data are securely stored in the product instance. Throughout this document, the term product instance refers to all supported physical and virtual product instances - unless noted otherwise. For information about the product instances that are within the scope of this document, see Supported Products, on page 60. CSLU Cisco Smart License Utility (CSLU) is a Windows-based reporting utility that provides aggregate licensing workflows. This utility performs the following key functions: · Provides options relating to how workflows are triggered. The workflows can be triggered by CSLU or by a product instance. · Collects usage reports from one or more product instances and uploads these usage reports to the corresponding Smart Account or Virtual Account online, or offline, using files. Similarly, the RUM report ACK is collected online, or offline, and sent back to the product instance. · Sends authorization code requests to CSSM and receives authorization codes from CSSM, if applicable. CSLU can be part of your implementation in the following ways: · Install the windows application, to use CSLU as a standalone tool that is connected to CSSM. · Install the windows application, to use CSLU as a standalone tool that is disconnected from CSSM. With this option, the required usage information is downloaded to a file and then uploaded to CSSM. This is suited to air-gapped networks. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 61 CSSM System Configuration CSSM Controller · Embedded (by Cisco) in a controller such as Cisco DNA Center. · Deploy CSLU on a machine (laptop or desktop) running Linux. CSLU supports Windows 10 and Linux operating systems. For release notes and to download the latest version, click Smart Licensing Utility on the Software Download page Cisco Smart Software Manager (CSSM) is a portal that enables you to manage all your Cisco software licenses from a centralized location. CSSM helps you manage current requirements and review usage trends to plan for future license requirements. You can access the CSSM Web UI at https://software.cisco.com. Under the License tab, click the Smart Software Licensing link. See the Supported Topologies, on page 69 section to know about the different ways in which you can connect to CSSM In CSSM you can: · Create, manage, or view virtual accounts. · Create and manage Product Instance Registration Tokens. · Transfer licenses between virtual accounts or view licenses. · Transfer, remove, or view product instances. · Run reports against your virtual accounts. · Modify your email notification settings. · View overall account information. A management application or service that manages multiple product instances. Note Throughout this chapter, and in the context of Smart Licensing Using Policy, the term "controller"or "Controller" always means a management application or service that manages a product instance. The term is not used to refer to Cisco Catalyst Wireless Controllers, which are product instances. On Cisco Catalyst Wireless Controllers, Cisco DNA Center is the supported controller. Information about the controller, product instances that support the controller, and minimum required software versions on the controller and on the product instance is provided below: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 62 System Configuration SSM On-Prem Table 4: Support Information for Controller: Cisco DNA Center Minimum Required Cisco DNA Minimum Required Cisco IOS XE Supported Product Instances Center Version for Smart Licensing Version2 Using Policy1 Cisco DNA Center Release 2.2.2 Cisco IOS XE Amsterdam 17.3.2a · Cisco Catalyst 9800-40 Wireless Controller · Cisco Catalyst 9800-80 Wireless Controller · Cisco Catalyst 9800-L Wireless Controller · Cisco Catalyst 9800-CL Wireless Controller · Cisco Catalyst 9800 embedded Wireless Controller · Cisco Embedded Wireless Controller on Cisco Catalyst 9100 Access Points (EWC-AP) 1 The minimum required software version on the controller. This means support continues on all subsequent releases - unless noted otherwise 2 The minimum required software version on the product instance. This means support continues on all subsequent releases - unless noted otherwise. For more information about Cisco DNA Center, see the support page at: https://www.cisco.com/c/en/us/support/cloud-systems-management/dna-center/series.html. SSM On-Prem Smart Software Manager On-Prem (SSM On-Prem) is an asset manager, which works in conjunction with CSSM. It enables you to administer products and licenses on your premises instead of having to directly connect to CSSM. Information about the required software versions to implement Smart Licensing Using Policy with SSM On-Prem, is provided below: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 63 Concepts System Configuration Minimum Required SSM On-Prem Minimum Required Cisco IOS XE Supported Product Instances Version for Smart Licensing Using Version4 Policy3 Version 8, Release 202102 Cisco IOS XE Amsterdam 17.3.3 · Cisco Catalyst 9800-40 Wireless Controller · Cisco Catalyst 9800-80 Wireless Controller · Cisco Catalyst 9800-L Wireless Controller · Cisco Catalyst 9800-CL Wireless Controller · Cisco Catalyst 9800 embedded Wireless Controller · Cisco Embedded Wireless Controller on Cisco Catalyst 9100 Access Points (EWC-AP) 3 The minimum required SSM On-Prem version. This means support continues on all subsequent releases - unless noted otherwise 4 The minimum required software version on the product instance. This means support continues on all subsequent releases - unless noted otherwise. For more information about SSM On-Prem, see Smart Software Manager On-Prem on the Software Download page. Hover over the .iso image to display the documentation links. Concepts This section explains the key concepts of Smart Licensing Using Policy. License Enforcement Types A given license belongs to one of three enforcement types. The enforcement type indicates if the license requires authorization before use, or not. · Unenforced or Not Enforced Unenforced licenses do not require authorization before use in air-gapped networks, or registration, in connected networks. The terms of use for such licenses are as per the end user license agreement (EULA). All licenses available on Cisco Catalyst Wireless Controllers are unenforced licenses. · Enforced Licenses that belong to this enforcement type require authorization before use. The required authorization is in the form of an authorization code, which must be installed in the corresponding product instance. An example of an enforced license is the Media Redundancy Protocol (MRP) Client license, which is available on Cisco's Industrial Ethernet Switches. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 64 System Configuration License Duration · Export-Controlled Licences that belong to this enforcement type are export-restricted by U.S. trade-control laws and these licenses require authorization before use. The required authorization code must be installed in the corresponding product instance for these licenses as well. Cisco may pre-install export-controlled licenses when ordered with hardware purchase. An example of an export-controlled license is the High Speed Encryption (HSECK9) license, which is available on certain Cisco Routers. License Duration This refers to the duration or term for which a purchased license is valid. A given license may belong to any one of the enforcement types mentioned above and be valid for the following durations: · Perpetual: There is no expiration date for such a license. AIR Network Essentials and AIR Network Advantage licenses are examples of unenforced, perpetual licenses that are available on Cisco Catalyst Wireless Controllers. · Subscription: The license is valid only until a certain date. AIR Digital Network Architecture (DNA) Essentials and AIR DNA Advantage licenses are examples of unenforced subscription licenses that are available on Cisco Catalyst Wireless Controllers. Authorization Code The Smart Licensing Authorization Code (SLAC) allows activation and continued use of a license that is export-controlled or enforced. A SLAC is not required for any of the licenses available on Cisco Catalyst Wireless Controllers, but if you are upgrading from an earlier licensing model to Smart Licensing Using Policy, you may have a Specific License Reservation (SLR) with its own authorization code. The SLR authorization code is supported after upgrade to Smart Licensing Using Policy. Policy Note While existing SLRs are carried over after upgrade, you cannot request a new SLR in the Smart Licensing Using Policy environment, because the notion of "reservation" does not apply. For an air-gapped network, the No Connectivity to CSSM and No CSLU topology applies instead For more information about how the SLR authorization code is handled, see Upgrades, on page 81. If you want to return an SLR authorization code, see Removing and Returning an Authorization Code, on page 151. A policy provides the product instance with these reporting instructions: · License usage report acknowledgement requirement (Reporting ACK required): The license usage report is known as a RUM Report and the acknowledgement is referred to as an ACK (See RUM Report and Report Acknowledgement). This is a yes or no value which specifies if the report for this product instance requires CSSM acknowledgement or not. The default policy is always set to "yes". · First report requirement (days): The first report must be sent within the duration specified here. If the value here is zero, no first report is required. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 65 Policy System Configuration · Reporting frequency (days): The subsequent report must be sent within the duration specified here. If the value here is zero, it means no further reporting is required unless there is a usage change. · Report on change (days): In case of a change in license usage, a report must be sent within the duration specified here. If the value here is zero, no report is required on usage change. If the value here is not zero, reporting is required after the change is made. All the scenarios listed below count as changes in license usage on the product instance: · Changing licenses consumed (includes changing to a different license, and, adding or removing a license). · Going from consuming zero licenses to consuming one or more licenses. · Going from consuming one or more licenses to consuming zero licenses. Note If a product instance has never consumed a license, reporting is not required even if the policy has a non-zero value for any of the reporting requirements (First report requirement, Reporting frequency, Report on change). Understanding Policy Selection CSSM determines the policy that is applied to a product instance. Only one policy is in use at a given point in time. The policy and its values are based on a number of factors, including the licenses being used. Cisco default is the default policy that is always available in the product instance. If no other policy is applied, the product instance applies this default policy. The table below (Table 5: Policy: Cisco default, on page 66) shows the Cisco default policy values. While you cannot configure a policy, you can request for a customized one, by contacting the Cisco Global Licensing Operations team. Go to Support Case Manager. Click OPEN NEW CASE > Select Software Licensing. The licensing team will contact you to start the process or for any additional information. Customized policies are also made available through your Smart account in CSSM. Note To know which policy is applied (the policy in-use) and its reporting requirements, enter the show license all command in privileged EXEC mode. Table 5: Policy: Cisco default Policy: Cisco default Default Policy Values Export (Perpetual/Subscription) Note Applied only to licenses with enforcement type "Export-Controlled". Reporting ACK required: Yes First report requirement (days): 0 Reporting frequency (days): 0 Report on change (days): 0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 66 System Configuration RUM Report and Report Acknowledgement Policy: Cisco default Default Policy Values Enforced (Perpetual/Subscription) Reporting ACK required: Yes Note Applied only to licenses First report requirement (days): 0 with enforcement type "Enforced". Reporting frequency (days): 0 Report on change (days): 0 Unenforced/Non-Export Perpetual5 Reporting ACK required: Yes First report requirement (days): 365 Reporting frequency (days): 0 Report on change (days): 90 Unenforced/Non-Export Subscription Reporting ACK required: Yes First report requirement (days): 90 Reporting frequency (days): 90 Report on change (days): 90 5 For Unenforced/Non-Export Perpetual: the default policy's first report requirement (within 365 days) applies only if you have purchased hardware or software from a distributor or partner. RUM Report and Report Acknowledgement A Resource Utilization Measurement report (RUM report) is a license usage report, which fulfils reporting requirements as specified by the policy. RUM reports are generated by the product instance and consumed by CSSM. The product instance records license usage information and all license usage changes in an open RUM report. At system-determined intervals, open RUM reports are closed and new RUM reports are opened to continue recording license usage. A closed RUM report is ready to be sent to CSSM. A RUM acknowledgement (RUM ACK or ACK) is a response from CSSM and provides information about the status of a RUM report. Once the ACK for a report is available on the product instance, it indicates that the corresponding RUM report is no longer required and can be deleted. The reporting method, that is, how a RUM report is sent to CSSM, depends on the topology you implement. CSSM displays license usage information as per the last received RUM report. A RUM report may be accompanied by other requests, such as a trust code request, or a SLAC request. So in addition to the RUM report IDs that have been received, an ACK from CSSM may include authorization codes, trust codes, and policy files. The policy that is applied to a product instance determines the following aspects of the reporting requirement: · Whether a RUM report is sent to CSSM and the maximum number of days provided to meet this requirement. · Whether the RUM report requires an acknowledgement (ACK) from CSSM. · The maximum number of days provided to report a change in license consumption. If the product instance you are using is a Cisco Catalyst 9800-CL Wireless Controller, ensure that you are familiar with the conditions for a mandatory ACK starting with Cisco IOS XE Cupertino 17.7.1. For more Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 67 Trust Code System Configuration Trust Code information, see RUM Reporting and Acknowledgment Requirement for Cisco Catalyst 9800-CL Wireless Controller, on page 121. RUM report generation, storage, and management Starting with Cisco IOS XE Cupertino 17.7.1, RUM report generation and related processes have been optimized and enhanced as follows: · You can display the list of all available RUM reports on a product instance (how many there are, the processing state each one is in, if there are errors in any of them, and so on). This information is available in the show license rum, show license all, and show license tech privileged EXEC commands. For detailed information about the fields displayed in the output, see the command reference of the corresponding release. · RUM reports are stored in a new format that reduces processing time, and reduces memory usage. In order to ensure that there are no usage reporting inconsistencies resulting from the difference in the old and new formats, we recommend that you send a RUM report in the method that will apply to your topology, in these situations: When you upgrade from an earlier release supporting Smart Licensing Using Policy, to Cisco IOS XE Cupertino 17.7.1 or a later release. When you downgrade from Cisco IOS XE Cupertino 17.7.1 or a later release to an earlier release supporting Smart Licensing Using Policy. · To ensure continued disk space and memory availability, the product instance detects and triggers deletion of RUM reports that are deemed eligible. A UDI-tied public key, which the product instance uses to · Sign a RUM report. This prevents tampering and ensures data authenticity. · Enable secure communication with CSSM. There are multiple ways to obtain a trust code. · From Cisco IOS XE Cupertino 17.7.1, a trust code is factory-installed for all new orders. Note A factory-installed trust code cannot be used for communication with CSSM. · A trust code can obtained from CSSM, using an ID token. Here you generate an ID token in the CSSM Web UI to obtain a trust code and install it on the product instance. You must overwrite the factory-installed trust code if there is one. If a product instance is directly connected to CSSM, use this method to enable the product instance to communicate with CSSM in a secure manner. This method of obtaining a trust code is applicable to all the options of directly connecting to CSSM. For more information, see Connected Directly to CSSM, on page 71. · From Cisco IOS XE Cupertino 17.7.1, a trust code is automatically obtained in topologies where the product instance initiates the sending of data to CSLU and in topologies where the product instance is in an air-gapped network. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 68 System Configuration Supported Topologies From Cisco IOS XE Cupertino 17.9.1, a trust code is automatically obtained in topologies where CSLU initiates the retrieval of data from the product instance. If there is a factory-installed trust code, it is automatically overwritten. A trust code obtained this way can be used for secure communication with CSSM. Refer to the topology description and corresponding workflow to know how the trust code is requested and installed in each scenario: Supported Topologies, on page 69. If a trust code is installed on the product instance, the output of the show license status command displays a timestamp in the Trust Code Installed: field. Supported Topologies This section describes the various ways in which you can implement Smart Licensing Using Policy. For each topology, refer to the accompanying overview to know the how the set-up is designed to work, and refer to the considerations and recommendations, if any. After Topology Selection After you have selected a topology, see How to Configure Smart Licensing Using Policy: Workflows by Topology , on page 86. These workflows are only for new deployments. They provide the simplest and fastest way to implement a topology. If you are migrating from an existing licensing model, see Migrating to Smart Licensing Using Policy, on page 100. After initial implementation, for any additional configuration tasks you have to perform, for instance, changing the AIR license, or synchronizing RUM reports, see the Task Library for Smart Licensing Using Policy. Note Always check the "Supported topologies" where provided, before you proceed. Connected to CSSM Through CSLU Overview: Here, product instances in the network are connected to CSLU, and CSLU becomes the single point of interface with CSSM. A product instance can be configured to push the required information to CSLU. Alternatively, CSLU can be set-up to pull the required information from a product instance at a configurable frequency. Product instance-initiated communication (push): A product instance initiates communication with CSLU, by connecting to a REST endpoint in CSLU. Data that is sent includes RUM reports and requests for authorization codes, UDI-tied trust codes, and policies. You can configure the product instance to automatically send RUM reports to CSLU at required intervals. This is the default method for a product instance. CSLU-initiated communication (pull): To initiate the retrieval of information from a product instance, CSLU uses NETCONF, or RESTCONF, or gRPC with YANG models, or native REST APIs, to connect to the product instance. Supported workflows include retrieving RUM reports from the product instance and sending the same to CSSM, authorization code installation, UDI-tied trust code installation, and application of policies. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 69 Connected to CSSM Through CSLU Figure 2: Topology: Connected to CSSM Through CSLU System Configuration Considerations or Recommendations: Choose the method of communication depending on your network's security policy. Release-Wise Changes and Enhancements: This section outlines important release-wise software changes and enhancements that affect this topology. From Cisco IOS XE Cupertino 17.7.1: · Trust code request and installation If a trust code is not available on the product instance, the product instance detects and automatically includes a request for one, as part of a RUM report. A corresponding ACK from CSSM includes the trust code. If there is an existing factory-installed trust code, it is automatically overwritten. A trust code obtained this way can be used for communication with CSSM. This is supported in a standalone, as well as a High Availability set-up. In a High Availability set-up, the active product instance requests the trust code for all connected product instances where a trust code is not available. In this release, this enhancement applies only to the product instance-initiated mode. From Cisco IOS XE Cupertino 17.9.1: · Trust code request and installation From this release, trust code request and installation is supported in the CSLU-initiated mode as well. · RUM report throttling In the product instance-initiated mode, the minimum reporting frequency is throttled to one day. This means the product instance does not send more than one RUM report a day. This resolves the problem of too many RUM reports being generated and sent for certain licenses. It also resolves the memory-related issues and system slow-down caused by an excessive generation of RUM reports. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 70 System Configuration Connected Directly to CSSM You can override the throttling restriction by entering the license smart sync command in privileged EXEC mode. RUM report throttling applies to the Cisco IOS XE Amsterdam 17.3.6 and later releases of the 17.3.x trainand Cisco IOS XE Bengaluru 17.6.4 and later releases of the 17.6.x train. From Cisco IOS XE Cupertino 17.9.1, RUM report throttling is applicable to all subsequent releases. Where to Go Next: To implement this topology, see Workflow for Topology: Connected to CSSM Through CSLU, on page 86. Connected Directly to CSSM Overview: This topology is available in the earlier version of Smart Licensing and continues to be supported with Smart Licensing Using Policy. Here, you establish a direct and trusted connection from a product instance to CSSM. The direct connection, requires network reachability to CSSM. For the product instance to then exchange messages and communicate with CSSM, configure one of the transport options available with this topology (described below). Lastly, the establishment of trust requires the generation of a token from the corresponding Smart Account and Virtual Account in CSSM, and installation on the product instance. Note A factory-installed trust code cannot be used for communication with CSSM. This means that for this topology, even if a factory-installed trust code exists, you must obtain a trust code by generating an ID token in CSSM, and you must overwrite the existing factory-installed trust code. Also see: Trust Code, on page 68. You can configure a product instance to communicate with CSSM in the following ways: · Use Smart transport to communicate with CSSM Smart transport is a transport method where a Smart Licensing (JSON) message is contained within an HTTPs message, and exchanged between a product instance and CSSM, to communicate. The following Smart transport configuration options are available: · Smart transport: In this method, a product instance uses a specific Smart transport licensing server URL. This must be configured exactly as shown in the workflow section. · Smart transport through an HTTPs proxy: In this method, a product instance uses a proxy server to communicate with the licensing server, and eventually, CSSM. · Use Call Home to communicate with CSSM. Call Home provides e-mail-based and web-based notification of critical system events. This method of connecting to CSSM is available in the earlier Smart Licensing environment, and continues to be available with Smart Licensing Using Policy. The following Call Home configuration options are available: · Direct cloud access: In this method, a product instance sends usage information directly over the internet to CSSM; no additional components are needed for the connection. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 71 Connected Directly to CSSM System Configuration · Direct cloud access through an HTTPs proxy: In this method, a product instance sends usage information over the internet through a proxy server - either a Call Home Transport Gateway or an off-the-shelf proxy (such as Apache) to CSSM. Figure 3: Topology: Connected Directly to CSSM Considerations or Recommendations: Smart transport is the recommended transport method when directly connecting to CSSM. This recommendation applies to: · New deployments. · Earlier licensing models. Change configuration after migration to Smart Licensing Using Policy. · Registered licenses that currently use the Call Home transport method. Change configuration after migration to Smart Licensing Using Policy. · Evaluation or expired licenses in an earlier licensing model. Change configuration after migration to Smart Licensing Using Policy. To change configuration after migration, see Workflow for Topology: Connected Directly to CSSM, on page 89 > Product Instance Configuration > Configure a connection method and transport type > Option 1. Release-Wise Changes and Enhancements: This section outlines important release-wise software changes and enhancements that affect this topology. From Cisco IOS XE Cupertino 17.9.1: · RUM report throttling The minimum reporting frequency for this topology, is throttled to one day. This means the product instance does not send more than one RUM report a day. This resolves the problem of too many RUM reports being generated and sent for certain licenses. It also resolves the memory-related issues and system slow-down caused by an excessive generation of RUM reports. You can override the throttling restriction by entering the license smart sync command in privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 72 System Configuration CSLU Disconnected from CSSM RUM report throttling applies to the Cisco IOS XE Amsterdam 17.3.6 and later releases of the 17.3.x trainand Cisco IOS XE Bengaluru 17.6.4 and later releases of the 17.6.x train. From Cisco IOS XE Cupertino 17.9.1, RUM report throttling is applicable to all subsequent releases. Where to Go Next: To implement this topology, see Workflow for Topology: Connected Directly to CSSM, on page 89. CSLU Disconnected from CSSM Overview: Here, a product instance communicates with CSLU, and you have the option of implementing product instance-initiated communication or CSLU-initiated communication (as in the Connected to CSSM Through CSLU topology). The other side of the communication, between CSLU and CSSM, is offline. CSLU provides you with the option of working in a mode that is disconnected from CSSM. Communication between CSLU and CSSM is sent and received in the form of signed files that are saved offline and then uploaded to or downloaded from CSLU or CSSM, as the case may be. Figure 4: Topology: CSLU Disconnected from CSSM Considerations or Recommendations: Choose the method of communication depending on your network's security policy. Release-Wise Changes and Enhancements: This section outlines important release-wise software changes and enhancements that affect this topology. From Cisco IOS XE Cupertino 17.7.1: · Trust code request and installation If a trust code is not available on the product instance, the product instance detects and automatically includes a request for one, as part of a RUM report that is sent to CSLU, which you upload to CSSM. The ACK that you download from CSSM includes the trust code. If there is an existing factory-installed Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 73 Connected to CSSM Through a Controller System Configuration trust code, it is automatically overwritten. A trust code obtained this way can be used for communication with CSSM. This is supported in a standalone, as well as a High Availability set-up. In a High Availability set-up, the active product instance requests the trust code for members or standbys where a trust code is not available. In this release, this enhancement applies only to the product instance-initiated mode. From Cisco IOS XE Cupertino 17.9.1: · Trust code request and installation From this release, trust code request and installation is supported in the CSLU-initiated mode as well. · RUM report throttling In the product instance-initiated mode, the minimum reporting frequency is throttled to one day. This means the product instance does not send more than one RUM report a day. This resolves the problem of too many RUM reports being generated and sent for certain licenses. It also resolves the memory-related issues and system slow-down caused by an excessive generation of RUM reports. You can override the throttling restriction by entering the license smart sync command in privileged EXEC mode. RUM report throttling applies to the Cisco IOS XE Amsterdam 17.3.6 and later releases of the 17.3.x trainand Cisco IOS XE Bengaluru 17.6.4 and later releases of the 17.6.x train. From Cisco IOS XE Cupertino 17.9.1, RUM report throttling is applicable to all subsequent releases. Where to Go Next: To implement this topology, see Workflow for Topology: CSLU Disconnected from CSSM, on page 90. Connected to CSSM Through a Controller When you use a controller to manage a product instance, the controller connects to CSSM, and is the interface for all communication to and from CSSM. The supported controller for Cisco Catalyst Wireless Controllers is Cisco DNA Center. Overview: If a product instance is managed by Cisco DNA Center as the controller, the product instance records license usage and saves the same, but it is the Cisco DNA Center that initiates communication with the product instance to retrieve RUM reports, report to CSSM, and return the ACK for installation on the product instance. All product instances that must be managed by Cisco DNA Center must be part of its inventory and must be assigned to a site. Cisco DNA Center uses the NETCONF protocol to provision configuration and retrieve the required information from the product instance - the product instance must therefore have NETCONF enabled, to facilitate this. In order to meet reporting requirements, Cisco DNA Center retrieves the applicable policy from CSSM and provides the following reporting options: · Ad hoc reporting: You can trigger an ad hoc report when required. · Scheduled reporting: Corresponds with the reporting frequency specified in the policy and is automatically handled by Cisco DNA Center. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 74 System Configuration No Connectivity to CSSM and No CSLU Note Ad hoc reporting must be performed at least once before a product instance is eligible for scheduled reporting. The first ad hoc report enables Cisco DNA Center to determine the Smart Account and Virtual Account to which subsequent RUM reports must be uploaded. You will receive notifications if ad hoc reporting for a product instance has not been performed even once. Cisco DNA Center also enables you to install and remove SLAC for export-controlled licenses. Since all available licenses on Cisco Catalyst Wireless Controllers are unenforced licenses, SLAC installation and removal do not apply. A trust code is not required. Figure 5: Topology: Connected to CSSM Through a Controller Considerations or Recommendations: This is the recommended topology if you are using Cisco DNA Center. Where to Go Next: To implement this topology, see Workflow for Topology: Connected to CSSM Through a Controller, on page 93. No Connectivity to CSSM and No CSLU Overview: Here you have a product instance and CSSM disconnected from each other, and without any other intermediary utilities or components. All communication is in the form of uploaded and downloaded files. These files can be RUM reports and requests for UDI-tied trust codes. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 75 No Connectivity to CSSM and No CSLU Figure 6: Topology: No Connectivity to CSSM and No CSLU System Configuration Considerations or Recommendations: This topology is suited to a high-security deployment where a product instance cannot communicate online, with anything outside its network. Release-Wise Changes and Enahcements This section outlines the release-wise software changes and enhancements that affect this topology. From Cisco IOS XE Cupertino 17.7.1: · Trust code request and installation If a trust code is not available on the product instance, the product instance automatically includes a trust code request in the RUM report that you save, to upload to CSSM. The ACK that you then download from CSSM includes the trust code. If there is a factory-installed trust code, it is automatically overwritten when you install the ACK. A trust code obtained this way can be used for secure communication with CSSM. This is supported in a standalone, as well as a High Availability set-up. In a High Availability set-up, the active product instance requests the trust code for all connected product instances where a trust code is not available. · Simpler authorization code return A simpler way to upload an authorization code return file is available in the CSSM Web UI. You do not have to locate the product instance in the correct Virtual Account in the CSSM Web UI any longer. You can upload the return file, as you would a RUM report. Where to Go Next: To implement this topology, see Workflow for Topology: No Connectivity to CSSM and No CSLU, on page 94. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 76 System Configuration SSM On-Prem Deployment SSM On-Prem Deployment Overview: SSM On-Prem is designed to work as an extension of CSSM that is deployed on your premises. Here, a product instance is connected to SSM On-Prem, and SSM On-Prem becomes the single point of interface with CSSM. Each instance of SSM On-Prem must be made known to CSSM through a mandatory registration and synchronization of the local account in SSM On-Prem, with a Virtual Account in CSSM. When you deploy SSM On-Prem to manage a product instance, the product instance can be configured to push the required information to SSM On-Prem. Alternatively, SSM On-Prem can be set-up to pull the required information from a product instance at a configurable frequency. · Product instance-initiated communication (push): The product instance initiates communication with SSM On-Prem, by connecting to a REST endpoint in SSM On-Prem. Data that is sent includes RUM reports and requests for authorization codes, trust codes, and policies. Options for communication between the product instance and SSM On-Prem in this mode: · Use a CLI command to push information to SSM On-Prem as and when required. · Use a CLI command and configure a reporting interval, to automatically send RUM reports to SSM On-Prem at a scheduled frequency. · SSM On-Prem-initiated communication (pull): To initiate the retrieval of information from a product instance, SSM On-Prem NETCONF, RESTCONF, and native REST API options, to connect to the product instance. Supported workflows include receiving RUM reports from the product instance and sending the same to CSSM, authorization code installation, trust code installation, and application of policies. Options for communication between the product instance and SSM On-Prem in this mode: · Collect usage information from one or more product instances as and when required (on-demand). · Collect usage information from one or more product instances at a scheduled frequency. In SSM On-Prem, the reporting interval is set to the default policy on the product instance. You can change this, but only to report more frequently (a narrower interval), or you can install a custom policy if available. After usage information is available in SSM On-Prem, you must synchronize the same with CSSM, to ensure that the product instance count, license count and license usage information is the same on both, CSSM and SSM On-Prem. Options for usage synchronization between SSM On-Prem and CSSM for the push and pull mode: · Perform ad-hoc synchronization with CSSM (Synchronize now with Cisco). · Schedule synchronization with CSSM for specified times. · Communicate with CSSM through signed files that are saved offline and then upload to or download from SSM On-Prem or CSSM, as the case may be. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 77 SSM On-Prem Deployment System Configuration Note This topology involves two different kinds of synchronization between SSM On-Prem and CSSM. The first is where the local account is synchronized with CSSM - this is for the SSM On-Prem instance to be known to CSSM and is performed by using the Synchronization widget in SSM On-Prem. The second is where license usage is synchronized with CSSM, either by being connected to CSSM or by downloading and uploading files. You must synchronize the local account before you can synchronize license usage. Figure 7: Topology: SSM On-Prem Deployment Considerations or Recommendations: This topology is suited to the following situations: · If you want to manage your product instances on your premises, as opposed communicating directly with CSSM for this purpose. · If your company's policies prevent your product instances from reporting license usage directly to Cisco (CSSM). · If your product instances are in an air-gapped network and cannot communicate online, with anything outside their network. Apart from support for Smart Licensing Using Policy, some of the key benefits of SSM On-Prem Version 8 include: · Multi-tenancy: One tenant constitutes one Smart Account-Virtual Account pair. SSM On-Prem enables you to manage multiple pairs. Here you create local accounts that reside in SSM On-Prem. Multiple local accounts roll-up to a Smart Account-Virtual Account pair in CSSM. For more information, see the Cisco Smart Software Manager On-Prem User Guide > About Accounts and Local Virtual Accounts. Note The relationship between CSSM and SSM On-Prem instances is still one-to-one. · Scale: Supports up to a total of 300,000 product instances Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 78 System Configuration SSM On-Prem Deployment · High-Availability: Enables you to run two SSM On-Prem servers in the form of an active-standby cluster. For more information, see the Cisco Smart Software On-Prem Installation Guide > Appendix 4. Managing a High Availability (HA) Cluster in Your System. High-Availability deployment is supported on the SSM On-Prem console and the required command details are available in the Cisco Smart Software On-Prem Console Guide. · Options for online and offline connectivity to CSSM. SSM On-Prem Limitations: · Proxy support for communication with CSSM, for the purpose of license usage synchronization is available only from Version 8 202108 onwards. The use of a proxy for local account synchronization, which is performed by using the Synchronization widget, is available from the introductory SSM On-Prem release where Smart Licensing Using Policy is supported. · SSM On-Prem-initiated communication is not supported on a product instance that is in a Network Address Translation (NAT) set-up. You must use product instance-initiated communication, and further, you must enable SSM On-Prem to support a product instance that is in a NAT setup. Details are provided in the workflow for this topology. Release-Wise Changes and Enhancements: This section outlines important release-wise software changes and enhancements that affect this topology. From Cisco IOS XE Cupertino 17.9.1: · RUM report throttling In the product instance-initiated mode, the minimum reporting frequency is throttled to one day. This means the product instance does not send more than one RUM report a day. This resolves the problem of too many RUM reports being generated and sent for certain licenses. It also resolves the memory-related issues and system slow-down caused by an excessive generation of RUM reports. You can override the throttling restriction by entering the license smart sync command in privileged EXEC mode. RUM report throttling applies to the Cisco IOS XE Amsterdam 17.3.6 and later releases of the 17.3.x trainand Cisco IOS XE Bengaluru 17.6.4 and later releases of the 17.6.x train. From Cisco IOS XE Cupertino 17.9.1, RUM report throttling is applicable to all subsequent releases. Where to Go Next: To implement this topology, see Workflow for Topology: SSM On-Prem Deployment, on page 95 If you are migrating from an existing version of SSM On-Prem, the sequence in which you perform the various upgrade-related activities is crucial. See Migrating to a Version of SSM On-Prem That Supports Smart Licensing Using Policy, on page 119 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 79 Interactions with Other Features System Configuration Interactions with Other Features High Availability This section explains considerations that apply to a High Availability configuration, when running a software version that supports Smart Licensing Using Policy. The following High Availability set-ups are within the scope of this document: A dual-chassis set-up (could be fixed or modular), with the active in one chassis and a standby in the other chassis. A wireless N+1 topology, where "n" number of wireless controllers act as primary and a "+1" wireless controller acts as the secondary or fallback wireless controller for Access Points (APs). Each Access Point is configured with a primary and a secondary wireless controller. In case of a failure on the primary, all access points that were connected to the primary now fallback to the secondary wireless controller. Trust Code Requirements in a High Availability Set-Up The number of trust codes required depends on the number of UDIs. The active product instance can submit requests for all devices in the High Availability set-up and install all the trust codes that are returned in an ACK. Policy Requirements in a High Availability Set-Up There are no policy requirements that apply exclusively to a High Availability set-up. As in the case of a standalone product instance, only one policy exists in a High Availability set-up as well, and this is on the active. The policy on the active applies to any standbys in the set-up. Product Instance Functions in a High Availability Set-Up This section explains general product instance functions in a High Availability set-up, as well as what the product instance does when a new standby or secondary is added to an existing High Available set-up. For authorization and trust codes: The active product instance can request (if required) and install authorization codes and trust codes for standbys. For policies: The active product instance synchronizes with the standby. For reporting: Only the active product instance reports usage. The active reports usage information for all devices in the High Availability set-up. In addition to scheduled reporting, the following events trigger reporting: · The addition or removal of a standby. The RUM report includes information about the standby that was added or removed. · A switchover. · A reload. When one of the above events occur, the "Next report push" date of the show license status privileged EXEC command is updated. But it is the implemented topology and associated reporting method that determine if the report is sent by the product instance or not. For example, if you have implemented a topology where the product instance is disconnected (Transport Type is Off), then the product instance does not send RUM reports even if the "Next report push" date is updated. For addition or removal of a new standby: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 80 System Configuration Upgrades · A product instance that is connected to CSLU, does not take any further action. · A product instance that is directly connected to CSSM, performs trust synchronization. Trust synchronization involves the following: Installation of trust code on the standby if not installed already. If a trust code is already installed, the trust synchronization process ensures that the new standby is in the same Smart Account and Virtual Account as the active. If it is not, the new standby is moved to the same Smart Account and Virtual Account as the active. Installation of an authorization code, policy, and purchase information, if applicable Sending of a RUM report with current usage information. For addition or removal of a secondary: There are no product instance functions that apply exclusively to the addition or removal of a secondary product instance. Further, all the secondary product instances are in the same Smart Account and Virtual Account as the primary product instance. Upgrades This section explains the following aspects: Migrating from earlier licensing models to Smart Licensing Using Policy. When migrating from earlier licensing models, also see the Migrating to Smart Licensing Using Policy, on page 100 section for examples of migration scenarios that apply to Cisco Catalyst Wireless Controllers. Upgrading in the Smart Licensing Using Policy environment - where the software version you are upgrading from and the software version you are upgrading to, both support Smart Licensing Using Policy. Identifying the Current Licensing Model Before Upgrade Before you upgrade to Smart Licensing Using Policy, if you want to know the current licensing model that is effective on the product instance, enter the show license all command in privileged EXEC mode. How Upgrade Affects Enforcement Types for Existing Licenses When you upgrade to a software version which supports Smart Licensing Using Policy, the way existing licenses are handled, depends primarily on the license enforcement type. · An unenforced license that was being used before upgrade, continues to be available after the upgrade. All licenses on Cisco Catalyst Wireless Controllers are unenforced licenses. This includes licenses from all earlier licensing models: · Smart Licensing · Specific License Reservation (SLR), which has an accompanying authorization code. The authorization code continues to be valid after upgrade to Smart Licensing Using Policy and authorizes existing license consumption. · Evaluation or expired licenses from any of the above mentioned licensing models. · An enforced or export-controlled license that was being used before upgrade, continues to be available after upgrade if the required authorization exists. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 81 How Upgrade Affects Reporting for Existing Licenses System Configuration There are no export-controlled or enforced licenses on any of the supported Cisco Catalyst Wireless Controllers, therefore, these enforcement types and the requisite SLAC do not apply. How Upgrade Affects Reporting for Existing Licenses Existing License Reporting Requirements After Migration to Smart Licensing Using Policy Specific License Reservation (SLR) Required only if there is a change in license consumption. An existing SLR authorization code authorizes existing license consumption after upgrade to Smart Licensing Using Policy. Smart Licensing (Registered and Authorized license) Depends on the policy. Evaluation or expired licenses Based on the reporting requirements of the Cisco default policy. How Upgrade Affects Transport Type for Existing Licenses The transport type, if configured in your existing set-up, is retained after upgrade to Smart Licensing Using Policy. When compared to the earlier version of Smart Licensing, additional transport types are available with Smart Licensing Using Policy. There is also a change in the default transport mode. The following table clarifies how this may affect upgrades: Transport type Before Upgrade License or License State Before Transport Type After Upgrade Upgrade Default (callhome) evaluation cslu (default in Smart Licensing Using Policy) SLR off registered callhome smart evaluation off SLR off registered smart How Upgrade Affects the Token Registration Process In the earlier version of Smart Licensing, a token was used to register and connect to CSSM. ID token registration is not required in Smart Licensing Using Policy. The token generation feature is still available in CSSM, and is used to establish trust when a product instance is directly connected to CSSM. See Connected Directly to CSSM. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 82 System Configuration Upgrades Within the Smart Licensing Using Policy Environment Upgrades Within the Smart Licensing Using Policy Environment This section covers any release-specific considerations or actions that apply when you upgrade the product instance from one release where Smart Licensing Using Policy is supported to another release where Smart Licensing Using Policy is supported. Starting with Cisco IOS XE Cupertino 17.7.1, RUM reports are stored in a format that reduces processing time. In order to ensure that there are no usage reporting inconsistencies resulting from the differences in the old and new formats, we recommend completing one round of usage reporting as a standard practice when upgrading from an earlier release that supports Smart Licensing Using Policy, to Cisco IOS XE Cupertino 17.7.1 or a later release. Downgrades This section provides information about downgrades to an earlier licensing model, for new deployments and existing deployments. It also covers information relevant to downgrades within in the Smart Licensing Using Policy environment. New Deployment Downgrade This section describes considerations and actions that apply if a newly purchased product instance with a software version where Smart Licensing Using Policy is enabled by default, is downgraded to a software version where Smart Licensing Using Policy is not supported. The outcome of the downgrade depends on whether a trust code was installed while still operating in the Smart Licensing Using Policy environment, and further action may be required depending on the release you downgrade to. If the topology you implemented while in the Smart Licensing Using Policy environment was "Connected Directly to CSSM", then a trust code installation can be expected or assumed, because it is required as part of topology implementation. For any of the other topologies, trust establishment is not mandatory. Downgrading product instances with one of these other topologies will therefore mean that you have to restore licenses to a registered and authorized state by following the procedures that are applicable in the Smart Licensing environment. See the table (Outcome and Action for New Deployment Downgrade to Smart Licensing) below. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 83 Upgrade and Then Downgrade System Configuration Table 6: Outcome and Action for New Deployment Downgrade to Smart Licensing In the Smart Licensing Using Policy Downgrade to.. Environment Outcome and Further Action Standalone product instance, connected directly to CSSM, and trust established. Cisco IOS XE Amsterdam 17.3.1 No further action is required. OR The product instance attempts to Cisco IOS XE Gibraltar 16.12.4 and later releases in Cisco IOS XE renew trust with CSSM after downgrade. Gibraltar 16.12.x After a successful renewal, licenses are in a registered state and the earlier version of Smart Licensing is effective on the product instance. Any other release (other than the Action is required: You must ones mentioned in the row above) reregister the product instance. that supports Smart Licensing Generate an ID token in the CSSM Web UI and on the product instance, configure the license smart register idtoken idtoken command in global configuration mode. High Availability set-up, connected Any release that supports Smart directly to CSSM, and trust Licensing established. Action is required: You must reregister the product instance. Generate an ID token in the CSSM Web UI and on the product instance, configure the license smart register idtoken idtoken all command in global configuration mode. Any other topology. (Connected to Any release that supports Smart CSSM Through CSLU, CSLU Licensing Disconnected from CSSM, No Connectivity to CSSM and No CSLU) Action is required. Restore licenses to a registered and authorized state by following the procedures that are applicable in the Smart Licensing environment. Upgrade and Then Downgrade This section describes considerations and actions that apply if a product instance is upgraded to a software version that supports Smart Licensing Using Policy and then downgraded to an earlier licensing model. When you downgrade such a product instance, license consumption does not change and any product features you have configured on the product instance are preserved only the features and functions that are available with Smart Licensing Using Policy are not available anymore. Refer to the corresponding section below to know more about reverting to an earlier licensing model. Upgrade to Smart Licensing Using Policy and then Downgrade to Smart Licensing Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 84 System Configuration Upgrade and Then Downgrade The outcome of the downgrade depends on whether a trust code was installed while you were still operating in the Smart Licensing Using Policy environment, and further action may be required depending on the release you downgrade to. See the table below. Table 7: Outcome and Action for Upgrade to Smart Licensing Using Policy and then Downgrade to Smart Licensing In the Smart Licensing Using Policy Downgrade to.. Environment Outcome and Further Action Standalone product instance, connected directly to CSSM, and trust established. Cisco IOS XE Amsterdam 17.3.1 No further action is required. OR The system recognizes the trust Cisco IOS XE Gibraltar 16.12.4 and later releases in Cisco IOS XE Gibraltar 16.12.x code and converts it back to a registered ID token, and this reverts the license to an AUTHORIZED and REGISTERED state. Any other release (other than the Action is required: You must ones mentioned in the row above) reregister the product instance. that supports Smart Licensing Generate an ID token in the CSSM Web UI and on the product instance, configure the license smart register idtokenidtoken command in global configuration mode. High Availability set-up, connected Any release that supports Smart directly to CSSM, and trust Licensing established. Action is required: You must reregister the product instance. Generate an ID token in the CSSM Web UI and on the product instance, configure the license smart register idtoken idtoken all command in global configuration mode. Any other topology (Connected to Any release that supports Smart CSSM Through CSLU, CSLU Licensing. Disconnected from CSSM, No Connectivity to CSSM and No CSLU) Action is required. Restore licenses to a registered and authorized state by following the procedures that are applicable in the Smart Licensing environment. Note Licenses that were in an evaluation or expired state in the Smart Licensing environment, revert to that same state after downgrade. Upgrade to Smart Licensing Using Policy and then Downgrade to SLR To revert to SLR, all that is required is for the image to be downgraded. The license remains reserved and authorized no further action is required. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 85 Downgrades Within the Smart Licensing Using Policy Environment System Configuration However, if you have returned an SLR while in the Smart Licensing Using Policy environment, then you must repeat the process of procuring an SLR as required, in the supported release. Downgrades Within the Smart Licensing Using Policy Environment This section covers any release-specific considerations or actions that apply when you downgrade the product instance from one release where Smart Licensing Using Policy is supported to another release where Smart Licensing Using Policy is supported. Starting with Cisco IOS XE Cupertino 17.7.1, RUM reports are stored in a format that reduces processing time. In order to ensure that there are no usage reporting inconsistencies resulting from the differences in the old and new formats, we recommend completing one round of usage reporting as a standard practice when downgrading from Cisco IOS XE Cupertino 17.7.1 or a later release to an earlier release supporting Smart Licensing Using Policy. How to Configure Smart Licensing Using Policy: Workflows by Topology This section provides the simplest and fastest way to implement a topology. Note These workflows are meant for new deployments only. If you are migrating from an existing licensing model, see Migrating to Smart Licensing Using Policy, on page 100. Workflow for Topology: Connected to CSSM Through CSLU Depending on whether you want to implement a product instance-initiated or CSLU-initiated method of communication, complete the corresponding sequence of tasks: · Tasks for Product Instance-Initiated Communication · Tasks for CSLU-Initiated Communication Tasks for Product Instance-Initiated Communication CSLU Installation CSLU Preference Settings Product Instance Configuration 1. CSLU Installation Where task is performed: A laptop, destop, or a Virtual Machine (VM) running Windows 10 or Linux. Download the file from Smart Software Manager > Smart Licensing Utility. Refer to Cisco Smart License Utility Quick Start Setup Guide and Cisco Smart Licensing Utility User Guide for help with installation and set-up. 2. CSLU Preference Settings Where tasks are performed: CSLU a. Logging into Cisco (CSLU Interface), on page 124 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 86 System Configuration Workflow for Topology: Connected to CSSM Through CSLU b. Configuring a Smart Account and a Virtual Account (CSLU Interface), on page 124 c. Adding a Product-Initiated Product Instance in CSLU (CSLU Interface), on page 124 3. Product Instance Configuration Where tasks are performed: Product Instance a. Ensuring Network Reachability for Product Instance-Initiated Communication, on page 125 b. Ensure that transport type is set to cslu. CSLU is the default transport type. If you have configured a different option, enter the license smart transport cslu command in global configuration mode. Save any changes to the configuration file. Device(config)# license smart transport cslu Device(config)# exit Device# copy running-config startup-config c. Specify how you want CSLU to be discovered (choose one): · Option 1: No action required. Name server configured for Zero-touch DNS discovery of cslu-local Here, if you have configured DNS (the name server IP address is configured on the product instance), and the DNS server has an entry where hostname cslu-local is mapped to the CSLU IP address, then no further action is required. The product instance automatically discovers hostname cslu-local. · Option 2: No action required. Name server and domain configured for Zero-touch DNS discovery of cslu-local.<domain> Here if you have configured DNS (the name server IP address and domain is configured on the product instance), and the DNS server has an entry where cslu-local.<domain> is mapped to the CSLU IP address, then no further action is required. The product instance automatically discovers hostname cslu-local. · Option 3: Configure a specific URL for CSLU. Enter the license smart url cslu http://<cslu_ip_or_host>:8182/cslu/v1/pi command in global configuration mode. For <cslu_ip_or_host>, enter the hostname or the IP address of the windows host where you have installed CSLU. 8182 is the port number and it is the only port number that CSLU uses. Device(config)# license smart url cslu http://192.168.0.1:8182/cslu/v1/pi Device(config)# exit Device# copy running-config startup-config Result: Since the product instance initiates communication, it automatically sends out the first RUM report at the scheduled time, as per the policy. Along with this first report, if applicable, it sends a request for a UDI-tied trust code. CSLU forwards the RUM report to CSSM and retrieves the ACK, which also contains the trust code. The ACK is applied to the product instance the next time the product instance contacts CSLU. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 87 Workflow for Topology: Connected to CSSM Through CSLU System Configuration In the Cisco IOS XE Amsterdam 17.3.6 and later releases of the 17.3.x train, Cisco IOS XE Bengaluru 17.6.4 and later releases of the 17.6.x train, and all subsequent releases from Cisco IOS XE Cupertino 17.9.1 onwards: The product instance does not send more than one RUM report a day. You can override this for an on-demand synchronization between the product instance and CSSM, by entering the license smart sync command in privileged EXEC mode. To know when the product instance will be sending the next RUM report, enter the show license all command in privileged EXEC mode and in the output, check the date in the Next report push field. To verify trust code installation, enter the show license status command in privileged EXEC mode. Check for the updated timestamp in the Trust Code Installed field. In case of a change in license usage, see Configuring an AIR License, on page 161 to know how it affects reporting. If you are using a Cisco Catalyst 9800-CL Wireless Controller, ensure that you are familiar with the mandatory ACK requirement starting with Cisco IOS XE Cupertino 17.7.1. See RUM Reporting and Acknowledgment Requirement for Cisco Catalyst 9800-CL Wireless Controller, on page 121. Tasks for CSLU-Initiated Communication CSLU Installation CSLU Preference Settings Product Instance Configuration Usage Synchronization 1. CSLU Installation Where task is performed: A laptop, destop, or a Virtual Machine (VM) running Windows 10 or Linux. Download the file from Smart Software Manager > Smart Licensing Utility. Refer to Cisco Smart License Utility Quick Start Setup Guide and Cisco Smart Licensing Utility User Guide for help with installation and set-up. 2. CSLU Preference Settings Where tasks is performed: CSLU a. Logging into Cisco (CSLU Interface), on page 124 b. Configuring a Smart Account and a Virtual Account (CSLU Interface), on page 124 c. Adding a CSLU-Initiated Product Instance in CSLU (CSLU Interface), on page 126 3. Product Instance Configuration Where tasks is performed: Product Instance Ensuring Network Reachability for CSLU-Initiated Communication, on page 129 4. Usage Synchronization Where tasks is performed: Product Instance Collecting Usage Reports: CSLU Initiated (CSLU Interface), on page 127 Result: Since CSLU is logged into CSSM, the reports are automatically sent to the associated Smart Account and Virtual Account in CSSM and CSSM will send an ACK to CSLU as well as to the product instance. It gets Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 88 System Configuration Workflow for Topology: Connected Directly to CSSM the ACK from CSSM and sends this back to the product instance for installation. The ACK from CSSM contains the trust code and SLAC if this was requested. In case of a change in license usage, see Configuring an AIR License, on page 161 to know how it affects reporting. If you are using a Cisco Catalyst 9800-CL Wireless Controller, ensure that you are familiar with the mandatory ACK requirement starting with Cisco IOS XE Cupertino 17.7.1. See RUM Reporting and Acknowledgment Requirement for Cisco Catalyst 9800-CL Wireless Controller, on page 121. Trust code request and installation is supported starting with Cisco IOS XE Cupertino 17.9.1. Workflow for Topology: Connected Directly to CSSM Smart Account Set-Up Product Instance Configuration Trust Establishment with CSSM 1. Smart Account Set-Up Where task is performed: CSSM Web UI, https://software.cisco.com/ Ensure that you have a user role with proper access rights to a Smart Account and the required Virtual Accounts. 2. Product Instance Configuration Where tasks are performed: Product Instance a. Set-Up product instance connection to CSSM: Setting Up a Connection to CSSM , on page 144 b. Configure a connection method and transport type (choose one) · Option 1: Smart transport: Set transport type to smart and configure the corresponding URL. If the transport mode is set to license smart transport smart, and you configure license smart url default, the Smart URL (https://smartreceiver.cisco.com/licservice/license) is automatically configured. Save any changes to the configuration file. Device(config)# license smart transport smart Device(config)# license smart url default Device(config)# exit Device# copy running-config startup-config · Option 2: Configure Smart transport through an HTTPs proxy. See Configuring Smart Transport Through an HTTPs Proxy, on page 146 · Option 3: Configure Call Home service for direct cloud access. See Configuring the Call Home Service for Direct Cloud Access, on page 147. · Option 4: Configure Call Home service for direct cloud access through an HTTPs proxy. See Configuring the Call Home Service for Direct Cloud Access through an HTTPs Proxy Server, on page 150. 3. Trust Establishment with CSSM Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 89 Workflow for Topology: CSLU Disconnected from CSSM System Configuration Where task is performed: CSSM Web UI and then the product instance a. Generate one token for each Virtual Account you have. You can use same token for all the product instances that are part of one Virtual Account: Generating a New Token for a Trust Code from CSSM, on page 154 b. Having downloaded the token, you can now install the trust code on the product instance: Installing a Trust Code, on page 155 Result: After establishing trust, CSSM returns a policy. The policy is automatically installed on all product instances of that Virtual Account. The policy specifies if and how often the product instance reports usage. In the Cisco IOS XE Amsterdam 17.3.6 and later releases of the 17.3.x train, Cisco IOS XE Bengaluru 17.6.4 and later releases of the 17.6.x train, and all subsequent releases from Cisco IOS XE Cupertino 17.9.1 onwards: The product instance does not send more than one RUM report a day. You can override this for an on-demand synchronization between the product instance and CSSM, by entering the license smart sync command in privileged EXEC mode. To change the reporting interval, configure the license smart usage interval command in global configuration mode. For syntax details see the license smart (privileged EXEC) command in the Command Reference for the corresponding release. In case of a change in license usage, see Configuring an AIR License, on page 161 to know how it affects reporting. If you are using a Cisco Catalyst 9800-CL Wireless Controller, ensure that you are familiar with the mandatory ACK requirement starting with Cisco IOS XE Cupertino 17.7.1. See RUM Reporting and Acknowledgment Requirement for Cisco Catalyst 9800-CL Wireless Controller, on page 121. Workflow for Topology: CSLU Disconnected from CSSM Depending on whether you want to implement a product instance-initiated or CSLU-initiated method of communication. Complete the corresponding table of tasks below. · Tasks for Product Instance-Initiated Communication · Tasks for CSLU-Initiated Communication Tasks for Product Instance-Initiated Communication CSLU Installation CSLU Preference Settings Product Instance Configuration Usage Synchronization 1. CSLU Installation Where task is performed: A laptop, destop, or a Virtual Machine (VM) running Windows 10 or Linux. Download the file from Smart Software Manager > Smart Licensing Utility. Refer to Cisco Smart License Utility Quick Start Setup Guide and Cisco Smart Licensing Utility User Guide for help with installation and set-up. 2. CSLU Preference Settings Where tasks are performed: CSLU Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 90 System Configuration Workflow for Topology: CSLU Disconnected from CSSM a. In the CSLU Preferences tab, click the Cisco Connectivity toggle switch to off. The field switches to "Cisco Is Not Available". b. Configuring a Smart Account and a Virtual Account (CSLU Interface), on page 124 c. Adding a Product-Initiated Product Instance in CSLU (CSLU Interface), on page 124 3. Product Instance Configuration Where tasks are performed: Product Instance a. Ensuring Network Reachability for Product Instance-Initiated Communication, on page 125 b. Ensure that transport type is set to cslu. CSLU is the default transport type. If you have configured a different option, enter the license smart transport cslu command in global configuration mode. Save any changes to the configuration file. Device(config)# license smart transport cslu Device(config)# exit Device# copy running-config startup-config c. Specify how you want CSLU to be discovered (choose one) · Option 1: No action required. Name server configured for Zero-touch DNS discovery of cslu-local Here, if you have configured DNS (the name server IP address is configured on the product instance), and the DNS server has an entry where hostname cslu-local is mapped to the CSLU IP address, then no further action is required. The product instance automatically discovers hostname cslu-local. · Option 2: No action required. Name server and domain configured for Zero-touch DNS discovery of cslu-local.<domain> Here if you have configured DNS (the name server IP address and domain is configured on the product instance), and the DNS server has an entry where cslu-local.<domain> is mapped to the CSLU IP address, then no further action is required. The product instance automatically discovers hostname cslu-local. · Option 3: Configure a specific URL for CSLU. Enter the license smart url cslu http://<cslu_ip_or_host>:8182/cslu/v1/pi command in global configuration mode. For <cslu_ip_or_host>, enter the hostname or the IP address of the windows host where you have installed CSLU. 8182 is the port number and it is the only port number that CSLU uses. Device(config)# license smart url cslu http://192.168.0.1:8182/cslu/v1/pi Device(config)# exit Device# copy running-config startup-config 4. Usage Synchronization Where tasks are performed: CSLU and CSSM Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 91 Workflow for Topology: CSLU Disconnected from CSSM System Configuration Since the product instance initiates communication, it automatically sends out the first RUM report at the scheduled time, as per the policy. You can also enter the license smart sync privileged EXEC command to trigger this. Along with this first report, if applicable, it sends a request for a UDI-tied trust code. Since CSLU is disconnected from CSSM, perform the following tasks to send the RUM Reports to CSSM. a. Export to CSSM (CSLU Interface), on page 128 b. Uploading Data or Requests to CSSM and Downloading a File, on page 157 c. Import from CSSM (CSLU Interface), on page 128 Result: The ACK you have imported from CSSM contains the trust code if this was requested. The ACK is applied to the product instance the next time the product instance contacts CSLU. In the Cisco IOS XE Amsterdam 17.3.6 and later releases of the 17.3.x train, Cisco IOS XE Bengaluru 17.6.4 and later releases of the 17.6.x train, and all subsequent releases from Cisco IOS XE Cupertino 17.9.1 onwards: The product instance does not send more than one RUM report a day. You can override this for an on-demand synchronization between the product instance and CSSM, by entering the license smart sync command in privileged EXEC mode. To know when the product instance will be sending the next RUM report, enter the show license all command in privileged EXEC mode and in the output, check the date for the Next report push field. To verify trust code installation, enter the show license status command in privileged EXEC mode. Check for the updated timestamp in the Trust Code Installed field. In case of a change in license usage, see Configuring an AIR License, on page 161 to know how it affects reporting. If you are using a Cisco Catalyst 9800-CL Wireless Controller, ensure that you are familiar with the mandatory ACK requirement starting with Cisco IOS XE Cupertino 17.7.1. See RUM Reporting and Acknowledgment Requirement for Cisco Catalyst 9800-CL Wireless Controller, on page 121. Tasks for CSLU-Initiated Communication CSLU Installation CSLU Preference Settings Product Instance Configuration Usage Synchronization 1. CSLU Installation Where task is performed: A laptop, destop, or a Virtual Machine (VM) running Windows 10 or Linux. Download the file from Smart Software Manager > Smart Licensing Utility. Refer to Cisco Smart License Utility Quick Start Setup Guide and Cisco Smart Licensing Utility User Guide for help with installation and set-up. 2. CSLU Preference Settings Where tasks is performed: CSLU a. In the CSLU Preferences tab, click the Cisco Connectivity toggle switch to off. The field switches to "Cisco Is Not Available". b. Configuring a Smart Account and a Virtual Account (CSLU Interface), on page 124 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 92 System Configuration Workflow for Topology: Connected to CSSM Through a Controller c. Adding a CSLU-Initiated Product Instance in CSLU (CSLU Interface), on page 126 d. Collecting Usage Reports: CSLU Initiated (CSLU Interface), on page 127 3. Product Instance Configuration Where task is performed: Product Instance Ensuring Network Reachability for CSLU-Initiated Communication, on page 129 4. Usage Synchronization Where tasks are performed: CSLU and CSSM Collect usage data from the product instance. Since CSLU is disconnected from CSSM, you then save usage data which CSLU has collected from the product instance to a file. Along with this first report, if applicable, an authorization code and a UDI-tied trust code request is included in the RUM report. Then, from a workstation that is connected to Cisco, upload it to CSSM. After this, download the ACK from CSSM. In the workstation where CSLU is installed and connected to the product instance, upload the file to CSLU. a. Export to CSSM (CSLU Interface), on page 128 b. Uploading Data or Requests to CSSM and Downloading a File, on page 157 c. Import from CSSM (CSLU Interface), on page 128 Result: The ACK you have imported from CSSM contains the trust code and SLAC if this was requested. The uploaded ACK is applied to the product instance the next time CSLU runs an update. In case of a change in license usage, see Configuring an AIR License, on page 161 to know how it affects reporting. If you are using a Cisco Catalyst 9800-CL Wireless Controller, ensure that you are familiar with the mandatory ACK requirement starting with Cisco IOS XE Cupertino 17.7.1. See RUM Reporting and Acknowledgment Requirement for Cisco Catalyst 9800-CL Wireless Controller, on page 121. Trust code request and installation is supported starting with Cisco IOS XE Cupertino 17.9.1. Workflow for Topology: Connected to CSSM Through a Controller To deploy Cisco DNA Center as the controller, complete the following workflow: Product Instance Configuration Cisco DNA Center Configuration 1. Product Instance Configuration Where task is performed: Product Instance Enable NETCONF. Cisco DNA Center uses the NETCONF protocol to provision configuration and retrieve the required information from the product instance - the product instance must therefore have NETCONF enabled, to facilitate this. For more information, see the Programmability Configuration Guide, Cisco IOS XE Amsterdam 17.3.x. In the guide, go to Model-Driven Programmability > NETCONF Protocol. 2. Cisco DNA Center Configuration Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 93 Workflow for Topology: No Connectivity to CSSM and No CSLU System Configuration Where tasks is performed: Cisco DNA Center GUI An outline of the tasks you must complete and the accompanying documentation reference is provided below. The document provides detailed steps you have to complete in the Cisco DNA Center GUI: a. Set-up the Smart Account and Virtual Account. Enter the same log in credentials that you use to log in to the CSSM Web UI. This enables Cisco DNA Center to establish a connection with CSSM. See the Cisco DNA Center Administrator Guide of the required release (Release 2.2.2 onwards) > Manage Licenses > Set Up License Manager. b. Add the required product instances to Cisco DNA Center inventory and assign them to a site. This enables Cisco DNA Center to push any necessary configuration, including the required certificates, for Smart Licensing Using Policy to work as expected. See the Cisco DNA Center User Guide of the required release (Release 2.2.2 onwards) > Display Your Network Topology > Assign Devices to a Site. Result: After you implement the topology, you must trigger the very first ad hoc report in Cisco DNA Center, to establish a mapping between the Smart Account and Virtual Account, and product instance. See the Cisco DNA Center Administrator Guide of the required release (Release 2.2.2 onwards) > Manage Licenses > Upload Resource Utilization Details to CSSM. Once this is done, Cisco DNA Center handles subsequent reporting based on the reporting policy. If multiple policies are available, Cisco DNA Center maintains the narrowest reporting interval. You can change this, but only to report more frequently (a narrower interval). See the Cisco DNA Center Administrator Guide of the required release (Release 2.2.2 onwards) > Manage Licenses > Modify License Policy. If you want to change the license level after this, see the Cisco DNA Center Administrator Guide of the required release (Release 2.2.2 onwards) > Manage Licenses > Change License Level. If you are using a Cisco Catalyst 9800-CL Wireless Controller, ensure that you are familiar with the mandatory ACK requirement starting with Cisco IOS XE Cupertino 17.7.1. See RUM Reporting and Acknowledgment Requirement for Cisco Catalyst 9800-CL Wireless Controller, on page 121. Workflow for Topology: No Connectivity to CSSM and No CSLU Since you do not have to configure connectivity to any other component, the list of tasks required to set-up the topology is a small one. See, the Results section at the end of the workflow to know how you can complete requisite usage reporting after you have implemented this topology. Product Instance Configuration Where task is performed: Product Instance Set transport type to off. Enter the license smart transport off command in global configuration mode. Save any changes to the configuration file. Device(config)# license smart transport off Device(config)# exit Device# copy running-config startup-config Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 94 System Configuration Workflow for Topology: SSM On-Prem Deployment Result: All communication to and from the product instance is disabled. To report license usage you must save RUM reports to a file on the product instance. From a workstation that has connectivity to the Internet and Cisco, upload the file to CSSM: 1. Generate and save RUM reports Enter the license smart save usage command in provileged EXEC mode. In the example below, all RUM reports are saved to the flash memory of the product instance, in file all_rum.txt. Starting with Cisco IOS XE Cupertino 17.7.1, if a trust code does not already exist on the product instance, configuring this command automatically includes a trust code request in the RUM report. This is supported in a standalone, as well as a High Availability set-up. In the example below, the file is first saved to bootflash and then copied to a TFTP location: Device# license smart save usage all file bootflash:all_rum.txt Device# copy bootflash:all_rum.txt tftp://10.8.0.6/all_rum.txt 2. Upload usage data to CSSM: Uploading Data or Requests to CSSM and Downloading a File, on page 157. 3. Install the ACK on the product instance: Installing a File on the Product Instance, on page 158 If you want to change license usage, see Configuring an AIR License, on page 161. If you want to return an SLR authorization code, see Removing and Returning an Authorization Code, on page 151. If you are using a Cisco Catalyst 9800-CL Wireless Controller, ensure that you are familiar with the mandatory ACK requirement starting with Cisco IOS XE Cupertino 17.7.1. See RUM Reporting and Acknowledgment Requirement for Cisco Catalyst 9800-CL Wireless Controller, on page 121. Workflow for Topology: SSM On-Prem Deployment Depending on whether you want to implement a product instance-initiated (push) or SSM On-Prem-initiated (pull) method of communication, complete the corresponding sequence of tasks. Tasks for Product Instance-Initiated Communication SSM On-Prem Installation Addition and Validation of Product Instances (Only if Applicable) Product Instance Configuration Initial Usage Synchronization 1. SSM On-Prem Installation Where task is performed: A physical server such as a Cisco UCS C220 M3 Rack Server, or a hardware-based server that meets the necessary requirements. Download the file from Smart Software Manager > Smart Software Manager On-Prem. Refer to the Cisco Smart Software On-Prem Installation Guide and the Cisco Smart Software On-Prem User Guide for help with installation. Installation is complete when you have deployed SSM On-Prem, configured a common name on SSM On-Prem (Security Widget > Certificates), synchronized the NTP server (Settings widget > Time Settings), and created, registered, and synchronized (Synchronization widget) the SSM On-Prem local account with your Smart Account and Virtual Account in CSSM. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 95 Tasks for Product Instance-Initiated Communication System Configuration Note Licensing functions in the On-Prem Licensing Workspace are greyed-out until you complete the creation, registration, and synchronization of the local account with your Smart Account in CSSM. The local accountsynchronization with CSSM is for the SSM On-Prem instance to be known to CSSM, and is different from usage synchronization which is performed in 4. Initial Usage Synchronization below. 2. Addition and Validation of Product Instances Where tasks are performed: SSM On-Prem UI This step ensures that the product instances are validated and mapped to the applicable Smart Account and Virtual account in CSSM. This step is required only in the following cases: · If you want your product instances to be added and validated in SSM On-Prem before they are reported in CSSM (for added security). · If you have created local virtual accounts (in addition to the default local virtual account) in SSM On-Prem. In this case you must provide SSM On-Prem with the Smart Account and Virtual Account information for the product instances in these local virtual accounts, so that SSM On-Prem can report usage to the correct license pool in CSSM. a. Assigning a Smart Account and Virtual Account (SSM On-Prem UI), on page 133 b. Validating Devices (SSM On-Prem UI), on page 134 Note If your product instance is in a NAT set-up, also enable support for a NAT Setup when you enable device validation both toggle switches are in the same window. 3. Product Instance Configuration Where tasks are performed: Product Instance and the SSM On-Prem UI Remember to save any configuration changes on the product instance, by entering the copy running-config startup-config command in privileged EXEC mode. a. Ensuring Network Reachability for Product Instance-Initiated Communication, on page 134 b. Retrieving the Transport URL (SSM On-Prem UI), on page 137 c. Setting the Transport Type, URL, and Reporting Interval, on page 159 The transport type configuration for CSLU and SSM On-Prem are the same (license smart transport cslu command in global configuration mode), but the URLs are different. 4. Initial Usage Synchronization Where tasks are performed: Product instance, SSM On-Prem, CSSM a. Synchronize the product instance with SSM On-Prem. On the product instance, enter the license smart sync {all| local} command, in privileged EXEC mode. This synchronizes the product instance with SSM On-Prem, to send and receive any pending data. For example: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 96 System Configuration Tasks for Product Instance-Initiated Communication Device# license smart sync local You can verify this in the SSM On-Prem UI. Log in and select the Smart Licensing workspace. Navigate to the Inventory > SL Using Policy tab. In the Alerts column of the corresponding product instance, the following message is displayed: Usage report from product instance. Note If you have not performed Step 2 above (Addition and Validation of Product Instances), completing this sub-step will add the product instance to the SSM On-Prem database. b. Synchronize usage information with CSSM (choose one): · Option 1: SSM On-Prem is connected to CSSM: In the SSM On-Prem UI, Smart Licensing workspace, nagivate to Reports > Usage Schedules > Synchronize now with Cisco. · Option 2: SSM On-Prem is not connected to CSSM: See Exporting and Importing Usage Data (SSM On-Prem UI), on page 137. Result: You have completed initial usage synchronization. Product instance and license usage information is now displayed in SSM On-Prem. For subsequent reporting, you have the following options: · To synchronize data between the product instance and SSM On-Prem: Schedule periodic synchronization between the product instance and the SSM On-Prem, by configuring the reporting interval. Enter the license smart usage interval interval_in_days command in global configuration mode. In the Cisco IOS XE Amsterdam 17.3.6 and later releases of the 17.3.x train, Cisco IOS XE Bengaluru 17.6.4 and later releases of the 17.6.x train, and all subsequent releases from Cisco IOS XE Cupertino 17.9.1 onwards: The product instance does not send more than one RUM report a day. You can override this for an on-demand synchronization between the product instance and CSSM, by entering the license smart sync command in privileged EXEC mode. To know when the product instance will be sending the next RUM report, enter the show license all command in privileged EXEC mode and in the output, check the Next report push: field. · To synchronize usage information with CSSM schedule periodic synchronization, or , upload and download the required files: · Schedule periodic synchronization with CSSM. In the SSM On-Prem UI, navigate to Reports > Usage Schedules > Synchronization schedule with Cisco. Enter the following frequency information and save: · Days: Refers to how often synchronization occurs. For example, if you enter 2, synchronization occurs once every two days. · Time of Day:: Refers to the time at which synchronization occurs, in the 24-hour notation system. For example, if you enter 14 hours and 0 minutes, synchronization occurs at 2 p.m. (1400) in your local time zone. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 97 Tasks for SSM On-Prem Instance-Initiated Communication System Configuration · Upload and download the required files for reporting: Exporting and Importing Usage Data (SSM On-Prem UI), on page 137). If you are using a Cisco Catalyst 9800-CL Wireless Controller, ensure that you are familiar with the mandatory ACK requirement starting with Cisco IOS XE Cupertino 17.7.1. See RUM Reporting and Acknowledgment Requirement for Cisco Catalyst 9800-CL Wireless Controller, on page 121. Tasks for SSM On-Prem Instance-Initiated Communication SSM On-Prem Installation Product Instance Addition Product Instance Configuration Initial Usage Synchronization 1. SSM On-Prem Installation Where task is performed: A physical server such as a Cisco UCS C220 M3 Rack Server, or a hardware-based server that meets the necessary requirements. Download the file from Smart Software Manager > Smart Software Manager On-Prem. Refer to the Cisco Smart Software On-Prem Installation Guide and the Cisco Smart Software On-Prem User Guide for help with installation. Installation is complete when you have deployed SSM On-Prem, configured a common name on SSM On-Prem (Security Widget > Certificates), synchronized the NTP server (Settings widget > Time Settings), and created, registered, and synchronized (Synchronization widget) the SSM On-Prem local account with your Smart Account and Virtual Account in CSSM. Note Licensing functions in the On-Prem Licensing Workspace are greyed-out until you complete the creation, registration, and synchronization of the local account with your Smart Account in CSSM. The local account synchronization with CSSM is for the SSM On-Prem instance to be known to CSSM, and is different from usage synchronization which is performed in 4. Initial Usage Synchronization below. 2. Product Instance Addition Where task is performed: SSM On-Prem UI Depending on whether you want to add a single product instance or multiple product instances, follow the corresponding sub-steps: Adding One or More Product Instances (SSM On-Prem UI), on page 138. 3. Product Instance Configuration Where tasks are performed: Product Instance and the SSM On-Prem UI Remember to save any configuration changes on the product instance, by entering the copy running-config startup-config command in privileged EXEC mode: Ensuring Network Reachability for SSM On-Prem-Initiated Communication, on page 139. 4. Initial Usage Synchronization Where tasks are performed: SSM On-Prem UI, and CSSM a. Retrieve usage information from the product instance. In the SSM On-Prem UI, navigate to Reports > Synchronisation pull schedule with the devices > Synchronise now with the device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 98 System Configuration Tasks for SSM On-Prem Instance-Initiated Communication In the Alerts column, the following message is displayed: Usage report from product instance. Tip It takes 60 seconds before synchronization is triggered. To view progress, navigate to the On-Prem Admin Workspace, and click the Support Centre widget. The system logs here display progress. b. Synchronize usage information with CSSM (choose one) · Option 1: SSM On-Prem is connected to CSSM: In the SSM On-Prem UI, Smart Licensing workspace, nagivate to Reports > Usage Schedules > Synchronize now with Cisco. · Option 2: SSM On-Prem is not connected to CSSM. See: Exporting and Importing Usage Data (SSM On-Prem UI), on page 137. Result: You have completed initial usage synchronization. Product instance and license usage information is now displayed in SSM On-Prem. SSM On-Prem automatically sends the ACK back to the product instance. To verify that the product instance has received the ACK, enter the show license status command in privileged EXEC mode, and in the output, check the date for the Last ACK received field. For subsequent reporting, you have the following options: · To retrieve usage information from the product instance, you can: · In the SSM On-Prem UI, Smart Licensing workspace, nagivate to Reports > Usage Schedules > Synchronize now with Cisco. · Schedule periodic retrieval of information from the product instance by configuring a frequency. In the SSM On-Prem UI, Smart Licensing workspace, nagivate to Reports > Usage Schedules > Synchronisation pull schedule with the devices. Enter values in the following fields: · Days: Refers to how often synchronization occurs. For example, if you enter 2, synchronization occurs once every two days. · Time of Day:: Refers to the time at which synchronization occurs, in the 24-hour notation system. For example, if you enter 14 hours and 0 minutes, synchronization occurs at 2 p.m. (1400). · Collect usage data from the product instance without being connected to CSSM. In the SSM On-Prem UI, Smart Licensing workspace, nagivate to Inventory > SL Using Policy tab. Select one or more product instances by enabling the coresponding check box. Click Actions for Selected... > Collect Usage. On-Prem connects to the selected Product Instance(s) and collects the usage reports. These usage reports are then stored in On-Prem's local library. These reports can then be transferred to Cisco if On-Prem is connected to Cisco, or (if you are not connected to Cisco) you can manually trigger usage collection by selecting Export/Import All.. > Export Usage to Cisco. · To synchronize usage information with CSSM, you can: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 99 Migrating to Smart Licensing Using Policy System Configuration · Schedule periodic synchronization with CSSM. In the SSM On-Prem UI, navigate to Reports > Usage Schedules > Synchronization schedule with Cisco. Enter the following frequency information and save: · Days: Refers to how often synchronization occurs. For example, if you enter 2, synchronization occurs once every two days. · Time of Day:: Refers to the time at which synchronization occurs, in the 24-hour notation system. For example, if you enter 14 hours and 0 minutes, synchronization occurs at 2 p.m. (1400). · Upload and download the required files for reporting: Exporting and Importing Usage Data (SSM On-Prem UI), on page 137). If you are using a Cisco Catalyst 9800-CL Wireless Controller, ensure that you are familiar with the mandatory ACK requirement starting with Cisco IOS XE Cupertino 17.7.1. See RUM Reporting and Acknowledgment Requirement for Cisco Catalyst 9800-CL Wireless Controller, on page 121. Migrating to Smart Licensing Using Policy To upgrade to Smart Licensing Using Policy, you must upgrade the software version (image) on the product instance to a supported version. Before you Begin Ensure that you have read the Upgrades, on page 81 section, to understand how Smart Licensing Using Policy handles all earlier licensing models. Smart Licensing Using Policy is introduced in Cisco IOS XE Amsterdam 17.3.2a. This is therefore the minimum required version for Smart Licensing Using Policy. Note that all the licenses that you are using prior to migration will be available after upgrade. This means that not only registered and authorized licenses (including reserved licenses), but also evaluation licenses will be migrated. The advantage with migrating registered and authorized licenses is that you will have fewer configuration steps to complete after migration, because your configuration is retained after upgrade (transport type configuration and configuration for connection to CSSM, all authorization codes). This ensures a smoother transition to the Smart Licensing Using Policy environment. Device-led conversion is not supported for migration to Smart Licensing Using Policy. Upgrading the Wireless Controller Software For information about the upgrade procedure: · For Cisco Embedded Wireless Controller on Cisco Catalyst 9100 Access Points, see the Software Upgrade section in the Cisco Embedded Wireless Controller on Catalyst Access Points Online Help · For all other supported wireless controllers, see the System Upgrade > Upgrading the Cisco Catalyst 9800 Wireless Controller Software section of the Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide for the required release. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 100 System Configuration Example: Smart Licensing to Smart Licensing Using Policy If you are upgrading a Cisco Catalyst 9800-CL Wireless Controller, ensure that you are familiar with the conditions for a mandatory ACK starting with Cisco IOS XE Cupertino 17.7.1. See RUM Reporting and Acknowledgment Requirement for Cisco Catalyst 9800-CL Wireless Controller, on page 121. You can use the procedure to upgrade in install mode or ISSU (ISSU only on supported platforms and supported releases) After Upgrading the Software Version · Complete topology implementation. If a transport mode is available in your pre-upgrade set-up, this is retained after you upgrade. Only in some cases, like with evaluation licenses or with licensing models where the notion of a transport type does not exist, the default (cslu) is applied - in these cases you may have a few more steps to complete before you are set to operate in the Smart Licensing Using Policy environment. No matter which licensing model you upgrade from, you can change the topology after upgrade. · Synchronize license usage with CSSM No matter which licensing model you are upgrading from and no matter which topology you implement, synchronize your usage information with CSSM. For this you have to follow the reporting method that applies to the topology you implement. This initial synchronization ensures that up-to-date usage information is reflected in CSSM and a custom policy (if available), is applied. The policy that is applicable after this synchronization also indicates subsequent reporting requirements. These rules are also tabled here: How Upgrade Affects Reporting for Existing Licenses, on page 82 Note After initial usage synchronization is completed, reporting is required only if the policy, or, system messages indicate that it is. Sample Migration Scenarios Sample migration scenarios have been provided considering the various existing licensing models and licenses. All scenarios provide sample outputs before and after migration, any CSSM Web UI changes to look out for (as an indicator of a successful migration or further action), and how to identify and complete any necessary post-migration steps. Note For SSM On-Prem, the sequence in which you perform the various upgrade-related activities is crucial. So only for this scenario, the migration sequence has been provided - and not an example. Example: Smart Licensing to Smart Licensing Using Policy The following is an example of a Cisco Catalyst 9800-CL Wireless Controller migrating from Smart Licensing to Smart Licensing Using Policy. · Table 8: Smart Licensing to Smart Licensing Using Policy: show Commands, on page 102 · The CSSM Web UI After Migration, on page 105 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 101 Example: Smart Licensing to Smart Licensing Using Policy System Configuration · Reporting After Migration, on page 108 The show command outputs below call-out key fields to check, before and after migration. Table 8: Smart Licensing to Smart Licensing Using Policy: show Commands Before Upgrade (Smart Licensing) After Upgrade (Smart Licensing Using Policy) show license summary The Status and License Authorization fields show that the license is REGISTERED and AUTHORIZED. show license summary The Status field shows that the licenses are now IN USE instead of registered and authorized. Device# show license summary Device# show license summary Smart Licensing is ENABLED License Usage: License Entitlement Tag Count Registration: Status Status: REGISTERED Smart Account: SA-Eg-Company-02 --------------------------------------------------------------- Virtual Account: Dept-02 Export-Controlled Functionality: ALLOWED air-network-essentials (DNA_NWSTACK_E) Last Renewal Attempt: None 1 IN USE Next Renewal Attempt: May 01 08:19:02 2021 IST air-dna-essentials (AIR-DNA-E) 1 IN USE License Authorization: Status: AUTHORIZED Last Communication Attempt: SUCCEEDED Next Communication Attempt: Dec 02 08:19:09 2020 IST License Usage: License Status Entitlement tag Count ------------------------------------------------------------------ AP Perpetual Network... (DNA_NWSTACK_E) 1 AUTHORIZED Aironet DNA Essentia... (AIR-DNA-E) 1 AUTHORIZED Before Upgrade (Smart Licensing) After Upgrade (Smart Licensing Using Policy) show license usage show license usage One perpetual and one subscription license are being used before All licenses are migrated and the Enforcement Type field displays upgrade. NOT ENFORCED. There are no export-controlled or enforced licenses on Cisco Catalyst Wireless Controllers. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 102 System Configuration Example: Smart Licensing to Smart Licensing Using Policy Before Upgrade (Smart Licensing) After Upgrade (Smart Licensing Using Policy) Device# show license usage Device# show license usage License Authorization: Status: AUTHORIZED on Nov 02 08:21:29 2020 IST License Authorization: Status: Not Applicable AP Perpetual Networkstack Essentials (DNA_NWSTACK_E): air-network-essentials (DNA_NWSTACK_E): Description: AP Perpetual Network Stack entitled with Description: air-network-essentials DNA-E Count: 1 Count: 1 Version: 1.0 Version: 1.0 Status: IN USE Status: AUTHORIZED Export status: NOT RESTRICTED Export status: NOT RESTRICTED Feature Name: air-network-essentials Feature Description: air-network-essentials Aironet DNA Essentials Term Licenses (AIR-DNA-E): Enforcement type: NOT ENFORCED Description: DNA Essentials for Wireless License type: Perpetual Count: 1 Version: 1.0 air-dna-essentials (AIR-DNA-E): Status: AUTHORIZED Description: air-dna-essentials Export status: NOT RESTRICTED Count: 1 Version: 1.0 Status: IN USE Export status: NOT RESTRICTED Feature Name: air-dna-essentials Feature Description: air-dna-essentials Enforcement type: NOT ENFORCED License type: Perpetual Before Upgrade (Smart Licensing) show license status After Upgrade (Smart Licensing Using Policy) show license status The Transport: field shows that the transport type, which was configured before update, is retained after upgrade. The Policy: header and details show that a custom policy was available in the Smart Account or Virtual Account this has also been automatically installed on the product instance. (After establishing trust, CSSM returns a policy. The policy is then automatically installed.) The Usage Reporting: header: The Next report push: field provides information about when the product instance will send the next RUM report to CSSM. The Trust Code Installed: field shows that the ID token is successfully converted and a trusted connected has been established with CSSM. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 103 Example: Smart Licensing to Smart Licensing Using Policy System Configuration Before Upgrade (Smart Licensing) After Upgrade (Smart Licensing Using Policy) Device# show license status Smart Licensing is ENABLED Device# show license status Utility: Status: DISABLED Utility: Status: DISABLED Smart Licensing Using Policy: Status: ENABLED Data Privacy: Sending Hostname: yes Callhome hostname privacy: DISABLED Smart Licensing hostname privacy: DISABLED Version privacy: DISABLED Data Privacy: Sending Hostname: yes Callhome hostname privacy: DISABLED Smart Licensing hostname privacy: DISABLED Version privacy: DISABLED Transport: Type: Callhome Transport: Type: Callhome Registration: Policy: Status: REGISTERED Policy in use: Installed On Nov 02 09:09:47 2020 IST Smart Account: SA-Eg-Company-02 Policy name: SLE Policy Virtual Account: Dept-02 Reporting ACK required: yes (Customer Policy) Export-Controlled Functionality: ALLOWED Unenforced/Non-Export Perpetual Attributes: Initial Registration: SUCCEEDED on Nov 02 08:19:02 First report requirement (days): 60 (Customer 2020 IST Policy) Last Renewal Attempt: None Reporting frequency (days): 60 (Customer Policy) Next Renewal Attempt: May 01 08:19:01 2021 IST Report on change (days): 60 (Customer Policy) Registration Expires: Nov 02 08:14:06 2021 IST Unenforced/Non-Export Subscription Attributes: First report requirement (days): 30 (Customer License Authorization: Policy) Status: AUTHORIZED on Nov 02 08:21:29 2020 IST Reporting frequency (days): 30 (Customer Policy) Last Communication Attempt: SUCCEEDED on Nov 02 Report on change (days): 30 (Customer Policy) 08:21:29 2020 IST Enforced (Perpetual/Subscription) License Attributes: Next Communication Attempt: Dec 02 08:19:09 2020 IST Communication Deadline: Jan 31 08:14:15 2021 IST First report requirement (days): 0 (CISCO default) Reporting frequency (days): 90 (Customer Policy) Export Authorization Key: Report on change (days): 90 (Customer Policy) Features Authorized: Export (Perpetual/Subscription) License Attributes: <none> First report requirement (days): 0 (CISCO default) Reporting frequency (days): 90 (Customer Policy) Report on change (days): 90 (Customer Policy) Miscellaneous: Custom Id: <empty> Usage Reporting: Last ACK received: Nov 02 09:09:47 2020 IST Next ACK deadline: Jan 01 09:09:47 2021 IST Reporting push interval: 30 days Next ACK push check: Nov 02 09:13:54 2020 IST Next report push: Dec 02 09:05:45 2020 IST Last report push: Nov 02 09:05:45 2020 IST Last report file write: <none> Trust Code Installed: Active: PID:C9800-CL-K9,SN:93BBAH93MGS INSTALLED on Nov 02 08:59:26 2020 IST Standby: PID:C9800-CL-K9,SN:9XECPSUU4XN INSTALLED on Nov 02 09:00:45 2020 IST Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 104 System Configuration Example: Smart Licensing to Smart Licensing Using Policy Before Upgrade (Smart Licensing) show license udi Device# show license udi UDI: PID:C9800-CL-K9,SN:93BBAH93MGS HA UDI List: Active:PID:C9800-CL-K9,SN:93BBAH93MGS Standby:PID:C9800-CL-K9,SN:9XECPSUU4XN After Upgrade (Smart Licensing Using Policy) show license udi This is a High Availability set-up and the command displays all UDIs in the set-up. There is no change in the sample output before and after migration. Device# show license udi UDI: PID:C9800-CL-K9,SN:93BBAH93MGS HA UDI List: Active:PID:C9800-CL-K9,SN:93BBAH93MGS Standby:PID:C9800-CL-K9,SN:9XECPSUU4XN The CSSM Web UI After Migration Log in to the CSSM Web UI at https://software.cisco.com and click Smart Software Licensing. Under Inventory > Product Instances. The product instance previously displayed with the host name (Catalyst 9800CL Cloud Wireless Controller in this example) is now displayed with the UDI instead. All migrated UDIs are displayed, that is, PID:C9800-CL-K9,SN:93BBAH93MGS, and PID:C9800-CL-K9,SN:9XECPSUU4XN. Only the active product instance reports usage, therefore, PID:C9800-CL-K9,SN:93BBAH93MGS displays license consumption information under License Usage. The standby does not report usage and the License Usage for the standby displays No Records Found. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 105 Example: Smart Licensing to Smart Licensing Using Policy System Configuration Figure 8: Smart Licensing to Smart Licensing Using Policy: Hostname of Product Instance on the CSSM Web UI Before Migration Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 106 System Configuration Example: Smart Licensing to Smart Licensing Using Policy Figure 9: Smart Licensing to Smart Licensing Using Policy: UDI and License Usage Under Active Product Instance After Migration Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 107 Example: SLR to Smart Licensing Using Policy System Configuration Figure 10: Smart Licensing to Smart Licensing Using Policy: Standby Product Instance After Migration It is always the active that reports usage, so if the active in this High Availabilty set-up changes, the new active product instance will display license consumption information and report usage. Reporting After Migration The product instance sends the next RUM report to CSSM, based on the policy. If you want to change your reporting interval to report more frequently: on the product instance, configure the license smart usage interval command in global configuration mode. For syntax details see the license smart (global config) command in the Command Reference for the corresponding release. Example: SLR to Smart Licensing Using Policy The following is an example of a Cisco Catalyst 9800-CL Wireless Controller migrating from Specific License Reservation (SLR) to Smart Licensing Using Policy. This is a High Availability set-up with an active and standby. License conversion is automatic and authorization codes are migrated. No further action is required to complete migration. After migration the No Connectivity to CSSM and No CSLU, on page 75 topology is effective. For information about the SLR authorization code in the Smart Licensing Using Policy environment, see Authorization Code, on page 65. · Table 9: SLR to Smart Licensing Using Policy: show Commands, on page 109 · The CSSM Web UI After Migration, on page 113 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 108 System Configuration Example: SLR to Smart Licensing Using Policy · Reporting After Migration, on page 115 The show command outputs below call-out key fields to check, before and after migration. Table 9: SLR to Smart Licensing Using Policy: show Commands Before Upgrade (SLR) After Upgrade (Smart Licensing Using Policy) show license summary The Registration and License Authorization status fields show that the license was REGISTERED - SPECIFIC LICENSE RESERVATION and AUTHORIZED - RESERVED. show license summary Licenses are migrated , but none of the APs have joined the controller, current consumption (Count) is therefore zero, and the Status field shows that the licenses are NOT IN USE. Device# show license summary Smart Licensing is ENABLED License Reservation is ENABLED Registration: Device# show license summary License Reservation is ENABLED License Usage: License Status Entitlement Tag Count Status: REGISTERED - SPECIFIC LICENSE RESERVATION ------------------------------------------------------------------ Export-Controlled Functionality: ALLOWED Aironet DNA Advantag... (AIR-DNA-A) 0 NOT License Authorization: IN USE Status: AUTHORIZED - RESERVED AP Perpetual Network... (DNA_NWStack) 0 NOT IN USE License Usage: License Entitlement tag Count Status ----------------------------------------------------------------- AP Perpetual Network... (DNA_NWStack) 1 AUTHORIZED Aironet DNA Advantag... (AIR-DNA-A) 1 AUTHORIZED Before Upgrade (SLR) show license reservation After Upgrade (Smart Licensing Using Policy) show license authorization The Last Confirmation code: field shows that the SLR authorization code is successfully migrated for the active and standby product instances in the High Availability set-up. The Specified license reservations: header shows that a perpetual license (AP Perpetual Networkstack Advantage) and a subscription license (Aironet DNA Advantage Term Licenses) are the migrated SLR licenses. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 109 Example: SLR to Smart Licensing Using Policy System Configuration Before Upgrade (SLR) After Upgrade (Smart Licensing Using Policy) Device# show license reservation License reservation: ENABLED Overall status: Active: PID:C9800-CL-K9,SN:93BBAH93MGS Reservation status: SPECIFIC INSTALLED on Nov 02 03:16:01 2020 IST Export-Controlled Functionality: ALLOWED Last Confirmation code: 102fc949 Standby: PID:C9800-CL-K9,SN:9XECPSUU4XN Reservation status: SPECIFIC INSTALLED on Nov 02 03:15:45 2020 IST Export-Controlled Functionality: ALLOWED Last Confirmation code: ad4382fe Specified license reservations: Aironet DNA Advantage Term Licenses (AIR-DNA-A): Description: DNA Advantage for Wireless Total reserved count: 20 Term information: Active: PID:C9800-CL-K9,SN:93BBAH93MGS License type: TERM Start Date: 2020-OCT-14 UTC End Date: 2021-APR-12 UTC Term Count: 5 License type: TERM Start Date: 2020-JUN-18 UTC End Date: 2020-DEC-15 UTC Term Count: 5 Standby: PID:C9800-CL-K9,SN:9XECPSUU4XN License type: TERM Start Date: 2020-OCT-14 UTC End Date: 2021-APR-12 UTC Term Count: 10 AP Perpetual Networkstack Advantage (DNA_NWStack): Description: AP Perpetual Network Stack entitled with DNA-A Total reserved count: 20 Term information: Active: PID:C9800-CL-K9,SN:93BBAH93MGS License type: TERM Start Date: 2020-OCT-14 UTC End Date: 2021-APR-12 UTC Term Count: 5 License type: TERM Start Date: 2020-JUN-18 UTC End Date: 2020-DEC-15 UTC Term Count: 5 Standby: PID:C9800-CL-K9,SN:9XECPSUU4XN License type: TERM Start Date: 2020-OCT-14 UTC End Date: 2021-APR-12 UTC Term Count: 10 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 110 System Configuration Example: SLR to Smart Licensing Using Policy Before Upgrade (SLR) After Upgrade (Smart Licensing Using Policy) Device# show license authorization Overall status: Active: PID:C9800-CL-K9,SN:93BBAH93MGS Status: SPECIFIC INSTALLED on Nov 02 03:16:01 2020 IST Last Confirmation code: 102fc949 Standby: PID:C9800-CL-K9,SN:9XECPSUU4XN Status: SPECIFIC INSTALLED on Nov 02 03:15:45 2020 IST Last Confirmation code: ad4382fe Specified license reservations: Aironet DNA Advantage Term Licenses (AIR-DNA-A): Description: DNA Advantage for Wireless Total reserved count: 20 Enforcement type: NOT ENFORCED Term information: Active: PID:C9800-CL-K9,SN:93BBAH93MGS Authorization type: SPECIFIC INSTALLED on Nov 02 03:15:45 2020 IST License type: TERM Start Date: 2020-OCT-14 UTC End Date: 2021-APR-12 UTC Term Count: 5 Authorization type: SPECIFIC INSTALLED on Nov 02 03:15:45 2020 IST License type: TERM Start Date: 2020-JUN-18 UTC End Date: 2020-DEC-15 UTC Term Count: 5 Standby: PID:C9800-CL-K9,SN:9XECPSUU4XN Authorization type: SPECIFIC INSTALLED on Nov 02 03:15:45 2020 IST License type: TERM Start Date: 2020-OCT-14 UTC End Date: 2021-APR-12 UTC Term Count: 10 AP Perpetual Networkstack Advantage (DNA_NWStack): Description: AP Perpetual Network Stack entitled with DNA-A Total reserved count: 20 Enforcement type: NOT ENFORCED Term information: Active: PID:C9800-CL-K9,SN:93BBAH93MGS Authorization type: SPECIFIC INSTALLED on Nov 02 03:15:45 2020 IST License type: TERM Start Date: 2020-OCT-14 UTC End Date: 2021-APR-12 UTC Term Count: 5 Authorization type: SPECIFIC INSTALLED on Nov 02 03:15:45 2020 IST License type: TERM Start Date: 2020-JUN-18 UTC End Date: 2020-DEC-15 UTC Term Count: 5 Standby: PID:C9800-CL-K9,SN:9XECPSUU4XN Authorization type: SPECIFIC INSTALLED on Nov 02 03:15:45 2020 IST License type: TERM Start Date: 2020-OCT-14 UTC End Date: 2021-APR-12 UTC Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 111 Example: SLR to Smart Licensing Using Policy Before Upgrade (SLR) Before Upgrade (SLR) show license status System Configuration After Upgrade (Smart Licensing Using Policy) Term Count: 10 Purchased Licenses: No Purchase Information Available After Upgrade (Smart Licensing Using Policy) show license status Under the Transport: header, the Type: field displays that the transport type is set to off. Under the Usage Reporting: header, the Next report push: field displays if and when the next RUM report must be uploaded to CSSM. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 112 System Configuration Example: SLR to Smart Licensing Using Policy Before Upgrade (SLR) - After Upgrade (Smart Licensing Using Policy) Device# show license status Utility: Status: DISABLED Smart Licensing Using Policy: Status: ENABLED Data Privacy: Sending Hostname: yes Callhome hostname privacy: DISABLED Smart Licensing hostname privacy: DISABLED Version privacy: DISABLED Transport: Type: Transport Off Policy: Policy in use: Merged from multiple sources. Reporting ACK required: yes (CISCO default) Unenforced/Non-Export Perpetual Attributes: First report requirement (days): 365 (CISCO default) Reporting frequency (days): 0 (CISCO default) Report on change (days): 90 (CISCO default) Unenforced/Non-Export Subscription Attributes: First report requirement (days): 90 (CISCO default) Reporting frequency (days): 90 (CISCO default) Report on change (days): 90 (CISCO default) Enforced (Perpetual/Subscription) License Attributes: First report requirement (days): 0 (CISCO default) Reporting frequency (days): 0 (CISCO default) Report on change (days): 0 (CISCO default) Export (Perpetual/Subscription) License Attributes: First report requirement (days): 0 (CISCO default) Reporting frequency (days): 0 (CISCO default) Report on change (days): 0 (CISCO default) Miscellaneous: Custom Id: <empty> Usage Reporting: Last ACK received: <none> Next ACK deadline: <none> Reporting push interval: 0 (no reporting) Next ACK push check: Nov 01 20:31:46 2020 IST Next report push: <none> Last report push: <none> Last report file write: <none> Trust Code Installed: <none> The CSSM Web UI After Migration Log in to the CSSM Web UI at https://software.cisco.com and click Smart Software Licensing. Under Inventory > Product Instances. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 113 Example: SLR to Smart Licensing Using Policy System Configuration There are no changes in the Product Instances tab. The Last Contact column displays "Reserved Licenses" since there has been no usage reporting yet. After the requisite RUM report is uploaded and acknowledged "Reserved Licenses" is no longer displayed and license usage is displayed only in the active product instance. Figure 11: SLR to Smart Licensing Using Policy: Active Product Instance Before Upgrade Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 114 System Configuration Example: SLR to Smart Licensing Using Policy Figure 12: SLR to Smart Licensing Using Policy: Active Product Instance After Upgrade Reporting After Migration SLR licenses require reporting only when there is a change in license consumption (For example, when using a subscription license which is for specified term). In an air-gapped network, use the Next report push: date in the show license status output to know when the next usage report must be sent. This ensures that the product instance and CSSM are synchronized. Since all communication to and from the product instance is disabled, to report license usage you must save RUM reports to a file and upload it to CSSM (from a workstation that has connectivity to the internet, and Cisco): 1. Generate and save RUM reports Enter the license smart save usage command in provileged EXEC mode. In the example below, all RUM reports are saved to the flash memory of the product instance, in file all_rum.txt. For syntax details see the license smart (privileged EXEC) command in the Command Reference. In the example, the file is first saved to bootflash and then copied to a TFTP location: Device# license smart save usage all bootflash:all_rum.txt Device# copy bootflash:all_rum.txt tftp://10.8.0.6/all_rum.txt 2. Upload usage data to CSSM: Uploading Data or Requests to CSSM and Downloading a File, on page 157 3. Install the ACK on the product instance: Installing a File on the Product Instance, on page 158 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 115 Example: Evaluation or Expired to Smart Licensing Using Policy System Configuration Example: Evaluation or Expired to Smart Licensing Using Policy The following is an example of a Cisco Catalyst 9800-CL Wireless Controller with evaluation expired licenses (Smart Licensing) that are migrated to Smart Licensing Using Policy. The notion of evaluation licenses does not apply to Smart Licensing Using Policy. When the software version is upgraded to one that supports Smart Licensing Using Policy, all licenses are displayed as IN USE and the Cisco default policy is applied to the product instance. Since all licenses on Cisco Catalyst Wireless Controllers are unenforced (enforcement type), no functionality is lost. · Table 10: Evaluation or Expired to Smart Licensing Using Policy: show Commands, on page 116 · The CSSM Web UI After Migration, on page 119 · Reporting After Migration, on page 119 The table below calls out key changes or new fields to check for in the show command outputs, after upgrade to Smart Licensing Using Policy Table 10: Evaluation or Expired to Smart Licensing Using Policy: show Commands Before Upgrade (Smart Licensing, Evaluation Mode) After Upgrade (Smart Licensing Using Policy) show license summary Licenses are UNREGISTERED and in EVAL MODE. show license summary All licenses are migrated and IN USE. There are no EVAL MODE licenses. Device# show license summary Smart Licensing is ENABLED Registration: Status: UNREGISTERED Export-Controlled Functionality: NOT ALLOWED Device# show license summary License Usage: License Entitlement Tag Status Count ------------------------------------------------------------- License Authorization: air-network-advantage (DNA_NWStack) 1 Status: EVAL EXPIRED IN USE air-dna-advantage (AIR-DNA-A) 1 License Usage: IN USE License Entitlement tag Count Status -------------------------------------------------------------- EXPIRED EXPIRED (DNA_NWStack) (AIR-DNA-A) 1 EVAL 1 EVAL Before Upgrade (Smart Licensing, Evaluation Mode) show license usage After Upgrade (Smart Licensing Using Policy) show license usage The Enforcement Type field displays NOT ENFORCED. (There are no export-controlled or enforced licenses on Cisco Catalyst Wireless Controllers). Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 116 System Configuration Example: Evaluation or Expired to Smart Licensing Using Policy Before Upgrade (Smart Licensing, Evaluation Mode) Device# show license usage License Authorization: Status: EVAL EXPIRED on Apr 14 18:20:46 2020 UTC (DNA_NWStack): Description: Count: 1 Version: 1.0 Status: EVAL EXPIRED Export status: NOT RESTRICTED (AIR-DNA-A): Description: Count: 1 Version: 1.0 Status: EVAL EXPIRED Export status: NOT RESTRICTED Before Upgrade (Smart Licensing, Evaluation Mode) show license status After Upgrade (Smart Licensing Using Policy) Device# show license usage License Authorization: Status: Not Applicable air-network-advantage (DNA_NWStack): Description: air-network-advantage Count: 1 Version: 1.0 Status: IN USE Export status: NOT RESTRICTED Feature Name: air-network-advantage Feature Description: air-network-advantage Enforcement type: NOT ENFORCED License type: Perpetual air-dna-advantage (AIR-DNA-A): Description: air-dna-advantage Count: 1 Version: 1.0 Status: IN USE Export status: NOT RESTRICTED Feature Name: air-dna-advantage Feature Description: air-dna-advantage Enforcement type: NOT ENFORCED License type: Perpetual After Upgrade (Smart Licensing Using Policy) show license status The Transport: field displays that the default type is set, but a URL or a method for the product instance to discover CSLU is not specified. The Trust Code Installed: field displays that a trust code is not installed. The Policy: header and details show that the Cisco default policy is applied. Under the Usage Reporting: header, the Next report push: field provides information about when the next RUM report must be sent to CSSM. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 117 Example: Evaluation or Expired to Smart Licensing Using Policy System Configuration Before Upgrade (Smart Licensing, Evaluation Mode) Device# show license status Smart Licensing is ENABLED Utility: Status: DISABLED Data Privacy: Sending Hostname: yes Callhome hostname privacy: DISABLED Smart Licensing hostname privacy: DISABLED Version privacy: DISABLED Transport: Type: Callhome Registration: Status: UNREGISTERED Export-Controlled Functionality: NOT ALLOWED License Authorization: Status: EVAL EXPIRED on Apr 14 18:20:46 2020 UTC Export Authorization Key: Features Authorized: <none> After Upgrade (Smart Licensing Using Policy) Device# show license status Utility: Status: DISABLED Smart Licensing Using Policy: Status: ENABLED Data Privacy: Sending Hostname: yes Callhome hostname privacy: DISABLED Smart Licensing hostname privacy: DISABLED Version privacy: DISABLED Transport: Type: cslu Cslu address: <empty> Proxy: Not Configured Policy: Policy in use: Merged from multiple sources. Reporting ACK required: yes (CISCO default) Unenforced/Non-Export Perpetual Attributes: First report requirement (days): 365 (CISCO default) Reporting frequency (days): 0 (CISCO default) Report on change (days): 90 (CISCO default) Unenforced/Non-Export Subscription Attributes: First report requirement (days): 90 (CISCO default) Reporting frequency (days): 90 (CISCO default) Report on change (days): 90 (CISCO default) Enforced (Perpetual/Subscription) License Attributes: First report requirement (days): 0 (CISCO default) Reporting frequency (days): 0 (CISCO default) Report on change (days): 0 (CISCO default) Export (Perpetual/Subscription) License Attributes: First report requirement (days): 0 (CISCO default) Reporting frequency (days): 0 (CISCO default) Report on change (days): 0 (CISCO default) Miscellaneous: Custom Id: <empty> Usage Reporting: Last ACK received: <none> Next ACK deadline: <none> Reporting push interval: 0 (no reporting) Next ACK push check: <none> Next report push: <none> Last report push: <none> Last report file write: <none> Trust Code Installed: <none> Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 118 System Configuration Migrating to a Version of SSM On-Prem That Supports Smart Licensing Using Policy The CSSM Web UI After Migration Log in to the CSSM Web UI at https://software.cisco.com and click Smart Software Licensing. Under Inventory > Product Instances, the Last Contact field for the migrated product instances display an updated timestamp after migration. Reporting After Migration Implement any one of the supported topologies, and fulfil reporting requirements. See Supported Topologies, on page 69 and How to Configure Smart Licensing Using Policy: Workflows by Topology , on page 86. The reporting method you can use depends on the topology you implement. Migrating to a Version of SSM On-Prem That Supports Smart Licensing Using Policy If you are using a version of SSM On-Prem that is earlier than the minimum required version (See SSM On-Prem, on page 63), you can use this section as an outline of the process and sequence you have to follow to migrate the SSM On-Prem version and the product instance. 1. Upgrade SSM On-Prem. Upgrade to the minimum required Version 8, Release 202102 or a later version. Refer to the Cisco Smart Software Manager On-Prem Migration Guide. 2. Upgrade the product instance. For information about the minimum required software version, see SSM On-Prem, on page 63. For information about the upgrade procedure, see Upgrading the Wireless Controller Software, on page 100. 3. Re-Register a local account with CSSM Online and Offline options are available. Refer to the Cisco Smart Software Manager On-Prem Migration Guide > Re-Registering a local Account (Online Mode) or Manually Re-Registering a Local Account (Offline Mode) . Once re-registration is complete, the following events occur automatically: · SSM On-Prem responds with new transport URL that points to the tenant in SSM On-Prem. · The transport type configuration on the product instance changes from from call-home or smart, to cslu. The transport URL is also updated automatically. 4. Save configuration changes on the product instance, by entering the copy running-config startup-config command in privileged EXEC mode. 5. Clear older On-Prem Smart Licensing certificates on the product instance and reload the product instance. Do not save configuration changes after this. Note This step is required only if the software version running on the product instance is Cisco IOS XE Amsterdam 17.3.x or Cisco IOS XE Bengaluru 17.4.x. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 119 Migrating to a Version of SSM On-Prem That Supports Smart Licensing Using Policy System Configuration Enter the licence smart factory reset and then the reload commands in privileged EXEC mode. Device# licence smart factory reset Device# reload 6. Perform usage synchronization a. On the product instance, enter the license smart sync {all|local} command, in privileged EXEC mode. This synchronizes the product instance with SSM On-Prem, to send and receive any pending data. Device(config)# license smart sync local You can verify this in the SSM On-Prem UI. Go to Inventory > SL Using Policy. In the Alerts column, the following message is displayed: Usage report from product instance. b. Synchronize usage information with CSSM (choose one) · Option 1: SSM On-Prem is connected to CSSM: In the SSM On-Prem UI, Smart Licensing workspace, nagivate to Reports > Usage Schedules > Synchronize now with Cisco. · Option 2: SSM On-Prem is not connected to CSSM. See Exporting and Importing Usage Data (SSM On-Prem UI), on page 137. Result: You have completed migration and initial usage synchronization. Product instance and license usage information is now displayed in SSM On-Prem. For subsequent reporting, you have the following options: · To synchronize data between the product instance and SSM On-Prem: · Schedule periodic synchronization between the product instance and SSM On-Prem, by configuring the reporting interval. Enter the license smart usage interval interval_in_days command in global configuration mode. To know when the product instance will be sending the next RUM report, enter the show license all command in privileged EXEC mode and in the output, check the Next report push: field. · Enter the license smart sync privileged EXEC command, for ad hoc or on-demand synchronization between the product instance and SSM On-Prem. · To synchronize usage information with CSSM: · Schedule periodic synchronization with CSSM. In the SSM On-Prem UI, navigate to Reports > Usage Schedules > Synchronization schedule with Cisco. Enter the following frequency information and save: · Days: Refers to how often synchronization occurs. For example, if you enter 2, synchronization occurs once every two days. · Time of Day:: Refers to the time at which synchronization occurs, in the 24-hour notation system. For example, if you enter 14 hours and 0 minutes, synchronization occurs at 2 p.m. (1400) in your local time zone. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 120 System Configuration Task Library for Smart Licensing Using Policy · Upload and download the required files for reporting. See Exporting and Importing Usage Data (SSM On-Prem UI), on page 137. Task Library for Smart Licensing Using Policy This section is a grouping of tasks that apply to Smart Licensing Using Policy. It includes tasks performed on a product instance, on the CSLU interface, and on the CSSM Web UI. To implement a particular topology, refer to the corresponding workflow to know the sequential order of tasks that apply. See How to Configure Smart Licensing Using Policy: Workflows by Topology , on page 86. To perform any additional configuration tasks, for instance, to configure a different license, or use an add-on license, or to configure a narrower reporting interval, refer to the corresponding task here. Check the "Supported Topologies" where provided, before you proceed. RUM Reporting and Acknowledgment Requirement for Cisco Catalyst 9800-CL Wireless Controller About This Requirement Beginning with Cisco IOS XE Cupertino 17.7.1, if you are using a Cisco Catalyst 9800-CL Wireless Controller, you must complete RUM (Resource Utilization Measurement) reporting and ensure that the Acknowledgment (ACK) is made available on the product instance - at least once. This is to ensure that correct and up-to-date usage information is reflected in CSSM. Prior to Cisco IOS XE Cupertino 17.7.1, RUM reporting and ACK installation was not mandatory for a Cisco Catalyst 9800-CL Wireless Controller (unlike other Cisco Catalyst Wireless Controllers). This requirement is applicable to: · A new Cisco Catalyst 9800-CL Wireless Controller purchased through the Cisco Commerce portal or downloaded from the Software Download page, and where the software version running on the product instance is Cisco IOS XE Cupertino 17.7.1 or a later release. · An existing Cisco Catalyst 9800-CL Wireless Controller that is upgraded to Cisco IOS XE Cupertino 17.7.1 or later release. Required Action to Meet This Requirement The following procedure provides information about what you have to do to ensure compliance with this requirement and avoid any throttling restrictions on new and upgraded product instances. This procedure is followed by a flow chart which depicts the same information. 1. Check when the ACK is expected. Note system behaviour if you don't meet the ACK deadline. Enter the show license air entities summary command in privileged EXEC mode and check field License Ack expected within.....................: [n] days. System behaviour if you do not meet the ACK deadline: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 121 RUM Reporting and Acknowledgment Requirement for Cisco Catalyst 9800-CL Wireless Controller System Configuration Note If the number of AP joins is greater than 10, the system displays this system message once-a-day until an ACK is installed: %IOSXE_RP_EWLC_NOT-2-MSGDEVICENOTREG. · If an ACK is not installed by the ACK deadline, and the count of currently active APs is lesser than or equal to 50, the system throttles the AP join count to 50. · If an ACK is not installed by the ACK deadline and the count of currently active APs is greater than 50, these currently active APs are not disconnected, but no new AP joins are allowed. · If there is a reload after the throttled state has come into effect, the system throttles the number of currently active APs to 50 when the system comes up after reload. · If there is a stateful switchover (SSO) after the throttled state has come into effect, all connected APs remain joined. · The following system message is displayed when the throttling restriction is effective and a new AP tries to join: %CAPWAPAC_TRACE_MSG-3-MAX_LICENSE_AP_LIMIT_REACHED. The AP join restriction and the display of the system messages continues until the first ACK is made available on the product instance. 2. Implement a supported topology. If you have not already done so, implement one of the supported topologies and complete usage reporting. The method you use to send the RUM report to CSSM and ACK installation depends on the topology you implement. For more information, see: Supported Topologies, on page 69 and How to Configure Smart Licensing Using Policy: Workflows by Topology , on page 86. 3. Ensure that the ACK is available on the product intance. In the output of the show license status command in privileged EXEC mode check for an updated timestamp in the Last ACK received:. Device# show license status <output truncated> Usage Reporting: Last ACK received: <none> Next ACK deadline: <none> Reporting push interval: 0 (no reporting) Next ACK push check: <none> Next report push: <none> Last report push: <none> Last report file write: <none> In the output of the show license air entities summary command in privileged EXEC mode, the License Ack expected within.....................: [n] days field is no longer displayed. Device# show license air entities summary Upcoming license report time....................: 21:05:16.092 UTC Mon Oct 25 2021 No. of APs active at last report................: 57 No. of APs newly added with last report.........: 57 No. of APs deleted with last report.............: 0 Once the first ACK is installed, the system messages ( %IOSXE_RP_EWLC_NOT-2-MSGDEVICENOTREG and Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 122 System Configuration RUM Reporting and Acknowledgment Requirement for Cisco Catalyst 9800-CL Wireless Controller %CAPWAPAC_TRACE_MSG-3-MAX_LICENSE_AP_LIMIT_REACHED) are not displayed any longer and AP join throttling restrictions are lifted. Figure 13: Flow Chart of System Events, User Actions, and System Actions on a Cisco Catalyst 9800-CL Wireless Controller Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 123 Logging into Cisco (CSLU Interface) System Configuration Logging into Cisco (CSLU Interface) Depending on your needs, when working in CSLU, you can either be in connected or disconnected mode. To work in the connected mode, complete these steps to connect with Cisco. Procedure Step 1 Step 2 Step 3 From the CSLU Main screen, click Login to Cisco (located at the top right corner of the screen). Enter: CCO User Name and CCO Password. In the CSLU Preferences tab, check that the Cisco connectivity toggle displays "Cisco Is Available". Configuring a Smart Account and a Virtual Account (CSLU Interface) Both the Smart Account and Virtual Account are configured through the Preferences tab. Complete the following steps to configure both Smart and Virtual Accounts for connecting to Cisco. Procedure Step 1 Step 2 Step 3 Select the Preferences Tab from the CSLU home screen. Perform these steps for adding both a Smart Account and Virtual Account: a) In the Preferences screen navigate to the Smart Account field and add the Smart Account Name. b) Next, navigate to the Virtual Account field and add the Virtual Account Name. If you are connected to CSSM (In the Preferences tab, Cisco is Available), you can select from the list of available SA/VAs. If you are not connected to CSSM (In the Preferences tab, Cisco Is Not Available), enter the SA/VAs manually. Note SA/VA names are case sensitive. Click Save. The SA/VA accounts are saved to the system Only one SA/VA pair can reside on CSLU at a time. You cannot add multiple accounts. To change to another SA/VA pair, repeat Steps 2a and 2b then Save. A new SA/VA account pair replaces the previous saved pair Adding a Product-Initiated Product Instance in CSLU (CSLU Interface) Complete these steps to add a device-created Product Instance using the Preferences tab. Procedure Step 1 Select the Preferences tab. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 124 System Configuration Ensuring Network Reachability for Product Instance-Initiated Communication Step 2 Step 3 In the Preferences screen, de-select the Validate Device check box. Set the Default Connect Method to Product Instance Initiated and then click Save. Ensuring Network Reachability for Product Instance-Initiated Communication This task provides possible configurations that may be required to ensure network reachability for product instance-initiated communication. Steps marked as "(Required)" are required for all product instances, all other steps my be required or optional, depending the kind of product instance and network requirements. Configure the applicable commands: Before you begin Supported topologies: Connected to CSSM Through CSLU (product instance-initiated communication). Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action enable Example: Device> enable configure terminal Example: Device# configure terminal interface interface-type-number Example: Device (config)# interface gigabitethernet0/0 vrf forwarding vrf-name Example: Device(config-if)# vrf forwarding Mgmt-vrf ip address ip-address mask Example: Device(config-if)# ip address 192.168.0.1 255.255.0.0 negotiation auto Example: Device(config-if)# negotiation auto Purpose Enables privileged EXEC mode. Enter your password, if prompted. Enters global configuration mode. Enters interface configuration mode and specifies the Ethernet interface, subinterface, or VLAN to be associated with the VRF. Associates the VRF with the Layer 3 interface. This command activates multiprotocol VRF on an interface Defines the IP address for the VRF. Enables auto-negotiation operation for the speed and duplex parameters of an interface. Note Cisco Catalyst 9800-L-F Wireless Controller 10G Ports do not support in an auto-negotiation operation. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 125 Adding a CSLU-Initiated Product Instance in CSLU (CSLU Interface) System Configuration Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Command or Action end Example: Device(config-if)# end Purpose Exits the interface configuration mode and enters global configuration mode. ip http client source-interface interface-type-number Example: Device(config)# ip http client source-interface gigabitethernet0/0 Configures a source interface for the HTTP client. ip route ip-address ip-mask subnet mask Example: Device(config)# ip route vrf mgmt-vrf 192.168.0.1 255.255.0.0 192.168.255.1 (Required) Configures a route and gateway on the product instance. You can configure either a static route or a dynamic route. {ip|ipv6}name-server server-address 1 ...server-address 6] Example: Device(config)# Device(config)# ip name-server vrf mgmt-vrf 173.37.137.85 Configures Domain Name System (DNS) on the VRF interface. ip domain lookup source-interface interface-type-number Example: Device(config)# ip domain lookup source-interface gigabitethernet0/0 Configures the source interface for the DNS domain lookup. Note If you configure this command on a Layer 3 physical interface, it is automatically removed from running configuration in case the port mode is changed or if the device reloads. The only available workaround is to reconfigure the command. Starting with Cisco IOS XE Dublin 17.12.1, this issue is resolved. ip domain name domain-name Example: Device(config)# ip domain name example.com Configure DNS discovery of your domain. In accompanying example, the name-server creates entry cslu-local.example.com. Adding a CSLU-Initiated Product Instance in CSLU (CSLU Interface) Using the CSLU interface, you can configure the connect method to be CSLU Initiated. This connect method (mode) enables CSLU to retrieve Product Instance information from the Product Instance. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 126 System Configuration Collecting Usage Reports: CSLU Initiated (CSLU Interface) Note The default Connect Method is set in the Preferences tab. Complete these steps to add a Product Instance from the Inventory tab Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Go to the Inventory tab and from the Product Instances table, select Add Single Product. Enter the Host (IP address of the Host). Select the Connect Method and select one of the CSLU Initiated connect methods. In the right panel, click Product Instance Login Credentials. The left panel of the screen changes to show the User Name and Password fields. Enter the product instance User Name and Password. Click Save. The information is saved to the system and the device is listed in the Product Instances table with the Last Contact listed as never. Collecting Usage Reports: CSLU Initiated (CSLU Interface) CSLU also allows you to manually trigger the gathering of usage reports from devices. After configuring and selecting a product instance (selecting Add Single Product, filling in the Host name and selecting a CSLU-initiated connect method), click Actions for Selected > Collect Usage. CSLU connects to the selected product instances and collects the usage reports. These usage reports are stored in CSLU's local library. These reports can then be transferred to Cisco if CSLU is connected to Cisco, or (if you are not connected to Cisco) you can manually trigger usage collection by selecting Data > Export to CSSM. If you are working in CSLU-initiated mode, complete these steps to configure CSLU to collect RUM reports from Product Instances. Procedure Step 1 Step 2 Step 3 Click the Preference tab and enter a valid Smart Account and Virtual Account, and then selectan appropriate CSLU-initiated collect method. (If there have been any changes in Preferences, make sure you click Save). Click the Inventory tab and select one or more product instances. Click Actions for Selected > Collect Usage. RUM reports are retrieved from each selected device and stored in the CSLU local library. The Last Contacted column is updated to show the time the report was received, and the Alerts column shows the status. If CSLU is currently logged into Cisco the reports will be automatically sent to the associated Smart Account and Virtual Account in Cisco and Cisco will send an acknowledgement to CSLU as well as to the product instance. The acknowledgement will be listed in the alerts column of the Product Instance table. To manually transfer usage reports Cisco, from the CSLU main screen select Data > Export to CSSM. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 127 Export to CSSM (CSLU Interface) System Configuration Step 4 From the Export to CSSM modal, select the local directory where the reports are to be stored. (<CSLU_WORKING_Directory>/data/default/rum/unsent) At this point, the usage reports are saved in your local directory (library). To upload these usage reports to Cisco, follow the steps described in Uploading Data or Requests to CSSM and Downloading a File, on page 157. Note The Windows operating system can change the behavior of a usage report file properties by dropping the extension when that file is renamed. The behavior change happens when you rename the downloaded file and the renamed file drops the extension. For example, the downloaded default file named UD_xxx.tar is renamed to UD_yyy. The file loses its TAR extension and cannot function. To enable the usage file to function normally, after re-naming a usage report file, you must also add the TAR extension back to the file name, for example UD_yyy.tar. Export to CSSM (CSLU Interface) The Download All for Cisco menu option is a manual process used for offline purposes. Complete these steps to use the Download For Cisco menu option Procedure Step 1 Step 2 Step 3 Step 4 Go to the Preferences tab, and turn off the Cisco Connectivity toggle switch. The field switches to "Cisco Is Not Available". From the main menu in the CSLU home screen navigate to Data > Export to CSSM. Select the file from the modal that opens and click Save. You now have the file saved. Note At this point you have a DLC file, RUM file, or both. Go to a station that has connectivity to Cisco, and complete the following: Uploading Data or Requests to CSSM and Downloading a File, on page 157 Once the file is downloaded, you can import it into CSLU, see Import from CSSM (CSLU Interface), on page 128. Import from CSSM (CSLU Interface) Once you have received the ACK or other file (such as an authorization code) from Cisco, you are ready to Upload that file to your system. This procedure can be used for workstations that are offline. Complete these steps to select and upload files from Cisco. Procedure Step 1 Ensure that you have downloaded the file to a location that is accessible to CSLU. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 128 System Configuration Ensuring Network Reachability for CSLU-Initiated Communication Step 2 Step 3 Step 4 From the main menu in the CSLU home screen, navigate to Data > Import from CSSM. An Import from CSSM modal open for you to either: · Drag and Drop a file that resides on your local drive, or · Browse for the appropriate *.xml file, select the file and click Open. If the upload is successful, you will get message indicating that the file was successfully sent to the server. If the upload is not successful, you will get an import error. When you have finished uploading, click the x at the top right corner of the modal to close it. Ensuring Network Reachability for CSLU-Initiated Communication This task provides possible configurations that may be required to ensure network reachability for CSLU-initiated communication. Steps marked as "(Required)" are required for all product instances, all other steps may be required or optional, depending the kind of product instance and network requirements. Configure the applicable commands: Before you begin Supported topologies: Connected to CSSM Through CSLU (CSLU-initiated communication). Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. configure terminal Example: Device# configure terminal Enters global configuration mode. aaa new model Example: Device(config)# aaa new model (Required) Enable the authentication, authorization, and accounting (AAA) access control model. aaa authentication login default local Example: (Required) Sets AAA authentication to use the local username database for authentication. Device(config)# aaa authentication login default local aaa authorization exec default local Sets the parameters that restrict user access to Example: a network. The user is allowed to run an EXEC shell. Device(config)# aaa authorization exec default local Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 129 Ensuring Network Reachability for CSLU-Initiated Communication System Configuration Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action ip routing Example: Device(config)# ip routing {ip|ipv6}name-server server-address 1 ...server-address 6] Example: Device(config)# ip name-server vrf Mgmt-vrf 192.168.1.100 192.168.1.200 192.168.1.300 ip domain lookup source-interface interface-type-number Example: Device(config)# ip domain lookup source-interface gigabitethernet0/0 Purpose Enables IP routing. (Optional) Specifies the address of one or more name servers to use for name and address resolution. You can specify up to six name servers. Separate each server address with a space. The first server specified is the primary server. The device sends DNS queries to the primary server first. If that query fails, the backup servers are queried. Enables DNS-based hostname-to-address translation on your device. This feature is enabled by default. If your network devices require connectivity with devices in networks for which you do not control name assignment, you can dynamically assign device names that uniquely identify your devices by using the global Internet naming scheme (DNS). Note If you configure this command on a Layer 3 physical interface, it is automatically removed from running configuration in case the port mode is changed or if the device reloads. The only available workaround is to reconfigure the command. Starting with Cisco IOS XE Dublin 17.12.1, this issue is resolved. ip domain name name Example: Device(config)# ip domain name vrf Mgmt-vrf cisco.com no username name Example: Device(config)# no username admin Defines a default domain name that the software uses to complete unqualified hostnames (names without a dotted-decimal domain name). (Required) Clears the specified username, if it exists. For name , enter the same username you will create in the next step. This ensures that a duplicate of the username you are going to create in the next step does not exist. If you plan to use REST APIs for CSLU-initiated retrieval of RUM reports, you Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 130 System Configuration Ensuring Network Reachability for CSLU-Initiated Communication Step 11 Step 12 Step 13 Step 14 Step 15 Step 16 Command or Action Purpose have to log in to CSLU. Duplicate usernames may cause the feature to work incorrectly if there are duplicate usernames in the system. username name privilege level password (Required) Establishes a username-based password authentication system. Example: The privilege keyword sets the privilege level Device(config)# username admin privilege for the user. A number between 0 and 15 that 15 specifies the privilege level for the user. password 0 lab The password allows access to the name argument. A password must be from 1 to 25 characters, can contain embedded spaces, and must be the last option specified in the username command. This enables CSLU to use the product instance native REST. Note Enter this username and password in CSLU (Collecting Usage Reports: CSLU Initiated (CSLU Interface), on page 127 Step 4. f. CSLU can then collect RUM reports from the product instance. interface interface-type-number Example: Device (config)# interface gigabitethernet0/0 vrf forwarding vrf-name Example: Device(config-if)# vrf forwarding Mgmt-vrf ip address ip-address mask Example: Device(config-if)# ip address 192.168.0.1 255.255.0.0 negotiation auto Example: Device(config-if)# negotiation auto no shutdown Example: Device(config-if)# no shutdown Enters interface configuration mode and specifies the Ethernet interface, subinterface, or VLAN to be associated with the VRF. Associates the VRF with the Layer 3 interface. This command activates multiprotocol VRF on an interface Defines the IP address for the VRF. Enables auto-negotiation operation for the speed and duplex parameters of an interface. Restarts a disabled interface. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 131 Ensuring Network Reachability for CSLU-Initiated Communication System Configuration Step 17 Step 18 Step 19 Step 20 Step 21 Step 22 Step 23 Step 24 Step 25 Command or Action end Example: Device(config-if)# end Purpose Exits the interface configuration mode and enters global configuration mode. ip http server Example: Device(config)# ip http server (Required) Enables the HTTP server on your IP or IPv6 system, including a Cisco web browser user interface. The HTTP server uses the standard port 80, by default. ip http authentication local Example: ip http authentication local Device(config)# (Required) Specifies a particular authentication method for HTTP server users. The local keyword means that the login user name, password and privilege level access combination specified in the local system configuration (by the username global configuration command) should be used for authentication and authorization. ip http secure-server Example: Device(config)# ip http server (Required) Enables a secure HTTP (HTTPS) server. The HTTPS server uses the Secure Sockets Layer (SSL) version 3.0 protocol. ip http max-connections (Required) Configures the maximum number Example: of concurrent connections allowed for the HTTP server. Enter an integer in the range Device(config)# ip http max-connections from 1 to 16. The default is 5. 16 ip tftp source-interface interface-type-number Specifies the IP address of an interface as the Example: source address for TFTP connections. Device(config)# ip tftp source-interface GigabitEthernet0/0 ip route ip-address ip-mask subnet mask Example: Device(config)# ip route vrf mgmt-vrf 192.168.0.1 255.255.0.0 192.168.255.1 Configures a route and gateway on the product instance. You can configure either a static route or a dynamic route. logging host Example: Device(config)# logging host 172.25.33.20 vrf Mgmt-vrf Logs system messages and debug output to a remote host. end Example: Device(config)# end Exits the global configuration mode and enters priveleged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 132 System Configuration Assigning a Smart Account and Virtual Account (SSM On-Prem UI) Step 26 Command or Action show ip http server session-module Example: Device# show ip http server session-module Purpose (Required) Verifies HTTP connectivity. In the output, check that SL_HTTP is active. Additionally, you can also perform the following checks : · From device where CSLU is installed, verify that you can ping the product instance. A successful ping confirms that the product instance is reachable. · From a Web browser on the device where CSLU is installed verify https://<product-instance-ip>/. This ensures that the REST API from CSLU to the product instance works as expected. Assigning a Smart Account and Virtual Account (SSM On-Prem UI) You can use this procedure to import one or more product instances along with corresponding Smart Account and Virtual Account information, into the SSM On-Prem database. This enables SSM On-Prem to map product instances that are part of local virtual accounts (other than the default local virtual account), to the correct license pool in CSSM: Before you begin Supported topologies: SSM On-Prem Deployment (product instance-initiated communication). Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Log into the SSM On-Prem and select the Smart Licensing workspace. Navigate to Inventory > SL Using Policy > Export/Import All > Import Product Instances List The Upload Product Instances window is displayed. Click Download to download the .csv template file and enter the required information for all the product instances in the template. Once you have filled-out the template, click Inventory > SL Using Policy > Export/Import All > Import Product Instances List. The Upload Product Instances window is displayed. Now, click Browse and upload the filled-out .csv template. Smart Account and Virtual Account information for all uploaded product instances is now available in SSM On-Prem. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 133 Validating Devices (SSM On-Prem UI) System Configuration Validating Devices (SSM On-Prem UI) When device validation is enabled, RUM reports from an unknown product instance (not in the SSM On-Prem database) are rejected. By default, devices are not validated. Complete the following steps to enable it: Before you begin Supported topologies: SSM On-Prem Deployment (product instance-initiated communication). Procedure Step 1 Step 2 Step 3 In the On-Prem License Workspace window, click Admin Workspace and log in, if prompted. The On-Prem Admin Workspace window is displayed. Click the Settings widget. The Settings window is displayed. Navigate to the CSLU tab and turn-on the Validate Device toggle switch. RUM reports from an unknown product instance will now be rejected. If you haven't already, you must now add the required product instances to the SSM On-Prem database before sending RUM reports. See Assigning a Smart Account and Virtual Account (SSM On-Prem UI), on page 133 Ensuring Network Reachability for Product Instance-Initiated Communication This task provides possible configurations that may be required to ensure network reachability for product instance-initiated communication. Steps marked as "(Required)" are required for all product instances, all other steps my be required or optional, depending the kind of product instance and network requirements. Configure the applicable commands: Note Ensure that you configure steps 13, 14, and 15 exactly as shown below. These commands must be configured to ensure that the correct trustpoint is used and that the necessary certificates are accepted for network reachability. Before you begin Supported topologies: SSM On-Prem Deployment(product instance-initiated communication). Procedure Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. Enter your password, if prompted. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 134 System Configuration Ensuring Network Reachability for Product Instance-Initiated Communication Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action Device> enable Purpose configure terminal Example: Device# configure terminal Enters global configuration mode. interface interface-type-number Example: Device (config)# interface gigabitethernet0/0 Enters interface configuration mode and specifies the Ethernet interface, subinterface, or VLAN to be associated with the VRF. vrf forwarding vrf-name Example: Device(config-if)# vrf forwarding Mgmt-vrf Associates the VRF with the Layer 3 interface. This command activates multiprotocol VRF on an interface ip address ip-address mask Example: Device(config-if)# ip address 192.168.0.1 255.255.0.0 Defines the IP address for the VRF. negotiation auto Example: Device(config-if)# negotiation auto Enables auto-negotiation operation for the speed and duplex parameters of an interface. end Example: Device(config-if)# end Exits the interface configuration mode and enters global configuration mode. ip http client source-interface interface-type-number Example: Device(config)# ip http client source-interface gigabitethernet0/0 Configures a source interface for the HTTP client. ip route ip-address ip-mask subnet mask Example: Device(config)# ip route vrf mgmt-vrf 192.168.0.1 255.255.0.0 192.168.255.1 (Required) Configures a route and gateway on the product instance. You can configure either a static route or a dynamic route. {ip|ipv6}name-server server-address 1 ...server-address 6] Example: Device(config)# Device(config)# ip name-server vrf mgmt-vrf 198.51.100.1 Configures Domain Name System (DNS) on the VRF interface. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 135 Ensuring Network Reachability for Product Instance-Initiated Communication System Configuration Step 11 Step 12 Step 13 Step 14 Step 15 Step 16 Step 17 Command or Action ip domain lookup source-interface interface-type-number Example: Device(config)# ip domain lookup source-interface gigabitethernet0/0 Purpose Configures the source interface for the DNS domain lookup. Note If you configure this command on a Layer 3 physical interface, it is automatically removed from running configuration in case the port mode is changed or if the device reloads. The only available workaround is to reconfigure the command. Starting with Cisco IOS XE Dublin 17.12.1, this issue is resolved. ip domain name domain-name Example: Device(config)# ip domain name example.com Configure DNS discovery of your domain. In the accompanying example, the name-server creates entry cslu-local.example.com. crypto pki trustpoint SLA-TrustPoint Example: Device(config)# crypto pki trustpoint SLA-TrustPoint Device(ca-trustpoint)# (Required) Declares that the product instance should use trustpoint "SLA-TrustPoint" and enters the ca-trustpoint configuration mode. The product instance does not recognize any trustpoints until you declare a trustpoint using this command. enrollment terminal Example: Device(ca-trustpoint)# enrollment terminal Required) Specifies the certificate enrollment method. revocation-check none (Required) Specifes a method that is to be used Example: to ensure that the certificate of a peer is not revoked. For the SSM On-Prem Deployment Device(ca-trustpoint)# revocation-check topology, enter the none keyword. This means none that a revocation check will not be performed and the certificate will always be accepted. exit Example: Device(ca-trustpoint)# exit Device(config)# exit Exits the ca-trustpoint configuration mode and then the global configuration mode and returns to privileged EXEC mode. copy running-config startup-config Example: Device# copy running-config startup-config Saves your entries in the configuration file. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 136 System Configuration Retrieving the Transport URL (SSM On-Prem UI) Retrieving the Transport URL (SSM On-Prem UI) You must configure the transport URL on the product instance when you deploy the product instance-initiated communication with SSM On-Prem deployment. This task show you how to easily copy the complete URL including the tenant ID from SSM On-Prem. Before you begin Supported topologies: SSM On-Prem Deployment (product instance-initiated communication). Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Log into SSM On-Prem and select the Smart Licensing workspace. Navigate to the Inventory tab and from the dropdown list of local virtual accounts (top right corner), select the default local virtual account. When you do, the area under the Inventory tab displays Local Virtual Account: Default. Navigate to the General tab. The Product Instance Registration Tokens area is displayed. In the Product Instance Registration Tokens area click CSLU Transport URL. The Product Registration URL pop-window is displayed. Copy the entire URL and save it in an accessible place. You will require the URL when you configure the transport type and URL on the product instance. Configure the transport type and URL. See: Setting the Transport Type, URL, and Reporting Interval, on page 159. Exporting and Importing Usage Data (SSM On-Prem UI) You can use this procedure to complete usage synchronization between SSM On-Prem and CSSM when SSM On-Prem is disconnected from CSSM. Before you begin Supported topologies: · SSM On-Prem Deployment (SSM On-Prem-initiated communication) · SSM On-Prem Deployment (product instance-initiated communication). Reporting data must be available in SSM On-Prem. You must have either pushed the nessary reporting data from the product instance to SSM On-Prem (product instance-initiated communication) or retrieved the necessary reporting data from the product instance (SSM On-Prem-initiated communication). Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 137 Adding One or More Product Instances (SSM On-Prem UI) System Configuration Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Log into SSM On-Prem and select Smart Licensing. Navigate to Inventory > SL Using Policy tab. In the SL Using Policy tab area, click Export/Import All... > Export Usage to Cisco. This generates one .tar file with all the usage reports available in the SSM On-Prem server. Complete this task in CSSM: Uploading Data or Requests to CSSM and Downloading a File, on page 157. At the end of this task you will have an ACK file to import into SSM On-Prem. Again navigate to the Inventory > SL Using Policy tab. In the SL Using Policy tab area, click Export/Import All... > Import From Cisco . Upload the .tar ACK file. To verify ACK import, in the SL Using Policy tab area check the Alerts column of the corresponding product instance. The following message is displayed: Acknowledgement received from CSSM. Adding One or More Product Instances (SSM On-Prem UI) You can use this procedure to add one product instance or to import and add multiple product instances. It enables SSM On-Prem to retrieve information from the product instance. Before you begin Supported topologies: SSM On-Prem Deployment (SSM On-Prem-initiated communication). Procedure Step 1 Step 2 Step 3 Step 4 Log into the SSM On-Prem UI and click Smart Licensing. Navigate to Inventory tab. Select a local virtual account from the drop-down list in the top right corner. Navigate to the SL Using Policy tab. Add a single product or import multiple product instances (choose one). · To add a single product instance: a. In the SL Using Policy tab area, click Add Single Product. b. In the Host field, enter the IP address of the host (product instance). c. From the Connect Method dropdown list, select an appropriate SSM On-Prem-initiated connect method. The available connect methods for SSM On-Prem-initiated communication are: NETCONF, RESTCONF, and REST API. d. In the right panel, click Product Instance Login Credentials. The Product Instance Login Credentials window is displayed Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 138 System Configuration Ensuring Network Reachability for SSM On-Prem-Initiated Communication Note You need the login credentials only if a product instance requires a SLAC. e. Enter the User ID and Password, and click Save. This is the same user ID and password that you configured as part of commands required to establish network reachability (Ensuring Network Reachability for SSM On-Prem-Initiated Communication, on page 139). Once validated, the product instance is displayed in the listing in the SL Using Policy tab area. · To import multiple product instances: a. In SL Using Policy tab, click Export/Import All... > Import Product Instances List. The Upload Product Instances window is displayed. b. Click Download to download the predefined .csv template. c. Enter the required information for all the product instances in the .csv template. In the template, ensure that you provide Host, Connect Method and Login Credentials for all product instances. The available connect methods for SSM On-Prem-initiated communication are: NETCONF, RESTCONF, and REST API. Login credentials refer to the user ID and password that you configured as part of commands required to establish network reachability (Ensuring Network Reachability for SSM On-Prem-Initiated Communication, on page 139). d. Again navigate to Inventory > SL Using Policy tab. Click Export/Import All.... > Import Product Instances List. The Upload Product Instances window is displayed. e. Now upload the filled-out .csv template. Once validated, the product instances are displayed in the listing in the SL Using Policy tab. Ensuring Network Reachability for SSM On-Prem-Initiated Communication This task provides possible configurations that may be required to ensure network reachability for SSM On-Prem-initiated communication. Steps marked as "(Required)" are required for all product instances, all other steps may be required or optional, depending the kind of product instance and network requirements. Configure the applicable commands: Note Ensure that you configure steps 25, 26, and 27 exactly as shown below. These commands must be configured to ensure that the correct trustpoint is used and that the necessary certificates are accepted for network reachability. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 139 Ensuring Network Reachability for SSM On-Prem-Initiated Communication System Configuration Before you begin Supported topologies: SSM On-Prem Deployment (SSM On-Prem-initiated communication). Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. configure terminal Example: Device# configure terminal Enters global configuration mode. aaa new model Example: Device(config)# aaa new model (Required) Enable the authentication, authorization, and accounting (AAA) access control model. aaa authentication login default local Example: (Required) Sets AAA authentication to use the local username database for authentication. Device(config)# aaa authentication login default local aaa authorization exec default local Sets the parameters that restrict user access to Example: a network. The user is allowed to run an EXEC shell. Device(config)# aaa authorization exec default local ip routing Example: Device(config)# ip routing Enables IP routing. {ip|ipv6}name-server server-address 1 ...server-address 6] Example: Device(config)# ip name-server vrf Mgmt-vrf 192.168.1.100 192.168.1.200 192.168.1.300 (Optional) Specifies the address of one or more name servers to use for name and address resolution. You can specify up to six name servers. Separate each server address with a space. The first server specified is the primary server. The device sends DNS queries to the primary server first. If that query fails, the backup servers are queried. ip domain lookup source-interface interface-type-number Example: Device(config)# ip domain lookup source-interface gigabitethernet0/0 Enables DNS-based hostname-to-address translation on your device. This feature is enabled by default. If your network devices require connectivity with devices in networks for which you do not Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 140 System Configuration Ensuring Network Reachability for SSM On-Prem-Initiated Communication Step 9 Step 10 Step 11 Command or Action Purpose control name assignment, you can dynamically assign device names that uniquely identify your devices by using the global Internet naming scheme (DNS). Note If you configure this command on a Layer 3 physical interface, it is automatically removed from running configuration in case the port mode is changed or if the device reloads. The only available workaround is to reconfigure the command. Starting with Cisco IOS XE Dublin 17.12.1, this issue is resolved. ip domain name name Example: Device(config)# ip domain name vrf Mgmt-vrf cisco.com Defines a default domain name that the software uses to complete unqualified hostnames (names without a dotted-decimal domain name). no username name Example: Device(config)# no username admin (Required) Clears the specified username, if it exists. For name , enter the same username you will create in the next step. This ensures that a duplicate of the username you are going to create in the next step does not exist. If you plan to use REST APIs for SSM On-Prem-initiated retrieval of RUM reports, you have to log in to SSM On-Prem. Duplicate usernames may cause the feature to work incorrectly if there are present in the system. username name privilege level password (Required) Establishes a username-based password authentication system. Example: The privilege keyword sets the privilege level Device(config)# username admin privilege for the user. A number between 0 and 15 that 15 specifies the privilege level for the user. password 0 lab The password allows access to the name argument. A password must be from 1 to 25 characters, can contain embedded spaces, and must be the last option specified in the username command. This enables SSM On-Prem to use the product instance native REST. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 141 Ensuring Network Reachability for SSM On-Prem-Initiated Communication System Configuration Step 12 Step 13 Step 14 Step 15 Step 16 Step 17 Step 18 Step 19 Command or Action Purpose Note Enter this username and password in SSM On-Prem (Adding One or More Product Instances (SSM On-Prem UI), on page 138). This enables SSM On-Prem to collect RUM reports from the product instance. interface interface-type-number Example: Device (config)# interface gigabitethernet0/0 vrf forwarding vrf-name Example: Device(config-if)# vrf forwarding Mgmt-vrf ip address ip-address mask Example: Device(config-if)# ip address 192.168.0.1 255.255.0.0 negotiation auto Example: Device(config-if)# negotiation auto no shutdown Example: Device(config-if)# no shutdown end Example: Device(config-if)# end ip http server Example: Device(config)# ip http server ip http authentication local Example: ip http authentication local Device(config)# Enters interface configuration mode and specifies the Ethernet interface, subinterface, or VLAN to be associated with the VRF. Associates the VRF with the Layer 3 interface. This command activates multiprotocol VRF on an interface Defines the IP address for the VRF. Enables auto-negotiation operation for the speed and duplex parameters of an interface. Restarts a disabled interface. Exits the interface configuration mode and enters global configuration mode. (Required) Enables the HTTP server on your IP or IPv6 system, including a Cisco web browser user interface. The HTTP server uses the standard port 80, by default. (Required) Specifies a particular authentication method for HTTP server users. The local keyword means that the login user name, password and privilege level access combination specified in the local system configuration (by the username global Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 142 System Configuration Ensuring Network Reachability for SSM On-Prem-Initiated Communication Step 20 Step 21 Step 22 Step 23 Step 24 Step 25 Step 26 Step 27 Command or Action Purpose configuration command) should be used for authentication and authorization. ip http secure-server Example: Device(config)# ip http server (Required) Enables a secure HTTP (HTTPS) server. The HTTPS server uses the Secure Sockets Layer (SSL) version 3.0 protocol. ip http max-connections (Required) Configures the maximum number Example: of concurrent connections allowed for the HTTP server. Enter an integer in the range Device(config)# ip http max-connections from 1 to 16. The default is 5. 16 ip tftp source-interface interface-type-number Specifies the IP address of an interface as the Example: source address for TFTP connections. Device(config)# ip tftp source-interface GigabitEthernet0/0 ip route ip-address ip-mask subnet mask Example: Device(config)# ip route vrf mgmt-vrf 192.168.0.1 255.255.0.0 192.168.255.1 Configures a route and gateway on the product instance. You can configure either a static route or a dynamic route. logging host Example: Device(config)# logging host 172.25.33.20 vrf Mgmt-vrf Logs system messages and debug output to a remote host. crypto pki trustpoint SLA-TrustPoint Example: Device(config)# crypto pki trustpoint SLA-TrustPoint Device(ca-trustpoint)# (Required) Declares that the product instance should use trustpoint "SLA-TrustPoint" and enters the ca-trustpoint configuration mode. The product instance does not recognize any trustpoints until you declare a trustpoint using this command. enrollment terminal Example: Device(ca-trustpoint)# enrollment terminal Required) Specifies the certificate enrollment method. revocation-check none (Required) Specifes a method that is to be used Example: to ensure that the certificate of a peer is not revoked. For the SSM On-Prem Deployment Device(ca-trustpoint)# revocation-check topology, enter the none keyword. This means none that a revocation check will not be performed and the certificate will always be accepted. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 143 Setting Up a Connection to CSSM System Configuration Step 28 Step 29 Command or Action end Example: Device(ca-trustpoint)# exit Device(config)# end show ip http server session-module Example: Device# show ip http server session-module Step 30 copy running-config startup-config Example: Device# copy running-config startup-config Purpose Exits the ca-trustpoint configuration mode and then the global configuration mode and returns to privileged EXEC mode. (Required) Verifies HTTP connectivity. In the output, check that SL_HTTP is active. Additionally, you can also perform the following checks : · From device where SSM On-Prem is installed, verify that you can ping the product instance. A successful ping confirms that the product instance is reachable. · From a Web browser on the device where SSM On-Prem is installed verify https://<product-instance-ip>/. This ensures that the REST API from SSM On-Prem to the product instance works as expected. Saves your entries in the configuration file. Setting Up a Connection to CSSM The following steps show how to set up a Layer 3 connection to CSSM to verify network reachability. Steps marked as "(Required)" are required for all product instances, all other steps may be required or optional, depending the kind of product instance and network requirements. Configure the applicable commands: Procedure Step 1 Step 2 Step 3 Command or Action enable Example: Device> enable configure terminal Example: Device# configure terminal {ip|ipv6}name-server server-address 1 ...server-address 6] Purpose Enables privileged EXEC mode. Enter your password, if prompted. Enters global configuration mode. Specifies the address of one or more name servers to use for name and address resolution. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 144 System Configuration Setting Up a Connection to CSSM Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action Example: Device(config)# ip name-server 209.165.201.1 209.165.200.225 209.165.201.14 209.165.200.230 Purpose You can specify up to six name servers. Separate each server address with a space. The first server specified is the primary server. The device sends DNS queries to the primary server first. If that query fails, the backup servers are queried. ip name-server vrf Mgmt-vrf server-address (Optional) Configures DNS on the VRF 1...server-address 6 interface. You can specify up to six name Example: Device(config)# ip name-server vrf Mgmt-vrf servers. Separate each server address with a space. Note This command is an alternative 209.165.201.1 209.165.200.225 209.165.201.14 209.165.200.230 to the ip name-server command. ip domain lookup source-interface interface-type interface-number Example: Device(config)# ip domain lookup source-interface Vlan100 Configures the source interface for the DNS domain lookup. ip domain name domain-name Example: Device(config)# ip domain name example.com Configures the domain name. ip host tools.cisco.com ip-address Configures static hostname-to-address Example: mappings in the DNS hostname cache if automatic DNS mapping is not available. Device(config)# ip host tools.cisco.com 209.165.201.30 interface interface-type-number Example: Configures a Layer 3 interface. Enter an interface type and number or a VLAN. Device(config)# interface Vlan100 Device(config-if)# ip address 192.0.2.10 255.255.255.0 Device(config-if)# exit ntp server ip-address [version number] [key (Required) Activates the NTP service (if it has key-id] [prefer] not already been activated) and enables the Example: system to synchronize the system software clock with the specified NTP server. This Device(config)# ntp server 198.51.100.100 version 2 prefer ensures that the device time is synchronized with CSSM. Use the prefer keyword if you need to use this command multiple times and you want to set a preferred server. Using this keyword reduces switching between servers. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 145 Configuring Smart Transport Through an HTTPs Proxy System Configuration Step 10 Step 11 Step 12 Step 13 Step 14 Command or Action switchport access vlan vlan_id Example: Device(config)# interface GigabitEthernet1/0/1 Device(config-if)# switchport access vlan 100 Device(config-if)# switchport mode access Device(config-if)# exit OR Device(config)# Purpose Enables the VLAN for which this access port carries traffic and sets the interface as a nontrunking nontagged single-VLAN Ethernet interface. Note This step is to be configured only if the switchport access mode is required. The switchport access vlan command may apply to Catalyst switching product instances, for example, and for routing product instances you may want to configure the ip address ip-address mask command instead. ip route ip-address ip-mask subnet mask Example: Device(config)# ip route 192.0.2.0 255.255.255.255 192.0.2.1 ip http client source-interface interface-type-number Example: Device(config)# ip http client source-interface Vlan100 exit Example: Device(config)# exit copy running-config startup-config Example: Device# copy running-config startup-config Configures a route on the device. You can configure either a static route or a dynamic route. (Required) Configures a source interface for the HTTP client. Enter an interface type and number or a VLAN. Exits global configuration mode and returns to privileged EXEC mode. Saves your entries in the configuration file. Configuring Smart Transport Through an HTTPs Proxy To use a proxy server to communicate with CSSM when using the Smart transport mode, complete the following steps: Procedure Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. Enter your password, if prompted. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 146 System Configuration Configuring the Call Home Service for Direct Cloud Access Step 2 Step 3 Step 4 Step 5 Command or Action Device> enable Purpose configure terminal Example: Device# configure terminal Enters global configuration mode. license smart transport smart Enables Smart transport mode. Example: Device(config)# license smart transport smart license smart url default Automatically configures the Smart URL Example: (https://smartreceiver.cisco.com/licservice/ license). For this option to work as expected, Device(config)# license smart transport the transport mode in the previous step must be default configured as smart. license smart proxy {address Configures a proxy for the Smart transport address_hostname|port port_num} mode. When a proxy is configured, licensing Example: messages are sent to the proxy along with the final destination URL (CSSM). The proxy sends Device(config)# license smart proxy the message on to CSSM. Configure the proxy address 192.168.0.1 Device(config)# license smart proxy port address and port number separately: 3128 · address address_hostname: Specifies the proxy address. Enter the IP address or hostname of the proxy server. · port port_num: Specifies the proxy port. Enter the proxy port number. Note the change in the criteria for the acceptance of proxy servers, starting with Cisco IOS XE Bengaluru 17.6.1: only the status code of the proxy server response is verified by the system and not the reason phrase. The RFC format is status-line = HTTP-version SP status-code SP reason-phrase CRLF. For more information about the status line, see section 3.1.2 of RFC 7230. Configuring the Call Home Service for Direct Cloud Access The Call Home service provides email-based and web-based notification of critical system events to CSSM. To configure the transport mode, enable the Call Home service, and configure a destination profile (A destination profile contains the required delivery information for an alert notification. At least one destination profile is required.), complete the following steps: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 147 Configuring the Call Home Service for Direct Cloud Access System Configuration Note All steps are required unless specifically called-out as "(Optional)". Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. configure terminal Example: Device# configure terminal Enters global configuration mode. license smart transport callhome Enables Call Home as the transport mode. Example: Device(config)# license smart transport callhome license smart url url For the callhome transport mode, configure Example: the CSSM URL exactly as shown in the example. Device(config)# license smart url https://tools.cisco.com/its/service/oddce/services/DDCEService service call-home Example: Device(config)# service call-home Enables the Call Home feature. call-home Example: Device(config)# call-home Enters Call Home configuration mode. no http secure server-identity-check Example: Disables server identity check when HTTP connection is established. Device(config-call-home)# no http secure server-identity-check contact-email-address email-address Example: Device(config-call-home)# contact-email-addr username@example.com Assigns customer's email address and enables Smart Call Home service full reporting capability and sends a full inventory message from Call-Home TAC profile to Smart Call Home server to start full registration process. You can enter up to 200 characters in email address format with no spaces. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 148 System Configuration Configuring the Call Home Service for Direct Cloud Access Step 9 Step 10 Step 11 Step 12 Command or Action profile name Example: Device(config-call-home)# profile CiscoTAC-1 Device(config-call-home-profile)# Purpose Enters the Call Home destination profile configuration submode for the specified destination profile. By default: · The CiscoTAC-1 profile is inactive. To use this profile with the Call Home service, you must enable the profile. · The CiscoTAC-1 profile sends a full report of all types of events subscribed in the profile. The alternative is to additionally configure Device(cfg-call-home-profile)# anonymous-reporting-only anonymous-reporting-only. When this is set, only crash, inventory, and test messages will be sent. Use the show call-home profile all command to check the profile status. active Enables the destination profile. Example: Device(config-call-home-profile)# active destination transport-method http{email |http} Example: Device(config-call-home-profile)# destination transport-method http AND Device(config-call-home-profile)# no destination transport-method email Enables the message transport method. In the example, Call Home service is enabled via HTTP and transport via email is disabled. The no form of the command disables the method. destination address { email email_address Configures the destination e-mail address or |http url} URL to which Call Home messages are sent. Example: When entering a destination URL, include either http:// (default) or https://, depending Device(config-call-home-profile)# destination address http on whether the server is a secure server. https://tools.cisco.com/its/service/oddce/services/DDCEService In the example provided here, a http:// AND Device(config-call-home-profile)# no destination address http destination URL is configured; and the no form of the command is configured for https://. https://tools.cisco.com/its/service/oddce/services/DDCEService Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 149 Configuring the Call Home Service for Direct Cloud Access through an HTTPs Proxy Server System Configuration Step 13 Step 14 Step 15 Step 16 Command or Action Purpose exit Exits Call Home destination profile Example: configuration mode and returns to Call Home configuration mode. Device(config-call-home-profile)# exit exit Example: Device(config-call-home)# end Exits Call Home configuration mode and returns to privileged EXEC mode. copy running-config startup-config Example: Device# copy running-config startup-config Saves your entries in the configuration file. show call-home profile {name |all} Displays the destination profile configuration for the specified profile or all configured profiles. Configuring the Call Home Service for Direct Cloud Access through an HTTPs Proxy Server The Call Home service can be configured through an HTTPs proxy server. This configuration requires no user authentication to connect to CSSM. Note Authenticated HTTPs proxy configurations are not supported. To configure and enable the Call Home service through an HTTPs proxy, complete the following steps: Note All steps are required unless specifically called-out as "(Optional)". Procedure Step 1 Command or Action enable Example: Device> enable Step 2 configure terminal Example: Device# configure terminal Purpose Enables privileged EXEC mode. Enter your password, if prompted. Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 150 System Configuration Removing and Returning an Authorization Code Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action Purpose license smart transport callhome Enables Call Home as the transport mode. Example: Device(config)# license smart transport callhome service call-home Example: Device(config)# service call-home Enables the Call Home feature. call-home Example: Device(config)# call-home Enters Call Home configuration mode. http-proxy proxy-address proxy-port port-number Example: Device(config-call-home)# http-proxy 198.51.100.10 port 5000 Configures the proxy server information to the Call Home service. Note the change in the criteria for the acceptance of proxy servers, starting with Cisco IOS XE Bengaluru 17.6.1: only the status code of the proxy server response is verified by the system and not the reason phrase. The RFC format is status-line = HTTP-version SP status-code SP reason-phrase CRLF. For more information about the status line, see section 3.1.2 of RFC 7230. exit Example: Device(config-call-home)# exit Exits Call Home configuration mode and enters global configuration mode. exit Example: Device(config)# exit Exits global configuration mode and enters privileged EXEC mode. copy running-config startup-config Example: Device# copy running-config startup-config Saves your entries in the configuration file. Removing and Returning an Authorization Code To remove and return an SLR authorization code, complete the following steps. Before you begin Supported topologies: all Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 151 Removing and Returning an Authorization Code System Configuration Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. Step 2 show license summary Example: Device# show license summary Ensure that the license that you want to remove and return is not in-use. If it is in-use, you must first disable the feature. Step 3 license smart authorization Returns an authorization code back to the return{all|local}{offline[path]|online} license pool in CSSM. A return code is Example: displayed after you enter this command. Device# license smart authorization Specify the product instance: return all online · all: Performs the action for all connected Enter this return code in Cisco Smart Software Manager portal: product instances in a High Availability set-up. UDI: PID:C9800-CL-K9,SN:93BBAH93MGS Return code: · local: Performs the action for the active CqaUPW-WSPYiq-ZNU2ci-SnWydS-hBCXHP-MuyPqyPJ1GiG-tPTGQj-S2h product instance. This is the default option. UDI: PID:C9800-CL-K9,SN:9XECPSUU4XN Return code: Specify if you are connected to CSSM or not: CNLwxR-eWiAEJ-XaTEQg-j4rrYW-dSRz9j-37VpcPimjuLD-mNeA4k-TXA · If connected to CSSM, enter online. The code is automatically returned to CSSM OR and a confirmation is returned and installed Device# license smart authorization return local offline Enter this return code in Cisco Smart on the product instance. If you choose this option, the return code is automatically submitted to CSSM. Software Manager portal: · If not connected to CSSM, enter UDI: PID:C9800-CL-K9,SN:93BBAH93MGS Return code: offline[path]. CqaUPW-WSPYiq-ZNU2ci-SnWydS-hBCXHP-MuyPqy- If you enter only the offline keyword, you PJ1GiG-tPTGQj-S2h UDI: PID:C9800-CL-K9,SN:9XECPSUU4XN Return code: must copy the return code that is displayed on the CLI and enter it in CSSM. CNLwxR-eWiAEJ-XaTEQg-j4rrYW-dSRz9j-37VpcPimjuLD-mNeA4k-TXA If you specify a file name and path, the return code is saved in the specified OR location. The file format can be any Device# license smart authorization return local offline bootflash:return-code.txt readable format. For example: Device# license smart authorization return local offline bootflash:return-code.txt. For software versions Cisco IOS XE Cupertino 17.7.1 and later only: After you save the return request in a file, you can upload the file to CSSM in the same location and in the same way as you upload a RUM report: Uploading Data or Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 152 System Configuration Removing and Returning an Authorization Code Step 4 Step 5 Step 6 Step 7 Command or Action Purpose Requests to CSSM and Downloading a File, on page 157. To enter the return code in CSSM, complete this task: Removing the Product Instance from CSSM, on page 154. Proceed with the next step only after you complete this step. configure terminal Example: Device# configure terminal Enters the global configuration mode. no license smart reservation Example: Device(config)# no license smart reservation Disables SLR configuration on the product instance. You must complete the authorization code return process in Step 3 above - whether online or offline, before you enter the no license smart reservation command in this step. Otherwise, the return may not be reflected in CSSM or in the show command, and you will have to contact your Cisco technical support representative to rectify the problem. exit Example: Device(config)# exit Returns to privileged EXEC mode. show license all Displays licensing information. Check the Example: Device# show license all <output truncated> License Authorizations License Authorizations header in the output. If the return process is completed correctly, the Last return code: field displays the return code. ====================== Overall status: Active: PID:C9800-CL-K9,SN:93BBAH93MGS Status: NOT INSTALLED Last return code: CqaUPW-WSPYiq-ZNU2ci-SnWydS-hBCXHP-MuyPqy-PJ1GiG-tPTGQj-S2h Standby: PID:C9800-CL-K9,SN:9XECPSUU4XN Status: NOT INSTALLED Last return code: CNLwxR-eWiAEJ-XaTEQg-j4rrYW-dSRz9j-37VpcP-imjuLD-mNeA4k-TXA <output truncated> Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 153 Removing the Product Instance from CSSM System Configuration Removing the Product Instance from CSSM To remove a product instance and return all licenses to the license pool, complete the following task: Before you begin Supported topologies: No Connectivity to CSSM and No CSLU If you are removing a product instance that is using reserved licenses (SLR) ensure that you have generated a return code as shown in Removing and Returning an Authorization Code, on page 151. (Enter it in Step 7 in this task). Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Log in to the CSSM Web UI at https://software.cisco.com and click Smart Software Licensing. Log in using the username and password provided by Cisco. Click the Inventory tab. From the Virtual Account drop-down list, choose your Virtual Account. Click the Product Instances tab. The list of product instances that are available is displayed. Locate the required product instance from the product instances list. Optionally, you can enter a name or product type string in the search tab to locate the product instance. In the Actions column of the product instance you want to remove, click the Remove link. · If the product instance is not using a license with an SLR authorization code then the Confirm Remove Product Instance window is displayed. · If the product instance is using a license with an SLR authorization code, then the Remove Product Instance window, with a field for return code entry is displayed. In the Reservation Return Code field, enter the return code you generated. Note This step applies only if the product instance is using a license with an SLR authorization code. Click Remove Product Instance. The license is returned to the license pool and the product instance is removed. Generating a New Token for a Trust Code from CSSM To generate a token to request a trust code, complete the following steps. Generate one token for each Virtual Account you have. You can use same token for all the product instances that are part of one Virtual Account. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 154 System Configuration Installing a Trust Code Before you begin Supported topologies: Connected Directly to CSSM Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Log in to the CSSM Web UI at https://software.cisco.com and click Smart Software Licensing. Log in using the username and password provided by Cisco. Click the Inventory tab. From the Virtual Account drop-down list, choose the required virtual account Click the General tab. Click New Token. The Create Registration Token window is displayed. In the Description field, enter the token description In the Expire After field, enter the number of days the token must be active. (Optional) In the Max. Number of Uses field, enter the maximum number of uses allowed after which the token expires. Click Create Token. You will see your new token in the list. Click Actions and download the token as a .txt file. Installing a Trust Code To manually install a trust code, complete the following steps Before you begin Supported topologies: · Connected Directly to CSSM Procedure Step 1 Command or Action Purpose Generating a New Token for a Trust Code from In case you have not completed this already, CSSM, on page 154 generate and download a trust code file from CSSM. Step 2 enable Example: Device> enable Enables privileged EXEC mode. Enter your password, if prompted Step 3 license smart trust idtoken id_token_value{local|all}[force] Example: Enables you to establish a trusted connection with CSSM. For id_token_value, enter the token you generated in CSSM. Enter one of following options: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 155 Downloading a Policy File from CSSM System Configuration Step 4 Command or Action Purpose Device# license smart trust idtoken NGMwMjk5mYtNZaxMS00NzMZmtgWm all force · local: Submits the trust request only for the active device in a High Availability set-up. This is the default option. · all: Submits the trust request for all devices in a High Availability set-up. Enter the force keyword to submit the trust code request in spite of an existing trust code on the product instance. Trust codes are node-locked to the UDI of the product instance. If a UDI is already registered, CSSM does not allow a new registration for the same UDI. Entering the force keyword sets a force flag in the message sent to CSSM to create a new trust code even if one already exists. show license status Displays date and time if trust code is installed. Example: <output truncated> Date and time are in the local time zone. See field Trust Code Installed:. Trust Code Installed: Active: PID:C9800-CL-K9,SN:93BBAH93MGS INSTALLED on Nov 02 08:59:26 2020 IST Standby: PID:C9800-CL-K9,SN:9XECPSUU4XN INSTALLED on Nov 02 09:00:45 2020 IST Downloading a Policy File from CSSM If you have requested a custom policy or if you want to apply a policy that is different from the default that is applied to the product instance, complete the following task: Before you begin Supported topologies: · No Connectivity to CSSM and No CSLU · CSLU Disconnected from CSSM Procedure Step 1 Step 2 Log in to the CSSM Web UI at https://software.cisco.com and click Smart Software Licensing. Log in using the username and password provided by Cisco. Follow this directory path: Reports > Reporting Policy. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 156 System Configuration Uploading Data or Requests to CSSM and Downloading a File Step 3 Click Download, to save the .xml policy file. You can now install the file on the product instance. See Installing a File on the Product Instance, on page 158 Uploading Data or Requests to CSSM and Downloading a File You can use this task to: · To upload a RUM report to CSSM and download an ACK. · To upload a SLAC or SLR authorization code return request. This applies only to the No Connectivity to CSSM and No CSLU topology and is supported starting with Cisco IOS XE Cupertino 17.7.1. To upload a RUM report to CSSM and download an ACK when the product instance is not connected to CSSM or CSLU, complete the following task: Before you begin Supported topologies: · No Connectivity to CSSM and No CSLU · CSLU Disconnected from CSSM · SSM On-Prem Deployment (Product instance-initiated communication and SSM On-Prem-initiated communication) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Log in to the CSSM Web UI at https://software.cisco.com. Log in using the username and password provided by Cisco. Select the Smart Account (upper left-hand corner of the screen) that will receive the report. Select Smart Software Licensing Reports Usage Data Files. Click Upload Usage Data. Browse to the file location (RUM report in tar format), select, and click Upload Data. Upload a RUM report (.tar format), or a SLAC return request file (.txt format). You cannot delete a usage report in CSSM, after it has been uploaded. From the Select Virtual Accounts pop-up, select the Virtual Account that will receive the uploaded file. The file is uploaded to Cisco and is listed in the Usage Data Files table in the Reports screen showing the File Name, time is was Reported, which Virtual Account it was uploaded to, the Reporting Status, Number of Product Instances reported, and the Acknowledgement status. In the Acknowledgement column, click Download to save the .txt ACK file for the report you uploaded. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 157 Installing a File on the Product Instance System Configuration Wait for the ACK to appear in the Acknowledgement column. If there many RUM reports or requests to process, CSSM may take a few minutes. Depending on the topology you have implemented, you can now install the file on the product instance, or transfer it to CSLU, or import it into SSM On-Prem. Installing a File on the Product Instance To install a SLAC, or policy, or ACK, on the product instance when the product instance is not connected to CSSM or CSLU, complete the following task: Before you begin Supported topologies: No Connectivity to CSSM and No CSLU You must have the corresponding file saved in a location that is accessible to the product instance. · For a policy, see Downloading a Policy File from CSSM, on page 156 · For an ACK, see Uploading Data or Requests to CSSM and Downloading a File, on page 157 Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted Step 2 copy source bootflash:file-name Copies the file from its source location or Example: directory to the flash memory of the product instance. Device# copy tftp://10.8.0.6/example.txt bootflash: · source: This is the location of the source file or directory to be copied. The source can be either local or remote · bootflash:: This is the destination for boot flash memory. Step 3 Step 4 license smart import bootflash: file-name Example: Device# license smart import bootflash:example.txt show license all Example: Device# show license all Imports and installs the file on the product instance. After installation, a system message displays the type of file you just installed. Displays license authorization, policy and reporting information for the product instance. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 158 System Configuration Setting the Transport Type, URL, and Reporting Interval Setting the Transport Type, URL, and Reporting Interval To configure the mode of transport for a product instance, complete the following task: Before you begin Supported topologies: all Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. Step 2 configure terminal Example: Device# configure terminal Step 3 license smart Configures a mode of transport for the product transport{automatic|callhome|cslu|off|smart} instance to use. Choose from the following Example: options: Device(config)# license smart transport · automatic: Sets the transport mode cslu. cslu · callhome: Enables Call Home as the transport mode. · cslu: This is the default transport mode. Enter this keyword if you are using CSLU or SSM On-Prem, with product instance-initiated communication. While the transport mode keyword is the same for CSLU and SSM On-Prem, the transport URLs are different. See license smart url cslu cslu_or_on-prem_url in the next step. · off: Disables all communication from the product instance. · smart: Enables Smart transport. Step 4 license smart url{url |cslu Sets a URL for the configured transport mode. cslu_or_on-prem_url|default|smartsmart_url|utilitysmart_url} Depending on the transport mode you've chosen Example: in the previous step, configure the corresponding URL here: Device(config)# license smart url cslu http://192.168.0.1:8182/cslu/v1/pi · url: If you have configured the transport mode as callhome, configure this option. Enter the CSSM URL exactly as follows: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 159 Setting the Transport Type, URL, and Reporting Interval Command or Action System Configuration Purpose https://tools.cisco.com/its/service/oddce/services/DDCEService The no license smart urlurl command reverts to the default URL. · cslu cslu_or_on-prem_url: If you have configured the transport mode as cslu, configure this option with the URL for CSLU or SSM On-Prem, as applicable. · If you are using CSLU, enter the URL as follows: http://<cslu_ip_or_host>:8182/cslu/v1/pi For <cslu_ip_or_host>, enter the hostname or the IP address of the windows host where you have installed CSLU. 8182 is the port number and it is the only port number that CSLU uses. The no license smart url cslu cslu_url command reverts to http://cslu-local:8182/cslu/v1/pi · If you are using SSM On-Prem, enter the URL as follows: http://<ip>/cslu/v1/pi/<tenant ID> For <ip>, enter the hostname or the IP address of the server where you have installed SSM On-Prem. The <tenantID> must be the default local virtual account ID. Tip You can retrieve the entire URL from SSM On-Prem. See Retrieving the Transport URL (SSM On-Prem UI), on page 137 The no license smart url cslu cslu_url command reverts to http://cslu-local:8182/cslu/v1/pi · default: Depends on the configured transport mode. Only the smart and cslu transport modes are supported with this option. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 160 System Configuration Configuring an AIR License Step 5 Step 6 Step 7 Command or Action Purpose If the transport mode is set to cslu, and you configure license smart url default, the CSLU URL is configured automatically (https://cslu-local:8182/cslu/v1/pi). If the transport mode is set to smart, and you configure license smart url default, the Smart URL is configured automatically (https://smartreceiver.cisco.com/licservice/license). · smart smart_url: If you have configured the transport type as smart, configure this option. Enter the URL exactly as follows: https://smartreceiver.cisco.com/licservice/license When you configure this option, the system automatically creates a duplicate of the URL in license smart url url. You can ignore the duplicate entry, no further action is required. The no license smart url smartsmart_url command reverts to the default URL. · utility smart_url: Although available on the CLI, this option is not supported. license smart usage interval interval_in_days (Optional) Sets the reporting interval in days. Example: Device(config)# license smart usage interval 40 By default the RUM report is sent every 30 days. The valid value range is 1 to 3650. If you do not configure an interval, the reporting interval is determined entirely by the policy value. exit Example: Device(config)# exit Exits global configuration mode and returns to privileged EXEC mode. copy running-config startup-config Example: Device# copy running-config startup-config Saves your entries in the configuration file. Configuring an AIR License In the Smart Licensing Using Policy environment, you can use this task to configure a license, or change the license being used on the product instance, or configure an add-on license on the product instance. For example, if you are currently using AIR Network Advantage and you also want to use features available with a corresponding Digital Networking Architecture (DNA) Advantage license, you can configure the same using Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 161 Configuring an AIR License System Configuration this task. Or for example, if you do not want to use an add-on license any more, reconfigure this command to use only the AIR Network Advantage license. Information about available licenses can be found Smart Account or Virtual Account. The available licenses may be one of the following: · AIR Network Essential · AIR Network Advantage · AIR DNA Essential · AIR DNA Advantage To configure or change the license in-use, follow this procedure: Before you begin Supported topologies: all Procedure Step 1 Command or Action enable Example: Device> enable Step 2 configure terminal Example: Device# configure terminal Step 3 license air level {air-network-advantage [addon air-dna-advantage ] | air-network-essentials [addon air-dna-essentials ] } Example: Device(config)# license air level air-network-essentials addon air-dna-essentials Step 4 exit Example: Device(config)# exit Step 5 copy running-config startup-config Example: Device# copy running-config startup-config Step 6 reload Example: Purpose Enables the privileged EXEC mode. Enter your password, if prompted. Enters the global configuration mode. Activates the configured license on the product instance. In the accompanying example, the product instance activates the AIR DNA Essentials (along with the AIR Network Essential) license after reload. Returns to the privileged EXEC mode. Saves configuration changes. Reloads the device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 162 System Configuration Configuring an AIR License Step 7 Command or Action Device# reload Purpose show version Example: Displays currently used license and the license that is effective at the next reload information. Device# show version Cisco IOS XE Software, Version 17.03.02 Cisco IOS Software [Amsterdam], C9800-CL Software (C9800-CL-K9_IOSXE), Version 17.3.2, RELEASE SOFTWARE <output truncated> AIR License Level: AIR DNA Essentials Next reload AIR license Level: AIR DNA Essentials Smart Licensing Status: Registration Not Applicable/Not Applicable <output truncated> What to do next After you configure a license level, the change is effective after a reload. To know if reporting is required, refer to the output of the show license status privileged EXEC command and check the Next ACK deadline: and Next report push: fields. Note The change in license usage is recorded on the product instance. The next steps relating to reporting - if required - depend on your current topology. · Connected to CSSM Through CSLU · Product Instance-initiated communication: The product instance triggers reporting and installs the returning ACK. CSLU sends the RUM report to CSSM and collects the ACK from CSSM. · CSLU-initiated communication: You have to collect usage from the CSLU interface: Collecting Usage Reports: CSLU Initiated (CSLU Interface), on page 127. CSLU sends the RUM report to CSSM and collects the ACK from CSSM. · Connected Directly to CSSM: The product instance triggers reporting and installs the returning ACK. · CSLU Disconnected from CSSM: · Product Instance-initiated communication: The product instance triggers reporting. You then have to report usage in the disconnected mode: Export to CSSM (CSLU Interface), on page 128 > Uploading Data or Requests to CSSM and Downloading a File, on page 157 > Import from CSSM (CSLU Interface), on page 128. · CSLU-initiated communication: You have to collect usage from the CSLU interface and report usage in the disconnected mode: Collecting Usage Reports: CSLU Initiated (CSLU Interface), on page 127> Export to CSSM (CSLU Interface), on page 128 > Uploading Data or Requests to CSSM and Downloading a File, on page 157 > Import from CSSM (CSLU Interface), on page 128. · No Connectivity to CSSM and No CSLU: License usage is recorded on the product instance. You must save RUM reports to a file on the product instance, and from a workstation that has connectivity to the Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 163 Sample Resource Utilization Measurement Report System Configuration internet, and Cisco, upload it to CSSM: Enter license smart save usage privileged EXEC command to save usage > Uploading Data or Requests to CSSM and Downloading a File, on page 157 > Installing a File on the Product Instance, on page 158. Sample Resource Utilization Measurement Report The following is a sample Resource Utilization Measurement (RUM) report, in XML format (See RUM Report and Report Acknowledgement, on page 67). Several such reports may be concatenated to form one report. <?xml version="1.0" encoding="UTF-8"?> <smartLicense> <RUMReport><![CDATA[{"payload":"{"aset_identification":{"aset":{"name":"regid.2018-05.com.cisco.WLC_950C,1.0_856585-b865-4e32-8184-510412fcb54"},"instance":{"sudi":{"udi_pid":"C980-CL-K9","udi_serial_number":"93BAH93MGS"},"signature":{"signing_type":"builtin","key":"regid.2018-05.com.cisco.WLC_950C,1.0_856585-b865-4e32-8184-510412fcb54","value":"PLfaPAeqEAqPN6vG0FxTNnBSKNy+7gqtJ6wQWdb5NcM="},"meta":{"entitlement_tag":"regid.2018-06.com.cisco.DNA_NWStack,1.0_e724e71-3ad5-4608-8bf0-d12f67c80896","report_id":160424086,"ha_udi":[{"role":"Active","sudi":{"udi_pid":"C980-CL-K9","udi_serial_number":"93BAH93MGS"},{"role":"Standby","sudi":{"udi_pid":"C980-CL-K9","udi_serial_number":"9XECPSU4XN"}]},"measurements":[{"log_time":1604270528,"metric_name":"ENTITLEMENT","start_time":1604270198,"end_time":1604270858,"sample_interval":60,"num_samples":2,"meta":{"aded_sudi_list":[{"udi_pid":"C9130AXE-B","udi_serial_number":"986745231140K001"}],"removed_sudi_list":[]},"value":{"type":"COUNT","value":"1"}]></RUMReport> </smartLicense> Troubleshooting Smart Licensing Using Policy This section provides the list of Smart Licensing Using Policy-related system messages you may encounter, possible reasons for failure, and recommended action. System Message Overview The system software sends system messages to the console (and, optionally, to a logging server on another system). Not all system messages mean problems with your system. Some messages are informational, and others can help diagnose problems with communications lines, internal hardware, or the system software. How to Read System Messages System log messages can contain up to 80 characters. Each system message begins with a percent sign (%) and is structured as follows: %FACILITY Two or more uppercase letters that show the facility to which the message refers. A facility can be a hardware device, a protocol, or a module of the system software SEVERITY A single-digit code from 0 to 7 that reflects the severity of the condition. The lower the number, the more serious the situation. Table 11: Message Severity Levels Severity Level 0 - emergency Description System is unusable. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 164 System Configuration System Message Overview Severity Level 1 - alert 2 - critical 3 - error 4 - warning 5 - notification 6 - informational 7 - debugging Description Immediate action required. Critical condition. Error condition. Warning condition. Normal but significant condition. Informational message only. Message that appears during debugging only. MNEMONIC A code that uniquely identifies the message. Message-text Message-text is a text string describing the condition. This portion of the message sometimes contains detailed information about the event, including terminal port numbers, network addresses, or addresses that correspond to locations in the system memory address space. Because the information in these variable fields changes from message to message, it is represented here by short strings enclosed in square brackets ([ ]). A decimal number, for example, is represented as [dec]. Table 12: Variable Fields in Messages Severity Level [char] [chars] [dec] [enet] [hex] [inet] [int] [node] [t-line] [clock] Description Single character Character string Decimal number Ethernet address (for example, 0000.FEED.00C0) Hexadecimal number Internet address (for example, 10.0.2.16) Integer Address or node name Terminal line number in octal (or in decimal if the decimal-TTY service is enabled) Clock (for example, 01:20:08 UTC Tue Mar 2 1993 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 165 System Messages System Configuration System Messages This section provides the list of Smart Licensing Using Policy-related system messages you may encounter, possible reasons for failure (incase it is a failure message), and recommended action (if action is required). For all error messages, if you are not able to solve the problem, contact your Cisco technical support representative with the following information: The message, exactly as it appears on the console or in the system log. The output from the show license tech support, show license history message, and the show platform software sl-infra privileged EXEC commands. · %SMART_LIC-3-POLICY_INSTALL_FAILED · %SMART_LIC-3-AUTHORIZATION_INSTALL_FAILED · %SMART_LIC-3-COMM_FAILED · %SMART_LIC-3-COMM_RESTORED · %SMART_LIC-3-POLICY_REMOVED · %SMART_LIC-3-TRUST_CODE_INSTALL_FAILED · %SMART_LIC-4-REPORTING_NOT_SUPPORTED · %SMART_LIC-6-POLICY_INSTALL_SUCCESS · %SMART_LIC-6-AUTHORIZATION_INSTALL_SUCCESS · %SMART_LIC-6-AUTHORIZATION_REMOVED · %SMART_LIC-6-REPORTING_REQUIRED · %SMART_LIC-6-TRUST_CODE_INSTALL_SUCCESS · %IOSXE_RP_EWLC_NOT-2-MSGDEVICENOTREG · %CAPWAPAC_TRACE_MSG-3-MAX_LICENSE_AP_LIMIT_REACHED Error Message %SMART_LIC-3-POLICY_INSTALL_FAILED: The installation of a new licensing policy has failed: [chars]. Explanation: A policy was installed, but an error was detected while parsing the policy code, and installation failed. [chars] is the error string with details of the failure. Possible reasons for failure include: · A signature mismatch: This means that the system clock is not accurate. · A timestamp mismatch: This means the system clock on the product instance is not synchronized with CSSM. Note The device should have a valid clock and the NTP configuration. Recommended Action: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 166 System Configuration System Messages For both possible failure reasons, ensure that the system clock is accurate and synchronized with CSSM. Configure the ntp server command in global configuration mode. For example: Device(config)# ntp server 198.51.100.100 version 2 prefer If the above does not work and policy installation still fails, and contact your Cisco technical support representative. ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Error Message %SMART_LIC-3-AUTHORIZATION_INSTALL_FAILED: The install of a new licensing authorization code has failed on [chars]: [chars]. This message is not applicable to Cisco Catalyst Access, Core, and Aggregation Switches, because there are no enforced or export-controlled licenses on these product instances. ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Error Message %SMART_LIC-3-COMM_FAILED: Communications failure with the [chars] : [chars] Explanation: Smart Licensing communication either with CSSM, or CSLU, or SSM On-Prem failed. The first [chars] is the currently configured transport type, and the second [chars] is the error string with details of the failure. This message appears for every communication attempt that fails. Possible reasons for failure include: · CSSM, CSLU, SSM On-Prem is not reachable: This means that there is a network reachability problem. · 404 host not found: This means the CSSM server is down. · A TLS or SSL handshake failure caused by a missing client certificate. The certificate is required for TLS authentication of the two communicating sides. A recent server upgrade may have cause the certificate to be removed. This reason applies only to a topology where the product instance is directly connected to CSSM. Note If the error message is displayed for this reason, there is no actual configuration error or disruption in the communication with CSSM. For topologies where the product instance initiates the sending of RUM reports (Connected to CSSM Through CSLU: Product Instance-Initiated Communication, Connected Directly to CSSM, CSLU Disconnected from CSSM: Product Instance-Initiated Communication, and SSM On-Prem Deployment: Product Instance-Initiated Communication) if this communication failure message coincides with scheduled reporting (license smart usage interval interval_in_days global configuration command), the product instance attempts to send out the RUM report for up to four hours after the scheduled time has expired. If it is still unable to send out the report (because the communication failure persists), the system resets the interval to 15 minutes. Once the communication failure is resolved, the system reverts the reporting interval to last configured value. Recommended Action: Troubleshooting steps are provided for when CSSM is not reachable or there is a missing client certificate, when CSLU is not reachable, and when SSM On-Prem is not reachable. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 167 System Messages System Configuration · If a client certificate is missing and there is no actual configuration error or disruption in the communication with CSSM: To resolve the error, configure the ip http client secure-trustpoint trustpoint-name command in global configuration mode. For trustpoint-name, enter only SLA-TrustPoint. This command specifies that the secure HTTP client should use the certificate associated with the trustpoint indicated by the trustpoint-name argument. · If CSSM is not reachable and the configured transport type is smart: 1. Check if the smart URL is configured correctly. Use the show license status command in privileged EXEC mode, to check if the URL is exactly as follows: https://smartreceiver.cisco.com/licservice/ license. If it is not, reconfigure the license smart url smart smar_URL command in global configuration mode. 2. Check DNS resolution. Verify that the product instance can ping smartreceiver.cisco.com or the nslookup translated IP. The following example shows how to ping the translated IP Device# ping 171.70.168.183 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 171.70.168.183, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/2 ms · If CSSM is not reachable and the configured transport type is callhome: 1. Check if the URL is entered correctly. Use the show license status command in privileged EXEC mode, to check if the URL is exactly as follows: https://tools.cisco.com/its/service/oddce/services/ DDCEService. 2. Check if Call Home profile CiscoTAC-1 is active and destination URL is correct. Use the show call-home profile all command in privileged EXEC mode: Current smart-licensing transport settings: Smart-license messages: enabled Profile: CiscoTAC-1 (status: ACTIVE) Destination URL(s): https://tools.cisco.com/its/service/oddce/services/DDCEService 3. Check DNS Resolution. Verify that the product instance can ping tools.cisco.com, or the nslookup translated IP. Device# ping tools.cisco.com Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 173.37.145.8, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 41/41/42 ms If the above does not work check the following: if the product instance is set, if the product instance IP network is up. To ensure that the network is up, configure the no shutdown command in interface configuration mode. Check if the device is subnet masked with a subnet IP, and if the DNS IP is confgured. 4. Verify that the HTTPs client source interface is correct. Use the show ip http client command in privileged EXEC mode to display current configuration. Use ip http client source-interface command in global configuration mode to reconfigure it. In case the above does not work, double-check your routing rules, and firewall settings. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 168 System Configuration System Messages · If CSLU is not reachable: 1. Check if CSLU discovery works. · Zero-touch DNS discovery of cslu-local or DNS discovery of your domain.. In the show license all command output, check if the Last ACK received: field. If this has a recent timestamp it means that the product instance has connectivity with CSLU. If it is not, proceed with the following checks: Check if the product instance is able to ping cslu-local. A successful ping confirms that the product instance is reachable. If the above does not work, configure the name server with an entry where hostname cslu-local is mapped to the CSLU IP address (the windows host where you installed CSLU). Configure the ip domain name domain-name and ip name-server server-address commands in global configuration mode. Here the CSLU IP is 192.168.0.1 and name-server creates entry cslu-local.example.com: Device(config)# ip domain name example.com Device(config)# ip name-server 192.168.0.1 · CSLU URL is configured. In the show license all command output, under the Transport: header check the following: The Type: must be csluand Cslu address: must have the hostname or the IP address of the windows host where you have installed CSLU. Check if the rest of the address is configured as shown below and check if the port number is 8182. Transport: Type: cslu Cslu address: http://192.168.0.1:8182/cslu/v1/pi If it is not, configure the license smart transport cslu and license smart url cslu http://<cslu_ip_or_host>:8182/cslu/v1/pi commands in global configuration mode 2. For CSLU-initiated communication, in addition to the CSLU discovery checks listed above, check the following: Verify HTTP connectivity. Use the show ip http server session-module command in privileged EXEC mode. In the output, under header HTTP server current connections:, check that SL_HTTP is active. If it is not re-configure the ip http commands as mentioned in Ensuring Network Reachability for CSLU-Initiated Communication, on page 129 From a Web browser on the device where CSLU is installed, verify https://<product-instance-ip>/. This ensures that the REST API from CSLU to the product instance works as expected. · If SSM On-Prem is not reachable: 1. For product instance-initiated communication, check if the SSM On-Prem transport type and URL are configured correctly. In the show license all command output, under the Transport: header check the following: The Type: must be csluand Cslu address: must have the hostname or the IP address of the server where you have installed SSM On-Prem and <tenantID> of the default local virtual account. See the example below: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 169 System Messages System Configuration Transport: Type: cslu Cslu address: https://192.168.0.1/cslu/v1/pi/on-prem-default Check if you have the correct URL from SSM On-Prem (Retrieving the Transport URL (SSM On-Prem UI), on page 137) and then configure license smart transport cslu and license smart url cslu http://<ip>/cslu/v1/pi/<tenant ID> commands in global configuration mode. Check that you have configured any other required commands for your network as mentioned in Ensuring Network Reachability for Product Instance-Initiated Communication, on page 134. 2. For SSM On-Prem-initiated communication, check HTTPs connectivity. Use the show ip http server session-module command in privileged EXEC mode. In the output, under header HTTP server current connections:, check that SL_HTTP is active. If it is not re-configure the ip http commands as mentioned in Ensuring Network Reachability for SSM On-Prem-Initiated Communication, on page 139. 3. Check trustpoint and that certificates are accepted. For both forms of communication in an SSM On-Prem Deployment, ensure that the correct trustpoint is used and that the necessary certificates are accepted: Device(config)# crypto pki trustpoint SLA-TrustPoint Device(ca-trustpoint)# Device(ca-trustpoint)# enrollment terminal Device(ca-trustpoint)# revocation-check none Device(ca-trustpoint)# end Device# copy running-config startup-config If the above does not work and policy installation still fails, contact your Cisco technical support representative. ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Error Message %SMART_LIC-3-COMM_RESTORED: Communications with the [chars] restored. [chars] - depends on the transport type - Cisco Smart Software Manager (CSSM) - Cisco Smart License utility (CSLU) Smart Agent communication with either the Cisco Smart Software Manager (CSSM) or the Cisco Smart License utility (CSLU) has been restored. No action required. Explanation: Product instance communication with either the CSSM, or CSLU, or SSM On-Prem is restored. Recommended Action: No action required. ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Error Message %SMART_LIC-3-POLICY_REMOVED: The licensing policy has been removed. Explanation: A previously installed custom licensing policy has been removed. The Cisco default policy is then automatically effective. This may cause a change in the behavior of smart licensing. Possible reasons for failure include: If you have entered the license smart factory reset command in privileged EXEC mode all licensing information including the policy is removed. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 170 System Configuration System Messages Recommended Action: If the policy was removed intentionally, then no further action is required. If the policy was removed inadvertantly, you can reapply the policy. Depending on the topology you have implemented, follow the corresponding method to retrieve the policy: · Connected Directly to CSSM: Enter show license status, and check field Trust Code Installed:. If trust is established, then CSSM will automatically return the policy again. The policy is automatically re-installed on product instances of the corresponding Virtual Account. If trust has not been established, complete these tasks: Generating a New Token for a Trust Code from CSSM, on page 154 and Installing a Trust Code, on page 155. When you have completed these tasks, CSSM will automatically return the policy again. The policy is then automatically installed on all product instances of that Virtual Account. · Connected to CSSM Through CSLU: · For product instance-initiatied communication), enter the license smart sync command in privileged EXEC mode. The synchronization request causes CSLU to push the missing information (a policy or authurization code) to the product instance. · For CSLU-initiated communication, complete this task: Collecting Usage Reports: CSLU Initiated (CSLU Interface), on page 127. This causes CSLU to detect and re-furnish the missing policy in an ACK response. · CSLU Disconnected from CSSM: · For product instance-initiatied communication), enter the license smart sync command in privileged EXEC mode. The synchronization request causes CSLU to push the missing information (a policy or authurization code) to the product instance. Then complete these tasks in the given order:Export to CSSM (CSLU Interface), on page 128 > Uploading Data or Requests to CSSM and Downloading a File, on page 157 > Import from CSSM (CSLU Interface), on page 128. · For CSLU-initiated communication, complete this task: Collecting Usage Reports: CSLU Initiated (CSLU Interface), on page 127. This causes CSLU to detect and re-furnish the missing policy in an ACK response. Then complete these tasks in the given order: Export to CSSM (CSLU Interface), on page 128 > Uploading Data or Requests to CSSM and Downloading a File, on page 157 > Import from CSSM (CSLU Interface), on page 128. · No Connectivity to CSSM and No CSLU If you are in an entirely air-gapped network, from a workstation that has connectivity to the internet and CSSM complete this task: Downloading a Policy File from CSSM, on page 156. Then complete this task on the product instance: Installing a File on the Product Instance, on page 158. · SSM On-Prem Deployment · For product instance-initiatied communication), enter the license smart sync command in privileged EXEC mode. The causes the product instance to synchronize with SSM On-Prem and restore any required or missing information. Then synchronize SSM On-Prem with CSSM if required: · For SSM On-Prem-initiated communication: In the SSM On-Prem UI, navigate to Reports > Synchronisation pull schedule with the devices > Synchronise now with the device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 171 System Messages System Configuration For both forms of communication in an SSM On-Prem Deployment, synchronize with CSSM using either option: · SSM On-Prem is connected to CSSM: In the SSM On-Prem UI, Smart Licensing workspace, nagivate to Reports > Usage Schedules > Synchronize now with Cisco. · SSM On-Prem is not connected to CSSM: Exporting and Importing Usage Data (SSM On-Prem UI), on page 137. ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Error Message %SMART_LIC-3-TRUST_CODE_INSTALL_FAILED: The install of a new licensing trust code has failed on [chars]: [chars]. Explanation: Trust code installation has failed. The first [chars] is the UDI where trust code installation was attempted. The second [chars] is the error string with details of the failure. Possible reasons for failure include: · A trust code is already installed: Trust codes are node-locked to the UDI of the product instance. If the UDI is already registered, and you try to install another one, installation fails. · Smart Account-Virtual Account mismatch: This means the Smart Account or Virtual Account (for which the token ID was generated) does not include the product instance on which you installed the trust code. The token generated in CSSM, applies at the Smart Account or Virtual Account level and applies only to all product instances in that account. · A signature mismatch: This means that the system clock is not accurate. · Timestamp mismatch: This means the product instance time is not synchronized with CSSM, and can cause installation to fail. Recommended Action: · A trust code is already installed: If you want to install a trust code inspite of an existing trust code on the product instance, re-configure the license smart trust idtoken id_token_value{local|all}[force] command in privileged EXEC mode, and be sure to include the force keyword this time. Entering the force keyword sets a force flag in the message sent to CSSM to create a new trust code even if one already exists. · Smart Account-Virtual Account mismatch: Log in to the CSSM Web UI at https://software.cisco.com and click Smart Software Licensing>Inventory > Product Instances. Check if the product instance on which you want to generate the token is listed in the selected Virtual Account. If it is, proceed to the next step. If not, check and select the correct Smart Account and Virtual Account. Then complete these tasks again: Generating a New Token for a Trust Code from CSSM, on page 154 and Installing a Trust Code, on page 155. · Timestamp mismatch and signature mismatch: Configure the ntp server command in global configuration mode. For example: Device(config)# ntp server 198.51.100.100 version 2 prefer Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 172 System Configuration System Messages ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Error Message %SMART_LIC-4-REPORTING_NOT_SUPPORTED: The CSSM OnPrem that this product instance is connected to is down rev and does not support the enhanced policy and usage reporting mode. Explanation: Cisco Smart Software Manager On-Prem (formerly known as Cisco Smart Software Manager satellite) is supported in the Smart Licensing Using Policy environment starting with Cisco IOS XE Amsterdam 17.3.3 only (See SSM On-Prem, on page 63). In unsupported releases, the product instance will behave as follows: · Stop sending registration renewals and authorization renewals. · Start recording usage and saving RUM reports locally. Recommended Action: You have the following options: · Refer to and implement one of the supported topologies instead. See: Supported Topologies, on page 69. · Upgrade to a release where SSM On-Prem is supported with Smart Licensing Using Policy. See Migrating to a Version of SSM On-Prem That Supports Smart Licensing Using Policy, on page 119. ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Error Message %SMART_LIC-6-POLICY_INSTALL_SUCCESS: A new licensing policy was successfully installed. Explanation: A policy was installed in one of the following ways: · Using Cisco IOS commands. · CSLU-initiated communication. · As part of an ACK response. Recommended Action: No action is required. If you want to know which policy is applied (the policy in-use) and its reporting requirements, enter the show license all command in privileged EXEC mode. ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Error Message %SMART_LIC-6-AUTHORIZATION_INSTALL_SUCCESS: A new licensing authorization code was successfully installed on: [chars]. This message is not applicable to Cisco Catalyst Access, Core, and Aggregation Switches, because there are no enforced or export-controlled licenses on these product instances. ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 173 System Messages System Configuration Error Message %SMART_LIC-6-AUTHORIZATION_REMOVED: A licensing authorization code has been removed from [chars] Explanation: [chars] is the UDI where the authorization code was installed. The authorization code has been removed. This removes the licenses from the product instance and may cause a change in the behavior of smart licensing and the features using licenses. Recommended Action: No action is required. If you want to see the current state of the license, enter the show license all command in privileged EXEC mode. ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Error Message %SMART_LIC-6-REPORTING_REQUIRED: A Usage report acknowledgement will be required in [dec] days. Explanation: This is an alert which means that RUM reporting to Cisco is required. [dec] is the amount of time (in days) left to meet this reporting requirements. Recommended Action: Ensure that RUM reports are sent within the requested time. The topology you have implemented determines the reporting method. · Connected to CSSM Through CSLU · For product instance-initiatied communication: Enter the license smart sync command in privileged EXEC mode. If CSLU is currently logged into CSSM the reports will be automatically sent to the associated Smart Account and Virtual Account in CSSM. · For CSLU-initiated communication, complete this task: Collecting Usage Reports: CSLU Initiated (CSLU Interface), on page 127. · Connected Directly to CSSM: Enter the license smart sync command in privileged EXEC mode. · Connected to CSSM Through a Controller: If the product instance is managed by a controller, the controller will send the RUM report at the scheduled time. If you are using Cisco DNA Center as the controller, you have the option of ad-hoc reporting. See the Cisco DNA Center Administrator Guide of the required release (Release 2.2.2 onwards) > Manage Licenses > Upload Resource Utilization Details to CSSM. · CSLU Disconnected from CSSM: If the product instance is connected to CSLU, synchronize with the product instance as shown for "Connected to CSSM Through CSLU"above, then complete these tasks: Export to CSSM (CSLU Interface), on page 128, Uploading Data or Requests to CSSM and Downloading a File, on page 157, and Import from CSSM (CSLU Interface), on page 128. · No Connectivity to CSSM and No CSLU: Enter the license smart save usage command in privileged EXEC mode, to save the required usage information in a file. Then, from a workstation where you have connectivity to CSSM, complete these tasks: Uploading Data or Requests to CSSM and Downloading a File, on page 157 > Installing a File on the Product Instance, on page 158. · SSM On-Prem Deployment: Synchronize the product instance with SSM On-Prem: · For product instance-initiatied communication: Enter the license smart sync command in privileged EXEC mode. If CSLU is currently logged into CSSM the reports will be automatically sent to the associated Smart Account and Virtual Account in CSSM. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 174 System Configuration System Messages · For SSM On-Prem-initiated communication, complete this task: In the SSM On-Prem UI, navigate to Reports > Synchronisation pull schedule with the devices > Synchronise now with the device. Synchronize usage information with CSSM (choose one) · SSM On-Prem is connected to CSSM: In the SSM On-Prem UI, Smart Licensing workspace, nagivate to Reports > Usage Schedules > Synchronize now with Cisco. · SSM On-Prem is not connected to CSSM: Exporting and Importing Usage Data (SSM On-Prem UI), on page 137. ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Error Message %SMART_LIC-6-TRUST_CODE_INSTALL_SUCCESS: A new licensing trust code was successfully installed on [chars]. Explanation:[chars] is the UDI where the trust code was successfully installed. Recommended Action: No action is required. If you want to verify that the trust code is installed, enter the show license status command in privileged EXEC mode. Look for the updated timestamp under header Trust Code Installed: in the output. ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Error Message %IOSXE_RP_EWLC_NOT-2-MSGDEVICENOTREG: Unregistered 9800-CL can only be used in lab. For production usage, please register this device in [int] days. Failure to do so will result in a limited number [50] of Access Points being allowed post this. Explanation: An ACK is required on this product instance. [int] is the amount of time left to install an ACK on the product instance. This is system message is displayed only if the product instance is a Cisco Catalyst 9800-CL Wireless Controller running Cisco IOS XE Cupertino 17.7.1 or a later release. For more information, see RUM Reporting and Acknowledgment Requirement for Cisco Catalyst 9800-CL Wireless Controller, on page 121 . This system message is displayed once everyday, until the first ACK is made available on the product instance. Recommended Action: Implement one of the supported topologies and complete usage reporting. The method you can use to send the RUM report to CSSM and ACK installation depends on the topology you implement. See: Supported Topologies, on page 69 and How to Configure Smart Licensing Using Policy: Workflows by Topology , on page 86. ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Error Message %CAPWAPAC_TRACE_MSG-3-MAX_LICENSE_AP_LIMIT_REACHED: Chassis 1 R0/0: wncmgrd: Ap MAC: [enet] is not allowed to join. Please start reporting licensing to Cisco to get the ACK for resumption of usual operation. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 175 Additional References for Smart Licensing Using Policy System Configuration Explanation: The ACK deadline for this product instance has passed and an ACK has still not been installed. [enet] is the MAC address of the AP that is trying to join the Cisco Catalyst 9800-CL Wireless Controller but is not allowed because the requisite ACK is not installed. This is system message is displayed only if the product instance is a Cisco Catalyst 9800-CL Wireless Controller running Cisco IOS XE Cupertino 17.7.1 or a later release. For more information, see RUM Reporting and Acknowledgment Requirement for Cisco Catalyst 9800-CL Wireless Controller, on page 121 . Recommended Action: Implement one of the supported topologies and complete usage reporting. The method you can use to send the RUM report to CSSM and ACK installation depends on the topology you implement. See: Supported Topologies, on page 69 and How to Configure Smart Licensing Using Policy: Workflows by Topology , on page 86. ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Additional References for Smart Licensing Using Policy Topic Document Title For complete syntax and usage information for the commands used in this chapter, see the Command Reference of the corresponding release. Cisco Catalyst 9800 Series Wireless Controller Command Reference Cisco Smart Software Manager Help Smart Software Manager Help Cisco Smart License Utility (CSLU) installation and user guides Cisco Smart License Utility Quick Start Setup Guide Cisco Smart License Utility User Guide Feature History for Smart Licensing Using Policy This table provides release and related information for features explained in this module. These features are available on all releases subsequent to the one they were introduced in, unless noted otherwise. Release Feature Feature Information Cisco IOS XE Gibraltar Smart Licensing 16.10.1 A cloud-based, software license management solution that allows you to manage and track the status of your license, hardware, and software usage trends. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 176 System Configuration Feature History for Smart Licensing Using Policy Release Feature Feature Information Cisco IOS XE Amsterdam Smart Licensing Using 17.3.2a Policy An enhanced version of Smart Licensing, with the overarching objective of providing a licensing solution that does not interrupt the operations of your network, rather, one that enables a compliance relationship to account for the hardware and software licenses you purchase and use. Starting with this release, Smart Licensing Using Policy is automatically enabled on the device. This is also the case when you upgrade to this release. By default, your Smart Account and Virtual Account in CSSM is enabled for Smart Licensing Using Policy. Cisco DNA Center Support for Smart Licensing Using Policy Cisco DNA Center supports Smart Licensing Using Policy functionality starting with Cisco DNA Center Release 2.2.2. When you use Cisco DNA Center to manage a product instance, Cisco DNA Center connects to CSSM, and is the interface for all communication to and from CSSM. For information about the comptabile controller and product instance versions, see Controller, on page 62. For information about this topology, see Connected to CSSM Through a Controller, on page 74 and Workflow for Topology: Connected to CSSM Through a Controller, on page 93. Cisco IOS XE Amsterdam Smart Software Manager SSM On-Prem is an asset manager, which works in 17.3.3 On-Prem (SSM On-Prem) conjunction with CSSM. It enables you to administer Support for Smart products and licenses on your premises instead of Licensing Using Policy having to directly connect to CSSM. For information about the comptabile SSM On-Prem and product instance versions, see: SSM On-Prem, on page 63. For an overview of this topology, and to know how to implement it see SSM On-Prem Deployment, on page 77 and Workflow for Topology: SSM On-Prem Deployment, on page 95. For information about migrating from an exisiting version of SSM On-Prem, to one that supports Smart Licensing Using Policy, see Migrating to a Version of SSM On-Prem That Supports Smart Licensing Using Policy, on page 119. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 177 Feature History for Smart Licensing Using Policy System Configuration Release Feature Feature Information Cisco IOS XE Cupertino RUM Reporting and 17.7.1 Acknowledgment Requirement for Cisco Catalyst 9800-CL Wireless Controller If you are using a Cisco Catalyst 9800-CL Wireless Controller, you must complete RUM reporting and ensure that the Acknowledgment (ACK) is made available on the product instance - at least once. This is to ensure that correct and up-to-date usage information is reflected in CSSM. For more information, see RUM Reporting and Acknowledgment Requirement for Cisco Catalyst 9800-CL Wireless Controller, on page 121. Factory-installed trust code For new hardware orders, a trust code is now installed at the time of manufacturing. Note: You cannot use a factory-installed trust code to communicate with CSSM. See: Overview, on page 60 and Trust Code, on page 68. Support for trust code in additional topologies A trust code is automatically obtained in topologies where the product instance initiates the sending of data to CSLU and in topologies where the product instance is in an air-gapped network. See: · Trust Code, on page 68 · Connected to CSSM Through CSLU, on page 69, Tasks for Product Instance-Initiated Communication, on page 86. · CSLU Disconnected from CSSM, on page 73, Tasks for Product Instance-Initiated Communication, on page 90. · No Connectivity to CSSM and No CSLU, on page 75, Workflow for Topology: No Connectivity to CSSM and No CSLU, on page 94. RUM Report optimization and availability of statistics Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 178 System Configuration Release Feature History for Smart Licensing Using Policy Feature Feature Information RUM report generation and related processes have been optimized. This includes a reduction in the time it takes to process RUM reports, better memory and disk space utilization, and visibility into the RUM reports on the product instance (how many there are, the processing state each one is in, if there are errors in any of them, and so on). See RUM Report and Report Acknowledgement, on page 67. Also see the show license rum, show license all, and show license tech commands in the command reference of the applicable release. Support to collect software version in a RUM report If version privacy is disabled (no license smart privacy version global configuration command), the Cisco IOS-XE software version running on the product instance and Smart Agent version information is included in the RUM report. See the license smart global configuration command in the command reference of the applicable release. Account information A RUM acknowledgement (ACK) includes the Smart included in the ACK and Account and Virtual Account that was reported to, in show command outputs CSSM. You can then display account information using various show commands. The account information that is displayed is always as per the latest available ACK on the product instance. See the show license all, show license summary, show license status, and show license tech commands in the command reference of the applicable release. CSLU support for Linux CSLU can now be deployed on a machine (laptop or desktop) running Linux. See CSLU, on page 61, Workflow for Topology: Connected to CSSM Through CSLU, on page 86, and CSLU Disconnected from CSSM, on page 73. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 179 Feature History for Smart Licensing Using Policy System Configuration Release Feature Feature Information Cisco IOS XE Cupertino RUM Report Throttling 17.9.1 For all topologies where the product instance initiates communication, the minimum reporting frequency is throttled to one day. This means the product instance does not send more than one RUM report a day. The affected topologies are: Connected Directly to CSSM, Connected to CSSM Through CSLU (product instance-initiated communication), CSLU Disconnected from CSSM (product instance-initiated communication), and SSM On-Prem Deployment (product instance-initiated communication). You can override the reporting frequency throttling, by entering the license smart sync command in privileged EXEC mode. This triggers an on-demand synchronization with CSSM or CSLU, or SSM On-Prem, to send and receive any pending data. RUM report throttling also applies to the Cisco IOS XE Amsterdam 17.3.6 and later releases of the 17.3.x train, and Cisco IOS XE Bengaluru 17.6.4 and later releases of the 17.6.x train. From Cisco IOS XE Cupertino 17.9.1, RUM report throttling is applicable to all subsequent releases. See: Connected to CSSM Through CSLU, on page 69, Connected to CSSM Through CSLU, on page 69, CSLU Disconnected from CSSM, on page 73, and SSM On-Prem Deployment, on page 77. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 180 6 C H A P T E R Management over Wireless · Information About Management over Wireless, on page 181 · Restrictions on Management over Wireless, on page 181 · Enabling Management over Wireless on Controller (GUI) , on page 182 · Enabling Management over Wireless on Controller (CLI), on page 182 Information About Management over Wireless The Management over Wireless feature allows operators to monitor and configure the controller using wireless clients connected to the wireless controller network. Note By default, the Management over Wireless feature is disabled. You will need to keep the Management over Wireless feature disabled, if security is a concern. This feature blocks the wireless management access to the same controller that the wireless client device is currently associated with. It does not prevent management access to a wireless client associated with another controller entirely. To completely block management access to wireless clients based on VLAN and so on, we recommend that you use Access Control Lists (ACLs) or a similar mechanism. Restrictions on Management over Wireless · Management over Wireless feature can be disabled only if clients are in central switching. Note The Management over Wireless feature does not work for Embedded Wireless Controller (EWC) in AP as AP connected to the EWC are in FlexConnect (local switching) mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 181 Enabling Management over Wireless on Controller (GUI) System Configuration Enabling Management over Wireless on Controller (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Wireless > Wireless Global. Check the Management via Wireless check box. Click Apply. Enabling Management over Wireless on Controller (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless mgmt-via-wireless Example: Device(config)# wireless mgmt-via-wireless Step 3 end Example: Device(config)# end Purpose Enters global configuration mode. Enables management over wireless. Use the no form of this command to disable the management over wireless. Returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 182 7 C H A P T E R Boot Integrity Visibility · Overview of Boot Integrity Visibility, on page 183 · Verifying Software Image and Hardware, on page 183 · Verifying Platform Identity and Software Integrity, on page 184 Overview of Boot Integrity Visibility Boot Integrity Visibility allows the Cisco platform identity and software integrity information to be visible and actionable. Platform identity provides the platform's manufacturing installed identity. Software integrity exposes boot integrity measurements that can be used to assess whether the platform has booted trusted code. During the boot process, the software creates a checksum record of each stage of the bootloader activities. You can retrieve this record and compare it with a Cisco-certified record to verify if your software image is genuine. If the checksum values do not match, you may be running a software image that is either not certified by Cisco or has been altered by an unauthorized party. Verifying Software Image and Hardware This task describes how to retrieve the checksum record that was created during a switch bootup. Enter the following commands in privileged EXEC mode. Note On executing the following commands, you might see the message % Please Try After Few Seconds displayed on the CLI. This does not indicate a CLI failure, but indicates setting up of underlying infrastructure required to get the required output. We recommend waiting for a few minutes and then try the command again. The messages % Error retrieving SUDI certificate and % Error retrieving integrity data signify a real CLI failure. Procedure Step 1 Command or Action Purpose show platform sudi certificate [sign [nonce Displays checksum record for the specific nonce]] SUDI. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 183 Verifying Platform Identity and Software Integrity System Configuration Step 2 Command or Action Purpose Example: · (Optional) sign - Show signature. Device# show platform sudi certificate sign nonce 123 · (Optional) nonce - Enter a nonce value. show platform integrity [sign [nonce nonce]] Displays checksum record for boot stages. Example: · (Optional) sign - Show signature. Device# show platform integrity sign nonce 123 · (Optional) nonce - Enter a nonce value. Verifying Platform Identity and Software Integrity Verifying Platform Identity The following example displays the Secure Unique Device Identity (SUDI) chain in PEM format. Encoded into the SUDI is the Product ID and Serial Number of each individual device such that the device can be uniquely identified on a network of thousands of devices. The first certificate is the Cisco Root CA 2048 and the second is the Cisco subordinate CA (ACT2 SUDI CA). Both certificates can be verified to match those published on https://www.cisco.com/security/pki/. The third is the SUDI certificate. Important All the CLI outputs provided here are intended only for reference. The output differs based on the configuration of the device. Device# show platform sudi certificate sign nonce 123 -----BEGIN CERTIFICATE----MIIDQzCCAiugAwIBAgIQX/h7KCtU3I1CoxW1aMmt/zANBgkqhkiG9w0BAQUFADA1 MRYwFAYDVQQKEw1DaXNjbyBTeXN0ZW1zMRswGQYDVQQDExJDaXNjbyBSb290IENB IDIwNDgwHhcNMDQwNTE0MjAxNzEyWhcNMjkwNTE0MjAyNTQyWjA1MRYwFAYDVQQK Ew1DaXNjbyBTeXN0ZW1zMRswGQYDVQQDExJDaXNjbyBSb290IENBIDIwNDgwggEg MA0GCSqGSIb3DQEBAQUAA4IBDQAwggEIAoIBAQCwmrmrp68Kd6ficba0ZmKUeIhH xmJVhEAyv8CrLqUccda8bnuoqrpu0hWISEWdovyD0My5jOAmaHBKeN8hF570YQXJ FcjPFto1YYmUQ6iEqDGYeJu5Tm8sUxJszR2tKyS7McQr/4NEb7Y9JHcJ6r8qqB9q VvYgDxFUl4F1pyXOWWqCZe+36ufijXWLbvLdT6ZeYpzPEApk0E5tzivMW/VgpSdH jWn0f84bcN5wGyDWbs2mAag8EtKpP6BrXruOIIt6keO1aO6g58QBdKhTCytKmg9l Eg6CTY5j/e/rmxrbU6YTYK/CfdfHbBcl1HP7R2RQgYCUTOG/rksc35LtLgXfAgED o1EwTzALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUJ/PI FR5umgIJFq0roIlgX9p7L6owEAYJKwYBBAGCNxUBBAMCAQAwDQYJKoZIhvcNAQEF BQADggEBAJ2dhISjQal8dwy3U8pORFBi71R803UXHOjgxkhLtv5MOhmBVrBW7hmW Yqpao2TB9k5UM8Z3/sUcuuVdJcr18JOagxEu5sv4dEX+5wW4q+ffy0vhN4TauYuX cB7w4ovXsNgOnbFp1iqRe6lJT37mjpXYgyc81WhJDtSd9i7rp77rMKSsH0T8lasz Bvt9YAretIpjsJyp8qS5UwGH0GikJ3+r/+n6yUA4iGe0OcaEb1fJU9u6ju7AQ7L4 CYNu/2bPPu8Xs1gYJQk0XuPL1hS27PKSb3TkL4Eq1ZKR4OCXPDJoBYVL0fdX4lId kxpUnwVwwEpxYB5DC2Ae/qPOgRnhCzU= -----END CERTIFICATE---------BEGIN CERTIFICATE----MIIEPDCCAySgAwIBAgIKYQlufQAAAAAADDANBgkqhkiG9w0BAQUFADA1MRYwFAYD VQQKEw1DaXNjbyBTeXN0ZW1zMRswGQYDVQQDExJDaXNjbyBSb290IENBIDIwNDgw HhcNMTEwNjMwMTc1NjU3WhcNMjkwNTE0MjAyNTQyWjAnMQ4wDAYDVQQKEwVDaXNj bzEVMBMGA1UEAxMMQUNUMiBTVURJIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A MIIBCgKCAQEA0m5l3THIxA9tN/hS5qR/6UZRpdd+9aE2JbFkNjht6gfHKd477AkS 5XAtUs5oxDYVt/zEbslZq3+LR6qrqKKQVu6JYvH05UYLBqCj38s76NLk53905Wzp 9pRcmRCPuX+a6tHF/qRuOiJ44mdeDYZo3qPCpxzprWJDPclM4iYKHumMQMqmgmg+ Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 184 System Configuration Verifying Platform Identity and Software Integrity xghHIooWS80BOcdiynEbeP5rZ7qRuewKMpl1TiI3WdBNjZjnpfjg66F+P4SaDkGb BXdGj13oVeF+EyFWLrFjj97fL2+8oauV43Qrvnf3d/GfqXj7ew+z/sXlXtEOjSXJ URsyMEj53Rdd9tJwHky8neapszS+r+kdVQIDAQABo4IBWjCCAVYwCwYDVR0PBAQD AgHGMB0GA1UdDgQWBBRI2PHxwnDVW7t8cwmTr7i4MAP4fzAfBgNVHSMEGDAWgBQn 88gVHm6aAgkWrSugiWBf2nsvqjBDBgNVHR8EPDA6MDigNqA0hjJodHRwOi8vd3d3 LmNpc2NvLmNvbS9zZWN1cml0eS9wa2kvY3JsL2NyY2EyMDQ4LmNybDBQBggrBgEF BQcBAQREMEIwQAYIKwYBBQUHMAKGNGh0dHA6Ly93d3cuY2lzY28uY29tL3NlY3Vy aXR5L3BraS9jZXJ0cy9jcmNhMjA0OC5jZXIwXAYDVR0gBFUwUzBRBgorBgEEAQkV AQwAMEMwQQYIKwYBBQUHAgEWNWh0dHA6Ly93d3cuY2lzY28uY29tL3NlY3VyaXR5 L3BraS9wb2xpY2llcy9pbmRleC5odG1sMBIGA1UdEwEB/wQIMAYBAf8CAQAwDQYJ KoZIhvcNAQEFBQADggEBAGh1qclr9tx4hzWgDERm371yeuEmqcIfi9b9+GbMSJbi ZHc/CcCl0lJu0a9zTXA9w47H9/t6leduGxb4WeLxcwCiUgvFtCa51Iklt8nNbcKY /4dw1ex+7amATUQO4QggIE67wVIPu6bgAE3Ja/nRS3xKYSnj8H5TehimBSv6TECi i5jUhOWryAK4dVo8hCjkjEkzu3ufBTJapnv89g9OE+H3VKM4L+/KdkUO+52djFKn hyl47d7cZR4DY4LIuFM2P1As8YyjzoNpK/urSRI14WdIlplR1nH7KNDl5618yfVP 0IFJZBGrooCRBjOSwFv8cpWCbmWdPaCQT2nwIjTfY8c= -----END CERTIFICATE---------BEGIN CERTIFICATE----MIIDfTCCAmWgAwIBAgIEAwQD7zANBgkqhkiG9w0BAQsFADAnMQ4wDAYDVQQKEwVD aXNjbzEVMBMGA1UEAxMMQUNUMiBTVURJIENBMB4XDTE4MDkyMzIyMzIwNloXDTI5 MDUxNDIwMjU0MVowaTEnMCUGA1UEBRMeUElEOkM5NjAwLVNVUC0xIFNOOkNBVDIy MzZMMFE5MQ4wDAYDVQQKEwVDaXNjbzEYMBYGA1UECxMPQUNULTIgTGl0ZSBTVURJ MRQwEgYDVQQDEwtDOTYwMC1TVVAtMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCC AQoCggEBANsh0jcvgh1pdOjP9KnffDnDc/zEHDzbCTWPJi2FZcsaSE5jvq6CUqc4 MYpNAZU2Jym7NSD8iQbMXwbnCtoL64QtxQeFhRYmc4d5o933M7GwpEH0I7HUSbO/ Fxyp7JBmGPPgAkY7rKsYENiNK2hiR7Q2O7X2BidOKknEuofWdJMNyMaZgLYLOHbJ 5oXaORxhUy3VRaxNl6qI7kYxuugg2LcAbZ539sRXe8JtHyK8llURNSGMiQ0S17pS idGmrJJ0pEHA0EUVTZqEny3z+NW9uxLVSzu6+hEJYlqfI+YEf0DbVZly1cy5r/jF yNdGuGKvd5agvgCly8aYMZa3P+D5S8sCAwEAAaNvMG0wDgYDVR0PAQH/BAQDAgXg MAwGA1UdEwEB/wQCMAAwTQYDVR0RBEYwRKBCBgkrBgEEAQkVAgOgNRMzQ2hpcElE PVUxUk5TVEl3TVRjd05qSTFBQUFwZndBQUFBQUFBQUFBQUFBQUFBQUhtSlU9MA0G CSqGSIb3DQEBCwUAA4IBAQCrpHo/CUyk5Hs/asIcYW0ep8KocSkbNh8qamyd4oWD e/MGJW9Bs5f09IEbILWPdytCCS2lSyJbxz2HvVDzdxQdxjDwUNiWuu3dWMXN/i67 yuCGM+lA1AAG5dT6lNgWYHh+YzsZm9eoq1+4NM+JuMXWsnzAK8rSy+dSpBxqFsBq E0OlPsaK7y2h8gs+XrV9x+D48OZQkTRXpxhJfiWvs+EbdgsAM/vBxTAoTJPVmXWN Cmcj9X52Xl3i4MdOUXocZLO2kh6JSgOYGkFeZifJ0iDvMfAf0cJ6+cEF6bSxAqBL veel+8LmeiE/2O9h6qGHPPDacCaXA2oJCDHveAt8iPTG -----END CERTIFICATE----- Signature version: 1 Signature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he optional RSA 2048 signature is across the three certificates, the signature version and the user-provided nonce. RSA PKCS#1v1.5 Sign {<Nonce (UINT64)> || <Signature Version (UINT32)> || <Cisco Root CA 2048 cert (DER)> || <Cisco subordinate CA (DER)> || <SUDI certificate (DER)> } Cisco management solutions are equipped with the ability to interpret the above output. However, a simple script using OpenSSL commands can also be used to display the identity of the platform and to verify the signature, thereby ensuring its Cisco unique device identity. [linux-host:~]openssl x509 -in sudi_id.pem -subject -noout subject= /serialNumber=PID:C9600-SUP-1 SN:CAT2239L06B/CN=C9600-SUP-1-70b3171eaa00 Verifying Software Integrity The following example displays the checksum record for the boot stages. The hash measurements are displayed for each of the three stages of software successively booted. These hashes can be compared against Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 185 Verifying Platform Identity and Software Integrity System Configuration Cisco-provided reference values. An option to sign the output gives a verifier the ability to ensure the output is genuine and is not altered. A nonce can be provided to protect against replay attacks. Note Boot integrity hashes are not MD5 hashes. For example, if you run verify /md5 cat9k_iosxe.16.10.01.SPA.bin command for the bundle file, the hash will not match. The following is a sample output of the show platform integrity sign nonce 123 command. This output includes measurements of each installed package file. Device# show platform integrity sign nonce 123 Platform: C9800-L-F-K9 Boot 0 Version: R04.1173930452019-06-11 Boot 0 Hash: A6C92C44976FC77DD42234444FFD87798FB9036A2762FAA4999A190A0258B18C Boot Loader Version: 16.12(1r) Boot Loader Hash: FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF OS Version: 2020-03-19_20.26 OS Hashes: C9800-L-universalk9_wlc.2020-03-19_20.26.SSA.bin: 53E2DF1A1A082E36EA4CAB817C1794EC9D69AC0E90BCCBFECF9BCD0BCA9385AA9E9372ABF7431E4A08FC5E5B9670131C09D158E5B8A7B457501FE77AB9F1C26D C9800-L-mono-universalk9_wlc.2020-03-19_20.26.SSA.pkg: 1D3279D53B0311CE42C669824DF86FB5596CD7CA45CA8D7FDC3D10657B8C9A48F4B0508D7BCFFD645CB6571AC1E674A57A82414E3D6E1666BE64E6132F707671 PCR0: EE14A2D5099DA343B3941C54A429C4AC1D3EE8E9B609F1AC00049768A470734E PCR8: 78794D0F5667F8FA4E425E3CA2AF3CD99B90B219FD90222D622B3D563416BBAA Note Only OS and package hashes are supported. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 186 8 C H A P T E R SUDI99 Certificate Support · SUDI99 Certificate Support, on page 187 · Disabling SUDI99 Migration (GUI), on page 189 SUDI99 Certificate Support Cisco Catalyst 9800 Series Wireless Controllers use Secure Unique Device Identity (SUDI) certificates as device certificates for authentication during secure connection handshakes. These certificates are provisioned in a secure hardware chip, which can hold multiple certificates, during the manufacturing process. Note Some of the certificates used in the controller and AP platforms are expiring in May 2029 and require migration to a new set of certificates. SUDI99 certificate support is addressing this migration scenario. SUDI99 is valid until December 2099. The Cisco IOS XE software supports two slots for initializing SUDI certificates from the secure hardware chip. This SUDI99 migration change will rearrange certificate-to-trustpoint mapping as follows: Table 13: Existing Software Selection for SUDI Trustpoint Certificates Trustpoint Name CISCO_IDEVID_SUDI CISCO_IDEVID_SUDI_LEGACY Software Selection Among Programmed Certificate Chains CMCA2 SHA2 SUDI (SHA2-2037) CMCA SHA1 SUDI Table 14: New Software Selection for SUDI Trustpoint Certificates Trustpoint Name CISCO_IDEVID_SUDI CISCO_IDEVID_SUDI_LEGACY Software Selection Among Programmed Certificate Chains CMCA-III SHA2 SUDI99 CMCA2 SHA2 SUDI (SHA2-2037) Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 187 SUDI99 Certificate Support System Configuration Caution Performing device authentication using expired certificates may lead to service disruption. The following table lists the SUDI99 certificate and software support: Table 15: SUDI99 Certificate and Software Support Cisco Catalyst 9800 Controllers SUDI99 Certificate Support Cisco Catalyst 9800-CL Wireless Not supported. Controller for Cloud Cisco Catalyst 9800 Series Wireless Controllers · 9800-40 · 9800-80 · 9800-L Supported Software Support for SUDI99 Migration -- Yes. From Cisco IOS XE Cupertino 17.7.1. Cisco Embedded Wireless Controller on Catalyst Access Points. · 9105AXI · 9115AXI · 9115AXE · 9117AXI · 9120AXI · 9120AXE · 9120AXP · 9130AXI · 9130AXE Supported Yes. From Cisco IOS XE Cupertino 17.7.1. Cisco Embedded Wireless Not supported. -- Controller on Catalyst Switches · 9300 Series · 9400 Series · 9500 Series · 9500H Series Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 188 System Configuration Disabling SUDI99 Migration (GUI) Backward Compatibility The Cisco Catalyst 9800 Series Wireless Controllers have a default wireless management trustpoint. Some applications use this management trustpoint certificate. If a device (AP or controller) cannot validate the SUDI99 certificate, then the controller uses an older certificate (SHA2-2037) as its device certificate for that particular connection. For NMSP-TLS connections with Cisco CMX, the client certificate is not validated in default security mode. However, in FIPS mode, Cisco CMX validates the controller certificate. If Cisco CMX is deployed in FIPS mode, explicitly install the new SUDI CA certificates on the Cisco CMX running the earlier version of Cisco CMX or upgrade Cisco CMX to the latest version. Some applications, such as HTTPS, RADSEC, and WebAuth, do not use SUDI certificate as their default trustpoint. But, it is possible to configure SUDI trustpoint explicitly in them. The SUDI refresh program alters the certificate selection for such services. However, there is no functional impact. Restrictions If a SUDI99 certificate is incorrectly programmed in a device, it is rejected during trustpoint initialization at bootup, and trutpoint-to-certificate mapping falls back to the old behaviour. User can verify the SUDI certificate status using the show platform sudi pki command. Disabling SUDI99 Migration Using CLI The SUDI99 certificate is set as the default trustpoint in supported hardware units. You can disable it using the no platform sudi cmca3 command. In high availability (HA) deployments, form the HA pair, and then run the command. Then, save the configuration and reload the controller to disable the SUDI certificate and fall back to the older trustpoint certificate. To check the certificate validation status, use the show platform sudi pki command. Disabling SUDI99 Migration (GUI) SHA1 SUDI certificates on hardware controllers have an imminent expiry date and devices using expired certificates face disruption in service. To ensure a smooth migration to the latest SUDI99 certificate issued by CMCA-III authority, the controllers have been programmed with newer certificates in their secure hardware chip. These certificates are enabled by default and are valid till December 2099. Follow the procedure given below, if you do not wish to migrate at this point. Procedure Step 1 Step 2 Step 3 On the Configuration > Security > PKI Management > Trustpoint tab, go to the SUDI Status section. Disable the Cisco Manufacturing CA III certificate to continue using the older certificate that is mapped to an existing Trustpoint. Click Apply Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 189 Disabling SUDI99 Migration (GUI) What to do next Reload the device for the configuration to take effect. System Configuration Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 190 9 C H A P T E R Link Aggregation Group · Information About Link Aggregation Group, on page 191 Information About Link Aggregation Group A link aggregation group (LAG) bundles all of the controller's distribution system ports into a single 802.3ad port channel. This reduces the number of IP addresses required to configure the ports on your controller. When LAG is enabled, the system dynamically manages port redundancy and load balances access points transparently to the corresponding user. LAG simplifies controller configuration because you no longer have to configure ports for each interface. If any of the controller ports fail, traffic is automatically migrated to one of the other ports. As long as at least one controller port is functioning, the system continues to operate, access points remain connected to the network, and wireless clients continue to send and receive data. Note The wireless management VLAN can only be part of one port channel. Note LACP is supported on a standalone controller from Cisco IOS XE Gibraltar 16.12.x release. LACP is supported on an SSO pair from Cisco IOS XE Amsterdam 17.1.1s onwards. Link Aggregation Control Protocol Link Aggregation Control Protocol (LACP) is a part of an IEEE specification (802.3ad) that allows you to bundle several physical ports together to form a single logical channel. LACP allows a switch to negotiate an automatic bundle by sending LACP packets to a peer. By using the LACP, the wireless controller learns the identity of peers that are capable of supporting LACP, and the capabilities of each port. The LACP then dynamically groups similarly configured ports into a single logical link (channel or aggregate port). Similarly, configured ports are grouped based on hardware, administrative, and port parameter constraints. If any of the controller ports fail, traffic is automatically migrated to one of the other ports. As long as at least one controller port is functioning, the system continues to operate, access points remain connected to the network, and wireless clients continue to send and receive data. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 191 Configuring LAG Using LACP System Configuration Configuring LAG Using LACP To configure LAG using LACP, multiple port-channel interfaces must be created, and these interfaces should be added to the corresponding port bundle. LACP should also be configured on the uplink switch for the LACP bundle to come up. · Create a Port-Channel Interface · Add an Interface to a Port Channel (LACP) · Add a VLAN to a Port Channel · Add an Interface to a Port Channel (PAgP) Port Aggregation Protocol Port Aggregation Protocol (PAgP) is a Cisco-proprietary protocol that you can run on controllers. PAgP facilitates the automatic creation of EtherChannels by exchanging PAgP packets between Ethernet ports. PAgP packets are sent between Fast EtherChannel-capable ports in order to form a channel. When any of the active ports fail, a standby port becomes active. By using PAgP, the controller learns the identity of partners that are capable of supporting PAgP and the capabilities of each port. PAgP then dynamically groups similarly configured ports (on a single device in a stack) into a single logical link (channel or aggregate port). Similarly, configured ports are grouped based on hardware, administrative, and port parameter constraints. Configuring LAG Using PAgP To configure LAG using PAgP, multiple port-channel interfaces must be created, and these interfaces should be added to the corresponding port bundle. PAgP should also be configured on the uplink switch for the PAgP bundle to come up. · Create a Port-Channel Interface · Add an Interface to a Port Channel (PAgP) Information About Port Channel Interface Number From Cisco IOS XE Bengaluru 17.5.1 onwards, the flexibility to number the port channel interface numbers between 1 and 64 is supported on the following Cisco Catalyst 9800 Series Wireless Controllers: · Cisco Catalyst 9800-CL Wireless Controller for Cloud: The available range on the CLI is 1 to 64. The maximum supported port channel interfaces are 64. · Cisco Catalyst 9800-L Wireless Controller: The available range on the CLI is 1 to 64. The maximum supported port channel interfaces are 14. · Cisco Catalyst 9800-40 Wireless Controller: The available range on the CLI is 1 to 64. The maximum supported port channel interfaces are 16. · Cisco Catalyst 9800-80 Wireless Controller: The available range on the CLI is 1 to 64. The maximum supported port channel interfaces are 64. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 192 System Configuration Configuring LAG in ON Mode For example on the Cisco Catalyst 9800-L Wireless Controller, port-channel interface numbers can be anywhere between 1 and 64, as long as the total number of port-channel interfaces are 14 or lesser. Note If you have configured 16 port-channel interfaces on the Cisco Catalyst 9800-40 Wireless Controller, and if the configured port-channel interfaces have reached their limitation, the following error message is displayed when you try to configure the 17th port-channel interface: Device(config)# Dec 15 08:58:22.209 CST: %ETC-5-CANNOT_ALLOCATE_AGGREGATOR: Aggregator limit reached, cannot allocate aggregator for group 17 When you downgrade from Cisco IOS XE Bengaluru 17.5.1 to an earlier version, and if the port channels are configured with a higher range than the supported range in the earlier version, the following errors are displayed when the earlier version is started. The nonsupported port channels disappear after the downgrade is completed. interface Port-channel29 ^% Invalid input detected at '^' marker. interface Port-channel35 ^% Invalid input detected at '^' marker. Note that the HA pairing remains intact after downgrade. Configuring LAG in ON Mode To configure LAG in ON mode, multiple port-channel interfaces must be created, and these interfaces should be added to the corresponding port bundle. LACP should also be configured on the uplink switch for the LACP bundle to come up. · Configuring LAG in ON Mode, on page 196 Multichassis Link Aggregation Group From Cisco IOS XE Amsterdam 17.2.1, Multichassis Link Aggregation Group (multi-LAG), which provides flexibility in connecting the controller to a switch's infrastructure is supported. Using multi-LAG, you can connect the multiple uplinks from the controller to the separated uplink switches. The controller supports VLAN-based traffic splitting when connected to a multiswitch topology. This provides the ability to distribute traffic on different uplinks, based on VLANs, for example, supporting a use case where guest traffic can be completely isolated to a different switch or network from the enterprise network. Same VLAN cannot be configured on both the uplinks. You can connect a LAG to a single switch. However, different VLANs must be connected to different LAGs. The redundancy port must be connected to the same distribution switch as the uplinks, or back to back. Multi-LAG is supported in LAG ON mode, LACP, and PAgP modes. Prerequisites for Multi-LAG · Each LAG must be connected to a single switch. · Different VLANs must be assigned to different LAGs. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 193 Restrictions for Multi-LAG System Configuration Restrictions for Multi-LAG · If the primary LAG fails, automatic failover to secondary LAG is not supported. · The interface on the controller does not come up when you shut or unshut the port on the switch port. Note This is specific to Cisco Catalyst 9800-CL Cloud Wireless Controller in KVM environment for SR-IOV. Supported Topologies The Cisco Catalyst 9800-80 Wireless Controller has eight ports, while the Cisco Catalyst 9800-40 and Cisco Catalyst 9800-L wireless controllers have four ports each. You can create multi-LAGs of ports with similar capabilities, for example, 2.5 G and 2.5 G, or 10 G and 10 G. You cannot have a 2.5 G and a 10 G port in a port channel group with a minimum of two ports in one LAG. Figure 14: Single Controller with Multi-LAG Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 194 System Configuration Figure 15: SSO Pair with Multi-LAG Configuring a Port Channel Interface (GUI) Configuring a Port Channel Interface (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Interface > Logical. Click the Port Channel tab to configure the Port Channel interface. The Port Channel tab lists all the logical port-channel interfaces on the device. Click Add to add to a new logical port channel interface. The Add Port Channel Interface window is displayed. In the Add Port Channel Interface complete the following procedure: a) In the Port Channel Number field, enter the port channel number. The valid values are between 1 to 64. b) In the Description field, enter the port channel description. c) Click the Admin Status toggle button to set the admin status as UP or DOWN. d) Click the Enable Layer 3 Address toggle button to enable the Layer 3 address. e) In the Port Members section, select the port members from the list displayed in the Available list box, and add it to the Associated list. f) From the Switchport Mode drop-down list, choose a switch mode for the interface. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 195 Create a Port-Channel Interface System Configuration · If you choose access as the switch mode, enter the access VLAN ID in the Access VLAN field. · If you choose trunk as the switch mode, enter the VLAN IDs that you want to assign as trunk links. To allow all VLAN IDs as trunk links, set the Allowed VLANs to All. Specify a native VLAN. · If you choose dynamic auto or dynamic desirable as the switch mode, enter the access VLAN ID. Enter the VLAN IDs you want to assign as trunk links. To allow all VLAN IDs as trunk links, set the Allowed VLANs to All. Specify a native VLAN. g) Click Update & Apply to Device. Create a Port-Channel Interface Follow the procedure given below to create a port-channel interface. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 interface port-channel port-channel Example: Device(config)# interface port-channel 2 Configures the port channel and enters interface configuration mode. The valid values for the port channel number ranges from 1 to 64. Step 3 switchport mode trunk Configures the port as trunk. Example: Device(config-if)# switchport mode trunk Step 4 no shutdown Example: Device(config-if)# no shutdown Enables the interface. Configuring LAG in ON Mode Follow the procedure given below to configure LAG in ON mode. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 196 System Configuration Add an Interface to a Port Channel (LACP) Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action interface TenGigabitEthernet port-slot Example: Device(config)# interface TenGigabitEthernet0/0/0 Purpose Configures the port. switchport mode trunk Configures the port as trunk. Example: Device(config-if)# switchport mode trunk no shutdown Example: Device(config-if)# no shutdown Disables the interface. channel-group group-number mode on Assigns the port to a channel group, and Example: specifies the ON mode. Device(config-if)# channel-group 3 mode The valid values for the port channel number on ranges from 1 to 64. switchport trunk allowed vlan vlan-id Example: Device(config-if)# switchport trunk allowed vlan 16,17 Assigns the allowed VLAN ID to the port when it is in trunking mode. Add an Interface to a Port Channel (LACP) Follow the procedure given below to add an interface to a port channel using the LACP. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 interface TenGigabitEthernet port-slot Example: Device(config)# interface TenGigabitEthernet0/0/0 Configures the port. Step 3 channel-group group-number {active | passive} Assigns the port to a channel group, and specifies the LACP mode. Example: The valid values for the port channel number Device(config-if)# channel-group 1 mode ranges from 1 to 64. active Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 197 Add an Interface to a Port Channel (PAgP) System Configuration Step 4 Command or Action Purpose switchport mode trunk Configures the port as trunk. Example: Device(config-if)# switchport mode trunk Add an Interface to a Port Channel (PAgP) Follow the procedure given below to add an interface to a port channel using the PAgP. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 interface TenGigabitEthernet port-slot Example: Device(config)# interface TenGigabitEthernet0/0/0 Configures the TenGigabit Ethernet interface. Step 3 channel-group group-number {auto | desirable} Assigns the port to a channel group, and specifies the PAgP mode. Example: The valid values for the port channel number Device(config-if)# channel-group 1 mode ranges from 1 to 64. auto Step 4 switchport mode trunk Configures the port as trunk. Example: Device(config-if)# switchport mode trunk Add a VLAN to a Port Channel Follow the procedure given below to add different VLANs under a port channel. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 interface port-channel port-channel Example: Purpose Enters global configuration mode. Configures the port channel. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 198 System Configuration Remove a Port Channel Group from a Physical Interface Step 3 Command or Action Purpose Device(config)# interface port-channel Valid values for the port channel number range 1 from 1 to 64. switchport trunk allowed vlan vlan-id Example: Device(config-if)# switchport trunk allowed vlan 10,30,50 Adds VLANs to the list of allowed VLANs. Remove a Port Channel Group from a Physical Interface Perform this task to remove a port channel group from a physical port. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 interface TenGigabitEthernet port-slot Example: Device(config)# interface TenGigabitEthernet0/0/0 Step 3 no channel-group Example: Device(config-if)# no channel-group Step 4 end Example: Device(config-if)# end Purpose Enters global configuration mode. Enters the TenGigabit Ethernet interface. Removes the port channel group from the physical port. Exits interface configuration mode. Verify the LAG Configuration To view a port channel's state, use the following command: Device# show etherchannel summary Flags: D - down P - bundled in port-channel I - stand-alone s - suspended H - Hot-standby (LACP only) R - Layer3 S - Layer2 U - in use f - failed to allocate aggregator M - not in use, minimum links not met u - unsuitable for bundling w - waiting to be aggregated d - default port Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 199 Verify the LAG Configuration System Configuration A - formed by Auto LAG Number of channel-groups in use: 1 Number of aggregators: 1 Group Port-channel Protocol Ports ------+-------------+-----------+----------------------------------------------- 3 Po3(SU) LACP Tw0/0/0(P) Tw0/0/1(P) 4 Po4(SU) LACP Tw0/0/2(P) Tw0/0/3(P) To verify an LACP or PAgP configuration, use the following commands: Device# show running-config interface tenGigabitEthernet 0/0/0 Building configuration... Current configuration : 114 bytes ! interface TwoGigabitEthernet0/0/0 switchport trunk allowed vlan 16,17 switchport mode trunk speed 1000 no negotiation auto no snmp trap link-status channel-group 3 mode on Device# show running-config interface port-channel 1 Building configuration... Current configuration : 54 bytes ! interface Port-channel1 switchport mode trunk switchport trunk allowed vlan 10,30,50 end Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 200 1 0 C H A P T E R Reload Reason History · Feature History for Reload Reason History, on page 201 · Information About Reload Reason History, on page 201 · Verifying Reload Reason History , on page 201 · Requesting Reload Reason History using YANG, on page 204 Feature History for Reload Reason History This table provides release and related information about the feature explained in this section. This feature is also available in all the releases subsequent to the one in which they are introduced in, unless noted otherwise. Table 16: Feature History for Reload Reason History Release Feature Cisco IOS XE Dublin Reload Reason 17.11.1 History Feature Information The Reload Reason History feature tracks the reasons for controller reload. This is done for the last 10 reloads. In Cisco IOS-XE Dublin 17.10.x and earlier releases, it was possible to track only the reason for the last reload. Information About Reload Reason History The Reload Reason History feature tracks the reasons for controller reload. This is done for the last 10 reloads.You will be able to view the history using the show version and the Network Configuration Protocol (NETCONF). This history is useful for serviceability and troubleshooting. Verifying Reload Reason History To view the reload history details, use the following command: Device# show reload-history Reload History: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 201 Verifying Reload Reason History System Configuration Reload Index: 1 Reload Code: Reload Reload Description: Reload Command Reload Severity: Normal Reboot Reload Time: 01:33:44 UTC Wed Nov 30 2022 Reload Index: 2 Reload Code: Critical Process Fault Reload Description: Critical process stack_mgr fault on rp_0_0 (rc=137), system report at bootflash:core/Yang_Test-system-report_20221130-012929-UTC.tar.gz Reload Severity: Abnormal Reboot Reload Time: 01:31:11 UTC Wed Nov 30 2022 Reload Index: 3 Reload Code: Image Install Reload Description: Image Install Reload Severity: Normal Reboot Reload Time: 01:25:03 UTC Wed Nov 30 2022 Reload Index: 4 Reload Code: Critical Process Fault Reload Description: Critical process rif_mgr fault on rp_0_0 (rc=137), system report at bootflash:core/Yang_Test-system-report_20221130-011127-UTC.tar.gz Reload Severity: Abnormal Reboot Reload Time: 01:13:08 UTC Wed Nov 30 2022 Reload Index: 5 Reload Code: Reload Reload Description: Reload Command Reload Severity: Normal Reboot Reload Time: 01:08:26 UTC Wed Nov 30 2022 Reload Index: 6 Reload Code: Critical Process Fault Reload Description: Critical process wncmgrd fault on rp_0_0 (rc=137), system report at bootflash:core/Yang_Test-system-report_20221130-010338-UTC.tar.gz Reload Severity: Abnormal Reboot Reload Time: 01:05:23 UTC Wed Nov 30 2022 Reload Index: 7 Reload Code: Reload Reload Description: Reload Command Reload Severity: Normal Reboot Reload Time: 01:01:09 UTC Wed Nov 30 2022 Reload Index: 8 Reload Code: Reload Reload Description: Reload Command Reload Severity: Normal Reboot Reload Time: 00:57:27 UTC Wed Nov 30 2022 Reload Index: 9 Reload Code: Reload Reload Description: Reload Command Reload Severity: Normal Reboot Reload Time: 00:22:34 UTC Wed Nov 30 2022 Reload Index: 10 Reload Code: Fast Switchover Reload Description: redundancy force-switchover Reload Severity: Normal Reboot Reload Time: 23:40:01 UTC Tue Nov 29 2022 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 202 System Configuration Verifying Reload Reason History To view reason for the last reload, use the following command: Device# show platform software tdl-database content ios device data Device Current time: 04:06:04 Device boot time: 01:33:37 Software version: Cisco IOS Software [Dublin], C9800-CL Software (C9800-CL-K9_IOSXE), Experimental Version 17.11.20221012:120806 [BLD_POLARIS_DEV_S2C_20221010_023625-1-g5ebdd5c35512:/nobackup/saikarth/polaris_relhis 103] Copyright (c) 1986-2022 by Cisco Systems, Inc. Compiled Wed 12-Oct-22 05:08 by saikarth Rommon version: IOS-XE ROMMON Last Reboot reason: Reload Command Reboot reason severity: Normal Reboot Unsaved configuration: * Unknown boolean * Reload History: Reload Category: Reload Reload Description: Reload Command Reload Severity: Normal Reboot Reload Time: 11/30/2022 01:33:44 UTC Reload Category: Critical Process Fault Reload Description: Critical process stack_mgr fault on rp_0_0 (rc=137), system report at bootflash:core/Yang_Test-system-report_20221130-012929-UTC.tar.gz Reload Severity: Abnormal Reboot Reload Time: 11/30/2022 01:31:11 UTC Reload Category: Image Install Reload Description: Image Install Reload Severity: Normal Reboot Reload Time: 11/30/2022 01:25:03 UTC Reload Category: Critical Process Fault Reload Description: Critical process rif_mgr fault on rp_0_0 (rc=137), system report at bootflash:core/Yang_Test-system-report_20221130-011127-UTC.tar.gz Reload Severity: Abnormal Reboot Reload Time: 11/30/2022 01:13:08 UTC Reload Category: Reload Reload Description: Reload Command Reload Severity: Normal Reboot Reload Time: 11/30/2022 01:08:26 UTC Reload Category: Critical Process Fault Reload Description: Critical process wncmgrd fault on rp_0_0 (rc=137), system report at bootflash:core/Yang_Test-system-report_20221130-010338-UTC.tar.gz Reload Severity: Abnormal Reboot Reload Time: 11/30/2022 01:05:23 UTC Reload Category: Reload Reload Description: Reload Command Reload Severity: Normal Reboot Reload Time: 11/30/2022 01:01:09 UTC Reload Category: Reload Reload Description: Reload Command Reload Severity: Normal Reboot Reload Time: 11/30/2022 00:57:27 UTC Reload Category: Reload Reload Description: Reload Command Reload Severity: Normal Reboot Reload Time: 11/30/2022 00:22:34 UTC Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 203 Requesting Reload Reason History using YANG System Configuration Reload Category: Fast Switchover Reload Description: redundancy force-switchover Reload Severity: Normal Reboot Reload Time: 11/29/2022 23:40:01 UTC Requesting Reload Reason History using YANG Use YANG with NETCONF and RESTCONF to provide the desired solution for automated and programmable network operations. Use the following RPC to create a NETCONF GET request for reload history data: <nc:rpc xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="urn:uuid:da15955f-5bb7-437c-aeb5-0fc7901a1e9e"> <nc:get> <nc:filter> <device-hardware-data xmlns="http://cisco.com/ns/yang/Cisco-IOS-XE-device-hardware-oper"> <device-hardware> <device-system-data> <reload-history/> </device-system-data> </device-hardware> </device-hardware-data> </nc:filter> </nc:get> </nc:rpc> <rpc-reply message-id="urn:uuid:da15955f-5bb7-437c-aeb5-0fc7901a1e9e" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0"> <data> <device-hardware-data xmlns="http://cisco.com/ns/yang/Cisco-IOS-XE-device-hardware-oper"> <device-hardware> <device-system-data> <reload-history> <rl-history> <reload-category>rc-rld</reload-category> <reload-desc>Reload Command</reload-desc> <reload-time>2022-11-30T01:33:44+00:00</reload-time> <reload-severity>normal</reload-severity> </rl-history> <rl-history> <reload-category>rc-crit-proc-fault</reload-category> <reload-desc>Critical process stack_mgr fault on rp_0_0 (rc=137), system report at bootflash:core/Yang_Test-system-report_20221130-012929-UTC.tar.gz</reload-desc> <reload-time>2022-11-30T01:31:11+00:00</reload-time> <reload-severity>abnormal</reload-severity> </rl-history> <rl-history> <reload-category>rc-img-install</reload-category> <reload-desc>Image Install </reload-desc> <reload-time>2022-11-30T01:25:03+00:00</reload-time> <reload-severity>normal</reload-severity> </rl-history> <rl-history> <reload-category>rc-crit-proc-fault</reload-category> <reload-desc>Critical process rif_mgr fault on rp_0_0 (rc=137), system report at bootflash:core/Yang_Test-system-report_20221130-011127-UTC.tar.gz</reload-desc> Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 204 System Configuration Requesting Reload Reason History using YANG <reload-time>2022-11-30T01:13:08+00:00</reload-time> <reload-severity>abnormal</reload-severity> </rl-history> <rl-history> <reload-category>rc-rld</reload-category> <reload-desc>Reload Command</reload-desc> <reload-time>2022-11-30T01:08:26+00:00</reload-time> <reload-severity>normal</reload-severity> </rl-history> <rl-history> <reload-category>rc-crit-proc-fault</reload-category> <reload-desc>Critical process wncmgrd fault on rp_0_0 (rc=137), system report at bootflash:core/Yang_Test-system-report_20221130-010338-UTC.tar.gz</reload-desc> <reload-time>2022-11-30T01:05:23+00:00</reload-time> <reload-severity>abnormal</reload-severity> </rl-history> <rl-history> <reload-category>rc-rld</reload-category> <reload-desc>Reload Command</reload-desc> <reload-time>2022-11-30T01:01:09+00:00</reload-time> <reload-severity>normal</reload-severity> </rl-history> <rl-history> <reload-category>rc-rld</reload-category> <reload-desc>Reload Command</reload-desc> <reload-time>2022-11-30T00:57:27+00:00</reload-time> <reload-severity>normal</reload-severity> </rl-history> <rl-history> <reload-category>rc-rld</reload-category> <reload-desc>Reload Command</reload-desc> <reload-time>2022-11-30T00:22:34+00:00</reload-time> <reload-severity>normal</reload-severity> </rl-history> <rl-history> <reload-category>rc-force-switchover</reload-category> <reload-desc>redundancy force-switchover</reload-desc> <reload-time>2022-11-29T23:40:01+00:00</reload-time> <reload-severity>normal</reload-severity> </rl-history> </reload-history> </device-system-data> </device-hardware> </device-hardware-data> </data> </rpc-reply> For more information about the YANG models, see the following documents: The Cisco IOS XE Programmability Configuration Guide at https://www.cisco.com/c/en/us/support/wireless/ catalyst-9800-series-wireless-controllers/products-installation-and-configuration-guides-list.html The YANG Data Models on Github at https://github.com/YangModels/yang/tree/main/vendor/cisco/xe. Contact the Developer Support Community for NETCONF and YANG features at: https://developer.cisco.com/ Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 205 Requesting Reload Reason History using YANG System Configuration Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 206 1 1 C H A P T E R Best Practices · Introduction, on page 207 Introduction This chapter covers the best practices recommended for configuring a typical Cisco Catalyst 9800 Series wireless infrastructure. The objective is to provide common settings that you can apply to most wireless network implementations. However, not all networks are the same. Therefore, some of the tips might not be applicable to your installation. Always verify them before you perform any changes on a live network. For more information, see Cisco Catalyst 9800 Series Configuration Best Practices guide. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 207 Introduction System Configuration Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 208 I I P A R T System Upgrade · Upgrading the Cisco Catalyst 9800 Wireless Controller Software, on page 211 · In-Service Software Upgrade, on page 219 · Software Maintenance Upgrade, on page 229 · Efficient Image Upgrade, on page 247 · Predownloading an Image to an Access Point, on page 259 · N+1 Hitless Rolling AP Upgrade, on page 269 · NBAR Dynamic Protocol Pack Upgrade, on page 285 · Wireless Sub-Package for Switch, on page 287 1 2 C H A P T E R Upgrading the Cisco Catalyst 9800 Wireless Controller Software · Overview of Upgrading the Controller Software, on page 211 · Upgrading the Controller Software (GUI), on page 212 · Upgrade the Controller Software (CLI), on page 213 · Converting From Bundle-Mode to Install-Mode, on page 214 · Copying a WebAuth Tar Bundle to the Standby Controller, on page 217 Overview of Upgrading the Controller Software This section describes the upgrade process and the methods to upgrade the Cisco Catalyst 9800 Series Wireless Controller Software. Newer versions of the controller software are released at regular intervals. This includes major releases as well as rebuild releases that focuses on bug fixes. The version of the AP software is also tied to the controller software release. Every major Cisco IOS XE software release contains new sets of features that are essential for the enterprise-class customers. Each Cisco IOS XE software release is classified as either a Standard-Support release or an Extended-Support release. Standard-Support Release · A sustaining support lifetime of 12 months from First Customer Shipment (FCS) with two scheduled rebuilds · Rebuilds are typically released at 6 months intervals after FCS. Extended-Support release Details · A sustaining support lifetime of 36 months from FCS with ten scheduled rebuilds. · These rebuilds are at 3, 4, 4, 6, 7 months intervals after FCS or via SMU support. Last 12 months of support will be via SMU. Based on your requirement, such as upgrading the full image or applying a software patch for bugs, you can go for an appropriate software upgrade, using either GUI or CLI. · Upgrading the Controller Software (GUI) Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 211 Upgrading the Controller Software (GUI) System Upgrade · Upgrade the Controller Software (CLI) Software Upgrade Options · Software Maintenance Upgrade: This method installs a software package on the system to provide a patch fix or a security resolution to a released image. This upgrade package is provided on a per release and per component basis, and is specific to the platform. · Hitless Upgrade: This method allows the APs to be upgraded in a staggered manner, while still being connected to the same controller. This avoids upgrade downtime even for N+1 networks. · In-Service Software Upgrade: This method upgrades a wireless controller image to a later release while the network forwards packets. This feature is supported only within and between major releases. Note We recommend In-Service Software Upgrade if you are upgrading the entire image or cold controller SMU. Use Software Maintenance Upgrade for software patches or bug fixes. The software upgrade time is estimated to be less than 6 hours for a large network. However, the upgrade time depends on factors such as the number of APs, the percentage of APs to upgrade in each iteration, the controller type (9800-80, 9800-L, and so on), and the connectivity between the controller and the APs. Device Upgrade Options The following device upgrade options are available: · NBAR Dynamic Protocol Pack Upgrade: Protocol packs are software packages that update the Network-Based Application Recognition (NBAR) engine protocol support on a device without replacing the Cisco software on the device. A protocol pack contains information on applications that are officially supported by NBAR, and are compiled and packed together. · Field Programmables Upgrade: These are hardware programmable packages released by Cisco to upgrade the hardware programmable firmware. Hardware programmable package upgrade is necessary only when a system message indicates that one of the field programmable devices needs an upgrade or when a Cisco technical support representative suggests an upgrade. Upgrading the Controller Software (GUI) Before you begin Clean up the old installation files using the Remove Inactive Files link. Note For GUI options such as Software Maintenance Upgrade, AP Service Package, and AP Device Package, see the respective feature sections. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 212 System Upgrade Upgrade the Controller Software (CLI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Administration > Software Management . Choose an option from the Upgrade Mode drop-down list: · INSTALL: The Install mode uses a package-provisioning file named packages.conf in order to boot a device. · BUNDLE: The Bundle mode uses monolithic Cisco IOS images to boot a device. The Bundle mode consumes more memory than the Install mode because the packages are extracted from the bundle and copied to RAM. Note You get to view the Destination field only for BUNDLE upgrade mode. From the Transport Type drop-down list, choose the transfer type to transfer the software image to your device as TFTP, SFTP, FTP, Device, or Desktop (HTTP). · If you choose TFTP as the Transport Type, enter the Server IP Address of the TFTP server that you want to use. Also, enter the complete File Path. In controllers, the IP TFTP source is mapped to the service port by default. · If you choose SFTP as the Transport Type, enter the Server IP Address of the SFTP server that you want to use. Also, enter the SFTP Username, SFTP Password, and the complete File Path. · If you choose FTP as the Transport Type, enter the Server IP Address of the FTP server that you want to use. Also, enter the FTP Username, FTP Password, and the complete File Path. · If you choose Device as the Transport Type, choose the File System from the drop-down list. In the File Path field, browse through the available images or packages from the device and select one of the options, and click Select. · If you choose Desktop (HTTPS) as the Transport Type, choose the File System from the drop-down list. In the Source File Path field, click Select File to select the file, and click Open. Click Download & Install. To boot your device with the new software image, click Save Configuration &Activate. Click Commit after the device reboots to make the activation changes persistent across reloads. Note For 17.4 and later releases, this step is mandatory for the upgrade to be persisitent. If you do not click Commit, the auto-timer terminates the upgrade operation after 6 hours, and the controller reverts back to the previous image. Upgrade the Controller Software (CLI) Before you begin · Determine the Cisco IOS release that is currently running on your controller, and the filename of the system image using the show version command in user EXEC or privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 213 Converting From Bundle-Mode to Install-Mode System Upgrade · Clean up the old installation files using the install remove inactive command. · Use the show version | include Installation mode to verify the boot mode. Note We recommend that you use install mode for the software upgrade. For steps on converting the device from bundle-mode to install-mode, see Converting From Bundle-Mode to Install-Mode. Procedure Step 1 Step 2 Step 3 Step 4 Download the software from Cisco.com: https://software.cisco.com/download/home/286316412/type a) Click IOS XE Software link. b) Select the release number you want to install, for example Gibraltar-16.12.3. Note Cisco recommended release is selected by default. For release designation information, see: https://software.cisco.com/download/static/assets/i18n/reldesignation.html?context=sds c) Click Download. Copy the new image to flash using the command: copy tftp:image flash: Verify that the image has been successfully copied to flash using the command: dir flash: Upgrade the software by choosing an upgrade process from the options that are currently supported. For a list of upgrade options, see Software Upgrade Options, on page 212. Converting From Bundle-Mode to Install-Mode Use the procedure given below to boot in install-mode: Before you begin · Clean up the old installation files using the commandinstall remove inactive · Verify the boot mode using the command: show version | include Installation mode · Download the software image from Cisco.com. For steps on how to download the software, see Upgrading the Controller Software (CLI) . Procedure Step 1 Copy the new image to flash using the command: copy tftp:image flash: Device# copy tftp://xx.x.x.x//C9800-universalk9_wlc.xx.xx.xx.SSA.bin flash: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 214 System Upgrade Converting From Bundle-Mode to Install-Mode Step 2 Destination filename [C9800-universalk9_wlc..xx.xx.xx..SSA.bin]? Accessing tftp://xx.x.x.x//C9800-universalk9_wlc.xx.xx.xx.SSA.bin... Loading /C9800-universalk9_wlc.xx.xx.xx.SSA.bin from xx.x.x.x (via GigabitEthernet0/0): !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! [OK - 601216545 bytes] 601216545 bytes copied in 50.649 secs (11870255 bytes/sec) Verify that the image has been successfully copied to flash using the command: dir flash: Device# dir flash:*.bin Directory of bootflash:/*.bin On Active Directory of bootflash:/ 12 -rw- 1231746613 Jun 11 2020 23:15:49 +00:00 C9800-universalk9_wlc.BLD_POLARIS_DEV_LATEST_20200611_101837.SSA.bin 17 -rw- 1232457039 Jun 9 2020 21:14:40 +00:00 C9800-universalk9_wlc.BLD_POLARIS_DEV_LATEST_20200609_031801.SSA.bin 21 -rw- 1219332990 Jun 10 2020 02:06:14 +00:00 C9800-universalk9_wlc.BLD_V173_THROTTLE_LATEST_20200608_003622_V17_3_0_183.SSA.bin 18 -rw- 1232167230 Jun 8 2020 02:42:22 +00:00 C9800-universalk9_wlc.BLD_POLARIS_DEV_LATEST_20200607_002322.SSA.bin 24811823104 bytes total (16032391168 bytes free) On Standby Directory of stby-bootflash:/*.bin Directory of stby-bootflash:/ 18 -rw- 1232167230 Jun 8 2020 02:42:22 +00:00 C9800-universalk9_wlc.BLD_POLARIS_DEV_LATEST_20200607_002322.SSA.bin 20 -rw- 1231746613 Jun 11 2020 23:15:49 +00:00 C9800-universalk9_wlc.BLD_POLARIS_DEV_LATEST_20200611_101837.SSA.bin 17 -rw- 1232457039 Jun 9 2020 21:14:40 +00:00 C9800-universalk9_wlc.BLD_POLARIS_DEV_LATEST_20200609_031801.SSA.bin 16 -rw- 1219332990 Jun 10 2020 02:06:14 +00:00 C9800-universalk9_wlc.BLD_V173_THROTTLE_LATEST_20200608_003622_V17_3_0_183.SSA.bin 26462998528 bytes total (17686335488 bytes free) Step 3 Set the boot variable to bootflash:packages.conf. Device(config)# boot sys flash bootflash:packages.conf Step 4 Save your changes by entering this command: write memory. Device(config)# write memory Step 5 Verify whether the boot variable is set to bootflash:packages.conf using the command:show boot Device# show boot BOOT variable = bootflash:packages.conf,12; CONFIG_FILE variable = BOOTLDR variable does not exist Configuration register is 0x2102 Standby BOOT variable = bootflash:packages.conf,12; Standby CONFIG_FILE variable = Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 215 Converting From Bundle-Mode to Install-Mode System Upgrade Step 6 Standby BOOTLDR variable does not exist Standby Configuration register is 0x2102 Move the device from bundle-mode to install-mode using the command: install add file image.bin location activate commit Device# install add file bootflash:C9800-universalk9_wlc.xx.xx.xx.SPA.bin activate commit install_add_activate_commit: START Thu Dec 6 15:43:57 UTC 2018 Dec 6 15:43:58.669 %INSTALL-5-INSTALL_START_INFO: R0/0: install_engine: Started install one-shot bootflash:C9800-xx-universalk9.xx.xx.xx.SPA.bin install_add_activate_commit: Adding PACKAGE --- Starting initial file syncing --Info: Finished copying bootflash:C9800-xx-universalk9.xx.xx.xx.SPA.bin to the selected chassis Finished initial file syncing --- Starting Add --Performing Add on all members [1] Add package(s) on chassis 1 [1] Finished Add on chassis 1 Checking status of Add on [1] Add: Passed on [1] Finished Add Image added. Version: xx.xx.xx.216 install_add_activate_commit: Activating PACKAGE Following packages shall be activated: /bootflash/C9800-xx-rpboot.xx.xx.xx.SPA.pkg /bootflash/C9800-xx-mono-universalk9.xx.xx.xx.SPA.pkg This operation requires a reload of the system. Do you want to proceed? [y/n]y --- Starting Activate --Performing Activate on all members [1] Activate package(s) on chassis 1 --- Starting list of software package changes --Old files list: Removed C9800-xx-mono-universalk9.BLD_Vxxxx_THROTTLE_LATEST_20181022_153332.SSA.pkg Removed C9800-xx-rpboot.BLD_Vxxxx_THROTTLE_LATEST_20181022_153332.SSA.pkg New files list: Added C9800-xx-mono-universalk9.xx.xx.xx.SPA.pkg Added C9800-xx-rpboot.xx.xx.xx.SPA.pkg Finished list of software package changes [1] Finished Activate on chassis 1 Checking status of Activate on [1] Activate: Passed on [1] Finished Activate --- Starting Commit --Performing Commit on all members [1] Commit package(s) on chassis 1 [1] Finished Commit on chassis 1 Checking status of Commit on [1] Commit: Passed on [1] Finished Commit Install will reload the system now! SUCCESS: install_add_activate_commit Thu Dec 6 15:49:21 UTC 2018 Dec 6 15:49:21.294 %INSTALL-5-INSTALL_COMPLETED_INFO: R0/0: install_engine: Completed install one-shot PACKAGE bootflash:C9800-xx-universalk9.xx.xx.xx.SPA.bin Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 216 System Upgrade Copying a WebAuth Tar Bundle to the Standby Controller Note The system reloads automatically after executing the install add file activate commit command. You do not have to manually reload the system. If upgrade fails, cleanup is required before attempting the upgrade procedure again. An upgrade failure may occur due lack of disk space, validation failure of extracted image, system crashes, and so on. Should a system failure occurs during upgrade process, wait till the system is back in service and check the system image version. · If it is a new image, check for the stability and functionality of the system, and decide whether to commit and complete the upgrade procedure or discard the upgrade procedure. · If it is a new image, use the cleanup procedure and reattempt the upgrade procedure. Step 7 Step 8 Click yes to all the prompts. Verify the boot mode using the command: show version Device# show version | in Installation mode is Installation mode is INSTALL Copying a WebAuth Tar Bundle to the Standby Controller Use the following procedure to copy a WebAuth tar bundle to the standby controller, in a high-availability configuration. Procedure Step 1 Step 2 Step 3 Step 4 Choose Administration > Management > Backup & Restore. From the Copy drop-down list, choose To Device. From the File Type drop-down list, chooseWebAuth Bundle. From the Transfer Mode drop-down list, choose TFTP, SFTP, FTP, or HTTP. The Server Details options change based on the file transfer option selected. · TFTP · IP Address (IPv4/IPv6): Enter the server IP address (IPv4 or IPv6) of the TFTP server that you want to use. · File Path: Enter the file path. The file path should start with slash a (/path). · File Name: Enter a file name. The file name should not contain spaces. Underscores (_) and hyphen (-) are the only special characters that are supported. Ensure that file name ends with .tar, for example, webauthbundle.tar. · SFTP · IP Address (IPv4/IPv6): Enter the server IP address (IPv4 or IPv6) of the SFTP server that you want to use. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 217 Copying a WebAuth Tar Bundle to the Standby Controller System Upgrade · File Path: Enter the file path. The file path should start with slash a (/path). · File Name: Enter a file name. The file name should not contain spaces. Underscores (_) and hyphen (-) are the only special characters that are supported. Ensure that file name ends with .tar, for example, webauthbundle.tar. · Server Login UserName: Enter the SFTP server login user name. · Server Login Password: Enter the SFTP server login passphrase. · FTP · IP Address (IPv4/IPv6): Enter the server IP address (IPv4 or IPv6) of the TFTP server that you want to use. · File Path: Enter the file path. The file path should start with slash a (/path). · File Name: Enter a file name. The file name should not contain spaces. Underscores (_) and hyphen (-) are the only special characters that are supported. Ensure that file name ends with .tar, for example, webauthbundle.tar. · Logon Type: Choose the login type as either Anonymous or Authenticated. If you choose Authenticated, the following fields are activated: · Server Login UserName: Enter the FTP server login user name. · Server Login Password: Enter the FTP server login passphrase. · HTTP · Source File Path: Click Select File to select the configuration file, and click Open. Step 5 Step 6 Click the Yes or No radio button to back up the existing startup configuration to Flash. Save the configuration to Flash to propagate the WebAuth bundle to other members, including the standby controller. If you do not save the configuration to Flash, the WebAuth bundle will not be propagated to other members, including the standby controller. Click Download File. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 218 1 3 C H A P T E R In-Service Software Upgrade · Information About In-Service Software Upgrade, on page 219 · Prerequisites for Performing In-Service Software Upgrade, on page 220 · Guidelines and Restrictions for In-Service Software Upgrade, on page 220 · Upgrading Software Using In-Service Software Upgrade , on page 221 · Upgrading Software Using ISSU (GUI), on page 222 · Upgrading Software Using In-Service Software Upgrade with Delayed Commit, on page 223 · Monitoring In-Service Software Upgrade, on page 224 · Troubleshooting ISSU, on page 226 Information About In-Service Software Upgrade In-Service Software Upgrade (ISSU) is a procedure to upgrade a wireless controller image to a later release while the network continues to forward packets. ISSU helps network administrators avoid a network outage when performing a software upgrade. ISSU can also be used to apply cold patches without impacting the active network. ISSU is supported only on the following Cisco Catalyst 9800 Series Wireless Controllers, and supports only upgrade. · Cisco Catalyst 9800-80 Wireless Controller · Cisco Catalyst 9800-40 Wireless Controller · Cisco Catalyst 9800-L Wireless Controller · Cisco Catalyst 9800-CL Wireless Controller (Private Cloud) High-Level Workflow of ISSU 1. Onboard the controller software image to the flash memory. 2. Download the AP image to the AP. 3. Install the controller software image. 4. Commit the changes. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 219 Prerequisites for Performing In-Service Software Upgrade System Upgrade Prerequisites for Performing In-Service Software Upgrade · Ensure that both Active and Standby controllers are in install mode and are booted from bootflash:/packages.conf. · Ensure that the network or device is not being configured during the upgrade. · Schedule the upgrade when your network is stable and steady. · Ensure uninterrupted power supply. A power interruption during upgrade procedure might corrupt the software image. Guidelines and Restrictions for In-Service Software Upgrade · If you do not run the install commit command within 6 hours of the install activate issu command, the system will revert to the original commit position. You can choose to delay the commit using the Upgrading Software Using In-Service Software Upgrade with Delayed Commit procedure. · During ISSU upgrade, while AP rolling upgrade is in progress, the install abort command won't work. You should use the install abort issu command, instead to cancel the upgrade. · During ISSU upgrade, the system displays a warning message similar to: found 46 disjoint TDL objects . You can ignore the warning message because it doesn't have any functional impact. · During ISSU upgrade, if both the controllers (active and standby) have different images after the power cycle, an auto cancel of ISSU is triggered to bring both the controllers to the same version. The following is a sample scenario: Install Version1 (V1) software on the active controller and then apply a SMU hot patch and perform a commit. Now, upgrade the software to Version2 using ISSU, and then power cycle the active controller. At this point, the system has a version mismatch (V1 and V2). The active controller reloads at this stage, after the completion of bulk synchronization. Now, both the controllers come up with the same version (V1 and V1). · An ISSU upgrade that is canceled because of configuration synchronization failure on the standby controller rolls back to V1 of the software image. However, this information isn't available in the show install command log. Run the show issu state detail command to see the current ISSU state. · To enable the clear install command, you should first run the service internal command in global configuration mode, and then run the clear install command in privileged EXEC mode. · Image rollback could be affected if the controller has a stale rollback history and the stack gets formed afterwards. We recommend that you run the clear install state command to clear stale information and boot the controller in bundle mode. · The clear install state command doesn't delete the SMU file from flash or storage. To remove a SMU, use either the install remove file command or the install remove inactive command. · When the new active controller comes up, after the image upgrade, it doesn't retain the old logs on web GUI window as part of show logs. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 220 System Upgrade Upgrading Software Using In-Service Software Upgrade · If a stateful switchover (SSO) or a high-availability (HA) event occurs during the rolling AP upgrade procedure of the ISSU feature, the rolling AP upgrade stops. You should then use the ap image upgrade command to restart the upgrade process. · If HA fails to form after the ISSU procedure, you should reload any one chassis again to form HA again. · Use clear ap predownload statistics command before using the show ap image command. This ensures that you get the right data after every pre-download. · Manually cancel the ISSU process using the install issu abort command in the scenarios given below, to avoid a software version mismatch between the active controller and the standby controller. · An RP link is brought down after standby HOT during an ISSU procedure and the links remains down even after the auto-abort timer expiry. · An RP link is brought down before the standby controller reaches standby HOT during an ISSU procedure. · Cisco TrustSec (CTS) is not supported on the RMI interfaces. · If a switchover occurs while performing an AP upgrade using ISSU, the upgrade process will restart automatically after the switchover. Upgrading Software Using In-Service Software Upgrade Use the following procedure to perform a complete image upgrade, that is, from one image to another. Note ISSU is supported only within and between major releases, for example, 17.3.x to 17.3.y, 17.6.x to 17.6.y (within a major release) and 17.3.x to 17.6.x, 17.3.x to 17.9.x (among major releases), that is, for two releases after the current supported release. ISSU is NOT supported within and between minor releases or between minor and major releases, for example 17.4.x to 17.4.y or 17.4.x to 17.5.x or 17.3.x to 17.4.x. ISSU downgrade is not supported for Cisco Catalyst 9800 Series Wireless Controller platforms. Note We recommend that you configure the percentage of APs to be upgraded by using the ap upgrade staggered command. Procedure Step 1 Command or Action install add file file-name Example: Purpose The controller software image is added to the flash and expanded. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 221 Upgrading Software Using ISSU (GUI) System Upgrade Step 2 Step 3 Step 4 Command or Action Device# install add file <> Purpose Note In Cisco Catalyst 9800 Wireless Controller for Switch, run the install add file sub-package-file-name command to expand the wireless subpackage file. ap image predownload Example: Device# ap image predownload Performs predownload of the AP image. To see the progress of the predownload, use the show ap image command. install activate issu [auto-abort-timer timer] Runs compatibility checks, installs the package, Example: and updates the package status details. Device# install activate issu Optionally, you can configure the time limit to cancel the addition of new software without committing the image. Valid values are from 30 to 1200 minutes. Run either of the following commands: · install abort issu Device# install abort issu Cancels the upgrade process and returns the device to the previous installation state. This is applicable for both controller and the AP. · install commit Device# install commit Commits the activation changes to be persistent across reloads. Note If you do not run the install commit command within 6 hours of completing the previous step, the system will revert to the original commit position. Upgrading Software Using ISSU (GUI) Before you begin 1. The device should be in Install mode. 2. The device should have an HA pair. The standby controller should be online and is in SSO mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 222 System Upgrade Upgrading Software Using In-Service Software Upgrade with Delayed Commit You can verify the details using show issu state detail command. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Administration > Software Management. Under the Software Upgrade tab, check the ISSU Upgrade (HA Upgrade) (Beta) check box. In the AP Upgrade Configuration section, from the AP Upgrade per Iteration drop-down list choose the percentage of APs to be upgraded. Click Download & Install. This initiates the upgrade process and you can view the progress in the Status dialog box. Click the Show Logs link to view the upgrade process details. Note An SSO takes place while activating the image on the active controller. After the SSO, you should login again to the controller. The system enables the Commit and ISSU Abort buttons after the upgrade. Click Commit to commit the activation changes, or ISSU Abort to terminate the upgrade process and return the device to the previous installation state. Upgrading Software Using In-Service Software Upgrade with Delayed Commit Use this procedure to upgrade the controller software with delayed commit, which will help you to run and test the new software without committing the image. Procedure Step 1 Command or Action install add file file-name Example: Device# install add file <file> Purpose Adds and expands the controller software image to the flash. Note In Cisco Catalyst 9800 Wireless Controller for Switch, run the install add file sub-package-file-name command to expand the wireless subpackage file. Step 2 ap image predownload Example: Device# ap image predownload Performs predownload of the AP image. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 223 Monitoring In-Service Software Upgrade System Upgrade Step 3 Step 4 Step 5 Command or Action install auto-abort-timer stop Example: Device# install auto-abort-timer stop Purpose Stops the termination timer so that the upgrade process is not terminated after the default termination time of 6-8 hours. install activate issu Example: Device# install activate issu Runs compatibility checks, installs the package, and updates the package status details. install commit Example: Device# install commit Commits the activation changes to be persistent across reloads. Monitoring In-Service Software Upgrade To view the ISSU state after the install add ISSU and before the install activate ISSU, use the following command: Device# show issu state detail -- Starting local lock acquisition on chassis 1 --Finished local lock acquisition on chassis 1 Current ISSU Status: Enabled Previous ISSU Operation: Abort Successful ======================================================= System Check Status ------------------------------------------------------Platform ISSU Support Yes Standby Online Yes Autoboot Enabled Yes SSO Mode Yes Install Boot Yes Valid Boot Media Yes ======================================================= No ISSU operation is in progress show install summary [ Chassis 1 2 ] Installed Package(s) Information: State (St): I - Inactive, U - Activated & Uncommitted, C - Activated & Committed, D - Deactivated & Uncommitted -------------------------------------------------------------------------------Type St Filename/Version -------------------------------------------------------------------------------IMG I 17.1.1.0.432 IMG C 16.12.2.0.2707 -------------------------------------------------------------------------------Auto abort timer: inactive -------------------------------------------------------------------------------- To view the ISSU state after activating ISSU, use the following command: Device# show issu state detail Current ISSU Status: In Progress Previous ISSU Operation: Abort Successful ======================================================= Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 224 System Upgrade Monitoring In-Service Software Upgrade System Check Status ------------------------------------------------------Platform ISSU Support Yes Standby Online Yes Autoboot Enabled Yes SSO Mode Yes Install Boot Yes Valid Boot Media Yes ======================================================= Operation type: Step-by-step ISSU Install type : Image installation using ISSU Current state : Activated state Last operation: Switchover Completed operations: Operation Start time ------------------------------------------------------Activate location standby Chassis 2 2019-09-17:23:41:12 Activate location active Chassis 1 2019-09-17:23:50:06 Switchover 2019-09-17:23:52:03 State transition: Added -> Standby activated -> Active switched-over Auto abort timer: automatic, remaining time before rollback: 05:41:53 Running image: bootflash:packages.conf Operating mode: sso, terminal state reached show install summary [ Chassis 1/R0 2/R0 ] Installed Package(s) Information: State (St): I - Inactive, U - Activated & Uncommitted, C - Activated & Committed, D - Deactivated & Uncommitted -------------------------------------------------------------------------------Type St Filename/Version -------------------------------------------------------------------------------IMG U 17.1.1.0.432 -------------------------------------------------------------------------------Auto abort timer: active on install_activate, time before rollback - 05:41:49 -------------------------------------------------------------------------------- To view the ISSU state after installing the commit, use the following command: Device# show issu state detail --- Starting local lock acquisition on chassis 1 --Finished local lock acquisition on chassis 1 Current ISSU Status: Enabled Previous ISSU Operation: Successful ======================================================= System Check Status ------------------------------------------------------Platform ISSU Support Yes Standby Online Yes Autoboot Enabled Yes SSO Mode Yes Install Boot Yes Valid Boot Media Yes ======================================================= No ISSU operation is in progress show install summary [ Chassis 1/R0 2/R0 ] Installed Package(s) Information: State (St): I - Inactive, U - Activated & Uncommitted, C - Activated & Committed, D - Deactivated & Uncommitted -------------------------------------------------------------------------------Type St Filename/Version -------------------------------------------------------------------------------IMG C 17.1.1.0.432 -------------------------------------------------------------------------------Auto abort timer: inactive Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 225 Troubleshooting ISSU System Upgrade --------------------------------------------------------------------------------------------------------------------------------------------------------------- To view the ISSU state after terminating the ISSU process, use the following command: Device# show issu state detail Current ISSU Status: In Progress Previous ISSU Operation: Abort Successful ======================================================= System Check Status ------------------------------------------------------Platform ISSU Support Yes Standby Online Yes Autoboot Enabled Yes SSO Mode Yes Install Boot Yes Valid Boot Media Yes ======================================================= Operation type: Step-by-step ISSU Install type : Image installation using ISSU Current state : Timeout-error state Last operation: Commit Chassis 1 Completed operations: Operation Start time ------------------------------------------------------Activate location standby Chassis 2 2019-09-17:23:41:12 Activate location active Chassis 1 2019-09-17:23:50:06 Switchover 2019-09-17:23:52:03 Abort 2019-09-18:00:14:13 Commit Chassis 1 2019-09-18:00:28:23 State transition: Added -> Standby activated -> Active switched-over -> Activated -> Timeout-error Auto abort timer: inactive Running image: bootflash:packages.conf Operating mode: sso, terminal state reached To view the summary of the active packages in a system, use the following command: Device# show install summary [ Chassis 1 2 ] Installed Package(s) Information: State (St): I - Inactive, U - Activated & Uncommitted, C - Activated & Committed, D - Deactivated & Uncommitted -------------------------------------------------------------------------------Type St Filename/Version -------------------------------------------------------------------------------IMG C 16.12.2.0.2707 -------------------------------------------------------------------------------Auto abort timer: inactive -------------------------------------------------------------------------------- Troubleshooting ISSU Using install activate issu command before completing AP pre-download. The following scenario is applicable when you run the install activate issu command before completing AP pre-download. In such instances, you should run the ap image predownload command and then proceed with the activation. Device# install activate issu Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 226 System Upgrade Troubleshooting ISSU install_activate: START Wed Jan 8 04:48:04 UTC 2020 System configuration has been modified. Press Yes(y) to save the configuration and proceed. Press No(n) for proceeding without saving the configuration. Press Quit(q) to exit, you may save configuration and re-enter the command. [y/n/q] y Building configuration... [OK]Modified configuration has been saved install_activate: Activating ISSU NOTE: Going to start Activate ISSU install process STAGE 0: System Level Sanity Check =================================================== --- Verifying install_issu supported ----- Verifying standby is in Standby Hot state ----- Verifying booted from the valid media ----- Verifying AutoBoot mode is enabled ----- Verifying Platform specific ISSU admission criteria --CONSOLE: FAILED: Install operation is not allowed. Reason -> AP pre-image download is mandatory f or hitless software upgrade. Action -> Trigger AP pre-image download. FAILED: Platform specific ISSU admission criteria ERROR: install_activate exit(2 ) Wed Jan 8 04:48:37 UTC 2020 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 227 Troubleshooting ISSU System Upgrade Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 228 1 4 C H A P T E R Software Maintenance Upgrade · Introduction to Software Maintenance Upgrade, on page 229 · Information About AP Device Package, on page 234 · Information About Per Site or Per AP Model Service Pack (APSP), on page 237 Introduction to Software Maintenance Upgrade Software Maintenance Upgrade (SMU) is a package that can be installed on a system to provide a patch fix or a security resolution to a released image. A SMU package is provided for each release and per component basis, and is specific to the corresponding platform. A SMU provides a significant benefit over classic Cisco IOS software because it allows you to address the network issue quickly while reducing the time and scope of the testing required. The Cisco IOS XE platform internally validates the SMU compatibility and does not allow you to install noncompatible SMUs. All the SMUs are integrated into the subsequent Cisco IOS XE software maintenance releases. A SMU is an independent and self-sufficient package and does not have any prerequisites or dependencies. You can choose which SMUs to install or uninstall in any order. Note SMUs are supported only on Extended Maintenance releases and for the full lifecycle of the underlying software release. Note You can activate the file used in the install add file command only from the filesystems of the active device. You cannot use the file from the standby or member filesystems; the install add file command will fail in such instances. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 229 Introduction to Software Maintenance Upgrade System Upgrade Note When the SMU file is deleted and a reboot is performed, the device may display the following error message: --- Starting SMU Add operation --Performing SMU_ADD on all members FAILED: Improper State./bootflash/<previously-installed-smu-filename>.smu.bin not present. Please restore file for stability. Checking status of SMU_ADD on [1/R0] SMU_ADD: Passed on []. Failed on [1/R0] Finished SMU Add operation FAILED: add_activate_commit /bootflash/<tobeinstalled-wlc-smu-filename>.smu.bin Wed Aug 02 08:30:18 UTC 2023. This error occurs because the previous SMU file was not properly removed from the controller. It may lead to functional errors, such as the inability to install new SMU or APSP files. We recommend that you use the install remove file command to remove previous instances of APSP or SMU files from the bootflash. SMU infrastructure can be used to meet the following requirements in the wireless context: · Controller SMU: Controller bug fixes or Cisco Product Security Incident Response information (PSIRT). · APSP: AP bug fixes, PSIRTs, or minor features that do not require any controller changes. · APDP: Support for new AP models without introduction of new hardware or software capabilities. Note The show ap image command displays cumulative statistics regarding the AP images in the controller. We recommend that you clear the statistics using the clear ap predownload statistics command, before using the show ap image command, to ensure that correct data is displayed. SMU Workflow The SMU process should be initiated with a request to the SMU committee. Contact your customer support to raise an SMU request. During the release, the SMU package is posted on the Cisco Software Download page and can be downloaded and installed. SMU Package An SMU package contains the metadata and fix for the reported issue the SMU is requested for. SMU Reload The SMU type describes the effect on a system after installing the corresponding SMU. SMUs can be nontraffic-affecting or can result in device restart, reload, or switchover. A controller cold patch require a cold reload of the system during activation. A cold reload is the complete reload of the operating system. This action affects the traffic flow for the duration of the reload (~5 min). This reload ensures that all the processes are started with the correct libraries and files that are installed as part of the corresponding SMU. Controller hot patching support allows the SMU to be effective immediately after activation, without reloading the system. After the SMU is committed, the activation changes are persistent across reloads. Hot patching Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 230 System Upgrade Installing a SMU (GUI) SMU packages contain metadata that lists all processes that need to be restarted in order to activate the SMU. During SMU activation, each process in this list will be restarted one at a time until the SMU is fully applied. Installing a SMU (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Administration > Software Management and click the Software Maintenance Upgrade tab. Click Add to add a SMU image. From the Transport Type drop-down list, choose the transfer type to transfer the software image to your device as TFTP, SFTP, FTP, Device, or Desktop (HTTP). a) If you choose TFTP as the Transport Type, you need to enter the Server IP Address (IPv4/IPv6), File path and choose a File System from the drop-down list. For example, if the SMU file is at the root of the TFTP server you can enter /C9800-universalk9_wlc.17.03.02a.CSCvw55275.SPA.smu.bin in the File path field. b) If you choose SFTP as the Transport Type, you need to enter the Server IP Address (IPv4/IPv6), SFTP Username, SFTP Password, File path and choose a File System from the drop-down list. c) If you choose FTP as the Transport Type, you need to enter the Server IP Address (IPv4/IPv6), FTP Username, FTP Password, File path, and choose a File System from the drop-down list. d) If you choose Device as the Transport Type, you need to enter the File path and choose a File System from the drop-down list. This is possible when the software is already present on the device due to an earlier download and activation, followed by a subsequent deactivation. Note The File System depends upon the kind of device you are using. On physical controllers, you have the option to store the file to the bootflash or hard disk, whereas in case of virtual controllers, you can only store it in the bootflash. e) If you choose Desktop (HTTPS) as the Transport Type, you need to choose a File System from the drop-down list and click Select File to navigate to the Source File Path. Enter the File Name and click Add File. This operation copies the maintenance update package from the location you selected above to the device and performs a compatibility check for the platform and image versions and adds the SMU package for all the members. After a SMU is successfully added to the system, a message is displayed about the successful operation and that the SMU can be activated on the device. The message displays the name of the package (SMU) that is now available to be activated. It lists the SMU Details - Name, Version, State (active or inactive), Type (reload, restart, or non-reload) and other compatibility details. If SMU is of the Type - reload, then any operation (activate, deactivate or rollback) will cause the device to reload; restart involves only a process restart and if it is non reload- no change in process takes place. Select the SMU and click on Activate to activate the SMU on the system and install the package, and update the package status details. Select the SMU and click Commit to make the activation changes persistent across reloads. The Commit operation creates commit points. These commit points are similar to snapshots using which you can determine which specific change you want to be activated or rolled back to, in case there is any issue with Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 231 Installing SMU System Upgrade the SMU. The commit can be done after activation when the system is up, or after the first reload. If a package is activated, but not committed, it remains active after the first reload, but not after the second reload. Installing SMU Procedure Step 1 Command or Action install add file bootflash: filename Example: Device# install add file bootflash:<Filename> Step 2 install activate file bootflash: filename Example: Device# install activate file bootflash:<Filename> Step 3 install commit Example: Device# install commit Step 4 Step 5 show version Example: Device# show version show install summary Example: Device# show install summary Purpose Copies the maintenance update package from a remote location to the device, and performs a compatibility check for the platform and image versions. This command runs base compatibility checks on a file to ensure that the SMU package is supported on the platform. It also adds an entry in the package/SMU.sta file, so that its status can be monitored and maintained. Runs compatibility checks, installs the package, and updates the package status details. For a restartable package, the command triggers the appropriate post-install scripts to restart the necessary processes, and for non-restartable packages it triggers a reload. Commits the activation changes to be persistent across reloads. The commit can be done after activation while the system is up, or after the first reload. If a package is activated but not committed, it remains active after the first reload, but not after the second reload. Displays the image version on the device. Displays information about the active package. The output of this command varies according to the install commands that are configured. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 232 System Upgrade Roll Back an Image (GUI) Roll Back an Image (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Administration > Software Management. Go to SMU, APSP or APDP. Click Rollback. In the Rollback to drop-down list, choose Base, Committed or Rollback Point. Click Add File. Rollback SMU Procedure Step 1 Command or Action Purpose install rollback to {base | committed | id | Returns the device to the previous installation committed } committed ID state. After the rollback, a reload is required. Example: Device(config)# install rollback to id 1234 Step 2 install commit Example: Device# install commit Commits the activation changes to be persistent across reloads. Deactivate SMU Procedure Step 1 Command or Action install deactivate file bootflash: filename Example: Device# install deactivate file bootflash:<Filename> Step 2 install commit Example: Device# install commit Purpose Deactivates an active package, updates the package status, and triggers a process to restart or reload. Commits the activation changes to be persistent across reloads. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 233 Configuration Examples for SMU System Upgrade Configuration Examples for SMU The following is sample of the SMU configuration, after the install add for the SMU is done: Device#show install summary [ Chassis 1 2 ] Installed Package(s) Information: State (St): I - Inactive, U - Activated & Uncommitted, C - Activated & Committed, D - Deactivated & Uncommitted -------------------------------------------------------------------------------Type St Filename/Version -------------------------------------------------------------------------------- IMG C 16.8.1.0.39751 ------------------------------------------------------------------Auto abort timer: inactive ------------------------------------------------------------------- Information About AP Device Package The controller supports rolling out critical bug fixes using Software Maintenance Upgrade (SMU). Similarly, if any new AP hardware model is introduced, the AP models need to be connected to the existing wireless network. Currently, when a new AP hardware model is introduced, those get shipped along with the corresponding controller related major software version. Then you need to wait for the release of a corresponding controller version relative to the new AP model and upgrade the entire network. From 16.11.1 onwards, you can introduce the new AP model into your wireless network using the SMU infrastructure without the need to upgrade to the new controller version. This solution is termed as AP Device Package (APDP). SMU Process or Workflow The SMU process builds APDP to detect code changes and build APDP. It also supports addition of a new file (AP image file) to APDP and inclusion of those AP images into APDP. The workflow is as follows: · install add · install activate · install commit For more details, see Managing AP Device Package. Note To ensure completion of the APSP or APDP activation or deactivation process, ensure that you run the install commit command after the install activate or install deactivate command. Failing to do so within 6 hours of the deactivate operation terminates the deactivate operation and moves it back to the original commit position. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 234 System Upgrade Installing AP Device Package (GUI) SMU Package A SMU package contains the metadata that carry AP model and its capability related details. AP Image Changes When new AP models are introduced, there may or may not be corresponding new AP images. This means that AP images are mapped to the AP model families. If a new AP model belongs to an existing AP model family then you will have existing AP image entries (Example: ap3g3, ap1g5, and so on). For instance, if an AP model belongs to either ap3g3 or ap1g5, the respective image file is updated with the right AP image location. Also, the corresponding metadata file is updated with the new AP model capability information. If a new AP model belongs to a new AP model family and new image file, the new image entry file is created in the right AP image location. Also, the corresponding metadata file is updated with the new AP model capability information. During AP image bundling and packaging of APDP, the new AP model images and metadata file are packaged into APDP. Note The APDP images must not be renamed to avoid impact on its functionality. Installing AP Device Package (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Administration > Software Management. Click AP Device Package (APDP) tab. Click Add. From the Transport Type drop-down list, choose the transfer type to transfer the software image to your device as TFTP, SFTP, FTP, Device, or Desktop (HTTP). a) If you choose TFTP as the Transport Type, you need to enter the Server IP Address (IPv4/IPv6), File path and choose a File System from the drop-down list. b) If you choose SFTP as the Transport Type, you need to enter the Server IP Address (IPv4/IPv6), SFTP Username, SFTP Password, File path and choose a File System from the drop-down list. c) If you choose FTP as the Transport Type, you need to enter the Server IP Address (IPv4/IPv6), FTP Username, FTP Password, File path, and choose a File System from the drop-down list. d) If you choose Device as the Transport Type, you need to enter the File path and choose a File System from the drop-down list. e) If you choose Desktop (HTTPS) as the Transport Type, you need to choose a File System from the drop-down list and click Select File to navigate to the Source File Path. Enter the File Name and click Add File. From the AP Upgrade Configuration section, choose the percentage of APs to be included from the AP Upgrade per iteration drop-down list. Click Apply. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 235 Installing AP Device Package (CLI) System Upgrade Installing AP Device Package (CLI) Procedure Step 1 Command or Action install add file bootflash: filename Example: Device# install add file bootflash:<Filename> Step 2 install activate file bootflash: filename Example: Device# install activate file bootflash:<Filename> Step 3 install commit Example: Device# install commit Step 4 Step 5 install deactivate file bootflash: filename Example: Device# install deactivate file bootflash:<Filename> show version Example: Device# show version Purpose Extracts AP images from APDP and places them in SMU or APDP specific mount location. Note Here, the SMU does not trigger the Wireless module. Adds the AP software in APDP to the existing current active AP image list. Also, updates the capability information for the new AP models in the controller . Note Even if the new AP module supports new hardware capabilities, the controller recognizes only the capability information that its base version supports. At this point, the controller accepts the new connection from the new AP model. The new AP model then joins the controller . Commits the new AP software to be persistent across reloads. The commit can be done after activation while the system is up, or after the first reload. If a package is activated but not committed, it remains active after the first reload, but not after the second reload. (Optional) Deactivates an active APDP, updates the package status, and triggers a process to restart or reload. Displays the image version on the device. Verifying APDP on the Controller To verify the status of APDP packages on the controller , use the following command: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 236 System Upgrade Information About Per Site or Per AP Model Service Pack (APSP) Device# show install summary [ Chassis 1 ] Installed Package(s) Information: State (St): I - Inactive, U - Activated & Uncommitted, C - Activated & Committed, D - Deactivated & Uncommitted -------------------------------------------------------------------------------Type St Filename/Version -------------------------------------------------------------------------------APDP I bootflash:apdp_CSCvp12345.bin IMG C 17.1.0.0 -------------------------------------------------------------------------------Auto abort timer: inactive -------------------------------------------------------------------------------- Note The output of this command varies based on the packages, and the package states that are installed. Information About Per Site or Per AP Model Service Pack (APSP) The controller supports critical updates to the access points (APs) using Software Maintenance Update (SMU). Using the Per Site or Per AP Model Service Pack feature, you can roll out critical AP bug fixes to a subset of APs, on a site or group of sites, using SMU in a staggered manner. This feature allows to control the propagation of a SMU in your network by selecting the sites, to be included in the SMU activation, using Per Site AP SMU rollout. However, all sites should be brought to the same SMU level before a new SMU can be rolled out to a subset of sites or for a subsequent image upgrade to be initiated on the system.. Using Per AP model SMU, you can limit the update to only certain AP models. The software is predownloaded and is activated only to certain AP models, within a site. Note that if a certain number of model images are included in a SMU, all the future updates must contain software images for those models. This feature is supported in the flex-connect mode, local mode, and Software-Defined Access (SD-Access) wireless scenarios. Note After applying the AP site filter for per site SMU upgrade, a new image installation will not be allowed without applying the site filter to all the other sites, or removing the existing site filter. Workflow of AP SMU Upgrade · Run a query to check whether there are ongoing activities, such as AP image predownload or AP rolling upgrade. · Identify the site or sites to install the SMU in, and set up a site filter. · Trigger the predownload of SMU to the sites in the site filter. · Activate the SMU after the predownload is complete. · Commit the update. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 237 Rolling AP Upgrade System Upgrade Note You can add more sites to a filter after setting up the filter. However, you have to apply the filter again using the ap image site-filter file file-name apply command. If you clear the site filter, the update is made on all the remaining sites. Deactivation and rollback of the images are not filtered per site, and are applicable to all the sites. Rolling AP Upgrade Rolling AP upgrade is a method of upgrading the APs in a staggered manner such that some APs are always up in the network and provide seamless coverage to clients, while the other APs are selected to be upgraded. Note The AP images should be downloaded before the rolling upgrade is triggered, so that all the APs that are to be upgraded have the new image version. Note The time required to complete Rolling AP upgrade depends on factors such as the number of APs, the percentage of APs in each iteration, the controller type, and the connectivity between the controller and the APs. In general, Rolling AP upgrade completion time is the max iteration time (where each iteration can take up to 5 minutes) * expected number of iterations. You use the iteration expiry time field of the show ap upgrade command output to see the end time. Rolling AP Upgrade Process Rolling AP upgrade is done on a per controller basis. The number of APs to be upgraded at a given time, is the percentage of the total number of APs that are connected to the controller. The percentage is capped at a user configured value. The default percentage is 15. The non-client APs will be upgraded before the actual upgrade of APs begin. The upgrade process is as follows: 1. Candidate AP Set Selection In this stage, a set of AP candidates are selected based on neighbouring AP information. For example, if you identify an AP for upgrade, a certain number (N) of its neighbours are excluded from candidate selection. The N values are generated in the following manner: If the user configurable capped percentage is 25%, then N=6 (Expected number of iterations =5) If the user configurable capped percentage is 15%, then N=12 (Expected number of iterations=12) If the user configurable capped percentage is 5%, then N=24 (Expected number of iterations =22) If the candidates cannot be selected using the neighbouring AP information, select candidates from indirect neighbours. If you still are not able to select candidates, the AP will be upgraded successfully without any failure. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 238 System Upgrade Installing AP Service Package (GUI) Note After the candidates are selected, if the number of candidates are more than the configured percentage value, the extra candidates are removed to maintain the percentage cap. 2. Client Steering Clients that are connected to the candidate APs are steered to APs that are not there in the candidate AP list, prior to rebooting the candidate APs. The AP sends out a request to each of its associated clients with a list of APs that are best suited for them. This does not include the candidate APs. The candidate APs are marked as unavailable for neighbour lists. Later, the markings are reset in the AP rejoin and reload process. 3. AP Rejoin and Reload Process After the client steering process, if the clients are still connected to the candidate AP, the clients are sent a de-authorization and the AP is reloaded and comes up with a new image. A three-minute timer is set for the APs to rejoin. When this timer expires, all the candidates are checked and marked if they have either joined the controller or the mobility peer. If 90% of the candidate APs have joined, the iteration is concluded; if not, the timer is extended to three more minutes. The same check is repeated after three minutes. After checking thrice, the iteration ends and the next iteration begins. Each iteration may last for about 10 minutes. For rolling AP upgrade, there is only one configuration that is required. It is the number of APs to be upgraded at a time, as a percentage of the total number of APs in the network. Default value will be 15. Device (config)#ap upgrade staggered <25 | 15 | 5> Use the following command to trigger the rolling AP upgrade: Device#ap image upgrade [test] Note Rolling AP upgrade is not resumed after an SSO. You should run the ap image upgrade command to restart the rolling AP upgrade from the beginning and it affects all the APs, including the Mesh APs. Installing AP Service Package (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Administration > Software Management. Click AP Service Package (APSP) tab. Click Add. From the Transport Type drop-down list, choose the transfer type to transfer the software image to your device as TFTP, SFTP, FTP, Device, or Desktop (HTTP). a) If you choose TFTP as the Transport Type, you need to enter the Server IP Address (IPv4/IPv6), File path and choose a File System from the drop-down list. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 239 Installing AP Service Package (CLI) System Upgrade Step 5 Step 6 Step 7 b) If you choose SFTP as the Transport Type, you need to enter the Server IP Address (IPv4/IPv6), SFTP Username, SFTP Password, File path and choose a File System from the drop-down list. c) If you choose FTP as the Transport Type, you need to enter the Server IP Address (IPv4/IPv6), FTP Username, FTP Password, File path, and choose a File System from the drop-down list. d) If you choose Device as the Transport Type, you need to enter the File path and choose a File System from the drop-down list. e) If you choose Desktop (HTTPS) as the Transport Type, you need to choose a File System from the drop-down list and click Select File to navigate to the Source File Path. Enter the File Name and click Add File. From the AP Upgrade Configuration section, choose the percentage of APs to be included from the AP Upgrade per iteration drop-down list. Click Apply. Installing AP Service Package (CLI) Use the following procedure to roll out critical bug fixes to a subset of APs using SMU. Procedure Step 1 Command or Action install add file file-name Example: Device# install add file flash:<file-name> Purpose Checks for ongoing activities, such as AP image predownload or AP rolling upgrade. If there are no such activities, populates the predownload directory to install a package file to the system. Step 2 ap image site-filter file file-name add site-tag Adds a site tag to a site filter. Example: Device# ap image site-filter file flash:<file-name> add bgl18 Step 3 ap image site-filter file file-name remove site-tag Example: Device# ap image site-filter file flash:<file-name> remove bgl18 (Optional) Removes a site tag from a site filter. Step 4 ap image predownload Example: Device# ap image predownload (Optional) Performs predownload of an AP image. This image predownload will be filtered by the site filter, set up in the previous step. Step 5 install activate file file-name Example: Device# install activate file flash:<file-name> Triggers the AP upgrade in rolling a staggered fashion for the APs added in site filter. Step 6 install commit Commits the image update. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 240 System Upgrade Adding a Site to a Filter Command or Action Example: Device# install commit Purpose During the commit, the mapping from file to site is saved in the persistent database so that it is available even after a reload. Adding a Site to a Filter Procedure Step 1 Command or Action Purpose ap image site-filter file file-name add site-tag Adds a site tag to a site filter. Example: Device# ap image site-filter file flash:<file-name> add bgl18 Repeat this step again to set up a multisite filter. Step 2 ap image site-filter file file-name apply Example: Device# ap image site-filter file flash:<file-name> apply Predownloads the image and upgrades the APs based on the site filter. Step 3 ap image site-filter file file-name clear Example: Device# ap image site-filter file flash:<file-name> clear Clears the site filter table and predownloads the image and does a rolling AP upgrade to all sites where it is not active. Deactivating an Image Procedure Step 1 Command or Action install deactivate file flash file-name Example: Device# install deactivate file flash:<file-name> Purpose Performs rolling AP upgrade based on the AP models present in the prepare file. Deactivation is not filtered by site. Therefore, deactivation applies to all the sites. Note Action is taken if the APs in a site are not running the SMU that is being deactivated. Only internal tables are updated to remove the SMU. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 241 Roll Back APSP System Upgrade Roll Back APSP Procedure Step 1 Command or Action Purpose install add profile rollback_profile-name (Optional) Moves back to any rollback points Example: in a graceful way with AP image predownload support. Device# install add profile rollback_id1 Note To get a list of available rollback profile names, use show install profile command. Step 2 Step 3 ap image predownload Example: Device# ap image predownload (Optional) Performs predownload of an AP image. This image predownload will be filtered by the site filter, set up in the previous step. install rollback to rollback_id Performs rollback of the image for the affected Example: AP models. Device# install rollback to rollback_id1 The roll back action is not filtered by site. Therefore, rollback applies to all the sites. Note The APs that are in the base image or in a point before the rollback action takes effect are not affected. Canceling the Upgrade Procedure Step 1 Command or Action install abort Example: Device# install abort Purpose Aborts the upgrade by resetting the APs in rolling fashion. Verifying the Upgrade To see the summary of the AP software install files, use the following command: Device# show ap image file summary AP Image Active List ============================ Install File Name: base_image.bin ------------------------------AP Image Type Capwap Version Size (KB) Supported AP models Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 242 System Upgrade Verifying the Upgrade ------------- -------------- -------------------------------------------------------------------- ap1g1 17.3.0.30 13300 NA ap1g2 17.3.0.30 34324 NA ap1g3 17.3.0.30 98549 AP803 ap1g4 OEAP1810 17.3.0.30 34324 AP1852E, AP1852I, AP1832I, AP1830I, AP1810W, ap1g5 17.3.0.30 23492 AP1815W, AP1815T, OEAP1815, AP1815I, AP1800I, AP1800S, AP1815M, 1542D, AP1542I, AP1100AC, AP1101AC, AP1840I ap1g6 17.3.0.30 93472 AP2900I, C9117AXI ap1g6a C9140AXT 17.3.0.30 247377 C9130AXI, C9130AXE, C9140AXI, C9140AXD, ap1g7 17.3.0.30 C9120AXE, C9120AXP, C9120AXI 23988 AP1900I, C9115AXI, AP1900E, C9115AXE, ap1g8 17.3.0.30 23473 C9105AXI, C9105AXW, C9110AXI, C9110AXE ap3g1 17.3.0.30 23422 NA ap3g2 17.3.0.30 23411 AP1702I ap3g3 17.3.0.30 23090 AP3802E, AP3802I, AP3802P, AP4800, AP2802E, AP2802I, AP2802H, AP3800, AP1562E, AP1562I, AP1562D, AP1562PS, IW-6300H-DC, IW-6300H-AC, IW-6300H-DCW, ESW-6300 c1570 17.3.0.30 13000 AP1572E, 1573E, AP1572I c3700 17.3.0.30 14032 AP3702E, AP3701E, AP3701I, AP3702I, AP3701P, AP3702P, AP2702E, AP2702I, AP3702, IW3702, AP3701, AP3700C virtApImg 17.3.0.30 177056 APVIRTUAL AP Image Prepare List** ============================ Install File Name: base_image.bin ------------------------------- ============================ Install File Name: base_image.bin ------------------------------- AP Image Type Capwap Version Size (KB) Supported AP models ------------- -------------- -------------------------------------------------------------------- ap1g1 17.3.0.30 13300 NA ap1g2 17.3.0.30 34324 NA ap1g3 17.3.0.30 98549 AP803 ap1g4 17.3.0.30 AP1810W, OEAP1810 34324 AP1852E, AP1852I, AP1832I, AP1830I, ap1g5 17.3.0.30 23492 AP1815W, AP1815T, OEAP1815, AP1815I, AP1800I, AP1800S, AP1815M, 1542D, AP1542I, AP1100AC, AP1101AC, AP1840I ap1g6 17.3.0.30 93472 AP2900I, C9117AXI Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 243 Verifying the Upgrade System Upgrade ap1g6a 17.3.0.30 C9140AXD, C9140AXT 247377 C9130AXI, C9130AXE, C9140AXI, ap1g7 17.3.0.30 23988 C9120AXE, C9120AXP, C9120AXI AP1900I, C9115AXI, AP1900E, C9115AXE, ap1g8 17.3.0.30 23473 C9105AXI, C9105AXW, C9110AXI, C9110AXE ap3g1 17.3.0.30 23422 NA ap3g2 17.3.0.30 23411 AP1702I ap3g3 17.3.0.30 23090 AP3802E, AP3802I, AP3802P, AP4800, AP2802E, AP2802I, AP2802H, AP3800, AP1562E, AP1562I, AP1562D, AP1562PS, IW-6300H-DC, IW-6300H-AC, IW-6300H-DCW, ESW-6300 c1570 17.3.0.30 13000 AP1572E, 1573E, AP1572I c3700 17.3.0.30 14032 AP3702E, AP3701E, AP3701I, AP3702I, AP3701P, AP3702P, AP2702E, AP2702I, AP3702, IW3702, AP3701, AP3700C virtApImg 17.3.0.30 177056 APVIRTUAL **Difference of Active and Prepare list gives images being predownloaded to Access Points. To see the summary of the AP site-filtered upgrades, use the following command: Device# show ap image site summary Install File Name: vwlc_apsp_16.11.1.0_74.bin Site Tag Prepared Activated Committed ------------------------------------------------------------------------------------------- bgl-18-1 Yes Yes Yes bgl-18-2 Yes Yes Yes bgl-18-3 Yes Yes Yes default-site-tag Yes Yes Yes To see the summary of AP upgrades, use the following command: Device# show ap upgrade summary To check the status of an APSP, use the following command: Device# show install summary [ Chassis 1 ] Installed Package(s) Information: State (St): I - Inactive, U - Activated & Uncommitted, C - Activated & Committed, D - Deactivated & Uncommitted -------------------------------------------------------------------------------Type St Filename/Version -------------------------------------------------------------------------------APSP I bootflash:vwlc_apsp_16.11.1.0_74.bin Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 244 System Upgrade Verifying of AP Upgrade on the Controller IMG C 16.11.1.0.1249 -------------------------------------------------------------------------------- Auto abort timer: inactive -------------------------------------------------------------------------------- Verifying of AP Upgrade on the Controller Use the following show command to verify the AP upgrade on the controller: Device #show ap upgrade AP upgrade is in progress From version: 8 16.9.1.6 To version: 9 16.9.1.30 Started at: 03/09/2018 21:33:37 IST Percentage complete: 0 Expected time of completion: 03/09/2018 22:33:37 IST Progress Report --------------Iterations ---------Iteration Start time End time AP count -------------------------------------------------------------------0 03/09/2018 21:33:37 IST 03/09/2018 21:33:37 IST 0 1 03/09/2018 21:33:37 IST ONGOING 0 Upgraded -------Number of APs: 0 AP Name Ethernet MAC Iteration Status -------------------------------------------------------------------In Progress ----------Number of APs: 1 AP Name Ethernet MAC ------------------------------------------------APf07f.06a5.d78c f07f.06cf.b910 Remaining --------Number of APs: 3 AP Name Ethernet MAC ------------------------------------------------APCC16.7EDB.6FA6 0081.c458.ab30 AP38ED.18CA.2FD0 38ed.18cb.25a0 AP881d.fce7.5ee4 d46d.50ee.33a0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 245 Verifying of AP Upgrade on the Controller System Upgrade Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 246 1 5 C H A P T E R Efficient Image Upgrade · Efficient Image Upgrade, on page 247 · Enable Pre-Download (GUI), on page 248 · Enable Pre-Download (CLI), on page 248 · Configuring a Site Tag (CLI), on page 248 · Attaching Policy Tag and Site Tag to an AP (CLI), on page 250 · Trigger Predownload to a Site Tag, on page 251 · Feature History for Out-of-Band AP Image Download, on page 253 · Information About Out-of-Band AP Image Download, on page 253 · Restrictions for Out-of-Band AP Image Download, on page 254 · Download AP Image from Controller Using HTTPS (CLI), on page 254 · Download AP Image from Controller Using HTTPS (GUI), on page 255 · Verifying Image Upgrade, on page 256 Efficient Image Upgrade Efficient Image upgrade is an efficient way of predownloading the image to the APs. It works similar to primary - subordinate model. An AP per model becomes the primary AP and downloads image from the controller through the WAN link. Once the primary AP has the downloaded image, the subordinate APs starts downloading the image from the primary AP. In this way, WAN latency is reduced. Primary AP selection is dynamic and random. A maximum of three subordinate APs per AP model can download the image from the primary AP. Note Do not enable this feature on controllers running Cisco IOS XE Amsterdam 17.3.x when there are Cisco Catalyst 9124AX and Cisco Catalyst 9130AX APs in the same group. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 247 Enable Pre-Download (GUI) System Upgrade Enable Pre-Download (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Wireless > Access Points. In the Access Points page, expand the All Access Points section and click the name of the AP to edit. In the Edit AP page, click the Advanced tab and from the AP Image Management section, click Predownload. Click Update & Apply to Device. Enable Pre-Download (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters the global configuration mode. Step 2 wireless profile flex flex-profile Example: Device(config)# wireless profile flex rr-xyz-flex-profile Configures a flex profile and enters the flex profile configuration mode. Step 3 predownload Example: Device(config-wireless-flex-profile)# predownload Enables predownload of the image. Step 4 end Example: Device(config-wireless-flex-profile)# end Exits the configuration mode and returns to privileged EXEC mode. Configuring a Site Tag (CLI) Follow the procedure given below to configure a site tag: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 248 System Upgrade Configuring a Site Tag (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless tag site site-name Example: Device(config)# wireless tag site rr-xyz-site Configures a site tag and enters site tag configuration mode. Step 3 flex-profile flex-profile-name Example: Device(config-site-tag)# flex-profile rr-xyz-flex-profile Configures a flex profile. Note You cannot remove the flex profile configuration from a site tag if local site is configured on the site tag. Note The no local-site command needs to be used to configure the Site Tag as Flexconnect, otherwise the Flex profile config does not take effect. Step 4 Step 5 Step 6 description site-tag-name Example: Device(config-site-tag)# description "default site tag" Adds a description for the site tag. end Example: Device(config-site-tag)# end Saves the configuration and exits configuration mode and returns to privileged EXEC mode. show wireless tag site summary (Optional) Displays the number of site tags. Example: Note Device# show wireless tag site summary To view detailed information about a site, use the show wireless tag site detailed site-tag-name command. Note The output of the show wireless loadbalance tag affinity wncd wncd-instance-number command displays default tag (site-tag) type, if both site tag and policy tag are not configured. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 249 Attaching Policy Tag and Site Tag to an AP (CLI) System Upgrade Attaching Policy Tag and Site Tag to an AP (CLI) Follow the procedure given below to attach a policy tag and a site tag to an AP: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap mac-address Example: Device(config)# ap F866.F267.7DFB Purpose Enters global configuration mode. Configures a Cisco AP and enters AP profile configuration mode. Note The mac-address should be a wired mac address. Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 policy-tag policy-tag-name Example: Device(config-ap-tag)# policy-tag rr-xyz-policy-tag Maps a policy tag to the AP. site-tag site-tag-name Example: Device(config-ap-tag)# site-tag rr-xyz-site Maps a site tag to the AP. rf-tag rf-tag-name Example: Device(config-ap-tag)# rf-tag rf-tag1 Associates the RF tag. end Example: Device(config-ap-tag)# end Saves the configuration, exits configuration mode, and returns to privileged EXEC mode. show ap tag summary Example: Device# show ap tag summary (Optional) Displays AP details and the tags associated to it. show ap name <ap-name> tag info Example: Device# show ap name ap-name tag info (Optional) Displays the AP name with tag information. show ap name <ap-name> tag detail Example: (Optional) Displays the AP name with tag detals. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 250 System Upgrade Trigger Predownload to a Site Tag Command or Action Purpose Device# show ap name ap-name tag detail Trigger Predownload to a Site Tag Follow the procedure given below to trigger image download to the APs: Procedure Step 1 Command or Action enable Example: Device> configure terminal Purpose Enters the privileged EXEC mode. Step 2 ap image predownload site-tag site-tag start Instructs the primary APs to start image Example: predownload. Device# ap image predownload site-tag rr-xyz-site start Step 3 show ap master list Example: Device# show ap master list Displays the list of primary APs per AP model per site tag. Step 4 show ap image Example: Device# show ap image Displays the predownloading state of primary and subordinate APs . Note To check if Flexefficient image upgrade is enabled in the AP, use the show capwap client rcb command on the AP console. The following sample outputs display the functioning of the Efficient Image Upgrade feature: The following output displays the primary AP. Device# show ap master list AP Name WTP Mac AP Model Site Tag ----------------------------------------------------------------------------------------- AP0896.AD9D.3124 f80b.cb20.2460 AIR-AP2802I-D-K9 ST1 The following output shows that the primary AP has started predownloading the image. Device# show ap image Total number of APs: 6 AP Name Primary Image Backup Image Predownload Status Predownload Version Next Retry Time Retry Count -------------------------------------------------------------------------------------------------------------------------- APE00E.DA99.687A 16.6.230.37 0.0.0.0 None 0.0.0.0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 251 Trigger Predownload to a Site Tag System Upgrade N/A AP188B.4500.4208 N/A AP188B.4500.4480 N/A AP188B.4500.5E28 N/A AP0896.AD9D.3124 0 AP2C33.1185.C4D0 N/A 0 16.6.230.37 0 16.6.230.37 0 16.6.230.37 0 16.6.230.37 0 16.6.230.37 0 8.4.100.0 None 0.0.0.0 None 16.4.230.35 None 8.4.100.0 Predownloading 8.4.100.0 None 0.0.0.0 0.0.0.0 0.0.0.0 16.6.230.36 0.0.0.0 The following output shows that the primary AP has completed predownload and the predownload has been initiated in the subordinate AP. Device# show ap image Total number of APs: 6 AP Name Primary Image Backup Image Predownload Status Predownload Version Next Retry Time Retry Count -------------------------------------------------------------------------------------------------------------------------- APE00E.DA99.687A 16.6.230.37 0.0.0.0 Initiated 16.6.230.36 N/A 0 AP188B.4500.4208 16.6.230.37 8.4.100.0 None 0.0.0.0 N/A 0 AP188B.4500.4480 16.6.230.37 0.0.0.0 None 0.0.0.0 N/A 0 AP188B.4500.5E28 16.6.230.37 16.4.230.35 None 0.0.0.0 N/A 0 AP0896.AD9D.3124 16.6.230.37 8.4.100.0 Complete 16.6.230.36 0 0 AP2C33.1185.C4D0 16.6.230.37 8.4.100.0 Initiated 16.6.230.36 0 0 The following output shows image status of a particular AP. Device# show ap name APe4aa.5dd1.99b0 image AP Name : APe4aa.5dd1.99b0 Primary Image : 16.6.230.46 Backup Image : 3.0.51.0 Predownload Status : None Predownload Version : 000.000.000.000 Next Retry Time : N/A Retry Count : 0 The following output shows predownload completion on all APs. Device# show ap image Total number of APs: 6 Number of APs Initiated :0 Predownloading :0 Completed predownloading : 3 Not Supported :0 Failed to Predownload :0 AP Name Primary Image Backup Image Predownload Status Predownload Version Next Retry Time Retry Count -------------------------------------------------------------------------------------------------------------------------- APE00E.DA99.687A 16.6.230.37 16.6.230.36 Complete 16.6.230.36 N/A 0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 252 System Upgrade Feature History for Out-of-Band AP Image Download AP188B.4500.4208 N/A AP188B.4500.4480 N/A AP188B.4500.5E28 N/A AP0896.AD9D.3124 0 AP2C33.1185.C4D0 0 16.6.230.37 0 16.6.230.37 0 16.6.230.37 0 16.6.230.37 0 16.6.230.37 0 8.4.100.0 None 0.0.0.0 None 16.4.230.35 None 16.6.230.36 Complete 16.6.230.36 Complete 0.0.0.0 0.0.0.0 0.0.0.0 16.6.230.36 16.6.230.36 Feature History for Out-of-Band AP Image Download This table provides release and related information for the feature explained in this module. This feature is available in all the releases subsequent to the one in which it is introduced in, unless noted otherwise. Table 17: Feature History for Out-of-Band AP Image Download Release Cisco IOS XE Dublin 17.11.1 Feature Out-of-Band AP Image Download Feature Information The AP image upgrade method is enhanced to make the upgrades faster and more flexible. Information About Out-of-Band AP Image Download In WLAN deployments, the APs gather their software image and configuration from the controller (in-band) during the join, predownload, and upgrade phases over the CAPWAP control path. This mechanism has limitations in the context of CAPWAP window size, processing of CAPWAP packets, and parallel image downloads. With image upgrade being a significant activity in the lifecycle of APs, upgrades become a time-consuming activity when the deployment size increases, especially for remote deployments, because the image always comes from the controller, irrespective of the deployment types. To make upgrades faster and more flexible, the AP image upgrade method is enhanced in Cisco IOS XE Dublin 17.11.1 release. An enhanced webserver (nginx) running on the controller helps the AP image downloads to be available out of the CAPWAP path (out of band). Note · HTTPS configuration done at the global level applies to all the APs joining the controller. · When AP image download over an Out-of-Band method fails, the download falls back to the CAPWAP method, as a result of which the APs will not be stranded. · AP image download over HTTPS may fail if the HTTPS server Trustpoint has a chain of CA certificates. · Before you downgrade from Cisco IOS XE Dublin 17.11.1 to an earlier version, ensure that the Out-of-Band AP Image Download feature is disabled, as it is not supported in previous releases. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 253 Restrictions for Out-of-Band AP Image Download System Upgrade Restrictions for Out-of-Band AP Image Download This feature is not supported on the following platforms: · Cisco Embedded Wireless Controller on Catalyst Access Points · Cisco Embedded Wireless Controller on Catalyst Switches · Cisco Wave 1 Access Points Download AP Image from Controller Using HTTPS (CLI) Before you begin · HTTPS configuration must be enabled. · The ngnix server must be running on the controller. Use the show platform software yang-management process command to check whether the ngnix server is running. · The custom-configured port must be reachable between the controller and the corresponding AP. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters the global configuration mode. Step 2 ap upgrade method https Configures the corresponding AP to download Example: the image over HTTPS from the controller if the AP supports out-of-band AP image Device(config)# ap upgrade method https download method. You can check whether the AP supports efficient download method using the show ap config general command. Use the no form of this command to disable out-of-band AP image download method. Step 3 ap file-transfer https port port_number Example: Device(config)# ap file-transfer https port 8445 Configures a custom port for image download from the nginx server running on the controller. For HTTPS port, the valid values range from 0 to 65535, with a default of 8443. You cannot use port 443 for AP file transfers because it is the default port used for other HTTPS requests. Also, avoid configuring standard and well-known ports because the configuration may fail. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 254 System Upgrade Download AP Image from Controller Using HTTPS (GUI) Command or Action Step 4 end Example: Device(config)# end Purpose By default, the Efficient AP image download feature uses port 8443 for HTTPS. If the same port is configured for HTTPS access for controller GUI, then GUI access will not work. In such instances, use a port number other than 8443 for controller GUI Access or configure a different port for AP file transfer over HTTPS instead of 8443. The port 8443 is customazible. A sample config is given below: Source= wireless controller Destination= Access Point Protocol=HTTPS Destination Port=8443 Source Port=any Description= "Out of Band AP Image Download" Returns to privileged EXEC mode. Download AP Image from Controller Using HTTPS (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Wireless > Wireless Global. In the AP Image Upgrade section, enable the HTTPS Method to allow image download on APs from the controller, over HTTPS. This out-of-band file transfer is an efficient method for AP image upgrade. Note The AP should support out-of-band image download. You can verify this in the Configuration > Wireless > Access Points window. Select the AP, and in the Edit AP > Advanced tab, view the details of the support in the AP Image Management section. Enter the HTTPS Port to designate AP file transfers on that port. Valid values range from 0 to 65535, with the default being 8443. Note that you cannot use port 443 for AP file transfers because that is the default port for other HTTPS requests. By default, the Efficient AP image download feature uses port 8443 for HTTPS. If the same port is configured for HTTPS access for controller GUI, then GUI access will not work. In such instances, use a port number other than 8443 for controller GUI Access or configure a different port for AP file transfer over HTTPS instead of 8443. Click Apply to Device to save the configuration. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 255 Verifying Image Upgrade System Upgrade Verifying Image Upgrade To check whether an AP supports efficient download method, use the following command: Device# show ap config general Cisco AP Name : AP002C.C862.E880 ================================================= Cisco AP Identifier : 002c.c88b.0300 Country Code : Multiple Countries : IN,US Regulatory Domain Allowed by Country : 802.11bg:-A 802.11a:-ABDN AP Country Code : US - United States AP Regulatory Domain 802.11bg : -A AP Upgrade Out-Of-Band Capability : Enabled AP statistics : Disabled To view the AP image download statistics, use the following command. Use the show ap image command to see the detailed output. Device# show ap image summary Total number of APs : 1 Number of APs Initiated Downloading Predownloading Completed downloading Completed predownloading Not Supported Failed to Predownload Predownload in progress :0 :0 :0 :0 :0 :0 :0 : No To view the method used to download the AP image, use the following command: Device# show wireless stats ap image-download AP image download info for last attempt AP Name Count ImageSize StartTime EndTime Diff(secs) Predownload Aborted Method ----------------------------------------------------------------------------------------------------- mysore1 1 40509440 08/23/21 22:17:59 08/23/21 22:19:06 67 No No CAPWAP To view the method used to download the AP image, use the following command: Device# show ap upgrade method AP upgrade method HTTPS : Disabled To view the port used for the AP image transfer, use the following command: Device# show ap file-transfer https summary Configured port Operational port : 8443 : 8443 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 256 System Upgrade Verifying Image Upgrade !If different ports are shown under 'Configured port' and 'Operations port' !that means custom port configuration has failed and is continuing with the previous port. !The failure reason could be the input port, which is a well-known port and already in use. To view the whether an AP supports image download over HTTPS, use the following command: Device# show ap name AP2800 config general | sec Upgrade AP Upgrade Out-Of-Band Capability : Enabled To view the detailed output an AP's pre-image, use the following command: Device# show ap image Total number of APs : 2 Number of APs Initiated :0 Downloading :0 Predownloading :0 Completed downloading :2 Completed predownloading : 0 Not Supported :0 Failed to Predownload :0 Predownload in progress : No AP Name Primary Image Backup Image Predownload Status Predownload Version Next Retry Time Retry Count Method -------------------------------------------------------------------------------------------------------------------- AP_3800_1 17.11.0.69 17.11.0.71 None 0.0.0.0 N/A 0 HTTPS AP2800 17.11.0.69 17.11.0.71 None 0.0.0.0 N/A 0 HTTPS !The 'method' column indicates the download method used by the AP. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 257 Verifying Image Upgrade System Upgrade Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 258 1 6 C H A P T E R Predownloading an Image to an Access Point · Information About Predownloading an Image to an Access Point, on page 259 · Restrictions for Predownloading an Image to an Access Point, on page 259 · Predownloading an Image to Access Points (CLI), on page 260 · Predownloading an Image to Access Points (GUI), on page 262 · Predownloading an Image to Access Points (YANG), on page 263 · Monitoring the Access Point Predownload Process, on page 263 · Information About AP Image Download Time Enhancement (OEAP or Teleworker Only), on page 264 · Configuring AP Image Download Time Enhancement (GUI), on page 265 · Configuring AP Image Download Time Enhancement (CLI), on page 266 · Verifying AP Image Download Time Enhancement Configuration, on page 266 Information About Predownloading an Image to an Access Point To minimize network outages, download an upgrade image to an access point from the device without resetting the access point or losing network connectivity. Previously, you could download an upgrade image to the device and reset it, causing the access point to go into discovery mode. After the access point discovered the controller with the new image, the access point would download the new image, reset it, go into discovery mode, and rejoin the device. You can now download the upgrade image to the controller. When the controller is up with the upgrade image, the AP joins the controller and moves to Registered state, because the AP image has been predownloaded to the AP. Restrictions for Predownloading an Image to an Access Point The following are the restrictions for predownloading an image to an access point: · The maximum number of concurrent predownloads are limited to 100 per wncd instance (25 for 9800-L) in the controller. However, the predownloads are triggered in sets of 16 per wncd instance at the start, and is repeated every 60 seconds. · Access points with 16-MB total available memory may not have enough free memory to download an upgrade image and may automatically delete crash information files, radio files, and backup images, if any, to free up space. However, this limitation does not affect the predownload process because the predownload image replaces backup image, if any, on the access point. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 259 Predownloading an Image to Access Points (CLI) System Upgrade · All of the primary, secondary, and tertiary controllers should run the same images. Otherwise, the feature will not be effective. · At the time of reset, you must make sure that all of the access points have downloaded the image. · An access point can store only 2 software images. · The Cisco Wave 1 APs may download the image twice while moving from Cisco AireOS Release 8.3 to Cisco IOS XE Gibraltar 16.10.1. This increases the AP downtime during migration. · The show ap image command displays cumulative statistics regarding the AP images in the controller. We recommend that you clear the statistics using the clear ap predownload statistics command, before using the show ap image command, to ensure that correct data is displayed. · Cisco Catalyst 9800-CL Wireless Controller supports only self-signed certificates and does not support Cisco certificates. When you move the access points between Cisco Catalyst 9800-CL Wireless Controllers, and if the AP join failure occurs on the Cisco Catalyst 9800-CL controller, execute the capwap ap erase all command to remove the hash string stored on the APs. · During AP image pre-download, the WNCD CPU may rise to 99 percent, which is normal and doesn't cause a crash or client or AP disconnect problems. Predownloading an Image to Access Points (CLI) Before you begin There are some prerequisites that you must keep in mind while predownloading an image to an access point: · Predownloading can be done only when the device is booted in the install mode. Note Predownload of the AP image is based on the AP model rather than the image type. Predownload is allowed only when the model exists in the new capability XML file. Also, with appropriate modification of the capability XML, the controller can override the existing AP image for a particular model. · You can copy the new image either from the TFTP server, flash image, or USB. · If the latest upgrade image is already present in the AP, predownload will not be triggered. Check whether the primary and backup image versions are the same as the upgrade image, using the show ap image command. · The show ap image command displays cumulative statistics regarding the AP images in the controller. We recommend that you clear the statistics using the clear ap predownload statistics command, before using the show ap image command, to ensure that correct data is displayed. · AP continues to be in predownloading state, if AP flaps post SSO during AP predownload. We recommended that you issue the ap image predownload abort command and then the clear ap predownload stats command only then the predownload can be intiated again. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 260 System Upgrade Predownloading an Image to Access Points (CLI) Procedure Step 1 Command or Action install add file bootflash:file-name Example: Device# install add file bootflash:image.bin Purpose The controller software image is added to the flash and expanded. Step 2 ap image predownload or ap name ap-name Downloads the new image to all the access image predownload points or a specific access point connected to Example: the device. Device# ap image predownload Device# ap name ap1 image predownload Step 3 show ap image Example: Device# show ap image Verifies the access point's predownload status. This command initially displays the status as Predownloading and then moves to Completed, when download is complete. Step 4 show ap name ap-name image Example: Device# show ap name ap1 image Provides image details of a particular AP. Step 5 ap image swap orap name ap-name image swap orap image swap completed Example: Device# ap image swap Swaps the images of the APs that have completed predownload. Note You can swap the AP images using ap image swap command even without pre-downloading a new image to the AP and there are no restrictions or prerequisites to swap the image. Step 6 ap image reset orap name ap-name reset Example: Device# ap image reset Resets the access points. Note To ensure that the APs do not rollback to the old image, proceed to the next steps quickly. If there is a large time gap between this step and the next one, the APs will rejoin the controller which is still running the previous software version (possibly downloading the software again and delaying the upgrade). Step 7 install activate Example: Device# install activate Runs compatibility checks, installs the package, and updates the package status details. For a restartable package, the command triggers the appropriate post-install scripts to restart the Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 261 Predownloading an Image to Access Points (GUI) System Upgrade Command or Action Step 8 install commit Example: Device# install commit Purpose necessary processes, and for non-restartable packages it triggers a reload. Note This step reloads the complete controller stack (both primary and secondary controllers, if HA is used). Commits the activation changes to be persistent across reloads. The commit can be done after activation while the system is up, or after the first reload. If the package is activated but not committed, it remains active after the first reload, but not after the second reload. Predownloading an Image to Access Points (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Administration > Software Management and click the Software Upgrade tab. Note that you must be in the Install Mode to continue with the following steps. Select the Transport Type, File System and File Path of your choice to from receive the file. Select the AP Image Predownload check box. If you already have an inactive image file on your device, a dialog box prompts you to remove the unused image and proceed with the latest image download. Click Download & Install. This initiates the upgrade process and you can view and verify the predownload progress in the Status dialog box. You can also check the progress log by clicking on Show Logs icon. Click the Save Configuration & Activate button after the predownload operation is successful. Click Yes to confirm the activate operation. This operation runs compatibility checks, installs the package, and updates the package status details. The device reloads after a successful activation. If there are uncommitted files, you are prompted to remove those. Click the Commit button to complete the upgrade processs. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 262 System Upgrade Predownloading an Image to Access Points (YANG) Predownloading an Image to Access Points (YANG) YANG can be used with NETCONF and RESTCONF to provide the desired solution of automated and programmable network operations. The following RPC is used for Predownloading an Image to an Access Point: <rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="101"> <set-rad-predownload-all xmlns="http://cisco.com/ns/yang/Cisco-IOS-XE-wireless-access-point-cmd-rpc"> <uuid>12312341231234</uuid> </set-rad-predownload-all> </rpc> For more information on the YANG models, see the Cisco IOS XE Programmability Configuration Guide and YANG Data Models on Github at https://github.com/YangModels/yang/tree/master/vendor/cisco/xe. You can contact the Developer Support Community for NETCONF/YANG features using the following link: https://developer.cisco.com/ Monitoring the Access Point Predownload Process This section describes the commands that you can use to monitor the access point predownload process. While downloading an access point predownload image, enter the show ap image command to verify the predownload progress on the corresponding access point: Device# show ap image Total number of APs : 1 Number of APs Initiated :1 Predownloading :1 Completed predownloading : 0 Not Supported :0 Failed to Predownload :0 AP Name Primary Image Backup Image Predownload Status Predownload Ver... Next Retry Time Retry Count ------------------------------------------------------------------------------------------------------------------------------------------ AP1 10.0.1.66 10.0.1.66 Predownloading 10.0.1.67 NA 0 Device# show ap image Total number of APs : 1 Number of APs Initiated :1 Predownloading :0 Completed predownloading : 1 Not Supported :0 Failed to Predownload :0 AP Name Primary Image Backup Image Predownload Ver... Next Retry Time Retry Count Predownload Status Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 263 Information About AP Image Download Time Enhancement (OEAP or Teleworker Only) System Upgrade ------------------------------------------------------------------------------------------------------------------------------------------ AP1 10.0.1.66 10.0.1.67 Complete 10.0.1.67 NA 0 Use the following command to view the image details of a particular AP: Device# show ap name APe4aa.5dd1.99b0 image AP Name : APe4aa.5dd1.99b0 Primary Image : 16.6.230.46 Backup Image : 3.0.51.0 Predownload Status : None Predownload Version : 000.000.000.000 Next Retry Time : N/A Retry Count : 0 Information About AP Image Download Time Enhancement (OEAP or Teleworker Only) The wireless controller and the access point (AP) communicate with each other using CAPWAP. The CAPWAP has two channels, namely control and data. The control channel is used to send configuration messages, download images and client keys, or the context to the AP. The control channel has a single window in the current implementation. A single window means that every message that is sent from the controller has to be acknowledged by the AP. The next control packet is not transmitted till the earlier one is acknowledged by the AP. The AP Image Download Time Enhancement feature adds support to multiple sliding windows for control packets going from controller to AP. The sliding window can be set to N (static) instead of a single window. The request queue size is decided based on the maximum window size the AP supports. Table 18: Recommended Window Size Link Bandwidth6 Less than 200 ms Greater than 200 ms RTT RTT More than 20 Mbps 10 15 Between 5 and 20 10 15 Mbps Between 1 and 5 Mbps 5 10 Less than 1 Mbps 3 5 6 The window size recommendation provided in the table is for packet loss of less than one percent (< 1%). If the network supporting the CAPWAP link has packet loss of more than one percent (> 1%), use a smaller value for window size. For good links with round-trip time (RTT) of about 100ms and packet drops of less than half a percent (< 0.5%), use a window size of up to 20 for better performance. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 264 System Upgrade Configuring AP Image Download Time Enhancement (GUI) Note · The window size can be changed only during the AP join process. · All image upgrades should be in the install mode for faster upgrade. Image upgrade should be done from the one-shot command to include OEAP predownload. · Configure the window size only for AP profiles that are exclusively used for Teleworker or Office Extend Access Points (OEAP). · An AP reload is not required after disabling this feature. · This feature is supported only on the OEAP profiles. · GUI does not support AP predownload. Therefore, the AP downloads after disjoining the controller during CAPWAP join phase. This causes a long disruption in the network as the Image download for AP can take upto one hour. Important If you downgrade the software to Cisco IOS XE Gibraltar 16.12.4 or earlier from Cisco IOS XE Amsterdam 17.3.1, you should reset the CAPWAP multi window to a single window prior to the downgrade. Failure to do so necessitates a manual AP recovery. High-Level Workflow of AP Image Download Time Enhancement 1. Select an existing AP join profile or create a new one. 2. Set the CAPWAP window size. 3. Associate the AP join profile to an existing site tag or new one. 4. Apply the site tag to the AP using: Static, Filter, Location, AP, or Default mapping method. Configuring AP Image Download Time Enhancement (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Tags & Profiles > AP Join > CAPWAP > Advanced. In the CAPWAP Window Size field, enter the unit of measurement of the window. Click Save & Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 265 Configuring AP Image Download Time Enhancement (CLI) System Upgrade Configuring AP Image Download Time Enhancement (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters the global configuration mode. Step 2 ap-profile ap-profile Example: Device(config)# ap profile capwap_multiwindow Configures an AP profile. Step 3 capwap window size window-size Configures the AP CAPWAP control packet Example: transmit queue size. Device(config-ap-profile)# capwap window Note size 20 Configure the window size only for AP profiles that are exclusively used for teleworker or OEAP. Be aware that any change in window size may impact other APs. Step 4 end Example: Device(config-ap-profile)# end Returns to privileged EXEC mode. Verifying AP Image Download Time Enhancement Configuration To view the CAPWAP window size present in an AP profile, use the following command: Device# show ap profile name default-ap-profile detailed | in wind Capwap window size : 10 To view the CAPWAP status and modes, use the following command: Device# show capwap client rcb OperationState Name MwarHwVer Location ApMode ApSubMode CAPWAP Path MTU : UP : AP4001.7A39.2D5A : 0.0.0.0 : default location : Remote Bridge : Not Configured : 1485 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 266 System Upgrade Verifying AP Image Download Time Enhancement Configuration Software Initiated Reload Reason CAPWAP Sliding Window Active Window Size Last Request Send To Application Expected Seq Num Received Seq Num Request Packet Count Out Of Range Packets Count Window Moved Packets Count In Range Packets Count Expected Packets Count : Reload command : 10 : 184 : 185 : 184 : 42424 :0 :0 : 960 : 41464 To view the AP configration details, including the CAPWAP window size, use the following command: Device# show ap config general | in Wind Capwap Active Window Size Capwap Active Window Size Capwap Active Window Size :5 : 10 :1 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 267 Verifying AP Image Download Time Enhancement Configuration System Upgrade Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 268 1 7 C H A P T E R N+1 Hitless Rolling AP Upgrade · N+1 Hitless Rolling AP Upgrade, on page 269 · Configuring Hitless Upgrade, on page 270 · Verifying Hitless Upgrade, on page 271 · Feature History for Site-Based Rolling AP Upgrade in N+1 Networks, on page 272 · Information About Site-Based Rolling AP Upgrade in N+1 Network, on page 272 · Prerequisites for Site-Based Rolling AP Upgrade in N+1 Networks, on page 272 · Restrictions for Site-Based Rolling AP Upgrade in N+1 Networks, on page 273 · Use Cases, on page 273 · N+1 Upgrade and Move to Destination Controller, on page 273 · N+1 Move to Destination Controller, on page 275 · Hitless Software Upgrade (N+1 Upgrade), on page 276 · Verifying Site-based Rolling AP Upgrade in a N+1 Network, on page 278 · Information About Client Steering Enhancement, on page 283 · Deauthenticate Clients, on page 284 N+1 Hitless Rolling AP Upgrade The existing CAPWAP implementation on the Cisco Catalyst 9800 Series Wireless Controller requires that the controller and all its associated APs have the same software version. It is possible to upgrade a set of APs using the N+1 Hitless Rolling AP Upgrade feature. However, all the APs cannot be upgraded at the same time without network downtime. You can upgrade wireless networks without network downtime when the same version skew is supported between the controller and the APs. This enables the APs to be upgraded in a staggered manner, while still being connected to the same controller. The version skew method can avoid upgrade downtime even for N+1 networks by using N+1 Hitless Rolling AP Upgrade feature and a spare controller. The following is the workflow for the N+1 Hitless Rolling AP Upgrade feature: 1. Establish a mobility tunnel from the controller (WLC1) to a mobility member (WLC2). 2. Upgrade the controller software (WLC1) using the command install add file bootflash:new_version.bin . 3. Optionally, you can also upgrade the AP image. For more information, see Predownloading an Image to an Access Point chapter. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 269 Configuring Hitless Upgrade System Upgrade 4. Use the ap image upgrade destination controller-name controller-ip report-name privileged EXEC command to upgrade and move all the APs from WLC1 (source) to WLC2 (destination). 5. Activate the new image in WLC1 using the install activate command. 6. Commit the changes using the install commit command. 7. Move the APs back to WLC1 from WLC2 using the ap image move destination controller-name controller-ip report-name command. Note The ap image upgrade destination command does not work without an image pre-download. If you do not perform an image pre-download, use the ap image move command to move the APs. When APs download the image and join the destination controller, you must set the iteration time as high. Also, you can customise the iteration time by configuring the ap upgrade staggered iteration timeout command. Configuring Hitless Upgrade Follow the procedure given below to achieve a zero downtime network upgrade in an N+1 deployment. Before you begin · Ensure that the hostname and wireless management IP of the destination controller is provided in the privileged EXEC command. · Ensure that access points are predownloaded with the image running on the destination controller. Procedure Step 1 Command or Action Purpose ap image upgrade destination wlc-name Moves APs to the specified destination wlc-ip controller with the swap and reset command. Example: After this, the parent controller activates new image, and reloads with the new image. After Device# ap image upgrade destination wlc2 the mobility tunnel comes up, APs are moved 10.7.8.9 back to the parent controller without a swap and reset. Note Ensure that you establish a mobility tunnel from controller (WLC1) to a mobility member (WLC2) before image upgrade. Step 2 ap image upgrade destination wlc-name (Optional) Moves APs to the specified wlc-ip destination controller with a swap and reset Example: command. Device# ap image upgrade destination wlc2 Note 10.7.8.9 Perform Steps 2 to 4 only if you are not performing Step 1. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 270 System Upgrade Verifying Hitless Upgrade Step 3 Step 4 Step 5 Command or Action Purpose ap image move destination wlc-name wlc-ip Move the APs back to the parent controller. Example: Device# ap image move destination wlc1 10.7.8.6 ap image upgrade destination wlc-name (Optional) Moves APs to the specified wlc-ip [fallback] destination controller with a swap and reset Example: command. After that, APs are moved back to the parent controller (without a swap and reset) Device# ap image upgrade destination wlc2 after manual install activate of the new image 10.7.8.9 fallback and reloading of the parent controller. ap image upgrade destination wlc-name (Optional) Moves APs to the specified wlc-ip [reset] destination controller with a swap and reset Example: command. After this, the parent controller activates the new image and reloads with the Device# ap image upgrade destination wlc2 new image. 10.7.8.9 reset Verifying Hitless Upgrade Use the following show commands to verify hitless upgrade. To view all the upgrade report names, use the following command: Device# show ap upgrade summary Report Name Start time ------------------------------------------------------------------------------------------ AP_upgrade_from_VIGK_CSR_2042018171639 05/20/2018 17:16:39 UTC To view AP upgrade information based on the upgrade report name, use the following command: Device# show ap upgrade name test-report AP upgrade is complete From version: 16.10.1.4 To version: 16.10.1.4 Started at: 05/20/2018 17:16:39 UTC Percentage complete: 100 End time: 05/20/2018 17:25:39 UTC Progress Report --------------Iterations ---------Iteration Start time End time AP count -----------------------------------------------------------------------------------------------0 05/20/2018 17:16:39 UTC 05/20/2018 17:16:39 UTC 0 1 05/20/2018 17:16:39 UTC 05/20/2018 17:25:39 UTC 1 Upgraded -------Number of APs: 1 AP Name Ethernet MAC Iteration Status --------------------------------------------------------------------------------------AP-SIDD-CLICK 70db.9848.8f60 1 Joined Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 271 Feature History for Site-Based Rolling AP Upgrade in N+1 Networks System Upgrade In Progress ----------Number of APs: 0 AP Name Ethernet MAC ------------------------------------------------Remaining --------Number of APs: 0 AP Name Ethernet MAC ------------------------------------------------- Feature History for Site-Based Rolling AP Upgrade in N+1 Networks This table provides release and related information for the features explained in this module. These features are available in all releases subsequent to the one they were introduced in, unless noted otherwise. Table 19: Feature History for Site-Based Rolling AP Upgrade in N+1 Networks Release Cisco IOS XE 17.9.1 Feature Feature Information Site-Based Rolling AP Upgrade in This feature helps to achieve a zero N+1 Network downtime network upgrade in N+1 networks. Information About Site-Based Rolling AP Upgrade in N+1 Network The Site-Based Rolling AP Upgrade in an N+1 Network feature allows you to perform a staggered upgrade of APs in each site in an N+1 deployment. This feature helps you to effectively achieve a zero-downtime network upgrade in an N+1 network. The existing site filter functionality allows you to perform a software upgrade of a site or all the sites managed by the controller. In a typical scenario, the software of the APs belonging to a site is upgraded and the network is monitored to see whether it is functioning as intended, before adding more sites to the site filter. If the upgrade fails to meet the objectives, all the sites in the site filter can be removed using the ap image site-filter file any-image remove-all command. The ap image site-filter command is modified to include the any-image keyword as a substitute for the image file name to support the N+1 AP move site filter. Prerequisites for Site-Based Rolling AP Upgrade in N+1 Networks · The source and destination controllers should be in the same mobility group (preferably running the latest image) but with different AP image versions. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 272 System Upgrade Restrictions for Site-Based Rolling AP Upgrade in N+1 Networks · Image of the destination controller should be available on the source controller. · Both the source and destination controllers should be in INSTALL mode. Restrictions for Site-Based Rolling AP Upgrade in N+1 Networks · Site filter operations are supported only for N+1 upgrade and N+1 move; fallback and reset options of the ap image upgrade destination command are not supported. · APs can only move across the controllers having the same software. · The any and remove-all keywords of the ap image site-filter command work only for the N+1 AP upgrade or move. It will not work for other site filter operations such as AP Model Service Pack (APSP) or AP Device Package (APDP). · A reboot of the source or the destination controller during the N+1 upgrade requires a re-execution of the procedure. Use Cases The N+1 deployments are more common compared to 1+1 redundancy deployments. In the N+1 deployments, spare controllers are used and APs can fail over to it whenever their primary controller goes down. For local mode networks, this results in a small network downtime (30 to 40 seconds), during which APs re-discover and re-join the network. However, during network upgrades, the downtime is much longer, and all the devices have to reboot and converge. The feature can effectively provide a zero-downtime network upgrade in an N+1 deployment. N+1 Upgrade and Move to Destination Controller Note · Run all the commands only on the source controller. · By default, the Rolling AP Upgrade feature sends a basic service set (BSS) transition message to 11v clients to notify them that the AP they are connected to is going down, along with a list of alternate APs. In scenarios where clients are sensitive to roaming, this feature can cause unnecessary packet drops. In such instances, you can disable the 11v message using the no ap upgrade staggered client-steering command. Before you begin See the Prerequisites for Site-based Rolling AP Upgrade in an N+1 Network section. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 273 N+1 Upgrade and Move to Destination Controller System Upgrade Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. no ap upgrade staggered client-steering Example: Device# no ap upgrade staggered client-steering (Optional) Disables client steering. ap upgrade staggered iteration completion (Optional) Configures the minimum percentage min-percent of APs that must join the destination controller Example: to signal iteration completion. Device(config)# ap upgrade staggered iteration completion 50 ap upgrade staggered iteration error action (Optional) Configures the action to be taken stop when APs are missing after an iteration during Example: AP upgrade. Device(config)# ap upgrade staggered iteration error action stop ap upgrade staggered iteration timeout timeout-duration Example: Device(config)# ap upgrade staggered iteration timeout 18 (Optional) Configures the maximum time allowed per iteration during AP upgrade. Valid values range from 9 to 60. exit Example: Device(config)# exit Returns to privileged EXEC mode. ap image site-filter any-image add site-tag Adds a site tag to a site filter. Example: You can repeat this step to set up a multisite Device# ap image site-filter any-image filter. add site1 ap image move destination controller-name Moves the APs to a different controller in the controller-ip mobility group. Example: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 274 System Upgrade N+1 Move to Destination Controller Step 9 Step 10 Step 11 Step 12 Command or Action Device# ap image move destination controller2 10.9.34.4 Purpose Note It is preferable to move the APs to a different controller running the same image. Wait for the upgrade to complete. If upgrade is not completed successfully, you can use the ap image upgrade destination or ap image move destination commands to restart the upgrade process. ap image site-filter any-image add site-tag Adds additional site tag to a site filter. Example: Device# ap image site-filter file any-image add site2 ap image site-filter any-image apply Example: Device# ap image site-filter file any-image apply Predownloads the image and upgrades the APs based on the site filter. Note Wait for the upgrade to complete. ap image site-filter any-image clear Example: Device# ap image site-filter file any-image clear (Optional) Clears the site filter table and predownloads the image and does a rolling AP upgrade to all the sites. ap image site-filter file any-image remove-all Example: Device# ap image site-filter file any-image remove-all (Optional) Removes all the site filters. N+1 Move to Destination Controller Note Run all the commands only on the source controller. Before you begin See the Prerequisites for Site-based Rolling AP Upgrade in an N+1 Network section. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 275 Hitless Software Upgrade (N+1 Upgrade) System Upgrade Procedure Step 1 Command or Action Purpose ap image site-filter any-image add site-tag Adds a site tag to a site filter. Example: Device# ap image site-filter any-image add site1 Step 2 ap image move destination image-name controller-ip Example: Device# ap image move destination controller2 10.9.34.2 Moves the APs back to the parent controller. Note Wait for the upgrade to complete. Step 3 ap image site-filter any-image add site-tag Adds an additional site tag to a site filter. Example: Device# ap image site-filter any-image add site2 Step 4 ap image site-filter any-image apply Upgrades the APs based on the site filter. Example: Note Wait for the upgrade to complete. Device# ap image site-filter any-image apply If upgrade is not completed successfully, use the ap image upgrade destination or ap image move destination command to restart the upgrade process. Step 5 ap image site-filter any-image clear Example: Device# ap image site-filter any-image clear (Optional) Clears the site filter table and predownloads the image and does a rolling AP upgrade to all the sites where it is not active. Hitless Software Upgrade (N+1 Upgrade) Hitless software upgrade uses the concept of N+1 high availability using a spare controller to upgrade the CAPWAP infrastructure comprising controllers and access points (AP). Depending on what you choose, the APs are upgraded in a staggered fashion, per site, or on all sites , using the Rolling AP upgrade feature thereby avoiding network disruption. This ensures that the clients are serviced by the neighboring APs while one or the selected APs undergo the upgrade process. The upgrade workflow is as follows : 1. Initiate upgrade on the source controller. You can choose to upgrade all sites or per site based on your preference. 2. Move the APs to the destination controller. APs are upgraded in a staggered fashion using the rolling AP upgrade algorithm. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 276 System Upgrade Hitless Software Upgrade (N+1 Upgrade) Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 3. Once all the APs move to the destination controller in multiple iterations, activate the target image on the source controller. 4. The source controller reloads for the new image to take effect. 5. (Optional) Move the APs back to the source controller using the cli commands. Before you begin · The controller should be in INSTALL mode. · The controller should be paired with another controller and both should be part of the same mobility group. The spare controller should be upgraded with the target image. Procedure Choose Administration > Software Management . From the Software Upgrade tab check the One-Shot Install Upgrade checkbox. From the Transport Type drop-down list, choose an option. a) If you choose My Desktop as the transport type, click Select File to navigate to the file from the Source File Path field. b) If you choose SFTP as the transport type, enter the source IP address, SFTP username, SFTP password, file path, and select the destination. c) If you choose FTP as the transport type, enter the source IP address, FTP username, FTP password, file path, and select the destination. d) If you choose TFTP as the transport type, enter the source IP address, file path, and select the destination. Note In controllers, the IP TFTP source is mapped to the service port by default. e) If you choose Device as the transport type, choose the file system and file path. Note In the File Path field, enter the complete path from where you want to download the software image file, including the name of the file. Check the Enable Hitless Upgrade check box to allow the APs and the controller to be upgraded. From the Site Filter drop-down list, choose All Sites or one or more Custom Sites. In case you choose to upgrade for All Sites, you can optionally enable Fallback after Upgrade so that the APs move back to the parent controller after the new image has been activated and the parent controller has reloaded. In case you choose a Custom Site, select the site from the Site Tags drop-down list. In this case, the APs do not move back to the parent controller automatically and you will have to manually move them using CLIs. In the Controller IP Address (IPv4/IPv6) field, enter the source controller's IPv4/IPv6 address. In the Controller Name field, enter the source controller's name. In the AP Upgrade Configuration section, use the AP Upgrade per Iteration drop-down list to select the percentage of APs to be upgraded per iteration. This configures the minimum percentage of APs that must join the destination controller to signal completion of iteration. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 277 Verifying Site-based Rolling AP Upgrade in a N+1 Network System Upgrade Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Step 15 Check the Client Steering check box to move clients attached to APs undergoing an upgrade to other APs. If the clients still persist on the candidate APs, they are disconnected and the APs will reload with the new image. In the Accounting Percentage field, choose the percentage of APs that should join the destination controller after each iteration (of the staggered AP upgrade) to consider the iteration as successful. The default value is 90%. Tap to select the type of Accounting Action to configure for the APs. If you enable Terminate, the upgrade is terminated if the configured percentage of APs does not join the mobility peer, and a notification is sent via Syslog message. If you choose Ignore, the upgrade continues irrespective of whether the configured percentage of APs are joining the controller or not. In the Iteration Expiry field, select the number of minutes from the drop-down list to configure the expiry time for each iteration. Click Download & Install. Click Save Configuration & Activate. Click Commit to make the activation changes persistent across reloads. Verifying Site-based Rolling AP Upgrade in a N+1 Network Use the following show commands to check the progress of the upgrade and debugging: · show ap summary · show ap tag summary · show ap status · show wireless mobility summary · show ap image · show ap upgrade · show ap upgrade site · show ap upgrade site summary · show ap upgrade name report-name · show wireless mobility ap-list To view the summary of all the connected Cisco APs, use the following command: Device# show ap summary Number of APs: 8 AP Name Slots AP Model Ethernet MAC Radio MAC Location Country IP Address State ------------------------------------------------------------------------------------------------------------------------------------- AP00D7.8F9A.43DE 2 AIR-AP2802I-D-K9 00d7.8f9a.43de 002c.c8df.3ca0 default location IN 10.9.48.254 Registered AP4C77.6D21.9098 2 AIR-AP2802E-N-K9 4c77.6d21.9098 00be.7573.b340 default location IN 10.10.10.52 Registered AP00F2.8B27.BB2C 2 AIR-AP2802I-D-K9 00f2.8b27.bb2c 0896.ad9b.f9e0 default Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 278 System Upgrade Verifying Site-based Rolling AP Upgrade in a N+1 Network location IN APA023.9F41.5A38 location IN AP00A3.8E4A.762C location IN AP40CE.2485.D616 location IN AP40CE.2485.D62C location IN AP2C57.4188.4BC4 location IN 10.9.44.51 Registered 2 AIR-AP2802I-D-K9 10.10.10.51 Registered 2 AIR-AP2802I-D-K9 10.9.48.54 Registered 2 AIR-AP3802I-D-K9 10.9.50.42 Registered 2 AIR-AP3802I-D-K9 10.10.10.53 Registered 3 C9130AXE-D 10.9.34.207 Registered a023.9f41.5a38 00a3.8e4a.762c 40ce.2485.d616 40ce.2485.d62c 2c57.4188.4bc4 1880.90f4.7b00 1880.90f5.14e0 4001.7aca.5960 4001.7aca.5aa0 cc7f.75a8.78e0 default default default default default To view the summary of all the access points with policy tags, use the following command: Device# show ap tag summary Number of APs: 8 AP Name AP Mac Site Tag Name Policy Tag Name RF Tag Name Misconfigured Tag Source ---------------------------------------------------------------------------------------------------------------------------- AP00D7.8F9A.43DE 00d7.8f9a.43de site3 default-policy-tag default-rf-tag No Static AP4C77.6D21.9098 4c77.6d21.9098 site3 default-policy-tag default-rf-tag No Static AP00F2.8B27.BB2C 00f2.8b27.bb2c site3 default-policy-tag default-rf-tag No Static APA023.9F41.5A38 a023.9f41.5a38 default-site-tag default-policy-tag default-rf-tag No Default AP00A3.8E4A.762C 00a3.8e4a.762c site1 default-policy-tag default-rf-tag No Static AP40CE.2485.D616 40ce.2485.d616 site2 default-policy-tag default-rf-tag No Static AP40CE.2485.D62C 40ce.2485.d62c site2 default-policy-tag default-rf-tag No Static AP2C57.4188.4BC4 2c57.4188.4bc4 default-site-tag default-policy-tag default-rf-tag No Default To view the status of the access points, use the following command: Device# show ap status AP Name Status Mode Country ------------------------------------------------------------------------- AP00A3.8E4A.762C Enabled Local IN AP00D7.8F9A.43DE Enabled Monitor IN AP00F2.8B27.BB2C Enabled Local IN AP2C57.4188.4BC4 Enabled Local IN AP40CE.2485.D616 Enabled Local IN AP40CE.2485.D62C Enabled Local IN AP4C77.6D21.9098 Enabled Local IN APA023.9F41.5A38 Enabled Local IN To display the summary of the mobility manager, use the following command: Device# show wireless mobility summary Mobility Summary Wireless Management VLAN: 34 Wireless Management IP Address: 10.9.34.5 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 279 Verifying Site-based Rolling AP Upgrade in a N+1 Network System Upgrade Wireless Management IPv6 Address: Mobility Control Message DSCP Value: 48 Mobility High Cipher : False Mobility DTLS Supported Ciphers: TLS_ECDHE_RSA_AES128_GCM_SHA256, TLS_RSA_AES256_GCM_SHA384, TLS_RSA_AES128_CBC_SHA Mobility Keepalive Interval/Count: 10/3 Mobility Group Name: mobility-1 Mobility Multicast Ipv4 address: 10.0.0.1 Mobility Multicast Ipv6 address: :: Mobility MAC Address: 001e.14a5.b3ff Mobility Domain Identifier: 0x39ab Controllers configured in the Mobility Domain: IP Public Ip MAC Address Group Name Multicast IPv4 Multicast IPv6 Status PMTU --------------------------------------------------------------------------------------------- 10.9.34.5 N/A 001e.14a5.b3ff mobility-1 0.0.0.0 :: N/A N/A 10.9.34.2 10.9.34.2 001e.bd2d.f2ff mobility-1 0.0.0.0 :: Up 1385 10.9.34.3 10.9.34.3 001e.14c1.cbff mobility-1 0.0.0.0 :: Up 1385 10.9.34.4 10.9.34.4 001e.140e.4bff mobility-1 0.0.0.0 :: Up 1385 To view the cumulative statistics regarding the AP images in the controller, use the following command: Device# show ap image Total number of APs : 8 Number of APs Initiated :0 Downloading :0 Predownloading :0 Completed downloading :0 Completed predownloading : 0 Not Supported :0 Failed to Predownload :0 Predownload in progress : No AP Name Primary Image Backup Image Predownload Status Predownload Version Next Retry Time Retry Count Method ------------------------------------------------------------------------------------------------------------------------ AP00D7.8F9A.43DE 17.9.0.19 17.8.0.74 None 0.0.0.0 N/A 0 N/A AP4C77.6D21.9098 17.9.0.19 17.8.0.74 None 0.0.0.0 N/A 0 N/A AP00F2.8B27.BB2C 17.9.0.19 17.9.1.19 None 0.0.0.0 N/A 0 N/A APA023.9F41.5A38 17.9.0.19 17.8.0.74 None 0.0.0.0 N/A 0 N/A AP00A3.8E4A.762C 17.9.0.19 17.9.1.19 None 0.0.0.0 N/A 0 N/A AP40CE.2485.D616 17.9.0.19 17.9.1.19 None 0.0.0.0 N/A 0 N/A AP40CE.2485.D62C 17.9.0.19 17.8.0.82 None 0.0.0.0 N/A 0 N/A AP2C57.4188.4BC4 17.9.0.19 17.9.1.19 None 0.0.0.0 N/A 0 N/A To verify the AP upgrade on the controller, use the following command: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 280 System Upgrade Verifying Site-based Rolling AP Upgrade in a N+1 Network Device# show ap upgrade AP upgrade is in progress From version: 17.9.0.19 To version: 17.9.1.25 Started at: 01/28/2022 09:53:07 IST Configured percentage: 5 Percentage complete: 0 Expected time of completion: 01/28/2022 13:33:07 IST Client steering: Enabled Iteration expiry time: 15 minutes Accounting percentage: 95% Accounting action: Abort Rolling AP Upgrade Site Summary ------------------------------site3 Progress Report --------------- Iterations ---------- Iteration Start time End time AP count ------------------------------------------------------------------------------------- 0 01/28/2022 09:53:07 IST 01/28/2022 09:53:07 IST 1 1 01/28/2022 09:53:07 IST ONGOING 0 Upgraded -------- Number of APs: 1 AP Name Radio MAC Iteration Status Site ------------------------------------------------------------------------------------ AP00D7.8F9A.43DE 002c.c8df.3ca0 0 Rebooted site3 In Progress ----------- Number of APs: 1 AP Name Radio MAC ------------------------------------------------- AP00F2.8B27.BB2C 0896.ad9b.f9e0 Remaining --------- Number of APs: 1 AP Name Radio MAC ------------------------------------------------- AP4C77.6D21.9098 00be.7573.b340 APs not handled by Rolling AP Upgrade ------------------------------------- AP Name Radio MAC Status Reason for not handling by Rolling AP Upgrade ----------------------------------------------------------------------------------------------------- To verify the AP upgrade information on the sites, use the following command: Device# show ap upgrade site Site-filtered AP upgrade report data ==================================== Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 281 Verifying Site-based Rolling AP Upgrade in a N+1 Network System Upgrade Source controller: Controller1 Destination controller: Controller2 From version: 17.9.0.19 To version: 17.9.1.25 Site-filters present: Yes AP image upgrade site summary ----------------------------Operation: N+1 upgrade Site Tag Status --------------------------------------------------------- site3 In Progress AP upgrade reports linked to these site-filters ----------------------------------------------- Start time Operation type Report name ------------------------------------------------------------------------ 01/28/2022 09:53:07 IST AP image upgrade/move CLI AP_upgrade_to_DEvice2_28020229536 To verify the AP image upgrade site summary, use the following command: Device# show ap upgrade site summary AP image upgrade site summary ----------------------------Operation: N+1 upgrade Site Tag Status --------------------------------------------------------- site3 In Progress To view AP upgrade information based on the upgrade report name, use the following command: Device# show ap upgrade name AP_upgrade_to_Device2 AP upgrade is complete From version: 17.9.0.19 To version: 17.9.1.25 Started at: 01/28/2022 14:12:49 IST Configured percentage: 5 Percentage complete: 100 End time: 01/28/2022 14:18:59 IST Client steering: Enabled Accounting percentage: 95% Iteration expiry time: 15 minutes Accounting action: Abort Rolling AP Upgrade Site Summary ------------------------------site1 site2 Progress Report --------------- Iterations ---------- Iteration Start time End time AP count ----------------------------------------------------------------------------------------- 0 01/28/2022 14:12:49 IST 01/28/2022 14:12:49 IST 0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 282 System Upgrade Information About Client Steering Enhancement 1 01/28/2022 14:12:49 IST 01/28/2022 14:15:54 IST 1 2 01/28/2022 14:15:54 IST 01/28/2022 14:18:59 IST 1 Upgraded -------- Number of APs: 2 AP Name Radio MAC Iteration Status Site -------------------------------------------------------------------------------------------- AP40CE.2485.D616 4001.7aca.5960 1 Joined Member site2 AP40CE.2485.D62C 4001.7aca.5aa0 2 Joined Member site2 In Progress ----------- Number of APs: 0 AP Name Radio MAC ------------------------------------------------- Remaining --------- Number of APs: 0 AP Name Radio MAC ------------------------------------------------- APs not handled by Rolling AP Upgrade ------------------------------------- AP Name Radio MAC Status Reason for not handling by Rolling AP Upgrade ------------------------------------------------------------------------------------------------ To display the list of access points known to the mobility group, use the following command: Device# show wireless mobility ap-list AP name AP radio MAC Controller IP Learnt from -------------------------------------------------------------------------------------- Unknown 002c.c8df.3ca0 10.9.34.5 Self Unknown 00be.7573.b340 10.9.34.5 Self Unknown 0896.ad9b.f9e0 10.9.34.5 Self Unknown 1880.90f4.7b00 10.9.34.5 Self Unknown 1880.90f5.14e0 10.9.34.5 Self Unknown 4001.7aca.5960 10.9.34.5 Self Unknown 4001.7aca.5aa0 10.9.34.5 Self Unknown 687d.b45e.4b60 10.9.34.3 Mobility Group Unknown cc7f.75a8.78e0 10.9.34.5 Self Information About Client Steering Enhancement When access points (APs) of a wireless network are upgraded in a staggered manner, the clients connected to those APs are moved to other APs. During this period, clients that are unaware of an ongoing upgrade may try to reassociate with the same AP. Similarly, new clients may also try to join the AP. To avoid this scenario, Cisco IOS XE Dublin 17.11.1 introduces the option to not deauthenticate clients connected to the APs that are selected for the upgrade. Using the no ap upgrade staggered client-deauth command, you can stop deauthenticating clients before the AP performs an upgrade. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 283 Deauthenticate Clients System Upgrade Deauthenticate Clients Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 no ap upgrade staggered client-deauth Stops deauthentication of the clients associated Example: with the AP before the AP starts to upgrade. Device(config)# no ap upgrade staggered Client deauthentication affects both the 802.11v client-deauth clients and non-802.11v clients. If client steering is enabled, then 802.11v clients are sent Basic Set Service (BSS) transition frames. If client steering is disabled and client deauthentication is enabled, deauthentication message is sent to 802.11v clients as well. Step 3 end Example: Device(config)# end Returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 284 1 8 C H A P T E R NBAR Dynamic Protocol Pack Upgrade · NBAR Dynamic Protocol Pack Upgrade, on page 285 · Upgrading the NBAR2 Protocol Pack, on page 286 NBAR Dynamic Protocol Pack Upgrade Protocol packs are software packages that update the Network-Based Application Recognition (NBAR) engine protocol support on a device without replacing the Cisco software on the device. A protocol pack contains information on applications that are officially supported by NBAR, and are compiled and packed together. In each application, the protocol pack includes information on application signatures and application attributes. Each software release has a built-in protocol pack bundled with it. The Application Visibility and Control (AVC) feature (used for deep-packet inspection [DPI]) supports wireless products using a distributed approach that benefits from NBAR running on the access points (AP) or controller whose goal is to run DPI and report the result using NetFlow messages. The AVC DPI technology supports the ability to update recognized traffic and to define the custom type of traffic (known as custom applications). The NBAR runs on the controller in local mode, and on the APs in Flex and Fabric modes. In local mode, all the traffic coming from the APs are tunneled towards the wireless controller. Note · Although NBAR is supported in all the modes, upgrade of NBAR protocol packs is supported only in local mode (central switching) and in FlexConnect mode (central switching). · Custom applications are available only in local mode (central switching) and in FlexConnect mode (central switching). · When you upgrade the AVC protocol pack, copy the protocol pack to both RPs (active and standby). Otherwise, the protocol pack on the standby upgrade will fail and cause the synchronization failure crash. Protocol packs provide the following features: · They can be loaded easily and quickly. · They can be upgraded to a later version protocol pack or revert to an earlier version protocol pack. · Device reload is not required. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 285 Upgrading the NBAR2 Protocol Pack System Upgrade · They do not disrupt any service. Protocol Pack Upgrade Using protocol pack upgrades, you can update the NBAR engine to recognize new types of protocols or traffic without updating the entire switch or appliance image. It also eliminates the need to restart the entire system. NBAR protocol packs are available for download from Cisco Software Center: https://software.cisco.com/ download/navigator.html Custom Applications Using custom applications, you can force the NBAR engine to recognize traffic based on a set of custom rules, for example, destination IP, hostname, URL, and so on. The custom application names then appear in the web UI or in the NetFlow collector. Upgrading the NBAR2 Protocol Pack Follow the procedure given below to upgrade the NBAR2 protocol pack: Before you begin Download the protocol pack from Software Download page and copy it into the bootflash. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ip nbar protocol-pack bootflash:pack-name Loads the protocol pack. Example: Device(config)# ip nbar protocol-pack bootflash:mypp.pack Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 286 1 9 C H A P T E R Wireless Sub-Package for Switch · Introduction to Wireless Sub-package, on page 287 · Booting in Install Mode, on page 288 · Installing Sub-Package in a Single Step (GUI), on page 289 · Installing Sub-Package in a Single Step, on page 289 · Multi-step Installation of Sub-Package, on page 290 · Installing on a Stack, on page 290 · Upgrading to a Newer Version of Wireless Package, on page 291 · Deactivating the Wireless Package, on page 291 · Enabling or Disabling Auto-Upgrade, on page 291 Introduction to Wireless Sub-package Wireless-only Fabric uses fabric constructs to garner the benefits of a fabric. In this architecture, a fabric is built on top of existing traditional network designs such as multi-tier, Routed Access, and VSS network. It uses a LISP control plane together with VXLAN encapsulation for the overlay data plane traffic. The wireless control plane remains intact with CAPWAP tunnels initiating on the APs and terminating on a Cisco Catalyst 9800 Series Wireless Controller or AireOS controller. The Cisco Catalyst 9800 Series Wireless Controller controller can function in a dedicated appliance, directly in a switch, or in a VM. Cisco Catalyst 9800 Wireless Controller for Switch delivers all the benefits of a centralized control and management plane (easy to configure, upgrade, troubleshoot, etc) and the maximum throughput or performance of a distributed forwarding plane. The distributed data plane allows services such as AVC to scale. In this new model, the wireless control plane is not split between MC and MA. The switch is detached from the wireless control plane and the controller takes care of the wireless function and the traffic switching is done by the Cisco Access Switch. Since the wireless functionality is required to be enabled only on few nodes of the network, you can install Cisco Catalyst 9800 Series Wireless Controller as a separate package on the switch on a need basis. The sub-package is installed on top of the base image and a reload is required to activate the sub-package. Note The sub-package is an optional binary that contains the entire Cisco Catalyst 9800 Series Wireless Controller software. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 287 Booting in Install Mode System Upgrade Note SNMP is not supported on Catalyst 9800 Embedded Wireless Controller for Switch. How to Install Wireless Package 1. Install the base image (without wireless) on the switch. 2. Install the wireless package on the switch. 3. Upgrade the AP image. 4. Reload the switch. 5. Enable wireless on the switch using the wireless-controller configuration command, and configure wireless features. How to Remove Wireless Package 1. Uninstall the wireless package from the switch. 2. Reload the switch. 3. Run the write command. This removes the wireless configuration from the startup-configuration. Upgrading to a Newer Version of Wireless Package 1. Install the base image (without wireless) on the switch. 2. Install the updated wireless package. 3. Reload the switch. 4. Commit the installation. Booting in Install Mode Use the procedure given below to boot the switch in install-mode: Before you begin The sub-package does not work in bundle-mode. Use the show version command to verify the boot mode. Procedure Step 1 Step 2 Step 3 install add file image.bin location activate commit. This command moves the switch from bundle-mode to install-mode. Note that image.bin is the base image. Click yes to all the prompts. reload Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 288 System Upgrade Installing Sub-Package in a Single Step (GUI) Reloads the switch. Ensure that you boot from flash:packages.conf. After the reload, the switch will be in install-mode. Note During Install mode image upgrade/downgrade, "Install add file" with flash:<file_name> command is not supported. Instead of that "bootflash:<filename"> needs to be used. Install add file bootflash:<file_name> activate commit What to do next Verify the boot mode using the show version command. Installing Sub-Package in a Single Step (GUI) Procedure Step 1 Step 2 Step 3 Choose Administration > Software Management > Software Upgrade. Choose the upgrade mode from the Upgrade Mode drop-down list, the transport type from the Transport Type drop-down list and enter the Server IP Address (IPv4/IPv6), the File System and choose the location from the Source File Path drop-down list. Click Download & Install. Installing Sub-Package in a Single Step Use the procedure given below to install sub-package in a single step: Before you begin · Ensure that the switch is in install-mode. · Ensure that you boot only from flash:packages.conf. Procedure Step 1 Step 2 install add file flash:<controller>.bin activate commit Installs the Cisco Catalyst 9800 Wireless Controller for Switch sub-package. Note The sub-package (flash:<controller>.bin) is available on www.cisco.com. You can also install the sub-package directly from TFTP server. Click yes to all the prompts. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 289 Multi-step Installation of Sub-Package System Upgrade What to do next Use the show install summary command to verify the installed image or package. Multi-step Installation of Sub-Package Use the procedure given below to install sub-package: Before you begin · Ensure that the switch is in install-mode. · Ensure that you boot only from flash:packages.conf. Procedure Step 1 Step 2 Step 3 install add file flash:<controller>.bin The sub-package is added to the flash and expanded. install activate file flash:<controller>.bin Installs the sub-package. install commit Completes the installation by writing the files. What to do next Use the show install summary command to verify the installed image or package. Installing on a Stack You can install the package on a stack using either Installing Sub-Package in a Single Step or Multi-step Installation of Sub-Package, on page 290. If a new member joins the stack, the two possible scenarios are: · If auto-upgrade is enabled: The required software is installed on to the new member. It will match the version of software running on the stack as well as the wireless package. · If auto-upgrade is disabled: As the software version is not the same as in the stack, the new member will remain in version mismatch state and it will not join the stack. You have to manually run the install autoupgrade command in EXEC mode to initiate the auto-upgrade procedure. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 290 System Upgrade Upgrading to a Newer Version of Wireless Package Upgrading to a Newer Version of Wireless Package Use the procedure given below to upgrade to a newer version of wireless package: Procedure Step 1 Step 2 Step 3 Step 4 install add file flash:<base-image>.bin The base image (without wireless) is added to the flash and expanded. install add file flash:<controller-sub-package>.bin The sub-package is added to the flash and expanded. install active Installs the base image and sub-package and triggers a reload. However, you can also rollback to the previous state after the reload. install commit Completes the installation by writing the files. Deactivating the Wireless Package Follow the procedure given below to deactivate the wireless sub-package: Procedure Step 1 Command or Action Purpose install deactivate file flash:<controller>.bin Example: Device# install deactivate file flash:<controller>.bin Removes the package and forces the switch to reboot. Step 2 install commit Example: Device# install commit Commits the switch without wireless package. Enabling or Disabling Auto-Upgrade Follow the procedure given below to enable or disable auto-upgrade: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 291 Enabling or Disabling Auto-Upgrade System Upgrade Procedure Step 1 Command or Action software auto-upgrade enable Example: Device(config)# software auto-upgrade enable Purpose Enables software auto-upgrade. Step 2 no software auto-upgrade enable Disables software auto-upgrade. Example: Device(config)# no software auto-upgrade enable Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 292 I I I PA R T Lightweight Access Points · Countries and Regulations, on page 295 · Access Points Modes , on page 317 · Security, on page 397 · AP Joining, on page 407 · AP Management, on page 415 · AP Configuration, on page 457 · Secure Data Wipe, on page 497 · Troubleshooting Lightweight Access Points, on page 499 2 0 C H A P T E R Countries and Regulations · Information About Country Codes, on page 295 · Prerequisites for Configuring Country Codes, on page 295 · Configuring Country Codes (GUI), on page 296 · Configuring Country Codes (CLI), on page 296 · Configuration Examples for Configuring Country Codes, on page 298 · Information About Regulatory Compliance Domain, on page 299 · Configuring Country Code for Rest of the World (CLI) , on page 315 Information About Country Codes Controllers and access points are designed for use in many countries with varying regulatory requirements. The radios within the access points are assigned to a specific regulatory domain at the factory (such as -E for Europe), but the country code enables you to specify a particular country of operation (such as FR for France or ES for Spain). Configuring a country code ensures that each radio's broadcast frequency bands, interfaces, channels, and transmit power levels are compliant with country-specific regulations. Information About Japanese Country Codes Country codes define the channels that can be used legally in each country. These country codes are available for Japan: · J2: Allows only -P radios to join the controller · J4: Allows 2.4G JPQU and 5G PQU to join the controller. Prerequisites for Configuring Country Codes · Generally, you should configure one country code per device; you configure one code that matches the physical location of the device and its access points. You can configure up to 200 country codes per device. This multiple-country support enables you to manage access points in various countries from a single device. · When the multiple-country feature is used, all the devices that are going to join the same RF group must be configured with the same set of countries, configured in the same order. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 295 Configuring Country Codes (GUI) Lightweight Access Points · Access points are capable of using all the available legal frequencies. However, access points are assigned to the frequencies that are supported in their relevant domains. · The country list configured on the RF group leader determines which channels the members will operate on. This list is independent of which countries have been configured on the RF group members. · For devices in the Japan regulatory domain, you should have one or more Japan country codes (JP, J2, or J3) configured on your device at the time you last booted your device. · For devices in the Japan regulatory domain, you should have one or more Japan country codes (J2, or J4) configured on your device at the time you last booted your device. · For devices in the Japan regulatory domain, you must have at least one access point with a -J regulatory domain joined to your device. · You cannot delete any country code using the configuration command wireless country country-code if the specified country was configured using the ap country list command and vice-versa. Configuring Country Codes (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Wireless > Access Points > Country. On the Country page, select the check box for each country where your access points are installed. If you selected more than one check box, a message is displayed indicating that RRM channels and power levels are limited to common channels and power levels. Click Apply. Configuring Country Codes (CLI) Procedure Step 1 Step 2 Step 3 Command or Action enable Example: Device# enable Purpose Enters privileged EXEC mode. show wireless country supported Example: Displays a list of all the available country codes. Device# show wireless country supported configure terminal Example: Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 296 Lightweight Access Points Configuring Country Codes (CLI) Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action Device# configure terminal Purpose ap dot11{ 24ghz| 5ghz| 6ghz }shutdown Disables the 802.11b/g network, if you use 24ghz. Example: Disables the 802.11a network, if you use 5ghz. Device(config)# ap dot11 5ghz shutdown Enables the 802.11 6-GHz network, if you use 6ghz. ap country country_code Example: Device(config)# ap country IN Configures country code on the controller, so that access points joining controller matches the country code and its corresponding regulatory domain codes for the AP. Note More than one country code can be configured. wireless country country_code Example: Device(config)# wireless country IN Configures 200 country codes per device. Note This CLI is applicable for deployments having more than 20 countries. exit Example: Device(config)# exit Returns to privileged EXEC mode. show wireless country configured Displays the configured countries. Example: Device# show wireless country configured show wireless country channels Displays the list of available channels for the Example: country codes configured on your device. Device# show wireless country channels Note Perform Steps 9 through 17 only if you have configured multiple country codes in Step 6. configure terminal Example: Device# configure terminal no ap dot11 { 24ghz | 5ghz| 6ghz} shutdown Example: Device(config)# no ap dot11 5ghz shutdown Enters global configuration mode. Enables the 802.11b/g network, if you use 24ghz. Enables the 802.11a network, if you use 5ghz. Enables the 802.11 6-GHz network, if you use 6ghz. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 297 Configuration Examples for Configuring Country Codes Lightweight Access Points Step 12 Step 13 Step 14 Step 15 Command or Action end Example: Device(config)# end ap name cisco-ap shutdown Example: Device# ap name AP02 shutdown Purpose Returns to privileged EXEC mode. Disables the access point. Note Ensure that you disable only the access point for which you are configuring country codes. configure terminal Example: Device# configure terminal Enters global configuration mode. ap name cisco-ap country country_code Example: Device# ap name AP02 country US Assigns each access point with a country code from the controller country code list. Note · Ensure that the country code that you choose is compatible with the regulatory domain of at least one of the access point's radios. · Disable the access point before changing country code. Step 16 Step 17 end Example: Device(config)# end ap name cisco-ap no shutdown Example: Device# ap name AP02 no shutdown Returns to privileged EXEC mode. Enables the access point. Configuration Examples for Configuring Country Codes Viewing Channel List for Country Codes This example shows how to display the list of available channels for the country codes on your device: Device# show wireless country channels Configured Country........................: US - United States KEY: * = Channel is legal in this country and may be configured manually. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 298 Lightweight Access Points Information About Regulatory Compliance Domain A = Channel is the Auto-RF default in this country. . = Channel is not legal in this country. C = Channel has been configured for use by Auto-RF. x = Channel is available to be configured for use by Auto-RF. (-,-) = (indoor, outdoor) regulatory domain allowed by this country. -----------------:+-+-+-+-+-+-+-+-+-+-+-+-+-+- 802.11bg : Channels : 11111 12345678901234 -----------------:+-+-+-+-+-+-+-+-+-+-+-+-+-+- (-A ,-AB ) US : A * * * * A * * * * A . . . Auto-RF :.............. -----------------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- 802.11a : 1111111111111111 Channels :3 3 3 4 4 4 4 4 5 5 6 6 0 0 0 1 1 2 2 2 3 3 4 4 5 5 6 6 4680246826040482604826093715 -----------------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- (-A ,-AB ) US : . A . A . A . A A A A A * * * * * . . . * * * A A A A* Auto-RF :............................ -----------------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- 4.9GHz 802.11a : Channels : 11111111112222222 12345678901234567890123456 -----------------:+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- US (-A ,-AB ) : * * * * * * * * * * * * * * * * * * * A * * * * * A Auto-RF :.......................... Information About Regulatory Compliance Domain Controllers and access points (AP) are designed for use in many countries with varying regulatory requirements. Country code enables to specify a particular country of operation (such as FR for France or ES for Spain). Configuring a country code ensures that each radio's broadcast frequency bands, interfaces, channels, and transmit power levels are compliant with country-specific regulations. This feature helps to reduce the number of regulatory domains by modifying the existing preprovision domains workflow to determine the regulatory domain at runtime for each country code. A new Rest of World (RoW) domain has been introduced and merged to include the nine pre-existing domains. Every AP can determine its own regulatory domain from one of these domains, with the regulated power table and the allowed radio channels. Note The transmission power value in the TPC IE of the beacon can differ from that of the transmission power value of the AP displayed in the show controllers dot11radio command, by a maximum difference of 2 dB. The maximum deviation allowed in TPC IE of beacon is 2 dB. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 299 Global Country-Level Domains Lightweight Access Points Global Country-Level Domains Table 20: Power Table and Supported Channels of Countries in Global Domain (2.4-GHz and 5-GHz) Country and Code Outdoor Power Outdoor Power Supported Channels Table Table 2.4-GHz 2.4-GHz 5-GHz Supported Channels 5-GHz Albania: AL 2G-E 5G-E 1-2-3-4-5-6 7-8-9-10-11-12-13 100-104-108112-116-132-136-140 Australia: Au 2G-A 5G-Z 1-2-3-4-5- 6-7-8-9-10-11 100-104-108112-116-132-136 -140-149-153-161-165 Austria: AT 2G-E 5G-E 1-2-3-4-56-7-8-9-10-11-12-13 100-104-108 112-116-132-136-140 Belgium: BE 2G-E 5G-E 1-2-3-4-56-7-8-9-10-11-12-13 100-104-108112-116-132-136-140 Bulgaria: BG 2G-E 5G-E 1-2-3-4-5-6, 7-8-9-10-11-12-13 100-104-108112-116-132-136-140 Canada: CA 2G-A 5G-A 1-2-3-4-5-6 7-8-9-10-11 56-60-64-100-104-108-112-116 -132-136-140-149-153-157161-165 Croatia: HR 2G-E 5G-E 1-2-3-4-56-7-8-9-10-11-12-13 100-104-108112-116-132-136-140 Cyprus: CY 2G-E 5G-E 1-2-3-4-5-6 7-8-9-10-11-12-13 100-104-108-112-116-132-136-140 Czech 2G-E Republic: CZ 5G-E 1-2-3-4-56-7-8-10-11-12-13 100-104-108112-116-132-136-140 Denmark: DK 2G-E 5G-E 1-2-3-4-5-6 7-8-9-10-11-12-13 100-104-108-112-116-132-136-140 Estonia: EE 2G-E 5G-E 1-2-3-4-56-7-8-9-10-11-12-13 100-104-108112-116-132-136-140 Finland: FI 2G-E 5G-E 1-2,-3-4-5 6-7-8-9-10-11-12-13 100-104-108 112-116-132-136-140 France: FR 2G-E 5G-E 1-2-3-4-5-6 7-8-9-10-11-12-13 100-104-108112-116-132-136-140 Germany: DE 2G-E 5G-E 1-2-3-4-5-6 7-8-9-10-11-12-13 100-104-108112-116-132-136-140 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 300 Lightweight Access Points Global Country-Level Domains Country and Code Outdoor Power Outdoor Power Supported Channels Table Table 2.4-GHz 2.4-GHz 5-GHz Supported Channels 5-GHz Greece: GR 2G-E 5G-E 1-2-3-4-5-6 7-8-9-10-11-12-13 100-104-108112-116-132-136-140 Hungary: HU 2G-E 5G-E 1-2-3-4-56-7-8-9-10-11-12-13 100-104-108 112-116-132-136-140 Iceland: IS 2G-E 5G-E 1-2-3-4-5-6 7-8-9-10-11-12-13 100-104-108 112-116-132-136-140 Indonesia: ID 2G-F 5G-F 1-2-3-4-5-6 7-8-9-10-11-12-13 149-153-157-161 Italy: IT 2G-E 5G-E 1-2-3-4-56-7-8-9-10-11-12-13 100-104-108 112-116-132-136-140 Japan: JP 2G-Q 5G-Q 1-2-3-4-5-6 7-8-9-10-11-12-13 100-104-108112-116-120-124-128-132- 136-140-144 Latvia: LV 2G-E 5G-E 1-2-3-4-56-7-8-9-10-11-12-13 100-104-108 112-116-132-136-140 Liechtenstein: 2G-E LI 5G-E 1-2-3-4-56-7-8-9-10-11-12-13 100-104-108112-116-132-136-140 Lithuania: LT 2G-E 5G-E 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 100-104-108-112-116-132-136-140 11, 12, and 13 Luxembourg: 2G-E LU 5G-E 1-2-3-4-5-6 7-8-9-10-11-12-13 100-104-108 112-116-132-136-140 Malta: MT 2G-E 5G-E 1-2-3-4-56-7-8-9-10-11-12-13 100-104-108112-116-132-136-140 Netherlands: 2G-E NL 5G-E 1-2-3-4-56-7-8-9-10-11-12-13 100-104-108112-116-132-136-140 New Zealand: 2G-A NZ 5G-E 1-2-3-4-5- 6-7-8-9-10-11 100-104-108-112-116-132-136-140149-153-161-165 Norway: NO 2G-E 5G-E 1-2-3-4-5-6 7-8-9-10-11-12-13 100-104-108112-116-132-136-140 Poland: PL 2G-E 5G-E 1-2-3-4-56-7-8-9-10-11-12-13 100-104-108112-116-132-136-140 Portugal: PT 2G-E 5G-E 1-2-3-4-56-7-8-9-10-11-12-13 100-104-108112-116-132-136-140 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 301 Restrictions on Regulatory Compliance Domain Lightweight Access Points Country and Code Outdoor Power Outdoor Power Supported Channels Table Table 2.4-GHz 2.4-GHz 5-GHz Supported Channels 5-GHz Puerto Rico: 2G-A PR 5G-B 1-2-3-4-5- 6-7-8-9-10-11 36-40-44-4852-56-60-64-100-104108-112-116-120-128-132-140- 144-149-153- 157-161-165 Romania: RO 2G-E 5G-E 1-2-3-4-5-6-7-8-9-10-11- 100-104-108-112-116-132-136-140 12-13 Russian 2G-R Federation: RU 5G-R 1-2-3-4-56-7-8-9-10-11-12-13 36-40-44-4852-56-60-64-136-140144-149-153-157-161-165 San Marino: 2G-E SM 5G-E 1-2-3-4-5-6-7-8-9-10-11-12-13 36-40-44-48-52-56-60-64-100 -104-108-112-116-132-136-140 Slovak 2G-E Republic: SK 5G-E 1-2,-3-4-56-7-8-9-10-11-12-13 100-104-108-112-116-132-136-140 Slovenia: SI 2G-E 5G-E 1-2-3-4-56-7-8-9-10-11-12-13 100-104-108112-116-132-136-140 Spain: ES 2G-E 5G-E 1-2-3-4-56-7-8-9-10-11-12-13 100-104-108112-116-132-136-140 Sweden: SE 2G-E 5G-E 1-2-3-4-56-7-8-9-10-11-12-13 100-104-108112-116-132-136-140 Switzerland: 2G-E CH 5G-E 1-2-3-4-56-7-8-9-10-11-12-13 100-104-108112-116-132-136-140 United States 2G-A of America: US 5G-B 1-2-3-4-5- 6-7-8-9-10-11 36-40-44-48-52-56-60-64- 100-104-108-112-116-120-128- 132-140-144-149-153 157-161-165 Vatican City: 2G-E VA 5G-E 1-2-3-4-5-6-7-8-9-10-11-12-13 36-40-44-48-52-56-60-64100-104-108-112-116-132-136-140 Restrictions on Regulatory Compliance Domain · Cisco Catalyst 9124 AXE APs (9124AXE-F) are not supported in Indonesia. The AP radios are operationally down. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 302 Lightweight Access Points Countries Supporting 6-GHz Radio Band Countries Supporting 6-GHz Radio Band The table below list the countries that support 802.11 6-GHz radio band: The following APs support 6-GHz radio band: · Cisco Catalyst 9136 Access Points · Cisco Catalyst 9162 Series Access Points · Cisco Catalyst 9164 Series Access Points · Cisco Catalyst 9166 Series Access Points From Cisco IOS XE Dublin 17.11.1, Albania, Iceland, Lichtenstein, Norway, and Switzerland are added to the list of countries that supports 6-GHz radio band. From Cisco IOS XE Dublin 17.12.1, Australia, Brazil, Costa Rica, Honduras, Hong Kong, Japan, Jordan, Kenya, Malaysia, Morocco, New Zealand, Peru, Qatar, Saudi Arabia, and United Arab Emirates are added to the list of countries that supports 6-GHz radio band. Table 21: Power Table and Supported Channels of Countries (6-GHz) Country and Code Albania: AL Austria: AT Australia: AU Belgium: BE Brazil: BR Bulgaria: BG Outdoor Power Table 6-GHz 6G-E 6G-E 6G-Z 6G-E 6G-B1 6G-E Supported Channels 6-GHz 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93-97-101-105-1 09-113-117--121-125-129-133-137-141-145-149153 157-161-165-169-173-177-181-185-189-193197-201-205-209-213--217-221-225-229-233 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 303 Countries Supporting 6-GHz Radio Band Lightweight Access Points Country and Code Canada: CA Costa Rica: CR Croatia: HR Cyprus: CY Czech Republic: CZ Denmark: DK Estonia: EE Finland: FI France: FR Germany: DE Greece: GR Outdoor Power Table 6-GHz 6G-A 6G-B1 6G-E 6G-E 6G-E 6G-E 6G-E 6G-E 6G-E 6G-E 6G-E Supported Channels 6-GHz 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93-97-101-105-1 09-113-117--121-125-129-133-137-141-145-149153 157-161-165-169-173-177-181-185-189-193197-201-205-209-213--217-221-225-229-233 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93-97-101-105-1 09-113-117--121-125-129-133-137-141-145-149153 157-161-165-169-173-177-181-185-189-193197-201-205-209-213--217-221-225-229-233 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 304 Lightweight Access Points Countries Supporting 6-GHz Radio Band Country and Code Honduras: HR Hong Kong: HK Hungary: HU Iceland: IS Ireland: IE Italy: IT Japan: J4 Jordan: JO Kenya: KN Korea: KR Latvia: LV Liechtenstein: LI Outdoor Power Table 6-GHz 6G-B1 6G-E2 6G-E 6G-E 6G-E 6G-E 6G-Q 6G-E2 6G-E2 6G-K1 6G-E 6G-E Supported Channels 6-GHz 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93-97-101-105-1 09-113-117--121-125-129-133-137-141-145-149153 157-161-165-169-173-177-181-185-189-193197-201-205-209-213--217-221-225-229-233 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93-97-101-105109-113-117--121-125-129-133-137-141-145149-153 157-161-165-169-173-177-181-185-189193-197-201-205-209-213--217-221-225-229 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 305 Countries Supporting 6-GHz Radio Band Lightweight Access Points Country and Code Lithuania: LT Luxembourg: LU Malta: MT Malaysia: MY Morocco: MO Netherlands: NL New Zealand: NZ Norway: NO Peru: PE Poland: PL Portugal: PT Qatar: QA Romania: RO Outdoor Power Table 6-GHz 6G-E 6G-E 6G-E 6G-E2 6G-E2 6G-E 6G-Z 6G-E 6G-B1 6G-E 6G-E 6G-E2 6G-E Supported Channels 6-GHz 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93-97-101-105-109-113-117121-125-129-133-137-141-145-149-153-157-161-165-169-173-177 -181-185-189-193-197-201-205-209-213-217-221-225-229-223 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 306 Lightweight Access Points Countries Supporting 6-GHz Radio Band Country and Code San Marino: SM Saudi Arabia: SA Outdoor Power Table 6-GHz 6G-E 6G-B1 Slovak Republic: SK 6G-E Slovenia: SI 6G-E Spain: ES 6G-E Sweden: SE 6G-E Switzerland: CH 6G-E United Arab Emirates: AE 6G-E1 United Kingdom: GB 6G-E1 United States of America: 6G-B US Vatican City: VA 6G-E Supported Channels 6-GHz 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93-97-101-105-109-113-117121-125-129-133-137-141-145-149-153-157-161-165-169-173-177 -181-185-189-193-197-201-205-209-213-217-221-225-229-223 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93-97-101-105109-113-117--121-125-129-133-137-141-145-149 -153 157-161-165-169-173-177-181-185-189-193197-201-205-209-213--217-221-225-229-233 1-5-9-13-17-21-25-29-33-37-41-45-4953-57-61-65-69-73-77-81-85-89-93 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 307 Rest of World Domain Lightweight Access Points Rest of World Domain Until Cisco IOS XE Bengaluru 17.5.1, APs used the global controller country list to configure and validate the country codes. From Cisco IOS XE Bengaluru 17.6.1 onwards, RoW domain support was added. The following APs support RoW domain: · Cisco Catalyst 9124AX outdoor Access Points · Cisco Catalyst 9136 Access Points · Cisco Catalyst 9164 Series Access Points · Cisco Catalyst 9166 Series Access Points From Cisco IOS XE Cupertino 17.9.1, the following countries are added to the RoW domain: · Belarus · Brunei · Iraq · Kazakhstan · Kuwait · Nigeria · Pakistan · Qatar · Ukraine · Uruguay From Cisco IOS XE Dublin 17.11.1, the following countries are added to the RoW domain: · Afghanistan · Angola · Bhutan · Cambodia · Democratic Republic of the Congo · Ethiopia · Georgia · Honduras · Ivory Coast · Kosovo · Laos · Moldova Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 308 Lightweight Access Points Rest of World Domain · Myanmar · Nepal · Nicaragua · San Marino · Sudan · Vatican City State · Yemen · Zimbabwe Table 22: Power Table and Supported Channels of Countries in RoW Domain Country and Code Outdoor Power Outdoor Power Supported Channels Table Table 2.4 GHz 2.4-GHz 5-GHz Supported Channels 5 GHz Afghanistan: 2G-E AF 5G-E 1-2-3-4-5-6-7-8-9-10-11-12-13 36-40-44-48-52-56-60-64100-104-108-112-116 Algeria: DZ 2G-E 5G-C1 1-2-3-4-5-6-7-8-9-10-11-12-13 52-56-60-64-100-104108-112-116-132 Angola: AO 2G-E -- 1-2-3-4-5-6-7-8-9-10-11-12-13 -- Argentina: AR 2G-Z 5G-A1 1-2-3-4-5-6-7-8-9-10- 11 36-40-44-48-52-56-6064-100-104-108-112- 116-132-136-140 149-153-157-161-165 Bahamas: BS 2G-A 5G-B1 1-2-3-4-5-6-7-8-9-10-11 36-40-44-48-52-56-6064-149-153-157-161-165 Bahrain: BH 2G-E 5G-C1 1-2-3-4-5-6-7-8-9-10 11-12-13 149-153-157-161-165 Bangladesh: 2G-A BD 5G-A2 1-2-3-4-5-6-7-8-9-10- 11 149-153-157-161-165 Barbados: BB 2G-A 5G-B1 1-2-3-4-5-6-7-8-9-10- 11 36-40-44-48-52-56-60-64 149-153-157-161-165 Belarus: BY 2G-E 5G-E 1-2-3-4-5-6-7-8-9-10 11-12-13 132-136-140 Bhutan: BT 2G-E -- 1-2-3-4-5-6-7-8-9-10-11-12-13 -- Bolivia: BO 2G-A 5G-A10 1-2-3-4-5-6-7-8-9-10- 11 149-153-157-161-165 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 309 Rest of World Domain Lightweight Access Points Country and Code Outdoor Power Outdoor Power Supported Channels Table Table 2.4 GHz 2.4-GHz 5-GHz Supported Channels 5 GHz Bosnia: BA 2G-E 5G-E 1-2-3-4-56-7-8-9-0-11-12-13 100-104-108112-116-132-136-140 Brazil: BR 2G-Z 5G-Z1 1-2-3-4-5-6-7-8-9-1011-12-13 100- 104-112-116-120 124-128-132-136- 140-149-153-157- 161-165 Brunei: BN 2G-V1 5G-M3 1-2-3-4-5-6-7-8-9-10 11-12-13 36-40-44-48-52-56-60-64116-120-124-128-132-136-140149-153-157-161-165 Cambodia: KH 2G-E 5G-E 1-2-3-4-5-6-7-8-9-10-11-12-13 36-40-44-48-52-56-60-64 Cameroon: CM 2G-E 5G-E 1-2-3-4-5-6-7-8-9-10 11-12-13 100-104-108-112-116-132-136-140 Chile: CL 2G-A 5G-A3 1-2-3-4-5-6-7-8-9-10- 11 52-56-60-64-100-104108-112-116-120-124-128-132- 136 140-149-153-157-161-165 China: CN 2G-E 5G-H1 1-2-3-4-5-6-7-8-9-10 11-12-13 149-153-157-161-165 Colombia: CO 2G-A 5G-B2 1-2-3- 4-5-6-7-8-9-10- 11 36-40-44-48-52-56-60-64-100-108-112-116-120-124-128- 132 136-140-149-153-157-161-165 Cost Rica: CR 2G-A 5G-A4 1-2-3-4-5-6-7-8-9-10- 11 36-40-44-48-52-56-60-64100-104-108-112-116-120-124128-132-136-140-149-153-157-161-165 Democratic 2G-E Republic of the Congo: CD 5G-E 1-2-3-4-5-6-7-8-9-10-11-12-13 36-40-44-48-52-56-60-64100-104-108-112-116 Dominican 2G-A Republic: DO 5G-A5 1-2-3-4-5-6-7-8-9-10- 11 36-40-44-48-52-58-60-64- 100-104-108-112- 116-120-124-128132-136-140-149-153-157-161-165 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 310 Lightweight Access Points Rest of World Domain Country and Code Outdoor Power Outdoor Power Supported Channels Table Table 2.4 GHz 2.4-GHz 5-GHz Supported Channels 5 GHz Ecuador: EC 2G-A 5G-A4 1-2-3-4-5-6-7-8-9-10-11 36-40-44-48-52-56-60-64100-104-108-112- 116-120-124-128132-136-140-149-153-157-161-165 Egypt: EG 2G-E 5G-C1 1-2-3-4-5-6-7-8-9-1011-12-13 36-40-44-48-52-56-60-64 El Salvador: 2G-A SV 5G-A 1-2-3-4-5-6-7-8-9-10- 11 52-56-60-64-149-153157-161-165 Ethiopia: ET 2G-E -- 1-2-3-4-5-6-7-8-9-10-11-12-13 -- Georgia: GE 2G-E 5G-E 1-2-3-4-5-6-7-8-9-10-11-12-13 36-40-44-48-52-56-60-64100-104-108-112-116132136-140 Ghana: GH 2G-E 5G-E 1-2-3-4-5-6-7-8-9-1011-12-13 100-104-108-112-116132-136-140 Gibraltar: GI 2G-E 5G-E 1-2-3-4-56-7-8-9-10-11-12-13 100-104-108 112-116-132-136-140 Honduras: HN 2G-A 5G-B2 1-2-3-4-5-6-7-8-9-10-11 36-40-44-48-52-56-60-64100-104-108-112-116-120124-128-132-136-140-149-153 -157-161-165 Hong Kong: 2G-Z HK 5G-Z1 1-2-3-4-5-6-7-8-9-10- 11 100-104-108-112-116120-124-128-132-136- 140-149-153-157-161-165 India: IN 2G-Z 5G-D1 1-2-3-4-5-6-8-9-10-11 36-40-44-48-52-56-60- 100104-108-112- 116-124-128-132 136-140-144-153-157-161-165-169 Iraq: IQ 2G-E 5G-E 1-2-3-4-5-6-7-8-9-10 11-12-13 100-104-108-112-116-132-136-140 Israel: IL 2G-E 5G-E 1-2-3-4-5-6-7-8-9-10 -- 11-12-13 Ivory Coast: CI 2G-E -- 1-2-3-4-5-6-7-8-9-10-11-12-13 -- Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 311 Rest of World Domain Lightweight Access Points Country and Code Outdoor Power Outdoor Power Supported Channels Table Table 2.4 GHz 2.4-GHz 5-GHz Supported Channels 5 GHz Jamaica: JM 2G-E 5G-Z 1-2-3-4-5-6-7-8-9-10- 11 52-56-60-64-100-104108-112-116-120-124-128132-136-140-153-161-165 Jordan: JO 2G-E 5G-E 1-2-3-4-56-7-8-9-10-11-12-13 100-104-108-112-116-132-136-140 Kazakhstan: 2G-E KZ 5G-E9 1-2-3-4-5-6-7-8-9-10- 11 100-104-108-112-116-132-136-140 Kenya: KE 2G-E 5G-E 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 100-104-108-112-116-132-136-140 11, 12, and 13 Korea: KR 2G-E 5G-K1 1-2-3-4-5-6-7-8-9-1011-12-13 36-40-44-48-52-56-60 64100-104-108-112-116-120124-128-132-136-140-149153-157-161-165 Kosovo: XK 2G-E 5G-E 1-2-3-4-5-6-7-8-9-10-11-12-13 36-40-44-48-52-56-60-64 -100-104-108-112-116-132136-140 Kuwait: KW 2G-E 5G-E 1-2-3-4-5-6-7-8-9-1011-12-13 100-104-108-112-116-132-136-140 Laos: LA 2G-E -- 1-2-3-4-5-6-7-8-9-10-11-12-13 -- Lebanon: LB 2G-E 5G-E 1-2-3-4-5-6 7-8-9-10-11-12-13 100-104-108 112-116-132-136-140 Macedonia: 2G-E MK 5G-E 1-2-3-4-5-6 7-8-9-10-11-12-13 100-104-108 112-116-132-136-140 Macao: MO 2G-V1 5G-M3 1- 2-3-4-5-6-7-8-9-10 11-12-13 36-40-44-48-52-56-60-64 116-120-124-128- 132-140-149-153 157-161-165 Malaysia: MY 2G-F 5G-C2 1-2-3-4-5-6-7-8-9-10 11-12-13 100-104-108-112-116120-124-128-149-153- 157-161-165 Mexico: MX 2G-A1 5G-A6 1-2-3-4-5-6-7-8-9-10 11-12-13 36-40-44-48-52-56-6064-149-153-157-161-165 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 312 Lightweight Access Points Rest of World Domain Country and Code Outdoor Power Outdoor Power Supported Channels Table Table 2.4 GHz 2.4-GHz 5-GHz Supported Channels 5 GHz Moldova: MD 2G-E 5G-E 1-2-3-4-5-6-7-8-9-10-11-12-13 36-40-44-48-52-56-60-64100-104-108-112-116-132136-140 Mongolia: MN 2G-E1 5G-E6 1-2-3-4-5-6-7-8-9-10 11-12-13 36-40-44-48-52-56-60-64 116-120-124-128- 132-140-149-153 157-161-165 Monaco: MC 2G-E 5G-E 1-2-3-4-56-7-8-9-10-11-12-13 100-104-108 112-116-132-136-140 Montenegro: 2G-E ME 5G-E 1-2-3-4-56-7-8-9-10-11-12-13 100-104-108 112-116-132-136-140 Myanmar: MM 2G-E -- 1-2-3-4-5-6-7-8-9-10-11-12-13 -- Nepal: NP 2G-E 5G-E 1-2-3-4-5-6-7-8-9-10-11-12-13 36-40-44-48-52-56-60-64100-104-108-112-116-132-136-140 Nicaragua: NI 2G-A 5G-A 1-2-3-4-5-6-7-8-9-10-11 36-40-44-48-52-56-60-64100-104-108-112-116-132136-140-149-153-157-161-165 Nigeria: NG 2G-A1 5G-E5 1-2-3-4-5-6-7-8-9-10 11-12-13 52-56-60-64-149-153-157-161-165 Oman: OM 2G-E 5G-E 1-2-3-4-5-6 7-8-9-10-11-12-13 100-104-108112-116-132-136-140 Pakistan: PK 2G-A1 5G-E7 1-2-3-4-5-6-7-8-9-10- 11 149-153-157-161 Panama: PA 2G-A 5G-B2 1-2-3-4-5-6-7-8-9-10-11 36-40-44-48-52-56-6064-100-104-108-112- 116-120-124-128 132-136-140-149-153-157-161-165 Paraguay: PY 2G-A 5G-Z1 1-2-3-4-5-6-7-8-9-10- 11 36-40-44-48-52-56-6064-100-104-108-112- 116-120-124-128132-136-140-149-153-157-161-165 Peru: PE 2G-A 5G-A 1-2-3-4-5-6-7-8-9-10- 11 56-60-64-100-104-108 112-116-132-136-140- 149-153-157 161-165 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 313 Rest of World Domain Lightweight Access Points Country and Code Outdoor Power Outdoor Power Supported Channels Table Table 2.4 GHz 2.4-GHz 5-GHz Supported Channels 5 GHz Philippines: 2G-E PH 5G-A7 1-2-3-4-5-6-7-8-9-10- 11 36-40-44-48-52-56-60-64 100-104-108-112-116-120-128-136 140-149-153-157-161-165 Qatar : QA Rest of the World (Default) 2G-E 2G-RW 5G-E 5G-RW 1-2-3-4-5-6-7-8-9-10 11-12-13 1-2-3-4-5-6-7-8-9-10 11-12-13 100-104-108-112-116 132-136-140 -- Saudi Arabia: 2G-E SA 5G-M1 1-2-3-4-5-6-7-8-9-10 11-12-13 100-104-108-112-116 120-124-128-132-136-140 Serbia: RS 2G-E 5G-E 1-2-3-4-5- 6-78-9-10-11-12-13 100-104-108112-116-132-136-140 Singapore: SG 2G-V1 5G-M3 1-2-3-4-5-6-7-8-9-10 11-12-13 36-40-44-48-52-56-60-64 116-120-124-128- 132-136-140-144 149-153-157-161-165 Slovak 2G-E Republic: SK 5G-E 1-2-3-4-5-6-7-8-9-10 11-12-13 100-104-108-112-116132-136-140 South Africa: 2G-E ZA 5G-Z 1-2-3-4-5-6-7-8-9-1011-12-13 100-104-108-112-116132-136-140-149-153- 157-161-165 Sudan: SD 2G-E 5G-E 1-2-3-4-5-6-7-8-9-10-11-12-13 36-40-44-48-52-56-60-64100-104-108-112-116-132-136-140 Taiwan: TW 2G-Z 5G-B 1-2-3-4-5-6-7-8-9-10- 11 36-40-44-48-52-56-60-64100-104-108-112- 116-120-128-132 140-144-149-153-157-161-165 Thailand: TH 2G-E 5G-M3 1-2-3-4-5-6-7-8-9-10 11-12-13 36-40-44-48-52-56-60- 64116-120-124-128-132-136140-149- 153-157-161-165 Trinidad: TI 2G-A1 5G-M2 1-2-3-4-5-6-7-8-9-1011-12-13 100-104-108-112-116 124-128-132-136-140 Tunisia: TN 2G-E 5G-C1 1-2-3-4-5-6-7-8-9-1011-12-13 100-104-108-112-116132-136-140 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 314 Lightweight Access Points Configuring Country Code for Rest of the World (CLI) Country and Code Outdoor Power Outdoor Power Supported Channels Table Table 2.4 GHz 2.4-GHz 5-GHz Supported Channels 5 GHz Turkey: TR 2G-E 5G-E 1-2-3-4-56-7-8-9-10-11-12-13 100-104-108112-116-132-136-140 Ukraine: UA 2G-E 5G-E8 1-2-3-4-5-6-7-8-9-10- -- 11-12-13 United Arab 2G-E Emirates: AE 5G-E 1-2-3-4-5- 6-7-8 9-10-11-12-13 100-104-108112-116-132-136-140 United 2G-E Kingdom: GB 5G-E1 1-2-3-4-5-6-7-8-9-1011-12-13 100-104-108-112-116132-136-140 Uruguay: UY 2G-A 5G-A8 1-2-3-4-5-6-7-8-9-10-11 56-60-64-100-104-108112-116-132-140-149-153-157161-165 Venezuela: VE 2G-A 5G-A8 1-2-3-4-5-6-7-8-9-10- 11 36-40-44-48-52-56-60-64149-153-157-161-165 Vietnam: VN 2G-V1 5G-M2 1-2-3-4-5-6-7-8-9-1011-12-13 52-56-60-64-100-104112-116-124-128-132-136140-153- 157-161-165 Yemen: YE 2G-E 5G-E 1-2-3-4-5-6-7-8-9-10-11-12-13 36-40-44-48-52-56-60-64100-104-108-112-116-132-136-140 Zimbabwe: 2G-E ZW 5G-E 1-2-3-4-5-6-7-8-9-10-11-12-13 36-40-44-48-52-56-60-64100-104-108-112-116-132-136-140 Configuring Country Code for Rest of the World (CLI) This configuration is mandatory for the RoW. Follow the procedure given below to configure the country code. Before you begin · Before configuring the country code in the AP profile, ensure that the country is present in the global country list. If the configured country code is not present in the global list, the AP retains the previous country code configuration. In addition, the misconfigured operation triggers a default flag and brings the radio operations down. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 315 Configuring Country Code for Rest of the World (CLI) Lightweight Access Points · If the configured country code does not match with the regulatory domain of one or more radio slots, the AP retains the previous country code configuration. In addition, the misconfigured operation triggers a default flag and brings the radio operations down. · When a country is configured in an AP profile, a per AP country configuration on an AP mapped to that profile is not allowed. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap profile ap-profile Example: Device(config)# ap profile default-ap-profile Purpose Enters global configuration mode. Configures an AP profile and enters AP profile configuration mode. Note The Cisco Embedded Wireless Controller (EWC) supports only the default AP profile. Step 3 country code Example: Device(config-ap-profile)# country IN Sets the country code. Use the no form of this command to delete the country code. Note From Cisco IOS XE Bengaluru 17.6.1, the ap country code command was modified. The ap keyword was removed. The modified command is country code. Step 4 Step 5 end Example: Device(config-ap-profile)# end Returns to privileged EXEC mode. show ap profile name default-ap-profile detailed Displays the AP country code for the AP join profile. Example: Device# show ap profile name default-ap-profile detailed If a country is not configured in the AP join profile, the country code will be displayed as "Not configured". AP Profile Name default-ap-profile Description ap profile . . . Country code : The regulatory domain of RoW APs will be displayed as ROW. : default : IN Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 316 2 1 C H A P T E R Access Points Modes · Information about Sniffer, on page 318 · Information About XOR Radio Role Sniffer Support, on page 318 · Feature History for Sniffer Mode, on page 319 · Prerequisites for Sniffer, on page 319 · Restrictions on Sniffer, on page 319 · How to Configure Sniffer, on page 320 · Verifying Sniffer Configurations, on page 323 · Verifying XOR Radio Role Sniffer Configuration, on page 323 · Examples for Sniffer Configurations and Monitoring, on page 324 · Introduction to Monitor Mode, on page 324 · Enable Monitor Mode (GUI), on page 325 · Enable Monitor Mode (CLI), on page 325 · Feature History for Management Mode Migration in Cisco Catalyst Wireless 916X Access Points, on page 326 · Information About Management Mode Migration in Cisco Catalyst Wireless 916X Series Access Points, on page 326 · Regulatory Domain, on page 327 · Configuring Management Mode Migration (GUI), on page 331 · Configuring the AP Management Mode (CLI), on page 332 · Verifying the Management Mode Migration Details, on page 333 · Information About FlexConnect, on page 333 · Guidelines and Restrictions for FlexConnect, on page 337 · Configuring a Site Tag, on page 341 · Configuring a Policy Tag (CLI), on page 342 · Attaching a Policy Tag and a Site Tag to an Access Point (GUI), on page 343 · Attaching Policy Tag and Site Tag to an AP (CLI), on page 343 · Linking an ACL Policy to the Defined ACL (GUI), on page 344 · Applying ACLs on FlexConnect, on page 345 · Configuring FlexConnect, on page 346 · Flex AP Local Authentication (GUI), on page 352 · Flex AP Local Authentication (CLI), on page 353 · Flex AP Local Authentication with External Radius Server, on page 355 · Configuration Example: FlexConnect with Central and Local Authentication , on page 358 · NAT-PAT for FlexConnect, on page 358 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 317 Information about Sniffer Lightweight Access Points · Split Tunneling for FlexConnect, on page 362 · VLAN-based Central Switching for FlexConnect, on page 369 · OfficeExtend Access Points for FlexConnect, on page 371 · Proxy ARP, on page 376 · Overlapping Client IP Address in Flex Deployment, on page 377 · Information About FlexConnect High Scale Mode, on page 380 · Flex Resilient with Flex and Bridge Mode Access Points, on page 381 · Feature History for OEAP Link Test, on page 386 · Information About OEAP Link Test, on page 387 · Configuring OEAP Link Test (CLI), on page 387 · Performing OEAP Link Test (GUI), on page 388 · Verifying OEAP Link Test, on page 388 · Feature History for Cisco OEAP Split Tunneling, on page 388 · Information About Cisco OEAP Split Tunneling, on page 389 · Prerequisites for Cisco OEAP Split Tunneling, on page 390 · Restrictions for Cisco OEAP Split Tunneling, on page 390 · Use Cases for Cisco OEAP Split Tunneling, on page 391 · Workflow to Configure Cisco OEAP Split Tunneling, on page 391 · Create an IP Address ACL (CLI), on page 391 · Create a URL ACL (CLI), on page 392 · Add an ACL to a FlexConnect Profile, on page 393 · Enable Split Tunnelling in a Policy Profile, on page 394 · Verifying the Cisco OEAP Split Tunnel Configuration, on page 394 · AP Survey Mode, on page 395 Information about Sniffer The controller enables you to configure an access point as a network "sniffer", which captures and forwards all the packets on a particular channel to a remote machine that runs packet analyzer software. These packets contain information on time stamps, signal strength, packet sizes, and so on. Sniffers allow you to monitor and record network activity, and detect problems. The packet analyser machine configured receives the 802.11 traffic encapsulated using the Airopeek protocol from the controller management IP address with source port UDP/5555 and destination UDP/5000. You must use Clear in AP mode to return the AP back to client-serving mode, for example the local mode or flexconnect mode depending on the remote site tag configuration. Information About XOR Radio Role Sniffer Support The XOR radio in APs like Cisco 2800, 3800, 4800, and the 9100 series AP models support sniffer role in single radio interface. The XOR radio offers the ability to operate as a single radio interface in many modes. This eliminates the need to place the entire AP into a mode. When this concept is applied to a single radio level, it is termed as role. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 318 Lightweight Access Points Feature History for Sniffer Mode From this release onwards, Sniffer is the new supported role along with the Client Serving and Monitor roles. Note The radio role is supported in Local and FlexConnect modes. Feature History for Sniffer Mode This table provides release and related information for features explained in this module. These features are available on all releases subsequent to the one they were introduced in, unless noted otherwise. Table 23: Feature History for Sniffer Mode Release Cisco IOS XE 17.8.1 Feature Feature Information XOR Radio Role Sniffer Support on the Access Point The XOR radio in APs like Cisco 2800, 3800, 4800, and the 9100 series AP models support sniffer role in single radio interface. Prerequisites for Sniffer To perform sniffing, you need the following hardware and software: · A dedicated access point--An access point configured as a sniffer cannot simultaneously provide wireless access service on the network. To avoid disrupting coverage, use an access point that is not part of your existing wireless network. · A remote monitoring device--A computer capable of running the analyzer software. · Software and supporting files, plug-ins, or adapters--Your analyzer software may require specialized files before you can successfully enable. Restrictions on Sniffer · Supported third-party network analyzer software applications are as follows: · Wildpackets Omnipeek or Airopeek · AirMagnet Enterprise Analyzer · Wireshark · The latest version of Wireshark can decode the packets by going to the Analyze mode. Select decode as, and switch UDP5555 to decode as PEEKREMOTE.. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 319 How to Configure Sniffer Lightweight Access Points · Sniffer mode is not supported when the controller L3 interface is the Wireless Management Interface (WMI). · When an AP or a radio operates in the sniffer mode, irrespective of its current channel width settings, the AP sniffs or captures only on the primary channel. How to Configure Sniffer Configuring an Access Point as Sniffer (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Choose Configuration > Wireless > Access Points. On the General tab, update the name of the AP. The AP name can be ASCII characters from 33 to 126, without leading and trailing spaces. Specify the physical location where the AP is present. Choose the Admin Status as Enabled if the AP is to be in enabled state. Choose the mode for the AP as Sniffer. In the Tags section, specify the appropriate policy, site, and RF tags that you created on the Configuration > Tags & Profiles > Tags page. Note If the AP is in sniffer mode, you do not want to assign any tag. Click Update & Apply to Device. Choose the mode for the AP as Clear to return the AP back to the client-serving mode depending on the remote site tag configuration. Note All the radios will be set to manual mode when you change the AP mode to Sniffer mode. Simultaneously, a warning message will be displayed informing you to convert the radio submode back to AUTO, if required, while changing the mode from Sniffer to other. Configuring an Access Point as Sniffer (CLI) Procedure Step 1 Command or Action enable Example: Device>enable Step 2 ap name ap-name mode sniffer Purpose Enables privileged EXEC mode. Configures the access point as a sniffer. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 320 Lightweight Access Points Enabling or Disabling Sniffing on the Access Point (GUI) Command or Action Example: Device# ap name access1 mode sniffer Purpose Where, ap-name is the name of the Cisco lightweight access point. Use the no form of this command to disable the access point as a sniffer. Enabling or Disabling Sniffing on the Access Point (GUI) Before you begin Change the access point AP mode to sniffer mode. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Configuration > Wireless > Access Points. On the Access Points page, click the AP name from the 6 GHz, 5 GHz, or 2.4 GHz list. In the Role Assignment section, select the Assignment Method as Sniffer. In the Sniffer Channel Assignment section, check the Sniffer Channel Assignment checkbox to enable. Uncheck the checkbox to disable sniffing on the access point. From the Sniff Channel drop-down list, select the channel. Note By default, the Snif Channel is set to 36 for the 5 GHz and 1 for the 2.4 GHz. Enter the IP address in the Sniffer IP field. To validate the IP address, click Update & Apply to Device. If the IP address is valid, the Sniffer IP Status displays Valid. Click Update & Apply to Device. Enabling or Disabling Sniffing on the Access Point (CLI) Procedure Step 1 Command or Action enable Example: Device> enable Step 2 ap name ap-name sniff {dot116Ghz slot 3 channel server-ip-address | dot11a channel Purpose Enables privileged EXEC mode. Enables sniffing on the access point. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 321 Configuring XOR Radio Role Sniffer Support on the Access Point (CLI) Lightweight Access Points Step 3 Command or Action server-ip-address | dot11b channel server-ip-address | dual-band channel server-ip-address} Example: Device#ap name access1 sniff dot11b 1 9.9.48.5 Purpose · channel is the valid channel to be sniffed. For 802.11a, the range is 36 to 165. For 802.11b, the range is 1 to 14. For dot11 6Ghz, the range is between 1 and 233. · server-ip-address is the IP address of the remote machine running Omnipeek, Airopeek, AirMagnet, or Wireshark software. ap name ap-name no sniff {dot116Ghz | dot11a | dot11b | dual-band} Disables sniffing on the access point. Example: Device#ap name access1 no sniff dot116ghz Configuring XOR Radio Role Sniffer Support on the Access Point (CLI) Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. Step 2 ap name ap-name dot11 {5ghz | 24ghz} shutdown Shutdown the radio. Example: Device# ap name AP687D.B45C.189C dot11 5ghz shutdown Device# ap name AP687D.B45C.189C dot11 24ghz shutdown Step 3 ap name ap-name dot11 {5ghz | 24ghz} radio Enables XOR radio role Sniffer support on AP role manual sniffer channel channel-number from controller. ip ip-address Example: Device# ap name AP687D.B45C.189C dot11 5ghz radio role manual sniffer channel 100 ip 9.4.197.85 Where, · ap-name is the name of the Cisco lightweight access point. · channel-number is the channel number. Device# ap name AP687D.B45C.189C dot11 24ghz radio role manual sniffer channel 8 ip 9.4.197.85 Step 4 ap name ap-name no dot11 {5ghz | 24ghz} shutdown Example: Unshut the radio. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 322 Lightweight Access Points Verifying Sniffer Configurations Step 5 Command or Action Purpose Device# ap name AP687D.B45C.189C no dot11 5ghz shutdown Device# ap name AP687D.B45C.189C no dot11 24ghz shutdown end Example: Device# end Returns to privileged EXEC mode. Verifying Sniffer Configurations Table 24: Commands for verifying sniffer configurations Commands Description show ap name ap-name config dot11 {24ghz | 5ghz Displays the sniffing details. | 6ghz | dual-band} show ap name ap-name config slot slot-ID Displays the sniffing configuration details. slot-ID ranges from 0 to 3. All access points have slot 0 and 1. Verifying XOR Radio Role Sniffer Configuration To verify the XOR radio role sniffer configuration for a given AP, use the following command: Device# show ap name AP687D.B45C.189C config slot 0 Sniffing Sniff Channel Sniffer IP Sniffer IP Status ATF Mode ATE Optimization AP Submode Remote AP Debug Logging Trap Severity Level Software Version Boot Version Mini IOS Version Stats Reporting Period primary_discovery_timer LED State LED Flash State LED Flash Timer PoE Pre-Standard Switch PoE Power Injector MAC Address Power Type/Mode Number of Slots AP Model IOS Version : Enabled :6 : 9.4.197.85 : Valid : Disable : N/A : Not Configured : Disabled : information : 17.9.0.18 : 1.1.2.4 : 0.0.0.0 : 60 : 120 : Enabled : Enabled :0 : Disabled : Disabled : PoE/Full Power :4 : C9136I-B : 17.9.0.18 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 323 Examples for Sniffer Configurations and Monitoring Lightweight Access Points Reset Button AP Serial Number AP Certificate Type AP Certificate Expiry-time AP Certificate issuer common-name AP Certificate Policy AP CAPWAP-DTLS LSC Status Certificate status : Not Available AP 802.1x LSC Status Certificate status : Not Available AP User Name AP 802.1X User Mode AP 802.1X User Name Cisco AP System Logging Host AP Up Time AP CAPWAP Up Time Join Date and Time : Disabled : FOC25322JJZ : Manufacturer Installed Certificate : 08/09/2099 20:58:26 : High Assurance SUDI CA : Default : admin : Global : Not Configured : 255.255.255.255 : 4 hours 20 minutes 55 seconds : 4 hours 16 minutes 17 seconds : 01/19/2022 03:06:12 Attributes for Slot 0 Radio Type Radio Mode Radio Role Maximum client allowed Radio Role Op Radio SubType Administrative State Operation State : 802.11ax - 2.4 GHz : Sniffer : Sniffer : 400 : Manual : Main : Enabled : Up Examples for Sniffer Configurations and Monitoring This example shows how to configure an access point as Sniffer: Device# ap name access1 mode sniffer This example shows how to enable sniffing on the access point: Device# ap name access1 sniff dot11b 1 9.9.48.5 This example shows how to disable sniffing on the access point: Device# ap name access1 no sniff dot11b This example shows how to display the sniffing configuration details: Device# show ap name access1 config dot11 24ghz Device# show ap name access1 config slot 0 Introduction to Monitor Mode To optimize the monitoring and location calculation of RFID tags, you can enable tracking optimization on up to four channels within the 2.4-GHz band of an 802.11b/g/x access point radio. This feature allows you to scan only the channels on which tags are usually programmed to operate (such as channels 1, 6, and 11). Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 324 Lightweight Access Points Enable Monitor Mode (GUI) Note You can move an AP to a particular mode (sensor mode to local mode or flex mode) using the site tag with the corresponding mode. If the AP is not tagged to any mode, it will fall back to the mode specified in the default site tag. You must use clear in AP mode to return the AP back to client-serving mode, for example the local mode or flexconnect mode depending on the remote site tag configuration. Enable Monitor Mode (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Wireless > Access Points. In the Access Points page, expand the All Access Points section and click the name of the AP to edit. In the Edit AP page, click the General tab and from the AP Mode drop-down list, choose Monitor. Click Update & Apply to Device. Choose the mode for the AP as clear to return the AP back to the client-serving mode depending on the remote site tag configuration. Enable Monitor Mode (CLI) Procedure Step 1 Command or Action ap name ap-name mode monitor Example: Device# ap name 3602a mode monitor Purpose Enables monitor mode for the access point. Step 2 ap name ap-name monitor tracking-opt Example: Device# ap name 3602a monitor tracking-opt Configures the access point to scan only the Dynamic Channel Assignment (DCA) channels supported by its country of operation. Step 3 ap name ap-name monitor-mode dot11b fast-channel [first-channel second-channel third-channel fourth-channel ] Example: Device# ap name 3602a monitor dot11b 1 234 Chooses up to four specific 802.11b channels to be scanned by the access point. In the United States, you can assign any value from 1 to 11 (inclusive) to the channel variable. Other countries support additional channels. You must assign at least one channel. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 325 Feature History for Management Mode Migration in Cisco Catalyst Wireless 916X Access Points Lightweight Access Points Step 4 Step 5 Step 6 Command or Action Purpose ap name ap-name dot11 6ghz slot 3 radio role slot 3 radio role manual monitor manual monitor Configures the 802.11 6-Ghz radio role manual Example: monitor Device# ap name cisco-ap dot11 6ghz slot 3 radio role manual monitor show ap dot11 {24ghz | 5ghz | 6ghz} channel Shows configuration and statistics of 802.11a Example: or 802.11b or 6-GHz channel assignment. Device# show ap dot11 5ghz channel show ap dot11 6ghz summary Example: Device# show ap dot11 6ghz summary Shows configuration and statistics summary of 6 the GHz band Cisco APs. Feature History for Management Mode Migration in Cisco Catalyst Wireless 916X Access Points This table provides release and related information for the feature explained in this module. This feature is also available in all the releases subsequent to the one in which they are introduced in, unless noted otherwise. Table 25: Feature History for Management Mode Migration in Cisco Wireless Catalyst Wireless 916X Series Access Points Release Cisco IOS XE Cupertino 17.9.1 Feature Feature Information Management Mode Migration This feature allows you to convert the AP mode in Cisco Catalyst Wireless between DNA Management mode and Meraki 916X Series Access Points Management mode, depending on your requirements. Note The document explains the conversion from DNA Management mode to Meraki Management mode and not vice versa. Information About Management Mode Migration in Cisco Catalyst Wireless 916X Series Access Points Cisco Catalyst Wireless 916x APs (CW9164I-x and CW9166I-x) support both cloud and controller architecture. You can migrate between cloud and controller deployments, depending on your requirements. The CW916x APs join and operate either in the DNA Management mode or in the Meraki Management mode. You can configure the management mode migration with the help of CLI commands in the privileged EXEC mode, at the AP level, and from the controller GUI. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 326 Lightweight Access Points Regulatory Domain CW916x APs support dual-band slot 3 radios, which in turn support both 6-GHz and 5-GHz bands. Note The section explains the migration from DNA Management mode to the Meraki Management mode and not vice versa. Regulatory Domain For regulatory domain support, Cisco Catalyst 916x (CW916x) supports Rest of the World (RoW) and a few other fixed domains as shown here: · -B · -E · -A · -Z · -Q · -I · -R During the AP join flow, the regulatory domain details and the details of the country that is configured is passed on to the controller from the AP. The controller assigns or validates the right country of operation. After the country is validated based on the decision tree, the controller informs the AP about which country the AP should be configured with. The following are the scenarios that determine the country that an AP should be configured with: AP Configured with Non-RoW Regulatory Domain Case 1: AP does not report a country as part of the join procedure. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 327 Regulatory Domain Lightweight Access Points In the non-RoW regulatory domain, when an AP does not report a country as part of the join procedure, the following takes place: · AP profile has a country configured. · If the country configured in the AP profile is present in the global country list, and is valid as per the AP regulatory domain, the country that is configured in the AP profile is assigned to the AP. Radios become operational as per the country or regulatory domain support. · If the country configured the AP profile is not present in the global country list, and is not valid as per the AP regulatory domain, the AP is disconnected. · AP profile does not have a country configured. Find a valid country from the global country list (the first match), as per the AP regulatory domain. · If the country is found, the country is assigned to the AP and the radios become operational as per the country or regulatory domain support. · If the country is not found, the AP is disconnected. Case 2: AP reports a country as part of the join procedure. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 328 Lightweight Access Points Regulatory Domain In the non-RoW regulatory domain, when an AP reports a country as part of the join prcedure, the following takes place: · The AP profile has a country configured. · If the country configured in the AP profile is present in the global country list, and it is valid as per the AP regulatory domain, the country that is configured in the AP profile is assigned to the AP. Radios become operational as per the country or regulatory domain support. · If the country configured in the AP profile is not present in the global country list, and is not valid as per the AP regulatory domain, check the global country list to confirm if the country is present in the list. If the country is present in the global list, the AP retains the previous country configuration and the radios are not operational with the country misconfiguration flag set. If the country is not located in the global list, the AP is disconnected. · The AP profile does not have a country configured. · If the country reported by the AP is found in the global country list, and is valid as per the AP regulatory domain, the country is assigned to the AP and the radios become operational as per the country or regulatory domain support. · If the country is not present in the list, search for the first country match from the global list. If the country is found, the country is assigned to the AP and the radios become operational. If the country is not found, the AP is disconnected. AP Configured with RoW Regulatory Domain Case 1: The AP does not report a country as part of the join procedure. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 329 Regulatory Domain Lightweight Access Points In the RoW regulatory domain, when an AP does not report a country as part of the join procedure, the following takes place: · The AP profile has a country configured. · If the country configured in the AP profile is present in the global country list, and is valid as per the AP regulatory domain, country that is configured in the AP profile is assigned to the AP. Radios become operational as per the country or regulatory domain support. · If the country configured in the AP profile is not present in the global country list, and is not valid as per the AP regulatory domain, country is not assigned to the AP and radios are not operational, and the country misconfiguration flag is set. · If the AP profile does not have a country configured, the country is not assigned to the AP and radios are not operational, and the country misconfiguration flag is set. Case 2: The AP reports a country as part of the join procedure. In the RoW regulatory domain, when an AP reports a country as part of the join procedure, the following takes place: · The AP profile has a country configured. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 330 Lightweight Access Points Configuring Management Mode Migration (GUI) · If the country configured in the AP profile is present in the global country list, and it is valid as per the AP regulatory domain, the country that is configured in the AP profile is assigned to the AP. Radios become operational as per the country or regulatory domain support. · If the country configured in the AP profile is not present in the global country list, and is not valid as per the AP regulatory domain, the AP retains the previous country configuration and the radios are not operational with the country misconfiguration flag set. · The AP retains the previous country configuration and the radios are not operational with the country misconfiguration flag set. Configuring Management Mode Migration (GUI) Before you begin The country code must be configured on the AP profile. To configure the country code, navigate to Configuration > Tags & Profiles > AP Join page. Click an AP profile to edit. In the General tab, select the country code from the drop-down list. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Wireless > Migrate to Meraki Management Mode. Select the required APs by clicking on the check box(es), from the displayed APs. The Migrate to Meraki Management Mode button is enabled. Click Migrate to Meraki Management Mode button to perform a validation check on the selected APs. If the validation check is successful, the Next button is enabled. Click Next to start the process. On the Confirm Management Mode Migration window, do the following: a. Select the Agree and continue check box. b. Click Yes to confirm. The Management Mode Migration Successful section displays the APs that were migrated to the Meraki management mode. The Management Mode Migration Failed section displays the APs that were retained in DNA management mode. Click Restart Workflow to restart the workflow for APs that did not migrate from DNA management mode to Meraki management mode. Exporting Meraki Management Mode-Migrated APs (GUI) You can export the details about the Meraki management mode-migrated APs either from the Change to Meraki Persona tab after the workflow is completed or from the Previously changed APs tab. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 331 Configuring the AP Management Mode (CLI) Lightweight Access Points Procedure Step 1 Step 2 Step 3 Step 4 Command or Action Purpose Choose Configuration > Wireless > Migrate to Meraki Management Mode. Click the Export button to export the list of APs. Select whether you want to export only the current page or all pages. Click Yes to continue. On the Export window, select the export method. The available options are: · Serial Number · JSON · Export to Meraki Dashboard Note We recommend the Export to Meraki Dashboard option as you can directly export the migrated APs information into the Meraki Dashboard. Step 5 Click Copy to copy the migrated APs. Click Download and save the file location. Configuring the AP Management Mode (CLI) Before you begin · Ensure that the AP is Meraki-capable to run any of the EXEC commands. To view the list of Meraki-capable APs, use the show ap management-mode meraki capability summary command. Note If the country code is misconfigured, the change of management mode will not be allowed for any of the EXEC commands, except the force command. If the regulatory domain is misconfigured for any slot, the change of management mode is not allowed for any of the EXEC commands, except the force command. Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter the password, if prompted. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 332 Lightweight Access Points Verifying the Management Mode Migration Details Step 2 Step 3 Command or Action Purpose ap name Cisco-AP-name management-mode Changes the AP management mode to Meraki. meraki [force ] [noprompt] Here, force skips the validations at the Example: controller and attempts Meraki management Device# ap name Cisco-AP-name mode change at the AP. management-mode meraki Device# ap name Cisco-AP-name management-mode meraki force noprompt skips the user prompt for attempting AP management mode change. Device# ap name Cisco-AP-name management-mode meraki noprompt Device# ap name Cisco-AP-name management-mode meraki force noprompt (Optional) clear ap meraki stats Example: Device# clear ap meraki stats Clears the Meraki AP-related data. Verifying the Management Mode Migration Details To view the summary of the Meraki-capable AP information, run the following command: Device# show ap management-mode meraki capability summary AP Name AP Model Radio MAC MAC Address AP Serial Number Meraki Serial Number ----------------------------------------------------------------------------------------------------------------------------------- APXXXD.BXXX.1XXX CW9162I 6XXd.bXXe.eXX0 6XXd.bXXe.eXX0 FOCXXXXXB90 FOCXXXXXB90 To view the failure summary of the AP along with the migration attempt timestamp, run the following command: Device# show ap management-mode meraki failure summary AP Name AP Model Radio MAC MAC Address Conversion Attempt AP Serial Number Meraki Serial Number Reason Code ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- APXXXD.BXXC.1 CW9162I 6XXd.bXXe.eXX0 6XXd.bXXe.eXX0 03/03/2022 17:17:42 IST FOCXXXXXB90 FOCXXXXXB90 Regulatory domain not set To view the successful Meraki management mode migration attempts of all the APs, run the following command: Device# show ap management-mode meraki change summary AP Name AP Model Radio MAC MAC Address Conversion Timestamp AP Serial Number Meraki Serial Number --------------------------------------------------------------------------------------------------------------------------------------------------------------------- APXXXX.3XXX.EXXX CW9166I-B 1XXX.2XXX.1100 ccXX.3XXX.eXX0 05/02/2022 07:48:56 CST KWC2XXXXX5G Q5XX-4XXX-K7XX Information About FlexConnect FlexConnect is a wireless solution for branch office and remote office deployments. It enables customers to configure and control access points (AP) in a branch or remote office from the corporate office through a wide area network (WAN) link without deploying a controller in each office. The FlexConnect access points Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 333 Information About FlexConnect Lightweight Access Points can also switch client data traffic locally and perform client authentication locally when their connection to the controller is lost. When they are connected to the controller, they can also send traffic back to the controller. FlexConnect access points support multiple SSIDs. In the connected mode, the FlexConnect access point can also perform local authentication. Figure 16: FlexConnect Deployment The controller software has a more robust fault tolerance methodology to FlexConnect access points. In previous releases, whenever a FlexConnect access point disassociates from a controller, it moves to the standalone mode. The clients that are centrally switched are disassociated. However, the FlexConnect access point continues to serve locally switched clients. When the FlexConnect access point rejoins the controller (or a standby controller), all the clients are disconnected and are authenticated again. This functionality has been enhanced and the connection between the clients and the FlexConnect access points are maintained intact and the clients experience seamless connectivity. When both the access point and the controller have the same configuration, the connection between the clients and APs is maintained. After the client connection is established, the controller does not restore the original attributes of the client. The client username, current rate and supported rates, and listen interval values are reset to the default or new configured values only after the session timer expires. The controller can send multicast packets in the form of unicast or multicast packets to an access point. In FlexConnect mode, an access point can receive only multicast packets. In Cisco Catalyst 9800 Series Wireless Controller, you can define a flex connect site. A flex connect site can have a flex connect profile associate with it. You can have a maximum of 100 access points for each flex connect site. FlexConnect access points support a 1-1 network address translation (NAT) configuration. They also support port address translation (PAT) for all features except true multicast. Multicast is supported across NAT boundaries when configured using the Unicast option. FlexConnect access points also support a many-to-one NAT or PAT boundary, except when you want true multicast to operate for all centrally switched WLANs. Workgroup bridges and Universal Workgroup bridges are supported on FlexConnect access points for locally switched clients. FlexConnect supports IPv6 clients by bridging the traffic to local VLAN, similar to an IPv4 operation. FlexConnect supports Client Mobility for a group of up to 100 access points. An access point does not have to reboot when moving from local mode to FlexConnect mode and vice-versa. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 334 Lightweight Access Points FlexConnect Authentication FlexConnect Authentication When an access point boots up, it looks for a controller. If it finds one, it joins the controller, downloads the latest software image and configuration from the controller, and initializes the radio. It saves the downloaded configuration in nonvolatile memory for use in standalone mode. Note Once the access point is rebooted after downloading the latest controller software, it must be converted to the FlexConnect mode. Note 802.1X is not supported on the AUX port for Cisco Aironet 2700 series APs. A FlexConnect access point can learn the controller IP address in one of these ways: · If the access point has been assigned an IP address from a DHCP server, it can discover a controller through the regular CAPWAP or LWAPP discovery process. Note OTAP is not supported. · If the access point has been assigned a static IP address, it can discover a controller through any of the discovery process methods except DHCP option 43. If the access point cannot discover a controller through Layer 3 broadcast, we recommend DNS resolution. With DNS, any access point with a static IP address that knows of a DNS server can find at least one controller. · If you want the access point to discover a controller from a remote network where CAPWAP or LWAPP discovery mechanisms are not available, you can use priming. This method enables you to specify (through the access point CLI) the controller to which the access point is to connect. Note The LEDs on the access point change as the device enters different FlexConnect modes. See the hardware installation guide for your access point for information on LED patterns. When a client associates to a FlexConnect access point, the access point sends all authentication messages to the controller and either switches the client data packets locally (locally switched) or sends them to the controller (centrally switched), depending on the WLAN configuration. With respect to client authentication (open, shared, EAP, web authentication, and NAC) and data packets, the WLAN can be in any one of the following states depending on the configuration and state of controller connectivity: Note For the FlexConnect local switching, central authentication deployments, whenever passive client is enabled, the IP Learn timeout is disabled by default. · central authentication, central switching--In this state, the controller handles client authentication, and all client data is tunneled back to the controller. This state is valid only in connected mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 335 FlexConnect Authentication Lightweight Access Points · central authentication, local switching--In this state, the controller handles client authentication, and the FlexConnect access point switches data packets locally. After the client authenticates successfully, the controller sends a configuration command with a new payload to instruct the FlexConnect access point to start switching data packets locally. This message is sent per client. This state is applicable only in connected mode. · local authentication, local switching--In this state, the FlexConnect access point handles client authentication and switches client data packets locally. This state is valid in standalone mode and connected mode. In connected mode, the access point provides minimal information about the locally authenticated client to the controller. The following information is not available to the controller: · Policy type · Access VLAN · VLAN name · Supported rates · Encryption cipher Local authentication is useful where you cannot maintain a remote office setup of a minimum bandwidth of 128 kbps with the round-trip latency no greater than 100 ms and the maximum transmission unit (MTU) no smaller than 576 bytes. In local authentication, the authentication capabilities are present in the access point itself. Local authentication reduces the latency requirements of the branch office. · Notes about local authentication are as follows: · Guest authentication cannot be done on a FlexConnect local authentication-enabled WLAN. · Local RADIUS on the controller is not supported. · Once the client has been authenticated, roaming is only supported after the controller and the other FlexConnect access points in the group are updated with the client information. · authentication down, switch down--In this state, the WLAN disassociates existing clients and stops sending beacon and probe requests. This state is valid in both standalone mode and connected mode. · authentication down, local switching--In this state, the WLAN rejects any new clients trying to authenticate, but it continues sending beacon and probe responses to keep existing clients alive. This state is valid only in standalone mode. When a FlexConnect access point enters standalone mode, WLANs that are configured for open, shared, WPA-PSK, or WPA2-PSK authentication enter the "local authentication, local switching" state and continue new client authentications. This configuration is also correct for WLANs that are configured for 802.1X, WPA-802.1X, WPA2-802.1X, or Cisco Centralized Key Management, but these authentication types require that an external RADIUS server be configured. Other WLANs enter either the "authentication down, switching down" state (if the WLAN was configured for central switching) or the "authentication down, local switching" state (if the WLAN was configured for local switching). When FlexConnect access points are connected to the controller (rather than in standalone mode), the controller uses its primary RADIUS servers and accesses them in the order specified on the RADIUS Authentication Servers page or in the config radius auth add CLI command (unless the server order is overridden for a Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 336 Lightweight Access Points Guidelines and Restrictions for FlexConnect particular WLAN). However, to support 802.1X EAP authentication, FlexConnect access points in standalone mode need to have their own backup RADIUS server to authenticate clients. Note A controller does not use a backup RADIUS server. The controller uses the backup RADIUS server in local authentication mode. You can configure a backup RADIUS server for individual FlexConnect access points in standalone mode by using the controller CLI or for groups of FlexConnect access points in standalone mode by using either the GUI or CLI. A backup server configured for an individual access point overrides the backup RADIUS server configuration for a FlexConnect. When web-authentication is used on FlexConnect access points at a remote site, the clients get the IP address from the remote local subnet. To resolve the initial URL request, the DNS is accessible through the subnet's default gateway. In order for the controller to intercept and redirect the DNS query return packets, these packets must reach the controller at the data center through a CAPWAP connection. During the web-authentication process, the FlexConnect access points allows only DNS and DHCP messages; the access points forward the DNS reply messages to the controller before web-authentication for the client is complete. After web-authentication for the client is complete, all the traffic is switched locally. When a FlexConnect access point enters into a standalone mode, the following occurs: · The access point checks whether it is able to reach the default gateway via ARP. If so, it will continue to try and reach the controller. If the access point fails to establish the ARP, the following occurs: · The access point attempts to discover for five times and if it still cannot find the controller, it tries to renew the DHCP on the ethernet interface to get a new DHCP IP. · The access point will retry for five times, and if that fails, the access point will renew the IP address of the interface again, this will happen for three attempts. · If the three attempts fail, the access point will fall back to the static IP and will reboot (only if the access point is configured with a static IP). · Reboot is done to remove the possibility of any unknown error the access point configuration. Once the access point reestablishes a connection with the controller, it disassociates all clients, applies new configuration information from the controller, and allows client connectivity again. Guidelines and Restrictions for FlexConnect · FlexConnect mode can support only 16 VLANs per AP. · You can deploy a FlexConnect access point with either a static IP address or a DHCP address. In the context of DHCP, a DHCP server must be available locally and must be able to provide the IP address for the access point at bootup. · FlexConnect supports up to 4 fragmented packets, or a minimum 576-byte maximum transmission unit (MTU) WAN link. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 337 Guidelines and Restrictions for FlexConnect Lightweight Access Points · Round-trip latency must not exceed 300 milliseconds (ms) between the access point and the controller, and CAPWAP control packets must be prioritized over all other traffic. In scenarios where you cannot achieve the 300-ms round-trip latency, configure the access point to perform local authentication. · Client connections are restored only for locally switched clients that are in the RUN state when the access point moves from standalone mode to connected mode. After the access point moves, the access point's radio is also reset. · When multiple APs come from standalone mode to connected mode on flexconnect and all the APs send the client entry in hybrid-REAP payload to the controller. In this scenario, the controller sends disassociation messages to the WLAN client. However, the WLAN client comes back successfully and joins the controller. · When APs are in standalone mode, if a client roams to another AP, the source AP cannot determine whether the client has roamed or is just idle. So, the client entry at source AP will not be deleted until idle timeout. · The configuration on the controller must be the same between the time the access point went into standalone mode and the time the access point came back to connected mode. Similarly, if the access point is falling back to a secondary or backup controller, the configuration between the primary and the secondary or backup controller must be the same. · A newly connected access point cannot be booted in FlexConnect mode. · FlexConnect mode requires that the client send traffic before learning the client's IPv6 address. Compared to in local mode where the controller learns the IPv6 address by snooping the packets during Neighbor Discovery to update the IPv6 address of the client. · 802.11r fast transition roaming is not supported on APs operating in local authentication. · The primary and secondary controllers for a FlexConnect access point must have the same configuration. Otherwise, the access point might lose its configuration, and certain features, such as WLAN overrides, VLANs, static channel number, and so on, might not operate correctly. In addition, make sure you duplicate the SSID of the FlexConnect access point and its index number on both controllers. · If you configure a FlexConnect access point with a syslog server configured on the access point, after the access point is reloaded and the native VLAN other than 1, at the time of initialization, a few syslog packets from the access point are tagged with VLAN ID 1. · MAC filtering is not supported on FlexConnect access points in standalone mode. However, MAC filtering is supported on FlexConnect access points in connected mode with local switching and central authentication. Also, Open SSID, MAC Filtering, and RADIUS NAC for a locally switched WLAN with FlexConnect access points is a valid configuration, where MAC is checked by Cisco ISE. · FlexConnect does not display any IPv6 client addresses in the Client Detail window. · FlexConnect access points with locally switched WLANs cannot perform IP source guard and prevent ARP spoofing. For centrally switched WLANs, the wireless controller performs IP source guard and ARP spoofing. · To prevent ARP spoofing attacks in FlexConnect APs with local switching, we recommend that you use ARP inspection. · Passive client feature is not supported on FlexConnect local switching mode. · Proxy ARP for VM clients (with any wireless host) does not work since the client includes many IP addresses for the same MAC. To avoid this issue, disable the ARP-caching option in the Flex profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 338 Lightweight Access Points Guidelines and Restrictions for FlexConnect · When you enable local switching on policy profile for FlexConnect APs, the APs perform local switching. However, for the APs in local mode, central switching is performed. In a scenario where the roaming of a client between FlexConnect mode AP and Local mode AP is not supported, the client may not get the correct IP address due to VLAN difference after the move. Also, L2 and L3 roaming between FlexConnect mode AP and Local mode AP are not supported. FlexConnect local switching is not supported on Cisco Aironet Cisco 1810T and 1815T (Teleworker) Access Points. · Cisco Centralized Key Management (CCKM) is not supported in FlexConnect standalone mode. Hence, CCKM enabled client will not be able to connect when AP is in FlexConnect standalone mode. · For Wi-Fi Protected Access Version 2 (WPA2) in FlexConnect standalone mode or local authentication in connected mode or Cisco Centralized Key Management fast roaming in connected mode, only Advanced Encryption Standard (AES) is supported. · For Wi-Fi Protected Access (WPA) in FlexConnect standalone mode or local-auth in connected mode or Cisco Centralized Key Management fast-roaming in connected mode, only Temporal Key Integrity Protocol (TKIP) is supported. · WPA2 with TKIP and WPA with AES is not supported in standalone mode, local-auth in connected mode, and Cisco Centralized Key Management fast-roaming in connected mode. · Only open, WPA (PSK and 802.1x), and WPA2 (AES) authentication is supported on the Cisco Aironet 1830 Series and 1850 Series APs. · Only 802.11r fast-transition roaming is supported on the Cisco Aironet 1830 Series and 1850 Series APs. · AVC on locally switched WLANs is supported on second-generation APs. · Local authentication fallback is not supported when a user is not available in the external RADIUS server. · For WLANs configured for FlexConnect APs in local switching and local authentication, synchronization of dot11 client information is supported. · DNS override is not supported on the Cisco Aironet 1830 Series and 1850 Series APs. · The Cisco Aironet 1830 Series and 1850 Series APs do not support IPv6. However, a wireless client can pass IPv6 traffic across these APs. · VLAN group is not supported in Flex mode under flex-profile. · Configuring maximum number of allowed media streams on individual client or radio is not supported in FlexConnect mode. · The WLAN client association limit will not work when the AP is in FlexConnect mode (connected or standalone) and is performing local switching and local authentication. · A local switching client on FlexConnect mode will not get IP address for RLAN profile on the Cisco Aironet 1810 Series AP. · Standard ACL is not supported on FlexConnect AP mode. · IPv6 RADIUS Server is not configurable for FlexConnect APs. Only IPv4 configuration is supported. · In Flex mode, IPv4 ACLs configured on WLAN gets pushed to AP but IPv6 ACLs does not. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 339 Guidelines and Restrictions for FlexConnect Lightweight Access Points · The client delete reason counters that are a part of the show wireless stats client delete reasons command, will be incremented only when the client record entry persists for join. For example, when an AP in the FlexConnect mode performs local authentication with ACL mismatch, then the AP deletes the client, and the controller does not create any client record. · Cisco Centralized Key Management (CCKM) is supported in wave 1 APs in FlexConnect when you use local association. · If the client roams from one AP to another and the roaming is successful, the following occurs: · The client does not send any traffic to the new AP. · The client's state is IP LEARN pending. · The client is deauthenticated after 180 seconds, if there is no traffic for the entire duration. In case the DHCP Required flag is set, the deuathentication occurs after 60 seconds. · Using custom VLANs under the policy profile of the FlexConnect locally switched WLANs stops the SSID broadcast. In such scenarios, run the shut and no shut commands on the policy profile to start the SSID broadcast. SSIDs are broadcasted when you: · Perform VLAN name to id mapping under FlexConnect profile and map the custom VLAN name under the policy profile. · Use VLAN id or standard VLAN name, for example, VLANxxxx. · In the FlexConnect mode, the group temporal key (GTK) timer is set to 3600 seconds by default on Cisco Wave 2 AP, and this value cannot be reconfigured. · For Flex mode deployments, local association configured policy profiles are not supported at a given time on the WLAN. Only the local association command must be enabled. · From Cisco IOS XE Amsterdam 17.1.1 release onwards, the police rate per client in the flex connect APs in the controller, is represented as rate_out for Ingress (input) and rate_in for Egress (output). To verify police rate on the flex AP, use the show rate-limit client command. · FlexConnect APs do not forward the DHCP packets after Change of Authorization (CoA) and change of VLANs using 802.1X encryption. You must disconnect the client from the WLAN and reconnect the client to enable the client to get an IP address in the second VLAN. · Cisco Wave 2 and Catalyst Wi-Fi6 APs in FlexConnect local switching mode do not support Layer2(PSK, 802.1X) + Layer3(LWA, CWA, redirection-based posturing) + Dynamic AAA override + NAC. · In Cisco Catalyst 9136I APs, in FlexConnect local authentication, the ongoing session timeout for a client gets reset after every roam. · Network access control (NAC) is not supported in FlexConnect local authentication. · Multicast traffic on an AAA overridden VLAN is not supported. Using this configuration may result in potential traffic leaks between VLANs. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 340 Lightweight Access Points Configuring a Site Tag Configuring a Site Tag Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless tag site site-name Example: Device(config)# wireless tag site default-site-tag Configures site tag and enters site tag configuration mode. Step 3 flex-profile flex-profile-name Example: Device(config-site-tag)# flex-profile rr-xyz-flex-profile Maps a flex profile to a site tag. Step 4 ap-profile ap-profile Example: Device(config-site-tag)# ap-profile xyz-ap-profile Assigns an AP profile to the wireless site. Step 5 description site-tag-name Example: Device(config-site-tag)# description "default site tag" Adds a description for the site tag. Step 6 no local-site Moves the access point to FlexConnect mode. Example: Device(config-site-tag)# no local-site Step 7 end Example: Device(config-site-tag)# end Saves the configuration, exits the configuration mode, and returns to privileged EXEC mode. Step 8 show wireless tag site summary (Optional) Displays the summary of site tags. Example: Device# show wireless tag site summary Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 341 Configuring a Policy Tag (CLI) Lightweight Access Points Configuring a Policy Tag (CLI) Follow the procedure given below to configure a policy tag: Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. · Enter your password if prompted. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 wireless tag policy policy-tag-name Configures policy tag and enters policy tag Example: configuration mode. Device(config-policy-tag)# wireless tag Note policy default-policy-tag When performing LWA, the clients connected to a controller gets disconnected intermittently before session timeout. Step 4 Step 5 Step 6 description description Adds a description to a policy tag. Example: Device(config-policy-tag)# description "default-policy-tag" remote-lan name policy profile-policy-name Maps a remote-LAN profile to a policy profile. {ext-module| port-id } Example: Device(config-policy-tag)# remote-lan rr-xyz-rlan-aa policy rr-xyz-rlan-policy1 port-id 2 wlan wlan-name policy profile-policy-name Example: Device(config-policy-tag)# wlan rr-xyz-wlan-aa policy rr-xyz-policy-1 Maps a policy profile to a WLAN profile. Note Ensure that the WLAN profile is not used by any other profiles. If the AP uses the default profile, ensure that the no central switching command is configured on other profiles. Step 7 end Example: Device(config-policy-tag)# end Exits policy tag configuration mode, and returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 342 Lightweight Access Points Attaching a Policy Tag and a Site Tag to an Access Point (GUI) Step 8 Command or Action Purpose show wireless tag policy summary (Optional) Displays the configured policy tags. Example: Note Device# show wireless tag policy summary To view detailed information about a policy tag, use the show wireless tag policy detailed policy-tag-name command. Attaching a Policy Tag and a Site Tag to an Access Point (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Wireless > Access Points. Click the Access Point name. Go to the Tags section. Choose the Policy Tag from the Policy drop-down list. Choose the Site Tag from the Site drop-down list. Click Update and Apply to Device. Attaching Policy Tag and Site Tag to an AP (CLI) Follow the procedure given below to attach a policy tag and a site tag to an AP: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap mac-address Example: Device(config)# ap F866.F267.7DFB Purpose Enters global configuration mode. Configures a Cisco AP and enters AP profile configuration mode. Note The mac-address should be a wired mac address. Step 3 policy-tag policy-tag-name Example: Device(config-ap-tag)# policy-tag rr-xyz-policy-tag Maps a policy tag to the AP. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 343 Linking an ACL Policy to the Defined ACL (GUI) Lightweight Access Points Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action site-tag site-tag-name Example: Device(config-ap-tag)# site-tag rr-xyz-site Purpose Maps a site tag to the AP. rf-tag rf-tag-name Example: Device(config-ap-tag)# rf-tag rf-tag1 Associates the RF tag. end Example: Device(config-ap-tag)# end Saves the configuration, exits configuration mode, and returns to privileged EXEC mode. show ap tag summary Example: Device# show ap tag summary (Optional) Displays AP details and the tags associated to it. show ap name <ap-name> tag info Example: Device# show ap name ap-name tag info (Optional) Displays the AP name with tag information. show ap name <ap-name> tag detail Example: (Optional) Displays the AP name with tag detals. Device# show ap name ap-name tag detail Linking an ACL Policy to the Defined ACL (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Tags & Profiles > Flex. Click Add. In the General tab, enter the Name of the Flex Profile. The name can be ASCII characters from 32 to 126, without leading and trailing spaces. In the Policy ACL tab, click Add. Select the ACL from the ACL Name drop-down list and click Save. Click Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 344 Lightweight Access Points Applying ACLs on FlexConnect Applying ACLs on FlexConnect Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile flex flex-profile-name Example: Device(config)# wireless profile flex Flex-profile-1 Configures a wireless flex profile and enters wireless flex profile configuration mode. Step 3 acl-policy acl-policy-name Example: Device(config-wireless-flex-profile)# acl-policy ACL1 Configures an ACL policy. Access control lists (ACLs) perform packet filtering to control the movement of packets through a network. Step 4 exit Example: Returns to wireless flex profile configuration mode. Device(config-wireless-flex-profile-acl)# exit Step 5 native-vlan-id Example: Device(config-wireless-flex-profile)# native-vlan-id 25 Configures native vlan-id information. Step 6 vlan vlan-name Example: Device(config-wireless-flex-profile)# vlan-name VLAN0169 Configures a VLAN. Step 7 acl acl-name Configures an ACL for the interface. Example: Device(config-wireless-flex-profile-vlan)# acl ACL1 Step 8 vlan-idvlan-id Configures VLAN information. Example: Device(config-wireless-flex-profile-vlan)# vlan-id 169 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 345 Configuring FlexConnect Lightweight Access Points Configuring FlexConnect Configuring a Switch at a Remote Site Procedure Step 1 Step 2 Attach the access point, which will be enabled for FlexConnect, to a trunk or access port on the switch. Note The sample configuration in this procedure shows the FlexConnect access point connected to a trunk port on the switch. The following example configuration shows you how to configure a switch to support a FlexConnect access point. In this sample configuration, the FlexConnect access point is connected to the trunk interface FastEthernet 1/0/2 with native VLAN 100. The access point needs IP connectivity on the native VLAN. The remote site has local servers or resources on VLAN 101. A DHCP pool is created in the local switch for both the VLANs in the switch. The first DHCP pool (NATIVE) is used by the FlexConnect access point, and the second DHCP pool (LOCAL-SWITCH) is used by the clients when they associate to a WLAN that is locally switched. . . . ip dhcp pool NATIVE network 209.165.200.224 255.255.255.224 default-router 209.165.200.225 dns-server 192.168.100.167 ! ip dhcp pool LOCAL-SWITCH network 209.165.201.224 255.255.255.224 default-router 209.165.201.225 dns-server 192.168.100.167 ! interface Gig1/0/1 description Uplink port no switchport ip address 209.165.202.225 255.255.255.224 ! interface Gig1/0/2 description the Access Point port switchport trunk encapsulation dot1q switchport trunk native vlan 100 switchport trunk allowed vlan 101 switchport mode trunk ! interface Vlan100 ip address 209.165.200.225 255.255.255.224 ! interface Vlan101 ip address 209.165.201.225 255.255.255.224 end ! . Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 346 Lightweight Access Points Configuring the Controller for FlexConnect . . Configuring the Controller for FlexConnect You can configure the controller for FlexConnect in two environments: · Centrally switched WLAN · Locally switched WLAN The controller configuration for FlexConnect consists of creating centrally switched and locally switched WLANs. This table shows three WLAN scenarios. Table 26: WLAN Scenarios WLAN Security Employee WPA1+WPA2 Employee-local WPA1+WPA2 (PSK) Guest-central Web authentication Employee-local-auth WPA1+WPA2 Authentication Switching Interface Mapping (GUEST VLAN) Central Central Management (centrally switched GUEST VLAN) Local Local 101 (locally switched GUEST VLAN) Central Central Management (centrally switched GUEST VLAN) Local Local 101 (locally switched VLAN) Configuring Local Switching in FlexConnect Mode (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Tags & Profiles > Policy. On the Policy Profile page, click the name of a policy profile to edit it or click Add to create a new one. In the Add/Edit Policy Profile window that is displayed, uncheck the Central Switching check box. Click Update & Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 347 Configuring Local Switching in FlexConnect Mode (CLI) Lightweight Access Points Configuring Local Switching in FlexConnect Mode (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless profile policy profile-policy Example: Device(config)# wireless profile policy rr-xyz-policy-1 Step 3 no central switching Example: Device(config-wireless-policy)# no central switching Step 4 end Example: Device(config)# end Purpose Enters global configuration mode. Configures WLAN policy profile and enters the wireless policy configuration mode. Configures the WLAN for local switching. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Central Switching in FlexConnect Mode (GUI) Before you begin Ensure that the policy profile is configured. If the policy profile is not configured, see Configuring a Policy Profile (GUI) section. Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Tags & Profiles > Policy. On the Policy Profile page, select a policy. In the Edit Policy Profile window, in General Tab, use the slider to enable or disable Central Switching. Click Update & Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 348 Lightweight Access Points Configuring Central Switching in FlexConnect Mode Configuring Central Switching in FlexConnect Mode Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-policy Example: Device(config)# wireless profile policy rr-xyz-policy-1 Configures WLAN policy profile and enters the wireless policy configuration mode. Step 3 central switching Configures the WLAN for central switching. Example: Device(config-wireless-policy)# central switching Step 4 end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring an Access Point for FlexConnect For more information, see Configuring a Site Tag (CLI) topic in New Configuration Model chapter. Configuring an Access Point for Local Authentication on a WLAN (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Tags & Profiles > Policy. In the Policy Profile page, select a policy profile name. The Edit Policy Profile window is displayed. In the General tab, deselect Central Authentication check box. Click Update & Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 349 Configuring an Access Point for Local Authentication on a WLAN (CLI) Lightweight Access Points Configuring an Access Point for Local Authentication on a WLAN (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless profile policy profile-policy Example: Device(config)# wireless profile policy rr-xyz-policy-1 Step 3 no central authentication Example: Device(config-wireless-policy)# no central authentication Step 4 end Example: Device(config)# end Purpose Enters global configuration mode. Configures WLAN policy profile and enters the wireless policy configuration mode. Configures the WLAN for local authentication. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Connecting Client Devices to WLANs Follow the instructions for your client device to create profiles to connect to the WLANs you created, as specified in the Configuring the Controller for FlexConnect, on page 347 . In the example scenarios (see Configuring the Controller for FlexConnect, on page 347), there are three profiles on the client: 1. To connect to the employee WLAN, create a client profile that uses WPA or WPA2 with PEAP-MSCHAPV2 authentication. After the client is authenticated, the client is allotted an IP address by the management VLAN of the controller . 2. To connect to the local-employee WLAN, create a client profile that uses WPA or WPA2 authentication. After the client is authenticated, the client is allotted an IP address by VLAN 101 on the local switch. 3. To connect to the guest-central WLAN, create a client profile that uses open authentication. After the client is authenticated, the client is allocatted an IP address by VLAN 101 on the network local to the access point. After the client connects, a local user can enter any HTTP address in the web browser. The user is automatically directed to the controller to complete the web authentication process. When the web login window appears, the user should enter the username and password. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 350 Lightweight Access Points Configuring FlexConnect Ethernet Fallback Configuring FlexConnect Ethernet Fallback Information About FlexConnect Ethernet Fallback You can configure an AP to shut down its radio when the Ethernet link is not operational. When the Ethernet link comes back to operational state, you can configure the AP to set its radio back to operational state. This feature is independent of the AP being in connected or standalone mode. When the radios are shut down, the AP does not broadcast the WLANs, and therefore, the clients cannot connect to the AP, either through first association or through roaming. Configuring FlexConnect Ethernet Fallback Before you begin This feature is not applicable to APs with multiple ports. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile flex flex-profile-name Example: Device(config)# wireless profile flex test Configures a wireless flex profile and enters wireless flex profile configuration mode. Step 3 fallback-radio-shut Example: Device(config-wireless-flex-profile)# fallback-radio-shut Enables radio interface shutdown. Step 4 end Example: Device(config-wireless-flex-profile)# end Exits configuration mode and returns to privileged EXEC mode. Step 5 show wireless profile flex detailed flex-profile-name Example: Device# show wireless profile flex detailed test (Optional) Displays detailed information about the selected profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 351 Flex AP Local Authentication (GUI) Lightweight Access Points Flex AP Local Authentication (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Tags & Profiles > Flex. In the Flex page, click the name of the Flex Profile or click Add to create a new one. In the Add/Edit Flex Profle window that is displayed, click the Local Authentication tab. When local authentication and association is enabled in Access Point with Flex mode, the following occurs: · AP handles the authentication. · AP handles the rejection of client joins (in Mobility). Note The controller does not increment statistics when AP rejects client association. Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Choose the server group from the RADIUS Server Group drop-down list. Use the Local Accounting Radius Server Group drop down to select the RADIUS server group. Check the Local Client Roaming check box to enable client roaming. Choose the profile from the EAP Fast Profile drop-down list. Choose to enable or disable the following: · LEAP: Lightweight Extensible Authentication Protocol (LEAP) is an 802.1X authentication type for wireless LANs and supports strong mutual authentication between the client and a RADIUS server using a logon password as the shared secret. It provides dynamic per-user, per-session encryption keys. · PEAP: Protected Extensible Authentication Protocol (PEAP) is a protocol that encapsulates the Extensible Authentication Protocol (EAP) within an encrypted and authenticated Transport Layer Security (TLS) tunnel. · TLS: Transport Layer Security (TLS) is a cryptographic protocol that provide communications security over a computer network. · RADIUS: Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA or Triple A) management for users who connect and use a network service. In the Users section, click Add. Enter username and password details and click Save. Click Save & Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 352 Lightweight Access Points Flex AP Local Authentication (CLI) Flex AP Local Authentication (CLI) Note The Cisco Catalyst 9800 Series Wireless Controller + FlexConnect local authentication + AP acting as RADIUS are not supported on Cisco COS and IOS APs. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action aaa new-model Example: Device(config)# aaa new-model Purpose Creates a AAA authentication model. aaa session-id common Example: Device(config)# aaa session-id common Ensures that all the session IDs information that is sent out from the RADIUS group for a given call are identical. dot1x system-auth-control Example: Device(config)# dot1x system-auth-control Enables system authorization control for the RADIUS group. eap profile name Creates an EAP profile. Example: Device(config)# eap profile aplocal-test method fast Configures the FAST method on the profile. Example: Device(config-eap-profile)# method fast exit Example: Device(config-radius-server)# exit Returns to configuration mode. wireless profile flex flex-profile Configures the flex policy. Example: Device(config)# wireless profile flex default-flex-profile local-auth ap eap-fast name Configures EAP-FAST profile details. Example: Device(config-wireless-flex-profile)# local-auth ap eap-fast aplocal-test Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 353 Flex AP Local Authentication (CLI) Lightweight Access Points Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Step 15 Step 16 Step 17 Step 18 Command or Action Purpose local-auth ap leap Configures the LEAP method. Example: Device(config-wireless-flex-profile)# local-auth ap leap local-auth ap peap Configures the PEAP method. Example: Device(config-wireless-flex-profile)# local-auth ap peap local-auth ap username username Configures username and password. Example: Device(config-wireless-flex-profile)# local-auth ap username test1 test1 local-auth ap username username password Configures another username and password. Example: Device(config-wireless-flex-profile)# local-auth ap username test2 test2 exit Returns to configuration mode. Example: Device(config-wireless-flex-profile)# exit wireless profile policy policy-profile Configures profile policy. Example: Device(config)# wireless profile policy default-policy-profile shutdown Disables the policy profile. Example: Device(config-wireless-policy)# shutdown no central authentication Example: Device(config)# no central authentication Disables central (controller) authentication. vlan-id vlan-id Example: Device(config)# vlan-id 54 Configures VLAN name or VLAN ID. no shutdown Example: Device(config)# no shutdown Enables the configuration. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 354 Lightweight Access Points Flex AP Local Authentication with External Radius Server Flex AP Local Authentication with External Radius Server In this mode, an access point handles client authentication and switches client data packets locally. This state is valid in standalone mode and connected mode. Procedure Step 1 Step 2 Step 3 Step 4 Command or Action aaa new-model Example: Device(config)# aaa new-model Purpose Creates a AAA authentication model. aaa session-id common Example: Device(config)# aaa session-id common Ensures that all the session ID's information that is sent out, from the RADIUS group for a given call are identical. dot1x system-auth-control Example: Device(config)# dot1x system-auth-control Enables the system authorization control for the RADIUS group. radius server server-name Example: Device(config)# radius server Test-SERVER1 Specifies the RADIUS server name. Note To authenticate clients with freeradius over RADSEC, you should generate an RSA key longer than 1024 bit. Use the crypto key generate rsa general-keys exportable label name command to achieve this. Do not configure key-wrap option under the radius server and radius server group, as it may lead to clients getting stuck in authentication state. Step 5 address {ipv4 | ipv6} ip address {auth-port Specifies the primary RADIUS server port-number | acct-port port-number } parameters. Example: Device(config-radius-server)# address ipv4 124.3.50.62 auth-port 1112 acct-port 1113 Device(config-radius-server)# address ipv6 2001:DB8:0:20::15 auth-port 1812 acct-port 1813 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 355 Flex AP Local Authentication with External Radius Server Lightweight Access Points Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Command or Action key string Example: Device(config-radius-server)# key test123 Purpose Specifies the authentication and encryption key used between the device and the RADIUS daemon running on the RADIUS server. Note The maximum number of characters allowed for the shared secret is 63. radius server server-name Example: Device(config)# radius server Test-SERVER2 Specifies the RADIUS server name. address {ipv4 | ipv6} ip address {auth-port Specifies the secondary RADIUS server port-number | acct-port port-number } parameters. Example: Device(config-radius-server)# address ipv4 124.3.52.62 auth-port 1112 acct-port 1113 Device(config-radius-server)# address ipv6 2001:DB8:0:21::15 auth-port 1812 acct-port 1813 key string Example: Device(config-radius-server)# key test113 Specifies the authentication and encryption key used between the device and the RADIUS daemon running on the RADIUS server. exit Example: Device(config-radius-server)# exit Returns to configuration mode. aaa group server radius server-group Creates a RADIUS server group identification. Example: Note Device(config)# aaa group server radius aaa_group_name server-group refers to the server group name. The valid range is from 1 to 32 alphanumeric characters. radius server server-name Example: Device(config)# radius server Test-SERVER1 radius server server-name Example: Device(config-radius-server)# radius server Test-SERVER2 Specifies the RADIUS server name. Specifies the RADIUS server name. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 356 Lightweight Access Points Flex AP Local Authentication with External Radius Server Step 14 Step 15 Step 16 Step 17 Step 18 Step 19 Step 20 Step 21 Step 22 Command or Action exit Example: Device(config-radius-server)# exit Purpose Exit from RADIUS server configuration mode. wireless profile flex flex-profile Creates a new flex policy. Example: Device(config)# wireless profile flex default-flex-profile local-auth radius-server-group server-group Configures the authentication server group Example: name. Device(config-wireless-flex-profile)# local-auth radius-server-group aaa_group_name exit Returns to configuration mode. Example: Device(config-wireless-flex-profile)# exit wireless profile policy policy-profile Configures a WLAN policy profile. Example: Device(config)# wireless profile policy default-policy-profile shutdown Disables a policy profile. Example: Device(config-wireless-policy)# shutdown no central authentication Example: Device(config-wireless-policy)# no central authentication Disables central (controller) authentication. vlan-id vlan-id Configures a VLAN name or VLAN Id. Example: Device(config-wireless-policy)# vlan-id 54 no shutdown Example: Device(config-wireless-policy)# no shutdown Enables the configuration. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 357 Configuration Example: FlexConnect with Central and Local Authentication Lightweight Access Points Configuration Example: FlexConnect with Central and Local Authentication To see configuration example on how to configure a controller for FlexConnect central and local authentication, see the FlexConnect Configuration with Central and Local Authentication on Catalyst 9800 Wireless Controllers document. NAT-PAT for FlexConnect If you want to use a central DHCP server to service clients across remote sites, NAT-PAT should be enabled. An AP translates the traffic coming from a client and replaces the client's IP address with its own IP address. Note You must enable local switching, central DHCP, and DHCP required using the (ipv4 dhcp required) command to enable NAT and PAT. Configuring NAT-PAT for a WLAN or a Remote LAN Creating a WLAN Follow the steps given here to create a WLAN. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wlan wlan-name wlan-id SSID-name Example: Device(config)# wlan wlan-demo 1 ssid-demo Purpose Enters global configuration mode. Enters the WLAN configuration sub-mode. · wlan-name--Enter the profile name. The range is from 1 to 32 alphanumeric characters. · wlan-id--Enter the WLAN ID. The range is from 1 to 512. · SSID-name--Enter the Service Set Identifier (SSID) for this WLAN. If the SSID is not specified, the WLAN profile name is set as the SSID. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 358 Lightweight Access Points Configuring a Wireless Profile Policy and NAT-PAT (GUI) Command or Action Step 3 Step 4 no shutdown Example: Device(config-wlan)# no shutdown end Example: Device(config-wlan)# end Configuring a Wireless Profile Policy and NAT-PAT (GUI) Procedure Purpose Note If you have already configured WLAN, enter wlan wlan-name command. Shut down the WLAN. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Choose Configuration > Tags & Profiles > Policy. Click Add. In the General tab, enter the Name of the policy. Disable the Central Switching toggle button. Enable the Central DHCP toggle button. Enable the Flex NAT/PAT toggle button. In the Advanced tab, under the DHCP Settings, check the IPv4 DHCP Required check box. Click Apply to Device. Configuring a Wireless Profile Policy and NAT-PAT Follow the procedure given below to configure a wireless profile policy and NAT-PAT: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-policy Configures the policy profile for NAT. Example: Device(config)# wireless profile policy nat-enabled-policy Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 359 Mapping a WLAN to a Policy Profile Lightweight Access Points Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action no central switching Example: Device(config-wireless-policy)# no central switching Purpose Configures the WLAN for local switching. ipv4 dhcp required Configures the DHCP parameters for WLAN. Example: Device(config-wireless-policy)# ipv4 dhcp required central dhcp Example: Configures the central DHCP for locally switched clients. Device(config-wireless-policy)# central dhcp flex nat-pat Example: Device(config-wireless-policy)# flex nat-pat Enables NAT-PAT. no shutdown Example: Device(config-wireless-policy)# no shutdown Enables policy profile. end Example: Device(config-wireless-policy)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Mapping a WLAN to a Policy Profile Follow the procedure given below to map a WLAN to a policy profile: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless tag policy policy-tag-name Example: Device(config)# wireless tag policy demo-tag Purpose Enters global configuration mode. Configures a policy tag and enters policy tag configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 360 Lightweight Access Points Configuring a Site Tag Step 3 Step 4 Command or Action Purpose wlan wlan-name policy profile-policy-name Maps a policy profile to a WLAN profile. Example: Device(config-policy-tag)# wlan wlan-demo policy nat-enabled-policy end Example: Device(config-policy-tag)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring a Site Tag Follow the procedure given below to configure a site tag: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless tag site site-name Example: Device(config)# wireless tag site flex-site Configures a site tag and enters site tag configuration mode. Step 3 no local-site Moves an access point to FlexConnect mode. Example: Device(config-site-tag)# no local-site Step 4 end Example: Device(config-site-tag)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Attaching a Policy Tag and a Site Tag to an Access Point (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Wireless > Access Points. Click the Access Point name. Go to the Tags section. Choose the Policy Tag from the Policy drop-down list. Choose the Site Tag from the Site drop-down list. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 361 Attaching a Policy Tag and a Site Tag to an Access Point Lightweight Access Points Step 6 Click Update and Apply to Device. Attaching a Policy Tag and a Site Tag to an Access Point Follow the procedure given below to attach a policy tag and a site tag to an access point: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap mac-address Example: Device(config)# ap F866.F267.7DFB Configures Cisco APs and enters ap-tag configuration mode. Step 3 policy-tag policy-tag-name Example: Device(config-ap-tag)# policy-tag demo-tag Maps a policy tag to the AP. Step 4 site-tag site-tag-name Maps a site tag to the AP. Example: Device(config-ap-tag)# site-tag flex-site Step 5 end Example: Device(config-ap-tag)# end Returns to privileged EXEC mode. Split Tunneling for FlexConnect If a client that connects over a WAN link that is associated with a centrally switched WLAN has to send traffic to a device present in the local site, this traffic should be sent over CAPWAP to the controller, and the same traffic is sent back to the local site either over CAPWAP or with the help of some off-band connectivity. This process consumes WAN link bandwidth unnecessarily. To avoid this, you can use the Split Tunneling feature, which allows the traffic sent by a client to be classified based on the packet contents. The matching packets are locally switched and the rest of the traffic is centrally switched. The traffic that is sent by the client that matches the IP address of the device present in the local site can be classified as locally switched traffic, and the rest of the traffic as centrally switched. To configure local split tunneling on an AP, ensure that you have enabled DCHP Required on the policy profile using the (ipv4 dhcp required) command. This ensures that the client that is associating with the split WLAN does DHCP. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 362 Lightweight Access Points Configuring Split Tunneling for a WLAN or Remote LAN Note Apple iOS clients need option 6 (DNS) to be set in DHCP offer for split tunneling to work. Note · FlexConnect split tunneling (vlan-based central switching for flexconnect) on auto-anchor deployment is not supported. · Split tunneling does not work on RLAN clients. When the split-tunnel option is enabled on RLAN, traffic denied by the split tunnel ACL is not translated based on the IP address, instead the traffic is sent back to the controller through CAPWAP. · URL filter must not be configured with wildcard URLs such as * and *.* Configuring Split Tunneling for a WLAN or Remote LAN Defining an Access Control List for Split Tunneling (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Choose Configuration > Security > ACL. Click Add. In the Add ACL Setup dialog box, enter the ACL Name. Choose the ACL type from the ACL Type drop-down list. Under the Rules settings, enter the Sequence number and choose the Action as either permit or deny. Choose the required source type from the Source Type drop-down list. a) If you choose the source type as Host, then you must enter the Host Name/IP. b) If you choose the source type as Network, then you must specify the Source IP address and Source Wildcard mask. Check the Log check box if you want the logs. Click Add. Add the rest of the rules and click Apply to Device. Defining an Access Control List for Split Tunneling Follow the procedure given below to define an Access Control List (ACL) for split tunneling: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 363 Linking an ACL Policy to the Defined ACL Lightweight Access Points Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ip access-list extended name Example: Defines an extended IPv4 access list using a name, and enters access-list configuration mode. Device(config)# ip access-list extended split_mac_acl Step 3 deny ip any host hostname Allows the traffic to switch centrally. Example: Device(config-ext-nacl)# deny ip any host 9.9.2.21 Step 4 permit ip any any Allows the traffic to switch locally. Example: Device(config-ext-nacl)# permit ip any any Step 5 end Example: Device(config-ext-nacl)# end Exits configuration mode and returns to privileged EXEC mode. Linking an ACL Policy to the Defined ACL Follow the procedure given below to link an ACL policy to the defined ACL: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile flex flex-profile Example: Device(config)# wireless profile flex flex-profile Configures the Flex profile and enters flex profile configuration mode. Step 3 acl-policy acl policy name Example: Device(config-wireless-flex-profile)# acl-policy split_mac_acl Configures an ACL policy for the defined ACL. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 364 Lightweight Access Points Creating a WLAN Step 4 Command or Action end Example: Device(config-wireless-flex-profile)# end Purpose Exits configuration mode and returns to privileged EXEC mode. Creating a WLAN Follow the procedure given below to create a WLAN. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wlan wlan-name wlan-id SSID-name Example: Device(config)# wlan wlan-demo 1 ssid-demo Step 3 Step 4 no shutdown Example: Device(config-wlan)# no shutdown end Example: Device(config-wlan)# end Purpose Enters global configuration mode. Specifies the WLAN name and ID: · wlan-name--Enter the profile name. The range is from 1 to 32 alphanumeric characters. · wlan-id--Enter the WLAN ID. The range is from 1 to 512. · SSID-name--Enter the Service Set Identifier (SSID) for this WLAN. If the SSID is not specified, the WLAN profile name is set as the SSID. Enables the WLAN. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring a Wireless Profile Policy and a Split MAC ACL Name (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Tags & Profiles > Policy. Click Add. In the General tab, enter the Name of the policy. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 365 Configuring a Wireless Profile Policy and a Split MAC ACL Name Lightweight Access Points Step 4 Step 5 Step 6 Step 7 Step 8 Enable the Central Switching toggle button. Enable the Central DHCP toggle button. In the Advanced tab, under the DHCP settings, check the IPv4 DHCP Required check box and enter the DHCP Server IP Address. Under the WLAN Flex Policy setttings, choose the split MAC ACL from the Split MAC ACL drop-down list. Click Apply to Device. Configuring a Wireless Profile Policy and a Split MAC ACL Name Follow the procedure given below to configure a wireless profile policy and a split MAC ACL name: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-policy Example: Configures a WLAN policy profile and enters wireless policy configuration mode. Device(config)# wireless profile policy split-tunnel-enabled-policy Step 3 flex split-mac-acl split-mac-acl-name Example: Device(config-wireless-policy)# flex split-mac-acl split_mac_acl Configures a split MAC ACL name. Note You should use the same ACL name for linking the flex and the policy profile. Step 4 Step 5 Step 6 Step 7 central switching Configures WLAN for central switching. Example: Device(config-wireless-policy)# central switching central dhcp Example: Enables central DHCP for centrally switched clients. Device(config-wireless-policy)# central dhcp ipv4 dhcp required Configures the DHCP parameters for a WLAN. Example: Device(config-wireless-policy)# ipv4 dhcp required ipv4 dhcp server ip_address Example: Configures the override IP address of the DHCP server. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 366 Lightweight Access Points Mapping a WLAN to a Policy Profile (GUI) Step 8 Command or Action Purpose Device(config-wireless-policy)# ipv4 dhcp server 9.1.0.100 no shutdown Example: Device(config-wireless-policy)# no shutdown Enables a policy profile. Mapping a WLAN to a Policy Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Choose Configuration > Tags & Profiles > Tags. Click Add. Enter the Name of the Tag Policy. Under WLAN-POLICY Maps tab, click Add . Choose the WLAN Profile from the WLAN Profile drop-down list. Choose the Policy Profile from the Policy Profile drop-down list. Click the Tick Icon . Click Apply to Device. Mapping WLAN to a Policy Profile Follow the procedure given below to map WLAN to a policy profile. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless tag policy policy-tag-name Example: Device(config)# wireless tag policy split-tunnel-enabled-tag Configures a policy tag and enters policy tag configuration mode. Step 3 wlan wlan-name policy profile-policy-name Maps a policy profile to a WLAN profile. Example: Device(config-policy-tag)# wlan wlan-demo policy split-tunnel-enabled-policy Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 367 Configuring a Site Tag Lightweight Access Points Step 4 Command or Action end Example: Device(config-policy-tag)# end Purpose Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring a Site Tag Follow the procedure given below to configure a site tag: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless tag site site-name Example: Device(config)# wireless tag site flex-site Configures a site tag and enters site tag configuration mode. Step 3 no local-site Local site is not configured on the site tag. Example: Device(config-site-tag)# no local-site Step 4 flex-profile flex-profile-name Example: Device(config-site-tag)# flex-profile flex-profile Configures a flex profile. Step 5 end Example: Device(config-site-tag)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Attaching a Policy Tag and Site Tag to an Access Point Follow the procedure given below to attach a policy tag and site tag to an access point. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 368 Lightweight Access Points VLAN-based Central Switching for FlexConnect Step 2 Step 3 Step 4 Step 5 Command or Action ap ethernet-mac-address Example: Device(config)# ap 188b.9dbe.6eac Purpose Configures an AP and enters ap tag configuration mode. policy-tag policy-tag-name Example: Device(config-ap-tag)# policy-tag split-tunnel-enabled-tag Maps a policy tag to an AP. site-tag site-tag-name Maps a site tag to an AP. Example: Device(config-ap-tag)# site-tag flex-site end Example: Device(config-ap-tag)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. VLAN-based Central Switching for FlexConnect In FlexConnect local switching, if the VLAN definition is not available in an access point, the corresponding client does not pass traffic. This scenario is applicable when the AAA server returns the VLAN as part of client authentication. When a WLAN is locally switched in flex and a VLAN is configured on the AP side, the traffic is switched locally. When a VLAN is not defined in an AP, the VLAN drops the packet. When VLAN-based central switching is enabled, the corresponding AP tunnels the traffic back to the controller. The controller then forwards the traffic to its corresponding VLAN. Note · For VLAN-based central switching, ensure that VLAN is defined on the controller. · VLAN-based central switching is not supported by mac filter. · For local switching, ensure that VLAN is defined on the policy profile and FlexConnect profile. Configuring VLAN-based Central Switching (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Tags & Profiles > Policy. Click the name of the policy profile. In the Edit Policy Profile window, perform these tasks: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 369 Configuring VLAN-based Central Switching (CLI) Lightweight Access Points Step 4 Step 5 Step 6 Step 7 a) Set Central Switching to Disabled state. b) Set Central DHCP to Disabled state. c) Set Central Authentication to Enabled state. Click the Advanced tab. Under AAA Policy, check the Allow AAA Override check box to enable AAA override. Under WLAN Flex Policy, check the VLAN Central Switching check box, to enable VLAN-based central switching on the policy profile. Click Update & Apply to Device. Configuring VLAN-based Central Switching (CLI) Follow the procedure given below to configure VLAN-based central switching. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-policy Configures a wireless policy profile. Example: Device(config)# wireless profile policy default-policy-profile Step 3 no central switching Example: Device(config-wireless-policy)# no central switching Configures a WLAN for local switching. Step 4 no central dhcp Example: Device(config-wireless-policy)# no central dhcp Configures local DHCP mode, where the DHCP is performed in an AP. Step 5 central authentication Configures a WLAN for central authentication. Example: Device(config-wireless-policy)# central authentication Step 6 aaa-override Example: Device(config-wireless-policy)# aaa-override Configures AAA policy override. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 370 Lightweight Access Points OfficeExtend Access Points for FlexConnect Step 7 Step 8 Step 9 Command or Action flex vlan-central-switching Example: Device(config-wireless-policy)# flex vlan-central-switching end Example: Device(config-wireless-policy)# end show wireless profile policy detailed default-policy-profile Example: Device# show wireless profile policy detailed default-policy-profile Purpose Configures VLAN-based central switching. Returns to privileged EXEC mode. (Optional) Displays detailed information of the policy profile. OfficeExtend Access Points for FlexConnect A Cisco OfficeExtend access point (OEAP) provides secure communications from a controller to a Cisco AP at a remote location, seamlessly extending the corporate WLAN over the Internet to an employee's residence. A user's experience at the home office is exactly the same as it would be at the corporate office. Datagram Transport Layer Security (DTLS) encryption between an access point and the controller ensures that all communications have the highest level of security. Note Preconfigure the controller IP for a zero-touch deployment with OEAP. All other home users can use the same access point to connect for home use by configuring the local SSID from AP. Note In releases prior to Cisco IOS XE Amsterdam 17.3.2, when an AP is converted to OEAP, the local DHCP server on the AP is enabled by default. If the DHCP server on home router has a similar configuration, a network conflict occurs and AP will not be able to join back to the controller. In such a scenario, we recommend that you change the default DHCP server on the Cisco AP using OEAP GUI. Note For OEAP, when configuration changes are made from the OEAP GUI to the following: Radio Status, Radio Interface Status, 802.11 n-mode, 802.11 ac-mode, Bandwidth, and Channel Selection (2.4 GHz or 5 GHz), CAPWAP should be restarted for the configuration sync to take place between the AP and the controller. During this interval, the AP GUI may not respond until the AP rejoins the controller. We recommend that you wait for the AP to rejoin the controller (for about 1-2 minutes), before you make further changes from the OEAP GUI. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 371 Configuring OfficeExtend Access Points Lightweight Access Points Note In Cisco OfficeExtend access point (Cisco OEAP), if the OEAP local DHCP server is enabled and the user configures DNS IP from OEAP GUI, the wireless and wired clients connected to Cisco OEAP will receive that IP as DNS server IP in DHCP ACK. Configuring OfficeExtend Access Points Follow the procedure given below to configure OfficeExtend access points. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile flex flex-profile-name Example: Device(config)# wireless profile flex test Configures a wireless flex profile and enters wireless flex profile configuration mode. Step 3 office-extend Example: Device(config-wireless-flex-profile)# office-extend Enables the OfficeExtend AP mode for a flexconnect AP. Step 4 end Example: Device(config-wireless-flex-profile)# end Exits configuration mode and returns to privileged EXEC mode. Note After creating a flex profile, ensure that OEAP is in flex connect mode and mapped to its corresponding site tag. OfficeExtend is disabled by default. To clear the access point's configuration and return it to the factory-defaults, use the clear ap config cisco-ap command. Disabling OfficeExtend Access Point Follow the procedure given below to disable an OfficeExtend access point. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 372 Lightweight Access Points Support for OEAP Personal SSID Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile flex flex-profile-name Example: Device(config)# wireless profile flex test Configures a wireless flex profile and enters wireless flex profile configuration mode. Step 3 no office-extend Example: Disables OfficeExtend AP mode for a flexconnect AP. Device(config-wireless-flex-profile)# no office-extend Step 4 end Example: Device(config-wireless-flex-profile)# end Exits configuration mode and returns to privileged EXEC mode. Support for OEAP Personal SSID Information About OEAP Personal SSID Support The Cisco OfficeExtend Access Point supports personal SSID. This enables a local home client to use the same OfficeExtend Access Point for local networking and internet connectivity. With the help of the OEAP personal SSID feature, you can enable or disable personal SSID, enable or disable Datagram Transport Layer Security (DTLS) encryption between an access point and the controller, and enable rogue detection, using the knobs that are present on the AP profile page in the GUI. The local network access and DTLS encryption are enabled by default. The configurations described in this chapter is applicable for OEAP or for APs in the OEAP mode. Configuring OEAP Personal SSID (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > AP Tags & Profiles > AP Join. The AP Join Profile section displays all the AP Join profiles. To edit the configuration details of an AP Join profile, select APs in the OEAP mode. The Edit AP Join Profile window is displayed. In the General tab, under the OfficeExtend AP Configuration section, configure the following: a) Check the Local Access check box to enable the local network. By default, Local Access is enabled. After the AP joins the controller using AP join profile where local access is enabled, the AP will not Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 373 Configuring OEAP Personal SSID (CLI) Lightweight Access Points broadcast the default personal SSID. Since the local access is enabled, you can login to the AP GUI and configure the personal SSID. b) Check the Link Encryption check box to enable data DTLS. By default, Link Encryption is enabled. c) Check the Rogue Detection check box to enable rogue detection. Rogue detection is disabled by default for OfficeExtend APs because these APs, deployed in a home environment, are likely to detect a large number of rogue devices. Configuring OEAP Personal SSID (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap profile ap-profile Example: Device(config)# ap profile ap-profile Configures an AP profile and enters the AP profile configuration mode. Step 3 [no] oeap local-access Example: Device(config-ap-profile)# oeap local-access Enables the the local access to AP. Local access consist of local AP GUI, LAN ports and personal SSID. The no form of this command disables the feature. If the local access is disabled, you will not be able to access the AP GUI, the local LAN port will be disabled, and personal SSID will not be broadcasted. Step 4 [no] oeap link-encryption Example: Device(config-ap-profile)# oeap link-encryption Enables DTLS encryption for OEAP APs or APs moving to the OEAP mode. The no form of this command disables the feature. This feature is enabled by default. Step 5 [no] oeap rogue-detection Example: Device(config-ap-profile)# no oeap rogue-detection Enables OEAP DTLS encryption in the AP profile configuration mode. This feature is disabled by default. Viewing OEAP Personal SSID Configuration To view the OEAP personal SSID configuration, run the following command. Device# show ap profile name default-ap-profile detailed . . . OEAP Mode Config Link Encryption : ENABLED Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 374 Lightweight Access Points Clearing Personal SSID from an OfficeExtend Access Point Rogue Detection : DISABLED Local Access : ENABLED Clearing Personal SSID from an OfficeExtend Access Point To clear the personal SSID from an access point, run the following command: ap name Cisco_AP clear-personal-ssid Example: Viewing OfficeExtend Configuration This example displays an OfficeExtend configuration: Device# show ap config general Cisco AP Name : ap_name ================================================= Cisco AP Identifier Country Code Regulatory Domain Allowed by Country AP Country Code AP Regulatory Domain Slot 0 Slot 1 MAC Address IP Address Configuration IP Address IP Netmask Gateway IP Address CAPWAP Path MTU Telnet State SSH State Jumbo MTU Status Cisco AP Location Site Tag Name RF Tag Name Policy Tag Name AP join Profile Primary Cisco Controller Name Primary Cisco Controller IP Address Secondary Cisco Controller Name Secondary Cisco Controller IP Address Tertiary Cisco Controller Name Tertiary Cisco Controller IP Address Administrative State Operation State AP Mode AP Submode Office Extend Mode Remote AP Debug Logging Trap Severity Level Software Version Boot Version Mini IOS Version Stats Reporting Period LED State PoE Pre-Standard Switch PoE Power Injector MAC Address Power Type/Mode : 70db.986d.a860 : Multiple Countries : US,IN : 802.11bg:-A 802.11a:-ABDN : US - United States : -A : -D : 002c.c899.7b84 : DHCP : 9.9.48.51 : 255.255.255.0 : 9.9.48.1 : 1485 : Disabled : Disabled : Disabled : default location : flex-site : default-rf-tag : split-tunnel-enabled-tag : default-ap-profile : uname-controller : 9.9.48.34 : uname-controller1 : 0.0.0.0 : uname-ewlc2 : 0.0.0.0 : Enabled : Registered : FlexConnect : Not Configured : Enabled : Disabled : information : 16.8.1.1 : 1.1.2.4 : 0.0.0.0 :0 : Enabled : Disabled : Disabled : PoE/Full Power (normal mode) Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 375 Proxy ARP Lightweight Access Points Proxy ARP Proxy address resolution protocol (ARP) is the most common method for learning about MAC address through a proxy device. Enabling Proxy ARP known as ARP caching in Cisco Catalyst 9800 Series Wireless Controller means that the AP owning client is the destination of the ARP request, replies on behalf of that client and therefore does not send the ARP request to the client over the air. Access points not owning the destination client and receiving an ARP request through their wired connection will drop the ARP request. When the ARP caching is disabled, the APs bridge the ARP requests from wired-to-wireless and vice-versa increasing the air time usage and broadcasts over wireless. The AP acts as an ARP proxy to respond to ARP requests on behalf of the wireless clients. Enabling Proxy ARP for FlexConnect APs (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Tags & Profiles > Flex. Click Add. In the General tab, enter the Name of the Flex Profile and check the ARP Caching check box. The name can be ASCII characters from 32 to 126, without leading and trailing spaces. Click Apply to Device. Enabling Proxy ARP for FlexConnect APs Follow the procedure given below to configure proxy ARP for FlexConnect APs. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile flex flex-policy Example: Device(config)# wireless profile flex flex-test Configures WLAN policy profile and enters wireless flex profile configuration mode. Step 3 arp-caching Example: Device(config-wireless-flex-profile)# arp-caching Enables ARP caching. Note Use the no arp-caching command to disable ARP caching. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 376 Lightweight Access Points Overlapping Client IP Address in Flex Deployment Step 4 Step 5 Step 6 Step 7 Command or Action end Example: Device(config-wireless-flex-profile)# end Purpose Returns to privileged EXEC mode. show running-config | section wireless profile Displays ARP configuration information. flex Example: Device# show running-config | section wireless profile flex show wireless profile flex detailed flex-profile-name Example: Device# show wireless profile flex detailed flex-test (Optional) Displays detailed information of the flex profile. show arp summary Example: Device# show arp summary (Optional) Displays ARP summary. Overlapping Client IP Address in Flex Deployment Overview of Overlapping Client IP Address in Flex Deployment In flex deployments, you can use cookie cutter configuration across sites and branches which also includes local DHCP servers configured with the same subnet. In this toplogy, controllers detect multiple client sessions with the same IP as IP THEFT and clients are put in blocked list. The Overlapping Client IP Address in Flex Deployment feature offers overlapping IP address across various flex sites and provides all the functionalities that are supported in flex deployments. Enabling Overlapping Client IP Address in Flex Deployment (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Tags & Profiles > Flex and click Add. On the Add Flex Profile window and General tab. Check the IP Overlap check box to enable overlapping client IP Address in Flex deployment. Click Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 377 Enabling Overlapping Client IP Address in Flex Deployment Lightweight Access Points Enabling Overlapping Client IP Address in Flex Deployment Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile flex flex-profile Example: Device(config)# wireless profile flex flex1 Configures a Flex profile and enters Flex profile configuration mode. Step 3 [no] ip overlap Example: Device(config-wireless-flex-profile)# [no] ip overlap Enables overlapping client IP address in flex deployment. Note By default, the configuration is disabled. Verifying Overlapping Client IP Address in Flex Deployment (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Monitoring > Wireless > Clients. Click the client in the table to view properties and statistics for each client. On the Client window and General tab, click Client Statistics tab to view the following details: · Number of Bytes Received from Client · Number of Bytes Sent to Client · Number of Packets Received from Client · Number of Packets Sent to Client · Number of Policy Errors · Radio Signal Strength Indicator · Signal to Noise Ratio · IP - Zone ID Mapping Click OK. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 378 Lightweight Access Points Verifying Overlapping Client IP Address in Flex Deployment Verifying Overlapping Client IP Address in Flex Deployment To verify if the overlapping client IP address in Flex deployment feature is enabled or not, use the following command: Device# show wireless profile flex detailed flex1 Fallback Radio shut : DISABLED ARP caching : ENABLED Efficient Image Upgrade : ENABLED OfficeExtend AP : DISABLED Join min latency : DISABLED IP overlap status : DISABLED To view additional details about the overlapping client IP address in Flex deployment feature, use the following command: Device# show wireless device-tracking database ip IP ZONE-ID STATE DISCOVERY MAC ---------------------------------------------------------------------------------------------- 9.91.59.154 6038.e0dc.3182 1000:1:2:3:90d8:dd1a:11ab:23c0 58ef.680d.c6c3 1000:1:2:3:f9b5:3074:d0da:f93b 58ef.680d.c6c3 2001:9:3:59:90d8:dd1a:11ab:23c0 58ef.680d.c6c3 2001:9:3:59:f9b5:3074:d0da:f93b 58ef.680d.c6c3 fe80::f9b5:3074:d0da:f93b 58ef.680d.c6c3 0x00000002 Reachable 0x00000002 Reachable 0x00000002 Reachable 0x00000002 Reachable 0x00000002 Reachable 0x80000001 Reachable To view APs in various site tags, use the following command: Device# show ap tag summary Number of APs: 5 IPv4 Packet IPv6 Packet IPv6 Packet IPv6 NDP IPv6 NDP IPv6 NDP AP Name AP Mac Site Tag Name Policy Tag Name RF Tag Name Misconfigured Tag Source ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------AP3802 70b3.17f6.37aa flex_ip_overlap-site-tag-auto-3 flex_ip_overlap_policy_tag_1 default-rf-tag No Static AP-9117AX 0cd0.f894.0f8c default-site-tag default-policy-tag default-rf-tag No Default AP1852JJ9 38ed.18ca.2b48 flex_ip_overlap-site-tag-auto-2 flex_ip_overlap_policy_tag_2 default-rf-tag No Static AP1852I 38ed.18cc.61c0 flex_ip_overlap-site-tag-auto-1 flex_ip_overlap_policy_tag_1 default-rf-tag No Static AP1542JJ9 700f.6a84.1b30 flex_ip_overlap-site-tag-auto-2 flex_ip_overlap_policy_tag_2 default-rf-tag No Static To view APs in FlexConnect mode, use the following command: Device# show ap status AP Name Status Mode Country ------------------------------------------------------------------------- AP3802 Disabled FlexConnect IN AP1852I Enabled FlexConnect US AP-9117AX Enabled FlexConnect IN AP1542JJ9 Disabled FlexConnect US AP1852JJ9 Enabled FlexConnect US Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 379 Information About FlexConnect High Scale Mode Lightweight Access Points Troubleshooting Overlapping Client IP Address in Flex Deployment To verify the WNCD instance for each of the APs, use the following command: Device# show wireless loadbalance ap affinity wncd 0 AP Mac Discovery Timestamp Join Timestamp Tag --------------------------------------------------------------------------------- 0cd0.f894.0f8c 10/27/20 22:11:05 10/27/20 22:11:14 default-site-tag 38ed.18ca.2b48 10/27/20 22:06:09 10/27/20 22:06:19 flex_ip_overlap-site-tag-auto-2 700f.6a84.1b30 10/27/20 22:25:03 10/27/20 22:25:13 flex_ip_overlap-site-tag-auto-2 Information About FlexConnect High Scale Mode This feature helps to scale up the FlexConnect site capacity to accommodate 300 APs and 3000 802.1x clients per site. The FlexConnect site capability is scaled up by using the Pairwise Master Key (PMK) option to skip Extensible Authentication Protocol (EAP) exchange while performing client roaming. When a client associates with an AP under an 802.1x authentication architecture, an EAP exchange takes place, followed by a four-way handshake to verify the encryption keys. Using PMK caching, an AP can cache the PMK identifier of the EAP exchange, and for the subsequent client join. In PMK caching, the EAP exchange process is eliminated, and the authentication time process is decreased. The PMK propagation feature is disabled by default. Until Cisco IOS XE Cupertino 17.7.1, the wireless controller used to push the PMK cache to every FlexConnect AP in the site. From Cisco IOS XE Cupertino 17.8.1 onwards, when PMK propagation is enabled, the controller pushes the PMK cache only to selective FlexConnect APs. These FlexConnect APs then forward the PMK identifier to the other FlexConnect APs within the same site. Enabling PMK Propagation (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile flex test-flex-profile Example: Device(config)# wireless profile flex test-flex-profile Creates a FlexConnect profile. Step 3 pmk propagate Example: Device(config-wireless-flex-profile)# pmk propogate Propogates PMK information to the other APs in the site. Note The PMK propagation feature is disabled by default. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 380 Lightweight Access Points Flex Resilient with Flex and Bridge Mode Access Points Examples Device# configure terminal Device(config)# wireless profile flex test-flex-profile Device(config-wireless-flex-profile)# pmk propogate Flex Resilient with Flex and Bridge Mode Access Points Information About Flex Resilient with Flex and Bridge Mode Access Points The Flex Resilient with Flex and Bridge Mode Access Points describe how to set up a controller with Flex+Bridge mode Access Points (APs) and Flex Resilient feature. The Flex Resilient feature works only in Flex+Bridge mode APs. The feature resides in Mesh link formed between RAP - MAP, once the link is UP and RAP loses connection to the CAPWAP controller, both RAP and MAP continue to bridge the traffic. A child Mesh AP (MAP) maintains its link to a parent AP and continues to bridge till the parent link is lost. A child MAP cannot establish a new parent or child link till it reconnects to the CAPWAP controller. Note Existing wireless clients in locally switching WLAN can stay connected with their AP in this mode. No new or disconnected wireless client can associate to the Mesh AP in this mode. Client traffic in Flex+Bridge MAP is dropped at RAP switchport for the locally switched WLANs. Configuring a Flex Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Tags & Profiles > Flex. Click a Flex Profile Name. The Edit Flex Profile dialog box appears. Under the General tab, choose the Flex Resilient check box to enable the Flex Resilient feature. Under the VLAN tab, choose the required VLANs. (Optionally) Under the Local Authentication tab, choose the desired server group from the Local Accounting RADIUS Server Group drop-down list. Also, choose the RADIUS check box. Click Update & Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 381 Configuring a Flex Profile (CLI) Lightweight Access Points Configuring a Flex Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode Step 2 wireless profile flex flex-profile Example: Device(config)# wireless profile flex new-flex-profile Configures a Flex profile and enters Flex profile configuration mode. Step 3 arp-caching Example: Device(config-wireless-flex-profile)# arp-caching Enables ARP caching. Step 4 description description Example: Device(config-wireless-flex-profile)# description "new flex profile" Enables default parameters for the Flex profile. Step 5 native-vlan-id Example: Device(config-wireless-flex-profile)# native-vlan-id 2660 Configures native vlan-id information. Step 6 resilient Example: Device(config-wireless-flex-profile)# resilient Enables the resilient feature. Step 7 vlan-name vlan_name Example: Device(config-wireless-flex-profile)# vlan-name VLAN2659 Configures VLAN name. Step 8 vlan-id vlan_id Example: Device(config-wireless-flex-profile)# vlan-id 2659 Configures VLAN ID. The valid VLAN ID ranges from 1 to 4096. Step 9 end Example: Device(config-wireless-flex-profile)# end Exits configuration mode and returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 382 Lightweight Access Points Configuring a Site Tag (CLI) Configuring a Site Tag (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode Step 2 wireless tag site site-name Example: Device(config)# wireless tag site new-flex-site Configures a site tag and enters site tag configuration mode. Step 3 flex-profile flex-profile-name Example: Device(config-site-tag)# flex-profile new-flex-profile Configures a flex profile. Step 4 no local-site Local site is not configured on the site tag. Example: Device(config-site-tag)# no local-site Step 5 site-tag site-tag-name Example: Device(config-site-tag)# site-tag new-flex-site Maps a site tag to an AP. Step 6 end Example: Device(config-site-tag)# end Exits configuration mode and returns to privileged EXEC mode. Configuring a Mesh Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode Step 2 wireless profile mesh profile-name Example: Device(config)# wireless profile mesh Mesh_Profile Configures a Mesh profile and enters the Mesh profile configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 383 Associating Wireless Mesh to an AP Profile (CLI) Lightweight Access Points Step 3 Step 4 Command or Action Purpose no ethernet-vlan-transparent Example: Disables VLAN transparency to ensure that the bridge is VLAN aware. Device(config-wireless-profile-mesh)# no ethernet-vlan-transparent end Example: Device(config-wireless-profile-mesh)# end Exits configuration mode and returns to privileged EXEC mode. Associating Wireless Mesh to an AP Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode Step 2 ap profile ap-profile-name Example: Device(config)# ap profile new-ap-join-profile Configures the AP profile and enters AP profile configuration mode. Step 3 mesh-profile mesh-profile-name Example: Configures the Mesh profile in AP profile configuration mode. Device(config-ap-profile)# mesh-profile Mesh_Profile Step 4 ssh Example: Device(config-ap-profile)# ssh Configures the Secure Shell (SSH). Step 5 mgmtuser username username password {0 Specifies the AP management username and | 8} password password for managing all of the access points Example: configured to the controller. Device(config-ap-profile)# mgmtuser username Cisco password 0 Cisco secret · 0: Specifies an UNENCRYPTED password. 0 Cisco · 8: Specifies an AES encrypted password. Note While configuring an username, ensure that special characters are not used as it results in error with bad configuration. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 384 Lightweight Access Points Attaching Site Tag to an Access Point (CLI) Step 6 Command or Action end Example: Device(config-ap-profile)# end Purpose Exits configuration mode and returns to privileged EXEC mode. Attaching Site Tag to an Access Point (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap mac-address Example: Device(config)# ap F866.F267.7DFB Step 3 site-tag site-tag-name Example: Device(config-ap-tag)# site-tag new-flex-site Step 4 end Example: Device(config-ap-tag)# end Purpose Enters global configuration mode Configures Cisco APs and enters ap-tag configuration mode. Maps a site tag to the AP. Note Associating Site Tag causes the associated AP to reconnect. Exits configuration mode and returns to privileged EXEC mode. Configuring Switch Interface for APs (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 interface interface-id Example: Device(config)# interface <int-id> Step 3 switchport trunk native vlan vlan-id Example: Purpose Enters global configuration mode Enters the interface to be added to the VLAN. Assigns the allowed VLAN ID to the port when it is in trunking mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 385 Verifying Flex Resilient with Flex and Bridge Mode Access Points Configuration Lightweight Access Points Step 4 Step 5 Step 6 Command or Action Device(config-if)# switchport trunk native vlan 2660 Purpose switchport trunk allowed vlan vlan-id Example: Device(config-if)# switchport trunk allowed vlan 2659,2660 Assigns the allowed VLAN ID to the port when it is in trunking mode. switchport mode trunk Sets the trunking mode to trunk unconditionally. Example: Note Device(config-if)# switchport mode trunk When the controller works as a host for spanning tree, ensure that you configure portfast trunk, using spanning-tree portfast trunk command, in the uplink switch to ensure faster convergence. end Example: Device(config-if)# end Exits configuration mode and returns to privileged EXEC mode. Verifying Flex Resilient with Flex and Bridge Mode Access Points Configuration To view the AP mode and model details, use the following command: Device# show ap name <ap-name> config general | inc AP Mode AP Mode : Flex+Bridge AP Model : AIR-CAP3702I-A-K9 To view the MAP mode details, use the following command: Device# show ap name MAP config general | inc AP Mode AP Mode : Flex+Bridge AP Model : AIR-CAP3702I-A-K9 To view the RAP mode details, use the following command: Device# show ap name RAP config general | inc AP Mode AP Mode : Flex+Bridge AP Model : AIR-AP2702I-A-K9 To view if the Flex Profile - Resilient feature is enabled or not, use the following command: Device# show wireless profile flex detailed FLEX_TAG | inc resilient Flex resilient : ENABLED Feature History for OEAP Link Test This table provides release and related information for the feature explained in this module. This feature is also available in all the releases subsequent to the one in which they are introduced in, unless noted otherwise. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 386 Lightweight Access Points Information About OEAP Link Test Table 27: Feature History for OEAP Link Test Release Cisco IOS XE Bengaluru 17.5.1 Feature OEAP Link Test Feature Information The Cisco OEAP Link Test feature allows you to determine the DTLS upload, link latency, and jitter of the link between an AP and the controller. Information About OEAP Link Test The Cisco OEAP Link Test feature allows you to determine the DTLS upload speed of the link between an AP and the controller. This feature helps in identifying network bottlenecks and reasons for functionality failures. You can determine the link latency by running a test on demand. A link test is used to determine the quality of the link between the controller and an AP in OEAP mode. The AP sends synthetic packets to the controller and the controller echoes them back to the AP, which can then estimate the link quality. Feature Scenarios Cisco OfficeExtend Access Point (OEAP) users are complaining of poor performance when connected to a teleworker AP. Use Cases This feature allows OEAP network admins to troubleshoot low throughput from the Cisco Catalyst 9800 Controller GUI by running OEAP link test. The OEAP link test provides DTLS upload speed, link latency, and link jitter, all of which help the network administrators to narrow down the problem. Configuring OEAP Link Test (CLI) Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enters privileged EXEC mode. Step 2 ap name ap-name network-diagnostic Example: Triggers network diagnostics on an OfficeExtend AP. Device# ap name ap18 network-diagnostic Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 387 Performing OEAP Link Test (GUI) Lightweight Access Points Performing OEAP Link Test (GUI) Procedure Step 1 Step 2 Choose Monitoring > Wireless > AP Statistics. In the list of APs, a Link Test icon is displayed in the AP Name column for OEAP-capable APs. Note The Link Test icon is displayed only if an AP is OEAP capable and is configured to operate as OEAP. Click Link Test. A link test is run and the results are shown. Verifying OEAP Link Test The following example shows how to verify network diagnostics information: Device# show flexconnect office-extend diagnostics Summary of OfficeExtend AP Link Latency CAPWAP Latency Heartbeat Current: current latency (ms) Min: minimum latency (ms) Max: maximum latency (ms) Link Test Upload: DTLS Upload (Mbps) Latency: DTLS Link Latency (ms) Jitter: DTLS Link Jitter (ms) AP Name Last Latency Heartbeat from AP Current Max Min Last Link Test Run Upload Latency Jitter ---------------------------------------------------------------------------------------------------- ap-18 1 minute 1 second 0 0 0 12/04/20 09:19:48 8 2 0 Feature History for Cisco OEAP Split Tunneling This table provides release and related information for the feature explained in this module. This feature is available in all the releases subsequent to the one in which it is introduced in, unless noted otherwise. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 388 Lightweight Access Points Information About Cisco OEAP Split Tunneling Table 28: Feature History for Cisco OEAP Split Tunneling Release Feature Cisco IOS XE Cupertino IPv6 Support 17.8.1 Cisco IOS XE Cupertino Cisco OEAP Split 17.7.1 Tunneling Feature Information IPv6 addressing is supported on the Cisco OEAP Split Tunneling feature. The Split Tunneling feature in Cisco OfficeExtend Access Point (OEAP) provides a mechanism to classify client traffic, based on packet content, using access control lists (ACLs). Information About Cisco OEAP Split Tunneling The global pandemic has redefined the way people interact and work. The workplace has shifted from office cubicles to home desks, which requires applications that enable seamless collaboration among the workforce. For home-based workers, access to business services must be reliable, consistent, and secure. It should provide an experience that is similar to the office facility. Routing all of the traffic through the corporate network using traditional VPNs increases the traffic volume, slows down access to resources, and negatively impacts the remote user experience. Cisco OEAP provides secure communications from a controller to an access point (AP) at a remote location, seamlessly extending the corporate WLAN over the internet to an employee's residence. Cisco OEAP provides segmentation of home and corporate traffic using the Split Tunnelling feature, which allows for home device connectivity without security risks to corporate policy. Split tunnelling classifies the traffic sent by a client, based on packet content, using ACLs. Matching packets are switched locally from Cisco OEAP, and other packets are centrally switched over CAPWAP. Clients on a corporate SSID can talk to devices on a local network (printers, wireless devices on a personal SSID, and so on) directly without consuming WAN bandwidth, by sending packets over CAPWAP. Traffic to Software as a Service (Saas) applications such as Cisco WebEx, Microsoft SharePoint, Microsoft Office365, Box, Dropbox, and so on that is required as part of the work routine, need not go through the corporate network, by using the Split Tunnelling feature. The Cisco OEAP advertises two SSIDs, one corporate and one personal. Corporate SSID clients obtain their IP address from the central DHCP server in the corporate network. If split tunneling is enabled and a client wants to access a device in the home network, the AP performs NAT (PAT) translation between the wireless client corporate network subnet and the home network where the AP is located. The personal SSID is configurable by a Cisco OEAP user. Clients will either get their IP address from the home router (when the AP personal SSID firewall is disabled) or from the internal AP DHCP server (when the AP personal SSID firewall is enabled). In the latter scenario, if the clients want to reach the home network devices, the AP perform sNAT (PAT) translation between the wireless client's internal network and the home network where the AP is located. IPv6 Address Support From Cisco IOS XE Cupertino 17.8.1, IPv6 addressing is supported. You can disable IPv6 addressing only by disabling the feature. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 389 Prerequisites for Cisco OEAP Split Tunneling Lightweight Access Points Note The end-to-end network should support IPv6, that is, both the corporate network (controller, corporate gateway, and so on) and the home network (wireless clients, home router, and so on) should support IPv6. Prerequisites for Cisco OEAP Split Tunneling · Cisco Wave 2 APs or Cisco Catalyst 9100AX Series Access Points · URL filter list that matches the ACL name configured in split tunneling Restrictions for Cisco OEAP Split Tunneling · Cisco OEAPs are not supported when Cisco Embedded Wireless Controller on Catalyst Access Points (EWC) is used as a controller. · Mesh topology is not supported. · Clients connected on personal SSID or on home network (AP native VLAN) cannot discover devices on the corporate network. · Split tunnelling is not supported in standalone mode. · URL split tunnelling supports only up to 512 URLs. · Action (deny or permit) can be specified only on the URL filter list, not for each individual entry. · If URL-based ACL contains wild-card URLs, a maximum of 10 URLs are supported. · The amount of snooped DNS IP addresses is limited as follows: · An AP can snoop 4095 IP addresses per DNS response, if IP addresses are less than 150,000. · An AP can snoop 10 IP addresses per DNS response, if IP addresses are between 150,000 and 200,000. · An AP can snoop five IP addresses per DNS response, if IP addresses are between 200,000 and 250,000. · An AP can snoop one IP address per DNS response, if IP addresses are greater than 250,000. · A maximum of 128 IP address ACE (rules) can be used in the IP ACL for split tunnelling. · URL-based split tunnelling only works with IPv4 addresses. · The following restrictions are specific to IPv6 addressing · Multihoming (multiple router advertisement prefixes) is not supported (If a home network receives multiple prefixes, the one used by the AP that is connected to the controller is used.) · Roaming is not supported. · Filtering is not supported on the upstream traffic towards the wireless client. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 390 Lightweight Access Points Use Cases for Cisco OEAP Split Tunneling · Split tunneling is disabled for clients with duplicate IPv6 addresses. Traffic for these clients is forwarded centrally to the controller. · DHCPv6 prefix delegation is not supported for wireless clients. · If the corporate prefix length is smaller than the home prefix length, split tunneling for a particular client is disabled. Use Cases for Cisco OEAP Split Tunneling Before Release 17.7.1, split tunneling used IP ACLs. This meant that cloud services such as Cisco Webex were accessed directly without going through the corporate network. The network administrator maintained the list of IP addresses that Cisco Webex used, which was a daunting task. From Release 17.7.1, using the Cisco OEAP Split Tunneling feature, the network administrator needs to provide only the DNS names that Cisco Webex uses. The AP ensures that traffic from these DNS names is routed directly to the internet without using the corporate network. Workflow to Configure Cisco OEAP Split Tunneling 1. Create an IP address ACL or URL ACL 2. Add ACL to FlexConnect Profile 3. Enable Split Tunnelling on Policy Profile 4. Verify the Configuration Create an IP Address ACL (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ip access-list extended name Defines an extended IPv4 access list using a Example: name. Device(config)# ip access-list extended Note vlan_oeap IP ACL can be used to define a default action if there is no match in the URL ACL. Step 3 seq-num deny ip any host hostname Example: Denies IP traffic from any host. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 391 Create a URL ACL (CLI) Lightweight Access Points Step 4 Step 5 Command or Action Purpose Device(config-ext-nacl)# 10 deny ip any 10.10.0.0 0.0.255.255 seq-num permit ip any any hostname Example: Device(config-ext-nacl)# 20 permit ip any any Permits IP traffic from any source or destination host. end Example: Device(config-ext-nacl)# end Exits configuration mode and returns to privileged EXEC mode. Create a URL ACL (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 urlfilter list list-name Configures the URL filter list. Example: The list name must not exceed 32 alphanumeric Device(config)# urlfilter list vlan_oeap characters. Step 3 action permit Configures the action: Permit (traffic is allowed Example: directly on the home network) or Deny (traffic is directed to the corporate network). Device(config-urlfilter-params)# action permit Step 4 filter-type post-authentication Example: Device(config-urlfilter-params)# filter-type post-authentication Configures the URL list as postauthentication filter. Step 5 url url-name Example: Device(config-urlfilter-params)# url wiki.cisco.com Configures a URL. Step 6 url url-name Example: Device(config-urlfilter-params)# url example.com (Optional) Configures a URL. Use this option when you want to add multiple URLs. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 392 Lightweight Access Points Add an ACL to a FlexConnect Profile Step 7 Command or Action end Example: Device(config-urlfilter-params)# end Purpose Exits configuration mode and returns to privileged EXEC mode. Add an ACL to a FlexConnect Profile Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile flex flex-profile Example: Device(config)# wireless profile flex default-flex-profile Configures a FlexConnext profile. Step 3 acl-policy acl-policy-name Example: Device(config-wireless-flex-profile)# acl-policy vlan_oeap Configures an ACL policy. Step 4 urlfilter list url-filter Configures a URL filter list. Example: Device(config-wireless-flex-profile-acl)# urlfilter list vlan_oeap Step 5 exit Example: Returns to FlexConnect profile configuration mode.. Device(config-wireless-flex-profile-acl)# exit Step 6 office-extend Example: Device(config-wireless-flex-profile)# office-extend Enables the OEAP mode for a FlexConnect AP. Step 7 end Example: Device(config-wireless-flex-profile)# end Exits configuration mode and returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 393 Enable Split Tunnelling in a Policy Profile Lightweight Access Points Enable Split Tunnelling in a Policy Profile Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile flex flex-profile Example: Device(config)# wireless profile flex default-flex-profile Configures a FlexConnect profile. Step 3 no central association Example: Disables central association and enables local association for locally switched clients. Device(config-wireless-flex-profile)# no central association Step 4 flex split-mac-acl split-mac-acl-name Example: Device(config-wireless-flex-profile)# flex split-mac-acl vlan_oeap Configures a split MAC ACL name. Note Ensure that you use the same acl-policy-name in the FlexConnect profile. Step 5 end Example: Device(config-wireless-flex-profile)# end Exits configuration mode and returns to privileged EXEC mode. Verifying the Cisco OEAP Split Tunnel Configuration To verify the split tunneling DNS ACLs per wireless client on the AP side, use the following command: Device# show split-tunnel client 00:11:22:33:44:55 access-list Split tunnel ACLs for Client: 00:11:22:33:44:55 IP ACL: SplitTunnelACL Tunnel packets Tunnel bytes NAT packets NAT bytes 1 242 3 768 URL ACL: SplitTunnelACL Tunnel packets Tunnel bytes NAT packets NAT bytes 3 778 0 0 Resolved IPs for Client: 00:11:22:33:44:55 for Split tunnel Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 394 Lightweight Access Points AP Survey Mode HIT-COUNT URL ACTION IP-LIST 1 base1.com deny. 20.0.1.1 20.0.1.10 2 base2.com deny. 20.0.1.2 3 base3.com deny. 20.0.1.3 To verify the current binding between a WLAN and an ACL, use the following command: Device# show split-tunnel mapping VAP-Id 0 ACL Name SplitTunnelACL To verify the content of the current URL ACL, use the following command: Device# show flexconnect url-acl ACL-NAME ACTION URL-LIST SplitTunnelACL deny base.com AP Survey Mode To enable the Cisco Catalyst 9136 Series APs and other upcoming AP models for site survey at customer sites, a new AP command is introduced to help APs to switch to survey mode. When an AP is in survey mode, the AP GUI is enabled and is used for configuring the RF parameters for site survey investigation. To enable survey mode on an AP, run the ap-type site-survey command from the AP CLI. The following features in the AP GUI are hidden, when the AP is in the survey mode: · WAN · Firewall · Network Diagnostics Note To make the hidden features visible on the AP GUI, you must switch the AP back to the CAPWAP mode, by running the ap-type capwap command from the AP CLI. In CAPWAP mode, the AP GUI becomes available only when the OfficeExtend AP field is enabled in the flex profile page associated to that AP. Note To access the AP survey mode from the GUI, you must enter the default login as 'admin' and the default password as 'admin' (both case sensitive). When the AP is in survey mode, it broadcasts an SSID by default. The default password to connect to this SSID is 'password' (case sensitive). Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 395 AP Survey Mode Lightweight Access Points Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 396 2 2 C H A P T E R Security · Information About Data Datagram Transport Layer Security, on page 397 · Configuring Data DTLS (GUI), on page 398 · Configuring Data DTLS (CLI), on page 398 · Introduction to the 802.1X Authentication, on page 399 · Limitations of the 802.1X Authentication, on page 400 · Topology - Overview, on page 401 · Configuring 802.1X Authentication Type and LSC AP Authentication Type (GUI), on page 401 · Configuring 802.1X Authentication Type and LSC AP Authentication Type, on page 402 · Enabling 802.1X on the Switch Port, on page 404 · Verifying 802.1X on the Switch Port, on page 406 · Verifying the Authentication Type, on page 406 Information About Data Datagram Transport Layer Security Data Datagram Transport Layer Security (DTLS) enables you to encrypt CAPWAP data packets that are sent between an access point and the controller using DTLS, which is a standards-track IETF protocol that can encrypt both control and data packets based on TLS. CAPWAP control packets are management packets that are exchanged between a controller and an access point while CAPWAP data packets encapsulate forwarded wireless frames. CAPWAP control and data packets are sent over separate UDP ports: 5246 (control) and 5247 (data). If an access point does not support DTLS data encryption, DTLS is enabled only for the control plane, and a DTLS session for the data plane is not established. If an access point supports Data DTLS, it enables data DTLS after receiving the new configuration from the controller . The access point performs a DTLS handshake on port 5247 and after successfully establishing the DTLS session. All the data traffic (from the access point to the controller and the controller to the access point) is encrypted. Note The throughput is affected for some APs that have data encryption enabled. The controller does not perform a DTLS handshake immediately after processing client-hello with a cookie, if the following incorrect settings are configured: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 397 Configuring Data DTLS (GUI) Lightweight Access Points · ECDHE-ECDSA cipher in "ap dtls-cipher <>" and RSA-based certificate in "wireless management trustpoint". · RSA cipher in "ap dtls-cipher <>" and EC-based certificate in "wireless management trustpoint". Note This is applicable when you move from CC -> FIPS -> non-FIPS mode. Note If the AP's DHCP lease time is less and the DHCP pool is small, access point join failure or failure in establishing the Data Datagram Transport Layer Security (DTLS) session may occur. In such scenarios, associate the AP with a named site-tag and increase the DHCP lease time for at least 8 days. Configuring Data DTLS (GUI) Follow the procedure to enable DTLS data encryption for the access points on the controller : Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Click Configuration > Tags and Profile > AP Join. Click Add to create a new AP Join Profile or click an existing profile to edit it. Click CAPWAP > Advanced. Check Enable Data Encryption check box to enable Datagram Transport Layer Security (DTLS) data encryption. Click Update & Apply to Device. Configuring Data DTLS (CLI) Follow the procedure given below to enable DTLS data encryption for the access points on the controller : Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap profile ap-profile Example: Purpose Enters global configuration mode. Configures an AP profile and enters AP profile configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 398 Lightweight Access Points Introduction to the 802.1X Authentication Step 3 Step 4 Step 5 Step 6 Command or Action Device(config)# ap profile test-ap-profile Purpose Note You can use the default AP profile (default-ap-profile) or create a named AP profile, as shown in the example. link-encryption Example: Device(config-ap-profile)# link-encryption Enables link encryption based on the profile. Answer yes, when the system prompts you with this message: Note If you set stats-timer as as zero (0) under the AP profile, then the AP will not send the link encryption statistics. Enabling link-encryption will reboot the APs with link-encryption. Are you sure you want to continue? (y/n)[y]: end Example: Device(config-ap-profile)# end Returns to privileged EXEC mode. show wireless dtls connections Example: Device# show wireless dtls connections (Optional) Displays the DTLS session established for the AP that has joined this controller. show ap link-encryption Example: Device# show ap link-encryption (Optional) Displays the link encryption-related statistics (whether link encryption is enabled or disabled) counter received from the AP. Introduction to the 802.1X Authentication IEEE 802.1X port-based authentication is configure on a device to prevent unauthorized devices from gaining access to the network. The device can combine the function of a router, switch, and access point, depending on the fixed configuration. Any device connecting to a switch port where 802.1X authentication is enabled must go through relevant EAP authentication model to start exchanging traffic. Currently, the Cisco Wave 2 and Wi-Fi 6 (802.11AX) APs support 802.1X authentication with switch port for EAP-FAST, EAP-TLS and EAP-PEAP methods. Now, you can enable configurations and provide credentials to the AP from the controller . Note If the AP is dot1x EAP-FAST, when the AP reboots, it should perform an anonymous PAC provision. For performing PAC provision, the ADH cipher suites should be used to establish an authenticated tunnel. If the ADH cipher suites are not supported by radius servers, AP will fail to authenticate on reload. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 399 EAP-FAST Protocol Lightweight Access Points EAP-FAST Protocol In the EAP-FAST protocol developed by Cisco, in order to establish a secured TLS tunnel with RADIUS, the AP requires a strong shared key (PAC), either provided via in-band provisioning (in a secured channel) or via out-band provisioning (manual). Note The EAP-FAST type configuration requires 802.1x credentials configuration for AP, since AP will use EAP-FAST with MSCHAP Version 2 method. Note Local EAP is not supported on the Cisco 7925 phones. Note In Cisco Wave 2 APs, for 802.1x authentication using EAP-FAST after PAC provisioning (caused by the initial connection or after AP reload), ensure that you configure the switch port to trigger re-authentication using one of the following commands: authentication timer restart num or authentication timer reauthenticate num. Starting from Cisco IOS XE Amsterdam 17.1.1, TLS 1.2 is supported in EAP-FAST authentication protocol. EAP-TLS/EAP-PEAP Protocol The EAP-TLS protocol or EAP-PEAP protocol provides certificate based mutual EAP authentication. In EAP-TLS, both the server and the client side certificates are required, where the secured shared key is derived for the particular session to encrypt or decrypt data. Whereas, in EAP-PEAP, only the server side certificate is required, where the client authenticates using password based protocol in a secured channel. Note The EAP-PEAP type configuration requires Dot1x credentials configuration for AP; and the AP also needs to go through LSC provisioning. AP uses the PEAP protocol with MSCHAP Version 2 method. Limitations of the 802.1X Authentication · 802.1X is not supported on dynamic ports or Ethernet Channel ports. · 802.1X is not supported in a mesh AP scenario. · There is no recovery from the controller on credential mismatch or the expiry/invalidity of the certificate on AP. The 802.1X authentication has to be disabled on the switch port to connect the AP back to fix the configurations. · There are no certificate revocation checks implemented on the certificates installed in AP. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 400 Lightweight Access Points Topology - Overview · Only one Locally Significant Certificates (LSC) can be provisioned on the AP and the same certificate must be used for CAPWAP DTLS session establishment with controller and the 802.1X authentication with the switch. If global LSC configuration on the controller is disabled; AP deletes LSC which is already provisioned. · If clear configurations are applied on the AP, then the AP will lose the 802.1X EAP type configuration and the LSC certificates. AP should again go through staging process if 802.1X is required. · 802.1X for trunk port APs on multi-host authentication mode is supported. Network Edge Authentication Topology (NEAT) is not supported on COS APs. Topology - Overview The 802.1X authentication events are as follows: 1. The AP acts as the 802.1X supplicant and is authenticated by the switch against the RADIUS server which supports EAP-FAST along with EAP-TLS and EAP-PEAP. When dot1x authentication is enabled on a switch port, the device connected to it authenticates itself to receive and forward data other than 802.1X traffic. 2. In order to authenticate with EAP-FAST method, the AP requires the credentials of the RADIUS server. It can be configured at the controller , from where it will be passed on to the AP via configuration update request. For, EAP-TLS or EAP-PEAP the APs use the certificates (device/ID and CA) made significant by the local CA server. Figure 17: Figure: 1 Topology for 802.1X Authentication Configuring 802.1X Authentication Type and LSC AP Authentication Type (GUI) Procedure Step 1 Step 2 Choose Configuration > Tags & Profiles > AP Join. On the AP Join Profile page, click Add. The Add AP Join Profile page is displayed. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 401 Configuring 802.1X Authentication Type and LSC AP Authentication Type Lightweight Access Points Step 3 Step 4 Step 5 Step 6 In the AP > General tab, navigate to the AP EAP Auth Configuration section. From the EAP Type drop-down list, choose the EAP type as EAP-FAST, EAP-TLS, or EAP-PEAP to configure the dot1x authentication type. From the AP Authorization Type drop-down list, choose the type as either CAPWAP DTLS + or CAPWAP DTLS. Click Save & Apply to Device. Configuring 802.1X Authentication Type and LSC AP Authentication Type Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 ap profile profile-name Specify a profile name. Example: Device(config)# ap profile new-profile Step 4 dot1x {max-sessions | username | eap-type | Configures the dot1x authentication type. lsc-ap-auth-state} max-sessions: Configures the maximum 802.1X Example: sessions initiated per AP. Device(config-ap-profile)# dot1x eap-type username: Configures the 802.1X username for all Aps. eap-type: Configures the dot1x authentication type with the switch port. lsc-ap-auth-state: Configures the LSC authentication state on the AP. Step 5 dot1x eap-type {EAP-FAST | EAP-TLS | EAP-PEAP} Configures the dot1x authentication type: EAP-FAST, EAP-TLS, or EAP-PEAP. Example: Device(config-ap-profile)# dot1x eap-type Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 402 Lightweight Access Points Configuring the 802.1X Username and Password (GUI) Step 6 Step 7 Command or Action Purpose dot1x lsc-ap-auth-state {CAPWAP-DTLS | Configures the LSC authentication state on the Dot1x-port-auth | Both} AP. Example: Device(config-ap-profile)#dot1x lsc-ap-auth-state Dot1x-port-auth CAPWAP-DTLS: Uses LSC only for CAPWAP DTLS. Dot1x-port-auth: Uses LSC only for dot1x authentication with port. Both: Uses LSC for both CAPWAP-DTLS and Dot1x authentication with port. end Example: Device(config-ap-profile)# end Exits the AP profile configuration mode and enters privileged EXEC mode. Configuring the 802.1X Username and Password (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Choose Configuration > Tags & Profiles > AP Join. On the AP Join page, click the name of the AP Join profile or click Add to create a new one. Click the Management tab and then click the Credentials tab. Enter the local username and password details. Choose the appropriate local password type. Enter 802.1X username and password details. Choose the appropriate 802.1X password type. Enter the time in seconds after which the session should expire. Enable local credentials and/or 802.1X credentials as required. Click Update & Apply to Device. Configuring the 802.1X Username and Password (CLI) The following procedure configures the 802.1X password for all the APs: Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 403 Enabling 802.1X on the Switch Port Lightweight Access Points Step 2 Step 3 Step 4 Step 5 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. ap profile profile-name Specify a profile name. Example: Device(config)# ap profile new-profile dot1x {max-sessions | username | eap-type | Configures the dot1x authentication type. lsc-ap-auth-state} max-sessions: Configures the maximum 802.1X Example: sessions initiated per AP. Device(config-ap-profile)# dot1x eap-type username: Configures the 802.1X username for all Aps. eap-type: Configures the dot1x authentication type with the switch port. lsc-ap-auth-state: Configures the LSC authentication state on the AP. dot1x username <username> password {0 | 8} <password> Example: Configures the dot1x password for all the APs. 0: Specifies an unencrypted password will follow. Device(config-ap-profile)#dot1x username 8: Specifies an AES encrypted password will username password 0 password follow. Enabling 802.1X on the Switch Port The following procedure enables 802.1X on the switch port: Procedure Step 1 Step 2 Step 3 Command or Action enable Example: Device> enable configure terminal Example: Device# configure terminal aaa new-model Example: Device(config)# aaa new-model Purpose Enables privileged EXEC mode. Enters global configuration mode. Enables AAA. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 404 Lightweight Access Points Enabling 802.1X on the Switch Port Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action Purpose aaa authentication dot1x {default | listname} Creates a series of authentication methods that method1[method2...] are used to determine user privilege to access Example: the privileged command level so that the device can communicate with the AAA server. Device(config)# aaa authentication dot1x default group radius aaa authourization network group Example: aaa authourization network group Enables AAA authorization for network services on 802.1X. dot1x system-auth-control Example: Device(config)# dot1x system-auth-control Globally enables 802.1X port-based authentication. interface type slot/port Example: Device(config)# interface fastethernet2/1 Enters interface configuration mode and specifies the interface to be enabled for 802.1X authentication. authentication port-control {auto | force-authorized | force-unauthorized} Example: Device(config-if)# authentication port-control auto Enables 802.1X port-based authentication on the interface. auto--Enables IEEE 802.1X authentication and causes the port to begin in the unauthorized state, allowing only EAPOL frames to be sent and received through the port. The authentication process begins when the link state of the port changes from down to up or when an EAPOL-start frame is received. The Device requests the identity of the supplicant and begins relaying authentication messages between the supplicant and the authentication server. Each supplicant attempting to access the network is uniquely identified by the Device by using the supplicant MAC address. force-authorized---Disables IEEE 802.1X authentication and causes the port to change to the authorized state without any authentication exchange required. The port sends and receives normal traffic without IEEE 802.1X-based authentication of the client. This is the default setting. force-unauthorized--Causes the port to remain in the unauthorized state, ignoring all attempts by the supplicant to authenticate. The Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 405 Verifying 802.1X on the Switch Port Lightweight Access Points Step 9 Step 10 Command or Action Purpose Device cannot provide authentication services to the supplicant through the port. dot1x pae [supplicant | authenticator | both] Enables 802.1X authentication on the port with Example: default parameters. Device(config-if)# dot1x pae authenticator end Example: Device(config-if)# end Enters privileged EXEC mode. Verifying 802.1X on the Switch Port The following show command displays the authentication state of 802.1X on the switch port: Device# show dot1x all Sysauthcontrol Enabled Dot1x Protocol Version 2 Dot1x Info for FastEthernet1 ----------------------------------- PAE = AUTHENTICATOR PortControl = AUTO ControlDirection = Both HostMode = MULTI_HOST ReAuthentication = Disabled QuietPeriod = 60 ServerTimeout = 30 SuppTimeout = 30 ReAuthPeriod = 3600 (Locally configured) ReAuthMax =2 MaxReq =2 TxPeriod = 30 RateLimitPeriod =0 Device# Verifying the Authentication Type The following show command displays the authentication state of an AP profile: Device#show ap profile <profile-name> detailed ? chassis Chassis | Output modifiers <cr> Device#show ap profile <profile-name> detailed AP Profile Name Description ... Dot1x EAP Method LSC AP AUTH STATE : default-ap-profile : default ap profile : [EAP-FAST/EAP-TLS/EAP-PEAP/Not-Configured] : [CAPWAP DTLS / DOT1x port auth / CAPWAP DTLS + DOT1x port auth Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 406 2 3 C H A P T E R AP Joining · Failover Priority for Access Points, on page 407 · Setting AP Priority (GUI), on page 408 · Setting AP Priority, on page 408 · Overview of Access Point Plug-n-Play, on page 408 · Provisioning AP from PnP Server, on page 409 · Verifying AP Tag Configuration, on page 409 · Feature History for AP Fallback to Controllers Using AP Priming Profile, on page 410 · Information About AP Fallback to Controllers Using AP Priming Profile, on page 410 · Restrictions for AP Fallback to Controllers Using AP Priming Profile, on page 410 · Configure AP Priming Profile, on page 411 · Configure AP Priming Using Filters, on page 412 · Configure Per-AP Priming, on page 413 · Verify the Configuration, on page 413 Failover Priority for Access Points Each controller has a defined number of communication ports for access points. When multiple controllers with unused access point ports are deployed on the same network and one controller fails, the dropped access points automatically poll for unused controller ports and associate with them. The following are some guidelines for configuring failover priority for access points: · You can configure your wireless network so that the backup controller recognizes a join request from a higher-priority access point, and if necessary, disassociates a lower-priority access point as a means to provide an available port. · Failover priority is not in effect during the regular operation of your wireless network. It takes effect only if there are more associations requests to controller than the avaiable AP capacity on the controller. · AP priority is checked while connecting to the controller when the controller is in full scale or the primary controller fails, the APs fallback to the secondary controller. · You can enable failover priority on your network and assign priorities to the individual access points. · By default, all access points are set to priority level 1, which is the lowest priority level. Therefore, you need to assign a priority level only to those access points that warrant a higher priority. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 407 Setting AP Priority (GUI) Lightweight Access Points Setting AP Priority (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Wireless > Access Points. Click the Access Point. In the Edit AP dialog box, go to High Availability tab. Choose the priority from the AP failover priority drop-down list. Click Update and Apply to Device. Setting AP Priority Note Priority of access points ranges from 1 to 4, with 4 being the highest. Procedure Step 1 Command or Action ap name ap-name priority priority Example: Device# ap name AP44d3.ca52.48b5 priority 1 Purpose Specifies the priority of an access point. Step 2 show ap config general Example: Device# show ap config general Displays common information for all access points. Step 3 show ap name ap-name config general Example: Device# show ap name AP44d3.ca52.48b5 config general Displays the configuration of a particular access point. Overview of Access Point Plug-n-Play The Plug and Play (PnP) server provides staging parameters to an access point (AP) before it joins a controller. Using this staging configuration, the AP receives the runtime configuration when it joins the controller. The AP PnP feature enables the PnP server to provide all tag-related information, as part of the preconfigured information to the AP and in turn, to the controller. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 408 Lightweight Access Points Provisioning AP from PnP Server You can upload configuration in PNP server in either TXT or JSON format and also add the AP details. The AP details are then mapped with the details in the TXT or JSON configuration file. While provisioning AP from PnP server, the AP acquires this configuration details. Based on the configuration details, the AP then joins the corresponding controller with the tag details. Provisioning AP from PnP Server You can provision AP from PnP Server in either ways: · Configure DHCP server or switch with Option 43. For example, you can refer to the following code sample: ip dhcp pool vlan10 network 9.10.10.0 255.255.255.0 default-router 9.10.10.1 option 43 ascii 5A1D;B2;K4;|9.10.60.5;J80 · Configure DHCP server with DNS. For example, you can refer to the following code sample: ip dhcp pool vlan10 network 9.10.10.0 255.255.255.0 default-router 9.10.10.1 dns-server 9.8.65.5 domain-name dns.com Verifying AP Tag Configuration The following example shows how to verify the AP tag configuration: Device# show ap tag summary Number of APs: 5 AP Name RF Tag Name AP Mac Misconfigured Site Tag Name Tag Source Policy Tag Name ---------------------------------------------------------------------------------------------------------------------------------------------- APd42c.4482.6102 default-rf-tag d42c.4482.6102 default-site-tag No Default default-policy-tag AP00c1.64d8.6af0 named-rf-tag 00c1.64d8.6af0 named-site-tag No AP named-policy-tag Note The details in the second row reflect the tag source coming from a PNP server. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 409 Feature History for AP Fallback to Controllers Using AP Priming Profile Lightweight Access Points Feature History for AP Fallback to Controllers Using AP Priming Profile This table provides release and related information for the feature explained in this module. Table 29: Feature History for AP Fallback to Controllers Using AP Priming Profile Release Cisco IOS XE Cupertino 17.9.2 Feature Feature Information AP Fallback to Controllers Using AP Priming Profile This feature helps to configure primary, secondary, and tertiary controllers for a group of APs matching regular expression or for an individual AP using priming profiles. Information About AP Fallback to Controllers Using AP Priming Profile In large networks, accessing every AP console and configuring AP priming for primary, secondary, and tertiary controllers are not easy tasks. The AP Fallback to Controllers Using AP Priming Profile feature allows you to simplify the task of priming APs by using profiles defined in the controller. Using the AP priming profile under the AP filter profile, you can configure primary, secondary, and tertiary controllers for a group of APs matching regular expressions, or for an individual AP using AP Ethernet MAC. When the AP joins the controller, the AP priming configuration gets pushed to the AP depending on whether priming override is enabled or not. Note When the controller sends a priming profile to the AP, the AP disconnects from the current controller and joins the controller in the priming profile. A CAPWAP restart or device reboot is not required. Restrictions for AP Fallback to Controllers Using AP Priming Profile · Rolling AP upgrade will not work if priming override is enabled. · The maximum number of priming profiles permitted is 128. The length of each profile can be up to 32 ASCII characters. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 410 Lightweight Access Points Configure AP Priming Profile Configure AP Priming Profile Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile ap priming profile-name Example: Device(config)# wireless profile ap priming Prime-FX Configures the profile to prime APs. Step 3 primary controller-name ip-address Example: Device(config-priming)# primary aaaa 209.165.201.2 Configures name and IP address of the primary controller for AP fallback. Step 4 secondary controller-name ip-address Example: Configures name and IP address of the secondary controller for AP fallback. Device(config-priming)# secondary bbbb 209.165.201.3 Step 5 tertiary controller-name ip-address Example: Device(config-priming)# tertiary bbbb 209.165.201.4 Configures name and IP address of the tertiary controller for AP fallback. Step 6 priming-override Sends the priming details to the AP. Example: Priming override is disabled by default. When Device(config-priming)# priming-override disabled, information stored in the AP priming profile is not sent to the APs. . Note N+1 upgrade may not work as expected when priming override is enabled. Before using N+1 upgrade, ensure that priming override is disabled using the no priming-override command. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 411 Configure AP Priming Using Filters Lightweight Access Points Configure AP Priming Using Filters Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap filter name filter-name type priming Example: Device(config)# ap filter name test-filter type priming Purpose Enters global configuration mode. Configures the AP filter and sets the type as priming. Ensure that you set type as priming because the default filter type is tag. Note The existing filter type cannot be modified unless the filter is deleted and created with a different type. Use the no ap filter name command to delete a filter. Step 3 Step 4 Step 5 Step 6 ap name-regex reg-ex Example: Device(config-ap-pr-filter)# ap name-regex BGL18 Configures the AP name regular expression match. profile profile-name Example: Device(config-ap-pr-filter)# profile Prime-FX Maps the priming profile to the filter. exit Example: Device(config-ap-pr-filter)# exit Returns to global configuration. ap filter priority priority filter-name filter-name Example: Device(config)# ap filter priority 12 filter-name test-filter Configures priority for a named AP filter. You can configure multiple AP priming profiles with unique priority levels. This allows you to set different priority levels for each AP priming profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 412 Lightweight Access Points Configure Per-AP Priming Configure Per-AP Priming Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap mac-address Example: Device(config)# ap 00:00:5e:00:53:af Enters AP profile configuration mode. Step 3 priming profile-name Maps a priming profile to an AP. Example: Device(config-ap-tag)# priming Prime-FX Verify the Configuration To view the list of all the priming filters, use the following command: Device# show ap filters all type priming Filter Name regex Priming profile -------------------------------------------------------------------------------------------- FLR1 *AP-FLOOR-1* AP-PRIMING-1 FLR2 *AP-FLOOR-2* AP-PRIMING-2 To view the list of all the active priming filters, use the following command: Device# show ap filters active type priming Priority Filter Name regex Priming profile -------------------------------------------------------------------------------------------- 0 FLR2 *AP-FLOOR-2* AP-PRIMING-2 1 FLR1 *AP-FLOOR-1* To view the summary of the priming profiles, use the following command: Device# show wireless profile ap priming summary AP-PRIMING-1 Number of AP Priming Profiles: 2 Priming profile ------------------AP-PRIMING-1 AP-PRIMING-2 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 413 Verify the Configuration Lightweight Access Points To view the details of the priming profiles, use the following command: Device# show wireless profile ap priming all Profile Name Primary Controller Name Primary Controller IP Secondary Controller Name Secondary Controller IP Tertiary Controller Name Tertiary Controller IP Override ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------- AP-PRIMING-1 BGL18-wlc 209.165.201.1 BGL17-wlc 209.165.201.2 0.0.0.0 Disabled AP-PRIMING-2 BGL18-wlc 209.165.201.2 BGL17-wlc 209.165.201.2 BGL12-wlc 209.165.201.3 Disabled To view the priming information for each AP, use the following command: Device# show ap ap1 config general | sec Priming Priming Profile Priming Override Priming Source Filter Name : AP-PRIMING-1 : Disabled : MAC/FILTER/NONE : FLR1 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 414 2 4 C H A P T E R AP Management · AP Crash File Upload, on page 416 · Configuring AP Crash File Upload (CLI), on page 417 · Information About LED States for Access Points, on page 417 · Configuring LED State in Access Points (GUI), on page 418 · Configuring LED State for Access Points in the Global Configuration Mode (CLI), on page 418 · Configuring LED State in the AP Profile, on page 419 · Verifying LED State for Access Points, on page 419 · Access Point Support Bundle, on page 420 · Exporting an AP Support Bundle (GUI), on page 420 · Exporting an AP Support Bundle (CLI), on page 421 · Monitoring the Status of Support Bundle Export, on page 421 · Information About Access Point Memory Information, on page 421 · Verifying Access Point Memory Information, on page 422 · Information About Access Point Tag Persistency, on page 422 · Configuring AP Tag Persistency (GUI), on page 422 · Configuring AP Tag Persistency (CLI), on page 423 · Verifying AP Tag Persistency, on page 424 · Feature History for AP Power Save, on page 425 · Information About AP Power Save, on page 425 · Wakeup Threshold for Access Point Power Save Mode, on page 430 · AP Power Save Scenarios, on page 430 · Configuring Radio Spatial Streams (GUI), on page 433 · Configuring Radio Spatial Streams (CLI), on page 434 · Configuring a Calendar Profile (GUI), on page 436 · Configuring a Calendar Profile (CLI), on page 437 · Configuring a Power Policy in an AP Join Profile (GUI), on page 438 · Mapping a Power Profile Under an AP Profile (CLI), on page 439 · Configuring Client Wakeup Threshold (CLI), on page 440 · Configuration Example of Power Profile, on page 440 · Verifying Access Point Power Policy (GUI), on page 441 · Verifying the Access Point Power Profile, on page 441 · Verifying Radio Spatial Streams, on page 442 · Verifying Client Threshold, on page 443 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 415 AP Crash File Upload Lightweight Access Points · Information About Access Point Real-Time Statistics, on page 443 · Feature History for Real Time Access Point Statistics, on page 443 · Restrictions for AP Radio Monitoring Statistics , on page 444 · Configuring Access Point Real Time Statistics (GUI), on page 444 · Configuring Real-Time Access Point Statistics (CLI), on page 445 · Configuring AP Radio Monitoring Statistics, on page 447 · Monitoring Access Point Real-Time Statistics (GUI), on page 448 · Verifying Access Point Real-Time Statistics, on page 449 · Feature History for Access Point Auto Location Support, on page 449 · Information About Access Point Auto Location Support, on page 450 · Configuring Access Point Geolocation Derivation Using Ranging (GUI) , on page 451 · Configuring Access Point Geolocation Derivation Using Ranging (CLI), on page 451 · Configuring Access Point Ranging Parameters (GUI), on page 451 · Configuring Access Point Ranging Parameters (CLI), on page 452 · Configuring Access Point Coordinates and Floor Information (CLI), on page 453 · Configuring On-Demand Access Point Ranging (CLI), on page 453 · Verifying Access Point Geolocation Information, on page 454 AP Crash File Upload When a converted access point unexpectedly reboots, the access point stores a crash file on its local flash memory at the time of the crash. After the unit reboots, it sends the reason for the reboot to the device. If the unit rebooted because of a crash, the device pulls up the crash file using the existing CAPWAP messages and stores it in the device flash memory. The crash information copy is removed from the access point's flash memory when the device pulls it from the access point: Note The system does not generate reports in case of a reload. During a process crash, the following are collected locally from the device: · Full process core · Trace logs · Cisco IOS syslogs (not guaranteed in case of nonactive crashes) · System process information · Bootup logs · Reload logs · Certain types of proc information All this information is stored in separate files, which are then archived and compressed into one bundle. This makes it convenient to get a crash snapshot in one place, and can be then moved off the box for analysis. This report is generated before the device goes down to ROMMON/bootloader. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 416 Lightweight Access Points Configuring AP Crash File Upload (CLI) Note Except for the full core and tracelogs, everything else is a text file. Configuring AP Crash File Upload (CLI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 enable Enters privileged EXEC mode. ap name ap-name crash-file get-crash-data Collects AP crash information. The crash file is uploaded automatically after the AP reloads to ready state. Therefore, this command does not have to be manually executed. ap name ap-name crash-file get-radio-core-dump slot {0 | 1} Collects the AP core dump file for slot 0 or slot 1. ap name ap-name core-dump tftp-ip crash-file uncompress Uploads the AP crash coredump file to the given TFTP location. show ap crash-file Displays the AP crash file, as well as the radio crash file. dir bootflash Displays the crash file in bootflash with .crash extension. Information About LED States for Access Points In a wireless LAN network where there are a large number of access points, it is difficult to locate a specific access point associated with the controller. You can configure the controller to set the LED state of an access point so that it blinks and the access point can be located. This configuration can be done in the wireless network on a global as well as per-AP level. The LED state configuration at the global level takes precedence over the AP level. Note For APs that have Ethernet LEDs in addition to the main system LED, the Ethernet LEDs are enabled or disabled (switched ON or OFF) as per the system LED. For example, if the system LED is ON, the Ethernet LED will also be ON. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 417 Configuring LED State in Access Points (GUI) Lightweight Access Points Configuring LED State in Access Points (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Wireless > Access Points. Click an AP from the AP list. The Edit AP window is displayed. In the General tab, under the General section, go to LED Settings. a) Click the box adjacent to the LED State field to enable or disable the LED state. b) From the LED Brightness Level drop-down list, choose a value from 1 to 8. Under the Flash Settings section, perform the following steps: a) Click the box adjacent to the Flash State field to enable or disable the flash state. When the flash state is enabled, the current status of the flash and the flash duration fields are displayed. b) From the Flash Duration drop-down list, choose either Always ON or Timed. If you choose the Timed option, the Time Duration field is displayed. c) In the Time Duration field, specify the flash duration time, in seconds. The default value is one second. The valid range is between 1 second and 3600 seconds. Click Update & Apply to Device. Configuring LED State for Access Points in the Global Configuration Mode (CLI) Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password if prompted. Step 2 ap name Cisco-AP-name led Example: Device# ap name Cisco-AP-name led Enables the LED state for Cisco APs, globally. Step 3 ap name Cisco-AP-name led flash {start duration duration | stop} Example: Configures the starting and the stopping of the AP LED flash. The valid start duration range is between 0 and 3600 seconds. Device# ap name Cisco-AP-name led flash start duration 20 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 418 Lightweight Access Points Configuring LED State in the AP Profile Step 4 Command or Action Purpose Device# ap name Cisco-AP-name led flash stop ap name Cisco-AP-name led-brightness-level Configures the LED brightness level. Value of 1-8 the brightness is from 1 to 8. Example: Device# ap name Cisco-AP-name led-brightness-level 4 Configuring LED State in the AP Profile Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap profile default-ap-profile Example: Device(config)#ap profile default-ap-profile Step 3 led Example: Device(config-ap-profile)# led Purpose Enters global configuration mode. Enters the AP profile configuration mode. Enables the LED-state for all Cisco APs. Verifying LED State for Access Points To verify the LED state of the access points, use the following command: show ap name AXXX-APXXXX.bdXX.f2XX config general Device# show ap name AXXX-APXXXX.bdXX.f2XX config general Cisco AP Name : AXXX-APXXXX.bdXX.f2XX ================================================= Cisco AP Identifier : 0cXX.bdXX.65XX Country Code : Multiple Countries : FR,IN,US Regulatory Domain Allowed by Country : 802.11bg:-AE 802.11a:-ABDEN AP Country Code : US - United States AP Regulatory Domain 802.11bg : -A 802.11a : -B . . . CAPWAP Preferred mode : IPv4 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 419 Access Point Support Bundle Lightweight Access Points CAPWAP UDP-Lite : Not Configured AP Submode : WIPS Office Extend Mode : Disabled Dhcp Server : Disabled Remote AP Debug : Disabled Logging Trap Severity Level : information Logging Syslog facility : kern Software Version : 17.X.0.XXX Boot Version : 1.1.X.X Mini IOS Version : 0.0.0.0 Stats Reporting Period : 180 LED State : Enabled MDNS Group Id : 0 . . . Access Point Support Bundle An access point (AP) support bundle contains core files, crash files, show run-configuration, configuration commands, msglogs, and traplogs. This topic describes how you can retrieve the support bundle information of an AP and export it to the controller or to an external server. (Until Cisco IOS XE, Release 17.2.1, you had to log in to the AP console to retrieve the AP support-bundle information.) The Access Point Support Bundle feature is supported only on Cisco Wave2 APs and Cisco Catalyst APs. Exporting an AP Support Bundle (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Wireless > Access Points. Click the corresponding AP name. The Edit AP window is displayed. Click the Support Bundle tab. From the Destination drop-down list, choose one of the following: · This Device: If you choose this, enter the values for the Server IP, Destination File Path, Username, and Password fields. Note When you choose This Device, a bundle is sent through Secure Copy (SCP) to the controller (if you have configured the ip scp server enable command globally on the controller). You can easily retrieve the bunde later from your browser, using the controller file manager. · External Server: If you choose this, from the Transfer Mode drop-down list, choose either scp or tftp. If you choose the scp transfer mode, enter the values for the Server IP, Destination File Path, Username, and Password fields. If you choose the tftp transfer mode, enter the values for the Server IP, and Destination File Path fields. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 420 Lightweight Access Points Exporting an AP Support Bundle (CLI) Step 5 Note Information about the Last Export Status, such as State, Transfer Mode, Server IP, File Path, and Time of Export, is displayed on the right-hand side of the window. Click Start Transfer. Exporting an AP Support Bundle (CLI) Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. Step 2 ap name Cisco-AP-name export Exports the AP support bundle through the SCP support-bundle mode { scp | tftp} target or TFTP transfer modes. ip-address {A.B.C.D | X:X:X:X::X} path file-path If you select the scp, you will be prompted to provide your username and password. Example: For tftp, username and password is not Device> ap name Cisco-AP-name export required. support-bundle mode scp target ip-address 10.1.1.1 path file-path Monitoring the Status of Support Bundle Export To monitor the status of a support bundle export, run the following command: Device# show ap support-bundle summary AP Name Server-IP Status Last Successful Time Path File-name ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ AP_28XXX 81.1.1.10 Copy Success 04/24/2020 07:27:38 UTC AP_28XXX_support.17.4.0.2.2020.07XXXX.tgz Information About Access Point Memory Information With the introduction of the Acess Point Memory Information feature, you can view the acces point (AP) memory type, the CPU type, and the memory size per AP, after single sign-on authentication. APs share the the memory information with the controller during the join phase. To view the memory information of a specific AP, use the show ap name AP-NAMEconfig general command. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 421 Verifying Access Point Memory Information Lightweight Access Points Verifying Access Point Memory Information To verify the memory information of a specified AP, including the CPU type, memory type and memory size, use the following command: Device# show ap name AP-NAME config general Cisco AP Name : AP-NAME ================================================= Cisco AP Identifier : 00XX.f1XX.e0XX Country Code : Multiple Countries : FR,IN,US Regulatory Domain Allowed by Country : 802.11bg:-AE 802.11a:-ABDEN AP Country Code : US - United States AP Regulatory Domain 802.11bg : -A 802.11a : -B . . . CPU Type : ARMv7 Processor rev 1 (v7l) Memory Type : DDR4 Memory Size : 1028096 KB . . . Information About Access Point Tag Persistency From Cisco IOS XE Bengaluru 17.6.1 onwards, AP tag persistency is enabled globally on the controller. When APs join a controller with tag persistency enabled, the mapped tags are saved on the APs without having to write the tag configurations on each AP, individually. Configuring AP Tag Persistency (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Tags & Profiles > Tags. Click the AP tab. In the Tag Source tab, check the Enable AP Tag Persistency check box to configure AP Tag persistency globally. When APs join a controller with the tag persistency enabled, the mapped tags are saved on the AP without having to write the tag configurations on each AP individually. Click Apply to Device. What to do next Save tags on an AP. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 422 Lightweight Access Points Saving Tags on an Access Point (GUI) Saving Tags on an Access Point (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Choose Configuration > Wireless > Access Points. Click an AP from the list. The Edit AP page is displayed. Click the General tab. In the Tags section, specify the appropriate policy, site, and RF tags that you created in the Configuration > Tags & Profiles > Tags page. From the Policy drop-down list, select a value. From the Site drop-down list, select a value. From the RF drop-down list, select a value. Check the Write Tag Config to AP check box to push the tags to the AP so that the AP can save and remember this information even when the AP is moved from one controller to another. Click Update & Apply to Device. Deleting Saved Tags on the Access Point Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Wireless > Access Points. Click an AP from the list of APs. The Edit AP window is displayed. In the Edit AP window, choose the Advanced tab. In the Set to Factory Default section, check the Clear Resolved Tag Config check box to clear the saved tags on an AP. Click Update & Apply to Device. Configuring AP Tag Persistency (CLI) Before you begin For an AP to preserve its policy tag, site tag, and RF tag configured from the primary controller, these tags must also exist on the other controllers that the AP connect to. If all the three tags do not exist, the AP applies the default policy tag, site tag, and RF tag. Similarly, the tag policy is applicable even if one or two tags exist. AP tag persistency helps in priming an AP in N+1 redundancy scenarios. For more information about configuring tags, see https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/17-6/config-guide/b_wl_17_6_cg/m_config_model.html. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 423 Verifying AP Tag Persistency Lightweight Access Points Note After being enabled, AP tag persistency is performed during AP join. Therefore, if there are any APs that are already joined to the controller, those APs must rejoin the controller. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap tag persistency enable Configures AP tag persistency. Example: Device(config)# ap tag persistency enable Step 3 end Example: Device(config)# end Exits configuration mode and returns to privileged EXEC mode. Verifying AP Tag Persistency To verify AP tag persistency in the primary controller, use the following command: Device# show ap tag summary Number of APs: 1 AP Name AP Mac Site Tag Name Policy Tag Name RF Tag Name Misconfigured Tag Source -------------------------------------------------------------------------------------------------------------------------------- Cisco01_AP xxxx.xxxx.xxxx default-site-tag OpenRoaming default-rf-tag No Static Note If the Tag Source displays Static or Filter, it means that the AP tag mappings were configured on the primary controller. If the source displays Default, it means that the AP received the default tags when joining the controller. To verify the AP tag persistency in the secondary controller, use the following command: Device# show ap tag summary Number of APs: 1 AP Name AP Mac Site Tag Name Policy Tag Name RF Tag Name Misconfigured Tag Source -------------------------------------------------------------------------------------------------------------------- Cisco01_AP xxxx.xxxx.xxxx default-site-tag OpenRoaming default-rf-tag No AP Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 424 Lightweight Access Points Feature History for AP Power Save Note If the Tag Source displays AP, it means that the the policy tag, site tag, and RF tag match what was configured on the primary controller, indicating that the AP tags have persisted across controllers. Feature History for AP Power Save This table provides release and related information for the feature explained in this module. This feature is also available in all the releases subsequent to the one in which they are introduced in, unless noted otherwise. Table 30: Feature History for AP Power Save Release Feature Information Cisco IOS XE Cupertino 17.8.1 This feature allows a network administrator to force APs to operate in low-power mode to reduce power consumption. Cisco IOS XE Cupertino 17.9.1 Feature support for the following APs: · Cisco Catalyst 9164 Series Access Points · Cisco Catalyst 9166 Series Access Points Cisco IOS XE Dublin 17.10.1 The following features are supported: · Radio spatial streams · Flexible PoE profiles Information About AP Power Save The power-save mode in APs allows a network administrator to force APs to operate in low-power mode to reduce power consumption. The AP Power Save feature is supported in the following APs: · Cisco Catalyst 9115 Series Access Points · Cisco Catalyst 9120 Series Access Points · Cisco Catalyst 9130 Series Access Points · Cisco Catalyst 9136 Series Access Points · Cisco Catalyst 9164 Series Access Points · Cisco Catalyst 9166 Series Access Points · Cisco Catalyst 9162 Series Access Points Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 425 Access Point Power Policy Lightweight Access Points Access Point Power Policy The access point power policy allows you to define the power budget utilization available for an AP, wherein, you can define a set of policies for different interfaces on an AP. You can manage interfaces such as Wi-Fi radios, USB, and so on, as required. Use Case for AP Power Policy The following is the use case of an AP power policy: · You can define a power policy for the available power inputs, such as, 802.3af, 802.3at, 802.3bt (for multiple levels), DC power, and so on. With tri-radio and quad-radio APs, the power requirement has gone beyond the capability of the 802.3at Power over Ethernet (PoE) mode. Therefore, with the AP power policy, for example, we statically predefine an AP operation when provided with non-802.3bt power (such, as TX power, radio chains, USB port, SFP, and so on). Power-Save Mode The power-save mode enables an AP to switch to a low-power mode when no clients are associated with the AP. For example, when this mode is enabled in workspaces, the AP falls asleep during after hours, thereby saving power consumption of the AP throughout the night. From Cisco IOS-XE Cupertino 17.10.1 onwards, you can shut down AP radios or lower the radio spatial streams, to reduce usage of power. You can enforce radio speed by configuring the number of spatial streams on the radios. The combinations for radio spatial stream policies are: 1X1, 2X2, 3X3 (only for Cisco Catalyst 9130 Series Access Points), 4X4, and 8X8. The following are the advantages of the power-save mode: · Increases the energy saving per AP: In the power save mode you can reduce AP functions during off-peak hours and save an additional 20% in energy costs compared to the regular idle mode. · Enables environmentally conscious purchases: Large enterprises and companies track environmental performance as one of their key indices. They have a centralized energy team to monitor their energy efficiency, which magnifies the importance of the power-save feature. PoE Profiles · Fixed PoE Profile: The APs negotiate the power that is required, from the switches they are connected to. The power required varies from one AP model to another AP model. If an AP is not granted the power it requested, it operates under the power budget. In such conditions, some of the interfaces operate under degraded conditions. For example, some radios may operate at 2SS instead of at 4SS, which they are capable of. The operating conditions for each of the AP interfaces differs from one power level to another. These are referred to as fixed PoE profiles. Fixed PoE profiles are applied when the AP is operating in normal mode, that is, nonpower-save mode. When the AP operates in power-save mode, the configured PoE power policies are applied. · PoE Power Policy: With power policies or profiles, you can configure interfaces that you want to set at certain speeds. With this policy, you can configure a profile of your choice that will be pushed to the AP Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 426 Lightweight Access Points PoE Profiles based on your calendar or timing. For example, on a group of APs in the second floor, push a profile where you want to turn off all APs, except 2.4-GHz radio, from 7 p.m. to 7 a.m. · Flexible PoE Profile: With flexible PoE profiles, you can configure different interfaces and set specific parameter values and states for each interface, instead of following fixed PoE profile rules. If an AP does not get the power it requires, it operates under the power budget by using the flexible PoE profile. Table 31: AP Power Draw Specifications: Cisco Catalyst 9115, 9120, 9130 Series APs Access PoE-In-Mode/DC Consumption Consumption Feature Mode Points Mode @ Power @ Power Device Source Equipment AP Worst-Case Radio 1 Radio Radio Ethernet USB Module PoE-Out Cable 2 3 Cisco .3af Catalyst 9115AXI .3at Access Points .3at 13.0 15.4 2X2 2X2 -- 1G N ---- 16.0 18.9 4X4 4X4 -- 2.5G N ---- 20.4 24.1 4X4 4X4 -- 2.5G Y(3.75W) -- -- Cisco .3af Catalyst 9115AXE .3at Access Points .3at 13.0 15.4 2X2 2X2 -- 1G N ---- 17.0 20.1 4X4 4X4 -- 2.5G N ---- 21.4 25.3 4X4 4X4 -- 2.5G Y(3.75W) -- -- Cisco .3af Catalyst 9120AXI/E .3at Access Points .3at 13.8 15.4 1X1 1X1 Enabled 1G N ---- 20.5 23.2 4X4 4X4 Enabled 2.5G N ---- 25.5 30.0 4X4 4X4 Enabled 2.5G Y(4.5W) -- -- Cisco .3af Catalyst 9130AXI/E .3at Access Points .3at 13.8 15.4 1X1 1X1 Enabled 1G N ---- 25.5 30.0 8X8 4X4 Enabled 5G N ---- 25.5 30.0 Primary 4X4 Enabled 5G Y(4.5W) -- -- 4X4 Secondary Off .3at 25.5 30.0 Primary Disabled Enabled 5G Y(4.5W) -- -- 4X4 Secondary 4X4 .3bt 30.5 33.3 8X8 4X4 Enabled 5G Y(4.5W) -- -- Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 427 PoE Profiles Lightweight Access Points Table 32: AP Power Draw Specifications: Cisco Catalyst 9136 Series APs Access PoEn-I-Mode Consumption Consumption Feature Mode Points @Power @Power Device Source Equipment at AP Worst-Case 5G 2G 6G AUX Mgig0 Mgig1 USB Module PoE-Out Cable Radio Radio Radio Radio Cisco .3af - 13.9 Catalyst Fixed 9136 Series .3at - 24.0 Access Fixed Points 15.4 Disabled Disabled Disabled Enabled 1G Disabled Disabled -- -- 27.90 Primary 2X2 2X2 Enabled 2.5G 2.5G Disabled -- -- - 4X4 (hitless Secondary - failover standby) Disabled .3bt - 43.4 Fixed 54.81 8X8 or 4X4 4X4 Enabled 5G 5G Y(9W) -- -- Dual 4X4 .3bt - 37.3 PoE Policy 1 41.63 8X8 or 4X4 4X4 Enabled 5G 5G Disabled -- -- Dual 4X4 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 428 Lightweight Access Points PoE Profiles Table 33: AP Power Draw Specifications: Cisco Catalyst 9166 Series APs Access PoEn-I-Mode Consumption Consumption Feature Mode Points @Power @Power Device Source Equipment at AP Worst-Case 5G 2G 6G AUX Mgig0 Mgig1 USB Module PoE-Out Cable Radio Radio Radio Radio Cisco .3af - 13.9 15.4 Disabled Disabled Disabled Enabled 1G -- Disabled -- -- Catalyst Fixed 9166 Series .3at - 25.5 30.0 4X4 4X4 4X4 Enabled 5G -- Disabled -- -- Access Fixed Points Policy .3bt - 30.5 32.8 4X4 4X4 4X4 Enabled 5G -- Y -- -- Fixed (4.5 W) DC 30.5 -- Jack - Fixed 4X4 4X4 4X4 Enabled 5G -- Y ---- (4.5 W) Table 34: AP Power Draw Specifications: Cisco Catalyst 9164 Series APs Access PoEn-I-Mode Consumption Consumption Feature Mode Points @Power @Power Device Source Equipment at AP Worst-Case 5G 2G 6G AUX Mgig0 Mgig1 USB Module PoE-Out Cable Radio Radio Radio Radio Cisco .3af - 13.9 15.4 Disabled Disabled Disabled Enabled 1G -- Disabled -- -- Catalyst Fixed 9164 Series .3at - 25.5 30.0 4X4 2X2 4X4 Enabled 2.5G -- Disabled -- -- Access Fixed Points .3bt - 30.1 32.8 4X4 2X2 4X4 Enabled 2.5G -- Y -- -- Fixed (4.5 W) DC 30.1 -- Jack - Fixed 4X4 2X2 4X4 Enabled 2.5G -- Y ---- (4.5 W) Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 429 Wakeup Threshold for Access Point Power Save Mode Lightweight Access Points Table 35: AP Power Draw Specifications: Cisco Catalyst 9162 Series APs Access PoEn-I-Mode Consumption Consumption Feature Mode Points @Power @Power Device Source Equipment at AP Worst-Case 5G 2G 6G AUX Mgig0 Mgig1 USB Module PoE-Out Cable Radio Radio Radio Radio Cisco .3af 13.3 Catalyst 9162 .3at 20.1 Series Access .3at 25.5 Points 14.32 22.67 30 1X1 Disabled 1X1 Enabled 1G -- Disabled -- -- 2X2 2X2 2X2 Enabled 2.5G -- Disabled -- -- 2X2 2X2 2X2 Enabled 2.5G -- Y -- -- (4.5W) Wakeup Threshold for Access Point Power Save Mode The Wakeup Threshold feature enables you to define the client threshold in the AP power profile configuration to determine when the AP wakes up from the power save mode or enter into the power save mode. When the AP applies the calendar associated power profile (for an active calendar), and the number of connected clients reach the wakeup threshold, the AP wakes up from power save mode and goes into the Fixed power profile mode or the Regular power profile (insufficient power) mode. When the AP applies the calendar associated power profile (for an active calendar), and the number of connected clients is less than the wakeup threshold, the AP applies the calendar associated power profile to shut down the interface or to lower the interface speed to save power. AP Power Save Scenarios The AP Power Save feature helps APs to enter into a power-save mode or low-power mode by applying a calendar, for example, for after hours, associated with the corresponding power profile. The AP profile is enhanced to associate a PoE power policy with calendar profiles. The following are the scenarios for Eco mode APs: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 430 Lightweight Access Points · Figure 18: AP in Eco Mode Behaviour: Working Days AP Power Save Scenarios On working days, from 7:00 a.m. to 7:00 p.m, the AP functions in normal mode or fixed mode, when the maximum number of clients are connected to the AP. From 7:00 p.m. to 12:00 a.m., the Cal1 calendar profile timer starts to put the AP in the power-save mode. Likewise, the Cal2 calendar profile timer starts, and extends the power-save mode from 12:00 a.m. to 7:00 a.m. Again, at 7:00 a.m., the AP goes into normal mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 431 AP Power Save Scenarios · Figure 19: AP in Eco Mode Behavior: Nonworking Days Lightweight Access Points On nonworking days, the AP goes into power-saving mode from 12:00 a.m. to 11:59:59 p.m. The Cal3 calendar profile is applied here. This profile defines the timer for the power-save mode. This means that there are no clients connected to the AP, and that the AP is asleep. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 432 Lightweight Access Points · Figure 20: AP in Eco Mode Behavior: With Clients Configuring Radio Spatial Streams (GUI) When clients are connected to the AP, the AP automatically switches to the normal mode. For example, in the calendar profile Cal1, the AP is in normal mode, because wireless clients are connected to the AP. At 8:00 p.m., clients get dissociated from the AP, and the AP goes into power-save mode. When clients enter the AP coverage area at 9:30 p.m., the AP automatically switches from power-save mode to normal mode of operation. Configuring Radio Spatial Streams (GUI) Procedure Step 1 Step 2 Choose Configuration > Tags & Profiles > Power Profile. Click Add. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 433 Configuring Radio Spatial Streams (CLI) Lightweight Access Points Step 3 Step 4 Step 5 The Add Power Profile window is displayed. Enter a name and description for the power profile. The name must be ASCII characters of up to 128 characters, without leading or trailing spaces. Click Add to add rules for the power profile. a) In the Sequence number field, enter a unique sequence number to assign the priority in which power should be disabled for the component. The sequence number of 0 indicates that the component should be disabled first. b) From the Interface drop-down list, choose Radio as the interface. c) From the Interface ID drop-down list, choose one of the following bands--6 GHz, 5 GHz, 2.4 GHz, or Secondary 5 GHz. d) From the Parameter drop-down list, choose Spatial Stream. The radio interfaces on an AP can be split into a number of spatial streams and each can be assigned a priority to either reduce power usage or be shut down. e) From the Parameter value drop-down list, choose the values depending on the interface ID that you selected. Click the check mark to save and then click Apply to Device. Configuring Radio Spatial Streams (CLI) To shut down AP radios or lower their radio spatial streams to reduce power usage, perform the following steps. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile power power-profile-name Configures the power policy profile. Example: Device(config)# wireless profile power power-profile-name Step 3 sequence-number radio 24ghz {spatial-stream Configures spatial stream for the 2.4-GHz band {1 | 2 | 3 | 4} | state shutdown} radio. Example: Here: Device(config-wireless-power-profile)# 1 radio 24ghz spatial-stream 2 · sequence-number: The power profile settings are ordered by sequence numbers. AP derating takes place as per the sequence number entered. The same combination of interface identifiers and parameter values does not appear in another sequence number. The same Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 434 Lightweight Access Points Configuring Radio Spatial Streams (CLI) Step 4 Step 5 Command or Action Purpose interface with the same parameter can appear multiple times with different parameter values. · 1: Specifies a 1X1 radio spatial stream. · 2: Specifies a 2X2 radio spatial stream. · 3: Specifies a 3X3 radio spatial stream. · 4: Specifies a 4X4 radio spatial stream. · state shutdown: Indicates that the radio state is down. sequence-number radio 5ghz {spatial-stream Configures spatial stream for the 5-GHz band {1 | 2 | 3 | 4 | 8} | state shutdown} radio. Example: Here: Device(config-wireless-power-profile)# 1 radio 5ghz spatial-stream 4 · sequence-number: The power profile settings are ordered by sequence numbers. AP derating takes place as per the sequence number entered. The same combination of interface identifiers and parameter values does not appear in another sequence number. The same interface with the same parameter can appear multiple times with different parameter values. · 1: Specifies a 1X1 radio spatial stream. · 2: Specifies a 2X2 radio spatial stream. · 3: Specifies a 3X3 radio spatial stream. · 4: Specifies a 4X4 radio spatial stream. · 8: Specifies a 8X8 radio spatial stream. · state shutdown: Indicates that the radio state is down. sequence-number radio secondary-5ghz {spatial-stream {1 | 2 | 3 | 4 | 8} | state shutdown} Example: Device(config-wireless-power-profile)# 1 radio 5ghz spatial-stream 4 Configures spatial stream for a secondary 5-GHz band radio. Here: · sequence-number: The power profile settings are ordered by sequence numbers. AP derating takes place as per the sequence number entered. The same combination of interface identifiers and parameter values does not appear in Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 435 Configuring a Calendar Profile (GUI) Lightweight Access Points Step 6 Command or Action Purpose another sequence number. The same interface with the same parameter can appear multiple times with different parameter values. · 1: Specifies a 1X1 radio spatial stream. · 2: Specifies a 2X2 radio spatial stream. · 3: Specifies a 3X3 radio spatial stream. · 4: Specifies a 4X4 radio spatial stream. · 8: Specifies a 8X8 radio spatial stream. · state shutdown: Indicates that the radio state is down. sequence-number radio 6ghz {spatial-stream Configures spatial stream for the 6-GHz band {1 | 2 | 3 | 4 | 8} | state shutdown} radio. Example: Here: Device(config-wireless-power-profile)# 1 radio 6ghz spatial-stream 2 · sequence-number: The power profile settings are ordered by sequence numbers. AP derating takes place as per the sequence number entered. The same combination of interface identifiers and parameter values does not appear in another sequence number. The same interface with the same parameter can appear multiple times with different parameter values. · 1: Specifies a 1X1 radio spatial stream. · 2: Specifies a 2X2 radio spatial stream. · 3: Specifies a 3X3 radio spatial stream. · 4: Specifies a 4X4 radio spatial stream. · state shutdown: Indicates that the radio state is down. Configuring a Calendar Profile (GUI) Configure calendar profiles to set up a daily, weekly, or monthly recurrence schedule. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 436 Lightweight Access Points Configuring a Calendar Profile (CLI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > Calendar. Click Add. The Add Calendar Profile window is displayed. Enter a name for the calendar profile. The name must be ASCII characters of up to 32 characters, without leading or trailing spaces. From the Recurrence drop-down list, choose the schedule for which you want to create a profile. Select the Start Time and the End Time for the recurrence schedule. Note · For daily recurrences, you can select the start time and end time. For example, if you want the AP to derate the power on certain interfaces between 7 p.m. to 7 a.m. daily, or if you want the controller to not allow any clients to be associated during this period, you can set up this daily recurrence schedule. To cover this timespan, you must create one calendar profile, and map it to the same power profile. After this, assign it to the AP Join profile. · For weekly recurrences, select the specific days of the week along with the start and end time. · For monthly recurrence, select the specific days of the month along with the start and end time. Step 6 Click Apply to save the configuration. Configuring a Calendar Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile calendar-profile name calendar_profile_ap_power Configures a calendar profile. Enters the calendar profile configuration mode. Example: Here, name refers to the name of the calendar Device# wireless profile calendar-profile profile. name ap_power_calendar Step 3 recurrence daily Example: Configures daily reccurence for daily profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 437 Configuring a Power Policy in an AP Join Profile (GUI) Lightweight Access Points Step 4 Step 5 Command or Action Device(config-calendar-profile)# recurrence daily Purpose start start-time end end-time Example: Configures the start time and end time for calendar profile. Device(config-calendar-profile)# start 16:00:00 end 20:00:00 end Example: Device(config-calendar-profile)# end Returns to privileged EXEC mode. Configuring a Power Policy in an AP Join Profile (GUI) Power policy supports the use of a power profile or a mapped configuration of a power profile and a calendar profile that are pushed to an AP during an AP join session. You can map a maximum of five combination profiles (calendar and power) per AP profile. Before you begin Ensure that the power profile and calendar profile are created and displayed in the respective drop-down lists in the GUI. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Tags & Profiles > AP Join. The Add AP Join Profile window is displayed. Click the AP tab. Under the AP tab, click the Power Management tab. From the Regular Power Profile drop-down list, choose the power profile. The AP applies these settings to derate the power based on the configured priority list. Note If you want the AP to apply the power profile configuration during a specific time period, choose the Calendar Profile and map it to the power profile from the drop-down list. Click the check mark to associate the mapping. Click Apply to Device to save the configuration. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 438 Lightweight Access Points Mapping a Power Profile Under an AP Profile (CLI) Mapping a Power Profile Under an AP Profile (CLI) Before you begin Ensure that you have defined a calendar profile in the wireless profile, before you map the calendar profile to an AP join profile. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap profile ap-profile-name Example: Device(config)# ap profile ap-profile-name Configures an AP profile and enters AP profile configuration mode. Step 3 power-profile power-profile-name Configures the AP power profile. Example: This power profile is used during non-calendar Device(config-ap-profile)# power-profile hours to meet the power budget provided by the power-profile-name switch connected to the AP. Step 4 calendar-profile calendar-profile-name Example: Device(config-ap-profile)# calendar-profile ap-calendar-profile Maps a calendar profile to the AP profile. Enters the AP profile calendar configuration mode. Step 5 [no] action power-saving-mode power-profile Maps a specific power profile to a specific power-profile-name calendar profile. Maps the power-saving mode Example: Device(config-ap-profile-calendar)# action power-saving-mode action for the calendar profile. Use the no form of this command to disable the command. Note You can have more than one power-profile power-profile1 mapping of calendar profile to power profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 439 Configuring Client Wakeup Threshold (CLI) Lightweight Access Points Configuring Client Wakeup Threshold (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile power power-profile-name Configures the power policy profile. Example: Device(config)# wireless profile power power-profile1 Step 3 power-save-client-threshold client-threshold Example: Device(config-wireless-power-profile)# power-save-client-threshold 5 Configures the client threshold up to which the AP can stay in the power save mode. The valid range is between 1 and 32 clients. The default value is 1. Configuration Example of Power Profile The following example shows how to define a power save policy: wireless profile power power-save 10 radio 5ghz state shutdown 20 radio secondary-5ghz state shutdown 30 radio 6ghz state shutdown 40 usb 0 state disable The following example shows how to define a calendar profile: wireless profile calender-profile name eve-to-midnight recurrence daily start 19:00:00 end 23:59:59 wireless profile calender-profile name midnight-to-morning recurrance daily start 00:00:00 end 07:00:00 wireless profile calender-profile name weekends recurrance weekly day Saturday day sunday start 00:00:00 end 23:59:59 The following example shows how to define an AP join profile and map a calendar profile to a power profile: ap profile wireless-prof-site1 calendar-profile eve-to-midnight action power-saving-mode power-profile power-save calendar-profile midnight-to-morning action power-saving-mode power-profile power-save calendar-profile weekends action power-saving-mode power-profile power-save Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 440 Lightweight Access Points Verifying Access Point Power Policy (GUI) Verifying Access Point Power Policy (GUI) To verify the applied configuration on the GUI, follow these steps: Procedure Step 1 Step 2 Step 3 Step 4 Choose Monitoring > AP Statistics. Click a Cisco Catalyst 9136 series AP from the list of APs. The General window is displayed. Click the Power tab. The Power Operational Status and the AP Fixed Power Policy details are displayed. Click OK. To verify the AP fixed power policy details from the list of configured APs, follow these steps: Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Access Points. Click a Cisco Catalyst 9136 series AP from the list of APs. The Edit AP window is displayed. Click the Interfaces tab. The AP Fixed Power Policy details are displayed. Click Update & Apply. Verifying the Access Point Power Profile To view the calendar profile and its mapping, run the following command: Device# show ap profile name default-ap-profile detailed AP Profile Name : default-ap-profile Description : default ap profile Power profile name : power_prof_day AP packet capture profile : Not Configured AP trace profile : Not Configured Mesh profile name : default-mesh-profile Power profile name : Not Configured Calendar Profile Profile Name : cal47 Power saving mode profile name : pow_da ---------------------------------------------------- Profile Name : cal48 Power saving mode profile name : pow23 ---------------------------------------------------- To view the operational details of the AP, run the following command: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 441 Verifying Radio Spatial Streams Lightweight Access Points Device# show ap name cisco-ap power-profile summary AP power derate Capability : Capable Power saving mode Power saving mode profile Associated calendar profile : pow2 : cal1 AP power profile status : Insufficient De-rating Interface Interface-ID Parameter Parameter value Status --------------------------------------------------------------------------------------- Radio 5 GHz State DISABLED Success Radio 6 GHz State DISABLED Not Applicable Ethernet LAN1 State DISABLED Not Applicable Radio 2.4 GHz State DISABLED Success Ethernet Gig0 Speed 5000 MBPS Fixed Policy AP power derate capability is displayed in the output as Capable only for those APs that support power policy. For the other APs, it is displayed as Not Capable. In the show ap name cisco-ap power-profile summary output, in the power saving mode, the status of the interface configured in the power profile (for example, pow2) is applied on the AP, and the AP sends the details (that are displayed in the show command) such as, the name of the power saving profile and the associated calendar profile. The table that is displayed shows the interfaces and the parameter status of the power saving profile. The AP sends the information as to which of the interfaces are disabled. For example, if the AP does not have a 6-GHz radio interface, the Status is displayed as Not Applicable. If the interfaces are applied without any errors, then Success is displayed. Note When the AP uses the fixed power policy, due to inactive calendar or client connectivity, the interfaces are not displayed in the the power profile summary if their status is UP on the AP. Verifying Radio Spatial Streams To view the configuration and operational details of radio spatial stream rules in the power profile, run the following commands: Device# show wireless profile power detailed wireless_pow_profile_name Power profile name : wireless_pow_profile_name ------------------------------------------------- Description : . . Seq No Interface Interface-id Parameter Parameter value ------------------------------------------------------------------------------- 100 Radio 6 GHz Spatial Stream 2 x 2 200 Radio 5 GHz Spatial Stream 8 x 8 400 USB USB0 State DISABLED 500 Ethernet Gig0 Speed 100 MBPS 600 Radio 6 GHz State DISABLED 700 Radio 2.4 GHz State DISABLED 900 Radio 5 GHz State DISABLED Device# show ap name cisco-ap-name power-profile summary AP power derate Capability : Capable Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 442 Lightweight Access Points Verifying Client Threshold AP fixed power policy --------------------- Interface Interface-ID Parameter Parameter value Status --------------------------------------------------------------------------------------- Ethernet Gig0 Speed 5000 MBPS Fixed Policy Radio 2.4 GHz Spatial Stream 4 x 4 Fixed Policy Radio 5 GHz Spatial Stream 8 x 8 Fixed Policy Radio Sec 5 GHz Spatial Stream 4 x 4 Fixed Policy USB USB0 State DISABLED Fixed Policy Verifying Client Threshold To view the client threshold details, run the following command: Device# show wireless profile power detailed profile1 Power profile name : profile1 ------------------------------------------------- Description : Power profile 1 Power save client threshold : 5 Seq No Interface Interface-id Parameter Parameter value ------------------------------------------------------------------------------- 0 Radio 6 GHz State DISABLED 1 Radio 5 GHz Spatial Stream 1x1 2 Radio 2.4 GHz Spatial Stream 2x2 3 USB USB0 State DISABLED Information About Access Point Real-Time Statistics From Cisco IOS XE Bengaluru 17.5.1 onwards, you can track the CPU utilization and memory usage of an AP, and monitor the health of an AP, by generating real-time statistics for an AP. SNMP traps are defined for CPU and memory utilization of APs and the controller. An SNMP trap is sent out when the threshold is crossed. The sampling period and statistics interval can be configured using SNMP, YANG, and CLI. Statistics interval is used to process the data coming from an AP, and the average CPU utilization and memory utilization is computed over time. You can also configure an upper threshold for these statistics. When a statistic value surpasses the upper threshold, an alarm is enabled, and an SNMP trap is triggered. From Cisco IOS XE Cupertino 17.7.1 release onwards, for radio monitoring, you can reset the radios based on the statistics sent by the AP for a sampling period. When you configure the radios in the controller, if there is no increment in the Tx or Rx statistics when the radio is up, then the radio reset is triggered. Feature History for Real Time Access Point Statistics This table provides release and related information for the feature explained in this module. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 443 Restrictions for AP Radio Monitoring Statistics Lightweight Access Points Table 36: Feature History for Real Time Access Point Statistics Release Feature Cisco IOS XE Cupertino Real Time Access Point 17.7.1 Statistics Feature Information This feature is enhanced with the implementation of AP threshold values between 0 and 50 to trigger an alarm. Restrictions for AP Radio Monitoring Statistics You cannot reset the radio firmware from the controller. The controller will shut and unshut the radio if the Rx or Tx count is not incremented for a radio slot in a specified period. Configuring Access Point Real Time Statistics (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > AP Join. Click Add. The Add AP Join Profile page is displayed. Under the AP tab, click the AP Statistics tab. In the System Monitoring section: a) Enable Monitor Real Time Statistics to get calculated statistics and alarms of the AP. b) To receive an alarm when the upper threshold is surpassed for parameters such as CPU utilization and memory, enable Trigger Alarm for AP. c) Enter the threshold percentage for CPU and memory usage in the CPU Threshold to Trigger Alarm field and Memory Threshold to Trigger Alarm fields, respectively. The valid range is between 0 to 50. An SNMP trap is sent out when this threshold is crossed. d) In the Interval to Hold Alarm field, enter the time for which the alarm is held before it gets triggered. The valid range is between 0 and 3600 seconds. e) In the Trap Retransmission Time field, enter the time between retransmissions of the alarm. The valid range is between 0 and 65535 seconds. f) To define how often data should be collected from the AP, enter a value in the Sampling Interval field. The valid range is between 720 and 3600 seconds. g) To define the interval at which AP statistics are to be calculated, enter a value in the Statistics Interval field. The valid range is between 2 and 900 seconds. h) To automatically reload the AP when there is high CPU and memory usage in the defined sampling interval, select the Reload the AP check box. Under the Radio Monitoring section: a) Select the Monitoring of AP Radio stuck check box to verify that the Tx and Rx statistics of the AP are updated each time the payloads are coming in from the AP to the controller. b) To generate an alarm for the radio of the AP when there is no increment in the Tx and RX statistics for the payloads, select the Alarms for AP Radio stuck check box. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 444 Lightweight Access Points Configuring Real-Time Access Point Statistics (CLI) Step 6 c) Select the Reset the stuck AP Radio check box to recover the radio from the bad state. A radio admin state payload will be sent from the controller to toggle the radio and the radio will be shut when there is no increment in the Tx and Rx statistics. d) To define how often data should be collected from the radio, enter a value in the Sampling Interval field. The valid range is between 720 and 3600 seconds. Click Apply to Device to save the configuration. Configuring Real-Time Access Point Statistics (CLI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. ap profile ap-profile-name Example: Device(config)# ap profile doc-test Configures the AP profile. The default AP join profile name is default-ap-profile. stats-timer frequency (Optional) Configures the statistics timer. This Example: command is used to change the frequency of the statistics reports coming from the AP. The Device(config-ap-profile)# stats-timer valid values range between 0 and 65535 60 seconds. statistics ap-system-monitoring enable Example: (Optional) Enables monitoring of AP real-time statistics (CPU and memory). Device(config-ap-profile)# statistics ap-system-monitoring enable statistics ap-system-monitoring alarm-enable Enables alarms for AP real-time statistics (CPU and memory). Example: Device(config-ap-profile)# statistics ap-system-monitoring alarm-enable statistics ap-system-monitoring alarm-hold-time duration Example: Defines the alarms for AP real-time statistics (CPU and Memory). The valid values range between 0 and 3600 seconds. Device(config-ap-profile)# statistics ap-system-monitoring alarm-hold-time 400 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 445 Configuring Real-Time Access Point Statistics (CLI) Lightweight Access Points Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Command or Action ap-system-monitoring alarm-retransmit-time duration Example: Device(config-ap-profile)# ap-system-monitoring alarm-retransmit-time 100 Purpose Defines the interval between retransmissions of the trap alarm. The valid values range between 0 and 65535 seconds. statistics ap-system-monitoring cpu-threshold percentage Defines the threshold for CPU usage on the AP (percentage) to trigger alarms. Example: Note Device(config-ap-profile)# statistics ap-system-monitoring cpu-threshold 30 From Cisco IOS XE Cupertino 17.7.1 release onwards, the valid threshold value for CPU on the AP to trigger the alarms is between 0 and 50. ap-system-monitoring mem-threshold percentage Example: Device(config-ap-profile)# ap-system-monitoring mem-threshold 40 Defines the threshold for memory usage on AP to trigger alarms. The percentage of threshold for memory usage on the AP to trigger is between 0 and 100. Note From Cisco IOS XE Cupertino 17.7.1 release onwards, the valid threshold value for memory usage on the AP to trigger the alarms is between 0 and 50. ap-system-monitoring sampling-interval (Optional) Defines the sampling interval. The duration valid values range between 2 and 900 seconds. Example: Device(config-ap-profile)# statistics ap-system-monitoring sampling-interval 600 exit Example: Device(config-ap-profile)# exit Exits from AP profile configuration mode and returns to global configuration mode. trapflags ap ap-stats Example: Device(config)# trapflags ap ap-stats Enables sending AP-related traps. Traps are sent when statistics exceed the configured threshold. Example Device(config)# ap profile default-policy-profile Device(config-ap-profile)# statistics ap-system-monitoring enable Device(config-ap-profile)#statistics ap-system-monitoring sampling-interval 90 Device(config-ap-profile)#statistics ap-system-monitoring stats-interval 120 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 446 Lightweight Access Points Configuring AP Radio Monitoring Statistics Device(config-ap-profile)#statistics ap-system-monitoring alarm-enable Device(config-ap-profile)#statistics ap-system-monitoring alarm-hold-time 3 Device(config-ap-profile)#statistics ap-system-monitoring alarm-retransmit-time 10 Device(config-ap-profile)#statistics ap-system-monitoring cpu-threshold 90 Device(config-ap-profile)#statistics ap-system-monitoring mem-threshold 90 Device(config)# trapflags ap ap-stats Configuring AP Radio Monitoring Statistics Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap profile profile-name Example: Device(config)# ap profile test1 Configures an AP profile and enters the AP profile configuration mode. Step 3 statistic ap-radio-monitoring enable Example: (config-ap-profile)#statistic ap-radio-monitoring enable Enables the monitoring of AP radio stuck statistics. Step 4 statistic ap-radio-monitoring alarm-enable (Optional) Enables the alarm for AP radio stuck Example: statistics. (config-ap-profile)#statistic ap-radio-monitoring alarm-enable Step 5 statistic ap-system-monitoring action reload-ap interval duration Example: (config-ap-profile)# statistic ap-radio-monitoring action reload-ap interval850 (Optional) Specifies the sampling interval in seconds. The valid values range between 720 and 3600 seconds. Step 6 statistic ap-radio-monitoring action radio-reset (Optional) Generates an alarm and resets the radio if the radio is stuck. Example: (config-ap-profile)# statistic ap-radio-monitoring action radio-reset Step 7 statistic ap-system-monitoring action reload-ap Example: Reloads the AP. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 447 Monitoring Access Point Real-Time Statistics (GUI) Lightweight Access Points Command or Action (config-ap-profile)# statistic ap-system-monitoring action reload-ap Purpose Example Device(config)# ap profile test1 Device(config-ap-profile)# statistics ap-radio-monitoring enable Device(config-ap-profile)#statistic ap-radio-monitoring alarm-enable Device(config-ap-profile)#statistic ap-radio-monitoring sampling-interval 750 Device(config-ap-profile)# statistic ap-radio-monitoring action radio-reset Device(config-ap-profile)#statistic ap-system-monitoring action reload-ap Monitoring Access Point Real-Time Statistics (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Monitoring > Wireless > AP Statistics. Click the General tab. Click an AP name. The General window is displayed. To view the AP Statistics data, click the AP Statistics tab. The following information is displayed: · Memory alarm last send time: Displays the time of the last memory trap sent. · Memory Alarm Status: Displays the state of the memory alarm. An alarm can be ACTIVE, INACTIVE, INACTIVE_SOAKING, ACTIVE_SOAKING. An alarm is soaked until the configured hold time has passed. · Memory alarm raise time: Displays the last time the memory alarm was active. · Memory alarm clear time: Displays the last time the memory alarm was inactive. · Last statistics received: Displays the time of the last statistics report received from the AP. · Current CPU Usage: Displays the latest percentage of CPU usage reported. · Average CPU Usage: Displays the average CPU usage calculated. · Current Memory Usage: Displays the latest percentage of memory usage reported. · Average Memory Usage: Displays the average memory usage calculated. · Current window size: Displays the window size. The window size is calculated by dividing the statistics interval by the sampling interval. The average CPU and memory usage is calculated by the window size. · CPU alarm last send time: Displays the time of the last CPU trap sent. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 448 Lightweight Access Points Verifying Access Point Real-Time Statistics Step 5 · CPU Alarm Status: Displays the state of the CPU alarm. An alarm can be ACTIVE, INACTIVE, INACTIVE_SOAKING, ACTIVE_SOAKING. An alarm is soaked until the configured hold time has passed. · CPU alarm raise time: Displays the last time the CPU alarm was active. · CPU alarm clear time: Displays the last time the CPU alarm was inactive. Click OK. Verifying Access Point Real-Time Statistics To verify AP real-time statistics, run the show ap config general | section AP statistics command: Device# show ap config general | section AP statistics !Last Statistics AP statistics : Enabled Current CPU usage : 4 Average CPU usage : 49 Current memory usage : 35 Average memory usage : 35 Last statistics received : 03/09/2021 15:25:08 !Statistics Configuration Current window size : 1 Sampling interval : 30 Statistics interval : 300 AP statistics alarms : Enabled !Alarm State - Active, Inactive, Inactive_Soaking, Inactive_Soaking Memory alarm status : Active Memory alarm raise time : 03/09/2021 15:24:29 Memory alarm clear time : NA Memory alarm last send time : 03/09/2021 15:24:59 CPU alarm status : Inactive CPU alarm raise time : 03/09/2021 15:24:25 CPU alarm clear time : 03/09/2021 15:25:05 CPU alarm last send time : 03/09/2021 15:25:05 !Alarm Configuration Alarm hold time : 6 Alarm retransmission time : 30 Alarm threshold cpu : 30 Alarm threshold memory : 32 To verify the statistics reporting period, run the show ap config general | i Stats Reporting Period command: Device# show ap config general | i Stats Reporting Period Stats Reporting Period : 10 Feature History for Access Point Auto Location Support This table provides release and related information about the feature explained in this section. This feature is also available in all the releases subsequent to the one in which they are introduced in, unless noted otherwise. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 449 Information About Access Point Auto Location Support Lightweight Access Points Table 37: Feature History for Access Point Auto Location Support Release Cisco IOS XE Dublin 17.12.1 Feature Information The Access Point Auto Location Support feature helps to effectively self-locate APs in a global coordinate by combining various ranging technologies and algorithms. Information About Access Point Auto Location Support In all enterprise wireless deployments, AP location is manually entered. In many cases, the AP location is not entered because it is a tedious process to identify the location manually and enter it in the system, or, the AP location is entered only to provide a reference for client location. A Global Positioning System (GPS) or a Global Navigation Satellite System (GNSS) solution is not feasible because of the indoor nature of the deployments. From Cisco IOS XE Dublin 17.12.1 onwards, a solution to effectively self-locate the APs in a global coordinate by combining various ranging technologies and algorithms, is introduced through the AP Location feature. Location of an object, by definition, is dependent on a reference point. Here, reference points are based as a few subsets of sparse nodes from a group of nodes serving a continuous RF domain. These are the ones that have visibility to the open sky, namely, the ones located near the windows, or the ones at the periphery of the building or floor. The AP Auto Location solution delivers accurate, automated, up-to-date AP location leveraging Fine Timing Measurement (FTM) and GNSS when available. If GNSS is not accessible, a few manual anchors need to be provided per floor. This feature requires an AP density such that neighboring APs can hear each other at maximum power. The accuracy of the feature depends on the building type and the distances between APs. The process includes: · Segmentation of a large number of APs into smaller segments with floor-level labels and the calculation of the geolocations of all the APs at the end of the process. · Geolocation of an AP is determined at the controller, Cisco Spaces, both controller and Cisco Spaces, or Cisco DNA Center. · Highly accurate GNSS positioning of the APs that have good GNSS signal reception and, geolocating the APs with no GNSS reception by running the locationing algorithm to determine the geolocation based on inter-APs ranging data (FTM) to GNSS-enabled APs. Use Case A typical use case of the solution in the controller is either self-locating APs in one building or APs in one floor of a building. Supported Access Points This feature is supported in the following APs: · Cisco Catalyst 9130 Series Access Points · Cisco Catalyst 9136 Series Access Points Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 450 Lightweight Access Points Configuring Access Point Geolocation Derivation Using Ranging (GUI) · Cisco Catalyst 9164 Series Access Points · Cisco Catalyst 9166 Series Access Points Configuring Access Point Geolocation Derivation Using Ranging (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Wireless > Wireless Global. In the AP Geolocation section, click the Geolocation Derivation Using Ranging toggle button to enable geolocation derivation. When you enable Geolocation Derivation Using Ranging, it allows the corresponding AP to be a part of the location services that use ranging to determine the geolocation of the AP. Click Apply. Configuring Access Point Geolocation Derivation Using Ranging (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 [no] ap geolocation derivation ranging Enables geolocation derivation using ranging. Example: Use the no form of this command to disable the feature. Device(config)# ap geolocation derivation ranging Configuring Access Point Ranging Parameters (GUI) Procedure Step 1 Choose Configuration > Tags & Profiles > AP Join. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 451 Configuring Access Point Ranging Parameters (CLI) Lightweight Access Points Step 2 Step 3 Step 4 Step 5 Step 6 Click Add. In the General tab, enter the name and description of the corresponding AP join profile. Click the Geolocation tab. In the Fine Time Management (FTM) section, complete the following: a) Click the FTM toggle button to allow APs to support FTM protocol. b) From the FTM Initiator Burst Size drop-down list, choose a value. The burst size determines the size of the transmitted frames. The burst size values are 4, 8, 16, 32, and 64 frames. The default value is 8 frames per burst. c) From the FTM Initiator Burst Duration drop-down list, choose a value. The burst duration determines the interval of the transmitted frames. The default value is 32 microseconds. Click Apply to Device. Configuring Access Point Ranging Parameters (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap profile ap-profile-name Example: Configures an AP profile and enters AP profile configuration mode. Device(config)# ap profile ap-profile1 Step 3 [no] geolocation ftm Example: Enables geolocation Fine Timing Measurement (FTM). Device(config-ap-profile)# geolocation ftm Step 4 [no] geolocation ftm initiator burst-size burst-size Example: Configures the geolocation FTM burst size. The burst size values are 4, 8, 16, 32, and 64 frames. The default value is 8 frames per burst. Device(config-ap-profile)# geolocation ftm initiator burst-size 8 Step 5 [no] geolocation ftm initiator burst-duration Configures the geolocation FTM burst duration. {128ms | 16ms | 1ms | 250us | 2ms | 32ms | The default value is 32 microseconds. 4ms | 500us | 64ms | 8ms} Example: Device(config-ap-profile)# geolocation ftm initiator burst-duration 32ms Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 452 Lightweight Access Points Configuring Access Point Coordinates and Floor Information (CLI) Configuring Access Point Coordinates and Floor Information (CLI) The following steps help you to configure the AP coordinates and the corresponding floor information. Note There are no corresponding GUI steps for this configuration. Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. Step 2 ap name ap-name geolocation coordinates longitude latitude Example: Device# ap name cisco-ap1 geolocation coordinates 90 45 Configures the longitude and latitude of the AP. The value range for longitude is between -180 and 180 degrees. The value range for latitude is between -90 to 90 degrees. Step 3 ap name ap-name floor floor-id Example: Device# ap name cisco-ap1 floor 2147483647 Configures the floor ID for the AP. The floor ID range is between -2147483648 and 2147483647. Configuring On-Demand Access Point Ranging (CLI) The following steps help you to configure on-demand AP ranging. Note There are no corresponding GUI steps for this configuration. Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 453 Verifying Access Point Geolocation Information Lightweight Access Points Step 2 Step 3 Command or Action ap geolocation ranging site ap-site-tag accurate Example: Device# ap geolocation ranging site ap-site-tag accurate ap geolocation ranging all accurate Example: Device# ap geolocation ranging all accurate Purpose Enables accurate ranging on APs under the configured site-tag. Note Client connections may be disrupted. Enables accurate ranging on all APs. Caution Client connections may be disrupted. Verifying Access Point Geolocation Information To view the AP geolocation ranging report, run the following command: Device# show ap geolocation ranging report AP RadioMAC NeighbourMAC Type Method Dist(cm) Channel Band Width Duration(ms) RSSIAvg Frames Time ------------------------------------------------------------------------------------------------------------------------------------------------- 10f9.20fd.b6e0 10f9.20fd.f640 BEST FTM 122 213 6 GHz 20 MHz 32 -60 1/0 02/16/2023 15:25:04 UTC 10f9.20fd.b6e0 10f9.20fd.f640 LATEST FTM 122 213 6 GHz 20 MHz 32 -60 1/0 02/16/2023 15:25:04 UTC 10f9.20fd.f640 10f9.20fd.b6e0 BEST FTM 118 1 6 GHz 20 MHz 11 -71 1/0 01/25/1970 20:31:23 UTC 10f9.20fd.f640 10f9.20fd.b6e0 LATEST FTM 124 1 6 GHz 20 MHz 12 -60 1/0 02/16/2023 14:36:44 UTC To view an AP geolocation ranging request, run the following command: Device# show ap geolocation ranging request SiteTag/All APs Mode Requests Reports Time --------------------------------------------------------------------------------------------- ALL APs Accurate 2 0 05/19/2023 17:05:48 UTC default-site-tag Normal 2 0 05/19/2023 17:24:29 UTC To view the AP geolocation summary, run the following command: Device# show ap geolocation summary AP Name Radio MAC Location Location Longitude Latitude Major-axis Minor-axis Orientation Height Height Height Height Type Source (degrees) (degrees) (meters) (meters) (degrees) Type (meters) Uncertainty Source (meters) ------------------------------------------------------------------------------------------------------------------------------------------------------------- APCC9C.3EF1.0F30 10f9.20fd.f640 Ellipse Manual 90.000000 90.000000 0 0 0.000000 NA NA NA NA To view the AP geolocation statistics, run the following command: Device# show ap geolocation statistics Num APs with GNSS :1 Num APs with manual height :0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 454 Lightweight Access Points Verifying Access Point Geolocation Information Num APs with derived geolocation : 0 Last geolocation derivation run : 07/21/2023 08:54:21 To view the AP geolocation GNSS-capable summary, run the following command: Device# show ap geolocation gnss-capable summary ----------------------------------------------------------------------------------------------- AP Name Radio MAC GPS Coverage Antenna Type Last GPS fix ----------------------------------------------------------------------------------------------- APCC9C.3EF4.CF00 10f9.20fd.b6e0 No Internal NA Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 455 Verifying Access Point Geolocation Information Lightweight Access Points Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 456 2 5 C H A P T E R AP Configuration · Feature History for Configuring the Access Point Console, on page 458 · Information About Configuring the Access Point Console, on page 458 · Configuring the AP Console (GUI), on page 459 · Configuring the AP Console (CLI), on page 459 · Verifying the AP Console Status, on page 459 · Information About AP Audit Configuration, on page 460 · Restrictions for AP Audit Configuration, on page 460 · Configure AP Audit Parameters (CLI), on page 461 · Verifying AP Audit Report Summary, on page 461 · Verifying AP Audit Report Detail, on page 461 · 2.4-GHz Radio Support, on page 462 · 5-GHz Radio Support, on page 464 · 6-GHz Radio Support, on page 466 · Information About Dual-Band Radio Support , on page 467 · Configuring Default XOR Radio Support, on page 468 · Configuring XOR Radio Support for the Specified Slot Number (GUI), on page 471 · Configuring XOR Radio Support for the Specified Slot Number, on page 471 · Receiver Only Dual-Band Radio Support, on page 473 · Configuring Client Steering (CLI), on page 474 · Verifying Cisco Access Points with Dual-Band Radios, on page 476 · Information About OFDMA Support for 11ax Access Points, on page 476 · Configuring 11AX (GUI), on page 477 · Configuring Channel Width, on page 477 · Configuring 802.11ax Radio Parameters (GUI), on page 478 · Configuring 802.11ax Radio Parameters (CLI), on page 478 · Setting up the 802.11ax Radio Parameters, on page 479 · Configuring OFDMA on a WLAN, on page 480 · Verifying Channel Width, on page 481 · Verifying Client Details, on page 482 · Verifying Radio Configuration, on page 483 · Information About Cisco Flexible Antenna Port, on page 486 · Configuring a Cisco Flexible Antenna Port (GUI), on page 486 · Configuring a Cisco Flexible Antenna Port (CLI), on page 486 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 457 Feature History for Configuring the Access Point Console Lightweight Access Points · Verifying Flexible Antenna Port Configuration, on page 487 · Feature History for Environmental Sensors in Access Points, on page 487 · Information About Environmental Sensors in Access Points, on page 488 · Use Cases, on page 488 · Configuring Environmental Sensors in an AP Profile (CLI), on page 488 · Configuring Environment Sensors in Privileged EXEC Mode (CLI), on page 489 · Verifying the AP Sensor Status, on page 490 · Information About CAPWAP LAG Support, on page 490 · Restrictions for CAPWAP LAG Support, on page 491 · Enabling CAPWAP LAG Support on Controller (GUI), on page 491 · Enabling CAPWAP LAG Support on Controller, on page 492 · Enabling CAPWAP LAG Globally on Controller, on page 492 · Disabling CAPWAP LAG Globally on Controller, on page 492 · Enabling CAPWAP LAG for an AP Profile (GUI), on page 493 · Enabling CAPWAP LAG for an AP Profile, on page 493 · Disabling CAPWAP LAG for an AP Profile, on page 494 · Disabling CAPWAP LAG Support on Controller , on page 494 · Verifying CAPWAP LAG Support Configurations, on page 495 Feature History for Configuring the Access Point Console This table provides release and related information about the feature explained in this section. This feature is also available in all the releases subsequent to the one in which they are introduced in, unless noted otherwise. Table 38: Feature History for Configuring the Access Point Console Release Cisco IOS XE Cupertino 17.9.1 Feature Feature Information Configuring the This feature allows you to configure the Access Point (AP) Access Point Console console from the controller. In Cisco IOS XE Cupertino 17.8.x and earlier releases, the AP console could be disabled from the controller, only by enabling the Federal Information Processing Standard (FIPS) mode or the Common Criteria (CC) mode. Information About Configuring the Access Point Console From Cisco IOS XE Cupertino 17.9.1 onwards, a new option (a configuration knob) is introduced to enable the Access Point console from the controller, which is independent of the FIPS mode or the high-security mode (CC mode). (Until Cisco IOS XE Cupertino 17.8.1, the console was enabled by default). This configuration knob can be activated through the controller GUI and CLI. Console enablement is isolated from the FIPS mode and is configured through the AP join profile. In the CC mode, the console and SSH are disabled. When you enable the CC mode, it overrides the AP console configurations, if any, done from the AP profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 458 Lightweight Access Points Configuring the AP Console (GUI) Configuring the AP Console (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Tags & Profiles > AP Join. In the Management tab, in the Telnet/SSH Configuration section, check the Serial Console check box. Click Apply to Device. Configuring the AP Console (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap profile ap-profile-name Example: Device(config)# ap profile ap-profile-name Step 3 [no] console Example: Device(config-ap-profile)# console Purpose Enters global configuration mode. Configures an AP profile and enters AP profile configuration mode. Enables the AP serial console port. Use the no form of this command to disable the AP serial console port. Verifying the AP Console Status To verify the AP console status from the controller, run the following command: Device# show ap config general | include ap-Name | console Cisco AP Name : CiscoAP ================================================= Cisco AP Identifier : 6XXX.bXXX.aXXX Country Code : US Regulatory Domain Allowed by Country : 802.11bg:-A 802.11a:-AB 802.11 6GHz:-B AP Country Code : US - United States AP Regulatory Domain 802.11bg : -A 802.11a : -B MAC Address : 6XXX.bXXX.0XXX IP Address Configuration : DHCP Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 459 Information About AP Audit Configuration Lightweight Access Points IP Address : 30.30.30.26 IP Netmask : 255.255.255.0 Gateway IP Address : 30.30.30.1 Fallback IP Address Being Used : Domain : Name Server : CAPWAP Path MTU : 1485 Capwap Active Window Size : 1 Telnet State : Disabled CPU Type : ARMv8 Processor rev 4 (v8l) Memory Type : DDR3 Memory Size : 1752064 KB SSH State : Enabled Serial Console State : Enabled Information About AP Audit Configuration The AP Audit Configuration feature helps to detect wireless service synchronization issues between the controller and an AP. In Cisco IOS XE Amsterdam, Release 17.3.1, two methods are implemented to support AP audit configuration. · Config Checker: This functionality helps in auditing the application of wireless policies during the AP join phase. Any discrepancies at this stage is reported on the controller. This is a built-in functionality and you cannot disable the same. When you try to configure any of the AP attributes such as name, IP address, controller information, tag, mode, radio mode, and radio admin state, the AP parses the CAPWAP payload configuration from the controller and reports errors detected back to the controller with proper code. If a discrepancy is detected, the controller flags errors using the syslog. · Config Audit: This functionality helps to perform a periodic comparison of operational states between an AP and the controller after the AP join phase and while the correspodning AP is still connected. Discrepancies, if any, are reported immediately on the controller. The consolidated report is available at the controller anytime. This functionality is disabled by default. The periodic auditing interval is a configurable parameter. Use the ap audit-report command to enable and configure audit report parameters. When triggered, AP sends configurations from the database to the controller, and the controller compares the configurations against the current configuration. If a discrepancy is detected, the controller flags the error using the syslog. Restrictions for AP Audit Configuration · Config checker alerts are available only through the syslog. · IOS AP is not supported. · The audit reports are not synchronized from the active to the standby controller. After SSO, they are not readily available until the next reporting interval of the already-connected APs. · The audit reports are not available when an AP is in standalone mode. · This feature is supported only on APs in FlexConnect mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 460 Lightweight Access Points Configure AP Audit Parameters (CLI) Configure AP Audit Parameters (CLI) The AP Audit Configuration feature helps you compare the operational states between an AP and the controller. The AP sends state view details to the controller, and the controller compares it with what it perceives as the AP state. This feature is disabled by default. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap audit-report enable Enables audit reporting. Example: Device(config)# ap audit-report enable Step 3 ap audit-report interval interval Configures AP audit reporting interval. The Example: default value for interval is 1440 minutes. The valid range is from 10 to 43200. Device(config)# ap audit-report interval 1300 Verifying AP Audit Report Summary To verify the AP audit report summary, use the ap audit-report summary command: Device# show ap audit-report summary WTP Mac Radio Wlan IPv4 Acl IPv6 Acl Last Report Time ------------------------------------------------------------------------------------------------------------------------------- 1880.90fd.6b40 OUT_OF_SYNC OUT_OF_SYNC IN_SYNC IN_SYNC 01/01/1970 05:30:00 IST Verifying AP Audit Report Detail To verify an AP audit report's details, use the show ap name ap-name audit-report detail command: Device# show ap name Cisco-AP audit-report detail Cisco AP Name : Cisco-AP ================================================= IPV4 ACL Audit Report Status : IN_SYNC IPV6 ACL Audit Report Status : IN_SYNC Radio Audit Report Status : IN_SYNC WLAN Audit Report Status : Slot-id Wlan-id Vlan State SSID Auth-Type Other-Flag ------------------------------------------------------------------------------------- Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 461 2.4-GHz Radio Support Lightweight Access Points 0 4 IN_SYNC IN_SYNC IN_SYNC IN_SYNC IN_SYNC 1 4 IN_SYNC IN_SYNC IN_SYNC IN_SYNC IN_SYNC bh-csr1#show ap audit-report summary WTP-Mac Radio Wlan IPv4-Acl IPv6-Acl Last-Report-Time ------------------------------------------------------------------------------------------------------ 4001.7aca.5140 IN_SYNC IN_SYNC IN_SYNC IN_SYNC 06/22/2020 13:17:39 IST 4001.7aca.5a60 IN_SYNC IN_SYNC IN_SYNC IN_SYNC 06/22/2020 13:18:25 IST 7070.8b23.a1a0 IN_SYNC IN_SYNC IN_SYNC IN_SYNC 06/22/2020 13:18:29 IST a0f8.49dc.9460 IN_SYNC IN_SYNC IN_SYNC IN_SYNC 06/22/2020 13:16:43 IST a0f8.49dc.96e0 IN_SYNC IN_SYNC IN_SYNC IN_SYNC 06/22/2020 13:17:55 IST 2.4-GHz Radio Support Configuring 2.4-GHz Radio Support for the Specified Slot Number Before you begin Note The term 802.11b radio or 2.4-GHz radio will be used interchangeably. Procedure Step 1 Command or Action enable Example: Device# enable Purpose Enters privileged EXEC mode. Step 2 ap name ap-name dot11 24ghz slot 0 SI Enables Spectrum Intelligence (SI) for the Example: dedicated 2.4-GHz radio hosted on slot 0 for a specific access point. For more information, Device# ap name AP-SIDD-A06 dot11 24ghz Spectrum Intelligence section in this guide. slot 0 SI Here, 0 refers to the Slot ID. Step 3 ap name ap-name dot11 24ghz slot 0 antenna Configures 802.11b antenna hosted on slot 0 {ext-ant-gain antenna_gain_value | selection for a specific access point. [internal | external]} · ext-ant-gain: Configures the 802.11b Example: external antenna gain. Device# ap name AP-SIDD-A06 dot11 24ghz slot 0 antenna selection internal antenna_gain_value- Refers to the external antenna gain value in multiples of .5 dBi units. The valid range is from 0 to 4294967295. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 462 Lightweight Access Points Configuring 2.4-GHz Radio Support for the Specified Slot Number Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action Purpose · selection: Configures the 802.11b antenna selection (internal or external). ap name ap-name dot11 24ghz slot 0 beamforming Configures beamforming for the 2.4-GHz radio hosted on slot 0 for a specific access point. Example: Device# ap name AP-SIDD-A06 dot11 24ghz slot 0 beamforming ap name ap-name dot11 24ghz slot 0 channel Configures advanced 802.11 channel {channel_number | auto} assignment parameters for the 2.4-GHz radio Example: hosted on slot 0 for a specific access point. Device# ap name AP-SIDD-A06 dot11 24ghz slot 0 channel auto ap name ap-name dot11 24ghz slot 0 cleanair Enables CleanAir for 802.11b radio hosted on Example: slot 0 for a specific access point. Device# ap name AP-SIDD-A06 dot11 24ghz slot 0 cleanair ap name ap-name dot11 24ghz slot 0 dot11n Configures 802.11n antenna for 2.4-GHz radio antenna {A | B | C | D} hosted on slot 0 for a specific access point. Example: Here, Device# ap name AP-SIDD-A06 dot11 24ghz A: Is the antenna port A. slot 0 dot11n antenna A B: Is the antenna port B. C: Is the antenna port C. D: Is the antenna port D. ap name ap-name dot11 24ghz slot 0 shutdown Disables 802.11b radio hosted on slot 0 for a specific access point. Example: Device# ap name AP-SIDD-A06 dot11 24ghz slot 0 shutdown ap name ap-name dot11 24ghz slot 0 txpower Configures transmit power level for 802.11b {tx_power_level | auto} radio hosted on slot 0 for a specific access point. Example: Device# ap name AP-SIDD-A06 dot11 24ghz slot 0 txpower auto · tx_power_level: Is the transmit power level in dBm. The valid range is from 1 to 8. · auto: Enables auto-RF. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 463 5-GHz Radio Support Lightweight Access Points 5-GHz Radio Support Configuring 5-GHz Radio Support for the Specified Slot Number Before you begin Note The term 802.11a radio or 5-GHz radio will be used interchangeably in this document. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action enable Example: Device# enable Purpose Enters privileged EXEC mode. ap name ap-name dot11 5ghz slot 1 SI Enables Spectrum Intelligence (SI) for the Example: dedicated 5-GHz radio hosted on slot 1 for a specific access point. Device# ap name AP-SIDD-A06 dot11 5ghz slot 1 SI Here, 1 refers to the Slot ID. ap name ap-name dot11 5ghz slot 1 antenna Configures external antenna gain for 802.11a ext-ant-gain antenna_gain_value radios for a specific access point hosted on slot Example: 1. Device# ap name AP-SIDD-A06 dot11 5ghz antenna_gain_value--Refers to the external slot 1 antenna ext-ant-gain antenna gain value in multiples of .5 dBi units. The valid range is from 0 to 4294967295. ap name ap-name dot11 5ghz slot 1 antenna Configures the antenna mode for 802.11a mode [omni | sectorA | sectorB] radios for a specific access point hosted on slot Example: 1. Device# ap name AP-SIDD-A06 dot11 5ghz slot 1 antenna mode sectorA ap name ap-name dot11 5ghz slot 1 antenna Configures the antenna selection for 802.11a selection [internal | external] radios for a specific access point hosted on slot Example: 1. Device# ap name AP-SIDD-A06 dot11 5ghz slot 1 antenna selection internal ap name ap-name dot11 5ghz slot 1 beamforming Example: Configures beamforming for the 5-GHz radio hosted on slot 1 for a specific access point. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 464 Lightweight Access Points Configuring 5-GHz Radio Support for the Specified Slot Number Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Command or Action Purpose Device# ap name AP-SIDD-A06 dot11 5ghz slot 1 beamforming ap name ap-name dot11 5ghz slot 1 channel Configures advanced 802.11 channel {channel_number | auto | width [20 | 40 | 80 assignment parameters for the 5-GHz radio | 160]} hosted on slot 1 for a specific access point. Example: Here, Device# ap name AP-SIDD-A06 dot11 5ghz channel_number- Refers to the channel slot 1 channel auto number. The valid range is from 1 to 173. ap name ap-name dot11 5ghz slot 1 cleanair Enables CleanAir for 802.11a radio hosted on Example: slot 1 for a given or specific access point. Device# ap name AP-SIDD-A06 dot11 5ghz slot 1 cleanair ap name ap-name dot11 5ghz slot 1 dot11n Configures 802.11n for 5-GHz radio hosted antenna {A | B | C | D} on slot 1 for a specific access point. Example: Here, Device# ap name AP-SIDD-A06 dot11 5ghz A- Is the antenna port A. slot 1 dot11n antenna A B- Is the antenna port B. C- Is the antenna port C. D- Is the antenna port D. ap name ap-name dot11 5ghz slot 1 rrm channel channel Is another way of changing the channel hosted on slot 1 for a specific access point. Example: Here, Device# ap name AP-SIDD-A06 dot11 5ghz channel- Refers to the new channel created slot 1 rrm channel 2 using 802.11h channel announcement. The valid range is from 1 to 173, provided 173 is a valid channel in the country where the access point is deployed. ap name ap-name dot11 5ghz slot 1 shutdown Disables 802.11a radio hosted on slot 1 for a specific access point. Example: Device# ap name AP-SIDD-A06 dot11 5ghz slot 1 shutdown ap name ap-name dot11 5ghz slot 1 txpower Configures 802.11a radio hosted on slot 1 for {tx_power_level | auto} a specific access point. Example: Device# ap name AP-SIDD-A06 dot11 5ghz slot 1 txpower auto · tx_power_level- Is the transmit power level in dBm. The valid range is from 1 to 8. · auto- Enables auto-RF. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 465 6-GHz Radio Support Lightweight Access Points 6-GHz Radio Support Configuring 6-GHz Radio Support for the Specified Slot Number Before you begin Static channel must be set before changing the channel width. As there are no external antenna APs, as by regulatory requirements, antennas have to be captive (internal always) for 6-GHz. Procedure Step 1 Command or Action enable Example: Device# enable Purpose Enters privileged EXEC mode. Step 2 ap name ap-name dot11 6ghz slot 3 antenna Configures the antenna port for 802.11 6-Ghz port {A | B | C | D} radios for a specific access point. Example: Here, Device# ap name Cisco-AP dot11 6ghz slot A: Is the antenna port A. 3 antenna port A B: Is the antenna port B. C: Is the antenna port C. D: Is the antenna port D. Step 3 ap name ap-name dot11 6ghz slot 3 antenna Configures the antenna selection, either internal selection [internal | external] or external, for 802.11 6-Ghz radios for a Example: specific access point. Device# ap name Cisco-AP dot11 6ghz slot 1 antenna selection internal Step 4 ap name ap-name dot11 6ghz slot 3 channel Configures advanced 802.11 channel {channel_number | auto | width [160 | 20 | 40 assignment parameters for the 6-GHz radio | 80]} hosted on slot 3 for a specific access point. Example: Here, Device# ap name Cisco-AP dot11 6ghz slot channel_number: Refers to the channel number. 3 channel auto The valid range is from 1 to 233. Step 5 ap name ap-name dot11 6ghz slot 3 dot11ax Enables basic service set (BSS) color for 802.11 bss-color {bss-color-number | auto} 6-Ghz radio for a given or specific access point. Example: Here, Device# ap name Cisco-AP dot11 6ghz slot 3 dot11ax bss-color auto Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 466 Lightweight Access Points Information About Dual-Band Radio Support Step 6 Step 7 Step 8 Step 9 Command or Action Purpose bss-color-number: Refers to the BSS color number. The valid range is from 1 to 63. ap name ap-name dot11 6ghz slot 3 radio role Configures the 802.11 6-Ghz radio role, which {auto | manual {client-serving | monitor | is either auto or manual. sniffer}} Example: Device# ap name Cisco-AP dot11 6ghz slot 3 radio role auto ap name ap-name dot11 6ghz slot 3 rrm channel channel Configures a new channel using 802.11h channel announcement. Example: Here, Device# ap name Cisco-AP dot11 6ghz slot channel: Refers to the new channel created 3 rrm channel 1 using 802.11h channel announcement. The valid range is from 1 to 233. ap name ap-name dot11 6ghz slot 3 shutdown Disables the 802.11 6-Ghz radio on the Cisco Example: AP. Device# ap name Cisco-AP dot11 6ghz slot 3 shutdown ap name ap-name dot11 6ghz slot 3 txpower Configures 802.11 6-Ghz Tx power level. {tx_power_level | auto} · tx_power_level: Is the transmit power level Example: in dBm. The valid range is from 1 to 8. # ap name AP-SIDD-A06 dot11 5ghz slot 1 · auto: Enables auto-RF. txpower auto Information About Dual-Band Radio Support The Dual-Band (XOR) radio in Cisco 2800, 3800, 4800, and the 9120 series AP models offer the ability to serve 2.4GHz or 5GHz bands or passively monitor both the bands on the same AP. These APs can be configured to serve clients in 2.4GHz and 5GHz bands, or serially scan both 2.4GHz and 5GHz bands on the flexible radio while the main 5GHz radio serves clients. Cisco Catalyst Wireless 9166 AP (CW9166) now has XOR function for a dual 5-GHz 4x4 or 5-GHz 4x4 and 6-GHz 4x4 radios. These radios can also be configured as client serving, monitor or as a sniffer interface like the earlier XOR radios. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 467 Configuring Default XOR Radio Support Lightweight Access Points Note For countries where 6-GHz spectrum is not yet available for use of Wi-Fi, when the Cisco Catalyst Wireless 9166I AP operates as dual 5-GHz, it offers two independent macro-macro omnidirectional cells, even though it is an internal-antenna AP. The two cells are band-locked. The 5-GHz in slot 1 operates only in the UNII1 and 2 bands, that is, channels 36 64, and the XOR radio in slot 2, when operated in 5-GHz, is locked to the UNII2E and 3 bands, that is, channels 100 165. This restriction of band lock applies only when the AP is operating as dual 5-GHz. Cisco APs models up and through the Cisco 9120 APs are designed to support dual 5GHz band operations with the i model supporting a dedicated Macro/Micro architecture and the e and p models supporting Macro/Macro. The Cisco 9130AXI APs and the Cisco 9136 APs support dual 5-GHz operations as Micro/Messo cell, and the CW9166I supports as Macro/Macro. When a radio moves between bands (from 2.4-GHz to 5-GHz and vice versa), clients need to be steered to get an optimal distribution across radios. When an AP has two radios in the 5GHz band, client steering algorithms contained in the Flexible Radio Assignment (FRA) algorithm are used to steer a client between the same band co-resident radios. The XOR radio support can be steered manually or automatically: · Manual steering of a band on a radio--The band on the XOR radio can only be changed manually. · Automatic client and band steering on the radios is managed by the FRA feature that monitors and changes the band configurations as per site requirements. Note RF measurement will not run when a static channel is configured on slot 1. Due to this, the dual band radio slot 0 will move only with 5GHz radio and not to the monitor mode. When slot 1 radio is disabled, RF measurement will not run, and the dual band radio slot 0 will be only on 2.4GHz radio. Note Only one of the 5-GHz radios can operate in the UNII band (100 - 144), due to an AP limitation to keep the power budget within the regulatory limit. Configuring Default XOR Radio Support Before you begin Note The default radio points to the XOR radio hosted on slot 0. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 468 Lightweight Access Points Configuring Default XOR Radio Support Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action enable Example: Device# enable Purpose Enters privileged EXEC mode. ap name ap-name dot11 dual-band antenna Configures the 802.11 dual-band antenna on ext-ant-gain antenna_gain_value a specific Cisco access point. Example: antenna_gain_value: The valid range is from Device# ap name ap-name dot11 dual-band 0 to 40. antenna ext-ant-gain 2 ap name ap-name [no] dot11 dual-band Shuts down the default dual-band radio on a shutdown specific Cisco access point. Example: Use the no form of the command to enable the Device# ap name ap-name dot11 dual-band radio. shutdown ap name ap-name dot11 dual-band role manual client-serving Switchs to clientserving mode on the Cisco access point. Example: Device# ap name ap-name dot11 dual-band role manual client-serving ap name ap-name dot11 dual-band band Switchs to 2.4-GHz radio band. 24ghz Example: Device# ap name ap-name dot11 dual-band band 24ghz ap name ap-name dot11 dual-band txpower Configures the transmit power for the radio on {transmit_power_level | auto} a specific Cisco access point. Example: Note Device# ap name ap-name dot11 dual-band txpower 2 When an FRA-capable radio (slot 0 on 9120 AP[for instance]) is set to Auto, you cannot configure static channel and Txpower on this radio. If you want to configure static channel and Txpower on this radio, you will need to change the radio role to Manual Client-Serving mode. This note is not applicable for Cisco Catalyst Wireless 9166 AP (CW9166). Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 469 Configuring Default XOR Radio Support Lightweight Access Points Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Command or Action Purpose ap name ap-name dot11 dual-band channel Enters the channel for the dual band. channel-number channel-number--The valid range is from 1 Example: to 173. Device# ap name ap-name dot11 dual-band channel 2 ap name ap-name dot11 dual-band channel Enables the auto channel assignment for the auto dual-band. Example: Device# ap name ap-name dot11 dual-band channel auto ap name ap-name dot11 dual-band channel Chooses the channel width for the dual band. width{20 MHz | 40 MHz | 80 MHz | 160 MHz} Example: Device# ap name ap-name dot11 dual-band channel width 20 MHz ap name ap-name dot11 dual-band cleanair Enables the Cisco CleanAir feature on the Example: dual-band radio. Device# ap name ap-name dot11 dual-band cleanair ap name ap-name dot11 dual-band cleanair Selects a band for the Cisco CleanAir feature. band{24 GHz | 5 GMHz} Use the no form of this command to disable Example: the Cisco CleanAir feature. Device# ap name ap-name dot11 dual-band cleanair band 5 GHz Device# ap name ap-name [no] dot11 dual-band cleanair band 5 GHz ap name ap-name dot11 dual-band dot11n Configures the 802.11n dual-band parameters antenna {A | B | C | D} for a specific access point. Example: Device# ap name ap-name dot11 dual-band dot11n antenna A show ap name ap-name auto-rf dot11 dual-band Displays the auto-RF information for the Cisco access point. Example: Device# show ap name ap-name auto-rf dot11 dual-band show ap name ap-name wlan dot11 dual-band Example: Displays the list of BSSIDs for the Cisco access point. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 470 Lightweight Access Points Configuring XOR Radio Support for the Specified Slot Number (GUI) Command or Action Purpose Device# show ap name ap-name wlan dot11 dual-band Configuring XOR Radio Support for the Specified Slot Number (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Click Configuration > Wireless > Access Points. In the Dual-Band Radios section, select the AP for which you want to configure dual-band radios. The AP name, MAC address, CleanAir capability and slot information for the AP are displayed. If the Hyperlocation method is HALO, the antenna PID and antenna design information are also displayed. Click Configure. In the General tab, set the Admin Status as required. Set the CleanAir Admin Status field to Enable or Disable. Click Update & Apply to Device. Configuring XOR Radio Support for the Specified Slot Number Procedure Step 1 Command or Action enable Example: Device# enable Purpose Enters privileged EXEC mode. Step 2 ap name ap-name dot11 dual-band slot 0 Configures dual-band antenna for the XOR antenna ext-ant-gain radio hosted on slot 0 for a specific access point. external_antenna_gain_value external_antenna_gain_value - Is the external Example: antenna gain value in multiples of .5 dBi unit. Device# ap name AP-SIDD-A06 dot11 The valid range is from 0 to 40. dual-band slot 0 antenna ext-ant-gain 2 Step 3 ap name ap-name dot11 dual-band slot 0 band {24ghz | 5ghz} Example: Device# ap name AP-SIDD-A06 dot11 dual-band slot 0 band 24ghz Configures current band for the XOR radio hosted on slot 0 for a specific access point. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 471 Configuring XOR Radio Support for the Specified Slot Number Lightweight Access Points Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action Purpose ap name ap-name dot11 dual-band slot 0 Configures dual-band channel for the XOR channel {channel_number | auto | width [160 radio hosted on slot 0 for a specific access point. | 20 | 40 | 80]} channel_number- The valid range is from 1 to Example: 165. Device# ap name AP-SIDD-A06 dot11 dual-band slot 0 channel 3 ap name ap-name dot11 dual-band slot 0 cleanair band {24Ghz | 5Ghz} Example: Device# ap name AP-SIDD-A06 dot11 dual-band slot 0 cleanair band 24Ghz Enables CleanAir features for dual-band radios hosted on slot 0 for a specific access point. ap name ap-name dot11 dual-band slot 0 dot11n antenna {A | B | C | D} Example: Device# ap name AP-SIDD-A06 dot11 dual-band slot 0 dot11n antenna A Configures 802.11n dual-band parameters hosted on slot 0 for a specific access point. Here, A- Enables antenna port A. B- Enables antenna port B. C- Enables antenna port C. D- Enables antenna port D. ap name ap-name dot11 dual-band slot 0 role Configures dual-band role for the XOR radio {auto | manual [client-serving | monitor]} hosted on slot 0 for a specific access point. Example: The following are the dual-band roles: Device# ap name AP-SIDD-A06 dot11 dual-band slot 0 role auto · auto- Refers to the automatic radio role selection. · manual- Refers to the manual radio role selection. ap name ap-name dot11 dual-band slot 0 shutdown Disables dual-band radio hosted on slot 0 for a specific access point. Example: Device# ap name AP-SIDD-A06 dot11 dual-band slot 0 shutdown Use the no form of this command to enable the dual-band radio. Device# ap name AP-SIDD-A06 [no] dot11 dual-band slot 0 shutdown ap name ap-name dot11 dual-band slot 0 txpower {tx_power_level | auto} Example: Device# ap name AP-SIDD-A06 dot11 dual-band slot 0 txpower 2 Configures dual-band transmit power for XOR radio hosted on slot 0 for a specific access point. · tx_power_level- Is the transmit power level in dBm. The valid range is from 1 to 8. · auto- Enables auto-RF. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 472 Lightweight Access Points Receiver Only Dual-Band Radio Support Receiver Only Dual-Band Radio Support Information About Receiver Only Dual-Band Radio Support This feature configures the dual-band Rx-only radio features for an access point with dual-band radios. This dual-band Rx-only radio is dedicated for Analytics, Hyperlocation, Wireless Security Monitoring, and BLE AoA*. This radio will always continue to serve in monitor mode, therefore, you will not be able to make any channel and tx-rx configurations on the 3rd radio. Configuring Receiver Only Dual-Band Parameters for Access Points Enabling CleanAir with Receiver Only Dual-Band Radio on a Cisco Access Point (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Wireless > Access Points. In the Dual-Band Radios settings, click the AP for which you want to configure the dual-band radios. In the General tab, enable the CleanAir toggle button. Click Update & Apply to Device. Enabling CleanAir with Receiver Only Dual-Band Radio on a Cisco Access Point Procedure Step 1 Command or Action enable Example: Device# enable Purpose Enters privileged EXEC mode. Step 2 ap name ap-name dot11 rx-dual-band slot 2 Enables CleanAir with receiver only (Rx-only) cleanair band {24Ghz | 5Ghz} dual-band radio on a specific access point. Example: Here, 2 refers to the slot ID. Device# ap name AP-SIDD-A06 dot11 Use the no form of this command to disable rx-dual-band slot 2 cleanair band 24Ghz CleanAir. Device# ap name AP-SIDD-A06 [no] dot11 rx-dual-band slot 2 cleanair band 24Ghz Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 473 Disabling Receiver Only Dual-Band Radio on a Cisco Access Point (GUI) Lightweight Access Points Disabling Receiver Only Dual-Band Radio on a Cisco Access Point (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Wireless > Access Points. In the Dual-Band Radios settings, click the AP for which you want to configure the dual-band radios. In the General tab, disable the CleanAir Status toggle button. Click Update & Apply to Device. Disabling Receiver Only Dual-Band Radio on a Cisco Access Point Procedure Step 1 Command or Action enable Example: Device# enable Purpose Enters privileged EXEC mode. Step 2 ap name ap-name dot11 rx-dual-band slot 2 Disables receiver only dual-band radio on a shutdown specific Cisco access point. Example: Here, 2 refers to the slot ID. Device# ap name AP-SIDD-A06 dot11 rx-dual-band slot 2 shutdown Device# ap name AP-SIDD-A06 [no] dot11 rx-dual-band slot 2 shutdown Use the no form of this command to enable receiver only dual-band radio. Configuring Client Steering (CLI) Before you begin Enable Cisco CleanAir on the corresponding dual-band radio. Procedure Step 1 Step 2 Command or Action enable Example: Device# enable configure terminal Example: Purpose Enters privileged EXEC mode. Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 474 Lightweight Access Points Configuring Client Steering (CLI) Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action Device# configure terminal Purpose wireless macro-micro steering transition-threshold balancing-window number-of-clients(0-65535) Example: Device(config)# wireless macro-micro steering transition-threshold balancing-window 10 Configures the micro-macro client loadbalancing window for a set number of clients. wireless macro-micro steering transition-threshold client count number-of-clients(0-65535) Example: Device(config)# wireless macro-micro steering transition-threshold client count 10 Configures the macro-micro client parameters for a minimum client count for transition. wireless macro-micro steering transition-threshold macro-to-micro RSSI-in-dBm( 128--0) Example: Device(config)# wireless macro-micro steering transition-threshold macro-to-micro -100 Configures the macrotomicro transition RSSI. wireless macro-micro steering transition-threshold micro-to-macro RSSI-in-dBm(128--0) Example: Device(config)# wireless macromicro steering transition-threshold micro-to-macro -110 Configures the microtomacro transition RSSI. wireless macro-micro steering probe-suppression aggressiveness number-of-cycles(128--0) Example: Device(config)# wireless macro-micro steering probe-suppression aggressiveness -110 Configures the number of probe cycles to be suppressed. wireless macro-micro steering Configures the macro-to-micro probe in RSSI. probe-suppression hysteresis RSSI-in-dBm The range is between 6 to 3. Example: Device(config)# wireless macro-micro steering probe-suppression hysteresis -5 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 475 Verifying Cisco Access Points with Dual-Band Radios Lightweight Access Points Step 9 Step 10 Step 11 Command or Action Purpose wireless macro-micro steering probe-suppression probe-only Enables probe suppression mode. Example: Device(config)# wireless macro-micro steering probe-suppression probe-only wireless macro-micro steering probe-suppression probe-auth Enables probe and single authentication suppression mode. Example: Device(config)# wireless macro-micro steering probe-suppression probe-auth show wireless client steering Example: Displays the wireless client steering information. Device# show wireless client steering Verifying Cisco Access Points with Dual-Band Radios To verify the access points with dual-band radios, use the following command: Device# show ap dot11 dual-band summary AP Name Subband Radio Mac Status Channel Power Level Slot ID Mode ---------------------------------------------------------------------------- 4800 All 3890.a5e6.f360 Enabled (40)* *1/8 (22 dBm) 0 Sensor 4800 All 3890.a5e6.f360 Enabled N/A N/A 2 Monitor Information About OFDMA Support for 11ax Access Points The Cisco Catalyst 9100 series access points are the next generation WiFi 802.11ax access point, which is ideal for high-density high-definition applications. The IEEE 802.11ax protocol aims to improve user experience and network performance in high density deployments for both 2.4 GHz and 5 GHz. The 802.11ax APs supports transmission or reception to more than one client simultaneously using Orthogonal Frequency Division Multiplexing (OFDMA). The IEEE 802.11ax supports uplink MU-MIMO and also adds OFDMA for multiple users in the uplink and downlink. All the users in IEEE 802.11ax OFDMA have the same time allocations and it ends at the same time. In MU-MIMO and OFDMA, multiple stations (STAs) either simultaneously transmit to a single STA or simultaneously receive from a single STA independent data streams over the same radio frequencies. Supported Modes on 11ax Access Points The following AP modes are supported: · Local mode · Flex-connect mode Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 476 Lightweight Access Points Configuring 11AX (GUI) · Bridge mode · Flex+Mesh mode Configuring 11AX (GUI) You can configure 11ax for the frequencies, 5 GHz and 2.4 GHz. Procedure Step 1 Step 2 Step 3 Choose Configuration > Radio Configurations > High Throughput. Click the 5 GHz Band tab. a) Expand the 11ax section. b) Select the Enable 11ax and Multiple Bssid check boxes, if required. c) Check either the Select All check box to configure all the data rates or select the desired options from the available data rates list. Click the 2.4 GHz Band tab. a) Expand the 11ax section. b) Select the Enable 11ax and Multiple Bssid check boxes, if required. c) Check either the Select All check box to configure all the data rates or select the desired options from the available data rates list. Configuring Channel Width Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters the global configuration mode. Step 2 ap dot11{24ghz|5ghz}rrm channel dca chan-width 160 Configures channel width for 802.11 radios as 160. Example: Use the no form of the command to disable the Device(config)# ap dot11 5ghz rrm channel configuration. dca chan-width 160 Note Cisco Catalyst 9115 and C9120 series APs do not support 80+80 channel width. Cisco Catalyst 9117 series APs do not support OFDMA in 160 channel width. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 477 Configuring 802.11ax Radio Parameters (GUI) Lightweight Access Points Step 3 Step 4 Command or Action Purpose ap dot11{24ghz|5ghz}rf-profile profile-name Configures an RF profile and enters RF profile Example: configuration mode. Device(config)# ap dot11 5ghz rf-profile ax-profile channel chan-width 160 Example: Device(config-rf-profile)# channel chan-width 160 Configures the RF profile DCA channel width. Configuring 802.11ax Radio Parameters (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Choose Configuration > Radio Configurations > High Throughput > 5 GHz Band > 11ax. Check or uncheck the Enable 11 n check box. Check the check boxes for the desired MCS/(data rate) or to select all of them, check the Select All check box. Click Apply. Choose Configuration > Radio Configurations > High Throughput > 2.4 GHz Band > 11ax. Check or uncheck the Enable 11 n check box. Check the check boxes for the desired MCS/(data rate) or to select all of them, check the Select All check box. Click Apply. Choose Configuration > Wireless > Access Points. Click the Access Point. In the Edit AP dialog box, enable the LED State toggle button and choose the LED brightness level from the LED Brightness Level drop-down list. Click Update and Apply to Device. Configuring 802.11ax Radio Parameters (CLI) Follow the procedure given below to configure radio parameters: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 478 Lightweight Access Points Setting up the 802.11ax Radio Parameters Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters the global configuration mode. Step 2 ap dot11{24ghz|5ghz | 6ghz }dot11ax Example: Device(config)# ap dot11 6ghz dot11ax Configures 802.11 6GHz dot11ax parameters. Use the no form of the command to disable the configuration. Step 3 ap dot11{24ghz| 5ghz | 6ghz} dot11ax mcs Enables the 11ax 2.4-Ghz, 5-Ghz, or 6-Ghz tx index index spatial-stream band modulation and coding scheme (MCS) spatial-stream-value transmission rates. Example: Device(config)# ap dot11 5ghz dot11ax mcs tx index 11 spatial-stream 8 Step 4 ap led-brightness brightness-level Example: Device(config)# ap led-brightness 6 (Optional) Configures the led brightness level. Setting up the 802.11ax Radio Parameters Procedure Step 1 Command or Action enable Example: Device# enable Purpose Enters privileged EXEC mode. Step 2 ap name ap-name led-brightness-level brightness-level Example: Device# ap name ax-ap led-brightness-level 6 Configures the led brightness level. Step 3 ap name ap-namedot11{24ghz|5ghz}dot11n Configures the 802.11n - 5 GHz antenna antenna antenna-port selection. Example: Device# ap name ap1 dot11 5ghz dot11n antenna A Use the no form of the command to disable the configuration. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 479 Configuring OFDMA on a WLAN Lightweight Access Points Step 4 Step 5 Command or Action Purpose ap name ap-name dot11{24ghz|5ghz}channel width channel-width Configures 802.11 channel width. Example: Device# ap name ap1 dot11 5ghz channel width 160 ap name ap-name dot11{24ghz|5ghz}secondary-80 channel-num Example: Device# ap name ap1 dot11 5ghz secondary-80 12 Configures the advanced 802.11 secondary 80Mhz channel assignment parameters. Configuring OFDMA on a WLAN Note For Cisco Catalyst 9115 and 9120 series APs, the configuration given below are per radio, and not per WLAN. This feature remains enabled on the controller, if it is enabled on any of the WLANs. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters the global configuration mode. Step 2 wlan wlan1 Example: Device(config)# wlan wlan1 Enters the WLAN configuration mode. Step 3 dot11ax downlink-ofdma Example: Device(config-wlan)# dot11ax downlink-ofdma Enables the downlink connection that uses the OFDMA technology. Use the no form of the command to disable the configuration. Step 4 dot11ax uplink-ofdma Example: Enables the uplink connection that uses the OFDMA technology . Device(config-wlan)# dot11ax uplink-ofdma Step 5 dot11ax downlink-mumimo Example: Enables the downlink connection that uses the MUMIMO technology. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 480 Lightweight Access Points Verifying Channel Width Step 6 Step 7 Command or Action Device(config-wlan)# dot11ax downlink-mumimo dot11ax uplink-mumimo Example: Device(config-wlan)# dot11ax uplink-mumimo dot11ax twt-broadcast-support Example: Device (config-wlan)# dot11ax twt-broadcast-support Purpose Enables the uplink connection that uses the MUMIMO technology. Enables the TWT broadcast support operation. Verifying Channel Width To verify the channel width and other channel information, use the following show commands: Device# show ap dot11 5ghz summary AP Name Mac Address Slot Admin State Oper State Channel Width Txpwr -------------------------------------------------------------------------------------------------------- AP80e0.1d75.6954 80e0.1d7a.7620 1 Enabled Up (52)* 160 1(*) Device# show ap dot11 dual-band summary AP Name Subband Radio Mac Status Channel Power Level Slot ID Mode --------------------------------------------------------------------------------------------------------- kartl28021mi All 002a.1058.38a0 Enabled (52)* (1)* 1 REAP Device# show ap name <ap-name> channel 802.11b/g Current Channel : 11 Slot ID :0 Allowed Channel List : 1,2,3,4,5,6,7,8,9,10,11 802.11a Current Channel ....................... 52 (160 MHz) Slot ID :1 Allowed Channel List : 36,40,44,48,52,56,60,64,100,104,108,112,116,132,136,140,149,153,157,161,165 Device# show ap name <ap-name> config slot <slot-num> . . . Phy OFDM Parameters Configuration : Automatic Current Channel : 52 Extension Channel : No Extension Channel Width : 160 MHz Allowed Channel List : 36,40,44,48,52,56,60,64,100,104,108,112,116,132,136,140,149,153,157,161,165 TI Threshold :0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 481 Verifying Client Details Lightweight Access Points Device# show ap dot11 5ghz channel . . . DCA Sensitivity Level DCA 802.11n/ac Channel Width DCA Minimum Energy Limit . . . : MEDIUM : 15 dB : 160 MHz : -95 dBm Device# show ap rf-profile name <name> detail . . . Unused Channel List : 165 DCA Bandwidth : 160 MHz DCA Foreign AP Contribution : Enabled . . . Verifying Client Details To verify the client information, use the following show commands: Device# show wireless client mac-address <mac-address> detail Client MAC Address : a886.ddb2.05e9 Client IPv4 Address : 169.254.175.214 Client IPv6 Addresses : fe80::b510:a381:8099:4747 2009:300:300:57:4007:6abb:2c9a:61e2 Client Username: N/A Voice Client Type : Unknown AP MAC Address : c025.5c55.e400 AP Name: APe4c7.22b2.948e Device Type: N/A Device Version: N/A AP slot : 0 Client State : Associated Policy Profile : default-policy-profile Flex Profile : default-flex-profile Wireless LAN Id : 1 Wireless LAN Name: SSS_OPEN BSSID : c025.5c55.e406 Connected For : 23 seconds Protocol : 802.11ax - 5 GHz Channel : 8 Client IIF-ID : 0xa0000001 Association Id : 1 Authentication Algorithm : Open System Client CCX version : No CCX support Session Timeout : 86400 sec (Remaining time: 86378 sec) . . . Device# show wireless client summary Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 482 Lightweight Access Points Verifying Radio Configuration Number of Local Clients: 1 MAC Address AP Name WLAN State Protocol Method Role --------------------------------------------------------------------------------------------------- a886.ddb2.05e9 APe4c7.22b2.948e 1 Run 11ax(5) None Local Device# show wireless stats client detail Total Number of Clients : 1 Protocol Statistics ----------------------------------------------------------------------------- Protcol Client Count 802.11b :0 802.11g :0 802.11a :0 802.11n-2.4GHz :0 802.11n-5 GHz :0 802.11ac :0 802.11ax-5 GHz :0 802.11ax-2.4 GHz :0 802.11ax-6 GHz :1 Verifying Radio Configuration To verify the radio configuration information, use the following show commands: Device# show ap dot11 5ghz network 802.11a Network . . . 802.11ax DynamicFrag MultiBssid 802.11ax MCS Settings: MCS 7, Spatial Streams = 1 MCS 9, Spatial Streams = 1 MCS 11, Spatial Streams = 1 MCS 7, Spatial Streams = 2 MCS 9, Spatial Streams = 2 MCS 11, Spatial Streams = 2 MCS 7, Spatial Streams = 3 MCS 9, Spatial Streams = 3 MCS 11, Spatial Streams = 3 MCS 7, Spatial Streams = 4 MCS 9, Spatial Streams = 4 MCS 11, Spatial Streams = 4 MCS 7, Spatial Streams = 5 MCS 9, Spatial Streams = 5 MCS 11, Spatial Streams = 5 MCS 7, Spatial Streams = 6 MCS 9, Spatial Streams = 6 MCS 11, Spatial Streams = 6 MCS 7, Spatial Streams = 7 MCS 9, Spatial Streams = 7 : Enabled : Enabled : Enabled : Disabled : Disabled : Disabled : Disabled : Supported : Supported : Supported : Supported : Disabled : Disabled : Supported : Supported : Supported : Supported : Supported : Supported : Supported : Supported : Supported : Supported : Supported Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 483 Verifying Radio Configuration Lightweight Access Points MCS 11, Spatial Streams = 7 MCS 7, Spatial Streams = 8 MCS 9, Spatial Streams = 8 MCS 11, Spatial Streams = 8 Beacon Interval . . . Maximum Number of Clients per AP Radio Device# show ap dot11 24ghz network : Supported : Supported : Supported : Supported : 100 : 200 802.11b Network : Enabled . . . 802.11axSupport...................................... Enabled dynamicFrag................................ Disabled multiBssid................................. Disabled 802.11ax : Enabled DynamicFrag : Enabled MultiBssid : Enabled 802.11ax MCS Settings: MCS 7, Spatial Streams = 1 : Supported MCS 9, Spatial Streams = 1 : Supported MCS 11, Spatial Streams = 1 : Supported MCS 7, Spatial Streams = 2 : Supported MCS 9, Spatial Streams = 2 : Supported MCS 11, Spatial Streams = 2 : Supported MCS 7, Spatial Streams = 3 : Supported MCS 9, Spatial Streams = 3 : Supported MCS 11, Spatial Streams = 3 : Supported MCS 7, Spatial Streams = 4 : Disabled MCS 9, Spatial Streams = 4 : Disabled MCS 11, Spatial Streams = 4 : Disabled Beacon Interval : 100 . . . Maximum Number of Clients per AP Radio : 200 Device# show ap dot11 6ghz network 802.11 6Ghz Network 802.11ax . . . 802.11ax MCS Settings: MCS 7, Spatial Streams = 1 MCS 9, Spatial Streams = 1 MCS 11, Spatial Streams = 1 MCS 7, Spatial Streams = 2 MCS 9, Spatial Streams = 2 MCS 11, Spatial Streams = 2 MCS 7, Spatial Streams = 3 MCS 9, Spatial Streams = 3 MCS 11, Spatial Streams = 3 MCS 7, Spatial Streams = 4 MCS 9, Spatial Streams = 4 MCS 11, Spatial Streams = 4 Beacon Interval . . . Maximum Number of Clients per AP Radio : Enabled : Enabled : Supported : Supported : Supported : Supported : Supported : Supported : Supported : Supported : Supported : Supported : Supported : Supported : 95 : 200 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 484 Lightweight Access Points Verifying Radio Configuration WiFi to Cellular RSSI Threshold Client Network Preference : -85 dbm : default #show wlan id 1 WLAN Profile Name : wlanon66 ================================================ Identifier :1 Description : Network Name (SSID) : wlanon66 Status : Enabled Broadcast SSID : Enabled Advertise-Apname : Enabled Universal AP Admin : Disabled Max Associated Clients per WLAN :0 Max Associated Clients per AP per WLAN :0 Max Associated Clients per AP Radio per WLAN : 200 OKC : Enabled Number of Active Clients :0 CHD per WLAN : Enabled WMM : Allowed WiFi Direct Policy : Disabled . . . Operational State of Radio Bands 2.4ghz : UP 5ghz : UP 6ghz : DOWN (Required config: Disable WPA2 and Enable WPA3 & dot11ax) DTIM period for 802.11a radio : DTIM period for 802.11b radio : Local EAP Authentication : Disabled Mac Filter Authorization list name : Disabled Mac Filter Override Authorization list name : Disabled Accounting list name : 802.1x authentication list name : Disabled 802.1x authorization list name : Disabled Security 802.11 Authentication : Open System . . . 802.11ac MU-MIMO : Enabled 802.11ax parameters 802.11ax Operation Status : Enabled OFDMA Downlink : Enabled OFDMA Uplink : Enabled MU-MIMO Downlink : Enabled MU-MIMO Uplink : Enabled BSS Target Wake Up Time : Enabled BSS Target Wake Up Time Broadcast Support : Enabled . . . Note For 6-GHz radio, the 802.11ax parameters are taken from the multi BSSID profile tagged to the corresponding 6-GHz RF profile of the AP. So, the WLAN dot11ax parameters are overriden by multi BSSID profile parameters in the case of 6-GHz. There are no changes for 2.4 and 5-GHz band WLANs. They continue to use the WLAN parameters for 802.11ax. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 485 Information About Cisco Flexible Antenna Port Lightweight Access Points Device# show ap led-brightness-level summary AP Name LED Brightness level -------------------------------------------------------- AP00FC.BA01.CC00 Not Supported AP70DF.2FA2.72EE 8 AP7069.5A74.6678 2 APb838.6159.e184 Not Supported Information About Cisco Flexible Antenna Port The presence of multiple antennas on the transmitters and the receivers of access points (APs), results in better performance and reliability of the APs. Multiple antennas improve reception through the selection of stronger signals or a combination of individual signals, at the receiver. You can configure the antenna ports to be used in the APs as either dual-band antennas or as single-band antennas to optimize radio coverage. · Dual-band antenna mode: APs operate in both the 2.4-GHz and 5-GHz bandwidth with all the four antennas--A, B, C, and D. An example of a dual-band antenna mode AP is the Cisco Industrial Wireless 3702 AP. · Single-band antenna mode: Among the APs, antennas A and B operate in the 2.4-GHz bandwidth, and the antennas C and D operate in the 5-GHz bandwidth. An example of a single-band antenna mode AP is the Cisco Catalyst Industrial Wireless 6300 AP. Configuring a Cisco Flexible Antenna Port (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Wireless > Access Points. Click AP Name. Click the Advanced tab. From the Antenna Mode drop-down list, choose the antenna mode. Click Apply & Update. Configuring a Cisco Flexible Antenna Port (CLI) Procedure Step 1 Command or Action ap name ap-name antenna-band-mode {dual | single} Example: Purpose Configures antenna band mode as single or dual. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 486 Lightweight Access Points Verifying Flexible Antenna Port Configuration Command or Action Device# ap name ap-name antenna-brand-mode single Purpose Verifying Flexible Antenna Port Configuration The following is a sample output of the show ap name ap_name config general command that shows the bands selected on a specific AP: Device# show ap name APXXXX.31XX.83XX config general Cisco AP Name : APXXXX.31XX.83XX ================================================= Cisco AP Identifier : b4de.312e.00c0 Country Code : Multiple Countries : US,IN Regulatory Domain Allowed by Country : 802.11bg:-A 802.11a:-ABDN AP Submode Antenna Band Mode : Not Configured : Dual The following is a sample output of the show ap name ap_name config slot 0 command that shows the bands selected on a specific AP with dual-band mode enabled: Device# show ap name APXXXX.31XX.83XX config slot 0 | sec 802.11n Antennas 802.11n Antennas A : ENABLED B : ENABLED C : ENABLED D : ENABLED 802.11n Antennas MIMO Tx Rx :x : Unknown : Unknown The following is a sample output of the show ap name ap_name config slot 1 command that shows the bands selected on a specific AP with single-band mode enabled: Device# show ap name APXXXX.31XX.83XX config slot 1 | sec 802.11n Antennas 802.11n Antennas A : DISABLED B : DISABLED C : ENABLED D : ENABLED 802.11n Antennas MIMO Tx Rx :x : Unknown : Unknown Feature History for Environmental Sensors in Access Points This table provides release and related information for the feature explained in this module. This feature is also available in all the releases subsequent to the one in which they are introduced in, unless noted otherwise. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 487 Information About Environmental Sensors in Access Points Lightweight Access Points Table 39: Feature History for Environmental Sensors on Access Points Release Feature Feature Information Cisco IOS XE Cupertino Environmental Sensors in The Environmental Sensors in Access Points feature 17.8.1 Access Points helps you collect real-time environmental data, such as, air quality, temperature, and humidity, from the environmental sensors that are embedded in the Cisco Catalyst 9136 Series Access Points. Cisco IOS XE Cupertino Environmental Sensors in This feature is supported on Cisco Catalyst Wireless 17.9.1 Access Points 9166I Series Access Points. Information About Environmental Sensors in Access Points You can collect real-time environmental data, such as, air quality, temperature, and humidity, from the environmental sensors that are embedded in the Cisco Catalyst 9136 Series Access Points, and make this data available to customers and partners through the Cisco Spaces solution. You can disable, enable, and configure the scan interval of the sensors from the Cisco Catalyst 9800 Series Wireless Controller CLIs. Note This feature is supported on Cisco Catalyst 9136 Series APs. In Cisco IOS XE Cupertino 17.9.1, air quality, temperature, and humidity are supported on Cisco Catalyst Wireless 9166I Series Access Points. Currently, two sensors are added to Cisco Catalyst 9136 Series APs: · Total volatile organic compounds (TVOC) air quality sensor · Combined Temperature and Humidity sensor Use Cases The following are the use cases for the environmental sensors in APs: · In the healthcare industry, environmental sensors help reduce wastage and spoilage of pharmaceuticals by maintaining a consistent environment. · In the hospitality industry, environmental sensors help improve customer experience by monitoring the air quality of a room. · In the retail industry, these sensors prevent spoilage of products. Configuring Environmental Sensors in an AP Profile (CLI) To configure the environmental sensor in the Cisco Catalyst 9800 Series Wireless Controllers under an AP profile, follow these steps: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 488 Lightweight Access Points Configuring Environment Sensors in Privileged EXEC Mode (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap profile ap-profile-name Example: Device(config)# ap profile ap-profile-name Configures an AP profile. Step 3 sensor environment air-quality Example: Device(config-ap-profile)# sensor environment air-quality Configures AP environmental air quality sensor. Enters AP sensor configuration mode. Step 4 no shutdown Example: Device(config-ap-sensor)# no shutdown Enables the AP air quality sensor configuration. Step 5 sensor environment temperature Example: Device(config-ap-profile)# sensor environment temperature Configures AP environmental temperature sensor. Enters AP sensor configuration mode. Step 6 no shutdown Example: Device(config-ap-sensor)# no shutdown Enables the AP temperature sensor configuration. Step 7 sampling data-sampling-interval Example: Device(config-ap-sensor)# sampling 200 Configures data sampling interval, in seconds. The valid range is between 5 and 3600. The default value is 5. Use the no form of this command to set the data sampling interval to the default time of 5. Step 8 exit Example: Device(config-ap-sensor)# exit Exits the sub mode. Configuring Environment Sensors in Privileged EXEC Mode (CLI) To disable the sensor on an AP that might be sending invalid data (an AP near an air vent or near a coffee machine), you can disable the sensor by running the corresponding commands in the privileged EXEC mode of the Cisco Catalyst 9800 Series Wireless Controllers. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 489 Verifying the AP Sensor Status Lightweight Access Points Note For a sensor to be operational in the Up state, both, the AP profile configuration state and the AP administrative state should be enabled. If any of the two is disabled, the sensor operational status will stay Down. To disable and enable the admin state of the sensor, follow these steps: Procedure Step 1 Command or Action enable Example: Device> enable Step 2 ap name ap-name sensor environment{air-quality | temperature} shutdown Example: Device# ap name CiscoAP sensor environment air-quality shutdown Step 3 ap name ap-name no sensor environment{air-quality | temperature} shutdown Example: Device# ap name CiscoAP no sensor environment air-quality shutdown Purpose Enables privileged EXEC mode. Enter the password if prompted. Disables the sensor admin state of the AP. Enables the sensor admin state of the AP. Verifying the AP Sensor Status To verify the status of the AP sensors, run the following command: Device# show ap sensor status AP Name MAC-address Sensor-type Config-State Admin-State Oper-Status Sampling-Interval -------------------------------------------------------------------------------------------------------------------------------------------- Cisco.1DBC xxxx.xxxx.xxx1 Air-quality Disabled Enabled Down 5 Cisco.1DBC xxxx.xxxx.xxx2 Temperature Disabled Enabled Down 5 Cisco.1E24 xxxx.xxxx.xxx3 Air-quality Disabled Enabled Down 5 Cisco.1E24 xxxx.xxxx.xxx4 Temperature Disabled Enabled Down 5 Information About CAPWAP LAG Support Link aggregation (LAG) simplifies controller configuration because you no longer require to configure primary and secondary ports for each interface. If any of the controller ports fail, traffic is automatically migrated to Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 490 Lightweight Access Points Restrictions for CAPWAP LAG Support one of the other ports. As long as at least one controller port is functioning, the system continues to operate, access points remain connected to the network, and wireless clients continue to send and receive data. The CAPWAP LAG support feature is applicable for access points that support multiple ethernet ports for CAPWAP. The 11AC APs with dual ethernet ports require the CAPWAP AP LAG support for data channel. Cisco Aironet 1850, 2800, and 3800 Series APs' second Ethernet port is used as a link aggregation port, by default. It is possible to use this LAG port as an RLAN port when LAG is disabled. The following APs use LAG port as an RLAN port: · 1852E · 1852I · 2802E · 2802I · 3802E · 3802I · 3802P Restrictions for CAPWAP LAG Support · APs must be specifically enabled for CAPWAP AP LAG support. · CAPWAP data does not support IPv6. · Data DTLS must not be enabled when LAG is enabled. · APs behind NAT and PAT are not supported. Enabling CAPWAP LAG Support on Controller (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Wireless > Wireless Global. Check the AP LAG Mode check box. Click Apply. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 491 Enabling CAPWAP LAG Support on Controller Lightweight Access Points Enabling CAPWAP LAG Support on Controller Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap lag support Example: Device(config)# ap lag support Step 3 end Example: Device(config)# end Purpose Enters global configuration mode. Enables CAPWAP LAG support on the controller. Note After executing this command, you get to view the following warning statement: Changing the lag support will cause all the APs to disconnect. Thus, all APs with LAG capability reboots and joins the enabled CAPWAP LAG. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Enabling CAPWAP LAG Globally on Controller If the CAPWAP LAG is enabled globally on the controller, the following occurs: · AP joins the controller. · AP exchanges its CAPWAP support. · LAG mode starts, if LAG is enabled on AP. Disabling CAPWAP LAG Globally on Controller If the CAPWAP LAG is disabled globally on the controller, the following occurs: · AP joins the controller. · AP exchanges its CAPWAP support. · AP LAG config is sent to AP, if LAG is already enabled on AP. · AP reboots. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 492 Lightweight Access Points Enabling CAPWAP LAG for an AP Profile (GUI) · AP joins back with the disabled LAG. Enabling CAPWAP LAG for an AP Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Tags & Profiles > AP Join. Click Add. Under the General tab, enter the Name of the AP Profile and check the LAG Mode check box to set the CAPWAP LAG for the AP profile. Click Apply to Device. Enabling CAPWAP LAG for an AP Profile Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap profile ap-profile Configures an AP profile and enters AP profile Example: configuration mode. Device(config)# ap profile xyz-ap-profile Note When you delete a named profile, the APs associated with that profile will not revert to the default profile. Step 3 Step 4 lag Example: Device(config-ap-profile)# lag end Example: Device(config-ap-profile)# end Enables CAPWAP LAG for an AP profile. Exits configuration mode and returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 493 Disabling CAPWAP LAG for an AP Profile Lightweight Access Points Disabling CAPWAP LAG for an AP Profile Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap profile ap-profile Configures an AP profile and enters AP profile Example: configuration mode. Device(config)# ap profile xyz-ap-profile Note When you delete a named profile, the APs associated with that profile will not revert to the default profile. Step 3 Step 4 no lag Example: Device(config-ap-profile)# no lag end Example: Device(config-ap-profile)# end Disables CAPWAP LAG for an AP profile. Exits configuration mode and returns to privileged EXEC mode. Disabling CAPWAP LAG Support on Controller Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 no ap lag support Example: Device(config)# no ap lag support Step 3 end Example: Purpose Enters global configuration mode. Disables CAPWAP LAG support on the controller . Note All APs with LAG capability reboots and joins the disabled CAPWAP LAG. Exits configuration mode and returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 494 Lightweight Access Points Verifying CAPWAP LAG Support Configurations Command or Action Device(config)# end Purpose Verifying CAPWAP LAG Support Configurations To verify the global LAG status for all Cisco APs, use the following command: Device# show ap lag-mode AP Lag-Mode Support Enabled To verify the AP LAG configuration status, use the following command: Device# show ap name <ap-name> config general Cisco AP Identifier : 0008.3291.6360 Country Code : US Regulatory Domain Allowed by Country : 802.11bg:-A 802.11a:-AB AP Country Code : US - United States :: AP Lag Configuration Status : Enabled/Disabled Has AP negotiated lag based on AP capability and per AP config. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 495 Verifying CAPWAP LAG Support Configurations Lightweight Access Points Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 496 2 6 C H A P T E R Secure Data Wipe · Secure Data Wipe, on page 497 Secure Data Wipe The Secure Data Wipe feature allows you to securely erase files from the file system of Cisco APs by using the clear ap config command. This new command triggers a secure data wipe in an AP. Additionally, this feature also stores basic information about the wipeout along with the wipeout status. The data stored in the AP flash helps to verify the files erased from the AP file system, and troubleshoot issues. Use the clear ap config to view the wipeout history details. Note · Data wipe for APs in Work Group Bridge mode can be done only through the mode button, which needs to be pressed for 20 to 60 seconds to remove storage content. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 497 Secure Data Wipe Lightweight Access Points Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 498 2 7 C H A P T E R Troubleshooting Lightweight Access Points · · Overview, on page 499 · Support Articles, on page 499 · Feedback Request, on page 500 · Disclaimer and Caution, on page 500 Overview This chapter provides links to documents authored by Cisco subject matter experts (SMEs). They aim to help you resolve technical issues without requiring a support ticket. If these documents are unable to resolve your issue, we recommend visiting the applicable Cisco Community. There is a wealth of information and advice available from fellow Cisco customers who may have experienced this issue already and provided a solution. If you are not able to find a resolution on the Community, it may be best that you raise a support ticket at Cisco Support. In cases where a support ticket has to be raised, these documents provide guidance about the data that should be collected and added to the support ticket. Specify the support document you referred, and TAC can create an improvement request with the document owner. Support Articles The documents in this section were created using specific software and hardware listed in the Components Used section of each article. However, this does not mean that they are limited to what is listed in Components Used, and generally remain relevant for later versions of software and hardware. Note that there could be some changes in the software or hardware that can cause commands to stop working, the syntax to change, or GUIs and CLIs to look different from one release to another. The following are the support articles associated with this technology: Document Description Troubleshoot Access Point Disassociation from Controller This document provides use cases to understand the reason for the Control and Provisioning of Wireless Access Points (CAPWAP)/Lightweight Access Point Protocol (LWAPP) tunnel break between Access Points (APs) and the Wireless Controller. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 499 Feedback Request Lightweight Access Points Feedback Request Your input helps. A key aspect to improving these support documents is customer feedback. Note that these documents are owned and maintained by multiple teams within Cisco. If you find an issue specific to the document (unclear, confusing, information missing, etc): · Provide feedback using the Feedback button located at the right panel of the corresponding article. The document owner will be notified, and will either update the article, or flag it for removal. · Include information regarding the section, area, or issue you had with the document and what could be improved. Provide as much detail as possible. Disclaimer and Caution The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you understand the potential impact of any command. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 500 I V P A R T Radio Resource Management · Radio Resource Management, on page 503 · Coverage Hole Detection, on page 547 · Optimized Roaming, on page 553 · Cisco Flexible Radio Assignment, on page 557 · XOR Radio Support, on page 567 · Cisco Receiver Start of Packet, on page 573 · Client Limit, on page 577 · IP Theft, on page 583 · Unscheduled Automatic Power Save Delivery, on page 589 · Target Wake Time, on page 591 · Enabling USB Port on Access Points, on page 597 · Dynamic Frequency Selection, on page 601 · Cisco Access Points with Tri-Radio, on page 607 · Cisco DNA Center Assurance Wi-Fi 6 Dashboard, on page 613 · Antenna Disconnection Detection, on page 617 · Neighbor Discovery Protocol Mode on Access Points, on page 623 · 6-GHz Band Operations, on page 629 2 8 C H A P T E R Radio Resource Management · Information About Radio Resource Management, on page 503 · Restrictions for Radio Resource Management, on page 513 · How to Configure RRM, on page 514 · Monitoring RRM Parameters and RF Group Status, on page 535 · Examples: RF Group Configuration, on page 536 · Information About ED-RRM, on page 536 · Information About Rogue PMF Containment, on page 538 · Enabling Rogue PMF Containment, on page 539 · Verifying PMF Containment, on page 539 · Information About Rogue Channel Width, on page 540 · Configuring Rogue Channel Width (CLI), on page 540 · Configuring Rogue Classification Rules (GUI), on page 542 · Verifying Rogue Channel Width, on page 544 Information About Radio Resource Management The Radio Resource Management (RRM) software that is embedded in the device acts as a built-in Radio Frequency (RF) engineer to consistently provide real-time RF management of your wireless network. RRM enables devices to continually monitor their associated lightweight access points for the following information: · Traffic load--The total bandwidth used for transmitting and receiving traffic. It enables wireless LAN managers to track and plan network growth ahead of client demand. · Interference--The amount of traffic coming from other 802.11 sources. · Noise--The amount of non-802.11 traffic that is interfering with the currently assigned channel. · Coverage--The Received Signal Strength (RSSI) and signal-to-noise ratio (SNR) for all connected clients. · Other --The number of nearby access points. RRM performs these functions: · Radio resource monitoring · Power control transmission Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 503 Radio Resource Monitoring Radio Resource Management · Dynamic channel assignment · Coverage hole detection and correction · RF grouping Note RRM grouping does not occur when an AP operates in a static channel that is not in the DCA channel list. The Neighbor Discovery Protocol (NDP) is sent only on DCA channels; therefore, when a radio operates on a non-DCA channel, it does not receive NDP on the channel. Radio Resource Monitoring RRM automatically detects and configures new devices and lightweight access points as they are added to the network. It then automatically adjusts the associated and nearby lightweight access points to optimize coverage and capacity. Lightweight access points can scan all the valid channels for the country of operation as well as for channels available in other locations. The access points in local mode go offchannel for a period not greater than 70 ms to monitor these channels for noise and interference. Packets collected during this time are analyzed to detect rogue access points, rogue clients, ad-hoc clients, and interfering access points. Note In the presence of voice traffic or other critical traffic (in the last 100 ms), access points can defer off-channel measurements. The access points also defer off-channel measurements based on the WLAN scan priority configurations. Each access point spends only 0.2 percent of its time off channel. This activity is distributed across all the access points so that adjacent access points are not scanning at the same time, which could adversely affect wireless LAN performance. Information About RF Groups An RF group is a logical collection of controllers that coordinate to perform RRM in a globally optimized manner to perform network calculations on a per-radio basis. Separate RF groups exist for 2.4-GHz and 5-GHz networks. Clustering Cisco Catalyst 9800 Series Wireless Controller into a single RF group enables the RRM algorithms to scale beyond the capabilities of a single Cisco Catalyst 9800 Series Wireless Controller. An RF group is created based on the following parameters: · User-configured RF network name. · Neighbor discovery performed at the radio level. · Country list configured on the controller. RF grouping runs between controllers . Lightweight access points periodically send out neighbor messages over the air. Access points using the same RF group name validate messages from each other. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 504 Radio Resource Management RF Group Leader When access points on different controllers hear validated neighbor messages at a signal strength of 80 dBm or stronger, the controllers dynamically form an RF neighborhood in auto mode. In static mode, the leader is manually selected and the members are added to the RF Group. Note RF groups and mobility groups are similar, in that, they both define clusters of controllers , but they are different in terms of their use. An RF group facilitates scalable, system-wide dynamic RF management, while a mobility group facilitates scalable, system-wide mobility and controller redundancy. RF Group Leader RF Group Leader can be configured in two ways as follows: Note RF Group Leader is chosen on the basis of the controller with the greatest AP capacity (platform limit.) If multiple controllers have the same capacity, the leader is the one with the highest management IP address. · Auto Mode: In this mode, the members of an RF group elect an RF group leader to maintain a primary power and channel scheme for the group. The RF grouping algorithm dynamically chooses the RF group leader and ensures that an RF group leader is always present. Group leader assignments can and do change (for instance, if the current RF group leader becomes inoperable or RF group members experience major changes). · Static Mode: In this mode, a user selects a controller as an RF group leader manually. In this mode, the leader and the members are manually configured and fixed. If the members are unable to join the RF group, the reason is indicated. The leader tries to establish a connection with a member every minute if the member has not joined in the previous attempt. The RF group leader analyzes real-time radio data collected by the system, calculates the power and channel assignments, and sends them to each of the controllers in the RF group. The RRM algorithms ensure system-wide stability, and restrain channel and power scheme changes to the appropriate local RF neighborhoods. Note When a controller becomes both leader and member for a specific radio, you get to view the IPv4 and IPv6 address as part of the group leader. When a Controller A becomes a member and Controller B becomes a leader, the Controller A displays either IPv4 or IPv6 address of Controller B using the address it is connected. So, if both leader and member are not the same, you get to view only one IPv4 or IPv6 address as a group leader in the member. If Dynamic Channel Assignment (DCA) needs to use the worst-performing radio as the single criterion for adopting a new channel plan, it can result in pinning or cascading problems. The main cause of both pinning and cascading is that any potential channel plan changes are controlled by the RF circumstances of the worst-performing radio. The DCA algorithm does not do this; instead, it does the following: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 505 RF Group Leader Radio Resource Management · Multiple local searches: The DCA search algorithm performs multiple local searches initiated by different radios in the same DCA run rather than performing a single global search that is driven by a single radio. This change addresses both pinning and cascading, while maintaining the desired flexibility and adaptability of DCA and without jeopardizing stability. · Multiple Channel Plan Change Initiators (CPCIs): Previously, the single worst radio was the sole initiator of a channel plan change. Now each radio in an RF group is evaluated and prioritized as a potential initiator. Intelligent randomization of the resulting list ensures that every radio is eventually evaluated, which eliminates the potential for pinning. · Limiting the propagation of channel plan changes (Localization): For each CPCI radio, the DCA algorithm performs a local search for a better channel plan, but only the CPCI radio itself and its one-hop neighboring access points are actually allowed to change their current transmit channels. The impact of an access point triggering a channel plan change is felt only to within two RF hops from that access point, and the actual channel plan changes are confined to within a one-hop RF neighborhood. Because this limitation applies across all CPCI radios, cascading cannot occur. · Non-RSSI-based cumulative cost metric: A cumulative cost metric measures how well an entire region, neighborhood, or network performs with respect to a given channel plan. The individual cost metrics of all the access points in that area are considered in order to provide an overall understanding of the channel plan's quality. These metrics ensure that the improvement or deterioration of each single radio is factored into any channel plan change. The objective is to prevent channel plan changes in which a single radio improves, but at the expense of multiple other radios experiencing a considerable performance decline. The RRM algorithms run at a specified updated interval, which is 600 seconds by default. Between update intervals, the RF group leader sends keepalive messages to each of the RF group members and collects real-time RF data. Note Several monitoring intervals are also available. See the Configuring RRM section for details. RF Grouping Failure Reason Codes RF Grouping failure reason codes and their explanations are listed below: Table 40: RF Grouping Failure Reason Codes Reason Code 1 2 Description Maximum number (20) of controllers are already present in the group. If the following conditions are met: · The request is from a similar powered controller and, · Controller is the leader for the other band, OR · Requestor group is larger. 3 Group ID do not match. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 506 Radio Resource Management RF Group Name Reason Code 4 5 6 9 11 12 13 14 15 16 18 19 20 21 22 Description Request does not include source type. Group spilt message to all member while group is being reformed. Auto leader is joining a static leader, during the process deletes all the members. Grouping mode is turned off. Country code does not match. Controller is up in hierarchy compared to sender of join command (static mode). Requestor is up in hierarchy (auto mode). Controller is configured as static leader and receives join request from another static leader. Controller is already a member of static group and receives a join request from another static leader. Controller is a static leader and receives join request from non-static member. Join request is not intended to the controller. Controller name and IP do not match. RF domain do not match. Controller received a Hello packet at incorrect state. Controller has already joined Auto leader, now gets a join request from static leader. Group mode change. Domain name change from CLI. Static member is removed from CLI. Max switch size (350) is reached Additional Reference Radio Resource Management White Paper: https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/ 8-3/b_RRM_White_Paper/b_RRM_White_Paper_chapter_011.html RF Group Name A controller is configured in an RF group name, which is sent to all the access points joined to the controller and used by the access points as the shared secret for generating the hashed MIC in the neighbor messages. To create an RF group, you configure all of the controllers to be included in the group with the same RF group name. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 507 Rogue Access Point Detection in RF Groups Radio Resource Management If there is any possibility that an access point joined to a controller might hear RF transmissions from an access point on a different controller , you should configure the controller with the same RF group name. If RF transmissions between access points can be heard, then system-wide RRM is recommended to avoid 802.11 interference and contention as much as possible. Rogue Access Point Detection in RF Groups After you have created an RF group of controller , you need to configure the access points connected to the controller to detect rogue access points. The access points will then select the beacon or probe-response frames in neighboring access point messages to see if they contain an authentication information element (IE) that matches that of the RF group. If the selection is successful, the frames are authenticated. Otherwise, the authorized access point reports the neighboring access point as a rogue, records its BSSID in a rogue table, and sends the table to the controller . Secure RF Groups Secure RF groups enable to encrypt and secure RF grouping and RRM message exchanges over DTLS tunnel. During the DTLS handshake controllers authenticate each other with wireless management trust-point certificate. Note If a controller has to be part of secure RF-group, that controller must be part of the same mobility group. Transmit Power Control The device dynamically controls access point transmit power based on the real-time wireless LAN conditions. The Transmit Power Control (TPC) algorithm increases and decreases an access point's power in response to changes in the RF environment. In most instances, TPC seeks to lower an access point's power to reduce interference, but in the case of a sudden change in the RF coverage, for example, if an access point fails or becomes disabled, TPC can also increase power on the surrounding access points. This feature is different from coverage hole detection, which is primarily concerned with clients. TPC provides enough RF power to achieve the required coverage levels while avoiding channel interference between access points. We recommend that you select TPCv1; TPCv2 option is deprecated. With TPCv1, you can select the channel aware mode; we recommend that you select this option for 5 GHz, and leave it unchecked for 2.4 GHz. Overriding the TPC Algorithm with Minimum and Maximum Transmit Power Settings The TPC algorithm balances RF power in many diverse RF environments. However, it is possible that automatic power control will not be able to resolve some scenarios in which an adequate RF design was not possible to implement due to architectural restrictions or site restrictions, for example, when all the access points must be mounted in a central hallway, placing the access points close together, but requiring coverage to the edge of the building. In these scenarios, you can configure maximum and minimum transmit power limits to override TPC recommendations. The maximum and minimum TPC power settings apply to all the access points through RF profiles in a RF network. To set the Maximum Power Level Assignment and Minimum Power Level Assignment, enter the maximum and minimum transmit power used by RRM in the fields in the Tx Power Control window. The range for Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 508 Radio Resource Management Dynamic Channel Assignment these parameters is -10 to 30 dBm. The minimum value cannot be greater than the maximum value; the maximum value cannot be less than the minimum value. If you configure a maximum transmit power, RRM does not allow any access point attached to the controller, to exceed this transmit power level (whether the power is set by RRM TPC or by coverage hole detection). For example, if you configure a maximum transmit power of 11 dBm, no access point will transmit above 11 dBm, unless the access point is configured manually. Cisco APs support power level changes in 3 dB granularity. TPC Min and Max power settings allow for values in 1 dB increments. The resulting power level will be rounded to the nearest value supported in the allowed powers entry for the AP model and the current serving channel. Each AP model has its own set of power levels localized for its regulatory country and region. Moreover, the power levels for the same AP model will vary based on the band and channel it is set to. For more information on Allowed Power Level vs. Actual power(in dBm), use the show ap name <name> config slot <0|1|2|3> command to view the specific number of power levels, the range of power levels allowed, and the current power level setting on the AP. Dynamic Channel Assignment Two adjacent access points on the same channel can cause either signal contention or signal collision. In a collision, data is not received by the access point. This functionality can become a problem, for example, when someone reading an e-mail in a café affects the performance of the access point in a neighboring business. Even though these are separate networks, someone sending traffic to the café on channel 1 can disrupt communication in an enterprise using the same channel. Devices can dynamically allocate access point channel assignments to avoid conflict and increase capacity and performance. Channels are reused to avoid wasting scarce RF resources. In other words, channel 1 is allocated to a different access point far from the café, which is more effective than not using channel 1 altogether. The device's Dynamic Channel Assignment (DCA) capabilities are also useful in minimizing adjacent channel interference between access points. For example, two overlapping channels in the 802.11b/g band, such as 1 and 2, cannot simultaneously use 11 or 54 Mbps. By effectively reassigning channels, the device keeps adjacent channels that are separated. Note We recommend that you use only nonoverlapping channels (1, 6, 11, and so on). Note Channel change does not require you to shut down the radio. The device examines a variety of real-time RF characteristics to efficiently handle channel assignments as follows: · Access point received energy: The received signal strength measured between each access point and its nearby neighboring access points. Channels are optimized for the highest network capacity. · Noise: Noise can limit signal quality at the client and access point. An increase in noise reduces the effective cell size and degrades user experience. By optimizing channels to avoid noise sources, the device can optimize coverage while maintaining system capacity. If a channel is unusable due to excessive noise, that channel can be avoided. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 509 Dynamic Channel Assignment Radio Resource Management · 802.11 interference: Interference is any 802.11 traffic that is not a part of your wireless LAN, including rogue access points and neighboring wireless networks. Lightweight access points constantly scan all the channels looking for sources of interference. If the amount of 802.11 interference exceeds a predefined configurable threshold (the default is 10 percent), the access point sends an alert to the device. Using the RRM algorithms, the device may then dynamically rearrange channel assignments to increase system performance in the presence of the interference. Such an adjustment could result in adjacent lightweight access points being on the same channel, but this setup is preferable to having the access points remain on a channel that is unusable due to an interfering foreign access point. In addition, if other wireless networks are present, the device shifts the usage of channels to complement the other networks. For example, if one network is on channel 6, an adjacent wireless LAN is assigned to channel 1 or 11. This arrangement increases the capacity of the network by limiting the sharing of frequencies. If a channel has virtually no capacity remaining, the device may choose to avoid this channel. In huge deployments in which all nonoverlapping channels are occupied, the device does its best, but you must consider RF density when setting expectations. · Load and utilization: When utilization monitoring is enabled, capacity calculations can consider that some access points are deployed in ways that carry more traffic than other access points, for example, a lobby versus an engineering area. The device can then assign channels to improve the access point that has performed the worst. The load is taken into account when changing the channel structure to minimize the impact on the clients that are currently in the wireless LAN. This metric keeps track of every access point's transmitted and received packet counts to determine how busy the access points are. New clients avoid an overloaded access point and associate to a new access point. This Load and utilization parameter is disabled by default. The device combines this RF characteristic information with RRM algorithms to make system-wide decisions. Conflicting demands are resolved using soft-decision metrics that guarantee the best choice for minimizing network interference. The end result is optimal channel configuration in a three-dimensional space, where access points on the floor above and below play a major factor in an overall wireless LAN configuration. Note DCA supports only 20-MHz channels in 2.4-GHz band. Note In a Dynamic Frequency Selection (DFS) enabled AP environment, ensure that you enable the UNII2 channels option under the DCA channel to allow 100-MHz separation for the dual 5-GHz radios. The RRM startup mode is invoked in the following conditions: · In a single-device environment, the RRM startup mode is invoked after the device is upgraded and rebooted. · In a multiple-device environment, the RRM startup mode is invoked after an RF Group leader is elected. · You can trigger the RRM startup mode from the CLI. The RRM startup mode runs for 100 minutes (10 iterations at 10-minute intervals). The duration of the RRM startup mode is independent of the DCA interval, sensitivity, and network size. The startup mode consists of 10 DCA runs with high sensitivity (making channel changes easy and sensitive to the environment) to converge to a steady-state channel plan. After the startup mode is finished, DCA continues to run at the specified interval and sensitivity. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 510 Radio Resource Management Dynamic Bandwidth Selection Note DCA algorithm interval is set to 1 hour, but DCA algorithm always runs in default interval of 10 min, channel allocation occurs at 10-min intervals for the first 10 cycles, and channel changes occur as per the DCA algorithm every 10 min. After that the DCA algorithm goes back to the configured time interval. This is common for both DCA interval and anchor time because it follows the steady state. Note If Dynamic Channel Assignment (DCA)/Transmit Power Control (TPC) is turned off on the RF group member, and auto is set on RF group leader, the channel or TX power on a member gets changed as per the algorithm that is run on the RF group leader. Dynamic Bandwidth Selection While upgrading from 11n to 11ac, the Dynamic Bandwidth Selection (DBS) algorithm provides a smooth transition for various configurations. The following pointers describe the functionalities of DBS: · It applies an additional layer of bias on top of those applied to the core DCA, for channel assignment in order to maximize the network throughput by dynamically varying the channel width. · It fine tunes the channel allocations by constantly monitoring the channel and Base Station Subsystem (BSS) statistics. · It evaluates the transient parameters, such as 11n or 11ac client mix, load, and traffic flow types. · It reacts to the fast-changing statistics by varying the BSS channel width or adapting to the unique and new channel orientations through 11ac for selection between 40 MHz and 80 MHz bandwidths. Coverage Hole Detection and Correction The RRM coverage hole detection algorithm can detect areas of radio coverage in a wireless LAN that are below the level needed for robust radio performance. This feature can alert you to the need for an additional (or relocated) lightweight access point. If clients on a lightweight access point are detected at threshold levels (RSSI, failed client count, percentage of failed packets, and number of failed packets) lower than those specified in the RRM configuration, the access point sends a "coverage hole" alert to the device. The alert indicates the existence of an area where clients are continually experiencing poor signal coverage, without having a viable access point to which to roam. The device discriminates between coverage holes that can and cannot be corrected. For coverage holes that can be corrected, the device mitigates the coverage hole by increasing the transmit power level for that specific access point. The device does not mitigate coverage holes caused by clients that are unable to increase their transmit power or are statically set to a power level because increasing their downstream transmit power might increase interference in the network. Cisco AI Enhanced RRM The AI Enhanced RRM is the next evolution of Cisco's award winning Radio Resource Management (RRM). Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 511 Cisco AI Enhanced RRM Radio Resource Management The RRM runs as a service in a Cisco Catalyst 9800 Series Wireless Controller. The Cisco RRM manages the RF Group (the components making up the RF Network) based on dynamic measurements between every AP and its neighbors stored in a local database for the entire RF Group. At runtime, the RRM draws the last 10 minutes of the collected data, and gently optimizes based on the current network conditions. The AI Enhanced RRM integrates the power of Artificial Intelligence and Machine Learning to the reliable and trusted Cisco RRM product family algorithms in the Cloud. Note The AI enhanced RRM is coordinated through the Cisco's DNA Center (on-prem appliance) as a service. The current RRM sites are seamlessly transitioned to an intelligent centralized service. AI enhanced RRM along with other Cisco DNA Center services brings a host of new features with it. Cisco AI Enhanced RRM operates as a distributed RRM service. RF telemetry is collected from the Cisco Access Points by the controller, and passed through the Cisco DNA Center to the Cisco AI Analytics Cloud where the data is stored. The RRM Algorithms run against this telemetry data stored in the cloud. AI analyzes the solutions, and passes any configuration change information back to the DNA Center. The DNA Center maintains the control connection with the enrolled controller and passes any individual AP configuration changes back to the APs. The following RRM algorithms run in the cloud while the remaining work in the controller: · DCA · TPC · DBS · FRA Note The RRM algorithms run in the cloud against the telemetry data available in the cloud. If the location of controller, and APs are provisioned previously, assigning a location enrolls the AI Enhanced RRM Services and the profile to be pushed to the controller. Thus, AI Enhanced RRM becomes the RF Group Leader for the subscribed controller. For more information on the Cisco DNA Center, see Cisco DNA Center User Guide. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 512 Radio Resource Management Restrictions for Radio Resource Management Note The following table covers the controller and Cisco DNAC release versions that support Cisco AI Enhanced RRM support: Table 41: Controller and Cisco DNAC Releases Supporting Cisco AI Enhanced RRM Support Controller Release Cisco IOS XE Cupertino 17.9.x Cisco DNAC Release Cisco AI Enhanced RRM Support · Cisco DNA Center, Release 2.3.2 or Cisco DNA Center, Release 2.3.3 · Cisco DNA Center, Release 2.3.4 · 2.4GHz and 5GHz · 2.4GHz, 5GHz, and 6GHz Cisco IOS XE Cupertino 17.8.x · Cisco DNA Center, Release 2.4GHz and 5GHz 2.3.2 or Cisco DNA Center, Release 2.3.3 · Cisco DNA Center, Release 2.3.4 Cisco IOS XE Cupertino 17.7.x Cisco DNA Center, Release 2.3.2 2.4GHz and 5GHz or Cisco DNA Center, Release 2.3.3 Restrictions for Radio Resource Management · The number of APs in a RF-group is limited to 3000. · If an AP tries to join the RF-group that already holds the maximum number of APs it can support, the device rejects the application and throws an error. · Disabling all data rates for default rf-profile or custom rf-profile, impacts ISSU upgrade and client join process after the software upgrade (ISSU or non-ISSU). To prevent this, you must enable at least one data rate (for example, ap dot11 24 rate RATE_5_5M enable) on the default rf-profile or custom rf-profile. We recommend that you enable the lowest data rate if efficiency is of prime concern. · Keywords such as secure cannot be used a a RF group name. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 513 How to Configure RRM Radio Resource Management How to Configure RRM Configuring Neighbor Discovery Type (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Radio Configurations > RRM. On the Radio Resource Management page, click either the 5 GHz Band, 2.4 GHz Band or the 6 GHz Band tab. In the General tab, under each section enter the corresponding field details: a) Under the Profile Threshold For Traps section, enter the: 1. Interference Percentage: The foreign interference threshold is between 0 and 100 %. The default is 10 %. 2. Clients: The client threshold between 1 and 75 clients. The default is 12. 3. Noise: The foreign noise threshold between 127 dBm and 0dBm. The default is 70 dBm. 4. Utilization Percentage: The RF utilization threshold between 0 and 100 %. The default is 80 %. 5. Throughput: The average rate of successful messages delivery over a communication channel. Value ranges from 1000 to 1000000 bps. b) Under the Noise/Interference/Rogue/CleanAir/SI Monitoring Channels section, choose the: 1. Channel List from the drop-down list: · All Channels · Country Channels · DCA Channels 2. RRM Neighbor Discover Type from the drop-down list: · Transparent: Packets are sent as is. · Protected: Packets are protected. 3. RRM Neighbour Discovery Mode: · AUTO: If the NDP mode configured is AUTO, the controller selects On-Channel as the NDP mode. The default is set as AUTO. · OFF-CHANNEL: If the NDP mode configured is Off-Channel, the controller selects Off-Channel as the NDP mode. c) Under the Monitor section, set: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 514 Radio Resource Management Configuring Neighbor Discovery Type (CLI) · Neighbor Packet Frequency (seconds): Frequency (in seconds) in which the Neighbor Discovery Packets are sent. The default is 180 seconds. · Reporting Interval (seconds): The default is 180 seconds. Each channel dwell has to be completed within 180 seconds. · Neighbor Timeout factor: Value in seconds used to determine when to prune access points from the neighbor list that have timed out. The default is 20 seconds. Step 4 Click Apply to save your configuration. Configuring Neighbor Discovery Type (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 {24ghz | 5ghz | 6ghz} rrm ndp-type Configures the neighbor discovery type. By {protected | transparent} default, the mode is set to "transparent". Example: Device(config)#ap dot11 24ghz rrm ndp-type protected Device(config)#ap dot11 24ghz rrm ndp-type transparent · protected: Sets the neighbor discover type to protected. Packets are encrypted. · transparent: Sets the neighbor discover type to transparent. Packets are sent as is. Step 3 end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring RF Groups This section describes how to configure RF groups through either the GUI or the CLI. Note When the multiple-country feature is being used, all controllers intended to join the same RF group must be configured with the same set of countries, configured in the same order. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 515 Configuring RF Group Selection Mode (GUI) Radio Resource Management Configuring RF Group Selection Mode (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Radio Configurations > RRM. On the RRM page, click the relevant band's tab: either 6 GHz Band, 5 GHz Band, or 2.4 GHz Band. Click the RF Grouping tab. Choose the appropriate Group Mode from these options: · Automatic: Sets the 802.11 RF group selection to automatic update mode · Leader: Sets the 802.11 RF group selection to leader mode · Off: Disables the 802.11 RF group selection Note When AI Enhanced RRM is enabled on a controller and Cisco DNA Center is connected to a wireless network, Cisco DNA Center is assigned the group role as a leader. Controllers, managed by Cisco DNA Center and enabled with AI Enhanced RRM, are assigned the group role as remote members irrespective of the group mode they were previously assigned. The Group Role field will display as Remote Member and the Group leader field will display the IP address of the Cisco DNA Center. Save the configuration. Configuring RF Group Selection Mode (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap dot11 {24ghz | 5ghz | 6ghz} rrm group-mode{auto | leader | off} Example: Device(config)#ap dot11 24ghz rrm group-mode leader Step 3 end Example: Device(config)# end Purpose Enters global configuration mode. Configures RF group selection mode for 802.11 bands. · auto: Sets the 802.11 RF group selection to automatic update mode. · leader: Sets the 802.11 RF group selection to leader mode. · off: Disables the 802.11 RF group selection. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 516 Radio Resource Management Configuring an RF Group Name (CLI) Configuring an RF Group Name (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless rf-network name Example: Device (config)# wireless rf-network test1 Purpose Enters global configuration mode. Creates an RF group. The group name should be ASCII String up to 19 characters and is case sensitive. Note Repeat this procedure for each controller that you want to include in the RF group. Step 3 end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring a Secure RF Group (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless rf-network secure Example: Device(config)# wireless rf-network secure Creates a secure RF group. Step 3 end Example: Device(config)# end Returns to privileged EXEC mode. Step 4 show ap dot11 {24ghz | 5ghz | 6ghz} group Example: Device# show ap dot11 24ghz group Displays configuration and statistics of 6-GHz band grouping. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 517 Configuring Members in an 802.11 Static RF Group (GUI) Radio Resource Management Configuring Members in an 802.11 Static RF Group (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Configuration > Radio Configurations > RRM. On the RRM page, click either the 6 GHz Band, 5 GHz Band or 2.4 GHz Band tab. Click the RF Grouping tab. Choose the appropriate Group Mode from the following options: · Automatic(default): Members of an RF group elect an RF group leader to maintain a primary power and channel scheme for the group. The RF grouping algorithm dynamically chooses the RF group leader and ensures that an RF group leader is always present. Group leader assignments can and do change (for instance, if the current RF group leader becomes inoperable or if RF group members experience major changes). · Leader: A device as an RF group leader, manually. In this mode, the leader and the members are manually configured and are therefore fixed. If the members are unable to join the RF group, the reason is indicated. The members' management IP addresses and system name are used to request the member to join the leader. The leader tries to establish a connection with a member every 1 minute if the member has not joined in the previous attempt. · Off: No RF group is configured. Under Group Members section, click Add. In the Add Static Member window that is displayed, enter the controller name and the IPv4 or IPv6 address of the controller. Click Save & Apply to Device. Configuring Members in an 802.11 Static RF Group (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap dot11 {24ghz | 5ghz | 6ghz} rrm group-member group_name ip_addr Example: Step 3 Device(config)#ap dot11 24ghz rrm group-member Grpmem01 10.1.1.1 end Example: Device(config)# end Purpose Enters global configuration mode. Configures members in a 802.11 static RF group. The group mode should be set as leader for the group member to be active. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 518 Radio Resource Management Configuring Transmit Power Control Configuring Transmit Power Control Configuring Transmit Power (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Radio Configurations > RRM. On the 6 GHz Band, 5 GHz Band, or 2.4 GHz Band tab, click the TPC tab. Choose of the following dynamic transmit power assignment modes: · Automatic(default): The transmit power is periodically updated for all APs that permit this operation. · On Demand: The transmit power is updated on demand. If you choose this option, you get to view the Invoke Power Update Once. Click Invoke Power Update Once to apply the RRM data successfully. · Fixed: No dynamic transmit power assignments occur and values are set to their global default. Enter the maximum and minimum power level assignment on this radio. If you configure maximum transmit power, RRM does not allow any access point attached to the device to exceed this transmit power level (whether the power is set by RRM TPC or by coverage hole detection). For example, if you configure a maximum transmit power of 11 dBm, then no access point would transmit above 11 dBm, unless the access point is configured manually. The range is 10 dBm to 30 dBm. In the Power Threshold field, enter the cutoff signal level used by RRM when determining whether to reduce an access point's power. The default value for this parameter varies depending on the TPC version you choose. For TPCv1, the default value is 70 dBm, and for TPCv2, the default value is 67 dBm. The default value can be changed when access points are transmitting at higher (or lower) than desired power levels. The range for this parameter is 80 to 50 dBm. Increasing this value (between 65 and 50 dBm) causes the access points to operate at higher transmit power rates. Decreasing the value has the opposite effect. In applications with a dense population of access points, it may be useful to decrease the threshold to 80 or 75 dBm in order to reduce the number of BSSIDs (access points) and beacons seen by the wireless clients. Some wireless clients might have difficulty processing a large number of BSSIDs or a high beacon rate and might exhibit problematic behavior with the default threshold. Click Apply. Configuring the Tx-Power Control Threshold (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 519 Configuring the Tx-Power Level (CLI) Radio Resource Management Step 2 Step 3 Command or Action Purpose ap dot11 {24ghz | 5ghz} rrm tpc-threshold Configures the Tx-power control threshold used threshold_value by RRM for auto power assignment. The range Example: is from 80 to 50. Device(config)#ap dot11 24ghz rrm tpc-threshold -60 end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring the Tx-Power Level (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 {24ghz | 5ghz} rrm Configures the 802.11 tx-power level txpower{trans_power_level | auto | max | min | once} · trans_power_level--Sets the transmit power level. Example: · auto--Enables auto-RF. Device(config)#ap dot11 24ghz rrm txpower auto · max--Configures the maximum auto-RF tx-power. · min--Configures the minimum auto-RF tx-power. · once--Enables one-time auto-RF. Step 3 ap dot11 6ghz rrm txpower trans_power_level Configures the 802.11 6-GHz tx-power level. auto · trans_power_level: Sets the transmit power Example: level. Valid values range from 1 to 5. Device(config)#ap dot11 6ghz rrm txpower · auto: Enables auto-RF. auto Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 520 Radio Resource Management Configuring 802.11 RRM Parameters Command or Action Step 4 end Example: Device(config)# end Purpose Note The 6-GHz band uses constant-PSD instead of constant-EIRP, which allows the transmission at higher power as channel width increases. The power levels are derived based on the configured channel width. At the higher power levels between 1-3, these power values exceed the limit for legacy rate frames, like beacons. As a result, there is no change in the beacon power for higher levels, unlike the 2.4-GHz and 5-GHz bands. Returns to privileged EXEC mode. Configuring 802.11 RRM Parameters Configuring Advanced 802.11 Channel Assignment Parameters (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Radio Configurations > RRM. In the DCA tab, choose a Channel Assignment Mode to specify the DCA mode: · Automatic(default)--Causes the device to periodically evaluate and, if necessary, update the channel assignment for all joined APs. · Freeze--Causes the device to evaluate and update the channel assignment for all joined APs. If you choose this option, you get to view the Invoke Channel Update Once. Click Invoke Channel Update Once to apply the RRM data successfully. · Off--Turns off DCA and sets all AP radios to the first channel of the band, which is the default value. If you choose this option, you must manually assign channels on all radios. From the Interval drop-down list, choose the interval that tells how often the DCA algorithm is allowed to run. The default interval is 10 minutes. From the AnchorTime drop-down list, choose a number to specify the time of day when the DCA algorithm must start. The options are numbers between 0 and 23 (inclusive) representing the hour of the day from 12:00 a.m. to 11:00 p.m. Check the Avoid Foreign AP Interference check box to cause the device's RRM algorithms to consider 802.11 traffic from foreign APs (those not included in your wireless network) when assigning channels to Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 521 Configuring Advanced 802.11 Channel Assignment Parameters (GUI) Radio Resource Management Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 lightweight APs, or uncheck it to disable this feature. For example, RRM may adjust the channel assignment to have access points avoid channels close to foreign APs. By default, this feature is in enabled state. Check the Avoid Cisco AP Load check box to cause the device's RRM algorithms to consider 802.11 traffic from Cisco lightweight APs in your wireless network when assigning channels. For example, RRM can assign better reuse patterns to access points that carry a heavier traffic load. By default, this feature is in disabled state. Check the Avoid Non-802.11a Noise check box to cause the device's RRM algorithms to consider noise (non-802.11 traffic) in the channel when assigning channels to lightweight APs. For example, RRM may have APs avoid channels with significant interference from non-AP sources, such as microwave ovens. By default, this feature is in enabled state. Check the Avoid Persistent Non-WiFi Interference check box to enable the device to take into account persistent non-Wi-Fi interference in DCA calculations. A persistent interfering device is any device from the following categories, which has been seen in the past 7 days - Microwave Oven, Video Camera, Canopy, WiMax Mobile, WiMax Fixed, Exalt Bridge. With Avoid Persistent Non-WiFi Interference enabled, if a Microwave Oven is detected, that interference from the Microwave Oven is taken into account in the DCA calculations for the next 7 days. After 7 days, if the interfering device is not detected anymore, it is no longer considered in the DCA calculations. From the DCA Channel Sensitivity drop-down list, choose one of the following options to specify how sensitive the DCA algorithm is to environmental changes such as signal, load, noise, and interference when determining whether to change channels: · Low--The DCA algorithm is not particularly sensitive to environmental changes. The DCA threshold is 30 dB. · Medium (default)--The DCA algorithm is moderately sensitive to environmental changes. The DCA threshold is 15 dB. · High --The DCA algorithm is highly sensitive to environmental changes. The DCA threshold is 5 dB. Set the Channel Width as required. You can choose the RF channel width as 20 MHz, 40 MHz, 80 MHz, 160 MHz, or Best. This is applicable only for 802.11a/n/ac (5 GHZ) radio. The Auto-RF Channel List section shows the channels that are currently selected. To choose a channel, check the corresponding check box. Note If you disable the serving radio channel of the root AP from the Auto-RF Channel List, you will not be able to view the neighboring APs in the root APs. In the Event Driven RRM section, check the EDRRM check box to run RRM when CleanAir-enabled AP detects a significant level of interference. If enabled, set the sensitivity threshold level at which the RRM is invoked, enter the custom threshold, and check the Rogue Contribution check box to enter the rogue duty-cycle. Click Apply. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 522 Radio Resource Management Configuring Advanced 802.11 Channel Assignment Parameters (CLI) Configuring Advanced 802.11 Channel Assignment Parameters (CLI) Procedure Step 1 Step 2 Command or Action configure terminal Example: Device# configure terminal ap dot11 {24ghz | 5ghz} rrm channel cleanair-event sensitivity {high | low | medium} Example: Device(config)#ap dot11 24ghz rrm channel cleanair-event sensitivity high Purpose Enters global configuration mode. Configures CleanAir event-driven RRM parameters. · HighSpecifies the most sensitivity to non-Wi-Fi interference as indicated by the air quality (AQ) value. · LowSpecifies the least sensitivity to non-Wi-Fi interference as indicated by the AQ value. · MediumSpecifies medium sensitivity to non-Wi-Fi interference as indicated by the AQ value. Step 3 ap dot11 6ghz rrm channel dca {anchor-time 0-23 | global auto | interval 0-24 | sensitivity {high | low | medium}} Example: Configures 802.11 6GHz dynamic channel assignment algorithm parameters. · anchor-timeConfigures the anchor time for the DCA. The range is between 0 and 23 hours. Device(config)#ap dot11 6ghz rrm channel dca interval 2 · globalConfigures the DCA mode for all 802.11 Cisco APs. · autoEnables auto-RF. · intervalConfigures the DCA interval value. The values are 1, 2, 3, 4, 6, 8, 12 and 24 hours and the default value 0 denotes 10 minutes. · sensitivityConfigures the DCA sensitivity level to changes in the environment. · highSpecifies the most sensitivity. · lowSpecifies the least sensitivity. · mediumSpecifies medium sensitivity. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 523 Configuring Advanced 802.11 Channel Assignment Parameters (CLI) Radio Resource Management Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action Purpose ap dot11 5ghz rrm channel dca chan-width Configures the DCA channel bandwidth for {20 | 40 | 80 | best} all 802.11 radios in the 5-GHz band. Sets the Example: channel bandwidth to 20 MHz, 40 MHz, or 80 MHz, ; 20 MHz is the default value for channel bandwidth. 80 MHz is the default value for Device(config)#ap dot11 5ghz rrm channel best. Set the channel bandwidth to best before dca chan-width best configuring the constraints. ap dot11 5ghz rrm channel dca chan-width Configures the maximum channel bandwidth width-max {WIDTH_20MHz | that can be assigned to a channel. In this WIDTH_40MHz | WIDTH_80MHz | example, WIDTH_80MHz assigns the channel WIDTH_MAX} bandwidth to 20 MHz, 40 MHz, or 80 MHz Example: but not greater than that. Device(config)#ap dot11 5ghz rrm channel dca chan-width width-max WIDTH_80MHz ap dot11 6ghz rrm channel dca chan-width Configures the maximum channel bandwidth width-max {WIDTH_20MHz | that can be assigned to a channel. In this WIDTH_40MHz | WIDTH_80MHz | example, WIDTH_80MHz assigns the channel WIDTH_MAX} bandwidth to 20 MHz, 40 MHz, or 80 MHz Example: but not greater than that. Device(config)#ap dot11 6ghz rrm channel dca chan-width width-max WIDTH_80MHz ap dot11 {24ghz | 5ghz} rrm channel device Configures the persistent non-Wi-Fi device Example: avoidance in the 802.11 channel assignment. Device(config)#ap dot11 24ghz rrm channel device ap dot11 {24ghz | 5ghz} rrm channel foreign Configures the foreign AP 802.11 interference Example: avoidance in the channel assignment. Device(config)#ap dot11 24ghz rrm channel foreign ap dot11 {24ghz | 5ghz} rrm channel load Configures the Cisco AP 802.11 load Example: avoidance in the channel assignment. Device(config)#ap dot11 24ghz rrm channel load Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 524 Radio Resource Management Configuring 802.11 Coverage Hole Detection (GUI) Step 10 Step 11 Command or Action Purpose ap dot11 {24ghz | 5ghz} rrm channel noise Configures the 802.11 noise avoidance in the Example: channel assignment. Device(config)#ap dot11 24ghz rrm channel noise end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring 802.11 Coverage Hole Detection (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Choose Configuration > Radio Configurations > RRM to configure Radio Resource Management parameters for 802.11ax (6-GHz), 802.11a/n/ac (5-GHz) and 802.11b/g/n (2.4-GHz) radios. On theRadio Resource Management page, click Coverage tab. To enable coverage hole detection, check the Enable Coverage Hole Detection check box. In the Data Packet Count field, enter the number of data packets. In the Data Packet Percentage field, enter the percentage of data packets. In the Data RSSI Threshold field, enter the actual value in dBm. Value ranges from -60 dBm to -90 dBm; the default value is 80 dBm. In the Voice Packet Count field, enter the number of voice data packets. In the Voice Packet Percentage field, enter the percentage of voice data packets. In the Voice RSSI Threshold field, enter the actual value in dBm. Value ranges from -60 dBm to -90 dBm; the default value is 80 dBm. In the Minimum Failed Client per AP field, enter the minimum number of clients on an AP with a signal-to-noise ratio (SNR) below the coverage threshold. Value ranges from 1 to 75 and the default value is 3. In the Percent Coverage Exception Level per AP field, enter the maximum desired percentage of clients on an access point's radio operating below the desired coverage threshold and click Apply. Value ranges from 0 to 100% and the default value is 25%. Configuring 802.11 Coverage Hole Detection (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 525 Configuring 802.11 Coverage Hole Detection (CLI) Radio Resource Management Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action Purpose ap dot11 {24ghz | 5ghz | 6ghz} rrm coverage Configures the 802.11 coverage hole detection data{fail-percentage | packet-count | for data packets. rssi-threshold} · fail-percentage: Configures the 802.11 Example: coverage failure-rate threshold for uplink data packets as a percentage that ranges Device(config)#ap dot11 24ghz rrm from 1 to 100%. coverage data fail-percentage 60 · packet-count: Configures the 802.11 coverage minimum failure count threshold for uplink data packets that ranges from 1 to 255. · rssi-threshold: Configures the 802.11 minimum receive coverage level for data packets that range from 90 to 60 dBm. ap dot11 6ghz rrm coverage Configures the 802.11 6-GHz coverage hole data{fail-percentage fail-percentage-value | detection for data packets. packet-count packet-count-value} · fail-percentage: Configures the 802.11 Example: 6-GHz coverage failure-rate threshold for uplink data packets as a percentage that Device(config)#ap dot11 6ghz rrm coverage ranges from 1 to 100%. data fail-percentage 60 · packet-count: Configures the 802.11 6-GHz coverage minimum failure count threshold for uplink data packets that ranges from 1 to 255. ap dot11 {24ghz | 5ghz} rrm coverage exception global exception level Example: Configures the 802.11 Cisco AP coverage exception level as a percentage that ranges from 0 to 100%. Device(config)#ap dot11 24ghz rrm coverage exception global 50 ap dot11 {24ghz | 5ghz} rrm coverage level global cli_min exception level Example: Configures the 802.11 Cisco AP client minimum exception level that ranges from 1 to 75 clients. Device(config)#ap dot11 24ghz rrm coverage level global 10 ap dot11 {24ghz | 5ghz | 6ghz} rrm coverage Configures the 802.11 coverage hole detection voice{fail-percentage | packet-count | for voice packets. rssi-threshold} · fail-percentage: Configures the 802.11 Example: coverage failure-rate threshold for uplink Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 526 Radio Resource Management Configuring 802.11 Event Logging (CLI) Step 7 Step 8 Command or Action Device(config)#ap dot11 24ghz rrm coverage voice packet-count 10 Purpose voice packets as a percentage that ranges from 1 to 100%. · packet-count: Configures the 802.11 coverage minimum failure count threshold for uplink voice packets that ranges from 1 to 255. · rssi-threshold: Configures the 802.11 minimum receive coverage level for voice packets that range from 90 to 60 dBm. ap dot11 6ghz rrm coverage Configures the 802.11 6-GHz coverage hole voice{fail-percentage fail-percentage-value | detection for voice packets. packet-count packet-count-value} · fail-percentage: Configures the 802.11 Example: 6-GHz coverage failure-rate threshold for uplink voice packets as a percentage that Device(config)#ap dot11 6ghz rrm coverage ranges from 1 to 100%. voice packet-count 10 · packet-count: Configures the 802.11 6-GHz coverage minimum failure count threshold for uplink voice packets that ranges from 1 to 255. end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring 802.11 Event Logging (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 24ghz | 5ghz | 6ghz rrm logging{channel | coverage | foreign | load | noise | performance | txpower} Example: Configures event-logging for various parameters. · channel--Configures the 802.11 channel change logging mode. Device(config)#ap dot11 24ghz rrm logging channel Device(config)#ap dot11 24ghz rrm logging coverage · coverage--Configures the 802.11 coverage profile logging mode. · foreign--Configures the 802.11 foreign interference profile logging mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 527 Configuring 802.11 Statistics Monitoring (GUI) Radio Resource Management Step 3 Command or Action Purpose Device(config)#ap dot11 24ghz rrm logging · load--Configures the 802.11 load profile foreign logging mode. Device(config)#ap dot11 24ghz rrm logging load Device(config)#ap dot11 24ghz rrm logging noise Device(config)#ap dot11 24ghz rrm logging performance Device(config)#ap dot11 24ghz rrm logging txpower · noise--Configures the 802.11 noise profile logging mode. · performance--Configures the 802.11 performance profile logging mode. · txpower--Configures the 802.11 transmit power change logging mode. end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring 802.11 Statistics Monitoring (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Radio Configurations > RRM to configure Radio Resource Management parameters for 802.11ax (6-GHz), 802.11a/n/ac (5 GHz) and 802.11b/g/n (2.4 GHz) radios. In the Monitor Intervals(60 to 3600secs) section, proceed as follows: a) To configure the 802.11 noise measurement interval (channel scan interval), set the AP Noise Interval. The valid range is from 60 to 3600 seconds. b) To configure the 802.11 signal measurement interval (neighbor packet frequency), set the AP Signal Strength Interval. The valid range is from 60 to 3600 seconds. c) To configure the 802.11 coverage measurement interval, set the AP Coverage Interval. The valid range is from 60 to 3600 seconds. d) To configure the 802.11 load measurement, set the AP Load Interval. The valid range is from 60 to 3600 seconds. Click Apply. Configuring 802.11 Statistics Monitoring (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 528 Radio Resource Management Configuring 802.11 Statistics Monitoring (CLI) Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action Purpose ap dot11 {24ghz | 5ghz | 6ghz} rrm monitor Sets the 802.11 monitoring channel-list for channel-list{all | country | dca} parameters such as noise/interference/rogue. Example: Device(config)#ap dot11 24ghz rrm monitor channel-list all · all: Monitors all channels. · country: Monitor channels used in configured country code. · dca: Monitor channels used by dynamic channel assignment. ap dot11 {24ghz | 5ghz | 6ghz} rrm monitor Configures the 802.11 coverage measurement coverage interval interval in seconds that ranges from 60 to 3600. Example: Device(config)#ap dot11 24ghz rrm monitor coverage 600 ap dot11 {24ghz | 5ghz | 6ghz} rrm monitor Configures the 802.11 load measurement load interval interval in seconds that ranges from 60 to 3600. Example: Device(config)#ap dot11 24ghz rrm monitor load 180 ap dot11 {24ghz | 5ghz | 6ghz} rrm monitor Configures the 802.11 measurement interval in measurement interval seconds that ranges from 60 to 3600. Example: Device(config)#ap dot11 24ghz rrm monitor measurement 360 ap dot11 {24ghz | 5ghz | 6ghz} rrm monitor Configures the 802.11 neighbor timeout-factor neighbor-timeout-factor interval in seconds that ranges from 5 to 60. Example: Device(config)#ap dot11 24ghz rrm monitor neighbor-timeout-factor 50 ap dot11 {24ghz | 5ghz | 6ghz} rrm monitor Configures the 802.11 reporting interval in reporting interval seconds that ranges from 60 to 3600. Example: Device(config)#ap dot11 24ghz rrm monitor reporting 480 ap dot11 {24ghz | 5ghz | 6ghz} rrm monitor Configures the 802.11 RRM Neighbor rssi-normalization Discovery RSSI normalization. Example: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 529 Configuring the 802.11 Performance Profile (GUI) Radio Resource Management Command or Action Purpose Device(config)#ap dot11 24ghz rrm monitor rssi-normalization Configuring the 802.11 Performance Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > AP Join. On the AP Join page, click the name of the profile or click Add to create a new one. In the Add/Edit RF Profile window, click the RRM tab. In the General tab that is displayed, enter the following parameters: a) In the Interference (%) field, enter the threshold value for 802.11 foreign interference that ranges between 0 and 100 percent. b) In the Clients field, enter the threshold value for 802.11 Cisco AP clients that range between 1 and 75 clients. c) In the Noise (dBm) field, enter the threshold value for 802.11 foreign noise ranges between 127 and 0 dBm. d) In the Utilization(%) field, enter the threshold value for 802.11 RF utilization that ranges between 0 to 100 percent. Click Update & Apply to Device. Configuring the 802.11 Performance Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 {24ghz | 5ghz} rrm profile clients Sets the threshold value for 802.11 Cisco AP cli_threshold_value clients that range between 1 and 75 clients. Example: Step 3 Device(config)#ap dot11 24ghz rrm profile clients 20 ap dot11 {24ghz | 5ghz}rrm profile foreign Sets the threshold value for 802.11 foreign int_threshold_value interference that ranges between 0 and 100%. Example: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 530 Radio Resource Management Configuring Advanced 802.11 RRM Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action Purpose Device(config)#ap dot11 24ghz rrm profile foreign 50 ap dot11 {24ghz | 5ghz} rrm profile noise Sets the threshold value for 802.11 foreign noise for_noise_threshold_value ranges between 127 and 0 dBm. Example: Device(config)#ap dot11 24ghz rrm profile noise -65 ap dot11 6ghz rrm profile customize Example: Enables performance profiles. Device(config)#ap dot11 6ghz rrm profile customize ap dot11 {24ghz | 5ghz | 6ghz} rrm profile Sets the threshold value for 802.11 Cisco AP throughput throughput_threshold_value throughput that ranges between 1000 and Example: 10000000 bytes per second. Device(config)#ap dot11 24ghz rrm profile throughput 10000 ap dot11 {24ghz | 5ghz} rrm profile utilization rf_util_threshold_value Example: Sets the threshold value for 802.11 RF utilization that ranges between 0 to 100%. Device(config)#ap dot11 24ghz rrm profile utilization 75 end Example: Device(config)# end Returns to privileged EXEC mode. Configuring Advanced 802.11 RRM Enabling Channel Assignment (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Radio Configurations > RRM. In the RRM page, click the relevant band's tab: either 6 GHz Band, 5 GHz Band or 2.4 GHz Band. Click the DCA tab Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 531 Enabling Channel Assignment (CLI) Radio Resource Management Step 4 Step 5 In the Dynamic Channel Assignment Algorithm section, choose the appropriate Channel Assignment Mode from these options: · Automatic: Sets the channel assignment to automatic. · Freeze: Locks the channel assignment. Click Invoke Channel Update Once to refresh the assigned channels. Click Apply. Enabling Channel Assignment (CLI) Procedure Step 1 Command or Action enable Example: Device# enable Purpose Enters privileged EXEC mode. Step 2 ap dot11 {24ghz | 5ghz} rrm channel-update Enables the 802.11 channel selection update for Example: each of the Cisco access points. Note After you enable ap dot11 {24ghz Device# ap dot11 24ghz rrm channel-update | 5ghz} rrm channel-update, a token is assigned for channel assignment in the DCA algorithm. Restarting DCA Operation Procedure Step 1 Command or Action enable Example: Device# enable Step 2 ap dot11 {24ghz | 5ghz} rrm dca restart Example: Purpose Enters privileged EXEC mode. Restarts the DCA cycle for 802.11 radio. Device# ap dot11 24ghz rrm dca restart Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 532 Radio Resource Management Updating Power Assignment Parameters (GUI) Updating Power Assignment Parameters (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Wireless > Access Points. On the Access Points page, click the AP name from the 5GHz or 2.4 GHz list. In the Edit Radios > Configure > Tx Power Level Assignment section, choose Custom from the Assignment Method droup-down list. Choose the value for Transmit Power from the drop-down list. Click Update & Apply to Device. Updating Power Assignment Parameters (CLI) Procedure Step 1 Command or Action enable Example: Device# enable Purpose Enters privileged EXEC mode. Step 2 ap dot11 {24ghz | 5ghz | 6ghz} rrm txpower Initiates the update of the 802.11 6-Ghz transmit update power for every Cisco AP. Example: Device# ap dot11 24ghz rrm txpower update Configuring Rogue Access Point Detection in RF Groups Configuring Rogue Access Point Detection in RF Groups (CLI) Before you begin Ensure that each controller in the RF group has been configured with the same RF group name. Note The name is used to verify the authentication IE in all beacon frames. If the controller have different names, false alarms will occur. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 533 Configuring Rogue Access Point Detection in RF Groups (CLI) Radio Resource Management Procedure Step 1 Command or Action Purpose ap name Cisco_AP mode{monitor | clear | Perform this step for every access point sensor | sniffer} connected to the controller . Example: Device# ap name ap1 mode clear Configures the following AP modes of operation: · monitor:Sets the AP mode to monitor mode. · clear: Resets AP mode to local or remote based on the site. · sensor: Sets the AP mode to sensor mode. · sniffer: Sets the AP mode to wireless sniffer mode. Step 2 Step 3 Step 4 Step 5 end Example: Device(config)# end configure terminal Example: Device# configure terminal wireless wps ap-authentication Example: Device (config)# wireless wps ap-authentication wireless wps ap-authentication threshold value Example: Device (config)# wireless wps ap-authentication threshold 50 Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Enters global configuration mode. Enables rogue access point detection. Specifies when a rogue access point alarm is generated. An alarm occurs when the threshold value (which specifies the number of access point frames with an invalid authentication IE) is met or exceeded within the detection period. The valid threshold range is from 1 to 255, and the default threshold value is 1. To avoid false alarms, you may want to set the threshold to a higher value. Note Enable rogue access point detection and threshold value on every controller in the RF group. Note If rogue access point detection is not enabled on every controller in the RF group, the access points on the controller with this feature disabled are reported as rogues. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 534 Radio Resource Management Monitoring RRM Parameters and RF Group Status Monitoring RRM Parameters and RF Group Status Monitoring RRM Parameters Table 42: Commands for monitoring Radio Resource Management Commands Description show ap dot11 24ghz channel Displays the configuration and statistics of the 802.11b channel assignment. show ap dot11 24ghz coverage Displays the configuration and statistics of the 802.11b coverage. show ap dot11 24ghz group Displays the configuration and statistics of the 802.11b grouping. show ap dot11 24ghz logging Displays the configuration and statistics of the 802.11b event logging. show ap dot11 24ghz monitor Displays the configuration and statistics of the 802.11b monitoring. show ap dot11 24ghz profile Displays 802.11b profiling information for all Cisco APs. show ap dot11 24ghz summary Displays the configuration and statistics of the 802.11b Cisco APs. show ap dot11 24ghz txpower Displays the configuration and statistics of the 802.11b transmit power control. show ap dot11 5ghz channel Displays the configuration and statistics of the 802.11a channel assignment. show ap dot11 5ghz coverage Displays the configuration and statistics of the 802.11a coverage. show ap dot11 5ghz group Displays the configuration and statistics of the 802.11a grouping. show ap dot11 5ghz logging Displays the configuration and statistics of the 802.11a event logging. show ap dot11 5ghz monitor Displays the configuration and statistics of the 802.11a monitoring. show ap dot11 5ghz profile Displays 802.11a profiling information for all Cisco APs. show ap dot11 5ghz summary Displays the configuration and statistics of the 802.11a Cisco APs. show ap dot11 5ghz txpower Displays the configuration and statistics of the 802.11a transmit power control. Verifying RF Group Status (CLI) This section describes the new commands for RF group status. The following commands can be used to verify RF group status on the . Table 43: Verifying Aggressive Load Balancing Command Command Purpose Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 535 Examples: RF Group Configuration Radio Resource Management show ap dot11 5ghz group Displays the controller name which is the RF group leader for the 802.11a RF network. show ap dot11 24ghz group Displays the controller name which is the RF group leader for the 802.11b/g RF network. show ap dot11 6ghz group Displays the controller name which is the RF group leader for the 802.11 6-GHz RF network. To display the controller as a remote member and part of the AI Enhanced RRM, use the following command: Device# show ap dot11 24ghz group Radio RF Grouping RF Group Name : Open-RRM RF Protocol Version(MIN) : 100(30) RF Packet Header Version : 2 802.11b Group Mode : AUTO 802.11b Group Role : Remote-Member 802.11b Group Update Interval : 600 seconds 802.11b Group Leader : 172.19.30.39 (172.19.30.39) Secure-RRM : Disabled RF Group Members Controller name Controller IP Controller IPv6 DTLS status ---------------------------------------------------------------------------------------------------------- evwlc-188 192.1.0.188 N/A Examples: RF Group Configuration This example shows how to configure RF group name: Device# configure terminal Device(config)# wireless rf-network test1 Device(config)# ap dot11 24ghz shutdown Device(config)# end Device # show network profile 5 This example shows how to configure rogue access point detection in RF groups: Device# ap name ap1 mode clear Device# end Device# configure terminal Device(config)# wireless wps ap-authentication Device(config)# wireless wps ap-authentication threshold 50 Device(config)# end Information About ED-RRM Spontaneous interference is interference that appears suddenly on a network, perhaps jamming a channel or a range of channels completely. The Cisco CleanAir spectrum event-driven RRM feature allows you to set a Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 536 Radio Resource Management Configuring ED-RRM on the Cisco Wireless LAN Controller (CLI) threshold for air quality (AQ) that, if exceeded, triggers an immediate channel change for the affected access point. Once a channel change occurs due to event-driven RRM, the channel is blocked list for three hours to avoid selection. Most RF management systems can avoid interference, but this information takes time to propagate through the system. Cisco CleanAir relies on AQ measurements to continuously evaluate the spectrum and can trigger a move within 30 seconds. For example, if an access point detects interference from a video camera, it can recover by changing channels within 30 seconds of the camera becoming active. Configuring ED-RRM on the Cisco Wireless LAN Controller (CLI) Procedure Step 1 Step 2 Step 3 Trigger spectrum event-driven radio resource management (RRM) to run when a Cisco CleanAir-enabled access point detects a significant level of interference by entering these commands: ap dot11 {24ghz | 5ghz} rrm channel cleanair-event --Configures CleanAir driven RRM parameters for the 802.11 Cisco lightweight access points. ap dot11 {24ghz | 5ghz} rrm channel cleanair-event sensitivity {low | medium | high | custom}--Configures CleanAir driven RRM sensitivity for the 802.11 Cisco lightweight access points. Default selection is Medium. ap dot11 {24ghz | 5ghz} rrm channel cleanair-event custom-threshold custom-threshold-value--Triggers the ED-RRM event at the set threshold value. The custom threshold values range from 1 to 99. ap dot11 {24ghz | 5ghz} rrm channel cleanair-event rogue-contribution--Enables rogue contribution. ap dot11 {24ghz | 5ghz} rrm channel cleanair-event rogue-contribution duty-cycle thresholdvalue--Configures threshold value for rogue contribution. The valid range is from 1 to 99, with 80 as the default. Save your changes by entering this command: write memory See the CleanAir configuration for the 802.11a/n/ac or 802.11b/g/n network by entering this command: show ap dot11 {24ghz | 5ghz} cleanair config Information similar to the following appears: CleanAir Solution................................ : Enabled Air Quality Settings: Air Quality Reporting........................ : Enabled Air Quality Reporting Period (min)........... : 15 Air Quality Alarms........................... : Disabled Air Quality Alarm Threshold.................. : 10 Unclassified Interference.................... : Disabled Unclassified Severity Threshold.............. : 35 Interference Device Settings: Interference Device Reporting................ : Enabled BLE Beacon............................... : Enabled Bluetooth Link........................... : Enabled Microwave Oven........................... : Enabled 802.11 FH................................ : Enabled Bluetooth Discovery...................... : Enabled TDD Transmitter.......................... : Enabled Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 537 Information About Rogue PMF Containment Jammer................................... : Enabled Continuous Transmitter................... : Enabled DECT-like Phone.......................... : Enabled Video Camera............................. : Enabled 802.15.4................................. : Enabled WiFi Inverted............................ : Enabled WiFi Invalid Channel..................... : Enabled SuperAG.................................. : Enabled Canopy................................... : Enabled Microsoft Device......................... : Enabled WiMax Mobile............................. : Enabled WiMax Fixed.............................. : Enabled Interference Device Types Triggering Alarms: BLE Beacon............................... : Disabled Bluetooth Link........................... : Disabled Microwave Oven........................... : Disabled 802.11 FH................................ : Disabled Bluetooth Discovery...................... : Disabled TDD Transmitter.......................... : Disabled Jammer................................... : Disabled Continuous Transmitter................... : Disabled DECT-like Phone.......................... : Disabled Video Camera............................. : Disabled 802.15.4................................. : Disabled WiFi Inverted............................ : Enabled WiFi Invalid Channel..................... : Enabled SuperAG.................................. : Disabled Canopy................................... : Disabled Microsoft Device......................... : Disabled WiMax Mobile............................. : Disabled WiMax Fixed.............................. : Disabled Interference Device Alarms................... : Disabled AdditionalClean Air Settings: CleanAir Event-driven RRM State.............. : Disabled CleanAir Driven RRM Sensitivity.............. : LOW CleanAir Driven RRM Sensitivity Level........ : 35 CleanAir Event-driven RRM Rogue Option....... : Disabled CleanAir Event-driven RRM Rogue Duty Cycle... : 80 CleanAir Persistent Devices state............ : Disabled CleanAir Persistent Device Propagation....... : Disabled Radio Resource Management Information About Rogue PMF Containment From Cisco IOS XE Dublin 17.12.1, the controller will contain a rogue AP with 802.11w Protected Management Frame (PMF) on centrally switched WLANs if the client-serving radio channel of a rogue-detecting AP matches the channel of the corresponding rogue AP. PMF Containment is performed in the following scenarios: · PMF containment is supported only in the local mode. · PMF containment is done only for rogue clients that have not joined a rogue AP. · PMF containment is done only if a rogue-detecting AP shares the same primary channel with a rogue client. · PMF containment is not done on DFS channels even if a DFS channel is being used as a client-serving channel. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 538 Radio Resource Management Enabling Rogue PMF Containment · PMF containment is effective only if there is at least one functioning WLAN on the serving radio where the containment is being performed. The Rogue PMF Containment feature is supported only on the following APs: · Cisco Catalyst 9130AX · Cisco Catalyst 9136 · Cisco Catalyst 9162 · Cisco Catalyst 9164 · Cisco Catalyst 9166 Enabling Rogue PMF Containment Follow this procedure to configure PMF containment on a per site basis. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap profile ap-profile Example: Configures an AP profile and enters AP profile configuration mode. Device(config)# ap profile xyz-ap-profile Step 3 rogue detection containment pmf-denial Example: Device(config-ap-profile)# rogue detection containment pmf-denial Enables PMF-denial rogue AP containment. Step 4 pmf-deauth Example: Device(config-pmf-denial)# pmf-deauth Enables PMF-denial type deauthentication rogue AP containment. Step 5 end Example: Device(config-ap-profile)# end Returns to privileged EXEC mode. Verifying PMF Containment To verify PMF containment and the relevant statistics, use the following commands. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 539 Information About Rogue Channel Width Radio Resource Management To view the containment details summary for all the AP radios, use the following command: Device# show wireless wps rogue containment summary Rogue Containment activities for each managed AP AP: 687d.b45f.2ae0 Slot: 1 Active Containments : 3 Containment Mode : DEAUTH_PMF Rogue AP MAC : 687d.b45f.2a2d Containment Channels : 40 To verify the rogue statistics, use the following command: Device# show wireless wps rogue stats . . . States Alert : 256 Internal :0 External :0 Contained :1 Containment-pending :0 Threat :0 Pending :0 Rogue Clients Total/Max Scale : 20/16000 Contained :0 Containment-pending :0 . . . Information About Rogue Channel Width From Cisco IOS XE Dublin 17.12.1, you can specify the channel width and the band for rogue detection. The newly introduced condition chan-width command allows you to set the minimum or maximum channel width for rogue detection. Only the rogue APs matching the channel width criteria and band are selected for rogue detection. Configuring Rogue Channel Width (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless wps rogue rule rule-name priority Creates or enables a rule. priority Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 540 Radio Resource Management Configuring Rogue Channel Width (CLI) Step 3 Step 4 Step 5 Step 6 Step 7 Command or Action Purpose Example: Device(config)# wireless wps rogue rule 1 priority 1 condition chan-width {160MHz| 20MHz | Configures channel width and band for rogue 40MHz | 80MHz}band{2.4GHz| 5GHz| detection. 6GHz} If the classification is Friendly, this is the Example: minimum channel width. Device(config-rule)# condition chan-width If the classification is Custom, Malicious, or 20MHz band 5gHz Delete, this is the maximum channel width. Use either Step 4 > 5 > 6 > 7 Note Use only one of the Steps: 4, 5, 6 or 7 as required to classify rogue devices. Do not use all of them. classify friendly state {alert | external | internal } (Optional) Classifies devices matching this rule as friendly. Example: Device(config-rule)# classify friendly state internal · alert: Sets the malicious rogue access point to alert mode. · external: Acknowledges the presence of a rogue access point. · internal: Trusts a foreign access point. classify malicious state {alert | contained } (Optional) Classifies devices matching this rule Example: as malicious. Device(config-rule)# classify malicious state alert · alert: Sets the malicious rogue access point to alert mode. · contained: Contains the rogue access point. classify custom severity-score severity-score (Optional) Classifies devices matching this rule [name name] state {alert | contained } as custom. Example: Device(config-rule)# classify custom severity-score 12 name rule1 state alert · severity-score : Custom classification severity score. Valid values range from 1 to 100. · name: Defines the name for custom classification. · name : Custom classification name. · state: Defines the final state if rule is matched. · alert: Sets the rogue access point to alert mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 541 Configuring Rogue Classification Rules (GUI) Radio Resource Management Step 8 Step 9 Command or Action Purpose · contained: Contains the rogue access point. classify delete Example: Device(config-rule)# classify delete end Example: Device(config-rule)# end Ignoores the devices matching this rule. Returns to privileged EXEC mode. Configuring Rogue Classification Rules (GUI) Procedure Step 1 Step 2 Choose Configuration > Security > Wireless Protection Policies > Rogue AP Rules to open the Rogue Rules window. Rules that have already been created are listed in priority order. The name, type, status, state, match, and hit count of each rule is provided. Note To delete a rule, select the rule and click Delete. Create a new rule as follows: a) Click Add. b) In the Add Rogue AP Rule window that is displayed, enter a name for the new rule, in the Rule Name field. Ensure that the name does not contain any spaces. c) From the Rule Type drop-down list, choose one of the following options to classify rogue access points matching this rule: · Friendly · Malicious · Unclassified · Custom d) Configure the state of the rogue AP from the State drop-down list. This is the state when the rule matches the conditions for the rogue APs. · Alert: A trap is generated when an ad hoc rogue is detected. · Internal: A foreign ad hoc rogue is trusted. · External: The presence of an ad hoc rogue is acknowledged. · Contain: The ad hoc rogue is contained. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 542 Radio Resource Management Configuring Rogue Classification Rules (GUI) Step 3 · Delete: The ad hoc rogue is removed. Note The State field is not displayed if you select Unclassified as the Rule Type. e) If you chose the Rule Type as Custom, enter the Severity Score and the Custom Name. f) Click Apply to Device to add this rule to the list of existing rules, or click Cancel to discard this new rule. (Optional) Edit a rule as follows: a) Click the name of the rule that you want to edit. b) In the Edit Rogue AP Rule page that is displayed, from the Type drop-down list, choose one of the following options to classify rogue access points matching this rule: · Friendly · Malicious · Custom c) Configure the notification from the Notify drop-down list to All, Global, Local, or None after the rule is matched. d) Configure the state of the rogue AP from the State drop-down list after the rule is matched. e) From the Match Operation field, choose one of the following: · Match All: The detected rogue access point must meet all of the conditions specified by the rule for the rule to be matched and the rogue access point to adopt the classification type of the rule. · Match Any: The detected rogue access point must meet any of the conditions specified by the rule for the rule to be matched and the rogue access point to adopt the classification type of the rule. This is the default value. f) To enable this rule, check the Enable Rule check box. The default is unchecked. g) If you chose the Rule Type as Custom, enter the Severity Score and the Classification Name. h) From the Add Condition drop-down list, choose one or more of the following conditions that the rogue access point must meet : · None: No condition is set for rogue access point detection. · client-count: Condition requires that a minimum number of clients be associated to the rogue access point. For example, if the number of clients associated to the rogue access point is greater than or equal to the configured value, then the access point can be classified as malicious. If you choose this option, enter the minimum number of clients to be associated with the rogue access point in the Minimum Number of Rogue Clients field. The valid range is 1 to 10 (inclusive), and the default value is 0. · duration: Condition requires that the rogue access point be detected for a minimum period of time. If you choose this option, enter a value for the minimum detection period in the Time Duration field. The valid range is 0 to 86400 seconds (inclusive), and the default value is 0 seconds. · encryption: Condition requires that the advertised WLAN have specified encryption. Requires that the rogue access point's advertised WLAN does not have encryption enabled. If a rogue access point has encryption disabled, it is likely that more clients will try to associate with it. No further configuration is required for this option. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 543 Verifying Rogue Channel Width Radio Resource Management · infrastructure: Condition requires that the rogue access point's SSID (the SSID configured for the WLAN) be known to the controller. Select the Manage SSID check box to enable this configuration. · rssi: Condition requires that the rogue access point have a minimum received signal strength indication (RSSI) value. For example, if the rogue access point has an RSSI that is greater than the configured value, then the access point could be classified as malicious. If you choose this option, enter the minimum RSSI value in the Maximum RSSI field. The valid range is 0 to 128 dBm (inclusive). · channel-width: Condition requires that the rogue access point use the specified radio spectrum channel width for the specified radio band, as defined below. The valid channel widths are 20, 40, 80, and 160MHz. · For APs to be classified as Malicious, Custom or Delete, it must match the value (equal or more) set in the Minimum Channel Width drop-down list. · For APs to be classified as Friendly, it must match the value (equal or less) set using an option from the Maximum Channel Width drop-down list. · ssid: Condition requires that the rogue access point have a specific user-configured SSID. If you choose this option, enter the SSID in the User Configured SSID text field, and click + to add the SSID. · substring-ssid: Condition requires that the rogue access point have a substring of the specific user-configured SSID. The controller searches the substring in the same occurrence pattern and returns a match if the substring is found in the SSID string. Step 4 Step 5 Click Apply to Device to save the configuration. Click OK. Verifying Rogue Channel Width To view channel width and band information of a classification rule, use the following commands. Note When the same BSSID is beaconing on multiple bands (2.4 GHz, 5 GHz, 6 GHz), the show wireless wps rogue ap summary command output displays information for the band with the highest RSSI. Device# show wireless wps rogue rule detailed 1 Priority Rule Name Status Type State Match Operation Notification Hit Count Condition : type Max value (MHz) :1 :1 : Enabled : Friendly : Alert : Any : Enabled : 117 : chan-width : 40 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 544 Radio Resource Management Verifying Rogue Channel Width Band (GHz) : 5GHz Device# wireless wps rogue ap summary . . . MAC Address Classification State #APs #Clients Last Heard Highest-RSSI-Det-AP RSSI Channel Ch.Width GHz ----------------------------------------------------------------------------------------------------------------------------------- 002c.c849.9f00 Unclassified Alert 2 0 10/18/2022 16:50:18 0cd0.f895.efc0 -31 11 20 2.4 0062.ecf3.e73f Unclassified Alert 1 0 10/18/2022 16:50:16 0cd0.f895.efc0 -46 36 80 5 4ca6.4d22.cbaf Unclassified Alert 3 0 10/18/2022 16:50:46 0cd0.f895.efc0 -62 36 160 5 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 545 Verifying Rogue Channel Width Radio Resource Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 546 2 9 C H A P T E R Coverage Hole Detection · Coverage Hole Detection and Correction, on page 547 Coverage Hole Detection and Correction The RRM coverage hole detection algorithm can detect areas of radio coverage in a wireless LAN that are below the level needed for robust radio performance. This feature can alert you to the need for an additional (or relocated) lightweight access point. If clients on a lightweight access point are detected at threshold levels (RSSI, failed client count, percentage of failed packets, and number of failed packets) lower than those specified in the RRM configuration, the access point sends a "coverage hole" alert to the device. The alert indicates the existence of an area where clients are continually experiencing poor signal coverage, without having a viable access point to which to roam. The device discriminates between coverage holes that can and cannot be corrected. For coverage holes that can be corrected, the device mitigates the coverage hole by increasing the transmit power level for that specific access point. The device does not mitigate coverage holes caused by clients that are unable to increase their transmit power or are statically set to a power level because increasing their downstream transmit power might increase interference in the network. Configuring Coverage Hole Detection (GUI) Follow the procedure given below to configure client accounting. Procedure Step 1 Step 2 Click Configuration > Radio Configurations > RRM. On this page, you can configure Radio Resource Management parameters for 802.11a/n/ac (5 GHZ) and 802.11b/g/n (2.4 GHZ) radios, and flexible radio assignment parameters. Check the Enable Coverage Hole Detection check box. Enables coverage hole detection. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 547 Configuring Coverage Hole Detection (CLI) Radio Resource Management Configuring Coverage Hole Detection (CLI) Coverage Hole Detection (CHD) is based on upstream RSSI metrics observed by the AP. Follow the procedure given below to configure CHD: Before you begin Disable the 802.11 network before applying the configuration. Procedure Step 1 Command or Action ap dot11 {24ghz | 5ghz} rrm coverage Example: Device(config)# ap dot11 24ghz rrm coverage Purpose Configures the 802.11 coverage level for data packets. Use the no form of the command to disable CHD. Step 2 ap dot11 {24ghz | 5ghz} rrm coverage data {fail-percentage | packet-count | rssi-threshold} Example: Device(config)# ap dot11 24ghz rrm coverage data fail-percentage 60 Configures the 802.11 coverage level for data packets. · fail-percentage: Configures the 802.11 coverage failure-rate threshold for uplink data packets as a percentage that ranges from 1 to 100%. · packet-count: Configures the 802.11 coverage minimum failure count threshold for uplink data packets that ranges from 1 to 255. · rssi-threshold: Configures the 802.11 minimum receive coverage level for data packets that range from 90 to 60 dBm. Step 3 ap dot11 6ghz rrm coverage data{fail-percentage fail-percentage-value | packet-count packet-count-value} Example: Device(config)# ap dot11 6ghz rrm coverage data fail-percentage 60 Configures the 802.11 6-GHz coverage hole detection for data packets. · fail-percentage: Configures the 802.11 6-GHz coverage failure-rate threshold for uplink data packets as a percentage that ranges from 1 to 100%. · packet-count: Configures the 802.11 6-GHz coverage minimum failure count threshold for uplink data packets that ranges from 1 to 255. Step 4 ap dot11 {24ghz | 5ghz} rrm coverage exception global exception level Example: Configures the 802.11 Cisco AP coverage exception level as a percentage that ranges from 0 to 100%. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 548 Radio Resource Management Configuring Coverage Hole Detection (CLI) Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action Purpose Device(config)# ap dot11 24ghz rrm coverage exception global 50 ap dot11{24ghz | 5ghz}rrm coverage level global cli_min exception level Example: Configures the 802.11 Cisco AP client minimum exception level that ranges from 1 to 75 clients. Device(config)# ap dot11 24ghz rrm coverage level global 10 ap dot11 {24ghz | 5ghz} rrm coverage voice Configures the 802.11 coverage hole detection {fail-percentage | packet-count | for voice packets. rssi-threshold} · fail-percentage: Configures the 802.11 Example: coverage failure-rate threshold for uplink voice packets as a percentage that ranges Device(config)# ap dot11 24ghz rrm from 1 to 100%. coverage voice packet-count 10 · packet-count: Configures the 802.11 coverage minimum failure count threshold for uplink voice packets that ranges from 1 to 255. · rssi-threshold: Configures the 802.11 minimum receive coverage level for voice packets that range from 90 to 60 dBm. ap dot11 6ghz rrm coverage Configures the 802.11 6-GHz coverage hole voice{fail-percentage fail-percentage-value | detection for voice packets. packet-count packet-count-value} · fail-percentage: Configures the 802.11 Example: 6-GHz coverage failure-rate threshold for uplink voice packets as a percentage that Device(config)# ap dot11 6ghz rrm ranges from 1 to 100%. coverage voice packet-count 10 · packet-count: Configures the 802.11 6-GHz coverage minimum failure count threshold for uplink voice packets that ranges from 1 to 255. end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. show ap dot11 {24ghz | 5ghz | 6ghz} coverage Displays the CHD details. Example: Device# show ap dot11 5ghz coverage Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 549 Configuring CHD for RF Tag Profile (GUI) Radio Resource Management Note If both the number and percentage of failed packets exceed the values entered in the packet-count and fail-rate commands for a 5-second period, the client is considered to be in a pre-alarm condition. The controller uses this information to distinguish between real and false coverage holes. False positives are generally due to the poor roaming logic implemented on most clients. A coverage hole is detected if both the number and percentage of failed clients meet or exceed the values entered in the coverage level global and coverage exception global commands over a 90-second period. The controller determines if the coverage hole can be corrected and, if appropriate, mitigates the coverage hole by increasing the transmit power level for that specific access point. Configuring CHD for RF Tag Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Choose Configuration > Radio Configurations > RRM. On the Coverage tab, select the Enable Coverage Hole Detection check box. In the Data Packet Count field, enter the number of data packets. In the Data Packet Percentage field, enter the percentage of data packets. In the Data RSSI Threshold field, enter the actual value in dBm. Value ranges from -60 dBm to -90 dBm; the default value is 80 dBm. In the Voice Packet Count field, enter the number of voice data packets. In the Voice Packet Percentage field, enter the percentage of voice data packets. In the Voice RSSI Threshold field, enter the actual value in dBm. Value ranges from -60 dBm to -90 dBm; the default value is 80 dBm. In the Minimum Failed Client per AP field, enter the minimum number of clients on an AP with a signal-to-noise ratio (SNR) below the coverage threshold. Value ranges from 1 to 75 and the default value is 3. In the Percent Coverage Exception Level per AP field, enter the maximum desired percentage of clients on an access point's radio operating below the desired coverage threshold and click Apply. Value ranges from 0 to 100% and the default value is 25%. Click Apply. Configuring CHD for RF Profile (CLI) Follow the procedure given below to configure Coverage Hole Detection (CHD) for RF profile. Before you begin Ensure that the RF profile is already created. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 550 Radio Resource Management Configuring CHD for RF Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap dot11 {24ghz | 5ghz | 6ghz} rf-profile rf-profile-tag Example: Purpose Enters global configuration mode. Configures the 802.11 coverage hole detection for data packets. Step 3 Step 4 Device(config)# ap dot11 24ghz rf-profile alpha-rfprofile-24ghz coverage data rssi threshold threshold-value Configures the minimum RSSI value for data Example: packets received by the access point. Valid values range from -90 to -60 in dBm. Device(config-rf-profile)# coverage data rssi threshold -80 end Example: Returns to privileged EXEC mode. Step 5 Device(config-rf-profile)# end show ap dot11 24ghz rf-profile summary Example: Displays summary of the available RF profiles. Device# show ap dot11 24ghz rf-profile summary Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 551 Configuring CHD for RF Profile (CLI) Radio Resource Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 552 3 0 C H A P T E R Optimized Roaming · Optimized Roaming, on page 553 · Restrictions for Optimized Roaming, on page 553 · Configuring Optimized Roaming (GUI), on page 554 · Configuring Optimized Roaming (CLI), on page 554 Optimized Roaming Optimized roaming resolves the problem of sticky clients that remain associated to access points that are far away and outbound clients that attempt to connect to a Wi-Fi network without having a stable connection. This feature disassociates clients based on the RSSI of the client data packets and data rate. The client is disassociated if the RSSI alarm condition is met and the current data rate of the client is lower than the optimized roaming data rate threshold. You can disable the data rate option so that only RSSI is used for disassociating clients. Optimized roaming also prevents client association when the client's RSSI is low. This feature checks the RSSI of the incoming client against the RSSI threshold. This check prevents the clients from connecting to a Wi-Fi network unless the client has a viable connection. In many scenarios, even though clients can hear beacons and connect to a Wi-Fi network, the signal might not be strong enough to support a stable connection. You can also configure the client coverage reporting interval for a radio by using optimized roaming. The client coverage statistics include data packet RSSIs, Coverage Hole Detection and Mitigation (CHDM) prealarm failures, retransmission requests, and current data rates. Optimized roaming is useful in the following scenarios: · Addresses the sticky client challenge by proactively disconnecting clients. · Actively monitors data RSSI packets. · Disassociates client when the RSSI is lower than the set threshold. This section contains the following subsections: Restrictions for Optimized Roaming · You cannot configure the optimized roaming interval until you disable the 802.11a/b network. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 553 Configuring Optimized Roaming (GUI) Radio Resource Management · When basic service set (BSS) transition is sent to 802.11v-capable clients, and if the clients are not transitioned to other BSS before the disconnect timer expires, the corresponding client is disconnected forcefully. BSS transition is enabled by default for 802.11v-capable clients. · The Cisco Catalyst 9800 controller increments the 80211v smart roam failed counter while disconnecting the client due to optimized roaming. · We recommend that you do not use the optimized roaming feature with RSSI low check. Configuring Optimized Roaming (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Wireless > Advanced. On the Advanced page, click the relevant band's tab: either 5 GHz Band or 2.4 GHz Band. Check the Optimized Roaming Mode check box to enable the feature. Choose the required Optimized Roaming Date Rate Threshold. The threshold value options are different for 802.11a and 802.11b networks. Optimized roaming disassociates clients based on the RSSI of the client data packet and data rate. The client is disassociated if the current data rate of the client is lower than the Optimized Roaming Data Rate Threshold. Click Apply to save the configuration. Configuring Optimized Roaming (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 {24ghz | 5ghz | 6ghz} rrm optimized-roam Example: Device(config)#ap dot11 24ghz rrm optimized-roam Configures 802.11a, 802.11b, or 802.11 6-GHz optimized roaming. By default, optimized roaming is disabled. Step 3 ap dot11 24ghz rrm monitor optimized-roam Configure the data rate threshold for 802.11b data-rate-threshold {1M | 2M | 5_5M | 6M | for optimized roaming. 9M | 11M | 12M | 18M | 24M | 36M | 48M | 54M | disable} Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 554 Radio Resource Management Configuring Optimized Roaming (CLI) Step 4 Step 5 Command or Action Example: Purpose Device(config)#ap dot11 24ghz rrm monitor optimized-roam 18M ap dot11 {5ghz | 6ghz} rrm monitor optimized-roam data-rate-threshold {6M | 9M | 12M | 18M | 24M | 36M | 48M | 54M | disable} Configure the data rate threshold for 802.11a or 802.11 6-GHz optimized roaming. Example: Device(config)#ap dot11 6ghz rrm monitor optimized-roam 18M show ap dot11 {24ghz | 5ghz | 6ghz} optimized-roaming statistics Example: Displays the 802.11a, 802.11b, or 802.11 6-GHz optimized roaming configurations. Device#show ap dot11 24ghz optimized-roaming statistics Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 555 Configuring Optimized Roaming (CLI) Radio Resource Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 556 3 1 C H A P T E R Cisco Flexible Radio Assignment · Information About Flexible Radio Assignment, on page 557 · Configuring an FRA Radio (GUI), on page 558 · Enabling FRA (CLI), on page 560 · Configuring Client FRA in RF Profile (CLI), on page 562 · Verifying FRA XOR 5-GHz and 6-GHz Details, on page 562 · Flexible Radio Assignment (FRA) Action, on page 563 Information About Flexible Radio Assignment Flexible Radio Assignment (FRA) takes advantage of Cisco FRA-capable APs whose radio hardware can operate in multiple roles. The following are the AP models and types of hardware managed by FRA: Table 44: AP Models and Types of Hardware Managed by FRA AP Model FRA Radios Cisco Aironet 2800 Series Access 2.4/5 XOR Points Cisco Aironet 3800 Series Access 2.4/5 XOR Points Cisco Aironet 4800 Series Access 2.4/5 XOR Points Cisco Catalyst 9120 Series Access 2.4/5 XOR Points Cisco Catalyst 9130AX Series Access Points 5-GHz Tri-Radio Cisco Catalyst Wireless 9166 Access Points 5/6-GHz XOR Functions 2.4-GHz and 5-GHz or dual 5-GHz operations 2.4-GHz and 5-GHz or dual 5-GHz operations 2.4-GHz and 5-GHz or dual 5-GHz operations 2.4-GHz and 5-GHz or dual 5-GHz operations 2.4-GHz 4x4 and single 5-GHz 8x8, or 2.4-GHz 4x4 and dual 5-GHz 4x4 2.4-GHz 4x4 and dual 5-GHz 4x4, or 5-GHz 4x4 and 6-GHz 4x4 FRA performs a number of functions. On the 2.4-GHz and 5-GHz XOR models, FRA establishes the required 2.4-GHz coverage, identifies redundant radios, and converts them to either 5-GHz or a monitor role. For Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 557 Configuring an FRA Radio (GUI) Radio Resource Management tri-radio and 5/6-GHz XOR models, FRA determines the 2.4-GHz coverage, and the redundant radios are converted to a monitor role. Additionally, FRA determines the best operating role for the 5-GHz tri-radio (as either a single 8x8 or a dual 4x4), based on connected client capabilities. For the 5/6-GHz XOR radio, the band that the radios should operate on is based on the availability 6-GHz client presence in the regulatory domain. FRA also manages the resulting configurations of the radios to optimize client experience across flexible roles. Client Steering is responsible for load balancing client connections. For instance, from Cisco Aironet 2800 APs through Cisco Catalyst 9120 Series APs, all the internal antenna AP models perform dual 5-GHz roles as a Macro-Micro cell (a cell within a cell). The antennas on these models are built to support the directionality needed for the micro cell. FRA client steering helps to steer clients to the appropriate radio based on their position within the cell (closer clients are put on the micro cell). The FRA APs that support external antennas operate as Macro-Macro, which allows full control over power and channels. The CW9166I AP also supports a Macro-Macro model when using the internal antennas. In Cisco Catalyst 9130 APs and Cisco Catalyst 9136 APs, FRA also manages the operating mode of the band-locked 8x8 5-GHz tri-radio by monitoring client capabilities of connected clients. For instance, if the attached clients are largely Wi-Fi 5-capable clients, then, beam forming should be multi-user MIMO (MU-MIMO), ensuring better capacity with dual 4x4 5-GHz cells. However, if the same cell has a higher number of Wi-Fi 6-capable clients, then 8x8 spatial streams support more MU-MIMO capacity and increase the overall performance of the cell and client experience. The CW9166 AP is the first AP with a dual-band XOR radio covering the 5-GHz and 6-GHz bands. Criteria for role selection is regulatory domain (that is, if the country's regulatory rules support 6-GHz operations). If yes, 6-GHz is chosen. If not, 5-GHz operations are chosen. Configuration choices for all FRA radio models include: · Automatic (Allows FRA to manage role selection automatically) · Client Serving (Manual role selection of 2.4-GHz, 5-GHz, or 6-GHz, or FRAs are not engaged) · Monitor (Manual: no FRA) · Sniffer (Manual: no FRA) Configuring an FRA Radio (GUI) Procedure Step 1 Step 2 Choose Configuration > Radio Configurations > RRM > FRA. In the Flexible Radio Assignment window, in the 5/6 GHz Flexible Radio Assignment section, perform the following steps: a) Click the FRA Status toggle button to change the FRA status to Enabled. By default, the FRA status is Disabled. b) Click the FRA Freeze toggle button to enable FRA freeze. Enable FRA Freeze to lock the radio's current assigned role. When enabled, the radios continue to operate in their role (monitor, sniffer or client serving) until you manually change it or disable FRA Freeze. c) From the FRA Interval drop-down list, choose the FRA run interval. The interval value range is from 1 hour to 24 hours. You can choose the FRA run interval value only after you enable the FRA status. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 558 Radio Resource Management Configuring an FRA Radio (GUI) Step 3 Step 4 In the 2.4/5 GHz Flexible Radio Assignment section, perform the following steps: a) Click the FRA Status toggle button to change the FRA status to Enabled. By default, the FRA status is Disabled. b) Click the FRA Freeze toggle button to enable FRA freeze. Enable FRA Freeze to lock the radio's current assigned role. When enabled, the radios continue to operate in their role (monitor, sniffer or client serving) until you manually change it or disable FRA Freeze. c) From the FRA Interval drop-down list, choose the FRA run interval. The interval value range is from 1 hour to 24 hours. You can choose the FRA run interval value only after you enable the FRA status. d) From the FRA Sensitivity drop-down list, choose the percentage of Coverage Overlap Factor (COF) required to consider a radio as redundant. You can select the supported value only after you enable the FRA status. The supported values are as follows: · Low: 100 percent · Medium (default): 95 percent · High: 90 percent · Higher: 85 percent · Even Higher: 80 percent · Super High: 50 percent e) From the FRA Action drop-down list, select the 2.4GHz Monitor option to globally configure the redundant dual-band (XOR 2.4/5-GHz) radios to operate in monitor role. By default, dual-band radios operate in the 2.4-GHz/5-GHz/Monitor role. This configuration is helpful especially when there is enough coverage on the 5-GHz band and you want to restrict radios from moving to the 5-GHz band to prevent further interference. Instead, the radios directly move to the monitor mode in the 2.4-GHz band. f) Check the Client Aware check box to take decisions on redundancy. When enabled, the Client Aware feature monitors the dedicated 5-GHz radio. When the client load passes a preset threshold, the Flexible Radio assignment is automatically changed from a monitor role to a 5-GHz role, effectively doubling the capacity of the cell on demand. After the capacity crisis is over and Wi-Fi load returns to normal, the radios resume their previous roles. g) In the Client Select field, enter a value for client selection. The valid value range is between 0 and 100 percent. The default value is 50 percent. This means that if the dedicated 5-GHz interface reaches 50 percent channel utilization, it triggers the monitor role dual-band interface to transition to a 5-GHz client-serving role. h) In the Client Reset field, enter a reset value for the client. The valid value range is between 0 and 100 percent. The default value is 5 percent. When the AP is operating as a dual 5-GHz AP, this setting indicates the reduction in the combined radios' overall channel utilization required to reset the dual-band radio to monitor role. Click Apply to save the configuration. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 559 Enabling FRA (CLI) Radio Resource Management Enabling FRA (CLI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. [no] ap fra Example: Device(config)# [no] ap fra Enables or disables FRA on the AP. [no] ap fra 5-6ghz Example: Device(config)# ap fra 5-6ghz Enables FRA 5-GHz or 6-GHz on APs that support XOR (5-GHz or 6-GHz). Use the no form of this command to disable this feature. [no] ap fra freeze Example: Device(config)# ap fra freeze Enables FRA freeze. Use the no form of this command to disable this feature. [no] ap fra 5-6ghz freeze Example: Device(config)# ap fra 5-6ghz freeze Enables FRA 5-GHz or 6-GHz freeze. Use the no form of this command to disable this feature. ap fra interval Example: Device(config)# ap fra interval 3 Configures the FRA interval, in hours. The range is from 1 to 24 hours. Note The FRA interval must be more than the configured RRM interval. ap fra 5-6ghz interval number-of-hours Example: Configures the FRA 5-GHz or 6-GHz interval, in hours. The valid range is from 1 to 24 hours. Device(config)# ap fra 5-6ghz interval 4 ap fra sensitivity {high | medium | low} Configures FRA sensitivity. Example: Device(config)# ap fra sensitivity high · high: Sets the FRA Coverage Overlap Sensitivity to high. · medium: Sets the FRA Coverage Overlap Sensitivity to medium. · low: Sets the FRA Coverage Overlap Sensitivity to low. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 560 Radio Resource Management Enabling FRA (CLI) Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Command or Action end Example: Device(config)# end Purpose Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. ap fra revert {all | auto-only}{auto | static} Rolls back the XOR radio state. Example: · all: Reverts all XOR Radios Device# ap fra revert all auto · auto-only: Reverts only XOR radios that are currently in automatic band selection. · auto: Places the XOR radios in automatic band selection. · static: Places the XOR radios in static 2.4-GHz, 5-GHz, and 6-GHz bands. (Optional) show ap dot11 {24ghz | 5ghz | 6ghz | dual-band} summary Example: Device# show ap dot11 6ghz summary Shows the configuration and statistics of 802.11 Cisco APs. (Optional) show ap fra Example: Device# show ap fra Shows the current FRA configuration. FRA State : Disabled FRA Sensitivity : medium (95%) FRA Interval : 1 Hour(s) AP Name MAC Address Slot ID Current-Band COF % Suggested Mode ------------------------------------------------------------------------------------------- AP00A6.CA36.295A 006b.f09c.8290 0 2.4GHz None 2.4GHz COF : Coverage Overlap Factor test_machine# (Optional) show ap fra 5-6ghz Shows the FRA 5-GHz - 6-GHz configurations. (Optional) show ap name ap-name config Shows the current 802.11 parameters in a given dot11 {24ghz | 5ghz | 6ghz | dual} AP. Example: Device# show ap name config dot11 6ghz Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 561 Configuring Client FRA in RF Profile (CLI) Radio Resource Management Configuring Client FRA in RF Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 6ghz rf-profile rf-profile-name Example: Configures the RF profile and enters RF profile configuration mode. Device(config)# ap dot11 6ghz rf-profile rf-profile-name Step 3 client-aware-fra client-count-reset client-count Example: Device(config-rf-profile)# client-aware-fra client-count-reset 1 Configures the client count threshold for the radio to switch from 6-GHz to 5-GHz band. The valid range is from 1 to 10 clients. Step 4 client-aware-fra client-reset-util util-percentage Example: Device(config-rf-profile)# client-aware-fra client-reset-util 5 Configures the utilization threshold for the radio to switch from 6-GHz to 5-GHz band. The valid range is from 0 to 100 percent. Verifying FRA XOR 5-GHz and 6-GHz Details To view the FRA 5-GHz and 6-GHz configuration details, run the following command: Device# show ap fra 5-6ghz To view the client utilization threshold and client reset count, run the following command: Device# show ap rf-profile name default-rf-profile-6ghz detail Description : default rfprofile for 6GHz radio RF Profile Name : default-rf-profile-6ghz Band : 6 GHz Transmit Power Threshold v1 : 70 dBm Min Transmit Power : 10 dBm Max Transmit Power : 30 dBm Operational Rates 802.11 6GHZ 6M Rate : Mandatory 802.11 6GHZ 9M Rate : Supported 802.11 6GHZ 12M Rate : Mandatory 802.11 6GHZ 18M Rate : Supported 802.11 6GHZ 24M Rate : Mandatory 802.11 6GHZ 36M Rate : Supported 802.11 6GHZ 48M Rate : Supported 802.11 6GHZ 54M Rate : Supported Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 562 Radio Resource Management Flexible Radio Assignment (FRA) Action Max Clients . . . PSC Channel List DCA Bandwidth DCA Foreign AP Contribution State Client utilization threshold Client Reset count Client Network Preference 802.11ax OBSS PD Non-SRG OBSS PD Maximum SRG OBSS PD SRG OBSS PD Minimum SRG OBSS PD Maximum Broadcast Probe Response FILS Discovery Multi-BSSID Profile Name NDP mode Guard Interval PSC Enforcement : 200 : 5,21,37,53,69,85,101,117,133,149,165,181,197,213,229 : best : Enabled : Up : 5% :1 : default : Disabled : 62 dBm : Disabled : 82 dBm : 62 dBm : Disabled : Disabled : default-multi-bssid-profile : Auto : none : Disabled Note The client utilization threshold is the utilization threshold for radios to switch from 6-GHz to 5-GHz band. The client reset count is the client count threshold for radios to switch from 6-GHz to 5-GHz band. Flexible Radio Assignment (FRA) Action Feature History for Flexible Radio Assignment Action This table provides release and related information about the feature explained in this section. This feature is also available in all the releases subsequent to the one in which they are introduced in, unless noted otherwise. Table 45: Feature History for FRA Action Release Feature Feature Information Cisco IOS XE Dublin 17.10.1 Flexible Radio Assignment In Cisco IOS-XE 17.10.1 and earlier releases, the (FRA) Action FRA moves the redundant dual-band radios to either 5-GHz client-serving role or monitor role. Cisco IOS XE Dublin17.11.1 Flexible Radio Assignment From Cisco IOS-XE 17.11.1 onwards, you can select (FRA) Action the redundant dual-band radios in a network to operate in monitor only mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 563 Information About Flexible Radio Assignment Action Radio Resource Management Information About Flexible Radio Assignment Action Flexible Radio Assignment (FRA) evaluates only 2.4-GHz radio coverage and determines whether there is overlapping coverage that is causing radio interference. If there is an overlapping coverage, the dual-band radio moves to either 5-GHz client serving or monitor role. In Cisco IOS-XE 17.10.1 and earlier releases, the FRA moves the redundant dual-band radios to either 5-GHz client-serving role or monitor role. From Cisco IOS-XE 17.11.1 onwards, you can select the redundant dual-band radios in a network to operate in monitor only mode. Note The FRA action feature is disabled by default. Configuring FRA Action in Default RF Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode Step 2 ap dot11 24ghz fra action monitor Configures the FRA action as monitor, and Example: moves all redundant dual-band radios to monitor role only. Device(config)# ap dot11 24ghz fra action monitor Step 3 end Example: Device(config)# end Exits configuration mode and returns to privileged EXEC mode. Configuring FRA Action in 2.4-GHz RF Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap dot11 24ghz rf-profile rf-profile-tag Example: Purpose Enters global configuration mode Configures the RF profile name and enters RF profile configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 564 Radio Resource Management Verifying FRA Action Configuration Step 3 Step 4 Command or Action Purpose Device(config)# ap dot11 24ghz rf-profile alpha-rfprofile-24ghz fra action monitor Example: Device(config-rf-profile)# fra action monitor Configures the FRA action as monitor, and moves all redundant dual-band radios to monitor role only. end Example: Device(config-rf-profile)# end Exits configuration mode and returns to privileged EXEC mode. Verifying FRA Action Configuration To view the selected FRA action, use the following command: Device# show ap fra FRA State FRA Freeze FRA Operation State FRA Sensitivity FRA Interval Service Priority Client Aware FRA Client Select Client Reset FRA Action Last Run : Enabled : Disabled : Up : higher (85%) : 1 Hour(s) : Coverage : Enabled : 25% : 5% : 2.4GHz/Monitor : 3069 seconds ago To view the FRA action details in an AP RF profile, use the following command: Device# show ap rf-profile name madhu-rf-profile-24 detail | sec FRA Client Aware FRA : Disabled FRA Action : 2.4GHz/Monitor To view the radio mode and role in an AP, use the following command: Device# show ap name AP7872.5DED.CB74 config slot 0 | sec Attribute Attributes for Slot 0 Radio Type : 802.11n - 2.4/5 GHz Radio Mode : Monitor Radio Role : Monitor Assignment Method : Auto Monitor Mode Reason : Automatically Switched by FRA Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 565 Verifying FRA Action Configuration Radio Resource Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 566 3 2 C H A P T E R XOR Radio Support · Information About Dual-Band Radio Support , on page 567 · Configuring Default XOR Radio Support, on page 568 · Configuring XOR Radio Support for the Specified Slot Number (GUI), on page 570 · Configuring XOR Radio Support for the Specified Slot Number, on page 571 Information About Dual-Band Radio Support The Dual-Band (XOR) radio in Cisco 2800, 3800, 4800, and the 9120 series AP models offer the ability to serve 2.4GHz or 5GHz bands or passively monitor both the bands on the same AP. These APs can be configured to serve clients in 2.4GHz and 5GHz bands, or serially scan both 2.4GHz and 5GHz bands on the flexible radio while the main 5GHz radio serves clients. Cisco Catalyst Wireless 9166 AP (CW9166) now has XOR function for a dual 5-GHz 4x4 or 5-GHz 4x4 and 6-GHz 4x4 radios. These radios can also be configured as client serving, monitor or as a sniffer interface like the earlier XOR radios. Note For countries where 6-GHz spectrum is not yet available for use of Wi-Fi, when the Cisco Catalyst Wireless 9166I AP operates as dual 5-GHz, it offers two independent macro-macro omnidirectional cells, even though it is an internal-antenna AP. The two cells are band-locked. The 5-GHz in slot 1 operates only in the UNII1 and 2 bands, that is, channels 36 64, and the XOR radio in slot 2, when operated in 5-GHz, is locked to the UNII2E and 3 bands, that is, channels 100 165. This restriction of band lock applies only when the AP is operating as dual 5-GHz. Cisco APs models up and through the Cisco 9120 APs are designed to support dual 5GHz band operations with the i model supporting a dedicated Macro/Micro architecture and the e and p models supporting Macro/Macro. The Cisco 9130AXI APs and the Cisco 9136 APs support dual 5-GHz operations as Micro/Messo cell, and the CW9166I supports as Macro/Macro. When a radio moves between bands (from 2.4-GHz to 5-GHz and vice versa), clients need to be steered to get an optimal distribution across radios. When an AP has two radios in the 5GHz band, client steering algorithms contained in the Flexible Radio Assignment (FRA) algorithm are used to steer a client between the same band co-resident radios. The XOR radio support can be steered manually or automatically: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 567 Configuring Default XOR Radio Support Radio Resource Management · Manual steering of a band on a radio--The band on the XOR radio can only be changed manually. · Automatic client and band steering on the radios is managed by the FRA feature that monitors and changes the band configurations as per site requirements. Note RF measurement will not run when a static channel is configured on slot 1. Due to this, the dual band radio slot 0 will move only with 5GHz radio and not to the monitor mode. When slot 1 radio is disabled, RF measurement will not run, and the dual band radio slot 0 will be only on 2.4GHz radio. Note Only one of the 5-GHz radios can operate in the UNII band (100 - 144), due to an AP limitation to keep the power budget within the regulatory limit. Configuring Default XOR Radio Support Before you begin Note The default radio points to the XOR radio hosted on slot 0. Procedure Step 1 Step 2 Step 3 Command or Action enable Example: Device# enable Purpose Enters privileged EXEC mode. ap name ap-name dot11 dual-band antenna Configures the 802.11 dual-band antenna on ext-ant-gain antenna_gain_value a specific Cisco access point. Example: antenna_gain_value: The valid range is from Device# ap name ap-name dot11 dual-band 0 to 40. antenna ext-ant-gain 2 ap name ap-name [no] dot11 dual-band Shuts down the default dual-band radio on a shutdown specific Cisco access point. Example: Use the no form of the command to enable the Device# ap name ap-name dot11 dual-band radio. shutdown Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 568 Radio Resource Management Configuring Default XOR Radio Support Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action Purpose ap name ap-name dot11 dual-band role manual client-serving Switchs to clientserving mode on the Cisco access point. Example: Device# ap name ap-name dot11 dual-band role manual client-serving ap name ap-name dot11 dual-band band Switchs to 2.4-GHz radio band. 24ghz Example: Device# ap name ap-name dot11 dual-band band 24ghz ap name ap-name dot11 dual-band txpower Configures the transmit power for the radio on {transmit_power_level | auto} a specific Cisco access point. Example: Note Device# ap name ap-name dot11 dual-band txpower 2 When an FRA-capable radio (slot 0 on 9120 AP[for instance]) is set to Auto, you cannot configure static channel and Txpower on this radio. If you want to configure static channel and Txpower on this radio, you will need to change the radio role to Manual Client-Serving mode. This note is not applicable for Cisco Catalyst Wireless 9166 AP (CW9166). ap name ap-name dot11 dual-band channel Enters the channel for the dual band. channel-number channel-number--The valid range is from 1 Example: to 173. Device# ap name ap-name dot11 dual-band channel 2 ap name ap-name dot11 dual-band channel Enables the auto channel assignment for the auto dual-band. Example: Device# ap name ap-name dot11 dual-band channel auto ap name ap-name dot11 dual-band channel Chooses the channel width for the dual band. width{20 MHz | 40 MHz | 80 MHz | 160 MHz} Example: Device# ap name ap-name dot11 dual-band channel width 20 MHz Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 569 Configuring XOR Radio Support for the Specified Slot Number (GUI) Radio Resource Management Step 10 Step 11 Step 12 Step 13 Step 14 Command or Action Purpose ap name ap-name dot11 dual-band cleanair Enables the Cisco CleanAir feature on the Example: dual-band radio. Device# ap name ap-name dot11 dual-band cleanair ap name ap-name dot11 dual-band cleanair Selects a band for the Cisco CleanAir feature. band{24 GHz | 5 GMHz} Use the no form of this command to disable Example: the Cisco CleanAir feature. Device# ap name ap-name dot11 dual-band cleanair band 5 GHz Device# ap name ap-name [no] dot11 dual-band cleanair band 5 GHz ap name ap-name dot11 dual-band dot11n Configures the 802.11n dual-band parameters antenna {A | B | C | D} for a specific access point. Example: Device# ap name ap-name dot11 dual-band dot11n antenna A show ap name ap-name auto-rf dot11 dual-band Displays the auto-RF information for the Cisco access point. Example: Device# show ap name ap-name auto-rf dot11 dual-band show ap name ap-name wlan dot11 dual-band Displays the list of BSSIDs for the Cisco access point. Example: Device# show ap name ap-name wlan dot11 dual-band Configuring XOR Radio Support for the Specified Slot Number (GUI) Procedure Step 1 Step 2 Step 3 Click Configuration > Wireless > Access Points. In the Dual-Band Radios section, select the AP for which you want to configure dual-band radios. The AP name, MAC address, CleanAir capability and slot information for the AP are displayed. If the Hyperlocation method is HALO, the antenna PID and antenna design information are also displayed. Click Configure. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 570 Radio Resource Management Configuring XOR Radio Support for the Specified Slot Number Step 4 Step 5 Step 6 In the General tab, set the Admin Status as required. Set the CleanAir Admin Status field to Enable or Disable. Click Update & Apply to Device. Configuring XOR Radio Support for the Specified Slot Number Procedure Step 1 Command or Action enable Example: Device# enable Purpose Enters privileged EXEC mode. Step 2 ap name ap-name dot11 dual-band slot 0 Configures dual-band antenna for the XOR antenna ext-ant-gain radio hosted on slot 0 for a specific access point. external_antenna_gain_value external_antenna_gain_value - Is the external Example: antenna gain value in multiples of .5 dBi unit. Device# ap name AP-SIDD-A06 dot11 The valid range is from 0 to 40. dual-band slot 0 antenna ext-ant-gain 2 Step 3 ap name ap-name dot11 dual-band slot 0 band {24ghz | 5ghz} Example: Device# ap name AP-SIDD-A06 dot11 dual-band slot 0 band 24ghz Configures current band for the XOR radio hosted on slot 0 for a specific access point. Step 4 ap name ap-name dot11 dual-band slot 0 Configures dual-band channel for the XOR channel {channel_number | auto | width [160 radio hosted on slot 0 for a specific access point. | 20 | 40 | 80]} channel_number- The valid range is from 1 to Example: 165. Device# ap name AP-SIDD-A06 dot11 dual-band slot 0 channel 3 Step 5 ap name ap-name dot11 dual-band slot 0 cleanair band {24Ghz | 5Ghz} Example: Device# ap name AP-SIDD-A06 dot11 dual-band slot 0 cleanair band 24Ghz Enables CleanAir features for dual-band radios hosted on slot 0 for a specific access point. Step 6 ap name ap-name dot11 dual-band slot 0 dot11n antenna {A | B | C | D} Example: Device# ap name AP-SIDD-A06 dot11 dual-band slot 0 dot11n antenna A Configures 802.11n dual-band parameters hosted on slot 0 for a specific access point. Here, A- Enables antenna port A. B- Enables antenna port B. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 571 Configuring XOR Radio Support for the Specified Slot Number Radio Resource Management Step 7 Step 8 Step 9 Command or Action Purpose C- Enables antenna port C. D- Enables antenna port D. ap name ap-name dot11 dual-band slot 0 role Configures dual-band role for the XOR radio {auto | manual [client-serving | monitor]} hosted on slot 0 for a specific access point. Example: Device# ap name AP-SIDD-A06 dot11 dual-band slot 0 role auto The following are the dual-band roles: · auto- Refers to the automatic radio role selection. · manual- Refers to the manual radio role selection. ap name ap-name dot11 dual-band slot 0 shutdown Disables dual-band radio hosted on slot 0 for a specific access point. Example: Device# ap name AP-SIDD-A06 dot11 dual-band slot 0 shutdown Use the no form of this command to enable the dual-band radio. Device# ap name AP-SIDD-A06 [no] dot11 dual-band slot 0 shutdown ap name ap-name dot11 dual-band slot 0 txpower {tx_power_level | auto} Example: Device# ap name AP-SIDD-A06 dot11 dual-band slot 0 txpower 2 Configures dual-band transmit power for XOR radio hosted on slot 0 for a specific access point. · tx_power_level- Is the transmit power level in dBm. The valid range is from 1 to 8. · auto- Enables auto-RF. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 572 3 3 C H A P T E R Cisco Receiver Start of Packet · Information About Receiver Start of Packet Detection Threshold, on page 573 · Restrictions for Rx SOP, on page 573 · Configuring Rx SOP (CLI), on page 574 · Customizing RF Profile (CLI), on page 574 Information About Receiver Start of Packet Detection Threshold The Receiver Start of Packet (Rx SOP) Detection Threshold feature determines the Wi-Fi signal level in dBm at which an access point's radio demodulates and decodes a packet. As the Wi-Fi level increases, the radio sensitivity decreases and the receiver cell size becomes smaller. Reduction of the cell size affects the distribution of clients in the network. Rx SOP is used to address clients with weak RF links, sticky clients, and client load balancing across access points. Rx SOP helps to optimize the network performance in high-density deployments, such as stadiums and auditoriums where access points need to optimize the nearest and strongest clients. Restrictions for Rx SOP · Rx SOP configuration is not applicable to the third radio module pluggable on Cisco Aironet 3600 Series APs. · Rx SOP configurations are supported only in Local, FlexConnect, Bridge, and Flex+Bridge modes. · Rx SOP configurations are not supported in the FlexConnect+PPPoE, FlexConnect+PPPoE-wIPS, and FlexConnect+OEAP submodes. The following table shows the permitted range for the Rx SOP threshold. Table 46: Rx SOP Threshold Radio Band 2.4 GHz 5 GHz Threshold High -79 dBm -76 dBm Threshold Medium -82 dBm -78 dBm Threshold Low -85 dBm -80 dBm Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 573 Configuring Rx SOP (CLI) Radio Resource Management Configuring Rx SOP (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 Step 3 Step 4 Step 5 ap dot11 {24ghz | 5ghz} rx-sop threshold {auto | custom | high | low | medium} Example: Device(config)# ap dot11 5ghz rx-sop threshold high Configures the 802.11bg/802.11a radio Rx SOP threshold. end Returns to privileged EXEC mode. show ap dot11 {24ghz | 5ghz} high-density Displays the 802.11bg/802.11a high-density Example: parameters. Device# show ap dot11 5ghz high-density show ap summary Example: Device# show ap summary Displays a summary of all the connected Cisco APs. Customizing RF Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 high-density rx-sop threshold {auto | custom Configures the 802.11bg, 802.11a or 802.11 | high | low | medium} 6-GHz high-density parameters. Example: Device(config-rf-profile)# high-density rx-sop threshold high Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 574 Radio Resource Management Step 3 Step 4 Command or Action show ap summary Example: Device# show ap summary end Customizing RF Profile (CLI) Purpose Displays a summary of all the connected Cisco APs. Returns to privileged EXEC mode. Note · Irrespective of radio mode, the controller configures the radio with configured RX-SOP value. The AP determines whether to use the configured RX-SOP value. · For the XOR radio (Slot 0), when the AP is in monitor mode the RX-SOP value that gets pushed to AP depends on the band it was operating before moving to monitor mode (basically if radio operating band is 24g then RX-SOP params picked from 24GHz RF profile (or default rf-profile). If it was in 5g then RX-SOP params picked from 5GHz RF profile (or default rf-profile) configured for the AP). Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 575 Customizing RF Profile (CLI) Radio Resource Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 576 Client Limit 3 4 C H A P T E R · Information About Client Limit, on page 577 · Configuring Client Limit Per WLAN (GUI), on page 577 · Configuring Client Limit Per WLAN (CLI), on page 578 · Configuring Client Limit Per AP (GUI), on page 579 · Configuring Client Limit Per AP (CLI), on page 579 · Configuring Client Limit Per Radio (GUI), on page 580 · Configuring Client Limit Per Radio (CLI), on page 580 · Verifying Client Limit, on page 581 Information About Client Limit This feature enforces a limit on the number of clients that can to be associated with an AP. Further, you can configure the number of clients that can be associated with each AP radio. From Cisco IOS XE Cupertino 17.8.x onwards, client limiting is supported per AP, per radio, and per radio per WLAN. Limitations for Client Limit · APs other than the Cisco Catalyst 9136 Series APs, support only 200 clients per radio. If you configure more than 200 clients for these APs, the number of clients that can be associated with the AP radios will still be limited to only 200 clients, as per the AP capability value. · Client limiting is supported on the Cisco Catalyst 9136 Series APs in Flex mode. Configuring Client Limit Per WLAN (GUI) Procedure Step 1 Step 2 Choose Configuration > Tags & Profiles > WLANs. Click a WLAN from the list of WLANs. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 577 Configuring Client Limit Per WLAN (CLI) Radio Resource Management Step 3 Step 4 Step 5 Click the Advanced tab. Under the Max Client Connections settings, enter the client limit for Per WLAN, Per AP Per WLAN, and Per AP Radio Per WLAN. Click Update & Apply to Device. Configuring Client Limit Per WLAN (CLI) Procedure Step 1 Command or Action enable Example: Device# enable Purpose Enters privileged EXEC mode. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 wlan wlan-name Example: Device(config)# wlan ramban Specifies the WLAN name. Step 4 client association limit maximum-clients-per-WLAN Configures the maximum number of clients that can be associated to the given WLAN. Example: Device(config-wlan)# client association limit 110 Step 5 client association limit ap Configures the maximum number of clients that max-clients-per-AP-per-WLAN can be associated to an AP in the WLAN. The Example: valid range is between 0 and 1200 clients. The default value is 0. Device(config-wlan)# client association limit ap 120 Note A Cisco Catalyst 9136 Series AP can support a maximum of 1200 clients. Step 6 client association limit radio Configures the maximum limit of clients that maximum-clients-per-AP-radio-per-WLAN(0--400) can be associated to an AP radio in the WLAN. Example: The valid range is between 0 to 400 clients. The default value is 200. Device(config-wlan)# client association limit radio 100 Note A Cisco Catalyst 9136 Series AP radio can support a maximum of 400 clients. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 578 Radio Resource Management Configuring Client Limit Per AP (GUI) Step 7 Step 8 Command or Action end Example: Device(config)# end show wlan id wlan-id Example: Device# show wlan id 2 Purpose Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Displays the current configuration of the WLAN and the corresponding client association limits. Configuring Client Limit Per AP (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Tags & Profiles > AP Join. Click Add. In the General tab, enter the name and description of the corresponding AP join profile. Click the Client tab. In the Maximum Client Limit field, enter the maximum client associations per AP. The valid values are between 0 and 1200. The default value is 0. Click Apply to Device. Configuring Client Limit Per AP (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap profile ap-profile-name Example: Device(config)# ap profile ap-profile-name Step 3 association-limit max-client-connections Example: Purpose Enters global configuration mode. Configures an AP profile and enters AP profile configuration mode. Configures the maximum client connections per AP. The default value is 0. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 579 Configuring Client Limit Per Radio (GUI) Radio Resource Management Command or Action Device(config-ap-profile)# association-limit 200 Step 4 end Example: Device(config)# end Purpose Note A Cisco Catalyst 9136 Series AP can support a maximum of 1200 clients. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Client Limit Per Radio (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > RF/Radio. In the RF tab, click the required RF profile name from the displayed list of RF profiles. The Edit RF Profile page is displayed. Click the Advanced tab. Under the High Density Parameters section, in the Max Clients field, enter the maximum number of client connections per AP radio. The valid range is between 0 and 400. The default value is 200 client connections. Click Update & Apply to Device. Configuring Client Limit Per Radio (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 {24ghz | 5ghz | 6ghz} rf-profile rf-profile-name Configures an RF profile and enters RF profile configuration mode. Example: Device(config)# ap dot11 6ghz rf-profile rf-profile-name Step 3 high-density clients count maximum-client-connections <0-400> Configures the maximum number of client connections per AP radio. The valid range is Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 580 Radio Resource Management Verifying Client Limit Step 4 Command or Action Purpose Example: between 0 and 400. The default value is 200 Device(config-rf-profile)# high-density client connections. clients count 200 Note A Cisco Catalyst 9136 Series AP radio can support a maximum of 400 clients. end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Verifying Client Limit To verify client limit in local mode, run the following command: Device# show wireless stats client delete reasons | sec Max Maximum client limit reached on AP :0 Maximum client limit reached on AP per wlan :0 Maximum client limit reached on AP radio per wlan : 0 Maximum client limit reached on AP radio :0 To verify client limit in the FlexConnect central authentication mode, run the following command: Device# show wireless stats client delete reasons | sec max AP limiting maximum client per AP :0 AP limiting maximum client per AP radio per wlan : 0 AP limiting maximum client per AP radio :0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 581 Verifying Client Limit Radio Resource Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 582 3 5 C H A P T E R IP Theft · Introduction to IP Theft, on page 583 · Configuring IP Theft (GUI), on page 584 · Configuring IP Theft, on page 584 · Configuring the IP Theft Exclusion Timer, on page 584 · Adding Static Entries for Wired Hosts, on page 585 · Verifying IP Theft Configuration, on page 586 Introduction to IP Theft The IP Theft feature prevents the usage of an IP address that is already assigned to another device. If the controller finds that two wireless clients are using the same IP address, it declares the client with lesser precedence binding as the IP thief and allows the other client to continue. If blocked list is enabled, the client is put on the exclusion list and thrown out. The IP Theft feature is enabled by default on the controller. The preference level of the clients (new and existing clients in the database) are also used to report IP theft. The preference level is a learning type or source of learning, such as Dynamic Host Configuration Protocol (DHCP), Address Resolution Protocol (ARP), data glean (looking at the IP data packet that shows what IP address the client is using), and so on. The wired clients always get a higher preference level. If a wireless client tries to steal the wired IP, that client is declared as a thief. The order of preference for IPv4 clients are: 1. DHCPv4 2. ARP 3. Data packets The order of preference for IPv6 clients are: 1. DHCPv6 2. NDP 3. Data packets Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 583 Configuring IP Theft (GUI) Radio Resource Management Note The static wired clients have a higher preference over DHCP. Configuring IP Theft (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Security > Wireless Protection Policies > Client Exclusion Policies. Check the IP Theft or IP Reuse check box. Click Apply. Configuring IP Theft Follow the procedure given below to configure the IP Theft feature: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless wps client-exclusion ip-theft Example: Device(config)# wireless wps client-exclusion ip-theft Purpose Enters global configuration mode. Configures the client exclusion policy. Configuring the IP Theft Exclusion Timer Follow the procedure given below to configure the IP theft exclusion timer: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 584 Radio Resource Management Adding Static Entries for Wired Hosts Step 2 Step 3 Command or Action Purpose wireless profile policy profile-policy Example: Configures a WLAN policy profile and enters wireless policy configuration mode. Device(config)# wireless profile policy default-policy-profile exclusionlist timeout time-in-seconds Example: Device(config-wireless-policy)# exclusionlist timeout 5 Specifies the timeout, in seconds. The valid range is from 0-2147483647. Enter zero (0) for no timeout. Adding Static Entries for Wired Hosts Follow the procedure given below to create static wired bindings: Note The statically configured wired bindings and locally configured SVI IP addresses have a higher precedence than DHCP. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 Use the first option to configure an IPv4 static Configures IPv4 or IPv6 static entry. entry or the second option to create an IPv6 static entry. · device-tracking binding vlan vlan-id ipv4-address interface gigabitEthernetge-intf-num hardware-or-mac-address · device-tracking binding vlan vlan-id ipv6-address interface gigabitEthernetge-intf-num hardware-or-mac-address Example: Device(config)# device-tracking binding vlan 20 20.20.20.5 interface gigabitEthernet 1 0000.1111.2222 Example: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 585 Verifying IP Theft Configuration Radio Resource Management Command or Action Purpose Device(config)# device-tracking binding vlan 20 2200:20:20::6 interface gigabitEthernet 1 0000.444.3333 Verifying IP Theft Configuration Use the following command to check if the IP Theft feature is enabled or not: Device# show wireless wps summary Client Exclusion Policy Excessive 802.11-association failures : Enabled Excessive 802.11-authentication failures: Enabled Excessive 802.1x-authentication : Enabled IP-theft : Enabled Excessive Web authentication failure : Enabled Cids Shun failure : Enabled Misconfiguration failure : Enabled Failed Qos Policy : Enabled Failed Epm : Enabled Use the following commands to view additional details about the IP Theft feature: Device# show wireless client summary Number of Local Clients: 1 MAC Address AP Name WLAN State Protocol Method Role ------------------------------------------------------------------------------------------- 000b.bbb1.0001 SimAP-1 2 Run 11a None Local Number of Excluded Clients: 1 MAC Address AP Name WLAN State Protocol Method ------------------------------------------------------------------------------------------- 10da.4320.cce9 charlie2 2 Excluded 11ac None Device# show wireless device-tracking database ip IP VLAN STATE DISCOVERY MAC ------------------------------------------------------------------------- 20.20.20.2 20 Reachable Local 001e.14cc.cbff 20.20.20.6 20 Reachable IPv4 DHCP 000b.bbb1.0001 Device# show wireless exclusionlist Excluded Clients MAC Address Description Exclusion Reason Time Remaining ----------------------------------------------------------------------------------------- 10da.4320.cce9 IP address theft 59 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 586 Radio Resource Management Verifying IP Theft Configuration Note Client exclusion timer deletes the entry from exclusion list with a granularity of 10 seconds. The entry is checked to retain or delete after every 10 seconds. There are chances that the running timer value for excluded clients might display negative values upto 10 seconds. Device# show wireless exclusionlist client mac 12da.4820.cce9 detail Client State : Excluded Client MAC Address : 12da.4820.cce9 Client IPv4 Address: 20.20.20.6 Client IPv6 Address: N/A Client Username: N/A Exclusion Reason : IP address theft Authentication Method : None Protocol: 802.11ac AP MAC Address : 58ac.780e.08f0 AP Name: charlie2 AP slot : 1 Wireless LAN Id : 2 Wireless LAN Name: mhe-ewlc VLAN Id : 20 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 587 Verifying IP Theft Configuration Radio Resource Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 588 3 6 C H A P T E R Unscheduled Automatic Power Save Delivery · Information About Unscheduled Automatic Power Save Delivery, on page 589 · Viewing Unscheduled Automatic Power Save Delivery (CLI), on page 589 Information About Unscheduled Automatic Power Save Delivery Unscheduled automatic power save delivery (U-APSD) is a QoS facility that is defined in IEEE 802.11e that extends the battery life of mobile clients. In addition to extending the battery life, this feature reduces the latency of traffic flow that is delivered over the wireless media. Because U-APSD does not require the client to poll each individual packet that is buffered at the access point, it allows delivery of multiple downlink packets by sending a single uplink trigger packet. U-APSD is enabled automatically when WMM is enabled. Viewing Unscheduled Automatic Power Save Delivery (CLI) Procedure show wireless client mac-address client_mac detail Example: Device# show wireless client mac-address 2B:5B:B3:18:56:E9 detail Output Policy State : Unknown Output Policy Source : Unknown WMM Support : Enabled U-APSD Support : Enabled U-APSD value : 15 APSD ACs : BK(T/D), BE, VI(T/D), VO(T/D) Power Save : OFF Current Rate : -------------------------BK : Background BE : Best Effort VI : Video VO : Voice. T: UAPSD Trigger Enabled Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 589 Viewing Unscheduled Automatic Power Save Delivery (CLI) D: UAPSD Delivery Enabled T/D : UAPSD Trigger and Delivery Enabled Show detailed information of a client by MAC address. Radio Resource Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 590 3 7 C H A P T E R Target Wake Time · Target Wake Time, on page 591 · Configuring Target Wake Time at the Radio Level (CLI), on page 592 · Configuring Target Wake Time on WLAN, on page 593 · Configuring Target Wake Time (GUI), on page 595 · Verifying Target Wakeup Time, on page 595 Target Wake Time The existing Wi-Fi client power-saving mechanisms have been in use since 802.11b, where the client devices sleep between AP beacons or multiple beacons, waking up only when they have data to transmit (they can transmit at any time, as AP does not sleep), and beacons containing the Delivery Traffic Indication Map (DTIM), a bit-map, indicates that the AP has downlink traffic buffered for transmission to particular clients. If a client has a DTIM bit set, it can retrieve data from the AP by sending a Power-Save Poll (PS-Poll) frame to the AP. This power-save scheme is effective but only allows clients to doze for a small beacon interval. Clients still need to wake up several times per second to read DTIM from the beacon frame of the AP. With 802.11e, the new power-saving mechanism was introduced that helps voice-capable Wi-Fi devices, as voice packets are transmitted at short time intervals, typically 20 ms/sec. Unscheduled automatic power-save delivery (U-APSD) allows a power-save client to sleep at intervals within a beacon period. AP buffers the downlink traffic until the client wakes up and requests its delivery. Note By default Target Wake Time (TWT) is disabled on the controller. To enable TWT, run the ap dot11 {24ghz | 5ghz| 6ghz} dot11ax twt-broadcast command. Extended Power-Savings Using Target Wake Time Target wake time (TWT) allows an AP to manage activity in the Wi-Fi network, in order to minimize medium contention between Stations (STAs), and to reduce the required amount of time that an STA in the power-save mode needs to be awake. This is achieved by allocating STAs to operate at non-overlapping times, and/or frequencies, and concentrate the frame exchanges in predefined service periods. TWT capable STA can either negotiate an individual TWT agreement with TWT-scheduling AP, or it can elect to be part or member of Broadcast TWT agreement existing on the AP. An STA does not need to be Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 591 Configuring Target Wake Time at the Radio Level (CLI) Radio Resource Management aware that a TWT service period (SP) can be used to exchange frames with other STAs. Frames transmitted during a TWT SP can be carried in any PPDU format supported by the pair of STAs that have established the TWT agreement corresponding to that TWT SP, including High Efficiency Multi-User Physical Protocol Data Unit (HE MU PPDU), High Efficiency Trigger-Based Physical Protocol Data Unit (HE TB PPDU), and so on. Following are the TWT Agreement Types: Individual TWT Single TWT session is negotiated between AP and an STA. This ensures a specific service period of DL and UL between AP and STA with expected traffic to be limited within the negotiated SP of 99% accuracy. The service period starts at specific offset from the target beacon transmission time (TBTT) and runs for the SP duration and repeats every SP interval. TWT Requesting STA communicates the Wake Scheduling information to its TWT responding AP, which then devises a schedule and delivers the TWT values to the TWT requesting STA when a TWT agreement has been established between them. Solicited TWT STA initiates the TWT session with the AP. Unsolicited TWT AP initiates TWT setup with STA. AP sends TWT response with service period which is accepted by STA. Broadcast TWT High-Efficiency AP requests the STA to participate in the broadcast TWT operation, either on-going broadcast SP or new SP. Configuring Target Wake Time at the Radio Level (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 {24ghz | 5ghz | 6ghz} shutdown Disables the 802.11a, 802.11b, or 802.11 6-GHz Example: network. Device(config)#ap dot11 24ghz shutdown Step 3 ap dot11 {24ghz | 5ghz| 6ghz} dot11ax Example: Device(conf)#ap dot11 24ghz dot11ax Configures the 802.11ax parameters. 802.11ax cannot be disabled on the 6-GHz band. Step 4 [no] ap dot11 {24ghz | 5ghz| 6ghz} dot11ax Configures 802.11 6-GHz dot11ax target target-wakeup-time wake-up time. Example: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 592 Radio Resource Management Configuring Target Wake Time on WLAN Step 5 Step 6 Step 7 Command or Action Device(config)#ap dot11 24ghz dot11ax target-wakeup-time Purpose [no] ap dot11 {24ghz | 5ghz| 6ghz} dot11ax Configures 802.11 6-GHz dot11ax target twt-broadcast wake-up time broadcast. Example: Device(config)#ap dot11 24ghz dot11ax twt-broadcast Note By default TWT is disabled on the controller. You can enable TWT by running this command. no ap dot11 {24ghz | 5ghz | 6ghz} shutdown Example: Enables the 802.11a or 802.11b network. Enables the 802.11a, 802.11b, or 802.11 6-GHz network. Device(config)#no ap dot11 24ghz shutdown show ap dot11 {24ghz | 5ghz| 6ghz} network Example: Device(config)#show ap dot11 24ghz network Displays the 802.11ax network configuration details, which includes information about Target Wakeup Time and Target Wakeup Broadcast. Configuring Target Wake Time on WLAN Enabling Target Wake Time on WLAN (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wlan wlan-profile Example: Device(config)# wlan wlan-profile Enters WLAN configuration submode. The wlan-profile is the profile name of the configured WLAN. Step 3 shutdown Example: Device(conf-wlan)#shutdown Disables the WLAN network Step 4 dot11ax target-waketime Configures target wake time mode on WLAN. Example: Device(conf-wlan)#dot11ax target-waketime Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 593 Disabling Target Wakeup Time on WLAN (CLI) Radio Resource Management Step 5 Step 6 Step 7 Command or Action dot11ax twt-broadcast-support Example: Device(conf-wlan)#dot11ax twt-broadcast-support no shutdown Example: Device(conf-wlan)#no shutdown show wlan {all | id | name | summary} Example: Device# show wlan all Device# show wlan id Device# show wlan name Purpose Configures the TWT broadcast support on WLAN. Enables WLAN. Displays the details of the configured WLAN, including Target Wakeup Time and Target Wakeup Time Broadcast. Disabling Target Wakeup Time on WLAN (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wlan profile-name Example: Device(config)# wlan wlan-profile Step 3 shutdown Example: Device(conf-wlan)#shutdown Step 4 no dot11ax target-waketime Example: Device(conf-wlan)#no dot11ax target-waketime Step 5 no dot11ax twt-broadcast-support Example: Device(conf-wlan)#no dot11ax twt-broadcast-support Purpose Enters global configuration mode. Enters WLAN configuration submode. The wlan-profile is the profile name of the configured WLAN. Disables the WLAN network Disables the target wake time mode on WLAN. Disables the TWT broadcast support on WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 594 Radio Resource Management Configuring Target Wake Time (GUI) Step 6 Command or Action no shutdown Example: Device(conf-wlan)#no shutdown Purpose Enables WLAN. Configuring Target Wake Time (GUI) Procedure Step 1 Step 2 Choose Configuration > Radio Configurations > Parameters. The parameters page is displayed where you can configure global parameters for 5 GHz Band and 2.4 GHz Band radios. In the 11ax Parameters section, check the Target Wakeup Time check box and the Target Wakeup Time Broadcast check box to configure target wakeup time and broadcast target wakeup time. Verifying Target Wakeup Time To verify Target Wakeup Time and Target Wakeup Time Broadcast, use the following command: show ap dot11 24ghz network The following is a sample output: Device#show ap dot11 24ghz network . . . 802.11ax Target Wakeup Time Target Wakeup Time Broadcast . . . : Enabled : Enabled : Enabled Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 595 Verifying Target Wakeup Time Radio Resource Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 596 3 8 C H A P T E R Enabling USB Port on Access Points · USB Port as Power Source for Access Points, on page 597 · Configuring an AP Profile (CLI), on page 598 · Configuring USB Settings for an Access Point (CLI), on page 599 · Configuring USB Settings for an Access Point (GUI), on page 599 · Monitoring USB Configurations for Access Points (CLI), on page 600 USB Port as Power Source for Access Points Some Cisco APs have a USB port that can act as a source of power for some USB devices. The power can be up to 2.5W; if a USB device draws more than 2.5W of power, the USB port shuts down automatically. The port is enabled when the power draw is 2.5W and lower. Refer to the datasheet of your AP to check if the AP has a USB port that can act as a source of power. Note Both IW6300 and ESW6300 APs have a USB port that can act as a source of power up to 4.5W for some USB devices. Note The controller records the last five power-overdrawn incidents in its logs. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 597 Configuring an AP Profile (CLI) Radio Resource Management Caution When unsupported USB device is connected to the Cisco AP, the following message is displayed: The inserted USB module is not a supported device. The behavior of this USB device and the impact to the Access Point is not guaranteed. If Cisco determines that a fault or defect can be isolated due to the use of third-party USB modules installed by a customer or reseller, Cisco may withhold support under warranty or support program under contract. In the course of providing support for Cisco networking products, the end user may be required to install Cisco-supported USB modules in the event Cisco determines that removing third-party parts will assist Cisco in diagnosing root cause for troubleshooting purposes. Cisco also reserves the right to charge the customer per then-current time and material rates for services provided to the customer when Cisco determines, after having provided such services, that an unsupported device caused the root cause of the defective product Configuring an AP Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap profile ap-profile Configures an AP profile and enters the AP Example: profile configuration mode. Device(config)# ap profile xyz-ap-profile Note When you delete a named profile, the APs associated with that profile will not revert to the default profile. Step 3 Step 4 usb-enable Example: Device(config-ap-profile)# usb-enable Enables USB for each AP profile. Note By default, the USB port on the AP is disabled. Use the no usb-enable command to disable USB for each AP profile. end Example: Device(config-ap-profile)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 598 Radio Resource Management Configuring USB Settings for an Access Point (CLI) Configuring USB Settings for an Access Point (CLI) Procedure Step 1 Command or Action enable Example: Device# enable Step 2 ap name ap-name usb-module Example: Device# ap name AP44d3.xy45.69a1 usb-module Step 3 ap name ap-name usb-module override Example: Device# ap name AP44d3.xy45.69a1 usb-module override Purpose Enters privileged EXEC mode. Enables the USB port on the AP. Use the ap name ap-name no usb-module command to disable the USB port on the AP. Note If you are using Cisco Catalyst 9105AXW AP and if you enable the USB port (.3at PoE-in), it is not possible to enable the USB PoE-out at the same time. Overrides USB status of the AP profile and considers the local AP configuration. Use the ap name ap-name no usb-module override command to override USB status of the AP and consider the AP profile configuration. Note You can configure the USB status for an AP only if you enable USB override for it. Configuring USB Settings for an Access Point (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Wireless > Access Points. In the Access Points window, click the name of the AP. In the Edit AP window, click the Interfaces tab. In the USB Settings section, configure the USB Module State as either of the following: · ENABLED: Enables the USB port on the AP · DISABLED: Disables the USB port on the AP Note If you are using Cisco Catalyst 9105AXW AP and if you enable the USB port (.3at PoE-in), it is not possible to enable the USB PoE-out at the same time. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 599 Monitoring USB Configurations for Access Points (CLI) Radio Resource Management Step 5 Step 6 Configure USB Override as either of the following: · ENABLED: Overrides USB status of the AP profile and considers the local AP configuration · DISABLED: Overrides USB status of the AP and considers the AP profile configuration Note You can configure the USB status for an AP only if you enable USB override for it. Click Apply & Update to Device. Monitoring USB Configurations for Access Points (CLI) · To view the inventory details of APs, use the following command: show ap name ap-name inventory The following is a sample output: Device# show ap name AP500F.8059.1620 inventory NAME: AP2800 , DESCR: Cisco Aironet 2800 Series (IEEE 802.11ac) Access Point PID: AIR-AP2802I-D-K9 , VID: 01, SN: XXX1111Y2ZZZZ2800 NAME: SanDisk , DESCR: Cruzer Blade PID: SanDisk , SN: XXXX1110010, MaxPower: 224 · To view the summary of an AP module, use the following command: show ap module summary The following is a sample output: Device# show ap module summary AP Name External Module External Module PID External Module Description ---------------------------------------------------------------------------------------------- AP500F.1111.2222 Enable SanDisk Cruzer Blade · To view the USB configuration details for each AP, use the following command: show ap name ap-name config general The following is a sample output: Device# show ap name AP500F.111.2222 config general . . . USB Module Type.................................. USB Module USB Module Status................................ Disabled USB Module Operational State..................... Enabled USB Override ................................... Enabled · To view status of the USB module, use the following command: show ap profile name xyz detailed The following is a sample output: Device# show ap profile name xyz detailed USB Module : ENABLED Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 600 3 9 C H A P T E R Dynamic Frequency Selection · Feature History for Channel Availability Check (CAC), on page 601 · Information About Dynamic Frequency Selection, on page 601 · Information About Channel Availability Check (CAC), on page 602 · Verifying DFS, on page 602 · Information About Zero Wait Dynamic Frequency Selection, on page 603 · Configuring Zero Wait Dynamic Frequency Selection Globally (CLI), on page 603 · Configuring Zero Wait Dynamic Frequency Selection Globally (GUI), on page 603 · Enabling Zero Wait Dynamic Frequency Selection on a RF Profile (CLI), on page 604 · Enabling Zero Wait Dynamic Frequency Selection on a RF Profile (GUI), on page 604 · Verifying Zero Wait Dynamic Frequency Selection Configuration, on page 605 Feature History for Channel Availability Check (CAC) This table provides release and related information for features explained in this module. These features are available on all releases subsequent to the one they were introduced in, unless noted otherwise. Table 47: Feature History for Channel Availability Check (CAC) Release Cisco IOS XE Bengaluru 17.5.1 Feature Channel Availability Check (CAC) Feature Information When a DFS channel is selected for an AP radio, the AP radio scans the channel to check for any radar signals before transmitting any frames in the DFS frequency. This process is called Channel Availability Check (CAC). Information About Dynamic Frequency Selection Dynamic Frequency Selection (DFS) is the process of detecting radar signals and automatically setting the frequency on a DFS-enabled 5.0-GHz (802.11a/h) radio to avoid interference with the radar signals. Radios configured for use in a regulatory domain must not interfere with radar systems. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 601 Information About Channel Availability Check (CAC) Radio Resource Management In normal DFS, when a radar signal is detected on any of the channels in the 40-MHz or 80-MHz bandwidth, the whole channel is blocked. With Flex DFS, if the radar signals are not detected on the secondary channel, the AP is moved to a secondary channel with a reduction in the bandwidth, usually, by half. Information About Channel Availability Check (CAC) When a DFS channel is selected for an AP radio, the AP radio scans the channel to check for any radar signals before transmitting any frames in the DFS frequency. This process is called Channel Availability Check (CAC). Note CAC is executed before you set a DFS channel for the radio. If the AP detects that a radar is using a specific DFS channel, the AP marks the channel as non-available and excludes it from the list of available channels. This state lasts for 30 minutes after which the AP checks again to see, if the channel can be used for WiFi transmissions. Note The CAC performed during a boot process takes anywhere between 1 and 10 minutes depending on the country. This is the reason as to why the DFS channels are not available immediately when an AP reboots. Verifying DFS Use the following commands to verify the DFS configuration: To display the 802.11h configuration, use the following command: Device# show wireless dot11h To display the auto-rF information for 802.11h configuration, use the following command: Device# show ap auto-rf dot11 5ghz To display the auto-rF information for a Cisco AP, use the following command: Device# show ap name ap1 auto-rf dot11 5gh To display the channel details for a Cisco AP, use the following command: Device# show ap dot11 5ghz summary AP Name Mac Address Slot Admin State Oper State Width Txpwr Channel ----------------------------------------------------------------------------------------------------------------------pnp-ap 04eb.409e.b560 1 Enabled Up 40 *8/8 (3 dBm) (52,56) BLDG1-9130-RACK-1568 04eb.409f.11a0 1 Disabled Down 40 4/8 (15 dBm) (100,104)# Note In the show command, # is added right next to the channel whenever CAC is running on an AP radio. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 602 Radio Resource Management Information About Zero Wait Dynamic Frequency Selection Information About Zero Wait Dynamic Frequency Selection Access points (APs) monitor and perform Channel Availability Check (CAC) on a potential channel for 60 seconds when AP moves to Dynamic Frequency Selection (DFS) channels. Further, the AP ensures that there is no radar operating in the same frequency range before advertising beacons and serving clients. When the AP moves to a DFS, there is a service outage for a minute. This outage can be higher and extend up to 10 minutes. The Zero Wait Dynamic Frequency Selection feature helps to avoid the service outage in regulatory domains. As of now, U.S. and Europe are the only supported domains. Configuring Zero Wait Dynamic Frequency Selection Globally (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 5ghz rrm channel zero-wait-dfs Enables the Zero Wait Dynamic Frequency Example: Selection feature. By default, the feature is disabled. Device(config)# ap dot11 5ghz rrm channel zero-wait-dfs Use the no form of this command to disable the feature. Note Tthe Zero Wait Dynamic Frequency Selection feature is only available on a 5-GHz radio. Configuring Zero Wait Dynamic Frequency Selection Globally (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Radio Configurations > RRM. In the RRM page, click the 5 GHz Band tab. Click the DCA tab. Select the Zero Wait DFS check box to allow the AP to change to DFS without a service outage. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 603 Enabling Zero Wait Dynamic Frequency Selection on a RF Profile (CLI) Radio Resource Management Step 5 Click Apply. Enabling Zero Wait Dynamic Frequency Selection on a RF Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 5ghz rf-profile profile-name Example: Configures a radio frequency (RF) profile and enters RF profile configuration mode. Device(config)# ap dot11 5ghz rf-profile test-dfs Step 3 channel zero-wait-dfs Example: Device(config-rf-profile)# channel zero-wait-dfs Enables the Zero Wait Dynamic Frequency Selection feature for the RF profile. Use the no form of this command to disable the feature. Enabling Zero Wait Dynamic Frequency Selection on a RF Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Choose Configuration > Tags & Profiles > RF/Radio. In the RF tab, click Add. The Add RF Profile page is displayed. Enter the name for the RF profile. From the Radio Band drop-down, choose the 5 GHz band. Click the RRM tab. Click the DCA tab. Select the Zero Wait DFS check box to allow the AP to change to DFS without a service outage. Click Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 604 Radio Resource Management Verifying Zero Wait Dynamic Frequency Selection Configuration Verifying Zero Wait Dynamic Frequency Selection Configuration Use the following commands to verify the DFS configuration. To display the Zero Wait DFS configuration on an AP, use the following command: Device# show ap name ap1 config slot 1 | inc Zero Zero Wait DFS Parameters Zero Wait DFS Capable CAC Domain : Yes : None To display the global configuration related to the Zero Wait Dynamic Frequency Selection feature, use the following command: Device# show ap dot11 5ghz channel | inc Zero Zero Wait DFS Parameters Zero Wait DFS Capable CAC Domain : Yes : None To display the RF profile configuration related to the Zero Wait Dynamic Frequency Selection feature, use the following command: Device# show ap rf-profile name test detail | sec Zero Description RF Profile Name Band Transmit Power Threshold v1 Min Transmit Power Max Transmit Power . . . Guard Interval Zero Wait DFS : : test : 5 GHz : -70 dBm : -10 dBm : 30 dBm : default : Enabled Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 605 Verifying Zero Wait Dynamic Frequency Selection Configuration Radio Resource Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 606 4 0 C H A P T E R Cisco Access Points with Tri-Radio · Cisco Access Points with Tri-Radio, on page 607 · Guidelines and Restrictions for Tri-Radio Access Points, on page 609 · Configuring Tri-Radio, on page 609 Cisco Access Points with Tri-Radio This topic describes the Tri-Radio feature for Cisco Access Points (APs). Access Points with three radios are designed for high density environments. The APs by default run one dedicated 2.4-GHz 4x4 mode radio and one 5-GHz 8x8 mode radio. In the default mode, the radios are managed by the Flexible Radio Assignment (FRA), and the Dual Radio Mode is in the disabled state indicating that the radios have either been assigned as client serving 8x8 radio or have not yet been evaluated by FRA. When you enable the dual radio mode setting, the 8x8 radio is split to two independent 5-GHz 4x4 radios. In this mode, slot 1 and slot 2 are active independent 4x4 radio interfaces. They can serve different user groups with different assigned channels. Note To disable the dual radio mode, you must first disable the admin status of the subordinate radio. Otherwise, a warning message is displayed. A tri-radio AP has upto two configurable 5-GHz radios. The following table describes the radio role and its deployment benefits: Table 48: 5-GHz Radio Operational Modes and Criteria Radio Role Radio 1 8x8 Client-Serving Radio 2 None Driving Factors · Preferred operation: 160 MHz or 80 + 80 MHz · Higher MU-MIMO stations · Required higher number of Spatial Streams (SS) Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 607 Cisco Access Points with Tri-Radio Radio Resource Management Radio Role Radio 1 4x4 Client-Serving 4x4 Client-Serving Radio 2 4x4 Client-Serving 4x4 Monitor Driving Factors · Preferred operation: 80 MHz or below · High Capacity in low or medium density · Directional antenna units (Coverage Slicing) · Preferred operation: 80 MHz or below · Lower MU-MIMO stations · Better channel reuse in high density · Monitoring application requires 4x4 Rx The following table lists the different radio modes and roles supported by the AP: Table 49: Tri-Radio AP Radio Configuration Setup 1 2 3 Radio Mode 2.4-GHz + 5-GHz 2.4-GHz + 5-GHz 2.4-GHz + 5-GHz + 5-GHz Maximum Radio Capability Dual Role Mode 2.4-GHz, 4 antennas, 4SS, Disabled and 20 MHz 5-GHz, 8 antennas, 4SS, and 160 MHz 2.4-GHz, 4 antennas, 4SS, Disabled and 20 MHz 5-GHz, 8 antennas, 8SS, and 80 MHz 2.4-GHz, 4 antennas, 4SS, Enabled and 20 MHz 5-GHz, 4 antennas, 4SS, and 80 MHz 5-GHz, 4 antennas, 4SS, and 80 MHz In the Cisco IOS XE 17.2.1 Release, FRA manages the role assignment for each radio independently. You can set the radio mode as automatic or manual, and select either Client-Serving role or Monitor role as the Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 608 Radio Resource Management Guidelines and Restrictions for Tri-Radio Access Points radio role. Based on the dual radio mode configuration, the role selection is available for one or for both interfaces. Guidelines and Restrictions for Tri-Radio Access Points · Dual radio mode is set to Auto by default. FRA manages the dual radio mode in Auto mode. · The tri-radio support for AP with external antenna is as follows: · RP-TNC antenna is supported in Cisco Catalyst 9130AX Series APs. · The C-ANT9101, C-ANT9102, and C-ANT9103 antennas on Cisco Catalyst 9130AX Series APs support 2 radios (2.4-GHz (4x4) and 5-GHz (8x8)). This antennas does not support two 5-GHz (4x4) radios due to hardware limitation. · From Cisco IOS XE Cupertino 17.7.x, the Tri-Radio feature is supported in Cisco Catalyst 9124 Series APs. Configuring Tri-Radio Configuring Tri-Radio for AP (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Radio Configurations > Network. The Network > 5 GHz Radios page is displayed. In the General tab, select the Tri-Radio Mode check box to enable the Tri-Radio mode. Click Apply Configuring the Tri-Radio (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 609 Configuring 5-GHz Dual Radio Mode for AP (GUI) Radio Resource Management Step 2 Command or Action [no] ap tri-radio Example: Device(config)# ap tri-radio Purpose Configures all supporting tri-radio AP's dual radio role in auto mode. Use the [no] form of the command to disable the feature. Configuring 5-GHz Dual Radio Mode for AP (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Wireless > Access Points. On the Access Points page, click the 5 GHz Radios section and select a Cisco 9130 Series AP from the list. The Edit Radios 5 GHz Band window is displayed. In the Edit Radios 5-GHz Band > Configure > General tab, under Dual Radio Mode, select one from the following radio button options · Auto: Permits FRA to decide the mode for this AP. · Enabled: Enables Dual Radio mode for this AP. · Disabled: Disables Dual Radio mode for this AP. Click Update & Apply to Device. Configuring the Dual Radio Mode and Enabling Slots (CLI) Procedure Step 1 Command or Action Purpose ap name ap-name dot11 5ghz slot {1 | 2 } (Optional) Disables the 802.11a radio on Cisco shutdown AP. Example: Device# ap name ap-name dot11 5ghz slot 1 shutdown Step 2 ap name ap-name dot11 5ghz slot 1 Configures the 802.11a dual and tri-radio on dual-radio mode { disable | enable| auto the AP. Enable auto to allow RRM to switch } the AP between dual radio or tri radio mode Example: based on the channel width configuration. In auto mode, the slot 2 state is managed by the Device# ap name ap-name dot11 5ghz slot RRM. Use the disable keyword to disable the 1 dual-radio mode enable dual-radio. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 610 Radio Resource Management Setting Radio Roles for Slots (CLI) Step 3 Command or Action Purpose Note When the AP is set to auto mode, the dual radio mode is disabled by default. ap name ap-name no dot11 5ghz slot {1 | 2 Enables the 802.11a radio on Cisco AP. } shutdown Example: Device# ap name ap-name no dot11 5ghz slot 1 shutdown Setting Radio Roles for Slots (CLI) Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. Step 2 ap name ap-name dot11 { 24ghz | 5ghz | 6ghz } slot <slot ID> radio role {auto | manual {monitor | client-serving}} Sets the radio role manual to either client serving or monitor. Example: Device# ap name ap-name dot11 5ghz slot 2 radio role manual monitor Configuring the Tri-Radio Dual Radio Role (CLI) Procedure Step 1 Command or Action Purpose ap name ap-name dot11 5ghz slot {1 | 2 } radio role {auto| manual {client-serving | monitor} Example: Configures the 802.11a radio role independently for each supporting AP's radio. The channel and the Tx power values can be configured when the radio role is set to manual mode. Device# ap name 9130axtrial dot11 5ghz slot 1 radio role manual monitor Step 2 ap name ap-name dot11 24ghz slot 0 radio role {auto| manual {client-serving | monitor} Example: Configures the 802.11b radio role independently for the supporting AP's radio. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 611 Verifying Tri-Radio Configuration on the Controller Radio Resource Management Command or Action Purpose Device# ap name 9130axtrial dot11 24ghz slot 0 radio role manual client-serving Verifying Tri-Radio Configuration on the Controller To verify that the dual radio mode is enabled, use the following show command: · Device# show ap name APXXXX.4XXX.04XX config slot 1 | inc Dual Dual Radio Capable : True Dual Radio Mode : Enabled Dual Radio Operation mode : Auto To verify that the slots are enabled and up, use the following show commands: · Device# show ap triradio summary AP Name Mac Address Slot Admin State Oper State ----------------------------------------------------------------------------------------- APXXXX.4XXX.04XX 04eb.409e.89c0 2 Enabled Up · Device# show ap dot11 5ghz summary AP Name Mac Address Slot Admin State Oper State Width Txpwr Channel Mode --------------------------------------------------------------------------------------------------------------------------------------------------------- APXXXX.4XXX.04XX 04XX.40XX.8XXX 1 Enabled Up 20 *5/8 (14 dBm) (36)* Local APXXXX.4XXX.04XX 04XX.40XX.8XXX 2 Enabled Up 20 *8/8 (1 dBm) (36)* To verify that the radio role is set, use the following show command: · show ap name ap-name config slot <slot_number> | i Radio Radio Type : 802.11ax - 5 GHz Radio Subband : All Radio Role : Auto Radio Mode : Local Radio SubType : Main Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 612 4 1 C H A P T E R Cisco DNA Center Assurance Wi-Fi 6 Dashboard · Cisco DNA Center Assurance Wi-Fi 6 Dashboard, on page 613 · Configuring Cisco DNA Center Assurance Wi-Fi 6 Dashboard Parameters (CLI), on page 614 · Verifying AP DFS Counters (CLI), on page 615 · Verifying Wi-Fi 6 Access Point Parameters, on page 616 Cisco DNA Center Assurance Wi-Fi 6 Dashboard Note We recommend you manage this feature using the Cisco DNA-Center UI. The procedures are to be executed with for debugging purposes only. The Cisco DNA Center Assurance Wi-Fi 6 Dashboard provides a visual representation of your wireless network. The dashboard contains various dashlets which show you the Wi-Fi 6 Readiness, and the efficiency of the Wi-Fi 6 networks compared to non-Wi-Fi 6 networks. For more information, see the Monitor Wi-Fi 6 Readiness section in the Cisco DNA Assurance User Guide. · Client Distribution by Capability: This dashlet shows all the clients associated and their capability in the wireless network. The inner circle shows the wireless protocol capabilities of all the different clients in the network. Capability here is the ability of wireless clients to associate with Wi-Fi 6 APs or non-Wi-fi 6 APs. The outer arc segment shows how many 802.11ax capable clients are joined to a Wi-Fi 6 network as well as how many of them are not. · Wi-Fi 6 Network Readiness: This dashlet shows all the APs in the network. The inner circle shows the APs which are Wi-Fi 6 APs and non Wi-Fi 6 APs. The outer arc segment shows the number of Wi-Fi 6 enabled AP in the network. · AP Distribution by Protocol: This dashlet shows the protocols enabled on your APs in real time. · Wireless Airtime Efficiency: This dashlet compares and displays the Airtime Efficiency between your Wi-Fi 6 network and Non-Wi-Fi 6 network for each of the access categories (voice, video, best effort, background). The spectrum is efficiently utilized if the AP's radios can send more traffic (successful bytes transmitted to the client) in less airtime (microseconds) than other networks under similar RF conditions. · Wireless Latency by Client Count: This Dashlet compares the Wireless Latency between your Wi-Fi 6 and Non-Wi-Fi 6 Network for each of the access categories (voice, video, best effort, background). Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 613 Configuring Cisco DNA Center Assurance Wi-Fi 6 Dashboard Parameters (CLI) Radio Resource Management Wireless latency is measured by the time (microseconds) it takes for a packet to be successfully transmitted from an AP to the client. Hence, AP radios with a higher client count generally have higher latency than compared to those with a lower client count under similar RF conditions. Note Client count in this dashlet refers to the clients that are actively sending traffic for a given Access Category and are not just associated clients. Configuring Cisco DNA Center Assurance Wi-Fi 6 Dashboard Parameters (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap profile profile-name Example: Device(config)# ap profile pp-1 Enables configuration for all the APs that are associated with the specified AP profile name. Step 3 statistics traffic-distribution Example: Device(config-ap-profile)#statistics traffic-distribution Enables traffic distribution feature with the specified AP profile. Step 4 statistics traffic-distribution interval interval-secs Example: Device(config-ap-profile)#statistics traffic-distribution interval 300 Configures the interval at which the AP sends the traffic distribution statistics. Default value is 300 seconds. Valid range is between 30 and 3600 seconds. Note Execute this command only with the assistance from Cisco Technical Assistance Center (TAC) support engineer. Step 5 end Example: Device(config-ap-profile)#exit Returns to privileged EXEC mode. Step 6 show wireless stats ap name ap-name Displays traffic distribution data by signal traffic-distribution slot slot-id packet-count strength, if received from the AP in the latest signal {average| good | poor} statistics update interval. Use last-received [last-received] Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 614 Radio Resource Management Verifying AP DFS Counters (CLI) Step 7 Step 8 Step 9 Command or Action Purpose Example: keyword to view the statistics received in any Device#show wireless stats ap name ff123a statistics update interval from the AP. traffic-distribution slot 1 packet-count signal good show wireless stats ap name ap-name Displays the Airtime efficiency data based on traffic-distribution slot slot-id airtime access category, if received from the AP in the access-category {background | best-effort | latest statistics update interval. Use video |voice} [last-received] last-received keyword to view the statistics Example: received in any statistics update interval from the AP. Device#show wireless stats ap name ff123a traffic-distribution slot 1 airtime access-category best-effort show wireless stats ap name ap-name traffic-distribution slot slot-id airtime traffic-type {legacy | mu | ofdma | su} [last-received] Example: Displays the Airtime efficiency data based on traffic type, if received from the AP in the latest statistics update interval. Use last-received keyword to view the statistics received in any statistics update interval from the AP. Device#show wireless stats ap name ff123a traffic-distribution slot 1 traffic-type ofdma show wireless stats ap name ap-name traffic-distribution slot slot-id latency access-category {background | best-effort | video | voice} [last-received] Example: Displays wireless latency data based on access category, if received from the AP in the latest statistics update interval. Use last-received keyword to view the statistics received in any statistics update interval from the AP. Device#show wireless stats ap name ff123a traffic-distribution slot 1 latency access-category best-effort Verifying AP DFS Counters (CLI) Procedure · To verify the DFS counter for the selected radio band, use the following command: show ap auto-rf dot11 {24ghz | 5ghz | dual-band} ] Example: Device#show ap auto-rf dot11 dual-band · To verify the DFS counter for the selected radio band of a specific AP, use the following command: show ap name ap-name auto-rf dot11 {24ghz | dual-band} Example: Device#show ap name ff32a auto-rf dot11 dual-band Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 615 Verifying Wi-Fi 6 Access Point Parameters Radio Resource Management · To verify the DFS counter for the selected 5-GHz slot of a specific AP, use the following command: show ap name ap-name auto-rf dot11 5ghz slot slot-id Example: Device#show ap name ff32a auto-rf dot11 5ghz slot 1 Verifying Wi-Fi 6 Access Point Parameters Enter these commands in the AP console. · To verify the traffic distribution statistics configuration, use the following command: show ap traffic distribution configuration · To verify the exported data from the AP to the controller, use the following command: show interfaces dot11Radio slot-id traffic distribution {cumulative | instantaneous | periodic} database · To verify Access Point DFS counters, use the following command: show interfaces dot11radio slot-iddfs · To debug the traffic distribution statistics, use the following command: {no} debug traffic wireless distribution dump {periodic | aggregated} · To clear the traffic distribution dump, use the following command: clear traffic distribution dump Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 616 4 2 C H A P T E R Antenna Disconnection Detection · Feature History for Antenna Disconnection Detection, on page 617 · Information About Antenna Disconnection Detection, on page 617 · Recommendations and Limitations, on page 618 · Configuring Antenna Disconnection Detection (CLI), on page 618 · Configuring Antenna Disconnection Detection (GUI), on page 619 · Detecting Broken Antenna Using SNMP Trap (CLI), on page 620 · Detecting Broken Antenna Using SNMP Trap (GUI), on page 620 · Verifying Antenna Disconnection Detection, on page 621 · Verifying Antenna Disconnection Detection (GUI), on page 622 Feature History for Antenna Disconnection Detection This table provides release and related information for the features explained in this module. These features are available in all releases subsequent to the one they were introduced in, unless noted otherwise. Release Feature Feature Information Cisco IOS XE Bengaluru 17.4.1 Antenna Disconnection This feature detects the signal strength delta across the Detection antennas on the receiver. If the delta is more than the defined limit for a specific duration, the corresponding antenna is considered to have issues. Information About Antenna Disconnection Detection Having multiple antennas on the transmitter and receiver of an access point (AP) results in better performance and reliability. Multiple antennas improve reception through the selection of the stronger signal or a combination of individual signals at the receiver. Therefore, detection of an impaired antenna or physical breakage of an antenna is critical to the reliability of APs. The Antenna Disconnection Detection feature is based on the signal strength delta across the antennas on the receiver. If the delta is more than the defined limit for a specific duration, the antenna is considered to have issues. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 617 Recommendations and Limitations Radio Resource Management For every detection time period that you configure, the AP sends an Inter-Access Point Protocol (IAPP) message that carries the antenna condition. This message is sent only once when the issue is detected and is displayed in the controller trap messages, SNMP traps, and controller debug logs. Configuration Workflow 1. Configure APs. 2. Configure an AP profile. 3. Enable the feature in AP profile. 4. Configure feature parameters. 5. Verify the configuration. Recommendations and Limitations · The feature is supported only on the following APs: · Cisco Catalyst 9120AX Series Access Points · Cisco Catalyst 9130AX Series Access Points · Cisco Aironet 2800e Access Points · Cisco Aironet 3800e Access Points · The SNMP trap is not supported on the Cisco Embedded Wireless Controller. · The IAPP message is sent only when there is a change in the error condition. Configuring Antenna Disconnection Detection (CLI) Antenna disconnection detection works by comparing the received signal strength intensity (RSSI) of each antenna with the antenna receiving the higher RSSI. If the delta is higher than the RSSI failure threshold, the corresponding antenna is declared as broken. The weak-rssi is an absolute RSSI threshold value, expressed in dBm. If the antennas detect a lower RSSI value than the one configured in weak-rssi, all the antennas are reported as malfunctioning. The RSSI failure threshold is evaluated only if an antenna detects a signal over the weak-rssi value. Follow the procedure given below to configure antenna disconnection detection: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 618 Radio Resource Management Configuring Antenna Disconnection Detection (GUI) Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Command or Action Purpose ap profile ap-profile Example: Configures an AP profile and enters AP profile configuration mode. Device(config)# ap profile xyz-ap-profile antenna monitoring Example: Device(config-ap-profile)# antenna monitoring Enables antenna disconnection detection. To disable antenna disconnection detection, use the no antenna monitoring command. antenna monitoring rssi-failure-threshold threshold-value Example: Device(config-ap-profile)# antenna monitoring rssi-failure-threshold 20 Configures RSSI failure threshold value, in dB. Valid values range from 10 to 90, with a default of 40. antenna monitoring weak-rssi weak-rssi-value Configures weak RSSI value, in dBm. Valid Example: values range from -90 to -10, with a default of 60. Device(config-ap-profile)# antenna monitoring weak-rssi -90 antenna monitoring detection-time detect-time-in-mins Example: Device(config-ap-profile)# antenna monitoring detection-time 20 Configures the antenna disconnection detection time, in minutes. Valid values range from 9 to 180, with a default of 120. end Example: Device(config-ap-profile)# end Saves the configuration and returns to privileged EXEC mode. Configuring Antenna Disconnection Detection (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > AP Join. In the AP Join Profile window, click the General tab. In the Antenna Monitoring check box to enable antenna monitoring. In the RSSI Fail Threshold(dB) field, enter a value, in dB. Valid values range from 10 to 90, with a default of 40. In the Weak RSSI(dBm) field, enter a value, in dBm. Valid values range from -90 to -10, with a default of 60. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 619 Detecting Broken Antenna Using SNMP Trap (CLI) Radio Resource Management Step 6 Step 7 In the Detection Time(min) field, enter the antenna disconnection detection time, in minutes. Valid values range from 9 to 180, with a default of 120. Click Update & Apply to Device. Detecting Broken Antenna Using SNMP Trap (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 snmp-server enable traps Example: Enables all the SNMP notification types that are available on the system. Device(config)# snmp-server enable traps Step 3 trapflags ap broken-antenna Example: Device(config)# trapflags ap broken-antenna Enables an SNMP trap, which will be sent when an antenna fails in any Cisco AP. Step 4 end Example: Device(config)# end Returns to privileged EXEC mode. Detecting Broken Antenna Using SNMP Trap (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Administration > Management > SNMP. Click the Wireless Traps tab. Set the Access Point status as Enabled, if not done already. Check the Broken Antenna check box to enable the trap. Click Apply. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 620 Radio Resource Management Verifying Antenna Disconnection Detection Verifying Antenna Disconnection Detection To verify the Antenna Disconnection Detection feature configuration on an AP, use the following command: Device# show ap name 3800-AP config general Cisco AP Name: 3800-AP ================================================= Cisco AP Identifier Country Code Regulatory Domain Allowed by Country AP Country Code AP Regulatory Domain Slot 0 Slot 1 MAC Address IP Address Configuration IP Address IP Netmask Gateway IP Address Fallback IP Address Being Used Domain Name Server CAPWAP Path MTU Capwap Active Window Size : f4db.e632.df40 : Multiple Countries : US,IN,CN,CU : 802.11bg:-ACE 802.11a:-ABCDHN : CN - China : -E : -C : f4db.e62f.165a : DHCP : 9.9.33.3 : 255.255.255.0 : 9.9.33.1 : : : : 1485 :1 . . . AP broken antenna detection RSSI threshold Weak RSSI Detection Time : Enabled : 40 : -80 : 120 . . . To verify the Antenna Disconnection Detection feature configuration on an AP profile, use the following command: Device# show ap profile name rf-profile-24g detailed AP Profile Name: rf-profile-24g . . . AP broken antenna detection: Status RSSI threshold Weak RSSI Detection Time : ENABLED : 40 : -80 : 120 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 621 Verifying Antenna Disconnection Detection (GUI) Radio Resource Management Verifying Antenna Disconnection Detection (GUI) Procedure Step 1 Step 2 Step 3 Choose Monitoring > Wireless > AP Statistics. Click an AP name or anywhere on the row corresponding to an AP in order to activate General window. Click the 360 View tab. The 360 View tab is the default selection. The Antenna Monitoring field indicates whether the AP supports monitoring or not. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 622 4 3 C H A P T E R Neighbor Discovery Protocol Mode on Access Points · Information About Neighbor Discovery Protocol Mode, on page 623 · Configuring RRM Neighbor Discovery Mode (GUI), on page 624 · Configuring the Neighbor Discovery Protocol Mode (CLI), on page 624 · Configuring the Neighbor Discovery Protocol Type (CLI), on page 624 · Configuring Neighbor Discovery Protocol Mode in the RF Profile (GUI), on page 625 · Configuring Neighbor Discovery Protocol Mode in the RF Profile (CLI), on page 625 · Monitoring Radio Statistics-NDP Capability and NDP Mode (GUI) , on page 626 · Verifying Neighbor Discovery Protocol Mode, on page 627 Information About Neighbor Discovery Protocol Mode In Cisco Catalyst 9124AX outdoor Access Points, the Neighbor Discovery Protocol (NDP) packets are transmitted either ON-channel on the serving radio, or OFF-channel on the RF ASIC conventional radio. The controller has a knob to select the NDP mode for Cisco Catalyst 9124AX outdoor APs based on the deployment requirements. In Cisco IOS XE Bengaluru 17.5.1, Cisco Catalyst 9124AX outdoor APs support both ON-Channel and OFF-Channel NDP mode. The Cisco Catalyst 9124AX outdoor AP advertises the following NDP mode capabilities while joining the controller: · ON-Channel (Serving channel) · OFF-Channel (RF ASIC radio) · Both (Serving channel and RF ASIC radio) The supported values for NDP mode are AUTO and OFF-Channel. By default, the NDP mode is set to AUTO. If the configured NDP mode is AUTO, the AP determines which NDP mode is to be used. The Cisco Catalyst 9124AX outdoor AP uses ON-Channel when the controller is configured for AUTO NDP mode. If the NDP mode that is configured is OFF-Channel, the AP uses OFF-Channel for NDP mode. Use Cases You must configure the controller NDP mode to OFF-channel in order to support brownfield deployment. A brownfield deployment refers to the mixed deployment of Cisco Catalyst 9124AX with other APs that do not Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 623 Configuring RRM Neighbor Discovery Mode (GUI) Radio Resource Management support RF ASIC conventional radio. APs that support RF ASIC conventional radio are Cisco Catalyst 9120 Series Access Points, Cisco Catalyst 9130 Series Access Points, and Cisco Catalyst 9124 Series Access Points. Configuring RRM Neighbor Discovery Mode (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Radio Configurations > RRM. In the Radio Resource Management window, click either the 5 GHz Band or the 2.4 GHz Band tab. In the General tab, under the Noise/Interference/Rogue/CleanAir/SI Monitoring Channels section, click the RRM Neighbour Discovery Mode toggle button to configure either of the following modes: · AUTO: If the NDP mode that is configured is AUTO, the controller selects ON-Channel as the NDP mode. (The default is set as AUTO). · OFF-CHANNEL: If the NDP mode configured is OFF-CHANNEL, the controller selects OFF-CHANNEL as the NDP mode. Click Apply. Configuring the Neighbor Discovery Protocol Mode (CLI) To configure the NDP mode for an AP, follow these steps: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 {24ghz | 5ghz} rrm ndp-mode {auto Configures the operating mode for 802.11a | off-channel} neighbor discovery. The Off-channel command Example: Device(config)# ap dot11 24ghz rrm enables NDP packets on the RF ASIC radio and the auto command enables the auto mode. ndp-mode off-channel Configuring the Neighbor Discovery Protocol Type (CLI) To configure the NDP type for an AP , follow these steps: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 624 Radio Resource Management Configuring Neighbor Discovery Protocol Mode in the RF Profile (GUI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 {24ghz | 5ghz | 6ghz} rrm ndp-type Configures the NDP type for 802.11a, 802.11b, {protected | transparent} or 802.11 6-GHz neighbor discovery. The two Example: types are protected and transparent. Device(config)# ap dot11 6ghz rrm ndp-type Configuring Neighbor Discovery Protocol Mode in the RF Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > RF. Click Add. The Add RF Profile window is displayed. Click the General tab. Click the NDP Mode toggle button to select the NDP mode as AUTO or as OFF-CHANNEL. Click Apply to Device. Configuring Neighbor Discovery Protocol Mode in the RF Profile (CLI) To configure the NDP mode for an AP under the RF profile, follow these steps: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap dot11 {24ghz | 5ghz | 6ghz} rf-profile rf-profile-name Purpose Enters global configuration mode. Enters the RF profile configuration. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 625 Monitoring Radio Statistics-NDP Capability and NDP Mode (GUI) Radio Resource Management Step 3 Command or Action Purpose Example: Device(config)# ap dot11 24ghz rf-profile rf-profile-name ndp-mode {auto | off-channel} Example: Device(config-rf-profile)# ndp-mode off-channel Configures the operating mode for neighbor discovery. Off-channel enables NDP packets on the RF ASIC radio and auto enables the auto mode. Monitoring Radio Statistics-NDP Capability and NDP Mode (GUI) Procedure Step 1 Step 2 Step 3 Choose Monitoring > Wireless > Radio Statistics. Click either 5 GHz Radios, 2.4 GHz Radios, or Dual-Band Radios tab. The corresponding radio band window displays the list of configured APs. To view the general attributes of an AP, click the corresponding AP to display the General tab. The following information is displayed: · AP Name: Displays the assigned identifier for the AP, which is unique within the network. The AP name can be ASCII characters from 32 to 126, without leading and trailing spaces. · IP Address: Displays the IP address assigned to the AP in dotted-decimal format. · AP Mode: Displays the configured AP mode. The supported modes are: · Local: It is the default mode, and it offers a basic service set (BSS) on a specific channel.When the AP does not transmit wireless client frame, it scans other channels to measure noise interference, discover rogue devices, and check for matches against Intrusion Detection System (IDS) events. · Monitor: An AP in monitor mode does not transmit. It is a dedicated sensor that checks IDS events, detects rogue APs, and determines the position of wireless stations. · Sniffer: The controller enables you to configure an AP as a network sniffer, which captures and forwards all the packets on a particular channel to a remote machine that runs packet analyser software. These packets contain information on time stamps, signal strength, packet sizes, and so on. Sniffers allow you to monitor and record network activity and detect problems. · Bridge: The AP becomes a dedicated point-to-point or point-to multipoint bridge. Two APs in bridge mode can connect two remote sites. Multiple APs can also form an indoor or outdoor mesh. Note that you cannot connect to the bridge with clients. · Clear: Returns the AP back to client-serving mode depending on the remote site tag configuration. · MAC Address: Displays the registered MAC address on the controller. · Number of Slots : Displays the number of slots supported by the AP. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 626 Radio Resource Management Verifying Neighbor Discovery Protocol Mode · Radio Type: Displays the radio band configured on the controller. By default, both, 802.11b/g/n (2.4-GHz) and 802.11a/n/ac (5-GHz) bands are enabled. · Slot ID: Displays the slot on which radio is installed. · Sub band Type: Displays the configured radio sub-band. · NDP Capability: Displays the supported Neighbour Discovery Protocol (NDP) capability. The AP advertises the following NDP mode capabilities while joining the controller: · ON-Channel (Serving channel) · OFF-Channel (RHL radio) · Both (Serving channel and RHL radio) Note Only Cisco Catalyst 9124AX outdoor Access Points support both ON-channel and OFF-channel NDP capability from Cisco IOS XE Bengaluru 17.5.1. · NDP Mode: Displays the configured NDP mode. If the NDP mode that is configured is AUTO, the controller selects ON-Channel as the NDP mode. If the NDP-mode that is configured is OFF-Channel, the controller selects OFF-Channel as the NDP mode. Verifying Neighbor Discovery Protocol Mode To verify the NDP mode, run the following commands: Device# show ap rf-profile name test-24g Description : test RF Profile Name : test-24g Band : 2.4 GHz Transmit Power Threshold v1 : -70 dBm Min Transmit Power : -10 dBm Max Transmit Power : 30 dBm . . . NDP mode : Auto . . . Device# show ap rf-profile name test-5g detail Description : Test RF Profile Name : test-5g Band : 5 GHz Transmit Power Threshold v1 : -70 dBm Min Transmit Power : -10 dBm Max Transmit Power : 30 dBm . . . NDP mode : Off-channel . . . Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 627 Verifying Neighbor Discovery Protocol Mode Radio Resource Management Device# show ap name ap-name config dot11 24ghz Cisco AP Identifier : 3cxx.0exx.36xx Cisco AP Name : Cisco-9105AXW-AP Country Code : Multiple Countries: US,MK,J4,IN Regulatory Domain Allowed by Country : 802.11bg:-AEJPQU 802.11a:-ABDEIJNPQU AP Country Code : US - United States AP Regulatory Domain : -A MAC Address : 5cxx.0dxx.e0xx IP Address Configuration : DHCP . . . NDP mode : Off-channel . . . Device# show ap name ap-name config dot11 5ghz Cisco AP Identifier Cisco AP Name Country Code Regulatory Domain Allowed by Country AP Country Code AP Regulatory Domain MAC Address IP Address Configuration IP Address . . . NDP mode . . . : 3cxx.0exx.36xx : Cisco-9105AXW-AP : Multiple Countries: US,MK,J4,IN : 802.11bg:-AEJPQU 802.11a:-ABDEIJNPQU : US - United States : -B : 5cxx.0dxx.e0xx : DHCP : Disabled : On-channel Device# show ap dot11 24ghz monitor Default 802.11b AP monitoring 802.11b Monitor Mode 802.11b Monitor Channels 802.11b RRM Neighbor Discover Type 802.11b AP Coverage Interval 802.11b AP Load Interval 802.11b AP Measurement Interval 802.11b AP Reporting Interval 802.11b NDP RSSI Normalization 802.11b Neighbor Timeout factor 802.11b NDP mode : Enabled : Country channels : Transparent : 180 seconds : 60 seconds : 180 seconds : 180 seconds : Enabled : 20 : Auto Device# show ap dot11 5ghz monitor Default 802.11a AP monitoring 802.11a Monitor Mode 802.11a Monitor Channels 802.11a RRM Neighbor Discover Type 802.11a AP Coverage Interval 802.11a AP Load Interval 802.11a AP Measurement Interval 802.11a AP Reporting Interval 802.11a NDP RSSI Normalization 802.11a Neighbor Timeout factor 802.11a NDP mode : Enabled : Country channels : Transparent : 180 seconds : 60 seconds : 180 seconds : 180 seconds : Enabled : 20 : Auto Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 628 4 4 C H A P T E R 6-GHz Band Operations The following topics describe the features that are specific to 6-GHz band radio: · Configuring Preferred Scanning Channels in the RF Profile (GUI), on page 629 · Configuring Preferred Scanning Channels in the RF Profile (CLI), on page 630 · Configuring Broadcast Probe Response in RF Profile (GUI), on page 630 · Configuring Broadcast Probe Response in RF Profile (CLI), on page 630 · Configuring FILS Discovery Frames in the RF Profile (GUI), on page 631 · Configuring FILS Discovery Frames in the RF Profile (CLI), on page 632 · Configuring Multi BSSID Profile (GUI), on page 632 · Configuring Multi BSSID Profile, on page 633 · Configuring Multi-BSSID in the RF Profile (GUI), on page 633 · Configuring Multi-BSSID in the RF Profile (CLI), on page 634 · Configuring Dynamic Channel Assignment Freeze (CLI), on page 634 · Information About 6-GHz Client Steering, on page 635 Configuring Preferred Scanning Channels in the RF Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Configuration > Tags & Profiles > RF/Radio. In the RF tab, click Add. The Add RF Profile page is displayed. Choose the RRM tab. Choose the DCA tab. In the Dynamic Channel Assignment section, select the required channels in DCA Channels section. In the PSC Bias field, click the toggle button to enable the preferred scanning channel bias for DCA. Click Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 629 Configuring Preferred Scanning Channels in the RF Profile (CLI) Radio Resource Management Configuring Preferred Scanning Channels in the RF Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 6ghz rf-profile rf-profile-name Example: Configures an RF profile and enters RF profile configuration mode. Device(config)# ap dot11 6ghz rf-profile rf-profile-name Step 3 channel psc Example: Device(config-rf-profile)# channel psc Configures the RF Profile DCA settings and enables the preferred scanning channel bias for DCA. Configuring Broadcast Probe Response in RF Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Tags & Profiles > RF/Radio. In the RF tab, click Add. The Add RF Profile page is displayed. Choose the 802.11ax tab. In the 6 GHz Discovery Frames section, click the Broadcast Probe Response option. In the Broadcast Probe Response Interval field, enter the broadcast probe response time interval in milli-seconds (ms). The value range is between 5 ms and 25 ms. The default value is 20 ms. Click Apply to Device. Configuring Broadcast Probe Response in RF Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 630 Radio Resource Management Configuring FILS Discovery Frames in the RF Profile (GUI) Step 2 Step 3 Step 4 Command or Action Device# configure terminal Purpose ap dot11 6ghz rf-profile rf-profile-name Example: Configures an RF profile and enters RF profile configuration mode. Device(config)# ap dot11 6ghz rf-profile rf-profile-name dot11ax bcast-probe-response Example: Device(config-rf-profile)# dot11ax bcast-probe-response Configures broadcast probe response. dot11ax bcast-probe-response time-interval Configures broadcast probe response interval. time-interval Example: Device(config-rf-profile)# dot11ax bcast-probe-response time-interval 20 Configuring FILS Discovery Frames in the RF Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > RF/Radio. In the RF tab, click Add. The Add RF Profile page is displayed. Choose the 802.11ax tab. In the 6 GHz Discovery Frames section, click the FILS Discovery option. Note To prevent the transmission of discovery FILS frames when the discovery frames are set to None in the RF profile, ensure that you disable FILS discovery frames by either switching to the 5-GHz or the 2.4-GHz bands on the AP or by selecting the Broadcast Probe Response option. Click Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 631 Configuring FILS Discovery Frames in the RF Profile (CLI) Radio Resource Management Configuring FILS Discovery Frames in the RF Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 6ghz rf-profile rf-profile-name Example: Configures an RF profile and enters RF profile configuration mode. Device(config)# ap dot11 6ghz rf-profile rf-profile-name Step 3 dot11ax fils-discovery Example: Device(config-rf-profile)# dot11ax fils-discovery Configures the 802.11ax FILS discovery. Note To prevent the transmission of discovery FILS frames when the discovery frames are set to None in the RF profile, ensure that you disable FILS discovery frames by either switching to the 5-GHz or the 2.4-GHz bands on the AP or by changing to Broadcast Probe Response. Configuring Multi BSSID Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Tags & Profiles > Multi BSSID. Click Add. The Add Multi BSSID Profile page is displayed. Enter the name and the description of the BSSID profile. Enter the following 802.11ax parameters: a) Downlink OFDMA b) Uplink OFDMA c) Downlink MU-MIMO d) Uplink MU-MIMO e) Target Waketime f) TWT Broadcast Support Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 632 Radio Resource Management Configuring Multi BSSID Profile Step 5 Click Apply to Device. Configuring Multi BSSID Profile To configure the multi BSSID profile for 6-Ghz band radio, follow the steps given below: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile multi-bssid multi-bssid-profile-name Example: Device (config)# wireless profile multi-bssid multi-bssid-profile-name Configures the multi BSSID profile. Enters the multi BSSID profile configuration. Step 3 dot11ax {downlink-mumimo | downlink-ofdma | target-waketime | twt-broadcast | uplink-mumimo | uplink-ofdma} Configures the 802.11ax parameters. Example: Device (config-wireless-multi-bssid-profile)# dot11ax downlink-mumimo Configuring Multi-BSSID in the RF Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > RF/Radio. In the RF tab, click Add. The Add RF Profile page is displayed. Choose the 802.11ax tab. In the Multi BSSID Profile field, choose the profile from the drop-down list. Click Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 633 Configuring Multi-BSSID in the RF Profile (CLI) Radio Resource Management Configuring Multi-BSSID in the RF Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 6ghz rf-profile rf-profile-name Example: Configures an RF profile and enters RF profile configuration mode. Device(config)# ap dot11 6ghz rf-profile rf-profile-name Step 3 dot11ax multi-bssid-profile multi-bssid-profile-name Example: Device(config-rf-profile)# dot11ax multi-bssid-profile multi-bssid-profile-name Configures 802.11ax multi BSSID profile name, in the RF profile configuration mode. Configuring Dynamic Channel Assignment Freeze (CLI) When the 6-GHz radios receive the right channels, disable DCA for 6-GHz by issuing the following command: Before you begin Ensure that Dynamic Channel Assignment (DCA) for 6-GHz is enabled. Wait for the 6-GHz radios to get stabilised with the right set of channel assignments. Procedure Step 1 Command or Action Purpose no ap dot11 6ghz rrm channel dca global Disables DCA for 6-GHz bands. auto Example: Device# no ap dot11 6ghz rrm channel dca global auto Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 634 Radio Resource Management Information About 6-GHz Client Steering Information About 6-GHz Client Steering The 6-GHz band provides more channels, more bandwidth, and has less network congestion when compared to the existing 2.4-GHz and 5-GHz bands. As a result, wireless clients that are 6-GHz capable connect to the 6-GHz radio to take advantage of these benefits. This topic provides details about 6-GHz client steering for APs supporting 6-GHz band. The 6-GHz client steering takes place when the controller receives a periodic client statistics report from the 2.4-GHz band or the 5-GHz band. The client steering configuration is enabled under WLAN, and is configured only for clients that are 6-GHz capable. If a client in the report is 6-GHz capable, then client steering is triggered, and the client is steered to the 6-GHz band. Configuring 6-GHz Client Steering in the Global Configuration Mode (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Choose Configuration > Wireless > Advanced. Click the 6 GHz Client Steering tab. Client steering is configurable per WLAN. In the 6 GHz Transition Minimum Client Count field, enter a value to set the minimum number of clients for client steering. The default value is three clients. The value range is between 0 and 200 clients. In the 6 GHz Transition Minimum Window Size field, enter a value to set the minimum window size of client steering. The default value is three clients. The value range is between 0 and 200 clients. In the 6 GHz Transition Maximum Utilization Difference field, enter a value to set the maximum utilization difference for steering. The value range is between 0 percent to 100 percent. The default value is 20. In the 6 GHz Transition Minimum 2.4 GHz RSSI Threshold field, enter a value to set the minimum value for client steering 2.4-GHz RSSI threshold. In the 6 GHz Transition Minimum 5 GHz RSSI Threshold field, enter a value to set the minimum value for client steering 5-GHz RSSI threshold. Click Apply. Configuring 6-GHz Client Steering in the Global Configuration Mode Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 635 Configuring 6-GHz Client Steering on the WLAN (GUI) Radio Resource Management Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action wireless client client-steering client-count min-num-clients Example: Device(config)# client-steering client-count 3 Purpose Sets the minimum number of clients for client steering. The value range is between 0 and 200. wireless client client-steering window-size window-size Example: Device(config)# client-steering window-size 5 Sets the minimum window size of client steering. The value range is between 0 and 200. wireless client client-steering util-threshold Sets the maximum channel utilization difference threshold (2.4-GHz or 5-GHz to 6-GHz) for steering. The Example: value range is between 0 to 100 percent. Device(config)# wireless client client-steering util-threshold 25 wireless client client-steering min-rssi-24ghz Sets the minimum value for client steering the -70 2.4-GHz RSSI threshold. Example: Device(config)# wireless client client-steering min-rssi-24ghz -70 wireless client client-steering min-rssi-5ghz Sets the minimum value for client steering the -75 5-GHz RSSI threshold. Example: Device(config)# wireless client client-steering min-rssi-5ghz -75 Configuring 6-GHz Client Steering on the WLAN (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > WLANs. Click Add. The Add WLAN page is displayed. Click the Advanced tab. Check the 6 GHz Client Steering check box to enable client steering on the WLAN. Click Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 636 Radio Resource Management Configuring 6-GHz Client Steering on the WLAN Configuring 6-GHz Client Steering on the WLAN Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wlan wlan-name wlan-id SSID-name Example: Device(config)# wlan wlan-name 18 ssid-name Step 3 client-steering Example: Device(config-wlan)# client-steering Purpose Enters global configuration mode. Enters WLAN configuration submode. Configures 6-GHz client steering on the WLAN. Verifying 6-GHz Client Steering To verify client steering, run the following commands: Device# show wlan wlan-id WLAN Profile Name : wlan1 ================================================ Identifier :1 Description : Network Name (SSID) : ssid-demo Status : Disabled Broadcast SSID : Enabled . . . 6Ghz Client Steering : Enabled . . . Device# show wireless client steering Client Steering Configuration Information Macro to micro transition threshold Micro to Macro transition threshold Micro-Macro transition minimum client count Micro-Macro transition client balancing window Probe suppression mode Probe suppression transition aggressiveness Probe suppression hysteresis 6Ghz transition minimum client count 6Ghz transition minimum window size 6Ghz transition maximum channel util difference 6Ghz transition minimum 2.4Ghz RSSI threshold 6Ghz transition minimum 5Ghz RSSI threshold : -55 dBm : -65 dBm :3 :3 : Disabled :3 : -6 dB :3 :3 : 20% : -60 dBm : -65 dBm WLAN Configuration Information Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 637 Verifying 6-GHz Client Steering Radio Resource Management WLAN Profile Name 11k Neighbor Report 11v BSS Transition ----------------------------------------------------------------------------------------- 12 test1 Enabled Enabled 8 test Enabled Enabled Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 638 V P A R T Network Management · AP Packet Capture, on page 641 · DHCP Option82, on page 645 · RADIUS Realm, on page 657 · RADIUS Accounting, on page 663 · RADIUS Call Station Identifier, on page 669 · RADIUS VSA, on page 671 · Cisco StadiumVision, on page 677 · Persistent SSID Broadcast, on page 681 · Network Monitoring, on page 683 · Creating a Lobby Ambassador Account, on page 687 · Lobby Ambassador Account, on page 691 · Guest User Accounts, on page 699 · Link Local Bridging, on page 703 · Web Admin Settings, on page 707 · Web UI Configuration Command Accounting in TACACS Server, on page 713 · Embedded Packet Capture, on page 717 AP Packet Capture 4 5 C H A P T E R · Introduction to AP Client Packet Capture, on page 641 · Enabling Packet Capture (GUI), on page 641 · Enabling Packet Capture (CLI), on page 642 · Create AP Packet Capture Profile and Map to an AP Join Profile (GUI), on page 642 · Create AP Packet Capture Profile and Map to an AP Join Profile, on page 643 · Start or Stop Packet Capture, on page 643 Introduction to AP Client Packet Capture The AP Client Packet Capture feature allows the packets on an AP to be captured for wireless client troubleshooting. The packet capture operation is performed on the AP by the radio drivers on the current channel on which it is operational, based on the specified packet capture filter. All the packets that are captured for a specific client are uploaded to a file in the FTP server. This file can be opened in Wireshark for packet inspection. Limitations for AP Client Packet Capture · The packet capture task can be performed for only one client at a time per site. · Packet capture can be started on a specific AP or a set of APs using static mode. It can be started or stopped for the same client on different APs, when the capture is in progress. When packet capture is started in auto mode, system automatically selects the set of nearby APs to start packet capture for a specific client. In this mode, you cannot start or stop packet capture on individual APs. Use the stop all command to stop the packet capture when it is started in auto-mode. · After the SSO is complete, the packet capture action will not continue after a switchover. Enabling Packet Capture (GUI) Procedure Step 1 Choose Troubleshooting > AP Packet Capture. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 641 Enabling Packet Capture (CLI) Network Management Step 2 Step 3 Step 4 On the Troubleshooting page, in the Start Packet Capture section, in the Client MAC Address field, enter the client's MAC address. Enter the MAC address either in xx:xx:xx:xx:xx:xx, xx-xx-xx-xx-xx-xx, or xxxx.xxxx.xxxx format. From the Capture Mode options, choose Auto. Click Start. Enabling Packet Capture (CLI) Follow the procedure given below to enable packet capture: Procedure Step 1 Command or Action enable Example: Device# enable Purpose Enters privileged EXEC mode. Step 2 ap packet-capture start client-mac-address auto Example: Device# ap packet-capture start 0011.0011.0011 auto Enables packet capture for the specified client on a set of nearby access points. Create AP Packet Capture Profile and Map to an AP Join Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Click Configuration > Tags & Profiles > AP Join Profile. Click Add to create a new AP Join Profile and enter the requisite details. In the Add AP Join Profile area, click AP > Packet Capture. Click the Plus icon to create a new Packet Capture profile or select one from the drop-down menu. Click Save. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 642 Network Management Create AP Packet Capture Profile and Map to an AP Join Profile Create AP Packet Capture Profile and Map to an AP Join Profile While packet capture profile configurations are used for an AP, the packet capture profile is mapped to an AP profile. The AP profile is in turn mapped to site tag. While starting packet capture, APs use the packet capture profile configurations based on the site and AP join profile they belong to. Follow the procedure given below to create an AP packet capture profile and map it to an AP join profile: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode.. Step 2 wireless profile ap packet-capture packet-capture-profile-name Example: Device(config)# wireless profile ap packet-capture test1 Configures an AP profile. Step 3 ap profile profile-name Example: Device(config)# ap profile default-ap-profile Configures an AP packet capture profile. Step 4 packet-capture profile-name Enables packet capture on the AP profile. Example: Device(config-ap-profile)# packet-capture capture-test Step 5 end Example: Device(config-ap-profile)# end Exits the AP profile configuration mode. Step 6 show wireless profile ap packet-capture detailed profile-name Example: Device# show wireless profile ap packet-capture detailed test1 Displays detailed information of the selected AP packet capture profile. Start or Stop Packet Capture Perform either of these tasks to start or stop a packet capture procedure. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 643 Start or Stop Packet Capture Network Management Procedure Step 1 Command or Action ap packet-capture start client-mac-address {auto | static ap-name } Example: Device# ap packet-capture start 0011.0011.0011 auto Purpose Enables packet capture for a client. Step 2 ap packet-capture stop client-mac-address {all | static ap-name } Example: Device# ap packet-capture stop 0011.0011.0011 all Disables packet capture for a client. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 644 4 6 C H A P T E R DHCP Option82 · Information About DHCP Option 82, on page 645 · Configuring DHCP Option 82 Global Interface, on page 647 · Configuring DHCP Option 82 Format, on page 649 · Configuring DHCP Option82 Through a VLAN Interface, on page 650 Information About DHCP Option 82 DHCP Option 82 is organized as a single DHCP option that contains information known by the relay agent. This feature provides additional security when DHCP is used to allocate network addresses, and enables the Cisco controller to act as a DHCP relay agent to prevent DHCP client requests from untrusted sources. The controller can be configured to add Option 82 information to DHCP requests from clients before forwarding the requests to a DHCP server. The DHCP server can then be configured to allocate IP addresses to the wireless client based on the information present in DHCP Option 82. DHCP provides a framework for passing configuration information to hosts on a TCP/IP network. Configuration parameters and other control information are carried in tagged data items that are stored in the Options field of the DHCP message. The data items themselves are also called options. Option 82 contains information known by the relay agent. The Relay Agent Information option is organized as a single DHCP option that contains one or more suboptions that convey information known by the relay agent. Option 82 was designed to allow a DHCP Relay Agent to insert circuit-specific information into a request that is being forwarded to a DHCP server. This option works by setting two suboptions: · Circuit ID · Remote ID The Circuit ID suboption includes information that is specific to the circuit the request came in on. This suboption is an identifier that is specific to the relay agent. Thus, the circuit that is described will vary depending on the relay agent. The Remote ID suboption includes information on the remote hostend of the circuit. This suboption usually contains information that identifies the relay agent. In a wireless network, this would likely be a unique identifier of the wireless access point. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 645 Information About DHCP Option 82 Network Management Note All valid Remote ID combinations are separated with a colon (:) as the delimiter. You can configure the following DHCP Option 82 options in a controller : · DHCP Enable · DHCP Opt82 Enable · DHCP Opt82 Ascii · DHCP Opt82 RID · DHCP Opt Format · DHCP AP MAC · DHCP SSID · DHCP AP ETH MAC · DHCP AP NAME · DHCP Site Tag · DHCP AP Location · DHCP VLAN ID Note The controller includes the SSID in ASCII and the VLAN-ID in hexadecimal format within the remote-ID sub-option of option 82 in the outgoing DHCP packets to the server for the following configurations: ipv4 dhcp opt82 format ssid ipv4 dhcp opt82 format vlan-id However, if ipv4 dhcp opt82 ascii configuration is also present, the controller adds VLAN-ID and SSID in ASCII format. For Cisco Catalyst 9800 Series Configuration Best Practices, see the following link: https://www.cisco.com/ c/en/us/products/collateral/wireless/catalyst-9800-series-wireless-controllers/guide-c07-743627.html Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 646 Network Management Configuring DHCP Option 82 Global Interface Configuring DHCP Option 82 Global Interface Configuring DHCP Option 82 Globally Through Server Override (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ip dhcp-relay information option server-override Inserts global server override and link selection suboptions. Example: Device(config)# ip dhcp-relay information option server-override Configuring DHCP Option 82 Through Server Override (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ip dhcp compatibility suboption server-override [cisco | standard] Example: Device(config)# ip dhcp compatibility suboption server-override cisco Configures the server override suboption to an RFC or Cisco specific value. Step 3 ip dhcp compatibility suboption link-selection [cisco | standard] Example: Device(config)# ip dhcp compatibility suboption link-selection cisco Configures the link-selection suboption to an RFC or Cisco specific value. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 647 Configuring DHCP Option 82 Globally Through Different SVIs (GUI) Network Management Configuring DHCP Option 82 Globally Through Different SVIs (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Choose Configuration > VLAN. Choose a VLAN from the drop-down list. The Edit SVI window appears. Click the Advanced tab. Choose an option from the IPv4 Inbound ACL drop-down list. Choose an option from the IPv4 Outbound ACL drop-down list. Choose an option from the IPv6 Inbound ACL drop-down list. Choose an option from the IPv6 Outbound ACL drop-down list. Enter an IP address in the IPv4 Helper Address field. Set the status to Enabled if you want to enable the Relay Information Option setting. Enter the Subscriber ID. Set the status to Enabled if you want to enable the Server ID Override setting. Set the status to Enabled if you want to enable the Option Insert setting. Choose an option from the Source-Interface Vlan drop-down list. Click Update & Apply to Device. Configuring DHCP Option 82 Globally Through Different SVIs (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ip dhcp-relay source-interface vlan vlan-id Sets global source interface for relayed Example: messages. Device(config)# ip dhcp-relay source-interface vlan 74 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 648 Network Management Configuring DHCP Option 82 Format Configuring DHCP Option 82 Format Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. wireless profile policy policy-name Example: Enables configuration for the specified profile policy. Device(config)# wireless profile policy pp3 shutdown Shuts down the profile policy. Example: Device(config-wireless-policy)# shutdown vlan vlan-name Assigns the profile policy to a VLAN. Example: Device(config-wireless-policy)# vlan 72 session-timeout value-btwn-20-86400 Example: Device(config-wireless-policy)# session-timeout 300 (Optional) Sets the session timeout value in seconds. The range is between 20-86400. idle-timeout value-btwn-15-100000 Example: Device(config-wireless-policy)# idle-timeout 15 (Optional) Sets the idle timeout value in seconds. The range is between 15-100000. central switching Enables central switching. Example: Device(config-wireless-policy)# central switching ipv4 dhcp opt82 Example: Device(config-wireless-policy)# ipv4 dhcp opt82 Enables DHCP Option 82 for the wireless clients. ipv4 dhcp opt82 ascii Example: (Optional) Enables ASCII on the DHCP Option 82 feature. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 649 Configuring DHCP Option82 Through a VLAN Interface Network Management Step 10 Step 11 Step 12 Command or Action Device(config-wireless-policy)# ipv4 dhcp opt82 ascii Purpose ipv4 dhcp opt82 rid Example: Device(config-wireless-policy)# ipv4 dhcp opt82 rid (Optional) Supports the addition of Cisco 2 byte Remote ID (RID) for the DHCP Option 82 feature. ipv4 dhcp opt82 format Enables DHCP Option 82 on the corresponding {ap_ethmac|ap_location|apmac|apname|policy_tag|ssid|vlan_id} AP. Example: Device(config-wireless-policy)# ipv4 dhcp opt82 format apmac For information on the various options available with the command, see Cisco Catalyst 9800 Series Wireless Controller Command Reference. no shutdown Example: Device(config-wireless-policy)# no shutdown Enables the profile policy. Configuring DHCP Option82 Through a VLAN Interface Configuring DHCP Option 82 Through Option-Insert Command (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 Step 3 Step 4 interface vlan vlan-id Example: Device(config)# interface vlan 72 ip dhcp relay information option-insert Example: Device(config-if)# ip dhcp relay information option-insert ip address ip-address Example: Configures a VLAN ID. Inserts relay information in BOOTREQUEST. Configures the IP address for the interface. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 650 Network Management Configuring DHCP Option 82 Through the server-ID-override Command (CLI) Step 5 Step 6 Step 7 Command or Action Purpose Device(config-if)# ip address 9.3.72.38 255.255.255.0 ip helper-address ip-address Example: Device(config-if)# ip helper-address 9.3.72.1 Configures the destination address for UDP broadcasts. [no] mop enabled Example: Device(config-if)# no mop enabled Disables the MOP for an interface. [no] mop sysid Example: Disables the task of sending MOP periodic system ID messages. Device(config-apgroup)# [no] mop sysid Configuring DHCP Option 82 Through the server-ID-override Command (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ip dhcp compatibility suboption server-override cisco Example: Device(config)# ip dhcp compatibility suboption server-override cisco Configures the server-id override suboption to an RFC or Cisco specific value. Step 3 ip dhcp compatibility suboption link-selection cisco Example: Device(config)# ip dhcp compatibility suboption link-selection cisco Configures the link-selection suboption to an RFC or Cisco specific value. Step 4 interface vlan vlan-id Example: Device(config)# interface vlan 72 Configures a VLAN ID. Step 5 ip dhcp relay information option server-id-override Example: Inserts the server id override and link selection suboptions. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 651 Configuring DHCP Option 82 Through a Subscriber-ID (CLI) Network Management Step 6 Step 7 Step 8 Step 9 Command or Action Device(config-if)# ip dhcp relay information option server-id-override Purpose ip address ip-address Configures the IP address for the interface. Example: Device(config-if)# ip address 9.3.72.38 255.255.255.0 ip helper-address ip-address Example: Device(config-if)# ip helper-address 9.3.72.1 Configures the destination address for UDP broadcasts. [no] mop enabled Example: Device(config-if)# no mop enabled Disables MOP for an interface. [no] mop sysid Example: Device(config-if)# [no] mop sysid Disables the task of sending MOP periodic system ID messages. Configuring DHCP Option 82 Through a Subscriber-ID (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 Step 3 Step 4 interface vlan vlan-id Example: Device(config)# interface vlan 72 Configures a VLAN ID. ip dhcp relay information option subscriber-id subscriber-id Inserts the subscriber identifier suboption. Example: Device(config-if)# ip dhcp relay information option subscriber-id test10 ip address ip-address Example: Configures the IP address for the interface. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 652 Network Management Configuring DHCP Option 82 Through server-ID-override and subscriber-ID Commands (CLI) Step 5 Step 6 Step 7 Command or Action Purpose Device(config-if)# ip address 9.3.72.38 255.255.255.0 ip helper-address ip-address Example: Device(config-if)# ip helper-address 9.3.72.1 Configures the destination address for UDP broadcasts. [no] mop enabled Example: Device(config-if)# no mop enabled Disables MOP for an interface. [no] mop sysid Example: Disables the task of sending MOP periodic system ID messages. Device(config-apgroup)# [no] mop sysid Configuring DHCP Option 82 Through server-ID-override and subscriber-ID Commands (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 Step 3 Step 4 interface vlan vlan-id Example: Device(config)# interface vlan 72 Configures a VLAN ID. ip dhcp relay information option server-id-override Example: Device(config-if)# ip dhcp relay information option server-id-override Inserts server ID override and link selection suboptions. ip dhcp relay information option subscriber-id subscriber-id Inserts the subscriber identifier suboption. Example: Device(config-if)# ip dhcp relay information option subscriber-id test10 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 653 Configuring DHCP Option 82 Through Different SVIs (CLI) Network Management Step 5 Step 6 Step 7 Step 8 Command or Action Purpose ip address ip-address Configures the IP address for the interface. Example: Device(config-if)# ip address 9.3.72.38 255.255.255.0 ip helper-address ip-address Example: Device(config-if)# ip helper-address 9.3.72.1 Configures the destination address for UDP broadcasts. [no] mop enabled Example: Device(config-if)# no mop enabled Disables the MOP for an interface. [no] mop sysid Example: Disables the task of sending MOP periodic system ID messages. Device(config-apgroup)# [no] mop sysid Configuring DHCP Option 82 Through Different SVIs (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 Step 3 Step 4 interface vlan vlan-id Example: Device(config)# interface vlan 72 Configures a VLAN ID. ip dhcp relay source-interface vlan vlan-id Example: Device(config-if)# ip dhcp relay source-interface vlan 74 Configures a source interface for relayed messages on a VLAN ID. ip address ip-address Configures the IP address for the interface. Example: Device(config-if)# ip address 9.3.72.38 255.255.255.0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 654 Network Management Configuring DHCP Option 82 Through Different SVIs (CLI) Step 5 Step 6 Step 7 Command or Action ip helper-address ip-address Example: Device(config-if)# ip helper-address 9.3.72.1 Purpose Configure the destination address for UDP broadcasts. [no] mop enabled Example: Device(config-if)# no mop enabled Disables the MOP for an interface. [no] mop sysid Example: Disables the task of sending MOP periodic system ID messages. Device(config-apgroup)# [no] mop sysid Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 655 Configuring DHCP Option 82 Through Different SVIs (CLI) Network Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 656 4 7 C H A P T E R RADIUS Realm · Information About RADIUS Realm, on page 657 · Enabling RADIUS Realm, on page 658 · Configuring Realm to Match the RADIUS Server for Authentication and Accounting, on page 658 · Configuring the AAA Policy for a WLAN, on page 659 · Verifying the RADIUS-Realm Configuration, on page 661 Information About RADIUS Realm The RADIUS Realm feature is associated with the domain of the user. Using this feature, a client can choose the RADIUS server through which authentication and accounting is to be processed. When mobile clients are associated with a WLAN, RADIUS realm is received as a part of Extensible Authentication Protocol Method for UMTS Authentication and Key Agreement (EAP-AKA) identity response request in the authentication request packet. The Network Access Identifier (NAI) format (EAP-AKA) for WLAN can be specified as username@domain.com. The realm in the NAI format is represented after the @ symbol, which is specified as domain.com. If vendor-specific attributes are added as test, the NAI format is represented as test@domain.com. The RADIUS Realm feature can be enabled and disabled on a WLAN. If Realm is enabled on a WLAN, the corresponding user should send the username in the NAI format. The controller sends the authentication request to the AAA server only when the realm, which is in the NAI format and is received from the client, is compiled as per the given standards. Apart from authentication, accounting requests are also required to be sent to the AAA server based on realm filtering. Realm Support on a WLAN Each WLAN is configured to support NAI realms. After the realm is enabled on a particular SSID, the lookup is done to match the realms received in the EAP identity response against the configured realms on the RADIUS server. If the client does not send a username with the realm, the default RADIUS server that is configured on the WLAN is used for authentication. If the realm that is received from the client does not match the configured realms on the WLAN, the client is deauthenticated and dropped. If the RADIUS Realm feature is not enabled on a WLAN, the username that is received as part of the EAP identity request is directly used as the username and the configured RADIUS server is used for authentication and accounting. By default, the RADIUS Realm feature is disabled on WLANs. · Realm Match for Authentication: In dot1x with EAP methods (similar to EAP AKA), the username is received as part of an EAP identity response. A realm is derived from the username and are matched Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 657 Enabling RADIUS Realm Network Management with the realms that are already configured in the corresponding RADIUS authentication server. If there is a match, the authentication requests are forwarded to the RADIUS server. If there is a mismatch, the client is deauthenticated. · Realm Match for Accounting: A client's username is received through an access-accept message. When accounting messages are triggered, the realm is derived from the corresponding client's username and compared with the accounting realms configured on the RADIUS accounting server. If there is a match, accounting requests are forwarded to the RADIUS server. If there is a mismatch, accounting requests are dropped. Enabling RADIUS Realm Follow the procedure given below to enable RADIUS realm: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless aaa policy aaa-policy Example: Device(config)# wireless aaa policy policy-1 Step 3 aaa-realm enable Example: Device(config-aaa-policy)# aaa-realm enable Purpose Enters global configuration mode. Creates a new AAA policy. Enables AAA RADIUS realm selection. Note Use the no aaa-realm enable or the default aaa-realm enable command to disable the RADIUS realm. Configuring Realm to Match the RADIUS Server for Authentication and Accounting Follow the procedure given below to configure the realm to match the RADIUS server for authentication and accounting: Procedure Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 658 Network Management Configuring the AAA Policy for a WLAN Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action Device# configure terminal Purpose aaa new-model Example: Device(config)# aaa new-model Creates a AAA authentication model. aaa authorization network default group Sets the authorization method. radius-server-group Example: Device(config)# aaa authorization network default group aaa_group_name aaa authentication dot1x realm group radius-server-group Indicates that dot1x must use the realm group RADIUS server. Example: Device(config)# aaa authentication dot1x cisco.com group cisco1 aaa authentication login realm group radius-server-group Defines the authentication method at login. Example: Device(config)# aaa authentication login cisco.com group cisco1 aaa accounting identity realm start-stop group radius-server-group Example: Enables accounting to send a start-record accounting notice when a client is authorized, and a stop-record at the end. Device(config)# aaa accounting identity cisco.com start-stop group cisco1 Configuring the AAA Policy for a WLAN Follow the procedure given below to configure the AAA policy for a WLAN: Procedure Step 1 Step 2 Command or Action configure terminal Example: Device# configure terminal wireless aaa policy aaa-policy-name Example: Device(config)# wireless aaa policy aaa-policy-1 Purpose Enters global configuration mode. Creates a new AAA policy for wireless. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 659 Configuring the AAA Policy for a WLAN Network Management Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Command or Action aaa-realm enable Example: Device(config-aaa-policy)# aaa-realm enable Purpose Enables AAA RADIUS server selection by realm. exit Example: Device(config-aaa-policy)# exit Returns to global configuration mode. wireless profile policy wlan-policy-profile Configures a WLAN policy profile. Example: Device(config)# wireless profile policy wlan-policy-a aaa-policy aaa-policy Example: Device(config-wireless-policy)# aaa-policy aaa-policy-1 Maps the AAA policy. accounting-list acct-config-realm Example: Device(config-wireless-policy)# accounting-list cisco.com Sets the accounting list. exit Example: Device(config-wireless-policy)# exit Returns to global configuration mode. wlan wlan-name wlan-id ssid Configures a WLAN. Example: Device(config)# wlan wlan2 14 wlan-aaa security dot1x authentication-list auth-list-realm Example: Device(config-wlan)# security dot1x authentication-list cisco.com Enables the security authentication list for IEEE 802.1x. exit Example: Device(config-wireless-policy)# exit Returns to global configuration mode. wireless tag policy policy Example: Device(config)# wireless tag policy tag-policy-1 Configures a policy tag. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 660 Network Management Verifying the RADIUS-Realm Configuration Step 13 Step 14 Command or Action Purpose wlan wlan-name policy policy-profile Maps a policy profile to the WLAN. Example: Device(config-policy-tag)# wlan Abc-wlan policy wlan-policy-a exit Example: Device(config-policy-tag)# exit Returns to global configuration mode. Verifying the RADIUS-Realm Configuration Use the following command to verify the RADIUS-realm configuration: Device# show wireless client mac-address 14bd.61f3.6a24 detail Client MAC Address : 14bd.61f3.6a24 Client IPv4 Address : 9.4.113.103 Client IPv6 Addresses : fe80::286e:9fe0:7fa6:8f4 Client Username : sacthoma@cisco.com AP MAC Address : 4c77.6d79.5a00 AP Name: AP4c77.6d53.20ec AP slot : 1 Client State : Associated Policy Profile : name-policy-profile Flex Profile : N/A Wireless LAN Id : 3 Wireless LAN Name: ha_realm_WLAN_WPA2_AES_DOT1X BSSID : 4c77.6d79.5a0f Connected For : 26 seconds Protocol : 802.11ac Channel : 44 Client IIF-ID : 0xa0000001 Association Id : 1 Authentication Algorithm : Open System Client CCX version : No CCX support Re-Authentication Timeout : 1800 sec (Remaining time: 1775 sec) Input Policy Name : None Input Policy State : None Input Policy Source : None Output Policy Name : None Output Policy State : None Output Policy Source : None WMM Support : Enabled U-APSD Support : Enabled U-APSD value : 0 APSD ACs : BK, BE, VI, VO Fastlane Support : Disabled Power Save : OFF Supported Rates : 9.0,18.0,36.0,48.0,54.0 Mobility: Move Count :0 Mobility Role : Local Mobility Roam Type : None Mobility Complete Timestamp : 06/12/2018 19:52:35 IST Policy Manager State: Run Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 661 Verifying the RADIUS-Realm Configuration Network Management NPU Fast Fast Notified : No Last Policy Manager State : IP Learn Complete Client Entry Create Time : 25 seconds Policy Type : WPA2 Encryption Cipher : CCMP (AES) Authentication Key Management : 802.1x Encrypted Traffic Analytics : No Management Frame Protection : No Protected Management Frame - 802.11w : No EAP Type : PEAP VLAN : 113 Multicast VLAN : 0 Access VLAN : 113 Anchor VLAN : 0 WFD capable : No Managed WFD capable : No Cross Connection capable : No Support Concurrent Operation : No Session Manager: Interface : capwap_9040000f IIF ID : 0x9040000F Authorized : TRUE Session timeout : 1800 Common Session ID: 097704090000000DF4607B3B Acct Session ID : 0x00000fa2 Aaa Server Details Server IP : 9.4.23.50 Auth Method Status List Method : Dot1x SM State : AUTHENTICATED SM Bend State : IDLE Local Policies: Service Template : wlan_svc_name-policy-profile_local (priority 254) Absolute-Timer : 1800 VLAN : 113 Server Policies: Resultant Policies: VLAN : 113 Absolute-Timer : 1800 DNS Snooped IPv4 Addresses : None DNS Snooped IPv6 Addresses : None Client Capabilities CF Pollable : Not implemented CF Poll Request : Not implemented Short Preamble : Not implemented PBCC : Not implemented Channel Agility : Not implemented Listen Interval : 0 Fast BSS Transition Details : Reassociation Timeout : 0 11v BSS Transition : Not implemented FlexConnect Data Switching : Central FlexConnect Dhcp Status : Central FlexConnect Authentication : Central FlexConnect Central Association : No . . . Fabric status : Disabled Client Scan Reports Assisted Roaming Neighbor List Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 662 4 8 C H A P T E R RADIUS Accounting · Information About RADIUS Accounting of AP Events, on page 663 · Configuring Accounting Method-List for an AP Profile, on page 663 · Verifying the AP Accounting Information, on page 664 · AAA Accounting, on page 664 · Feature History for Device Ecosystem Data, on page 665 · Information About Device Ecosystem Data, on page 666 · Enable Device Ecosystem Data, on page 666 · Verify Device Ecosystem Data, on page 667 Information About RADIUS Accounting of AP Events This topic describes the configuration of a RADIUS server to monitor a network with regards to Access Points (APs). Prior to Cisco IOS XE Amsterdam 17.1.1 release, during times of network issues, the controller would not send accounting messages when APs join and disjoin from the controller. From Cisco IOS XE Amsterdam 17.1.1 release onwards, the RADIUS server keeps a record of all the APs that were down and have come up. Configuring Accounting Method-List for an AP Profile Procedure Step 1 Command or Action configure terminal Example: Device#configure terminal Purpose Enters global configuration mode. Step 2 ap profile ap-profile-name Example: Device(config)# ap profile ap-profile-name Configures the AP profile. The default AP join profile name is default-ap-profile. Step 3 [no] accounting method-list method-list-name Configures the accounting method list for the Example: AP profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 663 Verifying the AP Accounting Information Network Management Command or Action Purpose Device(config-ap-profile)# [no] Use the no form of this command to disable the accounting method-list method-list-name command. Verifying the AP Accounting Information To verify the AP accounting information, use the following command: Device#show wireless stats ap accounting Base MAC Total packet Send Total packet Received Methodlist ---------------------------------------------------------------------------------------- 00b0.e192.0f20 4 3 abc 38ed.18cc.5788 8 8 ML_M 70ea.1ae0.af08 0 0 ML_A To view the details of a method list that is configured for an AP profile, use the following command: Device#show ap profile name Method-list detailed AP Profile Name : test-profile Description : . . . Method-list name : Method-list Packet Sequence Jump DELBA : ENABLED Lag status : DISABLED . Client RSSI Statistics Reporting : ENABLED Reporting Interval : 30 seconds AAA Accounting Configuring AAA Accounting Using Default Method List (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 aaa accounting commands privilege_level Creates an accounting method list and enables default start-stop group group-name accounting. Example: Device(config)# aaa accounting commands 15 default start-stop group group-name · privilege_level: AAA accounting level. The valid range is from 0 to 15. · group-name: AAA accounting group that supports only TACACS+ group. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 664 Network Management Configuring HTTP Command Accounting Using Named Method List (CLI) Step 3 Command or Action end Example: Device(config)# end Purpose Returns to privileged EXEC mode. Configuring HTTP Command Accounting Using Named Method List (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ip http accounting commands level named-accounting-method-list Example: Device(config)# ip http accounting commands 1 oneacct Step 3 end Example: Device(config)# end Purpose Enters global configuration mode. Configures HTTP command accounting using the named method list. · level: Privilege value from 0 to 15. By default, the following command privilege levels are available on the controller: · 0: Includes the disable, enable, exit, help, and logout commands. · 1: Includes all the user-level commands at the controller prompt (>). · 15: Includes all the enable-level commands at the controller prompt (>). · named-accounting-method-list: Name of the predefined command accounting method list. Returns to privileged EXEC mode. Feature History for Device Ecosystem Data This table provides release and related information for the feature explained in this module. This feature is also available in all the releases subsequent to the one in which they are introduced in, unless noted otherwise. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 665 Information About Device Ecosystem Data Network Management Table 50: Feature History for Device Ecosystem Data Release Cisco IOS XE Dublin 17.10.1 Feature Device Ecosystem Data Feature Information This feature sends device analytics data in the RADIUS accounting request to Cisco ISE to profile the endpoints. Information About Device Ecosystem Data Edge analytics is the process of collecting, processing, and analyzing data from devices in a network. The controller learns about endpoint attributes, such as model number, operating system version, and other information from a set of endpoints using device analytics. The device analytics data is further shared with Cisco Identity Services Engine (ISE) to profile the endpoints. This information sharing is in addition to the DHCP and HTTP attributes already being shared with Cisco ISE using RADIUS accounting messages. Enable Device Ecosystem Data Note Before proceeding with the configuration, ensure that device classifier and accounting features are enabled. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy policy-profile-name Configures a wireless policy profile. Example: Device(config)# wireless profile policy default-policy-profile Step 3 shutdown Disables the wireless policy profile. Example: Device(config-wireless-policy)# shutdown Step 4 radius-profiling Example: Device(config-wireless-policy)# radius-profiling Configures client radius profiling. Step 5 dot11-tlv-accounting Example: Configures the controller to send device analytics data that is found in the RADIUS Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 666 Network Management Verify Device Ecosystem Data Step 6 Step 7 Command or Action Device(config-wireless-policy)# dot11-tlv-accounting no shutdown Example: Device(config-wireless-policy)# no shutdown end Example: Device(config-wireless-policy)# end Purpose accounting request to Cisco ISE in order to profile the endpoints. The no form of this command disables the feature. Enables the wireless policy profile. Returns to privileged EXEC mode. Verify Device Ecosystem Data Use the following command to verify device ecosystem data in RADIUS accounting configuration: Device# show wireless profile policy detailed <name> . . . WLAN Local Profiling Subscriber Policy Name RADIUS Profiling HTTP TLV caching DHCP TLV caching DOT11 TLV accounting . . . : Not Configured : ENABLED : DISABLED : DISABLED : ENABLED Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 667 Verify Device Ecosystem Data Network Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 668 4 9 C H A P T E R RADIUS Call Station Identifier · RADIUS Call Station Identifier, on page 669 · Configuring a RADIUS Call Station Identifier, on page 670 RADIUS Call Station Identifier The RADIUS called station identifier attribute allows a Network Access Server (NAS) to capture the Access-Request packet used by a phone number by means of Dialled Number Identification (DNIS) or similar technology. The IEEE 802.1X authenticators can use this attribute to store the bridge or Access Point MAC address in ASCII format. The called station identifier allows a RADIUS server to specify the MAC addresses or networks that a client can connect. One such attribute can be added in the Access-Request packet. The called station identifier is useful in scenarios where preauthentication is supported. In such instances, the called station identifier enables the RADIUS server to restrict the networks and attachment points the client can connect. Note The called station identifier attribute is applicable only for Access-Request and not for Access-Accept or CoA-Request. In Cisco IOS XE Bengaluru 17.4.1, the RADIUS called station identifier configuration is enhanced to include more attributes. The newly added options for authentication and accounting are listed below: · policy-tag-name · flex-profile-name · ap-macaddress-ssid-flexprofilename · ap-macaddress-ssid-policytagname · ap-macaddress-ssid-sitetagname · ap-ethmac-ssid-flexprofilename · ap-ethmac-ssid-policytagname · ap-ethmac-ssid-sitetagname For more information on the attributes listed above, see the following commands: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 669 Configuring a RADIUS Call Station Identifier Network Management · radius-server attribute wireless accounting call-station-id · radius-server attribute wireless authentication call-station-id Configuring a RADIUS Call Station Identifier Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 radius-server attribute wireless Configures a call station identifier sent in the authentication call-station-id policy-tag-name RADIUS authentication messages. Example: Device(config)# radius-server attribute wireless authentication call-station-id policy-tag-name Step 3 radius-server attribute wireless accounting Configures a call station identifier sent in the call-station-id policy-tag-name RADIUS accounting messages. Example: Device(config)# radius-server attribute wireless accounting call-station-id policy-tag-name Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 670 5 0 C H A P T E R RADIUS VSA · Information About RADIUS VSA, on page 671 · Create an Attribute List, on page 672 · Create a AAA Policy and Map it to Attribute List, on page 673 · Map a AAA Policy to the WLAN Policy Profile, on page 674 · Map the WLAN Policy Profile to a WLAN, on page 675 Information About RADIUS VSA The Internet Engineering Task Force (IETF) draft standard specifies a method for communicating vendor-specific information between the network access server and the RADIUS server by using vendor specific attributes (VSA). VSA allow vendors to support their own extended attributes otherwise not suitable for general use. The controller uses these attributes value in authentication or accounting packets, or both based on specified usage format. VSA contains these three elements: · Type · Length · String (also known as data) · Vendor-ID · Vendor-Type · Vendor-Length · Vendor-Data This feature is supported only in FlexConnect central authentication mode with local switching. FlexConnect local authentication mode is not supported. This feature is supported only for wireless sessions. This feature supports the following set of VSAs per WLAN for authentication and accounting requests, in addition to the existing AAA attributes. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 671 Create an Attribute List Network Management Table 51: Newly Supported Attributes Attribute Name Well-known Attribute SVR-Zip-Code 26 SVR-Device-Type 26 SVR-Device-Model-Number 26 SVR-Lat-Long 26 SVR-Venue-Category 26 SVR-Network-Type 26 Aggregation-AAA 26 BW-Venue-Id 26 BW-Venue-TZ 26 BW-Class 26 BW-Venue-Description 26 BW-ISO-Country-Code 26 BW-E164-Country-Code 26 BW-State-Name 26 BW-City-Name 26 BW-Area-Code 26 BW-User-Group 26 BW-Venue-Name 26 BW-Operator-Name 26 VSA Sub-attribute 14 17 18 19 20 21 22 7 8 10 11 14 15 16 17 18 27 29 37 Vendor ID 14369 14369 14369 14369 14369 14369 14369 22472 22472 22472 22472 22472 22472 22472 22472 22472 22472 22472 22472 Create an Attribute List Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 672 Network Management Create a AAA Policy and Map it to Attribute List Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action Purpose aaa attribute list list Creates a AAA attribute list. Example: Device(config)# aaa attribute list TEST attribute type attribute-type Specifies a AAA attribute type. Example: Device(config-attr-list)# attribute type BW-City-Name "MUMBAI" attribute type attribute-type (Optional) Specifies a AAA attribute type. Example: Device(config-attr-list)# attribute type BW-State-Name "MAHARASHTRA attribute type attribute-type (Optional) Specifies a AAA attribute type. Example: Device(config-attr-list)#attribute type BW-Venue-Name "WANKHEDE" end Example: Device(config-attr-list)# end Returns to Privileged EXEC mode. What to do next Create a AAA policy and map the attribute list. Create a AAA Policy and Map it to Attribute List Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless aaa policy aaa-policy Example: Device(config)# wireless aaa policy policy-1 Creates a new AAA policy. Step 3 attrlist authentication authentication-attr-list Configures VSA authentication attribute list. Example: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 673 Map a AAA Policy to the WLAN Policy Profile Network Management Step 4 Step 5 Command or Action Device(config-aaa-policy)# attrlist authentication auth-attr-list attrlist accounting accounting-attr-list Example: Device(config-aaa-policy)# attrlist accounting acct-attr-list end Example: Device(config-aaa-policy)# end Purpose Configures VSA accounting attribute list. Returns to Privileged EXEC mode. What to do next Map the AAA policy to the WLAN policy profile. Map a AAA Policy to the WLAN Policy Profile Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-policy Creates a new wireless policy profile. Example: Device(config)# wireless profile policy EAP-AKA Step 3 aaa-policy aaa-policy Example: Device(config-wireless-policy)# aaa-policy Verizon-aaa-policy Creates a new AAA policy. Step 4 end Example: Device(config-wireless-policy)# end Returns to Privileged EXEC mode. What to do next Map the WLAN policy profile to a WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 674 Network Management Map the WLAN Policy Profile to a WLAN Map the WLAN Policy Profile to a WLAN Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless tag policy policy-name Example: Device(config)# wireless tag policy EAP-AKA Creates a new policy tag. Step 3 wlan wlan-profile-name policy aaa-policy Maps the policy profile to a WLAN. Example: Device(config-policy-tag)# wlan EAP-AKA policy EAP-AKA Step 4 end Example: Device(config-policy-tag)# end Returns to Privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 675 Map the WLAN Policy Profile to a WLAN Network Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 676 5 1 C H A P T E R Cisco StadiumVision · Cisco StadiumVision Overview, on page 677 · Configure Parameters for Cisco StadiumVision (GUI), on page 678 · Configure Parameters for Cisco StadiumVision (CLI), on page 678 · Verify StadiumVision Configurations, on page 679 Cisco StadiumVision Overview Cisco StadiumVision solution is a proven, end-to-end, high-definition IPTV solution that provides advanced digital content management and delivery that can transform the look and feel of venues. It is built on top of the Cisco Connected Stadium solution and centrally-managed through the StadiumVision Director. Cisco StadiumVision solution enables the integration and automated delivery of customised and dynamic content from multiple sources to different areas of the stadium in high definition quality. This technology allows you to replay certain exciting and critical moments of a game on Wi-Fi capable devices. To enable Cisco StadiumVision solution on the controller , you need to configure these parameters: 1. On Wireless Controller : · Multicast Data Rate · RX Sensitivity SOP · Multicast Buffer 2. CAPWAP 3. AP Radio Driver and Firmware: · Multicast Data Rate · RX Sensitivity SOP · Multicast Buffer Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 677 Configure Parameters for Cisco StadiumVision (GUI) Network Management Configure Parameters for Cisco StadiumVision (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Wireless > Advanced. Click the High Density tab. In the Multicast Data Rate section, set the data rate for 5 GHz radio or 2.4 GHz radio using the drop-down lists. Click Apply . Configure Parameters for Cisco StadiumVision (CLI) Note Multicast buffer and data rate configurations are supported for all AP models. Procedure Step 1 Command or Action wlan wlan-name wlan-id Example: Device(config)# wlan wlan1 10 Purpose Configures a WLAN. Step 2 multicast buffer multicast-buffer-number Configures enhanced multicast buffer size Example: between 30 (default) and 60 on a WLAN. Device(config-wlan)# multicast buffer 45 Note You can enable only two out of the possible 512 WLANs configured on Controller embedded wireless controller for enhanced multicast buffers. Step 3 ap dot11 [5ghz| 24ghz] multicast data-rate rate Example: Device(config)# ap dot11 [5ghz| 24ghz] rx-sop threshold custom -70 Configures the radio receive sensitivity SOP threshold between -60 to -85 dB, which can also be configured as predefined auto, low, high, medium values specific to 5ghz or 24ghz bands. By default, the configuration is disabled and it's value is set to auto. If the RxSOP value of auto (0) is pushed, then the AP considers the value burnt-in during manufacturing. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 678 Network Management Verify StadiumVision Configurations Verify StadiumVision Configurations · show ap rf-profile name rf-name detail · show ap dot11 5ghz high-density Rx SOP Device#show ap rf-profile name Typical_Client_Density_rf_5gh detail | i SOP Rx SOP Threshold : auto Multicast Buffer Device#show wlan id 1 | sec Buffer Multicast Buffer Multicast Buffer Size : Enabled : 45 Device# Device#sh wlan name vwlc-OpenAuth | inc Buffer Multicast Buffer : Enabled Multicast Buffer Size : 45 Device# Multicast Data Rate Device#sh ap dot11 24ghz high-density AP Name Mac Address Slot Rxsop Threshold Type Value (dbm) Multicast Data Rate(Mbps) ------------------------------------------------------------------------------------ ------------------------------------------------ test-1800-AP aaaa.bbbb.cccc 0 auto 0 54 AP4001.7AB2.BEB6 aaab.bbbb.cccc 2 auto 0 54 AP70DF.2FA2.72EE aaac.bbbb.cccc 0 auto 0 0 Device#show ap dot11 5ghz high-density AP Name Mac Address Slot Rxsop Threshold Type Value (dbm) Multicast Data Rate(Mbps) ------------------------------------------------------------------------------------ ------------------------------------------------- Saji-1800-AP aaab.bbbb.cccc 1 auto 0 12 Saji-2802I-AP aaab.bbbb.cccc 0 custom -82 12 Saji-2802I-AP aaac.bbbb.cccc 1 custom -82 12 AP4001.7AB2.BEB6 aaad.bbbb.cccc 0 custom -82 12 AP4001.7AB2.BEB6 aaae.bbbb.cccc 1 custom -82 0 AP500F.8086.8B56 aaaf.bbbb.cccc 0 custom -82 12 AP500F.8086.8B56 aaag.bbb.cccc 1 custom Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 679 Verify StadiumVision Configurations Network Management -82 AP70DF.2FA2.72EE 0 12 aaah.bbbb.cccc 0 1 auto Device# Device(config)#ap dot11 5ghz rf-profile test_5ghz_rf Device(config-rf-profile)#high-density multicast data-rate RATE_18M Device# show ap rf-profile name test_5ghz_rf detail | inc Multicast Multicast Data Rate : 18 Mbps Device# Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 680 5 2 C H A P T E R Persistent SSID Broadcast · Persistent SSID Broadcast, on page 681 · Configuring Persistent SSID Broadcast, on page 681 · Verifying Persistent SSID Broadcast, on page 682 Persistent SSID Broadcast Access Points within a mesh network work as Root Access Points (RAP) or Mesh Access Points (MAP). RAPs have wired connection to the controller and MAPs have wireless connection to the controller . This feature is applicable only to the Cisco Aironet 1542 Access Points in the Flex+Bridge mode. This feature is about the Root Access Points (RAPs) and Mesh Access Points (MAPs) broadcasting the SSID even when the WAN connectivity is down. This is required in order to isolate the responsibility; whether the fault is with backhaul or with the access wireless network, since there can be different operators owning each part of the network. RAPs and MAPs broadcast SSID while in standalone mode, as long as the default gateway is reachable. Also refer Mesh Deployment Guide for Cisco Catalyst 9800 Series Wireless Controllers. Configuring Persistent SSID Broadcast Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap profile ap-profile-name Example: Device(config)# ap profile ap-profile-name Purpose Enters global configuration mode. Configures the AP profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 681 Verifying Persistent SSID Broadcast Network Management Step 3 Command or Action [no]ssid broadcast persistent Example: Device(config-ap-profile)# [no] ssid broadcast persistent Purpose The ssid broadcast command configures the SSID broadcast mode. The persistent keyword enables a persistent SSID broadcast, where the associated APs will re-join. Use the [no] form of the command to disable the feature. Note Enabling or disabling this feature causes the AP to re-join. Verifying Persistent SSID Broadcast To view the configuration of all Cisco APs, use the following show command: Device#show ap config general Cisco AP Name : AP4C77.6DF2.D598 ================================================= Office Extend Mode : Disabled Persistent SSID Broadcast : Enabled Remote AP Debug : Disabled Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 682 5 3 C H A P T E R Network Monitoring · Network Monitoring , on page 683 · Status Information Received Synchronously - Configuration Examples, on page 683 · Alarm and Event Information Received Asynchronously - Configuration Examples, on page 685 Network Monitoring The mechanism that is used to transfer data to the third-party system is NETCONF/YANG. YANG can be used with the Network Configuration Protocol (NETCONF) to provide the desired solution of automated and programmable network operations. You can contact the API or Developer Support for NETCONF/YANG features using the following link: https://developer.cisco.com/site/support/# The two types of information provided are: · Status information received synchronously - NETCONF is the management interface used for status information, which allows to publish the operational state of the device, including the controller . · Alarm and event information sent asynchronously - NETCONF/YANG push is the solution used for alarm and event information, which provides the mechanism to send NETCONF notifications subscribed for. Status Information Received Synchronously - Configuration Examples NETCONF/YANG interface is used to accomplish customer requests. The prerequisite configuration for Status Information and Alarm and Event Information is to enable NETCONF server on the controller by using the following command: netconf-yang The above command not only enables notifications, but also allows for configuration and operation access (OAM) via Netconf/Yang. For more information on Netconf/Yang, see the NETCONF Protocol chapter of the Programmability Configuration Guide at: https://www.cisco.com/c/en/us/support/ios-nx-os-software/ ios-xe-17/products-installation-and-configuration-guides-list.html Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 683 Status Information Received Synchronously - Configuration Examples Network Management In the Status Information Received Synchronously type, the following information is exported though NETCONF: · Name of the village · APs in each village · Status of each AP · Number of clients currently connected and logged on in each village and each AP All the data for the items listed above is already available as the controller operational data exported through NETCONF. The examples below explain where the data items listed are available. The following command is used in the controller : wireless tag site village_name_1 The site tags can be retrieved by NETCONF using the get-config operation. Example output for Name of the Village: <site-cfg-data xmlns="http://cisco.com/ns/yang/Cisco-IOS-XE-wireless-site-cfg"> [...] <site-tag-configs> <site-tag-config> <site-tag-name>village_name_1</site-tag-name> <description>custom user site tag for a village</description> </site-tag-config> [...] </site-tag-configs> The controller 's operational data contains all the connected (joined) APs and lists their site tags. The example output displays the detailed information about the APs and the site tags. The following example displays the relevant fields and the corresponding controller show commands: Example output of Access Point per Village: <data> <access-point-oper-data xmlns="http://cisco.com/ns/yang/Cisco-IOS-XE-wireless-access-point-oper"> [...] <radio-oper-data> <wtp-mac>00:1b:0c:00:02:00</wtp-mac> #show ap dot11 {24ghz|5ghz} summary "MAC Address" <radio-slot-id>0</radio-slot-id> #show ap dot11 {24ghz|5ghz} summary "Slot" <ap-mac>00:1b:0c:00:02:00</ap-mac> <slot-id>0</slot-id> <radio-type>1</radio-type> # 1 - 2.4GHz, 2 - 5GHz <admin-state>enabled</admin-state> #show ap dot11 {24ghz|5ghz} summary "Admin State" <oper-state>radio-up</oper-state> #show ap dot11 {24ghz|5ghz} summary "Oper State" [...] [...] <capwap-data> <wtp-mac>00:1b:0c:00:02:00</wtp-mac> #show ap summary "Radio MAC" <ap-operation-state>registered</ap-operation-state> #show ap summary "State" <ip-addr>10.102.140.10</ip-addr> #show ap summary "IP Address" [...] <admin-state>1</admin-state> #show ap status "Status", 1 - Enabled, 2 - Disabled <location>default-location </location> #show ap summary "Location" <country-code>CH </country-code> Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 684 Network Management Alarm and Event Information Received Asynchronously - Configuration Examples <name>AP_A-1</name> #show ap summary "AP Name" [...] <tag-info> [...] <site-tag> <site-tag-name>village_name_1</site-tag-name> #show ap name AP_A-1 config general "Site Tag Name" [...] </site-tag> [...] The operational data of the controller contains all the connected wireless clients information, which includes detailed client device information, such as the MAC address, IP address, State and the AP name. Example output of the Number of clients currently online and logged in each village and each AP: <data> <client-oper-data xmlns="http://cisco.com/ns/yang/Cisco-IOS-XE-wireless-client-oper"> <common-oper-data> <client-mac>00:00:1a:04:00:02</client-mac> #show wireless client summary "MAC Address" <ap-name>AP_A-1</ap-name> #show wireless client summary "AP Name" [...] <co-state>client-status-run</co-state> #show wireless client summary "State" Alarm and Event Information Received Asynchronously Configuration Examples The push functionality for the alarm and event information is fulfilled with on-change notifications through NETCONF dynamic subscriptions, with XML encoding. Example output of AP Up/Down Events - Subscription Request: <?xml version="1.0" encoding="UTF-8"?> <rpc message-id="urn:uuid:b0c581c9-ff5a-4352-9e64-7f2ce1ec603a" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0"> <establish-subscription xmlns="urn:ietf:params:xml:ns:yang:ietf-event-notifications" xmlns:yp="urn:ietf:params:xml:ns:yang:ietf-yang-push"> <stream>yp:yang-push</stream> <yp:xpath-filter>/access-point-oper-data/capwap-data/ap-operation-state</yp:xpath-filter> <yp:dampening-period>0</yp:dampening-period> </establish-subscription> </rpc> Reply: <?xml version="1.0" encoding="UTF-8"?> <rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="urn:uuid:673b42b2-e988-4e20-a6c3-0679c08e6114"><subscription-result xmlns='urn:ietf:params:xml:ns:yang:ietf-event-notifications' xmlns:notif-bis="urn:ietf:params:xml:ns:yang:ietf-event-notifications">notif-bis:ok</subscription-result> <subscription-id Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 685 Alarm and Event Information Received Asynchronously - Configuration Examples Network Management xmlns='urn:ietf:params:xml:ns:yang:ietf-event-notifications'>2147483652</subscription-id> </rpc-reply> -->> (Default Callback) Event time : 2018-03-09 15:08:21.880000+00:00 Subscription Id : 2147483651 Type :2 Data : <datastore-changes-xml xmlns="urn:ietf:params:xml:ns:yang:ietf-yang-push"> <yang-patch xmlns="urn:ietf:params:xml:ns:yang:ietf-yang-patch"> <patch-id>null</patch-id> <edit> <edit-id>edit1</edit-id> <operation>merge</operation> <target>/access-point-oper-data/capwap-data</target> <value> <capwap-data xmlns="http://cisco.com/ns/yang/Cisco-IOS-XE-wireless-access-point-oper"> <ap-operation-state>registered</ap-operation-state> <wtp-mac>00ab11006600</wtp-mac> </capwap-data> </value> </edit> </yang-patch> </datastore-changes-xml> <<-- Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 686 5 4 C H A P T E R Creating a Lobby Ambassador Account · Information About Lobby Ambassador Account, on page 687 · Creating a Lobby Ambassador User Account (GUI), on page 687 · Creating a Lobby Ambassador Account (CLI), on page 689 Information About Lobby Ambassador Account A global administrator can create a lobby ambassador (lobby admin) user for creating guest users. While creating a guest user, a lobby ambassador can create and delete a guest user, besides setting the following parameters for a guest user: · Password · Lifetime of the guest user · Guest role profiles (Quality-of-Service profiles that should be applied on a guest using the AAA attribute list. You must ensure that the RADIUS server must be configured with Cisco-AV-pair privilege level with a value greater than zero. Note You can create a lobby admin from a RADIUS or TACACS server, instead of creating one locally. Only the admin can create WLAN and web authentication policies. The admin can also create an AAA attribute list, which the lobby admin can use to map to the corresponding guest user. After an upgrade to Cisco Catalyst 9800 Controller Software release 17.2.x , you must clear the browser cache data to view the lobby admin GUI correctly. Creating a Lobby Ambassador User Account (GUI) You can configure administrator or lobby ambassador usernames and passwords to prevent unauthorized users from reconfiguring the controller and viewing configuration information. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 687 Creating a User Account Network Management Creating a User Account Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 From the home page, choose Administration > User Administration. Click Add. In the User Name field, enter a user name for the new account. From the Policy drop-down list, choose the policy that you want to associate with the user. From the Privilege drop-down list, choose the privilege level that you want to associate with the user by clicking the user privilege icon. The following are the options: · Go to Basic Mode · Go to Advanced Mode Go to Basic Mode: This privilege level defines the commands that users can enter using the CLI after they have logged into the device. Privilege 1 allows access in user EXEC mode and privilege 15 allows access in Privileged EXEC mode. Go to Advanced Mode: Admin: Users with Privilege 15 can execute all the show, config, and exec commands on the device. These users will have access to all the sections of the GUI. Read Only: Users with Privileges 1 to 14 are considered read-only users. The default privilege is 1 if a user is created using the GUI. These users will have access only to the Dashboard and the Monitoring sections. No Access: Users with Privilege 0 can log in to the device through Telnet or SSH and access the CLI. However, they cannot access the GUI. Lobby Admin: Users who can create only guest user accounts. While creating a guest user, a lobby ambassador can create and delete a guest user, besides setting the following parameters for a guest user: · Password · Lifetime of the guest user · Guest role profiles (auality-of-service) profiles that should be applied on a guest using the AAA attribute list. In the Password field, enter a password for the new account. In the Confirm Password field, enter the same password again to reconfirm. Click Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 688 Network Management Logging In Using the Lobby Account Logging In Using the Lobby Account Note Execute the following commands before logging in using the lobby credentials: aaa new-model aaa authorization exec default local ip http authentication aaa Logout from the Administrator account and login using the lobby credentials. You get to view the Guest User page. Creating a Lobby Ambassador Account (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 user-name user-name Example: Device(config)# user-name lobby Creates a user account. Step 3 type lobby-admin Example: Device(config-user-name)# type lobby-admin Specifies the account type as lobby admin. Step 4 password 0 password Example: Device(config-user-name)# password 0 lobby Creates a password for the lobby administrator account. Step 5 aaa attribute list wlan_lobby_access Creates attribute list for lobby admin access. Example: Device(config-user-name)# aaa attribute list lobby-access Step 6 attribute type wlan-profile-name Creates attribute type for lobby admin access. Example: Device(config-user-name)# attribute type wlan_wl_mab Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 689 Creating a Lobby Ambassador Account (CLI) Network Management Step 7 Command or Action exit Example: Device(config-user-name)# exit Purpose Returns to global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 690 5 5 C H A P T E R Lobby Ambassador Account · Information About Lobby Ambassador Account, on page 691 · Creating a Lobby Ambassador User Account (GUI), on page 692 · Creating a Lobby Ambassador Account (CLI), on page 693 · Configuring WLAN (GUI), on page 694 · Client Allowed List, on page 695 · Restrictions for Client Allowed List, on page 695 · Creating a Client Allowed List (GUI), on page 695 · Managing Guest Users, on page 696 · Viewing a Client Allowed List, on page 697 Information About Lobby Ambassador Account A global administrator can create a lobby ambassador (lobby admin) user for creating guest users. While creating a guest user, a lobby ambassador can create and delete a guest user, besides setting the following parameters for a guest user: · Password · Lifetime of the guest user · Guest role profiles (Quality-of-Service profiles that should be applied on a guest using the AAA attribute list. You must ensure that the RADIUS server must be configured with Cisco-AV-pair privilege level with a value greater than zero. Note You can create a lobby admin from a RADIUS or TACACS server, instead of creating one locally. Only the admin can create WLAN and web authentication policies. The admin can also create an AAA attribute list, which the lobby admin can use to map to the corresponding guest user. After an upgrade to Cisco Catalyst 9800 Controller Software release 17.2.x , you must clear the browser cache data to view the lobby admin GUI correctly. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 691 Creating a Lobby Ambassador User Account (GUI) Network Management Creating a Lobby Ambassador User Account (GUI) You can configure administrator or lobby ambassador usernames and passwords to prevent unauthorized users from reconfiguring the controller and viewing configuration information. Creating a User Account Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 From the home page, choose Administration > User Administration. Click Add. In the User Name field, enter a user name for the new account. From the Policy drop-down list, choose the policy that you want to associate with the user. From the Privilege drop-down list, choose the privilege level that you want to associate with the user by clicking the user privilege icon. The following are the options: · Go to Basic Mode · Go to Advanced Mode Go to Basic Mode: This privilege level defines the commands that users can enter using the CLI after they have logged into the device. Privilege 1 allows access in user EXEC mode and privilege 15 allows access in Privileged EXEC mode. Go to Advanced Mode: Admin: Users with Privilege 15 can execute all the show, config, and exec commands on the device. These users will have access to all the sections of the GUI. Read Only: Users with Privileges 1 to 14 are considered read-only users. The default privilege is 1 if a user is created using the GUI. These users will have access only to the Dashboard and the Monitoring sections. No Access: Users with Privilege 0 can log in to the device through Telnet or SSH and access the CLI. However, they cannot access the GUI. Lobby Admin: Users who can create only guest user accounts. While creating a guest user, a lobby ambassador can create and delete a guest user, besides setting the following parameters for a guest user: · Password · Lifetime of the guest user · Guest role profiles (auality-of-service) profiles that should be applied on a guest using the AAA attribute list. In the Password field, enter a password for the new account. In the Confirm Password field, enter the same password again to reconfirm. Click Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 692 Network Management Logging In Using the Lobby Account Logging In Using the Lobby Account Note Execute the following commands before logging in using the lobby credentials: aaa new-model aaa authorization exec default local ip http authentication aaa Logout from the Administrator account and login using the lobby credentials. You get to view the Guest User page. Creating a Lobby Ambassador Account (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 user-name user-name Example: Device(config)# user-name lobby Creates a user account. Step 3 type lobby-admin Example: Device(config-user-name)# type lobby-admin Specifies the account type as lobby admin. Step 4 password 0 password Example: Device(config-user-name)# password 0 lobby Creates a password for the lobby administrator account. Step 5 aaa attribute list wlan_lobby_access Creates attribute list for lobby admin access. Example: Device(config-user-name)# aaa attribute list lobby-access Step 6 attribute type wlan-profile-name Creates attribute type for lobby admin access. Example: Device(config-user-name)# attribute type wlan_wl_mab Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 693 Configuring WLAN (GUI) Network Management Step 7 Command or Action exit Example: Device(config-user-name)# exit Purpose Returns to global configuration mode. Configuring WLAN (GUI) Before you begin You need to enable MAC filtering for Layer 2 authentication to download the redirect URL and ACL. Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Tags & Profiles > WLANs. In the WLANs window, click the name of the WLAN or click Add to create a new one. In the Add/Edit WLAN window that is displayed, click the General tab to configure the following parameters. · In the Profile Name field, enter or edit the name of the profile. · In the SSID field, enter or edit the SSID name. The SSID name can be alphanumeric, and up to 32 characters in length. · In the WLAN ID field, enter or edit the ID number.The valid range is between 1 and 512. · From the Radio Policy drop-down list, choose the 802.11 radio band. · Using the Broadcast SSID toggle button, change the status to either Enabled or Disabled . · Using the Status toggle button, change the status to either Enabled or Disabled . Click the Security tab, and then Layer 2 tab to configre the following parameters: · From the Layer 2 Security Mode drop-down list, choose None. .This setting disables Layer 2 security. · Enter the Reassociation Timeout value, in seconds. This is the time after which a fast transition reassociation times out. · Check the Over the DS check box to enable Fast Transition over a distributed system. · Choose OWE, Opportunistic Wireless Encryption (OWE) provides data confidentiality with encryption over the air between an AP radio and a wireless client. OWE Transition Mode is meant to provide a sort of backwards compatibility. · Choose Fast Transition, 802.11r which is the IEEE standard for fast roaming, introduces a new concept of roaming where the initial handshake with a new AP is done even before the corresponding client roams to the target access point. This concept is called Fast Transition. · Check the check box to enable MAC filtering in the WLAN. · Check the Lobby Admin Access check box to enable Lobby Admin access. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 694 Network Management Client Allowed List Step 5 Click Save & Apply to Device. Client Allowed List Clients in universities and hotels need access to networks for a limited period of time. These locations also receive many guests with multiple devices. Therefore it becomes important to protect the networks from misuse or unauthorized access, and allow legitimate clients to connect to the corresponding network. The client listing feature addresses the need of creating an allowed list for clients on a particular WLAN or SSID- based MAC address. When you create a new client MAC address as an allowed list user with an invalid WLAN profile name, you must be careful while you map the client MAC to the WLAN profile. Client allowed list is supported only with MAC addresses that are without a delimiter format. Two types of administrator roles defined are: · Global Administrator: Creates a lobby admin user on the controller and enables the lobby administrators access each to the WLAN. · Lobby Administrator: Adds or deletes a client from the allowed list to manage the association to a WLAN or SSID through the GUI only. Existing lobby administrators can also be used to configure the allowed list. Restrictions for Client Allowed List A lobby admin can add clients to allowed list only through the graphical user interface (GUI) and not through the command-line interface (CLI). Creating a Client Allowed List (GUI) This section provides multiple methods that you can use as a lobby administrator to create an allowed list for valid users for a WLAN. Adding Single MAC Address to Allowed List Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Log into Lobby Admin portal. Click Whitelist Users. From the drop-down list, choose WLAN. Click Add New Whitelist User. Select By MAC Address radio button. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 695 Adding Bulk MAC Address to Allowed List Network Management Step 6 Step 7 Enter the MAC address and Description. Click Apply to Device. Adding Bulk MAC Address to Allowed List Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Log into Lobby Admin portal. Click Whitelist Users. From the drop-down list, choose the WLAN. Click Add New Whitelist User. Select Bulk Import radio button. Select the CSV file that lists the clients in MAC Address, Description format. Click Apply to Device. Managing Guest Users Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Log in to Lobby Admin portal using the lobby admin credentials. Click Whitelist Users. From the WLANdrop-down list, choose the correspondingWLAN. From the WLAN Mode, select Onboarding to enable clients to access the network. Click Apply. From the Connected/Not Whitelisted in the Whitelist window, select a MAC address . Once the clients join the controller, the MAC addresses are listed in the Connected/Not Whitelisted. In the Onboarding mode, MAC filtering in the selected WLAN is disabled. In such a scenario you can change the mode using Secure mode. Select Secure to automatically add the clients that are connected to the allowed list. In the secure mode, MAC filtering in the selected WLAN is enabled. Click Apply to Device. The clients are listed in the Connected/Whitelisted. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 696 Network Management Viewing a Client Allowed List Viewing a Client Allowed List Procedure Step 1 Step 2 Step 3 Log in to the Lobby Admin portal. Click Whitelist Users. From the WLANdrop-down list, choose the corresponding WLAN . The window lists the following information: · Connected/Whitelisted: Lists the clients that are connected and added to the allowed list by the Lobby admin. · Connected/Not Whitelisted: Lists the clients that are connected, but not added to the allowed list by the Lobby admin. · Not Connected/Whitelisted: Listed the clients that are not connected but added to the allowed list. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 697 Viewing a Client Allowed List Network Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 698 5 6 C H A P T E R Guest User Accounts · Information About Creating Guest User Accounts, on page 699 · Creating a Guest User Account (GUI), on page 699 · Creating a Guest User Account (CLI), on page 700 · Verifying Guest User Account, on page 701 · Assigning Username to Guest Users in a WLAN (CLI), on page 702 Information About Creating Guest User Accounts The controller can provide guest user access on WLANs for which you must create guest user accounts. Guest user accounts can be created by network administrators, or, if you would like a non-administrator to be able to create guest user accounts on demand, you can do so through a lobby administrator account. The lobby ambassador has limited configuration privileges and access only to the web pages used to manage the guest user accounts. The lobby ambassador can specify the amount of time that the guest user accounts remain active. After the specified time elapses, the guest user accounts expire automatically. You can associate user name with WLAN profile name to restrict guest users in a specific WLAN. Prerequisites for Guest Users · Guest users are created by administrator or lobby ambassador. · Guest user should not have device access either through telnet/ssh or WebUI. · Guest user should be role-based. · Guest user should be able to connect to the network and access internet. Creating a Guest User Account (GUI) Procedure Step 1 Choose Configuration > Security > Guest User. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 699 Creating a Guest User Account (CLI) Network Management Step 2 Step 3 Step 4 Step 5 Step 6 On the Guest User page, click Add. Enter a user name, password, and description for the new account. Check the Generate password check box to automatically generate a password. Enter the number of simultaneous user logins. Valid values range between 0 to 64. Enter 0 for unlimited users. In the Lifetime section, choose the number of years, months, days, hours, and minutes. Click Save & Apply to Device. Creating a Guest User Account (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 user-name guest-user-name Example: Device(config)# user-name guest Creates a guest user account. Step 3 type network-user description description Specifies the account type as guest user account. guest-user max-login-limit number of simultaneous logins lifetime year yy month mm day day hour hour minute minute second second Example: Device(config-user-name)# type network-user description sample-description guest-user max-login-limit 3 lifetime 1 years 0 months 0 days 0 hours 0 mins 0 secs Step 4 password 0 password Example: Device(config-user-name)# password 0 guest Creates a password for the guest user account. Step 5 aaa attribute list aaa-attribute-list-name Example: Creates a AAA attribute list to apply QoS profiles on the guest user account. Device(config-user-name)# aaa attribute list aaa-attribute-list-name Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 700 Network Management Verifying Guest User Account Step 6 Command or Action exit Example: Device(config-user-name)# exit Purpose Returns to global configuration mode. Note If the lobby admin is local, enter the following command: aaa authentication login default local If the lobby admin is a remote user, enter the following commands: aaa authentication login default group radius/tacacs aaa remote username <remote-lobby-admin-name> In case of local or remote lobby, enter the following command to map the authorization policies: aaa authorization exec default local Verifying Guest User Account To verify all the guest user accounts, use the following command: Device# show aaa local guest_user all User-Name : new4 Type : GUEST USER Password :* Is_passwd_encrypted : No Attribute-List : Not-Configured Viewname : Not-Configured Lobby Admin Name : NEW_LOBBY_ADMIN Max Login Limit :0 Description : guest Start-Time : 07:56:39 IST Jan 25 2019 Lifetime : 1 years 0 months 0 days 0 hours 0 mins 0 secs Expiry-Time : 07:56:39 IST Jan 20 2020 Remaining Lifetime : 0 years 11 months 29 days 22 hours 52 mins 49 secs To verify a specific guest user account, use the following command: Device# show aaa local guest_user new_guest3 User-Name : new_guest3 Type : GUEST USER Password :* Is_passwd_encrypted : No Attribute-List : Not-Configured Viewname : Not-Configured Lobby Admin Name : INVALID_ADMIN Max Login Limit :9 Description : new Start-Time : 04:39:01 IST Feb 4 2019 Lifetime : 1 years 0 months 0 days 0 hours 0 mins 0 secs Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 701 Assigning Username to Guest Users in a WLAN (CLI) Network Management Expiry-Time : 04:39:01 IST Jan 30 2020 Remaining Lifetime : 0 years 11 months 11 days 21 hours 16 mins 34 secs Assigning Username to Guest Users in a WLAN (CLI) Before you begin · If wlan-profile-name is configured for a user, guest user authentication is allowed only from that WLAN. · If wlan-profile-name is not configured for a user, guest user authentication is allowed on any WLAN. · To work in a connected mode, you need to configure AAA policy override under both SSID policies before assigning a username to a guest user on a WLAN. Procedure Step 1 Step 2 Step 3 Step 4 Command or Action Purpose configure terminal Enters configuration mode. Example: Device# configure terminal username user_name mac wlan-profile-name Assigns a username to the WLAN profile. profile_name Note The wlan-profile-name per user is Example: applicable for MAC type users. Device(config)# username user_name mac wlan-profile-name profile_name show aaa local guest_user new_guest3 Example: (Optional) Displays the values of the WLAN profile. Device# show aaa local guest_user new_guest3 end Returns to privileged EXEC mode. Example: Device# end Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 702 5 7 C H A P T E R Link Local Bridging · Feature History for Link Local Bridging, on page 703 · Information About Link Local Bridging , on page 703 · Use Case for Link Local Bridging, on page 704 · Guidelines and Restrictions for Link Local Bridging, on page 704 · Enabling Link Local Bridging Per Policy Profile (GUI), on page 704 · Enabling Link Local Bridging Per Policy Profile (CLI), on page 705 · Verifying Link Local Bridging, on page 705 Feature History for Link Local Bridging This table provides release and related information for the feature explained in this module. This feature is available in all the releases subsequent to the one in which it is introduced in, unless noted otherwise. Table 52: Feature History for Link Local Bridging Release Cisco IOS XE Bengaluru 17.6.1 Feature Link Local Bridging Feature Information The Link Local Bridging feature allows you to manage link-local traffic in intercontroller and intracontroller roaming scenarios. Information About Link Local Bridging In Cisco IOS XE Bengaluru 17.5.1 and earlier releases, client packets were forwarded through the access VLAN of a client. The client also received all the IPv4 or IPv6 packets from its assigned access VLAN. When an L3 client roamed from one controller to another controller, the point-of-presence (PoP) remained with the first controller, also known as the anchor controller or the home controller, and the point-of-attachment (PoA) moved to the second controller, also known as the foreign controller or the visited controller. In this anchor-foreign scenario, the client packets were tunneled back to the anchor controller to be forwarded on the access VLAN of the client. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 703 Use Case for Link Local Bridging Network Management Similarly, in case of L3 intracontroller roaming, when the feature Roaming Across Policy Profile is enabled, the client access VLAN is maintained, regardless of the policy profile VLAN. In such a scenario, the PoA becomes the destination policy profile VLAN. A roaming wireless client is served better by the local services present near its PoA rather than discovering services present at its PoP. Therefore, from Cisco IOS XE Bengaluru 17.6.1 onwards, the intracontroller and intercontroller roaming scenarios described above, can now be managed with the help of the Link Local Bridging feature. Link Local Bridging is disabled by default. Use Case for Link Local Bridging If you have a local mode deployment, and L3 roaming is used to manage roaming clients across physical locations, the Link Local Bridging feature helps you to discover services, for example, using mDNS, which are physically close to the wireless client. Guidelines and Restrictions for Link Local Bridging · The Link Local Bridging feature is supported in local-mode or FlexConnect central switching. · Only mDNS bridge mode is supported with Link Local Bridging. · Guest profiles are not supported. · Wired Guest LAN, Remote LAN (RLAN), and Inter-Release Controller Mobility (IRCM) are not supported. · Mesh and IP Source Guard (IPSG) is not supported when the Link Local Bridging feature is enabled. · Enabling Link Local Bridging on the anchor controller and disabling it on the foreign controller is not supported, even if roaming is successful. · Access VLAN and bridge VLAN should be operational, for the Link Local Bridging feature to work. · Link Local Bridging must be enabled across policy profiles for the same SSID. · Wireless multicast-over-multicast (wireless multicast multicast IP address ) must be configured, before enabling the Link Local Brigding feature. Therefore, the wireless multicast link-local command is enabled by default when wireless multicast is enabled. Enabling Link Local Bridging Per Policy Profile (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Tags & Profiles > Policy. Click Add. The Add Policy Profile window is displayed. In the Add Policy Profile page, in the General tab, enter the name of the policy profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 704 Network Management Enabling Link Local Bridging Per Policy Profile (CLI) Step 4 Step 5 In the Advanced tab, check the Link-Local Bridging check box to enable link-local bridging on the policy profile. Note When link-local bridging is enabled, Export Anchor will be disabled and Central Switching will be enabled automatically. Click Apply to Device. Enabling Link Local Bridging Per Policy Profile (CLI) To enable link local bridging per policy profile, follow these steps. Before you begin Ensure that wireless multicast-over-multicast and wireless multicast link-local are enabled. Note From Cisco IOS XE Bengaluru 17.6.1, the wireless multicast link-local setting is enabled by default as soon as multicast is enabled. This means that all the downstream multicast link-local frames will be forwarded to wireless clients. In the Cisco IOS XE Bengaluru 17.5.x and the earlier releases, only mDNS multicast link-local frames were forwarded. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-name Creates policy profile for the WLAN. Example: Device(config)# wireless profile policy wireless-profile1 Step 3 link-local-bridging Example: Device(config-wireless-policy)# link-local-bridging Enables link local bridging per policy profile. Verifying Link Local Bridging To verify the configuration status of Link Local Bridging, use the following command: Device# show wireless profile policy detailed policy1 Policy Profile Name : policy1 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 705 Verifying Link Local Bridging Network Management Description : Status : ENABLED VLAN : 81 Multicast VLAN :0 OSEN client VLAN : Multicast Filter : DISABLED QBSS Load : ENABLED Passive Client : DISABLED ET-Analytics : DISABLED StaticIP Mobility : DISABLED WLAN Switching Policy Flex Central Switching : ENABLED Flex Central Authentication : ENABLED Flex Central DHCP : ENABLED Flex NAT PAT : DISABLED . . . ------------------------------------------------------- mDNS Gateway mDNS Service Policy name : default-mdns-service-policy User Defined (Private) Network : Disabled User Defined (Private) Network Unicast Drop : Disabled Policy Proxy Settings ARP Proxy State : DISABLED IPv6 Proxy State : None Airtime-fairness Profile 2.4Ghz ATF Policy : default-atf-policy 5Ghz ATF Policy : default-atf-policy Link-local bridging : ENABLED To verify if Link Local Bridging VLAN is included, use the following command: Device# show wireless client mac 7xxx.3xxx.3xxx detail Client MAC Address : 7xxx.3xxx.3xxx . . . Link-local bridging VLAN: 3 . . . WiFi Direct Capabilities: WiFi Direct Capable : No To verify if link local multicast traffic is enabled, use the following command: Device# show wireless multicast Multicast AP Capwap Multicast Wireless Broadcast Wireless Multicast non-ip-mcast Wireless Multicast link-local : Disabled : Unicast : Disabled : Disabled : Enabled Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 706 5 8 C H A P T E R Web Admin Settings · Information About Web Admin Settings, on page 707 · Configuring HTTP/HTTPS Access , on page 707 · Configuring HTTP Trust Point, on page 708 · Configuring Netconf Yang, on page 709 · Configuring Timeout Policy , on page 709 · Configuring VTY, on page 710 Information About Web Admin Settings This chapter outlines the various settings to access the controller's web interface. These include setting up the controller for communication with others in the network, configuring the management interface to connect over IP, setting up the number of users and protocols to access the controller remotely and configure the source interface for file transfers depending upon the preferred file transfer protocols. Use the Administration > Management > HTTP/HTTPS/Netconf/VTY page to configure system-wide settings. Configuring HTTP/HTTPS Access HTTP/HTTPS access allows users to access the controller's WebUI using its IP address. You can either allow users to connect securely over HTTPS or over HTTP, which is not a secure connection. Use the Administration > Management > HTTP/HTTPs/Netconf/VTY page to configure secure access to the controller. Procedure Step 1 Step 2 Enable HTTP Access and enter the port that will listen for HTTP requests. The default port is 80. Valid values are 80, and ports between 1025 and 65535. Enable HTTPS Access on the device and enter the designated port to listen for HTTPS requests. The default port is 1025. Valid values are 443, and ports between 1025 and 65535. Enabling HTTPs access allows users to access the controller's GUI using 'https://ip-address' . On a secure HTTP connection, data to and from an HTTP server is encrypted before being sent over the Internet. HTTP Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 707 Configuring HTTP Trust Point Network Management Step 3 Step 4 Step 5 with SSL encryption provides a secure connection to allow such functions as configuring a switch from a Web browser. Enable Personal Identity Verification (PIV) for two factor authentication. This method of authentication allows users to access the WebUI using Personal Identity Verification (PIV) compatible smart cards, enabling login without password. For this to work, ensure that you have configured the trustpoint, CA server certificate on the device and the client certificate signed by the CA server on the browser. Failure to provide the client certificate would deny access to the UI. Set the Personal Identity Verification Authorization only option to Enabled for authorizing a user's permissions and restrictions based on a remote TACACS+/RADIUS security server. Click Apply to save the configuration. Note In order to use Personal Identity Verification (PIV) for two factor authentication on Safari, perform the following steps. a. Open Safari browser and go to Settings > Advanced 1. Check the Show Develop in menu bar check box. This enables the Develop option in the top menu bar. 2. Click Develop, and from the dropdown, select Empty Caches. b. Open the web url to login. Configuring HTTP Trust Point Certificate authorities (CAs) manage certificate requests and issue certificates to participating network devices. These services provide centralized security key and certificate management for the participating devices. Specific CA servers are referred to as trustpoints. When a connection attempt is made, the HTTPS server provides a secure connection by issuing a certified X.509v3 certificate, obtained from a specified CA trustpoint, to the client. The client (usually a Web browser), in turn, has a public key that allows it to authenticate the certificate. For secure HTTP connections, we highly recommend that you configure a CA trustpoint. If a CA trustpoint is not configured for the device running the HTTPS server, the server certifies itself and generates the needed RSA key pair. Because a self-certified (self-signed) certificate does not provide adequate security, the connecting client generates a notification that the certificate is self-certified, and the user has the opportunity to accept or reject the connection. This option is useful for internal network topologies (such as testing). If you do not configure a CA trustpoint, when you enable a secure HTTP connection, either a temporary or a persistent self-signed certificate for the secure HTTP server (or client) is automatically generated. If the device is not configured with a hostname and a domain name, a temporary self-signed certificate is generated. If the switch reboots, any temporary self-signed certificate is lost, and a new temporary new self-signed certificate is assigned. If the device has been configured with a host and domain name, a persistent self-signed certificate is generated. This certificate remains active if you reboot the device or if you disable the secure HTTP server so that it will be there the next time you re-enable a secure HTTP connection. Use the Trust Point Configurationsection of the Administration > Management > HTTP/HTTPs/Netconf/VTY page to make these changes. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 708 Network Management Configuring Netconf Yang Before you begin You must have configured a trustpoint for web administration purposes. Procedure Step 1 Step 2 Step 3 Tap to enable the Trust Point. Select the appropriate Trust Point from the drop-down list to to be used for webadmin purpose. If you have not configured a trust point earlier, you can navigate to the appropriate page and first configure it. Click Apply to save the configuration. Configuring Netconf Yang NETCONF provides a mechanism to install, manipulate, and delete the configuration of network devices. If the NETCONF connection is configured to use AAA for authentication purposes, it uses only the default Method List and cannot be pointed to use any other named Method List. Use the Netconf Yang Configuration section of the Administration > Management > HTTP/HTTPs/Netconf/VTY page to make these changes. Procedure Step 1 Step 2 Step 3 Enable NETCONF. Enter the SSH port number that will be used to facilitate communication between a client and a server. The default port is 830. Click Apply to save the configuration. Configuring Timeout Policy The Timeout Policy Configuration allows you to configure the details of the interval that the management sessions can remain idle before they timeout. Once the time value is reached, you must log in again to be able to reestablish the connection. Use the Timeout Policy Configuration section of the Administration > Management > HTTP/HTTPs/Netconf/VTY page to make these changes. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 709 Configuring VTY Network Management Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Enter the maximum number of seconds a connection to the HTTP server should remain open before they timeout in the HTTP Timeout-policy field. Once the time value is reached, you must log in again to be able to reestablish connection. Enter the maximum number of seconds the connection will be kept open if no data is received or if response data cannot be sent out on the connection in the Session Idle Timeoutfield Note that a new value may not take effect on any already existing connections. If the server is too busy or the limit on the life time or the number of requests is reached, the connection may be closed sooner. The default value is 180 seconds (3 minutes). Enter the maximum number of seconds the connection will be kept open, from the time the connection is established in the Server Life Time field. Note that the new value may not take effect on any already existing connections. If the server is too busy or the limit on the idle time or the number of requests is reached, it may close the connection sooner. Also, since the server will not close the connection while actively processing a request, the connection may remain open longer than the specified life time if processing is occurring when the life maximum is reached. In this case, the connection will be closed when processing finishes. The default value is 180 seconds (3 minutes). The maximum value is 86400 seconds (24 hours). Enter a value for the maximum limit on the number of requests processed on a persistent connection before it is closed in the Max Number of Requests field. Note that the new value may not take effect on already existing connections. If the server is too busy or the limit on the idle time or the life time is reached, the connection may be closed before the maximum number of requests are processed. The default value is 1. The maximum value is 86400. Click Apply to save the configuration. Configuring VTY VTY is a virtual port used for Telnet or SSH access to the device.VTY is solely used for inbound connections to the device. You can configure the number of simultaneous connections to your device and add security to validate these connections. Use the VTYsection of the Administration > Management > HTTP/HTTPs/Netconf/VTY page to make these changes. Procedure Step 1 Set the number of vty lines to allow the number of simultaneous access to the device remotely. Virtual Terminal Lines or Virtual TeleType (VTY) is a virtual way of accessing the controller 's CLI remotely, unlike physically connecting a laptop to the controller though a console. The number of VTY lines is the maximum number of simultaneous connections possible. 0-50 allows up to fifty simultaneous telnet or ssh sessions to the controller. Although the default is set at 15, we recommend that you to increase the number of VTY lines to 50 to avoid a disruption in connectivity when there are multiple connections to the device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 710 Network Management Configuring VTY Step 2 Step 3 Step 4 Select the protocol for the remote connection from the VTY Transport Mode drop-down list. You can split the connections based on protocol. For e.g. 0-5 might allow for SSH and 10-20 might allow Telnet. (Optional) You can add security in the WebUI to validate login requests. To configure AAA authentication and authorization for inbound sessions to vty lines on your system you must first configure a Radius or a TACACS+ authentication server and select the authentication and authorization list from the corresponding drop-downs. Click Apply to save the configuration. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 711 Configuring VTY Network Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 712 5 9 C H A P T E R Web UI Configuration Command Accounting in TACACS Server · Feature History for Web UI Configuration Command Accounting in TACACS+ Server, on page 713 · Information About Web UI Configuration Command Accounting in TACACS+ Server, on page 713 · Guidelines for Web UI Configuration Command Accounting in TACACS+ Server, on page 714 · Configuring AAA Accounting Using Default Method List (CLI), on page 714 · Configuring HTTP Command Accounting Using Named Method List (CLI), on page 715 Feature History for Web UI Configuration Command Accounting in TACACS+ Server This table provides release and related information for the feature explained in this module. This feature is also available in all the releases subsequent to the one in which they are introduced in, unless noted otherwise. Table 53: Feature History for Web UI Configuration Command Accounting in TACACS+ Server Release Cisco IOS XE Cupertino 17.9.1 Feature Logging Web UI-Based Configuration Changes in TACACS+ Server Feature Information This feature logs all configuration changes made in controller web UI. Support for logging configurations done in IOS console in TACACS+ server is already available. Information About Web UI Configuration Command Accounting in TACACS+ Server The Cisco Catalyst 9800 Series Wireless Controller configuration is stored in databases. Prior to Cisco IOS XE Cupertino 17.9.1 release, audit log or traceability were not available for the configuration changes stored in databases that were made from the controller GUI. With the Cisco IOS XE Cupertino 17.9.1 release, along with the existing configuration logging of commands executed from Cisco IOS console to TACACS+ server, Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 713 Guidelines for Web UI Configuration Command Accounting in TACACS+ Server Network Management support is also added to log the configuration changes done from the controller GUI to TACACS+ server. The logging information includes the command, user, and other session related parameters. Guidelines for Web UI Configuration Command Accounting in TACACS+ Server · By default, the configuration commands are not logged to TACACS+ server without configuring command accounting. · All commands are accounted when AAA default command accounting is configured only for privilege 15. · When AAA default command accounting is not configured and commands need to be logged in the TACACS+ server, do the following: 1. The HTTP named method list command accounting. 2. The AAA named method list (same as the one configured in Step 1) command accounting. Configuring AAA Accounting Using Default Method List (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 aaa accounting commands privilege_level Creates an accounting method list and enables default start-stop group group-name accounting. Example: Device(config)# aaa accounting commands 15 default start-stop group group-name · privilege_level: AAA accounting level. The valid range is from 0 to 15. · group-name: AAA accounting group that supports only TACACS+ group. Step 3 end Example: Device(config)# end Returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 714 Network Management Configuring HTTP Command Accounting Using Named Method List (CLI) Configuring HTTP Command Accounting Using Named Method List (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ip http accounting commands level named-accounting-method-list Example: Device(config)# ip http accounting commands 1 oneacct Step 3 end Example: Device(config)# end Purpose Enters global configuration mode. Configures HTTP command accounting using the named method list. · level: Privilege value from 0 to 15. By default, the following command privilege levels are available on the controller: · 0: Includes the disable, enable, exit, help, and logout commands. · 1: Includes all the user-level commands at the controller prompt (>). · 15: Includes all the enable-level commands at the controller prompt (>). · named-accounting-method-list: Name of the predefined command accounting method list. Returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 715 Configuring HTTP Command Accounting Using Named Method List (CLI) Network Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 716 6 0 C H A P T E R Embedded Packet Capture · Feature History for Embedded Packet Capture, on page 717 · Information About Embedded Packet Capture, on page 717 · Configuring Embedded Packet Capture (CLI), on page 718 · Verifying Embedded Packet Capture, on page 720 Feature History for Embedded Packet Capture This table provides release and related information about the feature explained in this section. This feature is also available in all the releases subsequent to the one in which they are introduced in, unless noted otherwise. Table 54: Feature History for Embedded Packet Capture Release Feature Cisco IOS XE Dublin Embedded Packet 17.12.1 Capture Feature Information The Embedded Packet Capture feature is enhanced to support increased buffer size, continuous capture, and filtering of multiple MAC addresses in one Embedded Packet Capture (EPC) session. Information About Embedded Packet Capture The Embedded Packet Capture feature helps in tracing and troubleshooting packets. The Embedded Packet Capture on the controller is used for troubleshooting multiple issues, such as, authentication issues with RADIUS, AP join or disconnection, client forwarding, disconnection, and roaming, and other specific features such as multicast, mDNS, umbrella, mobility, and so on.This feature allows network administrators to capture data packets flowing through, to, and from a Cisco device. When troubleshooting an AP join or a client onboarding issue, if you are unable to stop capture as soon as an issue occurs, important information might be lost. In most cases, a buffer of 100 MB is not sufficient for data capture. Moreover, the existing Embedded Packet Capture feature supports only the filtering of one inner MAC address, which captures the traffic of a specific client. At times, it is difficult to pin-point which wireless client is facing an issue. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 717 Configuring Embedded Packet Capture (CLI) Network Management From Cisco IOS XE Dublin 17.12.1, the Embedded Packet Capture feature supports increased buffer size, continuous capture, and filtering of multiple MAC addresses in one Embedded Packet Capture session. There are no GUI steps to configure the Embedded Packet Capture enhancement. Configuring Embedded Packet Capture (CLI) With the Embedded Packet Capture feature enhancement, the buffer size is increased from 100 MB to 500 MB. Note Buffer is of memory type. You can either maintain a memory buffer or copy the memory buffer that is present in a file to store more information. Procedure Step 1 Step 2 Step 3 Step 4 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. monitor capture epc-session-name interface Configures the Gigabit Ethernet interface for GigabitEthernet interface-number {both | in inbound, outbound, or both inbound and | out} outbound packets. Example: Device# monitor capture epc-session1 interface GigabitEthernet 0/0/1 both Gigabit is for Cisco 9800-CL controllers, for example, Gi1, Gi2, or Gi3. For physical controllers, you must specify the port channel, if configured. Examples for physical interfaces are Te or Tw. Note You can also run the control-plane command to capture the packet punt to the CPU. (Optional) monitor capture epc-session-name Configures monitor capture limit, in seconds. limit duration limit-duration Example: Device# monitor capture epc-session1 limit duration 3600 (Optional) monitor capture epc-session-name Configures the file in circular buffer. (Buffer buffer circular file no-of-files file-size can be circular or linear). per-file-size When circular is configured, the files work Example: as a ring buffer. The value range of the number Device# monitor capture epc-session1 of files to be configured is from 2 to 5. The buffer circular file 4 file-size 20 value range of the file size is from 1 MB to 500 MB. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 718 Network Management Configuring Embedded Packet Capture (CLI) Step 5 Step 6 Step 7 Command or Action Purpose There are various keywords available for the buffer command, such as, circular, file, and size. Here, the circular command is optional. Note Circular buffer is needed for continuous capture. This step generates swap files in the controller. Swap files are not packet capture (PCAP) files, and therefore, cannot be analyzed. When the export command is run, the swap files are combined and exported as one PCAP file. monitor capture epc-session-name match {any | ipv4 | ipv6 | mac | pklen-range} Example: Device# monitor capture epc-session1 match any Configures inline filters. Note You can configure filters and ACLs. (Optional) monitor capture epc-session-name Configures a monitor capture specifying an access-list access-list-name access list as the filter for the packet capture. Example: Device# monitor capture epc-session1 access-list access-list1 (Optional) monitor capture epc-session-name Configures continuous packet capture. Enables continuous-capture http:location/filename the automatic export of files to a specific Example: location before the buffer is overwritten. Device# monitor capture epc-session1 continuous-capture Note · Circular buffer is needed for continuo capture. https://www.cisco.com/epc1.pcap · Configure the filename with a .pcap extension. · An example of the filename and nomenclature used to generate the filename is as follows: CONTINUOUS_CAP_20230601130203.pc CONTINUOUS_CAP_20230601130240.pc · After the packets are exported automatically, the buffer is not cleared until it is overwritten by the new incomi capture packets, or cleared, or deleted commands. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 719 Verifying Embedded Packet Capture Network Management Step 8 Command or Action Purpose (Optional) [no] monitor capture Configures up to 10 MAC addresses as inner epc-session-name inner mac MAC1 [MAC2... MAC filter. MAC10] Note · You can not modify the Example: inner MACs while the Device# monitor capture epc-session1 capture is in progress. inner mac 1.1.1 2.2.2 3.3.3 4.4.4 · You can enter the MAC addresses in a single command or by using multiple command lines. Because of the character string limitation, you can enter only five MAC addresses in a single command line. You can enter the rest of the MAC addresses in the next command line. · If the number of configured inner MAC addresses is 10, a new MAC address cannot be configured until you delete an old configured inner MAC address. Step 9 Step 10 Step 11 monitor capture epc-session-name start Starts capture of packet data. Example: Device# no monitor capture epc-session1 start monitor capture epc-session-name stop Stops capture of packet data. Example: Device# no monitor capture epc-session1 stop monitor capture epc-session-name export filelocation/filename Example: Device# monitor capture epc-session1 export https://www.cisco.com/ecap-file.pcap Exports captured data for analysis when continuous capture is not configured. Verifying Embedded Packet Capture To view the configured file number and per file size, run the following command: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 720 Network Management Verifying Embedded Packet Capture Note The following command is displayed irrespective of whether continuous capture is enabled or not. The configured inner MAC addresses are also displayed using this command. Device# show monitor capture epc-session1 Status Information for Capture epc-session1 Target Type: Interface: TwoGigabitEthernet0/0/0, Direction: BOTH Status : Inactive Filter Details: Capture all packets Inner Filter Details: Continuous capture: enabled Continuous capture path: ftp://mgcusr:mgcusr@10.124.19.169//home/mgcusr/xij/repo.pcap Buffer Details: Buffer Type: CIRCULAR No of files: 5 File Size (in MB): 21 Limit Details: Number of Packets to capture: 0 (no limit) Packet Capture duration: 3600 Packet Size to capture: 0 (no limit) Maximum number of packets to capture per second: 1000 Packet sampling rate: 0 (no sampling) To view the configured Embedded Packet Capture buffer files, run the following commands: Device# show monitor capture epc-session1 buffer brief ---------------------------------------------------------------------------- # size timestamp source destination dscp protocol ---------------------------------------------------------------------------- 0 1386 0.000000 192.168.10.117 -> 192.168.10.100 0 BE UDP 1 1378 0.000000 192.168.10.100 -> 192.168.10.117 0 BE UDP 2 1386 0.001007 192.168.10.117 -> 192.168.10.100 0 BE UDP Device# show monitor capture epc-session1 buffer dump 0 0000: 6C8BD3FE AEC0F4BD 9E566E4B 8100000A l........VnK.... 0010: 08004500 05500000 0000FF11 2073C0A8 ..E..P...... s.. 0020: 0A64C0A8 0A75147F 1480053C 00000010 .d...u.....<.... 0030: 03000000 00000288 0000C48E 8FC860CF ..............`. 0040: DC8C3759 4B203468 95299EA5 00000000 ..7YK 4h.)...... 0050: AAAA0300 00000800 4500050A 92154000 ........E.....@. 0060: 40060BBC C0A80B67 C0A80B65 A7E0139D @......g...e.... 0070: 32595FD8 0F2D6065 801001F6 EA440000 2Y_..-`e.....D.. 0080: 0101080A BFCB4934 A959414F 36373839 ......I4.YAO6789 0090: 30313233 34353637 38393031 32333435 0123456789012345 00A0: 36373839 30313233 34353637 38393031 6789012345678901 00B0: 32333435 36373839 30313233 34353637 2345678901234567 00C0: 38393031 32333435 36373839 30313233 8901234567890123 00D0: 34353637 38393031 32333435 36373839 4567890123456789 00E0: 30313233 34353637 38393031 32333435 0123456789012345 00F0: 36373839 30313233 34353637 38393031 6789012345678901 0100: 32333435 36373839 30313233 34353637 2345678901234567 . . . Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 721 Verifying Embedded Packet Capture Network Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 722 V I P A R T System Management · Network Mobility Services Protocol, on page 725 · Application Visibility and Control, on page 739 · Software-Defined Application Visibility and Control, on page 761 · Cisco Hyperlocation, on page 765 · FastLocate for Cisco Catalyst Series Access Points, on page 781 · IoT Services Management, on page 785 · IoT Module Management in the Controller, on page 791 · Cisco Spaces, on page 795 · EDCA Parameters, on page 799 · Adaptive Client Load-Based EDCA, on page 803 · 802.11 parameters and Band Selection, on page 807 · NBAR Protocol Discovery, on page 829 · Conditional Debug, Radioactive Tracing, and Packet Tracing, on page 831 · Aggressive Client Load Balancing, on page 845 · RF based Automatic AP Load Balancing, on page 849 · Accounting Identity List, on page 855 · Support for Accounting Session ID, on page 859 · Interim Accounting, on page 863 · Wireless Multicast, on page 865 · Map-Server Per-Site Support, on page 885 · Volume Metering, on page 893 · Enabling Syslog Messages in Access Points and Controller for Syslog Server, on page 895 · Login Banner, on page 907 · Wi-Fi Alliance Agile Multiband , on page 909 · SNMP Traps, on page 915 · Disabling Clients with Random MAC Address, on page 921 · Dataplane Packet Logging, on page 925 · Streaming Telemetry, on page 931 · Application Performance Monitoring, on page 945 · Wireless Clients ThresholdWarning, on page 951 · Intelligent Capture Hardening, on page 953 6 1 C H A P T E R Network Mobility Services Protocol · Information About Network Mobility Services Protocol, on page 725 · Radioactive Tracing for NMSP, on page 726 · Enabling NMSP on Premises Services, on page 726 · Modifying the NMSP Notification Interval for Clients, RFID Tags, and Rogues , on page 727 · Modifying the NMSP Notification Threshold for Clients, RFID Tags, and Rogues, on page 727 · Configuring NMSP Strong Cipher, on page 728 · Verifying NMSP Settings, on page 728 · Examples: NMSP Settings Configuration, on page 731 · NMSP by AP Groups with Subscription List from CMX, on page 731 · Verifying NMSP by AP Groups with Subscription List from CMX, on page 731 · Probe RSSI Location, on page 733 · Configuring Probe RSSI , on page 733 · RFID Tag Support, on page 735 · Configuring RFID Tag Support, on page 735 · Verifying RFID Tag Support, on page 736 Information About Network Mobility Services Protocol Cisco Network Mobility Services Protocol (NMSP) is a secure two-way protocol that can be run over a connection-oriented (TLS) or HTTPS transport. The wireless infrastructure runs the NMSP server and Cisco Connected Mobile Experiences (Cisco CMX) acts as an NMSP client. The controller supports multiple services and multiple Cisco CMXs can connect to the NMSP server to get the data for the services (location of wireless devices, probe RSSI, hyperlocation, wIPS, and so on.) over the NMSP or HTTPS session. NMSP defines the intercommunication between Cisco CMX and the controller. Cisco CMX communicates to the controller over a routed IP network. Both publish-subscribe and request-reply communication models are supported. Typically, Cisco CMX establishes a subscription to receive services data from the controller in the form of periodic updates. The controller acts as a data publisher, broadcasting services data to multiple CMXs. Besides subscription, Cisco CMX can also send requests to the controller, causing the controller to send a response back. The following is a list of the Network Mobility Services Protocol features: · NMSP is disabled by default. · NMSP communicates with Cisco CMX using TCP, and uses TLS for encryption. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 725 Radioactive Tracing for NMSP System Management · Wireless intrusion prevention system (wIPS) is supported only over TCP and TLS. · Bidirectional communication is supported and Cisco CMX can send a message asynchronously over the established channel. Note HTTPS is not supported for data transport between controller and Cisco CMX. Radioactive Tracing for NMSP This feature collects and provides all CMX-related events. When a controller is added to CMX with an existing logging or serviceability tools, the following occurs: · CMX reaches out to the controller through SNMP and CLI. · Configures the CMX hash key on the controller. · CMX requests the controller to open an NMSP connection. RA tracing simplifies troubleshooting by allowing: · RA trace the CMX IP on the controller. · Collect all logs about it. Enabling NMSP on Premises Services Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 nmsp enable Example: Device(config)# nmsp enable Step 3 end Example: Device(config)# end Purpose Enters global configuration mode. Enables NMSP on premises services. Note By default, the NMSP is enabled on the controller. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 726 System Management Modifying the NMSP Notification Interval for Clients, RFID Tags, and Rogues Modifying the NMSP Notification Interval for Clients, RFID Tags, and Rogues NMSP manages communication between the Cisco Connected Mobile Experience (Cisco CMX) and the controller for incoming and outgoing traffic. If your application requires more frequent location updates, you can modify the NMSP notification interval (to a value between 1 and 180 seconds) for clients, active RFID tags, and rogue access points and clients. Note The TCP port (16113) that the controller and Cisco CMX communicate over must be open (not blocked) on any firewall that exists between the controller and the Cisco CMX for NMSP to function. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 nmsp notification interval {rssi {clients | rfid Sets the NMSP notification interval value for | rogues {ap | client } | spectrum interferers clients, RFID tags, rogue clients, and access } interval} points. Example: Device(config)# nmsp notification interval rssi rfid 50 interval-NMSP notification interval value, in seconds for RSSI measurement. Valid range is from 1 to 180. Step 3 end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Modifying the NMSP Notification Threshold for Clients, RFID Tags, and Rogues Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 727 Configuring NMSP Strong Cipher System Management Step 2 Step 3 Command or Action Purpose location notify-threshold {clients | rogues ap Configures the NMSP notification threshold for | tags } threshold clients, RFID tags, rogue clients, and access Example: points. Device(config)# location notify-threshold threshold- RSSI threshold value in db. Valid clients 5 range is from 0 to 10, with a default value of 0.. end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring NMSP Strong Cipher Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 nmsp strong-cipher Example: Device(config)# nmsp strong-cipher Step 3 end Example: Device(config)# end Purpose Enters global configuration mode. Enable strong ciphers for NMSP server, which contains "ECDHE-RSA-AES128-GCM-SHA256:, ECDHE-ECDSA-AES128-GCM-SHA256:, AES256-SHA256:AES256-SHA:, and AES128-SHA256:AES128-SHA". Normal cipher suite contains, "ECDHE-RSA-AES128-GCM-SHA256:, ECDHE-ECDSA-AES128-GCM-SHA256:, and AES128-SHA". Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Verifying NMSP Settings To view the NMSP capabilities of the controller , use the following command: Device# show nmsp capability Service Subservice ----------------------------- RSSI Rogue, Tags, Mobile Station, Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 728 System Management Verifying NMSP Settings Spectrum Aggregate Interferer, Air Quality, Interferer, Info Rogue, Mobile Station, Statistics Rogue, Tags, Mobile Station, AP Monitor Subscription On Demand Services Device Info AP Info Subscription To view the NMSP notification intervals, use the following command: Device# show nmsp notification interval NMSP Notification Intervals --------------------------- RSSI Interval: Client RFID Rogue AP Rogue Client Spectrum : 2 sec : 50 sec : 2 sec : 2 sec : 2 sec To view the connection-specific statistics counters for all CMX connections, use the following command: Device# show nmsp statistics connection NMSP Connection Counters ------------------------ CMX IP Address: 10.22.244.31, Status: Active State: Connections : 1 Disconnections : 0 Rx Data Frames : 13 Tx Data Frames : 99244 Unsupported messages : 0 Rx Message Counters: ID Name Count ---------------------------------------------- 1 Echo Request 6076 7 Capability Notification 2 13 Measurement Request 5 16 Information Request 3 20 Statistics Request 2 30 Service Subscribe Request 1 Tx Message Counters: ID Name Count ---------------------------------------------- 2 Echo Response 6076 7 Capability Notification 1 14 Measurement Response 13 15 Measurement Notification 91120 17 Information Response 6 18 Information Notification 7492 21 Statistics Response 2 22 Statistics Notification 305 31 Service Subscribe Response 1 67 AP Info Notification 304 To view the common statistic counter of the controller 's NMSP service, use the following command: Device# show nmsp statistics summary NMSP Global Counters -------------------- Number of restarts : SSL Statistics -------------------- Total amount of verifications :6 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 729 Verifying NMSP Settings System Management Verification failures :6 Verification success :0 Amount of connections created :8 Amount of connections closed :7 Total amount of accept attempts : 8 Failures in accept :0 Amount of successful accepts :8 Amount of failed registrations :0 AAA Statistics -------------------- Total amount of AAA requests :7 Failed to send requests :0 Requests sent to AAA :7 Responses from AAA :7 Responses from AAA to validate :7 Responses validate error :6 Responses validate success :1 To view the overall NMSP connections, use the following command: Device# show nmsp status NMSP Status ----------- CMX IP Address Active Tx Echo Resp Rx Echo Req Tx Data Rx Data Transport ----------------------------------------------------------------------------------------- 127.0.0.1 Active 6 6 1 2 TLS To view all mobility services subscribed by all CMXs, use the following command: Device# show nmsp subscription detail CMX IP address 127.0.0.1: Service Subservice ----------------------------- RSSI Rogue, Tags, Mobile Station, Spectrum Info Rogue, Mobile Station, Statistics Tags, Mobile Station, AP Info Subscription To view all mobility services subscribed by a specific CMX, use the following command: Device# show nmsp subscription detail <ip_addr> CMX IP address 127.0.0.1: Service Subservice ----------------------------- RSSI Rogue, Tags, Mobile Station, Spectrum Info Rogue, Mobile Station, Statistics Tags, Mobile Station, AP Info Subscription To view the overall mobility services subscribed by all CMXs, use the following command: Device# show nmsp subscription summary Service Subservice ----------------------------- RSSI Rogue, Tags, Mobile Station, Spectrum Info Rogue, Mobile Station, Statistics Tags, Mobile Station, AP Info Subscription Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 730 System Management Examples: NMSP Settings Configuration Examples: NMSP Settings Configuration This example shows how to configure the NMSP notification interval for RFID tags: Device# configure terminal Device(config)# nmsp notification interval rssi rfid 50 Device(config)# end Device# show nmsp notification interval This example shows how to configure the NMSP notification interval for clients: Device# configure terminal Device(config)# nmsp notification interval rssi clients 180 Device(config)# end Device# show nmsp notification interval NMSP by AP Groups with Subscription List from CMX The Cisco CMX group support allows you to send only the required Network Mobility Services Protocol (NMSP) data to Cisco CMX (applicable to both on-premises and cloud-based CMX). The Cisco CMX can subscribe to NMSP data of specific APs or AP groups based on the active services in the wireless controller. This feature helps in load balancing and optimizing the data flow load, when the APs are distributed across different CMX servers. The Cisco CMX server creates a CMX AP group giving it a unique name and groups the APs under it. Note The Cisco CMX AP Group is the list of Cisco APs managed by the Cisco CMX for location services. This AP group is not the same as the wireless controller AP group. This feature supports the following services: · Client · Probe client filtering · Hyperlocation · BLE Services Note NMSP subscription is available only for those services that are in enabled state in the wireless controller. Verifying NMSP by AP Groups with Subscription List from CMX To verify mobility services group subscription summary of all CMX connections, use the following command: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 731 Verifying NMSP by AP Groups with Subscription List from CMX System Management Device# show nmsp subscription group summary CMX IP address: 127.0.0.1 Groups subscribed by this CMX server: Group name: Group1 To view the services that are subscribed for an AP group by a CMX connection, use the following command: Device# show nmsp subscription group details services group-name cmx-IP-addrress CMX IP address: 127.0.0.1 CMX Group name: Group1 CMX Group filtered services: Service Subservice ----------------------------- RSSI Mobile Station, Spectrum Info Statistics To view the AP MAC list that is subscribed for an AP group by a CMX connection, use the following command: Device show nmsp subscription group detail ap-list group-name cmx-IP-addrress CMX IP address: 127.0.0.1 CMX Group name: Group1 CMX Group AP MACs: : 0000.0000.7002 0000.0000.6602 0000.0000.5502 0000.0000.5002 0010.0010.0002 0000.0006.0002 0000.0099.0002 0000.0000.a002 0000.0000.0092 0000.0000.0082 0000.0050.0042 0000.0d00.0002 0000.0088.0002 2000.0000.0002 0000.0000.0002 0000.0000.0001 0099.0000.0002 0033.0000.0002 0000.0002.0002 0000.7700.0002 0000.0000.0302 0000.0000.0032 1000.0000.0002 0000.0000.0000 0000.00bb.0002 00d0.0000.0002 0000.0000.4002 0022.0000.0002 aa00.0000.0002 0000.00cc.0002 0100.0000.0002 To view CMX-AP grouping details for all CMXs, use the following command: Device# show nmsp subscription group detail all CMX IP address: 127.0.0.1 Groups subscribed by this CMX server: Group name: Group1 CMX Group filtered services: Service Subservice ----------------------------- RSSI Mobile Station, Spectrum Info Statistics CMX Group AP MACs: : 0000.0000.0003 0000.0000.0002 0000.0000.0001 Group name: Group2 CMX Group filtered services: Service Subservice ----------------------------- RSSI Tags, Spectrum Info Statistics Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 732 System Management Probe RSSI Location CMX Group AP MACs: : 0000.0000.0300 0000.0000.0200 0000.0000.0100 Group name: Group3 CMX Group filtered services: Service Subservice ----------------------------- RSSI Rogue, Spectrum Info Statistics CMX Group AP MACs: : 0000.0003.0000 0000.0002.0000 0000.0001.0000 To view all the AP lists subscribed by all CMXs, use the following command: Device# show nmsp subscription group detail ap-list <group> <cmx-ip> To view all the services subscribed by all CMXs, use the following command: Device# show nmsp subscription group detail services <group> <cmx-ip> Probe RSSI Location The Probe RSSI Location feature allows the wireless controller and Cisco CMX to support the following: · Load balancing · Coverage Hole detection · Location updates to CMX When a wireless client is enabled, it sends probe requests to identify the wireless networks in the vicinity and also to find the received signal strength indication (RSSI) associated with the identified Service Set Identifiers (SSIDs). The wireless client periodically performs active scanning in background even after being connected to an access point. This helps them to have an updated list of access points with best signal strength to connect. When the wireless client can no longer connect to an access point, it uses the access point list stored to connect to another access point that gives it the best signal strength. The access points in the WLAN gather these probe requests, RSSI and MAC address of the wireless clients and forwards them to the wireless controller s. The Cisco CMX gathers this data from the wireless controller and uses it to compute the updated location of the wireless client when it roams across the network. Configuring Probe RSSI Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 733 Configuring Probe RSSI System Management Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action wireless probe filter Example: Device(config)# wireless probe filter Purpose Enables filtering of unacknowledged probe requests from AP to improve the location accuracy. Filtering is enabled by default. Use the no form of the command to disable the feature. This will forward both acknowledged and unacknowledged probe requests to the controller. wireless probe limit limit-value interval Configures the number of probe request Example: reported to the wireless controller from the AP for the same client on a given interval. Device(config)# wireless probe limit 10 100 Use the no form of the command to revert to the default limit, which is 2 probes at an interval of 500 ms. wireless probe locally-administered-mac Example: Device(config)# wireless probe locally-administered-mac Enables the reporting of probes from clients having locally administered MAC address. location algorithm rssi-average Example: Device(config)# location algorithm rssi-average Sets the probe RSSI measurement updates to a more accurate algorithm but with more CPU overhead. location algorithm simple (Optional) Sets the probe RSSI measurement Example: updates to a faster algorithm with smaller CPU overhead, but less accuracy. Device(config)# location algorithm simple Use the no form of the command to revert the algorithm type to the default one, which is rssi-average. location expiry client interval Configures the timeout for RSSI values. Example: The no form of the command sets it to a default Device(config)# location expiry client value of 15. 300 location notify-threshold client threshold-db Configures the notification threshold for clients. Example: The no form of the command sets it to a default Device(config)# location notify-threshold value of 0. client 5 location rssi-half-life client time-in-seconds Configures half life when averaging two RSSI Example: readings. Device(config)# location rssi-half-life To disable this option, set the value to 0. client 20 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 734 System Management RFID Tag Support What to do next Use the show wireless client probing command to view each probing client (associated and probing only) by batch of 10 MAC addresses. RFID Tag Support The controller enables you to configure radio frequency identification (RFID) tag tracking. RFID tags are small wireless battery-powered tags that continuously broadcast their own signal and are affixed to assets for real-time location tracking. They operate by advertising their location using special 802.11 packets, which are processed by access points, the controller , and the Cisco CMX. Only active RFIDs are supported. A combination of active RFID tags and wireless controller allows you to track the current location of equipment. Active tags are typically used in real-time tracking of high-value assets in closed-loop systems (that is,) systems in which the tags are not intended to physically leave the control premises of the tag owner or originator. For more information on RFID tags, see the Active RFID Tags section of the Wi-Fi Location-Based Services 4.1 Design Guide. General Guidelines · Only Cisco-compliant active RFID tags are supported. · You can verify the RFID tags on the controller . · High Availability for RFID tags are supported. Configuring RFID Tag Support Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless rfid Example: Device(config)# wireless rfid Enables RFID tag tracking. The default value is enabled. Use the no form of this command to disable RFID tag tracking. Step 3 wireless rfid timeout timeout-value Configures the RFID tag data timeout value to Example: cleanup the table. Device(config)# wireless rfid timeout 90 The timeout value is the amount of time that the controller maintains tags before expiring them. For example, if a tag is configured to beacon every 30 seconds, we recommend that you set the timeout value to 90 seconds Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 735 Verifying RFID Tag Support System Management Command or Action Purpose (approximately three times the beacon value). The default value is 1200 seconds. Verifying RFID Tag Support To view the summary of RFID tags that are clients, use the following command: Device# show wireless rfid client To view the detailed information for an RFID tag, use the following command: Device# show wireless rfid detail <rfid-mac-address> RFID address 000c.cc96.0001 Vendor Cisco Last Heard 6 seconds ago Packets Received 187 Bytes Received 226 Content Header ============== CCX Tag Version 0 Tx power: 12 Channel: 11 Reg Class: 4 CCX Payload ============== Last Sequence Control 2735 Payload length 221 Payload Data Hex Dump: 00000000 00 02 00 00 01 09 00 00 00000010 07 42 03 20 00 00 0b b8 00000020 00 00 00 00 00 00 00 00 00000030 00 00 00 00 00 00 00 00 00000040 00 00 00 00 00 00 00 00 00 00 0c b8 ff ff ff 02 03 4b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................| |.B. .....K......| |................| |................| |................| To view the summary information for all known RFID tags, use the following command: Device# show wireless rfid summary Total RFID entries: : 16 Total Unique RFID entries : 16 RFID ID VENDOR Closet AP RSSI Time Since Last Heard 0012.b80a.c791 Cisco 7069.5a63.0520 -31 3 minutes 30 seconds ago 0012.b80a.c953 Cisco 7069.5a63.0460 -33 4 minutes 5 seconds ago 0012.b80b.806c Cisco 7069.5a63.0520 -46 15 seconds ago 0012.b80d.e9f9 Cisco 7069.5a63.0460 -38 4 minutes 28 seconds ago 0012.b80d.ea03 Cisco 7069.5a63.0520 -43 4 minutes 29 seconds ago 0012.b80d.ea6b Cisco 7069.5a63.0460 -39 4 minutes 26 seconds ago 0012.b80d.ebe8 Cisco 7069.5a63.0520 -43 3 minutes 21 seconds ago 0012.b80d.ebeb Cisco 7069.5a63.0520 -43 4 minutes 28 seconds ago 0012.b80d.ec48 Cisco 7069.5a63.0460 -42 4 minutes 7 seconds ago 0012.b80d.ec55 Cisco 7069.5a63.0520 -41 1 minute 52 seconds ago To view the location-based system RFID statistics, use the following command: Device# show wireless rfid stats Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 736 System Management RFID stats : ============== RFID error db full : 0 RFID error invalid paylod : 0 RFID error invalid tag : 0 RFID error dot11 hdr : 0 RFID error pkt len : 0 RFID error state drop : 0 RFID total pkt received : 369 RFID populated error value : 0 RFID error insert records : 0 RFID error update records : 0 RFID total insert record : 16 RFID ccx payload error : 0 RFID total delete record : 0 RFID error exceeded ap count : 0 RFID error record remove : 0 RFID old rssi expired count: 0 RFId smallest rssi expireed count : 0 RFID total query insert : 0 RFID error invalid rssi count : 0 To view the NMSP notification interval, use the following command: Device# show nmsp notification interval NMSP Notification Intervals --------------------------- RSSI Interval: Client RFID Rogue AP Rogue Client Spectrum : 2 sec : 50 sec : 2 sec : 2 sec : 2 sec Verifying RFID Tag Support Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 737 Verifying RFID Tag Support System Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 738 6 2 C H A P T E R Application Visibility and Control · Information About Application Visibility and Control, on page 739 · Create a Flow Monitor, on page 742 · Configuring a Flow Monitor (GUI), on page 744 · Create a Flow Record, on page 744 · Create a Flow Exporter , on page 746 · Configuring a Policy Tag, on page 747 · Attaching a Policy Profile to a WLAN Interface (GUI), on page 748 · Attaching a Policy Profile to a WLAN Interface (CLI), on page 748 · Attaching a Policy Profile to an AP, on page 749 · Verify the AVC Configuration, on page 750 · Default DSCP on AVC, on page 751 · AVC-Based Selective Reanchoring, on page 753 · Restrictions for AVC-Based Selective Reanchoring, on page 754 · Configuring the Flow Exporter, on page 754 · Configuring the Flow Monitor, on page 754 · Configuring the AVC Reanchoring Profile, on page 755 · Configuring the Wireless WLAN Profile Policy , on page 756 · Verifying AVC Reanchoring, on page 757 Information About Application Visibility and Control Application Visibility and Control (AVC) is a subset of the entire Flexible NetFlow (FNF) package that can provide traffic information. The AVC feature employs a distributed approach that benefits from NBAR running on the access point (AP) or controller whose goal is to run deep packet inspection (DPI) and reports the results using FNF messages. AVC enables you to perform real-time analysis and create policies to reduce network congestion, costly network link usage, and infrastructure upgrades. Traffic flows are analyzed and recognized using the NBAR2 engine. The specific flow is marked with the recognized protocol or application. This per-flow information can be used for application visibility using FNF. After the application visibility is established, a user can define control rules with policing mechanisms for a client. Using AVC rules, you can limit the bandwidth of a particular application for all the clients joined on the WLAN. These bandwidth contracts coexist with per-client downstream rate limiting that takes precedence over the per-application rate limits. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 739 Information About Application Visibility and Control System Management FNF feature is supported in wireless, and relies on the NetFlow enablement on the controller for all modes: flex, local and Fabric. In local mode, the NBAR runs on the controller hardware and the process client traffic flows through the data plane of the controller using the AP CAPWAP tunnels. In FlexConnect or Fabric mode, NBAR runs on the AP, and only statistics are sent to the controller . When operating in these two modes, APs regularly send FNFv9 reports back to the controller . The controller's FNF feature consumes those FNFv9 reports to provide the application statistics shown by AVC. The Fabric mode of operation does not populate the FNF cache. It relays the FNFv9 reports at the time they arrive. As a result, some configuration of flow monitors, for example, cache timeout, is not taken into account. The behavior of the AVC solution changes based on the wireless deployments. The following sections describe the commonalities and differences in all scenarios: Local Mode · NBAR is enabled on the controller . · AVC does not push the FNF configuration to the APs. · Roaming events are ignored. However, AVC supports L3 roams in local mode as traffic flows through the anchor controller (where NBAR was initially processing the roaming client's traffic when the client joined). · IOSd needs to trigger NBAR attach. · Supports flow monitor cache. · Supports NetFlow exporter. Flex Mode · NBAR is enabled on an AP · AVC pushes the FNF configuration to the APs. · Supports context transfer for roaming in AVC-FNF. · Supports flow monitor cache. · Supports NetFlow exporter. Fabric Mode · NBAR is enabled on an AP. · AVC pushes the FNF configuration to the APs. · Supports context transfer for roaming in AVC-FNF. · Flow monitor cache is not supported. · Supports NetFlow exporter (for the C9800 embedded on Catalyst switches for SDA, there is no FNF cache on the box). Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 740 System Management Prerequisites for Application Visibility and Control Prerequisites for Application Visibility and Control · The access points should be AVC capable. However, this requirement is not applicable in Local mode. · For the control part of AVC (QoS) to work, the application visibility feature with FNF has to be configured. Restrictions for Application Visibility and Control · IPv6 (including ICMPv6 traffic) packet classification is not supported in FlexConnect mode and Fabric mode. However, it is supported in Local mode. · Layer 2 roaming is not supported across controller controllers. · Multicast traffic is not supported. · AVC is supported only on the following access points: · Cisco Catalyst 9100 Series Access Points · Cisco Aironet 1800 Series Access Points · Cisco Aironet 2700 Series Access Point · Cisco Aironet 2800 Series Access Point · Cisco Aironet 3700 Series Access Points · Cisco Aironet 3800 Series Access Points · Cisco Aironet 4800 Series Access Points · Cisco Industrial Wireless 3702 Access Point · AVC is not supported on Cisco Aironet 702W, 702I (128 M memory), and 1530 Series access points. · Only the applications that are recognized with App visibility can be used for applying QoS control. · Data link is not supported for NetFlow fields in AVC. · You cannot map the same WLAN profile to both the AVC-not-enabled policy profile and the AVC-enabled policy profile. · AVC is not supported on the management port (Gig 0/0). · NBAR-based QoS policy configuration is allowed only on wired physical ports. Policy configuration is not supported on virtual interfaces, for example, VLAN, port channel and other logical interfaces. When AVC is enabled, the AVC profile supports only up to 23 rules, which includes the default DSCP rule. The AVC policy will not be pushed down to the AP, if rules are more than 23. AVC Configuration Overview To configure AVC, follow these steps: 1. Create a flow monitor using the record wireless avc basic command. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 741 Create a Flow Monitor System Management 2. Create a wireless policy profile. 3. Apply the flow monitor to the wireless policy profile. 4. Create a wireless policy tag. 5. Map the WLAN to the policy profile 6. Attach the policy tag to the APs. Create a Flow Monitor The NetFlow configuration requires a flow record, a flow monitor, and a flow exporter. This configuration should be the first step in the overall AVC configuration. Note In Flex mode and Local mode, the default values for cache timeout active and cache timeout inactive commands are not optimal for AVC. We recommend that you set both the values to 60 in the flow monitor. For Fabric mode, the cache timeout configuration does not apply. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 flow monitor monitor-name Example: Device(config)# flow monitor fm_avc Step 3 record wireless avc {ipv4|ipv6}basic Example: Purpose Enters global configuration mode. Creates a flow monitor. Specifies the basic IPv4 or IPv6 wireless AVC flow template. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 742 System Management Create a Flow Monitor Step 4 Step 5 Command or Action Device(config-flow-monitor)# record wireless avc ipv6 basic cache timeout active value Example: Device(config-flow-monitor)# cache timeout active 60 cache timeout inactive value Example: Device(config-flow-monitor)# cache timeout inactive 60 Purpose Note If you want to have both Application Performance Monitoring (APM) and AVC-FNF in the device simultaneously, use the record wireless avc {ipv4 | ipv6} assurance command, which is a superset of the fields contained in record wireless avc {ipv4 | ipv6} basic command. If the containing flow monitor is configured with the local exporter using destination wlc local command, AVC-FNF will populate the statistics exactly as that of the record wireless avc {ipv4 | ipv6} basic configuration. As a result, both APM and AVC-FNF can be configured simultaneously with two flow monitors per direction, per IP version, in local (central switching) mode. Note The record wireless avc basic command is same as record wireless avc ipv4 basic command. However, record wireless avc ipv4 basic command is not supported in Flex or Fabric modes. In such scenarios, use the record wireless avc basic command. Sets the active flow timeout in seconds. Sets the inactive flow timeout in seconds. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 743 Configuring a Flow Monitor (GUI) System Management Configuring a Flow Monitor (GUI) Before you begin You must have created a flow exporter to export data from the flow monitor. Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Services > Application Visibility and go to the Flow Monitor tab . In the Monitor area, click Add to add a flow monitor. In the Flow Monitor window, add a flow monitor and a description. Select the Flow exporter from the drop-down list to export the data from the flow monitor to a collector. Note To export wireless netflow data, use the templates below: · ETA (Encrypted Traffic Analysis) · wireless avc basic · wireless avc basic IPv6 Step 5 Click Apply to Device to save the configuration. Create a Flow Record The default flow record cannot be edited or deleted. If you require a new flow record, you need to create one and map it to the flow monitor from CLI. Procedure Step 1 Command or Action flow record flow_record_name Example: Device(config)# flow record record1 Purpose Creates a flow record. Note When a custom flow record is configured in Flex and Fabric modes, the optional fields (fields that are not present in record wireless avc basic) are ignored. Step 2 description string Example: (Optional) Describes the flow record as a maximum 63-character string. Device(config-flow-record)# description IPv4flow Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 744 System Management Create a Flow Record Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action Purpose match ipv4 protocol Specifies a match to the IPv4 protocol. Example: Device(config-flow-record)# match ipv4 protocol match ipv4 source address Example: Specifies a match to the IPv4 source address-based field. Device(config-flow-record)# match ipv4 source address match ipv4 destination address Example: Specifies a match to the IPv4 destination address-based field. Device(config-flow-record)# match ipv4 destination address match transport source-port Example: Device(config-flow-record)# match transport source-port Specifies a match to the transport layer's source port field. match transport destination-port Example: Device(config-flow-record)# match transport destination-port Specifies a match to the transport layer's destination port field. match flow direction Example: Specifies a match to the direction the flow was monitored in. Device(config-flow-record)# match flow direction match application name Example: Device(config-flow-record)# match application name Specifies a match to the application name. Note This action is mandatory for AVC support because this allows the flow to be matched against the application. match wireless ssid Example: Device(config-flow-record)# match wireless ssid Specifies a match to the SSID name identifying the wireless network. collect counter bytes long Example: Device(config-flow-record)# collect counter bytes long Collects the counter field's total bytes. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 745 Create a Flow Exporter System Management Step 12 Step 13 Step 14 Command or Action collect counter packets long Example: Device(config-flow-record)# collect counter bytes long collect wireless ap mac address Example: Device(config-flow-record)# collect wireless ap mac address collect wireless client mac address Example: Device(config-flow-record)# collect wireless client mac address Purpose Collects the counter field's total packets. Collects the BSSID with the MAC addresses of the access points that the wireless client is associated with. Collects the MAC address of the client on the wireless network. Create a Flow Exporter You can create a flow exporter to define the export parameters for a flow. This is an optional procedure for configuring flow exporter parameters. Note For the AVC statistics to be visible at the controller , you should configure a local flow exporter using the following commands: · flow exporter my_local · destination local wlc Also, your flow monitor must use this local exporter for the statistics to be visible at the controller . Procedure Step 1 Command or Action Purpose flow exporter flow-export-name Creates a flow monitor. Example: Device(config)# flow exporter export-test Step 2 description string Example: Describes the flow record as a maximum 63-character string. Device(config-flow-exporter)# description IPv4flow Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 746 System Management Configuring a Policy Tag Step 3 Step 4 Step 5 Step 6 Step 7 Command or Action Purpose destination {hostname/ipv4address | hostname/ipv6address |local {wlc}} Example: Specifies the hostname or IP address of the system or the local WLC to which the exporter sends data. Device(config-flow-exporter)# destination local wlc transport udp port-value (Optional) Configures the destination UDP port Example: to reach the external collector. The default value is 9995. Device(config-flow-exporter)# transport udp 1024 Note This step is required only for external collectors; not required for local wlc collector. option application-table timeout seconds Example: Device(config-flow-exporter)# option application-table timeout 500 end Example: Device(config-flow-exporter)# end show flow exporter Example: Device# show flow exporter (Optional) Specifies the application table timeout option, in seconds. The valid range is from 1 to 86400. Returns to privileged EXEC mode. (Optional) Verifies your configuration. Configuring a Policy Tag Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless tag policy policy-tag-name Example: Configures policy tag and enters policy tag configuration mode. Device(config-policy-tag)# wireless tag policy rr-xyz-policy-tag Step 3 end Example: Saves the configuration and exits configuration mode and returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 747 Attaching a Policy Profile to a WLAN Interface (GUI) System Management Command or Action Device(config-policy-tag)# end Purpose Attaching a Policy Profile to a WLAN Interface (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Configuration > Tags & Profiles > Tags. On theManage Tags page, click Policy tab. Click Add to view the Add Policy Tag window. Enter a name and description for the policy tag. Click Add to map WLAN and policy. Choose the WLAN profile to map with the appropriate policy profile, and click the tick icon. Click Save & Apply to Device. Attaching a Policy Profile to a WLAN Interface (CLI) Before you begin · Do not attach different AVC policy profiles on the same WLAN across different policy tags. The following is an example of incorrect configuration: wireless profile policy avc_pol1 ipv4 flow monitor fm-avc1 input ipv4 flow monitor fm-avc1 output no shutdown wireless profile policy avc_pol2 ipv4 flow monitor fm-avc2 input ipv4 flow monitor fm-avc2 output no shutdown wireless tag policy avc-tag1 wlan wlan1 policy avc_pol1 wireless tag policy avc-tag2 wlan wlan1 policy avc_pol2 This example violates the restriction stated earlier, that is, the WLAN wlan1 is mapped to 2 policy profiles, avc_pol1 and avc_pol2. This configuration is, therefore, incorrect because the WLAN wlan1 should be mapped to either avc_pol1 or avc_pol2 everywhere. · Conflicting policy profiles on the same WLAN are not supported. For example, policy profile (with and without AVC) applied to the same WLAN in different policy tags. The following is an example of an incorrect configuration: wireless profile policy avc_pol1 no shutdown Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 748 System Management Attaching a Policy Profile to an AP wireless profile policy avc_pol2 ipv4 flow monitor fm-avc2 input ipv4 flow monitor fm-avc2 output no shutdown wireless tag policy avc-tag1 wlan wlan1 policy avc_pol1 wireless tag policy avc-tag2 wlan wlan1 policy avc_pol2 In this example, a policy profile with and without AVC is applied to the same WLAN in different tags. Procedure Step 1 Command or Action wireless tag policy avc-tag Example: Device(config)# wireless tag policy avc-tag Purpose Creates a policy tag. Step 2 wlan wlan-avc policy avc-policy Attaches a policy profile to a WLAN profile. Example: Device(config-policy-tag)# wlan wlan_avc policy avc_pol What to do next · Run the no shutdown command on the WLAN after completing the configuration. · If the WLAN is already in no shutdown mode, run the shutdown command, followed by no shutdown command. Attaching a Policy Profile to an AP Procedure Step 1 Command or Action ap ap-ether-mac Example: Device(config)# ap 34a8.2ec7.4cf0 Step 2 policy-tag policy-tag Example: Device(config)# policy-tag avc-tag Purpose Enters AP configuration mode. Specifies the policy tag that is to be attached to the access point. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 749 Verify the AVC Configuration System Management Verify the AVC Configuration Procedure Step 1 Command or Action Purpose show avc wlan wlan-name top Displays information about top applications and num-of-applications applications {aggregate users using these applications. | downstream | upstream} Note Ensure that wireless clients are Example: associated to the WLAN and Device# show avc wlan wlan_avc top 2 applications aggregate generating traffic, and then wait for 90 seconds (to ensure the availability of statistics) before running the command. Step 2 show avc client mac top num-of-applications applications {aggregate | downstream | upstream} Example: Device# show avc client 9.3.4 top 3 applications aggregate Displays information about the top number of applications. Note Ensure that wireless clients are associated to the WLAN and generating traffic, and then wait for 90 seconds (to ensure the availability of statistics) before running the command. Step 3 Step 4 Step 5 show avc wlan wlan-name application app-name top num-of-clients aggregate Example: Device# show avc wlan wlan_avc application app top 4 aggregate show ap summary Example: Device# show ap summary show ap tag summary Example: Device# show ap tag summary Displays information about top applications and users using these applications. Displays a summary of all the access points attached to the controller . Displays a summary of all the access points with policy tags. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 750 System Management Default DSCP on AVC Default DSCP on AVC Configuring Default DSCP for AVC Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Choose Configuration > Services > QoS. Click Add. Enter the Policy Name. Click Add Class-Maps. Choose AVC in the AVC/User Defined drop-down list. Click either Any or All match type radio button. Choose DSCP in the Mark Type drop-down list. a) Check the Drop check box to drop traffic from specific sources. b) If you do not want to drop the traffic, enter the Police(kbps) and choose the match type from the Match Type drop-down list. Choose the items from the available list and click move them to the selected list. Click Save. Click Apply to Device. Configuring Default DSCP for AVC Profile In Cisco Catalyst 9800 Series Wireless Controller, only up to 32 filters can be specified in the policy. As there was no way of classifying the packets that are not specified in the filters, now, you can mark down these packets in the policy. The marking action can be applied to the traffic when creating a class map and creating a policy map. Creating Class Map Procedure Step 1 Command or Action Configure Terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 class class-map-name ] Creates a class map. Example: Device(config-pmap)# class-map avc-class Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 751 Creating Policy Map System Management Step 3 Step 4 Command or Action Purpose match protocol { application-name | Specifies match to the application name, attribute category category-name | attribute category name, subcategory name, or sub-category sub-category-name | attribute application group. application-group application group-name Example: Device(config)# class-map avc-class Device(config-cmap)# match protocol avc-media Device(config)# class-map class-avc-category Device(config-cmap)# match protocol attribute category avc-media Device# class-map class-avc-sub-category Device(config-cmap)# match protocol attribute sub-category avc-media Device# class-map avcS-webex-application-group Device(config-cmap)# match protocol attribute application-group webex-media end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Creating Policy Map Procedure Step 1 Command or Action Configure Terminal Example: Device# configure terminal Step 2 policy-map policy-map-name Example: Device(config)#policy-map avc-policy Purpose Enters global configuration mode. Creates a policy map by entering the policy map name, and enters policy-map configuration mode. By default, no policy maps are defined. The default behaviour of a policy map is to set the DSCP to 0 if the packet is an IP packet and to set the CoS to 0 if the packet is tagged. No policing is performed. Note To delete an existing policy map, use the no policy-map policy-map-name global configuration command. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 752 System Management AVC-Based Selective Reanchoring Step 3 Step 4 Step 5 Step 6 Step 7 Command or Action Purpose class [ class-map-name | class-default ] Defines a traffic classification, and enters Example: policy-map class configuration mode. Device(config-pmap)# class-map avc-class By default, no policy map and class maps are defined. If a traffic class has already been defined by using the class-map global configuration command, specify its name for class-map-name in this command. A class-default traffic class is predefined and can be added to any policy. It is always placed at the end of a policy map. With an implied match any is included in the class-default class, all packets that have not already matched the other traffic classes will match class-default . Note To delete an existing class map, use the no class class-map-name policy-map configuration command. set dscp new-dscp Example: Device(config-pmap-c)# set dscp 45 class class-default set dscp default end Classifies IP traffic by setting a new value in the packet. For dscp new-dscp , enter a new DSCP value to be assigned to the classified traffic. The range is 0 to 63. Specifies the default class so that you can configure or modify its policy. Configures the default DSCP. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. AVC-Based Selective Reanchoring The AVC-Based Selective Reanchoring feature is designed to reanchor clients when they roam from one controller to another. Reanchoring of clients prevents the depletion of IP addresses available for new clients in Cisco WLC. The AVC profile-based statistics are used to decide whether a client must be reanchored or deferred. This is useful when a client is actively running a voice or video application defined in the AVC rules. The reanchoring process also involves deauthentication of anchored clients. The clients get deauthenticated when they do not transmit traffic for the applications listed in the AVC rules while roaming between WLCs. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 753 Restrictions for AVC-Based Selective Reanchoring System Management Restrictions for AVC-Based Selective Reanchoring · This feature is supported only in local mode. FlexConnect and fabric modes are not supported. · This feature is not supported in guest tunneling and export anchor scenarios. · The old IP address is not released after reanchoring, until IP address' lease period ends. Configuring the Flow Exporter Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 flow exporter name Example: Device(config)# flow exporter avc-reanchor Purpose Enters global configuration mode. Creates a flow exporter and enters flow exporter configuration mode. Note You can use this command to modify an existing flow exporter too. Step 3 destination local wlc Sets the exporter as local. Example: Device(config-flow-exporter)# destination local wlc Configuring the Flow Monitor Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 flow monitor monitor-name Example: Device(config)# flow monitor fm_avc Purpose Enters global configuration mode. Creates a flow monitor and enters Flexible NetFlow flow monitor configuration mode. Note You can use this command to modify an existing flow monitor too. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 754 System Management Configuring the AVC Reanchoring Profile Step 3 Step 4 Step 5 Step 6 Command or Action exporter exporter-name Example: Device(config-flow-monitor)# exporter avc-reanchor Purpose Specifies the name of an exporter. record wireless avc basic Example: Device(config-flow-monitor)# record wireless avc basic Specifies the flow record to use to define the cache. cache timeout active value Example: Device(config-flow-monitor)# cache timeout active 60 Sets the active flow timeout, in seconds. cache timeout inactive value Example: Device(config-flow-monitor)# cache timeout inactive 60 Sets the inactive flow timeout, in seconds. Configuring the AVC Reanchoring Profile Before you begin · Ensure that you use the AVC-Reanchor-Class class map. All other class-map names are ignored by Selective Reanchoring. · During boot up, the system checks for the existence of the AVC-Reanchor-Class class map. If it is not found, default protocols, for example, jabber-video, wifi-calling, and so on, are created. If AVC-Reanchor-Class class map is found, configuration changes are not made and updates to the protocols that are saved to the startup configuration persist across reboots. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 class-map cmap-name Example: Device(config)# class-map AVC-Reanchor-Class Purpose Enters global configuration mode. Configures the class map. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 755 Configuring the Wireless WLAN Profile Policy System Management Step 3 Step 4 Command or Action match any Example: Device(config-cmap)# match any match protocol jabber-audio Example: Device(config-cmap)# match protocol jabber-audio Purpose Instructs the device to match with any of the protocols that pass through it. Specifies a match to the application name. You can edit the class-map configuration later, in order to add or remove protocols, for example, jabber-video, wifi-calling, and so on, if required. Configuring the Wireless WLAN Profile Policy Follow the procedure given below to configure the WLAN profile policy: Note Starting with Cisco IOS XE Amsterdam 17.1.1, IPv6 flow monitor is supported on Wave 2 APs. You can attach two flow monitors in a policy profile per direction (input and output) and per IP version (IPv4 and IPv6) in local (central switching) mode, when NBAR runs in the controller. However, only one flow monitor is supported per direction (input and output) and per IP version (IPv4 and IPv6) in flexconnect and fabric modes on Wave 2 APs, when NBAR runs on the corresponding AP. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy policy-name Example: Configures the WLAN policy profile and enters wireless policy configuration mode. Device(config)# wireless profile policy default-policy-profile Step 3 shutdown Disables the policy profile. Example: Device(config-wireless-policy)# shutdown Step 4 no central switching Example: Device(config-wireless-policy)# no central switching Disables central switching. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 756 System Management Verifying AVC Reanchoring Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action Purpose ipv4 flow monitor monitor-name input Example: Specifies the name of the IPv4 ingress flow monitor. Device(config-wireless-policy)# ipv4 flow monitor fm_avc input ipv4 flow monitor monitor-name output Example: Specifies the name of the IPv4 egress flow monitor. Device(config-wireless-policy)# ipv4 flow monitor fm_avc output ipv6 flow monitor monitor-name input Example: Specifies the name of the IPv6 ingress flow monitor. Device(config-wireless-policy)# ipv6 flow monitor fm_v6_avc input ipv6 flow monitor monitor-name output Example: Specifies the name of the IPv6 egress flow monitor. Device(config-wireless-policy)# ipv6 flow monitor fm_v6_avc output no shutdown Example: Device(config-wireless-policy)# no shutdown Enables the policy profile. Verifying AVC Reanchoring Use the following commands to verify the AVC reanchoring configuration: Device# show wireless profile policy detailed avc_reanchor_policy Policy Profile Name : avc_reanchor_policy Description : Status : ENABLED VLAN :1 Wireless management interface VLAN : 34 ! . . . AVC VISIBILITY : Enabled Flow Monitor IPv4 Flow Monitor Ingress Name : fm_avc Flow Monitor Egress Name : fm_avc Flow Monitor IPv6 Flow Monitor Ingress Name : Not Configured Flow Monitor Egress Name : Not Configured NBAR Protocol Discovery : Disabled Reanchoring : Enabled Classmap name for Reanchoring Reanchoring Classmap Name : AVC-Reanchor-Class Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 757 Verifying AVC Reanchoring System Management ! . . . ------------------------------------------------------- Device# show platform software trace counter tag wstatsd chassis active R0 avc-stats debug Counter Name Thread ID Counter Value -----------------------------------------------------------------------------Reanch_deassociated_clients 28340 1 Reanch_tracked_clients 28340 4 Reanch_deleted_clients 28340 3 Device# show platform software trace counter tag wncd chassis active R0 avc-afc debug Counter Name Thread ID Counter Value -----------------------------------------------------------------------------Reanch_co_ignored_clients 30063 1 Reanch_co_anchored_clients 30063 5 Reanch_co_deauthed_clients 30063 4 Device# show platform software wlavc status wncd Event history of WNCD DB: AVC key: [1,wlan_avc,N/A,Reanc,default-policy-tag] Current state : READY Wlan-id : 1 Wlan-name : wlan_avc Feature type : Reanchoring Flow-mon-name : N/A Policy-tag : default-policy-tag Switching Mode : CENTRAL Timestamp FSM State Event RC Ctx -------------------------- ------------------- -------------------------- ---- ---06/12/2018 16:45:30.630342 3 :ZOMBIE 1 :FSM_AFM_BIND 0 2 06/12/2018 16:45:28.822780 2 :READY 2 :FSM_AFM_UNBIND 0 0 06/12/2018 16:45:28.822672 2 :READY 2 :FSM_AFM_UNBIND 0 0 06/12/2018 16:45:15.172073 3 :ZOMBIE 1 :FSM_AFM_BIND 0 2 06/12/2018 16:45:12.738367 2 :READY 2 :FSM_AFM_UNBIND 0 0 06/12/2018 16:45:12.738261 2 :READY 2 :FSM_AFM_UNBIND 0 0 06/12/2018 16:45:01.162689 3 :ZOMBIE 1 :FSM_AFM_BIND 0 2 06/12/2018 16:44:55.757643 2 :READY 2 :FSM_AFM_UNBIND 0 0 06/12/2018 16:44:55.757542 2 :READY 2 :FSM_AFM_UNBIND 0 0 06/12/2018 16:44:04.468749 3 :ZOMBIE 1 :FSM_AFM_BIND 0 2 06/12/2018 16:44:02.18857 2 :READY 2 :FSM_AFM_UNBIND 0 0 06/12/2018 16:44:02.18717 2 :READY 2 :FSM_AFM_UNBIND 0 0 06/12/2018 16:38:20.164304 2 :READY 3 :FSM_AFM_SWEEP 0 2 06/12/2018 16:35:20.163877 2 :READY 1 :FSM_AFM_BIND 0 2 06/12/2018 16:35:18.593257 1 :INIT 1 :FSM_AFM_BIND 0 2 06/12/2018 16:35:18.593152 1 :INIT 24:CREATE_FSM 0 0 AVC key: [1,wlan_avc,fm_avc,v4-In,default-policy-tag] Current state : READY Wlan-id : 1 Wlan-name : wlan_avc Feature type : Flow monitor IPv4 Ingress Flow-mon-name : fm_avc Policy-tag : default-policy-tag Switching Mode : CENTRAL Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 758 System Management Verifying AVC Reanchoring Timestamp FSM State Event RC Ctx -------------------------- ------------------- -------------------------- ---- ---06/12/2018 16:45:30.664772 3 :ZOMBIE 1 :FSM_AFM_BIND 0 2 06/12/2018 16:45:28.822499 2 :READY 2 :FSM_AFM_UNBIND 0 0 06/12/2018 16:45:28.822222 2 :READY 2 :FSM_AFM_UNBIND 0 0 06/12/2018 16:45:15.207605 3 :ZOMBIE 1 :FSM_AFM_BIND 0 2 06/12/2018 16:45:12.738105 2 :READY 2 :FSM_AFM_UNBIND 0 0 06/12/2018 16:45:12.737997 2 :READY 2 :FSM_AFM_UNBIND 0 0 06/12/2018 16:45:01.164225 3 :ZOMBIE 1 :FSM_AFM_BIND 0 2 06/12/2018 16:44:55.757266 2 :READY 2 :FSM_AFM_UNBIND 0 0 06/12/2018 16:44:55.757181 2 :READY 2 :FSM_AFM_UNBIND 0 0 06/12/2018 16:44:04.472778 3 :ZOMBIE 1 :FSM_AFM_BIND 0 2 06/12/2018 16:44:02.15413 2 :READY 2 :FSM_AFM_UNBIND 0 0 06/12/2018 16:44:02.15263 2 :READY 2 :FSM_AFM_UNBIND 0 0 06/12/2018 16:38:20.164254 2 :READY 3 :FSM_AFM_SWEEP 0 2 06/12/2018 16:35:20.163209 1 :INIT 1 :FSM_AFM_BIND 0 2 06/12/2018 16:35:20.163189 1 :INIT 24:CREATE_FSM 0 0 AVC key: [1,wlan_avc,fm_avc,v4-Ou,default-policy-tag] Current state : READY Wlan-id : 1 Wlan-name : wlan_avc Feature type : Flow monitor IPv4 Egress Flow-mon-name : fm_avc Policy-tag : default-policy-tag Switching Mode : CENTRAL Timestamp FSM State Event RC Ctx -------------------------- ------------------- -------------------------- ---- ---06/12/2018 16:45:30.630764 3 :ZOMBIE 1 :FSM_AFM_BIND 0 2 06/12/2018 16:45:28.822621 2 :READY 2 :FSM_AFM_UNBIND 0 0 06/12/2018 16:45:28.822574 2 :READY 2 :FSM_AFM_UNBIND 0 0 06/12/2018 16:45:15.172357 3 :ZOMBIE 1 :FSM_AFM_BIND 0 2 06/12/2018 16:45:12.738212 2 :READY 2 :FSM_AFM_UNBIND 0 0 06/12/2018 16:45:12.738167 2 :READY 2 :FSM_AFM_UNBIND 0 0 06/12/2018 16:45:01.164048 3 :ZOMBIE 1 :FSM_AFM_BIND 0 2 06/12/2018 16:44:55.757403 2 :READY 2 :FSM_AFM_UNBIND 0 0 06/12/2018 16:44:55.757361 2 :READY 2 :FSM_AFM_UNBIND 0 0 06/12/2018 16:44:04.472561 3 :ZOMBIE 1 :FSM_AFM_BIND 0 2 06/12/2018 16:44:02.18660 2 :READY 2 :FSM_AFM_UNBIND 0 0 06/12/2018 16:44:02.18588 2 :READY 2 :FSM_AFM_UNBIND 0 0 06/12/2018 16:38:20.164293 2 :READY 3 :FSM_AFM_SWEEP 0 2 06/12/2018 16:35:20.163799 1 :INIT 1 :FSM_AFM_BIND 0 2 06/12/2018 16:35:20.163773 1 :INIT 24:CREATE_FSM 0 0 Device# show platform software wlavc status wncmgrd Event history of WNCMgr DB: AVC key: [1,wlan_avc,N/A,Reanc,default-policy-tag] Current state : READY Wlan-id : 1 Wlan-name : wlan_avc Feature type : Reanchoring Flow-mon-name : N/A Policy-tag : default-policy-tag Switching Mode : CENTRAL Policy-profile : AVC_POL_PYATS Timestamp FSM State Event RC Ctx -------------------------- ------------------- -------------------------- ---- ---06/12/2018 16:45:30.629278 3 :WLAN_READY 24:BIND_WNCD 0 0 06/12/2018 16:45:30.629223 3 :WLAN_READY 4 :FSM_BIND_ACK 0 0 06/12/2018 16:45:30.629179 3 :WLAN_READY 4 :FSM_BIND_ACK 0 0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 759 Verifying AVC Reanchoring System Management 06/12/2018 16:45:30.510867 2 :PLUMB_READY 22:BIND_IOSD 0 0 06/12/2018 16:45:30.510411 2 :PLUMB_READY 2 :FSM_WLAN_UP 0 0 06/12/2018 16:45:30.510371 2 :PLUMB_READY 1 :FSM_WLAN_FM_PLUMB 0 0 06/12/2018 16:45:28.886377 2 :PLUMB_READY 20:UNBIND_ACK_IOSD 0 0 ! AVC key: [1,wlan_avc,fm_avc,v4-In,default-policy-tag] Current state : READY Wlan-id : 1 Wlan-name : wlan_avc Feature type : Flow monitor IPv4 Ingress Flow-mon-name : fm_avc Policy-tag : default-policy-tag Switching Mode : CENTRAL Policy-profile : AVC_POL_PYATS Timestamp FSM State Event RC Ctx -------------------------- ------------------- -------------------------- ---- ---06/12/2018 16:45:30.664032 3 :WLAN_READY 24:BIND_WNCD 0 0 06/12/2018 16:45:30.663958 3 :WLAN_READY 4 :FSM_BIND_ACK 0 0 06/12/2018 16:45:30.663921 3 :WLAN_READY 4 :FSM_BIND_ACK 0 0 06/12/2018 16:45:30.511151 2 :PLUMB_READY 22:BIND_IOSD 0 0 06/12/2018 16:45:30.510624 2 :PLUMB_READY 2 :FSM_WLAN_UP 0 0 06/12/2018 16:45:30.510608 2 :PLUMB_READY 1 :FSM_WLAN_FM_PLUMB 0 0 06/12/2018 16:45:28.810867 2 :PLUMB_READY 20:UNBIND_ACK_IOSD 0 0 06/12/2018 16:45:28.807239 4 :READY 25:UNBIND_WNCD 0 0 06/12/2018 16:45:28.807205 4 :READY 23:UNBIND_IOSD 0 0 06/12/2018 16:45:28.806734 4 :READY 3 :FSM_WLAN_DOWN 0 0 ! AVC key: [1,wlan_avc,fm_avc,v4-Ou,default-policy-tag] Current state : READY Wlan-id : 1 Wlan-name : wlan_avc Feature type : Flow monitor IPv4 Egress Flow-mon-name : fm_avc Policy-tag : default-policy-tag Switching Mode : CENTRAL Policy-profile : AVC_POL_PYATS Timestamp FSM State Event RC Ctx -------------------------- ------------------- -------------------------- ---- ---06/12/2018 16:45:30.629414 3 :WLAN_READY 24:BIND_WNCD 0 0 06/12/2018 16:45:30.629392 3 :WLAN_READY 4 :FSM_BIND_ACK 0 0 06/12/2018 16:45:30.629380 3 :WLAN_READY 4 :FSM_BIND_ACK 0 0 06/12/2018 16:45:30.510954 2 :PLUMB_READY 22:BIND_IOSD 0 0 06/12/2018 16:45:30.510572 2 :PLUMB_READY 2 :FSM_WLAN_UP 0 0 06/12/2018 16:45:30.510532 2 :PLUMB_READY 1 :FSM_WLAN_FM_PLUMB 0 0 06/12/2018 16:45:28.886293 2 :PLUMB_READY 20:UNBIND_ACK_IOSD 0 0 06/12/2018 16:45:28.807844 4 :READY 25:UNBIND_WNCD 0 0 06/12/2018 16:45:28.807795 4 :READY 23:UNBIND_IOSD 0 0 06/12/2018 16:45:28.806990 4 :READY 3 :FSM_WLAN_DOWN 0 0 ! Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 760 6 3 C H A P T E R Software-Defined Application Visibility and Control · Information About Software-Defined Application Visibility and Control, on page 761 · Enabling Software-Defined Application Visibility and Control on a WLAN (CLI), on page 762 · Configuring Software-Defined Application Visibility and Control Global Parameters (CLI), on page 762 Information About Software-Defined Application Visibility and Control Software-Defined Application Visibility and Control (SD-AVC) is a network-level AVC controller that aggregates application data from multiple devices and sources and provides composite application information. SD-AVC collects application data from across the network and deploys protocol pack updates in a centralized manner. SD-AVC recognizes most enterprise network traffic and provides analytics, visibility, and telemetry into the network application recognition. SD-AVC profiles all the endpoints (including wireless bridged virtual machines) connected to the access nodes to perform anomaly detection operations, such as Network Address Translation (NAT). SD-AVC can discover and alert when the same MAC address is used simultaneously on different networks. You can enable the Software-Defined Application Visibility and Control feature on a per-WLAN basis. Also, you can turn on and turn off the Software-Defined Application Visibility and Control functionalities independently. Note If the SD-AVC process (stilepd) crashes, Capwapd process restart or AP reload is required to resume the SD-AVC operation. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 761 Enabling Software-Defined Application Visibility and Control on a WLAN (CLI) System Management Enabling Software-Defined Application Visibility and Control on a WLAN (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy policy-name Example: Configures WLAN policy profile and enters wireless policy configuration mode. Device(config)# wireless profile policy test-policy-profile Step 3 no central switching Example: Device(config-wireless-policy)# no central switching Disables central switching and enables local switching. Step 4 ip nbar protocol-discovery Example: Enables application recognition on the wireless policy profile by activating the NBAR2 engine. Device(config-wireless-policy)# ip nbar protocol-discovery Step 5 end Example: Device(config-wireless-policy)# end Exits wireless policy configuration mode and returns to privileged EXEC mode. Configuring Software-Defined Application Visibility and Control Global Parameters (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 762 System Management Configuring Software-Defined Application Visibility and Control Global Parameters (CLI) Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action avc sd-service Example: Device(config-sd-service)# avc sd-service Purpose Enables SD-AVC and enters software-definition service configuration mode. segment segment-name Example: Device(config-sd-service)# segment AppRecognition Configures a segment name identifying a group of devices sharing the same application services. controller Example: Enters SD service controller configuration mode to configure connectivity parameters. Device(config-sd-service)# controller address ip-address Example: Configures controller IP address. Supports only IPv4 address. Device(config-sd-service-controller)# address 209.165.201.0 destination-ports sensor-exporter value Example: Configures the destination port for communicating with the controller. Device(config-sd-service-controller)# destination-ports sensor-exporter 21730 dscp dscp-value Enables DSCP marking. Example: Device(config-sd-service-controller)# dscp 16 source-interface interface interface-number Configures source interface for communicating Example: with the controller. Device(config-sd-service-controller)# source-interface GigabitEthernet21 transport application-updates https url-prefix url-prefix-name Configures transport protocols for communicating with the controller. Example: Device(config-sd-service-controller)# transport application-updates https url-prefix cisco vrf vrf-name Associates the VRF with the source interface. Example: Device(config-sd-service-controller)# vrf doc-test Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 763 Configuring Software-Defined Application Visibility and Control Global Parameters (CLI) System Management Step 11 Command or Action Purpose end Example: Exits the SD service controller configuration mode and enters privileged EXEC mode. Device(config-sd-service-controller)# end Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 764 6 4 C H A P T E R Cisco Hyperlocation · Information About Cisco Hyperlocation, on page 765 · Restrictions on Cisco Hyperlocation, on page 767 · Support for IPv6 in Cisco Hyperlocation or BLE Configuration, on page 768 · Configuring Cisco Hyperlocation (GUI), on page 768 · Configuring Cisco Hyperlocation (CLI), on page 769 · Configuring Hyperlocation BLE Beacon Parameters for AP (GUI), on page 770 · Configuring Hyperlocation BLE Beacon Parameters for AP (CLI), on page 770 · Configuring Hyperlocation BLE Beacon Parameters (CLI), on page 771 · Information About AP Group NTP Server, on page 772 · Configuring an AP Group NTP Server, on page 772 · Configuring AP Timezone, on page 773 · Information About BLE Concurrent Scanning and Beaconing, on page 773 · Verifying BLE Concurrent Scanning and Beaconing, on page 774 · Verifying Cisco Hyperlocation, on page 775 · Verifying Hyperlocation BLE Beacon Configuration, on page 779 · Verifying Hyperlocation BLE Beacon Configuration for AP, on page 779 Information About Cisco Hyperlocation Cisco Hyperlocation is an ultraprecise location solution that allows you to track the location of wireless clients. This is possible with the Cisco Hyperlocation radio module in the Cisco Aironet 3600, 3700, and 4800 Series Access Points. The Cisco Hyperlocation module combines Wi-Fi and Bluetooth Low Energy (BLE) technologies to allow beacons, inventory, and personal mobile devices to be pinpointed. Hyperlocation is also supported in Fabric mode. In particular, when the wireless controller is running on the switch, the controller takes the necessary steps to provision the APs, so that they can generate Hyperlocation VxLAN packets that can traverse the fabric network taking advantage of the fabric infrastructure and be correctly delivered to the destination CMX. The Hyperlocation VxLAN packets are special packets marked with SGT 0 and using the L3VNID of the APs. For more information, refer to the SDA documentation. The Cisco Hyperlocation radio module provides the following: · WSM or WSM2 radio module functions that are extended to: · 802.11ac Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 765 Information About Cisco Hyperlocation System Management · Wi-Fi Transmit · 20-MHz, 40-MHz, and 80-MHz channel bandwidth. · Expanded location functionality: · Low-latency location optimized channel scanning · 32-antenna angle of arrival (AoA); available only with the WSM2 module. Note When using the WSM2 module (includes the WSM module and the antenna add-on), the accuracy of tracking the location of wireless clients can be as close as one meter. Cisco Hyperlocation works in conjunction with Cisco Connected Mobile Experiences (CMX). Combining the Cisco Hyperlocation feature on Cisco Catalyst 9800 Series Wireless Controller with a CMX device allows you to achieve better location accuracy, which can result in delivering more targeted content to users. When you use CMX with Cisco CleanAir frequency scanning, it is simple to locate failed, lost, and even rogue beacons. The Cisco Hyperlocation radio module with an integrated BLE radio allows transmission of Bluetooth Low Energy (BLE) broadcast messages by using up to 5 BLE transmitters. Cisco Catalyst 9800 Series Wireless Controller is used to configure transmission parameters such as interval for the beacons, universally unique identifier (UUID), and transmission power, per beacon globally for all the access points. Also, the controller can configure major, minor, and transmission power value of each AP to provide more beacon granularity. Note The Cisco Hyperlocation feature must be enabled on the controller and CMX and CMX must be connected for BLE to work. In the absence of a Cisco Hyperlocation radio module, Hyperlocation will still work in a modality named Hyperlocation Local Mode, which guarantees a slightly lower location accuracy in the range between five meters and seven meters. This is accomplished through CPU cycle stealing. Using the controller, you can configure Cisco Hyperlocation for APs based on their profile. Network Time Protocol Server Cisco Hyperlocation requires the AP to be synchronized with regard to time. To achieve this, the controller sends network time protocol (NTP) information to the AP. The AP then uses the NTP server to synchronize its clock. Therefore, the AP needs connectivity to the NTP server. APs can be geographically dispersed. Therefore, it is necessary to provide different NTP servers to different APs. This is achieved by allowing the configuration of NTP server information on a per AP profile basis. If NTP information is not configured on the AP profile, the controller uses one of the global NTP peers defined on its configuration or the management IP address is sent as the NTP server to be used if the controller is acting as an NTP server. If the NTP server is not available, Cisco Hyperlocation will be disabled. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 766 System Management Restrictions on Cisco Hyperlocation Note In scale setup, the NTP server should be configured on the respective AP profiles, so that the APs and CA servers used for LSC provisioning are time synchronized. If the NTP server is not configured, a few APs would fail in LSC provisioning. Bluetooth Low Energy Configuration The BLE configuration is split into two parts: per-AP profile and per AP. The BLE feature can be configured partially from the AP profile (by default, the AP profile BLE configuration is applied) and partially per-AP (some or all the attributes are applied). Table 55: BLE Configuration Details Attribute BLE Configuration Per AP Profile BLE Configuration Per AP Attributes with per-AP granularity (global for all the beacons) · Interval · Advertised transmission power · Interval · Advertised transmission power Attributes with per-AP per0-beacon granularity · Transmission power · UUID · Status · Transmission power · UUID · Status · Major · Minor Note The default-ap-profile BLE configuration can be considered the default BLE configuration because all the APs will join the default-ap-profile AP profile in case the other profiles are removed. For more information about Cisco Hyperlocation, see the following documents: · Cisco Hyperlocation Solution · Cisco CMX Configuration Guide to enable Cisco Hyperlocation · Cisco CMX Release Notes Restrictions on Cisco Hyperlocation · It is not possible to modify detection, trigger, and reset thresholds while Hyperlocation is in enabled state. · Changes to the reset threshold are allowed for values in the range of zero to one less than the current threshold value. For example, if the current threshold reset value is 10, changes to the reset threshold are allowed for values in the range of 0 to 9. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 767 Support for IPv6 in Cisco Hyperlocation or BLE Configuration System Management · When Cisco Hyperlocation is in use on the Cisco Catalyst 9800 Series Wireless Controller in a non-Fabric deployment, CMX must be reachable through an SVI interface (VLAN). Deployments where CMX is reachable through an L3 port results in an error. · In Fabric deployments, the wireless management interface (typically loopback interface) must not be in Fabric. · It is not possible to set the wireless management interface to a loopback interface in non-Fabric deployments. Support for IPv6 in Cisco Hyperlocation or BLE Configuration Until Release 16.12, IPv4 was the only valid configuration. From Release 17.1 onwards, IPv6 is also supported for specific deployments. Note CMX accepts only one IP configuration at a time (either IPv4 or IPv6). The configuration combinations listed in the following tables are the valid deployments. Table 56: Flex Deployment Mode Controller Management Inferface and AP CMX IPv4 IPv4 IPv6 IPv6 Table 57: Fabric Deployment Mode Controller Management Inferface and AP IPv4 CMX IPv4 Note Any other combination of IPv4 or IPv6 is not supported. Configuring Cisco Hyperlocation (GUI) Cisco Hyperlocation is a location solution that allows to track the location of wireless clients with the accuracy of one meter. Selecting this option disables all other fields in the screen, except NTP Server. Procedure Step 1 In the Configuration > Tags & Profiles > AP Join page, click Add. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 768 System Management Configuring Cisco Hyperlocation (CLI) Step 2 Step 3 Step 4 Step 5 Step 6 The Add AP Join Profile dialog box appears. Under the AP > Hyperlocation tab, select the Enable Hyperlocation check box. In the Detection Threshold (dBm) field, enter a value to filter out packets with low RSSI. You must enter a value between 100 dBm and 50 dBm. In the Trigger Threshold (cycles) field, enter a value to set the number of scan cycles before sending a BAR to clients. You must enter a value between 0 and 99. In the Reset Threshold is required field, enter a value to reset value in scan cycles after trigger. You must enter a value between 0 and 99. Click Save & Apply to Device. Configuring Cisco Hyperlocation (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap profile profile-name Example: Configures an AP profile and enters AP profile configuration mode. Device(config)# ap profile profile-name Step 3 [no] hyperlocation Example: Device(config-ap-profile)# [no] hyperlocation Enables Cisco Hyperlocation feature on all the supported APs that are associated with this AP profile. Use the no form of the command to disable the Cisco Hyperlocation feature. Step 4 [no] hyperlocation threshold detection value-in-dBm Example: Device(config-ap-profile)# [no] hyperlocation threshold detection -100 Sets threshold to filter out packets with low RSSI. The no form of this command resets the threshold to its default value. Valid range is between 100 and 50. Step 5 [no] hyperlocation threshold reset value-btwn-0-99 Example: Device(config-ap-profile)# [no] hyperlocation threshold reset 8 Resets the value of scan cycles after a trigger. The no form of this command resets the threshold to its default value. Step 6 [no] hyperlocation threshold trigger value-btwn-1-100 Sets the number of scan cycles before sending a block acknowledgment request (BAR) to Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 769 Configuring Hyperlocation BLE Beacon Parameters for AP (GUI) System Management Step 7 Command or Action Example: Device(config-ap-profile)# [no] hyperlocation threshold trigger 10 Purpose clients. The no form of this command resets the threshold to its default value. [no] ntp ip ip-address Example: Sets the IP address of the NTP server. The no form of this command removes the NTP server. Device(config-ap-profile)# [no] ntp ip 9.0.0.4 Configuring Hyperlocation BLE Beacon Parameters for AP (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 In the Configuration > Tags & Profiles > AP Join page, click Add. The Add AP Join Profile dialog box appears. Under the AP tab, click BLE. In the Beacon Interval (Hz) field, enter a value. In the Advertised Attenuation Level (dBm) field, enter a value. Select the check box against each ID and click Reset, if required. Optional, click an ID to edit the values of the following fields, and click Save. · Status · Tx Power (dBm) · UUID Click Save & Apply to Device. Configuring Hyperlocation BLE Beacon Parameters for AP (CLI) Follow the procedure given below to configure hyperlocation BLE beacon parameters for an AP: Procedure Step 1 Command or Action Purpose ap name ap-name hyperlocation ble-beacon Configures Hyperlocation and related beacon-id {enable | major major-value | parameters for an AP, and the specified beacon minor minor-value | txpwr value-in-dBm ID: | uuid uuid-value } · enable--Enables BLE beacon on the AP. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 770 System Management Configuring Hyperlocation BLE Beacon Parameters (CLI) Step 2 Command or Action Example: Device# ap name test-ap hyperlocation ble-beacon 3 major 65535 Purpose · major major-value--Configures BLE beacon's major parameter. Valid value is between 0 and 65535; the default value is 0. · minor minor-value--Configures BLE beacon's minor parameter. Valid value is between 0 and 65535; the default value is 0. · txpwr value-in-dBm--Configures BLE beacon attenuation level. Valid value is between 52 dBm and 0 dBm. · uuid uuid-value--Configures a UUID. ap name ap-name hyperlocation ble-beacon advpwr value-in-dBm Example: Device# ap name test-ap hyperlocation ble-beacon advpwr 90 Configures BLE beacon's advertised attenuation level for an AP. The valid range for value-in-dBm is between 40 dBm and 100 dBm; the default value is 59 dBm (all values must be entered as positive integers). Configuring Hyperlocation BLE Beacon Parameters (CLI) Before you begin For Hyperlocation BLE to be enabled, CMX must be fully joined and enabled for Hyperlocation. Procedure Step 1 Command or Action Purpose ap profile profile-name Example: Enables configuration for all the APs that are associated with the specified AP profile name. Device(config)# ap profile profile-name Step 2 hyperlocation ble-beacon beacon-id Example: Specifies the BLE beacon parameters and enters BLE configuration mode. Device(config-ap-profile)# hyperlocation ble-beacon 3 Step 3 enabled Example: Device(config-halo-ble)# enabled Enables BLE for the beacon ID specified. Step 4 exit Example: Returns to AP profile configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 771 Information About AP Group NTP Server System Management Step 5 Step 6 Command or Action Device(config-halo-ble)# exit Purpose hyperlocation ble-beacon interval value-in-hertz Configures the BLE beacon interval as 1 Hz for the selected profile. Example: Device(config-ap-profile)# hyperlocation ble-beacon interval 1 hyperlocation ble-beacon advpwr Configures the BLE beacon-advertised value-in-dBm attenuation level. Valid range is between 40 Example: dBm and 100 dBm. The default value is 59 dBm. Device(config-ap-profile)# hyperlocation ble-beacon advpwr 40 Information About AP Group NTP Server Features such as Cisco Hyperlocation, BLE Angle of Arrival (AoA), and Intelligent Capture (iCAP) require precise time across APs within an AP group to achieve location accuracy. Because the controller and controller global NTP server are configured on the WAN, they might have large synchronization delays from the APs, and this might compromise location accuracy. If all the APs in an AP group synchronize with the same NTP server, accurate data can be obtained to calculate the location. Configuring the NTP server locally for all the APs in an AP group helps achieve better synchronization among APs. Configuring an AP Group NTP Server Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap profile profile-name Example: Configures an AP profile and enters AP profile configuration mode. Device(config)# ap profile profile-name Step 3 [no] ntp ip ip-address Example: Sets the IP address of the NTP server. The no form of this command removes the NTP server. Device(config-ap-profile)# [no] ntp ip 9.0.0.4 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 772 System Management Configuring AP Timezone Step 4 Command or Action Purpose [no] ntp auth-key key-index type type format Configures NTP server per AP profile to format key encryption-type server-key support authentication. The no ntp auth-key Example: command removes the NTP server from each AP profile. Device(config-ap-profile)# ntp auth-key index 1 type md5 format ascii key 0 Note For ASCII key, ensure that the 3434324 length is less than 21 bytes. For HEX key, the length should be less than 41, using only numbers between 0-9 and characters from a-f. Configuring AP Timezone Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap profile profile-name Example: Device(config)# ap profile test Configures the AP profile and enters AP profile configuration mode. Step 3 timezone {use-controller | delta hour Configures the timezone offset for AP. offset-hour minute offset-minute} You can configure the AP timezone only for Example: each AP profile. You cannot configure timezone Device(config-ap-profile)# timezone delta for each AP. hour -12 minute 2 To configure the timezone, either apply the current controller timezone or the time difference. By default, timezone is disabled. Information About BLE Concurrent Scanning and Beaconing From Cisco IOS XE Cupertino 17.9.1, Cisco Catalyst Wi-fi6 APs in basic mode or Cisco IOx mode support concurrent scanning and beaconing. The BLE radio on an AP can stop a scan for beacon transmission and return to the scan after completing the beacon transmission. This feature is supported only on Cisco Catalyst 9105ax, 9120ax, 9124, 9130, 9136, and Cisco Catalyst 916x APs. BLE concurrent scanning and beaconing can be enabled from Cisco Spaces using the Dual mode under Device Management > AP Beacon > Settings. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 773 Verifying BLE Concurrent Scanning and Beaconing System Management Note BLE concurrent scanning and beaconing is not supported when v-IBeacon is used. Supported advertisement profiles are iBeacon, Eddystone-URL, and Eddystone-UID. Verifying BLE Concurrent Scanning and Beaconing Use the following commands to verify the status of concurrent scanning and beaconing. To display the advertisement profile, scan counters, and advertisement counters along with other information, use the following command from the AP console: Device# show controllers IOTRadio ble 0 interface Active BLE host interface : /dev/ttyiot0 BLE Radio Status : Powered on Device Status : Open Device Mode : Native Device resets :4 Last Reset Reason : Watchdog Timer Reset Heart beat status : On Scan Status : Enabled Active Transmit Profile : Eddystone URL BLE MAC : 80:6F:B0:31:EF:74 Transmitted advertisement count since BLE enabled :0 Total scan records received : 3617 To see whether the transmit profile configuration has been successfully pushed from Cisco Spaces to the AP, use the following command from the AP console: Device# show controllers iOTRadio ble 0 broadcast BLE Profile Config ------------------Active profile Profile 0 (iBeacon) UUID Interval (ms) Power (dBm) Advertised Power (dBm) Minor Major TxPower byte : Eddystone UID : 00000001023012120312032130012111 : 100 :0 : -45 : 29219 : 35826 : Profile 1 (Eddystone UID) Namespace (hex) : 00000000000000000999 Instance-ID (hex) : 000000000555 Profile 2 (Eddystone URL) URL : Profile 3 (v-iBeacon) v-iBeacon status : Disabled Chirping interval (ms) : 100 Profile 4 (Custom Profile) Adv Data : 00000000000000000000000000000000000000000000000000000000000000 Scan Data : Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 774 System Management Verifying Cisco Hyperlocation 00000000000000000000000000000000000000000000000000000000000000 Simulator mode : Disabled Beacon-ID Mac UUID Major Minor Status 1 10:F9:20:FE:1D:8F 00000000000000000000000000000000 0 0 0 2 10:F9:20:FE:1D:8E 00000000000000000000000000000000 0 0 0 3 10:F9:20:FE:1D:8D 00000000000000000000000000000000 0 0 0 4 10:F9:20:FE:1D:8C 00000000000000000000000000000000 0 0 0 5 10:F9:20:FE:1D:8B 00000000000000000000000000000000 0 0 0 Beacon-ID Transmit power(dBm) Advertised power(dBm) 1 -21 -256 2 -21 -256 3 -21 -256 4 -21 -256 5 -21 -256 To view the list of joined APs that support the BLE Management feature along with the BLE details for each AP, use the following command from the controller: Device# show ap ble summary AP Name AP Model AP Ethernet MAC BLE BLE BLE mode BLE MAC BLE Profile BLE Scan Interface Admin State State -------------------------------------------------------------------------------------------------------------------- AP794 C9130AXI-B 04eb.409e.xxxx Open Up Base (Native) 806f.b031.xxxx Eddystone URL Enabled AP50 C9130AXI-B 04eb.409e.xxxx Close Down Base (Native) Unknown Not Configured Disabled AP28 C9136I 687d.b45c.xxxx Close Down Base (Native) Unknown Not Configured Disabled Verifying Cisco Hyperlocation To display the hyperlocation status values and parameters for all the AP profiles, use the following command: Device# show ap hyperlocation summary Profile Name: custom-profile Hyperlocation operational status: Down Reason: Hyperlocation is administratively disabled Hyperlocation NTP server: 209.165.200.224 Hyperlocation admin status: Disabled Hyperlocation detection threshold (dBm): -100 Hyperlocation trigger threshold: 10 Hyperlocation reset threshold: 8 Profile Name: default-ap-profile Hyperlocation operational status: Up Reason: N/A Hyperlocation NTP server: 209.165.200.224 Hyperlocation admin status: Enabled Hyperlocation detection threshold (dBm): -90 Hyperlocation trigger threshold: 22 Hyperlocation reset threshold: 8 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 775 Verifying Cisco Hyperlocation System Management To display both the overall and and the per-AP configuration values and operational status, use the following command: Device# show ap hyperlocation detail Profile Name: house24 Hyperlocation operational status: Up Reason: NTP server is not properly configured Hyperlocation NTP server: 198.51.100.1 Hyperlocation admin status: Enabled Hyperlocation detection threshold (dBm): -90 Hyperlocation trigger threshold: 8 Hyperlocation reset threshold: 7 AP Name Radio MAC Method CMX IP AP Profile -------------------------------------------------------------------------------------------------- APe865.49d9.bfe0 e865.49ea.a4b0 WSM2+Ant 198.51.100.2 house24 APa89d.21b9.69d0 a89d.21b9.69d0 Local 198.51.100.3 house24 APe4aa.5d3f.d750 e4aa.5d5f.3630 WSM 198.51.100.4 house24 To display the overall (profile specific) configuration values and operational status for a given profile, use the following command: Device# show ap profile profile-name hyperlocation summary Profile Name: profile-name Hyperlocation operational status: Up Reason: N/A Hyperlocation NTP server: 209.165.200.224 Hyperlocation admin status: Enabled Hyperlocation detection threshold (dBm): -100 Hyperlocation trigger threshold: 10 Hyperlocation reset threshold: 8 To display both the overall (profile specific) and per-AP configuration values and operational status for a given profile, use the following command. The APs listed are only those APs that belong to the specified join profile. Device# show ap profile profile-name hyperlocation detail Profile Name: profile-name Hyperlocation operational status: Up Reason: N/A Hyperlocation NTP server: 209.165.200.224 Hyperlocation admin status: Enabled Hyperlocation detection threshold (dBm): -90 Hyperlocation trigger threshold: 8 Hyperlocation reset threshold: 7 AP Name Radio MAC Method CMX IP ---------------------------------------------------------------- APf07f.0635.2d40 f07f.0635.2d40 WSM2+Ant 198.51.100.2 APf07f.0635.2d41 f07f.0635.2d41 Local 198.51.100.3 APf07f.0635.2d42 f07f.0635.2d42 WSM 198.51.100.4 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 776 System Management Verifying Cisco Hyperlocation To display configuration values for an AP profile, use the following command: Device# show ap profile profile-name detailed Hyperlocation : Admin State : ENABLED PAK RSSI Threshold Detection: -100 PAK RSSI Threshold Trigger : 10 PAK RSSI Threshold Reset : 8 . . . To display the Cisco CMXs that are correctly joined and used by hyperlocation, use the following command: Device# show ap hyperlocation cmx summary Hyperlocation-enabled CMXs IP Port Dest MAC Egress src MAC Egress VLAN Ingress src MAC Join time ----------------------------------------------------------------------------------------------- 198.51.100.4 2003 aaaa.bbbb.cccc aabb.ccdd.eeff 2 0000.0001.0001 12/14/18 09:27:14 To display the hyperlocation client statistics, use the following command: Device# show platform hardware chassis active qfp feature wireless wlclient cpp-client summary Client Type Abbreviations: RG - REGULAR BL - BLE HL - HALO LI - LWFL INT Auth State Abbreviations: UK - UNKNOWN IP - LEARN IP IV - INVALID L3 - L3 AUTH RN - RUN Mobility State Abbreviations: UK - UNKNOWN IN - INIT LC - LOCAL AN - ANCHOR FR - FOREIGN MT - MTE IV - INVALID EoGRE Abbreviations: N - NON EOGRE Y - EOGRE CPP IF_H DPIDX MAC Address VLAN CT MCVL AS MS E WLAN POA ------------------------------------------------------------------------------ 0X32 0XF0000001 0000.0001.0001 9 HL 0 RN LC N NULL To display the interface handle value statistics, use the following command: Device# show platform hardware chassis active qfp feature wireless wlclient datapath cpp-if-handle 0x32 statistics start To display the recorded flow, use the following command: Device# show platform hardware chassis active qfp feature wireless wlclient datapath cpp-if-handle 0X32 statistics Pkts Bytes Rx 26 3628 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 777 Verifying Cisco Hyperlocation System Management To stop statistics capture, use the following command: Device# show platform hardware chassis active qfp feature wireless wlclient datapath cpp-if-handle 0x32 statistics stop To view the APs requested by Cisco CMX with AP groups' support, use the following commands: Device# show nmsp subscription group summary CMX IP address: 198.51.100.4 Groups subscribed by this CMX server: Group name: CMX_1198.51.100.4 Device# show nmsp subscription group detail ap-list CMX_198.51.100.1 198.51.100.1 CMX IP address: 198.51.100.1 CMX Group name: CMX_198.51.100.1 CMX Group AP MACs: : aa:bb:cc:dd:ee:01 aa:bb:cc:dd:ee:02 aa:bb:cc:dd:ee:03 aa:bb:cc:dd:ee:03 To display the NTP IP address and authentication parameters, use the following command: Device# show ap profile profile-name detailed . . . NTP Authentication : ENABLED Key id : 2 Key type : SHA1 Key format : HEX Key : 3a2275c74c250c362ca63e4af06fa3f3cd8d4aec Encryption type : Clear . . . To display the NTP status for each AP, use the following command: Device# show ap name AP-G1-230 ntp status ap-name AP-G1-230 enabled v4/v6 IPAddress Y v4 198.51.100.5 Status Stratum LastSync SyncOffset AuthFail 4 1000 100 To display NTP status for all the APs, use the following command: Device# show ap ntp status ap-name AP-G1-230 AP-G1-231 AP-G1-232 enabled v4/v6 IPAddress Status Stratum LastSync Y v4 5.5.5.5 AuthFail 2 Never Y v4 5.5.5.10 Synced 3 1000 Y v4 5.5.5.15 Synced 16 2000 SyncOffset 100 50 To display the instant status of NTP synchronization in an AP, use the following command. The following output is from an AP and not from the controller. Device# show ntp Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 778 System Management Verifying Hyperlocation BLE Beacon Configuration !This error message is displayed when NTP is not configured. %Error: ntpd is not running !The following output is displayed when NTP is configured. Stratum Version Last Received Delay Offset Jitter NTP server 13 4 7sec ago 1.124ms 0.536ms 0.001ms 198.51.100.5 To display AP timezone information, use the following command: Device# show ap timezone AP Name Status Offsets(h/m) -------------------------- AP1 Disabled 0:0 AP2 Enabled 1:0 Verifying Hyperlocation BLE Beacon Configuration To verify the list of configured BLE beacons, use the following command: Device# show ap profile ap-profile-name hyperlocation ble-beacon BLE Beacon interval (Hz): 1 BLE Beacon advertised attenuation value (dBm): -59 ID UUID TX Power(dBm) Status ----------------------------------------------------------------- 0 ffffffff-aaaa-aaaa-aaaa-aaaaaaaaaaaa 0 Enabled 1 ffffffff-bbbb-bbbb-bbbb-bbbbbbbbbbbb 0 Enabled 2 ffffffff-gggg-gggg-gggg-gggggggggggg 0 Enabled 3 ffffffff-dddd-dddd-dddd-dddddddddddd 0 Enabled 4 ffffffff-eeee-eeee-eeee-eeeeeeeeeeee 0 Enabled Verifying Hyperlocation BLE Beacon Configuration for AP To verify the Hyperlocation BLE Beacon configuration for an AP, use the following command: Device# show ap name test-ap hyperlocation ble-beacon BLE Beacon interval (Hz): 1 BLE Beacon advertised attenuation value (dBm): -60 ID Status UUID Major Minor TXPower(dBm) --------------------------------------------------------------------------0 Enabled 99999999-9999-9999-9999-999999999999 8 0 -0 1 Enabled bbbbbbbb-bbbb-bbbb-bbbb-bbbbbbbbbbbb 8 1 -0 2 Enabled 88888888-8888-8888-8888-888888888888 8 2 -0 3 Enabled dddddddd-dddd-dddd-dddd-dddddddddddd 8 3 -0 4 Enabled eeeeeeee-eeee-eeee-eeee-eeeeeeeeeeee 8 4 -0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 779 Verifying Hyperlocation BLE Beacon Configuration for AP System Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 780 6 5 C H A P T E R FastLocate for Cisco Catalyst Series Access Points · Information About FastLocate, on page 781 · Restrictions on FastLocate, on page 781 · Supported Access Points, on page 782 · FastLocate Network Components, on page 782 · Configuring FastLocate (GUI), on page 783 · Verifying FastLocate on Cisco Catalyst APs, on page 783 Information About FastLocate Current Wi-Fi location technology relies on mobile devices sending received signal strength indication (RSSI) or location information, based on probe request messaging, to access points. This information is sent on most channels by the mobile device and received by neighbor APs on different channels. This helps in location estimation. Wi-Fi clients are moving towards lesser probing to discover an AP. This helps to conserve battery power. Depending on the client, operating system, driver, battery, current, and client activity, device probing frequency varies anywhere from 10 seconds to 5 minutes. This variation results in inadequate data points to represent real-world movement. Since data packets are more frequent than probe request packets, they can be aggregated better. FastLocate enables higher location refresh rates by collecting RSSI or location information through data packets received by the APs. Using these data packets, location- based services (LBS) updates are initiated by the network and are available more frequently. Restrictions on FastLocate In Fabric deployments, the Wireless Management Interface (WMI) cannot be an L3 interface (Loopback Interface). Note It is recommended to use a VLAN interface as the WMI, if you want to use FastLocate in Fabric deployment. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 781 Supported Access Points System Management Supported Access Points Beginning with IOS XE 17.1.1, FastLocate feature is supported on the Cisco Catalyst 9120 Series Access Points. In IOS XE 17.3.1, the following APs support the FastLocate feature: · Cisco Catalyst 9130 Series Access Points · Cisco Catalyst 9120 Series Access Points · Cisco Aironet 4800 Series Access Points. · Cisco Aironet 3800 Series Access Points. · Cisco Aironet 2800 Series Access Points. In addition, Cisco Aironet 4800 Series Access Pointsalso supports the Angle of Arrival based location calculation (Hyperlocation). When FastLocate is enabled, the Cisco RF ASIC radios of these APs act as a WSSI module and transform into a monitoring role and off-channel scanning mode. The Cisco RF ASIC radios scan through all the 2.4-GHz channels and 5-GHz channels in a linear fashion, with each channel scanned for 150 milliseconds. This period is called the dwell time. The Cisco RF ASIC radios of the APs are synchronized with the NTP server. Using FastPath, all data packet RSSI records that are collected during one off-channel dwell is sent in a specific packet format to the Cisco controller, at the end of the dwell time. FastLocate Network Components For successful packet RSSI location computation, the following components with necessary functionalities are needed: · Wireless client · Send data, management, and control packets · Cisco Catalyst 9800 Series Wireless Controller · Configure NTP server information and location parameters on AP · Forward clients' RSSI related information to CMX/MSE via FastPath/datapath · Cisco Catalyst 9120 Series AP · Location radio in monitor or equivalent role · Time synchronized with NTP server · Collect RSSI related data sent by clients (both associated and unassociated) · Send clients' RSSI data to the Cisco controller through CAPWAP · Cisco CMX Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 782 System Management Configuring FastLocate (GUI) · Parse fastpath location data received by WLC · Calculate exact physical location of the client and render on GUI using algorithms Configuring FastLocate (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > AP Join. On the AP Join page, click the default-ap-profile AP join profile. In the Edit AP Join Profile window, click the AP tab. Under Hyperlocation, select the Enable Hyperlocation check box. Click Update & Apply to Device. Verifying FastLocate on Cisco Catalyst APs To verify FastLocate, use the below commands on the AP: Device# show ntp Stratum Version Last Received Delay Offset Jitter NTP server 1 4 123sec ago 1.169ms -3.262ms 10.050ms 7.7.7.2 Device# show ap fast-path statistics total packets sent : 90001 invalid app ID drops : 0 application : 0 (HALO) packets sent (CAPWAP) : 90001 packets sent (APP HOST INTF) : 0 admin state drops :0 no dest IP drops :0 To view FastLocate admin status details on the AP, use the following command: Device# show capwap client rcb Hyperlocation Admin State : Enabled MSE Gateway MAC : 00:50:56:86:0F:9D WLC Hyperlocation Source Port: 9999 MSE IP Address : 10.0.0.1 To view FastPath-related parameters on the AP like source and destination IP addresses, port numbers, and the gateway MAC address, use the following command: Device# show ap fast-path configuration hyperlocation source IP address : 10.0.0.2 destination IP address: 10.0.0.1 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 783 Verifying FastLocate on Cisco Catalyst APs System Management source port (WLC) : 9999 destination port (MSE): 2003 gateway MAC : 00:50:56:86:0F:9D ewlc hyperlocation MAC: 00:00:00:01:00:01 To verify FastLocate on the Cisco Catalyst controller, use the appropriate command given below. To view the summary of applications that send fastpath or datapath data, use the below command. The hexcode for the HyperLocation and BLE port numbers are displayed. Device# show platform hardware chassis active qfp feature wireless wlclient cpp-client summary Client Type Abbreviations: RG - REGULAR BL - BLE HL - HALO LI - LWFL INT Auth State Abbreviations: UK - UNKNOWN IP - LEARN IP IV - INVALID L3 - L3 AUTH RN - RUN Mobility State Abbreviations: UK - UNKNOWN IN - INIT LC - LOCAL AN - ANCHOR FR - FOREIGN MT - MTE IV - INVALID EoGRE Abbreviations: N - NON EOGRE Y - EOGRE CPP IF_H DPIDX MAC Address VLAN CT MCVL AS MS E WLAN POA ----------------------------------------------------------------------- 0X31 0XF0000002 0000.0003.0001 122 BL 0 RN LC N NULL 0X32 0XF0000001 0000.0001.0001 122 HL 0 RN LC N NULL To capture statistics of a selected application, use the below command: Device# show platform hardware chassis active qfp feature wireless wlclient datapath cpp-if-handle register-code statistics start The hex-value of the register-code is obtained from the show platform hardware chassis active qfp feature wireless wlclient cpp-client summary command mentioned earlier. Device# show platform hardware chassis active qfp feature wireless wlclient datapath cpp-if-handle 0x32 statistics start To display the statistics of the selected application, use the below command: Device# show platform hardware chassis active qfp feature wireless wlclient datapath cpp-if-handle register-code statistics The hex-value of the register-code is obtained from the show platform hardware chassis active qfp feature wireless wlclient cpp-client summary command mentioned earlier. Device# show platform hardware chassis active qfp feature wireless wlclient datapath cpp-if-handle 0x32 statistics Pkts Bytes Rx 232 38850 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 784 6 6 C H A P T E R IoT Services Management · Information About IoT Services Management, on page 785 · Enabling the Dot15 Radio, on page 786 · Configuring the gRPC Token, on page 786 · Enabling gRPC in an AP Profile, on page 787 · Verifying BLE State and Mode, on page 787 · Verifying BLE Details, on page 788 · Verifying gRPC Summary, Status, and Statistics, on page 789 Information About IoT Services Management Cisco Catalyst 9800 devices running the Cisco IOS-XE image Version 17.3.2 support Cisco Spaces: IoT Services along with the Network Assurance on Cisco Digital Network Architecture (DNA) Center. However, IoT Services and the Intelligent Capture (iCAP) port configuration are mutually exclusive. That is, if the iCAP feature needs to be enabled on a device, then IoT Services cannot be deployed. Similarly, if IoT Services needs to be enabled on a device, then iCAP feature cannot be deployed. The following are the gRPC connections from AP: · One gRPC connection from AP to DNAC for iCAP. · Other gRPC connection from AP to Cisco Spaces Connector for IoT Services. Following is a table that shows the pairs of configurations that can or cannot coexist on IOS-XE image version 17.3.2. Cisco DNA-C Configuration Cisco Spaces Configuration Coexistence on IOS-XE Image Version 17.3.2 network-assurance enable ap cisco-dna token token yes network-assurance icap server port port ap cisco-dna token token no Cisco Spaces: IoT Services is an end-to-end solution. Hence, you do not need to manually enable IoT services or Dot15 radio on the controller. Dot15 radio is enabled or disabled automatically through Cisco Spaces. However, you can verify if Dot15 radio is enabled from the controller. Similarly, Cisco Spaces enables gRPC in the default ap profile configuration of the controller. You do not need to manually enable it. However, you can verify the same on the controller. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 785 Enabling the Dot15 Radio System Management Cisco Spaces enables the apphost configuration, which is required for the default ap profile configuration. If apphost is not enabled by Cisco Spaces, then you must manually enable it. This is required in order to host IOx applications on an AP. Enabling the Dot15 Radio When you enable the BLE radio configuration globally, the APs that are joined to the controller enable their BLE radio, if they have the BLE radio chip in their hardware. This configuration will be applied to all the APs that will join the controller after the configuration is enabled. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 no ap dot15 shutdown Example: Device(config)# no ap dot15 shutdown Step 3 ap dot15 shutdown Example: Device(config)# ap dot15 shutdown Purpose Enters global configuration mode. Enables the dot15 radios for APs, globally. Disables the dot15 radio for all APs, globally. Configuring the gRPC Token Note · The configuration is pushed automatically from Cisco Spaces. There is no need to manually enable gRPC on the default ap profile configuration. You can verify the same on the controller · The NETCONF (NETCONF/YANG configuration) must be enabled on the device for the Cisco Spaces to push the required configuration to the controller. Secure Copy (ip scp server enable) must be enabled on the controller so that Cisco Spaces can push the gRPC certificate to the controller. · The iCAP server port configuration should not be present in the configuration. If it exists, then run the iCAP server port 0 command. Procedure Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 786 System Management Enabling gRPC in an AP Profile Step 2 Command or Action Device# configure terminal Purpose ap cisco-dna token {0 | 8} cisco-token-number Configures the Cisco Spaces gRPC token. Example: Device(config)# ap cisco-dna token 0 cisco-token-number 0: Specifies the string as an UNENCRYPTED password. 8: Indicates the placeholder for backward compatibility. Enabling gRPC in an AP Profile The Manage Streams feature of Cisco Spaces pushes the gRPC configuration only to the default AP profile, currently. If you are using a different AP profile, you must manually configure gRPC. The following procedure explains how to manually enable gRPC on an AP profile that is not the default-ap-profile.Cisco Spaces may not push gRPC on all the AP profiles. Therefore, the following commands can be used to enable gRPC for individual AP profiles. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap profile ap-profile-name Example: Device(config)# ap profile ap-profile-name Configures the AP profile and enters the AP profile configuration mode. Step 3 cisco-dna grpc Example: Enables the gRPC channel on the APs, in the AP profile. Device(config-ap-profile)# cisco-dna grpc Verifying BLE State and Mode To verify the BLE state and mode, run the following command: Device# show ap ble summary AP Name BLE AP State BLE mode -------------------------------------------------------------------------- Axel-1 Up Advanced (IOx) Axel-2 Up Advanced (IOx) 9117-1 Up Advanced (IOx) 3800-1 Up Base (Native) 1815 Up Base (Native) 9120-3 Up Advanced (IOx) Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 787 Verifying BLE Details System Management 9120-1 Up 9115-ax Up 9120-2 Up Base (Native) Base (Native) Base (Native) Verifying BLE Details To verify BLE details, run the following command: Device# show ap name APXXXX.BDXX.29XX ble detail Mode report time : 07/28/2020 09:40:57 Mode : Base (Native) Radio mode : BLE Admin state report time : 07/28/2020 09:40:57 Admin state : Up Interface report time : 07/28/2020 09:40:57 Interface : MSM1 Interface state : Open Type : Integrated Capability report time : 07/14/2020 17:10:49 Capability : BLE, Zigbee, USB, Host data report time : 07/28/2020 09:52:04 Host data Device name : APXXXXBDX Dot15 Radio MAC : 18:04:ed:c5:0e:c8 API version :1 FW version : 2.7.16 Broadcast count : 4389 Uptime : 596050 deciseconds Active profile : viBeacon Scan Statistics report time : 07/28/2020 09:40:57 Scan statistics Total scan records :0 Scan role report time : 07/28/2020 09:43:19 Scan role Scan state : Disable Scan interval : 0 seconds Scan window : 800 milliseconds Scan max value :8 Scan filter : Enable Broadcaster role Current profile type: iBeacon Last report time : N/A UUID : Unknown Major : Unknown Minor : Unknown Transmit power : Unknown Frequency : Unknown Advertised transmit power : Unknown Current profile type: Eddystone URL Last report time : 07/28/2020 09:47:17 URL : https://www.cisco.com Current profile type: Eddystone UID Last report time : 07/28/2020 09:43:25 Namespace : 04d77XXXXXXXXXXXXXXX Instance id : 5df5XXXXXXXX Current profile type: viBeacon Last report time : 07/28/2020 09:52:04 Interval : 450 milliseconds Beacon ID :0 UUID : 30XXXXXX-3XXX-4XXX-9XXX-d3XXXXXXXXXX Major : 36341 Minor : 33196 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 788 System Management Verifying gRPC Summary, Status, and Statistics Transmit power : 3 dBm Advertised transmit power : 60 dBm Enable : Enable Beacon ID :1 UUID : 57XXXXXX-cXXX-4XXX-aXXX-85XXXXXXXXXX Major : 3875 Minor : 567 Transmit power : 2 dBm Advertised transmit power : 69 dBm Enable : Enable . . . Verifying gRPC Summary, Status, and Statistics To verify the gRPC summary, run the following command: Device# show ap grpc summary AP Name AP Mac gRPC Status ----------------------------------------------------------------------------------- APXXXX.BDXX.F2XX 0cXX.bdXX.66XX Up To verify the packet statistics on the gRPC channel that also shows the transmit and receive failures, run the following command: Device# show ap name APXXXX.BDXX.F2XX grpc detail gRPC channel status : Up Packets transmit attempts : 62 Packets transmit failures : 0 Packets receive count : 62 Packets receive failures : 0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 789 Verifying gRPC Summary, Status, and Statistics System Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 790 6 7 C H A P T E R IoT Module Management in the Controller · Information About IoT Module Management in the Controller, on page 791 · Enabling a USB on the Controller, on page 791 · Verifying the USB Modules, on page 792 Information About IoT Module Management in the Controller The IoT Module Management feature uses the USB interface on the Cisco Catalyst 9105AXI, 9105AXW, 9115AX, 9117AX, 9120AX, and 9130AX Series access points (APs), to connect to the Cisco Internet of Things (IoT) connector. These APs host the third-party application software components, that act as containers. Cisco Digital Network Architecture (DNA) Center helps in the provisioning, deployment, and life cycle management of the container applications on the APs. The controller and the APs are managed by Cisco DNA Center. You can connect the USB modules to the APs, and then log in to the controller and run commands to enable the USB modules and the Cisco IOx application in the APs associated with an AP profile group. Enabling a USB on the Controller To enable a USB for all the APs connected in an AP profile and to enable Cisco IOx on all the APs, follow this procedure. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap profile ap profile name Example: Purpose Enters global configuration mode. Configures an AP profile and enters AP profile configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 791 Verifying the USB Modules System Management Step 3 Step 4 Step 5 Step 6 Command or Action Device(config)# ap profile ap-profile-test Purpose Note You can use the default AP profile (default-ap-profile) or create a named AP profile, as shown in the example in the adjacent column. apphost Example: Device(config-ap-profile)# apphost Enables the apphost framework on Cisco APs. usb-enable Example: Device(config-ap-profile)# usb-enable Enables a USB for Cisco APs. exit Example: Device(config-ap-profile)# exit Exits AP profile configuration mode. copy running-config startup-config Example: Device(config)# copy running-config startup-config Writes running configuration to the memory. Verifying the USB Modules To verify the state of USB modules, run the following command: Device# show ap config general USB Module Type : USB Module USB Module State : Enabled USB Operational State : Enabled USB Override : Disabled To verify the apphost status, run the following command: Device# show ap apphost summary AP Name AP Mac Apphost Status CAF Port Apphost HW capable --------------------------------------------------------------------------------------------------------- SS-2027 00xx.abXX.bXXX Up 8443 Yes Axel-2036 04xx.40XX.aXXX Up 8443 Yes Haida-PrePilot 0cxx.f8XX.0XXX Up 8443 Yes Somer-infra-2022 3cxx.0eXX.0XXX Up 8443 Yes AP5C71.0DEC.DB5C 3cxx.0eXX.0XXX Up 8443 Yes AP5C71.0DEC.E3D8 3cxx.0eXX.4XXX Up 8443 Yes Somer-WP-2021 3cxx.0eXX.5XXX Up 8443 Yes AP5C71.0DEC.EC60 3cxx.0eXX.9XXX Up 8443 Yes SS-2005 6cXX.05XX.dXXX Up 8443 Yes Vanc-2042 d4XX.bdXX.2XXX Up 8443 Yes To verify the apphost status, run the following command: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 792 System Management Verifying the USB Modules Device# show ap module summary AP Name External Module External Module PID External Module Description ---------------------------------------------------------------------------------------------- Axel-2036 Enable 10xx/eaXX/100 CP2XXXX USB to UART Bridge C Haxx-PrePilot Enable 10xx/eaXX/100 CP2XXXX USB to UART Bridge C APXXX.0XXX.EXX Enable 10xx/eaXX/100 CP2XXXX USB to UART Bridge C SS-2005 Enable 10xx/eaXX/100 CP2XXXX USB to UART Bridge C Vaxx-2006 Enable 10xx/eaXX/100 CP2XXXX USB to UART Bridge C Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 793 Verifying the USB Modules System Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 794 6 8 C H A P T E R Cisco Spaces · Cisco Spaces, on page 795 · Configuring Cisco Spaces, on page 795 · Verifying Cisco Spaces Configuration, on page 796 Cisco Spaces Cisco Spaces is the next generation indoor location services platform. The Network Mobility Services Protocol (NMSP) cloud-service of the wireless controller communicates with Cisco Spaces using HTTPS as a transport protocol. Configuring Cisco Spaces Follow the procedure given below to configure Cisco Spaces: Before you begin · Configure DNS--To resolve fully qualified domain names used by NMSP cloud-services, configure a DNS using the ip name-server server_address configuration command as shown in Step 2. · Import 3rd party root CAs--The controller verifies the peer and the host based on the certificate that is sent by the CMX when a connection is established. However, root CAs are not preinstalled on the controller. You have to import a set of root CAs trusted by Cisco to the trustpool of the crypto PKI by using the crypto pki trustpool import url <url> configuration command as shown in Step 3. · A successful registration to Cisco Spaces is required to enable server url and server token parameters configuration which is needed to complete this setup. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 795 Verifying Cisco Spaces Configuration System Management Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Command or Action ip name-server namesvr-ip-addr Example: Device(config)#ip name-server 10.10.10.205 Purpose Configures the DNS on the controller to resolve the FQDN names used by the NMSP cloud-services. crypto pki trustpool import url url Example: Imports the 3rd party root CA. The controller verifies the peer using the imported certificate. Device(config)#crypto pki trustpool import url http://www.cisco.com/security/pki/trs/ios.p7b [no] nmsp cloud-services server url url Example: Device(config)# nmsp cloud-services server url https://cisco.com Configures the URL used for cloud services. Use the no form of the command to delete the server url from the configuration. [no] nmsp cloud-services server token token Configures the authentication token for the Example: Device(config)# nmsp cloud-services server token test NMSP cloud service. Use the no form of the command to delete the server token from the configuration. [no] nmsp cloud-services http-proxy proxy-server port Example: Device(config)# nmsp cloud-services http-proxy 10.0.0.1 10 (Optional) Configures HTTP proxy details for the NMSP cloud service. Use the no form of the command to disable the use of a HTTP proxy. [no] nmsp cloud-services enable Example: Device(config)# nmsp cloud-services enable Enables NMSP cloud services. Use the no form of the command to disable the feature. Verifying Cisco Spaces Configuration Use the following commands to verify the Cisco Spaces configuration. To view the status of active NMSP connections, use the following command: Device# show nmsp status MSE IP Address Tx Echo Resp Rx Echo Req Tx Data Rx Data Transport ---------------------------------------------------------------------------- 9.9.71.78 0 0 1 1 TLS 64.103.36.133 0 0 1230 2391 HTTPs To view the NMSP cloud service status, use the following command: Device# show nmsp cloud-services summary CMX Cloud-Services Status Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 796 System Management Verifying Cisco Spaces Configuration ------------------------- Server: IP Address: Cmx Service: Connectivity: Service Status: Last Request Status: Heartbeat Status: https://yenth8.cmxcisco.com 64.103.36.133 Enabled https: UP Active HTTP/1.1 200 OK OK To view the NMSP cloud service statistics, use the following command: Device# show nmsp cloud-services statistics CMX Cloud-Services Statistics ----------------------------- Tx DataFrames: Rx DataFrames: Tx HeartBeat Req: Heartbeat Timeout: Rx Subscr Req: Tx DataBytes: Rx DataBytes: Tx HeartBeat Fail: Tx Data Fail: Tx Conn Fail: 3213 1606 31785 0 2868 10069 37752 2 0 0 To view the mobility services summary, use the following command: Device# show nmsp subscription summary Mobility Services Subscribed: Index Server IP Services ----- --------- -------1 209.165.200.225 RSSI, Info, Statistics, AP Monitor, AP Info 2 209.165.200.225 RSSI, Statistics, AP Info Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 797 Verifying Cisco Spaces Configuration System Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 798 6 9 C H A P T E R EDCA Parameters · Enhanced Distributed Channel Access Parameters, on page 799 · Configuring EDCA Parameters (GUI), on page 799 · Configuring EDCA Parameters (CLI), on page 800 Enhanced Distributed Channel Access Parameters Enhanced Distributed Channel Access (EDCA) parameters are designed to provide preferential wireless channel access for voice, video, and other quality of service (QoS) traffic. This section contains the following subsections: Configuring EDCA Parameters (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Radio Configurations > Parameters. Using this page, you can configure global parameters for 802.11a/n/ac (5 GHz) and 802.11b/g/n (2.4 GHz) radios. Note You cannot configure or modify parameters, if the radio network is enabled. Disable the network status on the Configuration > Radio Configurations > Network page before you proceed. In the EDCA Parameters section, choose an EDCA profile from the EDCA Profile drop-down list. Enhanced Distributed Channel Access (EDCA) parameters are designed to provide preferential wireless channel access for voice, video, and other quality-of-service (QoS) traffic. For 802.11a/n/ac (5 GHZ) radios, in the (DFS 802.11h) section, enter the local power constraint. You cannot configure power constraint if the DTPC Support check box on the Configure > Radio Configurations > Network page is checked. The valid range is between 0 dBm and 30 dBm. Check the Channel Switch Announcement Mode check box, if you want the AP to announce when it is switching to a new channel and the new channel number. The default value is disabled. Check the Smart DFS check box to enable Dynamic Frequency Selection (DFS) and avoid interference with the radar signals. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 799 Configuring EDCA Parameters (CLI) System Management Step 6 Click Apply. Configuring EDCA Parameters (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 {5ghz | 24ghz | 6ghz} shutdown Disables the radio network. Example: Device(config)# ap dot11 5ghz shutdown Step 3 ap dot11 {5ghz | 24ghz | 6ghz} edca-parameters {client-load-based | custom-voice | fastlane | optimized-video-voice | optimized-voice | svp-voice | wmm-default} Example: Device(config)# ap dot11 5ghz edca-parameters optimized-voice Enables specific EDCA parameters for the 802.11a, 802.11b/g, or 802.11 6-GHz network. Note The custom-voice option is not supported for Cisco Catalyst 9800 Series Wireless Controller. · client-load-based: Enables client load based EDCA configuration. · custom-voice: Enables custom voice parameters for the 802.11a or 802.11b/g network. · fastlane: Enables the fastlane parameters for the 802.11a or 802.11b/g network. · optimized-video-voice: Enables EDCA voice-optimized and video-optimized parameters for the 802.11a or 802.11b/g network. Choose this option when both voice and video services are deployed on your network. · optimized-voice: Enables non-SpectraLink voice-optimized profile parameters for the 802.11a or 802.11b/g network. Choose this option when voice services other than SpectraLink are deployed on your network. · svp-voice: Enables SpectraLink voice-priority parameters for the 802.11a or 802.11b/g network. Choose this option if SpectraLink phones are deployed on Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 800 System Management Configuring EDCA Parameters (CLI) Step 4 Step 5 Step 6 Command or Action Purpose your network to improve the quality of calls. · wmm-default: Enables the Wi-Fi Multimedia (WMM) default parameters for the 802.11a or 802.11b/g network. This is the default option. Choose this option when voice or video services are not deployed on your network. no ap dot11 {5ghz | 24ghz | 6ghz} shutdown Enables the radio network. Example: Device(config)# no ap dot11 5ghz shutdown end Example: Device(config)# end Returns to privileged EXEC mode. show ap dot11 {5ghz | 24ghz | 6ghz} network Displays the current status of MAC optimization Example: for voice. Device# show ap dot11 5ghz network Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 801 Configuring EDCA Parameters (CLI) System Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 802 7 0 C H A P T E R Adaptive Client Load-Based EDCA · Feature History for Adaptive Client Load-Based EDCA, on page 803 · Information About Adaptive Client Load-Based EDCA, on page 803 · Restrictions for Adaptive Client Load-Based EDCA, on page 804 · Configuration Workflow, on page 804 · Configuring Adaptive Client Load-Based EDCA (GUI), on page 804 · Configuring Adaptive Client Load-Based EDCA (CLI), on page 805 · Verifying Adaptive Client Load-Based EDCA Configuration, on page 805 Feature History for Adaptive Client Load-Based EDCA This table provides release and related information for the features explained in this module. These features are available in all the releases subsequent to the one they were introduced in, unless noted otherwise. Table 58: Feature History for Adaptive Client Load-Based EDCA Release Cisco IOS XE Bengaluru 17.5.1 Feature Adaptive Client Load-Based EDCA Feature Information This Adaptive Client Load-Based EDCA feature dynamically changes Enhanced Distributed Channel Access (EDCA) parameters of clients based on the active client and load that significantly reduce collisions. Information About Adaptive Client Load-Based EDCA The static EDCA configuration is good for small number of clients. In an enterprise multiclient deployment scenario, access points (APs) experience excessive collisions as the number of clients increases resulting in significant performance degradation. To overcome such a scenario, the Adaptive Client Load-Based EDCA feature has been introduced. This feature dynamically changes EDCA parameters of clients based on the active client and load that significantly reduce collisions. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 803 Restrictions for Adaptive Client Load-Based EDCA System Management Feature Scenario Run-time EDCA configuration based on active clients and load. Use Case In a dense multiclient deployment scenario, when a customer was testing 40 iPads in a class room or auditorium setup, he observed that the channel utilization was 60 to 70 percent. The overall AP throughput was less because of air collusion and RTS retries. After the adaptive client load-based EDCA feature was enabled, the overall throughput increased by 15 to 20 percent and collision decreased by 30 to 40 percent. Restrictions for Adaptive Client Load-Based EDCA · You must disable the 802.11b network if you want to access the 802.11a network. Configuration Workflow · Configuring Adaptive Client Load-Based EDCA (GUI) · Configuring Adaptive Client Load-Based EDCA (CLI) Configuring Adaptive Client Load-Based EDCA (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Choose Configuration > Radio Configurations > Parameters to configure global parameters for 802.11a/n/ac (5-GHz) and 802.11b/g/n (2.4-GHz) radios. In the EDCA Parameters section, from the EDCA Profile drop-down list, choose an EDCA profile. Click the Client Load Based Configuration toggle button to enable or disable. It is enabled by default. For 802.11a/n/ac (5-GHz) radios, in the DFS (802.11h) section, enter the local power constraint. You cannot configure power constraint if the DPTC Support check box in Configuration > Radio Configurations > Network is checked. The valid range for power constraint is between 0 dBm and 30 dBm. From the Channel Switch Announcement Mode drop-down list, choose either the Loud or Quiet mode. Click the Smart DFS toggle button to enable or disable. It is enabled by default. In the 11ax Parameters section, enable or disable the following, using the corresponding toggle button: · Target Wakeup Time · Target Wakeup Time Broadcast · Multiple Bssid Enable BSS color globally for the 5-GHz and 2.4-GHz radios by checking the BSS Color check box. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 804 System Management Configuring Adaptive Client Load-Based EDCA (CLI) Step 9 Click Apply. Configuring Adaptive Client Load-Based EDCA (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap dot11 {24ghz | 5ghz | 6ghz} edca-parameters client-load-based Example: Device(config)# ap dot11 24ghz edca-parameters client-load-based Step 3 end Example: Device(config)# end Purpose Enters global configuration mode. Enables client load-based EDCA configuration for 802.11 radios. Use the no form of this command to disable the configuration. Note To enable the configuration on an 802.11a radio, you must disable the 802.11b network. Returns to privileged EXEC mode. Verifying Adaptive Client Load-Based EDCA Configuration To verify whether the Adaptive Client Load-Based EDCA feature is enabled on an 802.11a or an 802.11b radio, use the following command: Device# show ap dot11 24ghz network Device# show ap dot11 5ghz network EDCA profile type check Client Load Based EDCA Config : default-wmm : Enabled To verify whether the Adaptive Client Load-Based EDCA feature is enabled on an 802.11 6-GHz radio, use the following command: Device# show ap dot11 6ghz network . . . EDCA profile type check Client Load Based EDCA Config : default-wmm : Enabled To verify whether the Adaptive Client Load-Based EDCA feature is enabled on APs, use the following command: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 805 Verifying Adaptive Client Load-Based EDCA Configuration System Management Device# show capwap client config Client Load Based EDCA : Enabled To view the Adaptive EDCA parameters running on the driver, use the following command: Device# show controllers dot11Radio 0/1 EDCA Config: ==================== L:Local C:Cell A:Adaptive EDCA params AC Type CwMin CwMax Aifs Txop ACM AC_BE L 4 6 3 0 0 AC_BK L 4 10 7 0 0 AC_VI L 3 4 1 94 0 AC_VO L 2 3 1 47 0 AC_BE C 4 10 3 0 0 AC_BK C 4 10 7 0 0 AC_VI C 3 4 2 94 0 AC_VO C 2 3 2 47 0 AC_BE A 4 10 7 0 0 AC_BK A 4 10 3 0 0 AC_VI A 3 4 2 94 0 AC_VO A 2 3 2 47 0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 806 7 1 C H A P T E R 802.11 parameters and Band Selection · Information About Configuring Band Selection, 802.11 Bands, and Parameters, on page 807 · Restrictions for Band Selection, 802.11 Bands, and Parameters, on page 809 · How to Configure 802.11 Bands and Parameters, on page 809 · Monitoring Configuration Settings for Band Selection, 802.11 Bands, and Parameters, on page 819 · Configuration Examples for Band Selection, 802.11 Bands, and Parameters, on page 826 Information About Configuring Band Selection, 802.11 Bands, and Parameters Band Select Band select enables client radios that are capable of dual-band (2.4 and 5-GHz) operations to move to a less congested 5-GHz access point. The 2.4-GHz band is often congested. Clients on this band typically experience interference from Bluetooth devices, microwave ovens, and cordless phones as well as co-channel interference from other access points because of the 802.11b/g limit of 3 nonoverlapping channels. To prevent these sources of interference and improve overall network performance, configure band selection on the device. Band select works by regulating probe responses to clients and it can be enabled on a per-WLAN basis. It makes 5-GHz channels more attractive to clients by delaying probe responses to clients on 2.4-GHz channels. In an access point, the band select table can be viewed by running the show dot11 band-select command. It can also be viewed by running the show cont d0/d1 | begin Lru command. Note You can enable both band selection and aggressive load balancing on the controller. They run independently and do not impact one another. Band Select Algorithm The band select algorithm affects clients that use 2.4-GHz band. Initially, when a client sends a probe request to an access point, the corresponding client probe's Active and Count values (as seen from the band select table) become 1. The algorithm functions based on the following scenarios: · Scenario1: Client RSSI (as seen from the show cont d0/d1 | begin RSSIcommand output) is greater than both Mid RSSI and Acceptable Client RSSI. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 807 802.11 Bands System Management · Dual-band clients: No 2.4-GHz probe responses are seen at any time; 5-GHz probe responses are seen for all 5-GHz probe requests. · Single-band (2.4-GHz) clients: 2.4-GHz probe responses are seen only after the probe suppression cycle. · After the client's probe count reaches the configured probe cycle count, the algorithm waits for the Age Out Suppression time and then marks the client probe's Active value as 0. Then, the algorithm is restarted. · Scenario2: Client RSSI (as seen from show cont d0/d1 | begin RSSI) lies between Mid-RSSI and Acceptable Client RSSI. · All 2.4-GHz and 5-GHz probe requests are responded to without any restrictions. · This scenario is similar to the band select disabled. Note The client RSSI value (as seen in the sh cont d0 | begin RSSI command output) is the average of the client packets received, and the Mid RSSI feature is the instantaneous RSSI value of the probe packets. As a result, the client RSSI is seen as weaker than the configured Mid RSSI value (7-dB delta). The 802.11b probes from the client are suppressed to push the client to associate with the 802.11a band. 802.11 Bands You can configure the 802.11b/g/n (2.4 GHz) and 802.11a/n (5 GHz) bands for the controller to comply with the regulatory requirements in your country. By default, both 802.11b/g/n and 802.11a/n are enabled. This section contains the following subsections: 802.11n Parameters This section provides instructions for managing 802.11n access points on your network. The 802.11n devices support the 2.4 and 5-GHz bands and offer high throughput data rates. The 802.11n high throughput rates are available on all the 802.11n access points for the WLANs using WMM with no Layer 2 encryption or with WPA2/AES encryption enabled. Note To disable MCS rates for 802.11n, 802.11ac and 802.11ax, ensure that at least one MCS rate is enabled. To disable 802.11n on the controller to force APs to use only legacy 802.11a/b/g rates, first disable 802.11ax and 802.11ac on the controller for a particular band. Irrespective of the APs mapped to a Custom-RF-Profile, disabling 802.11n globally on the controller applies to all the APs. 802.11h Parameters 802.11h informs client devices about channel changes and can limit the transmit power of those client devices. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 808 System Management Restrictions for Band Selection, 802.11 Bands, and Parameters Restrictions for Band Selection, 802.11 Bands, and Parameters · Band selection-enabled WLANs do not support time-sensitive applications such as voice and video because of roaming delays. · Band selection is supported only on Cisco Wave 2 and 802.11ax APs. For more information about support on specific APs, see https://www.cisco.com/c/en/us/td/docs/wireless/access_point/feature-matrix/ap-feature-matrix.html. · Band selection operates only on APs that are connected to a controller. A FlexConnect AP without a controller connection does not perform band selection after a reboot. · The band-selection algorithm directs dual-band clients only from the 2.4-GHz radio to the 5-GHz radio of the same AP, and it only runs on an AP when both the 2.4-GHz and 5-GHz radios are up and running. · It is not possible to enable or disable band selection and client load balancing globally through the controller GUI or CLI. You can, however, enable or disable band selection and client load balancing for a particular WLAN. Band selection and client load balancing are enabled globally by default. How to Configure 802.11 Bands and Parameters Configuring Band Selection (GUI) Before you begin Ensure that you have configured an AP Join Profile prior to configuring the primary and backup controllers. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Configuration > Wireless Advanced > Band Select. In the Cycle Count field, enter a value between 1 and 10. The cycle count sets the number of suppression cycles for a new client. The default cycle count is 2. In the Cycle Threshold (milliseconds) field, enter a value between 1 and 1000 milliseconds for the scan cycle period threshold. This setting determines the time threshold during which new probe requests from a client come from a new scanning cycle. The default cycle threshold is 200 milliseconds. In the Age Out Suppression (seconds) field, enter a value between 10 and 200 seconds. Age-out suppression sets the expiration time for pruning previously known 802.11b/g/n clients. The default value is 20 seconds. After this time elapses, clients become new and are subject to probe response suppression. In the Age Out Dual Band (seconds) field, enter a value between 10 and 300 seconds. The age-out period sets the expiration time for pruning previously known dual-band clients. The default value is 50 seconds. After this time elapses, clients become new and are subject to probe response suppression. In the Client RSSI (dbm) field, enter a value between -90 to -20. This is the average of the client packets received. In the Client Mid RSSI (dbm) field, enter a value between -90 to -20. This the instantaneous RSSI value of the probe packets. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 809 Configuring Band Selection (CLI) System Management Step 8 Step 9 On the AP Join Profile page, click the AP Join Profile name. Click Apply. Configuring Band Selection (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless client band-select cycle-count cycle_count Example: Device(config)# wireless client band-select cycle-count 3 Sets the probe cycle count for band select. Valid range is between 1 and 10. Step 3 wireless client band-select cycle-threshold milliseconds Example: Device(config)# wireless client band-select cycle-threshold 5000 Sets the time threshold for a new scanning cycle period. Valid range is between 1 and 1000. Step 4 wireless client band-select expire suppression Sets the suppression expire to the band select. seconds Valid range is between 10 and 200. Example: Device(config)# wireless client band-select expire suppression 100 Step 5 wireless client band-select expire dual-band Sets the dual band expire. Valid range is seconds between 10 and 300. Example: Device(config)# wireless client band-select expire dual-band 100 Step 6 wireless client band-select client-rssi client_rssi Example: Device(config)# wireless client band-select client-rssi 40 Sets the client RSSI threshold. Valid range is between 20 and 90. Step 7 wlan wlan_profile_name wlan_ID SSID_network_name band-select Example: Configures band selection on specific WLANs. Valid range is between 1 and 512. You can enter up to 32 alphanumeric characters for SSID_network_name parameter. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 810 System Management Configuring the 802.11 Bands (GUI) Command or Action Device(config)# wlan wlan1 25 ssid12 Device(config-wlan)# band-select Purpose Configuring the 802.11 Bands (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Choose Configuration > Radio Configurations > Network. Click either 5 GHz Band or 2.4 GHz Band. Uncheck the Network Status check box to disable the network in order to be able to configure the network parameters. In the Beacon Interval field, enter the rate at which the SSID is broadcast by the APs, from 100 to 600 milliseconds. The default is 100 milliseconds. For 802.11b/g/n (2.4-GHz) radios, to enable short preamble on the radio, check the Short Preamble check box. A short preamble improves throughput performance. In the Fragmentation Threshold (in bytes) field, enter a value between 256 to 2346 bytes. Packets larger than the size you specify here will be fragmented. Check the DTPC Support check box to advertise the transmit power level of the radio in the beacons and the probe responses. Client devices using dynamic transmit power control (DTPC) receive the channel and power level information from the access points and adjust their settings automatically. For example, a client device used primarily in Japan could rely on DTPC to adjust its channel and power settings automatically when it travels to Italy and joins a network there. You cannot configure a power constraint value on your 802.11a/n/ac (5-GHz) radio network if the DTPC Support check box is checked. Click Apply. In the CCX Location Measurement section, check the Mode check box to globally enable CCX radio management for the network. This parameter causes the APs connected to this device to issue broadcast radio measurement requests to clients running CCX v2 or later releases. In the Interval field, enter a value to specify how often the APs must issue broadcast radio measurement requests. Click Apply. In the Data Rates section, choose a value to specify the rates at which data can be transmitted between the access point and the client: · Mandatory: Clients must support this data rate in order to associate to an access point on the controller embedded wireless controller. · Supported: Any associated clients that support this data rate may communicate with the access point using that rate. · Disabled: The clients specify the data rates used for communication. Click Apply. Save the configuration. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 811 Configuring the 802.11 Bands (CLI) System Management Configuring the 802.11 Bands (CLI) Follow the procedure given below to configure 802.11 bands and parameters: Procedure Step 1 Step 2 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. ap dot11 5ghz shutdown Disables the 802.11a band. Example: Note Device(config)# ap dot11 5ghz shutdown You must disable the 802.11a band before configuring the 802.11a network parameters. Step 3 ap dot11 24ghz shutdown Disables the 802.11b band. Example: Note Device(config)# ap dot11 24ghz shutdown You must disable the 802.11b band before configuring the 802.11b network parameters. Step 4 ap dot11 6ghz shutdown Disables the 802.11 6-GHz band. Example: Note Device(config)# ap dot11 6ghz shutdown You must disable the 802.11 6-GHz band before configuring the 802.11 6-GHz network parameters. Step 5 Step 6 Step 7 ap dot11 {5ghz | 24ghz | 6ghz} beaconperiod Specifies the rate at which the SSID is time_unit broadcast by the corresponding access point. Example: Device(config)# ap dot11 5ghz beaconperiod 500 The beacon interval is measured in time units (TUs). One TU is 1024 microseconds. You can configure the access point to send a beacon every 20 to 1000 milliseconds. ap dot11 {5ghz | 24ghz | 6ghz} fragmentation threshold Example: Device(config)# ap dot11 5ghz fragmentation 300 Specifies the size at which packets are fragmented. The threshold is a value between 256 and 2346 bytes (inclusive). Specify a low number for areas where communication is poor or where there is a great deal of radio interference. [no] ap dot11 {5ghz | 24ghz | 6ghz} dtpc Enables access points to advertise their Example: channels and transmit the power levels in beacons and probe responses. Device(config)# ap dot11 5ghz dtpc The default value is enabled. Client devices Device(config)# no ap dot11 24ghz dtpc using dynamic transmit power control (DTPC) receive the channel-level and power-level Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 812 System Management Configuring the 802.11 Bands (CLI) Step 8 Step 9 Step 10 Step 11 Command or Action Purpose information from the access points and adjust their settings automatically. For example, a client device used primarily in Japan can rely on DTPC to adjust its channel and power settings automatically when it travels to Italy and joins a network there. The no form of the command disables the DTPC setting. wireless client association limit number interval milliseconds Example: Device(config)# wireless client association limit 50 interval 1000 Specifies the maximum allowed clients that can be configured. You can configure the maximum number of association requests on a single access point slot at a given interval. The range of association limit that you can configure is from 1 to 100. The association request limit interval is measured between 100 to 10000 milliseconds. ap dot11 {5ghz | 24ghz} rate rate {disable | Specifies the rate at which data can be mandatory | supported} transmitted between the controller embedded Example: wireless controller and the client. Device(config)# ap dot11 5ghz rate 36 mandatory · disable: Defines that the clients specify the data rates used for communication. · mandatory: Defines that the clients support this data rate in order to associate to an access point on the controller embedded wireless controller. · supported: Any associated clients that support this data rate can communicate with the access point using that rate. However, the clients are not required to use this rate in order to associate. · rate: Specifies the rate at which data is transmitted. For the 802.11a and 802.11b bands, the data is transmitted at the rate of 1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, or 54 Mbps. no ap dot11 5ghz shutdown Example: Device(config)# no ap dot11 5ghz shutdown no ap dot11 24ghz shutdown Enables the 802.11a band. Note The default value is enabled. Enables the 802.11b band. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 813 Configuring a Band-Select RF Profile (GUI) System Management Step 12 Step 13 Step 14 Command or Action Example: Device(config)# no ap dot11 24ghz shutdown Purpose Note The default value is enabled. no ap dot11 6ghz shutdown Example: Device(config)# no ap dot11 6ghz shutdown Enables the 802.11 6-GHz band. Note The default value is enabled. ap dot11 24ghz dot11g Enables or disables 802.11g network support. Example: Device(config)# ap dot11 24ghz dot11g The default value is enabled. You can use this command only if the 802.11b band is enabled. If you disable this feature, the 802.11b band is enabled without 802.11g support. end Example: Device(config)# end Returns to privileged EXEC mode. Configuring a Band-Select RF Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Choose Configuration > Wireless > Advanced. In the Band Select tab, enter a value between 1 and 10 in the Cycle Count field. The cycle count sets the number of suppression cycles for a new client. The default cycle count is 2. In the Cycle Threshold field, enter a value between 1 and 1000 milliseconds for the scan cycle period threshold. This setting determines the time threshold during which new probe requests from a client come from a new scanning cycle. The default cycle threshold is 200 milliseconds. In the Age Out Suppression field, enter a value between 10 and 200 seconds. Age-out suppression sets the expiration time for pruning previously known 802.11b/g/n clients. The default value is 20 seconds. After this time elapses, clients become new and are subject to probe response suppression. In the Age Out Dual Band field, enter a value between 10 and 300 seconds. The age-out period sets the expiration time for pruning previously known dual-band clients. The default value is 50 seconds. After this time elapses, clients become new and are subject to probe response suppression. In the Client RSSI field, enter a value between -90 dBm and -20 dBm. This is the minimum RSSI for a client to respond to a probe. In the Client Mid RSSI field, enter a value between 20 dBm and 90 dBm. This parameter sets the mid-RSSI, whose value can be used for toggling 2.4 GHz probe suppression based on the RSSI value. Click Apply. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 814 System Management Configuring a Band-Select RF Profile (CLI) Configuring a Band-Select RF Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 24ghz rf-profile rf-profile Example: Configures the RF profile name and enters RF profile configuration mode. Device(config)# ap dot11 24ghz rf-profile test1 Step 3 band-select client {mid-rssi | rssi }dbm Sets the band-select client threshold. Example: Device(config-rf-profile)# band-select client rssi -90 Step 4 band-select cycle {count | threshold}count Sets the band-select cycle parameters. Example: Device(config-rf-profile)# band-select cycle count 10 Step 5 band-select expire {dual-band | suppression Configures the RF profile's band-select expiry }time time. Example: Device(config-rf-profile)# band-select expire dual-band 100 Step 6 band-select probe-response Example: Enables the RF profile's band-select probe response. Device(config-rf-profile)# band-select probe-response Configuring 802.11n Parameters (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Tags & Profiles > RF. Click Add to view the Add RF Profile window. In the 802.11 tab, proceed as follows: a) Choose the required operational rates. b) Select the required 802.11n MCS Rates by checking the corresponding check boxes. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 815 Configuring 802.11n Parameters (CLI) System Management Step 4 Click Save & Apply to Device. Configuring 802.11n Parameters (CLI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. ap dot11 {5ghz | 24ghz} dot11n Example: Device(config)# ap dot11 5ghz dot11n Enables 802.11n support on the network. The no form of this command disables the 802.11n support on the network. ap dot11 {5ghz | 24ghz} dot11n mcs tx rtu Example: Device(config)# ap dot11 5ghz dot11n mcs tx 20 Specifies the modulation and coding scheme (MCS) rates at which data can be transmitted between the access point and the client. rtu-The valid range is between 0 and 23. The no form of this command disables the MCS rates that are configured. wlanwlan_profile_name wlan_ID SSID_network_name wmm require Example: Device(config)# wlan wlan1 25 ssid12 Device(config-wlan)# wmm require Enables WMM on the WLAN and uses the 802.11n data rates that you configured. The require keyword requires client devices to use WMM. Devices that do not support WMM cannot join the WLAN. ap dot11 {5ghz | 24ghz} shutdown Disables the network. Example: Device(config)# ap dot11 5ghz shutdown {ap | no ap} dot11 {5ghz | 24 ghz} dot11n a-mpdu tx priority {all | 0-7} Example: Device(config)# ap dot11 5ghz dot11n a-mpdu tx priority all Specifies the aggregation method used for 802.11n packets. Aggregation is the process of grouping packet data frames together, rather than transmitting them separately. Two aggregation methods are available: Aggregated MAC Protocol Data Unit (A-MPDU) and Aggregated MAC Service Data Unit (A-MSDU). Both A-MPDU and A-MSDU are performed in the software. You can specify the aggregation method for various types of traffic from the access point to the clients. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 816 System Management Configuring 802.11n Parameters (CLI) Step 7 Step 8 Command or Action no ap dot11 {5ghz | 24ghz} shutdown Example: Device(config)# no ap dot11 5ghz shutdown ap dot11 {5ghz | 24ghz} dot11n guard-interval {any | long} Example: Purpose The list defines the priority levels (0-7) assigned per traffic type. · 0--Best effort · 1--Background · 2--Spare · 3--Excellent effort · 4--Controlled load · 5--Video, less than 100-ms latency and jitter · 6--Voice, less than 100-ms latency and jitter · 7--Network control You can configure each priority level independently, or you can use the all the parameters to configure all the priority levels at once. You can configure priority levels so that the traffic uses either A-MPDU transmission or A-MSDU transmission. · When you use the ap command along with the other options, the traffic associated with that priority level uses A-MPDU transmission. · When you use the no ap command along with the other options, the traffic associated with that priority level uses A-MSDU transmission. Configure the priority levels to match the aggregation method used by the clients. By default, A-MPDU is enabled for priority level 0, 4, and 5, and the rest are disabled. By default, A-MPDU is enabled for all priorities except 6 and 7. Re-enables the network. Configures the guard interval for the network. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 817 Configuring 802.11h Parameters (CLI) System Management Step 9 Step 10 Command or Action Device(config)# ap dot11 5ghz dot11n guard-interval long ap dot11 {5ghz | 24ghz} dot11n rifs rx Example: Device(config)# ap dot11 5ghz dot11n rifs rx end Example: Device(config)# end Purpose Configures the Reduced Interframe Space (RIFS) for the network. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring 802.11h Parameters (CLI) Procedure Step 1 Command or Action Purpose ap dot11 5ghz shutdown Disables the 802.11 network. Example: Device(config)# ap dot11 5ghz shutdown Step 2 ap dot11 6ghz shutdown Disables the 802.11 6-GHz network. Example: Device(config)# ap dot11 6ghz shutdown Step 3 {ap | no ap} dot11 5ghz channelswitch mode Enables or disables the access point to announce switch_mode when it is switching to a new channel. Example: Device(config)# ap dot11 5ghz channelswitch mode 0 switch_mode--Enter 0 or 1 to specify whether transmissions are restricted until the actual channel switch (0) or are not restricted (1). The default value is disabled. Step 4 [no] ap dot11 6ghz channelswitch quiet Example: Device(config)# ap dot11 5ghz channelswitch quiet Enables or disables the access point to announce when it is switching to a new channel in quiet mode. Step 5 ap dot11 5ghz power-constraint value Example: Device(config)# ap dot11 5ghz power-constraint 200 Configures the 802.11h power constraint value in dB. The valid range is from 0 to 255. The default value is 3. Step 6 ap dot11 6ghz power-constraint value Example: Configures the 802.11 6-GHz power constraint value in dB. The valid range is from 0 to 30. The default value is 3. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 818 System Management Monitoring Configuration Settings for Band Selection, 802.11 Bands, and Parameters Step 7 Step 8 Step 9 Command or Action Device(config)# ap dot11 5ghz power-constraint 200 Purpose no ap dot11 5ghz shutdown Re-enables the 802.11a network. Example: Device(config)# no ap dot11 5ghz shutdown no ap dot11 6ghz shutdown Re-enables the 802.11 6-GHz network. Example: Device(config)# no ap dot11 6ghz shutdown end Example: Device(config)# end Returns to privileged EXEC mode. Monitoring Configuration Settings for Band Selection, 802.11 Bands, and Parameters Verifying Configuration Settings Using Band Selection and 802.11 Bands Commands The following commands can be used to verify band selection, 802.11 bands, and parameters on the . Table 59: Monitoring Configuration Settings Using Band Selection and 802.11 Band Commands Command Purpose show ap dot11 5ghz network Displays 802.11a band network parameters, 802.11a operational rates, 802.11n MCS settings, and 802.11n status information. show ap dot11 24ghz network Displays 802.11b band network parameters, 802.11b/g operational rates, 802.11n MCS settings, and 802.11n status information. show ap dot11 6ghz network Displays 802.116-GHz band network parameters, 802.11b/g operational rates, 802.11n MCS settings, and 802.11n status information. show wireless dot11h Displays 802.11h configuration parameters. show wireless band-select Displays band-select configuration settings. Example: Viewing the Configuration Settings for the 6-GHz Band Device# show ap dot11 6ghz network Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 819 Example: Viewing the Configuration Settings for the 6-GHz Band 802.11 6Ghz Network : Enabled 802.11 6Ghz Status: A-MPDU Tx: Priority 0 : Enabled Priority 1 : Enabled Priority 2 : Enabled Priority 3 : Enabled Priority 4 : Enabled Priority 5 : Enabled Priority 6 : Disabled Priority 7 : Disabled A-MSDU Tx: Priority 0 : Enable Priority 1 : Enable Priority 2 : Enable Priority 3 : Enable Priority 4 : Enable Priority 5 : Enable Priority 6 : Disable Priority 7 : Disable 802.11ax : Enabled DynamicFrag : Enabled MultiBssid : Disabled Target Wakeup Time : Enabled Target Wakeup Time Broadcast : Enabled BSS Color : Disabled OBSS PD : Disabled Non-SRG OBSS PD Maximum Threshold : -62 dBm SRG OBSS PD : Disabled SRG OBSS PD Minimum Threshold : -82 dBm SRG OBSS PD Maximum Threshold : -62 dBm 802.11ax MCS Settings: MCS 7, Spatial Streams = 1 : Supported MCS 9, Spatial Streams = 1 : Disabled MCS 11, Spatial Streams = 1 : Supported MCS 7, Spatial Streams = 2 : Supported MCS 9, Spatial Streams = 2 : Disabled MCS 11, Spatial Streams = 2 : Supported MCS 7, Spatial Streams = 3 : Supported MCS 9, Spatial Streams = 3 : Disabled MCS 11, Spatial Streams = 3 : Supported MCS 7, Spatial Streams = 4 : Supported MCS 9, Spatial Streams = 4 : Disabled MCS 11, Spatial Streams = 4 : Supported Beacon Interval : 95 CF Pollable mandatory : Disabled CF Poll Request Mandatory : Disabled CFP Period :4 CFP Maximum Duration : 60 Default Channel :1 Default Tx Power Level :1 DTPC Status : Enabled Fragmentation Threshold : 2335 RSSI Low Check : Disabled RSSI Threshold : -127 dbm TI Threshold : Legacy Tx Beamforming setting : Disabled Traffic Stream Metrics Status : Disabled Expedited BW Request Status : Disabled EDCA profile type check : default-wmm Client Load Based EDCA Config : Enabled Call Admision Control (CAC) configuration Voice AC Voice AC - Admission control (ACM) : Disabled System Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 820 System Management Example: Viewing the Configuration Settings for the 5-GHz Band Voice Stream-Size Voice Max-Streams Voice Max RF Bandwidth Voice Reserved Roaming Bandwidth Voice Load-Based CAC mode Voice tspec inactivity timeout CAC SIP-Voice configuration SIP based CAC SIP call bandwidth SIP call bandwith sample-size Maximum Number of Clients per AP Radio WiFi to Cellular RSSI Threshold Client Network Preference : 84000 :2 : 75 :6 : Enabled : Enabled : Disabled : 64 : 20 : 200 : -85 dbm : default Example: Viewing the Configuration Settings for the 5-GHz Band Device# show ap dot11 5ghz network 802.11a Network : Enabled 11nSupport : Enabled 802.11a Low Band : Enabled 802.11a Mid Band : Enabled 802.11a High Band : Enabled 802.11a Operational Rates 802.11a 6M : Mandatory 802.11a 9M : Supported 802.11a 12M : Mandatory 802.11a 18M : Supported 802.11a 24M : Mandatory 802.11a 36M : Supported 802.11a 48M : Supported 802.11a 54M : Supported 802.11n MCS Settings: MCS 0 : Supported MCS 1 : Supported MCS 2 : Supported MCS 3 : Supported MCS 4 : Supported MCS 5 : Supported MCS 6 : Supported MCS 7 : Supported MCS 8 : Supported MCS 9 : Supported MCS 10 : Supported MCS 11 : Supported MCS 12 : Supported MCS 13 : Supported MCS 14 : Supported MCS 15 : Supported MCS 16 : Supported MCS 17 : Supported MCS 18 : Supported MCS 19 : Supported MCS 20 : Supported MCS 21 : Supported MCS 22 : Supported MCS 23 : Supported 802.11n Status: A-MPDU Tx: Priority 0 : Enabled Priority 1 : Disabled Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 821 Example: Viewing the Configuration Settings for the 2.4-GHz Band System Management Priority 2 : Disabled Priority 3 : Disabled Priority 4 : Enabled Priority 5 : Enabled Priority 6 : Disabled Priority 7 : Disabled A-MSDU Tx: Priority 0 : Enabled Priority 1 : Enabled Priority 2 : Enabled Priority 3 : Enabled Priority 4 : Enabled Priority 5 : Enabled Priority 6 : Disabled Priority 7 : Disabled Guard Interval : Any Rifs Rx : Enabled Beacon Interval : 100 CF Pollable mandatory : Disabled CF Poll Request Mandatory : Disabled CFP Period : 4 CFP Maximum Duration : 60 Default Channel : 36 Default Tx Power Level : 1 DTPC Status : Enabled Fragmentation Threshold : 2346 Pico-Cell Status : Disabled Pico-Cell-V2 Status : Disabled TI Threshold : 0 Legacy Tx Beamforming setting : Disabled Traffic Stream Metrics Status : Disabled Expedited BW Request Status : Disabled EDCA profile type check : default-wmm Call Admision Control (CAC) configuration Voice AC Voice AC - Admission control (ACM) : Disabled Voice Stream-Size : 84000 Voice Max-Streams : 2 Voice Max RF Bandwidth : 75 Voice Reserved Roaming Bandwidth : 6 Voice Load-Based CAC mode : Enabled Voice tspec inactivity timeout : Enabled CAC SIP-Voice configuration SIP based CAC : Disabled SIP Codec Type : CODEC_TYPE_G711 SIP call bandwidth : 64 SIP call bandwith sample-size : 20 Video AC Video AC - Admission control (ACM) : Disabled Video max RF bandwidth : Infinite Video reserved roaming bandwidth : 0 Example: Viewing the Configuration Settings for the 2.4-GHz Band Device# show ap dot11 24ghz network 802.11b Network : Enabled 11gSupport : Enabled 11nSupport : Enabled 802.11b/g Operational Rates 802.11b 1M : Mandatory 802.11b 2M : Mandatory Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 822 System Management Example: Viewing the Configuration Settings for the 2.4-GHz Band 802.11b 5.5M : Mandatory 802.11g 6M : Supported 802.11g 9M : Supported 802.11b 11M : Mandatory 802.11g 12M : Supported 802.11g 18M : Supported 802.11g 24M : Supported 802.11g 36M : Supported 802.11g 48M : Supported 802.11g 54M : Supported 802.11n MCS Settings: MCS 0 : Supported MCS 1 : Supported MCS 2 : Supported MCS 3 : Supported MCS 4 : Supported MCS 5 : Supported MCS 6 : Supported MCS 7 : Supported MCS 8 : Supported MCS 9 : Supported MCS 10 : Supported MCS 11 : Supported MCS 12 : Supported MCS 13 : Supported MCS 14 : Supported MCS 15 : Supported MCS 16 : Supported MCS 17 : Supported MCS 18 : Supported MCS 19 : Supported MCS 20 : Supported MCS 21 : Supported MCS 22 : Supported MCS 23 : Supported 802.11n Status: A-MPDU Tx: Priority 0 : Enabled Priority 1 : Disabled Priority 2 : Disabled Priority 3 : Disabled Priority 4 : Enabled Priority 5 : Enabled Priority 6 : Disabled Priority 7 : Disabled A-MSDU Tx: Priority 0 : Enabled Priority 1 : Enabled Priority 2 : Enabled Priority 3 : Enabled Priority 4 : Enabled Priority 5 : Enabled Priority 6 : Disabled Priority 7 : Disabled Guard Interval : Any Rifs Rx : Enabled Beacon Interval : 100 CF Pollable Mandatory : Disabled CF Poll Request Mandatory : Disabled CFP Period : 4 CFP Maximum Duration : 60 Default Channel : 11 Default Tx Power Level : 1 DTPC Status : true Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 823 Example: Viewing the status of 802.11h Parameters Call Admission Limit : 105 G711 CU Quantum : 15 ED Threshold : -50 Fragmentation Threshold : 2346 PBCC Mandatory : Disabled Pico-Cell Status : Disabled Pico-Cell-V2 Status : Disabled RTS Threshold : 2347 Short Preamble Mandatory : Enabled Short Retry Limit : 7 Legacy Tx Beamforming setting : Disabled Traffic Stream Metrics Status : Disabled Expedited BW Request Status : Disabled EDCA profile type : default-wmm Call Admision Control (CAC) configuration Voice AC Voice AC - Admission control (ACM) : Disabled Voice Stream-Size : 84000 Voice Max-Streams : 2 Voice Max RF Bandwidth : 75 Voice Reserved Roaming Bandwidth : 6 Voice Load-Based CAC mode : Enabled Voice tspec inactivity timeout : Enabled CAC SIP-Voice configuration SIP based CAC : Disabled SIP Codec Type : CODEC_TYPE_G711 SIP call bandwidth : 64 SIP call bandwith sample-size : 20 Video AC Video AC - Admission control (ACM) : Disabled Video max RF bandwidth : Infinite Video reserved roaming bandwidth : 0 Example: Viewing the status of 802.11h Parameters Device# show wireless dot11 Power Constraint: 0 Channel Switch : Enabled Channel Switch Mode : Quiet Smart DFS : Enabled Example: Verifying the Band-Selection Settings The following example displays a band-select configuration: Device# show wireless band-select Band Select Probe Response Cycle Count Cycle Threshold (millisec) Age Out Suppression (sec) Age Out Dual Band (sec) Client RSSI (dBm) Client Mid RSSI (dBm) : per WLAN enabling :2 : 200 : 20 : 60 : -80 : -80 The following example displays an AP RF profile details: Device# show ap rf-profile name vid detail Description RF Profile Name : : vid System Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 824 System Management Example: Verifying the Band-Selection Settings Band 802.11n client only Transmit Power Threshold v1 Min Transmit Power Max Transmit Power Operational Rates 802.11b 1M Rate 802.11b 2M Rate 802.11b 5.5M Rate 802.11b 11M Rate 802.11b 6M Rate 802.11b 9M Rate 802.11b 12M Rate 802.11b 18M Rate 802.11b 24M Rate 802.11b 36M Rate 802.11b 48M Rate 802.11b 54M Rate Max Clients Trap Threshold Clients Interference Noise Utilization Multicast Data Rate Rx SOP Threshold Band Select Probe Response Cycle Count Cycle Threshold Expire Suppression Expire Dual Band Client RSSI Client Mid RSSI High Speed Roam hsr mode hsr neighbor timeout Load Balancing Window Denial Coverage Data Data Voice Minimum Client Level Exception Level DCA Channel List Unused Channel List DCA Foreign AP Contribution 802.11n MCS Rates MCS 0 MCS 1 MCS 2 MCS 3 MCS 4 MCS 5 MCS 6 MCS 7 MCS 8 MCS 9 MCS 10 MCS 11 MCS 12 MCS 13 MCS 14 : 2.4 GHz : Disabled : -70 dBm : -10 dBm : 30 dBm : Mandatory : Mandatory : Mandatory : Mandatory : Supported : Supported : Supported : Supported : Supported : Supported : Supported : Supported : 200 : 12 clients : 10% : -80 dBm : 10% : auto : auto : Disabled : 2 cycles : 200 milliseconds : 20 seconds : 60 seconds : -80 dBm : -80 dBm : Disabled :5 : 5 clients : 3 count : -62 dBm : -80 dBm : 12 clients : 48% : 1,6,11 : 2,3,4,5,7,8,9,10 : Enabled : Enabled : Enabled : Enabled : Enabled : Enabled : Enabled : Enabled : Enabled : Enabled : Enabled : Enabled : Enabled : Enabled : Enabled : Enabled Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 825 Configuration Examples for Band Selection, 802.11 Bands, and Parameters System Management MCS 15 MCS 16 MCS 17 MCS 18 MCS 19 MCS 20 MCS 21 MCS 22 MCS 23 MCS 24 MCS 25 MCS 26 MCS 27 MCS 28 MCS 29 MCS 30 MCS 31 State Client Network Preference : Enabled : Enabled : Enabled : Enabled : Enabled : Enabled : Enabled : Enabled : Enabled : Enabled : Enabled : Enabled : Enabled : Enabled : Enabled : Enabled : Enabled : Up : connectivity Configuration Examples for Band Selection, 802.11 Bands, and Parameters Examples: Band Selection Configuration This example shows how to set the probe cycle count and time threshold for a new scanning cycle period for band select: Device# configure terminal Device(config)# wireless client band-select cycle-count 3 Device(config)# wireless client band-select cycle-threshold 5000 Device(config)# end This example shows how to set the suppression expiry time to the band select: Device# configure terminal Device(config)# wireless client band-select expire suppression 100 Device(config)# end This example shows how to set the dual-band expiry time for the band select: Device# configure terminal Device(config)# wireless client band-select expire dual-band 100 Device(config)# end This example shows how to set the client RSSI threshold for the band select: Device# configure terminal Device(config)# wireless client band-select client-rssi 40 Device(config)# end This example shows how to configure band selection on specific WLANs: Device# configure terminal Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 826 System Management Examples: 802.11 Bands Configuration Device(config)# wlan wlan1 25 ssid12 Device(config-wlan)# band-select Device(config)# end Examples: 802.11 Bands Configuration This example shows how to configure 802.11 bands using beacon interval, fragmentation, and dynamic transmit power control: Device# configure terminal Device(config)# ap dot11 5ghz shutdown Device(config)# ap dot11 24ghz shutdown Device(config)# ap dot11 5ghz beaconperiod 500 Device(config)# ap dot11 5ghz fragmentation 300 Device(config)# ap dot11 5ghz dtpc Device(config)# wireless client association limit 50 interval 1000 Device(config)# ap dot11 5ghz rate 36 mandatory Device(config)# no ap dot11 5ghz shutdown Device(config)# no ap dot11 24ghz shutdown Device(config)# ap dot11 24ghz dot11g Device(config)#end Examples: 802.11n Configuration This example shows how to configure 802.11n parameters for 5-GHz band using aggregation method: Device# configure terminal Device(config)# ap dot11 5ghz dot11n Device(config)# ap dot11 5ghz dot11n mcs tx 20 Device(config)# wlan wlan1 25 ssid12 Device(config-wlan)# wmm require\ Device(config-wlan)# exit Device(config)# ap dot11 5ghz shutdown Device(config)# ap dot11 5ghz dot11n a-mpdu tx priority all Device(config)# no ap dot11 5ghz shutdown Device(config)#exit This example shows how to configure the guard interval for 5-GHz band: Device# configure terminal Device(config)# ap dot11 5ghz dot11n Device(config)# ap dot11 5ghz dot11n mcs tx 20 Device(config)# wlan wlan1 25 ssid12 Device(config-wlan)# wmm require\ Device(config-wlan)# exit Device(config)# no ap dot11 5ghz shutdown Device(config)# ap dot11 5ghz dot11n guard-interval long Device(config)#end This example shows how to configure the RIFS for 5-GHz band: Device# configure terminal Device(config)# ap dot11 5ghz dot11n Device(config)# ap dot11 5ghz dot11n mcs tx 20 Device(config)# wlan wlan1 25 ssid12 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 827 Examples: 802.11h Configuration System Management Device(config-wlan)# wmm require\ Device(config-wlan)# exit Device(config)# ap dot11 5ghz shutdown Device(config)# ap dot11 5ghz dot11n rifs rx Device(config)#end Examples: 802.11h Configuration This example shows how to configure the access point to announce when it is switching to a new channel using restriction transmission: Device# configure terminal Device(config)# ap dot11 5ghz shutdown Device(config)# ap dot11 5ghz channelswitch mode 0 Device(config)# no ap dot11 5ghz shutdown Device(config)#end This example shows how to configure the 802.11h power constraint for 5-GHz band: Device# configure terminal Device(config)# ap dot11 5ghz shutdown Device(config)# ap dot11 5ghz power-constraint 200 Device(config)# no ap dot11 5ghz shutdown Device(config)#end Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 828 7 2 C H A P T E R NBAR Protocol Discovery · Introduction to NBAR Protocol Discovery, on page 829 · Configuring NBAR Protocol Discovery, on page 829 · Verifying Protocol Discovery Statistics, on page 830 Introduction to NBAR Protocol Discovery The NBAR Protocol Discovery feature provides an easy way of discovering the application protocols passing through an interface. Network Based Application Recognition (NBAR) determines which protocols and applications are currently running on the network. With Protocol Discovery, you can discover any protocol traffic that is supported by NBAR and obtain statistics that are associated with that protocol. NBAR provides several classification features that identify applications and protocols from Layer 4 through Layer 7. NBAR is also used in Cisco Application Visibility and Control (AVC). With AVC, NBAR provides better application performance through better QoS and policing, and provides finer visibility about the network that is being used. Configuring NBAR Protocol Discovery Follow the procedure given below to enable protocol discovery: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-policy Example: Configures a WLAN policy profile and enters wireless policy configuration mode. Device(config)# wireless profile policy nbar-proto-policy Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 829 Verifying Protocol Discovery Statistics System Management Step 3 Step 4 Command or Action Purpose central switching Configures the wireless policy profile for central Example: switching. Device(config-wireless-policy)# central Note switching NBAR Protocol Discovery is supported in local mode (central switching) and in FlexConnect (central switching) mode. ip nbar protocol-discovery Example: Enables application recognition on the wireless policy profile by activating the NBAR2 engine. Device(config-wireless-policy)# ip nbar protocol-discovery Verifying Protocol Discovery Statistics To view protocol discovery statistics, use the following command: Device# show ip nbar protocol-discovery wlan wlan-profile-name wlan_profile_name (iif_id 0xF0400002) Last clearing of "show ip nbar protocol-discovery" counters 00:07:12 Input Output ----- ------ Protocol Packet Count Packet Count Byte Count Byte Count 5min Bit Rate (bps) 5min Bit Rate (bps) 5min Max Bit Rate (bps) 5min Max Bit Rate (bps) ------------------------ ------------------------ ------------------------ unknown 22 0 4173 0 0 0 2000 0 dhcp 3 2 1166 724 0 0 0 0 ping 2 2 204 236 0 0 0 0 Total 27 4 5543 960 0 0 2000 0 To clear protocol discovery statistics, use the following command: Device# clear ip nbar protocol-discovery wlan wlan-profile-name Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 830 7 3 C H A P T E R Conditional Debug, Radioactive Tracing, and Packet Tracing · Introduction to Conditional Debugging, on page 831 · Introduction to Radioactive Tracing, on page 832 · Conditional Debugging and Radioactive Tracing, on page 832 · Location of Tracefiles, on page 833 · Configuring Conditional Debugging (GUI), on page 833 · Configuring Conditional Debugging, on page 834 · Radioactive Tracing for L2 Multicast, on page 835 · Recommended Workflow for Trace files, on page 835 · Copying Tracefiles Off the Box, on page 836 · Configuration Examples for Conditional Debugging, on page 836 · Verifying Conditional Debugging, on page 837 · Example: Verifying Radioactive Tracing Log for SISF, on page 837 · Information About Packet Tracing, on page 838 · Configuring Conditional Debugging Packet Tracing, on page 839 · Configuring Conditional Debugging Packet Tracing per AP, on page 840 · Configuring Conditional Debugging Packet Tracing per Client (GUI), on page 841 · Configuring Conditional Debugging Packet Tracing per Client, on page 841 · Verifying Conditional Debugging Packet Tracing Configuration, on page 841 · Feature History for Wireless Client Debug Bundle, on page 842 · Information About Wireless Client Debug Bundle, on page 842 · Collecting Wireless Client Debug Bundle (CLI), on page 843 Introduction to Conditional Debugging The Conditional Debugging feature allows you to selectively enable debugging and logging for specific features based on the set of conditions you define. This feature is useful in systems where a large number of features are supported. The Conditional debug allows granular debugging in a network that is operating at a large scale with a large number of features. It allows you to observe detailed debugs for granular instances within the system. This is very useful when we need to debug only a particular session among thousands of sessions. It is also possible to specify multiple conditions. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 831 Introduction to Radioactive Tracing System Management A condition refers to a feature or identity, where identity could be an interface, IP Address, or a MAC address and so on. This is in contrast to the general debug command, that produces its output without discriminating on the feature objects that are being processed. General debug command consumes a lot of system resources and impacts the system performance. Introduction to Radioactive Tracing Radioactive tracing (RA) provides the ability to stitch together a chain of execution for operations of interest across the system, at an increased verbosity level. This provides a way to conditionally print debug information (up to DEBUG Level or a specified level) across threads, processes and function calls. Note · The radioactive tracing supports First-Hop Security (FHS). For more information on First Hop Security features, see System Management > Wireless Multicast > Information About Wireless Multicast > Information About IPv6 Snooping. · The radioactive tracing filter does not work, if the certificate is not valid. · For effective debugging of issues on mesh features, ensure that you add both Ethernet and Radio MAC address as conditional MAC for RA tracing, while collecting logs. · To enable debug for wireless IPs, use the debug platform condition feature wireless ip ip-address command. Table 60: Components Supporting Radio Active Tracing Components SISF or FHS LISP Details The first-hop security features, includes IPv6 Address Glean and IPv6 Device Tracking. For more information, see Information About IPv6 Snooping. Locator or ID Separation Protocol. Conditional Debugging and Radioactive Tracing Radioactive Tracing when coupled with Conditional Debugging, enable us to have a single debug CLI to debug all execution contexts related to the condition. This can be done without being aware of the various control flow processes of the feature within the box and without having to issue debugs at these processes individually. Note Use the clear platform condition all command to remove the debug conditions applied to the platform. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 832 System Management Location of Tracefiles Location of Tracefiles By default the tracefile logs will be generated for each process and saved into either the /tmp/rp/trace or /tmp/fp/trace directory. In this temp directory, the trace logs are written to files, which are of 1 MB size each. You can verify these logs (per-process) using the show platform software trace message process_name chassis active R0 command. The directory can hold up to a maximum of 25 such files for a given process. When a tracefile in the /tmp directory reaches its 1MB limit or whatever size was configured for it during the boot time, it is rotated out to an archive location in the /crashinfo partition under tracelogs directory. The /tmp directory holds only a single tracefile for a given process. Once the file reaches its file size limit it is rotated out to /crashinfo/tracelogs. In the archive directory, up to 25 files are accumulated, after which the oldest one is replaced by the newly rotated file from /tmp. File size is process dependent and some processes uses larger file sizes (upto 10MB). Similarly, the number of files in the tracelogs directory is also decided by the process. For example, WNCD process uses a limit of 400 files per instance, depending on the platform. The tracefiles in the crashinfo directory are located in the following formats: 1. Process-name_Process-ID_running-counter.timestamp.gz Example: IOSRP_R0-0.bin_0.14239.20151101234827.gz 2. Process-name_pmanlog_Process-ID_running-counter.timestamp.bin.gz Example: wncmgrd_R0-0.27958_1.20180902081532.bin.gz Configuring Conditional Debugging (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Choose Troubleshooting > Radioactive Trace. Click Add. Enter the MAC/IP Address. The MAC address can be either in xx:xx:xx:xx:xx:xx, xx-xx-xx-xx-xx-xx, or xxxx.xxxx.xxxx format. Click Apply to Device. Click Start to start or Stop to stop the conditional debug. Click Generate to create a radioactive trace log. Click the radio button to set the time interval. Click the Download Logs icon that is displayed next to the trace file name, to download the logs to your local folder. Click the View Logs icon that is displayed next to the trace file name, to view the log files on the GUI page. Click Load More to view more lines of the log file. Click Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 833 Configuring Conditional Debugging System Management Configuring Conditional Debugging Follow the procedure given below to configure conditional debugging: Procedure Step 1 Command or Action Purpose debug platform condition feature wireless Configures conditional debugging for a feature mac {mac-address} using the specified MAC address. Example: Note Device# debug platform condition feature wireless mac b838.61a1.5433 This is supported with AP or client MAC/IP and also on CMX IP address and mobility peer IP. Step 2 debug platform condition start Example: Device# debug platform condition start Starts conditional debugging (this will start radioactive tracing if there is a match on one of the conditions above). Note This is supported with AP or client MAC/IP and also on CMX IP address and mobility peer IP. Step 3 Step 4 show platform condition OR show debug Example: Device# show platform condition Device# show debug Displays the current conditions set. debug platform condition stop Example: Device# debug platform condition stop Stops conditional debugging (this will stop radioactive tracing). Note This is supported with AP or client MAC/IP and also on CMX IP address and mobility peer IP. Step 5 show logging profile wireless [counter | [last]{x days/hours} | filter mac{<mac address>} [to-file]{<destination>} Example: Device# show logging profile wireless start last 20 minutes to-file bootflash:logs.txt Displays the logs from the latest wireless profile. Note You can use either the show logging profile wireless command or show logging process command to collect the logs. Step 6 show logging process <process name> Example: Displays the logs collection specific to the process. Device# show logging process wncd to-file flash:wncd.txt Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 834 System Management Radioactive Tracing for L2 Multicast Step 7 Command or Action clear platform condition all Example: Device# clear platform condition all Purpose Clears all conditions. What to do next Note The command request platform software trace filter-binary wireless {mac-address} generates 3 flash files: · collated_log_<.date..> · mac_log <..date..> · mac_database .. file Of these, mac_log <..date..> is the most important file, as it gives the messages for the MAC address we are debugging. The command show platform software trace filter-binary also generates the same flash files, and also prints the mac_log on the screen. Radioactive Tracing for L2 Multicast To identify a specific multicast receiver, specify the MAC address of the joiner or the receiver client, Group Multicast IP address and Snooping VLAN. Additionally, enable the trace level for the debug. The debug level will provide detailed traces and better visibility into the system. debug platform condition feature multicast controlplane mac client-mac-addr ip group-ip-addr vlan id level debug level Recommended Workflow for Trace files The Recommended Workflow for Trace files is listed below: 1. To request the tracelogs for a specific time period. EXAMPLE 1 day. Use the command: Device#show logging process wncd to-file flash:wncd.txt 2. The system generates a text file of the tracelogs in the location /flash: 3. Copy the file off the switchdevice. By copying the file, the tracelogs can be used to work offline. For more details on copying files, see section below. 4. Delete the tracelog file (.txt) file from /flash: location. This will ensure enough space on the switchdevice for other operations. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 835 Copying Tracefiles Off the Box System Management Copying Tracefiles Off the Box An example of the tracefile is shown below: Device# dir crashinfo:/tracelogs Directory of crashinfo:/tracelogs/ 50664 -rwx 760 Sep 22 2015 11:12:21 +00:00 plogd_F0-0.bin_0.gz 50603 -rwx 991 Sep 22 2015 11:12:08 +00:00 fed_pmanlog_F0-0.bin_0.9558.20150922111208.gz 50610 -rw- 11 Nov 2 2015 00:15:59 +00:00 timestamp 50611 -rwx 1443 Sep 22 2015 11:11:31 +00:00 auto_upgrade_client_sh_pmanlog_R0-.bin_0.3817.20150922111130.gz 50669 -rwx 589 Sep 30 2015 03:59:04 +00:00 cfgwr-8021_R0-0.bin_0.gz 50612 -rwx 1136 Sep 22 2015 11:11:46 +00:00 reflector_803_R0-0.bin_0.1312.20150922111116.gz 50794 -rwx 4239 Nov 2 2015 00:04:32 +00:00 IOSRP_R0-0.bin_0.14239.20151101234827.gz 50615 -rwx 131072 Nov 2 2015 00:19:59 +00:00 linux_iosd_image_pmanlog_R0-0.bin_0 The trace files can be copied using one of the various options shown below: Device# copy crashinfo:/tracelogs ? crashinfo: Copy to crashinfo: file system flash: Copy to flash: file system ftp: Copy to ftp: file system http: Copy to http: file system https: Copy to https: file system null: Copy to null: file system nvram: Copy to nvram: file system rcp: Copy to rcp: file system running-config Update (merge with) current system configuration scp: Copy to scp: file system startup-config Copy to startup configuration syslog: Copy to syslog: file system system: Copy to system: file system tftp: Copy to tftp: file system tmpsys: Copy to tmpsys: file system The general syntax for copying onto a TFTP server is as follows: Device# copy source: tftp: Device# copy crashinfo:/tracelogs/IOSRP_R0-0.bin_0.14239.20151101234827.gz tftp: Address or name of remote host []? 2.2.2.2 Destination filename [IOSRP_R0-0.bin_0.14239.20151101234827.gz]? Note It is important to clear the generated report or archive files off the switch in order to have flash space available for tracelog and other purposes. Configuration Examples for Conditional Debugging The following is an output example of the show platform condition command. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 836 System Management Verifying Conditional Debugging Device# show platform condition Conditional Debug Global State: Stop Conditions Direction ----------------------------------------------------------------------------------------------|--------MAC Address 0024.D7C7.0054 N/A Feature Condition Type Value -----------------------|-----------------------|-------------------------------Device# The following is an output example of the show debug command. Device# show debug IOSXE Conditional Debug Configs: Conditional Debug Global State: Start Conditions Direction ----------------------------------------------------------------------------------------------|--------MAC Address 0024.D7C7.0054 N/A Feature Condition Type Value -----------------------|-----------------------|-------------------------------Packet Infra debugs: Ip Address Port ------------------------------------------------------|---------Device# Verifying Conditional Debugging The table shown below lists the various commands that can be used to verify conditional debugging: Command Purpose show platform condition Displays the current conditions set. show debug Displays the current debug conditions set. show platform software trace filter-binary request platform software trace filter-binary Displays logs merged from the latest tracefile. Displays historical logs of merged tracefiles on the system. Example: Verifying Radioactive Tracing Log for SISF The following is an output example of the show platform software trace message ios chassis active R0 | inc sisf command. Device# show platform software trace message ios chassis active R0 | inc sisf 2017/10/26 13:46:22.104 {IOSRP_R0-0}{1}: [parser]: [5437]: UUID: 0, ra: 0 (note): CMD: 'show platform software trace message ios switch active R0 | inc sisf' 13:46:22 UTC Thu Oct 26 2017 2017/10/26 13:46:10.667 {IOSRP_R0-0}{1}: [sisf]: [5437]: UUID: 4800000000060, ra: 7 (debug): FF8E802918 semaphore system unlocked 2017/10/26 13:46:10.667 {IOSRP_R0-0}{1}: [sisf]: [5437]: UUID: 4800000000060, ra: 7 (debug): Unlocking, count is now 0 2017/10/26 13:46:10.667 {IOSRP_R0-0}{1}: [sisf]: [5437]: UUID: 4800000000060, ra: 7 (debug): FF8E802918 semaphore system unlocked 2017/10/26 13:46:10.667 {IOSRP_R0-0}{1}: [sisf]: [5437]: UUID: 4800000000060, ra: 7 (debug): Unlocking, count is now 1 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 837 Information About Packet Tracing System Management 2017/10/26 13:46:10.667 {IOSRP_R0-0}{1}: [sisf]: [5437]: UUID: 4800000000060, ra: 7 (debug): Gi1/0/5 vlan 10 aaaa.bbbb.cccc Setting State to 2 2017/10/26 13:46:10.667 {IOSRP_R0-0}{1}: [sisf]: [5437]: UUID: 4800000000060, ra: 7 (debug): Gi1/0/5 vlan 10 aaaa.bbbb.cccc Start timer 0 2017/10/26 13:46:10.667 {IOSRP_R0-0}{1}: [sisf]: [5437]: UUID: 4800000000060, ra: 7 (debug): Gi1/0/5 vlan 10 aaaa.bbbb.cccc Timer value/granularity for 0 :299998/1000 2017/10/26 13:46:10.667 {IOSRP_R0-0}{1}: [sisf]: [5437]: UUID: 4800000000060, ra: 7 (debug): Gi1/0/5 vlan 10 aaaa.bbbb.cccc Updated Mac Timer : 299998 2017/10/26 13:46:10.667 {IOSRP_R0-0}{1}: [sisf]: [5437]: UUID: 4800000000060, ra: 7 (debug): Gi1/0/5 vlan 10 aaaa.bbbb.cccc Before Timer : 350000 2017/10/26 13:46:10.667 {IOSRP_R0-0}{1}: [sisf]: [5437]: UUID: 4800000000060, ra: 7 (debug): Gi1/0/5 vlan 10 aaaa.bbbb.cccc Timer 0, default value is 350000 2017/10/26 13:46:10.667 {IOSRP_R0-0}{1}: [sisf]: [5437]: UUID: 4800000000060, ra: 7 (debug): Allocating timer wheel for 0 2017/10/26 13:46:10.667 {IOSRP_R0-0}{1}: [sisf]: [5437]: UUID: 4800000000060, ra: 7 (debug): Gi1/0/5 vlan 10 aaaa.bbbb.cccc No timer running 2017/10/26 13:46:10.667 {IOSRP_R0-0}{1}: [sisf]: [5437]: UUID: 4800000000060, ra: 7 (debug): Granularity for timer MAC_T1 is 1000 2017/10/26 13:46:10.667 {IOSRP_R0-0}{1}: [sisf]: [5437]: UUID: 4800000000060, ra: 7 (debug): Gi1/0/5 vlan 10 aaaa.bbbb.cccc Current State :MAC-STALE, Req Timer : MAC_T1 Current Timer MAC_T1 Information About Packet Tracing The Packet tracing feature cover details on how to perform data plane packet tracing for Cisco Catalyst 9800 Series Wireless Controller for Cloud software. This feature identifies the following issues: · Misconfiguration · Capacity overload · Software bugs while troubleshooting This feature identifies what happens to a packet in your system. The conditional debugging packet tracing feature is used for accounting and capturing per-packet processing details for user-defined conditions. You can trace packets on the controller using the following steps: 1. Enable conditional debugging on selected packets or traffic you want to trace on the controller. 2. Enable packet tracing (per-AP or per-Client). Note You need to use per AP conditional debugging with MAC address as a filter when AP and controllers are in the same VLAN. If they are not in the same VLAN, the per AP packet tracing with MAC address does not capture packets as MAC address varies. Limitation of Conditional Debugging Packet Tracing MAC or IP filter only applies to the outer Ethernet or IP header, so if a packet is CAPWAP encapsulated, the MAC or IP does not apply to the inner 802.11 MAC or IP. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 838 System Management Configuring Conditional Debugging Packet Tracing Configuring Conditional Debugging Packet Tracing Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. Step 2 debug platform packet-trace packet Configures packet tracing to capture the last set packet-count circular fia-trace data-size of packets. data-size Here, Example: packet-count--Valid range is from 16 to 8192. Device# debug platform packet-trace packet 8192 circular fia-trace data-size data-size--Valid range is from 2048 to 16384 2048 bytes. Step 3 debug platform packet-trace copy packet Configures packet tracing for a copy of packet both size packet-size data. Example: Here, Device# debug platform packet-trace copy packet-size--Valid range is from 16 to 2048 packet both size 2048 bytes. Step 4 debug platform condition interface Enables conditional debugging for an interface, {intf-name | cpp} {mac | ipv4 | match} {both MAC, or IP filter. | ingress | egress} An interface refers to any physical port, port Example: channel, internal vlan, SVI, or wireless client. Enables conditional debugging for TenGigabitEthernet 0/0/0 and match packets whose source and destination MAC is 0001.0001.0001: Device# debug platform condition interface TenGigabitEthernet 0/0/0 mac 0001.0001.0001 both Step 5 debug platform condition start Starts conditional debugging packet tracing. Example: Device# debug platform condition start Step 6 debug platform condition stop Example: Device# debug platform condition stop Stops conditional debugging packet tracing. Step 7 show platform hardware chassis active qfp Redirects all traced packets to bootflash. feature packet-trace packet all | redirect bootflash:packet_trace.txt Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 839 Configuring Conditional Debugging Packet Tracing per AP System Management Command or Action Purpose Example: Converts the packet_trace.txt to pcap and Device# show platform hardware chassis downloads the pcap files. You can do so using active qfp feature packet-trace packet the following link: all | redirect bootflash:packet_trace.txt http://wwwin-dharton-dev.cisco.com/ pactrac2pcap.html Configuring Conditional Debugging Packet Tracing per AP Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. Step 2 debug platform condition interface {intf-name | cpp} {mac [mac-address | access-list acl-name] | ipv4 | match} {both | ingress | egress} Example: Enables conditional debugging with MAC filter. Herein, the CLI matches the packets whose source or destination MAC address is 0001.0001.0001. Device# debug platform condition interface TenGigabitEthernet 0/0/0 mac 0001.0001.0001 both Device# debug platform condition interface TenGigabitEthernet 0/0/0 mac access-list mac-acl-name both Step 3 debug platform condition interface Enables conditional debugging with inline MAC TenGigabitEthernet intf-number match mac ACL. {H.H.H | any | host} {both | ingress | egress} Example: Device# debug platform condition interface TenGigabitEthernet 0/0/0 match mac 0001.0001.0001 both Step 4 debug platform condition interface TenGigabitEthernet intf-number ipv4 {A.B.C.D/nn | access-list acl-name | both | egress | ingress} {both | egress | ingress} Example: Enables conditional debugging with IP filter. Here, intf-number--Is the GigabitEthernet interface number.Valid range is from 1 to 32. Device# debug platform condition interface TenGigabitEthernet 0/0/0 ipv4 192.168.1.2/32 both Device# debug platform condition interface TenGigabitEthernet 0/0/0 ipv4 access-list ip-acl-name both Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 840 System Management Configuring Conditional Debugging Packet Tracing per Client (GUI) Command or Action Purpose Device# debug platform condition interface TenGigabitEthernet 0/0/0 match ipv4 192.168.1.2/32 both Configuring Conditional Debugging Packet Tracing per Client (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Troubleshooting > Radioactive Trace. Click Add. In the Add MAC/IP Address window, enter the MAC/IP Address. Click Apply to Device. Configuring Conditional Debugging Packet Tracing per Client Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. Step 2 debug platform condition interface Enables conditional debugging for a wireless {intf-name | cpp cpp-handle-index} {mac | ipv4 client interface. | match [ipv4 | ipv6 | mac]} {both | ingress | egress} Here, Example: cpp-handle-index--Valid range is from 1 to 4294967295. Device# debug platform condition interface cpp 0xa0000001 match ipv4 protocol icmp host 192.168.1.100 host 192.168.1.1 both Verifying Conditional Debugging Packet Tracing Configuration To view the summary of the traced packet, use the following command: Device# show platform packet-trace summary Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 841 Feature History for Wireless Client Debug Bundle System Management To view a specific traced packet, use the following command: Device# show platform packet-trace packet packet-number To view the wireless client interface handle, use the following command: Device# show platform hardware chassis active qfp feature wireless wlclient cpp-client mac-address client-mac details Device# show platform hardware chassis active qfp feature wireless wlclient cpp-client mac-address 8825.93b0.b51f details Client Details for client cpp_if_handle: 0x34 Name : WLCLIENT-IF-0x00a0000001 Mac Addr : 8825.93b0.b51f pal_if_handle : 0xa0000001 Mobility State : LOCAL Multicast Action : FORWARD Auth State : RUN Feature History for Wireless Client Debug Bundle This table provides release and related information about the feature explained in this section. This feature is also available in all the releases subsequent to the one in which they are introduced in, unless noted otherwise. Table 61: Feature History for Client Debug Bundle Release Cisco IOS XE Dublin 17.11.1 Feature Wireless Client Debug Bundle Feature Information Client debug bundle includes AP logs along with the existing controller bundle, collected in a tar file through a single debug command. Information About Wireless Client Debug Bundle The log collection of client radioactive trace, packet capture, and the output of various show commands are useful in troubleshooting wireless client issues. In the earlier releases, logs were collected through various individual steps and commands. Now, client debug bundle collates radioactive trace debug logs, packet captures in a control plane, and the output of show commands related to clients, collected in a tar file through a single debug command. From Cisco IOS XE Cupertino 17.11.1, client debug bundle collates AP logs along with the existing controller bundle. Note Client debug bundle is not supported on High Availability (HA) with Stateful Switch Over (SSO). Note When you enable the all command option on the AP console, the command activates the debug logging for all clients, which can result in an excessive amount of logs being printed in the console. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 842 System Management Types of Logs Collected Types of Logs Collected The client debug bundle logs are collected in a tar file format on bootflash, through a single debug command. The following example displays the file formats of logs collected from a client device with MAC address 8cXX.90XX.fdXX: Example: The final tar file that is generated is wireless_bundle_123456_UTC_Oct_20_2022.tar. The following files are extracted from the wireless_bundle_123456_UTC_Oct_20_2022.tar file: · wireless_bundle_8cXX.90XX.fdXX.tar (client radioactive trace debug log) · epc_135790_UTC_Oct_20_2022.pcap (packet capture in a control plane) · ap_3802_cisco_client_bundle.17.11.0.61.20221020.135154.tgz (AP logs) The following files are extracted from wireless_bundle_8cXX.90XX.fdXX.tar client radioactive trace debug log file: · show_tech_support_wireless_client_before_RA_start_8cXX.90XX.fdXX_134941_UTC_Oct_20_2022.txt · ra_trace_8cXX.90XX.fdXX_135055_UTC_Oct_20_2022.log · ra_trace_internal_8cXX.90XX.fdXX_135057_UTC_Oct_20_2022.log · show_tech_support_wireless_client_after_RA_stop_8cXX.90XX.fdXX_135055_UTC_Oct_20_2022.txt The following files are extracted from ap_3802_cisco_client_bundle.17.11.0.61.20221020.135154.tgz AP log file: · ap_3802_cisco_client_bundle.17.11.0.61.20221020.135154.messages · ap_3802_cisco_client_bundle.17.11.0.61.20221020.135154.syslogs · ap_3802_cisco_client_bundle.17.11.0.61.20221020.135154.tech_cdb_0 · ap_3802_cisco_client_bundle.17.11.0.61.20221020.135154.tech_cdb_1 Collecting Wireless Client Debug Bundle (CLI) Procedure Step 1 Command or Action Purpose debug wireless bundle client mac H.H.H Adds client MAC addresses for which debug Example: logs are required. You can add up to 32 client MAC addresses to the command. To delete the Device# debug wireless bundle client mac MAC addresses, run the no form of this aaaa.bbbb.cccc command. Step 2 debug wireless bundle client start Example: Starts the collection of the client debug bundle for wireless clients. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 843 Collecting Wireless Client Debug Bundle (CLI) System Management Step 3 Step 4 Step 5 Step 6 Step 7 Command or Action Device# debug wireless bundle client start Purpose (Optional) debug wireless bundle client start Enables the AP archive collection on a site tag. ap-archive site-tag default-site-tag level Specifies the AP archive levels as well. {critical | debug | error | verbose} Example: Device# debug wireless bundle client start ap-archive site-tag default-site-tag level debug (Optional) debug wireless bundle client start Enables embedded packet capture (EPC) in a epc control plane. Example: Device# debug wireless bundle client start epc Note If EPC is already enabled and is active from a different source, debug bundle with EPC cannot be started. To use EPC with debug bundle, stop EPC (enabled from a different source) and restart it with debug bundle. (Optional) debug wireless bundle client start Configures the maximum time, in minutes, to monitor-time monitor-time trace the condition. The default time is 30 Example: minutes. Device# debug wireless bundle client start monitor-time 30 (Optional) debug wireless bundle client stop-all collect {all | mac H.H.H} Example: Device# debug wireless bundle client stop-all collect all Stops the collection of the debug bundle for wireless clients. (Optional) debug wireless bundle client abort Cancels the collection of the debug bundle for Example: wireless clients. Device# debug wireless bundle client abort Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 844 7 4 C H A P T E R Aggressive Client Load Balancing · Information About Aggressive Client Load Balancing, on page 845 · Enabling Aggressive Client Load Balancing (GUI), on page 846 · Configuring Aggressive Client Load Balancing (GUI), on page 846 · Configuring Aggressive Client Load Balancing (CLI), on page 847 Information About Aggressive Client Load Balancing The Aggressive Client Load Balancing feature allows lightweight access points to load balance wireless clients across access points. When a wireless client attempts to associate to a lightweight access point, the associated response packets are sent to a client with an 802.11 response packet including status code 17. This code 17 indicates that the corresponding AP is busy. The AP does not respond with the response 'success' if the AP threshold is not met, and with code 17 (AP busy) if the AP utilization threshold is exceeded, and another less busy AP hears the client request. For example, if the number of clients on AP1 is more than the number of clients on AP2 and the load-balancing window, then AP1 is considered to be busier than AP2. When a client attempts to associate to AP1, the client receives an 802.11 response packet with status code 17, indicating that the access point is busy, and the client attempts to associate to a different access point. You can configure the controller to deny client associations up to 10 times (if a client attempts to associate 11 times, it will be allowed to associate on the 11th try). You can also enable or disable load balancing on a particular WLAN, which is useful if you want to disable load balancing for a select group of clients, such as time-sensitive voice clients. Note A voice client does not authenticate when delay is configured to more than 300 ms. To avoid this, configure a central-authentication, local-switching WLAN with Cisco Centralized Key Management (CCKM), configure a pagent router between an AP and WLC with a delay of 600 ms (300 ms UP and 300 ms DOWN), and try associating the voice client. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 845 Enabling Aggressive Client Load Balancing (GUI) System Management Note For a FlexConnect AP, the association is locally handled. The load-balancing decisions are taken at the controller. A FlexConnect AP sends an initial response to the client before knowing the result of the calculations in the controller. Load-balancing does not take effect when the FlexConnect AP is in standalone mode. A FlexConnect AP does not send (re)association response with status 17 for load balancing the way local-mode APs do; instead, it first sends (re)association with status 0 (success) and then deauth with reason 5. Note This feature is not supported on the APs joined on default-site-tag. This feature is not supported on the APs across different named site-tags. This feature is supported only on the APs within a named-site-tag. Enabling Aggressive Client Load Balancing (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Wireless > WLANs > Wireless Networks. Select a WLAN to view the Edit WLAN window. Click Advanced tab. Select the Load Balance check box to enable the feature. Click Update & Apply to Device. Configuring Aggressive Client Load Balancing (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Wireless > Advanced. The Load Balancing window is displayed. In the Aggressive Load Balancing Window (clients) field, enter the number of clients for the aggressive load balancing client window. In the Aggressive Load Balancing Denial Count field, enter the load balancing denial count. Click Apply. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 846 System Management Configuring Aggressive Client Load Balancing (CLI) Configuring Aggressive Client Load Balancing (CLI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action enable Example: Device# enable Purpose Enters privileged EXEC mode. configure terminal Example: Device# configure terminal Enters global configuration mode. wlan wlan-name Example: Device(config)# wlan test-wlan Specifies the WLAN name. shutdown Example: Device(config-wlan)# shutdown Disables the WLAN. load-balance Example: Device(config-wlan)# load-balance Configures a guest controller as mobility controller, in order to enable client load balance to a particular WLAN. Configure the WLAN security settings as the WLAN requirements. no shutdown Example: Device(config-wlan)# no shutdown Enables WLAN. end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. configure terminal Example: Device# configure terminal Enters global configuration mode. ap dot11 Configures the load balancing denial count. {24ghz|5ghz}load-balancingdenial count Example: Device(config)# ap dot11 5ghz load-balancing denial 10 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 847 Configuring Aggressive Client Load Balancing (CLI) System Management Step 10 Step 11 Step 12 Command or Action ap dot11 {24ghz|5ghz}load-balancingwindow clients Example: Device(config)# ap dot11 5ghz load-balancing denial 10 Purpose Configures the number of clients for the aggressive load balancing client window. end Example: Device(config-wlan)# end Returns to privileged EXEC mode. show running-config | section wlan-name Displays a filtered section of the current Example: configuration. Device# show running-config | section test-wlan Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 848 7 5 C H A P T E R RF based Automatic AP Load Balancing · Information about RF based Automatic AP Load Balancing, on page 849 · Configuring RF based Automatic AP Load Balancing, on page 850 · Disabling RF based Automatic AP Load Balancing, on page 852 · Verifying Automatic WNCd Load Balancing, on page 853 Information about RF based Automatic AP Load Balancing The RF based Automatic AP Load Balancing feature improves upon the existing Site Tag-Based Load Balancing feature, where the APs are load balanced by assigning them to wireless network control deamons (WNCD) based on site tags. If the APs in a named site tag are beyond the capacity of a WNCd, it may lead to uneven distribution of APs across the WNCd instances, resulting in high memory and CPU issues. Though the number of APs in a site tag can be limited to 1000 by using the load command, it may still lead to uneven distribution of APs if the AP load limit is not correctly configured. In some instances, all the APs belonging to a site tag may not be colocated as well. The RF based Automatic AP Load Balancing feature uses Radio Resource Management (RRM) neighbor report-based AP grouping and load-balancing across WNCd instances. When this feature is enabled, it forms AP clusters based on the RSSI received from AP neighbor reports. These clusters or neighborhoods are further split into sub-neighborhoods and smaller areas. The resulting groups of APs are then distributed evenly across the WNCd processes. The AP load balancing takes effect only after a controller reboot or through an AP CAPWAP reset triggered by the ap neighborhood load-balance apply command. When the RF based Automatic AP Load Balancing feature is active, it overrides other site tag-based load balancing. Supported Platforms · Cisco Catalyst 9800-80 Wireless Controller · Cisco Catalyst 9800-40 Wireless Controller · Cisco Catalyst 9800 Wireless Controller for Cloud · Catalyst 9800 Embedded Wireless Controller for a Cisco switch Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 849 Configuring RF based Automatic AP Load Balancing System Management Prerequisites for RF based Automatic AP Load Balancing Ensure that you run the feature on a stable network, where the APs are fully deployed and are given enough time to discover all the RF neighbors. Restrictions for RF based Automatic AP Load Balancing · You cannot use the same calendar profile for AP neighborhood policy or AP profile. · This feature is supported only on APs in local and flex mode. · You cannot run the feature when the overall load on the system is high. · You cannot use the output of the show wireless load-balance tag affinity command when the RF based Automatic AP Load Balancing feature is enabled. Use Cases for RF based Automatic AP Load Balancing 1. This feature allows using a single site tag for all the deployed APs. 2. This feature provides better load balancing of the APs across WNCd instances when more number of APs are attached to a named-site tag than the available capacity of the WNCds in the controller. 3. This feature is suitable for large number of client intra-WNCd roaming scenarios. For example, if a controller is configured in a campus to manage APs of two separate buildings, then all the APs of that building are assigned to a single WNCd rather than allocating them to separate WNCds. Guidelines for RF based Automatic AP Load Balancing · For a new deployment, use the site tags and follow the current site tag recommendations to evenly distribute the APs, or use the site tag load command to automatically distribute the APs. Using site tags, you can ensure that all the APs of the same site tag goes to the same WNCd, which helps in troubleshooting and intra-WNCd roaming. · If you are unable to use a site tag because you cannot group APs, or do not want to spend time designing site tags, use the default site tag or any named site tag and turn on the RF based Automatic AP Load Balancing feature. · In an existing deployment, if you have high CPU issues because of an unbalanced system, use the auto RRM load balance system instead of redesigning the site tags. · In an existing deployment, if you do not have any CPU load issues despite having an unbalanced system, do not change anything. Configuring RF based Automatic AP Load Balancing Before you begin There are two phases of the RF based load-balancing algorithm enablement: 1. Running the algorithm: The RF based Automatic AP Load Balancing feature run can be scheduled based on calendar profile start time expiry using ap neighborhood calendar-profile command, or on-demand Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 850 System Management Configuring RF based Automatic AP Load Balancing start of the algorithm using the ap neighborhood load-balance start command. Calendar profile start timer can be scheduled daily, weekly, or monthly. 2. Applying the algorithm: The RF based Automatic AP Load Balancing feature can be applied by controller reload or by using the ap neighborhood load-balance apply command when the wireless load-balance ap method rf configuration is enabled. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap neighborhood calendar-profile calendar-profile Example: Device(config)# ap neighborhood calendar-profile ap-calendar-profile Purpose Enters global configuration mode. Configures an AP neighborhood calendar profile. Note After the calendar profile is set, it is optional to run Step 4. However, if you want to immeditely perform a load balance, run Step 4. Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 exit Example: Device(config)# exit Returns to privileged EXEC mode. ap neighborhood load-balance start Example: Device# ap neighborhood load-balance start (Optional) Starts AP neighborhood load-balance algorithm calculation and WNCd allocation. configure terminal Example: Device# configure terminal Enters global configuration mode. wireless load-balance ap method rf Configures RF-based AP load balancing. Example: Device(config)# wireless load-balance ap method rf exit Example: Device(config)# exit Returns to privileged EXEC mode. ap neighborhood load-balance apply Example: Runs on-demand RRM-based AP load balancing. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 851 Disabling RF based Automatic AP Load Balancing System Management Command or Action Device# ap neighborhood load balance apply Purpose This command rebalances the APs using CAPWAP reset. If an AP is already in the correct WNCd instance, then it will not be CAPWAP reset. This command cannot be executed if the RRM-based AP load balancing algorithm is running, or algorithm results are not available. Disabling RF based Automatic AP Load Balancing Before you begin RF based Automatic AP Load Balancing feature is disabled by default. The APs may remain load balanced based on algorithm data even after disabling all the feature configurations and clearing all the algorithm outputs. To rebalance all the APs based on the default method of site tags, reload the controller or perform a CAPWAP reset on all the APs. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 no wireless load-balance ap method rf Disables RF-based AP load balancing. Example: Device(config)# no wireless load-balance ap method rf Step 3 no ap neighborhood calendar-profile calendar-profile Example: Device(config)# ap neighborhood calendar-profile ap-calendar-profile Disables the AP neighborhood calendar profile. Step 4 exit Example: Device(config)# exit Returns to privileged EXEC mode. Step 5 ap neighborhood load-balance clear Example: Device# ap neighborhood load-balance clear Clears the AP neighborhood load-balance algorithm calculation and resource allocation. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 852 System Management Verifying Automatic WNCd Load Balancing Verifying Automatic WNCd Load Balancing To verify the results of the RF-based algorithm and the result of the related load balancing, use the following show commands. To view the AP neighborhood summary, use the following show command: Device# show ap neighborhood summary NH-ID = Neighborhood ID AREA-ID = Area ID of neighborhood Total number of neighborhood: 5 Total number of algorithm iterations: 1 Ideal AP capacity per WNCD instance: 210 Total number of neighborhood area: 14 NH-ID AREA-ID Process Name Number of APs -------------------------------------------------- 0 0x00000000 WNCD_1 1 1 0x00000000 WNCD_0 2 2 0x00000000 WNCD_0 100 2 0x00000001 WNCD_0 100 2 0x00000002 WNCD_3 100 2 0x00000003 WNCD_4 50 3 0x00000000 WNCD_1 100 3 0x00000001 WNCD_1 100 3 0x00000002 WNCD_4 100 3 0x00000003 WNCD_4 50 4 0x00000000 WNCD_2 100 4 0x00000001 WNCD_2 100 4 0x00000002 WNCD_3 100 4 0x00000003 WNCD_3 50 To view the AP neighborhood details, use the following show command: Device# show ap neighborhood details NH-ID = Neighborhood ID AREA-ID = Area ID of neighborhood Number of APs: 4 NH-ID AREA-ID WNCD instance AP Name Ethernet MAC -------------------------------------------------------------------------------- 0 0x00000000 1 EDU_BR_01_00_28_3702 bc16.6509.bfcc 1 0x00000000 0 ci-glad-mdns-ap 0cd0.f894.567c 1 0x00000000 0 EDU_VW_9120_1_2 c4f7.d54c.f978 2 0x00000000 0 ewlc-hc-tsim-30-1 00b9.3000.02f0 To view the AP neighborhood information, use the following show command: Device# show ap neighborhood 0 details NH-ID = Neighborhood ID AREA-ID = Area ID of neighborhood Number of APs: 1 NH-ID AREA-ID WNCD instance AP Name Ethernet MAC -------------------------------------------------------------------------------- Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 853 Verifying Automatic WNCd Load Balancing System Management 0 0x00000000 0 APA023.9FD8.EA22 a023.9fd8.ea22 To view the AP neighborhood details using its MAC address, use the following show command: Device# show ap neighborhood mac 0aa8.89f0.0001 details NH-ID = Neighborhood ID AREA-ID = Area ID of neighborhood AP Name Ethernet MAC Radio MAC NH-ID AREA-ID WNCD instance ------------------------------------------------------------------------------------ AP6B8B4567-0001 0aa8.89f0.0001 0aa8.8900.0100 0 0x00000000 0 To view the WNCd information, use the following show command: Device# show ap neighborhood wncd 0 details NH-ID = Neighborhood ID AREA-ID = Area ID of neighborhood Number of APs: 9 WNCD instance NH-ID AREA-ID AP Name Ethernet MAC ------------------------------------------------------------------------------------------------ 0 2 0x00000000 9130I-1 0c75.bdb5.ffc0 0 2 0x00000000 9130E-2 3c41.0efe.46f0 0 2 0x00000000 9120E-2 5ce1.7628.8bbc 0 2 0x00000000 9130I-2 e44e.2d2e.59d4 0 2 0x00000000 9120E-1 5ce1.7628.aa0c 0 2 0x00000000 9120E-3 5ce1.7628.af04 0 2 0x00000000 3700I-2 b838.6159.dfa4 1 0 0x00000000 3800I-2 6cb2.ae2e.dfdc 2 1 0x00000000 4800-1 f4db.e643.fa72 NH-ID = Neighborhood ID AREA-ID = Area ID of neighborhood Number of APs: 5 WNCD instance NH-ID AREA-ID AP Name Ethernet MAC ----------------------------------------------------------------------- 0 12 0x00000000 AP6B8B4567-0001 0aa8.89f0.0001 0 12 0x00000000 AP6B8B4567-0004 0aa8.89f0.0004 0 12 0x00000000 AP6B8B4567-0007 0aa8.89f0.0007 0 12 0x00000000 AP6B8B4567-0010 0aa8.89f0.000a 0 12 0x00000000 AP6B8B4567-0013 0aa8.89f0.000d Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 854 7 6 C H A P T E R Accounting Identity List · Configuring Accounting Identity List (GUI), on page 855 · Configuring Accounting Identity List (CLI), on page 855 · Configuring Client Accounting (GUI), on page 856 · Configuring Client Accounting (CLI), on page 856 Configuring Accounting Identity List (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Security > AAA. In the AAA Method List tab, go to the Accounting section, and click Add. In the Quick Setup: AAA Accounting window that is displayed, enter a name for your method list. Choose the type of authentication as identity, in the Type drop-down list. Choose the server groups you want to use to authenticate access to your network, from the Available Server Groups list and click > icon to move them to the Assigned Server Groups list. Click Save & Apply to Device. Configuring Accounting Identity List (CLI) Accounting is the process of logging the user actions and keeping track of their network usage. Whenever a user successfully executes an action, the RADIUS accounting server logs the changed attributes, the user ID of the person who made the change, the remote host where the user is logged in, the date and time when the command was executed, the authorization level of the user, and a description of the action performed and the values provided. Follow the procedure given below to configure accounting identity list. Before you begin Configure the RADIUS server and AAA group server. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 855 Configuring Client Accounting (GUI) System Management Procedure Step 1 Command or Action Purpose aaa accounting identity named-list start-stop Enables accounting to send a start-record group server-group-name accounting notice when a client is authorized Example: and a stop-record at the end. Device(config)# aaa accounting identity Note user1 start-stop group aaa-test You can also use the default list, instead of a named list. Whenever there is a change in the client attribute, for example, change in IP address, client roaming, and so on, an accounting interim update is sent to the RADIUS server. Configuring Client Accounting (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Tags & Profiles > Policy. Click the Policy Profile Name and in the Edit Policy Profile window, go to the Advanced tab. From the Accounting List drop-down, select the appropriate accounting list for this policy profile. This will ensure that the policy profile undergoes that type of accounting you want to perform, before allowing it access to the network. Click Save & Apply to Device. Configuring Client Accounting (CLI) Follow the procedure given below to configure client accounting. Before you begin Ensure that RADIUS accounting is configured. Procedure Step 1 Command or Action Purpose wireless profile policy profile-policy Example: Configures WLAN policy profile and enters wireless policy configuration mode. Device(config)# wireless profile policy default-policy-profile Step 2 shutdown Example: Disables the policy profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 856 System Management Configuring Client Accounting (CLI) Step 3 Step 4 Command or Action Purpose Device(config-wireless-policy)# shutdown accounting-list list-name Example: Device(config-wireless-policy)# accounting-list user1 Sets the accounting list. no shutdown Example: Device(config-wireless-policy)# no shutdown Enables the policy profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 857 Configuring Client Accounting (CLI) System Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 858 7 7 C H A P T E R Support for Accounting Session ID · Information About Accounting Session ID, on page 859 · Configuring an Accounting Session ID (CLI), on page 859 · Verifying an Account Session ID, on page 860 Information About Accounting Session ID Accounting ID is a unique identifier for a wireless client session. This ID helps to identify the accounting data of a client in the AAA server. Accounting session ID is generated by the AAA module. From Cisco IOS XE Bengaluru, Release 17.4.1 onwards, Accounting Session ID is supported in the AAA access request, while authenticating wireless client using IEEE 802.1x method. In the Cisco IOS XE Amsterdam, Release 17.3.x and earlier releases, the Accoutning Session ID was sent only as part of the accounting request. From Cisco IOS XE Bengaluru, Release 17.4.1 onwards, the Accounting Session ID is sent as part of the access request too. Configuring an Accounting Session ID (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 radius-server attribute wireless 44 include-in-access-req Sends the RADIUS authentication attribute 44, in the access request packet. Example: Device(config)# radius-server attribute wireless 44 include-in-access-req Step 3 aaa accounting identity accounting-list-name Configures the accounting session identity of start-stop group server-group-name the AAA server. Example: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 859 Verifying an Account Session ID System Management Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action Purpose Device(config)# aaa accounting identity accounting-list-name start-stop group AAA_GROUP_1 wireless profile policy Configures the WLAN policy profile. Example: Device(config)# wireless profile policy default-policy-profile accounting-list-name start-stop group AAA_GROUP_1 accounting-list accounting-list-name Example: Device(config-wireless-policy)# accounting-list accounting-list-name Configures the accounting list. Note The Accounting Session ID is added as part of the account request, only if radius-server attribute wireless 44 include-in-access-req is enabled along with the accounting configuration under the wireless policy. description description-name Example: Device(config-wireless-policy)# description accounting-description Adds a description for the policy profile. vlan vlan-id Configures the VLAN name or ID. Example: Device(config-wireless-policy)# vlan 40 no shutdown Example: Device(config-wireless-policy)# no shutdown Saves the configuration and exits configuration mode and returns to privileged EXEC mode. Verifying an Account Session ID To verify if an Account Session ID is populated, use the following command: Device# show wireless pmk-cache Number of PMK caches in total : 1 Type Station Entry Lifetime Accounting-Session-Id Audit-Session-Id VLAN Override Username IP Override ------------------------------------------------------------------------------------------------------------------------------------------------------------------- RSN 6c19.c0e6.a444 1768 NA 0x00000006 052DA8C1000000104E634C77 cwa-user Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 860 System Management Verifying an Account Session ID To display the current Accounting Session ID, use the following command: Device# show wireless client mac-address<H.H.H>detail Central NAT : DISABLED Session Manager: Point of Attachment : capwap_90000005 IIF ID : 0x90000005 Authorized : TRUE Session timeout : 1800 Common Session ID: 000000000000000B14E9130A Acct Session ID : 0x0000000c Last Tried Aaa Server Details: Server IP : 9.10.8.247 Auth Method Status List Method : Dot1x SM State : AUTHENTICATED SM Bend State : IDLE Local Policies: Service Template : wlan_svc_default-policy-profile (priority 254) VLAN :1 Server Policies: Absolute-Timer : 1800 Resultant Policies: VLAN Name : default VLAN :1 Absolute-Timer : 1800 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 861 Verifying an Account Session ID System Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 862 7 8 C H A P T E R Interim Accounting · Information About Interim Accounting, on page 863 · Disabling Interim Accounting (CLI), on page 864 · Verifying Interim Accounting, on page 864 Information About Interim Accounting RADIUS accounting sends accounting-request packets, with the relevant accounting information, from the network access server (NAS) to a RADIUS server. Note The RADIUS accounting requests send data, such as VLAN ID, authentication methods, and so on, to a session. RADIUS accounting covers the following updates: · Interim Updates: When RADIUS accounting covers DHCP_TLVs, HTTP_TLVs, IP, or ROAM (state machine) changes, the updates are referred to as interim updates or interim accounting. · Periodic Updates: When RADIUS accounting is specified by a timer value, the updates are referred to as periodic updates. Note Disable the interim updates for the following reasons: · They cause unnecessary traffic to be sent. · They drive up error rates. · They impact alarm thresholds and other metrics that are used for venue-authentication performance. By default, the Interim Accounting feature is enabled with the aaa accounting Identity default start-stop group radius command. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 863 Disabling Interim Accounting (CLI) System Management Disabling Interim Accounting (CLI) Before you begin You must disable the Policy Profile before performing this procedure. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-policy Example: Configures WLAN policy profile and enters wireless policy configuration mode. Device(config)# wireless profile policy default-policy-profile Step 3 no accounting-interim Example: Device(config-wireless-policy)# no accounting-interim Disables interim accounting. Step 4 end Example: Device(config-wireless-policy)# end Returns to privileged EXEC mode. Verifying Interim Accounting To verify the interim accounting updates, run the following command: Device# show wireless profile policy detailed default-policy-profile | s Interim Interim Accounting Updates: DISABLED Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 864 7 9 C H A P T E R Wireless Multicast · Information About Wireless Multicast, on page 865 · Prerequisites for Configuring Wireless Multicast, on page 868 · Restrictions on Configuring Wireless Multicast, on page 869 · Configuring Wireless Multicast, on page 869 · IPv6 Multicast-over-Multicast, on page 871 · Directed Multicast Service, on page 874 · Wireless Broadcast, Non-IP Multicast and Multicast VLAN, on page 876 · Multicast Filtering, on page 882 Information About Wireless Multicast If the network supports packet multicasting, the multicast method that the controller uses can be configured. The controller performs multicast routing in two modes: · Unicast mode: The controller unicasts every multicast packet to every access point associated to the controller. This mode is inefficient and generates a lot of extra traffic in the device and the network, but is required on networks that do not support multicast routing (needed if the APs are on different subnets than the device's wireless management interface). · Multicast mode: The controller sends multicast packets to a CAPWAP multicast group. This method reduces the overhead on the controller processor and shifts the work of packet replication to the network, which is much more efficient than the unicast method. The flexconnect mode has two submodes: local switching and central switching. In local switching mode, the data traffic is switched at the AP level and the controller does not see any multicast traffic. In central switching mode, the multicast traffic reaches the controller. However, IGMP snooping takes place at the AP. When the multicast mode is enabled and the controller receives a multicast packet from the wired LAN, the controller encapsulates the packet using CAPWAP and forwards the packet to the CAPWAP multicast group address. The controller always uses the management VLAN for sending multicast packets. Access points in the multicast group receive the packet and forward it to all the BSSIDs mapped to the VLAN on which clients receive multicast traffic. The controller supports all the capabilities of IGMP v1, including Multicast Listener Discovery (MLD) v1 snooping, but the IGMP v2 and IGMP v3 capabilities are limited. This feature keeps track of and delivers IPv6 multicast flows to the clients that request them. To support IPv6 multicast, global multicast mode should be enabled. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 865 Multicast Optimization System Management Internet Group Management Protocol (IGMP) snooping is introduced to better direct multicast packets. When this feature is enabled, the controller snooping gathers IGMP reports from the clients, processes them, creates unique multicast group IDs (MGIDs) based on the Layer 3 multicast address and the VLAN number, and sends the IGMP reports to the IGMP querier. The controller then updates the access-point MGID table on the corresponding access point with the client MAC address. When the controller receives multicast traffic for a particular multicast group, it forwards it to all the access points, but only those access points that have active clients listening or subscribed to that multicast group send multicast traffic on that particular WLAN. IP packets are forwarded with an MGID that is unique for an ingress VLAN and the destination multicast group. Layer 2 multicast packets are forwarded with an MGID that is unique for the ingress VLAN. MGID is a 14-bit value filled in the 16-bit reserved field of wireless information in the CAPWAP header. The remaining two bits should be set to zero. Multicast Optimization Multicast optimization enables you to create a multicast VLAN that can be used for multicast traffic. One of the VLANs in the device can be configured as a multicast VLAN where multicast groups are registered. The clients are allowed to listen to a multicast stream on the multicast VLAN. The MGID is generated using the mulicast VLAN and multicast IP addresses. If multiple clients on different VLANs of the same WLAN are listening to a single multicast IP address, a single MGID is generated. The device makes sure that all the multicast streams from the clients on this VLAN group always go out on the multicast VLAN to ensure that the upstream router has one entry for all the VLANs of the VLAN group. Only one multicast stream hits the VLAN group even if the clients are on different VLANs. Therefore, the multicast packets that are sent out over the network is just one stream. Note When VLAN groups are defined and uses multicast communication, then you need to enable the multicast VLAN. IPv6 Global Policies IPv6 global policies provide storage and access policy database services. IPv6 ND inspection and IPv6 RA guard are IPv6 global policies features. Every time an ND inspection is configured globally, the policy attributes are stored in the software policy database. The policy is then applied to an interface, and the software policy database entry is updated to include this interface to which the policy is applied. IPv6 RA guard is enabled by default on the controller. RA from the wired side should be forwarded to the wireless clients if the Stateless Address Auto-Configuration (SLAAC) is deployed in the network. Information About IPv6 Snooping The following sections provide information about IPv6 snooping. IPv6 Neighbor Discovery Inspection The IPv6 Neighbor Discovery Inspection, or IPv6 snooping feature bundles several Layer 2 IPv6 first-hop security features, including IPv6 Address Glean and IPv6 Device Tracking. IPv6 neighbor discovery (ND) inspection operates at Layer 2, or between Layer 2 and Layer 3, and provides IPv6 features with security and scalability. This feature mitigates some of the inherent vulnerabilities for the neighbor discovery mechanism, Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 866 System Management IPv6 Device Tracking such as attacks on duplicate address detection (DAD), address resolution, device discovery, and the neighbor cache. IPv6 ND inspection learns and secures bindings for stateless autoconfiguration addresses in Layer 2 neighbor tables and analyzes ND messages in order to build a trusted binding table. IPv6 ND messages that do not have valid bindings are dropped. An ND message is considered trustworthy if its IPv6-to-MAC mapping is verifiable. This feature mitigates some of the inherent vulnerabilities for the neighbor discovery mechanism, such as attacks on duplicate address detection (DAD), address resolution, device discovery, and the neighbor cache. When IPv6 ND inspection is configured on a target (which varies depending on platform target support and may include device ports, switch ports, Layer 2 interfaces, Layer 3 interfaces, and VLANs), capture instructions are downloaded to the hardware to redirect the ND protocol and Dynamic Host Configuration Protocol (DHCP) for IPv6 traffic up to the switch integrated security features (SISF) infrastructure in the routing device. For ND traffic, messages such as NS, NA, RS, RA, and REDIRECT are directed to SISF. For DHCP, UDP messages sourced from port 546 or 547 are redirected. IPv6 ND inspection registers its "capture rules" to the classifier, which aggregates all rules from all features on a given target and installs the corresponding ACL down into the platform-dependent modules. Upon receiving redirected traffic, the classifier calls all entry points from any registered feature (for the target on which the traffic is being received), including the IPv6 ND inspection entry point. This entry point is the last to be called, so any decision (such as drop) made by another feature supersedes the IPv6 ND inspection decision. IPv6 Device Tracking IPv6 device tracking provides IPv6 host liveness tracking so that a neighbor table can be immediately updated when an IPv6 host disappears. IPv6 First-Hop Security Binding Table The IPv6 First-Hop Security Binding Table recovery mechanism feature enables the binding table to recover in the event of a device reboot. A database table of IPv6 neighbors connected to the device is created from information sources such as ND snooping. This database, or binding, table is used by various IPv6 guard features to validate the link-layer address (LLA), the IPv4 or IPv6 address, and prefix binding of the neighbors to prevent spoofing and redirect attacks. This mechanism enables the binding table to recover in the event of a device reboot. The recovery mechanism will block any data traffic sourced from an unknown source; that is, a source not already specified in the binding table and previously learned through ND or DHCP gleaning. This feature recovers the missing binding table entries when the resolution for a destination address fails in the destination guard. When a failure occurs, a binding table entry is recovered by querying the DHCP server or the destination host, depending on the configuration. Recovery Protocols and Prefix Lists The IPv6 First-Hop Security Binding Table Recovery Mechanism feature introduces the capability to provide a prefix list that is matched before the recovery is attempted for both DHCP and NDP. If an address does not match the prefix list associated with the protocol, then the recovery of the binding table entry will not be attempted with that protocol. The prefix list should correspond to the prefixes that are valid for address assignment in the Layer 2 domain using the protocol. The default is that there is no prefix list, in which case the recovery is attempted for all addresses. The command to associate a prefix list to a protocol is protocol {dhcp | ndp} [prefix-list prefix-list-name]. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 867 IPv6 Address Glean System Management IPv6 Address Glean IPv6 address glean is the foundation for many other IPv6 features that depend on an accurate binding table. It inspects ND and DHCP messages on a link to glean addresses, and then populates the binding table with these addresses. This feature also enforces address ownership and limits the number of addresses any given node is allowed to claim. The following figure shows how IPv6 address glean works. Figure 21: IPv6 Address Glean Prerequisites for Configuring Wireless Multicast · To participate in IP multicasting, the multicast hosts, routers, and multilayer switches must have IGMP operating. · When enabling multicast mode on the controller, a CAPWAP multicast group address should also be configured. Access points listen to the CAPWAP multicast group using IGMP. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 868 System Management Restrictions on Configuring Wireless Multicast · You must be cautious when using IGMPv3 with switches that are enabled for IGMP snooping. The IGMPv3 messages are different from the messages used in IGMP Version 1 (IGMPv1) and Version 2 (IGMPv2). If your switch does not recognize IGMPv3 messages, the hosts do not receive traffic when IGMPv3 is used. IGMPv3 devices do not receive multicast traffic in either cases: · When IGMP snooping is disabled. · When IGMPv2 is configured on the interface. It is recommended to enable IGMPv3 on all intermediate or other Layer 3 network devices. Primarily, on each subnet used by multicast devices including controller and AP subnets. Restrictions on Configuring Wireless Multicast The following are the restrictions for configuring IP multicast forwarding: · Access points in monitor mode, sniffer mode, or rogue-detector mode do not join the CAPWAP multicast group address. · The CAPWAP multicast group configured on the controllers should be different for different controllers. · Multicast routing should not be enabled for the management interface. · Multicast with VLAN group is only supported in local mode AP. · Multicast traffic from wireless clients in non-multicast VLAN should be routed by the uplink switch. · Multicast traffic on an AAA overridden VLAN is not supported. Restrictions for IPv6 Snooping The IPv6 snooping feature is not supported on Etherchannel ports. Configuring Wireless Multicast The following sections provide information about the various wireless multicast configuration tasks: Configuring Wireless Multicast-MCMC Mode (CLI) Procedure Step 1 Command or Action wireless multicastip-addr Example: Device(config)# wireless multicast 231.1.1.1 Purpose Enables multicast-over-multicast. Use the no form of this command to disable the feature. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 869 Configuring Wireless Multicast-MCUC Mode System Management Step 2 Command or Action end Example: Device(config)# end Purpose Exits configuration mode. Configuring Wireless Multicast-MCUC Mode Note The wireless multicast to unicast (MCUC) mode is only supported in 9800-CL small template. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless multicast Example: Device(config)# wireless multicast Step 3 end Example: Device(config)# end Purpose Enters global configuration mode. Enables the multicast traffic for wireless clients. Exits configuration mode. Configuring Multicast Listener Discovery Snooping (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Services > Multicast. Click MLD Snooping. In the MLD Snooping section, click the toggle button to enable or disable MLD snooping. Enter the MLD Query Interval, in milliseconds. The value range is between 100 ms and 32767 ms. The default value is 1000 ms. Move the required VLAN IDs listed in the Disabled section to the Enabled section. (By default, this feature is disabled on the VLAN.) You can also search for a VLAN ID using the search field. You can click Disable All to move all the VLAN IDs from the Enabled list to the Disabled list, or click Enable All to move all the VLAN IDs from the Disabled list to the Enabled list. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 870 System Management Configuring IPv6 MLD Snooping Step 6 Click Apply to Device. Configuring IPv6 MLD Snooping Procedure Step 1 Command or Action configure terminal Example: Device# ipv6 mld snooping Step 2 ipv6 mld snooping Example: Device(config)# ipv6 mld snooping Purpose Enters global configuration mode. Enables MLD snooping. Verifying the Multicast VLAN Configuration To view the multicast VLAN associated with a policy profile along with the VLAN assigned to that profile, use the following command: Device# show wireless profile policy detail default-policy-profile Policy Profile Name Description Status VLAN Multicast VLAN Client count Passive Client : 84 : default-policy-profile : default policy profile : ENABLED : vlan-pool1 :0 : DISABLED To view the multicast VLAN associated with a client, use the following command: Device# show wireless client mac ac2b.6e4b.551e detail Client MAC Address : ac2b.6e4b.551e Client IPv4 Address : 84.84.0.20 .......... VLAN : 82 Access VLAN : 82 Multicast VLAN: 84 IPv6 Multicast-over-Multicast IPv6 multicast allows a host to send a single data stream to a subset of all the hosts (group transmission) simultaneously. When IPv6 Multicast over Multicast is configured, all the APs join the IPv6 multicast address, and the multicast traffic from the wireless controller to the AP flows over the IPv6 multicast tunnel. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 871 Configuring IPv6 Multicast-over-Multicast (GUI) System Management In mixed deployments (IPv4 and IPv6), the APs might join the wireless controller over IPv4 or IPv6. To enable Multicast over Multicast in mixed deployments, configure both IPv4 and IPv6 multicast tunnels. The IPv4 APs have a unicast IPv4 CAPWAP tunnel and join the IPv4 multicast group. The IPv6 APs will have a unicast IPv6 CAPWAP tunnel and joins the IPv6 multicast group. Note Mixed mode of Multicast over Unicast and Multicast over Multicast over IPv4 and IPv6 is not supported in Cisco IOS XE Gibraltar 16.10.1. Table 62: Multicast Support Per Platform Platform Cisco Catalyst 9800-40 Wireless Controller Cisco Catalyst 9800-80 Wireless Controller Cisco Catalyst 9800 Wireless Controller for Cloud Small Template Cisco Catalyst 9800 Wireless Controller for Cloud Medium Template Cisco Catalyst 9800 Wireless Controller for Cloud Large Template Cisco Catalyst 9800-L Wireless Controller Multicast Support - Multicast Support Multicast over Unicast Multicast over Multicast No Yes No Yes Yes Yes No Yes No Yes Yes Yes Configuring IPv6 Multicast-over-Multicast (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Services > Multicast. From the AP Capwap Multicast drop-down list, select Multicast. Enter the AP Capwap IPv6 Multicast group Address. Click Apply. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 872 System Management Configuring IPv6 Multicast-over-Multicast Configuring IPv6 Multicast-over-Multicast Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless multicast {ipv4-address| ipv6 ipv6-address) Configures IPv6 multicast-over-multicast address. Example: Device(config)# wireless multicast ipv6 ff45:1234::86 Verifying IPv6 Multicast-over-Multicast To verify the IPv6 multicast-over-multicast configuration, use the following commands: Device# show wireless multicast Multicast : Enabled AP Capwap Multicast : Multicast AP Capwap IPv4 Multicast group Address : 231.1.1.1 AP Capwap IPv6 Multicast group Address : ff45:1234::86 Wireless Broadcast : Disabled Wireless Multicast non-ip-mcast : Disabled Device# show running-configuration | inc multicast show run | inc multicast:-- wireless multicast wireless multicast ipv6 ff45:1234::86 wireless multicast 231.1.1.1 Verifying the Multicast Connection Between the Controller and the AP Cisco Catalyst 9800 Series Wireless Controller initiates a ping request that passes through the CAPWAP multicast tunnel onto the CAPWAP multicast receiver, which is the AP. In response, the AP pings the packets for CAPWAP multicast group IP address, and sends back the response to the controller. You can view the statistics on the AP for transmitted and received traffic to analyse the data that are sent and received through the multicast tunnel. Alternatively, you can also verify by enhancing the existing statistics on the AP for transmitted and received traffic to explicitly list the joins, leaves, data packets transmitted and received through the multicast tunnel. To confirm if the APs receive multicast to multicast (mom) traffic sent by the controller, use the following command Device# show ap multicast mom AP Name MOM-IP TYPE MOM- STATUS Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 873 Directed Multicast Service System Management ------------------------------------------------------ SS-E-1 IPv4 Up SS-E-2 IPv4 Up 9130E-r3-sw2-g1012 IPv4 Up 9115i-r3-sw2-te1-0-38 IPv4 Up AP9120-r3-sw3-Gi1-0-46 IPv4 Up ap3800i-r2-sw1-te2-0-2 IPv4 Up Directed Multicast Service The Directed Multicast Service (DMS) feature allows a client to request access points (AP) to transmit multicast packets as unicast frames. After receiving this request, an AP buffers the multicast traffic for a client and transmits it as a unicast frame when the client wakes up. This allows the client to receive the multicast packets that were ignored while in sleep mode (to save battery power) and also ensures Layer 2 reliability. The unicast frames are transmitted to the client at a potentially higher wireless link rate, which enables the client to receive the packet quickly by enabling the radio for a shorter duration, thus saving more battery power. Without DMS, the client has to wake up at each Delivery Traffic Indication Map (DTIM) interval to receive multicast traffic. Configuring Directed Multicast Service(GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Wireless > WLANs > Wireless Networks. Select a WLAN to view the Edit WLAN window. Click Advanced tab. Check the Directed Multicast Service check box to enable the feature. Click Update & Apply to Device. Configuring Directed Multicast Service Before you begin · This feature is enabled on receiving a request from a client. Ensure that this feature is configured under WLAN. · This feature is supported only on 802.11v-capable clients, such as Apple iPad and Apple iPhone. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 874 System Management Verifying the Directed Multicast Service Configuration Step 2 Step 3 Step 4 Step 5 Command or Action wlan profile-name Example: Device(config)# wlan test5 shutdown Example: Device(config-wlan)# shutdown dms Example: Device(config-wlan)# dms no shutdown Example: Device(config-wlan)# no shutdown Purpose Configures the WLAN profile and enters WLAN profile configuration mode. Disables the WLAN profile. Configures DMS processing per WLAN. Enables the WLAN profile. Verifying the Directed Multicast Service Configuration To verify the status of the DMS configuration on the controller, use show commands below. The DMS status is displayed under IEEE 802.11v Parameters. Device# show wlan id 5 WLAN Profile Name : test ================================================ Identifier :5 Network Name (SSID) : test Status : Disabled Broadcast SSID : Enabled Universal AP Admin : Disabled Max Associated Clients per WLAN :0 Max Associated Clients per AP per WLAN :0 Max Associated Clients per AP Radio per WLAN : 200 ! . . . Assisted-Roaming Neighbor List : Disabled Prediction List : Disabled Dual Band Support : Disabled ! DMS status is displayed below. IEEE 802.11v parameters Directed Multicast Service BSS Max Idle Protected Mode Traffic Filtering Service BSS Transition Disassociation Imminent Optimised Roaming Timer Timer WNM Sleep Mode : Enabled : Disabled : Disabled : Disabled : Enabled : Disabled : 40 : 200 : Disabled Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 875 Wireless Broadcast, Non-IP Multicast and Multicast VLAN System Management 802.11ac MU-MIMO 802.11ax paramters OFDMA Downlink OFDMA Uplink MU-MIMO Downlink MU-MIMO Uplink BSS Color Partial BSS Color BSS Color Code : Disabled : unknown : unknown : unknown : unknown : unknown : unknown To verify the status of the DMS configuration on the controller for clients, use the following command: Device# show wireless client mac-address 6c96.cff2.83a0 detail | inc 11v 11v BSS Transition : implemented 11v DMS Capable : Yes To verify the DMS request and response statistics, use the following command: Device# show wireless stats client detail | inc DMS Total DMS requests received in action frame :0 Total DMS responses sent in action frame :0 Total DMS requests received in Re-assoc Request : 0 Total DMS responses sent in Re-assoc Response : 0 To verify the DMS configuration Cisco Aironet 2700 and 3700 Series APs, use the following command: AP# show controllers dot11Radio 0/1 | begin Global DMS Global DMS - requests:0 uc:0 drop:408 DMS enabled on WLAN(s): dms-open test-open To verify the DMS configuration on the Cisco Aironet 2800, 3800, and 4800 Series APs, use the following command: AP# show multicast dms all vapid client dmsid TClas 0 1C:9E:46:7C:AF:C0 1 mask:0x55, version:4, proto:0x11, dscp:0x0, sport:0, dport:9, sip:0.0.0.0, dip:224.0.0.251 Wireless Broadcast, Non-IP Multicast and Multicast VLAN Configuring Non-IP Wireless Multicast (CLI) Before you begin · The non-IP Multicast feature is disable globally, by default. · For non-IP multicast, global wireless multicast must be enabled for traffic to pass. · This feature is not supported in Fabric or Flex deployments. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 876 System Management Configuring Wireless Broadcast (GUI) Procedure Step 1 Command or Action Purpose wireless multicast non-ip Enables non-IP multicast in all the VLANs. By Example: default, the non-IP multicast in all the VLANs is in Disabled state. Wireless multicast must be Device(config)# wireless multicast non-ip enabled for the traffic to pass. Use the no form of this command to disable non-IP multicast in all the VLANs. Step 2 wireless multicast non-ip vlan vlanid Enables non-IP multicast per VLAN. By Example: default, non-IP multicast per VLAN is in Disabled state. Both wireless multicast and Device(config)# wireless multicast non-ip wireless multicast non-IP must be enabled for vlan 5 traffic to pass. Use the no form of this command to disable non-IP multicast per VLAN. Step 3 end Example: Device(config)# end Exits configuration mode. Configuring Wireless Broadcast (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Services > Multicast. In the Multicast page, change the status of the Wireless Broadcast to enabled to broadcast packets for wireless clients. The default value is disabled. From the Disabled VLAN table, click the arrow adjecent to the VLAN ID in the Disabled state to the Enabled state to enable broadcast packets for a VLAN. The default value is disabled. Save the configuration. Configuring Wireless Broadcast (CLI) Before you begin · This feature is applicable only to non-ARP and DHCP broadcast packets. · This feature is disable globally, by default. · This feature is not supported in Fabric or Flex deployments. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 877 Configuring Multicast-over-Multicast for AP Multicast Groups (CLI) System Management Procedure Step 1 Command or Action wireless broadcast Example: Device(config)# wireless broadcast Purpose Enables broadcast packets for wireless clients. By default, the broadcast packets for wireless clients is in Disabled state. Enabling wireless broadcast enables broadcast traffic for each VLAN. Use the no form of this command to disable broadcasting packets. Step 2 wireless broadcast vlan vlanid Enables broadcast packets for single VLAN. Example: By default, the Broadcast Packets for a Single VLAN feature is in Disabled state. Wireless Device(config)# wireless broadcast vlan broadcast must be enabled for broadcasting. 3 Use the no form of this command to disable broadcast traffic for each VLAN. Step 3 end Example: Device(config)# end Exits configuration mode. Configuring Multicast-over-Multicast for AP Multicast Groups (CLI) Procedure Step 1 Command or Action ap capwap multicast IP address Example: Device(config)# ap capwap multicast 239.4.4.4 Step 2 wireless multicast IP address Example: Device(config)# wireless multicast 239.4.4.4 Step 3 end Example: Device(config)# end Purpose Configures an all-AP multicast group to send a single packet to all the APs. Enables Multicast-over-Multicast for multicasting client multicast group traffic to all the APs through the underlying all-AP multicast group. IP address--Multicast-over-multicast IP address. Exits configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 878 System Management Verifying Wireless Multicast Verifying Wireless Multicast Table 63: Commands for Verifying Wireless Multicast Command show wireless multicast Description Displays the multicast status and IP multicast mode, and each VLAN's broadcast and non-IP multicast status. Also displays the Multicast Domain Name System (mDNS) bridging state. show wireless multicast group summary Displays all (Group and VLAN) lists and the corresponding MGID values. show wireless multicast [source source] Displays details of the specified (S,G,V) and shows all the group group vlan vlanid clients associated with and their MC2UC status. show ip igmp snooping wireless mcast-ipc-count Displays the number of multicast IPCs per MGID sent to the wireless controller module. show ip igmp snooping wireless mgid Displays the MGID mappings. show ip igmp snooping igmpv2-tracking Displays the client-to-SGV mappings and the SGV-to-client mappings. show ip igmp snooping querier vlan vlanid Displays the IGMP querier information for the specified VLAN. show ip igmp snooping querier detail Displays the detailed IGMP querier information of all the VLANs. show ipv6 mld snooping querier vlan vlanid Displays the MLD querier information for the specified VLAN. show ipv6 mld snooping wireless mgid Displays MGIDs for the IPv6 multicast group. Multicast Optimization Multicast used to be based on the group of the multicast addresses and the VLAN as one entity, MGID. With the VLAN group, duplicate packets might increase. Using the VLAN group feature, every client listens to the multicast stream on a different VLAN. As a result, the device creates different MGIDs for each multicast address and the VLAN. Therefore, the upstream router sends a copy for each VLAN, which results in as many copies as the number of VLANs in the group. Because the WLAN remains the same for all the clients, multiple copies of the multicast packet are sent over the wireless network. To suppress the duplication of a multicast stream on the wireless medium between the device and the access points, the multicast optimization feature can be used. Multicast optimization enables you to create a multicast VLAN that can be used for multicast traffic. One of the VLANs in the device can be configured as a multicast VLAN where multicast groups are registered. The clients are allowed to listen to a multicast stream on the multicast VLAN. The MGID is generated using the mulicast VLAN and multicast IP addresses. If multiple clients on different VLANs of the same WLAN are listening to a single multicast IP address, a single MGID is generated. The device makes sure that all the multicast streams from the clients on this VLAN group always go out on the multicast VLAN to ensure that the upstream router has one entry for all the VLANs of the VLAN group. Only one multicast stream hits the Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 879 Configuring IP Multicast VLAN for WLAN (GUI) System Management VLAN group even if the clients are on different VLANs. Therefore, the multicast packets that are sent out over the network is just one stream. Configuring IP Multicast VLAN for WLAN (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Tags & Profiles > Policy. Click Add. In the General tab, enter the Name and Description. Enable the Central Switching and Central Association toggle buttons. In the Access Policies tab, under the VLAN settings, choose the vlans from the VLAN/VLAN Group drop-down list and enter the Multicast VLAN. Click Apply to Device. Configuring IP Multicast VLAN for WLAN Before you begin · This feature is not supported in Fabric or Flex deployments. · Multicast VLAN is used for both IPv4 and IPv6 multicast forwarding to APs. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-policy Example: Configures WLAN policy profile and enters wireless policy configuration mode. Device(config)# wireless profile policy default-policy-profile Step 3 central association Example: Configures central association for locally switched clients. Device(config-wireless-policy)# central association Step 4 central switching Example: Configures WLAN for central switching. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 880 System Management Verifying the Multicast VLAN Configuration Step 5 Step 6 Step 7 Step 8 Command or Action Purpose Device(config-wireless-policy)# central switching description policy-profile-name Example: Device(config-wireless-policy)# description "test" (Optional) Adds a description for the policy profile. vlan vlan-name Assigns the profile policy to the VLAN. Example: Device(config-wireless-policy)# vlan 32 multicast vlan vlan-id Configures multicast for the VLAN. Example: Device(config-wireless-policy)# multicast vlan 84 no shutdown Example: Device(config-wireless-policy)# no shutdown Enables the profile policy. Verifying the Multicast VLAN Configuration To view the multicast VLAN associated with a policy profile along with the VLAN assigned to that profile, use the following command: Device# show wireless profile policy detail default-policy-profile Policy Profile Name Description Status VLAN Multicast VLAN Client count Passive Client : 84 : default-policy-profile : default policy profile : ENABLED : vlan-pool1 :0 : DISABLED To view the multicast VLAN associated with a client, use the following command: Device# show wireless client mac ac2b.6e4b.551e detail Client MAC Address : ac2b.6e4b.551e Client IPv4 Address : 84.84.0.20 .......... VLAN : 82 Access VLAN : 82 Multicast VLAN: 84 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 881 Multicast Filtering System Management Multicast Filtering Information About Multicast Filtering In Cisco IOS XE Amsterdam, Release 17.2.1, the Multicast Filtering feature is supported on Layer 3 for IPv4. You can enable or disable the multicast filtering feature per WLAN from the controller. When you enable this feature, the APs drop the Internet Group Management Protocol (IGMP) join request from a client that is part of the WLAN, for any Layer 3 multicast group address. When you disable this feature, the APs honor the IGMP join request from the client that is part of the WLAN. In the Cisco IOS XE Amsterdam, Release 17.3.1, the Multicast Filtering feature is supported on Layer 3 for IPv6. You can enable or disable the Multicast Filtering feature per WLAN, from the controller. The following table shows the AP behaviour with IPv4 and IPv6: The Multicast Filtering feature is disabled by default. Table 64: Multicast Filtering per WLAN Multicast Filtering Feature Status IPv4 IPv6 Enabled AP drops the Internet Group Management Protocol (IGMP) membership report from a client that is a part of a WLAN. AP drops the Multicast Listener Discovery (MLD) report with multicast group address scope value greater than three, from a client that is a part of a WLAN. Disabled AP honors the IGMP membership AP honors the MLD report from report from the client that is a part the client that is a part of a WLAN. of a WLAN. Supported L3 Multicast Report for Filtering APs will not honour and drop IGMP and MLD join requests from a client part of WLAN for any L3 multicast group address as per the below filtering options: · IPv4: IGMP versions to be filtered: · V1 membership report (0x12) · V2 membership report (0x16) · V3 membership report (0x22) · IPv6: ICMPv6 types to be filtered, except link-local multicast packets: · Multicast Listener report: MLD Version 1 (131) · Multicast Listener report: MLD Version 2 (143) Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 882 System Management Configuring Multicast Filtering Note Filtering of supported types will prevent the creation or addition of a client entry to the AP multicast group table. Configuring Multicast Filtering Perform the procedure given here to create a policy profile and then enable Multicast Filtering on a WLAN: Before you begin Create a WLAN. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-policy Example: Configures a WLAN policy profile and enters wireless policy configuration mode. Device(config)# wireless profile policy rr-xyz-policy-1 Step 3 multicast filter Example: Configures a multicast filter. (Use the no form of this command to disable the feature.) Device(config-wireless-policy)#multicast filter What to do next 1. Create a policy tag. For more information about creating policy tags, see Configuring a Policy Tag (CLI). 2. Map the policy tag to an AP. For more information about mapping a policy tag to an AP, see Attaching a Policy Tag and Site Tag to an AP (CLI). Verifying Multicast Filtering To verify if multicast filtering is enabled, use the show wireless profile policy detailed named-policy-profile command: Device# show wireless profile policy detailed named-policy-profile Policy Profile Name : named-policy-profile Description : Status : DISABLED VLAN : 91 Multicast VLAN :0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 883 Verifying Multicast Filtering OSEN client VLAN Multicast Filter : : ENABLED System Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 884 8 0 C H A P T E R Map-Server Per-Site Support · Information About Map Server Per Site Support, on page 885 · Configuring the Default Map Server (GUI), on page 886 · Configuring the Default Map Server (CLI), on page 886 · Configuring a Map Server Per Site (GUI), on page 887 · Configuring a Map Server Per Site (CLI), on page 887 · Creating a Map Server for Each VNID (GUI), on page 888 · Creating a Map Server for Each VNID, on page 888 · Creating a Fabric Profile and Associating a Tag and VNID (GUI), on page 889 · Creating a Fabric Profile and Associating a Tag and VNID (CLI), on page 889 · Verifying the Map Server Configuration, on page 890 Information About Map Server Per Site Support The Map Server Per Site feature supports per-site map server and the selection of map server based on the client's subnet. This enables the controller to support multiple sites and to segregate each site's traffic. This feature is applicable to both Enterprise and Guest map servers. For the Layer 2 virtual extensible LAN network identifier-based (L2VNID-based) map server, the appropriate map server should be selected based on the L2 VNID. The following list shows the map server selection order for AP query and client registration: · Per-L3 VNID map server · Per site (ap-group) map server · Default or global map server Benefits Some of the benefits of using Map Server Per Site feature are listed below: · You can use a single large site with horizontal scaling of the map server and border nodes. · You can share the controller across multiple sites, with each site can having its own map server and virtual network or VNID and still segment traffic from each site. · You can share Guest map-server across multiple sites while keeping the Enterprise map-server separate. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 885 Configuring the Default Map Server (GUI) System Management · You can use the same SSID across different sites. Within a site, they can belong to a different virtual network domain. Configuring the Default Map Server (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Choose Configuration > Wireless > Fabric. On the Fabric page, click the Control Plane tab. In the Control Plane Name list, click default-control-plane. In the Edit Control Plane window that is displayed, click Add. Enter the IP address of the map server. Set the Password Type as either Unencrypted or AES. Enter the Pre Shared Key. Click Save. Click Update & Apply to Device. Configuring the Default Map Server (CLI) Follow the procedure given below to configure the default map server. Before you begin · The global map server is the default map server that is used for both AP query (when an AP joins) as well as for client registration (when a client joins). · We recommend that you configure map servers in pairs to ensure redundancy because s the LISP control-plane does not support redundancy inherently. · To share a map server set, create a map server group, which can be shared across site profiles, fabric profiles, Layer 2 and Layer3 VNID, as well with the default map server. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless fabric control-plane control-plane-name Purpose Enters global configuration mode. Configures the control plane name. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 886 System Management Configuring a Map Server Per Site (GUI) Step 3 Command or Action Example: Device(config)# wireless fabric control-plane test-map Purpose If you do not provide a control plane name, the default-control-plane that is auto generated is used. ip address ip-address key pre-shared-key Example: Configures IP address and the key for the control plane. Device((config-wireless-cp)#ip address 10.12.13.14 key secret Configuring a Map Server Per Site (GUI) Before you begin Ensure that you have configured an AP Join Profile prior to configuring the primary and backup controllers. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Tags & Profiles > AP Join. On the AP Join Profile page, click the AP Join Profile name. In the Edit AP Join Profile window, click the CAPWAP tab. In the High Availability tab under Backup Controller Configuration, check the Enable Fallback check box. Enter the primary and secondary controller names and IP addresses. Click Update & Apply to Device. Configuring a Map Server Per Site (CLI) Follow the procedure given below to configure per-site MAP server under site-tag. Before you begin You can configure map server for each site or each AP group. . If a map server is not configured for each VNID or subnet, per-site map server is used for AP queries and client registration. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 887 Creating a Map Server for Each VNID (GUI) System Management Step 2 Step 3 Command or Action wireless tag site site-tag Example: Device(config)# wireless tag site test-site fabric control-plane map-server-name Example: Device(config-wireless-site)# fabric control-plane test-map Purpose Configures a site tag and enters site tag configuration mode. Associates a fabric control plane name with a site tag. Creating a Map Server for Each VNID (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Click Configuration > Wireless Plus > Fabric > Fabric Configuration. In the Profiles tab, click Add to add a new Fabric Profile. In the Add New Profile window that is displayed, enter a name and description for the profile. Specify the L2 VNID and SGT Tag details. In the Map Servers section, specify the IP address and preshared key details for Server 1. Optionally, you can specify the IP address and preshared key details for Server 2. Click Save & Apply to Device. Creating a Map Server for Each VNID Follow the procedure given below to configure map server for each VNID in Layer 2 and Layer 3 or a map server for a client VNID. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 Choose one of the following: · wireless fabric name vnid-map l2-vnid l2-vnid l3-vnid l3vnid ip network-ip subnet-mask control-plane control-plane-name Configures a map server for each VNID in Layer 2 and Layer 3 or a map server for a client VNID. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 888 System Management Creating a Fabric Profile and Associating a Tag and VNID (GUI) Command or Action Purpose · wireless fabric name vnid-map l2-vnid l2-vnid control-plane control-plane-name Example: Device(config)# wireless fabric name test1 l2-vnid 12 l3-vnid 10 ip 10.8.6.2 255.255.255.236 control-plane cp1 Example: Device(config)# wireless fabric name test1 l2-vnid 22 control-plane cp1 Creating a Fabric Profile and Associating a Tag and VNID (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Click Configuration > Wireless > Fabric. In the Profiles tab on Fabric Configuration page, click Add to add a new profile. In the Add New Profile window that is displayed, enter a name and description for the profile. Specify the L2 VNID and SGT Tag details. Click Save & Apply to Device. Creating a Fabric Profile and Associating a Tag and VNID (CLI) Follow the procedure given below to create a fabric profile and associate the VNID to which the client belongs and the SGT tag to this profile. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile fabric fabric-profile-name Configures a fabric profile. Example: Device(config)# wireless profile fabric test-fabric Step 3 sgt-tag value Example: Configures an SGT tag. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 889 Verifying the Map Server Configuration System Management Step 4 Command or Action Purpose Device(config-wireless-fabric)# sgt-tag 5 client-l2-vnid vnid Example: Device(config-wireless-fabric)# client-l2-vnid 10 Configures a client Layer 2 VNID. Verifying the Map Server Configuration Use the following commands to verify the map server configuration: Device# show wireless fabric summary Fabric Status : Enabled Control-plane: Name IP-address Key Status -------------------------------------------------------------------------------------------- test-map 10.12.13.14 test1 Down Fabric VNID Mapping: Name L2-VNID L3-VNID IP Address Subnet Control plane name ---------------------------------------------------------------------------------------------------------------------- test1 test2 12 10 10.6.8.9 255.255.255.236 Device# show wireless fabric vnid mapping Fabric VNID Mapping: Name L2-VNID L3-VNID IP Address Subnet Control Plane Name -------------------------------------------------------------------------------------------------------------------- fabric1 1 0 9.6.51.0 255.255.255.0 map-server-name Device# show wireless profile fabric detailed profile-name Profile-name VNID SGT Type : fabric-ap :1 : 500 : Guest Control Plane Name Control-Plane IP Control-Plane Key -------------------------------------------------------------------------------- Ent-map-server 5.4.3.2 guest_1 Device# show ap name ap-name config general Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 890 System Management Verifying the Map Server Configuration Fabric status RLOC Control Plane Name : ent-map-server : Enabled : 2.2.2.2 Device# show wireless client mac mac-address detail Fabric status : Enabled RLOC : 2.2.2.2 Control Plane Name : ent-map-server Device# show wireless tag site detailed site-tag Site Tag Name : default-site-tag Description : default site tag ---------------------------------------- AP Profile : default-ap-profile Local-site : Yes Fabric-control-plane: Ent-map-server Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 891 Verifying the Map Server Configuration System Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 892 8 1 C H A P T E R Volume Metering · Volume Metering, on page 893 · Configuring Volume Metering, on page 893 Volume Metering The Volume Metering feature allows you to configure the interval at which an access point (AP) updates client accounting statistics to the controller and in turn to the RADIUS server. Currently, the report is sent from an AP to the controller every 90 seconds. With this feature, you can configure the time from 5 to 90 seconds. This helps reduce the delay in accounting data usage by a device. Configuring Volume Metering Follow the procedure given below to configure volume metering: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap profile profile-name Example: Configures an AP profile and enters ap profile configuration mode. Device(config)# ap profile yy-ap-profile Step 3 dot11 24ghz reporting-interval reporting-interval Configures the dot11 parameters. Example: Device(config-ap-profile)# dot11 24ghz reporting-interval 60 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 893 Configuring Volume Metering System Management Step 4 Step 5 Step 6 Step 7 Command or Action dot11 5ghz reporting-interval reporting-interval Example: Device(config-ap-profile)# dot11 5ghz reporting-interval 60 Purpose Configures the dot11 parameters. exit Example: Device(config-ap-profile)# exit Returns to global configuration mode. aaa accounting update periodic interval-in-minutes Example: Device(config)# aaa accounting update periodic 75 Sets the time interval (in minutes) at which the controller sends interim accounting updates of the client to the RADIUS server. exit Example: Device(config)# exit Exits configuration mode and returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 894 8 2 C H A P T E R Enabling Syslog Messages in Access Points and Controller for Syslog Server · Information About Enabling Syslog Messages in Access Points and Controller for Syslog Server, on page 895 · Configuring Syslog Server for an AP Profile, on page 897 · Configuring Syslog Server for the Controller (GUI), on page 898 · Configuring Syslog Server for the Controller , on page 899 · Information About Syslog Support for Client State Change, on page 900 · Configuring Syslog Support for Client State Change (CLI), on page 901 · Sample Syslogs, on page 901 · Verifying Syslog Server Configurations, on page 902 Information About Enabling Syslog Messages in Access Points and Controller for Syslog Server The Syslog server on access points and controller has many levels and facilities. The following are the Syslog levels: · Emergencies · Alerts · Critical · Errors · Warnings · Notifications · Informational · Debugging The following options are available for the Syslog facility: · auth--Authorization system. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 895 Information About Enabling Syslog Messages in Access Points and Controller for Syslog Server System Management · cron--Cron/ at facility. · daemon--System daemons. · kern--Kernel. · local0--Local use. · local1--Local use. · local2--Local use. · local3--Local use. · local4--Local use. · local5--Local use. · local6--Local use. · local7--Local use. · lpr--Line printer system. · mail--Mail system. · news--USENET news. · sys10--System use. · sys11--System use. · sys12--System use. · sys13--System use. · sys14--System use. · sys9--System use. · syslog--Syslog itself. · user--User process. · uucp--Unix-to-Unix copy system. Note For more information about the usage of the syslog facilities and levels, refer to RFC 5424 (The Syslog Protocol). Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 896 System Management Configuring Syslog Server for an AP Profile Configuring Syslog Server for an AP Profile Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap profile ap-profile Example: Configures an AP profile and enters the AP profile configuration mode. Device(config)# ap profile xyz-ap-profile Step 3 syslog facility Example: Device(config-ap-profile)# syslog facility Configures the facility parameter for Syslog messages. Step 4 syslog host ip-address Example: Configures the Syslog server IP address and parameters. Device(config-ap-profile)# syslog host 9.3.72.1 Step 5 syslog level {alerts | critical | debugging Configures the Syslog server logging level. | | emergencies notifications | | errors | informational warnings} The following are the Syslog server logging levels: Example: · emergencies--Signifies severity 0. Device(config-ap-profile)# syslog level Implies that the system is not usable. · alerts--Signifies severity 1. Implies that an immediate action is required. · critical--Signifies severity 2. Implies critical conditions. · errors--Signifies severity 3. Implies error conditions. · warnings--Signifies severity 4. Implies warning conditions. · notifications--Signifies severity 5. Implies normal but significant conditions. · informational--Signifies severity 6. Implies informational messages. · debugging--Signifies severity 7. Implies debugging messages. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 897 Configuring Syslog Server for the Controller (GUI) System Management Command or Action Step 6 end Example: Device(config-ap-profile)# end Purpose Note To know the number of Syslog levels supported, you need to select a Syslog level. Once a Syslog level is selected, all the levels below it are also enabled. If you enable critical Syslog level then all levels below it are also enabled. So, all three of them, namely, critical, alerts, and emergencies are enabled. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Syslog Server for the Controller (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Choose Troubleshooting > Logs. Click Manage Syslog Servers button. In Log Level Settings, from the Syslog drop-down list, choose a security level. From the Message Console drop-down list, choose a logging level. In Message Buffer Configuration, from the Level drop-down list, choose a server logging level. In Size (bytes), enter the buffer size. The value can range between 4096 to 2147483647. In IP Configuration settings, click Add. Choose the Server Type, from the IPv4 / IPv6 or FQDN option. For Server Type IPv4 / IPv6, enter the IPv4 / IPv6 Server Address. For Server Type FQDN, enter the Host Name, choose the IP type and the appropriate VRF Name from the drop-down lists. To delete a syslog server, click 'x' next to the appropriate server entry, under the Remove column. Note When creating a host name, spaces are not allowed. Click Apply to Device. Note When you click on Apply to Device, the changes are configured. If you click on Cancel, the configurations are discarded. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 898 System Management Configuring Syslog Server for the Controller Configuring Syslog Server for the Controller Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 logging host {hostname | ipv6} Example: Enables Syslog server IP address and parameters. Device(config)# logging host 124.3.52.62 Step 3 logging facility {auth | cron | daemon Enables facility parameter for the Syslog | kern | local0 | local1 | local2 | messages. local3 local7 | | local4 lpr | | local5 | local6 | mail | news | sys10 | You can enable the following facility parameter for the Syslog messages: sys11 | sys12 | sys13 | sys14 | sys9 | syslog | user | uucp} · auth--Authorization system. Example: · cron--Cron facility. Device(config)# logging facility syslog · daemon--System daemons. · kern--Kernel. · local0 to local7--Local use. · lpr--Line printer system. · mail--Mail system. · news--USENET news. · sys10 to sys14 and sys9--System use. · syslog--Syslog itself. · user--User process. · uucp--Unix-to-Unix copy system. Step 4 logging trap {severity-level | alerts | Enables Syslog server logging level. critical | debugging | emergencies | errors | informational | notifications | severity-level- Refers to the logging severity level. The valid range is from 0 to 7. warnings} Example: The following are the Syslog server logging levels: Device(config)# logging trap 2 · emergencies--Signifies severity 0. Implies that the system is not usable. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 899 Information About Syslog Support for Client State Change System Management Command or Action Step 5 end Example: Device(config)# end Purpose · alerts--Signifies severity 1. Implies that an immediate action is required. · critical--Signifies severity 2. Implies critical conditions. · errors--Signifies severity 3. Implies error conditions. · warnings--Signifies severity 4. Implies warning conditions. · notifications--Signifies severity 5. Implies normal but significant conditions. · informational--Signifies severity 6. Implies informational messages. · debugging--Signifies severity 7. Implies debugging messages. Note To know the number of Syslog levels supported, you need to select a Syslog level. Once a Syslog level is selected, all the levels below it are also enabled. If you enable critical Syslog level then all levels below it are also enabled. So, all three of them, namely, critical, alerts, and emergencies are enabled. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Information About Syslog Support for Client State Change When a client joins, dissociates, or rejoins a wireless network, the Syslog Support for Client State Change feature enables you to track client details such as IP addresses, AP names, and so on. A syslog is generated in the following scenarios: · When a client moves to RUN state. · When a client gets a new IP (IPv4 or IPv6) address in the RUN state. · When a client in RUN state is deleted. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 900 System Management Configuring Syslog Support for Client State Change (CLI) Note When Syslog Support for Client State Change feature is enabled, and the AP moves from standalone to connected, you may observe that usernames are null in syslog messages and in client detail for the 802.1X clients associated with that AP. You can ignore this behavior, as it does not have any operational impact. The usernames will get updated after 30 seconds. Configuring Syslog Support for Client State Change (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless client syslog-detailed Example: Device(config)# wireless client syslog-detailed Step 3 end Example: Device(config)# end Purpose Enters global configuration mode. Enables detailed syslogs for client events. Returns to privileged EXEC mode. Sample Syslogs 802.11x Authentication The following example shows a client IP update: Oct 1 14:41:27.785 IST: %CLIENT_ORCH_LOG-7-CLIENT_IP_UPDATED: Chassis 1 R0/0: wncd: Username (dev2), MAC: 0062.xxxx.0077, IP fe80::262:aff:xxxx:77 101.6.2.119 2001:300:8:0:362:aff:xxxx:77 2001:300:8:0:762:aff:xxxx:77 2001:300:8:0:562:aff:xxxx:77 2001:300:8:0:962:aff:xxxx:77 2001:300:8:0:462:aff:xxxx:77 IP address updated, associated to AP (Asim_06-11) with SSID (dev_abcd_wlan_1) The following example shows a client RUN state: Oct 1 14:41:27.779 IST: %CLIENT_ORCH_LOG-7-CLIENT_MOVED_TO_RUN_STATE: Chassis 1 R0/0: wncd: Username (dev2), MAC: 0062.xxxx.006a, IP 101.xxxx.2.106 associated to AP (Asim_06-10) with SSID (dev_abcd_wlan_1) Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 901 Verifying Syslog Server Configurations System Management Open Authentication The following example shows a client IP update: Sep 18 03:22:35.902: %CLIENT_ORCH_LOG-7-CLIENT_IP_UPDATED: Chassis 1 R0/0: wncd: Username (null), MAC: 6014.xxxx.c5fb, IP 9.9.xxxx.252 fe80::643c:87c1:xxxx:c1c4 IP address updated, associated to AP (AP2C5A.xxxx.159A) with SSID (test1) The following example shows a client RUN state: Sep 18 03:22:35.257: %CLIENT_ORCH_LOG-7-CLIENT_MOVED_TO_RUN_STATE: Chassis 1 R0/0: wncd: Username (null), MAC: 6014.xxxx.c5fb, IP 9.9.xxxx.252 associated to AP (AP2C5A.xxxx.159A) with SSID (test1) The following example shows a client delete state: Sep 18 03:24:45.083: %CLIENT_ORCH_LOG-7-CLIENT_MOVED_TO_DELETE_STATE: Chassis 1 R0/0: wncd: Username (null), MAC: 6014.xxxx.c5fb, IP fe80::643c:xxxx:e316:c1c4 2001:300:42:0:643c:87c1:xxxx:c1c4 2001:300:42:0:xxxx:82ce:1ae4:5a32 9.9.xxxx.252 disconnected from AP (AP2C5A.xxxx.159A) with SSID (test1) Verifying Syslog Server Configurations Verifying Global Syslog Server Settings for all Access Points To view the global Syslog server settings for all access points that joins the controller, use the following command: Device# show ap config general Cisco AP Name : APA0F8.4984.5E48 ================================================= Cisco AP Identifier : a0f8.4985.d360 Country Code : IN Regulatory Domain Allowed by Country : 802.11bg:-A 802.11a:-DN AP Country Code : IN - India AP Regulatory Domain Slot 0 : -A Slot 1 : -D MAC Address : a0f8.4984.5e48 IP Address Configuration : DHCP IP Address : 9.4.172.111 IP Netmask : 255.255.255.0 Gateway IP Address : 9.4.172.1 Fallback IP Address Being Used : Domain : Name Server : CAPWAP Path MTU : 1485 Telnet State : Disabled SSH State : Disabled Jumbo MTU Status : Disabled Cisco AP Location : default location Site Tag Name : ST1 RF Tag Name : default-rf-tag Policy Tag Name : PT3 AP join Profile : default-ap-profile Primary Cisco Controller Name : WLC2 Primary Cisco Controller IP Address : 9.4.172.31 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 902 System Management Verifying Syslog Server Configurations Secondary Cisco Controller Name : Not Configured Secondary Cisco Controller IP Address : 0.0.0.0 Tertiary Cisco Controller Name : Not Configured Tertiary Cisco Controller IP Address : 0.0.0.0 Administrative State : Enabled Operation State : Registered AP Certificate type : Manufacturer Installed Certificate AP Mode : Local AP VLAN tagging state : Disabled AP VLAN tag : 0 CAPWAP Preferred mode : Not Configured AP Submode : Not Configured Office Extend Mode : Disabled Remote AP Debug : Disabled Logging Trap Severity Level : notification Software Version : 16.10.1.24 Boot Version : 1.1.2.4 Mini IOS Version : 0.0.0.0 Stats Reporting Period : 180 LED State : Enabled PoE Pre-Standard Switch : Disabled PoE Power Injector MAC Address : Disabled Power Type/Mode : PoE/Full Power (normal mode) Number of Slots : 3 AP Model : AIR-AP1852I-D-K9 IOS Version : 16.10.1.24 Reset Button : Disabled AP Serial Number : KWC212904UB Management Frame Protection Validation : Disabled AP User Mode : Automatic AP User Name : Not Configured AP 802.1X User Mode : Global AP 802.1X User Name : Not Configured Cisco AP System Logging Host : 9.4.172.116 AP Up Time : 11 days 1 hour 15 minutes 52 seconds AP CAPWAP Up Time : 6 days 3 hours 11 minutes 6 seconds Join Date and Time : 09/05/2018 04:18:52 Join Taken Time : 3 minutes 1 second Join Priority : 1 Ethernet Port Duplex : Auto Ethernet Port Speed : Auto AP Link Latency : Disable AP Lag Configuration Status : Disabled AP Lag Operational Status : Disabled Lag Support for AP : Yes Rogue Detection : Enabled Rogue Containment auto-rate : Disabled Rogue Containment of standalone flexconnect APs : Disabled Rogue Detection Report Interval : 10 Rogue AP minimum RSSI : -90 Rogue AP minimum transient time : 0 AP TCP MSS Adjust : Enabled AP TCP MSS Size : 1250 AP IPv6 TCP MSS Adjust : Enabled AP IPv6 TCP MSS Size : 1250 Hyperlocation Admin Status : Disabled Retransmit count : 5 Retransmit interval : 3 Fabric status : Disabled FIPS status : Disabled WLANCC status : Disabled USB Module Type : USB Module USB Module State : Enabled USB Operational State : Disabled Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 903 Verifying Syslog Server Configurations System Management USB Override : Disabled Lawful-Interception Admin status : Disabled Lawful-Interception Oper status : Disabled Verifying Syslog Server Settings for a Specific Access Point To view the Syslog server settings for a specific access point, use the following command: Device# show ap name <ap-name> config general show ap name APA0F8.4984.5E48 config general Cisco AP Name : APA0F8.4984.5E48 ================================================= Cisco AP Identifier : a0f8.4985.d360 Country Code : IN Regulatory Domain Allowed by Country : 802.11bg:-A 802.11a:-DN AP Country Code : IN - India AP Regulatory Domain Slot 0 : -A Slot 1 : -D MAC Address : a0f8.4984.5e48 IP Address Configuration : DHCP IP Address : 9.4.172.111 IP Netmask : 255.255.255.0 Gateway IP Address : 9.4.172.1 Fallback IP Address Being Used : Domain : Name Server : CAPWAP Path MTU : 1485 Telnet State : Disabled SSH State : Disabled Jumbo MTU Status : Disabled Cisco AP Location : default location Site Tag Name : ST1 RF Tag Name : default-rf-tag Policy Tag Name : PT3 AP join Profile : default-ap-profile Primary Cisco Controller Name : WLC2 Primary Cisco Controller IP Address : 9.4.172.31 Secondary Cisco Controller Name : Not Configured Secondary Cisco Controller IP Address : 0.0.0.0 Tertiary Cisco Controller Name : Not Configured Tertiary Cisco Controller IP Address : 0.0.0.0 Administrative State : Enabled Operation State : Registered AP Certificate type : Manufacturer Installed Certificate AP Mode : Local AP VLAN tagging state : Disabled AP VLAN tag : 0 CAPWAP Preferred mode : Not Configured AP Submode : Not Configured Office Extend Mode : Disabled Remote AP Debug : Disabled Logging Trap Severity Level : notification Software Version : 16.10.1.24 Boot Version : 1.1.2.4 Mini IOS Version : 0.0.0.0 Stats Reporting Period : 180 LED State : Enabled PoE Pre-Standard Switch : Disabled PoE Power Injector MAC Address : Disabled Power Type/Mode : PoE/Full Power (normal mode) Number of Slots : 3 AP Model : AIR-AP1852I-D-K9 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 904 System Management Verifying Syslog Server Configurations IOS Version : 16.10.1.24 Reset Button : Disabled AP Serial Number : KWC212904UB Management Frame Protection Validation : Disabled AP User Mode : Automatic AP User Name : Not Configured AP 802.1X User Mode : Global AP 802.1X User Name : Not Configured Cisco AP System Logging Host : 9.4.172.116 AP Up Time : 11 days 1 hour 15 minutes 52 seconds AP CAPWAP Up Time : 6 days 3 hours 11 minutes 6 seconds Join Date and Time : 09/05/2018 04:18:52 Join Taken Time : 3 minutes 1 second Join Priority : 1 Ethernet Port Duplex : Auto Ethernet Port Speed : Auto AP Link Latency : Disable AP Lag Configuration Status : Disabled AP Lag Operational Status : Disabled Lag Support for AP : Yes Rogue Detection : Enabled Rogue Containment auto-rate : Disabled Rogue Containment of standalone flexconnect APs : Disabled Rogue Detection Report Interval : 10 Rogue AP minimum RSSI : -90 Rogue AP minimum transient time : 0 AP TCP MSS Adjust : Enabled AP TCP MSS Size : 1250 AP IPv6 TCP MSS Adjust : Enabled AP IPv6 TCP MSS Size : 1250 Hyperlocation Admin Status : Disabled Retransmit count : 5 Retransmit interval : 3 Fabric status : Disabled FIPS status : Disabled WLANCC status : Disabled USB Module Type : USB Module USB Module State : Enabled USB Operational State : Disabled USB Override : Disabled Lawful-Interception Admin status : Disabled Lawful-Interception Oper status : Disabled Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 905 Verifying Syslog Server Configurations System Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 906 8 3 C H A P T E R Login Banner · Information About Login Banner, on page 907 · Configuring a Login Banner (GUI), on page 907 · Configuring a Login Banner, on page 908 Information About Login Banner Login banner is used to display a warning or message when you try to login to the controller. To create a login banner, you must configure a delimiting character that notifies the system that the following text string must be displayed as the banner, and then the text string itself. The delimiting character is repeated at the end of the text string to signify the end of the banner. The delimiting character can be any single character in the extended ASCII character set, but once defined as the delimiter, that character cannot be used in the text string for the banner. Note When HTTP authentication is configured using TACACS+/RADIUS, the banner message does not display on the Web UI. Configuring a Login Banner (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Security > Web Auth. Click the Web Auth Parameter Map. In the General tab, click the Banner Text radio button under Banner Type. Enter the Banner Text, Maximum HTTPS connections and Init-State Timeout (secs). Choose the type from the Type drop-down list. Enter the Virtual IPv4 Address, Virtual IPv4 Hostname and Virtual IPv6 Hostname, Watch List Expiry Timeout (secs), Sleeping Client Timeout (minutes) and choose the trustpoint from the Trustpoint drop-down list. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 907 Configuring a Login Banner System Management Step 7 Step 8 Check or uncheck the Turn-on Consent with Email, Web Auth intercept HTTPS, Watch List Enable, Captive Bypass Portal,Disable Success Window, Disable Logout Window and Sleeping Client Status check boxes. Click Update & Apply . Configuring a Login Banner Procedure Step 1 Command or Action enable Example: Device# enable Step 2 configure terminal Example: Device# configure terminal Step 3 banner login c message c Example: Device(config)# banner login $ Access for authorized users only. Please enter your username and password. $ Step 4 Step 5 Step 6 end Example: Device(config)# end show running-config Example: Device# show running-config copy running-config startup-config Example: Device# copy running-config startup-config Purpose Enables privileged EXEC mode. Enter your password if prompted. Enters global configuration mode. Specifies the login message. · c-- Enters the delimiting character of your choice, for example, a pound sign (#), and press the Return key. The delimiting character signifies the beginning and end of the banner text. Characters after the ending delimiter are discarded. · message-- Enters a login message up to 255 characters. You cannot use the delimiting character in the message. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Verifies your entries. (Optional) Saves your entries in the configuration file. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 908 8 4 C H A P T E R Wi-Fi Alliance Agile Multiband · Introduction to Wi-Fi Alliance Agile Multiband, on page 909 · Limitations of MBO, on page 911 · Configuring MBO on a WLAN, on page 911 · Verifying MBO Configuration, on page 912 Introduction to Wi-Fi Alliance Agile Multiband The Wi-Fi Alliance Agile Multiband (MBO) feature enables better use of Wi-Fi network resources. This feature is built on the fundamental premise that both Wi-Fi networks and client devices have information that can enable better roaming decisions and improve the overall performance of Wi-Fi networks and user experience. Note This feature applies to MBO certified clients only. This feature certifies the interoperability of a bundle of features that are defined by the IEEE standard amendments 802.11k, 802.11v, and 802.11u, as well as the Wi-Fi-Alliance defined specifications. These technologies are used to exchange access points (AP), band, and channel preferences, link quality, and status information between AP and client device. MBO focuses on the following: · Interactions between the wireless clients and APs · Exchange of AP and client knowledge about the wireless medium (such as RF neighbors) · Allow clients to work with APs and take intelligent decisions on the connection and improve the quality of service. Wi-Fi Alliance Agile Multiband Topology Multiple components form a Wi-Fi Agile Multiband wireless infrastructure network, which may vary based on the wireless network deployment. The following figure depicts the system topology for connecting Wi-Fi Agile Multiband devices. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 909 Introduction to Wi-Fi Alliance Agile Multiband Figure 22: Wi-Fi Agile Multiband Wireless Infrastructure Network System Management The following components form a Wi-Fi Agile Multiband wireless infrastructure network: · Access Point (AP): A Wi-Fi Agile Multiband wireless infrastructure network contains one or more Wi-Fi Agile Multiband APs. · WLAN Controller: A Wi-Fi Agile Multiband wireless infrastructure network contains zero or more WLAN controllers that provide centralized management and other features to the interconnected APs. · Client Station (STA): A Wi-Fi Agile Multiband wireless infrastructure network contains zero or more STAs. These client STAs are single WLAN capable only. · RADIUS Server: A Wi-Fi Agile Multiband wireless infrastructure network contains zero or more RADIUS Servers that provide Authentication, Authorization, and Accounting (AAA) services. Supported MBO Components MBO AP Capability A new information element is added to the Beacon, Probe Response, Association Response and Re Association Response Frames for 802.11ax APs to inform clients about MBO support. Note The new information element indicates that Cisco APs are not cellular data aware. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 910 System Management Limitations of MBO When an SSID is configured on an AP, the MBO AP capability is enabled. 802.11k/v/r Support One of the prerequisites for MBO is that APs need to support 802.11k/v/r standard-based technologies. Each of the technologies has their own requirements, such as: · 802.11k For 802.11k, send the preferred list of AP neighbors to the client upon request and send a beacon request to a client when AP requires a beacon report from the client. · 802.11v For 802.11v, steer the client to a less congested AP (not in a MBO client's non-prefer/non-operable channel list that is sent during the association request and/or WNM notification request) using BSS transition. · 802.11r The 802.11r MBO-related capabilities are not supported. 802.11u ANQP or GAS Support For MBO, the 802.11ax APs must have 802.11u ANQP or GAS support. The following are the prerequisites: · ANQP responds to the ANQP request for a neighbor report ANQP-element. · Before authentication, Layer 2 transport needs to be available in the network between a mobile device and server for an advertisement protocol frame. MBO Beacon Request Whenever an AP sends a beacon request to the client, the MBO-compliant client responds with a beacon report. MBO Associate Disallowed IE Cisco APs include an Associate Disallowed IE in their Beacon/Probe response/(Re) association response when they cannot accommodate any new client. Limitations of MBO All non-802.11ax access points are not supported. Configuring MBO on a WLAN Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wlan wlan-name wlan-id ssid Example: Purpose Enters global configuration mode. Configures a WLAN and enters the WLAN configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 911 Verifying MBO Configuration System Management Command or Action Device(config)# wlan wlan-demo 1 ssid-demo Step 3 Step 4 mbo Example: Device(config-wlan)# mbo end Example: Device(config-wlan)# end Purpose Note If you use WPA2 WLAN while configuring MBO for WLAN, you need to enable PMF in your configuration. Configures MBO support on WLAN. Note Use the no mbo command to disable MBO configuration. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Verifying MBO Configuration To view the MBO configuration, use the following command: Device# show wlan id 1 WLAN Profile Name : wlan-demo ================================================ Identifier :1 Description : Network Name (SSID) : ssid-demo Status : Disabled Broadcast SSID : Enabled 802.11ax paramters OFDMA Downlink : Enabled OFDMA Uplink : Enabled MU-MIMO Downlink : Enabled MU-MIMO Uplink : Enabled BSS Color : Enabled Partial BSS Color : Enabled BSS Color Code :0 BSS Target Wake Up Time : Enabled BSS Target Wake Up Time Broadcast Support : Enabled mDNS Gateway Status : Bridge WIFI Alliance Agile Multiband : Enabled To view the non-operational or non-preferred channels, use the following command: Device# show wireless client mac-address 3413.e8b5.f252 detail Client MAC Address : 3413.e8b5.f252 Client IPv4 Address : 192.165.1.53 Client IPv6 Addresses : fe80::98bb:ea89:f016:3332 Client Username: N/A AP MAC Address : 00ee.ab18.d920 AP Name: ssap-pp AP slot : 1 Client State : Associated Policy Profile : prof Flex Profile : N/A Wireless LAN Id: 1 WLAN Profile Name: mbo_1 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 912 System Management Wireless LAN Network Name (SSID): mbo_1 BSSID : 00ee.ab18.d92f Connected For : 25 seconds Protocol : 802.11ax - 5 GHz Channel : 36 Client IIF-ID : 0xa0000001 Association Id : 1 Authentication Algorithm : Open System Session Timeout : 1800 sec (Remaining time: 1779 sec) Session Warning Time : Timer not running Input Policy Name : None Input Policy State : None Input Policy Source : None Output Policy Name : None Output Policy State : None Output Policy Source : None WMM Support : Enabled U-APSD Support : Enabled U-APSD value : 0 APSD ACs : BK, BE, VI, VO Fastlane Support : Disabled Client Active State : Active Power Save : OFF Current Rate : 1.5 Supported Rates : 9.0,18.0,36.0,48.0,54.0 Mobility: Move Count :0 Mobility Role : Local Mobility Roam Type : None Mobility Complete Timestamp : 05/15/2019 16:03:34 IST Client Join Time: Join Time Of Client : 05/15/2019 16:03:34 IST Policy Manager State: Run Last Policy Manager State : IP Learn Complete Client Entry Create Time : 26 seconds Policy Type : N/A Encryption Cipher : None User Personal Network : Disabled Encrypted Traffic Analytics : No Protected Management Frame - 802.11w : No EAP Type : Not Applicable VLAN : default Multicast VLAN : 0 WFD capable : No Managed WFD capable : No Cross Connection capable : No Support Concurrent Operation : No Session Manager: Point of Attachment : capwap_90400001 IIF ID : 0x90400001 Authorized : TRUE Session timeout : 1800 Common Session ID: 000000000000000BB92939C5 Acct Session ID : 0x00000000 Last Tried Aaa Server Details: Server IP : Auth Method Status List Method : None Local Policies: Service Template : wlan_svc_prof_local (priority 254) VLAN : 165 Absolute-Timer : 1800 Server Policies: Resultant Policies: Verifying MBO Configuration Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 913 Verifying MBO Configuration VLAN Name : VLAN0165 VLAN : 165 Absolute-Timer : 1800 DNS Snooped IPv4 Addresses : None DNS Snooped IPv6 Addresses : None Client Capabilities CF Pollable : Not implemented CF Poll Request : Not implemented Short Preamble : Not implemented PBCC : Not implemented Channel Agility : Not implemented Listen Interval : 0 Fast BSS Transition Details : Reassociation Timeout : 0 11v BSS Transition : Implemented 11v DMS Capable : No QoS Map Capable : Yes Non-Preferred Channels : 40 Non-Operable Channels : 56 FlexConnect Data Switching : N/A FlexConnect Dhcp Status : N/A FlexConnect Authentication : N/A FlexConnect Central Association : N/A Client Statistics: Number of Bytes Received : 0 Number of Bytes Sent : 0 Number of Packets Received : 0 Number of Packets Sent : 0 Number of Policy Errors : 0 Radio Signal Strength Indicator : -34 dBm Signal to Noise Ratio : 56 dB Fabric status : Disabled Client Scan Reports Assisted Roaming Neighbor List Nearby AP Statistics: EoGRE : No/Simple client System Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 914 8 5 C H A P T E R SNMP Traps · Information About Configuring SNMP Traps, on page 915 · Configuring SNMP Traps (GUI), on page 916 · Enabling Access Points Traps (CLI), on page 916 · Enabling Wireless Client Traps (CLI), on page 917 · Enabling Mesh Traps (CLI), on page 917 · Enabling RF Traps (CLI), on page 918 · Enabling Rogue, Mobility, RRM, and General Traps (CLI), on page 918 · Verifying SNMP Wireless Traps, on page 919 Information About Configuring SNMP Traps Simple Network Management Protocol (SNMP) Traps are alert messages sent from a remote SNMP-enabled device such as the controller, to an SNMP manager. Traps are unreliable because the receiver does not send acknowledgments when the device receives traps. Hence, the sender cannot determine if the traps were received. In order to configure the controller to send SNMP notifications, you must enter at least one snmp-server host command. If you do not enter an snmp-server host command, no notifications are sent. In order to enable multiple hosts, you must specify separate snmp-server host command for each host. You can specify multiple notification types in the command for each host. When multiple snmp-server host commands are given for the same host and notification of either trap or inform, each command overwrites the previous command. Only the last snmp-server host command is taken into account. For example, if you enter an snmp-server host inform command for a host and then enter another snmp-server host inform command for the same host, the second command replaces the first. Specify the snmp-server enable traps wireless <TrapName> command in order to specify which SNMP notifications are sent globally. In order for a host to receive wireless notifications, at least one snmp-server enable traps wireless <TrapName> command and the snmp-server host command for that host must be enabled. However, some notification types cannot be controlled with the snmp-server enable command. And some notification types are enabled by default . For example, few AP related traps crash, register, and noradiocards are enabled by default. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 915 Configuring SNMP Traps (GUI) System Management Configuring SNMP Traps (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Administration > Management > SNMP. The SNMP page is displayed. By default, the SNMP mode is disabled. To enable or disable SMNP, click the SNMP Mode toggle button. Choose the Wireless Traps tab. By default, all SNMP wireless traps are disabled except the Access Point trap. To enable all the wireless traps, click Enable All. Select the wireless SNMP trap that you wish to enable. Click the Select All check box to enable all the trapflags present in the trap. For example, to enable all the trapflags in the Mesh trap section, check the Select All check box present at the right-hand corner of the section. Uncheck the Select All check box to remove selection. Note In the Access Point trap, Crash, No Radio Cards, and Register trapflags are enabled by default. Select Broken Antenna trapflag to detect broken antenna. Select AP Stats trapflag to enable a trap for AP statistics. Click Apply. Enabling Access Points Traps (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 snmp-server enable traps wireless AP Enables wireless SNMP traps for access points. Example: Device# snmp-server enable traps wireless AP Step 3 trapflags ap{authorization | broken-antenna | crash | interfaceup | ipaddrfallback | mfp | mode | noradiocards | register} Enables or disables sending AP related trapflags. The crash, noradiocards, and register trapflags are enabled by default. Example: Device# trapflags ap authorization Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 916 System Management Enabling Wireless Client Traps (CLI) Enabling Wireless Client Traps (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 snmp-server enable traps wireless bsnMobileStation Enables wireless client traps. Example: Device# snmp-server enable traps wireless bsnMobileStation Step 3 trapflags client dot11 {assocfail | associate Enables or disables dot11 related trapflags for | authenticate | authfail | deauthenticate clients. | disassociate } Example: Device# trapflags client dot11 assocfail Step 4 trapflags client excluded Example: Device# trapflags client excluded Enables the excluded trapflags for clients. Enabling Mesh Traps (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 snmp-server enable traps wireless MESH Enables wireless mesh traps. Example: Device# snmp-server enable traps wireless MESH Step 3 trapflags mesh {abate-snr | Enables or disables mesh trapflags. authentication-failure | child-moved | Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 917 Enabling RF Traps (CLI) System Management Command or Action Purpose excessive-children | excessive-hopcount | onset-snr | parent-change } Example: Device# trapflags mesh abate-snr Enabling RF Traps (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 snmp-server enable traps wireless bsnAutoRF Enables wireless RF related traps. Example: Device# snmp-server enable traps wireless bsnAutoRF Step 3 trapflags rrm-params{channels | tx-power} Example: Device# trapflags rrm-params channels Enables or disables sending RRM parameter update related traps. Step 4 trapflags rrm-profile{coverage | interference | load | noise} Enables or disables RRM profile related traps. Example: Device# trapflags rrm-profile coverage Enabling Rogue, Mobility, RRM, and General Traps (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 918 System Management Verifying SNMP Wireless Traps Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action Purpose snmp-server enable traps wireless rogue Enables traps for wireless rogue. Example: Device# snmp-server enable traps wireless rogue trapflags rogue-ap Example: Device# trapflags rogue-ap Enables rogue AP detection trapflag. trapflags rogue-client Example: Device# trapflags rogue-client Enables rogue client detection trapflag. snmp-server enable traps wireless wireless_mobility Enables traps for wireless mobility. Example: Device# snmp-server enable traps wireless wireless_mobility trapflags anchor Example: Device# trapflags anchor Enables anchor trapflags. snmp-server enable traps wireless RRM Enables traps for wireless RRM. Example: Device# snmp-server enable traps wireless RRM trapflags rrm-params group Example: Device# trapflags rrm-params group Enables or disables the RRM parameter related traps, when the RF manager group changes. snmp-server enable traps wireless bsnGeneral Enables general controller traps. Example: Device# snmp-server enable traps wireless bsnGeneral Verifying SNMP Wireless Traps To verify the various SNMP traps enabled, use the following command: Device# show run | sec trapflag trapflags ap crash trapflags ap noradiocards Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 919 Verifying SNMP Wireless Traps trapflags ap register trapflags rogue-client System Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 920 8 6 C H A P T E R Disabling Clients with Random MAC Address · Information About Disabling Clients with Random MAC Addresses, on page 921 · Configuring Random MAC Address Deny (CLI), on page 921 · Verifying Denial of Clients with a Random MAC Address, on page 922 Information About Disabling Clients with Random MAC Addresses Wireless clients used to associate with a wireless network using the MAC address that is assigned, for the Wi-Fi network interface card (NIC), during manufacture. This globally unique MAC address assigned by the manufacturer is also known as burn-in address (BIA). BIA tracks end users with the help of the MAC address of the Wi-Fi. To improve the privacy of end user products, a locally enabled random MAC address is enabled for Wi-Fi operations. Prior to Cisco IOS XE Bengaluru 17.5.1 Release, clients joining a wireless network using a random MAC address could not be tracked with ease. From Cisco IOS XE Bengaluru 17.5.1 Release onwards, the controller is equipped with a knob that denies the entry of clients with a random MAC address into the network. When the local-admin-mac deny knob is enabled on the controller, the association of a client joining the network with a random MAC address is rejected. By default, this feature is disabled on the controller. This feature is not supported in Cisco Wave 1 access points. Configuring Random MAC Address Deny (CLI) To stop the entry of clients with a random MAC addresses from joining a wireless network, enable the random MAC address deny knob, by following the steps given below. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 921 Verifying Denial of Clients with a Random MAC Address System Management Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action Purpose wlan wlan-profile-name <1-4096> SSID-network-name Configures the WLAN policy profile. Example: Device(config)# wlan wlan-profile-name 8 ssid-network-name shutdown Example: Device(config-wlan)# shutdown Shuts down the WLAN. [no] local-admin-mac deny Enables the random MAC address deny knob. Example: Use the no form of this command to disable the Device(config-wlan)# local-admin-mac deny feature. no shutdown Example: Device(config-wlan)# no shutdown Enables the WLAN. end Example: Device(config-wlan)# end Saves the configuration, exits the configuration mode, and returns to privileged EXEC mode. Verifying Denial of Clients with a Random MAC Address To verify the denial of a client with a random MAC address, run the show wlan name wlan-profile-name | begin locally command: Device# show wlan name laa | begin locally Locally Administerd Address Configuration Deny LAA clients : Enabled To verify if a client address is a random MAC address, run the show wireless client mac-address MAC-address detail command: Device# show wireless client mac-address 72xx.38xx.2axx detail Client MAC Address : 72xx.38xx.2axx Client MAC Type : Locally Administered Address Client IPv4 Address : 9.1.1.1 Client IPv6 Addresses : fexx::71xx:27xx:a7xx:efxx Client Username : 72xx.38xx.2axx To verify how many random MAC clients are present in the system, run the show wireless stats client detail command: Device# show wireless stats client detail Client Summary ----------------------------Current Clients : 1 Excluded Clients: 0 Disabled Clients: 0 Foreign Clients : 0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 922 System Management Verifying Denial of Clients with a Random MAC Address Anchor Clients : 0 Local Clients : 1 Idle Clients : 0 Locally Administered MAC Clients: 1 To display the statistics of a specific client, run the show wlan id <1-4096> client stats command: Device# show wlan id 8 client stats Wlan Profile Name: wlan-profile, Wlan Id: 8 Current client state statistics: ----------------------------------------------------------------------------- Authenticating :0 Mobility :0 IP Learn :0 Webauth Pending :0 Run :1 Locally Administered MAC Clients :1 Note Run the show configuration wlan wlan-name command on an AP, to view the status of the locally administered address (LAA) on the WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 923 Verifying Denial of Clients with a Random MAC Address System Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 924 8 7 C H A P T E R Dataplane Packet Logging · Information About Dataplane Packet Logging, on page 925 · Enabling or Disabling Debug Level (CLI), on page 926 · Enabling Packet Logging in Global and Filtered Buffer in Ingress Path (CLI), on page 926 · Enabling Packet Logging in Global and Filtered Buffer in Punt-Inject Path (CLI), on page 927 · Verifying Dataplane Packet Logging, on page 928 · Clearing Logs and Conditions in Global and Filtered Trace Buffers, on page 929 Information About Dataplane Packet Logging While onboarding wireless clients, you might encounter problems arising from client IP address allocation, Address Resolution Protocol (ARP) resolution, and so on, which require debugging. For rapid debugging of such issues on the controller, the Dynamic Host Configuration Protocol (DHCP), Neighbor Discovery, and ARP packets that go to and from the wireless clients are unconditionally logged. Packet-logging serviceability captures connectivity information related to wireless clients. Serviceability is divided into the following categories: · Global Trace Log: Global trace logging is a mechanism to capture client connectivity information, and is enabled by default. · Filtered Trace Log: To start packet logging on a filtered trace buffer, you must enable filters using debug commands. Filters capture only the specific packet type or the packets based on the MAC address of the clients. The following are the features of packet logging: · In addition to DHCP, Neighbor Discovery, and ARP packets, you can also add or remove other packet capture filters. · Display filters are set to pick a subset of logged packets. · Packet-logging data provides information such as the client MAC address, client IP address, VLAN, interface, packet type and time delta, that is required for debugging. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 925 Enabling or Disabling Debug Level (CLI) System Management Enabling or Disabling Debug Level (CLI) To enable or disable debug information for global and filtered logic, follow these steps. Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. Step 2 [no] debug platform hardware chassis active Enables the debug level information for global qfp feature wireless datapath trace-buffer and filtered logic. debug-level {all | warning} | error | info | trace Use the no form of this command to disable the feature. Example: Device# debug platform hardware chassis active qfp feature wireless datapath trace-buffer debug-level all Enabling Packet Logging in Global and Filtered Buffer in Ingress Path (CLI) To enable packet logging in global and filtered buffer in the ingress path, follow these steps. Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. Step 2 [no] debug platform hardware chassis active Enables the Quantum Flow Processor on global qfp feature wireless datapath trace-buffer trace buffer in the ingress path. ingress global-trace Use the no form of this command to disable the Example: feature. Device# [no] debug platform hardware chassis active qfp feature wireless datapath trace-buffer ingress global-trace Step 3 [no] debug platform hardware chassis active Enables the condition for CAPWAP to log qfp feature wireless datapath trace-buffer packet information to the filtered trace buffer. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 926 System Management Enabling Packet Logging in Global and Filtered Buffer in Punt-Inject Path (CLI) Step 4 Command or Action Purpose ingress filtered-trace capwap {ipv4 A.B.C.D Use the no form of this command to disable the | ipv6 X:X:X:X::X | keepalive} feature. Example: Device# [no] debug platform hardware chassis active qfp feature wireless datapath trace-buffer ingress filtered-trace capwap ipv4 209.165.200.224/27 [no] debug platform hardware chassis active Enables the condition to log packet information qfp feature wireless datapath trace-buffer of the wireless client to the filtered trace buffer. ingress filtered-trace wlclient {ipv6-nd | ipv6-ra | mac-address H.H.H} Use the no form of this command to disable the feature. Example: Device# [no] debug platform hardware chassis active qfp feature wireless datapath trace-buffer ingress filtered-trace wlclient 1pv6-nd Enabling Packet Logging in Global and Filtered Buffer in Punt-Inject Path (CLI) To enable packet logging in global and filtered trace buffer in the punt-inject path, follow these steps. Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. Step 2 [no] debug platform hardware chassis active Enables the Quantum Flow Processor in global qfp feature wireless datapath trace-buffer trace buffer in the punt-inject path. punt-inject global-trace Use the no form of this command to disable the Example: feature. Device# [no] debug platform hardware chassis active qfp feature wireless datapath trace-buffer punt-inject global-trace Step 3 [no] debug platform hardware chassis active Enables the condition for CAPWAP to log qfp feature wireless datapath trace-buffer packet information to the filtered trace buffer punt-inject filtered-trace capwap {ipv4 in the punt-inject path. A.B.C.D | ipv6 X:X:X:X::X | keepalive} Use the no form of this command to disable the Example: feature. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 927 Verifying Dataplane Packet Logging System Management Step 4 Command or Action Device# [no] debug platform hardware chassis active qfp feature wireless datapath trace-buffer punt-inject filtered-trace capwap ipv4 209.165.200.224/27 Purpose [no] debug platform hardware chassis active Enables the condition to log packet information qfp feature wireless datapath trace-buffer of the wireless client to the filtered trace buffer, punt-inject filtered-trace wlclient {ipv6-nd in the punt-inject path. | ipv6-ra | mac-address H.H.H} Use the no form of this command to disable the Example: feature. Device# [no] debug platform hardware chassis active qfp feature wireless datapath trace-buffer punt-inject filtered-trace wlclient 1pv6-nd Verifying Dataplane Packet Logging To show trace buffer-configured conditions, use the following command: Device# show platform hardware chassis active qfp feature wireless trace-buffer ingress conditions LogTrace Event: Enabled Trace wlclient-MACs: 8c85.90ee.ca92 allow_all_AP_kalives: enabled AP_kalive cnt=1, AP_kalive6 cnt=0 IP0: 49.1.0.73 To view all the log entries in the filtered trace buffer, use the following command: Device# show platform hardware chassis active qfp feature wireless trace-buffer ingress filtered-trace all Trace wlclient-MACs: 8c85.90ee.ca92 Trace-Buffer for Ingress: Enabled Total allocated global-log buffer: 16384 Total allocated filtered-log v=buffers: 4096 <0 KEEP_ALIVE: CAPWAP peer=49.1.0.73 udp=5256 local=49.1.1.2 udp=5247 vlan=49, dt=213207 c=0 <1 KEEP_ALIVE: CAPWAP peer=49.1.0.73 udp=5256 local=49.1.1.2 udp=5247 vlan=49, dt=213236 c=0 <2 KEEP_ALIVE: CAPWAP peer=49.1.0.73 udp=5256 local=49.1.1.2 udp=5247 vlan=49, dt=213264 c=0 <3 KEEP_ALIVE: CAPWAP peer=49.1.0.73 udp=5256 local=49.1.1.2 udp=5247 vlan=49, dt=213293 c=0 <4 KEEP_ALIVE: CAPWAP peer=49.1.0.73 udp=5256 local=49.1.1.2 udp=5247 vlan=49, dt=213321 c=0 <5 KEEP_ALIVE: CAPWAP peer=49.1.0.73 udp=5256 local=49.1.1.2 udp=5247 vlan=49, dt=213350 c=0 To view the number of entries based on a count, use the following command: Device# show platform hardware chassis active qfp feature wireless trace-buffer ingress filtered-trace 3 Trace wlclient-MACs: 8c85.90ee.ca92 Trace-Buffer for Ingress: Enabled Total allocated global-log buffer: 16384 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 928 System Management Clearing Logs and Conditions in Global and Filtered Trace Buffers Total allocated filtered-log v=buffers: 4096 <18 KEEP_ALIVE: CAPWAP peer=49.1.0.73 udp=5256 local=49.1.1.2 udp=5247 vlan=49, dt=213720 c=0 <19 KEEP_ALIVE: CAPWAP peer=49.1.0.73 udp=5256 local=49.1.1.2 udp=5247 vlan=49, dt=213748 c=0 <20 KEEP_ALIVE: CAPWAP peer=49.1.0.73 udp=5256 local=49.1.1.2 udp=5247 vlan=49, dt=213777 c=0 >> 3 entries displayed 21 entries found in filtered-log buffer 21 entries ever collected for filtered-log buffer Clearing Logs and Conditions in Global and Filtered Trace Buffers To clear conditions and logs in the global and filtered trace buffers, use the following commands: Device# clear platform hardware chassis active qfp feature wireless trace-buffer ingress all Trace, clear all trace configuration & buffer. Device# clear platform hardware chassis active qfp feature wireless trace-buffer ingress conditions Trace, clear trace configuration Device# clear platform hardware chassis active qfp feature wireless trace-buffer ingress filtered-trace Trace, clear trace Q Device# clear platform hardware chassis active qfp feature wireless trace-buffer ingress global-trace Trace, clear trace global Q Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 929 Clearing Logs and Conditions in Global and Filtered Trace Buffers System Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 930 8 8 C H A P T E R Streaming Telemetry · Information About Streaming Telemetry , on page 931 · Gather Points, on page 931 · Subscription, on page 932 · Transport , on page 932 · Scale Considerations , on page 933 · Session, on page 933 · Configuring Telemetry on a Cisco Catalyst 9800 Series Wireless Controller, on page 934 · Verifying the Status of a Telemetery Subscription on a Cisco Catalyst 9800 Series Wireless Controller, on page 936 · Managing Configured Subscriptions on a Cisco Catalyst 9800 Series Wireless Controller , on page 937 · On-Change Telemetry Support , on page 938 · Supported XPaths for On-Change Subscription, on page 938 · Cisco DNA Center Client Event and SSID Telemetry Filter, on page 941 Information About Streaming Telemetry Streaming telemetry is a new paradigm in monitoring the health of a network. It provides a mechanism to efficiently stream configuration and operational data of interest from the Cisco Catalyst 9800 Series Wireless Controller. This streamed data is transmitted in a structured format to remote management stations for monitoring and troubleshooting purposes. This topic explains how to enable the telemetry support the Wi-Fi and system health-related data. Not that telemetry support can be enhanced up to a scale of 1000 access points (APs) and 15000 clients. A single collector setup can be used to subscribe to the requested XPaths. A telemetry feed can be used to subscribe to data elements to monitor APs and clients effectively. Data is provided through the native Cisco wireless models. Gather Points Gather points are the top-level XPaths and act as the smallest unit of data exported by a target. Any subscription to an XPath raises to the level of the Gather point, and the target sends updates comprising of all the leaves defined under this Gather point. For example, when you subscribe to an XPath /access-point-operdata/radio-oper-data/vap-oper-config/ssid, which is part of the Gather point Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 931 Subscription System Management /access-point-operdata/radio-oper-data/vap-oper-config, the reply will comprise of all the attributes that are a part of the Gather point, in this case, AP-VAP-ID, SSID, and WLAN ID. The following lists the supported Gather points for an XPaths. Table 65: Supported Gather Points and Subscription Intervals Supported Gather Point Subscription Interval (seconds) /access-point-oper-data/radio-oper-data/vap-oper-config >= 30 /access-point-oper-data/radio-oper-data/radio-band-info >= 30 /access-point-oper-data/radio-oper-data/phy-ht-cfg/cfg-data >= 30 /access-point-oper-data/radio-oper-data >= 30 /access-point-oper-data/radio-oper-stats >=30 /access-point-oper-data/ssid-counters >=180 /access-point-oper-data/ap-radio-neighbor >=180 /access-point-oper-data/capwap-data >=30 /access-point-oper-data/oper-data >=30 /client-oper-data/traffic-stats >=30 /client-oper-data/sisf-db-mac >=30 /client-oper-data/dot11-oper-data >=30 /client-oper-data/common-oper-data >=30 /rrm-oper-data/rrm-measurement/load >=30 Subscription A subscription binds one or more Gather points and destinations. A Multicast Default (MDT) streams data for each Gather point at the configured frequency (cadence-based streaming). Transport The protocol that is used for the connection between a publisher and a receiver is known as the transport protocol, and this decides how data are transmitted. This protocol is independent of the management protocol for configured subscriptions. The supported transport protocols are gNMI and gRPC. The gNMI transport protocol supports JSON encoding of data, while gRPC supports Key-value Google Protocol Buffers (kvGPB) encoding. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 932 System Management Scale Considerations Scale Considerations The following table provides the scale numbers that are applicable to the native model for an XPath set. Table 66: Scaling Considerations to the Native Model Attribute AP Client SSID Per AP BSSID per AP Neighbors per AP Number of Physical Neighbor APs Number of Neighbor Records Scale 1000 15000 6 12 60 (30x2) 12 60000 records Session You can choose to initiate the subscription by establishing a telemetry session between the controller and the receiver. A telemetry session can be initiated using: · gNMI Dial-In Mode · gRPC Dial-Out Mode gNMI Dial-In-Mode In a dial-in mode, a Model-Driven Telemetry (MDT) receiver dials in to the controller, and subscribes dynamically to one or more Gather points or subscriptions. The controller acts as the server, and the receiver as the client. The controller streams telemetry data through the same session. The dial-in mode of subscriptions is dynamic, which gets terminated when the receiver cancels the subscription or when the session is terminated. gRPC- Dial-Out-Mode In a dial-out mode, the controller dials out to the receiver. Here the controller acts as a client and receiver acts as a server. In this mode, Gather points and destinations are configured and bound together into one or more subscriptions. The controller continually attempts to establish a session with each destination in the subscription, and streams data to the receiver. The dial-out mode of subscriptions is persistent. Figure 23: Telemetry Session The following figure explains the telemetry session: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 933 Configuring Telemetry on a Cisco Catalyst 9800 Series Wireless Controller System Management Configuring Telemetry on a Cisco Catalyst 9800 Series Wireless Controller To configure telemetry on a Cisco Catalyst 9800 Series Wireless Controller, perform the following: 1. Enable gNXI in an Insecure Mode 2. Enable gNXI in a Secure Mode 3. Verify the Status of the Subscription 4. Manage Configured Subscriptions Enabling gNXI in Insecure Mode (CLI) Procedure Step 1 Command or Action enable Example: Device# enable Step 2 configure terminal Example: Device# configure terminal Step 3 gnxi Example: Device(config)# gnxi Step 4 gnxi server Example: Device(config)# gnxi server Purpose Enables privileged EXEC mode Enter your password, if prompted. Enters global configuration mode. Starts the gNXI process. Enables the gNXI server in insecure mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 934 System Management Enabling gNXI in Secure Mode (CLI) Step 5 Step 6 Step 7 Command or Action gnxi port port-number Example: Device(config)# gnxi 50000 end Example: Device(config)# end show gnxi state Example: Device# show gnxi state Purpose Sets the gNXI port. The default insecure gNXI port is 9339. Returns to privileged EXEC mode. Displays the status of gNXI server. Example The following is a sample output of the show gnxi state command: Device# show gnxi state State Status -------------------------------Enabled Up Enabling gNXI in Secure Mode (CLI) Procedure Step 1 Command or Action enable Example: Device# enable Step 2 configure terminal Example: Device# configure terminal Step 3 gnxi Example: Device(config)# gnxi Step 4 gnxi secure-server Example: Device(config)# gnxi secure-server Step 5 gnxi secure-trustpoint trustpoint-name Example: Purpose Enables privileged EXEC mode Enter your password, if prompted. Enters global configuration mode. Starts the gNXI process. Enables the gNXI server in secure mode. Specifies the trustpoint and certificate set that gNXI uses for authentication. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 935 Verifying the Status of a Telemetery Subscription on a Cisco Catalyst 9800 Series Wireless Controller System Management Step 6 Step 7 Step 8 Step 9 Command or Action Purpose Device(config)# gnxi secure-trustpoint gnxi secure-client-auth Example: (Optional) The gNXI process authenticates the client certificate against the root certificate. Device(config)# gnxi secure-client-auth gnxi secure-port Example: Device(config)# gnxi secure-port (Optional) Sets the gNXI port. · The default insecure gNXI port is 9339. end Example: Device(config)# end Returns to privileged EXEC mode. show gnxi state Example: Device# show gnxi state Displays the gNXI servers status. Example The following is sample output from the show gnxi state command: Device# show gnxi state State Status -------------------------------Enabled Up Verifying the Status of a Telemetery Subscription on a Cisco Catalyst 9800 Series Wireless Controller To verify the status of a subscription, use the following command: Device# show telemetry ietf subscription all Device# show telemetry ietf subscription 101 Device# show telemetry ietf subscription 101 detail Device# show telemetry ietf subscription 101 receiver Device# show telemetry internal connection Device#show telemetry internal subscription all stats Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 936 System Management Managing Configured Subscriptions on a Cisco Catalyst 9800 Series Wireless Controller Managing Configured Subscriptions on a Cisco Catalyst 9800 Series Wireless Controller Use the show platform software ndbman switch {switch-number | active| standby} models command to display the list of YANG models that support on-change subscription. Note Currently, you can only use the gRPC protocol for managing configured subscriptions. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Command or Action enable Example: Device# enable Purpose Enables privileged EXEC mode Enter your password, if prompted. configure terminal Example: Device# configure terminal Enters global configuration mode. telemetry ietf subscription id Example: Device(config)# telemetry ietf subscription 112 Creates a telemetry subscription and enters telemetry-subscription mode. encoding encode-kvgpb Example: Device(config-mdt-subs)# encoding encode-kvgpb Specifies the Key-value Google Protocol Buffers (kvGPB) encoding. filter xpath path Specifies the XPath filter for the subscription. Example: Device(config-mdt-subs)# filter xpath /wireless-access-point-oper:access-point-oper-data/capwap-data Step 6 Step 7 source-address{ A.B.C.D | X:X:X:X::X } Example: Configures the source IP address on the telemetry subscription interface. Device(config-mdt-subs)# source-address ip-address 10.1.1.1 | 2000:1:1:11::11 stream yang-push path Example: Configures a stream for the subscription. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 937 On-Change Telemetry Support System Management Step 8 Step 9 Step 10 Command or Action Device(config-mdt-subs)# stream yang-push Purpose update-policy {on-change | periodic} period Configures a periodic update policy for the Example: subscription. Device(config-mdt-subs)# update-policy periodic 3000 receiver ip address ip-address receiver-port Configures a periodic update policy for the protocol protocol profile name subscription. Example: Device(config-mdt-subs)# receiver ip address 9.1.0.3 57557 protocol grpc-tcp end Example: Device(config-mdt-subs)# end Exits telemetry-subscription configuration mode and returns to privileged EXEC mode. On-Change Telemetry Support From Cisco IOS XE Cupertino 17.7.1 onwards, on-change telemetry support is provided to a subset of XPaths. Supported XPaths for On-Change Subscription The following table lists the supported XPaths for on-change subscription. Table 67: Supported Gather Points and XPaths Gather Points /access-point-oper-data/radio-operdata/ /access-point-oper-data/capwap-data XPaths /access-point-oper-data/radio-operdata/ phy-ht-cfg/cfg-data/curr-freq /access-point-oper-data/radio-operdata/ phy-ht-cfg/cfg-data/chan-width /access-point-oper-data/radio-oper-data/current-band-id /access-point-oper-data/capwap-data/name /access-point-oper-data/capwapdata/ device-detail/wtp-version/sw-ver/version Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 938 System Management Supported XPaths for On-Change Subscription Gather Points /access-point-oper-data/oper-data XPaths /access-point-oper-data/capwapdata/device-detail/wtp-version/sw-ver/release /access-point-oper-data/capwapdata/ device-detail/wtp-version/sw-ver/maint /access-point-oper-data/capwapdata/ device-detail/wtp-version/sw-ver/build /access-point-oper-data/capwap-data/ap-state/apoperation-state /access-point-oper-data/capwapdata/ device-detail/static-info/board-data/wtp-serial-num /access-point-oper-data/oper-data/ap-ip-data/ap-ip-addr /access-point-oper-dat/oper-data/ap-pow/power-type The following table lists the XPaths that are introduced in Cisco-IOS-XE-wireless-mesh-rpc.yang model to support the mesh-related EXEC commands: Table 68: Supported EXEC CLIs and XPaths EXEC CLI XPath ap name <ap-name> [no] mesh ethernet [0|1|2|3] /set-rad-mesh-ethernet-trunk-allowed-vlan mode trunk vlan allowed <vlan-id> ap name <ap-name> [no] mesh ethernet [0|1|2|3] /set-rad-mesh-ethernet-trunk-native-vlan mode trunk vlan native ap name <ap-name> mesh linktest <dst AP MAC> /exec-linktest-ap <data rate> <packets/sec> <packet size> <duration> ap name <ap-name> [no] mesh ethernet [0|1|2|3] /set-rad-mesh-ethernet-access-vlan mode access <vlan-id> ap name <ap-name> [no] mesh block-child /set-rad-mesh-block-child ap name <ap-name> [no] mesh vlan-trunking /set-rad-mesh-trunking ap name <ap-name> [no] mesh daisy-chaining strict-rap /set-rad-mesh-daisy-chain-strict-rap ap name <ap-name> [no] mesh daisy-chaining /set-rad-mesh-daisy-chain-mode ap name <ap-name> [no] mesh parent preferred /set-rad-mesh-preferred-parent-ap Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 939 Supported XPaths for On-Change Subscription System Management EXEC CLI XPath ap name <ap-name> mesh backhaul rate dot11ac mcs /set-rad-mesh-bhaul-tx-rate <mcs-index> ss <1-4> ap name <ap-name> mesh backhaul radio dot11 5ghz /set-rad-mesh-bhaul-radio [slot <slot-id>] ap name <ap-name> mesh security psk provisioning /set-rad-mesh-security-psk-provisioning-delete delete ap name <ap-name> mesh vlan-trunking native <vlan-id> /set-rad-mesh-trunking-vlan The following table lists the XPaths that are introduced in Cisco-IOS-XE-wireless-ap-global-oper-transform.yang model that is displayed through telemetry feed. Table 69: Supported Gather Points and XPaths Gather Points /ap-global-oper-data/ap-join-stats/wtp-mac XPaths /ap-global-oper-data/ap-join-stats/ap-join-info/ap-ethernet-mac /ap-global-oper-data/ap-join-stats/ap-join-info/ap-name /ap-global-oper-data/ap-join-stats/ap-join-info/ap-ip-addr /ap-global-oper-data/ap-join-stats/ap-join-info/is-joined /ap-global-oper-data/ap-join-stats/ap-join-info/last-error-type /ap-global-oper-data/ap-join-stats/ap-disconnect-reason The following are the Xpaths that are introduced in the Cisco-IOS-XE-wireless-mesh-rpc.yang model that exposes the mesh action definitions corresponding to the EXEC CLIs. · /set-rad-mesh-ethernet-trunk-allowed-vlan · /set-rad-mesh-ethernet-trunk-native-vlan · /exec-linktest-ap · /set-rad-mesh-ethernet-access-vlan · /set-rad-mesh-block-child · /set-rad-mesh-trunking · /set-rad-mesh-daisy-chain-strict-rap · /set-rad-mesh-daisy-chain-mode · /set-rad-mesh-preferred-parent-ap · /set-rad-mesh-bhaul-tx-rate · /set-rad-mesh-bhaul-radio Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 940 System Management Cisco DNA Center Client Event and SSID Telemetry Filter · /set-rad-mesh-security-psk-provisioning-delete · /set-rad-mesh-trunking-vlan Cisco DNA Center Client Event and SSID Telemetry Filter Feature History for Cisco DNA Center Client Event and SSID Telemetry Filter This table provides release and related information for the feature explained in this module. This feature is also available in all the releases subsequent to the one in which they are introduced in, unless noted otherwise. Table 70: Feature History for Cisco DNA Center Client Event and SSID Telemetry Filter Release Cisco IOS XE Dublin 17.10.1 Feature Feature Information Cisco DNA Center Client Event This feature filters out telemetry data for a and SSID Telemetry Filter configured SSID on the controller and AP. Information About Cisco DNA Center Client Event and SSID Telemetry Filter Locations such as airports, shopping malls, and so on have wireless guest networks with thousands of transient guest clients. The transient guest clients mix the telemetry data and its subsequent health scores with clients that require assurance (for instance, in a corporate WLAN). This poses a scaling challenge as Cisco DNA Center tries to keep up with the receiving high-frequency telemetry data and maintaining history of the transient clients. This feature addresses the requirement by filtering out the telemetry data for a configured SSID on the controller and AP. Figure 24: High-Level End-to-End System Flow for Cisco DNA Center Client Event and SSID Telemetry Filter Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 941 Restrictions for Cisco DNA Center Client Event and SSID Telemetry Filter System Management Cisco DNA Center configures the Complex Event Processing (CEP) transform with the SSID for which the telemetry data needs to be filtered out along with the subscriptions. The Publishing Daemon (PubD) module in the controller filters out the data based on the configured transform. Note The Cisco DNA Center automation takes care of pushing the transforms. You must enable or disable filtering for a specific SSID in the controller GUI. To debug the filtering done at PubD, run the following commands in the controller: Device# set platform software trace mdt-pubd chassis active r0 pubd debug set platform software trace mdt-pubd chassis active r0 mdt-xfrm debug Cisco DNA Center configures WLAN for which iCAP data needs to be filtered in an AP profile. The controller then pushes the configuration to the corresponding APs. The AP then programs the aptrace module to drop the packets and events for the filtered SSID. The filtered data covers the following: · Client events · Client statistics · AP or RF statistics · Partial PCAP · Anomaly detection Restrictions for Cisco DNA Center Client Event and SSID Telemetry Filter · CLI configuration is applicable for WLAN and not SSID. The Cisco DNA Center automation covers one-to-one mapping of WLAN to SSID. · Controller does not send any notification to Cisco DNA Center at the beginning or at the end of filtering. · Controller GUI configuration is not supported. Supported Workflow for Cisco DNA Center Client Event and SSID Telemetry Filter · Creating WLANs. · Mapping WLAN to a Policy Profile. · Creating a filter for WLAN in AP Join Profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 942 System Management Enabling iCAP Filtering in APs (CLI) Enabling iCAP Filtering in APs (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap profile ap-profile Example: Configures an AP profile and enters AP profile configuration mode. Device(config)# ap profile xyz-ap-profile Step 3 description ap-profile-name Adds a description for the AP profile. Example: Device(config-ap-profile)# description "xyz ap profile" Step 4 icap subscription client exclude telemetry-data wlan wlan-profile-name Example: Device(config-ap-profile)# icap subscription client exclude telemetry-data wlan wlan-name Enables iCAP filtering in APs. Disabling Client Telemetry Data for a WLAN (YANG) To disable the client telemetry data for a WLAN, use the following RPC model: <nc:rpc xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="urn:uuid:0a77124f-c563-469d-bd21-cc625a9691cc"> <nc:edit-config> <nc:target> <nc:running/> </nc:target> <nc:config> <site-cfg-data xmlns="http://cisco.com/ns/yang/Cisco-IOS-XE-wireless-site-cfg"> <ap-cfg-profiles> <ap-cfg-profile> <profile-name nc:operation="merge">default-ap-profile</profile-name> <icap-client-exclude-cfgs> <icap-cient-exclude-cfg nc:operation="merge"> <wlan-profile nc:operation="merge">tel</wlan-profile> </icap-client-exclude-cfg> </cap-client-exclude-cfgs> </ap-cfg-profile> </ap-cfg-profiles> </site-cfg-data> </nc:config> </nc:edit-config> </nc:rpc> Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 943 Verifying Client Telemetry Data for a WLAN System Management For more information on YANG models, see the Cisco IOS XE Programmability Configuration Guide and YANG Data Models on Github at https://github.com/YangModels/yang/tree/master/vendor/cisco/xe. You can contact the Developer Support Community for NETCONF/YANG features using the following link: https://developer.cisco.com/ Verifying Client Telemetry Data for a WLAN To verify the client telemetry data for a WLAN, use the following command: Device# show running-config | section profile ap profile default-ap-profile capwap retransmit count 8 capwap timers primary-discovery-timeout 3000 country IN description "default ap profile" icap subscription client exclude telemetry-data wlan guest Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 944 8 9 C H A P T E R Application Performance Monitoring · Feature History for Application Performance Monitoring, on page 945 · Information About Application Performance Monitoring, on page 945 · Restrictions for Application Performance Monitoring, on page 946 · Workflow, on page 946 · Verify Application Performance Monitoring, on page 950 Feature History for Application Performance Monitoring This table provides release and related information for the feature explained in this module. This feature is also available in all the releases subsequent to the one in which they are introduced in, unless noted otherwise. Table 71: Feature History for Application Performance Monitoring Release Feature Feature Information Cisco IOS XE Dublin 17.10.1 Application Performance Monitoring This feature collects and exports assurance-related metrics (per application) of the flows forwarded through AP to the Cisco DNA Centre Assurance application. Information About Application Performance Monitoring Application Performance Monitoring feature collects and exports assurance-related metrics (per application) of the flows that are forwarded through specific interfaces of the access point to the Cisco DNA Center Assurance application. This feature supports two monitors--a general assurance monitor that computes quantitative metrics for TCP and UDP flows and qualitative metrics for TCP flows and a media monitor that computes qualitative and quantitative metrics for real-time protocol (RTP) flows. Voice applications such as Microsoft Teams and Session Initiation Protocol (SIP) use RTP monitors, while other applications use TCP and UDP monitor. A flow monitor can be attached to: · A interface that monitors all the flows from the attachment point. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 945 Restrictions for Application Performance Monitoring System Management · A wireless profile policy (the wireless profile policy that is associated with a WLAN or SSID) that monitors all the traffic passing through it. Assurance performance monitoring is supported on the following platforms: · Cisco Catalyst 9800 Series Controllers (9800-80, 9800-40, 9800-L, and 9800-CL) · Cisco Catalyst 9100 Series APs (FlexConnect and fabric mode) · Cisco Catalyst 9300 Series and 9400 Series switches (fabric mode) Restrictions for Application Performance Monitoring · Local flow exporter is not supported. · The following commands are not supported: · show avc wlan application top · show avc client top application · You cannot configure Application Performance Monitoring and Application Visibility and Control basic on a single policy profile. You can configure them only on two separate policy profiles. · During CAPWAP restart, AP moves to standby mode, and the nitro engine is disabled. When CAPWAP is up and the nitro engine is enabled, an attempt is made to classify the flows. Since there is not enough information to classify the applications, they are marked as unknown. When the AP rejoins CAPWAP, client traffic gets marked or classified correctly. · When a client roams while an application has an active-session, the specific session traffic is marked as unknown. The client has to start a new session to mark or classify the traffic correctly. Workflow Create a Flow Monitor Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 flow monitor monitor-name Example: Device(config)# flow monitor avc_assurance Purpose Enters global configuration mode. Creates a flow monitor. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 946 System Management Create a Wireless WLAN Profile Policy Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action Purpose description description Adds a description to the flow monitor. Example: Device(config-flow-monitor)# description assurance monitor ID is 90 record wireless avc {ipv4|ipv6}assurance Example: Device(config-flow-monitor)# record wireless avc ipv4 assurance Specifies the IPv4 assurance metrics for wireless. exit Example: Device(config-flow-monitor)# exit Returns to global configuration mode. flow monitor monitor-name Example: Device(config)# flow monitor avc_assurance_rtp Creates a flow monitor. description description Adds a description to the flow monitor. Example: Device(config-flow-monitor)# description assurance-rtp monitor ID is 94 record wireless avc {ipv4|ipv6}assurance-rtp Example: Device(config-flow-monitor)# record wireless avc ipv4 assurance-rtp Specifies the IPv4 assurance RTP metrics for wireless. end Example: Device(config-flow-monitor)# end Returns to privileged EXEC mode. Create a Wireless WLAN Profile Policy Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 947 Create a Wireless WLAN Profile Policy System Management Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action Purpose wireless profile policy policy-name Example: Configures the WLAN policy profile and enters wireless policy configuration mode. Device(config)# wireless profile policy AVC_POL shutdown Disables the policy profile. Example: Device(config-wireless-policy)# shutdown no central switching Example: Device(config-wireless-policy)# no central switching Disables central switching. ipv4 flow monitor monitor-name input Example: Device(config-wireless-policy)# ipv4 flow monitor avc_assurance input Specifies the name of the IPv4 ingress flow monitor. ipv4 flow monitor monitor-name input Example: Device(config-wireless-policy)# ipv4 flow monitor avc_assurance_rtp input Specifies the name of the IPv4 ingress flow monitor. ipv4 flow monitor monitor-name output Example: Device(config-wireless-policy)# ipv4 flow monitor avc_assurance output Specifies the name of the IPv4 egress flow monitor. ipv4 flow monitor monitor-name output Example: Specifies the name of the IPv4 egress flow monitor. Device(config-wireless-policy)# ipv4 flow monitor avc_assurance_rtp output no shutdown Example: Device(config-wireless-policy)# no shutdown end Example: Device(config-wireless-policy)# end Enables the policy profile. Returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 948 System Management Create a Policy Tag Create a Policy Tag Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless tag policy policy-tag-name Example: Configures a policy tag and enters policy tag configuration mode. Device(config-policy-tag)# wireless tag policy mywlan_ssid Step 3 wlan wlan-avc policy policy Example: Device(config-policy-tag)# wlan mywlan_ssid policy AVC_POL Attaches the policy tag to a WLAN. Step 4 end Example: Device(config-policy-tag)# end Returns to privileged EXEC mode. Attach the Policy Profile to an AP Procedure Step 1 Command or Action ap ap-ether-mac Example: Device(config)# ap 9412.1212.1201 Step 2 policy-tag policy-tag Example: Device(config-ap-tag)# policy-tag mywlan_ssid Step 3 end Example: Device(config-ap-tag)# end Purpose Enters AP configuration mode. Specifies the policy tag that is to be attached to the AP. Returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 949 Verify Application Performance Monitoring System Management Verify Application Performance Monitoring Use the following commands to verify application performance monitoring configuration. To check application performance monitoring statistics, use the following commands: Device# show flow exporter statistics Flow Exporter apm_exp: Packet send statistics (last cleared 4w1d ago): Successfully sent: 2082 (216624 bytes) !Packet sent count sent from controller to Cisco DNAC Reason not given: 1099 (114296 bytes) Client send statistics: Client: Flow Monitor avc Records added: 0 Bytes added: 0 Device# show flow monitor assurance cache Cache type: Normal (Platform cache) Cache size: 200000 Current entries: 0 High Watermark: 1 !Controller flow monitor cache statistics Flows added: 6 Flows aged: 6 - Active timeout ( 10 secs) 6 To check status of application performance monitoring, use the following command Device# show avc status VAP FNF-STATUS AVC-QOS-STATUS SD AVC-STATUS APM-STATUS !APM-STATUS contains IPv4, IPv6 assurance and assurance-rtp monitors. 0 Disabled 1 Disabled 2 Disabled 3 Disabled 4 Disabled 5 Disabled 6 Disabled 7 Disabled 8 Disabled 9 Disabled 10 Disabled 11 Disabled 12 Disabled 13 Disabled 14 Disabled 15 Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Enabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled IPV4,IPV4-RTP,IPV6,IPV6-RTP Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Disabled Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 950 9 0 C H A P T E R Wireless Clients ThresholdWarning · Information About Wireless Clients Threshold Warning, on page 951 · Configuring a Warning Period, on page 951 · Configuring Client Threshold, on page 952 Information About Wireless Clients Threshold Warning Cisco IOS XE Bengaluru 17.6.x introduces the Wireless Clients Threshold Warning feature, which allows you to configure a warning message when the number of simultaneous wireless clients on the controller breaches a set threshold. By default, the threshold is set to 75 percent of the total capacity. For example, Cisco Catalyst 9800-80 Wireless Controller supports up to 64,000 clients, and the threshold is set at 48,000 client. When the threshold is breached, the controller sends notifications to the corresponding user using syslog messages, SNMP traps, and NETCONF/Yang notifications. The Wireless Clients Threshold Warning feature allows you to take note of the impending wireless client limit and act on it before reaching the maximum limit, or modify the number of wireless clients allowed on a controller, as required. The Wireless Clients Threshold Warning feature is enabled by default. To disable the feature, use the no wireless max-warning command. Configuring a Warning Period Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless max-warning period interval-in-mins Configures the periodicity of the wireless client Example: check. Valid values range from 1 to 60 minutes. Device(config)# wireless max-warning period 20 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 951 Configuring Client Threshold System Management Step 3 Command or Action end Example: Device(config)# end Purpose Returns to privileged EXEC mode. Configuring Client Threshold Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless max-warning threshold clients threshold_percentage Example: Device(config)# wireless max-warning threshold clients 90 Step 3 end Example: Device(config)# end Purpose Enters global configuration mode. Configures the warning threshold percentage for the maximum number of wireless clients. Valid values range from 50 to 100 percent. Returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 952 9 1 C H A P T E R Intelligent Capture Hardening · Feature History for Cisco Intelligent Capture Hardening, on page 953 · Information About Cisco Intelligent Capture Hardening, on page 953 · Configuring Anomaly Detection in AP Profile (CLI), on page 954 · Configuring Anomaly Detection in an Access Point (CLI), on page 955 · Verifying Anomaly Detection and RF Statistics, on page 956 Feature History for Cisco Intelligent Capture Hardening This table provides release and related information about the feature explained in this section. This feature is also available in all the releases subsequent to the one in which they are introduced in, unless noted otherwise. Table 72: Feature History for Cisco Intelligent Capture Hardening Release Cisco IOS XE Dublin 17.12.1 Feature Cisco Intelligent Capture (iCAP) Hardening Feature Information The following enhancements are made to the iCAP feature: · Anomaly Detection · RF Statistics Information About Cisco Intelligent Capture Hardening The Cisco Intelligent Capture (iCAP) feature aims at making troubleshooting for wireless clients and APs easier. When there are onboarding issues for wireless clients or AP transmission issues, network operators can find out the cause by using the Cisco DNA Center GUI. The Cisco DNA Center gathers data from the wireless controller and APs, and displays an aggregated view. The following enhancements are made to the iCAP feature: · Anomaly Detection · RF Statistics Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 953 Anomaly Detection System Management Anomaly Detection Anomaly Detection is the capability of Cisco APs to detect possible anomalies in the lifecycle of wireless clients and APs. This functionality is crucial as it allows you to determine if there is an issue in the network, to identify what happened, and avoid the same problem in the future. APs send individual anomalies to Cisco DNA Center every time an anomaly is detected. To prevent Cisco DNA Center from getting bombarded with anomaly events of the same type and from the same client, enhancements are made to collapse repeated events, and multiple events are aggregated for the same client if the events occur within a certain time frame. Anomaly-detection configurations are enhanced on the controller to provision and display the iCAP status. RF Statistics The Cisco DNA Center receives RF statistics of connected APs. Until Cisco IOS XE Dublin 17.11.1, the data received was basic statistical information. However, from Cisco IOS XE Dublin 17.12.1 onwards, per AP statistical information is directly sent from the wireless controller through iCAP subscription to specific APs. Configuring Anomaly Detection in AP Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# onfigure terminal Purpose Enters global configuration mode. Step 2 ap profile ap-profile Example: Device(config)# ap profile ap-profile Configures an AP profile and enters AP profile configuration mode. Step 3 icap subscription client anomaly-detection Enables individual reports for client report-individual enable anomaly-detection subscription. Example: Device(config-ap-profile)# icap subscription client anomaly-detection report-individual enable Step 4 icap subscription client anomaly-detection report-individual enable aggregate Example: Device(config-ap-profile)# icap subscription client anomaly-detection report-individual enable aggregate Enables individual reports aggregation for client anomaly-detection subscription. This command is disabled by default. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 954 System Management Configuring Anomaly Detection in an Access Point (CLI) Step 5 Step 6 Command or Action Purpose icap subscription client anomaly-detection report-individual per-client throttle number-of-event-reports Example: Configures event reports per client, every five minutes. The value of an event report ranges from 0 to 50 reports. The default value is five reports. Device(config-ap-profile)# icap subscription client anomaly-detection report-individual per-client throttle 20 icap subscription client anomaly-detection report-individual per-type throttle number-of-event-reports Example: Configures event reports per type, every five minutes. The value of an event report ranges from 0 to 100 reports. The default value is five reports. Device(config-ap-profile)# icap subscription client anomaly-detection report-individual per-type throttle 50 Configuring Anomaly Detection in an Access Point (CLI) Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enters privileged EXEC mode. Step 2 ap name ap-name icap subscription client Enables individual reports for client anomaly-detection report-individual enable anomaly-detection subscription for a single AP. Example: Device# ap name ap1 icap subscription client anomaly-detection report-individual enable Step 3 ap name ap-name icap subscription client Enables individual reports aggregation for client anomaly-detection report-individual enable anomaly-detection subscription, for a single aggregate AP. Example: Device# ap name ap1 icap subscription client anomaly-detection report-individual enable Step 4 ap name ap-name icap subscription client anomaly-detection report-individual per-client throttle number-of-event-reports Example: Configures event reports per client, every five minutes, for a single AP. The value of an event report ranges from 0 to 50 reports. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 955 Verifying Anomaly Detection and RF Statistics System Management Step 5 Command or Action Purpose Device# ap name ap1 icap subscription client anomaly-detection report-individual per-client throttle 20 ap name ap-name icap subscription client Configures event reports per type, every five anomaly-detection report-individual per-type minutes, for a single AP. The value of an event throttle number-of-event-reports report ranges from 0 to 100 reports. Example: Device# ap name ap1 icap subscription client anomaly-detection report-individual per-type throttle 50 Verifying Anomaly Detection and RF Statistics To verify the current status of the anomaly-detection subscription of an AP, use the following command: Device# show ap name cisco-AP icap subscription client anomaly-detection chassis active R0 Per-AP ICap configuration Anomaly detection subscription State : enabled Client filter : 006b.f107.a520 Client filter : 006b.f107.a521 DHCP timeout (seconds) : 5 Trigger AP packet trace : enabled Report Individual : enabled Report Individual aggregate : enabled Report Individual throttled events (per 5 minute) : 5 Report Individual per type throttled events (per 5 minute) : 14 Report Individual per client throttled events (per 5 minute) : 15 Report Summary : disabled Report Summary frequency (minutes) : 5 To verify RF statistics, use the following command: Note The controller show command is enhanced to display data from the txTotalDrops counter. Device# show wireless client mac-address 00XX.ecXX.7aXX detail . . . Client Statistics: Number of Bytes Received from Client : 62861 Number of Bytes Sent to Client : 6754 Number of Packets Received from Client : 455 Number of Packets Sent to Client : 65 Number of Data Retries : 0 Number of RTS Retries : 0 Number of Tx Total Dropped Packets: x Number of Duplicate Received Packets : 0 Number of Decrypt Failed Packets : 0 Number of Mic Failured Packets : 0 Number of Mic Missing Packets : 0 Number of Policy Errors : 0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 956 System Management Radio Signal Strength Indicator : -21 dBm Signal to Noise Ratio : 73 dB . . . Verifying Anomaly Detection and RF Statistics Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 957 Verifying Anomaly Detection and RF Statistics System Management Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 958 V I I PA R T Security · MAC Filtering, on page 961 · Web-Based Authentication , on page 967 · Central Web Authentication, on page 1021 · Private Shared Key, on page 1041 · Multi-Preshared Key, on page 1049 · Multiple Authentications for a Client, on page 1057 · Wi-Fi Protected Access 3, on page 1083 · IP Source Guard, on page 1115 · 802.11w, on page 1117 · Management Frame Protection, on page 1125 · IPv4 ACLs , on page 1129 · Downloadable ACL, on page 1157 · DNS-Based Access Control Lists, on page 1163 · Allowed List of Specific URLs, on page 1181 · Cisco Umbrella WLAN, on page 1185 · RADIUS Server Load Balancing, on page 1197 · AAA Dead-Server Detection, on page 1201 · ISE Simplification and Enhancements, on page 1205 · RADIUS DTLS, on page 1219 · Policy Enforcement and Usage Monitoring, on page 1231 · Local Extensible Authentication Protocol, on page 1235 · Local EAP Ciphersuite, on page 1243 · Authentication and Authorization Between Multiple RADIUS Servers, on page 1247 · CUI Information in RADIUS Accounting, on page 1257 · Secure LDAP, on page 1259 · Network Access Server Identifier, on page 1267 · Locally Significant Certificates, on page 1273 · Certificate Management, on page 1303 · Controller Self-Signed Certificate for Wireless AP Join, on page 1307 · Managing Rogue Devices, on page 1315 · Classifying Rogue Access Points, on page 1335 · Advanced WIPS, on page 1345 · Cisco TrustSec, on page 1355 · SGT Inline Tagging and SXPv4, on page 1369 · Multiple Cipher Support, on page 1375 · Configuring Secure Shell , on page 1379 · Encrypted Traffic Analytics, on page 1387 · FIPS, on page 1401 · Internet Protocol Security, on page 1407 · Transport Layer Security Tunnel Support, on page 1423 · Configuring RFC 5580 Location Attributes, on page 1429 · IP MAC Binding, on page 1441 · Disabling IP Learning in FlexConnect Mode, on page 1443 · Disabling Device Tracking to Support NAC Devices, on page 1445 · Disabling IP Learning in Local Mode, on page 1449 9 2 C H A P T E R MAC Filtering · MAC Filtering, on page 961 · Configuring MAC Filtering for Local Authentication (CLI), on page 963 · Configuring MAC Filtering (GUI), on page 964 · Configuring MAB for External Authentication (CLI), on page 964 MAC Filtering You can configure the controller to authorize clients based on the client MAC address by using the MAC filtering feature. When MAC filtering is enabled, the controller uses the MAC address as the client identity. The authentication server has a database of client MAC addresses that are allowed network access. The controller sends the authentication server a RADIUS-access/request frame with a username and password based on the client MAC address as soon as it gets the association request from the client. If authorization succeeds, the controller sends a successful association response to the client. If authorization fails, the controller rejects the client association. Clients that were authorized with MAC filtering can be re-authenticated through the WLAN session timeout feature. MAC Filtering Configuration Guidelines · MAC filtering authentication occurs at the 802.11 association phase and delays the association response until authentication is done. If you use a RADIUS server for MAC filtering, it is advised to keep a low latency between the controller and the RADIUS server. When latency is too high, the client might timeout while waiting for the association response. · MAC filtering can be combined with other authentication methods such as 802.1X, Pre-Shared Key or it can be used alone. · MAC addresses can be spoofed and MAC filtering does not consist in a security measure. · Many clients can use a private MAC address to connect and change it at every session, therefore making it harder to identify devices through their MAC address. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 961 MAC Filtering Configuration Guidelines Security Note If wlan-profile-name is configured for a user, guest user authentication is allowed only from that WLAN. If wlan-profile-name is not configured for a user, guest user authentication is allowed on any WLAN. The AP fails to join the controller due to an authentication rejection on the RADIUS server. The failure occurs on the Cisco Catalyst 9800 controller, only when the RADIUS server is configured to authenticate the APs with method MAB as endpoints. The reason is that the RADIUS calling-station-id attribute is required for MAB authentication and is not present within the access request packet during the AP join. The workaround is to use a different AP authentication method than MAB as endpoints such as PAP-ASCII using a username and a password. If you want the client to connect to SSID1, but not to SSID2 using mac-filtering, ensure that you configure aaa-override in the policy profile. In the following example, when a client with MAC address 1122.3344.0001 tries to connect to a WLAN, the request is sent to the local RADIUS server, which checks the presence of the client MAC address in its attribute list (FILTER_1 and FILTER_2). If the client MAC address is listed in an attribute list (FILTER_1), the client is allowed to join the WLAN (WLAN_1) that is returned as ssid attribute from the RADIUS server. The client is rejected, if the client MAC address is not listed in the attribute list. Local RADIUS Server Configuration !Configures an attribute list as FILTER_2 aaa attribute list FILTER_2 !Defines an attribute type that is to be added to an attribute list. attribute type ssid "WLAN_2" !Username with the MAC address is added to the filter username 1122.3344.0002 mac aaa attribute list FILTER_2 ! aaa attribute list FILTER_1 attribute type ssid "WLAN_1" username 1122.3344.0001 mac aaa attribute list FILTER_1 Controller Configuration ! Sets authorization to the local radius server aaa authorization network MLIST_MACFILTER local !A WLAN with the SSID WLAN_2 is created and MAC filtering is set along with security parameters. wlan WLAN_2 2 WLAN_2 mac-filtering MLIST_MACFILTER no security wpa no security wpa wpa2 ciphers !WLAN with the SSID WLAN_1 is created and MAC filtering is set along with security parameters. wlan WLAN_1 1 WLAN_1 mac-filtering MLIST_MACFILTER no security wpa no security wpa wpa2 ciphers aes no security wpa akm dot1x security web-auth security web-auth authentication-list WEBAUTH ! Policy profile to be associated with the above WLANs wireless profile policy MAC_FILTER_POLICY aaa-override Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 962 Security Configuring MAC Filtering for Local Authentication (CLI) vlan 504 no shutdown Configuring MAC Filtering for Local Authentication (CLI) Follow the procedure given below to configure MAB for local authentication. Before you begin Configure AAA local authentication. Configure the username for WLAN configuration (local authentication) using username mac-address mac command. Note The mac-address must be in the following format: abcdabcdabcd Procedure Step 1 Command or Action wlan profile-name wlan-id Example: wlan CR1_SSID_mab-local-default 1 CR1_SSID_mab-local-default Purpose Specifies the WLAN name and ID. Step 2 mac-filtering default Example: Device(config-wlan)# mac-filtering default Sets MAC filtering support for the WLAN. Step 3 no security wpa Example: Device(config-wlan)# no security wpa Disables WPA secuirty. Step 4 no security wpa akm dot1x Disables security AKM for dot1x. Example: Device(config-wlan)# no security wpa akm dot1x Step 5 no security wpa wpa2 Disables WPA2 security. Example: Device(config-wlan)# no security wpa wpa2 Step 6 no security wpa wpa2 ciphers aes Disables WPA2 ciphers for AES. Example: Device(config-wlan)# no security wpa wpa2 ciphers aes Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 963 Configuring MAC Filtering (GUI) Security Step 7 Command or Action no shutdown Example: Device(config-wlan)# no shutdown Purpose Enables the WLAN. Configuring MAC Filtering (GUI) Before you begin Configure AAA external authentication. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Wireless > WLANs. On the Wireless Networks page, click the name of the WLAN. In the Edit WLAN window, click the Security tab. In the Layer2 tab, check the MAC Filtering check box to enable the feature. With MAC Filtering enabled, choose the Authorization List from the drop-down list. Save the configuration. Configuring MAB for External Authentication (CLI) Follow the procedure given below to configure MAB for external authentication. Before you begin Configure AAA external authentication. Procedure Step 1 Command or Action wlan wlan-name wlan-id ssid-name Example: wlan CR1_SSID_mab-ext-radius 3 CR1_SSID_mab-ext-radius Step 2 mac-filtering list-name Example: Device(config-wlan)# mac-filtering ewlc-radius Purpose Specifies the WLAN name and ID. Sets the MAC filtering parameters. Here, ewlc-radius is an example for the list-name Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 964 Security Configuring MAB for External Authentication (CLI) Step 3 Step 4 Step 5 Command or Action no security wpa Example: Device(config-wlan)# no security wpa Purpose Disables WPA secuirty. no security wpa akm dot1x Disables security AKM for dot1x. Example: Device(config-wlan)# no security wpa akm dot1x no security wpa wpa2 Disables WPA2 security. Example: Device(config-wlan)# no security wpa wpa2 Step 6 mab request format attribute {1 groupsize Optional. Configures the delimiter while using size separator separator [lowercase | MAC filtering in a WLAN. uppercase] | 2 {0 | 7 | LINE} LINE password | 32 vlan access-vlan} Here, Example: Device(config)# mab request format attribute 1 groupsize 4 separator 1- Specifies the username format used for MAB requests. groupsize size- Specifies the number of hex digits per group. The valid values range from 1 to 12. separator separator- Specifies how to separate groups. The separators are comma, semicolon, and full stop. lowercase- Specifies the username in lowercase format. uppercase- Specifies the username in uppercase format. 2- Specifies the global password used for all the MAB requests. 0- Specifies the unencrypted password. 7- Specifies the hidden password. LINE- Specifies the encrypted or unencrypted password. password- LINE password. 32- Specifies the NAS-Identifier attribute. vlan- Specifies a VLAN. access-vlan- Specifies the configured access VLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 965 Configuring MAB for External Authentication (CLI) Security Step 7 Step 8 Command or Action Purpose no security wpa wpa2 ciphers aes Disables WPA2 ciphers for AES. Example: Device(config-wlan)# no security wpa wpa2 ciphers aes no shutdown Example: Device(config-wlan)# no shutdown Enables the WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 966 9 3 C H A P T E R Web-Based Authentication This chapter describes how to configure web-based authentication on the device. It contains these sections: · Local Web Authentication Overview, on page 967 · How to Configure Local Web Authentication, on page 975 · Configuration Examples for Local Web Authentication, on page 999 · External Web Authentication (EWA), on page 1005 · Authentication for Sleeping Clients, on page 1010 · Sleeping Clients with Multiple Authentications, on page 1012 · Multi Authentication Combination with 802.1X Authentication and Local Web Authentication, on page 1018 Local Web Authentication Overview Web authentication is a Layer 3 security solution designed for providing easy and secure guest access to hosts on WLAN with open authentication or appropriate layer 2 security methods. Web authentication allows users to get authenticated through a web browser on a wireless client, with minimal configuration on the client side. It allows users to associate with an open SSID without having to set up a user profile. The host receives an IP address and DNS information from the DHCP server, however cannot access any of the network resources until they authenticate successfully. When the host connects to the guest network, the WLC redirects the host to an authentication web page where the user needs to enter valid credentials. The credentials are authenticated by the WLC or an external authentication server and if authenticated successfully is given full access to the network. Hosts can also be given limited access to particular network resources before authentication for which the pre-authentication ACL functionality needs to be configured. The following are the different types of web authentication methods: · Local Web Authentication (LWA): Configured as Layer 3 security on the controller, the web authentication page and the pre-authentication ACL are locally configured on the controller. The controller intercepts htttp(s) traffic and redirects the client to the internal web page for authentication. The credentials entered by the client on the login page is authenticated by the controller locally or through a RADIUS or LDAP server. · External Web Authentication (EWA): Configured as Layer 3 security on the controller, the controller intercepts htttp(s) traffic and redirects the client to the login page hosted on the external web server. The credentials entered by the client on the login page is authenticated by the controller locally or through a RADIUS or LDAP server. The pre-authentication ACL is configured statically on the controller. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 967 Local Web Authentication Overview Security · Central Web Authentication (CWA): Configured mostly as Layer 2 security on the controller, the redirection URL and the pre-authentication ACL reside on ISE and are pushed during layer 2 authentication to the controller. The controller redirects all web traffic from the client to the ISE login page. ISE validates the credentials entered by the client through HTTPS and authenticates the user. Use the local web authentication feature, known as web authentication proxy, to authenticate end users on host systems that do not run the IEEE 802.1x supplicant. When a client initiates an HTTP session, local web authentication intercepts ingress HTTP packets from the host and sends an HTML login page to the users. The users enter their credentials, which the local web authentication feature sends to the authentication, authorization, and accounting (AAA) server for authentication. If authentication succeeds, local web authentication sends a Login-Successful HTML page to the host and applies the access policies returned by the AAA server. If authentication fails, local web authentication forwards a Login-Fail HTML page to the user, prompting the user to retry the login. If the user exceeds the maximum number of attempts, local web authentication forwards a Login-Expired HTML page to the host, and the user is excluded with the exclusion reason as Web authentication failure. When a client reaches maximum HTTP connections (maximum of 200 connections when configured), it will cause Transmission Control Protocol (TCP) resets and client exclusion. Note You should use either global or named parameter-map under WLAN (for method-type, custom, and redirect) for using the same web authentication methods, such as consent, web consent, and webauth. Global parameter-map is applied by default, if none of the parameter-map is configured under WLAN. Note The traceback that you receive when webauth client tries to do authentication does not have any performance or behavioral impact. It happens rarely when the context for which FFM replied back to EPM for ACL application is already dequeued (possibly due to timer expiry) and the session becomes `unauthorized'. Note When command authorization is enabled as a part of AAA Authorization configuration through TACACS and the corresponding method list is not configured as a part of the HTTP configuration, WebUI pages will not load any data. However, some wireless feature pages may work as they are privilege based and not command based. Based on where the web pages are hosted, the local web authentication can be categorized as follows: · Internal--The internal default HTML pages (Login, Success, Fail, and Expire) in the controller are used during the local web authentication. · Customized--The customized web pages (Login, Success, Fail, and Expire) are downloaded onto the controller and used during the local web authentication. · External--The customized web pages are hosted on the external web server instead of using the in-built or custom web pages. Based on the various web authentication pages, the types of web authentication are as follows: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 968 Security Device Roles · Webauth--This is a basic web authentication. Herein, the controller presents a policy page with the user name and password. You need to enter the correct credentials to access the network. · Consent or web-passthrough--Herein, the controller presents a policy page with the Accept or Deny buttons. You need to click the Accept button to access the network. · Webconsent--This is a combination of webauth and consent web authentication types. Herein, the controller presents a policy page with Accept or Deny buttons along with user name or password. You need to enter the correct credentials and click the Accept button to access the network. Note · You can view the webauth parameter-map information using the show running-config command output. · The wireless Web-Authentication feature does not support the bypass type. · Change in web authentication parameter map redirect login URL does not occur until a AP rejoin happens. You must enable and disable the WLAN to apply the new URL redirection. Note We recommend that you follow the Cisco guidelines to create a customized web authentication login page. If you have upgraded to the latest versions of Google Chrome or Mozilla Firefox browsers, ensure that your webauth bundle has the following line in the login.html file: <body onload="loadAction();"> Device Roles With local web authentication, the devices in the network have these specific roles: · Client--The device (workstation) that requests access to the network and the controller and responds to requests from the controller. The workstation must be running an HTML browser with Java Script enabled. · Authentication server--Authenticates the client. The authentication server validates the identity of the client and notifies the controller that the client is authorized to access the network and the controller services or that the client is denied. · Controller--Controls the physical access to the network based on the authentication status of the client. The controller acts as an intermediary (proxy) between the client and the authentication server, requesting identity information from the client, verifying that information with the authentication server, and relaying a response to the client. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 969 Authentication Process Figure 25: Local Web Authentication Device Roles Security Authentication Process When the page is hosted on the controller, the controller uses its virtual IP (a non-routable IP like 192.0.2.1 typically) to serve the request. If the page is hosted externally, the web redirection sends the client first to the virtual IP, which then sends the user again to the external login page while it adds arguments to the URL, such as the location of the virtual IP. Even when the page is hosted externally, the user submits its credentials to the virtual IP. When you enable local web authentication, these events occur: · The user initiates an HTTP session. · The HTTP traffic is intercepted, and authorization is initiated. The controller sends the login page to the user. The user enters a username and password, and the controller sends the entries to the authentication server. · If the authentication succeeds, the controller downloads and activates the user's access policy from the authentication server. The login success page is sent to the user. · If the authentication fails, the controller sends the login fail page. The user retries the login. If the maximum number of attempts fails, the controller sends the login expired page, and the host is placed in a watch list. After the watch list times out, the user can retry the authentication process. · If authentication server is not available, after the web authentication retries, the client moves to the excluded state and the client receives an Authentication Server is Unavailable page. · The controller reauthenticates a client when the host does not respond to an ARP probe on a Layer 2 interface, or when the host does not send any traffic within the idle timeout on a Layer 3 interface. · Web authentication sessions can not apply new VLAN as part of the authorization policy, as the client already has been assigned an IP address and you will not be able to change the IP address in the client, in case the VLAN changes. · If the terminate action is default, the session is dismantled, and the applied policy is removed. Note Do not use semicolons (;) while configuring username for GUI access. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 970 Security Local Web Authentication Banner Local Web Authentication Banner With Web Authentication, you can create a default and customized web-browser banners that appears when you log in to the controller. The banner appears on both the login page and the authentication-result pop-up pages. The default banner messages are as follows: · Authentication Successful · Authentication Failed · Authentication Expired The Local Web Authentication Banner can be configured as follows: · Use the following global configuration command: Device(config)# parameter map type webauth global Device(config-params-parameter-map)# banner ? file <file-name> text <Banner text> title <Banner title> The default banner Cisco Systems and Switch host-name Authentication appear on the Login Page. Cisco Systems appears on the authentication result pop-up page. Figure 26: Authentication Successful Banner The banner can be customized as follows: · Add a message, such as switch, router, or company name to the banner: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 971 Local Web Authentication Banner · New-style mode--Use the following global configuration command: parameter-map type webauth global banner text <text> · Add a logo or text file to the banner: · New-style mode--Use the following global configuration command: parameter-map type webauth global banner file <filepath> Figure 27: Customized Web Banner Security If you do not enable a banner, only the username and password dialog boxes appear in the web authentication login screen, and no banner appears when you log into the switch. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 972 Security Figure 28: Login Screen With No Banner Customized Local Web Authentication Customized Local Web Authentication During the local web authentication process, the switch's internal HTTP server hosts four HTML pages to deliver to an authenticating client. The server uses these pages to notify you of these four authentication process states: · Login: Your credentials are requested · Success: The login was successful · Fail: The login failed · Expire: The login session has expired because of excessive login failures Note Virtual IP address is mandatory to configure custom web authentication. From Cisco IOS XE Dublin 17.11.1, special characters such as ö or à are supported in the login portal for banner title and banner text. The number of characters supported on the banner text has been doubled to 400. To support special characters, ensure that you configure the exec-character-bits command under the line console (for serial port) or line vty (for SSH). Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 973 Guidelines Security Note · If the banner text string exceeds the maximum limit of 400 characters, an error message is displayed and the configuration is rejected. Also, the parser has a limitation of 254 characters per line (including the CLI keywords). If you want to use more than 254 characters, ensure that you split it into two or multiple lines. · The webauth login page displays only the default banner strings if banner command is not configured. Guidelines · You can substitute your own HTML pages for the default internal HTML pages. · You can use a logo or specify text in the login, success, failure, and expire web pages. · On the banner page, you can specify text in the login page. · The pages are in HTML. · You must include an HTML redirect command in the success page to access a specific URL. · The URL string must be a valid URL (for example, http://www.cisco.com). An incomplete URL might cause page not found or similar errors on a web browser. · If you configure web pages for HTTP authentication, they must include the appropriate HTML commands (for example, to set the page time out, to set a hidden password, or to confirm that the same page is not submitted twice). The custom page samples in the webauth bundle are provided with the image and the details of what you can and cannot change. · The CLI command to redirect users to a specific URL is not available when the configured login form is enabled. The administrator should ensure that the redirection is configured in the web page. · If the CLI command redirecting users to specific URL after authentication occurs is entered and then the command configuring web pages is entered, the CLI command redirecting users to a specific URL does not take effect. · Configured web pages can be copied to the switch boot flash or flash. · The login page can be on one flash, and the success and failure pages can be another flash (for example, the flash on the active switch or a member switch). · You must configure all four pages. · All of the logo files (image, flash, audio, video, and so on) that are stored in the system directory (for example, flash, disk0, or disk) and that are displayed on the login page must use web_auth_<filename> as the file name. · The configured authentication proxy feature supports both HTTP and SSL. You can substitute your HTML pages for the default internal HTML pages. You can also specify a URL to which users are redirected after authentication occurs, which replaces the internal Success page. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 974 Security Figure 29: Customizable Authentication Page Redirection URL for Successful Login Guidelines Redirection URL for Successful Login Guidelines When configuring a redirection URL for successful login, consider these guidelines: · If the custom authentication proxy web pages feature is enabled, the redirection URL feature is disabled and is not available in the CLI. You can perform redirection in the custom-login success page. · If the redirection URL feature is enabled, a configured auth-proxy-banner is not used · To remove the specification of a redirection URL, use the no form of the command. · If the redirection URL is required after the web-based authentication client is successfully authenticated, then the URL string must start with a valid URL (for example, http://) followed by the URL information. If only the URL is given without http://, then the redirection URL on successful authentication might cause page not found or similar errors on a web browser. How to Configure Local Web Authentication Configuring Default Local Web Authentication The following table shows the default configurations required for local web authentication. Table 73: Default Local Web Authentication Configuration Feature AAA Default Setting Disabled Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 975 Information About the AAA Wizard Security Feature RADIUS server · IP address · UDP authentication port · Key Default value of inactivity timeout Inactivity timeout Default Setting · None specified 3600 seconds Disabled Information About the AAA Wizard The AAA wizard helps you to add the authentication, authorization, and accounting details without having to access multiple windows. Note When command authorization is enabled as a part of AAA Authorization configuration through TACACS and the corresponding method list is not configured as a part of the HTTP configuration, WebUI pages will not load any data. However, some wireless feature pages may work as they are privilege-based and not command based. Note Note the following limitations for a TACACS+ user on the 9800 WebUI: · Users with privilege level 1-10 can only view the Monitor tab. · Users with privilege level 15 have full access. · Users with privilege level 15 and a command set allowing specific commands only, is not supported. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 976 Security Information About the AAA Wizard Note When you configure the AAA authentication and authorization attributes, the following format must be followed: · protocol:attr=bla · protocol:attr#0=bla · protocol:attr#*=bla · attr=bla · attr#0=bla · attr#*=bla attr is mapped to the supported AAA attributes. If attr is an unknown or undefined attribute, a warning message parse unknown cisco vsa is displayed when you configure the radius-server disallow unknown vendor-code command. Otherwise, the transaction will be treated as a failure. We recommend that you configure the command as per the format discussed above. Otherwise, the transaction fails. Whenever the passed attribute does not match any of the patterns mentioned, then AAA fails to decode that specific attribute and marks the request as a failure. To edit the details entered using the wizard, use the respective screens. Procedure Step 1 Step 2 Step 3 Choose Configuration > Security > AAA. Click + AAA Wizard. The Add Wizard page is displayed. Click RADIUS tab. The RADIUS server option is enabled by default. You can switch between the Basic and Advanced options using the radio buttons. a) In the Name field, enter the name of the RADIUS server. b) In the IPv4 / IPv6 Server Address field, enter the IPv4 or IPv6 address, or hostname. c) Check the PAC Key check box to enable the Protected Access Credential (PAC) authentication key option. d) From the Key Type drop-down list, choose the authentication key type. e) In the Key field, enter the authentication key. f) In the Confirm Key field, re-enter the authentication key. g) Click the Advanced radio button. This enables the Advanced options. h) In the Auth Port field, enter the authorization port number. i) In the Acct Port field, enter the accounting port number. j) In the Server Timeout field, enter the timeout duration, in seconds. k) In the Retry Count field, enter the number of retries. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 977 Information About the AAA Wizard Security Step 4 Step 5 Step 6 l) Use the Support for CoA toggle button to enable or disable change of authorization (CoA). Check the TACACS+ check box. This enables the TACACS+ options. You can switch between the Basic and Advanced options using the radio buttons. a) In the Name field, enter the TACACS+ server name. b) In the IPv4 / IPv6 Server Address field, enter the IPv4 or IPv6 address, or hostname. c) In the Key field, enter the authentication key. d) In the Confirm Key field, re-enter the authentication key. e) Click the Advanced radio button. This enables the Advanced options. f) In the Port field, enter the port number to use. g) In the Server Timeout field, enter the timeout duration, in seconds. Check the LDAP check box. This enables the LDAP options. You can switch between the Basic and Advanced options using the radio buttons. a) In the Server Name field, enter the LDAP server name. b) In the IPv4 / IPv6 Server Address field, enter the IPv4 or IPv6 address, or hostname. c) In the Port Number field, enter the port number to use. d) From the Simple Bind drop-down list, choose the authentication key type. e) In the User Base DN field, enter the details. f) Click the Advanced radio button. This enables the Advanced options. g) From the User Attribute drop-down list, choose the user attribute. h) In the User Object Type field, enter the object type details and click the + icon. The objects that have been added are listed in the area below. Use the x mark adjacent to each object to remove it. i) In the Server Timeout field, enter the timeout duration, in seconds. j) Check the Secure Mode check box to enable secure mode. Checking this enables the Trustpoint Name drop-down list. k) From the Trustpoint Name drop-down list, choose the trustpoint. l) Click Next. This enables the Server Group Association page and the RADIUS tab is selected by default. Perform the following actions under RADIUS tab. a) In the Name field, enter the name of the RADIUS server group. b) From the MAC-Delimiter drop-down list, choose the delimiter to be used in the MAC addresses that are sent to the RADIUS servers. c) From the MAC Filtering drop-down list, choose a value based on which to filter MAC addresses. d) To configure the dead time for the server group and direct AAA traffic to alternative groups of servers that have different operational characteristics, in the Dead-Time field, enter the amount of time, in minutes, after which a server is assumed to be dead. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 978 Security Information About the AAA Wizard Step 7 Step 8 Step 9 Step 10 Step 11 e) Choose the servers that you want to include in the server group from the Available Servers list and move them to the Assigned Servers list. f) Click Next. The TACACS+ window is displayed, if you have selected TACACS+ in server configuration. Use the TACACS+ window to enter the following details: a) In the Name field, enter the name of the TACACS+ server group. b) From the Available Servers list, choose the servers that you want to include in the server group from the list and move them to the Assigned Servers list. c) Click Next. The LDAP window is displayed, if you have selected LDAP under server configuration. Use the LDAP window to enter the following details: a) In the Name field, enter the name of the LDAP server group. b) From the Available Servers list, choose the servers that you want to include in the server group from the list and move them to the Assigned Servers list. Click Next. The MAP AAA window is displayed. Use the check boxes to enable the Authentication, Authorization, and Accounting tabs. You cannot unselect all the three options. At least one option has to be selected. Use the Authentication tab to enter the authentication details: a) In the Method List Name field, enter the name of the method list. b) From the Type drop-down list, choose the type of accounting that you want to perform before allowing access to the network. c) From the Group Type drop-down list, choose a value depending on whether you want to assign a group of servers as your access server, or want to use a local server to authenticate access. If you choose the local option, the Fallback to local option is removed. d) Check the Fallback to local check box to configure a local server to act as a fallback method when servers in the group are unavailable. e) From the Available Server Groups list, choose the server groups that you want to use to authenticate access to your network and click the > icon to move them to the Assigned Server Groups list. Check the Authorization check box to configure the authorization details: a) In the Method List Name field, enter the name of the method list. b) From the Type drop-down list, choose the type of authorization you want to perform before allowing access to the network. c) From the Group Type drop-down list, choose a value depending on whether you want to assign a group of servers as your access server, or want to use a local server to authorize access. If you choose the local option, the Fallback to local option is removed. d) Check the Fallback to local check box to configure a local server to act as a fallback method when the servers in the group are unavailable. e) From the Available Server Groups list, choose the server groups you want to use to authorize access to your network and click > icon to move them to the Assigned Server Groups list. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 979 Configuring AAA Authentication (GUI) Security Step 12 Step 13 Check the Accounting check box to configure the accounting details: a) In the Method List Name field, enter the name of the method list. b) From the Type drop-down list, choose the type of accounting that you want to perform. c) From the Available Server Groups list, choose the server groups that you want to use to authorize access to your network and click the > icon to move them to the Assigned Server Groups list. Click Apply to Device. Configuring AAA Authentication (GUI) Note The WebUI does not support the ipv6 radius source-interface under AAA radius server group configuration. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Choose Configuration > Security > AAA. In the Authentication section, click Add. In the Quick Setup: AAA Authentication window that is displayed, enter a name for your method list. Choose the type of authentication you want to perform before allowing access to the network, in the Type drop-down list. Choose if you want to assign a group of servers as your access server, or if you want to use a local server to authenticate access, from the Group Type drop-down list. To configure a local server to act as a fallback method when servers in the group are unavailable, check the Fallback to local check box. Choose the server groups you want to use to authenticate access to your network, from the Available Server Groups list and click > icon to move them to the Assigned Server Groups list. Click Save & Apply to Device. Configuring AAA Authentication (CLI) Procedure Step 1 Command or Action aaa new-model Example: Device(config)# aaa new-model Purpose Enables AAA functionality. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 980 Security Configuring AAA Authentication (CLI) Step 2 Step 3 Command or Action Purpose aaa authentication login {default | named_authentication_list} group AAA_group_name Example: Defines the list of authentication methods at login. named_authentication_list refers to any name that is not greater than 31 characters. AAA_group_name refers to the server group Device(config)# aaa authentication default group group1 login name. You need to define the server-group server_name at the beginning itself. aaa authorization network {default | named} Creates an authorization method list for group AAA_group_name web-based authorization. Example: Device(config)# aaa authorization network default group group1 Step 4 tacacs server server-name Example: Specifies an AAA server. Device(config)# tacacs server yourserver Step 5 address {ipv4 | ipv6}ip_address Example: Configures the IP address for the TACACS server. Device(config-server-tacacs)# address ipv4 10.0.1.12 Step 6 Step 7 single-connection Example: Device(config-server-tacacs)# single-connection tacacs-server host {hostname | ip_address} Example: Multiplexes all packets over a single TCP connection to TACACS server. Specifies a AAA server. Device(config)# tacacs-server host 10.1.1.1 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 981 Configuring the HTTP/HTTPS Server (GUI) Security Configuring the HTTP/HTTPS Server (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Choose Administration > Management > HTTP/HTTPS/Netconf. In the HTTP/HTTPS Access Configuration section, enable HTTP Access and enter the port that will listen for HTTP requests. The default port is 80. Valid values are 80, and ports between 1025 and 65535. Enable HTTPS Access on the device and enter the designated port to listen for HTTPS requests. The default port is 1025. Valid values are 443, and ports between 1025 and 65535. On a secure HTTP connection, data to and from an HTTP server is encrypted before being sent over the Internet. HTTP with SSL encryption provides a secure connection to allow such functions as configuring a switch from a Web browser. Choose the Personal Identity Verification as enabled or disabled. In the HTTP Trust Point Configuration section, enable Enable Trust Point to use Certificate Authority servers as trustpoints. From the Trust Points drop-down list, choose a trust point. In the Timeout Policy Configuration section, enter the HTTP timeout policy in seconds. Valid values can range from 1 to 600 seconds. Enter the number of minutes of inactivity allowed before the session times out. Valid values can range from 180 to 1200 seconds. Enter the server life time in seconds. Valid values can range from 1 to 86400 seconds. Enter the maximum number of requests the device can accept. Valid values range from 1 to 86400 requests. Save the configuration. Configuring the HTTP Server (CLI) To use local web authentication, you must enable the HTTP server within the device. You can enable the server for either HTTP or HTTPS. Note The Apple psuedo-browser will not open if you configure only the ip http secure-server command. You should also configure the ip http server command. Follow the procedure given below to enable the server for either HTTP or HTTPS: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 982 Security Allowing Special Characters for Serial Port Step 2 Command or Action ip http server Example: Device(config)# ip http server Purpose Enables the HTTP server. The local web authentication feature uses the HTTP server to communicate with the hosts for user authentication. Step 3 Step 4 ip http secure-server Example: Device(config)# ip http secure-server Enables HTTPS. You can configure custom authentication proxy web pages or specify a redirection URL for successful login. Note To ensure secure authentication when you enter the ip http secure-server command, the login page is always in HTTPS (secure HTTP) even if the user sends an HTTP request. end Example: Device(config)# end Exits configuration mode. Allowing Special Characters for Serial Port Before you begin Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 line console line-num Example: Device(config)# line console 0 Configures the primary terminal line number. Step 3 exec-timeout mins sec Example: Configures the time to disconnect idle EXEC sessions. Device(config-line)# exec-timeout 12 0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 983 Allowing Special Characters for VTY Port Security Step 4 Step 5 Step 6 Step 7 Command or Action Purpose login authentication word default Configures login authentication checking. It can Example: be authentication list with a name or the default authentication list. Device(config-line)# login authentication NO_LOGIN exec-character-bit {7 | 8} Example: Configures the character widths of EXEC command characters. Device(config-line)# exec-character-bit 8 stopbits {1 | 1.5| 2} Example: Device(config-line)# stopbits 1 Configures the stop bits for the console port. end Example: Device(config-line)# end Returns to privileged EXEC mode. Allowing Special Characters for VTY Port Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 parameter-map type webauth global Example: Device(config)# parameter-map type webauth global Step 3 banner text text Example: Device(config-params-parameter-map)# banner text #Hêllö# Purpose Enters global configuration mode. Creates a parameter map and enters parameter-map webauth configuration mode. You can create a custom banner (of up to 400 characters) by entering c <banner-text> c, where c is a delimiting character. If the string exceeds the maximum limit of 400 characters, an error message is displayed and the configuration is rejected. Also, the parser has a limitation of 254 characters per line (including the CLI keywords). If you want to use more than 254 characters, ensure that you split it into two or multiple lines. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 984 Security Configuring HTTP and HTTPS Requests for Web Authentication Step 4 Command or Action Purpose The webauth login page displays only the default banner strings, if banner command is not configured. end Returns to privileged EXEC mode. Example: Device(config-params-parameter-map)# end Configuring HTTP and HTTPS Requests for Web Authentication Information About Configuring HTTP and HTTPS Requests for Web Authentication Using the Configuring HTTP and HTTPS Requests for Web Authentication feature, you can have HTTPS access to device management and HTTP access to web authentication. To control the HTTP and HTTPS requests being sent to the web authentication module, run the secure-webauth-disable and webauth-http-enable commands in the global parameter map mode. Note The secure-webauth-disable and webauth-http-enable commands are not enabled by default; you must configure them explicitly. The following table describes the various CLI combinations: Table 74: CLI Combinations Admin (Device Management) HTTP Access HTTPS Access No Yes WebAuthentication Required Configurations HTTP Access HTTPS Access Admin Web Authentication Yes Yes no ip http server ip http secure-server no ip http server ip http secure-server parameter-map type webauth global webauth-http-enable No Yes No Yes no ip http server no ip http server ip http ip http secure-server secure-server Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 985 Information About Configuring HTTP and HTTPS Requests for Web Authentication Security Admin (Device Management) HTTP Access HTTPS Access No Yes No Yes No No No No Yes No Yes Yes WebAuthentication Required Configurations HTTP Access HTTPS Access Admin Web Authentication Yes No No No No Yes Yes No Yes No Yes No no ip http server ip http secure-server no ip http server ip http secure-server parameter-map type webauth global webauth-http-enable secure-webauth-disable no ip http server ip http secure-server no ip http server ip http secure-server parameter-map type webauth global secure-webauth-disable no ip http server Not Supported no ip http secure-server no ip http server no ip http secure-server no ip http server no ip http secure-server parameter-map type webauth global webauth-http-enable ip http server no ip http secure-server ip http server ip http secure-server ip http server no ip http secure-server ip http server ip http secure-server parameter-map type webauth global secure-webauth-disable Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 986 Security Guidelines and Limitations Note · The ip http server and ip http secure-server commands allow access for HTTP and HTTPS, respectively. For example, in the first row of the table, for HTTP access to web authentication, you do not require the ip http server command. You can use the new webauth-http-enable command under the global parameter map, to allow HTTP access. · For HTTPS access to webauth, the ip http secure-server command is required. Therefore, HTTPS access for both admin and web authentication are enabled in the first row. To disable HTTPS access for web authentication, configure the secure-webauth-disable command. For example, in the fourth row of the table, HTTPS access is disabled for web authentication because the secure-webauth-disable command is configured. Guidelines and Limitations The following are the guidelines and limitations for configuring HTTP and HTTPS requests for web authentication: · You cannot enable HTTPS web authentication without enabling HTTPS for device management. · If the secure-webauth-disable command is configured, central web authentication cannot be performed, if the initial request from the client is https://< >. Configuring HTTP and HTTPS Requests for Web Authentication (CLI) To configure the HTTP and HTTPS requests being sent to the webauth module, complete the steps given below: Procedure Step 1 Command or Action enable Example: Device# enable Step 2 configure terminal Example: Device# configure terminal Step 3 no ip http server Example: Device(config)# no ip http server Step 4 ip http {server | secure-server} Example: Device(config)# ip http server Purpose Enables privileged EXEC mode. Enter your password if prompted. Enters global configuration mode. Sets the HTTP server to its default. Enables the HTTP server or the HTTP secure server. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 987 Creating a Parameter Map (GUI) Security Step 5 Step 6 Step 7 Command or Action parameter-map type webauth global Example: Device(config)# parameter-map type webauth global secure-webauth-disable Example: Device(config-params-parameter-map)# secure-webauth-disable webauth-http-enable Example: Device(config-params-parameter-map)# webauth-http-enable Purpose Enables the global parameter map mode. Disables HTTP secure server for web authentication. Enables HTTP server for web authentication. Creating a Parameter Map (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Security > Web Auth. Click Add. Click Policy Map. Enter Parameter Name, Maximum HTTP connections, Init-State Timeout(secs) and choose webauth in the Type drop-down list. Click Apply to Device. Creating Parameter Maps Configuring Local Web Authentication (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Security > Web Auth. On the Web Auth page, click Add. In the Create Web Auth Parameter window that is displayed, enter a name for the parameter map. In the Maximum HTTP Connections field, enter the maximum number of HTTP connections that you want to allow. In the Init-State Timeout field, enter the time after which the init state timer should expire due to user's failure to enter valid credentials in the login page. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 988 Security Configuring the Internal Local Web Authentication (CLI) Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Step 15 Step 16 Step 17 Choose the type of Web Auth parameter. Click Apply to Device. On the Web Auth page, click the name of the parameter map. In the Edit WebAuth Parameter window that is displayed, choose the required Banner Type. · If you choose Banner Text, enter the required banner text to be displayed. · If you choose File Name, specify the path of the file from which the banner text has to be picked up. Enter the virtual IP addresses as required. Set appropriate status of WebAuth Intercept HTTPS, Captive Bypass Portal. Set appropriate status for Disable Success Window, Disable Logout Window, and Login Auth Bypass for FQDN. Check the Sleeping Client Status check box to enable authentication of sleeping clients and then specify the Sleeping Client Timeout in minutes. Valid range is between 10 minutes and 43200 minutes. Click the Advanced tab. To configure external web authentication, perform these tasks: a) In the Redirect for log-in field, enter the name of the external server to send login request. b) In the Redirect On-Success field, enter the name of the external server to redirect after a successful login. c) In the Redirect On-Failure field, enter the name of the external server to redirect after a login failure. d) (Optional) Under Redirect to External Server in the Redirect Append for AP MAC Address field, enter the AP MAC address. e) (Optional) In the Redirect Append for Client MAC Address field, enter the client MAC address. f) (Optional) In the Redirect Append for WLAN SSID field, enter the WLAN SSID. g) In the Portal IPV4 Address field, enter the IPv4 address of the portal to send redirects. h) In the Portal IPV6 Address field, enter the IPv6 address of the portal to send redirects, if IPv6 address is used. To configure customized local web authentication, perform these tasks: a) Under Customized Page, specify the following pages: · Login Failed Page · Login Page · Logout Page · Login Successful Page Click Update & Apply. Configuring the Internal Local Web Authentication (CLI) Follow the procedure given below to configure the internal local web authentication: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 989 Configuring the Customized Local Web Authentication (CLI) Security Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 parameter-map type webauth {parameter-map-name | global} Example: Device(config)# parameter-map type webauth sample Creates the parameter map. The parameter-map-name must not exceed 99 characters. Step 3 end Example: Returns to privileged EXEC mode. Device(config-params-parameter-map)# end Configuring the Customized Local Web Authentication (CLI) Follow the procedure given below to configure the customized local web authentication: Note Virtual IP address is mandatory for custom web authentication. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 Step 3 parameter-map type webauth parameter-map-name Example: Device(config)# parameter-map type webauth sample type {authbypass | consent | webauth | webconsent} Example: Purpose Enters global configuration mode. Configures the webauth type parameter. Note You need to configure a virtual IP in the global parameter map to use the customized web authentication bundle. Configures webauth sub-types, such as passthru, consent, webauth, or webconsent. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 990 Security Configuring the External Local Web Authentication (CLI) Command or Action Purpose Device(config-params-parameter-map)# type webauth Step 4 Step 5 Step 6 Step 7 Step 8 custom-page login device html-filename Example: Configures the customized login page. Device(config-params-parameter-map)# custom-page login device bootflash:login.html custom-page login expired device html-filename Example: Configures the customized login expiry page. Device(config-params-parameter-map)# custom-page login expired device bootflash:loginexpired.html custom-page success device html-filename Example: Configures the customized login success page. Device(config-params-parameter-map)# custom-page success device bootflash:loginsuccess.html custom-page failure device html-filename Example: Configures the customized login failure page. Device(config-params-parameter-map)# custom-page failure device bootflash:loginfail.html end Example: Returns to privileged EXEC mode. Device(config-params-parameter-map)# end Configuring the External Local Web Authentication (CLI) Follow the procedure given below to configure the external local web authentication: Procedure Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 991 Configuring the External Local Web Authentication (CLI) Security Command or Action Device# configure terminal Purpose Step 2 parameter-map type webauth parameter-map-name Example: Device(config)# parameter-map type webauth sample Configures the webauth type parameter. Step 3 type {authbypass | consent | webauth | webconsent} Example: Configures the webauth sub-types, such as authbypass, consent, passthru, webauth, or webconsent. Device(config-params-parameter-map)# type webauth Step 4 Step 5 Step 6 redirect [for-login | on-failure | on-success] URL Example: Device(config-params-parameter-map)# redirect for-login http://www.cisco.com/login.html Configures the redirect URL for the login, failure, and success pages. Note In the redirect url, you need to press Ctrl+v and type ? to configure the ? character. The ? character is commonly used in URL when ISE is configured as an external portal. redirect portal {ipv4 | ipv6} ip-address Example: Device(config-params-parameter-map)# redirect portal ipv4 23.0.0.1 Configures the external portal IPv4 address. Note The IP address should be one of the associated IP addresses of the domain and not a random IP address when using FQDN. It is recommended to use the FQDN URL here, if a given domain resolves to more than a single IP address. end Example: Returns to privileged EXEC mode. Device(config-params-parameter-map)# end Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 992 Security Configuring the Web Authentication WLANs Configuring the Web Authentication WLANs Follow the procedure given below to configure WLAN using web auth security and map the authentication list and parameter map: Procedure Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Device# configure terminal Step 2 Step 3 wlan profile-name wlan-id ssid-name Example: Device(config)# wlan mywlan 34 mywlan-ssid no security wpa Example: Specifies the WLAN name and ID. profile-name is the WLAN name which can contain 32 alphanumeric characters. wlan-id is the wireless LAN identifier. The valid range is from 1 to 512. ssid-name is the SSID which can contain 32 alphanumeric characters. Disables the WPA security. Device(config-wlan)# no security wpa Step 4 Step 5 security web-auth Example: Enables web authentication for WLAN. Device(config-wlan)# security web-auth security web-auth {authentication-list authentication-list-name | parameter-map parameter-map-name} Example: Device(config-wlan)# security web-auth authentication-list webauthlistlocal Device(config-wlan)# security web-auth parameter-map sample Enables web authentication for WLAN. Here, · authentication-list authentication-list-name: Sets the authentication list for IEEE 802.1x. · parameter-map parameter-map-name: Configures the parameter map. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 993 Configuring Pre-Auth Web Authentication ACL (GUI) Security Command or Action Step 6 end Example: Device(config-wlan)# end Purpose Note When security web-auth is enabled, you get to map the default authentication-list and global parameter-map. This is applicable for authentication-list and parameter-map that are not explicitly mentioned. Returns to privileged EXEC mode. Configuring Pre-Auth Web Authentication ACL (GUI) Before you begin Ensure that you have configured an access control list (ACL) and a WLAN. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Tags & Profiles > WLANs. Click the name of the WLAN. In the Edit WLAN window, click the Security tab and then click the Layer3 tab. Click Show Advanced Settings. In the Preauthenticaion ACL section, choose the appropriate ACL to be mapped to the WLAN. Click Update & Apply to Device. Configuring Pre-Auth Web Authentication ACL (CLI) Follow the procedure given below to configure pre-auth web authentication ACL: Procedure Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Device# configure terminal Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 994 Security Configuring Pre-Auth Web Authentication ACL (CLI) Step 2 Step 3 Step 4 Step 5 Command or Action Purpose access-list access-list-number {deny | permit} Creates an ACL list. hostname source-wildcard-bits The access-list-number is a decimal number Example: from 1 to 99, 100 to 199, 300 to 399, 600 to 699, 1300 to 1999, 2000 to 2699, or 2700 to Device(config)# access-list 2 deny 2799. your_host 10.1.1.1 log Enter deny or permit to specify whether to deny or permit if the conditions are matched. The source is the source address of the network or host from which the packet is being sent specified as: · The 32-bit quantity in dotted-decimal format. · The keyword any as an abbreviation for source and source-wildcard of 0.0.0.0 255.255.255.255. You do not need to enter a source-wildcard. · The keyword host as an abbreviation for source and source-wildcard of source 0.0.0.0. wlan profile-name wlan-id ssid-name Example: Device(config)# wlan mywlan 34 mywlan-ssid ip access-group web access-list-name Example: (Optional) The source-wildcard applies wildcard bits to the source. Creates the WLAN. profile-name is the WLAN name which can contain 32 alphanumeric characters. wlan-id is the wireless LAN identifier. The valid range is from 1 to 512. ssid-name is the SSID which can contain 32 alphanumeric characters. Maps the ACL to the web auth WLAN. access-list-name is the IPv4 ACL name or ID. Device(config-wlan)# ip access-group web name end Example: Returns to privileged EXEC mode. Device(config-wlan)# end Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 995 Configuring the Maximum Web Authentication Request Retries Security Configuring the Maximum Web Authentication Request Retries Follow these steps to configure the maximum web authentication request retries: Procedure Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Device# configure terminal Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 Step 4 wireless security web-auth retries number number is the maximum number of web auth Example: request retries. The valid range is 0 to 20. Device(config)# wireless security web-auth retries 2 end Example: Returns to privileged EXEC mode. Device(config)# end Configuring a Local Banner in Web Authentication Page (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Security > Web Auth. In the Webauth Parameter Map tab, click the parameter map name. The Edit WebAuth Parameter window is displayed. In the General tab and choose the required Banner Type: · If you choose Banner Text, enter the required banner text to be displayed. · If you choose File Name, specify the path of the file from which the banner text has to be picked up. Click Update & Apply. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 996 Security Configuring a Local Banner in Web Authentication Page (CLI) Configuring a Local Banner in Web Authentication Page (CLI) Follow the procedure given below to configure a local banner in web authentication pages. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 parameter-map type webauth param-map Example: Device(config)# parameter-map type webauth param-map Configures the web authentication parameters. Enters the parameter map configuration mode. Step 3 banner [ file | banner-text |title] Example: Device(config-params-parameter-map)# banner http C My Switch C Enables the local banner. Create a custom banner by entering C banner-text C (where C is a delimiting character), or file that indicates a file (for example, a logo or text file) that appears in the banner, or title that indicates the title of the banner. Step 4 end Returns to privileged EXEC mode. Example: Device(config-params-parameter-map)# end Configuring Type WebAuth, Consent, or Both Procedure Step 1 Command or Action configure terminal Example: Device # configure terminal Purpose Enters global configuration mode. Step 2 parameter-map type webauth parameter-map Configures the webauth type parameter. name Example: Device (config) # parameter-map type webauth webparalocal Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 997 Configuring Preauthentication ACL Security Step 3 Step 4 Step 5 Command or Action Purpose type consent Example: Device (config-params-parameter-map) # type consent Configures webauth type as consent. You can configure the type as webauth, consent, or both (webconsent). end Returns to privileged EXEC mode. Example: Device (config-params-parameter-map) # end show running-config | section parameter-map Displays the configuration details. type webauth parameter-map Example: Device (config) # show running-config | section parameter-map type webauth test Configuring Preauthentication ACL Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wlan wlan-name Example: Device (config)# wlan ramban For wlan-name, enter the profile name. Step 3 shutdown Example: Device (config-wlan)# shutdown Disables the WLAN. Step 4 ip access-group web preauthrule Example: Device (config-wlan)# ip access-group web preauthrule Configures ACL that has to be applied before authentication. Step 5 no shutdown Example: Device (config)# no shutdown Enables the WLAN. Step 6 end Returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 998 Security Configuring TrustPoint for Local Web Authentication Step 7 Command or Action Example: Device (config-wlan)# end show wlan name wlan-name Example: Device# show wlan name ramban Purpose Displays the configuration details. Configuring TrustPoint for Local Web Authentication Before you begin Ensure that a certificate is installed on your controller . Using trustpoint controller presents the domain specific certificate that client browser trusts when it gets redirected to *.com portal. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 parameter-map type webauth global Example: Device (config)# parameter-map type webauth global Creates the parameter map. Step 3 trustpoint trustpoint-name Example: Device (config-params-parameter-map)# trustpoint trustpoint-name Configures trustpoint for local web authentication. Step 4 end Example: Device (config-params-parameter-map)# end Returns to privileged EXEC mode. Configuration Examples for Local Web Authentication Example: Obtaining Web Authentication Certificate This example shows how to obtain web authentication certificate. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 999 Example: Obtaining Web Authentication Certificate Security Device# configure terminal Device(config)# crypto pki import cert pkcs12 tftp://9.1.0.100/ldapserver-cert.p12 cisco Device(config)# end Device# show crypto pki trustpoints cert Trustpoint cert: Subject Name: e=rkannajr@cisco.com cn=sthaliya-lnx ou=WNBU o=Cisco l=SanJose st=California c=US Serial Number (hex): 00 Certificate configured. Device# show crypto pki certificates cert Certificate Status: Available Certificate Serial Number (hex): 04 Certificate Usage: General Purpose Issuer: e=rkannajr@cisco.com cn=sthaliya-lnx ou=WNBU o=Cisco l=SanJose st=California c=US Subject: Name: ldapserver e=rkannajr@cisco.com cn=ldapserver ou=WNBU o=Cisco st=California c=US Validity Date: start date: 07:35:23 UTC Jan 31 2012 end date: 07:35:23 UTC Jan 28 2022 Associated Trustpoints: cert ldap12 Storage: nvram:rkannajrcisc#4.cer CA Certificate Status: Available Certificate Serial Number (hex): 00 Certificate Usage: General Purpose Issuer: e=rkannajr@cisco.com cn=sthaliya-lnx ou=WNBU o=Cisco l=SanJose st=California c=US Subject: e=rkannajr@cisco.com cn=sthaliya-lnx ou=WNBU o=Cisco l=SanJose st=California c=US Validity Date: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1000 Security Example: Displaying a Web Authentication Certificate start date: 07:27:56 UTC Jan 31 2012 end date: 07:27:56 UTC Jan 28 2022 Associated Trustpoints: cert ldap12 ldap Storage: nvram:rkannajrcisc#0CA.cer Example: Displaying a Web Authentication Certificate This example shows how to display a web authentication certificate. Device# show crypto ca certificate verb Certificate Status: Available Version: 3 Certificate Serial Number (hex): 2A9636AC00000000858B Certificate Usage: General Purpose Issuer: cn=Cisco Manufacturing CA o=Cisco Systems Subject: Name: WS-C3780-6DS-S-2037064C0E80 Serial Number: PID:WS-C3780-6DS-S SN:FOC1534X12Q cn=WS-C3780-6DS-S-2037064C0E80 serialNumber=PID:WS-C3780-6DS-S SN:FOC1534X12Q CRL Distribution Points: http://www.cisco.com/security/pki/crl/cmca.crl Validity Date: start date: 15:43:22 UTC Aug 21 2011 end date: 15:53:22 UTC Aug 21 2021 Subject Key Info: Public Key Algorithm: rsaEncryption RSA Public Key: (1024 bit) Signature Algorithm: SHA1 with RSA Encryption Fingerprint MD5: A310B856 A41565F1 1D9410B5 7284CB21 Fingerprint SHA1: 04F180F6 CA1A67AF 9D7F561A 2BB397A1 0F5EB3C9 X509v3 extensions: X509v3 Key Usage: F0000000 Digital Signature Non Repudiation Key Encipherment Data Encipherment X509v3 Subject Key ID: B9EEB123 5A3764B4 5E9C54A7 46E6EECA 02D283F7 X509v3 Authority Key ID: D0C52226 AB4F4660 ECAE0591 C7DC5AD1 B047F76C Authority Info Access: Associated Trustpoints: CISCO_IDEVID_SUDI Key Label: CISCO_IDEVID_SUDI Example: Choosing the Default Web Authentication Login Page This example shows how to choose a default web authentication login page. Device# configure terminal Device(config)# parameter-map type webauth test This operation will permanently convert all relevant authentication commands to their CPL control-policy equivalents. As this conversion is irreversible and will disable the conversion CLI 'authentication display [legacy|new-style]', you are strongly advised to back up your current configuration before proceeding. Do you wish to continue? [yes]: yes Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1001 Example: Choosing a Customized Web Authentication Login Page from an IPv4 External Web Server Security Device(config)# wlan wlan50 Device(config-wlan)# shutdown Device(config-wlan)# security web-auth authentication-list test Device(config-wlan)# security web-auth parameter-map test Device(config-wlan)# no shutdown Device(config-wlan)# end Device# show running-config | section wlan50 wlan wlan50 50 wlan50 security wpa akm cckm security wpa wpa1 security wpa wpa1 ciphers aes security wpa wpa1 ciphers tkip security web-auth authentication-list test security web-auth parameter-map test session-timeout 1800 no shutdown Device# show running-config | section parameter-map type webauth test parameter-map type webauth test type webauth Example: Choosing a Customized Web Authentication Login Page from an IPv4 External Web Server This example shows how to choose a customized web authentication login page from an IPv4 external web server. Device# configure terminal Device(config)# parameter-map type webauth global Device(config-params-parameter-map)# virtual-ip ipv4 192.0.2.1. Device(config-params-parameter-map)# parameter-map type webauth test Device(config-params-parameter-map)# type webauth Device(config-params-parameter-map)# redirect for-login http://9.1.0.100/login.html Device(config-params-parameter-map)# redirect portal ipv4 9.1.0.100 Device(config-params-parameter-map)# end Device# show running-config | section parameter-map parameter-map type webauth global virtual-ip ipv4 192.0.2.1. parameter-map type webauth test type webauth redirect for-login http://9.1.0.100/login.html redirect portal ipv4 9.1.0.100 security web-auth parameter-map rasagna-auth-map security web-auth parameter-map test Example: Choosing a Customized Web Authentication Login Page from an IPv6 External Web Server This example shows how to choose a customized web authentication login page from an IPv6 external web server. Device# configure terminal Device(config)# parameter-map type webauth global Device(config-params-parameter-map)# virtual-ip ipv6 2001:DB8::/48 Device(config-params-parameter-map)# parameter-map type webauth test Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1002 Security Example: Assigning Login, Login Failure, and Logout Pages per WLAN Device(config-params-parameter-map)# type webauth Device(config-params-parameter-map)# redirect for-login http://9:1:1::100/login.html Device(config-params-parameter-map)# redirect portal ipv6 9:1:1::100 Device(config-params-parameter-map)# end Device# show running-config | section parameter-map parameter-map type webauth global virtual-ip ipv6 2001:DB8::/48 parameter-map type webauth test type webauth redirect for-login http://9:1:1::100/login.html redirect portal ipv6 9:1:1::100 security web-auth parameter-map rasagna-auth-map security web-auth parameter-map test Example: Assigning Login, Login Failure, and Logout Pages per WLAN This example shows how to assign login, login failure and logout pages per WLAN. Device# configure terminal Device(config)# parameter-map type webauth test Device(config-params-parameter-map)# custom-page login device flash:loginsantosh.html Device(config-params-parameter-map)# custom-page login expired device flash:loginexpire.html Device(config-params-parameter-map)# custom-page failure device flash:loginfail.html Device(config-params-parameter-map)# custom-page success device flash:loginsucess.html Device(config-params-parameter-map)# end Device# show running-config | section parameter-map type webauth test parameter-map type webauth test type webauth redirect for-login http://9.1.0.100/login.html redirect portal ipv4 9.1.0.100 custom-page login device flash:loginsantosh.html custom-page success device flash:loginsucess.html custom-page failure device flash:loginfail.html custom-page login expired device flash:loginexpire.html Example: Configuring Preauthentication ACL This example shows how to configure preauthentication ACL. Device# configure terminal Device(config)# wlan fff Device(config-wlan)# shutdown Device(config-wlan)# ip access-group web preauthrule Device(config-wlan)# no shutdown Device(config-wlan)# end Device# show wlan name fff Example: Configuring Webpassthrough This example shows how to configure webpassthrough. Device# configure terminal Device(config)# parameter-map type webauth webparalocal Device(config-params-parameter-map)# type consent Device(config-params-parameter-map)# end Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1003 Verifying Web Authentication Type Device# show running-config | section parameter-map type webauth test parameter-map type webauth test type webauth redirect for-login http://9.1.0.100/login.html redirect portal ipv4 9.1.0.100 Verifying Web Authentication Type To verify the web authentication type, run the following command: Device# show parameter-map type webauth all Type Name --------------------------------Global global Named webauth Named ext Named redirect Named abc Named glbal Named ewa-2 Device# show parameter-map type webauth global Parameter Map Name : global Banner: Text : CisCo Type : webauth Auth-proxy Init State time : 120 sec Webauth max-http connection : 100 Webauth logout-window : Enabled Webauth success-window : Enabled Consent Email : Disabled Sleeping-Client : Enabled Sleeping-Client timeout : 60 min Virtual-ipv4 : 192.0.2.1. Virtual-ipv4 hostname : Webauth intercept https : Disabled Webauth Captive Bypass : Disabled Webauth bypass intercept ACL : Trustpoint name : HTTP Port : 80 Watch-list: Enabled : no Webauth login-auth-bypass: Device# show parameter-map type webauth name global Parameter Map Name : global Type : webauth Auth-proxy Init State time : 120 sec Webauth max-http connection : 100 Webauth logout-window : Enabled Webauth success-window : Enabled Consent Email : Disabled Sleeping-Client : Disabled Webauth login-auth-bypass: Security Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1004 Security External Web Authentication (EWA) External Web Authentication (EWA) Configuring EWA with Single WebAuth Server Address and Default Ports (80/443) (CLI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. aaa authentication login Defines the authentication method at login. Example: Device(config)# aaa authentication login WEBAUTH local parameter-map type webauth parameter-map-name Example: Device(config)# parameter-map type webauth ISE-Ext-Webauth_IP Creates the parameter map. The parameter-map-name must not exceed 99 characters. type webauth Example: Device(config-params-parameter-map)# type webauth Configures the webauth type parameter. redirect for-login URL-String Example: Configures the URL string for redirect during login. Device(config-params-parameter-map)# redirect for-login https://192.168.0.98:443/portal/PortalSetup.action?portal=ad64b062-1098-11e7-8591-005056891b52 redirect portal ipv4 ip-address Example: Device(config-params-parameter-map)# redirect portal ipv4 192.168.0.98 Configures the external portal IPv4 address. exit Example: Device(config-params-parameter-map)# exit Returns to global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1005 Configuring EWA with Single WebAuth Server Address and Default Ports (80/443) (CLI) Security Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Step 15 Step 16 Command or Action wlan wlan-name wlan-id SSID-name Example: Device(config)# wlan EWLC3-GUEST 3 EWLC3-GUEST Purpose Configures a WLAN. no security ft adaptive Example: Device(config-wlan)# no security ft adaptive Disables adaptive 11r. no security wpa Example: Device(config-wlan)# no security wpa Disables WPA security. no security wpa wpa2 Example: Device(config-wlan)# no security wpa wpa2 Disables WPA2 security. no security wpa wpa2 ciphers aes Example: Device(config-wlan)# no security wpa wpa2 ciphers aes Disables WPA2 ciphers for AES. no security wpa akm dot1x Example: Device(config-wlan)# no security wpa akm dot1x Disables security AKM for dot1x. security web-auth Enables web authentication for WLAN. Example: Device(config-wlan)# security web-auth security web-auth authentication-list authenticate-list-name Enables authentication list for dot1x security. Example: Device(config-wlan)# security web-auth authentication-list WEBAUTH security web-auth parameter-map Configures the parameter map. parameter-map-name Note If parameter map is not Example: associated with a WLAN, the Device(config-wlan)# security web-auth parameter-map ISE-Ext-Webauth_IP configuration is considered from the global parameter map. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1006 Security Configuring EWA with Multiple Web Servers and/or Ports Different than Default (80/443) Step 17 Command or Action end Example: Device(config-wlan)# end Purpose Returns to privileged EXEC mode. Configuring EWA with Multiple Web Servers and/or Ports Different than Default (80/443) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. ip access-list extended name Defines an extended IPv4 access list using a Example: name, and enters access-list configuration mode. Device(config)# ip access-list extended preauth_ISE_Ext_WA access-list-number permit tcp any host external_web_server_ip_address1 eq port-number Permits access from any host to the external web server port number 8443. Example: Device(config)# 10 permit tcp any host 192.168.0.98 eq 8443 access-list-number permit tcp any host external_web_server_ip_address2 eq port-number Permits access from any host to the external web server port number 8443. Example: Device(config)# 10 permit tcp any host 192.168.0.99 eq 8443 access-list-number permit udp any any eq Permits DNS UDP traffic. domain Example: Device(config)# 20 permit udp any any eq domain access-list-number permit udp any any eq Permits DHCP traffic. bootpc Example: Device(config)# 30 permit udp any any eq bootpc Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1007 Configuring EWA with Multiple Web Servers and/or Ports Different than Default (80/443) Security Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Command or Action Purpose access-list-number permit udp any any eq Permits DHCP traffic. bootps Example: Device(config)# 40 permit udp any any eq bootps access-list-number permit tcp host external_web_server_ip_address1 eq port_number any Example: Device(config)# 50 permit tcp host 192.168.0.98 eq 8443 any Permits the access from the external web server port 8443 to any host. access-list-number permit tcp host external_web_server_ip_address2 eq port_number any Example: Device(config)# 50 permit tcp host 192.168.0.99 eq 8443 any Permits the access from the external web server port 8443 to any host. access-list-number permit tcp any any eq Permits the DNS TCP traffic. domain Example: Device(config)# 60 permit tcp any any eq domain access-list-number deny ip any any Example: Device(config)# 70 deny ip any any Denies all the other traffic. wlan wlan-name wlan-id ssid Example: Device(config)# wlan EWLC3-GUEST 3 EWLC3-GUEST Creates the WLAN. ip access-group web name Example: Device(config-wlan)# ip access-group web preauth_ISE_Ext_WA Configures the IPv4 WLAN web ACL. The variable name specifies the user-defined IPv4 ACL name. end Example: Device(config-wlan)# end Returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1008 Security Configuring Wired Guest EWA with Multiple Web Servers and/or Ports Different than Default (80/443) Configuring Wired Guest EWA with Multiple Web Servers and/or Ports Different than Default (80/443) Before you begin You cannot assign a manual ACL to a wired guest LAN configuration. The workaround is to use the bypass ACL in the global parameter map. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ip access-list extended name Example: Defines an extended IPv4 access list using a name, and enters access-list configuration mode. Device(config)# ip access-list extended BYPASS_ACL Step 3 access-list-number deny ip any host hostname Allows the traffic to switch centrally. Example: Device(config)# 10 deny ip any host 192.168.0.45 Step 4 access-list-number deny ip any host hostname Allows the traffic to switch centrally. Example: Device(config)# 20 deny ip any host 4.0.0.1 Step 5 parameter-map type webauth global Example: Device(config)# parameter-map type webauth global Creates a parameter map and enters parameter-map webauth configuration mode. Step 6 webauth-bypass-intercept name Example: Device(config-params-parameter-map)# webauth-bypass-intercept BYPASS_ACL Creates a WebAuth bypass intercept using the ACL name. Note You cannot apply a manual ACL to the wired guest profile and configure an external web authentication with multiple IP addresses or different ports. The workaround is to use the bypass ACL for wired guest profile. Step 7 end Example: Returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1009 Authentication for Sleeping Clients Security Command or Action Purpose Device(config-params-parameter-map)# end Authentication for Sleeping Clients Information About Authenticating Sleeping Clients Clients with guest access that have had successful web authentication are allowed to sleep and wake up without having to go through another authentication process through the login page. You can configure the duration for which sleeping clients should be remembered for before reauthentication becomes necessary. The valid range is 10 minutes to 43200 minutes, with the default being 720 minutes. You can also configure this duration on WebAuth parameter map that is mapped to a WLAN. Note that the sleeping client timer comes into effect due to instances such as idle timeout, session timeout, disabling of the WLAN, and the AP being nonoperational. This feature is supported in the following FlexConnect scenario: local switching and central authentication. Caution If the MAC address of a client that goes to sleep mode is spoofed, the fake device such as a laptop can be authenticated. Mobility Scenarios Following are some guidelines in a mobility scenario: · L2 roaming in the same subnet is supported. · Anchor sleeping timer is applicable. · The sleeping client information is shared between multiple autoanchors when a sleeping client moves from one anchor to another. A sleeping client does not require reauthentication in the following scenarios: · Suppose there are two controller s in a mobility group. A client that is associated with one controller goes to sleep and then wakes up and gets associated with the other controller . · Suppose there are three controller s in a mobility group. A client that is associated with the second controller that is anchored to the first controller goes to sleep, wakes up, and gets associated with the third controller . · A client sleeps, wakes up and gets associated with the same or different export foreign controller that is anchored to the export anchor. Restrictions on Authenticating Sleeping Clients · The sleep client feature works only for WLAN configured with WebAuth security. · You can configure the sleeping clients only on a per WebAuth parameter-map basis. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1010 Security Configuring Authentication for Sleeping Clients (GUI) · The authentication of sleeping clients feature is supported only on WLANs that have Layer 3 security enabled. · With Layer 3 security, the Authentication, Passthrough, and On MAC Filter failure web policies are supported. The Conditional Web Redirect and Splash Page Web Redirect web policies are not supported. · The central web authentication of sleeping clients is not supported. · The authentication of sleeping clients feature is not supported on guest LANs and remote LANs. · A guest access sleeping client that has a local user policy is not supported. In this case, the WLAN-specific timer is applied. Configuring Authentication for Sleeping Clients (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Security > Web Auth. In the Webauth Parameter Map tab, click the parameter map name. The Edit WebAuth Parameter window is displayed. Select Sleeping Client Status check box. Click Update & Apply to Device. Configuring Authentication for Sleeping Clients (CLI) Procedure Step 1 Command or Action [no] parameter-map type webauth {parameter-map-name | global} Example: Device(config)# parameter-map type webauth global Step 2 sleeping-client [timeout time] Example: Device(config-params-parameter-map)# sleeping-client timeout 100 Purpose Creates a parameter map and enters parameter-map webauth configuration mode. Configures the sleeping client timeout to 100 minutes. Valid range is between 10 minutes and 43200 minutes. Note If you do not use the timeout keyword, the sleeping client is configured with the default timeout value of 720 minutes. Step 3 end Exits parameter-map webauth configuration mode and returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1011 Sleeping Clients with Multiple Authentications Security Step 4 Step 5 Command or Action Purpose (Optional) show wireless client sleeping-client Shows the MAC address of the clients and the Example: time remaining in their respective sessions. Device# show wireless client sleeping-client (Optional) clear wireless client sleeping-client [mac-address mac-addr] Example: Device# clear wireless client sleeping-client mac-address 00e1.e1e1.0001 · clear wireless client sleeping-client--Deletes all sleeping client entries from the sleeping client cache. · clear wireless client sleeping-client mac-address mac-addr--Deletes the specific MAC entry from the sleeping client cache. Sleeping Clients with Multiple Authentications Mobility Support for Sleeping Clients From Release 17.1.1 onwards, mobility support for guest and nonguest sleeping clients. Supported Combinations of Multiple Authentications Multiple authentication feature supports sleeping clients configured in the WLAN profile. The following table outlines the supported combination of multiple authentications: Table 75: Supported Combinations of Multiple Authentications Layer 2 MAB MAB Failure Dot1x PSK Layer 3 LWA LWA LWA LWA Supported Yes Yes Yes Yes Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1012 Security Configuring Sleeping Clients with Multiple Authentications Configuring Sleeping Clients with Multiple Authentications Configuring WLAN for Dot1x and Local Web Authentication Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 wlan profile-name wlan-id SSID_name Example: Device(config)# wlan wlan-test 3 ssid-test Enters WLAN configuration submode. · profile-name - Profile name of the configured WLAN. · wlan-id - Wireless LAN identifier. Range is from 1 to 512. · SSID_Name - SSID, which can contain up to 32 alphanumeric characters. security dot1x authentication-list auth-list-name Example: Device(config-wlan)# security dot1x authentication-list default Enables security authentication list for dot1x security. The configuration is similar for all dot1x security WLANs. security web-auth Configures web authentication. Example: Device(config-wlan)# security web-auth security web-auth authentication-list authenticate-list-name Enables authentication list for dot1x security. Example: Device(config-wlan)# security web-auth authentication-list default security web-auth parameter-map parameter-map-name Example: Device(config-wlan)# security web-auth parameter-map global Maps the parameter map. Note: If the parameter map is not associated with a WLAN, the configuration is considered from the global parameter map. no shutdown Example: Enables WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1013 Configuring a WLAN for MAC Authentication Bypass and Local Web Authentication Security Command or Action Device(config-wlan)# no shutdown Purpose Configuring a WLAN for MAC Authentication Bypass and Local Web Authentication Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wlan profile-name wlan-id SSID_name Example: Device(config)# wlan wlan-test 3 ssid-test Purpose Enters global configuration mode. Enters WLAN configuration submode. · profile-name - Profile name of the configured WLAN. · wlan-id - Wireless LAN identifier. Range is from 1 to 512. · SSID_Name - SSID, which can contain up to 32 alphanumeric characters. Step 3 Step 4 Step 5 Step 6 Step 7 mac-filtering list-name Example: Device(config-wlan)# mac-filtering cat-radius Sets the MAC filtering parameters. no security wpa akm dot1x Example: Device(config-wlan)# no security wpa akm dot1x Disables security AKM for dot1x. no security wpa wpa2 ciphers aes Disables the WPA2 cipher. Example: aes--Excryption type that specifies WPA/AES Device(config-wlan)# no security wpa wpa2 support. ciphers aes security web-auth parameter-map parameter-map-name Example: Device(config-wlan)# security web-auth parameter-map global Maps the parameter map. Note: If parameter map is not associated with a WLAN, the configuration is considered from the global parameter map. no shutdown Example: Enables WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1014 Security Configuring a WLAN for Local Web Authentication and MAC Filtering Command or Action Device(config-wlan)# no shutdown Purpose Configuring a WLAN for Local Web Authentication and MAC Filtering Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 wlan profile-name wlan-id SSID_name Example: Device(config)# wlan wlan-test 3 ssid-test Enters WLAN configuration submode. · profile-name - Profile name of the configured WLAN. · wlan-id - Wireless LAN identifier. Range is from 1 to 512. · SSID_Name - SSID, which can contain up to 32 alphanumeric characters. mac-filtering list-name Example: Device(config-wlan)# mac-filtering cat-radius Sets the MAC filtering parameters. no security wpa akm dot1x Example: Device(config-wlan)# no security wpa akm dot1x Disables security Authenticated Key Management (AKM) for dot1x. no security wpa wpa2 ciphers aes Disables the WPA2 cipher. Example: aes: Excryption type that specifies WPA/AES Device(config-wlan)# no security wpa wpa2 support. ciphers aes security web-auth on-macfilter-failure Example: Configures the fallback policy with MAC filtering and web authentication. Device(config-wlan)# security web-auth on-macfilter-failure wlan-id security web-auth parameter-map parameter-map-name Maps the parameter map. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1015 Configuring a PSK + LWA in a WLAN Security Step 8 Command or Action Purpose Example: Note: If the parameter map is not associated Device(config-wlan)# security web-auth with a WLAN, the configuration is considered parameter-map global from the global parameter map. no shutdown Example: Device(config-wlan)# no shutdown Enables WLAN. Configuring a PSK + LWA in a WLAN Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wlan profile-name wlan-id SSID_name Example: Device(config)# wlan wlan-test 3 ssid-test Purpose Enters global configuration mode. Enters WLAN configuration submode. · profile-name - Profile name of the configured WLAN. · wlan-id - Wireless LAN identifier. Range is from 1 to 512. · SSID_Name - SSID, which can contain up to 32 alphanumeric characters. Step 3 Step 4 Step 5 Step 6 no security wpa akm dot1x Example: Device(config-wlan)# no security wpa akm dot1x Disables security AKM for dot1x. security web-auth Enables web authentication for a WLAN. Example: Device(config-wlan)# security web-auth no security wpa wpa2 ciphers aes Disables the WPA2 cipher. Example: aes: Excryption type that specifies WPA/AES Device(config-wlan)# no security wpa wpa2 support. ciphers aes security wpa psk set-key ascii ascii/hex key Configures the preshared key on a WLAN. Example: Device(config-wlan)# security wpa psk set-key ascii 0 1234567 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1016 Security Configuring a Sleeping Client Step 7 Step 8 Step 9 Command or Action security wpa akm psk Example: Device(config-wlan)# security wpa akm psk Purpose Configures PSK support. security web-auth authentication-list authenticate-list-name Enables the authentication list for dot1x security. Example: Device(config-wlan)# security web-auth authentication-list default security web-auth parameter-map parameter-map-name Example: Device(config-wlan)# security web-auth parameter-map global Maps the parameter map. Note: If the parameter map is not associated with a WLAN, the configuration is considered from the global parameter map. Configuring a Sleeping Client Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 Step 3 parameter-map type webauth {parameter-map-name | global} Example: Device(config)# parameter-map type webauth MAP-2 sleeping client [timeout time] Example: Device(config-params-parameter-map)# sleeping-client timeout 60 Creates a parameter map and enters parameter-map-name configuration mode. The specific configuration commands supported for a global parameter map defined with the global keyword differ from the commands supported for a named parameter map defined with the parameter-map-name argument. Configures the sleeping client timeout, in minutes. The available range for the time argument is from 10 to 43200. Note: If you do not use the timeout keyword, the sleeping client is configured with the default timeout value of 720 minutes. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1017 Verifying a Sleeping Client Configuration Security Verifying a Sleeping Client Configuration To verify a sleeping client configuration, use the following command: Device# show wireless client sleeping-client Total number of sleeping-client entries: 1 MAC Address Remaining time (mm:ss) -------------------------------------------------------- 2477.031b.aa18 59:56 Multi Authentication Combination with 802.1X Authentication and Local Web Authentication Feature History for Multiauthentication Combination of 802.1X and Local Web Authentication This table provides release and related information about the feature explained in this section. This feature is also available in all the releases subsequent to the one in which they are introduced in, unless noted otherwise. Table 76: Feature History for Multiauthentication Combination of 802.1X and Local Web Authentication Release Feature Feature Information Cisco IOS XE Dublin Multiauthentication Combination This feature supports the merging of applied 17.11.1 of 802.1X and Local Web policies during multiauthentication of 802.1X or Authentication MAC authentication bypass (MAB) and local web authentication (LWA). InformationAboutMultiauthenticationCombinationwith802.1XAuthentication and Local Web Authentication In a wireless setup, for example, in a university, clients authenticate through 802.1X authentication. Because the 802.1X (dot1X) authentication process is secure and does not require user intervention, the end-users are unaware of the network that their devices are connected to. This could lead to serious concerns if they connect to the university's wireless network and post inappropriate content or access restricted content. To avoid this situation, web authentication (webauth) and 802.1X authentication are configured in the network. End-user consent is used as a part of webauth to inform users that they are connected to the university's Wi-Fi network. When the end-users accept the credentials for consent, AAA policies are not applied. The AAA policies that were applied earlier are deleted, resulting in a VLAN change and client disconnection. A new command is introduced in Cisco IOS XE Dublin 17.11.1 to fix this issue. When you run the consent activation-mode merge command, the policy that is applied through consent is merged with the policy applied Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1018 Security Limitations for Multi Authentication Combination of 802.1X and Local Web Authentication for 802.1X or MAC Authentication Bypass (MAB) authentication, thereby allowing clients to access the network. This command is available in parameter-map mode, which is configured with type consent command. Limitations for Multi Authentication Combination of 802.1X and Local Web Authentication The following are the limitations for multiauthentication combination of 802.1X authentication and LWA: · It is not possible to configure this feature on the controller GUI. · SNMP is not supported. · When the consent activation-mode merge command is not configured on the webauth parameter map, the default activation mode is Replace. This means that the user profile for consent replaces all the user profile policies that were previously applied. Enabling the Multiauthentication Combination of 802.1X Authentication and Local Web Authentication (CLI) Before you begin Ensure that you have working knowledge of multiauthentication concepts, LWA (consent), and AAA override. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enter global configuration mode. Step 2 parameter-map type webauth parameter-map-name Example: Device(config)# parameter-map type webauth parameter-map1 Configures the webauth type parameter. Enters the parameter map configuration mode. Step 3 type consent Configures the type as consent. Example: Device(config-params-parameter-map)# type consent Step 4 [no] consent {activation-mode merge | email} Enables policy activation mode and merges the Example: Device(config-params-parameter-map)# previous policy. Run the no form of this command to disable the feature. consent activation-mode merge Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1019 Verifying Multiauthentication Combination with 802.1X Authentication and Local Web Authentication Security Verifying Multiauthentication Combination with 802.1X Authentication and Local Web Authentication To verify the multiauthentication combination with 802.1X authentication and LWA, run the following command: Device# show parameter-map type webauth lwa-consent Parameter Map Name : lwa_consent Banner Title : Consent Title Banner Text : Please accept the consent Type : consent Auth-proxy Init State time : 300 sec Webauth max-http connection : 200 Webauth logout-window : Enabled Webauth success-window : Enabled Consent Email : Disabled Activation Mode : Merge Sleeping-Client : Disabled Webauth login-auth-bypass: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1020 9 4 C H A P T E R Central Web Authentication · Information About Central Web Authentication, on page 1021 · How to Configure ISE, on page 1022 · How to Configure Central Web Authentication on the Controller, on page 1024 · Authentication for Sleeping Clients, on page 1031 · Sleeping Clients with Multiple Authentications, on page 1033 Information About Central Web Authentication Central web authentication offers the possibility to have a central device that acts as a web portal (in this example, the ISE). The major difference compared to the usual local web authentication is that it is shifted to Layer 2 along with MAC filtering or dot1x authentication. The concept also differs in that the radius server (ISE in this example) returns special attributes that indicate to the switch that a web redirection must occur. This solution eliminates any delay to start the web authentication. The following are the different types of web authentication methods: · Local Web Authentication (LWA): Configured as Layer 3 security on the controller, the web authentication page and the pre-authentication ACL are locally configured on the controller. The controller intercepts htttp(s) traffic and redirects the client to the internal web page for authentication. The credentials entered by the client on the login page is authenticated by the controller locally or through a RADIUS or LDAP server. · External Web Authentication (EWA): Configured as Layer 3 security on the controller, the controller intercepts htttp(s) traffic and redirects the client to the login page hosted on the external web server. The credentials entered by the client on the login page is authenticated by the controller locally or through a RADIUS or LDAP server. The pre-authentication ACL is configured statically on the controller. · Central Web Authentication (CWA): Configured mostly as Layer 2 security on the controller, the redirection URL and the pre-authentication ACL reside on ISE and are pushed during layer 2 authentication to the controller. The controller redirects all web traffic from the client to the ISE login page. ISE validates the credentials entered by the client through HTTPS and authenticates the user. Globally, if the MAC address of the client station is not known by the radius server (but other criteria can also be used), the server returns the redirection attributes, and the controller authorizes the station (using the MAC filtering) but places an access list to redirect the web traffic to the portal. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1021 Prerequisites for Central Web Authentication Security Once the user logs into the guest portal, it is possible to re-authenticate the client so that a new Layer 2 MAC filtering occurs using the Change of Authorization (CoA). This way, the ISE remembers that it was a webauth user and pushes the necessary authorization attributes to the controller for accessing the network. Prerequisites for Central Web Authentication · Cisco Identity Services Engine (ISE) How to Configure ISE To configure ISE, proceed as follows: 1. Create an authorization profile. 2. Create an authentication rule. 3. Create an authorization rule. Creating an Authorization Profile Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Click Policy, and click Policy Elements. Click Results. Expand Authorization, and click Authorization Profiles. Click Add to create a new authorization profile for central webauth. In the Name field, enter a name for the profile. For example, CentralWebauth. Choose ACCESS_ACCEPT from the Access Type drop-down list. Check the Web Redirection (CWA, MDM, NSP, CPP) check box, and choose Centralized Web Auth from the drop-down list. In the ACL field, enter the name of the ACL that defines the traffic to be redirected. For example, redirect. In the Value field, choose the default or customized values. The Value attribute defines whether the ISE sees the default or a custom web portal that the ISE admin created. Click Save. Creating an Authentication Rule Follow the procedure given below to use the authentication profile and create the authentication rule: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1022 Security Creating an Authorization Rule Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 In the Policy > Authentication page, click Authentication. Enter a name for your authentication rule. For example, MAB. In the If condition field, select the plus (+) icon. Choose Compound condition, and choose Wireless_MAB. Click the arrow located next to and ... in order to expand the rule further. Click the + icon in the Identity Source field, and choose Internal endpoints. Choose Continue from the 'If user not found' drop-down list. This option allows a device to be authenticated even if its MAC address is not known. Click Save. Creating an Authorization Rule You can configure many rules in the authorization policy. The MAC not known rule is configured in this section: Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Click Policy > Authorization. In the Rule Name field, enter a name. For example: Mac not known. In the Conditions field, click the plus (+) icon. Choose Compound Conditions, and choose Wireless_MAB. From the settings icon, select Add Attribute/Value from the options. In the Description field, choose Network Access > AuthenticationStatus as the attribute from the drop-down list. Choose the Equals operator. From the right-hand field, choose UnknownUser. In the Permissions field, choose the authorization profile name that you had created earlier. The ISE continues even though the user (or MAC) is not known. Unknown users are now presented with the Login page. However, once they enter their credentials, they are presented again with an authentication request on the ISE; therefore, another rule must be configured with a condition that is met if the user is a guest user. For example, if UseridentityGroup Equals Guest is used then it is assumed that all guests belong to this group. In the Conditions field, click the plus (+) icon. Choose Compound Conditions, and choose to create a new condition. The new rule must come before the MAC not known rule. From the settings icon, select Add Attribute/Value from the options. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1023 How to Configure Central Web Authentication on the Controller Security Step 13 Step 14 Step 15 Step 16 In the Description field, choose Network Access > UseCase as the attribute from the drop-down list. Choose the Equals operator. From the right-hand field, choose GuestFlow. In the Permissions field, click the plus (+) icon to select a result for your rule. You can choose Standard > PermitAccess option or create a custom profile to return the attributes that you like. When the user is authorized on the login page, the ISE triggers a COA that results in the restart of Layer 2 authentication. When the user is identified as a guest user, the user is authorized. How to Configure Central Web Authentication on the Controller To configure central web authentication on the controller, proceed as follows: 1. Configure WLAN. 2. Configure policy profile. 3. Configure redirect ACL. 4. Configure AAA for central web authentication. 5. Configure redirect ACL in Flex profile. Configuring WLAN (GUI) Before you begin You need to enable MAC filtering for Layer 2 authentication to download the redirect URL and ACL. Procedure Step 1 Step 2 Step 3 Choose Configuration > Tags & Profiles > WLANs. In the WLANs window, click the name of the WLAN or click Add to create a new one. In the Add/Edit WLAN window that is displayed, click the General tab to configure the following parameters. · In the Profile Name field, enter or edit the name of the profile. · In the SSID field, enter or edit the SSID name. The SSID name can be alphanumeric, and up to 32 characters in length. · In the WLAN ID field, enter or edit the ID number.The valid range is between 1 and 512. · From the Radio Policy drop-down list, choose the 802.11 radio band. · Using the Broadcast SSID toggle button, change the status to either Enabled or Disabled . · Using the Status toggle button, change the status to either Enabled or Disabled . Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1024 Security Configuring WLAN (CLI) Step 4 Step 5 Click the Security tab, and then Layer 2 tab to configre the following parameters: · From the Layer 2 Security Mode drop-down list, choose None. .This setting disables Layer 2 security. · Enter the Reassociation Timeout value, in seconds. This is the time after which a fast transition reassociation times out. · Check the Over the DS check box to enable Fast Transition over a distributed system. · Choose OWE, Opportunistic Wireless Encryption (OWE) provides data confidentiality with encryption over the air between an AP radio and a wireless client. OWE Transition Mode is meant to provide a sort of backwards compatibility. · Choose Fast Transition, 802.11r which is the IEEE standard for fast roaming, introduces a new concept of roaming where the initial handshake with a new AP is done even before the corresponding client roams to the target access point. This concept is called Fast Transition. · Check the check box to enable MAC filtering in the WLAN. · Check the Lobby Admin Access check box to enable Lobby Admin access. Click Save & Apply to Device. Configuring WLAN (CLI) Note You need to enable MAC filtering for Layer 2 authentication to download the redirect URL and ACL. After completing the WLAN configuration, if the changes are not pushed to all the APs, the following syslog message appears: 2021/01/06 16:20:00.597927186 {wncd_x_R0-4}{1}: [wlanmgr-db] [20583]: UUID: 0, ra: 0, TID: 0 (note): Unable to push WLAN config changes to all APs, cleanup required for WlanId: 2, profile: wlan1 state: Delete pending If the above mentioned syslog message appears for more than six minutes, reload the controller. If the controller does not reload and still the syslog message appears, then collect the archive logs, wncd core file, and raise a case by clicking the following link: Support Case Manager. Procedure Step 1 Command or Action Purpose wlan wlan-name wlan-id SSID-name Enters the WLAN configuration sub-mode. Example: Device(config)# wlan wlanProfileName 1 ngwcSSID wlan-name is the name of the configured WLAN. wlan-id is the wireless LAN identifier. The range is 1 to 512. SSID-name is the SSID name which can contain 32 alphanumeric characters. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1025 Configuring Policy Profile (CLI) Security Step 2 Step 3 Step 4 Step 5 Command or Action Purpose Note If you have already configured this command, enter wlan wlan-name command. mac-filtering [name] Enables MAC filtering on a WLAN. Example: Note Device(config-wlan)# mac-filtering name While configuring mac-filtering the default authentication list is considered, if the authentication list is not configured earlier. no security wpa Example: Device(config-wlan)# no security wpa no shutdown Example: Device(config-wlan)# no shutdown end Example: Device(config-wlan)# end Disable WPA security. Enables the WLAN. Returns to privileged EXEC mode. Example Device# config terminal Device(config)# wlan wlanProfileName 1 ngwcSSID Device(config-wlan)# mac-filtering default Device(config-wlan)# no security wpa Device(config-wlan)# no shutdown Device(config-wlan)# end Configuring Policy Profile (CLI) Note You need a AAA override to apply policies coming from the AAA or ISE servers. When a redirect URL and redirect ACL is received from the ISE server, NAC is used to trigger the Central Web Authentication (CWA). Both NAC and AAA override must be available in the policy profile to which the client is being associated. The default policy profile is associated to an AP, if the AP is not associated to any other policy profiles. Procedure Step 1 Command or Action Purpose wireless profile policy default-policy-profile Sets the policy profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1026 Security Configuring a Policy Profile (GUI) Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action Purpose Example: Device(config)# wireless profile policy default-policy-profile vlan vlan-id Maps the VLAN to a policy profile. If vlan-id Example: is not specified, the default native vlan 1 is applied. The valid range for vlan-id is 1 to 4096. Device(config-wireless-policy)# vlan 41 Management VLAN is applied if no VLAN is configured on the policy profile. aaa-override Example: Device(config-wireless-policy)# aaa-override Configures AAA override to apply policies coming from the AAA or ISE servers. nac Example: Device(config-wireless-policy)# nac Configures Network Access Control in the policy profile. NAC is used to trigger the Central Web Authentication (CWA). no shutdown Example: Device(config-wireless-policy)# no shutdown Enables the WLAN. end Example: Device(config-wireless-policy)# end Returns to privileged EXEC mode. Example Device# configure terminal Device(config)# wireless profile policy default-policy-profile Device(config-wireless-policy)# vlan 41 Device(config-wireless-policy)# aaa-override Device(config-wireless-policy)# nac Device(config-wireless-policy)# no shutdown Device(config-wireless-policy)# end Configuring a Policy Profile (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Tags & Profiles > Policy. On the Policy Profile page, click Add. In the Add Policy Profile window, in General Tab, enter a name and description for the policy profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1027 Creating Redirect ACL Security Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 To enable the policy profile, set Status as Enabled. Use the slider to enable or disable Passive Client and Encrypted Traffic Analytics. (Optional) In the CTS Policy section, choose the appropriate status for the following: · Inline Tagging--a transport mechanism using which a controller embedded wireless controller or access point understands the source SGT. · SGACL Enforcement Specify a default SGT. The valid range is from 2 to 65519. In the WLAN Switching Policy section, choose the following, as required: · Central Switching · Central Authentication · Central DHCP · Central Association Enable · Flex NAT/PAT Click Save & Apply to Device. Creating Redirect ACL The redirect ACL is a punt ACL that needs to be predefined on the controller (or the AP in case of FlexConnect local switching): the AAA server returns the name of the ACL and not its definition. The redirect ACL defines traffic (matching "deny"statements, as it denies redirection for it) that will be allowed through on the data plane and traffic (matching "permit" statements) that will be sent to the control plane towards the CPU for further processing (that is, the web interception and redirection in this case). The ACL has implicit (that is, the invisible) statements allowing DHCP and DNS traffic towards all IPs, just like it is the case with LWA. It also ends with a statement that a security ACL implicit deny. Procedure Step 1 Command or Action Purpose ip access-list extended redirect The HTTP and HTTPS browsing does not work Example: without authentication (per the other ACL) as ISE is configured to use a redirect ACL (named Device(config)# ip access-list extended redirect). redirect Step 2 deny ip any host ISE-IP-add Example: Device(config)# deny ip any host 123.123.134.112 Allows traffic to ISE and all other traffic is blocked. Step 3 deny ip host ISE-IP-add any Example: Allows traffic to ISE and all other traffic is blocked. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1028 Security Configuring AAA for Central Web Authentication Step 4 Step 5 Command or Action Device(config)# deny ip host 123.123.134.112 any Purpose Note This ACL is applicable for both local and flex mode. permit TCP any any eq web address/port-number Example: In case of HTTP: Device(config)# permit TCP any any eq www Redirects all HTTP or HTTPS access to the ISE login page. port-number 80 is used for HTTP and port-number 443 is used for HTTPS. For the ACE to allow traffic to ISE, ISE should be configured above the HTTP/HTTPS ACE. Device(config)# permit TCP any any eq 80 Example: In case of HTTPS: Device(config)# permit TCP any any eq 443 end Example: Device(config)# end Returns to privileged EXEC mode. Configuring AAA for Central Web Authentication Procedure Step 1 Command or Action aaa server radius dynamic-author Example: Device(config)# aaa server radius dynamic-author Purpose Configures the Change of Authorization (CoA) on the controller. Step 2 client ISE-IP-add server-key Specifies a RADIUS client and the RADIUS radius-shared-secret key to be shared between a device and a Example: RADIUS client. Device(config-locsvr-da-radius)# client ISE-IP-add is the IP address of the RADIUS 123.123.134.112 server-key client. 0 SECRET server-key is the radius client server-key. radius-shared-secret covers the following: · 0--Specifies unencrypted key. · 6--Specifies encrypted key. · 7--Specifies HIDDEN key. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1029 Configuring Redirect ACL in Flex Profile (GUI) Security Command or Action Purpose · Word--Unencrypted (cleartext) server key. The RADIUS shared secret should not exceed 240 characters while configuring WSMA data in GUI. Note All these steps work only if the AAA configuration is in place. See the Configuring AAA Authentication for details. Example Device# config terminal Device(config)# aaa server radius dynamic-author Device(config-locsvr-da-radius)# client 123.123.134.112 server-key 0 SECRET Device(config-locsvr-da-radius)# end Configuring Redirect ACL in Flex Profile (GUI) The redirect ACL definition must be sent to the access point in the FlexConnect profile. For this, the redirect ACL associated with an AP must be configured in the FlexConnect profile where the client is hosted. If an access point is not configured with any of the FlexConnect profiles, the default FlexConnect profile is associated with it. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Configuration > Tags & Profiles > Flex. On the Flex Profile page, click the name of the FlexConnect profile or click Add to create a new FlexConnect profile. In the Add/Edit Flex Profile window that is displayed, click the Policy ACL tab. Click Add to map an ACL to the FlexConnect profile. Choose the ACL name, enable central web authentication, and specify the preauthentication URL filter. Click Save. Click Update & Apply to Device. Configuring Redirect ACL in Flex Profile (CLI) The redirect ACL definition must be sent to the access point in the Flex profile. For this, the redirect ACL associated to an AP must be configured in the Flex profile where the client is being hosted. If an access point is not configured with any of the Flex profiles, the default Flex profile is associated with it. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1030 Security Authentication for Sleeping Clients Note When the ACL is pushed down to the APs, the permission must change from deny to permit or vice-versa. This change does not occur if the ACL contains an object group, causing the ACL not to be fully translated, which may cause the redirection to fail. Procedure Step 1 Command or Action wireless profile flex default-flex-profile Example: Device(config)# wireless profile flex default-flex-profile Purpose Creates a new flex policy. The default flex profile name is default-flex-profile. Step 2 acl-policy acl policy name Example: Device(config-wireless-flex-profile)# acl-policy acl1 Configures ACL policy. Step 3 central-webauth Configures central web authentication. Example: Device(config-wireless-flex-profile-acl)# central-webauth Step 4 end Returns to privileged EXEC mode. Example: Device(config-wireless-flex-profile-acl)# end Authentication for Sleeping Clients Information About Authenticating Sleeping Clients Clients with guest access that have had successful web authentication are allowed to sleep and wake up without having to go through another authentication process through the login page. You can configure the duration for which sleeping clients should be remembered for before reauthentication becomes necessary. The valid range is 10 minutes to 43200 minutes, with the default being 720 minutes. You can also configure this duration on WebAuth parameter map that is mapped to a WLAN. Note that the sleeping client timer comes into effect due to instances such as idle timeout, session timeout, disabling of the WLAN, and the AP being nonoperational. This feature is supported in the following FlexConnect scenario: local switching and central authentication. Caution If the MAC address of a client that goes to sleep mode is spoofed, the fake device such as a laptop can be authenticated. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1031 Restrictions on Authenticating Sleeping Clients Security Mobility Scenarios Following are some guidelines in a mobility scenario: · L2 roaming in the same subnet is supported. · Anchor sleeping timer is applicable. · The sleeping client information is shared between multiple autoanchors when a sleeping client moves from one anchor to another. A sleeping client does not require reauthentication in the following scenarios: · Suppose there are two controller s in a mobility group. A client that is associated with one controller goes to sleep and then wakes up and gets associated with the other controller . · Suppose there are three controller s in a mobility group. A client that is associated with the second controller that is anchored to the first controller goes to sleep, wakes up, and gets associated with the third controller . · A client sleeps, wakes up and gets associated with the same or different export foreign controller that is anchored to the export anchor. Restrictions on Authenticating Sleeping Clients · The sleep client feature works only for WLAN configured with WebAuth security. · You can configure the sleeping clients only on a per WebAuth parameter-map basis. · The authentication of sleeping clients feature is supported only on WLANs that have Layer 3 security enabled. · With Layer 3 security, the Authentication, Passthrough, and On MAC Filter failure web policies are supported. The Conditional Web Redirect and Splash Page Web Redirect web policies are not supported. · The central web authentication of sleeping clients is not supported. · The authentication of sleeping clients feature is not supported on guest LANs and remote LANs. · A guest access sleeping client that has a local user policy is not supported. In this case, the WLAN-specific timer is applied. Configuring Authentication for Sleeping Clients (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Security > Web Auth. In the Webauth Parameter Map tab, click the parameter map name. The Edit WebAuth Parameter window is displayed. Select Sleeping Client Status check box. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1032 Security Configuring Authentication for Sleeping Clients (CLI) Step 4 Click Update & Apply to Device. Configuring Authentication for Sleeping Clients (CLI) Procedure Step 1 Command or Action [no] parameter-map type webauth {parameter-map-name | global} Example: Device(config)# parameter-map type webauth global Step 2 sleeping-client [timeout time] Example: Device(config-params-parameter-map)# sleeping-client timeout 100 Purpose Creates a parameter map and enters parameter-map webauth configuration mode. Configures the sleeping client timeout to 100 minutes. Valid range is between 10 minutes and 43200 minutes. Note If you do not use the timeout keyword, the sleeping client is configured with the default timeout value of 720 minutes. Step 3 Step 4 Step 5 end Exits parameter-map webauth configuration mode and returns to privileged EXEC mode. (Optional) show wireless client sleeping-client Shows the MAC address of the clients and the Example: time remaining in their respective sessions. Device# show wireless client sleeping-client (Optional) clear wireless client sleeping-client [mac-address mac-addr] Example: Device# clear wireless client sleeping-client mac-address 00e1.e1e1.0001 · clear wireless client sleeping-client--Deletes all sleeping client entries from the sleeping client cache. · clear wireless client sleeping-client mac-address mac-addr--Deletes the specific MAC entry from the sleeping client cache. Sleeping Clients with Multiple Authentications Mobility Support for Sleeping Clients From Release 17.1.1 onwards, mobility support for guest and nonguest sleeping clients. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1033 Supported Combinations of Multiple Authentications Security Supported Combinations of Multiple Authentications Multiple authentication feature supports sleeping clients configured in the WLAN profile. The following table outlines the supported combination of multiple authentications: Table 77: Supported Combinations of Multiple Authentications Layer 2 MAB MAB Failure Dot1x PSK Layer 3 LWA LWA LWA LWA Supported Yes Yes Yes Yes Configuring Sleeping Clients with Multiple Authentications Configuring WLAN for Dot1x and Local Web Authentication Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 Step 3 wlan profile-name wlan-id SSID_name Example: Device(config)# wlan wlan-test 3 ssid-test Enters WLAN configuration submode. · profile-name - Profile name of the configured WLAN. · wlan-id - Wireless LAN identifier. Range is from 1 to 512. · SSID_Name - SSID, which can contain up to 32 alphanumeric characters. security dot1x authentication-list auth-list-name Example: Device(config-wlan)# security dot1x authentication-list default Enables security authentication list for dot1x security. The configuration is similar for all dot1x security WLANs. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1034 Security Configuring a WLAN for MAC Authentication Bypass and Local Web Authentication Step 4 Step 5 Step 6 Step 7 Command or Action Purpose security web-auth Configures web authentication. Example: Device(config-wlan)# security web-auth security web-auth authentication-list authenticate-list-name Enables authentication list for dot1x security. Example: Device(config-wlan)# security web-auth authentication-list default security web-auth parameter-map parameter-map-name Example: Device(config-wlan)# security web-auth parameter-map global Maps the parameter map. Note: If the parameter map is not associated with a WLAN, the configuration is considered from the global parameter map. no shutdown Example: Device(config-wlan)# no shutdown Enables WLAN. Configuring a WLAN for MAC Authentication Bypass and Local Web Authentication Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wlan profile-name wlan-id SSID_name Example: Device(config)# wlan wlan-test 3 ssid-test Step 3 mac-filtering list-name Example: Device(config-wlan)# mac-filtering cat-radius Purpose Enters global configuration mode. Enters WLAN configuration submode. · profile-name - Profile name of the configured WLAN. · wlan-id - Wireless LAN identifier. Range is from 1 to 512. · SSID_Name - SSID, which can contain up to 32 alphanumeric characters. Sets the MAC filtering parameters. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1035 Configuring a WLAN for Local Web Authentication and MAC Filtering Security Step 4 Step 5 Step 6 Step 7 Command or Action no security wpa akm dot1x Example: Device(config-wlan)# no security wpa akm dot1x Purpose Disables security AKM for dot1x. no security wpa wpa2 ciphers aes Disables the WPA2 cipher. Example: aes--Excryption type that specifies WPA/AES Device(config-wlan)# no security wpa wpa2 support. ciphers aes security web-auth parameter-map parameter-map-name Example: Device(config-wlan)# security web-auth parameter-map global Maps the parameter map. Note: If parameter map is not associated with a WLAN, the configuration is considered from the global parameter map. no shutdown Example: Device(config-wlan)# no shutdown Enables WLAN. Configuring a WLAN for Local Web Authentication and MAC Filtering Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 Step 3 wlan profile-name wlan-id SSID_name Example: Device(config)# wlan wlan-test 3 ssid-test mac-filtering list-name Example: Device(config-wlan)# mac-filtering cat-radius Enters WLAN configuration submode. · profile-name - Profile name of the configured WLAN. · wlan-id - Wireless LAN identifier. Range is from 1 to 512. · SSID_Name - SSID, which can contain up to 32 alphanumeric characters. Sets the MAC filtering parameters. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1036 Security Configuring a PSK + LWA in a WLAN Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action no security wpa akm dot1x Example: Device(config-wlan)# no security wpa akm dot1x Purpose Disables security Authenticated Key Management (AKM) for dot1x. no security wpa wpa2 ciphers aes Disables the WPA2 cipher. Example: aes: Excryption type that specifies WPA/AES Device(config-wlan)# no security wpa wpa2 support. ciphers aes security web-auth on-macfilter-failure Example: Configures the fallback policy with MAC filtering and web authentication. Device(config-wlan)# security web-auth on-macfilter-failure wlan-id security web-auth parameter-map parameter-map-name Example: Device(config-wlan)# security web-auth parameter-map global Maps the parameter map. Note: If the parameter map is not associated with a WLAN, the configuration is considered from the global parameter map. no shutdown Example: Device(config-wlan)# no shutdown Enables WLAN. Configuring a PSK + LWA in a WLAN Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wlan profile-name wlan-id SSID_name Example: Device(config)# wlan wlan-test 3 ssid-test Purpose Enters global configuration mode. Enters WLAN configuration submode. · profile-name - Profile name of the configured WLAN. · wlan-id - Wireless LAN identifier. Range is from 1 to 512. · SSID_Name - SSID, which can contain up to 32 alphanumeric characters. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1037 Configuring a Sleeping Client Security Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action no security wpa akm dot1x Example: Device(config-wlan)# no security wpa akm dot1x Purpose Disables security AKM for dot1x. security web-auth Enables web authentication for a WLAN. Example: Device(config-wlan)# security web-auth no security wpa wpa2 ciphers aes Disables the WPA2 cipher. Example: aes: Excryption type that specifies WPA/AES Device(config-wlan)# no security wpa wpa2 support. ciphers aes security wpa psk set-key ascii ascii/hex key Configures the preshared key on a WLAN. Example: Device(config-wlan)# security wpa psk set-key ascii 0 1234567 security wpa akm psk Example: Device(config-wlan)# security wpa akm psk Configures PSK support. security web-auth authentication-list authenticate-list-name Enables the authentication list for dot1x security. Example: Device(config-wlan)# security web-auth authentication-list default security web-auth parameter-map parameter-map-name Example: Device(config-wlan)# security web-auth parameter-map global Maps the parameter map. Note: If the parameter map is not associated with a WLAN, the configuration is considered from the global parameter map. Configuring a Sleeping Client Procedure Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1038 Security Verifying a Sleeping Client Configuration Command or Action Device# configure terminal Purpose Step 2 Step 3 parameter-map type webauth {parameter-map-name | global} Example: Device(config)# parameter-map type webauth MAP-2 sleeping client [timeout time] Example: Device(config-params-parameter-map)# sleeping-client timeout 60 Creates a parameter map and enters parameter-map-name configuration mode. The specific configuration commands supported for a global parameter map defined with the global keyword differ from the commands supported for a named parameter map defined with the parameter-map-name argument. Configures the sleeping client timeout, in minutes. The available range for the time argument is from 10 to 43200. Note: If you do not use the timeout keyword, the sleeping client is configured with the default timeout value of 720 minutes. Verifying a Sleeping Client Configuration To verify a sleeping client configuration, use the following command: Device# show wireless client sleeping-client Total number of sleeping-client entries: 1 MAC Address Remaining time (mm:ss) -------------------------------------------------------- 2477.031b.aa18 59:56 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1039 Verifying a Sleeping Client Configuration Security Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1040 9 5 C H A P T E R Private Shared Key · Information About Private Preshared Key, on page 1041 · Configuring a PSK in a WLAN (CLI), on page 1042 · Configuring a PSK in a WLAN (GUI), on page 1043 · Applying a Policy Profile to a WLAN (GUI), on page 1044 · Applying a Policy Profile to a WLAN (CLI), on page 1044 · Verifying a Private PSK, on page 1045 Information About Private Preshared Key With the advent of Internet of Things (IoT), the number of devices that connect to the internet has increased multifold. Not all of these devices support the 802.1x supplicant and need an alternate mechanism to connect to the internet. One of the security mechanisms, WPA-PSK, could be considered as an alternative. With the current configuration, the PSK is the same for all the clients that connect to the same WLAN. In certain deployments, such as educational institutions, this results in the key being shared to unauthorized users leading to security breach. This necessitates the need to provision unique PSKs for different clients on a large scale. Identity PSKs are unique PSKs created for individuals or groups of users on the same SSID. No complex configuration is required for the clients. It provides the same simplicity of PSK, making it ideal for IoT, Bring your own device (BYOD), and guest deployments. Identity PSKs are supported on most devices, in which 802.1X is not, enabling stronger security for IoT. It is possible to easily revoke access, for a single device or individual without affecting everyone else. Thousands of keys can easily be managed and distributed through the AAA server. Note Special characters, such as '<' and `>' are supported in SSID Preshared key. Note PSK supports whitespace in passwords (before or after or in-between) within double quotes only; single quotes for whitespaces are not supported. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1041 Configuring a PSK in a WLAN (CLI) Security IPSK Solution During client authentication, the AAA server authorizes the client MAC address and sends the passphrase (if configured) as part of the Cisco-AV pair list. The Cisco Wireless Controller (WLC) receives this as part of the RADIUS response and processes this further for the computation of PSKs. When a client sends an association request to the SSID broadcast by the corresponding access point, the controller forms the RADIUS request packet with the particular mac address of the client and relays to the RADIUS server. The RADIUS server performs the authentication and checks whether the client is allowed or not and sends either ACCESS-ACCEPT or ACCESS-REJECT as response to the WLC. To support Identity PSKs, in addition to sending the authentication response, the authentication server also provides the AV pair passphrase for this specific client. This is used for the computation of the PMK. The RADIUS server might also provide additional parameters, such as username, VLAN, Quality of Service (QoS), and so on, in the response, that is specific to this client. For multiple devices owned by a single user, the passphrase can remain the same. Note When the PSK length is less than 15 characters in Federal Information Processing Standard (FIPS), the controller allows the WLAN configuration but displays the following error message on the console: "AP is allowed to join but corresponding WLAN will not be pushed to the access point" Configuring a PSK in a WLAN (CLI) Follow the procedure given below to configure a PSK in a WLAN: Before you begin · Security should be configured for a pre-shared key (PSK) in a WLAN. · If there is no override from the AAA server, the value on the corresponding WLAN is considered for authentication. · In Federal Information Processing Standard (FIPS) and common criteria mode, ensure that the PSK WLAN has a minimum of 15 ASCII characters, else APs won't join the controller. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wlan wlan-name wlan-id ssid Configures the WLAN and SSID. Example: Device(config)# wlan test-profile 4 abc Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1042 Security Configuring a PSK in a WLAN (GUI) Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action Purpose no security wpa akm dot1x Disables security AKM for dot1x. Example: Device(config-wlan)# no security wpa akm dot1x security wpa akm psk Example: Device(config-wlan)# security wpa akm psk Configures the security type PSK. security wpa akm psk set-key ascii/hex key Example: Device(config-wlan)# security wpa akm psk set-key asci 0 Configures the PSK authenticated key management (AKM) shared key. Note You must set the psk set-key before configuring AKM PSK. security wpa akm psk Example: Device(config-wlan)# security wpa akm psk Configures PSK support. security wpa wpa2 mpsk Example: Device(config-wlan)# security wpa wpa2 mpsk Configures multi-preshared key (MPSK) support. Note AKM PSK should be enabled for MPSK to work. mac-filtering auth-list-name Specifies MAC filtering in a WLAN. Example: Device(config-wlan)# mac-filtering test1 Configuring a PSK in a WLAN (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > WLANs. On the Wireless Networks page, click Security tab. In the Layer 2 window that is displayed, go to the WPA Parameters section. From the Auth Key Mgmt drop-down, select the PSK format and type. Enter the Pre-Shared Key in hexadecimal characters. · If you selected the PSK format as HEX, the key length must be exactly 64 characters. · If you selected the PSK format as ASCII, the key length must be in the range of 8-63 characters. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1043 Applying a Policy Profile to a WLAN (GUI) Security Step 6 Note that once you have configured the key, these details are not visible even if you click on the eye icon next to the preshared key box, due to security reasons. Click Save & Apply to Device. Applying a Policy Profile to a WLAN (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Configuration > Tags & Profiles > Tags. On theManage Tags page, click Policy tab. Click Add to view the Add Policy Tag window. Enter a name and description for the policy tag. Click Add to map WLAN and policy. Choose the WLAN profile to map with the appropriate policy profile, and click the tick icon. Click Save & Apply to Device. Applying a Policy Profile to a WLAN (CLI) Follow the procedure given below to a apply policy profile to a WLAN: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy policy-profile-name Configures the default policy profile. Example: Device(config)# wireless profile policy policy-iot Step 3 aaa-override Example: Device(config-wireless-policy)# aaa-override Configures AAA override to apply policies coming from the AAA server or ISE the Cisco Identify Services Engine (ISE) server. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1044 Security Verifying a Private PSK Verifying a Private PSK Use the following show commands to verify the configuration of a WLAN and a client: Device# show wlan id 2 WLAN Profile Name : test_ppsk ================================================ Identifier :2 Network Name (SSID) : test_ppsk Status : Enabled Broadcast SSID : Enabled Universal AP Admin : Disabled Max Associated Clients per WLAN :0 Max Associated Clients per AP per WLAN :0 Max Associated Clients per AP Radio per WLAN : 0 Number of Active Clients :0 Exclusionlist Timeout : 60 CHD per WLAN : Enabled Interface : default Multicast Interface : Unconfigured WMM : Allowed WifiDirect : Invalid Channel Scan Defer Priority: Priority (default) :4 Priority (default) :5 Priority (default) :6 Scan Defer Time (msecs) : 100 Media Stream Multicast-direct : Disabled CCX - AironetIe Support : Enabled CCX - Diagnostics Channel Capability : Disabled Peer-to-Peer Blocking Action : Disabled Radio Policy : All DTIM period for 802.11a radio :1 DTIM period for 802.11b radio :1 Local EAP Authentication : Disabled Mac Filter Authorization list name : test1 Accounting list name : Disabled 802.1x authentication list name : Disabled Security 802.11 Authentication : Open System Static WEP Keys : Disabled 802.1X : Disabled Wi-Fi Protected Access (WPA/WPA2) : Enabled WPA (SSN IE) : Disabled WPA2 (RSN IE) : Enabled TKIP Cipher : Disabled AES Cipher : Enabled Auth Key Management 802.1x : Disabled PSK : Enabled CCKM : Disabled FT dot1x : Disabled FT PSK : Disabled PMF dot1x : Disabled PMF PSK : Disabled CCKM TSF Tolerance : 1000 FT Support : Disabled FT Reassociation Timeout : 20 FT Over-The-DS mode : Enabled PMF Support : Disabled Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1045 Verifying a Private PSK PMF Association Comeback Timeout PMF SA Query Time Web Based Authentication Conditional Web Redirect Splash-Page Web Redirect Webauth On-mac-filter Failure Webauth Authentication List Name Webauth Parameter Map Tkip MIC Countermeasure Hold-down Timer Call Snooping Passive Client Non Cisco WGB Band Select Load Balancing Multicast Buffer Multicast Buffer Size IP Source Guard Assisted-Roaming Neighbor List Prediction List Dual Band Support IEEE 802.11v parameters Directed Multicast Service BSS Max Idle Protected Mode Traffic Filtering Service BSS Transition Disassociation Imminent Optimised Roaming Timer Timer WNM Sleep Mode 802.11ac MU-MIMO :1 : 200 : Disabled : Disabled : Disabled : Disabled : Disabled : Disabled : 60 : Disabled : Disabled : Disabled : Disabled : Disabled : Disabled :0 : Disabled : Disabled : Disabled : Disabled : Disabled : Disabled : Disabled : Disabled : Enabled : Disabled : 40 : 200 : Disabled : Disabled Device# show wireless client mac-address a886.adb2.05f9 detail Client MAC Address : a886.adb2.05f9 Client IPv4 Address : 9.9.58.246 Client Username : A8-86-AD-B2-05-F9 AP MAC Address : c025.5c55.e400 AP Name: saurabh-3600 AP slot : 1 Client State : Associated Policy Profile : default-policy-profile Flex Profile : default-flex-profile Wireless LAN Id : 6 Wireless LAN Name: SSS_PPSK BSSID : c025.5c55.e40f Connected For : 280 seconds Protocol : 802.11n - 5 GHz Channel : 60 Client IIF-ID : 0xa0000001 Association Id : 1 Authentication Algorithm : Open System Client CCX version : No CCX support Session Timeout : 320 sec (Remaining time: 40 sec) Input Policy Name : Input Policy State : None Input Policy Source : None Output Policy Name : Output Policy State : None Output Policy Source : None WMM Support : Enabled U-APSD Support : Enabled Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1046 Security Security Verifying a Private PSK U-APSD value : 0 APSD ACs : BK, BE, VI, VO Fastlane Support : Disabled Power Save : OFF Current Rate : m22 Supported Rates : 9.0,18.0,36.0,48.0,54.0 Mobility: Move Count :0 Mobility Role : Local Mobility Roam Type : None Mobility Complete Timestamp : 09/27/2017 16:32:25 IST Policy Manager State: Run NPU Fast Fast Notified : No Last Policy Manager State : IP Learn Complete Client Entry Create Time : 280 seconds Policy Type : WPA2 Encryption Cipher : CCMP (AES) Authentication Key Management : PSK AAA override passphrase: Yes Management Frame Protection : No Protected Management Frame - 802.11w : No EAP Type : Not Applicable VLAN : 58 Access VLAN : 58 Anchor VLAN : 0 WFD capable : No Manged WFD capable : No Cross Connection capable : No Support Concurrent Operation : No Session Manager: Interface : capwap_90000005 IIF ID : 0x90000005 Device Type : Apple-Device Protocol Map : 0x000001 Authorized : TRUE Session timeout : 320 Common Session ID: 1F3809090000005DC30088EA Acct Session ID : 0x00000000 Auth Method Status List Method : MAB SM State : TERMINATE Authen Status : Success Local Policies: Service Template : wlan_svc_default-policy-profile (priority 254) Absolute-Timer : 320 VLAN : 58 Server Policies: Resultant Policies: VLAN : 58 Absolute-Timer : 320 Client Capabilities CF Pollable : Not implemented CF Poll Request : Not implemented Short Preamble : Not implemented PBCC : Not implemented Channel Agility : Not implemented Listen Interval : 0 Fast BSS Transition Details : Reassociation Timeout : 0 11v BSS Transition : Not implemented FlexConnect Data Switching : Local FlexConnect Dhcp Status : Local FlexConnect Authentication : Central FlexConnect Central Association : No Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1047 Verifying a Private PSK Client Statistics: Number of Bytes Received : 59795 Number of Bytes Sent : 21404 Number of Packets Received : 518 Number of Packets Sent : 274 Number of EAP Id Request Msg Timeouts : Number of EAP Request Msg Timeouts : Number of EAP Key Msg Timeouts : Number of Policy Errors : 0 Radio Signal Strength Indicator : -32 dBm Signal to Noise Ratio : 58 dB Fabric status : Disabled Security Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1048 9 6 C H A P T E R Multi-Preshared Key · Information About Multi-Preshared Key, on page 1049 · Restrictions on Multi-PSK, on page 1050 · Configuring Multi-Preshared Key (GUI), on page 1050 · Configuring Multi-Preshared Key (CLI), on page 1053 · Verifying Multi-PSK Configurations, on page 1054 Information About Multi-Preshared Key Multi-PSK feature supports multiple PSKs simultaneously on a single SSID. You can use any of the configured PSKs to join the network. This is different from the Identity PSK (iPSK), wherein unique PSKs are created for individuals or groups of users on the same SSID. From 16.10 onwards, each SSID supports five PSKs, which can be extended In a traditional PSK, all the clients joining the network use the same password as shown in the below figure. Figure 30: Traditional PSK But with multi-PSK, client can use any of the configured pre-shared keys to connect to the network as shown in the below figure. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1049 Restrictions on Multi-PSK Figure 31: Multi-PSK Security In Multi-PSK, two passwords are configured (deadbeef and beefdead) for the same SSID. In this scenario, clients can connect to the network using either of the passwords. Restrictions on Multi-PSK · Central authentication is supported in local, flex, and fabric modes only. · In central authentication flex mode, the standalone AP allows client join with the highest priority PSK (priority 0 key). New clients that do not use the highest priority PSK are rejected during the standalone mode. · Multi-PSK does not support local authentication. Configuring Multi-Preshared Key (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Tags & Profiles > WLANs. On the Wireless Networks page, click the name of the WLAN. In the Edit WLAN window, click the Security tab. In the Layer2 tab, choose the Layer2 Security Mode from the following options: · None: No Layer 2 security · 802.1X: WEP 802.1X data encryption type · WPA + WPA2: Wi-Fi Protected Access · Static WEP: Static WEP encryption parameters · Static WEP+802.1X: Both Static WEP and 802.1X parameters Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1050 Security Parameters 802.1X WEP Key Size WPA + WPA2 Protected Management Frame WPA Policy WPA Encryption WPA2 Policy WPA2 Encryption Auth Key Mgmt Static WEP Configuring Multi-Preshared Key (GUI) Description Choose the key size. The available values are None, 40 bits, and 104 bits. Choose from the following options: · Disabled · Optional · Required Check the check box to enable WPA policy. Choose the WPA encryption standard. A WPA encryption standard must be specified if you have enabled WPA policy. Check the check box to enable WPA2 policy. Choose the WPA2 encryption standard. A WPA encryption standard must be specified if you have enabled WPA policy. Choose the rekeying mechanism from the following options: · 802.1X · FT + 802.1X · PSK: You must specify the PSK format and a preshared key · Cisco Centralized Key Management: You must specify a Cisco Centralized Key Management Timestamp Tolerance value · 802.1X + Cisco Centralized Key Management: You must specify a Cisco Centralized Key Management Timestamp Tolerance value · FT + 802.1X + Cisco Centralized Key Management: You must specify a Cisco Centralized Key Management Timestamp Tolerance value Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1051 Configuring Multi-Preshared Key (GUI) Parameters Key Size Key Index Key Format Encryption Key Static WEP + 802.1X Key Size Key Index Key Format Encryption Key WEP Key Size Step 5 Click Save & Apply to Device. Security Description Choose the key size from the following options: · 40 bits · 104 bits Choose a key index from 1 to 4. One unique WEP key index can be applied to each WLAN. As there are only four WEP key indexes, only four WLANs can be configured for static WEP Layer2 encryption. Choose the encryption key format as either ASCII or HEX. Enter an encryption key that is 13 characters long. Choose the key size from the following options: · 40 bits · 104 bits Choose a key index from 1 to 4. One unique WEP key index can be applied to each WLAN. As there are only four WEP key indexes, only four WLANs can be configured for static WEP Layer2 encryption. Choose the encryption key format as either ASCII or HEX. Enter an encryption key that is 13 characters long. Choose from the following options: · None · 40 bits · 104 bits Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1052 Security Configuring Multi-Preshared Key (CLI) Configuring Multi-Preshared Key (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wlan wlan-name wlan-id ssid Configures WLAN and SSID. Example: Device(config)# wlan mywlan 1 SSID_name Step 3 no security wpa akm dot1x Disables security AKM for dot1x. Example: Device(config-wlan)# no security wpa akm dot1x Step 4 security wpa akm psk Example: Device(config-wlan)# security wpa akm psk Configures PSK. Step 5 security wpa wpa2 mpsk Configures multi-PSK. Example: Device(config-wlan)# security wpa wpa2 mpsk Step 6 priority priority_value set-key {ascii [0 | 8] Configures PSK priority and all its related pre-shared-key | hex [0 | 8] pre-shared-key} passwords. Example: The priority_value ranges from 0 to 4. Device(config-mpsk)# priority 0 set-key Note ascii 0 deadbeef You need to configure priority 0 key for multi-PSK. Step 7 Step 8 no shutdown Example: Device(config-mpsk)# no shutdown exit Example: Device(config-wlan)# exit Enables WLAN. Exits WLAN configuration mode and returns to configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1053 Verifying Multi-PSK Configurations Security Step 9 Command or Action end Example: Device(config)# end Purpose Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Verifying Multi-PSK Configurations To verify the configuration of a WLAN and a client, use the following command: Device# show wlan id 8 WLAN Profile Name : wlan_8 ================================================ Identifier :8 Network Name (SSID) : ssid_8 Status : Enabled Broadcast SSID : Enabled Universal AP Admin : Disabled Max Associated Clients per WLAN :0 Max Associated Clients per AP per WLAN :0 Max Associated Clients per AP Radio per WLAN : 200 Number of Active Clients :0 CHD per WLAN : Enabled Multicast Interface : Unconfigured WMM : Allowed WifiDirect : Invalid Channel Scan Defer Priority: Priority (default) :5 Priority (default) :6 Scan Defer Time (msecs) : 100 Media Stream Multicast-direct : Disabled CCX - AironetIe Support : Enabled CCX - Diagnostics Channel Capability : Disabled Peer-to-Peer Blocking Action : Disabled Radio Policy : All DTIM period for 802.11a radio :1 DTIM period for 802.11b radio :1 Local EAP Authentication : Disabled Mac Filter Authorization list name : Disabled Mac Filter Override Authorization list name : Disabled Accounting list name : 802.1x authentication list name : Disabled 802.1x authorization list name : Disabled Security 802.11 Authentication : Open System Static WEP Keys : Disabled 802.1X : Disabled Wi-Fi Protected Access (WPA/WPA2/WPA3) : Enabled WPA (SSN IE) : Disabled WPA2 (RSN IE) : Enabled MPSK : Enabled AES Cipher : Enabled CCMP256 Cipher : Disabled GCMP128 Cipher : Disabled GCMP256 Cipher : Disabled WPA3 (WPA3 IE) : Disabled Auth Key Management 802.1x : Disabled PSK : Enabled Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1054 Security Verifying Multi-PSK Configurations CCKM FT dot1x FT PSK FT SAE PMF dot1x PMF PSK SAE OWE SUITEB-1X SUITEB192-1X CCKM TSF Tolerance FT Support FT Reassociation Timeout FT Over-The-DS mode PMF Support PMF Association Comeback Timeout PMF SA Query Time Web Based Authentication Conditional Web Redirect Splash-Page Web Redirect Webauth On-mac-filter Failure Webauth Authentication List Name Webauth Authorization List Name Webauth Parameter Map Tkip MIC Countermeasure Hold-down Timer Non Cisco WGB Band Select Load Balancing Multicast Buffer Multicast Buffer Size IP Source Guard Assisted-Roaming Neighbor List Prediction List Dual Band Support IEEE 802.11v parameters Directed Multicast Service BSS Max Idle Protected Mode Traffic Filtering Service BSS Transition Disassociation Imminent Optimised Roaming Timer Timer WNM Sleep Mode 802.11ac MU-MIMO 802.11ax paramters OFDMA Downlink OFDMA Uplink MU-MIMO Downlink MU-MIMO Uplink BSS Color Partial BSS Color BSS Color Code : Disabled : Disabled : Disabled : Disabled : Disabled : Disabled : Disabled : Disabled : Disabled : Disabled : 1000 : Adaptive : 20 : Enabled : Disabled :1 : 200 : Disabled : Disabled : Disabled : Disabled : Disabled : Disabled : Disabled : 60 : Disabled : Enabled : Disabled : Disabled :0 : Disabled : Disabled : Disabled : Disabled : Disabled : Disabled : Disabled : Disabled : Enabled : Disabled : 40 : 200 : Disabled : Disabled : unknown : unknown : unknown : unknown : unknown : unknown : To view the WLAN details, use the following command: Device# show run wlan wlan wlan_8 8 ssid_8 security wpa psk set-key ascii 0 deadbeef no security wpa akm dot1x security wpa akm psk security wpa wpa2 mpsk priority 0 set-key ascii 0 deadbeef priority 1 set-key ascii 0 deaddead Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1055 Verifying Multi-PSK Configurations Security priority 2 set-key ascii 0 d123d123 priority 3 set-key hex 0 0234567890123456789012345678901234567890123456789012345678901234 priority 4 set-key hex 0 1234567890123456789012345678901234567890123456789012345678901234 no shutdown Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1056 9 7 C H A P T E R Multiple Authentications for a Client · Information About Multiple Authentications for a Client, on page 1057 · Configuring Multiple Authentications for a Client, on page 1059 · Configure WLAN for Web Authentication on MAC Authentication Bypass Failure with Pre-Shared Key (CLI), on page 1065 · Configure WLAN for Web Authentication on MAC Authentication Bypass Failure with OWE (CLI), on page 1067 · Configure WLAN for Web Authentication on MAC Authentication Bypass Failure with Secure Agile Exchange (CLI), on page 1069 · Configuring 802.1x and Central Web Authentication on Controller (CLIs), on page 1070 · Configuring ISE for Central Web Authentication with Dot1x (GUI), on page 1077 · Verifying Multiple Authentication Configurations, on page 1079 Information About Multiple Authentications for a Client Multiple Authentication feature is an extension of Layer 2 and Layer 3 security types supported for client join. Note You can enable both L2 and L3 authentication for a given SSID. Note The Multiple Authentication feature is applicable for regular clients only. Information About Supported Combination of Authentications for a Client The Multiple Authentications for a Client feature supports multiple combination of authentications for a given client configured in the WLAN profile. The following table outlines the supported combination of authentications: Layer 2 Layer 3 Supported MAB CWA Yes Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1057 Jumbo Frame Support for RADIUS Packets Security MAB LWA Yes MAB + PSK - Yes MAB + 802.1X - Yes MAB Failure LWA Yes 802.1X CWA Yes 802.1X LWA Yes PSK - Yes PSK LWA Yes PSK CWA Yes iPSK - Yes iPSK CWA Yes iPSK + MAB CWA Yes iPSK LWA No MAB Failure + PSK LWA Yes MAB Failure + PSK CWA No MAB Failure + OWE LWA Yes MAB Failure + SAE LWA Yes From 16.10.1 onwards, 802.1X configurations on WLAN support web authentication configurations with WPA or WPA2 configuration. The feature also supports the following AP modes: · Local · FlexConnect · Fabric Jumbo Frame Support for RADIUS Packets This document describes how to configure IP Maximum Transmission Unit (MTU) size for RADIUS server. RADIUS packets will get fragmented based on IP MTU, if source interface is attached to RADIUS group. With the new design, the RADIUS packets get fragmented at interface IP MTU configured value. Note Fragmentation size is fixed. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1058 Security Combination of Authentications on MAC Failure Not Supported on a Client Combination of Authentications on MAC Failure Not Supported on a Client The following table outlines the combination of authentications on MAC failure that are not supported on a given client: Authentication Types Foreign Anchor Supported WPA3-OWE+LWA Cisco AireOS Cisco Catalyst 9800 No Controller WPA3-SAE+LWA Cisco AireOS Cisco Catalyst 9800 No Controller Configuring Multiple Authentications for a Client Configuring WLAN for 802.1X and Local Web Authentication (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Choose Configuration > Tags & Profiles > WLANs. Select the required WLAN from the list of WLANs displayed. Choose Security > Layer2 tab. Select the security method from the Layer 2 Security Mode drop-down list. In the Auth Key Mgmt, check the 802.1x check box. Check the MAC Filtering check box to enable the feature. After MAC Filtering is enabled, from the Authorization List drop-down list, choose an option. Choose Security > Layer3 tab. Check the Web Policy check box to enable web authentication policy. From the Web Auth Parameter Map and the Authentication List drop-down lists, choose an option. Click Update & Apply to Device. Configuring WLAN for 802.1X and Local Web Authentication (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wlan profile-name wlan-id SSID_Name Purpose Enters global configuration mode. Enters WLAN configuration sub-mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1059 Configuring WLAN for 802.1X and Local Web Authentication (CLI) Security Step 3 Step 4 Step 5 Step 6 Step 7 Command or Action Example: Device(config)# wlan wlan-test 3 ssid-test Purpose · profile-name: Profile name of the configured WLAN. · wlan-id: Wireless LAN identifier. Range is from 1 to 512. · SSID_Name: SSID that can contain 32 alphanumeric characters. Note If you have already configured this command, enter the wlan profile-name command. security dot1x authentication-list auth-list-name Example: Device(config-wlan)# security dot1x authentication-list default Enables security authentication list for dot1x security. The configuration is similar for all dot1x security WLANs. security web-auth Enables web authentication. Example: Device(config-wlan)# security web-auth security web-auth authentication-list authenticate-list-name Enables authentication list for dot1x security. Example: Device(config-wlan)# security web-auth authentication-list default security web-auth parameter-map parameter-map-name Example: Device(config-wlan)# security web-auth parameter-map WLAN1_MAP Maps the parameter map. Note If a parameter map is not associated with a WLAN, the configuration is considered from the global parameter map. no shutdown Example: Device(config-wlan)# no shutdown Enables the WLAN. Example wlan wlan-test 3 ssid-test security dot1x authentication-list default security web-auth security web-auth authentication-list default security web-auth parameter-map WLAN1_MAP no shutdown Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1060 Security Configuring WLAN for Preshared Key (PSK) and Local Web Authentication (GUI) Configuring WLAN for Preshared Key (PSK) and Local Web Authentication (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Choose Configuration > Tags & Profiles > WLANs. Select the required WLAN. Choose Security > Layer2 tab. Select the security method from the Layer 2 Security Mode drop-down list. In the Auth Key Mgmt, uncheck the 802.1x check box. Check the PSK check box. Enter the Pre-Shared Key and choose the PSK Format from the PSK Format drop-down list and the PSK Type from the PSK Type drop-down list. Choose Security > Layer3 tab. Check the Web Policy checkbox to enable web authentication policy. Choose the Web Auth Parameter Map from the Web Auth Parameter Map drop-down list and the authentication list from the Authentication List drop-down list. Click Update & Apply to Device. Configuring WLAN for Preshared Key (PSK) and Local Web Authentication Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wlan profile-name wlan-id SSID_Name Example: Device(config)# wlan wlan-test 3 ssid-test Purpose Enters global configuration mode. Enters WLAN configuration sub-mode. · profile-name- Is the profile name of the configured WLAN. · wlan-id - Is the wireless LAN identifier. Range is from 1 to 512. · SSID_Name - Is the SSID which can contain 32 alphanumeric characters. Note If you have already configured this command, enter wlan profile-name command. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1061 Configuring WLAN for Preshared Key (PSK) and Local Web Authentication Security Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action security wpa psk set-key ascii/hex key password Example: Device(config-wlan)# security wpa psk set-key ascii 0 PASSWORD Purpose Configures the PSK shared key. no security wpa akm dot1x Disables security AKM for dot1x. Example: Device(config-wlan)# no security wpa akm dot1x security wpa akm psk Example: Device(config-wlan)# security wpa akm psk Configures the PSK support. security web-auth Enables web authentication for WLAN. Example: Device(config-wlan)# security web-auth security web-auth authentication-list authenticate-list-name Enables authentication list for dot1x security. Example: Device(config-wlan)# security web-auth authentication-list webauth security web-auth parameter-map parameter-map-name Example: (config-wlan)# security web-auth parameter-map WLAN1_MAP Configures the parameter map. Note If parameter map is not associated with a WLAN, the configuration is considered from the global parameter map. Example wlan wlan-test 3 ssid-test security wpa psk set-key ascii 0 PASSWORD no security wpa akm dot1x security wpa akm psk security web-auth security web-auth authentication-list webauth security web-auth parameter-map WLAN1_MAP Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1062 Security Configuring WLAN for PSK or Identity Preshared Key (iPSK) and Central Web Authentication (GUI) Configuring WLAN for PSK or Identity Preshared Key (iPSK) and Central Web Authentication (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Choose Configuration > Tags & Profiles > WLANs. Select the required WLAN. Choose Security > Layer2 tab. Select the security method from the Layer 2 Security Mode drop-down list. In the Auth Key Mgmt, uncheck the 802.1x check box. Check the PSK check box. Enter the Pre-Shared Key and choose the PSK Format from the PSK Format drop-down list and the PSK Type from the PSK Type drop-down list. Check the MAC Filtering check box to enable the feature. With MAC Filtering enabled, choose the Authorization List from the Authorization List drop-down list. Choose Security > Layer3 tab. Check the Web Policy checkbox to enable web authentication policy. Choose the Web Auth Parameter Map from the Web Auth Parameter Map drop-down list and the authentication list from the Authentication List drop-down list. Click Update &Apply to Device. Configuring WLAN for PSK or Identity Preshared Key (iPSK) and Central Web Authentication Configuring WLAN Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wlan profile-name wlan-id SSID_Name Example: Device(config)# wlan wlan-test 3 ssid-test Purpose Enters global configuration mode. Enters WLAN configuration sub-mode. · profile-name - Is the profile name of the configured WLAN. · wlan-id - Is the wireless LAN identifier. Range is from 1 to 512. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1063 Applying Policy Profile to a WLAN Security Step 3 Step 4 Step 5 Command or Action Purpose · SSID_Name - Is the SSID which can contain 32 alphanumeric characters. Note If you have already configured this command, enter wlan profile-name command. no security wpa akm dot1x Disables security AKM for dot1x. Example: Device(config-wlan)# no security wpa akm dot1x security wpa psk set-key ascii/hex key password Example: Device(config-wlan)# security wpa psk set-key ascii 0 PASSWORD Configures the PSK AKM shared key. mac-filtering auth-list-name Example: Device(config-wlan)# mac-filtering test-auth-list Sets the MAC filtering parameters. Example wlan wlan-test 3 ssid-test no security wpa akm dot1x security wpa psk set-key ascii 0 PASSWORD mac-filtering test-auth-list Applying Policy Profile to a WLAN Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy policy-profile-name Configures the default policy profile. Example: Device(config)# wireless profile policy policy-iot Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1064 Security Configure WLAN for Web Authentication on MAC Authentication Bypass Failure with Pre-Shared Key (CLI) Step 3 Step 4 Step 5 Step 6 Command or Action aaa-override Example: Device(config-wireless-policy)# aaa-override nac Example: Device(config-wireless-policy)# nac no shutdown Example: Device(config-wireless-policy)# no shutdown end Example: Device(config-wireless-policy)# end Purpose Configures AAA override to apply policies coming from the AAA or ISE servers. Configures NAC in the policy profile. Shutdown the WLAN. Returns to privileged EXEC mode. Example wireless profile policy policy-iot aaa-override nac no shutdown Configure WLAN for Web Authentication on MAC Authentication Bypass Failure with Pre-Shared Key (CLI) Procedure Step 1 Step 2 Command or Action configure terminal Example: Device# configure terminal wlan profile-name wlan-id SSID_Name Example: Device(config)# wlan wlan-test 3 ssid-test Purpose Enters global configuration mode. Enters WLAN configuration submode. · profile-name: Profile name of the configured WLAN. · wlan-id: Wireless LAN identifier. Range is from 1 to 512. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1065 Configure WLAN for Web Authentication on MAC Authentication Bypass Failure with Pre-Shared Key (CLI) Security Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action Purpose · SSID_Name: SSID that can contain 32 alphanumeric characters. Note If you have already configured this command, enter the wlan profile-name command. mac-filtering auth-list-name Example: Device(config-wlan)# mac-filtering test-auth-list Sets the MAC filtering parameters. security wpa psk set-key ascii/hex key password Configures the PSK AKM shared key. Example: Device(config-wlan)# security wpa psk set-key ascii 0 PASSWORD no security wpa akm dot1x Example: Device(config-wlan)# no security wpa akm dot1x Disables security AKM for dot1x. security wpa akm psk Configures PSK support. Example: Device(config-wlan)# security wpa akm psk security web-auth authentication-list authenticate-list-name Enables authentication list for dot1x security. Example: Device(config-wlan)# security web-auth authentication-list default security web-auth authorization-list authorize-list-name Enables authorization list for dot1x security. Example: Device(config-wlan)# security web-auth authorization-list default security web-auth on-macfilter-failure Example: Enables web authentication on MAC filter failure. Device(config-wlan)# security web-auth on-macfilter-failure security web-auth parameter-map parameter-map-name Configures the parameter map. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1066 Security Configure WLAN for Web Authentication on MAC Authentication Bypass Failure with OWE (CLI) Step 11 Command or Action Purpose Example: Note Device(config-wlan)# security web-auth parameter-map WLAN1_MAP If a parameter map is not associated with a WLAN, the configuration is considered from the global parameter map. no shutdown Example: Device(config-wlan)# no shutdown Enables the WLAN. Configure WLAN for Web Authentication on MAC Authentication Bypass Failure with OWE (CLI) Procedure Step 1 Step 2 Command or Action configure terminal Example: Device# configure terminal wlan profile-name wlan-id SSID_Name Example: Device(config)# wlan wlan-test 3 ssid-test Purpose Enters global configuration mode. Enters WLAN configuration submode. · profile-name: Profile name of the configured WLAN. · wlan-id: Wireless LAN identifier. Range is from 1 to 512. · SSID_Name: SSID that can contain 32 alphanumeric characters. Note If you have already configured this command, enter the wlan profile-name command. Step 3 Step 4 mac-filtering auth-list-name Example: Device(config-wlan)# mac-filtering test-auth-list no security wpa akm dot1x Example: Device(config-wlan)# no security wpa akm dot1x Sets the MAC filtering parameters. Disables security AKM for dot1x. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1067 Configure WLAN for Web Authentication on MAC Authentication Bypass Failure with OWE (CLI) Security Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action Purpose security wpa wpa3 Enables WPA3 support. Example: Device(config-wlan)# security wpa wpa3 security wpa akm owe Enables WPA3 OWE support. Example: Device(config-wlan)# security wpa akm owe security web-auth authentication-list authenticate-list-name Enables authentication list for dot1x security. Example: Device(config-wlan)# security web-auth authentication-list default security web-auth authorization-list authorize-list-name Enables authorization list for dot1x security. Example: Device(config-wlan)# security web-auth authorization-list default security web-auth on-macfilter-failure Example: Enables web authentication on MAC filter failure. Device(config-wlan)# security web-auth on-macfilter-failure security web-auth parameter-map Configures the parameter map. parameter-map-name Note If a parameter map is not Example: associated with a WLAN, the Device(config-wlan)# security web-auth parameter-map WLAN1_MAP configuration is considered from the global parameter map. no shutdown Example: Device(config-wlan)# no shutdown Enables the WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1068 Security Configure WLAN for Web Authentication on MAC Authentication Bypass Failure with Secure Agile Exchange (CLI) Configure WLAN for Web Authentication on MAC Authentication Bypass Failure with Secure Agile Exchange (CLI) Procedure Step 1 Step 2 Command or Action configure terminal Example: Device# configure terminal wlan profile-name wlan-id SSID_Name Example: Device(config)# wlan wlan-test 3 ssid-test Purpose Enters global configuration mode. Enters WLAN configuration submode. · profile-name: Profile name of the configured WLAN. · wlan-id: Wireless LAN identifier. Range is from 1 to 512. · SSID_Name: SSID that can contain 32 alphanumeric characters. Note If you have already configured this command, enter the wlan profile-name command. Step 3 Step 4 Step 5 Step 6 Step 7 mac-filtering auth-list-name Example: Device(config-wlan)# mac-filtering test-auth-list Sets the MAC filtering parameters. no security wpa akm dot1x Example: Device(config-wlan)# no security wpa akm dot1x Disables security AKM for dot1x. security wpa wpa3 Enables WPA3 support. Example: Device(config-wlan)# security wpa wpa3 security wpa akm sae Enables AKM SAE support. Example: Device(config-wlan)# security wpa akm sae security web-auth authentication-list authenticate-list-name Enables authentication list for dot1x security. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1069 Configuring 802.1x and Central Web Authentication on Controller (CLIs) Security Step 8 Step 9 Step 10 Step 11 Command or Action Purpose Example: Device(config-wlan)# security web-auth authentication-list default security web-auth authorization-list authorize-list-name Enables authorization list for dot1x security. Example: Device(config-wlan)# security web-auth authorization-list default security web-auth on-macfilter-failure Example: Enables web authentication on MAC filter failure. Device(config-wlan)# security web-auth on-macfilter-failure security web-auth parameter-map Configures the parameter map. parameter-map-name Note If a parameter map is not Example: associated with a WLAN, the Device(config-wlan)# security web-auth parameter-map WLAN1_MAP configuration is considered from the global parameter map. no shutdown Example: Device(config-wlan)# no shutdown Enables the WLAN. Configuring 802.1x and Central Web Authentication on Controller (CLIs) Creating AAA Authentication Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 aaa new-model Example: Device(config)# aaa new-model Purpose Enters global configuration mode. Creates a AAA authentication model. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1070 Security Configuring AAA Server for External Authentication Configuring AAA Server for External Authentication Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. radius-server attribute wireless Configures a call station identifier sent in the authentication call-station-id ap-name-ssid RADIUS authentication messages. Example: Device(config)# radius-server attribute wireless authentication call-station-id ap-name-ssid radius server server-name Example: Device(config)# radius server ISE2 Sets the RADIUS server. address ipv4 radius-server-ip-address Specifies the RADIUS server address. Example: Device(config-radius-server)# address ipv4 111.111.111.111 timeout seconds Example: Specify the time-out value in seconds. The range is between 10 and 1000 seconds. Device(config-radius-server)# timeout 10 retransmit number-of-retries Example: Specify the number of retries to the server. The range is between 0 and 100. Device(config-radius-server)# retransmit 10 key key Specifies the authentication and encryption Example: key used between the device and the key string RADIUS daemon running on the RADIUS Device(config-radius-server)# key cisco server. key covers the following: · 0--Specifies unencrypted key. · 6--Specifies encrypted key. · 7--Specifies HIDDEN key. · Word--Unencrypted (cleartext) server key. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1071 Configuring AAA for Authentication Security Step 8 Step 9 Step 10 Step 11 Command or Action exit Example: Device(config-radius-server)# exit Purpose Returns to the configuration mode. aaa group server radius server-group Creates a RADIUS server-group identification. Example: Device(config)# aaa group server radius ISE2 server name server-name Example: Device(config)# server name ISE2 Configures the server name. radius-server deadtime time-in-minutes Defines the time in minutes when a server Example: marked as DEAD is held in that state. Once the deadtime expires, the controller marks the Device(config)# radius-server deadtime server as UP (ALIVE) and notifies the 5 registered clients about the state change. If the server is still unreachable after the state is marked as UP and if the DEAD criteria is met, then server is marked as DEAD again for the deadtime interval. time-in-mins--Valid values range from 1 to 1440 minutes. Default value is zero. To return to the default value, use the no radius-server deadtime command. The radius-server deadtime command can be configured globally or per aaa group server level. You can use the show aaa dead-criteria or show aaa servers command to check for dead-server detection. If the default value is zero, deadtime is not configured. Configuring AAA for Authentication Before you begin Configure the RADIUS server and AAA group server. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1072 Security Configuring Accounting Identity List Procedure Step 1 Command or Action aaa authentication login Example: Device# aaa authentication login ISE_GROUP group ISE2 local Step 2 aaa authentication dot1x Example: Device(config)# aaa authentication network ISE_GROUP group ISE2 local Purpose Defines the authentication method at login. Defines the authentication method at dot1x. Configuring Accounting Identity List Before you begin Configure the RADIUS server and AAA group server. Procedure Step 1 Command or Action Purpose aaa accounting identity named-list start-stop Enables accounting to send a start-record group server-group-name accounting notice when a client is authorized Example: and a stop-record at the end. Device# aaa accounting identity ISE start-stop group ISE2 Note You can also use the default list instead of the named list. Configuring AAA for Central Web Authentication Before you begin Configure the RADIUS server and AAA group server. Procedure Step 1 Command or Action Purpose aaa server radius dynamic-author Example: Configures the Change of Authorization (CoA) on the controller. Device# aaa server radius dynamic-author Step 2 client client-ip-addr server-key key Example: Configures a server key for a RADIUS client. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1073 Defining an Access Control List for Radius Server Security Command or Action Purpose Device(config-locsvr-da-radius)# client 111.111.111.111 server-key ciscokey Defining an Access Control List for Radius Server Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ip access-list extended redirect The HTTP and HTTPS browsing does not work Example: without authentication (per the other ACL) as ISE is configured to use a redirect ACL (named Device(config)# ip access-list extended redirect). redirect Step 3 sequence-number deny icmp any Example: Device(config-ext-nacl)# 10 deny icmp any Specifies packets to reject according to the sequence number. Note You must have the DHCP, DNS, and ISE servers in the reject sequences. Refer to Configuration Example to Define an Access Control List for Radius Server, wherein the 111.111.111.111 refers to the IP address of the ISE server. Step 4 permit TCP any any eq web-address Example: Redirects all HTTP or HTTPS access to the Cisco ISE login page. Device(config-ext-nacl)# permit TCP any any eq www Configuration Example to Define an Access Control List for Radius Server This example shows how to define an access control list for RADIUS server: Device# configure terminal Device(config-ext-nacl) # 10 deny icmp any Device(config-ext-nacl) # 20 deny udp any any eq bootps Device(config-ext-nacl) # 30 deny udp any any eq bootpc Device(config-ext-nacl) # 40 deny udp any any eq domain Device(config-ext-nacl) # 50 deny tcp any host 111.111.111.111 eq 8443 Device(config-ext-nacl) # 55 deny tcp host 111.111.111.111 eq 8443 any Device(config-ext-nacl) # 40 deny udp any any eq domain Device(config-ext-nacl) # end Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1074 Security Configuring WLAN Configuring WLAN Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wlan wlan-name Example: Device(config)# wlan wlan30 Step 3 security dot1x authentication-list ISE_GROUP Example: Device(config-wlan)# security dot1x authentication-list ISE_GROUP Step 4 no shutdown Example: Device(config-wlan)# no shutdown Purpose Enters global configuration mode. Enters WLAN configuration mode. Configures 802.1X for a WLAN. Enables the WLAN. Configuring Policy Profile Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-name Configures policy profile. Example: Device(config)# wireless profile policy wireless-profile1 Step 3 aaa-override Example: Device(config-wireless-policy)# aaa-override Configures AAA override to apply policies coming from the AAA or Cisco Identify Services Engine (ISE) server. Step 4 accounting-list list-name Example: Sets the accounting list for IEEE 802.1x. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1075 Mapping WLAN and Policy Profile to Policy Tag Security Step 5 Step 6 Step 7 Step 8 Command or Action Device(config-wireless-policy)# accounting-list ISE Purpose ipv4 dhcp required Configures DHCP parameters for WLAN. Example: Device(config-wireless-policy)# ipv4 dhcp required nac Example: Device(config-wireless-policy)# nac Configures Network Access Control (NAC) in the policy profile. NAC is used to trigger the Central Web Authentication (CWA). vlan 25 Configures guest VLAN profile. Example: Device(config-wireless-policy)# vlan 25 no shutdown Example: Device(config-wireless-policy)# no shutdown Enables policy profile. Mapping WLAN and Policy Profile to Policy Tag Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless tag policy policy-tag-name Example: Configures policy tag and enters policy tag configuration mode. Device(config-policy-tag)# wireless tag policy xx-xre-policy-tag Step 3 wlan wlan-name policy profile-policy-name Maps a policy profile to a WLAN profile. Example: Device(config-policy-tag)# wlan wlan30 policy wireless-profile1 Step 4 end Example: Device(config-policy-tag)# end Saves the configuration and exits the configuration mode and returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1076 Security Configuring ISE for Central Web Authentication with Dot1x (GUI) Configuring ISE for Central Web Authentication with Dot1x (GUI) Defining Guest Portal Before you begin Define the guest portal or use the default guest portal. Procedure Step 1 Step 2 Step 3 Login to the Cisco Identity Services Engine (ISE). Choose Work Centers > Guest Access > Portals & Components. Click Guest Portal. Defining Authorization Profile for a Client Before you begin You can define the authorization profile to use guest portal and other additional parameters as per the requirement. Authorization profile redirects the client to the authentication portal. In the latest Cisco ISE version, Cisco_Webauth authorization results exist already, and you can edit the same to modify the redirection ACL name to match the configuration in the controller. Procedure Step 1 Step 2 Step 3 Login to the Cisco Identity Services Engine (ISE). Choose Policy > Policy Elements > Authorization > Authorization Profiles. Click Add to create your own custom or edit the Cisco_Webauth default result. Defining Authentication Rule Procedure Step 1 Step 2 Step 3 Login to the Cisco Identity Services Engine (ISE). Choose Policy > Policy Sets and click on the appropriate policy set. Expand Authentication policy. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1077 Defining Authorization Rule Security Step 4 Expand Options and choose an appropriate User ID. Defining Authorization Rule Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Login to the Cisco Identity Services Engine (ISE). Choose Policy > Policy Sets > Authorization Policy. Create a rule that matches the condition for 802.1x with a specific SSID (using Radius-Called-Station-ID). Note You get to view the CWA redirect attribute. Choose the already created authorization profile. From the Result/Profile column, choose the already created authorization profile. Click Save. Note The following image depicts the working configuration sample for your reference. Figure 32: Working Configuration Sample Creating Rules to Match Guest Flow Condition Before you begin You must create a second rule that matches the guest flow condition and returns to network access details once the user completes authentication in the portal. Procedure Step 1 Step 2 Step 3 Step 4 Login to the Cisco Identity Services Engine (ISE). Choose Policy > Policy Sets > Authorization Policy. Create a rule that matches the condition for 802.1x with, Network Access-UseCase EQUALS Guest, and a specific SSID (using Radius-Called-Station-ID). Note You get to view the Permit Access. From the Result/Profile column, choose the already created authorization profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1078 Security Verifying Multiple Authentication Configurations Step 5 Step 6 Choose the default or customized Permit Access. Click Save. Verifying Multiple Authentication Configurations Layer 2 Authentication After L2 authentication (Dot1x) is complete, the client is moved to Webauth Pending state. To verify the client state after L2 authentication, use the following commands: Device# show wireless client summary Number of Local Clients: 1 MAC Address AP Name WLAN State Protocol Method Role ----------------------------------------------------------------------------------------------------------------- 58ef.68b6.aa60 ewlc1_ap_1 3 Webauth Pending Number of Excluded Clients: 0 11n(5) Device# show wireless client mac-address <mac_address> detail Dot1x Local Auth Method Status List Method: Dot1x Webauth State: Init Webauth Method: Webauth Local Policies: Service Template: IP-Adm-V6-Int-ACL-global (priority 100) URL Redirect ACL: IP-Adm-V6-Int-ACL-global Service Template: IP-Adm-V4-Int-ACL-global (priority 100) URL Redirect ACL: IP-Adm-V4-Int-ACL-global Service Template: wlan_svc_default-policy-profile_local (priority 254) Absolute-Timer: 1800 VLAN: 50 Device# show platform software wireless-client chassis active R0 ID MAC Address WLAN Client State ---------------------------------------------------------------------------------------- 0xa0000003 58ef.68b6.aa60 3 L3 Authentication Device# show platform software wireless-client chassis active F0 ID MAC Address WLAN Client State AOM ID Status ------------------------------------------------------------------------------------------------- 0xa0000003 58ef.68b6.aa60 3 L3 Authentication. 730. Done Device# show platform hardware chassis active qfp feature wireless wlclient cpp-client summary Client Type Abbreviations: RG REGULAR BLE BLE HL - HALO LI LWFL INT Auth State Abbrevations: UK UNKNOWN IP LEARN L3 L3 AUTH RN RUN IP IV INVALID Mobility State Abbreviations: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1079 Verifying Multiple Authentication Configurations Security UK UNKNOWN LC LOCAL FR FOREIGN IV INVALID IN INIT AN ANCHOR MT MTE EoGRE Abbreviations: N NON EOGRE Y - EOGRE CPP IF_H DP IDX MAC Address VLAN CT MCVL AS MS E WLAN POA -------------------------------------------------------------------------------------- 0X49 0XA0000003 58ef.68b6.aa60 50 RG 0 L3 LC N wlan-test 0x90000003 Device# show platform hardware chassis active qfp feature wireless wlclient datapath summary Vlan DP IDX MAC Address VLAN CT MCVL AS MS E WLAN POA ------------------------------------------------------------------------------------ 0X49 0xa0000003 58ef.68b6.aa60 50 RG 0 L3 LC N wlan-test 0x90000003 Layer 3 Authentication Once L3 authentication is successful, the client is moved to Run state. To verify the client state after L3 authentication, use the following commands: Device# show wireless client summary Number of Local Clients: 1 MAC Address AP Name WLAN State Protocol Method Role ----------------------------------------------------------------------------------------------------------------- 58ef.68b6.aa60 ewlc1_ap_1 3 Number of Excluded Clients: 0 Run 11n(5) Web Auth Device# show wireless client mac-address 58ef.68b6.aa60 detail Local Auth Method Status List Method: Web Auth Webauth State: Authz Webauth Method: Webauth Local Policies: Service Template: wlan_svc_default-policy-profile_local (priority 254) Absolute-Timer: 1800 VLAN: 50 Server Policies: Resultant Policies: VLAN: 50 Absolute-Timer: 1800 Device# show platform software wireless-client chassis active R0 ID MAC Address WLAN Client State -------------------------------------------------- 0xa0000001 58ef.68b6.aa60 3 Run Device# show platform software wireless-client chassis active f0 ID MAC Address WLAN Client State AOM ID. Status -------------------------------------------------------------------- 0xa0000001 58ef.68b6.aa60. 3 Run 11633 Done Device# show platform hardware chassis active qfp feature wireless wlclient cpp-client summary Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1080 Security Verifying Multiple Authentication Configurations Client Type Abbreviations: RG REGULAR BLE BLE HL - HALO LI LWFL INT Auth State Abbrevations: UK UNKNOWN IP LEARN IP IV INVALID L3 L3 AUTH RN RUN Mobility State Abbreviations: UK UNKNOWN IN INIT LC LOCAL AN ANCHOR FR FOREIGN MT MTE IV INVALID EoGRE Abbreviations: N NON EOGRE Y - EOGRE CPP IF_H DP IDX MAC Address VLAN CT MCVL AS MS E WLAN POA --------------------------------------------------------------------------------- 0X49 0XA0000003 58ef.68b6.aa60 50 RG 0 RN LC N wlan-test 0x90000003 Device# show platform hardware chassis active qfp feature wireless wlclient datapath summary Vlan pal_if_hd1 mac Input Uidb Output Uidb ------------------------------------------------------------------ 50 0xa0000003 58ef.68b6.aa60 95929 95927 Verifying PSK+Webauth Configuration Device# show wlan summary Load for five secs: 0%/0%; one minute: 0%; five minutes: 0% Time source is NTP, 12:08:32.941 CEST Tue Oct 6 2020 Number of WLANs: 1 ID Profile Name SSID Status Security ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------23 Gladius1-PSKWEBAUTH Gladius1-PSKWEBAUTH UP [WPA2][PSK][AES],[Web Auth] Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1081 Verifying Multiple Authentication Configurations Security Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1082 9 8 C H A P T E R Wi-Fi Protected Access 3 · Simultaneous Authentication of Equals, on page 1083 · Opportunistic Wireless Encryption, on page 1084 · Hash-to-Element (H2E), on page 1084 · YANG (RPC model), on page 1085 · Transition Disable, on page 1086 · WPA3 SAE iPSK, on page 1087 · Configuring SAE (WPA3+WPA2 Mixed Mode), on page 1087 · Configuring WPA3 Enterprise (GUI), on page 1089 · Configuring WPA3 Enterprise, on page 1089 · Configuring the WPA3 OWE, on page 1090 · Configuring WPA3 OWE Transition Mode (GUI), on page 1092 · Configuring WPA3 OWE Transition Mode, on page 1092 · Configuring WPA3 SAE (GUI), on page 1094 · Configuring WPA3 SAE, on page 1094 · Configuring WPA3 SAE iPSK (CLI), on page 1096 · Configuring WPA3 SAE H2E (GUI), on page 1099 · Configuring WPA3 SAE H2E, on page 1099 · Configuring WPA3 WLAN for Transition Disable, on page 1101 · Configuring Anti-Clogging and SAE Retransmission (GUI), on page 1101 · Configuring Anti-Clogging and SAE Retransmission, on page 1102 · Verifying WPA3 SAE and OWE, on page 1103 · Verifying WPA3 SAE H2E Support in WLAN, on page 1106 · Verifying WPA3 Transition Disable in WLAN, on page 1112 Simultaneous Authentication of Equals WPA3 is the latest version of Wi-Fi Protected Access (WPA), which is a suite of protocols and technologies that provide authentication and encryption for Wi-Fi networks. WPA3 leverages Simultaneous Authentication of Equals (SAE) to provide stronger protections for users against password guessing attempts by third parties. SAE employs a discrete logarithm cryptography to perform an efficient exchange in a way that performs mutual authentication using a password that is probably resistant to an offline dictionary attack. An offline dictionary attack is where an adversary attempts to determine a network password by trying possible passwords without further network interaction. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1083 Opportunistic Wireless Encryption Security WPA3-Personal brings better protection to individual users by providing more robust password-based authentication making the brute-force dictionary attack much more difficult and time-consuming, while WPA3-Enterprise provides higher grade security protocols for sensitive data networks. When the client connects to the access point, they perform an SAE exchange. If successful, they will each create a cryptographically strong key, from which the session key will be derived. Basically a client and access point goes into phases of commit and then confirm. Once there is a commitment, the client and access point can then go into the confirm states each time there is a session key to be generated. The method uses forward secrecy, where an intruder could crack a single key, but not all of the other keys. Note Home SSIDs configured using OEAP GUI does not support WPA3 security in Cisco IOS-XE 17.6 and 17.7 releases. Opportunistic Wireless Encryption Opportunistic Wireless Encryption (OWE) is an extension to IEEE 802.11 that provides encryption of the wireless medium. The purpose of OWE based authentication is avoid open unsecured wireless connectivity between the AP's and clients. The OWE uses the Diffie-Hellman algorithms based Cryptography to setup the wireless encryption. With OWE, the client and AP perform a Diffie-Hellman key exchange during the access procedure and use the resulting pairwise secret with the 4-way handshake. The use of OWE enhances wireless network security for deployments where Open or shared PSK based networks are deployed. Hash-to-Element (H2E) Hash-to-Element (H2E) is a new SAE Password Element (PWE) method. In this method, the secret PWE used in the SAE protocol is generated from a password. When a STA that supports H2E initiates SAE with an AP, it checks whether AP supports H2E. If yes, the AP uses the H2E to derive the PWE by using a newly defined Status Code value in the SAE Commit message. If STA uses Hunting-and-Pecking, the entire SAE exchange remains unchanged. While using the H2E, the PWE derivation is divided into the following components: · Derivation of a secret intermediary element PT from the password. This can be performed offline when the password is initially configured on the device for each supported group. · Derivation of the PWE from the stored PT. This depends on the negotiated group and MAC addresses of peers. This is performed in real-time during the SAE exchange. Note · 6-GHz supports only Hash-to-Element SAE PWE method. · The H2E method also incorporates protection against the Group Downgrade man-in-the-middle attacks. During the SAE exchange, the peers exchange lists of rejected groups binded into the PMK derivation. Each peer compares the received list with the list of groups supported, any discrepancy detects a downgrade attack and terminates the authentication. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1084 Security YANG (RPC model) YANG (RPC model) To create an RPC for SAE Password Element (PWE) mode, use the following RPC model: <nc:rpc xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="urn:uuid:0a77124f-c563-469d-bd21-cc625a9691cc"> <nc:edit-config> <nc:target> <nc:running/> </nc:target> <nc:config> <wlan-cfg-data xmlns="http://cisco.com/ns/yang/Cisco-IOS-XE-wireless-wlan-cfg"> <wlan-cfg-entries> <wlan-cfg-entry> <profile-name>test</profile-name> <wlan-id>2</wlan-id> <sae-pwe-mode>both-h2e-hnp</sae-pwe-mode> </wlan-cfg-entry> </wlan-cfg-entries> </wlan-cfg-data> </nc:config> </nc:edit-config> </nc:rpc> To delete a 6-GHz radio policy and modify the SAE Password Element (PWE) mode, use the following RPC model: <nc:rpc xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="urn:uuid:2b8c4be6-492e-4488-b2cf-1f2a1e39fa8c"><nc:edit-config> <nc:target> <nc:running/> </nc:target> <nc:config> <wlan-cfg-data xmlns="http://cisco.com/ns/yang/Cisco-IOS-XE-wireless-wlan-cfg"> <wlan-cfg-entries> <wlan-cfg-entry> <profile-name>test</profile-name> <wlan-id>2</wlan-id> <wlan-radio-policies> <wlan-radio-policy nc:operation="delete"> <band>dot11-6-ghz-band</band> </wlan-radio-policy> </wlan-radio-policies> </wlan-cfg-entry> </wlan-cfg-entries> </wlan-cfg-data> </nc:config> </nc:edit-config> </nc:rpc> ## Received message from host <?xml version="1.0" ?> <rpc-reply message-id="urn:uuid:2b8c4be6-492e-4488-b2cf-1f2a1e39fa8c" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0"> <ok/> </rpc-reply> NETCONF rpc COMPLETE NETCONF SEND rpc Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1085 Transition Disable Security Requesting 'Dispatch' Sending: #1268 <nc:rpc xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="urn:uuid:e19a3309-2509-446f-9dbe-c46a6de433db"><nc:edit-config> <nc:target> <nc:running/> </nc:target> <nc:config> <wlan-cfg-data xmlns="http://cisco.com/ns/yang/Cisco-IOS-XE-wireless-wlan-cfg"> <wlan-cfg-entries> <wlan-cfg-entry> <profile-name>test</profile-name> <wlan-id>2</wlan-id> <wlan-radio-policies> <wlan-radio-policy nc:operation="merge"> <band>dot11-5-ghz-band</band> </wlan-radio-policy> </wlan-radio-policies> <sae-pwe-mode>hunting-and-pecking-only</sae-pwe-mode> </wlan-cfg-entry> </wlan-cfg-entries> </wlan-cfg-data> </nc:config> </nc:edit-config> </nc:rpc> ## Received message from host <?xml version="1.0" ?> <rpc-reply message-id="urn:uuid:e19a3309-2509-446f-9dbe-c46a6de433db" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0"> <ok/> </rpc-reply> NETCONF rpc COMPLETE Note The delete operation performs one action at a time due to the current infra limitation. That is, in YANG module, the delete operation on multiple nodes are not supported. Transition Disable Transition Disable is an indication from an AP to an STA. This feature disables few transition modes for subsequent connections to the APs network. An STA implementation might enable certain transition modes in a network profile. For example, a WPA3-Personal STA might enable the WPA3-Personal transition mode in a network profile by default. This enables a PSK algorithm. However, you can use the Transition Disable indication to disable transition modes for that network on a STA. Note The Transition Disable indication provides protection against downgrade attacks. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1086 Security WPA3 SAE iPSK An AP that uses Transition Disable indication does not necessarily disable the corresponding transition modes on its own BSS. For example, the APs in WPA3-Personal network might use the Transition Disable indication to ensure that all STAs supporting WPA3-Personal are protected against the downgrade attack. However, the WPA3-Personal transition mode is enabled on the BSS for the legacy STAs to connect. WPA3 SAE iPSK A RADIUS server and Identity PSK (iPSK) create unique preshared keys for individuals or a group of users present in the same SSID. This kind of setup is useful in networks where end-client devices do not support 802.1X authentication. However, you will need a more secure and granular authentication. From a client perspective, the WLAN looks identical to the traditional PSK network. If one of the PSKs is compromised, only the affected individual or group needs to update their PSK. The rest of the devices connected to the WLAN remain unaffected. The Simultaneous Authentication of Equals (SAE) H2E authentication mode uses a password token derived from the SAE authentication passphrase. You can configure the passphrase in the WLAN profile for client authentication during commit and confirm message exchanges. From Cisco IOS-XE 17.9.2, the iPSK passphrase is supported for SAE H2E authentication in Local mode. The iPSK passphrase is configured in the client authorization policy in the RADIUS server. The passphrase pushes the policy to the controller during client MAB authentication. Note The iPSK passphrase replaces the one in the WLAN profile to generate password token. If the iPSK passphrase is not configured in the authorization policy, the SAE H2E falls back to the passphrase in the WLAN profile. Configuring SAE (WPA3+WPA2 Mixed Mode) Follow the procedure given below to configure WPA3+WPA2 mixed mode for SAE. Procedure Step 1 Step 2 Step 3 Command or Action configure terminal Example: Device# configure terminal wlan wlan-name wlan-id SSID-name Example: Device(config)# wlan WPA3 1 WPA3 no security wpa akm dot1x Example: Device(config-wlan)# no security wpa akm dot1x Purpose Enters global configuration mode. Enters the WLAN configuration sub-mode. Disables security AKM for dot1x. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1087 Configuring SAE (WPA3+WPA2 Mixed Mode) Security Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Command or Action no security ft over-the-ds Example: Device(config-wlan)# no security ft over-the-ds Purpose Disables fast transition over the data source on the WLAN. no security ft Example: Device(config-wlan)# no security ft Disables 802.11r fast transition on the WLAN. security wpa wpa2 ciphers aes Configures WPA2 cipher. Example: Note Device(config-wlan)# security wpa wpa2 ciphers aes You can check whether cipher is configured using no security wpa wpa2 ciphers aescommand. If cipher is not reset, configure the cipher. security wpa psk set-key ascii value preshared-key Specifies a preshared key. Example: Device(config-wlan)# security wpa psk set-key ascii 0 Cisco123 security wpa wpa3 Enables WPA3 support. Example: Note Device(config-wlan)# security wpa wpa3 If both WPA2 and WPA3 are supported (SAE and PSK together), it is optional to configure PMF. However, you cannot disable PMF. For WPA3, PMF is mandatory. security wpa akm sae Enables AKM SAE support. Example: Device(config-wlan)# security wpa akm sae security wpa akm psk Enables AKM PSK support. Example: Device(config-wlan)# security wpa akm psk no shutdown Example: Device(config-wlan)# no shutdown Enables the WLAN. end Example: Returns to the privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1088 Security Configuring WPA3 Enterprise (GUI) Command or Action Device(config-wlan)# end Purpose Configuring WPA3 Enterprise (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Configuration > Tags & Profiles > WLANs. Click Add. In the General tab, enter the Profile Name, the SSID and the WLAN ID. Choose Security > Layer2 tab. Choose WPA2+WPA3 in Layer 2 Security Mode drop-down list. Uncheck the WPA2 Policy and 802.1x check boxes.Check the WPA3 Policy and 802.1x-SHA256 check boxes. Choose Security > AAA tab, choose the Authentication List from the Authentication List drop-down list. Click Apply to Device. Configuring WPA3 Enterprise Follow the procedure given below to configure WPA3 enterprise. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wlan wlan-name wlan-id SSID-name Enters the WLAN configuration sub-mode. Example: Device(config)# wlan wl-dot1x 4 wl-dot1x Step 3 no security wpa akm dot1x Disables security AKM for dot1x. Example: Device(config-wlan)# no security wpa akm dot1x Step 4 no security wpa wpa2 Disables WPA2 security. Example: Device(config-wlan)# no security wpa wpa2 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1089 Configuring the WPA3 OWE Security Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action security wpa akm dot1x-sha256 Example: Device(config-wlan)# security wpa akm dot1x-sha256 Purpose Configures 802.1x support. security wpa wpa3 Enables WPA3 support. Example: Device(config-wlan)# security wpa wpa3 security dot1x authentication-list list-name Configures security authentication list for dot1x Example: security. Device(config-wlan)# security dot1x authentication-list ipv6_ircm_aaa_list no shutdown Example: Device(config-wlan)# no shutdown Enables the WLAN. end Example: Device(config-wlan)# end Returns to the privileged EXEC mode. Note A WLAN configured with WPA3 enterprise (SUITEB192-1X) is not supported on C9115/C9120 APs. Configuring the WPA3 OWE Follow the procedure given below to configure WPA3 OWE. Before you begin Configure PMF internally. The associated ciphers configuration can use the WPA2 ciphers. Procedure Step 1 Step 2 Command or Action configure terminal Example: Device# configure terminal wlan wlan-name wlan-id SSID-name Example: Device(config)# wlan WPA3 1 WPA3 Purpose Enters global configuration mode. Enters the WLAN configuration sub-mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1090 Security Configuring the WPA3 OWE Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action no security ft over-the-ds Example: Device(config-wlan)# no security ft over-the-ds Purpose Disables fast transition over the data source on the WLAN. no security ft Example: Device(config-wlan)# no security ft Disables 802.11r fast transition on the WLAN. no security wpa akm dot1x Example: Device(config-wlan)# no security wpa akm dot1x Disables security AKM for dot1x. no security wpa wpa2 Example: Device(config-wlan)# no security wpa wpa2 Disables WPA2 security. PMF is disabled now. security wpa wpa2 ciphers aes Enables WPA2 ciphers for AES. Example: Note Device(config-wlan)# security wpa wpa2 ciphers aes The ciphers for WPA2 and WPA3 are common. security wpa wpa3 Enables WPA3 support. Example: Device(config-wlan)# security wpa wpa3 security wpa akm owe Enables WPA3 OWE support. Example: Device(config-wlan)# security wpa akm owe no shutdown Example: Device(config-wlan)# no shutdown Enables the WLAN. end Example: Device(config-wlan)# end Returns to the privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1091 Configuring WPA3 OWE Transition Mode (GUI) Security Configuring WPA3 OWE Transition Mode (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Configuration > Tags & Profiles > WLANs. Click Add. In the General tab, enter the Profile Name, the SSID and the WLAN ID. Choose Security > Layer2 tab. Choose WPA2+WPA3 in Layer 2 Security Mode drop-down list. Uncheck the WPA2 Policy, 802.1x, Over the DS, FT + 802.1x and FT + PSKcheck boxes.Check the WPA3 Policy, AES and OWE check boxes. Enter the Transition Mode WLAN ID. Click Apply to Device. Configuring WPA3 OWE Transition Mode Follow the procedure given below to configure the WPA3 OWE transition mode. Note Policy validation is not done between open WLAN and OWE WLAN. The operator is expected to configure them appropriately. Procedure Step 1 Step 2 Step 3 Step 4 Command or Action configure terminal Example: Device# configure terminal wlan wlan-name wlan-id SSID-name Example: Device(config)# wlan WPA3 1 WPA3 no security wpa akm dot1x Example: Device(config-wlan)# no security wpa akm dot1x no security ft over-the-ds Example: Purpose Enters global configuration mode. Enters the WLAN configuration sub-mode. Disables security AKM for dot1x. Disables fast transition over the data source on the WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1092 Security Configuring WPA3 OWE Transition Mode Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action Device(config-wlan)# no security ft over-the-ds Purpose no security ft Example: Device(config-wlan)# no security ft Disables 802.11r fast transition on the WLAN. no security wpa wpa2 Example: Device(config-wlan)# no security wpa wpa2 Disables WPA2 security. PMF is disabled now. security wpa wpa2 ciphers aes Enables WPA2 ciphers for AES. Example: Device(config-wlan)# security wpa wpa2 ciphers aes security wpa wpa3 Enables WPA3 support. Example: Device(config-wlan)# security wpa wpa3 security wpa akm owe Enables WPA3 OWE support. Example: Device(config-wlan)# security wpa akm owe security wpa transition-mode-wlan-id wlan-id Example: Device(config-wlan)# security wpa transition-mode-wlan-id 1 Configures the open or OWE transition mode WLAN ID. Note Validation is not performed on the transition mode WLAN. The operator is expected to configure it correctly with OWE WLAN having open WLAN identifier and the opposite way. You should configure OWE WLAN ID as transition mode WLAN in open WLAN. Similarly, open WLAN should be configured as transition mode WLAN in OWE WLAN configuration. no shutdown Example: Device(config-wlan)# no shutdown Enables the WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1093 Configuring WPA3 SAE (GUI) Security Step 12 Command or Action end Example: Device(config-wlan)# end Purpose Returns to the privileged EXEC mode. Configuring WPA3 SAE (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Tags & Profiles > WLANs. Click Add. In the General tab, enter the Profile Name, the SSID and the WLAN ID. Choose Security > Layer2 tab. Choose WPA2+WPA3 in Layer 2 Security Mode drop-down list. Uncheck the WPAPolicy, 802.1x, Over the DS, FT + 802.1x and FT + PSKcheck boxes.Check the WPA3 Policy, AES and PSK check boxes. Enter the Pre-Shared Key and choose the PSK Format from the PSK Format drop-down list and the PSK Type from the PSK Type drop-down list. Click Apply to Device. Configuring WPA3 SAE Follow the procedure given below to configure WPA3 SAE. Before you begin Configure PMF internally. The associated ciphers configuration can use the WPA2 ciphers. Procedure Step 1 Step 2 Step 3 Command or Action configure terminal Example: Device# configure terminal wlan wlan-name wlan-id SSID-name Example: Device(config)# wlan WPA3 1 WPA3 no security wpa akm dot1x Example: Purpose Enters global configuration mode. Enters the WLAN configuration sub-mode. Disables security AKM for dot1x. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1094 Security Configuring WPA3 SAE Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action Device(config-wlan)# no security wpa akm dot1x Purpose no security ft over-the-ds Example: Device(config-wlan)# no security ft over-the-ds Disables fast transition over the data source on the WLAN. no security ft Example: Device(config-wlan)# no security ft Disables 802.11r fast transition on the WLAN. no security wpa wpa2 Example: Device(config-wlan)# no security wpa wpa2 Disables WPA2 security. PMF is disabled now. security wpa wpa2 ciphers aes Configures WPA2 cipher. Example: Note Device(config-wlan)# security wpa wpa2 ciphers aes You can check whether cipher is configured using no security wpa wpa2 ciphers aescommand. If cipher is not reset, configure the cipher. security wpa psk set-key ascii value preshared-key Specifies a preshared key. Example: Device(config-wlan)# security wpa psk set-key ascii 0 Cisco123 security wpa wpa3 Enables WPA3 support. Example: Note Device(config-wlan)# security wpa wpa3 If both WPA2 and WPA3 are supported (SAE and PSK together), it is optional to configure PMF. However, you cannot disable PMF. For WPA3, PMF is mandatory. security wpa akm sae Enables AKM SAE support. Example: Device(config-wlan)# security wpa akm sae no shutdown Example: Device(config-wlan)# no shutdown Enables the WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1095 Configuring WPA3 SAE iPSK (CLI) Security Step 12 Command or Action end Example: Device(config-wlan)# end Purpose Returns to the privileged EXEC mode. Configuring WPA3 SAE iPSK (CLI) Configuring a WPA3 SAE iPSK WLAN Profile (CLI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. wlan wlan-name wlan-id SSID-name Example: Device(config)# wlan wl-sae-ipsk 8 wl-sae-ipsk Enters the WLAN configuration sub-mode. mac-filtering mac-filter-name Example: Device(config-wlan)# mac-filtering aaa_list Sets MAC filtering support in WLAN. no security ft adaptive Example: Device(config-wlan)# no security ft adaptive Disables adaptive 802.11r. no security wpa wpa2 Example: Device(config-wlan)# no security wpa wpa2 Disables WPA2 security. security wpa psk set-key [ascii/hex] 0 [key] Configures the preshared key in WLAN. Example: Note Device(config-wlan)# security wpa psk set-key ascii 0 123456789 WPA preshared keys must contain 8 to 63 ASCII text characters or 64 hexadecimal characters. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1096 Security Configuring a Policy Profile (CLI) Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Command or Action no security wpa akm dot1x Example: Device(config-wlan)# no security wpa akm dot1x Purpose Disables security AKM for 802.1X. security wpa akm sae Enables AKM SAE support. Example: Device(config-wlan)# security wpa akm sae security wpa akm sae pwe h2e Example: Device(config-wlan)# security wpa akm sae pwe h2e Enables AKM SAE PWE support (hash-to-element). Note This step is applicable to Hunting and Pecking (HnP) password element method as well. security wpa wpa3 Enables WPA3 support. Example: Device(config-wlan)# security wpa wpa3 security pmf mandatory Example: Device(config-wlan)# security pmf mandatory Makes clients negotiate Protected Management Frames (PMF) protection in WLAN. no shutdown Example: Device(config-wlan)# no shutdown Enables the WLAN. Configuring a Policy Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy policy-profile-name Configures policy profile. Example: Device(config)# wireless profile policy po-sae-ipsk Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1097 Configuring a Passphrase in a Client Authorization Policy in the RADIUS Server(GUI) Security Step 3 Step 4 Step 5 Command or Action aaa-override Example: Device(config-wireless-policy)# aaa-override Purpose Configures AAA override to apply to the policies coming from the AAA or Cisco Identity Services Engine (ISE) server. vlan 166 Configures VLAN. Example: Device(config-wireless-policy)# vlan 166 no shutdown Example: Device(config-wireless-policy)# no shutdown Enables policy profile. Configuring a Passphrase in a Client Authorization Policy in the RADIUS Server(GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Log in to the Cisco Identity Services Engine (ISE). Click Policy and then click Policy Elements. Click Results. Expand Authorization and click Authorization Profiles. Click Add to create a new authorization profile for the URL filter. In the Name field, enter a name for the profile, for example, po-sae-ipsk. From the Access Type drop-down list, choose ACCESS_ACCEPT. From the Termination-Action drop-down list, choose RADIUS-Request. In the Advanced Attributes Setting section, from the drop-down list, choose Cisco:cisco-av-pair. Enter the following one by one and click (+) icon after each of them: · cisco-av-pair = psk-mode=ascii · cisco-av-pair = psk=123123123 Verify the contents in the Attributes Details section and click Save. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1098 Security Configuring WPA3 SAE H2E (GUI) Configuring WPA3 SAE H2E (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Choose Configuration > Tags & Profiles > WLANs. Click Add. In the General tab, enter the Profile Name, the SSID and the WLAN ID. Choose Security > Layer2 tab. From the Layer 2 Security Mode drop-down list, choose WPA2+WPA3 or WPA3. Uncheck the WPAPolicy, 802.1x, Over the DS, FT + 802.1x and FT + PSK check boxes. Check the WPA3 Policy, AES and PSK check boxes. Enter the Pre-Shared Key and from the PSK Format drop-down list, choose the PSK Format and from the PSK Type drop-down list, choose the PSK Type. Check the SAE check box. Note SAE is enabled only if the Fast Transition is disabled. From the SAE Password Element drop-down list, choose Hash to Element Only to configure the WPA3 SAE H2E. Click Apply to Device. Configuring WPA3 SAE H2E Procedure Step 1 Step 2 Step 3 Step 4 Command or Action configure terminal Example: Device# configure terminal wlan wlan-name wlan-id SSID-name Example: Device(config)# wlan WPA3 1 WPA3 no security wpa akm dot1x Example: Device(config-wlan)# no security wpa akm dot1x no security ft over-the-ds Example: Purpose Enters global configuration mode. Enters the WLAN configuration sub-mode. Disables security AKM for dot1x. Disables fast transition over the data source on the WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1099 Configuring WPA3 SAE H2E Security Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action Device(config-wlan)# no security ft over-the-ds Purpose no security ft Example: Device(config-wlan)# no security ft Disables 802.11r fast transition on the WLAN. no security wpa wpa2 Example: Device(config-wlan)# no security wpa wpa2 Disables WPA2 security. PMF is disabled now. security wpa wpa2 ciphers aes Configures WPA2 cipher. Example: Note Device(config-wlan)# security wpa wpa2 ciphers aes You can check whether cipher is configured using no security wpa wpa2 ciphers aes command. If cipher is not reset, configure the cipher. security wpa psk set-key ascii value preshared-key Specifies a preshared key. Example: Device(config-wlan)# security wpa psk set-key ascii 0 Cisco123 security wpa wpa3 Enables WPA3 support. Example: Device(config-wlan)# security wpa wpa3 security wpa akm sae Enables AKM SAE support. Example: Device(config-wlan)# security wpa akm sae security wpa akm sae pwe {h2e | hnp | both-h2e-hnp} Example: Device(config-wlan)# security wpa akm sae pwe Enables AKM SAE PWE support. PWE supports the following options: · h2e--Hash-to-Element only; disables HnP. · hnp--Hunting and Pecking only; disables H2E. · Both-h2e-hnp--Both Hash-to-Element and Hunting and Pecking support (Is the default option). Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1100 Security Configuring WPA3 WLAN for Transition Disable Step 12 Step 13 Command or Action no shutdown Example: Device(config-wlan)# no shutdown end Example: Device(config-wlan)# end Purpose Enables the WLAN. Returns to the privileged EXEC mode. Configuring WPA3 WLAN for Transition Disable Before you begin You can enable Transition Disable only when the security wpa wpa3 is enabled. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wlan wlan-name wlan-id SSID-name Example: Device(config)# wlan WPA3 1 WPA3 Enters the WLAN configuration sub-mode. Step 3 transition-disable Enables Transition Disable support. Example: Device(config-wlan)# transition-disable Step 4 end Example: Device(config-wlan)# end Returns to the privileged EXEC mode. Configuring Anti-Clogging and SAE Retransmission (GUI) Procedure Step 1 Step 2 Choose Configuration > Tags & Profiles > WLANs. Click Add. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1101 Configuring Anti-Clogging and SAE Retransmission Security Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 In the General tab, enter the Profile Name, the SSID and the WLAN ID. Enable or disable Status and Broadcast SSID toggle buttons. From the Radio Policy drop-down list, choose a policy. Choose Security > Layer2 tab. Check the SAE check box. Enter the Anti Clogging Threshold, Max Retries and Retransmit Timeout. Click Apply to Device. Configuring Anti-Clogging and SAE Retransmission Follow the procedure given below to configure anti-clogging and SAE retransmission. Note If the simultaneous SAE ongoing sessions are more than the configured anti-clogging threshold, then anti-clogging mechanism is triggered. Before you begin Ensure that SAE WLAN configuration is in place, as the steps given below are incremental in nature, in addition to the SAE WLAN configuration. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wlan wlan-name wlan-id SSID-name Example: Device(config)# wlan WPA3 1 WPA3 Enters the WLAN configuration sub-mode. Step 3 shutdown Example: Device(config-wlan)# no shutdown Disables the WLAN. Step 4 security wpa akm sae Example: Device(config-wlan)# security wpa akm sae Enables simultaneous authentication of equals as a security protocol. Step 5 security wpa akm sae anti-clogging-threshold Configures threshold on the number of open threshold sessions to trigger the anti-clogging procedure Example: for new sessions. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1102 Security Verifying WPA3 SAE and OWE Step 6 Step 7 Step 8 Step 9 Command or Action Device(config-wlan)# security wpa akm sae anti-clogging-threshold 2000 Purpose security wpa akm sae max-retries retry-limit Configures the maximum number of Example: retransmissions. Device(config-wlan)# security wpa akm sae max-retries 10 security wpa akm sae retransmit-timeout retransmit-timeout-limit Example: Device(config-wlan)# security wpa akm sae retransmit-timeout 500 Configures SAE message retransmission timeout value. no shutdown Example: Device(config-wlan)# no shutdown Enables the WLAN. end Example: Device(config-wlan)# end Returns to the privileged EXEC mode. Verifying WPA3 SAE and OWE To view the system level statistics for the client that has undergone successful SAE authentication, SAE authentication failures, SAE ongoing sessions, SAE commit and confirm message exchanges, use the following show command: Device# show wireless stats client detail Total Number of Clients : 0 client global statistics: ----------------------------------------------------------------------------- Total association requests received :0 Total association attempts :0 Total FT/LocalAuth requests :0 Total association failures :0 Total association response accepts :0 Total association response rejects :0 Total association response errors :0 Total association failures due to blacklist :0 Total association drops due to multicast mac :0 Total association drops due to throttling :0 Total association drops due to unknown bssid :0 Total association drops due to parse failure :0 Total association drops due to other reasons :0 Total association requests wired clients :0 Total association drops wired clients :0 Total association success wired clients :0 Total peer association requests wired clients : 0 Total peer association drops wired clients :0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1103 Verifying WPA3 SAE and OWE Security Total peer association success wired clients :0 Total 11r ft authentication requests received : 0 Total 11r ft authentication response success :0 Total 11r ft authentication response failure :0 Total 11r ft action requests received :0 Total 11r ft action response success :0 Total 11r ft action response failure :0 Total AID allocation failures :0 Total AID free failures :0 Total roam attempts :0 Total CCKM roam attempts :0 Total 11r roam attempts :0 Total 11i fast roam attempts :0 Total 11i slow roam attempts :0 Total other roam type attempts :0 Total roam failures in dot11 :0 Total WPA3 SAE attempts :0 Total WPA3 SAE successful authentications :0 Total WPA3 SAE authentication failures :0 Total incomplete protocol failures :0 Total WPA3 SAE commit messages received :0 Total WPA3 SAE commit messages rejected :0 Total unsupported group rejections :0 Total WPA3 SAE commit messages sent :0 Total WPA3 SAE confirm messages received :0 Total WPA3 SAE confirm messages rejected :0 Total WPA3 SAE confirm messgae field mismatch : 0 Total WPA3 SAE confirm message invalid length : 0 Total WPA3 SAE confirm messages sent :0 Total WPA3 SAE Open Sessions :0 Total SAE Message drops due to throttling :0 Total Flexconnect local-auth roam attempts :0 Total AP 11i fast roam attempts :0 Total 11i slow roam attempts :0 Total client state starts :0 Total client state associated :0 Total client state l2auth success :0 Total client state l2auth failures :0 Total blacklisted clients on dot1xauth failure : 0 Total client state mab attempts :0 Total client state mab failed :0 Total client state ip learn attempts :0 Total client state ip learn failed :0 Total client state l3 auth attempts :0 Total client state l3 auth failed :0 Total client state session push attempts :0 Total client state session push failed :0 Total client state run :0 Total client deleted :0 To view the WLAN summary details, use the following command. Device# show wlan summary Number of WLANs: 3 ID Profile Name SSID Status Security ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 1 wlan-demo ssid-demo DOWN [WPA3][SAE][AES] Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1104 Security Verifying WPA3 SAE and OWE 3 CR1_SSID_mab-ext-radius [WPA2][802.1x][AES] 109 guest-wlan1 [WPA2][802.1x][AES],[Web Auth] CR1_SSID_mab-ext-radius docssid DOWN DOWN To view the WLAN properties (WPA2 and WPA3 mode) based on the WLAN ID, use the following command. Device# show wlan id 1 WLAN Profile Name : wlan-demo ================================================ Identifier :1 ! ! ! Security 802.11 Authentication Static WEP Keys Wi-Fi Protected Access (WPA/WPA2/WPA3) WPA (SSN IE) WPA2 (RSN IE) WPA3 (WPA3 IE) AES Cipher CCMP256 Cipher GCMP128 Cipher GCMP256 Cipher Auth Key Management 802.1x PSK CCKM FT dot1x FT PSK Dot1x-SHA256 PSK-SHA256 SAE OWE SUITEB-1X SUITEB192-1X CCKM TSF Tolerance OSEN FT Support FT Reassociation Timeout FT Over-The-DS mode PMF Support PMF Association Comeback Timeout PMF SA Query Time Web Based Authentication Conditional Web Redirect Splash-Page Web Redirect Webauth On-mac-filter Failure Webauth Authentication List Name Webauth Authorization List Name Webauth Parameter Map ! ! ! : Open System : Disabled : Enabled : Disabled : Disabled : Enabled : Enabled : Disabled : Disabled : Disabled : Disabled : Disabled : Disabled : Disabled : Disabled : Disabled : Disabled : Enabled : Disabled : Disabled : Disabled : 1000 : Disabled : Adaptive : 20 : Enabled : Required :1 : 200 : Disabled : Disabled : Disabled : Disabled : Disabled : Disabled : Disabled To view the correct AKM for the client that has undergone SAE authentication, use the following command. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1105 Verifying WPA3 SAE H2E Support in WLAN Security Device# show wireless client mac-address <e0ca.94c9.6be0> detail Client MAC Address : e0ca.94c9.6be0 ! ! ! Wireless LAN Name: WPA3 ! ! ! Policy Type : WPA3 Encryption Cipher : CCMP (AES) Authentication Key Management : SAE ! ! ! To view the correct AKM for the client that has undergone OWE authentication, use the following command. Device# show wireless client mac-address <e0ca.94c9.6be0> detail Client MAC Address : e0ca.94c9.6be0 ! ! ! Wireless LAN Name: WPA3 ! ! ! Policy Type : WPA3 Encryption Cipher : CCMP (AES) Authentication Key Management : OWE ! ! ! To view the list of PMK cache stored locally, use the following command. Device# show wireless pmk-cache Number of PMK caches in total : 0 Type Station Entry Lifetime VLAN Override IP Override Audit-Session-Id Username -------------------------------------------------------------------------------------------------------------------------------------- Verifying WPA3 SAE H2E Support in WLAN To view the WLAN properties (PWE method) based on the WLAN ID, use the following command: Device# show wlan id 1 WLAN Profile Name : wpa3 ================================================ Identifier :1 Description : Network Name (SSID) : wpa3 Status : Enabled Broadcast SSID : Enabled Advertise-Apname : Disabled Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1106 Security Verifying WPA3 SAE H2E Support in WLAN Universal AP Admin : Disabled Max Associated Clients per WLAN :0 Max Associated Clients per AP per WLAN :0 Max Associated Clients per AP Radio per WLAN : 200 OKC : Enabled Number of Active Clients :0 CHD per WLAN : Enabled WMM : Allowed WiFi Direct Policy : Disabled Channel Scan Defer Priority: Priority (default) :5 Priority (default) :6 Scan Defer Time (msecs) : 100 Media Stream Multicast-direct : Disabled CCX - AironetIe Support : Disabled Peer-to-Peer Blocking Action : Disabled DTIM period for 802.11a radio :1 DTIM period for 802.11b radio :1 Local EAP Authentication : Disabled Mac Filter Authorization list name : Disabled Mac Filter Override Authorization list name : Disabled Accounting list name : 802.1x authentication list name : Disabled 802.1x authorization list name : Disabled Security 802.11 Authentication : Open System Static WEP Keys : Disabled Wi-Fi Protected Access (WPA/WPA2/WPA3) : Enabled WPA (SSN IE) : Disabled WPA2 (RSN IE) : Disabled WPA3 (WPA3 IE) : Enabled AES Cipher : Enabled CCMP256 Cipher : Disabled GCMP128 Cipher : Disabled GCMP256 Cipher : Disabled Auth Key Management 802.1x : Disabled PSK : Disabled CCKM : Disabled FT dot1x : Disabled FT PSK : Disabled Dot1x-SHA256 : Disabled PSK-SHA256 : Disabled SAE : Enabled OWE : Disabled SUITEB-1X : Disabled SUITEB192-1X : Disabled SAE PWE Method : Hash to Element(H2E) Transition Disable : Disabled CCKM TSF Tolerance (msecs) : 1000 OWE Transition Mode : Disabled OSEN : Disabled FT Support : Disabled FT Reassociation Timeout (secs) : 20 FT Over-The-DS mode : Disabled PMF Support : Required PMF Association Comeback Timeout (secs): 1 PMF SA Query Time (msecs) : 200 Web Based Authentication : Disabled Conditional Web Redirect : Disabled Splash-Page Web Redirect : Disabled Webauth On-mac-filter Failure : Disabled Webauth Authentication List Name : Disabled Webauth Authorization List Name : Disabled Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1107 Verifying WPA3 SAE H2E Support in WLAN Security Webauth Parameter Map : Disabled Band Select : Disabled Load Balancing : Disabled Multicast Buffer : Disabled Multicast Buffers (frames) :0 IP Source Guard : Disabled Assisted-Roaming Neighbor List : Enabled Prediction List : Disabled Dual Band Support : Disabled IEEE 802.11v parameters Directed Multicast Service : Enabled BSS Max Idle : Enabled Protected Mode : Disabled Traffic Filtering Service : Disabled BSS Transition : Enabled Disassociation Imminent : Disabled Optimised Roaming Timer (TBTTS) : 40 Timer (TBTTS) : 200 Dual Neighbor List : Disabled WNM Sleep Mode : Disabled 802.11ac MU-MIMO : Enabled 802.11ax parameters 802.11ax Operation Status : Enabled OFDMA Downlink : Enabled OFDMA Uplink : Enabled MU-MIMO Downlink : Enabled MU-MIMO Uplink : Enabled BSS Target Wake Up Time : Enabled BSS Target Wake Up Time Broadcast Support : Enabled 802.11 protocols in 2.4ghz band Protocol : dot11bg Advanced Scheduling Requests Handling : Enabled mDNS Gateway Status : Bridge WIFI Alliance Agile Multiband : Disabled Device Analytics Advertise Support : Enabled Advertise Support for PC analytics : Enabled Share Data with Client : Disabled Client Scan Report (11k Beacon Radio Measurement) Request on Association : Disabled Request on Roam : Disabled WiFi to Cellular Steering : Disabled Advanced Scheduling Requests Handling : Enabled Locally Administered Address Configuration Deny LAA clients : Disabled To verify the client association who have used the PWE method as H2E or HnP, use the following command: Device# show wireless client mac-address e884.a52c.47a5 detail Client MAC Address : e884.a52c.47a5 Client MAC Type : Universally Administered Address Client DUID: NA Client IPv4 Address : 11.11.0.65 Client IPv6 Addresses : fe80::c80f:bb8c:86f6:f71f Client Username: N/A AP MAC Address : d4ad.bda2.e9e0 AP Name: APA453.0E7B.E73C AP slot : 1 Client State : Associated Policy Profile : default-policy-profile Flex Profile : N/A Wireless LAN Id: 1 WLAN Profile Name: wpa3 Wireless LAN Network Name (SSID): wpa3 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1108 Security Verifying WPA3 SAE H2E Support in WLAN BSSID : d4ad.bda2.e9ef Connected For : 72 seconds Protocol : 802.11ax - 5 GHz Channel : 36 Client IIF-ID : 0xa0000001 Association Id : 2 Authentication Algorithm : Simultaneous Authentication of Equals (SAE) Idle state timeout : N/A Session Timeout : 1800 sec (Remaining time: 1728 sec) Session Warning Time : Timer not running Input Policy Name : None Input Policy State : None Input Policy Source : None Output Policy Name : None Output Policy State : None Output Policy Source : None WMM Support : Enabled U-APSD Support : Disabled Fastlane Support : Disabled Client Active State : Active Power Save : OFF Current Rate : m6 ss2 Supported Rates : 6.0,9.0,12.0,18.0,24.0,36.0,48.0,54.0 AAA QoS Rate Limit Parameters: QoS Average Data Rate Upstream : 0 (kbps) QoS Realtime Average Data Rate Upstream : 0 (kbps) QoS Burst Data Rate Upstream : 0 (kbps) QoS Realtime Burst Data Rate Upstream : 0 (kbps) QoS Average Data Rate Downstream : 0 (kbps) QoS Realtime Average Data Rate Downstream : 0 (kbps) QoS Burst Data Rate Downstream : 0 (kbps) QoS Realtime Burst Data Rate Downstream : 0 (kbps) Mobility: Move Count :0 Mobility Role : Local Mobility Roam Type : None Mobility Complete Timestamp : 08/24/2021 04:39:47 Pacific Client Join Time: Join Time Of Client : 08/24/2021 04:39:47 Pacific Client State Servers : None Client ACLs : None Policy Manager State: Run Last Policy Manager State : IP Learn Complete Client Entry Create Time : 72 seconds Policy Type : WPA3 Encryption Cipher : CCMP (AES) Authentication Key Management : SAE AAA override passphrase : No SAE PWE Method : Hash to Element(H2E) Transition Disable Bitmap : None User Defined (Private) Network : Disabled User Defined (Private) Network Drop Unicast : Disabled Encrypted Traffic Analytics : No Protected Management Frame - 802.11w : Yes EAP Type : Not Applicable VLAN Override after Webauth : No VLAN : VLAN0011 Multicast VLAN : 0 WiFi Direct Capabilities: WiFi Direct Capable : No Central NAT : DISABLED Session Manager: Point of Attachment : capwap_90000006 IIF ID : 0x90000006 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1109 Verifying WPA3 SAE H2E Support in WLAN Security Authorized : TRUE Session timeout : 1800 Common Session ID: 000000000000000C76750C17 Acct Session ID : 0x00000000 Auth Method Status List Method : SAE Local Policies: Service Template : wlan_svc_default-policy-profile_local (priority 254) VLAN : VLAN0011 Absolute-Timer : 1800 Server Policies: Resultant Policies: VLAN Name : VLAN0011 VLAN : 11 Absolute-Timer : 1800 DNS Snooped IPv4 Addresses : None DNS Snooped IPv6 Addresses : None Client Capabilities CF Pollable : Not implemented CF Poll Request : Not implemented Short Preamble : Not implemented PBCC : Not implemented Channel Agility : Not implemented Listen Interval : 0 Fast BSS Transition Details : Reassociation Timeout : 0 11v BSS Transition : Implemented 11v DMS Capable : No QoS Map Capable : Yes FlexConnect Data Switching : N/A FlexConnect Dhcp Status : N/A FlexConnect Authentication : N/A Client Statistics: Number of Bytes Received from Client : 21757 Number of Bytes Sent to Client : 4963 Number of Packets Received from Client : 196 Number of Packets Sent to Client : 37 Number of Policy Errors : 0 Radio Signal Strength Indicator : -72 dBm Signal to Noise Ratio : 20 dB Fabric status : Disabled Radio Measurement Enabled Capabilities Capabilities: Neighbor Report, Passive Beacon Measurement, Active Beacon Measurement, Table Beacon Measurement Client Scan Report Time : Timer not running Client Scan Reports Assisted Roaming Neighbor List To view the number of SAE authentications using the H2E and HnP, use the following command: Device# show wireless stats client detail Total Number of Clients : 0 Protocol Statistics ----------------------------------------------------------------------------- Protcol Client Count 802.11b :0 802.11g :0 802.11a :0 802.11n-2.4GHz :0 802.11n-5 GHz :0 802.11ac :0 802.11ax-5 GHz :0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1110 Security Verifying WPA3 SAE H2E Support in WLAN 802.11ax-2.4 GHz :0 802.11ax-6 GHz :0 Current client state statistics: ----------------------------------------------------------------------------- Authenticating :0 Mobility :0 IP Learn :0 Webauth Pending :0 Run :0 Delete-in-Progress :0 Client Summary ----------------------------Current Clients : 0 Excluded Clients: 0 Disabled Clients: 0 Foreign Clients : 0 Anchor Clients : 0 Local Clients : 0 Idle Clients : 0 Locally Administered MAC Clients: 0 client global statistics: ----------------------------------------------------------------------------- Total association requests received :0 Total association attempts :0 Total FT/LocalAuth requests :0 Total association failures :0 Total association response accepts :0 Total association response rejects :0 Total association response errors :0 Total association failures due to exclusion list :0 Total association drops due to multicast mac :0 Total association drops due to random mac :0 Total association drops due to throttling :0 Total association drops due to unknown bssid :0 Total association drops due to parse failure :0 Total association drops due to other reasons :0 Total association requests wired clients :0 Total association drops wired clients :0 Total association success wired clients :0 Total peer association requests wired clients : 0 Total peer association drops wired clients :0 Total peer association success wired clients :0 Total association success wifi direct clients : 0 Total association rejects wifi direct clients : 0 Total association response errors :0 Total 11r ft authentication requests received : 0 Total 11r ft authentication response success :0 Total 11r ft authentication response failure :0 Total 11r ft action requests received :0 Total 11r ft action response success :0 Total 11r ft action response failure :0 Total 11r PMKR0-Name mismatch :0 Total 11r PMKR1-Name mismatch :0 Total 11r MDID mismatch :0 Total AID allocation failures :0 Total AID free failures :0 Total Roam Across Policy Profiles :0 Total roam attempts :0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1111 Verifying WPA3 Transition Disable in WLAN Security Total CCKM roam attempts :0 Total 11r roam attempts :0 Total 11r slow roam attempts :0 Total 11i fast roam attempts :0 Total 11i slow roam attempts :0 Total other roam type attempts :0 Total roam failures in dot11 :0 Total WPA3 SAE attempts :0 Total WPA3 SAE successful authentications :0 Total WPA3 SAE authentication failures :0 Total incomplete protocol failures :0 Total WPA3 SAE commit messages received :0 Total WPA3 SAE commit messages rejected :0 Total unsupported group rejections :0 Total PWE method mismatch for SAE Hash to Element commit received :0 Total PWE method mismatch for SAE Hunting And Pecking commit received : 0 Total WPA3 SAE commit messages sent :0 Total WPA3 SAE confirm messages received :0 Total WPA3 SAE confirm messages rejected :0 Total WPA3 SAE message confirm field mismatch : 0 Total WPA3 SAE confirm message invalid length : 0 Total WPA3 SAE confirm messages sent :0 Total WPA3 SAE Open Sessions :0 Total SAE Message drops due to throttling :0 Total WPA3 SAE Hash to Element commit received : 0 Total WPA3 SAE Hunting and Pecking commit received : 0 Total Flexconnect local-auth roam attempts :0 Total AP 11i fast roam attempts :0 Total AP 11i slow roam attempts :0 Total 11r flex roam attempts :0 Verifying WPA3 Transition Disable in WLAN To view the WLAN properties (transition disable) based on the WLAN ID, use the following command: Device# show wlan id 7 WLAN Profile Name : wl-sae ================================================ Identifier :7 Description : Network Name (SSID) : wl-sae Status : Enabled Broadcast SSID : Enabled Advertise-Apname : Disabled Universal AP Admin : Disabled Max Associated Clients per WLAN :0 Max Associated Clients per AP per WLAN :0 Max Associated Clients per AP Radio per WLAN : 200 OKC : Enabled Number of Active Clients :0 CHD per WLAN : Enabled WMM : Allowed WiFi Direct Policy : Disabled Channel Scan Defer Priority: Priority (default) :5 Priority (default) :6 Scan Defer Time (msecs) : 100 Media Stream Multicast-direct : Disabled CCX - AironetIe Support : Disabled Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1112 Security Verifying WPA3 Transition Disable in WLAN Peer-to-Peer Blocking Action Configured Radio Bands Operational State of Radio Bands 2.4ghz 5ghz DTIM period for 802.11a radio DTIM period for 802.11b radio Local EAP Authentication Mac Filter Authorization list name Mac Filter Override Authorization list name Accounting list name 802.1x authentication list name 802.1x authorization list name Security 802.11 Authentication Static WEP Keys Wi-Fi Protected Access (WPA/WPA2/WPA3) WPA (SSN IE) WPA2 (RSN IE) MPSK EasyPSK AES Cipher CCMP256 Cipher GCMP128 Cipher GCMP256 Cipher Randomized GTK WPA3 (WPA3 IE) AES Cipher CCMP256 Cipher GCMP128 Cipher GCMP256 Cipher Auth Key Management 802.1x PSK CCKM FT dot1x FT PSK Dot1x-SHA256 PSK-SHA256 SAE OWE SUITEB-1X SUITEB192-1X Transition Disable CCKM TSF Tolerance (msecs) : Disabled : All : UP : UP : : : Disabled : Disabled : Disabled : : Disabled : Disabled : Open System : Disabled : Enabled : Disabled : Enabled : Disabled : Disabled : Enabled : Disabled : Disabled : Disabled : Disabled : Enabled : Enabled : Disabled : Disabled : Disabled : Disabled : Enabled : Disabled : Disabled : Disabled : Disabled : Disabled : Enabled : Disabled : Disabled : Disabled : Enabled : 1000 To verify the client association who have used the transition disable, use the following command: Device# show wireless client mac-address 2c33.7a5b.8fc5 detail Client MAC Address : 2c33.7a5b.8fc5 Client MAC Type : Universally Administered Address Client DUID: NA Client IPv4 Address : 166.166.1.101 Client Username: N/A AP MAC Address : 7c21.0d48.ed00 AP Name: APF4BD.9EBD.A66C AP slot : 0 Client State : Associated Policy Profile : po-sae Flex Profile : N/A Wireless LAN Id: 7 WLAN Profile Name: wl-sae Wireless LAN Network Name (SSID): wl-sae BSSID : 7c21.0d48.ed02 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1113 Verifying WPA3 Transition Disable in WLAN Security Connected For : 15 seconds Protocol : 802.11n - 2.4 GHz Channel : 11 Client IIF-ID : 0xa0000002 Association Id : 1 Authentication Algorithm : Simultaneous Authentication of Equals (SAE) Idle state timeout : N/A Session Timeout : 1800 sec (Remaining time: 1787 sec) Session Warning Time : Timer not running Input Policy Name : None Input Policy State : None Input Policy Source : None Output Policy Name : None Output Policy State : None Output Policy Source : None WMM Support : Enabled U-APSD Support : Disabled Fastlane Support : Disabled Client Active State : In-Active Power Save : OFF Supported Rates : 1.0,2.0,5.5,6.0,9.0,11.0,12.0,18.0,24.0,36.0,48.0,54.0 AAA QoS Rate Limit Parameters: QoS Average Data Rate Upstream : 0 (kbps) QoS Realtime Average Data Rate Upstream : 0 (kbps) QoS Burst Data Rate Upstream : 0 (kbps) QoS Realtime Burst Data Rate Upstream : 0 (kbps) QoS Average Data Rate Downstream : 0 (kbps) QoS Realtime Average Data Rate Downstream : 0 (kbps) QoS Burst Data Rate Downstream : 0 (kbps) QoS Realtime Burst Data Rate Downstream : 0 (kbps) Mobility: Move Count : 0 Mobility Role : Local Mobility Roam Type : None Mobility Complete Timestamp : 05/16/2021 11:18:14 UTC Client Join Time: Join Time Of Client : 05/16/2021 11:18:14 UTC Client State Servers : None Client ACLs : None Policy Manager State: Run Last Policy Manager State : IP Learn Complete Client Entry Create Time : 15 seconds Policy Type : WPA3 Encryption Cipher : CCMP (AES) Authentication Key Management : SAE AAA override passphrase : No Transition Disable Bitmap : 0x01 User Defined (Private) Network : Disabled User Defined (Private) Network Drop Unicast : Disabled Encrypted Traffic Analytics : No Protected Management Frame - 802.11w : Yes Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1114 9 9 C H A P T E R IP Source Guard · Information About IP Source Guard, on page 1115 · Configuring IP Source Guard (GUI), on page 1115 · Configuring IP Source Guard, on page 1116 Information About IP Source Guard IP Source Guard (IPSG) is a Layer 2 security feature in the Cisco Catalyst 9800 Series Wireless Controller . It supports both IPv4 and IPv6 wireless clients. The IPSG feature prevents the wireless controller from forwarding the packets, with the source IP addresses that are not known to it. This security feature is not enabled by default and has to be explicitly configured. It is enabled on a per WLAN basis, and all the wireless clients joining that WLAN inherits this feature. The wireless controller maintains an IP/MAC pair binding table for the IPSG feature. Using this table, the wireless controller keeps track of IP and MAC address combination (binding) information for all the wireless clients. This binding information is captured as part of the IP learning process. When the feature is enabled on a WLAN, the wireless controller forwards the incoming packets (from the wireless clients) only if it finds a matching binding table entry corresponding to the source IP and MAC address combination of those packets. Otherwise, the packets are dropped. Configuring IP Source Guard (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Tags & Profiles > WLANs. Click the WLAN. In the Advanced tab, check the IP Source Guard checkbox. Click Update & Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1115 Configuring IP Source Guard Security Configuring IP Source Guard Follow the procedure given below to configure IPSG: Before you begin Cisco Catalyst 9800 Series Wireless Controller supports only one IPv4 address for a client and up to 8 IPv6 addresses (including link local addresses) per client. Procedure Step 1 Command or Action wlan profile-name wlan-id ssid Example: Device(config)# wlan mywlan 34 mywlan-ssid Purpose Specifies the WLAN name and ID to use. Note If a WLAN is not already configured, this step creates the WLAN. Step 2 Step 3 Step 4 shutdown Example: Device(config-wlan)# shutdown Disables the WLAN. ip verify source mac-check Example: Device(config-wlan)# ip verify source mac-check Enables the IP Source Guard feature. no shutdown Example: Device(config-wlan)# no shutdown Enables the WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1116 1 0 0 C H A P T E R 802.11w · Information About 802.11w, on page 1117 · Prerequisites for 802.11w, on page 1120 · Restrictions for 802.11w, on page 1120 · How to Configure 802.11w, on page 1121 · Disabling 802.11w, on page 1122 · Monitoring 802.11w, on page 1123 Information About 802.11w Wi-Fi is a broadcast medium that enables any device to eavesdrop and participate either as a legitimate or rogue device. Management frames such as authentication, de-authentication, association, dissociation, beacons, and probes are used by wireless clients to initiate and tear down sessions for network services. Unlike data traffic, which can be encrypted to provide a level of confidentiality, these frames must be heard and understood by all clients and therefore must be transmitted as open or unencrypted. While these frames cannot be encrypted, they must be protected from forgery to protect the wireless medium from attacks. For example, an attacker could spoof management frames from an AP to attack a client associated with the AP. The 802.11w protocol applies only to a set of robust management frames that are protected by the Protected Management Frames ( PMF) service. These include Disassociation, De-authentication, and Robust Action frames. Management frames that are considered as robust action and therefore protected are the following: · Spectrum Management · QoS · DLS · Block Ack · Radio Measurement · Fast BSS Transition · SA Query · Protected Dual of Public Action · Vendor-specific Protected Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1117 Information About 802.11w Security When 802.11w is implemented in the wireless medium, the following occur: · Client protection is added by the AP adding cryptographic protection to de-authentication and dissociation frames preventing them from being spoofed in a DOS attack. · Infrastructure protection is added by adding a Security Association (SA) tear down protection mechanism consisting of an Association Comeback Time and an SA-Query procedure preventing spoofed association request from disconnecting an already connected client. 802.11w has introduced a new IGTK Key, which is used to protect broadcast/multicast robust management frames: · IGTK is a random value assigned by the authenticator STA (WLC) and used to protect MAC management protocol data units (MMPDUs) from that source STA. When Management Frame Protection is negotiated, the AP encrypts the GTK and IGTK values in the EAPOL-Key frame, which is delivered in Message 3 of 4-way handshake. Figure 33: IGTK Exchange in 4-way Handshake · If the AP later changes the GTK, it sends the new GTK and IGTK to the client using the Group Key Handshake . 802.11w defines a new Broadcast/Multicast Integrity Protocol (BIP) that provides data integrity and replay protection for broadcast/multicast robust management frames after successful establishment of an IGTKSA - It adds a MIC that is calculated using the shared IGTK key. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1118 Security 802.11w Information Elements (IEs) Figure 34: 802.11w Information Elements Information About 802.11w 1. Modifications made in the RSN capabilities field of RSNIE. a. Bit 6: Management Frame Protection Required (MFPR) b. Bit 7: Management Frame Protection Capable (MFPC) 2. Two new AKM Suites, 5 and 6 are added for AKM Suite Selectors. 3. New Cipher Suite with type 6 is added to accommodate BIP. The WLC adds this modified RSNIE in association and re-association responses and the APs add this modified RSNIE in beacons and probe responses. The following Wireshark captures shows the RSNIE capabilities and the Group Management Cipher Suite elements. Figure 35: 802.11w Information Elements Security Association (SA) Teardown Protection SA teardown protection is a mechanism to prevent replay attacks from tearing down the session of an existing client. It consists of an Association Comeback Time and an SA-Query procedure preventing spoofed association requests from disconnecting an already connected client. If a client has a valid security association, and has negotiated 802.11w, the AP shall reject another Association Request with status code 30. This status code stands for "Association request rejected temporarily; Try again later". The AP should not tear down or otherwise modify the state of the existing association until the SA-Query Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1119 Prerequisites for 802.11w Security procedure determines that the original SA is invalid and shall include in the Association Response an Association Comeback Time information element, specifying a comeback time when the AP would be ready to accept an association with this client. The following capture shows the Association Reject message with status code 0x1e (30) and the Association comeback time set to 10 seconds. Figure 36: Association Reject with Comeback Time Following this, if the AP is not already engaged in an SA Query with the client, the AP shall issue an SA Query until a matching SA Query response is received or the Association Comeback time expires. An AP may interpret reception of a valid protected frame as an indication of a successfully completed SA Query. If a SA QUERY response with a matching transaction identifier within the time period, the AP shall allow the association process to be started without starting additional SA Query procedures. Prerequisites for 802.11w · To configure 802.11w feature for optional and mandatory, you must have WPA and AKM configured. Note The RNS (Robust Secure Network) IE must be enabled with an AES Cipher. Restrictions for 802.11w · 802.11w cannot be applied on an open WLAN, WEP-encrypted WLAN, or a TKIP-encrypted WLAN. · Cisco Catalyst 9800 Series Wireless Controller supports 802.11w + PMF combination for non-Apple clients. But Apple iOS version 11 and earlier require fix from the Apple iOS side to resolve the association issues. · The controller will ignore disassociation or deauthentication frames sent by the clients if they are not using 802.11w PMF. The client entry will only get deleted immediately upon reception of such a frame if the client uses PMF. This is to avoid denial of service by malicious device since there is no security on those frames without PMF. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1120 Security How to Configure 802.11w How to Configure 802.11w Configuring 802.11w (GUI) Before you begin WPA and AKM must be configured. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > WLANs. Click Add to create WLANs. The Add WLAN page is displayed. In the Security > Layer2 tab, navigate to the Protected Management Frame section. Choose PMF as Disabled, Optional, or Required. By default, the PMF is disabled. If you choose PMF as Optional or Required, you get to view the following fields: · Association Comeback Timer--Enter a value between 1 and 10 seconds to configure 802.11w association comeback time. · SA Query Time--Enter a value between 100 to 500 (milliseconds). This is required for clients to negotiate 802.11w PMF protection on a WLAN. Click Save & Apply to Device. Configuring 802.11w (CLI) Before you begin WPA and AKM must be configured. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wlan profile-name wlan-id ssid Example: Configures a WLAN and enters configuration mode. Device(config)# wlan wlan-test 12 alpha Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1121 Disabling 802.11w Security Step 3 Step 4 Step 5 Step 6 Command or Action security wpa akm dot1x-sha256 Example: Device(config-wlan)#security wpa akm dot1x-sha256 security pmf association-comeback comeback-interval Example: Device(config-wlan)# security pmf association-comeback 10 security pmf mandatory Example: Device(config-wlan)# security pmf mandatory security pmf saquery-retry-time timeout Example: Device(config-wlan)# security pmf saquery-retry-time 100 Purpose Configures 802.1x support. Configures the 802.11w association comeback time. Requires clients to negotiate 802.11w PMF protection on a WLAN. Time interval identified in milliseconds before which the SA query response is expected. If the device does not get a response, another SQ query is tried. Disabling 802.11w Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wlan profile-name wlan-id ssid Example: Configures a WLAN and enters configuration mode. Device(config)# wlan wlan-test 12 alpha Step 3 no security wpa akm dot1x-sha256 Disables 802.1x support. Example: Device(config-wlan)# no security wpa akm dot1x-sha256 Step 4 no security pmf association-comeback comeback-interval Example: Device(config-wlan)# no security pmf association-comeback 10 Disables the 802.11w association comeback time. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1122 Security Monitoring 802.11w Step 5 Step 6 Command or Action no security pmf mandatory Example: Device(config-wlan)# no security pmf mandatory Purpose Disables client negotiation of 802.11w PMF protection on a WLAN. no security pmf saquery-retry-time timeout Disables SQ query retry. Example: Device(config-wlan)# no security pmf saquery-retry-time 100 Monitoring 802.11w Use the following commands to monitor 802.11w. Procedure Step 1 Step 2 show wlan name wlan-name Displays the WLAN parameters on the WLAN. The PMF parameters are displayed. .... .... Auth Key Management 802.1x PSK CCKM FT dot1x FT PSK FT SAE Dot1x-SHA256 PSK-SHA256 SAE OWE SUITEB-1X SUITEB192-1X CCKM TSF Tolerance FT Support FT Reassociation Timeout FT Over-The-DS mode PMF Support PMF Association Comeback Timeout PMF SA Query Time .... .... : Disabled : Disabled : Disabled : Disabled : Disabled : Disabled : Enabled : Disabled : Disabled : Disabled : Disabled : Disabled : 1000 : Adaptive : 20 : Enabled : Required :1 : 500 show wireless client mac-address mac-address detail Displays the summary of the 802.11w authentication key management configuration on a client. .... .... Policy Manager State: Run Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1123 Monitoring 802.11w NPU Fast Fast Notified : No Last Policy Manager State : IP Learn Complete Client Entry Create Time : 497 seconds Policy Type : WPA2 Encryption Cipher : CCMP (AES) Authentication Key Management : 802.1x-SHA256 Encrypted Traffic Analytics : No Management Frame Protection : No Protected Management Frame - 802.11w : Yes EAP Type : LEAP VLAN : 39 Multicast VLAN : 0 Access VLAN : 39 Anchor VLAN : 0 WFD capable : No Manged WFD capable : No .... .... Security Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1124 1 0 1 C H A P T E R Management Frame Protection · Information About Management Frame Protection, on page 1125 · Restrictions for Management Frame Protection, on page 1126 · Configuring Management Frame Protection (CLI), on page 1127 · Verifying Management Frame Protection Settings, on page 1127 Information About Management Frame Protection By default, 802.11 management frames are unauthenticated and hence not protected against spoofing. Infrastructure management frame protection (MFP) and 802.11w protected management frames (PMF) provide protection against such attacks. Infrastructure MFP Infrastructure MFP protects management frames by detecting adversaries that are invoking denial-of-service attacks, flooding the network with associations and probes, interjecting as rogue APs, and affecting network performance by attacking the QoS and radio measurement frames. Infrastructure MFP is a global setting that provides a quick and effective means to detect and report phishing incidents. Specifically, infrastructure MFP protects 802.11 session management functions by adding message integrity check information elements (MIC IEs) to the management frames emitted by APs (and not those emitted by clients), which are then validated by other APs in the network. Infrastructure MFP is passive, can detect and report intrusions but has no means to stop them. Infrastructure MFP consists of three main components: · Management frame protection: The AP protects the management frames it transmits by adding a MIC IE to each frame. Any attempt to copy, alter, or replay the frame invalidates the MIC, causing any receiving AP configured to detect MFP frames to report the discrepancy. MFP is supported for use with Cisco Aironet lightweight APs. · Management frame validation: In infrastructure MFP, the AP validates every management frame that it receives from other APs in the network. It ensures that the MIC IE is present (when the originator is configured to transmit MFP frames) and matches the content of the management frame. If it receives any frame that does not contain a valid MIC IE from a BSSID belonging to an AP that is configured to transmit MFP frames, it reports the discrepancy to the network management system. In order for the timestamps to operate properly, all controllers must be Network Time Protocol (NTP) synchronized. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1125 Restrictions for Management Frame Protection Security · Event reporting: The AP notifies the controller when it detects an anomaly, and the controller aggregates the received anomaly events and can report the results through SNMP traps to the network management system. Infrastructure MFP is disabled by default, and you can enable it globally. When you upgrade from a previous software release, infrastructure MFP is disabled globally if you have enabled AP authentication because the two features are mutually exclusive. When you enable infrastructure MFP globally, signature generation (adding MICs to outbound frames) can be disabled for selected WLANs, and validation can be disabled for selected APs. Note CCXv5 client MFP is no longer supported. Client MFP is enabled as optional by default on WLANs that are configured for WPA2. However, client MFP is not supported on Wave 2 APs or 802.11ax Wi-Fi6 APs, and there exist no clients that support CCXv5. Supported Access Point Models Cisco MFP is supported on the following AP models: · Cisco Aironet 2802, 3802, and 4802 series access points · Cisco Aironet 2800, 3800, 4800, and 1560 series access points Unsupported Access Point Models Cisco MFP is not supported on the following AP models: · Cisco Aironet 1800 series access points · Cisco 802.11ax access points · All Cisco IOS access points Restrictions for Management Frame Protection · Lightweight access points support infrastructure MFP in local and monitor modes and in FlexConnect mode when the access point is connected to a controller. · Client MFP is supported for use only with CCXv5 clients using WPA2 with TKIP or AES-CCMP. · Client MFP is not supported on Cisco Wave 1 APs and Cisco Wave 2 APs. · 802.11ax access points do not support MFP. · Non-CCXv5 clients may associate to a WLAN, if client MFP is disabled or optional. · Error reports generated on a FlexConnect access point in standalone mode cannot be forwarded to the controller and are dropped. · Keys are generated using random number generator but you can improve the keys by changing to SHA. · MFP key for each BSSID is not supported. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1126 Security Configuring Management Frame Protection (CLI) Configuring Management Frame Protection (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless wps mfp Example: Device(config)# wireless wps mfp Step 3 wireless wps mfp {ap-impersonation | key-refresh-interval} Example: Device(config)# wireless wps mfp ap-impersonation Device(config)# wireless wps mfp key-refresh-interval Step 4 end Example: Device(config)# end Purpose Enters global configuration mode. Configures a management frame protection. Configures ap impersonation detection (or) MFP key refresh interval in hours. key-refresh-interval--Refers to the MFP key refresh interval in hours. The valid range is from 1 to 24. Default value is 24. Saves the configuration and exits configuration mode and returns to privileged EXEC mode. Verifying Management Frame Protection Settings To verify if the Management Frame Protection (MFP) feature is enabled or not, use the following command: Device# show wireless wps summary Client Exclusion Policy Excessive 802.11-association failures : unknown Excessive 802.11-authentication failures: unknown Excessive 802.1x-authentication : unknown IP-theft : unknown Excessive Web authentication failure : unknown Failed Qos Policy : unknown Management Frame Protection Global Infrastructure MFP state : Enabled AP Impersonation detection : Disabled Key refresh interval : 15 To view the MFP details, use the following command: Device# show wireless wps mfp summary Management Frame Protection Global Infrastructure MFP state : Enabled Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1127 Verifying Management Frame Protection Settings Security AP Impersonation detection Key refresh interval : Disabled : 15 To view the MFP statistics details, use the following command: Device# show wireless wps mfp statistics BSSID Radio DetectorAP FrameTypes LastSourceAddr Error Count aabb.ccdd.eeff a AP3800 Beacon, Probe Response Beacon, Probe Response aabb.ccdd.eeff Invalid MIC 10 Invalid MIC 20 To verify if access points support MFP validation and protection, use the following command: Device# show wireless wps mfp ap summary AP Name Radio MAC Validation Protection ------------------------------------------------------------------------------------------ AP002A.1087.CBF4 00a2.eefd.bdc0 Enabled Enabled AP58AC.78DE.9946 00a2.eeb8.4ae0 Enabled Enabled APb4de.3196.caac 4c77.6d83.6b90 Enabled Enabled Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1128 1 0 2 C H A P T E R IPv4 ACLs · Information about Network Security with ACLs, on page 1129 · Restrictions for Configuring IPv4 Access Control Lists, on page 1137 · How to Configure ACLs, on page 1138 · Configuration Examples for ACLs, on page 1151 · Monitoring IPv4 ACLs, on page 1155 Information about Network Security with ACLs This chapter describes how to configure network security on the switch by using access control lists (ACLs), which in commands and tables are also referred to as access lists. ACL Overview Packet filtering can help limit network traffic and restrict network use by certain users or devices. ACLs filter traffic as it passes through a controller and permit or deny packets crossing specified interfaces. An ACL is a sequential collection of permit and deny conditions that apply to packets. When a packet is received on an interface, the switch compares the fields in the packet against any applied ACLs to verify that the packet has the required permissions to be forwarded, based on the criteria specified in the access lists. One by one, it tests packets against the conditions in an access list. The first match decides whether the controller accepts or rejects the packets. Because the controller stops testing after the first match, the order of conditions in the list is critical. If no conditions match, the controller rejects the packet. If there are no restrictions, the controller forwards the packet; otherwise, the controller drops the packet. The controller can use ACLs on all packets it forwards. There is implcit any host deny deny rule. You configure access lists on a controller to provide basic security for your network. If you do not configure ACLs, all packets passing through the switch could be allowed onto all parts of the network. You can use ACLs to control which hosts can access different parts of a network or to decide which types of traffic are forwarded or blocked at router interfaces. For example, you can allow e-mail traffic to be forwarded but not Telnet traffic. Access Control Entries An ACL contains an ordered list of access control entries (ACEs). Each ACE specifies permit or deny and a set of conditions the packet must satisfy in order to match the ACE. The meaning of permit or deny depends on the context in which the ACL is used. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1129 ACL Supported Types Security Note The maximum number of ACEs that can be applied under an access policy (ACL) for central switching is 256 ACEs. The maximum number of ACEs applicable for Flex Mode or Local Switching is 64 ACEs. ACL Supported Types The switch supports IP ACLs and Ethernet (MAC) ACLs: · IP ACLs filter IPv4 traffic, including TCP, User Datagram Protocol (UDP), Internet Group Management Protocol (IGMP), and Internet Control Message Protocol (ICMP). · Ethernet ACLs filter non-IP traffic. This switch also supports quality of service (QoS) classification ACLs. Supported ACLs The controller supports three types of ACLs to filter traffic: · Port ACLs access-control traffic entering a Layer 2 interface. You can apply port ACLs to a Layer 2 interface in each direction to each access list type -- IPv4 and MAC. · Router ACLs access-control routed traffic between VLANs and are applied to Layer 3 interfaces in a specific direction (inbound or outbound). · FQDN ACL: FQDN ACL is encoded along with IPv6 ACL and sent to AP. FQDN ACL is always a custom ACL. AP does DNS snooping and sends the IPv4 and IPv6 addresses to the controller. ACL Precedence When Port ACLs, and router ACLs are configured on the same switch, the filtering precedence, from greatest to least for ingress traffic is port ACL, and then router ACL. For egress traffic, the filtering precedence is router ACL, and then port ACL. The following examples describe simple use cases: · When an input router ACL and input port ACL exist in a switch virtual interface (SVI), incoming packets received on ports to which a port ACL is applied are filtered by the port ACL. Incoming routed IP packets received on ports are filtered by the router ACL. Other packets are not filtered. · When an output router ACL and input port ACL exist in an SVI, incoming packets received on the ports to which a port ACL is applied are filtered by the port ACL. Outgoing routed IP packets are filtered by the router ACL. Other packets are not filtered. Port ACLs · Standard IP access lists using source addresses · Extended IP access lists using source and destination addresses and optional protocol type information · MAC extended access lists using source and destination MAC addresses and optional protocol type information Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1130 Security Router ACLs The switch examines ACLs on an interface and permits or denies packet forwarding based on how the packet matches the entries in the ACL. In this way, ACLs control access to a network or to part of a network. Figure 37: Using ACLs to Control Traffic in a Network This is an example of using port ACLs to control access to a network when all workstations are in the same VLAN. ACLs applied at the Layer 2 input would allow Host A to access the Human Resources network, but prevent Host B from accessing the same network. Port ACLs can only be applied to Layer 2 interfaces in the inbound direction. When you apply a port ACL to a trunk port, the ACL filters traffic on all VLANs present on the trunk port. When you apply a port ACL to a port with voice VLAN, the ACL filters traffic on both data and voice VLANs. With port ACLs, you can filter IP traffic by using IP access lists and non-IP traffic by using MAC addresses. You can filter both IP and non-IP traffic on the same Layer 2 interface by applying both an IP access list and a MAC access list to the interface. Note You can't apply more than one IP access list and one MAC access list to a Layer 2 interface. If an IP access list or MAC access list is already configured on a Layer 2 interface and you apply a new IP access list or MAC access list to the interface, the new ACL replaces the previously configured one. Router ACLs You can apply router ACLs on switch virtual interfaces (SVIs), which are Layer 3 interfaces to VLANs; on physical Layer 3 interfaces; and on Layer 3 EtherChannel interfaces. You apply router ACLs on interfaces for specific directions (inbound or outbound). You can apply one router ACL in each direction on an interface. The switch supports these access lists for IPv4 traffic: · Standard IP access lists use source addresses for matching operations. · Extended IP access lists use source and destination addresses and optional protocol type information for matching operations. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1131 ACEs and Fragmented and Unfragmented Traffic Security As with port ACLs, the switch examines ACLs associated with features configured on a given interface. As packets enter the switch on an interface, ACLs associated with all inbound features configured on that interface are examined. After packets are routed and before they are forwarded to the next hop, all ACLs associated with outbound features configured on the egress interface are examined. ACLs permit or deny packet forwarding based on how the packet matches the entries in the ACL, and can be used to control access to a network or to part of a network. ACEs and Fragmented and Unfragmented Traffic IP packets can be fragmented as they cross the network. When this happens, only the fragment containing the beginning of the packet contains the Layer 4 information, such as TCP or UDP port numbers, ICMP type and code, and so on. All other fragments are missing this information. Some access control entries (ACEs) do not check Layer 4 information and therefore can be applied to all packet fragments. ACEs that do test Layer 4 information cannot be applied in the standard manner to most of the fragments in a fragmented IP packet. When the fragment contains no Layer 4 information and the ACE tests some Layer 4 information, the matching rules are modified: · Permit ACEs that check the Layer 3 information in the fragment (including protocol type, such as TCP, UDP, and so on) are considered to match the fragment regardless of what the missing Layer 4 information might have been. Note For TCP ACEs with L4 Ops, the fragmented packets will be dropped per RFC 1858. · Deny ACEs that check Layer 4 information never match a fragment unless the fragment contains Layer 4 information. ACEs and Fragmented and Unfragmented Traffic Examples Consider access list 102, configured with these commands, applied to three fragmented packets: Device(config)# access-list 102 permit tcp any host 10.1.1.1 eq smtp Device(config)# access-list 102 deny tcp any host 10.1.1.2 eq telnet Device(config)# access-list 102 permit tcp any host 10.1.1.2 Device(config)# access-list 102 deny tcp any any Note In the first and second ACEs in the examples, the eq keyword after the destination address means to test for the TCP-destination-port well-known numbers equaling Simple Mail Transfer Protocol (SMTP) and Telnet, respectively. · Packet A is a TCP packet from host 10.2.2.2., port 65000, going to host 10.1.1.1 on the SMTP port. If this packet is fragmented, the first fragment matches the first ACE (a permit) as if it were a complete packet because all Layer 4 information is present. The remaining fragments also match the first ACE, even though they do not contain the SMTP port information, because the first ACE only checks Layer 3 information when applied to fragments. The information in this example is that the packet is TCP and that the destination is 10.1.1.1. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1132 Security Standard and Extended IPv4 ACLs · Packet B is from host 10.2.2.2, port 65001, going to host 10.1.1.2 on the Telnet port. If this packet is fragmented, the first fragment matches the second ACE (a deny) because all Layer 3 and Layer 4 information is present. The remaining fragments in the packet do not match the second ACE because they are missing Layer 4 information. Instead, they match the third ACE (a permit). Because the first fragment was denied, host 10.1.1.2 cannot reassemble a complete packet, so packet B is effectively denied. However, the later fragments that are permitted will consume bandwidth on the network and resources of host 10.1.1.2 as it tries to reassemble the packet. · Fragmented packet C is from host 10.2.2.2, port 65001, going to host 10.1.1.3, port ftp. If this packet is fragmented, the first fragment matches the fourth ACE (a deny). All other fragments also match the fourth ACE because that ACE does not check any Layer 4 information and because Layer 3 information in all fragments shows that they are being sent to host 10.1.1.3, and the earlier permit ACEs were checking different hosts. Standard and Extended IPv4 ACLs This section describes IP ACLs. An ACL is a sequential collection of permit and deny conditions. One by one, the switch tests packets against the conditions in an access list. The first match determines whether the switch accepts or rejects the packet. Because the switch stops testing after the first match, the order of the conditions is critical. If no conditions match, the switch denies the packet. The software supports these types of ACLs or access lists for IPv4: · Standard IP access lists use source addresses for matching operations. · Extended IP access lists use source and destination addresses for matching operations and optional protocol-type information for finer granularity of control. Note Only extended ACLs are supported while the standard ACLs are not supported. IPv4 ACL Switch Unsupported Features Configuring IPv4 ACLs on the switch is the same as configuring IPv4 ACLs on other Cisco switches and routers. The following ACL-related features are not supported: · Non-IP protocol ACLs · IP accounting · Reflexive ACLs, URL Redirect ACLs and Dynamic ACLs are not supported. Access List Numbers The number you use to denote your ACL shows the type of access list that you are creating. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1133 Numbered Standard IPv4 ACLs Security This lists the access-list number and corresponding access list type and shows whether or not they are supported in the switch. The switch supports IPv4 standard and extended access lists, numbers 1 to 199 and 1300 to 2699. Table 78: Access List Numbers Access List Number 199 100199 200299 300399 400499 500599 600699 700799 800899 900999 10001099 11001199 12001299 13001999 20002699 Type IP standard access list IP extended access list Protocol type-code access list DECnet access list XNS standard access list XNS extended access list AppleTalk access list 48-bit MAC address access list IPX standard access list IPX extended access list IPX SAP access list Extended 48-bit MAC address access list IPX summary address access list IP standard access list (expanded range) IP extended access list (expanded range) Supported Yes Yes No No No No No No No No No No No Yes Yes In addition to numbered standard and extended ACLs, you can also create standard and extended named IP ACLs by using the supported numbers. That is, the name of a standard IP ACL can be 1 to 99; the name of an extended IP ACL can be 100 to 199. The advantage of using named ACLs instead of numbered lists is that you can delete individual entries from a named list. Numbered Standard IPv4 ACLs When creating an ACL, remember that, by default, the end of the ACL contains an implicit deny statement for all packets that it did not find a match for before reaching the end. With standard access lists, if you omit the mask from an associated IP host address ACL specification, 0.0.0.0 is assumed to be the mask. The switch always rewrites the order of standard access lists so that entries with host matches and entries with matches having a don't care mask of 0.0.0.0 are moved to the top of the list, above any entries with non-zero don't care masks. Therefore, in show command output and in the configuration file, the ACEs do not necessarily appear in the order in which they were entered. After creating a numbered standard IPv4 ACL, you can apply it to terminal lines (virtual teletype (VTY) lines), or to interfaces. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1134 Security Numbered Extended IPv4 ACLs Numbered Extended IPv4 ACLs Although standard ACLs use only source addresses for matching, you can use extended ACL source and destination addresses for matching operations and optional protocol type information for finer granularity of control. When you are creating ACEs in numbered extended access lists, remember that after you create the ACL, any additions are placed at the end of the list. You cannot reorder the list or selectively add or remove ACEs from a numbered list. The switch does not support dynamic or reflexive access lists. It also does not support filtering based on the type of service (ToS) minimize-monetary-cost bit. Some protocols also have specific parameters and keywords that apply to that protocol. You can define an extended TCP, UDP, ICMP, IGMP, or other IP ACL. The switch also supports these IP protocols: These IP protocols are supported: · Authentication Header Protocol (ahp) · Encapsulation Security Payload (esp) · Enhanced Interior Gateway Routing Protocol (eigrp) · generic routing encapsulation (gre) · Internet Control Message Protocol (icmp) · Internet Group Management Protocol (igmp) · any Interior Protocol (ip) · IP in IP tunneling (ipinip) · KA9Q NOS-compatible IP over IP tunneling (nos) · Open Shortest Path First routing (ospf) · Payload Compression Protocol (pcp) · Protocol-Independent Multicast (pim) · Transmission Control Protocol (tcp) · User Datagram Protocol (udp) Named IPv4 ACLs You can identify IPv4 ACLs with an alphanumeric string (a name) rather than a number. You can use named ACLs to configure more IPv4 access lists in a router than if you were to use numbered access lists. If you identify your access list with a name rather than a number, the mode and command syntax are slightly different. However, at times, not all commands that use IP access lists accept a named access list. Note The name you give to a standard or extended ACL can also be a number in the supported range of access list numbers. That is, the name of a standard IP ACL can be 1 to 99 and . The advantage of using named ACLs instead of numbered lists is that you can delete individual entries from a named list. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1135 ACL Logging Security ACL Logging Consider these guidelines before configuring named ACLs: · Numbered ACLs are also available. · A standard ACL and an extended ACL cannot have the same name. The controller software can provide logging messages about packets permitted or denied by a standard IP access list. That is, any packet that matches the ACL causes an informational logging message about the packet to be sent to the console. The level of messages logged to the console is controlled by the logging console commands controlling the syslog messages. Note Because routing is done in hardware and logging is done in software, if a large number of packets match a permit or deny ACE containing a log keyword, the software might not be able to match the hardware processing rate, and not all packets will be logged. The first packet that triggers the ACL causes a logging message right away, and subsequent packets are collected over 5-minute intervals before they appear or logged. The logging message includes the access list number, whether the packet was permitted or denied, the source IP address of the packet, and the number of packets from that source permitted or denied in the prior 5-minute interval. Note The logging facility might drop some logging message packets if there are too many to be handled or if there is more than one logging message to be handled in 1 second. This behavior prevents the router from crashing due to too many logging packets. Therefore, the logging facility should not be used as a billing tool or an accurate source of the number of matches to an access list. Hardware and Software Treatment of IP ACLs ACL processing is performed in hardware. If the hardware reaches its capacity to store ACL configurations, all packets on that interface are dropped. The ACL scale for controllers is as follows: · Cisco Catalyst 9800-40 Wireless Controller, Cisco Catalyst 9800-L Wireless Controller, Cisco Catalyst 9800-CL Wireless Controller (small and medium) support 128 ACLs with 128 Access List Entries (ACEs). · Cisco Catalyst 9800-80 Wireless Controller and Cisco Catalyst 9800-CL Wireless Controller (large) support 256 ACLs and 256 ACEs. · FlexConnect and Fabric mode APs support 96 ACLs. Note If an ACL configuration cannot be implemented in the hardware due to an out-of-resource condition on the controller, then only the traffic in that VLAN arriving on that controller is affected. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1136 Security IPv4 ACL Interface Considerations When you enter the show ip access-lists privileged EXEC command, the match count displayed does not account for packets that are access controlled in hardware. Use the privileged EXEC command to obtain some basic hardware ACL statistics for switched and routed packets. IPv4 ACL Interface Considerations For inbound ACLs, after receiving a packet, the controller checks the packet against the ACL. If the ACL permits the packet, the controller continues to process the packet. If the ACL rejects the packet, the controller discards the packet. For outbound ACLs, after receiving and routing a packet to a controlled interface, the controller checks the packet against the ACL. If the ACL permits the packet, the controller sends the packet. If the ACL rejects the packet, the controller discards the packet. If an undefined ACL has nothing listed in it, it is an empty access list. Restrictions for Configuring IPv4 Access Control Lists The following are restrictions for configuring network security with ACLs: General Network Security The following are restrictions for configuring network security with ACLs: · A standard ACL and an extended ACL cannot have the same name. · Though visible in the command-line help strings, AppleTalk is not supported as a matching condition for the deny and permit MAC access-list configuration mode commands. · DNS traffic is permitted by default with or without ACL entries for clients that are awaiting web authentication. IPv4 ACL Network Interfaces The following restrictions apply to IPv4 ACLs to network interfaces: · When controlling access to an interface, you can use a named or numbered ACL. · You do not have to enable routing to apply ACLs to Layer 2 interfaces. MAC ACLs on a Layer 2 Interface After you create a MAC ACL, you can apply it to a Layer 2 interface to filter non-IP traffic coming in that interface. When you apply the MAC ACL, consider these guidelines: · You can apply no more than one IP access list and one MAC access list to the same Layer 2 interface. The IP access list filters only IP packets, and the MAC access list filters non-IP packets. · A Layer 2 interface can have only one MAC access list. If you apply a MAC access list to a Layer 2 interface that has a MAC ACL configured, the new ACL replaces the previously configured one. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1137 How to Configure ACLs Security Note The mac access-group interface configuration command is only valid when applied to a physical Layer 2 interface. You cannot use the command on EtherChannel port channels. IP Access List Entry Sequence Numbering · This feature does not support dynamic, reflexive, or firewall access lists. How to Configure ACLs Configuring IPv4 ACLs (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Security > ACL. Click Add. In the Add ACL Setup dialog box, enter the following parameters. · ACL Name: Enter the name for the ACL. · ACL Type: IPv4 Standard. · Sequence: Enter the sequence number. · Action: Choose Permit or Deny the packet flow from the drop-down list. · Source Type: Choose any, Host or Network from which the packet is sent. · Log: Enable or disable logging. Click Add. Add the rest of the rules and click Apply to Device. Configuring IPv4 ACLs Follow the procedure given below to use IP ACLs on the switch: Procedure Step 1 Step 2 Create an ACL by specifying an access list number or name and the access conditions. Apply the ACL to interfaces or terminal lines.. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1138 Security Creating a Numbered Standard ACL (GUI) Creating a Numbered Standard ACL (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Security > ACL. On the ACL page, click Add. In the Add ACL Setup window, enter the following parameters. · ACL Name: Enter the name for the ACL. · ACL Type: IPv4 Standard. · Sequence: Enter the sequence number. · Action: Choose Permit or Deny access from the drop-down list. · Source Type: Choose any, Host or Network · Log: Enable or disable logging, this is limited to ACLs associated to Layer 3 interface only. Click Add. Click Save & Apply to Device. Creating a Numbered Standard ACL (CLI) Follow the procedure given below to create a numbered standard ACL: Procedure Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. Enter your password if prompted. Device> enable Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 access-list access-list-number {deny | permit} Defines a standard IPv4 access list by using a source source-wildcard ] source address and wildcard. Example: Device(config)# access-list 2 deny The access-list-number is a decimal number from 1 to 99 or 1300 to 1999. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1139 Creating a Numbered Standard ACL (CLI) Security Command or Action your_host Step 4 end Example: Device(config)# end Step 5 show running-config Example: Device# show running-config Step 6 copy running-config startup-config Example: Device# copy running-config startup-config Purpose Enter deny or permit to specify whether to deny or permit access if conditions are matched. The source is the source address of the network or host from which the packet is being sent specified as: · The 32-bit quantity in dotted-decimal format. · The keyword any as an abbreviation for source and source-wildcard of 0.0.0.0 255.255.255.255. You do not need to enter a source-wildcard. · The keyword host as an abbreviation for source and source-wildcard of source 0.0.0.0. (Optional) The source-wildcard applies wildcard bits to the source. Note Logging is supported only on ACLs attached to Layer 3 interfaces. Returns to privileged EXEC mode. Verifies your entries. (Optional) Saves your entries in the configuration file. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1140 Security Creating a Numbered Extended ACL (GUI) Creating a Numbered Extended ACL (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Security > ACL. On the ACL page, click Add. In the Add ACL Setup window, enter the following parameters. · ACL Name: Enter the name for the ACL. · ACL Type: IPv4 Extended. · Sequence: Enter the sequence number. · Action: Choose Permit or Deny the packet flow from the drop-down list. · Source Type: Choose any, Host or Network from which the packet is sent. · Destination Type: Choose any, Host or Network to which the packet is sent. · Protocol: Choose a protocol from the drop-down list. · Log: Enable or disable logging. · DSCP: Enter to match packets with the DSCP value Click Add. Click Save & Apply to Device. Creating a Numbered Extended ACL (CLI) Follow the procedure given below to create a numbered extended ACL: Procedure Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Device# configure terminal Step 2 access-list access-list-number {deny | permit} Defines an extended IPv4 access list and the protocol source source-wildcard destination access conditions. destination-wildcard [precedence precedence] [tos tos] [fragments] [time-range time-range-name] [dscp dscp] The access-list-number is a decimal number from 100 to 199 or 2000 to 2699. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1141 Creating a Numbered Extended ACL (CLI) Security Command or Action Purpose Example: Enter deny or permit to specify whether to deny or permit the packet if conditions are Device(config)# access-list 101 permit matched. ip host 10.1.1.2 any precedence 0 tos 0 log For protocol, enter the name or number of an P protocol: ahp, eigrp, esp, gre, icmp, igmp, igrp, ip, ipinip, nos, ospf, pcp, pim, tcp, or udp, or an integer in the range 0 to 255 representing an IP protocol number. To match any Internet protocol (including ICMP, TCP, and UDP), use the keyword ip. Note This step includes options for most IP protocols. For additional specific parameters for TCP, UDP, ICMP, and IGMP, see the following steps. The source is the number of the network or host from which the packet is sent. The source-wildcard applies wildcard bits to the source. The destination is the network or host number to which the packet is sent. The destination-wildcard applies wildcard bits to the destination. Source, source-wildcard, destination, and destination-wildcard can be specified as: · The 32-bit quantity in dotted-decimal format. · The keyword any for 0.0.0.0 255.255.255.255 (any host). · The keyword host for a single host 0.0.0.0. The other keywords are optional and have these meanings: · precedence--Enter to match packets with a precedence level specified as a number from 0 to 7 or by name: routine (0), priority (1), immediate (2), flash (3), flash-override (4), critical (5), internet (6), network (7). · fragments--Enter to check non-initial fragments. · tos--Enter to match by type of service level, specified by a number from 0 to 15 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1142 Security Creating a Numbered Extended ACL (CLI) Command or Action Purpose or a name: normal (0), max-reliability (2), max-throughput (4), min-delay (8). · time-range--Specify the time-range name. · dscp--Enter to match packets with the DSCP value specified by a number from 0 to 63, or use the question mark (?) to see a list of available values. Note Your controller must support the ability to: · Mark DCSP · Mark UP · Map DSCP and UP For more information on DSCP-to-UP Mapping, see: https://tools.ietf.org/html/ draft-ietf-tsvwg-ieee-802-11-01 Step 3 Note If you enter a dscp value, you cannot enter tos or precedence. You can enter both a tos and a precedence value with no dscp. access-list access-list-number {deny | permit} Defines an extended TCP access list and the tcp source source-wildcard [operator port] access conditions. destination destination-wildcard [operator port] [precedence precedence] [tos tos] [fragments] [time-range time-range-name] [dscp dscp] [flag] The parameters are the same as those described for an extended IPv4 ACL, with these exceptions: Example: (Optional) Enter an operator and port to compare source (if positioned after source source-wildcard) or destination (if positioned Device(config)# access-list 101 permit tcp any any eq 500 after destination destination-wildcard) port. Possible operators include eq (equal), gt (greater than), lt (less than), neq (not equal), and range (inclusive range). Operators require a port number (range requires two port numbers separated by a space). Enter the port number as a decimal number (from 0 to 65535) or the name of a TCP port. Use only TCP port numbers or names when filtering TCP. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1143 Creating a Numbered Extended ACL (CLI) Security Step 4 Command or Action Purpose The other optional keywords have these meanings: · flag--Enter one of these flags to match by the specified TCP header bits: ack (acknowledge), fin (finish), psh (push), rst (reset), syn (synchronize), or urg (urgent). access-list access-list-number {deny | permit} (Optional) Defines an extended UDP access list udp source source-wildcard [operator port] and the access conditions. destination destination-wildcard [operator port] [precedence precedence] [tos tos] [fragments] [time-range time-range-name] [dscp dscp] The UDP parameters are the same as those described for TCP except that the [operator [port]] port number or name must be a UDP Example: port number or name, and the flag not valid for UDP. Device(config)# access-list 101 permit udp any any eq 100 Step 5 Step 6 access-list access-list-number {deny | permit} Defines an extended ICMP access list and the icmp source source-wildcard destination access conditions. destination-wildcard [icmp-type | [[icmp-type icmp-code] | [icmp-message]] [precedence precedence] [tos tos] [fragments] [time-range time-range-name] [dscp dscp] The ICMP parameters are the same as those described for most IP protocols in an extended IPv4 ACL, with the addition of the ICMP message type and code parameters. These Example: optional keywords have these meanings: Device(config)# access-list 101 permit icmp any any 200 · icmp-type--Enter to filter by ICMP message type, a number from 0 to 255. · icmp-code--Enter to filter ICMP packets that are filtered by the ICMP message code type, a number from 0 to 255. · icmp-message--Enter to filter ICMP packets by the ICMP message type name or the ICMP message type and code name. access-list access-list-number {deny | permit} (Optional) Defines an extended IGMP access igmp source source-wildcard destination list and the access conditions. destination-wildcard [igmp-type] [precedence precedence] [tos tos] [fragments] [time-range time-range-name] [dscp dscp] The IGMP parameters are the same as those described for most IP protocols in an extended IPv4 ACL, with this optional parameter. Example: igmp-type--To match IGMP message type, enter a number from 0 to 15, or enter the Device(config)# access-list 101 permit igmp any any 14 message name: dvmrp, host-query, host-report, pim, or trace. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1144 Security Creating Named Standard ACLs (GUI) Step 7 Command or Action end Example: Device(config)# end Purpose Returns to privileged EXEC mode. Creating Named Standard ACLs (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Click Configuration > Security > ACL. Click Add to create a new ACL setup. In the Add ACL Setup window, enter the following parameters. · ACL Name: Enter the name for the ACL · ACL Type: IPv4 Standard · Sequence: The valid range is between 1 and 99 or 1300 and 1999 · Action: Choose Permit or Deny access from the drop-down list. · Source Type: Choose any, Host or Network · Log: Enable or disable logging, this is limited to ACLs associated to Layer 3 interface only. Click Add to add the rule. Click Save & Apply to Device. Creating Named Standard ACLs Follow the procedure given below to create a standard ACL using names: Procedure Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. Enter your password if prompted. Device> enable Step 2 configure terminal Example: Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1145 Creating Named Standard ACLs Security Command or Action Device# configure terminal Purpose Step 3 ip access-list standard name Defines a standard IPv4 access list using a Example: name, and enter access-list configuration mode. The name can be a number from 1 to 99. Device(config)# ip access-list standard 20 Step 4 Use one of the following: · deny {source [source-wildcard] | host source | any} [log] · permit {source [source-wildcard] | host source | any} [log] In access-list configuration mode, specify one or more conditions denied or permitted to decide if the packet is forwarded or dropped. · host source--A source and source wildcard of source 0.0.0.0. Example: Device(config-std-nacl)# deny 192.168.0.0 0.0.255.255 255.255.0.0 0.0.255.255 · any--A source and source wildcard of 0.0.0.0 255.255.255.255. or Device(config-std-nacl)# permit 10.108.0.0 0.0.0.0 255.255.255.0 0.0.0.0 Step 5 end Example: Device(config-std-nacl)# end Step 6 show running-config Example: Device# show running-config Step 7 copy running-config startup-config Example: Device# copy running-config startup-config Returns to privileged EXEC mode. Verifies your entries. (Optional) Saves your entries in the configuration file. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1146 Security Creating Extended Named ACLs (GUI) Creating Extended Named ACLs (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Security > ACL. Click Add. In the Add ACL Setup window, enter the following parameters. · ACL Name: Enter the name for the ACL. · ACL Type: IPv4 Extended. · Sequence: Enter the sequence number. · Action: Choose Permit or Deny the packet flow from the drop-down list. · Source Type: Choose any, Host or Network from which the packet is sent. · Destination Type: Choose any, Host or Network to which the packet is sent. · Protocol: Choose a protocol from the drop-down list. · Log: Enable or disable logging. · DSCP: Enter to match packets with the DSCP value Click Add. Add the rest of the rules and click Apply to Device. Creating Extended Named ACLs Follow the procedure given below to create an extended ACL using names: Procedure Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. Enter your password if prompted. Device> enable Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1147 Creating Extended Named ACLs Security Step 3 Command or Action Purpose ip access-list extended name Defines an extended IPv4 access list using a Example: name, and enter access-list configuration mode. The name can be a number from 100 to 199. Device(config)# ip access-list extended 150 Step 4 Step 5 {deny | permit} protocol {source [source-wildcard] | host source | any} {destination [destination-wildcard] | host destination | any} [precedence precedence] [tos tos] [log] [time-range time-range-name] Example: In access-list configuration mode, specify the conditions allowed or denied. Use the log keyword to get access list logging messages, including violations. · host source--A source and source wildcard of source 0.0.0.0. Device(config-ext-nacl)# permit 0 any any · host destintation--A destination and destination wildcard of destination 0.0.0.0. · any--A source and source wildcard or destination and destination wildcard of 0.0.0.0 255.255.255.255. end Example: Returns to privileged EXEC mode. Device(config-ext-nacl)# end Step 6 show running-config Example: Device# show running-config Verifies your entries. Step 7 copy running-config startup-config Example: Device# copy running-config startup-config (Optional) Saves your entries in the configuration file. When you are creating extended ACLs, remember that, by default, the end of the ACL contains an implicit deny statement for everything if it did not find a match before reaching the end. For standard ACLs, if you omit the mask from an associated IP host address access list specification, 0.0.0.0 is assumed to be the mask. After you create an ACL, any additions are placed at the end of the list. You cannot selectively add ACL entries to a specific ACL. However, you can use no permit and no deny access-list configuration mode commands to remove entries from a named ACL. Being able to selectively remove lines from a named ACL is one reason you might use named ACLs instead of numbered ACLs. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1148 Security Applying an IPv4 ACL to an Interface (GUI) What to do next After creating a named ACL, you can apply it to interfaces or to VLANs. Applying an IPv4 ACL to an Interface (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Security > ACL. Click Associating Interfaces. Choose the interface from the Available Interfaces list to view its ACL details on the right-hand side. You can change the ACL details, if required. Click Save & Apply to Device. Applying an IPv4 ACL to an Interface (CLI) This section describes how to apply IPv4 ACLs to network interfaces. Beginning in privileged EXEC mode, follow the procedure given below to control access to an interface: Procedure Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Device# configure terminal Step 2 interface interface-id Example: Device(config)# Identifies a specific interface for configuration, and enter interface configuration mode. The interface can be a Layer 2 interface (port ACL), or a Layer 3 interface (router ACL). Step 3 ip access-group {access-list-number | name} Controls access to the specified interface. {in | out} Example: Device(config-if)# ip access-group 2 in Step 4 end Example: Returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1149 Applying ACL to Policy Profile (GUI) Security Command or Action Device(config-if)# end Step 5 show running-config Example: Device# show running-config Step 6 copy running-config startup-config Example: Device# copy running-config startup-config Purpose Displays the access list configuration. (Optional) Saves your entries in the configuration file. Applying ACL to Policy Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > Policy. On the Policy Profile page, click Add. In the Add Policy Profile window, click Access Policies tab. In the WLAN ACL area, choose the IPv4 ACL from the IPv4 ACL drop-down list. Click Apply to Device. Applying ACL to Policy Profile Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-policy Example: Configures a WLAN policy profile and enters wireless policy configuration mode. Device(config)# wireless profile policy profile-policy Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1150 Security Configuration Examples for ACLs Step 3 Step 4 Command or Action Purpose ipv4 acl acl-name Configures an IPv4 ACL. Example: Device(config-wireless-policy)# ipv4 acl test-acl end Example: Device(config-wireless-policy)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuration Examples for ACLs Examples: Including Comments in ACLs You can use the remark keyword to include comments (remarks) about entries in any IP standard or extended ACL. The remarks make the ACL easier for you to understand and scan. Each remark line is limited to 100 characters. The remark can go before or after a permit or deny statement. You should be consistent about where you put the remark so that it is clear which remark describes which permit or deny statement. For example, it would be confusing to have some remarks before the associated permit or deny statements and some remarks after the associated statements. To include a comment for IP numbered standard or extended ACLs, use the access-list access-list number remark remark global configuration command. To remove the remark, use the no form of this command. In this example, the workstation that belongs to Jones is allowed access, and the workstation that belongs to Smith is not allowed access: Device(config)# access-list 1 remark Permit only Jones workstation through Device(config)# access-list 1 permit 171.69.2.88 Device(config)# access-list 1 remark Do not allow Smith through Device(config)# access-list 1 deny 171.69.3.13 For an entry in a named IP ACL, use the remark access-list configuration command. To remove the remark, use the no form of this command. In this example, the Jones subnet is not allowed to use outbound Telnet: Device(config)# ip access-list extended telnetting Device(config-ext-nacl)# remark Do not allow Jones subnet to telnet out Device(config-ext-nacl)# deny tcp host 171.69.2.88 any eq telnet Examples: Applying an IPv4 ACL to a Policy Profile in a Wireless Environment This example shows how to apply an IPv4 ACL to a Policy Profile in a Wireless environment. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1151 IPv4 ACL Configuration Examples Security Note All IPv4 ACLs must be associated to a policy profile. This example uses extended ACLs to permit TCP traffic. 1. Creating an IPv4 ACL. Device(config)# ip access-list extended <acl-name> Device(config-ext-nacl)# 10 permit ip any 10.193.48.224 0.0.0.31 Device (config-ext-nacl)# 20 permit ip any any 2. Applying the IPv4 ACL to a policy profile. Device(config)# wireless profile policy <policy-profile-name> Device(config-wireless-policy)# shutdown Device(config-wireless-policy)# ipv4 acl <acl-name> Device(config-wireless-policy)# no shutdown IPv4 ACL Configuration Examples This section provides examples of configuring and applying IPv4 ACLs. For detailed information about compiling ACLs, see the Cisco IOS Security Configuration Guide, Release 12.4 and to the Configuring IP Services" section in the "IP Addressing and Services" chapter of the Cisco IOS IP Configuration Guide, Release 12.4. ACLs in a Small Networked Office Figure 38: Using Router ACLs to Control Traffic Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1152 Security Examples: ACLs in a Small Networked Office This shows a small networked office environment with routed Port 2 connected to Server A, containing benefits and other information that all employees can access, and routed Port 1 connected to Server B, containing confidential payroll data. All users can access Server A, but Server B has restricted access. Use router ACLs to do this in one of two ways: · Create a standard ACL, and filter traffic coming to the server from Port 1. · Create an extended ACL, and filter traffic coming from the server into Port 1. Examples: ACLs in a Small Networked Office This example uses a standard ACL to filter traffic coming into Server B from a port, permitting traffic only from Accounting's source addresses 172.20.128.64 to 172.20.128.95. The ACL is applied to traffic coming out of routed Port 1 from the specified source address. Device(config)# access-list 6 permit 172.20.128.64 0.0.0.31 Device(config)# end Device# how access-lists Standard IP access list 6 10 permit 172.20.128.64, wildcard bits 0.0.0.31 Device(config)# interface gigabitethernet1/0/1 Device(config-if)# ip access-group 6 out This example uses an extended ACL to filter traffic coming from Server B into a port, permitting traffic from any source address (in this case Server B) to only the Accounting destination addresses 172.20.128.64 to 172.20.128.95. The ACL is applied to traffic going into routed Port 1, permitting it to go only to the specified destination addresses. Note that with extended ACLs, you must enter the protocol (IP) before the source and destination information. Device(config)# access-list 106 permit ip any 172.20.128.64 0.0.0.31 Device(config)# end Device# show access-lists Extended IP access list 106 10 permit ip any 172.20.128.64 0.0.0.31 Device(config)# interface gigabitethernet1/0/1 Device(config-if)# ip access-group 106 in Example: Numbered ACLs In this example, network 10.0.0.0 is a Class A network whose second octet specifies a subnet; that is, its subnet mask is 255.255.0.0. The third and fourth octets of a network 10.0.0.0 address specify a particular host. Using access list 2, the switch accepts one address on subnet 48 and reject all others on that subnet. The last line of the list shows that the switch accepts addresses on all other network 10.0.0.0 subnets. The ACL is applied to packets entering a port. Device(config)# access-list 2 permit 10.48.0.3 Device(config)# access-list 2 deny 10.48.0.0 0.0.255.255 Device(config)# access-list 2 permit 10.0.0.0 0.255.255.255 Device(config)# Device(config-if)# ip access-group 2 in Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1153 Examples: Extended ACLs Security Examples: Extended ACLs In this example, the first line permits any incoming TCP connections with destination ports greater than 1023. The second line permits incoming TCP connections to the Simple Mail Transfer Protocol (SMTP) port of host 128.88.1.2. The third line permits incoming ICMP messages for error feedback. Device(config)# access-list 102 permit tcp any 128.88.0.0 0.0.255.255 gt 1023 Device(config)# access-list 102 permit tcp any host 128.88.1.2 eq 25 Device(config)# access-list 102 permit icmp any any Device(config)# Device(config-if)# ip access-group 102 in In this example, suppose that you have a network connected to the Internet, and you want any host on the network to be able to form TCP connections to any host on the Internet. However, you do not want IP hosts to be able to form TCP connections to hosts on your network, except to the mail (SMTP) port of a dedicated mail host. SMTP uses TCP port 25 on one end of the connection and a random port number on the other end. The same port numbers are used throughout the life of the connection. Mail packets coming in from the Internet have a destination port of 25. Because the secure system of the network always accepts mail connections on port 25, the incoming are separately controlled. Device(config)# access-list 102 permit tcp any 128.88.0.0 0.0.255.255 eq 23 Device(config)# access-list 102 permit tcp any 128.88.0.0 0.0.255.255 eq 25 Device(config)# Device(config-if)# ip access-group 102 in Examples: Named ACLs Creating named standard and extended ACLs This example creates a standard ACL named internet_filter and an extended ACL named marketing_group. The internet_filter ACL allows all traffic from the source address 1.2.3.4. Device(config)# ip access-list standard Internet_filter Device(config-ext-nacl)# permit 1.2.3.4 Device(config-ext-nacl)# exit The marketing_group ACL allows any TCP Telnet traffic to the destination address and wildcard 171.69.0.0 0.0.255.255 and denies any other TCP traffic. It permits ICMP traffic, denies UDP traffic from any source to the destination address range 171.69.0.0 through 179.69.255.255 with a destination port less than 1024, denies any other IP traffic, and provides a log of the result. Device(config)# ip access-list extended marketing_group Device(config-ext-nacl)# permit tcp any 171.69.0.0 0.0.255.255 eq telnet Device(config-ext-nacl)# deny tcp any any Device(config-ext-nacl)# permit icmp any any Device(config-ext-nacl)# deny udp any 171.69.0.0 0.0.255.255 lt 1024 Device(config-ext-nacl)# deny ip any any log Device(config-ext-nacl)# exit Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1154 Security Monitoring IPv4 ACLs The Internet_filter ACL is applied to outgoing traffic and the marketing_group ACL is applied to incoming traffic on a Layer 3 port. Device(config)# interface gigabitethernet3/0/1 Device(config-if)# ip address 2.0.5.1 255.255.255.0 Device(config-if)# ip access-group Internet_filter out Device(config-if)# ip access-group marketing_group in Deleting individual ACEs from named ACLs This example shows how you can delete individual ACEs from the named access list border-list: Device(config)# ip access-list extended border-list Device(config-ext-nacl)# no permit ip host 10.1.1.3 any Monitoring IPv4 ACLs You can monitor IPv4 ACLs by displaying the ACLs that are configured on the switch, and displaying the ACLs that have been applied to interfaces and VLANs. When you use the ip access-group interface configuration command to apply ACLs to a Layer 2 or 3 interface, you can display the access groups on the interface. You can also display the MAC ACLs applied to a Layer 2 interface. You can use the privileged EXEC commands as described in this table to display this information. Table 79: Commands for Displaying Access Lists and Access Groups Command show access-lists [number | name] show ip access-lists [number | name] show ip interface interface-id show running-config [interface interface-id] Purpose Displays the contents of one or all current IP and MAC address a specific access list (numbered or named). Displays the contents of all current IP access lists or a specific I (numbered or named). Displays detailed configuration and status of an interface. If IP i the interface and ACLs have been applied by using the ip access-gr configuration command, the access groups are included in the d Displays the contents of the configuration file for the switch or t interface, including all configured MAC and IP access lists and groups are applied to an interface. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1155 Monitoring IPv4 ACLs Security Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1156 1 0 3 C H A P T E R Downloadable ACL · Feature History for Downloadable ACL, on page 1157 · Information About Downloadable ACL, on page 1158 · Guidelines and Restrictions for Downloadable ACL, on page 1158 · Configuring dACL Name and Definition in Cisco ISE, on page 1159 · Configuring dACL in a Controller (CLI), on page 1159 · Configuring Explicit Authorization Server List (CLI), on page 1160 · Verifying dACL Configuration, on page 1161 Feature History for Downloadable ACL This table provides release and related information about the feature explained in this section. This feature is also available in all the releases subsequent to the one in which they are introduced in, unless noted otherwise. Table 80: Feature History for Downloadable ACL Release Cisco IOS XE Dublin 17.10.1 Feature Feature Information Downloadable The Downloadable ACL (dACL) feature defines and updates access ACL control lists (ACLs) in one place (Cisco ISE) and allows ACL download to all the applicable controllers. In Cisco IOS-XE 17.8 and earlier releases, you had to configure the name in Cisco ISE and define the ACL individually in each of the controllers. The dACL feature is supported only in a centralized controller with Local mode Access Points. Note The dACL feature is not supported in RLAN environments. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1157 Information About Downloadable ACL Security Information About Downloadable ACL ACLs are used to restrict network access to some users or devices based on predefined criteria. These criteria are specified as a list of Access Control Entries (ACEs). Each ACE has a matching condition based on packet header fields as follows: · IP addresses · ports · protocols · combination of IP addresses, ports, and protocols · Result (permit or deny) ACLs are applied to a controller on a per wireless client basis. Typically, you can configure ACLs in a controller itself. However, you can also configure ACLs to a connected Cisco ISE server and download them to the controller when a wireless client joins. Such ACLs are referred to as downloadable ACLs, per-user Dynamic ACLs, or dACLs. Downloadable ACLs are easy to maintain because they define or update ACLs in Cisco ISE and can be downloaded to all the applicable controllers. (In Cisco IOS-XE 17.8 and earlier releases, you had to configure the name in Cisco ISE and define the ACL individually in each of the controllers.) Scale Considerations for Downloadable ACL The following table provides the ACL scale numbers for controllers. Table 81: ACL Scale for Controllers Controllers ACL Scale Cisco Catalyst 9800-40 Wireless Controller (small or Supports 128 ACLs with 128 ACEs. medium) Cisco Catalyst 9800-80 Wireless Controller (large) Supports 256 ACLs and 256 ACEs. Guidelines and Restrictions for Downloadable ACL · dACL does not support FlexConnect local switching. · IPv6 dACLs are supported only in Cisco ISE 3.0 or a later release. · The dACL feature is supported only in a centralized controller with Local mode Access Points. Note The dACL feature is not supported in RLAN environments. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1158 Security Configuring dACL Name and Definition in Cisco ISE Configuring dACL Name and Definition in Cisco ISE Before you configure a dACL in a controller, you must configure the dACL name and definition in Cisco ISE. For more information, see Configure Per-User Dynamic Access Control Lists in ISE. Configuring dACL in a Controller (CLI) Before you begin · You should have configured the RADIUS server. · You should have configured the aaa-override command in the policy profile. For more information, see Configuring AAA for Local Authentication (CLI). Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy policy-profile-name Configures the wireless profile policy. Example: Device(config)# wireless profile policy named-policy-profile_4 Step 3 aaa-override Example: Device(config-wireless-policy)# aaa-override Configures AAA override to apply policies coming from the Cisco ISE servers. Step 4 no shutdown Example: Device(config-wireless-policy)# no shutdown Enables the profile policy. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1159 Configuring Explicit Authorization Server List (CLI) Security Configuring Explicit Authorization Server List (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 radius server server-name Example: Device(config)# radius server Test-SERVER2 Specifies the RADIUS server name. Step 3 address ipv4 ip-address Example: Device(config-radius-server)# address ipv4 124.3.52.62 Specifies the RADIUS server parameters. Step 4 pac key key Example: Device(config-radius-server)# pack key cisco Specify the authorization and encryption key used between the Device and the key string RADIUS daemon running on the RADIUS server. Step 5 exit Example: Device(config-radius-server)# exit Returns to the configuration mode. Step 6 aaa group server radius server-group-name Creates a radius server-group identification. Example: Note Device(config)# aaa group server radius authz-server-group server-group refers to the server group name. The valid range is from 1 to 32 alphanumeric characters. Step 7 Step 8 aaa authorization network authorization-list Creates an authorization method list for group server-group-name web-based authorization. Example: Note Device(config)# aaa authorization network authZlist group authz-server-group You must use the already created authorization method list. end Example: Device(config)# end Returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1160 Security Verifying dACL Configuration Verifying dACL Configuration To verify the dACL, use the following command: Device# show wireless client mac-address <client_mac> detail Local Policies: Service Template : wlan_svc_named-policy-profile_1_local (priority 254) VLAN : 16 Absolute-Timer : 1800 Server Policies: ACS ACL : xACSACLx-IP-tftpv4_2-62de6299 ACS ACL : xACSACLx-IPV6-tftpv6_2-62de8087 Resultant Policies: ACS ACL : xACSACLx-IP-tftpv4_2-62de6299 ACS ACL : xACSACLx-IPV6-tftpv6_2-62de8087 VLAN Name : VLAN0016 VLAN : 16 Absolute-Timer : 1800 To verify dACLs, use the following commands: Device# show ip access-lists xACSACLx-IP-tftpv4_2-62de6299 Extended IP access list xACSACLx-IP-tftpv4_2-62de6299 1 deny ip any host 9.8.29.13 2 permit ip any any (58 matches) Device# show ipv6 access-list xACSACLx-IPV6-tftpv6_2-62de8087 IPv6 access list xACSACLx-IPV6-tftpv6_2-62de8087 deny ipv6 any host 2001:9:8:29:3AAD:A27A:973A:97CC sequence 1 permit ipv6 any any (2 matches) sequence 2 To view all the downloaded dACLs, use the following command: Device# show ip access-lists Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1161 Verifying dACL Configuration Security Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1162 1 0 4 C H A P T E R DNS-Based Access Control Lists · Information About DNS-Based Access Control Lists, on page 1163 · Restrictions on DNS-Based Access Control Lists, on page 1166 · Flex Mode, on page 1167 · Local Mode, on page 1169 · Viewing DNS-Based Access Control Lists, on page 1172 · Configuration Examples for DNS-Based Access Control Lists, on page 1173 · Verifying DNS Snoop Agent (DSA), on page 1174 · Information About Flex Client IPv6 Support with WebAuth Pre and Post ACL, on page 1175 · Enabling Pre-Authentication ACL for LWA and EWA (GUI), on page 1176 · Enabling Pre-Authentication ACL for LWA and EWA, on page 1176 · Enabling Post-Authentication ACL for LWA and EWA (GUI), on page 1178 · Enabling Post-Authentication ACL for LWA and EWA, on page 1178 · Enabling DNS ACL for LWA and EWA (GUI), on page 1179 · Enabling DNS ACL for LWA and EWA, on page 1179 · Verifying Flex Client IPv6 Support with WebAuth Pre and Post ACL, on page 1180 Information About DNS-Based Access Control Lists The DNS-based ACLs are used for wireless client devices. When using these devices, you can set pre-authentication ACLs on the Cisco Catalyst 9800 Series Wireless Controller to determine the data requests that are allowed or blocked. To enable DNS-based ACLs on the controller , you need to configure the allowed URLs or denied URLs for the ACLs. The URLs need to be pre-configured on the ACL. With DNS-based ACLs, the client when in registration phase is allowed to connect to the configured URLs. The controller is configured with the ACL name that is returned by the AAA server. If the ACL name is returned by the AAA server, then the ACL is applied to the client for web-redirection. At the client authentication phase, the AAA server returns the pre-authentication ACL (url-redirect-acl, which is the attribute name given to the AAA server). The DNS snooping is performed on the AP for each client until the registration is complete and the client is in SUPPLICANT PROVISIONING state. When the ACL configured with the URLs is received on the controller , the CAPWAP payload is sent to the AP enabling DNS snooping for the URLs to be snooped. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1163 Defining ACLs Security With URL snooping in place, the AP learns the IP address of the resolved domain name in the DNS response. If the domain name matches the configured URL, then the DNS response is parsed for the IP address, and the IP address is sent to the controller as a CAPWAP payload. The controller adds the IP address to the allowed list of IP addresses and thus the client can access the URLs configured. URL filtering allows access to the IP address for DNS ports 80 or 443. During pre-authentication or post-authentication, DNS ACL is applied to the client in the access point. If the client roams from one AP to another AP, the DNS learned IP addresses on the old AP is valid on the new AP as well. Note URL filtering is used only for local mode, whereas enhanced URL filtering is used only for flex mode local switching. Note URL filter needs to be attached to a policy profile in case of the local mode. In the flex mode, the URL filter is attached to the flex profile and it is not need to be attached to a policy profile. Note DNS based URLs work with active DNS query from the client. Hence, for URL filtering, the DNS should be setup correctly. Note URL filter takes precedence over punt or redirect ACL, and over custom or static pre-auth ACL.s Defining ACLs Extended ACLs are like standard ACLs but identifies the traffic more precisely. The following CLI allows you to define ACLs by name or by an identification number. Device(config)#ip access-list extended ? <100-199> Extended IP access-list number <2000-2699> Extended IP access-list number (expanded range) WORD Access-list name The following is the structure of a CLI ACL statement: <sequence number> [permit/deny] <protocol> <address or any> eq <port number> <subnet> <wildcard> For example: 1 permit tcp any eq www 192.168.1.0 0.0.0.255 The sequence number specifies where to insert the Access Control list Entry (ACE) in the ACL order of ACEs. You can define your statements with sequences of 10, 20, 30, 40, and so on. The controller GUI allows you to write a complete ACL going to the Configuration > Security > ACL page. You can view a list of protocols to pick from, and make changes to an existing ACL. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1164 Security Applying ACLs Applying ACLs The following are the ways to apply ACLs: · Security ACL: A security ACL defines the type of traffic that should be allowed through the device and that which should be blocked or dropped. A security ACL is applied: · On SVI interfaces: The ACL will only be evaluated against the traffic that is routed through the interface. Device(config)# interface Vlan<number> Device(config-if)# ip access-group myACL in/out · On a physical interface of the controller: The ACL will be evaluated against all traffic that passes through the interface. Along with applying ACLs on SVI, this is another option for restricting traffic on the controller management plane. Device(config)#interface GigabitEthernet1 Device(config-if)#ip access-group myACL in/out · In the wireless policy profile or WLAN: This option includes several places where you can configure an ACL that will be applied to the wireless client traffic, in case of central switching or local switching of traffic. Such ACLs are only supported in the inbound direction. · On the AP: In case of FlexConnect local switching, the ACL is configured and applied from the policy profile on the controller. This ACL has to be downloaded on to the AP through the Flex profile. ACLs must be downloaded to the AP before they can be applied. As an exception, fabric mode APs (in case of Software Defined Access) also use Flex ACLs even though the AP is not operating in Flex mode. · Punt ACL or Redirect ACL: Punt ACL or redirect ACL refers to an ACL that specifies as to which traffic will be sent to the CPU (instead of its normal expected handling by the dataplane) for further processing. For example, the Central Web Authentication (CWA) redirect ACL defines as to which traffic is intercepted and redirected to the web login portal. The ACL does not define any traffic to be dropped or allowed, but follows the regular processing or forwarding rules, and what will be sent to the CPU for interception. A redirect ACL has an invisible last statement which is an implicit deny. This implicit deny is applied as a security access list entry (and therefore drops traffic that is not explicitly allowed through or sent to the CPU). Types of URL Filters The following are the two types of URL filters: · Standard: Standard URL filters can be applied before client authentication (pre-auth) or after a successful client authentication (post-auth). Pre-auth filters are extremely useful in the case of external web authentication to allow access to the external login page, as well as, some internal websites before authentication takes place. Post-auth, they can work to block specific websites or allow only specific websites while all the rest is blocked by default. This type of URL filtering post-auth is better handled by using Cisco DNS Layer Security (formerly known as Umbrella) for more flexibility. The standard URL filters apply the same action (permit or deny) for the whole list of URLs. It is either all permit or all deny. Standard URL filter work on both local mode APs and FlexConnect APs. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1165 Restrictions on DNS-Based Access Control Lists Security · Enhanced: Enhanced URL filters allow specification of a different action (deny or permit) for each URL inside the list and have per-URL hit counters. They are only supported on FlexConnect APs in local switching (or fabric APs). In both types of URL filters, you can use a wildcard sub-domain such as *.cisco.com. URLfilters are standalone but always applied along with an IP-based ACL. A maximum of 20 URLs are supported in a given URL filter. Considering one URL can resolve multiple IP addresses, only up to 40 resolved IP addresses can be tracked for each client. Only DNS records are tracked by URL filters. The controller or APs do not track the resolved IP address of a URL if the DNS answer uses a CNAME alias record. Restrictions on DNS-Based Access Control Lists The restriction for DNS-based ACLs is as follows: · Pre-authentication and Post-authentication filters are supported in local modes. Only Pre-authentication filter is supported in Flex (Fabric) mode. · ACL override pushed from ISE is not supported. · FlexConnect Local Switching with External Web authentication using URL filtering is not supported until Cisco IOS XE Gibraltar 16.12.x. · Fully qualified domain name (FQDN) or DNS based ACLs are not supported on Cisco Wave 1 Access Points. · The URL filter considers only the first 20 URLs, though you can add more. · The URL filter employs regular regex patterns and permits wildcard characters only at the beginning or at the end of an URL. · The URL ACLs are defined and added to the FlexConnect policy profile in which they associate with a WLAN. The URL ACL creation follows a similar mechanism as that of local mode URL ACLs. · In FlexConnect mode, the URL domain ACL works only if they are connected to a FlexConnect policy profile. · The ACL can be attached to a WLAN by associating a policy profile with a WLAN or local policies. However, you can override it using "url-redirect-acl". · For the Cisco AV pair received from ISE, the policy that needs to be applied for a particular client is pushed as part of ADD MOBILE message. · When an AP joins or when an existing URL ACL is modified and applied on FlexConnect profile, the ACL definition along with mapped URL filter list is pushed to the AP. · The AP stores the URL ACL definition with mapped ACL name and snoops the DNS packets for learning the first IP address for each URL in the ACL. When the AP learns the IP addresses, it updates the controller of the URL and IP bindings. The controller records this information in the client database for future use. · When a client roams to another AP during the pre-authentication state, the learned IP addresses are pushed to a new AP. Otherwise, these learned IP addresses are purged when a client moves to a post-authentication state or when the TTL for the learned IP address expires. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1166 Security Flex Mode Flex Mode Defining URL Filter List Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 urlfilter enhanced-list list-name Configures the URL filter enhanced list. Example: Here, list-name refers to the URL filter list Device(config)# urlfilter enhanced-list name. The list name must not exceed 32 urllist_flex_preauth alphanumeric characters. Step 3 url url-name preference 0-65535 action {deny Configures the action: permit (allowed list) or | permit} deny (blocked list). Example: Device(config-urlfilter-enhanced-params)# url url-name preference 1 action permit Step 4 end Example: Device(config-urlfilter-params)# end Returns to privileged EXEC mode. Applying URL Filter List to Flex Profile Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile flex default-flex-profile Example: Device(config)# wireless profile flex default-flex-profile Creates a new flex policy. The default flex profile name is default-flex-profile. Step 3 acl-policy acl policy name Example: Configures ACL policy. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1167 Configuring ISE for Central Web Authentication (GUI) Security Step 4 Step 5 Command or Action Device(config-wireless-flex-profile)# acl-policy acl_name Purpose urlfilter list name Applies the URL list to the Flex profile. Example: Device(config-wireless-flex-profile-acl)# urlfilter list urllist_flex_preauth end Returns to privileged EXEC mode. Example: Device(config-wireless-flex-profile-acl)# end Configuring ISE for Central Web Authentication (GUI) Perform the following steps to configure ISE for Central Web Authentication. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Login to the Cisco Identity Services Engine (ISE). Click Policy and then click Policy Elements. Click Results. Expand Authorization and click Authorization Profiles. Click Add to create a new authorization profile for URL filter. Enter a name for the profile in the Name field. For example, CentralWebauth. Choose ACCESS_ACCEPT option from the Access Type drop-down list. Alternatively, in the Common Tasks section, check Web Redirection.. Choose the Centralized Web Auth option from the drop-down list. Specify the ACL and choose the ACL value from the drop-down list. In the Advanced Attributes Setting section, choose Cisco:cisco-av-pair from the drop-down list. Note Multiple ACL can be applied on the controller based on priority. In L2 Auth + webauth multi-auth scenario, if the ISE returns ACL during L2 Auth then ISE ACL takes precedence over the default webauth redirect ACL. This leads to traffic running in webauth pending state, if ISE ACL has permit rule. To avoid this scenario, you need to set the precedence for L2 Auth ISE returned ACL. The default webauth redirect ACL priority is 100. To avoid traffic issue, you need to configure the redirect ACL priority above 100 for ACL returned by ISE. Enter the following one by one and click (+) icon after each of them: · url-redirect-acl=<sample_name> · url-redirect=<sample_redirect_URL> For example, Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1168 Security Local Mode Step 13 Cisco:cisco-av-pair = priv-lvl=15 Cisco:cisco-av-pair = url-redirect-acl=ACL-REDIRECT2 Cisco:cisco-av-pair = url-redirect= https://9.10.8.247:port/portal/gateway? sessionId=SessionIdValue&portal=0ce17ad0-6d90-11e5-978e-005056bf2f0a&daysToExpiry=value&action=cwa Verify contents in the Attributes Details section and click Save. Local Mode Defining URL Filter List Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 urlfilter list list-name Example: Device(config)# urlfilter list urllist_local_preauth Configures the URL filter list. Here, list-name refers to the URL filter list name. The list name must not exceed 32 alphanumeric characters. Step 3 action permit Example: Configures the action: permit (allowed list) or deny (blocked list). Device(config-urlfilter-params)# action permit Step 4 filter-type post-authentication Example: Device(config-urlfilter-params)# filter-type post-authentication Note This step is applicable while configuring post-authentication URL filter only. Configures the URL list as post-authentication filter. Step 5 redirect-server-ip4 IPv4-address Example: Device(config-urlfilter-params)# redirect-server-ipv4 9.1.0.101 Configures the IPv4 redirect server for the URL list. Here, IPv4-address refers to the IPv4 address. Step 6 redirect-server-ip6 IPv6-address Example: Device(config-urlfilter-params)# redirect-server-ipv6 2001:300:8::82 Configures the IPv6 redirect server for the URL list. Here, IPv6-address refers to the IPv6 address. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1169 Applying URL Filter List to Policy Profile (GUI) Security Step 7 Step 8 Command or Action url url Example: Device(config-urlfilter-params)# url url1.dns.com end Example: Device(config-urlfilter-params)# end Purpose Configures an URL. Here, url refers to the name of the URL. Returns to privileged EXEC mode. Applying URL Filter List to Policy Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > Policy. Click on the Policy Name. Go to Access Policies tab. In the URL Filters section, choose the filters from the Pre Auth and Post Auth drop-down lists. Click Update & Apply to Device. Applying URL Filter List to Policy Profile Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-policy Configures wireless policy profile. Example: Here, profile-policy refers to the name of the Device(config)# wireless profile policy WLAN policy profile. default-policy-profile Step 3 urlfilter list {pre-auth-filter name | Applies the URL list to the policy profile. post-auth-filter name} Here, name refers to the name of the Example: pre-authentication or post-authentication URL Device(config-wireless-policy)# urlfilter filter list configured earlier. list pre-auth-filter urllist_local_preauth Note During the client join, the URL filter configured on the policy will be applied. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1170 Security Configuring ISE for Central Web Authentication Step 4 Command or Action Purpose Device(config-wireless-policy)# urlfilter list post-auth-filter urllist_local_postauth end Example: Device(config-wireless-policy)# end Returns to privileged EXEC mode. Configuring ISE for Central Web Authentication Creating Authorization Profiles Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Login to the Cisco Identity Services Engine (ISE). Click Policy, and click Policy Elements. Click Results. Expand Authorization, and click Authorization Profiles. Click Add to create a new authorization profile for URL filter. In the Name field, enter a name for the profile. For example, CentralWebauth. Choose ACCESS_ACCEPT from the Access Type drop-down list. In the Advanced Attributes Setting section, choose Cisco:cisco-av-pair from the drop-down list. Enter the following one by one and click (+) icon after each of them: · url-filter-preauth=<preauth_filter_name> · url-filter-postauth=<postauth_filter_name> For example, Cisco:cisco-av-pair = url-filter-preauth=urllist_pre_cwa Cisco:cisco-av-pair = url-filter-postauth=urllist_post_cwa Verify contents in the Attributes Details section and click Save. Mapping Authorization Profiles to Authentication Rule Procedure Step 1 Step 2 In the Policy > Authentication page, click Authentication. Enter a name for your authentication rule. For example, MAB. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1171 Mapping Authorization Profiles to Authorization Rule Security Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 In the If condition field, select the plus (+) icon. Choose Compound condition, and choose WLC_Web_Authentication. Click the arrow located next to and ... in order to expand the rule further. Click the + icon in the Identity Source field, and choose Internal endpoints. Choose Continue from the 'If user not found' drop-down list. This option allows a device to be authenticated even if its MAC address is not known. Click Save. Mapping Authorization Profiles to Authorization Rule Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Click Policy > Authorization. In the Rule Name field, enter a name. For example, CWA Post Auth. In the Conditions field, select the plus (+) icon. Click the drop-down list to view the Identity Groups area. Choose User Identity Groups > user_group. Click the plus (+) sign located next to and ... in order to expand the rule further. In the Conditions field, select the plus (+) icon. Choose Compound Conditions, and choose to create a new condition. From the settings icon, select Add Attribute/Value from the options. In the Description field, choose Network Access > UseCase as the attribute from the drop-down list. Choose the Equals operator. From the right-hand field, choose GuestFlow. In the Permissions field, select the plus (+) icon to select a result for your rule. You can choose Standard > PermitAccess option or create a custom profile to return the attributes that you like. Viewing DNS-Based Access Control Lists To view details of a specified wireless URL filter, use the following command: Device# show wireless urlfilter details <urllist_flex_preauth> To view the summary of all wireless URL filters, use the following command: Device# show wireless urlfilter summary To view the URL filter applied to the client in the resultant policy section, use the following command: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1172 Security Configuration Examples for DNS-Based Access Control Lists Device# show wireless client mac-address <MAC_addr> detail Configuration Examples for DNS-Based Access Control Lists Flex Mode Example: Defining URL Filter List This example shows how to define URL list in Flex mode: Device# configure terminal Device(config)# urlfilter enhanced-list urllist_flex_pre Device(config-urlfilter-params)# url www.dns.com preference 1 action permit Device(config-urlfilter-params)# end Example: Applying URL Filter List to Flex Profile This example shows how to apply an URL list to the Flex profile in Flex mode: Device# configure terminal Device(config)# wireless profile flex default-flex-profile Device(config-wireless-flex-profile)# acl-policy acl_name Device(config-wireless-flex-profile-acl)# urlfilter list urllist_flex_preauth Device(config-wireless-flex-profile-acl)# end Local Mode Example: Defining Preauth URL Filter List This example shows how to define URL filter list (pre-authentication): Device# configure terminal Device(config)# urlfilter list urllist_local_preauth Device(config-urlfilter-params)# action permit Device(config-urlfilter-params)# redirect-server-ipv4 9.1.0.101 Device(config-urlfilter-params)# redirect-server-ipv6 2001:300:8::82 Device(config-urlfilter-params)# url url1.dns.com Device(config-urlfilter-params)# end Example: Defining Postauth URL Filter List This example shows how to define URL filter list (post-authentication): Device# configure terminal Device(config)# urlfilter list urllist_local_postauth Device(config-urlfilter-params)# action permit Device(config-urlfilter-params)# filter-type post-authentication Device(config-urlfilter-params)# redirect-server-ipv4 9.1.0.101 Device(config-urlfilter-params)# redirect-server-ipv6 2001:300:8::82 Device(config-urlfilter-params)# url url1.dns.com Device(config-urlfilter-params)# end Example: Applying URL Filter List to Policy Profile This example shows how to apply an URL list to the policy profile in local mode: Device# configure terminal Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1173 Verifying DNS Snoop Agent (DSA) Security Device(config)# wireless profile policy default-policy-profile Device(config-wireless-policy)# urlfilter list pre-auth-filter urllist_local_preauth Device(config-wireless-policy)# urlfilter list post-auth-filter urllist_local_postauth Device(config-wireless-policy)# end Verifying DNS Snoop Agent (DSA) To view details of the DNS snooping agent client, use the following command: Device# show platform hardware chassis active qfp feature dns-snoop-agent client To view details of the DSA enabled interface, use the following command: Device# show platform hardware chassis active qfp feature dns-snoop-agent client enabled-intf To view the pattern list in uCode memory, use the following command: Device# show platform hardware chassis active qfp feature dns-snoop-agent client hw-pattern-list To view the OpenDNS string for the pattern list, use the following command: Device# show platform hardware chassis active qfp feature dns-snoop-agent client hw-pattern-list odns_string To view the FQDN filter for the pattern list, use the following command: Device# show platform hardware chassis active qfp feature dns-snoop-agent client hw-pattern-list fqdn-filter <fqdn_filter_ID> Note The valid range of fqdn_filter_ID is from 1 to 16. To view details of the DSA client, use the following command: Device# show platform hardware chassis active qfp feature dns-snoop-agent client info To view the pattern list in CPP client, use the following command: Device# show platform hardware chassis active qfp feature dns-snoop-agent client pattern-list To view the OpenDNS string for the pattern list, use the following command: Device# show platform hardware chassis active qfp feature dns-snoop-agent client pattern-list odns_string To view the FQDN filter for the pattern list, use the following command: Device# show platform hardware chassis active qfp feature dns-snoop-agent client pattern-list fqdn-filter <fqdn_filter_ID> Note The valid range of fqdn_filter_ID is from 1 to 16. To view details of the DSA datapath, use the following command: Device# show platform hardware chassis active qfp feature dns-snoop-agent datapath To view details of the DSA IP cache table, use the following command: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1174 Security Information About Flex Client IPv6 Support with WebAuth Pre and Post ACL Device# show platform hardware chassis active qfp feature dns-snoop-agent datapath ip-cache To view details of the DSA address entry, use the following command: Device# show platform hardware chassis active qfp feature dns-snoop-agent datapath ip-cache address {ipv4 <IPv4_addr> | ipv6 <IPv6_addr>} To view details of all the DSA IP cache address, use the following command: Device# show platform hardware chassis active qfp feature dns-snoop-agent datapath ip-cache all To view details of the DSA IP cache pattern, use the following command: Device# show platform hardware chassis active qfp feature dns-snoop-agent datapath ip-cache pattern <pattern> To view details of the DSA datapath memory, use the following command: Device# show platform hardware chassis active qfp feature dns-snoop-agent datapath memory To view the DSA regular expression table, use the following command: Device# show platform hardware chassis active qfp feature dns-snoop-agent datapath regexp-table To view the DSA statistics, use the following command: Device# show platform hardware chassis active qfp feature dns-snoop-agent datapath stats Information About Flex Client IPv6 Support with WebAuth Pre and Post ACL IOS IPv6 ACLs is used to send webauth ACL to an AP. A change in the ACL policies of the Flex profile (new ACL, deleted ACL or modified ACL). ACL definitions are pushed to AP in the following events: · AP join. · New ACL mapping in a new Flex profile. · Configuring IPv6 ACL definition in Flex profile. Default Local Web Authentication ACLs The pre-defined default LWA IPv6 ACL is pushed to AP and plumbed to data plane. Default External Web Authentication ACL The default EWA ACLs are derived from the redirect portal address configured in the parameter map. The following list covers the types of default EWA ACLs: · Security ACL--Pushed and plumbed to AP. · Intercept ACL--Pushed and plumbed to data plane. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1175 Enabling Pre-Authentication ACL for LWA and EWA (GUI) Security FQDN ACL · FQDN ACL is encoded along with IPv6 ACL and sent to AP. · FQDN ACL is always a custom ACL. The following applies to Flex and Local mode: · If you are migrating from AireOS, you would explicitly need to execute the following commands: redirect append ap-mac tag ap_mac redirect append wlan-ssid tag wlan redirect append client-mac tag client_mac · If the login page has any resource that needs to be fetched from the server, you will need to include those resource URLs in URL filtering. · If you are trying to access IPv6 URL and you have an IPv4 web server, the controller redirects the client to an internal page as domain redirection is not supported. It is recommended to have a dual-stack web server and configure virtual IPv6 address in the global parameter map. Enabling Pre-Authentication ACL for LWA and EWA (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Configuration > Tags & Profiles > WLANs. Click Add. In the General tab, enter the Profile Name, the SSID and the WLAN ID. Choose Security > Layer2 tab. Uncheck the WPAPolicy, AES and 802.1x check boxes. Choose Security > Layer3 tab. Choose the Web Auth Parameter Map from the Web Auth Parameter Map drop-down list and authentication list from the Authentication List drop-down list. Click Show Advanced Settings and under the Preauthenticated ACL settings, choose the IPv6 ACL from the IPv6 drop-down list. Choose Security > AAA tab. Choose the authentication list from the Authentication List drop-down list. Click Apply to Device. Enabling Pre-Authentication ACL for LWA and EWA Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1176 Security Enabling Pre-Authentication ACL for LWA and EWA Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action wlan wlan-name wlan-id SSID-name Example: Device(config)# wlan wlan-demo 1 ssid-demo Purpose Enters the WLAN configuration sub-mode. · wlan-name--Enter the profile name. The range is from 1 to 32 alphanumeric characters. · wlan-id--Enter the WLAN ID. The range is from 1 to 512. · SSID-name--Enter the Service Set Identifier (SSID) for this WLAN. If the SSID is not specified, the WLAN profile name is set as the SSID. Note If you have already configured WLAN, enter wlan wlan-name command. ipv6 traffic-filter web acl_name-preauth Example: Creates a pre-authentication ACL for web authentication. Device(config-wlan)# ipv6 traffic-filter web preauth_v6_acl no security wpa Example: Device(config-wlan)# no security wpa Disables the WPA security. no security wpa wpa2 ciphers aes Disables WPA2 ciphers for AES. Example: Device(config-wlan)#no security wpa wpa2 ciphers aes no security wpa akm dot1x Disables security AKM for dot1x. Example: Device(config-wlan)#no security wpa akm dot1x security web-auth Configures web authentication. Example: Device(config-wlan)# security web-auth security web-auth authentication-list authenticate-list-name Enables authentication list for WLAN. Example: Device(config-wlan)# security web-auth authentication-list wcm_dot1x Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1177 Enabling Post-Authentication ACL for LWA and EWA (GUI) Security Step 9 Step 10 Command or Action Purpose security web-auth parameter-map parameter-map-name Maps the parameter map. Example: Device(config-wlan)# security web-auth parameter-map param-custom-webconsent no shutdown Example: Device(config-wlan)# no shutdown Shutdown the WLAN. Enabling Post-Authentication ACL for LWA and EWA (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > WLANs. Click Add. In the General tab, enter the Profile Name. The Profile Name is the profile name of the policy profile. Enter the SSID and the WLAN ID. Click Apply to Device. Enabling Post-Authentication ACL for LWA and EWA Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-name Creates policy profile for the WLAN. Example: The profile-name is the profile name of the Device(config)# wireless profile policy policy profile. test1 Step 3 ipv6 acl acl_name Creates a named WLAN ACL. Example: Device(config-wireless-policy)# ipv6 acl testacl Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1178 Security Enabling DNS ACL for LWA and EWA (GUI) Step 4 Command or Action end Example: Device(config-wireless-policy)# end Purpose Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Enabling DNS ACL for LWA and EWA (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > WLANs. Click Add. In the General tab, enter the Profile Name. The Profile Name is the profile name of the policy profile. Enter the SSID and the WLAN ID. Click Apply to Device. Enabling DNS ACL for LWA and EWA Note Post-authentication DNS ACL is not supported. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-name Creates policy profile for the WLAN. Example: The profile-name is the profile name of the Device(config)# wireless profile policy policy profile. test1 Step 3 end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1179 Verifying Flex Client IPv6 Support with WebAuth Pre and Post ACL Security Verifying Flex Client IPv6 Support with WebAuth Pre and Post ACL To verify the client state after L2 authentication, use the following command: Device# show wireless client summary Number of Local Clients: 1 MAC Address AP Name WLAN State Protocol Method Role --------------------------------------------------------------------------------------------------- 1491.82b8.f8c1 AP4001.7A03.544C 4 Webauth Pending 11n(5) None Local Number of Excluded Clients: 0 To verify the IP state, discovery, and MAC, use the following command: Device# show wireless dev da ip IP STATE DISCOVERY MAC ---------------------------------------------------------------------------------- 15.30.0.4 Reachable ARP 1491.82b8.f8c1 2001:15:30:0:d1d7:ecf3:7940:af60 Reachable IPv6 Packet 1491.82b8.f8c1 fe80::595e:7c29:d7c:3c84 Reachable IPv6 Packet 1491.82b8.f8c1 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1180 1 0 5 C H A P T E R Allowed List of Specific URLs · Allowed List of Specific URLs, on page 1181 · Adding URL to Allowed List, on page 1181 · Verifying URLs on the Allowed List, on page 1183 Allowed List of Specific URLs This feature helps you to add specific URLs to allowed list on the controller or the AP so that those specific URLs are available for use, even when there is no connectivity to the internet. You can add URLs to allowed list for web authentication of captive portal and walled garden. Authentication is not required to access the allowed list of URLs. When you try to access sites that are not in allowed list, you are redirected to the Login page. Adding URL to Allowed List Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 urlfilter list <urlfilter-name> Example: Device(config)# urlfilter list url-allowedlist-nbn Configures the URL filter profile. Step 3 action [deny | permit] Configures the list as allowed list. The permit Example: command configures the list as allowed list and the deny command configures the list as Device(config-urlfilter-params)# action blocked list. permit Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1181 Adding URL to Allowed List Security Step 4 Step 5 Command or Action Purpose {redirect-server-ipv4 | redirect-server-ipv6} Configures the IP address of the redirect servers Example: to which the user requests will be redirected in case of denied requests. Device(config-urlfilter-params)# redirect-server-ipv4 X.X.X.X url url-to-be-allowed Example: Device(config-urlfilter-params)# url www.cisco.com Configures the URL to be allowed. Note The controller uses two IP addresses and the mechanism only allows for one portal IP to be allowed. To allow pre-authentication access to more HTTP ressources, you need to use URL filters which will dynamically makes holes in the intercept (redirect) and security (preauth) ACLs for the IPs related to the website whose URL you enter in the URL filter. DNS requests will be dynamically snooped for the controller to learn the IP address of those URLs and add it to the ACLs dynamically. Note redirect-server-ipv4 and redirect-server-ipv6 is applicable only in the local mode, specifically in post-authentication. For any further tracking or displaying any warning messages, the denied user request is redirected to the configured server. But the redirect-server-ipv4 and redirect-server-ipv6 configurations do not apply to pre-authentication scenario as you will be redirected to the controller for the redirect login URL for any denied access. You can associate the allowed URL with the ACL policy in flex profile. Example Associating the allowed URL with the ACL policy in flex profile: Device(config)# wireless profile flex default-flex-profile Device(config-wireless-flex-profile)# acl-policy user_v4_acl Device(config-wireless-flex-profile-acl)# urlfilter list url_allowedlist_nbn Device(config-wireless-flex-profile-acl)# exit Device(config-wireless-flex-profile)# description "default flex profile" Device(config)# urlfilter enhanced-list urllist_pre_cwa Device(config-urlfilter-enhanced-params)# url url1.dns.com preference 1 action permit Device(config-urlfilter-enhanced-params)# url url2.dns.com preference 2 action deny Device(config-urlfilter-enhanced-params)# url url3.dns.com preference 3 action permit Device(config)# wlan wlan5 5 wlan5 Device(config-wlan)#ip access-group web user_v4_acl Device(config-wlan)#no security wpa Device(config-wlan)#no security wpa Device(config-wlan)#no security wpa wpa2 ciphers aes Device(config-wlan)#no security wpa akm dot1x Device(config-wlan)#security web-auth Device(config-wlan)#security web-auth authentication-list default Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1182 Security Verifying URLs on the Allowed List Device(config-wlan)#security web-auth parameter-map global Device(config-wlan)#no shutdown Verifying URLs on the Allowed List To verify the summary and the details of the URLs on the allowed list, use the following show commands: Device# show wireless urlfilter summary Black-list - DENY White-list - PERMIT Filter-Type - Specific to Local Mode URL-List ID Filter-Type Action Redirect-ipv4 Redirect-ipv6 ------------------------------------------------------------------------------------------------------------- url-whitelist 1 PRE-AUTH PERMIT 1.1.1.1 Device# Device# show wireless urlfilter details url-whitelist List Name................. : url-whitelist Filter ID............... : : 1 Filter Type............... : PRE-AUTH Action.................... : PERMIT Redirect server ipv4...... : 1.1.1.1 Redirect server ipv6...... : Configured List of URLs URL.................... : www.cisco.com Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1183 Verifying URLs on the Allowed List Security Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1184 1 0 6 C H A P T E R Cisco Umbrella WLAN · Information About Cisco Umbrella WLAN, on page 1185 · Registering Controller to Cisco Umbrella Account, on page 1186 · Configuring Cisco Umbrella WLAN, on page 1187 · Configuring the Umbrella Flex Profile, on page 1193 · Configuring the Umbrella Flex Profile (GUI), on page 1193 · Configuring Umbrella Flex Parameters, on page 1194 · Configuring the Umbrella Flex Policy Profile (GUI), on page 1194 · Verifying the Cisco Umbrella Configuration, on page 1195 Information About Cisco Umbrella WLAN The Cisco Umbrella WLAN provides a cloud-delivered network security service at the Domain Name System (DNS) level, with automatic detection of both known and emergent threats. This feature allows you to block sites that host malware, bot networks, and phishing before they actually become malicious. Cisco Umbrella WLAN provides the following: · Policy configuration per user group at a single point. · Policy configuration per network, group, user, device, or IP address. The following is the policy priority order: 1. Local policy 2. AP group 3. WLAN · Visual security activity dashboard in real time with aggregated reports. · Schedule and send reports through email. · Support up to 60 content categories, with a provision to add custom allowed list and blocked list entries. · Supports custom parameter-type Umbrella profiles. One Global profile and 15 custom profiles are supported. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1185 Registering Controller to Cisco Umbrella Account Security · Although IPv6 is supported, device registration will always be over IPv4. There is no support of device registration over IPv6. · The communication from device to the Umbrella Cloud can be done over IPv6 also. · In the Flexconnect mode, DNS handling takes place in the AP instead of the controller. Multiple profiles are supported in the Flex mode. This feature does not work in the following scenarios: · If an application or host use an IP address directly, instead of using DNS to query domain names. · If a client is connected to a web proxy and does not send a DNS query to resolve the server address. Registering Controller to Cisco Umbrella Account Before you Begin · You should have an account with Cisco Umbrella. · You should have an API token from Cisco Umbrella. This section describes the process followed to register the controller to the Cisco Umbrella account. The controller is registered to Cisco Umbrella server using the Umbrella parameter map. Each of the Umbrella parameter map must have an API token. The Cisco Umbrella responds with the device ID for the controller . The device ID has a 1:1 mapping with the Umbrella parameter map name. Fetching API token for Controller from Cisco Umbrella Dashboard From Cisco Umbrella dashboard, verify that your controller shows up under Device Name, along with their identities. Applying the API Token on Controller Registers the Cisco Umbrella API token on the network. DNS Query and Response Once the device is registered and Umbrella parameter map is configured on WLAN, the DNS queries from clients joining the WLAN are redirected to the Umbrella DNS resolver. Note This is applicable for all domains not configured in the local domain RegEx parameter map. The queries and responses are encrypted based on the DNScrypt option in the Umbrella parameter map. For more information on the Cisco Umbrella configurations, see the Integration for ISR 4K and ISR 1100 Security Configuration Guide. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1186 Security Configuring Cisco Umbrella WLAN Limitations and Considerations The limitations and considerations for this feature are as follows: · You will be able to apply the wireless Cisco Umbrella profiles to wireless entities, such as, WLAN or AP groups, if the device registration is successful. · In case of L3 mobility, the Cisco Umbrella must be applied on the anchor controller always. · When two DNS servers are configured under DHCP, two Cisco Umbrella server IPs are sent to the client from DHCP option 6. If only one DNS server is present under DHCP, only one Cisco Umbrella server IP is sent as part of DHCP option 6. Configuring Cisco Umbrella WLAN To configure Cisco Umbrella on the controller , perform the following: · You must have the API token from the Cisco Umbrella dashboard. · You must have the root certificate to establish HTTPS connection with the Cisco Umbrella registration server: api.opendns.com. You must import the root certificate from digicert.com to the controller using the crypto pki trustpool import terminal command. Importing CA Certificate to the Trust Pool Before you begin The following section covers details about how to fetch the root certificate and establish HTTPS connection with the Cisco Umbrella registration server: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 Perform either of the following tasks: · crypto pki trustpool import url url Device(config)# crypto pki trustpool import url http://www.cisco.com/security/pki/trs/ios.p7b Imports the root certificate directly from the Cisco website. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1187 Importing CA Certificate to the Trust Pool Security Step 3 Command or Action Purpose Note The Trustpool bundle contains the root certificate of digicert.com together with other CA certificates. · crypto pki trustpool import terminal Device(config)# crypto pki trustpool import terminal Imports the root certificate by executing the import terminal command. · Enter PEM-formatted CA certificate from the following location: See the Related Information section to download the CA certificate. -----BEGIN CERTIFICATE----MIIE6jCCA9KgAwIBAgIQCjUI1VwpKwF9+K1lwA/35DANBgkqhkiG9w0BAQsFADBhMQswCQYDVQQG EwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSAw HgYDVQQDExdEaWdpQ2VydCBHbG9iYWwgUm9vdCBDQTAeFw0yMDA5MjQwMDAwMDBaFw0zMDA5MjMy MzU5NTlaME8xCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxKTAnBgNVBAMTIERp Z2lDZXJ0IFRMUyBSU0EgU0hBMjU2IDIwMjAgQ0ExMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIB CgKCAQEAwUuzZUdwvN1PWNvsnO3DZuUfMRNUrUpmRh8sCuxkB+Uu3Ny5CiDt3+PE0J6aqXodgojl EVbbHp9YwlHnLDQNLtKS4VbL8Xlfs7uHyiUDe5pSQWYQYE9XE0nw6Ddng9/n00tnTCJRpt8OmRDt V1F0JuJ9x8piLhMbfyOIJVNvwTRYAIuE//i+p1hJInuWraKImxW8oHzf6VGo1bDtN+I2tIJLYrVJ muzHZ9bjPvXj1hJeRPG/cUJ9WIQDgLGBAfr5yjK7tI4nhyfFK3TUqNaX3sNk+crOU6JWvHgXjkkD Ka77SU+kFbnO8lwZV21reacroicgE7XQPUDTITAHk+qZ9QIDAQABo4IBrjCCAaowHQYDVR0OBBYE FLdrouqoqoSMeeq02g+YssWVdrn0MB8GA1UdIwQYMBaAFAPeUDVW0Uy7ZvCj4hsbw5eyPdFVMA4G A1UdDwEB/wQEAwIBhjAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwEgYDVR0TAQH/BAgw BgEB/wIBADB2BggrBgEFBQcBAQRqMGgwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0 LmNvbTBABggrBgEFBQcwAoY0aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0R2xv YmFsUm9vdENBLmNydDB7BgNVHR8EdDByMDegNaAzhjFodHRwOi8vY3JsMy5kaWdpY2VydC5jb20v RGlnaUNlcnRHbG9iYWxSb290Q0EuY3JsMDegNaAzhjFodHRwOi8vY3JsNC5kaWdpY2VydC5jb20v RGlnaUNlcnRHbG9iYWxSb290Q0EuY3JsMDAGA1UdIAQpMCcwBwYFZ4EMAQEwCAYGZ4EMAQIBMAgG BmeBDAECAjAIBgZngQwBAgMwDQYJKoZIhvcNAQELBQADggEBAHert3onPa679n/gWlbJhKrKW3EX 3SJH/E6f7tDBpATho+vFScH90cnfjK+URSxGKqNjOSD5nkoklEHIqdninFQFBstcHL4AGw+oWv8Z u2XHFq8hVt1hBcnpj5h232sb0HIMULkwKXq/YFkQZhM6LawVEWwtIwwCPgU7/uWhnOKK24fXSuhe 50gG66sSmvKvhMNbg0qZgYOrAKHKCjxMoiWJKiKnpPMzTFuMLhoClw+dj20tlQj7T9rxkTgl4Zxu YRiHas6xuwAwapu3r9rxxZf+ingkquqTgLozZXq8oXfpf2kUCwA/d5KxTVtzhwoT0JzI8ks5T1KE SaZMkE4f97Q= -----END CERTIFICATE----- Imports the root certificate by pasting the CA certificate from the digicert.com. quit Example: Device(config)# quit Imports the root certificate by entering the quit command. Note You will receive a message after the certificate has been imported. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1188 Security Creating a Local Domain RegEx Parameter Map Creating a Local Domain RegEx Parameter Map Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 parameter-map type regex parameter-map-name Creates a regex parameter map. Example: Device(config)# parameter-map type regex dns_wl Step 3 pattern regex-pattern Example: Device(config-profile)# pattern www.google.com Configures the regex pattern to match. Note The following patterns are supported: · Begins with .*. For example: .*facebook.com · Begins with .* and ends with * . For example: .*google* · Ends with *. For example: www.facebook* · No special character. For example: www.facebook.com Step 4 end Example: Device(config-profile)# end Returns to privileged EXEC mode. Configuring Parameter Map Name in WLAN (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Tags & Profiles > Policy. Click on the Policy Profile Name. The Edit Policy Profile window is displayed. Choose the Advanced tab. In the Umbrella settings, from the Umbrella Parameter Map drop-down list, choose the parameter map. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1189 Configuring the Umbrella Parameter Map Security Step 5 Step 6 Enable or disable Flex DHCP Option for DNS and DNS Traffic Redirect toggle buttons. Click Update & Apply to Device. Configuring the Umbrella Parameter Map Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 parameter-map type umbrella global | parameter-map-name Example: Device(config)# parameter-map type umbrella custom_pmap Creates an umbrella global or customized parameter map. Step 3 token token-value Configures an umbrella token. Example: Device(config-profile)# token 5XXXXXXXXCXXXXXXXAXXXXXXXFXXXXCXXXXXXXX Step 4 local-domain regex-parameter-map-name Example: Device(config-profile)# local-domain dns_wl Configures local domain RegEx parameter map. Step 5 resolver {IPv4 X.X.X.X | IPv6 X:X:X:X::X} Example: Device(config-profile)# resolver IPv6 10:1:1:1::10 Configures the Anycast address. The default address is applied when there is no specific address configured. Step 6 end Example: Device(config-profile)# end Returns to privileged EXEC mode. Enabling or Disabling DNScrypt (GUI) Procedure Step 1 Choose Configuration > Security > Threat Defence > Umbrella. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1190 Security Enabling or Disabling DNScrypt Step 2 Step 3 Step 4 Step 5 Enter the Registration Token received from Umbrella. Alternatively, you can click on Click here to get your Tokento get the token from Umbrella. Enter the Whitelist Domains that you want to exclude from filtering. Check or uncheck the Enable DNS Packets Encryption check box to encrypt or decrypt the DNS packets. Click Apply. Enabling or Disabling DNScrypt Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 parameter-map type umbrella global Example: Device(config)# parameter-map type umbrella global Step 3 [no] dnscrypt Example: Device(config-profile)# no dnscrypt Step 4 end Example: Device(config-profile)# end Purpose Enters global configuration mode. Creates an umbrella global parameter map. Enables or disables DNScrypt. By default, the DNScrypt option is enabled. Note Cisco Umbrella DNScrypt is not supported when DNS-encrypted responses are sent in the data-DTLS encrypted tunnel (either mobility tunnel or AP CAPWAP tunnel). Returns to privileged EXEC mode. Configuring Timeout for UDP Sessions Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1191 Configuring Parameter Map Name in WLAN (GUI) Security Step 2 Step 3 Step 4 Command or Action parameter-map type umbrella global Example: Device(config)# parameter-map type umbrella global Purpose Creates an umbrella global parameter map. udp-timeout timeout_value Example: Device(config-profile)# udp-timeout 2 Configures timeout value for UDP sessions. The timeout_value ranges from 1 to 30 seconds. Note The public-key and resolver parameter-map options are automatically populated with the default values. So, you need not change them. end Example: Device(config-profile)# end Returns to privileged EXEC mode. Configuring Parameter Map Name in WLAN (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Tags & Profiles > Policy. Click on the Policy Profile Name. The Edit Policy Profile window is displayed. Choose the Advanced tab. In the Umbrella settings, from the Umbrella Parameter Map drop-down list, choose the parameter map. Enable or disable Flex DHCP Option for DNS and DNS Traffic Redirect toggle buttons. Click Update & Apply to Device. Configuring Parameter Map Name in WLAN Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless profile policy profile-name Example: Purpose Enters global configuration mode. Creates policy profile for the WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1192 Security Configuring the Umbrella Flex Profile Step 3 Step 4 Command or Action Purpose Device(config)# wireless profile policy The profile-name is the profile name of the default-policy-profile policy profile. umbrella-param-map umbrella-name Example: Device(config-wireless-policy)# umbrella-param-map global Configures the Umbrella OpenDNS feature for the WLAN. end Example: Device(config-wireless-policy)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring the Umbrella Flex Profile Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile flex flex-profile-name Example: Device(config)# wireless profile flex default-flex-profile Creates a new flex policy. Enters the flex profile configuration mode. The flex-profile-name is the flex profile name. Step 3 umbrella-profile umbrella-profile-name Example: Device(config-wireless-flex-profile)# umbrella-profile global Configures the Umbrella flex feature. Use the no form of this command to negate the command or to set the command to its default. Step 4 end Example: Device(config-wireless-policy)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring the Umbrella Flex Profile (GUI) Procedure Step 1 Choose Configuration > Tags & Profiles > Flex. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1193 Configuring Umbrella Flex Parameters Security Step 2 Step 3 Step 4 Step 5 Click a Flex Profile Name. The Edit Flex Profile dialog box appears. Under the Umbrella tab, click the Add button. Select a name for the parameter map from the Parameter Map Name drop-down list and click Save. Click the Update & Apply to Device button. The configuration changes are successfully applied. Configuring Umbrella Flex Parameters Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-policy-name Configures the WLAN policy profile. Enters Example: the wireless policy profile configuration mode. Device(config)# wireless profile policy The policy-profile-name is the WLAN policy default-policy-profile profile name. Step 3 flex umbrella dhcp-dns-option Example: Configures the Umbrella DHCP option for DNS. By default the option is enabled. Device(config-wireless-policy-profile)# [no] flex umbrella dhcp-dns-option Step 4 flex umbrella mode {force | ignore} Configures the DNS traffic to be redirected to Example: Umbrella. You can either forcefully redirect the traffic or choose to ignore the redirected traffic Device(config-wireless-policy-profile)# to Umbrella. The default mode is ignore. [no] flex umbrella mode force Step 5 end Example: Device(config-wireless-policy)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring the Umbrella Flex Policy Profile (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Tags & Profiles > Policy. Click the Add button. The Add Policy Profile dialog box appears. In the Advanced tab, and under the Umbrella section, complete the following: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1194 Security Verifying the Cisco Umbrella Configuration Step 4 a) Select the parameter map from the Umbrella Parameter Map drop-down list. Click the Clear hyperlink to clear the selection. b) Click the field adjacent to Flex DHCP Option for DNS to Disable the option. By default it is Enabled. c) Click the field adjacent to DNS Traffic Redirect to set the option to Force. By default it is set to Ignore. Click the Apply to Device button. Verifying the Cisco Umbrella Configuration To view the Umbrella configuration details, use the following command: Device# show umbrella config Umbrella Configuration ======================== Token: 5XXXXXXABXXXXXFXXXXXXXXXDXXXXXXXXXXXABXX API-KEY: NONE OrganizationID: xxxxxxx Local Domain Regex parameter-map name: dns_bypass DNSCrypt: Not enabled Public-key: NONE UDP Timeout: 5 seconds Resolver address: 1. 10.1.1.1 2. 5.5.5.5 3. XXXX:120:50::50 4. XXXX:120:30::30 To view the device registration details, use the following command: Device# show umbrella deviceid Device registration details Param-Map Name global vj-1 GUEST EMP Status 200 SUCCESS 200 SUCCESS 200 SUCCESS 200 SUCCESS Device-id 010aa4eXXXXXXX8d 01XXXXXXXf4541e1 010a4f6XXXXXXX42 0XXXXXXXXd106ecd To view the detailed description for the Umbrella device ID, use the following command: Device# show umbrella deviceid detailed Device registration details 1.global Tag Device-id Description WAN interface 2.vj-1 Tag Device-id Description WAN interface : global : 010aa4eXXXXXXX8d : Device Id recieved successfully : None : vj-1 : 01XXXXXXXf4541e1 : Device Id recieved successfully : None To view the Umbrella DNSCrypt details, use the following command: Device# show umbrella dnscrypt DNSCrypt: Enabled Public-key: B111:XXXX:XXXX:XXXX:3E2B:XXXX:XXXX:XXXE:XXX3:3XXX:DXXX:XXXX:BXXX:XXXB:XXXX:FXXX Certificate Update Status: In Progress Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1195 Verifying the Cisco Umbrella Configuration Security To view the Umbrella global parameter map details, use the following command: Device# show parameter-map type umbrella global To view the regex parameter map details, use the following command: Device# show parameter-map type regex <parameter-map-name> To view the Umbrella statistical information, use the following command: Device# show platform hardware chassis active qfp feature umbrella datapath stats To view the wireless policy profile Umbrella configuration, use the following command: Device#show wireless profile policy detailed vj-pol-profile | s Umbrella Umbrella information Cisco Umbrella Parameter Map : vj-2 DHCP DNS Option : ENABLED Mode : force To view the wireless flex profile Umbrella configuration, use the following command: Device#show wireless profile flex detailed vj-flex-profile | s Umbrella Umbrella Profiles : vj-1 vj-2 global To view the Umbrella details on the AP, use the following command: AP#show client opendns summary Server-IP role 208.67.220.220 Primary 208.67.222.222 Secondary Server-IP role 2620:119:53::53 Primary 2620:119:35::35 Secondary Wlan Id DHCP OpenDNS Override Force Mode 0 true false 1 false false ... 15 false false Profile-name Profile-id vj-1 010a29b176b34108 global 010a57bf502c85d4 vj-2 010ae385ce6c1256 AP0010.10A7.1000# Client to profile command AP#show client opendns address 50:3e:aa:ce:50:17 Client-mac Profile-name 50:3E:AA:CE:50:17 vj-1 AP0010.10A7.1000# Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1196 1 0 7 C H A P T E R RADIUS Server Load Balancing · Information About RADIUS Server Load Balancing, on page 1197 · Prerequisites for RADIUS Server Load Balancing, on page 1199 · Restrictions for RADIUS Server Load Balancing, on page 1199 · Enabling Load Balancing for a Named RADIUS Server Group (CLI), on page 1199 Information About RADIUS Server Load Balancing RADIUS Server Load Balancing Overview By default, if two RADIUS servers are configured in a server group, only one is used. The other server acts as standby, if the primary server is declared as dead, the secondary server receives all the load. If you need both servers to perform transactions actively, you need to enable Load Balancing. Note By default, load balancing is not enabled on the RADIUS server group. If you enable load balancing in a RADIUS server group with two or more RADIUS servers, the Server A and Server B receives a AAA transaction. The transaction queues are checked in Server A and Server B. The server with less number of outstanding transactions are assigned the next batch of AAA transaction. Load balancing distributes batches of transactions to RADIUS servers in a server group. Load balancing assigns each batch of transactions to the server with the lowest number of outstanding transactions in its queue. The process of assigning a batch of transactions is as follows: 1. The first transaction is received for a new batch. 2. All server transaction queues are checked. 3. The server with the lowest number of outstanding transactions is identified. 4. The identified server is assigned the next batch of transactions. The batch size is a user-configured parameter. Changes in the batch size may impact CPU load and network throughput. As batch size increases, CPU load decreases, and network throughput increases. However, if a large batch size is used, all available server resources may not be fully utilized. As batch size decreases, CPU load increases and network throughput decreases. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1197 Information About RADIUS Server Load Balancing Security Note There is no set number for large or small batch sizes. A batch with more than 50 transactions is considered large and a batch with fewer than 25 transactions is considered small. Note If a server group contains ten or more servers, we recommend that you set a high batch size to reduce CPU load. Transaction Load Balancing Across RADIUS Server Groups You can configure load balancing either per-named RADIUS server group or for the global RADIUS server group. The load balancing server group must be referred to as "radius" in the authentication, authorization, and accounting (AAA) method lists. All public servers that are part of the RADIUS server group are then load balanced. You can configure authentication and accounting to use the same RADIUS server or different servers. In some cases, the same server can be used for preauthentication, authentication, or accounting transactions for a session. The preferred server, which is an internal setting and is set as the default, informs AAA to use the same server for the start and stop record for a session regardless of the server cost. When using the preferred server setting, ensure that the server that is used for the initial transaction (for example, authentication), the preferred server, is part of any other server group that is used for a subsequent transaction (for example, accounting). The preferred server is not used if one of the following criteria is true: · The load-balance method least-outstanding ignore-preferred-server command is used. · The preferred server is dead. · The preferred server is in quarantine. · The want server flag has been set, overriding the preferred server setting. The want server flag, an internal setting, is used when the same server must be used for all stages of a multistage transaction regardless of the server cost. If the want server is not available, the transaction fails. You can use the load-balance method least-outstanding ignore-preferred-server command if you have either of the following configurations: · Dedicated authentication server and a separate dedicated accounting server · Network where you can track all call record statistics and call record details, including start and stop records and records that are stored on separate servers If you have a configuration where authentication servers are a superset of accounting servers, the preferred server is not used. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1198 Security Prerequisites for RADIUS Server Load Balancing Note If a third-party RADIUS load balancer is used and RADIUS packets are routed based on the NAS source port, it is recommended to move to any other rule based on the following Attribute-Value Pairs (AVPs): · If the load balancer uses NAS source port in the Access-Request to load balance, rules may not work as expected as the source port in NAS might change during transaction. · If the load balancer compares AVPs between Access-Challenge and Access-Request to route packets, you will need to use the AVP value of t-State. · If the load balancer compares AVPs in Access-Request from NAS, you will need to use one or a combination of the following AVPs: · t-State value · Calling-Station-ID and NAS IP or Identifier Prerequisites for RADIUS Server Load Balancing · Authentication, Authorization, and Accounting (AAA) must be configured on the RADIUS server. · AAA RADIUS server groups must be configured. · RADIUS must be configured for functions such as authentication, accounting, or static route download. Restrictions for RADIUS Server Load Balancing · Incoming RADIUS requests, such as Packet of Disconnect (POD) requests are not supported. · Load balancing is not supported on proxy RADIUS servers and private server groups. · Load balancing is not supported on Central Web Authentication (CWA). Enabling Load Balancing for a Named RADIUS Server Group (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1199 Enabling Load Balancing for a Named RADIUS Server Group (CLI) Security Step 2 Step 3 Step 4 Step 5 Command or Action Purpose aaa group server radius group-name Enters server group configuration mode. Example: Device(config)# aaa group server radius rad-sg server ip-address [auth-port port-number] Configures the IP address of the RADIUS [acct-port port-number] server for the group server. Example: Device(config-sg-radius)# server 192.0.2.238 auth-port 2095 acct-port 2096 load-balance method least-outstanding Enables the least-outstanding load balancing [batch-size number] [ignore-preferred-server] for a named server group. Example: Device(config-sg-radius)# load-balance method least-outstanding batch-size 30 end Example: Device(config-sg)# end Exits server group configuration mode and enters privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1200 1 0 8 C H A P T E R AAA Dead-Server Detection · Information About AAA Dead-Server Detection, on page 1201 · Prerequisites for AAA Dead-Server Detection, on page 1202 · Restrictions for AAA Dead-Server Detection, on page 1202 · Configuring AAA Dead-Server Detection (CLI), on page 1202 · Verifying AAA Dead-Server Detection, on page 1203 Information About AAA Dead-Server Detection The AAA Dead-Server Detection feature allows you to configure the criteria to be used to mark a RADIUS server as dead. If you have more than one RADIUS server, the following concepts come into picture: · Deadtime--Defines the time in minutes a server marked as DEAD is held in that state. Once the deadtime expires, the controller marks the server as UP (ALIVE) and notifies the registered clients about the state change. If the server is still unreachable after the state is marked as UP and if the DEAD criteria is met, then server is marked as DEAD again for the deadtime interval. Note You can configure deadtime for each server group or on a global level. · Dead-criteria--To declare a server as DEAD, you need to configure dead-criteria and configure the conditions that determine when a RADIUS server is considered unavailable or dead. Using this feature will result in less deadtime and quicker packet processing. Criteria for Marking a RADIUS Server As Dead The AAA Dead-Server Detection feature allows you to determine the criteria that are used to mark a RADIUS server as dead. That is, you can configure the minimum amount of time, in seconds, that must elapse from the time that the controller last received a valid packet from the RADIUS server to the time the server is marked as dead. If a packet has not been received since the controller booted, and there is a timeout, the time criterion will be treated as though it has been met. In addition, you can configure the number of consecutive timeouts that must occur on the controller before the RADIUS server is marked as dead. If the server performs both authentication and accounting, both types Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1201 Prerequisites for AAA Dead-Server Detection Security of packets are included in the number. Improperly constructed packets are counted as though they are timeouts. Both initial packet transmission and retransmissions are counted. (Each timeout causes one retransmission to be sent.) Note Both the time criterion and tries criterion must be met for the server to be marked as dead. The RADIUS dead-server detection configuration will result in the prompt detection of RADIUS servers that have stopped responding. This configuration will also result in the avoidance of servers being improperly marked as dead when they are "swamped" (responding slowly) and the avoidance of the state of servers being rapidly changed from dead to live to dead again. This prompt detection of non-responding RADIUS servers and the avoidance of swamped and dead-to-live-to-dead-again servers will result in less deadtime and quicker packet processing. Prerequisites for AAA Dead-Server Detection · You must have access to a RADIUS server. · You should be familiar with configuring a RADIUS server. · You should be familiar with configuring Authentication, Authorization, and Accounting (AAA). · Before a server can be marked as dead, you must configure radius-server dead-criteria time minutes tries number-of-tries to mark the server as DOWN. Also, you must configure the radius-server deadtime time-in-mins to retain the server in DEAD status. Restrictions for AAA Dead-Server Detection · Original transmissions are not counted in the number of consecutive timeouts that must occur on the controller before the server is marked as dead--only the number of retransmissions are counted. Configuring AAA Dead-Server Detection (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 aaa new-model Example: Device(config)# aaa new-model Purpose Enters global configuration mode. Enables the AAA access control model. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1202 Security Verifying AAA Dead-Server Detection Step 3 Step 4 Step 5 Command or Action Purpose radius-server deadtime time-in-mins Example: Device(config)# radius-server deadtime 5 Defines the time in minutes when a server marked as DEAD is held in that state. Once the deadtime expires, the controller marks the server as UP (ALIVE) and notifies the registered clients about the state change. If the server is still unreachable after the state is marked as UP and if the DEAD criteria is met, then server is marked as DEAD again for the deadtime interval. time-in-mins--Valid values range from 1 to 1440 minutes. Default value is zero. To return to the default value, use the no radius-server deadtime command. The radius-server deadtime command can be configured globally or per aaa group server level. You can use the show aaa dead-criteria or show aaa servers command to check for dead-server detection. If the default value is zero, deadtime is not configured. radius-server dead-criteria [time minutes][tries number-of-tries] Example: Device(config)# radius-server dead-criteria time 5 tries 4 Declares a server as DEAD and configures the conditions that determine when a RADIUS server is considered unavailable or dead. minutes--Time in seconds during which no response is received from the RADIUS server to consider it as dead. Valid values range from 1 to 120 seconds. number-of-tries--Number of transmits to RADIUS server without responses before marking the server as dead. Valid values range from 1 to 100. end Example: Device(config)# end Exits configuration mode and enters privileged EXEC mode. Verifying AAA Dead-Server Detection To verify dead-criteria, use the following command: Device# show run | s dead-criteria radius-server dead-criteria time 20 tries 20 To verify the dead-criteria details, use the following command: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1203 Verifying AAA Dead-Server Detection Security Device# sh aaa dead-criteria radius <server> sh aaa dead-criteria radius 8.109.0.55 RADIUS Server Dead Criteria: Server Details: Address : 8.109.0.55 Auth Port : 1645 Acct Port : 1646 Server Group : radius Dead Criteria Details: Configured Retransmits : 3 Configured Timeout : 5 Estimated Outstanding Access Transactions: 2 Estimated Outstanding Accounting Transactions: 0 Dead Detect Time : 30s Computed Retransmit Tries: 6 Statistics Gathered Since Last Successful Transaction Max Computed Outstanding Transactions: 3 Max Computed Dead Detect Time: 90s Max Computed Retransmits : 18 To verify the state of servers, number of requests being processed, and so on, use the following command: Device# show aaa servers | s WNCD Platform State from WNCD (1) : current UP Platform State from WNCD (2) : current UP Platform State from WNCD (3) : current UP Platform State from WNCD (4) : current UP Platform State from WNCD (5) : current UP, duration 773s, previous duration 0s Platform Dead: total time 0s, count 0 Quarantined: No Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1204 1 0 9 C H A P T E R ISE Simplification and Enhancements · Utilities for Configuring Security, on page 1205 · Configuring Captive Portal Bypassing for Local and Central Web Authentication, on page 1207 · Sending DHCP Options 55 and 77 to ISE, on page 1210 · Captive Portal, on page 1213 Utilities for Configuring Security This chapter describes how to configure all the RADIUS server side configuration using the following command: wireless-default radius server ip key secret This simplified configuration option provides the following: · Configures AAA authorization for network services, authentication for web auth and Dot1x. · Enables local authentication with default authorization. · Configures the default redirect ACL for CWA. · Creates global parameter map with virtual IP and enables captive bypass portal. · Configures all the AAA configuration for a default case while configuring the RADIUS server. · The method-list configuration is assumed by default on the WLAN. · Enables the radius accounting by default. · Disables the radius aggressive failovers by default. · Sets the radius request timeouts to 5 seconds by default. · Enables captive bypass portal. This command configures the following in the background: aaa new-model aaa authentication webauth default group radius aaa authentication dot1x default group radius aaa authorization network default group radius aaa accounting identity default start-stop group radius ! aaa server radius dynamic-author Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1205 Configuring Multiple Radius Servers Security client <IP> server-key cisco123 ! radius server RAD_SRV_DEF_<IP> description Configured by wireless-default address ipv4 <IP> auth-port 1812 acct-port 1813 key <key> ! aaa local authentication default authorization default aaa session-id common ! ip access-list extended CISCO-CWA-URL-REDIRECT-ACL-DEFAULT remark " CWA ACL to be referenced from ISE " deny udp any any eq domain deny tcp any any eq domain deny udp any eq bootps any deny udp any any eq bootpc deny udp any eq bootpc any deny ip any host <IP> permit tcp any any eq www ! parameter-map type webauth global captive-bypass-portal virtual-ip ipv4 192.0.2.1 virtual-ip ipv6 1001::1 ! wireless profile policy default-policy-profile aaa-override local-http-profiling local-dhcp-profiling accounting Thus, you need not go through the entire Configuration Guide to configure wireless controller for a simple configuration requirement. Configuring Multiple Radius Servers Use the following procedure to configure a RADIUS server. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless-default radius server ip key secret Configures a radius server. Example: Note Device(config)# wireless-default radius server 9.2.58.90 key cisco123 You can configure up to ten RADIUS servers. Step 3 end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1206 Security Verifying AAA and Radius Server Configurations Verifying AAA and Radius Server Configurations To view details of AAA server, use the following command: Device# show run aaa ! aaa new-model aaa authentication webauth default group radius aaa authentication dot1x default group radius aaa authorization network default group radius aaa accounting Identity default start-stop group radius ! aaa server radius dynamic-author client 9.2.58.90 server-key cisco123 ! radius server RAD_SRV_DEF_9.2.58.90 description Configured by wireless-default address ipv4 9.2.58.90 auth-port 1812 acct-port 1813 key cisco123 ! aaa local authentication default authorization default aaa session-id common ! ! ip access-list extended CISCO-CWA-URL-REDIRECT-ACL-DEFAULT remark " CWA ACL to be referenced from ISE " deny udp any any eq domain deny tcp any any eq domain deny udp any eq bootps any deny udp any any eq bootpc deny udp any eq bootpc any deny ip any host 9.2.58.90 permit tcp any any eq www ! parameter-map type webauth global captive-bypass-portal virtual-ip ipv4 192.0.2.1 virtual-ip ipv6 1001::1 ! wireless profile policy default-policy-profile aaa-override local-http-profiling local-dhcp-profiling accounting Note The show run aaa output may change when new commands are added to this utility. Configuring Captive Portal Bypassing for Local and Central Web Authentication Information About Captive Bypassing WISPr is a draft protocol that enables users to roam between different wireless service providers. Some devices (For example, Apple iOS devices) have a mechanism using which they can determine if the device is connected Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1207 Configuring Captive Bypassing for WLAN in LWA and CWA (GUI) Security to Internet, based on an HTTP WISPr request made to a designated URL. This mechanism is used for the device to automatically open a web browser when a direct connection to the internet is not possible. This enables the user to provide his credentials to access the internet. The actual authentication is done in the background every time the device connects to a new SSID. The client device (Apple iOS device) sends a WISPr request to the controller , which checks for the user agent details and then triggers an HTTP request with a web authentication interception in the controller . After verification of the iOS version and the browser details provided by the user agent, the controller allows the client to bypass the captive portal settings and provides access to the Internet. This HTTP request triggers a web authentication interception in the controller as any other page requests are performed by a wireless client. This interception leads to a web authentication process, which will be completed normally. If the web authentication is being used with any of the controller splash page features (URL provided by a configured RADIUS server), the splash page may never be displayed because the WISPr requests are made at very short intervals, and as soon as one of the queries is able to reach the designated server, any web redirection or splash page display process that is performed in the background is cancelled, and the device processes the page request, thus breaking the splash page functionality. For example, Apple introduced an iOS feature to facilitate network access when captive portals are present. This feature detects the presence of a captive portal by sending a web request on connecting to a wireless network. This request is directed to http://www.apple.com/library/test/success.html for Apple iOS version 6 and older, and to several possible target URLs for Apple iOS version 7 and later. If a response is received, then the Internet access is assumed to be available and no further interaction is required. If no response is received, then the Internet access is assumed to be blocked by the captive portal and Apple's Captive Network Assistant (CNA) auto-launches the pseudo-browser to request portal login in a controlled window. The CNA may break when redirecting to an ISE captive portal. The controller prevents this pseudo-browser from popping up. You can now configure the controller to bypass WISPr detection process, so the web authentication interception is only done when a user requests a web page leading to splash page load in user context, without the WISPr detection being performed in the background. Configuring Captive Bypassing for WLAN in LWA and CWA (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Security > Web Auth. In the Webauth Parameter Map tab, click the parameter map name. The Edit WebAuth Parameter window is displayed. Select Captive Bypass Portal check box. Click Update & Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1208 Security Configuring Captive Bypassing for WLAN in LWA and CWA (CLI) Configuring Captive Bypassing for WLAN in LWA and CWA (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 parameter-map type webauth parameter-map-name Example: Device(config)# parameter-map type webauth WLAN1_MAP Creates the parameter map. The parameter-map-name must not exceed 99 characters. Step 3 captive-bypass-portal Example: Device(config)# captive-bypass-portal Configures captive bypassing. Step 4 wlan profile-name wlan-id ssid-name Example: Device(config)# wlan WLAN1_NAME 4 WLAN1_NAME Specifies the WLAN name and ID. · profile-name is the WLAN name which can contain 32 alphanumeric characters. · wlan-id is the wireless LAN identifier. The valid range is from 1 to 512. · ssid-name is the SSID which can contain 32 alphanumeric characters. Step 5 Step 6 security web-auth Enables the web authentication for the WLAN. Example: Device(config-wlan)# security web-auth security web-auth parameter-map parameter-map-name Example: Device(config-wlan)# security web-auth parameter-map WLAN1_MAP Maps the parameter map. Note If parameter map is not associated with a WLAN, the configuration is considered from the global parameter map. Step 7 end Example: Device(config-wlan)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1209 Sending DHCP Options 55 and 77 to ISE Security Sending DHCP Options 55 and 77 to ISE Information about DHCP Option 55 and 77 The DHCP sensors use the following DHCP options on the ISE for native and remote profiling: · Option 12: Hostname · Option 6: Class Identifier Along with this, the following options needs to be sent to the ISE for profiling: · Option 55: Parameter Request List · Option 77: User Class Configuration to Send DHCP Options 55 and 77 to ISE (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Tags & Profiles > Policy. On thePolicy Profile page, click Add to view the Add Policy Profile window. Click Access Policies tab, choose the RADIUS Profiling and DHCP TLV Caching check boxes to configure radius profiling and DHCP TLV Caching on a WLAN. Click Save & Apply to Device. Configuration to Send DHCP Options 55 and 77 to ISE (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-policy Example: Configures WLAN policy profile and enters the wireless policy configuration mode. Device(config)# wireless profile policy rr-xyz-policy-1 Step 3 dhcp-tlv-caching Example: Configures DHCP TLV caching on a WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1210 Security Configuring EAP Request Timeout (GUI) Step 4 Step 5 Command or Action Device(config-wireless-policy)# dhcp-tlv-caching radius-profiling Example: Device(config-wireless-policy)# radius-profiling end Example: Device(config-wireless-policy)# end Purpose Configures client radius profiling on a WLAN. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring EAP Request Timeout (GUI) Follow the steps given below to configure the EAP Request Timeout through the GUI: Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Choose Configuration > Security > Advanced EAP. In the EAP-Identity-Request Timeout field, specify the amount of time (in seconds) in which the device attempts to send an EAP identity request to wireless clients using local EAP. In the EAP-Identity-Request Max Retries field, specify the maximum number of times that the device attempts to retransmit the EAP identity request to wireless clients using local EAP. Set EAP Max-Login Ignore Identity Response to Enabled state to limit the number of clients that can be connected to the device with the same username. You can log in up to eight times from different clients (PDA, laptop, IP phone, and so on) on the same device. The default state is Disabled. In the EAP-Request Timeout field, specify the amount of time (in seconds) in which the device attempts to send an EAP request to wireless clients using local EAP. In the EAP-Request Max Retries field, specify the maximum number of times that the device attempts to retransmit the EAP request to wireless clients using local EAP. In the EAPOL-Key Timeout field, specify the amount of time (in seconds) in which the device attempts to send an EAP key over the LAN to wireless clients using local EAP. In the EAPOL-Key Max Retries field, specify the maximum number of times that the device attempts to send an EAP key over the LAN to wireless clients using local EAP. In the EAP-Broadcast Key Interval field, specify the time interval between rotations of the broadcast encryption key used for clients and click Apply. Note After configuring the EAP-Broadcast key interval to a new time period, you must shut down or restart the WLAN for the changes to take effect. Once the WLAN is shut down or restarted, the M5 and M6 packets are exchanged when the configured timer value expires. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1211 Configuring EAP Request Timeout Security Configuring EAP Request Timeout Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless wps client-exclusion dot1x-timeout Enables exclusion on timeout and no response. Example: By default, this feature is enabled. Device(config)# wireless wps client-exclusion dot1x-timeout To disable, append a no at the beginning of the command. Step 3 end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring EAP Request Timeout in Wireless Security (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless security dot1x request {retries 0 - Configures the EAP request retransmission 20 | timeout 1 - 120} timeout value in seconds. Example: Device(config)# wireless security dot1x request timeout 60 Step 3 end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1212 Security Captive Portal Captive Portal Captive Portal Configuration This feature enables you to configure multiple web authentication URLs (including external captive URLs) for the same SSID based on an AP. The default setting is to use the Global URL for authentication. The override option is available at WLAN and AP level. The order of precedence is: · AP · WLAN · Global configuration Restrictions for Captive Portal Configuration · This configuration is supported in a standalone controller only. · Export-Anchor configuration is not supported. Configuring Captive Portal (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Choose Configuration > Tags & Profiles > WLANs. Click Add. In the General tab, enter the Profile Name, the SSID, and the WLAN ID. In the Security > Layer2 tab, uncheck the WPA Policy, AES and 802.1x check boxes. In the Security > Layer3 tab, choose the parameter map from the Web Auth Parameter Map drop-down list and authentication list from the Authentication List drop-down list. In the Security >AAA tab, choose the Authentication list from the Authentication List drop-down list. Click Apply to Device. Choose Configuration > Security > Web Auth. Choose a Web Auth Parameter Map. In the General tab, enter the Maximum HTTP connections, Init-State Timeout(secs) and choose webauth from the Type drop-down list. In the Advanced tab, under the Redirect to external server settings, enter the Redirect for log-in server. Click Update & Apply. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1213 Configuring Captive Portal Security Configuring Captive Portal Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. wlan {profile-name | shutdown} network-name Example: Device(config)# wlan edc6 6 edc Configures the WLAN profile. Enables or Disables all WLANs and creates the WLAN identifier. The profile-name and the SSID network name should be up to 32 alphanumeric charcters. ip {access-group | verify} web IPv4-ACL-Name Example: Device(config-wlan)# ip access-group web CPWebauth Configures the WLAN web ACL. Note WLAN needs to be disabled before performing this operation. no security wpa Example: Device(config-wlan)# no security wpa Disables WPA security. no security wpa akm dot1x Example: Device(config-wlan)# no security wpa akm dot1x Disables security AKM for dot1x. no security wpa wpa2 ciphers aes Example: Device(config-wlan)# no security wpa wpa2 ciphers aes Disables WPA2 ciphers for AES. security web-auth {authentication-list Enables web authentication for WLAN. Here, authentication-list-name | authorization-list authorization-list-name | on-macfilter-failure · authentication-list | parameter-map parameter-map-name} authentication-list-name: Sets the Example: authentication list for IEEE 802.1x. Device(config-wlan)# security web-auth · authorization-list authentication-list cp-webauth authorization-list-name: Sets the Device(config-wlan)# security web-auth parameter-map parMap6 override-authorization list for IEEE 802.1x. · on-macfilter-failure: Enables Web authentication on MAC filter failure. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1214 Security Configuring Captive Portal Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Command or Action Purpose · parameter-map parameter-map-name: Configures the parameter map. Note When security web-auth is enabled, you get to map the default authentication-list and global parameter-map. This is applicable for authentication-list and parameter-map that are not explicitly mentioned. no shutdown Example: Device(config-wlan)# no shutdown Enables the WLAN. exit Example: Device(config-wlan)# exit Exits from the WLAN configuration. parameter-map type webauth parameter-map-name Example: Device(config)# parameter-map type webauth parMap6 Creates a parameter map and enters parameter-map webauth configuration mode. parameter-map type webauth parameter-map-name Example: Device(config)# parameter-map type webauth parMap6 Creates a parameter map and enters parameter-map webauth configuration mode. type webauth Example: Device(config-params-parameter-map)# type webauth Configures the webauth type parameter. timeout init-state sec <timeout-seconds> Example: Device(config-params-parameter-map)# timeout inti-state sec 3600 Configures the WEBAUTH timeout in seconds. Valid range for the time in sec parameter is 60 seconds to 3932100 seconds. redirect for-login <URL-String> Example: Configures the URL string for redirect during login. Device(config-params-parameter-map)# redirect for-login https://172.16.100.157/portal/login.html Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1215 Captive Portal Configuration - Example Security Step 15 Step 16 Step 17 Step 18 Command or Action exit Example: Device(config-params-parameter-map)# exit wireless tag policy policy-tag-name Example: Device(config)# wireless tag policy policy_tag_edc6 wlan wlan-profile-name policy policy-profile-name Example: Device(config-policy-tag)# wlan edc6 policy policy_profile_flex end Example: Device(config-policy-tag)# end Purpose Exits the parameters configuration. Configures policy tag and enters policy tag configuration mode. Attaches a policy profile to a WLAN profile. Saves the configuration and exits configuration mode and returns to privileged EXEC mode. Captive Portal Configuration - Example The following example shows how you can have APs at different locations, broadcasting the same SSID but redirecting clients to different redirect portals: Configuring multiple parameter maps pointing to different redirect portal: parameter-map type webauth parMap1 type webauth timeout init-state sec 21600 redirect for-login https://172.16.12.3:8080/portal/PortalSetup.action?portal=cfdbce00-2ce2-11e8-b83c-005056a06b27 redirect portal ipv4 172.16.12.3 ! ! parameter-map type webauth parMap11 type webauth timeout init-state sec 21600 redirect for-login https://172.16.12.4:8443/portal/PortalSetup.action?portal=094e7270-3808-11e8-9797-02421e4cae0c redirect portal ipv4 172.16.12.4 ! Associating these parameter maps to different WLANs: wlan edc1 1 edc ip access-group web CPWebauth no security wpa no security wpa akm dot1x no security wpa wpa2 ciphers aes security web-auth security web-auth authentication-list cp-webauth security web-auth parameter-map parMap11 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1216 Security no shutdown wlan edc2 2 edc ip access-group web CPWebauth no security wpa no security wpa akm dot1x no security wpa wpa2 ciphers aes security web-auth security web-auth authentication-list cp-webauth security web-auth parameter-map parMap1 no shutdown Note All WLANs have identical SSIDs. Associating WLANs to different policy tags: wireless tag policy policy_tag_edc1 wlan edc1 policy policy_profile_flex wireless tag policy policy_tag_edc2 wlan edc2 policy policy_profile_flex Assigning these policy tags to the desired APs: ap E4AA.5D13.14DC policy-tag policy_tag_edc1 site-tag site_tag_flex ap E4AA.5D2C.3CAC policy-tag policy_tag_edc2 site-tag site_tag_flex Captive Portal Configuration - Example Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1217 Captive Portal Configuration - Example Security Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1218 1 1 0 C H A P T E R RADIUS DTLS · Information About RADIUS DTLS, on page 1219 · Prerequisites, on page 1221 · Configuring RADIUS DTLS Server, on page 1221 · Configuring DTLS Dynamic Author, on page 1226 · Enabling DTLS for Client, on page 1226 · Verifying the RADIUS DTLS Server Configuration, on page 1229 · Clearing RADIUS DTLS Specific Statistics, on page 1229 Information About RADIUS DTLS The Remote Authentication Dial-In User Service (RADIUS) is a client or server protocol that provides centralized security for users attempting to gain management access to a network. The RADIUS protocol is a widely deployed authentication and authorization protocol that delivers a complete Authentication, Authorization, and Accounting (AAA) solution. RADIUS DTLS Port The RADIUS port (DTLS server) is used for authentication and accounting. The default DTLS server port is 2083. You can change the RADIUS DTLS port number using dtls port port_number. For more information, see the Configuring RADIUS DTLS Port Numbersection. Shared Secret You can use radius/dtls as the shared secret, if you have enabled DTLS for a specific server. Handling PAC for CTS Communication You can download PAC from ISE for CTS communication. Once the PAC is downloaded, you need to encrypt all the CTS attributes with the PAC key instead of the shared secret. The ISE then decrypts these attributes using PAC. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1219 Information About RADIUS DTLS Security Session Management The RADIUS client purely depends on the response from the DTLS server. If the session is ideal for ideal timeout, then the session must be closed. In case of invalid responses, the sessions must be deleted. If you need to send the radius packets over DTLS, the DTLS session needs to be re-established with the specific server. Load Balancing Multiple DTLS servers and load balancing methods are configured. You need to select the AAA server to which the request needs to be sent. Then use the DTLS context of the specific server to encrypt the RADIUS packet and send it back. Connection Timeout After the encrypted RADIUS packet is sent, you need to start the retransmission timer. If you do not get a response before the retransmission timer expires, the packet is re-encrypted and re-transmitted. You can continue for number of times as per the dtls retries configuration or till the default value. Once the number of tries exceeds the limit, the server becomes unavailable and responses are sent back to the AAA clients. Note The default connection timeout is 5 seconds. Connection Retries As the RADIUS DTLS is UDP based, you need to retry the connection after a specific timeout interval for a specific number of retries. After all retries are exhausted, the DTLS connection performs the following: · Is marked as unsuccessful. · Looks up for the next available server for processing the RADIUS requests. Note The default connection retries is 5. Idle Timeout When the idle timer expires and no transactions exists since the last idle timeout, the DTLS session remains closed. After you establish the DTLS session, you can start the idle timer. If you start the idle timer for 30 seconds and one of the RADIUS DTLS packet is sent, then after 30 seconds, the idle timer expires and checks for number of RADIUS DTLS transactions. If the idle timer value exceeds zero, the idle timer resets the transaction counter and restarts the timer. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1220 Security Prerequisites Note The default idle timeout is 60 seconds. Handling Server and Server Group Failover You can configure RADIUS servers with and without DTLS. It is recommended to create AAA server groups with DTLS enabled servers and non-DTLS servers. However, you will not find any such restriction while configuring AAA server groups. Suppose you choose a DTLS server, the DTLS server establishes connection and RADIUS request packet is sent to the DTLS server. If the DTLS server does not respond after all RADIUS retries, it would fall over to the next configured server in the same server group. If the next server is a DTLS server, the processing of the RADIUS request packet continues with the next server. If the next server is a non-DTLS server, the processing of RADIUS request packet does not happen in that server group. Then the server group failover occurs and the same sequence continues with the next server group, if the next server group is available. Note You need to use either only DTLS or non-DTLS servers in a server group. Prerequisites Support for IOS and BINOS AAA The AAA server runs in IOS and BINOS platforms. Once you complete the RADIUS DTLS support in IOS, the same needs to be ported to BINOS. Configuring RADIUS DTLS Server Procedure Step 1 Command or Action enable Example: Device# enable Step 2 configure terminal Example: Device# configure terminal Step 3 radius server server-name Example: Device(config)# radius server R1 Purpose Enters privileged EXEC mode. Enters global configuration mode. Specifies the RADIUS server name. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1221 Configuring RADIUS DTLS Connection Timeout Security Step 4 Step 5 Command or Action dtls Example: Device(config-radius-server)# dtls end Example: Device(config-radius-server)# end Purpose Configures DTLS parameters. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring RADIUS DTLS Connection Timeout Procedure Step 1 Command or Action enable Example: Device# enable Step 2 configure terminal Example: Device# configure terminal Step 3 radius server server-name Example: Device(config)# radius server R1 Step 4 dtls connectiontimeout timeout Example: Device(config-radius-server)# dtls connectiontimeout 1 Step 5 end Example: Device(config-radius-server)# end Purpose Enters privileged EXEC mode. Enters global configuration mode. Specifies the RADIUS server name. Configures RADIUS DTLS connection timeout. Here, timeout refers to the DTLS connection timeout value. The valid range is from 1 to 65535. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring RADIUS DTLS Idle Timeout Procedure Step 1 Command or Action enable Example: Purpose Enters privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1222 Security Configuring Source Interface for RADIUS DTLS Server Step 2 Step 3 Step 4 Step 5 Command or Action Device# enable configure terminal Example: Device# configure terminal radius server server-name Example: Device(config)# radius server R1 dtls idletimeout idle_timeout Example: Device(config-radius-server)# dtls idletimeout 2 end Example: Device(config-radius-server)# end Purpose Enters global configuration mode. Specifies the RADIUS server name. Configures RADIUS DTLS idle timeout. Here, idle_timeout refers to the DTLS idle timeout value. The valid range is from 1 to 65535. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Source Interface for RADIUS DTLS Server Procedure Step 1 Command or Action enable Example: Device# enable Purpose Enters privileged EXEC mode. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 radius server server-name Example: Device(config)# radius server R1 Specifies the RADIUS server name. Step 4 dtls ip {radius source-interface Ethernet-Internal interface_number Configures source interface for RADIUS DTLS server. Example: Here, Device(config-radius-server)# dtls ip radius source-interface Ethernet-Internal 0 · interface_number refers to the Ethernet-Internal interface number. The default value is 0. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1223 Configuring RADIUS DTLS Port Number Security Step 5 Command or Action end Example: Device(config-radius-server)# end Purpose Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring RADIUS DTLS Port Number Procedure Step 1 Command or Action enable Example: Device# enable Purpose Enters privileged EXEC mode. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 radius server server-name Example: Device(config)# radius server R1 Specifies the RADIUS server name. Step 4 dtls port port_number Configures RADIUS DTLS port number. Example: Here, Device(config-radius-server)# dtls port port_number refers to the DTLS port number. 2 Step 5 end Example: Device(config-radius-server)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring RADIUS DTLS Connection Retries Procedure Step 1 Command or Action enable Example: Device# enable Step 2 configure terminal Example: Purpose Enters privileged EXEC mode. Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1224 Security Configuring RADIUS DTLS Trustpoint Step 3 Step 4 Step 5 Command or Action Device# configure terminal radius server server-name Example: Device(config)# radius server R1 dtls retries retry_number Example: Device(config-radius-server)# dtls retries 3 end Example: Device(config-radius-server)# end Purpose Specifies the RADIUS server name. Configures RADIUS connection retries. Here, retry_number refers to the DTLS connection retries. The valid range is from 1 to 65535. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring RADIUS DTLS Trustpoint Procedure Step 1 Command or Action enable Example: Device# enable Purpose Enters privileged EXEC mode. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 radius server server-name Example: Device(config)# radius server R1 Specifies the RADIUS server name. Step 4 dtls trustpoint {client LINE dtls | server LINE Configures trustpoint for client and server. dtls} Example: Device(config-radius-server)# dtls trustpoint client client1 dtls Device(config-radius-server)# dtls trustpoint server server1 dtls Step 5 end Example: Device(config-radius-server)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1225 Configuring DTLS Dynamic Author Security Configuring DTLS Dynamic Author Procedure Step 1 Command or Action enable Example: Device# enable Purpose Enters privileged EXEC mode. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 aaa server radius dynamic-author Example: Device(config)# aaa server radius dynamic-author Configures local server profile for RFC 3576 support. Step 4 dtls Example: Device(config-locsvr-da-radius)# dtls Configures DTLS source parameters. Step 5 end Example: Device(config-locsvr-da-radius)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Enabling DTLS for Client Procedure Step 1 Command or Action enable Example: Device# enable Step 2 configure terminal Example: Device# configure terminal Step 3 aaa server radius dynamic-author Example: Purpose Enters privileged EXEC mode. Enters global configuration mode. Configures local server profile for RFC 3576 support. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1226 Security Configuring Client Trustpoint for DTLS Step 4 Step 5 Command or Action Device(config)# aaa server radius dynamic-author Purpose client IP_addr dtls Enables DTLS for the client. Example: Device(config-locsvr-da-radius)# client 10.104.49.14 dtls end Example: Device(config-locsvr-da-radius)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Client Trustpoint for DTLS Procedure Step 1 Command or Action enable Example: Device# enable Purpose Enters privileged EXEC mode. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 aaa server radius dynamic-author Example: Device(config)# aaa server radius dynamic-author Configures local server profile for RFC 3576 support. Step 4 client IP_addr dtls {client-tp client-tp-name | Configures client trustpoint for DTLS. server-tp server-tp-name} Example: Device(config-locsvr-da-radius)# client 10.104.49.14 dtls client-tp client_tp_name Step 5 end Example: Device(config-locsvr-da-radius)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1227 Configuring DTLS Idle Timeout Security Configuring DTLS Idle Timeout Procedure Step 1 Command or Action enable Example: Device# enable Purpose Enters privileged EXEC mode. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 aaa server radius dynamic-author Example: Device(config)# aaa server radius dynamic-author Configures local server profile for RFC 3576 support. Step 4 client IP_addr dtls idletimeout Configures DTLS idle time. timeout-interval {client-tp client_tp_name | server-tp server_tp_name} Here, Example: timeout-interval refers to the idle timeout interval. The valid range is from 60 to 600. Device(config-locsvr-da-radius)# client 10.104.49.14 dtls idletimeout 62 client-tp dtls_ise Step 5 end Example: Device(config-locsvr-da-radius)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Server Trustpoint for DTLS Procedure Step 1 Command or Action enable Example: Device# enable Step 2 configure terminal Example: Device# configure terminal Purpose Enters privileged EXEC mode. Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1228 Security Verifying the RADIUS DTLS Server Configuration Step 3 Step 4 Step 5 Command or Action aaa server radius dynamic-author Example: Device(config)# aaa server radius dynamic-author Purpose Configures local server profile for RFC 3576 support. client IP_addr dtls server-tp server_tp_name Configures server trust point. Example: Device(config-locsvr-da-radius)# client 10.104.49.14 dtls server-tp dtls_client end Example: Device(config-locsvr-da-radius)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Verifying the RADIUS DTLS Server Configuration To view information about the DTLS enabled servers, use the following command: Device# show aaa servers DTLS: Packet count since last idletimeout 1, Send handshake count 3, Handshake Success 1, Total Packets Transmitted 1, Total Packets Received 1, Total Connection Resets 2, Connection Reset due to idle timeout 0, Connection Reset due to No Response 2, Connection Reset due to Malformed packet 0, Clearing RADIUS DTLS Specific Statistics To clear the radius DTLS specific statistics, use the following command: Device# clear aaa counters servers radius {<server-id> | all} Note Here, server-id refers to the server ID displayed by show aaa servers. The valid range is from 0 to 2147483647. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1229 Clearing RADIUS DTLS Specific Statistics Security Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1230 1 1 1 C H A P T E R Policy Enforcement and Usage Monitoring · Policy Enforcement and Usage Monitoring, on page 1231 · Configuring Policy Enforcement and Enabling Change-of-Authorization (CLI), on page 1231 · Example: Configuring Policy Enforcement and Usage Monitoring, on page 1232 · Verifying Policy Usage and Enforcement, on page 1233 Policy Enforcement and Usage Monitoring You can enforce dynamic QoS policies and upstream and downstream TCP or UDP data rates on 802.11 clients seamlessly without disrupting the client's ongoing sessions. The feature ensures that clients do not have to get dissociated from the network. All the authentication methods: 802.1X, PSK, web authentication, and so on, are supported. The APs periodically send client statistics including bandwidth usage to the Controller. The AAA server receives Accounting-Interim messages which include the clients data utilization at the configured intervals. The AAA server accumulates information about data consumption for each client and when the client exhausts the data limit, the AAA server sends a change-of-authorization (CoA) message to the Controllers. Upon successful CoA handshakes, the Controllers apply and send new policies to the APs. Restrictions on Policy Enforcement and Usage Monitoring · Only FlexConnect local switching mode is supported. Configuring Policy Enforcement and Enabling Change-of-Authorization (CLI) For more information, follow the utility specified in Utilities for configuring Security section of this guide. Procedure Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1231 Example: Configuring Policy Enforcement and Usage Monitoring Security Step 2 Step 3 Step 4 Command or Action Device# configure terminal Purpose aaa server radius dynamic-author Example: Device(config)# aaa server radius dynamic-author Creates a local server RADIUS profile in the controller. client client-ip-addr server-key key Configures a server key for a RADIUS client. Example: Device(config-locsvr-da-radius)# client 3.2.4.3 server-key testpwd [Optional] show aaa command handler Example: Device#show aaa command handler Displays the AAA CoA packet statistics. Example: Configuring Policy Enforcement and Usage Monitoring Policy enforcement and usage monitoring is applied on a group where a class-map is created for QOS policies. This is done via CoA. Given below is a sample configuration for policy enforcement and usage monitoring: aaa new-model radius server radius_free address ipv4 10.0.0.1 auth-port 1812 acct-port 1813 key cisco123 exit aaa new-model aaa server radius dynamic-author client 10.0.0.1 server-key cisco123 aaa new-model aaa group server radius rad_eap server name radius_free exit aaa new-model dot1x system-auth-control aaa authentication dot1x eap_methods group rad_eap dot1x system-auth-control class-map client_dscp_clsmapout match dscp af13 exit class-map client_dscp_clsmapin match dscp af13 exit policy-map qos_new class client_dscp_clsmapout police 512000 conform-action transmit exceed-action drop policy-map qos_nbn class client_dscp_clsmapin police 16000000 conform-action transmit exceed-action drop wlan test1 3 test2 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1232 Security Verifying Policy Usage and Enforcement broadcast-ssid security wpa wpa2 ciphers aes security dot1x authentication-list eap_methods no shutdown exit wireless profile policy named-policy-profile shutdown vlan 10 aaa-override no central association no central dhcp no central switching no shutdown wireless tag policy named-policy-tag wlan test1 policy named-policy-profile wireless profile flex FP_name_001 native-vlan-id 10 wireless tag site ST_name_001 no local-site flex-profile FP_name_001 exit ap test-ap policy-tag named-policy-tag site-tag ST_name_001 exit aaa authorization network default group radius exit Verifying Policy Usage and Enforcement To view the detailed information about the policies applied to a specific client, use the following command: Device# show wireless client mac-address mac-address detail To view client-level mobility statistics, use the following command: Device# show wireless client mac-address mac-address mobility statistics To view client-level roaming history for an active client in a sub-domain, use the following command: Device# show wireless client mac-address mac-address mobility history To view detailed parameters of a given profile policy, use the following command: Device# show wireless profile policy detailed policy-name Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1233 Verifying Policy Usage and Enforcement Security Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1234 1 1 2 C H A P T E R Local Extensible Authentication Protocol · Information About Local EAP, on page 1235 · Restrictions for Local EAP, on page 1236 · Configuring Local EAP Profile (CLI), on page 1236 · Configuring Local EAP profile (GUI), on page 1237 · Configuring AAA Authentication (GUI), on page 1237 · Configuring AAA Authorization Method (GUI), on page 1237 · Configuring AAA Authorization Method (CLI), on page 1238 · Configuring Local Advanced Methods (GUI), on page 1239 · Configuring WLAN (GUI), on page 1239 · Configuring WLAN (CLI), on page 1240 · Creating a User Account (CLI), on page 1240 · Attaching a Policy Profile to a WLAN Interface (GUI), on page 1241 · Deploy Policy Tag to Access Points (GUI), on page 1242 Information About Local EAP Local Extensible Authentication Protocol (EAP) feature refers to the controller that acts as autheticator and authentication server. Local EAP allows 802.1x authentication on WPA Enterprise wireless clients without the use of any RADIUS server. The Local EAP refers to the EAP authentication server activity and not necessarily tied to the user credentials validation (for example) that can be delegated to an external LDAP database. Feature Scenarios Local EAP is designed to allow administrators to use Enterprise-grade 802.1x authentication for a limited number of users in situations and branches where an external dedicated RADIUS server may not be available. It can also work as an emergency backup in case the RADIUS server is not available. Use Cases You can implement Local EAP either with users local to the controller or use an external LDAP database to store the user credentials. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1235 Restrictions for Local EAP Security Restrictions for Local EAP · It is not possible to configure AAA attributes, such as per-user ACL or per-user session timeout using local EAP. · Local EAP only allows user database either locally on the controller or on an external LDAP database. · Local EAP supports TLS 1.2 as of 17.1 and later software release. · Local EAP uses the trustpoint of your choice on the controller. You will either need to install a publicly trusted certificate on the controller or import it on the clients for the EAP session to be trusted by the client. · Local EAP supports EAP-FAST, EAP-TLS, and PEAP as EAP authentication methods. Note PEAP-mschapv2 does not work when using certain external LDAP databases that only support clear text passwords. Configuring Local EAP Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 eap profile name Creates an EAP profile. Example: Device(config)# eap profile mylocapeap Step 3 method peap Configures the PEAP method on the profile. Example: Device(config-eap-profile)# method peap Step 4 pki-trustpoint name Example: Device(config-eap-profile)# pki-trustpoint admincert Configures the PKI trustpoint on the profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1236 Security Configuring Local EAP profile (GUI) Configuring Local EAP profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Security > Local EAP. Click Add. In the Create Local EAP Profiles page, enter a profile name. Note It is not advised to use LEAP EAP method due to its weak security. You can use any of the following EAP methods to configure a trustpoint: · EAP-FAST · EAP-TLS · PEAP Clients do not trust the default controller certificate, so you need to deactivate the server certificate validation on the client side or install a certificate trustpoint on the controller. Click Apply to Device. Configuring AAA Authentication (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Security > AAA, and navigate to the AAA Method List > Authentication tabs. Click Add. Choose dot1x as the Type and local as the Group Type. Click Apply to Device. Configuring AAA Authorization Method (GUI) Procedure Step 1 Step 2 Navigate to Authorization sub-tab. Create a new method for credential-download type and point it to local. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1237 Configuring AAA Authorization Method (CLI) Note Perform the same for network authorization type. Security Configuring AAA Authorization Method (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 aaa new-model Example: Device(config)# aaa new-model Creates a AAA authentication model. Step 3 aaa authentication dot1x default local Configures the default local RADIUS server. Example: Device(config)# aaa authentication dot1x default local Step 4 aaa authorization credential-download default local Example: Device(config)# aaa authorization credential-download default local Configures default database to download credentials from local server. Step 5 aaa local authentication default authorization Configures the local authentication method list. default Example: Device(config)# aaa local authentication default authorization default Step 6 aaa authorization network default local Configures authorization for network services. Example: Device(config)# aaa authorization network default local Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1238 Security Configuring Local Advanced Methods (GUI) Configuring Local Advanced Methods (GUI) Procedure Step 1 Step 2 In the Configuration > Security > AAA window, perform the following: a. Navigate to AAA Advanced tab. b. From the Local Authentication drop-down list, choose a default local authentication. c. From the Local Authorization drop-down list, choose a default local authorization. Click Apply. Configuring WLAN (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > WLANs. In the WLANs window, click the name of the WLAN or click Add to create a new one. In the Add/EditWLAN window that is displayed, click the General tab to configure the following parameters. · In the Profile Name field, enter or edit the name of the profile. · In the SSID field, enter or edit the SSID name. The SSID name can be alphanumeric, and up to 32 characters in length. · In the WLAN ID field, enter or edit the ID number.The valid range is between 1 and 512. · From the Radio Policy drop-down list, choose the 802.11 radio band. · Using the Broadcast SSID toggle button, change the status to either Enabled or Disabled. · Using the Status toggle button, change the status to either Enabled or Disabled. In the AAA tab, you can configure the following: a. Choose an authentication list from the drop-down. b. Check the Local EAP Authentication check box to enable local EAP authentication on the WLAN. Also, choose the required EAP Profile Name from the drop-down list. Click Save & Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1239 Configuring WLAN (CLI) Security Configuring WLAN (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wlan wlan-name wlan-id SSID-name Example: Device(config)# wlan localpeapssid 1 localpeapssid Purpose Enters global configuration mode. Enters the WLAN configuration sub-mode. wlan-name--Is the name of the configured WLAN. wlan-id--Is the wireless LAN identifier. The range is 1 to 512. SSID-name--Is the SSID name which can contain 32 alphanumeric characters. Note If you have already configured this command, enter wlan wlan-name command. Step 3 Step 4 security dot1x authentication-list auth-list-name Example: Device(config-wlan)# security dot1x authentication-list default local-auth profile name Example: Device(config-wlan)# local-auth mylocaleap Enables security authentication list for dot1x security. The configuration is similar for all dot1x security WLANs. Sets EAP Profile on an WLAN. profile name--Is the EAP profile on an WLAN. Creating a User Account (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1240 Security Attaching a Policy Profile to a WLAN Interface (GUI) Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action user-name user-name Example: Device(config)# user-name 1xuser Purpose Creates a user account. creation-time time Creation time of the user account. Example: Device(config)# creation-time 1572730075 description user-name Example: Device(config)# description 1xuser Adds a user-defined description to the new user account. password 0 password Example: Device(config)# password 0 Cisco123 Creates a password for the user account. type network-user description user-name Example: Device(config)# type network-user description 1xuser Specifies the type of user account. Attaching a Policy Profile to a WLAN Interface (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Configuration > Tags & Profiles > Tags. On the Manage Tags page, click Policy tab. Click Add to view the Add Policy Tag window. Enter a name and description for the policy tag. Click Add to map the WLAN and policy. Choose the WLAN profile to map with the appropriate policy profile, and click the tick icon. Click Save & Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1241 Deploy Policy Tag to Access Points (GUI) Deploy Policy Tag to Access Points (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Wireless > Access Points. On the All Access Points page, click the access point you want to configure. Make sure that the tags assigned are the ones you configured. Click Apply. Security Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1242 1 1 3 C H A P T E R Local EAP Ciphersuite · Information About Local EAP Ciphersuite, on page 1243 · Restrictions for Local EAP Ciphersuite, on page 1244 · Configuring Local EAP Ciphersuite (CLI), on page 1245 Information About Local EAP Ciphersuite Prior to Cisco IOS XE Cupertino 17.7.1 Release, the controller acts as an SSL server supporting a hardcoded list of ciphersuites for each EAP application. From Cisco IOS XE Cupertino 17.7.1 Release onwards, the controller is equipped with a knob that controls the list of ciphersuites when using local authentication. The following table lists the hardcoded list of ciphersuites: Table 82: Hardcoded List of Ciphersuites Ciphersuites aes128-sha aes256-sha dhe-rsa-aes-gcm-sha2 dhe-rsa-aes-sha2 dhe-rsa-aes128-sha dhe-rsa-aes256-sha ecdhe-ecdsa-aes-gcm-sha2 Description Encryption Type tls_rsa_with_aes_128_cbc_sha. Encryption Type tls_rsa_with_aes_256_cbc_sha. Encryption Type tls_dhe_rsa_with_aes_128_gcm_sha256 and tls_dhe_rsa_with_aes_256_gcm_sha384(TLS1.2 and above). Encryption Type tls_dhe_rsa_with_aes_128_cbc_sha256 and tls_dhe_rsa_with_aes_256_cbc_sha256 (TLS 1.2 and above). Encryption Type tls_dhe_rsa_with_aes_128_cbc_sha. Encryption Type tls_dhe_rsa_with_aes_256_cbc_sha. Encryption Type tls_ecdhe_ecdsa_with_aes_128_gcm_sha256 and tls_ecdhe_ecdsa_with_aes_256_gcm_sha384(TLS1.2 and above). Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1243 Restrictions for Local EAP Ciphersuite Security Ciphersuites ecdhe-ecdsa-aes-sha ecdhe-ecdsa-aes-sha2 ecdhe-rsa-aes-gcm-sha2 ecdhe-rsa-aes-sha ecdhe-rsa-aes-sha2 Description Encryption Type tls_ecdhe_ecdsa_with_aes_128_cbc_sha and tls_ecdhe_ecdsa_with_aes_256_cbc_sha. Encryption Type tls_ecdhe_ecdsa_with_aes_128_cbc_sha256 and tls_ecdhe_ecdsa_with_aes_256_cbc_sha384(TLS1.2 and above). Encryption Type tls_ecdhe_rsa_with_aes_128_gcm_sha256 and tls_ecdhe_rsa_with_aes_256_gcm_sha384(TLS1.2 and above). Encryption Type tls_ecdhe_rsa_with_aes_128_cbc_sha and tls_ecdhe_rsa_with_aes_256_cbc_sha. Encryption Type tls_ecdhe_rsa_with_aes_128_cbc_sha256 and tls_ecdhe_rsa_with_aes_256_cbc_sha384(TLS1.2 and above). When the Client and Server Hello messages are exchanged, the client sends a prioritized list of ciphersuites it supports in Client Hello. The server then responds with the ciphersuite selected from the list in Server Hello. The server needs to select a ciphersuite that is acceptable to both the client and server. Using this approach, only one ciphersuite is selected and sent to the client. The Local EAP ciphersuite feature controls the list of ciphersuites the controller as SSL server supports. Note By default, all the ciphersuites are supported. Using the Local EAP ciphersuite feature, you can enable or disable the ciphersuites based on your requirement. Restrictions for Local EAP Ciphersuite · SNMP is not supported. · Ciphersuites are specific to Dot1x. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1244 Security Configuring Local EAP Ciphersuite (CLI) Configuring Local EAP Ciphersuite (CLI) Procedure Step 1 Command or Action enable Example: Device# enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 eap profile name Example: Device(config)# eap profile local_EAP_TLSv1 Creates an EAP profile. Step 4 ciphersuite cipher-suite Select a ciphersuite. Example: Note Device(config-eap-profile)# ciphersuite <cipher-suite> Using this command, you will be able to configure only one ciphersuite. To configure more than one ciphersuite, you need to issue this command with various ciphersuites. To remove the ciphersuites, you need to remove the ciphersuites one by one or all at once. By default all ciphersuites are supported, if you issue the no ciphersuite command. Step 5 end Example: Device(config-eap-profile)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1245 Configuring Local EAP Ciphersuite (CLI) Security Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1246 1 1 4 C H A P T E R Authentication and Authorization Between Multiple RADIUS Servers · Information About Authentication and Authorization Between Multiple RADIUS Servers, on page 1247 · Configuring 802.1X Security for WLAN with Split Authentication and Authorization Servers, on page 1248 · Configuring Web Authentication for WLAN with Split Authentication and Authorization Servers, on page 1253 · Verifying Split Authentication and Authorization Configuration, on page 1255 · Configuration Examples, on page 1256 Information About Authentication and Authorization Between Multiple RADIUS Servers Cisco Catalyst 9800 Series Wireless Controller uses the approach of request and response transaction with a single RADIUS server that combines both authentication and authorization. You can split the authentication and authorization on the controller between multiple RADIUS servers. A RADIUS sever can assume the role of either an authentication server, authorization server, or both. In cases where there are disparate RADIUS servers for authentication and authorization, the Session Aware Networking (SANet) component on the controller now allows authentication on one server and authorization on another when a client joins the controller . Authentication can be done using the Cisco ISE, Cisco DNAC, Free RADIUS, or any third-party RADIUS Server. After successful authentication from an authentication server, the controller relays attributes received from the authentication server to another RADIUS sever designated as authorization server. The authorization server then performs the following: · Processes received attributes with the other policies or rules defined on the server. · Derives attributes as part of the authorization response and returns it to the controller . Note In a split authentication and authorization configuration, both servers must be available and must successfully authenticate and authorize with an ACCESS-ACCEPT for a session to be accepted by the controller . Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1247 Configuring 802.1X Security for WLAN with Split Authentication and Authorization Servers Security Configuring 802.1X Security for WLAN with Split Authentication and Authorization Servers Configuring Explicit Authentication and Authorization Server List (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Step 15 Step 16 Step 17 Step 18 Choose Configuration > Security > AAA. On the Authentication Authorization and Accounting page, click the Servers/Groups tab. Click the type of AAA server you want to configure from the following options: · RADIUS · TACACS+ · LDAP In this procedure, the RADIUS server configuration is described. With the RADIUS option selected, click Add. Enter a name for the RADIUS server and the IPv4 or IPV6 address of the server. Enter the authentication and encryption key to be used between the device and the key string RADIUS daemon running on the RADIUS server. You can choose to use either a PAC key or a non-PAC key. Enter the server timeout value; valid range is 1 to 1000 seconds. Enter a retry count; valid range is 0 to 100. Leave the Support for CoA field in Enabled state. Click Save & Apply to Device. On the Authentication Authorization and Accounting page, with RADIUS option selected, click the Server Groups tab. Click Add. In the Create AAA RADIUS Server Group window that is displayed, enter a name for the RADIUS server group. From the MAC-Delimiter drop-down list, choose the delimiter to be used in the MAC addresses that are sent to the RADIUS servers. From the MAC Filtering drop-down list, choose a value based on which to filter MAC addresses. To configure dead time for the server group and direct AAA traffic to alternative groups of servers that have different operational characteristics, in the Dead-Time field, enter the amount of time, in minutes, after which a server is assumed to be dead. Choose the servers that you want to include in the server group from the Available Servers list and move them to the Assigned Servers list. Click Save & Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1248 Security Configuring Explicit Authentication Server List (GUI) Configuring Explicit Authentication Server List (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Choose Configuration > Security > AAA > Servers/Groups. Choose RADIUS > Servers tab. Click Add to add a new server or click an existing server. Enter the Name, the Server Address, Key, Confirm Key, Auth Port and Acct Port. Check the PAC Key checkbox and enter the PAC key and Confirm PAC Key Click Apply to Device. Choose RADIUS > Server Groups and click Add to add a new server group or click an existing server group. Enter the Name of the server group and choose the servers that you want to include in the server group, from the Available Servers list and move them to the Assigned Servers list. Click Apply to Device. Configuring Explicit Authentication Server List (CLI) Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password if prompted. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 radius server server-name Example: Device(config)# radius server free-radius-authc-server Specifies the RADIUS server name. Step 4 address ipv4 address auth-port Specifies the RADIUS server parameters. auth_port_number acct-port acct_port_number Example: Device(config-radius-server)# address ipv4 9.2.62.56 auth-port 1812 acct-port 1813 Step 5 [pac] key key Example: Specify the authentication and encryption key used between the Device and the key string Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1249 Configuring Explicit Authorization Server List (GUI) Security Step 6 Step 7 Step 8 Step 9 Command or Action Purpose Device(config-radius-server)# key cisco RADIUS daemon running on the RADIUS server. exit Example: Device(config-radius-server)# exit Returns to the configuration mode. aaa group server radius server-group Creates a radius server-group identification. Example: server-group refers to the server group name. Device(config)# aaa group server radius The valid range is from 1 to 32 alphanumeric authc-server-group characters. If the IP address of the RADIUS server is not added to the routes defined for the controller, the default route is used. We recommend that you define a specific route to source the traffic from the defined SVI in the AAA server group. server name server-name Example: Device(config)# server name free-radius-authc-server Configures the server name. end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. For more information, see Configuring AAA for External Authentication. Configuring Explicit Authorization Server List (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Choose Configuration > Security > AAA > Servers/Groups. Choose RADIUS > Servers tab. Click Add to add a new server or click an existing server. Enter the Name, the Server Address, Key, Confirm Key, Auth Port and Acct Port. Check the PAC Key checkbox and enter the PAC key and Confirm PAC Key Click Apply to Device. Choose RADIUS > Server Groups and click Add to add a new server group or click an existing server group. Enter the Name of the server group and choose the servers that you want to include in the server group, from the Available Servers list and move them to the Assigned Servers list. Click Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1250 Security Configuring Explicit Authorization Server List (CLI) Configuring Explicit Authorization Server List (CLI) Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password if prompted. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 radius server server-name Example: Device(config)# radius server cisco-dnac-authz-server Specifies the RADIUS server name. Step 4 address ipv4 address auth-port Specifies the RADIUS server parameters. auth_port_number acct-port acct_port_number Example: Device(config-radius-server)# address ipv4 9.4.62.32 auth-port 1812 acct-port 1813 Step 5 [pac] key key Example: Device(config-radius-server)# pac key cisco Specify the authorization and encryption key used between the Device and the key string RADIUS daemon running on the RADIUS server. Step 6 exit Example: Device(config-radius-server)# exit Returns to the configuration mode. Step 7 aaa group server radius server-group Creates a radius server-group identification. Example: Note Device(config)# aaa group server radius authz-server-group server-group refers to the server group name. The valid range is from 1 to 32 alphanumeric characters. Step 8 server name server-name Example: Device(config)# server name cisco-dnac-authz-server Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1251 Configuring Authentication and Authorization List for 802.1X Security (GUI) Security Step 9 Command or Action end Example: Device(config)# end Purpose Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Authentication and Authorization List for 802.1X Security (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > WLANs. Click Add. In the General tab, enter the Profile Name, the SSID, and the WLAN ID. In the Security > AAA tab, choose the Authentication list from the Authentication List drop-down list. Click Apply to Device. Configuring Authentication and Authorization List for 802.1X Security Procedure Step 1 Command or Action enable Example: Device> enable Step 2 configure terminal Example: Device# configure terminal Step 3 wlan wlan-name wlan-id SSID-name Example: Device(config)# wlan wlan-foo 222 foo-ssid Purpose Enables privileged EXEC mode. Enter your password if prompted. Enters global configuration mode. Enters WLAN configuration sub-mode. · wlan-name: Is the name of the configured WLAN. · wlan-id: Is the wireless LAN identifier. Range is from 1 to 512. · SSID-name: Is the SSID name which can contain 32 alphanumeric characters. Note If you have already configured this command, enter wlan wlan-name command. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1252 Security Configuring Web Authentication for WLAN with Split Authentication and Authorization Servers Step 4 Step 5 Step 6 Command or Action Purpose security dot1x authentication-list authenticate-list-name Enables authentication list for dot1x security. Example: Device(config-wlan)# security dot1x authentication-list authc-server-group security dot1x authorization-list authorize-list-name Example: Device(config-wlan)# security dot1x authorization-list authz-server-group Specifies authorization list for dot1x security. For more information on the Cisco Digital Network Architecture Center (DNAC), see the DNAC documentation. end Example: Device(config-wlan)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Web Authentication for WLAN with Split Authentication and Authorization Servers Configuring Authentication and Authorization List for Web Authentication (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Configuration > Tags & Profiles > WLANs. Click Add. In the General tab, enter the Profile Name, the SSID, and the WLAN ID. In the Security > Layer2 tab, uncheck the WPAPolicy, AES and 802.1x check boxes. Check the MAC Filtering check box to enable the feature. With MAC Filtering enabled, choose the Authorization list from the Authorization List drop-down list. In the Security > AAA tab, choose the Authentication list from the Authentication List drop-down list. Click Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1253 Configuring Authentication and Authorization List for Web Authentication Security Configuring Authentication and Authorization List for Web Authentication Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password if prompted. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 wlan wlan-name wlan-id SSID-name Enters WLAN configuration sub-mode. Example: Device(config)# wlan wlan-bar 1 bar-ssid · wlan-name: Is the name of the configured WLAN. · wlan-id: Is the wireless LAN identifier. · SSID-name: Is the SSID name which can contain 32 alphanumeric characters. Note If you have already configured this command, enter wlan wlan-name command. Step 4 Step 5 Step 6 Step 7 no security wpa Example: Device(config-wlan)# no security wpa Disables WPA security. no security wpa akm dot1x Disables security AKM for dot1x. Example: Device(config-wlan)# no security wpa akm dot1x no security wpa wpa2 Disables WPA2 security. Example: Device(config-wlan)# no security wpa wpa2 security web-auth {authentication-list authenticate-list-name | authorization-list authorize-list-name} Enables authentication or authorization list for dot1x security. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1254 Security Verifying Split Authentication and Authorization Configuration Step 8 Command or Action Purpose Example: Note Device(config-wlan)# security web-auth authentication-list authc-server-group You get to view the following error, if you do not disable WPA security, AKM for dot1x, and WPA2 security: % switch-1:dbm:wireless:web-auth cannot be enabled. Invalid WPA/WPA2 settings. end Example: Device(config-wlan)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Verifying Split Authentication and Authorization Configuration To view the WLAN details, use the following command: Device# show run wlan wlan wlan-foo 2 foo-ssid security dot1x authentication-list authc-server-group security dot1x authorization-list authz-server-group wlan wlan-bar 3 bar-ssid security web-auth authentication-list authc-server-group security web-auth authorization-list authz-server-group To view the AAA authentication and server details, use the following command: Device# show run aaa ! aaa authentication dot1x default group radius username cisco privilege 15 password 0 cisco ! ! radius server free-radius-authc-server address ipv4 9.2.62.56 auth-port 1812 acct-port 1813 key cisco ! radius server cisco-dnac-authz-server address ipv4 9.4.62.32 auth-port 1812 acct-port 1813 pac key cisco ! ! aaa new-model aaa session-id common ! To view the authentication and authorization list for 802.1X security, use the following command: Device# show wlan name wlan-foo | sec 802.1x 802.1x authentication list name 802.1x authorization list name 802.1x : authc-server-group : authz-server-group : Enabled To view the authentication and authorization list for web authentication, use the following command: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1255 Configuration Examples Security Device# show wlan name wlan-bar | sec Webauth Webauth On-mac-filter Failure Webauth Authentication List Name Webauth Authorization List Name Webauth Parameter Map : Disabled : authc-server-group : authz-server-group : Disabled Configuration Examples Configuring Cisco Catalyst 9800 Series Wireless Controller for Authentication with a Third-Party RADIUS Server: Example This example shows how to configure Cisco Catalyst 9800 Series Wireless Controller for authentication with a third-party RADIUS server: Device(config)# radius server free-radius-authc-server Device(config-radius-server)# address ipv4 9.2.62.56 auth-port 1812 acct-port 1813 Device(config-radius-server)# key cisco Device(config-radius-server)# exit Device(config)# aaa group server radius authc-server-group Device(config)# server name free-radius-authc-server Device(config)# end Configuring Cisco Catalyst 9800 Series Wireless Controller for Authorization with Cisco ISE or DNAC: Example This example shows how to configure Cisco Catalyst 9800 Series Wireless Controller for authorization with Cisco ISE or DNAC: Device(config)# radius server cisco-dnac-authz-server Device (config-radius-server)# address ipv4 9.4.62.32 auth-port 1812 acct-port 1813 Device (config-radius-server)# pac key cisco Device (config-radius-server)# exit Device(config)# aaa group server radius authz-server-group Device(config)# server name cisco-dnac-authz-server Device(config)# end Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1256 1 1 5 C H A P T E R CUI Information in RADIUS Accounting · CUI Information in RADIUS Accounting Request, on page 1257 · Adding CUI Information in a RADIUS Accounting Request, on page 1258 · Verifying CUI Information in a RADIUS Accounting Request, on page 1258 CUI Information in RADIUS Accounting Request Chargeable User Identity (CUI) is a unique identifier for a client visiting a network regardless of the outer identity or the device used for login. In other words, CUI is an obscured version of a username. A client must be authenticated and authorized before being allowed to the network. The CUI attribute can be used as an alternative for a client's username as part of the authentication process. To handle RADIUS attribute 89 processing, a null value of CUI is attached an access-request sent to a AAA server. This is done using the access-session wireless cui-enable command. As part of an access-accept message, a CUI-capable AAA server sends the CUI string to the controller. The controller then sends this received CUI attribute in accounting packets and other access-request packets, if any. Prerequisites Ensure that AAA override is enabled. Restrictions · Only 802.1x network authentication protocol is supported. · Inter-Release Controller Mobility (IRCM) is not supported. · FlexConnect local authentication is not supported. Only local mode and FlexConnect central authentication mode is supported. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1257 Adding CUI Information in a RADIUS Accounting Request Security Adding CUI Information in a RADIUS Accounting Request Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 access-session wireless cui-enable Example: Adds CUI attribute in authentication and accounting messages sent to the AAA server. Device(config)# access-session wireless cui-enable Verifying CUI Information in a RADIUS Accounting Request To view the CUI attribute in an accounting request on aAAA server, use the following command: Device# show wireless client mac-address aaa.bbb.ccc.ddd detail . . . Session Manager: Point of Attachment : capwap_90000005 IIF ID : 0x90000005 Authorized : TRUE Session timeout : 1800 Common Session ID: 8A45400A0000000CE0527C5F Acct Session ID : 0x00000003 Last Tried Aaa Server Details: Server IP : 10.64.69.141 Auth Method Status List Method : Dot1x SM State : AUTHENTICATED SM Bend State : IDLE Local Policies: Service Template : wlan_svc_default-policy-profile_local (priority 254) VLAN : 59 Absolute-Timer : 1800 Server Policies: CUI : 13e158006855c2ff718cc84487653f5a6ea55def Resultant Policies: CUI : 13e158006855c2ff718cc84487653f5a6ea55def VLAN Name : VLAN0059 VLAN : 59 Absolute-Timer : 1800 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1258 1 1 6 C H A P T E R Secure LDAP · Information About SLDAP, on page 1259 · Prerequisite for Configuring SLDAP, on page 1261 · Restrictions for Configuring SLDAP, on page 1261 · Configuring SLDAP, on page 1261 · Configuring an AAA Server Group (GUI), on page 1262 · Configuring a AAA Server Group, on page 1263 · Configuring Search and Bind Operations for an Authentication Request, on page 1264 · Configuring a Dynamic Attribute Map on an SLDAP Server, on page 1265 · Verifying the SLDAP Configuration, on page 1265 Information About SLDAP Transport Layer Security (TLS) The Transport Layer Security (TLS) is an application-level protocol that enables secure transactions of data through privacy, authentication, and data integrity. TLS relies upon certificates, public keys, and private keys to prove the identity of clients. The certificates are issued by the Certificate Authorities (CAs). Each certificate includes the following: · The name of the authority that issued it. · The name of the entity to which the certificate was issued. · The public key of the entity. · The timestamps of the entity that indicate the expiration date of the certificate. You can find the TLS support for LDAP in the RFC2830 which is an extension to the LDAP protocol. LDAP Operations Bind Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1259 Information About SLDAP Security The bind operation is used to authenticate a user to the server. It is used to start a connection with the LDAP server. LDAP is a connection-oriented protocol. The client specifies the protocol version and authentication information. LDAP supports the following binds: · Authenticated bind--An authenticated bind is performed when a root Distinguished Name (DN) and password are available. · Anonymous bind--In the absence of a root DN and password, an anonymous bind is performed. In LDAP deployments, the search operation is performed first and the bind operation later. This is because, if a password attribute is returned as part of the search operation, the password verification can be done locally on an LDAP client. Thus, there is no need to perform an extra bind operation. If a password attribute is not returned, the bind operation can be performed later. Another advantage of performing a search operation first and a bind operation later is that the DN received in the search result can be used as the user DN instead of forming a DN by prefixing the username (cn attribute) with the base DN. All entries stored in an LDAP server have a unique DN. The DN consists of two parts: · Relative Distinguished Name (RDN) · Location in the LDAP server where the record resides. Most of the entries that you store in an LDAP server will have a name, and the name is frequently stored in the Common Name (cn) attribute. Because every object has a name, most objects you store in an LDAP will use their cn value as the basis for their RDN. Search A search operation is used to search the LDAP server. The client specifies the starting point (base DN) of the search, the search scope (either the object, its children, or the subtree rooted at the object), and a search filter. For authorization requests, the search operation is directly performed without a bind operation. The LDAP server can be configured with certain privileges for the search operation to succeed. This privilege level is established with the bind operation. An LDAP search operation can return multiple user entries for a specific user. In such cases, the LDAP client returns an appropriate error code to AAA. To avoid these errors, you must configure appropriate search filters to match a single entry. Compare The compare operation is used to replace a bind request with a compare request for an authentication. The compare operation helps to maintain the initial bind parameters for the connection. LDAP Dynamic Attribute Mapping The Lightweight Directory Access Protocol (LDAP) is a powerful and flexible protocol for communication with AAA servers. LDAP attribute maps provide a method to cross-reference the attributes retrieved from a server to Cisco attributes supported by the security appliances. When a user authenticates a security appliance, the security appliance, in turn, authenticates the server and uses the LDAP protocol to retrieve the record for that user. The record consists of LDAP attributes associated with fields displayed on the user interface of the server. Each attribute retrieved includes a value that was entered by the administrator who updates the user records. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1260 Security Prerequisite for Configuring SLDAP Prerequisite for Configuring SLDAP If you are using a secure Transport Layer Security (TLS) secure connection, you must configure the X.509 certificates. Restrictions for Configuring SLDAP · LDAP referrals are not supported. · Unsolicited messages or notifications from the LDAP server are not handled. · LDAP authentication is not supported for interactive (terminal) sessions. Configuring SLDAP Procedure Step 1 Command or Action enable Example: Device# enable Purpose Enables privileged EXEC mode. Enter your password if prompted. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 ldap server name Example: Device(config)# ldap server server1 Defines a Lightweight Directory Access Protocol (LDAP) server and enters LDAP server configuration mode. Step 4 ipv4 ipv4-address Example: Device(config-ldap-server)# ipv4 9.4.109.20 Specifies the LDAP server IP address using IPv4. Step 5 timeout retransmit seconds Example: Device(config-ldap-server)# timeout retransmit 20 Specifies the number of seconds the Cisco Catalyst 9800 Series Wireless Controller embedded wireless controller waits for a reply to an LDAP request before retransmitting the request. Step 6 bind authenticate root-dn password [0 string Specifies a shared secret text string used | 7 string] string between the Cisco Catalyst 9800 Series Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1261 Configuring an AAA Server Group (GUI) Security Step 7 Step 8 Step 9 Command or Action Purpose Example: Wireless Controller embedded wireless Device(config-ldap-server)# bind controller and an LDAP server. authenticate root-dn CN=ldapipv6user,CN=Users,DC=ca,DC=ssh2,DC=com Use the 0 line option to configure an password Cisco12345 unencrypted shared secret. Use the 7 line option to configure an encrypted shared secret. base-dn string Example: Device(config-ldap-server)# base-dn CN=Users,DC=ca,DC=ssh2,DC=com Specifies the base Distinguished Name (DN) of the search. mode secure [no- negotiation] Example: Configures LDAP to initiate the TLS connection and specifies the secure mode. Device(config-ldap-server)# mode secure no- negotiation end Example: Device(config-ldap-server)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring an AAA Server Group (GUI) Configuring a device to use AAA server groups helps you to group existing server hosts, select a subset of the configured server hosts and use them for a particular service. A server group is used with a global server-host list. The server group lists the IP addresses of the selected server hosts. You can create the following server groups: Procedure Step 1 RADIUS a) Choose Services > Security > AAA > Server Groups > RADIUS. b) Click the Add button. The Create AAA Radius Server Group dialog box appears. c) Enter a name for the RADIUS server group in the Name field. d) Choose a desired delimiter from the MAC-Delimiter drop-down list. The available options are colon, hyphen, and single-hyphen. e) Choose a desired filter from the MAC-Filtering drop-down list. The available options are mac and Key. f) Enter a value in the Dead-Time (mins) field to make a server non-operational. You must specify a value between 1 and 1440. g) Choose any of the available servers from the Available Servers list and move them to the Assigned Servers list by clicking the > button. h) Click the Save & Apply to Device button. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1262 Security Configuring a AAA Server Group Step 2 Step 3 TACACS+ a) Choose Services > Security > AAA > Server Groups > TACACS+. b) Click the Add button. The Create AAA Tacacs Server Group dialog box appears. c) Enter a name for the TACACS server group in the Name field. d) Choose any of the available servers from the Available Servers list and move them to the Assigned Servers list by clicking the > button. e) Click the Save & Apply to Device button. LDAP a) Choose Services > Security > AAA > Server Groups > LDAP. b) Click the Add button. The Create AAA Ldap Server Group dialog box appears. c) Enter a name for the LDAP server group in the Name field. d) Choose any of the available servers from the Available Servers list and move them to the Assigned Servers list by clicking the > button. e) Click the Save & Apply to Device button. Configuring a AAA Server Group Procedure Step 1 Command or Action enable Example: Device# enable Purpose Enables privileged EXEC mode. Enter your password if prompted. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 aaa new-model Example: Device(config)# aaa new-model Enables AAA. Step 4 aaa group server ldap group-name Example: Device(config)# aaa group server ldap name1 Defines the AAA server group with a group name and enters LDAP server group configuration mode. All members of a group must be of the same type, that is, RADIUS, LDAP, or TACACS+. Step 5 server name Example: Device(config-ldap-sg)# server server1 Associates a particular LDAP server with the defined server group. Each security server is identified by its IP address and UDP port number. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1263 Configuring Search and Bind Operations for an Authentication Request Security Step 6 Command or Action exit Example: Device(config-ldap-sg)# exit Purpose Exits LDAP server group configuration mode. Configuring Search and Bind Operations for an Authentication Request Procedure Step 1 Command or Action enable Example: Device# enable Step 2 configure terminal Example: Device# configure terminal Step 3 aaa new-model Example: Device(config)# aaa new-model Step 4 ldap server name Example: Device(config)# ldap server server1 Step 5 authentication bind-first Example: Device(config-ldap-server)# authentication bind-first Step 6 authentication compare Example: Device(config-ldap-server)# authentication compare Step 7 exit Example: Device(config-ldap-server)# exit Purpose Enables privileged EXEC mode. Enter your password if prompted. Enters global configuration mode. Enables AAA. Defines a Lightweight Directory Access Protocol (LDAP) server and enters LDAP server configuration mode. Configures the sequence of search and bind operations for an authentication request. Replaces the bind request with the compare request for authentication. Exits LDAP server group configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1264 Security Configuring a Dynamic Attribute Map on an SLDAP Server Configuring a Dynamic Attribute Map on an SLDAP Server You must create LDAP attribute maps that map your existing user-defined attribute names and values to Cisco attribute names and values that are compatible with the security appliance. You can then bind these attribute maps to LDAP servers or remove them as required. Note To use the attribute mapping features correctly, you need to understand the Cisco LDAP and user-defined attribute names and values. Procedure Step 1 Command or Action enable Example: Device# enable Purpose Enables privileged EXEC mode. Enter your password if prompted. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 ldap attribute-map map-name Example: Configures a dynamic LDAP attribute map and enters attribute-map configuration mode. Device(config)# ldap attribute-map map1 Step 4 map type ldap-attr-type aaa-attr-type Example: Device(config-attr-map)# map type department supplicant-group Defines an attribute map. Step 5 exit Example: Device(config-attr-map)# exit Exits attribute-map configuration mode. Verifying the SLDAP Configuration To view details about the default LDAP attribute mapping, use the following command: Device# show ldap attributes To view the LDAP server state information and various other counters for the server, use the following command: Device# show ldap server Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1265 Verifying the SLDAP Configuration Security Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1266 1 1 7 C H A P T E R Network Access Server Identifier · Information About Network Access Server Identifier, on page 1267 · Creating a NAS ID Policy(GUI), on page 1268 · Creating a NAS ID Policy, on page 1268 · Attaching a Policy to a Tag (GUI), on page 1269 · Attaching a Policy to a Tag (CLI), on page 1269 · Verifying the NAS ID Configuration, on page 1270 Information About Network Access Server Identifier Network access server identifier (NAS-ID) is used to notify the source of a RADIUS access request, which enables the RADIUS server to choose a policy for that request. You can configure one on each WLAN profile, VLAN interface, or access point group. The NAS-ID is sent to the RADIUS server by the controller through an authentication request to classify users to different groups. This enables the RADIUS server to send a customized authentication response. Note The acct-session-id is sent with the RADIUS access request only when accounting is enabled on the policy profile. If you configure a NAS-ID for an AP group, it overrides the NAS-ID that is configured for a WLAN profile or the VLAN interface. Similarly, if you configure a NAS-ID for a WLAN profile, it overrides the NAS-ID that is configured for the VLAN interface. Starting with Cisco IOS XE Cupertino 17.7.1, a new string named custom-string (custom string) is added. The following options can be configured for a NAS ID: · sys-name (System Name) · sys-ip (System IP Address) · sys-mac (System MAC Address) · ap-ip (AP's IP address) · ap-name (AP's Name) · ap-mac (AP's MAC Address) Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1267 Creating a NAS ID Policy(GUI) Security · ap-eth-mac (AP's Ethernet MAC Address) · ap-policy-tag (AP's policy tag name) · ap-site-tag (AP's site tag name) · ssid (SSID Name) · ap-location (AP's Location) · custom-string (custom string) Creating a NAS ID Policy(GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Configuration > Security > Wireless AAA Policy. On the Wireless AAA Policy page, click the name of the Policy or click Add to create a new one. In the Add/Edit Wireless AAA Policy window that is displayed, enter the name of the policy in the Policy Name field. Choose from one of the NAS ID options from the Option 1 drop-down list. Choose from one of the NAS ID options from the Option 2 drop-down list. Choose from one of the NAS ID options from the Option 3 drop-down list. Save the configuration. Creating a NAS ID Policy Follow the procedure given below to create NAS ID policy: Before you begin · NAS ID can be a combination of multiple NAS ID options; the maximum options are limited to 3. · The maximum length of the NAS ID attribute is 253. Before adding a new attribute, the attribute buffer is checked, and if there is no sufficient space, the new attribute is ignored. · By default, a wirleess aaa policy (default-aaa-policy) is created with the default configuration (sys-name). You can update this policy with various NAS ID options. However, the default-aaa-policy cannot be deleted. · If a NAS ID is not configured, the default sys-name is considered as the NAS ID for all wireless-specific RADIUS packets (authentication and accounting) from the controller . · Starting with Cisco IOS XE Cupertino 17.7.1, you can configure a custom string with various combinations of option1, option2 and option3 (nas-id option3 custom-string custom-string) as NAS ID in RADIUS packets. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1268 Security Attaching a Policy to a Tag (GUI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless aaa policy policy-name Configures a new AAA policy. Example: Device(config)# wireless aaa policy test Step 3 nas-id option1 sys-name Configures NAS ID for option1. Example: Device(config-aaa-policy)# nas-id option1 sys-name Step 4 nas-id option2 sys-ip Configures NAS ID for option2. Example: Device(config-aaa-policy)# nas-id option2 sys-ip Step 5 nas-id option3 sys-mac Configures NAS ID for option3. Example: Device(config-aaa-policy)# nas-id option3 sys-mac Attaching a Policy to a Tag (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Tags & Profiles > Tags page, click Policy tab. Click Add to view the Add Policy Tag window. Enter a name and description for the policy tag. Click Add to map WLAN profile and Policy profile. Choose the WLAN Profile to map with the appropriate Policy Profile, and click the tick icon. Click Save & Apply to Device. Attaching a Policy to a Tag (CLI) Follow the procedure given below to attach a NAS ID policy to a tag: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1269 Verifying the NAS ID Configuration Security Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy policy-name Configures a WLAN policy profile. Example: Device(config)# wireless profile policy test1 Step 3 aaa-policy aaa-policy-name Example: Device(config-wireless-policy)# aaa-policy policy-aaa Configures a AAA policy profile. Step 4 exit Example: Device(config-wireless-policy)# exit Returns to global configuration mode. Step 5 wireless tag policy policy-tag Example: Device(config)# wireless tag policy policy-tag1 Configures a wireless policy tag. Step 6 wlan wlan1 policy policy-name Maps a WLAN profile to a policy profile. Example: Note Device(config)# wlan wlan1 policy test1 You can also use the ap-tag option to configure a NAS ID for an AP group, which will override the NAS ID that is configured for a WLAN profile or the VLAN interface. Verifying the NAS ID Configuration Use the following show command to verify the NAS ID configuration: Device# show wireless profile policy detailed test1 Policy Profile Name Description Status VLAN Client count : : AAA Policy Params : test1 : : ENABLED :1 :0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1270 Security AAA Override NAC AAA Policy name : DISABLED : DISABLED : test Verifying the NAS ID Configuration Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1271 Verifying the NAS ID Configuration Security Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1272 1 1 8 C H A P T E R Locally Significant Certificates · Information About Locally Significant Certificates, on page 1273 · Restrictions for Locally Significant Certificates, on page 1275 · Provisioning Locally Significant Certificates, on page 1275 · Verifying LSC Configuration, on page 1287 · Configuring Management Trustpoint to LSC (GUI), on page 1287 · Configuring Management Trustpoint to LSC (CLI), on page 1288 · Information About MIC and LSC Access Points Joining the Controller, on page 1288 · LSC Fallback Access Points, on page 1293 · Configuring Controller Self-Signed Certificate for Wireless AP Join, on page 1294 Information About Locally Significant Certificates This module explains how to configure the Cisco Catalyst 9800 Series Wireless Controller and Lightweight Access Points (LAPs) to use the Locally Significant Certificate (LSC). If you choose the Public Key Infrastructure (PKI) with LSC, you can generate the LSC on the APs and controllers. You can then use the certificates to mutually authenticate the controllers and the APs. In Cisco controllers, you can configure the controller to use an LSC. Use an LSC if you want your own PKI to provide better security, have control of your Certificate Authority (CA), and define policies, restrictions, and usages on the generated certificates. You need to provision the new LSC certificate on the controller and then the Lightweight Access Point (LAP) from the CA Server. The LAP communicates with the controller using the CAPWAP protocol. Any request to sign the certificate and issue the CA certificates for LAP and controller itself must be initiated from the controller. The LAP does not communicate directly with the CA server. The CA server details must be configured on the controller and must be accessible. The controller makes use of the Simple Certificate Enrollment Protocol (SCEP) to forward certReqs generated on the devices to the CA and makes use of SCEP again to get the signed certificates from the CA. The SCEP is a certificate management protocol that the PKI clients and CA servers use to support certificate enrollment and revocation. It is widely used in Cisco and supported by many CA servers. In SCEP, HTTP is used as the transport protocol for the PKI messages. The primary goal of SCEP is the secure issuance of certificates to network devices. SCEP is capable of many operations, but for our release, SCEP is utilized for the following operations: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1273 Certificate Provisioning in Controllers Security · CA and Router Advertisement (RA) Public Key Distribution · Certificate Enrollment Certificate Provisioning in Controllers The new LSC certificates, both CA and device certificates, must be installed on the controller. With the help of SCEP, CA certificates are received from the CA server. During this point, there are no certificates in the controller. After the get operation of obtaining the CA certificates, are installed on the controller. The same CA certificates are also pushed to the APs when the APs are provisioned with LSCs. Note We recommend that you use a new RSA keypair name for the newly configured PKI certificate. If you want to reuse an existing RSA keypair name (that is associated with an old certificate) for a new PKI certificate, do either of the following: · Do not regenerate a new RSA keypair with an existing RSA keypair name, reuse the existing RSA keypair name. Regenerating a new RSA keypair with an existing RSA keypair name will make all the certificates associated with the existing RSA keypair invalid. · Manually remove the old PKI certificate configurations first, before reusing the existing RSA keypair name for the new PKI certificate. Device Certificate Enrollment Operation For both the LAP and the controller that request a CA-signed certificate, the certRequest is sent as a PKCS#10 message. The certRequest contains the Subject Name, Public Key, and other attributes to be included in the X.509 certificate, and must be digitally signed by the Private Key of the requester. These are then sent to the CA, which transforms the certRequest into an X.509 certificate. The CA that receives a PKCS#10 certRequest requires additional information to authenticate the requester's identity and verify if the request is unaltered. (Sometimes, PKCS#10 is combined with other approaches, such as PKCS#7 to send and receive the certificate request or response.) The PKCS#10 is wrapped in a PKCS#7 Signed Data message type. This is supported as part of the SCEP client functionality, while the PKCSReq message is sent to the controller. Upon successful enrollment operation, both the CA and device certificates are available on the controller. Certificate Provisioning on Lightweight Access Point In order to provision a new certificate on LAP, while in CAPWAP mode, the LAP must be able to get the new signed X.509 certificate. In order to do this, it sends a certRequest to the controller, which acts as a CA proxy and helps obtain the certRequest signed by the CA for the LAP. The certReq and the certResponses are sent to the LAP with the LWAPP payloads. Both the LSC CA and the LAP device certificates are installed in the LAP, and the system reboots automatically. The next time when the system comes up, because it is configured to use LSCs, the AP sends the LSC device certificate to the controller as part of the JOIN Request. As part of the JOIN Response, the controller sends the new device certificate and also validates the inbound LAP certificate with the new CA root certificate. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1274 Security Restrictions for Locally Significant Certificates What to Do Next To configure, authorize, and manage certificate enrollment with the existing PKI infrastructure for controller and AP, you need to use the LSC provisioning functionality. Restrictions for Locally Significant Certificates · LSC workflow is different in FIPS+WLANCC mode. CA server must support Enrollment over Secure Transport (EST) protocol and should be capable of issuing EC certificates in FIPS+WLANCC mode. · Elliptic Curve Digital Signature Algorithm (ECDSA) cipher works only if both AP and controller are having EC certificates, provisioned with LSC. · EC certificates (LSC-EC) can be provisioned only if CA server supports EST (and not SCEP). · FIPS + CC security modes is required to be configured in order to provision EC certificate. Provisioning Locally Significant Certificates Configuring RSA Key for PKI Trustpoint Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 crypto key generate rsa [exportable] Configures RSA key for PKI trustpoint. general-keys modulus key_size label RSA_key exportable is an optional keyword. You may Example: or may not want to configure an exportable-key. Device(config)# crypto key generate rsa If selected, you can export the key out of the exportable box, if required general-keys modulus 2048 label lsc-tp · key_size: Size of the key modulus. The valid range is from 2048 to 4096. · RSA_key: RSA key pair label. Step 3 end Example: Device(config)# end Returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1275 Configuring PKI Trustpoint Parameters Security Configuring PKI Trustpoint Parameters Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 crypto pki trustpoint trustpoint_name Example: Device(config)# crypto pki trustpoint microsoft-ca Creates a new trustpoint for an external CA server. Here, trustpoint_name refers to the trustpoint name. Step 3 enrollment url HTTP_URL Specifies the URL of the CA on which your Example: router should send certificate requests. Device(ca-trustpoint)# enrollment url url url: URL of the file system where your http://CA_server/certsrv/mscep/mscep.dll router should send certificate requests. An IPv6 address can be added in the URL enclosed in brackets. For example: http:// [2001:DB8:1:1::1]:80. For more enrollment method options, see the enrollment url (ca-trustpoint) command page. Step 4 subject-name subject_name Example: Creates subject name parameters for the trustpoint. Device(ca-trustpoint)# subject-name C=IN, ST=KA, L=Bengaluru, O=Cisco, CN=eagle-eye/emailAddress=support@abc.com Step 5 rsakeypair RSA_key key_size Example: Device(ca-trustpoint)# rsakeypair ewlc-tp1 Maps RSA key with that of the trustpoint. · RSA_key: RSA key pair label. · key_size: Signature key length. Range is from 360 to 4096. Step 6 Step 7 revocation {crl | none | ocsp} Checks revocation. Example: Device(ca-trustpoint)# revocation none end Example: Device(ca-trustpoint)# end Returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1276 Security Authenticating and Enrolling a PKI Trustpoint (GUI) Authenticating and Enrolling a PKI Trustpoint (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Security > PKI Management. In the PKI Management window, click the Trustpoints tab. In the Add Trustpoint dialog box, provide the following information: a) In the Label field, enter the RSA key label. b) In the Enrollment URL field, enter the enrollment URL. c) Check the Authenticate check box to authenticate the Public Certificate from the enrollment URL. d) In the Subject Name section, enter the Country Code, State, Location, Organisation, Domain Name, and Email Address. e) Check the Key Generated check box to view the available RSA keypairs. Choose an option from the Available RSA Keypairs drop-down list. f) Check the Enroll Trustpoint check box. g) In the Password field, enter the password. h) In the Re-Enter Password field, confirm the password. i) Click Apply to Device. The new trustpoint is added to the trustpoint name list. Authenticating and Enrolling the PKI Trustpoint with CA Server (CLI) Procedure Step 1 Step 2 Step 3 Step 4 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. crypto pki authenticate trustpoint_name Fetches the CA certificate. Example: Device(config)# crypto pki authenticate microsoft-ca yes Example: Device(config)# % Do you accept this certificate? [yes/no]: yes Trustpoint CA certificate accepted. crypto pki enroll trustpoint_name Example: Enrolls the client certificate. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1277 Authenticating and Enrolling the PKI Trustpoint with CA Server (CLI) Security Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action Purpose Device(config)# crypto pki enroll microsoft-ca % % Start certificate enrollment .. % Create a challenge password. You will need to verbally provide this password to the CA Administrator in order to revoke your certificate. For security reasons your password will not be saved in the configuration. Please make a note of it. password Example: Device(config)# abcd123 Enters a challenge password to the CA server. password Example: Device(config)# abcd123 Re-enters a challenge password to the CA server. yes Example: Device(config)# % Include the router serial number in the subject name? [yes/no]: yes no Example: Device(config)# % Include an IP address in the subject name? [no]: no yes Example: Device(config)# Request certificate from CA? [yes/no]: yes % Certificate request sent to Certificate Authority % The 'show crypto pki certificate verbose client' command will show the fingerprint. end Example: Device(config)# end Returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1278 Security Configuring AP Join Attempts with LSC Certificate (GUI) Configuring AP Join Attempts with LSC Certificate (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Wireless > Access Points. In the All Access Points window, click the LSC Provision name. From the Status drop-down list, choose a status to enable LSC. From the Trustpoint Name drop-down list, choose the trustpoint. In the Number of Join Attempts field, enter the number of retry attempts that will be permitted. Click Apply. Configuring AP Join Attempts with LSC Certificate (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap lsc-provision join-attempt number_of_attempts Example: Device(config)# ap lsc-provision join-attempt 10 Step 3 end Example: Device(config)# end Purpose Enters global configuration mode. Specifies the maximum number of AP join failure attempts with the newly provisioned LSC certificate. When the number of AP joins exceed the specified limit, AP joins back with the Manufacturer Installed Certificate (MIC). Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Subject-Name Parameters in LSC Certificate Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1279 Configuring Key Size for LSC Certificate Security Step 2 Step 3 Command or Action Purpose ap lsc-provision subject-name-parameter Specifies the attributes to be included in the country country-str state state-str city city-str subject-name parameter of the certificate request domain domain-str org org-str email-address generated by an AP. email-addr-str Example: Device(config)# ap lsc-provision subject-name-parameter country India state Karnataka city Bangalore domain domain1 org Right email-address adc@gfe.com end Example: Device(config)# end Returns to privileged EXEC mode. Configuring Key Size for LSC Certificate Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap lsc-provision key-size{ 2048 | 3072 | 4096}} Specifies the size of keys to be generated for Example: the LSC on AP. Device(config)# ap lsc-provision key-size 2048 Step 3 end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Trustpoint for LSC Provisioning on an Access Point Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1280 Security Configuring an AP LSC Provision List (GUI) Step 2 Step 3 Command or Action ap lsc-provision trustpoint tp-name Example: Device(config)# ap lsc-provision trustpoint microsoft-ca end Example: Device(config)# end Purpose Specifies the trustpoint with which the LCS is provisioned to an AP. tp-name: The trustpoint name. Returns to privileged EXEC mode. Configuring an AP LSC Provision List (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Choose Configuration > Wireless > Access Points. In the All Access Points window, click the corresponding LSC Provision name. From the Status drop-down list, choose a status to enable LSC. From the Trustpoint Name drop-down list, choose a trustpoint. In the Number of Join Attempts field, enter the number of retry attempts that are allowed. From the Key Size drop-down list, choose a key. In the Edit AP Join Profile window, click the CAPWAP tab. In the Add APs to LSC Provision List section, click Select File to upload the CSV file that contains AP details. Click Upload File. In the AP MAC Address field, enter the AP MAC address. and add them. (The APs added to the provision list are displayed in the APs in provision List .) In the Subject Name Parameters section, enter the following details: · Country · State · City · Organisation · Department · Email Address Click Apply. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1281 Configuring an AP LSC Provision List (CLI) Security Configuring an AP LSC Provision List (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap lsc-provision mac-address mac-addr Example: Device(config)# ap lsc-provision mac-address 001b.3400.02f0 Step 3 end Example: Device(config)# end Purpose Enters global configuration mode. Adds the AP to the LSC provision list. Note You can provision a list of APs using the ap lsc-provision provision-list command. (Or) You can provision all the APs using the ap lsc-provision command. Returns to privileged EXEC mode. Configuring LSC Provisioning for all the APs (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Configuration > Wireless > Access Points. In the Access Points window, expand the LSC Provision section. Set Status to Enabled state. Note If you set Status to Provision List, LSC provisioning will be configured only for APs that are a part of the provision list. From the Trustpoint Name drop-down list, choose the appropriate trustpoint for all APs. In the Number of Join Attempts field, enter the number of retry attempts that the APs can make to join the controller. From the Key Size drop-down list, choose the appropriate key size of the certificate: · 2048 · 3072 · 4096 In the Add APs to LSC Provision List section, click Select File to upload the CSV file that contains the AP details. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1282 Security Configuring LSC Provisioning for All APs (CLI) Step 8 Step 9 Step 10 Step 11 Click Upload File. In the AP MAC Address field, enter the AP MAC address. (The APs that are added to the provision list are displayed in the APs in Provision List section.) In the Subject Name Parameters section, enter the following details: a. Country b. State c. City d. Organization e. Department f. Email Address Click Apply. Configuring LSC Provisioning for All APs (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap lsc-provision Example: Device(config)# ap lsc-provision Step 3 end Example: Device(config)# end Purpose Enters global configuration mode. Enables LSC provisioning for all APs. By default, LSC provisioning is disabled for all APs. Returns to privileged EXEC mode. Configuring LSC Provisioning for the APs in the Provision List Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1283 Importing a CA Certificate to the Trustpool (GUI) Security Step 2 Step 3 Command or Action ap lsc-provision provision-list Example: Device(config)# ap lsc-provision provision-list end Example: Device(config)# end Purpose Enables LSC provisioning for a set of APs configured in the provision list. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Importing a CA Certificate to the Trustpool (GUI) PKI Trustpool Management is used to store a list of trusted certificates (either downloaded or built in) used by the different services on the controller. This is also used to authenticate a multilevel CA certificate. The built in CA certificate bundle in the PKI trustpool receives automatic updates from Cisco if they are not current, are corrupt, or if certain certificates need to be updated. Perform this task to manually update the CA certificates in the PKI trustpool. Note If your LSC has been issued by an intermediate CA, you must import the complete chain of CA certificates into the trustpool. Otherwise, you will not be able to provision the APs without the complete chain being present on the controller. The import step is not required if the certificate has been issued by a root CA. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Security > PKI Management. In the PKI Management window, click the Trustpool tab. Click Import. In the CA Certificate field, copy and paste the CA certificate. Link together the multiple CA certificates in .pem format. Click Apply to Device. Importing a CA Certificate to the Trustpool (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1284 Security Cleaning the CA Certificates Imported in Trustpool (GUI) Step 2 Step 3 Command or Action Purpose crypto pki trust pool import terminal Example: Device(config)# crypto pki trust pool import terminal % Enter PEM-formatted CA certificate. % End with a blank line or "quit" on a line by itself. -----BEGIN CERTIFICATE---------END CERTIFICATE---------BEGIN CERTIFICATE---------END CERTIFICATE---------BEGIN CERTIFICATE---------END CERTIFICATE----Aug 23 02:47:33.450: %PKI-6-TRUSTPOOL_DOWNLOAD_SUCCESS: Trustpool Download is successful Imports the root certificate. For this, you need to paste the CA certificate from the digicert.com. end Example: Device(config)# end Returns to privileged EXEC mode. Cleaning the CA Certificates Imported in Trustpool (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Security > PKI Management. In the PKI Management window, click the Trustpool tab. Click Clean. Note This erases the downloaded CA certificate bundles. However, it does not erase the built-in CA certificate bundles. Click Yes. Cleaning CA Certificates Imported in Trustpool (CLI) You cannot delete a specific CA certificate from the trustpool. However, you can clear all the CA certificates that are imported to the Trustpool. Procedure Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1285 Creating a New Trustpoint Dedicated to a Single CA Certificate Security Step 2 Step 3 Command or Action Device# configure terminal crypto pki trustpool clean Example: Device(config)# crypto pki trustpool clean end Example: Device(config)# end Purpose Erases the downloaded CA certificate bundles. However, it does not erase the built-in CA certificate bundles. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Creating a New Trustpoint Dedicated to a Single CA Certificate Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 crypto pki trustpoint tp-name Example: Device(config)# crypto pki trustpoint tp_name Creates a trustpoint. Step 3 enrollment terminal Example: Device(ca-trustpoint)# enrollment terminal Creates an enrollment terminal for the trustpoint. Step 4 exit Example: Device(ca-trustpoint)# exit Exits from the truspoint configuration. Step 5 crypto pki authenticate tp-name Authenticates the trustpoint. Example: Device(config)# crypto pki authenticate tp_name <<< PASTE CA-CERT in PEM format followed by quit >>> Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1286 Security Verifying LSC Configuration Verifying LSC Configuration To view the details of the wireless management trustpoint, use the following command: Device# show wireless management trustpoint Trustpoint Name : microsoft-ca Certificate Info : Available Certificate Type : LSC Certificate Hash : 9e5623adba5307facf778e6ea2f5082877ea4beb Private key Info : Available To view the LSC provision-related configuration details for an AP, use the following command: Device# show ap lsc-provision summary AP LSC-provisioning : Disabled Trustpoint used for LSC-provisioning : lsc-root-tp Certificate chain status : Available Number of certs on chain : 2 Certificate hash : 7f9d05183deecac4e5a79db65d538245685e8e30 LSC Revert Count in AP reboots : 1 AP LSC Parameters : Country : IN State : KA City : BLR Orgn : ABC Dept : ABC Email : support@abc.com Key Size : 2048 EC Key Size : 384 bit AP LSC-provision List : Total number of APs in provision list: 2 Mac Addresses : -------------1880.90f5.1540 2c5a.0f70.84dc Configuring Management Trustpoint to LSC (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Administration > Management > HTTP/HTTPS. In the HTTP Trust Point Configuration section, set Enable Trust Point to the Enabled state. From the Trust Points drop-down list, choose the appropriate trustpoint. Save the configuration. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1287 Configuring Management Trustpoint to LSC (CLI) Security Configuring Management Trustpoint to LSC (CLI) After LSC provisioning, the APs will automatically reboot and join at the LSC mode after bootup. Similarly, if you remove the AP LSC provisioning, the APs reboot and join at non-LSC mode. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless management trustpoint trustpoint_name Example: Device(config)# wireless management trustpoint microsoft-ca Step 3 end Example: Device(config)# end Purpose Enters global configuration mode. Configures the management trustpoint to LSC. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Information About MIC and LSC Access Points Joining the Controller Overview of Support for MIC and LSC Access Points Joining the Controller In Cisco IOS XE Bengaluru 17.4.1 and earlier releases, APs with a default certificate (Manufacturing Installed Certificates [MIC]) or Secure Unique Device Identifier [SUDI]) fail to join a Locally Significant Certificate-deployed (LSC-deployed) controller, where the management certificate of the controller is an LSC. To resolve this issue, you must provision LSC on these APs using the provisioning controller before moving them to the LSC-deployed controller. From Cisco IOS XE Bengaluru 17.5.1 onwards, the new authorization policy configuration allows MIC APs to join the LSC-deployed controller, so that the LSC and MIC APs can coexist in the controller at the same time. Recommendations and Limitations · When the CA server is configured with manual enrollment (manual intervention) to accept Certificate Signing Request (CSR), the controller waits for the CA server to send the pending response. If there is no response from the CA server for 10 minutes, the fallback mode comes into effect. · Cisco Wave 2 APs regenerate CSR, and a fresh CSR is sent to the CA server. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1288 Security Configuration Workflow · Cisco IOS APs restart, and then Cisco IOS APs send a fresh CSR, which is in turn sent to the CA server. · Locally significant certificate (LSC) on the controller does not work on the password challenge. Therefore, for LSC to work, you must disable password challenge on the CA server. · If you are using Microsoft CA, we recommend that you use Windows Server 2012 or later as the CA server. Configuration Workflow 1. Configuring LSC on the Controller (CLI), on page 1289 2. Enabling the AP Certificate Policy on the APs (CLI), on page 1290 3. Configuring the AP Policy Certificate (GUI), on page 1291 4. Configuring the Allowed List of APs to Join the Controller (CLI), on page 1291 Configuring LSC on the Controller (CLI) The server certificate used by the controller for CAPWAP-DTLS is based on the following configuration. Before you begin · Ensure that you enable LSC by setting the appropriate trustpoints for the following wireless management services: · AP join process: CAPWAP DTLS server certificate · Mobility connections: Mobility DTLS certificate · NMSP and CMX connections: NMSP TLS certificate Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 [no] wireless management trustpoint trustpoint-name Example: Device(config)# wireless management trustpoint trustpoint-name Purpose Enters global configuration mode. Configures the LSC trustpoint in the LSC-deployed controller. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1289 Enabling the AP Certificate Policy on the APs (CLI) Security Enabling the AP Certificate Policy on the APs (CLI) · If the management trustpoint is an LSC, by default, MIC APs fail to join the controller. This configuration acts as an enable or disable configuration knob that allows MIC APs to join the controller. · This configuration is a controller authorization to allow APs to join MIC at the time of DTLS handshake. To prevent manufacturing installed certificate (MIC) expiry failures, ensure that you configure a policy, as shown here: · Create a certificate map and add the rules: configure terminal crypto pki certificate map map1 1 issuer-name co Cisco Manufacturing CA Note You can add multiple rules and filters under the same map. The rule mentioned in the example above specifies that any certificate whose issuer-name contains Cisco Manufacturing CA (case insensitive) is selected under this map. · Use the certificate map under the trustpool policy: configure terminal crypto pki trustpool policy match certificate map1 allow expired-certificate Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap auth-list ap-cert-policy allow-mic-ap trustpoint trustpoint-name Configures the trustpoint name for the controller certificate chain. Example: Note Device(config)# ap auth-list ap-cert-policy allow-mic-ap trustpoint trustpoint-name The allow-mic-ap trustpoint command is required only for the virtual controller (Cisco Catalyst 9800-CL Wireless Controller for Cloud). In all the other appliance controller platforms, the default certificate is selected. This default certificate is manufacturer-installed SUDI. Step 3 ap auth-list ap-cert-policy allow-mic-ap Example: Device(config)# ap auth-list ap-cert-policy allow-mic-ap Enables the AP certificate policy during CAPWAP-DTLS handshake. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1290 Security Configuring the AP Policy Certificate (GUI) Step 4 Command or Action Purpose ap auth-list ap-cert-policy {mac-address H.H.H | serial-number serial-number-ap} policy-type mic Enables the AP certificate policy as MIC. Example: Device(config)# ap auth-list ap-cert-policy mac-address 1111.1111.1111 policy-type mic Configuring the AP Policy Certificate (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Wireless > Access Points In the All Access Points window, click AP Certificate Policy . In the AP Policy Certificate window, complete the following actions: a) Click the Authorize APs joining with MIC toggle button to enable AP authorization. b) From the Trustpoint Name drop-down list, choose the required trustpoint. c) Click Add MAC or Serial Number to add a MAC address or a serial number manually or through a .csv file. The Add MAC or Serial Number window is displayed. d) Click the AP Authlist Type and enter the MAC address or the serial number. Upload the .csv file or enter the MAC address in the list box. The newly added MAC address and serial numbers are displayed under List of MAC Address and Serial Numbers. e) Click Apply. The AP certificate policy is added to the AP Inventory window. Note To add a new AP with MIC, perform Step 1 to Step 3 described in Configuring the AP Policy Certificate (GUI) section. To add a new AP with LSC, perform the procedure described in the Configuring AP LSC Provision List (GUI) and Step 1 to Step 3 in the Configuring the AP Policy Certificate (GUI) section. Configuring the Allowed List of APs to Join the Controller (CLI) The allowed list of APs can either be populated based on the Ethernet MAC address or based on the serial number of the APs. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1291 Verifying the Configuration Status Security Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap auth-list ap-cert-policy {mac-address Configures the AP certificate policy based on AP-Ethernet-MAC-address | serial-number the Ethernet MAC address or based on the AP-serial-number}policy-type mic assembly serial number of the AP. Example: Device# ap auth-list ap-cert-policy mac-address 00b0.e192.0d98 policy-type mic Verifying the Configuration Status To verify if the APs have been authorized by the AP certificate policy, use the following command: Device# show ap auth-list ap-cert-policy Authorize APs joining with MIC : ENABLED MIC AP policy trustpoint Name : CISCO_IDEVID_SUDI Certificate status : Available Certificate Type : MIC Certificate Hash : xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx To verify the AP certificate policy on the MAC address and the serial number of the AP, use the following commands: Device# show ap auth-list ap-cert-policy mac-address MAC address AP cert policy --------------------------------- 1111.2222.3333 MIC Device# show ap auth-list ap-cert-policy serial-number Serial number AP cert policy -------------------------------- F1234567890 MIC Note If you set an invalid trustpoint (not SSC), the allow-mic-ap policy is not enabled. If you set an invalid trustpoint, the following error is displayed on the console: Device(config)# ap auth-list ap-cert-policy allow-mic-ap trustpoint lsc-root-tp Dec 18 07:38:29.944: %CERT_MGR_ERRMSG-3-CERT_MGR_GENERAL_ERR: Chassis 1 R0/0: wncd: General error: MIC AP Policy trustpoint: 'lsc-root-tp' cert-chain type is LSC, It must be either MIC or vWLC-SSC Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1292 Security LSC Fallback Access Points LSC Fallback Access Points Information About LSC Fallback APs When an AP is configured with LSC for CAPWAP but fails to establish DTLS connection, the AP reboots and retries for certain number of times. For information on how an AP configures with LSC, see Configuring AP Join Attempts with LSC Certificate (CLI), on page 1279. The AP falls back to its default certificate (MIC) for CAPWAP after maximum number of failures. This state is referred to as the LSC fallback. Note MIC is also known as SUDI certificate. Troubleshooting LSC Fallback State When an AP in LSC fallback state joins the controller, the following syslog is generated: Jun 15 23:24:14.836: %APMGR_TRACE_MESSAGE-3-WLC_GEN_ERR: Chassis 1 R0/0: wncd: Error in AP: 'AP2c5a.0f70.84dc' with address 70db.9888.cc20 is joined with MIC, while configuration requires LSC. No WLANs will be pushed. The controller allows such an AP to be joined with MIC (when AP certificate policy allows it) and AP is held in misconfigured state. Note The AP does not broadcast WLAN or SSID configurations in such state. This permits the admin to examine the reason for previous failures and recover APs. You can identify the LSC fallback APs using show wireless summary as follows: Device# show wireless summary ... Access Point Summary ... DTLS LSC fallback APs 20 (No WLANs will be pushed to these APs) ... For more information on DTLS LSC fallback APs, execute 'wireless config validate' and look for reported errors in 'show wireless config validation status' CLI output. Use 'show ap config general | inc AP Name | LSC fallback' to list DTLS LSC fallback APs. Examine LSC fallback reasons / DTLS handshake failures with LSC then issue 'ap lsc dtls-fallback clear-certificate / clear-flag' to recover APs Recovery Steps · Use the ap lsc dtls-fallback clear-flag to clear the LSC fallback flag on AP and instruct AP to reload. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1293 Configuring Controller Self-Signed Certificate for Wireless AP Join Security Note The AP reuses the LSC for CAPWAP DTLS connection post the reload. · Use the ap lsc dtls-fallback clear-certificate to clear LSC and instruct AP to reload. Note The AP uses MIC for CAPWAP-DTLS post the reload. If LSC is used for Dot1x port authentication then further recovery is needed on switch port for AP authentication. Note · The ap lsc dtls-fallback clear-flag command is sufficient to retain LSC on AP. Both ap lsc dtls-fallback clear-flag and ap lsc dtls-fallback clear-certificate commands are not required at the same time. · APs must be in connected state when issuing the recovery command. You will need to reissue the command, if any LSC fallback AP joins afterwards. Configuring Controller Self-Signed Certificate for Wireless AP Join Use Cases Use Case-1 Cisco Catalyst 9800-CL platform does not contain manufacturer installed SUDI certificates. You will need to configure Self-Signed Certificates on your controller. Use Case-2 APs running on earlier versions and having Manufacturer Installed Certificate (MIC) issued by a SHA1 Cisco Trusted CA cannot join the controller with SHA2 SUDI certificate. During CAPWAP join process, the AP displays a bad certificate error and tears down the DTLS handshake. Workaround: To upgrade APs, configure controller Self-Signed certificates. Once done, you can delete the Self-Signed certificates and revert back to the SUDI certificate. Note This workaround does not apply to the Embedded Wireless Controller running Catalyst 9k switches. But applies to other hardware appliance controllers, such as Cisco Catalyst 9800-40, Cisco Catalyst 9800-80, and Cisco Catalyst 9800-L. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1294 Security Prerequisites Note Certificate used in DTLS connections (AP and mobility) must use RSA key of size equal or more than 2048 bits. Otherwise, the APs and mobility connections will fail after reload. Run the show crypto pki certificate verbose _tp-name_ command to display the key size of the device certificate. Prerequisites · Ensure that the VLAN interface is up and it's IP is reachable. · Ensure that the ip http server is enabled. For more information, see Enabling HTTP Server (CLI). · Set the clock calendar-valid command appropriately. For more information, see Configuring Clock Calendar (CLI), on page 1295. · Check if the PKI CA server is already configured or not. If configured, you will need to delete the existing CA server configuration. Note The show crypto pki server command output should not display anything. Configuring Clock Calendar (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 clock calendar-valid Example: Device(config)# clock calendar-valid Step 3 exit Example: Device(config)# exit Purpose Enters global configuration mode. Enables clock calendar. Exits configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1295 Enabling HTTP Server (CLI) Security Enabling HTTP Server (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ip http server Example: Device(config)# ip http server Enables the HTTP server on your IP or IPv6 system, including a Cisco web browser user interface. By default, the HTTP server uses the standard port 80. Step 3 ip http secure-server Example: Device(config)# ip http secure-server Enables the HTTP server on your IP or IPv6 system, including a Cisco web browser user interface. By default, the HTTP server uses the standard port 80. Step 4 exit Example: Device(config)# exit Exits configuration mode. Configuring CA Server (CLI) Procedure Step 1 Step 2 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. crypto key generate rsa general-keys Configures a certificate for the controller. modulus size_of_key_module label keypair_name When you generate RSA keys, you are prompted to enter a modulus length. A longer Example: modulus length might be more secure, but it Device(config)# crypto key generate rsa takes longer to generate and to use. general-keys modulus 2048 label WLC_CA Note The recommended key-pair name is WLC_CA and key modulus is 2048 bits. Step 3 crypto pki server certificate_server_name Enables IOS certificate server. Example: Note Device(config)# crypto pki server WLC_CA The certificate_server_name must be the same name as the keypair_name. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1296 Security Configuring CA Server (CLI) Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action issuer-name Example: Device(config)# issuer-name O=Cisco Virtual Wireless LAN Controller, CN=CA-vWLC Purpose Configures X.509 distinguished name for the issuer CA certificate. Note You need to configure the same issuer-name as suggested for AP join. grant auto Example: Device(config)# grant auto Grants certificate requests automatically. hash sha256 Example: Device(config)# hash sha256 (Optional) Specifies the hash function for the signature used in the granted certificates. lifetime ca-certificate time-interval Example: (Optional) Specifies the lifetime in days of a CA certificate. Device(config)# lifetime ca-certificate 3650 lifetime certificate time-interval Example: Device(config)# lifetime certificate 3650 (Optional) Specifies the lifetime in days of a granted certificate. database archive pkcs12 password password Sets the CA key and CA certificate archive Example: format and password to encrypt the file. Device(config)# database archive pkcs12 password 0 cisco123 no shutdown Example: Device(config)# no shutdown Enables the certificate server. Note Issue this command only after you have completely configured your certificate server. end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1297 Configuring Trustpoint (CLI) Security Configuring Trustpoint (CLI) Procedure Step 1 Step 2 Step 3 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. crypto key generate rsa exportable general-keys modulus size-of-the-key-modulus label label Example: When you generate RSA keys, you are prompted to enter a modulus length. A longer modulus length might be more secure, but it takes longer to generate and to use. Device(config)# crypto key generate rsa exportable general-keys modulus 2048 label ewlc-tp1 crypto pki trustpoint trustpoint_name Example: Device(config)# crypto pki trustpoint ewlc-tp1 Creates a new trust point for an external CA server. Here, trustpoint_name refers to the trustpoint name. Note Ensure that same names are used for key-pair (label) and trustpoint_name. Step 4 rsakeypair RSA_key key_size Example: Device(ca-trustpoint)# rsakeypair ewlc-tp1 Maps RSA key with that of the trustpoint. · RSA_key--Refers to the RSA key pair label. · key_size--Refers to the signature key length. The value ranges from 360 to 4096. Step 5 Step 6 Step 7 subject-name subject_name Example: Creates subject name parameters for the trustpoint. Device(ca-trustpoint)# subject-name O=Cisco Virtual Wireless LAN Controller, CN=DEVICE-vWLC revocation-check none Checks revocation. Example: Device(ca-trustpoint)# revocation-check none hash sha256 Example: Device(ca-trustpoint)# hash sha256 Specifies the hash algorithm. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1298 Security Authenticating and Enrolling the PKI TrustPoint with CA Server (CLI) Step 8 Step 9 Step 10 Step 11 Step 12 Command or Action serial-number Example: Device(ca-trustpoint)# serial-number Purpose Specifies the serial number. eku request server-auth client-auth Example: Device(ca-trustpoint)# eku request server-auth client-auth (Optional) Sets certificate key-usage purpose. password password Example: Device(config)# password 0 cisco123 Enables password. enrollment url url Example: Device(config)# enrollment url http://<management-IPv4>:80 Enrolls the URL. Note Replace the dummy IP with management VLAN interface IP of the controller where CA server is configured. exit Example: Device(config)# exit Exits the configuration. Authenticating and Enrolling the PKI TrustPoint with CA Server (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 crypto pki authenticate trustpoint_name Fetches the CA certificate. Example: Device(config)# crypto pki authenticate ewlc-tp1 Certificate has the following attributes: Fingerprint MD5: 64C5FC9A C581D827 C25FC3CF 1A7F42AC Fingerprint SHA1: 6FAFF812 7C552783 6A8FB566 52D95849 CC2FC050 % Do you accept this certificate? [yes/no]: yes Trustpoint CA certificate accepted. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1299 Tagging Wireless Management TrustPoint Name (CLI) Security Step 3 Step 4 Command or Action Purpose crypto pki enroll trustpoint_name Enrolls for client certificate. Example: Device(config)# crypto pki enroll ewlc-tp1 Enter following answers for UI interaction: % Include an IP address in the subject name? [no]: no Request certificate from CA? [yes/no]: yes end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Tagging Wireless Management TrustPoint Name (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless management trustpoint trustpoint_name Example: Device(config)# wireless management trustpoint ewlc-tp1 Step 3 end Example: Device(config)# end Purpose Enters global configuration mode. Tags the wireless management trustpoint name. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Verifying Controller Certificates for Wireless AP Join To view the CA server details, use the following command: Device# show crypto pki server Certificate Server WLC_CA: Status: enabled State: enabled Server's configuration is locked (enter "shut" to unlock it) Issuer name: O=Cisco Virtual Wireless LAN Controller, CN=CA-vWLC CA cert fingerprint: 79A3DBD5 59A7E384 73ABD152 C133F4E2 Granting mode is: auto Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1300 Security Verifying Controller Certificates for Wireless AP Join Last certificate issued serial number (hex): 1 CA certificate expiration timer: 12:04:00 UTC Mar 8 2029 CRL NextUpdate timer: 18:04:00 UTC Mar 11 2019 Current primary storage dir: nvram: Database Level: Minimum - no cert data written to storage To view the trustpoint details, use the following command: Device# show crypto pki trustpoint ewlc-tp1 status Trustpoint ewlc-tp1: ... State: Keys generated ............. Yes (General Purpose, exportable) Issuing CA authenticated ....... Yes Certificate request(s) ..... Yes To view the wireless management trustpoint details, use the following command: Device# do show wireless management trustpoint Trustpoint Name : ewlc-tp1 Certificate Info : Available Certificate Type : SSC Certificate Hash : 4a5d777c5b2071c17faef376febc08398702184e Private key Info : Available FIPS suitability : Not Applicable To view the HTTP server status, use the following command: Device# show ip http server status | include server status HTTP server status: Enabled HTTP secure server status: Enabled Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1301 Verifying Controller Certificates for Wireless AP Join Security Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1302 1 1 9 C H A P T E R Certificate Management · About Public Key Infrastructure Management (GUI), on page 1303 · Authenticating and Enrolling a PKI Trustpoint (GUI), on page 1303 · Adding the Certificate Authority Server (GUI), on page 1304 · Adding an RSA or EC Key for PKI Trustpoint (GUI), on page 1305 · Adding and Managing Certificates , on page 1305 About Public Key Infrastructure Management (GUI) The Public Key Infrastructure (PKI) Management page displays the following tabs: Trustpoints tab: Used to add, create or enroll a new trustpoint. This page also displays the current trustpoints configured on the controller and other details of the trustpoint. You can also view if the trustpoint is in use for any of the features. For example, Webadmin or AP join (Wireless Management Interface ), and others. CA Server tab: Used to enable or disable the Certificate Authority (CA) server functionality on the controller. The CA server functionality should be enabled for the controller to generate a Self Signed Certificate (SSC). Key Pair Generation tab: Used to generate key pairs. Certificate Management tab: Used to generate and manage certificates, and perform all certificate related operations, on the controller. Authenticating and Enrolling a PKI Trustpoint (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Security > PKI Management. In the PKI Management window, click the Trustpoints tab. In the Add Trustpoint dialog box, provide the following information: a) In the Label field, enter the RSA key label. b) In the Enrollment URL field, enter the enrollment URL. c) Check the Authenticate check box to authenticate the Public Certificate from the enrollment URL. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1303 Generating an AP Self-Signed Certificate (GUI) Security d) In the Subject Name section, enter the Country Code, State, Location, Organisation, Domain Name, and Email Address. e) Check the Key Generated check box to view the available RSA keypairs. Choose an option from the Available RSA Keypairs drop-down list. f) Check the Enroll Trustpoint check box. g) In the Password field, enter the password. h) In the Re-Enter Password field, confirm the password. i) Click Apply to Device. The new trustpoint is added to the trustpoint name list. Generating an AP Self-Signed Certificate (GUI) Note This section is valid only for virtual controllers (Cisco Catalyst 9800-CL Wireless Controller for Cloud) and not applicable for appliance based controllers (Cisco Catalyst 9800-40 Wireless Controller, Cisco Catalyst 9800-80 Wireless Controller, Cisco Catalyst 9800-L Wireless Controller (Copper Uplink), and Cisco Catalyst 9800-L Wireless Controller (Fiber Uplink)). Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Configuration > Security > PKI Management. In the AP SSC Trustpoint area, click Generate to generate an AP SSC trustpoint. From the RSA Key-Size drop-down list, choose a key size. From the Signature Algorithm drop-down list, choose an option. From the Password Type drop-down list, choose a password type. In the Password field, enter a password. The valid range is between 8 and 32 characters. Click Apply to Device. Adding the Certificate Authority Server (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Security > PKI Management. In the PKI Management window, click the CA Server tab. In the CA Server section, click the Shutdown Status toggle button, to enable the status. If you choose the shutdown status as Enabled, you must enter the password and confirm the same. If you choose the shutdown status as Disabled, you must enter the Country Code, State, Location, Organisation, Domain Name, and Email Address. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1304 Security Adding an RSA or EC Key for PKI Trustpoint (GUI) Step 5 Step 6 Click Apply to add the CA server. Click Remove CA Server to delete the CA server. Adding an RSA or EC Key for PKI Trustpoint (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Security > PKI Management. In the PKI Management window, click the Key Pair Generation tab. In the Key Pair Generation section, click Add. In the dialog box that is displayed, provide the following information: a) In the Key Name field, enter the key name. b) In the Key Type options, select either RSA Key or EC Key. c) In the Modulus Size field, enter the modulus value for the RSA key or the EC key. The default modulus size for the RSA key is 4096 and the default value for the EC key is 521. d) Check the Key Exportable check box to export the key. By default, this is checked. e) Click Generate. Adding and Managing Certificates To add and manage certificates, use one of the following methods: Note While configuring a password for the .pfx file, do not use the following ASCII characters: "*, ^, (), [], \, ", and +" Using these ASCII characters results in error with bad configuration and does not import the certificate to the controller. Method 1 Procedure Step 1 Step 2 Choose Configuration > Security > PKI Management > Add Certificate. Click Generate Certificate Signing Request. a) In the Certificate Name field, enter the certificate name. b) From the Key Name drop-down list, choose an RSA key pair. (Click the plus (+) icon under the Key Pair Generation tab to create new RSA key pairs.). Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1305 Security Step 3 Step 4 c) Enter values the Country Code, Location, Organisation, State, Organizational Unit, and the Domain Name fields. d) Click Generate. The generated Certificate Signing Request (CSR) is displayed on the right. Click Copy to copy and save a local copy. Click Save to Device to save the generated CSR to the /bootflash/csr directory. Click Authenticate Root CA . a) From the Trustpoint drop-down list, choose the trustpoint label generated in Step 2, or any other trustpoint label that you want to authenticate. b) In the Root CA Certificate (.pem) field, copy and paste the certificate that you have received from the CA. Note Ensure that you copy and paste the PEM Base64 certificate of the issuing CA of the device certificate. c) Click Authenticate. Click Import Device Certificate . a) From the Trustpoint drop-down list, choose the trustpoint label that was generated in Step 2, or any other trustpoint label that you want to authenticate. b) In the Signed Certificate (.pem) field, copy and paste the signed certificate that you received, from your CA. c) Click Import. This completes the device certificate import process and the certificate can now be assigned to features. Method 2 Procedure Click Import PKCS12 Certificate . Note You can import an entire certificate chain in the PKCS12 format using different transport types. a) From the Transport Type drop-down list, choose either FTP, SFTP, TFTP, SCP, or Desktop (HTTPS). For FTP, SFTP, and SCP, enter values in the Server IP Address (IPv4/IPv6), Username, Password, Certificate File Path, Certificate Destination File Name, and Certificate Password fields. For TFTP, enter values in the Server IP Address (IPv4/IPv6), Certificate File Path, Certificate Destination File Name, and Certificate Password fields. For Desktop (HTTPS), enter values in the Source File Path and Certificate Password fields. b) Click Import. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1306 1 2 0 C H A P T E R Controller Self-Signed Certificate for Wireless AP Join · Use Cases, on page 1307 · Prerequisites, on page 1308 · Configuring Clock Calendar (CLI), on page 1308 · Enabling HTTP Server (CLI), on page 1309 · Configuring CA Server (CLI), on page 1309 · Configuring Trustpoint (CLI), on page 1311 · Authenticating and Enrolling the PKI TrustPoint with CA Server (CLI), on page 1312 · Tagging Wireless Management TrustPoint Name (CLI), on page 1313 · Verifying Controller Certificates for Wireless AP Join, on page 1313 Use Cases Use Case-1 Cisco Catalyst 9800-CL platform does not contain manufacturer installed SUDI certificates. You will need to configure Self-Signed Certificates on your controller. Use Case-2 APs running on earlier versions and having Manufacturer Installed Certificate (MIC) issued by a SHA1 Cisco Trusted CA cannot join the controller with SHA2 SUDI certificate. During CAPWAP join process, the AP displays a bad certificate error and tears down the DTLS handshake. Workaround: To upgrade APs, configure controller Self-Signed certificates. Once done, you can delete the Self-Signed certificates and revert back to the SUDI certificate. Note This workaround does not apply to the Embedded Wireless Controller running Catalyst 9k switches. But applies to other hardware appliance controllers, such as Cisco Catalyst 9800-40, Cisco Catalyst 9800-80, and Cisco Catalyst 9800-L. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1307 Prerequisites Security Note Certificate used in DTLS connections (AP and mobility) must use RSA key of size equal or more than 2048 bits. Otherwise, the APs and mobility connections will fail after reload. Run the show crypto pki certificate verbose _tp-name_ command to display the key size of the device certificate. Prerequisites · Ensure that the VLAN interface is up and it's IP is reachable. · Ensure that the ip http server is enabled. For more information, see Enabling HTTP Server (CLI). · Set the clock calendar-valid command appropriately. For more information, see Configuring Clock Calendar (CLI), on page 1295. · Check if the PKI CA server is already configured or not. If configured, you will need to delete the existing CA server configuration. Note The show crypto pki server command output should not display anything. Configuring Clock Calendar (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 clock calendar-valid Example: Device(config)# clock calendar-valid Step 3 exit Example: Device(config)# exit Purpose Enters global configuration mode. Enables clock calendar. Exits configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1308 Security Enabling HTTP Server (CLI) Enabling HTTP Server (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ip http server Example: Device(config)# ip http server Enables the HTTP server on your IP or IPv6 system, including a Cisco web browser user interface. By default, the HTTP server uses the standard port 80. Step 3 ip http secure-server Example: Device(config)# ip http secure-server Enables the HTTP server on your IP or IPv6 system, including a Cisco web browser user interface. By default, the HTTP server uses the standard port 80. Step 4 exit Example: Device(config)# exit Exits configuration mode. Configuring CA Server (CLI) Procedure Step 1 Step 2 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. crypto key generate rsa general-keys Configures a certificate for the controller. modulus size_of_key_module label keypair_name When you generate RSA keys, you are prompted to enter a modulus length. A longer Example: modulus length might be more secure, but it Device(config)# crypto key generate rsa takes longer to generate and to use. general-keys modulus 2048 label WLC_CA Note The recommended key-pair name is WLC_CA and key modulus is 2048 bits. Step 3 crypto pki server certificate_server_name Enables IOS certificate server. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1309 Configuring CA Server (CLI) Security Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action Purpose Example: Note Device(config)# crypto pki server WLC_CA The certificate_server_name must be the same name as the keypair_name. issuer-name Example: Device(config)# issuer-name O=Cisco Virtual Wireless LAN Controller, CN=CA-vWLC Configures X.509 distinguished name for the issuer CA certificate. Note You need to configure the same issuer-name as suggested for AP join. grant auto Example: Device(config)# grant auto Grants certificate requests automatically. hash sha256 Example: Device(config)# hash sha256 (Optional) Specifies the hash function for the signature used in the granted certificates. lifetime ca-certificate time-interval Example: (Optional) Specifies the lifetime in days of a CA certificate. Device(config)# lifetime ca-certificate 3650 lifetime certificate time-interval Example: Device(config)# lifetime certificate 3650 (Optional) Specifies the lifetime in days of a granted certificate. database archive pkcs12 password password Sets the CA key and CA certificate archive Example: format and password to encrypt the file. Device(config)# database archive pkcs12 password 0 cisco123 no shutdown Example: Device(config)# no shutdown Enables the certificate server. Note Issue this command only after you have completely configured your certificate server. end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1310 Security Configuring Trustpoint (CLI) Configuring Trustpoint (CLI) Procedure Step 1 Step 2 Step 3 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. crypto key generate rsa exportable general-keys modulus size-of-the-key-modulus label label Example: When you generate RSA keys, you are prompted to enter a modulus length. A longer modulus length might be more secure, but it takes longer to generate and to use. Device(config)# crypto key generate rsa exportable general-keys modulus 2048 label ewlc-tp1 crypto pki trustpoint trustpoint_name Example: Device(config)# crypto pki trustpoint ewlc-tp1 Creates a new trust point for an external CA server. Here, trustpoint_name refers to the trustpoint name. Note Ensure that same names are used for key-pair (label) and trustpoint_name. Step 4 rsakeypair RSA_key key_size Example: Device(ca-trustpoint)# rsakeypair ewlc-tp1 Maps RSA key with that of the trustpoint. · RSA_key--Refers to the RSA key pair label. · key_size--Refers to the signature key length. The value ranges from 360 to 4096. Step 5 Step 6 Step 7 subject-name subject_name Example: Creates subject name parameters for the trustpoint. Device(ca-trustpoint)# subject-name O=Cisco Virtual Wireless LAN Controller, CN=DEVICE-vWLC revocation-check none Checks revocation. Example: Device(ca-trustpoint)# revocation-check none hash sha256 Example: Device(ca-trustpoint)# hash sha256 Specifies the hash algorithm. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1311 Authenticating and Enrolling the PKI TrustPoint with CA Server (CLI) Security Step 8 Step 9 Step 10 Step 11 Step 12 Command or Action serial-number Example: Device(ca-trustpoint)# serial-number Purpose Specifies the serial number. eku request server-auth client-auth Example: Device(ca-trustpoint)# eku request server-auth client-auth (Optional) Sets certificate key-usage purpose. password password Example: Device(config)# password 0 cisco123 Enables password. enrollment url url Example: Device(config)# enrollment url http://<management-IPv4>:80 Enrolls the URL. Note Replace the dummy IP with management VLAN interface IP of the controller where CA server is configured. exit Example: Device(config)# exit Exits the configuration. Authenticating and Enrolling the PKI TrustPoint with CA Server (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 crypto pki authenticate trustpoint_name Fetches the CA certificate. Example: Device(config)# crypto pki authenticate ewlc-tp1 Certificate has the following attributes: Fingerprint MD5: 64C5FC9A C581D827 C25FC3CF 1A7F42AC Fingerprint SHA1: 6FAFF812 7C552783 6A8FB566 52D95849 CC2FC050 % Do you accept this certificate? Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1312 Security Tagging Wireless Management TrustPoint Name (CLI) Command or Action Purpose [yes/no]: yes Trustpoint CA certificate accepted. Step 3 Step 4 crypto pki enroll trustpoint_name Enrolls for client certificate. Example: Device(config)# crypto pki enroll ewlc-tp1 Enter following answers for UI interaction: % Include an IP address in the subject name? [no]: no Request certificate from CA? [yes/no]: yes end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Tagging Wireless Management TrustPoint Name (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless management trustpoint trustpoint_name Example: Device(config)# wireless management trustpoint ewlc-tp1 Step 3 end Example: Device(config)# end Purpose Enters global configuration mode. Tags the wireless management trustpoint name. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Verifying Controller Certificates for Wireless AP Join To view the CA server details, use the following command: Device# show crypto pki server Certificate Server WLC_CA: Status: enabled Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1313 Verifying Controller Certificates for Wireless AP Join State: enabled Server's configuration is locked (enter "shut" to unlock it) Issuer name: O=Cisco Virtual Wireless LAN Controller, CN=CA-vWLC CA cert fingerprint: 79A3DBD5 59A7E384 73ABD152 C133F4E2 Granting mode is: auto Last certificate issued serial number (hex): 1 CA certificate expiration timer: 12:04:00 UTC Mar 8 2029 CRL NextUpdate timer: 18:04:00 UTC Mar 11 2019 Current primary storage dir: nvram: Database Level: Minimum - no cert data written to storage To view the trustpoint details, use the following command: Device# show crypto pki trustpoint ewlc-tp1 status Trustpoint ewlc-tp1: ... State: Keys generated ............. Yes (General Purpose, exportable) Issuing CA authenticated ....... Yes Certificate request(s) ..... Yes To view the wireless management trustpoint details, use the following command: Device# do show wireless management trustpoint Trustpoint Name : ewlc-tp1 Certificate Info : Available Certificate Type : SSC Certificate Hash : 4a5d777c5b2071c17faef376febc08398702184e Private key Info : Available FIPS suitability : Not Applicable To view the HTTP server status, use the following command: Device# show ip http server status | include server status HTTP server status: Enabled HTTP secure server status: Enabled Security Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1314 1 2 1 C H A P T E R Managing Rogue Devices · Rogue Detection, on page 1315 · Rogue Detection Security Level, on page 1327 · Setting Rogue Detection Security-level , on page 1328 · Wireless Service Assurance Rogue Events, on page 1329 · Rogue Full Scale Quotas and Priorities, on page 1330 Rogue Detection Rogue Devices Rogue access points can disrupt wireless LAN operations by hijacking legitimate clients and using plain-text or other denial-of-service or man-in-the-middle attacks. That is, a hacker can use a rogue access point to capture sensitive information, such as usernames and passwords. The hacker can then transmit a series of Clear to Send (CTS) frames. This action mimics an access point, informing a particular client to transmit, and instructing all the other clients to wait, which results in legitimate clients being unable to access network resources. Wireless LAN service providers have a strong interest in banning rogue access points from the air space. Because rogue access points are inexpensive and readily available, employees sometimes plug unauthorized rogue access points into existing LANs and build ad hoc wireless networks without their IT department's knowledge or consent. These rogue access points can be a serious breach of network security because they can be plugged into a network port behind the corporate firewall. Because employees generally do not enable any security settings on the rogue access point, it is easy for unauthorized users to use the access point to intercept network traffic and hijack client sessions. There is an increased chance of enterprise security breach when wireless users connect to access points in the enterprise network. The following are some guidelines to manage rogue devices: · The access points are designed to serve associated clients. These access points spend relatively less time performing off-channel scanning: about 50 milliseconds on each channel. If you want to detect a large number of rogue APs and clients with high sensitivity, a monitor mode access point must be used. Alternatively, you can reduce the scan intervals from 180 seconds to a lesser value, for example, 120 or 60 seconds, ensuring that the radio goes off-channel more frequently, which improves the chances of rogue detection. However, the access point continues to spend about 50 milliseconds on each channel. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1315 Rogue Devices Security · Rogue detection is disabled by default for OfficeExtend access points because these access points, which are deployed in a home environment, are likely to detect many rogue devices. · Client card implementation might mitigate the effectiveness of containment. This normally happens when a client might quickly reconnect to the network after receiving a "de-association/de-authentication" frame, so it might still be able to pass some traffic. However, the browsing experience of the rogue client would be badly affected when it is contained. · It is possible to classify and report rogue access points by using rogue states and user-defined classification rules that enable rogues to automatically move between states. · Each controller limits the number of rogue containments to three and six per radio for access points in the monitor mode. · When manual containment is performed using configuration, the rogue entry is retained even after the rogue entry expires. · When a rogue entry expires, the managed access points are instructed to stop any active containment on it. · When Validate Rogue AP Against AAA is enabled, the controller requests the AAA server for rogue AP classification with the configured interval. · To validate a Rogue AP against AAA, add the rogue AP MAC to the AAA user-database with relevant delimiter, username, and password being the MAC address with relevant delimiter. The Access-Accept contains the Cisco-AV-pair with one of the following keywords: · rogue-ap-state=state Note Here, state can be either of the types, namely: alert, contain, internal, external, or threat. · rogue-ap-class=class Note Here, class can be either of the types, namely: unclassified, malicious, or friendly. The following are the allowed combinations of class or state: · unclassified: alert, contain, or threat. · malicious: alert, contain, or threat. · friendly: alert, internal, or external. The Radius Access-Reject for rogue AP AAA validation is ignored. · When Validate Rogue Clients Against AAA is enabled, the controller requests the AAA server for rogue client validation only once. As a result, if rogue client validation fails on the first attempt then the rogue client will not be detected as a threat any more. To avoid this, add the valid client entries in the authentication server before enabling Validate Rogue Clients Against AAA. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1316 Security Information About Rogue Containment (Protected Management Frames (PMF) Enabled) Restrictions on Rogue Detection · Rogue containment is not supported on DFS channels. A rogue access point is moved to a contained state either automatically or manually. The controller selects the best available access point for containment and pushes the information to the access point. The access point stores the list of containments per radio. For auto containment, you can configure the controller to use only the monitor mode access point. The containment operation occurs in the following two ways: · The container access point goes through the list of containments periodically and sends unicast containment frames. For rogue access point containment, the frames are sent only if a rogue client is associated. · Whenever a contained rogue activity is detected, containment frames are transmitted. Individual rogue containment involves sending a sequence of unicast disassociation and deauthentication frames. From 17.7.1 release onwards, Beacon DS Attack and Beacon Wrong Channel signatures were introduced. Beacon DS Attack--When managed and rogue APs use the same BSSID, the rogue APs are termed as impersonators. An attacker can add the Direct-Sequence parameter set information element with any channel number. If the added channel number is different from the channel number used by the managed AP, the attack is termed as Beacon DS Attack. Beacon Wrong Channel--When managed and rogue APs use the same BSSID, the rogue APs are termed as AP impersonators. If an AP impersonator uses a channel number that is different from the one used by the managed AP with the same BSSID, the attack is termed as Beacon Wrong Channel. In such a case, the Direct-Sequence Information Element might not even be present in the Beacon frame. Cisco Prime Infrastructure Interaction and Rogue Detection Cisco Prime Infrastructure supports rule-based classification and uses the classification rules configured on the controller. The controller sends traps to Cisco Prime Infrastructure after the following events: · If an unknown access point moves to the Friendly state for the first time, the controller sends a trap to Cisco Prime Infrastructure only if the rogue state is Alert. It does not send a trap if the rogue state is Internal or External. · If a rogue entry is removed after the timeout expires, the controller sends a trap to Cisco Prime Infrastructure for rogue access points that are categorized as Malicious (Alert, Threat) or Unclassified (Alert). The controller does not remove rogue entries with the following rogue states: Contained, Contained Pending, Internal, and External. Information About Rogue Containment (Protected Management Frames (PMF) Enabled) From Cisco IOS XE Amsterdam, 17.3.1 onwards, rogue devices that are enabled with 802.11w Protected Management Frames (PMF) are not contained. Instead, the rogue device is marked as Contained Pending, and a WSA alarm is raised to inform about the Contained Pending event. Because the device containment is not performed, access point (AP) resources are not consumed unnecessarily. Note This feature is supported only on the Wave 2 APs. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1317 AP Impersonation Detection Security Run the show wireless wps rogue ap detailed command to verify the device containment, when PMF is enabled on a rogue device. AP Impersonation Detection The various methods to detect AP impersonation are: · AP impersonation can be detected if a managed AP reports itself as Rogue. This method is always enabled and no configuration is required. · AP impersonation detection is based on MFP. · AP impersonation detection based on AP authentication. Infrastructure MFP protects 802.11 session management functions by adding message integrity check (MIC) information elements, to the management frames sent by APs (and not those sent by clients), which are then validated by other APs in the network. If infrastructure MFP is enabled, the managed APs check if the MIC information elements are present and if MIC information elements are as expected. If either of these conditions is not fulfilled, the managed AP sends rogue AP reports with updated AP authentication failure counter. The AP Authentication functionality allows you to detect AP impersonation. When you enable this functionality, the controller creates an AP domain secret and shares it with other APs in the same network. This allows the APs to authenticate each other. An AP Authentication information element is attached to beacon and probe response frames. If the AP Authentication information element has an incorrect Signature field, or the timestamp is off, or if the AP Authentication information element is missing, then the AP that has detected such a condition increments the AP authentication failure count field. An impersonation alarm is raised after the AP authentication failure count field breaches its threshold. The rogue AP is classified as Malicious with state Threat. Run the show wireless wps rogue ap detail command to see when the impersonation is detected due to authentication errors. Configuring Rogue Detection (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Choose Configuration > Tags & Profiles > AP Join. Click the AP Join Profile Name to edit the AP join profile properties. In the Edit AP Join Profile window, click the Rogue AP tab. Check the Rogue Detection check box to enable rogue detection. In the Rogue Detection Minimum RSSI field, enter the RSSI value. In the Rogue Detection Transient Interval field, enter the interval in seconds. In the Rogue Detection Report Interval field, enter the report interval value in seconds. In the Rogue Detection Client Number Threshold field, enter the threshold for rogue client detection. Check the Auto Containment on FlexConnect Standalone check box to enable auto containment. Click Update & Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1318 Security Configuring Rogue Detection (CLI) Configuring Rogue Detection (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap profile profile-name rogue detection min-rssi rssi in dBm Example: Device(config)# ap profile profile1 Device(config)# rogue detection min-rssi -100 Purpose Enters global configuration mode. Specify the minimum RSSI value that rogues should have for APs to detect and for rogue entry to be created in the device. Valid range for the rssi in dBm parameter is 128 dBm to -70 dBm, and the default value is -128 dBm. Note This feature is applicable to all the AP modes. There can be many rogues with very weak RSSI values that do not provide any valuable information in rogue analysis. Therefore, you can use this option to filter rogues by specifying the minimum RSSI value at which APs should detect rogues. Step 3 Step 4 Step 5 ap profile profile-name rogue detection containment {auto-rate | flex-rate} Example: Device(config)# ap profile profile1 Device(config)# rogue detection containment flex-rate Specifies the rogue containment options. The auto-rate option enables auto-rate for containment of rogues. The flex-rate option enables rogue containment of standalone flexconnect APs. ap profile profile-name rogue detection enable Enables rogue detection on all APs. Example: Device(config)# ap profile profile1 Device(config)# rogue detection enable ap profile profile-name rogue detection report-interval time in seconds Example: Device(config)# ap profile profile1 Device(config)# rogue detection report-interval 120 Configures rogue report interval for monitor mode Cisco APs. The valid range for reporting the interval in seconds is 10 seconds to 300 seconds. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1319 Configuring RSSI Deviation Notification Threshold for Rogue APs (CLI) Security Configuring RSSI Deviation Notification Threshold for Rogue APs (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless wps rogue ap notify-rssi-deviation Example: Device(config)# wireless wps rogue ap notify-rssi-deviation Configures RSSI deviation notification threshold for Rogue APs. Step 3 end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Management Frame Protection (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Security > Wireless Protection Policies. In the Rogue Policy tab, under the MFP Configuration section, check the Global MFP State check box and the AP Impersonation Detection check box to enable the global MFP state and the AP impersonation detection, respectively. In the MFP Key Refresh Interval field, specify the refresh interval in hours. Click Apply. Configuring Management Frame Protection (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless wps mfp Example: Device(config)# wireless wps mfp Purpose Enters global configuration mode. Configures a management frame protection. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1320 Security Enabling Access Point Authentication Step 3 Step 4 Command or Action wireless wps mfp {ap-impersonation | key-refresh-interval} Example: Device(config)# wireless wps mfp ap-impersonation Device(config)# wireless wps mfp key-refresh-interval end Example: Device(config)# end Purpose Configures ap impersonation detection (or) MFP key refresh interval in hours. key-refresh-interval--Refers to the MFP key refresh interval in hours. The valid range is from 1 to 24. Default value is 24. Saves the configuration and exits configuration mode and returns to privileged EXEC mode. Enabling Access Point Authentication Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless wps ap-authentication Example: Device(config)# wireless wps ap-authentication Step 3 wireless wps ap-authentication threshold threshold Example: Device(config)# wireless wps ap-authentication threshold 100 Step 4 wlan wlan-name wlan-id SSID-name Example: Device(config)# wlan wlan-demo 1 ssid-demo Step 5 ccx aironet-iesupport Example: Device(config-wlan)# ccx aironet-iesupport Step 6 end Example: Purpose Enters global configuration mode. Configures the wireless WPS AP authentication. Configures AP neighbor authentication and sets the threshold for AP authentication failures. Configures a WLAN. Enables support for Aironet Information Elements on this WLAN. Returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1321 Verifying Management Frame Protection Security Command or Action Device# end Purpose Verifying Management Frame Protection To verify if the Management Frame Protection (MFP) feature is enabled or not, use the following command: Device# show wireless wps summary Client Exclusion Policy Excessive 802.11-association failures : unknown Excessive 802.11-authentication failures: unknown Excessive 802.1x-authentication : unknown IP-theft : unknown Excessive Web authentication failure : unknown Failed Qos Policy : unknown Management Frame Protection Global Infrastructure MFP state : Enabled AP Impersonation detection : Disabled Key refresh interval : 15 To view the MFP details, use the following command: Device# show wireless wps mfp summary Management Frame Protection Global Infrastructure MFP state : Enabled AP Impersonation detection : Disabled Key refresh interval : 15 Verifying Rogue Events To verify the rogue event history, run the show wireless wps rogue ap detailed command: Device# show wireless wps rogue ap detailed Rogue Event history Timestamp #Times Class/State Event Ctx RC -------------------------- -------- ----------- -------------------- ------------------------- ---- 05/10/2021 13:56:46.657434 2 Mal/Threat FSM_GOTO Threat 0x0 05/10/2021 13:56:46.654905 1 Unk/Init EXPIRE_TIMER_START 240s 0x0 05/10/2021 13:56:46.654879 1 Unk/Init AP_IMPERSONATION DS:1,ch:1,band_id:0 0x0 05/10/2021 13:56:46.654673 1 Unk/Init RECV_REPORT 70db.98fc.2680/0 0x0 05/10/2021 13:56:46.654663 1 Unk/Init INIT_TIMER_START 180s 0x0 05/10/2021 13:56:46.654608 1 Unk/Init CREATE 0x0 Rogue BSSID Last heard Rogue SSID 802.11w PMF required Is Rogue an impersonator Beacon Wrong Channel : 002c.c8c1.096d : MarvellAP0d : No : Yes : Yes Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1322 Security Verifying Rogue Detection Beacon DS Attack Is Rogue on Wired Network Classification Manually Contained State First Time Rogue was Reported Last Time Rogue was Reported Number of clients : Yes : No : Malicious : No : Threat : 05/10/2021 13:56:46 : 05/10/2021 13:56:46 :0 Verifying Rogue Detection This section describes the new command for rogue detection. The following command can be used to verify rogue detection on the device. Table 83: Verifying Adhoc Rogues Information Command Purpose show wireless wps rogue adhoc detailed mac_address Displays the detailed information for an Adhoc rogue. show wireless wps rogue adhoc summary Displays a list of all Adhoc rogues. Table 84: Verifying Rogue AP Information Command Purpose show wireless wps rogue ap clients mac_address Displays the list of all rogue clients associated with a rogue. show wireless wps rogue ap custom summary Displays the custom rogue AP information. show wireless wps rogue ap detailed mac_address Displays the detailed information for a rogue AP. show wireless wps rogue ap friendly summary Displays the friendly rogue AP information. show wireless wps rogue ap list mac_address Displays the list of rogue APs detected by a given AP. show wireless wps rogue ap malicious summary Displays the malicious rogue AP information. show wireless wps rogue ap summary Displays a list of all Rogue APs. show wireless wps rogue ap unclassified summary Displays the unclassified rogue AP information. Table 85: Verifying Rogue Auto-Containment Information Command Purpose show wireless wps rogue auto-contain Displays the rogue auto-containment information. Table 86: Verifying Classification Rule Information Command Purpose Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1323 Examples: Rogue Detection Configuration Security show wireless wps rogue rule detailed rule_name Displays the detailed information for a classification rule. show wireless wps rogue rule summary Displays the list of all rogue rules. Table 87: Verifying Rogue Statistics Command Purpose show wireless wps rogue stats Displays the rogue statistics. Table 88: Verifying Rogue Client Information Command Purpose show wireless wps rogue client detailed mac_address Displays detailed information for a Rogue client. show wireless wps rogue client summary Displays a list of all the Rogue clients. Table 89: Verifying Rogue Ignore List Command Purpose show wireless wps rogue ignore-list Displays the rogue ignore list. Examples: Rogue Detection Configuration This example shows how to configure the minimum RSSI that a detected rogue AP needs to be at, to have an entry created in the device: Device# configure terminal Device(config)# ap profile profile1 Device(config)# rogue detection min-rssi -100 Device(config)# end Device# show wireless wps rogue client summary/show wireless wps rogue ap summary This example shows how to configure the classification interval: Device# configure terminal Device(config)# ap profile profile1 Device(config)# rogue detection min-transient-time 500 Device(config)# end Device# show wireless wps rogue client summary/show wireless wps rogue ap summary Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1324 Security Configuring Rogue Policies (GUI) Configuring Rogue Policies (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Step 15 Choose Configuration > Security > Wireless Protection Policies. In the Rogue Policies tab, use the Rogue Detection Security Level drop-down to select the security level. In the Expiration timeout for Rogue APs (seconds) field, enter the timeout value. Select the Validate Rogue Clients against AAA check box to validate rogue clients against AAA server. Select the Validate Rogue APs against AAA check box to validate rogue access points against AAA server. In the Rogue Polling Interval (seconds) field, enter the interval to poll the AAA server for rogue information. Select the Detect and Report Adhoc Networks check box to enable detection of rogue adhoc networks. In the Rogue Detection Client Number Threshold field, enter the threshold to generate SNMP trap. In the Auto Contain section, enter the following details. Use the Auto Containment Level drop-down to select the level. Select the Auto Containment only for Monitor Mode APs check box to limit the auto-containment only to monitor mode APs. Select the Rogue on Wire check box to limit the auto-containment only to rogue APs on wire. Select the Using our SSID check box to limit the auto-containment only to rogue APs using one of the SSID configured on the controller. Select the Adhoc Rogue AP check box to limit the auto-containment only to adhoc rogue APs. Click Apply. Configuring Rogue Policies (CLI) Procedure Step 1 Step 2 Step 3 Command or Action configure terminal Example: Device# configure terminal Example: Device(config)# wireless wps rogue security-level custom wireless wps rogue ap timeout number of seconds Example: Purpose Enters global configuration mode. Configures the rogue detection security level. You can select critical for highly sensitive deployments, custom for customizable security level, high for medium-scale deployments, and low for small-scale deployments. Configures the expiration time for rogue entries, in seconds. Valid range for the time in seconds 240 seconds to 3600 seconds. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1325 Configuring Rogue Policies (CLI) Security Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Command or Action Device(config)# wireless wps rogue ap timeout 250 Purpose Example: Device(config)# wireless wps rogue client aaa Configures the use of AAA or local database to detect valid MAC addresses. Example: Device(config)# wireless wps rogue client mse Configures the use of MSE to detect valid MAC addresses. wireless wps rogue client notify-min-rssi RSSI threshold Example: Device(config)# wireless wps rogue client notify-min-rssi -128 Configures the minimum RSSI notification threshold for rogue clients. Valid range for the RSSI threshold in dB is -128 - dB to -70 dB. wireless wps rogue client notify-min-deviation RSSI threshold Example: Device(config)# wireless wps rogue client notify-min-deviation 4 Configures the RSSI deviation notification threshold for rogue clients. Valid range for the RSSI threshold in dB is 0 dB to 10 dB. wireless wps rogue ap aaa Example: Device(config)# wireless wps rogue ap aaa Configures the use of AAA or local database to classify rogue AP based on rogue AP MAC addresses. wireless wps rogue ap aaa polling-interval Configures rogue AP AAA validation interval. AP AAA Interval The valid range for the AP AAA interval in Example: seconds is 60 seconds to 86400 seconds. Device(config)# wireless wps rogue ap aaa polling-interval 120 wireless wps rogue adhoc Example: Enables detecting and reporting adhoc rogue (IBSS). Device(config)# wireless wps rogue adhoc wireless wps rogue client client-threshold threshold Example: Device(config)# wireless wps rogue client client-threshold 100 Configures the rogue client per a rogue AP SNMP trap threshold. The valid range for the threshold is 0 to 256. wireless wps rogue ap init-timer Example: Configures the init timer for rogue APs. The default timer value is set to 180 seconds. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1326 Security Rogue Detection Security Level Command or Action Device(config)# wireless wps rogue ap init-timer 180 Purpose Note When a rogue AP is detected, an init timer is started and the rules are applied when this timer expires. This allows for rogue AP information to stabilize before applying any rules. However, you can change the value of this timer using this command. For instance, the init timer can be set to 0, if the rules need to be applied as soon as a new rogue AP is detected. Rogue Detection Security Level The rogue detection security level configuration allows you to set rogue detection parameters. The available security levels are: · Critical: Basic rogue detection for highly sensitive deployments. · High: Basic rogue detection for medium-scale deployments. · Low: Basic rogue detection for small-scale deployments. · Custom: Default security-level, where all detection parameters are configurable. Note When in Critical, High or Low, some rogue parameters are fixed and cannot be configured. The following table shows parameter details for the three predefined levels: Table 90: Rogue Detection: Predefined Levels Parameter Cleanup Timer AAA Validate Clients AAA Validate AP Adhoc Reporting Monitor-Mode Report Interval Minimum RSSI Transient Interval Critical 3600 Disabled Disabled Enabled 10 seconds -128 dBm 600 seconds High 1200 Disabled Disabled Enabled 30 seconds -80 dBm 300 seconds Low 240 Disabled Disabled Enabled 60 seconds -80 dBm 120 seconds Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1327 Setting Rogue Detection Security-level Security Parameter Critical Auto Contain Works only on Monitor Mode APs. Disabled Auto Contain Level 1 Auto Contain Same-SSID Disabled Auto Contain Valid Clients on Rogue AP Disabled Auto Contain Adhoc Disabled Containment Auto-Rate Enabled Validate Clients with CMX Enabled Containment FlexConnect Enabled High Disabled 1 Disabled Disabled Disabled Enabled Enabled Enabled Low Disabled 1 Disabled Disabled Disabled Enabled Enabled Enabled Setting Rogue Detection Security-level Follow the procedure given below to set the rogue detection security-level: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless wps rogue security-level custom Example: Device(config)# wireless wps rogue security-level custom Step 3 wireless wps rogue security-level low Example: Device(config)# wireless wps rogue security-level low Step 4 wireless wps rogue security-level high Example: Device(config)# wireless wps rogue security-level high Purpose Enters the global configuration mode. Configures rogue detection security level as custom. Configures rogue detection security level for basic rogue detection setup for small-scale deployments. Configures rogue detection security level for rogue detection setup for medium-scale deployments. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1328 Security Wireless Service Assurance Rogue Events Step 5 Command or Action wireless wps rogue security-level critical Example: Device(config)# wireless wps rogue security-level critical Purpose Configures rogue detection security level for rogue detection setup for highly sensitive deployments. Wireless Service Assurance Rogue Events Wireless Service Assurance (WSA) rogue events, supported in Release 16.12.x and later releases, consist of telemetry notifications for a subset of SNMP traps. WSA rogue events replicate the same information that is part of the corresponding SNMP trap. For all the exported events, the following details are provided to the wireless service assurance (WSA) infrastructure: · MAC address of the rogue AP · Details of the managed AP and the radio that detected the rogue AP with strongest RSSI · Event-specific data such as SSID, channel for potential honeypot event, and MAC address of the impersonating AP for impersonation event The WSA rogue events feature can scale up to four times the maximum number of supported APs and half of the maximum number of supported clients. The WSA rogue events feature is supported on Cisco DNA Center and other third-party infrastructure. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 network-assurance enable Example: Device# network-assurance enable Enables wireless service assurance. Step 3 wireless wps rogue network-assurance enable Enables wireless service assurance for rogue Example: Device# wireless wps rogue devices. This ensures that the WSA rogue events are sent to the event queue. network-assurance enable Monitoring Wireless Service Assurance Rogue Events Procedure · show wireless wps rogue stats Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1329 Rogue Full Scale Quotas and Priorities Security Example: Device# show wireless wps rogue stats WSA Events Total WSA Events Triggered :9 ROGUE_POTENTIAL_HONEYPOT_DETECTED : 2 ROGUE_POTENTIAL_HONEYPOT_CLEARED : 3 ROGUE_AP_IMPERSONATION_DETECTED :4 Total WSA Events Enqueued :6 ROGUE_POTENTIAL_HONEYPOT_DETECTED : 1 ROGUE_POTENTIAL_HONEYPOT_CLEARED : 2 ROGUE_AP_IMPERSONATION_DETECTED :3 In this example, nine events have been triggered, but only six of them have been enqueued. This is because three events were triggered before the WSA rogue feature was enabled. · show wireless wps rogue stats internal show wireless wps rogue ap detailed rogue-ap-mac-addr These commands show information related to WSA events into the event history. Rogue Full Scale Quotas and Priorities Feature History for Rogue Full Scale Quotas and Priorities This table provides release and related information about the feature explained in this section. This feature is also available in all the releases subsequent to the one in which they are introduced in, unless noted otherwise. Table 91: Feature History for Rogue Full Scale Quotas and Priorities Release Feature Feature Information Cisco IOS XE Cupertino Rogue Full Scale Quotas 17.9.1 and Priorities The Rogue Full Scale Quotas and Priorities feature helps you to improve the scalability, performance, manageability, and serviceability of rogue Access Points (APs). Rogue AP Scale Modes Per Class The following are the modes that determine if a rogue AP is added to the database when it reaches maximum scale: · Quota: Quotas are applied to each classification as a percentage of the maximum scale. This means that if a classification has quota X, then X percent of the rogue database is reserved for that classification. If the entire memory of the given classification is used up, the newly reported rogue APs under that classification are dropped. · Priority: Priorities are applied to different classifications. When quotas are not configured, priority mode becomes the default mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1330 Security Rogue AP Scale Modes Per Class The priority for each classification is configured as follows: The default priority for malicious is highest. The default priority for custom is high. The default priority for unclassified is medium, and the default priority for friendly is low. Priorities are only applied when the maximum scale is reached. If a new rogue AP is classified and the maximum scale is reached, it is added to the database only if there are lower-priority rogue APs in the database. In such a case, the newest rogue AP entry of the lowest priority is deleted. Else, if there are no lower-priority rogue APs, the new rogue AP is dropped. · Hybrid: Hybrid mode enables the use of quotas and priorities as a combination. Unused quota reserved for higher priority rogue APs are used by rogue APs of lower priority when space is available. After reaching the maximum scale, if a new rogue AP is classified, the following logic is applied: · If the number of stored rogue APs (in the class of the new rogue AP), is below the quota, store the new rogue AP. Delete the newest rogue AP of the classification with the lowest priority that is above the quota. · Alternatively, check if there is a class with lower priority and is above the quota than the newly classified rogue AP. If such a class exists, delete the newest rogue AP of that lower-priority classification and store the new rogue AP. · If none of the above conditions apply, drop the new rogue AP. Table 92: Advantages and Disadvantages of Role-Scale Modes Mode Quota Advantages Simple to use and understand. Disadvantages · Memory is not used efficiently. · New rogue APs for a class that is already in its maximum quota are dropped. While the memory reserved for another class that does not have any rogue APs, stays empty. For example, this could lead to dropping malicious rogue APs, while there is still memory available. Priority · Simple to use and understand. Some of the lower-priority rogue AP classes might not be represented · Utilizes the available memory. in the rogue database, if · Stores the important rogue higher-priority rogue APs utilize APs. all the available memory. Hybrid Utilizes the available memory, while providing quotas so that all the classes are represented in the database. Difficult for users to understand the exact behavior. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1331 Configuring Rogue AP Scale (CLI) Security Configuring Rogue AP Scale (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 [no] wireless wps rogue scale quota malicious Configures rogue scale quota for malicious, percentage-malicious-rogue-AP custom custom, unclassified, and friendly rogue APs. percentage-custom-rogue-AP unclassified The default value for quota is 0. The sum of all percentage-unclassified-rogue-AP friendly the quotas must be less than or equal to 100 percentage-friendly-rogue-AP percent. Example: If the sum of all the configured quotas is equal Device(config)# wireless wps rogue scale to 0, then priority mode is used. If the sum of quota malicious 5 custom 10 unclassified all the quotas is not equal to 0, then quota mode 3 friendly 5 is used. If hybrid mode is configured, hybrid mode is used no matter what the quota configuration is. Hybrid mode with all the quotas equal to 0, is identical to the priority mode. Note Hybrid mode is enabled after the maximum scale is reached. All the rogue APs are stored before the maximum scale is reached. Step 3 Step 4 [no] wireless wps rogue scale priority malicious {high | highest | low | medium} custom {high | highest | low | medium} unclassified {high | highest | low | medium} friendly {high | highest | low | medium} Example: Configures rogue scale priority for malicious, custom, unclassified, and friendly rogue APs. The default value for malicious is highest, the default value for custom is high, the default value for unclassified is medium, and the default value for friendly is low. Device(config)# wireless wps rogue scale priority malicious highest custom high unclassified medium friendly low [no] wireless wps rogue scale mode hybrid Configures rogue scale hybrid mode. Unused Example: quota reserved for higher-priority rogue APs are used by rogue APs of lower priority when Device(config)# wireless wps rogue scale space is available. mode hybrid Verifying Rogue Scale Details To verify the rogue scale details, run the following command: Device# show wireless wps rogue stats . Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1332 Security Verifying Rogue Scale Details . . Total Post Init/Max : 0/4000 Total/Max : 0/4200 Init :0 . . . Classification Friendly : 0/0/0 (Total/Init/Quota[%]) Malicious : 0/0/0 (Total/Init/Quota[%]) Custom : 0/0/0 (Total/Init/Quota[%]) Unclassified : 0/0/0 (Total/Init/Quota[%]) Unknown : 0/0 (Total/Init) . . . Configured Quotas by Classification Custom : <% of max scale> Friendly : <% of max scale> Malicious : <% of max scale> Unclassified : <% of max scale> Configured Priorities by Classification Custom : 2 (High) Friendly : 4 (Low) Malicious : 1 (Highest) Unclassified : 3 (Medium) Configured Rogue Scale Mode: [Priority|Quota|Hybrid] To view the rogue ad hoc summary, run the following command: Device# show wireless wps rogue adhoc summary Detect and report Ad-Hoc Networks : Enabled Auto-Contain Ad-Hoc Networks : Disabled Total Number of Rogue Ad-Hoc :0 Friendly Ad-Hoc Rogues :0 Malicious Ad-Hoc Rogues :0 Custom Ad-Hoc Rogues :0 Unclassified Ad-Hoc Rogues :0 Unknown Ad-Hoc Rogues :0 Client MAC Address Adhoc BSSID Classification State # APs Last Heard ------------------------------------------------------------------------------------------------ Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1333 Verifying Rogue Scale Details Security Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1334 1 2 2 C H A P T E R Classifying Rogue Access Points · Information About Classifying Rogue Access Points, on page 1335 · Guidelines and Restrictions for Classifying Rogue Access Points, on page 1337 · How to Classify Rogue Access Points, on page 1337 · Monitoring Rogue Classification Rules, on page 1343 · Examples: Classifying Rogue Access Points, on page 1343 Information About Classifying Rogue Access Points The controller software enables you to create rules that can organize and display rogue access points as Friendly, Malicious, Custom, or Unclassified. By default, none of the classification rules are used. You need to enable them. Therefore, all unknown access points are categorized as Unclassified. When you create or change a rule, configure conditions, and enable it, all rogue access points are then reclassified. Whenever you change a rule, it is applied to all the access points (friendly, malicious, and unclassified). Note · Rule-based rogue classification does not apply to ad hoc rogues and rogue clients. · You can configure up to 64 rogue classification rules per controller . When the controller receives a rogue report from one of its managed access points, it responds as follows: · If the unknown access point is in the friendly MAC address list, the controller classifies the access point as Friendly. · If the unknown access point is not in the friendly MAC address list, the controller starts applying the rogue classification rules to the access point. · If the rogue access point is manually classsified, rogue rules are not applied to it. · If the rogue access point matches the configured rules criteria, the controller classifies the rogue based on the classification type configured for that rule. · If the rogue access point does not match any of the configured rules, the rogue remains unclassified. The controller repeats the previous steps for all the rogue access points. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1335 Information About Classifying Rogue Access Points Security · If the rogue access point is detected on the same wired network, the controller marks the rogue state as Threat and classifies it as Malicious automatically, even if there are no configured rules. You can then manually contain the rogue to change the rogue state to Contained. If the rogue access point is not available on the network, the controller marks the rogue state as Alert. You can then manually contain the rogue. · If desired, you can manually move the access point to a different classification type and rogue state. · Before performing any classification, the rogue access points are temporarily marked as Pending. Table 93: Classification Mapping Rule-Based Rogue State Classification Type Custom · Alert--No action is taken other than notifying the management station. The management station in the controller manages the controller and wired networks. · Contained--The unknown access point is contained. If none of the managed access points are available for containment, the rogue is in Contained Pending state. Delete Friendly Deletes the rogue access point. · Internal--If the unknown access point poses no threat to WLAN security, you can manually configure it as Friendly, Internal. An example of this would be the access points in your lab network. · External--If the unknown access point is outside the network and poses no threat to WLAN security, you can manually configure it as Friendly, External. An example of this would be the access point in your neighboring coffee shop. · Alert--No action is taken other than notifying the management station. The management station manages the controller and wired networks. Malicious · Alert--No action is taken other than notifying the management station. The management station manages the controller and wired networks. · Threat--The unknown access point is found to be on the network and poses a threat to WLAN security. · Contained--The unknown access point is contained. If none of the managed access points are available for containment, the rogue is in Contained Pending state. Unclassified · Alert-- No action is taken other than notifying the management station. The management station manages the controller and wired networks. · Contained--The unknown access point is contained. If none of the managed access points are available for containment, the rogue is in contained pending state. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1336 Security Guidelines and Restrictions for Classifying Rogue Access Points As mentioned earlier, the controller can automatically change the classification type and rogue state of an unknown access point based on user-defined rules. Alternatively, you can manually move the unknown access point to a different classification type and rogue state. Guidelines and Restrictions for Classifying Rogue Access Points · Classifying Custom type rogues is tied to rogue rules. Therefore, it is not possible to manually classify a rogue as Custom. Custom class change can occur only when rogue rules are used. · Some SNMP traps are sent for containment by rule and every 30 minutes for rogue classification change. · Rogue rules are applied on every incoming new rogue report in the controller in the order of their priority. · After a rogue satisfies a rule and is classified, it does not move down the priority list for the same report. · The rogue classification rules are re-evaluated at every report received by the managed access points. Hence, a rogue access point can move from one state to another, if a different rule matches the last report. · If a rogue AP is classified as friendly or ignored, all rogue clients associated with it are not tracked. · Until the controller discovers all the APs through neighbor reports from APs, the rogue APs are kept in unconfigured state for three minutes after they are detected. After 3 minutes, the rogue policy is applied on the rogue APs and the APs are moved to unclassified, friendly, malicious, or custom class. Rogue APs kept in unconfigured state means that no rogue policy has yet been applied on them. · When a rogue BSSID is submitted for a containment on Cisco Catalyst 9800 Series Wireless Controller, if the controller has enough resources, it will contain. The APs that detect the particular contained rogue AP starts broadcasting the DEAUTH packets. Wireless client connected to the contained rogue BSSID will disconnect once DEAUTH packets are received. However, when the client assumes being in a connected state, repeatedly tries to reconnect and the wireless client's user browsing experience would be badly affected. Also, in a high RF environment like that of a stadium, though DEAUTH packets are broadcasted, client does not receive all of them because of RF disturbance. In this scenario, the client may not be fully disconnected but will be affected badly. How to Classify Rogue Access Points Classifying Rogue Access Points and Clients Manually (GUI) Procedure Step 1 Step 2 Step 3 Choose Monitoring > Wireless > Rogues. In the Unclassified tab, select an AP to view the detail in the lower pane. Use the Class Type drop-down to set the status. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1337 Classifying Rogue Access Points and Clients Manually (CLI) Security Step 4 Click Apply. Classifying Rogue Access Points and Clients Manually (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless wps rogue adhoc {alert mac-addr | Detects and reports the ad hoc rogue. auto-contain | contain mac-addr containment-level | internal mac-addr | external mac-addr} Enter one of these options after you enter the adhoc keyword: Example: · alert--Sets the ad hoc rogue access point to alert mode. If you choose this option, Device(config)# wireless wps rogue adhoc alert 74a0.2f45.c520 enter the MAC address for the mac-addr parameter. · auto-contain--Sets the automatically containing ad hoc rogue to auto-contain mode. · contain--Sets the containing ad hoc rogue access point to contain mode. If you choose this option, enter the MAC address for the mac-addr parameter and containment level for the containment-level parameter. The valid range for containment-level is from 1 to 4. · external--Sets the ad hoc rogue access point as external. If you choose this option, enter the MAC address for the mac-addr parameter. · internal--Sets the ad hoc rogue access point as internal. If you choose this option, enter the MAC address for the mac-addr parameter. Step 3 wireless wps rogue ap {friendly mac-addr Configures the rogue access points. state [external | internal] | malicious mac-addr state [alert | contain containment-level]} Enter one of the following options after the ap keyword: Example: · friendly--Configures the friendly rogue access points. If you choose this option, Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1338 Security Configuring Rogue Classification Rules (GUI) Step 4 Step 5 Command or Action Purpose Device(config)# wireless wps rogue ap malicious 74a0.2f45.c520 state contain 3 enter the MAC address for the mac-addr parameter. After that enter the state keyword followed by either of these options: internal or external. If you select an internal option, it indicates that you trust a foreign access point. If you select an external option, it indicates that you acknowledge the presence of a rogue access point. · malicious--Configures the malicious rogue access points. If you choose this option, enter the MAC address for the mac-addr parameter. After that enter the state keyword followed by either of these options: alert or contain. · alert--Sets the malicious rogue access point to alert mode. · contain--Sets the malicious rogue access point to contain mode. If you choose this option, enter the containment level for the containment-level parameter. The valid range is from 1 to 4. wireless wps rogue client {contain mac-addr Configures the rogue clients. containment-level} Enter the following option after you enter the Example: client keyword: Device(config)# wireless wps rogue client contain--Contains the rogue client. After you contain 74a0.2f45.c520 2 choose this option, enter the MAC address for the mac-addr parameter and the containment level for containment-level parameter. The valid range for containment-level is from 1 to 4. end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Rogue Classification Rules (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Security > Wireless Protection Policies. In the Wireless Protection Policies page, choose Rogue AP Rules tab. On the Rogue AP Rules page, click the name of the Rule or click Add to create a new one. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1339 Configuring Rogue Classification Rules (CLI) Security Step 4 Step 5 In the Add/Edit Rogue AP Rule window that is displayed, enter the name of the rule in the Rule Name field. Choose the rule type from the following Rule Type drop-down list options: · Friendly · Malicious · Unclassified · Custom Configuring Rogue Classification Rules (CLI) Procedure Step 1 Step 2 Step 3 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. wireless wps rogue rule rule-name priority Creates or enables a rule. While creating a rule, priority you must enter the priority for the rule. Example: Note Device(config)# wireless wps rogue rule rule_3 priority 3 After creating a rule, you can edit the rule and change the priority only for the rogue rules that are disabled. You cannot change the priority for the rogue rules that are enabled. While editing, changing the priority for a rogue rule is optional. classify {friendly state {alert | external | Specifies the classification that needs to be internal} | malicious state {alert | contained applied to the rogue access points matching }} this rule. Example: Device(config)# wireless wps rogue rule rule_3 priority 3 Device(config-rule)# classify friendly · friendly--Configures the friendly rogue access points. After that enter the state keyword followed by either of these options: alert, internal, or external. If you select an internal option, it indicates that you trust a foreign access point. If you select an external option, it indicates that you acknowledge the presence of a rogue access point. · malicious--Configures the malicious rogue access points. After that enter the state keyword followed by either of these options: alert or contained. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1340 Security Configuring Rogue Classification Rules (CLI) Step 4 Command or Action Purpose · alert--Sets the malicious rogue access point to alert mode. · contained--Sets the malicious rogue access point to contained mode. condition {client-count value| duration Adds the following conditions to a rule, which duration_value| encryption | infrastructure the rogue access point must meet: | rssi | ssid ssid_name | wildcard-ssid} · client-count--Requires that a minimum Example: number of clients be associated to the Device(config)# wireless wps rogue rule rule_3 priority 3 rogue access point. For example, if the number of clients associated to the rogue Device(config-rule)# condition client-count 5 access point is greater than or equal to the configured value, the access point could be classified as Malicious. If you choose this option, enter the minimum number of clients to be associated to the rogue access point for the value parameter. The valid range is from 1 to 10 (inclusive), and the default value is 0. · duration--Requires that the rogue access point be detected for a minimum period of time. If you choose this option, enter a value for the minimum detection period for the duration_value parameter. The valid range is from 0 to 3600 seconds (inclusive), and the default value is 0 seconds. · encryption--Requires that the advertised WLAN does not have encryption enabled. You can choose any for any type of encryption, off for no encryption, wpa1 for WPA encryption, wpa2 for WPA2 encryption, wpa3-owe for WPA3 OWE encryption, or wpa3-sae for WPA3 SAE encryption. · infrastructure--Requires the SSID to be known to the controller. · rssi--Requires the rogue access point to be detected with a minimum RSSI value. If the classification is Friendly, the condition requires the rogue access point to be detected with a maximum RSSI value. The valid range is from 95 to 50 dBm (inclusive). Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1341 Configuring Rogue Classification Rules (CLI) Security Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action Purpose · ssid--Requires the rogue access point to have a specific SSID. You could specify up to 25 different SSIDs. You should specify an SSID that is not managed by the controller. If you choose this option, enter the SSID for the ssid_name parameter. The SSID is added to the configured SSID list you just created. · wildcard-ssid--Allows you to specify an expression that could match an SSID string. You can specify up to 25 of these SSIDs. match {all | any} Specifies whether a detected rogue access point Example: must meet all or any of the conditions specified by the rule for the rule to be matched and the Device(config)# wireless wps rogue rule rogue access point to adopt the classification rule_3 priority 3 type of the rule. Device(config-rule)# match all default Sets a command to its default. Example: Device(config)# wireless wps rogue rule rule_3 priority 3 Device(config-rule)# default exit Exits the sub-mode. Example: Device(config)# wireless wps rogue rule rule_3 priority 3 Device(config-rule)# exit Device(config)# shutdown Example: Disables a particular rogue rule. In this example, the rule rule_3 is disabled. Device(config)# wireless wps rogue rule rule_3 priority 3 Device(config-rule)# shutdown end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. configure terminal Example: Device# configure terminal Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1342 Security Monitoring Rogue Classification Rules Step 11 Step 12 Command or Action Purpose wireless wps rogue rule shutdown Disables all the rogue rules. Example: Device(config)# wireless wps rogue rule shutdown end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Monitoring Rogue Classification Rules You can monitor the rogue classification rules using the following commands: Table 94: Commands for Monitoring Rogue Classification Rules Command Purpose show wireless wps rogue rule detailed Displays detailed information of a classification rule. show wireless wps rogue rule summary Displays a summary of the classification rules. Examples: Classifying Rogue Access Points This example shows how to classify a rogue AP with MAC address 00:11:22:33:44:55 as malicious and mark it for being contained by 2 managed APs: Device# configure terminal Device(config)# wireless wps rogue ap malicious 0011.2233.4455 state contain 2 This example shows how to create a rule that can categorize a rogue AP that is using SSID my-friendly-ssid, and it is seen for at least for 1000 seconds as friendly internal: Device# configure terminal Device(config)# wireless wps rogue rule ap1 priority 1 Device(config-rule)# condition ssid my-friendly-ssid Device(config-rule)# condition duration 1000 Device(config-rule)# match all Device(config-rule)# classify friendly state internal This example shows how to apply a condition that a rogue access point must meet: Device# configure terminal Device(config)# wireless wps rogue rule ap1 priority 1 Device(config-rule)# condition client-count 5 Device(config-rule)# condition duration 1000 Device(config-rule)# end Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1343 Examples: Classifying Rogue Access Points Security Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1344 1 2 3 C H A P T E R Advanced WIPS · Feature History for Advanced WIPS, on page 1345 · Information About Advanced WIPS, on page 1346 · Enabling Advanced WIPS, on page 1349 · Syslog Support for Advanced WIPS, on page 1349 · Advanced WIPS Solution Components, on page 1350 · Supported Modes and Platforms, on page 1350 · Enabling Advanced WIPS(GUI), on page 1351 · Enabling Advanced WIPS (CLI), on page 1351 · Configuring Syslog Threshold for Advanced WIPS (CLI), on page 1352 · Viewing Advanced WIPS Alarms (GUI), on page 1352 · Verifying Advanced WIPS, on page 1353 · Verifying Syslog Configuration for Advanced WIPS, on page 1354 Feature History for Advanced WIPS This table provides release and related information for the features explained in this module. These features are available on all releases subsequent to the one they were introduced in, unless noted otherwise. Table 95: Feature History for Advanced WIPS Release Feature Name Feature Information Cisco IOS XE Bengaluru Advanced WIPS Signatures Up to 15 additional signatures are supported. 17.5.1 Cisco IOS XE Bengaluru 17.6.1 Syslog Support for Advanced From 17.6.1 release onwards: WIPs · Two additional signatures are supported. · Syslog support has been added to the controller for advanced WIPS. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1345 Information About Advanced WIPS Security Information About Advanced WIPS The Cisco Advanced Wireless Intrusion Prevention System (aWIPS) is a wireless intrusion threat detection and mitigation mechanism. The aWIPS uses an advanced approach to wireless threat detection and performance management. The AP detects threats and generates alarms. It combines network traffic analysis, network device and topology information, signature-based techniques, and anomaly detection to deliver highly accurate and complete wireless threat prevention. With a fully infrastructure-integrated solution, you can continually monitor wireless traffic on both wired and wireless networks and use that network intelligence to analyze attacks from multiple sources to accurately pinpoint and proactively prevent attacks, rather than wait until damage or exposure has occurred. The following table shows the alarms introduced from Cisco IOS XE Bengaluru 17.5.1 onwards: Table 96: Advanced WIPS Signatures and Definitions: From Cisco IOS XE Bengaluru 17.5.1 Onwards Advanced WIPS Signature RTS Virtual Carrier Sense Attack CTS Virtual Carrier Sense Attack Deauthentication Flood by Pair Fuzzed Beacon Fuzzed Probe Request Fuzzed Probe Response Definition This is an addition to the existing RTS Flood alarm introduced in Cisco IOS XE Bengaluru 17.4.x. The alarm is triggered when an RTS with a large duration is detected. An attacker can use these frames to exhaust air time and disrupt wireless client service. This is an addition to the existing CTS Flood alarm introduced in Cisco IOS XE Bengaluru 17.4.x. The alarm is triggered when a CTS with large duration is detected. An attacker can use these frames to exhaust air time and disrupt wireless client service. In the enhanced context of threat, both the source (attacker) and the destination (victim) of attacks (Track by Pair) have visibility. Fuzzed beacon is when invalid, unexpected, or random data is introduced into the beacon and replays those modified frames into the air. This causes unexpected behavior on the destination device, including driver crashes, operating system crashes, and stack-based overflows. This in turn allows the execution of the arbitrary code of the affected system. Fuzzed probe request is when invalid, unexpected, or random data is introduced into a probe request and replays those modified frames into the air. Fuzzed probe response is when invalid, unexpected, or random data is introduced into a probe response and replays those modified frames into the air. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1346 Security Information About Advanced WIPS Advanced WIPS Signature PS Poll Flood by Signature Eapol Start V1 Flood by Signature Reassociation Request Flood by Destination Beacon Flood by Signature Probe Response Flood by Destination Block Ack Flood by Signature Airdrop Session Malformed Association Request Definition PS poll flood is when a potential hacker spoofs a MAC address of a wireless client and sends out a flood of PS poll frames. The AP sends out buffered data frames to the wireless client. This results in the client missing the data frames because it could be in the power safe mode. Extensible Authentication Protocol over LAN (EAPOL) start flood is when an attacker attempts to bring down the AP by flooding the AP with EAPOL-start frames to exhaust the AP's internal resources. Reassociation request flood is when a specific device tries to flood the AP with a large number of emulated and spoofed client reassociations to exhaust the AP's resources, particularly the client association table. When the client association table overflows, legitimate clients are not able to associate, causing a DoS attack. Beacon flood is when stations actively search for a network that is bombarded with beacons from the networks that are generated using different MAC addresses and SSIDs. This flood prevents a valid client from detecting the beacons sent by corporate APs, which in turn initiates a DoS attack. Probe response flood is when a device tries to flood clients with a large number of spoofed probe responses from the AP. This prevents clients from detecting the valid probe responses sent by the corporate APs. Block ack flood is when an attacker transmits an invalid Add Block Acknowledgement (ADDBA) frame to the AP while spoofing the MAC address of the valid client. This process causes the AP to ignore any valid traffic transmitted from the client until it reaches the invalid frame range. Airdrop session refers to the Apple feature called AirDrop. AirDrop is used to set up a peer-to-peer link for file sharing. This might create a security risk because of unauthorized peer-to-peer networks created dynamically in your WLAN environment. Malformed association request is when an attacker sends a malformed association request to trigger bugs in the AP. This results in a DoS attack. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1347 Guidelines and Restrictions Security Advanced WIPS Signature Authentication Failure Flood by Signature Invalid MAC OUI by Signature Malformed Authentication Definition Authentication failure flood is when a specific device tries to flood the AP with invalid authentication requests spoofed from a valid client. This results in disconnection. Invalid MAC OUI is when a spoofed MAC address that does not have a valid OUI is used. Malformed authentication is when an attacker sends malformed authentication frames that can expose vulnerabilities in some drivers. The following table shows the alarms introduced prior to Cisco IOS XE Bengaluru 17.5.1: Table 97: Advanced WIPS Signatures: Prior Cisco IOS XE Bengaluru 17.5.1 Advanced WIPS Signatures Authentication Flood Alarm Association Flood Alarm Broadcast Probe Flood Alarm Disassociation Flood Alarm Broadcast Dis-Association Flood Alarm De-Authentication Flood Alarm Broadcast De-Authentication Flood Alarm EAPOL-Logoff Flood Alarm CTS Flood Alarm RTS Flood Alarm Guidelines and Restrictions · In the aWIPS profile, Cisco Aironet 1850 Series Access Points, Cisco Catalyst 9117 Series Access Points, and Cisco Catalyst 9130AX Series Access Points can detect EAPOL logoff attack and raise alarms accordingly, only on off-channel. They can not detect EAPOL logoff attack and raise alarms on on-channel. · aWIPS profile download is not supported when Cisco DNA Center is configured using the fully qualified domain name (FQDN). Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1348 Security Enabling Advanced WIPS Enabling Advanced WIPS From Cisco IOS XE Release 17.5.1 onwards, aWIPS security gets a higher priority over Hyperlocation. The following are the possible scenarios. This table is applicable for all modes except Monitor mode. Hyperlocation Enable Advanced WIPS Enable Effective Feature aWIPS7 Enable Disable Hyperlocation Disable Disable Hyperlocation and aWIPS are disabled. Disable Enable aWIPS 7 In modes other than the Monitor mode, if both aWIPS and Hyperlocation are enabled, only aWIPS is available. This table is applicable for Monitor mode. Hyperlocation Enable Disable Advanced WIPS Enable Enable Effective Feature aWIPS and Hyperlocation8 aWIPS 9 Enable Disable Hyperlocation Disable Disable Hyperlocation and aWIPS are disabled. 8 In Monitor mode, if both aWIPS and Hyperlocation are enabled, both aWIPS and Hyperlocation are available. 9 To monitor the status of aWIPS and Hyperlocation simultanueously on AP, use the show capwap client rcb command. Syslog Support for Advanced WIPS This feature adds syslog support to the controller for Advanced WIPS. The controller raises syslog messages when it receives alarms from an AP. The syslog messages go through throttling. If the same signature is detected from the same AP in a configured throttling interval, you must generate the syslog message for that alarm. For instance, if there were 100 occurences of the same signature from the same AP within the throttling interval, say, 1 minute, you get to view only one syslog message in the controller in that 1-minute period instead of 100 messages. Sample Syslog Format The following is a sample syslog format: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1349 Advanced WIPS Solution Components Security Nov 18 20:45:23.746: %APMGR_AWIPS_SYSLOG-6-APMGR_AWIPS_MESSAGE: Chassis 1 R0/0: wncd: AWIPS alarm:(AP00B0.E19A.5720) 00b0.e19a.5720 Radio MAC 00b0.e19b.c300 detected Probe Response Flood by Destination (10019) The format covers the AP name, AP Ethernet MAC address, AP Radio MAC address, description (signature ID). Note The syslog messages do not display any client information or context. Advanced WIPS Solution Components The aWIPS solution comprises the following components: · Cisco Catalyst 9800 Series Wireless Controller · Cisco Aironet Wave 2 APs · Cisco DNA Center Because the aWIPS functionality is integrated into Cisco DNA Center, the aWIPS can configure and monitor WIPS policies and alarms and report threats. aWIPS supports the following capabilities: · Static signatures From Cisco IOS XE, 17.4.1 onwards Cisco DNA Center can change threshold values and push new signature files to the AP. · Enable or disable signature forensic capture from Cisco DNA Center. · Standalone signature detection only · Alarms only · GUI support · CLIs to view alarms · Static signature file packaged with controller and AP image · Export alarms to Cisco DNA Center through WSA channel Note aWIPS alarm details such as the AP MAC address, alarm ID, alarm string, and signature ID are displayed on the Cisco Catalyst 9800 series wireless controller GUI. Supported Modes and Platforms aWIPS is supported on the following controllers: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1350 Security Enabling Advanced WIPS(GUI) · Cisco Catalyst 9800 Series Wireless Controllers · Cisco Embedded Wireless Controller on Catalyst Access Points Note aWIPS is not supported on Cisco IOS APs. Enabling Advanced WIPS(GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Choose Configuration > Tags & Profiles > AP Join. Click Add. The Add AP Join Profile window is displayed. In the Add AP Join Profile window, click the Security tab. Under the aWIPS section, check the aWIPS Enable check box. Click Apply to Device. You will go back the to General tab. Click the Security tab. Under the aWIPS section, check the Forensic Enable check box. Click Apply to Device. Enabling Advanced WIPS (CLI) To enable aWIPS from the controller and ensure that aWIPS has higher priority than Hyperlocation, perform the following: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap profile profile-name Example: Device(config)# ap profile ap-profile-name Step 3 awips Example: Device(config-ap-profile)# awips Purpose Enters global configuration mode. Configures the default AP profile. Enables aWIPS. Note aWIPS is disabled by default on the controller. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1351 Configuring Syslog Threshold for Advanced WIPS (CLI) Security Step 4 Step 5 Step 6 Command or Action Purpose awips forensic Enables forensics for aWIPS alarms. Example: Device(conf-ap-profile)# awips forensic hyperlocation Example: Enables Hyperlocation on all the supported APs that are associated with this AP profile. Device(config-ap-profile)# hyperlocation end Example: Device(config-ap-profile)# end Returns to privileged EXEC mode. Configuring Syslog Threshold for Advanced WIPS (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 awips-syslog throttle period syslog-throttle-interval Example: Device(config)# awips-syslog throttle period 38 Configures the syslog threshold for aWIPS. syslog-throttle-interval: Enter the syslog throttle interval, in seconds. The range is from 30 to 600. Note The default throttling interval is 60 seconds. Step 3 end Example: Device(config)# end Returns to privileged EXEC mode. Viewing Advanced WIPS Alarms (GUI) Procedure Step 1 Step 2 Navigate to Monitoring > Security > aWIPS. To view the details of the alarms in the last 5 minutes, click the Current Alarms tab. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1352 Security Verifying Advanced WIPS Step 3 Step 4 To view the alarm count over an extended period of time, either hourly, for a day (24 hours) or more, click the Historical Statistics tab. Sort or filter the alarms based on the following parameters: · AP Radio MAC address · Alarm ID · Time Stamp · Signature ID · Alarm Description · Alarm Message Index Verifying Advanced WIPS To view the aWIPS status, use the show awips status radio_mac command: Device# show awips status 0xx7.8xx8.2xx0 AP Radio MAC AWIPS Status Forensic Capture Status Alarm Message Count ---------------------------------------------------------------------------------- 0xx7.8xx8.2xx0 ENABLED CONFIG_NOT_ENABLED 14691 The various aWIPS status indicators are: · ENABLED: aWIPS enabled. · NOT_SUPPORTED: The AP does not support AWIPS. · CONFIG_NOT ENABLED: aWIPS is not enabled on the AP. To view details of specific alarm signatures, use the show awips alarm signature signature_id command: Device# show awips alarm signature 10001 AP Radio MAC AlarmID Timestamp SignatureID Alarm Description Message Index ----------------------------------------------------------------------------------------------------------------- 0xx7.8xx8.2f80 1714 11/02/2020 13:02:19 10001 Authentication Flood 3966 To view alarm message statistics, use the show awips alarm statistics command: Device# show awips alarm statistics To view a list of alarms since the last clear, use the show awips alarm ap ap_mac detailed command: Device# show awips alarm ap 0xx7.8xx8.2f80 detailed AP Radio MAC AlarmID Timestamp SignatureID Alarm Description --------------------------------------------------------------------------------------------------------------- 0xx7.8xx8.2f80 2491 08/02/2022 17:44:40 10009 RTS Flood To view detailed alarm information, use the show awips alarm detailed command: Device# show awips alarm detailed Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1353 Verifying Syslog Configuration for Advanced WIPS Security AP Radio MAC AlarmID Timestamp SignatureID Alarm Description -------------------------------------------------------------------------------------------------- 7xx3.5xxd.d360 1 10/29/2020 23:21:27 10001 Authentication Flood by Source dxxc.3xx5.9460 71 10/29/2020 23:21:27 10001 Authentication Flood by Source 7xx3.5xxd.d360 2 10/29/2020 23:21:28 10002 Association Request Flood by Destination dxxc.3xx5.9460 72 10/29/2020 23:21:28 10002 Association Request Flood by Destination To view the alarms on a specific AP, use the show awips alarm ap radio_mac detailed command: Verifying Syslog Configuration for Advanced WIPS To verify the syslog configuration for aWIPS, use the following command: Device# show awips syslog throttle Syslog Throttle Interval (seconds) ------------------------------------------------------------------------------------------38 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1354 1 2 4 C H A P T E R Cisco TrustSec · Information about Cisco TrustSec, on page 1355 · Cisco TrustSec Features, on page 1356 · Security Group Access Control List, on page 1357 · Inline Tagging, on page 1359 · Policy Enforcement, on page 1359 · SGACL Support for Wireless Guest Access, on page 1360 · Enabling SGACL on the AP (GUI), on page 1360 · Enabling SGACL on the AP, on page 1361 · Enabling SGACL Policy Enforcement Globally (CLI), on page 1362 · Enabling SGACL Policy Enforcement Per Interface (CLI), on page 1363 · Manually Configuring a Device STG (CLI), on page 1363 · Configuring SGACL, Inline Tagging, and SGT in Local Mode (GUI), on page 1364 · Configuring SGACL, Inline Tagging, and SGT in Local Mode, on page 1364 · Configuring ISE for TrustSec, on page 1365 · Verifying Cisco TrustSec Configuration, on page 1366 Information about Cisco TrustSec Cisco TrustSec provides security improvements to Cisco network devices based on the capability to strongly identify users, hosts, and network devices within a network. TrustSec provides topology-independent and scalable access controls by uniquely classifying data traffic for a particular role. TrustSec ensures data confidentiality and integrity by establishing trust among authenticated peers and encrypting links with those peers. The key component of Cisco TrustSec is the Cisco Identity Services Engine (ISE). Cisco ISE can provision switches with TrustSec Identities and Security Group ACLs (SGACLs), though these may be configured manually on the switch. Note You should manually clear the CTS environment data using the clear cts environment-data command before changing CTS server to a new one. This ensures that you get the updated data while running show cts environment-data command. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1355 Cisco TrustSec Features Security Cisco TrustSec Features The table below lists the TrustSec features to be eventually implemented on TrustSec-enabled Cisco switches. Successive general availability releases of TrustSec will expand the number of switches supported and the number of TrustSec features supported per switch. Cisco TrustSec Feature 802.1AE Tagging (MACsec) Description Protocol for IEEE 802.1AE-based wire-rate hop-to-hop Layer 2 encryption. Between MACsec-capable devices, packets are encrypted on egress from the transmitting device, decrypted on ingress to the receiving device, and in the clear within the devices. This feature is only available between TrustSec hardware-capable devices. Endpoint Admission Control (EAC) EAC is an authentication process for an endpoint user or a device connecting to the TrustSec domain. Usually EAC takes place at the access level switch. Successful authentication and authorization in the EAC process results in Security Group Tag assignment for the user or device. Currently EAC can be 802.1X, MAC Authentication Bypass (MAB), and Web Authentication Proxy (WebAuth). Network Device Admission Control (NDAC) NDAC is an authentication process where each network device in the TrustSec domain can verify the credentials and trustworthiness of its peer device. NDAC utilizes an authentication framework based on IEEE 802.1X port-based authentication and uses EAP-FAST as its EAP method. Successful authentication and authorization in NDAC process results in Security Association Protocol negotiation for IEEE 802.1AE encryption. Security Group Access Control List (SGACL) A Security Group Access Control List (SGACL) associates a Security Group Tag with a policy. The policy is enforced upon SGT-tagged traffic egressing the TrustSec domain. Security Association Protocol (SAP) After NDAC authentication, the Security Association Protocol (SAP) automatically negotiates keys and the cipher suite for subsequent MACSec link encryption between TrustSec peers. SAP is defined in IEEE 802.11i. Security Group Tag (SGT) An SGT is a 16-bit single label indicating the security classification of a source in the TrustSec domain. It is appended to an Ethernet frame or an IP packet. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1356 Security Security Group Access Control List Cisco TrustSec Feature SGT Exchange Protocol (SXP) Description Security Group Tag Exchange Protocol (SXP). With SXP, devices that are not TrustSec-hardware-capable can receive SGT attributes for authenticated users and devices from the Cisco Identity Services Engine (ISE) or the Cisco Secure Access Control System (ACS). The devices can then forward a sourceIP-to-SGT binding to a TrustSec-hardware-capable device will tag the source traffic for SGACL enforcement. When both ends of a link support 802.1AE MACsec, SAP negotiation occurs. An EAPOL-key exchange occurs between the supplicant and the authenticator to negotiate a cipher suite, exchange security parameters, and manage keys. Successful completion of these tasks results in the establishment of a security association (SA). Depending on your software version and licensing and link hardware support, SAP negotiation can use one of these modes of operation: · Galois Counter Mode (GCM)--authentication and encryption · GCM authentication (GMAC)-- GCM authentication, no encryption · No Encapsulation--no encapsulation (clear text) · Null--encapsulation, no authentication or encryption Security Group Access Control List A security group is a group of users, end-point devices, and resources that share access control policies. Security groups are defined by the administrator in Cisco Identity Services Engine (ISE). As new users and devices are added to the Cisco TrustSec domain, the authentication server assigns these new entities to the appropriate security groups. Cisco TrustSec assigns each of the security group a unique 16-bit number whose scope is global in a Cisco TrustSec domain. The number of security groups in a wireless device is limited to the number of authenticated network entities. You do not have to manually configure the security group numbers. After a device is authenticated, Cisco TrustSec tags any packet that originates from that device with an SGT that contains the security group number of the device. The packet carries this SGT everywhere in the network, in the Cisco TrustSec header. As the SGT contains the security group of the source, the tag can be referred to as the source SGT (S-SGT). The destination device is also assigned to a security group (destination SG) that can be referred to as the destination SGT (D-SGT), even though the Cisco TrustSec packet does not contain the security group number of the destination device. You can control the operations that users can perform based on the security group assignments of users and destination resources, using the Security Group Access Control Lists (SGACLs). Policy enforcement in a Cisco TrustSec domain is represented by a permission matrix, with the source security group numbers on one axis and the destination security group numbers on the other axis. Each cell in the matrix body contains an ordered list of SGACLs, which specify the permissions that must be applied to packets originating from the source security group and destined for the destination security group. When a wireless client is authenticated, the controller downloads all the SGACLs in the matrix cells. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1357 Security Group Access Control List Security When a wireless client connects to the network, the client pushes all the ACLs to the controller . Cisco TrustSec achieves role-based topology-independent access control in a network by assigning users and devices in the network to security groups and applying access control between the security groups. The SGACLs define access control policies based on the device identities. As long as the roles and permissions remain the same, changes to the network topology do not change the security policy. When a user is added to the wireless group, you simply assign the user to an appropriate security group; the user immediately receives permissions to that group. The size of ACLs are reduced and their maintenance is simplified with the use of role-based permissions. With Cisco TrustSec, the number of Access Control Entities (ACEs) that are configured is determined by the number of permissions specified, resulting in a much smaller number of ACEs. To know the list of Cisco APs that support SGACL, see the release notes: https://www.cisco.com/c/en/us/ support/wireless/catalyst-9800-series-wireless-controllers/products-release-notes-list.html Note Clients receive zero SGT value and DHCP clients receive an Automatic Private IP Addressing (APIPA) address when TrustSec policy "unknown to unknown" is denied in TrustSec matrix. Clients receive correct SGT values and DHCP clients receive an IP address when TrustSec policy "unknown to unknown" is permitted in TrustSec matrix. The scenarios supported for SGACLs on the Cisco Catalyst 9800 Series Wireless Controller are: · Wireless-to-wireless (within Enterprise network): · Flex mode with local switching--SGACL enforcement is done on the egress AP when a packet leaves from a source wireless network to a destination wireless network. · Flex mode with central switching--SGACL enforcement is done on the egress AP. To achieve this, controller should export IP address to security group tag (IP-SGT) binding over SGT Exchange Protocol (SXP). · Wired-to-wireless (DC-to-Enterprise network)--Enforcement takes place when a packet reaches the destination AP. · Wireless-to-wired (Enterprise network-to-DC)--Enforcement takes place on the uplink switch when a packet reaches the ingress of the wired network. Guidelines and Restrictions · SGACL enforcement is carried out on the controller for local mode. · SGACL enforcement is carried out on an AP for flex-mode APs performing local switching. · SGACL enforcement for wireless clients is carried out either on the upstream switch or on the border gateway in a Branch-to-DC scenario. · SGACL enforcement is not supported for non-IP or IP broadcast or multicast traffic. · Per-WLAN SGT assignment is not supported. · SGACL enforcement is not carried out for control-plane traffic between an AP and the wireless controller (for upstream or from upstream traffic). Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1358 Security Inline Tagging · Non-static SGACL configurations are supported only for dynamic SGACL policies received from ISE. · Static SGACL configuration on an AP is not supported. Inline Tagging Inline tagging is a transport mechanism using which a controller or AP understands the source SGT. Transport mechanism is of two types: · Central switching--For centrally switched packets, the controller performs inline tagging of all the packets sourced from wireless clients that are associated with the controller, by tagging it with the Cisco Meta Data (CMD) tag. For packets that are inbound from the distribution system, inline tagging also involves the controller stripping off the CMD header from the packet to learn the S-SGT tag. Thereafter, the controller forwards the packet including the S-SGT, for SGACL enforcement. · Local switching--To transmit locally switched traffic, an AP performs inline tagging for packets that are associated with the AP and sourced from clients. To receive traffic, the AP handles both locally switched packets and centrally switched packets, uses the S-SGT tag for packets, and applies the SGACL policy. With wireless Cisco TrustSec enabled on the controller , the choice of enabling and configuring SXP to exchange tags with the switches is optional. Both wireless Cisco TrustSec and SXP modes are supported; however, there is no use case to have both wireless Cisco TrustSec (on an AP) and SXP to be in the enabled state concurrently. Consideration and Restriction for Inline Tagging over Port-Channel · Configure the cts manual command on port-channel and its member interfaces to send or receive a tagged packet. · If you downgrade to Cisco IOS XE releases that do not support inline tagging over port-channel, the port-channel may be suspended. Note The inline tagging over port-channel is supported in Cisco IOS XE 17.3.517.6.317.8.1 release. Policy Enforcement Cisco TrustSec access control is implemented using ingress tagging and egress enforcement. At the ingress point to the Cisco TrustSec domain, the traffic from the source is tagged with an SGT containing the security group number of the source entity. The SGT is propagated across the domain with the traffic. At the egress point of the Cisco TrustSec domain, an egress device uses the source SGT (S-SGT) and the security group of the destination entity (D-SGT) to determine the access policy to apply from the SGACL policy matrix. Policy enforcement can be applied to both central and local switched traffic on an AP. If wired clients communicate with wireless clients, the AP enforces the downstream traffic. If wireless clients communicate with wired clients, the AP enforces the upstream traffic. This way, the AP enforces traffic in both downstream Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1359 SGACL Support for Wireless Guest Access Security and wireless-to-wireless traffic. You require S-SGT, D-SGT, and ACLs for the enforcement to work. APs get the SGT information for all the wireless clients from the information available on the Cisco ISE server. Note A Cisco AP must be in either Listener or Both (Listener and Speaker) mode to enforce traffic because the Listener mode maintains the complete set of IP-SGT bindings. After you enable the enforcement on a an AP, the corresponding policies are downloaded and pushed to the AP. SGACL Support for Wireless Guest Access When a client joins the wireless network (WLAN), its session is managed by the Cisco Catalyst 9800 Series Wireless LAN Controller (WLC) that the AP is connected to is the foreign controller. Auto-Anchor Mobility allows a specific WLAN (for example, Guest WLAN) to be anchored to a particular controller, regardless of the client's entry point into the network. Auto-Anchor Mobility is the wireless Guest service where all guest traffic tunnels back to the DMZ controller irrespective of where they associate with the network. In case of Auto-Anchor mobility, the following apply to Cisco TrustSec support: · Classification: Occurs during authentication and hence on Foreign for Layer 2 security WLANs and on Anchor for Layer 3 security cases. · Propagation: Always occurs at the Anchor where the client traffic enters the wired network. · Enforcement: SGACL download and enforcement occurs on Anchor; the Anchor controller must have the connectivity to Cisco Identity Services Engine (ISE) and be registered as Network Access Server (NAS). Enforcement is not supported on foreign controller even when the enforcement CLI is configured on foreign controller. This feature is supported in local mode and in Flex Central Switching of the controller. Flex mode with local switching and Fabric mode are not supported in guest scenarios as traffic does not go through the controller. Roaming of a guest client occurs only at Guest Foreign controller and the Guest Anchor remains fixed. The different types of supported roam are Inter-Controller roaming and Intra-Controller roaming. Roaming under WebAuth pending is a special case which is also supported for Central Web Authentication (CWA) and Local Web Authentication (LWA). Enabling SGACL on the AP (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Tags & Profiles > Flex. Click Add. In the General tab, check Inline Tagging and SGACL Enforcement check boxes and choose the CTS Profile Name from the CTS Profile Name drop-down list. Click Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1360 Security Enabling SGACL on the AP Enabling SGACL on the AP Note Use the no form of the commands given below to disable the configuration. For example, cts role-based enforcement disables role-based access control enforcement for APs. Before you begin · Security Group Access Control List (SGACL) on an AP can be enabled only when the wireless controller is in flexconnect mode. · Configure the cts manual command on the uplink port to send or receive a tagged packet. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. wireless profile flex flex-profile Example: Configures an RF profile and enters RF profile configuration mode. Device(config)# wireless profile flex xyz-flex-profile cts role-based enforcement Example: Enables role-based access control enforcement for the AP. Device(config-wireless-flex-profile)# cts role-based enforcement cts inline-tagging Enables inline tagging on the AP. Example: Device(config-wireless-flex-profile)# cts inline-tagging cts profile profile-name Enables the CTS profile name. Example: Device(config-wireless-flex-profile)# cts profile xyz-profile exit Returns to global configuration mode. Example: Device(config-wireless-flex-profile)# exit Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1361 Enabling SGACL Policy Enforcement Globally (CLI) Security Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action wireless tag site site-name Example: Device(config)# wireless tag site xyz-site Purpose Configures a site tag and enters site tag configuration mode. flex-profile flex-profile-name Configures a flex profile. Example: Device(config-site-tag)# flex-profile xyz-flex-profile exit Example: Device(config-site-tag)# exit Returns to global configuration mode. ap mac-address Example: Device(config)# ap F866.F267.7DFB Configures an AP and enters AP profile configuration mode. site-tag site-tag-name Maps a site tag to an AP. Example: Device(config-ap-tag)# site-tag xyz-site What to do next Use the show cts ap sgt-info ap-namecommand to verify the SGACL configuration on the AP. Enabling SGACL Policy Enforcement Globally (CLI) You must enable SGACL policy enforcement globally on Cisco Catalyst 9800 Series Wireless Controller. The same configuration commands that are used for enforcement of IPv4 traffic apply for IPv6 traffic as well. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 cts role-based enforcement Example: Device(config)# cts role-based enforcement Purpose Enters global configuration mode. Enables Cisco TrustSec SGACL policy enforcement on routed interfaces. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1362 Security Enabling SGACL Policy Enforcement Per Interface (CLI) Enabling SGACL Policy Enforcement Per Interface (CLI) After enabling the SGACL policy enforcement globally, you will have to enable Cisco TrustSec-on the uplink interfaces. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 interface gigabitethernet interface number Specifies interface on which to enable or disable Example: SGACL enforcement. Device(config)# interface gigabitethernet 1 Step 3 cts role-based enforcement Example: Device(config-if)# cts role-based enforcement Enables Cisco TrustSec SGACL policy enforcement on routed interfaces. Step 4 do show cts interface Verifies that SGACL enforcement is enabled. Example: Device(config-if)# do show cts interface Manually Configuring a Device STG (CLI) In normal Cisco TrustSec operation, the authentication server assigns an SGT to the device for packets originating from the device. You can manually configure an SGT to be used if the authentication server is not accessible, but an authentication server-assigned SGT will take precedence over a manually-assigned SGT. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-policy Example: Configures a WLAN policy profile and enters wireless policy configuration mode. Device(config)# wireless profile policy rr-xyz-policy-1 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1363 Configuring SGACL, Inline Tagging, and SGT in Local Mode (GUI) Security Step 3 Step 4 Command or Action Purpose cts sgt sgt-value Example: Specifies the Security Group Tag (SGT) number. Valid values are from 0 to 65,535. Device(config-wireless-policy)# cts stg 200 exit Example: Device(config-wireless-policy)# exit Returns to global configuration mode. Configuring SGACL, Inline Tagging, and SGT in Local Mode (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > Policy. Click the Policy Profile Name. The Edit Policy Profile is displayed. Choose General tab. In the CTS Policy settings, check or uncheck the Inline Tagging and SGACL Enforcement check boxes, and enter the Default SGT value. Click Update & Apply to Device. Configuring SGACL, Inline Tagging, and SGT in Local Mode Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-name Creates a policy profile for the WLAN. Example: Device(config)# wireless profile policy xyz-policy-profile Step 3 cts inline-tagging Example: Enables CTS inline tagging. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1364 Security Configuring ISE for TrustSec Step 4 Step 5 Command or Action Device(config-wireless-policy)# cts inline-tagging Purpose Note You will also need to configure the cts manual in the physical interface. If the cts manual is configured in the physical interface and cts inline-tagging is skipped, the packets will still remain tagged at egress in the controller. cts role-based enforcement Example: Device(config-wireless-policy)# cts role-based enforcement Enables CTS SGACL enforcement. cts sgt sgt-value (Optional) Sets the default Security Group Tag Example: (SGT). Device(config-wireless-policy)# cts sgt Note 100 SGT is required for a user session only when the client uses open authentication, and not the ISE server. Configuring ISE for TrustSec Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 radius server server-name Example: Device(config)# radius server Test-SERVER1 Specifies the RADIUS server name. Step 3 address ipv4 ip address Example: Device(config-radius-server)# address ipv4 124.3.50.62 Specifies the primary RADIUS server parameters. Step 4 pac key key Example: Device(config-radius-server)# pac key cisco Specify the authentication and encryption key used between the Device and the key string RADIUS daemon running on the RADIUS server. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1365 Verifying Cisco TrustSec Configuration Security Step 5 Step 6 Step 7 Step 8 Command or Action exit Example: Device(config-radius-server)# exit Purpose Returns to the configuration mode. aaa group server radius server-group Creates a radius server-group identification. Example: Note Device(config)# aaa group server radius authc-server-group server-group refers to the server group name. The valid range is from 1 to 32 alphanumeric characters. cts authorization list mlist-name Creates a CTS authorization list. Example: Device(config)# cts authorization list authc-list aaa authorization network mlist-name group Creates an authorization method list for name web-based authorization. Example: Note Device(config)# aaa authorization network default group group1 Ensure that the ISE IP address configured on your controller is the same as the IP address configured on ISE (Work Center > TrustSec > Components > Trustsec AAA Servers) Note If the ISE version is 002.005(000.239), 002.004(000.357), 002.003(000.298), 002.002(000.470), 002.001(000.474), 002.000(001.130), or 002.000(000.306), use the access-session tls-version 1.0 command to download PAC from ISE. For other ISE versions, the above command is not required. Verifying Cisco TrustSec Configuration To display the wireless CTS SGACL configuration summary, use the following command: Device# show wireless cts summary Local Mode CTS Configuration Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1366 Security Verifying Cisco TrustSec Configuration Policy Profile Name SGACL Enforcement Inline-Tagging Default-Sgt ---------------------------------------------------------------------------------------- xyz-policy DISABLED ENABLED 0 wireless-policy1 DISABLED DISABLED 0 w-policy-profile1 DISABLED DISABLED 0 default-policy-profile DISABLED DISABLED 0 Flex Mode CTS Configuration Flex Profile Name SGACL Enforcement Inline-Tagging ----------------------------------------------------------------------- xyz-flex DISABLED ENABLED demo-flex DISABLED DISABLED flex-demo DISABLED DISABLED xyz-flex-profile DISABLED DISABLED default-flex-profile DISABLED DISABLED To display CTS-specific configuration status for various wireless profiles, use the following command: Device# show cts wireless profile policy xyz-policy Policy Profile Name CTS Role-based enforcement Inline-tagging Default SGT : 100 : xyz-policy : ENABLED : ENABLED Policy Profile Name : foo2 CTS Role-based enforcement : DISABLED Inline-tagging : ENABLED Default SGT : NOT-DEFINED Policy Profile Name CTS Role-based enforcement Inline-tagging Default SGT : 65001 : foo3 : DISABLED : DISABLED To display CTS configuration for a given wireless profile, use the following command: Device# show wireless profile policy detailed xyz-policy Policy Profile Name Description Status VLAN Client count Passive Client ET-Analytics StaticIP Mobility ! . . .WGB Policy Params Broadcast Tagging Client VLAN Mobility Anchor List IP Address CTS Role-based enforcement : xyz-policy : : DISABLED :1 :0 : DISABLED : DISABLED : DISABLED : DISABLED : DISABLED : ENABLED Priority Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1367 Verifying Cisco TrustSec Configuration Inline-tagging Default SGT : ENABLED : NOT-DEFINED Security Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1368 1 2 5 C H A P T E R SGT Inline Tagging and SXPv4 · Introduction to SGT Inline Tagging on AP and SXPv4, on page 1369 · Creating an SXP Profile, on page 1369 · Configuring SGT Inline Tagging on Access Points, on page 1370 · Configuring an SXP Connection (GUI), on page 1370 · Configuring an SXP Connection, on page 1371 · Verifying SGT Push to Access Points, on page 1372 Introduction to SGT Inline Tagging on AP and SXPv4 The Cisco TrustSec (CTS) builds secure networks by establishing domains of trusted network devices. Each device in the domain is authenticated by its peers. Communication on the links between devices in the domain is secured with a combination of encryption, message integrity check, and data-path replay protection mechanisms. The Scalable Group Tag (SGT) Exchange Protocol (SXP) is one of the several protocols that support CTS. CTS SXP version 4 (SXPv4) enhances the functionality of SXP by adding a loop detection mechanism to prevent stale binding in the network. In addition, Cisco TrustSec supports SGT inline tagging which allows propagation of SGT embedded in clear-text (unencrypted) ethernet packets. When a wireless client is connected and is authenticated by ISE, the IP-SGT binding is generated on the controller . The same SGT is pushed to the AP along with the other client details. For more details on SGT inline tagging on the AP and SXPv4, see the Cisco TrustSec Configuration Guide at: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_cts/configuration/xe-3s/sec-usr-cts-xe-3s-book/ sec-cts-sxpv4.html Creating an SXP Profile Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1369 Configuring SGT Inline Tagging on Access Points Security Step 2 Step 3 Command or Action Purpose wireless cts-sxp profile profile-name Example: Configures a wireless CTS profile and enters cts-sxp profile configuration mode. Device(config)# wireless cts-sxp profile rr-profile cts sxp enable Enables SXP for Cisco TrustSec. Example: Device(config-cts-sxp-profile)# cts sxp enable Configuring SGT Inline Tagging on Access Points Follow the procedure given below to configure SGT inline tagging on APs: Before you begin · The SGTs pushed to the AP for inline tagging will only be from dynamic SGT allocation through ISE authentication. It is not supported for static bindings configured on the controller . · SGTs will be pushed to an AP only when it is operating in flex mode. To know the list of Cisco APs that support SGT inline tagging, see the release notes: https://www.cisco.com/ c/en/us/support/wireless/catalyst-9800-series-wireless-controllers/products-release-notes-list.html Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters the global configuration mode. Step 2 wireless profile flex flex-profile Example: Device(config)# wireless profile flex rr-xyz-flex-profile Configures a wireless flex profile and enters the wireless flex profile configuration mode. Step 3 cts inline-tagging Example: Device(config-wireless-flex-profile)# cts inline-tagging Enables inline-tagging on the AP. Configuring an SXP Connection (GUI) Perform the following steps to set SXP global configuration. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1370 Security Configuring an SXP Connection Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Step 15 Step 16 Step 17 Step 18 Step 19 Step 20 Step 21 Step 22 Step 23 Step 24 Step 25 In the Global section, select the SXP Enabled check box to enable SXP. Enter an IP address in the Default Source IP field. Enter a value in the Reconciliation Period (sec) field. Enter a value in the Retry Period (sec) field. Select the Set New Default Password check box. Selecting this check box displays the Password Type and Enter Password fields. Choose any one of the available types from the Password Type drop-down list. Enter a value in the Enter Password field. Click the Apply button. In the Peer section, click the Add button. Enter an IP address in the Peer IP field. Enter an IP address in the Source IP field. Choose any one of the available types from the Password drop-down list. Choose any one of the available types from the Mode of Local Device drop-down list. Click the Save & Apply to Device button. In the AP tab, click the Add button. The Add SXP AP dialog box appears. Enter a name for the profile in the Profile Name field. Set the Status field to Enabled to enable AP. Enter a value in the Default Password field. Enter a value (in seconds) for the CTS Speaker Seconds, CTS Recon Period, CTS Retry Period, CTS Listener Maximum, and CTS Listener Minimum In the CTS SXP Profile Connections section, click Add. Enter an IP address in the Peer IP field. Choose any one of the modes from the Connection Mode drop-down list. The available modes are Both, Listener, and Speaker. From the Password Type drop-down list, choose either None or Default. Click the Add button. Click the Save & Apply to Device button. Configuring an SXP Connection Follow the procedure given below to configure an SXP connection: Procedure Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1371 Verifying SGT Push to Access Points Security Step 2 Step 3 Command or Action Device# configure terminal Purpose cts sxp enable Example: Device(config)# cts sxp enable Enables CTS SXP support. cts sxp connection peer ipv4-address password none mode local speaker Configures the CTS-SXP peer address connection. Example: Note Device(config)# cts sxp connection peer 1.1.1.1 password none mode local speaker The password need not be none always and the mode can either be Speaker or Listener, or Both. What to do next Use the following command to verify the configuration: Device# show running-config | inc sxp Verifying SGT Push to Access Points When a wireless client is connected and authenticated by ISE, the IP-SGT binding is generated on the controller . This can be verified using the following commands: Device# show cts role-based sgt-map all Active IPv4-SGT Bindings Information IP Address SGT Source ============================================ 1.1.1.1 100 CLI IP-SGT Active Bindings Summary ============================================ Total number of CLI bindings = 1 Total number of active bindings = 1 Use the following command to verify the SXP connections status: Device# show cts sxp connections SXP : Enabled Highest Version Supported: 4 Default Password : Not Set Default Source IP: Not Set Connection retry open period: 120 secs Reconcile period: 120 secs Retry open timer is running Peer-Sequence traverse limit for export: Not Set Peer-Sequence traverse limit for import: Not Set ---------------------------------------------- Peer IP : 40.1.1.1 Source IP : 40.1.1.2 Conn status : On Conn version :4 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1372 Security Verifying SGT Push to Access Points Conn capability : IPv4-IPv6-Subnet Conn hold time : 120 seconds Local mode : SXP Listener Connection inst# : 1 TCP conn fd :1 TCP conn password: none Hold timer is running Duration since last state change: 0:00:00:06 (dd:hr:mm:sec) Total num of SXP Connections = 1 Use the following command to see the bindings learnt over SXP connection: Device# show cts role-based sgt-map all Active IPv4-SGT Bindings Information IP Address SGT Source ============================================ 1.1.1.1 100 CLI IP-SGT Active Bindings Summary ============================================ Total number of CLI bindings = 1 Total number of active bindings = 1 Use the following commands on the AP to check the status of inline tagging on the AP and its IP-SGT bindings: AP# show capwap client rcb AdminState : ADMIN_ENABLED OperationState : UP Name : AP2C33.1185.C4D0 SwVer : 16.6.230.41 HwVer : 1.0.0.0 MwarApMgrIp : 9.3.72.38 MwarName : mohit-ewlc MwarHwVer : 0.0.0.0 Location : default location ApMode : FlexConnect ApSubMode : Not Configured CAPWAP Path MTU : 1485 CAPWAP UDP-Lite : Enabled IP Prefer-mode : IPv4 AP Link DTLS Encryption : OFF AP TCP MSS Adjust : Disabled LinkAuditing : disabled Efficient Upgrade State : Disabled Flex Group Name : anrt-flex AP Group Name : default-group Cisco Trustsec Config AP Inline Tagging Mode : Enabled ! The status can be Enabled or Disabled and is based on the tag that is pushed to the AP. AP Sgacl Enforcement : Disabled AP Override Status : Disabled AP# show cts role-based sgt-map all Active IPv4-SGT Bindings Information IP SGT SOURCE 9.3.74.101 17 LOCAL Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1373 Verifying SGT Push to Access Points IP-SGT Active Bindings Summary ============================================ Total number of LOCAL bindings = 1 Total number of active bindings = 1 Active IPv6-SGT Bindings Information IP SGT SOURCE fe80::c1d5:3da2:dc96:757d 17 LOCAL IP-SGT Active Bindings Summary ============================================ Total number of LOCAL bindings = 1 Total number of active bindings = 1 Security Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1374 1 2 6 C H A P T E R Multiple Cipher Support · Default Ciphersuites Supported for CAPWAP-DTLS, on page 1375 · Configuring Multiple Ciphersuites, on page 1376 · Setting Server Preference, on page 1377 · Verifying Operational Ciphersuites and Priority, on page 1377 Default Ciphersuites Supported for CAPWAP-DTLS From Cisco IOS XE Bengaluru 17.5.1, Elliptic Curve Diffie-Hellman Ephemeral (ECDHE)/Galois Counter Mode (GCM) ciphersuite with perfect forward secrecy (PFS) capability is added in the default list along with the existing AES128-SHA ciphersuite. All Cisco access point (AP) models, except the Cisco IOS APs, will prioritize this PFS ciphersuite for CAPWAP-DTLS under default configuration. Note If link encryption is enabled for secure data channel traffic, then COS AP (DTLS client) will prioritize DHE-RSA-AES128-SHA over ECDHE/GCM ciphersuite. During DTLS handshake, the preference order of the ciphersuites are important. This feature allows you to set the order of priority while configuring cipher suites. When explicit ciphersuites are not configured, default ciphersuites that are listed in the table below are applied. Table 98: Default Ciphersuites Security Mode FIPS and non-FIPS Ciphersuite · TLS_RSA_WITH_AES_128_CBC_SHA · TLS_DHE_RSA_WITH_AES_128_CBC_SHA · TLS_DHE_RSA_WITH_AES_256_CBC_SHA · TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 · TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 · TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 · TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1375 Configuring Multiple Ciphersuites Security Security Mode WLANCC Ciphersuite · TLS_DHE_RSA_WITH_AES_128_CBC_SHA · TLS_DHE_RSA_WITH_AES_256_CBC_SHA · TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 · TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 · TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 · TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 This feature is supported on all variants of the Cisco Catalyst 9800 Series Wireless Controllers and APs, except Cisco Industrial Wireless 3702 Access Point. For a list of controllers and APs supported in a particular release, see the release notes available at: https://www.cisco.com/c/en/us/support/wireless/catalyst-9800-series-wireless-controllers/ products-release-notes-list.html Configuring Multiple Ciphersuites Note · If a controller is loaded with a startup configuration having a version of ciphersuite selection configuration that is earlier than Cisco IOS XE Bengaluru 17.5.1, it it is auto converted to the latest version of ciphersuite selection configuration. · Any change in the ciphersuite configuration results in AP flap. · If you downgrade to a version earlier than Cisco IOS XE Bengaluru 17.5.1, ciphersuite configurations are lost. · While downgrading to a version below 17.12.1 in FIPS mode or WLANCC mode, ensure ECDHE-RSA-AES128-GCM-SHA256 cipher suite is selected for AP DTLS (by default it is selected), else a downgrade will be impacted on all the COS APs. · This can be verified by using the show wireless certification config command. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap dtls-ciphersuite priority priority-num ciphersuite Example: Purpose Enters global configuration mode. Sets priority for a paricular cipher suite. Use zero (0) to set the highest priority. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1376 Security Setting Server Preference Step 3 Command or Action Device(config)# ap dtls-ciphersuite priority 2 TLS_DHE_RSA_WITH_AES_128_CBC_SHA exit Example: Device(config)# exit Purpose Note Configuration changes, if any, will automatically disconnect the existing APs. Returns to privileged EXEC mode. Setting Server Preference Ciphersuite configuration enforces the priority order in a DTLS handshake. To give equal priority for all the configured ciphersuites, then use no ciphersuite server-preference command in the corresponding AP join profile. By default, server preference is enabled. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap profile profile-name Example: Device(config)# ap profile xxy Step 3 [no] ciphersuite server-preference Example: Device(config-ap-profile)# [no] ciphersuite server-preference Step 4 exit Example: Device(config)# exit Purpose Enters global configuration mode. Configures an AP profile and enters AP profile configuration mode. Sets the cipher suite server preference. Use the no form of this command to disable server preference. By default, server preference is enabled. Returns to global configuration mode. Verifying Operational Ciphersuites and Priority To view the operational ciphersuites and their priority, use the following command: Device# show wireless certification config WLANCC AP DTLS Version : Not Configured : DTLS v1.0 - v1.2 AP DTLS Cipher Suite List: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1377 Verifying Operational Ciphersuites and Priority Security Priority Ciphersuite -------------------------------------------------------------------------------- 0 AES128-SHA 1 DHE-RSA-AES256-SHA256 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1378 1 2 7 C H A P T E R Configuring Secure Shell · Information About Configuring Secure Shell , on page 1379 · Prerequisites for Configuring Secure Shell, on page 1381 · Restrictions for Configuring Secure Shell, on page 1382 · How to Configure SSH, on page 1382 · Monitoring the SSH Configuration and Status, on page 1385 Information About Configuring Secure Shell Secure Shell (SSH) is a protocol that provides a secure, remote connection to a device. SSH provides more security for remote connections than Telnet does by providing strong encryption when a device is authenticated. This software release supports SSH Version 1 (SSHv1) and SSH Version 2 (SSHv2). SSH and Device Access Secure Shell (SSH) is a protocol that provides a secure, remote connection to a device. SSH provides more security for remote connections than Telnet does by providing strong encryption when a device is authenticated. This software release supports SSH Version 1 (SSHv1) and SSH Version 2 (SSHv2). SSH functions the same in IPv6 as in IPv4. For IPv6, SSH supports IPv6 addresses and enables secure, encrypted connections with remote IPv6 nodes over an IPv6 transport. SSH Servers, Integrated Clients, and Supported Versions The Secure Shell (SSH) Integrated Client feature is an application that runs over the SSH protocol to provide device authentication and encryption. The SSH client enables a Cisco device to make a secure, encrypted connection to another Cisco device or to any other device running the SSH server. This connection provides functionality similar to that of an outbound Telnet connection except that the connection is encrypted. With authentication and encryption, the SSH client allows for secure communication over an unsecured network. The SSH server and SSH integrated client are applications that run on the switch. The SSH server works with the SSH client supported in this release and with non-Cisco SSH clients. The SSH client works with publicly and commercially available SSH servers. The SSH client supports the ciphers of Data Encryption Standard (DES), 3DES, and password authentication. The switch supports an SSHv1 or an SSHv2 server. The switch supports an SSHv1 client. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1379 SSH Configuration Guidelines Security Note The SSH client functionality is available only when the SSH server is enabled. User authentication is performed like that in the Telnet session to the device. SSH also supports the following user authentication methods: · TACACS+ · RADIUS · Local authentication and authorization SSH Configuration Guidelines Follow these guidelines when configuring the switch as an SSH server or SSH client: · An RSA key pair generated by a SSHv1 server can be used by an SSHv2 server, and the reverse. · If the SSH server is running on an active switch and the active switch fails, the new active switch uses the RSA key pair generated by the previous active switch. · If you get CLI error messages after entering the crypto key generate rsa global configuration command, an RSA key pair has not been generated. Reconfigure the hostname and domain, and then enter the crypto key generate rsa command. · When generating the RSA key pair, the message No host name specified might appear. If it does, you must configure a hostname by using the hostname global configuration command. · When generating the RSA key pair, the message No domain specified might appear. If it does, you must configure an IP domain name by using the ip domain-name global configuration command. · When configuring the local authentication and authorization authentication method, make sure that AAA is disabled on the console. Secure Copy Protocol Overview The Secure Copy Protocol (SCP) feature provides a secure and authenticated method for copying switch configurations or switch image files. SCP relies on Secure Shell (SSH), an application and a protocol that provides a secure replacement for the Berkeley r-tools. For SSH to work, the switch needs an RSA public/private key pair. This is the same with SCP, which relies on SSH for its secure transport. Because SSH also relies on AAA authentication, and SCP relies further on AAA authorization, correct configuration is necessary. · Before enabling SCP, you must correctly configure SSH, authentication, and authorization on the switch. · Because SCP relies on SSH for its secure transport, the router must have an Rivest, Shamir, and Adelman (RSA) key pair. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1380 Security Secure Copy Protocol Note When using SCP, you cannot enter the password into the copy command. You must enter the password when prompted. Secure Copy Protocol The Secure Copy Protocol (SCP) feature provides a secure and authenticated method for copying device configurations or switch image files. The behavior of SCP is similar to that of remote copy (rcp), which comes from the Berkeley r-tools suite, except that SCP relies on SSH for security. SCP also requires that authentication, authorization, and accounting (AAA) authorization be configured so the device can determine whether the user has the correct privilege level. To configure the Secure Copy feature, you should understand the SCP concepts. SFTP Support SFTP client support is introduced from Cisco IOS XE Gibraltar 16.10.1 release onwards. SFTP client is enabled by default and no separate configuration required. The SFTP procedures can be invoked using the copy command, which is similar to that of scp and tftp commands. A typical file download procedure using sftp command can be carried out as shown below: copy sftp://user :password @server-ip/file-name flash0:// file-name For more details on the copy command, see the following URL: https://www.cisco.com/c/m/en_us/techdoc/dc/reference/cli/nxos/commands/fund/copy.html Prerequisites for Configuring Secure Shell The following are the prerequisites for configuring the switch for secure shell (SSH): · For SSH to work, the switch needs an Rivest, Shamir, and Adleman (RSA) public/private key pair. This is the same with Secure Copy Protocol (SCP), which relies on SSH for its secure transport. · Before enabling SCP, you must correctly configure SSH, authentication, and authorization on the switch. · Because SCP relies on SSH for its secure transport, the router must have an Rivest, Shamir, and Adelman (RSA) key pair. · SCP relies on SSH for security. · SCP requires that authentication, authorization, and accounting (AAA) authorization be configured so the router can determine whether the user has the correct privilege level. · A user must have appropriate authorization to use SCP. · A user who has appropriate authorization can use SCP to copy any file in the Cisco IOS File System (IFS) to and from a switch by using the copy command. An authorized administrator can also do this from a workstation. · The Secure Shell (SSH) server requires an IPsec (Data Encryption Standard [DES] or 3DES) encryption software image; the SSH client requires an IPsec (DES or 3DES) encryption software image.) Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1381 Restrictions for Configuring Secure Shell Security · Configure a hostname and host domain for your device by using the hostname and ip domain-name commands in global configuration mode. Note While upgrading from 16.11 to a later version, if you encounter a host key change by SSH client, you need to know the following: · Wave 2 AP now supports a third key type ED25519 along with the RSA and ECDSA keys. · The RSA and ECDSA keys are used for normal operations. · The ED25519 key is used for FIPS mode. Restrictions for Configuring Secure Shell The following are restrictions for configuring the device for secure shell. · The switch supports Rivest, Shamir, and Adelman (RSA) authentication. · SSH supports only the execution-shell application. · The SSH server and the SSH client are supported only on Data Encryption Standard (DES) (56-bit) and 3DES (168-bit) data encryption software. In DES software images, DES is the only encryption algorithm available. In 3DES software images, both DES and 3DES encryption algorithms are available. · The device supports the Advanced Encryption Standard (AES) encryption algorithm with a 128-bit key, 192-bit key, or 256-bit key. However, symmetric cipher AES to encrypt the keys is not supported. · When using SCP, you cannot enter the password into the copy command. You must enter the password when prompted. · The login banner is not supported in Secure Shell Version 1. It is supported in Secure Shell Version 2. · The -l keyword and userid :{number} {ip-address} delimiter and arguments are mandatory when configuring the alternative method of Reverse SSH for console access. · To authenticate clients with freeradius over RADSEC, you should generate an RSA key longer than 1024 bit. Use the crypto key generate rsa general-keys exportable label label-name command to achieve this. How to Configure SSH Setting Up the Device to Run SSH Follow the procedure given below to set up your device to run SSH: Before you begin Configure user authentication for local or remote access. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1382 Security Configuring the SSH Server Procedure Step 1 Command or Action configure terminal Example: Device# Device# configure terminal Purpose Enters global configuration mode. Step 2 hostname hostname Example: Device(config)# hostname your_hostname Configures a hostname and IP domain name for your device. Note Follow this procedure only if you are configuring the device as an SSH server. Step 3 ip domain name domain_name Example: Configures a host domain for your device. Device(config)# ip domain name your_domain Step 4 Step 5 crypto key generate rsa Enables the SSH server for local and remote Example: authentication on the device and generates an RSA key pair. Generating an RSA key pair for the device automatically enables SSH. Device(config)# crypto key generate rsa We recommend that a minimum modulus size of 1024 bits. When you generate RSA keys, you are prompted to enter a modulus length. A longer modulus length might be more secure, but it takes longer to generate and to use. Note Follow this procedure only if you are configuring the device as an SSH server. end Example: Device(config)# end Exits configuration mode. Configuring the SSH Server Follow the procedure given below to configure the SSH server: Note This procedure is only required if you are configuring the device as an SSH server. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1383 Configuring the SSH Server Security Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ip ssh version [2] Example: Device(config)# ip ssh version 2 Step 3 ip ssh window-size Example: Device(config)# ip ssh window-size Purpose Enters global configuration mode. (Optional) Configures the device to run SSH Version 2. If you do not enter this command or do not specify a keyword, the SSH server selects the latest SSH version supported by the SSH client. Specifies the SSH window size. The recommended window size is 32K or lesser that that. The default window size is 8912. Selecting window-size greater than 32K might have some impact on the CPU, until unless: · The network bandwidth is good. · Client can accommodate this size. · No latency in network. Note This CLI is recommended only for SCP operations and can be disabled once the copy is done. Step 4 ip ssh {timeout seconds | authentication-retries number} Example: Device(config)# ip ssh timeout 90 authentication-retries 2 Configures the SSH control parameters: · Specify the time-out value in seconds; the default is 120 seconds. The range is 0 to 120 seconds. This parameter applies to the SSH negotiation phase. After the connection is established, the device uses the default time-out values of the CLI-based sessions. By default, up to five simultaneous, encrypted SSH connections for multiple CLI-based sessions over the network are available (session 0 to session 4). After the execution shell starts, the CLI-based session time-out value returns to the default of 10 minutes. · Specify the number of times that a client can re-authenticate to the server. The default is 3; the range is 0 to 5. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1384 Security Monitoring the SSH Configuration and Status Step 5 Command or Action Purpose Repeat this step when configuring both parameters. Use one or both of the following: · line vty line_number [ ending_line_number] · transport input ssh Example: Device(config)# line vty 1 10 (Optional) Configures the virtual terminal line settings. · Enters line configuration mode to configure the virtual terminal line settings. For line_number and ending_line_number, specify a pair of lines. The range is 0 to 15. or Device(config-line)# transport input ssh · Specifies that the device prevent non-SSH Telnet connections. This limits the router to only SSH connections. Step 6 end Example: Device(config-line)# end Returns to privileged EXEC mode. Monitoring the SSH Configuration and Status This table displays the SSH server configuration and status. Table 99: Commands for Displaying the SSH Server Configuration and Status Command Purpose show ip Shows the version and configuration information for the SSH server. ssh show ssh Shows the status of the SSH server. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1385 Monitoring the SSH Configuration and Status Security Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1386 1 2 8 C H A P T E R Encrypted Traffic Analytics · Information About Encrypted Traffic Analytics, on page 1387 · Exporting Records to IPv4 Flow Export Destination, on page 1388 · Exporting Records to IPv6 Flow Export Destination, on page 1389 · Exporting Records to IPv4 and IPv6 Destination over IPFIX, on page 1389 · Allowed List of Traffic, on page 1390 · Configuring Source Interface for Record Export, on page 1391 · Configuring Source Interface for Record Export Without IPFIX, on page 1392 · Configuring ETA Flow Export Destination (GUI), on page 1393 · Enabling In-Active Timer, on page 1393 · Enabling ETA on WLAN Policy Profile, on page 1394 · Attaching Policy Profile to VLAN (GUI), on page 1395 · Attaching Policy Profile to VLAN, on page 1395 · Verifying ETA Configuration, on page 1396 Information About Encrypted Traffic Analytics The Encrypted Traffic Analytics (ETA) leverages Flexible NetFlow (FNF) technology to export useful information about the flow to the collectors and gain visibility into the network. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1387 Exporting Records to IPv4 Flow Export Destination Security Figure 39: Encrypted Traffic Analytics Deployed on Cisco Catalyst 9800 Series Wireless Controller in Local Mode The wireless clients send data packets to the access point. The packets are then CAPWAP encapsulated and sent to the controller. This means that the actual client data is in the CAPWAP payload. To apply ETA on the client data, you need to strip the CAPWAP header before handing over the packet to the ETA module. The ETA offers the following advantages: · Enhanced telemetry based threat analytics. · Analytics to identify malware. Starting from Cisco IOS XE Amsterdam 17.1.1s, ETA inspection for IPv6 traffic is supported. ETA inspection for IPv6 traffic is enabled by default and no special configuration is required. This release also supports allowed list of IPv6 traffic, exporting ETA records to IPv4 or IPv6 export destination, exporting records over IPFIX (netflow v10), and configuring source interface for ETA exports. The records can be exported to IPv4 or IPv6 netflow collector. Exporting Records to IPv4 Flow Export Destination Follow the procedure given below to enable encrypted traffic analytics and configure a flow export destination: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 et-analytics Example: Device(config)# et-analytics Purpose Enters the global configuration mode. Enables encrypted traffic analytics. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1388 Security Exporting Records to IPv6 Flow Export Destination Step 3 Step 4 Command or Action Purpose ip flow-export destination ip_address port_number Example: Device(config-et-analytics)# ip flow-export destination 120.0.0.1 2055 Configures the NetFlow record export. Here, port_number ranges from 1 to 65535. end Example: Device(config-et-analytics)# end Returns to privileged EXEC mode. Exporting Records to IPv6 Flow Export Destination Follow the procedure given below to enable encrypted traffic analytics and configure an IPv6 flow export destination. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters the global configuration mode. Step 2 et-analytics Example: Device(config)# et-analytics Enables encrypted traffic analytics. Step 3 ipv6 flow-export destination ipv6-address Specifies netflow record export destination IPv6 port-number address and port. Example: Note Device(config-et-analytics)# ipv6 flow-export destination 2001:181:181::1 2055 The maximum configurable limit for flow-export destinations is four (both IPv4 and IPv6 combined). Step 4 exit Example: Device(config-et-analytics)# exit Returns to global configuration mode. Exporting Records to IPv4 and IPv6 Destination over IPFIX This procedure provides efficient bandwidth utilization by allowing variable len fields for smaller data packets and also reduces the overall bandwidth requirements for transmission. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1389 Allowed List of Traffic Security Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters the global configuration mode. Step 2 et-analytics Example: Device(config)# et-analytics Enables encrypted traffic analytics. Step 3 ip flow-export destination ip-address port-number ipfix Specifies netflow record export destination IP address, port and format. Example: Device(config-et-analytics)# ip flow-export destination 192.168.19.2 2055 ipfix Step 4 ipv6 flow-export destination ipv6-address Specifies netflow record export destination IPv6 port-number ipfix address, port and format. Example: IPFIX allows you to collect flow information Device(config-et-analytics)# ipv6 from network devices that support IPFIX flow-export destination 2001:181:181::1 protocol and analyze the traffic flow 2055 ipfix information by processing it through a netflow analyzer. Note Maximum configurable limit for flow-export destinations is four (both IPv4 and IPv6 combined). Step 5 exit Example: Device(config-et-analytics)# exit Returns to global configuration mode. Allowed List of Traffic You can add an allowed list of ACLs for both IPv4 and IPv6 traffic. Traffic from allowed list is skipped from ETA inspection and records are not generated for the matching traffic. Before you begin Configure an IPv4 or IPv6 access list. · IPv4 ACL: ip access-list standard acl_name Device(config)# ip access-list standard eta-whitelist_ipv4 · IPv6 ACL: ipv6 access-list acl_name Device(config)# ipv6 access-list eta-whitelist_ipv6 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1390 Security Configuring Source Interface for Record Export Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters the global configuration mode. Step 2 et-analytics Example: Device(config)# et-analytics Enables encrypted traffic analytics. Step 3 whitelist acl acl-name Configures an allowed list for IPv4 or IPv6. Example: Note Device(config-et-analytics)# whitelist acl eta-whitelist You cannot add both IPv4 and IPv6 client traffic simultaneously to an allowed list, as a single ACL cannot have both IPv4 and IPv6 terms. Step 4 Step 5 exit Example: Device(config-et-analytics)# exit Returns to global configuration mode. sequence sequence-num permit udp any any (Optional) Configures a sequence number and eq tftp the access conditions to add any IPv6 TFTP Example: traffic to allowed list. Device(config-ipv6-acl)# sequence 10 permit udp any any eq tftp Configuring Source Interface for Record Export Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 et-analytics Example: Device(config)# et-analytics Step 3 ip flow-export destination ip-address source-interface interface-name interface-number ipfix Purpose Enters the global configuration mode. Enables encrypted traffic analytics. Specifies netflow record export destination IP address, source interface and format. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1391 Configuring Source Interface for Record Export Without IPFIX Security Step 4 Step 5 Command or Action Purpose Example: This allows the ETA export to use the IP Device(config-et-analytics)# ip address of the specified interface, as against flow-export destination 192.168.19.2 2055 using the IP address of the egress interface as source-interface loopback0 ipfix the source address. The source interface is applicable for both IPv4 and IPv6 export destinations. Note Only one source interface can be specified and all exports use this source address. ipv6 flow-export destination ipv6-address source-interface interface-nam interface-number ipfix Specifies netflow record export destination IPv6 address, source interface and format. Example: Device(config-et-analytics)# ipv6 flow-export destination 2001:181:181::1 2055 source-interface Vlan160 ipfix exit Example: Device(config-et-analytics)# exit Returns to global configuration mode. Configuring Source Interface for Record Export Without IPFIX Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters the global configuration mode. Step 2 et-analytics Example: Device(config)# et-analytics Enables encrypted traffic analytics. Step 3 ip flow-export destination ip-address source-interface interface-name interface-number Specifies netflow record export destination IP address, source interface and format. Example: Device(config-et-analytics)# ip flow-export destination 192.168.19.2 2055 source-interface loopback0 ipfix Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1392 Security Configuring ETA Flow Export Destination (GUI) Step 4 Step 5 Command or Action Purpose ipv6 flow-export destination ipv6-address source-interface interface-nam interface-number ipfix Specifies netflow record export destination IPv6 address, source interface and format. Example: Device(config-et-analytics)# ipv6 flow-export destination 2001:181:181::1 2055 source-interface Vlan160 exit Example: Device(config-et-analytics)# exit Returns to global configuration mode. Configuring ETA Flow Export Destination (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Choose Configuration > Services > NetFlow. Click the Add button. The Create NetFlow dialog box appears. Choose any one of the available templates from the Netflow Template drop-down list. Enter an IPv4 or IPv6 address in the Collector Address field. From the Whitelist ACL drop-down list, choose the desired option. Note To use this option, ensure that you select Encrypted Traffic Analytics from the Netflow Template drop-down list. Enter a port number in the Exporter Port field. You must specify a value between 1 and 65535. Choose the desired option from the Export Interface IP drop-down list. Choose any one of the sampling methods from the Sampling Method drop-down list. The available options are Deterministic, Random, and Full Netflow. Enter a range for the sample. You must specify a value between 32 and 1032. Select the required interfaces/profile from the Available pane and move it to the Selected pane. Click the Save & Apply to Device button. Enabling In-Active Timer Follow the procedure given below to enable in-active timer: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1393 Enabling ETA on WLAN Policy Profile Security Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 et-analytics Example: Device(config)# et-analytics Step 3 inactive-timeout timeout-in-seconds Example: Device(config-et-analytics)# inactive-timeout 15 Step 4 end Example: Device(config-et-analytics)# end Purpose Enters the global configuration mode. Configures the encrypted traffic analytics. Specifies the inactive flow timeout value. Here, timeout-in-seconds ranges from 1 to 604800. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Enabling ETA on WLAN Policy Profile Follow the procedure given below to enable ETA on WLAN policy profile: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters the global configuration mode. Step 2 wireless profile policy profile-name Creates policy profile for the WLAN. Example: The profile-name is the profile name of the Device(config)# wireless profile policy policy profile. default-policy-profile Step 3 et-analytics enable Example: Device(config-wireless-policy)# et-analytics enable Enables encrypted traffic analytics on the policy. Step 4 end Example: Device(config-wireless-policy)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1394 Security Attaching Policy Profile to VLAN (GUI) Attaching Policy Profile to VLAN (GUI) Perform the following steps to attach a policy profile to VLAN. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Check the RADIUS Profilling checkbox. From the Local Subscriber Policy Name, choose the required policy name. In the WLAN Local Profiling section, enable or disable the Global State of Device Classification, check the checkbox for HTTP TLV Caching and DHCL TLV Caching. In the VLAN section, choose the VLAN/VLAN Group from the drop-down list. Enter the Muliticast VLAN. In the WLAN ACL section, choose the IPv4 ACL and IPv6 ACL from the drop-down list. In the URL Filters section, choose the Pre Auth and Post Auth from the drop-down list. Click Save & Apply to Device. Attaching Policy Profile to VLAN Follow the procedure given below to attach a policy profile to VLAN: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters the global configuration mode. Step 2 wireless profile policy profile-name Creates policy profile for the WLAN. Example: The profile-name is the profile name of the Device(config)# wireless profile policy policy profile. default-policy-profile Step 3 vlan vlan-name Example: Device(config-wireless-policy)# vlan vlan-name Assigns the policy profile to the VLANs. Step 4 no shutdown Example: Device(config-wireless-policy)# no shutdown Enables the wireless policy profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1395 Verifying ETA Configuration Security Verifying ETA Configuration Verifying ETA Globally To view the ETA global and interface details, use the following command: Device# show platform software utd chassis active F0 et-analytics global ET Analytics Global Configuration ID: 1 All Interfaces: Off IP address and port and vrf: 192.168.5.2:2055:0 To view the ETA global configuration, use the following command: Device# show platform software et-analytics global ET-Analytics Global state ========================= All Interfaces : Off IP Flow-record Destination: 192.168.5.2 : 2055 Inactive timer: 15 Note The show platform software et-analytics global command does not display the ETA enabled wireless client interfaces. To view the ETA global state in datapath, use the following command: Device# show platform hardware chassis active qfp feature et-analytics datapath runtime ET-Analytics run-time information: Feature state: initialized (0x00000004) Inactive timeout : 15 secs (default 15 secs) WhiteList information : flag: False cgacl w0 : n/a cgacl w1 : n/a Flow CFG information : instance ID : 0x0 feature ID : 0x1 feature object ID : 0x1 chunk ID : 0xC To view the ETA memory details, use the following command: Device# show platform hardware chassis active qfp feature et-analytics datapath memory ET-Analytics memory information: Size of FO No. of FO allocs No. of FO frees : 3200 bytes :0 :0 To view the ETA flow export in datapath, use the following command: Device# show platform hardware chassis active qfp feature et-analytics datapath stats export ET-Analytics 192.168.5.2:2055 vrf 0 Stats: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1396 Security Verifying ETA Configuration Export statistics: Total records exported : 5179231 Total packets exported : 3124873 Total bytes exported : 3783900196 Total dropped records :0 Total dropped packets :0 Total dropped bytes :0 Total IDP records exported : initiator->responder : 1285146 responder->initiator : 979284 Total SPLT records exported: initiator->responder : 1285146 responder->initiator : 979284 Total SALT records exported: initiator->responder : 0 responder->initiator : 0 Total BD records exported : initiator->responder : 0 responder->initiator : 0 Total TLS records exported : initiator->responder : 309937 responder->initiator : 329469 To view the ETA flow statistics, use the following command: Device# show platform hardware chassis active qfp feature et-analytics datapath stats flow ET-Analytics Stats: Flow statistics: feature object allocs : 0 feature object frees : 0 flow create requests : 0 flow create matching : 0 flow create successful: 0 flow create failed, CFT handle: 0 flow create failed, getting FO: 0 flow create failed, malloc FO : 0 flow create failed, attach FO : 0 flow create failed, match flow: 0 flow create, aging already set: 0 flow ageout requests :0 flow ageout failed, freeing FO: 0 flow ipv4 ageout requests :0 flow ipv6 ageout requests :0 flow whitelist traffic match : 0 Verifying ETA on Wireless Client Interface To view if a policy is configured with ETA, use the following command: Device# show wireless profile policy detailed default-policy-profile Policy Profile Name Description Status VLAN Multicast VLAN Passive Client ET-Analytics StaticIP Mobility WLAN Switching Policy Central Switching Central Authentication Central DHCP : default-policy-profile : default policy profile : ENABLED : 160 :0 : DISABLED : DISABLED : DISABLED : ENABLED : ENABLED : ENABLED Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1397 Verifying ETA Configuration Security Flex NAT PAT Central Assoc : DISABLED : ENABLED To view the ETA status in the wireless client detail, use the following command: Device# show platform hardware chassis active qfp feature wireless wlclient datapath <client_mac> Wlclient Details for Client mac: 0026.c635.ebf8 --------------------------------- Input VlanId : 160 Point of Presence :0 Wlclient Input flags : 9 Instance ID : 3 ETA enabled : True client_mac_addr : 0026.c635.ebf8 bssid_mac_addr: 58ac.7843.037f Point of Attachment : 65497 Output vlanId : 160 wlan_output_uidb : -1 Wlclient Output flags : 9 Radio ID : 1 cgacl w0 : 0x0 cgacl w1 : 0x0 IPv6 addr number :0 IPv6 addr learning :0 To view clients in the ETA pending wireless client tree, use the following command: Device# show platform hardware chassis active qfp feature wireless et-analytics eta-pending-client-tree CPP IF_H DPIDX MAC Address VLAN AS MS WLAN POA ----------------------------------------------------------------------------- 0X2A 0XA0000001 2c33.7a5b.827b 160 RN LC xyz_ssid 0x90000003 0X2B 0XA0000002 2c33.7a5b.80fb 160 RN LC xyz_ssid 0x90000003 To view the QFP interface handle, use the following command: Device# show platform hardware chassis active qfp interface if-handle <qfp_interface_handle> show platform hardware chassis active qfp interface if-handle 0X29 FIA handle - CP:0x27f3ce8 DP:0xd7142000 LAYER2_IPV4_INPUT_ARL_SANITY WLCLIENT_INGRESS_IPV4_FWD IPV4_TVI_INPUT_FIA >>> ETA FIA Enabled SWPORT_VLAN_BRIDGING IPV4_INPUT_GOTO_OUTPUT_FEATURE (M) Protocol 1 - ipv4_output FIA handle - CP:0x27f3d30 DP:0xd7141780 IPV4_VFR_REFRAG (M) IPV4_TVI_OUTPUT_FIA >>> ETA FIA Enabled WLCLIENT_EGRESS_IPV4_FWD IPV4_OUTPUT_DROP_POLICY (M) DEF_IF_DROP_FIA (M) Note The qfp_interface_handle ranges from 1 to 4294967295. To view the ETA pending wireless client tree statistics, use the following command: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1398 Security Verifying ETA Configuration Device# show platform hardware chassis active qfp feature wireless et-analytics statistics Wireless ETA cpp-client plumbing statistics Number of ETA pending clients : 2 Counter Value ------------------------------------------------------------------- Enable ETA on wireless client called 0 Delete ETA on wireless client called 0 ETA global cfg init cb TVI FIA enable error 0 ETA global cfg init cb output SB read error 0 ETA global cfg init cb output SB write error 0 ETA global cfg init cb input SB read error 0 ETA global cfg init cb input SB write error 0 ETA global cfg init cb TVI FIA enable success 0 ETA global cfg uninit cb ingress feat disable 0 ETA global cfg uninit cb ingress cfg delete e 0 ETA global cfg uninit cb egress feat disable 0 ETA global cfg uninit cb egress cfg delete er 0 ETA pending list insert entry called 4 ETA pending list insert invalid arg error 0 ETA pending list insert entry exists error 0 ETA pending list insert no memory error 0 ETA pending list insert entry failed 0 ETA pending list insert entry success 4 ETA pending list delete entry called 2 ETA pending list delete invalid arg error 0 ETA pending list delete entry missing 0 ETA pending list delete entry remove error 0 ETA pending list delete entry success 2 To view the allowed list configuration, use the following commands: Device# show platform software et-analytics global ET-Analytics Global state ========================= All Interfaces : Off IP Flow-record Destination: 192.168.5.2 : 2055 Inactive timer: 15 whitelist acl eta-whitelist Device# show platform hardware chassis active qfp feature et-analytics datapath runtime ET-Analytics run-time information: Feature state: initialized (0x00000004) Inactive timeout : 15 secs (default 15 secs) WhiteList information : flag: True cgacl w0 : 0xd9ae9c80 cgacl w1 : 0x20000000 Flow CFG information : instance ID : 0x0 feature ID : 0x0 feature object ID : 0x0 chunk ID : 0x4 To view the ETA export statistics, use the following command: Device# show platform hardware chassis active qfp feature et-analytics datapath stats export ET-Analytics Stats: Export statistics: Total records exported Total packets exported Total bytes exported : 5179231 : 3124873 : 3783900196 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1399 Verifying ETA Configuration Security Total dropped records :0 Total dropped packets :0 Total dropped bytes :0 Total IDP records exported : initiator->responder : 1285146 responder->initiator : 979284 Total SPLT records exported: initiator->responder : 1285146 responder->initiator : 979284 Total SALT records exported: initiator->responder : 0 responder->initiator : 0 Total BD records exported : initiator->responder : 0 responder->initiator : 0 Total TLS records exported : initiator->responder : 309937 responder->initiator : 329469 To view the ETA flow statistics, use the following command: Device# show platform hardware chassis active qfp feature et-analytics datapath stats flow ET-Analytics Stats: Flow statistics: feature object allocs : 0 feature object frees : 0 flow create requests : 0 flow create matching : 0 flow create successful: 0 flow create failed, CFT handle: 0 flow create failed, getting FO: 0 flow create failed, malloc FO : 0 flow create failed, attach FO : 0 flow create failed, match flow: 0 flow create, aging already set: 0 flow ageout requests :0 flow ageout failed, freeing FO: 0 flow ipv4 ageout requests :0 flow ipv6 ageout requests :0 flow whitelist traffic match : 0 To view the ETA datapath runtime detail, use the following command: Device# show platform hardware chassis active qfp feature et-analytics datapath runtime ET-Analytics run-time information: Feature state : initialized (0x00000004) Inactive timeout : 15 secs (default 15 secs) WhiteList information : flag : True cgacl w0 : 0xd9ae1e10 cgacl w1 : 0x20000000 Flow CFG information : instance ID : 0x0 feature ID : 0x0 feature object ID : 0x0 chunk ID : 0x4 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1400 FIPS 1 2 9 C H A P T E R FIPS · FIPS, on page 1401 · Guidelines and Restrictions for FIPS, on page 1402 · FIPS Self-Tests, on page 1402 · Configuring FIPS, on page 1403 · Configuring FIPS in HA Setup, on page 1404 · Verifying FIPS Configuration, on page 1405 Federal Information Processing Standard (FIPS) 140-2 is a security standard used to validate cryptographic modules. The cryptographic modules are produced by the private sector for use by the U.S. government and other regulated industries (such as financial and healthcare institutions) that collect, store, transfer, share and disseminate sensitive but unclassified (SBU) information. Note Cisco TrustSec (CTS) is not supported when the controller is in FIPS mode. For more information about FIPS, see https://www.cisco.com/c/en/us/solutions/industries/government/global-government-certifications/fips-140.html. With FIPS in enabled state, some passwords and pre-shared keys must have the following minimum lengths: · For Software-Defined Access Wireless, between the controller and map server, a pre-shared key (for example, the LISP authentication key) is used in authentication of all TCP messages between them. This pre-shared key must be at least 14 characters long. · The ISAKMP key (for example, the Crypto ISAKMP key) must be at least 14 characters long. Limitations for FIPS · The console of APs get disabled when the controller is operating in FIPS mode. · The weak or legacy cipher like SHA1 is not supported in FIPS mode. · APs would not reload immediately, if you change the FIPS status. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1401 Guidelines and Restrictions for FIPS Security Note We recommend a minimum RSA key size of 2048 bits under RADSEC when operating in FIPS mode. Otherwise, the RADSEC fails. Guidelines and Restrictions for FIPS · In the controller switches, a legacy key is used to support the legacy APs. However, in FIPS mode, the crypto engine detects the legacy key as a weak key and rejects it by showing the following error message: "% Error in generating keys: could not generate test signature." We recommend that you ignore such error messages that are displayed during the bootup of the controller (when operating in FIPS mode). · SSH clients using SHA1 will not be able to access the controller when you enable FIPS. Note You need to use FIPS compliant SSH clients to access the controller. · While configuring WLAN ensure that the PSK length must be minimum of 15 characters. If not, the APs will not be able to join the controller after changing tags.. · TrustSec is not supported. · PAC key configuration is not supported. FIPS Self-Tests A cryptographic module must perform power-up self-tests and conditional self-tests to ensure that it is functional. Power-up self-tests run automatically after the device powers up. A device goes into FIPS mode only after all self-tests are successfully completed. If any self-test fails, the device logs a system message and moves into an error state. Also, if the power-up self test fails, the device fails to boot. Using a known-answer test (KAT), a cryptographic algorithm is run on data for which the correct output is already known, and then the calculated output is compared to the previously generated output. If the calculated output does not equal the known answer, the known-answer test fails. Power-up self-tests include the following: · Software integrity · Algorithm tests Conditional self-tests must be run when an applicable security function or operation is invoked. Unlike the power-up self-tests, conditional self-tests are executed each time their associated function is accessed. The device uses a cryptographic algorithm known-answer test (KAT) to test FIPS mode for each FIPS 140-2-approved cryptographic function (encryption, decryption, authentication, and random number generation) implemented on the device. The device applies the algorithm to data for which the correct output is already Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1402 Security Configuring FIPS known. It then compares the calculated output to the previously generated output. If the calculated output does not equal the known answer, the KAT fails. Conditional self-tests run automatically when an applicable security function or operation is invoked. Unlike the power-up self-tests, conditional self-tests are executed each time their associated function is accessed. Conditional self-tests include the following: · Pair-wise consistency test--This test is run when a public or private key-pair is generated. · Continuous random number generator test--This test is run when a random number is generated. · Bypass · Software load Configuring FIPS Ensure that both the active and standby controllers have the same FIPS authorization key. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 fips authorization-key key Example: Device(config)# fips authorization-key 12345678901234567890123456789012 Enables the FIPS mode. The key length should be of 32 hexadecimal characters. Note When FIPS is enabled, you may need to trigger more than one factory reset using the reset button. Step 3 end Example: Device(config)# end To disable FIPS mode on the device, use the no form of this command. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. What to do next You must reboot the controller whenever you enable or disable the FIPS mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1403 Configuring FIPS in HA Setup Security Configuring FIPS in HA Setup While bringing up HA pair in FIPS mode, you need to configure both active and standby controllers with the same FIPS authorization key independently before forming HA pair. If you configure FIPS authorization key after forming HA pair, the FIPS authorization key configuration will not be synced with the standby. Rebooting HA pair at this state causes reload loop. To avoid this, you need to perform the following: · Break the HA pair. · Configure the same FIPS authorization key independently on both the members. · Pair up members. To configure FIPS in HA setup, perform the following: 1. Power off both the members of the stack. 2. Power on only member1, and wait for the controller to come up and prompt for login from the console. 3. Login successfully with your valid credentials, and execute the following commands: Show fips status Show fips authorization-key Show romvar Show chassis Note Keep the configured FIPS authorization key handy. 4. Configure the FIPS key, if you have not configured one earlier. conf t fips authorization-key <32 hex char> 5. Save and power off the member1. 6. Power on only member2 and wait for the controller to come up and prompt for login from the console. 7. Login successfully with your valid credentials, and execute the following commands: Show fips status Show fips authorization-key Show romvar Show chassis Note Keep the configured FIPS authorization key handy. 8. Configure the FIPS key, if you have not configured one earlier. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1404 Security Verifying FIPS Configuration Note The key value must be the same in both the members of the stack. conf t fips authorization-key <32 hex char> 9. Save and power off the member2. 10. Power on both the members together, and wait for the stack to form. 11. Monitor any crash or unexpected reload. Note It is expected that members must not reload due to FIPS issue. Verifying FIPS Configuration You can verify FIPS configuration using the following commands: Use the following show command to display the installed authorization key: Device# show fips authorization-key FIPS: Stored key (16) : 12345678901234567890123456789012 Use the following show command to display the status of FIPS on the device: Device# show fips status Chassis is running in fips mode Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1405 Verifying FIPS Configuration Security Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1406 1 3 0 C H A P T E R Internet Protocol Security · Information about Internet Protocol Security, on page 1407 · Internet Key Exchange Version 1 Transform Sets, on page 1408 · Configure IPSec Using Internet Key Exchange Version 1, on page 1409 · Internet Key Exchange Version 2 Transform Sets, on page 1411 · Configure IPSec Using Internet Key Exchange Version 2, on page 1412 · IPsec Transforms and Lifetimes, on page 1414 · Use of X.509 With Internet Key Exchange Version, on page 1415 · IPsec Session Interuption and Recovery, on page 1416 · Example: Configure IPSec Using ISAKMP, on page 1417 · Verifying IPSec Traffic, on page 1417 · Example: Configure IPSec Using Internet Key Exchange Version 2, on page 1418 · Verifying IPSec With Internet Key Exchange Version 2 Traffic , on page 1419 Information about Internet Protocol Security Internet Protocol Security (IPsec) is a framework of open standards for ensuring secure private communications over the Internet. Based on standards developed by the Internet Engineering Task Force (IETF), IPsec ensures confidentiality, integrity, and authenticity of data communications across a public network. IPsec provides a necessary component of a standards-based, flexible solution for deploying a network-wide security policy. Cisco Catalyst 9800 Series Wireless Controller supports IPsec configuration. The support for IPSec secures syslog traffic. This section provides information about how to configure IPsec between Cisco Catalyst 9800 Series Wireless Controller and syslog (peer IP). IPsec provides the following network security services: · Data confidentiality: The IPsec sender can encrypt packets before transmitting them across a network. · Data integrity: The IPsec receiver can authenticate packets sent by the IPsec sender to ensure that the data has not been altered during transmission. · Data origin authentication: The IPsec receiver can authenticate the source of the sent IPsec packets. This service is dependent upon the data integrity service. · Anti-replay: The IPsec receiver can detect and reject replayed packets. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1407 Internet Key Exchange Version 1 Transform Sets Security IPsec provides secure tunnels between two peers, such as two devices. The administrator defines which packets are considered sensitive and should be sent through these secure tunnels and specifies the parameters that should be used to protect these sensitive packets by specifying the characteristics of these tunnels. When the IPsec peer recognizes a sensitive packet, the peer sets up the appropriate secure tunnel and sends the packet through the tunnel to the remote peer. More accurately, these tunnels are sets of security associations (SAs) that are established between two IPsec peers. The SAs define the protocols and algorithms to be applied to sensitive packets and specify the keying material to be used by the two peers. SAs are unidirectional and are established per security protocol. With IPsec, administrators can define the traffic that needs to be protected between two IPsec peers by configuring access lists and applying these access lists to interfaces using crypto map sets. Therefore, traffic may be selected on the basis of the source and destination address, and optionally the Layer 4 protocol and port. (The access lists used for IPsec are only used to determine the traffic that needs to be protected by IPsec, not the traffic that should be blocked or permitted through the interface. Separate access lists define blocking and permitting at the interface.) A crypto map set can contain multiple entries, each with a different access list. The crypto map entries are searched in a sequence--the device attempts to match the packet to the access list specified in that entry. When a packet matches a permit entry in a particular access list, and the corresponding crypto map entry is tagged as cisco, connections are established, if necessary. If the crypto map entry is tagged as ipsec-isakmp, IPsec is triggered. If there is no SA that the IPsec can use to protect this traffic to the peer, IPsec uses IKE to negotiate with the remote peer to set up the necessary IPsec SAs on behalf of the data flow. The negotiation uses information specified in the crypto map entry as well as the data flow information from the specific access list entry. Once established, the set of SAs (outbound to the peer) is then applied to the triggering packet and to subsequent applicable packets as those packets exit the device. Applicable packets are packets that match the same access list criteria that the original packet matched. For example, all applicable packets could be encrypted before being forwarded to the remote peer. The corresponding inbound SAs are used when processing the incoming traffic from that peer. Access lists associated with IPsec crypto map entries also represent the traffic that the device needs protected by IPsec. Inbound traffic is processed against crypto map entries--if an unprotected packet matches a permit entry in a particular access list associated with an IPsec crypto map entry, that packet is dropped because it was not sent as an IPsec-protected packet. Crypto map entries also include transform sets. A transform set is an acceptable combination of security protocols, algorithms, and other settings that can be applied to IPsec-protected traffic. During the IPsec SA negotiation, the peers agree to use a particular transform set when protecting a particular data flow. Internet Key Exchange Version 1 Transform Sets An Internet Key Exchange version 1 (IKEv1) transform set represents a certain combination of security protocols and algorithms. During the IPsec SA negotiation, the peers agree to use a particular transform set for protecting a particular data flow. Privileged administrators can specify multiple transform sets and then specify one or more of these transform sets in a crypto map entry. The transform set defined in the crypto map entry is used in the IPsec SA negotiation to protect the data flows specified by that crypto map entry's access list. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1408 Security Configure IPSec Using Internet Key Exchange Version 1 During IPsec security association negotiations with IKE, peers search for a transform set that is the same at both peers. When such a transform set is found, it is selected and applied to the protected traffic as part of both peers' IPsec SAs. Note If a transform set definition is changed during operation that the change is not applied to existing security associations, but is used in subsequent negotiations to establish new SAs. If you want the new settings to take effect sooner, you can clear all or part of the SA database by using the clear crypto sa command. The following snippet helps to configure IPsec IKEv1 to use AES-CBC-128 for payload encryption. AES-CBC-256 can be selected with encryption aes 256: device # conf t device (config)#crypto isakmp policy 1 device (config-isakmp)# hash sha device (config-isakmp)# encryption aes Configure IPSec Using Internet Key Exchange Version 1 Follow the procedure given below to configure IPsec IKEv1 to use AES-CBC-128 for payloadencryption: Procedure Step 1 Step 2 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. crypto isakmp policy priority Defines an Internet Key Exchange (IKE) Example: policy and assigns a priority to the policy. Device(config)# crypto isakmp policy 1 · priority: Uniquely identifies the IKE policy and assigns a priority to the policy. Valid values: 1 to 10,000; 1 is the highest priority. Step 3 Step 4 hash sha Example: Device(config-isakmp)# hash sha Specifies the hash algorithm. encryption aes Example: Device(config-isakmp)# encryption aes Configures IPsec IKEv1 to use AES-CBC-128 for payload encryption. AES-CBC-256 can be selected with `encryption aes 256'. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1409 Configure IPSec Using Internet Key Exchange Version 1 Security Step 5 Step 6 Step 7 Step 8 Command or Action Purpose Note The authorized administrator must ensure that the keysize for this setting is greater than or equal to the keysize selected for ESP in section IPsec Transforms and Lifetimes. If AES 128 is selected here, then the highest keysize that can be selected on the device for ESP is AES 128 (either CBC or GCM). Both confidentiality and integrity are configured with the hash sha and encryption aes commands respectively. As a result, confidentiality-only mode is disabled. authentication pre-share Example: Device(config-isakmp)# authentication pre-share Configures IPsec to use the specified preshared keys as the authentication method. Preshared keys require that you separately configure these preshared keys. exit Example: Device(config-isakmp)# exit Exits config-isakmp configuration mode. crypto isakmp key keystring address Configures a preshared authentication key. peer-address Note To ensure a secure configuration, Example: we recommend that you enter the Device(config)# crypto isakmp key cisco123!cisco123!CISC address 192.0.2.1 pre-shared keys with at least 22 characters in length and can be composed of any combination of upper and lower case letters, numbers, and special characters (that include: "!", "@", "#", "$", "%", "^", "&", "*", "(", and ")"). The device supports pre-shared keys up to 127 characters in length. While longer keys increase the difficulty of brute-force attacks, longer keys increase processing time. group 14 Example: Device(config-isakmp)# group 14 Specifies the Diffie-Hellman (DH) group identifier as 2048-bit DH group 14 and selects DH Group 14 (2048-bit MODP) for IKE. However, 19 (256-bit Random ECP), 24 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1410 Security Internet Key Exchange Version 2 Transform Sets Step 9 Step 10 Step 11 Command or Action Purpose (2048-bit MODP with 256-bit POS), 20 (384-bit Random ECP), 15 (3072 bit MODP), and 16 (4096-bit MODP) are also allowed and supported. lifetime seconds Example: Device(config-isakmp)# lifetime 86400 Specifies the lifetime of the IKE SA. The default time value for Phase 1 SAs is 24 hours (86400 seconds), but this setting can be changed using the command above with different values. · seconds: Time, in seconds, before each SA expires. Valid values: 60 to 86,400; default value: 86,400. Note The shorter the lifetime (up to a point), the more secure your IKE negotiations will be. However, with longer lifetimes, future IPsec SAs can be set up more quickly. crypto isakmp aggressive-mode disable Example: Device(config-isakmp)# crypto isakmp aggressive-mode disable exit Example: Device(config-isakmp)# exit Ensures all IKEv1 Phase 1 exchanges will be handled in the default main mode. Exits config-isakmp configuration mode. Internet Key Exchange Version 2 Transform Sets An Internet Key Exchange Version 2 (IKEv2) proposal is a set of transforms used in the negotiation of IKEv2 SA as part of the IKE_SA_INIT exchange. An IKEv2 proposal is regarded as complete only when it has at least an encryption algorithm, an integrity algorithm, and a Diffie-Hellman (DH) group configured. If no proposal is configured and attached to an IKEv2 policy, then the default proposal is used in the negotiation. The following snippet helps in configuring the IPsec with IKEv2 functionality for the device: device # conf t device(config)#crypto ikev2 proposal sample device(config-ikev2-proposal)# integrity sha1 device (config-ikev2-proposal)# encryption aes-cbc-128 device(config-ikev2-proposal)# group 14 device(config-ikev2-proposal)# exit device(config)# crypto ikev2 keyring keyring-1 device (config-ikev2-keyring)# peer peer1 device (config-ikev2-keyring-peer)# address 192.0.2.4 255.255.255.0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1411 Configure IPSec Using Internet Key Exchange Version 2 Security device (config-ikev2-keyring-peer)# pre-shared-key cisco123!cisco123!CISC device (config-ikev2-keyring-peer)# exit device(config)#crypto ikev2 keyring keyring-1 device (config-ikev2-keyring)# peer peer1 device (config-ikev2-keyring-peer)# address 192.0.2.4 255.255.255.0 device (config-ikev2-keyring-peer)# pre-shared-key cisco123!cisco123!CISC device (config-ikev2-keyring-peer)# exit device(config)#crypto logging ikev2 Configure IPSec Using Internet Key Exchange Version 2 Follow the procedure given below to configure the IPsec with IKEv2: Procedure Step 1 Step 2 Step 3 Step 4 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. crypto ikev2 proposal name Defines an IKEv2 proposal name. Example: Device(config)# crypto ikev2 proposal name integrity sha1 Defines an IKEv2 proposal name. Example: Device(config-ikev2-proposal)# integrity sha1 encryption aes-cbc-128 Example: Device(config-ikev2-proposal)# encryption aes-cbc-128 Configures IPsec IKEv2 to use AES-CBC-128 for payload encryption. AES-CBC-256 can be selected with encryption aes-cbc-256. AES-GCM-128 and AES-GCM-256 can also be selected similarly. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1412 Security Configure IPSec Using Internet Key Exchange Version 2 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action Purpose Note The authorized administrator must ensure that the keysize for this setting is greater than or equal to the keysize selected for ESP in section IPsec Transforms and Lifetimes. If AES 128 is selected here, then the highest keysize that can be selected on the device for ESP is AES 128 (either CBC or GCM). Both confidentiality and integrity are configured with the hash sha and encryption aes commands respectively. As a result, confidentiality-only mode is disabled. group 14 Selects DH Group 14 (2048-bit MODP) for Example: IKE. However, 19 (256-bit Random ECP), 24 (2048-bit MODP with 256-bit POS), 20 Device(config-ikev2-proposal)# group 14 (384-bit Random ECP), 15 (3072 bit MODP), and 16 (4096-bit MODP) are also allowed and supported. exit Example: Device(config-ikev2-proposal)# exit Exists IKEv2 proposal configuration mode. crypto ikev2 keyring keyring-name Example: Device(config)# crypto ikev2 keyring keyring-1 Defines an IKEv2 keyring. peer peer-name Defines the peer or peer group. Example: Device(config-ikev2-keyring)# peer peer1 address {ipv4-address [mask] | ipv6-address Specifies an IPv4 or IPv6 address or range for prefix} the peer. Example: Note Device(config-ikev2-keyring)# address 192.0.2.4 255.255.255.0 This IP address is the IKE endpoint address and is independent of the identity address. pre-shared-key local Example: Specifies the preshared key for the peer. You can enter the local or remote keyword to Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1413 IPsec Transforms and Lifetimes Security Step 11 Step 12 Command or Action Device(config-ikev2-keyring)# pre-shared-key cisco123!cisco123!CISC Purpose specify an asymmetric preshared key. By default, the preshared key is symmetric. Note To ensure a secure configuration, we recommend that you enter the pre-shared keys with at least 22 characters in length and can be composed of any combination of upper and lower case letters, numbers, and special characters (that include: "!", "@", "#", "$", "%", "^", "&", "*", "(", and ")"). The device supports pre-shared keys up to 127 characters in length. While longer keys increase the difficulty of brute-force attacks, longer keys increase processing time. HEX keys generated off system can also be input for IKEv2 using the following instead of the pre-shared-key command above: pre-shared-key hex [hex key]. For example: pre-shared-key hex 0x6A6B6C. This configures IPsec to use pre-shared keys. exit Example: Device(config-ikev2-keyring)# exit crypto logging ikev2 Example: Device(config)# crypto logging ikev2 Exits IKEv2 keyring peer configuration mode. Enables IKEv2 syslog messages. Note The configuration above is not a complete IKE v2 configuration, and that additional settings will be needed. IPsec Transforms and Lifetimes Regardless of the IKE version selected, the device must be configured with the proper transform for IPsec ESP encryption and integrity as well as IPsec lifetimes. device (config)# crypto ipsec transform-set example esp-aes 128 esp-sha-hmac Note that this configures IPsec ESP to use HMAC-SHA-1 and AES-CBC-128. To change this to the other allowed algorithms the following options can replace esp-aes 128 in the command above: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1414 Security Use of X.509 With Internet Key Exchange Version Encryption Algorithm AES-CBC-256 AES-GCM-128 AES-GCM-256 Command esp-aes 256 esp-gcm 128 esp-gcm 256 Note The size of the key selected here must be less than or equal to the key size selected for the IKE encryption setting. If AES-CBC-128 was selected there for use with IKE encryption, then only AES-CBC-128 or AES-GCM-128 may be selected here. device(config-crypto)# mode tunnel This configures tunnel mode for IPsec. Tunnel is the default, but by explicitly specifying tunnel mode, the device will request tunnel mode and will accept only tunnel mode. device(config-crypto)# mode transport This configures transport mode for IPsec. device(config)# crypto ipsec security-association lifetime seconds 28800 The default time value for Phase 2 SAs is 1 hour. There is no configuration required for this setting since the default is acceptable. However to change the setting to 8 hours as claimed in the Security Target the crypto ipsec security-association lifetime command can be used as specified above. device(config)# crypto ipsec security-association lifetime kilobytes 100000 This configures a lifetime of 100 MB of traffic for Phase 2 SAs. The default amount for this setting is 2560KB, which is the minimum configurable value for this command. The maximum configurable value for this command is 4GB. Use of X.509 With Internet Key Exchange Version Cisco Catalyst 9800 Series Wireless Controller supports RSA and ECDSA based certificates. Once X.509v3 keys are installed on the device, they can be set for use with IKEv1 with the commands: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 crypto isakmp policy-name Example: Device(config)#crypto isakmp policy 1 Defines an Internet Key Exchange (IKE) policy and assigns a priority to the policy. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1415 For IKEv2 Commands Security Step 3 Step 4 Command or Action authentication [remote | local] rsa-sig Example: Device(config-isakmp)#authentication rsa-sig authentication [remote | local] ecdsa-sig Example: Device(config-isakmp)#authentication ecdsa-sig Purpose Uses RSA based certificates for IKEv1 authentication. Uses ecdsa based certificates for IKEv1 authentication. For IKEv2 Commands Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 crypto ikev2 profile sample Example: Device(config)# crypto ikev2 profile sample Step 3 authentication [remote | local] rsa-sig Example: Device(config-ikev2-profile)# authentication rsa-sig Step 4 authentication [remote | local] ecdsa-sig Example: Device(config-ikev2-profile)# authentication ecdsa-sig Purpose Enters global configuration mode. Defines an Internet Key Exchange (IKE) policy and assigns a profile. Uses RSA based certificates for IKEv1 authentication. Uses ecdsa based certificates for IKEv1 authentication. Authentication fails if an invalid certificate is loaded. IPsec Session Interuption and Recovery If an IPsec session with a peer is unexpectedly interrupted, the connection will be broken. In this scenario, no administrative interaction is required. The IPsec session will be reestablished (a new SA set up) once the peer is back online. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1416 Security Example: Configure IPSec Using ISAKMP Example: Configure IPSec Using ISAKMP The following sample outputs display the IPSec isakmp configuration: crypto isakmp policy 1 encr aes 256 hash sha256 authentication pre-share group 14 lifetime 28800 crypto isakmp key 0 Cisco!123 address 192.0.2.4 crypto isakmp peer address 192.0.2.4 crypto ipsec transform-set aes-gcm-256 esp-gcm 256 mode tunnel crypto map IPSEC_ewlc_to_syslog 1 ipsec-isakmp set peer 192.0.2.4 set transform-set aes-gcm-256 match address acl_ewlc_to_syslog interface Vlan15 crypto map IPSEC_ewlc_to_syslog end Verifying IPSec Traffic The following example shows how to verify the IPSec traffic configuration in isakmp configuration: Device# show crypto map Crypto Map IPv4 "IPSEC_ewlc_to_syslog" 1 ipsec-isakmp Peer = 192.0.2.4 Extended IP access list acl_ewlc_to_syslog access-list acl_ewlc_to_syslog permit ip host 192.0.2.2 host 192.0.2.4 Current peer: 192.0.2.4 Security association lifetime: 4608000 kilobytes/3600 seconds Responder-Only (Y/N): N PFS (Y/N): N Mixed-mode : Disabled Transform sets={ aes-gcm-256: { esp-gcm 256 } , } Interfaces using crypto map IPSEC_ewlc_to_syslog: Vlan15 Device# show crypto isakmp sa IPv4 Crypto ISAKMP SA dst src 192.0.2.5 192.0.2.4 state QM_IDLE conn-id status 1011 ACTIVE IPv6 Crypto ISAKMP SA Device# show crypto ipsec sa interface: Vlan15 Crypto map tag: IPSEC_ewlc_to_syslog, local addr 192.0.2.5 protected vrf: (none) local ident (addr/mask/prot/port): (192.0.2.5/255.255.255.255/0/0) Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1417 Example: Configure IPSec Using Internet Key Exchange Version 2 Security remote ident (addr/mask/prot/port): (192.0.2.4/255.255.255.255/0/0) current_peer 192.0.2.4 port 500 PERMIT, flags={origin_is_acl,} #pkts encaps: 1626, #pkts encrypt: 1626, #pkts digest: 1626 #pkts decaps: 1625, #pkts decrypt: 1625, #pkts verify: 1625 #pkts compressed: 0, #pkts decompressed: 0 #pkts not compressed: 0, #pkts compr. failed: 0 #pkts not decompressed: 0, #pkts decompress failed: 0 #send errors 0, #recv errors 0 local crypto endpt.: 192.0.2.5, remote crypto endpt.: 192.0.2.4 plaintext mtu 1446, path mtu 1500, ip mtu 1500, ip mtu idb Vlan15 current outbound spi: 0x17FF2F4C(402599756) PFS (Y/N): N, DH group: none inbound esp sas: spi: 0x4B77AD78(1266134392) transform: esp-gcm 256 , in use settings ={Tunnel, } conn id: 2041, flow_id: HW:41, sibling_flags FFFFFFFF80004048, crypto map: IPSEC_ewlc_to_syslog sa timing: remaining key lifetime (k/sec): (4607904/1933) IV size: 8 bytes replay detection support: Y Status: ACTIVE(ACTIVE) inbound ah sas: inbound pcp sas: outbound esp sas: spi: 0x17FF2F4C(402599756) transform: esp-gcm 256 , in use settings ={Tunnel, } conn id: 2042, flow_id: HW:42, sibling_flags FFFFFFFF80004048, crypto map: IPSEC_ewlc_to_syslog sa timing: remaining key lifetime (k/sec): (4607904/1933) IV size: 8 bytes replay detection support: Y Status: ACTIVE(ACTIVE) outbound ah sas: outbound pcp sas: Device# show ip access-lists acl_ewlc_to_syslog Extended IP access list acl_ewlc_to_syslog 10 permit ip host 192.0.2.5 host 192.0.2.4 (17 matches) Example: Configure IPSec Using Internet Key Exchange Version 2 The following sample outputs display the IPSec IKEv2 configuration: topology : [192.0.2.6]DUT -- (infra) -- PEER[192.0.2.9] ikev2 config in 192.0.2.6 (peer is 192.0.2.9) hostname for 192.0.2.9: Edison-M1 hostname for 192.0.2.6: prsna-nyquist-192.0.2.6 ip access-list extended ikev2acl permit ip host 192.0.2.6 host 192.0.2.9 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1418 Security Verifying IPSec With Internet Key Exchange Version 2 Traffic crypto ikev2 proposal PH1PROPOSAL encryption aes-cbc-256 integrity sha256 group 14 ! crypto ikev2 policy PH1POLICY proposal PH1PROPOSAL crypto ikev2 keyring PH1KEY peer Edison-M1 address 192.0.2.9 pre-shared-key Cisco!123Cisco!123Cisco!123 crypto ikev2 profile PH1PROFILE match identity remote address 192.0.2.9 255.255.255.255 authentication remote pre-share authentication local pre-share keyring local PH1KEY crypto ipsec transform-set aes256-sha1 esp-aes 256 esp-sha-hmac mode tunnel crypto map ikev2-cryptomap 1 ipsec-isakmp set peer 192.0.2.9 set transform-set aes256-sha1 set ikev2-profile PH1PROFILE match address ikev2acl interface Vlan15 ip address 192.0.2.6 255.255.255.0 crypto map ikev2-cryptomap Verifying IPSec With Internet Key Exchange Version 2 Traffic The following example shows how to verify the IPSec traffic configuration in IKEv2 configuration: Device# show ip access-lists Extended IP access list ikev2acl 10 permit ip host 192.0.2.6 host 192.0.2.9 (80 matches) prsna-nyquist-192.0.2.6#show crypto map Crypto Map IPv4 "ikev2-cryptomap" 1 ipsec-isakmp Peer = 192.0.2.9 IKEv2 Profile: PH1PROFILE Extended IP access list ikev2acl access-list ikev2acl permit ip host 192.0.2.6 host 192.0.2.9 Current peer: 192.0.2.9 Security association lifetime: 4608000 kilobytes/3600 seconds Responder-Only (Y/N): N PFS (Y/N): N Mixed-mode : Disabled Transform sets={ aes256-sha1: { esp-256-aes esp-sha-hmac } , } Interfaces using crypto map ikev2-cryptomap: Vlan15 Device# show crypto ikev2 sa detailed IPv4 Crypto IKEv2 SA Tunnel-id Local Remote fvrf/ivrf Status Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1419 Verifying IPSec With Internet Key Exchange Version 2 Traffic Security 1 192.0.2.6/500 192.0.2.9/500 none/none READY Encr: AES-CBC, keysize: 256, PRF: SHA256, Hash: SHA256, DH Grp:14, Auth sign: PSK, Auth verify: PSK Life/Active Time: 86400/1002 sec CE id: 1089, Session-id: 2 Status Description: Negotiation done Local spi: 271D20169FE91074 Remote spi: 13895472E3B910AF Local id: 192.0.2.6 Remote id: 192.0.2.9 Local req msg id: 2 Remote req msg id: 0 Local next msg id: 2 Remote next msg id: 0 Local req queued: 2 Remote req queued: 0 Local window: 5 Remote window: 5 DPD configured for 0 seconds, retry 0 Fragmentation not configured. Dynamic Route Update: disabled Extended Authentication not configured. NAT-T is not detected Cisco Trust Security SGT is disabled Initiator of SA : Yes Device# show crypto ipsec sa detail interface: Vlan15 Crypto map tag: ikev2-cryptomap, local addr 192.0.2.6 protected vrf: (none) local ident (addr/mask/prot/port): (192.0.2.6/255.255.255.255/0/0) remote ident (addr/mask/prot/port): (192.0.2.9/255.255.255.255/0/0) current_peer 192.0.2.9 port 500 PERMIT, flags={origin_is_acl,} #pkts encaps: 80, #pkts encrypt:80, #pkts digest: 80 #pkts decaps: 80, #pkts decrypt: 80, #pkts verify: 80 #pkts compressed: 0, #pkts decompressed: 0 #pkts not compressed: 0, #pkts compr. failed: 0 #pkts not decompressed: 0, #pkts decompress failed: 0 #pkts no sa (send) 0, #pkts invalid sa (rcv) 0 #pkts encaps failed (send) 0, #pkts decaps failed (rcv) 0 #pkts invalid prot (recv) 0, #pkts verify failed: 0 #pkts invalid identity (recv) 0, #pkts invalid len (rcv) 0 #pkts replay rollover (send): 0, #pkts replay rollover (rcv) 0 ##pkts replay failed (rcv): 0 #pkts tagged (send): 0, #pkts untagged (rcv): 0 #pkts not tagged (send): 0, #pkts not untagged (rcv): 0 #pkts internal err (send): 0, #pkts internal err (recv) 0 local crypto endpt.: 192.0.2.6, remote crypto endpt.: 192.0.2.9 plaintext mtu 1438, path mtu 1500, ip mtu 1500, ip mtu idb Vlan15 current outbound spi: 0xB546157A(3041269114) PFS (Y/N): N, DH group: none inbound esp sas: spi: 0x350925BC(889791932) transform: esp-256-aes esp-sha-hmac , in use settings ={Tunnel, } conn id: 838, flow_id: 838, sibling_flags FFFFFFFF80000040, crypto map: ikev2-cryptomap sa timing: remaining key lifetime (k/sec): (4287660676/2560) IV size: 16 bytes replay detection support: Y Status: ACTIVE(ACTIVE) inbound ah sas: inbound pcp sas: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1420 Security Verifying IPSec With Internet Key Exchange Version 2 Traffic outbound esp sas: spi: 0xB546157A(3041269114) transform: esp-256-aes esp-sha-hmac , in use settings ={Tunnel, } conn id: 837, flow_id: 837, sibling_flags FFFFFFFF80000040, crypto map: ikev2-cryptomap sa timing: remaining key lifetime (k/sec): (4287660672/2560) IV size: 16 bytes replay detection support: Y Status: ACTIVE(ACTIVE) outbound ah sas: outbound pcp sas: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1421 Verifying IPSec With Internet Key Exchange Version 2 Traffic Security Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1422 1 3 1 C H A P T E R Transport Layer Security Tunnel Support · Information About Transport Layer Security Tunnel Support, on page 1423 · Configuring a Transport Layer Security Tunnel, on page 1424 · Verifying a Transport Layer Security Tunnel, on page 1425 Information About Transport Layer Security Tunnel Support The Cisco Catalyst 9800 Series Wireless Controller requires direct access to a public cloud to implement the teleworker solution using Cisco OfficeExtend Access Points (OEAPs). With the introduction of Transport Layer Security (TLS) tunnel support from Cisco IOS XE Amsterdam 17.3.2 onwards, the controller can now reach a public cloud automatically. This helps Digital Network Architecture (DNA) Center on Cloud to establish TLS communication channels with the controller to perform monitor and manage of wireless solutions. The TLS connection ensures that the configuration and telemetry are reliably and securely communicated between the controller and the Digital Network Architecture (DNA) on Cloud. The TLS tunnel encrypts all the data that is sent over the TCP connection. The TLS tunnel provides a more secure protocol across the internet. After the controller discovery, the Cisco DNA Center on Cloud uses Cisco DNA Assurance and Automation features to manage the controller centrally. Cisco Plug and Play The Cisco Plug and Play solution is a converged solution that provides a highly secure, scalable, seamless, and unified zero-touch deployment experience. Plug-n-Play Agent The Cisco Plug and Play (PnP) agent is an embedded software component that is present in all the Cisco network devices that support simplified deployment architecture. The PnP agent understands and interacts only with a PnP server. The PnP agent, using DHCP, DNS, or other such methods, tries to acquire the IP address of the PnP server with which it wants to communicate. After a server is found and a connection is established, the agent communicates with the PnP server to perform deployment-related activities. For more information on Cisco Plug and Play, see the Cisco Plug and Play Feature Guide. The Transport Layer Security Tunnel (TLS) over PnP feature is supported on the following controllers: · Cisco Catalyst 9800-80 Wireless Controller · Cisco Catalyst 9800-40 Wireless Controller · Cisco Catalyst 9800-L Wireless Controller Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1423 Configuring a Transport Layer Security Tunnel Security Configuring a Transport Layer Security Tunnel Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. crypto tls-tunnel TLS-tunnel-name Example: Device(config)# crypto tls-tunnel cloud-primary Configures a crypto TLS tunnel channel. server {ipv4 <A.B.C.D> | ipv6 <X.X.X.X::X> Specifies the server IPv4 address, IPv6 | url <url-name>} port 443 <1025-65535> address, or URL name and the port number. Example: Device(config-crypto-tls-tunnel)# server ipv4 172.31.255.255 port 4043 overlay interface interface-name interface-num Example: Device(config-crypto-tls-tunnel)# overlay interface Loopback0 Specifies the overlay interface and interface number. An overlay interface is a logical, multiaccess, multicast-capable interface. An overlay interface encapsulates Layer 2 frames in IP unicast or multicast headers. local interface interface-name interface-num Specifies the LAN interface type, number, and priority rank the priority rank. Example: Device(config-crypto-tls-tunnel)# local-interface vlan 1 priority 1 Note Currently, the tunnel supports only one WAN interface with priority 1 and does not support the list of WAN interfaces with multiple priorities. Step 6 Step 7 psk id identity key options Example: Specifies a preshared key and password options. Device(config-crypto-tls-tunnel)# psk id test key pki trustpoint trustpoint trustpoint-label Specifies the trustpoints for use with the RSA [sign | verify] signature authentication method as follows: Example: Device(config-crypto-tls-tunnel)# pki trustpoint tsp1 sign · sign: Use the certificate from the trustpoint which is sent to the peer. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1424 Security Verifying a Transport Layer Security Tunnel Command or Action Purpose · verify: Use the certificate from the trustpoint to verify the certificate received from the peer. Note · If the sign or verify keyword is not specified, the trustpoint is used for signing and verification. · In TLS Tunnel block, authentication can be done using either pre-shared key (PSK) or PKI (certificate based). Step 8 Step 9 Step 10 (Optional) cc-mode Example: Device(config-crypto-tls-tunnel)# cc-mode Indicates a common criteria mode, which is a Federal Information Processing Standards (FIPS) mode. no shutdown Example: Device(config-crypto-tls-tunnel)# no shutdown Enables the TLS tunnel. end Returns to privileged EXEC mode. Example: Device(config-crypto-tls-tunnel)# end Verifying a Transport Layer Security Tunnel The TLS client support includes Binos processes using Linux Tun/Tap Interface. To verify the TLS client summary details, use the following command: Device# show platform software tlsc client summary TLS Client - Config Summary Name ID Gateway Port Auth Trustpoint DPD Time Rekey Time Retry Time ----------------------------------------------------------------------------------------------- fqdn 0 8443 PSK N/A 60 300 20 To verify the TLS client session detail, session statistics, tunnel statistics, and DNS counters, use the following command: Device# show platform software client detail <tls-name> Session Name : fqdn FQDN resolved IP : 10.255.255.255 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1425 Verifying a Transport Layer Security Tunnel Security ID Created Updated State Up Time Down Time Rekey Time :0 : 04/20/21 00:36:42 : 04/22/21 05:56:03 : Up (Rekey) : 04/21/21 20:30:21 (9 hours 25 minutes 45 seconds) : 04/21/21 20:30:01 : 04/22/21 05:55:51 (15 seconds) TLS Session Statistics Up Notifications : 3 Down Notifications : 2 Rekey Notifications : 636 DP State Updates : 0 DPD Cleanups :0 Packets From Packets To Packet Errors To Bytes From Bytes To -------------------------------------------------------------------------------------- BinOS 80 0 0 0 IOSd 0 0 0 0 TLS Client 0 0 0 0 TLS Tunnel Statistics Type Tx Packets Rx Packets ------------------------------------------ Total 0 80 CSTP Ctrl 3836 3836 CSTP Data 80 0 Type Requests Responses ----------------------------------------- CSTP Cfg 639 639 CSTP DPD 3197 3197 Invalid CSTP Rx :0 Injected Packet Success : 0 Injected Packet Failed : 0 Consumed Packets :0 TLS Tunnel DNS Counters DNS Resolve Request Success Count : 641 DNS Resolve Request Failure Count : 0 DNS Resolve Success Count : 639 DNS Resolve Failure Count :2 To verify the TLS client global statistics, use the following command. Device# show platform software tlsc statistics TLS Client: Global Statistics Session Statistics Up / Down :5/2 Rekeys : 636 DP Updates : 0 DPD Cleanups : 0 Packets From Packets To Packet Errors To Bytes From Bytes To ----------------------------------------------------------------------------------------- BinOS 85 0 0 IOSd 0 0 0 0 0 TLS Client 0 0 0 0 0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1426 Security Verifying a Transport Layer Security Tunnel Tunnel Statistics SSL Handshake Init / Done : 641 / 641 TCP Connection Req / Done : 641 / 641 Tunnel Packets Rx / Tx : 85 / 0 Injected / Failed : 0 / 0 Consumed :0 CSTP Packets Control Rx / Tx : 3839 / 3839 Data Rx / Tx : 0 / 85 Config Req / Resp : 641 / 641 DPD Req / Resp : 3198 / 3198 Invalid Rx :0 FQDN Counters Req / Resp / Success : 0 / 0 / 0 NAT Counters Transalte In / Out : 0 / 0 Ignore In / Out : 0 / 0 Failed :0 Invalid :0 No Entry :0 Unsupported :0 Internal Counters Type Allocated Freed ---------------------------- EV 1299 1295 Tunnel 5 4 Conn 643 642 Sess 3 2 Config Message Related Counters Type Success Failed ------------------------------ Create 3 0 Delete 2 0 To view the TLS client-session summary, use the following command. Device# show platform software tlsc session summary TLS Client - Session Summary Name ID Created State Since Elapsed --------------------------------------------------------------------------------------- fqdn 0 04/20/21 00:36:42 Up 04/21/21 20:30:21 9 hours 26 minutes 44 seconds Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1427 Verifying a Transport Layer Security Tunnel Security Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1428 1 3 2 C H A P T E R Configuring RFC 5580 Location Attributes · Feature History for RFC 5580 Location Attributes, on page 1429 · Information About RFC 5580 Location Attributes , on page 1430 · Information About Location-Capable Attribute , on page 1432 · Restriction for Configuring RFC 5580 Location Attributes, on page 1432 · Configuring Location Delivery Based on Out-of-Band Agreement (CLI), on page 1432 · Configuring Location-Capable Attribute (CLI), on page 1433 · Creating Location Attributes, on page 1433 · Associating Location Attributes with User Location (CLI), on page 1437 · Associating Location Attributes with the NAS Location (CLI), on page 1438 · Verifying RFC 5580 Location Attribute Configuration, on page 1439 Feature History for RFC 5580 Location Attributes This table provides release and related information for the feature explained in this module. This feature is also available in all the releases subsequent to the one in which they are introduced in, unless noted otherwise. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1429 Information About RFC 5580 Location Attributes Security Table 100: Feature History for RFC 5580 Location Attributes Release Feature Feature Information Cisco IOS XE Support for RFC 5580 This feature uses the RFC 5580 location attributes to convey Cupertino 17.9.1 Location Attributes in location-related information for authentication and accounting the Controller exchanges. The controller supports the following RFC 5580-related attributes: · Location-Information · Location-Data CIVIC Profile: Country · Location-Data CIVIC Profile: CAtype 1 (State) · Location-Data CIVIC Profile: CAtype 3 (City) · Location-Data CIVIC Profile: CAtype 23 (Venue Name) · Location-Data CIVIC Profile: CAtype 24 (Zip Code) · Location-Data GEO Profile (Longitude, Latitude, and Altitude) · Operator Name Information About RFC 5580 Location Attributes The RFC 5580 location attributes convey location-related information for authentication and accounting exchanges. The location information is useful in several scenarios. Wireless networks are deployed in public places, such as shopping malls, airports, hotels, and coffee shops by a diverse set of operators, such as wireless internet service providers (WISPs), cellular network operators, and fixed broadband networks. In all these scenarios, the network may need to know the user location to enable location-aware authorization, billing, or services. To preserve user privacy, the location information must be protected against unauthorized access and distribution. The RFC 5580 defines two types of location: · User location: This location is more specific to users. Note The user location is configured in AP. · NAS location: This is the common location to host all the users. For instance, suppose you configure user location at AP1, other users connecting to AP1 will also have the same user location. Now other users coming from AP2 will have a different user location. Thus, if AP1 and AP2 are connected to the controller, and you configure a NAS location, then users from AP1 and AP2 are connected to the same NAS location. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1430 Security Information About RFC 5580 Location Attributes Note The NAS location is configured in AAA. You can define certain profiles in each location. Profile refers to the attributes used to define the location. Each location has two profiles, namely, Civic and Geo. The following are the location profiles: · Civic Profile: In this profile, the location is described in terms of attributes such as Country, State, City, Area, and Postal Code. · Geo Profile: In this profile, the location is described in terms of attributes such as Latitude, Longitude, and Altitude. For users with both user location and NAS location, you can set their location in both Civic and Geo profile formats. Such users have the following locations: · Civic User location · Civic NAS location · Geo User location · Geo NAS location Each location information, for instance, the civic user location, is sent using the following attributes: · Location-Information · Location-Data The controller supports the following RFC 5580-related attributes: · Location-Information · Location-Data CIVIC Profile: Country · Location-Data CIVIC Profile: CAtype 1 (State) · Location-Data CIVIC Profile: CAtype 3 (City) · Location-Data CIVIC Profile: CAtype 23 (Venue Name) · Location-Data CIVIC Profile: CAtype 24 (Zip Code) · Location-Data GEO Profile (Longitude, Latitude, and Altitude) · Operator Name Thus, a user can have four locations and one operator name. To transfer location information, the Out-of-Band Agreement (Flow 1) delivery method mentioned in RFC 5580 is supported. This is applicable only if the feature is enabled and location information is configured. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1431 Information About Location-Capable Attribute Security Information About Location-Capable Attribute Cisco IOS-XE Dublin 17.11.1 supports the Location-Capable feature attribute from RFC 5580. This attribute is sent only in the network access requests. To enable the Location-Capable attribute, configure the radius-server attribute wireless location delivery out-of-band include-location-capable command. This attribute informs the RADIUS server that this device can send location information. The RFC5580 supports three flows or modes of location delivery. As per the RFC, the Location-Capable attribute should be sent in Flow-2, which is location delivery based on Initial-Request. The above-mentioned configuration enables sending this attribute in Flow-1, which is Location delivery based on Out-of-Band agreement as well. When an authentication or authorization request is received, the Location-Capable feature attribute is added to the request along with other location attributes as per the configuration (explained in the other section). This is applicable only for wireless clients. The RADIUS server might use this information to provide network access. Restriction for Configuring RFC 5580 Location Attributes This feature is supported only for 802.1X users. Configuring Location Delivery Based on Out-of-Band Agreement (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 radius-server attribute wireless location delivery out-of-band Configures RFC 5580 Out-of-Band location support. Example: Device(config)# radius-server attribute wireless location delivery out-of-band Step 3 end Example: Device(config)# end Returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1432 Security Configuring Location-Capable Attribute (CLI) Configuring Location-Capable Attribute (CLI) Use the radius-server attribute wireless location delivery out-of-band command to enable the feature globally. You can use the radius-server attribute wireless location delivery out-of-band include-location-capable command to include the location-capable attribute along with other location attributes. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 radius-server attribute wireless location Configures RFC 5580 out-of-band location delivery out-of-band include-location-capable attributes along with enabling the Example: location-capable attribute to be part of the access request. Device(config)# radius-server attribute wireless location delivery out-of-band include-location-capable Step 3 end Example: Device(config)# end Returns to privileged EXEC mode. Creating Location Attributes Configuring a Civic Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 location civic-location identifier Configures the civic profile for User location. civic_identifier Here, civic_identifier refers to the civic location Example: identifier string. It can take up to 215 characters. Device(config)# location civic-location You can enter a total of 250 bytes to configure identifier USER_C_1 civic address attributes. Cisco reserves 50 bytes for internal information. Therefore, the Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1433 Configuring a Civic Profile (CLI) Security Command or Action Purpose remaining 200 bytes can be used for user-configured civic location. Note You can configure the following types of civic attributes and add them to the RADIUS requests: · Country · City · State · Postal Code · Name Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 country country_ID Example: Device(config-civic)# country IN Sets the country ID. Note Only two-letter ISO 3166 country codes are accepted. city city_name Example: Device(config-civic)# city Bangalore Sets the city name. state state_name Example: Device(config-civic)# state Karnataka Sets the state name. postal-code postal_code Sets the postal code. Example: Device(config-civic)# postal-code 562016 name residence_name Example: Device(config-civic)# name Nivas Sets the residence name. end Example: Device(config-civic)# end Returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1434 Security Configuring a Geo Profile (CLI) Configuring a Geo Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 location geo-location identifier geo_identifier Configures a Geo profile for user location. Example: Device(config)# location geo-location identifier USER_G_1 Here, geo_identifier refers to the geographic location identifier string. It can take up to 215 characters. Step 3 latitude latitude_in_degrees resolution Sets the latitude information. The optional [resolution_value] parameters are documented within square Example: brackets. Device(config-geo)# latitude "34 12 15" While configuring the latitude, you can specify the resolution, in meters. If you do not specify any resolution, a default value of 10 meters is used. Step 4 longitude longitude_in_degrees resolution resolution_value Example: Device(config-geo)# longitude "111 59 44" Sets the longitude information. The optional parameters are documented within square brackets. While configuring the longitude, you can specify the resolution, in meters. If you do not specify any resolution, a default value of 10 meters is used. Step 5 altitude altitude_value {feet resolution resolution_value | floor | meters resolution resolution_value} Configures the altitude for the geographic location. The optional parameters are documented within square brackets. Example: Device(config-geo)# altitude 10 meters resolution 10 · altitude_value: Refers to the altitude, in feet, floors, or meters. · resolution_value: Refers to the resolution, in feet or meters. Note Both the altitude and the altitude resolution must be in the same unit. Step 6 resolution resolution_value Example: Device(config-geo)# resolution 30 Specifies a single common resolution for latitude and longitude. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1435 Configuring an Operator Name (CLI) Security Step 7 Command or Action end Example: Device(config-geo)# end Purpose Returns to privileged EXEC mode. Configuring an Operator Name (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 location operator identifier identifier_name Example: Device(config)# location operator identifier USER_O_1 Configures an operator name for the user location. Here, identifier_name supports strings up to 215 characters in length. Step 3 name operator-name Example: Device(config-operator)# name ACT Configures the location operator name. Here, operator-name supports strings up to 248 characters in length. Step 4 namespace-id {E212 | ICC | REALM | TADIG} Example: Device(config-operator)# namespace-id ICC Configures the namespace for a location. The following are the namespace options: · E212: Refers to the Mobile Country Code (MCC) and Mobile Network Code (MNC). · ICC: Refers to the International Telecommunication Union Carrier Codes (ICC). · REALM: Refers to any registered domain name. · TADIG: Refers to the Transferred Account Data Interchange Group (TADIG) code. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1436 Security Associating Location Attributes with User Location (CLI) Command or Action Step 5 end Example: Device(config-operator)# end Purpose Note · If you have not configured any namespace, REALM is used as the default value. · The operator name can be associated with both NAS-Location and USER-Location. When an operator name is configured at both the locations, the operator name that is configured in USER-Location takes precedence. Returns to privileged EXEC mode. Associating Location Attributes with User Location (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap location name location_name Configures a location name for an AP. Example: Device(config)# ap location name OFFICE Step 3 ap-eth-mac AP_Ethernet_MAC Adds the AP to the location. Example: Here, AP_Ethernet_MAC refers to the AP Device(config-ap-location)# ap-eth-mac Ethernet MAC address. 0a0b.0cf0.0001 Step 4 location civic-location-id identifier_name Example: Device(config-ap-location)# location civic-location-id USER_C_1 Associates the civic location attribute with the user location. Step 5 location geo-location-id identifier_name Example: Associates the geographic location attribute with the user location. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1437 Associating Location Attributes with the NAS Location (CLI) Security Step 6 Step 7 Command or Action Device(config-ap-location)# location geo-location-id USER_G_1 location operator-id identifier_name Example: Device(config-ap-location)# location operator-id USER_O_1 end Example: Device(config-ap-location)# end Purpose Associates the operator location attribute with the user location. Returns to privileged EXEC mode. Associating Location Attributes with the NAS Location (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 radius-server attribute wireless location civic-location-id identifier_name Associates the civic location attribute with the NAS location. Example: Here, identifier_name supports strings up to Device(config)# radius-server attribute 215 characters in length. wireless location civic-location-id NAS_C_1 Step 3 radius-server attribute wireless location geo-location-id identifier_name Associates the geographic location attribute with the NAS location. Example: Here, identifier_name supports strings up to Device(config)# radius-server attribute 215 characters in length. Enter a valid or wireless location geo-location-id existing identifier name. NAS_G_1 Step 4 radius-server attribute wireless location operator-id identifier_name Associates the operator location attribute with the NAS location. Example: Device(config)# radius-server attribute wireless location operator-id NAS_0_1 Step 5 end Example: Device(config)# end Returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1438 Security Verifying RFC 5580 Location Attribute Configuration Verifying RFC 5580 Location Attribute Configuration To verify the location attributes associated with a given location, use the following command: Device# show ap location details AAA_location Location Name......................: AAA_location Location description...............: Policy tag.........................: default-policy-tag Site tag...........................: default-site-tag RF tag.............................: default-rf-tag AAA Location Status ...............: Enabled Civic Location Identifier : NAS_C_1 Geo Location Identifier : NAS_G_1 Operator Name Identifier : NAS_O_1 Configured list of APs 38ed.18ca.5a20 To verify the Cisco AP location, use the following command: Device# show ap name AP38ED.18CA.5A20 config general Cisco AP Name : AP38ED.18CA.5A20 ================================================= Cisco AP Identifier Country Code Regulatory Domain Allowed by Country AP Country Code AP Regulatory Domain 802.11bg 802.11a MAC Address IP Address Configuration IP Address IP Netmask Gateway IP Address Fallback IP Address Being Used Domain Name Server CAPWAP Path MTU Capwap Active Window Size Telnet State CPU Type Memory Type Memory Size SSH State Cisco AP Location - : 38ed.18cb.cf00 : Multiple Countries : : 802.11bg: 802.11a: : US - 802.11 6GHz: : -A : -A : 38ed.18ca.5a20 : Static IP assigned : 9.4.172.111 : 255.255.255.0 : 9.4.172.1 : : : : 1485 :1 : Disabled : ARMv7 Processor rev 0 (v7l) : DDR3 : 995328 KB : Disabled : AAA_location To verify the location attributes associated with a given MAC address, use the following command: Device# show wireless client mac 0080.5222.545c detail Client MAC Address : 0080.5222.545c Client MAC Type : Universally Administered Address Client DUID: NA Client IPv4 Address : AP MAC Address : 38ed.18cb.cf00 AP Name: AP38ED.18CA.5A20 AP slot : 1 Client State : Associated Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1439 Verifying RFC 5580 Location Attribute Configuration Policy Profile : default-policy-profile Flex Profile : N/A ... Civic Location Identifier : NAS_C_1 Geo Location Identifier : NAS_G_1 Operator Name Identifier : NAS_O_1 Note You will be able to view this output only if the RFC 5580 feature is enabled. To verify the Civic location details, use the following command: Device# show location civic-location identifier TEST1 Civic location information -------------------------- Identifier : TEST1 Name : home City : Morges State : Vaud Postal code : 1110 Country : CH To verify the Geo location details, use the following command: Device# show location geo-location identifier TEST4 Geo location information ------------------------ Identifier : TEST4 Latitude : 46.5112700 Longitude : 6.4985400 Altitude : 380 meters Resolution : 10 Resolution : 100 To verify the Operator location details, use the following command: Device# show location operator-location identifier myoperator Operator location information ------------------------ Operator Identifier : myoperator Operator Name : myoperator Operator Namespace : REALM ------------------------ Security Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1440 1 3 3 C H A P T E R IP MAC Binding · Information About IP MAC Binding, on page 1441 · Use Cases for No IP MAC Binding, on page 1441 Information About IP MAC Binding The wireless device tracking features, such as, theft detection, proxy, DHCP relay, gleaning, and suppression are enabled with IP MAC address binding configuration. Note The IP MAC address binding is enabled by default in the policy profile. No IP MAC Binding It disables all the wireless device tracking features for wireless clients' IPv4 address. Note It is not normally necessary to disable IP MAC Binding, except for scenarios wherein you have duplicate IP addresses across clients intentionally and scenarios that involve NAC devices. Use Cases for No IP MAC Binding The following are the use cases for No IP MAC binding: · Disabling IP Learning in FlexConnect Mode · Disabling Device Tracking to Support NAC Devices · Disabling IP Learning in Local Mode Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1441 Use Cases for No IP MAC Binding Security Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1442 1 3 4 C H A P T E R Disabling IP Learning in FlexConnect Mode · Information About Disabling IP Learning in FlexConnect Mode, on page 1443 · Restrictions for Disabling IP Learning in FlexConnect Mode, on page 1443 · Disabling IP Learning in FlexConnect Mode (CLI), on page 1444 · Verifying MAC Entries from Database , on page 1444 Information About Disabling IP Learning in FlexConnect Mode In FlexConnext local switching scenarios, where clients from the same sites may share the same address range, there is a possibility of multiple clients being allocated or registered with the same IP address. The controller receives IP address information from the AP, and if more than one client attempts to use the same IP address, the controller discards the last device trying to register an already-used address as an IP theft event, potentially resulting in client exclusion. The Disabling IP learning in FlexConnect mode feature utilizes the no ip mac-binding command to ensure that no device tracking is done for clients, thus preventing the IP theft error. Note · This feature is applicable only for IPv4 addresses. · Configuring ip overlap in FlexConnect Profile assists overlapping IP address support for clients across different sites in FlexConnect local switching. Restrictions for Disabling IP Learning in FlexConnect Mode · The wireless client ip deauthenticate command works by referring to the IP table binding entries directly. It does not work for client whose IPs are not learnt. · Overlapping IP addresses within a single site tag and across different site tags require different settings. Furthermore, if a single site tag contains overlapping IP addresses, L3 web authentication is necessary. However, L3 web authentication relies on IP addresses, and ensuring the uniqueness of IP addresses cannot be guaranteed, making this combination incorrect. · When IP Source Guard (IPSG) is enabled and multiple binding information is sent with the same IP and preference level (such as DHCP, ARP, and so on) to CPP, the CPP starts to ignore the later bindings Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1443 Disabling IP Learning in FlexConnect Mode (CLI) Security after the first binding creation. Hence, you should not configure IPSG and disable IP MAC binding together. If IPSG and no ip mac-binding are configured together then IPSG does not work. Disabling IP Learning in FlexConnect Mode (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-policy-name Configures the wireless profile policy. Example: Device(config)# wireless profile policy test-profile-policy Step 3 shutdown Disables the wireless policy profile. Example: Note Device(config-wireless-policy)# shutdown Disabling policy profile results in associated AP and client to rejoin. Step 4 Step 5 Step 6 no ip mac-binding Example: Device(config-wireless-policy)# no ip mac-binding Disables IP learning in FlexConnect mode. no shutdown Example: Device(config-wireless-policy)# no shutdown Enables the wireless policy profile. exit Example: Device(config-wireless-policy)# exit Returns to privileged EXEC mode. Verifying MAC Entries from Database To verify the MAC details from database, use the following command: Device# show wireless device-tracking database mac MAC VLAN IF-HDL IP -------------------------------------------------------------------------------------------------- 6c96.cff2.889a 64 0x90000008 9.9.64.175 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1444 1 3 5 C H A P T E R Disabling Device Tracking to Support NAC Devices · Feature History for Disabling Device Tracking to Support NAC Devices, on page 1445 · Information About Disabling Device Tracking to Support NAC Devices, on page 1445 · Restrictions for Disabling Device Tracking to Support NAC Devices, on page 1446 · Disabling Device Tracking for Wireless Clients (CLI), on page 1446 · Verifying ARP Broadcast, on page 1447 Feature History for Disabling Device Tracking to Support NAC Devices This table provides release and related information for the feature explained in this module. Table 101: Feature History for Disabling Device-Tracking to Support NAC Devices Release Feature Feature Information Cisco IOS XE Cupertino Disabling Device Tracking to This feature helps to control the flow of traffic 17.8.1 Support NAC Devices between wireless clients using network access control (NAC) device. Information About Disabling Device Tracking to Support NAC Devices The feature helps to control the flow of traffic between wireless clients using a network access control (NAC) device. The NAC device blocks the direct traffic between wireless clients using ARP spoofing. Use the no ip mac-binding command for ARP spoofing from the NAC and disabling the wireless client device tracking. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1445 Restrictions for Disabling Device Tracking to Support NAC Devices Security Note This feature is applicable only for IPv4 addresses. Restrictions for Disabling Device Tracking to Support NAC Devices · The wireless client ip deauthenticate command works by referring to the IP table binding entries directly. It does not work for client whose IPs are not learnt. · Layer 3 web authentication and other L3 policies are not supported. · When IP Source Guard (IPSG) is enabled and multiple binding information is sent with the same address and preference level (such as DHCP, ARP, and so on) to Cisco Packet Processor (CPP), the CPP starts to ignore the later bindings after the first binding creation. Hence, you should not configure IPSG and no ip mac-binding together. If IPSG and no ip mac-binding are configured together then IPSG does not work. Disabling Device Tracking for Wireless Clients (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-policy-name Configures the wireless profile policy. Example: Device(config)# wireless profile policy test-profile-policy Step 3 shutdown Disables the wireless policy profile. Example: Note Device(config-wireless-policy)# shutdown Disabling policy profile results in associated AP and client to rejoin. Step 4 Step 5 no ip mac-binding Example: Device(config-wireless-policy)# no ip mac-binding Disables the IP-MAC address binding. no shutdown Example: Enables the wireless policy profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1446 Security Verifying ARP Broadcast Step 6 Step 7 Step 8 Step 9 Command or Action Device(config-wireless-policy)# no shutdown Purpose exit Example: Device(config-wireless-policy)# exit Returns to privileged EXEC mode. vlan configuration vlan-id Example: Device(config)# vlan configuration 20 Configures a VLAN and enters VLAN configuration mode. arp broadcast Enables ARP broadcast on VLAN. Example: Device(config-vlan-config)# arp broadcast end Example: Device(config-vlan-config)# end Returns to privileged EXEC mode. Verifying ARP Broadcast To verify the ARP broadcast, use the following command: Device# show platform software arp broadcast Arp broadcast is enabled on vlans: 20,50 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1447 Verifying ARP Broadcast Security Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1448 1 3 6 C H A P T E R Disabling IP Learning in Local Mode · Information About Disabling IP Learning in Local Mode, on page 1449 · Restrictions for Disabling IP Learning in Local Mode, on page 1449 · Disabling IP Learning in Local Mode (CLI), on page 1450 · Verifying MAC Entries from Database , on page 1451 · Verifying ARP Broadcast, on page 1451 Information About Disabling IP Learning in Local Mode In Local mode central switching scenarios, multiple clients may have an allocated or registered IP address. If the controller detects more than one client attempting to use the same IP address, it will discard one of the clients as an IP Theft event, potentially resulting in client exclusion. The Disabling IP learning in Local mode feature utilizes the no ip mac-binding command to ensure that device tracking is not done for clients, thus preventing the IP Theft error. To allow downstream broadcast ARP traffic to reach the wireless client in the VLAN, you should enable ARP broadcast and disable IP MAC binding. The controller replicates this traffic packet to all the APs belonging to the controller when Multicast over Multicast (MOM) is disabled. To avoid this replication, you will need to enable the MOM. Note This feature is applicable only for IPv4 addresses. Restrictions for Disabling IP Learning in Local Mode · The wireless client ip deauthenticate command works by referring to the IP table binding entries directly. It does not work for client whose IPs are not learnt. · The L3 web authentication and other L3 policies are not supported. · When IP Source Guard (IPSG) is enabled and multiple binding information is sent with the same IP and preference level (such as DHCP, ARP, and so on) to CPP, the CPP starts to ignore the later bindings after the first binding creation. Hence, you should not configure IPSG and disable IP MAC binding together. If IPSG and no ip mac-binding are configured together then IPSG does not work. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1449 Disabling IP Learning in Local Mode (CLI) Security Disabling IP Learning in Local Mode (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-policy-name Configures the wireless profile policy. Example: Device(config)# wireless profile policy test-profile-policy Step 3 shutdown Disables the wireless policy profile. Example: Note Device(config-wireless-policy)# shutdown Disabling policy profile results in associated AP and client to rejoin. Step 4 Step 5 Step 6 Step 7 no ip mac-binding Example: Device(config-wireless-policy)# no ip mac-binding Disables IP learning in Local mode. no shutdown Example: Device(config-wireless-policy)# no shutdown Enables the wireless policy profile. exit Example: Device(config-wireless-policy)# exit Returns to privileged EXEC mode. vlan configuration vlan-id Example: Device(config-vlan-config)# vlan configuration 20 Configures a VLAN and enters VLAN configuration mode. Note To allow downstream broadcast ARP traffic to reach the wireless client in the VLAN, you should enable ARP broadcast and disable IP MAC binding. Step 8 arp broadcast Enables ARP broadcast on VLAN. Example: Device(config-vlan-config)# arp broadcast Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1450 Security Verifying MAC Entries from Database Step 9 Command or Action end Example: Device(config-vlan-config)# end Purpose Returns to privileged EXEC mode. Verifying MAC Entries from Database To verify the MAC details from database, use the following command: Device# show wireless device-tracking database mac MAC VLAN IF-HDL IP -------------------------------------------------------------------------------------------------- 6c96.cff2.889a 64 0x90000008 9.9.64.175 Verifying ARP Broadcast To verify the ARP broadcast, use the following command: Device# show platform software arp broadcast Arp broadcast is enabled on vlans: 20,50 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1451 Verifying ARP Broadcast Security Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1452 PART VIII Mobility · Mobility, on page 1455 · NAT Support on Mobility Groups, on page 1475 · Static IP Client Mobility, on page 1479 · Mobility Domain ID - Dot11i Roaming, on page 1483 · 802.11r Support for Flex Local Authentication, on page 1485 · Opportunistic Key Caching, on page 1487 1 3 7 C H A P T E R Mobility · Introduction to Mobility, on page 1455 · Guidelines and Restrictions, on page 1460 · Configuring Mobility (GUI), on page 1462 · Configuring Mobility (CLI), on page 1463 · Configuring Inter-Release Controller Mobility (GUI), on page 1465 · Configuring Inter-Release Controller Mobility, on page 1465 · Verifying Mobility, on page 1469 Introduction to Mobility Mobility or roaming is a wireless LAN client's ability to maintain its association seamlessly from one access point to another access point securely and with as little latency as possible. This section explains how mobility works when controllers are included in a wireless network. When a wireless client associates and authenticates to an access point, the access point's controller places an entry for that client in its client database. This entry includes the client's MAC and IP addresses, security context and associations, quality of service (QoS) contexts, the WLAN, and the associated access point. The controller uses this information to forward frames and manage traffic to and from a wireless client. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1455 Introduction to Mobility Mobility Figure 40: Intracontroller Roaming This figure shows a wireless client that roams from one access point to another access point when both access points are joined to the same controller. When a wireless client moves its association from one access point to another access point, the controller simply updates the client database with the newly associated access point. If necessary, new security context and associations are established as well. The process becomes more complicated, however, when a client roams from an access point joined to one controller to an access point joined to a different controller. It also varies based on whether the controllers are operating on the same subnet. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1456 Mobility Introduction to Mobility Figure 41: Intercontroller Roaming This figure shows intercontroller roaming, which occurs when the wireless LAN interfaces of controllers are on the same IP subnet. When a client joins an access point associated with a new controller, the new controller exchanges mobility messages with the original controller, and the client database entry is moved to the new controller. New security context and associations are established if necessary, and the client database entry is updated for the new access point. This process remains transparent to the user. Note All clients configured with 802.1X/Wi-Fi Protected Access (WPA) security complete a full authentication in order to comply with the IEEE standard. Important Intersubnet Roaming is not supported for SDA. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1457 SDA Roaming Mobility Figure 42: Intersubnet Roaming This figure shows intersubnet roaming, which occurs when the wireless LAN interfaces of controllers are on different IP subnets. Intersubnet roaming is similar to intercontroller roaming in that, controllers exchange mobility messages on the client roam. However, instead of moving the client database entry to the new controller, the original controller marks the client with an anchor entry in its own client database. The database entry is copied to the new controller client database and marked with a foreign entry in the new controller. The roam remains transparent to the wireless client, and the client maintains its original IP address. In intersubnet roaming, WLANs on both anchor and foreign controllers should have the same network access privileges, and no source-based routing or source-based firewalls in place. Otherwise, the clients may have network connectivity issues after the handoff. In a static anchor setup using controllers and a RADIUS server, if AAA override is enabled to dynamically assign VLAN and QoS, the foreign controller updates the anchor controller with the right VLAN after a Layer 2 authentication (802.1x). For Layer 3 RADIUS authentication, the RADIUS requests for authentication are sent by the anchor controller. Note The Cisco Catalyst 9800 Series Wireless Controller mobility tunnel is a CAPWAP tunnel with control path (UDP 16666) and data path (UDP 16667). The control path is DTLS encypted by default. Data path DTLS can be enabled when you add the mobility peer. SDA Roaming SDA supports two additional types of roaming, which are Intra-xTR and Inter-xTR. In SDA, xTR stands for an access-switch that is a fabric edge node. It serves both as an ingress tunnel router as well as an egress tunnel router. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1458 Mobility Definitions of Mobility-related Terms When a client on a fabric enabled WLAN, roams from an access point to another access point on the same access-switch, it is called Intra-xTR. Here, the local client database and client history table are updated with the information of the newly associated access point. When a client on a fabric enabled WLAN, roams from an access point to another access point on a different access-switch, it is called Inter-xTR. Here, the map server is also updated with the client location (RLOC) information. Also, the local client database is updated with the information of the newly associated access point. Figure 43: SDA Roaming This figure shows inter-xTR and intra-xTR roaming, which occurs when the client moves from one access point to another access point on the same switch or to a different switch in a Fabric topology. Definitions of Mobility-related Terms · Point of Attachment--A station's point of attachment is where its data path is initially processed upon entry into the network. · Point of Presence--A station's point of presence is the place in the network where the station is being advertised. · Station--A user's device that connects to and requests service from a network. Mobility Groups A mobility group is a set of controllers, identified by the same mobility group name, that defines the realm of seamless roaming for wireless clients. By creating a mobility group, you can enable multiple controllers Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1459 Guidelines and Restrictions Mobility in a network to dynamically share information and forward data traffic when intercontroller or intersubnet roaming occurs. Controllers in the same mobility group can share the context and state of client devices as well as their list of access points so that they do not consider each other's access points as rogue devices. With this information, the network can support intercontroller wireless LAN roaming and controller redundancy. Note While moving an AP from one controller to another (when both controllers are mobility peers), a client associated to controller-1 before the move might stay there even after the move. This is due to a timeout period on controller-1, where the client entry is maintained (for the purposes of roaming/re-association scenarios). To avoid the client being anchored in controller-1, remove the mobility peer configuration of the controller. Figure 44: Example of a Single Mobility Group As shown in the figure above, each controller is configured with a list of the other members of the mobility group. Whenever a new client joins a controller, the controller sends out a unicast message (or multicast message if mobility multicast is configured) to all of the controllers in the mobility group. The controller to which the client was previously connected passes on the status of the client. Guidelines and Restrictions The following AireOS and Cisco Catalyst 9800 Series Wireless Controller platforms are supported for SDA Inter-Controller Mobility (AireOS controllerto-Cisco Catalyst 9800 Series Wireless Controller): · AireOS Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1460 Mobility Guidelines and Restrictions · Cisco 3504 · Cisco 5520 · Cisco 8540 · Cisco Catalyst 9800 Series Wireless Controller · Cisco Catalyst 9800 Wireless Controller for Cloud · Cisco Catalyst 9800-80 Wireless Controller · Cisco Catalyst 9800-40 Wireless Controller · Cisco Catalyst 9800-L Wireless Controller The following controller platforms are supported for SDA Inter-Controller Mobility: · Catalyst Switches · Cisco 9300 · Cisco Catalyst 9800 Series Wireless Controller · Cisco Catalyst 9800 Wireless Controller for Cloud · Cisco Catalyst 9800-40 Wireless Controller · Ensure that the data DTLS configuration on the Cisco Catalyst 9800 Series Wireless Controller and AireOS are the same, as configuration mismatch is not supported on the Cisco Catalyst 9800 Series Wireless Controller and it causes the mobility data path to go down. · In intercontroller roaming scenarios, policy profiles having different VLANs is supported as a Layer 3 roaming. · In AireOS controller, L3 override is not supported in guest VLAN. Hence, the client does not trigger DHCP Discovery on the new VLAN automatically. · Policy profile name and client VLAN under policy profile can be different across the controllers with the same WLAN profile mapped. · In intracontroller roaming scenarios, client roaming is supported between same policy profiles, with WLAN mapped. From Cisco IOS XE Amsterdam 17.3.x, The controller allows seamless roaming between same WLAN associated with different policy profile. For more information, see Client Roaming Policy Profile feature. · If a client roams in web authentication state, the client is considered as a new client on another controller instead of being identified as a mobile client. · Controllers that are mobility peers must use the same DHCP server to have an updated client mobility move count on intra-VLAN. · Data DTLS and SSC hash key must be same for mobility tunnels between members. · Mobility move count is updated under client detail only during inter-controller roaming. Intra-controller roaming can be verified under client stats and mobility history. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1461 Configuring Mobility (GUI) Mobility · Anchor VLAN in Cisco Catalyst 9800 Series Wireless Controller is represented as Access VLAN on the Cisco AireOS controller. · When clients are roaming, their mobility role is shown as Unknown. This is because the roaming clients are in IP learn state, and in such a scenario, there are many client additions to the new instance and deletions in the old instance. · In inter-controller roaming between 9800 and 9800/AireOS, client roaming is not supported, whenever there is a WLAN profile mismatch. · Only IPv4 tunnel is supported between Cisco Catalyst 9800 Series Wireless Controller and Cisco AireOS controller. · Ensure that you configure the mobility MAC address using the wireless mobility mac-address command for High-Availability to work. · Mobility tunnel will not work if ECDSA based certificate or trustpoint is used for wireless management. · If Anchor and Foreign controllers are put in the same Layer 2 network, it creates a loop topology (one path is Layer 3 mobility tunnel between Anchor and Foreign, another path is Layer 2 wired connection between Anchor and Foreign). In this topology, MAC_CONFLICT warning message can be seen on both the Anchor and Foreign controllers. This MAC_CONFLICT warning message is printed once every minute. However,it doesn't have any functionality and performance impact. As a best practice, do not use management VLAN as client VLAN. · Mobility Tunnel will go down and come up if SSO is triggered due to gateway check failure. · If the current AP has 5-GHz slot2 radio on L2 and L3 mobility 5-GHz slot2, the WLAN BSSID is only added to the 11k or 11v neighbor information. As a result, the AP does not have the information of radio properties of the APs belonging to the other controllers. Hence, it can be assumed that the radio properties of the APs belonging to the other controllers are similar to that of the current AP. If the current AP does not have slot2, the other APs cannot be added as a neighbor. In such a scenario, the validation fails and does not add this radio to the neighbor list. · We recommend that you use the default keepalive count and interval values to reduce convergence time between the Cisco AireOS Wireless Controllers and Cisco Catalyst 9800 Series Wireless Controllers while setting up a mobility tunnel. · A new client may take up to 3 seconds to join the network when the mobility tunnel is UP and mobility peers are configured. This is because the system sends three mobile messages (one second apart) to find out whether the client is already part of the network. Configuring Mobility (GUI) Procedure Step 1 Step 2 Choose Configuration > Wireless > Mobility. The Wireless Mobility page is displayed on which you can perform global configuration and peer configuration. In the Global Configuration section, perform the following tasks: a) Enter a name for the mobility group. b) Enter the multicast IP address for the mobility group. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1462 Mobility Configuring Mobility (CLI) Step 3 c) In the Keep Alive Interval field, specify the number of times a ping request is sent to a mobility list member before the member is considered to be unreachable. The valid range is 3 to 20, and the default value is 3. d) Specify the Mobility Keep Alive Count amount of time (in seconds) between each ping request sent to a mobility list member. The valid range is 1 to 30 seconds. e) Enter the DSCP value for the mobility group. f) Enter the mobility MAC address. g) Click Apply. In the Peer Configuration tab, perform the following tasks: a) In the Mobility Peer Configuration section, click Add. b) In the Add Mobility Peer window that is displayed, enter the MAC address and IP address for the mobility peer. The MAC address can be either in xx:xx:xx:xx:xx:xx, xx-xx-xx-xx-xx-xx, or xxxx.xxxx.xxxx format. c) Additionally, when NAT is used, enter the optional public IP address to enter the mobility peer's NATed address. When NAT is not used, the public IP address is not used and the device displays the mobility peer's direct IP address. d) Enter the mobility group to which you want to add the mobility peer. e) Select the required status for Data Link Encryption. f) Specify the SSC Hash as required. SSC hash is required if the peer is a Cisco Catalyst 9800-CL Wireless Controller, which uses self-signed certificate and hence SSC hash is used as an additional validation. SSC hash is not required if peer is an appliance, which will have manufacturing installed certificates (MIC) or device certificates burned in the hardware. g) Click Save & Apply to Device. h) In the Non-Local Mobility Group Multicast Configuration section, click Add. i) Enter the mobility group name. j) Enter the multicast IP address for the mobility group. k) Click Save. Configuring Mobility (CLI) Procedure Step 1 Command or Action Purpose wireless mobility group name group-name Creates a mobility group named Mygroup. Example: Device(config)# wireless mobility group name Mygroup Step 2 wireless mobility mac-address mac-addr Example: Device(config)# wireless mobility mac-address 00:0d:ed:dd:25:82 Configures the MAC address to be used in mobility messages. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1463 Configuring Mobility (CLI) Mobility Step 3 Step 4 Step 5 Step 6 Step 7 Command or Action Purpose wireless mobility dscp value-0-to-63 Example: (Optional) Configures mobility intercontroller DSCP value. Device(config)# wireless mobility dscp 10 wireless mobility group keepalive interval (Optional) Configures the interval between two time-in-seconds keepalives sent to a mobility member. Valid Example: range is between 1 and 30 seconds. Device(config)# wireless mobility group Note keepalive interval 5 For controllers connected through mobility tunnels, ensure that both controllers have the same keepalive interval value. wireless mobility group keepalive count count (Optional) Configures the keepalive retries Example: before a member status is termed DOWN. Device(config)# wireless mobility group keepalive count 3 Use the options given below to configure IPv4 Adds a peer IPv4 or IPv6 address to a specific or IPv6. group. · wireless mobility mac-address To remove the peer from the local group, use mac-address ip peer-ip-address group the no form of this command. group-name data-link-encryption · wireless mobility mac-address mac-address ip peer-ip-address public-ip public-ip-address group group-name Example: Device(config#) wireless mobility mac-address 001E.BD0C.5AFF ip 9.12.32.10 group test-group data-link-encryption Device(config#) wireless mobility mac-address 001E.BD0C.5AFF ip fd09:9:2:49::55 public-ip fd09:9:2:49::55 group scalemobility wireless mobility multicast {ipv4 | ipv6 (Optional) Configures a multicast IPv4 or IPv6 }ip-address or wireless mobility group address for a local mobility group or a nonlocal multicast-address group-name {ipv4 | ipv6 } mobility group. ip-address Note Mobility Multicast--The Example: controller sends a multicast Device(config)# wireless mobility multicast ipv4 224.0.0.4 message instead of a unicast message to all the members in the Example: Device(config)# wireless mobility group multicast-address Mygroup ipv4 224.0.0.5 mobility local group or a nonlocal group when a client joins or roams. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1464 Mobility Configuring Inter-Release Controller Mobility (GUI) Command or Action Purpose Configures the multicast IPv4 address as 224.0.0.4 for a local mobility group. Configures the multicast IPv4 address as 224.0.0.5 for a nonlocal mobility group. Configuring Inter-Release Controller Mobility (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Wireless > Mobility > Global Configuration. Enter the Mobility Group Name, Multicast IPv4 Address, Multicast IPv6 Address, Keep Alive Interval (sec), Mobility Keep Alive Count, Mobility DSCP Value and Mobility MAC Address. Click Apply. Configuring Inter-Release Controller Mobility Inter-Release Controller Mobility (IRCM) is a set of features and functionality that enable interworking between controllers running different software releases. IRCM enables seamless mobility and wireless services across controllers running Cisco AireOS and Cisco IOS (for example, Cisco 8540 WLC to Cisco Catalyst 9800 Series Wireless Controller) for features such as Layer 2 and Layer 3 roaming and guest access or termination. Note To configure IRCM for different combination of AireOS and Catalyst 9800 controllers, see the Cisco Catalyst 9800 Wireless Controller-Aireos IRCM Deployment Guide. Follow the procedure described to configure mobility peers on the controller: Before you begin The Inter-Release Controller Mobility (IRCM) feature is supported by the following Cisco Wireless Controllers. · For IRCM deployment, we recommended that you configure: · Both Cisco AireOS and Cisco Catalyst 9800 Series Controllers as static RF leaders to avoid RF grouping between them. · Configure the same RF network name on both the controllers. · Cisco Catalyst 9800 Series Wireless Controller platforms running Cisco IOS XE Software version 16.10.1 or later. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1465 Configuring Inter-Release Controller Mobility Mobility · Supports the following Cisco AireOS Wireless Controllers running Cisco AireOS 8.5.14x.x IRCM image based on the 8.5 Maintenance Release software: · Cisco 3504 Wireless Controllers · Cisco 5508 Wireless Controllers · Cisco 5520 Wireless Controllers · Cisco 8510 Wireless Controllers · Cisco 8540 Wireless Controllers · By design, Cisco Catalyst 9800 Wireless Controllers does not have the Primary Mode configuration exposed that is to be sent in the Discovery Response. The controller always sends the Discovery Response with the Primary Mode enabled. · Supported Cisco AireOS Wireless Controllers running AireOS 8.8.111.0 and later. The following controllers are supported: · Cisco 3504 Wireless Controllers · Cisco 5520 Wireless Controllers · Cisco 8540 Wireless Controllers Note If the peer Cisco Catalyst 9800 Series Wireless Controller is virtual, configure the hash using command: config mobility group member hash 172.20.227.73 3f93a86cee2039e9c3aada1822ad74b89fea30c1 config mobility group member hash 172.20.227.73 3f93a86cee2039e9c3aada1822ad74b89fea30c1 Optionally enable data tunnel encryption using command: config mobility group member data-dtls 00:0c:29:a8:d5:77 enable/disable The hash configure above can be obtained by running the following command on the Cisco Catalyst 9800 Series Wireless Controller: show wireless management trustpoint Trustpoint Name : ewlc-tp1 Certificate Info : Available Certificate Type : SSC Certificate Hash : 3f93a86cee2039e9c3aada1822ad74b89fea30c1 Private key Info : Available · The IRCM feature is not supported on the following Cisco AireOS Wireless Controllers: · Cisco 2504 Wireless Controllers Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1466 Mobility Configuring Inter-Release Controller Mobility · Cisco Flex 7510 Wireless Controllers · Cisco WiSM 2 · IPv6 is not supported for SDA IRCM for fabric client roaming. IPv6 is supported for IRCM for non-fabric client roaming. · Ensure that you use AireOS controller that supports Encrypted Mobility feature. · AVC is not supported for IRCM. · In mixed deployments (Catalyst 9800 and AireOS Controllers), the WLAN profile name and the policy profile name must be the same. This is due to AireOS not knowing about the policy profile and therefore only sends or receives the WLAN name as both the policy profile and WLAN profile. · Mobility group multicast is not supported because AireOS does not support mobility multicast in encrypted mobility. · There could be instances where the total number of clients count shown may be more than those supported on the roaming scale. This inconsistency is observed when the client roaming rate is very high, as the system requires time to update the records. Here, the clients presented on multiple wncds for a very short time are counted more than once. We recommend that you provide sufficient time for the process to obtain a consistent data before using one of the following methods: show CLIs, WebUI, DNAC, or SNMP. · Link Local bridging is not supported. Ensure that you disable it also on the peer AireOS controller. · IRCM is not supported in FlexConnect and FlexConnect+Bridge modes. The following client features support IPv6 client mobility between AireOS controllers and Cisco Catalyst 9800 Series Wireless Controller: Accounting, L3 Security (Webauth), Policy (ACL and QoS), IP address assignment and learning through SLAAC and DHCPv6, IPv6 Source Guard, multiple IPv6 address learning, IPv6 multicast, and SISF IPv6 features (RA Guard, RA Throttling, DHCPv6 Guard, and ND Suppress).ß The following IPv6 features are not supported on Cisco Catalyst 9800 Series Wireless Controller: · Configurable IPv6 timers · RA Guard enabled on AP · Global IPv6 disable Note · IPv6 CWA is not supported for both AireOS controllers and Cisco Catalyst 9800 Series Wireless Controller. · Only eight IPv6 addresses are supported per client. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1467 Configuring Inter-Release Controller Mobility Mobility Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 Use the options given below to configure IPv4 Adds a peer IPv4 or IPv6 address to a specific or IPv6. group. · wireless mobility group member To remove the peer from the local group, use mac-address mac-address ip peer-ip the no form of this command. group group-namedata-link-encryption · wireless mobility group member mac-address mac-address ip peer-ip-address public-ip public-ip-address group group-name Example: Device(config#) wireless mobility group member mac-address 001E.BD0C.5AFF ip 9.12.32.10 group test-group data-link-encryption Device(config#) wireless mobility group member mac-address 001E.BD0C.5AFF ip fd09:9:2:49::55 public-ip fd09:9:2:49::55 group scalemobility Step 3 wireless mobility group name group-name Adds a name for the local group. The default Example: local group name is "default". Device(config#) wireless mobility group name test-group Step 4 wireless mobility mac-address mac-address Example: Device(config#) wireless mobility mac-address 000d.bd5e.9f00 (Optional) Configures the MAC address to be used in mobility messages. Step 5 wireless mobility group member ip peer-ip Adds a peer in the local group. Example: To remove the peer from the local group, use Device(config#) wireless mobility group the no form of this command. member ip 9.12.32.15 Step 6 wireless mobility dscp dscp-value Example: (Optional) Configures DSCP. The default value is 48. Device(config#) wireless mobility dscp 52 Step 7 wireless mobility group keepalive count count Configures the mobility control and data path Example: keepalive count. The default value is 3. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1468 Mobility Verifying Mobility Step 8 Command or Action Purpose Device(config#) wireless mobility group keepalive count 10 wireless mobility group keepalive interval Configures the mobility control and data path interval keepalive interval. The default value is 10. Example: Note Device(config#) wireless mobility group keepalive interval 30 For controllers connected through mobility tunnels, ensure that both controllers have the same keepalive interval value. Verifying Mobility To display the summary of the mobility manager, use the following command: Device# show wireless mobility summary To display mobility peer information, use the following command: Device# show wireless mobility peer ip 10.0.0.8 To display the list of access points known to the mobility group, use the following command: Device# show wireless mobility ap-list To display statistics for the mobility manager, use the following command: Device# show wireless statistics mobility Mobility event statistics: Joined as Local :0 Foreign :0 Export foreign : 2793 Export anchor :0 Delete Local : 2802 Remote :0 Role changes Local to anchor :0 Anchor to local :0 Roam stats L2 roam count :0 L3 roam count :0 Flex client roam count :0 Inter-WNCd roam count :0 Intra-WNCd roam count :0 Remote inter-cntrl roam count : 0 Remote WebAuth pending roams : 0 Anchor Request Sent :0 Grant received :0 Deny received :0 Received :0 Grant sent :0 Deny sent :0 Handoff Status Received Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1469 Verifying Mobility Success Group mismatch Client unknown Client blacklisted SSID mismatch Denied Handoff Status Sent Success Group mismatch Client unknown Client blacklisted SSID mismatch Denied Export Anchor Request Sent Response Received Ok Deny - generic Client blacklisted Client limit reached Profile mismatch Deny - unknown reason Request Received Response Sent Ok Deny - generic Client blacklisted Client limit reached Profile mismatch MM mobility event statistics: Event data allocs Event data frees FSM set allocs FSM set frees Timer allocs Timer frees Timer starts Timer stops Invalid events Internal errors Delete internal errors Roam internal errors :0 :0 :0 : 14 :0 :0 :0 :0 :0 :0 :0 :0 : 2812 : : 2793 : 19 :0 :0 :0 :0 :0 : :0 :0 :0 :0 :0 : 17083 : 17083 : 2826 : 2816 : 8421 : 8421 : 14045 : 14045 :0 :0 :0 :0 MMIF mobility event statistics: Event data allocs : 17088 Event data frees : 17088 Invalid events :0 Event schedule errors :0 MMIF internal errors: IPC failure :0 Database failure :0 Invalid parameters :0 Mobility message decode failure : 0 FSM failure :0 Client handoff success :0 Client handoff failure : 14 Anchor Deny :0 Remote delete :0 Tunnel down delete :0 MBSSID down :0 Unknown failure :0 To display counters for all messages in mobility, use the following command: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1470 Mobility Mobility Verifying Mobility Device# show wireless stats mobility messages MM datagram message statistics: Message Type Built Tx Rx Retry Drops Allocs Frees Processed Tx Error Rx Error Forwarded ---------------------------------------------------------------------------------------------------------------------- Mobile Announce 0 0 0 0 0 0 25350 5624 0 2826 2826 Mobile Announce Nak 0 0 0 0 0 0 0 0 0 0 0 Static IP Mobile Annc 0 0 0 0 0 0 0 0 0 0 0 Static IP Mobile Annc Rsp 0 0 0 0 0 0 0 0 0 0 0 Handoff 0 0 14 14 0 0 0 0 0 42 42 Handoff End 0 0 0 0 0 0 2783 0 0 2783 2783 Handoff End Ack 0 0 2783 2783 0 0 0 0 0 8349 8349 Anchor Req 0 0 0 0 0 0 0 0 0 0 0 Anchor Grant 0 0 0 0 0 0 0 0 0 0 0 Anchor Xfer 0 0 0 0 0 0 0 0 0 0 0 Anchor Xfer Ack 0 0 0 0 0 0 0 0 0 0 0 Export Anchor Req 0 0 0 0 0 0 2812 0 0 2812 2812 Export Anchor Rsp 0 0 2812 2812 0 0 0 0 0 8436 8436 AAA Handoff 0 0 0 0 0 0 0 0 0 0 0 AAA Handoff Ack 0 0 0 0 0 0 0 0 0 0 0 IPv4 Addr Update 0 0 2792 0 0 0 0 0 0 2792 2792 IPv4 Addr Update Ack 2792 2792 0 0 0 0 0 0 0 2792 2792 IPv6 ND Packet 0 0 0 0 0 0 0 0 0 0 0 IPv6 Addr Update 0 0 5587 0 0 0 0 0 0 5587 5587 IPv6 Addr Update Ack 5587 5587 0 0 0 0 0 0 0 5587 5587 Client Add 0 0 0 0 0 0 0 0 0 0 0 Client Delete 0 0 0 0 0 0 0 0 0 0 0 AP List Update 25585 25585 8512 8512 2 1 0 0 0 34098 34098 Client Device Profile Info 0 0 0 0 0 0 0 0 0 0 0 PMK Update 0 0 0 0 0 0 0 0 0 0 0 PMK Delete 0 0 0 0 0 0 0 0 0 0 0 PMK 11r Nonce Update 0 0 0 0 0 0 0 0 0 0 0 Device cache Update 0 0 0 0 0 0 0 0 0 0 0 HA SSO Announce 0 0 0 0 0 0 0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1471 Verifying Mobility Mobility 0 0 0 0 HA SSO Announce Resp 0 0 0 0 0 0 0 0 0 0 0 Mesh Roam Request 0 0 0 0 0 0 0 0 0 0 0 Mesh Roam Response 0 0 0 0 0 0 0 0 0 0 0 Mesh AP PMK Time Upd 0 0 0 0 0 0 0 0 0 0 0 Mesh AP PMK Time Upd Ack 0 0 0 0 0 0 0 0 0 0 0 Mesh AP Channel List 0 3 1 0 0 1 0 0 0 2 2 Mesh AP Channel List Resp 0 0 0 0 0 0 0 0 0 0 0 AP upgrade 0 0 0 0 0 0 0 0 0 0 0 Keepalive Ctrl Req 34080 34080 17031 17031 0 0 0 0 0 51111 51111 Keepalive Ctrl Resp 17031 17031 34067 34067 0 0 0 0 0 51098 51098 Keepalive Data Req/Resp 238527 238527 221451 221451 0 0 0 0 0 459978 459978 To display mobility information of the client, use the following command: Device# show wireless client mac-address 00:0d:ed:dd:35:80 detail To display roaming history of the active client in the subdomain, use the following command: Device# show wireless client mac-address 00:0d:ed:dd:35:80 mobility history To display client-specific statistics for the mobility manager, use the following command: Device# show wireless client mac-address 00:0d:ed:dd:35:80 stats mobility To verify whether intercontroller roam is successful, use the following commands: · show wireless client mac mac-address detail: (on the roamed-to Controller) Displays the roam type as L2 and the roam count is incremented by 1. · show wireless client summary : (on the roamed-from controller) The client entry will not be there in the ouput. Verifying SDA Mobility To verify whether intracontroller, intra-xTR roam is successful, use the following commands: · show wireless client summary: Displays the new AP if the client has roamed across the APs on the same xTR. · show wireless client mac mac-address detail: Displays the same RLOC as before the roam. To verify whether intracontroller, inter-xTR roam is successful, use the following commands: · show wireless fabric client summary: Displays the new AP if the client has roamed across the APs on a different xTR. · show wireless client mac mac-address detail: Displays the RLOC of the new xTR to which the client has roamed to. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1472 Mobility Verifying Mobility To check client status before and after intracontroller roaming, perform the following steps: 1. Check if client is on the old AP, using show wireless client summary command on the controller. 2. Check whether the client MAC is listed against the old AP, using show mac addr dyn command on the xTR1. 3. Check whether the client IP is registered from current xTR1, and client MAC is registered from both current xTR1, and WLC1, using show lisp site detail command on the MAP server. 4. After the intra-WLC roam, check whether the client is on the new AP, using the show wireless client summary and show mac addr dyn commands on the WLC1 and xTR1. 5. After the Inter-xTR Roam (old and new APs on different xTRs), check whether the client is on the new AP (connected to the new xTR2), using the show wireless client summary and show mac addr dyn commands on the WLC1 and xTR2. 6. Check whether the client is registered from the new xTR2, using the show lisp site detail command on the MAP server. Verifying Roaming on MAP Server for SDA To verify roaming information for SDA, use the following commands: Run the following command on the MAP server, before and after the roam, to check whether the client IP is registered from current xTR, and client MAC is registered from both current xTR, and WLC. Device# show lisp site detail Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1473 Verifying Mobility Mobility Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1474 1 3 8 C H A P T E R NAT Support on Mobility Groups · Information About NAT Support on Mobility Groups, on page 1475 · Restrictions for NAT Support on Mobility Groups, on page 1476 · Functionalities Supported on Mobility NAT, on page 1476 · Configuring a Mobility Peer, on page 1477 · Verifying NAT Support on Mobility Groups , on page 1477 Information About NAT Support on Mobility Groups The Network Address Translation (NAT) on Mobility Groups feature supports the establishment of mobility tunnels between peer controllers when one or both peers are behind a NAT. This is achieved by translating the public and private IP addresses of the peers (see figure below). Depending on the placement and number of NATs, translation might be required at one or both ends of the tunnel. Figure 45: Mobility NAT When configuring a NATed mobility peer, both the private IP address (address in the network before the NAT device) and the public IP address (address in the public network) have to be configured. Also, if you are using a firewall, ensure that the ports listed below can be accessed through the firewall: · Port 16666 for mobility control messages Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1475 Restrictions for NAT Support on Mobility Groups Mobility · Port 16667 for mobility data messages Restrictions for NAT Support on Mobility Groups · Only 1:1 (static) NAT entries can exist for the controller peers that form the mobility tunnels. · Configuring multiple peers with the same public IP address is not supported. · Private IP addresses of the configured peers must be unique. · Port Address Translation (PAT) is not supported. · If peer controllers of different types, for example, Cisco AireOS and Cisco Catalyst 9800 Series) are placed behind NAT, Inter-Release Controller Mobility (IRCM) is not supported for client roaming. · IPv6 address translation is not supported. Functionalities Supported on Mobility NAT The following table lists the functionalities supported on mobility NAT: Table 102: Functionalities Supported on Mobility NAT Two controllers, with the foreign controller behind a NAT device Yes (1to1 NAT only) Two controllers, with the anchor controller behind a NAT device Yes (1to1 NAT only) Two controllers, with the anchor and foreign controller behind a Yes NAT device (1to1 NAT only) Multiple foreign and anchor controllers behind NATs (1to1 NAT Yes only) Supported Cisco Catalyst 9800 Series Wireless Controllers · Cisco Catalyst 9800-40 Wireless Controller · Cisco Catalyst 9800-80 Wireless Controller · Catalyst 9800 Wireless Controller for Cloud · Cisco Catalyst 9800-L Wireless Controller Number of peers supported 72 Manageability using SNMP, Yang, and web UI Yes IRCM support for mobility Yes Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1476 Mobility Configuring a Mobility Peer SSO Yes Client roaming (Layer 2 and Layer 3) between Cisco Catalyst 9800 Yes Series Wireless Controllers Client roaming (Layer 2 and Layer 3) between Cisco Catalyst 9800 No Series Wireless Controller and AireOS controller Supported applications on the mobility tunnel · Native profiling · AP list · PMK cache · Mesh AP Configuring a Mobility Peer Before you begin Ensure that the private and public IP addresses of a mobility peer are of the same type, either IPv4 or IPv6. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless mobility group member mac-address Adds a mobility peer to the list with an optional peer_mac ip peer_private_ip[public-ip public IP address. peer_public_ip]group group_name Note You cannot configure multiple Example: peers with the same private or Device(config)# wireless mobility group public IP address. member mac-address 001e.494b.04ff ip 11.0.0.2 public-ip 4.0.0.112 group dom1 Step 3 exit Example: Device(config)# exit Returns to privileged EXEC mode. Verifying NAT Support on Mobility Groups To display the mobility information of a client, use the following command: Device# show wireless client mac-address 000a.bd15.0010 detail Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1477 Verifying NAT Support on Mobility Groups Mobility Client MAC Address : 000a.bd15.0010 Client IPv4 Address : 100.100.0.2 Client Username: N/A AP MAC Address : 000a.ad00.0800 AP Name: SIM-AP-7 AP slot : 1 . . . To display mobility peer information using a private peer IP address, use the following command: Device# show wireless mobility peer ip 21.0.0.2 Mobility Peer Info =================== Ip Address : 21.0.0.2 Public Ip Address : 3.0.0.22 MAC Address : cc70.ed02.c3b0 Group Name : dom1 . . . Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1478 1 3 9 C H A P T E R Static IP Client Mobility · Information About Static IP Client Mobility, on page 1479 · Restrictions, on page 1479 · Configuring Static IP Client Mobility (GUI), on page 1480 · Configuring Static IP Client Mobility (CLI), on page 1480 · Verifying Static IP Client Mobility, on page 1481 Information About Static IP Client Mobility At times, you may want to configure static IP addresses for wireless clients. When these wireless clients move about in a network, they might try associating with other controllers. If the clients try to associate with a controller that does not support the same subnet as the static IP, the clients fail to connect to the network. However, now, you can enable static IP mobility for clients with static IP addresses. Static IP clients with static IP addresses can be associated with other controllers in which the client's subnet is supported by tunneling the traffic to another controller in the same mobility group. This feature enables you to configure your WLAN so that the network is serviced even though the clients use static IP addresses. Restrictions · This feature is not supported on the Fabric and Cisco Catalyst 9800 Wireless Controller for Switch platforms. · IPv6 is not supported. · FlexConnect mode is not supported. · WebAuth (LWA and CWA) is not supported. · Supported only Open, Dot1x, and PSK authentication mechanisms. · Supports only on the WLANs that are exclusive of the mobility anchor configuration. If the mobility anchor is already configured on a WLAN, and if static IP mobility is enabled, the feature is not supported. · Supported only when all the peers are configured for the static IP mobility that is enabled. · IRCM is not supported. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1479 Configuring Static IP Client Mobility (GUI) Mobility Configuring Static IP Client Mobility (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > Policy. On the Policy page, click the policy profile name or click Add to create a new one. Click the Mobility tab. Set the Static IP Mobility field to Enabled state. Click Update & Apply to Device. Configuring Static IP Client Mobility (CLI) Follow the procedure given below to configure static IP client mobility: Before you begin · Configure the SVI interface (L3 VLAN interface) to service the static IP client on at least one of the peer controllers in the network. · For clients to join a controller, the VLAN (based on the VLAN number in the policy profile configuration) should be configured on the device. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-policy-name Example: Configures a WLAN policy profile and enters wireless policy configuration mode. Device(config)# wireless profile policy static-ip-policy Step 3 static-ip-mobility Example: Device(config-wireless-policy)# static-ip-mobility Enables static IP mobility. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1480 Mobility Verifying Static IP Client Mobility Verifying Static IP Client Mobility Use the following commands to verify the static IP client mobility configuration: Device# show wireless profile policy detailed static-ip-policy Policy Profile Name : static-ip-policy Description : Status : DISABLED VLAN :1 Wireless management interface VLAN : 34 Passive Client : DISABLED ET-Analytics : DISABLED StaticIP Mobility : DISABLED WLAN Switching Policy Central Switching : ENABLED Central Authentication : ENABLED Central DHCP : DISABLED Flex NAT PAT : DISABLED Central Assoc : DISABLED WLAN Flex Policy VLAN based Central Switching : DISABLED WLAN ACL IPv4 ACL : Not Configured IPv6 ACL : Not Configured Layer2 ACL : Not Configured Preauth urlfilter list : Not Configured Postauth urlfilter list : Not Configured WLAN Timeout Session Timeout : 1800 Idle Timeout : 300 Idle Threshold :0 WLAN Local Profiling Subscriber Policy Name : Not Configured RADIUS Profiling : DISABLED HTTP TLV caching : DISABLED DHCP TLV caching : DISABLED WLAN Mobility Anchor : DISABLED AVC VISIBILITY : Disabled Flow Monitor IPv4 Flow Monitor Ingress Name : Not Configured Flow Monitor Egress Name : Not Configured Flow Monitor IPv6 Flow Monitor Ingress Name : Not Configured Flow Monitor Egress Name : Not Configured NBAR Protocol Discovery : Disabled Reanchoring : Disabled Classmap name for Reanchoring Reanchoring Classmap Name : Not Configured QOS per SSID Ingress Service Name : Not Configured Egress Service Name : Not Configured QOS per Client Ingress Service Name : Not Configured Egress Service Name : Not Configured Umbrella information Ciso Umbrella Parameter Map : Not Configured Autoqos Mode : None Call Snooping : Disabled Fabric Profile Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1481 Verifying Static IP Client Mobility Profile Name : Not Configured Accounting list Accounting List : Not Configured DHCP required : DISABLED server address : 0.0.0.0 Opt82 DhcpOpt82Enable : DISABLED DhcpOpt82Ascii : DISABLED DhcpOpt82Rid : DISABLED APMAC : DISABLED SSID : DISABLED AP_ETHMAC : DISABLED APNAME : DISABLED POLICY TAG : DISABLED AP_LOCATION : DISABLED VLAN_ID : DISABLED Exclusionlist Params Exclusionlist : ENABLED Exclusion Timeout : 60 AAA Policy Params AAA Override : DISABLED NAC : DISABLED AAA Policy name : default-aaa-policy WGB Policy Params Broadcast Tagging : DISABLED Client VLAN : DISABLED Mobility Anchor List IP Address Priority ------------------------------------------------------- Device# show run | section profile policy wireless profile policy default-policy-profile central switching description "default policy profile" static-ip-mobility vlan 50 no shutdown Mobility Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1482 1 4 0 C H A P T E R Mobility Domain ID - Dot11i Roaming · Information about Mobility Domain ID - 802.11i Roaming, on page 1483 · Verifying Mobility Domain ID - 802.11i Roaming, on page 1484 Information about Mobility Domain ID - 802.11i Roaming A mobility domain is a cluster of APs forming a continuous radio frequency space, where the Pairwise Master Key (PMK) can be synchronized, and fast roaming can be enabled for 802.11r (Fast Transition) or 802.11i (WPA). In the releases prior to Cisco IOS XE 17.2.1, the PMK cache was shared across the FlexConnect APs using the AP site tag. All the APs that are a part of a site tag share the PMK cache. This is applicable only for central authetication. From Cisco IOS XE 17.2.1, you can create a Mobility Domain ID (MDID) for each of the APs. All the APs with the same MDID share the PMK cache keys even if they are in different site tags. When MDID is configured for APs, the PMK cache keys are not shared with the APs that are not a part of the same MDID, even if they are a part of the same site tag. MDID supports PMK cache distribution for both central authentication and local authentication. Note · The Mobility Domain ID - 802.11i Roaming feature does not work when the Flex APs are in standalone mode because the feature depends on the controller to share the keys. · MDID is configured only through the open configuration model. There is no CLI or GUI support. · In Cisco IOS XE Amsterdam 17.2.1, 100 APs per site-tag or per MDID are supported, and 1000 PMK entries are supported per AP. The mobility domain can either be defined as a static configuration of clustered APs, all under a commonly configured MDID, or dynamically computed. You can implement a spatial clustering algorithm based on neighbor associations of APs. Each AP can only be a part of one roaming domain. An MDID is used by 802.11r to define a network in which an 802.11r fast roam is supported. PMKs should be shared within mobility domains, allowing clients to support fast roaming. If defined, MDID takes precedence over a site tag. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1483 Verifying Mobility Domain ID - 802.11i Roaming Mobility MDID configurations are exercised only from open configuration models. For more information about open configuration models, see the https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/prog/configuration/172/b_ 172_programmability_cg.html. Verifying Mobility Domain ID - 802.11i Roaming The following examples shows how to view and verify the 802.11i Roaming configuration: Device# show running-config | section specific-config ap specific-config 58ac.70dc.xxxx hostname AP58AC.70DC.XXXX roaming-domain roaming_domain_2 ap specific-config 78xc.f09d.xxxx hostname AP78XC.F09D.XXXX roaming-domain roaming_domain_3 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1484 1 4 1 C H A P T E R 802.11r Support for Flex Local Authentication · Information About 802.11r Support for FlexConnect Local Authentication, on page 1485 · Verifying 802.11r Support for Flex Local Authentication , on page 1486 Information About 802.11r Support for FlexConnect Local Authentication In releases prior to Cisco IOS XE Amsterdam 17.2.1, the FlexConnect mode fast transition was supported only in centrally authenticated clients. This was achieved by sharing the Pairwise Master Key (PMK) to all the FlexConnect APs in the same site tag. From Cisco IOS XE Amsterdam 17.2.1, fast transition is supported even for locally authenticated clients. The client PMK cache entries are shared and distributed to all the APs in the same site tag. From Cisco IOS XE Amsterdam 17.2.1, another grouping called Mobility Domain ID (MDID) is introduced, for sharing the PMK cache entries. MDID can be configured for APs using the open configuration model only. There is no CLI or GUI support. The PMK cache distribution in a FlexConnect local site (using either the site tag or MDID) is restricted to 100 APs per group, with a maximum support for 1000 PMK entries per AP. Support Guidelines The following are the 802.11r support guidelines: · Supports 802.11r on FlexConnect local authentication only with Over-the-Air method of roaming. Over-the-DS (Distribution System) is not supported. · Supports adaptive 11r for Apple clients. · Supports both Fast Transition + 802.1x and Fast Transition + PSK. Note This is supported only when clients join the standalone mode AP. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1485 Verifying 802.11r Support for Flex Local Authentication Mobility Verifying 802.11r Support for Flex Local Authentication To verify the number of PMK caches, use the show wireless pmk-cache command: Device# show wireless pmk-cache Number of PMK caches in total : 1 Type Station Entry Lifetime VLAN Override IP Override Audit-Session-Id Username -------------------------------------------------------------------------------------------------------------------------------------- DOT11R 74xx.bx5a.07xx 87 NA 000000000000000FF3562B5D jey To verify the 802.11r flex roam attempts, use the show wireless client mac-address 74xx.bx5a.07xx mobility history command: Device# show wireless client mac-address 74xx.bx5a.07xx mobility history Recent association history (most recent on top): AP Name BSSID Instance Mobility Role Run Latency (ms) AP Slot Assoc Time Dot11 Roam Type ----------------------------------------------------------------------------------------------------------------------------------------------------------------- APM-9120-1-GCP 1 Local d4xx.80xx.8fxx 1 12/11/2019 18:44:37 2 802.11R APM-4800-3 1 Local 17547 f4xx.e6xx.08xx 1 N/A show wireless stats client detail | sec roam Total 11r flex roam attempts :1 12/11/2019 18:43:02 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1486 1 4 2 C H A P T E R Opportunistic Key Caching · Information about Opportunistic Key Caching, on page 1487 · Enabling Opportunistic Key Caching, on page 1488 · Enabling Opportunistic Key Caching (GUI), on page 1488 · Verifying Opportunistic Key Caching, on page 1488 Information about Opportunistic Key Caching Opportunistic Key Caching (OKC) is an enhancement of the WPA2 Pairwise Master Key ID (PMKID) caching method, which is why it is also named Proactive or Opportunistic PMKID Caching. Just like PMKID caching, OKC works with WPA2-EAP. The OKC technique allows wireless clients and the WLAN infrastructure to cache only one PMK for client association with a WLAN, even when roaming between multiple APs because they all share the original PMK that is used for the WPA2 4-way handshake. This is required to generate new encryption keys every time a client reassociates with APs. For APs to share the original PMK from a client session, they must all be under a centralized device that caches and distributes the original PMK to all the APs. Just as in PMKID caching, the initial association to an AP is a regular first-time authentication to the corresponding WLAN, where you must complete the entire 802.1X/EAP authentication for the authentication server, and the 4-way handshake for key generation, before sending data frames. OKC is a fast roaming technique supported by Microsoft and some Android clients. Another fast roaming method is the use of 802.11r, which is supported by Apple and few Andorid clients. OKC is enabled by default on a WLAN. This configuration enables the control of OKC on a WLAN. Disabling OKC on a WLAN disables the OKC even for the OKC-supported clients. A new configuration is introduced for each WLAN in the controller in Cisco IOS XE Amsterdam 17.2.1, to disable or enable fast and secure roaming with OKC at the corresponding AP. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1487 Enabling Opportunistic Key Caching Mobility Enabling Opportunistic Key Caching Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wlan profile-name wlan-identifier <1-4096> Enters WLAN configuration submode. ssid-network-name wlan-profile-name: Profile name of the Example: configured WLAN. Device(config)# wlan wlan-profile-name 18 san-ssid Step 3 okc Example: Device(config-wlan)# okc Enables Opportunistic Key Caching, if not enabled. By default, the OKC feature is enabled. (Use the no form of this command to disable the OKC feature.) Enabling Opportunistic Key Caching (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Tags & Profiles > WLANs. Click Add. The Add WLAN dialog box is displayed. In the Add WLAN dialog box, click the Advanced tab and complete the following procedure: a) In the 11ax section, check the OKC check box to disable or enable the feature. By default this feature is enabled. b) Click Update & Apply to Device. Verifying Opportunistic Key Caching The following example shows how to verify whether OKC is disabled for a WLAN profile. · Device# show wlan id 18 WLAN Profile Name : 18%wlanprofile ================================================ Identifier : 18 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1488 Mobility Verifying Opportunistic Key Caching Description Network Name (SSID) Status Broadcast SSID Advertise-Apname Universal AP Admin Max Associated Clients per WLAN Max Associated Clients per AP per WLAN Max Associated Clients per AP Radio per WLAN OKC Number of Active Clients CHD per WLAN WMM Channel Scan Defer Priority: Priority (default) Priority (default) Scan Defer Time (msecs) Media Stream Multicast-direct CCX - AironetIe Support Peer-to-Peer Blocking Action Radio Policy : : san-ssid : Disabled : Enabled : Disabled : Disabled :0 :0 : 200 : Disabled :0 : Enabled : Allowed :5 :6 : 100 : Disabled : Disabled : Disabled : All · Device# show run wlan wlan name 2 ssid-name wlan test 24 test wlan test2 15 test2 wlan test4 12 testssid radio dot11a wlan wlan1 234 wlan1 wlan wlan2 14 wlan-aaa security dot1x authentication-list realm wlan wlan7 27 wlan7 wlan test23 17 test23 wlan wlan_1 4 ssid_name security dot1x authentication-list authenticate_list_name wlan wlan_3 5 ssid_3 security wpa wpa1 security wpa wpa1 ciphers aes wlan wlan_8 9 ssid_name no security wpa no security wpa wpa2 no security wpa wpa2 ciphers aes no security wpa akm dot1x security web-auth wlan test-wlan 23 test-wlan wlan wlan-test 1 wlan2 mac-filtering default wlan 18%wlanprofile 18 san-ssid no okc Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1489 Verifying Opportunistic Key Caching Mobility Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1490 I X P A R T High Availability · High Availability, on page 1493 1 4 3 C H A P T E R High Availability · Feature History for High Availability, on page 1494 · Information About High Availability, on page 1495 · Prerequisites for High Availability, on page 1496 · Restrictions on High Availability, on page 1497 · Configuring High Availability (CLI), on page 1498 · Disabling High Availability, on page 1499 · Copying a WebAuth Tar Bundle to the Standby Controller, on page 1500 · System and Network Fault Handling, on page 1502 · Handling Recovery Mechanism, on page 1506 · Verifying High Availability Configurations, on page 1507 · Verifying AP or Client SSO Statistics, on page 1507 · Verifying High Availability, on page 1509 · High Availability Deployment for Application Centric Infrastructure (ACI) Network, on page 1512 · Information About Redundancy Management Interface, on page 1516 · Configuring Redundancy Management Interface (GUI), on page 1520 · Configuring Redundancy Management Interface (CLI), on page 1521 · Configuring Gateway Monitoring (CLI), on page 1523 · Configuring Gateway Monitoring Interval (CLI), on page 1524 · Gateway Reachability Detection, on page 1524 · Monitoring the Health of the Standby Controller, on page 1525 · Monitoring the Health of Standby Parameters Using SNMP, on page 1527 · Monitoring the Health of Standby Controller Using Programmatic Interfaces, on page 1529 · Monitoring the Health of Standby Controller Using CLI, on page 1530 · Verifying the Gateway-Monitoring Configuration, on page 1533 · Verifying the RMI IPv4 Configuration, on page 1534 · Verifying the RMI IPv6 Configuration, on page 1535 · Verifying Redundancy Port Interface Configuration, on page 1535 · Information About Auto-Upgrade, on page 1538 · Configuration Workflow, on page 1539 · Configuring Auto-Upgrade (CLI), on page 1539 · Use Case for Link Layer Discovery Protocol (LLDP), on page 1539 · Enabling LLDP (CLI), on page 1540 · Enabling LLDP Timers (CLI), on page 1540 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1493 Feature History for High Availability High Availability · Enabling LLDP TLV-Select (CLI), on page 1541 · Verifying LLDP, on page 1541 · Feature History for Reload Reason History, on page 1543 · Information About Reload Reason History, on page 1543 · Verifying Reload Reason History , on page 1543 · Requesting Reload Reason History using YANG, on page 1546 Feature History for High Availability This table provides release and related information for the features explained in this module. These features are available in all the releases subsequent to the one they were introduced in, unless noted otherwise. Table 103: Feature History for High Availability Release Feature Feature Information Cisco IOS XE Redundant Management Amsterdam 17.1.1s Interface The Redundancy Management Interface (RMI) is used as a secondary link between the active and standby controllers. This interface is the same as the Wireless Management Interface and the IP address on this interface is configured in the same subnet as the Wireless Management Interface. Cisco IOS XE Gateway Reachability Bengaluru 17.4.1 Detection Gateway reachability feature mimimizes the downtime on APs and clients when the gateway reachability is lost on the active controller. Cisco IOS XE Standby Monitoring Bengaluru 17.5.1 Enhancements The Standby Monitoring Enhancements feature monitors the standby CPU or memory information from the active controller. Also, this feature independently monitors the standby controller using SNMP for the interface MIB. The cLHaPeerHotStandbyEvent and cLHaPeerHotStandbyEvent MIB objects in CISCO-HA-MIB are used to monitor the standby HA status. Cisco IOS XE Auto-Upgrade Bengaluru 17.5.1 The auto-upgrade feature enables the standby controller to upgrade to active controller's software image, so that both controllers can form an high availability (HA) pair. Cisco IOS XE Standby Interface Status This feature allows the standby controller interface status Bengaluru 17.6.1 using Active SNMP to be queried at the active using SNMP. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1494 High Availability Information About High Availability Release Cisco IOS XE Cupertino 17.9.1 Feature High Availability Deployment for Application Centric Infrastructure (ACI) Network Feature Information This feature avoids interleaving traffic between the old and new active controller using the following functionalities: · Bringing down Wireless Management Interface (WMI) faster. · Disabling fast switchover notification. Link Layer Discovery From this release, the Link Layer Discovery Protocol Protocol (LLDP) Support (LLDP) process will be up and running in both active and in the Standby Controller standby controllers. Information About High Availability High Availability (HA) allows you to reduce the downtime of wireless networks that occurs due to the failover of controllers. The HA Stateful Switch Over (SSO) capability on the controller allows AP to establish a CAPWAP tunnel with the active controller. The active controller shares a mirror copy of the AP and client database with the standby controller. The APs won't go into the discovery state and clients don't disconnect when the active controller fails. The standby controller takes over the network as the active controller. Only one CAPWAP tunnel is maintained between the APs and the controller that is in an active state. HA supports full AP and client SSO. Client SSO is supported only for clients that have completed the authentication and DHCP phase, and have started passing traffic. With Client SSO, the client information is synced to the standby controller when the client associates to the controller or when the client parameters change. Fully authenticated clients, for example, the ones in RUN state, are synced to the standby. Thus, client reassociation is avoided on switchover making the failover seamless for the APs and clients, resulting in zero client service downtime and zero SSID outage. This feature reduces major downtime in wireless networks due to failure conditions such as box failover, network failover, or power outage on the primary site. Note · In HA mode, the RP port shut or no shut should not be performed during the controller bootup. · If the RP communication is lost between active and standby controller during HA sync, the standby controller crashes as the IPC communication fails. The crash is intentional. If RP link is restored, the standby controller gracefully reloads and forms an HA pair. Note When the controller works as a host for spanning tree, ensure that you configure portfast trunk, using spanning-tree port type edge trunk or spanning-tree portfast trunk commands, in the uplink switch to ensure faster convergence. Note You can configure FIPS in HA setup. For information, see the Configuring FIPS in HA Setup. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1495 Prerequisites for High Availability High Availability Note The IPv4 secondary address is used internally for RMI purpose. So, it is not recommended to configure the secondary IPv4 address. In case of IPv6, only one management IPv6 is allowed, secondary address is configured for RMI-IPv6 purpose. It is not recommended to have more than one IPv6 management on the Wireless Management Interface (WMI). More than one management IPv4 and IPv6 addresses on WMI can result in unpredictable behaviour. Prerequisites for High Availability External Interfaces and IPs Because all the interfaces are configured only on the Active box, but are synchronized with the Standby box, the same set of interfaces are configured on both controllers. From external nodes, the interfaces connect to the same IP addresses, irrespective of the controllers they are connected to. For this purpose, the APs, clients, DHCP, Cisco PrimeInfrastructure, Cisco DNA Centre, and Cisco Identity Services Engine (ISE) servers, and other controller members in the mobility group always connect to the same IP address. The SSO switchover is transparent to them. But if there are TCP connections from external nodes to the controller, the TCP connections need to be reset and reestablished. HA Interfaces The HA interface serves the following purposes: · Provides connectivity between the controller pair before an IOSd comes up. · Provides IPC transport across the controller pair. · Enables redundancy across control messages exchanged between the controller pair. The control messages can be HA role resolution, keepalives, notifications, HA statistics, and so on. You can select either SFP or RJ-45 connection for HA port. Supported Cisco SFPs are: · GLC-SX-MMD · GLC-LH-SMD When either SFP or RJ-45 connection is present, HA works between the two controllers. The SFP HA connectivity takes priority over RJ-45 HA connectivity. If SFP is connected when RJ-45 HA is up and running, the HA pair reloads. The reload occurs even if the link between the SFPs isn't connected. Note · It is recommended to have a dedicated physical NIC and vSwitch for RP when the HA pair is deployed across two host machines. This avoids any keep-alive loses and false HA switchovers or alarms. · Disable security scans on VMware virtual instances. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1496 High Availability Restrictions on High Availability Restrictions on High Availability · For a fail-safe SSO, wait till you receive the switchover event after completing configuration synchronization on the standby controller. If the standby controller has just been booted up, we recommend that you wait x minutes before the controller can handle switchover events without any problem. The value of x can change based on the platform. For example, a Cisco 9800-80 Series Controller running to its maximum capacity can take up to 24 minutes to complete the configuration synchronization before being ready for SSO. You can use the show wireless stats redundancy config database command to view the database-related statistics. · The flow states of the NBAR engine are lost during a switchover in an HA scenario in local mode. Because of this, the classification of flows will restart, leading to incorrect packet classification as the first packet of the flow is missed. · The HA connection supports only IPv4. · Switchover and an active reload and forces a high availability link down from the new primary. · Hyper threading is not supported and if enabled HA keepalives will be lost in case of an HA system that results in stack merge. · Standby RMI interface does not support Web UI access. · Two HA interfaces (RMI and RP) must be configured on the same subnet, and the subnet cannot be shared with any other interfaces on the device. · It is not possible to synchronize a TCP session state because a TCP session cannot survive after a switchover, and needs to be reestablished. · The Client SSO does not address clients that have not reached the RUN state because they are removed after a switchover. · Statistics tables are not synced from active to standby controller. · Machine snapshot of a VM hosting controller HA interfaces is not supported. It may lead to a crash in the HA controller. · Mobility-side restriction: Clients which are not in RUN state will be forcefully reauthenticated after switchover. · The following application classification may not be retained after the SSO: · AVC limitation--After a switchover, the context transfer or synchronization to the Standby box does not occur and the new active flow needs to be relearned. The AVC QoS does not take effect during classification failure. · A voice call cannot be recognized after a switchover because a voice policy is based on RTP or RTCP protocol. · Auto QoS is not effective because of AVC limitation. · The active controller and the standby controller must be paired with the same interface for virtual platforms. For hardware appliance, there is a dedicated HA port. · Static IP addressing can synch to standby, but the IP address cannot be used from the standby controller. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1497 Configuring High Availability (CLI) High Availability · You can map a dedicated HA port to a 1 GB interface only. · To use EtherChannels in HA mode in releases until, and including, Cisco IOS XE Gibraltar 16.12.x, ensure that the channel mode is set to On. · Etherchannel Auto-mode is not supported in HA mode in releases until, and including, Cisco IOS XE Gibraltar 16.12.x. · LACP and PAGP is not supported in HA mode in releases until, and including, Cisco IOS XE Gibraltar 16.12.x. · When the controller works as a host for spanning tree, ensure that you configure portfast trunk in the uplink switch using spanning-tree port type edge trunk or spanning-tree portfast trunk command to ensure faster convergence. · The clear chassis redundancy and write erase commands will not reset the chassis priority to the default value. · While configuring devices in HA, the members must not have wireless trustpoint with the same name and different keys. In such a scenario, if you form an HA pair between the two standalone controllers, the wireless trustpoint does not come up after a subsequent SSO. The reason being the rsa keypair file exists but it is incorrect as the nvram:private-config file is not synched with the actual WLC_WLC_TP key pair. As a best practice, before forming an HA, it is recommended to delete the existing certificates and keys in each of the controllers which were previously deployed as standalone. · After a switchover, when the recovery is in progress, do not configure the WLAN or WLAN policy. In case you configure, the controller can crash. · After a switchover, clients that are not in RUN state and not connected to an AP are deleted after 300 seconds. Configuring High Availability (CLI) Before you begin The active and standby controller should be in the same mode, either Install mode or Bundle mode, with same image version. We recommend that you use Install mode. Procedure Step 1 Command or Action Purpose chassis chassis-num priority chassis-priority Example: Device# chassis 1 priority 1 (Optional) Configures the priority of the specified device. Note From Cisco IOS XE Gibraltar 16.12.x onwards, device reload is not required for the chassis priority to become effective. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1498 High Availability Disabling High Availability Step 2 Step 3 Step 4 Command or Action Purpose · chassis-num--Enter the chassis number. The range is from 1 to 2. · chassis-priority--Enter the chassis priority. The range is from 1 to 2. The default value is 1. Note When both the devices boot up at the same time, the device with higher priority(2) becomes active, and the other one becomes standby. If both the devices are configured with the same priority value, the one with the smaller MAC address acts as active and its peer acts as standby. chassis redundancy ha-interface Configures the chassis high availability GigabitEthernet numlocal-ip parameters. local-chassis-ip-addr network-mask remote-ip remote-chassis-ip-addr · num--GigabitEthernet interface number. The range is from 0 to 32. Example: Device# chassis redundancy ha-interface · local-chassis-ip-addr--Enter the IP address of the local chassis HA interface. GigabitEthernet 2 local-ip 4.4.4.1 /24 remote-ip 4.4.4.2 · network-mask--Enter the network mask or prefix length in the /nn or A.B.C.D format. · remote-chassis-ip-addr--Enter the remote chassis IP address. chassis redundancy keep-alive timer timer Example: Device# chassis redundancy keep-alive timer 6 Configures the peer keepalive timeout value. Time interval is set in multiple of 100 ms (enter 1 for default). chassis redundancy keep-alive retries retry-value Example: Device# chassis redundancy keep-alive retries 8 Configures the peer keepalive retry value before claiming peer is down. Default value is 5. Disabling High Availability If the controller is configured using RP method of SSO configuration, use the following command to clear all the HA-related parameters, such as local IP, remote IP, HA interface, mask, timeout, and priority: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1499 Copying a WebAuth Tar Bundle to the Standby Controller High Availability clear chassis redundancy If the controller is configured using RMI method, use the following command: no redun-management interface vlan chassis Note Reload the devices for the changes to take effect. After the HA unpairing, the standby controller startup configuration and the HA configuration will be cleared and standby will go to Day 0. Before the command is executed, the user is prompted with the following warning on the active controller: Device# clear chassis redundancy WARNING: Clearing the chassis HA configuration will result in both the chassis move into Stand Alone mode. This involves reloading the standby chassis after clearing its HA configuration and startup configuration which results in standby chassis coming up as a totally clean after reboot. Do you wish to continue? [y/n]? [yes]: *Apr 3 23:42:22.985: received clear chassis.. ha_supported:1yes WLC# *Apr 3 23:42:25.042: clearing peer startup config *Apr 3 23:42:25.042: chkpt send: sent msg type 2 to peer.. *Apr 3 23:42:25.043: chkpt send: sent msg type 1 to peer.. *Apr 3 23:42:25.043: Clearing HA configurations *Apr 3 23:42:26.183: Successfully sent Set chassis mode msg for chassis 1.chasfs file updated *Apr 3 23:42:26.359: %IOSXE_REDUNDANCY-6-PEER_LOST: Active detected chassis 2 is no longer standby On the standby controller, the following messages indicate that the configuration is being cleared: Device-stby# *Apr 3 23:40:40.537: mcprp_handle_spa_oir_tsm_event: subslot 0/0 event=2 *Apr 3 23:40:40.537: spa_oir_tsm subslot 0/0 TSM: during state ready, got event 3(ready) *Apr 3 23:40:40.537: @@@ spa_oir_tsm subslot 0/0 TSM: ready -> ready *Apr 3 23:42:25.041: Removing the startup config file on standby !Standby controller is reloaded after clearing the chassis. Copying a WebAuth Tar Bundle to the Standby Controller Use the following procedure to copy a WebAuth tar bundle to the standby controller, in a high-availability configuration. Procedure Step 1 Step 2 Step 3 Choose Administration > Management > Backup & Restore. From the Copy drop-down list, choose To Device. From the File Type drop-down list, chooseWebAuth Bundle. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1500 High Availability Copying a WebAuth Tar Bundle to the Standby Controller Step 4 From the Transfer Mode drop-down list, choose TFTP, SFTP, FTP, or HTTP. The Server Details options change based on the file transfer option selected. · TFTP · IP Address (IPv4/IPv6): Enter the server IP address (IPv4 or IPv6) of the TFTP server that you want to use. · File Path: Enter the file path. The file path should start with slash a (/path). · File Name: Enter a file name. The file name should not contain spaces. Underscores (_) and hyphen (-) are the only special characters that are supported. Ensure that file name ends with .tar, for example, webauthbundle.tar. · SFTP · IP Address (IPv4/IPv6): Enter the server IP address (IPv4 or IPv6) of the SFTP server that you want to use. · File Path: Enter the file path. The file path should start with slash a (/path). · File Name: Enter a file name. The file name should not contain spaces. Underscores (_) and hyphen (-) are the only special characters that are supported. Ensure that file name ends with .tar, for example, webauthbundle.tar. · Server Login UserName: Enter the SFTP server login user name. · Server Login Password: Enter the SFTP server login passphrase. · FTP · IP Address (IPv4/IPv6): Enter the server IP address (IPv4 or IPv6) of the TFTP server that you want to use. · File Path: Enter the file path. The file path should start with slash a (/path). · File Name: Enter a file name. The file name should not contain spaces. Underscores (_) and hyphen (-) are the only special characters that are supported. Ensure that file name ends with .tar, for example, webauthbundle.tar. · Logon Type: Choose the login type as either Anonymous or Authenticated. If you choose Authenticated, the following fields are activated: · Server Login UserName: Enter the FTP server login user name. · Server Login Password: Enter the FTP server login passphrase. · HTTP · Source File Path: Click Select File to select the configuration file, and click Open. Step 5 Click the Yes or No radio button to back up the existing startup configuration to Flash. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1501 System and Network Fault Handling High Availability Step 6 Save the configuration to Flash to propagate the WebAuth bundle to other members, including the standby controller. If you do not save the configuration to Flash, the WebAuth bundle will not be propagated to other members, including the standby controller. Click Download File. System and Network Fault Handling If the standby controller crashes, it reboots and comes up as the standby controller. Bulk sync follows causing the standby to become hot. If the active controller crashes, the standby becomes active. The new active controller assumes the role of primary and tries to detect a dual active. The following matrices provide a clear picture of the conditions the controller switchover would trigger: Table 104: System and Network Fault Handling System Issues Trigger RP Link Status Critical process Up crash Forced switchover Up Critical process Up crash Forced switchover Up Critical process crash Down Peer Reachability Switchover through RMI Reachable Yes Reachable Yes Unreachable Yes Unreachable Yes Reachable No Forced switchover Down Reachable N/A Critical process crash Down Unreachable No Forced switchover Down Unreachable N/A Result Switchover happens Switchover happens Switchover happens Switchover happens No action. One controller in recovery mode. No action. One controller in recovery mode. Double fault as mentioned in Network Error handling Double fault as mentioned in Network Error handling Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1502 High Availability System and Network Fault Handling RP Link Up Up Up Up Peer Reachability Through RMI Reachable Reachable Gateway From Gateway From Switchover Active Standby Reachable Reachable Reachable Unreachable No SSO No SSO Reachable Unreachable Reachable SSO Reachable Unreachable Unreachable No SSO Result No action No action. Standby is not ready for SSO in this state, as it does not have gateway reachability. The standby is shown to be in standby-recovery mode. If the RP goes down, standby (in recovery mode) becomes active. Gateway reachability message is exchanged over the RMI + RP links. Active reboots so that the standby becomes active. With this, when the active SVI goes down, the standby SVI also goes down. A switchover is then triggered. If the new active discovers its gateway to be reachable, the system stabilizes in the Active Standby Recovery mode. Otherwise, switchovers happen in a ping-pong fashion. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1503 System and Network Fault Handling High Availability RP Link Up Up Up Up Peer Reachability Through RMI Unreachable Unreachable Gateway From Gateway From Switchover Active Standby Reachable Reachable Reachable Unreachable No SSO No SSO Unreachable Unreachable Reachable SSO Unreachable Unreachable Unreachable No SSO Result No action Standby is not ready for SSO in this state as it does not have gateway reachability. Standby moves in to recovery mode as LMP messages are exchanged over the RP link. Gateway reachability message is exchanged over RP link. Active reboots so that standby becomes active. With this, when the active SVI goes down, the standby SVI also goes down. A switchover is then triggered. If the new active discovers its gateway to be reachable, the system stabilizes in Active Standby Recovery mode. Otherwise, switchovers happen in a ping-pong fashion. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1504 High Availability System and Network Fault Handling RP Link Down Down Down Down Peer Reachability Through RMI Reachable Gateway From Gateway From Switchover Active Standby Reachable Reachable No SSO Reachable Reachable Reachable Reachable Unreachable Unreachable Unreachable Unreachable Unreachable No SSO No SSO No SSO Result Standby detects the presence of the Active over the RMI link and avoids switchover when the RP link goes down. In such a case, the standby goes to recovery mode. This mode is represented through suffix rp-rec-mode in the hostname. The standby in recovery mode reloads when the RP link comes up. Single faults are gracefully handled in the system. Same as above. Same as above. Same as above. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1505 Handling Recovery Mechanism High Availability RP Link Down Down Down Down Peer Reachability Through RMI Unreachable Gateway From Gateway From Switchover Active Standby Reachable Reachable SSO Unreachable Reachable Unreachable SSO Unreachable Unreachable Reachable SSO Unreachable Unreachable Unreachable SSO Result Double fault this may result in a network conflict as there will be two active controllers. Standby becomes active. Old active also exists. Role negotiation has to happen once the connectivity is restored and keep the active that came up last. Same as above. Same as above. Same as above. Handling Recovery Mechanism Active to Active Recovery · When RP is down and RMI is up at boot up, the Active Recovery occurs. · When HA is stable (active - standby), if RMI is down first and then RP goes down next, and later if RMI comes up before RP comes up, the Active to Active Recovery occurs. Once the RP is up, the Active Recovery reloads and HA is formed. Standby to Standby Recovery · When Standby goes to Standby Recovery for Gateway alone, once the Gateway is up, the HA comes up without any reboot. · When Standby goes to Standby Recovery for RP down, once the RP is up, the standby recovery reboots automatically and HA is formed. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1506 High Availability Verifying High Availability Configurations Verifying High Availability Configurations To view the HA configuration details, use the following command: Device# show romvar ROMMON variables: LICENSE_BOOT_LEVEL = MCP_STARTUP_TRACEFLAGS = 00000000:00000000 BOOTLDR = CRASHINFO = bootflash:crashinfo_RP_00_00_20180202-034353-UTC STACK_1_1 = 0_0 CONFIG_FILE = BOOT = bootflash:boot_image_test,1;bootflash:boot_image_good,1;bootflash:rp_super_universalk9.vwlc.bin,1; RET_2_RTS = SWITCH_NUMBER = 1 CHASSIS_HA_REMOTE_IP = 10.0.1.9 CHASSIS_HA_LOCAL_IP = 10.0.1.10 CHASSIS_HA_LOCAL_MASK = 255.255.255.0 CHASSIS_HA_IFNAME = GigabitEthernet2 CHASSIS_HA_IFMAC = 00:0C:29:C9:12:0B RET_2_RCALTS = BSI = 0 RANDOM_NUM = 647419395 Verifying AP or Client SSO Statistics To view the AP SSO statistics, use the following command: Device# show wireless stat redundancy statistics ap-recovery wnc all AP SSO Statistics Inst Timestamp Dura(ms) #APs #Succ #Fail Avg(ms) Min(ms) Max(ms) ------------------------------------------------------------------------------ 0 00:06:29.042 98 34 34 0 2 1 35 1 00:06:29.057 56 33 30 3 1 1 15 2 00:06:29.070 82 33 33 0 2 1 13 Statistics: WNCD Instance : 0 No. of AP radio recovery failures :0 No. of AP BSSID recovery failures :0 No. of CAPWAP recovery failures :0 No. of DTLS recovery failures :0 No. of reconcile message send failed :0 No. of reconcile message successfully sent : 34 No. of Mesh BSSID recovery failures: 0 No. of Partial delete cleanup done : 0 . . . To view the Client SSO statistics, use the following command: Device# show wireless stat redundancy client-recovery wncd all Client SSO statistics ---------------------- Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1507 Verifying AP or Client SSO Statistics High Availability WNCD instance : 1 Reconcile messages received from AP :1 Reconcile clients received from AP :1 Recreate attempted post switchover :1 Recreate attempted by SANET Lib :0 Recreate attempted by DOT1x Lib :0 Recreate attempted by SISF Lib :0 Recreate attempted by SVC CO Lib :1 Recreate attempted by Unknown Lib :0 Recreate succeeded post switchover :1 Recreate Failed post switchover :0 Stale client entries purged post switchover :0 Partial delete during heap recreate :0 Partial delete during force purge :0 Partial delete post restart :0 Partial delete due to AP recovery failure :0 Partial delete during reconcilation :0 Client entries in shadow list during SSO :0 Client entries in shadow default state during SSO :0 Client entries in poison list during SSO :0 Invalid bssid during heap recreate :0 Invalid bssid during force purge :0 BSSID mismatch with shadow rec during reconcilation :0 BSSID mismatch with shadow rec reconcilation(WGB client): 0 BSSID mismatch with dot11 rec during heap recreate :0 AID mismatch with dot11 rec during force purge :0 AP slotid mismatch during reconcilation :0 Zero aid during heap recreate :0 AID mismatch with shadow rec during reconcilation :0 AP slotid mismatch shadow rec during reconcilation :0 Client shadow record not present :0 To view the mobility details, use the following command: Device# show wireless stat redundancy client-recovery mobilityd Mobility Client Deletion Reason Statistics ------------------------------------------- Mobility Incomplete State :0 Inconsistency in WNCD & Mobility : 0 Partial Delete :0 General statistics -------------------Cleanup sent to WNCD, Missing Delete case : 0 To view the Client SSO statistics for SISF, use the following command: Device# show wireless stat redundancy client-recovery sisf Client SSO statistics for SISF -------------------------------- Number of recreate attempted post switchover : 1 Number of recreate succeeded post switchover : 1 Number of recreate failed because of no mac :0 Number of recreate failed because of no ip :0 Number of ipv4 entry recreate success :1 Number of ipv4 entry recreate failed :0 Number of ipv6 entry recreate success :0 Number of ipv6 entry recreate failed :0 Number of partial delete received :0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1508 High Availability Verifying High Availability Number of client purge attempted :0 Number of heap and db entry purge success :0 Number of purge success for db entry only :0 Number of client purge failed :0 Number of garp sent :1 Number of garp failed :0 Number of IP entries validated in cleanup :0 Number of IP entry address errors in cleanup : 0 Number of IP entry deleted in cleanup :0 Number of IP entry delete failed in cleanup :0 Number of IP table create callbacks on standby : 0 Number of IP table modify callbacks on standby : 0 Number of IP table delete callbacks on standby : 0 Number of MAC table create callbacks on standby : 1 Number of MAC table modify callbacks on standby : 0 Number of MAC table delete callbacks on standby : 0 To view the HA redundancy summary, use the following command: Device# show wireless stat redundancy summary HA redundancy summary --------------------- AP recovery duration (ms) SSO HA sync timer expired : 264 : No Verifying High Availability Table 105: Commands for Monitoring Chassis and Redundancy Command Name show chassis Description Displays the chassis information. Note When the peer timeout and retries are configured, the show chassis ha-status command output may show incorrect values. To check the peer keep-alive timer and retries, use the following commands: · show platform software stack-mgr chassis active r0 peer-timeout · show platform software stack-mgr chassis standby r0 peer-timeout show redundancy Displays details about Active box and Standby box. show redundancy switchover Displays the switchover counts, switchover reason, and the switchover time. history To start the packet capture in the redundancy HA port (RP), use the following commands: · test wireless redundancy packetdump start · test wireless redundancy packetdump stop Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1509 Verifying High Availability High Availability · test wireless redundancy packetdump start filter port 2300 Device# test wireless redundancy packetdump start Redundancy Port PacketDump Start Packet capture started on RP port. Device# test wireless redundancy packetdump stop Redundancy Port PacketDump Start Packet capture started on RP port. Redundancy Port PacketDump Stop Packet capture stopped on RP port. Device# dir bootflash: Directory of bootflash:/ 1062881 drwx 151552 Oct 20 2020 23:15:25 +00:00 tracelogs 47 -rw- 20480 Oct 20 2020 23:15:24 +00:00 haIntCaptureLo.pcap 1177345 drwx 4096 Oct 20 2020 19:56:14 +00:00 certs 294337 drwx 8192 Oct 20 2020 19:56:05 +00:00 license_evlog 15 -rw- 676 Oct 20 2020 19:56:01 +00:00 vlan.dat 14 -rw- 30 Oct 20 2020 19:55:16 +00:00 throughput_monitor_params 13 -rw- 134808 Oct 20 2020 19:54:57 +00:00 memleak.tcl 1586145 drwx 4096 Oct 20 2020 19:54:45 +00:00 .inv 1103761 drwx 4096 Oct 20 2020 19:54:39 +00:00 dc_profile_dir 17 -r-- 114 Oct 20 2020 19:54:17 +00:00 debug.conf 1389921 drwx 4096 Oct 20 2020 19:54:17 +00:00 .installer 46 -rw- 1104760207 Oct 20 2020 19:26:41 +00:00 leela_katar_rping_test.SSA.bin 49057 drwx 4096 Oct 20 2020 16:11:21 +00:00 .prst_sync 45 -rw- 1104803200 Oct 20 2020 15:39:19 +00:00 C9800-L-universalk9_wlc.2020-10-20_14.57_yavadhan.SSA.bin 269809 drwx 4096 Oct 19 2020 23:41:49 +00:00 core 44 -rw- 1104751981 Oct 19 2020 17:42:12 +00:00 C9800-L-universalk9_wlc.BLD_POLARIS_DEV_LATEST_20201018_053825_2.SSA.bin 43 -rw- 1104286975 Oct 16 2020 12:05:47 +00:00 C9800-L-universalk9_wlc.BLD_POLARIS_DEV_LATEST_20201010_001654_2.SSA.bin Device# test wireless redundancy packetdump start filter port 2300 Redundancy Port PacketDump Start Packet capture started on RP port with port filter 2300. To check connection between the two HA Ports (RP) and check if there are any drops, delays, or jitter in the connection, use the following command: Device# test wireless redundancy rping Redundancy Port ping PING 169.254.64.60 (169.254.64.60) 56(84) bytes of data. 64 bytes from 169.254.64.60: icmp_seq=1 ttl=64 time=0.083 ms 64 bytes from 169.254.64.60: icmp_seq=2 ttl=64 time=0.091 ms 64 bytes from 169.254.64.60: icmp_seq=3 ttl=64 time=0.074 ms --- 169.254.64.60 ping statistics --3 packets transmitted, 3 received, 0% packet loss, time 2041ms rtt min/avg/max/mdev = 0.074/0.082/0.091/0.007 ms test wireless redundancy To see the HA port interface setting status, use the show platform hardware slot R0 ha_port interface stats command. Device# show platform hardware slot R0 ha_port interface stats HA Port ha_port Link encap:Ethernet HWaddr 70:18:a7:c8:80:70 UP BROADCAST MULTICAST MTU:1500 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1510 High Availability Verifying High Availability RX bytes:0 (0.0 B) TX bytes:0 (0.0 B) Memory:e0900000-e0920000 Settings for ha_port: Supported ports: [ TP ] Supported link modes: 10baseT/Half 10baseT/Full 100baseT/Half 100baseT/Full 1000baseT/Full Supported pause frame use: Symmetric Supports auto-negotiation: Yes Supported FEC modes: Not reported Advertised link modes: 10baseT/Half 10baseT/Full 100baseT/Half 100baseT/Full 1000baseT/Full Advertised pause frame use: Symmetric Advertised auto-negotiation: Yes Advertised FEC modes: Not reported Speed: Unknown! Duplex: Unknown! (255) Port: Twisted Pair PHYAD: 1 Transceiver: internal Auto-negotiation: on MDI-X: off (auto) Supports Wake-on: pumbg Wake-on: g Current message level: 0x00000007 (7) drv probe link Link detected: no NIC statistics: rx_packets: 0 tx_packets: 0 rx_bytes: 0 tx_bytes: 0 rx_broadcast: 0 tx_broadcast: 0 rx_multicast: 0 tx_multicast: 0 multicast: 0 collisions: 0 rx_crc_errors: 0 rx_no_buffer_count: 0 rx_missed_errors: 0 tx_aborted_errors: 0 tx_carrier_errors: 0 tx_window_errors: 0 tx_abort_late_coll: 0 tx_deferred_ok: 0 tx_single_coll_ok: 0 tx_multi_coll_ok: 0 tx_timeout_count: 0 rx_long_length_errors: 0 rx_short_length_errors: 0 rx_align_errors: 0 tx_tcp_seg_good: 0 tx_tcp_seg_failed: 0 rx_flow_control_xon: 0 rx_flow_control_xoff: 0 tx_flow_control_xon: 0 tx_flow_control_xoff: 0 rx_long_byte_count: 0 tx_dma_out_of_sync: 0 tx_smbus: 0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1511 High Availability Deployment for Application Centric Infrastructure (ACI) Network High Availability rx_smbus: 0 dropped_smbus: 0 os2bmc_rx_by_bmc: 0 os2bmc_tx_by_bmc: 0 os2bmc_tx_by_host: 0 os2bmc_rx_by_host: 0 tx_hwtstamp_timeouts: 0 rx_hwtstamp_cleared: 0 rx_errors: 0 tx_errors: 0 tx_dropped: 0 rx_length_errors: 0 rx_over_errors: 0 rx_frame_errors: 0 rx_fifo_errors: 0 tx_fifo_errors: 0 tx_heartbeat_errors: 0 tx_queue_0_packets: 0 tx_queue_0_bytes: 0 tx_queue_0_restart: 0 tx_queue_1_packets: 0 tx_queue_1_bytes: 0 tx_queue_1_restart: 0 rx_queue_0_packets: 0 rx_queue_0_bytes: 0 rx_queue_0_drops: 0 rx_queue_0_csum_err: 0 rx_queue_0_alloc_failed:0 rx_queue_1_packets: 0 rx_queue_1_bytes: 0 rx_queue_1_drops: 0 rx_queue_1_csum_err: 0 rx_queue_1_alloc_failed:0 High Availability Deployment for Application Centric Infrastructure (ACI) Network Information About Deploying ACI Network in Controller Cisco Application Centric Infrastructure (ACI) technology integrates virtual and physical workloads in a programmable and multihypervisor fabric to build a multiservice or a cloud data center. Note The Cisco ACI technology is supported only in a Redundancy Management Interface (RMI) high-availability network. The following figure depicts the discrete components connected in a spine and leaf switch topology provisioned and managed as a single entity. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1512 High Availability Figure 46: Cisco ACI Network Deployment Information About Deploying ACI Network in Controller The following mechanisms help avoid interleaving traffic. Bringing Down Wireless Management Interface Faster In case of a switchover in ACI deployments, APs and clients are dropped because of interleaving traffic between the old and the new active controller. To resolve this issue, bring down the traffic from the old active controller faster. You can do this by bringing down the wireless management interface as soon as a failure is detected. When the wireless management interface shuts down, the traffic that is sourced from the old active wireless management interface stops. This avoids conflicts in the management IP address. The standby controller transitions to the role of the active controller with a new IP-MAC binding. Note The IP Data-Plane Learning feature in an ACI deployment tracks the following: · A duplicate MAC address for the same IP. · Alarm that blocks the IP address for a configured duration. During failure detection, the controller sets up the chassis property non-participant. In IP Data-Plane Learning feature, listen to the property for bringing down the wireless management interface and shutting down traffic in the old active controller faster, thereby avoiding any kind of interleaving traffic between the old and new active controllers. Disabling Fast Switchover Notification This mechanism provides more control to avoid interleaving traffic. During failure handling, the active controller sends an explicit notification to the standby controller, stating that it is going down. This triggers the standby node to take over as the active node. In the event of failure, you can use the disable fast switchover notification option to control the explicit notification from active to standby. In the absence of explicit notification, the standby controller takes over as the active controller on the basis of keepalive timeout. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1513 Prerequisite for Deploying the ACI Network in the Controller High Availability Note You can configure the keepalive timeout so that you have control over when the traffic from the new active controller begins if a failure occurs. In such a failure scenario, the switchover also gets delayed. When you enable this option, the active controller cannot send an explicit failure notification message to the standby controller. The standby controller relies solely on the keepalive timeout failures to detect when the active controller went down. This delays the keepalive timeout in the commencing traffic in the new active controller, thus avoiding the overlapping traffic from the old active controller. Therefore, disabling fast switchover notification increases the switchover duration by the additional keepalive timeout duration. GARP Burst During a controller switchover event, the GARP traffic is generated in burst that overwhelms the ARP learning of ACI. This feature devises a way to retransmit the GARP packet at a much lower rate after a switchover from a new active controller. Prerequisite for Deploying the ACI Network in the Controller Check the maximum supported clients in High Availability to ensure that Cisco ACI does not exceed the configured IPv4 and IPv6 end points. Disabling the Fast Switchover Notification Mechanism (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 no redun-management fast-switchover Example: Device(config)# no redun-management fast-switchover Step 3 end Example: Device(config)# end Purpose Enters global configuration mode. Disables explicit fast switchover notification. Note Configure the fast switchover notification mechanism in the primary controller. This configuration is not required in the secondary controller. Returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1514 High Availability Configuring Gratuitous ARP (GARP) Retransmit (CLI) Configuring Gratuitous ARP (GARP) Retransmit (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 redun-management garp-retransmit burst Determines the rate at which the GARP resend packet-burst-size interval time-interval is performed. Example: Device(config)# redun-management garp-retransmit burst 0 interval 0 Note · packet-burst-size: The valid range is from 0 to 1000. The value 0 refers to the disabled retransmit. · time-interval: Refers to the time interval, in seconds. The valid range is from 0 to 5 seconds. The value 0 refers to the disabled retransmit. Step 3 end Example: Device(config)# end Returns to privileged EXEC mode. Disabling Initial GARP (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 no redun-management garp-retransmit initial Example: Device(config)# no redun-management garp-retransmit initial Step 3 end Example: Device(config)# end Purpose Enters global configuration mode. Disables the initial GARP. Returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1515 Information About Redundancy Management Interface High Availability Information About Redundancy Management Interface The Redundancy Management Interface (RMI) is used as a secondary link between the active and standby Cisco Catalyst 9800 Series Wireless Controllers. This interface is the same as the wireless management interface, and the IP address on this interface is configured in the same subnet as the Wireless Management IP. The RMI is used for the following purposes: · Dual Active Detection · Exchange resource health information between controllers, for instance, gateway reachability status from either controller. · Gateway reachability is checked on the active and the standby controller through the RMI when the feature is enabled. It takes approximately the configured gateway monitoring interval to detect that a controller has lost gateway reachability. The default gateway monitoring interval value is 8 seconds. Note · The RMI might trigger a switchover based on the gateway status of the active controller. · Cisco TrustSec is not supported on the RMI. When the device SGT is used, the IP-SGT mapping for RMI address is also applied along with the WMI address. So, you need to ensure that the SGACL is defined appropriately to allow ICMP and ARP traffic between the active and standby RMI addresses. · If the RP and RMI links are down, the HA setup breaks into two active controllers. This leads to IP conflict in the network. The HA setup forms again when the RP link comes up. Depending on the state of the external switch at this time, the ARP table may or may not be updated to point to the active controller. That is, the switch may fail to process the GARP packets from the controller. As a best practice, we recommend that you keep the ARP cache timeout value to a low value for faster recovery from multiple fault scenarios. You need to select a value that does not impact the network traffic, for instance, 30 minutes. Note The AAA packets originating from the controller may use either the wireless management IP or the RMI IP. Therefore, ensure that you add RMI IP as the source IP along with WMI IP in the AAA server. Active Controller The primary address on the active controller is the management IP address. The secondary IPv4 address on the management VLAN is the RMI IP address for the active controller. Do not configure the secondary IPv4 addresses explicitly because a single secondary IPv4 address is configured automatically by RMI under the RMI. Standby Controller The standby controller does not have the wireless management IP configured; it has the RMI IP address configured as the primary IP address. When the standby controller becomes active, the management IP address Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1516 High Availability Information About Redundancy Management Interface becomes the primary IP address and the RMI IP address becomes the secondary IP address. If the interface on the active controller is administratively down, the same state is reflected on the standby controller. Dual Stack Support on Management VLAN with RMI Dual stack refers to the fact that the wireless management interface can be configured with IPv4 and IPv6 addresses. If an RMI IPv4 address is configured along with an IPv4 management IP address, you can additionally configure an IPv6 management address on the wireless management interface. This IPv6 management IP address will not be visible on the standby controller. If an RMI IPv6 address is configured along with an IPv6 management IP address, you can additionally configure an IPv4 management address on the wireless management interface. This IPv4 management IP address will not be visible on the standby controller. Therefore, you can monitor only the IPv6 gateway when the RMI IPv6 address is configured, or only the IPv4 gateway when the RMI IPv4 address is configured. Note The RMI feature supports the RMI IPv4 or IPv6 addresses. RMI-Based High-Availability Pairing You should consider the following scenarios for HA pairing: · Fresh Installation · Already Paired Controllers · Upgrade Scenario · Downgrade Scenario Dynamic HA pairing requires both the active controller and the standby controller to reload. However, dynamic HA pairing occurs on the Cisco Catalyst 9800-L Wireless Controller, Cisco Catalyst 9800-40 Wireless Controller, and the Cisco Catalyst 9800-80 Wireless Controller when one of them reloads and becomes the standby controller. Note Chassis numbers identify individual controllers. Unique chassis numbers must be configured before forming an HA pair. HA Pairing Without Previous Configuration When HA pairing is done for the first time, no ROMMON variables are found for the RP IP addresses. You can choose from the existing privileged EXEC mode RP-based commands or the RMI IP-based mechanisms. However, the privileged EXEC mode RP-based commands will be deprecated soon. If you use Cisco DNA Center, you can choose the privileged EXEC mode RP-based CLI mechanism till the Cisco DNA Center migrates to support the RMI. The RP IPs are derived from the RMI IPs after an HA pair is formed. Also, the privileged EXEC mode RP-based CLI method of clearing and forming an HA pair is not allowed after the RMI IP-based HA mechanism is chosen. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1517 Information About Redundancy Management Interface High Availability Note · Although you can choose RP or RMI for a fresh installation, we recommend that you use RMI install method. · To view the ROMMON variables, use the show romvars command. If you choose the privileged EXEC RP-based CLI mechanism, the RP IPs are configured the same way as in the 16.12 release. The following occurs when the RMI-based HA pairing is done on a brand-new system: · RP IPs are derived from RMI IPs and used in HA pairing. · Privileged EXEC mode RP-based CLIs are blocked. Note The RMI migration is supported from Cisco DNA Center, 2.3.3.x release version. The following are the limitations observed during RMI migration: · The negative cases fail due to the following reasons: · When devices are not reachable. · When non-Cisco Catalyst 9800 Series Wireless Controllers are in use. · When an earlier controller version (Cisco IOS XE 17.3) is in use. · When High Availability is not configured. · When High Availability RMI is already configured. · When High Availability is upgraded to RMI-based High Availability for Cisco IOS XE release version greater than or equal to 17.3. · When upgrading to an already failed High Availability paired controller. · The controller GUI prohibits applying RMI migration configuration to High Availability failed devices. Paired Controllers If the controllers are already in an HA pair, the existing EXEC mode RP-based commands will continue to be used. You can enable RMI to migrate to the RMI-based HA pairing. If the controllers are already paired and RMI is configured, it will overwrite the RP IPs with the RMI-derived IPs. The HA pair will not be disturbed immediately, but the controllers will pick up the new IP when the next reload happens. The RMI feature mandates a reload for the feature to be effective. When both the controllers are reloaded, they come up as a pair with the new RMI-derived RP IPs. The following occurs when the RMI configuration is done: · The RP IPs derived from the RMI IPs are overwritten, and used for HA pairing. · If the active and standby controller already exist prior to HA pairing through the EXEC mode RP-based command mechanism, the pair is not interrupted. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1518 High Availability Information About Redundancy Management Interface · When the pair reloads later, the new RP IPs are used. · EXEC mode RP-based commands are blocked. Upgrading from Cisco IOS XE 16.1.x to a Later Release A system that is being upgraded can choose to: · Migrate with the existing RP IP configuration intact--In this case, the existing RP IP configuration will continue to be used. The EXEC mode RP-based commands are used for future modifications. · Migrate after clearing the HA configuration--In this case, you can choose between the old (EXEC mode RP-based commands) and new RMI-based RP configuration methods. Note In case the older configuration is retained, the RMI configuration updates the RP IPs with the IPs derived from the RMI IPs. Downgrade Scenario Note The downgrade scenario given below is not applicable for Cisco IOS XE Amsterdam 17.1.x. The downgrade scenario will have only the EXEC mode RP-based commands. The following are the two possibilities: · If the upgraded system used the RMI-based RP configuration. · If the upgraded system continued to use the EXEC mode RP-based commands. Note In the above cases, the downgraded system uses the EXEC mode RP-based commands to modify the configuration. However, the downgraded system will continue to use the new derived RP IPs. Note When you downgrade the Cisco Catalyst 9800 Series Wireless Controller to any version below 17.1 and if the mDNS gateway is enabled on the WLAN/RLAN/GLAN interfaces, the mdns-sd-interface gateway goes down after the downgrade. To enable the mDNS gateway on the WLAN/RLAN/GLAN interfaces in 16.12 and earlier versions, use the following commands: wlan test 1 test mdns-sd gateway To enable the mDNS gateway on the WLAN/RLAN/GLAN interfaces from version 17.1 onwards, use the following command: mdns-sd-interface gateway Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1519 Configuring Redundancy Management Interface (GUI) High Availability Gateway Monitoring From Cisco IOS XE Amsterdam 17.2.1 onwards, the method to configure the gateway IP has been modified. The ip default-gateway gateway-ip command is not used. Instead, the gateway IP is selected based on the static routes configured. From among the static routes configured, the gateway IP that falls in the same subnet as the RMI subnet (the broadest mask and least gateway IP) is chosen. If no matching static route is found, gateway failover will not work (even if management gateway-failover is enabled). Configuring Redundancy Management Interface (GUI) Before you begin Before configuring RMI + RP using GUI, ensure that WMI is available. Procedure Step 1 In the Administration > Device > Redundancy window, perform the following: a. Set the Redundancy Configuration toggle button to Enabled to activate redundancy configuration. b. In the Redundancy Pairing Type field, select RMI+RP to perform RMI+RP redundancy pairing as follows: · In the RMI IP for Chassis 1 field, enter RMI IP address for chassis 1. · In the RMI IP for Chassis 2 field, enter RMI IP address for chassis 2. · From the HA Interface drop-down list, choose one of the HA interface. Note You can select the HA interface only for Cisco Catalyst 9800 Series Wireless Controllers. · Set the Management Gateway Failover toggle button to Enabled to activate management gateway failover. · In the Gateway Failure Interval field, enter an appropriate value. The valid range is between 6 and 12 (seconds). The default is 8 seconds. c. In the Redundancy Pairing Type field, select RP to perform RP redundancy pairing as follows: · In the Local IP field, enter an IP address for Local IP. · In the Netmask field, enter the subnet mask assigned to all wireless clients. · From the HA Interface drop-down list, choose one of the HA interface. Note You can select the HA interface only for Cisco Catalyst 9800 Series Wireless Controllers. · In the Remote IP field, enter an IP address for Remote IP. d. In the Keep Alive Timer field, enter an appropriate timer value. The valid range is between 1 and 10 (x100 milliseconds). Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1520 High Availability Configuring Redundancy Management Interface (CLI) Step 2 e. In the Keep Alive Retries field, enter an appropriate retry value. The valid range is between 3 and 10 seconds. f. In the Active Chassis Priority field, enter a value. Click Apply and reload controllers. Configuring Redundancy Management Interface (CLI) Procedure Step 1 Command or Action Purpose chassis chassis-num priority chassis-priority Example: Device# chassis 1 priority 1 (Optional) Configures the priority of the specified device. Note From Cisco IOS XE Gibraltar 16.12.x onwards, device reload is not required for the chassis priority to become effective. · chassis-num--Enter the chassis number. The range is from 1 to 2. · chassis-priority--Enter the chassis priority. The range is from 1 to 2. The default value is 1. Note When both the devices boot up at the same time, the device with higher priority becomes active, and the other one becomes standby. If both the devices are configured with the same priority value, the one with the smaller MAC address acts as active and its peer acts as standby. Step 2 chassis redundancy ha-interface Creates an HA interface for your controller. GigabitEthernet interface-number · interface-number: GigabitEthernet Example: interface number. The range is from 1 to Device# chassis redundancy ha-interface 32. GigabitEthernet 3 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1521 Configuring Redundancy Management Interface (CLI) High Availability Step 3 Step 4 Step 5 Step 6 Command or Action Purpose Note This step is applicable only for Cisco Catalyst 9800-CL Series Wireless Controllers. The chosen interface is used as the dedicated interface for HA communication between the 2 controllers. configure terminal Example: Device# configure terminal Enters global configuration mode. redun-management interface vlan Configures Redundancy Management Interface. vlan-interface-number chassis chassis-number address ip-address chassis chassis-number address ip-address · vlan-interface-number : VLAN interface number. The valid range is from 1 to 4094. Example: Note Here, the vlan-interface-number is the Device(config)# redun-management interface Vlan 200 chassis 1 address 9.10.90.147 chassis 2 address 9.10.90.149 same VLAN as the Management VLAN. That is, both must be on the same subnet. · chassis-number: Chassis number. The valid range is from 1 to 2. · ip-address: Redundancy Management Interface IP address. Note Each controller must have a unique chassis number for RMI to form the HA pair. The chassis number can be observed as SWITCH_NUMBER in the output of show romvar command. Modification of SWITCH_NUMBER is currently not available through the web UI. To disable the HA pair, use the no redun-management interface vlan chassis command. end Example: Device(config)# end write memory Example: Returns to privileged EXEC mode. Saves the configuration. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1522 High Availability Configuring Gateway Monitoring (CLI) Step 7 Command or Action Device# write memory reload Example: Device# reload Purpose Reloads the controllers. Note When the RMI configuration is done, you must reload the controllers for the configuration to take effect. For Cisco Catalyst 9800-CL Wireless Controller VM, both the active and standby controllers reload automatically. In the case of hardware platforms, you should reload the active controller manually, as only standby the controller reloads automatically. Configuring Gateway Monitoring (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 [no] management gateway-failover enable Example: Device(config)# management gateway-failover enable Enables gateway monitoring. (Use the no form of this command to disable gateway monitoring.) Step 3 end Example: Device(config)# end Returns to privileged EXEC mode. Note To save the configuration, use the write memory command. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1523 Configuring Gateway Monitoring Interval (CLI) High Availability Configuring Gateway Monitoring Interval (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 management gateway-failover interval interval-value Example: Device(config)# management gateway-failover interval 6 Step 3 end Example: Device(config)# end Purpose Enters global configuration mode. Configures the gateway monitoring interval. interval-value - Refers to the gateway monitoring interval. The valid range is from 6 to 12. Default value is 8. Saves the configuration and exits configuration mode and returns to privileged EXEC mode. Gateway Reachability Detection Information About Gateway Reachability Detection Gateway Reachability Detection feature mimimizes the downtime on APs and clients when the gateway reachability is lost on the active controller. Both active and standby controllers keep track of gateway reachability. The gateway reachability is detected by sending Internet Control Message Protocol (ICMP) and ARP requests periodically to the gateway. Both active and standby controllers use the RMI IP as the source IP. The messages are sent at 1 second interval. If it takes 8 (or configured value) consecutive failures in reaching the gateway, the controller declares the gateway as non-reachable. It takes approximately 8 seconds to detect if a controller has lost gateway reachability. Gateway monitoring with native IPv6 uses ICMP Neighbour Discovery protocols and ICMPv6 ECHO to check gateway reachability. Therefore, you can monitor only the IPv6 gateway when RMI IPv6 is configured. This means that only one IPv4 or IPv6 gateways can be monitored. Note If the standby controller loses gateway, the standby moves to the standby recovery mode. If the active controller loses gateway, the active reloads and standby becomes active. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1524 High Availability Configuration Workflow Configuration Workflow 1. Configuring Redundancy Management Interface (GUI), on page 1520 (or) Configuring Redundancy Management Interface (CLI), on page 1521 Note For RMI configuration to take effect, ensure that you reload your controllers. 2. Configuring IPv6 Static Route. For information, see Gateway Monitoring. 3. Configuring Gateway Monitoring Interval (CLI), on page 1524 Migrating to RMI IPv6 From RMI IPv4 1. Unconfigure the RMI IPv4 using the following CLIs: Device# conf t Device(config)# no redun-management interface <vlan_name> chassis 1 address <ip_address1> chassis 2 address <ip_address2> Note This CLI unconfigures RMI on both the controllers. 2. Note Take a backup of the running config on active before you reload the controller. Reload the controller. 3. Copy the backed up config to the running config on the box which would have lost all the config. 4. Configure the RMI IPv6 on both the controllers. For information on the CLI, see Configuring Redundancy Management Interface (CLI), on page 1521. 5. Reload the controller. From HA Pairing (Without RMI) For information on HA pairing, see Configuring Redundancy Management Interface (GUI). Monitoring the Health of the Standby Controller The Standby Monitoring feature allows you to monitor the health of a system on a standby controller using programmatic interfaces and commands. This feature allows you to monitor parameters such as CPU, memory, interface status, power supply, fan failure, and the system temperature. Standby Monitoring is enabled when Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1525 Monitoring the Health of the Standby Controller High Availability Redundancy Management Interface (RMI) is configured, no other configuration is required. The RMI itself is used to connect to the standby and perform standby monitoring. Standby Monitoring feature cannot be dynamically enabled or disabled. Note The active controller uses the management or RMI IP to initiate AAA requests. Whereas, the standby controller uses the RMI IP to initiate AAA requests. Thus, the RMI IPs must be added in AAA servers for a seamless client authentication and standby monitoring. To enable standby console, ensure that the following configuration is in place: redundancy main-cpu secondary console enable Note The Standby Monitoring feature is not supported on a controller in the active-recovery and the standby-recovery modes. The Standby Monitoring feature supports only the following traffic on the RMI interface of the standby controller: · Address Resolution Protocol (ARP) · Internet Control Message Protocol (ICMP) · TCP Traffic (to or from) ports: 22, 443, 830, and 3200 · UDP RADIUS ports:1645 and1646 · UDP Extended RADIUS ports: 21645 to 21844 Feature Scenarios · To monitor the health of the standby directly from the standby controller using Standby RMI IP. · To get syslogs from the standby controller using the Standby RMI IP. Use Cases · Enabling SNMP agent and programmatic interfaces on the standby controller: You can directly perform an SNMP query or programmatic interface query to the standby's RMI IP and active controller. · Enabling syslogs on the standby controller: You can directly get the standby syslogs from the standby controller. RADIUS Accounting Support Whenever you log in to a standby device, the RADIUS start record must be sent to the external RADIUS server. Similarly, when you log out of a device, the RADIUS stop record must be sent to the external RADIUS server. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1526 High Availability Monitoring the Health of Standby Parameters Using SNMP TACACS+ Authentication Support Users are authenticated through the RMI using the external TACACS+ server. The username and password are evaluated in the TACACS+ server. Depending on the response received from the server, a user will be able to log in to the standby device. TACACS+ Accounting Support Whenever you log in to the standby device, the TACACS+ accounting start record must be sent to the external TACACS+ server. Similarly, when you log out of a device, the TACACS+ accounting stop record must be sent to the external TACACS+ server. Note The following configuration must be in place to configure AAA to send the accounting packets: aaa accounting exec {default | named-list} start-stop group {RAD | tac-group-name} Note The TACACS+ login to the standby device is not supported when TACACS+ server is configured with hostname. Monitoring the Health of Standby Parameters Using SNMP Standby Monitoring Using Standby RMI IP When an SNMP agent is enabled on the standby controller, you can directly perform an SNMP query to the standby's RMI IP. From Release 17.5 onwards, you can query the following MIB on the standby controller: Table 106: MIB Name and Notes MIB Name IF-MIB Notes This MIB is used to monitor the interface statistics of the standby controller using the standby RMI IP address. Note If an SNMP agent is enabled on the active controller, by default, the SNMP is enabled on the standby controller. Standby Monitoring Using the Active Controller CISCO-LWAPP-HA-MIB The CISCO-LWAPP-HA-MIB monitors the health parameters of the standby controller, that is, memory, CPU, port status, power statistics, peer gateway latencies, and so on. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1527 Standby IOS Linux Syslogs High Availability You can query the following MIB objects of CISCO-LWAPP-HA-MIB. Table 107: MIB Objects and Notes MIB Objects cLHaPeerHotStandbyEvent cLHaBulkSyncCompleteEvent Notes This object can be used to check if the standby controller has turned hot-standby or not. This object represents the time at which the bulksync is completed. CISCO-PROCESS-MIB The CISCO-PROCESS-MIB monitors CPU and process statistics. Use it to monitor CPU-related or memory-related BINOS processes. The standby CISCO-PROCESS-MIB can be monitored using the active controller. ENTITY-MIB The ENTITY-MIB is used to monitor hardware details of the active and standby controllers using the active controller. Note The standby Route Processor (RP) sensors are appended in the active RP sensors. Standby IOS Linux Syslogs The standby logs are relayed using the same method as on the active Cisco IOS for wireless controllers. From Release 17.5 onwards, external logging of syslogs from the standby IOS is enabled. As BINOS processes on standby also forwards the syslogs to Cisco IOS, all the syslogs generated on the standby controller is forwarded to the configured external server. Note RMI IP address is used for logging purpose. The following is the expected behavior when an HA pair is configured with the RMI IPv6 address, the active controller has dual stack, and logging is configured on the IPv4 address: The standby controller tries to send syslogs to the IPv4 server because logging is only configured on IPv4 even though IPv4 is not supported by standby. Standby Interface Status Using Active SNMP The standby interface information is sent to the active controller using IPC in the following scenarios: · When there is a change in the interface status. · When a new interface is added or deleted on the standby controller. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1528 High Availability Monitoring the Health of Standby Controller Using Programmatic Interfaces When the active controller receives the interface information from the standby controller, the active controller's database is populated with the standby interface information. When an SNMP query is received for the standby interface information, the SNMP handlers corresponding to the CISCO-LWAPP-HA-MIB reads them from the standby interface database on the active and populates the MIB objects in CISCO-LWAPP-HA-MIB. You can query the following MIB objects of CISCO-LWAPP-HA-MIB. Table 108: MIB Objects of CISCO-LWAPP-HA-MIB MIB Object stbyIfIndex stbyIfName stbyIfPhysAddress stbyifOperStatus stbyifAdminStatus Notes This is a unique value (greater than zero) for each interface of the standby controller. This is the name of the standby interface. This is the interface address of the standby controller in the protocol sublayer. This is the current operational state of the interface in the standby controller. This is the desired state of the interface of the standby controller. To verify the logging on the active when the standby fails to send interface statistics, use the following command: Device# debug snmp ha-chkpt Device# debug snmp ha-intf_db Monitoring the Health of Standby Controller Using Programmatic Interfaces You can monitor parameters such as CPU, memory, sensors, and interface status on a standby controller using programmatic interfaces such as NetConf and RestConf. The RMI IP of the standby controller can be used for access to the following operational models: The models can be accessed through . · Cisco-IOS-XE-device-hardware-oper.yang · Cisco-IOS-XE-process-cpu-oper.yang · Cisco-IOS-XE-platform-software-oper.yang · Cisco-IOS-XE-process-memory-oper.yang · Cisco-IOS-XE-interfaces-oper.yang For more information on the YANG models, see the Programmability Configuration Guide, Cisco IOS XE Amsterdam 17.3.x. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1529 Monitoring the Health of Standby Controller Using CLI High Availability Monitoring the Health of Standby Controller Using CLI This section describes the different commands that can be used to monitor the standby device. You can connect to the standby controller through SSH using the RMI IP of the standby controller. The user credentials must have been configured already. Both local authentication and RADIUS authentication are supported. Note The redun-management command needs to be configured on both the controllers, primary and standby, prior to high availability (HA) pairing. Monitoring Port State The following is a sample output of the show interfaces interface-name command: Device-standby# show interfaces GigabitEthernet1 GigabitEthernet1 is down, line protocol is down Shadow state is up, true line protocol is up Hardware is CSR vNIC, address is 000c.2909.33c2 (bia 000c.2909.33c2) MTU 1500 bytes, BW 1000000 Kbit/sec, DLY 10 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Keepalive set (10 sec) Full Duplex, 1000Mbps, link type is force-up, media type is Virtual output flow-control is unsupported, input flow-control is unsupported ARP type: ARPA, ARP Timeout 04:00:00 Last input 00:00:06, output 00:00:24, output hang never Last clearing of "show interface" counters never Input queue: 30/375/0/0 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: fifo Output queue: 0/40 (size/max) 5 minute input rate 389000 bits/sec, 410 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 3696382 packets input, 392617128 bytes, 0 no buffer Received 0 broadcasts (0 multicasts) 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 0 watchdog, 0 multicast, 0 pause input 18832 packets output, 1218862 bytes, 0 underruns Output 0 broadcasts (0 multicasts) 0 output errors, 0 collisions, 2 interface resets 3 unknown protocol drops 0 babbles, 0 late collision, 0 deferred 0 lost carrier, 0 no carrier, 0 pause output 0 output buffer failures, 0 output buffers swapped out The following is a sample output of the show ip interface brief command: Device# show ip interface brief Interface GigabitEthernet1 GigabitEthernet0 Capwap1 Capwap2 Capwap3 IP-Address unassigned unassigned unassigned unassigned unassigned OK? Method Status Protocol YES unset down down YES NVRAM administratively down down YES unset up up YES unset up up YES unset up up Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1530 High Availability Monitoring the Health of Standby Controller Using CLI Capwap10 Vlan1 Vlan56 Vlan111 unassigned unassigned unassigned 111.1.1.85 YES unset YES NVRAM YES unset YES NVRAM up down down up up down down up Monitoring CPU or Memory The following is a sample output of the show process cpu sorted 5sec command: Device-standby# show process cpu sorted 5sec CPU utilization for five seconds: 0%/0%; one minute: 0%; five minutes: 0% PID Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process 10 1576556 281188 5606 0.15% 0.05% 0.05% 0 Check heaps 232 845057 54261160 15 0.07% 0.05% 0.06% 0 IPAM Manager 595 177 300 590 0.07% 0.02% 0.01% 2 Virtual Exec 138 1685973 108085955 15 0.07% 0.08% 0.08% 0 L2 LISP Punt Pro 193 19644 348767 56 0.07% 0.00% 0.00% 0 DTP Protocol 5 0 1 0 0.00% 0.00% 0.00% 0 CTS SGACL db cor 4 24 15 1600 0.00% 0.00% 0.00% 0 RF Slave Main Th 6 0 1 0 0.00% 0.00% 0.00% 0 Retransmission o 7 0 1 0 0.00% 0.00% 0.00% 0 IPC ISSU Dispatc 2 117631 348801 337 0.00% 0.00% 0.00% 0 Load Meter 8 0 1 0 0.00% 0.00% 0.00% 0 EDDRI_MAIN To check CPU and memory utilization of binos processes, run the following command: Device-standby# show platform software process slot chassis standby R0 monitor top - 23:24:14 up 8 days, 3:38, 0 users, load average: 0.69, 0.79, 0.81 Tasks: 433 total, 1 running, 431 sleeping, 1 stopped, 0 zombie %Cpu(s): 1.7 us, 2.8 sy, 0.0 ni, 95.6 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 st MiB Mem : 32059.2 total, 21953.7 free, 4896.8 used, 5208.6 buff/cache MiB Swap: 0.0 total, 0.0 free, 0.0 used. 26304.6 avail Mem PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND 23565 root 20 0 2347004 229116 130052 S 41.2 0.7 5681:44 ucode_pkt+ 2306 root 20 0 666908 106760 46228 S 5.9 0.3 15:06.14 smand 22807 root 20 0 3473004 230020 152120 S 5.9 0.7 510:56.90 fman_fp_i+ 1 root 20 0 14600 11324 7424 S 0.0 0.0 0:31.07 systemd 2 root 20 0 0 0 0 S 0.0 0.0 0:00.28 kthreadd 3 root 0 -20 0 0 0 I 0.0 0.0 0:00.00 rcu_gp 4 root 0 -20 0 0 0 I 0.0 0.0 0:00.00 rcu_par_gp 6 root 0 -20 0 0 0 I 0.0 0.0 0:00.00 kworker/0+ 7 root 20 0 0 0 0 I 0.0 0.0 0:00.49 kworker/u+ 8 root 0 -20 0 0 0 I 0.0 0.0 0:00.00 mm_percpu+ 9 root 20 0 0 0 0 S 0.0 0.0 0:03.26 ksoftirqd+ . . . 32258 root 20 0 57116 3432 2848 S 0.0 0.0 0:00.00 rotee 32318 root 20 0 139560 9500 7748 S 0.0 0.0 0:55.67 pttcd 32348 root 20 0 31.6g 3.1g 607364 S 0.0 9.8 499:12.04 linux_ios+ 32503 root 20 0 3996 3136 2852 S 0.0 0.0 0:00.00 stack_snt+ 32507 root 20 0 3700 1936 1820 S 0.0 0.0 0:00.00 sntp Monitoring Hardware The following is a sample output of the show environment summary command: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1531 Monitoring the Health of Standby Controller Using CLI High Availability Device# show environment summary Number of Critical alarms: 0 Number of Major alarms: 0 Number of Minor alarms: 0 Slot Sensor Current State Reading Threshold(Minor,Major,Critical,Shutdown) ---------- -------------- --------------- ------------ --------------------------------------- P0 Vin Normal 231 V AC na P0 Iin Normal 2A na P0 Vout Normal 12 V DC na P0 Iout Normal 30 A na P0 Temp1 Normal 25 Celsius (na ,na ,na ,na )(Celsius) P0 Temp2 Normal 31 Celsius (na ,na ,na ,na )(Celsius) P0 Temp3 Normal 37 Celsius (na ,na ,na ,na )(Celsius) R0 VDMB1: VX1 Normal 1226 mV na R0 VDMB1: VX2 Normal 6944 mV na R0 Temp: DMB IN Normal 26 Celsius (45 ,55 ,65 ,70 )(Celsius) R0 Temp: DMB OUT Normal 40 Celsius (70 ,75 ,80 ,85 )(Celsius) R0 Temp: Yoda 0 Normal 54 Celsius (95 ,105,110,115)(Celsius) R0 Temp: Yoda 1 Normal 62 Celsius (95 ,105,110,115)(Celsius) R0 Temp: CPU Die Normal 43 Celsius (100,110,120,125)(Celsius) R0 Temp: FC FANS Fan Speed 70% 26 Celsius (29 ,39 ,0 )(Celsius) R0 VDDC1: VX1 Normal 1005 mV na R0 VDDC1: VX2 Normal 7084 mV na R0 VDDC2: VH Normal 12003mV na R0 Temp: DDC IN Normal 25 Celsius (55 ,65 ,75 ,80 )(Celsius) R0 Temp: DDC OUT Normal 35 Celsius (75 ,85 ,95 ,100)(Celsius) P0 Stby Vin Normal 230 V AC na P0 Stby Iin Normal 2A na P0 Stby Vout Normal 12 V DC na P0 Stby Iout Normal 32 A na P0 Stby Temp1 Normal 24 Celsius (na ,na ,na ,na )(Celsius) P0 Stby Temp2 Normal 29 Celsius (na ,na ,na ,na )(Celsius) P0 Stby Temp3 Normal 35 Celsius (na ,na ,na ,na )(Celsius) R0 Stby VDMB1: VX1 Normal 1225 mV na R0 Stby VDMB1: VX2 Normal 6979 mV na R0 Stby VDMB2: VX2 Normal 5005 mV na R0 Stby VDMB2: VX3 Normal 854 mV na R0 Stby VDMB3: VX1 Normal 972 mV na R0 Stby Temp: DMB INormal 22 Celsius (45 ,55 ,65 ,70 )(Celsius) R0 Stby Temp: DMB ONormal 32 Celsius (70 ,75 ,80 ,85 )(Celsius) R0 Stby Temp: Yoda Normal 43 Celsius (95 ,105,110,115)(Celsius) R0 Stby Temp: Yoda Normal 45 Celsius (95 ,105,110,115)(Celsius) R0 Stby Temp: CPU DNormal 33 Celsius (100,110,120,125)(Celsius) R0 Stby Temp: FC FAFan Speed 70% 22 Celsius (29 ,39 ,0 )(Celsius) R0 Stby VDDC1: VX1 Normal 1005 mV na R0 Stby VDDC1: VX2 Normal 7070 mV na R0 Stby VDDC2: VX2 Normal 752 mV na R0 Stby VDDC2: VX3 Normal 750 mV na R0 Stby Temp: DDC INormal 22 Celsius (55 ,65 ,75 ,80 )(Celsius) R0 Stby Temp: DDC ONormal 28 Celsius (75 ,85 ,95 ,100)(Celsius) Note The command displays both active and standby hardware details. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1532 High Availability Verifying the Gateway-Monitoring Configuration Note The show environment summary command displays data only for physical appliances such as Cisco Catalyst 9800-80 Wireless Controller, Cisco Catalyst 9800-40 Wireless Controller, Cisco Catalyst 9800-L Wireless Controller, and Cisco Catalyst 9800 Embedded Wireless Controller for Switch. The command does not display data for Cisco Catalyst 9800 Wireless Controller for Cloud. Verifying the Gateway-Monitoring Configuration To verify the status of the gateway-monitoring configuration on an active controller, run the following command: Device# show redundancy states my state = 13 -ACTIVE peer state = 8 -STANDBY HOT Mode = Duplex Unit = Primary Unit ID = 1 Redundancy Mode (Operational) = sso Redundancy Mode (Configured) = sso Redundancy State = sso Maintenance Mode = Disabled Manual Swact = enabled Communications = Up client count = 129 client_notification_TMR = 30000 milliseconds RF debug mask = 0x0 Gateway Monitoring = Disabled Gateway monitoring interval = 8 secs To verify the status of the gateway-monitoring configuration on a standby controller, run the following command: Device-stby# show redundancy states my state = 8 -STANDBY HOT peer state = 13 -ACTIVE Mode = Duplex Unit = Primary Unit ID = 2 Redundancy Mode (Operational) = sso Redundancy Mode (Configured) = sso Redundancy State = sso Maintenance Mode = Disabled Manual Swact = cannot be initiated from this the standby unit Communications = Up client count = 129 client_notification_TMR = 30000 milliseconds RF debug mask = 0x0 Gateway Monitoring = Disabled Gateway monitoring interval = 8 secs Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1533 Verifying the RMI IPv4 Configuration High Availability Verifying the RMI IPv4 Configuration To verify the interface configuration for an active controller, use the following command: Device# show running-config interface vlan management-vlan Building configuration... Current configuration : 109 bytes ! interface Vlan90 ip address 9.10.90.147 255.255.255.0 secondary ip address 9.10.90.41 255.255.255.0 end To verify the interface configuration for a standby controller, use the following command: Device-stby# show running-config interface vlan 90 Building configuration... Current configuration : 62 bytes ! interface Vlan90 ip address 9.10.90.149 255.255.255.0 end To verify the chassis redundancy management interface configuration for an active controller, use the following command: Device# show chassis rmi Chassis/Stack Mac Address : 000c.2964.1eb6 - Local Mac Address Mac persistency wait time: Indefinite H/W Current Chassis# Role Mac Address Priority Version State IP RMI-IP -------------------------------------------------------------------------------------------------------- *1 Active 000c.2964.1eb6 1 V02 Ready 169.254.90.147 9.10.90.147 2 Standby 000c.2975.3aa6 1 V02 Ready 169.254.90.149 9.10.90.149 To verify the chassis redundancy management interface configuration for a standby controller, use the following command: Device-stby# show chassis rmi Chassis/Stack Mac Address : 000c.2964.1eb6 - Local Mac Address Mac persistency wait time: Indefinite H/W Current Chassis# Role Mac Address Priority Version State IP RMI-IP ------------------------------------------------------------------------------------------------ 1 Active 000c.2964.1eb6 1 V02 Ready 169.254.90.147 9.10.90.147 *2 Standby 000c.2975.3aa6 1 V02 Ready 169.254.90.149 9.10.90.149 To verify the ROMMON variables on an active controller, use the following command: Device# show romvar | include RMI RMI_INTERFACE_NAME = Vlan90 RMI_CHASSIS_LOCAL_IP = 9.10.90.147 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1534 High Availability Verifying the RMI IPv6 Configuration RMI_CHASSIS_REMOTE_IP = 9.10.90.149 To verify the ROMMON variables on a standby controller, use the following command: Device-stby# show romvar | include RMI RMI_INTERFACE_NAME = Vlan90 RMI_CHASSIS_LOCAL_IP = 9.10.90.149 RMI_CHASSIS_REMOTE_IP = 9.10.90.147 To verify the switchover reason, use the following command: Device# show redundancy switchover history Index ----1 Previous active -------- 2 Current active ------- 1 Switchover reason ---------Active lost GW Switchover time ---------17:02:29 UTC Mon Feb 3 2020 Verifying the RMI IPv6 Configuration To verify the chassis redundancy management interface configuration for both active and standby controllers, run the following command: Device# show chassis rmi Chassis/Stack Mac Address : 00a3.8e23.a540 - Local Mac Address Mac persistency wait time: Indefinite Local Redundancy Port Type: Twisted Pair H/W Current Chassis# Role Mac Address Priority Version State IP RMI-IP --------------------------------------------------------------------------------------------- 1 Standby 706d.1536.23c0 1 V02 Ready 169.254.254.17 2020:0:0:1::211 *2 Active 00a3.8e23.a540 1 V02 Ready 169.254.254.18 2020:0:0:1::212 To verify the RMI related ROMMON variables for both active and standby controllers, run the following command Device# show romvar | i RMI RMI_INTERFACE_NAME = Vlan52 RMI_CHASSIS_LOCAL_IPV6 = 2020:0:0:1::212 RMI_CHASSIS_REMOTE_IPV6 = 2020:0:0:1::211 Verifying Redundancy Port Interface Configuration To verify the Redundancy Port Interface (RIF) resource status in an active instance, run the following command: Device# show platform software rif-mgr chassis active R0 resource-status RIF Resource Status RP Status RMI Status : Up : Up Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1535 Verifying Redundancy Port Interface Configuration High Availability Current Chassis State : Active Peer Chassis State : Standby To verify the RIF resource status in a standby instance, run the following command: Device# show platform software rif-mgr chassis standby R0 resource-status RIF Resource Status RP Status : Up RMI Status : Up Current Chassis State : Standby Peer Chassis State : Active To verify the RMI link re-establishment count and the time since the RMI link is Up in the active instance, run the following command: Device# show platform software rif-mgr chassis active R0 rmi-connection-details RMI Connection Details RMI Link re-establish count : 2 RMI Link Uptime : 21 hours 8 minutes 43 seconds RMI Link Upsince : 08/05/2021 13:46:01 To verify the RMI link re-establishment count and the time since the RMI link is Down in the active instance, run the following command: Device# show platform software rif-mgr chassis active R0 rmi-connection-details RMI Connection Details RMI Link re-establish count : 1 RMI Link Downtime : 28 seconds RMI Link Downsince : 07/16/2021 03:19:11 To verify the RMI link re-establishment count and the time since the RMI link is Up in the standby instance, run the following command: Device# show platform software rif-mgr chassis standby R0 rmi-connection-details RMI Connection Details RMI Link re-establish count : 1 RMI Link Uptime : 1 hour 39 minute 9 seconds RMI Link Upsince : 07/16/2021 01:31:41 To verify the RMI link re-establishment count and the time since the RMI link is Down in the standby instance, run the following command: Device# show platform software rif-mgr chassis standby R0 rmi-connection-details RMI Connection Details RMI Link re-establish count : 1 RMI Link Downtime : 22 seconds RMI Link Downsince : 07/16/2021 03:19:17 To verify the RP link re-establishment count and the time since the RP link is UP for days in the active instance, run the following command: Device# show platform software rif-mgr chassis active R0 rp-connection-details RP Connection Details RP Connection Uptime : 12 days 17 hours 1 minute 39 seconds RP Connection Upsince : 07/03/2021 07:06:20 To verify the RP link re-establishment count and the time since the RP link is Down in the active instance, run the following command: Device# show platform software rif-mgr chassis active R0 rp-connection-details RP Connection Details RP Connection Downtime : 4 seconds RP Connection Downsince : 07/16/2021 03:33:04 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1536 High Availability Verifying Redundancy Port Interface Configuration To verify the RP link re-establishment count and the time since the RP link is UP in the standby instance, run the following command: Device# show platform software rif-mgr chassis standby R0 rp-connection-details RP Connection Details RP Connection Uptime : 12 days 17 hours 2 minutes 1 second RP Connection Upsince : 07/03/2021 07:05:58 To verify the RP link re-establishment count and the time since the RP link is Down in the standby instance, run the following command: Device# show platform software rif-mgr chassis standby R0 rp-connection-details RP Connection Details RP Connection Downtime : 22 seconds RP Connection Downsince : 07/16/2021 03:19:17 To verify the RIF and stack manager internal statistics in the active instance, run the following command: Device# show platform software rif-mgr chassis active R0 rif-stk-internal-stats RIF Stack Manager internal stats Stack-mgr reported RP down : False DAD link status reported to Stack-Mgr : True To verify the RIF and stack manager internal statistics in the standby instance, run the following command: Device# show platform software rif-mgr chassis standby R0 rif-stk-internal-stats RIF Stack Manager internal stats Stack-mgr reported RP down : False DAD link status reported to Stack-Mgr : True To verify the number of packets sent or received for each type in the active instance, run the following command: Device# show platform software rif-mgr chassis active R0 lmp-statistics LMP Statistics Info Type Sent :6 Solicit Info Type Sent :0 Unsolicit Info Type Sent :6 Reload Type Sent :0 Recovery Type Sent :1 Gateway Info Type Sent :0 Enquiry Type Sent :0 Solicit Enquiry Type Sent :0 Unsolicit Enquiry Type Sent :0 Info Type Received :5 Solicit Info Type Received :2 Unsolicit Info Type Received :3 Reload Type Received :0 Recovery Type Received :0 Gateway Info Type Received :4 Enquiry Type Received :0 Solicit Enquiry Type Received :0 Unsolicit Enquiry Type Received : 0 To verify the number of packets sent or received for each type in the standby instance, run the following command: Device# show platform software rif-mgr chassis standby R0 lmp-statistics LMP Statistics Info Type Sent :6 Solicit Info Type Sent :0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1537 Information About Auto-Upgrade High Availability Unsolicit Info Type Sent :6 Reload Type Sent :0 Recovery Type Sent :0 Gateway Info Type Sent :4 Enquiry Type Sent :0 Solicit Enquiry Type Sent :0 Unsolicit Enquiry Type Sent :0 Info Type Received :5 Solicit Info Type Received :3 Unsolicit Info Type Received :2 Reload Type Received :0 Recovery Type Received :1 Gateway Info Type Received :0 Enquiry Type Received :0 Solicit Enquiry Type Received : 0 Unsolicit Enquiry Type Received : 0 Information About Auto-Upgrade The Auto-Upgrade feature enables the standby controller to upgrade with the software image of the active controller so that both controllers form an HA pair. Note · This feature supports the active controller in INSTALL mode. · This feature supports Cisco Catalyst 9800 Series Wireless Controller software versions 17.5.1 and later. · This feature is triggered in the standby controller only when the active image is in committed state. Use Cases The following are the use cases and functionalities supported by the Auto-Upgrade feature: · Handling software version mismatch: During an upgrade, if one of the redundancy port is upgraded to a newer version, and the other one is not upgraded at the same time, the active port tries to copy its packages to the other port using the Auto-Upgrade feature. You can enable Auto-Upgrade in this situation using configuration or by manually running the software auto-upgrade enable privileged EXEC command. The auto-upgrade configuration is enabled by default. Note Auto-upgrade upgrades the mismatched redundancy port only when both the active redundancy port and the mismatched redundancy port are in INSTALL mode. · HA pair: If one of the controller is not upgraded successfully, use Auto-Upgrade to upgrade the controller on the newly deployed HA pair, which can each be a different version. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1538 High Availability Configuration Workflow · SMUs (APSP, APDP, and so on): If the SMUs that are successfully installed on the active controller when the standby controller was offline. In this scenario, when the standby controller comes up online, the Auto-Upgrade copies this SMU to the standby controller and installs it. Configuration Workflow Configuring Auto-Upgrade (CLI), on page 1539 Configuring Auto-Upgrade (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 software auto-upgrade enable Example: Device(config)# software auto-upgrade enable Enables the Auto-Upgrade feature. (This feature is enabled by default.) If you disable this feature using the no form of this command, you need to manually auto upgrade using the install autoupgrade command in privileged EXEC mode. Step 3 end Example: Device(config)# end Returns to privileged EXEC mode. Use Case for Link Layer Discovery Protocol (LLDP) In a high-availability (HA) setup, when two wireless units act as active and standby, the LLDP still runs independently in both. When you execute the LLDP neighbors command, the system name as the neighbor entry in the uplink switch is displayed as hostname-stbdy. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1539 Enabling LLDP (CLI) High Availability Enabling LLDP (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 lldp run Example: Device(config)# lldp run Step 3 end Example: Device(config)# end Purpose Enters global configuration mode. Enables Link Layer Discovery Protocol (LLDP). Returns to privileged EXEC mode. Enabling LLDP Timers (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 lldp holdtime time_in_secs Example: Device(config)# lldp holdtime 100 Step 3 lldp reinit delay_in_secs Example: Device(config)# lldp reinit 3 Step 4 lldp timer time_in_secs Example: Device(config)# lldp timer 7 Step 5 end Example: Device(config)# end Purpose Enters global configuration mode. Enables LLDP timers. The timer decides how long the receiver must keep the packet. Valid range is from 0 to 65535 seconds. Specifies the delay, in seconds for LLDP to initialize. Valid range is from 2 to 5 seconds. Specifies the rate at which the LLDP packets are sent, in seconds. Valid range is from 5 to 65534 seconds. Returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1540 High Availability Enabling LLDP TLV-Select (CLI) Enabling LLDP TLV-Select (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 lldp tlv-select [mac-phy-cfg | Enables type, length, and value (TLV) selection management-address | port-description | for LLDP. port-vlan | system-capabilities | system-description] · mac-phy-cfg: IEEE 802.3 MAC, physical configuration, or status TLV. Example: Device(config)# lldp tlv-select port-vlan · management-address: Management address TLV. · port-description: Port description TLV. · port-vlan: Port VLAN ID TLV. · system-capabilities: System capabilities TLV. · system-description: System description TLV. Step 3 end Example: Device(config)# end Returns to privileged EXEC mode. Verifying LLDP Use the following show commands to view the LLDP details independently in the active and standby controller. To verify the timer and status in the active and standby controller, use the following command: Device# show lldp Global LLDP Information: Status: ACTIVE LLDP advertisements are sent every 30 seconds LLDP hold time advertised is 120 seconds LLDP interface reinitialisation delay is 2 seconds To verify the neighbor details in the active controller, use the following command: Device# show lldp neighbors Capability codes: (R) Router, (B) Bridge, (T) Telephone, (C) DOCSIS Cable Device (W) WLAN Access Point, (P) Repeater, (S) Station, (O) Other Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1541 Verifying LLDP High Availability Device ID 9500-SW Local Intf Tw0/0/0 Hold-time Capability 120 B,R Port ID Twe1/0/14 To verify the neighbor details in the standby controller, use the following command: Device# show lldp neighbors Capability codes: (R) Router, (B) Bridge, (T) Telephone, (C) DOCSIS Cable Device (W) WLAN Access Point, (P) Repeater, (S) Station, (O) Other Device ID Local Intf Hold-time Capability Port ID 9500-SW Tw0/0/0 120 B,R Twe1/0/13 Total entries displayed: 1 To verify the LLDP neighbor (TLV) detail, use the following command: Device# show lldp neighbors detail -----------------------------------------------Local Intf: Te0/0/0 Chassis id: 2cd0.2d62.be80 Port id: Te1/1 Port Description: TenGigabitEthernet1/1 System Name: HSRP-ROUTER-1-15.cisco.com System Description: Cisco IOS Software, IOS-XE Software, Catalyst 4500 L3 Switch Version 03.09.00.E RELEASE SOFTWARE (fc1) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2016 by Cisco Systems, Inc. Compiled Tue 19-Jul Software (cat4500e-UNIVERSAL-M), Time remaining: 99 seconds System Capabilities: B,R Enabled Capabilities: B,R Management Addresses: IP: 8.109.0.1 IPV6: 2001:12:1::2 Auto Negotiation - not supported Physical media capabilities: Other/unknown Media Attachment Unit type - not advertised Vlan ID: 109 Peer Source MAC: 2cd0.2d62.be80 To verify the LLDP details in the uplink switch, use the following command: Device# show lldp neighbors detail -----------------------------------------------Local Intf: Te1/1 Chassis id: d4e8.80b3.0420 Port id: Te0/0/0 Port Description: TenGigabitEthernet0/0/0 System Name: WLC-BGL15.cisco.com System Description: Cisco IOS Software [Bangalore], C9800 Software (C9800_IOSXE-K9), Experimental Version 17.9.20220630:200739 Copyright (c) 1986-2022 by Cisco Systems, Inc. Compiled Thu 30-Jun-22 13:19 Time remaining: 107 seconds System Capabilities: B,R Enabled Capabilities: R Management Addresses: IP: 8.109.0.47 IPV6: FD09:8:109::45 Auto Negotiation - not supported Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1542 High Availability Feature History for Reload Reason History Physical media capabilities - not advertised Media Attachment Unit type - not advertised Vlan ID: 109 To verify LLDP packet errors, use the following command: Device# show lldp errors LLDP errors/overflows: Total memory allocation failures: 0 Total encapsulation failures: 0 Total input queue overflows: 0 Total table overflows: 0 To verify LLDP traffic statistics, use the following command: Device# show lldp traffic LLDP traffic statistics: Total frames out: 18470 Total entries aged: 0 Total frames in: 6156 Total frames received in error: 0 Total frames discarded: 0 Total TLVs discarded: 0 Total TLVs unrecognized: 0 Feature History for Reload Reason History This table provides release and related information about the feature explained in this section. This feature is also available in all the releases subsequent to the one in which they are introduced in, unless noted otherwise. Table 109: Feature History for Reload Reason History Release Feature Cisco IOS XE Dublin Reload Reason 17.11.1 History Feature Information The Reload Reason History feature tracks the reasons for controller reload. This is done for the last 10 reloads. In Cisco IOS-XE Dublin 17.10.x and earlier releases, it was possible to track only the reason for the last reload. Information About Reload Reason History The Reload Reason History feature tracks the reasons for controller reload. This is done for the last 10 reloads.You will be able to view the history using the show version and the Network Configuration Protocol (NETCONF). This history is useful for serviceability and troubleshooting. Verifying Reload Reason History To view the reload history details, use the following command: Device# show reload-history Reload History: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1543 Verifying Reload Reason History High Availability Reload Index: 1 Reload Code: Reload Reload Description: Reload Command Reload Severity: Normal Reboot Reload Time: 01:33:44 UTC Wed Nov 30 2022 Reload Index: 2 Reload Code: Critical Process Fault Reload Description: Critical process stack_mgr fault on rp_0_0 (rc=137), system report at bootflash:core/Yang_Test-system-report_20221130-012929-UTC.tar.gz Reload Severity: Abnormal Reboot Reload Time: 01:31:11 UTC Wed Nov 30 2022 Reload Index: 3 Reload Code: Image Install Reload Description: Image Install Reload Severity: Normal Reboot Reload Time: 01:25:03 UTC Wed Nov 30 2022 Reload Index: 4 Reload Code: Critical Process Fault Reload Description: Critical process rif_mgr fault on rp_0_0 (rc=137), system report at bootflash:core/Yang_Test-system-report_20221130-011127-UTC.tar.gz Reload Severity: Abnormal Reboot Reload Time: 01:13:08 UTC Wed Nov 30 2022 Reload Index: 5 Reload Code: Reload Reload Description: Reload Command Reload Severity: Normal Reboot Reload Time: 01:08:26 UTC Wed Nov 30 2022 Reload Index: 6 Reload Code: Critical Process Fault Reload Description: Critical process wncmgrd fault on rp_0_0 (rc=137), system report at bootflash:core/Yang_Test-system-report_20221130-010338-UTC.tar.gz Reload Severity: Abnormal Reboot Reload Time: 01:05:23 UTC Wed Nov 30 2022 Reload Index: 7 Reload Code: Reload Reload Description: Reload Command Reload Severity: Normal Reboot Reload Time: 01:01:09 UTC Wed Nov 30 2022 Reload Index: 8 Reload Code: Reload Reload Description: Reload Command Reload Severity: Normal Reboot Reload Time: 00:57:27 UTC Wed Nov 30 2022 Reload Index: 9 Reload Code: Reload Reload Description: Reload Command Reload Severity: Normal Reboot Reload Time: 00:22:34 UTC Wed Nov 30 2022 Reload Index: 10 Reload Code: Fast Switchover Reload Description: redundancy force-switchover Reload Severity: Normal Reboot Reload Time: 23:40:01 UTC Tue Nov 29 2022 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1544 High Availability Verifying Reload Reason History To view reason for the last reload, use the following command: Device# show platform software tdl-database content ios device data Device Current time: 04:06:04 Device boot time: 01:33:37 Software version: Cisco IOS Software [Dublin], C9800-CL Software (C9800-CL-K9_IOSXE), Experimental Version 17.11.20221012:120806 [BLD_POLARIS_DEV_S2C_20221010_023625-1-g5ebdd5c35512:/nobackup/saikarth/polaris_relhis 103] Copyright (c) 1986-2022 by Cisco Systems, Inc. Compiled Wed 12-Oct-22 05:08 by saikarth Rommon version: IOS-XE ROMMON Last Reboot reason: Reload Command Reboot reason severity: Normal Reboot Unsaved configuration: * Unknown boolean * Reload History: Reload Category: Reload Reload Description: Reload Command Reload Severity: Normal Reboot Reload Time: 11/30/2022 01:33:44 UTC Reload Category: Critical Process Fault Reload Description: Critical process stack_mgr fault on rp_0_0 (rc=137), system report at bootflash:core/Yang_Test-system-report_20221130-012929-UTC.tar.gz Reload Severity: Abnormal Reboot Reload Time: 11/30/2022 01:31:11 UTC Reload Category: Image Install Reload Description: Image Install Reload Severity: Normal Reboot Reload Time: 11/30/2022 01:25:03 UTC Reload Category: Critical Process Fault Reload Description: Critical process rif_mgr fault on rp_0_0 (rc=137), system report at bootflash:core/Yang_Test-system-report_20221130-011127-UTC.tar.gz Reload Severity: Abnormal Reboot Reload Time: 11/30/2022 01:13:08 UTC Reload Category: Reload Reload Description: Reload Command Reload Severity: Normal Reboot Reload Time: 11/30/2022 01:08:26 UTC Reload Category: Critical Process Fault Reload Description: Critical process wncmgrd fault on rp_0_0 (rc=137), system report at bootflash:core/Yang_Test-system-report_20221130-010338-UTC.tar.gz Reload Severity: Abnormal Reboot Reload Time: 11/30/2022 01:05:23 UTC Reload Category: Reload Reload Description: Reload Command Reload Severity: Normal Reboot Reload Time: 11/30/2022 01:01:09 UTC Reload Category: Reload Reload Description: Reload Command Reload Severity: Normal Reboot Reload Time: 11/30/2022 00:57:27 UTC Reload Category: Reload Reload Description: Reload Command Reload Severity: Normal Reboot Reload Time: 11/30/2022 00:22:34 UTC Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1545 Requesting Reload Reason History using YANG High Availability Reload Category: Fast Switchover Reload Description: redundancy force-switchover Reload Severity: Normal Reboot Reload Time: 11/29/2022 23:40:01 UTC Requesting Reload Reason History using YANG Use YANG with NETCONF and RESTCONF to provide the desired solution for automated and programmable network operations. Use the following RPC to create a NETCONF GET request for reload history data: <nc:rpc xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="urn:uuid:da15955f-5bb7-437c-aeb5-0fc7901a1e9e"> <nc:get> <nc:filter> <device-hardware-data xmlns="http://cisco.com/ns/yang/Cisco-IOS-XE-device-hardware-oper"> <device-hardware> <device-system-data> <reload-history/> </device-system-data> </device-hardware> </device-hardware-data> </nc:filter> </nc:get> </nc:rpc> <rpc-reply message-id="urn:uuid:da15955f-5bb7-437c-aeb5-0fc7901a1e9e" xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" xmlns:nc="urn:ietf:params:xml:ns:netconf:base:1.0"> <data> <device-hardware-data xmlns="http://cisco.com/ns/yang/Cisco-IOS-XE-device-hardware-oper"> <device-hardware> <device-system-data> <reload-history> <rl-history> <reload-category>rc-rld</reload-category> <reload-desc>Reload Command</reload-desc> <reload-time>2022-11-30T01:33:44+00:00</reload-time> <reload-severity>normal</reload-severity> </rl-history> <rl-history> <reload-category>rc-crit-proc-fault</reload-category> <reload-desc>Critical process stack_mgr fault on rp_0_0 (rc=137), system report at bootflash:core/Yang_Test-system-report_20221130-012929-UTC.tar.gz</reload-desc> <reload-time>2022-11-30T01:31:11+00:00</reload-time> <reload-severity>abnormal</reload-severity> </rl-history> <rl-history> <reload-category>rc-img-install</reload-category> <reload-desc>Image Install </reload-desc> <reload-time>2022-11-30T01:25:03+00:00</reload-time> <reload-severity>normal</reload-severity> </rl-history> <rl-history> <reload-category>rc-crit-proc-fault</reload-category> <reload-desc>Critical process rif_mgr fault on rp_0_0 (rc=137), system report at bootflash:core/Yang_Test-system-report_20221130-011127-UTC.tar.gz</reload-desc> Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1546 High Availability Requesting Reload Reason History using YANG <reload-time>2022-11-30T01:13:08+00:00</reload-time> <reload-severity>abnormal</reload-severity> </rl-history> <rl-history> <reload-category>rc-rld</reload-category> <reload-desc>Reload Command</reload-desc> <reload-time>2022-11-30T01:08:26+00:00</reload-time> <reload-severity>normal</reload-severity> </rl-history> <rl-history> <reload-category>rc-crit-proc-fault</reload-category> <reload-desc>Critical process wncmgrd fault on rp_0_0 (rc=137), system report at bootflash:core/Yang_Test-system-report_20221130-010338-UTC.tar.gz</reload-desc> <reload-time>2022-11-30T01:05:23+00:00</reload-time> <reload-severity>abnormal</reload-severity> </rl-history> <rl-history> <reload-category>rc-rld</reload-category> <reload-desc>Reload Command</reload-desc> <reload-time>2022-11-30T01:01:09+00:00</reload-time> <reload-severity>normal</reload-severity> </rl-history> <rl-history> <reload-category>rc-rld</reload-category> <reload-desc>Reload Command</reload-desc> <reload-time>2022-11-30T00:57:27+00:00</reload-time> <reload-severity>normal</reload-severity> </rl-history> <rl-history> <reload-category>rc-rld</reload-category> <reload-desc>Reload Command</reload-desc> <reload-time>2022-11-30T00:22:34+00:00</reload-time> <reload-severity>normal</reload-severity> </rl-history> <rl-history> <reload-category>rc-force-switchover</reload-category> <reload-desc>redundancy force-switchover</reload-desc> <reload-time>2022-11-29T23:40:01+00:00</reload-time> <reload-severity>normal</reload-severity> </rl-history> </reload-history> </device-system-data> </device-hardware> </device-hardware-data> </data> </rpc-reply> For more information about the YANG models, see the following documents: The Cisco IOS XE Programmability Configuration Guide at https://www.cisco.com/c/en/us/support/wireless/ catalyst-9800-series-wireless-controllers/products-installation-and-configuration-guides-list.html The YANG Data Models on Github at https://github.com/YangModels/yang/tree/main/vendor/cisco/xe. Contact the Developer Support Community for NETCONF and YANG features at: https://developer.cisco.com/ Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1547 Requesting Reload Reason History using YANG High Availability Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1548 X P A R T Quality of Service · Quality of Service, on page 1551 · Wireless Auto-QoS, on page 1583 · Native Profiling, on page 1589 · Air Time Fairness, on page 1601 · IPv6 Non-AVC QoS Support, on page 1611 · QoS Basic Service Set Load, on page 1615 1 4 4 C H A P T E R Quality of Service · Wireless QoS Overview, on page 1551 · Wireless QoS Targets, on page 1552 · Wireless QoS Mobility, on page 1553 · Precious Metal Policies for Wireless QoS, on page 1553 · Prerequisites for Wireless QoS, on page 1554 · Restrictions for QoS on Wireless Targets, on page 1554 · Metal Policy Format, on page 1555 · How to apply Bi-Directional Rate Limiting, on page 1562 · How to apply Per Client Bi-Directional Rate Limiting, on page 1569 · How to Configure Wireless QoS, on page 1573 · Configuring Custom QoS Mapping, on page 1578 · Configuring DSCP-to-User Priority Mapping Exception, on page 1579 · Configuring Trust Upstream DSCP Value, on page 1581 Wireless QoS Overview Quality of Service (QoS), provides the ability to prioritize the traffic by giving preferential treatment to specific traffic over the other traffic types. Without QoS, the device offers best-effort service for each packet, regardless of the packet contents or size. The device sends the packets without any assurance of reliability, delay bounds, or throughput. A target is the entity where the policy is applied. Wireless QoS policies for SSID and client are applied in the upstream and (or) downstream direction. The flow of traffic from a wired source to a wireless target is known as downstream traffic. The flow of traffic from a wireless source to a wired target is known as upstream traffic. The following are some of the specific features provided by wireless QoS: · SSID and client policies on wireless QoS targets · Marking and Policing (also known as Rate Limiting ) of wireless traffic · Mobility support for QoS Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1551 Wireless QoS Targets Quality of Service Wireless QoS Targets This section describes the various wireless QoS targets available on a device. SSID Policies You can create QoS policies on SSID in both the ingress and egress directions. If not configured, there is no SSID policy applied. The policy is applicable per AP per SSID. You can configure policing and marking policies on SSID. Client Policies Client policies are applicable in the ingress and egress direction. You can configure policing and marking policies on clients. AAA override is also supported. Supported QoS Features on Wireless Targets This table describes the various features available on wireless targets. Table 110: QoS Features Available on Wireless Targets Target Features SSID Client · Set · Police · Drop · Set · Police · Drop Direction Where Policies Are Applicable Upstream and downstream Upstream and downstream This table describes the various features available on wireless targets. Table 111: QoS Policy Actions Policy Action Types Police Set Wireless Target Support Local Mode Supported Supported Flex Mode Supported Supported Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1552 Quality of Service Wireless QoS Mobility This table describes the various features available on wireless targets. Table 112: QoS Policy Set Actions Set Action Types Supported Local Mode set dscp Supported set qos-group Supported set wlan user-priority (downstream Supported (BSSID only) only) Flex Mode Supported Not Supported Supported (BSSID only) Wireless QoS Mobility Wireless QoS mobility enables you to configure QoS policies so that the network provides the same service anywhere in the network. A wireless client can roam from one location to another and as a result the client can get associated to different access points associated with a different device. Wireless client roaming can be classified into two types: · Intra-device roaming · Inter-device roaming Note In a foreign WLC, client statistics are not displayed. Note The client policies must be available on all of the devices in the mobility group. The same SSID policy must be applied to all devices in the mobility group so that the clients get consistent treatment. Precious Metal Policies for Wireless QoS The precious metal policies are system-defined policies that are available on the controller . They cannot be removed or changed. The following policies are available: · Platinum--Used for VoIP clients. · Gold--Used for video clients. · Silver-- Used for traffic that can be considered best-effort. · Bronze--Used for NRT traffic. These policies are pre-configured. They cannot be modified. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1553 Prerequisites for Wireless QoS Quality of Service For client metal policies, they can be pushed using AAA. Based on the policies applied, the 802.11e (WMM), and DSCP fields in the packets are affected. For more information about metal policies see the Metal Policy Map, on page 1555 section. For more information about DSCP to UP mapping, see the Architecture for Voice, Video and Integrated Data (AVVID), on page 1561 table. Prerequisites for Wireless QoS Before configuring wireless QoS, you must have a thorough understanding of these items: · Wireless concepts and network topologies. · Understanding of QoS implementation. · Modular QoS CLI (MQC). For more information on Modular QoS, see the MQC guide · The types of applications used and the traffic patterns on your network. · Bandwidth requirements and speed of the network. Restrictions for QoS on Wireless Targets General Restrictions A target is an entity where a policy is applied. A policy can be applied to a wireless target, which can be an SSID or client target, in the downstream and/or upstream direction. Downstream indicates that traffic is flowing from the controller to the wireless client. Upstream indicates that traffic is flowing from wireless client to the controller. · Hierarchical (Parent policy and child policy) QoS is not supported. · SSID and client targets can be configured only with marking and policing policies. · One policy per target per direction is supported. · Class maps in a policy map can have different types of filters. However, only one marking action (set dscp) is supported. · Only one set action per class is supported. · Access group matching is not supported. · Access group (ACL) matching is not supported by access points in flex mode for local switching traffic. · SIP Call Admission Control (CAC) is not supported on the central switching mode. · From Cisco IOS XE Amsterdam 17.3.1 onwards, SIP Call Admission Control (CAC) is not supported. · Applying QoS on the WMI interface is not supported, as it may reboot the controller. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1554 Quality of Service Metal Policy Format AP Side Restrictions · In Cisco Embedded Wireless Controller, FlexConnect local switching, and SDA deployments, the QoS policies are enforced on the AP. Due to this AP-side restriction, police actions (e.g., rate limiting) are only enforced at a per flow (5-tuple) level and not per client. Control Plane Rate Limiting and Policing You need not explicitly configure control plane rate limiting or policing on the controller. The controller has embedded mechanisms (like policers) to protect the CPU by policing control plane traffic directed towards it. If you're migrating from AireOS to IOS-XE, this change is taken care of at the code level. Metal Policy Format Metal Policy Map Table 113: Platinum (46) policy-map platinum-up policy-map platinum class cm-dscp-non-std-set-1 class cm-dscp-non-std-set-1 set dscp ef set dscp ef Class cm-dscp-non-std-set-2 Class cm-dscp-non-std-set-2 set dscp ef Class cm-dscp-cs6 set dscp ef Class cm-dscp-cs7 set dscp ef class class-default set dscp ef Class cm-dscp-cs6 set dscp ef Class cm-dscp-cs7 set dscp ef class class-default Table 114: Gold (34) policy-map gold-up policy-map gold class cm-dscp-non-std-set-1 class cm-dscp-non-std-set-1 set dscp 34 set dscp 34 Class cm-dscp-non-std-set-2 Class cm-dscp-non-std-set-2 set dscp 34 set dscp 34 Class cm-dscp-non-std-set-3 Class cm-dscp-non-std-set-3 set dscp 34 set dscp 34 Class cm-dscp-cs5 Class cm-dscp-cs5 set dscp 34 set dscp 34 Class cm-dscp-cs6 Class cm-dscp-cs6 set dscp 34 set dscp 34 Class cm-dscp-cs7 Class cm-dscp-cs7 set dscp 34 set dscp 34 Class cm-dscp-af4 Class cm-dscp-af4 set dscp 34 set dscp 34 Class cm-dscp-voice-admit Class cm-dscp-voice-admit set dscp 34 set dscp 34 Class cm-dscp-ef Class cm-dscp-ef set dscp 34 set dscp 34 class class-default class class-default Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1555 Metal Policy Map Table 115: Silver (22) policy-map silver-up policy-map silver class cm-dscp-non-std-set-1 class cm-dscp-non-std-set-1 set dscp 22 set dscp 22 Class cm-dscp-non-std-set-2 Class cm-dscp-non-std-set-2 set dscp 22 set dscp 22 Class cm-dscp-non-std-set-3 Class cm-dscp-non-std-set-3 set dscp 22 set dscp 22 Class cm-dscp-non-std-set-4 Class cm-dscp-non-std-set-4 set dscp 22 Class cm-dscp-cs3 set dscp 22 Class cm-dscp-cs4 set dscp 22 Class cm-dscp-cs5 set dscp 22 Class cm-dscp-cs6 set dscp 22 Class cm-dscp-cs7 set dscp 22 Class cm-dscp-af3 set dscp 22 Class cm-dscp-af4 set dscp 22 Class cm-dscp-voice-admit set dscp 22 Class cm-dscp-ef set dscp 22 class class-default set dscp 22 Class cm-dscp-cs3 set dscp 22 Class cm-dscp-cs4 set dscp 22 Class cm-dscp-cs5 set dscp 22 Class cm-dscp-cs6 set dscp 22 Class cm-dscp-cs7 set dscp 22 Class cm-dscp-af3 set dscp 22 Class cm-dscp-af4 set dscp 22 Class cm-dscp-voice-admit set dscp 22 Class cm-dscp-ef set dscp 22 class class-default Quality of Service Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1556 Quality of Service Table 116: Bronze (8) policy-map bronze-up policy-map bronze class cm-dscp-non-std-set-1 class cm-dscp-non-std-set-1 set dscp 8 set dscp 8 Class cm-dscp-non-std-set-2 Class cm-dscp-non-std-set-2 set dscp 8 set dscp 8 Class cm-dscp-non-std-set-3 Class cm-dscp-non-std-set-3 set dscp 8 set dscp 8 Class cm-dscp-non-std-set-4 Class cm-dscp-non-std-set-4 set dscp 8 set dscp 8 class cm-dscp-non-std-set-5 class cm-dscp-non-std-set-5 set dscp 8 set dscp 8 Class cm-dscp-cs1-7 Class cm-dscp-cs1-7 set dscp 8 set dscp 8 class cm-dscp-af1 class cm-dscp-af1 set dscp 8 set dscp 8 class cm-dscp-af2 class cm-dscp-af2 set dscp 8 set dscp 8 Class cm-dscp-af3 Class cm-dscp-af3 set dscp 8 set dscp 8 Class cm-dscp-af4 Class cm-dscp-af4 set dscp 8 set dscp 8 Class cm-dscp-voice-admit Class cm-dscp-voice-admit set dscp 8 set dscp 8 Class cm-dscp-ef Class cm-dscp-ef set dscp 8 set dscp 8 Class class-default Class class-default Class Maps class-map match-any cm-dscp-non-std-set-1 match dscp 47 49 50 51 52 53 54 55 Class-map match-any cm-dscp-non-std-set-2 match dscp 57 58 59 60 61 62 63 class-map match-any cm-dscp-non-std-set-3 match dscp 35 37 39 41 42 43 45 class-map match-any cm-dscp-non-std-set-4 match dscp 23 25 27 29 31 33 class-map match-any cm-dscp-non-std-set-5 match dscp 9 11 13 15 17 19 21 Class-map match-any cm-dscp-cs2 match dscp 16 Class-map match-any cm-dscp-cs3 match dscp 24 Class-map match-any cm-dscp-cs4 match dscp 32 Class-map match-any cm-dscp-cs5 match dscp 40 Class-map match-any cm-dscp-cs6 Class Maps Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1557 DSCP to UP Mapping for Downstream Traffic match dscp 48 Class-map match-any cm-dscp-cs7 match dscp 56 Class-map match-any cm-dscp-af1 match dscp 10 12 14 Class-map match-any cm-dscp-af2 match dscp 18 20 22 Class-map match-any cm-dscp-af3 match dscp 26 28 30 Class-map match-any cm-dscp-af4 match dscp 34 36 38 Class-map match-any cm-dscp-voice-admit match dscp 44 Class-map match-any cm-dscp-ef match dscp 46 Class-map match-any cm-dscp-cs1-7 match dscp 8 16 24 32 40 48 56 DSCP to UP Mapping for Downstream Traffic [0]->0 [1]->0 [2]->0 [3]->0 [4]->0 [5]->0 [6]->0 [7]->0 [8]->1 [9]->0 [10]->2 [11]->0 [12]->2 [13]->0 [14]->2 [15]->0 [16]->0 [17]->0 [18]->3 [19]->0 [20]->3 [21]->0 [22]->3 [23]->0 [24]->4 [25]->0 [26]->4 [27]->0 [28]->4 [29]->0 [30]->4 [31]->0 [32]->5 [33]->0 [34]->4 [35]->0 [36]->4 [37]->0 [38]->4 [39]->0 [40]->5 [41]->0 [42]->0 [43]->0 [44]->6 [45]->0 [46]->6 [47]->0 [48]->0 [49]->0 [50]->0 [51]->0 [52]->0 [53]->0 [54]->0 [55]->0 [56]->0 [57]->0 [58]->0 [59]->0 [60]->0 [61]->0 [62]->0 [63]->0 UP to DSCP Mapping for Upstream traffic [0]->0 [1]->8 [2]->10 [3]->18 [4]->26 [5]->34 [6]->46 [7]->0 Quality of Service Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1558 Quality of Service Auto QoS Policy Format Auto QoS Policy Format Policy Name Policy-map Format Class-map Format enterprise-avc policy-map AutoQos-4.0-wlan-ET-SSID-Input-AVC-Policy class AutoQos-4.0-wlan-Voip-Data-Class set dscp ef class AutoQos-4.0-wlan-Voip-Signal-Class set dscp cs3 class AutoQos-4.0-wlan-Multimedia-Conf-Class set dscp af41 class AutoQos-4.0-wlan-Transaction-Class set dscp af21 class AutoQos-4.0-wlan-Bulk-Data-Class set dscp af11 class AutoQos-4.0-wlan-Scavanger-Class set dscp cs1 class class-default set dscp default policy-map AutoQos-4.0-wlan-ET-SSID-Output-Policy class AutoQos-4.0-RT1-Class set dscp ef class AutoQos-4.0-RT2-Class set dscp af31 class class-default Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1559 Auto QoS Policy Format Policy Name Policy-map Format Quality of Service Class-map Format class-map match-any AutoQos-4.0-wlan-Voip-Data-Class match dscp ef class-map match-any AutoQos-4.0-wlan-Voip-Signal-Class match protocol skinny match protocol cisco-jabber-control match protocol sip match protocol sip-tls class-map match-any AutoQos-4.0-wlan-Multimedia-Conf-Class match protocol cisco-phone-video match protocol cisco-jabber-video match protocol ms-lync-video match protocol webex-media class-map match-any AutoQos-4.0-wlan-Transaction-Class match protocol cisco-jabber-im match protocol ms-office-web-apps match protocol salesforce match protocol sap class-map match-any AutoQos-4.0-wlan-Bulk-Data-Class match protocol ftp match protocol ftp-data match protocol ftps-data match protocol cifs class-map match-any AutoQos-4.0-wlan-Scavanger-Class match protocol netflix match protocol youtube match protocol skype match protocol bittorrent class-map match-any AutoQos-4.0-RT1-Class match dscp ef Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1560 Quality of Service Architecture for Voice, Video and Integrated Data (AVVID) Policy Name Policy-map Format Class-map Format match dscp cs6 class-map match-any AutoQos-4.0-RT2-Class match dscp cs4 match dscp cs3 match dscp af41 voice policy-map platinum-up class dscp-for-up-4 set dscp 34 class dscp-for-up-5 set dscp 34 class dscp-for-up-6 set dscp 46 class dscp-for-up-7 set dscp 46 policy-map platinum class cm-dscp-34 set dscp 34 class cm-dscp-46 set dscp 46 guest Policy Map AutoQos-4.0-wlan-GT-SSID-Output-Policy Class class-default set dscp default Policy Map AutoQos-4.0-wlan-GT-SSID-Input-Policy Class class-default set dscp default port (only applies to Local Mode) policy-map AutoQos-4.0-wlan-Port-Output-Policy class AutoQos-4.0-Output-CAPWAP-C-Class priority level 1 class AutoQos-4.0-Output-Voice-Class priority level 2 class class-default class-map match-any AutoQos-4.0-Output-CAPWAP-C-Class match access-group name AutoQos-4.0-Output-Acl-CAPWAP-C ip access-list extended AutoQos-4.0-Output-Acl-CAPWAP-C class-map match-any AutoQos-4.0-Output-Voice-Class permit udp any eq 5246 16666 any match dscp ef Architecture for Voice, Video and Integrated Data (AVVID) IETF DiffServ Service Class DSCP Network Control CS7 IEEE 802.11e User Priority 0 Network Control CS6 0 Telephony EF 6 VOICE-ADMIT 44 6 Access Category AC_BE (based on configuration) AC_BE (based on configuration) AC_VO AC_VO Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1561 How to apply Bi-Directional Rate Limiting Quality of Service IETF DiffServ Service Class DSCP Signaling CS5 Multimedia Conferencing AF41 AF42 AF43 Real-Time Interactive CS4 Multimedia Streaming AF31 AF32 AF33 Broadcast Video CS3 Low-Latency Data AF21 AF22 AF23 OAM CS2 High-Throughput Data AF11 AF12 AF13 Standard DF Low-Priority Data CS1 Remaining Remaining IEEE 802.11e User Priority 5 4 5 4 4 3 0 2 0 1 0 Access Category AC_VI AC_VI AC_VI AC_VI AC_VI AC_BE AC_BE AC_BK AC_BE AC_BK How to apply Bi-Directional Rate Limiting Information about Bi-Directional Rate Limiting Bi-Directional Rate Limiting (BDRL) feature defines rate limits on both upstream and downstream traffic. These rate limits are individually configured. The rate limits can be configured on WLAN directly instead of QoS profiles, which will override QoS profile values. The WLAN rate limiting will always supersede Global QoS setting for controller and clients. BDRL feature defines throughput limits for clients on their wireless networks and allows setting a priority service to a particular set of clients. The following four QoS profiles are available to configure the rate limits: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1562 Quality of Service Prerequisites for Bi-Directional Rate Limiting · Gold · Platinum · Silver · Bronze The QoS profile is applied to all clients on the associated SSID. Therefore all clients connected to the same SSID will have the same rate limits. To configure BDRL, select the QoS profile and configure the various rate limiting parameters. When rate limiting parameters are set to 0, the rate limiting feature is not functional. Each WLAN has a QoS profile associated with it in addition to the configuration in the QoS profile. Note BDRL in a mobility Anchor-Foreign setup must be configured both on Anchor and Foreign controller. As a best practice, it is recommended to perform identical configuration on both the controllers to avoid breakage of any feature. BDRL is is supported on Guest anchor scenarios. The feature is supported on IRCM guest scenarios with AireOS as Guest anchor or Guest Foreign. Cisco Catalyst 9800 Series Wireless Controller uses Policing option to rate limit the traffic. To apply metal policy with BDRL, perform the following tasks: · Configure Metal Policy on SSID · Configure Metal Policy on Client · Configure Bi-Directional Rate Limiting for All Traffic, on page 1565 · Configure Bi-Directional Rate Limiting Based on Traffic Classification, on page 1565 · Apply Bi-Directional Rate Limiting Policy Map to Policy Profile, on page 1567 · Apply Metal Policy with Bi-Directional Rate Limiting, on page 1568 Prerequisites for Bi-Directional Rate Limiting · Client metal policy is applied through AAA-override. · You must specify the metal policy on ISE server. · AAA-override must be enabled on policy profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1563 Configure Metal Policy on SSID Quality of Service Configure Metal Policy on SSID Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy policy-profile-name Example: Configures WLAN policy profile and enters wireless policy configuration mode. Device(config)# wireless profile policy policy-profile1 Step 3 description description Example: Device(config-wireless-policy)# description policy-profile1 Adds a user defined description to the new wireless policy. Step 4 service-policy input input-policy Example: Device(config-wireless-policy)# service-policy input platinum-up Sets platinum policy for input. Step 5 service-policy output output-policy Example: Device(config-wireless-policy)# service-policy output platinum Sets platinum policy for output. Configure Metal Policy on Client Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy policy-profile-name Example: Configures WLAN policy profile and enters wireless policy configuration mode. Device(config)# wireless profile policy policy-profile1 Step 3 description description Example: Adds a user defined description to the new wireless policy. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1564 Quality of Service Configure Bi-Directional Rate Limiting for All Traffic Step 4 Command or Action Device(config-wireless-policy)# description profile with aaa override Purpose aaa-override Example: Device(config-wireless-policy)# aaa-override Enables AAA override on the WLAN. Note After AAA-override is enabled and ISE server starts sending policy, client policy defined in service-policy client will not take effect. Configure Bi-Directional Rate Limiting for All Traffic Use the police action in the policy-map to configure BDRL. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 policy-map policy-map Creates a named object representing a set of Example: policies that are to be applied to a set of traffic classes. Policy-map names can contain Device(config)# policy-map policy-sample alphabetic, hyphen, or underscore characters, 1 are case sensitive, and can be up to 40 characters. Step 3 class class-map-name Example: Associates a class map with the policy map, and enters policy-map class configuration mode. Device(config-pmap)# class class-default Step 4 police rate Example: Device(config-pmap-c)# police 500000 Configures traffic policing (average rate, in bits per second). Valid values are 8000 to 200000000. Configure Bi-Directional Rate Limiting Based on Traffic Classification Procedure Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1565 Configure Bi-Directional Rate Limiting Based on Traffic Classification Quality of Service Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action Device# configure terminal Purpose policy-map policy-map Example: Device(config)# policy-map policy-sample2 Creates a named object representing a set of policies that are to be applied to a set of traffic classes. Policy-map names can contain alphabetic, hyphen, or underscore characters, are case sensitive, and can be up to 40 characters. class class-map-name Example: Device(config-pmap)# class class-sample-youtube Associates a class map with the policy map, and enters policy-map class configuration mode. police rate Example: Device(config-pmap-c)# police 1000000 Configures traffic policing (average rate, in bits per second). Valid values are 8000 to 200000000. conform-action drop Example: Device(config-pmap-c-police)# conform-action drop Specifies the drop action to take on packets that conform to the rate limit. exceed-action drop Example: Device(config-pmap-c-police)# exceed-action drop Specifies the drop action to take on packets that exceeds the rate limit. exit Example: Device(config-pmap-c-police)# exit Exits the policy-map class configuration mode. set dscp default Sets the DSCP value to default. Example: Device(config-pmap-c)# set dscp default police rate Example: Device(config-pmap-c)# police 500000 Configures traffic policing (average rate, in bits per second). Valid values are 8000 to 200000000. exit Example: Device(config-pmap-c)# exit Exits the policy-map class configuration mode. exit Example: Device(config-pmap)# exit Exits the policy-map configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1566 Quality of Service Apply Bi-Directional Rate Limiting Policy Map to Policy Profile Step 12 Step 13 Command or Action class-map match-any class-map-name Example: Device(config)# class-map match-any class-sample-youtube match protocol protocol Example: Device(config-cmap)# match protocol youtube Purpose Selects a class map. Configures the match criteria for a class map on the basis of the specified protocol. Apply Bi-Directional Rate Limiting Policy Map to Policy Profile Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy policy-profile-name Example: Configures WLAN policy profile and enters wireless policy configuration mode. Device(config)# wireless profile policy policy-profile3 Step 3 description description Example: Device(config-wireless-policy)# description policy-profile3 Adds a user defined description to the new wireless policy. Step 4 service-policy client input input-policy Sets the input client service policy as platinum. Example: Device(config-wireless-policy)# service-policy client input platinum-up Step 5 service-policy client output output-policy Example: Device(config-wireless-policy)# service-policy client output platinum Sets the output client service policy as platinum. Step 6 service-policy input input-policy Example: Device(config-wireless-policy)# service-policy input platinum-up Sets the input service policy as platinum. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1567 Apply Metal Policy with Bi-Directional Rate Limiting Quality of Service Step 7 Command or Action service-policy output output-policy Example: Device(config-wireless-policy)# service-policy output platinum Purpose Sets the output service policy as platinum. Apply Metal Policy with Bi-Directional Rate Limiting Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. wireless profile policy policy-profile-name Configures WLAN policy profile and enters Example: wireless policy configuration mode. Device(config)# wireless profile policy policy-profile3 description description Example: Device(config-wireless-policy)# description policy-profile3 Adds a user defined description to the new wireless policy. service-policy client input input-policy Sets the input client service policy as platinum. Example: Device(config-wireless-policy)# service-policy client input platinum-up service-policy client output output-policy Example: Sets the output client service policy as platinum. Device(config-wireless-policy)# service-policy client output platinum service-policy input input-policy Example: Device(config-wireless-policy)# service-policy input platinum-up Sets the input service policy as platinum. service-policy output output-policy Example: Device(config-wireless-policy)# service-policy output platinum Sets the output service policy as platinum. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1568 Quality of Service How to apply Per Client Bi-Directional Rate Limiting Step 8 Step 9 Step 10 Step 11 Command or Action exit Example: Device(config-wireless-policy)# exit Purpose Exits the policy configuration mode. policy-map policy-map Creates a named object representing a set of Example: policies that are to be applied to a set of traffic classes. Policy map names can contain Device(config)# policy-map policy-sample alphabetic, hyphen, or underscore characters, 1 are case sensitive, and can be up to 40 characters. class class-map-name Associates a class map with the policy map, Example: and enters configuration mode for the specified system class. Device(config-pmap)# class class-default police rate Example: Device(config-pmap-c)# police 500000 Configures traffic policing (average rate, in bits per second). Valid values are 8000 to 200000000. How to apply Per Client Bi-Directional Rate Limiting Information About Per Client Bi-Directional Rate Limiting The Per Client Bi-Directional Rate Limiting feature adds bi-directional rate limiting for each wireless clients on 802.11ac Wave 2 APs in a Flex local switching configuration. Earlier, the Wave 2 APs supported only per-flow rate limiting for a wireless client. When wireless client starts multiple streams of traffic, the client-based rate limiting does not work as expected. This limitation is addressed by this feature. For instance, if the controller is configured with QoS policy and you expect each client to have a rate limiting cap of 1000 kbps. Due to per-flow rate limiting on the AP, if the wireless client starts a Youtube stream and FTP stream, each of them will be rate limited at 1000 Kbps, therefore the client will be 2000 Kbps rates. This is not desirable. Use Cases The following are the use cases supported by the Per Client Bi-Directional Rate Limiting feature: Use Case -1 Configuring only default class map If policy map is configured only with default class map and mapped only to QoS client policy, AP does a per client rate limit to the client connected to AP. Use Case-2 Changing from per client rate limit to per flow rate limit Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1569 Prerequisites for Per Client Bi-Directional Rate Limiting Quality of Service If policy map is configured with another different class map along with a default class map and mapped to QoS client policy, AP performs per flow rate limit to client. As policy map has different class map along with the default class map. The per client rate limit values are cleared, if the AP has previously configured per client rate limit. If the policy map has more than one class map, then additional class map is configured along with the default class map. So, the rate limit is applied from per client to per flow. The per client rate limit value is deleted from the rate info token bucket. Use Case-3 Changing from per flow rate limit to per client limit If different class map is removed from policy map and policy map has only one default class map, AP performs a per client rate limit to client. The following covers the high-level steps for Per Client Bi-Directional Rate Limiting feature: 1. Configure a policy map to WLAN through policy profile. 2. Map the QoS related policy map to WLAN. 3. Configure policy map with the default class map. 4. Configure different police rate value for class Default map. Note If policy map has class Default with valid police rate value, AP applies that rate limit to the overall client data traffic flow. 5. Apply the policy map with class Default to QoS client policy in WLAN policy profile. Prerequisites for Per Client Bi-Directional Rate Limiting · This feature is exclusive to QoS client policy, that is, the policy profile must have only QoS Policy or policy target as client. · If policy map has class default with valid police rate value, AP applies that rate limit value to the overall client data traffic flow. Restrictions on Per Client Bi-Directional Rate Limiting · If policy map has class map other than the class Default map, the per client rate limit does not work in AP. Configuring Per Client Bi-Directional Rate Limiting (GUI) Procedure Step 1 Choose Configuration > Tags & Profiles > Policy. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1570 Quality of Service Verifying Per Client Bi-Directional Rate Limiting Step 2 Step 3 Step 4 Step 5 Click the Policy Profile Name. The Edit Policy Profile window is displayed. Note The Edit Policy Profile window is displayed and configured in default class map only. Choose the QOS And AVC tab. In the QoS Client Policy settings, choose the policies from the Egress and Ingress drop-down lists. Note You need to apply the default policy map to the QoS Client Policy. Click Update & Apply to Device. Verifying Per Client Bi-Directional Rate Limiting To verify whether per client is applied in AP, use the following command: Device# show rate-limit client Config: mac vap rt_rate_out rt_rate_in rt_burst_out rt_burst_in nrt_rate_out nrt_rate_in nrt_burst_out nrt_burst_in A0:D3:7A:12:6C:5E 0 0 0 0 0 0 0 0 0 Statistics: name up down Unshaped 00 Client RT pass 697610 8200 Client NRT pass 00 Client RT drops 00 Client NRT drops 0 16 9 180 0 Per client rate limit: mac vap rate_out rate_in policy A0:D3:7A:12:6C:5E 0 88 23 per_client_rate_2 Configuring BDRL Using AAA Override Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-name Example: Configures the WLAN policy profile and enters wireless policy configuration mode. Device (config)# wireless profile policy default-policy-profile Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1571 Verifying Bi-Directional Rate-Limit Quality of Service Step 3 Command or Action aaa-override Example: Device(config-wireless-policy)# aaa Purpose Configures AAA override to apply policies coming from the AAA server or ISE the Cisco Identify Services Engine (ISE) server. The following attributes are available in the RADIUS server: · Airespace-Data-Bandwidth-Average-Contract: 8001 · Airespace-Real-Time-Bandwidth-Average-Contract: 8002 · Airespace-Data-Bandwidth-Burst-Contract: 8003 · Airespace-Real-Time-Bandwidth-Burst-Contract: 8004 · Airespace-Data-Bandwidth-Average-Contract-Upstream: 8005 · Airespace-Real-Time-Bandwidth-Average-Contract-Upstream: 8006 · Airespace-Data-Bandwidth-Burst-Contract-Upstream: 8007 · Airespace-Real-Time-Bandwidth-Burst-Contract-Upstream: 8008 Note 8001, 8002, 8003, 8004, 8005, 8006, 8007, and 8008 are the desired rate-limit values configured as an example. Verifying Bi-Directional Rate-Limit To verify the bi-directional rate limit, use the following command: Device# show wireless client mac-address E8-8E-00-00-00-71 detailClient MAC Address : e88e.0000.0071 Client MAC Type : Universally Administered Address Client IPv4 Address : 100.0.7.94 Client Username : e88e00000071 AP MAC Address : 0a0b.0c00.0200 AP Name : AP6B8B4567-0002 AP slot :0 Client State : Associated Policy Profile : dnas_qos_profile_policy Flex Profile : N/A Wireless LAN Id : 10 WLAN Profile Name : QoS_wlan Wireless LAN Network Name (SSID): QoS_wlan BSSID : 0a0b.0c00.0200 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1572 Quality of Service How to Configure Wireless QoS Connected For : 28 seconds Protocol : 802.11n - 2.4 GHz Channel :1 Client IIF-ID : 0xa0000034 Association Id : 10 Authentication Algorithm : Open System Idle state timeout : N/A Session Timeout : 1800 sec (Remaining time: 1777 sec) Session Warning Time : Timer not running Input Policy Name : None Input Policy State : None Input Policy Source : None Output Policy Name : None Output Policy State : None Output Policy Source : None WMM Support : Enabled U-APSD Support : Disabled Fastlane Support : Disabled Client Active State : In-Active Power Save : OFF Supported Rates : 1.0,2.0,5.5,6.0,9.0,11.0,12.0,18.0,24.0,36.0,48.0,54.0 AAA QoS Rate Limit Parameters: QoS Average Data Rate Upstream : 8005 (kbps) QoS Realtime Average Data Rate Upstream : 8006 (kbps) QoS Burst Data Rate Upstream : 8007 (kbps) QoS Realtime Burst Data Rate Upstream : 8008 (kbps) QoS Average Data Rate Downstream : 8001 (kbps) QoS Realtime Average Data Rate Downstream : 8002 (kbps) QoS Burst Data Rate Downstream : 80300 (kbps) QoS Realtime Burst Data Rate Downstream : 8004 (kbps) To verify the rate-limit details from the AP terminal, use the following command Device# show rate-limit client Config: mac vap rt_rate_out rt_rate_in rt_burst_out rt_burst_in nrt_rate_out nrt_rate_in nrt_burst_out nrt_burst_in 00:1C:F1:09:85:E7 0 8001 8002 8003 8004 8005 8006 8007 8008 Statistics: name up down Unshaped 0 0 Client RT pass 0 0 Client NRT pass 0 0 Client RT drops 0 0 Client NRT drops 0 0 Per client rate limit: mac vap rate_out rate_in policy How to Configure Wireless QoS Configuring a Policy Map with Class Map (GUI) Procedure Step 1 Step 2 Choose Configuration > Services > QoS. Click Add to view the Add QoS window. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1573 Configuring a Class Map (CLI) Quality of Service Step 3 Step 4 Step 5 Step 6 Step 7 In the text box next to the Policy Name, enter the name of the new policy map that is being added. Click Add Class-Maps. Configure AVC based policies or User Defined policies. To enable AVC based policies, and configure the following: a) Choose either Match Any or Match All. b) Choose the required Mark Type. If you choose DSCP or User Priority, you must specify the appropriate Mark Value. c) Check the Drop check box to drop traffic from specific sources. Note When Drop is enabled, the Mark Type and Police(kbps) options are disabled. d) Based on the chosen Match Type, select the required protocols from the Available Protocol(s) list and move them to the Selected Protocol(s) list. These selected protocols are the ones from which traffic is dropped. e) Click Save. Note To add more Class Maps, repeat steps 4 and 5. To enable User-Defined QoS policy, and the configure the following: a) Choose either Match Any or Match All. b) Choose either ACL or DSCP as the Match Type from the drop-down list, and then specify the appropriate Match Value. c) Choose the required Mark Type to associate with the mark label. If you choose DSCP, you must specify an appropriate Mark Value. d) Check the Drop check box to drop traffic from specific sources. Note When Drop is enabled, the Mark Type and Police(kbps) options are disabled. e) Click Save. Note To define actions for all the remaining traffic, in the Class Default, choose Mark and/or Police(kbps) accordingly. Click Save & Apply to Device. Configuring a Class Map (CLI) Follow the procedure given below to configure class maps for voice and video traffic: Procedure Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Device# configure terminal Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1574 Quality of Service Configuring Policy Profile to Apply QoS Policy (GUI) Step 2 Step 3 Step 4 Step 5 Command or Action class-map class-map-name Example: Device(config)# class-map test match dscp dscp-value Example: Device(config-cmap)# match dscp 46 Purpose Creates a class map. Matches the DSCP value in the IPv4 and IPv6 packets. Note By default for the class map the value is match-all. end Example: Device(config-cmap)# end Exits the class map configuration and returns to the privileged EXEC mode. show class-map class-map-name Example: Device# show class-map class_map_name Verifies the class map details. Configuring Policy Profile to Apply QoS Policy (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Tags & Profiles > Policy. On the Policy Profile page, click the name of the policy profile. In the Edit Policy Profile window, click the QoS and AVC tab. Under QoS SSID Policy, choose the appropriate Ingress and Egress policies for WLANs. Note The ingress policies can be differentiated from the egress policies by the suffix -up. For example, the Platinum ingress policy is named platinum-up. Under QoS Client Policy, choose the appropriate Ingress and Egress policies for clients. Click Update & Apply to Device. Note Only custom policies are displayed under QoS Client Policy. AutoQoS policies are auto generated and not displayed for user selection. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1575 Configuring Policy Profile to Apply QoS Policy (CLI) Quality of Service Configuring Policy Profile to Apply QoS Policy (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 Step 3 Step 4 Step 5 wireless profile policy profile-policy Example: Configures WLAN policy profile and enters the wireless policy configuration mode. Device(config)# wireless profile policy qostest service-policy client {input | output} policy-name Example: Device(config-wireless-policy)# service-policy client input policy-map-client Applies the policy. The following options are available. · input--Assigns the client policy for ingress direction on the policy profile. · output--Assigns the client policy for egress direction on the policy profile. service-policy {input | output} policy-name Example: Device(config-wireless-policy)# service-policy input policy-map-ssid Applies the policy to the BSSID. The following options are available. · input--Assigns the policy-map to all clients in WLAN. · output--Assigns the policy-map to all clients in WLAN. no shutdown Example: Device(config-wireless-policy)# no shutdown Enables the wireless policy profile. Applying Policy Profile to Policy Tag (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Tags & Profiles > Tags. On the Manage Tags page in the Policy tab, click Add. In the Add Policy Tag window that is displayed, enter a name and description for the policy tag. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1576 Quality of Service Applying Policy Profile to Policy Tag (CLI) Step 4 Step 5 Map the required WLAN IDs and WLAN profiles with appropriate policy profiles. Click Update & Apply to Device. Applying Policy Profile to Policy Tag (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 Step 3 Step 4 Step 5 wireless tag policy policy-tag-name Example: Configures policy tag and enters the policy tag configuration mode. Device(config-policy-tag)# wireless tag policy qostag wlan wlan-name policy profile-policy-name Example: Device(config-policy-tag)# wlan test policy qostest Maps a policy profile to a WLAN profile. end Example: Device(config-policy-tag)# end Saves the configuration and exits the configuration mode and returns to privileged EXEC mode. show wireless tag policy summary Displays the configured policy tags. Example: Note Device# show wireless tag policy summary To view the detailed information of a policy tag, use the show wireless tag policy detailed policy-tag-name command. Attaching Policy Tag to an AP Procedure Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1577 Configuring Custom QoS Mapping Quality of Service Command or Action Device# configure terminal Purpose Step 2 Step 3 Step 4 Step 5 ap mac-address Example: Device(config)# ap F866.F267.7DFB Configures Cisco APs and enters the ap profile configuration mode. policy-tag policy-tag-name Maps a Policy tag to the AP. Example: Device(config-ap-tag)# policy-tag qostag end Example: Device(config-ap-tag)# end Saves the configuration and exits the configuration mode and returns to privileged EXEC mode. show ap tag summary Example: Device# show ap tag summary Displays the ap details and tags associated to it. Configuring Custom QoS Mapping For interworking with IP networks, a map is devised between the 802.11e user priorities and the IP differentiated services code point (DSCP). Enable Hotspot 2.0 on the WLAN to support mapping exception. Note Custom QoS mapping only applies to Hotspot 2.0. Mapping is specified as DSCP ranges to individual user priority values, and as a set of exceptions with one-to-one mapping between DSCP values and UP values. If a QoS map is enabled and user-configurable mappings are not added, the default values are used. Note Egress = Downstream = Output and Ingress = Upstream = Input The following table shows a QoS map, where an AP provides a wireless client with the required mapping from IP DSCP to 802.11e user priority. Table 117: Default DSCP-Range-to-User Priority Mapping IP DSCP Range 0-7 8-15 802.11e User Priority 0 1 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1578 Quality of Service Configuring DSCP-to-User Priority Mapping Exception IP DSCP Range 16-23 24-31 32-39 40-47 48-55 56-63 802.11e User Priority 2 3 4 5 6 7 Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap profile profile-name Example: Configures an AP profile and enters AP profile configuration mode. Device(config)# ap profile hs2-profile Step 3 qos-map dscp-to-up-range user-priority up-to-dscp dscp-start dscp-end Example: Device(config-ap-profile)# qos-map dscp-to-up-range 6 52 23 62 Configures DSCP-to-user priority mapping. You can configure up to eight configuration entries; one for each user-priority value. If you do not configure a custom value, a nonconfigured value (0xFF) is sent to the AP. Use the no form of this command to disable the configuration. To delete all the custom mappings, use the no dscp-to-up-range command. Configuring DSCP-to-User Priority Mapping Exception When you configure a QoS mapping or exception, a custom QoS map is created and sent to the corresponding AP. If there are no DSCP-to-user priority mapping or exception entries, an empty QoS map is used. The following table shows the set of exceptions with one-to-one mapping between DSCP values and user priority values. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1579 Configuring DSCP-to-User Priority Mapping Exception Quality of Service Table 118: Default DSCP-Range-to-User Priority Mapping Exceptions IP DSCP 0 2 4 6 10 12 14 18 20 22 26 34 46 48 56 802.11e User Priority 0 1 1 1 2 2 2 3 3 3 4 5 6 7 7 Note Voice admission control should be disabled for user priorites 6 and 7, from the controller GUI. To disable Admission Control (ACM), choose Configuration > Radio Configurations > Media Parameters. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap profile profile-name Example: Configures an AP profile and enters AP profile configuration mode. Device(config)# ap profile hs2-profile Step 3 qos-map dscp-to-up-exception dscp-num user-priority Configures DSCP-to-user priority exception. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1580 Quality of Service Configuring Trust Upstream DSCP Value Command or Action Example: Device(config-ap-profile)# qos-map dscp-to-up-exception 42 6 Purpose Configuring Trust Upstream DSCP Value The controller marks the 802.11 user priority value in Traffic Identifier (TID) field based on the DSCP value in IP header. Note The AP forwards the DSCP value to Air, if 802.11 user priority value is set. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap profile profile-name Example: Configures an AP profile and enters AP profile configuration mode. Device(config)# ap profile hs2-profile Step 3 qos-map trust-dscp-upstream Example: Device(config-ap-profile)# qos-map trust-dscp-upstream Configures the AP to trust upstream DSCP instead of user priority. Use the no form of the command to disable the configuration. Note When the trust-dscp-upstream command is enabled, the value of DSCP is 18. Silver is the default if nothing is configured. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1581 Configuring Trust Upstream DSCP Value Quality of Service Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1582 1 4 5 C H A P T E R Wireless Auto-QoS · · Information About Auto QoS, on page 1583 · How to Configure Wireless AutoQoS, on page 1584 Information About Auto QoS Wireless Auto QoS automates deployment of wireless QoS features. It has a set of predefined profiles which can be further modified by the customer to prioritize different traffic flows. Auto-QoS matches traffic and assigns each matched packet to qos-groups. This allows the output policy map to put specific qos-groups into specific queues, including into the priority queue. AutoQoS Policy Configuration Table 119: AutoQoS Policy Configuration Mode Voice Guest Fastlane Client Ingress N/A N/A N/A Client Egress N/A N/A N/A Enterprise-avc N/A N/A BSSID Ingress P3 P5 N/A BSSID Egress P4 P6 N/A P1 P2 Port Ingress Port Egress Radio N/A P7 N/A P7 N/A P7 N/A P7 ACM on edca-parameters fastlane P1 AutoQos-4.0-wlan-ET-SSID-Input-AVC-Policy P2 AutoQos-4.0-wlan-ET-SSID-Output-Policy P3 platinum-up P4 platinum P5 AutoQos-4.0-wlan-GT-SSID-Input-Policy Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1583 How to Configure Wireless AutoQoS Quality of Service P6 AutoQos-4.0-wlan-GT-SSID-Output-Policy P7 AutoQos-4.0-wlan-Port-Output-Policy How to Configure Wireless AutoQoS Configuring Wireless AutoQoS on Profile Policy You can enable AutoQoS on a profile policy. Procedure Step 1 Command or Action enable Example: Device# enable Purpose Enables privileged EXEC mode. Enter your password if prompted. Step 2 wireless autoqos policy-profile policy-name Configures AutoQoS wireless policy. mode { enterprise-avc | fastlane | guest | voice} · enterprise-avc--Enables AutoQos Wireless Enterprise AVC Policy. Example: Device# wireless autoqos policy-profile test-profile mode voice · fastlane--Enable AutoQos Wireless Fastlane Policy. · guest--Enable AutoQos Wireless Guest Policy. · voice--Enable AutoQos Wireless Voice Policy. Note AutoQoS MIB attribute does not support full functionality with service policy. Service policy must be configured manually. Currently, there is only support for AutoQoS mode. What to do next Note After enabling AutoQoS, we recommend that you wait for a few seconds for the policy to install and then try and modify the AutoQoS policy maps if required; or retry if the modification is rejected. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1584 Quality of Service Disabling Wireless AutoQoS Disabling Wireless AutoQoS To globally disable Wireless AutoQoS: Procedure Step 1 Command or Action enable Example: Device# enable Step 2 shutdown Example: Device# shutdown Step 3 wireless autoqos disable Example: Device# wireless autoqos disable Step 4 [no] shutdown Example: Device# no shutdown Rollback AutoQoS Configuration (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Services > QoS. Click Disable AutoQoS. Click Yes to confirm. Purpose Enables privileged EXEC mode. Enter your password if prompted. Shuts down the policy profile. Globally disables wireless AutoQoS. Enables the wireless policy profile. Note Disabling Auto QoS does not reset global radio configurations like CAC and EDCA parameters. Rollback AutoQoS Configuration Before you begin Note AutoQoS MIB attribute does not support the full functionality with service policy. Currently, there is only support for AutoQoS mode. Service policy must be configured manually. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1585 Clearing Wireless AutoQoS Policy Profile (GUI) Quality of Service Procedure Step 1 Command or Action enable Example: Deviceenable Purpose Enables privileged EXEC mode. Enter your password if prompted. Step 2 clear platform software autoqos config template { enterprise_avc | guest} Example: Resets AutoQoS configuration. · enterprise-avc--Resets AutoQoS Enterprise AVC Policy Template. Device# clear platform software autoqos config template guest · guest--Resets AutoQoS Guest Policy Template. Clearing Wireless AutoQoS Policy Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > Policy. Click on the Policy Profile Name. Go to QOS and AVC tab. From the Auto Qos drop-down list, choose None. Click Update & Apply to Device. Clearing Wireless AutoQoS Policy Profile Procedure Step 1 Command or Action enable Example: Device# enable Purpose Enables privileged EXEC mode. Enter your password if prompted. Step 2 shutdown Example: Device# shutdown Shuts down the policy profile. Step 3 wireless autoqos policy-profile policy-name Clears the configured AutoQoS wireless policy. mode clear Example: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1586 Quality of Service Viewing AutoQoS on policy profile Step 4 Command or Action Purpose Device# wireless autoqos policy-profile test-profile mode clear [no] shutdown Example: no shutdown Enables the wireless policy profile. Viewing AutoQoS on policy profile Before you begin Autoqos is supported on the local mode and flex mode. Autoqos configures a set of policies and radio configurations depending on the template. It is possible to override the service-policy that is configured by autoqos. The latest configuration takes effect, with AAA override policy being of highest priority. Procedure Step 1 Command or Action enable Example: Deviceenable Step 2 show wireless profile policy detailed policy-profile-name Example: Device# show wireless profile policy detailed testqos Purpose Enables privileged EXEC mode. Enter your password if prompted. Shows policy-profile detailed parameters. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1587 Viewing AutoQoS on policy profile Quality of Service Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1588 1 4 6 C H A P T E R Native Profiling · Information About Native Profiling, on page 1589 · Creating a Class Map (GUI), on page 1590 · Creating a Class Map (CLI), on page 1591 · Creating a Service Template (GUI), on page 1593 · Creating a Service Template (CLI), on page 1594 · Creating a Parameter Map, on page 1595 · Creating a Policy Map (GUI), on page 1595 · Creating a Policy Map (CLI), on page 1596 · Configuring Native Profiling in Local Mode, on page 1598 · Verifying Native Profile Configuration, on page 1598 Information About Native Profiling You can profile devices based on HTTP and DHCP to identify the end devices on the network. You can configure device-based policies and enforce these policies per user or per device policy on the network. Policies allow profiling of mobile devices and basic onboarding of the profiled devices to a specific VLAN. They also assign ACL and QoS or configure session timeouts. The policies are defined based on the following attributes: · User group or user role · Device type such as Windows clients, smartphones, tablets, and so on · Service Set Identifier (SSID) · Location, based on the access point group that the end point is connected to · Time of the day · Extensible Authentication Protocol (EAP) type, to check what EAP method that the client is getting connected to When a wireless client joins an access point, certain QoS policies get enforced on the access point. One such feature is the native profiling for both upstream and downstream traffic at AP. The native profiling feature when clubbed with AAA override supports specific set of policies based on the time of day and day of week. The AAA override then applies these policies coming from a RADIUS server to the access point. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1589 Creating a Class Map (GUI) Quality of Service Let's consider a use case of time of the day in conjunction with user role. Usually, the user role is used as an extra matching criteria along with the time of day. You can club the time of day usage with any matching criteria to get the desired result. The matching will be performed when the client joins the controller . You can configure policies as two separate components: · Defining policy attributes as service templates that are specific to clients joining the network and applying policy match criteria · Applying match criteria to the policy. Note Before proceeding with the native profile configuration, ensure that HTTP Profiling and DHCP Profiling are enabled. Note Native profiling is not supported with FlexConnect Local Authentication and Local Switching. Hence, do not configure no central switching, no central authentication, and subscriber-policy-name name commands together. ISSU will fail for this type of configuration. Ensure that you remove the configuration before attempting ISSU. To configure Native Profiling, use one of the following procedures: · Create a service template · Create a class map Note You can apply a service template using either a class map or parameter map. · Create a parameter-map and associate the service template to parameter-map · Create a policy map 1. If class-map has to be used: Associate the class-map to the policy-map and associate the service-template to the class-map. 2. If parameter-map has to be used: Associate the parameter-map to the policy-map · Associate the policy-map to the policy profile. Creating a Class Map (GUI) Procedure Step 1 Step 2 Click Configuration > Services > QoS. In the Qos Policy area, click Add to create a new QoS Policy or click the one you want to edit. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1590 Quality of Service Creating a Class Map (CLI) Step 3 Step 4 Step 5 Add Add Class Map and enter the details. Click Save. Click Update and Apply to Device. Creating a Class Map (CLI) Note Configuration of class maps via CLI offer more options and can be more granular than GUI. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. class-map type control subscriber match-any class-map-name Specifies the class map type and name. Example: Device(config)# class-map type control subscriber match-any cls_user match username username Specifies the class map attribute filter criteria. Example: Device(config-filter-control-classmap)# match username ciscoise class-map type control subscriber match-any class-map-name Specifies the class map type and name. Example: Device(config)# class-map type control subscriber match-any cls_userrole match user-role user-role Specifies the class map attribute filter criteria. Example: Device(config-filter-control-classmap)# match user-role engineer class-map type control subscriber match-any class-map-name Specifies the class map type and name. Example: Device(config)# class-map type control subscriber match-any cls_oui Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1591 Creating a Class Map (CLI) Quality of Service Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Command or Action Purpose match oui oui-address Specifies the class map attribute filter criteria. Example: Device(config-filter-control-classmap)# match oui 48.f8.b3 class-map type control subscriber match-any class-map-name Specifies the class map type and name. Example: Device(config)# class-map type control subscriber match-any cls_mac match mac-address mac-address Specifies the class map attribute filter criteria. Example: Device(config-filter-control-classmap)# match mac-address 0040.96b9.4a0d class-map type control subscriber match-any class-map-name Specifies the class map type and name. Example: Device(config)# class-map type control subscriber match-any cls_devtype match device-type device-type Specifies the class map attribute filter criteria. Example: Device(config-filter-control-classmap)# match device-type windows class-map type control subscriber match-all Specifies the class map type and name. class-map-name Example: Device(config)# class-map type control subscriber match-all match_tod match join-time-of-day start-time end-time Specifies a match to the time of day. Example: Here, join time is considered for matching. For Device(config-filter-control-classmap)# example, if the match filter is set from 11:00 match join-time-of-day 10:30 12:30 am to 2:00 pm, a device joining at 10:59 am is not considered, even if it acquires credentials after 11:00 am. Here, start-time and end-time specifies the 24-hour format. Use the show class-map type control subscriber name name command to verify the configuration. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1592 Quality of Service Creating a Service Template (GUI) Step 14 Step 15 Step 16 Step 17 Step 18 Command or Action Purpose Note You should also disable AAA override for this command to work. match day day-of-week Matches day of the week. Example: Use the show class-map type control Device(config-filter-control-classmap)# subscriber name name command to verify match day Monday the configuration. class-map type control subscriber match-all Specifies the class map type and filter as EAP. class-map-name Example: Device(config)# class-map type control subscriber match-all match_eap match eap-type eap-type Specifies the policy match with EAP type. Example: Use the show class-map type control Device(config-filter-control-classmap)# subscriber name name command to verify match eap-type peap the configuration. class-map type control subscriber match-all Specifies the class map type and filter as class-map-name device. Example: Device(config)# class-map type control subscriber match-all match_device match device-type device-name Matches name using the device type. Type a Example: question mark (?) after the device type and select the device from the list. Device(config-filter-control-classmap)# match device-type android Note You should enable the device classifier for the device list to be populated. Creating a Service Template (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Security > Local Policy. On the Local Policy page, Service Template tab, click ADD. In the Create Service Template window, enter the following parameters: · Service Template Name: Enter a name for the template. · VLAN ID: Enter the VLAN ID for the template. Valid range is between 1 and 4094. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1593 Creating a Service Template (CLI) Quality of Service Step 4 · Session Timeout (secs): Sets the timeout duration for the template. Valid range is between 1 and 65535. · Access Control List: Choose the Access Control List from the drop-down list. · Ingress QOS: Choose the input QoS policy for the client from the drop-down list · Egress QOS: Choose the output QoS policy for the client from the drop-down list. Click Save & Apply to Device. Creating a Service Template (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 service-template service-template-name Example: Device(config)# service-template svc1 Enters service template configuration mode. Step 3 vnid vnid Example: Device(config-service-template)# vnid test Specifies the VXLAN network identifier (VNID). Use the show service-template service-template-name command to verify the configuration. Step 4 access-group access-list-name Example: Device(config-service-template)# access-group acl-auto Specifies the access list to be applied. Step 5 vlan vlan-id Example: Specifies VLAN ID. Valid range is from 1-4094. Device(config-service-template)# vlan 10 Step 6 absolute-timer timer Example: Device(config-service-template)# absolute-timer 1000 Specifies session timeout value for a service template. Valid range is from 1-65535. Step 7 service-policy qos input qos-policy Example: Configures an input QoS policy for the client. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1594 Quality of Service Creating a Parameter Map Step 8 Command or Action Device(config-service-template)# service-policy qos input in_qos service-policy qos output qos-policy Example: Device(config-service-template)# service-policy qos output out_qos Purpose Configures an output QoS policy for the client. Creating a Parameter Map Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 parameter-map type subscriber attribute-to-service parameter-map-name Example: Device(config)# parameter-map type subscriber attribute-to-service param Specifies the parameter map type and name. Step 3 map-indexmap device-type eqfilter-name Example: Device(config-parameter-map-filter)# 1 map device-type eq "windows" mac-address eq 3c77.e602.2f91 username eq "cisco" Specifies the parameter map attribute filter criteria. Multiple filters are used in the example provided here. Step 4 map-indexservice-templateservice-template-name Specifies the service template and its precedence precedence-num precedence. Example: Device(config-parameter-map-filter-submode)# 1 service-template svc1 precedence 150 Creating a Policy Map (GUI) Procedure Step 1 Step 2 Choose Configuration > Security > Local Policy > Policy Map tab.. Enter a name for the Policy Map in the Policy Map Name text field. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1595 Creating a Policy Map (CLI) Quality of Service Step 3 Step 4 Step 5 Step 6 Step 7 Click Add Choose the service template from the Service Template drop-down list. For the following parameters select the type of filter from the drop-down list and enter the required match criteria · Device Type · User Role · User Name · OUI · MAC Address Click Add Criteria Click Update & Apply to Device. Creating a Policy Map (CLI) Before you begin Before removing a policy map or parameter map, you should remove it from the target or shut down the WLAN profile or delete the session. Procedure Step 1 Step 2 Step 3 Step 4 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. policy-map type control subscriber policy-map-name Specifies the policy map type. Example: Device(config)# policy-map type control subscriber polmap5 event identity-update match-all Specifies the match criteria to the policy map. Example: Device(config-event-control-policymap)# event identity-update match-all You can apply a service template using either Configures the local profiling policy class map a class map or a parameter map, as shown here. number and specifies how to perform the · class-num class class-map-name do-until-failure action or activates the service template or maps an identity-update attribute to an auto-configured template. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1596 Quality of Service Creating a Policy Map (CLI) Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action · action-index activate service-template service-template-name · action-index map attribute-to-service table parameter-map-name Purpose Example: The following example shows how a class-map with a service-template has to be applied: Device(config-class-control-policymap)# 10 class cls_mac do-until-failure Device(config-action-control-policymap)# 10 activate service-template svc1 Example: The following example shows how a parameter map has to be applied (service template is already associated with the parameter map `param' while creating it): Device(config-action-control-policymap)#1 map attribute-to-service table param end Exits configuration mode. Example: Device(config-action-control-policymap)# end configure terminal Example: Device# configure terminal Enters global configuration mode. wireless profile policy Configures a wireless policy profile. wlan-policy-profile-name Caution Do not configure aaa-override Example: for native profiling under a Device(config)# wireless profile policy wlan-policy-profilename named wireless profile policy. Native profiling is applied at a lower priority than AAA policy. If aaa-override is enabled, the AAA policies will override native profile policy. description profile-policy-description Example: Device(config-wireless-policy)# description "default policy profile" dhcp-tlv-caching Example: Adds a description for the policy profile. Configures DHCP TLV caching on a WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1597 Configuring Native Profiling in Local Mode Quality of Service Step 10 Step 11 Step 12 Step 13 Command or Action Device(config-wireless-policy)# dhcp-tlv-caching Purpose http-tlv-caching Example: Device(config-wireless-policy)# http-tlv-caching Configures client HTTP TLV caching on a WLAN. subscriber-policy-name policy-name Example: Device(config-wireless-policy)# subscriber-policy-name polmap5 Configures the subscriber policy name. vlan vlan-id Configures a VLAN name or VLAN ID. Example: Device(config-wireless-policy)# vlan 1 no shutdown Example: Device(config-wireless-policy)# no shutdown Saves the configuration. Configuring Native Profiling in Local Mode To configure native profiling in the local mode, you must follow the steps described in Creating a Policy Map (CLI), on page 1596. In the policy profile, you must enable central switching as described in the step given below in order to configure native profiling. Procedure Step 1 Command or Action Purpose central switching Enables central switching. Example: Device(config-wireless-policy)# central switching Verifying Native Profile Configuration Use the following show commands to verify the native profile configuartion: Device# show wireless client device summary Active classified device summary MAC Address Device-type User-role Protocol-map ------------------------------------------------------------------------------------------------------ Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1598 Quality of Service Verifying Native Profile Configuration 1491.82b8.f94b 9 1491.82bc.2fd5 41 Microsoft-Workstation Windows7-Workstation sales sales Device# show wireless client device cache Cached classified device info MAC Address Device-type User-role Protocol-map ------------------------------------------------------------------------------------------------------ 2477.031b.aa18 Microsoft-Workstation 9 30a8.db3b.a753 Un-Classified Device 9 4400.1011.e8b5 Un-Classified Device 9 980c.a569.7dd0 Un-Classified Device Device# show wireless client mac-address 4c34.8845.e32c detail | s Session Manager: Interface : IIF ID : 0x90000002 Device Type : Microsoft-Workstation Protocol Map : 0x000009 Authorized : TRUE Session timeout : 1800 Common Session ID: 78380209000000174BF2B5B9 Acct Session ID : 0 Auth Method Status List Method : MAB SM State : TERMINATE Authen Status : Success Local Polices: Service Template : wlan_svc_C414.3CCA.0A51 (priority 254) Absolute-Timer : 1800 Server Polices: Resultant Policies: Filter-ID : acl-auto Input QOS : in_qos Output QOS : out_qos Idle timeout : 60 sec VLAN : 10 Absolute-Timer : 1000 Use the following show command to verify the class map details for a class map name: Device# show class-map type control subscriber name test Class-map Action Exec Hit Miss Comp --------- ------ ---- --- ---- --- match-any test match day Monday 0 00 0 match-any test match join-time-of-day 8:00 18:00 0 00 0 Key: "Exec" - The number of times this line was executed "Hit" - The number of times this line evaluated to TRUE "Miss" - The number of times this line evaluated to FALSE "Comp" - The number of times this line completed the execution of its condition without a need to continue on to the end Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1599 Verifying Native Profile Configuration Quality of Service Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1600 1 4 7 C H A P T E R Air Time Fairness · Information About Air Time Fairness, on page 1601 · Restrictions on Cisco Air Time Fairness, on page 1603 · Cisco Air Time Fairness (ATF) Use Cases, on page 1604 · Configuring Cisco Air Time Fairness (ATF), on page 1604 · Verifying Cisco ATF Configurations, on page 1608 · Verifying Cisco ATF Statistics, on page 1608 Information About Air Time Fairness Cisco Air Time Fairness (ATF) allows network administrators to group devices of a defined category and enables some groups to receive traffic from the WLAN more frequently than the other groups. Therefore, some groups are entitled to more air time than the other groups. Cisco ATF has the following capabilities: · Allocates Wi-Fi air time for user groups or device categories. · Air time fairness is defined by the network administrator and not by the network. · Provides a simplified mechanism for allocating air time. · Dynamically adapts to changing conditions in a WLAN. · Enables a more efficient fulfillment of service-level agreements. · Augments standards-based Wi-Fi QoS mechanisms. By enabling network administrators to define what fairness means in their environments with regards to the amount of air time per client group, the amount of traffic is also controlled. To control air time on a percentage basis, the air time including both uplink and downlink transmissions of a client or SSID is continuously measured. Only air time in the downlink direction, that is AP to client, can be controlled accurately by the AP. Although air time in the uplink direction, that is client to AP can be measured, it cannot be controlled. Although the AP can constrain air time for packets that it sends to clients, the AP can only measure air time for packets that it hears from clients because it cannot strictly limit their air time. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1601 Information About Air Time Fairness Quality of Service Cisco ATF establishes air time limits (defined as a percentage of total air time) and applies those limits on a per SSID basis, where the SSID is used as a parameter to define a client group. Other parameters can be used as well to define groups of clients. Furthermore, a single air time limit can be applied to individual clients. If the air time limit for an SSID (or client) is exceeded, the packets in the downlink direction are dropped. Dropping downlink packets (AP to client) frees up air time whereas dropping uplink packets (client to AP) does not do anything to free up air time because the packet has already been transmitted over the air by the client. Client Fair Sharing Cisco Air Time Fairness can be enforced on clients that are associated with an SSID or WLAN. This ensures that all clients in an SSID or WLAN are treated equally based on their utilization of the radio bandwidth. This feature is useful in scenarios where one or a few clients could use the complete air time allocated for an SSID or WLAN, thereby depriving Wi-Fi experience for other clients associated with the same SSID or WLAN. · The percentage of air time to be given to each client is recomputed every time a client connects or disconnects. · Client fair sharing is applicable only to downstream traffic. · Clients can be categorized into usage groups at the policy level. · Client-based ATF metrics accumulation is performed in the transmit complete routine. This allows the air time that is unused by clients in low-usage or medium-usage groups to be accumulated to a common share pool bucket where the high-usage clients can be replenished. Supported Access Point Platforms Cisco ATF is supported on the following APs: · Cisco Aironet 2700 Series Access Points · Cisco Aironet 3700 Series Access Points · Cisco Aironet 2800 Series Access Points · Cisco Aironet 3800 Series Access Points · Cisco Aironet 4800 Series Access Points · Cisco Aironet 1540 Series Access Points · Cisco Aironet 1560 Series Access Points Note Cisco ATF is supported on MESH, if APs support ATF. ATF is supported on FlexConnect mode and the Local mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1602 Quality of Service Restrictions on Cisco Air Time Fairness Note Cisco Catalyst APs offer capabilities that are equivalent to ATF by leveraging the enhancements in the Wi-Fi 6 and 6E protocols. 802.11ax features such as OFDMA, bidirectional MU-MIMO, and BSS coloring, combined with the advanced QoS features in the Cisco Catalyst 9800 Series Wireless Controllers, help resolve scheduling and congestion problems, accommodate multiple users at the same time, and allocate bandwidth more efficiently. Cisco ATF Modes Cisco ATF operates in the following modes: · Monitor mode in which users can do the following: · View the air time · Report air time usage for all AP transmissions · View reports · per SSID or WLAN · per site group/tag · Report air time usage at periodic intervals · No enforcement as part of Monitor mode · Enforce Policy mode in which users can do the following: · Enforce air time based on configured policy · Enforce air time on the following: · A WLAN · All APs connected in a Cisco Catalyst 9800 Series Wireless Controller network · per site group/tag Restrictions on Cisco Air Time Fairness · Cisco ATF can be implemented only on data frames in the downstream direction. · When ATF is configured in per-SSID mode, all the WLANs are disabled before you enter any ATF configuration commands. The WLANs are enabled after you enter all the ATF commands. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1603 Cisco Air Time Fairness (ATF) Use Cases Quality of Service Cisco Air Time Fairness (ATF) Use Cases Public Hotspots (Stadium/Airport/Convention Center/Other) In this instance, a public network is sharing a WLAN between two (or more) service providers and the venue. Subscribers to each service provider can be grouped and allocated a certain percentage of air time. Education In this instance, a university is sharing a WLAN between students, faculty, and guests. The guest network can be further partitioned by the service provider, for distribution of bandwidth privileges to the guests. Each group can be assigned a certain percentage of air time. Enterprise/Hospitality/Retail In this instance, the venue is sharing a WLAN between employees and guests. The guest network can be further partitioned by service provider. The guests could be sub-grouped by tier of service type with each subgroup being assigned a certain percentage of air time, for example a paid group is entitled for more air time than the free group. Time Shared Managed Hotspot In this instance, the business entity managing the hotspot, such as a service provider or an enterprise, can allocate and subsequently lease air time to other business entities. Configuring Cisco Air Time Fairness (ATF) Configuring Cisco Air Time Fairness The following are the high-level steps to configure Cisco ATF: 1. Enable Monitor mode to determine network usage (optional). 2. Create Cisco ATF policies. 3. Add WLAN ATF policies per network or per site group/tag. 4. Determine, if optimization must be enabled. 5. Periodically check the Cisco ATF statistics. Creating a Cisco ATF Profile (GUI) Procedure Step 1 Choose Configuration > Wireless > Air Time Fairness. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1604 Quality of Service Creating Cisco ATF Profile (CLI) Step 2 Step 3 Step 4 Step 5 Click the Profiles tab and click the Add button, to create a new ATF policy. The Add ATF Policy window is displayed. Specify a name, ID, and weight to the ATF policy. Weighted ratio is used instead of percentages so that the total can exceed 100. The minimum weight that you can set is 5. For example, if you configure the weight as 50, this means that the air time for this ATF profile is 50% when applied to an policy profile. Use the slider to enable or disable the Client Sharing feature. When you enable this option in the Web UI, the defaut ATF configuration is set to Enforce and not Monitor. Click Apply to Device. Creating Cisco ATF Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless profile airtime-fairness atf-policy-name atf-profile-id Example: Device(config)# wireless profile airtime-fairness atf-policy-name 1 Purpose Enters global configuration mode. Creates a new Cisco ATF policy. · atf-policy-name--Enters the ATF profile name. · atf-profile-id--Enters the ATF profile ID. Range is from 0 to 511. Step 3 Step 4 Step 5 weight policy-weight Example: Device(config-config-atf)# weight 5 Adds a weight to the Cisco ATF policy. · policy-weight--Enters the policy weight. Range is from 5 to 100. client-sharing Example: Enables or disables the client sharing for Cisco ATF policy. Device(config-config-atf)# client-sharing end Example: Device(config-config-atf)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1605 Attaching Cisco ATF Profile to a Policy Profile (GUI) Quality of Service Attaching Cisco ATF Profile to a Policy Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > Policy. Policy. Click Add. The Add Policy Profile window is displayed. Click the Advanced tab. Under the Air Time Fairness Policies section, select the required policy for 2.4 GHz and 5 GHz policies. Click Apply to Device. Attaching Cisco ATF Profile to a Policy Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-name Creates policy profile for the WLAN. Example: Device(config)# wireless profile policy profile-name · profile-name --Is the profile name of the policy profile. Step 3 dot11 {24ghz | 5ghz} airtime-fairness atf-policy-name Configures air time fairness policy for 2.4- or 5-GHz radio. Example: Device(config-wireless-policy)# dot11 24ghz airtime-fairness atf-policy-name · atf-policy-name--Is the name of the air time fairness policy. For more details on creating Cisco ATF policy, refer to the Creating Cisco ATF Profile (CLI). Note You can assign the same ATF policy to both 2.4-GHz and 5-GHz radios (or) have two different ATF policies as well. Step 4 end Example: Device(config-wireless-policy)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1606 Quality of Service Enabling ATF in the RF Profile (GUI) Enabling ATF in the RF Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Tags & Profiles > RF. Click Add. The Add RF Profile window is displayed. Click the Advanced tab. Under the ATF Configuration section, complete the following : a) Use the slider to enable or disable the Status. The Mode field is displayed. b) Click the Monitor mode or Enforced mode radio option. If you enable the Enforced mode, use the slider to enable or disable Optimization. c) Use the slider to enable to disable Bridge Client Access. This is applicable for mesh mode APs. Bridge Client Access determines the percentage of the ATF policy weight that is allocated to clients connected to the mesh APs. Specify the Airtime Allocation value between 5 and 90. Click Apply to Device. Enabling ATF in the RF Profile (CLI) Cisco ATF must be enabled on 2.4 GHz or 5 GHz radios separately. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 {24ghz | 5ghz} rf-profile rf-profile Configures an RF profile for 2.4- or 5-GHz Example: radio. Device(config)# ap dot11 24ghz rf-profile rfprof24_1 Step 3 airtime-fairness mode {enforce-policy | monitor} Example: Device(config-rf-profile)# airtime-fairness mode enforce-policy Configures air time fairness in either of the modes: · Enforce-policy--This mode signifies that the ATF is operational. · Monitor--This mode gathers information about air time and reports air time usage. Step 4 airtime-fairness optimization Enables the air time fairness optimization. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1607 Verifying Cisco ATF Configurations Quality of Service Command or Action Example: Device(config-rf-profile)# airtime-fairness optimization Step 5 end Example: Device(config-rf-profile)# end Purpose Optimization is effective when the current WLAN reaches the air time limit and the other available WLANs does not use air time to its full extent. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Verifying Cisco ATF Configurations You can verify Cisco ATF configurations using the following commands: Table 120: Commands for Verifying Cisco ATF Configurations Commands Description show wireless profile airtime-fairness summary Displays the summary of air time fairness profiles. show wireless profile airtime-fairness mapping Displays the ATF policy mapping with the wireless profiles. show ap airtime-fairness summary Displays the ATF configuration summary of all radios. show ap dot11 24ghz airtime-fairness Displays the ATF configuration for 2.4-GHz radio. show ap dot11 5ghz airtime-fairness Displays the ATF configuration for 5-GHz radio. show ap name ap-name airtime-fairness Displays the ATF configuration or statistics for an AP. show ap name ap-name dot11 {24ghz | 5ghz} airtime-fairness statistics summary Displays the ATF statistics of 2.4- or 5GHz radio. Verifying Cisco ATF Statistics Table 121: ATF Statistics per WLAN Commands show ap name ap-name dot11 {24ghz | 5ghz} airtime-fairness wlan wlan_name statistics Table 122: ATF Statistics per ATF Policy Commands show ap name ap-name dot11 {24ghz | 5ghz} airtime-fairness policy policy-name statistics Description Displays the ATF statistics related to a WLAN. Description Displays the ATF statistics related to an ATF policy. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1608 Quality of Service Verifying Cisco ATF Statistics Table 123: ATF Statistics per Client Commands Description show ap airtime-fairness statistics client mac_address Displays the ATF statistics related to a client. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1609 Verifying Cisco ATF Statistics Quality of Service Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1610 1 4 8 C H A P T E R IPv6 Non-AVC QoS Support · Information About IPv6 Non-AVC QoS Support, on page 1611 · Configuring IPv6 Non-AVC QoS, on page 1611 · Verifying IPv6 Non-AVC QoS, on page 1614 Information About IPv6 Non-AVC QoS Support From Cisco IOS XE Amsterdam 17.2.1, the IPv6 Non-AVC QoS feature is supported on Fabric and FlexConnect local switching, where QoS is performed at the AP, on par with the IPv4 functionality. Note This feature is not supported on Cisco Aironet 1700 Series Access Points, Cisco Aironet 2700 Series Access Points, and Cisco Aironet 3700 Series Access Points. The following actions are supported for IPv6 Non-AVC QoS: · Marking the DSCP value for IPv6 packets · Dropping IPv6 packets based on the DSCP value · Policing IPv6 traffic Configuring IPv6 Non-AVC QoS The following sections contain information about the various configurations that comprise the configuration of IPv6 Non-AVC QoS: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1611 Marking DSCP Values for an IPv6 Packet Quality of Service Marking DSCP Values for an IPv6 Packet Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 policy-map policy-map-name Example: Device(config)# policy-map testpolicy Creates a policy map. Step 3 class class-map-name Example: Device(config-pmap)#class testmap Creates a policy criteria. Step 4 set dscp <0-63> Example: Device(config-pmap-c)#set dscp 34 Sets the DSCP value in an IPv6 packet between 0 and 63. Dropping an IPv6 Packet with DSCP Values Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 policy-map policy-map-name Example: Device(config)# policy-map drop_dscp Creates a policy map. Step 3 class class-map-name Creates a policy criteria. Example: Device(config-pmap)#class drop_dscp_class Step 4 police cir <8000 - 10000000000> Example: Device(config-pmap-c)#police cir 8000 Polices the committed information rate between 8000 and 10000000000. Target bit rate (Bits per second). Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1612 Quality of Service Policing IPv6 Traffic Step 5 Step 6 Command or Action conform-action drop Example: Device(config-pmap-c-police)#conform action drop Purpose Configures the conform-action drop command, the action when the rate is less than the conform burst. exceed-action drop Configures the exceed-action drop command, Example: the action when the rate is within the conform and conform plus exceed burst. Device(config-pmap-c-police)#exceed-action drop Policing IPv6 Traffic Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 policy-map policy-map-name Example: Device(config)# policy-map drop_dscp Creates a policy map. Step 3 class class-map-name Creates a policy criteria. Example: Device(config-pmap)#class drop_dscp_class Step 4 police cir <8000 - 10000000000> Example: Device(config-pmap-c)#police cir 8000 Polices the committed information rate between 8000 and 10000000000. Target bit rate (Bits per second). Step 5 conform-action transmit Example: Configures the conform-action transmit command, for transmitting packets. Device(config-pmap-c-police)#conform-action transmit Step 6 exceed-action drop Configures the exceed-action drop command, Example: the action when the rate is within conform and conform plus exceed burst. Device(config-pmap-c-police)#exceed-action drop Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1613 Verifying IPv6 Non-AVC QoS Quality of Service Verifying IPv6 Non-AVC QoS · To verify the DSCP values for IPv6 packets, IPv6 packets that are dropped, and the policing of IPv6 traffic, use the show policy-map command: The following is a sample output of the show command that verifies the DSCP value for an IPv6 packet: Device# show policy-map 1 policymaps Policy Map Set-dscp type:qos client:default Class Set-dscp1_ADV_UI_CLASS set dscp af41 (34) Class class-default no actions · The following is a sample output of the show command that verifies the IPv6 packets that are dropped: Device# show policy-map 1 policymaps Policy Map Drop-dscp type:qos client:default Class Drop-dscp1_ADV_UI_CLASS drop Class class-default no actions · The following is a sample output of the show command that verifies the policing of IPv6 traffic: Device# show policy-map 1 policymaps Policy Map Drop-traffic type:qos client:default Class Drop-traffic1_ADV_UI_CLASS police rate 2000000 bps (250000Bytes/s) conform-action exceed-action Class class-default no actions Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1614 1 4 9 C H A P T E R QoS Basic Service Set Load · Information About QoS Basic Set Service Load, on page 1615 · Configuring QBSS Load, on page 1616 · Verifying QoS Basic Set Service Load, on page 1617 Information About QoS Basic Set Service Load The QoS Basic Set Service (QBSS) information element (IE) knob is a per-WLAN configuration that is configured to include or exclude the QBSS IE, which is sent in beacon frames and probe responses. QBSS IE advertises the channel load information of an AP. The QBSS IE functionality is enabled by default. Until Cisco IOS XE Amsterdam 17.1.1s, the enablement of Wi-Fi Multimedia (WMM) automatically enabled the QBSS load advertisement in the probes and beacons and there was no separate knob to turn on QBSS load IE. However, from Cisco IOS XE Amsterdam 17.2.1, this behavior has changed with the introduction of a separate configuration knob. Until Cisco IOS XE Amsterdam 17.1.1s: · When WMM was enabled on WLAN, QBSS load was advertised in the beacon and probe frames. · When WMM was disabled on WLAN, QBSS IE was not advertised in the beacon and probe frames. From Cisco IOS XE Amsterdam 17.2.1, · When you enable WMM and QBSS ID on WLAN, QBSS IE is advertised in the beacon and probe frames. · When you enable WMM on WLAN and disable QBSS load IE on WLAN, QBSS load is not advertised in the beacon and probe frames. · When you disable WMM on WLAN and enable QBSS load IE on WLAN, QBSS IE is advertised in the beacon and probe frames. Note By default, QBSS load IE is enabled. The behaviour can be configured on policy profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1615 Configuring QBSS Load Quality of Service Configuring QBSS Load The following sections contain information about the various configurations that comprise the configuration of QoS basic service set load. Configuring Wi-Fi Multimedia Perform the procedure given below to create a WLAN and then enable WMM. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wlan profile-name wlan-id [ssid] Example: Device(config)# wlan mywlan 34 mywlan-ssid Purpose Enters global configuration mode. Specifies the WLAN name and ID: · profile-name: Profile name of the WLAN. You can use between 1 to 32 alphanumeric characters. · wlan-id: WLAN ID. You can use between 1 to 512 alphanumeric characters. · ssid: Service Set Identifier (SSID) for this WLAN. If the SSID is not specified, the WLAN profile name is set as the SSID. Note By default, the WLAN is disabled. Step 3 Step 4 Step 5 Step 6 no security wpa wpa2 ciphers aes Example: Disables WPA2 ciphers for Advanced Encryption Standard (AES). Device(config-wlan)# no security wpa wpa2 ciphers aes no security wpa akm dot1x Disables security AKM for dot1x. Example: Device(config-wlan)# no security wpa akm dot1x wmm {allowed | require} Example: Device(config-wlan)#wmm allowed Configures WMM and allows WMM on the WLAN. no shutdown Example: Enables WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1616 Quality of Service Enabling QoS Basic Set Service Load Command or Action Device(config-wlan)#no shutdown Purpose Enabling QoS Basic Set Service Load Perform the procedure given below to enable QBSS load. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-policy Example: Configures WLAN policy profile and enters wireless policy configuration mode. Device(config)# wireless profile policy rr-xyz-policy-1 Step 3 vlan vlan-id Configures VLAN name or VLAN ID. Example: Device(config-wireless-policy)# vlan 24 Step 4 [no] qbss-load Example: Device(config-wireless-policy)#[no] qbss-load Enables QoS enhanced basic service set information element. (Use the no form of this command to disable the feature.) Step 5 no shutdown Example: Device(config-wireless-policy)# no shutdown Saves the configuration and exits configuration mode and returns to privileged EXEC mode. What to do next 1. Create a policy tag. For more information about creating policy tags, refer to Configuring a Policy Tag (CLI). 2. Map the policy tag to the AP. For more information about mapping a policy tag to the AP, refer to Attaching a Policy Tag and Site Tag to an AP (CLI). Verifying QoS Basic Set Service Load To verify if QBSS load is enabled, use the show wireless profile policy detailed named-policy-profile command: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1617 Verifying QoS Basic Set Service Load Quality of Service Device# show wireless profile policy detailed named-policy-profileshow wireless profile policy detailed named-policy-profile Policy Profile Name : named-policy-profile Description : Status : ENABLED VLAN : 91 Multicast VLAN :0 OSEN client VLAN : Multicast Filter : DISABLED QBSS Load : ENABLED Passive Client : DISABLED ET-Analytics : DISABLED StaticIP Mobility : DISABLED WLAN Switching Policy Flex Central Switching : ENABLED Flex Central Authentication : ENABLED Flex Central DHCP : ENABLED Flex NAT PAT : DISABLED Flex Central Assoc : ENABLED Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1618 X I P A R T IPv6 · IPv6 Client IP Address Learning, on page 1621 · IPv6 ACL, on page 1641 · IPv6 Client Mobility, on page 1653 · IPv6 Support on Flex and Mesh, on page 1657 · IPv6 CAPWAP UDP Lite Support, on page 1661 · Neighbor Discovery Proxy, on page 1663 · Address Resolution Protocol Proxy, on page 1667 · IPv6 Ready Certification, on page 1669 1 5 0 C H A P T E R IPv6 Client IP Address Learning · Information About IPv6 Client Address Learning, on page 1621 · Prerequisites for IPv6 Client Address Learning, on page 1625 · IPv6 Address Tracking for Wireless Clients, on page 1625 · Configuring RA Throttle Policy (CLI), on page 1626 · Applying RA Throttle Policy on VLAN (GUI), on page 1627 · Applying RA Throttle Policy on a VLAN (CLI), on page 1628 · Configuring IPv6 Interface on a Switch (GUI), on page 1628 · Configuring IPv6 on Interface (CLI), on page 1629 · Configuring DHCP Pool on Switch (GUI), on page 1630 · Configuring DHCP Pool on Switch (CLI), on page 1630 · Configuring Stateless Auto Address Configuration Without DHCP on Switch (CLI), on page 1631 · Configuring Stateless Auto Address Configuration With DHCP on Switch , on page 1632 · Configuring Stateless Address Auto Configuration Without DHCP on Switch (CLI), on page 1634 · Native IPv6, on page 1635 Information About IPv6 Client Address Learning Client Address Learning is configured on device to learn the IPv4 and IPv6 address of wireless client, and the client's transition state maintained by the device on association and timeout. There are three ways for an IPv6 client to acquire IPv6 addresses: · Stateless Address Auto-Configuration (SLAAC) · Stateful DHCPv6 · Static Configuration In all of these methods, the IPv6 client always sends a neighbor solicitation Duplicate Address Detection (DAD) request to ensure that there is no duplicate IP address on the network. The device snoops on the Neighbor Discovery Protocol (NDP) and DHCPv6 packets of the client to learn about its client IP addresses. Address Assignment Using SLAAC The most common method for IPv6 client address assignment is SLAAC, which provides simple plug-and-play connectivity, where clients self-assign an address based on the IPv6 prefix. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1621 IPv6 Stateful DHCPv6 Address Assignment SLAAC is configured as follows: · A host sends a Router Solicitation message. · The host waits for a Router Advertisement message. · The host take the first 64 bits of the IPv6 prefix from the Router Advertisement message and combines it with the 64 bit EUI-64 address (in the case of Ethernet, this is created from the MAC address) to create a global unicast message. The host also uses the source IP address, in the IP header, of the Router Advertisement message, as its default gateway. · Duplicate Address Detection is performed by the IPv6 clients to ensure that random addresses that are picked do not collide with other clients. Note The last 64 bits of the IPv6 address can be learned by using one of the following algorithms: · EUI-64, which is based on the MAC address of the interface · Private addresses that are randomly generated Figure 47: Address Assignment Using SLAAC The following Cisco IOS configuration commands from a Cisco-capable IPv6 router are used to enable SLAAC addressing and router advertisements: ipv6 unicast-routing interface Vlan20 description IPv6-SLAAC ip address 192.168.20.1 255.255.255.0 ipv6 address FE80:DB8:0:20::1 linklocal ipv6 address 2001:DB8:0:20::1/64 ipv6 enable end Stateful DHCPv6 Address Assignment The use of DHCPv6 is not required for IPv6 client connectivity if SLAAC is already deployed. There are two modes of operation for DHCPv6, that is, Stateless and Stateful. The DHCPv6 Stateless mode is used to provide clients with additional network information that is not available in the router advertisement, but not an IPv6 address, becuase this is already provided by SLAAC. This information includes the DNS domain name, DNS servers, and other DHCP vendor-specific options. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1622 IPv6 Figure 48: Stateful DHCPv6 Address Assignment Router Solicitation The following interface configuration is for a Cisco IOS IPv6 router implementing stateless DHCPv6 with SLAAC enabled: ipv6 unicast-routing ipv6 dhcp pool IPV6_DHCPPOOL address prefix 2001:db8:5:10::/64 domain-name cisco.com dns-server 2001:db8:6:6::1 interface Vlan20 description IPv6-DHCP-Stateless ip address 192.168.20.1 255.255.255.0 ipv6 nd other-config-flag ipv6 dhcp server IPV6_DHCPPOOL ipv6 address 2001:DB8:0:20::1/64 end Router Solicitation A Router Solicitation message is issued by a host controller to facilitate local routers to transmit a Router Advertisement from which the controller can obtain information about local routing, or perform stateless auto configuration. Router Advertisements are transmitted periodically and the host prompts with an immediate Router Advertisement using a Router Solicitation such as - when it boots or following a restart operation. Router Advertisement A Router Advertisement message is issued periodically by a router or in response to a Router Solicitation message from a host. The information contained in these messages is used by a host to perform stateless auto configuration and to modify its routing table. Neighbor Discovery IPv6 Neighbor Discovery is a set of messages and processes that determine relationships between neighboring nodes. Neighbor Discovery replaces the Address Resolution Protocol (ARP), Internet Control Message Protocol (ICMP) Router Discovery, and ICMP Redirect used in IPv4. IPv6 Neighbor Discovery inspection analyzes neighbor discovery messages in order to build a trusted binding table database, and IPv6 Neighbor Discovery packets that do not comply, are dropped. The neighbor binding table in the tracks each IPv6 address and its associated MAC address. Clients are removed from the table according to neighbor-binding timers. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1623 IPv6 Neighbor Discovery Suppression Neighbor Discovery Suppression The IPv6 addresses of wireless clients are cached by a device once the wireless client is in RUN state. When the device receives an NS multicast, it looks into the IPv6 addresses cached. If the target address is known to the device and belongs to one of its wireless clients, the device converts the NS from multicast to unicast and forward it to the wireless client. If the target address is not present in the cache, then device interprets that the Multicast NS is for a wired entity and forward it towards the wired side and not to the wireless client. The same behaviour is seen for ARP request in case of IPv4 address, where the device maintains IPv4 address of the wireless client in the cache. When neither of the configuration is enabled, and when the device receives Non-DAD or DAD NS multicast looking for an IPv6 address, and if the target address is known to the device and belongs to one of its clients, the device will convert the multicast NS to unicast NS, with the destination MAC address, replaced with client's MAC and forward the unicast packet towards client. When full-proxy is enabled, and when the device receives Non-DAD or DAD NS multicast, looking for an IPv6 address, and if the target address is known to the device and belongs to one of its clients, the device will reply with an NA message on behalf of the client. You can use the ipv6 nd proxy command to enable or disable DAD or full proxy. When the device receives an DAD-NS multicast looking for an IPv6 address, and if the target address is known to the device and belongs to one of its clients, the device will reply with an NA message on behalf of the client. When the device receives Non-DAD NS multicast looking for an IPv6 address, and if the target address is known to the device and belongs to one of its clients, the device will convert the multicast NS to unicast NS, with the destination MAC address, replaced with client's MAC and forward the unicast packet towards client. If the device does not have the IPv6 address of a wireless client, the device does not respond with NA; instead, it forwards the NS packet to the wired side. Reason for forwarding to Wired Side is due to the assumption that all wireless client IPv6 address and the its mapped MAC address should be available in the controller and if an IPv6 address required in the NS is not available, then that address is not a wireless client address, so forwarded to wired side. Router Advertisement Guard The RA Guard feature increases the security of the IPv6 network by dropping router advertisements coming from wireless clients. Without this feature, misconfigured or malicious IPv6 clients could announce themselves as a router for the network, often with a high priority, which could take precedence over legitimate IPv6 routers. By default, RA guard is always enabled on the controller. · Port on which the frame is received · IPv6 source address · Prefix list · Trusted or Untrusted ports for receiving the router advertisement guard messages · Trusted/Untrusted IPv6 source addresses of the router advertisement sender · Trusted/Untrusted Prefix list and Prefix ranges · Router preference Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1624 IPv6 Router Advertisement Throttling Router Advertisement Throttling RA throttling allows the controller to enforce limits to the RA packets headed toward the wireless network. By enabling RA throttling, routers that send multiple RA packets can be trimmed to a minimum frequency that will still maintain an IPv6 client connectivity. If a client sends an RS packet, an RA is sent back to the client. This RA is allowed through the controller and unicast to the client. This process ensures that the new clients or roaming clients are not affected by the RA throttling. Prerequisites for IPv6 Client Address Learning Before configuring IPv6 client address learning, configure the clients to support IPv6. To enable wireless IPv6 client connectivity, the underlying wired network must support IPv6 routing and an address assignment mechanism, such as SLAAC or DHCPv6. The wireless LAN controller must have L2 adjacency to the IPv6 router. Note The AP learns IPv6 client address based on source IP address even though Neighbor Advertisements can hold rest of the IPv6 addresses. AP won't look into the Neighbor Advertisements to learn the IPv6 address learnt by the client. This behavior is seen only on Apple clients and not on Microsoft Windows clients. IPv6 Address Tracking for Wireless Clients Until Cisco IOS XE 17.9.1, the controller supported a maximum of eight IPv6 addresses per wireless client. After eight IPv6 addresses were learnt for a wireless client, the controller dropped that wireless client's data traffic coming with new IPv6 source addresses. However, in Cisco IOS XE 17.9.2 release, the controller allows data traffic of the wireless clients coming with new IPv6 source addresses even after eight addresses have been learnt for respective wireless clients. The controller continues to learn new iPv6 addresses of the wireless clients from the wireless clients' control traffic (IPv6 NS/NA and DHCPv6), and keeps track of only a maximum of eight addresses per wireless client. To allow forwarding of the multicast neighbor solicitation (NS) queries for unknown IPv6 target addresses of wireless clients (the client addresses that are not tracked by the controller) to wireless clients, the wireless ipv6 nd ns-forward configuration must be enabled. Important We recommend that you configure IPv6 Multicast over Multicast (MoM) tunnel along with the wireless ipv6 nd ns-forward configuration. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1625 IPv6 Configuring Unknown Address Multicast Neighbor Solicitation Forwarding Note In Cisco IOS XE 17.9.2, since the controller allows IPv6 traffic without address tracking beyond the eight IPv6 address limit, some of the features such as, User Defined Network, iPSK Peer-to-Peer Blocking, Management over Wireless, Neighbor Discovery Suppression, IP Theft Detection, and so on, may not work for the wireless clients using more than eight addresses. You can disable the new behavior by enabling the IP Source Guard feature https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/17-9/config-guide/b_wl_17_9_cg/m_ipsg_ewlc.html?bookSearch=true. Configuring Unknown Address Multicast Neighbor Solicitation Forwarding To allow forwarding of the multicast neighbor solicitation (NS) queries for unknown IPv6 target addresses of wireless clients (the client addresses that are not tracked by the controller) to wireless clients, perform the following steps: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless ipv6 nd ns-forward Example: Device (config)# wireless ipv6 nd ns-forward Purpose Enters global configuration mode. Enables forwarding of the multicast neighbor solicitation (NS) messages for unknown IPv6 target addresses of wireless clients (the client addresses that are not tracked by the controller) to wireless clients. Note We recommend that you configure IPv6 Multicast over Multicast (MoM) tunnel along with this configuration. Configuring RA Throttle Policy (CLI) Configure RA Throttle policy to allow the enforce the limits Procedure Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Device# configure terminal Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1626 IPv6 Applying RA Throttle Policy on VLAN (GUI) Step 2 Step 3 Step 4 Step 5 Command or Action ipv6 nd ra-throttler policy ra-throttler1 Example: Device(config)# ipv6 nd ra-throttler policy ra-throttler1 throttleperiod 500 Example: Device(config-nd-ra-throttle)# throttleperiod 500 max-through 10 Example: Device(config-nd-ra-throttle)# max-through 15 allow-atleast 5 at-most 10 Example: Device(config-nd-ra-throttle)# allow-atleast 5 at-most 10 Purpose Define the router advertisement (RA) throttler policy name and enter IPv6 RA throttle policy configuration mode. Configures the throttle period in an IPv6 RA throttler policy. Throttle period is in seconds and it is the time while the controller will not forward RA to the wireless clients. Limits multicast RAs per VLAN per throttle period. Limits the number of multicast RAs per device per throttle period in an RA throttler policy. Applying RA Throttle Policy on VLAN (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Configuration > Services > RA Throttle Policy. Click Add. The Add RA Throttle Policy dialog box appears. Enter a name for the policy in the Name field. Choose the desired option from the Medium Type drop-down list. Enter a value in the Throttle Period field. RA throttling takes place only after the Max Through limit is reached for the VLAN or the Allow At-Most value is reached for a particular router. Enter a value for the Max Through field, which is the maximum number of RA packets on a VLAN that can be sent before throttling takes place. The No Limit option allows an unlimited number of RA packets through with no throttling. Choose an Interval Option, which allows the device to act differently based on the RFC 3775 value set in IPv6 RA packets, from the following options: · Ignore--Causes the RA throttle to treat packets with the interval option as a regular RA and subject to throttling if in effect. · Passthrough--Allows any RA messages with the RFC 3775 interval option to go through without throttling. · Throttle--Causes the RA packets with the interval option to always be subject to rate limiting. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1627 IPv6 Applying RA Throttle Policy on a VLAN (CLI) Step 8 Step 9 Step 10 Enter the minimum number of RA packets per router that can be sent as multicast before throttling takes place in the At Least Multicast RAs field. Enter the maximum number of RA packets per router that can be sent as multicast before throttling takes place in the At Most Multicast RAs field. The No Limit option allows an unlimited number of RA packets through the router. Click the Add & Apply to Device button. Applying RA Throttle Policy on a VLAN (CLI) Applying the RA Throttle policy on a VLAN. By enabling RA throttling, routers that send many RA packets can be trimmed to a minimum frequency that will still maintain an IPv6 client connectivity. Procedure Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Device# configure terminal Step 2 Step 3 vlan configuration 1 Example: Device(config)# vlan configuration 1 Configures a VLAN or a collection of VLANs and enters VLAN configuration mode. ipv6 nd ra throttler attach-policy ra-throttler1 Attaches an IPv6 RA throttler policy to a VLAN or a collection of VLANs. Example: Device(config-vlan)# ipv6 nd ra throttler attach-policy ra-throttler1 Configuring IPv6 Interface on a Switch (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Layer2 > VLAN > SVI. Click Add. Enter VLAN Number, Description and MTU (Bytes). Enable or disable the Admin Status toggle button. In IP Options, check the IPv6 check box. Choose the type of Static address from the drop-down list and enter the Static Address. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1628 IPv6 Configuring IPv6 on Interface (CLI) Step 7 Step 8 Check or uncheck the DHCP, Autoconfig and Act as an IPv6 DHCP client check boxes. If you check the DHCP check box, the Rapid Commit check box is displayed. Check or uncheck the Rapid Commit check box. Click Apply to Device. Configuring IPv6 on Interface (CLI) Follow the procedure given below to configure IPv6 on an interface: Before you begin Enable IPv6 on the client and IPv6 support on the wired infrastructure. Procedure Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. Enter your password, if prompted. Step 2 Device> enable configure terminal Example: Enters global configuration mode. Device# configure terminal Step 3 Step 4 Step 5 interface vlan vlan-id Example: Device(config)# interface vlan 10 ip address fe80::1 link-local Example: Device(config-if)# ip address 198.51.100.1 255.255.255.0 Device(config-if)# ipv6 address fe80::1 link-local Device(config-if)# ipv6 address 2001:DB8:0:1:FFFF:1234::5/64 Device(config-if)# ipv6 address 2001:DB8:0:0:E000::F/64 ipv6 enable Example: Device(config)# ipv6 enable Creates an interface and enters interface configuration mode. Configures IPv6 address on the GigabitEthernet interface using the link-local option. (Optional) Enables IPv6 on the GigabitEthernet interface. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1629 IPv6 Configuring DHCP Pool on Switch (GUI) Step 6 Command or Action end Example: Device(config)# end Purpose Exits interface mode. Configuring DHCP Pool on Switch (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Choose Administration > DHCP. Click the Add button. The Create DHCP Pool dialog box appears. Enter a pool name in the DHCP Pool Name field. The name must not be greater than 236 characters in length. Choose either IPv4 or IPv6 from the IP Type drop-down list. Enter an IP address in the Network field. Choose any one of the available subnet masks from the Subnet Mask drop-down list. Enter an IP address in the Starting ip field. Enter an IP address in the Ending ip field. Optional, set the status of the Reserved Only field to Enabled if you wish to reserve the DHCP pool. Choose the desired option from the Lease drop-down list. Selecting the User Defined option from the Lease drop-down list enables the (0-365 days), (0-23 hours), and (0-59 minutes) fields. Enter appropriate values. Click the Save & Apply to Device button. For IPv6, Enter the DNS Server, DNS Domain Name, and Ipv6 Address Allocation. Configuring DHCP Pool on Switch (CLI) Follow the procedure given below to configure DHCP Pool on an interface: Procedure Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. Enter your password if prompted. Step 2 Device> enable configure terminal Example: Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1630 IPv6 Configuring Stateless Auto Address Configuration Without DHCP on Switch (CLI) Command or Action Device# configure terminal Purpose Step 3 Step 4 Step 5 Step 6 Step 7 ipv6 dhcp pool vlan-id Example: Device(config)# ipv6 dhcp pool 21 Enters the configuration mode and configures the IPv6 DHCP pool on the Vlan. address prefix 2001:DB8:0:1:FFFF:1234::/64 lifetime 300 10 Enters the configuration-dhcp mode and configures the address pool and its lifetime on a Vlan. Example: Device(config-dhcpv6)# address prefix 2001:DB8:0:1:FFFF:1234::/64 lifetime 300 10 dns-server 2001:100:0:1::1 Example: Device(config-dhcpv6)# dns-server 2001:20:21::1 Configures the DNS servers for the DHCP pool. domain-name example.com Example: Device(config-dhcpv6)# domain-name example.com Configures the domain name to complete unqualified host names. end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Stateless Auto Address Configuration Without DHCP on Switch (CLI) Follow the procedure given below to configure stateless auto address configuration without DHCP: Procedure Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. Enter your password if prompted. Device> enable Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1631 IPv6 Configuring Stateless Auto Address Configuration With DHCP on Switch Step 2 Command or Action configure terminal Example: Device# configure terminal Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 interface vlan 1 Example: Device(config)# interface vlan 1 ip address fe80::1 link-local Example: Device(config-if)# ip address 198.51.100.1 255.255.255.0 Device(config-if)# ipv6 address fe80::1 link-local Device(config-if)# ipv6 address 2001:DB8:0:1:FFFF:1234::5/64 Device(config-if)# ipv6 address 2001:DB8:0:0:E000::F/64 ipv6 enable Example: Device(config)# ipv6 enable no ipv6 nd managed-config-flag Example: Device(config)# interface vlan 1 Device(config-if)# no ipv6 nd managed-config-flag no ipv6 nd other-config-flag Example: Device(config-if)# no ipv6 nd other-config-flag end Example: Device(config)# end Purpose Enters global configuration mode. Creates an interface and enters interface configuration mode. Configures IPv6 address on the GigabitEthernet interface using the link-local option. (Optional) Enables IPv6 on the GigabitEthernet interface. Ensures the attached hosts do not use stateful autoconfiguration to obtain addresses. Ensures the attached hosts do not use stateful autoconfiguration to obtain non-address options from DHCP (domain etc). Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Stateless Auto Address Configuration With DHCP on Switch Follow the procedure given below to configure stateless auto address configuration with DHCP: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1632 IPv6 Configuring Stateless Auto Address Configuration With DHCP on Switch Procedure Step 1 Command or Action enable Example: Step 2 Device> enable configure terminal Example: Device# configure terminal Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 interface vlan 1 Example: Device(config)# interface vlan 1 ip address fe80::1 link-local Example: Device(config-if)# ip address 198.51.100.1 255.255.255.0 Device(config-if)# ipv6 address fe80::1 link-local Device(config-if)# ipv6 address 2001:DB8:0:1:FFFF:1234::5/64 Device(config-if)# ipv6 address 2001:DB8:0:0:E000::F/64 ipv6 enable Example: Device(config)# ipv6 enable ipv6 nd prefix ipaddress Example: ipv6 nd prefix 2001:9:3:54::/64 no-advertise no ipv6 nd managed-config-flag Example: Device(config)# interface vlan 1 Device(config-if)# no ipv6 nd managed-config-flag ipv6 nd other-config-flag Example: Device(config-if)# no ipv6 nd other-config-flag Purpose Enables privileged EXEC mode. Enter your password if prompted. Enters global configuration mode. Creates an interface and enters interface configuration mode. Configures IPv6 address on the GigabitEthernet interface using the link-local option. (Optional) Enables IPv6 on the GigabitEthernet interface. Specifies a subnet prefix. Ensures the attached hosts do not use stateful autoconfiguration to obtain addresses. Ensures the attached hosts do not use stateful autoconfiguration to obtain non-address options from DHCP (domain etc). Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1633 IPv6 Configuring Stateless Address Auto Configuration Without DHCP on Switch (CLI) Step 9 Step 10 Command or Action ipv6 dhcp server servername Example: ipv6 dhcp server VLAN54 end Example: Device(config)# end Purpose Displays the configuration parameters. Exits interface mode. Configuring Stateless Address Auto Configuration Without DHCP on Switch (CLI) Follow the procedure given below to configure stateless auto address configuration without DHCP: Procedure Step 1 Command or Action enable Example: Purpose Enables privileged EXEC mode. Enter your password if prompted. Step 2 Device> enable configure terminal Example: Enters global configuration mode. Device# configure terminal Step 3 Step 4 Step 5 interface vlan 1 Example: Device(config)# interface vlan 1 ip address fe80::1 link-local Example: Device(config-if)# ip address 198.51.100.1 255.255.255.0 Device(config-if)# ipv6 address fe80::1 link-local Device(config-if)# ipv6 address 2001:DB8:0:1:FFFF:1234::5/64 Device(config-if)# ipv6 address 2001:DB8:0:0:E000::F/64 ipv6 enable Example: Creates an interface and enters interface configuration mode. Configures IPv6 address on the GigabitEthernet interface using the link-local option. (Optional) Enables IPv6 on the GigabitEthernet interface. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1634 IPv6 Native IPv6 Step 6 Step 7 Step 8 Command or Action Device(config)# ipv6 enable no ipv6 nd managed-config-flag Example: Device(config)# interface vlan 1 Device(config-if)# no ipv6 nd managed-config-flag no ipv6 nd other-config-flag Example: Device(config-if)# no ipv6 nd other-config-flag end Example: Device(config)# end Purpose Ensures the attached hosts do not use stateful autoconfiguration to obtain addresses. Ensures the attached hosts do not use stateful autoconfiguration to obtain non-address options from DHCP (domain etc). Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Native IPv6 Information About IPv6 IPv6 is a packet-based protocol used to exchange data, voice, and video traffic over digital networks. IPv6 is based on IP, but with a much larger address space, and improvements such as a simplified main header and extension headers. The architecture of IPv6 has been designed to allow existing IPv4 users to transition easily to IPv6 while continuing to use services such as end-to-end security, quality of service (QoS), and globally unique addresses. The larger IPv6 address space allows networks to scale and provide global reachability. Note The features and functions that work on IPv4 networks with IPv4 addresses also work on IPv6 networks with IPv6 addresses. General Guidelines · For IPv6 functionality to work, ensure that you disable IPv6 multicast routing. · The Wireless Management interface should have only one static IPv6 address. · Router advertisement should be suppressed on the wireless management interface and client VLANs (if IPv6 is configured on the client VLAN). · Preferred mode is part of an AP join profile. When you configure the preferred mode as IPv6, an AP attempts to join over IPv6 first. If it fails, the AP falls back to IPv4. · You should use MAC addresses for RA tracing of APs and clients. · APs can join IPv6 controllers only with an IPv6 static address. If you have a controller with auto configurations and multiple IPv6 addresses, APs cannot join the IPv6 controllers. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1635 IPv6 Configuring IPv6 Addressing Unsupported Features · UDP Lite is not supported. · AP sniffer over IPv6 is not supported. · IPv6 is not supported for the HA port interface. · Auto RF grouping over IPv6 is not supported. Only static RF grouping is supported. Configuring IPv6 Addressing Follow the procedure given below to configure IPv6 addressing: Note All the features and functions that work on IPv4 networks with IPv4 addresses will work on IPv6 networks with IPv6 addresses too. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ipv6 unicast-routing Example: Device(config)# ipv6 unicast-routing Configures IPv6 for unicasting. Step 3 interface vlan 1 Example: Device(config)# interface vlan 1 Creates an interface and enters interface configuration mode. Step 4 ipv6 address ipv6-address Example: Device(config-if)# ipv6 address FD09:9:2:49::53/64 Specifies a global IPv6 address. Step 5 ipv6 enable Example: Device(config-if)# ipv6 enable Enables IPv6 on the interface. Step 6 ipv6 nd ra suppress all Example: Suppresses IPv6 router advertisement transmissions on the interface. Device(config-if)# ipv6 nd ra suppress all Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1636 IPv6 Creating an AP Join Profile (GUI) Step 7 Step 8 Step 9 Command or Action exit Example: Device(config-if)# exit wireless management interface gigabitEthernet gigabitEthernet-interfacevlan 64 Example: Device(config)# wireless management interface gigabitEthernet vlan 64 ipv6 route ipv6-address Example: Device(config)# ipv6 route ::/0 FD09:9:2:49::1 Purpose Returns to global configuration mode. Configures the ports that are connected to the supported APs with the wireless management interface. Specifies IPv6 static routes. Creating an AP Join Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Configuration > Tags & Profiles > AP Join. On the AP Join Profile window, click the General tab and click Add. In the Name field enter, a name for the AP join profile. (Optional) Enter a description for the AP join profile. Choose CAPWAP > Advanced. Under the Advanced tab, from the Preferred Mode drop-down list, choose IPv6. This sets the preferred mode of APs as IPv6. Click Save & Apply to Device. Creating an AP Join Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap profile ap-profile Example: Purpose Enters global configuration mode. Configures an AP profile and enters AP profile configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1637 IPv6 Configuring the Primary and Backup Controller (GUI) Command or Action Purpose Device(config)# ap profile xyz-ap-profile Step 3 Step 4 description ap-profile-name Adds a description for the AP profile. Example: Device(config-ap-profile)# description "xyz ap profile" preferred-mode ipv6 Sets the preferred mode of APs as IPv6. Example: Device(config-ap-profile)# preferred-mode ipv6 Configuring the Primary and Backup Controller (GUI) Before you begin Ensure that you have configured an AP join profile prior to configuring the primary and backup controller s. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Tags & Profiles > AP Join. On the AP Join Profile window, click the AP join profile name. In the Edit AP Join Profile window, click the CAPWAP tab. In the High Availability tab, under Backup Controller Configuration, check the Enable Fallback check box. Enter the primary and secondary controller names and IP addresses. Click Update & Apply to Device. Configuring Primary and Backup Controller (CLI) Follow the procedure given below to configure the primary and secondary controllers for a selected AP: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap profile profile-name Example: Purpose Enters global configuration mode. Configures an AP profile and enters AP profile configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1638 IPv6 Verifying IPv6 Configuration Command or Action Purpose Device(config)# ap profile yy-ap-profile Step 3 Step 4 Step 5 capwap backup primary Configures AP CAPWAP parameters with the primary-controller-name primary-controller-ip primary backup controller's name. Example: Device(config)# capwap backup primary WLAN-Controller-A 2001:DB8:1::1 Note You need to enable fast heartbeat for capwap backup primary and capwap backup secondary to work. AP disconnection may occur if the link between the controller and AP is not reliable and fast heartbeat is enabled. ap capwap backup secondary secondary-controller-name secondary-controller-ip Configures AP CAPWAP parameters with the secondary backup controller's name. Example: Device(config)# capwap backup secondary WLAN-Controller-B 2001:DB8:1::1 syslog host ipaddress Example: Configures the system logging settings for the APs. Device(config)# syslog host 2001:DB8:1::1 Step 6 tftp-downgrade tftp-server-ip imagename Example: Device(config)# tftp-downgrade 2001:DB8:1::1 testimage Initiates AP image downgrade from a TFTP server for all the APs. Verifying IPv6 Configuration Use the following show command to verify the IPv6 configuration: Device# show wireless interface summary Wireless Interface Summary Interface Name Interface Type VLAN ID IP Address IP Netmask MAC Address --------------------------------------------------------------------------------------- Vlan49 Management 49 0.0.0.0 255.255.255.0 001e.f64c.1eff fd09:9:2:49::54/64 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1639 IPv6 Verifying IPv6 Configuration Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1640 1 5 1 C H A P T E R IPv6 ACL · Information About IPv6 ACL, on page 1641 · Prerequisites for Configuring IPv6 ACL, on page 1642 · Restrictions for Configuring IPv6 ACL, on page 1642 · Configuring IPv6 ACLs , on page 1642 · How To Configure an IPv6 ACL, on page 1643 · Verifying IPv6 ACL, on page 1648 · Configuration Examples for IPv6 ACL, on page 1649 Information About IPv6 ACL An access control list (ACL) is a set of rules used to limit access to a particular interface (for example, if you want to restrict a wireless client from pinging the management interface of the controller ). ACLs are configured on the device and applied to the management interface, the AP-manager interface, any of the dynamic interfaces, or a WLAN to control data traffic to and from wireless clients or to the controller central processing unit (CPU) to control all traffic destined for the CPU. You can also create a preauthentication ACL for web authentication. Such an ACL is used to allow certain types of traffic before authentication is complete. IPv6 ACLs support the same options as IPv4 ACLs including source, destination, source and destination ports. Note You can enable only IPv4 traffic in your network by blocking IPv6 traffic. That is, you can configure an IPv6 ACL to deny all IPv6 traffic and apply it on specific or all WLANs. Understanding IPv6 ACLs Types of ACL Per User IPv6 ACL For the per-user ACL, the full access control entries (ACE) as the text strings are configured on the RADIUS server. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1641 IPv6 Filter ID IPv6 ACL The ACE is not configured on the Cisco 9800 controller. The ACE is sent to the device in the ACCESS-Accept attribute and applies it directly for the client. When a wireless client roams into an foreign device, the ACEs are sent to the foreign device as an AAA attribute in the mobility Handoff message. Output direction, using per-user ACL is not supported. Filter ID IPv6 ACL For the filter-Id ACL, the full ACEs and the acl name(filter-id) is configured on the Cisco 9800 controller and only the filter-id is configured on the RADIUS Server. The filter-id is sent to the device in the ACCESS-Accept attribute, and the device looks up the filter-id for the ACEs, and then applies the ACEs to the client. When the client L2 roams to the foreign device, only the filter-id is sent to the foreign device in the mobility Handoff message. Output filtered ACL, using per-user ACL is not supported. The foreign device has to configure the filter-id and ACEs beforehand. Prerequisites for Configuring IPv6 ACL You can filter IP Version 6 (IPv6) traffic by creating IPv6 access control lists (ACLs) and applying them to interfaces similarly to the way that you create and apply IP Version 4 (IPv4) named ACLs. You can also create and apply input router ACLs to filter Layer 3 management traffic when the switch is running the Network Essentials license. Restrictions for Configuring IPv6 ACL With IPv4, you can configure standard and extended numbered IP ACLs, named IP ACLs, and MAC ACLs. IPv6 supports only named ACLs. The IPv6 ACL does not support Flex connect mode. The device supports most of the Cisco IOS-supported IPv6 ACLs with some exceptions: · The device does not support matching on these keywords: flowlabel, routing header, and undetermined-transport. · The device does not support reflexive ACLs (the reflect keyword). · The device does not apply MAC-based ACLs on IPv6 frames. · When configuring an ACL, there is no restriction on keywords entered in the ACL, regardless of whether or not they are supported on the platform. When you apply the ACL to an interface that requires hardware forwarding (physical ports or SVIs), the device checks to determine whether or not the ACL can be supported on the interface. If not, attaching the ACL is rejected. · If an ACL is applied to an interface and you attempt to add an access control entry (ACE) with an unsupported keyword, the device does not allow the ACE to be added to the ACL that is currently attached to the interface Configuring IPv6 ACLs Follow the procedure given below to filter IPv6 traffic: 1. Create an IPv6 ACL, and enter IPv6 access list configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1642 IPv6 Default IPv6 ACL Configuration 2. Configure the IPv6 ACL to block (deny) or pass (permit) traffic. 3. Apply the IPv6 ACL to the interface where the traffic needs to be filtered. 4. Apply the IPv6 ACL to an interface. For router ACLs, you must also configure an IPv6 address on the Layer 3 interface to which the ACL is applied. Default IPv6 ACL Configuration There are no IPv6 ACLs configured or applied. Interaction with Other Features and Switches · If a bridged frame is to be dropped due to a port ACL, the frame is not bridged. · You can create both IPv4 and IPv6 ACLs on a switch or switch stack, and you can apply both IPv4 and IPv6 ACLs to the same interface. Each ACL must have a unique name; an error message appears if you try to use a name that is already configured. You use different commands to create IPv4 and IPv6 ACLs and to attach IPv4 or IPv6 ACLs to the same Layer 2 or Layer 3 interface. If you use the wrong command to attach an ACL (for example, an IPv4 command to attach an IPv6 ACL), you receive an error message. · You cannot use MAC ACLs to filter IPv6 frames. MAC ACLs can only filter non-IP frames. · If the hardware memory is full, for any additional configured ACLs, packets are processed to the CPU, and the ACLs are applied in software. When the hardware is full a message is printed to the console indicating the ACL has been unloaded and the packets will be processed in software. Note Only packets of the same type as the ACL that could not be added (ipv4, ipv6, MAC) will be processed in software. · If the TCAM is full, for any additional configured ACLs, packets are forwarded to the CPU, and the ACLs are applied in software. How To Configure an IPv6 ACL Creating an IPv6 ACL (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Security > ACL. Click Add. In the Add ACL Setup dialog box, enter the following parameters. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1643 IPv6 Creating an IPv6 ACL Step 4 Step 5 · ACL Name: Enter the name for the ACL · ACL Type: IPv6 · Sequence: The valid range is between 100 and 199 or 2000 and 26991 · Action: Choose Permit or Deny the packet flow from the drop-down list. · Source Type: Choose any, Host or Network from which the packet is sent. · Destination Type: Choose any, Host or Network to which the packet is sent. · Protocol: Choose a protocol from the drop-down list. · Log: Enable or disable logging. · DSCP: Enter to match packets with the DSCP value Click Add. Add the rest of the rules and click Apply to Device. Creating an IPv6 ACL Procedure Step 1 Command or Action enable Example: Step 2 Device> enable configure terminal Example: Device# configure terminal Purpose Enables privileged EXEC mode. Enter your password if prompted. Enters global configuration mode. Step 3 Step 4 ipv6 access-list acl_name Example: Device# ipv6 access-list access-list-name Use a name to define an IPv6 access list and enter IPv6 access-list configuration mode. {deny|permit} protocol Enter deny or permit to specify whether to Example: deny or permit the packet if conditions are matched. These are the conditions: {deny | permit} protocol {source-ipv6-prefix/prefix-length | any · For protocol, enter the name or number | host source-ipv6-address} [operator [port-number]]{destination-ipv6-prefix/prefix-length of an Internet protocol: ahp, esp, icmp, ipv6, pcp, stcp, tcp, or udp, or an integer Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1644 IPv6 Creating an IPv6 ACL Command or Action Purpose | any |host destination-ipv6-address} [operator [port-number]][dscp value] [fragments][log] [log-input] [routing][sequence value] [time-range name] in the range 0 to 255 representing an IPv6 protocol number. · The source-ipv6-prefix/prefix-length or destination-ipv6-prefix/ prefix-length is the source or destination IPv6 network or class of networks for which to set deny or permit conditions, specified in hexadecimal and using 16-bit values between colons (see RFC 2373). · Enter any as an abbreviation for the IPv6 prefix ::/0. · For host source-ipv6-address or destination-ipv6-address, enter the source or destination IPv6 host address for which to set deny or permit conditions, specified in hexadecimal using 16-bit values between colons. · (Optional) For operator, specify an operand that compares the source or destination ports of the specified protocol. Operands are lt (less than), gt (greater than), eq (equal), neq (not equal), and range. If the operator follows the source-ipv6-prefix/prefix-length argument, it must match the source port. If the operator follows the destination-ipv6prefix/prefix-length argument, it must match the destination port. · (Optional) The port-number is a decimal number from 0 to 65535 or the name of a TCP or UDP port. You can use TCP port names only when filtering TCP. You can use UDP port names only when filtering UDP. · (Optional) Enter dscp value to match a differentiated services code point value against the traffic class value in the Traffic Class field of each IPv6 packet header. The acceptable range is from 0 to 63. · (Optional) For packet fragmentation, enter fragments to check noninitial Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1645 IPv6 Creating an IPv6 ACL Step 5 Command or Action Purpose fragments. This keyword is visible only if the protocol is ipv6. · (Optional) Enter log to cause an logging message to be sent to the console about the packet that matches the entry. Enter log-input to include the input interface in the log entry. Logging is supported only for router ACLs. · (Optional) Enter routing to specify that IPv6 packets be routed. · (Optional) Enter sequence value to specify the sequence number for the access list statement. The acceptable range is from 1 to 4294967295 · (Optional) Enter time-range name to specify the time range that applies to the deny or permit statement. {deny|permit} tcp (Optional) Define a TCP access list and the Example: access conditions. {deny | permit} tcp Enter tcp for Transmission Control Protocol. {source-ipv6-prefix/prefix-length | any The parameters are the same as those described | hostsource-ipv6-address} in Step 3, with these additional optional [operator parameters: [port-number]]{destination-ipv6-prefix/prefix-length | any |hostdestination-ipv6-address} [operator [port-number]][ack] [dscp · ack--Acknowledgment bit set. value][established] [fin] [log][log-input] [neq {port |protocol}] [psh] [range{port | protocol}] [rst][routing] [sequence value] · established--An established connection. A match occurs if the TCP datagram has the ACK or RST bits set. [syn] [time-range name][urg] · fin--Finished bit set; no more data from sender. · neq {port | protocol}--Matches only packets that are not on a given port number. · psh--Push function bit set. · range {port | protocol}--Matches only packets in the port number range. · rst--Reset bit set. · syn--Synchronize bit set. · urg--Urgent pointer bit set. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1646 IPv6 Creating an IPv6 ACL Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action Purpose {deny|permit} udp (Optional) Define a UDP access list and the Example: access conditions. {deny | permit} udp Enter udp for the User Datagram Protocol. The {source-ipv6-prefix/prefix-length | any UDP parameters are the same as those | hostsource-ipv6-address} described for TCP, except that the operator [operator [port]] port number or name must be a UDP [port-number]]{destination-ipv6-prefix/prefix-length | any | hostdestination-ipv6-address} port number or name, and the established [operator [port-number]][dscp value] parameter is not valid for UDP. [log][log-input] [neq {port |protocol}] [range {port |protocol}] [routing][sequence value][time-range name] {deny|permit} icmp (Optional) Define an ICMP access list and the Example: access conditions. {deny | permit} icmp Enter icmp for Internet Control Message {source-ipv6-prefix/prefix-length | any Protocol. The ICMP parameters are the same | hostsource-ipv6-address} as those described for most IP protocols in Step [operator [port-number]] 3a, with the addition of the ICMP message {destination-ipv6-prefix/prefix-length | any | hostdestination-ipv6-address} type and code parameters. These optional [operator [port-number]][icmp-type keywords have these meanings: [icmp-code] |icmp-message] [dscpvalue] [log] [log-input] · icmp-type--Enter to filter by ICMP [routing] [sequence value][time-range name] message type, a number from 0 to 255. · icmp-code--Enter to filter ICMP packets that are filtered by the ICMP message code type, a number from 0 to 255. · icmp-message--Enter to filter ICMP packets by the ICMP message type name or the ICMP message type and code name. To see a list of ICMP message type names and code names, use the ? key or see command reference for this release. end Example: Device(config)# end show ipv6 access-list Example: show ipv6 access-list copy running-config startup-config Example: copy running-config startup-config Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Verify the access list configuration. (Optional) Save your entries in the configuration file. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1647 IPv6 Creating WLAN IPv6 ACL (GUI) Creating WLAN IPv6 ACL (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > WLANs. Click Add. In the General tab, enter the Profile Name, the SSID and the WLAN ID. Choose Security > Layer3 tab, click Show Advanced Settings and under the Preauthenticated ACL settings, choose the ACL from the IPv6 drop-down list. Click Apply to Device. Creating WLAN IPv6 ACL Procedure Step 1 Command or Action configure terminal Example: DeviceController # configure terminal Purpose Configures the terminal. Step 2 wireless profile policy profile-name Creates policy profile for the WLAN. Example: The profile-name is the profile name of the Device(config)# wireless profile policy policy profile. test1 Step 3 ipv6 acl acl_name Creates a named WLAN ACL. Example: Device(config-wireless-policy)# ipv6 acl testacl Step 4 ipv6 traffic-filter web acl_name-preauth Example: Creates a pre-authentication ACL for web authentication. Device(config-wlan)# ipv6 traffic-filter web preauth1 Verifying IPv6 ACL Displaying IPv6 ACLs To display IPv6 ACLs, perform this procedure: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1648 IPv6 Configuration Examples for IPv6 ACL Procedure Step 1 Command or Action enable Example: Step 2 Device> enable configure terminal Example: Device# configure terminal Step 3 Step 4 show access-list Example: Device# show access-lists show ipv6 access-list acl_name Example: Device# show ipv6 access-list [access-list-name] Purpose Enables privileged EXEC mode. Enter your password if prompted. Enters global configuration mode. Displays all access lists configured on the device Displays all configured IPv6 access list or the access list specified by name. Configuration Examples for IPv6 ACL Example: Creating an IPv6 ACL This example configures the IPv6 access list named CISCO. The first deny entry in the list denies all packets that have a destination TCP port number greater than 5000. The second deny entry denies packets that have a source UDP port number less than 5000. The second deny also logs all matches to the console. The first permit entry in the list permits all ICMP packets. The second permit entry in the list permits all other traffic. The second permit entry is necessary because an implicit deny -all condition is at the end of each IPv6 access list. Note Logging is supported only on Layer 3 interfaces. Device(config)# ipv6 access-list CISCO Device(config-ipv6-acl)# deny tcp any any gt 5000 Device (config-ipv6-acl)# deny ::/0 lt 5000 ::/0 log Device(config-ipv6-acl)# permit icmp any any Device(config-ipv6-acl)# permit any any Example: Applying an IPv6 ACL to a Policy Profile in a Wireless Environment This example shows how to apply an IPv6 ACL to a Policy Profile in a Wireless environment. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1649 IPv6 Displaying IPv6 ACLs Note All IPv6 ACLs must be associated to a policy profile. 1. Creating an IPv6 ACL. Device(config)# ipv6 access-list <acl-name> Device(config-ipv6-acl)# permit tcp 2001:DB8::/32 any Device(config-ipv6-acl)# permit udp 2001:DB8::/32 any 2. Applying the IPv6 ACL to a policy profile. Device(config)# wireless profile policy <policy-profile-name> Device(config-wireless-policy)# shutdown Device(config-wireless-policy)# ipv6 acl <acl-name> Device(config-wireless-policy)# no shutdown Displaying IPv6 ACLs To display IPv6 ACLs, perform this procedure: Procedure Step 1 Command or Action show access-list Example: Device# show access-lists Step 2 show ipv6 access-list acl_name Example: Device# show ipv6 access-list [access-list-name] Purpose Displays all access lists configured on the device Displays all configured IPv6 access list or the access list specified by name. Example: Displaying IPv6 ACLs This is an example of the output from the show access-lists privileged EXEC command. The output shows all access lists that are configured on the switch or switch stack. Device #show access-lists Extended IP access list hello 10 permit ip any any IPv6 access list ipv6 permit ipv6 any any sequence 10 This is an example of the output from the show ipv6 access-lists privileged EXEC command. The output shows only IPv6 access lists configured on the switch or switch stack. Device# show ipv6 access-list IPv6 access list inbound permit tcp any any eq bgp (8 matches) sequence 10 permit tcp any any eq telnet (15 matches) sequence 20 permit udp any any sequence 30 IPv6 access list outbound Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1650 IPv6 Example: Configuring RA Throttling deny udp any any sequence 10 deny tcp any any eq telnet sequence 20 Example: Configuring RA Throttling This task describes how to create an RA throttle policy in order to help the power-saving wireless clients from being disturbed by frequent unsolicited periodic RA's. The unsolicited multicast RA is throttled by the controller. Before you begin Enable IPv6 on the client machine. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ipv6 nd ra-throttler policy Mythrottle Example: Device (config)# ipv6 nd ra-throttler policy Mythrottle Creates a RA throttler policy called Mythrottle. Step 3 throttle-period 20 Example: Device (config-nd-ra-throttle)# throttle-period 20 Determines the time interval segment during which throttling applies. Step 4 max-through 5 Example: Device (config-nd-ra-throttle)# max-through 5 Determines how many initial RA's are allowed. Step 5 allow at-least 3 at-most 5 Example: Device (config-nd-ra-throttle)# allow at-least 3 at-most 5 Determines how many RA's are allowed after the initial RAs have been transmitted, until the end of the interval segment. Step 6 switch (config)# vlan configuration 100 Creates a per vlan configuration. Example: Device (config)# vlan configuration 100 Step 7 ipv6 nd ra-th attach-policy attach-policy_name Example: Enables the router advertisement throttling. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1651 IPv6 Example: Configuring RA Throttling Step 8 Command or Action Device (config)# ipv6 nd ra-throttle attach-policy attach-policy_name end Example: Device(config)# end Purpose Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1652 1 5 2 C H A P T E R IPv6 Client Mobility · Information About IPv6 Client Mobility, on page 1653 · Prerequisites for IPv6 Client Mobility, on page 1655 · Monitoring IPv6 Client Mobility, on page 1656 Information About IPv6 Client Mobility Link layer mobility is not enough to make wireless client Layer 3 applications continue to work seamlessly while roaming. Cisco IOSd's wireless mobility module uses mobility tunneling to retain seamless connectivity for the client's Layer 3 PoP (point of presence) when the client roams across different subnets on different switches. IPv6 is the next-generation network layer Internet protocol intended to replace IPv4 in the TCP/IP suite of protocols. This new version increases the internet global address space to accommodate users and applications that require unique global IP addresses. IPv6 incorporates 128-bit source and destination addresses, which provide significantly more addresses than the 32-bit IPv4 addresses. To support IPv6 clients across controllers, ICMPv6 messages must be dealt with specially to ensure the IPv6 client remains on the same Layer 3 network. The device keeps track of IPv6 clients by intercepting the ICMPv6 messages to provide seamless mobility and protect the network from network attacks. The NDP (neighbor discovery packets) packets are converted from multicast to unicast and delivered individually per client. This unique solution ensures that Neighbor Discovery and Router Advertisement packets are not leaked across VLANs. Clients can receive specific Neighbor Discovery and Router Advertisement packets ensuring correct IPv6 addressing to avoid unnecessary multicast traffic. The configuration for IPv6 mobility is the same as IPv4 mobility and requires no separate software on the client side to achieve seamless roaming. The device must be part of the same mobility group. Both IPv4 and IPv6 client mobility are enabled by default. IPv6 client mobility is used for the following: · Retaining the client IPv6 multiple addresses in Layer-2 and Layer-3 roaming. · IPv6 Neighbor Discovery Prootcol (NDP) packet management. · Client IPv6 addresses learning. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1653 IPv6 Using Router Advertisment Note The configuration for IPv6 mobility in SDA wireless and Local mode is the same as of IPv4 mobility and requires no different software configuration on the client side to achieve seamless roaming. Refer to IPv4 mobility section for configuration information. Note If ipv6 address is configured on the SVI, you should configure ipv6 nd ra suppress all command on all client VLAN SVI interfaces on the controller. This prevents multiple devices from advertising themselves as the routers. Using Router Advertisment The Neighbor Discovery Protocol(NDP) operates in the link-layer and is responsible for the discovery of other nodes on the link. It determines the link-layer addresses of other nodes, finds the available routers, and maintains reachability information about the paths to other active neighbor nodes. Router Advertisement (RA) is one of the IPv6 Neighbor Discovery Protocol (NDP) packets that is used by the hosts to discover available routers, acquire the network prefix to generate the IPv6 addresses, link MTU, and so on. The routers send RA on a regular basis, or in response to hosts Router Solicitation messages. IPv6 wireless client mobility manages the IPv6 RA packet . The device forwards the link-local all-nodes multicast RA packets to the local and roaming wireless nodes mapped on same VLAN the RA was received on. Figure 1 illustrates how a roaming client "MN" receives RA from VLAN 200 in a foreign controller and how it acquires an new IP address and breaks into L3 mobility's point of presence. Figure 49: Roaming Client Receives Valid RA from Router 1 Router Advertisement Throttling RA throttling allows the controller to enforce limits to the RA packets headed toward the wireless network. By enabling RA throttling, routers that send multiple RA packets can be trimmed to a minimum frequency that will still maintain an IPv6 client connectivity. If a client sends an RS packet, an RA is sent back to the client. This RA is allowed through the controller and unicast to the client. This process ensures that the new clients or roaming clients are not affected by the RA throttling. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1654 IPv6 IPv6 Address Learning IPv6 Address Learning There are three ways for IPv6 client to acquire IPv6 addresses: · Stateless Address Auto-Configuration (SLAAC) · Stateful DHCPv6 · Static configuration For these methods, the IPv6 client always sends NS DAD (duplicate address detection) to ensure that there is no duplicated IP address on the network. The device snoops the clients NDP and DHCPv6 packets to learn about its client IP addresses and then updates the controllers database. The database then informs the controller for the clients new IP address. Handling Multiple IP Addresses In the case when the new IP address is received after RUN state, whether an addition or removal, the controller updates the new IP addresses on its local database for display purposes. Essentially, the IPv6 uses the existing or same PEM state machine code flow as in IPv4. When the IP addresses are requested by external entities, for example, from Prime Infrastructure, the controller will include all the available IP addresses, IPv4 and IPv6, in the API/SPI interface to the external entities. An IPv6 client can acquire multiple IP addresses from stack for different purposes. For example, a link-local address for link local traffic, and a routable unique local or global address. When the client is in the DHCP request state and the controller receives the first IP address notification from the database for either an IPv4 or IPv6 address, the PEM moves the client into the RUN state. When a new IP address is received after the RUN state, either for addition or removal, the controller updates the new IP addresses on its local database for display purposes. When the IP addresses are requested by external entities, for example, from Prime Infrastructure, the controller provides the available IP addresses, both IPv4 and IPv6, to the external entities. IPv6 Configuration The device supports IPv6 client as seamlessly as the IPv4 clients. The administrator must manually configure the VLANs to enable the IPv6, IPv6's snooping and throttling functionality. This will enable the NDP packets to throttle between the device and its various clients. Prerequisites for IPv6 Client Mobility · To enable wireless IPv6 client connectivity, the underlying wired network must support IPv6 routing and an address assignment mechanism such as SLAAC or DHCPv6. The device must have L2 adjacency to the IPv6 router, and the VLAN needs to be tagged when the packets enter the device. APs do not require connectivity on an IPv6 network, as all traffic is encapsulated inside the IPv4 CAPWAP tunnel between the AP and device. · When using the IPv6 Client Mobility, clients must support IPv6 with either static stateless auto configuration or stateful DHCPv6 IP addressing . Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1655 IPv6 Monitoring IPv6 Client Mobility · To allow smooth operation of stateful DHCPv6 IP addressing, you must have a switch or router that supports the DHCP for IPv6 feature that is configured to act like a DHCPv6 server, or you need a dedicated server such as a Windows 2008 server with a built-in DHCPv6 server. Monitoring IPv6 Client Mobility The commands in Table 1 are used to monitor IPv6 Client mobility on the device. Table 124: Monitoring IPv6 Client Mobility Commands Commands show wireless client summary show wireless client mac-address (mac-addr-detail) Description Displays the wireless specific configuration of active clients. Displays the wireless specific configuration of active clients based on their MAC address. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1656 1 5 3 C H A P T E R IPv6 Support on Flex and Mesh · IPv6 Support on Flex + Mesh Deployment, on page 1657 · Configuring IPv6 Support for Flex + Mesh, on page 1657 · Verifying IPv6 on Flex+Mesh , on page 1659 IPv6 Support on Flex + Mesh Deployment IPv6 is the backhaul transport of the Service Provider. The IPv6 support over flex + mesh feature is now supported on the Cisco Catalyst 9800 Series Wireless Controller . WLAN accepts IPv6 clients and forward the traffic. Configuring IPv6 Support for Flex + Mesh Follow the procedure given below to enable the IPv6 routing on the controller : Procedure Step 1 Step 2 Step 3 Step 4 Command or Action configure terminal Example: Device# configure terminal interface vlan vlan-interface-number Example: Device(config)#interface vlan 89 shutdown Example: Device(config-if)#shutdown ipv6 enable Example: Device(config-if)#ipv6 enable Purpose Enters global configuration mode. Creates an interface and enters the interface configuration mode. Disables the interface configuration. Optional. Enables IPv6 on the interface. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1657 IPv6 Configuring Preferred IP Address as IPv6 (GUI) Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action ipv6 address X:X:X:X::X/<0-128> Example: Device(config-if)#ipv6 address 1:1:1:1::1/64 Purpose Configures IPv6 address on the interface using the IPv6 prefix option. no shutdown Example: Device(config-if)#no shutdown Enables the IPv6 address. no shutdown Example: Device(config-if)#no shutdown Enables the PIM dense-mode operation. end Example: Device(config-if)#end Returns to privileged EXEC mode. show ipv6 interface brief Example: Device#show ipv6 interface brief Verifies your entries. ping ipv6 destination-address or hostname Example: Device#ping ipv6 1:1:1:1::10 Checks the gateway connectivity. Configuring Preferred IP Address as IPv6 (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > AP Join. Click the AP Join Profile Name. The Edit AP Join Profile window is displayed. Choose CAPWAP > Advanced. From the Preferred Mode drop-down list, select IPV6. Click Update & Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1658 IPv6 Configuring Preferred IP Address as IPv6 Configuring Preferred IP Address as IPv6 Procedure Step 1 Command or Action Configure Terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap profile default-ap-profile Example: Device(config)# ap profile default-ap-profile Enters AP profile configuration mode. Step 3 preferred-mode ipv6 Uses IPv6 to join the controller . Example: Device(config-ap-profile)# preferred-mode ipv6 Step 4 end Example: Device(config-ap-profile)# end Exits the configuration mode and returns to privileged EXEC mode. Verifying IPv6 on Flex+Mesh To verify the IPv6 configuration on the controller , use the following show command: Device#show ip interface brief Interface IP-Address OK? Method Status Protocol GigabitEthernet2 unassigned YES unset up up GigabitEthernet0 unassigned YES NVRAM administratively down down Capwap1 unassigned YES unset up up Capwap2 unassigned YES unset up up Vlan1 unassigned YES NVRAM administratively down down Vlan89 9.10.89.90 YES NVRAM up up Ewlc-9.10.89.90#show running-config interface vlan 89 Building configuration... Current configuration : 120 bytes ! interface Vlan89 ip address 9.10.89.90 255.255.255.0 ip helper-address 9.1.0.100 no mop enabled no mop sysid end Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1659 IPv6 Verifying IPv6 on Flex+Mesh Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1660 1 5 4 C H A P T E R IPv6 CAPWAP UDP Lite Support · Information About UDP Lite, on page 1661 · Enabling UDP Lite Support, on page 1661 · Verifying UDP Lite Support Configuration, on page 1662 Information About UDP Lite The UDP Lite Support feature, which is an enhancement to the existing IPv6 functionality, supports the UDP Lite protocol. This feature is only applicable to the IPv6 addresses of the controller and APs. IPv6 mandates complete payload checksum for UDP. The UDP Lite Support feature minimises the performance impact on the controller and AP by restricting the checksum calculation coverage for the UDP Lite header to 8 bytes only. The use of the UDP Lite Support feature impacts intermediate firewalls to allow UDP Lite protocol (protocol ID of 136) packets. Existing firewalls might not provide the option to open specific ports on UDP Lite protocol. In such cases, the administrator must open up all the ports on UDP Lite. Restrictions for UDP Lite Support · Mobility IPv6 tunnels do not support the UDP Lite Support feature. Enabling UDP Lite Support The following procedure describes the steps involved in enabling UDP Lite for an AP profile. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap profile ap-profile Example: Purpose Enters global configuration mode. Configures an AP profile and enters AP profile configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1661 IPv6 Verifying UDP Lite Support Configuration Step 3 Step 4 Command or Action Device(config)# ap profile default-ap-profile Purpose capwap udplite Enables IPv6 CAPWAP UDP Lite on the AP. Example: Note Device(config-ap-profile)# capwap udplite The following message is displayed after the configuration: This feature is supported only for IPv6 data packets, APs will be rebooted. end Example: Device(config-ap-profile)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Verifying UDP Lite Support Configuration To verify the CAPWAP UDP Lite status, use the following command: Device# show ap profile name default-ap-profile detailed CAPWAP UDP-Lite : ENABLED Lawful-Interception : ENABLED LI timer : 60 AWIPS : DISABLED AWIPS Forensic : Unknown Client RSSI Statistics Reporting : ENABLED Reporting Interval : 30 seconds Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1662 1 5 5 C H A P T E R Neighbor Discovery Proxy · Information About Neighbor Discovery, on page 1663 · Configure Neighbor Discovery Proxy (CLI), on page 1663 · Configure Duplicate Address Detection Proxy (CLI), on page 1664 Information About Neighbor Discovery In IPv6 networks, Neighbor Discovery Protocol (NDP) uses ICMPv6 messages and solicited-node multicast addresses to track and discover the other IPv6 hosts present on the other side of connected interfaces. As part of this process, a host queries for other node link-layer addresses to verify neighbor reachability using Neighbor Solicitation (NS) messages. In response to the NS messages, a Neighbor Advertisement (NA) is sent to provide information to neighbors. Configure Neighbor Discovery Proxy (CLI) Neighbor Discovery (ND) Proxy is the ability of the controller to respond to the Neighbor Solicitation packet destined for wireless clients. During Neighbor Discovery suppression, the controller checks if proxy is enabled for the destined wireless clients. If proxy is enabled, the controller drops the Neighbor Solicitation packet and generates a response to the Neighbor Solicitation source in such a way that the packet appears to be coming from a wireless client. This helps in limiting the traffic to the wireless clients. If Neighbor Discovery Proxy is not enabled, the multicast Neighbor Solicitation is converted into unicast Neighbor Solicitation with the MAC address of the target client and is forwarded to that client. Note · Neighbor Discovery proxy is applicable only in central switching mode. · A controller does not proxy the Neighbor Solicitation packet if the destination address is not that of a wireless client. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1663 IPv6 Configure Duplicate Address Detection Proxy (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy policy-profile-name Example: Configures WLAN policy profile and enters wireless policy configuration mode. Device(config)# wireless profile policy policy-profile1 Step 3 ipv6 nd proxy full-proxy Enables ND proxy. Example: Device(config-wireless-policy)# ipv6 nd proxy full-proxy Configure Duplicate Address Detection Proxy (CLI) The IPv6 Duplicate Address Detection (DAD) feature ensures that all the IP addresses assigned on a particular segment are unique. A proxy is required to ensure that multicast and unicast packets are not sent towards the wireless device for which it is enabled. DAD verifies whether the host address is unique. The IPv6 DAD Proxy feature responds on behalf of the address owner when an address is in use. However, in a scenario where nodes are restricted from talking to each other at Layer 2, DAD cannot detect a duplicate address. If DAD proxy is disabled, the multicast packet is converted into unicast and is sent to the target client. Note · DAD proxy is applicable only in central switching mode. · A controller does not proxy the DAD NS packet if the destination address is not that of a wireless client. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy policy-profile-name Example: Configures a WLAN policy profile and enters wireless policy configuration mode. Device(config)# wireless profile policy policy-profile1 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1664 IPv6 Configure Duplicate Address Detection Proxy (CLI) Step 3 Command or Action Purpose ipv6 nd proxy dad-proxy Enables DAD proxy. Example: Note Device(config-wireless-policy)# ipv6 nd proxy dad-proxy Full proxy configuration is a superset of ND proxy and DAD proxy configuration. Hence, use the ipv6 nd proxy full-proxy command also to enable DAD proxy. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1665 IPv6 Configure Duplicate Address Detection Proxy (CLI) Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1666 1 5 6 C H A P T E R Address Resolution Protocol Proxy · Information About Address Resolution Protocol, on page 1667 · Configure Address Resolution Protocol Proxy (CLI), on page 1667 Information About Address Resolution Protocol The address resolution protocol (ARP) is a protocol used by the Internet Protocol (IP) [RFC826], specifically IPv4, to map IP network addresses to the hardware addresses used by a data link protocol. When a wireless client sends an ARP request for an IP address of interest, the controller performs a search for that address in its database. If an entry is found in the controller database, then the ARP is converted to unicast and forwarded to that particular client. If there is no entry in the controller's database, the ARP request is flooded out to the VLAN wired ports. Configure Address Resolution Protocol Proxy (CLI) ARP Proxy is the ability of the controller to respond to the ARP request packet destined for the wireless clients. During broadcast suppression, the controller checks if proxy is enabled for the destined wireless clients. If proxy is enabled, the controller drops the ARP request packet and generates a response to the source of the ARP request in a way that the packet appears to be coming from the wireless client. This helps in limiting the traffic to the wireless clients. If ARP Proxy is not enabled, the broadcast ARP request is converted into an unicast ARP request with the MAC address of the target client, and is forwarded to only that client. Note · Proxy ARP is applicable only in central switching mode. · A device will not proxy the ARP request if the destination address is not that of a wireless client. Procedure Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1667 IPv6 Configure Address Resolution Protocol Proxy (CLI) Step 2 Step 3 Command or Action Device# configure terminal Purpose wireless profile policy policy-profile-name Example: Configures a WLAN policy profile and enters wireless policy configuration mode. Device(config)# wireless profile policy policy-profile1 ipv4 arp-proxy Example: Device(config-wireless-policy)# ipv4 arp-proxy Enables ARP proxy. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1668 1 5 7 C H A P T E R IPv6 Ready Certification · Feature History for IPv6-Ready Certification, on page 1669 · IPv6 Ready Certification, on page 1669 · Configuring IPv6 Route Information, on page 1670 · Verifying IPv6 Route Information, on page 1670 Feature History for IPv6-Ready Certification This table provides release and related information for the feature explained in this module. This feature is available in all the releases subsequent to the one in which it is introduced in, unless noted otherwise. Table 125: Feature History for IPv6-Ready Certification Release Feature Cisco IOS XE Bengaluru 17.6.1 IPv6-Ready Certification Feature Information This feature is enhanced with the implementation of various IPv6 functionalities that are required to comply with the latest RFC specifications. IPv6 Ready Certification Cisco IOS XE Bengaluru, 17.6.1 has implemented various IPv6 functionalities that are required for compliance with the latest RFC specifications for IPv6 Ready Certification. The newly implemented IPv6 functionalities are: · Fragment Processing and Reassembly (RFC8200): The first fragment must contain the mandatory extension header up to the first upper level protocol (ULP) header as specified in RFC 8200. · Handling Atomic Fragments in Neighbor Discovery (RFC6980): Fragmented neighbor discovery packets must be dropped. · Packet too Big (RFC8201): Atomic fragmentation is not supported. Packets failing to meet the IPv6 MTU requirement of 1280 are dropped. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1669 IPv6 Configuring IPv6 Route Information · Route Information Options (RIO) in IPv6 Router Advertisements (RFC4191): A new RIO is added to the IPv6 Router Advertisement message for communicating specific routes from routers to hosts. Explicit route configuration ensures that only necessary routes are advertised to the hosts. · IPv6 Hop-by-Hop Processing (RFC 8200): This enhancement allows explicit configuration of the nodes, along the delivery path of the packets that require hop-by-hop options header processing. Configuring IPv6 Route Information The Route Information Option (RIO) in the IPv6 router advertisement messages helps in communicating specific routes from routers to hosts. This improves a host's ability to pick up an appropriate default router, when the host is multihomed and the routers are on different links. The explicit route configuration ensures that only necessary routes are advertised to the hosts. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 interface interface Example: Device(config)# interface gigabitethernet1.1 Specifies the interface and enters interface configuration mode. Step 3 ipv6 nd ra specific-route prefix/length lifetime Configures RIO in IPv6 router advertisement lifetime/infinity [preference preference ] messages. Example: Device(config-if)# ipv6 nd ra specific-route 3::3/116 lifetime 11 preference medium For more information, see the ipv6 nd ra specific route command. Verifying IPv6 Route Information To identify the specific routes that are sent in the router advertisements, use the following command: Device# show ipv6 nd ra specific-route IPv6 Prefix/Length Lifetime Preference Interface ------------------------------------------- -------- ---------- --------1234::12/127 1000 High GigabitEthernet2 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1670 X I I PA R T CleanAir · Cisco CleanAir, on page 1673 · Bluetooth Low Energy, on page 1691 · Persistent Device Avoidance, on page 1695 · Spectrum Intelligence, on page 1699 · Spectrum Analysis, on page 1703 1 5 8 C H A P T E R Cisco CleanAir · Information About Cisco CleanAir, on page 1673 · Prerequisites for CleanAir, on page 1676 · Restrictions for CleanAir, on page 1677 · How to Configure CleanAir, on page 1677 · CleanAir Pro Scanning, on page 1685 · Verifying CleanAir Parameters, on page 1688 · Configuration Examples for CleanAir, on page 1689 · CleanAir FAQs, on page 1690 Information About Cisco CleanAir Cisco CleanAir is a solution designed to proactively manage the challenges of a shared wireless spectrum. It allows you to see all the users of a shared spectrum (both native devices and foreign interferers). It also enables the network to act upon this information. For example, you can manually remove the interfering device, or the system can automatically change the channel away from the interference. CleanAir provides spectrum management and Radio Frequency (RF) visibility. A Cisco CleanAir system consists of CleanAir-enabled access points and Cisco Catalyst 9800 Series Wireless Controller . These access points collect information about all the devices that operate in the industrial, scientific, and medical (ISM) bands, identify and evaluate the information as a potential interference source, and forward it to the controller . The controller controls the access points and displays the interference devices. For every device operating in the unlicensed band, Cisco CleanAir provides information about what it is, how it is impacting your wireless network, and what actions you or your network should take. It simplifies RF so that you do not have to be an RF expert. Wireless LAN systems operate in unlicensed 2.4-GHz and 5-GHz ISM bands. Many devices, such as microwave ovens, cordless phones, and Bluetooth devices also operate in these bands and can negatively affect the Wi-Fi operations. Some of the most advanced WLAN services, such as voice-over-wireless and IEEE 802.11 radio communications, might be significantly impaired by the interference caused by other legal users of the ISM bands. The integration of Cisco CleanAir functionality addresses this problem of RF interference. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1673 Cisco CleanAir-Related Terms CleanAir Cisco CleanAir-Related Terms Table 126: CleanAir-Related Terms Term AQI AQR DC EDRRM IDR ISI RSSI Decription Air Quality Index. The AQI is an indicator of air quality, based on the air pollutants. An AQI of 0 is bad and an AQI > 85 is good. Air Quality Report. AQRs contain information about total interference from all the identified sources represented by AQI and the summary of the most severe interference categories. AQRs are sent every 15 minutes to the Mobility Controller and every 30 seconds in the Rapid mode. Duty Cycle. Percentage of time that the channel is utilized by a device. Event-Driven RRM. EDRRM allows an access point in distress to bypass normal RRM intervals and immediately change channels. Interference Device Reports that an access point sends to the controller . Interference Severity Index. The ISI is an indicator of the severity of the interference. Received Signal Strength Indicator. RSSI is a measurement of the power present in a received radio signal. It is the power at which an access point sees the interferer device. Cisco CleanAir Components The basic Cisco CleanAir architecture consists of Cisco CleanAir-enabled APs and device. Figure 50: Cisco CleanAir Solution An access point equipped with Cisco CleanAir technology collects information about Wi-Fi interference sources and processes it. The access point collects and sends the Air Quality Report (AQR) and Interference Device Report (IDR) to the controller . The controller controls and configures CleanAir-capable access points, and collects and processes spectrum data. The controller provides local user interfaces (GUI and CLI) to configure basic CleanAir features and services and display current spectrum information. The controller also detects, merges, and mitigates interference devices using RRM TPC and DCA For details, see Interference Device Merging. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1674 CleanAir Interference Types that Cisco CleanAir can Detect The device performs the following tasks in a Cisco CleanAir system: · Configures Cisco CleanAir capabilities on the access point. · Provides interfaces (GUI and CLI) for configuring Cisco CleanAir features and retrieving data. · Displays spectrum data. · Collects and processes AQRs from the access point and stores them in the air quality database. AQRs contain information about the total interference from all the identified sources represented by the Air Quality Index (AQI) and the summary for the most severe interference categories. The CleanAir system can also include unclassified interference information under per-interference type reports that enable you to take action in scenarios where interference because of unclassified interfering devices is more. · Collects and processes IDRs from the access point and stores them in the interference device database. Note When Cisco CleanAir is disabled and Spectrum Intelligence (SI) is enabled in the controller, both CleanAir and Air Quality reporting are disabled. In spite of this, Air Quality is still populated for SI APs and viewed as disabled when show ap dot11 5ghz/24ghz cleanair config command is executed. This is an expected behaviour as SI APs report Air Quality. Here, Spectrum intelligence is a subset of CleanAir features. For more information on Spectrum Intelligence, see the Spectrum Intelligence Deployment Guide. Interference Types that Cisco CleanAir can Detect Cisco CleanAir access points can detect and report severity of the interference. Spectrum event-driven RRM is one such mitigation strategy. Wi-Fi chip-based RF management systems share these characteristics: · Any RF energy that cannot be identified as a Wi-Fi signal is reported as noise. · Noise measurements that are used to assign a channel plan tend to be averaged over a period of time to avoid instability or rapid changes that can be disruptive to certain client devices. · Averaging measurements reduces the resolution of the measurement. As such, a signal that disrupts clients might not look like it needs to be mitigated after averaging. · All RF management systems available today are reactive in nature. Cisco CleanAir is different and can positively identify not only the source of the noise but also its potential impact to a WLAN. Having this information allows you to consider the noise within the context of the network and make intelligent and, where possible, proactive decisions. Spontaneous interference event is commonly used for CleanAir. Note Spectrum event-driven RRM can be triggered only by Cisco CleanAir-enabled access points in local mode. Spontaneous interference is interference that appears suddenly on a network, perhaps jamming a channel or a range of channels completely. The Cisco CleanAir spectrum event-driven RRM feature allows you to set a threshold for air quality (AQ) which, if exceeded, triggers an immediate channel change for the affected access Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1675 EDRRM and AQR Update Mode CleanAir point. Most RF management systems can avoid interference, but this information takes time to propagate through the system. Cisco CleanAir relies on AQ measurements to continuously evaluate the spectrum and can trigger a move within 30 seconds. For example, if an access point detects interference from a video camera, it can recover by changing channels within 30 seconds of the camera becoming active. Cisco CleanAir also identifies and locates the source of interference so that more permanent mitigation of the device can be performed at a later time. Microwave Ovens, Outdoor Ethernet bridges are two classes of devices that qualify as persistent, since once detected, it is likely that these devices will continue to be a random problem and are not likely to move. For these types of devices we can tell RRM of the detection and Bias the affected channel so that RRM "remembers" that there is a high potential for client impacting interference for the Detecting AP on the detected channel. For more information, see https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/8-3/b_RRM_ White_Paper/b_RRM_White_Paper_chapter_0100.html?bookSearch=true#id_15217. CleanAir PDA devices include: · Microwave Oven · WiMax Fixed · WiMax Mobile · Motorola Canopy In the case of Bluetooth devices, Cisco CleanAir-enabled access points can detect and report interference only if the devices are actively transmitting. Bluetooth devices have extensive power-save modes. For example, interference can be detected when data or voice is being streamed between the connected devices. EDRRM and AQR Update Mode EDRRM is a feature that allows an access point that is in distress to bypass normal RRM intervals and immediately change channels. A CleanAir access point always monitors AQ and reports the AQ every 15 minutes. AQ only reports classified interference devices. The key benefit of EDRRM is fast action time. If an interfering device is operating on an active channel and causes enough AQ degradation to trigger an EDRRM, then no clients will be able to use that channel or the access point. You must remove the access point from the channel. EDRRM is not enabled by default, you must first enable CleanAir and then enable EDRRM. Prerequisites for CleanAir You can configure Cisco CleanAir only on CleanAir-enabled access points. Only Cisco CleanAir-enabled access points using the following access point modes can perform Cisco CleanAir spectrum monitoring: · Local--In this mode, each Cisco CleanAir-enabled access point radio provides air quality and interference detection reports for the current operating channel only. An AP can only measure air quality and interference when the AP is not busy transmitting Wi-Fi frames. This implies that CleanAir detections will be drastically lower if the AP is having a high channel utilization. · FlexConnect--When a FlexConnect access point is connected to the controller , its Cisco CleanAir functionality is identical to local mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1676 CleanAir Restrictions for CleanAir · Monitor--When Cisco CleanAir is enabled in monitor mode, the access point provides air quality and interference detection reports for all monitored channels. The following options are available: · All--All channels · DCA--Channel selection governed by the DCA list · Country--All channels are legal within a regulatory domain Restrictions for CleanAir · Access points in monitor mode do not transmit Wi-Fi traffic or 802.11 packets. They are excluded from radio resource management (RRM) planning and are not included in the neighbor access point list. IDR clustering depends on the device's ability to detect neighboring in-network access points. Correlating interference device detections from multiple access points is limited between monitor-mode access points. · For 4800 AP slot 1 5 GHz is dedicated and cannot be individually moved to monitor mode. However, slot 0 is XOR and can be moved to monitor as well as 2.4/5 GHz. Slot 2 is dedicated monitor and will operate in 5GHz and in AP monitor mode, slot 2 will be disabled because a monitor radio is already available in both 2.4/5GHz. 3700 AP has dedicated 2.4GHz (slot0) and 5GHz (slot1). · Do not connect access points in SE connect mode directly to any physical port on the controller. · CleanAir is not supported wherein the channel width is 160 MHz. How to Configure CleanAir Enabling CleanAir for the 2.4-GHz Band (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Radio Configurations > CleanAir On the CleanAir page, click the me2.4 GHz Band > General tab. Check the Enable CleanAir checkbox. Click Apply. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1677 Enabling CleanAir for the 2.4-GHz Band (CLI) CleanAir Enabling CleanAir for the 2.4-GHz Band (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 24ghz cleanair Example: Enables the CleanAir feature on the 802.11b network. Run the no form of this command to disable CleanAir on the 802.11b network. Device(config)#ap dot11 24ghz cleanair Device(config)#no ap dot11 24ghz cleanair Step 3 end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Interference Reporting for a 2.4-GHz Device (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Radio Configurations > CleanAir. Click the 2.4 GHz Band tab. Choose the interference types and add them to the Interference Types to detect section. The following interference types are available: · BLE Beacon--Bluetooth low energy beacon · Bluetooth Discovery · Bluetooth Link · Canopy · Continuous Transmitter · DECT-like Phone--Digital Enhanced Cordless Technology phone · 802.11 FH--802.11 frequency hopping device · WiFi Inverted--Device using spectrally inverted Wi-Fi signals · Jammer · Microwave Oven Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1678 CleanAir Configuring Interference Reporting for a 2.4-GHz Device (CLI) Step 4 · WiFi Invalid Channel--Device using nonstandard Wi-Fi channels · TDD Transmitter · Video Camera · SuperAG--802.11 SuperAG device · WiMax Mobile · WiMax Fixed · 802.15.4 · Microsoft Device · SI_FHSS Click Apply. Configuring Interference Reporting for a 2.4-GHz Device (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 24ghz cleanair device{ble-beacon | Configures the 2.4-GHz interference devices to bt-discovery | bt-link | canopy | cont-tx | report to the device. Run the no form of this dect-like | fh | inv | jammer | mw-oven | command to disable the configuration. nonstd | report | superag | tdd-tx | video | wimax-fixed | wimax-mobile | xbox | zigbee } The following is a list of the keyword descriptions: Example: · ble-beacon--Bluetooth low energy beacon · bt-discovery--Bluetooth discovery Device(config)# ap dot11 24ghz cleanair device ble-beacon · bt-link--Bluetooth link Device(config)# ap dot11 24ghz cleanair device bt-discovery · canopy--Canopy device · cont-tx--Continuous transmitter Device(config)# ap dot11 24ghz cleanair device bt-link · dect-like--Digital Enhanced Cordless Communication-like phone Device(config)# ap dot11 24ghz cleanair device canopy Device(config)# ap dot11 24ghz cleanair device cont-tx · fh--802.11-frequency hopping device · inv--Device using spectrally inverted Wi-Fi signals Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1679 Enabling CleanAir for the 5-GHz Band (GUI) CleanAir Step 3 Command or Action Purpose Device(config)# ap dot11 24ghz cleanair device dect-like Device(config)# ap dot11 24ghz cleanair device fh Device(config)# ap dot11 24ghz cleanair device inv · jammer--Jammer · mw-oven--Microwave oven · nonstd--Device using nonstandard Wi-Fi channels · report--Interference device reporting Device(config)# ap dot11 24ghz cleanair device jammer Device(config)# ap dot11 24ghz cleanair device mw-oven · superag--802.11 SuperAG device · tdd-tx--TDD transmitter · video--Video camera Device(config)# ap dot11 24ghz cleanair device nonstd Device(config)# ap dot11 24ghz cleanair device report · wimax-fixed--WiMax Fixed · wimax-mobile--WiMax Mobile · microsoft xbox--Microsoft Xbox device Device(config)# ap dot11 24ghz cleanair · zigbee--802.15.4 device device superag Device(config)# ap dot11 24ghz cleanair device tdd-tx Device(config)# ap dot11 24ghz cleanair device video Device(config)# ap dot11 24ghz cleanair device wimax-fixed Device(config)# ap dot11 24ghz cleanair device wimax-mobile Device(config)# ap dot11 24ghz cleanair device xbox Device(config)# ap dot11 24ghz cleanair device zigbee Device(config)# ap dot11 24ghz cleanair device alarm end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Enabling CleanAir for the 5-GHz Band (GUI) Procedure Step 1 Choose Configuration > Radio Configurations > CleanAir Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1680 CleanAir Enabling CleanAir for the 5-GHz Band (CLI) Step 2 Step 3 Step 4 On the CleanAir page, click the me5 GHz Band > General tab. Check the Enable CleanAir checkbox. Click Apply. Enabling CleanAir for the 5-GHz Band (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 5ghz cleanair Example: Device(config)#ap dot11 5ghz cleanair Enables the CleanAir feature on a 802.11a network. Run the no form of this command to disable CleanAir on the 802.11a network. Device(config)#no ap dot11 5ghz cleanair Step 3 end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Interference Reporting for a 5-GHz Device (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Radio Configurations > CleanAir. Click the 5 GHz Band tab. Choose the interference types and add them to the Interference Types to detect section. The following interference types are available: · Canopy · Continuous Transmitter · DECT-like Phone--Digital Enhanced Cordless Technology phone · 802.11 FH--802.11 frequency hopping device · WiFi Inverted--Device using spectrally inverted Wi-Fi signals · Jammer · WiFi Invalid Channel--Device using nonstandard Wi-Fi channels Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1681 Configuring Interference Reporting for a 5-GHz Device (CLI) CleanAir Step 4 · SuperAG--802.11 SuperAG device · TDD Transmitter · WiMax Mobile · WiMax Fixed · Video Camera Click Apply. Configuring Interference Reporting for a 5-GHz Device (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 5ghz cleanair device{canopy | Configures a 5-GHz interference device to cont-tx | dect-like | inv | jammer | nonstd | report to the device. Run the no form of this report | superag | tdd-tx | video | wimax-fixed command to disable interference device | wimax-mobile} reporting. Example: The following is a list of the keyword descriptions: Device(config)#ap dot11 5ghz cleanair device canopy Device(config)#ap dot11 5ghz cleanair device cont-tx Device(config)#ap dot11 5ghz cleanair device dect-like Device(config)#ap dot11 5ghz cleanair device inv · canopy--Canopy device · cont-tx--Continuous transmitter · dect-like--Digital Enhanced Cordless Communication-like phone · fh--802.11-frequency hopping device · inv--Device using spectrally-inverted Wi-Fi signals Device(config)#ap dot11 5ghz cleanair device jammer Device(config)#ap dot11 5ghz cleanair device nonstd · jammer--Jammer · nonstd--Device using nonstandard Wi-Fi channels · superag--802.11 SuperAG device Device(config)#ap dot11 5ghz cleanair device report Device(config)#ap dot11 5ghz cleanair device superag · tdd-tx--TDD transmitter · video--Video camera · wimax-fixed--WiMax fixed Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1682 CleanAir Configuring Event Driven RRM for a CleanAir Event (GUI) Step 3 Command or Action Device(config)#ap dot11 5ghz cleanair device tdd-tx Purpose · wimax-mobile--WiMax mobile Device(config)#ap dot11 5ghz cleanair device video Device(config)#ap dot11 5ghz cleanair device wimax-fixed Device(config)#ap dot11 5ghz cleanair device wimax-mobile Device(config)#ap dot11 5ghz cleanair device si_fhss Device(config)#ap dot11 5ghz cleanair device alarm end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Event Driven RRM for a CleanAir Event (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Radio Configurations > RRM. The Radio Resource Management page is displayed. Click the DCA tab. In the Event Driven RRM section, check the EDRRM check box to run RRM when CleanAir-enabled AP detects a significant level of interference. Configure the Sensitivity Threshold level at which RRM has to be invoked from the following options: · Low: Represents a decreased sensitivity to changes in the environment and its value is set at 35. · Medium: Represents medium sensitivity to changes in the environment at its value is set at 50. · High: Represents increased sensitivity to changes in the environment at its value is set at 60. · Custom: If you choose this option, you must specify a custom value in the Custom Threshold box. To configure rogue duty cycle, check the Rogue Contribution check box and then specify the Rogue Duty-Cycle in terms of percentage. The default value of rogue duty cycle is 80 percent. Note Rogue Contribution is a new component included in ED-RRM functionality. Rogue Contribution allows ED-RRM to trigger based on identified Rogue Channel Utilization, which is completely separate from CleanAir metrics. Rogue Duty Cycle comes from normal off channel RRM metrics, and invokes a channel change based on neighboring rogue interference. Because this comes from RRM metrics and not CleanAir, the timing - assuming normal 180 second off channel intervals - would be within 3 minutes or 180 seconds worst case. It is configured separately from CleanAir ED-RRM and is disabled by default. This allows the AP to become reactive to Wi-Fi interference that is not coming from own network and is measured at each individual AP. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1683 Configuring EDRRM for a CleanAir Event (CLI) CleanAir Step 6 Save the configuration. Configuring EDRRM for a CleanAir Event (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap dot11 {24ghz | 5ghz} rrm channel cleanair-event Example: Purpose Enters global configuration mode. Enables EDRRM CleanAir event. Run the no form of this command to disable EDRRM. Step 3 Device(config)#ap dot11 24ghz rrm channel cleanair-event Device(config)#no ap dot11 24ghz rrm channel cleanair-event ap dot11 {24ghz | 5ghz} rrm channel cleanair-event [sensitivity {custom | high | low | medium}] Example: Configures the EDRRM sensitivity of the CleanAir event. The following is a list of the keyword descriptions: Device(config)#ap dot11 24ghz rrm channel cleanair-event sensitivity high · Custom--Specifies custom sensitivity to non-WiFi interference as indicated by the AQ value. · High--Specifies the most sensitivity to non-WiFi interference as indicated by the AQ value. · Low--Specifies the least sensitivity to non-WiFi interference as indicated by the AQ value. · Medium--Specifies medium sensitivity to non-WiFi interference as indicated by the AQ value. Step 4 end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1684 CleanAir CleanAir Pro Scanning CleanAir Pro Scanning Feature History for CleanAir Pro Scanning This table provides release and related information about the feature explained in this section. This feature is also available in all the releases subsequent to the one in which they are introduced in, unless noted otherwise. Table 127: Feature History for CleanAir Pro Scanning Release Feature Feature Information Cisco IOS XE Cupertino CleanAir Pro Scanning The CleanAir Pro Scanning feature monitors and reports 17.9.1 the different categories of non-Wi-Fi interference in the 2.4-GHz and 5-GHz bands. Cisco IOS XE Dublin 17.10.1 CleanAir Support for 6-GHz The CleanAir is enabled in 6-GHz band radio of AP only if CleanAir is enabled globally in 6-GHz band in the controller and 6-GHz radio of individual AP. Information About CleanAir Pro Scanning CleanAir Pro Scanning monitors and provides reports on the different categories of non-Wi-Fi interference, for the 2.4-GHz, 5-GHz, and 6-GHz band. The CleanAir Pro Scanning feature reports the type of intereferer, the severity of the interference, and the impacted channels, to the controller, through the Interference Device Reports (IDRs). The air quality (AQ) metric report for each Dynamic Channel Assignment (DCA) channel, contains all the detected non-Wi-Fi interferers and the severity of each interferer. Note The CleanAir Pro Scanning feature is applicable only for APs with CleanAir Pro-supported radios. The controller maintains a database of the active interferers reported from each AP. The controller merges interferers across APs if the same interferer is observed across APs. The controller tracks the air quality for each channel and uses the air quality metric report in the channel selection for each AP. CleanAir Pro Scanning scans channels in slots or bands that are currently enabled on an AP. Channel enablement under DCA is applicable only if you selected the dca keyword under the ap dot11 rrm monitor channel-list command. The country keyword monitors the regulatory channels, and the all keyword monitors all channels (everything that the radio can scan, regardless of regulatory constraints). Interference Device Reports (IDR) Each AP detects non-Wi-Fi interferers, the duty cycle, Received Signal Strength Indicator (RSSI) in dBm, and a calculated metric known as Severity. These details are sent to the controller through the Interference Device Report (IDR) messages. The IDR event types, such as UP, UPDT, and DOWN, inform the controller about when each interferer was first detected (UP), when the interferer was updated (UPDT),and when it is Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1685 Enabling CleanAir Pro Scanning (CLI) CleanAir no longer seen (DOWN). The controller keeps a list of these interferers along with key information, including the channels that are impacted by the interferer on a per-AP basis. In an AP, interferers are merged with those that are detected on the same channel, same RSSI, and same device signature. This merge occurs on a controller across APs reporting the same type of interferer. Air Quality Index Reports The Air Quality (AQ) metric is calculated for each AP, and is the inverse of the cumulative severity metrics. AQ starts at 100 (good) and is decremented by each reported interference source severity metric. For example, if three Bluetooth devices are reported by an AP, each with a severity or two, this will result in the overall cell AQ of 94 (2x3 BT = 6, 100 6 = AQ of 94). Note Cisco IOS XE Cupertino 17.9.1 supports 6-GHz only for spectral analysis on Cisco DNA Center. IDR and AQ are not supported for the 6-GHz band in Cisco IOS XE Cupertino 17.9.1. Enabling CleanAir Pro Scanning (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 {24ghz | 5ghz | 6ghz} cleanair Example: Configures the CleanAir features for the 2.4-GHz , 5-GHz, or 6-GHz radios. Device(config)# ap dot11 24ghz cleanair Step 3 Step 4 Step 5 ap dot11 {24ghz | 5ghz | 6ghz} cleanair alarm Configures CleanAir alarm for air quality in the air-quality 2.4-GHz , 5-GHz, or 6-GHz radios. Example: Device(config)# ap dot11 24ghz cleanair alarm air-quality ap dot11 {24ghz | 5ghz | 6ghz} cleanair alarm Configures the air quality threshold value of air-quality threshold threshold-value CleanAir alarm in the 2.4-GHz , 5-GHz, or Example: 6-GHz radios. The valid range is between 1 and 100. Device(config)# ap dot11 24ghz cleanair alarm air-quality threshold 25 ap dot11 {24ghz | 5ghz | 6ghz} cleanair alarm Configures the continuous transmitter as the device cont-tx interference device CleanAir alarm in the Example: 2.4-GHz , 5-GHz, or 6-GHz radios. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1686 CleanAir Monitoring CleanAir Pro Statistics (GUI) Step 6 Step 7 Step 8 Command or Action Purpose Device(config)# ap dot11 24ghz cleanair alarm device cont-tx ap dot11 {24ghz | 5ghz | 6ghz} cleanair alarm Configures the air quality alarm on exceeding unclassified unclassified category severity. Example: Device(config)# ap dot11 24ghz cleanair alarm unclassified ap dot11 {24ghz | 5ghz | 6ghz} cleanair alarm Configures the air quality alarm on exceeding unclassified threshold threshold-value unclassified category severity threshold. The Example: valid range is between 1 and 100. Device(config)# ap dot11 24ghz cleanair alarm unclassified threshold 15 ap dot11 {24ghz | 5ghz | 6ghz} cleanair device Configure continuous transmitter as the cont-tx CleanAir interference device type. Example: Device(config)# ap dot11 24ghz cleanair device cont-tx Monitoring CleanAir Pro Statistics (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Monitoring > Wireless > CleanAir Statistics. The CleanAir Statistics window is displayed. Click the 2.4 GHz Band, 5 GHz Band, or 6 GHz Band tab. The CleanAir Interference Devices tab is selected by default. You can monitor and detect the cluster IDs, the interferer type, severity, the affected channels, and so on, for the listed APs. Click the listed devices under the CleanAir Interference Devices tab to view the CleanAir Interference Charts that displays the AQ Graph and the Interference Power. Click the Air Quality tab to monitor the channel, the average and minimum AQ, number of interferers, the time at which the interference was detected, and the spectrum AP type. Click the Worst Air Quality Report tab to view the AQ report, with details of the AP that reported the worst AQ, the radio channel number with the worst-reported air quality, the minimum and the average AQ index, the interference device count, and the spectrum AP type. Verifying CleanAir Pro Scanning Details To view the CleanAir Air Quality (AQ) data, run the following command: Device# show ap dot11 {24ghz | 5ghz | 6ghz} cleanair air-quality summary To view the CleanAir Air Quality (AQ) worst data, run the following command: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1687 Verifying CleanAir Parameters CleanAir Device# show ap dot11 {24ghz | 5ghz | 6ghz} cleanair air-quality worst To view the CleanAir device cluster information, run the following command: Device# show ap dot11 {24ghz | 5ghz | 6ghz} cleanair device cluster cluster-id To view the CleanAir interferers of a device type, run the following command: Device# show ap dot11 {24ghz | 5ghz | 6ghz} cleanair device type To view the CleanAir configuration for a specific AP, run the following commands: Device# show ap name ap-name dot11 {24ghz | 5ghz | 6ghz} cleanair air-quality Device# show ap name ap-name dot11 {24ghz | 5ghz | 6ghz} cleanair device To view the continuous transmitter as the CleanAir interference device type, run the following command: Device# show ap dot11 6ghz cleanair device type cont-tx Verifying CleanAir Parameters You can verify CleanAir parameters using the following commands: Table 128: Commands for verifying CleanAir Command Name show ap dot11 24ghz cleanair device type all Description Displays all the CleanAir interferers for the 2.4-GHz band. show ap dot11 24ghz cleanair device type ble-beacon Displays all the Bluetooth BLE beacons for the 2.4-GHz band. show ap dot11 24ghz cleanair device type bt-discovery Displays CleanAir interferers of type BT Discovery for the 2.4-GHz band. show ap dot11 24ghz cleanair device type bt-link Displays CleanAir interferers of type BT Link for the 2.4-GHz band. show ap dot11 24ghz cleanair device type canopy Displays CleanAir interferers of type Canopy for the 2.4-GHz band. show ap dot11 24ghz cleanair device type cont-tx Displays CleanAir interferers of type Continuous transmitter for the 2.4-GHz band. show ap dot11 24ghz cleanair device type dect-like Displays CleanAir interferers of type DECT Like for the 2.4-GHz band. show ap dot11 24ghz cleanair device type fh Displays CleanAir interferers of type 802.11FH for the 2.4-GHz band. show ap dot11 24ghz cleanair device type inv Displays CleanAir interferers of type Wi-Fi Inverted for the 2.4-GHz band. show ap dot11 24ghz cleanair device type jammer Displays CleanAir interferers of type Jammer for the 2.4-GHz band. show ap dot11 24ghz cleanair device type mw-oven Displays CleanAir interferers of type MW Oven for the 2.4-GHz band. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1688 CleanAir Monitoring Interference Devices Command Name Description show ap dot11 24ghz cleanair device type nonstd Displays CleanAir interferers of type Wi-Fi inverted channel for the 2.4-GHz band. show ap dot11 24ghz cleanair device type superag Displays CleanAir interferers of type SuperAG for the 2.4-GHz band. show ap dot11 24ghz cleanair device type tdd-tx Displays CleanAir interferers of type TDD Transmit for the 2.4-GHz band. show ap dot11 24ghz cleanair device type video Displays CleanAir interferers of type Video Camera for the 2.4-GHz band. show ap dot11 24ghz cleanair device type wimax-fixed Displays CleanAir interferers of type WiMax Fixed for the 2.4-GHz band. Monitoring Interference Devices When a CleanAir-enabled access point detects interference devices, detections of the same device from multiple sensors are merged together to create clusters. Each cluster is given a unique ID. Some devices conserve power by limiting the transmit time until actually needed, which results in the spectrum sensor to stop detecting the device temporarily. This device is then correctly marked as down. Such a device is correctly removed from the spectrum database. In cases when all the interferer detections for a specific device are reported, the cluster ID is kept alive for an extended period of time to prevent possible device-detection bouncing. If the same device is detected again, it is merged with the original cluster ID and the device-detection history is preserved. For example, some bluetooth headsets operate on battery power. These devices employ methods to reduce power consumption, such as turning off the transmitter when not actually needed. Such devices can appear to come and go from the classification. To manage these devices, CleanAir keeps the cluster IDs for longer and they are remerged into a single record upon detection. This process smoothens the user records and accurately represents the device history. Note The following is a prerequisite for monitoring the interference devices: You can configure Cisco CleanAir only on CleanAir-enabled access points. Configuration Examples for CleanAir This example shows how to enable CleanAir on the 2.4-GHz band and an access point operating in the channel: Device#configure terminal Device(config)#ap dot11 24ghz cleanair Device(config)#exit Device#ap name TAP1 dot11 24ghz cleanair Device#end This example shows how to enable an EDRRM CleanAir event in the 2.4-GHz band and configure high sensitivity to non-WiFi interference: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1689 CleanAir FAQs CleanAir Device#configure terminal Device(config)#ap dot11 24ghz rrm channel cleanair-event Device(config)#ap dot11 24ghz rrm channel cleanair-event sensitivity high Device(config)#end This example shows how to enable an access point in the monitor mode: Device#ap name <ap-name> mode monitor CleanAir FAQs Q. Multiple access points detect the same interference device. However, the device shows them as separate clusters or different suspected devices clustered together. Why does this happen? A. Access points must be RF neighbors for the device to consider merging the devices that are detected by these access points. An access point takes time to establish neighbor relationships. A few minutes after the device reboots or after there is a change in the RF group, and similar events, clustering will not be very accurate. Q. How do I view neighbor access points? A. To view neighbor access points, use the show ap ap_name auto-rf dot11{24ghz | 5ghz} command. This example shows how to display the neighbor access points: Device#show ap name AS-5508-5-AP3 auto-rf dot11 24ghz <snippet> Nearby APs AP 0C85.259E.C350 slot 0 AP 0C85.25AB.CCA0 slot 0 AP 0C85.25C7.B7A0 slot 0 AP 0C85.25DE.2C10 slot 0 AP 0C85.25DE.C8E0 slot 0 AP 0C85.25DF.3280 slot 0 AP 0CD9.96BA.5600 slot 0 AP 24B6.5734.C570 slot 0 <snippet> : -12 dBm on 1 (10.10.0.5) : -24 dBm on 6 (10.10.0.5) : -26 dBm on 11 (10.10.0.5) : -24 dBm on 6 (10.10.0.5) : -14 dBm on 11 (10.10.0.5) : -31 dBm on 6 (10.10.0.5) : -44 dBm on 6 (10.0.0.2) : -48 dBm on 11 (10.0.0.2) Q. What are the AP debug commands available for CleanAir? A. The AP debug commands for CleanAir are: · debug cleanair {bringup | event | logdebug | low | major | nsi | offchan} · debug rrm {neighbor | off-channel | reports} Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1690 1 5 9 C H A P T E R Bluetooth Low Energy · Information About Bluetooth Low Energy, on page 1691 · Enabling Bluetooth Low Energy Beacon (GUI), on page 1692 · Enabling Bluetooth Low Energy Beacon, on page 1692 Information About Bluetooth Low Energy Note This feature is not related to the Indoor IoT Services feature set that is part of Cisco Spaces. This feature describes how Access Points and Catalyst 9800 can detect BLE devices as wireless interferers using Clean Air - not the BLE radio that is available on some Access Point models. This feature is not meant to be used for BLE-based asset tracking, environmental monitoring, or tag management use cases, which are powered using Cisco Spaces. For full feature functionality of how BLE-related use cases are delivered in the Cisco solution, refer to Cisco Spaces configuration guides for Indoor IoT services. Bluetooth low energy (BLE) is a wireless personal area network technology aimed at enhancing location services for mobile devices. The small bluetooth tag devices placed at strategic locations transmit universally unique identifiers (UUIDs) and, Major and Minor fields as their identity. These details are picked up by bluetooth-enabled smartphones and devices. The location information of these devices are sent to the corresponding back-end server. Relevant advertisements and other important information are then pushed to the devices using this location-specific information. By treating a tag device as an interferer and using the existing system capabilities, such as interference location, the tag device can be located on a map display in a wireless LAN deployment and its movement monitored. Besides this, information on missing tags can also be obtained. This feature can determine rogue and malicious tags using the unique identifier associated with each tag (or family of tags) against a predetermined allowed list from a customer. Using the management function, alerts can be displayed or emailed based on rogue tags, missing tags, or moved tags. Limitations of BLE Feature · The wireless infrastructure must support Cisco CleanAir. · Supports a maximum of only 250 unique BLE beacons (cluster entries) and 1000 device entries. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1691 Enabling Bluetooth Low Energy Beacon (GUI) CleanAir · Cisco CleanAir feature is only supported on Cisco Aironet 3700 Series Access Points with Hyperlocation module RM3010. The BLE feature on Wave 2 and Wi-Fi 6 APs works in a different manner (through cloud beacon center) and is not covered by this feature. Areas of Use Since the BLE feature provides granular location details of devices (smart phones or bluetooth-enabled devices) that helps push context-sensitive advertising and other information to users. Possible areas of application include retail stores, museums, zoo, healthcare, fitness, security, advertising, and so on. Enabling Bluetooth Low Energy Beacon (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Radio Configurations > CleanAir > 2.4 GHz Band > General. Check the Enable CleanAir check box. From the Available Interference Types list, select and move BLE Beacon to the Interference Types to Detect list. Click Apply. Enabling Bluetooth Low Energy Beacon Bluetooth low energy (BLE) detection is enabled by default. Use the procedure given below to enable BLE when it is disabled. Before you begin · The wireless infrastructure must support Cisco CleanAir. · Cisco CleanAir configuration and show commands are available only in Mobility Controller (MC) mode. Procedure Step 1 Command or Action configure terminal Example: Controller# configure terminal Step 2 [no] ap dot11 24ghz cleanair device [ble-beacon] Example: Controller(config)# ap dot11 24ghz cleanair device ble-beacon Purpose Enters global configuration mode. Enables the BLE feature on the 802.11b network. Use the no form of the command to disable BLE feature on the 802.11b network. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1692 CleanAir Enabling Bluetooth Low Energy Beacon Step 3 Step 4 Command or Action exit Example: Controller(config)# exit Purpose Returns to privileged EXEC mode. show ap dot11 24ghz cleanair config Example: (Optional) Displays the BLE beacon configuration. Controller# show ap dot11 24ghz cleanair config Interference Device Settings: Interference Device Reporting................ : Enabled Bluetooth Link........................... : Enabled Microwave Oven........................... : Enabled BLE Beacon............................... : Enabled Step 5 show ap dot11 24ghz cleanair device type (Optional) Displays the BLE beacon device-type ble-beacon information. Example: Controller# show ap dot11 24ghz cleanair device type ble-beacon DC = Duty Cycle (%) ISI = Interference Severity Index (1-Low Interference, 100-High Interference) RSSI = Received Signal Strength Index (dBm) DevID = Device ID No ClusterID DevID Type AP Name ISI RSSI DC Channel --------------------------------------------------------------------------------------------- 1 2c:92:80:00:00:22 0xa001 BLE Beacon 5508_3_AP3600_f839 -- -74 0 unknown Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1693 Enabling Bluetooth Low Energy Beacon CleanAir Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1694 1 6 0 C H A P T E R Persistent Device Avoidance · Information about Cisco Persistent Device Avoidance, on page 1695 · Configuring Persistent Device Avoidance (GUI), on page 1696 · Configuring Persistent Device Avoidance (CLI), on page 1696 · Verifying Persistent Device Avoidance, on page 1696 Information about Cisco Persistent Device Avoidance The Cisco CleanAir Persistent device avoidance (PDA) feature is a part of spectrum management. Some interference devices, such as, outdoor bridges and microwave ovens, transmit signals only when required. These devices can cause significant interference to the local WLAN, becuase short-duration and periodic operations remain largely undetected by normal RF management metrics. With Cisco CleanAir (CleanAir), the RRM dynamic channel allocation (DCA) algorithm can detect, measure, register, and remember the impact, and adjust the RRM DCA algorithm. The PDA process minimizes the use of channels affected by persistent devices in the channel plan, local to the interference source. CleanAir detects and stores persistent device information in the controller. This information is used to mitigate the interfering channels. Persistent Devices Detection - CleanAir-capable monitor mode APs collect information about persistent devices on all the configured channels and store the information in the controller. Local or bridge mode APs detect interference devices only on the serving channels. The PDA feature works seamlessly on all platforms. All the AP models that are capable of CleanAir and Spectrum Intelligence support the PDA feature. The supported platforms are: · Cisco Aironet 1852 Access Points · Cisco Aironet 1832 Access Points · Cisco Aironet 2700 Series Access Points · Cisco Aironet 2800 Series Access Points · Cisco Aironet 3700 Series Access Points · Cisco Aironet 3800 Series Access Points · Cisco Aironet 4800 Series Access Points · Cisco Catalyst 9115 Series Access Points Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1695 Configuring Persistent Device Avoidance (GUI) CleanAir · Cisco Catalyst 9117 Series Access Points · Cisco Catalyst 9120AX Series Access Points · Cisco Catalyst 9124AX Series Access Points · Cisco Catalyst 9130AX Access Points Configuring Persistent Device Avoidance (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configurations > Radio Configurations > RRM Click the 5 GHz Band tab or the 2.4 GHz Band, and click the DCA tab. In the DCA window, under the Dynamic Channel Assignment Algorithm section, check the Avoid Persistent Non-WiFi Interference check box to enable the device to ignore persistent non-WiFi interference. Click Apply. Configuring Persistent Device Avoidance (CLI) You can enable and disable the PDA feature and PDA propagation configuration mode through the RRM Manager. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 [no] ap dot11 {24ghz | 5ghz} rrm channel Configures persistent non-WiFi device device avoidance in the 802.11a or 802.11b channel Example: assignment. Use the no form of this command to negate the command or to set its defaults. Device# [no] ap dot11 24ghz rrm channel device Verifying Persistent Device Avoidance To verify the current state of Device Aware detail of the channel, use the following command: Device#show ap dot11 24ghz channel Leader Automatic Channel Assignment Channel Assignment Mode : AUTO Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1696 CleanAir Verifying Persistent Device Avoidance Channel Update Interval Anchor time (Hour of the day) Channel Update Contribution Noise Interference Load Device Aware CleanAir Event-driven RRM option Channel Assignment Leader Last Run : 600 seconds :0 : Enable : Enable : Disable : Enable : Disabled : cisco-vwlc (9.9.39.73) : 166 seconds ago DCA Sensitivity Level DCA Minimum Energy Limit Channel Energy Levels Minimum Average Maximum Channel Dwell Times Minimum Average Maximum 802.11b 2.4 GHz Auto-RF Channel List Allowed Channel List Unused Channel List : MEDIUM : 10 dB : -95 dBm : -82 dBm : -82 dBm : -82 dBm : 8 days 0 hour 43 minutes 13 seconds : 8 days 0 hour 43 minutes 13 seconds : 8 days 0 hour 43 minutes 13 seconds : 1,6,11 : 2,3,4,5,7,8,9,10 Device#show ap dot11 24ghz cleanair device type all DC = Duty Cycle (%) ISI = Interference Severity Index (1-Low Interference, 100-High Interference) RSSI = Received Signal Strength Index (dBm) DevID = Device ID PD = Persistent Device ClusterID Mac Address DevID Type PD AP Name Version ISI RSSI DC Channel Last Update Time ---------------------------------------------------------------------------------------------------------------------------------------------------------------------- 9800.0000.0004 3400.0200.0001 0x0001 Jammer No RRM-TSIM-1 CA 100 -67 100 1,2 12/16/2020 18:32:42 UTC 9800.0000.0005 3400.0200.0004 0x0004 Xbox No RRM-TSIM-1 CA 45 -73 45 1 12/16/2020 18:32:42 UTC 9800.0000.0006 3400.0200.0006 0x0006 TDD Transmit No RRM-TSIM-1 CA 10 -75 10 1,2 12/16/2020 18:32:42 UTC 9800.0000.0006 3400.0200.0007 0x0007 Continuous TX No RRM-TSIM-1 CA 30 -77 30 1,2 12/16/2020 18:32:42 UTC 9800.0000.0007 3400.0200.0009 0x0009 802.15.4 No RRM-TSIM-1 CA 10 -95 10 1,2 12/16/2020 18:32:42 UTC Device# show ap dot11 5ghz cleanair device type all DC = Duty Cycle (%) ISI = Interference Severity Index (1-Low Interference, 100-High Interference) RSSI = Received Signal Strength Index (dBm) DevID = Device ID PD = Persistent Device ClusterID Mac Address DevID Type PD AP Name Version ISI RSSI DC Channel Last Update Time ---------------------------------------------------------------------------------------------------------------------------------------------------------------------- 9800.0000.0000 3400.0201.0002 0x0002 WiFi Inverted No RRM-TSIM-1 CA 45 -63 45 40 12/16/2020 18:32:42 UTC 9800.0000.0001 3400.0201.0004 0x0004 TDD Transmit No RRM-TSIM-1 CA 10 -76 10 40 12/16/2020 18:32:42 UTC 9800.0000.0001 3400.0201.0005 0x0005 Continuous TX No RRM-TSIM-1 CA 30 -77 30 40 12/16/2020 18:32:42 UTC 9800.0000.0002 3400.0201.0007 0x0007 BT Link No RRM-TSIM-1 CA 10 -88 10 40 12/16/2020 18:32:42 UTC Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1697 Verifying Persistent Device Avoidance CleanAir To verify all the reported interferers along with the class type, use the following command: Device# show ap dot11 24ghz cleanair device type wimax-mobile DC = Duty Cycle (%) ISI = Interference Severity Index (1-Low Interference, 100-High Interference) RSSI = Received Signal Strength Index (dBm) DevID = Device ID ClusterID Mac Address DevID Type AP Name ISI RSSI DC Channel --------------------------------------------------------------------------------------------------------------- 1900.0000.0006 xxxx.xxxx.xxx1 0xc001 WiMax Mobile Cisco-AP 4 -88 1 1900.0000.0007 xxxx.xxxx.xxx2 0xc002 WiMax Mobile Cisco-AP 4 -88 1 To verify the persistent device information under Auto-RF, use the following command: Device#show ap auto-rf dot11 24ghz Number of Slots :2 AP Name : VANC-AP MAC Address : d4c9.3ce5.c760 Slot ID :0 Radio Type : 802.11n - 2.4 GHz ................ Noise Information .................. Persistent Interference Devices Class Type Channel DC (%%) RSSI (dBm) ------------------------- ------- ------ --------- MW Oven 11 NA -71 MW Oven 11 NA -24 MW Oven 11 NA -17 MW Oven 11 NA -22 Last Update Time ---------------08/22/2019 12:03:18 UTC 08/22/2019 12:03:19 UTC 08/22/2019 12:03:16 UTC 08/22/2019 12:03:19 UTC To verify the persistent device information under Auto-RF for specific Cisco APs, use the following command: Device#show ap name ap_name auto-rf dot11 24ghz Number of Slots :2 AP Name : VANC-AP MAC Address : d4c9.3ce5.c760 Slot ID :0 Radio Type : 802.11n - 2.4 GHz ................ Noise Information .................. Persistent Interference Devices Class Type Channel DC (%%) RSSI (dBm) ------------------------- ------- ------ --------- MW Oven 11 NA -71 MW Oven 11 NA -24 MW Oven 11 NA -17 MW Oven 11 NA -22 Last Update Time ---------------08/22/2019 12:03:18 UTC 08/22/2019 12:03:19 UTC 08/22/2019 12:03:16 UTC 08/22/2019 12:03:19 UTC Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1698 1 6 1 C H A P T E R Spectrum Intelligence · Spectrum Intelligence, on page 1699 · Configuring Spectrum Intelligence, on page 1700 · Verifying Spectrum Intelligence Information, on page 1700 · Debugging Spectrum Intelligence on Supported APs (CLI), on page 1701 Spectrum Intelligence The Spectrum Intelligence feature scans for non-Wi-Fi radio interference on 2.4-GHz and 5-GHz bands. Spectrum intelligence provides basic functions to detect interferences of three types, namely microwave, continuous wave (like video bridge and baby monitor), wi-fi and frequency hopping (bluetooth and frequency-hopping spread spectrum (FHSS) cordless phone). The following Cisco access points (APs) support Spectrum Intelligence feature: · Cisco Catalyst 9105 Series Wi-Fi 6 APs · Cisco Catalyst 9115 Series Wi-Fi 6 APs · Cisco Aironet 1852E/I APs · Cisco Aironet 1832I APs · Cisco Aironet 1815W/T/I/M APs · Cisco Aironet 1810W/T APs · Cisco Aironet 1800I/S APs · Cisco Aironet 1542D/I APs Note You must enable Spectrum Intelligence feature on the Cisco Aironet 1832 and 1852 series APs to get radio details, such as noise, air-quality, interference, and radio utilization on the Cisco DNA Center Assurance AP health. Restrictions · SI APs only report a single interference type in Local mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1699 Configuring Spectrum Intelligence CleanAir · SI does not support high availability for air quality or interference reports. High Availability is not supported because interference report/device reported will not be copied to standby after switchover. We expect AP to send it again, if at all interferer is still there. · Spectrum Intelligence detects only three types of devices: · Microwave · Continuous wave--(video recorder, baby monitor) · SI-FHSS--(Bluetooth, Frequency hopping Digital European Cordless Telecommunications (DECT) phones) Configuring Spectrum Intelligence Follow the procedure given below to configure spectrum intelligence: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap dot11 {24ghz | 5ghz} SI Example: Device(config)# ap dot11 24ghz SI Purpose Enters global configuration mode. Configures the 2.4-GHz or 5-GHz Spectrum Intelligence feature on the 802.11a or 802.11b network. Add no form of the command to disable SI on the 802.11a or 802.11b network. Verifying Spectrum Intelligence Information Use the following commands to verify spectrum intelligence information: To display the SI information for a 2.4-GHz or 5-GHz band, use the following command: Device# show ap dot11 24ghz SI config SI Solution...................................... : Enabled Interference Device Settings: SI_FHSS.................................. : Enabled Interference Device Types Triggering Alarms: SI_FHSS.................................. : Disabled Device# show ap dot11 5ghz SI device type RSSI = Received Signal Strength Index (dBm) DevID = Device ID PD = Persistent Device Mac Address DevID Type Last Update Time PD AP Name RSSI Channel Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1700 CleanAir Debugging Spectrum Intelligence on Supported APs (CLI) ------------------------------------------------------------------------------------------------------------------------------ 3400.0401.0006 0x0006 BT Discovery No RRM-TSIM-3 -88 40 12/16/2020 18:11:28 UTC To display SI interferers of type Continuous transmitter for a 2.4-GHz band, use the following command: Device# show ap dot11 24ghz SI device type cont_tx RSSI = Received Signal Strength Index (dBm) DevID = Device ID Mac Address DevID Type AP Name RSSI Channel --------------------------------------------------------------------------------------- xxxx.xxxx.xxxx 0xf001 Continuous TX Cisco-AP -47 To display 802.11a interference devices information for the given AP for 5-GHz, use the following command: Device# show ap dot11 5ghz SI device type ap DC = Duty Cycle (%) ISI = Interference Severity Index (1-Low Interference, 100-High Interference) RSSI = Received Signal Strength Index (dBm) DevID = Device ID AP type = CA, clean air, SI spectrum intelligence No ClusterID/BSSID DevID Type AP Type AP Name ISI RSSI DC Channel --- ------------------ ------ ------- ------ ------------------------ ---- ----- ---- ---------- To display SI interferers of type Continuous transmitter for a 5-GHz band, use the following command: Device# show ap dot11 5ghz SI device type cont_tx RSSI = Received Signal Strength Index (dBm) DevID = Device ID Mac Address DevID Type AP Name RSSI Channel --------------------------------------------------------------------------------------- xxxx.xxxx.xxx1 0xf001 Continuous TX Cisco-AP -88 xxxx.xxxx.xxx2 0xf002 Continuous TX Cisco-AP -88 To display all Cisco CleanAir interferers for a 2.4-GHz band, use the following command: Device# show ap dot11 24ghz cleanair device type all Debugging Spectrum Intelligence on Supported APs (CLI) You need to enter these commands in the AP console. For information about APs that support this feature see https://www.cisco.com/c/en/us/td/docs/wireless/access_point/feature-matrix/ap-feature-matrix.html. Procedure · Generate major Spectrum Intelligence logs for an AP by entering this command: debug cleanair major · Verify the Spectrum Intelligence scan schedule of 5 seconds on an AP by entering this command: debug cleanair event Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1701 Debugging Spectrum Intelligence on Supported APs (CLI) CleanAir · Generate logs at 10-minute interval, when interference is not detected or reported by the AP, by entering this command: debug cleanair raw 10 This command creates three files under /tmp directory from dev shell. · spectrum.fft · spectrum.dbg · spectrum.int · View the Spectrum Intelligence detected interfering devices by entering this command: show cleanair interferers · View the Spectrum Intelligence configuration status by entering this command: show cleanair status Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1702 1 6 2 C H A P T E R Spectrum Analysis · Information About Spectrum Analysis, on page 1703 · Live Spectrum Analysis, on page 1704 · Performing AP Spectrum Analysis (GUI), on page 1704 · Configuring Spectrum Analysis, on page 1705 · Verifying Spectrum Analysis, on page 1705 Information About Spectrum Analysis Cisco DNA Center receives a spectrogram stream from access points and visualizes spectrum analysis as a real-time spectrogram view. Network administrators receive RF violation issues from end users or radio frequency issue from the Cisco DNA Center. To analyze a violation, you should select the corresponding AP and analyze the spectrogram stream. Based on whether a setting is global or is meant for a specific channel, every AP uses a specific channel to communicate with clients. When a lot of clients join on the same AP, there is a high possibility of frames getting dropped off. When there is an issue of clients dropping quickly, or not getting onboarded, you should perform the spectrum analysis to check if the channels are clogged. You can enable spectrum analysis on every AP listed in the web UI and view the graphs based on the corresponding AP. When enabled, the APs send spectrum data to Cisco DNA Centre which then aggregates it into 3 distinct charts. You can view the following charts while performing a spectrum analysis: · Persistance Charts: Plot the amplitude-to-power ratio of each signal at each channel for a period of five minutes. The chart is color coded with blue color representing one signal and red representing many signals. This chart also plots the opacity that represents the age of the signal data within the five minute interval, with older data being more transparent. · Waterfall Charts: Plot all the signals that are analyzed in the channel for a period of five minutes with intensity on X axis, and with time represented in the Y axis. The chart is color coded, with blue color representing a low value and red representing a high value. · Interference and Duty Charts: Plot the severity of detected interference for each channel band, and list the interference type. Interference is plotted as a circle, where the center represents the severity, and the radius represents the section of the channel band that is affected. The impact of the interference is measured Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1703 Live Spectrum Analysis CleanAir as severity, with values ranging from 0 to 100. The interference type is determined from RF signature identified by Cisco CleanAir technology of the interference. Live Spectrum Analysis You can perform a live spectrum analysis of the AP radios, and monitor the spectrum of frequencies generated by the radios of the corresponding AP using the web UI. The live spectrum capture uses radio 2 if it is available. Otherwise, both radio 0 and radio 1 are used. When you enable live spectrum analysis on radio 2, Cisco DNA Centre displays a consolidated view of the interference in both the 2.4 Ghz and 5 Ghz range. However; if the feature is enabled on radio 0 or radio 1, you can only view the part of the spectrum that the radios are associated with. You can select a radio in the web UI and view a live spectrum associated with this radio, for 10 minutes, and later extend the duration based on your requirement. Performing AP Spectrum Analysis (GUI) Before you begin Use the Cisco DNA Center Discovery functionality to locate an AP to perform a spectrum analysis. . Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Provision > Inventory. The Inventory window is displayed. Click AP Name . The 360 degree Device window is displayed. Click Intelligent Capture . Click Spectrum Analysis to view the graphs. From the Radio drop-down list, choose a radio. Click Start Spectrum Analysis . The graphs are displayed on the web UI for you to analyze. To stop the analysis, click Stop Spectrum Analysis. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1704 CleanAir Configuring Spectrum Analysis Configuring Spectrum Analysis Procedure Step 1 Step 2 Step 3 Command or Action Purpose configure terminal Enters global configuration mode. Example: Device# configure terminal icap subscription ap rf spectrum enable Configures spectrum analysis on the AP. Example: Device# icap subscription ap rf spectrum enable icap subscription ap rf spectrum slotnumber Selects a radio slot to enable spectrum analaysis. Example: Device# icap subscription ap rf spectrum slot 0 Verifying Spectrum Analysis The following is a sample output of the show ap icap subscription name command that verifies spectrum analysis on a selected AP: Device#show ap icap subscription name Subscription list ----------------Full Pkt Capture : Disabled Partial Pkt Capture : Enabled Anomaly Event : Enabled Debug : Disabled Stats : Disabled Ap Operational Data : Disabled Sensor Message : Enabled RRM Operational Data : Disabled Client Events : Disabled aWIPS Forensic Pkts: Disabled MAC and Filters subscription list --------------------------------Full-packet-trace: None Partial-packet-trace: None Filters: None Anomaly Detection: None Client Stats -----------None RF Spectrum Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1705 Verifying Spectrum Analysis ----------Radio Slot(s): 1 CleanAir Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1706 PART XIII Mesh Access Points · Mesh Access Points, on page 1709 · Redundant Root Access Point (RAP) Ethernet Daisy Chaining, on page 1785 1 6 3 C H A P T E R Mesh Access Points · Introduction to the Mesh Network, on page 1711 · Restrictions for Mesh Access Points, on page 1712 · MAC Authorization, on page 1713 · Preshared Key Provisioning, on page 1714 · EAP Authentication, on page 1714 · Bridge Group Names, on page 1715 · Background Scanning, on page 1716 · Information About Background Scanning and MAP Fast Ancestor Find Mode , on page 1716 · Mesh Backhaul at 2.4 GHz and 5 GHz , on page 1717 · Information About Mesh Backhaul, on page 1717 · Information About Mesh Serial Backhaul, on page 1718 · Information About Mesh Backhaul RRM, on page 1719 · Dynamic Frequency Selection, on page 1720 · Country Codes, on page 1720 · Intrusion Detection System, on page 1720 · Mesh Interoperability Between Controllers, on page 1720 · Information About DHCP and NAT Functionality on Root AP (RAP), on page 1721 · Mesh Convergence, on page 1721 · Ethernet Bridging, on page 1722 · Multicast Over Mesh Ethernet Bridging Network, on page 1723 · Radio Resource Management on Mesh, on page 1723 · Air Time Fairness on Mesh, on page 1724 · Spectrum Intelligence for Mesh, on page 1724 · Indoor Mesh Interoperability with Outdoor Mesh, on page 1725 · Workgroup Bridge, on page 1725 · Link Test, on page 1725 · Mesh Daisy Chaining, on page 1726 · Mesh Leaf Node, on page 1726 · Flex+Bridge Mode, on page 1726 · Backhaul Client Access, on page 1727 · Mesh CAC, on page 1727 · Prerequisites for Mesh Ethernet Daisy Chaining, on page 1728 · Restrictions for Mesh Ethernet Daisy Chaining, on page 1728 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1709 Mesh Access Points · Speeding up Mesh Network Recovery Through Fast Detection of Uplink Gateway Reachability Failure, on page 1728 · Fast Teardown for a Mesh Deployment, on page 1729 · Configuring MAC Authorization (GUI), on page 1729 · Configuring MAC Authorization (CLI), on page 1730 · Configuring MAP Authorization - EAP (GUI), on page 1731 · Configuring MAP Authorization (CLI), on page 1731 · Configuring PSK Provisioning (CLI), on page 1732 · Configuring a Bridge Group Name (GUI), on page 1733 · Configuring a Bridge Group Name (CLI), on page 1734 · Configuring Background Scanning (GUI), on page 1734 · Configuring Background Scanning, on page 1735 · Configuring AP Fast Ancestor Find Mode (GUI), on page 1735 · Configuring Background Scanning and MAP Fast Ancestor Find Mode (CLI), on page 1736 · Configuring Backhaul Client Access (GUI), on page 1736 · Configuring Backhaul Client Access (CLI), on page 1737 · Configuring Dot11ax Rates on Mesh Backhaul Per Access Point (GUI), on page 1737 · Configuring Dot11ax Rates on Mesh Backhaul in Mesh Profile (GUI), on page 1738 · Configuring Wireless Backhaul Data Rate (CLI), on page 1738 · Configuring Data Rate Per AP (CLI), on page 1739 · Configuring Data Rate Using Mesh Profile (CLI), on page 1740 · Configuring Mesh Backhaul (CLI), on page 1740 · Configuring Dynamic Frequency Selection (CLI), on page 1741 · Configuring the Intrusion Detection System (CLI), on page 1741 · Configuring Ethernet Bridging (GUI), on page 1742 · Configuring Ethernet Bridging (CLI), on page 1742 · Configuring Multicast Modes over Mesh, on page 1744 · Configuring RRM on Mesh Backhaul (CLI), on page 1744 · Configuring RRM Channel Assignment for Root Access Points Globally, on page 1745 · Configuring RRM Channel Assignment for an Access Point, on page 1746 · Selecting a Preferred Parent (GUI), on page 1746 · Selecting a Preferred Parent (CLI), on page 1747 · Changing the Role of an AP (GUI), on page 1748 · Changing the Role of an AP (CLI), on page 1749 · Configuring the Mesh Leaf Node (CLI), on page 1749 · Configuring the Mesh Leaf Node (GUI), on page 1749 · Configuring Subset Channel Synchronization , on page 1750 · Provisioning LSC for Bridge-Mode and Mesh APs (GUI), on page 1750 · Provisioning LSC for Bridge-Mode and Mesh APs, on page 1751 · Specifying the Backhaul Slot for the Root AP (GUI), on page 1752 · Specifying the Backhaul Slot for the Root AP (CLI), on page 1752 · Using a Link Test on Mesh Backhaul (GUI), on page 1753 · Using a Link Test on Mesh Backhaul, on page 1753 · Configuring Battery State for Mesh AP (GUI), on page 1754 · Configuring Battery State for Mesh AP, on page 1754 · Configuring Mesh Convergence (CLI), on page 1754 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1710 Mesh Access Points Introduction to the Mesh Network · Configuring DHCP Server on Root Access Point (RAP), on page 1755 · Configuring Mesh Ethernet Daisy Chaining (CLI), on page 1756 · Enabling Mesh Ethernet Daisy Chaining, on page 1756 · Configuring Mesh CAC (CLI), on page 1757 · Configuring ATF on Mesh (GUI), on page 1757 · Configuring ATF on Mesh, on page 1758 · Create an ATF Policy for a MAP, on page 1758 · Creating an ATF Policy (GUI), on page 1759 · Adding an ATF to a Policy Profile (GUI), on page 1759 · Enabling ATF Mode in an RF Profile (GUI), on page 1759 · Enabling Wireless Mesh Profile, on page 1760 · Enabling Serial Backhaul in Radio Profile (GUI), on page 1760 · Enabling Mesh Configurations in Radio Profile (CLI), on page 1761 · Enabling Serial Backhaul (CLI), on page 1762 · Associating Wireless Mesh to an AP Profile (CLI), on page 1763 · Configuring Fast Teardown for a Mesh AP Profile (GUI) , on page 1763 · Configuring Fast Teardown for a Mesh AP Profile (CLI), on page 1764 · Flex Resilient with Flex and Bridge Mode Access Points, on page 1765 · Verifying ATF Configuration on Mesh, on page 1771 · Verifying Mesh Ethernet Daisy Chaining, on page 1772 · Verifying Mesh Convergence, on page 1772 · Verifying DHCP Server for Root AP Configuration, on page 1773 · Verifying Mesh Backhaul, on page 1773 · Verifying Mesh Configuration, on page 1774 · Verifying Dot11ax Rates on Mesh Backhaul, on page 1782 · Verifying Mesh Serial Backhaul, on page 1782 · Verifying the RRM DCA Status, on page 1783 · Verifying Fast Teardown with Default Mesh Profile, on page 1783 · Verifying Background Scanning and MAP Fast Ancestor Find, on page 1784 Introduction to the Mesh Network Mesh networking employs Cisco Aironet outdoor mesh access points and indoor mesh access points along with Cisco Wireless Controller and Cisco Prime Infrastructure to provide scalability, central management, and mobility between indoor and outdoor deployments. Control and Provisioning of Wireless Access Points (CAPWAP) protocol manages the connection of mesh access points to the network. End-to-end security within the mesh network is supported by employing Advanced Encryption Standard (AES) encryption between wireless mesh access points and Wi-Fi Protected Access 2 (WPA2) clients. For connections to a mesh access point (MAP) wireless client, such as MAP-to-MAP and MAP-to-root access point, WPA2 is applicable. The wireless mesh terminates on two points on the wired network. The first location is where the root access point (RAP) is attached to the wired network, and where all bridged traffic connects to the wired network. The second location is where the CAPWAP controller connect to the wired network; this location is where the WLAN client traffic from the mesh network is connected to the wired network. The WLAN client traffic from CAPWAP is tunneled to Layer 2. Matching WLANs should terminate on the same switch VLAN on Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1711 Restrictions for Mesh Access Points Mesh Access Points which the wireless controllers are co-located. The security and network configuration for each of the WLANs on the mesh depend on the security capabilities of the network to which the wireless controller is connected. In the new configuration model, the controller has a default mesh profile. This profile is mapped to the default AP-join profile, which is in turn is mapped to the default site tag. If you are creating a named mesh profile, ensure that these mappings are put in place, and the corresponding AP is added to the corresponding site-tag. Important The following are the mesh supported scenarios in IRCM from Cisco IOS XE Amsterdam 17.3 release up to Cisco IOS XE Cupertino 17.9 release, for the Cisco Wave 1 APs that are not supported: · Cisco Wave 1 APs are not supported in the releases post Cisco IOS XE Amsterdam 17.3. This includes mesh support as well. Therefore, it is not possible for a Cisco Wave 1 AP to join a Cisco Catalyst 9800 Series Wireless Controller (controller) with Cisco IOS XE Amsterdam 17.4 and later versions. We recommend the following deployment mode for Cisco Wave 1 APs. · In the case of Cisco mesh deployments, the following are the deployment limitations to be aware of, when the system is deployed: · MAP roaming is not allowed between Cisco Catalyst 9800 Series Wireless Controllers, if the controllers run different Cisco IOS XE versions (running on versions Cisco IOS XE Amsterdam 17.3 or Cisco IOS XE Cupertino 17.9) for any of the Cisco Wave 1 APs and Cisco Wave 2 APs. · You cannot have Cisco Wave 1 APs and Cisco Catalyst 9124 Series APs in the same mesh tree, in the releases post Cisco IOS XE Amsterdam 17.3.x. This can be achieved in 17.3.x, beginning from the 17.3.6 (upcoming) release. · The whole mesh tree containing Cisco Wave 1 APs must be joined to the 17.3 controller, by running the strict-bgn and mac filtering commands. Note The limitations mentioned above are not valid for the Cisco Industrial Wireless 3702 Se which are supported until the Cisco IOS XE Cupertino 17.9 release. Cisco Catalyst 9130AXE Access Points support Serial Backhaul with omni antenna using dart connectors.Cisco Catalyst 9130AXI APs supports Serial Backhaul, as the second 5-GHz radio is for macro and micro cell (the transmission power of the second 5-GHz radio cannot be changed). Restrictions for Mesh Access Points The Mesh feature is supported only on the following AP platforms: · Outdoor APs · Cisco Industrial Wireless 3702 Access Points (supported from Cisco IOS XE Gibraltar 16.11.1b). · Cisco Aironet 1542 Access Points · Cisco Aironet 1562 Access Points · Cisco Aironet 1572 Access Points Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1712 Mesh Access Points MAC Authorization · Cisco Catalyst IW6300 Heavy Duty Access Points · Cisco 6300 Series Embedded Services Access Points · Cisco Catalyst 9124AX Series Outdoor Access Point · Indoor APs · Cisco Aironet 1815i Access Points · Cisco Aironet 1815m Access Points · Cisco Aironet 1815w Access Points · Cisco Aironet 1832i Access Points · Cisco Aironet 1852i Access Points · Cisco Aironet 1852e Access Points · Cisco Aironet 2802i Access Points · Cisco Aironet 2802e Access Points · Cisco Aironet 3802i Access Points · Cisco Aironet 3802e Access Points · Cisco Aironet 3802p Access Points · Cisco Aironet 4800 Access Points The following mesh features are not supported: · Serial backhaul AP support with separate backhaul radios for uplink and downlink. · Public Safety channels (4.9-GHz band) support. · Passive Beaconing (Anti-Stranding) Note Only Root APs support SSO. MAPs will disconnect and rejoin after SSO. The AP Stateful Switch Over (SSO) feature allows the access point (AP) to establish a CAPWAP tunnel with the Active controller and share a mirror copy of the AP database with the Standby controller. The overall goal for the addition of AP SSO support to the controller is to reduce major downtime in wireless networks due to failure conditions that may occur due to box failover or network failover. MAC Authorization You must enter the MAC address of an AP in the controller to make a MAP join the controller. The controller responds only to those CAPWAP requests from MAPs that are available in its authorization list. Remember to use the MAC address provided at the back of the AP. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1713 Preshared Key Provisioning Mesh Access Points MAC authorization for MAPs connected to the controller over Ethernet occurs during the CAPWAP join process. For MAPs that join the controller over radio, MAC authorization takes place when the corresponding AP tries to secure an adaptive wireless path protocol (AWPP) link with the parent MAP. The AWPP is the protocol used in Cisco mesh networks. The Cisco Catalyst 9800 Series Wireless Controller supports MAC authorization internally as well as using an external AAA server. Preshared Key Provisioning Customers with mesh deployments can see their MAPs moving out of their network and joining another mesh network when both these mesh deployments use AAA with wild card MAC filtering to allow the association of MAPs. Since MAPs might use EAP-FAST, this cannot be controlled because a security combination of MAC address and type of AP is used for EAP, and no controlled configuration is available. The preshared key (PSK) option with a default passphrase also presents a security risk. This issue is prominently seen in overlapping deployments of two service providers when the MAPs are used in a moving vehicle (public transportation, ferry, ship, and so on.). This way, there is no restriction on MAPs to remain with the service providers' mesh network, and MAPs can get hijacked or getting used by another service provider's network and cannot serve the intended customers of the original service providers in the deployment. The PSK key provisioning feature enables a provisionable PSK functionality from the controller which helps make a controlled mesh deployment and enhance MAPs security beyond the default one. With this feature the MAPs that are configured with a custom PSK, will use the PSK key to do their authentication with their RAPs and controller. EAP Authentication Local EAP is an authentication method that allows users and wireless clients to be authenticated locally on the controller. It is designed for use in remote offices that want to maintain connectivity with wireless clients when the backend system gets disrupted or the external authentication server goes down. When you enable local EAP, the controller serves as the authentication server and the local user database, which in turn, removes dependence on an external authentication server. Local EAP retrieves user credentials from the local user database or the LDAP backend database to authenticate users. Local EAP supports only the EAP-FAST authentication method for MAP authentication between the controller and wireless clients. Local EAP uses an LDAP server as its backend database to retrieve user credentials for MAP authentication between the controller and wireless clients. An LDAP backend database allows the controller to query an LDAP server for the credentials (username and password) of a particular user. These credentials are then used to authenticate the user. Note If RADIUS servers are configured on the controller, the controller tries to authenticate the wireless clients using the RADIUS servers first. Local EAP is attempted only if RADIUS servers are not found, timed out, or were not configured. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1714 Mesh Access Points Bridge Group Names EAP Authentication with LSC Locally significant certificate-based (LSC-based) EAP authentication is also supported for MAPs. To use this feature, you should have a public key infrastructure (PKI) to control certification authority, define policies, validity periods, and restrictions and usages on the certificates that are generated, and get these certificates installed on the APs and controller. After these customer-generated certificates or LSCs are available on the APs and controller, the devices can start using these LSCs, to join, authenticate, and derive a session key. LSCs do not remove any preexisting certificates from an AP. An AP can have both LSC and manufacturing installed certificates (MIC). However, after an AP is provisioned with an LSC, the MIC certificate is not used during boot-up. A change from an LSC to MIC requires the corresponding AP to reboot. The controller also supports mesh security with EAP authentication to a designated server in order to: · Authenticate the mesh child AP · Generate a master session key (MSK) for packet encryption. Bridge Group Names Bridge group names (BGNs) control the association of MAPs to the parent mesh AP. BGNs can logically group radios to avoid two networks on the same channel from communicating with each other. The setting is also useful if you have more than one RAP in your network in the same sector (area). BGN is a string comprising a maximum of 10 characters. A BGN of NULL VALUE is assigned by default during manufacturing. Although not visible to you, it allows a MAP to join the network prior to your assignment of your network-specific BGN. If you have two RAPs in your network in the same sector (for more capacity), we recommend that you configure the two RAPs with the same BGN, but on different channels. When Strict Match BGN is enabled on a MAP, it will scan ten times to find a matching BGN parent. After ten scans, if the AP does not find the parent with matching BGN, it will connect to the nonmatched BGN and maintain the connection for 15 minutes. After 15 minutes, the AP will again scan ten times, and this cycle continues. The default BGN functionalities remain the same when Strict Match BGN is enabled. In Cisco Catalyst 9800 Series Wireless Controller, the BGN is configured on the mesh profile. Whenever a MAP joins the controller, the controller pushes the BGN that is configured on the mesh profile to the AP. Preferred Parent Selection The preferred parent for a MAP enables you to enforce a linear topology in a mesh environment. With this feature, you can override the Adaptive Wireless Path Protocol-defined (AWPP-defined) parent selection mechanism and force a MAP to go to a preferred parent. For Cisco Wave 1 APs, when you configure a preferred parent, ensure that you specify the MAC address of the actual mesh neighbor for the desired parent. This MAC address is the base radio MAC address that has the letter "f" as the final character. For example, if the base radio MAC address is 00:24:13:0f:92:00, then you must specify 00:24:13:0f:92:0f as the preferred parent. Device# ap name ap1 mesh parent preferred 00:24:13:0f:92:0f Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1715 Background Scanning Mesh Access Points For Cisco Wave 2 APs, when you configure a preferred parent, the MAC address is the base radio MAC address that has "0x11" added to the last two characters. For example, if the base radio MAC address is 00:24:13:0f:92:00, then you must specify 00:24:13:0f:92:11 as the preferred parent. Device# ap name ap1 mesh parent preferred 00:24:13:0f:92:11 Background Scanning Mesh background scanning improves convergence time, and reliability and stability of parent selection. With the help of the Background Scanning feature, a MAP can find and connect with a better potential parent across channels, and maintain its uplink with the appropriate parent all the time. When background scanning is disabled, a MAP has to scan all the channels of the regulatory domain after detecting a parent loss in order to find a new parent and go through the authentication process. This delays the time taken for the mesh AP to connect back to the controller. When background scanning is enabled, a MAP can avoid scanning across the channels to find a parent after detecting a parent loss, and select a parent from the neighbor list and establish the AWPP link. Information About Background Scanning and MAP Fast Ancestor Find Mode Cisco mesh access points (MAPs) are interconnected over wireless links in a tree topology. A MAP that is connected to a network through the Ethernet uplink is the root MAP, which is also known as a root access point (RAP). Adaptive Wireless Path Protocol (AWPP) is used to form the tree topology and maintain that topology. When a MAP comes up, it tries to look for another MAP (parent) to join and reach the gateway through a RAP. The same happens when a MAP loses connectivity with its existing parent. This procedure is known as mesh tree convergence. A child MAP maintains uplink with its parent using the AWPP adjacency request/response messages that act as keepalive. If there is a consecutive loss of response messages, a parent is declared to be lost and the child MAP tries to find a new parent. A MAP maintains a list of neighbors of the current ON channel, and when the AP loses its current parent, it roams to the next best potential neighbor. If no other neighbors are found, the AP scans or seeks across all the channels or subset channels to find a parent. This is time consuming. With the help of the Background Scanning feature, the AP avoids searching for a parent across the channel set by scanning or seeking. This feature helps the child MAP to be updated about its neighbors across all the channels, helps to switch to a neighbor of any channel, and uses that neighbor as its next parent for uplink. Background scanning allows MAPs to save time during the scan-and-seek phase while looking for a new parent, but it does not save time on the authentication to the parent. Enabling the MAP Fast Ancestor Finding feature enables a novel method to reduce the need for sending or receiving beacons at the network formation, while starting or deploying a new mesh network. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1716 Mesh Access Points Mesh Backhaul at 2.4 GHz and 5 GHz Note · The Background Scanning and MAP Fast Ancestor Finding feature support in Cisco IOS XE Dublin 17.11.1, is not compatible with the legacy Background Scanning feature that is supported in the Cisco Wave 1 APs. · When you enable Background Scanning on the APs that are not equipped with RHL radio, a performance penalty is imposed in terms of the bandwidth available in the backhaul. This performance penalty is high at system startup and lower after the system reaches the steady-state. Mesh Backhaul at 2.4 GHz and 5 GHz A backhaul is used to create only the wireless connection between MAPs. The backhaul interface is 802.11a/n/ac/g depending upon the AP. The default backhaul interface is 5-GHz. The rate selection is important for effective use of the available radio frequency spectrum. The rate can also affect the throughput of client devices. (Throughput is an important metric used by industry publications to evaluate vendor devices.) Mesh backhaul is supported at 2.4-GHz and 5-GHz. However, in certain countries it is not allowed to use mesh network with a 5-GHz backhaul network. The 2.4-GHz radio frequencies allow you to achieve much larger mesh or bridge distances. When a RAP gets a slot-change configuration, it gets propagated from the RAP to all its child MAPs. All the MAPs get disconnected and join the new configured backhaul slot. Information About Mesh Backhaul This section provides information about mesh backhaul at 2.4-GHz. By default, the backhaul interface for mesh APs is 802.11a/ac/ax. Certain countries do not allow the use of mesh network with a 5-GHz backhaul network. Even in countries where 5-GHz is permitted, we recommend that you use 2.4-GHz radio frequencies to achieve much larger mesh or bridge distances. The Mesh backhaul at 2.4-GHz is supported on the following access points: · Cisco Catalyst 9124AX Series Outdoor Access Point · Cisco Aironet 1540 Series Outdoor Access Points · Cisco Aironet 1542D Outdoor Access Points · Cisco Aironet 1562D Outdoor Access Points · Cisco Aironet 1562E Outdoor Access Points · Cisco Aironet 1562I Outdoor Access Points · Cisco Aironet 1562PS Access Points · Cisco Aironet 1570 Series Outdoor Access Points · Cisco Aironet 1815i Access Points · Cisco Aironet 1815m Series Access Point · Cisco Aironet 1830 Series Access Points Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1717 Information About Mesh Serial Backhaul Mesh Access Points · Cisco Aironet 1850 Series Access Points · Cisco Aironet 2800e Access Points · Cisco Aironet 2800i Access Points · Cisco Aironet 3800 Series Access Points · Cisco Aironet 4800 Access Points · Cisco Catalyst IW6300 DC Heavy Duty Access Point · Cisco Catalyst IW6300 DCW Heavy Duty Access Point · Cisco Catalyst IW6300 Series Heavy Duty Access Points · Cisco 6300 Series Embedded Services Access Points Note In Israel, you must ensure that you run the ap country IO command to enable the outdoor country code for the selected radio. After you configure using the ap country IO command, the 2.4-GHz radio is enabled and 5-GHz radio is disabled. Information About Mesh Serial Backhaul The Mesh Serial Backhaul feature in a mesh access point (MAP), allows different channels for uplink and downlink access, thus improving backhaul bandwidth and extending universal access. One radio is used as the uplink radio and a different one is used as the downlink radio. This allows the in-bound and out-bound traffic to flow through exclusive communication channels, thereby improving performance and avoiding problems associated with a shared access medium. The Mesh Serial Backhaul feature is supported in the controller from Cisco IOS XE Cupertino 17.7.1 onwards, for Cisco Catalyst 9124AXE outdoor Access Points. A new knob is introduced under the radio profile, and that radio profile is associated with a radio frequency (RF) tag to enable the Mesh Serial Backhaul feature. When you enable this feature, the mesh configuration is shared by all the APs that share the same mesh profile. Radio configuration is shared by all the APs that are configured with the same radio profile. Basic client access functionality is offered on the 2.4-GHz radio and the 5-GHz radio, which are not used in serial backhaul. Universal access is made available on the downlink radio. Channel Assignment For the Mesh Serial Backhaul feature, channels are assigned according to the following rules: · Uplink and downlink channels are different. · All the 5-GHz radios maintain a frequency guard between their operating channels. For example, 100-MHz channel spacing between radios in Cisco Catalyst 9124AXE outdoor APs. · Dynamic Frequency Selection (DFS) channels are supported. In a root access point, because the uplink is wired, channels are assigned by the controller. On the other hand, a mesh access point uses the last channel configured by the controller for this radio, or uses the default channel. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1718 Mesh Access Points Information About Mesh Backhaul RRM If the channel used by MAP is not compatible with the uplink, MAP picks a valid random channel and notifies the controller. In another scenario, MAP randomly picks a new downlink channel when it receives a channel change alert on the uplink radio. MAP checks the validity of the downlink radio and picks a random channel if the current channel is not compatible. Note Ensure that the following prerequisites are met before channel assignment: · Enable tri-radio globally by running the Device# ap tri-radio command. · Enable the dual radio on the APs by running the Device# ap name ap-name dot11 5ghz dual-radio mode enable command. Use Cases The following are some of the use cases for the Mesh Serial Backhaul feature. · Maximise Throughput: Serial backhaul allows the 5-GHz backhaul to operate on different channels, thereby maximizing throughput over multiple mesh hops. · Network Segregation: APs that have serial backhaul enabled, segregate backhaul channel on mesh topographies. This is efficient because it avoids localized link interferences. Information About Mesh Backhaul RRM Root access points (RAPs) choose backhaul channels to operate in mesh networks. Until Cisco IOS XE Cupertino 17.8.1, this operation occured by an explicit configuration, a least congested scan during RAP boot time, during the initial radio resource management (RRM) run without mesh access points (MAPs) connected, or a backhaul channel that was chosen at random. As a result, a poor backhaul channel selection resulted in poor performance. From Cisco IOS XE Cupertino 17.9.1 onwards, RRM DCA is run on mesh backhaul, in auto mode, in FlexConnect or centralized networks. For APs that do not have dedicated (RHL) radios, DCA is triggered by running commands in the privilege EXEC mode. RRM continuously evaluates the channel conditions to ensure that the network utilizes the least congested channels. The network uses the transmission static power if it is configured, or falls back to the default level. This is supported on APs that have dedicated radios to scan channel conditions, without any user perceptible interruption to the mesh network traffic. In the mesh backhaul RRM feature, the RRM DCA decides all the downlink channels in a steady network. However, if an AP detects a change in its uplink roam or radar detection response, the AP chooses the best downlink to converge faster. Note APs choosing the best possible downlink is limited to serial backhaul enabled APs only. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1719 Dynamic Frequency Selection Mesh Access Points Dynamic Frequency Selection To protect the existing radar services, the regulatory bodies require that devices that have to share the newly opened frequency sub-band behave in accordance with the Dynamic Frequency Selection (DFS) protocol. DFS dictates that in order to be compliant, a radio device must be capable of detecting the presence of radar signals. When a radio detects a radar signal, the radio should stop transmitting for at least 30 minutes to protect that service. The radio should then select a different channel to transmit on, but only after monitoring it. If no radar is detected on the projected channel for at least one minute, the new radio service device can begin transmissions on that channel. The DFS feature allows mesh APs to immediately switch channels when a radar event is detected in any of the mesh APs in a sector. Country Codes Controllers and APs are designed for use in many countries having varying regulatory requirements. The radios within the APs are assigned to a specific regulatory domain at the factory (such as -E for Europe), but the country code enables you to specify a particular country of operation (such as FR for France or ES for Spain). Configuring a country code ensures that each radio's broadcast frequency bands, interfaces, channels, and transmit power levels are compliant with country-specific regulations. In certain countries, there is a difference in the following for indoor and outdoor APs: · Regulatory domain code · Set of channels supported · Transmit power level Intrusion Detection System The Cisco Intrusion Detection System/Intrusion Prevention System (CIDS/CIPS) instructs controllers to block certain clients from accessing a wireless network when attacks involving these clients are detected in Layer 3 through Layer 7. This system offers significant network protection by helping to detect, classify, and stop threats, including worms, spyware or adware, network viruses, and application abuse. Mesh Interoperability Between Controllers Interoperability can be maintained between AireOS and the Cisco Catalyst 9800 Series Wireless Controller with the following support: · MAPs can join an AireOS controller through a mesh network formed by APs connected to a Cisco Catalyst 9800 Series Wireless Controller. · MAPs can join a Cisco Catalyst 9800 Series Wireless Controller through a mesh network formed by APs connected to as AireOS controller. · MAP roaming is supported between parent mesh APs connected to AireOS and the Cisco Catalyst 9800 Series Wireless Controller by using PMK cache. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1720 Mesh Access Points Information About DHCP and NAT Functionality on Root AP (RAP) Note For seamless interoperability, AireOS controller and the Cisco Catalyst 9800 Series Wireless Controller should be in the same mobility group and use the image versions that support IRCM. Information About DHCP and NAT Functionality on Root AP (RAP) Note This feature is applicable for Cisco Aironet 1542 series outdoor access points only. The access points associated to a mesh network can play one of the two roles: · Root Access Point (RAP) - An access point can be a root access point for multiple mesh networks. · Mesh Access Point (MAP) - An access point can be a mesh access point for only one single mesh network at a time. DHCP and NAT Functionality on Root AP - IPv4 Scenario This feature enables the controller to send a TLV to RAP when a new RAP joins the controller. The following covers the workflow: · Controller pushes TLV to RAP for enabling DHCP and NAT functionality. · Client associates to an SSID. · RAP executes DHCP funtionality to assign private IPv4 address to the client. · RAP executes NAT functionality to get the private IPv4 address of the client and allow access to the network. Mesh Convergence Mesh convergence allows MAPs to reestablish connection with the controller, when it loses backhaul connection with the current parent. To improve the convergence time, each mesh AP maintains a subset of channels that is used for future scan-seek and to identify a parent in the neighbor list subset. The following convergence methods are supported. Table 129: Mesh Convergence Mesh Convergence Standard Parent Loss Detection / Keepalive Timers 21 / 3 seconds Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1721 Noise-Tolerant Fast Mesh Access Points Mesh Convergence Parent Loss Detection / Keepalive Timers Fast 7 / 3 seconds Very Fast 4 / 2 seconds Noise-tolerant-fast 21 / 3 seconds Noise-Tolerant Fast Noise-tolerant fast detection is based on the failure to get a response for an AWPP neighbor request, which evaluates the current parent every 21 seconds in the standard method. Each neighbor is sent a unicast request every 3 seconds along with a request to the parent. Failure to get a response from the parent initiates either a roam if neighbors are available on the same channel or a full scan for a new parent. Ethernet Bridging For security reasons, the Ethernet port on all the MAPs are disabled by default. They can be enabled only by configuring Ethernet bridging on the root and its respective MAP. Both tagged and untagged packets are supported on secondary Ethernet interfaces. In a point-to-point bridging scenario, a Cisco Aironet 1500 Series MAP can be used to extend a remote network by using the backhaul radio to bridge multiple segments of a switched network. This is fundamentally a wireless mesh network with one MAP and no WLAN clients. Just as in point-to-multipoint networks, client access can still be provided with Ethernet bridging enabled, although if bridging between buildings, MAP coverage from a high rooftop might not be suitable for client access. To use an Ethernet-bridged application, enable the bridging feature on the RAP and on all the MAPs in that sector. Ethernet bridging should be enabled for the following scenarios: · Use mesh nodes as bridges. · Connect Ethernet devices, such as a video camera on a MAP using its Ethernet port. Note Ensure that Ethernet bridging is enabled for every parent mesh AP taking the path from the mesh AP to the controller. In a mesh environment with VLAN support for Ethernet bridging, the secondary Ethernet interfaces on MAPs are assigned a VLAN individually from the controller. All the backhaul bridge links, both wired and wireless, are trunk links with all the VLANs enabled. Non-Ethernet bridged traffic, as well as untagged Ethernet bridged traffic travels along the mesh using the native VLAN of the APs in the mesh. It is similar for all the traffic to and from the wireless clients that the APs are servicing. The VLAN-tagged packets are tunneled through AWPP over wireless backhaul links. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1722 Mesh Access Points Multicast Over Mesh Ethernet Bridging Network VLAN Tagging for MAP Ethernet Clients The backhaul interfaces of mesh APs are referred to as primary interfaces, and other interfaces are referred to as secondary interfaces. Ethernet VLAN tagging allows specific application traffic to be segmented within a wireless mesh network and then forwarded (bridged) to a wired LAN (access mode) or bridged to another wireless mesh network (trunk mode). Multicast Over Mesh Ethernet Bridging Network Mesh multicast modes determine how bridging-enabled APs such as MAP and RAP, send multicast packets among Ethernet LANs within a mesh network. Mesh multicast modes manage only non-CAPWAP multicast traffic. CAPWAP multicast traffic is governed by a different mechanism. Three different mesh multicast modes are available to manage multicast and broadcast packets on all MAPs. When enabled, these modes reduce unnecessary multicast transmissions within the mesh network and conserve backhaul bandwidth. The three mesh multicast modes are: · Regular mode: Data is multicast across the entire mesh network and all its segments by bridging-enabled RAP and MAP. · In-only mode: Multicast packets received from the Ethernet by a MAP are forwarded to the corresponding RAP's Ethernet network. No additional forwarding occurs, which ensures that non-CAPWAP multicasts received by the RAP are not sent back to the MAP Ethernet networks within the mesh network (their point of origin), and MAP to MAP multicasts do not occur because such multicasts are filtered out. · In-out mode: The RAP and MAP both multicast but in a different manner. · If multicast packets are received at a MAP over Ethernet, they are sent to the RAP; however, they are not sent to other MAP over Ethernet, and the MAP-to-MAP packets are filtered out of the multicast. · If multicast packets are received at a RAP over Ethernet, they are sent to all the MAPs and their respective Ethernet networks. When the in-out mode is in operation, it is important to properly partition your network to ensure that a multicast sent by one RAP is not received by another RAP on the same Ethernet segment and then sent back into the network. Radio Resource Management on Mesh The Radio Resource Management (RRM) software embedded in the controller acts as a built-in RF engineer to consistently provide real-time RF management of your wireless network. RRM enables the controller to continually monitor the associated lightweight APs for information on traffic load, interference, noise, coverage, and other nearby APs: The RRM measurement in the mesh AP backhaul is enabled based on the following conditions: · Mesh AP has the Root AP role. · Root AP has joined using Ethernet link. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1723 Air Time Fairness on Mesh Mesh Access Points · Root AP is not serving any child AP. Air Time Fairness on Mesh The Air Time Fairness (ATF) on Mesh feature is conceptually similar to the ATF feature for local access points (APs). ATF is a form of wireless quality of service (QoS) that regulates downlink airtime (as opposed to egress bandwidth). Before a frame is transmitted, the ATF budget for that SSID is checked to ensure that there is sufficient airtime budget to transmit the frame. Each SSID can be thought of as having a token bucket (1 token = 1 microsecond of airtime). If the token bucket contains enough airtime to transmit the frame, it is transmitted over air. Otherwise, the frame can either be dropped or deferred. Deferring a frame means that the frame is not admitted into the Access Category Queue (ACQ). Instead, it remains in the Client Priority Queue (CPQ) and transmitted at a later time when the corresponding token bucket contains a sufficient number of tokens (unless the CPQ reaches full capacity, at which point, the frame is dropped). The majority of the work involved in the context of ATF takes place on the APs. The wireless controller is used to configure the ATF on Mesh and display the results. In a mesh architecture, the mesh APs (parent and child MAPs) in a mesh tree access the same channel on the backhaul radio for mesh connectivity between parent and child MAPs. The root AP is connected by wire to the controller, and MAPs are connected wirelessly to the controller. Hence, all the CAPWAP and Wi-Fi traffic are bridged to the controller through the wireless backhaul radio and through RAP. In terms of physical locations, normally, RAPs are placed at the roof top and MAPs in multiple hops are placed some distance apart from each other based on the mesh network segmentation guidelines. Hence, each MAP in a mesh tree can provide 100 percent of its own radio airtime downstream to its users though each MAP accessing the same medium. Compare this to a nonmesh scenario, where neighboring local-mode unified APs in the arena next to each other in different rooms, serving their respective clients on the same channel, and each AP providing 100% radio airtime downstream. ATF has no control over clients from two different neighboring APs accessing the same medium. Similarly, it is applicable for MAPs in a mesh tree. For outdoor or indoor mesh APs, ATF must be supported on client access radios that serve regular clients similarly to how it is supported on ATF on nonmesh unified local mode APs to serve the clients. Additionally, it must also be supported on backhaul radios which bridge the traffic to/from the clients on client access radios to RAPs (one hop) or through MAPs to RAPs (multiple hops). It is a bit tricky to support ATF on the backhaul radios using the same SSID/Policy/Weight/Client fair-sharing model. Backhaul radios do not have SSIDs and it always bridge traffic through their hidden backhaul nodes. Therefore, on the backhaul radios in a RAP or a MAP, the radio airtime downstream is shared equally, based on the number of backhaul nodes. This approach provides fairness to users across a wireless mesh network, where clients associated to second-hop MAP can stall the clients associated to first-hop MAP where second-hop MAP is connected wireless to first-hop MAP through backhaul radio even though the Wi-Fi users in the MAPs are separated by a physical location. In a scenario where a backhaul radio has an option to serve normal clients through universal client access feature, ATF places the regular clients into a single node and groups them. It also enforces the airtime by equally sharing the radio airtime downstream, based on the number of nodes (backhaul nodes plus a single node for regular clients). Spectrum Intelligence for Mesh The Spectrum Intelligence feature scans for non-Wi-Fi radio interference on 2.4-GHz and 5-GHz bands. The feature supports client serving mode and monitor mode. The Cisco CleanAir technology in mesh backhaul and access radios provides an Interference Device Report (IDR) and Air Quality Index (AQI). Two key mitigation features (Event-Driven Radio Resource Management [EDRRM] and Persistence Device Avoidance Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1724 Mesh Access Points Indoor Mesh Interoperability with Outdoor Mesh [PDA]) are present in CleanAir. Both rely directly on information that can only be gathered by CleanAir. In the client-access radio band, they work the same way in mesh networks as they do in nonmesh networks in the backhaul radio band, the CleanAir reports are only displayed on the controller. No action is taken through ED-RRM. Note that no specific configuration options are available to enable or disable CleanAir for MAPs. For more information about Spectrum Intelligence, see Configuring Spectrum Intelligence, on page 1700 section. Indoor Mesh Interoperability with Outdoor Mesh Interoperability of indoor MAPs with outdoor APs are supported. This helps to bring coverage from outdoors to indoors. However, we recommend that you use indoor MAPs for indoor use only, and deploy them outdoors only under limited circumstances such as a simple short-haul extension from an indoor WLAN to a hop in a parking lot. Mobility groups can be shared between outdoor mesh networks and indoor WLAN networks. It is also possible for a single controller to control indoor and outdoor MAPs simultaneously. Not that the same WLANs are broadcast out of both indoor and outdoor MAPs. Workgroup Bridge A workgroup bridge (WGB) is used to connect wired networks over a single wireless segment by informing the corresponding MAP of all the clients that the WGB has on its wired segment via IAPP messages. In addition to the IAPP control messages, the data packets for WGB clients contain an extra MAC address in the 802.11 header (four MAC headers, versus the normal three MAC data headers). The extra MAC in the header is the address of the workgroup bridge itself. This extra MAC address is used to route a packet to and from the corresponding clients. APs can be configured as workgroup bridges. Only one radio interface is used for controller connectivity, Ethernet interface for wired client connectivity, and other radio interface for wireless client connectivity. In Cisco Catalyst 9800 Series Wireless Controller, WGB acts as a client association, with the wired clients behind WGB supported for data traffic over the mesh network. Wired clients with different VLANs behind WGB are also supported. Link Test A link test is used to determine the quality of the radio link between two devices. Two types of link-test packets are transmitted during a link test: request and response. Any radio receiving a link-test request packet fills in the appropriate text boxes and echoes the packet back to the sender with the response type set. The radio link quality in the client-to-access point direction can differ from that in the access point-to-client direction due to the asymmetrical distribution of the transmit power and receive sensitivity on both sides. Two types of link tests can be performed: a ping test and a CCX link test. With the ping link test, the controller can test link quality only in the client-to-access point direction. The RF parameters of the ping reply packets received by the access point are polled by the controller to determine the client-to-access point link quality. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1725 Mesh Daisy Chaining Mesh Access Points With the CCX link test, the controller can also test the link quality in the access point-to-client direction. The controller issues link-test requests to the client, and the client records the RF parameters (received signal strength indicator [RSSI], signal-to-noise ratio [SNR], and so on). of the received request packet in the response packet. Both the link-test requestor and responder roles are implemented on the access point and controller. Not only can the access point or controller initiate a link test to a CCX v4 or v5 client, but a CCX v4 or v5 client can initiate a link test to the access point or controller. Mesh Daisy Chaining Mesh APs have the capability to daisy chain APs when they function as MAPs. The daisy chained MAPs can either operate the APs as a serial backhaul, allowing different channels for uplink and downlink access, thus improving backhaul bandwidth, or extend universal access. Extending universal access allows you to connect a local mode or FlexConnect mode Mesh AP to the Ethernet port of a MAP, thus extending the network to provide better client access. Daisy chained APs must be cabled differently depending on how the APs are powered. If an AP is powered using DC power, an Ethernet cable must be connected directly from the LAN port of the Primary AP to the PoE in a port of the Subordinate AP. The following are the guidelines for the daisy chaining mode: · Primary MAP should be configured as mesh AP. · Subordinate MAP should be configured as root AP. · Daisy chaining should be enabled on both primary and subordinate MAP. · Ethernet bridging should be enabled on all the APs in the Bridge mode. Enable Ethernet bridging in the mesh profile and map all the bridge mode APs in the sector to the same mesh profile. · VLAN support should be enabled on the wired root AP, subordinate MAP, and primary MAP along with proper native VLAN configuration. Mesh Leaf Node You can configure a MAP with lower performance to work only as a leaf node. When the mesh network is formed and converged, the leaf node can only work as a child MAP, and cannot be selected by other MAPs as a parent MAP, thus ensuring that the wireless backhaul performance is not downgraded. Flex+Bridge Mode Flex+Bridge mode is used to enable FlexConnect capabilities on mesh (bridge mode) APs. Mesh APs inherit VLANs from the root AP that is connected to it. Any EWC capable AP in Flex mode connected to a MAP, should be in CAPWAP mode (AP-type CAPWAP). You can enable or disable VLAN trunking and configure a native VLAN ID on each AP for any of the following modes: · FlexConnect Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1726 Mesh Access Points Backhaul Client Access · Flex+Bridge (FlexConnect+Mesh) Backhaul Client Access When Backhaul Client Access is enabled, it allows wireless client association over the backhaul radio. The backhaul radio can be a 2.4-GHz or 5-GHz radio. This means that a backhaul radio can carry both backhaul traffic and client traffic. When Backhaul Client Access is disabled, only backhaul traffic is sent over the backhaul radio, and client association is performed only over the access radio. Note Backhaul Client Access is disabled by default. After the Backhaul Client Access is enabled, all the MAPs, except subordinate AP and its child APs in daisy-chained deployment, reboot. Mesh CAC The Call Admission Control (CAC) enables a mesh access point to maintain controlled quality of service (QoS) on the controller to manage voice quality on the mesh network. Bandwidth-based, or static CAC enables the client to specify how much bandwidth or shared medium time is required to accept a new call. Each access point determines whether it is capable of accommodating a particular call by looking at the bandwidth available and compares it against the bandwidth required for the call. If there is not enough bandwidth available to maintain the maximum allowed number of calls with acceptable quality, the mesh access point rejects the call. · When client roams from one MAP to another in same site, bandwidth availability is checked again in the new tree for the active calls. · When MAP roams to new parent, the active calls are not terminated and it continues to be active with other active calls in the sub tree. · High Availability (HA) for MAPs is not supported; calls attached to MAP's access radio are terminated on HA switchover. · HA for RAP is supported, hence calls attached to RAP's access radio continues to be active in new controller after switchover. · Mesh CAC algorithm is applicable only for voice calls. · For Mesh backhaul radio bandwidth calculation, static CAC is applied. Load-based CAC is not used as the APs do not support load-based CAC in Mesh backhaul. · Calls are allowed based on available bandwidth on a radio. Airtime Fairness (ATF) is not accounted for call admission and the calls that fall under ATF policy are given bandwidth as per ATF weight. Mesh CAC is not supported for the following scenarios. · APs in a Mesh tree assigned with different site tags. · APs in a Mesh tree assigned with the default site tag. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1727 Prerequisites for Mesh Ethernet Daisy Chaining Mesh Access Points Prerequisites for Mesh Ethernet Daisy Chaining · Ensure that you have configured the AP role as root AP. · Ensure that you have enabled Ethernet Bridging and Strict Wired Uplink on the corresponding AP. · Ensure that you have disabled VLAN transparency. · To enable VLAN support on each root AP for bridge mode APs, use the ap name name-of-rap mesh vlan-trunking [native] vlan-id command to configure a trunk VLAN on the corresponding RAP. · To enable VLAN support on each root AP, for Flex+Bridge APs, you must configure the native VLAN ID under the corresponding flex profile. · Ensure that you use a 4-pair cables that support 1000 Mbps. This feature does not work properly with 2-pair cables supporting 100 Mbps. Restrictions for Mesh Ethernet Daisy Chaining · This feature is applicable to the Cisco Industrial Wireless 3702 AP and Cisco Catalyst 9124 Series APs. · This feature is applicable to APs operating in Bridge mode and Flex+Bridge mode only. · In Flex+Bridge mode, if local switching WLAN is enabled, the work group bridge (WGB) multiple VLAN is not supported. · To support the Ethernet daisy chain topology, you must not connect the Cisco Industrial Wireless 3702 PoE out port to other Cisco Industrial Wireless 3702 PoE in the port, and the power injector must be used as power supply for the AP. · The network convergence time increases when the number of APs increase in the chain. · Any EWC capable AP which is part of daisy chaining and has been assigned the RAP role, must be in CAPWAP mode (ap-type capwap). Speeding up Mesh Network Recovery Through Fast Detection of Uplink Gateway Reachability Failure In all 802.11ac Wave 2 APs, the speed of mesh network recovery mechanism is increased through fast detection of uplink gateway reachability failure. The uplink gateway reachability of the mesh APs is checked using ICMP ping to the default gateway, either IPv4 or IPv6. Mesh AP triggers the reachability check in the following two scenarios: · After a new uplink is selected, until the mesh AP joins the controller After a new uplink is selected, the mesh AP has a window of 45 seconds to reach gateway (via static IP or DHCP) through the selected uplink. If the mesh AP still fails to reach the gateway after 45 seconds, the current uplink is in blocked list and the uplink selection process is restarted. If the AP joins the Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1728 Mesh Access Points Fast Teardown for a Mesh Deployment controller within this 45-second window, the reachability check is stopped. Subsequently, there is no gateway reachability check during normal operations. · As soon as the mesh AP times out its connection with the controller After the mesh AP times out its connection with the controller and the AP fails to reach the gateway in 5 seconds, the current uplink is immediately added to the blocked list and the uplink selection process is restarted. Fast Teardown for a Mesh Deployment In mesh deployments, sometimes a root access point connects to the controller through a nonreliable link such as a wireless microwave link. If a data uplink failure occurs, client loses connectivity to detect the cause of the failure. The feature allows you to detect the root access point uplink failure faster in a mesh deployment and address fast teardown of the mesh network when uplink failure occurs on the root access point. Note Fast Teardown for Mesh APs is not supported on Cisco Industrial Wireless (IW) 3702 Access Points. Configuring MAC Authorization (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Security > AAA > AAA Advanced > Device Authentication. Click Add. The Quick Step: MAC Filtering window is displayed. In the Quick Step: MAC Filtering window, complete the following: a) Enter the MAC Address. The MAC address can be in either xx:xx:xx:xx:xx:xx, xx-xx-xx-xx-xx-xx, or xxxx.xxxx.xxxx format. b) Choose the Attribute List Name from the drop-down list. c) Choose the WLAN Profile Name from the drop-down list. d) Click Apply to Device. Choose Configuration > Security > AAA > AAA Method List > Authorization. Click Add. The Quick Step: AAA Authorization window is displayed. In the Quick Step: AAA Authorization window, complete the following: a) Enter the Method List Name. b) Choose the Type from the drop-down list. c) Choose the Group Type from the drop-down list. d) Check the Fallback to Local check box. e) Check the Authenticated check box. f) Move the required servers from the Available Server Groups to the Assigned Server Groups. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1729 Configuring MAC Authorization (CLI) Mesh Access Points Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 g) Click Apply to Device. Choose Configuration > Wireless > Mesh > Profiles. Click the mesh profile. The Edit Mesh Profile window is displayed. Click the Advanced tab. In the Security settings, from the Method drop-down list, choose EAP. Choose the Authentication Method from the drop-down list. Choose the Authorization Method from the drop-down list. Click Update & Apply to Device. Configuring MAC Authorization (CLI) Follow the procedure given below to add the MAC address of a bridge mode AP to the controller. Before you begin · MAC filtering for bridge mode APs are enabled by default on the controller. Therefore, only the MAC address need to be configured. The MAC address that is to be used is the one that is provided at the back of the corresponding AP. · MAC authorization is supported internally, as well as using an external AAA server. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 username user-name Example: Device(config)# username username1 Configures user name authentication for MAC filtering where username is MAC address. Step 3 aaa authorization credential-download method-name local Example: Device(config)# aaa authorization credential-download list1 local Sets an authorization method list to use local credentials. Step 4 aaa authorization credential-download Sets an authorization method list to use a method-name radius group server-group-name RADIUS server group. Example: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1730 Mesh Access Points Configuring MAP Authorization - EAP (GUI) Step 5 Step 6 Command or Action Purpose Device(config)# aaa authorization credential-download auth1 radius group radius-server-1 wireless profile mesh profile-name Example: Device(config)# wireless profile mesh mesh1 Configures a mesh profile and enters mesh profile configuration mode. method authorization method-name Example: Device(config-wireless-mesh-profile)# method authorization auth1 Configures the authorization method for mesh AP authorization. Configuring MAP Authorization - EAP (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Choose Configuration > Security > AAA > AAA Method List > Device Authentication. Click Add. Enter Method List Name. Choose Type as dot1x and Group Type from the the drop-down lists. dot1x Check or uncheck the Fallback to Local check box. Move the required servers from the Available Server Groups to the Assigned Server Groups. Click Apply to Device. Choose Configuration > Wireless > Mesh > Profiles. Click the mesh profile. The Edit Mesh Profile window is displayed. Choose the Advanced tab. In the Security settings, from the Method drop-down list, choose EAP. Choose the options from the Authentication Method and Authorization Method drop-down lists. Click Update & Apply to Device. Configuring MAP Authorization (CLI) Select and configure authentication method of EAP/PSK for MAP authentication. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1731 Configuring PSK Provisioning (CLI) Mesh Access Points Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 aaa authentication method-name radius group For local authentication: server-group-name Device(config)# aaa authentication dot1x Example: auth1 local Device(config)# aaa authentication dot1x Sets an authentication method list to use a auth1 radius group radius-server-1 RADIUS server group. This is required for EAP authentication. Step 3 wireless profile mesh profile--name local Example: Device(config)# wireless profile mesh mesh1 Sets an authorization method list to use local credentials. Step 4 security eap server-group-name Example: Device(config-wireless-mesh-profile)# security eap / psk Configures the mesh security EAP/PSK for mesh AP. Step 5 method authentication method-name Example: Device(config-wireless-mesh-profile)# method authentication auth1 Configures the authentication method for mesh AP authentication. Configuring PSK Provisioning (CLI) When PSK provisioning is enabled, the APs join with default PSK initially. After that PSK provisioning key is set, the configured key is pushed to the newly joined AP. Follow the procedure given below to configure a PSK: Before you begin The provisioned PSK should have been pushed to all the APs that are configured with PSK as mesh security. Note · PSKs are saved across reboots in the controller as well as on the corresponding mesh AP. · A controller can have total of five PSKs and one default PSK. · A mesh AP deletes its provisioned PSK only on factory reset. · A mesh AP never uses the default PSK after receiving the first provisioned PSK. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1732 Mesh Access Points Configuring a Bridge Group Name (GUI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless mesh security psk provisioning Example: Device(config)# wireless mesh security psk provisioning Configures the security method for wireless as PSK. Note The provisioned PSK is pushed only to those APs that are configured with PSK as the mesh security method. Step 3 Step 4 Step 5 wireless mesh security psk provisioning key Configures a new PSK for mesh APs. index {0 | 8} pre-shared-key description Example: Device(config)# wireless mesh security psk provisioning key 1 0 secret secret-key wireless mesh security psk provisioning default-psk Enables default PSK-based authentication. Example: Device(config)# wireless mesh security psk provisioning default-psk wireless mesh security psk provisioning inuse Specifies the PSK to be actively used. index Note You should explicitly set the Example: in-use key index in the global Device(config)# wireless mesh security psk provisioning inuse 1 configuration pointing to the PSK index. Configuring a Bridge Group Name (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Wireless > Mesh > Profiles Click Add. In the Advanced tab, under the Bridge Group settings, enter the Bridge Group Name. Under the Bridge Group settings, check the Strict Match check box to enable the feature. When Strict Match BGN is enabled on a MAP, it scans ten times to find a matching BGN parent. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1733 Configuring a Bridge Group Name (CLI) Mesh Access Points Step 5 Click Apply to Device. Configuring a Bridge Group Name (CLI) · If a bridge group name (BGN) is configured on a mesh profile, whenever a MAP joins the controller, it pushes the BGN configured on the mesh profile to the AP. · Whenever a mesh AP moves from AireOS controller to the Cisco Catalyst 9800 Series Wireless Controller, the BGN configured on the mesh profile is pushed to that AP and stored there. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile mesh profile-name Example: Device(config)# wireless profile mesh mesh1 Configures a mesh profile and enters mesh profile configuration mode. Step 3 bridge-group name bridge-grp-name Example: Device(config-wireless-mesh-profile)# bridge-group name bgn1 Configures a bridge group name. Step 4 bridge-group strict-match Example: Device(config-wireless-mesh-profile)# bridge-group strict-match Configures bridge group strict matching. Configuring Background Scanning (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Wireless > Mesh > Profiles Choose a profile. In General tab, check the Background Scanning check box. Click Update & Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1734 Mesh Access Points Configuring Background Scanning Configuring Background Scanning Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile mesh profile-name Example: Device(config)# wireless profile mesh mesh1 Configures a mesh profile and enters mesh profile configuration mode. Step 3 background-scanning Example: Device(config-wireless-mesh-profile)# background-scanning Configures background scanning in mesh deployments. Configuring AP Fast Ancestor Find Mode (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Configuration > Wireless > Mesh > Profiles. Click Add. The Add Mesh Profile window is displayed. In the Add Mesh Profile window, click the General tab. In the Name field, enter the mesh profile name. In the Description field, enter a description for the mesh profile. Check the MAP Fast Ancestor Find check box to enable a MAP (child) to synchronize with any neighbor MAP (parent) across all channels. Click Apply to Device to save the configuration. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1735 Configuring Background Scanning and MAP Fast Ancestor Find Mode (CLI) Mesh Access Points Configuring Background Scanning and MAP Fast Ancestor Find Mode (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile mesh profile-name Example: Device# wireless profile mesh default-mesh-profile Configures a mesh profile and enters mesh profile configuration mode. Step 3 background-scanning Example: Device(config-wireless-mesh-profile)# background-scanning Configures background scanning in mesh deployments. Note In Cisco Catalyst 9124 Series Access Points, a dedicated RF ASIC radio is used for background scanning. Step 4 map-fast-ancestor-find Example: Device(config-wireless-mesh-profile)# map-fast-ancestor-find Configures fast ancestor find mode. Configuring Backhaul Client Access (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Wireless > Mesh > Profiles Choose a profile. In General tab, check the Backhaul Client Access check box. Click Update & Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1736 Mesh Access Points Configuring Backhaul Client Access (CLI) Configuring Backhaul Client Access (CLI) Note Backhaul client access is disabled by default. After it is enabled, all the MAPs, except subordinate AP and its child APs in daisy-chained deployment, reboot. Follow the procedure given below to enable backhaul client access on a mesh profile: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile mesh profile-name Example: Device(config)# wireless profile mesh mesh1 Configures a mesh profile and enters mesh profile configuration mode. Step 3 client-access Example: Device(config-wireless-mesh-profile)# client-access Configures backhaul with client access AP. Configuring Dot11ax Rates on Mesh Backhaul Per Access Point (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Wireless > Access Points. The All Access Points section, which lists all the configured APs in the network, is displayed with their corresponding details. Click the configured mesh AP. The Edit AP window is displayed. Choose the Mesh tab. In the General section, under the Backhaul section, the default Backhaul Radio Type, Backhaul Slot ID, and Rate Types field details are displayed. Note that the values for Backhaul Radio Type and Backhaul Slot ID can be changed only for a root AP. From the Rate Types drop-down list, choose the backhaul rate type. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1737 Configuring Dot11ax Rates on Mesh Backhaul in Mesh Profile (GUI) Mesh Access Points Step 6 Step 7 Step 8 Based on the choice, enter the details for the corresponding fields that are displayed. The backhaul interface varies between auto and 802.11a/b/g/n/ac/ax rates depending upon the AP. Cisco Catalyst 9124AX Outdoor Access Point is the only AP that support 11ax backhaul rates on the mesh backhaul. In the Backhaul MCS Index field, enter the Modulation Coding Scheme (MCS) rate, that can be transmitted between the APs. The valid range is from 0 to 11, on both the bands. In the Spatial Stream field, enter the number of spatial streams that are supported. The maximum number of spatial streams supported on a single radio in a 5-GHz radio band is 8, while 2.4-GHz radio band supports 4 spatial streams. Click Update and Apply to Device. Configuring Dot11ax Rates on Mesh Backhaul in Mesh Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Choose Configuration > Wireless > Mesh > Profiles. Click Add. The Add Mesh Profile window is displayed. In the Add Mesh Profile window, click the General tab. In the Name field, enter the mesh profile name. Click the Advanced tab. In the 5 GHz Band Backhaul section and the 2.4 GHz Band Backhaul section, choose the dot11ax backhaul rate type from Rate Types the drop-down list. Note Cisco Catalyst 9124AXI/D Series outdoor Access Point is the only AP to support 11ax backhaul rates on the mesh backhaul. In the Dot11ax MCS index field, specify the MCS rate at which data can be transmitted between the APs. The value range is between 0 to 11, on both the radio bands. In the Spatial Stream field, enter a value. The maximum number of spatial streams supported on a single radio in a 5-GHz radio band is 8, while 2.4- GHz radio band supports 4 spatial streams. Click Update and Apply to Device. Configuring Wireless Backhaul Data Rate (CLI) Backhaul is used to create a wireless connection between APs. A backhaul interface can be 802.11bg/a/n/ac depending on the AP. The rate selection provides for effective use of the available RF spectrum. Data rates can also affect the RF coverage and network performance. Lower data rates, for example, 6 Mbps, can extend farther from the AP than can have higher data rates, for example, 1300 Mbps. As a result, the data rate affects cell coverage, and consequently, the number of APs required. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1738 Mesh Access Points Configuring Data Rate Per AP (CLI) Note You can configure backhaul data rate, preferably, through the mesh profile. In certain cases, where a specific data rate is needed, use the command to configure the data rate per AP. Follow the procedure given below to configure wireless backhaul data rate in privileged EXEC mode or in mesh profile configuration mode. Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enters privileged EXEC mode. Step 2 ap name ap-name mesh backhaul rate {auto Configures backhaul transmission rate. | dot11abg | dot11ac |dot11n} Example: Device# #ap name ap1 mesh backhaul rate auto Step 3 wireless profile mesh profile-name Example: Device(config)# wireless profile mesh mesh1 Configures a mesh profile and enters mesh profile configuration mode. Step 4 backhaul rate dot11 {24ghz | 5ghz}dot11n RATE_6M Example: Device(config-wireless-mesh-profile)# backhaul rate dot11 5ghz dot11n mcs 31 Configures backhaul transmission rate. Note Note that the rate configured on the AP (step 2) should match with the rate configured on the mesh profile (step4). Configuring Data Rate Per AP (CLI) Procedure Step 1 Command or Action enable Example: Device> enable Step 2 ap name ap-name mesh backhaul rate dot11ax mcs <0-11> ss <1-8> Example: Purpose Enters privileged EXEC mode. Configures mesh backhaul 11ax rates for 2.4-GHz and 5-GHz bands. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1739 Configuring Data Rate Using Mesh Profile (CLI) Mesh Access Points Command or Action Purpose Device# ap name ap1 mesh backhaul rate dot11ax 5 ss 4 Configuring Data Rate Using Mesh Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile mesh profile-name Example: Device(config)# wireless profile mesh mesh1 Configures a mesh profile and enters mesh profile configuration mode. Step 3 backhaul rate dot11 {24ghz | 5ghz}dot11ax Configures backhaul transmission rate for mcs <0-11> spatial-stream <1-8> 2.4-GHz band and 5-GHz band. The 802.11ax Example: Device(config-wireless-mesh-profile)# backhaul rate dot11 5ghz dot11ax mcs 5 spatial stream value for 2.4-GHz band is from 1 to 4, and the spatial stream value for the 5-GHz band is from 1to 8. spatial-stream 6 Device(config-wireless-mesh-profile)# backhaul rate dot11 24ghz dot11ax mcs 5 spatial-stream 4 Configuring Mesh Backhaul (CLI) This section describes how to configure mesh backhaul at 2.4 GHz. Procedure Step 1 Command or Action Purpose ap name ap_name mesh backhaul radio dot11 Changes the mesh backhaul to 2.4 GHz. 24ghz Example: Device # ap name test-ap mesh backhaul radio dot11 24ghz Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1740 Mesh Access Points Configuring Dynamic Frequency Selection (CLI) Configuring Dynamic Frequency Selection (CLI) DFS specifies the types of radar waveforms that should be detected along with certain timers for an unlicensed operation in the DFS channel. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile mesh profile-name Example: Device(config)# wireless profile mesh mesh1 Configures a mesh profile and enters mesh profile configuration mode. Step 3 full-sector-dfs Example: Device(config-wireless-mesh-profile)# full-sector-dfs Enables DFS. Note DFS functionality allows a MAP that detects a radar signal to transmit that up to the RAP, which then acts as if it has experienced radar and moves the sector. This process is called the coordinated channel change. The coordinated channel change is always enabled for Cisco Wave 2 and the later versions. The coordinated channel change can be disabled only for Cisco Wave 1 APs. Configuring the Intrusion Detection System (CLI) When enabled, the intrusion detection system generates reports for all the traffic on the client access. However, this is not applicable for the backhaul traffic. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1741 Configuring Ethernet Bridging (GUI) Mesh Access Points Step 2 Step 3 Command or Action wireless profile mesh profile-name Example: Device(config)# wireless profile mesh mesh1 Purpose Configures a mesh profile and enters mesh profile configuration mode. ids Example: Device(config-wireless-mesh-profile)# ids Configures intrusion detection system reporting for mesh APs. Configuring Ethernet Bridging (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Wireless > Mesh > Profiles Click Add. In General tab, enter the Name of the mesh profile. In the Advanced tab, check the VLAN Transparent check box to enable VLAN transparency. In Advanced tab, check the Ethernet Bridging check box. Click Apply to Device. Configuring Ethernet Bridging (CLI) The Ethernet port on the MAPs are disabled by default. It can be enabled only by configuring Ethernet bridging on the Root AP and the other respective MAPs. Ethernet bridging can be enabled for the following scenarios: · To use the mesh nodes as bridges. · To connect Ethernet devices, such as a video camera, on a MAP using the MAP's Ethernet port. Before you begin · Ensure that you configure the following commands under the mesh profile configuration for Ethernet bridging to be enabled: · ethernet-bridging: Enables the Ethernet Bridging feature on an AP. · no ethernet-vlan-transparent: Makes the wireless mesh bridge VLAN aware. Allows VLAN filtering with the following AP command: [no] mesh ethernet {0 | 1 | 2 | 3} mode trunk vlan allowed. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1742 Mesh Access Points Configuring Ethernet Bridging (CLI) Note If you wish to have all the VLANs bridged (where bridge acts like a piece of wire), then you must enable VLAN transparency, which allows all VLANS to pass. If you choose to use VLAN transparent mode, it is best to filter the VLANS on the wired side of the network to avoid unnecessary traffic from flooding the network. · The switch port to which the Root AP is connected should be configured as the trunk port for Ethernet bridging to work. · For Bridge mode APs, use the ap name name-of-rap mesh vlan-trunking native vlan-id command to configure a trunk VLAN on the corresponding RAP. The Ethernet Bridging feature will not be enabled on the AP without configuring this command. · For Flex+Brigde APs, configure the native VLAN ID under the corresponding flex profile. Note To ensure that the MAPs apply the Ethernet VLAN configuration on the controller, configure the native VLAN on the RAP by running the following command: Device# ap name ap-name no mesh vlan-trunking Device# ap name ap-name mesh vlan-trunking native 247 Alternatively, you can configure native VLAN on the RAP and then the MAP in the following order: Device# ap name ap-name no mesh vlan-trunking Device# ap name ap-name mesh vlan-trunking native vlan_id Device# ap name ap-name mesh ethernet 1 mode trunk vlan native native Device# ap name ap-name mesh ethernet 0 mode trunk vlan allowed allowed To verify the status of RAP and MAP, run the following command: Device# show mesh forwarding all Procedure Step 1 Command or Action enable Example: Device# enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. Step 2 ap name ap-name mesh ethernet {0 | 1 | 2 | Configures the Ethernet port of the AP and sets 3}mode access vlan-id the mode as trunk. Example: Device# ap name ap1 mesh ethernet 1 mode access 21 Step 3 ap name ap-name mesh ethernet {0 | 1 | 2 | 3}mode trunk vlan vlan-id Example: Sets the native VLAN for the trunk port. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1743 Configuring Multicast Modes over Mesh Mesh Access Points Step 4 Command or Action Purpose Device# ap name ap1 mesh ethernet 1 mode trunk vlan native 21 ap name ap-name mesh ethernet {0 | 1 | 2 | Configures the allowed VLANs for the trunk 3}mode trunk vlan allowed vlan-id port. Example: Permits VLAN filtering on an ethernet port of Device# ap name ap1 mesh ethernet 1 mode any Mesh or Root Access Point. Active only trunk vlan allowed 21 when VLAN transparency is disabled in the mesh profile. Configuring Multicast Modes over Mesh · If multicast packets are received at a MAP over Ethernet, they are sent to the RAP. However, they are not sent to other MAPs. MAP-to-MAP packets are filtered out of the multicast. · If multicast packets are received at a RAP over Ethernet, they are sent to all the MAPs and their respective Ethernet networks. · The in-out mode is the default mode. When this in-out mode is in operation, it is important to properly partition your network to ensure that a multicast sent by one RAP is not received by another RAP on the same Ethernet segment, and then sent back into the network. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile mesh profile-name Example: Device(config)# wireless profile mesh mesh1 Configures a mesh profile and enters mesh profile configuration mode. Step 3 multicast {in-only | in-out | regular} Example: Device(config-wireless-mesh-profile)# multicast regular Configures mesh multicast mode. Configuring RRM on Mesh Backhaul (CLI) The RRM measurement in the mesh AP backhaul is enabled based on the following conditions: · Mesh AP has the Root AP role. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1744 Mesh Access Points Configuring RRM Channel Assignment for Root Access Points Globally · Root AP has joined using an Ethernet link. · Root AP is not serving any child AP. Follow the procedure given below to enable RRM in the mesh backhaul: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless mesh backhaul rrm Configures RRM on the mesh backhaul. Example: Device(config)# wireless mesh backhaul rrm Configuring RRM Channel Assignment for Root Access Points Globally Before you begin Ensure that you have configured RRM for mesh backhaul before RRM DCA is triggered. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless mesh backhaul rrm Configures RRM for mesh backhaul. Example: Device(config)# wireless mesh backhaul rrm Step 3 (Optional) wireless mesh backhaul rrm auto-dca Example: Configures auto DCA for RF Application Specific Integrated Circuit (ASIC) integrated RAPs. Device(config)# wireless mesh backhaul rrm auto-dca To configure the initial channel assignment of the RAP in priviliged EXEC mode through RRM, and to initiate channel selection for each bridge group, complete the following steps. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1745 Configuring RRM Channel Assignment for an Access Point Mesh Access Points Procedure Step 1 Command or Action enable Example: Device# enable Purpose Enters privileged EXEC mode. Step 2 ap dot11 {24ghz | 5ghz | 6ghz} rrm channel-update mesh Example: Initiates update of the 802.11, 802.11a, or 802.11b channel selection for every mesh Cisco AP. Device# ap dot11 5ghz rrm channel-update mesh Step 3 ap dot11 {24ghz | 5ghz | 6ghz} rrm channel-update mesh bridge-group bridge-group-name Initiates update of the 802.11, 802.11a, or 802.11b channel selection for mesh AP in the bridge group. Example: Device# ap dot11 5ghz rrm channel-update mesh bridge-group cisco-bridge-group Configuring RRM Channel Assignment for an Access Point To trigger RRM DCA for an AP, complete the following procedure: Procedure Step 1 Command or Action enable Example: Device# enable Purpose Enters privileged EXEC mode. Step 2 ap name Cisco-ap-name dot11 {24ghz | 5ghz Triggers RRM DCA for the specific AP. | 6ghz} rrm channel update mesh Example: Device# ap name Cisco-ap-name dot11 5ghz rrm channel update mesh Selecting a Preferred Parent (GUI) Procedure Step 1 Choose Configuration > Wireless > Access Points. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1746 Mesh Access Points Selecting a Preferred Parent (CLI) Step 2 Step 3 Step 4 Click the Access Point. In the Mesh tab, enter the Preferred Parent MAC. Click Update & Apply to Device. Selecting a Preferred Parent (CLI) Follow the procedure given below to configure a preferred parent for a MAP. Using this mechanism, you can override the AWPP-defined parent selection mechanism and force a mesh AP to go to a preferred parent. Procedure Step 1 Command or Action enable Example: Device> enable Step 2 ap name ap-name mesh parent preferred mac-address Example: Purpose Enters privileged EXEC mode. Configures mesh parameters for the AP and sets the mesh-preferred parent MAC address. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1747 Changing the Role of an AP (GUI) Mesh Access Points Command or Action Purpose Device# ap name ap1 mesh parent preferred Note 00:0d:ed:dd:25:8F Ensure that you use the radio MAC address of the preferred parent. For Cisco Wave 1 APs, when you configure a preferred parent, ensure that you specify the MAC address of the actual mesh neighbor for the desired parent. This MAC address is the base radio MAC address that has the letter "f" as the final character. For example, if the base radio MAC address is 00:24:13:0f:92:00, then you must specify 00:24:13:0f:92:0f as the preferred parent. Device# ap name ap1 mesh parent preferred 00:24:13:0f:92:0f For Cisco Wave 2 APs, when you configure a preferred parent, the MAC address is the base radio MAC address that has "0x11" added to the last two characters. For example, if the base radio MAC address is 00:24:13:0f:92:00, then you must specify 00:24:13:0f:92:11 as the preferred parent. Device# ap name ap1 mesh parent preferred 00:24:13:0f:92:11 Changing the Role of an AP (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Wireless > Access Points. Click the Access Point. In the Mesh tab, choose Root or Mesh from the Role drop-down list. Click Update & Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1748 Mesh Access Points Changing the Role of an AP (CLI) After the role change is triggered, the AP reboots. Changing the Role of an AP (CLI) Follow the procedure to change the AP from MAP to RAP or vice-versa. By default, APs join the controller in a mesh AP role. Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enters privileged EXEC mode. Step 2 ap name ap-name role {mesh-ap | root-ap} Example: Device# #ap name ap1 root-ap Changes the role for the Cisco bridge mode APs. After the role change is triggered, the AP reboots. Configuring the Mesh Leaf Node (CLI) Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enters privileged EXEC mode. Step 2 ap name ap-name mesh block-child Example: Device# #ap name ap1 mesh block-child Sets the AP to work only as a leaf node. This AP cannot be selected by other MAPs as a parent MAP. Note Use the no form of this command to change it to a regular AP. Configuring the Mesh Leaf Node (GUI) Procedure Step 1 Step 2 Choose Configuration > Wireless > Access Points. Click the Access Point. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1749 Configuring Subset Channel Synchronization Mesh Access Points Step 3 Step 4 In the Mesh tab, check the Block Child check box. Click Update & Apply to Device. Configuring Subset Channel Synchronization All the channels used by all the RAPs in a controller are sent to all the MAPs for future seek and convergence. The controller keeps a list of the subset channels for each Bridge Group Name (BGN). The list of subset channels are also shared across all the controllers in a mobility group. Subset channel list is list of channels where RAP of particular BGN are operating. This list is communicated to all the MAPs within and across the controllers. The idea of subset channel list is for faster convergence of the Mesh APs. Convergence method can be selected in mesh profile. If the convergence method is not standard then subset channel list is pushed to MAPs. Follow the procedure given below to configure subset channel synchronization for mobility group. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless mesh subset-channel-sync mac Example: Device(config)# wireless mesh subset-channel-sync Purpose Enters global configuration mode. Configures subset channel synchronization for a mobility group. Provisioning LSC for Bridge-Mode and Mesh APs (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Choose Configuration > Wireless > Access Points > LSC Provision. In the Add APs to LSC Provision List settings, click the Select File option to upload a CSV file that contains AP details. Click Upload File. You can also use the AP MAC Address field to search for APs using the MAC address and add them. The APs added to the provision list are displayed in the APs in Provision List list. Click Apply. Choose Configuration > Wireless > Mesh > Profiles Click Add. In the General tab, enter the Name of the mesh profile and check the LSC check box. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1750 Mesh Access Points Provisioning LSC for Bridge-Mode and Mesh APs Step 9 Step 10 In the Advanced tab, under the Security settings, choose the authorization method from the Authorization Method drop-down list. Click Apply to Device. Provisioning LSC for Bridge-Mode and Mesh APs · Configuring Locally Significant Certificate (LSC) will not remove pre-existing certificates from an AP. · An AP can have both LSC and Message Integrity Check (MIC) certificates. However, when an AP is provisioned with LSC, the MIC certificate is not used on boot-up. A change from LSC to MIC requires the AP to reboot. Follow the procedure given below to configure LSC for bridge-mode and mesh APs: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap lsc-provision Example: Device(config)# ap lsc-provision Purpose Enters global configuration mode. Configures LSC provisioning on an AP. Note This step is applicable only for mesh APs. Step 3 Step 4 Step 5 Step 6 ap lsc-provision provision-list Example: Device(config)# ap lsc-provision provision-list (Optional) Configures LSC provision for all the APs in the provision list. aaa authentication dot1x auth-list radius group radius-server-grp Example: Configures named authorization list for downloading EAP credential from radius group server. Device(config)# aaa authentication dot1x list1 radius group sg1 wireless profile mesh profile-name Example: Device(config)# wireless profile mesh mesh1 Configures a mesh profile and enters mesh profile configuration mode. lsc-only-auth Example: Device(config-wireless-mesh-profile)# lsc-only-auth Configures mesh security to LSC-only MAP authentication. After this command is run, all the mesh APs reboot. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1751 Specifying the Backhaul Slot for the Root AP (GUI) Mesh Access Points Step 7 Command or Action method authorization local Example: Device(config-wireless-mesh-profile)# method authorization list1 Purpose Configures an authorization method for mesh AP authorization. Specifying the Backhaul Slot for the Root AP (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Wireless > Mesh > Profiles Click Add. In General tab, enter the Name of the mesh profile. In Advanced tab, choose the rate types from the Rate Types drop-down list for 5 GHz Band Backhaul and 2.4 GHz Band Backhaul. Click Apply to Device. Specifying the Backhaul Slot for the Root AP (CLI) Follow the procedure given below to set the mesh backhaul rate. Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enters privileged EXEC mode. Step 2 ap name rap-name mesh backhaul radio dot11{24ghz | 5ghz} [slot slot-id] Sets the mesh backhaul radio slot. Example: Device# ap name rap1 mesh backhaul radio dot11 24ghz slot 2 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1752 Mesh Access Points Using a Link Test on Mesh Backhaul (GUI) Using a Link Test on Mesh Backhaul (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Monitoring > Wireless > AP Statistics > General. Click the Access Point. Choose Mesh > Neighbor > Linktest. Choose the desired values from the Date Rates, Packets to be sent (per second), Packet Size (bytes) and Test Duration (seconds) drop-down lists.. Click Start. Using a Link Test on Mesh Backhaul Follow the procedure given below to trigger linktest between neighbor mesh APs. Note Use the test mesh linktest mac-address neighbor-ap-mac rate data-rate fps frames-per-second frame-size frame-size command to perform link test from an AP. Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enters privileged EXEC mode. Step 2 ap name ap-name mesh linktest dest-ap-mac Sets link test parameters. data-rate packet-per-sec packet-size test-duration Example: Device# #ap name ap1 mesh linktest F866.F267.7DFB 24 234 1200 200 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1753 Configuring Battery State for Mesh AP (GUI) Mesh Access Points Configuring Battery State for Mesh AP (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Wireless > Mesh > Profiles Choose a profile. In General tab, check the Battery State for an AP check box. Click Update & Apply to Device. Configuring Battery State for Mesh AP Some Cisco outdoor APs come with the option of battery backup. There is also a POE-out port that can power a video surveillance camera. The integrated battery can be used for temporary backup power during external power interruptions. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile mesh profile-name Example: Device(config)# wireless profile mesh mesh1 Configures a mesh profile and enters mesh profile configuration mode. Step 3 battery-state Example: Device(config-wireless-mesh-profile)# battery-state Configures the battery state for an AP. Configuring Mesh Convergence (CLI) This section provides information about how to configure mesh convergence. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1754 Mesh Access Points Configuring DHCP Server on Root Access Point (RAP) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile mesh profile-name Example: Device(config)# wireless profile mesh mesh1 Creates a mesh profile. Step 3 convergence {fast | noise-tolerant-fast | standard | very-fast} Example: Device(config-wireless-mesh-profile)# convergence fast Configures mesh convergence method in a mesh profile. Configuring DHCP Server on Root Access Point (RAP) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap profile ap-profile-name Example: Device(config)# ap profile ap-profile-name Configures an AP Profile. Step 3 dhcp-server Example: Configures DHCP server on the root access point. Device(config-ap-profile)# dhcp-server Step 4 end Example: Device(config-ap-profile)# end Saves the configuration and exits configuration mode and returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1755 Configuring Mesh Ethernet Daisy Chaining (CLI) Mesh Access Points Configuring Mesh Ethernet Daisy Chaining (CLI) The following section provides information about how to configure the Mesh Ethernet Daisy Chaining feature on a mesh AP. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap profile default-ap-profile Example: Device(config)# ap profile default-ap-profile Specifies an AP profile. Step 3 ssid broadcast persistent Configures persistent SSID broadcast and Example: ensures strict wired uplink. RAP will not switch to wireless backhaul when you configure this Device(config-ap-profile)# ssid broadcast command. persistent Enabling Mesh Ethernet Daisy Chaining The following section provides information about how to enable the Mesh Ethernet Daisy Chaining feature on a Cisco IW 3702 AP. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode Step 2 wireless profile mesh default-mesh-profile Example: Device(config)# wireless profile mesh default-mesh-profile Creates a mesh profile. Step 3 ethernet-bridging Example: Device(config)# ethernet-bridging Connects remote wired networks to each other. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1756 Mesh Access Points Configuring Mesh CAC (CLI) Step 4 Command or Action no ethernet-vlan-transparent Example: Device(config)# no ethernet-vlan-transparent Purpose Disables VLAN transparency to ensure that the bridge is VLAN aware. Configuring Mesh CAC (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless mesh cac Example: Device(config)# wireless mesh cac Purpose Enters global configuration mode. Enables mesh CAC mode. Configuring ATF on Mesh (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Wireless > Airtime Fairness > Global Config For 5 GHz Band and 2.4 GHz Band, enable the Status and the Bridge Client Access toggle button. To choose the Mode, click the Monitor or Enforced radio button. Enable or disable the Optimization toggle button. Enter the Airtime Allocation. Click Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1757 Configuring ATF on Mesh Mesh Access Points Configuring ATF on Mesh Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11{24ghz|5ghz} rf-profile rf-profile Configures an RF profile and enters RF profile Example: configuration mode. Device(config)# ap dot11 24ghz rf-profile rfprof24_1 Step 3 airtime-fairness bridge-client-access airtime-allocation allocation-weight-percentage Example: Device(config-rf-profile)# airtime-fairness bridge-client-access airtime-allocation 10 Configures airtime allocation weight percentage on mesh APs. Create an ATF Policy for a MAP Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-policy Example: Configures WLAN policy profile and enters wireless policy configuration mode. Device(config)# wireless profile policy rr-xyz-policy-1 Step 3 dot11 24ghz airtime-fairness atf-policy Example: Device(config-wireless-policy)# dot11 24ghz airtime-fairness atf-policy Enables ATF in the existing RF profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1758 Mesh Access Points Creating an ATF Policy (GUI) Creating an ATF Policy (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Configuration > Air Time Fairness > Profiles. On the Profiles window, click Add. In the Add ATF Policy window, specify a name, ID, and weight for the ATF policy. Note Weighted ratio is used instead of percentages so that the total can exceed 100. The minimum weight that you can set is 5. Use the slider to enable or disable the Client Sharing feature. Click Save & Apply to Device to save your ATF configuration. (Optional) To delete a policy, check the check box next to the appropriate policy and click Delete. (Optional) To edit an existing ATF policy, select the check box next to the policy you want to edit. In the Edit ATF Policy window that is displayed, you can modify the weight and client sharing details for the policy. Adding an ATF to a Policy Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > Policy. Click the name of the corresponding policy profile. Click the Advanced tab. In the Air Time Fairness Policies section, choose the appropriate status for the following: 2.4-GHz Policy and 5-GHz Policy. Click Update & Apply to Device. Enabling ATF Mode in an RF Profile (GUI) Procedure Step 1 Step 2 Choose Configuration > Tags & Profiles > RF. Click the name of the corresponding RF profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1759 Enabling Wireless Mesh Profile Mesh Access Points Step 3 Step 4 Step 5 In the RF Profile window, click the Advanced tab. In the ATF Configuration section, choose the appropriate status for the following: · Status--If you choose Enabled as the status, select the Mode as either Monitor or Enforced. Also, you can enable or disable optimization for this mode. · Bridge Client Access · Airtime Allocation--Enter the allocation value. You can set the value only after you enable the Bridge Client Access. Click Update & Apply to Device. Enabling Wireless Mesh Profile Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile mesh profile-name Example: Device(config)# wireless profile mesh mesh1 Configures a mesh profile and enters mesh profile configuration mode. Step 3 fast-teardown Example: Device(config-wireless-profile-mesh)# fast-teardown Enables the fast teardown of mesh network and configures the feature's parameter. Enabling Serial Backhaul in Radio Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > RF/Radio > Radio. Click Add to add a radio profile. The Add Radio Profile page is displayed. In the Add Radio Profile page, enter the name and description. In the Mesh Backhaul field, choose the Enabled radio button to enable the feature. In the Mesh Designated Downlink field, choose the Enabled radio button to enable the feature. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1760 Mesh Access Points Enabling Mesh Configurations in Radio Profile (CLI) Step 6 Note Mesh Designated Downlink is supported only on slot number 2 of Mesh APs. You need to be careful while associating radio profiles to the RF tag slots. Click Apply to Device. Enabling Mesh Configurations in Radio Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile radio radio-profile-name Example: Configures wireless radio profile and goes into radio profile configuration mode. Device(config)# wireless profile radio radio-profile-name Step 3 mesh backhaul Example: Device(config-wireless-radio-profile)# mesh backhaul Enables mesh backhaul. By default, this command is enabled. Mesh backhaul can be disabled on a specific slot, to stop the specific slot from being the backhaul candidate. Step 4 mesh designated downlink Example: Device(config-wireless-radio-profile)# mesh designated downlink Enables the radio slot as a designated downlink. By default, this command is disabled. This command is enabled only for slot 2 of the mesh APs. If a slot other than slot 2 is configured as the designated downlink, the following warning message is displayed: Designated downlink is supported only on slot 2 of mesh APs. Associate in the RF tag accordingly. By default, all the radio slots are mesh-enabled and not designated as downlink. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1761 Enabling Serial Backhaul (CLI) Mesh Access Points Enabling Serial Backhaul (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile radio radio-profile-name Example: Configures wireless radio profile and goes into radio profile configuration mode. Device(config)# wireless profile radio radio-mesh-downlink Step 3 mesh designated downlink Example: Device(config-wireless-radio-profile)# mesh designated downlink Enables the specified radio as a designated mesh downlink backhaul. Uplink radio will not be used as downlink in the presence of designated downlinks. Step 4 exit Example: Exits the submode and returns to global configuration mode. Device(config-wireless-radio-profile)# exit Step 5 wireless tag rf rf-profile-name Example: Device(config)# wireless tag rf rf-map-tag Configures wireless RF tag and goes into wireless RF tag profile configuration mode. The associate designated downlink is enabled in the radio profile only for slot 2. Step 6 dot11 5ghz {slot1 | slot2} radio-profile radio-profile-name Example: Device(config-wireless-rf-tag)# dot11 5ghz slot2 radio-profile radio-mesh-downlink Configures serial backhaul with the designated downlink radio. Note In mesh APs, the uplink and downlink are in the same slot by default. When you configure a designated downlink, the mesh AP is forced to use a specific radio as downlink. Fallback Mode Note If at least one radio is configured to be a designated downlink, it means that it will not be used as a potential uplink. To prevent any configuration mistake, for example, configuring uplink radio as the designated downlink, a fallback timer is used in a mesh AP. If the mesh AP is not able to join the conttroller after the allocated 10 minutes, the designated configurations are cleared and all the radios become uplink-capable. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1762 Mesh Access Points Configuration Example for Mesh Serial Backhaul Configuration Example for Mesh Serial Backhaul The following example shows how to configure mesh APs with only slot 0 and slot 1 allowed for the mesh AP: Device# configure terminal Device(config)# wireless profile radio radio-mesh-downlink Device(config-wireless-radio-profile)# no mesh backhaul Device(config-wireless-radio-profile)# exit Device(config)# wireless tag rf rf-map-tag Device(config-wireless-rf-tag)# dot11 5ghz slot2 radio-profile mesh-disabled Associating Wireless Mesh to an AP Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap profile ap-profile-name Example: Device(config)# ap profile default-ap-profile Configures the AP profile and enters AP profile configuration mode. Step 3 mesh-profile mesh-profile-name Example: Configures the mesh profile in AP profile configuration mode. Device(config-ap-profile)# mesh-profile test1 Configuring Fast Teardown for a Mesh AP Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Choose Configuration > Wireless > Mesh > Profiles. Click Add. In the Add Mesh Profile window, click Advanced. Select a security mode, authentication method, and authorization method. Enable Ethernet bridging, if required. Enter the bridge group name and enable Strict Match BGN. Select a band backhaul transmission rate for your radio. Preform the following action in the Fast Roaming section: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1763 Configuring Fast Teardown for a Mesh AP Profile (CLI) Mesh Access Points Step 9 · Check the Fast Teardown check box to detect the root access point uplink failure faster in a mesh deployment and to address fast teardown of the mesh network when an uplink failure occurs. · In the Number of Retries field, enter the number of retries allowed until gateway is considered unreachable. The valid range is between 1 to 10. · In the Interval value field, enter the retry value. The valid range is between 1 to 10 seconds. · In the Latency Threshold field, enter the threshold for a round-trip latency between the AP and the controller. The valid range is between 1 and 500 milliseconds. · In the Latency Exceeded Thresholdfield, enter the latency interval in which at least one ping must succeed in less than the specified time. The valid range is between 1 to 30 seconds. · In the Uplink Recovery Interval field, enter the time during which root access point uplink must be stable in order to accept the child connections. The valid range is between 1 and 3600 seconds. Click Apply to Device. Configuring Fast Teardown for a Mesh AP Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile mesh profile-name Example: Device(config)# wireless profile mesh mesh1 Configures a mesh profile and enters the mesh profile configuration mode. Step 3 fast-teardown Example: Device(config-wireless-mesh-profile)# fast-teardown Enables the fast teardown of mesh network and configures the feature's parameter. Step 4 enabled Enables the fast teardown feature. Example: Device(config-wireless-mesh-profile-fast-teardown)# enabled Step 5 interval duration Example: (Optional) Configures the retry interval. The valid values range between 1 and 10 seconds. Device(config-wireless-mesh-profile-fast-teardown)# interval 5 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1764 Mesh Access Points Flex Resilient with Flex and Bridge Mode Access Points Step 6 Step 7 Step 8 Step 9 Command or Action Purpose latency-exceeded-threshold duration (Optional) Specifies the latency interval at Example: which at least one ping must succeed in less than threshold time. The valid values range Device(config-wireless-mesh-profile-fast-teardown)# between 1 and 30 seconds. latency-exceeded-threshold 20 latency-threshold threshold range (Optional) Speficies the latency threshold. The Example: valid values range between 1 and 500 milliseconds. Device(config-wireless-mesh-profile-fast-teardown)# latency-threshold 20 retries retry limit (Optional) Specifies the number of retries until Example: the gateway is considered unreachable. The valid values range between 1 and 10. Device(config-wireless-mesh-profile-fast-teardown)# retries 1 uplink-recovery-intervals recovery interval (Optional) Specifies the time during which root Example: access point uplink has to be stable to accept child connections. The valid values range Device(config-wireless-mesh-profile-fast-teardown)# between 1 and 3600 seconds. uplink-recovery-intervals 1 Flex Resilient with Flex and Bridge Mode Access Points Information About Flex Resilient with Flex and Bridge Mode Access Points The Flex Resilient with Flex and Bridge Mode Access Points describe how to set up a controller with Flex+Bridge mode Access Points (APs) and Flex Resilient feature. The Flex Resilient feature works only in Flex+Bridge mode APs. The feature resides in Mesh link formed between RAP - MAP, once the link is UP and RAP loses connection to the CAPWAP controller, both RAP and MAP continue to bridge the traffic. A child Mesh AP (MAP) maintains its link to a parent AP and continues to bridge till the parent link is lost. A child MAP cannot establish a new parent or child link till it reconnects to the CAPWAP controller. Note Existing wireless clients in locally switching WLAN can stay connected with their AP in this mode. No new or disconnected wireless client can associate to the Mesh AP in this mode. Client traffic in Flex+Bridge MAP is dropped at RAP switchport for the locally switched WLANs. Configuring a Flex Profile (GUI) Procedure Step 1 Choose Configuration > Tags & Profiles > Flex. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1765 Configuring a Flex Profile (CLI) Mesh Access Points Step 2 Step 3 Step 4 Step 5 Step 6 Click a Flex Profile Name. The Edit Flex Profile dialog box appears. Under the General tab, choose the Flex Resilient check box to enable the Flex Resilient feature. Under the VLAN tab, choose the required VLANs. (Optionally) Under the Local Authentication tab, choose the desired server group from the Local Accounting RADIUS Server Group drop-down list. Also, choose the RADIUS check box. Click Update & Apply to Device. Configuring a Flex Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode Step 2 wireless profile flex flex-profile Example: Device(config)# wireless profile flex new-flex-profile Configures a Flex profile and enters Flex profile configuration mode. Step 3 arp-caching Example: Device(config-wireless-flex-profile)# arp-caching Enables ARP caching. Step 4 description description Example: Device(config-wireless-flex-profile)# description "new flex profile" Enables default parameters for the Flex profile. Step 5 native-vlan-id Example: Device(config-wireless-flex-profile)# native-vlan-id 2660 Configures native vlan-id information. Step 6 resilient Example: Device(config-wireless-flex-profile)# resilient Enables the resilient feature. Step 7 vlan-name vlan_name Example: Device(config-wireless-flex-profile)# vlan-name VLAN2659 Configures VLAN name. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1766 Mesh Access Points Configuring a Site Tag (CLI) Step 8 Step 9 Command or Action vlan-id vlan_id Example: Device(config-wireless-flex-profile)# vlan-id 2659 Purpose Configures VLAN ID. The valid VLAN ID ranges from 1 to 4096. end Example: Device(config-wireless-flex-profile)# end Exits configuration mode and returns to privileged EXEC mode. Configuring a Site Tag (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode Step 2 wireless tag site site-name Example: Device(config)# wireless tag site new-flex-site Configures a site tag and enters site tag configuration mode. Step 3 flex-profile flex-profile-name Example: Device(config-site-tag)# flex-profile new-flex-profile Configures a flex profile. Step 4 no local-site Local site is not configured on the site tag. Example: Device(config-site-tag)# no local-site Step 5 site-tag site-tag-name Example: Device(config-site-tag)# site-tag new-flex-site Maps a site tag to an AP. Step 6 end Example: Device(config-site-tag)# end Exits configuration mode and returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1767 Configuring a Mesh Profile (CLI) Mesh Access Points Configuring a Mesh Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode Step 2 wireless profile mesh profile-name Example: Device(config)# wireless profile mesh Mesh_Profile Configures a Mesh profile and enters the Mesh profile configuration mode. Step 3 no ethernet-vlan-transparent Example: Disables VLAN transparency to ensure that the bridge is VLAN aware. Device(config-wireless-profile-mesh)# no ethernet-vlan-transparent Step 4 end Example: Device(config-wireless-profile-mesh)# end Exits configuration mode and returns to privileged EXEC mode. Associating Wireless Mesh to an AP Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode Step 2 ap profile ap-profile-name Example: Device(config)# ap profile new-ap-join-profile Configures the AP profile and enters AP profile configuration mode. Step 3 mesh-profile mesh-profile-name Example: Configures the Mesh profile in AP profile configuration mode. Device(config-ap-profile)# mesh-profile Mesh_Profile Step 4 ssh Example: Configures the Secure Shell (SSH). Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1768 Mesh Access Points Attaching Site Tag to an Access Point (CLI) Step 5 Step 6 Command or Action Device(config-ap-profile)# ssh Purpose mgmtuser username username password {0 Specifies the AP management username and | 8} password password for managing all of the access points Example: configured to the controller. Device(config-ap-profile)# mgmtuser username Cisco password 0 Cisco secret · 0: Specifies an UNENCRYPTED password. 0 Cisco · 8: Specifies an AES encrypted password. Note While configuring an username, ensure that special characters are not used as it results in error with bad configuration. end Example: Device(config-ap-profile)# end Exits configuration mode and returns to privileged EXEC mode. Attaching Site Tag to an Access Point (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap mac-address Example: Device(config)# ap F866.F267.7DFB Step 3 site-tag site-tag-name Example: Device(config-ap-tag)# site-tag new-flex-site Step 4 end Example: Device(config-ap-tag)# end Purpose Enters global configuration mode Configures Cisco APs and enters ap-tag configuration mode. Maps a site tag to the AP. Note Associating Site Tag causes the associated AP to reconnect. Exits configuration mode and returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1769 Configuring Switch Interface for APs (CLI) Mesh Access Points Configuring Switch Interface for APs (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode Step 2 interface interface-id Example: Device(config)# interface <int-id> Enters the interface to be added to the VLAN. Step 3 switchport trunk native vlan vlan-id Example: Device(config-if)# switchport trunk native vlan 2660 Assigns the allowed VLAN ID to the port when it is in trunking mode. Step 4 switchport trunk allowed vlan vlan-id Example: Device(config-if)# switchport trunk allowed vlan 2659,2660 Assigns the allowed VLAN ID to the port when it is in trunking mode. Step 5 switchport mode trunk Sets the trunking mode to trunk unconditionally. Example: Note Device(config-if)# switchport mode trunk When the controller works as a host for spanning tree, ensure that you configure portfast trunk, using spanning-tree portfast trunk command, in the uplink switch to ensure faster convergence. Step 6 end Example: Device(config-if)# end Exits configuration mode and returns to privileged EXEC mode. Verifying Flex Resilient with Flex and Bridge Mode Access Points Configuration To view the AP mode and model details, use the following command: Device# show ap name <ap-name> config general | inc AP Mode AP Mode : Flex+Bridge AP Model : AIR-CAP3702I-A-K9 To view the MAP mode details, use the following command: Device# show ap name MAP config general | inc AP Mode AP Mode : Flex+Bridge AP Model : AIR-CAP3702I-A-K9 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1770 Mesh Access Points Verifying ATF Configuration on Mesh To view the RAP mode details, use the following command: Device# show ap name RAP config general | inc AP Mode AP Mode : Flex+Bridge AP Model : AIR-AP2702I-A-K9 To view if the Flex Profile - Resilient feature is enabled or not, use the following command: Device# show wireless profile flex detailed FLEX_TAG | inc resilient Flex resilient : ENABLED Verifying ATF Configuration on Mesh You can verify Cisco ATF configurations on mesh APs using the following commands. Use the following show command to display the ATF configuration summary of all the radios: Device# show ap airtime-fairness summary AP Name MAC Address Slot Admin Oper Mode Optimization -------------------------------- ----------------- ---- -------- ----------- -------------- ------------ ap1/2 6c:99:89:0c:73:a0 0 ENABLED DOWN Enforce-Policy Enabled ap1/2 6c:99:89:0c:73:a0 1 ENABLED UP Enforce-Policy Enabled ap1/3 6c:99:89:0c:73:a1 0 ENABLED DOWN Enforce-Policy Enabled ap1/3 6c:99:89:0c:73:a1 1 ENABLED UP Enforce-Policy Enabled Use the following show command to display the ATF configuration for a 2.4-GHz radio: Device# show ap dot11 24ghz airtime-fairness AP Name MAC Address Slot Admin Oper Mode Optimization ------------------------------ ----------------- ---- -------- ----------- -------------- ------------ ap1/2 6c:99:89:0c:73:a0 1 ENABLED UP Enforce-Policy Enabled Use the following show command to display the ATF WLAN statistics: Device# show ap name ap1 dot11 24ghz airtime-fairness wlan 12 statistics AP Name MAC Address Slot Admin Oper Mode Optimization -------------------------------- ----------------- ---- -------- ----------- -------------- ------------ ap1/2 6c:99:89:0c:73:a0 0 ENABLED DOWN Enforce-Policy Enabled ap1/2 6c:99:89:0c:73:a0 1 ENABLED UP Enforce-Policy Enabled Network level Use the following show command to display the wireless mesh summary: Device# show wireless profile mesh summary Number of Profiles: 2 Profile-Name BGN Security Bh-access Description Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1771 Verifying Mesh Ethernet Daisy Chaining Mesh Access Points ---------------------------------------------------------------------------------------------------- mesh1 EAP DISABLED default-mesh-profile Device# show mesh atf client-access EAP DISABLED default mesh profile AP Name -----------------RAP RAP Client Access Allocation Default % Current % --------- --------- 25 40 33 40 Override -------Enabled Enabled Current nodes ------------4 3 Verifying Mesh Ethernet Daisy Chaining · The following is a sample output of the show ap config general command that displays whether a persistent SSID is configured for an AP. Device# show ap 3702-RAP config general Persistent SSID Broadcast Enabled/Disabled · The following is a sample output of the show wireless mesh persistent-ssid-broadcast summary command that displays the persistent SSID broadcast status of all the bridge RAPs. Device# show wireless mesh persistent-ssid-broadcast summary AP Name state ------3702-RAP 1560-RAP AP Model BVI MAC BGN AP Role -------- ------- --- ------- 3702 5c71.0d07.db50 ap_name Root AP 1562E 380e.4dbf.c6b0 ap_name Root AP Persistent SSID --------------------Enabled Disabled Verifying Mesh Convergence The following is a sample output of the show wireless profile mesh detailed command that displays the mesh convergence method used: Device# show wireless profile mesh detailed default-mesh-profile Mesh Profile Name : default-mesh-profile ------------------------------------------------- Description : default mesh profile Convergence Method : Fast The following is a sample output of the show wireless mesh convergence subset-channels command that displays the subset channels of the selected bridge group name: Device# show wireless mesh convergence subset-channels Bridge group name Channel ------------------------------------------ Default 132 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1772 Mesh Access Points Verifying DHCP Server for Root AP Configuration Verifying DHCP Server for Root AP Configuration To verify the DHCP server for root AP configuration, use the following command: Device# show ap config general Cisco AP Name : AP4C77.6DF2.D588 ================================================= <SNIP> Dhcp Server : Enabled Verifying Mesh Backhaul The following is a sample output of the show ap name mesh backhaul command that shows details of the mesh backhaul at 2.4 GHz: Device# show ap name test-ap mesh backhaul MAC Address : xxxx.xxxx.xxxx Current Backhaul Slot: 0 Radio Type: 0 Radio Subband: All Mesh Radio Role: DOWNLINK Administrative State: Enabled Operation State: Up Current Tx Power Level: Current Channel: (11) Antenna Type: N/A Internal Antenna Gain (in .5 dBm units): 0 The following is a sample output of the show wireless mesh ap backhaul command that shows the mesh backhaul details: Device# show wireless mesh ap backhaul MAC Address : xxxx.xxxx.0x11 Current Backhaul Slot: 1 Radio Type: Main Radio Subband: All Mesh Radio Role: Downlink Administrative State: Enabled Operation State: Up Current Tx Power Level: 6 Current Channel: (100)* Antenna Type: N/A Internal Antenna Gain (in .5 dBm units): 10 The following is a sample output of the show ap summary command that shows the radio MAC address and the corresponding AP name: Device# show ap summary Number of APs: 1 AP Name Slots AP Model Ethernet MAC Radio MAC Location Country IP Address State ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- AP-Cisco-1 2 AIR-APXXXXX-E-K9 xxxx.xxxx.xxd4 xxxx.xxxx.0x11 default location DE 10.11.70.170 Registered Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1773 Verifying Mesh Configuration Mesh Access Points Verifying Mesh Configuration Use the following show commands to verify the various aspects of mesh configuration. · show wireless mesh stats ap-name · show wireless mesh security-stats {all | ap-name} · show wireless mesh queue-stats {all | ap-name} · show wireless mesh per-stats summary {all | ap-name} · show wireless mesh neighbor summary {all | ap-name} · show wireless mesh neighbor detail ap-name · show wireless mesh ap summary · show wireless mesh ap tree · show wireless mesh ap backhaul · show wireless mesh config · show wireless mesh convergence detail bridge-group-name · show wireless mesh convergence subset-channels · show wireless mesh neighbor · show wireless profile mesh detailed mesh-profile-name · show wireless stats mesh security · show wireless stats mesh queue · show wireless stats mesh packet error · show wireless mesh ap summary · show ap name ap-name mesh backhaul · show ap name ap-name mesh neighbor detail · show ap name ap-name mesh path · show ap name ap-name mesh stats packet error · show ap name ap-name mesh stats queue · show ap name ap-name mesh stats security · show ap name ap-name mesh stats · show ap name ap-name mesh bhrate · show ap name ap-name config ethernet · show ap name ap-name cablemodem · show ap name ap-name environment Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1774 Mesh Access Points Verifying Mesh Configuration · show ap name ap-name gps location · show ap name ap-name environment · show ap name ap-name mesh linktest data dest-mac · show ap environment · show ap gps location For details about these commands, see the Cisco Catalyst 9800 Series Wireless Controller Command Reference document. MAC Authorization Use the following show command to verify the MAC authorization configuration: Device# show run aaa aaa authentication dot1x CENTRAL_LOCAL local aaa authorization credential-download CENTRAL_AUTHOR local username 002cc8de4f31 mac username 00425a0a53b1 mac ewlc_eft#sh wireless profile mesh detailed madhu-mesh-profile Mesh Profile Name : abc-mesh-profile ------------------------------------------------- Description : Bridge Group Name : bgn-abbc Strict match BGN : ENABLED Amsdu : ENABLED ... Battery State : ENABLED Authorization Method : CENTRAL_AUTHOR Authentication Method : CENTRAL_LOCAL Backhaul tx rate(802.11bg) : auto Backhaul tx rate(802.11a) : 802.11n mcs15 PSK Provisioning Use the following show command to verify PSK provisioning configuration: Device# show wireless mesh config Mesh Config Backhaul RRM Mesh CAC Outdoor Ext. UNII B Domain channels(for BH) Mesh Ethernet Bridging STP BPDU Allowed Rap Channel Sync : ENABLED : DISABLED : ENABLED : ENABLED : ENABLED Mesh Alarm Criteria Max Hop Count Recommended Max Children for MAP Recommended Max Children for RAP Low Link SNR High Link SNR Max Association Number Parent Change Number :4 : 10 : 20 : 12 : 60 : 10 :3 Mesh PSK Config PSK Provisioning Default PSK : ENABLED : ENABLED Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1775 Verifying Mesh Configuration Mesh Access Points PSK In-use key number :1 Provisioned PSKs(Maximum 5) Index -----1 Description ------------ key1 Bridge Group Name Use the following show command to verify the bridge group name configuration: Device# show wireless profile mesh detailed abc-mesh-profile Mesh Profile Name : abc-mesh-profile ------------------------------------------------- Description : Bridge Group Name : bgn-abc Strict match BGN : ENABLED Amsdu : ENABLED Background Scan : ENABLED Channel Change Notification : DISABLED Backhaul client access : ENABLED Ethernet Bridging : ENABLED Ethernet Vlan Transparent : DISABLED Full Sector DFS : ENABLED IDS : ENABLED Multicast Mode : In-Out Range in feet : 12000 Security Mode : EAP Convergence Method : Fast LSC only Authentication : DISABLED Battery State : ENABLED Authorization Method : CENTRAL_AUTHOR Authentication Method : CENTRAL_LOCAL Backhaul tx rate(802.11bg) : auto Backhaul tx rate(802.11a) : 802.11n mcs15 Backhaul Client Access Use the following show command to verify the backhaul client access configuration: Device# show wireless profile mesh detailed abc-mesh-profile Mesh Profile Name : abc-mesh-profile ------------------------------------------------- Description : Bridge Group Name : bgn-abc Strict match BGN : ENABLED Amsdu : ENABLED Background Scan : ENABLED Channel Change Notification : DISABLED Backhaul client access : ENABLED Ethernet Bridging : ENABLED Ethernet Vlan Transparent : DISABLED ... Backhaul tx rate(802.11bg) : auto Backhaul tx rate(802.11a) : 802.11n mcs15 Wireless Backhaul Data Rate Use the following show command to verify the wireless backhaul data rate configuration: Device# show wireless profile mesh detailed abc-mesh-profile Mesh Profile Name : abc-mesh-profile ------------------------------------------------- Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1776 Mesh Access Points Verifying Mesh Configuration Description Bridge Group Name Strict match BGN ... Authorization Method Authentication Method Backhaul tx rate(802.11bg) Backhaul tx rate(802.11a) : : bgn-abc : ENABLED : CENTRAL_AUTHOR : CENTRAL_LOCAL : auto : 802.11n mcs15 Dynamic Frequency Selection Use the following show command to verify the dynamic frequency selection configuration: Device# show wireless profile mesh detailed abc-mesh-profile Mesh Profile Name : abc-mesh-profile ------------------------------------------------- Description : Bridge Group Name : bgn-abc Strict match BGN : ENABLED Amsdu : ENABLED Background Scan : ENABLED Channel Change Notification : DISABLED Backhaul client access : ENABLED Ethernet Bridging : ENABLED Ethernet Vlan Transparent : DISABLED Full Sector DFS : ENABLED ... Backhaul tx rate(802.11a) : 802.11n mcs15 Intrusion Detection System Use the following show command to verify the wireless backhaul data rate configuration: Device# show wireless profile mesh detailed abc-mesh-profile Mesh Profile Name : abc-mesh-profile ------------------------------------------------- Description : Bridge Group Name : bgn-abc Strict match BGN : ENABLED Amsdu : ENABLED Background Scan : ENABLED Channel Change Notification : DISABLED Backhaul client access : ENABLED Ethernet Bridging : ENABLED Ethernet Vlan Transparent : DISABLED Full Sector DFS : ENABLED IDS : ENABLED Multicast Mode : In-Out ... Backhaul tx rate(802.11a) : 802.11n mcs15 Ethernet Bridging Use the following show command to verify ethernet bridging configuration: Device# show wireless profile mesh detailed abc-mesh-profile Mesh Profile Name : abc-mesh-profile ------------------------------------------------- Description : Bridge Group Name : bgn-abc Strict match BGN : ENABLED Amsdu : ENABLED Background Scan : ENABLED Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1777 Verifying Mesh Configuration Mesh Access Points Channel Change Notification Backhaul client access Ethernet Bridging Ethernet Vlan Transparent Full Sector DFS IDS Multicast Mode ... Backhaul tx rate(802.11a) : DISABLED : ENABLED : ENABLED : DISABLED : ENABLED : ENABLED : In-Out : 802.11n mcs15 Multicast over Mesh Use the following show command to verify multicast over Mesh configuration: Device# show wireless profile mesh detailed abc-mesh-profile Mesh Profile Name : abc-mesh-profile ------------------------------------------------- Description : Bridge Group Name : bgn-abc Strict match BGN : ENABLED Amsdu : ENABLED Background Scan : ENABLED Channel Change Notification : DISABLED Backhaul client access : ENABLED Ethernet Bridging : ENABLED Ethernet Vlan Transparent : DISABLED Full Sector DFS : ENABLED IDS : ENABLED Multicast Mode : In-Out ... Backhaul tx rate(802.11a) : 802.11n mcs15 RRM on Mesh Backhaul Use the following show command to verify RRM on Mesh backhaul configuration: Device# show wireless mesh config Mesh Config Backhaul RRM Mesh CAC Outdoor Ext. UNII B Domain channels(for BH) Mesh Ethernet Bridging STP BPDU Allowed Rap Channel Sync : ENABLED : DISABLED : ENABLED : ENABLED : ENABLED Mesh Alarm Criteria Max Hop Count Recommended Max Children for MAP Recommended Max Children for RAP Low Link SNR High Link SNR Max Association Number Parent Change Number :4 : 10 : 20 : 12 : 60 : 10 :3 Mesh PSK Config PSK Provisioning Default PSK PSK In-use key number Provisioned PSKs(Maximum 5) : ENABLED : ENABLED :1 Index -----1 Description ------------ key1 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1778 Mesh Access Points Verifying Mesh Configuration Preferred Parent Selection Use the following show command to verify preferred parent configuration: Device# show wireless mesh ap tree ======================================================================== AP Name [Hop Ctr,Link SNR,BG Name,Channel,Pref Parent,Chan Util,Clients] ======================================================================== [Sector 1] ----------1542-RAP [0, 0, bgn-madhu, (165), 0000.0000.0000, 1%, 0] |-MAP-2700 [1, 67, bgn-madhu, (165), 7070.8b7a.6fb8, 0%, 0] Number of Bridge APs : 2 Number of RAPs : 1 Number of MAPs : 1 (*) Wait for 3 minutes to update or Ethernet Connected Mesh AP. (**) Not in this Controller AP Role Change Use the following show command to verify AP role change configuration: Device# show wireless mesh ap summary AP Name AP Model BVI MAC BGN ------- -------- ------- --- 1542-RAP 1542D 002c.c8de.1338 bgn-abc MAP-2700 2702I 500f.8095.01e4 bgn-abc AP Role ------Root AP Mesh AP Number of Bridge APs :2 Number of RAPs :1 Number of MAPs :1 Number of Flex+Bridge APs : 0 Number of Flex+Bridge RAPs : 0 Number of Flex+Bridge MAPs : 0 Mesh Leaf Node Use the following show command to verify mesh leaf node configuration: Device# show ap name MAP-2700 config general Cisco AP Name : MAP-2700 ================================================= Cisco AP Identifier Country Code Regulatory Domain Allowed by Country AP Country Code AP Regulatory Domain Slot 0 Slot 1 MAC Address ... AP Mode Mesh profile name AP Role Backhaul radio type Backhaul slot id Backhaul tx rate Ethernet Bridging Daisy Chaining : 7070.8bbc.d3e0 : Multiple Countries : IN,US,IO,J4 : 802.11bg:-AEJPQU 802.11a:-ABDJNPQU : IN - India : -A : -D : 500f.8095.01e4 : Bridge : abc-mesh-profile : Mesh AP : 802.11a :1 : auto : Enabled : Disabled Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1779 Verifying Mesh Configuration Mesh Access Points Strict Daisy Rap Bridge Group Name Strict-Matching BGN Preferred Parent Address Block child state PSK Key Timestamp ... FIPS status WLANCC status GAS rate limit Admin status WPA3 Capability EWC-AP Capability AWIPS Capability Proxy Hostname Proxy Port Proxy NO_PROXY list GRPC server status : Disabled : bgn-abc : Enabled : 7070.8b7a.6fb8 : Disabled : Not Configured : Disabled : Disabled : Disabled : Disabled : Disabled : Disabled : Not Configured : Not Configured : Not Configured : Disabled Subset Channel Synchronization Use the following show command to verify the subset channel synchronization configuration: Device# show wireless mesh config Mesh Config Backhaul RRM Mesh CAC Outdoor Ext. UNII B Domain channels(for BH) Mesh Ethernet Bridging STP BPDU Allowed Rap Channel Sync : ENABLED : DISABLED : ENABLED : ENABLED : ENABLED Mesh Alarm Criteria Max Hop Count Recommended Max Children for MAP Recommended Max Children for RAP Low Link SNR High Link SNR Max Association Number Parent Change Number :4 : 10 : 20 : 12 : 60 : 10 :3 Mesh PSK Config PSK Provisioning Default PSK PSK In-use key number Provisioned PSKs(Maximum 5) : ENABLED : ENABLED :1 Index -----1 Description ------------ key1 Provisioning LSC for Bridge-Mode and Mesh APs Use the following show command to verify the provisioning LSC for Bridge-Mode and Mesh AP configuration: Device# show wireless profile mesh detailed default-mesh-profile Mesh Profile Name : default-mesh-profile ------------------------------------------------- Description : default mesh profile Bridge Group Name : bgn-abc Strict match BGN : DISABLED Amsdu : ENABLED Background Scan : ENABLED Channel Change Notification : ENABLED Backhaul client access : ENABLED Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1780 Mesh Access Points Verifying Mesh Configuration Ethernet Bridging Ethernet Vlan Transparent Full Sector DFS IDS Multicast Mode Range in feet Security Mode Convergence Method LSC only Authentication Battery State Authorization Method Authentication Method Backhaul tx rate(802.11bg) Backhaul tx rate(802.11a) : DISABLED : ENABLED : ENABLED : DISABLED : In-Out : 12000 : EAP : Fast : DISABLED : ENABLED : default : default : auto : auto Specify the Backhaul Slot for the Root AP Use the following show command to verify the backhaul slot for the Root AP configuration: Device# show ap name 1542-RAP mesh backhaul MAC Address : 380e.4d85.5e60 Current Backhaul Slot: 1 Radio Type: 0 Radio Subband: All Mesh Radio Role: DOWNLINK Administrative State: Enabled Operation State: Up Current Tx Power Level: Current Channel: (165) Antenna Type: N/A Internal Antenna Gain (in .5 dBm units): 18 Using a Link Test on Mesh Backhaul Use the following show command to verify the use of link test on mesh backhaul configuration: Device# show ap name 1542-RAP mesh linktest data 7070.8bbc.d3ef 380e.4d85.5e60 ==> 7070.8bbc.d3ef Started at : 05/11/2020 20:56:28 Status: In progress Configuration: ============== Data rate: Mbps Packets per sec: : 234 Packet Size: : 1200 Duration: : 200 Mesh CAC Use the following show command to verify mesh CAC configuration: Device# show wireless mesh config Mesh Config Backhaul RRM Mesh CAC Outdoor Ext. UNII B Domain channels(for BH) Mesh Ethernet Bridging STP BPDU Allowed Rap Channel Sync : ENABLED : DISABLED : ENABLED : ENABLED : ENABLED Mesh Alarm Criteria Max Hop Count :4 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1781 Verifying Dot11ax Rates on Mesh Backhaul Mesh Access Points Recommended Max Children for MAP Recommended Max Children for RAP Low Link SNR High Link SNR Max Association Number Parent Change Number Mesh PSK Config PSK Provisioning Default PSK PSK In-use key number Provisioned PSKs(Maximum 5) Index -----1 Description ------------ key1 : 10 : 20 : 12 : 60 : 10 :3 : ENABLED : ENABLED :1 Verifying Dot11ax Rates on Mesh Backhaul To verify the 802.11ax rates on mesh backhaul in the mesh profile, use the following command: Device# show wireless profile mesh detailed default-mesh-profile Mesh Profile Name : default-mesh-profile ------------------------------------------------- Description : default mesh profile . . Backhaul tx rate(802.11bg) : 802.11ax mcs7 ss1 Backhaul tx rate(802.11a) : 802.11ax mcs9 ss2 To verify the 802.11ax rates on mesh backhaul in the general configuration of an AP, use the following command: Device# show ap config general Cisco AP Identifier : 5c71.0d17.49e0 . . Backhaul slot id :1 Backhaul tx rate : 802.11ax mcs7 ss1 Verifying Mesh Serial Backhaul To verify mesh AP serial backhaul, run the following command: Device# show ap name MAP-SB config slot 2 | inc Mesh Mesh Radio Role : Downlink Access Mesh Backhaul : Enabled Mesh Designated Downlink : Enabled To verify serial backhaul enabled on a specific AP, run the following command: Device# show ap name MAP-SB mesh backhaul MAC Address : 4cxx.4dxx.f4xx Current Backhaul Slot: 1 Radio Type: Main Radio Subband: All Mesh Radio Role: Uplink Access <<<<<< Administrative State: Enabled Operation State: Up Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1782 Mesh Access Points Verifying the RRM DCA Status Current Tx Power Level: 6 Current Channel: (104) <<<<<< Antenna Type: Internal Antenna Gain (in .5 dBm units): 1 MAC Address : 4cxx.4dxx.f4xx Current Backhaul Slot: 2 Radio Type: Slave Radio Subband: All Mesh Radio Role: Downlink Access <<<<<< Administrative State: Enabled Operation State: Up Current Tx Power Level: 8 Current Channel: (149) <<<<<< Antenna Type: Internal Antenna Gain (in .5 dBm units): 1 To verify mesh serial backhaul, run the following command: Device# show wireless profile radio detailed radio-mesh-downlink Radio Profile name : radio-mesh-downlink Description : Beam-Selection : Not configured Number of antenna to be enabled :0 Mesh Backhaul : Enabled Mesh Designated Downlink : Enabled Verifying the RRM DCA Status To view the status of the DCA that is run for mesh APs, run the following command: Device# show ap name Cisco-AP config general | inc Mesh Mesh profile name : default-mesh-profile Mesh DCA Run Status: : Not Running Last Mesh DCA Run : 02/07/2022 01:21:56 To verify the status of the last DCA run per radio, run the following command: Device# show wireless mesh rrm dca status Note The output for the show ap config general | i Mesh and the show ap name <AP name> config general | i Mesh commands, displays only the status for manual RRM DCA triggers that are done via the ap name <AP name> dot11 rrm channel update mesh command. The output for the show ap config general | i Mesh and the show ap name <AP name> config general | i Mesh commands, does not update if only the global mesh RRM DCA is enabled (auto-dca). Verifying Fast Teardown with Default Mesh Profile To verify the fast teardown with the default-mesh-profile, use the following command: Device# show wireless profile mesh detailed default-mesh-profile Mesh Profile Name default-mesh-profile -------------------------------------------------- Fast Teardown : ENABLED Number of Retries :4 Interval in sec :1 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1783 Verifying Background Scanning and MAP Fast Ancestor Find Mesh Access Points Latency Threshold in msec Latency Exceeded Threshold in sec Uplink Recovery Interval in sec : 10 :8 : 60 Verifying Background Scanning and MAP Fast Ancestor Find To verify if the Background Scanning and MAP Fast Ancestor Find features are enabled, run the show wireless profile mesh detailed command: Device# show wireless profile mesh detailed Mesh_Profile | i Background Scan Background Scan : ENABLED Device# show wireless profile mesh detailed Mesh_Profile | i MAP fast ancestor find MAP fast ancestor find : ENABLED Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1784 1 6 4 C H A P T E R Redundant Root Access Point (RAP) Ethernet Daisy Chaining · Overview of Redundant RAP Ethernet Daisy Chaining, on page 1785 · Prerequisites for Redundant RAP Ethernet Daisy Chaining Support, on page 1786 · Configuring Redundant RAP Ethernet Daisy Chaining Support (CLI), on page 1786 · Verifying Daisy Chain Redundancy (CLI), on page 1786 Overview of Redundant RAP Ethernet Daisy Chaining The Root Access Point (RAP) Ethernet Daisy Chaining is a feature where RAPs are chained using wired Ethernet to avoid latency in backhaul link failure recovery. This feature proposes a redundancy in the daisy chain, wherein, two switches act as a redundant Designated Port (DP), each connected to either end of the daisy chain. In case of a link failure, the link direction is reversed using a new STP root. A redundant RAP ethernet daisy chain has similiar capabilities to the existing mesh daisy chain feature. In a redundant RAP ethernet daisy chain topology, the packet is encapsulated with CAPWAP header and forwarded to the controller from its wireless client for each AP. The packet is bridged to its primary ethernet interface from its secondary ethernet interface including the other AP's wireless client CAPWAP packets. Both 2.4G and 5G radio are used for client access. Note The daisy chain strict RAP configuration is applicable to Cisco IOS access points only. Redundant RAP ethernet daisy chain is supported on the IW6300 AP model. In case of ethernet daisy chain topology, if a CAPWAP loss occurs on the first RAP connected to switch, the entire chain loses its uplink. This takes a long time to recover. Thereby, if the RAP ethernet daisy chain is enabled, the CAPWAP data keepalive is extended to three times. Note Only wired uplink configuration is valid, if you configure an AP as Bridge or Flex Bridge mode Root AP. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1785 Prerequisites for Redundant RAP Ethernet Daisy Chaining Support Mesh Access Points Prerequisites for Redundant RAP Ethernet Daisy Chaining Support · Ethernet bridging on should be enabled. · Strict-wired-uplink feature should be enabled. Configuring Redundant RAP Ethernet Daisy Chaining Support (CLI) Follow the procedure given below to enable redundant RAP ethernet daisy chaining on a mesh profile: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile mesh profile-name Example: Device(config)# wireless profile mesh default-mesh-profile Configures a mesh profile and enters mesh profile configuration mode. Step 3 daisychain-stp-redundancy Example: Device(config-wireless-mesh-profile)# daisychain-stp-redundancy Configures daisy chain STP redundancy. Verifying Daisy Chain Redundancy (CLI) To verify the ethernet daisy chain summary, use the following command: Device# show wireless mesh ethernet daisy-chain summary AP Name BVI MAC BGN Backhaul Ethernet STP Red ---------------------------------------------------------------------------------------------------------- RAP4 683b.78bf.15f0 IOT Ethernet0 Up Up Dn Dn Enabled RAP3 683b.78bf.1634 IOT Ethernet0 Up Up Dn Dn Enabled RAP1 6c8b.d383.b4d4 IOT Ethernet0 Up Up Dn Dn Enabled RAP2 6c8b.d383.b4e8 IOT Ethernet0 Up Up Up Dn Enabled To verify the ethernet daisy chain Bridge Group Name (BGN) details, use the following command: Device# show wireless mesh ethernet daisy-chain bgn <IOT> Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1786 Mesh Access Points Verifying Daisy Chain Redundancy (CLI) AP Name BVI MAC BGN Backhaul Ethernet STP Red ---------------------------------------------------------------------------------------------------------- RAP4 683b.78bf.15f0 IOT Ethernet0 Up Up Dn Dn Enabled RAP3 683b.78bf.1634 IOT Ethernet0 Up Up Dn Dn Enabled RAP1 6c8b.d383.b4d4 IOT Ethernet0 Up Up Dn Dn Enabled RAP2 6c8b.d383.b4e8 IOT Ethernet0 Up Up Up Dn Enabled To verify the mesh profile, use the following command: Device# show wireless profile mesh detailed default-mesh-profile Mesh Profile Name : default-mesh-profile ------------------------------------------------Description : default mesh profile Bridge Group Name : IOT Strict match BGN : ENABLED Amsdu : ENABLED Background Scan : ENABLED Channel Change Notification : ENABLED Backhaul client access : ENABLED Ethernet Bridging : ENABLED Ethernet Vlan Transparent : DISABLED Daisy Chain STP Redundancy : ENABLED Full Sector DFS : ENABLED IDS : ENABLED Multicast Mode : In-Out Range in feet : 12000 Security Mode : EAP Convergence Method : Standard LSC only Authentication : DISABLED Battery State : ENABLED Authorization Method : eap_methods Authentication Method : eap_methods Backhaul tx rate(802.11bg) : auto Backhaul tx rate(802.11a) : auto =============== Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1787 Verifying Daisy Chain Redundancy (CLI) Mesh Access Points Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1788 X I V PA R T VideoStream · VideoStream, on page 1791 1 6 5 C H A P T E R VideoStream · Information about Media Stream, on page 1791 · Prerequisites for Media Stream, on page 1792 · How to Configure Media Stream, on page 1792 · Monitoring Media Streams, on page 1797 · Configuring the General Parameters for a Media Stream (GUI), on page 1798 · Adding Media Stream (CLI), on page 1798 · Enabling a Media Stream per WLAN (GUI), on page 1799 · Enabling a Media Stream per WLAN (CLI), on page 1799 · Configuring the General Parameters for a Media Stream (GUI), on page 1800 · Configuring the General Parameters for a Media Stream (CLI), on page 1800 · Configuring Multicast Direct Admission Control (GUI), on page 1801 · Configuring Multicast Direct Admission Control (CLI), on page 1802 · Create and Attach Policy-based QoS Profile, on page 1803 · Viewing Media Stream Information, on page 1809 Information about Media Stream The IEEE 802.11 wireless multicast delivery mechanism does not provide a reliable way to acknowledge lost or corrupted packets. As a result, if any multicast packet is lost in the air, it is not sent again which may cause an IP multicast stream unviewable. The Media Stream feature makes the delivery of the IP multicast stream reliable over air, by converting the multicast frame to a unicast frame over the air. Each Media Stream client acknowledges receiving a video IP multicast stream. Note Support for IPv6 was added from Cisco IOS XE Gibraltar 16.12.1. You can use IPv6 multicast addresses in place of IPv4 multicast addresses to enable media stream on the IPv6 networks. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1791 Prerequisites for Media Stream VideoStream Prerequisites for Media Stream · Make sure that the Multicast feature is enabled. We recommend that you configure IP multicast on the controller in multicast-multicast mode. · Check for the IP address on the client machine. The machine should have an IP address from the respective VLAN. · Verify that the access points have joined the controllers . How to Configure Media Stream Configuring Multicast-Direct Globally for Media Stream (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless multicast Example: Device(config)# wireless multicast Enables multicast for wireless forwarding. Step 3 ip igmp snooping Example: Device(config)# ip igmp snooping Enables IGMP snooping on a per-VLAN basis. If the global setting is disabled, then all the VLANs are treated as disabled, whether they are enabled or not. Step 4 ip igmp snooping querier Enables a snooping querier on an interface when Example: there is no multicast router in the VLAN to generate queries. Device(config)# ip igmp snooping querier Step 5 wireless media-stream multicast-direct Example: (config)#wireless media-stream multicast-direct Configures the global multicast-direct on the controller. Step 6 wireless media-stream message Configures various message-configuration Example: parameters such as phone, URL, email, and notes. That is, when a media stream is refused (config)#wireless media-stream message (due to bandwidth constraints), a message can ? Email Configure Session Announcement be sent to the corresponding user. These Email parameters configure the messages that are to Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1792 VideoStream Configuring Media Stream for 802.11 Bands (CLI) Step 7 Command or Action Purpose Notes Configure Session Announcement be sent to the IT support email address, notes notes (message be displayed explaining why the URL Configure Session Announcement URL stream was refused), URL to which the user can phone Configure Session Announcement be redirected, and the phone number that the Phone number user can call about the refused stream. <cr> wireless media-stream group name startIp endIp Example: (config)#wireless media-stream group grp1 231.1.1.1 239.1.1.3 Configures each media stream and its parameters such as expected multicast destination addresses, stream bandwidth consumption, and stream-priority parameters. avg-packet-size Configure average packet size default Set a command to its defaults exit Exit sub-mode max-bandwidth Configure maximum expected stream bandwidth in Kbps no Negate a command or set its defaults policy Configure media stream admission policy priority Configure media stream priority, <1:Lowest - 8:Highest> qos Configure over the air QoS class, <'video'> ONLY rrc-evaluation Configure RRC re-evaluation admission violation Configure stream violation policy on periodic re-evaluation Step 8 end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Media Stream for 802.11 Bands (CLI) Procedure Step 1 Step 2 Command or Action configure terminal Example: Device# configure terminal ap dot11 {24ghz | 5ghz | 6ghz} media-stream multicast-direct Purpose Enters global configuration mode. Configures whether media stream (multicast to unicast ) is allowed for the 802.11 band. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1793 Configuring Media Stream for 802.11 Bands (CLI) VideoStream Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action Example: Device(config)#ap dot11 24ghz media-stream multicast-direct Purpose You must disable to 802.11 network to enable the mediastream. ap dot11 {24ghz | 5ghz | 6ghz} media-stream video-redirect Example: Device(config)#ap dot11 24ghz media-stream video-redirect Optional. Configures the redirection of unicast video traffic to the best-effort queue. ap dot11 {24ghz | 5ghz | 6ghz} media-stream multicast-direct admission-besteffort Example: Device(config)#ap dot11 24ghz media-stream multicast-direct admission-besteffort Configures the media stream to be sent through the best-effort queue if that media stream cannot be prioritized due to bandwidth-availability limitations. Run the no form of the command to drop the stream, if the media stream cannot be prioritized due to bandwidth-availability limitations. ap dot11 {24ghz | 5ghz | 6ghz} media-stream multicast-direct client-maximum value Example: Configures the maximum number of allowed media streams per individual client. The maximum is 15 and the default is 0. The value of 0 denotes unlimited streams. Device(config)#ap dot11 24ghz media-stream multicast-direct client-max 15 ap dot11 {24ghz | 5ghz | 6ghz} media-stream multicast-direct radio-maximum value Example: Device(config)#ap dot11 24ghz media-stream multicast-direct radio-maximum 20 Configures maximum number of radio streams. The valid range is from 1 to 20. Default is 0. The value of 0 denotes unlimited streams. ap dot11 {24ghz | 5ghz | 6ghz} cac multimedia max-bandwidth bandwidth Example: Device(config)#ap dot11 24ghz cac multimedia max-bandwidth 60 Configures maximum media (voice + video) bandwidth, in percent. The range is between 5-85%. ap dot11 {24ghz | 5ghz | 6ghz} cac media-stream multicast-direct min-client-rate dot11_rate Example: Device(config)#ap dot11 24ghz cac media-stream multicast-direct min_client_rate Configures the minimum PHY rate needed for a client to send a media stream as unicast. Clients communicating below this rate will not receive the media stream as a unicast flow. Typically, this PHY rate is equal to or higher than the rate at which multicast frames are sent. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1794 VideoStream Configuring a WLAN to Stream Video(GUI) Step 9 Step 10 Step 11 Step 12 Command or Action ap dot11 {24ghz | 5ghz | 6ghz} cac media-stream Example: Device(config)#ap dot11 5ghz cac media-stream Purpose Configures Call Admission Control (CAC) parameters for media stream access category. ap dot11 {24ghz | 5ghz | 6ghz} cac multimedia Example: Device(config)#ap dot11 5ghz cac multimedia Configures CAC parameters for media access category: used for voice and video. ap dot11 {24ghz | 5ghz | 6ghz} cac voice Configures CAC parameters for voice access Example: category. Device(config)#ap dot11 5ghz cac voice end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring a WLAN to Stream Video(GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Wireless > WLANs > Wireless Networks. Select a WLAN to view the Edit WLAN window. Click Advanced tab. Check the Media Stream Multicast-Direct check box to enable the feature. Click Update & Apply to Device. Configuring a WLAN to Stream Video (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1795 Deleting a Media Stream (GUI) VideoStream Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action wlan wlan_name Example: (config)#wlan wlan50 Purpose Enters WLAN configuration mode. shutdown Example: (config-wlan)#shutdown Disables the WLAN for configuring its parameters. media-stream multicast-direct Example: Configures the multicast-direct on media stream for the WLAN. (config)#media-stream multicast-direct no shutdown Example: (config-wlan)#no shutdown Enables the WLAN. end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Deleting a Media Stream (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Wireless > Media Stream. Click the Streams tab. Check the checkbox adjecent to the Stream Name you want to delete. To delete multiple streams, select multiple stream name checkboxes. Click Delete. Click Yes on the confirmation window to delete the VLAN. Deleting a Media Stream (CLI) Before you begin The media stream should be enabled and configured for it to be deleted. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1796 VideoStream Monitoring Media Streams Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 no wireless media-stream group media_stream_name Deletes the media stream that bears the name mentioned in the command. Example: Device(config)#no wireless media-stream grp1 Step 3 end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Monitoring Media Streams Table 130: Commands for monitoring media streams Commands Description show wireless media-stream client detail group Displays media stream client details of the particular name group. show wireless media-stream client summary Displays the media stream information of all the clients. show wireless media-stream group detail group Displays the media stream configuration details of the name particular group. show wireless media-stream group summary Displays the media stream configuration details of all the groups. show wireless media-stream message details Displays the session announcement message details. show wireless multicast Displays the multicast-direct configuration state. show ap dot11 {24ghz | 5ghz} media-stream rrc Displays 802.11 media Resource-Reservation-Control configurations. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1797 Configuring the General Parameters for a Media Stream (GUI) VideoStream Configuring the General Parameters for a Media Stream (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Choose Configuration > Wireless > Media Stream. In the General tab, check the Multicast Direct Enable check box. In the Session Message Config section, check the Session Announcement State check box to enable the session announcement mechanism. If the session announcement state is enabled, clients are informed each time a controller is not able to serve the multicast direct data to the client. In the Session Announcement URL field, enter the URL where the client can find more information when an error occurs during the multicast media stream transmission. In the Session Announcement Email field, enter the e-mail address of the person who can be contacted. In the Session Announcement Phone field, enter the phone number of the person who can be contacted. In the Session Announcement Note field, enter a reason as to why a particular client cannot be served with a multicast media. Click Apply. Adding Media Stream (CLI) Procedure Step 1 Command or Action wireless media-stream group groupName startIpAddr endIpAddr Example: Device(config)# wireless media-stream group group1 224.0.0.0 224.0.0.223 Purpose Configures each media stream and its parameters, such as expected multicast destination addresses, stream bandwidth consumption , and stream priority parameters. Step 2 avg-packet-size packetsize Example: Device(media-stream)# avg-packet-size 100 Configures the average packet size. Step 3 max-bandwidth bandwidth Example: Configures the maximum expected stream bandwidth, in Kbps. Device(media-stream)# max-bandwidth 80 Step 4 policy {admit |deny } Example: Device(media-stream)# policy admit Configure the media stream admission policy. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1798 VideoStream Enabling a Media Stream per WLAN (GUI) Step 5 Step 6 Step 7 Step 8 Command or Action qos video Example: Device(media-stream)# qos video violation {drop|fallback } Example: Device(media-stream)# violation drop rrc-evaluation {initial|periodic } Example: Device(media-stream)# rrc-evaluation initial priority priority-value Example: Device(media-stream)# priority 6 Purpose Configures over-the-air QoS class, as 'video'. Configures the violation mode. Configure Resource Reservation Control (RRC) re-evaluation admission, which provides initial or periodic admission evaluation. The re-evaluation admission occurs at 2, 4,8, and so on seconds. Sets the priority value. The valid range is from 1-8, with 1 being the lowest. Enabling a Media Stream per WLAN (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > WLANs. On the WLANs page, click the name of the WLAN or click Add to create a new one. In the Add/Edit WLAN window that is displayed, click the Advanced tab. Check the Enabling a Media Stream for each WLAN check box to enable Media Stream on the WLAN. Save the configuration. Enabling a Media Stream per WLAN (CLI) Follow the procedure given below to enable a media stream for each WLAN: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1799 Configuring the General Parameters for a Media Stream (GUI) VideoStream Step 2 Step 3 Step 4 Step 5 Command or Action wlan wlan_name Example: Device(config)# wlan wlan5 shutdown Example: Device(config-wlan)# shutdown media-stream multicast-direct Example: Device(config-wlan)# media-stream multicast-direct no shutdown Example: Device(config-wlan)# no shutdown Purpose Enters WLAN configuration mode. Disables the WLAN for configuring its parameters. Configures multicast-direct for the WLAN. Enables the WLAN. Configuring the General Parameters for a Media Stream (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Wireless > Media Stream. Check the Multicast Direct Enable check box to enable multicast direct globally on the local mode. In the Session Message Config section, enter the values for the following parameters · Session Announcement URL · Session Announcement Email · Session Announcement Phone · Session Announcement Note Save the configuration. Configuring the General Parameters for a Media Stream (CLI) Follow the procedure given below to configure the general parameters for a media stream: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1800 VideoStream Configuring Multicast Direct Admission Control (GUI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless media-stream message {URL url Configures various message configuration |email email-address |phone phone-no |notes parameters, such as phone, URL, email, and notes } notes. Example: Device(config)# wireless media-stream message url www.xyz.com Step 3 wireless media-stream multicast-direct Example: Device(config)# wireless media-stream multicast-direct Enables multicast direct globally for local mode. Note This configuration will not impact flex and fabric media-stream configurations. Step 4 exit Example: Device(config)# exit Returns to privileged EXEC mode. Configuring Multicast Direct Admission Control (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Configuration > Wireless > Media Stream. Check the Media Stream Admission Control (ACM) check box to enable multicast direct admission control. In the Maximum Media Stream RF bandwidth (%) field, enter the percentage of the maximum bandwidth to be allocated for media applications on this radio band. Valid range is from 5 to 85. When the client reaches a specified value, the AP rejects new calls on this radio band. In the Maximum Media Bandwidth (%) field, enter the bandwidth. Valid range is from 5 to 85%. From the Client Minimum Phy Rate drop-down list, select the minimum transmission data rate or the rate in kilobits per second at which the client can operate. If the transmission data rate is below the physical rate, either the video will not start or the client may be classified as a bad client. The bad client video can be demoted for better effort QoS or subject to denial. In the Maximum Retry Percent (%) field, enter the percentage of maximum retries that are allowed. The default value is 80. If it exceeds 80, either the video will not start or the client might be classified as a bad client. The bad client video can be demoted for better effort QoS or subject to denial. Click Apply. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1801 Configuring Multicast Direct Admission Control (CLI) VideoStream Configuring Multicast Direct Admission Control (CLI) Follow the procedure given below to configure multicast direct admission control: Procedure Step 1 Step 2 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. ap dot11 {24ghz | 5ghz | 6ghz} shutdown Disables the 802.11 network. Example: Device(config)# ap dot11 24ghz shutdown Step 3 Step 4 Step 5 Step 6 Step 7 ap dot11 {24ghz | 5ghz | 6ghz} media-stream video-redirect Example: Device(config)# ap dot11 24ghz media-stream video-redirect Configures the redirection of the unicast video traffic to best-effort queue. ap dot11 {24ghz | 5ghz | 6ghz} cac media-stream acm Example: Device(config)# ap dot11 24ghz cac media-stream acm Enables admission control on the media-stream access category. ap dot11 {24ghz | 5ghz | 6ghz} cac media-stream max-bandwidth bandwidth Example: Device(config)# ap dot11 24ghz cac media-stream max-bandwidth 65 Configures the maximum media bandwidth, in percent. The range is between 5-85%. ap dot11 {24ghz | 5ghz | 6ghz} cac multimedia max-bandwidth bandwidth Example: Device(config)# ap dot11 24ghz cac multimedia max-bandwidth 65 Configures the maximum bandwidth allocated to Wi-Fi Multimedia (WMM) clients for media. The range is between 5-85%. ap dot11 {24ghz | 5ghz | 6ghz} cac media-stream multicast-direct min-client-rate dot11Rate Example: Device(config)# ap dot11 24ghz cac media-stream multicast-direct min-client-rate 800 Configures the minimum PHY rate needed for a client to receive media stream as unicast. Clients communicating below this rate will not receive the media stream as a unicast flow. Typically, this PHY rate is equal to or higher than the rate at which multicast frames are sent. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1802 VideoStream Create and Attach Policy-based QoS Profile Step 8 Step 9 Step 10 Step 11 Step 12 Command or Action ap dot11 {24ghz | 5ghz | 6ghz} cac media-stream multicast-direct max-retry-percent retryPercent Example: Device(config)# ap dot11 24ghz cac media-stream multicast-direct max-retry-percent 50 Purpose Configures CAC parameter maximum retry percent for multicast-direct streams. ap dot11 {24ghz | 5ghz | 6ghz} media-stream multicast-direct radio-maximum value Example: Device(config)# ap dot11 24ghz media-stream multicast-direct radio-maximum 10 Configures the maximum number of radio streams. The range is from 1 to 20. Default is 0. Value 0 denotes unlimited streams. ap dot11 {24ghz | 5ghz | 6ghz} media-stream multicast-direct client-maximum value Example: Device(config)# ap dot11 24ghz media-stream multicast-direct client-maximum 12 Configures the maximum number of allowed media streams per individual client. The maximum is 15 and the default is 0. Value 0 denotes unlimited streams. ap dot11 {24ghz | 5ghz | 6ghz} media-stream multicast-direct admission-besteffort Example: Device(config)# ap dot11 24ghz media-stream multicast-direct admission-besteffort Configures the media stream to still be sent through the best effort queue if a media stream cannot be prioritized due to bandwidth availability limitations. Add no in the command to drop the stream if the media stream cannot be prioritized due to bandwidth availability limitations. no ap dot11 {24ghz | 5ghz | 6ghz} shutdown Enables the 802.11 network. Example: Device(config)# no ap dot11 24ghz shutdown Create and Attach Policy-based QoS Profile The high-level steps to create and attach policy-based QoS profile are as follows: 1. Create a QoS Profile 2. Create a Service Template 3. Map the Service Template to the Policy Map 4. Map the Policy Map to the Policy Profile Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1803 Create a QoS Profile (GUI) VideoStream Create a QoS Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Click Configuration > Services > QoS. Click Add to create a new QoS Policy. Enter a Policy Name. Enter a Description for the policy. In the Class Default section, choose a value in the Mark drop-down list. Enter the Police(kbps) value. Click Apply to Device. Create a QoS Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 policy-map policy-map-name Example: Device(config)# policy-map QoS_Drop_Youtube Creates a policy map. Step 3 description description Example: Device(config-pmap)# description QoS_Drop_Youtube Adds a description to the policy map. Step 4 class class-map-name Example: Device(config-pmap)# class QoS_Drop_Youtube1_AVC_UI_CLASS Creates a policy criteria. Step 5 police cir committ-information-rate Example: Polices the provided committed information rate. Device(config-pmap-c)# police cir 8000 Step 6 conform-action drop Example: Configures the action when the rate is less than the conform burst. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1804 VideoStream Create a Service Template (GUI) Step 7 Step 8 Command or Action Device(config-pmap-c-police)# conform-action drop exceed-action drop Example: Device(config-pmap-c-police)# exceed-action drop end Example: Device(config-pmap-c-police)# end Purpose Configures the action when the rate is within the conform and conform plus exceed burst. Returns to privileged EXEC mode. Create a Service Template (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Security > Local Policy. On the Local Policy page, Service Template tab, click Add. In the Create Service Template window, enter the following parameters: · Service Template Name: Enter a name for the template. · VLAN ID: Enter the VLAN ID for the template. Valid range is between 1 and 4094. · Session Timeout (secs): Sets the timeout duration for the template. Valid range is between 1 and 65535. · Access Control List: Choose the Access Control List from the drop-down list. · Ingress QOS: Choose the input QoS policy for the client from the drop-down list · Egress QOS: Choose the output QoS policy for the client from the drop-down list. Click Apply to Device. Create a Service Template (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1805 Map the Service Template to the Policy Map (GUI) VideoStream Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Command or Action service-template template-name Example: Device(config)# service-template qos-template Purpose Configures the service-template or identity policy. vlan vlan-id Specifies VLAN ID. Example: Device(config-service-template)# vlan 87 absolute-timer timer Example: Device(config-service-template)# absolute-timer 3600 Specifies session timeout value for a service template. service-policy qos input qos-policy Configures an input QoS policy for the client. Example: Device(config-service-template)# service-policy qos input QoS_Drop_Youtube service-policy qos output qos-policy Example: Device(config-service-template)# service-policy qos output QoS_Drop_Youtube Configures an output QoS policy for the client. end Example: Device(config-service-template)# end Returns to privileged EXEC mode. Map the Service Template to the Policy Map (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > Policy. On the Policy Profile page, select the Policy Profile to be mapped. In the Edit Policy Profile window, click Access Policies tab. Use the Local Subscriber Policy Name drop-down list to select the policy name. Click Update & Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1806 VideoStream Map the Service Template to the Policy Map (CLI) Map the Service Template to the Policy Map (CLI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. parameter-map type subscriber attribute-to-service parameter-map-name Example: Device(config)# parameter-map type subscriber attribute-to-service QoS-Policy_Map-param Specifies the parameter map type and name. map-index map device-type eq filter-name user-role eq user-name Example: Specifies the parameter map attribute filter criteria. Multiple filters are used in the example provided here. Device(config-parameter-map-filter)# 1 map device-type eq "Android" user-role eq "student" map-index service-template service-template-name precedence precedence-num Specifies the service template. Example: Device(config-parameter-map-filter-submode)# 1 service-template Qos_template end Returns to privileged EXEC mode. Example: Device(config-parameter-map-filter-submode)# end configure terminal Example: Device# configure terminal Enters global configuration mode. policy-map type control subscriber policy-map-name Specifies the policy map type. Example: Device(config)# policy-map type control subscriber QoS-Policy_Map event identity-update match-all Example: Specifies the match criteria to the policy map. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1807 Map the Policy Map (GUI) VideoStream Step 9 Step 10 Command or Action Purpose Device(config-event-control-policymap)# event identity-update match-all class-num class always do-until-failure Applies a class-map with a service-template. Example: Device(config-event-control-policymap)# 1 class always do-until-failure action-index map attribute-to-service table Applies a parameter map. parameter-map-name Example: Device(config-event-control-policymap)# 1 map attribute-to-service table QoS-Policy_Map-param Map the Policy Map (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Choose Configuration > Security > Local Policy > Policy Map tab. Click Add. Enter a name in the Policy Map Name text field. Click Add to add the matching criteria information. Choose the service template from the Service Template drop-down list. Choose the filters from Device Type, User Role, User Name, OUI and MAC Address drop-down lists. Click Add Criteria Click Apply to Device. Map the Policy Map (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless profile policy wlan-policy-profile-name Example: Purpose Enters global configuration mode. Configures a wireless policy profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1808 VideoStream Viewing Media Stream Information Step 3 Step 4 Command or Action Purpose Device(config)# wireless profile policy test-policy-profile description profile-policy-description Example: Device(config-wireless-policy)# description "test policy profile" Adds a description for the policy profile. subscriber-policy-name policy-name Example: Device(config-wireless-policy)# subscriber-policy-name QoS-Policy_Map Configures the subscriber policy name. Viewing Media Stream Information Use the following show commands to view the media stream information. To view media stream general information and status, use the following commands: Device# show wireless media-stream multicast-direct state Multicast-direct State........................... : enabled Allowed WLANs: WLAN-Name WLAN-ID ---------------------------------------------------------- zsetup_mc 1 vwlc-mc_mo 3 mcuc_test1 4 mcuc_test2 5 Device# show wireless media-stream group summary Number of Groups:: 4 Stream Name Start IP End IP Status ------------------------------------------------------------------------------- new2 231.2.2.3 231.2.4.4 Enabled my234 234.0.0.0 234.10.10.10 Enabled uttest2 235.1.1.20 235.1.1.25 Enabled uttest3 235.1.1.40 235.1.1.200 Enabled To view the details of a particular media stream, use the show wireless media-stream client detail media_stream_name command: Device# show wireless media-stream group detail uttest2 Media Stream Name : uttest2 Start IP Address : 235.1.1.20 End IP Address : 235.1.1.25 RRC Parameters: Avg Packet Size(Bytes) : 1200 Expected Bandwidth(Kbps) : 1000 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1809 Viewing Media Stream Information VideoStream Policy RRC re-evaluation QoS Status Usage Priority Violation : Admitted : Initial : video : Multicast-direct :4 : Drop To view RRC information for a dot11 band, use the show ap dot11 {24ghz | 5ghz | 6ghz} mediastream rrccommand: Device# show ap dot11 5ghz media-stream rrc Multicast-direct Best Effort Video Re-Direct Max Allowed Streams Per Radio Max Allowed Streams Per Client Max Media-Stream Bandwidth Max Voice Bandwidth Max Media Bandwidth Min PHY Rate (Kbps) Max Retry Percentage : Enabled : Disabled : Disabled : Auto :5 :5 : 50 : 43 : 6000 :5 To view session announcement message details, use the show wireless media-stream message details command: Device# show wireless media-stream message details URL : Email : abc@cisc Phone : Note : State : Disabled To view the list of clients in the blocked list database, use the show ip igmp snooping igmpv2-tracking command: Device# show ip igmp snooping igmpv2-tracking Client to SGV mappings ---------------------Client: 10.10.10.215 Port: Ca1 Group: 239.255.255.250 Vlan: 10 Source: 0.0.0.0 blacklisted: no Group: 234.5.6.7 Vlan: 10 Source: 0.0.0.0 blacklisted: no Group: 234.5.6.8 Vlan: 10 Source: 0.0.0.0 blacklisted: no Group: 234.5.6.9 Vlan: 10 Source: 0.0.0.0 blacklisted: no Client: 10.10.101.177 Port: Ca2 Group: 235.1.1.14 Vlan: 10 Source: 0.0.0.0 blacklisted: no Group: 235.1.1.16 Vlan: 10 Source: 0.0.0.0 blacklisted: no Group: 235.1.1.18 Vlan: 10 Source: 0.0.0.0 blacklisted: no SGV to Client mappings ---------------------Group: 234.5.6.7 Source: 0.0.0.0 Vlan: 10 Client: 10.10.10.215 Port: Ca1 Blacklisted: no To view wireless client summary, use the show wireless media-stream client summary command: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1810 VideoStream Viewing Media Stream Information Device# show wireless media-stream client summary To view details of a specific wireless media stream, use the show wireless media-stream client detailcommand: Device# show wireless media-stream client detail uttest2 Media Stream Name : uttest2 Start IP Address : 235.1.1.20 End IP Address : 235.1.1.25 RRC Parameters: Avg Packet Size(Bytes) : 1200 Expected Bandwidth(Kbps) : 1000 Policy : Admitted RRC re-evaluation : Initial QoS : video Status : Multicast-direct Usage Priority :4 Violation : Drop Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1811 Viewing Media Stream Information VideoStream Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1812 X V P A R T Software-Defined Access Wireless · Software-Defined Access Wireless, on page 1815 · Passive Client, on page 1823 · Fabric in a Box with External Fabric Edge, on page 1831 1 6 6 C H A P T E R Software-Defined Access Wireless · Information to Software-Defined Access Wireless, on page 1815 · Configuring SD-Access Wireless, on page 1818 · Verifying SD-Access Wireless, on page 1822 Information to Software-Defined Access Wireless The Enterprise Fabric provides end-to-end enterprise-wide segmentation, flexible subnet addressing, and controller-based networking with uniform enterprise-wide policy and mobility. It moves the enterprise network from current VLAN-centric architecture to a user group-based enterprise architecture, with flexible Layer 2 extensions within and across sites. Enterprise fabric is a network topology where traffic is passed through inter-connected switches, while providing the abstraction of a single Layer 2 or Layer 3 device. This provides seamless connectivity, with policy application and enforcement at the edge of the fabric. Fabric uses IP overlay, which makes the network appear as a single virtual entity without using clustering technologies. The following definitions are used for fabric nodes: · Enterprise Fabric: A network topology where traffic is passed through inter-connected switches, while providing the abstraction of a single Layer 2 or Layer 3 device. · Fabric Domain: An independent operation part of the network. It is administered independent of other fabric domains. · End Points: Hosts or devices that connect to the fabric edge node are known as end points (EPs). They directly connect to the fabric edge node or through a Layer 2 network. The following figure shows the components of a typical SD-Access Wireless. It consists of Fabric Border Nodes (BN), Fabric Edge Nodes (EN), Wireless Controller, Cisco DNA Center, and Host Tracking Database (HDB). Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1815 Information to Software-Defined Access Wireless Figure 51: Software-Defined Access Wireless Software-Defined Access Wireless The figure covers the following deployment topologies: · All-in-one Fabric--When we have all Fabric Edge, Fabric Border, Control-Plane and controller functionality enabled on a Cat 9K switch. This toplogy is depicted in the mid part of the figure. · Split topology--When we have Fabric Border, or Control Plane, or controller on a Cat 9K switch with separate Fabric Edge. This toplogy is depicted in the left-most part of the figure. · Co-located Fabric Edge and Controller--When we have Fabric Edge and controller on a Cat 9K switch. This toplogy is depicted in the right-most part of the figure. Cisco DNA Center: Is an open, software-driven architecture built on a set of design principles with the objective of configuring and managing Cisco Catalyst 9800 Series Wireless Controllers. Control Plane: This database allows the network to determine the location of a device or user. When the EP ID of a host is learnt, other end points can query the database about the location of the host. The flexibility of tracking subnets helps in summarization across domains and improves the scalability of the database. Fabric Border Node (Proxy Egress Tunnel Router [PxTR or PITR/PETR] in LISP): These nodes connect traditional Layer 3 networks or different fabric domains to the enterprise fabric domain. If there are multiple fabric domains, these nodes connect a fabric domain to one or more fabric domains, which could be of the same or different type. These nodes are responsible for translation of context from one fabric domain to another. When the encapsulation is the same across different fabric domains, the translation of fabric context is generally 1:1. The fabric control planes of two domains exchange reachability and policy information through this device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1816 Software-Defined Access Wireless Information to Software-Defined Access Wireless Fabric Edge Nodes (Egress Tunnel Router [ETR] or Ingress Tunnel Router [ITR] in LISP): These nodes are responsible for admitting, encapsulating or decapsulating, and forwarding of traffic from the EPs. They lie at the perimeter of the fabric and are the first points of attachment of the policy. EPs could be directly or indirectly attached to a fabric edge node using an intermediate Layer 2 network that lies outside the fabric domain. Traditional Layer 2 networks, wireless access points, or end hosts are connected to fabric edge nodes. Wireless Controller: The controller provides AP image and configuration management, client session management and mobility. Additionally, it registers the mac address of wireless clients in the host tracking database at the time of client join, as well as updates the location at the time of client roam. Access Points: AP applies all the wireless media specific features. For example, radio and SSID policies, webauth punt, peer-to-peer blocking, and so on. It establishes CAPWAP control and data tunnel to controller. It converts 802.11 data traffic from wireless clients to 802.3 and sends it to the access switch with VXLAN encapsulation. The SDA allows to simplify: · Addressing in wireless networks · Mobility in wireless networks · Guest access and move towards multi-tenancy · Leverage Sub-net extension (stretched subnet) in wireless network · Provide consistent wireless policies Note Role co-location between wireless controller and fabric edge is supported. Platform Support Table 131: Supported Platforms for Software-Defined Access Wireless Platforms Support Catalyst 9300 Yes Catalyst 9400 Yes Catalyst 9500H Yes Cisco Catalyst 9800 Series Wireless Controller for Yes Cloud Cisco Catalyst 9800-40 Series Wireless Controller Yes Cisco Catalyst 9800-80 Series Wireless Controller Yes Table 132: Multi-Instance Support Multi-instance Multiple LISP sessions Support Yes Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1817 Configuring SD-Access Wireless Software-Defined Access Wireless Multi-instance Emulated database support Client roaming between WNCd instances Table 133: Feature Support Feature Inter-WLC roam for IRCM DNS-IPv4-ACL IPv6 ACL for clients Location tracking/Hyperlocation Multicast Video-Stream (IPv4) Smart Licensing Table 134: Outdoor Access Points Support AP 1542 1560 Support Yes Yes Support Only L2 mobility is supported as VLAN is stretched across the fabric. · ACLs are enforced at AP. · Controller needs to push the DNS-ACL information to AP. Yes. Open, 802.11x, WebbAuth, PSK WLANs, IPv6 address visibility are also supported. Yes Yes Yes Support Yes Yes Configuring SD-Access Wireless · To enable SD-Access wireless globally, you need to run the wireless fabric configuration command. · During SD-Access Wireless provisioning, ensure that L2-VNID value is unique. Configuring Default Map Server (GUI) Procedure Step 1 Step 2 Click Configuration > Wireless Plus > Fabric > Fabric Configuration. In the Map Server section, specify the IP address and preshared key details for Server 1. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1818 Software-Defined Access Wireless Configuring Default Map Server (CLI) Step 3 Step 4 Optionally, you can specify the IP address and preshared key details for Server 2. Click Apply. Configuring Default Map Server (CLI) Follow the procedure given below to configure default map server: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters the global configuration mode. Step 2 wireless fabric control-plane map-server-name Configures the default map server. Example: Device(config)# wireless fabric control-plane map-server-name Here, map-server-name defines a pair of map servers. Step 3 ip address ip-address key user_password reenter_password Configures IP address for the default map server. Example: Device(config-wireless-cp)# ip address 200.0.0.0 key user-password user-password Step 4 end Example: Device(config-wireless-cp)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring SD-Access Wireless Profile (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Wireless > Fabric. On the Fabric page, click the Profiles tab and click Add. In the Add New Profile window that is displayed, specify the following parameters: · Profile name · Description · L2 VNID; valid range is between 0 and 16777215 · SGT tag; valid range is between 2 and 65519 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1819 Configuring SD-Access Wireless Profile (CLI) Software-Defined Access Wireless Step 4 Click Save & Apply to Device. Configuring SD-Access Wireless Profile (CLI) Follow the procedure given below to configure SD-Access wireless profile: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters the global configuration mode. Step 2 wireless profile fabric fabric-profile-name Example: Configures the SD-Access wireless profile parameters. Device(config)# wireless profile fabric fabric-profile-name Step 3 sgt-tag sgt Configures SGT tag. Example: Here, sgt refers to the sgt tag value. The valid Device(config-wireless-fabric)# sgt-tag range is from 2-65519. The default value is 0. 2 Step 4 client-l2-vnid client-l2-vnid Example: Device(config-wireless-fabric)# client-l2-vnid client-l2-vnid Configures client L2-VNID. Here, client-l2-vnid refers to the client L2-VNID value. The valid range is from 0-16777215. Step 5 end Example: Device(config-wireless-fabric)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Map Server in Site Tag (GUI) Before you begin Ensure that you have configured a control plane at the time of configuring Wireless Fabric. Procedure Step 1 Step 2 Step 3 Choose Configuration > Tags & Profiles > Tags. On the Manage Tags page, click the Site tab. Click the name of the site tag. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1820 Software-Defined Access Wireless Configuring Map Server in Site Tag (CLI) Step 4 Step 5 In the Edit Site Tag window, choose the Fabric control plane name from the Control Plane Name drop-down list. Save the configuration. Configuring Map Server in Site Tag (CLI) Follow the procedure given below to configure map server in site tag: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless tag site site-tag Example: Device(config)# wireless tag site default-site-tag Step 3 fabric control-plane map-server-name Example: Device(config-site-tag)# fabric control-plane map-server-name Step 4 end Example: Device(config-site-tag)# end Purpose Enters the global configuration mode. Configures site tag. Here, site-tag refers to the site tag name. Configures fabric control plane details. Here, map-server-name refers to the fabric control plane name associated with the site tag. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Map Server per L2-VNID (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Wireless > Fabric. On the Fabric Configuration page in the Fabric VNID Mapping section, click Add. In the Add Client and AP VNID window, specify a name for the Fabric, L2 VNID value (valid range is from 0 to 4294967295), control plane name. Save the configuration. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1821 Configuring Map Server per L2-VNID (CLI) Software-Defined Access Wireless Configuring Map Server per L2-VNID (CLI) Follow the procedure given below to configure map server in site tag: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters the global configuration mode. Step 2 wireless fabric name name l2-vnid l2-vnid-value l3-vnid l3-vnid-value ip network-ip subnet-mask control-plane-name control-plane-name Configures the map server to the VNID map table. · name refers to the fabric name. Example: Device(config)# wireless fabric name fabric_name l2-vnid 2 l3-vnid 2 ip 122.220.234.0 255.255.0.0 control-plane-name sample-control-plane · l2-vnid-value refers to the L2 VNID value. The valid range is from 0 to 16777215. · L3-vnid-value refers to the L3 VNID value. The valid range is from 0 to 16777215. · control-plane-name refers to the control plane name. Step 3 end Example: Device(config)# end Returns to privileged EXEC mode. Verifying SD-Access Wireless You can verify the SD-Access wireless configurations using the following commands: Table 135: Commands for Verifying SD-Access Wireless Commands show wireless fabric summary show wireless fabric vnid mapping show wireless profile fabric detailed fabric_profile_name show ap name AP_name config general show wireless client mac MAC_addr detail show wireless tag site detailed site_tag Description Displays the fabric status. Displays all the VNID mapping details. Displays the details of a given fabric profile name. Displays the general details of the Cisco AP. Displays the detailed information for a client by MAC address. Displays the detailed parameters for a site tag. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1822 1 6 7 C H A P T E R Passive Client · Information About Passive Clients, on page 1823 · Enabling Passive Client on WLAN Policy Profile (GUI), on page 1824 · Enabling Passive Client on WLAN Policy Profile (CLI), on page 1824 · Enabling ARP Broadcast on VLAN (GUI), on page 1825 · Enabling ARP Broadcast on VLAN (CLI), on page 1825 · Configuring Passive Client in Fabric Deployment, on page 1825 · Verifying Passive Client Configuration, on page 1829 Information About Passive Clients Passive Clients are wireless devices, such as printers and devices configured using a static IP address. Such clients do no transmit any IP information after associating to an AP. That is why, the controller does not learn their IP address unless they perform the DHCP process. In the controller, the clients just show up in the Learn IP state and get timed out because of the DHCP policy-timeout. The Passive Client feature can be enabled on a per WLAN basis. Enabling this feature will change a few default behaviors in order to better accommodate passive clients. These changes include : · No client will ever timeout in the IP_LEARN phase. The controller will keep on waiting to learn their IP address. Note that the idle timeout remains active and will delete the client entry after the timeout period expiry, if the client remains silent all along. · ARP coming from the wired side is broadcasted to all the APs, if the controller does not know the client IP address, to ensure that it reaches the passive client. After this, the controller learns the client IP from the ARP response. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1823 Enabling Passive Client on WLAN Policy Profile (GUI) Software-Defined Access Wireless Note In order to save air time, the controller transforms the ARP broadcast coming from the wired side or from other wireless clients and unicasts them to the wireless client it owns . This is only possible after the controller has learned the MAC-IP binding of its wireless client. When the controller enables ARP broadcast, the controller does not transform the ARP broadcasts into unicasts but only forwards the broadcast, thereby wasting air time for other clients (with a frame that is not acknowledgeable and therefore less reliable). This pushes the passive client to respond to the ARP request and therefore every other client benefits from learning the MAC-IP binding of the wireless client. Enabling Passive Client on WLAN Policy Profile (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Tags & Profiles > Policy page, click Add to open the Add Policy Profile page. In the General tab, use the slider to enable Passive Client. Click Save & Apply to Device. Enabling Passive Client on WLAN Policy Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy policy-profile Example: Configures WLAN policy profile and enters wireless policy configuration mode. Device(config)# wireless profile policy rr-xyz-policy-1 Step 3 [no] passive-client Example: Device(config-wireless-policy)# [no] passive-client Enables Passive Client. Step 4 end Example: Device(config-wireless-policy)# end Returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1824 Software-Defined Access Wireless Enabling ARP Broadcast on VLAN (GUI) Enabling ARP Broadcast on VLAN (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Layer2 > VLAN page, click VLAN tab. Click Add to view the Create VLAN window. Use the slider to enable ARP Broadcast. Click Save & Apply to Device. Enabling ARP Broadcast on VLAN (CLI) Note ARP Broadcast feature is not supported on VLAN groups. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 vlan configuration vlan-id Example: Device(config)# vlan configuration 1 Configures a VLAN or a collection of VLANs and enters VLAN configuration mode. Step 3 [no] arp broadcast Enables ARP broadcast on VLAN. Example: Device(config-vlan)# [no] arp broadcast Step 4 end Example: Device(config-vlan)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Passive Client in Fabric Deployment You need to enable the following for passive client feature to work: · ARP broadcast on VLANs Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1825 Enabling Broadcast Underlay on VLAN Software-Defined Access Wireless · LISP multicast. For information on LISP multicast, see: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_lisp/configuration/xe-3s/irl-xe-3s-book/ irl-lisp-multicast.html For information on LISP (Locator ID Separation Protocol), see: https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/iproute_lisp/configuration/xe-3s/irl-xe-3s-book/ irl-cfg-lisp.html Enabling Broadcast Underlay on VLAN Note You can perform the following configuration tasks from Fabric Edge Node only and not from your controller. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action configure terminal Example: FabricEdge# configure terminal Purpose Enters global configuration mode. router lisp Example: FabricEdge(config)# router lisp Enters LISP configuration mode. instance-id instance Example: FabricEdge(config-router-lisp)# instance-id 3 Creates a LISP EID instance to group multiple services. Configurations under this instance-id are applicable to all services underneath it. service ipv4 Example: Enables Layer 3 network services for the IPv4 address family and enters the service submode. FabricEdge(config-router-lisp-instance)# service ipv4 database-mapping eid locator-set RLOC Configures EID to RLOC mapping name relationship. Example: FabricEdge(config-router-lisp-instance-dynamic-eid)# database-mapping 66.66.66.64/32 locator-set rloc1 map-cache destination-eid map-request Example: Generates a static map request for the destination EID. FabricEdge(config-router-lisp-instance-service)# map-cache 0.0.0.0/0 map-request Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1826 Software-Defined Access Wireless Enabling ARP Flooding Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Command or Action Purpose exit-service-ipv4 Exits service submode. Example: FabricEdge(config-router-lisp-instance-service)# exit-service-ipv4 exit-instance-id Exits instance submode. Example: FabricEdge(config-router-lisp-instance)# exit-instance-id instance-id instance Example: FabricEdge(config-router-lisp)# instance-id 101 Creates a LISP EID instance to group multiple services. service ethernet Example: Enables Layer 2 network services and enters service submode. FabricEdge(config-router-lisp-instance)# service ethernet eid-table vlan vlan-number Associates the LISP instance-id configured Example: earlier with a VLAN through which the endpoint identifier address space is reachable. FabricEdge(config-router-lisp-instance-service)# eid-table vlan 101 broadcast-underlay multicast-group Specifies the multicast group used by the Example: underlay to carry the overlay Layer 2 broadcast traffic. FabricEdge(config-router-lisp-instance-service)# broadcast-underlay 239.0.0.1 exit-service-ethernet Exits service sub mode. Example: FabricEdge(config-router-lisp-instance-service)# exit-service-ethernet exit-instance-id Exits instance sub mode. Example: FabricEdge(config-router-lisp-instance)# exit-instance-id Enabling ARP Flooding Note You can perform the following configuration tasks from Fabric Edge Node only and not from your controller. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1827 Enabling ARP Flooding Software-Defined Access Wireless Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action configure terminal Example: FabricEdge# configure terminal Purpose Enters global configuration mode. router lisp Example: FabricEdge(config)# router lisp Enters LISP configuration mode. instance-id instance Example: FabricEdge(config-router-lisp)# instance-id 3 Creates a LISP EID instance to group multiple services. Configurations under this instance-id are applicable to all services underneath it. service ipv4 Example: Enables Layer 3 network services for the IPv4 address family and enters the service submode. FabricEdge(config-router-lisp-instance)# service ipv4 database-mapping eid locator-set RLOC Configures EID to RLOC mapping name relationship. Example: FabricEdge(config-router-lisp-instance-dynamic-eid)# database-mapping 66.66.66.64/32 locator-set rloc1 map-cache destination-eid map-request Example: Generates a static map request for the destination EID. FabricEdge(config-router-lisp-instance-service)# map-cache 0.0.0.0/0 map-request exit-service-ipv4 Exits service submode. Example: FabricEdge(config-router-lisp-instance-service)# exit-service-ipv4 exit-instance-id Exits instance submode. Example: FabricEdge(config-router-lisp-instance)# exit-instance-id instance-id instance Example: FabricEdge(config-router-lisp)# instance-id 101 Creates a LISP EID instance to group multiple services. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1828 Software-Defined Access Wireless Verifying Passive Client Configuration Step 10 Step 11 Step 12 Step 13 Step 14 Step 15 Command or Action Purpose service ethernet Example: Enables Layer 2 network services and enters service submode. FabricEdge(config-router-lisp-instance)# service ethernet eid-table vlan vlan-number Associates the LISP instance-id configured Example: earlier with a VLAN through which the endpoint identifier address space is reachable. FabricEdge(config-router-lisp-instance-service)# eid-table vlan 101 flood arp-nd Enables ARP flooding. Example: FabricEdge(config-router-lisp-instance-service)# flood arp-nd database-mapping mac locator-set RLOC Configures EID to RLOC mapping name relationship. Example: FabricEdge(config-router-lisp-instance-service)# database-mapping mac locator-set rloc1 exit-service-ethernet Exits service sub mode. Example: FabricEdge(config-router-lisp-instance-service)# exit-service-ethernet exit-instance-id Exits instance sub mode. Example: FabricEdge(config-router-lisp-instance)# exit-instance-id Verifying Passive Client Configuration To verify the status of the Passive Client, use the following command: Device# show wireless profile policy detailed sample-profile-policy Policy Profile Name Description Status VLAN Client count Passive Client WLAN Switching Policy Central Switching Central Authentication Central DHCP Override DNS Override NAT PAT : sample-profile-policy : sample-policy : ENABLED : 20 :0 : ENABLED <-------------------- : ENABLED : ENABLED : DISABLED : DISABLED : DISABLED Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1829 Verifying Passive Client Configuration Software-Defined Access Wireless Central Assoc . . . : DISABLED To verify VLANs that have ARP broadcast enabled, use the following command: Device# show platform software arp broadcast Arp broadcast is enabled on vlans: 20 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1830 1 6 8 C H A P T E R Fabric in a Box with External Fabric Edge · Introduction to Fabric in a Box with External Fabric Edge, on page 1831 · Configuring a Fabric Profile (CLI), on page 1831 · Configuring a Policy Profile (CLI) , on page 1832 · Configuring a Site Tag (CLI), on page 1833 · Configuring a WLAN (CLI), on page 1834 · Configuring a Policy Tag (CLI), on page 1834 · Configuring an AP Profile, on page 1835 · Configuring Map Server and AP Subnet (CLI), on page 1835 · Configuring Fabric on FiaB Node, on page 1836 · Configuring a Fabric Edge Node, on page 1842 · Verifying Fabric Configuration, on page 1849 Introduction to Fabric in a Box with External Fabric Edge From Cisco IOS XE Amsterdam 17.2.1, the Fabric in a Box (FiaB) topology supports external fabric edge nodes. In a fabric-enabled wireless environment using FiaB (border node, control plane, fabric edge, and wireless controller in the same box), you can expand the network by adding external fabric edge nodes. The external fabric edge helps to increase the port density and extend the wireless reach by adding more APs. The APs and clients can exist on both the FiaB and the external fabric edge nodes. Also, the clients can roam between the APs on the FiaB and the external fabric edge nodes. Configuring a Fabric Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1831 Configuring a Policy Profile (CLI) Software-Defined Access Wireless Step 2 Step 3 Step 4 Step 5 Command or Action Purpose wireless profile fabric fabric-profile-name Example: Configures the wireless fabric profile parameters. Device(config)# wireless profile fabric test-fabric-profile client-l2-vnid client-l2-vnid Example: Device(config-wireless-fabric)# client-l2-vnid 8189 Configures client L2-VNID. Here, client-l2-vnid refers to the client L2-VNID value. The valid range is from 0 to 16777215. description description Example: Device(config-wireless-fabric)# description test-fabric-profile Adds a description for the fabric profile. end Example: Device(config-wireless-fabric)# end Returns to privileged EXEC mode. Configuring a Policy Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-policy Example: Configures wireless policy profile and enters wireless policy configuration mode. Device(config)# wireless profile policy test-policy-profile Step 3 no central dhcp Example: Device(config-wireless-policy)# no central dhcp Configures local DHCP mode, where the DHCP is performed in an AP. Step 4 no central switching Example: Device(config-wireless-policy)# no central switching Configures a WLAN for local switching. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1832 Software-Defined Access Wireless Configuring a Site Tag (CLI) Step 5 Step 6 Step 7 Command or Action Purpose fabric fabric-name Applies the fabric profile. Example: Device(config-wireless-fabric)# fabric test-fabric-profile no shutdown Example: Device(config-wireless-fabric)# no shutdown Enables the policy profile. end Example: Device(config-wireless-fabric)# end Returns to privileged EXEC mode. Configuring a Site Tag (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless tag site site-tag Example: Device(config)# wireless tag site default-site-tag-fabric Step 3 ap-profile ap-profile-name Example: Device(config-site-tag)# ap-profile default-ap-profile-fabric Step 4 description description Example: Device(config-site-tag)# description fabric-site Step 5 end Example: Device(config-site-tag)# end Purpose Enters the global configuration mode. Configures site tag and enters site tag configuration mode. Assigns an AP profile to the wireless site. Adds a description to the AP profile. Returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1833 Configuring a WLAN (CLI) Software-Defined Access Wireless Configuring a WLAN (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wlan wlan-name wlan-id SSID-name Example: Device(config)# wlan test-wlan 1 test-wlan Step 3 no shutdown Example: Device(config-wlan)# no shutdown Purpose Enters global configuration mode. Configures a WLAN and enters WLAN configuration submode. Enables the WLAN. Configuring a Policy Tag (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless tag policy policy-tag-name Example: Device(config)# wireless tag policy test-policy-tag Configures policy tag and enters policy tag configuration mode. Step 3 wlan wlan-name policy profile-policy-name Maps a policy profile to a WLAN profile. Example: Device(config-policy-tag)# wlan test-wlan policy test-policy-profile Step 4 end Example: Device(config-site-tag)# end Returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1834 Software-Defined Access Wireless Configuring an AP Profile Configuring an AP Profile Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters the global configuration mode. Step 2 ap profile ap-profile-name Example: Device(config)# ap profile test-ap-profile Configures an AP profile and enters AP profile configuration mode. Step 3 ap ap-ether-mac Example: Device(config-ap-profile)# ap 006b.f126.036e Enters AP configuration mode. Step 4 policy-tag policy-tag Example: Device(config-ap-profile)# policy-tag test-policy-tag Specifies the policy tag that is to be attached to the AP. Step 5 end Example: Device(config-ap-profile)# end Returns to privileged EXEC mode. Configuring Map Server and AP Subnet (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless fabric Example: Device(config)# wireless fabric Purpose Enters global configuration mode. Enables SD-Access wireless globally. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1835 Configuring Fabric on FiaB Node Software-Defined Access Wireless Step 3 Step 4 Step 5 Step 6 Step 7 Command or Action Purpose wireless fabric name name l2-vnid l2-vnid-value l3-vnid l3-vnid-value ip network-ip subnet-mask Configures AP subnet Layer 2 and Layer 3 VNIDs. Example: Device(config)# wireless fabric name 40_40_0_0-INFRA_VN l2-vnid 8188 l3-vnid 4097 ip 40.40.0.0 255.255.0.0 wireless fabric name name l2-vnid l2-vnid-value Example: Device(config)# wireless fabric name 41_41_0_0-DEFAULT_VN l2-vnid 8189 Defines client Layer 2 VNID AAA override. wireless fabric control-plane name Example: Device(config)# wireless fabric control-plane default-control-plane Configures the control plane name. ip address ip-address key shared-key Example: Configures the map server IP address and authentication key shared with the map server. Device((config-wireless-cp)# ip address 5.5.5.5 key 0 3a18df end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Fabric on FiaB Node Procedure Step 1 Step 2 Step 3 Command or Action configure terminal Example: FiaB# configure terminal router lisp Example: FiaB(config)# router lisp locator-table default Example: Purpose Enters global configuration mode. Enters LISP configuration mode. Associates a default Virtual Routing and Forwarding (VRF) table through which the routing locator address space is reachable to a Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1836 Software-Defined Access Wireless Configuring Fabric on FiaB Node Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Command or Action Purpose FiaB(config-router-lisp)# locator-table router Locator ID Separation Protocol (LISP) default instantiation. locator-set locator-set-name Example: Specifies a named locator set and enters LISP locator-set configuration mode. FiaB(config-router-lisp)# locator-set WLC ip-address Example: Specifies an IP address of loopback or other egress tunnel router (ETR) interface. FiaB(config-router-lisp-locator-set)# 5.5.5.5 exit-locator-set Exits LISP locator-set configuration mode. Example: FiaB(config-router-lisp-locator-set)# exit-locator-set locator-set rloc_loopback Example: Specifies an existing locator set and enters LISP locator-set configuration mode. FiaB(config-router-lisp)# locator-set rloc_loopback ipv4-interface interface Example: Configures a locator address by creating a locator entry. FiaB(config-router-lisp-locator-set)# IPv4-interface Loopback0 auto-discover-rlocs Example: FiaB(config-router-lisp-locator-set)# auto-discover-rlocs Configures the ETR to auto discover the locators registered by other xTRs. (Ingress tunnel router (ITR) and an ETR are known as an xTR.) exit-locator-set Exits LISP locator-set configuration mode. Example: FiaB(config-router-lisp-locator-set)# exit-locator-set service ipv4 Example: Enables Layer 3 network services for the IPv4 address family and enters service submode. FiaB(config-router-lisp)# service ipv4 encapsulation vxlan Example: FiaB(config-lisp-srv-ipv4)# encapsulation vxlan Configures VXLAN as encapsulation type for data packets. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1837 Configuring Fabric on FiaB Node Software-Defined Access Wireless Step 13 Step 14 Step 15 Step 16 Step 17 Step 18 Step 19 Step 20 Step 21 Step 22 Command or Action itr map-resolver map-resolver-address Example: FiaB(config-lisp-srv-ipv4)# itr map-resolver 5.5.5.5 Purpose Configures map resolver address for sending map requests. etr map-server map-server-address key key-type authentication-key Example: FiaB(config-lisp-srv-ipv4)# etr map-server 5.5.5.5 key 7 ######### Configures the map server for ETR registration. etr Example: FiaB(config-lisp-srv-ipv4)# etr Configures a LISP ETR. sgt Example: FiaB(config-lisp-srv-ipv4)# sgt Enables security group tag propagation in LISP-encapsulated traffic. no map-cache away-eids send-map-request Removes the address family-specific map Example: cache configuration. FiaB(config-lisp-srv-ipv4)# no map-cache away-eids send-map-request proxy-itr ip-address Example: FiaB(config-lisp-srv-ipv4)# proxy-itr 5.5.5.5 Enables the Proxy Ingress Tunnel Router (PITR) functionality and specifies the address to use when LISP encapsulating packets to LISP sites. map-server Configures a LISP map server. Example: FiaB(config-lisp-srv-ipv4)# map-server map-resolver Configures a LISP map resolver. Example: FiaB(config-lisp-srv-ipv4)# map-resolver map-cache away-eids send-map-request Example: Exports table entries into the map cache, with the action set to send-map-request. FiaB(config-lisp-srv-ipv4)# map-cache 40.40.0.0/16 send-map-request route-export site-registrations Example: Exports LISP site registrations to the routing information base (RIB). Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1838 Software-Defined Access Wireless Configuring Fabric on FiaB Node Step 23 Step 24 Step 25 Step 26 Step 27 Step 28 Step 29 Step 30 Step 31 Command or Action Purpose FiaB(config-lisp-srv-ipv4)# route-export site-registrations distance site-registrations num Example: FiaB(config-lisp-srv-ipv4)# distance site-registrations 250 Configures LISP installed routes of type site registrations. map-cache site-registration Example: Installs the map cache to a map request for site registrations. FiaB(config-lisp-srv-ipv4)# map-cache site-registration exit-service-ipv4 Example: FiaB(config-lisp-srv-ipv4)# exit-service-ipv4 Exits LISP service-ipv4 configuration mode. service ethernet Example: FiaB(config-router-lisp)# service ethernet Selects service type as Ethernet and enters service submode. database-mapping limit dynamic limit Example: FiaB(config-lisp-srv-eth)# database-mapping limit dynamic 5000 Configures the maximum number of dynamic local endpoint identifier (EID) prefix database entries. itr map-resolver map-resolver-address Example: FiaB(config-lisp-srv-eth)# itr map-resolver 5.5.5.5 Configures the map-resolver address for sending map requests. itr Example: FiaB(config-lisp-srv-eth)# itr Enables the LISP ITR functionality. etr map-server map-server-address key key-type authentication-key Example: FiaB(config-lisp-srv-eth)# etr map-server 5.5.5.5 key 7 1234 Configures a map server for ETR registration. etr Example: FiaB(config-lisp-srv-eth)# etr Enables the LISP ETR functionality. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1839 Configuring Fabric on FiaB Node Software-Defined Access Wireless Step 32 Step 33 Step 34 Step 35 Step 36 Step 37 Step 38 Step 39 Step 40 Command or Action Purpose map-server Enables the LISP map server functionality. Example: FiaB(config-lisp-srv-eth)# map-server map-resolver Enables the LISP map resolver functionality. Example: FiaB(config-lisp-srv-eth)# map-resolver exit-service-ethernet Example: FiaB(config-lisp-srv-eth)# exit-service-ethernet Exits LISP service-ethernet configuration mode. instance-id instance Example: Creates a LISP EID instance to group multiple services. FiaB(config-router-lisp)# instance-id 101 remote-rloc-probe on-route-change Example: FiaB(config-lisp-inst)# remote-rloc-probe on-route-change Configures the parameters for probing of remote routing locators (RLOCs). dynamic-eid dynamic-eid-name Example: FiaB(config-lisp-inst)# dynamic-eid 40_40_0_0-INFRA_VN-IPV4 Configures a dynamic EID and enters dynamic EID configuration mode. database-mapping eid locator-set rloc_loopback Configures EID prefix and locator-set for dynamic EID. Example: FiaB(config-router-lisp-dynamic-eid)# database-mapping 40.40.0.0/16 locator-set rloc_loopback exit-dynamic-id Exits LISP dynamic-eid configuration mode. Example: FiaB(config-router-lisp-dynamic-eid)# exit-dynamic-eid exit-instance-id Example: FiaB(config-router-lisp-instance)# exit-instance-id Exits LISP instance-id configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1840 Software-Defined Access Wireless Configuring Fabric on FiaB Node Step 41 Step 42 Step 43 Step 44 Step 45 Step 46 Step 47 Step 48 Step 49 Step 50 Command or Action Purpose instance-id instance Example: Creates a LISP EID instance to group multiple services. FiaB(config-router-lisp)# instance-id 101 remote-rloc-probe on-route-change Example: FiaB(config-lisp-inst)# remote-rloc-probe on-route-change Configures parameters for probing remote RLOCs. service ethernet Example: Enables Layer 2 network services and enters service submode. FiaB(config-lisp-inst)# service ethernet eid-table vlan vlan-number Example: FiaB(config-lisp-inst-srv-eth)# eid-table vlan 101 Binds an EID table to VLAN. database-mapping mac locator-set rloc_loopbac Example: FiaB(config-lisp-inst-srv-eth)# database-mapping mac locator-set rloc_loopbac Configures an address family-specific local EID prefixes database. exit-service-ethernet Example: FiaB(config-lisp-inst-srv-eth)# exit-service-ethernet Exits LISP service-ethernet configuration mode. exit-instance-id Exits LISP instance-id configuration mode. Example: FiaB(config-lisp-inst)# exit-instance-id map-server session passive-open server Example: FiaB(config-router-lisp)# map-server session passive-open WLC Configures a map server with open passive TCP sockets to listen for incoming connections. site site-name Configures a LISP site on a map server. Example: FiaB(config-router-lisp)# site site_uci description map-server-description Example: Specifies a description text for the LISP site. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1841 Configuring a Fabric Edge Node Software-Defined Access Wireless Step 51 Step 52 Step 53 Step 54 Step 55 Step 56 Step 57 Command or Action Purpose FiaB(config-router-lisp-site)# description map-server configured from Cisco DNA-Center authentication-key key Example: FiaB(config-router-lisp-site)# authentication-key 7 ######## Configures the authentication key used by the LISP site. eid-record instance-id instance-id address accept-more-specifics Example: Specifies that any EID prefix that is more specific than the EID prefix configured is accepted and tracked. FiaB(config-router-lisp-site)# eid-record instance-id 4097 0.0.0.0/0 accept-more-specifics eid-record instance-id instance-id any-mac Accepts registrations, if any, for Layer 2 EID Example: records. FiaB(config-router-lisp-site)# eid-record instance-id 8188 any-mac exit-site Exits LISP site configuration mode. Example: FiaB(config-router-lisp-site)# exit-site ipv4 locator reachability exclude-default Configures the IPv4 locator address of the Example: LISP. FiaB(config-router-lisp)# ipv4 locator reachability exclude-default ipv4 source-locator interface-name Example: FiaB(config-router-lisp)# ipv4 source-locator Loopback0 Configures the IPv4 source locator address of the interface. exit-router-lisp Example: FiaB(config-router-lisp)# exit-router-lisp Exits LISP router-lisp configuration mode. Configuring a Fabric Edge Node Note You can perform the following configuration tasks only from Fabric Edge Node, and not from your controller. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1842 Software-Defined Access Wireless Configuring a Fabric Edge Node Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action configure terminal Example: FabricEdge# configure terminal Purpose Enters global configuration mode. router lisp Example: FabricEdge(config)# router lisp Enters LISP configuration mode. locator-table default Example: FabricEdge(config-router-lisp)# locator-table default Associates a default VRF table through which the routing locator address space is reachable to a router LISP instantiation. locator-set rloc_loopback Example: FabricEdge(config-router-lisp)# locator-set rloc_loopback Specifies a named locator set and enters LISP locator-set configuration mode. ipv4-interface interface-num priority priority Configures the IPv4 address of the interface weight weight as locator. Example: FabricEdge(config-router-lisp-locator-set)# IPv4-interface Loopback 0 priority 10 weight 10 exit-locator-set Exits LISP locator-set configuration mode. Example: FabricEdge(config-router-lisp-locator-set)# exit-locator-set exit-router-lisp Example: FabricEdge(config-router-lisp-)# exit-router-lisp Exits LISP router-lisp configuration mode. interface vlan interface-num Configures an interface. Example: FabricEdge(config)# interface Vlan 2045 description description Example: FabricEdge(config-if)# description Configured from Cisco DNA-Center Specifies a description text for the interface. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1843 Configuring a Fabric Edge Node Software-Defined Access Wireless Step 10 Step 11 Step 12 Step 13 Step 14 Step 15 Step 16 Step 17 Step 18 Step 19 Command or Action mac-address mac-address Example: FabricEdge(config-if)# mac-address 0000.0c9f.f85c Purpose Sets an interface MAC address manually. ip address ip-address mask Example: FabricEdge(config-if)# ip address 192.168.1.1 255.255.255.252 Configures an IP address for the interface. ip helper-address ip-address Example: Specifies a destination address for UDP broadcasts. FabricEdge(config-if)# ip helper-address 9.9.9.9 no ip redirects Disables sending of ICMP redirect messages. Example: FabricEdge(config-if)# no ip redirects ip route-cache same-interface Example: Enables fast-switching cache for outgoing packets on the same interface. FabricEdge(config-if)# ip route-cache same-interface no lisp mobility liveness test Example: Removes liveness test on dynamic EID discovered on this interface. FabricEdge(config-if)# no lisp mobility liveness test lisp mobility dynamic-eid-name Example: FabricEdge(config-if)# lisp mobility 40_40_0_0-INFRA_VN-IPV4 Allows EID mobility on the interface. exit Example: FabricEdge(config-if)# exit Exits from interface configuration mode. router lisp Example: FabricEdge(config)# router lisp Enters LISP configuration mode. locator-set locator-set-name Example: FabricEdge(config-router-lisp)# locator-set rloc_824ecb7 Specifies a locator set and enters LISP locator-set configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1844 Software-Defined Access Wireless Configuring a Fabric Edge Node Step 20 Step 21 Step 22 Step 23 Step 24 Step 25 Step 26 Step 27 Step 28 Command or Action Purpose exit-locator-set Exits LISP locator-set configuration mode. Example: FabricEdge(config-router-lisp-locator-set)# exit-locator-set service ipv4 Example: Enables Layer 3 network services for the IPv4 address family and enters service submode. FabricEdge(config-router-lisp)# service ipv4 use-petr ip-address Example: FabricEdge(config-lisp-srv-ipv4)# use-petr 5.5.5.5 Configures the loopback IP address of the Proxy Egress Tunnel Router (PETR). encapsulation vxlan Example: FabricEdge(config-lisp-srv-ipv4)# encapsulation vxlan Selects the encapsulation type as VXLAN for data packets. itr map-resolver map-resolver-address Example: Configures the map resolver address for sending map requests. FabricEdge(config-lisp-srv-ipv4)# itr map-resolver 5.5.5.5 etr map-server map-server-address key key-type authentication-key Configures the map server for ETR registration. Example: FabricEdge(config-lisp-srv-ipv4)# etr map-server 5.5.5.5 key 7 ######### etr map-server map-server-address proxy-reply authentication-key Example: FabricEdge(config-lisp-srv-ipv4)# etr map-server 5.5.5.5 proxy-reply Configures the locator address of the LISP map server and the authentication key that this router, acting as a LISP ETR, will use to register with the LISP mapping system. etr Example: Configures a LISP Egress Tunnel Router (ETR). FabricEdge(config-lisp-srv-ipv4)# etr sgt Example: Enable security group tag propagation in LISP encapsulated traffic. FabricEdge(config-lisp-srv-ipv4)# sgt Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1845 Configuring a Fabric Edge Node Software-Defined Access Wireless Step 29 Step 30 Step 31 Step 32 Step 33 Step 34 Step 35 Step 36 Step 37 Step 38 Command or Action Purpose no map-cache away-eids send-map-request Removes the address family-specific map Example: cache configuration. FabricEdge(config-lisp-srv-ipv4)# no map-cache away-eids send-map-request proxy-itr ip-address Example: FabricEdge(config-lisp-srv-ipv4)# proxy-itr 5.5.5.5 Enables the Proxy Ingress Tunnel Router (PITR) functionality and specifies the address to use when LISP encapsulating packets to LISP sites. exit-service-ipv4 Example: FabricEdge(config-lisp-srv-ipv4)# exit-service-ipv4 Exits LISP service-ipv4 configuration mode. service ethernet Selects the service type as Ethernet. Example: FabricEdge(config-router-lisp)# service ethernet itr map-resolver map-resolver-address Example: FabricEdge(config-lisp-srv-eth)# itr map-resolver 5.5.5.5 Configures the map-resolver address for sending map requests. itr Example: FabricEdge(config-lisp-srv-eth)# itr Enables the LISP ITR functionality. etr map-server map-server-address key key-type authentication-key Example: FabricEdge(config-lisp-srv-eth)# etr map-server 5.5.5.5 key 7 1234 Configures the map server for ETR registration. etr Example: FabricEdge(config-lisp-srv-eth)# etr Enables the LISP ETR functionality. exit-service-ethernet Example: FabricEdge(config-lisp-srv-eth)# exit-service-ethernet Exits LISP service-ethernet configuration mode. instance-id instance Example: Creates a LISP EID instance to group multiple services. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1846 Software-Defined Access Wireless Configuring a Fabric Edge Node Step 39 Step 40 Step 41 Step 42 Step 43 Step 44 Step 45 Step 46 Step 47 Command or Action FabricEdge(config-router-lisp)# instance-id 101 Purpose remote-rloc-probe on-route-change Example: FabricEdge(config-lisp-inst)# remote-rloc-probe on-route-change Configures the parameters for probing remote Routing locators (RLOCs). dynamic-eid dynamic-eid-name Example: FabricEdge(config-lisp-inst)# dynamic-eid 40_40_0_0-INFRA_VN-IPV4 Configures a dynamic EID and enters dynamic EID configuration mode. database-mapping eid locator-set rloc_loopback Configures the EID prefix and locator set for the dynamic EID. Example: FabricEdge(config-router-lisp-dynamic-eid)# database-mapping 40.40.0.0/16 locator-set rloc_loopback exit-dynamic-id Exits dynamic instance submode. Example: FabricEdge(config-router-lisp-dynamic-eid)# exit-instance-id service ipv4 Selects service type as IPv4. Example: FabricEdge(config-lisp-inst)# service ipv4 eid-table default Binds an EID table. Example: FabricEdge(config-lisp-inst-srv-ipv4)# eid-table default exit-service-ipv4 Exits LISP service-ipv4 configuration mode. Example: FabricEdge(config-lisp-inst-srv-ipv4)# exit-service-ipv4 exit-instance-id Example: FabricEdge(config-lisp-inst)# exit-instance-id Exits LISP instance-id configuration mode. service ipv4 Example: Selects service type as IPv4. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1847 Configuring a Fabric Edge Node Software-Defined Access Wireless Step 48 Step 49 Step 50 Step 51 Step 52 Step 53 Step 54 Step 55 Step 56 Command or Action Purpose FabricEdge(config-router-lisp)# service ipv4 map-cache away-eids map-request Example: FabricEdge(config-lisp-srv-ipv4)# map-cache 40.40.0.0/16 map-request Exports away table entries into the map cache, with the action set to send-map-request. exit-service-ipv4 Example: FabricEdge(config-lisp-srv-ipv4)# exit-service-ipv4 Exits LISP service-ipv4 configuration mode. instance-id instance Example: FabricEdge(config-router-lisp)# instance-id 8188 Creates a LISP EID instance to group multiple services. remote-rloc-probe on-route-change Example: FabricEdge(config-lisp-inst)# remote-rloc-probe on-route-change Configures parameters for probing remote RLOCs. service ethernet Example: Enables Layer 2 network services and enters service submode. FabricEdge(config-lisp-inst)# service ethernet eid-table vlan vlan-number Binds an EID table to VLAN. Example: FabricEdge(config-lisp-inst-srv-eth)# eid-table vlan 101 database-mapping maclocator-set rloc_loopbac Configures address family-specific local EID prefixes database. Example: FabricEdge(config-lisp-inst-srv-eth)# database-mapping mac locator-set rloc_loopbac exit-service-ethernet Example: Exits LISP service-ethernet configuration mode. FabricEdge(config-lisp-inst-srv-eth)# exit-service-ethernet exit-instance-id Example: Exits from LISP instance-id configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1848 Software-Defined Access Wireless Verifying Fabric Configuration Step 57 Step 58 Step 59 Command or Action FabricEdge(config-lisp-inst)# exit-instance-id Purpose ipv4 locator reachability minimum-mask-length length Configures the IPv4 locator address of the LISP. Example: FabricEdge(config-router-lisp)# ipv4 locator reachability minimum-mask-length 32 ipv4 source-locator interface-name Example: FabricEdge(config-router-lisp)# ipv4 source-locator Loopback0 Configures the IPv4 source locator address of the interface. exit-router-lisp Example: FabricEdge(config-router-lisp)# exit-router-lisp Exits LISP router-lisp configuration mode. Verifying Fabric Configuration Use the following commands to verify the fabric configuration. To verify the LISP configuration on a device, use the following command: FabricEdge# show running-config | section router lisp router lisp locator-table default locator-set default exit-locator-set ! locator-set rloc_loopback IPv4-interface Loopback0 priority 10 weight 10 exit-locator-set ! locator default-set rloc_loopback service ipv4 encapsulation vxlan itr map-resolver 21.21.21.21 itr etr map-server 21.21.21.21 key tasman etr map-server 21.21.21.21 proxy-reply etr use-petr 21.21.21.21 priority 1 weight 100 exit-service-ipv4 ! service ethernet itr map-resolver 5.5.5.5 itr map-resolver 21.21.21.21 itr etr map-server 21.21.21.21 key tasman etr map-server 21.21.21.21 proxy-reply Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1849 Verifying Fabric Configuration Software-Defined Access Wireless etr exit-service-ethernet ! instance-id 0 loc-reach-algorithm lsb-reports ignore dynamic-eid eid_10_56_25 database-mapping 10.56.25.0/24 locator-set rloc_loopback exit-dynamic-eid ! service ipv4 eid-table default database-mapping 26.26.26.26/32 locator-set rloc_loopback exit-service-ipv4 ! exit-instance-id ! instance-id 1 service ethernet eid-table vlan 25 flood arp-nd database-mapping mac locator-set rloc_loopback exit-service-ethernet ! exit-instance-id ! instance-id 101 service ipv4 exit-service-ipv4 ! exit-instance-id ! instance-id 8188 exit-instance-id ! loc-reach-algorithm lsb-reports ignore exit-router-lisp To verify the operational status of LISP as configured on a device, use the following command: FabricEdge# show ip lisp Information applicable to all EID instances: Router-lisp ID: 0 Locator table: default Ingress Tunnel Router (ITR): enabled Egress Tunnel Router (ETR): enabled Proxy-ITR Router (PITR): disabled Proxy-ETR Router (PETR): disabled NAT-traversal Router (NAT-RTR): disabled Mobility First-Hop Router: disabled Map Server (MS): disabled Map Resolver (MR): disabled Mr-use-petr: disabled Delegated Database Tree (DDT): disabled Publication-Subscription: enabled Publisher(s): *** NOT FOUND *** ITR Map-Resolver(s): 21.21.21.21 ETR Map-Server(s): 21.21.21.21 xTR-ID: 0xD89893A6-0x98749B2C-0x89810431-0x92F33C9C site-ID: unspecified ITR local RLOC (last resort): *** NOT FOUND *** ITR use proxy ETR RLOC(Encap IID): 21.21.21.21 ITR Solicit Map Request (SMR): accept and process Max SMRs per map-cache entry: 8 more specifics Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1850 Software-Defined Access Wireless Verifying Fabric Configuration Multiple SMR suppression time: 20 secs ETR accept mapping data: disabled, verify disabled ETR map-cache TTL: 1d00h Locator Status Algorithms: RLOC-probe algorithm: disabled RLOC-probe on route change: N/A (periodic probing disabled) RLOC-probe on member change: disabled LSB reports: ignore IPv4 RLOC minimum mask length: /0 IPv6 RLOC minimum mask length: /0 Map-cache: Map-cache limit: 32768 Map-cache activity check period: 60 secs Persistent map-cache: disabled Source locator configuration: GigabitEthernet1/0/1: 24.24.24.24 (Loopback0) Vlan25: 24.24.24.24 (Loopback0) Database: Dynamic database mapping limit: 25000 To verify the operational status of the map cache on a device configured as an ITR or PITR, use the following command: FabricEdge# show lisp instance-id iid ipv4 map-cache LISP IPv4 Mapping Cache for EID-table default (IID 0), 5 entries 0.0.0.0/0, uptime: 2w5d, expires: never, via static-send-map-request Encapsulating to proxy ETR 10.56.25.0/24, uptime: 2w0d, expires: never, via dynamic-EID, send-map-request Encapsulating to proxy ETR 10.56.25.25/32, uptime: 2w5d, expires: 23:10:06, via map-reply, complete Locator Uptime State Pri/Wgt Encap-IID 21.21.21.21 2w5d up 0/0 - 22.0.0.0/8, uptime: 2w5d, expires: 00:04:54, via map-reply, forward-native Encapsulating to proxy ETR 26.26.26.26/32, uptime: 09:48:33, expires: 14:11:26, via map-reply, self, complete Locator Uptime State Pri/Wgt Encap-IID 24.24.24.24 09:48:33 up, self 50/50 - To verify the operational status of the database mapping on a device configured as an ETR, use the following command: FabricEdge# show lisp instance-id iid ipv4 database LISP ETR IPv4 Mapping Database for EID-table default (IID 0), LSBs: 0x1 Entries total 3, no-route 0, inactive 0 10.56.25.27/32, dynamic-eid eid_10_56_25, skip reg, inherited from default locator-set rloc_loopback Uptime: 00:25:11, Last-change: 00:25:11 Domain-ID: unset Locator Pri/Wgt Source State 24.24.24.24 10/10 cfg-intf site-self, reachable 10.56.25.67/32, dynamic-eid eid_10_56_25, inherited from default locator-set rloc_loopback Uptime: 00:24:47, Last-change: 00:24:47 Domain-ID: unset Locator Pri/Wgt Source State Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1851 Verifying Fabric Configuration Software-Defined Access Wireless 24.24.24.24 10/10 cfg-intf site-self, reachable 26.26.26.26/32, locator-set rloc_loopback Uptime: 2w5d, Last-change: 00:50:36 Domain-ID: unset Locator Pri/Wgt Source State 24.24.24.24 10/10 cfg-intf site-self, reachable To verify the configured LISP sites on a LISP map server, use the following command: FabricEdge# show lisp instance-id iid ipv4 server LISP Site Registration Information * = Some locators are down or unreachable # = Some registrations are sourced by reliable transport Site Name eca site_uci Last Register never 04:52:53 04:07:09 03:21:16 04:52:53 03:47:04 2w0d never Up no yes# yes# yes# yes# yes# yes# no Who Last Registered -21.21.21.21:40875 27.27.27.27:24949 24.24.24.24:23672 21.21.21.21:40875 24.24.24.24:23672 27.27.27.27:24949 -- Inst ID 0 0 0 0 0 0 0 4097 EID Prefix 10.56.25.0/24 10.56.25.25/32 10.56.25.64/32 10.56.25.67/32 23.23.23.23/32 26.26.26.26/32 29.29.29.29/32 0.0.0.0/0 To verify the operational status of LISP sites, use the following command in FiaB node: FabricEdge# show lisp instance-id 1 ethernet server ================================================= Output for router lisp 0 instance-id 1 ================================================= LISP Site Registration Information ================================================= Output for router lisp 0 instance-id 1 ================================================= LISP Site Registration Information * = Some locators are down or unreachable # = Some registrations are sourced by reliable transport Site Name eca Last Register never 04:10:37 04:09:20 03:24:52 03:23:39 Up no yes# yes# yes# yes# Who Last Registered -27.27.27.27:24949 22.22.22.22:64083 24.24.24.24:23672 22.22.22.22:64083 Inst ID 1 1 1 1 1 EID Prefix any-mac 00b0.e19c.2578/48 00b0.e19c.fc40/48 dcce.c130.0b70/48 dcce.c130.9820/48 To verify the operational status of LISP sites, use the following command in FiaB node: FabricEdge# show lisp instance-id 0 ipv4 server LISP Site Registration Information * = Some locators are down or unreachable # = Some registrations are sourced by reliable transport Site Name Last Up Register Who Last Registered Inst ID EID Prefix Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1852 Software-Defined Access Wireless Verifying Fabric Configuration eca never no -- 0 10.56.25.0/24 6d18h yes# 21.21.21.21:40875 0 10.56.25.25/32 01:23:56 yes# 27.27.27.27:24949 0 10.56.25.64/32 00:24:40 yes# 24.24.24.24:23672 0 10.56.25.72/32 6d18h yes# 21.21.21.21:40875 0 23.23.23.23/32 6d17h yes# 24.24.24.24:23672 0 26.26.26.26/32 3w0d yes# 27.27.27.27:24949 0 29.29.29.29/32 To verify the operational status of LISP sites on IPv4 database, use the following command in fabric edge node: FabricEdge# show lisp instance-id 0 ipv4 database LISP ETR IPv4 Mapping Database for EID-table default (IID 0), LSBs: 0x1 Entries total 3, no-route 0, inactive 0 10.56.25.27/32, dynamic-eid eid_10_56_25, skip reg, inherited from default locator-set rloc_loopback Uptime: 00:25:54, Last-change: 00:25:54 Domain-ID: unset Locator Pri/Wgt Source State 24.24.24.24 10/10 cfg-intf site-self, reachable 10.56.25.72/32, dynamic-eid eid_10_56_25, inherited from default locator-set rloc_loopback Uptime: 00:25:25, Last-change: 00:25:25 Domain-ID: unset Locator Pri/Wgt Source State 24.24.24.24 10/10 cfg-intf site-self, reachable 26.26.26.26/32, locator-set rloc_loopback Uptime: 3w5d, Last-change: 6d17h Domain-ID: unset Locator Pri/Wgt Source State 24.24.24.24 10/10 cfg-intf site-self, reachable To verify the operational status of LISP sites on mac mapping database, use the following command on the FE node: FabricEdge# show lisp instance-id 1 ethernet database LISP ETR MAC Mapping Database for EID-table Vlan 25 (IID 1), LSBs: 0x1 Entries total 2, no-route 0, inactive 0 cc98.911b.73f1/48, dynamic-eid Auto-L2-group-1, skip reg, inherited from default locator-set rloc_loopback Uptime: 00:00:49, Last-change: 00:00:49 Domain-ID: unset Locator Pri/Wgt Source State 24.24.24.24 10/10 cfg-intf site-self, reachable dcce.c130.0b70/48, dynamic-eid Auto-L2-group-1, inherited from default locator-set rloc_loopback Uptime: 00:00:50, Last-change: 00:00:50 Domain-ID: unset Locator Pri/Wgt Source State 24.24.24.24 10/10 cfg-intf site-self, reachable Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1853 Verifying Fabric Configuration Software-Defined Access Wireless Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1854 X V I PA R T VLAN · VLANs, on page 1857 · VLAN Groups, on page 1867 1 6 9 C H A P T E R VLANs · Information About VLANs, on page 1857 · How to Configure VLANs, on page 1861 · Monitoring VLANs, on page 1865 Information About VLANs Logical Networks A VLAN is a switched network that is logically segmented by function, project team, or application, without regard to the physical locations of the users. VLANs have the same attributes as physical LANs, but you can group end stations even if they are not physically located on the same LAN segment. Any controller port can belong to a VLAN, and unicast, broadcast, and multicast packets are forwarded and flooded only to end stations in the VLAN. Each VLAN is considered a logical network, and packets destined for stations that do not belong to the VLAN must be forwarded through a router or a controller supporting fallback bridging. Because a VLAN is considered a separate logical network, it contains its own bridge Management Information Base (MIB) information. VLANs are often associated with IP subnet. For example, all the end stations in a particular IP subnet belong to the same VLAN. Interface VLAN membership on the controller is assigned manually on an interface-by-interface basis. When you assign controller interfaces to VLANs by using this method, it is known as interface-based, or static, VLAN membership. Supported VLANs The controller supports VLANs in VTP client, server, and transparent modes. VLANs are identified by a number from 1 to 4094. VLAN 1 is the default VLAN and is created during system initialization. All of the VLANs except 1002 to 1005 are available for user configuration. VLAN Port Membership Modes You configure a port to belong to a VLAN by assigning a membership mode that specifies the kind of traffic the port carries and the number of VLANs to which it can belong. When a port belongs to a VLAN, the controller learns and manages the addresses associated with the port on a per-VLAN basis. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1857 VLAN Configuration Files VLAN Table 136: Port Membership Modes and Characteristics Membership Mode Static-access Trunk IEEE 802.1Q) : · IEEE 802.1Q-- Industry-standard trunking encapsulation. VLAN Membership Characteristics VTP Characteristics A static-access port can belong to one VLAN and is manually assigned to that VLAN. VTP is not required. If you do not want VTP to globally propagate information, set the VTP mode to transparent. To participate in VTP, there must be at least one trunk port on the controller connected to a trunk port of a second controller. A trunk port is a member of all VTP is recommended but not VLANs by default, including required. VTP maintains VLAN extended-range VLANs, but configuration consistency by membership can be limited by managing the addition, deletion, configuring the allowed-VLAN list. and renaming of VLANs on a network-wide basis. VTP exchanges VLAN configuration messages with other controller over trunk links. Note If a client VLAN has two subnets, a primary subnet and a secondary subnet, the static IP address is not supported on the secondary subnet. Consider the following SVI configuration example: interface VlanX ip address a.b.c.254 255.255.255.0 secondary ip address a.d.e.254 255.255.255.0 In this scenario, you can't allocate the secondary subnet for clients with static IP addresses. VLAN Configuration Files Configurations for VLAN IDs 1 to 1005 are written to the vlan.dat file (VLAN database), and you can display them by entering the show vlan privileged EXEC command. The vlan.dat file is stored in flash memory. If the VTP mode is transparent, they are also saved in the controller running configuration file. You use the interface configuration mode to define the port membership mode and to add and remove ports from VLANs. The results of these commands are written to the running-configuration file, and you can display the file by entering the show running-config privileged EXEC command. When you save VLAN and VTP information (including extended-range VLAN configuration information) in the startup configuration file and reboot the controller, the controller configuration is selected as follows: · If the VTP mode is transparent in the startup configuration, and the VLAN database and the VTP domain name from the VLAN database matches that in the startup configuration file, the VLAN database is ignored (cleared), and the VTP and VLAN configurations in the startup configuration file are used. The VLAN database revision number remains unchanged in the VLAN database. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1858 VLAN Normal-Range VLAN Configuration Guidelines · If the VTP mode or domain name in the startup configuration does not match the VLAN database, the domain name and VTP mode and configuration for the VLAN IDs 1 to 1005 use the VLAN database information. · In VTP versions 1 and 2, if VTP mode is server, the domain name and VLAN configuration for VLAN IDs 1 to 1005 use the VLAN database information. VTP version 3 also supports VLANs 1006 to 4094. Note Ensure that you delete the vlan.dat file along with the configuration files before you reset the switch configuration using write erase command. This ensures that the switch reboots correctly on a reset. Normal-Range VLAN Configuration Guidelines Follow these guidelines when creating and modifying normal-range VLANs in your network: · Normal-range VLANs are identified with a number between 1 and 1001. · VLAN configurations for VLANs 1 to 1005 are always saved in the VLAN database. If the VTP mode is transparent, VTP and VLAN configurations are also saved in the running configuration file. · If the controller is in VTP server or VTP transparent mode, you can add, modify or remove configurations for VLANs 2 to 1001 in the VLAN database. (VLAN IDs 1 and 1002 to 1005 are automatically created and cannot be removed.) · Extended-range VLANs created in VTP transparent mode are not saved in the VLAN database and are not propagated. VTP version 3 supports extended range VLAN (VLANs 1006 to 4094) database propagation in VTP server mode. If clients are unable to connect to the controller due to a VLAN failure, try one of the following options: · Configure ip4 dhcp required in the policy profile forcing the client to initiate a DHCP request. · Configure the RADIUS server to send VLAN group (having the client's static IP VLAN) information allowing the client to use static IP. · Configure aaa-override vlan fallback under the policy profile forcing the controller to check for the client's static IP VLAN in other VLAN groups as well. The client can join the network if the client's static IP VLAN is part of the configured VLAN group under the policy profile. Extended-Range VLAN Configuration Guidelines Extended-range VLANs are VLANs with IDs from 1006 to 4094. Follow these guidelines when creating extended-range VLANs: · VLAN IDs in the extended range are not saved in the VLAN database and are not recognized by VTP unless the device is running VTP version 3. · You cannot include extended-range VLANs in the pruning eligible range. · For VTP version 1 or 2, you can set the VTP mode to transparent in global configuration mode. You should save this configuration to the startup configuration so that the device boots up in VTP transparent Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1859 Prerequisites for VLANs VLAN mode. Otherwise, you lose the extended-range VLAN configuration if the device resets. If you create extended-range VLANs in VTP version 3, you cannot convert to VTP version 1 or 2. Prerequisites for VLANs The following are prerequisites and considerations for configuring VLANs: · To configure VLAN through the Web UI, you must change the number of available Virtual Terminal (VTY) sessions to 50. Web UI uses VTY lines for processing HTTP requests. At times, when multiple connections are open, the default VTY lines of 15 set by the device gets exhausted. Therefore, you must change the VTY lines to 50 before using the Web UI. Note To increase the VTY lines in a device, run the following command in the configuration mode: Device# configure terminal Device(config)# service tcp-keepalives in Device(config)# service tcp-keepalives out Device# configure terminal Device(config)# line vty 16-50 Note The maximum number of SSH VTY sessions supported on the standby controller is eight. · Before you create VLANs, you must decide whether to use VLAN Trunking Protocol (VTP) to maintain global VLAN configuration for your network. · Before adding a VLAN to a VLAN group, you should first create it on the device. Restrictions for VLANs The following are restrictions for VLANs: · You cannot delete a wireless management interface, if the associated VLAN interface is already deleted. To avoid this scenario, you should delete the wireless management interface before deleting the VLAN interface. · The device supports IEEE 802.1Q trunking methods for sending VLAN traffic over Ethernet ports. · When client VLAN is not configured for a policy profile, AP native VLAN is used. · The behavior of VLAN 1 changes depending on the AP mode. These scenarios are described below: · Local mode AP: If you use vlan-name, clients are assigned to VLAN 1. However, if you use vlan-id 1, clients are assigned to the wireless management interface. · FlexConnect mode AP: If you use vlan-name, clients are assigned to VLAN 1. However, if you use vlan-id 1, clients are assigned to the native VLAN defined in the flex profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1860 VLAN How to Configure VLANs By default, the policy profile assigns vlan-id 1 so that clients can use the wireless management VLAN. · You cannot use the same VLAN on the same SSID for local switching and central switching. How to Configure VLANs How to Configure Normal-Range VLANs You can set these parameters when you create a new normal-range VLAN or modify an existing VLAN in the VLAN database: · VLAN ID · VLAN name · VLAN type · Ethernet · TrBRF or TrCRF · VLAN state (active or suspended) · Parent VLAN number for TrCRF VLANs · VLAN number to use when translating from one VLAN type to another You can cause inconsistency in the VLAN database if you attempt to manually delete the vlan.dat file. If you want to modify the VLAN configuration, follow the procedures in this section. Creating or Modifying an Ethernet VLAN Before you begin With VTP version 1 and 2, if the controller is in VTP transparent mode, you can assign VLAN IDs greater than 1006, but they are not added to the VLAN database. The controller supports only Ethernet interfaces. Procedure Step 1 Command or Action vlan vlan-id Example: Device(config)# vlan 20 Purpose Enters a VLAN ID, and enters VLAN configuration mode. Enter a new VLAN ID to create a VLAN, or enter an existing VLAN ID to modify that VLAN. Note The available VLAN ID range for this command is 1 to 4094. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1861 Assigning Static-Access Ports to a VLAN (GUI) VLAN Step 2 Step 3 Command or Action name vlan-name Example: Device(config-vlan)# name test20 media { ethernet | fd-net | trn-net } Example: Device(config-vlan)# media ethernet Purpose (Optional) Enters a name for the VLAN. If no name is entered for the VLAN, the default is to append the vlan-id value with leading zeros to the word VLAN. For example, VLAN0004 is a default VLAN name for VLAN 4. Configures the VLAN media type. Step 4 show vlan {name vlan-name | id vlan-id} Example: Device# show vlan name test20 id 20 Verifies your entries. Assigning Static-Access Ports to a VLAN (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Layer2 > VLAN > VLAN Click the VLAN tab. To assign Port Members, click the interfaces that are to be included as port members from the Available list and click on the arrow to move it to the Associated list. Click Update & Apply to Device. Assigning Static-Access Ports to a VLAN You can assign a static-access port to a VLAN without having VTP globally propagate VLAN configuration information by disabling VTP (VTP transparent mode). For more information on static-access ports, see VLAN Port Membership Modes. If you assign an interface to a VLAN that does not exist, the new VLAN is created. Procedure Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode Device# configure terminal Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1862 VLAN How to Configure Extended-Range VLANs Step 2 Command or Action interface interface-id Example: Device(config)# interface gigabitethernet2/0/1 Purpose Enters the interface to be added to the VLAN. Step 3 switchport mode access Example: Defines the VLAN membership mode for the port (Layer 2 access port). Device(config-if)# switchport mode access Step 4 switchport access vlan vlan-id Example: Assigns the port to a VLAN. Valid VLAN IDs are 1 to 4094. Device(config-if)# switchport access vlan 2 Step 5 end Example: Device(config-if)# end Returns to privileged EXEC mode. Step 6 show running-config interface interface-id Verifies the VLAN membership mode of the Example: interface. Device# copy running-config startup-config Step 7 show interfaces interface-id switchport Example: Device# show interfaces gigabitethernet2/0/1 Verifies your entries in the Administrative Mode and the Access Mode VLAN fields of the display. How to Configure Extended-Range VLANs Extended-range VLANs enable service providers to extend their infrastructure to a greater number of customers. The extended-range VLAN IDs are allowed for any switchport commands that allow VLAN IDs. With VTP version 1 or 2, extended-range VLAN configurations are not stored in the VLAN database, but because VTP mode is transparent, they are stored in the controller running configuration file, and you can Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1863 Creating an Extended-Range VLAN (GUI) VLAN save the configuration in the startup configuration file. Extended-range VLANs created in VTP version 3 are stored in the VLAN database. Creating an Extended-Range VLAN (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Layer2 > VLAN. In the VLAN page, click ADD. Enter the extended range VLAN ID in the VLAN ID field. The extended range is between range is 1006 and 4094. Enter a VLAN name in the Name field. Save the configuration. Creating an Extended-Range VLAN Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 vlan vlan-id Example: Device(config)# vlan 2000 Step 3 show vlan id vlan-id Example: Device# show vlan id 2000 Purpose Enters global configuration mode. Enters an extended-range VLAN ID and enters VLAN configuration mode. The range is 1006 to 4094. Verifies that the VLAN has been created. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1864 VLAN Monitoring VLANs Monitoring VLANs Table 137: Privileged EXEC show Commands Command Purpose show interfaces [vlan vlan-id] Displays characteristics for all interfaces or for the specified VLAN configured on the controller. show vlan [ access-map name | Displays parameters for all VLANs or the specified VLAN on the brief | group |id vlan-id | ifindex controller. The following command options are available: | mtu | name name | summary ] · brief--Displays VTP VLAN status in brief. · group--Displays the VLAN group with its name and the connected VLANs that are available. · id--Displays VTP VLAN status by identification number. · ifindex--Displays SNMP ifIndex. · mtu--Displays VLAN MTU information. · name--Displays the VTP VLAN information by specified name. · summary--Displays a summary of VLAN information. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1865 Monitoring VLANs VLAN Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1866 1 7 0 C H A P T E R VLAN Groups · Information About VLAN Groups, on page 1867 · Prerequisites for VLAN Groups, on page 1868 · Restrictions for VLAN Groups, on page 1868 · Creating a VLAN Group (GUI), on page 1868 · Creating a VLAN Group (CLI), on page 1869 · Adding a VLAN Group to Policy Profile (GUI), on page 1869 · Adding a VLAN Group to a Policy Profile, on page 1870 · Viewing the VLANs in a VLAN Group, on page 1870 · VLAN Group Support for DHCP and Static IP Clients, on page 1871 Information About VLAN Groups Whenever a client connects to a wireless network (WLAN), the client is placed in a VLAN that is associated with the policy profile mapped to the WLAN. In a large venue, such as an auditorium, a stadium, or a conference room where there are numerous wireless clients, having only a single WLAN to accommodate many clients might be a challenge. The VLAN group feature uses a single policy profile that can support multiple VLANs. The clients can get assigned to one of the configured VLANs. This feature maps a policy profile to a single VLAN or multiple VLANs using the VLAN groups. When a wireless client associates to the WLAN, the VLAN is derived by an algorithm based on the MAC address of the wireless client. A VLAN is assigned to the client and the client gets the IP address from the assigned VLAN. The system marks VLAN as Dirty for 30 minutes when the clients are unable to receive IP addresses using DHCP. The system might not clear the Dirty flag from the VLAN even after 30 minutes for a VLAN group. After 30 minutes, when the VLAN is marked non-dirty, new clients in the IP Learn state can get assigned with IP addresses from the VLAN if free IPs are available in the pool and DHCP scope is defined correctly. This is the expected behavior because the timestamp of each interface has to be checked to see if it is greater than 30 minutes, due to which there is a lag of 5 minutes for the global timer to expire. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1867 Prerequisites for VLAN Groups VLAN Note The Controller marks the VLAN interface as Dirty when three or more clients fail to receive IP addresses through DHCP. The VLAN interface is deemed Dirty using the Non-Aggressive method, which involves counting one failure per association per client that surpasses the predefined IP_LEARN_TIMEOUT duration of 120 seconds. If a client sends a new association request before the IP_LEARN_TIMEOUT elapses, it will not be considered a failed client. In Non-Aggressive method, each client gets a unique hash value derived from its MAC address. This approach ensures that clients belonging to the same vendor, which may differ only by a few bits, do not mistakenly trigger the Dirty marking of a VLAN. Prerequisites for VLAN Groups · A VLAN should be present in the device for it to be added to the VLAN group. Restrictions for VLAN Groups · If the number of VLANs in a VLAN group exceeds 32, the mobility functionality might not work as expected and Layer 2 multicast might break for some VLANs. Therefore, it is the responsibility of network administrators to configure a feasible number of VLANs in a VLAN group. For the VLAN Groups feature to work as expected, the VLANs mapped in a group must be present in the controller. · The VLAN Groups feature works for access points in local mode. · The VLAN Groups feature works only in central switching mode and it cannot be used in FlexConnect local switching mode. · ARP Broadcast feature is not supported on VLAN groups. · VLAN group Multicast with VLAN group is only supported in local mode AP. Multicast VLAN is required when VLAN group is configured and uses multicast traffic. · While you configure VLAN groups with multiple VLANs and each VLAN is used by a different subnet, clients having static IP addresses might be assigned to a wrong VLAN if SVIs are not present on the controller. Hence, for every VLAN that belongs to the VLAN group, ensure that you configure an SVI interface with a valid IP address. Creating a VLAN Group (GUI) Procedure Step 1 Step 2 Choose Configuration > Layer2 > VLAN On the VLAN > VLAN page, click Add. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1868 VLAN Creating a VLAN Group (CLI) Step 3 Step 4 Step 5 Enter the VLAN ID in the VLAN ID field. The valid range is between 2 and 4094. Enter the VLAN name in the Name field. Configure the other parameters if required. Click Update & Apply to Device. Creating a VLAN Group (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 vlan group WORD vlan-list vlan-ID Example: Device(config)#vlan group vlangrp1 vlan-list 91-95 Step 3 end Example: Device(config)#end Purpose Enters global configuration mode. Creates a VLAN group with the given group name (vlangrp1) and adds all the VLANs listed in the command. The VLAN list ranges from 1 to 4096 and the maximum number of VLANs supported in a group is 64. Exits the global configuration mode and returns to privileged EXEC mode. Alternatively, press CTRL-Z to exit the global configuration mode. Adding a VLAN Group to Policy Profile (GUI) Policy profile broadly consists of network and switching policies. Policy profile is a reusable entity across tags. Anything that is a policy for the client that is applied on the AP or controller is moved to the policy profile. For example, VLAN, ACL, QOS, Session timeout, Idle timeout, AVC profile, Bonjour profile, Local profiling, Device classification, BSSID QoS, etc. However, all wireless related security attributes and features on the WLAN are grouped under the WLAN profile. Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Tags & Profiles > Policy. On thePolicy Profile page, click on a policy profile name. Click Access Policies tab. Under VLAN section, use the VLAN/VLAN Group drop-down list to select a VLAN or VLAN Group. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1869 Adding a VLAN Group to a Policy Profile VLAN Step 5 Click Update & Apply to Device. Adding a VLAN Group to a Policy Profile Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy wlan-policy-profile-name Configures the WLAN policy profile. Example: Device(config)# wireless profile policy my-wlan-policy Step 3 vlan vlan-group1 Example: Device(config-wireless-policy)# vlan myvlan-group Maps the VLAN group to the WLAN by entering the group name. Step 4 end Example: Device(config-wlan)# end Exits global configuration mode and returns to privileged EXEC mode. Viewing the VLANs in a VLAN Group Command Description show vlan group Displays the list of VLAN groups with name and the VLANs that are configured. show vlan group group-name group_name Displays the specified VLAN group details. show wireless client mac-address client-mac-addr Displays the VLAN group assigned to the client. detail show wireless vlan details Displays VLAN details. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1870 VLAN VLAN Group Support for DHCP and Static IP Clients VLAN Group Support for DHCP and Static IP Clients When a static IP client joins a VLAN group, the controller adds it to a VLAN based on VLAN computation logic. If the client's static IP address isn't part of the VLAN's IP list, the client fails to get internet access, even if the client is authenticated and authorized. The VLAN Group to Support DHCP and Static IP Clients feature aims to handle the network access of such clients. This feature only supports IPv4 clients and is enabled by default. However, ensure that the ipv4 dhcp required command is not configured on the wireless policy profile, because this disables the feature, causing the client to be stuck in the IP learn state. Prerequisites · Ensure that a switch VLAN interface (SVI) is configured with the IP address. Restrictions · FlexConnect local switching and FlexConnect local authentication are not supported. Only Local mode, FlexConnect central switching, and FlexConnect central authentication are supported. · IPv6 is not supported. · The peer controller cannot have a VLAN group in the policy profile, because a VLAN group with static IP mobility is not supported. Supported Features Table 138: Supported Features Feature Support Guest Anchor Yes Mobility Yes RLAN Yes SVI Yes Ensure that you configure SVI with an IP address in the same subnet as that of the client's IP address. IRCM support: Guest AireOS as anchor and Cisco Yes Catalyst 9800 controller as foreign IRCM support : Guest AireOS as foreign and Cisco Yes Catalyst 9800 controller as anchor The client is excluded if there is no match for the SVI. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1871 Supported Features VLAN Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1872 PART XVII WLAN · WLANs, on page 1875 · WLAN Security, on page 1905 · Remote LANs, on page 1919 · RLAN External Module, on page 1937 · 802.11ax Per Virtual Access Point, on page 1939 · BSS Coloring, on page 1943 · DHCP for WLANs, on page 1951 · Aironet Extensions IE (CCX IE) , on page 1971 · Device Analytics, on page 1975 · Device Classifier Dynamic XML Support, on page 1981 · BSSID Counters, on page 1989 · Fastlane+, on page 1993 · Workgroup Bridges, on page 1997 · Peer-to-Peer Client Support, on page 2021 · Deny Wireless Client Session Establishment Using Calendar Profiles, on page 2023 · Ethernet over GRE , on page 2033 · Wireless Guest Access, on page 2051 · Wired Guest Access, on page 2081 · Express Wi-Fi by Facebook, on page 2101 · User Defined Network, on page 2111 · Hotspot 2.0, on page 2119 · Client Roaming Across Policy Profile, on page 2145 · Assisted Roaming, on page 2153 · 802.11r BSS Fast Transition, on page 2159 · 802.11v, on page 2175 · Virtual Routing and Forwarding, on page 2179 1 7 1 C H A P T E R WLANs · Information About WLANs, on page 1875 · Prerequisites for WLANs, on page 1878 · Restrictions for WLANs, on page 1878 · How to Configure WLANs, on page 1880 · Verifying WLAN Properties (CLI), on page 1902 · Verifying WLAN-VLAN Information for an AP, on page 1902 · Verifying a WLAN Radio Policy, on page 1903 Information About WLANs This feature enables you to control WLANs for lightweight access points. Each WLAN has a separate WLAN ID, a separate profile name, and a WLAN SSID. All access points can advertise up to 16 WLANs. However, you can create up to 4096 WLANs and then selectively advertise these WLANs (using profiles and tags) to different access points for better manageability. You can configure WLANs with different SSIDs or with the same SSID. An SSID identifies the specific wireless network that you want the device to access. Note The wireless client max-user-login concurrent command will work as intended even if the no configure max-user-identity response command is configured. Note We recommend that you configure the password encryption aes and the key config-key password-encrypt key commands to encrypt your password. Note From Cisco IOS XE Cupertino 17.7.1 release onwards, only 8 WLANs are broadcasted on 6-GHz band. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1875 Band Selection WLAN Note For C9105, C9115, and C9120 APs, when a new WLAN is pushed from the controller and if the existing WLAN functional parameters are changed, the other WLAN clients will disconnect and reconnect. Band Selection Band select enables client radios that are capable of dual-band (2.4 and 5-GHz) operations to move to a less congested 5-GHz access point. The 2.4-GHz band is often congested. Clients on this band typically experience interference from Bluetooth devices, microwave ovens, and cordless phones as well as co-channel interference from other access points because of the 802.11b/g limit of 3 nonoverlapping channels. To prevent these sources of interference and improve overall network performance, configure band selection on the device. Off-Channel Scanning Deferral A lightweight access point, in normal operational conditions, periodically goes off-channel and scans another channel. This is in order to perform RRM operations such as the following: · Transmitting and receiving Neighbor Discovery Protocol (NDP) packets with other APs. · Detecting rogue APs and clients. · Measuring noise and interference. During the off-channel period, which normally is about 70 milliseconds, the AP is unable to transmit or receive data on its serving channel. Therefore, there is a slight impact on its performance and some client transmissions might be dropped. While the AP is sending and receiving important data, it is possible to configure off-channel scanning deferral so that the AP does not go off-channel and its normal operation is not impacted. You can configure off-channel scanning deferral on a per-WLAN basis, per WMM UP class basis, with a specified time threshold in milliseconds. If the AP sends or receives, on a particular WLAN, a data frame marked with the given UP class within the specified threshold, the AP defers its next RRM off-channel scan. For example, by default, off-channel scanning deferral is enabled for UP classes 4, 5, and 6, with a time threshold of 100 millseconds. Therefore, when RRM is about to perform an off-channel scan, a data frame marked with UP 4, 5, or 6 is received within the last 100 milliseconds, RRM defers going off-channel. The AP radio does not go off-channel when a voice call sending and receiving audio samples is marked as UP class 6 for every active 20 milliseconds. Off-channel scanning deferral does come with a tradeoff. Off-channel scanning can impact throughput by 2 percent or more, depending on the configuration, traffic patterns, and so on. Throughput can be slightly improved if you enable off-channel scanning deferral for all traffic classes and increase the time threshold. However, by not going off-channel, RRM can fail to identify AP neighbors and rogues, resulting in negative impact to security, DCA, TPC, and 802.11k messages. DTIM Period In the 802.11 networks, lightweight access points broadcast a beacon at regular intervals, which coincides with the Delivery Traffic Indication Map (DTIM). After the access point broadcasts the beacon, it transmits any buffered broadcast and multicast frames based on the value set for the DTIM period. This feature allows power-saving clients to wake up at the appropriate time if they are expecting broadcast or multicast data. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1876 WLAN WLAN Radio Policy Typically, the DTIM value is set to 1 (to transmit broadcast and multicast frames after every beacon) or 2 (to transmit broadcast and multicast frames after every other beacon). For instance, if the beacon period of the 802.11 network is 100 ms and the DTIM value is set to 1, the access point transmits buffered broadcast and multicast frames for 10 times every second. If the beacon period is 100 ms and the DTIM value is set to 2, the access point transmits buffered broadcast and multicast frames for 5 times every second. Either of these settings are suitable for applications, including Voice Over IP (VoIP), that expect frequent broadcast and multicast frames. However, the DTIM value can be set as high as 255 (to transmit broadcast and multicast frames after every 255th beacon). The only recommended DTIM values are 1 and 2; higher DTIM values will likely cause communications problems. Note A beacon period, which is specified in milliseconds on the device, is converted internally by the software to 802.11 Time Units (TUs), where 1 TU = 1.024 milliseconds. Depending on the AP model, the actual beacon period may vary slightly; for example, a beacon period of 100 ms may in practice equate to 104.448 ms. WLAN Radio Policy The existing WLAN feature allows you to broadcast WLAN on a specified radio on all the applicable slots. With the WLAN Radio Policy feature, you can broadcast the WLAN on the corresponding slot. Note that this option is supported only on 5-GHz band. Restrictions for WLAN Radio Policy · WLAN is pushed to all the radios only if the following configuration is used: · WPA3 + AES cipher + 802.1x-SHA256 AKM · WPA3 + AES cipher + OWE AKM · WPA3 + AES cipher + SAE AKM · WPA3 + CCMP256 cipher + SUITEB192-1X AKM · WPA3 + GCMP256 cipher + SUITEB-1X AKM · WPA3 + GCMP128 cipher + SUITEB192-1X AKM Prerequisites for Configuring Cisco Client Extensions · The software supports CCX versions 1 through 5, which enables devices and their access points to communicate wirelessly with third-party client devices that support CCX. CCX support is enabled automatically for every WLAN on the device and cannot be disabled. However, you can configure Aironet information elements (IEs). · If Aironet IE support is enabled, the access point sends an Aironet IE 0x85 (which contains the access point name, load, number of associated clients, and so on) in the beacon and probe responses of this WLAN, and the device sends Aironet IEs 0x85 and 0x95 (which contains the management IP address Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1877 Peer-to-Peer Blocking WLAN of the device and the IP address of the access point) in the reassociation response if it receives Aironet IE 0x85 in the reassociation request. Peer-to-Peer Blocking Peer-to-peer blocking is applied to individual WLANs, and each client inherits the peer-to-peer blocking setting of the WLAN to which it is associated. Peer-to-Peer enables you to have more control over how traffic is directed. For example, you can choose to have traffic bridged locally within the device, dropped by the device, or forwarded to the upstream VLAN. Peer-to-peer blocking is supported for clients that are associated with local and central switching WLANs. Note Peer-to-peer blocking feature is VLAN-based. WLANs using the same VLAN has an impact, if Peer-to-peer blocking feature is enabled. Diagnostic Channel You can choose a diagnostic channel to troubleshoot why the client is having communication problems with a WLAN. You can test the client and access points to identify the difficulties that the client is experiencing and allow corrective measures to be taken to make the client operational on the network. You can use the device GUI or CLI to enable the diagnostic channel, and you can use the device diag-channel CLI to run the diagnostic tests. Note We recommend that you enable the diagnostic channel feature only for nonanchored SSIDs that use the management interface. CCX Diagnostic feature has been tested only with clients having Cisco ADU card Prerequisites for WLANs · You can associate up to 16 WLANs with each access point group and assign specific access points to each group. Each access point advertises only the enabled WLANs that belong to its access point group. The access point (AP) does not advertise disabled WLANs in its access point group or WLANs that belong to another group. · We recommend that you assign one set of VLANs for WLANs and a different set of VLANs for management interfaces to ensure that devices properly route VLAN traffic. Restrictions for WLANs · Do not configure PSK and CCKM in a WLAN, as this configuration is not supported and impacts client join flow. · Ensure that TKIP or AES ciphers are enabled with WPA1 configuration, else ISSU may break during upgrade process. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1878 WLAN Restrictions for WLANs · When you change the WLAN profile name, then FlexConnect APs (using AP-specific VLAN mapping) will become WLAN-specific. If FlexConnect Groups are configured, the VLAN mapping will become Group-specific. · Do not enable IEEE 802.1X Fast Transition on Flex Local Authentication enabled WLAN, as client association is not supported with Fast Transition 802.1X key management. · Peer-to-peer blocking does not apply to multicast traffic. · In FlexConnect, peer-to-peer blocking configuration cannot be applied only to a particular FlexConnect AP or a subset of APs. It is applied to all the FlexConnect APs that broadcast the SSID. · The WLAN name and SSID can have up to 32 characters. · WLAN and SSID names support only the following ASCII characters: · Numerals: 48 through 57 hex (0 to 9) · Alphabets (uppercase): 65 through 90 hex (A to Z) · Alphabets (lowercase): 97 through 122 hex (a to z) · ASCII space: 20 hex · Printable special characters: 21 through 2F, 3A through 40, and 5B through 60 hex, that is: ! " # $ %&'()*+,-./:;<=>?@[\]^_`{|}~ · WLAN name cannot be a keyword; for example, if you try to create a WLAN with the name as 's' by entering the wlan s command, it results in shutting down all WLANs because 's' is used as a keyword for shutdown. · You cannot map a WLAN to VLAN 0. Similarly, you cannot map a WLAN to VLANs 1002 to 1006. · Dual stack clients with a static-IPv4 address is not supported. · In a dual-stack with IPv4 and IPv6 configured in the Cisco 9800 controller, if an AP tries to join controller with IPv6 tunnel before its IPv4 tunnel gets cleaned, you would see a traceback and AP join will fail. · When creating a WLAN with the same SSID, you must create a unique profile name for each WLAN. · When multiple WLANs with the same SSID get assigned to the same AP radio, you must have a unique Layer 2 security policy so that clients can safely select between them. · The SSID that is sent as part of the user profile will work only if aaa override command is configured. · RADIUS server overwrite is not configured on a per WLAN basis, but rather on a per AAA server group basis. · Downloadable ACL (DACL) is not supported in the FlexConnect mode or the local mode. · You cannot mix open configuration models with CLI-based, GUI-based, or DNA Center-based configurations. However, if you decide to use multiple model types, they must remain independent of each other. For example, in open configuration models, you can only manage configurations that have been created using an open configuration model, not a CLI-based or GUI-based model. Configurations that are created using open configuration models cannot be modified using a GUI-based model, or CLI-based model, or any other model. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1879 How to Configure WLANs WLAN Caution Some clients might not be able to connect to WLANs properly if they detect the same SSID with multiple security policies. Use this WLAN feature with care. How to Configure WLANs WLAN Wizard A wireless local-area network (WLAN) is a group of devices that form a network based on radio transmissions rather than wired connections. The WLAN Wizard on the WebUI is a simplified workflow designed to help you quickly create a WLAN and setup some primary configurations for your specific deployment. The Wizard supports the following wireless deployment modes: · Local mode: In Local mode, the WLAN is broadcast in the campus locally. · Flex Connect mode: In FlexConnect mode, the WLAN is broadcast remotely across the WAN in a branch. · Guest CWA mode: In Guest CWA mode, the WLAN is created for guest access with Central Web Authentication (CWA). There are different authentication methods supported for each deployment mode. To configure a WLAN for your preferred wireless deployment mode using the WLAN wizard on the WebUI, go to Configuration > Wireless Setup > WLAN Wizard. You can also navigate to the WLAN Wizard by the following paths: · On the Toolbar, click on the Wireless Setup icon and select WLAN Wizard from the drop-down list. · On the left navigation pane, go to Configuration > Tags & Profiles > WLANs and click on WLAN Wizard on the top-right corner. On the WLAN Wizard page, select a wireless deployment mode for the WLAN to initiate steps for setting up the WLAN with profiles, authentication methods, tags, and APs and other configurations. Local Mode The WLAN is deployed in Local mode when the WLAN is present in an office setup with no branch offices. In local mode, an AP creates two CAPWAP tunnels to the controller. One is for management, the other is data traffic. This behavior is known as "centrally switched" because the data traffic is tunneled (bridged) from the AP to the controller where it is then routed by some routing device. Locally switched means the traffic is terminated at the local switch adjacent to the access point. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1880 WLAN Authentication Method Authentication Method To configure a WLAN for local mode, select the preferred authentication method from the left panel. The authentication method sets the method by which a client can access the WLAN and decides the level of security on the WLAN. The options are: · PSK: A Pre-Shared Key (PSK) is a unique key created for individuals or groups of users on the same SSID. A client will have to enter the PSK to be authenticated and allowed to access the WLAN. · Dot1x: The client must go through relevant EAP authentication model to start exchanging traffic in the WLAN. · Local Web Authentication: The controller intercepts htttp(s) traffic and redirects the client to the internal web page for authentication. · External Web Authentication: The controller intercepts htttp(s) traffic and redirects the client to the login page hosted on the external web server for authentication. · Central Web Authentication: The controller redirects all web traffic from the client to the ISE login page for authentication. WLAN Profile and Policy After selecting the Authentication method, click on WLAN on the left panel to enter the WLAN profile and policy details. The WLAN profile defines the properties of a WLAN such as Profile Name, Status, WLAN ID, L2 and L3 Security parameters, AAA Server associated with this SSID and other parameters that are specific to a particular WLAN. The policy profile defines the network policies and the switching policies for a client (with the exception of QoS), which constitute the AP policies as well. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 In the Network Name section, enter a WLAN profile name, which is a unique name for your wireless network. The name can be ASCII characters from 32 to 126, without leading and trailing spaces. Enter a valid SSID for the WLAN. A valid SSID can be up to 32 characters and can contain spaces. A valid SSID can be ASCII characters from 0 to 31, with leading and trailing spaces. This is the broadcast name for your WLAN. Enter the WLAN ID. In the WLAN Policy section, enter the Policy Profile name. The name can be ASCII characters from 32 to 126, without leading and trailing spaces. Select the VLAN to be associated with the Policy Profile from the drop-down list.. To select an existing Policy Profile for the WLAN, click on Select Existing and choose a Policy Profile from the drop-down list.. Authentication Configurations Set up the authentication configurations and filters for the WLAN depending on the method you have chosen. These include the keys, filters, ACLs, and parameter maps as applicable to the selected authentication method. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1881 Authentication Configurations WLAN Procedure Step 1 Step 2 Step 3 If you have selected PSK as the authentication method, configure the following: a) In the WLAN > Pre-Shared Key (PSK) section, select the PSK format. Choose between ASCII and Hexadecimal formats. b) From the PSK type drop-down list, choose if you want the key to be unencrypted or AES encrypted. c) In the Pre-Shared Key field, enter the pass key for the WLAN. If you have selected Dot1x as the authentication method, configure the following: a) In the WLAN > AAA tab, configure the AAA server list for the WLAN. b) Select any of the available AAA servers to add to the WLAN. c) To add a new AAA server to the list, click on Add New Server and enter the IP address and server-key. d) To use an already configured AAA server list, click on Use Existing and select the appropriate list from the drop-down. If you have selected Local Web Authentication as the authentication method, configure the following: a) In the WLAN > Parameter Map tab, configure the parameter map for the WLAN. A parameter map sets parameters that can be applied to subscriber sessions during authentication. 1. In the Global Configuration section, configure the global parameter map. 2. Enter an IPv4 or IPv6 address to configure a virtual IP address for redirecting the clients to the login page of the controller. 3. From the Trustpoint drop-down list, select the trustpoint for HTTPS login page. The trustpoint corresponds to the device certificate the controller will use in conjunction with the virtual IP and hostname. 4. In the WLAN Specific Configuration section, either create a new parameter map for the WLAN, or select an existing parameter map from the drop-down list. b) In the WLAN > Local Users tab, enter the username in the local database to establish a username-based authentication system. 1. Enter the user name to be saved. 2. From the Password Encryption drop-down list, choose if you want the password to be unencrypted or encrypted. 3. In the Password field, specify the password the user must enter to gain access to the switch. The password must be from 1 to 25 characters and can contain embedded spaces. 4. Click on the + sign to add the credentials to the database. Add as many user credentials as required. Step 4 If you have selected External Web Authentication as the authentication method, configure the following: a) In the WLAN > Parameter Map tab, configure the parameter map for the WLAN. 1. In the Global Configuration section, configure the global parameter map. 2. Enter an IPv4 or IPv6 address to configure the virtual IP address of the external web authentication login page to which the guest users are redirected. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1882 WLAN Tags 3. From the Trustpoint drop-down list, select the trustpoint for HTTPS login page. The trustpoint corresponds to the device certificate the controller will use in conjunction with the virtual IP and hostname. 4. In the WLAN Specific Configuration section, either create a new parameter map for the WLAN, or select an existing parameter map from the drop-down list. 5. To create a new parameter map, enter the parameter-map name. 6. In the Redirect URL for login field, enter the URL of the external server that will host the authentication page for login. 7. In the Portal IPV4 Address field, enter the IPv4 address of the external server to send redirects. If the external server uses an IPv6 address, in the Portal IPV6 Address field, enter the IPv6 address of the portal to send redirects. b) In the WLAN > ACL / URL Filter tab, configure the ACL rules and the URL filter list. 1. In the Pre Auth ACL section, enter the name of the ACL. 2. In the IP address field, enter the source IP address and the destination IP address. This will configure the ACL to permit packet transfer from and to the specified IP address. You can add as many IP addresses as required. 3. In the URL Filter section, enter a name for the URL Filter list that you are creating. 4. Use the slider to set the list action to Permit or Deny the URLs. 5. Specify the URLs in the URLs box. Enter every URL on a new line. Step 5 If you have selected Central Web Authentication as the authentication method, configure the following: a) In the WLAN > AAA/ACL tab, configure the AAA server list and ACL for the WLAN. b) In the AAA Configuration section, select any of the available AAA servers to add to the WLAN. This will be the server where the clients will get authenticated. c) To add a new AAA server to the list, click on Add New Server and enter the IP address and server-key. d) To use an already configured AAA server list, click on Use Existing and select the appropriate list from the drop-down. e) In the ACL List section, enter the name of the ACL. This ACL will contain the rules regarding URLs that can be accessed by the client and should match the name configured on the RADIUS server. Tags To configure tags on the WLAN, click on Tags from the left panel. A Tag's property is defined by the policies associated to it. This property is in turn inherited by an associated client/AP. There are various type of tags, each associated to different profiles. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1883 AP Provisioning WLAN Procedure Step 1 Step 2 Step 3 In the Site Configuration section, either enter a site tag to be added, or select an existing site tag from the drop-down list. You can add as many tags as required. In the local mode, the site tag contains the AP join profile only. In the Policy Tag section, either enter a policy tag to be added, or select an existing policy tag from the drop-down list. You can add as many tags as required. The policy tag constitutes mapping of the WLAN profile to the policy profile. The WLAN profile defines the wireless characteristics of the WLAN. The policy profile defines the network policies and the switching policies for the client. In the RF Tag section, either enter an RF tag to be added, or select an existing RF tag from the drop-down list. You can add as many tags as required. The RF tag contains the 2.4 GHz and 5 GHz RF profiles. AP Provisioning Once the Wireless network and RF characteristics are set up, access points can be added to the local site either using static AP MAC address assignment or by assigning already joined APs to a specific location. To add tags and associate APs to the WLAN, click on AP Provisioning from the left panel. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 The APs already discovered by the controller are listed in the Provision Joined APs tab. You can select the APs to be associated to the WLAN from this table. To add tags to the selected APs, select the appropriate Policy Tag, Site Tag, and RF Tag from the respective drop-down lists. Click on Add to apply the tags. To add APs manually, click on the Pre-provision APs tab. You can either add individual MAC addresses of the APs or upload a CSV file with the AP MAC addresses listed. The added APs will be listed in the table below. Select the APs to be associated to the WLAN from this table. To add tags to the selected APs, select the appropriate Policy Tag, Site Tag, and RF Tag from the respective drop-down lists. Click on Add to apply the tags. A table of all the APs and the tags added to them is displayed in the Selected APs tab. Click Apply. This will create a WLAN in local mode with the authentication method, authentication filters, tags, and APs configured on it. FlexConnect Mode FlexConnect is a wireless solution for branch office and remote office deployments. It enables you to configure and control access points (AP) in a branch or remote office from the corporate office through a wide area network (WAN) link without deploying a controller in each office. The FlexConnect access points can switch client data traffic and perform client authentication locally when their connection to the controller is lost. An Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1884 WLAN Authentication Method AP in Flex mode offers network survivability in the event of a loss of connection to the centralized wireless controller. Authentication Method To configure a WLAN for FlexConnect mode, select the preferred authentication method from the left panel. The authentication method sets the method by which a client can access the WLAN and decides the level of security on the WLAN. The options are: · Local Web Authentication: The controller intercepts htttp(s) traffic and redirects the client to the internal web page for authentication. · External Web Authentication: The controller intercepts htttp(s) traffic and redirects the client to the login page hosted on the external web server for authentication. · Central Web Authentication: The controller redirects all web traffic from the client to the ISE login page for authentication. WLAN Profile and Policy After selecting the Authentication method, click on WLAN on the left panel to enter the WLAN profile and policy details. The WLAN profile defines the properties of a WLAN such as Profile Name, Status, WLAN ID, L2 and L3 Security parameters, AAA Server associated with this SSID and other parameters that are specific to a particular WLAN. The policy profile defines the network policies and the switching policies for a client (with the exception of QoS), which constitute the AP policies as well. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 In the Network Name section, enter a WLAN profile name, which is a unique name for your wireless network. The name can be ASCII characters from 32 to 126, without leading and trailing spaces. Enter a valid SSID for the WLAN. A valid SSID can be up to 32 characters and can contain spaces. A valid SSID can be ASCII characters from 0 to 31, with leading and trailing spaces. This is the broadcast name for your WLAN. Enter the WLAN ID. In the WLAN Policy section, enter the Policy Profile name. The name can be ASCII characters from 32 to 126, without leading and trailing spaces. Select the VLAN to be associated with the Policy Profile from the drop-down list.. To select an existing Policy Profile for the WLAN, click on Select Existing and choose a Policy Profile from the drop-down list.. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1885 Authentication Configurations WLAN Authentication Configurations Set up the authentication configurations and filters for the WLAN depending on the method you have chosen. These include the keys, filters, ACLs, and parameter maps as applicable to the selected authentication method. Procedure Step 1 If you have selected Local Web Authentication as the authentication method, configure the following: a) In the WLAN > Parameter Map tab, configure the parameter map for the WLAN. A parameter map sets parameters that can be applied to subscriber sessions during authentication. 1. In the Global Configuration section, configure the global parameter map. 2. Enter an IPv4 or IPv6 address to configure a virtual IP address for redirecting the clients to the login page of the controller. 3. From the Trustpoint drop-down list, select the trustpoint for HTTPS login page. The trustpoint corresponds to the device certificate the controller will use in conjunction with the virtual IP and hostname. 4. In the WLAN Specific Configuration section, either create a new parameter map for the WLAN, or select an existing parameter map from the drop-down list. b) In the WLAN > Local Users / Flex tab, configure a Flex profile and enter the username in the local database to establish a username-based authentication system. 1. In the Flex Profile section, enter the name of the new flex profile and the native VLAN ID. 2. To use an already existing Flex profile, click on Select Existing to choose a profile from the drop-down list and enter the native VLAN ID. 3. In the Local Users section, enter the user name to be saved. 4. From the Password Encryption drop-down list, choose if you want the password to be unencrypted or encrypted. 5. In the Password field, specify the password the user must enter to gain access to the switch. The password must be from 1 to 25 characters and can contain embedded spaces. 6. Click on the + sign to add the credentials to the database. Add as many user credentials as required. Step 2 If you have selected External Web Authentication as the authentication method, configure the following: a) In the WLAN > Parameter Map tab, configure the parameter map for the WLAN. 1. In the Global Configuration section, configure the global parameter map. 2. Enter an IPv4 or IPv6 address to configure the virtual IP address of the external web authentication login page to which the guest users are redirected. 3. From the Trustpoint drop-down list, select the trustpoint for HTTPS login page. The trustpoint corresponds to the device certificate the controller will use in conjunction with the virtual IP and hostname. 4. In the WLAN Specific Configuration section, either create a new parameter map for the WLAN, or select an existing parameter map from the drop-down list. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1886 WLAN Tags Step 3 5. To create a new parameter map, enter the parameter-map name. 6. In the Redirect URL for login field, enter the URL of the external server that will host the authentication page for login. 7. In the Portal IPV4 Address field, enter the IPv4 address of the external server to send redirects. If the external server uses an IPv6 address, in the Portal IPV6 Address field, enter the IPv6 address of the portal to send redirects. b) In the WLAN > ACL / URL Filter tab, configure the ACL rules and the URL filter list. 1. In the Flex Profile section, enter the name of the new flex profile and the native VLAN ID. 2. To use an already existing Flex profile, click on Select Existing to choose a profile from the drop-down list and enter the native VLAN ID. 3. In the Pre Auth ACL section, enter the name of the ACL. 4. In the IP address field, enter the source IP address and the destination IP address. This will configure the ACL to permit packet transfer from and to the specified IP address. You can add as many IP addresses as required. 5. In the URL Filter section, enter a name for the URL Filter list that you are creating. 6. Click on Add to add the URLs. 7. Specify the URL to be added to the list and its preference. 8. Use the slider to set the list action to Permit or Deny the URLs. 9. Click Save. You can add as many URLs to the list as required. c) To add a new AAA server to the list, click on Add New Server and enter the IP address and server-key. d) To use an already configured AAA server list, click on Use Existing and select the appropriate list from the drop-down. If you have selected Central Web Authentication as the authentication method, configure the following: a) In the WLAN > AAA/ACL tab, configure the AAA server list and ACL for the WLAN. b) In the AAA Configuration section, select any of the available AAA servers to add to the WLAN. This will be the server where the clients will get authenticated. c) To add a new AAA server to the list, click on Add New Server and enter the IP address and server-key. d) To use an already configured AAA server list, click on Use Existing and select the appropriate list from the drop-down. e) In the Flex Profile section, enter the name of the new flex profile and the native VLAN ID. f) To use an already existing Flex profile, click on Select Existing to choose a profile from the drop-down list and enter the native VLAN ID. g) In the ACL List section, enter the name of the ACL. This ACL will contain the rules regarding URLs that can be accessed by the client and should match the name configured on the RADIUS server. Tags To configure tags on the WLAN, click on Tags from the left panel. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1887 AP Provisioning WLAN A Tag's property is defined by the policies associated to it. This property is in turn inherited by an associated client/AP. There are various type of tags, each associated to different profiles. Procedure Step 1 Step 2 Step 3 In the Site Configuration section, either enter a site tag to be added, or select an existing site tag from the drop-down list. You can add as many tags as required. In FlexConnect mode, the site tag contains the AP join profile and the Flex profile. In the Policy Tag section, either enter a policy tag to be added, or select an existing policy tag from the drop-down list. You can add as many tags as required. The policy tag constitutes mapping of the WLAN profile to the policy profile. The WLAN profile defines the wireless characteristics of the WLAN. The policy profile defines the network policies and the switching policies for the client. In the RF Tag section, either enter an RF tag to be added, or select an existing RF tag from the drop-down list. You can add as many tags as required. The RF tag contains the 2.4 GHz and 5 GHz RF profiles. AP Provisioning Once the Wireless network and RF characteristics are set up, access points can be added to the local site either using static AP MAC address assignment or by assigning already joined APs to a specific location. To add tags and associate APs to the WLAN, click on AP Provisioning from the left panel. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 The APs already discovered by the controller are listed in the Provision Joined APs tab. You can select the APs to be associated to the WLAN from this table. To add tags to the selected APs, select the appropriate Policy Tag, Site Tag, and RF Tag from the respective drop-down lists. Click on Add to apply the tags. To add APs manually, click on the Pre-provision APs tab. You can either add individual MAC addresses of the APs or upload a CSV file with the AP MAC addresses listed. The added APs will be listed in the table below. Select the APs to be associated to the WLAN from this table. To add tags to the selected APs, select the appropriate Policy Tag, Site Tag, and RF Tag from the respective drop-down lists. Click on Add to apply the tags. A table of all the APs and the tags added to them is displayed in the Selected APs tab. Click Apply. This will create a WLAN in FlexConnect mode with the authentication method, authentication filters, tags, and APs configured on it. Guest CWA Mode The Guest mode addresses the need to provide internet access to guests in a secure and accountable manner with Central Web Authentication as the security method. The implementation of a wireless guest network Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1888 WLAN Controller Type uses the enterprise's existing wireless and wired infrastructure to the maximum extent. This solution comprises of two controllers - a Guest Foreign and a Guest Anchor. Controller Type To configure a WLAN for Guest CWA mode, select the type of controller configuration you want to set up on the device from the left panel. The options are: · Foreign: A Foreign is a controller in the WLAN that exists in the enterprise. A client sends a connection request to a Foreign controller to join the WLAN. It is a dedicated guest WLAN or SSID and is implemented throughout the campus wireless network wherever guest access is required. The Foreign controller manages the anchor controllers. · Anchor: An Anchor is a controller or group of controllers in a WLAN that manage traffic within the network for a guest client. It provides internal security by forwarding the traffic from a guest client to a Cisco Wireless Controller in the demilitarized zone (DMZ) network. WLAN Profile and Policy After selecting the Authentication method, click on WLAN on the left panel to enter the WLAN profile and policy details. The WLAN profile defines the properties of a WLAN such as Profile Name, Status, WLAN ID, L2 and L3 Security parameters, AAA Server associated with this SSID and other parameters that are specific to a particular WLAN. The policy profile defines the network policies and the switching policies for a client (with the exception of QoS), which constitute the AP policies as well. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 In the Network Name section, enter a WLAN profile name, which is a unique name for your wireless network. The name can be ASCII characters from 32 to 126, without leading and trailing spaces. Enter a valid SSID for the WLAN. A valid SSID can be up to 32 characters and can contain spaces. A valid SSID can be ASCII characters from 0 to 31, with leading and trailing spaces. This is the broadcast name for your WLAN. Enter the WLAN ID. In the WLAN Policy section, enter the Policy Profile name. The name can be ASCII characters from 32 to 126, without leading and trailing spaces. Select the VLAN to be associated with the Policy Profile from the drop-down list.. To select an existing Policy Profile for the WLAN, click on Select Existing and choose a Policy Profile from the drop-down list.. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1889 Authentication Configurations WLAN Step 7 If you have selected Foreign, in the Mobility Anchors section, select the IP address of an available controller to assign it as the mobility anchor for the WLAN. This will extend the configurations on the Foreign controller onto the anchor controllers as well. Authentication Configurations For the Guest access mode, the authentication method is Central Web Authentication. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 In the WLAN > AAA/ACL tab, configure the AAA server list and ACL for the WLAN. In the AAA Configuration section, select any of the available AAA servers to add to the WLAN. This will be the server where the clients will get authenticated. To add a new AAA server to the list, click on Add New Server and enter the IP address and server-key. To use an already configured AAA server list, click on Use Existing and select the appropriate list from the drop-down. In the ACL List section, enter the name of the ACL. This ACL will contain the rules regarding URLs that can be accessed by the client and should match the name configured on the RADIUS server. Tags To configure tags on the WLAN, click on Tags from the left panel. A Tag's property is defined by the policies associated to it. This property is in turn inherited by an associated client/AP. There are various type of tags, each associated to different profiles. Procedure Step 1 Step 2 Step 3 In the Site Configuration section, either enter a site tag to be added, or select an existing site tag from the drop-down list. You can add as many tags as required. In the Policy Tag section, either enter a policy tag to be added, or select an existing policy tag from the drop-down list. You can add as many tags as required. The policy tag constitutes mapping of the WLAN profile to the policy profile. The WLAN profile defines the wireless characteristics of the WLAN. The policy profile defines the network policies and the switching policies for the client. In the RF Tag section, either enter an RF tag to be added, or select an existing RF tag from the drop-down list. You can add as many tags as required. The RF tag contains the 2.4 GHz and 5 GHz RF profiles. AP Provisioning Once the Wireless network and RF characteristics are set up, access points can be added to the local site either using static AP MAC address assignment or by assigning already joined APs to a specific location. If you have selected Foreign, click on AP Provisioning from the left panel to add tags and associate APs to the WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1890 WLAN Creating WLANs (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 The APs already discovered by the controller are listed in the Provision Joined APs tab. You can select the APs to be associated to the WLAN from this table. To add tags to the selected APs, select the appropriate Policy Tag, Site Tag, and RF Tag from the respective drop-down lists. Click on Add to apply the tags. To add APs manually, click on the Pre-provision APs tab. You can either add individual MAC addresses of the APs or upload a CSV file with the AP MAC addresses listed. The added APs will be listed in the table below. Select the APs to be associated to the WLAN from this table. To add tags to the selected APs, select the appropriate Policy Tag, Site Tag, and RF Tag from the respective drop-down lists. Click on Add to apply the tags. A table of all the APs and the tags added to them is displayed in the Selected APs tab. Click Apply. This will create a WLAN in Guest CWA mode with the authentication method, mobility anchors, authentication filters, tags, and APs configured on it. Creating WLANs (GUI) Procedure Step 1 Step 2 Step 3 In the Configuration > Tags & Profiles > WLANs page, click Add. The Add WLAN window is displayed. Under the General tab and Profile Name field, enter the name of the WLAN. The name can be ASCII characters from 32 to 126, without leading and trailing spaces. Click Save & Apply to Device. Creating WLANs (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wlan profile-name wlan-id [ssid] Purpose Enters global configuration mode. Specifies the WLAN name and ID: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1891 Deleting WLANs (GUI) WLAN Command or Action Example: Device(config)# wlan mywlan 34 mywlan-ssid Step 3 end Example: Device(config)# end Purpose · For the profile-name, enter the profile name. The range is from 1 to 32 alphanumeric characters. · For the wlan-id, enter the WLAN ID. The range is from 1 to 512. · For the ssid, enter the Service Set Identifier (SSID) for this WLAN. If the SSID is not specified, the WLAN profile name is set as the SSID. Note · You can create SSID using GUI or CLI. However, we recommend that you use CLI to create SSID. · By default, the WLAN is disabled. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Deleting WLANs (GUI) Procedure Step 1 Step 2 Step 3 In the Configuration > Tags & Profiles > WLANs page, check the checkbox adjacent to the WLAN you want to delete. To delete multiple WLANs, select multiple WLANs checkboxes. Click Delete. Click Yes on the confirmation window to delete the WLAN. Deleting WLANs Procedure Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1892 WLAN Searching WLANs (CLI) Step 2 Command or Action Device# configure terminal no wlan wlan-name wlan-id ssid Example: Device(config)# no wlan test2 Step 3 end Example: Device(config)# end Purpose Deletes the WLAN. The arguments are as follows: · The wlan-name is the WLAN profile name. · The wlan-id is the WLAN ID. · The ssid is the WLAN SSID name configured for the WLAN. Note If you delete a WLAN that is part of an AP group, the WLAN is removed from the AP group and from the AP's radio. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Searching WLANs (CLI) To verify the list of all WLANs configured on the controller, use the following show command: Device# show wlan summary Number of WLANs: 4 WLAN Profile Name SSID VLAN Status -------------------------------------------------------------------------------- 1 test1 test1-ssid 137 UP 3 test2 test2-ssid 136 UP 2 test3 test3-ssid 1 UP 45 test4 test4-ssid 1 DOWN To use wild cards and search for WLANs, use the following show command: Device# show wlan summary | include test-wlan-ssid 1 test-wlan test-wlan-ssid 137 UP Enabling WLANs (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Tags & Profiles > WLANs. On the WLANs page, click the WLAN name. In the Edit WLAN window, toggle the Status button to ENABLED. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1893 Enabling WLANs (CLI) WLAN Step 4 Click Update & Apply to Device. Enabling WLANs (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wlan profile-name Example: Device(config)# wlan test4 Step 3 no shutdown Example: Device(config-wlan)# no shutdown Step 4 end Example: Device(config-wlan)# end Purpose Enters global configuration mode. Enters WLAN configuration submode. The profile-name is the profile name of the configured WLAN. Enables the WLAN. Returns to privileged EXEC mode. Disabling WLANs (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Tags & Profiles > WLANs. In the WLANs window, click the WLAN name. In the Edit WLAN window, set the Status toggle button as DISABLED. Click Update & Apply to Device. Disabling WLANs (CLI) Procedure Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1894 WLAN Configuring General WLAN Properties (CLI) Step 2 Step 3 Step 4 Step 5 Command or Action Device# configure terminal wlan profile-name Example: Device(config)# wlan test4 shutdown Example: Device(config-wlan)# shutdown end Example: Device(config-wlan)# end show wlan summary Example: Device# show wlan summary Configuring General WLAN Properties (CLI) You can configure the following properties: · Media stream · Broadcast SSID · Radio Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wlan profile-name Example: Device(config)# wlan test4 Step 3 shutdown Example: Device(config-wlan)# shutdown Step 4 broadcast-ssid Example: Purpose Enters WLAN configuration submode. The profile-name is the profile name of the configured WLAN. Disables the WLAN. Returns to privileged EXEC mode. Displays the list of all WLANs configured on the device. You can search for the WLAN in the output. Purpose Enters global configuration mode. Enters WLAN configuration submode. The profile-name is the profile name of the configured WLAN. Disables the WLAN. Broadcasts the SSID for this WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1895 Configuring Advanced WLAN Properties (CLI) WLAN Step 5 Step 6 Step 7 Step 8 Command or Action Device(config-wlan)# broadcast-ssid dot11bg 11g Example: Device(config-wlan)# dot11bg 11g media-stream multicast-direct Example: Device(config-wlan)# media-stream multicast-direct no shutdown Example: Device(config-wlan)# no shutdown end Example: Device(config-wlan)# end Purpose Configures the WLAN radio policy for dot11 radios. Also see the section: Configuring a WLAN Radio Policy. Enables multicast VLANs on this WLAN. Enables the WLAN. Returns to privileged EXEC mode. Configuring Advanced WLAN Properties (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wlan profile-name Example: Device(config)# wlan test4 Step 3 chd Example: Device(config-wlan)# chd Step 4 ccx aironet-iesupport Example: Device(config-wlan)# ccx aironet-iesupport Purpose Enters global configuration mode. Enters WLAN configuration submode. The profile-name is the profile name of the configured WLAN. Enables coverage hole detection for this WLAN. Enables support for Aironet IEs for this WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1896 WLAN Configuring Advanced WLAN Properties (CLI) Step 5 Step 6 Step 7 Command or Action Purpose client association limit {clients-per-wlan |ap Sets the maximum number of clients, clients clients-per-ap-per-wlan per AP, or clients per AP radio that can be |radioclients-per-ap-radio--per-wlan} configured on a WLAN. Example: Device(config-wlan)# client association limit ap 400 ip access-group web acl-name Configures the IPv4 WLAN web ACL. The Example: variable acl-name specifies the user-defined IPv4 ACL name. Device(config-wlan)# ip access-group web test-acl-name peer-blocking [allow-private-group |drop Configures peer to peer blocking parameters. | forward-upstream] The keywords are as follows: Example: Device(config-wlan)# peer-blocking drop · allow-private-group--Enables peer-to-peer blocking on the Allow Private Group action. · drop--Enables peer-to-peer blocking on the drop action. · forward-upstream--No action is taken and forwards packets to the upstream. Note The forward-upstream option is not supported for Flex local switching. Traffic is dropped even if this option is configured. Also, peer to peer blocking for local switching SSIDs are available only for the clients on the same AP. Step 8 channel-scan {defer-priority {0-7} | defer-time {0 - 6000}} Example: Device(config-wlan)# channel-scan defer-priority 6 Step 9 end Example: Device(config-wlan)# end Sets the channel scan defer priority and defer time. The arguments are as follows: · defer-priority--Specifies the priority markings for packets that can defer off-channel scanning. The range is from 0 to 7. The default is 3. · defer-time--Deferral time in milliseconds. The range is from 0 to 6000. The default is 100. Returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1897 Configuring Advanced WLAN Properties (GUI) WLAN Configuring Advanced WLAN Properties (GUI) Before you begin Ensure that you have configured an AP Join Profile prior to configuring the primary and backup controllers. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Choose Configuration > Tags & Profiles > WLANs . Click Add. Under the Advanced tab, check the Coverage Hole Detection check box. Check the Aironet IE check box to enable Aironet IE on the WLAN. Check the Diagnostic Channel check box to enable diagnostic channel on the WLAN. From the P2P Blocking Action drop-down list, choose the required value. Set the Multicast Buffer toggle button as enabled or diabled. Check the Media Stream Multicast-Direct check box to enable the feature. In the Max Client Connections section, specify the maximumui number of client connections for the following: · In the Per WLAN field, enter a value. The valid range is between 0 and 10000. · In the Per AP Per WLAN field, enter a value. The valid range is between 0 and 400. · In the Per AP Radio Per WLAN field, enter a value. The valid range is between 0 and 200. In the 11v BSS Transition Support section, perform the following configuration tasks: a) Check the BSS Transition check box to enable 802.11v BSS Transition support. b) In the Disassociation Imminent field, enter a value. The valid range is between 0 and 3000. c) In the Optimized Roaming Disassociation Timer field, enter a value. The valid range is between 0 and 40. d) Select the check box to enable the following: · BSS Max Idle Service · BSS Max Idle Protected · Disassociation Imminent Service · Directed Multicast Service · Universal Admin · Load Balance · Band Select · IP Source Guard In the 11ax section, perform the following configuration tasks: a) Select the check box to enable the following: · Check the Enable 11ax checkbox to enable 802.11ax operation status on the WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1898 WLAN Configuring Advanced WLAN Properties (GUI) · Check the Downlink OFDMA and Uplink OFDMA check boxes to enable downlink and uplink connections that use OFDMA. Orthogonal Frequency Division Multiple Access (OFDMA) is a channel access mechanism that assures contention-free transmission to multiple clients in both the downlink (DL) and uplink (UL) within a respective single transmit opportunity. · Check the Downlink MU-MIMO and Uplink MU-MIMO check boxes to enable downlink and uplink connections that use MU-MIMO. With Multiuser MIMO (MU-MIMO), an AP can use its antenna resources to transmit multiple frames to different clients, all at the same time and over the same frequency spectrum. · Enable the target wake up time configuration on the WLAN by checking the BSS Target Wake Up Time checkbox. Target wake up time allows an AP to manage activity in the Wi-Fi network to minimize medium contention between stations, and to reduce the required amount of time that a station in the power-save mode needs to be awake. This is achieved by allocating stations to operate at non-overlapping times, and/or frequencies, and concentrate the frame exchanges in predefined service periods. · Check the Universal Admin check box to enable Universal Admin support for the WLAN. · Enable OKC on the WLAN by checking the OKC check box. Opportunistic Key Caching (OKC) allows the wireless client and the WLAN infrastructure to cache only one Pairwise Master Key (PMK) for the lifetime of the cli ent association with this WLAN, even when roaming between multiple APs. This is enabled by default. · Check the Load Balance check box to enable Aggressive Client Load Balancing. This allows lightweight access points to load balance wireless clients across access points. · Check the Band Select check box to enable band selection for the WLAN. Band selection enables client radios that are capable of dual-band (2.4 and 5-GHz) operations to move to a less congested 5-GHz access point. The 2.4-GHz band is often congested with interference from other electronic devices as well as co-channel interference from other access points. Band selection helps prevent these sources of interference and improve overall network performance. · Enable IP Source Guard on the WLAN by checking the IP Source Guard check box.IP Source Guard (IPSG) is a Layer 2 security feature that prevents the wireless controller from forwarding the packets with source IP addresses that are not known to it. b) From the WMM Policy drop-down list, choose the policy as Allowed, Disabled, or Required. By default, the WMM policy is Allowed.Wi-Fi Multimedia (WMM) is used to prioritize different types of traffic. · Disabled: Disables WMM on the WLAN. · Required: Requires client devices to use WMM. Devices that do not support WMM cannot join the WLAN. · Allowed: Devices that cannot support WMM can join the WLAN but will not benefit from the 802.11n rates. c) From the mDNS drop-down list, choose Bridging, Gateway, or Drop. Multicast DNS (mDNS) provides the ability to perform DNS-like operations on the local link in the absence of any conventional Unicast DNS server. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1899 Configuring WLAN Radio Policy (GUI) WLAN Step 12 Step 13 Step 14 Step 15 · Bridging: Packets with mDNS multicast IP and multicast mac will be sent on multicast CAPWAP tunnel. · Gateway: All ingress mDNS packets received from the wired network on a L3 interface (SVI or physical) would be intercepted by the Controller software and processed. · Drop: All ingress mDNS packets will be dropped. In the Off Channel Scanning Defer section, choose the appropriate Defer Priority values and then specify the required Scan Defer Time value in milliseconds. In the Assisted Roaming (11k) section, choose the appropriate status for the following: · Prediction Optimization · Neighbor List · Dual-Band Neighbor List In the DTIM Period (in beacon intervals) section, specify a value for 802.11a/n and 802.11b/g/n radios. The valid range is from 1 to 255. Click Apply to Device. Configuring WLAN Radio Policy (GUI) Procedure Step 1 Step 2 Step 3 Step 4 On the Configuration > Tags & Profiles > WLANs page, click Add to create WLANs. In the General tab, enter a Profile Name, which is a unique name of the your wireless network. The name can be ASCII charaters from 32 to 126, without leading and trailing spaces. Enter a valid SSID for the WLAN. A valid SSID can be up to 32 characters and can contain spaces. A valid SSID can be ASCII characters from 0 to 31, with leading and trailing spaces. This is the broadcast name for your WLAN. Enter the WLAN ID. The valid range for the different models are listed below: Model WLAN ID Range Cisco Catalyst 9800-80 Wireless Controller 1-4096 Cisco Catalyst 9800-CL Wireless Controller 1-4096 Cisco Catalyst 9800-40 Wireless Controller 1-4096 Cisco Catalyst 9800-L Wireless Controller 1-4096 Cisco Embedded Wireless Controller for an AP 1-16 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1900 WLAN Configuring a WLAN Radio Policy (CLI) Step 5 Step 6 Step 7 Step 8 Step 9 Set the WLAN Status to Enabled. To broadcast the SSID of the WLAN, set the status of Broadcast SSID to enabled. By default, this is disabled. In the Radio Policy section, enable the desired radio band for the WLAN. · 2.4ghz Configures the policy on the 2.4-GHz radio. · 5ghz Configures the policy on the 5-GHz radio. If you enable the 5ghz radio band, select the radio slot to broadcast the WLAN on. The options are slot 0, slot 1, and slot 2. You can select multiple slots for the WLAN. From the 802.11b/g Policy drop-down list, choose the radio policy from the following options: · 802.11g only · 802.11b/g Click Apply to Device. Configuring a WLAN Radio Policy (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wlan profile-name Example: Device(config)# wlan test4 Enters WLAN configuration submode. The profile-name is the profile name of the configured WLAN. Step 3 shutdown Example: Device(config-wlan)# shutdown Disables the WLAN. Step 4 radio policy dot11{5ghz | 24ghz | 6ghz } Enables the corresponding radio policy on the Example: WLAN. The options are: Device(config-wlan)# radio policy dot11 5ghz · 2.4ghz: Configures the WLAN on 2.4-GHz radio only. · 5ghz: Configures the WLAN on 5-GHz radio only. · 6ghz: Configures the WLAN on 6-GHz radio only. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1901 Verifying WLAN Properties (CLI) WLAN Step 5 Step 6 Step 7 Command or Action Purpose slot {0| 1 | 2} Example: Device(config-wlan-radio-5ghz)# slot 1 Configures the WLAN radio policy on the slot that you choose. The options are: · 0: Configures the WLAN on the 5GHz radio with radio slot 0 (if using 5GHz). · 1: Configures the WLAN on the 5GHz radio with radio slot 1. · 2: Configures the WLAN on the 5GHz radio with radio slot 2 (if present). no shutdown Example: Device(config-wlan)# no shutdown end Example: Device(config-wlan)# end Enables the WLAN. Returns to privileged EXEC mode. Verifying WLAN Properties (CLI) To verify the WLAN properties based on the WLAN ID, use the following show command: Device# show wlan id wlan-id To verify the WLAN properties based on the WLAN name, use the following show command: Device# show wlan name wlan-name To verify the WLAN properties of all the configured WLANs, use the following show command: Device# show wlan all To verify the summary of all WLANs, use the following show command: Device# show wlan summary To verify the running configuration of a WLAN based on the WLAN name, use the following show command: Device# show running-config wlan wlan-name To verify the running configuration of all WLANs, use the following show command: Device# show running-config wlan Verifying WLAN-VLAN Information for an AP To verify the operational WLAN-VLAN mappings per AP, use the following command: Device# show ap name test wlan vlan Policy tag mapping Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1902 WLAN Verifying a WLAN Radio Policy ------------------ WLAN Profile Name Name Policy VLAN Flex Central Switching IPv4 ACL IPv6 ACL ------------------------------------------------------------------------------------------- jey_cwa pp-local-1 46 Enabled jey_acl1 Not Configured swaguest pp-local-1 46 Enabled jey_acl1 Not Configured Verifying a WLAN Radio Policy To verify the WLAN radio policy configuration status, use the following command: Device# show wlan id 6 | sec Radio Bands wpa3 enabled wlan: Configured Radio Bands: All Operational State of Radio Bands : All Bands Operational Configured Radio Bands : All Operational State of Radio Bands 2.4ghz : UP 5ghz : UP 6ghz : DOWN (Required config: Disable WPA2 and Enable WPA3 & dot11ax) wpa3 not enabled wlan : Configured Radio Bands : All Operational State of Radio Bands 2.4ghz : UP 5ghz : UP 5ghz specify slot is enabled : Configured Radio Bands 5ghz : Enabled Slot 0 : Enabled Slot 1 : Disabled Slot 2 : Disabled Operational State of Radio Bands 5ghz : UP Slot 0 : Enabled Slot 1 : Disabled Slot 2 : Disabled Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1903 Verifying a WLAN Radio Policy WLAN Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1904 1 7 2 C H A P T E R WLAN Security · Information About WPA1 and WPA2, on page 1905 · Information About AAA Override, on page 1906 · Prerequisites for Layer 2 Security, on page 1909 · Restrictions for WPA2 and WP3, on page 1910 · Feature History for Fallback for AAA-Overridden VLAN, on page 1910 · Information About Fallback for AAA- Overridden VLAN, on page 1911 · Configuring Fallback for AAA-Overridden VLAN (CLI), on page 1912 · Verifying Fallback for AAA-Overridden VLAN, on page 1912 · How to Configure WLAN Security, on page 1913 Information About WPA1 and WPA2 Wi-Fi Protected Access (WPA or WPA1) and WPA2 are standards-based security solutions from the Wi-Fi Alliance that provide data protection and access control for wireless LAN systems. WPA1 is compatible with the IEEE 802.11i standard but was implemented prior to the standard's ratification; WPA2 is the Wi-Fi Alliance's implementation of the ratified IEEE 802.11i standard. By default, WPA1 uses Temporal Key Integrity Protocol (TKIP) and Message Integrity Check (MIC) for data protection while WPA2 uses the stronger Advanced Encryption Standard encryption algorithm using Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (AES-CCMP). By default, both WPA1 and WPA2 use the 802.1X for authenticated key management. However, the following options are also available: · PSK--When you choose PSK (also known as WPA preshared key or WPA passphrase), you need to configure a preshared key (or a passphrase). This key is used as the Pairwise Master Key (PMK) between clients and authentication server. · Cisco Centralized Key Management uses a fast rekeying technique that enables clients to roam from one access point to another without going through the controller , typically in under 150 milliseconds (ms). Cisco Centralized Key Management reduces the time required by the client to mutually authenticate with the new access point and derive a new session key during reassociation. Cisco Centralized Key Management fast secure roaming ensures that there is no perceptible delay in time-sensitive applications, such as wireless Voice over IP (VoIP), Enterprise Resource Planning (ERP), or Citrix-based solutions. Cisco Centralized Key Management is a CCXv4-compliant feature. If Cisco Centralized Key Management is selected, only Cisco Centralized Key Management clients are supported. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1905 Information About AAA Override WLAN When Cisco Centralized Key Management is enabled, the behavior of access points differs from the controller 's for fast roaming in the following ways: · If an association request sent by a client has Cisco Centralized Key Management enabled in a Robust Secure Network Information Element (RSN IE) but Cisco Centralized Key Management IE is not encoded and only PMKID is encoded in RSN IE, then the controller does not do a full authentication. Instead, the controller validates the PMKID and does a four-way handshake. · If an association request sent by a client has Cisco Centralized Key Management enabled in RSN IE and Cisco Centralized Key Management IE is encoded and only PMKID is present in the RSN IE, then the AP does a full authentication. The access point does not use PMKID sent with the association request when Cisco Centralized Key Management is enabled in RSN IE. · 802.1X+Cisco Centralized Key Management--During normal operation, 802.1X-enabled clients mutually authenticate with a new access point by performing a complete 802.1X authentication, including communication with the main RADIUS server. However, when you configure your WLAN for 802.1X and Cisco Centralized Key Management fast secure roaming, Cisco Centralized Key Management-enabled clients securely roam from one access point to another without the need to reauthenticate to the RADIUS server. 802.1X+Cisco Centralized Key Management is considered as an optional Cisco Centralized Key Management because both Cisco Centralized Key Management and non-Cisco Centralized Key Management clients are supported when this option is selected. On a single WLAN, you can allow WPA1, WPA2, and 802.1X/PSK/Cisco Centralized Key Management/802.1X+Cisco Centralized Key Management clients to join. All of the access points on such a WLAN advertise WPA1, WPA2, and 802.1X/PSK/Cisco Centralized Key Management/ 802.1X+Cisco Centralized Key Management information elements in their beacons and probe responses. When you enable WPA1 and/or WPA2, you can also enable one or two ciphers, or cryptographic algorithms, designed to protect data traffic. Specifically, you can enable AES and/or TKIP data encryption for WPA1 and/or WPA2. TKIP is the default value for WPA1, and AES is the default value for WPA2. Information About AAA Override The AAA Override option of a WLAN enables you to configure the WLAN for identity networking. It enables you to apply VLAN tagging, Quality of Service (QoS), and Access Control Lists (ACLs) to individual clients based on the returned RADIUS attributes from the AAA server. Configuring AAA Override Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless profile policy profile-policy Example: Purpose Enters global configuration mode. Configures WLAN policy profile and enters the wireless policy configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1906 WLAN Information About VLAN Override Step 3 Step 4 Command or Action Purpose Device(config)# wireless profile policy test-wgb aaa-override Example: Device(config-wireless-policy)# aaa-override Configures AAA policy override. Note If VLAN is not pushed from the RADIUS server, the VLAN Override feature can be disabled from the RADIUS server. end Example: Device(config-wireless-policy)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Information About VLAN Override The VLAN override requires the AAA Override to be enabled under the Policy Profile. You can assign VLAN from the RADIUS server in two ways: · Using IEFT RADIUS attributes 64, 65, and 81--The attribute 81 can be a VLAN ID, VLAN name, or VLAN group name. Both VLAN name and VLAN group are supported. Therefore, VLAN ID does not need to be predetermined on RADIUS. The RADIUS user attributes used for the VLAN ID assignment are: · 64 (Tunnel-Type)--Must be set to VLAN (Integer = 13). · 65 (Tunnel-Medium-Type)--Must be set to 802 (Integer = 6). · 81 (Tunnel-Private-Group-ID)--Must be set to the corresponding VLAN ID, VLAN name, or VLAN group name. · Using Aire-Interface-Name attribute--Use this attribute to assign a successfully authenticated user to a VLAN interface name (or VLAN ID) as per the user configuration. When you use this attribute, the VLAN name is returned as a string. The VLAN ID is 12-bits, and takes a value between 1 and 4094, inclusive. Because the Tunnel-Private-Group-ID is of type string, as defined in RFC2868 for use with IEEE 802.1X, the VLAN ID integer value is encoded as a string. When these tunnel attributes are sent, it is necessary to fill in the Tag field. Configuring Override VLAN for Central Switching Procedure Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1907 Configuring Override VLAN for Local Switching WLAN Step 2 Step 3 Step 4 Command or Action Device# configure terminal vlan vlan-id Example: Device(config)# vlan 20 Purpose Defines VLANs that can be pushed from the RADIUS server. Note The valid VLAN ID ranges from 1 to 4094. name vlan-name Example: Device(config-vlan)# name vlan_ascii end Example: Device(config-vlan)# end (Optional) Changes the default name of the VLAN. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Override VLAN for Local Switching If the VLAN name ID mapping under flex profile is newly added or updated, then the WLAN policy profiles having a matching VLAN name configured, must be shut and unshut. This is to ensure that the updated WLAN-VLAN mapping is pushed to the APs and the client receives the IP address from the intended VLAN. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile flex flex_profile_name Example: Device(config)# wireless profile flex rr-xyz-flex-profile Configures a Flex profile. Step 3 vlan-name vlan_name Example: Device(config-wireless-flex-profile)# vlan-name vlan_123 Defines VLANs that can be pushed from the RADIUS server. Step 4 vlan-id vlan_id Configures VLAN ID. Example: The valid VLAN ID ranges from 1 to 4096. Device(config-wireless-flex-profile-vlan)# vlan-id 23 Step 5 end Example: Returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1908 WLAN VLAN Override on Layer 3 Web Authentication Command or Action Purpose Device(config-wireless-flex-profile-vlan)# Alternatively, you can also press Ctrl-Z to exit end global configuration mode. VLAN Override on Layer 3 Web Authentication The VLAN override can be pushed from the RADIUS server during Layer 3 authentication. When a client gets connected to the controller and authenticated using the RADIUS server for Local Web Authentication (LWA) and Central Web Authentication (CWA), the RADIUS server pushes back in access-accept the new VLAN. If the RADIUS server pushes back a new VLAN in the access-accept, the client goes back to IP learn state on the controller. The controller de-associates the client while maintaining the client state for 30 seconds. Once the client re-associates, the client lands immediately to the new VLAN and re-triggers a new DHCP request. The client then learns a new IP and moves to the RUN state on the controller. The VLAN Override on Layer 3 Web authentication supports the following: · Local clients · Anchored clients · FlexConnect central authentication, central or local switching Verifying VLAN Override on Layer 3 Web Authentication To display the VLAN override after L3 authentication, use the following command: Device# show wireless client mac <mac> detail [...] Vlan Override after L3 Auth: True To display the statistics about client, use the following command: Device# show wireless stats client detail [...] Total L3 VLAN Override vlan change received :1 Total L3 VLAN Override disassociations sent :1 Total L3 VLAN Override re-associations received : 1 Total L3 VLAN Override successful VLAN change : 1 [...] L3 VLAN Override connection timeout :0 Prerequisites for Layer 2 Security WLANs with the same SSID must have unique Layer 2 security policies so that clients can make a WLAN selection based on the information advertised in beacon and probe responses. The available Layer 2 security policies are as follows: · None (open WLAN) · WPA+WPA2 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1909 Restrictions for WPA2 and WP3 WLAN Note · Although WPA and WPA2 cannot be used by multiple WLANs with the same SSID, you can configure two WLANs with the same SSID with WPA/TKIP with PSK and Wi-Fi Protected Access (WPA)/Temporal Key Integrity Protocol (TKIP) with 802.1X, or with WPA/TKIP with 802.1X or WPA/AES with 802.1X. · A WLAN configured with TKIP support will not be enabled on an RM3000AC module. · Static WEP (not supported on Wave 2 APs) Restrictions for WPA2 and WP3 · You cannot enable security ft or ft-adaptive without enabling WPA2 or WPA3. · You cannot enable ft-dot1x or ft-psk without enabling WPA2 or WPA3. · You cannot enable 802.1x or PSK simultaneously with SHA256 key derivation type without enabling WPA2 or WPA3 on a WLAN. · You cannot configure PMF on WPA1 WLAN without WPA2 security. · IOS APs do not support WPA3. Feature History for Fallback for AAA-Overridden VLAN This table provides release and related information for the feature explained in this module. This feature is available in all the releases subsequent to the one in which it is introduced in, unless noted otherwise. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1910 WLAN Information About Fallback for AAA- Overridden VLAN Table 139: Feature History for Fallback for AAA-Overridden VLAN Release Feature Feature Information Cisco IOS XE Bengaluru 17.6.1 Fallback for In Cisco IOS XE Bengaluru 17.5.1 and earlier releases, if there is a AAA-Overridden network with a single AAA server dictating policies that need to be VLAN applied to a client; and this client moves across different sites that have different policy definitions. If these policy definitions are not defined on the site to which the client needs to connect, the client does not get access to the network. For example, if a client is to be given access in VLAN 1, and VLAN 1 is not defined on the site to which the client connects, the client is excluded and does not get any access to the network. The Fallback for AAA-Overridden VLAN feature is introduced to allow fallback to policy profile VLAN when the overridden VLAN is not available. Information About Fallback for AAA- Overridden VLAN From Cisco IOS XE Bengaluru 17.6.1, fallback for AAA-overridden VLAN or VLAN groups is supported on the wireless policy profile. A new command is introduced in the wireless policy profile to configure the Fallback for AAA-Overridden VLAN feature. In Cisco IOS XE Bengaluru 17.6.1, you cannot configure the Fallback for AAA Overridden VLAN feature using the GUI. Central Switching and FlexConnect Mode Scenarios If fallback is enabled for AAA-overridden VLAN or VLAN groups, you might encounter the following scenarios in Central Switching and FlexConnect modes. Central Switching: If the AAA server gives a VLAN policy to a client, and the VLAN ID or the VLAN name is defined in the controller, the client is assigned to the VLAN specified by the AAA server. If the VLAN is not defined in the controller, the client is assigned to a VLAN that is configured on the wireless policy profile. If a VLAN group is configured on a wireless policy profile, the VLAN, as computed by the existing VLAN group logic, is assigned to the client. In the VLAN group case, fallback to policy profile VLAN occurs only when all the VLANs in the group are not configured in the controller, or, if the VLAN group is not defined in the controller. If both, AAA-overridden VLAN and the VLAN configured on the wireless policy profile are not defined in the controller, the configuration is termed as invalid, and the client is excluded. If a VLAN policy is not configured, or, if the default wireless policy profile is configured, the client is assigned a VLAN from the management VLAN. FlexConnect Mode: If the AAA server assigns a VLAN policy to a client configured in the FlexConnect profile, the VLAN is resolved by the controller. If the VLAN is not configued on the FlexConnect profile, the behavior of the Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1911 Configuring Fallback for AAA-Overridden VLAN (CLI) WLAN VLAN name and the VLAN ID is made consistent, with the help of the fallback feature, and the client receives the IP address from the wireless policy profile configuration. The following points summarize the FlexConnect mode behavior: · If AAA VLAN is defined in FlexConnect profile, the client is assigned the AAA VLAN. · If AAA VLAN is not defined in the FlexConnect profile, FlexConnect VLAN Central Switching is configured, and VLAN is defined in the controller, and the client is assigned AAA VLAN and is centrally switched. · If AAA VLAN is not defined in the FlexConnect profile, FlexConnect VLAN Central Switching is configured, the VLAN is not defined in the controller, and the client is assigned a VLAN from the wireless policy profile. · If AAA VLAN is not defined in the FlexConnect profile, and FlexConnect VLAN Central Switching is not configured, the client is assigned a VLAN from the wireless policy profile. Configuring Fallback for AAA-Overridden VLAN (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy wlan-policy-profile-name Configures the WLAN policy profile. Enters the wireless policy profile configuration mode. Example: Device(config)# wireless profile policy wlan-policy-profile-name Step 3 aaa-override vlan fallback Example: Device(config-wireless-policy)# aaa-override vlan fallback Allows fallback to the policy profile VLAN when the overridden VLAN is not available. Verifying Fallback for AAA-Overridden VLAN To verify if the fallback for AAA-overridden VLAN is enabled, use the following command: Device# show wireless profile policy detailed default-policy-profile | sec AAA Policy Params AAA Policy Params AAA Override : DISABLED NAC : DISABLED AAA Policy name : default-aaa-policy AAA Vlan Fallback : ENABLED Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1912 WLAN How to Configure WLAN Security How to Configure WLAN Security Configuring Static WEP Layer 2 Security Parameters (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Choose Configuration > Tags & Profiles > WLANs. On the WLANs page, click the name of the WLAN. In the Edit WLAN window, click the Security tab. From the Layer 2 Security Mode drop-down list, select the Static WEP option. (Optional) Check the Shared Key Authentication check box to set the authentication type as shared. By leaving the check box unchecked, the authentication type is set to open. Set the Key Size as either 40 bits or 104 bits. · 40 bits: The keys with 40-bit encryption must contain 5 ASCII text characters or 10 hexadecimal characters. · 104 bits: The keys with 104-bit encryption must contain 13 ASCII text characters or 26 hexadecimal characters. Set the appropriate Key Index; you can choose between 1 to 4. Set the Key Format as either ASCII or Hex. Enter a valid Encryption Key. · 40 bits: The keys with 40-bit encryption must contain 5 ASCII text characters or 10 hexadecimal characters. · 104 bits: The keys with 104-bit encryption must contain 13 ASCII text characters or 26 hexadecimal characters. Click Update & Apply to Device. Configuring Static WEP Layer 2 Security Parameters (CLI) Before you begin You must have administrator privileges. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1913 Configuring Static WEP Layer 2 Security Parameters (CLI) WLAN Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action wlan profile-name wlan-id SSID_Name Example: Device# wlan test4 1 test4 Purpose Enters the WLAN configuration submode. profile-name is the profile name of the configured WLAN. wlan-id is the wireless LAN identifier. The range is 1 to 512. SSID_Name is the SSID which can contain 32 alphanumeric characters. Note If you have already configured this command, enter wlan profile-name command. disable ft Example: Device(config-wlan)# disable ft Disables fast transition. no security ft over-the-ds Example: Device(config-wlan)# no security ft over-the-ds Disables fast transition over the data source on the WLAN. no security ft Example: Device(config-wlan)# no security ft Disables 802.11r Fast Transition on the WLAN. no security wpa{akm | wpa1 | wpa2} Disables the WPA/WPA2 support for a WLAN. Example: Device(config-wlan)# no security wpa wpa1 ciphers tkip security static-wep-key [authentication {open | shared}] Example: Device(config-wlan)# security static-wep-key authentication open The keywords are as follows: · static-wep-key--Configures Static WEP Key authentication. · authentication--Specifies the authentication type you can set. The values are open and shared. security static-wep-key [encryption {104 | The keywords are as follows: 40} {ascii | hex} [0 | 8]] · static-wep-key--Configures Static WEP Example: Key authentication. Device(config-wlan)# security static-wep-key encryption 104 ascii 0 1234567890123 1 · encryption--Specifies the encryption type that you can set. The valid values are 104 and 40. 40-bit keys must contain 5 ASCII text characters or 10 hexadecimal Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1914 WLAN Configuring WPA + WPA2 Layer 2 Security Parameters (GUI) Command or Action Step 9 end Example: Device(config)# end Purpose characters. 104-bit keys must contain 13 ASCII text characters or 26 hexadecimal characters. · ascii--Specifies the key format as ASCII. · hex--Specifies the key format as HEX. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring WPA + WPA2 Layer 2 Security Parameters (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Click Configuration > Tags and Profiles > WLANs. Click Add to add a new WLAN Profile or click the one you want to edit. In the Edit WLAN window, click Security > Layer2. From Layer 2 Security Mode drop-down menu, select WPA + WPA2. Configure the security parameters and then click Save and Apply to Device. Configuring WPA + WPA2 Layer 2 Security Parameters (CLI) Note The default values for security policy WPA2 are: · Encryption is AES. · Authentication Key Management (AKM) is dot1x. Before you begin You must have administrator privileges. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1915 Configuring WPA + WPA2 Layer 2 Security Parameters (CLI) WLAN Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action wlan profile-name wlan-id SSID_Name Example: Device# wlan test4 1 test4 Purpose Enters the WLAN configuration submode. · profile-name is the profile name of the configured WLAN. · wlan-id is the wireless LAN identifier. The range is 1 to 512. · SSID_Name is the SSID that contains 32 alphanumeric characters. Note If you have already configured this command, enter wlan profile-name command. security wpa {akm | wpa1 | wpa2} Example: Device(config-wlan)# security wpa Enables WPA or WPA2 support for WLAN. security wpa wpa1 Enables WPA. Example: Device(config-wlan)# security wpa wpa1 security wpa wpa1 ciphers [aes | tkip] Specifies the WPA1 cipher. Choose one of the Example: following encryption types: Device(config-wlan)# security wpa wpa1 · aes--Specifies WPA/AES support. ciphers aes · tkip--Specifies WPA/TKIP support. The default values are TKIP for WPA1 and AES for WPA2. Note You can enable or disable TKIP encryption only using the CLI. Configuring TKIP encryption is not supported in GUI. security wpa akm {cckm| dot1x | dot1x-sha256 | ft | psk |psk-sha256} Example: When you have VLAN configuration on WGB, you need to configure the encryption cipher mode and keys for a particular VLAN, for example, encryption vlan 80 mode ciphers tkip. Then, you need to configure the encryption cipher mode globally on the multicast interface by entering the following command: encryption mode ciphers tkip. Enable or disable Cisco Centralized Key Management, 802.1x, 802.1x with SHA256 key derivation type, Fast Transition, PSK or PSK with SHA256 key derivation type. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1916 WLAN Configuring WPA + WPA2 Layer 2 Security Parameters (CLI) Command or Action Device(config-wlan)# security wpa akm psk-sha256 Purpose Note · You cannot enable 802.1x and PSK with SHA256 key derivation type simultaneously. · When you configure Cisco Centralized Key Management SSID, you must enable the ccx aironet-iesupport for Cisco Centralized Key Management to work. · WPA3 Enterprise dot1x-sha256 is supported only in local mode. Step 7 Step 8 Step 9 Step 10 Step 11 security wpa psk set-key {ascii | hex}{0 | 8} Enter this command to specify a preshared key, password if you have enabled PSK. Example: WPA preshared keys must contain 8 to 63 Device(config-wlan)# security wpa psk ASCII text characters or 64 hexadecimal set-key ascii 0 test characters. security wpa akm ft {dot1x | psk| sae} Example: Device(config-wlan)# security wpa akm ft psk Enable or disable authentication key management suite for fast transition. Note You can now choose between PSK and fast transition PSK as the AKM suite. security wpa wpa2 Enables WPA2. Example: Device(config-wlan)# security wpa wpa2 security wpa wpa2 ciphers aes Configure WPA2 cipher. Example: · aes--Specifies WPA/AES support. Device(config-wlan)# security wpa wpa2 Example: show wireless pmk-cache Displays the remaining time before the PMK cache lifetime timer expires. If you have enabled WPA2 with 802.1X authenticated key management or WPA1 or WPA2 with Cisco Centralized Key Management authenticated key management, the PMK cache lifetime timer is used to trigger reauthentication with the client when necessary. The timer is based on the timeout Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1917 Configuring WPA + WPA2 Layer 2 Security Parameters (CLI) Command or Action WLAN Purpose value received from the AAA server or the WLAN session timeout setting. If you configure 802.1x with session timeout between 0 and 299, Pairwise Master Key (PMK) cache is created with a timer of 1 day 84600 seconds. Note · The command will show VLAN ID with VLAN pooling feature in VLAN-Override field. · Sticky key caching (SKC) is not supported. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1918 1 7 3 C H A P T E R Remote LANs · Information About Remote LANs, on page 1919 · Configuring Remote LANs (RLANs), on page 1921 · Information About RLAN Authentication Fallback, on page 1934 · Configuring RLAN Authentication Fallback (CLI), on page 1934 · Modifying 802.1X EAP Timers for RLAN Clients, on page 1935 · Verifying RLAN Authentication Fallback, on page 1936 Information About Remote LANs A Remote LAN (RLAN) is used for authenticating wired clients using the controller. Once the wired client successfully joins the controller, the LAN ports switch the traffic between central or local switching modes. The traffic from wired client is treated as wireless client traffic. The RLAN in Access Point (AP) sends the authentication request to authenticate the wired client. The authentication of wired client in RLAN is similar to the central authenticated wireless client. The supported AP models are: · Cisco Catalyst 9124 Series Access Points · Cisco Catalyst 9105AXW · Cisco Aironet OEAP 1810 series · Cisco Aironet 1815T series · Cisco Aironet 1810W series · Cisco Aironet 1815W · Cisco Catalyst IW6300 Heavy Duty Series Access Points · Cisco 6300 Series Embedded Services Access Points Information About Ethernet (AUX) Port The second Ethernet port in Cisco Aironet 1850, 2800, and 3800 Series APs is used as a link aggregation (LAG) port, by default. It is possible to use this LAG port as an RLAN port when LAG is disabled. The following APs use LAG port as an RLAN port: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1919 Information About Remote LANs WLAN · 1852E · 1852I · 2802E · 2802I · 3802E · 3802I · 3802P · 4802 Limitation for RLAN · RLAN supports only a maximum of four wired clients regardless of the AP model. Limitations for Using AUX port in Cisco 2700 Access Points · RLAN supports AUX port and non-native VLAN for this port. · Local mode supports wired client traffic on central switch. Whereas, Flexconnect mode does not support central switch. · Flexconnect mode supports wired client traffic on local switch and not on central switch. · AUX port cannot be used as a trunk port. Even switches or bridges cannot be added behind the port. · AUX port does not support dot1x. Role of Controller · The controller acts as an authenticator, and Extensible Authentication Protocol (EAP) over LAN (EAPOL) messages from the wired client reaching the controller through an AP. · The controller communicates with the configured Authentication, Authorization, and Accounting (AAA) server. · The controller configures the LAN ports for an AP and pushes them to the corresponding AP. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1920 WLAN Configuring Remote LANs (RLANs) Note · The RLAN feature is supported on Fabric. · RLAN is supported in APs that have more than one Ethernet port. · In RLAN (local mode - local switching mode), if you want to use the AP native VLAN for client IP, the VLAN should be configured as either no vlan or vlan 1 in the RLAN policy profile. For example, if the native VLAN ID is 80, do not use the number 80 in the RLAN policy profile. Also, do not use VLAN name VLANxxxx to configure VLAN in the RLAN policy profile. When a new client is connected to an AP, the client's details are available in the controller initially. However, after the CAPWAP DOWN/UP state, the client details are no longer listed in the controller. · APs in local mode central switching do not support VLAN tagged traffic from RLAN clients, and the traffic gets dropped. Configuring Remote LANs (RLANs) Enabling or Disabling all RLANs Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 [no] ap remote-lan shutdown Example: Device(config)# [no] ap remote-lan shutdown Step 3 end Example: Device(config)# end Purpose Enters global configuration mode. Enables or disables all RLANs. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Creating RLAN Profile (GUI) Procedure Step 1 Step 2 Choose Configuration > Tags & Profiles > Remote LAN. Click Add. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1921 Creating RLAN Profile (CLI) WLAN Step 3 Step 4 Enter the Profile Name, RLAN ID and enable or disable the Status toggle button. The name can be ASCII characters from 32 to 126, without leading and trailing spaces. Click Apply to Device. Creating RLAN Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap remote-lan profile-name remote-lan-profile-name rlan-id Example: Device(config)# ap remote-lan profile-name rlan_profile_name 3 Purpose Enters global configuration mode. Configures remote LAN profile. · remote-lan-profile--Is the remote LAN profile name. Range is from 1 to 32 alphanumeric characters. · rlan-id--Is the remote LAN identifier. Range is from 1 to 128. Note You can create a maximum of 128 RLANs. You cannot use the rlan-id of an existing RLAN while creating another RLAN. Both RLAN and WLAN profile cannot have the same names. Similarly, RLAN and WLAN policy profile cannot have the same names. Configuring RLAN Profile Parameters (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Tags & Profiles > Remote LAN. On the RLAN Profile tab, click Add. The Add RLAN Profile window is displayed. In the General tab: a) Enter a Name and RLAN ID for the RLAN profile. The name can be ASCII characters from 32 to 126, without leading and trailing spaces. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1922 WLAN Configuring RLAN Profile Parameters (CLI) Step 4 Step 5 Step 6 Step 7 b) Set the number of client connections per RLAN in the Client Association Limit field. The range depends on the maximum number of clients supported by the platform. c) To enable the profile, set the status as Enable. In the Security > Layer2 tab a) To enable 802.1x for an RLAN, set the 802.1x status as Enabled. Note You can activate either web or 802.1x authentication list at a time. b) Choose the authorization list name from the MAC Filtering drop-down list. c) Choose the 802.1x for an RLAN authentication list name from the Authentication List drop-down list. In the Security > Layer3 tab a) To enable web authentication for an RLAN, set the Web Auth status as Enabled. Note You can activate either web or 802.1x authentication list at a time. b) Choose the web authentication parameter map from the Webauth Parameter Map drop-down list. c) Choose the web authentication list name from the Authentication List drop-down list. In the Security > AAA tab a) Set the Local EAP Authentication to enabled. Also, choose the required EAP Profile Name from the drop-down list. Save the configuration. Configuring RLAN Profile Parameters (CLI) Before you begin The configurations in this section are not mandatory for an RLAN profile. In case of central switching mode, you need to configure both central switching and central DHCP. Note The fabric profile configuration is required only for fabric RLAN support. Procedure Step 1 Command or Action client association limit client-connections Example: Device(config-remote-lan)# client association limit 1 Step 2 fabric-profile fabric-profile-name Example: Purpose Configures client connections per RLAN. client-connections--Is the maximum client connections per RLAN. Range is from 0 to 10000. 0 refers to unlimited. Configures fabric profile for RLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1923 Creating RLAN Policy Profile (GUI) WLAN Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action Purpose Device(config-remote-lan)# fabric-profile sample-fabric-profile-name ip access-group web IPv4-acl-name Example: Device(config-remote-lan)# ip access-group web acl_name Configures RLAN IP configuration commands. IPv4-acl-name--Refers to the IPv4 ACL name or ID. local-auth profile name Example: Device(config-remote-lan)# local-auth profile_name Sets EAP Profile on an RLAN. profile name--Is the EAP profile on an RLAN. mac-filtering mac-filter-name Sets MAC filtering support on an RLAN. Example: mac-filter-name--Is the authorization list name. Device(config-remote-lan)# mac-filtering mac_filter security dot1x authentication-list list-name Configures 802.1X for an RLAN. Example: list-name--Is the authentication list name. Device(config-remote-lan)# security dot1x authentication-list dot1_auth_list security web-auth authentication-list list-name Example: Device(config-remote-lan)# security web-auth authentication-list web_auth_list Configures web authentication for an RLAN. list-name--Is the authentication list name. Note You can activate either web or dot1x authentication list at a time. [no] shutdown Example: Device(config-remote-lan)# shutdown Enables or disables RLAN profile. end Example: Device(config-remote-lan)# end Returns to privileged EXEC mode. Creating RLAN Policy Profile (GUI) Procedure Step 1 Step 2 Choose Configuration > Wireless > Remote LAN > RLAN Policy Click Add. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1924 WLAN Creating RLAN Policy Profile (CLI) Step 3 Step 4 In the General tab, enter the Policy Name. Click Apply to Device. Creating RLAN Policy Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap remote-lan-policy policy-name profile name Example: Device(config)# ap remote-lan-policy policy-name rlan_policy_prof_name Purpose Enters global configuration mode. Configures RLAN policy profile and enters wireless policy configuration mode. Configuring RLAN Policy Profile Parameters (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Wireless > Remote LAN. On the Remote LAN page, click RLAN Policy tab. On the RLAN Policy page, click the name of the Policy or click Add to create a new one. The Add/Edit RLAN Policy window is displayed. In the General tab: a) Enter a Name and Description for the policy profile. b) Set Central Authentication to Enabled state. c) Set Central DHCP to Enabled state. d) Set the PoE check box to enable or disable state. e) To enable the policy, set the status as Enable. In the Access Policies Tab, choose the VLAN name or number from the VLAN drop-down list. Note When central switching is disabled, the VLAN in the RLAN policy cannot be configured as the AP's native VLAN. To use the AP's native VLAN for client IP, the VLAN should be configured as either no vlan or vlan 1 in the RLAN policy profile. From the Host Mode drop-down list, choose the Host Mode for the remote-LAN802.1x from the following options: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1925 Configuring RLAN Policy Profile Parameters (CLI) WLAN Step 7 Step 8 Step 9 · Single-Host Mode--Is the default host mode. In this mode, the switch port allows only a single host to be authenticated and passes traffic one by one. · Multi-Host Mode--The first device to authenticate opens up to the switch port, so that all other devices can use the port. You need not authenticate other devices independently, if the authenticated device becomes authorized the switch port is closed. · Multi-Domain Mode--The authenticator allows one host from the data domain and another from the voice domain. This is a typical configuration on switch ports with IP phones connected. Note For an RLAN profile with open-auth configuration, you must map the RLAN-policy with single host mode. Mapping RLAN-policy with multi-host or multi-domain mode is not supported. Configure IPv6 ACL or Flexible Netflow. · Under the Access Policies > Remote LAN ACL section, choose the IPv6 ACL from the drop-down list. · Under the Access Policies > AVC > Flow Monitor IPv6 section, check the Egress Status and Ingress Status check boxes and choose the policies from the drop-down lists. Click the Advanced tab. a) Configure the violation mode for Remote-LAN 802.1x from the Violation Mode drop-down list, choose the violation mode type from the following options: · Shutdown--Disables the port · Replace--Removes the current session and initiates authentication for the new host. This is the default behavior. · Protect--Drops packets with unexpected MAC addresses without generating a system message. b) Enter the Session Timeout (sec) value to define the client's duration of a session. The range is between 20 and 86400 seconds. c) Under AAA Policy Params section, check the AAA Override check box to enable AAA override. d) Under the Exclusionlist Params section, check the Exclusionlist check box and enter the Exclusionlist Timeout value. This sets the exclusion time for a client. The range is between 0 and 2147483647 seconds. 0 refers to no timeout. Save the configuration. Configuring RLAN Policy Profile Parameters (CLI) Before you begin RLAN does not support the following features: · Central Web Authentication (CWA) · Quality of Service (QoS) Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1926 WLAN Configuring RLAN Policy Profile Parameters (CLI) · Bi-Directional Rate Limiting (BDRL) · Multicast and Broadcast · Identity PSK (iPSK) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action central switching Example: Device(config-remote-lan-policy)# central switching Purpose Configures central switching. central dhcp Example: Device(config-remote-lan-policy)# central dhcp Configures central DHCP. exclusionlist timeout timeout Example: Device(config-remote-lan-policy)# exclusionlist timeout 200 Sets exclusion-listing on RLAN. timeout--Sets the time, up to which the client will be in excluded state. Range is from 0 to 2147483647 seconds. 0 refers to no timeout. vlan vlan Configures VLAN name or ID. Example: - vlan--Is the vlan name. Device(config-remote-lan-policy)# vlan vlan1 aaa-override Example: Device(config-remote-lan-policy)# aaa-override Configures AAA policy override. session-timeout timeout in seconds Example: Device(config-remote-lan-policy)# session-timeout 21 Configures client session timeout. timeout in seconds--Defines the duration of a session. Range is from 20 to 86400 seconds. Note If the session timeout is less than 300 seconds for Dot1x clients, the session timeout is set as one day that is, equal to 86400 seconds. Step 7 host-mode {multidomain voice domain | multihost |singlehost} Example: Device(config-remote-lan-policy)# host-mode multidomain Configures host mode for remote-LAN 802.1x. voice domain--Is the RLAN voice domain VLAN ID. Range is from 0 to 65535. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1927 Configuring RLAN Policy Profile Parameters (CLI) WLAN Step 8 Step 9 Command or Action Purpose You can configure the following IEEE 802.1X authentication modes: · Multi-Domain Mode--The authenticator allows one host from the data domain and another from the voice domain. This is a typical configuration on switch ports with IP phones connected. · Multi-Host Mode--The first device to authenticate opens up to the switch port, so that all other devices can use the port. You need not authenticate other devices independently, if the authenticated device becomes authorized the switch port is closed. · Single-Host Mode--Is the default host mode. In this mode, the switch port allows only a single host to be authenticated and passes traffic one by one. violation-mode {protect | replace | shutdown} Example: Device(config-remote-lan-policy)# violation-mode protect Configures violation mode for Remote-LAN 802.1x. When a security violation occurs, a port is protected based on the following configured violation actions: · Shutdown--Disables the port. · Replace--Removes the current session and initiates authentication for the new host. This is the default behavior. · Protect--Drops packets with unexpected MAC addresses without generating a system message. In the single-host authentication mode, a violation is triggered when more than one device is detected in data VLAN. In a multi-host authentication mode, a violation is triggered when more than one device is detected in data VLAN or voice VLAN. [no] poe Enables or disables PoE. Example: Device(config-remote-lan-policy)# poe Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1928 WLAN Configuring Policy Tag and Mapping an RLAN Policy Profile to an RLAN Profile (CLI) Step 10 Step 11 Command or Action [no] shutdown Example: Device(config-remote-lan-policy)# shutdown Purpose Enables or disables an RLAN policy profile. end Example: Device(config-remote-lan-policy)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Policy Tag and Mapping an RLAN Policy Profile to an RLAN Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless tag policy policy-tag-name Example: Device(config)# wireless tag policy remote-lan-policy-tag Configures policy tag and enters policy tag configuration mode. Step 3 remote-lan remote-lan-profile-name policy rlan-policy-profile-name port-id port-id Example: Device(config-policy-tag)# remote-lan rlan_profile_name policy rlan_policy_profile port-id 2 Maps an RLAN policy profile to an RLAN profile. · remote-lan-profile-name--Is the name of the RLAN profile. · rlan-policy-profile-name--Is the name of the policy profile. · port-id--Is the LAN port number on the access point. Range is from 1 to 4. Step 4 end Example: Device(config-policy-tag)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1929 Configuring LAN Port (CLI) WLAN Configuring LAN Port (CLI) Procedure Step 1 Command or Action Purpose ap name ap name lan port-id lan port id {disable | enable} Example: Device# ap name L2_1810w_2 lan port-id 1 enable Configures a LAN port. · enable--Enables the LAN port. · disable--Disables the LAN port. Attaching Policy Tag to an Access Point (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Wireless > Access Points. Select the AP to attach the Policy Tag. Under the Tags section, use the Policy drop-down to select a policy tag. Click Update & Apply to Device. Attaching Policy Tag to an Access Point (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap ap-ethernet-mac Example: Device(config)# ap 00a2.891c.21e0 Step 3 policy-tag policy-tag-name Example: Device(config-ap-tag)# policy-tag remote-lan-policy-tag Step 4 end Example: Device(config-ap-tag)# end Purpose Enters global configuration mode. Configures MAP address for an AP and enters AP configuration mode. Attaches policy tag to the access point. policy-tag-name--Is the name of the policy tag defined earlier. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1930 WLAN Verifying RLAN Configuration Verifying RLAN Configuration To view the summary of all RLANs, use the following command: Device# show remote-lan summary Number of RLANs: 1 RLAN Profile Name Status ---------------------------------------------------------------- 1 rlan_test_1 Enabled To view the RLAN configuration by ID, use the following command: Device# show remote-lan id <id> Remote-LAN Profile Name : rlan_test_1 ==================================================== Identifier :1 Status : Enabled Mac-filtering : Not Configured Number of Active Clients :1 Security_8021X : Disabled 8021.x Authentication list name : Not Configured Local Auth eap Profile Name : Not Configured Web Auth Security : Disabled Webauth Authentication list name : Not Configured Web Auth Parameter Map : Not Configured Client association limit :0 Ipv4 Web Pre Auth Acl : Not Configured Ipv6 Web Pre Auth Acl : Not Configured To view the RLAN configuration by profile name, use the following command: Device# show remote-lan name <profile-name> Remote-LAN Profile Name : rlan_test_1 ================================================ Identifier :1 Status : Enabled Mac-filtering : mac-auth Number of Active Clients :0 Security_8021x_dot1x : Enabled 8021.x Authentication list name : Not Configured Local Auth eap Profile Name : Not Configured Web Auth Security : Disabled Webauth Authentication list name : Not Configured Web Auth Parameter Map : Not Configured Client association limit :0 Ipv4 Web Pre Auth Acl : Not Configured Ipv6 Web Pre Auth Acl : Not Configured mDNS Gateway Status : Bridge Fabric Profile Name : rlan-fabric-profile To view the detailed output of all RLANs, use the following command: Device# show remote-lan all Remote-LAN Profile Name : rlan_test_1 ================================================== Identifier :1 Status : Enabled Mac-filtering : Not Configured Number of Active Clients :1 Security_8021X : Disabled Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1931 Verifying RLAN Configuration WLAN 8021.x Authentication list name Local Auth eap Profile Name Web Auth Security Webauth Authentication list name Web Auth Parameter Map Client association limit Ipv4 Web Pre Auth Acl Ipv6 Web Pre Auth Acl : Not Configured : Not Configured : Disabled : Not Configured : Not Configured :0 : Not Configured : Not Configured Remote-LAN Profile Name : rlan_test_2 ================================================== Identifier :2 Status : Enabled Mac-filtering : Not Configured Number of Active Clients :1 Security_8021X : Disabled 8021.x Authentication list name : Not Configured Local Auth eap Profile Name : Not Configured Web Auth Security : Disabled Webauth Authentication list name : Not Configured Web Auth Parameter Map : Not Configured Client association limit :0 Ipv4 Web Pre Auth Acl : Not Configured Ipv6 Web Pre Auth Acl : Not Configured Device# show remote-lan policy summary Number of Policy Profiles: 1 Profile Name Description Status --------------------------------------------------------------------------------------------- rlan_named_pp1 Testing RLAN policy profile Enabled To view the LAN port configuration of a Cisco AP, use the following command: Device# show ap name <ap_name> lan port summary LAN Port status for AP L2_1815w_1 Port ID status vlanId poe --------------------------------------------- LAN1 Enabled 20 Disabled LAN2 Enabled 20 NA LAN3 Disabled 0 NA To view the summary of all clients, use the following command: Device# show wireless client summary Number of Local Clients: 1 MAC Address AP Name WLAN State Protocol Method Role --------------------------------------------------------------------------------------- d8eb.97b6.fcc6 L2_1815w_1 1 * Run Ethernet None Local To view the client details with the specified username, use the following command: Device# show wireless client username cisco MAC Address AP Name Status WLAN Auth Protocol ---------------------------------------------------------------------------------------------------- 0014.d1da.a977 L2_1815w_1 Run 1 * Yes Ethernet d8eb.97b6.fcc6 L2_1815w_1 Run 1 * Yes Ethernet To view the detailed information for a client by MAC address, use the following command: Device# show wireless client mac-address 2cea.7f18.5bb3 detail Client MAC Address : 2cea.7f18.5bb3 Client MAC Type : Universally Administered Address Client DUID: NA Client IPv4 Address : 10.56.33.21 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1932 WLAN Verifying RLAN Configuration Client IPv6 Addresses : fe80::d60:2e8:4cc2:6212 Client Username: N/A AP MAC Address : 4ca6.4d22.1a80 AP Name: AP3C57.31C5.799C AP slot : 16 Client State : Associated Policy Profile : fabric-rlan-policy Flex Profile : default-flex-profile Remote LAN Id: 1 <---------Remote LAN Name: fabric-rlan <-------Wireless LAN Network Name (SSID): fabric-rlan <---------BSSID : 4ca6.4d22.1a81 Connected For : 211 seconds Protocol : Ethernet <-------Channel : 0 Port ID: 1 <----------Client IIF-ID : 0xa0000002 Association Id : 0 Authentication Algorithm : Open System <--------o/p trimmed ------> To view the summary of all AP tags, use the following command: Device# show ap tag summary Number of APs: 2 AP Name AP Mac Site Tag Name Policy Tag Name RF Tag Name Misconfigured Tag Source ------------------------------------------------------------------------------------------------------------------------------------------------ L2_1810d_1 0008.3296.24c0 default-site-tag default-policy-tag default-rf-tag No Default L2_1810w_2 00b0.e18c.5880 rlan-site-tag rlan_pt_1 default-rf-tag No Static To view the summary of all policy tags, use the following command: Device# show wireless tag policy summary Number of Policy Tags: 2 Policy Tag Name Description ------------------------------------------------------------------------ rlan_pt_1 default-policy-tag default policy-tag To view details of a specific policy tag, use the following command: Device# show wireless tag policy detailed <rlan_policy_tag_name> Policy Tag Name : rlan_pt_1 Description : Number of WLAN-POLICY maps: 0 Number of RLAN-POLICY maps: 2 REMOTE-LAN Profile Name Policy Name Port Id -------------------------------------------------------------------------------------------- rlan_test_1 rlan_named_pp1 1 rlan_test_1 rlan_named_pp1 2 To view the fabric client summary, use the following command: Device# show wireless fabric client summary Number of Fabric Clients : 0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1933 Information About RLAN Authentication Fallback WLAN MAC Address AP Name L2 VNID RLOC IP WLAN State To view the RLAN client summary, use the following command: Device# show wireless client summary Protocol Method Number of Clients: 1 MAC Address AP Name Type ID State Protocol Method Role ------------------------------------------------------------------------------------------------------------------------- 2cea.7f18.5bb3 AP3C57.31C5.799C RLAN 1 Run Ethernet None Local Number of Excluded Clients: 0 Information About RLAN Authentication Fallback From Cisco IOS XE Cupertino 17.8.1, Remote LAN (RLAN) ports on OfficeExtend Access Points (OEAPs) support the fallback mechanism for authentication from 802.1X to MAC authentication bypass (MAB) and vice versa. If a client using 802.1X as an authentication method fails to authenticate within the timeout period, the client gets authenticated using the MAB method. Similarly, if the device MAC address is not registered for MAB authentication, the authentication fails, and the client gets authenticated using the 802.1X method. By default, the RLAN fallback mechanism is disabled. You should explicitly enable it. When both 802.1X and MAB are enabled, the device should pass both authentication methods for successful authentication. Configuring RLAN Authentication Fallback (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap remote-lan profile-name rlan-profile-name Configures remote LAN profile. rlan-id Example: Device(config)# ap remote-lan profile-name rlan_profile_name 3 Step 3 security {dot1x on-macfilter-failure | mac-filter on-dot1x-failure} Enables 802.1X authentication on MAC filter failure. Example: Note Device(config-remote-lan)# security dot1x on-macfilter-failure You can either configure 802.1X authentication on MAC filter failure or MAC filter authentication on 802.1X failure. You cannot configure both. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1934 WLAN Modifying 802.1X EAP Timers for RLAN Clients Step 4 Command or Action end Example: Device(config-remote-lan)# end Purpose Returns to privileged EXEC mode. Modifying 802.1X EAP Timers for RLAN Clients To adapt the 802.1X EAP timers for RLAN clients, use the following procedure. Note When you modify the 802.1X EAP timers, ensure that the timer is long enough to allow 802.1X-capable endpoints to authenticate. A timer that is too short may result in 802.1X-capable endpoints being subject to a fallback authentication or authorization technique. If 802.1X EAP timers are not configured using this procedure, the timer configuration done using the wireless security dot1x request and wireless security dot1x identity-request commands are applied. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap remote-lan profile-name rlan-profile-name Configures the remote LAN profile. rlan-id Example: Device(config)# ap remote-lan profile-name rlan_profile_name 3 Step 3 security dot1x identity-request retries retry-num Example: Configures the maximum number of EAP ID request retransmissions. Valid values range from 1 to 20. Device(config-remote-lan)# security dot1x identity-request retries 20 Step 4 security dot1x identity-request timeout timeout-value Configures the EAP ID request-timeout value, in seconds. Valid values range from 1 to 120. Example: Device(config-remote-lan)# security dot1x identity-request timeout 120 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1935 Verifying RLAN Authentication Fallback WLAN Step 5 Step 6 Step 7 Command or Action Purpose security dot1x request retries retry-num Configures the maximum number of EAP Example: request retransmissions. Valid values range from 0 to 20. Device(config-remote-lan)# security dot1x request retries 20 security dot1x request timeout timeout-value Configures the EAP request retransmission Example: timeout value, in seconds. Valid values range from 1 to 120. Device(config-remote-lan)# security dot1x request timeout 120 end Example: Device(config-remote-lan)# end Returns to privileged EXEC mode. Verifying RLAN Authentication Fallback To check the status of the fallback authentication mechanism, use the following command: Device# show remote-lan all Remote-LAN Profile Name : rlan_profile_name ================================================ Identifier :3 Status : Disabled Mac-filtering : Not Configured Number of Active Clients :0 Security_8021x_dot1x : Enabled 8021.x Authentication list name : Not Configured Local Auth eap Profile Name : Not Configured Web Auth Security : Disabled Webauth Authentication list name : Not Configured Web Auth Parameter Map : Not Configured Client association limit :0 Ipv4 Web Pre Auth Acl : Not Configured Ipv6 Web Pre Auth Acl : Not Configured mDNS Gateway Status : Bridge Authentication Fallback Status : MAC-filtering to Dot1X Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1936 1 7 4 C H A P T E R RLAN External Module · Information About External Module, on page 1937 · Prerequisites for Configuring External Module, on page 1937 · Configuring External Module (GUI), on page 1937 · Configuring External Module (CLI), on page 1938 · Verifying External Module, on page 1938 Information About External Module The External Module feature enables traffic to flow in and out from the Cisco Aironet Developer Platform module when an access point (AP) is in both local and flex connect mode. Prerequisites for Configuring External Module Before you begin, you must ensure the following: · The external module is powered on. · The RLAN status is enabled. Configuring External Module (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Tags & Profiles > Tags. In the Policy tab, select one of the Policy Tag Name and click Add. In Add Policy Tag page and RLAN-POLICY Maps section, click Add. From the Port ID drop-down list, choose ext-module. From the RLAN Profile drop-down list, choose an RLAN profile. From the RLAN Policy Profile drop-down list, choose an RLAN policy profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1937 Configuring External Module (CLI) WLAN Step 7 Click the check mark icon. Configuring External Module (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless tag policy default-policy-tag Example: Device(config)# wireless tag policy default-policy-tag Configures a policy tag to the external module for the remote LAN. Step 3 remote-lan rlan-profile policy rlan-policy Configures a remote LAN policy to the external ext-module module. Example: Device(default-policy-tag)# remote-lan rlan policy abc ext-module Verifying External Module To view the external module remote LAN configuration, use the following command: Device# show ap name ap_name lan port summary LAN Port status for AP ap_name Port ID status vlanId poe power-level RLAN ---------------------------------------------------------------------- ext-module Enabled 39 NA NA Enabled To view the external module inventory details, use the following command: Device# show ap name abc inventory NAME: AP3800, DESCR: Cisco Aironet 3800 Series (IEEE 802.11ac) Access Point PID: AIR-AP3802I-D-K9, VID: 01, SN: xxxxxxxxxxx MODULE NAME: Expansion Module, DESCR: Cisco HDK Module (rev2) PID: Unknown, SN: xxxxxxxxxxx, MaxPower: 2700mW VersionID: V22, Capabilities: RLAN (UP) Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1938 1 7 5 C H A P T E R 802.11ax Per Virtual Access Point · · Information About 802.11ax Mode Per Virtual Access Point, on page 1939 · Configuring 802.11ax Mode Per Virtual Access Point (GUI), on page 1939 · Configuring 802.11ax Mode Per Virtual Access Point, on page 1940 · Verifying 802.11ax Mode Per Virtual Access Point, on page 1940 Information About 802.11ax Mode Per Virtual Access Point Prior to Cisco IOS XE Bengaluru Release 17.4.1, the 802.11ax mode was configured per radio band. In this configuration, the 11ax mode was either enabled or disabled for all the virtual access points (AP) that were configured per radio, all at once. When 11ax was enabled per radio, the 11ac clients were not able to scan or connect to the SSID if the beacon had 11ax information elements. Client could not probe an access point (AP), if the beacon has 11ax IE. Therefore, a 11ax configuration knob per virtual AP is introduced, from Cisco IOS XE Bengaluru Release 17.5.1. This knob is introduced under the WLAN profile. By default, the 11ax knob per VAP is now enabled on the controller. Note For 6-GHz radio, the 802.11ax parameters are taken from the multi BSSID profile tagged to the corresponding 6-GHz RF profile of the AP. So, the WLAN dot11ax parameters are overriden by multi BSSID profile parameters in the case of 6-GHz. There are no changes for 2.4 and 5-GHz band WLANs. They continue to use the WLAN parameters for 802.11ax. Configuring 802.11ax Mode Per Virtual Access Point (GUI) Procedure Step 1 Step 2 Choose Configuration > Tags & Profiles > WLANs. Click Add. The Add WLAN window is displayed. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1939 Configuring 802.11ax Mode Per Virtual Access Point WLAN Step 3 Step 4 Step 5 Click the Advanced tab. In the 11ax section, check the Enable 11ax check box to enable 802.11ax operation status on the WLAN. Note When 11ax is disabled, beacons will not display 11ax IE, and all the 11ax features will be operationally disabled on the WLAN. Click Apply to Device. Configuring 802.11ax Mode Per Virtual Access Point Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wlan wlan-profile-name Example: Device(config)# wlan wlan-profile Step 3 dot11ax Example: Device(config-wlan)# dot11ax Step 4 no dot11ax Example: Device(config-wlan)# no dot11ax Purpose Enters global configuration mode. Specifies the WLAN name and enters the WLAN configuration mode. Configures 802.11ax on a WLAN. Disables 802.11ax on the WLAN profile. Verifying 802.11ax Mode Per Virtual Access Point To display the status of the 11ax parameter, run the following command: Device# show wlan id 6 WLAN Profile Name : power ================================================ Identifier :6 Description : Network Name (SSID) : power Status : Enabled Broadcast SSID : Enabled Advertise-Apname : Disabled Universal AP Admin : Disabled Max Associated Clients per WLAN :0 Max Associated Clients per AP per WLAN :0 Max Associated Clients per AP Radio per WLAN : 200 . Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1940 WLAN Verifying 802.11ax Mode Per Virtual Access Point . . 802.11ac MU-MIMO 802.11ax parameters 802.11ax Operation Status OFDMA Downlink OFDMA Uplink MU-MIMO Downlink MU-MIMO Uplink BSS Target Wake Up Time BSS Target Wake Up Time Broadcast Support . . . : Enabled : Enabled : Enabled : Enabled : Enabled : Enabled : Enabled : Enabled Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1941 Verifying 802.11ax Mode Per Virtual Access Point WLAN Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1942 1 7 6 C H A P T E R BSS Coloring · Information About BSS Coloring , on page 1943 · Configuring BSS Color on AP (GUI), on page 1944 · Configuring BSS Color in the Privileged EXEC Mode, on page 1945 · Configuring BSS Color Globally (GUI), on page 1945 · Configuring BSS Color in the Configuration Mode, on page 1946 · Configuring Overlapping BSS Packet Detect (GUI), on page 1946 · Configuring OBSS-PD Spatial Reuse Globally (CLI), on page 1947 · Configuring OBSS PD in an RF Profile (GUI), on page 1947 · Configuring OBSS-PD Spatial Reuse in the RF Profile Mode (CLI), on page 1948 · Verifying BSS Color and OBSS-PD, on page 1948 Information About BSS Coloring The 802.11 Wi-Fi standard minimizes the chance of multiple devices interfering with one another by transmitting at the same time. This carrier-sense multiple access with collision avoidance (CSMA/CA) technology is based on static thresholds that allow Wi-Fi devices to avoid interfering with each other on air. However, with an increase in density and the number of Wi-Fi devices, these static thresholds often lead to CSMA/CA causing devices to defer transmissions unnecessarily. For example, if two devices that are associated with different BSS, can hear every transmission from each other at relatively low signal strengths, each device should defer its transmission when it receives a transmission from the other. But if both the devices were to transmit at the same time, it is likely that neither would cause enough interference at the other BSS' receiver to cause reception failure for either transmission. Devices today must demodulate packets to look at the MAC header in order to determine whether or not a received packet belongs to their own BSS. This process of demodulation consumes power, which can be saved if devices can quickly identify the BSS by looking at the PHY header alone, and subsequently drop packets that are from a different BSS. Prior to Wi-Fi 6, there was no provision for devices to do this. The new 802.11ax (Wi-Fi 6) standard addresses both of the issues discussed above, through the new BSS Coloring and Spatial Reuse mechanism. BSS Coloring is a new provision that allows devices operating in the same frequency space to quickly distinguish between packets from their own BSS and packets from an Overlapping BSS (OBSS), by simply looking at the BSS color value contained in the HE PHY header. In some scenarios, Spatial Reuse allows devices, to transmit at the same time as the OBSS packets they receive, instead of deferring transmissions because of legacy interference thresholds. Since every Wi-Fi 6 device understands the BSS color, it can be leveraged to increase power savings by dropping packets earlier, and to identify spatial reuse opportunities. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1943 BSS Coloring WLAN BSS Coloring BSS Coloring is a method used to differentiate between the BSS of access points and their clients on the same RF channel. Wi-Fi 6 enables each AP radio to assign a value (from 1 to 63), known as BSS color, to be included in the PHY header of all HE transmissions from devices in its BSS. With devices of each BSS transmitting a locally-unique color, a device can quickly and easily distinguish transmissions coming from its BSS from those of a neighboring BSS. The following platforms support this feature: · Cisco Catalyst 9800 Series Wireless Controllers · Cisco Catalyst 9115 Access Points · Cisco Catalyst 9120AX Series Access Points · Cisco Catalyst 9124AX Series Access Points · Cisco Catalyst 9130AX Access Points OBSS-PD and Spatial Reuse Overlapping BSS Packet Detect (OBSS-PD) is a more aggressive Wi-Fi packet detect threshold for inter-BSS packets, which can be higher than the typical/legacy -82 dBm. Inter-BSS packets are easily identified by comparing the BSS color in the HE PHY header of the packets received with the BSS color of the device. In OBSS-PD based Spatial Reuse, to improve throughput and network efficiency by increasing transmitting opportunities, a Wi-Fi 6 or 802.11ax device can transmit over an inter-BSS packet with an RSSI that is below the OBSS-PD threshold instead of deferring. Note Cisco Catalyst 9120AX Series Access Points do not support OBSS-PD. Configuring BSS Color on AP (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Wireless > Access Points. Click the 5 GHz Radios section or the 2.4 GHz Radios section. The list of the AP radios in the band is displayed. Click the required AP name. The Edit Radios window is displayed. From the Edit Radios window, select the Configure tab. The general information, Antenna Parameters, RF Channel Assignment, Tx Power Level Assignment, and BSS Color are displayed. In the BSS Color area and from the BSS Color Configuration drop-down list, choose Custom configuration · Custom: To manually select the BSS color configuration for the AP radio. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1944 WLAN Configuring BSS Color in the Privileged EXEC Mode a. Click the BSS Color Status field to disable or enable the feature. b. In the Current BSS Color field, specify a corresponding BSS color for the AP radio. The valid range is between 1 and 63. Step 6 Click Update & Apply to Device. Configuring BSS Color in the Privileged EXEC Mode Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. Step 2 ap name ap-name dot11 {24ghz |5ghz| 6ghz Sets the BSS color on the 2.4-GHz, 5-GHz, | dual-band [ slot slot-id ]} dot11ax bss-color 6-GHz, or dual-band radio, for a specific access <1-63> point on the following slots: Example: · 5 GHz: Slot 1 and 2 Device#ap name apn dot11 24ghz slot 0 dot11ax bss-color 12 Example: · 2.4 GHz: Slot 0 · 6-GHz: Slot 3 Device#ap name apn no dot11 24ghz slot 0 dot11ax bss-color · Dual-band: Slot 0 Use the no form of this command to disable BSS color. Configuring BSS Color Globally (GUI) Procedure Step 1 Step 2 Choose Configuration > Radio Configurations > Parameters. In the 11ax Parameters section, enable BSS color globally for the 5 GHz and 2.4 GHz radios by checking the BSS Color check box. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1945 Configuring BSS Color in the Configuration Mode WLAN Configuring BSS Color in the Configuration Mode Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password if prompted. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 [no] ap dot11 {24ghz |5ghz | 6ghz } dot11ax Enables the 802.11ax BSS color on all 2.4-GHz bss-color or 5-GHz or 6-GHz radios. Example: Device(config)#[no] ap dot11 24ghz dot11ax bss-color Use the no form of this command to disable BSS color. Configuring Overlapping BSS Packet Detect (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Radio Configurations > Parameters. The parameters page is displayed where you can configure global parameters for 5 GHz Band and 2.4 GHz Band radios. In the 11ax Parameters section, check the OBSS PD check box to enable the overlapping BSS packet detect (OBSS PD) feature. In the Non-SRG OBSS PD Max Threshold field, enter the threshold in decibel-milliwatts. Value range is between -82 dBm and -62 dBm. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1946 WLAN Configuring OBSS-PD Spatial Reuse Globally (CLI) Configuring OBSS-PD Spatial Reuse Globally (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 [no] ap dot11 {24ghz |5ghz } dot11ax spatial-reuse obss-pd Example: Device(config)#[no] ap dot11 24ghz dot11ax spatial-reuse obss-pd Configures 802.11ax OBSS PD based spatial reuse on all 2.4-GHz or 5-GHz radios. Use the no form of this command to disable this feature. Step 3 ap dot11 {24ghz |5ghz } dot11ax Configure 802.11ax non-SRG OBSS PD max spatial-reuse obss-pd non-srg-max -82 - -62 on all 2.4-GHz or 5-GHz radios. The default Example: value is -62. Device(config)#[no] ap dot11 24ghz dot11ax spatial-reuse obss-pd non-srg-max -62 Configuring OBSS PD in an RF Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Tags & Profiles > RF. On theRF Profile page, click Add to configure the following: · General · 802.11 · RRM · Advanced In the Advanced tab, under the 11ax Parameters section, complete the following: a) Use the toggle button to enable or disable the OBSS PD field. b) In the Non-SRG OBSS PD Max Threshold (dBm), enter the threshold value. The default value is -62 dBm. Values range between -82 dBm and -62 dBm. Click Save & Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1947 Configuring OBSS-PD Spatial Reuse in the RF Profile Mode (CLI) WLAN Configuring OBSS-PD Spatial Reuse in the RF Profile Mode (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap dot11 {24ghz | 5ghz | 6ghz } rf-profile Configures an RF profile and enters RF profile rf-profile-name configuration mode. Example: Device(config)# ap dot11 24ghz rf-profile rfprof24_1 Step 3 [no] dot11ax spatial-reuse obss-pd Example: Device(config-rf-profile)#[no] dot11ax spatial-reuse obss-pd Configures 802.11ax OBSS PD based spatial reuse in the RF profile configuration mode. Use the no form of this command to disable this feature. Step 4 dot11ax spatial-reuse obss-pd non-srg-max Configure 802.11ax non-SRG OBSS PD max -82 - -62 on all 2.4-GHz or 5-GHz or 6-GHz radios. The Example: default value is -62. Device(config-rf-profile)# dot11ax spatial-reuse obss-pd non-srg-max -62 Verifying BSS Color and OBSS-PD To verify if the global per-band BSS color and OBSS-PD are enabled, use the following show command: Device# show ap dot11 24ghz network 802.11b Network 11gSupport 11nSupport . . . 802.11ax DynamicFrag MultiBssid Target Wakeup Time Target Wakeup Time Broadcast BSS Color OBSS PD Non-SRG OBSS PD Max 802.11ax MCS Settings: MCS 7, Spatial Streams = 1 . . . : Enabled : Enabled : Enabled : Enabled : Enabled : Enabled : Enabled : Enabled : Enabled : Enabled : -62 dBm : Supported Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1948 WLAN Verifying BSS Color and OBSS-PD To view the RF profile OBSS-PD configuration, use the following show command: Device# show ap rf-profile name rf-profile-name detail Description : pre configured rfprofile for 5gh radio RF Profile Name : rf-profile-name Band : 5 GHz Transmit Power Threshold v1 : -65 dBm Min Transmit Power : 7 dBm Max Transmit Power : 30 dBm . . . 802.11ax OBSS PD : Enabled Non-SRG OBSS PD Max : -62 dBm NDP mode : Auto To view the BSS color configuration of all the AP radios on a band in the summary list, along with Channel, TX Power and so on, use the following show command: Device# show ap dot11 24ghz summary extended AP Name Mac Address Slot Admin State Oper State Width Txpwr Channel BSS Color ------------------------------------------------------------------------------------------------------------------------------------------------------ Ed2-JFW-AP1 84b2.61ba.4730 1 Enabled Up 40 1/6 (17 dBm) (136,132)* 11AX-9120-AP1 d4ad.bda2.3fc0 1 Enabled Up 20 1/8 (23 dBm) (36) 30 Ed2-JFW-AP2 f8c2.8885.59f0 1 Enabled Up 20 1/5 (15 dBm) (40) To view the BSS color configuration and the capability of an AP radio, use the following show commands: Device# show ap name AP7069.5A74.816C config dot11 24ghz Cisco AP Identifier : 502f.a876.1e60 Cisco AP Name : AP7069.5A74.816C Attributes for Slot 0 Radio Type : 802.11b Radio Mode : REAP Radio Role : Auto Radio SubType : Main Administrative State : Enabled Operation State : Up . . . Phy OFDM Parameters Configuration : Automatic Current Channel :6 Channel Width : 20 MHz TI Threshold : 1157693440 Antenna Type : External External Antenna Gain (in .5 dBi units) :8 . . . !BSS color details are displayed below: 802.11ax Parameters HE Capable : Yes BSS Color Capable : Yes BSS Color Configuration : Customized Current BSS Color : 34 Device# show ap name AP70XX.5XX4.8XXX config slot 0 Cisco AP Identifier : 502f.a876.1e60 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1949 Verifying BSS Color and OBSS-PD Cisco AP Name Country Code AP Country Code AP Regulatory Domain MAC Address IP Address Configuration IP Address . . . Attributes for Slot 0 Radio Type Radio Role Radio Mode Radio SubType Administrative State . . . Phy OFDM Parameters Configuration Current Channel Channel Assigned By Extension Channel Channel Width Allowed Channel List TI Threshold DCA Channel List Antenna Type External Antenna Gain (in .5 dBi units) Diversity 802.11n Antennas A B C D . . . !BSS color details are displayed below: 802.11ax Parameters HE Capable BSS Color Capable BSS Color Configuration Current BSS Color . . . : AP70XX.5XX4.8XXX : US : US - United States : -A : 7069.5a74.816c : DHCP : Disabled : 802.11n - 2.4 GHz : Auto : REAP : Main : Enabled : Automatic :6 : DCA : NONE : 20 : 1,2,3,4,5,6,7,8,9,10,11 : 1157693440 : : EXTERNAL_ANTENNA :8 : DIVERSITY_ENABLED : ENABLED : ENABLED : ENABLED : ENABLED : Yes : Yes : Customized : 34 WLAN Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1950 1 7 7 C H A P T E R DHCP for WLANs · Information About Dynamic Host Configuration Protocol, on page 1951 · Restrictions for Configuring DHCP for WLANs, on page 1954 · Guidelines for DHCP Relay Configuration, on page 1954 · How to Configure DHCP for WLANs, on page 1955 · Configuring the Internal DHCP Server, on page 1957 · Configuring DHCP-Required for FlexConnect, on page 1967 Information About Dynamic Host Configuration Protocol You can configure WLANs to use the same or different Dynamic Host Configuration Protocol (DHCP) servers or no DHCP server. Two types of DHCP servers are available--internal and external. Internal DHCP Servers The device contains an internal DHCP server. This server is typically used in branch offices that do not have a DHCP server. The internal server provides DHCP addresses to wireless clients, direct-connect APs, and DHCP requests that are relayed from APs. Only lightweight APs are supported. If you want to use the internal DHCP server, ensure that you configure SVI for the client VLAN, and set the IP address as DHCP server IP address. DHCP option 43 is not supported on the internal server. Therefore, the APs must use an alternative method to locate the management interface IP address of the device, such as local subnet broadcast, Domain Name System (DNS), or priming. When clients use the internal DHCP server of the device, IP addresses are not preserved across reboots. As a result, multiple clients can be assigned to the same IP address. To resolve any IP address conflicts, clients must release their existing IP address and request a new one. Note · VRF is not supported in the internal DHCP servers. · DHCPv6 is not supported in the internal DHCP servers. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1951 External DHCP Servers WLAN General Guidelines · Internal DHCP server serves both wireless client and wired client (wired client includes AP). · To serve wireless client with internal DHCP server, an unicast DHCP server IP address must be configured for wireless client. Internal DHCP server IP address must be configured under the server facing interface, which can be loopback interface, SVI interface, or L3 physical interface. · To use internal DHCP server for both wireless and wired client VLAN, an IP address must be configured under client VLAN SVI interface. · For wireless client, in DHCP helper address configuration, the IP address of the internal DHCP server must be different from address of wireless client VLAN SVI interface. · For wireless client with internal DHCP server support, the internal DHCP server can be configured using global configuration command, under the client VLAN SVI interface or under the wireless policy profile. · An internal DHCP server pool can also serve clients of other controllers . External DHCP Servers The operating system is designed to appear as a DHCP relay to the network and as a DHCP server to clients with industry-standard external DHCP servers that support DHCP Relay, which means that each controller appears as a DHCP relay agent to the DHCP server, and as a DHCP server in the virtual IP address to wireless clients. Because the controller captures the client IP address that is obtained from a DHCP server, it maintains the same IP address for that client during intra controller, inter controller, and inter-subnet client roaming. Note External DHCP servers support DHCPv6. DHCP Assignments You can configure DHCP on a per-interface or per-WLAN basis. We recommend that you use the primary DHCP server address that is assigned to a particular interface. You can assign DHCP servers for individual interfaces. You can configure the management interface, AP manager interface, and dynamic interface for a primary and secondary DHCP server, and configure the service-port interface to enable or disable DHCP servers. You can also define a DHCP server on a WLAN (in this case, the server overrides the DHCP server address on the interface assigned to the WLAN). Security Considerations For enhanced security, we recommend that you ask all clients to obtain their IP addresses from a DHCP server. To enforce this requirement, you can configure all the WLANs with a DHCP Address. Assignment Required setting, which disallows client static IP addresses. If DHCP Address Assignment Required is selected, clients must obtain an IP address through DHCP. Any client with a static IP address is not allowed on the network. The controller monitors DHCP traffic because it acts as a DHCP proxy for the clients. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1952 WLAN DHCP Option 82 Note · WLANs that support management over wireless must allow management (device-servicing) clients to obtain an IP address from a DHCP server. · The operating system is designed to appear as a DHCP relay to the network and as a DHCP server to clients with industry-standard external DHCP servers that support DHCP relay. This means that each controller appears as a DHCP relay to the DHCP server and as a DHCP server at the virtual IP address to wireless clients. You can create WLANs with DHCP Address Assignment Required disabled. If you do this, clients have the option of using a static IP address or obtaining an IP address from a designated DHCP server. However, note that this might compromise security. Note DHCP Address Assignment Required is not supported for wired guest LANs. You can create separate WLANs with DHCP Address Assignment Required configured as disabled. This is applicable only if DHCP proxy is enabled for the controller. You must not define the primary or secondary configuration DHCP server instead you should disable the DHCP proxy. These WLANs drop all the DHCP requests and force clients to use a static IP address. These WLANs do not support management over wireless connections. DHCP Option 82 DHCP option 82 provides additional security when DHCP is used to allocate network addresses. It enables the controller to act as a DHCP relay agent to prevent DHCP client requests from untrusted sources. You can configure the controller to add option 82 information to DHCP requests from clients before forwarding the requests to the DHCP server. Figure 52: DHCP Option 82 The AP forwards all the DHCP requests from a client to the controller. The controller adds the DHCP option 82 payload and forwards the request to the DHCP server. The payload can contain the MAC address or the MAC address and SSID of the AP, depending on how you configure this option. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1953 Restrictions for Configuring DHCP for WLANs WLAN Note DHCP packets that already include a relay agent option are dropped at the controller. For DHCP option 82 to operate correctly, DHCP proxy must be enabled. Restrictions for Configuring DHCP for WLANs · If you override the DHCP server in a WLAN, you must ensure that you configure the underlying Cisco IOS configuration to make sure that the DHCP server is reachable. · WLAN DHCP override works only if DHCP service is enabled on the controller. You can configure DHCP service in either of the following ways: · Configuring the DHCP pool on the controller. · Configuring a DHCP relay agent on the SVI. Note that the VLAN of the SVI must be mapped to the WLAN where DHCP override is configured. Guidelines for DHCP Relay Configuration Relay Agent Source IP · If you configure source interface VLAN in the SVI interface, the IP address of the VLAN interface configured as source is used. · If the Realy Agent source IP is not mentioned, the IP address of the SVI interface created for the corresponding client's VLAN is used. · If the Realy Agent source IP is not mentioned, the source address specified at the global level is used. Note · The DHCP packets are sourced from the IP address of the Wireless Management Interface (WMI), if VLAN is not configured in the policy profile and AAA override. · The SVI interface configuration is mandatory to achieve the DHCP relay functionality in central DHCP or local switching. · Even though many interface options are available in the ip dhcp relay source-interface <> command, only VLAN interface is applicable. DHCP Server · If the DHCP server address is configured in the wireless policy profile, the server address configured in the policy profile takes precedence. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1954 WLAN How to Configure DHCP for WLANs · If the DHCP server address is not configured in the policy profile, the server address configured in SVI takes precedence. Note You can configure two server addresses in the SVI. In this case, the DHCP packets from the client are sent to both the servers. The Option 82 configured in policy profile, SVI, and globally is considered and honoured together. How to Configure DHCP for WLANs Configuring DHCP Scopes (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Step 15 Choose Administration > DHCP Pools. In the Pools section, click Add to add a new DHCP pool. The Create DHCP Pool dialog box is displayed. In the DHCP Pool Name field, enter a name for the new DHCP pool. From the IP Type drop-down list, choose the IP address type. In the Network field, enter the network served by this DHCP scope. This IP address is used by the management interface with netmask applied, as configured in the Interfaces window. In the Subnet Mask field, enter the subnet mask assigned to all the wireless clients. In the Starting ip field, enter the starting IP address. In the Ending ip field, enter the trailing IP address. In the Reserved Only field, enable or disable it. From the Lease drop-down list, choose the lease type as either User Defined or Never Expires. If you choose User Defined, you can enter the amount of time that an IP address is granted to a client. To perform advanced configuration for DHCP scope, click Advanced. Check the Enable DNS Proxy check box to enable DNS proxy. In the Default Router(s) field, enter the IP address of the optional router or routers that connect to the device and click the + icon to add them to the list. Each router must include a DHCP forwarding agent that enables a single device to serve the clients of multiple devices. In the DNS Server(s) field, enter the IP address of the optional DNS server or servers and click the + icon to add them to the list. Each DNS server must be able to update a client's DNS entry to match the IP address assigned by the DHCP scope. In the NetBios Name Server(s) field, enter the IP address of the optional Microsoft NetBIOS name server or servers, such as Microsoft Windows Internet Naming Service (WINS) server, and click the + icon to add them to the list. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1955 Configuring DHCP Scopes (CLI) WLAN Step 16 Step 17 Step 18 Step 19 In the Domain field, enter the optional domain name of the DHCP scope for use with one or more DNS servers. To add DHCP options, click Add in the DHCP Options List section. DHCP provides an internal framework for passing configuration parameters and other control information, such as DHCP options, to the clients on your network. DHCP options carry parameters as tagged data stored within protocol messages exchanged between the DHCP server and its clients. Enter the DHCP option that you want to add. Click Save & Apply to Device. Configuring DHCP Scopes (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ip dhcp pool pool-name Configures the DHCP pool address. Example: Device(config)# ip dhcp pool test-pool Step 3 network network-name mask-address Example: Device(dhcp-config)# network 209.165.200.224 255.255.255.0 Specifies the network number in dotted-decimal notation and the mask address. Step 4 dns-server hostname Example: Device(dhcp-config)# dns-server example.com Specifies the DNS name server. You can specify an IP address or a hostname. Step 5 end Example: Device(dhcp-config)# end Returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1956 WLAN Configuring the Internal DHCP Server Configuring the Internal DHCP Server Configuring the Internal DHCP Server Under Client VLAN SVI (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Layer2 > VLAN > SVI. Click an SVI. Click the Advanced tab. Under DHCP Relay settings, enter the IPV4 Helper Address. Click Update & Apply to Device. Configuring the Internal DHCP Server Under Client VLAN SVI (CLI) Before you begin · For wireless clients, only two DHCP servers are supported. · To use the internal DHCP server for both wireless and wired client VLAN, an IP address must be configured under the client VLAN SVI. · For wireless clients, the IP address of the internal DHCP server must be different from the address of the wireless client VLAN SVI (in the DHCP helper address configuration). · For wireless clients, the internal DHCP server can be configured under the client VLAN SVI or under the wireless policy profile. Procedure Step 1 Step 2 Step 3 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. interface loopback interface-number Example: Device(config)# interface Loopback0 Creates a loopback interface and enters interface configuration mode. ip address ip-address Configures the IP address for the interface. Example: Device(config-if)# ip address 10.10.10.1 255.255.255.255 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1957 Configuring the Internal DHCP Server Under Client VLAN SVI (CLI) WLAN Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Command or Action exit Example: Device(config-if)# exit interface vlan vlan-id Example: Device(config)# interface vlan 32 ip address ip-address Example: Device(config-if)# ip address 192.168.32.100 255.255.255.0 ip helper-address ip-address Example: Device(config-if)# ip helper-address 10.10.10.1 Purpose Exits interface configuration mode. Configures the VLAN ID. Configures the IP address for the interface. Configures the destination address for UDP broadcasts. Note If the IP address used in the ip helper-address command is an internal address of the controller an internal DHCP server is used. Otherwise, the external DHCP server is used. no mop enabled Example: Device(config-if)# no mop enabled Disables the Maintenance Operation Protocol (MOP) for an interface. no mop sysid Example: Device(config-if)# no mop sysid Disables the task of sending MOP periodic system ID messages. exit Example: Device(config-if)# exit Exits interface configuration mode. ip dhcp excluded-address ip-address Example: Specifies the IP address that the DHCP server should not assign to DHCP clients. Device(config)# ip dhcp excluded-address 192.168.32.1 ip dhcp excluded-address ip-address Example: Specifies the IP addresses that the DHCP server should not assign to DHCP clients. Device(config)# ip dhcp excluded-address 192.168.32.100 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1958 WLAN Configuring the Internal DHCP Server Under Client VLAN SVI (CLI) Step 13 Step 14 Step 15 Step 16 Step 17 Step 18 Step 19 Step 20 Step 21 Step 22 Command or Action Purpose ip dhcp pool pool-name Configures the DHCP pool address. Example: Device(config)# ip dhcp pool pool-vlan32 network network-name mask-address Example: Device(dhcp-config)# network 192.168.32.0 255.255.255.0 Specifies the network number in dotted-decimal notation, along with the mask address. default-router ip-address Example: Device(dhcp-config)# default-router 192.168.32.1 Specifies the IP address of the default router for a DHCP client. exit Example: Device(dhcp-config)# exit Exits DHCP configuration mode. wireless profile policy profile-policy Example: Configures the WLAN policy profile and enters wireless policy configuration mode. Device(config)# wireless profile policy default-policy-profile central association Example: Configures central association for locally switched clients. Device(config-wireless-policy)# central association central dhcp Example: Configures the central DHCP for locally switched clients. Device(config-wireless-policy)# central dhcp central switching Configures WLAN for central switching. Example: Device(config-wireless-policy)# central switching description policy-proile-name Example: Device(config-wireless-policy)# description "default policy profile" Adds a description for the policy profile vlan vlan-name Assigns the profile policy to the VLAN. Example: Device(config-wireless-policy)# vlan 32 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1959 Configuring the Internal DHCP Server Under a Wireless Policy Profile (GUI) WLAN Step 23 Command or Action no shutdown Example: Device(config-wireless-policy)# no shutdown Purpose Enables the wireless profile policy. Configuring the Internal DHCP Server Under a Wireless Policy Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > Policy. Click a policy name. Click the Advanced tab. Under DHCP settings, check or uncheck the IPv4 DHCP Required check box and enter the DHCP Server IP Address. Click Update & Apply to Device. Configuring the Internal DHCP Server Under a Wireless Policy Profile Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. interface loopback interface-number Example: Device(config)# interface Loopback0 Creates a loopback interface and enters interface configuration mode. ip address ip-address Configures the IP address for the interface. Example: Device(config-if)# ip address 10.10.10.1 255.255.255.255 exit Example: Device(config-if)# exit Exits interface configuration mode. interface vlan vlan-id Example: Configures the VLAN ID. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1960 WLAN Configuring the Internal DHCP Server Under a Wireless Policy Profile Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Step 15 Command or Action Device(config)# interface vlan 32 Purpose ip address ip-address Example: Device(config-if)# ip address 192.168.32.100 255.255.255.0 Configures the IP address for the interface. no mop enabled Example: Device(config-if)# no mop enabled Disables the Maintenance Operation Protocol (MOP) for an interface. no mop sysid Example: Device(config-if)# no mop sysid Disables the task of sending MOP periodic system ID messages. exit Example: Device(config-if)# exit Exits interface configuration mode. ip dhcp excluded-address ip-address Example: Specifies the IP address that the DHCP server should not assign to DHCP clients. Device(config)# ip dhcp excluded-address 192.168.32.100 ip dhcp pool pool-name Configures the DHCP pool address. Example: Device(config)# ip dhcp pool pool-vlan32 network network-name mask-address Example: Device(dhcp-config)# network 192.168.32.0 255.255.255.0 Specifies the network number in dotted-decimal notation along with the mask address. default-router ip-address Example: Device(dhcp-config)# default-router 192.168.32.1 Specifies the IP address of the default router for a DHCP client. exit Example: Device(dhcp-config)# exit Exits DHCP configuration mode. wireless profile policy profile-policy Example: Configures a WLAN policy profile and enters wireless policy configuration mode. Device(config)# wireless profile policy default-policy-profile Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1961 Configuring the Internal DHCP Server Under a Wireless Policy Profile WLAN Step 16 Step 17 Step 18 Step 19 Step 20 Step 21 Step 22 Step 23 Step 24 Step 25 Command or Action Purpose central association Example: Configures central association for locally switched clients. Device(config-wireless-policy)# central association central switching Configures local switching. Example: Device(config-wireless-policy)# central switching description policy-proile-name Example: Device(config-wireless-policy)# description "default policy profile" Adds a description for the policy profile. ipv4 dhcp opt82 Example: Device(config-wireless-policy)# ipv4 dhcp opt82 Enables DHCP Option 82 for the wireless clients. ipv4 dhcp opt82 ascii Example: Device(config-wireless-policy)# ipv4 dhcp opt82 ascii Enables ASCII on DHCP Option 82. ipv4 dhcp opt82 format vlan_id Example: Device(config-wireless-policy)# ipv4 dhcp opt82 format vlan32 Enables VLAN ID. ipv4 dhcp opt82 rid vlan_id Example: Device(config-wireless-policy)# ipv4 dhcp opt82 rid Supports the addition of Cisco 2-byte Remote ID (RID) for DHCP Option 82. ipv4 dhcp server ip-address Configures the WLAN's IPv4 DHCP server. Example: Device(config-wireless-policy)# ipv4 dhcp server 10.10.10.1 vlan vlan-name Assigns the profile policy to the VLAN. Example: Device(config-wireless-policy)# vlan 32 no shutdown Example: Enables the wireless profile policy. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1962 WLAN Configuring the Internal DHCP Server Globally (GUI) Command or Action Device(config-wireless-policy)# no shutdown Purpose Configuring the Internal DHCP Server Globally (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Administration > DHCP Pools > Pools. Click Add. The Create DHCP Pool window is displayed. Enter the DHCP Pool Name, Network, Starting ip, and Ending ip. From the IP Type, Subnet Mask, and Lease drop-down lists, choose a value. Click the Reserved Only toggle button. Click Apply to Device. Configuring the Internal DHCP Server Globally (CLI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. interface loopback interface-num Example: Device(config)# interface Loopback0 Creates a loopback interface and enters interface configuration mode. ip address ip-address Configures the IP address for the interface. Example: Device(config-if)# ip address 10.10.10.1 255.255.255.255 exit Example: Device(config-if)# exit Exits interface configuration mode. interface vlanvlan-id Example: Device(config)# interface vlan 32 Configures the VLAN ID. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1963 Configuring the Internal DHCP Server Globally (CLI) WLAN Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Step 15 Command or Action ip address ip-address Example: Device(config-if)# ip address 192.168.32.100 255.255.255.0 Purpose Configures the IP address for the interface. no mop enabled Example: Device(config-if)# no mop enabled Disables the Maintenance Operation Protocol (MOP) for an interface. no mop sysid Example: Device(config-if)# no mop sysid Disables the task of sending the MOP periodic system ID messages. exit Example: Device(config-if)# exit Exits the interface configuration mode. ip dhcp-server ip-address Example: Device(config)# ip dhcp-server 10.10.10.1 Specifies the target DHCP server parameters. ip dhcp excluded-address ip-address Example: Specifies the IP address that the DHCP server should not assign to DHCP clients. Device(config)# ip dhcp excluded-address 192.168.32.100 ip dhcp pool pool-name Configures the DHCP pool address. Example: Device(config)# ip dhcp pool pool-vlan32 network network-name mask-address Example: Device(dhcp-config)# network 192.168.32.0 255.255.255.0 Specifies the network number in dotted-decimal notation along with the mask address. default-router ip-address Example: Device(dhcp-config)# default-router 192.168.32.1 Specifies the IP address of the default router for a DHCP client. exit Example: Device(dhcp-config)# exit Exits DHCP configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1964 WLAN Verifying Internal DHCP Configuration Step 16 Step 17 Step 18 Step 19 Step 20 Step 21 Step 22 Command or Action Purpose wireless profile policy profile-policy Example: Configures a WLAN policy profile and enters wireless policy configuration mode. Device(config)# wireless profile policy default-policy-profile central association Example: Configures central association for locally switched clients. Device(config-wireless-policy)# central association central dhcp Example: Configures central DHCP for locally switched clients. Device(config-wireless-policy)# central dhcp central switching Configures local switching. Example: Device(config-wireless-policy)# central switching description policy-proile-name Example: Device(config-wireless-policy)# description "default policy profile" Adds a description for the policy profile. vlan vlan-name Assigns the profile policy to the VLAN. Example: Device(config-wireless-policy)# vlan 32 no shutdown Example: Device(config-wireless-policy)# no shutdown Enables the profile policy. Verifying Internal DHCP Configuration To verify client binding, use the following command: Device# show ip dhcp binding Bindings from all pools not associated with VRF: IP address Client-ID/ Lease expiration Interface Hardware address/ User name 192.168.32.3 0130.b49e.491a.53 Mar 23 2018 06:42 PM Loopback0 Type State Automatic Active Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1965 Verifying Internal DHCP Configuration WLAN To verify the DHCP relay statistics for a wireless client, use the following command: Device# show wireless dhcp relay statistics DHCP Relay Statistics --------------------- DHCP Server IP : 10.10.10.1 Message Count -------------------------- DHCPDISCOVER :1 BOOTP FORWARD : 137 BOOTP REPLY :0 DHCPOFFER :0 DHCPREQUEST : 54 DHCPACK :0 DHCPNAK :0 DHCPDECLINE :0 DHCPRELEASE :0 DHCPINFORM : 82 Tx/Rx Time : -----------LastTxTime : 18:42:18 LastRxTime : 00:00:00 Drop Counter : ------------TxDropCount : 0 To verify the DHCP packet punt statistics in CPP, use the following command: Device# show platform hardware chassis active qfp feature wireless punt statistics CPP Wireless Punt stats: App Tag ------CAPWAP_PKT_TYPE_DOT11_PROBE_REQ CAPWAP_PKT_TYPE_DOT11_MGMT CAPWAP_PKT_TYPE_DOT11_IAPP CAPWAP_PKT_TYPE_DOT11_RFID CAPWAP_PKT_TYPE_DOT11_RRM CAPWAP_PKT_TYPE_DOT11_DOT1X CAPWAP_PKT_TYPE_CAPWAP_KEEPALIVE CAPWAP_PKT_TYPE_MOBILITY_KEEPALIVE CAPWAP_PKT_TYPE_CAPWAP_CNTRL CAPWAP_PKT_TYPE_CAPWAP_DATA CAPWAP_PKT_TYPE_MOBILITY_CNTRL WLS_SMD_WEBAUTH SISF_PKT_TYPE_ARP SISF_PKT_TYPE_DHCP SISF_PKT_TYPE_DHCP6 SISF_PKT_TYPE_IPV6_ND SISF_PKT_TYPE_DATA_GLEAN SISF_PKT_TYPE_DATA_GLEAN_V6 SISF_PKT_TYPE_DHCP_RELAY CAPWAP_PKT_TYPE_CAPWAP_RESERVED Packet Count ------------ 14442 50 9447 0 0 0 2191 0 7034 0 0 0 5292 140 1213 350 44 51 122 0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1966 WLAN Configuring DHCP-Required for FlexConnect Configuring DHCP-Required for FlexConnect Information About FlexConnect DHCP-Required The DHCP-Required knob on a policy profile forces a connected wireless client to get the IP address from DHCP. When the client completes the DHCP process and acquires an IP address, this IP address is learnt by the controller and only then the client traffic is switched on to the network. The DHCP-Required feature is already supported in central switching. In Cisco IOS XE Amsterdam 17.2.1, the feature is supported on FlexConnect local switching clients. Prior to Release 17.2.1, DHCP-Required was not enforced on FlexConnect local switching clients. The IP address learnt by the AP or the controller for the wireless client is tracked to create an IP-MAC binding. As part of this feature, when a FlexConnect local switching client roams from one AP to another, the client need not do the DHCP again in the same L2 network, because the controller tracks the IP address and pushes the binding to the newly roaming AP. The FlexConnect DHCP-Required feature can be configured from open configuration models, CLI, and from the GUI. The CLI and GUI configurations are described in this chapter. For more information about the open configuration modes, see the https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/prog/configuration/172/b_ 172_programmability_cg.html. Restrictions and Limitations for FlexConnect DHCP-Required The following are the restrictions and limitations for the FlexConnect DHCP-Required feature: · The DHCP-Required feature is applicable for IPv4 addresses only. · The IP-MAC binding can be pushed to other APs only through the custom policy profile. IP-MAC binding is not available in the default policy. The mapping is propagated to all the APs in the same custom policy profile. · The DHCP-Required feature works on IP-MAC binding basis and is not supported with third party workgroup bridge (WGB), where WGB wired client information is not shared to AP by the WGB. · Cisco Wave 2 APs take 180 seconds to remove a client entry with static IP, when DHCP-required is enabled. Configuring FlexConnect DHCP-Required (GUI) Perform the steps given below to configure the FlexConnect DHCP-Required feature through the GUI: Procedure Step 1 Step 2 Step 3 Choose Configuration > Tags & Profiles > Policy. On the Policy window, click the name of the corresponding Policy Profile. The Edit Policy Profile window is displayed. Click the Advanced tab. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1967 Configuring FlexConnect DHCP-Required (CLI) WLAN Step 4 Step 5 In the DHCP section, check the IPv4 DHCP Required check box to enable the feature. Click Update & Apply to Device. Configuring FlexConnect DHCP-Required (CLI) Perform the procedure given below to configure FlexConnect DHCP-Required through the CLI: Procedure Step 1 Command or Action configure terminal Example: Device#configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-policy Example: Device#wireless profile policy rr-xyz-policy-1 Configures WLAN policy profile and enters the wireless policy configuration mode. Step 3 ipv4 dhcp required Example: Enables the FlexConnect DHCP-Required feature. Device(config-wireless-policy)#ipv4 dhcp required Step 4 no shutdown Example: Device(config-wireless-policy)#no shutdown Saves the configuration. Verifying FlexConnect DHCP-Required · To verify the IP address learnt for a client on an IP DHCP-Required policy-enabled WLAN, use the show wireless client summary command: Note The controller or AP does not learn the IP address through other means such as ARP or data gleaning, when IPv4 DHCP-Required is enabled. Device# show wireless client summary Number of Clients: 1 MAC Address AP Name Type ID State Protocol Method Role ------------------------------------------------------------------------------------------------------------------------- 1cXX.bXXX.59XX APXXXX.7XXX.4XXX WLAN 3 IP Learn 11ac Dot1x Local Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1968 WLAN Verifying FlexConnect DHCP-Required · This example shows that the client IP is in the Run state, indicating that the client has received the IP address from DHCP: Device# show wireless client summary Number of Clients: 1 MAC Address AP Name Type ID State Protocol Method Role ------------------------------------------------------------------------------------------------------------------------- 5XXX.37XX.c3XX APXXXX.4XXX.4XXX WLAN 3 Run 11n(5) None Local Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1969 Verifying FlexConnect DHCP-Required WLAN Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1970 1 7 8 C H A P T E R Aironet Extensions IE (CCX IE) · Information About Aironet Extensions Information Element , on page 1971 · Configuring Aironet Extensions IE (GUI), on page 1971 · Configuring Aironet Extensions IE (CLI), on page 1971 · Verifying the Addition of AP Name, on page 1972 Information About Aironet Extensions Information Element The Cisco Aironet Extensions Information Element (IE) is an attribute used by Cisco devices for better connectivity. It contains information such as the AP name, device type, radio type, AP load, and the number of associated clients, in the beacon and probe responses of the WLAN. The Cisco Client Extensions use this information to associate with the best AP. The Aironet Extensions IE configuration is disabled by default. With this feature you can set the AP name not through enabling the whole IE extension, but by just inserting just the AP name. Configuring Aironet Extensions IE (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Tags & Profiles > WLANs . In the WLANs window, click Add. In the Add WLAN window, under the Advanced tab, check the Aironet IE check box to enable Aironet IE on the WLAN. Click Apply to Device. Configuring Aironet Extensions IE (CLI) Perform this procedure to create a WLAN and enable the Aironet Extensions IE feature on the WLAN: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1971 Verifying the Addition of AP Name WLAN Note For more information about the open configuration models, refer to the Programmability Configuration Guide, Cisco IOS XE Amsterdam 17.1.x. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wlan profile-name wlan-id [ssid] Example: Device(config)# wlan mywlan 34 mywlan-ssid Purpose Enters global configuration mode. Specifies the WLAN name and ID: · profile-name: Profile name. The range is from 1 to 32 alphanumeric characters. · wlan-id: WLAN ID. The range is from 1 to 512. · ssid: Service Set Identifier (SSID) for this WLAN. If the SSID is not specified, the WLAN profile name is set as the SSID. Note By default, the WLAN is disabled. Step 3 [no] ccx aironet-iesupport Configures the Cisco Client Extensions option Example: and sets the support of Aironet IE on the WLAN. Device(config-wlan)#ccx aironet-iesupport (Use the no form of this command to disable the configuration.) What to do next 1. Create a policy tag. For more information about creating policy tags, refer to Configuring a Policy Tag (CLI). 2. Map the policy tag to the AP. For more information about mapping a policy tag to the AP, refer to Attaching a Policy Tag and Site Tag to an AP (CLI). Verifying the Addition of AP Name The following example shows how to verify the addition of the AP Name (using Open Configuration) in the beacon without enabling IE: Device# show wlan id 1 WLAN Profile Name : wlan-test ================================================ Identifier :1 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1972 WLAN Verifying the Addition of AP Name Description : Network Name (SSID) : wlan2 Status : Disabled Broadcast SSID : Enabled Advertise-Apname : Enabled Universal AP Admin : Disabled Max Associated Clients per WLAN :0 Max Associated Clients per AP per WLAN :0 Max Associated Clients per AP Radio per WLAN : 200 OKC : Enabled Number of Active Clients :0 CHD per WLAN : Enabled WMM : Allowed Channel Scan Defer Priority: Priority (default) :5 Priority (default) :6 Scan Defer Time (msecs) : 100 Media Stream Multicast-direct : Disabled CCX - AironetIe Support : Disabled Peer-to-Peer Blocking Action : Disabled Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1973 Verifying the Addition of AP Name WLAN Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1974 1 7 9 C H A P T E R Device Analytics · Device Analytics, on page 1975 · Adaptive 802.11r, on page 1979 Device Analytics Information About Device Analytics The Device Analytics feature enhances the enterprise Wi-Fi experience for client devices to ensure seamless connectivity. This feature provides a set of data analytics tools for analysing wireless client device behaviour. With device profiling enabled on the controller, information is exchanged between the client device and the controller and AP. This data is encrypted using AES-256-CBC to ensure device security. Starting from Cisco IOS XE Bengaluru 17.6.1, this feature is supported on Intel devices with AC9560, AC8561, AX201, AX200, AX1650, AX210, AX211, and AX1675 chipsets. Device information and other information received from the Intel devices are shared with Cisco DNA-C. It will also be used to enhance device profiling on the controller. Note From Cisco IOS XE Dublin 17.12.1, MacBook Analytics is supported on the controller when the MacBook device sends 11k action frames along with the model information. Note Apple clients such as iPhones and iPads use 802.11k action frames to send device information to the controller. When they fail to send 802.11k action frames, the controller will not perform device classification based on the 802.11 protocol. Hence, this falls back to legacy device classification which is based on HTTP and DHCP protocols. Restrictions for Device Analytics · This feature is applicable only for Cisco device ecosystem partners. · This feature is supported only on the 802.11ax and Wave 2 APs. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1975 Configuring Device Analytics (GUI) WLAN · This feature is supported using central authentication in either local mode or Flexconnect mode. · To support Intel devices, AP should have PMF capability and PMF should set to optional or required on the WLAN. Configuring Device Analytics (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Configuration > Tags & Profiles > WLANs. On the WLANs page, click the name of the WLAN. In the Edit WLAN window, click the Advanced tab. In the Device Analytics section, select the Advertise Support check box. Select the Advertise PC Analytics Support check box to enable PC analytics on the WLAN. (Optional) In the Device Analytics section, select the Share Data with Client check box. Click Update & Apply to Device. Configuring Device Analytics (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wlan wlan-name wlan-id SSID-name Enters the WLAN configuration sub-mode. Example: Device(config)# wlan device_analytics 1 device_analytics · wlan-name--Enter the profile name. The range is from 1 to 32 alphanumeric characters. · wlan-id--Enter the WLAN ID. The range is from 1 to 512. · SSID-name--Enter the Service Set Identifier (SSID) for this WLAN. If the SSID is not specified, the WLAN profile name is set as the SSID. Note If you have already configured WLAN, enter wlan wlan-name command. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1976 WLAN Verifying Device Analytics Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action Purpose client association limit {clients-per-wlan | apclients-per-ap-per-wlan | radio clients-per-ap-radio-per-wlan} Sets the maximum number of clients, clients per AP, or clients per AP radio that can be configured on a WLAN. Example: Device(config)# client association limit 11 [no] device-analytics Example: Device(config)# device-analytics This is enabled by default. Enables or disables device analytics. WLANs advertise analytics capability in beacons & probe responses. [no] device-analytics [export] When export option is set, the information from Example: Cisco devices are shared with compatible clients (such as, Samsung devices). Here, information Device(config)# device-analytics export from Cisco devices refer to the Cisco controller details, AP version, and model number. This configuration is disabled by default. device-analytics pc-analytics Example: Device(config)# device-analytics pc-analytics Enables PC analytics on the WLAN. WLANs advertise analytics capability in beacons & probe responses. no shutdown Example: Device(config)# no shutdown Enables the WLAN. end Example: Device(config)# end Returns to privileged EXEC mode. Verifying Device Analytics Procedure Step 1 Step 2 On the Monitoring > Wireless > Clients page, click on a client in the table to view its properties and statistics. In the General tab, click on Client Properties to view the PC Analytics reports. This section displays the neighbor AP information, candidate BSSIDs, and reports for low RSSI, beacon miss, failed APs, and unknown APs. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1977 Verifying Device Analytics Configuration WLAN Verifying Device Analytics Configuration To view the status of device analytics export, use the following command: Device# show wlan 1 test-wlan WLAN Profile Name : test-wlan ================================================ Identifier :1 Description : Network Name (SSID) : test-open-ssid Status : Enabled Broadcast SSID : Enabled Advertise-Apname : Disabled Universal AP Admin : Disabled Device Analytics Advertise Support Share Data with Client : Enabled : Disabled To view client device information, use the following command: Device# show device classifier mac-address 0040.96ae.xxx detail Client Mac: 0040.96ae.xxxx Device Type: Samsung Galaxy S10e(Phone) Confidence Level: 40 Device Name: android-dhcp-9 Software Version(Carrier Code): SD7(TMB) Device OS: Android 9 Device Vendor: android-dhcp-9 Country: US To view the last disconnect reason, use the following command: Device# show device classifier mac-address 0040.96ae.xxxx detail Client MAC Address : 0040.96ae.xxxx Client IPv4 Address : 12.1.0.52 Client IPv6 Addresses : fe80::631b:5b4f:f9b6:53cc Client Username: N/A AP MAC Address : 7069.5a51.53c0 AP Name: AP4C77.6D9E.61B2 AP slot : 1 Client State : Associated Assisted Roaming Neighbor List Nearby AP Statistics: EoGRE : No/Simple client Last Disconnect Reason : User initiated disconnection - Device was powered off or Wi-Fi turned off To view the per client pc-analytics reports, use the following command: Device# show wireless client mac-address 3413.e8b6.xxxx stats pc-analytics ------------------------Neighbor APs Info: ------------------------Reported time:: 06/21/2021 18:50:34 ------------------------Roaming Reasons: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1978 WLAN Adaptive 802.11r ------------------------Selected AP RSSI:: -67 Candidate BSSIDs: ----------------Neighbor AP RSSI(dB) a4b2.3903.d10e -70 ------------------------PC Analytics report stats ---------------------------------------------------------------------------------------------Report Type Processed Reports Dropped Reports ---------------------------------------------------------------------- STA Info 1 0 Neigh AP 1 0 Low RSSI 0 0 Beacon Miss 0 0 Failed AP 0 0 Unknown APs 0 0 Adaptive 802.11r Information About Adaptive 802.11r The Cisco device ecosystem partner now supports 11r functionality on an adaptive 802.11r SSID. Samsung is one of the partners. Note The Adaptive 802.11r is enabled by default. This means that when you create a WLAN, the adaptive 802.11r is configured by default. Client device information such as its model number, supported operating system is shared with the controller and AP while the device receives information such as controller and AP type, software release, etc. Also, this enables 802.11r-compatible devices to benefit from adaptive 802.11r on Cisco networks. This ecosystem comes handy especially for troubleshooting device disconnection from the AP as the controller receives information such as the disconnect reason code from the client device. Note Devices without 11r support cannot join an SSID where 11r is enabled. To use the 11r functionality on devices, you need to create a separate SSID with 11r enabled and another with 11r disabled to support the non-11r devices in the network. Adaptive dot11r is supported by Apple iPad, Apple iPhone, and Samsung S10 devices. However; some software update creates a MIC mismatch error in these devices. But these errors are transient and clients will successfully be able to associate to the SSID in subsequent results. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1979 Configuring Adaptive 802.11r (GUI) WLAN Configuring Adaptive 802.11r (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > WLANs. On the WLANs page, click the name of the WLAN. In the Edit WLAN window, click the Security > Layer2 tab. In the WPA Parameters section and Fast Transition drop-down list, choose Adaptive Enabled. Click Update & Apply to Device. Verifying Adaptive 802.11r To view the details, use the following command: Device# show running-config all wlan test-psk 2 test-psk security ft adaptive "adaptive" is optional Note The following command is used to enable or disable adaptive 11r: [no] security ft adaptive The following command is used to enable or disable 802.11r: [no] security ft Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1980 1 8 0 C H A P T E R Device Classifier Dynamic XML Support · Feature History for Device Classifier Dynamic XML Support, on page 1981 · Information About Device Classifier Dynamic XML Support, on page 1982 · Enabling Device Classifier (CLI), on page 1985 · Updating Dynamic XML File, on page 1985 · Verifying TLV Values, on page 1986 · Clearing Old Classification Cache, on page 1986 Feature History for Device Classifier Dynamic XML Support This table provides release and related information about the feature explained in this section. This feature is also available in all the releases subsequent to the one in which they are introduced in, unless noted otherwise. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1981 Information About Device Classifier Dynamic XML Support WLAN Table 140: Feature History for Device Classifier Dynamic XML Support Release Feature Feature Information Cisco IOS XE Device Classifier You can do the following: Dublin 17.10.1 Dynamic XML Support · Add rules, checks, and profile name to an XML file. · Upload the XML file to the device file system. This feature enables better device classification without upgrading the device to a new release. Note Device classifier dynamic XML support is applicable for the following: · Devices that are not classified previously: The classification takes effect from the latest file without any reboot. · Devices that are already classified: The clients have to rejoin for the classification to take effect. · Client previously classified with higher protocol values such as DHCP + HTTP: If the same client wants to be classified with only DHCP, use the clear wireless client device cache command. Information About Device Classifier Dynamic XML Support The current device classifier uses static XML file wherein you define checks, rules, and profiles based on MAC, DHCP, and HTTP TLVs in wireless devices. The static XML file is converted to a text file and integrated with the image. When you enable the device classified functionality using device classifier command, the contents in the text file is read and populated into the device classifier structures. Note The subsequent device classification is based on the populated device classifier structures. Presently, if you find any unclassified devices in a controller, the static XML file is updated with the new rules, checks, and profiles to get the devices classified. You will need to wait till the subsequent release as the static XML file is integrated with the image and cannot be changed from the controller. Workflow: To Classify Unclassified Devices with Dynamic XML File 1. The dynamic XML filename must be dc_user_profiles.xml. Note Files with any other name are not read and parsed even if they have the correct schema. 2. Copy the sample dynamic XML file to your system using the following command: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1982 WLAN Information About Device Classifier Dynamic XML Support copy {flash:} {ftp: | tftp:} 3. Provide a new version for the dynamic XML file: <Version>1.1</Version> 4. Edit the dynamic XML file with the new rules, checks, and profiles as defined in the schema after examining the TLV values of the unclassified devices. Note To check the TLV values, use the following command: show wireless client mac-address mac detail 5. Copy the dynamic XML file to the device flash using the following command: copy {ftp: | tftp:} {flash:} Once the file is copied to the device file system, the newly connected clients are classified according to the new profiles defined in the dynamic XML file. You need to reconnect the already unclassified devices to send the DHCP and HTTP TLVs, and then classify them according to the new profiles. The already classified devices remain as classified until they are reconnected. Dynamic XML File The device classifier dynamic XML support enhancement addresses this problem for device classifier dynamic XML file. With the introduction of dynamic XML support, you are provided with a new dynamic device classifier XML file support. Note The filename will be dc_user_profiles.xml and you can update the dynamic XML file with the new rules, checks, and profiles based on the devices connected and according to the provided schema.You can then copy this XML file to the device file system to enable better device classification without the need to upgrade the device to a new release. The static XML file support is still available. If a device is connected, its TLVs are checked with the dynamic XML user profiles first and if it matches it is classified as per that profile. If you search for non-static XML profiles and if it matches it is classified as per that profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1983 Information About Device Classifier Dynamic XML Support WLAN Note The sample dynamic XML file is available in the device at flash:dc_profile_dir/.. You can consider the following sample dynamic XML file schema and copy this to your system using copy {flash:} {ftp: | tftp:} command, and append or replace the content with your own profiles, rules, and checks: <?xml version="1.0" encoding="UTF-8"?> <DeviceList> <CopyRight>Copyright (c) 2021-2022 by Cisco Systems, Inc. All rights reserved.</CopyRight> <Version>1.0</Version> <Device> <DeviceType>Sample_Profile_1</DeviceType> <RuleName>Sample_Rule_1</RuleName> <RuleOperator>OR</RuleOperator> <RuleCertaintyMetric>20</RuleCertaintyMetric> <Check> <Protocol>DHCP</Protocol> <TLV-Type>12</TLV-Type> <TLV-Value-Type>String</TLV-Value-Type> <TLV-Value>test</TLV-Value> </Check> <Check> <Protocol>HTTP</Protocol> <TLV-Type>3</TLV-Type> <TLV-Value-Type>Integer</TLV-Value-Type> <TLV-Value>23</TLV-Value> </Check> </Device> <Device> <DeviceType>Sample_Profile_2</DeviceType> <RuleName>Sample_Rule_2</RuleName> <RuleOperator>AND</RuleOperator> <RuleCertaintyMetric>30</RuleCertaintyMetric> <Check> <Protocol>DHCP</Protocol> <TLV-Type>12</TLV-Type> <TLV-Value-Type></TLV-Value-Type> <TLV-Value>test</TLV-Value> </Check> <Check> <Protocol>MAC</Protocol> <TLV-Value-Type>String</TLV-Value-Type> <TLV-Value>Cisco</TLV-Value> </Check> </Device> </DeviceList> Each time you copy a new dynamic XML file, the older user profiles are erased completely and newer profiles are populated. After copying the dynamic XML files, only the newly connected clients are classified based on the new dynamic file whereas the already classified devices still remain as classified with older profiles until they are reconnected. MAC OUI-Based Profiles The Organizational Unique Identifier (OUI) of a MAC address is part of the MAC address that identifies the vendor of the network adapter. The OUI is the first three bytes of the six-byte field and administered by the IEEE. To define MAC-based profiles in the dynamic XML file, see https://standards-oui.ieee.org/. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1984 WLAN Enabling Device Classifier (CLI) For example, if the Client MAC address is 7035.094d.000, then OUI is 0x703509. You can find the corresponding entry in the https://standards-oui.ieee.org/ as follows: 70-35-09 (hex) Cisco Systems, Inc 703509 (base 16) Cisco Systems, Inc 80 West Tasman Drive San Jose CA 94568 US Enabling Device Classifier (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 device classifier Example: Device(config)# device classifier Step 3 end Example: Device(config)# end Purpose Enters global configuration mode. Enables the classification of attached devices. Returns to privileged EXEC mode. Updating Dynamic XML File To classify a device, add the following lines in the dynamic XML file: <DeviceList> <CopyRight>Copyright (c) 2021-2022 by Cisco Systems, Inc. All rights reserved.</CopyRight> <Version>1.1</Version> <Device> <DeviceType>Device-test"</DeviceType> <RuleName>Rule-Test</RuleName> <RuleOperator>AND</RuleOperator> <RuleCertaintyMetric>20</RuleCertaintyMetric> <Check> <Protocol>DHCP</Protocol> <TLV-Type>12</TLV-Type> <TLV-Value-Type>String</TLV-Value-Type> <TLV-Value>test</TLV-Value> </Check> </Device> ............................... </DeviceList> Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1985 Verifying TLV Values WLAN Verifying TLV Values To verify the TLV values, use the following command: Device# show wireless client mac-address 7035.094d.0001 detail Client MAC Address : 7035.094d.0001 ........................................................................................................................ Nearby AP Statistics: EoGRE : Pending Classification Device Classification Information: Device Type : Un-Classified Device Device Name : Unknown Device Protocol Map : 0x000009 (OUI, DHCP) Device Protocol : DHCP - <Protocol>DHCP</Protocol> Type : 12 14 --> <TLV-Type>12</TLV-Type> Data : 0e 00000000 00 0c 00 0a 74 65 73 74 2d 30 30 30 30 31 ---><TLV-Value>test</TLV-Value> |....test-00001 | Type : 60 8 Data : 08 00000000 00 3c 00 04 74 65 73 74 |.<..test | Type : 55 11 Data : 0b 00000000 00 37 00 07 01 1c 02 03 0f 06 0c |.7......... | Max Client Protocol Capability: Wi-Fi6 (802.11ax) Clearing Old Classification Cache If an already classified client uses any of the three type-length-values (TLVs) [OUI, DHCP, or HTTP] and if the combination value is lower, the existing value is ignored. To avoid such a scenario, use the following command: Device# clear wireless client device cache Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1986 WLAN Clearing Old Classification Cache Note The priority of the TLVs is as follows: · OUI · DHCP · HTTP After executing the clear command, you must rejoin the client to get it classified as per the latest XML file. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1987 Clearing Old Classification Cache WLAN Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1988 1 8 1 C H A P T E R BSSID Counters · BSSID Counters, on page 1989 · Enabling BSSID Statistics and BSSID Neighbor Statistics, on page 1989 · Verifying BSSID Statistics on the Controller, on page 1990 BSSID Counters This feature helps to retrieve the BSSID statistics when a client is associated with a WLAN for every configured interval. A new configuration is introduced in the controller per AP profile to enable or disable BSSID statistics on the access points. The feature is disabled by default. Note BSSID counter is not supported on the Cisco Aironet 1800 series APs and Cisco Catalyst 9100 series APs. Enabling BSSID Statistics and BSSID Neighbor Statistics Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap profile ap-profile-name Example: Device(config)# ap profile ap-profile-name Step 3 bssid-stats Example: Device(config-ap-profile)#[no] bssid-stats Purpose Enters global configuration mode. Enters the AP profile configuration submode. ap-profile-name is the profile name of the configured AP. Enables BSSID statistics. Use the no form of the command to disable the feature. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1989 Verifying BSSID Statistics on the Controller WLAN Step 4 Step 5 Step 6 Command or Action Purpose bssid-stats bssid-stats-frequency bssid-timer-seconds Example: Sets the BSSID stats frequency timer. BSSID statistics frequency timer is in the range of 1 to 180 seconds. Device(config-ap-profile)# bssid-stats bssid-stats-frequency 40 bssid-neighbor-stats Example: Device(config-ap-profile)# [no] bssid-neighbor-stats Enables BSSID neighbor statistics. Use the no form of the command to disable the feature. bssid-neighbor-stats interval bssid-interval <1-180> Example: Device(config-ap-profile)# [no] bssid-neighbor-stats interval 50 Sets the interval at which BSSID neighbor statistics is sent from the AP. The BSSID neighbor stats interval is in the range of 1to 180 seconds. Verifying BSSID Statistics on the Controller To verify the BSSID statistics on the controller, use the following command: · show wireless stats ap name ap-name dot11 24ghz slot 0 wlan-id <wlan-id> statistics Device# show wireless stats ap name APXXXX.6DXX.58XX dot11 24ghz slot 0 wlan-id 18 stat BSSID : 7069.5a38.112e WLAN ID : 18 Client Count :1 TX Statistics ------------------------------------------------------------------------------- Mgmt Retries Data Bytes Data Retries Subframe Retries ------------------------------------------------------------------------------- 12 18 16081 18 0 RX Statistics ------------------------------------------------------------------------------- Mgmt Data Bytes ------------------------------------------------------------------------------- 74 17693 Data Distribution ------------------------------------------------------------------------------- Bytes RX TX ------------------------------------------------------------------------------- 0-64 55 93 65-128 66 40 129-256 21 5 257-512 10 3 513-1024 1 9 1025-2048 0 1 2049-4096 0 0 4097-8192 0 0 8193-16384 0 0 16385-32768 0 0 32769-65536 0 0 65537-131072 0 0 131073-262144 0 0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1990 WLAN Verifying BSSID Statistics on the Controller 262145-524288 0 0 524289-1048576 0 0 WMM Statistics ------------------------------------------------------------------------------- RX TX ------------------------------------------------------------------------------- Voice 0 43 Video 0 0 Best Effort 154 39 Background 0 0 MCS ------------------------------------------------------------------------------- MCS RX TX ------------------------------------------------------------------------------- mcs0 39 0 mcs1 2 0 mcs2 5 0 mcs3 7 0 mcs4 25 0 mcs5 59 0 mcs6 290 0 mcs7 1148 3 mcs8 2288 0 mcs9 4440 2 · show ap name ap_name neighbor summary Device#show ap name APXXXX.6DXX.59XX neighbor summary BSSID Channel Channel-width Slot SSID RSSI Last-Heard Neighbour ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 0008.2f1c.8040 1 20 Mhz 0 -39 03/17/2020 18:25:14 aprusty-un-dot1x FALSE 0008.2f1c.8041 18:25:14 1 20 Mhz 0 aprusty-sim-11 -39 03/17/2020 FALSE 0008.2f1c.8042 18:25:14 1 20 Mhz 0 one-ph -39 03/17/2020 FALSE 0008.2f1c.8044 18:25:14 1 20 Mhz 0 aprusty-test -38 03/17/2020 FALSE 0008.3296.f340 10:39:27 11 20 Mhz 0 ewlc-ap-dot1x -51 03/18/2020 FALSE 0008.3296.f341 10:39:27 11 20 Mhz 0 vewlc_small_psk -49 03/18/2020 FALSE 002a.1022.d950 18:25:14 1 20 Mhz 0 ewlc-ap-dot1x -57 03/17/2020 FALSE 002a.105c.bfd0 18:25:14 1 20 Mhz 0 ewlc-ap-dot1x -36 03/17/2020 FALSE 002a.105c.bfd1 18:25:14 1 20 Mhz 0 vewlc_small_psk -37 03/17/2020 FALSE 002c.c864.76d0 10:37:37 11 20 Mhz 0 rajwlan -61 03/18/2020 FALSE BSSID Channel Channel-width Slot RSSI Last-Heard Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1991 Verifying BSSID Statistics on the Controller WLAN SSID Neighbour ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- 002c.c8de.59e0 1 20 Mhz 0 -48 03/17/2020 18:25:14 WQ FALSE 002c.c8de.5d80 10:39:27 11 20 Mhz 0 ewlc-ap-dot1x -54 03/18/2020 FALSE 002c.c8de.5d81 10:39:27 11 20 Mhz 0 vewlc_small_psk -55 03/18/2020 FALSE 002c.c8de.7260 10:39:27 11 20 Mhz 0 ewlc-ap-dot1x -53 03/18/2020 FALSE 002c.c8de.7261 10:39:27 11 20 Mhz 0 vewlc_small_psk -54 03/18/2020 FALSE 005d.7390.e1e0 18:25:14 1 20 Mhz 0 rlan -54 03/17/2020 FALSE 006b.f114.95a0 18:25:14 1 20 Mhz 0 zavc -60 03/17/2020 FALSE 006b.f114.b0e0 18:25:14 1 20 Mhz 0 ewlc-ap-dot1x -46 03/17/2020 FALSE 006c.bc61.2340 18:24:44 1 20 Mhz 0 dnac-swim -63 03/17/2020 FALSE 006c.bc72.5ce0 10:39:17 11 20 Mhz 0 dnac-swim -58 03/18/2020 FALSE Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1992 1 8 2 C H A P T E R Fastlane+ · Information About Fastlane+, on page 1993 · Configuring an Fastlane+ on a WLAN (CLI), on page 1993 · Configuring an Fastlane+ on a WLAN (GUI), on page 1994 · Monitoring Fastlane+, on page 1994 · Verifying Fastlane+, on page 1995 Information About Fastlane+ IEEE 802.11ax allows scheduled access-based uplink transmissions by periodically collecting buffer status reports from clients. The Fastlane+ feature improves the effectiveness of estimating the uplink buffer status for clients, thereby enhancing the user experience for latency-sensitive applications. The Fastlane+ feature can be enabled or disabled on a per-WLAN basis. Support for this feature is indicated in the beacons and probe responses transmitted by an AP. Note This feature works only if Protected Management Frame (PMF) is configured as optional or mandatory for a WLAN. Configuring an Fastlane+ on a WLAN (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wlan profile-name wlan-id SSID_Name Example: Purpose Enters global configuration mode. Configures a WLAN and enters WLAN configuration submode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1993 Configuring an Fastlane+ on a WLAN (GUI) WLAN Command or Action Device(config)# wlan wlan-test 3 ssid-test Step 3 scheduler asr Example: Device(config-wlan)# scheduler asr Purpose Note If you have already configured a WLAN, enter the wlan profile-name command. Configures Fastlane+ feature on a WLAN. Configuring an Fastlane+ on a WLAN (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > WLANs. Select a WLAN. Click Advanced tab. Check the Advanced Scheduling Requests Handling check box to enable the feature on a per-WLAN basis. Click Update & Apply to Device. Monitoring Fastlane+ Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Monitoring >Wireless > Clients. Click a client name from the client list. The Client window with multiple tabs is activated. Click General tab. Click Client Statistics tab. The most recent uplink latency statistics received from the client is displayed in the Uplink Latency Distribution section. Click Client Properties tab. The Fastlane+ feature-related client capabilities information is displayed at the bottom of the window. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1994 WLAN Verifying Fastlane+ Verifying Fastlane+ The following example shows how to verify whether Fastlane+ is enabled or disabled for a WLAN: Device# show wlan 2 | include ASR Advanced Scheduling Requests Handling : Enabled The following example shows how to verify Fastlane+ capability information and the most recent client uplink latency statistics: Device# show wireless client mac-address f45c.89b0.xxxx detail . . . Regular ASR support: : ENABLED Non-default Fastlane Profile: : Active Range Voice Video Background Best-Effort ---------------------------------------------------------------------------------------[0-20ms] 400 300 200 100 [20-40ms] 401 301 201 101 [40-100ms] 402 302 202 102 [>100ms] 403 303 203 103 The following example shows how to verify Fastlane+ statistics along with Fastlane+ capability and uplink latency statistics for all the Fastlane+ clients on a WLAN. Note show interfaces dot11radio asr-info all is an AP command, and does not work on the controller. Device# show interfaces Dot11Radio 1 asr-info all [*10/12/2020 18:45:21.0149] [*10/12/2020 18:45:21.0150] Client-MAC:[26:52:CF:C8:D0:1C] AID:[3] ASR-Capability:[0x1] [*10/12/2020 18:45:21.0150] BE- LAT[0-20]:[267] LAT[20-40]:[57] LAT[40-100]:[32] LAT[>100]:[26] [*10/12/2020 18:45:21.0150] BK- LAT[0-20]:[0] LAT[20-40]:[0] LAT[40-100]:[0] LAT[>100]:[0] [*10/12/2020 18:45:21.0150] VI- LAT[0-20]:[0] LAT[20-40]:[0] LAT[40-100]:[0] LAT[>100]:[0] [*10/12/2020 18:45:21.0150] VO- LAT[0-20]:[2222] LAT[20-40]:[409] LAT[40-100]:[224] LAT[>100]:[163] [*10/12/2020 18:45:21.0150] [*10/12/2020 18:45:21.0206] HTT_PEER_DETAILS_TLV: [*10/12/2020 18:45:21.0206] peer_type = 0 [*10/12/2020 18:45:21.0206] sw_peer_id = 98 [*10/12/2020 18:45:21.0206] vdev_id = 25 [*10/12/2020 18:45:21.0206] pdev_id = 0 [*10/12/2020 18:45:21.0206] ast_idx = 1187 [*10/12/2020 18:45:21.0206] mac_addr = 26:52:cf:c8:d0:1c [*10/12/2020 18:45:21.0206] peer_flags = 0x200006f9 [*10/12/2020 18:45:21.0206] qpeer_flags = 0x8 [*10/12/2020 18:45:21.0206] [*10/12/2020 18:45:21.0206] HTT_STATS_PEER_ASR_STATS_TLV [*10/12/2020 18:45:21.0206] asr_bmap: 0x8 [*10/12/2020 18:45:21.0206] asr_muedca_update_cnt: 1 [*10/12/2020 18:45:21.0206] asr_muedca_reset_cnt: 1 [*10/12/2020 18:45:21.0206] asr_ul_mu_bsr_trigger: 2376 [*10/12/2020 18:45:21.0206] asr_min_trig_intv- BE:0 BK:0 VI:0 VO:19 [*10/12/2020 18:45:21.0206] asr_max_trig_intv- BE:0 BK:0 VI:0 VO:20 [*10/12/2020 18:45:21.0207] asr_min_alloc_rate- BE:0 BK:0 VI:0 VO:12 [*10/12/2020 18:45:21.0207] asr_ul_su_data_ppdu_cnt- BE:0 BK:0 VI:0 VO:2149 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1995 Verifying Fastlane+ WLAN [*10/12/2020 18:45:21.0207] asr_ul_su_data_ppdu_bytes- BE:0 [*10/12/2020 18:45:21.0207] asr_ul_mu_trig_ppdu_cnt- BE:0 [*10/12/2020 18:45:21.0207] asr_ul_mu_trig_ppdu_bytes- BE:0 [*10/12/2020 18:45:21.0207] asr_ul_mu_data_ppdu_cnt- BE:0 [*10/12/2020 18:45:21.0207] asr_ul_mu_data_ppdu_bytes- BE:0 [*10/12/2020 18:45:21.0207] asr_ul_mu_data_padding_bytes- BE:0 BK:0 VI:0 VO:757546 BK:0 VI:0 VO:5002 BK:0 VI:0 VO:2400960 BK:0 VI:0 VO:2134 BK:0 VI:0 VO:736578 BK:0 VI:0 VO:2953488 The following examples show how to verify scheduling statistics along with capability and uplink latency statistics for a given client on a WLAN: Note The show interfaces dot11radio asr-info is an AP command and it will not work on the controller. Device# show interfaces Dot11Radio 1 asr-info 26:XX:CF:XX:D0:XX [*10/12/2020 18:45:21.0149] [*10/12/2020 18:45:21.0150] Client-MAC:[26:52:CF:C8:D0:1C] AID:[3] ASR-Capability:[0x1] [*10/12/2020 18:45:21.0150] BE- LAT[0-20]:[267] LAT[20-40]:[57] LAT[40-100]:[32] LAT[>100]:[26] [*10/12/2020 18:45:21.0150] BK- LAT[0-20]:[0] LAT[20-40]:[0] LAT[40-100]:[0] LAT[>100]:[0] [*10/12/2020 18:45:21.0150] VI- LAT[0-20]:[0] LAT[20-40]:[0] LAT[40-100]:[0] LAT[>100]:[0] [*10/12/2020 18:45:21.0150] VO- LAT[0-20]:[2222] LAT[20-40]:[409] LAT[40-100]:[224] LAT[>100]:[163] [*10/12/2020 18:45:21.0150] [*10/12/2020 18:45:21.0206] HTT_PEER_DETAILS_TLV: [*10/12/2020 18:45:21.0206] peer_type = 0 [*10/12/2020 18:45:21.0206] sw_peer_id = 98 [*10/12/2020 18:45:21.0206] vdev_id = 25 [*10/12/2020 18:45:21.0206] pdev_id = 0 [*10/12/2020 18:45:21.0206] ast_idx = 1187 [*10/12/2020 18:45:21.0206] mac_addr = 26:xx:cf:xx:d0:xx [*10/12/2020 18:45:21.0206] peer_flags = 0x200006f9 [*10/12/2020 18:45:21.0206] qpeer_flags = 0x8 [*10/12/2020 18:45:21.0206] [*10/12/2020 18:45:21.0206] HTT_STATS_PEER_ASR_STATS_TLV [*10/12/2020 18:45:21.0206] asr_bmap: 0x8 [*10/12/2020 18:45:21.0206] asr_muedca_update_cnt: 1 [*10/12/2020 18:45:21.0206] asr_muedca_reset_cnt: 1 [*10/12/2020 18:45:21.0206] asr_ul_mu_bsr_trigger: 2376 [*10/12/2020 18:45:21.0206] asr_min_trig_intv- BE:0 BK:0 VI:0 VO:19 [*10/12/2020 18:45:21.0206] asr_max_trig_intv- BE:0 BK:0 VI:0 VO:20 [*10/12/2020 18:45:21.0207] asr_min_alloc_rate- BE:0 BK:0 VI:0 VO:12 [*10/12/2020 18:45:21.0207] asr_ul_su_data_ppdu_cnt- BE:0 BK:0 VI:0 VO:2149 [*10/12/2020 18:45:21.0207] asr_ul_su_data_ppdu_bytes- BE:0 BK:0 VI:0 VO:757546 [*10/12/2020 18:45:21.0207] asr_ul_mu_trig_ppdu_cnt- BE:0 BK:0 VI:0 VO:5002 [*10/12/2020 18:45:21.0207] asr_ul_mu_trig_ppdu_bytes- BE:0 BK:0 VI:0 VO:2400960 [*10/12/2020 18:45:21.0207] asr_ul_mu_data_ppdu_cnt- BE:0 BK:0 VI:0 VO:2134 [*10/12/2020 18:45:21.0207] asr_ul_mu_data_ppdu_bytes- BE:0 BK:0 VI:0 VO:736578 [*10/12/2020 18:45:21.0207] asr_ul_mu_data_padding_bytes- BE:0 BK:0 VI:0 VO:2953488 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1996 1 8 3 C H A P T E R Workgroup Bridges · Cisco Workgroup Bridges, on page 1997 · Configuring Workgroup Bridge on a WLAN, on page 2000 · Verifying the Status of a Workgroup Bridge on the Controller, on page 2002 · Configuring Access Points as Workgroup Bridge, on page 2002 · Information About Simplifying WGB Configuration, on page 2017 · Configuring Multiple WGBs (CLI), on page 2018 · Verifying WGB Configuration, on page 2018 Cisco Workgroup Bridges A workgroup bridge (WGB) is an Access Point (AP) mode to provide wireless connectivity to wired clients that are connected to the Ethernet port of the WGB AP. A WGB connects a wired network over a single wireless segment by learning the MAC addresses of its wired clients on the Ethernet interface and reporting them to the WLC through infrastructure AP using Internet Access Point Protocol (IAPP) messaging. The WGB establishes a single wireless connection to the root AP, which in turn, treats the WGB as a wireless client. Figure 53: Example of a WGB Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1997 Cisco Workgroup Bridges WLAN Starting from Cisco IOS XE Cupertino 17.8.1, WGB is supported on the following Cisco Catalyst 9100 Series Access Points. · Cisco Catalyst 9105 · Cisco Catalyst 9115 · Cisco Catalyst 9120 Starting from Cisco IOS XE Dublin 17.10.1, WGB is supported on the following Cisco Catalyst 9100 Series Access Points. · Cisco Catalyst 9124 · Cisco Catalyst 9130 From Cisco IOS XE Cupertino 17.9.1 onwards, WGB supports one radio for uplink (backhaul) connectivity and another radio for serving wireless clients. This feature is supported on the Cisco 11AX APs such as Cisco Catalyst 9105 APs, Cisco Catalyst 9115 APs, Cisco Catalyst 9120 APs. OPEN and PSK security (WPA2 Personal) based wireless clients can be associated to WGB independent of its uplink connectivity, but they will not be able to pass traffic unless WGB has uplink connectivity. Radius server must be configured and the WGB should have uplink connectivity for authentication of wireless clients to 802.1x security (WPA2 Enterprise) WLAN. Both IPv4 and IPv6 traffic forwarding is supported for wireless clients. Static IP and Passive Client support is enabled by default on these WLANs. The following features are supported for use with a WGB: Table 141: WGB Feature Matrix Feature 802.11r QOS UWGB mode IGMP Snooping or Multicast 802.11w PI support (without SNMP) IPv6 VLAN 802.11i (WPAv2) Broadcast tagging/replicate Unified VLAN client WGB client Cisco Wave 1 APs Supported Supported Supported Supported Supported Supported Supported Supported Supported Supported Implicitly supported (No CLI required) Supported Cisco Wave 2 and 11AX APs Supported Supported Supported on Wave 2 APs Not supported on 11AX APs Supported Supported Not supported Supported Supported Supported Supported Supported Supported Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1998 WLAN Cisco Workgroup Bridges Feature Cisco Wave 1 APs Cisco Wave 2 and 11AX APs 802.1x PEAP, EAP-FAST, EAP-TLS Supported Supported NTP Supported Supported Wired client support on all LAN Supported in Wired-0 and Wired-1 Supported in all Wired-0, 1 and ports interfaces LAN ports 1, 2, and 3 Second radio wireless client support Supported Supported on Cisco 11AX APs only. The following table shows the supported and unsupported authentication and switching modes for Cisco APs when connecting to a WGB. Note Workgroup Bridge mode is supported on the WiFi6 Pluggable Module from Cisco IOS XE Bengaluru 17.6.1. Table 142: Supported Access Points and Requirements Access Points Cisco Aironet 2700, 3700, and 1572 Series Cisco Aironet 1800, 2800, 3800, 4800, 1562, and Cisco Catalyst 9105, 9115, 9120, 9124, and 9130, IW6300 and ESW6300 Series Requirements Requires autonomous image. CAPWAP image starting from Cisco AireOS 8.8 release. · MAC filtering is not supported for wired clients. · Idle timeout is not supported for both WGB and wired clients. · Session timeout is not applicable for wired clients. · Web authentication is not supported. · The total number of clients supported by WGB (wired + wireless) is limited to 20 clients. · If you want to use a chain of certificates, copy all the CA certificates to a file and install it under a trust point on the WGB, else server certificate validation may fail. · Wired clients connected to a WGB inherit the WGB's QoS and AAA override attributes. · To enable the WGB to communicate with the root AP, create a WLAN and make sure that Aironet IE is enabled under the Advanced settings. · WPA2 Enterprise security works only if the uplink WLAN is enabled for FlexConnect local switching or Fabric enabled WLAN. · Radius override is not supported for wireless clients that are associated with WGB WLANs. · WGB does not support dot1x wired client authentication when used with power injector. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 1999 Configuring Workgroup Bridge on a WLAN WLAN The power-injector drops all EAPOL packets received from the wired client and does not forward it to the WGB's wired0 interface. In such cases, use PoE plus hub behind the wired0 interface and connect the wired clients to the hub. · After WGB reload, the WGB dot1x wired clients behind a hub do not trigger authentication automatically, unless done manually. After WGB is reloaded the WGB dot1x wired clients which are behind a hub remain authenticated or connected on their side and do not get notified that the WGB is reloaded. Clients are also not shown on the WGB bridge table. The client interfaces must be manually disabled and enabled back to trigger authentication. · When the dot1x wired client Ethernet interface is disabled and then enabled again, client authentication might fail for some of dot1x wired clients, at times. Configuring Workgroup Bridge on a WLAN Follow the procedure given below to configure a WGB on a WLAN: For WGB to join a wireless network there are specific settings on the WLAN and on the related policy profile. Note For the configuration given below, it is assumed that the WLAN security is already configured. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Command or Action configure terminal Example: Device# configure terminal wlan profile-name Example: Device(config)# wlan WGB_Test ccx aironet-iesupport Example: Device(config-wlan)# ccx aironet-iesupport exit Example: Device(config-wlan)# exit wireless profile policy profile-policy Example: Purpose Enters global configuration mode. Enters WLAN configuration submode. The profile-name is the profile name of the configured WLAN. Configures the Cisco Client Extensions option and sets the support of Aironet IE on the WLAN. Exits the WLAN configuration submode. Configures WLAN policy profile and enters the wireless policy configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2000 WLAN Configuring Workgroup Bridge on a WLAN Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Command or Action Purpose Device(config)# wireless profile policy test-wgb description description Example: Device(config-wireless-policy)# description "test-wgb" Adds a description for the policy profile. vlan vlan-no Assigns the profile policy to the VLAN. Example: Device(config-wireless-policy)# vlan 48 wgb vlan Configures WGB VLAN client support. Example: Device(config-wireless-policy)# wgb vlan wgb broadcast-tagging Example: Device(config-wireless-policy)# wgb broadcast-tagging Configures WGB broadcast tagging on a WLAN. no shutdown Example: Device(config-wireless-policy)# no shutdown Restarts the policy profile. exit Example: Device(config-wireless-policy)# exit Exits the wireless policy configuration mode. wireless tag policy policy-tag Example: Device(config)# wireless tag policy WGB_Policy Configures policy tag and enters policy tag configuration mode. wlan profile-name policy profile-policy Maps a policy profile to a WLAN profile. Example: Device(config-policy-tag)# wlan WGB_Test policy test-wgb end Example: Device(config-policy-tag)# end Exits policy tag configuration mode, and returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2001 Verifying the Status of a Workgroup Bridge on the Controller WLAN Verifying the Status of a Workgroup Bridge on the Controller Use the following commands to verify the status of a WGB. To display the wireless-specific configuration of active clients, use the following command: Device# show wireless client summary To display the WGBs on your network, use the following command: Device# show wireless wgb summary To display the details of wired clients that are connected to a particular WGB, use the following command: Device# show wireless wgb mac-address 00:0d:ed:dd:25:82 detail Configuring Access Points as Workgroup Bridge Turning Cisco Aironet 2700/3700/1572 Series AP into Autonomous Mode Before you begin Download the autonomous image for the specific access point from software.cisco.com and place it on a TFTP server. Procedure Step 1 Command or Action debug capwap console cli Example: Device# debug capwap console cli Purpose Enables the console CLI. Step 2 archive download-sw force-reload overwrite Downloads the autonomous image to the access tftp:ipaddress filepath filename point. Example: Device(config)# archive download-sw force-reload overwrite tftp://10.10.10.1/tftp/c1800.tar Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2002 WLAN Configuring Cisco Wave 2 APs or 11AX APs in Workgroup Bridge or CAPWAP AP Mode (CLI) Configuring Cisco Wave 2 APs or 11AX APs in Workgroup Bridge or CAPWAP AP Mode (CLI) Procedure Step 1 Command or Action enable Example: Device# enable Purpose Enters in to the privileged mode of the AP. Step 2 ap-type workgroup-bridge Example: Device# ap-type workgroup-bridge Moves the AP in to the Workgroup Bridge mode. Step 3 configure ap address ipv4 dhcp or configure Configures DHCP or Static IP address. ap address ipv4 staticip-address netmask gateway-ipaddress Example: DHCP IP Address Device# configure ap address ipv4 dhcp Static IP Address Device# configure ap address ipv4 static 10.10.10.2 255.255.255.234 192.168.4.1 Step 4 configure ap management add username Configures an username for the AP username password password secret secret management. Example: Device# configure ap management add username xyz-user password ****** secret cisco Step 5 configure ap hostnamehost-name Configures the AP hostname. Example: Device# configure ap hostname xyz-host Configure an SSID Profile for Cisco Wave 2 and 11AX APs (CLI) This procedure is an AP procedure. The CLIs listed in the procedure given below work only on the AP console and not on the controller. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2003 Configure an SSID Profile for Cisco Wave 2 and 11AX APs (CLI) WLAN Procedure Step 1 Command or Action Purpose configure ssid-profile ssid-profile-name ssid Choose an authentication protocol (Open, PSK, radio-serv-name authentication {open | psk or EAP) for the SSID profile. preshared-key key-management {dot11r | wpa2 | dot11w |{optional | required }}| eap profile eap-profile-name key-management {dot11r | wpa2 | dot11w|{optional | required}} Example: SSID profile with open authentication. Device# configure ssid-profile test WRT s1 authentication open SSID profile with PSK authentication. Device# configure ssid-profile test WRT s1 authentication psk 1234 key-management dot11r optional SSID profile with EAP authentication. Device# configure ssid-profile test WRT s1 authentication eap profile test2 key-management dot11r optional Step 2 configure dot11radio radio-interface mode Attaches an SSID profile to a radio interface. wgb ssid-profile profle-name Example: Device# configure dot11radio r1 mode wgb ssid-profile doc-test Step 3 configure ssid-profile profile-name ssid ssid-name dtim-period value in beacon intervals Example: Configures the DTIM period. Note This command is supported for wireless clients from Cisco IOS XE Cupertino 17.9.1 onwards. Device# configure ssid-profile test ssid s1 dtim-period 50 Step 4 configure qos profile qos-profile-name {bronze | gold | platinum | silver} Creates a gold QoS profile. Example: Device# configure qos profile qos-profile gold Step 5 configure ssid-profile profile-name ssid Maps the QoS profile to the SSID profile. ssid-name qos profile qos-profile-name Note This command is supported for Example: wireless clients from Cisco IOS Device# configure ssid-profile test ssid XE Cupertino 17.9.1 onwards. s1 qos profile qos-profile Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2004 WLAN Configuring the Authentication Server (CLI) Step 6 Step 7 Step 8 Command or Action Purpose configure ssid-profile profle-namedelete (Optional) Deletes an SSID profile. Example: Device# configure ssid-profile doc-test delete show wgb ssid Example: Device# show wgb ssid (Optional) Displays summary of configured and connected SSIDs. show wgb packet statistics Example: Device# show wgb packet statistics (Optional) Displays management, control, and data packet statistics. Configuring the Authentication Server (CLI) Procedure Step 1 Command or Action Purpose configure radius authentication <primary | Configures a primary and (or) secondary radius secondary> add <ipv4|ipv6> address server with an IPv4 or IPv6 IP, port, and secret. radius-server-ip-address port radius-server-port-number secret radius-secret Example: Device# configure radius authentication primary add ipv4 192.168.1.2 port 1812 secret Cisco123 Configuring a Dot1X Credential (CLI) Procedure Step 1 Command or Action configure dot1x credential profile-name username name password password Example: Device# configure dot1x credential test1 username XYZ password ***** Purpose Configures a dot1x credential. Step 2 configure dot1x credential profile-name delete Removes a dot1x profile. Example: Device# configure dot1x credential test1 delete Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2005 Configuring an EAP Profile (CLI) WLAN Step 3 Command or Action clear wgb client{all | single mac-addr } Example: Device# clear wgb client single xxxx.xxxx.xxxx.xxxx Purpose Deauthenticates a WGB client. Configuring an EAP Profile (CLI) Procedure Step 1 Command or Action Purpose configure eap-profile profile-name method Configures an EAP profile. {fast | leap | peap | tls} Example: Device# configure eap-profile test-eap method fast Step 2 configure eap-profile profile-name trustpoint Configures an EAP profile with a trustpoint. default or configure eap-profile profile-name trustpoint name trustpoint-name Example: EAP Profile to Trustpoint with MIC Certificate. Device# configure eap-profile test-eap trustpoint default EAP Profile to Trustpoint with CA Certificate. Device# configure eap-profile test-eap trustpoint cisco Step 3 configure eap-profile profile-name trustpoint Attaches the CA trustpoint. {default | name trustpoint-name} Note With the default profile, WGB Example: uses the internal MIC certificate Device# configure eap-profile test-eap for authentication. trustpoint default Step 4 configure eap-profile profile-name dot1x-credential profile-name Configures the 802.1X credential profile. Example: Device# configure eap-profile test-eap dot1x-credential test-profile Step 5 configure eap-profile profile-name delete (Optional) Deletes an EAP profile. Example: Device# configure eap-profile test-eap delete Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2006 WLAN Configuring Manual-Enrollment of a Trustpoint for Workgroup Bridge (CLI) Step 6 Step 7 Step 8 Command or Action show wgb eap dot1x credential profile Example: Device# show wgb eap dot1x credential profile Purpose (Optional) Displays the WGB EAP dot1x profile summary. show wgb eap profile Example: Device# show wgb eap profile (Optional) Displays the EAP profile summary. show wgb eap profile all Example: Device# show wgb eap profile all (Optional) Displays the EAP and dot1x profiles. Configuring Manual-Enrollment of a Trustpoint for Workgroup Bridge (CLI) Procedure Step 1 Command or Action Purpose configure crypto pki trustpoint ca-server-name enrollment terminal Configures a trustpoint in WGB. Example: Device# configure crypto pki trustpoint ca-server-US enrollment terminal Step 2 configure crypto pki trustpoint Authenticates a trustpoint manuallly. ca-server-name authenticate Enter the base 64 encoded CA certificate and Example: end the certificate by entering quit in a new Device# configure crypto pki trustpoint line. ca-server-US authenticate Step 3 configure crypto pki trustpoint ca-server-name key-size key-length Configures a private key size. Example: Device# configure crypto pki trustpoint ca-server-Us key-size 60 Step 4 configure crypto pki trustpoint ca-server-name subject-name name [2ltr-country-code |state-name |locality |org-name |org-unit |email] Example: Configures the subject name. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2007 Configuring Auto-Enrollment of a Trustpoint for Workgroup Bridge (CLI) WLAN Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action Purpose Device# configure crypto pki trustpoint ca-server-US subject-name test US CA abc cisco AP test@cisco.com configure crypto pki trustpoint ca-server-name enrol Generates a private key and Certificate Signing Request (CSR). Example: Afterwards, create the digitally signed Device# configure crypto pki trustpoint certificate using the CSR output in the CA server. ca-server-US enroll configure crypto pki trustpoint Import the signed certificate in WGB. ca-server-name import certificate Enter the base 64 encoded CA certificate and Example: end the certificate by using quit command in a Device# configure crypto pki trustpoint new line. ca-server-US import certificate configure crypto pki trustpoint ca-server-name delete (Optional) Delete a trustpoint. Example: Device# configure crypto pki trustpoint ca-server-US delete show crypto pki trustpoint Example: Device# show crypto pki trustpoint (Optional) Displays the trustpoint summary. show crypto pki trustpoint trustpoint-name certificate Example: Device# show crypto pki trustpoint ca-server-US certificate (Optional) Displays the content of the certificates that are created for a trustpoint. Configuring Auto-Enrollment of a Trustpoint for Workgroup Bridge (CLI) Procedure Step 1 Command or Action Purpose configure crypto pki trustpoint Enrols a trustpoint in WGB using the server ca-server-name enrollment url ca-server-url URL. Example: Device# configure crypto pki trustpoint Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2008 WLAN Configuring Auto-Enrollment of a Trustpoint for Workgroup Bridge (CLI) Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Command or Action ca-server-US enrollment url https://cisco/certsrv Purpose configure crypto pki trustpoint ca-server-name authenticate Authenticates a trustpoint by fetching the CA certificate from CA server automatically. Example: Device# configure crypto pki trustpoint ca-server-US authenticate configure crypto pki trustpoint ca-server-name key-size key-length Configures a private key size. Example: Device# configure crypto pki trustpoint ca-server-Us key-size 60 configure crypto pki trustpoint ca-server-name subject-name name [2ltr-country-code |state-name |locality |org-name |org-unit |email ] Configures the subject name. Example: Device# configure crypto pki trustpoint ca-server-US subject-name test US CA abc cisco AP test@cisco.com configure crypto pki trustpoint ca-server-name enrol l Example: Enrols the trustpoint. Request the digitally signed certificate from the CA server. Device# configure crypto pki trustpoint ca-server-US enroll configure crypto pki trustpoint ca-server-name auto-enroll enable renew-percentage Example: Enable sauto-enroll of the trustpoint. You can disable auto-enrolling by using the disable option in the command. Device# configure crypto pki trustpoint ca-server-US auto-enroll enable 10 configure crypto pki trustpointtrustpoint-name delete (Optional) Deletes a trustpoint. Example: Device# configure crypto pki trustpoint ca-server-US delete Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2009 Configuring Manual Certificate Enrolment Using TFTP Server (CLI) WLAN Step 8 Step 9 Step 10 Command or Action show crypto pki trustpoint Example: Device# show crypto pki trustpoint Purpose (Optional) Displays the trustpoint summary. show crypto pki trustpointtrustpoint-name (Optional) Displays the content of the certificate certificates that are created for a trustpoint. Example: Device# show crypto pki trustpoint ca-server-US certificate show crypto pki timers Example: Device# show crypto pki timers (Optional) Displays the PKI timer information. Configuring Manual Certificate Enrolment Using TFTP Server (CLI) Procedure Step 1 Command or Action Purpose configure crypto pki trustpoint Specifies the enrolment method to retrieve the ca-server-name enrollment tftp addr/file-name CA certificate and client certificate for a Example: trustpoint in WGB. Device# configure crypto pki trustpoint ca-server-US enrollment tftp://10.8.0.6/all_cert.txt Step 2 configure crypto pki trustpoint Retrieves the CA certificate and authenticates ca-server-name authenticate it from the specified TFTP server. If the file Example: specification is included, the wgb will append the extension ".ca" to the specified filename. Device# configure crypto pki trustpoint ca-server-US authenticate Step 3 configure crypto pki trustpoint ca-server-name key-size key-length Configures a private key size. Example: Device# configure crypto pki trustpoint ca-server-Us key-size 60 Step 4 configure crypto pki trustpoint ca-server-name subject-name name [2ltr-country-code |state-name |locality |org-name |org-unit |email ] Configures the subject name. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2010 WLAN Importing the PKCS12 Format Certificates from the TFTP Server (CLI) Step 5 Step 6 Step 7 Step 8 Command or Action Purpose Example: Device# configure crypto pki trustpoint ca-server-US subject-name test US CA abc cisco AP test@cisco.com configure crypto pki trustpoint Generate a private key and Certificate Signing ca-server-name enrol Request (CSR) and writes the request out to the Example: TFTP server. The filename to be written is appended with the extension ".req". Device# configure crypto pki trustpoint ca-server-US enroll configure crypto pki trustpoint Import the signed certificate in WGB using ca-server-name import certificate TFTP at the console terminal, which retrieves Example: the granted certificate. Device# configure crypto pki trustpoint The WGB will attempt to retrieve the granted certificate using TFTP using the same filename ca-server-US import certificate and the file name append with ".crt" extension. show crypto pki trustpoint Example: Device# show crypto pki trustpoint (Optional) Displays the trustpoint summary. show crypto pki trustpoint trustpoint-name certificate Example: Device# show crypto pki trustpoint ca-server-US certificate (Optional) Displays the content of the certificates that are created for a trustpoint. Importing the PKCS12 Format Certificates from the TFTP Server (CLI) Procedure Step 1 Command or Action Purpose configure crypto pki trustpoint ca-server-name import pkcs12 tftp addr/file-name password pwd Imports PKCS12 format certificate from the TFTP server. Example: Device# configure crypto pki trustpoint ca-server-US enrollment tftp://10.8.0.6/all_cert.txt password ****** Step 2 show crypto pki trustpoint Example: (Optional) Displays the trustpoint summary. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2011 Configuring Radio Interface for Workgroup Bridges (CLI) WLAN Step 3 Command or Action Device# show crypto pki trustpoint Purpose show crypto pki trustpoint trustpoint-name certificate Example: Device# show crypto pki trustpoint ca-server-US certificate (Optional) Displays the content of the certificates that are created for a trustpoint. Configuring Radio Interface for Workgroup Bridges (CLI) From the available two radio interfaces, before configuring WGB or UWGB mode on one radio interface, configure the other radio interface to root AP mode. Procedure Step 1 Command or Action Purpose configure dot11radio radio-int mode root-ap Maps a radio interface as root AP. Example: Note Device# configure dot11Radio 0/3/0 mode root-ap When an active SSID or EAP profile is modified, you need to reassociate the profile to the radio interface for the updated profile to be active. Step 2 Step 3 Step 4 configure dot11Radio <0|1> wlan add ssid-profile-name ssid-number Example: Configures the WLAN at the root AP mode radio. Enter the SSID profile name and SSID number between 1 and 16. Device# configure dot11radio 1 wlan add ssid-profile-name ssid-number configure dot11Radio <0|1> wlan delete ssid-profile-name Example: Device# configure dot11radio 1 wlan delete ssid-profile-name Deletes WLAN from the radio configuration. Enter the SSID profile name. configure dot11Radio <0|1> channel Configures a radio channel to broadcast the channel-number width SSID. The channel numbers are between 1 and Example: 173. The channel width values are 20, 40, 80, and 160. Device# configure dot11radio 1 channel 36 80 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2012 WLAN Configuring Radio Interface for Workgroup Bridges (CLI) Command or Action Purpose Note · Only 20MHz channel width is supported on radio 0 (2.4-GHz band). · If radar is detected on a configured channel on radio 1, then the channel automatically changes to a non-DFS channel with a channel width of 20MHz. The administrator must reset the radio to bring it back to the configured channel. Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 configure dot11Radio <0|1> beacon-period Configures the periodic beacon interval in beacon-interval milli-seconds. The value range is between 2 Example: and 2000 milli-seconds. Device# configure dot11radio 1 beacon-period 120 configure dot11Radio radio-int mode wgb Maps a radio interface to a WGB SSID profile. ssid-profile ssid-profile-name Example: Device# configure dot11Radio 0/3/0 mode wgb ssid-profile bgl18 configure dot11Radio radio-int mode uwgb Maps a radio interface to a WGB SSID profile. mac-addr ssid-profile ssid-profile-name Example: Device# configure dot11Radio 0/3/0 mode uwgb 0042.5AB6.0EF0 ssid-profile bgl18 configure dot11Radio radio-int {enable| Configures a radio interface. disable} Note After configuring the uplink to Example: the SSID profile, we recommend Device# configure dot11Radio 0/3/0 mode enable that you disable and enable the radio for the changes to be active. configure dot11Radio radio-int antenna {a-antenna | ab-antenna | abc-antenna | abcd-antenna} Example: Device# configure dot11Radio 0/3/0 antenna a-antenna Configures a radio antenna. configure dot11Radio radio-int encryption Configures the radio interface. mode ciphers aes-ccm { Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2013 Configuring Radio Interface for Workgroup Bridges (CLI) WLAN Step 11 Step 12 Step 13 Step 14 Step 15 Step 16 Command or Action Purpose Example: Device# configure dot11Radio radio-int encryption mode ciphers aes-ccm configure wgb mobile rate {basic 6 9 18 24 Configures the device channel rate. 36 48 54 | mcs mcs-rate} Example: Device# configure wgb mobile rate basic 6 9 18 24 36 48 54 configure wgb mobile period secondsthres-signal Configure the threshold duration and signal strength to trigger scanning. Example: Device# configure wgb mobile period 30 50 configure wgb mobile station interface Configures the static roaming channel. dot11Radio radio-int scan channel-number add Example: Device# configure wgb mobile station interface dot11Radio 0/3/0 scan 2 add configure wgb mobile station interface (Optional) Delete the mobile channel. dot11Radio radio-int scan channel-number delete Example: Device# configure wgb mobile station interface dot11Radio 0/3/0 scan 2 delete configure wgb mobile station interface dot11Radio radio-int scan disable Example: Device# configure wgb mobile station interface dot11Radio 0/3/0 scan disable (Optional) Disable the mobile channel. configure wgb beacon miss-count value (Optional) Configure the beacon miss-count. Example: By default, this is set to disabled. Device# configure wgb beacon miss-count Note 12 When you set the beacon miss-count value to 10 or lower, then the beacon miss-count gets disabled. Set the value to 11 or higher to enable this function. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2014 WLAN Configuring Workgroup Bridge Timeouts (CLI) Step 17 Step 18 Step 19 Step 20 Step 21 Command or Action show wgb wifi wifi-interface stats Example: Device# show wgb wifi 0/3/0 stats Purpose (Optional) Displays the Wi-Fi station statistics. show controllers dot11Radio radio-interface (Optional) Displays the radio antenna statistics. antenna Example: Device# show controllers dot11Radio 0/3/0 antenna show wgb mobile scan channel Example: Device# show wgb mobile scan channel (Optional) Displays the mobile station channels scan configuration. show configuration Example: Device# show configuration (Optional) Displays the configuration that is stored in the NV memory. show running-config Example: Device# show running-config (Optional) Displays the running configuration in the device. Configuring Workgroup Bridge Timeouts (CLI) Procedure Step 1 Command or Action Purpose configure wgb association response timeout Configures the WGB association response response-millisecs timeout. The default value is 5000 milliseconds. Example: Device# configure wgb association The valid range is between 300 and 5000 milliseconds. response timeout 4000 Step 2 configure wgb authentication response timeout response-millisecs Example: Device# configure wgb authentication response timeout 4000 Configures the WGB authentication response timeout. The default value is 5000 milliseconds. The valid range is between 300 and 5000 milliseconds. Step 3 configure wgb uclient timeout timeout-secs Configure the Universal WGB client response Example: timeout. The default timeout value is 60 seconds. The valid range is between 1 and Device# configure wgb uclient timeout 70 65535 seconds.. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2015 Configuring Bridge Forwarding for Workgroup Bridge (CLI) WLAN Step 4 Step 5 Step 6 Step 7 Command or Action configure wgb eap timeout timeout-secs Example: Device# configure wgb eap timeout 20 Purpose Configures the WGB EAP timeout. The default timeout value is 3 seconds. The valid range is between 2 and 60 seconds. configure wgb channel scan timeout {fast| medium | slow} Example: Device# configure wgb channel scan timeout slow Configures the WGB channel scan timeout. configure wgb dhcp response timeout timeout-secs Example: Device# configure wgb dhcp response timeout 70 Configures the WGB DHCP response timeout. The default value is 60 seconds. The valid range is between 1000 and 60000 milliseconds. show wgb dot11 association Example: Device# show wgb dot11 association Displays the WGB association summary. Configuring Bridge Forwarding for Workgroup Bridge (CLI) Before you begin The Cisco Wave 2 and 11AX APs as Workgroup Bridge recognizes the Ethernet clients only when the traffic has the bridging tag. We recommend setting the WGB bridge client timeout value to default value of 300 seconds, or less in environment where change is expected, such as: · Ethernet cable is unplugged and plugged back. · Endpoint is changed. · Endpoint IP is changed (static to DHCP and vice versa). If you need to retain the client entry in the WGB table for a longer duration, we recommend you increase the client WGB bridge timeout duration. Procedure Step 1 Command or Action Purpose configure wgb bridge client add mac-address Adds a WGB client using the MAC address. Example: Device# configure wgb bridge client add F866.F267.7DFB- Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2016 WLAN Information About Simplifying WGB Configuration Step 2 Step 3 Step 4 Step 5 Command or Action configure wgb bridge client timeout timeout-secs Example: Device# configure wgb bridge client timeout 400 Purpose Configures the WGB bridge client timeout. Default timeout value is 300 seconds. The valid range is between 10 and 1000000 seconds. show wgb bridge Example: Device# show wgb bridge Displays the WGB wired clients over the bridge. show wgb bridge wired gigabitEthernet interface Example: Device# show wgb bridge wired gigabitEthernet 0/1 Displays the WGB Gigabit wired clients over the bridge. show wgb bridge dot11Radio interface-number Displays the WGB bridge radio interface summary. Example: Device# show wgb bridge dot11Radio 0/3/1 Information About Simplifying WGB Configuration From Cisco IOS XE Cupertino 17.8.1, it is possible to configure WGB in multiple Cisco access points (APs) simultaneously. By importing a running configuration, you can deploy multiple WGBs in a network and make them operational quicker. When new Cisco APs are added to the network, you can transfer an existing or working configuration to the new Cisco APs to make them operational. This enhancement eliminates the need to configure multiple Cisco APs using CLIs, after logging into them. A network administrator can onboard Cisco APs using either of the following methods: · Upload the working configuration from an existing Cisco AP to a server and download it to the newly deployed Cisco APs. · Send a sample configuration to all the Cisco APs in the deployment. This feature is supported only on the following Cisco APs: · Cisco Aironet 1562 Access Points · Cisco Aironet 2800 Access Points · Cisco Aironet 3800 Access Points · Cisco Catalyst 9105 Access Points · Cisco Catalyst 9115 Access Points · Cisco Catalyst 9120 Access Points Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2017 Configuring Multiple WGBs (CLI) WLAN · Cisco Catalyst IW6300 Series Heavy Duty Access Points For latest support information on various features in Cisco Wave 2 and 802.11ax (Wi-Fi 6) Access Points in Cisco IOS XE releases, see the Feature Matrix for Wave 2 and 802.11ax (Wi-Fi 6) Access Points document. Configuring Multiple WGBs (CLI) Perform the following procedure on the APs in WGB mode. Procedure Step 1 Command or Action enable Example: Device# enable Purpose Enters privileged EXEC mode. Step 2 copy configuration upload{sftp:| tftp:} ip-address [directory] [file-name] Example: Creates upload configuration file and uploads to the SFTP or TFTP server using the specified path. Device# copy configuration upload sftp: 10.10.10.1 C:sample.txt Step 3 copy configuration download{sftp:| tftp:} Downloads the configuration file and replaces ip-address [directory] [file-name] the old configuration in the AP and reboots the Example: WGB. When the device restarts, new configuration is applied. Device# copy configuration download sftp: 10.10.10.1 C:sample.txt Step 4 show wgb dot11 association Example: Device# show wgb dot11 association Lists the WGB uplink information. Step 5 show version Example: Device# show version Displays the AP software information. Verifying WGB Configuration After completing the configuration download and reboot of the AP, the WGB rejoins the network. Use the show logging command to list and verify the download events that are captured in the debug logs: Device# show logging Jan 13 18:19:17 kernel: [*01/13/2022 18:19:17.4880] WGB - Applying download config... Jan 13 18:19:18 download_config: configure clock timezone UTC Jan 13 18:19:18 download_config: configure dot1x credential dot1x_profile username wifiuser password U2FsdGVkX1+8PWmAOnFO8BXyk5EAphMy2PmhPPhWV0w= Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2018 WLAN Verifying WGB Configuration Jan 13 18:19:18 download_config: configure eap-profile eap_profile method PEAP Jan 13 18:19:18 download_config: configure eap-profile eap_profile dot1x-credential dot1x_profile Jan 13 18:19:18 chpasswd: password for user changed Jan 13 18:19:18 kernel: [*01/13/2022 18:19:18.7260] chpasswd: password for user changed Jan 13 18:19:18 kernel: [*01/13/2022 18:19:18.7610] Jan 13 18:19:18 kernel: [*01/13/2022 18:19:18.7610] Management user configuration saved successfully Jan 13 18:19:18 kernel: [*01/13/2022 18:19:18.7610] Jan 13 18:19:18 kernel: [*01/13/2022 18:19:18.7650] Warning!!! Attach SSID profile with the radio to use the new changes. Jan 13 18:19:18 kernel: [*01/13/2022 18:19:18.7650] Jan 13 18:19:18 kernel: [*01/13/2022 18:19:18.7650] Dot1x credential configuration has been saved successfully Jan 13 18:19:18 kernel: [*01/13/2022 18:19:18.7650] Jan 13 18:19:18 kernel: [*01/13/2022 18:19:18.7740] Warning!!! Attach SSID profile with the radio to use the new changes. Jan 13 18:19:18 kernel: [*01/13/2022 18:19:18.7740] Jan 13 18:19:18 kernel: [*01/13/2022 18:19:18.7740] EAP profile configuration has been saved successfully Jan 13 18:19:18 kernel: [*01/13/2022 18:19:18.7740] Jan 13 18:19:18 kernel: [*01/13/2022 18:19:18.7790] Warning!!! Attach SSID profile with the radio to use the new changes. Jan 13 18:19:18 kernel: [*01/13/2022 18:19:18.7790] Jan 13 18:19:18 kernel: [*01/13/2022 18:19:18.7790] EAP profile configuration has been saved successfully Jan 13 18:19:18 kernel: [*01/13/2022 18:19:18.7790] Jan 13 18:19:18 kernel: [*01/13/2022 18:19:18.7830] Warning!!! Attach SSID profile with the radio to use the new changes. Jan 13 18:19:18 kernel: [*01/13/2022 18:19:18.7830] Jan 13 18:19:18 download_config: configure ssid-profile psk ssid alpha_psk authentication psk U2FsdGVkX18meBfFFeiC4sgkEmbGPNH/ul1dne6h/m8= key-management wpa2 Jan 13 18:19:18 kernel: [*01/13/2022 18:19:18.7930] Warning!!! Attach SSID profile with the radio to use the new changes. Jan 13 18:19:18 kernel: [*01/13/2022 18:19:18.7930] Jan 13 18:19:18 kernel: [*01/13/2022 18:19:18.7930] EAP profile configuration has been saved successfully Jan 13 18:19:18 kernel: [*01/13/2022 18:19:18.7930] Jan 13 18:19:18 download_config: configure ssid-profile open ssid alpha_open authentication open Jan 13 18:19:18 download_config: configure ssid-profile openax ssid alpha_open_ax authentication open Jan 13 18:19:18 kernel: [*01/13/2022 18:19:18.8650] SSID-Profile dot1xpeap has been saved successfully Jan 13 18:19:18 kernel: [*01/13/2022 18:19:18.8650] Jan 13 18:19:18 kernel: [*01/13/2022 18:19:18.9270] SSID-Profile psk has been saved successfully Jan 13 18:19:18 kernel: [*01/13/2022 18:19:18.9270] Jan 13 18:19:19 kernel: [*01/13/2022 18:19:19.0380] SSID-Profile open has been saved successfully Jan 13 18:19:19 kernel: [*01/13/2022 18:19:19.0380] Jan 13 18:19:19 kernel: [*01/13/2022 18:19:19.0380] SSID-Profile openax has been saved successfully Jan 13 18:19:19 kernel: [*01/13/2022 18:19:19.0380] Jan 13 18:19:22 download_config: configure wgb broadcast tagging disable Jan 13 18:19:22 download_config: configure wgb packet retries 64 drop Jan 13 18:19:22 kernel: [*01/13/2022 18:19:22.9710] Broadcast tagging 0 successfully Jan 13 18:19:22 kernel: [*01/13/2022 18:19:22.9710] Jan 13 18:19:23 download_config: configure dot11Radio 1 mode wgb ssid-profile open Jan 13 18:19:23 download_config: configure dot11Radio 1 enable Jan 13 18:19:23 download_config: configure ap address ipv6 disable Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2019 Verifying WGB Configuration WLAN Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2020 1 8 4 C H A P T E R Peer-to-Peer Client Support · Information About Peer-to-Peer Client Support, on page 2021 · Configure Peer-to-Peer Client Support, on page 2021 Information About Peer-to-Peer Client Support Peer-to-peer client support can be applied to individual WLANs, with each client inheriting the peer-to-peer blocking setting of the WLAN to which it is associated. The peer-to-Peer Client Support feature provides a granular control over how traffic is directed. For example, you can choose to have traffic bridged locally within a device, dropped by a device, or forwarded to the upstream VLAN. Peer-to-peer blocking is supported for clients that are associated with the local switching WLAN. Restrictions · Peer-to-peer blocking does not apply to multicast traffic. · Peer-to-peer blocking is not enabled by default. · In FlexConnect, peer-to-peer blocking configuration cannot be applied only to a particular FlexConnect AP or a subset of APs. It is applied to all the FlexConnect APs that broadcast the SSID. · FlexConnect central switching clients supports peer-to-peer upstream-forward. However, this is not supported in the FlexConnect local switching. This is treated as peer-to-peer drop and client packets are dropped. FlexConnect central switching clients supports peer-to-peer blocking for clients associated with different APs. However, for FlexConnect local switching, this solution targets only clients connected to the same AP. FlexConnect ACLs can be used as a workaround for this limitation. Configure Peer-to-Peer Client Support Follow the procedure given below to configure Peer-to-Peer Client Support: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2021 Configure Peer-to-Peer Client Support WLAN Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wlan profile-name Example: Device(config)# wlan wlan1 Enters WLAN configuration submode. The profile-name is the profile name of the configured WLAN. Step 3 peer-blocking [allow-private-group |drop Configures peer to peer blocking parameters. | forward-upstream] The keywords are as follows: Example: Device(config-wlan)# peer-blocking drop · allow-private-group--Enables peer-to-peer blocking on the Allow Private Group action. · drop--Enables peer-to-peer blocking on the drop action. · forward-upstream--No action is taken and forwards packets to the upstream. Note The forward-upstream option is not supported for Flex local switching. Traffic is dropped even if this option is configured. Also, peer to peer blocking for local switching SSIDs are available only for the clients on the same AP. Step 4 Step 5 end Example: Device(config)# end show wlan id wlan-id Example: Device# show wlan id 12 Returns to privileged EXEC mode. Displays the details of the selected WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2022 1 8 5 C H A P T E R Deny Wireless Client Session Establishment Using Calendar Profiles · Information About Denial of Wireless Client Session Establishment, on page 2023 · Configuring Daily Calendar Profile, on page 2024 · Configuring Weekly Calendar Profile, on page 2025 · Configuring Monthly Calendar Profile, on page 2026 · Mapping a Daily Calendar Profile to a Policy Profile, on page 2027 · Mapping a Weekly Calendar Profile to a Policy Profile, on page 2028 · Mapping a Monthly Calendar Profile to a Policy Profile, on page 2029 · Verifying Calendar Profile Configuration, on page 2030 · Verifying Policy Profile Configuration, on page 2031 Information About Denial of Wireless Client Session Establishment Denial of client session establishment feature allows the controller to stop client session establishment based on a particular time. This helps control the network in efficient and controlled manner without any manual intervention. In Cisco Catalyst 9800 Series Wireless Controller , you can deny the wireless client session based on the following recurrences: · Daily · Weekly · Monthly The Calendar Profiles created are then mapped to the policy profile. By attaching the calendar profile to a policy profile, you will be able to create different recurrences for the policy profile using different policy tag. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2023 Configuring Daily Calendar Profile WLAN Note You need to create separate Calendar Profile for Daily, Weekly, and Monthly sub-categories. The following is the workflow for denial of wireless client session establishment feature: · Create a calendar profile. · Apply the calendar profile to a policy profile. Note A maximum of 100 calendar profile configuration and 5 calendar profile association to policy profile is supported. Points to Remember If you boot up your controller, the denial of client session establishment feature kicks in after a minute from the system boot up. If you change the system time after the calendar profile is associated to a policy profile, you can expect a maximum of 30 second delay to adapt to the new clock timings. Note You cannot use the no action deny-client command to disable action while associating the calendar profile to a policy profile. If you want to disable the action command, you need to disassociate the calendar profile from the policy profile, and re-configure again. Configuring Daily Calendar Profile Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile calendar-profile name name Configures a calendar profile. Example: Here, Device(config)# wireless profile calendar-profile name daily_calendar_profile name refers to the name of the calendar profile. Step 3 start start_time end end_time Example: Configures start and end time for the calendar profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2024 WLAN Configuring Weekly Calendar Profile Step 4 Step 5 Command or Action Purpose Device(config-calendar-profile)# start 09:00:00 end 17:00:00 Here, start_time is the start time for the calendar profile. You need to enter start time in HH:MM:SS format. end_time is the end time for the calendar profile. You need to enter end time in HH:MM:SS format. recurrence daily Example: Device(config-calendar-profile)# recurrence daily Configures daily recurrences for a calendar profile. end Example: Device(config-calendar-profile)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Note When the calendar profile kicks in, the AP power profile rules (for example, radio state and USB device state) that are defined for the Ethernet speed are not applied and continue to be as per the fixed power profile. Configuring Weekly Calendar Profile Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile calendar-profile name name Configures a calendar profile. Example: Here, Device(config)# wireless profile calendar-profile name weekly_calendar_profile name refers to the name of the calendar profile. Step 3 start start_time end end_time Example: Device(config-calendar-profile)# start 18:00:00 end 19:00:00 Configures start and end time for the calendar profile. Here, Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2025 Configuring Monthly Calendar Profile WLAN Step 4 Step 5 Step 6 Command or Action Purpose start_time is the start time for the calendar profile. You need to enter start time in HH:MM:SS format. end_time is the end time for the calendar profile. You need to enter end time in HH:MM:SS format. recurrence weekly Example: Device(config-calendar-profile)# recurrence weekly Configures weekly recurrences for the calendar profile. day {friday | monday | saturday | sunday | thursday | tuesday | wednesday} Example: Device(config-calendar-profile)# day friday Device(config-calendar-profile)# day monday Configure days when the weekly calendar needs to be active. Note You can configure multiple days using this command. end Example: Device(config-calendar-profile)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring Monthly Calendar Profile Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile calendar-profile name name Configures a calendar profile. Example: Here, Device(config)# wireless profile calendar-profile name monthly_calendar_profile name refers to the name of the calendar profile. Step 3 start start_time end end_time Example: Device(config-calendar-profile)# start 18:00:00 end 19:00:00 Configures start and end time for the calendar profile. Here, Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2026 WLAN Mapping a Daily Calendar Profile to a Policy Profile Step 4 Step 5 Step 6 Command or Action Purpose start_time is the start time for the calendar profile. You need to enter start time in HH:MM:SS format. end_time is the end time for the calendar profile. You need to enter end time in HH:MM:SS format. recurrence monthly Example: Device(config-calendar-profile)# recurrence monthly Configures monthly recurrences for the calendar profile. date value Configures a date for the calendar profile. Example: Note Device(config-calendar-profile)# date 25 If the requirement is to perform denial of service in certain timing, such as, 2,10, and 25 of every month, all three days need to be configured using the date command. There is no range for date. You need to configure the dates as per your requirement. end Example: Device(config-calendar-profile)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Mapping a Daily Calendar Profile to a Policy Profile Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-name Creates policy profile for the WLAN. Example: The profile-name is the profile name of the Device(config)# wireless profile policy policy profile. default-policy-profile Step 3 calender-profile name calendar-profile-name Maps a calender profile to a policy profile. Example: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2027 Mapping a Weekly Calendar Profile to a Policy Profile WLAN Step 4 Step 5 Command or Action Device(config-wireless-policy)# calender-profile name daily_calendar_profile Purpose The calendar-profile-name is the name of the calendar profile name created in Configuring Daily Calendar Profile, on page 2024. Note You need to disable Policy Profile before associating a calendar profile to a policy profile. The following needs to be done: Device(config-wireless-policy)# shutdown action deny-client Configures deny client session establishment Example: during calendar profile interval. Device(config-policy-profile-calender)# Note action deny-client Client associations are denied daily between timeslot 9:00:00 to 17:00:00. For start and end time details, see Configuring Daily Calendar Profile, on page 2024. end Returns to privileged EXEC mode. Example: Alternatively, you can also press Ctrl-Z to exit Device(config-policy-profile-calender)# global configuration mode. end Mapping a Weekly Calendar Profile to a Policy Profile Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-name Creates policy profile for the WLAN. Example: The profile-name is the profile name of the Device(config)# wireless profile policy policy profile. default-policy-profile Step 3 calender-profile name calendar-profile-name Maps a calender profile to a policy profile. Example: Device(config-wireless-policy)# calender-profile name weekly_calendar_profile The calendar-profile-name is the name of the calendar profile name created in Configuring Weekly Calendar Profile, on page 2025. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2028 WLAN Mapping a Monthly Calendar Profile to a Policy Profile Step 4 Step 5 Command or Action Purpose Note You need to disable Policy Profile before associating a calendar profile to a policy profile. The following needs to be done: Device(config-wireless-policy)# shutdown action deny-client Configures deny client session establishment Example: during calendar profile interval. Device(config-policy-profile-calender)# Note action deny-client Client associations are denied daily between timeslot 9:00:00 to 17:00:00. For start and end time details, see Configuring Weekly Calendar Profile, on page 2025. On Monday and Tuesday, clients are denied between 17:30:00 and 19:00:00 besides regular time 9:00:00 to 17:00:00. On 25th of every month, clients are denied between 18:00:00 and 19:00:00 besides regular time 9:00:00 to 17:00:00. end Returns to privileged EXEC mode. Example: Alternatively, you can also press Ctrl-Z to exit Device(config-policy-profile-calender)# global configuration mode. end Mapping a Monthly Calendar Profile to a Policy Profile Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-name Creates policy profile for the WLAN. Example: The profile-name is the profile name of the Device(config)# wireless profile policy policy profile. default-policy-profile Step 3 calender-profile name calendar-profile-name Maps a calender profile to a policy profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2029 Verifying Calendar Profile Configuration WLAN Step 4 Step 5 Command or Action Example: Device(config-wireless-policy)# calender-profile name monthly_calendar_profile Purpose The calendar-profile-name is the name of the calendar profile name created in Configuring Monthly Calendar Profile, on page 2026. action deny-client Configures deny client session establishment Example: for the defined calendar profile interval. Device(config-policy-profile-calender)# Note action deny-client Every day client associations are denied between timeslot 9:00:00 to 17:00:00. For start and end time details, see Configuring Monthly Calendar Profile, on page 2026. On Monday and Tuesday, clients are denied between 17:30:00 and 19:00:00 besides regular time 9:00:00 to 17:00:00. On 25th of every month, clients are denied between 18:00:00 and 19:00:00 besides regular time 9:00:00 to 17:00:00. end Returns to privileged EXEC mode. Example: Alternatively, you can also press Ctrl-Z to exit Device(config-policy-profile-calender)# global configuration mode. end Verifying Calendar Profile Configuration To view the summary of calendar profiles, use the following command: Device# show wireless profile calendar-profile summary Number of Calendar Profiles: 3 Profile-Name --------------------------------monthly_25_profile weekly_mon_profile daily_calendar_profile To view the calendar profile details for a specific profile name, use the following command: Device# show wireless profile calendar-profile detailed daily_calendar_profile Calendar profiles : daily_calendar_profile ------------------------------------------------------------------ Recurrence : DAILY Start Time : 09:00:00 End Time : 17:00:00 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2030 WLAN Verifying Policy Profile Configuration Verifying Policy Profile Configuration To view the detailed parameters for a specific policy profile, use the following command: Device# show wireless profile policy detailed default-policy-profile Tunnel Profile Profile Name : Not Configured Calendar Profile Profile Name : monthly_25_profile Wlan Enable : Not Configured Client Block : Client Block Configured ---------------------------------------------------- Profile Name : weekly_mon_profile Wlan Enable : Not Configured Client Block : Client Block Configured ---------------------------------------------------- Profile Name : daily_calendar_profile Wlan Enable : Not Configured Client Block : Client Block Configured ---------------------------------------------------- Fabric Profile Profile Name : Not Configured To view the configured calendar profile information under policy profile, use the following command: Device# show wireless profile policy all Tunnel Profile Profile Name : Not Configured Calendar Profile Profile Name : daily_calendar_profile Wlan Enable : Not Configured Client Block : Client Block Configured ---------------------------------------------------Profile Name : weekly_calendar_profile Wlan Enable : Not Configured Client Block : Client Block Configured ---------------------------------------------------Fabric Profile Profile Name : Not Configured Note The anchor priority is always displayed as local. Priorities can be assigned on the foreign controller. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2031 Verifying Policy Profile Configuration WLAN Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2032 1 8 6 C H A P T E R Ethernet over GRE · Introduction to EoGRE, on page 2033 · Create a Tunnel Gateway, on page 2035 · Configuring the Tunnel Gateway (GUI), on page 2036 · Configuring a Tunnel Domain, on page 2036 · Configuring Tunnel Domain (GUI), on page 2037 · Configuring EoGRE Global Parameters, on page 2038 · Configuring EoGRE Global Parameters (GUI), on page 2038 · Configuring a Tunnel Profile, on page 2039 · Configuring the Tunnel Profile (GUI), on page 2040 · Associating WLAN to a Wireless Policy Profile, on page 2041 · Attaching a Policy Tag and a Site Tag to an AP, on page 2042 · Verifying the EoGRE Tunnel Configuration, on page 2042 Introduction to EoGRE Ethernet over GRE (EoGRE) is an aggregation solution for grouping Wi-Fi traffic from hotspots. This solution enables customer premises equipment (CPE) devices to bridge the Ethernet traffic coming from an end-host, and encapsulate the traffic in Ethernet packets over an IP Generic Routing Encapsulation (GRE) tunnel. When the IP GRE tunnels are terminated on a service provider's broadband network gateway, the end-host traffic is forwarded and subscriber sessions are initiated. Client IPv6 Client IPv6 traffic is supported on IPv4 EoGRE tunnels. A maximum of eight different client IPv6 addresses are supported per client. Wireless controller s send all the client IPv6 addresses that they have learned to the accounting server using the accounting update message. All RADIUS or accounting messages exchanged between controller s and tunnel gateways or RADIUS servers are outside the EoGRE tunnel. EoGRE for WLAN To enable EoGRE for a WLAN, the wireless policy profile should be mapped to a tunnel profile, which may contain the following: · AAA override: Allows you to bypass rule filtering for a client. · Gateway RADIUS proxy: Allows forwarding of AAA requests to tunnel gateways. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2033 EoGRE Configuration Overview WLAN · Tunnel rules: Defines the domain to use for each realm. They also define VLAN tagging for the client traffic towards tunnel gateways. · DHCP option 82: Provides a set of predefined fields. EoGRE Deployment with Multiple Tunnel Gateways The wireless controller embedded wireless controller sends keepalive pings to the primary and secondary tunnel gateways and keeps track of the missed pings. When a certain threshold level is reached for the missed pings, switchover is performed and the secondary tunnel is marked as active. This switchover deauthenticates all the clients to enable them to rejoin the access points (APs). When the primary tunnel come back online, all the client traffic are reverted to the primary tunnel. However, this behavior depends on the type of redundancy. Load Balancing in EtherChannels Load balancing of tunneled traffic over Etherchannels works by hashing the source or destination IP addresses or mac addresses of the tunnel endpoint pair. Because the number of tunnels is very limited when compared to clients (each tunnel carries traffic for many clients), the spreading effect of hashing is highly reduced and optimal utilization of Etherchannel links can be hard to achieve. Using the EoGRE configuration model, you can use the tunnel source option of each tunnel interface to adjust the load-balancing parameters and spread tunnels across multiple links. You can use different source interfaces on each tunnel for load balancing based on the source or destination IP address. For that choose the source interface IP address in such a way that traffic flows take different links for each src-dest IP pair. The following is an example with four ports: Client traffic on Tunnel1 Src IP: 40.143.0.72 Dest IP: 40.253.0.2 Client traffic on Tunnel2 Src IP: 40.146.0.94 Dest IP: 40.253.0.6 Client traffic on Tunnel3 Src IP: 40.147.0.74 Dest IP: 40.253.0.10 Use the show platform software port-channel link-select interface port-channel 4 ipv4 src_ip dest_ip command to determine the link that a particular flow will take. EoGRE Configuration Overview The EoGRE solution can be deployed in two different ways: · Central-Switching: EoGRE tunnels connect the controller to the tunnel gateways. · Flex or Local-Switching: EoGRE tunnels are initiated on the APs and terminated on the tunnel gateways. To configure EoGRE, perform the following tasks: 1. Create a set of tunnel gateways. 2. Create a set of tunnel domains. 3. Create a tunnel profile with rules that define how to match clients to domains. 4. Create a policy profile and attach the tunnel profile to it. 5. Map the policy profile to WLANs using policy tags. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2034 WLAN Create a Tunnel Gateway Note The EoGRE tunnel fallback to the secondary tunnel is triggered after the max-skip-count ping fails in the last measurement window. Based on the starting and ending instance of the measurement window, the fall-back may take more time than the duration that is configured. Table 143: EoGRE Authentication Methods Method Name PSK Open LWA Dot1x CWA First Supported Release 17.2.1 16.12.1 16.12.1 16.12.1 16.12.1 Mode Local/Flex (central authentication) Local/Flex (central authentication) Local/Flex (central authentication) Local/Flex (central authentication) Local/Flex (central authentication) Create a Tunnel Gateway Note In the Cisco Catalyst 9800 Series Wireless Controller , a tunnel gateway is modeled as a tunnel interface. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 interface tunnel tunnel_number Example: Device(config)# interface tunnel 21 Configures a tunnel interface and enters interface configuration mode. Step 3 tunnel source source_intf Example: Device(config-if)# tunnel source 22 Sets the source address of the tunnel interface. The source interface can be VLAN, Gigabit Ethernet or loopback. Step 4 tunnel destination tunnel-address Example: Device(config-if)# tunnel destination 10.11.12.13 Sets the destination address of the tunnel. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2035 Configuring the Tunnel Gateway (GUI) WLAN Step 5 Command or Action Purpose tunnel mode ethernet gre {ipv4 |ipv6} p2p Sets the encapsulation mode of the tunnel to Example: Ethernet over GRE IPv4 or Ethernet over GRE IPv6. Device(config-if)# tunnel mode ethernet gre ipv4 p2p Configuring the Tunnel Gateway (GUI) Follow the steps given below to configure the tunnel gateway: Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Configuration > Tags & Profiles > EoGRE. Click the Gateways tab. The Add Gateway window is displayed. In the Tunnel Id field, specify the tunnel ID. In the Destination address(IPv4/IPv6) field, specify the IPv4 or IPv6 address. From the Source Interface drop-down list, select an interface. In the AAA Proxy section, slide the AAA Proxy slider to Enabled. When AA Proxy is enabled, complete the following steps: a) From the Encryption Type drop-down list, select either UNENCRYPTED or AES ENCRYPTION. b) In the Key Phrase field, specify the key phrase. Click Apply to Device. Configuring a Tunnel Domain Note Tunnel domains are a redundancy grouping of tunnels. The following configuration procedure specifies a primary and a secondary tunnel, along with a redundancy model. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2036 WLAN Configuring Tunnel Domain (GUI) Step 2 Step 3 Step 4 Step 5 Command or Action Purpose tunnel eogre domain domain Configures EoGRE redundancy domain. Example: Device(config)# tunnel eogre domain dom1 primary tunnel primary-tunnel_intf Example: Device(config-eogre-domain)# primary tunnel 21 Configures the primary tunnel. secondary tunnel secondary-tunnel_intf Configures the secondary tunnel. Example: Device(config-eogre-domain)# secondary tunnel 22 redundancy revertive Sets the redundancy model as revertive. Example: When redundancy is set to revertive and the Device(config-eogre-domain)# redundancy primary tunnel goes down, a switchover to revertive secondary tunnel is performed. When the primary tunnel comes back up, a switchover to the primary tunnel is performed, because the primary tunnel has priority over the secondary tunnel. When redundancy is not set to revertive, tunnels will have the same priority, and a switchover to the primary tunnel is not performed if the active tunnel is the secondary tunnel and the primary tunnel comes back up. Configuring Tunnel Domain (GUI) Follow the steps given below to configure the tunnel domain: Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Configuration > Tags & Profiles > EoGRE. Click the Domains tab. The Add Domain window is displayed. In the Name field, specify the domain name. The name can be ASCII characters from 32 to 126, without leading and trailing spaces. From the Primary Tunnel Gateway drop-down list, choose an option. From the Secondary Tunnel Gateway drop-down list, choose an option. Slide the Status button to Enabled, to activate the domain status. Slide the Revertive Redundancy button to Enabled, to activate revertive redundancy. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2037 Configuring EoGRE Global Parameters WLAN Step 8 Click Apply to Device. Configuring EoGRE Global Parameters Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 tunnel eogre heartbeat interval interval-value Sets EoGRE tunnel heartbeat periodic interval. Example: Device(config)# tunnel eogre heartbeat interval 600 Step 3 tunnel eogre heartbeat max-skip-count skip-count Sets the maximum number of tolerable dropped heartbeats. Example: Device(config)# tunnel eogre heartbeat max-skip-count 7 After reaching the maximum number of heartbeats that can be dropped, the tunnel is declared as down and a switchover is performed. Step 4 tunnel eogre source loopback tunnel_source Sets the tunnel EoGRE source interface. Example: Device(config)# tunnel eogre source loopback 12 Step 5 tunnel eogre interface tunnel tunnel-intf aaa (Optional) Configures AAA proxy RADIUS proxy key key key-name key for the AAA proxy setup. Example: Note Device(config)# tunnel eogre interface tunnel 21 aaa proxy key 0 mykey When the tunnel gateway is behaving as the AAA proxy server, only this step is required for the configuration. Configuring EoGRE Global Parameters (GUI) Follow the steps given below to configure the EoGRE global parameters: Procedure Step 1 Choose Configuration > Tags & Profiles > EoGRE. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2038 WLAN Configuring a Tunnel Profile Step 2 Step 3 Step 4 Step 5 The EoGRE Global Config tab is displayed. In the Heartbeat Interval (seconds) field, specify an appropriate timer value for heartbeat interval. The valid range is between 60 and 600 seconds. In the Max Heartbeat Skip Count field, specify the maximum heartbeat skip count. The valid range is between 3 and 10. From the Interface Name drop-down list, choose an interface name. Click Apply. Configuring a Tunnel Profile Before you begin Ensure that you define the destination VLAN on the controller. If you do not define the VLAN, clients will not be able to connect. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. wireless profile policy profile-policy-name Configures a WLAN policy profile. Example: Device(config)# wireless profile policy eogre_policy tunnel-profile tunnel-profile-name Example: Device(config-wireless-policy)# tunnel-profile tunnel1 Creates a tunnel profile. exit Example: Device(config-wireless-policy)# exit Returns to global configuration mode. wireless profile tunnel tunnel-profile-name Configures a wireless tunnel profile. Example: Device(config)# wireless profile tunnel wl-tunnel-1 dhcp-opt82 enable Example: Activates DHCP Option 82 for the tunneled clients. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2039 Configuring the Tunnel Profile (GUI) WLAN Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action Device(config-tunnel-profile)# dhcp-opt82 enable Purpose dhcp-opt82 remote-id remote-id Example: Device(config-tunnel-profile)# dhcp-opt82 remote-id vlan Configures Remote ID options. Choose from the comma-separated list of options such as ap-mac, ap-ethmac, ap-name, ap-group-name, flex-group-name, ap-location, vlan, ssid-name, ssid-type, and client-mac. aaa-override Example: Device(config-tunnel-profile)# aaa-override Enables AAA policy override. gateway-radius-proxy Example: Device(config-tunnel-profile)# gateway-radius-proxy Enables the gateway RADIUS proxy. gateway-accounting-radius-proxy Example: Device(config-tunnel-profile)# gateway-accounting-radius-proxy Enables the gateway accounting RADIUS proxy. rule priority realm-filter realm domain Creates a rule to choose a domain, using the domain-name vlan vlan-id realm filter, for client Network Access Example: Identifier (NAI), tunneling domain name, and destination VLAN. Device(config-tunnel-profile)# rule 12 realm-filter realm domain dom1 vlan 5 Configuring the Tunnel Profile (GUI) Follow the steps given below to configure the tunnel profile: Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Tags & Profiles > EoGRE. Click the Tunnel Profiles tab. Click the Add button. The Add Tunnel Profile window is displayed. Click the General tab and complete the following steps: a) In the Name field, specify the tunnel profile name. The name can be ASCII characters from 32 to 126, without leading and trailing spaces. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2040 WLAN Associating WLAN to a Wireless Policy Profile Step 5 Step 6 b) In the Status field, slide the button to change the status to Enabled. c) In the Central Forwarding field, slide the button to Enabled, to enable the feature. d) In the DHCP Option-82 section, change the Status field and the ASCII field to Enabled, as per requirement. e) In the Delimiter field, specify the delimiter. f) From the Circuit ID Available Services list, select an available services and click the > sign to add the services to the assigned list. g) From the Remote ID Available Services list, select an available services and click the > sign to add the services to the assigned list. h) In the AAA section, choose an appropriate status for the Radius Proxy field, the Accounting Proxy field, and the Override field. Click the Rules tab, and complete the following steps: a) Click the Add Rules button. b) In the Priority field, specify the priority of the rule from a range of 1 to 100. c) In the Realm field, specify a realm. d) From the Domain drop-down list, choose a domain. e) In the VLAN Id field, specify the VLAN ID that ranges between 1 and 4094. f) Click Save. Click Apply to Device. Associating WLAN to a Wireless Policy Profile Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless tag policy policy-tag-name Example: Device(config)# wireless tag policy eogre_tag Configures a policy tag and enters policy tag configuration mode. Step 3 wlan wlan-name policy profile-policy-name Example: Device(config-policy-tag)# wlan eogre_open_eogre policy eogre_policy Maps an EoGRE policy profile to a WLAN profile. Step 4 end Example: Device(config-policy-tag)# end Saves the configuration, exits configuration mode, and returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2041 Attaching a Policy Tag and a Site Tag to an AP WLAN Attaching a Policy Tag and a Site Tag to an AP Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 ap mac-address Example: Device(config)# ap 80E8.6FD4.0BB0 Step 3 policy-tag policy-tag-name Example: Device(config-ap-tag)# policy-tag eogre_tag Step 4 site-tag site-tag-name Example: Device(config-ap-tag)# site-tag sp-flex-site Step 5 end Example: Device(config-ap-tag)# end Purpose Enters global configuration mode. Configures an AP and enters AP profile configuration mode. Maps the EoGRE policy tag to the AP. Maps a site tag to the AP. Saves the configuration, exits configuration mode, and returns to privileged EXEC mode. Verifying the EoGRE Tunnel Configuration The show tunnel eogre command displays the EoGRE clients, domains, gateways, global-configuration, and manager information in the local mode. To display the EoGRE domain summary in the local mode, use the following command: Device# show tunnel eogre domain summary Domain Name Primary GW Secondary GW Active GW Redundancy ------------------------------------------------------------------------------- domain1 Tunnel1 Tunnel2 Tunnel1 Non-Revertive eogre_domain Tunnel1 Tunnel2 Tunnel1 Non-Revertive To display the details of an EoGRE domain in the local mode, use the following command: Device# show tunnel eogre domain detailed domain-name Domain Name : eogre_domain Primary GW : Tunnel1 Secondary GW : Tunnel2 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2042 WLAN Verifying the EoGRE Tunnel Configuration Active GW Redundancy : Tunnel1 : Non-Revertive To view the EoGRE tunnel gateway summary and statistics in the local mode, use the following command: Device# show tunnel eogre gateway summary Name Type Address AdminState State Clients --------------------------------------------------------------------------------------------- Tunnel1 IPv4 9.51.1.11 Up Up 0 Tunnel2 IPv4 9.51.1.12 Up Down 0 Tunnel10 IPv6 fd09:9:8:21::90 Down Down 0 Tunnel11 IPv4 9.51.1.11 Up Up 0 Tunnel12 IPv6 fd09:9:8:21::90 Up Down 0 Tunnel100 IPv4 9.51.1.100 Up Down 0 To view the details of an EoGRE tunnel gateway in the local mode, use the following command: Device# show tunnel eogre gateway detailed gateway-name Gateway : Tunnel1 Mode : IPv4 IP : 9.51.1.11 Source : Vlan51 / 9.51.1.1 State : Up SLA ID : 56 MTU : 1480 Up Time: 4 minutes 45 seconds Clients Total Number of Wireless Clients :0 Traffic Total Number of Received Packets :0 Total Number of Received Bytes :0 Total Number of Transmitted Packets : 0 Total Number of Transmitted Bytes :0 Keepalives Total Number of Lost Keepalives :0 Total Number of Received Keepalives : 5 Total Number of Transmitted Keepalives: 5 Windows :1 Transmitted Keepalives in last window : 2 Received Keepalives in last window : 2 To view the client summary of EoGRE in the local mode, use the following command: Device# show tunnel eogre client summary Client MAC AP MAC Domain Tunnel VLAN Local ------------------------------------------------------------------------------------------- 74da.3828.88b0 80e8.6fd4.9520 eogre_domain N/A 2121 No To view the details of an EoGRE global configuration in the local mode, use the following command: Device# show tunnel eogre global-configuration Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2043 Verifying the EoGRE Tunnel Configuration WLAN Heartbeat interval : 60 Max Heartbeat skip count : 3 Source Interface : (none) To view the details of the global tunnel manager statistics in the local mode, use the following command: Device# show tunnel eogre manager stats global Tunnel Global Statistics Last Updated EoGRE Objects Gateways Domains : 02/18/2019 23:50:35 :6 :2 EoGRE Flex Objects AP Gateways :2 AP Domains :1 AP Gateways HA inconsistencies : 0 AP Domains HA inconsistencies : 0 Config events IOS Tunnel updates IOS Domain updates Global updates Tunnel Profile updates Tunnel Rule updates AAA proxy key updates : 806 : 88 : 48 : 120 : 16 :0 AP events Flex AP Join :1 Flex AP Leave :0 Local AP Join :0 Local AP leave :0 Tunnel status (rx) :4 Domain status (rx) :1 IAPP stats msg (rx) :3 Client count (rx) :6 VAP Payload msg (tx) :4 Domain config (tx) :1 Global config (tx) :1 Client delete (tx) :1 Client delete per domain (tx) : 3 DHCP option 82 (tx) :4 Client events Add-mobile Run-State Delete Cleanup Join Plumb Join Errors HandOff MsPayload FT Recover Zombie GW counter increase Zombie GW counter decrease Tunnel Profile reset Client deauth HA reconciliation :2 :3 :1 :0 :2 :0 :0 :0 :2 :0 :0 :0 : 88 :0 :0 Client Join Events Generic Error :0 MSPayload Fail :0 Invalid VLAN :0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2044 WLAN Verifying the EoGRE Tunnel Configuration Invalid Domain :0 No GWs in Domain :0 Domain Shut :0 Invalid GWs :0 GWs Down :0 Rule Match Error :0 AAA-override :0 Flex No Active GW :0 Open Auth join attempt :2 Dot1x join attempt :2 Mobility join attempt :0 Tunnel Profile not valid :2 Tunnel Profile valid :2 No rule match :0 Rule match :2 AAA proxy :0 AAA proxy accounting :0 AAA eogre attributes :0 Has aaa override :0 Error in handoff payload :0 Handoff AAA override :0 Handoff no AAA override :0 Handoff payload received :0 Handoff payload sent :0 SNMP Traps Client :0 Tunnel :2 Domain :0 IPC IOSd TX messages :0 Zombie Client Entries :0 To view the tunnel manager statistics of a specific process instance in the local mode, use the following command: Device# show tunnel eogre manager stats instance instance-number Tunnel Manager statistics for process instance : 0 Last Updated : 02/18/2019 23:50:35 EoGRE Objects Gateways :6 Domains :2 EoGRE Flex Objects AP Gateways :2 AP Domains :1 AP Gateways HA inconsistencies : 0 AP Domains HA inconsistencies : 0 Config events IOS Tunnel updates IOS Domain updates Global updates Tunnel Profile updates Tunnel Rule updates AAA proxy key updates : 102 : 11 :6 : 15 :2 :0 AP events Flex AP Join :1 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2045 Verifying the EoGRE Tunnel Configuration Flex AP Leave :0 Local AP Join :0 Local AP leave :0 Tunnel status (rx) :4 Domain status (rx) :1 IAPP stats msg (rx) :3 Client count (rx) :6 VAP Payload msg (tx) :4 Domain config (tx) :1 Global config (tx) :1 Client delete (tx) :1 Client delete per domain (tx) : 3 DHCP option 82 (tx) :4 Client events Add-mobile Run-State Delete Cleanup Join Plumb Join Errors HandOff MsPayload FT Recover Zombie GW counter increase Zombie GW counter decrease Tunnel Profile reset Client deauth HA reconciliation :2 :3 :1 :0 :2 :0 :0 :0 :2 :0 :0 :0 : 11 :0 :0 Client Join Events Generic Error :0 MSPayload Fail :0 Invalid VLAN :0 Invalid Domain :0 No GWs in Domain :0 Domain Shut :0 Invalid GWs :0 GWs Down :0 Rule Match Error :0 AAA-override :0 Flex No Active GW :0 Open Auth join attempt :2 Dot1x join attempt :2 Mobility join attempt :0 Tunnel Profile not valid :2 Tunnel Profile valid :2 No rule match :0 Rule match :2 AAA proxy :0 AAA proxy accounting :0 AAA eogre attributes :0 Has aaa override :0 Error in handoff payload :0 Handoff AAA override :0 Handoff no AAA override :0 Handoff payload received :0 Handoff payload sent :0 SNMP Traps Client :0 Tunnel :2 Domain :0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2046 WLAN WLAN Verifying the EoGRE Tunnel Configuration IPC IOSd TX messages :0 Zombie Client Entries :0 The show ap tunnel eogre command displays the tunnel domain information, EoGRE events, and the tunnel gateway status on the APs, in the flex mode. To view the summary information of an EoGRE tunnel gateway in the flex mode, use the following command: Device# show ap tunnel eogre domain summary AP MAC Domain Active Gateway ------------------------------------------------------------------------------- 80e8.6fd4.9520 eogre_domain Tunnel1 To view the wireless tunnel profile summary, use the following command: Device# show wireless profile tunnel summary Profile Name AAA-Override AAA-Proxy DHCP Opt82 Enabled -------------------------------- ------------ --------- ---------- -------- eogre_tunnel No No Yes Yes eogre_tunnel_set No No Yes No eogre_tunnel_snmp No No No No To view a wireless tunnel profile's details, use the following command: Device# show wireless profile tunnel detailed profile-name Profile Name : eogre_tunnel Status : Enabled AAA-Proxy/Accounting-Proxy: Disabled / Disabled AAA-Override : Disabled DHCP Option82 : Enabled Circuit-ID : ap-mac,ap-ethmac,ap-location,vlan Remote-ID : ssid-name,ssid-type,client-mac,ap-name Tunnel Rules Priority Realm Vlan Domain (Status/Primary GW/Secondary GW) -------- -------------------- ---- --------------------------------------------- 1 * 2121 eogre_domain (Enabled/Tunnel1/Tunnel2) To view detailed information about an EoGRE tunnel domain's status, use the following command: Device# show ap tunnel eogre domain detailed Domain : eogre_domain AP MAC : 80e8.6fd4.9520 Active GW : Tunnel1 To view the EoGRE events on an AP, use the following command: Device# show ap tunnel eogre events AP 80e8.6fd4.9520 Event history Timestamp #Times Event RC Context ----------------------- -------- ------------------- -- ---------------------------------------- Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2047 Verifying the EoGRE Tunnel Configuration WLAN 02/18/2019 23:50:26.341 6 02/18/2019 23:49:40.222 2 02/18/2019 23:48:43.549 1 02/18/2019 23:47:33.127 1 02/18/2019 23:47:33.124 4 02/18/2019 23:47:33.124 1 02/18/2019 23:47:33.124 2 02/18/2019 23:47:33.120 3 02/18/2019 23:47:31.763 2 02/18/2019 23:47:31.753 4 wlan:pyats_eogre IAPP_STATS 0 GW Tunnel2 uptime:0s CLIENT_JOIN 0 74da.3828.88b0, (eogre_domain/2121) CLIENT_LEAVE 0 74da.3828.88b0, (eogre_domain/2121) DOMAIN_STATUS 0 eogre_domain Active GW: Tunnel1 AP_TUNNEL_STATUS 0 Tunnel2 Dn MSG_CLIENT_DEL 0 GW Tunnel2 (IP: 9.51.1.12) TUNNEL_ADD 0 GW Tunnel2 MSG_CLIENT_DEL_PD 0 GW Tunnel1 (IP: 9.51.1.11) AP_DOMAIN_PUSH 0 Delete:eogre_domain_set, 0 GWs AP_VAP_PUSH 0 profile:'eogre_tunnel', To view the summary information of the EoGRE tunnel gateway, use the following command: Device# show ap tunnel eogre gateway summary AP MAC Gateway Type IP State Clients --------------------------------------------------------------------------------------------- 80e8.6fd4.9520 Tunnel1 IPv4 9.51.1.11 Up 1 80e8.6fd4.9520 Tunnel2 IPv4 9.51.1.12 Down 0 To view detailed information about an EoGRE tunnel gateway, use the following command: Device# show ap tunnel eogre gateway detailed gateway-name Gateway : Tunnel1 Mode : IPv4 IP : 9.51.1.11 State : Up MTU : 1476 Up Time: 14 hours 25 minutes 2 seconds AP MAC : 80e8.6fd4.9520 Clients Total Number of Wireless Clients Traffic Total Number of Received Packets Total Number of Received Bytes Total Number of Transmitted Packets Total Number of Transmitted Bytes Total Number of Lost Keepalive :1 :6 : 2643 : 94 : 20629 :3 To view summary information about the EoGRE tunnel gateway status, use the following command: Device# show ap tunnel eogre domain summary AP MAC Domain Active Gateway ------------------------------------------------------------------------------- 80e8.6fd4.9520 eogre_domain Tunnel1 To view information about EoGRE events on an AP, use the following command: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2048 WLAN Verifying the EoGRE Tunnel Configuration Device# show ap name ap-name tunnel eogre events AP 80e8.6fd4.9520 Event history Timestamp #Times Event RC Context ----------------------- -------- ------------------- -- ---------------------------------------- 02/18/2019 23:50:26.341 6 IAPP_STATS 0 GW Tunnel2 uptime:0s 02/18/2019 23:49:40.222 2 CLIENT_JOIN 0 74da.3828.88b0, (eogre_domain/2121) 02/18/2019 23:48:43.549 1 CLIENT_LEAVE 0 74da.3828.88b0, (eogre_domain/2121) 02/18/2019 23:47:33.127 1 DOMAIN_STATUS 0 eogre_domain Active GW: Tunnel1 02/18/2019 23:47:33.124 4 AP_TUNNEL_STATUS 0 Tunnel2 Dn 02/18/2019 23:47:33.124 1 MSG_CLIENT_DEL 0 GW Tunnel2 (IP: 9.51.1.12) 02/18/2019 23:47:33.124 2 TUNNEL_ADD 0 GW Tunnel2 02/18/2019 23:47:33.120 3 MSG_CLIENT_DEL_PD 0 GW Tunnel1 (IP: 9.51.1.11) 02/18/2019 23:47:31.763 2 AP_DOMAIN_PUSH 0 Delete:eogre_domain_set, 0 GWs 02/18/2019 23:47:31.753 4 wlan:pyats_eogre AP_VAP_PUSH 0 profile:'eogre_tunnel', To view the summary information about EoGRE tunnel domain's status on an AP, use the following command: Device# show ap name ap-name tunnel eogre domain summary AP MAC Domain Active Gateway ------------------------------------------------------------------------------- 80e8.6fd4.9520 eogre_domain To view the detailed information about EoGRE tunnel domain on an AP, use the following command: Device# show ap name ap-name tunnel eogre domain detailed Domain Name Primary GW Secondary GW Active GW Redundancy AdminState : eogre_domain : Tunnel1 : Tunnel2 : Tunnel1 : Non-Revertive : Up To view the summary information about EoGRE tunnel gateways on an AP, use the following command: Device# show ap name ap-name tunnel eogre gateway summary AP MAC Gateway Type IP State Clients --------------------------------------------------------------------------------------------- 80e8.6fd4.9520 Tunnel1 IPv4 9.51.1.11 Up 1 80e8.6fd4.9520 Tunnel2 IPv4 9.51.1.12 Down 0 To view detailed information about an EoGRE tunnel gateway's status on an AP, use the following command: Device# show ap name ap-name tunnel eogre gateway detailed gateway-name Gateway : Tunnel2 Mode : IPv4 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2049 Verifying the EoGRE Tunnel Configuration IP : 9.51.1.12 State : Down MTU : 0 AP MAC : 80e8.6fd4.9520 Clients Total Number of Wireless Clients Traffic Total Number of Received Packets Total Number of Received Bytes Total Number of Transmitted Packets Total Number of Transmitted Bytes Total Number of Lost Keepalive :0 :0 :0 :0 :0 : 151 WLAN Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2050 1 8 7 C H A P T E R Wireless Guest Access · Wireless Guest Access, on page 2051 · Load Balancing Among Multiple Guest Controllers, on page 2055 · Guidelines and Limitations for Wireless Guest Access, on page 2055 · Configure Mobility Tunnel for Guest Access (GUI), on page 2056 · Configure Mobility Tunnel for Guest Access (CLI), on page 2056 · Configuring Guest Access Policy (GUI), on page 2056 · Configuring Guest Access Policy (CLI), on page 2057 · Viewing Guest Access Debug Information (CLI), on page 2059 · Configure Guest Access Using Different Security Methods, on page 2059 Wireless Guest Access The Wireless Guest Access feature addresses the need to provide internet access to guests in a secure and accountable manner. The implementation of a wireless guest network uses the enterprise's existing wireless and wired infrastructure to the maximum extent. This reduces the cost and complexity of building a physical overlay network. Wireless Guest Access solution comprises of two controllers - a Guest Foreign and a Guest Anchor. An administrator can limit bandwidth and shape the guest traffic to avoid impacting the performance of the internal network. Note · When a client joins through a capwap tunnel from an AP, the RADIUS NAS-Port-Type is set as "wireless 802.11". Here, Point of Attachment (PoA) and Point of Presence (PoP) is the same. · When a client joins through a mobility tunnel, the RADIUS NAS-Port-Type is set as "virtual". Here, PoA is the Foreign controller and PoP is the Anchor controller as the client is anchored. For information on the standard types, see the following link: https://www.iana.org/assignments/radius-types/radius-types.xhtml#radius-types-13 Wireless Guest Access feature comprises the following functions: · Guest Anchor controller is the point of presence for a client. · Guest Anchor Controller provides internal security by forwarding the traffic from a guest client to a Cisco Wireless Controller in the demilitarized zone (DMZ) network through the anchor controller. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2051 Wireless Guest Access WLAN · Guest Foreign controller is the point of attachment of the client. · Guest Foreign Controller is a dedicated guest WLAN or SSID and is implemented throughout the campus wireless network wherever guest access is required. A WLAN with mobility anchor (guest controller) configured on it identifies the guest WLAN. · Guest traffic segregation implements Layer 2 or Layer 3 techniques across the campus network to restrict the locations where guests are allowed. · Guest user-level QoS is used for rate limiting and shaping, although it is widely implemented to restrict the bandwidth usage for a guest user. · Access control involves using embedded access control functionality within the campus network, or implementing an external platform to control guest access to the Internet from the enterprise network. · Authentication and authorization of guests that are based on variables, including date, duration, and bandwidth. · An audit mechanism to track who is currently using, or has used, the network. · A wider coverage is provided by including areas such as lobbies and other common areas that are otherwise not wired for network connectivity. · The need for designated guest access areas or rooms is removed. Note To use IRCM with AireOS in your network, contact Cisco TAC for assistance. Table 144: Supported Controllers Controller Name Supported as Guest Anchor Cisco Catalyst 9800-40 Wireless Yes Controller Cisco Catalyst 9800-80 Wireless Yes Controller Cisco Catalyst 9800-CL Wireless Yes Controller Cisco Catalyst 9800-L Wireless Yes Controller Cisco Catalyst 9800 Embedded No Wireless Controller for Switch Cisco Catalyst 9800 Embedded No Wireless Controller on Cisco Catalyst 9100 Series APs Following is a list of features supported by Cisco Guest Access: Supported as Guest Foreign Yes Yes Yes Yes No No Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2052 WLAN Wireless Guest Access Supported Features · Sleeping Clients · FQDN · AVC (AP upstream and downstream) · Native Profiling · Open Authentication · OpenDNS · Supported Security Methods: · MAB Central Web Authentication (CWA) · Local Web Authentication (LWA) · LWA on MAB Failure · 802.1x + CWA · 802.1x · PSK · 802.1x + LWA · PSK + CWA · PSK + LWA · iPSK + CWA · MAB Failure + PSK · MAB Failure + OWE · MAB Failure + SAE · SSID QoS Upstream and Downstream (Foreign) · AP/ Client SSO · Static IP Roaming · Client IPv6 · Roaming across controllers · RADIUS Accounting Note In a guest access scenario, accounting is always performed at the foreign controller for all authentication methods. · QoS: Client-Level Rate Limiting Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2053 Foreign Map Overview WLAN · Guest Anchor Load Balancing · Workgroup Bridges (WGB) Note To enable the controller to support multiple VLANs from a WGB, use wgb vlan command. Foreign Map Overview Guest Access supports Foreign Map using Policy Profile and WLAN Profile configuration models in Cisco Catalyst 9800 Series Wireless Controller. Foreign Map support in Cisco Catalyst 9800 Series Wireless Controller is achieved with the following policy profile and WLAN profile config model. · Guest Foreign commands: · Foreign1: wlanProf1 PolicyProf1 · Foreign2: wlanProf2 PolicyProf2 · Guest Anchor commands: · wlanProf1, wlanProf2 · PolicyProf1: Vlan100 - subnet1 · PolicyProf2: Vlan200 - subnet2 Foreign Map Roaming Configure two different WLAN profiles on the two Guest Foreigns and seamless roaming is not allowed between them. This is expected configuration. However, seamless roaming is allowed if the same WLAN profile is configured on two Guest Foreigns, but it prevents Foreign Map feature from working. Wireless Guest Access: Use Cases The wireless guest access feature can be used to meet different requirements. Some of the possibilities are shared here. Scenario One: Providing Secured Network Access During Company Merger This feature can be configured to provide employees of company A who are visiting company B to access company A resources on company B network securedly. Scenario Two: Shared Services over Existing Setup Using this feature, you can provide multiple services using multiple vendors piggy backing on the existing network. A company can provide services on an SSID which is anchored on the existing controller. This is while the existing service continues to serve over the same controller and network. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2054 WLAN Load Balancing Among Multiple Guest Controllers Load Balancing Among Multiple Guest Controllers · You can configure export anchors to load balance large guest client volumes. For a single export foreign guest WLAN configuration, up to 72 controllers are allowed. To configure mobility guest controllers, use mobility anchor ip address. · You can specify primary anchors with priority (1,3) and choose another anchor as backup in case of failure. · In a multi-anchor scenario, when the primary anchor goes down, the clients get disconnected from the primary anchor and joins the secondary anchor. Guidelines and Limitations for Wireless Guest Access · Match the security profiles under WLAN on both Guest Foreign, and Guest Anchor. · Match the policy profile attributes such as NAC and AAA Override on both Guest Foreign, and Guest Anchor controllers. · On Export Anchor, the WLAN profile name and Policy profile name is chosen when a client joins at runtime and the same should match with the Guest Foreign controller. Troubleshooting IPv6 When a guest export client cannot get a routable IPv6 address through SLAAC or cannot pass traffic when the IPv6 address is learned through DHCPv6, you can use the following workarounds: · On IPv6 Routers: You can work around the RA multicast to unicast conversion by modifying behaviour on the IPv6 gateway. Depending on the product, this may be the default behaviour or may require configuration. · On Cisco IPv6 Routers · Cisco Nexus platform: Has solicited unicast RA enabled by default to help with wireless deployment. · Cisco IOS-XE platform: Use the following configuration command to turn on unicast RA to help with wireless deployment: ipv6 nd ra solicited unicast · On non-Cisco IPv6 Routers: If non-Cisco network devices do not support configuration command to enable solicited unicast RA then a work around does not exist. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2055 Configure Mobility Tunnel for Guest Access (GUI) WLAN Configure Mobility Tunnel for Guest Access (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configure > Tags and Profiles > WLANs. In the Wireless Networks area, click the relevant WLAN or RLAN and click Mobility Anchor. In the Wireless Network Details section, choose a device from the Switch IP Address drop-down list. Click Apply. Configure Mobility Tunnel for Guest Access (CLI) Follow the procedure given below to configure a mobility tunnel. Procedure Step 1 Command or Action Purpose wireless mobility group name group name Configures a mobility group. Example: Device(config)# wireless mobility group name mtunnelgrp Step 2 wireless mobility mac-address mac address Configures a mobility MAC address. Example: Device(config)# wireless mobility mac-address 0d:4c:da:3a:f2:21 Step 3 wireless mobility group member mac mac Configures a mobility peer. address ip ip address group group name Example: Device(config)# wireless mobility group member mac-address df:07:a1:a7:a8:55 ip 206.223.123.2 group mtgrp Configuring Guest Access Policy (GUI) Procedure Step 1 Step 2 Choose Configuration > Tags & Profiles > Policy. Click Add. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2056 WLAN Configuring Guest Access Policy (CLI) Step 3 Step 4 Step 5 Step 6 Step 7 In the General tab, enter the Name and enable the Central Switching toggle button. In the Access Policies tab, under the VLAN settings, choose the vlans from the VLAN/VLAN Group drop-down list. In the Mobility tab, under the Mobility Anchors settings, check the Export Anchor check box. In the Advanced tab, under the WLAN Timeout settings, enter the Idle Timeout (sec). Click Apply to Device. Configuring Guest Access Policy (CLI) Follow the procedure given below to create and configure the guest access profile policy. Alternately, you may use the existing default policy profile after configuring the mobility anchor to that policy. You can only configure anchors which are peers. Ensure that the IP address that is used is a mobility peer and is included in the mobility group. The system shows an invalid anchor IP address error message when any other IP address is used. To delete the mobility group, ensure that the mobility peer which is also a mobility anchor is removed from the policy profile. Note · No payload is sent to Guest Foreign to display the VLAN. · To avoid a client exclusion from occurring due to VLAN, Cisco Catalyst 9800 Series Controllers need to define VLAN along with the associated name being pushed from ISE. Procedure Step 1 Step 2 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. wireless profile policy wlan_policy_profile Configures the policy profile and enters Example: wireless profile configuration mode. Device(config)# wireless profile policy Note guest-test-policy · You can use the default-policy-profile to configure the profile policy. Step 3 Step 4 shutdown Example: Shuts down the policy if it exists before configuring the anchor. Device(config-wireless-policy)# shutdown central switching Example: (Optional) Enables central switching. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2057 Configuring Guest Access Policy (CLI) WLAN Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action Purpose Device(config-wireless-policy)# central switching Choose the first option to configure the Guest Configures Guest Foreign or Guest Anchor. Foreign or second option to configure the Guest Anchor: · mobility anchor anchor-ip-address · mobility anchor Example: For Guest Foreign: Device(config-wireless-policy)# mobility anchor 19.0.2.1 For Guest Anchor: Device(config-wireless-policy)# mobility anchor idle-timeout timeout Example: Device (config-wireless-policy)# idle-timeout 1000 (Optional) Configures duration of idle timeout, in seconds. vlan vlan-id Configures VLAN name or VLAN Id. Example: Note Device(config-wireless-policy)# vlan 2 VLAN is optional for a Guest Foreign controller. no shutdown Example: Device(config-wireless-policy)# no shutdown Enables policy profile. end Example: Device(config-wireless-policy)# end Exits the configuration mode and returns to privileged EXEC mode. show wireless profile policy summary Example: Device# show wireless profile policy summary (Optional) Displays the configured profiles. show wireless profile policy detailed policy-profile-name Example: Device# show wireless profile policy detailed guest-test-policy (Optional) Displays detailed information of a policy profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2058 WLAN Viewing Guest Access Debug Information (CLI) Viewing Guest Access Debug Information (CLI) · To display client level detailed information about mobility state and the anchor IP address, use the following command:. show wireless client mac-add mac-address detail · To display the client mobility statistics, use the following command: show wireless client mac-address mac-address mobility statistics · To display client level roam history for an active client in sub-domain, use the following command: show wireless client mac-address mac-address mobility history · To display detailed parameters of a given profile policy, use the following command: show wireless profile policy detailed policy-name · To display the global level summary for all mobility messages, use the following command: show wireless mobility summary · To display the statistics for the Mobility manager, use the following command: show wireless stats mobility Configure Guest Access Using Different Security Methods The following sections provide information about the following: Open Authentication To configure the guest access with open authentication, follow the steps: 1. Configuring the WLAN Profile 2. Configuring Guest Access Policy (CLI), on page 2057 Note No tag is required unless AVC is enabled. Configure a WLAN Profile for Guest Access with Open Authentication (GUI) Procedure Step 1 Step 2 Choose Configuration > Tags & Profiles > WLANs. Click Add. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2059 Configure a WLAN Profile For Guest Access with Open Authentication (CLI) WLAN Step 3 Step 4 Step 5 In the General tab, enter the Profile Name, the SSID and the WLAN ID. Choose the radio policy from the Radio Policy drop-down list. Enable or disable the Status and Broadcast SSID toggle buttons. Choose Security > Layer2 tab. Uncheck the WPA Policy, WPA2 Policy, AES and 802.1x check boxes. Click Apply to Device. Configure a WLAN Profile For Guest Access with Open Authentication (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wlan profile-name wlan-id ssid-name. Example: Device(config)# wlan mywlan 34 mywlan-ssid Configures the WLAN and SSID. Step 3 no security wpa Example: Device(config-wlan)# no security wpa Disables WPA security. Step 4 no security wpa akm dot1x Disables security AKM for dot1x. Example: Device(config-wlan)# no security wpa akm dot1x Step 5 no security wpa wpa2 Disables WPA2 security. Example: Device(config-wlan)# no security wpa wpa2 Step 6 no security wpa wpa2 ciphers aes Disables WPA2 ciphers for AES. Example: Device(config-wlan)# no security wpa wpa2 ciphers aes Step 7 no shutdown Example: Device(config-wlan)# no shutdown Saves the configuration. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2060 WLAN Configuring a Policy Profile Configuring a Policy Profile Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy wlan-policy-profile Example: Configures WLAN policy profile and enters the wireless policy configuration mode. Device(config)# wireless profile policy open_it Step 3 Choose the first option to configure a Guest Configures Guest Foreign or Guest Anchor. Foreign or second option to configure a Guest Anchor: · mobility anchor anchor-ip-address · mobility anchor Example: For Guest Foreign: Device (config-wireless-policy)# mobility anchor 19.0.2.1 For Guest Anchor: Device (config-wireless-policy)# mobility anchor Step 4 central switching. Enables Central switching Example: Device(config-wireless-policy)# central switching Step 5 vlan id Configures a VLAN name or VLAN ID. Example: Note Device(config-wireless-policy)# vlan 16 VLAN is optional for a Guest Foreign controller. Step 6 no shutdown Example: Device(config-wireless-policy)# no shutdown Enables the policy profile. Local Web Authentication To configure LWA, follow these steps: 1. Configure a Parameter Map (CLI) Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2061 Configure a Parameter Map (GUI) WLAN 2. Configure a WLAN Profile for Guest Access with Local Web Authentication (CLI) 3. Applying Policy Profile on a WLAN 4. Configure an AAA Server for Local Web Authentication (CLI) Configure a Parameter Map (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Security > Web Auth. Click Add. Enter the Parameter-map name, Maximum HTTP connections,Init-State Timeout(secs) and choose webauth in the Type drop-down list. Click Apply to Device. Configure a Parameter Map (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 parameter-map type webauth global Example: Device(config)# parameter-map type webauth global Creates a parameter map and enters parameter-map webauth configuration mode. Step 3 type webauth Configures the webauth type parameter. Example: Device(config-params-parameter-map)#type webauth Step 4 timeout init-state sec timeout-seconds Example: Device(config-params-parameter-map)# timeout inti-state sec 3600 Configures the WEBAUTH timeout in seconds. Valid range for the time in sec parameter is 60 to 3932100 seconds. Step 5 virtual-ip ipv4 virtual_IP_address Configures a VLAN name or VLAN ID. Example: Device(config-params-parameter-map)#virtual-ip ipv4 209.165.201.1 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2062 WLAN Configure a WLAN Profile for Guest Access with Local Web Authentication (GUI) Configure a WLAN Profile for Guest Access with Local Web Authentication (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Configuration > Tags & Profiles > WLANs. Click on the WLAN name. Choose Security > Layer3. Check the Web Policy check box. Choose a parameter map from the Web Auth Parameter Map drop-down list. Choose an authentication list from the Authentication List drop-down list. Click Update & Apply to Device. Configure a WLAN Profile for Guest Access with Local Web Authentication (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wlan wlan-id ssid-name Configures the WLAN and SSID. Example: Device# Device(config)# wlan mywlan 38 mywlan-ssid1 Step 3 security web-auth Enables web authentication for a WLAN. Example: Device(config-wlan)# security web-auth Step 4 security web-auth parameter-map default Configure the default parameter map. Example: Note Device(config-wlan)# security web-auth parameter-map default When security web-auth is enabled, you get to map the default authentication-list and global parameter-map. This is applicable for authentication-list and parameter-map that are not explicitly mentioned. Step 5 security web-auth parameter-map global Configure the global parameter map. Example: Device(config-wlan)# security web-auth parameter-map global Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2063 Configure an AAA Server for Local Web Authentication (GUI) WLAN Step 6 Command or Action Purpose security web-auth authentication-list LWA-AUTHENTICATION Sets the authentication list for IEEE 802.1x. Example: Device(config-wlan)# security web-auth authentication-list LWA-AUTHENTICATION Configure an AAA Server for Local Web Authentication (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Security > AAA > AAA Advanced > Global Config. Choose the options from the Local Authentication, Authentication Method List, Local Authorization and Authorization Method List drop-down lists. Enable or Disable the Radius Server Load Balance using toggle button. Check the Interim Update check box. Click Apply. Configure an AAA Server for Local Web Authentication (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 aaa authentication login LWA-AUTHENTICATION local Defines the authentication method at login. Example: Device(config)#aaa authentication login lwa-authentication local Step 3 aaa authorization network default local if-authenticated Sets the authorization method to local if the user has authenticated. Example: Device(config)#aaa authorization network default local if-authenticated Global Configuration Follow the procedure given below for global configuration: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2064 WLAN Central Web Authentication Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 username name password 0 clear-text-passowrd Sets the clear text password for the user. Example: Device(config)# #username base password 0 pass1 Step 3 ip http server Example: Device(config)#ip http server Enables the HTTP server. Step 4 ip http authentication local Example: Device(config)#ip http authentication local Sets the HTTP server authentication method to local. Note You will get the admin access rights regardless of the user privilege, if the ip http authentication local is disabled and username is the same as enable password. Central Web Authentication To configure CWA, follow these steps: 1. Configure a WLAN Profile for Guest Access with Central Web Authentication (CLI) 2. Applying Policy Profile to a WLAN, on page 1064 3. AAA Server Configuration (CLI) 4. Creating Redirect ACL, on page 1028 Configure a WLAN Profile for Guest Access with Central Web Authentication (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Tags & Profiles > WLANs. Click Add. In the General tab, enter the Profile Name, the SSID, and the WLAN ID. To enable the WLAN, set Status as Enabled. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2065 Configure a WLAN Profile for Guest Access with Central Web Authentication (CLI) WLAN Step 5 Step 6 Step 7 Step 8 Step 9 From the Radio Policy drop-down list, select the radio policy. To enable the Broadcast SSID, set the status as Enabled. Choose Security > Layer2 tab. Uncheck the WPA Policy, WPA2 Policy, AES and 802.1x check boxes. Check the MAC Filtering check box to enable the feature. With MAC Filtering enabled, choose the Authorization list from the Authorization List drop-down list. Click Apply to Device. Configure a WLAN Profile for Guest Access with Central Web Authentication (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wlan wlan-id ssid-name Configures the WLAN and SSID. Example: Device# Device(config)# wlan mywlan 38 mywlan-ssid1 Step 3 mac-filtering remote_authorization_list_name Enables MAB authentication for the remote Example: RADIUS server. Device(config-wlan)# mac-filtering auth-list Step 4 no security wpa Example: Device(config-wlan)# no security wpa Disables WPA security. Step 5 no security wpa akm dot1x Disables security AKM for dot1x. Example: Device(config-wlan)# no security wpa akm dot1x Step 6 no security wpa wpa2 Disables WPA2 security. Example: Device(config-wlan)# no security wpa wpa2 Step 7 no security wpa wpa2 ciphers aes Disables WPA2 ciphers for AES. Example: Device(config-wlan)# no security wpa wpa2 ciphers aes Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2066 WLAN AAA Server Configuration (GUI) Step 8 Command or Action no shutdown Example: Device(config-wlan)# no shutdown AAA Server Configuration (GUI) Procedure Purpose Saves the configuration. Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Choose Configuration > Security > AAA > Servers/Groups > RADIUS > Server Groups. Click the RADIUS server group. From the MAC-Delimiter drop-down list, choose an option. From the MAC-Filtering drop-down list, choose an option. Enter the Dead-Time (mins). From the Available Servers on the left, move the servers you need to Assigned Servers on the right. Click Update & Apply to Device. Choose Configuration > Security > AAA > Servers/Groups > RADIUS > Servers. Click the RADIUS server. Enter the IPv4/IPv6 Server Address, Auth Port, Acct Port, Server Timeout (seconds) and Retry Count. Check or uncheck the PAC Key checkbox and choose the Key Type from the Key Type drop-down list. Enter the Key and Confirm Key. Enable or disable the Support for CoA toggle button. Click Update & Apply to Device. AAA Server Configuration (CLI) Note Configure AAA server for Guest Foreign only. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 aaa authorization network authorization-listlocal group Server-group-name Example: Purpose Enters global configuration mode. Sets the authorization method to local. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2067 Configuring 802.1x with Local Web Authentication WLAN Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action Purpose Device(config)#aaa authorization network cwa local group ise aaa group server radius server-group-name Configures RADIUS server group definition. Example: Note Device(config)#aaa group server radius ise server-group-name refers to the server group name. The valid range is from 1 to 32 alphanumeric characters. server name radius-server-name Configures the RADIUS server name. Example: Device(config-sg-radius)#server name ise1 subscriber mac-filtering security-mode mac Sets the MAC address as the password. Example: Device(config-sg-radius)#$mac-filtering security-mode mac mac-delimiter colon Sets the MAC address delimiter to colon. Example: Device(config-sg-radius)#mac-delimiter colon end Example: Device(config-sg-radius)#end Saves the configuration, exits configuration mode, and returns to privileged EXEC mode. radius server name Example: Device(config)#radius server ISE1 Sets the RADIUS server name address ipv4 radius-server-ipaddress Configures the RADIUS server IP address auth-port port-number acct-port port-number authentication and accounting ports. Example: Device(config-radius-server)#address ipv4 209.165.201.1 auth-port 1635 acct-port 33 Configuring 802.1x with Local Web Authentication Procedure Step 1 Command or Action configure terminal Example: Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2068 WLAN Configuring Local Web Authentication with PSK Protocol Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action Device# configure terminal Purpose wlan wlan-profile wlan-id ssid Example: Device(config)# wlan testwprofile 22 ssid-3 Configures the WLAN and SSID. security dot1x authentication-list default Example: Device(config-wlan)# security dot1x authentication-list default Configures 802.1X for an WLAN. security web-auth authentication-list authenticate-list-name Enables authentication list for 802.1x security on the WLAN. Example: Device(config-wlan)# security web-auth authentication-list default security web-auth parameter-map global Configures the global parameter map. Example: Device(config-wlan)# security web-auth parameter-map global no shutdown Example: Device(config-wlan)# no shutdown Enables the WLAN. Configuring Local Web Authentication with PSK Protocol Procedure Step 1 Step 2 Step 3 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. wlan wlan-profile wlan-id ssid Configures the WLAN and SSID. Example: Device(config)# wlan psksec-profile 22 ssid-4 no security wpa Example: Device(config-wlan)# no security wpa Disables WPA secuirty. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2069 Central Web Authentication with PSK Protocol WLAN Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action no security wpa wpa2 Example: Device(config-wlan)# no security wpa wpa2 Purpose Disables WPA2 security. no security wpa akm dot1x Example: Device(config-wlan)# no security wpa akm dot1x Disables security AKM for dot1x. security wpa psk Enables the security type as PSK. Example: Device(config-wlan)# security wpa akm psk security wpa psk set-key {ascii|hex} key Configures the PSK shared key. Example: Device(config-wlan)# security wpa akm psk set-key asci 0 security web-auth Enables the web authentication for theWLAN. Example: Device(config-wlan)# security web-auth security web-auth authentication-list default Enables authentication list for the WLAN. Example: Device(config-wlan)# security web-auth authentication-list default security web-auth parameter-map global Configure the global parameter map. Example: Device(config-wlan)# security web-auth parameter-map global Central Web Authentication with PSK Protocol To configure the CWA with PSK security protocol, follow the steps: 1. Configure WLAN Profile for Central Web Authentication with PSK Protocol 2. Applying Policy Profile on a WLAN Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2070 WLAN Configure WLAN Profile for Central Web Authentication with PSK Protocol Configure WLAN Profile for Central Web Authentication with PSK Protocol Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wlan wlan-profile wlan-id ssid Configures the WLAN and SSID. Example: Device(config)# wlan cwasec-profile 27 ssid-5 Step 3 no security wpa Example: Device(config-wlan)# no security wpa Disables WPA security. Step 4 no security wpa wpa2 Disables WPA2 security. Example: Device(config-wlan)# no security wpa wpa2 Step 5 no security wpa akm dot1x Disables security AKM for dot1x. Example: Device(config-wlan)# no security wpa akm dot1x Step 6 security wpa psk Example: Device(config-wlan)# security wpa psk Enables the security type as PSK. Step 7 security wpa psk set-key {ascii|hex} key Example: Device(config-wlan)# security wpa psk set-key asci 0 Configures the PSK shared key. Step 8 mac-filtering authorization_list_name Example: Device(config-wlan)# mac-filtering cwa-list Enables MAC filtering for PSK web authentication. Central Web Authentication with iPSK Protocol To configure the CWA with iPSK security protocol, follow the steps: 1. Configure WLAN Profile for Central Web Authentication with iPSK Protocol Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2071 Configure WLAN Profile for Central Web Authentication with iPSK Protocol WLAN Configure WLAN Profile for Central Web Authentication with iPSK Protocol Procedure Step 1 Command or Action Purpose wlan guest-wlan-name wlan-id ssid Configures guest WLAN. Example: config# wlan ipsk-cwa-profile 28 ssid-6 Step 2 no security wpa akm dot1x Disables security AKM for 802.1x. Example: Device(config-wlan)# no security wpa akm dot1x Step 3 security wpa akm psk set-key {ascii|hex} key Example: Device(config-wlan)# security wpa akm psk set-key asci 0 Configures the PSK AKM shared key. Step 4 mac-filtering authorization_list_name Example: Device(config-wlan)# mac-filtering cwa-list Enables MAC filtering for iPSK authentication. Configure Web Authentication on MAC Address Bypass failure (GUI) Procedure Step 1 Step 2 Step 3 Click Configuration > Tags and Profiles > WLANs. Click Add to add a new WLAN Profile or click the one you want to edit. In the Edit WLAN window, complete the following steps: a) Choose Security > Layer2 and check the MAC Filtering check box ot enable MAC filtering. b) From the Authorization List drop-down list, select a value. c) Choose the Layer3 tab. d) Click Show Advanced Settings and check the On MAC Filter Failure checkbox. Configure Web Authentication on MAC Address Bypass Failure (CLI) You can configure authentication to fall back to web authentication, if a client cannot authenticate using MAC filter (Local or RADIUS), while trying to connect to a WLAN. To enable this feature, configure both MAC filtering and Web Authentication on the device. This can also avoid disassociations that happen only because of MAC filter authentication failure. To configure this feature, follow the procedure: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2072 WLAN Configure a Policy Profile Configure a Policy Profile Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy policy-name Example: Configures WLAN policy profile and enters the wireless policy configuration mode. Device(config)# wireless profile policy cwa Step 3 central switching Enables Central switching. Example: Device(config-wireless-policy)# central switching Step 4 Choose the first option to configure a Guest Configures Guest Foreign or Guest Anchor. Foreign or second option to configure a Guest Anchor: · mobility anchor anchor-ip-address · mobility anchor Example: For Guests Foreign: Device (config-wireless-policy)# mobility anchor 19.0.2.1 For Guest Anchor: Device (config-wireless-policy)# mobility anchor Step 5 vlan name Configures a VLAN name or VLAN ID. Example: Note Device(config-wireless-policy)# vlan 16 VLAN is optional for a Guest Foreign controller. Step 6 no shutdown Example: Device(config-wireless-policy)# no shutdown Enables the policy profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2073 Configure a WLAN Profile WLAN Configure a WLAN Profile Procedure Step 1 Command or Action Purpose wlan guest-wlan-name wlan-id ssid Configures guest WLAN. Example: config# wlan test-wlan-guest 10 wlan-ssid Step 2 mac-filtering mac-auth-listname Configures MAC filtering support on WLAN. authorization-override override-auth-listname Example: config-wlan# mac-filtering mac-auth-listname authorization-override Step 3 security web-auth Example: config-wlan# security web-auth Enables web authentication. Step 4 security web-auth on-macfilter-failure Example: config-wlan# security web-auth on-macfilter-failure Enables web authentication if MAC filter authentication fails. Configure WLAN for Web Authentication on MAC Authentication Bypass Failure with Pre-Shared Key (CLI) Procedure Step 1 Step 2 Command or Action configure terminal Example: Device# configure terminal wlan profile-name wlan-id SSID_Name Example: Device(config)# wlan wlan-test 3 ssid-test Purpose Enters global configuration mode. Enters WLAN configuration submode. · profile-name: Profile name of the configured WLAN. · wlan-id: Wireless LAN identifier. Range is from 1 to 512. · SSID_Name: SSID that can contain 32 alphanumeric characters. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2074 WLAN Configure WLAN for Web Authentication on MAC Authentication Bypass Failure with Pre-Shared Key (CLI) Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action Purpose Note If you have already configured this command, enter the wlan profile-name command. mac-filtering auth-list-name Example: Device(config-wlan)# mac-filtering test-auth-list Sets the MAC filtering parameters. security wpa psk set-key ascii/hex key password Configures the PSK AKM shared key. Example: Device(config-wlan)# security wpa psk set-key ascii 0 PASSWORD no security wpa akm dot1x Example: Device(config-wlan)# no security wpa akm dot1x Disables security AKM for dot1x. security wpa akm psk Configures PSK support. Example: Device(config-wlan)# security wpa akm psk security web-auth authentication-list authenticate-list-name Enables authentication list for dot1x security. Example: Device(config-wlan)# security web-auth authentication-list default security web-auth authorization-list authorize-list-name Enables authorization list for dot1x security. Example: Device(config-wlan)# security web-auth authorization-list default security web-auth on-macfilter-failure Example: Enables web authentication on MAC filter failure. Device(config-wlan)# security web-auth on-macfilter-failure security web-auth parameter-map Configures the parameter map. parameter-map-name Note If a parameter map is not Example: associated with a WLAN, the Device(config-wlan)# security web-auth parameter-map WLAN1_MAP configuration is considered from the global parameter map. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2075 Configure WLAN for Web Authentication on MAC Authentication Bypass Failure with OWE (CLI) WLAN Step 11 Command or Action no shutdown Example: Device(config-wlan)# no shutdown Purpose Enables the WLAN. Configure WLAN for Web Authentication on MAC Authentication Bypass Failure with OWE (CLI) Procedure Step 1 Step 2 Command or Action configure terminal Example: Device# configure terminal wlan profile-name wlan-id SSID_Name Example: Device(config)# wlan wlan-test 3 ssid-test Purpose Enters global configuration mode. Enters WLAN configuration submode. · profile-name: Profile name of the configured WLAN. · wlan-id: Wireless LAN identifier. Range is from 1 to 512. · SSID_Name: SSID that can contain 32 alphanumeric characters. Note If you have already configured this command, enter the wlan profile-name command. Step 3 Step 4 Step 5 Step 6 mac-filtering auth-list-name Example: Device(config-wlan)# mac-filtering test-auth-list Sets the MAC filtering parameters. no security wpa akm dot1x Example: Device(config-wlan)# no security wpa akm dot1x Disables security AKM for dot1x. security wpa wpa3 Enables WPA3 support. Example: Device(config-wlan)# security wpa wpa3 security wpa akm owe Example: Enables WPA3 OWE support. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2076 WLAN Configure WLAN for Web Authentication on MAC Authentication Bypass Failure with Secure Agile Exchange (CLI) Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action Purpose Device(config-wlan)# security wpa akm owe security web-auth authentication-list authenticate-list-name Enables authentication list for dot1x security. Example: Device(config-wlan)# security web-auth authentication-list default security web-auth authorization-list authorize-list-name Enables authorization list for dot1x security. Example: Device(config-wlan)# security web-auth authorization-list default security web-auth on-macfilter-failure Example: Enables web authentication on MAC filter failure. Device(config-wlan)# security web-auth on-macfilter-failure security web-auth parameter-map Configures the parameter map. parameter-map-name Note If a parameter map is not Example: associated with a WLAN, the Device(config-wlan)# security web-auth parameter-map WLAN1_MAP configuration is considered from the global parameter map. no shutdown Example: Device(config-wlan)# no shutdown Enables the WLAN. Configure WLAN for Web Authentication on MAC Authentication Bypass Failure with Secure Agile Exchange (CLI) Procedure Step 1 Step 2 Command or Action configure terminal Example: Device# configure terminal wlan profile-name wlan-id SSID_Name Example: Device(config)# wlan wlan-test 3 ssid-test Purpose Enters global configuration mode. Enters WLAN configuration submode. · profile-name: Profile name of the configured WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2077 Configure WLAN for Web Authentication on MAC Authentication Bypass Failure with Secure Agile Exchange (CLI) WLAN Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action Purpose · wlan-id: Wireless LAN identifier. Range is from 1 to 512. · SSID_Name: SSID that can contain 32 alphanumeric characters. Note If you have already configured this command, enter the wlan profile-name command. mac-filtering auth-list-name Example: Device(config-wlan)# mac-filtering test-auth-list Sets the MAC filtering parameters. no security wpa akm dot1x Example: Device(config-wlan)# no security wpa akm dot1x Disables security AKM for dot1x. security wpa wpa3 Enables WPA3 support. Example: Device(config-wlan)# security wpa wpa3 security wpa akm sae Enables AKM SAE support. Example: Device(config-wlan)# security wpa akm sae security web-auth authentication-list authenticate-list-name Enables authentication list for dot1x security. Example: Device(config-wlan)# security web-auth authentication-list default security web-auth authorization-list authorize-list-name Enables authorization list for dot1x security. Example: Device(config-wlan)# security web-auth authorization-list default security web-auth on-macfilter-failure Example: Enables web authentication on MAC filter failure. Device(config-wlan)# security web-auth on-macfilter-failure security web-auth parameter-map parameter-map-name Configures the parameter map. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2078 WLAN Configuring WLAN for Web Authentication on MAC Authentication Failure with Dot1x (CLI) Step 11 Command or Action Purpose Example: Note Device(config-wlan)# security web-auth parameter-map WLAN1_MAP If a parameter map is not associated with a WLAN, the configuration is considered from the global parameter map. no shutdown Example: Device(config-wlan)# no shutdown Enables the WLAN. Configuring WLAN for Web Authentication on MAC Authentication Failure with Dot1x (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wlan profile-name wlan-id SSID_Name Example: Device(config)# wlan wlan-test 3 ssid-test Step 3 Step 4 mac-filtering auth-list-name Example: Device(config-wlan)# mac-filtering test-auth-list security dot1x authentication-list dot1x-authentication-list Example: Purpose Enters global configuration mode. Enters WLAN configuration submode. · profile-name: Profile name of the configured WLAN. · wlan-id: Wireless LAN identifier. Range is from 1 to 512. · SSID_Name: SSID that can contain 32 alphanumeric characters. Note If you have already configured a WLAN, enter the profile name of the configured WLAN in the command (wlan profile-name) and continue with the rest of the configuration steps. Sets the MAC filtering parameters. Configures 802.1x. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2079 Configuring WLAN for Web Authentication on MAC Authentication Failure with Dot1x (CLI) WLAN Step 5 Step 6 Step 7 Step 8 Command or Action Device(config-wlan)# security dot1x authentication-list dot1x-authentication-list Purpose security web-auth authentication-list authenticate-list-name Enables the authentication list. Example: Device(config-wlan)# security web-auth authentication-list default security web-auth on-macfilter-failure Example: Enables web authentication on MAC filter failure. Device(config-wlan)# security web-auth on-macfilter-failure security web-auth parameter-map parameter-map-name Configures the web authentication parameter map. Example: Note Device(config-wlan)# security web-auth parameter-map WLAN1_MAP If a parameter map is not associated with a WLAN, the configuration is considered from the global parameter map. no shutdown Example: Device(config-wlan)# no shutdown Enables the WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2080 1 8 8 C H A P T E R Wired Guest Access · Information About Wired Guest Access, on page 2081 · Restrictions for Wired Guest Access, on page 2084 · Configuring Access Switch for Wired Guest Client, on page 2084 · Configuring Access Switch for Foreign Controller, on page 2085 · Configuring Foreign Controller with Open Authentication (GUI), on page 2086 · Configuring Foreign Controller with Open Authentication, on page 2086 · Configuring Foreign Controller with Local Web Authentication (GUI), on page 2088 · Configuring Foreign Controller with Local WEB Authentication, on page 2089 · Configuring Anchor Controller with Open Authentication (GUI), on page 2090 · Configuring Anchor Controller with Open Authentication, on page 2091 · Configuring Anchor Controller with Local Web Authentication (GUI), on page 2092 · Configuring Anchor Controller with Local Web Authentication, on page 2093 · Configuring Session Timeout for a Profile Policy, on page 2094 · Global Configuration (GUI), on page 2095 · Verifying Wired Guest Configurations, on page 2095 · Wired Guest Access--Use Cases, on page 2099 Information About Wired Guest Access The Wired Guest Access feature enables guest users of an enterprise network that supports both wired and wireless access to connect to the guest access network. The wired guest clients can connect from the designated and configured wired Ethernet ports for the guest access after they complete the configured authentication methods. Wired session guests are directed to a wireless guest controller in a demilitarized zone (DMZ) through a Control And Provisioning of Wireless Access Points (CAPWAP) tunnel. Wired guest access can be configured in a dual-controller configuration that uses both an anchor controller and a foreign controller. A dual-controller configuration isolates wired guest access traffic from the enterprise user traffic. The wired session guests are provided open or web-authenticated access from the wireless controller. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2081 Information About Wired Guest Access Figure 54: Guest Access Architecture WLAN IPv6 Router Advertisement Forwarding for a Wired Guest Wired clients get the IPv6 based connectivity when they receive the IPv6 Router Advertisement (RA) message. The IPv6 router sends these RA messages and it contains information such as IPv6 prefix and router link-local address. These RA messages are sent as Unicast or Multicast messages. The Unicast RA messages are routed as same as the client directed traffic. The Multicast RA messages are forwarded to all the clients present in the intended VLAN. RA message forwarding is enabled by default and requires no specific configuration. Guest Anchor Controller: Guest anchor controller forwards the RA packets, from the receiving VLAN, to all the foreign controllers using the mobility data tunnel. The RA packets are tagged with the anchor VLAN to ensure the message is forwarded to the correct clients using the foreign controller data path. Guest Foreign Controller: Guest foreign controller forwards the received RAs from the guest anchor to the wired ports on which the wired guest clients are connected. To forward the RAs to the intended clients, the guest foreign controller keeps a track of the wired guest clientsper interface, access VLANs, and anchor VLANs. Supported Features · Cisco Catalyst 9800 Series Wireless Controllers-Anchor · Cisco AireOS Wireless Controllers-Anchor · Cisco Catalyst 9800 Series Wireless Controllers-Foreign · Cisco AireOS Wireless Controllers-Foreign · Dual controller solution (foreign + anchor) and access switch · Trunk Ports · Open Authentication · Local Web Authentication Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2082 WLAN Information About Wired Guest Access To configure Web Authentication, see Web-based Authentication section of the Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide. · Local Web Authentication (web consent). Note In AireOS, this is referred to as web pass-through. · Local Web Authentication + ISE (External Web Authentication). · LWA (local web authentication), with a username and a password. · Web consent (LWA + consent), that is with a username, a password and the check box of acceptance. · Scale max 2k clients and 5 guest-LANs (5 VLANs max) · Client IPv6 support · Idle Timeout and Session Timeout · Accounting on Foreign Note Statistics computation not supported. · Manageability (SNMP/Yang/WebUI) · QoS Rate-Limiting and MQC Policies (Upstream at foreign, Upstream, and Downstream at the anchor) Note QoS rate-limiting supports bps rate-limiting, pps rate-limiting is not supported. · QoS support with AireOS Anchor setup · Stateful Switch Over (SSO) · Port Channel support on Anchor and Foreign with no restrictions to the controller's role. · Access Port on Foreign · Cisco Umbrella (not supported in AireOS Anchor) · ACL support at anchor · Fully Qualified Domain Name (FQDN) URL filtering is supported at Anchor controller. · IP theft detection · Sleeping Client Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2083 Restrictions for Wired Guest Access WLAN Restrictions for Wired Guest Access · A maximum of five guest LANs are supported on the foreign controller. · A maximum of 2000 clients per foreign are supported. · No Multicast or Broadcast support. · You can map only one wired VLAN to a guest LAN. · You can map only one guest LAN to one policy profile. · Every guest LAN has a unique name and this name cannot be shared with RLAN or WLAN. · Ensure that the Anchor VLAN ID and the wired VLAN ID configured on the Foreign controller is not the same. · QoS is not supported on VLAN and on physical interfaces of the controller. Configuring Access Switch for Wired Guest Client Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 vlan vlan-id Example: Device(config)#vlan 200 Creates the VLAN ID. Step 3 exit Example: Device(config)#exit Returns to configuration mode. Step 4 interface GigabitEthernetinterface number Example: Device(config)#interface GigabitEthernet1/0/1 Enters the interface to be added to the VLAN. Step 5 switchport access vlan vlan-id Example: Assigns the port to a VLAN. The valid VLAN IDs range is between 1 and 4094. Device(config-if)#switchport access vlan 200 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2084 WLAN Configuring Access Switch for Foreign Controller Step 6 Step 7 Step 8 Command or Action Purpose switchport mode access Example: Defines the VLAN membership mode for the port. Device(config-if)#switchport mode access no cdp enable Example: Device(config-if)#no cdp enable Disables CDP on the interface. end Example: Device(config-if)#end Saves the configuration and exits configuration mode and returns to privileged EXEC mode. Configuring Access Switch for Foreign Controller Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 vlan vlan-id Example: Device(config)#vlan 200 Creates the VLAN ID. Step 3 exit Example: Device(config)#exit Returns to configuration mode. Step 4 interface GigabitEthernetinterface number Example: Device(config)#interface GigabitEthernet1/0/2 Enters the interface to be added to the VLAN. Step 5 switchport trunk allowed vlan vlan-id Example: Device(config-if)#switchport trunk allowed vlan 200 Assigns the allowed VLAN ID to the port when it is in trunking mode. Step 6 switchport mode trunk Sets the trunking mode to trunk unconditionally. Example: Device(config-if)#switchport mode trunk Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2085 Configuring Foreign Controller with Open Authentication (GUI) WLAN Step 7 Command or Action end Example: Device(config-if)#end Purpose Saves the configuration and exits configuration mode and returns to privileged EXEC mode. Configuring Foreign Controller with Open Authentication (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Step 15 Step 16 Step 17 Step 18 Step 19 Choose Configuration > Tags & Profiles > Policy. Click on a Policy Name. Go to the Mobility tab. In the Mobility Anchors section, check the Export Anchor check box. Click Apply to Device. Choose Configuration > Wireless > Guest LAN > Guest LAN Configuration Click Add. In the General tab, enter the Profile Name, Guest LAN ID, Client Association Limit. Choose the desired mode from the mDNS Mode drop-down list. Enable or disable the Status and Wired VLAN Status toggle button. In the Security tab, disable the Web Auth toggle button. ClickApply to Device. Choose Configuration > Wireless > Guest LAN > Guest LAN Map Configuration Click Add Map. In the Add Guest LAN Map window, enter the Guest LAN Map. Click Apply to Device. Click Add. Choose the values from the Profile Name and Policy Name drop-down lists. Click Save. Configuring Foreign Controller with Open Authentication Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2086 WLAN Configuring Foreign Controller with Open Authentication Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action Purpose wireless profile policy wlan-policy-profile-name Configures the WLAN policy profile. Example: Device(config)#wireless profile policy testpro-1 mobility anchor non-local-mobility-cntlr-ip Configures the mobility anchor and sets its priority priority priority. Example: Device(config-wireless-policy)#mobility anchor 192.168.201.111 priority 1 no shutdown Example: Device(config-wireless-policy)#no shutdown Enables the configuration. exit Example: Device(config-wireless-policy)#exit Returns to configuration mode. guest-lan profile-name guest-profile-name Configures guest LAN profile with a wired guest-lan-id wired-vlan wired-vlan-id VLAN. Example: Note Device(config)#guest-lan profile-name gstpro-1 1 wired-vlan 25 Configure the wired VLAN only for the Guest Foreign controller. no security web-auth Example: Device(config-guest-lan)#no security web-auth Disables web-authentication. no shutdown Example: Device(config-guest-lan)#no shutdown Enables the guest LAN. exit Example: Device(config-guest-lan)#exit Returns to configuration mode. wireless guest LAN map gst-map-name Configures a guest LAN map. Example: Device(config)#wireless guest LAN map gstmap-1 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2087 Configuring Foreign Controller with Local Web Authentication (GUI) WLAN Step 11 Step 12 Command or Action Purpose guest-lan guest-profile-name policy wlan-policy-profile-name Attaches a guest LAN map to the policy profile. Example: Device(config-guest-lan-map)#guest-lan gstpro-1 policy testpro-1 exit Example: Device(config-guest-lan-map)#exit Returns to configuration mode. Configuring Foreign Controller with Local Web Authentication (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Step 15 Step 16 Step 17 Step 18 Step 19 Step 20 Step 21 Choose Configuration > Tags & Profiles > Policy. Select a Policy Name. Go to the Mobility tab. In the Mobility Anchors section, check the Export Anchor check box. Click Update & Apply to Device. Choose Configuration > Wireless > Guest LAN > Guest LAN Configuration Click Add. In the General tab, enter the Profile Name, Guest LAN ID, Client Association Limit. Choose the desired mode from the mDNS Mode drop-down list. Enable or disable the Status and Wired VLAN Status using toggle button. Go to the Security tab. Enable the Web Auth using toggle button. Choose the values from the Web Auth Parameter Map, Authentication List and Authorization List drop-down lists. ClickApply to Device. Choose Configuration > Wireless > Guest LAN > Guest LAN Map Configuration Click Add Map. In the Add Guest LAN Map window, enter the Guest LAN Map. Click Apply to Device. Click Add. Choose the values from the Profile Name and Policy Name drop-down lists. Click Save. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2088 WLAN Configuring Foreign Controller with Local WEB Authentication Configuring Foreign Controller with Local WEB Authentication Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. wireless profile policy wlan-policy-profile-name Configures the WLAN policy profile. Example: Device(config)#wireless profile policy testpro-1 mobility anchor non-local-mobility-cntlr-ip Configures the mobility anchor and sets its priority priority priority. Example: Device(config-wireless-policy)#mobility anchor 192.168.201.111 priority 1 no shutdown Example: Device(config-wireless-policy)#no shutdown Enables the configuration. exit Example: Device(config-wireless-policy)#exit Returns to configuration mode. guest-lan profile-name guest-profile-name Configures guest LAN profile with a wired guest-lan-id wired-vlan wired-vlan-id VLAN. Example: Device(config)#guest-lan profile-name gstpro-2 3 wired-vlan 26 security web-auth Example: Device(config-guest-lan)#security web-auth Enables web-authentication. security web-auth authentication-list auth-list-name Example: Device(config-guest-lan)#security web-auth authentication-list default Configures the authentication list for a IEEE 802.1x network. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2089 Configuring Anchor Controller with Open Authentication (GUI) WLAN Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Command or Action security web-auth parameter-map parameter-map-name Example: Device(config-guest-lan)#security web-auth parameter-map global Purpose Configures the security web-auth parameter map. no shutdown Example: Device(config-guest-lan)#no shutdown Enables the guest LAN. exit Example: Device(config-guest-lan)#exit Returns to configuration mode. wireless guest-lan map gst-map-name Configures a guest LAN map. Example: Device(config)#wireless guest-lan map gstmap-2 guest-lan guest-lan-profile-name policy policy-profile-name Attaches a guest LAN map to the policy profile. Example: Device(config-guest-lan-map)#guest-lan gstpro-2 policy testpro-1 exit Example: Device(config-guest-lan-map)#exit Returns to configuration mode. What to do next For more information about Local Web Authentication, see https://www.cisco.com/c/en/us/td/docs/wireless/ controller/9800/config-guide/b_wl_16_10_cg/wireless-web-authentication.html Configuring Anchor Controller with Open Authentication (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > Policy. Click Add. In the General tab, enter the Name. Go to the Access Policies tab. Under the VLAN settings, choose the vlans from the VLAN/VLAN Group drop-down list. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2090 WLAN Configuring Anchor Controller with Open Authentication Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Go to the Mobility tab. Under the Mobility Anchors settings, check the Export Anchor check box. Click Apply to Device. Choose Configuration > Wireless > Guest LAN. Click Add. In the General tab, enter the Profile Name, the Guest LAN ID and the Client Association Limit. In the Security tab, under the Layer3 settings, disable the Web Auth toggle button. Click Apply to Device. Configuring Anchor Controller with Open Authentication Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. wireless profile policy wlan-policy-profile-name Configures the WLAN policy profile. Example: Device(config)#wireless profile policy testpro-2 mobility anchor Configures the mobility anchor. Example: Device(config-wireless-policy)#mobility anchor vlan vlan-id Configure a VLAN name or a VLAN ID. Example: Device(config-wireless-policy)#vlan 29 no shutdown Example: Device(config-wireless-policy)#no shutdown Enables the configuration. exit Example: Device(config-wireless-policy)#exit Returns to configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2091 Configuring Anchor Controller with Local Web Authentication (GUI) WLAN Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action Purpose guest-lan profile-name guest-profile-name Configures the guest LAN profile with a wired guest-lan-id VLAN. Example: Device(config)#guest-lan profile-name testpro-2 1 client association limit guest-lan-client-limit Configures the maximum client connections Example: Device(config-guest-lan)#client per guest LAN. The valid range is between 1 and 2000. association limit no security web-auth Example: Device(config-guest-lan)#no security web-auth Disables web authentication. no shutdown Example: Device(config-guest-lan)#no shutdown Enables the guest LAN. exit Example: Device(config-guest-lan)#exit Returns to configuration mode. Configuring Anchor Controller with Local Web Authentication (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Choose Configuration > Tags & Profiles > Policy. Click Add. In the General tab, enter the Name. Go to the Access Policies tab. Under the VLAN settings, choose the vlans from the VLAN/VLAN Group drop-down list. Go to the Mobility tab. Under the Mobility Anchors settings, check the Export Anchor check box. Click Apply to Device. Choose Configuration > Wireless > Guest LAN. Click Add. In the General tab, enter the Profile Name, the Guest LAN ID and the Client Association Limit. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2092 WLAN Configuring Anchor Controller with Local Web Authentication Step 12 Step 13 In the Security tab, under the Layer3 settings, enable the Web Auth toggle button. Choose the Parameter map from the Web Auth Parameter Map drop-down list and the authentication list from the Authentication List drop-down list. Click Apply to Device. Configuring Anchor Controller with Local Web Authentication Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. wireless profile policy wlan-policy-profile-name Configures the WLAN policy profile. Example: Device(config)#wireless profile policy testpro-2 mobility anchor Configures the mobility anchor. Example: Device(config-wireless-policy)#mobility anchor vlan vlan-id Configure a VLAN name or a VLAN ID. Example: Device(config-wireless-policy)#vlan 30 no shutdown Example: Device(config-wireless-policy)#no shutdown Enables the configuration. exit Example: Device(config-wireless-policy)#exit Returns to configuration mode. guest-lan profile-name guest-profile-name Configure a guest LAN profile with a wired guest-lan-id VLAN. Example: Device(config)#guest-lan profile-name testpro-2 1 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2093 Configuring Session Timeout for a Profile Policy WLAN Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Command or Action Purpose client association limit guest-lan-client-limit Configures the maximum client connections Example: Device(config-guest-lan)#client per guest LAN. The valid range is between 1 and 2000. association limit security web-auth Example: Device(config-guest-lan)#security web-auth Configures web authentication. security web-auth parameter-map parameter-map-name Example: Device(config-guest-lan)#security web-auth parameter-map testmap-1 Configures the security web-auth parameter map. security web-auth authentication-list authentication-list-name Configures the authentication list for the IEEE 802.1x network. Example: Device(config-guest-lan)#security web-auth authentication-list testlwa-1 no shutdown Example: Device(config-guest-lan)#no shutdown Enables the guest-LAN. exit Example: Device(config-guest-lan)#exit Returns to configuration mode. Configuring Session Timeout for a Profile Policy Session Timeout for a wired guest is set to infinite by default. Perform the following procedure to configure the timeout values to the wired guest. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless profile policy wlan-policy-profile-name Purpose Enters global configuration mode. Configures the WLAN policy profile. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2094 WLAN Global Configuration (GUI) Step 3 Step 4 Command or Action Purpose Example: Device(config)#wireless profile policy testpol-1 guest-lan enable-session-timeout Example: Enables the client session timeout on the guest LAN. Device(config-wireless-policy)#guest-lan enable-session-timeout session-timeout timeout-duration Configures the client session timeout in Example: seconds. The valid range is between 0 and 86400 seconds. Device(config-wireless-policy)#session-timeout 1000 Global Configuration (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Choose Administration > User Administration. Click Add. Enter the Username, Password and Confirm Password. Choose the desired value from the Policy and Privilege drop-down lists. Click Apply to Device. Choose Administration > Management > HTTP/HTTPS/Netconf. In the HTTP/HTTPS Access Configuration settings, enable or disable the HTTP Access, HTTPS Access and Personal Identity Verification toggle buttons. Enter the HTTP Port and HTTPS Port. Click Apply. Verifying Wired Guest Configurations To validate the wireless configuration, use the following command: Device# wireless config validate Wireless Management Trustpoint Name: 'WLC-29c_WLC_TP' Trustpoint certificate type is WLC-SSC Wireless management trustpoint config is valid Jan 22 07:49:15.371: %CONFIG_VALIDATOR_MESSAGE-5-EWLC_GEN_ERR: Chassis 1 R0/0: wncmgrd: Error in No record found for VLAN 9, needed by Guest-LAN open-wired To display the summary of all Guest-LANs, use the following command: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2095 Verifying Wired Guest Configurations Device# show guest-lan summary Number of Guest LANs: 1 GLAN GLAN Profile Name Status ---------------------------------------------- 1 wired_guest_open UP To view the detailed output of all Guest-LANs, use the following command: Device# show guest-lan all Guest-LAN Profile Name : open ================================================ Guest-LAN ID :1 Wired-Vlan : 200 Status : Enabled Number of Active Clients :1 Max Associated Clients : 2000 Security WebAuth : Enabled Webauth Parameter Map : global Webauth Authentication List : LWA-AUTHENTICATION Webauth Authorization List : LWA-AUTHENTICATION To view the guest-LAN configuration by ID, use the following command: Device# show guest-lan id 1 Guest-LAN Profile Name : open ================================================ Guest-LAN ID :1 Wired-Vlan : 200 Status : Enabled Number of Active Clients :1 Max Associated Clients : 2000 Security WebAuth : Enabled Webauth Parameter Map : global Webauth Authentication List : LWA-AUTHENTICATION Webauth Authorization List : LWA-AUTHENTICATION To view the guest-LAN configuration by profile name, use the following command: Device# show guest-lan name open Guest-LAN Profile Name : open ================================================ Guest-LAN ID :1 Wired-Vlan : 200 Status : Enabled Number of Active Clients :1 Max Associated Clients : 2000 Security WebAuth : Enabled Webauth Parameter Map : global Webauth Authentication List : LWA-AUTHENTICATION Webauth Authorization List : LWA-AUTHENTICATION To view the guest-LAN map summary, use the following command: WLAN Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2096 WLAN Verifying Wired Guest Configurations Device# show wireless guest-lan-map summary Number of Guest-Lan Maps: 2 WLAN Profile Name Policy Name ------------------------------------------------------------------------ open_wired_guest open_wired_guest lwa_wired_guest lwa_wired_guest To view the active clients, use the following command: Device# show wireless client summary Number of Local Clients: 1 MAC Address AP Name Type ID State Protocol Method Role ------------------------------------------------------------------------------------------------------------------------- 000a.bd15.0001 N/A GLAN 1 Run 802.3 Web Auth Export Foreign To view the detailed information about a client by MAC address, use the following command: Device# show wireless client mac-address 3383.0000.0001 detail Client MAC Address : 3383.0000.0001 Client IPv4 Address : 155.165.152.151 Client Username: N/A AP MAC Address: N/A AP slot : N/A Client State : Associated Policy Profile : guestlan_lwa Flex Profile : N/A Guest Lan: GLAN Id: 2 GLAN Name: guestlan_lwa Wired VLAN: 312 Wireless LAN Network Name (SSID) : N/A BSSID : N/A Connected For : 128 seconds Protocol : 802.3 Channel : N/A Client IIF-ID : 0xa0000002 Association Id : 0 Authentication Algorithm : Open System Session Timeout : 1800 sec (Timer not running) Session Warning Time : Timer not running Input Policy Name : clsilver Input Policy State : Installed Input Policy Source : AAA Policy Output Policy Name : None Output Policy State : None Output Policy Source : None WMM Support : Disabled Fastlane Support : Disabled Power Save : OFF AAA QoS Rate Limit Parameters: QoS Average Data Rate Upstream : 0 (kbps) QoS Realtime Average Data Rate Upstream : 0 (kbps) QoS Burst Data Rate Upstream : 0 (kbps) QoS Realtime Burst Data Rate Upstream : 0 (kbps) QoS Average Data Rate Downstream : 0 (kbps) Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2097 Verifying Wired Guest Configurations QoS Realtime Average Data Rate Downstream : 0 (kbps) QoS Burst Data Rate Downstream : 0 (kbps) QoS Realtime Burst Data Rate Downstream : 0 (kbps) Mobility: Anchor IP Address : 101.0.0.1 Point of Attachment : 0x00000008 Point of Presence : 0xA0000001 AuthC status : Enabled Move Count :0 Mobility Role : Export Foreign Mobility Roam Type : L3 Requested Mobility Complete Timestamp : 05/07/2019 22:31:45 UTC Client Join Time: Join Time Of Client : 05/07/2019 22:31:42 UTC Policy Manager State: Run Last Policy Manager State : IP Learn Complete Client Entry Create Time : 125 seconds Policy Type : N/A Encryption Cipher : N/A Encrypted Traffic Analytics : No Protected Management Frame - 802.11w : No EAP Type : Not Applicable VLAN : default Multicast VLAN : 0 Access VLAN : 153 Anchor VLAN : 155 WFD capable : No Managed WFD capable : No Cross Connection capable : No Support Concurrent Operation : No Session Manager: Point of Attachment : TenGigabitEthernet0/0/0 IIF ID : 0x00000008 Authorized : TRUE Session timeout : 1800 Common Session ID: 00000000000000CB946C8BA3 Acct Session ID : 0x00000000 Last Tried Aaa Server Details: Server IP : Auth Method Status List Method : Web Auth Webauth State : Authz Webauth Method : Webauth Local Policies: Service Template : wlan_svc_guestlan_lwa_local (priority 254) VLAN : 153 Absolute-Timer : 1800 Server Policies: QOS Level :0 Resultant Policies: VLAN Name : VLAN0153 QOS Level :0 VLAN : 153 Absolute-Timer : 1800 DNS Snooped IPv4 Addresses : None DNS Snooped IPv6 Addresses : None Client Capabilities CF Pollable : Not implemented CF Poll Request : Not implemented Short Preamble : Not implemented PBCC : Not implemented Channel Agility : Not implemented Listen Interval : 0 Fast BSS Transition Details : Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2098 WLAN WLAN Wired Guest Access--Use Cases Reassociation Timeout : 0 11v BSS Transition : Not implemented 11v DMS Capable : No QoS Map Capable : No FlexConnect Data Switching : N/A FlexConnect Dhcp Status : N/A FlexConnect Authentication : N/A FlexConnect Central Association : N/A Client Statistics: Number of Bytes Received : 0 Number of Bytes Sent : 0 Number of Packets Received : 8 Number of Packets Sent : 0 Number of Policy Errors : 0 Radio Signal Strength Indicator : 0 dBm Signal to Noise Ratio : 0 dB Idle time : 0 seconds Last idle time update : 05/07/2019 22:32:27 Last statistics update : 05/07/2019 22:32:27 Fabric status : Disabled Client Scan Reports Assisted Roaming Neighbor List Nearby AP Statistics: EoGRE : Pending Classification Wired Guest Access--Use Cases This feature while performing as a guest access feature can be used to meet different requirements. Some of the possibilities are shared here. Scenario OneEquiptment Software Update This feature can be configured to allow the wired port to connect to the manufacture or vendor website for equipment maintenance, software, or firmware updates. Scenario TwoVideo Streaming This feature can be configured to allow devices that are connected to a wired port to stream video to visitor information screens. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2099 Wired Guest Access--Use Cases WLAN Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2100 1 8 9 C H A P T E R Express Wi-Fi by Facebook · Information About Express Wi-Fi by Facebook, on page 2101 · Restrictions for Express Wi-Fi by Facebook, on page 2102 · Enabling Express Wi-Fi by Facebook NAC for Policy Profile (GUI), on page 2102 · Enabling Accounting RADIUS Server for Flex Profile (GUI), on page 2103 · Configuring Captive Portal for Express Wi-Fi by Facebook (GUI), on page 2103 · Configuring Captive Portal for Express Wi-Fi by Facebook (CLI), on page 2103 · Configuring Express Wi-Fi by Facebook Policy on Controller (CLI), on page 2104 · Configuring RADIUS Server for Accounting and Authentication in FlexConnect Profile (CLI), on page 2106 · Verifying Express Wi-Fi by Facebook Configurations on Controller, on page 2107 · Verifying Express Wi-Fi by Facebook Configurations on the AP, on page 2107 Information About Express Wi-Fi by Facebook Express Wi-Fi by Facebook is a cloud-based, low-cost solution for local entrepreneurs and SMBs in emerging countries to provide Wi-Fi access. Using Express Wi-Fi by Facebook, users can buy data packs and find nearby hotspots. Facebook provides the software (and sometimes hardware) infrastructure while the ISP or SMB provides internet connectivity and deployments to the subscribers. These service providers provision guest access through a captive portal. This can include both free and paid services including paid internet access with quota enforcement. Express Wi-Fi by Facebook feature is enabled through a FlexConnect deployment based on the cloud-hosted Cisco Catalyst 9800 Series Wireless Controller where the Cisco AP performs client-related functions such as web authentication, captive portal redirect, matching and accounting of traffic classes and connection to the RADIUS server. This feature also supports FQDN (DNS ACLs) and IP ACLs as well as MAC authentication on the AP. The controller provisions the AP with the required configuration for these tasks. Note If an AP reboots in standalone mode, the flexconnect URL ACL is not retained. This will cause Express Wi-Fi by Facebook to stop working. The Express Wi-Fi by Facebook solution comprises the following components: · Cisco Catalyst 9800 Series Wireless Controller Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2101 Restrictions for Express Wi-Fi by Facebook WLAN · Cisco Aironet Wave 2 or Catalyst APs · Facebook infrastructure Restrictions for Express Wi-Fi by Facebook · Express Wi-Fi by Facebook is supported only in a FlexConnect deployment with local switching, local authentication, and local association. · Express Wi-Fi by Facebook is supported only on Cisco Aironet Wave 2 and Catalyst access points. · Only three traffic classes are supported. · The AP supports only three ACLs per client. · All APs forming a roaming domain should have Layer 2 reachability. · Upto 64 complex rules and 512 simple rules per ACL are supported, where a simple rule comprises of a destination IP address and port. A complex rule contains more than a destination IP address and port information. · Only RADIUS CoA messages with the Facebook attribute are supported on the AP. Enabling Express Wi-Fi by Facebook NAC for Policy Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Choose Configuration > Tags & Profiles > Policy. On the Policy page, click the name of the desired Policy Profile. In the Edit Policy Profile window, click the Advanced tab. In the AAA Policy section, enable the AAA overide . The AAA Override option of a WLAN enables you to configure the WLAN for identity networking. It enables you to apply VLAN tagging, Quality of Service (QoS), and Access Control Lists (ACLs) to individual clients based on the returned RADIUS attributes from the AAA server. Enable the NAC State check box to enable Cisco Network Admission Control (NAC). Note You can enable NAC state only when AAA override is enabled. From the NAC Type drop-down list, select the type of NAC. The default is XWF. From the Policy Name drop-down list, choose a policy name. From the Accounting List drop-down list, choose an accounting list. Enable Interim Accounting to maintain a session with NAC. Click Update & Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2102 WLAN Enabling Accounting RADIUS Server for Flex Profile (GUI) Enabling Accounting RADIUS Server for Flex Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Tags & Profiles > Flex. On the Flex page, click the name of the desired Flex Profile. In the Edit Flex Profile window, click the Local Authentication tab. Choose the desired server group from the Local Accounting RADIUS Server Group drop-down list. Select the Local Client Roaming check box. Click Update & Apply to Device. Configuring Captive Portal for Express Wi-Fi by Facebook (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Security > Web Auth. On the Web Auth page, click the name of the desired parameter map. In the Edit Web Auth Parameter window, click the Advanced tab. In the Redirect to External Server section, select the Express Wi-Fi Key Type from the drop-down list. Enter the vendor specific key in the Express Wi-Fi Key field. Click Update & Apply to Device. Configuring Captive Portal for Express Wi-Fi by Facebook (CLI) Before you begin · Configure the URL filter list. · Configure the IP ACL. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2103 Configuring Express Wi-Fi by Facebook Policy on Controller (CLI) WLAN Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Command or Action Purpose parameter-map type webauth parameter-map- name Creates a parameter map and enters parameter-map webauth configuration mode. Example: Device(config)# parameter-map type webauth FACEBOOK-MAP type webauth Example: Device(config-params-parameter-map)# type webauth Configures the webauth type parameter. redirect for-login url-string Example: Configures the URL string for redirection during login. Device(config-params-parameter-map)# redirect for-login https://xwfcisco- us.expresswifi.com/customer/captive_portal captive-bypass-portal Example: Device(config-params-parameter-map)# captive-bypass-portal Configures captive bypassing. redirect vendor-specific xwf key 0 vendor-key Configures the URL string for redirection Example: during login. Device(config-params-parameter-map)# redirect vendor-specific xwf key 0 vendor-key end Returns to privileged EXEC mode. Example: Device(config-params-parameter-map)# end Configuring Express Wi-Fi by Facebook Policy on Controller (CLI) Before you begin · Enable web authentication and MAC filtering on the WLAN. · Configure RADIUS proxy server and accounting server. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2104 WLAN Configuring Express Wi-Fi by Facebook Policy on Controller (CLI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. wireless profile policy policy-profile-name Example: Device(config)# wireless profile policy default-policy- profile Configures the wireless profile policy. aaa-override Example: Device(config-wireless-policy)# aaa override Configures AAA override to apply policies coming from the AAA or ISE servers. no central switching Example: Device(config-wireless-policy)# no central switching Disables central switching and enables local switching. no central association Example: Device(config-wireless-policy)# no central association Disables central association and enables local association for locally switched clients. no central authentication Example: Device(config-wireless-policy)# no central authentication Disables central authentication and enables local authentication. nac xwf Example: Device(config-wireless-policy)# nac xwf Configures NAC in the policy profile. vlan vlan-name Configures a VLAN name or VLAN ID. Example: Device(config-wireless-policy)# vlan 9 no shutdown Example: Enables the profile policy. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2105 Configuring RADIUS Server for Accounting and Authentication in FlexConnect Profile (CLI) WLAN Step 10 Command or Action Device(config-wireless-policy)# no shutdown end Example: Device(config)# end Purpose Returns to privileged EXEC mode. Configuring RADIUS Server for Accounting and Authentication in FlexConnect Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile flex flex-profile-name Example: Device(config)# wireless profile flex default-flex- profile Configures the wireless flex profile and enters wireless flex profile configuration mode. Step 3 local-auth radius-server-group group-name Configures the authentication server group Example: name. Device(config-wireless-flex-profile)# local-auth radius-server-group FB_GROUP Step 4 local-accounting radius-server-group group-name Example: Device(config-wireless-flex-profile)# local-accounting radius-server-group group-name Configures the accounting server group name. Step 5 local-roaming Example: Device(config-wireless-flex-profile)# local-roaming Enables local roaming. Step 6 acl-policy policy-name Example: Configures ACL policy. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2106 WLAN Verifying Express Wi-Fi by Facebook Configurations on Controller Step 7 Step 8 Command or Action Device(config-wireless-flex-profile)# acl-policy fbs Purpose urlfilter list list-name Example: Device(config-wireless-flex-profile)# urlfilter list fbs Applies the URL list to the Flex profile. Here, list-name refers to the URL filter list name. The list name must not exceed 32 alphanumeric characters. Note: For a given traffic class, the list-name should match the above ACL policy-name. end Example: Device(config-wireless-flex-profile)# end Returns to privileged EXEC mode. Verifying Express Wi-Fi by Facebook Configurations on Controller To view ACLs applied on a specific client and the associated AP's MAC address, use the following command: Device# show wireless client mac-address 0102.0304.0506 detail [...] Local Roaming Client: Client ACLs: xwf,fbs Client State Servers: a03d.6f6b.bebe, cc16.7edc.27d8 Verifying Express Wi-Fi by Facebook Configurations on the AP To view client state, use the following command: Device# show flexconnect client To view all ACLs applied to a specific client, use the following command: Device# show client access-list {post-auth | pre-auth} all client_mac_address Device# show client access-list post-auth all 1C:36:BB:10:1B:2C Post-Auth URL ACLs for Client: 1C:36:BB:10:1B:2C IPv4 ACL: xwf Fbs IPv6 ACL: ACTION URL-LIST allow cisco.com allow yahoo.com allow google.com allow xwf.facebook.com allow xwf-static.xx.fbcdn.net allow cisco-us.expresswifi.com allow xwf-scontent.xx.fbcdn.net allow xwfcisco-us.expresswifi.com Resolved IPs for Client: 1C:36:BB:10:1B:2C HIT-COUNT URL ACTION IP-LIST xwf rule 0: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2107 Verifying Express Wi-Fi by Facebook Configurations on the AP WLAN rule 1: rule 2: rule 3: rule 4: rule 5: rule 6: allow true and ip proto 6 and dst port 22 allow true and ip proto 6 and src port 22 allow true and dst 171.70.168.183 mask 255.255.255.255 allow true and src 171.70.168.183 mask 255.255.255.255 allow true and dst 157.240.22.50 mask 255.255.255.255 allow true and src 157.240.22.50 mask 255.255.255.255 allow true and src 30.1.1.155 mask 255.255.255.255 and dst 30.1.1.18 mask 255.255.255.255 and ip proto 1 rule 7: allow true and src 30.1.1.18 mask 255.255.255.255 and dst 30.1.1.155 mask 255.255.255.255 and ip proto 1 rule 8: allow true and ip proto 17 rule 9: allow true and ip proto 17 rule 10: deny all fbs rule 0: allow true and dst 31.13.0.0 mask 255.255.0.0 rule 1: allow true and dst 66.220.0.0 mask 255.255.0.0 rule 6: allow true and src 31.13.0.0 mask 255.255.0.0 rule 10: allow true and src 179.60.0.0 mask 255.255.0.0 rule 12: allow true and dst 171.70.168.183 mask 255.255.255.255 rule 14: allow true and ip proto 17 rule 16: deny all No IPv6 ACL found Device# show client access-list pre-auth all 1C:36:BB:10:1B:2C Pre-Auth URL ACLs for Client: 1C:36:BB:10:1B:2C IPv4 ACL: xwf IPv6 ACL: ACTION URL-LIST allow cisco.com allow yahoo.com allow google.com allow xwf.facebook.com allow xwf-static.xx.fbcdn.net allow cisco-us.expresswifi.com allow xwf-scontent.xx.fbcdn.net allow xwfcisco-us.expresswifi.com Resolved IPs for Client: 1C:36:BB:10:1B:2C HIT-COUNT URL ACTION IP-LIST xwf rule 0: allow true and ip proto 6 and dst port 22 rule 1: allow true and ip proto 6 and src port 22 rule 2: allow true and dst 171.70.168.183 mask 255.255.255.255 rule 3: allow true and src 171.70.168.183 mask 255.255.255.255 rule 4: allow true and dst 157.240.22.50 mask 255.255.255.255 rule 5: allow true and src 157.240.22.50 mask 255.255.255.255 rule 6: allow true and src 30.1.1.155 mask 255.255.255.255 and dst 30.1.1.18 mask 255.255.255.255 and ip proto 1 rule 7: allow true and src 30.1.1.18 mask 255.255.255.255 and dst 30.1.1.155 mask 255.255.255.255 and ip proto 1 rule 8: allow true and ip proto 17 rule 9: allow true and ip proto 17 rule 10: deny all No IPv6 ACL found Redirect URL for client: 1C:36:BB:10:1B:2C https://xwfcisco-us.expresswifi.com/customer/captive_portal To view authentication server details applied to a specific client, use the following command where the wlan_id ranges from 1 to 15: Device# show running-config authentication dot11radio {0 | 1} wlan wlan_id Device# show running-config authentication dot11radio 1 wlan 1 bssid=00:a7:42:f6:4a:8e ssid=aa_namsoo_webauth beacon_period=100 auth=LOCAL AP_OPER_MODE=CONNECTED AP_OPER_MODE from WPA=CONNECTED AUTH_SERVER[0]=30.1.1.18 AUTH_SERVER_PORT[0]=2812 ACCT_SERVER[0]=30.1.1.18 ACCT_SERVER_PORT[0]=2813 AUTH_SERVER[0]=30.1.1.18 AUTH_SERVER_PORT[0]=2812 ACCT_SERVER[0]=30.1.1.18 ACCT_SERVER_PORT[0]=2813 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2108 WLAN Verifying Express Wi-Fi by Facebook Configurations on the AP To view client accounting details, use the following command: Device# show controller dot11Radio {0|1} client client_mac_address Device# show client access-list pre-auth redirect-url 1C:36:BB:10:1B:2C Redirect URL for client: 1C:36:BB:10:1B:2C https://xwfcisco-us.expresswifi.com/customer/captive_portal To view DCDS (distributed client datastore) or roaming configuration details for an associated client, use the following command: Device# show dot11 clients data-store details client_mac_address Device# show dot11 clients data-store details 1C:36:BB:10:1B:2C First AP Name: APF8B7.E2CC.5D48 Current AP Name: APF8B7.E2CC.5D48 Current AP IP: 30.1.1.169 Current AP BSSID: f8:b7:e2:cd:cb:8e Current AP SSID: aa_namsoo_webauth Client VLAN: 1 Client State: 4 Audit Session ID: 3204365612 Accounting Session ID High: 0 Accounting Session ID Low: 0 Client Traffic Class Name: xwf Client Traffic Class Name: fbs Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2109 Verifying Express Wi-Fi by Facebook Configurations on the AP WLAN Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2110 1 9 0 C H A P T E R User Defined Network · Information About User Defined Network, on page 2111 · Restrictions for User Defined Network, on page 2113 · Configuring a User Defined Network, on page 2113 · Configuring a User Defined Network (GUI), on page 2114 · Verifying User Defined Network Configuration, on page 2115 Information About User Defined Network A user defined network (UDN) is a solution that is aimed at providing secure and remote on-boarding of devices in shared service environments like dormitory rooms, resident halls, class rooms and auditoriums. This solution allows users to securely use Simple Discovery Protocols (SDP) like Apple Bonjour and mDNS-based protocols (Air Play, Air Print, Screen Cast, Print, and so on.), and UPnP based protocols to interact and share information with only their registered devices in a shared environment. It also enables the users to share their devices and resources with friends and roommates securely. The UDN solution provides an easy way to create a virtual segment that allows user to create a private segment to add their devices. Traffic (unicast, non-Layer 3 multicast, or broadcast) to these devices can be seen only by other devices and users in the private segment. This feature also eliminates the security concern where users knowingly or unknowingly take control of devices that belong to other users in a shared environment. As of now, the UDN is supported only in local mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2111 Information About User Defined Network Figure 55: User Defined Network Topology WLAN User Defined Network Solution Workflow · User Defined Network is enabled on the controller, using policy profile, and the policy configuration is pushed to all the WLANs on a site. · User Defined Network association is automatically generated by the UDN cloud service and is inherited by all the devices belonging to an user. · Users can add or modify devices to the User Defined Network assigned to them by using a web portal or a mobile application. Users can also add devices to another User Defined Network, if they are invited to join that User Defined Network. · The controller is updated with the client or resource information assigned to the User Defined Network. Note Cisco Identity Services Engine (ISE) policy infrastructure is not used to update User Defined Network information. Whenever, there is a change in the User Defined Network, the ISE updates the controller with an explicit or a separate Change of Authorization (CoA) containing only the change of the User Defined Network ID. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2112 WLAN Restrictions for User Defined Network Restrictions for User Defined Network · A user can be associated to only one UDN. · Roaming across controllers is not supported. · This feature is not applicable for Cisco Mobility Express and Cisco AireOS platforms. Hence, IRCM is not supported. · This feature is supported only in local mode on the Wave 2 access points and Cisco Catalyst 9100 series access points. · This feature is supported only for centrally switched SSIDs. · This feature is not supported for Flex mode APs. · This feature is not supported for Fabric SSIDs. · This feature is not supported for Guest Anchor scenario. · Layer 2 and Layer 3 roaming is not supported. · Layer 3 multicast (except SSDP/UPnP) containment using UDN is not supported, L3 multicast will continue to work as it is today. Configuring a User Defined Network The User Defined Network configuration is site based and is added as part of a policy profile. When applied, the policy is enforced to all the clients or devices in a network for a site, across WLANs. When enabled, the policy profile also enforces the filtering of mDNS queries based on the UDN-ID. Before you begin · RADIUS server should be configured for the UDN solution to work. · Configure aaa-override in the policy profile. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-name Creates a policy profile. Example: profile-name is the profile name of the policy Device(config)# wireless profile policy profile. policy-wpn Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2113 Configuring a User Defined Network (GUI) WLAN Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Command or Action user-defined-network Example: Device(config-wireless-policy)# user-defined-network user-defined-network drop-unicast Example: Device(config-wireless-policy)# user-defined-network drop-unicast exit Example: Device(config-wireless-policy)# exit ap remote-lan-policy policy-name policy-name Example: Device(config)# ap remote-lan-policy policy-name policy-wpn user-defined-network Example: Device(config-remote-lan-policy)# user-defined-network user-defined-network drop-unicast Example: Device(config-remote-lan-policy)# user-defined-network drop-unicast Purpose Enables user defined private-network. Sets action to drop unicast traffic. By default, unicast traffic is allowed across UDN. Enters global configuration mode. Configures a remote LAN policy profile. Enables user defined private-network. Sets action to drop unicast traffic. Configuring a User Defined Network (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > Policy. In the Policy Profile window, select a policy profile. In the Edit Policy Profile window, click the Advanced tab. In the User Defined Network section, check the Status check box to enable a user personal network. Check the Drop Unicast check box to set the action to Drop Unicast traffic. By default, unicast traffic is not contained. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2114 WLAN Verifying User Defined Network Configuration Verifying User Defined Network Configuration To view the status of the UDN feature (either enabled or disabled) and also information about the drop unicast flag, use the following command: Device# show wireless profile policy detailed default-policy-profile User Defined (Private) Network : Enabled User Defined (Private) Network Unicast Drop : Enabled To view the name of the UDN to which the client belongs, use the following command: Device# show wireless client mac-address 00:0d:ed:dd:35:80 detailed User Defined (Private) Network : Enabled User Defined (Private) Network Drop Unicast : Enabled Private group name: upn*group*7 Private group id : 7777 Private group owner: 1 Private group name: upn*group*7 Private group id : 7777 Private group owner: To view the UDN payload sent from an AP to the controller, use the following command: Device# show wireless stats client detail | inc udn Total udn payloads sent :1 When mDNS gateway is enabled on the controller, the mDNS services are automatically filtered based on the user private network ID for all the clients on the WLANs where user private network is enabled. To view the service instances of a private network, use the following command: Device# show mdns-sd cache udn 7777 detail Name: _services._dns-sd._udp.local Type: PTR TTL: 4500 WLAN: 2 WLAN Name: mdns-psk VLAN: 16 Client MAC: f4f9.51e2.a6a6 AP Ethernet MAC: 002a.1087.d68a Remaining-Time: 4486 Site-Tag: default-site-tag mDNS Service Policy: madhu-mDNS-Policy Overriding mDNS Service Policy: NO UDN-ID: 7777 UDN-Status: Enabled Rdata: _airplay._tcp.local . . . To view the service instances that are learnt from a shared UDN ID, use the following command: Device# show mdns-sd cache udn shared ------------------------------------------------------------- PTR Records ----------------------------------------------------------------- RECORD-NAME TTL TYPE ID CLIENT-MAC Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2115 Verifying User Defined Network Configuration WLAN RR-RECORD-DATA ------------------------------------------------------------------------------------------------------------------------------------------- 9.1.1.7.5.D.E.F.F.F.6.C.7.E.2.1.0.0.0.0.0.0.0 4500 WLAN 2 10e7.c6d5.7119 HP10E7C6D57119-2860.local _services._dns-sd._udp.local 4500 WLAN 2 10e7.c6d5.7119 _ipps._tcp.local _universal._sub._ipps._tcp.local 4500 WLAN 2 10e7.c6d5.7119 HP DeskJet 5000 series [D57119] (3127)._ipps._tcp. _print._sub._ipps._tcp.local 4500 WLAN 2 10e7.c6d5.7119 HP DeskJet 5000 series [D57119] (3127)._ipps._tcp. _ePCL._sub._ipps._tcp.local 4500 WLAN 2 10e7.c6d5.7119 HP DeskJet 5000 series [D57119] (3127)._ipps._tcp. _ipps._tcp.local 4500 WLAN 2 10e7.c6d5.7119 HP DeskJet 5000 series [D57119] (3127)._ipps._tcp. _services._dns-sd._udp.local 4500 WLAN 2 10e7.c6d5.7119 _ipp._tcp.local _universal._sub._ipp._tcp.local 4500 WLAN 2 10e7.c6d5.7119 HP DeskJet 5000 series [D57119] (3127)._ipp._tcp.l _print._sub._ipp._tcp.local 4500 WLAN 2 10e7.c6d5.7119 HP DeskJet 5000 series [D57119] (3127)._ipp._tcp.l _ePCL._sub._ipp._tcp.local 4500 WLAN 2 10e7.c6d5.7119 HP DeskJet 5000 series [D57119] (3127)._ipp._tcp.l _ipp._tcp.local 4500 WLAN 2 10e7.c6d5.7119 HP DeskJet 5000 series [D57119] (3127)._ipp._tcp.l . . . ------------------------------------------------------------- SRV Records ----------------------------------------------------------------- RECORD-NAME TTL TYPE ID CLIENT-MAC RR-RECORD-DATA ------------------------------------------------------------------------------------------------------------------------------------------- HP DeskJet 5000 series [D57119] (3127)._ipp._ 4500 WLAN 2 10e7.c6d5.7119 0 0 631 HP10E7C6D57119-2860.local HP DeskJet 5000 series [D57119] (3127)._http. 4500 WLAN 2 10e7.c6d5.7119 0 0 80 HP10E7C6D57119-2860.local HP DeskJet 5000 series [D57119] (3127)._ipps. 4500 WLAN 2 10e7.c6d5.7119 0 0 631 HP10E7C6D57119-2860.local HP DeskJet 5000 series [D57119] (3127)._uscan 4500 WLAN 2 10e7.c6d5.7119 0 0 8080 HP10E7C6D57119-2860.local . . . ------------------------------------------------------------ A/AAAA Records --------------------------------------------------------------- RECORD-NAME TTL TYPE ID CLIENT-MAC RR-RECORD-DATA ------------------------------------------------------------------------------------------------------------------------------------------- HP10E7C6D57119-2860.local 4500 WLAN 2 10e7.c6d5.7119 8.16.16.99 ------------------------------------------------------------- TXT Records ----------------------------------------------------------------- RECORD-NAME TTL TYPE ID CLIENT-MAC RR-RECORD-DATA ------------------------------------------------------------------------------------------------------------------------------------------- HP DeskJet 5000 series [D57119] (3127)._ipp._ 4500 WLAN 2 10e7.c6d5.7119 [502]'txtvers=1''adminurl=http://HP10E7C6D57119-28 HP DeskJet 5000 series [D57119] (3127)._http. 4500 WLAN 2 10e7.c6d5.7119 [1]'' HP DeskJet 5000 series [D57119] (3127)._ipps. 4500 WLAN 2 10e7.c6d5.7119 [502]'txtvers=1''adminurl=http://HP10E7C6D57119-28 . Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2116 WLAN Verifying User Defined Network Configuration . . To view the multicast DNS (mDNS) Service Discovery cache detail, use the following command: Device# show mdns-sd cache detail Name: _printer._tcp.local Type: PTR TTL: 4500 VLAN: 21 Client MAC: ace2.d3bc.047e Remaining-Time: 4383 mDNS Service Policy: default-mdns-service-policy Rdata: HP OfficeJet Pro 8720 [BC047E] (2)._printer._tcp.local Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2117 Verifying User Defined Network Configuration WLAN Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2118 1 9 1 C H A P T E R Hotspot 2.0 · Introduction to Hotspot 2.0, on page 2119 · Open Roaming, on page 2121 · Configuring Hotspot 2.0, on page 2123 Introduction to Hotspot 2.0 The Hotspot 2.0 feature enables IEEE 802.11 devices to interwork with external networks. The interworking service aids network discovery and selection, enabling information transfer from external networks. It provides information to the stations about the networks before association. Interworking not only helps users within the home, enterprise, and public access domains, but also assists manufacturers and operators to provide common components and services for IEEE 802.11 customers. These services are configured on a per-WLAN basis on the Cisco Wireless Controller (controller). Hotspot 2.0, also known as HS2 and Wi-Fi Certified Passpoint, is based on the IEEE 802.11u and Wi-Fi Alliance Hotspot 2.0 standards. It seeks to provide better bandwidth and services-on-demand to end users. The Hotspot 2.0 feature allows mobile devices to join a Wi-Fi network automatically, including during roaming, when the devices enter the Hotspot 2.0 area. The Hotspot 2.0 feature has four distinct parts: · Hotspot 2.0 Beacon Advertisement: Allows a mobile device to discover Hotspot 2.0-compatible and 802.11u-compatible WLANs. · Access Network Query Protocol (ANQP) Queries: Sends queries about the networks from IEEE 802.11 devices, such as network type (private or public); connectivity type (local network, internet connection, and so on), or the network providers supported by a given network. · Online Sign-up: Allows a mobile device to obtain credentials to authenticate itself with the Hotspot 2.0 or WLAN. · Authentication and Session Management: Provides authentication (802.1x) and management of the STA session (session expiration, extension, and so on). In order to mark a WLAN as Hotspot 2.0-compatible, the 802.11u-mandated information element and the Hotspot 2.0 information element is added to the basic service set (BSS) beacon advertised by the corresponding AP, and in WLAN probe responses. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2119 Introduction to Hotspot 2.0 WLAN Note The Hotspot 2.0 feature supports only local mode or FlexConnect mode (central switching and central authentication). FlexConnect local switching is only supported when the Open Roaming configuration template is set up using the wireless hotspot anqp-server server-name type open-roaming command. If the configuration diverges from this template, FlexConnect local switching will not be supported. The following figure shows a standard deployment of the Hotspot 2.0 network architecture: Figure 56: Hotspot 2.0 Deployment Topology Hotspot 2.0 Enhancements From Cisco IOS XE Amsterdam 17.3.1, the Hotspot 2.0 feature has been enhanced with the following options: · New ANQP elements: · Advice of charge: Provides information on the financial charges for using the SSID of the NAI realm · Operator icon metadata · Venue URL: Defines an optional URL for each of the configured venue names · Introduction of Terms and Conditions: This requires a user to accept certain Terms and Conditions before being allowed internet access, after connecting to a Hotspot SSID. · Integration of OSEN security and WPA2 security on the same SSID. From Cisco IOS XE Amsterdam 17.3.1 onwards, two encryption methods are supported on a single SSID, namely WPA2 802.1x for Hotspot 2.0 and OSEN for online sign-up. Based on the type of encryption selected during client association, the client will be put on Hotspot 2.0 VLAN or online sign-up VLAN. In WPA2 802.1x authentication, a client should match the credentials provisioned on a device. In online sign-up, a service provider WLAN is used by a client to perform online sign-up. For Hotspot 2.0 SSIDs, the RADIUS server enforces the terms and conditions before allowing internet connectivity to clients. This release also supports OSEN-specific VLAN in a policy profile. If an OSEN VLAN is defined in a policy profile, OSEN clients are added to the VLAN. Otherwise, clients are added to the regular policy profile VLAN Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2120 WLAN Open Roaming or to the default VLAN. If OSEN is enabled with WPA2 on an SSID, it is mandatory to define an OSEN VLAN in the policy profile. Otherwise, clients cannot join the VLAN. In FlexConnect mode, if an OSEN VLAN is defined in a policy profile, the same VLAN needs to be added to the flex profile. Failing to do so excludes the clients from the VLAN. Note When Hotspot 2.0 is enabled in a WLAN, the Wi-Fi direct clients that support cross-connect feature should not be allowed to associate to the Hotspot 2.0 WLAN. To make sure this policy is enforced, ensure that the following configuration is in place: wlan <wlan-name> <wlan-name> <ssid> wifi-direct policy xconnect-not-allow Restrictions · Clients are excluded if an OSEN VLAN is not added to a flex profile. · In FlexConnect mode, clients are excluded if an OSEN VLAN is not added in a flex profile. · In FlexConnect deployments, the URL filter should reference an existing URL filter (configured using the urlfilter list urlfilter-name command). Otherwise, a client is added to the excluded list, after authentication. · Only central authentication is supported. · Fragmented ANQP replies are not synchronized to the standby controller in high-availability mode. Therefore, clients have to re-issue a query if there is a switchover. Open Roaming From Cisco IOS XE Amsterdam Release 17.2.1, the controller supports open roaming configuration, which enables mobile users to automatically and seamlessly roam across Wi-Fi and cellular networks. The new configuration template of the open roaming ANQP server simplifies the task of setting up a Hotspot 2.0 ANQP server. When you configure open roaming, fixed ANQP parameters are automatically populated. You can configure different identity types by defining roaming organizational identifiers. The organizational unique identifier (OUI) is a three-octet number that identifies the type of organizations available in a given roaming consortium. The OUI list determines the type of identities allowed to roam into the network. The default configuration allows all the identities on the access network. However, access networks can customize the Roaming Consortium Organisation Identifier (RCOI) they advertise. You can configure three types of policies for access networks: · Allow all: Accepts users from any identity provider (IDP), with any privacy policy. · Real ID: Accepts users from any IDP, but only with a privacy policy that shares real identity (anonymous not accepted). · Custom: Accepts users of select identity types and privacy policies associated with the identity types; basically all the other RCOIs. Users can select the following privacy modes: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2121 Open Roaming WLAN · Anoymous · Share real identity The list of currently defined organizational identifiers and their aliases are given in the following table. Table 145: Roaming Organizational Identifiers and Aliases Description Roaming Organizational Identifier All 004096 All with real ID 00500b All paid members 00500f Device manufacturer all ID 00502a Device manufacturer real ID only 0050a7 Cloud or Social ID 005014 Cloud or Social real ID 0050bd Enterprise Employee ID 00503e Enterprise Employee real ID 0050d1 Enterprise Customer ID 005050 Enterprise Customer real ID 0050e2 Loyalty Retail ID Loyalty Retail real ID Loyalty Hospitality ID Loyalty Hospitality real ID SP free Bronze Qos SP free Bronze Qos Real ID SP paid Bronze QoS SP paid Bronze QoS real ID SP paid Silver QoS SP paid Silver QoS real ID SP paid Gold QoS 005053 0050f0 005054 00562b 005073 0057D2 - WBA Value Display Name 5A03BA0000 All 5A03BA1000 All with real-id only BAA2D00000 All paid 5A03BA0A00 Device Manufacturer 5A03BA1A00 Device Manufacturer real-id 5A03BA0200 Cloud ID 5A03BA1200 Cloud ID real-id 5A03BA0300 Enterprise ID 5A03BA1300 Enterprise ID real ID - Enterprise Customer program ID - Enterprise Customer program real ID 5A03BA0B00 Loyalty Retail 5A03BA1B00 Loyalty Retail real ID 5A03BA0600 Loyalty Hospitality 5A03BA1600 Loyalty Hospitality real ID 5A03BA0100 SP free Bronze Qos 5A03BA1100 SP free Bronze Qos Real ID BAA2D00100 SP paid Bronze QoS BAA2D01100 SP paid Bronze QoS real ID BAA2D02100 SP paid Silver QoS BAA2D03100 SP paid Silver QoS real ID BAA2D04100 SP paid Gold QoS Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2122 WLAN Configuring Hotspot 2.0 Description Roaming Organizational Identifier SP paid Gold QoS real ID - Government ID free - Automotive ID free - Automotive Paid - Education or Research ID free - Cable ID free - WBA Value Display Name BAA2D05100 SP paid Gold QoS real ID 5A03BA0400 Government ID free 5A03BA0500 Automotive ID free BAA2D00500 Automotive Paid 5A03BA0800 Education or Research ID free 5A03BA0900 Cable ID free Configuring Hotspot 2.0 Configuring an Access Network Query Protocol Server The Access Network Query Protocol Server (ANQP) is a query and response protocol that defines the services offered by an AP, usually at a Wi-Fi Hotspot 2.0. Note When configuring roaming-oi in the ANQP server, ensure that you set the beacon keyword for at least one roaming-oi, as mandated by the 802.11u standard. Procedure Step 1 Step 2 Step 3 Step 4 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. wireless hotspot anqp-server server-name Example: Device(config)# wireless hotspot anqp-server my_server Configures a Hotspot 2.0 ANQP server. description description Example: Device(config-wireless-anqp-server)# description "My Hotspot 2.0" Adds a description for the ANQP server. 3gpp-info mobile-country-code mobile-network-code Configures a 802.11u Third Generation Partnership Project (3GPP) cellular network. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2123 Configuring an Access Network Query Protocol Server WLAN Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action Example: Device(config-wireless-anqp-server)# 3gpp-info us mcc Purpose The mobile-country-code should be a 3-digit decimal number. The mobile-network-code should be a 2-digit or 3-digit decimal number. anqp fragmentation-threshold threshold-value Example: Device(config-wireless-anqp-server)# anqp fragmentation-threshold 100 Configures the ANQP reply fragmentation threshold, in bytes. The ANQP protocol can be customized by setting the fragmentation threshold, after which the ANQP reply is split into multiple messages. Note We recommend that you use the default values for the deployment. anqp-domain-id domain-id Example: Device(config-wireless-anqp-server)# anqp-domain-id 100 Configures the Hotspot 2.0 ANQP domain identifier. authentication-type {dns-redirect Configures the 802.11u network authentication |http-https-redirect |online-enrollment | type. Depending on the authentication type, a terms-and-conditions} URL is needed for HTTP and HTTPS. Example: Device(config-wireless-anqp-server)# authentication-type online-enrollment connection-capability ip-protocol port-number {closed|open|unknown} Example: Device(config-wireless-anqp-server)# connection-capability 12 40 open Configures the Hotspot 2.0 protocol and port capabilities. Note Hotspot 2.0 specifications require that you predefine some open ports and protocols. Ensure that you meet these requirements in order to comply with the Hotspot 2.0 specifications. See the connection-capability command in the Cisco Catalyst 9800 Series Wireless Controller Command Reference document for a list of open ports and protocols. domain domain-name Example: Device(config-wireless-anqp-server)# domain my-domain ipv4-address-type ipv4-address-type Example: Configures an 802.11u domain name. You can configure up to 32 domain names. The domain-name should not exceed 220 characters. Configures an 802.11u IPv4 address type in the Hotspot 2.0 network. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2124 WLAN Configuring an Access Network Query Protocol Server Step 11 Step 12 Step 13 Step 14 Step 15 Step 16 Step 17 Command or Action Device(config-wireless-anqp-server)# ipv4-address-type public ipv6-address-type ipv6-address-type Example: Device(config-wireless-anqp-server)# ipv6-address-type available nai-realm realm-name Example: Device(config-wireless-anqp-server)# nai cisco.com operating-class class-id Example: Device(config-wireless-anqp-server)# operating-class 25 operator operator-name language-code Example: Device(config-wireless-anqp-server)# operator XYZ-operator eng Purpose Configures an 802.11u IPv6 address type in the Hotspot 2.0 network. Configures an 802.11u NAI realm profile that identifies the realm that is accessible using the AP. Configures a Hotspot 2.0-operating class identifier. Configures a Hotspot 2.0 operator-friendly name in a given language. Use only the first three letters of the language, in lower case, for the language code. For example, use eng for English. To see the full list of language codes, go to: http://www.loc.gov/standards/iso639-2/php/ code_list.php. Note You can configure only one operator per language. osu-ssid SSID Example: Device(config-wireless-anqp-server)# osu-ssid test roaming-oi OI-value [beacon] Example: Device(config-wireless-anqp-server)# roaming-oi 24 beacon Configures the SSID that wireless clients will use for OSU. The SSID length can be up to 32 characters. Configures the 802.11u roaming organization identifier. If the beacon keyword is specified, the roaming OUI is advertised in the AP WLAN beacon or probe response. Otherwise, it will only be returned while performing the roaming OUI ANQP query. Note The hex string of a roaming OUI should contain only lowercase letters. venue venue-name language-code Configures the 802.11u venue information. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2125 Configuring ANQP Global Server Settings (GUI) WLAN Command or Action Example: Device(config-wireless-anqp-server)# venue bank eng Purpose The venue-name should not exceed 220 characters and the language-code should only be 2 or 3 lowercase letters (a-z) in length. Configuring ANQP Global Server Settings (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Choose Configuration > Wireless > Hotspot/OpenRoaming. Select an existing server from the list of servers. Click the Server Settings tab. Go to the Global Server Settings section. From the IPv4 Type drop-down list, choose an IPv4 type. From the IPv6 Type drop-down list, choose an IPv6 type. In the OSU SSID field, enter the SSID that wireless clients will use for Online Sign-Up (OSU). Click the Show Advanced Configuration link to view the advanced options. · In the Fragmentation Threshold (bytes) field, enter the fragmentation threshold. Note Packets that are larger than the size you specify here will be fragmented. · In the GAS Request Timeout (ms) field, enter the number of Generic Advertisement Services (GAS) request action frames sent that can be sent to the controller by an AP in a given interval. Click Apply to Device. Configuring Open Roaming (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless hotspot anqp-server server-name Configures a Hotspot 2.0 ANQP server with type open-roaming open roaming. Example: Device(config)# wireless hotspot anqp-server my-server type open-roaming Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2126 WLAN Configuring Open Roaming (GUI) Step 3 Step 4 Command or Action open-roaming-oi alias Example: Device(config-wireless-anqp-server)# open-roaming-oi allow-all domain domain-name Example: Device(config)# domain my-domain Purpose Sets the open roaming element alias. Configures a preferred domain name to ensure that clients roam into a preferred network. You can configure up to 32 domain names. The domain-name should not exceed 220 characters. Configuring Open Roaming (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Choose Configuration > Wireless > Hotspot/OpenRoaming. Click Add. The Add New ANQP Server window is displayed. In the Name field, enter a name for the server. In the Description field, enter a description for the server. Check the OpenRoaming Server check box to use the server as an open roaming server. Note You can set the server as an open roaming server only at the time of server creation. Check the Internet Access check box to enable internet access for the server. From the Network Type drop-down list, choose the network type. Click Apply to Device. Configuring NAI Realms (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Wireless > Hotspot/OpenRoaming. Select an existing server from the list of servers. Go to the NAI Realms section. Click Add. The Add NAI Realm window is displayed. In the NAI Realm Name field, enter an 802.11u NAI realm of the OSU operator. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2127 Configuring Organizational Identifier Alias (GUI) WLAN Step 6 Step 7 In the EAP Methods section, use the toggle button to enable the required EAP methods. After an EAP method is enabled, a pane is displayed to configure the details. Users are shown a configuration section where they can enable credential, inner-auth-eap, inner-auth-non-eap, tunneled-eap-credential. The user can select multiple options for each of the configuration. · The Credential window has options such as certificate, hw-token, nfc, none, sim, softoken, username-password, and usim. Check the corresponding check box. · The inner-auth-eap window has options such as eap-aka, eap-fast, eap-sim, eap-tls, eap-ttls, eap-leap, and eap-peap. Check the corresponding check box. · The inner-auth-eap window has options such as eap-aka, eap-fast, eap-sim, eap-tls, eap-ttls, eap-leap, and eap-peap. Check the corresponding check box. · The tunneled-eap-credential window has options such as anonymous, certificate, hw-token, nfc, sim, softoken, username-password, and usim. Check the corresponding check box. · Click Save. Click Apply to Device. Configuring Organizational Identifier Alias (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Choose Configuration > Wireless > Hotspot/OpenRoaming. Select an existing server from the list of servers. In the Roaming OIs area, enter an 802.11u roaming organization identifier in the Roaming OI field. Check the Beacon State check box to enable the beacon. If the beacon is specified, the roaming OUI is advertised in the AP WLAN beacon or probe response. Otherwise, it will only be returned while performing the roaming OUI ANQP query. Note Only three OUIs can be enabled in the beacon state. Click Add to add a roaming OI. In the Available OpenRoaming OI window, a list of organizational identifiers are displayed, along with the ones you have added. Select an organizational identifier and click the right arrow to add an OpenRoaming OI. In the Domains area, enter an 802.11u domain name in the Domain Name field. Click Add to use the domain name that you have entered as the preferred domain. Click Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2128 WLAN Configuring WAN Metrics (GUI) Configuring WAN Metrics (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Choose Configuration > Wireless > Hotspot/OpenRoaming. Select an existing server from the list of servers. Click the Server Settings tab. Go to the WAN Metrics area. In the Downlink Load field, enter the WAN downlink load. In the Downlink Speed (kbps) field, enter the WAN downlink speed, in kbps. In the Load Duration (100ms) field, enter the load duration. In the Upload Load field, enter the WAN upload load. In the Upload Speed (kbps) field, enter the WAN upload speed, in kbps. From the Link Status drop-down list, choose the link status. Use the Full Capacity Linktoggle button to enable the WAN link to operate at its maximum capacity. Click Apply to Device. Configuring WAN Metrics This procedure shows you how to configure the Wide Area Network (WAN) parameters such as uplink and downlink speed, link status, load, and so on. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless hotspot anqp-server server-name Example: Device(config)# wireless hotspot anqp-server my_server Step 3 wan-metrics downlink-load load-value Example: Device(config-wireless-anqp-server)# wan-metrics downlink-load 100 Step 4 wan-metrics downlink-speed speed Example: Purpose Enters global configuration mode. Configures a Hotspot 2.0 ANQP server. Configures the WAN downlink load. Configures the WAN downlink speed, in kbps. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2129 Configuring Beacon Parameters (GUI) WLAN Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action Device(config-wireless-anqp-server)# wan-metrics downlink-speed 1000 wan-metrics full-capacity-link Example: Device(config-wireless-anqp-server)# wan-metrics full-capacity-link wan-metrics link-status {down|not-configured|test-state|up} Example: Device(config-wireless-anqp-server)# wan-metrics link-status down wan-metrics load-measurement-duration duration Example: Device(config-wireless-anqp-server)# wan-metrics load-measurement-duration 100 wan-metrics uplink-load load-value Example: Device(config-wireless-anqp-server)# wan-metrics uplink-load 100 wan-metrics uplink-speed speed Example: Device(config-wireless-anqp-server)# wan-metrics uplink-speed 1000 Purpose Configures the WAN link to operate at its maximum capacity. Sets the WAN link status. Configures the uplink or downlink load measurement duration. Configures the WAN uplink load. Configures the WAN uplink speed, in kbps. Configuring Beacon Parameters (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Configuration > Wireless > Hotspot/OpenRoaming. Select an existing server from the list of servers. Click Server Settings tab. Go to the Beacon Parameters section. In the Hess id field, enter the homogenous extended service set identifier. The Hess ID can be either in xx:xx:xx:xx:xx:xx, xx-xx-xx-xx-xx-xx, or xxxx.xxxx.xxxx format. In the Domain id field, enter the domain's identifier. From the Venue Type drop-down list, select the venue. Choosing a venue activates the subvenue type. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2130 WLAN Configuring Authentication and Venue (GUI) Step 8 Step 9 From the subvenue-type drop-down list, select the sub-venue. Click Apply to Device. Configuring Authentication and Venue (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Step 15 Step 16 Step 17 Choose Configuration > Wireless > Hotspot/OpenRoaming. Select an existing server from the list of servers. Click the Authentication/Venue tab. Under the Network Auth Types section, check the DNS Redirect, Online Enrolment, HTTP/HTTPS Redirect, Terms and Conditions check boxes. For HTTP/HTTPS Redirect and Terms and Conditions, the URL field is enabled after selecting them. Add the URL for the corresponding authentication type. Click Apply. Go to the Venues section and click Add. The Venue Details pane is displayed. In the Language Code field, enter the language code. Use the first two or three letters of the language, in lower case, for the language code. For example, use eng for English. To see the full list of language codes, go to: http://www.loc.gov/standards/iso639-2/php/code_list.php. In the Venue URL field, enter the URL of the venue. In the Venue Name field, enter the name of the venue. Click check mark icon to add the venue details. Go to the Connection Capability section and click Add. The Connection Capabilities pane is displayed. See the connection-capability command in the Cisco Catalyst 9800 Series Wireless Controller Command Reference document for a list of open ports and protocols. In the Port Number field, enter the port number. From the Connection Status drop-down list, choose a connection status. In the IP Protocol field, enter the IP protocol number. Hotspot 2.0 specifications require that you predefine some open ports and protocols. Ensure that you meet these requirements in order to comply with the Hotspot 2.0 specifications. See the connection-capability command in the Cisco Catalyst 9800 Series Wireless Controller Command Reference document for a list of open ports and protocols. Click the check mark icon to add the connection details. Click Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2131 Configuring 3GPP/Operator (GUI) WLAN Configuring 3GPP/Operator (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Choose Configuration > Wireless > Hotspot/OpenRoaming. Select an existing server from the list of servers. Go to the 3GPP/Operator tab. In the Operating Class Indicator field, enter the operating class identifier and click the + icon. The operating class identifier is added and displayed in the pane below. Use the delete icon to delete them, if required. Note Class IDs should be in the following ranges: 81-87, 94-96, 101-130, 180, and 192-254. Go to the 3GPP Cellular Networks section and click Add. The 3GPP Network Details pane is displayed. In the Mobile Country Code (MCC) field, enter the mobile country code, which should be a 3-digit decimal number. In the Mobile Network Code (MNC) field, enter the mobile network code, which should be a 2 or 3-digit decimal number. For the list of Mobile Country Codes (MCC) and Mobile Network Codes (MNC), see the following links: https://www.itu.int/pub/T-SP-E.212B-2018 or https://www.mcc-mnc.com. Click check mark icon to add the network details. Go to the Hotspot 2.0 Operators section and click Add. The Operator Details pane is displayed. In the Language Code field, enter the language code. Use only the first three letters of the language, in lower case, for the language code. For example, use eng for English. To see the full list of language codes, go to: http://www.loc.gov/standards/iso639-2/php/code_list.php. In the Name field, enter the name of the OSU operator. Click check mark icon to add the operator details. Click Apply to Device. Configuring OSU Provider (GUI) Procedure Step 1 Step 2 Step 3 Choose Configuration > Wireless > Hotspot/OpenRoaming. Select an existing server from the list of servers. Go to the OSU Provider tab. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2132 WLAN Configuring an Online Sign-Up Provider Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Step 15 Step 16 Step 17 Step 18 Step 19 Step 20 Step 21 Click Add. The General Config pane is displayed. In the Provider Name field, enter the OSU provider name. In the NAI Realm field, enter the Network Access Identifier (NAI) realm of the OSU operator. From the Primary Method drop-down list, choose the primary supported OSU method of the OSU operator. This activates the Secondary Method drop-down list. If you choose None as the primary supported OSU method, you will not get the secondary method. (Optional) From the Secondary Method drop-down list, choose the secondary supported OSU method of the OSU operator. In the Server URI field, enter the server Uniform Resource Identifier (URI) of the OSU operator. Click Icon Config tab. Click Add. From the Icon Name drop-down list, choose the icon name. Click Save. Click Friendly Names tab. Click Add. In the Language field, enter the language code. In the Name field, enter the name of the OSU operator. In the Description field, enter the description for the OSU operator. Click Save. Click the check mark icon to save. Click Apply to Device. Configuring an Online Sign-Up Provider Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless hotspot icon bootflash:system-file-name media-type language-code icon-width icon-height Example: Device(config)# wireless hotspot icon bootflash:logo1 image eng 100 200 Configures an icon for Hotspot 2.0 and its parameters, such as media type, language code, icon width, and icon height. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2133 Configuring Hotspot 2.0 WLAN WLAN Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action wireless hotspot anqp-server server-name Example: Device(config)# wireless hotspot anqp-server my_server Purpose Configures a Hotspot 2.0 ANQP server. osu-provider osu-provider-name Example: Device(config-wireless-anqp-server)# osu-provider my-osu Configures a Hotspot 2.0 OSU provider name. name osu-operator-name lang-code description Configures the name of the OSU operator in a Example: given language. Device(config-anqp-osu-provider)# name The osu-operator-name and description should xyz-oper not exceed 220 characters. The language code eng xyz-operator should be 2 or 3 lower-case letters (a-z). server-uri server-uri Example: Device(config-anqp-osu-provider)# server-uri cisco.com Configures the server Uniform Resource Identifier (URI) of the OSU operator. method {oma-dm|soap-xml-spp} Example: Configures the primary supported OSU method of the OSU operator. Device(config-anqp-osu-provider)# method oma-dm nai-realm nai-realm Example: Device(config-anqp-osu-provider)# nai-realm cisco.com Configures the Network Access Identifier (NAI) realm of the OSU operator. The nai-realm should not exceed 220 characters. icon file-name Configures the icon for the OSU provider. Example: The file-name should not exceed 100 characters. Device(config-anqp-osu-provider)# icon xyz.jpeg Configuring Hotspot 2.0 WLAN Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2134 WLAN Configuring an Online Subscription with Encryption WLAN Step 2 Step 3 Step 4 Command or Action wlan wlan-name wlan-id ssid Example: Device(config)# wlan hs2 1 hs2 security wpa wpa2 gtk-randomize Example: Device(config-wlan)# security wpa wpa2 gtk-randomize no shutdown Example: Device(config-wlan)# no shutdown Purpose Configures a WLAN and enters WLAN configuration mode. Configures random GTK for hole 196 mitigation. Hole 196 is the name of WPA2 vulnerability. Enables the WLAN. Configuring an Online Subscription with Encryption WLAN Online subscription with Encryption (OSEN) WLAN is used to onboard a Hotspot 2.0 network (to get the necessary credentials) in a secure manner. Note You cannot apply a policy profile to the OSEN WLAN if a Hotspot 2.0 server is enabled on the WLAN. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wlan wlan-name wlan-id ssid Example: Device(config)# wlan hs2 1 hs2 Configures a WLAN and enters WLAN configuration mode. Step 3 security wpa osen Enables WPA OSEN security support. Example: Note Device(config-wlan)# security wpa osen OSEN and robust security network (RSN) are mutually exclusive. If RSN is enabled on a WLAN, OSEN cannot be enabled on the same WLAN. Step 4 no shutdown Example: Device(config-wlan)# no shutdown Enables the WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2135 Attaching an ANQP Server to a Policy Profile WLAN Attaching an ANQP Server to a Policy Profile Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy policy-profile-name ssid Configures a policy profile. Example: Device(config)# wireless profile policy policy-hotspot Step 3 shutdown Disables the policy profile. Example: Device(config-wireless-policy)# shutdown Step 4 hotspot anqp-server server-name Example: Attaches the Hotspot 2.0 ANQP server to the policy profile. Device(config-wireless-policy)# hotspot anqp-server my-server Step 5 no shutdown Example: Device(config-wireless-policy)# no shutdown Enables the policy profile. What to do next Attach the policy profile to the WLAN to make the WLAN Hotspot 2.0 enabled. Configuring Interworking for Hotspot 2.0 Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless hotspot anqp-server server-name Example: Device(config)# wireless hotspot anqp-server my_server Purpose Enters global configuration mode. Configures a Hotspot 2.0 ANQP server. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2136 WLAN Configuring the Generic Advertisement Service Rate Limit Step 3 Step 4 Step 5 Command or Action network-type allowed network-type internet-access{allowed|forbidden} Example: Device(config-wireless-anqp-server)# network-type guest-private internet-access allowed hessid HESSID-value Example: Device(config-wireless-anqp-server)# hessid 12.13.14 group venue-group venue-type Example: Device(config-wireless-anqp-server)# group business bank Purpose Configures a 802.11u network type. (Optional) Configures a homogenous extended service set. Selects a group type and venue type from the list of available options. Configuring the Generic Advertisement Service Rate Limit Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ap profile profile-name Example: Configures an AP profile and enters AP profile configuration mode. Device(config)# ap profile hs2-profile Step 3 gas-ap-rate-limit request-number interval Example: Device(config-ap-profile)# gas-ap-rate-limit 20 120 Configures the number of Generic Advertisement Services (GAS) request action frames sent to the controller by an AP in a given interval. Step 4 exit Example: Device(config-ap-profile)# exit Returns to global configuration mode. Step 5 wireless hotspot gas-rate-limit gas-requests-to-process Example: Device(config)# wireless hotspot gas-rate-limit 100 Configures the number of GAS request action frames to be processed by the controller. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2137 Configuring Global Settings WLAN Configuring Global Settings Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Choose Configuration > Wireless > Hotspot/OpenRoaming > Global Settings. In the Gas Rate Limit (Requests per sec) field, enter the number of GAS request action frames to be processed by the controller. Go to the Icons Configuration area. Click Add. The Add Global Icon window is displayed. From the System Path drop-down list, choose the path. In the Icon Name field, enter the icon name. In the Icon Type field, enter the icon type. In the Language Code field, enter the language code. In the Icon Height field, enter the icon height. In the Icon Width field, enter the icon width. Click Apply to Device. Configuring Advice of Charge Use the following procedure to configure the advice of charge information for using the SSID of the Network Access Identifier (NAI) realm. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless hotspot anqp-server server-name Example: Device(config)# wireless hotspot anqp-server my_server Step 3 advice-charge type Example: Device(config-wireless-anqp-server)# advice-charge data Purpose Enters global configuration mode. Configures a Hotspot 2.0 ANQP server. Configures advice of charge for data usage. Advice of charge provides information on the financial charges for using the SSID of the NAI realm. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2138 WLAN Configuring Terms and Conditions Step 4 Step 5 Command or Action Purpose plan language currency info plan-info-file Configures advice of charge information, which Example: includes language, currency, and plan information. Device(config-anqp-advice-charge)# plan eng eur info bootflash:plan_eng.xml Note You can configure up to 32 plans. nai-realm nai-realm Example: Device(config-anqp-advice-charge)# nai-realm cisco Configures NAI realm for this advice of charge. Note You can configure up to 32 realms. Configuring Terms and Conditions Before you begin Define a URL filter list, as shown in the following example: urlfilter list <url-filter-name> action permit filter-type post-authentication url <allow-url> For information on configuring an URL list, see the Defining URL Filter List section. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless hotspot anqp-server server-name Example: Device(config)# wireless hotspot anqp-server my_server Configures a Hotspot 2.0 ANQP server. Step 3 terms-conditions filename file-name Example: Device(config-wireless-anqp-server)# terms-conditions filename xyz-file Configures the terms and conditions filename for the clients. Step 4 terms-conditions timestamp date time Example: Device(config-wireless-anqp-server)# terms-conditions timestamp 2020-02-20 20:20:20 Configures the terms and conditions timestamp. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2139 Defining ACL and URL Filter in AP for FlexConnect WLAN Step 5 Command or Action Purpose terms-conditions urlfilter list url-filter-list Configures the terms and conditions URL filter Example: list name. Device(config-wireless-anqp-server)# terms-conditions urlfilter list filter-yy Defining ACL and URL Filter in AP for FlexConnect Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. sequence-number permit udp any eq bootpc Defines an extended UDP access list and sets any eq bootps the access conditions to match only the packets Example: on a given port number of bootstrap protocol (BOOTP) clients from any source host to Device(config-ext-nacl)# 10 permit udp match only the packets on a given port number any eq bootpc any eq bootps of the bootstrap protocol (BOOTP) server of a destination host. sequence-number permit udp any eq bootps Defines an extended UDP access list to any eq bootpc forward packets and sets the access conditions Example: to match only the packets on a given port number of bootstrap protocol (BOOTP) server Device(config-ext-nacl)# 20 permit udp from any source host to match only the packets any eq bootps any eq bootpc of a given port number of the bootstrap protocol (BOOTP) clients of a destination host. sequence-number permit udp any eq domain Defines an extended UDP access list to any eq domain forward packets and sets the access conditions Example: to match a destination host Domain Name Service (DNS) with only the packets from a Device(config-ext-nacl)# 30 permit udp given port number of the source DNS. any eq domain any eq domain sequence-number permit ip any host dest-address Example: Defines an extended IP access list to forward packets from a source host to a single destination host. Device(config-ext-nacl)# 40 permit ip any host 10.10.10.8 sequence-number permit ip host dest-address Defines an extended IP access list to forward any packets from a single source host to a Example: destination host. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2140 WLAN Defining ACL and URL Filter in AP for FlexConnect Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Command or Action Device(config-ext-nacl)# 50 permit ip host 10.10.10.8 any Purpose exit Example: Device(config-ext-nacl)# exit Returns to global configuration mode. wireless profile flex flex-profile-name Example: Configures a new FlexConnect policy and enters wireless flex profile configuration mode. Device(config)# wireless profile flex test-flex-profile acl-policy acl-policy-name Configures an ACL policy. Example: Device(config-wireless-flex-profile)# acl-policy acl_name urlfilter list url-filter-name Example: Applies the URL filter list to the FlexConnect profile. Device(config-wireless-flex-profile)# urlfilter list urllist_flex vlan-name prod-vlanID Configures a production VLAN. Example: Device(config-wireless-flex-profile)# vlan-name test-vlan Ensure that filter-type post-authentication configuration is in place for the URL filter to work. For information on configuring URL filter list, see the Defining URL Filter List section of the chapter DNS-Based Access Control Lists. vlan-id prod-vlanID Creates a new production VLAN ID. Example: Device(config-wireless-flex-profile-vlan)# vlan-id 10 vlan-name OSU-vlanID Example: vlan-name test-vlan Configures an OSU VLAN. vlan-id OSU-vlanID Example: vlan-id 20 Creates an OSU VLAN ID. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2141 Configuring an OSEN WLAN (Single SSID) WLAN Configuring an OSEN WLAN (Single SSID) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. wlan wlan-name wlan-id ssid Example: Device(config)# wlan hs2 1 hs2 Configures a WLAN and enters WLAN configuration mode. no security ft over-the-ds Example: Device(config-wlan)# no security ft over-the-ds Disables fast transition over the data source on the WLAN. no security ft adaptive Example: Device(config-wlan)# no security ft adaptive Disables adaptive 11r. security wpa wpa2 Enables WPA2 security. Example: Device(config-wlan)# security wpa wpa2 security wpa wpa2 ciphers aes Enables WPA2 ciphers for AES. Example: Device(config-wlan)# security wpa wpa2 ciphers aes security wpa osen Enables WPA OSEN security support. Example: Device(config-wlan)# security wpa osen no shutdown Example: Device(config-wlan)# no shutdown Enables the WLAN. exit Example: Device(config-wlan)# exit Returns to global configuration mode. wireless profile policy policy-profile-name Configures a policy profile. ssid Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2142 WLAN Verifying Hotspot 2.0 Configuration Step 11 Step 12 Command or Action Purpose Example: Device(config)# wireless profile policy policy-hotspot hotspot anqp-server server-name Example: Attaches the Hotspot 2.0 ANQP server to the policy profile. Device(config-wireless-policy)# hotspot anqp-server my-server vlan vlan encryption osen Example: Configures the VLAN ID with OSEN encryption for single SSID. Device(config-wireless-policy)# vlan 10 encryption osen Verifying Hotspot 2.0 Configuration Use the following show commands to verify the quality of service (QoS) and AP GAS rate limit. To view whether a QoS map ID is user configured or the default one, use the following command: Device# show ap profile <profile name> detailed QoS Map : user-configured To view the QoS map values used and their source, use the following command: Device# show ap profile <profile name> qos-map QoS Map : default DSCP ranges to User Priorities User Priority DSCP low DSCP high Upstream UP to DSCP ----------------------------------------------------------- 0 0 7 0 2 16 23 10 3 24 31 18 4 32 39 26 5 40 47 34 6 48 55 46 7 56 63 48 DSCP to UP mapping exceptions DSCP User Priority --------------------- 0 0 2 1 4 1 6 1 10 2 12 2 14 2 18 3 20 3 22 3 To view the AP rate limiter configuration, use the following command: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2143 Verifying Client Details WLAN Device# show ap name AP0462.73e8.f2c0 config general | i GAS GAS rate limit Admin status Number of GAS request per interval GAS rate limit interval (msec) : Enabled : 30 : 100 Verifying Client Details To verify the wireless-specific configuration of active clients based on their MAC address, use the following command: Device# show wireless client mac 001e.f64c.1eff detail . . . Hotspot version : Hotspot 2.0 Release 2 Hotspot PPS MO ID : Hotspot Terms and Conditions URL : http://host1.ciscohotspot.com/terms.php?addr=b8:27:eb:5a:dc:39&ap=123 . . . Policy Type : OSEN (within RSN) Resultant Policies: VLAN Name : VLAN0010 VLAN : 10 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2144 1 9 2 C H A P T E R Client Roaming Across Policy Profile · Information about Client Roaming Policy Profile, on page 2145 · Configuring Client Roaming Across Policy Profile, on page 2146 · Verifying Client Roaming Across Policy Profiles, on page 2147 Information about Client Roaming Policy Profile In Cisco Catalyst 9800 Series Wireless controller, each WLAN must be associated to a policy profile using a policy tag. Since the policy profile represent the policy defined by the administrator, the general rule is that the controller will not allow seamless roaming between same WLAN associated with different policy profile. The client will be disconnected hence disrupting seamless roaming and client will be required to join again and the new policy can be evaluated and implemented. When you enable roaming across policy profile, if the two policy profiles differ only in the settings as listed, then client seamless roaming is allowed to same wlan associated to different policy profiles. A typical use case is when clients roaming across two APs that belong to different policy tag and have WLAN associated with different policy profiles with different VLAN setting for each policy profile. If roaming across policy profile is enabled, the controller allows seamless roaming to another policy profile even if the VLAN is different and the client retains the original IP address. The controller applies all other attributes except VLAN from the new policy profile to which client has joined. Client roaming across policy profiles is not allowed if there are different policy profile configurations. However; the following are the exceptions: · Accounting list · CTS · DHCP-TLV-caching · Dot11 5 Ghz airtime-fairness · Dot11 24 Ghz airtime-fairness · ET-analytics enable · http-TLV-caching · Idle-threshold · Idle-timeout Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2145 Configuring Client Roaming Across Policy Profile WLAN · MDnS-SD service policy · IPv4 ACL · IPv6 ACL · QBSS load · RADIUS profiling · Session timeout · SIP CAC disassociation client · SIP CAC send-486busy · VLAN You must execute the configuration in the global configuration mode. When a client roam across policy profile is attempted, the roam is either a success or a failure. However; the total roam across policy profiles counter under client global statistics section increments. But when the roam across policy profile is denied then roam across policy profile deny delete reason counter is incremented. Note This feature is not supported on fabric and on Cisco 9800 FlexConnect. The following is an example in which case a client roams across policy profiles PP1 and PP2 will be denied. wireless profile policy PP1 vlan 42 no shutdown wireless profile policy PP2 aaa-override vlan 43 no shutdown Configuring Client Roaming Across Policy Profile Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless client vlan-persistent Example: Device(config) # wireless client vlan-persistent Step 3 end Example: Purpose Enables configuration mode Enables client roaming across different policy profiles. Ends the session. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2146 WLAN Verifying Client Roaming Across Policy Profiles Command or Action Device(config) # end Purpose Verifying Client Roaming Across Policy Profiles The following shows the client roaming from policy profile PP1 configured with VLAN 42 to policy profile PP2 configured with VLAN 43. The following is the sample output of the show wireless client mac-address xxxx.xxxx.xxxx detail command that shows the client is connected to policy profile PP1. Device#show wireless client mac-address xxxx.xxxx.xxxx detail Client MAC Address : xxxx.xxxx.xxxx Client MAC Type : Universally Administered Address Client IPv4 Address : 169.254.189.170 Client Username : cisco AP MAC Address : xxxx.xxxx.xxxx AP Name: vinks_ios AP slot : 1 Client State : Associated Policy Profile : PP1 Flex Profile : N/A Wireless LAN Id: 3 WLAN Profile Name: prateekk_dot1x Wireless LAN Network Name (SSID): prateekk_dot1x BSSID : 0081.c4f6.6bfb Connected For : 688 seconds Protocol : 802.11ac Channel : 161 Client IIF-ID : 0xa0000001 Association Id : 1 Authentication Algorithm : Open System Idle state timeout : N/A Re-Authentication Timeout : 1800 sec (Remaining time: 1112 sec) Session Warning Time : Timer not running Input Policy Name : client-default Input Policy State : Installed Input Policy Source : QOS Internal Policy Output Policy Name : client-default Output Policy State : Installed Output Policy Source : QOS Internal Policy WMM Support : Enabled U-APSD Support : Enabled U-APSD value : 0 APSD ACs : BK, BE, VI, VO Fastlane Support : Disabled Client Active State : Active Power Save : OFF Current Rate : m8 ss1 Supported Rates : 9.0,18.0,36.0,48.0,54.0 Mobility: Move Count :0 Mobility Role : Local Mobility Roam Type : None Mobility Complete Timestamp : 07/13/2020 02:00:22 UTC Client Join Time: Join Time Of Client : 07/13/2020 02:00:22 UTC Client State Servers : None Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2147 Verifying Client Roaming Across Policy Profiles Client ACLs : None Policy Manager State: Run Last Policy Manager State : IP Learn Complete Client Entry Create Time : 688 seconds Policy Type : WPA2 Encryption Cipher : CCMP (AES) Authentication Key Management : 802.1x User Defined (Private) Network : Disabled User Defined (Private) Network Drop Unicast : Disabled Encrypted Traffic Analytics : No Protected Management Frame - 802.11w : No EAP Type : EAP-FAST VLAN Override after Webauth : No VLAN : 42 Multicast VLAN : 0 WiFi Direct Capabilities: WiFi Direct Capable : No Central NAT : DISABLED Session Manager: Point of Attachment : capwap_90400006 IIF ID : 0x90400006 Authorized : TRUE Session timeout : 1800 Common Session ID: 3C2A09090000000E45E6D59E Acct Session ID : 0x00000000 Last Tried Aaa Server Details: Server IP : 9.10.8.247 Auth Method Status List Method : Dot1x SM State : AUTHENTICATED SM Bend State : IDLE Local Policies: Service Template : wlan_svc_PP1_local (priority 254) VLAN : 42 Absolute-Timer : 1800 Server Policies: Resultant Policies: VLAN Name : VLAN0042 VLAN : 42 Absolute-Timer : 1800 DNS Snooped IPv4 Addresses : None DNS Snooped IPv6 Addresses : None Client Capabilities CF Pollable : Not implemented CF Poll Request : Not implemented Short Preamble : Not implemented PBCC : Not implemented Channel Agility : Not implemented Listen Interval : 0 Fast BSS Transition Details : Reassociation Timeout : 0 11v BSS Transition : Not implemented 11v DMS Capable : No QoS Map Capable : No FlexConnect Data Switching : N/A FlexConnect Dhcp Status : N/A FlexConnect Authentication : N/A FlexConnect Central Association : N/A Client Statistics: Number of Bytes Received from Client : 19442 Number of Bytes Sent to Client : 3863 Number of Packets Received from Client : 197 Number of Packets Sent to Client : 36 Number of Policy Errors : 0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2148 WLAN WLAN Verifying Client Roaming Across Policy Profiles Radio Signal Strength Indicator : -39 dBm Signal to Noise Ratio : 55 dB Fabric status : Disabled Radio Measurement Enabled Capabilities Capabilities: None Client Scan Report Time : Timer not running Client Scan Reports Assisted Roaming Neighbor List Nearby AP Statistics: EoGRE : Pending Classification Device Type : Apple-Device Device Name : APPLE, INC. Protocol Map : 0x000001 (OUI) Max Client Protocol Capability: 802.11ac Wave 2 Cellular Capability : N/A Apple Specific Requests(ASR) Capabilities/Statistics Summary Regular ASR support: : DISABLED The following is the sample output of the show wireless client mac-address xxxx.xxxx.xxxx detail command after client has roamed to a policy profile PP2. Client MAC Address : xxxx.xxxx.xxxx Client MAC Type : Universally Administered Address Client IPv4 Address : 9.9.42.236 Client Username : cisco AP MAC Address : xxxx.xxxx.xxxx AP Name: prateekk_cos_1 AP slot : 1 Client State : Associated Policy Profile : PP2 Flex Profile : N/A Wireless LAN Id: 3 WLAN Profile Name: prateekk_dot1x Wireless LAN Network Name (SSID): prateekk_dot1x BSSID : a0f8.4985.0029 Connected For : 11 seconds Protocol : 802.11ac Channel : 36 Client IIF-ID : 0xa0000001 Association Id : 1 Authentication Algorithm : Open System Idle state timeout : N/A Re-Authentication Timeout : 1800 sec (Remaining time: 1789 sec) Session Warning Time : Timer not running Input Policy Name : client-default Input Policy State : Installed Input Policy Source : QOS Internal Policy Output Policy Name : client-default Output Policy State : Installed Output Policy Source : QOS Internal Policy WMM Support : Enabled U-APSD Support : Enabled U-APSD value : 0 APSD ACs : BK, BE, VI, VO Fastlane Support : Disabled Client Active State : Active Power Save : OFF Current Rate : m9 ss3 Supported Rates : 9.0,18.0,36.0,48.0,54.0 Mobility: Move Count :0 Mobility Role : Local Mobility Roam Type : L2 Mobility Complete Timestamp : 07/13/2020 02:12:19 UTC Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2149 Verifying Client Roaming Across Policy Profiles Client Join Time: Join Time Of Client : 07/13/2020 02:12:19 UTC Client State Servers : None Client ACLs : None Policy Manager State: Run Last Policy Manager State : IP Learn Complete Client Entry Create Time : 728 seconds Policy Type : WPA2 Encryption Cipher : CCMP (AES) Authentication Key Management : 802.1x User Defined (Private) Network : Disabled User Defined (Private) Network Drop Unicast : Disabled Encrypted Traffic Analytics : No Protected Management Frame - 802.11w : No EAP Type : EAP-FAST VLAN Override after Webauth : No VLAN : 43 Multicast VLAN : 0 WiFi Direct Capabilities: WiFi Direct Capable : No Central NAT : DISABLED Session Manager: Point of Attachment : capwap_90000005 IIF ID : 0x90000005 Authorized : TRUE Session timeout : 1800 Common Session ID: 3C2A09090000000E45E6D59E Acct Session ID : 0x00000000 Last Tried Aaa Server Details: Server IP : 9.10.8.247 Auth Method Status List Method : Dot1x SM State : AUTHENTICATED SM Bend State : IDLE Local Policies: Service Template : vlan-42-template (priority 200) VLAN : 42 Service Template : wlan_svc_PP2_local (priority 254) Absolute-Timer : 1800 Server Policies: Resultant Policies: VLAN Name : VLAN0042 VLAN : 42 Absolute-Timer : 1800 DNS Snooped IPv4 Addresses : None DNS Snooped IPv6 Addresses : None Client Capabilities CF Pollable : Not implemented CF Poll Request : Not implemented Short Preamble : Not implemented PBCC : Not implemented Channel Agility : Not implemented Listen Interval : 0 Fast BSS Transition Details : Reassociation Timeout : 0 11v BSS Transition : Not implemented 11v DMS Capable : No QoS Map Capable : No FlexConnect Data Switching : N/A FlexConnect Dhcp Status : N/A FlexConnect Authentication : N/A FlexConnect Central Association : N/A Client Statistics: Number of Bytes Received from Client : 23551 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2150 WLAN WLAN Verifying Client Roaming Across Policy Profiles Number of Bytes Sent to Client : 12588 Number of Packets Received from Client : 239 Number of Packets Sent to Client : 71 Number of Policy Errors : 0 Radio Signal Strength Indicator : -28 dBm Signal to Noise Ratio : 60 dB Fabric status : Disabled Radio Measurement Enabled Capabilities Capabilities: None Client Scan Report Time : Timer not running Client Scan Reports Assisted Roaming Neighbor List Nearby AP Statistics: prateekk_cos_1 (slot 1) antenna 0: 13 s ago ........ -25 dBm antenna 1: 13 s ago ........ -25 dBm EoGRE : No/Simple client Device Type : Apple-Device Device Name : APPLE, INC. Protocol Map : 0x000001 (OUI) Protocol : DHCP Type :0 0 Data : 00 Max Client Protocol Capability: 802.11ac Wave 2 Cellular Capability : N/A Apple Specific Requests(ASR) Capabilities/Statistics Summary Regular ASR support: : DISABLED The following is the sample output of the show wireless stats client detail command that displays that client roam across policy profile is attempted and roam across policy is not denied. Device #show wireless stats client detail | in Roam Total Roam Across Policy Profiles : 1 Roam across policy profile deny : 0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2151 Verifying Client Roaming Across Policy Profiles WLAN Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2152 1 9 3 C H A P T E R Assisted Roaming · 802.11k Neighbor List and Assisted Roaming, on page 2153 · Restrictions for Assisted Roaming, on page 2154 · How to Configure Assisted Roaming, on page 2154 · Verifying Assisted Roaming, on page 2156 · Configuration Examples for Assisted Roaming, on page 2156 802.11k Neighbor List and Assisted Roaming The 802.11k standard allows an AP to inform 802.11k-capable clients of neighboring BSSIDs (APs in the same SSID). This can help the client to optimize its scanning and roaming behavior. Additionally, the Assisted Roaming Prediction Optimization feature can be used with non-802.11k clients, to discourage them from roaming to suboptimal APs. Note We recommend not configuring two SSIDs with the same name in the controller, which may cause roaming issues. Prediction Based Roaming - Assisted Roaming for Non-802.11k Clients You can optimize roaming for non-802.11k clients by generating a prediction neighbor list for each client without sending an 802.11k neighbor list request. When prediction based roaming enables a WLAN, after each successful client association/re-association, the same neighbor list optimization applies on the non-802.11k client to generate and store the neighbor list in the mobile station software data structure. Clients at different locations have different lists because the client probes are seen with different RSSI values by the different neighbors as the clients usually probe before any association or re-association. This list is created with the most updated probe data and predicts the next AP that the client is likely to roam to. The wireless infrastructure discourages clients from roaming to those less desirable neighbors by denying association if the association request to an AP does not match the entries on the stored prediction neighbor list. · Denial count: Maximum number of times a client is refused association. · Prediction threshold: Minimum number of entries required in the prediction list for the assisted roaming feature to activate. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2153 Restrictions for Assisted Roaming WLAN For more information, see https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-5/ Enterprise-Mobility-8-5-Design-Guide/Enterprise_Mobility_8-5_Deployment_Guide/ Chapter-11.html#pgfId-1140097. Restrictions for Assisted Roaming · This feature is supported only on 802.11n capable indoor access points. For a single band configuration, a maximum of 6 neighbors are visible in a neighbor list. For dual band configuration, a maximum of 12 neighbors are visible. · You can configure assisted roaming only using the device CLI. How to Configure Assisted Roaming Configuring Assisted Roaming (GUI) Assisted roaming allows clients to request neighbor reports containing information about known neighbor access points that are candidates for a service set transition. Before you begin Ensure that you have configured an AP Join Profile prior to configuring the primary and backup controllers. Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Tags&Profiles > WLAN and click Add to add a WLAN or select an existing WLAN. On the Advanced tab, go to the Assisted Roaming (11K) and select the Prediction Optimization checkbox to optimize roaming for non 802.11k clients by generating a prediction neighbor list for each client without sending an 802.11k neighbor list request. Select the Neighbor List checkbox to optimize roaming for 802.11K clients by generating a neighbor list for each client without sending an 802.11k neighbor list request. By default, the neighbor list contains only neighbors in the same band with which the client is associated. However, if you select the Dual Band Neighbor List checkbox, it allows 802.11k to return neigbors in both bands. Click Apply to Device. . Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2154 WLAN Configuring Assisted Roaming (CLI) Configuring Assisted Roaming (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless assisted-roaming floor-bias dBm Configures neighbor floor label bias. The valid Example: range is from 5 to 25 dBm, and the default value is 15 dBm. Device(config)# wireless assisted-roaming floor-bias 20 Step 3 wlan wlan-id Example: Device(config)# wlan wlan1 Enters the WLAN configuration submode. The wlan-name is the profile name of the configured WLAN. Step 4 assisted-roaming neighbor-list Example: Device(wlan)# assisted-roaming neighbor-list Configures an 802.11k neighbor list for a WLAN. By default, assisted roaming is enabled on the neighbor list when you create a WLAN. The no form of the command disables assisted roaming neighbor list. Step 5 assisted-roaming dual-list Configures a dual-band 802.11k dual list for a Example: WLAN. By default, assisted roaming is enabled on the dual list when you create a WLAN. The Device(wlan)# assisted-roaming dual-list no form of the command disables assisted roaming dual list. Step 6 assisted-roaming prediction Configures assisted roaming prediction list Example: feature for a WLAN. By default, the assisted roaming prediction list is disabled. Device(wlan)# assisted-roaming prediction Note A warning message is displayed and load balancing is disabled for the WLAN if load balancing is already enabled for the WLAN. Step 7 wireless assisted-roaming prediction-minimum count Example: Device# wireless assisted-roaming prediction-minimum Configures the minimum number of predicted APs required for the prediction list feature to be activated. The default value is 3. Note If the number of the AP in the prediction assigned to the client is less than the number that you specify, the assisted roaming feature will not apply on this roam. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2155 Verifying Assisted Roaming WLAN Step 8 Step 9 Command or Action Purpose wireless assisted-roaming denial-maximum count Example: Device# wireless assisted-roaming denial-maximum 8 Configures the maximum number of times a client can be denied association if the association request is sent to an AP does not match any AP on the prediction. The valid range is from 1 to 10, and the default value is 5. end Example: Device(config)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Verifying Assisted Roaming The following command can be used to verify assisted roaming configured on a WLAN: Command show wlan id wlan-id Description Displays the WLAN parameters on the WLAN. Configuration Examples for Assisted Roaming This example shows how to configure the neighbor floor label bias: Device# configure terminal Device(config)# wireless assisted-roaming floor-bias 10 Device(config)# end Device# show wlan id 23 This example shows how to disable neighbor list on a specific WLAN: Device# configure terminal Device(config)# wlan test1 Device(config (wlan)# no assisted-roaming neighbor-list Device(config)(wlan)# end Device# show wlan id 23 This example shows how to configure the prediction list on a specific WLAN: Device# configure terminal Device(config)# wlan test1 Device(config)(wlan)# assisted-roaming prediction Device(config)(wlan)# end Device# show wlan id 23 This example shows how to configure the prediction list based on assisted roaming prediction threshold and maximum denial count on a specific WLAN: Device# configure terminal Device(config)# wireless assisted-roaming prediction-minimum 4 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2156 WLAN Configuration Examples for Assisted Roaming Device(config)# wireless assisted-roaming denial-maximum 4 Device(config)(wlan)# end Device# show wlan id 23 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2157 Configuration Examples for Assisted Roaming WLAN Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2158 1 9 4 C H A P T E R 802.11r BSS Fast Transition · Feature History for 802.11r Fast Transition, on page 2159 · Information About 802.11r Fast Transition, on page 2160 · Information About 802.11r Fast Transition for SAE (FT-SAE) Authenticated Clients, on page 2161 · Restrictions for 802.11r Fast Transition, on page 2162 · Monitoring 802.11r Fast Transition (CLI), on page 2163 · Configuring 802.11r BSS Fast Transition on a Dot1x Security Enabled WLAN (CLI), on page 2164 · Configuring 802.11r Fast Transition in an Open WLAN (CLI), on page 2165 · Configuring 802.11r Fast Transition on a PSK SecurityEnabled WLAN (CLI), on page 2167 · Configuring 802.11r Fast Transition on a SAE Security-Enabled WLAN (GUI), on page 2168 · Configuring 802.11r Fast Transition on an SAE Security-Enabled WLAN (CLI), on page 2168 · Disabling 802.11r Fast Transition (GUI), on page 2170 · Disabling 802.11r Fast Transition (CLI), on page 2170 · Verifying 802.11r Fast Transition SAE, on page 2170 Feature History for 802.11r Fast Transition This table provides release and related information about the feature explained in this section. This feature is also available in all the releases subsequent to the one in which they are introduced in, unless noted otherwise. Table 146: Feature History for 802.11r Fast Transition Release Cisco IOS XE Cupertino 17.9.1 Feature Feature Information 802.11r Fast Transition for From Cisco-IOS XE 17.9.1 release onwards, the Fast SAE (FT-SAE) Authenticated Transition supports SAE-based Fast Roaming support Clients along with PMK caching. This feature is an addition to the existing PMK caching-based fast roam support. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2159 Information About 802.11r Fast Transition WLAN Information About 802.11r Fast Transition 802.11r, which is the IEEE standard for fast roaming, introduces a new concept of roaming where the initial handshake with a new AP is done even before the corresponding client roams to the target access point. This concept is called Fast Transition. The initial handshake allows a client and the access points to do the Pairwise Transient Key (PTK) calculation in advance. These PTK keys are applied to the client and the access points after the client responds to the reassociation request or responds to the exchange with new target AP. The FT key hierarchy is designed to allow clients to make fast BSS transitions between APs without requiring reauthentication at every AP. WLAN configuration contains a new Authenticated Key Management (AKM) type called FT (Fast Transition). Client Roaming For a client to move from its current AP to a target AP using the FT protocols, message exchanges are performed using one of the following methods: · Over-the-Air--The client communicates directly with the target AP using IEEE 802.11 authentication with the FT authentication algorithm. · Over-the-Distribution System (DS)--The client communicates with the target AP through the current AP. The communication between the client and the target AP is carried in FT action frames between the client and the current AP and is then sent through the device. Figure 57: Message Exchanges when OvertheAir Client Roaming is Configured Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2160 WLAN Information About 802.11r Fast Transition for SAE (FT-SAE) Authenticated Clients Figure 58: Message Exchanges when OvertheDS Client Roaming is Configured Note The 802.11r Fast Transition for SAE (FT-SAE) is not restricted to inter controller roaming. Information About 802.11r Fast Transition for SAE (FT-SAE) Authenticated Clients From Cisco-IOS XE 17.9.1 release onwards, the Fast Transition feature supports Simultaneous Authentication of Equals-based (SAE-based) fast roaming support along with Pairwise Master Key (PMK) caching. This feature is an addition to the existing PMK caching-based fast roaming support. Fast Transition Protocol During a Base Station Subsystem (BSS) transition, the Fast BSS transition feature reduces the connectivity time loss between an Station (STA) and Direct Switching. The Fast Transition protocols are part of the reassociation service, and apply to the STA transitions between the APs in the same mobility domain and Exteneded Service Set (ESS). The Fast Transition protocols need information to be exchanged during the initial association (or a later reassociation) between an STA and an AP. The initial exchange is referred to as the FT initial mobility domain association. Similarly, subsequent reassociations to the APs in the same mobility domain use the Fast Transition protocols. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2161 Restrictions for 802.11r Fast Transition WLAN Note STA is known as Fast Transition Originator. The following are the FT protocols: · Fast Transition Protocol: This protocol is executed when a Fast Transition Originator makes a transition to a target AP and does not require a resource request before its transition. · Fast Transition Resource Request Protocol: This protocol is executed when a Fast Transition Originator requires a resource request prior to its transition. · Over-the-Air: The Fast Transition Originator communicates with the target AP using IEEE 802.11 authentication with Fast Transition authentication algorithm. · Over-the-DS: The Fast Transition Originator communicates with the target AP using the current AP. The communication between the Fast Transition Originator and target AP is carried in Fast Transition action frames between the Fast Transition Originator and the current AP. The Fast Transition feature supports a new AKM for FT-SAE, specifically the 00-0F-AC:9. Fast Transition Initial Mobility Domain Association An STA includes Mobility Domain Element (MDE) and Robust Security Network Element (RSNE) in the (re)association request frame. The AP responds by including FTE, MDE, and RSNE in the (re)association response frame. That is, an STA initiates the Fast Transition initial mobility domain association procedures by performing an IEEE 802.11 authentication using the SAE algorithm. After successful SAE authentication, the STA and AP perform a Fast Transition four-way handshake. Note · If the MDE that is received by an AP or a controller does not match the contents advertised in the beacon and probe response frames, the AP or controller rejects the (re)association request frame with the STATUS_INVALID_MDE code. · If an MDE is available in the (re)association request frame and the contents of RSNE do not indicate a negotiated SAE AKM of Fast BSS Transition (00-0F-AC:9 suite type), the AP rejects with STATUS_INVALID_AKMP code. After an SAE authentication, the controller receives the PMK, resulting in the successful completion of SAE. Restrictions for 802.11r Fast Transition · EAP LEAP method is not supported. · Traffic Specification (TSPEC) is not supported for 802.11r fast roaming. Therefore, RIC IE handling is not supported. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2162 WLAN Monitoring 802.11r Fast Transition (CLI) · If WAN link latency exists, fast roaming is also delayed. Voice or data maximum latency should be verified. The Cisco WLC handles 802.11r Fast Transition authentication requests during roaming for both Over-the-Air and Over-the-DS methods. · Legacy clients cannot associate with a WLAN that has 802.11r enabled if the driver of the supplicant that is responsible for parsing the Robust Security Network Information Exchange (RSN IE) is old and not aware of the additional AKM suites in the IE. Due to this limitation, clients cannot send association requests to WLANs. These clients, however, can still associate with non-802.11r WLANs. Clients that are 802.11r-capable can associate as 802.11i clients on WLANs that have both 802.11i and 802.11r Authentication Key Management Suites enabled. The workaround is to enable or upgrade the driver of the legacy clients to work with the new 802.11r AKMs, after which the legacy clients can successfully associate with 802.11r-enabled WLANs. Another workaround is to have two SSIDs with the same name, but with different security settings (FT and non-FT). · Fast Transition resourcerequest protocol is not supported because clients do not support this protocol. Also, the resourcerequest protocol is an optional protocol. · To avoid any Denial of Service (DoS) attack, each Cisco WLC allows a maximum of three Fast Transition handshakes with different APs. · Non-802.11rcapable devices will not be able to associate with FT-enabled WLAN. · We do not recommend 802.11r FT + PMF. · We recommend 802.11r FT Over-the-Air roaming for FlexConnect deployments. · FT-SAE Over-the-DS roam is not supported in FlexConnect local authentication mode. · 802.11r ft-over-ds is enabled by default, when a WLAN is created in the controller . In Cisco Wave 2 APs, local switching local authentication with 802.11r is not supported. To make the local switching local authentication work with Cisco Wave 2 APs, explicitly disable 802.11r in WLAN. A sample configuration is given below: wlan local-dot1x 24 local-dot1x no security ft over-the-ds no security ft adaptive security dot1x authentication-list spwifi_dot1x no shutdown Monitoring 802.11r Fast Transition (CLI) The following command can be used to monitor 802.11r Fast Transition: Command show wlan name wlan-name Description Displays a summary of the configured parameters on the WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2163 Configuring 802.11r BSS Fast Transition on a Dot1x Security Enabled WLAN (CLI) WLAN Command show wireless client mac-address mac-address Description Displays the summary of the 802.11r authentication key management configuration on a client. ... ... Client Capabilities CF Pollable : Not implemented CF Poll Request : Not implemented Short Preamble : Not implemented PBCC : Not implemented Channel Agility : Not implemented Listen Interval : 15 Fast BSS Transition : Implemented Fast BSS Transition Details : Client Statistics: Number of Bytes Received : 9019 Number of Bytes Sent : 3765 Number of Packets Received : 130 Number of Packets Sent : 36 Number of EAP Id Request Msg Timeouts : 0 Number of EAP Request Msg Timeouts : 0 Number of EAP Key Msg Timeouts : 0 Number of Data Retries : 1 Number of RTS Retries : 0 Number of Duplicate Received Packets : 1 Number of Decrypt Failed Packets : 0 Number of Mic Failured Packets : 0 Number of Mic Missing Packets : 0 Number of Policy Errors : 0 Radio Signal Strength Indicator : -48 dBm Signal to Noise Ratio : 40 dB ... ... Configuring 802.11r BSS Fast Transition on a Dot1x Security Enabled WLAN (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wlan profile-name Example: Device# wlan test4 Purpose Enters global configuration mode. Enters WLAN configuration submode. The profile-name is the profile name of the configured WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2164 WLAN Configuring 802.11r Fast Transition in an Open WLAN (CLI) Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action client vlan vlan-name Example: Device(config-wlan)# client vlan 0120 Purpose Associates the client VLAN to this WLAN. local-auth local-auth-profile-eap Example: Device(config-wlan)# local-auth Enables the local auth EAP profile. security dot1x authentication-list default Example: Device(config-wlan)# security dot1x authentication-list default Enables security authentication list for dot1x security. The configuration is similar for all dot1x security WLANs. security ft Example: Device(config-wlan)# security ft Enables 802.11r Fast Transition on the WLAN. security wpa akm ft dot1x Enables 802.1x security on the WLAN. Example: Device(config-wlan)# security wpa akm ft dot1x no shutdown Example: Device(config-wlan)# no shutdown Enables the WLAN. end Example: Device(config-wlan)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-z to exit global configuration mode Configuring 802.11r Fast Transition in an Open WLAN (CLI) Procedure Step 1 Step 2 Command or Action configure terminal Example: Device# configure terminal wlan profile-name Example: Device# wlan test4 Purpose Enters global configuration mode. Enters WLAN configuration submode. The profile-name is the profile name of the configured WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2165 Configuring 802.11r Fast Transition in an Open WLAN (CLI) WLAN Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action Purpose client vlan vlan-id Associates the client VLAN to the WLAN. Example: Device(config-wlan)# client vlan 0120 no security wpa Example: Device(config-wlan)# no security wpa Disables WPA secuirty. no security wpa akm dot1x Example: Device(config-wlan)# no security wpa akm dot1x Disables security AKM for dot1x. no security wpa wpa2 Example: Device(config-wlan)# no security wpa wpa2 Disables WPA2 security. no wpa wpa2 ciphers aes Example: Device(config-wlan)# no security wpa wpa2 ciphers aes Disables WPA2 ciphers for AES. security ft Example: Device(config-wlan)# security ft Specifies the 802.11r Fast Transition parameters. no shutdown Example: Device(config-wlan)# shutdown Shuts down the WLAN. end Example: Device(config-wlan)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-z to exit global configuration mode Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2166 WLAN Configuring 802.11r Fast Transition on a PSK SecurityEnabled WLAN (CLI) Configuring 802.11r Fast Transition on a PSK SecurityEnabled WLAN (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wlan profile-name Example: Device# wlan test4 Enters WLAN configuration submode. The profile-name is the profile name of the configured WLAN. Step 3 client vlan vlan-name Example: Device(config-wlan)# client vlan 0120 Associates the client VLAN to this WLAN. Step 4 no security wpa akm dot1x Disables security AKM for dot1x. Example: Device(config-wlan)# no security wpa akm dot1x Step 5 security wpa akm ft psk Configures Fast Transition PSK support. Example: Device(config-wlan)# security wpa akm ft psk Step 6 security wpa akm psk set-key {ascii {0 | 8} | Configures PSK AKM shared key. hex {0 | 8}} Example: Device(config-wlan)# security wpa akm psk set-key ascii 0 test Step 7 security ft Example: Device(config-wlan)# security ft Configures 802.11r Fast Transition. Step 8 no shutdown Example: Device(config-wlan)# no shutdown Enables the WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2167 Configuring 802.11r Fast Transition on a SAE Security-Enabled WLAN (GUI) WLAN Step 9 Command or Action end Example: Device(config-wlan)# end Purpose Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-z to exit global configuration mode Configuring 802.11r Fast Transition on a SAE Security-Enabled WLAN (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Choose Configuration > Tags & Profiles > WLANs. Click Add. In the General tab, enter the Profile Name, the SSID, and the WLAN ID. Choose Security > Layer2 tab. Click the WPA3 radio button as security mode. Check the required WPA Parameters check boxes and the AES(CCMP128) check box. From the Status drop-down list, choose Enabled. Check the FT+SAE check box. Enter the Pre-Shared Key. From the PSK Format drop-down list, choose PSK Format and from the PSK Type drop-down list, choose PSK Type. Click Apply to Device. Configuring 802.11r Fast Transition on an SAE Security-Enabled WLAN (CLI) Procedure Step 1 Step 2 Command or Action enable Example: Device> enable configure terminal Example: Device# configure terminal Purpose Enables privileged EXEC mode. Enter your password, if prompted. Enables configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2168 WLAN Configuring 802.11r Fast Transition on an SAE Security-Enabled WLAN (CLI) Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action wlan wlan-name wlan-id ssid Example: Device(config)# wlan wlan-ft-sae 10 wlan-ft-sae Purpose Configures the WLAN and SSID. security ft Example: Device(config-wlan)# security ft Enables 802.11r Fast Transition on theWLAN. no security wpa wpa2 Example: Device(config-wlan)# no security wpa wpa2 Disables WPA2 security. security wpa psk set-key ascii asciii/hex key Configures the preshared key on a WLAN. Example: Note Device(config-wlan)# security wpa psk set-key ascii 0 123456789 WPA preshared keys must contain 8 to 63 ASCII text characters or 64 hexadecimal characters. no security wpa akm dot1x Example: Device(config-wlan)# no security wpa akm dot1x Disables security AKM for dot1x. security wpa akm ft sae Example: Configures 802.11r Fast Transition on an SAE securityenabled WLAN. Device(config-wlan)# security wpa akm ft sae security wpa wpa3 Enables WPA3 support. Example: Device(config-wlan)# security wpa wpa3 security pmf mandatory Example: Device(config-wlan)# security pmf mandatory Requires clients to negotiate 802.11w PMF protection on a WLAN. no shutdown Example: Device(config-wlan)# no shutdown Enables the WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2169 Disabling 802.11r Fast Transition (GUI) WLAN Disabling 802.11r Fast Transition (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > WLANs. On the WLANs page, click the WLAN name. In the Edit WLAN window, click the Security > Layer2 tab. From the Fast Transition drop-down list, choose Disabled. Note that you cannot enable or disable Fast Transition, if you have configured an SSID with Open Authentication. Click Update & Apply to Device. Disabling 802.11r Fast Transition (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wlan profile-name Example: Device# wlan test4 Step 3 no security ft [over-the-ds | reassociation-timeout timeout-in-seconds] Example: Device(config-wlan)# no security ft over-the-ds Step 4 end Example: Device(config)# end Purpose Enters global configuration mode. Enters WLAN configuration submode. The profile-name is the profile name of the configured WLAN. Disables 802.11r Fast Transition on the WLAN. Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Verifying 802.11r Fast Transition SAE To view the Fast Transition SAE details, use the following command: Device# show wireless client summary Number of Clients: 1 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2170 WLAN Verifying 802.11r Fast Transition SAE MAC Address AP Name Type ID State Protocol Method Role ------------------------------------------------------------------------------------------------------------------------2c33.7a5b.8fc5 APF4BD.9EBD.A66C WLAN 10 Run 11n(2.4) FT-SAE Local Number of Excluded Clients: 0 To view the client summary details from an AP, use the following command: AP# show client summary Radio Driver client Summary: ============================== apr0v1 ------apr0v4 ------ADDR AID CHAN TXRATE RXRATE RSSI MINRSSI MAXRSSI IDLE TXSEQ RXSEQ CAPS XCAPS ACAPS ERP STATE MAXRATE(DOT11) HTCAPS VHTCAPS ASSOCTIME IEs MODE RXNSS TXNSS PSMODE a0:fb:c5:ab:c3:41 1 11 114M 97M -47 -60 -40 0 0 65535 EPSs BORI NULL 0 f 286800 AP 1g 00:19:53 RSN WME IEEE80211_MODE_11AXG_HE20 2 2 1 LM BRP BRA RSSI is combined over chains in dBm Minimum Tx Power : 0 Maximum Tx Power : 0 HT Capability : Yes VHT Capability : No MU capable : No SNR : 48 Operating band : 2.4GHz Current Operating class : 0 Supported Rates : 2 4 11 22 12 18 24 36 48 72 96 108 Channels supported : 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 Max STA phymode : IEEE80211_MODE_11AXG_HE20 apr1v1 ------apr1v4 ------- WCP client Summary: ===================== mac radio vap aid state encr Maxrate Assoc Cap is_wgb_wired wgb_mac_addr A0:FB:C5:AB:C3:41 0 4 1 FWD AES_CCM128 MCS92SS HE HE false 00:00:00:00:00:00 Assoc time: ============= mac assoc_time A0:FB:C5:AB:C3:41 00d:00h:19m:55s Datapath IPv4 client Summary: =============================== id vap port node tunnel mac seen_ip hashed_ip sniff_ago confirm_ago A0:FB:C5:AB:C3:41 4 apr0v4 6.4.26.28 - A0:FB:C5:AB:C3:41 192.100.2.153 10.0.21.68 0.110000 0.100000 Datapath IPv6 client Summary: =============================== client mac seen_ip6 age scope port 1 A0:FB:C5:AB:C3:41 fe80::c2f:f0c4:9fa5:2608 1 link-local apr0v4 To view FlexConnect-related details from an AP, use the following command: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2171 Verifying 802.11r Fast Transition SAE WLAN AP# show flexconnect dot11R Total number of DOT11R cache entries: 1 HW Address Life Time(s) BSSID R0KhId R1KhId vlanOverride aclOverride ipv6AclOverride qosOverride iPSK A0:FB:C5:AB:C3:41 558 2C:57:41:59:F5:C4 239.13.224.36 45:49:7B:38:11:6A N/A 0 \<> To view the authentication key management details, use the following command: Device# show wireless client mac-address 28c2.1f54.e6d6 detail Authentication Algorithm : Open System Authentication Key Management : FT-SAE FlexConnect Authentication : Central To verify whether AKM Fast Transition-SAE is enabled or not, use the following command: Device# show wlan name [wlan-profile-name] Auth Key Management FT SAE : [Enabled | Disabled] To verify the PMK cache details, use the following command: Device# show wireless pmk-cache ...... Type Dot11R ..... To view the WPA3 SAE details, use the following command: Device# show wireless stats client detail Total FT/LocalAuth requests : 20 Total 11r ft authentication requests received : 9 Total 11r ft authentication response success :9 Total 11r ft authentication response failure :0 Total 11r ft action requests received : 17 Total 11r ft action response success :8 Total 11r ft action response failure :9 Total 11r PMKR0-Name mismatch :0 Total 11r PMKR1-Name mismatch :5 Total 11r MDID mismatch :9 Total roam attempts : 15 Total 11r roam attempts : 15 ...... ...... Total WPA3 SAE attempts :0 Total WPA3 SAE successful authentications :0 Total WPA3 SAE authentication failures :0 Total incomplete protocol failures :0 Total WPA3 SAE commit messages received :0 Total WPA3 SAE commit messages rejected :0 Total unsupported group rejections :0 Total PWE method mismatch for SAE Hash to Element commit received :0 Total PWE method mismatch for SAE Hunting And Pecking commit received : 0 Total WPA3 SAE commit messages sent :0 Total WPA3 SAE confirm messages received :0 Total WPA3 SAE confirm messages rejected :0 Total WPA3 SAE message confirm field mismatch : 0 Total WPA3 SAE confirm message invalid length : 0 Total WPA3 SAE confirm messages sent :0 Total WPA3 SAE Open Sessions :0 Total SAE Message drops due to throttling :0 Total WPA3 SAE Hash to Element commit received : 0 Total WPA3 SAE Hunting and Pecking commit received : 0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2172 WLAN Verifying 802.11r Fast Transition SAE ...... ...... Total Flexconnect local-auth roam attempts :8 Total 11r flex roam attempts :0 ..... .... Total client delete reasons SAE authentication failure :0 DOT11 SAE invalid message :0 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2173 Verifying 802.11r Fast Transition SAE WLAN Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2174 1 9 5 C H A P T E R 802.11v · Information About 802.11v, on page 2175 · Prerequisites for Configuring 802.11v, on page 2176 · Restrictions for 802.11v, on page 2176 · Enabling 802.11v BSS Transition Management, on page 2176 · Configuring 802.11v BSS Transition Management (GUI), on page 2177 · Configuring 802.11v BSS Transition Management (CLI), on page 2177 Information About 802.11v The controller supports 802.11v amendment for wireless networks, which describes numerous enhancements to wireless network management. One such enhancement is Network assisted Power Savings which helps clients to improve the battery life by enabling them to sleep longer. As an example, mobile devices typically use a certain amount of idle period to ensure that they remain connected to access points and therefore consume more power when performing the following tasks while in a wireless network. Another enhancement is Network assisted Roaming which enables the WLAN to send requests to associated clients, advising the clients as to better APs to associate to. This is useful for both load balancing and in directing poorly connected clients. Enabling 802.11v Network Assisted Power Savings Wireless devices consume battery to maintain their connection to the clients, in several ways: · By waking up at regular intervals to listen to the access point beacons containing a DTIM, which indicates buffered broadcast or multicast traffic that the access point delivers to the clients. · By sending null frames to the access points, in the form of keepalive messages to maintain connection with access points. · Devices also periodically listen to beacons (even in the absence of DTIM fields) to synchronize their clock to that of the corresponding access point. All these processes consume battery and this consumption particularly impacts devices (such as Apple), because these devices use a conservative session timeout estimation, and therefore, wake up often to send keepalive messages. The 802.11 standard, without 802.11v, does not include any mechanism for the controller or the access points to communicate to wireless clients about the session timeout for the local client. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2175 Prerequisites for Configuring 802.11v WLAN To save the power of clients due to the mentioned tasks in wireless network, the following features in the 802.11v standard are used: · Directed Multicast Service · Base Station Subsystem (BSS) Max Idle Period Directed Multicast Service Using Directed Multicast Service (DMS), the client requests the access point to transmit the required multicast packet as unicast frames. This allows the client to receive the multicast packets it has ignored while in sleep mode and also ensures Layer 2 reliability. Furthermore, the unicast frame is transmitted to the client at a potentially higher wireless link rate which enables the client to receive the packet quickly by enabling the radio for a shorter duration, thus also saving battery power. Since the wireless client also does not have to wake up at each DTIM interval in order to receive multicast traffic, longer sleeping intervals are allowed. BSS Max Idle Period The BSS Max Idle period is the timeframe during which an access point (AP) does not disassociate a client due to nonreceipt of frames from the connected client. This helps ensure that the client device does not send keepalive messages frequently. The idle period timer value is transmitted using the association and reassociation response frame from the access point to the client. The idle time value indicates the maximum time that a client can remain idle without transmitting any frame to an access point. As a result, the clients remain in sleep mode for a longer duration without transmitting the keepalive messages often. This in turn contributes to saving battery power. Prerequisites for Configuring 802.11v · Applies for Apple clients like Apple iPad, iPhone, and so on, that run on Apple iOS version 7 or later. · Supports local mode; also supports FlexConnect access points in central authentication modes only. Restrictions for 802.11v Client needs to support 802.11v BSS Transition. Enabling 802.11v BSS Transition Management 802.11v BSS Transtion is applied in the following three scenarios: · Solicited request--Client can send an 802.11v Basic Service Set (BSS) Transition Management Query before roaming for a better option of AP to reassociate with. · Unsolicited Load Balancing request--If an AP is heavily loaded, it sends out an 802.11v BSS Transition Management Request to an associated client. · Unsolicited Optimized Roaming request--If a client's RSSI and rate do not meet the requirements, the corresponding AP sends out an 802.11v BSS Transition Management Request to this client. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2176 WLAN Configuring 802.11v BSS Transition Management (GUI) Note 802.11v BSS Transition Management Request is a suggestion (or advice) given to a client, which the client can choose to follow or ignore. To force the task of disassociating a client, turn on the disassociation-imminent function. This disassociates the client after a period if the client is not reassociated to another AP. Configuring 802.11v BSS Transition Management (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > WLANs. Click Add to create WLANs. The Add WLAN page is displayed. In the Advanced tab and 11v BSS Transition Support section, select the BSS Transition check box to enable BSS transition per WLAN. Enter the Disassociation Imminent value. The valid range is from 0 to 3000 TBTT. Click Save & Apply to Device. Configuring 802.11v BSS Transition Management (CLI) 802.11v BSS Transtion is applied in the following three scenarios: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wlan profile-name Example: Device(config)# wlan test-wlan Step 3 shut Example: Device(config-wlan)# shut Step 4 bss-transition Example: Device(config-wlan)# bss-transition Purpose Enters the global configuration mode. Configures WLAN profile and enters the WLAN profile configuration mode. Shutdown the WLAN profile. Configure BSS transition per WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2177 Configuring 802.11v BSS Transition Management (CLI) WLAN Step 5 Step 6 Step 7 Command or Action bss-transition disassociation-imminent Example: Device(config-wlan)# bss-transition disassociation-imminent no shutdown Example: Device(config-wlan)# no shutdown end Example: Device(config-wlan)# end Purpose Configure BSS transition disassociation Imminent per WLAN. Enables the WLAN profile. Return to privilege EXEC mode. Alternatively, you can press CTRL + Z to exit global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2178 1 9 6 C H A P T E R Virtual Routing and Forwarding · Information About VRF Support, on page 2179 · Guidelines and Restrictions for VRF Support, on page 2180 · Create a VRF Instance, on page 2180 · Map VRF to SVI, on page 2181 · Adding VRF Name Through Option 82 for DHCP Relay, on page 2182 · Adding VRF Name to DHCP Server for DHCP Relay, on page 2182 · Verify VRF Support, on page 2183 Information About VRF Support Virtual Routing and Forwarding (VRF) is a logical representation or grouping of Layer 3 entities, such as IP address, routes, and so on. The VRF Support feature provides the controller with the capability to split the control plane and data plane into multiple segregated logical instances within the same controller platform and make these planes VRF aware. VRF plays a crucial role in the following use cases: · Enabling flexible routing in infrastructure services such as AAA, DHCP, DNS, and more. · Facilitating support for overlapping IP addresses. For a multitenant network such as an airport, this allows you to provide wireless services to different tenants (including airlines and shops) at the airport by supporting two clients with different MAC addresses using the same IP address. With VRF support, AP in local mode or AP in FlexConnect mode with central switching policy can have two clients with the same IP even if they belong to different VRFs. Note · From Cisco IOS XE Dublin 17.12.1, overlapping IP address can be supported without disabling device tracking, by using VRF. · The configuration of VRF is not exclusive to this release, but its effectiveness begins from this release. VRFs Supported Per Platform · Cisco Catalyst 9800-80 Wireless Controller: 8181 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2179 Guidelines and Restrictions for VRF Support WLAN · Cisco Catalyst 9800-40 Wireless Controller: 8181 · Cisco Catalyst 9800-L Wireless Controller: 8181 · Cisco Catalyst 9800 Wireless Controller for Cloud: 4096 Guidelines and Restrictions for VRF Support · Supports only Local mode and FlexConnect mode (central DHCP and central switching). · Supports only one VRF per WLAN. Note The maximum number of VRFs supported on a platform depends on the number of WLANs supported on the hardware platform. · Supports static VRF ID allocation. All the configured VRFs should be associated with an SVI. · Supports switch virtual interfaces (SVI) other than Wireless Management Interface (WMI). · Supports only external DHCP servers. · mDNS gateway is not supported. · We recommend using commands to configure the feature because all VRF configurations are currently not supported through GUI. Create a VRF Instance Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 vrf definition vrf-name Example: Configures a VRF instance and enters VRF configuration mode. Device(config)# vrf definition red-vrf Step 3 address-family ipv4 Sets an IPv4 address family. Example: Device(config-vrf)# address-family ipv4 Step 4 exit-address-family Example: Exits from VRF address-family configuration submode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2180 WLAN Map VRF to SVI Step 5 Step 6 Step 7 Command or Action Device((config-vrf-af)# exit-address-family Purpose address-family ipv6 Sets an IPv6 address family. Example: Device(config-vrf)# address-family ipv6 exit-address-family Example: Device((config-vrf-af)# exit-address-family Exits from VRF address-family configuration submode. end Example: Device(config-vrf)# end Returns to privileged EXEC mode. Map VRF to SVI Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 interface interface-type-number Example: Device(config)# interface vlan181 Configues VLAN to be associated with the VRF and enters the interface configuration mode. Step 3 vrf forwarding vrf-name Associates the VRF with the Layer 3 interface. Example: This command activates multiprotocol VRF on an interface. Device(config-if)# vrf forwarding red-vrf Step 4 no ip proxy-arp Example: Device(config-if)# no ip proxy-arp Disables proxy ARP. Step 5 no shutdown Example: Device(config-if)# no shutdown Enables the interface. Step 6 end Example: Returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2181 Adding VRF Name Through Option 82 for DHCP Relay WLAN Command or Action Device(config-if)# end Purpose Adding VRF Name Through Option 82 for DHCP Relay To enable the transmission of VRF name through Option 82 during DHCP relay, follow this procedure. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy policy-name Example: Enables configuration for the specified profile policy. Device(config)# wireless profile policy red-vrf Step 3 shutdown Shuts down the wireless profile policy. Example: Device(config-wireless-policy)# shutdown Step 4 ipv4 dhcp opt82 VRF Enables VRF based Sub Option 151. Example: Device(config-wireless-policy)# ipv4 dhcp opt82 VRF Step 5 no shutdown Example: Device(config-wireless-policy)# no shutdown Enables the wireless profile policy. Step 6 end Example: Device(config-wireless-policy)# end Returns to privileged EXEC mode. Adding VRF Name to DHCP Server for DHCP Relay When implementing DHCP relay, this procedure allows you to configure the DHCP server's VRF separately from the VRF of the client. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2182 WLAN Verify VRF Support Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy policy-name Example: Enables configuration for the specified profile policy. Device(config)# wireless profile policy red-vrf Step 3 shutdown Shuts down the wireless profile policy. Example: Device(config-wireless-policy)# shutdown Step 4 ipv4 dhcp server ip-address vrf vrf-name Example: Configures the WLAN's IPv4 DHCP server IP address and VRF name. Device(config-wireless-policy)# ipv4 dhcp server 1.2.3.4 vrf red-vrf Step 5 no shutdown Example: Device(config-wireless-policy)# no shutdown Enables the wireless profile policy. Step 6 end Example: Device(config-wireless-policy)# end Returns to privileged EXEC mode. Verify VRF Support Use the following commands to verify the VRF support. Device# show wireless client mac-address aaaa.facc.cccc detail Client MAC Address : aaaa.facc.cccc Client MAC Type : Locally Administered Address Client DUID: NA Client IPv4 Address : 10.240.128.1 Client IPv6 Addresses : 2010::1:200:axx:fe04:68a Client Username: N/A Client VRF Name: red-vrf AP MAC Address : 0j0b.0b00.0100 AP Name: AP6B8B4567-0001 AP slot : 0 Client State : Associated Policy Profile : flex-central-auth-policy-profile Flex Profile : default-flex-profile Wireless LAN Id: 8 WLAN Profile Name: wpa3sae Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2183 Verify VRF Support WLAN Wireless LAN Network Name (SSID): wpa3sae BSSID : 0a0b.0c00.0100 Connected For : 1055 seconds Device# show wireless device-tracking database mac MAC VLAN IF-HDL VRF-Name IP --------------------------------------------------------------------------------------------- 6c40.088c.a452 16 0x9040000e red-vrf 9.10.16.64 Device# show wireless profile policy detailed test Policy Profile Name Description Status VLAN . . . Profile Name Accounting list Accounting List DHCP required server address VRF Name Opt82 DhcpOpt82Enable DhcpOpt82Ascii DhcpOpt82Rid APMAC SSID AP_ETHMAC APNAME POLICY TAG AP_LOCATION VLAN_ID VRF Exclusionlist Params Exclusionlist Exclusion Timeout . . . : test : : ENABLED : 20 : Not Configured : Not Configured : DISABLED : 0.0.0.0 : red-vrf : DISABLED : DISABLED : DISABLED : DISABLED : DISABLED : DISABLED : DISABLED : DISABLED : DISABLED : DISABLED : ENABLED : ENABLED : 60 To check VRF and client overlap IP address, use the following commands: Device# show wireless device-tracking database mac MAC VLAN IF-HDL IP ZONE-ID/VRF-NAME -------------------------------------------------------------------------------------------------6038.e0dc.317e 172 0x90400004 172.172.172.254 red-vrf 60f8.1dce.39b0 173 0x90000006 172.172.172.254 blue-vrf Device# show wireless cli summary detail Number of Clients: 2 MAC Address SSID AP Name State IP Address Device-type VLAN VRF Name BSSID Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2184 WLAN Verify VRF Support Auth Method Created ------------------------------------------------------------------------------------------------------------------------- 6038.e0dc.317e UI_172 AP9120 Run 172.172.172.254 172 red-vrf 7c21.0d31.dcef [PSK] 02:09:08 60f8.1dce.39b0 UI_173 AP2702I Run 172.172.172.254 173 red-vrf 80e0.1d81.c64f [PSK] 07:41 Connected Protocol Channel Width SGI NSS Rate CAP Username Rx packets Tx packets Rx bytes Tx bytes 6E capability -------------------------------------------------------------------------------------------------------------------- 02:09:11 11n(5) 36 40/40 Y/Y 2/2 m15 E 19214 12028 2300155 1939782 N 07:44 11ac 36 20/80 Y/Y 3/3 m8ss3 E 29165 25429 5110 N Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2185 Verify VRF Support WLAN Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2186 PART XVIII Cisco DNA Service for Bonjour · Cisco DNA Service for Bonjour Solution Overview, on page 2189 · Configuring Local and Wide Area Bonjour Domains, on page 2201 · Configuring Local Area Bonjour for Wireless Local Mode, on page 2243 · Configuring Local Area Bonjour for Wireless FlexConnect Mode, on page 2263 · Configuration Example for Local Mode - Wireless and Wired, on page 2287 · Configuration Example for FlexConnect Mode - Wireless and Wired, on page 2305 1 9 7 C H A P T E R Cisco DNA Service for Bonjour Solution Overview · About the Cisco DNA Service for Bonjour Solution, on page 2189 · Solution Components, on page 2190 · Supported Platforms, on page 2191 · Supported Network Design, on page 2192 About the Cisco DNA Service for Bonjour Solution The Apple Bonjour protocol is a zero-configuration solution that simplifies rich services and enables intuitive experience between connected devices, services, and applications. Using Bonjour, you can discover and use IT-managed, peer-to-peer, audio and video, or Internet of Things (IoT) services with minimal intervention and technical knowledge. Bonjour is originally designed for single Layer 2 small to mid-size networks, such as home or branch networks. The Cisco DNA Service for Bonjour solution eliminates the single Layer 2 domain constraint and expands the matrix to enterprise-grade traditional wired and wireless networks, including overlay networks such as Cisco Software-Defined Access (SD-Access) and industry-standard BGP EVPN with VXLAN. The Cisco Catalyst 9000 Series LAN switches, Cisco Nexus 9300 Series Switches, and Cisco Catalyst 9800 Series Wireless Controller follow the industry standard, RFC 6762-based multicast DNS (mDNS) specification to support interoperability with various compatible wired and wireless consumer products in enterprise networks. The Cisco Wide Area Bonjour application on Cisco DNA Center enables mDNS service routing to advertise and discover services across enterprise-grade wired and wireless networks. The new-distributed architecture is designed to eliminate mDNS flood boundaries and transition to unicast-based service routing, providing policy enforcement points and enabling the management of Bonjour services. The following figure illustrates how the Cisco Wide Area Bonjour application operates across two integrated service-routing domains. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2189 Solution Components Figure 59: Cisco Wide Area Bonjour Solution Architecture Cisco DNA Service for Bonjour · Local Area Service Discovery Gateway Domain - Unicast Mode: The new enhanced Layer 2 unicast policy-based deployment model. The new mDNS service discovery and distribution using the Layer 2 unicast address enables flood-free LAN and wireless networks. Cisco Catalyst 9000 Series Switches and Cisco Catalyst 9800 Series Wireless Controller in Layer 2 mode introduce a new service-peer role, replacing the classic flood-n-learn, for new unicast-based service routing support in the network. The service-peer switch and wireless controller also replace mDNS flood-n-learn with unicast-based communication with any RFC 6762 mDNS-compatible wired and wireless endpoints. · Wide-Area Service Discovery Gateway Domain: The Wide Area Bonjour domain is a controller-based solution. The Bonjour gateway role and responsibilities of Cisco Catalyst and Cisco Nexus 9300 Series Switches are extended from a single SDG switch to an SDG agent, enabling Wide Area Bonjour service routing beyond a single IP gateway. The network-wide distributed SDG agent devices establish a lightweight, stateful, and reliable communication channel with a centralized Cisco DNA Center controller running the Cisco Wide Area Bonjour application. The SDG agents route locally discovered services based on the export policy. Note The classic Layer 2 multicast flood-n-learn continues to be supported on wired and wireless networks with certain restrictions to support enhanced security and location-based policy enforcement. The Cisco Catalyst and Cisco Nexus 9300 Series Switches at Layer 3 boundary function as an SDG to discover and distribute services between local wired or wireless VLANs based on applied policies. Solution Components The Cisco DNA Service for Bonjour solution is an end-to-end solution that includes the following key components and system roles to enable unicast-based service routing across the local area and Wide Area Bonjour domain: · Cisco Service Peer: Cisco Catalyst Switches and Cisco Wireless Controllers in Layer 2 access function in service peer mode to support unicast-based communication with local attached endpoints and export service information to the upstream Cisco Catalyst SDG agent in the distribution layer. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2190 Cisco DNA Service for Bonjour Supported Platforms Note Cisco Nexus 9300 Series Switches don't support unicast-based service routing with downstream Layer 2 access network devices. · Cisco SDG Agent: Cisco Catalyst and Cisco Nexus 9300 Series Switches function as an SDG agent and communicate with the Bonjour service endpoints in Layer 3 access mode. At the distribution layer, the SDG agent aggregates information from the downstream Cisco service peer switch and wireless controller, or local Layer 2 networks, and exports information to the central Cisco DNA controller. Note Cisco Nexus 9300 Series Switches don't support multilayer LAN-unicast deployment mode. · Cisco DNA controller: The Cisco DNA controller builds the Wide Area Bonjour domain with network-wide and distributed trusted SDG agents using a secure communication channel for centralized services management and controlled service routing. · Endpoints: A Bonjour endpoint is any device that advertises or queries Bonjour services conforming to RFC 6762. The Bonjour endpoints can be in either LANs or WLANs. The Cisco Wide Area Bonjour application is designed to integrate with RFC 6762-compliant Bonjour services, including AirPlay, Google Chrome cast, AirPrint, and so on. Supported Platforms The following table lists the supported controllers, along with the supported hardware and software versions. Table 147: Supported Controllers with Supported Hardware and Software Versions Supported Controller Cisco DNA Center appliance Cisco Wide Area Bonjour application Hardware DN2-HW-APL DN2-HW-APL-L DN2-HW-APL-XL -- Software Version Cisco DNA Center, Release 2.3.6 2.4.660.75403 The following table lists the supported SDG agents along with their licenses and software requirements. Table 148: Supported SDG Agents with Supported License and Software Requirements Supported Platform Supported Role Cisco Catalyst 9200 SDG agent Series Switches Service peer Local Area SDG Cisco DNA Advantage Wide Area SDG Cisco DNA Advantage Minimum Software Cisco IOS XE Release 17.11.1 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2191 Supported Network Design Cisco DNA Service for Bonjour Supported Platform Supported Role Cisco Catalyst 9200L Series Switches SDG agent Service peer Cisco Catalyst 9300 Service peer and 9300-X Series Switches SDG agent Cisco Catalyst 9400 Service peer and 9400-X Series Switches SDG agent Cisco Catalyst 9500 Service peer and 9500-X Series Switches SDG agent Cisco Catalyst 9500 Service peer High Performance Series Switches SDG agent Cisco Catalyst 9600 Service peer and 9600-X Series Switches SDG agent Cisco Catalyst 9800 Service peer Wireless Controller Cisco Catalyst 9800-L Wireless Controller Service peer Cisco Nexus 9300 SDG agent Series Switches Local Area SDG Cisco DNA Advantage Cisco DNA Advantage Cisco DNA Advantage Cisco DNA Advantage Cisco DNA Advantage Cisco DNA Advantage Cisco DNA Advantage Cisco DNA Advantage Cisco DNA Advantage Wide Area SDG Cisco DNA Advantage Cisco DNA Advantage Cisco DNA Advantage Cisco DNA Advantage Cisco DNA Advantage Cisco DNA Advantage Cisco DNA Advantage Cisco DNA Advantage Cisco DNA Advantage Minimum Software Cisco IOS XE Release 17.11.1 Cisco IOS XE Release 17.11.1 Cisco IOS XE Release 17.11.1 Cisco IOS XE Release 17.11.1 Cisco IOS XE Release 17.11.1 Cisco IOS XE Release 17.11.1 Cisco IOS XE Release 17.11.1 Cisco IOS XE Release 17.11.1 Cisco NX-OS Release 10.2(3)F Supported Network Design The Cisco DNA Service for Bonjour supports a broad range of enterprise-grade networks. The end-to-end unicast-based Bonjour service routing is supported on traditional, Cisco SD-Access, and BGP EVPN-enabled wired and wireless networks. Traditional Wired and Wireless Networks Traditional networks are classic Layer 2 or Layer 3 networks for wired and wireless modes deployed in enterprise networks. Cisco DNA Service for Bonjour supports a broad range of network designs to enable end-to-end service routing and replace flood-n-learn-based deployment with a unicast mode-based solution. The following figure illustrates traditional LAN and central-switching wireless local mode network designs that are commonly deployed in an enterprise. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2192 Cisco DNA Service for Bonjour Figure 60: Enterprise Traditional LAN and Wireless Local Mode Network Design Wired Networks Wired Networks The following figure shows the supported traditional LAN network designs that are commonly deployed in an enterprise. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2193 Wired Networks Figure 61: Enterprise Wired Multilayer and Routed Access Network Design Cisco DNA Service for Bonjour The Cisco Catalyst or Cisco Nexus 9300 Series Switches in SDG agent role that provide Bonjour gateway functions are typically IP gateways for wired endpoints that could reside in the distribution layer in multilayer network designs, or in the access layer in Layer 3 routed access network designs: · Multilayer LAN--Unicast Mode: In this deployment mode, the Layer 2 access switch provides the first-hop mDNS gateway function to locally attached wired endpoints. In unicast mode, the mDNS services are routed to the distribution layer systems providing IP gateway and SDG agent mode. The policy-based service routing between the SDG agents is performed by the Cisco DNA Center controller. · Multilayer LAN--Flood-n-Learn Mode: In this deployment mode, the Layer 2 access switch or wireless controller are in mDNS passthrough modes with the Cisco Catalyst or Cisco Nexus 9300 Series Switches operating in the SDG agent mode. The mDNS gateway function at distribution layer in a network enables inter-VLAN mDNS local proxy. It also builds stateful Wide Area Bonjour unicast service routing with the Cisco DNA Center to discover or distribute mDNS services beyond a single IP gateway. · Routed Access: In this deployment mode, the first-hop Cisco Catalyst or Cisco Nexus 9300 Series Switch is an IP gateway boundary and, therefore, it must also perform the SDG agent role. The policy-based service routing between the SDG agents is performed by the Cisco DNA Center controller. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2194 Cisco DNA Service for Bonjour Wireless Networks Wireless Networks The Cisco DNA Service for Bonjour extends the single wireless controller mDNS gateway function into the Wide Area Bonjour solution. The mDNS gateway on Cisco Catalyst 9800 Series Wireless Controller can be deployed in an enhanced mode as a service peer. In this mode, the wireless controller builds unicast service routing with an upstream Cisco Catalyst gateway switch for end-to-end mDNS service discovery. It replaces the classic flood-n-learn mDNS services from wired network using mDNS AP or other methods. The following figure shows the supported traditional wireless LAN network designs that are commonly deployed in an enterprise. Based on the wireless network design, the mDNS gateway function may be on the wireless controller, or first-hop Layer 2 or Layer 3 Ethernet switch of an Access Point in local-switching mode. Figure 62: Enterprise Traditional Wireless LAN Network Design The Cisco DNA Service for Bonjour supports the following modes for wireless LAN networks: · Local Mode: In the central switching wireless deployment mode, the m-DNS traffic from local mode Cisco access points is terminated on the Cisco Catalyst 9800 Series Wireless Controller. The Cisco Catalyst 9800 Series Wireless Controller extends the mDNS gateway function to the new service peer mode. The wireless controller can discover and distribute services to local wireless users and perform unicast service routing over a wireless management interface to the upstream Cisco Catalyst Switch in the distribution layer, which acts as the IP gateway and the SDG agent. · FlexConnect--Central: The mDNS gateway function for Cisco access point in FlexConnect central switch SSID functions consistently as described in Local Mode. The new extended mDNS gateway mode on the Cisco Wireless Controller and upstream service routing with SDG agent operate consistently to discover services across network based on policies and locations. · FlexConnect--Local: In FlexConnect local switching mode, the Layer 2 access switch in mDNS gateway service peer mode provides the policy-based mDNS gateway function to locally attached wired and wireless users. The Cisco Catalyst Switches in the distribution layer function as SDG agents and enable Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2195 Cisco SD-Access Wired and Wireless Networks Cisco DNA Service for Bonjour mDNS service-routing across all Layer 2 ethernet switches to support unicast-based service routing to LAN and wireless LAN user groups. · Embedded Wireless Controller--Access Point: The Layer 2 access switch in service peer mode provides unified mDNS gateway function to wired and wireless endpoints associated with Cisco Embedded Wireless Controller on Cisco Catalyst 9100 Series Access Points. The SDG agent in the distribution layer provides unicast service routing across all Layer 2 service peer switches in the Layer 2 network block without any mDNS flooding. Cisco SD-Access Wired and Wireless Networks Cisco SD-Access-enabled wired and wireless networks support Cisco DNA Service for Bonjour across fabric networks. The Cisco Catalyst 9000 Series Switches support VRF-aware Wide Area Bonjour service routing to provide secure and segmented mDNS service discovery and distribution management for virtual networks. The VRF-aware unicast service routing eliminates the need to extend Layer 2 flooding, and improves the scale and performance of the fabric core network and endpoints. Figure 63: Cisco SD-Access Wired and Wireless Network Design Cisco SD-Access supports flexible wired and wireless network design alternatives to manage fully distributed, integrated, and backward-compatible traditional network infrastructure. Wide Area Bonjour service routing is supported in all network designs providing intuitive user experience. The following figure illustrates the various SD-Access enabled wired and wireless network design alternatives. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2196 Cisco DNA Service for Bonjour Cisco SD-Access Wired and Wireless Networks Figure 64: Cisco SD-Access Wired and Wireless Network Design Alternatives The Cisco DNA Service for Bonjour for SD-Access enabled wired and fabric, or traditional mode-wireless networks use two-tier service routing providing end-to-end unicast-based mDNS solution. Based on the network design, each solution component is enabled in a unique role to support the Wide Area Bonjour domain: · Fabric Edge SDG Agent: The Layer 3 Cisco Catalyst Fabric Edge switch in the access layer configured as SDG agent provides unicast-based mDNS gateway function to the locally attached wired and wireless endpoints. The VRF-aware mDNS service policy provides network service security and segmentation in a virtual network environment. The mDNS services can be locally distributed and routed through centralized Cisco DNA Center. · Policy Extended Node: The Layer 2 Cisco Catalyst access layer switch enables first-hop mDNS gateway function without flooding across the Layer 2 broadcast domain. The unicast-based service routing with upstream Fabric Edge switch in the distribution layer enables mDNS service routing within the same Layer 2 network block. It can also perform remote service discovery and distribution from centralized Cisco DNA Center. · Cisco Wireless Controller: Based on the following wireless deployment modes, Cisco Wireless Controller supports unique function to enable mDNS service routing in Cisco SD-Access enabled network: · Fabric-Enabled Wireless: Cisco Wireless Controller doesn't require any mDNS gateway capability to be enabled in distributed fabric-enabled wireless deployments. · Local Mode Wireless: As Cisco Wireless Controller provides central control and data plane termination, it provides mDNS gateway in service peer mode for wireless endpoints. The wireless controller provides mDNS gateway between locally associated wireless clients. The wireless controller builds service routing with upstream SDG agent Catalyst switch providing IP gateway and service routing function for wireless endpoints. · Embedded Wireless Controller--Switch: The Cisco Embedded Wireless Controller solution enables the lightweight integrated wireless controller function within the Cisco Catalyst 9300 Series Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2197 BGP EVPN Networks Cisco DNA Service for Bonjour Switch. The Cisco Catalyst switches in the distribution layer function as SDG agents to the wired and wireless endpoints. The SDG agent in the distribution layer provides unicast service routing across all wireless access points and Layer 2 service peer switches without mDNS flooding. · Cisco DNA Center Controller: The Cisco Wide Area Bonjour application on Cisco DNA Center supports policy and location-based service discovery, and distribution between network-wide distributed Fabric Edge switches in SDG agent mode. The Wide Area Bonjour communication between the SDG agent and controller takes place through the network underlay. Based on policies, the SDG agent forwards the endpoint announcements or queries to the Cisco DNA Center. After discovering a service, the endpoints can establish direct unicast communication through the fabric overlay in the same virtual network. The inter-virtual network unicast communication takes place through the Fusion router or external Firewall system. This communication is subject to the configured overlay IP routing and Security Group Tag (SGT) policies. BGP EVPN Networks The BGP EVPN-based technology provides a flexible Layer 3 segmentation and Layer 2 extension overlay network. The VRF and EVPN VXLAN-aware Wide Area Bonjour service routing provides secure and segmented mDNS service solution. The overlay networks eliminate mDNS flooding over EVPN-enabled Layer 2 extended networks and solve the service reachability challenges for Layer 3 segmented routed networks in the fabric. The following figure shows the BGP EVPN leaf switch in the distribution layer, supporting overlay Bonjour service routing for a BGP EVPN-enabled traditional Layer 2 wired access switch and traditional wireless local mode enterprise network interconnected through various types of Layer 2 networks and Layer 3 segmented VRF-enabled networks. Figure 65: Overlay Bonjour Service for a BGP EVPN-Enabled Enterprise Network Cisco DNA Service for Bonjour supports all the industry-standard overlay network designs enabling end-to-end unicast-based mDNS service routing, and preventing flooding and service boundary limitation across wired and wireless networks. The following figure illustrates the various BGP EVPN VXLAN reference overlay network design alternatives. This network design enables end-to-end mDNS service discovery and distribution based on overlay network policies. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2198 Cisco DNA Service for Bonjour Figure 66: BGP EVPN VXLAN Wired and Wireless Design Alternatives BGP EVPN Networks The Cisco Catalyst and Cisco Nexus 9000 Series Switches can be deployed in Layer 2 or Layer 3 leaf roles supporting mDNS service routing for a broad range of overlay networks. In any role, the mDNS communication is limited locally and supports end-to-end unicast-based service routing across Wide Area Bonjour domain: · Layer 2 Leaf SDG Agent: The Cisco Catalyst or Cisco Nexus switches can be deployed as Layer 2 leaf supporting end-to-end bridged network with IP gateway within or beyond BGP EVPN VXLAN fabric network. By default, the mDNS is flooded as Broadcast, Unknown Unicast, Multicast (BUM) over the fabric-enabled core network. This mDNS flooding may impact network performance and security. The Layer 2 leaf, enabled as SDG agent, prevents mDNS flooding over VXLAN and supports unicast-based service routing. · Layer 3 Leaf SDG Agent: The Cisco Catalyst or Cisco Nexus switches can be deployed as SDG agent supporting Layer 3 overlay network in BGP EVPN VXLAN fabric. The IP gateway and mDNS service boundary is terminated at the SDG agent switches and remote services can be discovered or distributed through centralized Cisco DNA Center. · Local Mode Wireless: The centralized wireless local mode network can be terminated within or outside the EVPN VXLAN fabric domain to retain network segmentation and service discovery for wireless endpoints. The Cisco Catalyst 9800 Series Wireless Controller in service peer mode can build unicast service routing with distribution layer IP and SDG agent Cisco Catalyst switch to discover services from BGP EVPN VXLAN fabric overlay network. · Cisco DNA Center: Cisco DNA Center supports Wide Area Bonjour capability to dynamically discover and distribute mDNS services based on Layer 2 or Layer 3 Virtual Network ID (VNID) policies to route the mDNS services between SDG agent switches in the network. For more information about BGP EVPN networks, see Cisco DNA Service for Bonjour Configuration Guide, Cisco IOS XE Bengaluru 17.6.x (Catalyst 9600 Switches). Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2199 BGP EVPN Networks Cisco DNA Service for Bonjour Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2200 1 9 8 C H A P T E R Configuring Local and Wide Area Bonjour Domains · Cisco DNA Service for Bonjour Solution Overview, on page 2201 · Configuring Local and Wide Area Bonjour Domains, on page 2213 · Configuring Hot Standby Router Protocol-aware (HSRP-aware) mDNS Service-Routing on SDG, on page 2233 · Configuring Hot Standby Router Protocol-aware (HSRP-aware) mDNS Service-Routing on Service-Peer (CLI), on page 2233 · Verifying Local Area Bonjour in Multicast DNS Mode for LAN and Wireless Networks, on page 2234 · Additional References for DNA Service for Bonjour, on page 2239 · Feature History for Cisco DNA Service for Bonjour, on page 2239 Cisco DNA Service for Bonjour Solution Overview Restrictions · Cisco Service Discovery Gateway (SDG) and Wide Area Bonjour gateway function is supported on Cisco Catalyst Switch and Cisco ISR 4000 series routers. See Solution Components, on page 2190 for the complete list of supporting platforms, software versions and license levels. · Cisco IOS supports classic and new method of building local Bonjour configuration policies. The classic method is based on service-list mdns-sd CLI whereas the new method is based on mdns-sd gateway. We recommend using the new mdns-sd gateway method since the classic configuration support will be deprecated in near future releases. · The classic to new method CLI migration is manual procedure to convert the configuration. · The Bonjour service policies on Cisco SDG Gateways are effective between local VLANs. In addition to these, a specific egress policy controls the type of services to be exported to the controller. The Layer 2 Multicast-DNS Bonjour communication between two end-points on same broadcast domain is transparent to gateway. · To enable end-to-end Wide Area Bonjour solution on Wireless networks, the Cisco WLC controller must not enable mDNS Snooping function. The upstream IP gateway on the dedicated Cisco Catalyst switch must have the Bonjour gateway function enabled for wireless clients. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2201 Cisco Wide Area Bonjour Service Workflow Cisco DNA Service for Bonjour · Cisco Wireless LAN Controller must enable AP Multicast with unique Multicast group. Without AP joining WLC Multicast group the mDNS messages will not be processed between client and gateway switch. Multicast on Client SSID or VLAN is optional for other multicast applications and not mandatory or required for Bonjour solution. · Cisco Catalyst 9800 WLC can be configured as mDNS Gateway. In this mode, the Cisco Catalyst 9800 WLC supports Local-Area Bonjour gateway solution limited to Wireless only networks. Cisco Catalyst 9800 does not support Wide Area Bonjour. For end-to-end Wired and Wireless Bonjour support, we recommend using upstream Cisco Catalyst Switch as IP and Bonjour gateway. Cisco Wide Area Bonjour Service Workflow The Cisco Wide Area Bonjour solution follows a client-server model. The SDG Agent functions as a client and the Cisco Wide Area Bonjour application Cisco DNA Center functions as a server. The following sections describe the workflow of service announcement and discovery in the IP network. Announcing Services to the Network · The endpoint devices (Source) in the Local Area Bonjour domain send service announcements to the SDG Agent and specify what services they offer. For example, _airplay._tcp.local, _raop._tcp.local, _ipp._tcp.local, and so on. · The SDG Agent listens to these announcements and matches them against the configured Local Area SDG Agent policies. If the announcement matches the configured policies, the SDG Agent accepts the service announcement and routes the service to the controller. Discovering Services Available in the Network · The endpoint device (Receiver) connected to the Local Area SDG Agent sends a Bonjour query to discover the services available, using the mDNS protocol. · If the query conforms to configured policies, SDG Agent responds with the services obtained from appropriate service routing via the Wide Area Bonjour Controller. Wide Area Bonjour Multi-Tier Policies The various policies that can be used to control the Bonjour announcements and queries are classified as the following: · Local Area SDG Agent Filters: Enforced on the SDG Agent in Layer-2 Network Domain. These bi-directional policies control the Bonjour announcements or queries between the SDG Agents and the Bonjour endpoints. · Wide Area SDG Agent Filters: Enforced on the SDG Agent for export control to the Controller. This egress unidirectional policy controls the service routing from the SDG Agent to the controller. · Cisco Wide Area Bonjour Policy: Enforced on Controller for global service discovery and distribution. Policy enforcement, between the controller and the IP network is bi-directional. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2202 Cisco DNA Service for Bonjour Cisco Wide Area Bonjour Supported Network Design Cisco Wide Area Bonjour Supported Network Design Traditional Wired and Wireless Networks The Cisco DNA Service for Bonjour supports various LAN network designs commonly deployed in the enterprise. The SDG Agent providing Bonjour gateway functions is typically an IP gateway for wired end-points that could be residing in the distribution layer in multilayer network designs, or in the access layer in routed access network designs. The following figure shows various topologies which are explained further in the section. · Multilayer LAN: In this deployment mode, the Layer 2 Access switch provides the transparent bridging function of Bonjour services to Distribution-layer systems that act as the IP gateway and SDG Agent. There is no additional configurration or new requirement to modify the existing Layer-2 trunk settings between the Access and Distribution Layer Cisco Catalyst Switches. · Routed Access: In this deployment mode, the first-hop switch is an IP gateway boundary and therefore, it must be combined with the SDG Agent role. The Cisco DNA Service for Bonjour also supports various Wireless LAN network designs commonly deployed in the Enterprise. The SDG Agent provides consistent Bonjour gateway functions for the wireless endpoints as in wired networks. In general, the IP gateway of the wireless clients is also a Bonjour gateway. However, the placement of the SDG Agent may vary depending on the Wireless LAN deployment mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2203 Cisco SD Access Wired and Wireless Networks Cisco DNA Service for Bonjour Cisco SD Access Wired and Wireless Networks In Cisco SD-Access network, the Fabric Edge switch is configured as the SDG Agent for fabric-enabled wired and wireless networks. Wide Area Bonjour policies need to be aligned with the SD-Access network policies with respect to Virtual Networks and SGT policies, if any. Wide Area Bonjour uses two logical components in a network: · SDG Agent: The Fabric Edge switch is configured as the SDG Agent, and the configuration is added only after the SD-Access is configured. · Wide Area Bonjour Controller: The Wide Area Bonjour application in the Cisco DNA Center acts as the Controller. The Wide Area Bonjour communication between the SDG Agent and the Controller takes place through the network underlay. The SDG Agent forwards the endpoint announcements or queries to the Controller through the fabric underlay. After discovering a service, a Bonjour-enabled application establishes direct unicast communication with the discovered device through the fabric overlay. This communication is subject to any configured routing and SDG policies. Local and Wide Area Bonjour Policies The Cisco Wide Area Bonjour policy is divided into four unique function to enable policy based Bonjour services discovery and distribution in two-tier domains. The network administrator must identify the list of Bonjour services that needs to be enabled and set the discovery boundary that can be limited to local or global based on requirements. Figure below illustrates enforcement point and direction of all four types of Bonjour policies at the SDG Agent level and in Cisco DNA-Center Wide Area Bonjour application: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2204 Cisco DNA Service for Bonjour Local Area Bonjour Policy Local Area Bonjour Policy The Cisco IOS Bonjour policy structure is greatly simplified and scalable with the new configuration mode. The services can be enabled with intuitive user-friendly service-type instead individual mDNS PoinTeR (PTR) records types, for example select AirPlay that automatically enables video and audio service support from Apple TV or equivalent capable devices. Several common types of services in Enterprise can be enabled with built-in service-types. If built-in service type is limited, network administrator can create custom service-type and enable the service distribution in the network. The policy configuration for the Local Area Bonjour domain is mandatory, and is a three step process. Figure below illustrates the step-by-step procedure to build the Local-Area Bonjour policy, and apply to enable the gateway function on selected local networks: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2205 Local Area Bonjour Policy Figure 67: Local Area Bonjour Policy Hierarchy Cisco DNA Service for Bonjour To configure local area bonjour policies, enable mDNS globally. For the device to receive mDNS packets on the interface, configure mDNS gateway on the interface. Create a service-list by using filter options within it allow services into or out of a device or interface. After enabling mDNS gateway globally and on the interface, you can apply filters (IN-bound filtering or OUT-bound filtering) on service discovery information by using service-policy commands. Built-In Service List The Cisco IOS software includes built-in list of services that may consist of one more Bonjour service-type. A single service-list may contain more than one service-type entries with default rule to accept service announcement from service-provider and the service query request from receiver end-points. If selected service-type contains more than one Bonjour service-types (PTR), then a service announcement or a service query is honoured when the announcement/query is for any one of these included Bonjour service-types. For example, Apple Time Capsule Data service-type consists of both_adisk and _afpovertcp built-in PTRs, however if any end-point announces or requests for only _afpovertcp service, then SDG Agent will successfully classify and process the announcement or request. The service-list contains implicit-deny for all un-defined built-in or custom services entries. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2206 Cisco DNA Service for Bonjour Local Area Bonjour Policy Table below illustrates complete list of built-in Bonjour services that can be used to create policies in local area Bonjour. Table 149: Cisco IOS Built-In Bonjour Service Database Service Airplay Apple TV Audinate Service Name airplay apple-tv audinate AirServer Mirroring Service airserver Apple AirTunes Amazon Fire TV Apple AirPrint airtunes amazon-fire-tv apple-airprint Apple TV 2 Apple File Share Apple HomeKit apple-continuity apple-file-share apple-homekit Apple iTunes Library apple-itunes-library Apple iTunes Music apple-itunes-music Apple iTunes Photo apple-itunes-photo Apple KeyNote Remote Control apple-keynote Apple Remote Desktop apple-rdp Apple Remote Event apple-remote-events mDNS PTRs _airplay._tcp.local _airplay._tcp.local _raop._tcp.local _dante-safe._udp.local _dante-upgr._udp.local _netaudio-arc._udp.local _netaudio-chan._udp.local _netaudio-cmc._udp.local _netaudio-dbc._udp.local _airplay._tcp.local _airserver._tcp.local _raop._tcp.local _amzn-wplay._tcp.local _ipp._tcp.local _universal._sub._ipp._tcp.local _companion-link._tcp.local _afpovertcp._tcp.local _homekit._ipp.local _hap._tcp.local _atc._tcp.local _daap._tcp.local _dpap._tcp.local _keynotecontrol._tcp.local _keynotepair._tcp.local _afpovertcp._tcp.local _net-assistant._tcp.local _eppc._tcp.local Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2207 Local Area Bonjour Policy Cisco DNA Service for Bonjour Service Apple Remote Login Service Name apple-remote-login Apple Screen Share Google Expeditions Apple Time Capsule Data apple-screen-share google-expeditions apple-timecapsule Apple Time Capsule Management apple-timecapsule-mgmt Apple MS Window File Share apple-windows-fileshare Fax fax Google ChromeCast google-chromecast Apple HomeSharing Apple iTunes Data Sync Multifunction Printer homesharing itune-wireless-devicesharing2 multifunction-printer Phillips Hue Lights phillips-hue-lights Printer Internet Printing Protocol printer-ipp Printer IPP over SSL printer-ipps Linux Printer Line Printer Daemon printer-lpd Printer Socket printer-socket Roku Media Player roku Scanner scanner Spotify Music Service spotify Web-Server web-server WorkStation workstation mDNS PTRs _sftp-ssh._tcp.local _ssh._tcp.local _rfb._tcp.local _googexpeditions._tcp.local _adisk._tcp.local _afpovertcp._tcp.local _airport._tcp.local _smb._tcp.local _fax-ipp._tcp.local _googlecast._tcp.local _googlerpc._tcp.local _googlezone._tcp.local _home-sharing._tcp.local _apple-mobdev2._tcp.local _ipp._tcp.local _scanner._tcp.local _fax-ipp._tcp.local _hap._tcp.local _ipp._tcp.local _ipps._tcp.local _printer._tcp.local _pdl-datastream._tcp.local _rsp._tcp.local _scanner._tcp.local _spotify-connect._tcp.local _http._tcp.local _workstation._tcp.local Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2208 Cisco DNA Service for Bonjour Local Area Bonjour Policy Custom Service List The Custom service list allows network administrator to configure service if built-in Bonjour database does not support specific service or bundled service types. For example, the file-sharing requirement demands to support Apple Filing Protocol (AFP) between macOS users and Server Message Block (SMB) file transfer capability between macOS and Microsoft Windows devices. For such requirements the network administrator can create an custom service list combining AFP (_afpovertcp._tcp.local) and SMB (_smb._tcp.local). The Service-List provides flexibility to network administrator to combine built-in and custom service definition under single list. There is no restriction on numbers of custom service definitions list and association to single service-list. Policy Direction The Local Area Bonjour policy in Cisco IOS provides flexibility to network administrator to construct service policies that can align service announcement and query management in same or different local networks. The service-policies can be tied to either ingress or egress direction to enforce service control in both directions. The following sub-sections provide more details on service policy configuration. Ingress Service Policy The ingress service policy is a mandatory configuration element that is used to permit the processing of incoming mDNS service announcement and query requests. Without ingress service policy, the Bonjour gateway function on a targeted Wired or Wireless network is not enabled. The ingress service policy provides flexibility to permit service announcement and query on each user-defined service-types, i.e. permit accepting AirPlay service announcement and query request, but enable Printer service query request only. Egress Service Policy The egress service policy is an optional configuration and not required in following two conditions: · The egress service policy is not applicable in local VLAN where the expected Bonjour end-points are service-provider only, i.e. Service-VLAN network may contain only IT managed service-provider end-points such as Apple TV, Printers etc. as these end-points do not query for other service-types in the network. · The Wired or Wireless users must receive services only from Wide Area Bonjour domain by Cisco DNA-Center, and not from other Bonjour end points connected to the same SDG Agent.. The egress service policy configuration is only required when an SDG-Agent must distribute locally discovered Bonjour services information from one VLAN to other. For example, based on ingress service policy the SDG-Agent discovered and cache the AirPrint capable Printer from VLAN-A, if the receiver endpoint in VLAN-B wants to discover Printer information from VLAN-A then the SDG-Agent must have ingress and egress service policy permitting AirPrint service on both VLANs. Conditional Egress Service Policy The network administrator can optionally customize the egress service policy to enable conditional service response from sourced from specific VLAN network. For example, based on ingress service policy the SDG-Agent may discover AirPrint capable Printers from VLAN-A and VLAN-C networks. With conditional Local Area Bonjour egress service policy rule, the network administrator may limit distributing Printer information discovered from VLAN-A to the receivers in VLAN-B network and automatically filters VLAN-C Printers. The conditional egress service policy support is optional setting and only applicable on out direction service policy. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2209 Wide Area Bonjour Policy Cisco DNA Service for Bonjour Service Status Timer Management The Bonjour service-provider end-points may announces one or more services in the network combining mDNS records and time-to-live (TTL) service timers for each record. The TTL value provides assurance of end-point availability and serviceability in the network. The SDG Agents ensures that it contains up to date information in its local and updates global services in Controller based on TTL and other events in Local Area Bonjour domain. The network administrator must configure the service status timer where service-provider endpoint discovery is permitted. Wide Area Bonjour Policy The SDG-Agent mandatorily requires the controller bound Wide Area Bonjour service export policy to control routing local services and discover remote services from Cisco DNA-Center. As the Cisco DNACenter and SDG-Agent builds trusted communication channel the remote service response from Wide Area Bonjour App is implicitly permitted at SDG-Agent. Hence the Wide Area Bonjour policy is unidirectional it only requires egress service policy towards controller. The Wide Area Bonjour policy hierarchy and structure is identical as described in Local Area Bonjour Policy structure section. Following sub-section provides step-by-step reference configuration to build and enforce the policy to enable the successful communication with Wide Area Bonjour App in Cisco DNA-Center. Service List Built-In and Custom The network administrator must create new controller bound egress service list for the Wide Area Bonjour domain. In most common network deployment model, the Wide Area Bonjour service list may contain same service-types as the Local Area Bonjour to implement common services between both domains. Based on requirements, certain services can be limited to Local Area and prevent routed in Wide Area Domain, then by default only allowed service list entries are permitted and rest are dropped with implicit deny rule. Ingress Policy Direction The ingress service policy for Wide Area Bonjour domain is not required and cannot be associated to the controller. Egress Policy Direction As described the Bonjour policy structure between Local Area and Wide Area is consistent, however the enforcement point is different. We recommend configuring separate Service-List and Service-Policy for Wide Area Bonjour domain as it may help building unique policy set for each domain. Conditional Egress Service List The Wide Area Bonjour egress service list configuration can be customized to conditionally route the service or query request to the Cisco DNA-Center. With this alternative configuration settings, the network administrator can route the service or query the request in Wide Area Bonjour domain from specific local source VLAN network instead globally from entire system. Wide Area Bonjour Service Status Timer Management The Cisco DNA-Center centralizes the services information from large scale distributed SDG-Agents across the network. To maintain a scale and performance of controller the services routing information is transmitted and synchronized periodically by each SDG-Agent network devices. To protect system and network performance the scheduler base service information exchange allows graceful and reliable way to discover and distribute Bonjour services across Wide Area Bonjour domain. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2210 Cisco DNA Service for Bonjour Default mDNS Service Configurations In most large-scale network environment, the default Bonjour service timers on SDG-Agents are by default fine-tuned and may not need any further adjustments. Cisco recommends retaining the interval timer values to default and adjust only based on any user experience issue and consider modified parameters do not introduce scale and performance impact. Default mDNS Service Configurations Starting with Cisco IOS XE Bengaluru 17.6.1, an intuitive approach to configuring mDNS services, known as the default mDNS service configuration is introduced. The default service configuration contains a default service policy that creates a service list with default service-types that is automatically enforced in the ingress or egress direction. The following figure illustrates the default mDNS service configurations: Figure 68: Default mDNS Service Configurations The default mDNS service configurations accelerates solution adoption, increases user productivity, and reduces operation overhead. Additionally, you can define a custom policy and service list with custom-defined service types, and enfore it in the ingress or degress direction. HSRP-Aware mDNS Service-Routing Starting from Cisco IOS XE Bengaluru 17.6.1, Hot Standby Router Protocol-aware (HSRP-aware) mDNS Service-Routing is supported between Service Peers and SDG agents in a multilayer network. During a changeover, that is when the primary SDG agent fails and the secondary SDG agent becomes the new primary, the service-routing session between the Service Peer and the SDG agent remains uninterrupted. The new primary SDG agent establishes a session with the Service Peer and cache information is resynced. The HSRP virtual IP address of the management VLAN is enabled on the SDG agent using the standby group_number ip ip_address command. The HSRP virtual IP address needs to configured on the Service Peer as the IP address of the SDG agent. Note The HSRP virtual IP address must be reachable and in active state during a changeover. The following figure illustrates a wired and wireless network that supports HSRP-aware mDNS Service-Routing: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2211 mDNS Service-Gateway SSO Support Figure 69: HSRP-Aware mDNS Service-Routing Cisco DNA Service for Bonjour The HSRP offers the following advantages: · Automatic gateway selection. · Rapid switchover. · Reduces service convergence. mDNS Service-Gateway SSO Support Starting from Cisco IOS XE Bengaluru 17.6.1, mDNS Stateful Switchover (SSO) is supported on network devices configured in Service Peer role. In SSO-enabled devices, one device is selected as an active device and the other as a standby device. The cache information learnt by the active device is synced with the standby device. When the active device fails, the standby device becomes the new active device and continues the mDNS service discovery process. Figure 70: mDNS Service-Gateway SSO Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2212 Cisco DNA Service for Bonjour Configuring Local and Wide Area Bonjour Domains Configuring Local and Wide Area Bonjour Domains How to configure Multicast DNS Mode for LAN and Wired Networks This section provides information about how to configure Local Area Bonjour in multicast DNS mode. Enabling mDNS Gateway on the Device To configure mDNS on the device, follow these steps: Procedure Step 1 Command or Action enable Example: Device> enable Step 2 configure terminal Example: Device# configure terminal Step 3 mdns-sd gateway Example: Device(config)# mdns-sd gateway Purpose Enables privileged EXEC mode. Enter your password, if prompted. Enters global configuration mode. Enables mDNS on the device and enters mDNS gateway configuration mode. Enter the following commands in mDNS gateway configuration mode to enable the respective functionalities: · air-print-helper: Enables IOS devices like iPADs to discover and use older printers that support Bonjour · cache-memory-max: Configures the percentage memory for cache · ingress-client: Configures Ingress Client Packet Tuners · rate-limit: Enables rate limiting of incoming mDNS packets · service-announcement-count: Configures maximum service advertisement count · service-announcement-timer: Configures advertisements announce timer periodicity · service-query-count: Configures maximum query count Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2213 Creating Custom Service Definition (GUI) Cisco DNA Service for Bonjour Command or Action Step 4 exit Example: Device(config-mdns-sd)# exit Creating Custom Service Definition (GUI) Procedure Purpose · service-query-timer: Configures query forward timer periodicity The following CLIs are effective only in service-peer mode: · query-response · sdg-agent · service-announcement-count · service-announcement-timer · service-mdns-query · service-query-count · service-query-timer · service-receiver-purge · active-response Note For cache-memory-max, ingress-client, rate-limit, service-announcement-count, service-announcement-timer, service-query-count, and service-query-timer commands, you can retain the default value of the respective parameter for general deployments. Configure a different value, if required, for a specific deployment. Exits mDNS gateway configuration mode. Step 1 Step 2 Step 3 Step 4 Choose Configuration > Services > mDNS > Service Policy > Service Definition. Click Add. Enter the Service Definition Name and Description. Enter the Service Type and click the + icon. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2214 Cisco DNA Service for Bonjour Creating Custom Service Definition Step 5 Click Apply to Device. Creating Custom Service Definition Service definition is a construct that provides an admin friendly name to one or more mDNS service types or PTR Resource Record Name. By default, a few built-in service definitions are already predefined and available for admin to use. In addition to built-in service definitions, admin can also define custom service definitions. Procedure Step 1 Command or Action enable Example: Device> enable Step 2 configure terminal Example: Device# configure terminal Step 3 mdns-sd service-definition service-definition-name Example: Device(config)# mdns-sd service-definition CUSTOM1 Purpose Enables privileged EXEC mode. Enter your password, if prompted. Enters global configuration mode. Configures mDNS service definition. Note All the created custom service definitions are added to the primary service list. Primary service list comprises of a list of custom and built-in service definitions. Step 4 Step 5 Step 6 service-type string Configures mDNS service type. Example: Device(config-mdns-ser-def)# service-type _custom1._tcp.local Repeat step 4 to configure more than one service type in the custom service definition. exit Example: Device(config-mdns-ser-def)# exit Exit mDNS service definition configuration mode. Creating Service List (GUI) Procedure Step 1 Step 2 Choose Configuration > Services > mDNS > Service Policy > Service List. Click Add. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2215 Creating Service List Cisco DNA Service for Bonjour Step 3 Step 4 Step 5 Step 6 Step 7 Enter the Service List Name and choose the direction from the Direction drop-down list. Click Add Service. Choose the service from the Available Services drop-down list and the message type from the Message Type drop-down list. Click Save. Click Apply to Device. Creating Service List mDNS service list is a collection of service definitions. To create a service list, follow these steps: Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 mdns-sd service-list service-list-name {in | out} Example: Device(config)# mdns-sd service-list VLAN100-list in Configures mDNS service list. Step 4 match service-definition-name [message-type Matches the service to the message type. Here, {any | announcement | query}] service-definition-name refers to the names of Example: Device(config-mdns-sl-in)# match services, such as, airplay, airserver, airtunes, and so on. PRINTER-IPPS message-type announcement Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2216 Cisco DNA Service for Bonjour Creating Service Policy (GUI) Command or Action Step 5 exit Example: Device(config-mdns-sl-in)# exit Creating Service Policy (GUI) Procedure Purpose Note To add a service, the service name must be part of the primary service list. If the mDNS service list is set to IN, the applicable command syntax is: match service-definition-name [message-type {any | announcement | query}]. If the mDNS service list is set to OUT, the applicable command syntax is: match service-definition-name [message-type {any | announcement | query}] [location-filter location-filter-name] [source-interface {mDNS-VLAN-number | mDNS-VLAN-range}]. Exits mDNS service list configuration mode. Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Configuration > Services > mDNS > Service Policy > Service Policy. Click Add. Enter the Service Policy Name. Choose the service list input from the Service List Input drop-down list. Choose the service list output from the Service List Output drop-down list. Choose the location from the Location drop-down list. Click Apply to Device. Creating Service Policy A Service Policy that is applied to an interface specifies the allowed Bonjour service announcements or the queries of specific service types that should be processed, in ingress direction or egress direction or both. For this, the service policy specifies two service-lists, one each for ingress and egress directions. In the Local Area Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2217 Associating Service Policy to an Interface Cisco DNA Service for Bonjour Bonjour domain, the same service policy can be attached to one or more Bonjour client VLANs; however, different VLANs may have different service policies. To configure service policy with service lists, follow these steps: Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 mdns-sd service-policy service-policy-name Configures mDNS service policy. Example: Device(config)# mdns-sd service-policy mdns-policy1 Step 4 service-list service-list-name {in | out} Example: Configures service lists for IN and OUT directions. Device(config-mdns-ser-pol)# service-list VLAN100-list in Device(config-mdns-ser-pol)# service-list VLAN300-list out Step 5 exit Example: Device(config-mdns-ser-pol)# exit Exits mDNS service policy configuration mode. Associating Service Policy to an Interface To configure mDNS on the device, follow these steps: Procedure Step 1 Command or Action enable Example: Device> enable Step 2 configure terminal Example: Device# configure terminal Purpose Enables privileged EXEC mode. Enter your password, if prompted. Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2218 Cisco DNA Service for Bonjour Associating Service Policy to an Interface Step 3 Step 4 Command or Action interface interface-name Example: Device(config)# interface Vlan 601 mdns-sd gateway Example: Device(config-if)# mdns-sd gateway Purpose Enters interface mDNS configuration mode and enables interface configuration. Configures mDNS gateway on the interface. Enter the following commands in the interface mDNS gateway configuration mode to enable the respective functionalities: · active-query: Sets the time interval for SDG agent to refresh the active status of connected Bonjour client services. The timer value ranges from 60 to 3600 seconds. Note This configuration is mandatory only on VLANs whose Bonjour policy is configured to accept Bonjour service announcements from connected Bonjour clients. If the VLAN is configured to only accept Bonjour queries but not Bonjour service announcements, this configuration is optional. · service-instance-suffix(Optional) : Appends the service instance suffix to any announced service name that is forwarded to the controller. · service-mdns-query [ptr | all]: Configures mDNS query request message processing for the specified query types. This command is applicable when the controller is in service-peer mode. Note By default, the service-mdns-query command allows only PTR queries. If you need to respond to all (PTR, SRV, and TXT) queries, you need to execute the following command: service-mdns-query all · service-policy policy-name: Attaches the specified service policy to the VLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2219 How to Configure Local Area Bonjour in Multicast DNS Mode for Wireless Networks Cisco DNA Service for Bonjour Command or Action Step 5 exit Example: Device(config-if-mdns-sd)# exit Purpose Bonjour announcements, and queries received by and sent from the VLAN are governed by the policies configured in the service policy. This configuration is mandatory for all VLANs. Note Service policies can only be attached at interface level. · transport [all | ipv4 | ipv6] (Optional): Configures BCP parameter. It is recommended to use transport ipv4 command, except in those networks where the Bonjour clients send only IPv6 announcements and queries. Exits mDNS gateway configuration mode. How to Configure Local Area Bonjour in Multicast DNS Mode for Wireless Networks The configuration of local area Bonjour on a switch that acts as the SDG Agent in a wireless network involves the same set of procedures that are used to configure local area Bonjour on a switch that acts as the SDG Agent in a wired network. The Bonjour protocol operates on service announcements and queries. Each query or advertisement is sent to the mDNS IPv4 address 224.0.0.251 and IPv6 address FF02::FB. The mDNS messages are carried over well-known industry standard UDP port 5353, over both Layer 3 transport types. The Layer 2 address used by the Bonjour protocol is link-local multicast address and therefore it's only forwarded to the same Layer 2 network. As multicast DNS (mDNS) is limited to a Layer 2 domain, for a client to discover a service, it has to be a part of the same Layer 2 domain. This isn't always possible in a large-scale deployment or enterprise. To enable mDNS communication between Wireless endpoints and Cisco Catalyst switch that acts as an SDG Agent, the intermediate WLC must transparently allow the network to transmit and receive mDNS messages. Hence, for a Multicast DNS Mode Wireless network deployment, disable the mDNS Snooping on Cisco AireOS based WLC and enable mDNS Gateway feature on Cisco Catalyst 9800 series WLC and set the AP Multicast Mode to Multicast. Figure below illustrates a prerequisite configuration for Wireless network to enable seamless communication between SDG-Agent switches and Wireless endpoints. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2220 Cisco DNA Service for Bonjour Enabling mDNS Gateway on the Device The Cisco WLC and Access Points by default prevent the forwarding of Layer 2 or Layer 3 Multicast frames between Wireless and Wired network infrastructure. The forwarding is supported with stateful capabilities enabled using AP Multicast. The network administrator must globally enable Multicast and configure a unique Multicast Group to advertise in the network. This multicast group is only required for Cisco Access Points to enable Multicast over Multicast (MCMC) capabilities across the LAN network. The Bonjour solution doesn't require any Multicast requirements on Wireless Client VLAN; thus, it's optional and applicable only for other Layer 3 Multicast applications. The core network must be configured with appropriate Multicast routing to allow the Access Points to join WLC Multicast Group. The Multicast configuration must be enabled on Cisco WLC management VLAN and on the Cisco Access Points of their respective distribution layer switch. Enabling mDNS Gateway on the Device To configure mDNS on the device, follow these steps: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2221 Enabling mDNS Gateway on the Device Cisco DNA Service for Bonjour Procedure Step 1 Command or Action enable Example: Device> enable Step 2 configure terminal Example: Device# configure terminal Step 3 mdns-sd gateway Example: Device(config)# mdns-sd gateway Purpose Enables privileged EXEC mode. Enter your password, if prompted. Enters global configuration mode. Enables mDNS on the device and enters mDNS gateway configuration mode. Enter the following commands in mDNS gateway configuration mode to enable the respective functionalities: · air-print-helper: Enables IOS devices like iPADs to discover and use older printers that support Bonjour · cache-memory-max: Configures the percentage memory for cache · ingress-client: Configures Ingress Client Packet Tuners · rate-limit: Enables rate limiting of incoming mDNS packets · service-announcement-count: Configures maximum service advertisement count · service-announcement-timer: Configures advertisements announce timer periodicity · service-query-count: Configures maximum query count · service-query-timer: Configures query forward timer periodicity The following CLIs are effective only in service-peer mode: · query-response · sdg-agent · service-announcement-count · service-announcement-timer · service-mdns-query Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2222 Cisco DNA Service for Bonjour Creating Custom Service Definition Command or Action Step 4 exit Example: Device(config-mdns-sd)# exit Purpose · service-query-count · service-query-timer · service-receiver-purge · active-response Note For cache-memory-max, ingress-client, rate-limit, service-announcement-count, service-announcement-timer, service-query-count, and service-query-timer commands, you can retain the default value of the respective parameter for general deployments. Configure a different value, if required, for a specific deployment. Exits mDNS gateway configuration mode. Creating Custom Service Definition Service definition is a construct that provides an admin friendly name to one or more mDNS service types or PTR Resource Record Name. By default, a few built-in service definitions are already predefined and available for admin to use. In addition to built-in service definitions, admin can also define custom service definitions. Procedure Step 1 Command or Action enable Example: Device> enable Step 2 configure terminal Example: Device# configure terminal Step 3 mdns-sd service-definition service-definition-name Purpose Enables privileged EXEC mode. Enter your password, if prompted. Enters global configuration mode. Configures mDNS service definition. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2223 Creating Service List Cisco DNA Service for Bonjour Step 4 Step 5 Step 6 Command or Action Example: Device(config)# mdns-sd service-definition CUSTOM1 Purpose Note All the created custom service definitions are added to the primary service list. Primary service list comprises of a list of custom and built-in service definitions. service-type string Configures mDNS service type. Example: Device(config-mdns-ser-def)# service-type _custom1._tcp.local Repeat step 4 to configure more than one service type in the custom service definition. exit Example: Device(config-mdns-ser-def)# exit Exit mDNS service definition configuration mode. Creating Service List mDNS service list is a collection of service definitions. To create a service list, follow these steps: Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 mdns-sd service-list service-list-name {in | out} Example: Device(config)# mdns-sd service-list VLAN100-list in Configures mDNS service list. Step 4 match service-definition-name [message-type Matches the service to the message type. Here, {any | announcement | query}] service-definition-name refers to the names of Example: services, such as, airplay, airserver, airtunes, and so on. Device(config-mdns-sl-in)# match PRINTER-IPPS message-type announcement Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2224 Cisco DNA Service for Bonjour Creating Service Policy Command or Action Step 5 exit Example: Device(config-mdns-sl-in)# exit Purpose Note To add a service, the service name must be part of the primary service list. If the mDNS service list is set to IN, the applicable command syntax is: match service-definition-name [message-type {any | announcement | query}]. If the mDNS service list is set to OUT, the applicable command syntax is: match service-definition-name [message-type {any | announcement | query}] [location-filter location-filter-name] [source-interface {mDNS-VLAN-number | mDNS-VLAN-range}]. Exits mDNS service list configuration mode. Creating Service Policy A Service Policy that is applied to an interface specifies the allowed Bonjour service announcements or the queries of specific service types that should be processed, in ingress direction or egress direction or both. For this, the service policy specifies two service-lists, one each for ingress and egress directions. In the Local Area Bonjour domain, the same service policy can be attached to one or more Bonjour client VLANs; however, different VLANs may have different service policies. To configure service policy with service lists, follow these steps: Procedure Step 1 Command or Action enable Example: Device> enable Step 2 configure terminal Example: Device# configure terminal Purpose Enables privileged EXEC mode. Enter your password, if prompted. Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2225 Associating Service Policy with Wireless Profile Policy Cisco DNA Service for Bonjour Step 3 Step 4 Step 5 Command or Action Purpose mdns-sd service-policy service-policy-name Configures mDNS service policy. Example: Device(config)# mdns-sd service-policy mdns-policy1 service-list service-list-name {in | out} Example: Configures service lists for IN and OUT directions. Device(config-mdns-ser-pol)# service-list VLAN100-list in Device(config-mdns-ser-pol)# service-list VLAN300-list out exit Example: Device(config-mdns-ser-pol)# exit Exits mDNS service policy configuration mode. Associating Service Policy with Wireless Profile Policy A default mDNS service policy is already attached once the wireless profile policy is created. Use the following steps to override the default mDNS service policy with any of your service policy: Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 wireless profile policy profile-policy-name Configures wireless profile policy. Example: Device(config)# wireless profile policy default-policy-profile Step 4 mdns-sd service-policy custom-mdns-service-policy Associates an mDNS service policy with the wireless profile policy. Example: The default mDNS service policy name is Device(config-wireless-policy)# mdns-sd default-mdns-service-policy. service-policy custom-mdns-service-policy Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2226 Cisco DNA Service for Bonjour Configuring Wide Area Bonjour Domain Step 5 Command or Action exit Example: Device(config-wireless-policy)# exit Purpose Exits wireless profile policy configuration mode. Configuring Wide Area Bonjour Domain The Wide Area Bonjour domain configuration specifies the parameters of the controller, that is the Wide Area Bonjour Application running on Cisco DNA Center, as well as the service types that need to be exported to it from the SDG Agent. Configuring Wide Area Bonjour Domain involves creating service-lists and service policy similar to those created in Local Area Bonjour configuration; however, only egress policy from SDG Agent to controller is applicable. Enabling mDNS Gateway on the Device To configure mDNS on the device, follow these steps: Procedure Step 1 Command or Action enable Example: Device> enable Step 2 configure terminal Example: Device# configure terminal Step 3 mdns-sd gateway Example: Device(config)# mdns-sd gateway Purpose Enables privileged EXEC mode. Enter your password, if prompted. Enters global configuration mode. Enables mDNS on the device and enters mDNS gateway configuration mode. Enter the following commands in mDNS gateway configuration mode to enable the respective functionalities: · air-print-helper: Enables IOS devices like iPADs to discover and use older printers that support Bonjour · cache-memory-max: Configures the percentage memory for cache · ingress-client: Configures Ingress Client Packet Tuners · rate-limit: Enables rate limiting of incoming mDNS packets · service-announcement-count: Configures maximum service advertisement count Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2227 Creating Custom Service Definition Cisco DNA Service for Bonjour Command or Action Step 4 exit Example: Device(config-mdns-sd)# exit Purpose · service-announcement-timer: Configures advertisements announce timer periodicity · service-query-count: Configures maximum query count · service-query-timer: Configures query forward timer periodicity The following CLIs are effective only in service-peer mode: · query-response · sdg-agent · service-announcement-count · service-announcement-timer · service-mdns-query · service-query-count · service-query-timer · service-receiver-purge · active-response Note For cache-memory-max, ingress-client, rate-limit, service-announcement-count, service-announcement-timer, service-query-count, and service-query-timer commands, you can retain the default value of the respective parameter for general deployments. Configure a different value, if required, for a specific deployment. Exits mDNS gateway configuration mode. Creating Custom Service Definition Service definition is a construct that provides an admin friendly name to one or more mDNS service types or PTR Resource Record Name. By default, a few built-in service definitions are already predefined and available for admin to use. In addition to built-in service definitions, admin can also define custom service definitions. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2228 Cisco DNA Service for Bonjour Creating Service List Procedure Step 1 Command or Action enable Example: Device> enable Step 2 configure terminal Example: Device# configure terminal Step 3 mdns-sd service-definition service-definition-name Example: Device(config)# mdns-sd service-definition CUSTOM1 Purpose Enables privileged EXEC mode. Enter your password, if prompted. Enters global configuration mode. Configures mDNS service definition. Note All the created custom service definitions are added to the primary service list. Primary service list comprises of a list of custom and built-in service definitions. Step 4 Step 5 Step 6 service-type string Configures mDNS service type. Example: Device(config-mdns-ser-def)# service-type _custom1._tcp.local Repeat step 4 to configure more than one service type in the custom service definition. exit Example: Device(config-mdns-ser-def)# exit Exit mDNS service definition configuration mode. Creating Service List mDNS service list is a collection of service definitions. To create a service list, follow these steps: Procedure Step 1 Command or Action enable Example: Device> enable Step 2 configure terminal Example: Device# configure terminal Purpose Enables privileged EXEC mode. Enter your password, if prompted. Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2229 Creating Service Policy Cisco DNA Service for Bonjour Step 3 Step 4 Step 5 Command or Action mdns-sd service-list service-list-name {in | out} Example: Device(config)# mdns-sd service-list VLAN100-list in Purpose Configures mDNS service list. match service-definition-name [message-type Matches the service to the message type. Here, {any | announcement | query}] service-definition-name refers to the names of Example: Device(config-mdns-sl-in)# match PRINTER-IPPS message-type announcement services, such as, airplay, airserver, airtunes, and so on. Note To add a service, the service name must be part of the primary service list. If the mDNS service list is set to IN, the applicable command syntax is: match service-definition-name [message-type {any | announcement | query}]. If the mDNS service list is set to OUT, the applicable command syntax is: match service-definition-name [message-type {any | announcement | query}] [location-filter location-filter-name] [source-interface {mDNS-VLAN-number | mDNS-VLAN-range}]. exit Example: Device(config-mdns-sl-in)# exit Exits mDNS service list configuration mode. Creating Service Policy A Service Policy that is applied to an interface specifies the allowed Bonjour service announcements or the queries of specific service types that should be processed, in ingress direction or egress direction or both. For this, the service policy specifies two service-lists, one each for ingress and egress directions. In the Local Area Bonjour domain, the same service policy can be attached to one or more Bonjour client VLANs; however, different VLANs may have different service policies. To configure service policy with service lists, follow these steps: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2230 Cisco DNA Service for Bonjour Associating Service Policy with the Controller in Wide Area Bonjour Domain Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 mdns-sd service-policy service-policy-name Configures mDNS service policy. Example: Device(config)# mdns-sd service-policy mdns-policy1 Step 4 service-list service-list-name {in | out} Example: Configures service lists for IN and OUT directions. Device(config-mdns-ser-pol)# service-list VLAN100-list in Device(config-mdns-ser-pol)# service-list VLAN300-list out Step 5 exit Example: Device(config-mdns-ser-pol)# exit Exits mDNS service policy configuration mode. Associating Service Policy with the Controller in Wide Area Bonjour Domain In Wide Area Bonjour, the service policy is configured globally and does not get associated with a VLAN as in the case of Local Area Bonjour. To configure service policy globally, follow these steps: Procedure Step 1 Step 2 Command or Action enable Example: Device> enable configure terminal Example: Device# configure terminal Purpose Enables privileged EXEC mode. Enter your password, if prompted. Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2231 Associating Service Policy with the Controller in Wide Area Bonjour Domain Cisco DNA Service for Bonjour Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action Purpose service-export mdns-sd controller controller Specifies a name for the controller and enters name service-export mode Example: Device(config)# service-export mdns-sd controller DNAC-BONJOUR-CONTROLLER controller-address ipv4-address Example: Device(config-mdns-sd-se)# controller-address 199.245.1.7 Specifies the controller address. controller-port port-number Example: Device(config-mdns-sd-se)# controller-port 9991 Specifies the port number on which the controller is listening. controller-source-interface interface-name Specifies the source-interface for the controller. Example: Device(config-mdns-sd-se)# controller-source-interface Loopback0 controller-service-policy service-policy-name Specifies the service policy to be used by the out controller. Example: Note Device(config-mdns-sd-se)# controller-service-policy policy1 OUT Only OUT policy is applicable for Wide Area Bonjour. exit Example: Device(config-mdns-sd)# exit Exits controller service export configuration mode. mdns-sd gateway Example: Device(config)# mdns-sd gateway Enters mDNS gateway configuration mode. ingress-client query-suppression enable Example: Enables ingress query suppression for better scale and performance. Device(config-mdns-sd)# ingress-client query-suppression enable exit Example: Device(config-mdns-sd)# exit Exits mDNS gateway configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2232 Cisco DNA Service for Bonjour Configuring Hot Standby Router Protocol-aware (HSRP-aware) mDNS Service-Routing on SDG Configuring Hot Standby Router Protocol-aware (HSRP-aware) mDNS Service-Routing on SDG For information, see the following guides: · Software Configuration Guide, Cisco IOS XE Bengaluru 17.6.x (Catalyst 9300 Switches) · Software Configuration Guide, Cisco IOS XE Bengaluru 17.6.x (Catalyst 9400 Switches) · Software Configuration Guide, Cisco IOS XE Bengaluru 17.6.x (Catalyst 9600 Switches) Configuring Hot Standby Router Protocol-aware (HSRP-aware) mDNS Service-Routing on Service-Peer (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 mdns-sd gateway Example: Device(config)# mdns-sd gateway Enables mDNS on the device and enters mDNS gateway configuration mode. Step 3 mode service-peer Enables mDNS gateway in service-peer mode. Example: Device(config-mdns-sd)# mode service-peer Step 4 source-interface vlan vlan-interface-number Configures source interface to communicate Example: between SDG Agent and service-peer. Device(config-mdns-sd)# source-interface Note vlan 23 vlan-interface-number- The valid range is from1 to 4094. Step 5 Step 6 sdg-agent ip-address Example: Device(config-mdns-sd)# sdg-agent 9.6.16.10 end Example: Device(config-mdns-sd)# end Configures SDG agent IPv4 or IPv6 address. Note The ip-address refers to the HSRP-enabled IP address. Exits server group configuration mode and enters privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2233 Verifying Local Area Bonjour in Multicast DNS Mode for LAN and Wireless Networks Cisco DNA Service for Bonjour Verifying Local Area Bonjour in Multicast DNS Mode for LAN and Wireless Networks This section shows how to verify Local Area Bonjour in Multicast DNS mode for LAN and Wireless networks. Verifying SDG-Agent Status The following is a sample output of the show mdns-sd service-list service-list-name {in | out} command. Name Direction Service Message-Type Source ============================================================ VLAN100-list In Printer Announcement - In Airplay Query - In CUSTOM1 Any - VLAN300-list Out Printer Announcement Vl200 The following is a sample output of the show mdns-sd service-definitionservice-definition-name service-type {custom | built-in} command. Service PTR Type ========================================================================= apple-tv _airplay._tcp.local Built-In _raop._tcp.local apple-file-share _afpovertcp._tcp.local Built-In CUSTOM1 _custom1._tcp.local Custom CUSTOM2 _customA._tcp.local Custom _customA._tcp.local The following is a sample output of the show mdns-sd service-policy-name interface interface-name command. Name Service-List-In Service-List-Out ================================================== mdns-policy-1 VLAN100-list VLAN300-list mdns-policy-2 VLAN400-list VLAN400-list The following is a sample output of the show mdns-sd summary command. mDNS Gateway: Enabled Mode: Service Peer Service Announcement Periodicity(in seconds): 30 Service Announcement Count: 50 Service Query Periodicity(in seconds): 15 Service Query Count: 50 Active Response Timer (in seconds): Disabled ANY Query Forward: Disabled SDG Agent IP: 9.8.57.10 Active Query Periodicity (in minutes): 30 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2234 Cisco DNA Service for Bonjour Verifying Wide Area Bonjour Controller Status mDNS Query Type: PTR only Transport Type: IPv4 mDNS AP service policy: default-mdns-service-policy The following is a sample output of the show mdns-sd sp-sdg statistics command. mDNS SP Statistics last reset time: 07/27/21 15:36:33 Messages sent: Query : 122 ANY query : 35 Advertisements : 12 Advertisement Withdraw : 1 Service-peer cache clear : 0 Resync response : 3 Srvc Discovery response : 0 Keep-Alive : 2043 Messages received: Query response : 0 ANY Query response : 0 Cache-sync : 9 Get service-instance : 0 Srvc Discovery request : 0 Keep-Alive Response : 2042 Verifying Wide Area Bonjour Controller Status The following is a sample output of the show mdns controller summary command. Device# show mdns controller summary Controller Summary ===================================== Controller Name : DNAC-BONJOUR-CONTROLLER Controller IP : 10.104.52.241 State : UP Port : 9991 Interface : Loopback0 Filter List : policy1 Dead Time : 00:01:00 The following is a sample output of the show mdns controller export-summary command. Device# show mdns controller export-summary Controller Export Summary ========================= Controller IP : 10.104.52.241 State : UP Filter List : policy1 Count : 100 Delay Timer : 30 seconds Export : 300 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2235 Verifying mDNS Cache Configurations Cisco DNA Service for Bonjour Drop Next Export :0 : 00:00:01 The following is a sample output of the show mdns controller statistics command. Device# show mdns controller statistics Total BCP message sent : 47589 Total BCP message received :3 Interface WITHDRAW messages sent : 0 Clear cache messages sent :0 Total RESYNC state count :0 Last successful RESYNC : Not-Applicable Service Advertisements: IPv6 advertised IPv4 advertised Withdraws sent Advertisements Filtered Total service resynced :0 : 300 :0 :0 :0 Service Queries: IPv6 queries sent :0 IPv6 query responses received : 0 IPv4 queries sent :0 IPv4 query responses received : 0 The following is a sample output of the show mdns controller detail command. Device# show mdns controller detail Controller : DNAC-BONJOUR-CONTROLLER IP : 10.104.52.241, Dest Port : 9991, Src Port : 0, State : UP Source Interface : Loopback0, MD5 Disabled Hello Timer 0 sec, Dead Timer 0 sec, Next Hello 00:00:00 Uptime 00:00:00 Service Announcement : Filter : policy1 Count 100, Delay Timer 30 sec, Pending Announcement 0, Pending Withdraw 0 Total Export Count 300, Next Export in 00:00:16 Service Query : Query Suppression Disabled Query Count 50, Query Delay Timer 15 sec, Pending 0 Total Query Count 0, Next Query in 00:00:01 Verifying mDNS Cache Configurations The following show commands display cache from both Active and Standby devices using the chassis option: Device# show mdns-sd cache chassis active R0 ------------------------------------------------------------- PTR Records ----------------------------------------------------------------- Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2236 Cisco DNA Service for Bonjour Verifying mDNS Cache Configurations RECORD-NAME TTL TYPE ID CLIENT-MAC RR-RECORD-DATA ------------------------------------------------------------------------------------------------------------------------------------------- _home-sharing._tcp.local 4500 WLAN 1 0205.2c23.0001 AP6B8B4567-sta00001._home-sharing._tcp.local ------------------------------------------------------------- SRV Records ----------------------------------------------------------------- RECORD-NAME TTL TYPE ID CLIENT-MAC RR-RECORD-DATA ------------------------------------------------------------------------------------------------------------------------------------------- AP6B8B4567-sta00001._home-sharing._tcp.local 4500 WLAN 1 0205.2c23.0001 0 0 5353 AP6B8B4567-sta00001.local ------------------------------------------------------------ A/AAAA Records --------------------------------------------------------------- RECORD-NAME TTL TYPE ID CLIENT-MAC RR-RECORD-DATA ------------------------------------------------------------------------------------------------------------------------------------------- AP6B8B4567-sta00001.local 4500 WLAN 1 0205.2c23.0001 9.2.57.106 ------------------------------------------------------------- TXT Records ----------------------------------------------------------------- RECORD-NAME TTL TYPE ID CLIENT-MAC RR-RECORD-DATA ------------------------------------------------------------------------------------------------------------------------------------------- AP6B8B4567-sta00001._home-sharing._tcp.local 4500 WLAN 1 0205.2c23.0001 [14]'model=MacMini' Note Alternatively, you can issue the show mdns-sd cache command to display the cache from the Active controller. Device# show mdns-sd cache chassis standby R0 ------------------------------------------------------------- PTR Records ----------------------------------------------------------------- RECORD-NAME TTL TYPE ID CLIENT-MAC RR-RECORD-DATA ------------------------------------------------------------------------------------------------------------------------------------------- _home-sharing._tcp.local 4500 WLAN 1 0205.2c23.0001 AP6B8B4567-sta00001._home-sharing._tcp.local ------------------------------------------------------------- SRV Records ----------------------------------------------------------------- RECORD-NAME TTL TYPE ID CLIENT-MAC RR-RECORD-DATA ------------------------------------------------------------------------------------------------------------------------------------------- AP6B8B4567-sta00001._home-sharing._tcp.local 4500 WLAN 1 0205.2c23.0001 0 0 5353 AP6B8B4567-sta00001.local ------------------------------------------------------------ A/AAAA Records --------------------------------------------------------------- RECORD-NAME TTL TYPE ID CLIENT-MAC RR-RECORD-DATA ------------------------------------------------------------------------------------------------------------------------------------------- AP6B8B4567-sta00001.local 4500 WLAN 1 0205.2c23.0001 9.2.57.106 ------------------------------------------------------------- TXT Records Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2237 Verifying Additional mDNS Cache Configurations Cisco DNA Service for Bonjour ----------------------------------------------------------------- RECORD-NAME TTL TYPE ID CLIENT-MAC RR-RECORD-DATA ------------------------------------------------------------------------------------------------------------------------------------------- AP6B8B4567-sta00001._home-sharing._tcp.local 4500 WLAN 1 0205.2c23.0001 [14]'model=MacMini' Verifying Additional mDNS Cache Configurations To verify the cache from the Active DB, use the following commands: show mdns-sd cache ap-mac 0a0b.0cf0.000e chassis active R0 show mdns-sd cache client-mac 0269.fe06.0023 chassis active R0 show mdns-sd cache detail chassis active R0 show mdns-sd cache glan-id <> chassis active R0 show mdns-sd cache glan-id <> detail chassis active R0 show mdns-sd cache location-group <> chassis active R0 show mdns-sd cache location-group <> detail chassis active R0 show mdns-sd cache mdns-ap <> detail chassis active R0 show mdns-sd cache mdns-ap <> chassis active R0 show mdns-sd cache rlan-id <> detail chassis active R0 show mdns-sd cache rlan-id <> chassis active R0 show mdns-sd cache type TXT chassis active R0 show mdns-sd cache type A-AAAA detail chassis active R0 show mdns-sd cache wired chassis active R0 show mdns-sd cache wired detail chassis active R0 show mdns-sd cache wlan-id 10 chassis active R0 show mdns-sd cache wlan-id 1 detail chassis active R0 To verify the cache from the Standby DB, use the following commands: show mdns-sd cache ap-mac <> chassis standby R0 show mdns-sd cache client-mac <> chassis standby R0 show mdns-sd cache detail chassis standby R0 show mdns-sd cache glan-id <> chassis standby R0 show mdns-sd cache glan-id <> detail chassis standby R0 show mdns-sd cache location-group <> chassis standby R0 show mdns-sd cache location-group <> detail chassis standby R0 show mdns-sd cache mdns-ap <> detail chassis standby R0 show mdns-sd cache mdns-ap <> chassis standby R0 show mdns-sd cache rlan-id <> detail chassis standby R0 show mdns-sd cache rlan-id <> chassis standby R0 show mdns-sd cache type [A-AAAA|PTR|SRV|TXT] chassis standby R0 show mdns-sd cache type [A-AAAA|PTR|SRV|TXT] detail chassis standby R0 show mdns-sd cache wired chassis standby R0 show mdns-sd cache wired detail chassis standby R0 show mdns-sd cache wlan-id <> chassis standby R0 show mdns-sd cache wlan-id <> detail chassis standby R0 Verifying Local Area Bonjour Configuration for LAN and Wireless Networks The following is a sample output of the show run command. mdns-sd gateway mdns-sd service-definition custom1 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2238 Cisco DNA Service for Bonjour Additional References for DNA Service for Bonjour service-type _airplay._tcp.local service-type _raop._tcp.local mdns-sd service-list list1 IN match custom1 mdns-sd service-list list2 OUT match custom1 mdns-sd service-policy policy1 service-list list1 IN service-list list2 OUT service-export mdns-sd controller DNAC-CONTROLLER-POLICY controller-address 99.99.99.10 controller-service-policy policy1 OUT controller-source-interface Loopback0 Additional References for DNA Service for Bonjour Related Topic Document Title Cisco Wide Area Bonjour Application on Cisco DNA Cisco Wide Area Bonjour Application on Cisco DNA Center User Guide Center User Guide, Release 1.3.1.0 MIBs MIB CISCO-SDG-MDNS-MIB MIBs Link This MIB module defines objects describing the statistics of 63 local area and wide area mDNS SDG agent. Statistics could be 64 either global or per interface specific. Feature History for Cisco DNA Service for Bonjour The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2239 Feature History for Cisco DNA Service for Bonjour Release Cisco IOS 15.2(6) E2 Cisco IOS 15.5(1)SY4 Cisco IOS XE 3.11.0 E Cisco IOS XE Gibraltar 16.11.1 Cisco IOS XE Amsterdam 17.1.1 Cisco DNA Service for Bonjour Modification Cisco DNA Service for Local Area Bonjour and Wide Area Bonjour was introduced on the following platforms: · Cisco Catalyst 2960-X Series Switches · Cisco Catalyst 2960-XR Series Switches Cisco DNA Service for Local Area Bonjour and Wide Area Bonjour was introduced on Cisco Catalyst 6800 Series Switches. Cisco DNA Service for Local Area Bonjour and Wide Area Bonjour was introduced on the following platforms: · Cisco Catalyst 4500-E Series Switches · Cisco Catalyst 4500-X Series Switches Cisco DNA Service for Local Area Bonjour and Wide Area Bonjour was introduced on the following platforms: · Cisco Catalyst 3650 Series Switches · Cisco Catalyst 3850 Series Switches · Cisco Catalyst 9300 Series Switches · Cisco Catalyst 9400 Series Switches · Cisco Catalyst 9500 Series Switches · Cisco Catalyst 9500 Series Switches - High Performance · Cisco Catalyst 9600 Series Switches · Cisco Catalyst 9800 Series Wireless Controllers · Cisco 5500 Series Wireless Controllers · Cisco 8540 Wireless Controllers · Cisco 4000 Series Integrated Services Routers (ISR) Cisco DNA Service for Local Area Bonjour and Wide Area Bonjour was introduced on Cisco Catalyst 9200 Series Switches. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2240 Cisco DNA Service for Bonjour Release Cisco IOS XE Amsterdam 17.2.1 Cisco IOS XE Amsterdam 17.3.2a Cisco IOS XE Bengaluru 17.6.1 Feature History for Cisco DNA Service for Bonjour Modification Introduced Cisco DNA Service for Bonjour support for the following: · SD-Access network · Unicast mode for LAN network Introduced Cisco DNA Service for Bonjour support for the following: · Multilayer networks · Location grouping in wired networks · mDNS AP group in wireless networks Introduced support for the following features for Local Area Bonjour in Unicast Mode for LAN networks: · Default mDNS Service Configurations · HSRP-Aware mDNS Service-Routing · mDNS Service-Gateway SSO Support Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2241 Feature History for Cisco DNA Service for Bonjour Cisco DNA Service for Bonjour Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2242 1 9 9 C H A P T E R Configuring Local Area Bonjour for Wireless Local Mode · Overview of Local Area Bonjour for Wireless Local Mode, on page 2243 · Prerequisites for Local Area Bonjour for Wireless Local Mode, on page 2243 · Restrictions for Local Area Bonjour for Wireless Local Mode, on page 2244 · Understanding Local Area Bonjour for Wireless Local Mode, on page 2244 · Configuring Wireless AP Multicast, on page 2245 · Configuring Local Area Bonjour for Wireless Local Mode, on page 2248 · Verifying mDNS Gateway Configuration, on page 2259 · Reference, on page 2261 Overview of Local Area Bonjour for Wireless Local Mode The Cisco Catalyst 9800 series controller introduces unicast mode function in Local Area Bonjour network domain. The enhanced gateway function at the first hop of Wired and Wireless networks communicates directly with any industry standard RFC 6762 compliant Multicast DNS (mDNS) end point in Layer 2 Unicast mode. The controller also introduces new service-peer mode expanding classic single-gateway controller to end-to-end service-routing with upstream SDG agent switch to enable unicast-mode, increased scale, performance and resiliency in the network. Prerequisites for Local Area Bonjour for Wireless Local Mode The Cisco Catalyst 9800 series controller must be successfully configured and be operational before implementing Cisco Local Area Bonjour for local mode wireless networks. The following list provides the prerequisites for the controller that is to be deployed in service-peer mode: · Ensure that the targeted controller for the service-peer role has the required Cisco IOS-XE software version. See Supported SDG Agents with Supported Licenses and Software Requirements table in Cisco DNA Service for Bonjour Solution Overview chapter. · Ensure that the controller runs a valid Cisco DNA-Advantage license. · Ensure that the upstream distribution-layer Cisco Catalyst switch in SDG agent mode runs a valid Cisco DNA-Advantage license. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2243 Restrictions for Local Area Bonjour for Wireless Local Mode Cisco DNA Service for Bonjour · Ensure that the controller is interconnected as Layer 2 trunk in static 802.1Q mode, when Layer 2 Unicast service-routing is running between SDG agent in distribution-layer and the controller service-peer. · Ensure that the controller has IP reachability to upstream Cisco Catalyst 9000 series switches in SDG agent mode over same the IPv4 wireless management subnet. · Ensure that global multicast is enabled on the controller and AP is set to multicast mode. All local mode APs must join the multicast group in the network to successfully process mDNS messages. Restrictions for Local Area Bonjour for Wireless Local Mode · Controller management port is not supported for service-routing with upstream Catalyst SDG Agent switch. · The controller in service peer mode supports location-based service for access points in local mode and FlexConnect central switching mode. · The controller supports location-based capabilities only between wireless connected service provider and the receiver. · The controller does not support service-routing configuration using GUI. Understanding Local Area Bonjour for Wireless Local Mode The traditional wireless controller supported mDNS snooping function with various advancements for wireless networks. As the enterprise requirements expands, it drives the IT organization to introduce new network deployment models, supporting mobile devices and distributed zero-configuration services following increased scale, granular security control and resiliency for mission critical networks. The unified Cisco IOS-XE operating system across Cisco Catalyst 9000 series LAN switches and Cisco Catalyst 9800 series controller enables distributed Bonjour gateway function at the network edge. With end-to-end Wide Area Bonjour service-routing, the new solution enables service-oriented enterprise networks with intuitive user-experience. The following figure illustrates the controller platform supporting mDNS gateway function to wireless users in local mode and builds service-routing peering with upstream Cisco Catalyst 9000 series switch for network-wide services discovery and distribution based on IT-managed granular policies and locations. The unicast based service-routing between the controller in service-peer mode and upstream SDG-Agent switch eliminates mDNS flooding over Layer 2 trunk ports and provide increase bandwidth and eliminates mDNS flood over wireless networks and Layer 2 trunk to upstream network. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2244 Cisco DNA Service for Bonjour Configuring Wireless AP Multicast Figure 71: Cisco Catalyst 9800 Series ControllerLocal Area Bonjour for Wireless Local Mode Configuring Wireless AP Multicast The controller and AP by default prevents forwarding of Layer 2 or Layer 3 Multicast frames between wireless and wired network infrastructure. The forwarding is supported with stateful capabilities enabled using AP multicast. To allow mDNS message processing over a wireless network, multicast must be enabled and unique AP multicast group must be configured on the controller to advertise in IP core network. This AP multicast group is only required for APs to enable Multicast over Multicast (MCMC) capabilities in the network. The Bonjour solution do not require any other multicast requirements on wireless client VLAN; thus, it is optional and applicable only for other Layer 3 multicast applications. The figure given below illustrates end-to-end wireless multicast configuration requirement to ensure wireless APs successfully join the controller-announced multicast group. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2245 Configuring Wireless AP Multicast (GUI) Figure 72: Multicast Routing in IP Core Network Cisco DNA Service for Bonjour Configuring Wireless AP Multicast (GUI) This procedure configures wireless AP multicast on a controller in service-peer mode. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Services > Multicast. Set the Global Wireless Multicast Mode to Enabled. From the AP Capwap Multicast drop-down list, select Multicast. Enter a unique IP address at AP Capwap IPv4 Multicast group Address. Click Apply. Click Save. Configuring Wireless AP Multicast (CLI) This procedure configures wireless AP multicast on a controller in service-peer mode. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wireless multicast Example: Device(config)# wireless multicast Purpose Enters global configuration mode. Enable global IP multicast processing. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2246 Cisco DNA Service for Bonjour Configuring Multicast in IP Network (CLI) Step 3 Step 4 Command or Action wireless multicast IPv4-multicast-address Example: Device(config)# wireless multicast 239.254.254.1 exit Example: Device(config-mdns-sd)# exit Purpose Enables AP CAPWAP mode to Multicast with unique IPv4 multicast address configurations. Exits mDNS gateway configuration mode. Configuring Multicast in IP Network (CLI) This procedure configures IP Multicast under AP VLAN, Management VLAN and IP core interfaces on upstream Catalyst LAN distribution-layer switch. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 ip multicast-routing Example: Device(config)# ip multicast-routing Enables IP multicast processing. Step 3 interface interface-id Example: Device(config)# interface TenGigabitEthernet 1/0 Selects an interface that is connected to hosts and network devices on which PIM can be enabled. Step 4 ip pim sparse-mode Example: Device(config-if)# ip pim sparse-mode Enables IP Multicast on Layer 3 interfaces of distribution and core layer network switches: · AP VLAN Enables IP multicast on SVI interface on VLAN assigned to wireless APs of wireless AP distribution layer switch. · Management VLAN Enables IP multicast on SVI interface on VLAN assigned to controller management VLAN of wireless distribution layer switch. · Layer 3 Interface Enable IP multicast routing on all core network devices and Layer 3 interfaces. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2247 Configuring Local Area Bonjour for Wireless Local Mode Cisco DNA Service for Bonjour Step 5 Step 6 Command or Action exit Example: Device(config-if)# exit ip pim rp-address rp-address Example: Device(config)# ip pim rp-address 239.254.254.100 Purpose Exits interface configuration mode. Configures IP Multicast RP address on core and distribution network switches. IP network may have alternate multicast routing method. Configuring Local Area Bonjour for Wireless Local Mode This section provides configuration guidelines to implement Cisco Catalyst 9800 series controller as mDNS gateway and enable service-peer mode to enable service-routing with upstream distribution-layer Cisco Catalyst 9000 series switch in SDG-Agent mode to build Local Area Bonjour. Configuring mDNS Service Policy (GUI) The mDNS service policy consists of creating a service-list to permit built-in or user-defined custom service-types, associate service-list to a service-policy to enforce in ingress or egress direction and apply the service-policy to targeted Wireless Profile. This configuration is common on the controller in service peer or single-gateway solution for wireless networks. This procedure configures mDNS Service-Policy on a controller in service-peer mode. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Choose Configuration > Services > mDNS. Set the mDNS Gateway button to Enabled. Click Service Policy Tab. Click Service List and click Add. This activates the Service List window. In the Service List Name field, enter a unique name with alphanumeric value. From the Direction drop-down list, select service list policy direction. Use IN for ingress or OUT for egress mDNS message matching policy. Click +Add Services to add mDNS service-types in selected service list. From the Available Services drop-down list, select built-in or custom mDNS service-type. From the Message Type drop-down list, select Announcement to accept service advertisement or Query to permit service discovery from the network. Default message-type is any. Click Save button to add mDNS service-type entry. Note Repeat Step-7 to Step-9 to add more mDNS service-types in selected service list. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2248 Cisco DNA Service for Bonjour Configuring mDNS Service Policy (CLI) Step 11 Step 12 Step 13 Step 14 Step 15 Step 16 Step 17 Step 18 Step 19 Step 20 Step 21 Step 22 Step 23 Click Apply to Device. This creates a new mDNS Service List for selected direction. Note Repeat Step-5 to Step-11 for bi-directional service list. Click Service-Policy tab. Click +Add to create new mDNS service-policy. In the Service Policy Name field, enter a unique mDNS service policy name. From the Service List Input drop-down list, select ingress mDNS service list input to enforce mDNS policies on ingress direction from wireless networks. From the Service List Output drop-down list, select mDNS policies on egress direction to wireless networks. Click Apply to Device. This creates a new mDNS service policy. Choose Configuration > Tags & Profiles > Policy Choose or create a new Policy Profile. Click Advanced tab. From the mDNS Service Policy drop-down list, select an mDNS service policy. Refer to Cisco Catalyst 9800 Series Configuration Guide to configure other policy profile parameters. Click Apply to Device button. This creates a new policy profile or updates an existing policy profile with mDNS service policy. Click Save. Configuring mDNS Service Policy (CLI) This procedure builds and applies service-policies on target wireless profile in service-peer mode. Procedure Step 1 Step 2 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. mdns-sd service-list service-list-name {in| out} Example: Device(config)# mdns-sd service-list VLAN100-LIST-IN in Device(config)# mdns-sd service-list VLAN100-LIST-OUT out Configures mDNS service-list to classify one or more service-types. Unique service-list is required to process incoming mDNS message and outbound response to requesting end points. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2249 Configuring mDNS Service Policy (CLI) Cisco DNA Service for Bonjour Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action Purpose match service-definition-name Matches inbound service-list. The controller [message-type {any| announcement| validates to accept or drop incoming mDNS query}] service-type (for example, Apple TV) Example: advertisement or query matching message type. The service-list contains implicit deny at the Device(config)# mdns-sd service-list end. Default message-type is "any". VLAN100-LIST-IN in Device(config-mdns-sl-in)# match APPLE-TV Device(config-mdns-sl-in)# match PRINTER-IPPS message-type announcement match service-definition-name [message-type {any| announcement| query}] Example: Device(config)# mdns-sd service-list VLAN100-LIST-OUT out Device(config-mdns-sl-in)# match APPLE-TV Device(config-mdns-sl-in)# match PRINTER-IPPS Matches an outbound service-list. The controller provides local service proxy function by responding matching service-type to the requesting end points. For example, the Apple-TV and Printer learnt from VLAN 100 will be distributed to receiver in same VLAN 100. The service-list contains implicit deny at the end. The message-type for outbound service-list is not required. exit Example: Device(config-mdns-sl-in)# exit Returns to global configuration mode. mdns-sd service-policy service-policy-name Creates a unique mDNS service-policy. Example: Device(config)# mdns-sd service-policy VLAN100-POLICY service-list service-list-name {in| out} Example: Device(config-mdns-ser-policy)# service-list VLAN100-LIST-IN in Device(config-mdns-ser-policy)# service-list VLAN100-LIST-OUT out Configure mDNS service-policy to associate service-list for each direction. exit Example: Device(config-mdns-ser-policy)# exit Exits mDNS service policy configuration mode. wireless profile policy policy-name Example: Configures unique wireless profile policy name to associate mDNS service-policy. Device(config)# wireless profile policy WLAN-PROFILE Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2250 Cisco DNA Service for Bonjour Configuring Custom Service Definition (GUI) Step 10 Step 11 Command or Action Purpose mdns-sd service-policy service-policy Associates mDNS service-policy to configured Example: VLAN IDs. Device(config-wireless-policy)# mdns-sd Note service-policy VLAN100-POLICY This step requires wireless profile policy to be administratively shutdown prior association service-policy and re-activate with no shutdown to make service-policy effective. exit Example: Device(config-mdns-sd)# exit Exits mDNS gateway configuration mode. Configuring Custom Service Definition (GUI) The Cisco IOS-XE supports various built-in well-known mDNS service-definition types mapping to key mDNS PTR records to user-friendly names. For example, built-in Apple-TV service-type is associated with _airplay. _tcp.local and _raop. _tcp.local PTR records to successfully enable service in the network. The network administrator can create custom service-definition with matching mDNS PTR records to enable end mDNS service-routing in the network. This procedure configures custom mDNS service definition and applies it to policy. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Choose Configuration > Services > mDNS. Set the mDNS Gateway button to Enabled. Click Service Policy Tab. Click Add to create new custom mDNS service-list definition. This activates Service Definition window. In the Service Definition Name filed, enter a unique aplhanumeric value. (Optional) In the Description field, enter a description for the service definition. In the Service Type field, enter single mDNS PoinTeR (PTR) record entry in _<service-type>. _<protocol>.local regular expression format. For example, _airplay. _tcp.local Click + to add custom mDNS service-type in selected definition list. Note Repeat Steps 7 and Step 8 to add more custom service-type in selected definition list. Click Apply. Perform steps give in Configuring mDNS Service Policy (GUI) by selecting built-in or custom service-type to configure service list. Click Save. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2251 Configuring Custom Service Definition (CLI) Cisco DNA Service for Bonjour Configuring Custom Service Definition (CLI) This procedure creates custom service-definition configuration to discover mDNS services from local wireless networks. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 mdns-sd service-definition-name service-definition-name Example: Device(config)# mdns-sd service-definition APPLE-CLASSROOM Creates unique service-definition name for custom service-types. Step 3 service-type custom-mDNS-PTR Example: Configure an regular-expression string for custom mDNS PoinTeR(PTR) record. Device(config-mdns-ser-def)# service-type _classroom._tcp.local Step 4 exit Example: Device(config-mdns-ser-def)# exit Returns to global configuration mode. Configuring mDNS Gateway on WLAN (GUI) The mDNS gateway activation on targeted WLAN is required to start processing incoming mDNS messages from associated wireless clients. To activate mDNS gateway the WLAN must be administratively shutdown and re-enable thus it may require network downtime planning. This procedure configures custom mDNS gateway and required policies. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Tags & Profiles > WLANs. Click to enable the mDNS Gateway on existing WLAN row of Catalyst 9800 controller. Click + Add button to create new WLAN if required. Refer to Catalyst 9800 Series Wireless Controller Configuration Guide for step-by-step WLAN configuration. Click Advanced tab. From the mDNS Mode drop-down list, select Gateway to activate mDNS Gateway on the selected WLAN. Click Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2252 Cisco DNA Service for Bonjour Configuring mDNS Gateway on WLAN (CLI) Step 6 Click Save. Configuring mDNS Gateway on WLAN (CLI) This procedure implements mDNS gateway on a targeted WLAN of the controller in service-peer mode. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wlan profile-name WLAN-ID SSID-name Example: Device(config)# wlan WLAN-PROFILE 1 blizzard Creates a unique WLAN. Step 3 mdns-sd-interface gateway Configure mDNS gateway on targeted WLAN. Example: Note Device(config-wlan)# mdns-sd-interface gateway This step requires wireless profile policy to be administratively shutdown prior association service-policy and re-activate with no shutdown to make service-policy effective. Step 4 exit Example: Device(config-wlan)# exit Returns to global configuration mode. Configuring Service-Routing on Service-Peer The controller deployed in Service-Peer mode extends mDNS service discovery and distribution boundary beyond single controller to global IP network using on unicast based service-routing. The controller service peer must establish IP based unicast service-routing with Cisco Catalyst 9000 series switch in distribution layer network for global service-routing. This procedure configures the controller in service peer mode. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2253 Configuring Service-Routing on Service-Peer Cisco DNA Service for Bonjour Step 2 Command or Action mdns-sd gateway Example: Device(config)# mdns-sd gateway Purpose Enables mDNS and enters in mDNS gateway configuration mode. The following optional parameters are available: · active-query: Periodic mDNS query to refresh dynamic cache. · active-response: Periodic active mDNS response instead per request processing. · mode: Set Catalyst 9800 in service-peer mode. · sdg-agent: Unicast service-routing with targeted SDG-Agent. · service-announcement-count: Configures maximum advertisements in service-routing to SDG-Agent. · service-announcement-timer: Configures advertisements announce timer periodicity in service-routing to SDG-Agent. · service-query-count: Configures maximum queries in service-routing to SDG-Agent. · service-query-timer: Configures query forward timer periodicity in service-routing to SDG-Agent. · service-type-enumeration: Configures service enumeration. · source-interface: Configures the source interface. If the source interface is configured, it will be used for all mDNS transactions. By default, wireless management interface will be used. · transport: Use IPv4 (default) or IPv6 transport for mDNS messaging to end points. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2254 Cisco DNA Service for Bonjour Configuring Location-Based mDNS on Service-Peer (GUI) Step 3 Step 4 Step 5 Command or Action Purpose Note For rate-limit, service-announcement-count, service-announcement-timer, service-query-count and service-query-timer commands, you can retain the default value of the respective parameter for general deployments. Configure a different value, if required, for a specific deployment. mode [service-peer] Example: Configure mDNS gateway in service-peer mode. Device(config-mdns-sd)# mode service-peer sdg-agent [IPv4 Address] Example: Device(config-mdns-sd)# sdg-agent 10.0.2.254 Configure SDG Agent IPv4 address. Typically, the management VLAN gateway address. If FHRP mode, then use FHRP Virtual-IP address of management VLAN. exit Example: Device(config-mdns-sd)# exit Returns to global configuration mode. Configuring Location-Based mDNS on Service-Peer (GUI) Cisco Catalyst 9800 series controller supports location-based mDNS service discovery and distribution between wireless service provider and receiver endpoints. The location-based mDNS service support can be implemented using multiple supporting AP classification methods to implement policy-based service distributions in wireless networks. The location-based mDNS service is effective and supported on wireless APs in Local-Mode or FlexConnect Central Switching modes. The figure given below illustrates various LSS based mDNS service mode discovery and distribution support: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2255 Configuring Location-Based mDNS on Service-Peer (GUI) Figure 73: Location-Based mDNS Gateway Cisco DNA Service for Bonjour Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 This procedure configures location-based mDNS service policy. Procedure Choose Configuration > Services > mDNS. Set the mDNS Gateway button to Enabled. Click Service Policy Tab. Click Service List and click Add. This acivates the Service List window. In the Service List Name field, enter a unique name with alphanumeric value. From the Direction drop-down list, select service list policy direction. Use IN for ingress or OUT for egress mDNS message matching policy. Click +Add Services to add mDNS service-types in selected service list. From the Available Services drop-down list, select built-in or custom mDNS service-type. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2256 Cisco DNA Service for Bonjour Configuring Location-Based mDNS on Service-Peer (CLI) Step 9 Step 10 Step 11 Step 12 Step 13 Step 14 Step 15 Step 16 Step 17 Step 18 Step 19 Step 20 Step 21 Step 22 Step 23 From the Message Type drop-down list, select Announcement to accept service advertisement or Query to permit service discovery from the network. Default message-type is any. Click Save button to add mDNS service-type entry. Note Repeat Step-7 to Step-9 to add more mDNS service-types in selected service list. Click Apply to Device. This creates a new mDNS Service List for selected direction. Note Repeat Step-5 to Step-11 for bi-directional service list. Click Service-Policy tab. Click +Add to create new mDNS service-policy. In the Service Policy Name field, enter a unique mDNS service policy name. From the Service List Input drop-down list, select ingress mDNS service list input to enforce mDNS policies on ingress direction from wireless networks. From the Service List Output drop-down list, select mDNS policies on egress direction to wireless networks. Click Apply to Device. This creates a new mDNS service policy. Choose Configuration > Tags & Profiles > Policy Choose or create a new Policy Profile. Click Advanced tab. From the mDNS Service Policy drop-down list, select an mDNS service policy. Refer to Cisco Catalyst 9800 Series Configuration Guide to configure other policy profile parameters. Click Apply to Device button. This creates a new policy profile or updates an existing policy profile with mDNS service policy. Click Save. Configuring Location-Based mDNS on Service-Peer (CLI) This procedure implements LSS based mDNS service discovery and distribution between wireless endpoints on the targeted WLAN of the controller in service-peer mode. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2257 Configuring Location-Based mDNS on Service-Peer (CLI) Cisco DNA Service for Bonjour Step 2 Step 3 Command or Action Purpose mdns-sd service-policy service-policy-name Creates a unique mDNS service-policy. Example: Device(config)# mdns-sd service-policy VLAN100-POLICY location {ap-location |ap-name |lss |regex Creates a unique mDNS service-policy. |site-tag |ssid} · ap-location: Enables mDNS service Example: discovery and distribution between Device(config-mdns-ser-policy)# location ap-location wireless service provider and receiver connected to one or more AP configured in the same location name. The mDNS services from non-matching AP location is automatically filtered. · ap-name: Enables mDNS service discovery and distribution between wireless service provider and receiver connected to single AP matching same AP name. The mDNS services from non-matching AP name is automatically filtered. · lss: Enables mDNS service discovery and distribution between wireless service provider and receiver connected to same and neighboring one or more AP based on RRM. The mDNS services from non-matching AP neighbor-list is automatically filtered. · regex: Enables mDNS service discovery and distribution between wireless service provider and receiver connected to one or more AP configured within matching AP name or AP Location name using regular-expression string. The mDNS services from non-matching AP names is automatically filtered. · site-tag: Enables mDNS service discovery and distribution between wireless service provider and receiver connected to one or more AP configured same site tag name. The mDNS services from non-matching site tag is automatically filtered. · ssid: Enables mDNS service discovery and distribution between wireless service provider and receiver connected to one or more AP configured same SSID name. The Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2258 Cisco DNA Service for Bonjour Verifying mDNS Gateway Configuration Step 4 Command or Action Purpose mDNS services from non-matching SSID is automatically filtered. exit Example: Device(config-mdns-ser-policy)# exit Exits mDNS service policy configuration mode. Verifying mDNS Gateway Configuration This section provides guidelines to verify various Local Area Bonjour domain mDNS service configuration parameters, cache records, statistics and more on the controller in service peer mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2259 Verifying mDNS Gateway Configuration Cisco DNA Service for Bonjour Table 150: Command or Action Purpose show mdns-sd cache {ap-mac |client-mac |detail Displays available mDNS cache records supporting |glan-ID |mdns-ap |rlan-id|statistics |type |udn multiple following variables providing granular source |wired |wlan-id} details: · ap-mac: Displays one or more mDNS service instance cache records discovered from provided AP MAC address. · client-mac: Displays one or more mDNS service instance(s) cache records discovered from service provider wireless client MAC address. · detail: Displays mDNS record detail information combined with client and network attributes and other service parameters. · glan-ID: Displays one or more mDNS service instance(s) cache records discovered from provided Wired Guest LAN ID MAC address. · mdns-ap: Displays one or more mDNS service instance(s) cache records discovered from provided Wireless mDNS AP MAC address. · rlan-id: Displays one or more mDNS service instances(s) cache records discovered from provided Wired Remote LAN ID. Range 1-128. · statistics: Displays detail global bi-directional mDNS statistics for IPv4 and IPv6 transports with packet processing count for each mDNS record-type. · type: Displays one or more service-instance(s) cache records matching mDNS record-type, i.e., A-AAAA, PTR, SRV and TXT. · udn: Displays one or more mDNS service instance(s) cache records discovered from segmented Wireless service provider in User-Defined-Group (UDN) or shared-services. · wired: Displays one or more mDNS service instance(s) cache records discovered from upstream Layer 2 wired network. · wlan-id: Displays one or more mDNS service instance(s) cache records discovered from matching provided wlan-ID. Range 1-4096. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2260 Cisco DNA Service for Bonjour Reference Command or Action show mdns-sd statistics {debug |flexconnect |glan-id |rlan-id |wired |wlan-id} show mdns-sd summary Purpose Displays detailed mdns statistics processed bi-directionally by system on each mDNS gateway enabled VLAN configured mDNS in Unicast mode. The expanded keyword of mDNS statistics can provide detail view on interface, policy, service-list and services. Displays brief information about mDNS gateway and key configuration status on all VLANs and interfaces of the system. Verifying Catalyst WLC Service-Peer Configuration This section provides guidelines to verify service peer service configuration and statistics. Table 151: Command or Action show mdns-sd sp-sdg statistics show mdns-sd summary Purpose Displays mDNS service-routing statistics between Catalyst 9800 service-peer and upstream SDG Agent switch for global service discovery and distribution. Displays brief information about mDNS gateway and key configuration status and parameters of the system. Reference Table 152: Related Topic Document Title DNA Service for Bonjour Deployment on Cisco Catalyst 9600 Switch Cisco Catalyst 9600 Series Switch Software Configuration Guide, Release 17.5.X DNA Service for Bonjour Deployment on Cisco Catalyst 9500 Switch Cisco Catalyst 9500 Series Switch Software Configuration Guide, Release 17.5.X DNA Service for Bonjour Deployment on Cisco Catalyst 9400 Switch Cisco Catalyst 9400 Series Switch Software Configuration Guide, Release 17.5.X DNA Service for Bonjour Deployment on Cisco Catalyst 9300 Switch Cisco Catalyst 9300 Series Switch Software Configuration Guide, Release 17.5.X Cisco Wide Area Bonjour Application on Cisco DNA Cisco Wide Area Bonjour Application on Cisco DNA Center User Guide Center User Guide, Release 2.2.2 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2261 Reference Cisco DNA Service for Bonjour Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2262 2 0 0 C H A P T E R Configuring Local Area Bonjour for Wireless FlexConnect Mode · Overview of Local Area Bonjour for Wireless FlexConnect Mode, on page 2263 · Restrictions for Local Area Bonjour for Wireless FlexConnect Mode, on page 2263 · Prerequisites for Local Area Bonjour for Wireless FlexConnect Mode, on page 2264 · Understanding mDNS Gateway Alternatives for Wireless FlexConnect Mode, on page 2264 · Understanding Local Area Bonjour for Wireless FlexConnect Mode, on page 2266 · Configuring Local Area Bonjour for Wireless FlexConnect Mode, on page 2268 · Verifying Local Area Bonjour in Service-Peer Mode, on page 2281 · Verifying Local Area Bonjour in SDG Agent Mode, on page 2283 · Reference, on page 2285 Overview of Local Area Bonjour for Wireless FlexConnect Mode The Cisco Catalyst 9800 series controller introduces unicast mode function in Local Area Bonjour network domain. The enhanced gateway function at the first hop of Wired and Wireless networks communicates directly with any industry standard RFC 6762 compliant Multicast DNS (mDNS) end point in Layer 2 Unicast mode. The controller also introduces new service-peer mode expanding single-gateway to end-to-end service-routing with upstream SDG-Agent switch to enable unicast-mode, increased scale, performance and resiliency in the network. Restrictions for Local Area Bonjour for Wireless FlexConnect Mode · In FlexConnect mode network deployments, the mDNS gateway and service-peer mode on the controller must not be configured and must be in disabled state. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2263 Prerequisites for Local Area Bonjour for Wireless FlexConnect Mode Cisco DNA Service for Bonjour Prerequisites for Local Area Bonjour for Wireless FlexConnect Mode The Cisco Catalyst 9800 series controller must be successfully configured and operational before implementing Cisco Local Area Bonjour for FlexConnect mode wireless networks. The following list provides the prerequisites for the controller that is to be deployed to enable successful mDNS gateway solution for Wireless FlexConnect: · Ensure that the targeted Layer 2 Catalyst 9000 Series Ethernet switch is configured in service-peer role and running the required Cisco IOS-XE software version. · Ensure that the Catalyst 9000 Series Ethernet switch runs a valid Cisco DNA-Advantage license. · Ensure that the upstream distribution-layer Cisco Catalyst switch for Wired and FlexConnect Local Switching Wireless networks is configured in SDG-Agent mode and runs a valid Cisco DNA-Advantage license. Understanding mDNS Gateway Alternatives for Wireless FlexConnect Mode The controller continues to innovate mDNS gateway function to address evolving business and technical requirements in the Enterprise networks. The FlexConnect Local Switching based wireless networks implement mDNS gateway using the following two methods depicted in the figure: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2264 Cisco DNA Service for Bonjour Understanding mDNS Gateway Alternatives for Wireless FlexConnect Mode Figure 74: mDNS Gateway Alternatives for FlexConnect Mode Based on the operating network environment, the mDNS gateway for FlexConnect mode wireless network can be implemented in one of the following modes to address service discovery and distribution: · Switch Based mDNS Gateway--In Layer 2 access, the Cisco Catalyst 9000 series Ethernet switch must be implemented as mDNS gateway in Service-Peer role. The following are the key benefits: · Replaces flood-n-learn with the new enhanced Unicast-based mDNS communication with FlexConnect mode wireless users. · Eliminates mDNS flood with Unicast service-routing to LAN distribution. The Unicast service-routing between LAN distribution and Layer 2 access layer switches forms Local Area Bonjour domain to enable policy and location-based service discovery and distribution. The Unicast based service-routing over Layer 2 trunk eliminates mDNS flood-free and enables service-oriented wireless networks. · Eliminates the requirement to forward wired network traffic to wireless Access Points improving wireless scale, performance, and network reliability. · AP Based mDNS Gateway--The Cisco FlexConnect mode wireless access points can alternatively be implemented as mDNS gateway when connected to unsupported LAN access switch. In this method, the mDNS service discovery and distribution follows flood-n-learn mechanism over the Layer 2 wireless network. To implement AP based mDNS gateway, see the Multicast Domain Name System chapter. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2265 Understanding Local Area Bonjour for Wireless FlexConnect Mode Cisco DNA Service for Bonjour Understanding Local Area Bonjour for Wireless FlexConnect Mode The controller supports mDNS gateway function with various advancements for broad range of wireless networks. As the enterprise requirements expands it drives IT organization to introduce new network deployment models, supporting mobile devices and distributed zero-configuration services following increased scale, granular security control and resiliency for mission critical networks. The common unified Cisco IOS-XE operating system across Cisco Catalyst 9000 series LAN switches and Cisco Catalyst 9800 series controller enables distributed Bonjour gateway function at network edge. With end-to-end Wide Area Bonjour service-routing, the new solution enables service-oriented enterprise networks with intuitive user-experience. The following figure illustrates how the controller connected to wireless access points support mDNS gateway function to wireless users in FlexConnect Local Switching mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2266 Cisco DNA Service for Bonjour Understanding Local Area Bonjour for Wireless FlexConnect Mode Figure 75: Cisco Catalyst 9800 Series Controller Local Area Bonjour for Wireless - FlexConnect Mode The Cisco Catalyst 9000 series switches in the Layer 2 access layer and Layer 3 distribution layer must be configured in the following mDNS gateway mode to enable Unicast-based mDNS service-routing between wired and FlexConnect Local Switching mode wireless users within the same Layer 2 network block: · Service-Peer - The Layer 2 access switch connecting wireless access point in FlexConnect Local Switching mode must be configured with mDNS gateway in Service-Peer mode. Each Layer 2 access switch provides mDNS gateway function between locally attached wired and FlexConnect mode wireless users. The Unicast-based mDNS service discovery and distribution within same or different VLANs is supported with bi-directional mDNS policies on single Layer 2 access switch. · SDG Agent - The mDNS flood-n-learn based method in Layer 2 network is replaced with simple Unicast based service-routing between Layer 2 access switch in Service-Peer mode and upstream distribution-layer Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2267 Configuring Local Area Bonjour for Wireless FlexConnect Mode Cisco DNA Service for Bonjour in mDNS gateway SDG Agent mode. The Unicast based mDNS service-routing eliminates mDNS flood over Layer 2 trunk ports providing increased bandwidth, enhanced security, location-based services, and flood control management in wired and FlexConnect wireless network. Configuring Local Area Bonjour for Wireless FlexConnect Mode This section provides configuration guidelines to implement Cisco Catalyst 9000 series Ethernet switch as mDNS gateway and enable service-peer and SDG Agent mode to enable service-routing with upstream distribution-layer Cisco Catalyst 9000 series switch in SDG Agent mode to build Local Area Bonjour. Configuring mDNS Gateway Mode (CLI) To enable mDNS gateway and Service-Peer mode on Layer 2 access switch and SDG Agent mode on Layer 3 distribution layer switch, perform the following: Procedure Step 1 Command or Action enable Example: Device# enable Step 2 configure terminal Example: Device# configure terminal Step 3 mdns-sd gateway Example: Device(config)# mdns-sd gateway Purpose Enables privileged EXEC mode. Enter your password, if prompted. Enters global configuration mode. Enables mDNS on the Layer 2 Catalyst switch and enters the mDNS gateway configuration mode. (Optional) You can configure the following additional parameters: · air-print-helper: Enables communication between Apple iOS devices like iPhone or iPad to discover and use older printers that does not support driverless AirPrint function. · cache-memory-max: Configures the percentage memory for cache. · ingress-client: Configures Ingress client packet tuners. · rate-limit: Enables rate limiting of incoming mDNS packets. · service-announcement-count: Configures maximum advertisements. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2268 Cisco DNA Service for Bonjour Configuring mDNS Service Policy (CLI) Step 4 Step 5 Command or Action Purpose · service-announcement-timer: Configures advertisements announcement timer periodicity. · service-query-count: Configures maximum queries. · service-query-timer: Configures query forward timer periodicity. · service-type-enumeration: Configures service enumeration. Note For cache-memory-max, ingress-client, rate-limit, service-announcement-count, service-announcement-timer, service-query-count, service-query-timer, and service-type-enumeration commands, you can retain the default value of the respective parameter for general deployments. Configure a different value, if required, for a specific deployment. mode {service-peer | sdg-agent} Configure mDNS gateway in one of the Example: following modes based on the system settings: Device(config-mdns-sd)# mode service-peer Device(config-mdns-sd)# mode sdg-agent · service-peer Enables Layer 2 Catalyst access switch in mDNS Service-Peer mode. · sdg-agent Default. Enables Layer 3 distribution layer Catalyst switch in SDG Agent mode to peer with central Cisco DNA Center controller for Wide Area Bonjour service routing. exit Example: Device(config-mdns-sd)# exit Exits mDNS gateway configuration mode. Configuring mDNS Service Policy (CLI) You need to perform the following to configure an mDNS service policy: 1. Create service-list to permit built-in or user-defined custom service types. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2269 Configuring mDNS Service Policy (CLI) Cisco DNA Service for Bonjour 2. Associate service-list to a service-policy to enforce ingress or egress direction. 3. Apply the service policy to the new VLAN configuration mode. Note You will need this configuration in Service-Peer mode for Layer 2 Catalyst switch and SDG agent mode for Layer 3 Catalyst switch. The following figure shows how to configure mDNS policies on Catalyst switch in Service-Peer and SDG agent modes. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2270 Cisco DNA Service for Bonjour Configuring mDNS Service Policy (CLI) Figure 76: mDNS Service Policy Configuration on Catalyst Switch in Service-Peer and SDG Agent Modes This procedure builds and applies service-policies on target VLAN in service-peer and SDG agent modes. Procedure Step 1 Command or Action enable Example: Device# enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2271 Configuring mDNS Service Policy (CLI) Cisco DNA Service for Bonjour Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. mdns-sd service-list service-list-name {in | out} Example: Device(config)# mdns-sd service-list VLAN100-LIST-IN in Device(config)# mdns-sd service-list VLAN100-LIST-OUT out Configure mDNS service-list to classify one or more service types. Unique service-list is required to process incoming mDNS message and outbound response to request locally connected wired or FlexConnect wireless end points. match service-definition-name [message-type Matches inbound service-list. {any | announcement | query}] The Catalyst switch validates to accept or drop Example: incoming mDNS service-type (such as, Apple Device(config)# mdns-sd service-list TV) advertisement or query matching message VLAN100-LIST-IN in type from locally connected wired or Device(config-mdns-sl-in)# match APPLE-TV FlexConnect wireless end points. The service-list contains implicit deny at the end. Device(config-mdns-sl-in)# match The default message-type used is any. PRINTER-IPPS message-type announcement match service-definition-name [message-type Matches outbound service-list. {any | announcement | query}] The Catalyst switch provides local service Example: proxy function by responding matching Device(config)# mdns-sd service-list service-type to the requesting end point(s). For VLAN100-LIST-OUT out example, the Apple-TV and Printer learnt from Device(config-mdns-sl-in)# match APPLE-TV Device(config-mdns-sl-in)# match VLAN 100 will be distributed to FlexConnect wireless receiver in same VLAN 100. The service-list contains implicit deny at the end. PRINTER-IPPS The message-type for outbound service-list is not required. mdns-sd service-policy service-policy-name Creates unique mDNS service-policy in global Example: configuration mode. Device(config)# mdns-sd service-policy VLAN100-POLICY service-list service-list-name {in | out} Example: Configures mDNS service-policy to associate service-list for each direction. Device(config)# mdns-sd service-policy VLAN100-POLICY Device(config-mdns-ser-policy)# service-list VLAN100-LIST-IN in Device(config-mdns-ser-policy)# service-list VLAN100-LIST-OUT out Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2272 Cisco DNA Service for Bonjour Configuring mDNS Location-Filter (CLI) Step 8 Step 9 Step 10 Step 11 Command or Action Purpose vlan configuration ID Enables wired or wireless FlexConnect user Example: VLAN configuration for advanced service parameters. One or more VLANs can be Device(config)# vlan configuration 100 created for the same settings. Here, ID refers to the VLAN configuration ID. The range is from 101 to 110 and 200. This range allows to configure consecutive and non-consecutive VLAN ID(s). mdns-sd gateway Example: Device(config-vlan)# mdns-sd gateway Enables mDNS gateway on configured wired or FlexConnect wireless user VLAN ID(s). service-policy service-policy-name Associates mDNS service-policy to the Example: configured wired or FlexConnect wireless user VLAN ID(s). Device(config-vlan-mdns)# service-policy VLAN100-POLICY exit Example: Device(config-vlan-mdns)# exit Exits mDNS gateway configuration mode. Configuring mDNS Location-Filter (CLI) Optionally, you can configure mDNS location-filter to allow service discovery and distribution between locally configured VLAN IDs associated to FlexConnect wireless user networks. The following figure illustrates and references location-filter policy on Catalyst switch in Service-Peer mode permitting to discover and distribute mDNS services between wired and FlexConnect wireless user VLANs. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2273 Configuring mDNS Location-Filter (CLI) Figure 77: Catalyst Service-Peer mDNS Location-Filter Configuration Cisco DNA Service for Bonjour To enable local service proxy on Cisco Catalyst switch in Service-Peer mode and discover mDNS services between local wired and wireless FlexConnect user VLANs, perform the following: Procedure Step 1 Step 2 Step 3 Step 4 Command or Action enable Example: Device# enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. configure terminal Example: Device# configure terminal Enters global configuration mode. mdns-sd location-filter location-filter-name Configures a unique location-filter in global Example: configuration mode. Device(config)# mdns-sd location-filter LOCAL-PROXY match location-group {all | default | ID} vlan Configures the match criteria to mutually [ID] distribute the permitted services between Example: grouped VLANs. For example, mDNS services can be discovered and distributed using the Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2274 Cisco DNA Service for Bonjour Configuring mDNS Location-Filter (CLI) Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Command or Action Device(config-mdns-loc-filter)# match location-group default vlan 100 Device(config-mdns-loc-filter)# match location-group default vlan 101 Purpose Unicast mode between wireless FlexConnect user VLAN ID 100 and wired user VLAN ID 101. mdns-sd service-list service-list-name {in | out} Example: Device(config)# mdns-sd service-list VLAN100-LIST-OUT out Configures the mDNS service-list to classify one or more service types. The service-list configuration is required to process any incoming or outgoing mDNS messages. match service-definition-name [message-type Associates location-filter to one or more {any | announcement | query}] service types to enable local proxy between Example: local VLANs. For example, the Apple-TV learnt from VLAN 100 and VLAN 101 will Device(config)# mdns-sd service-list be distributed to receiver in VLAN 100. VLAN100-LIST-OUT out Device(config-mdns-sl-out)# match APPLE-TV location-filter LOCAL-PROXY Note You do not require a message-type for the outbound service-list. mdns-sd service-policy service-policy-name Creates unique mDNS service-policy in global Example: configuration mode. Device(config)# mdns-sd service-policy VLAN100-POLICY service-list service-list-name {in | out} Example: Configures mDNS service-policy to associate service-list for each direction. Device(config)# mdns-sd service-policy VLAN100-POLICY Device(config-mdns-ser-policy)# service-list VLAN100-LIST-OUT out vlan configuration ID Enables VLAN configuration for advanced Example: service parameters. You can create one or more VLANs with the same settings. Device(config)# vlan configuration 100 Here, ID refers to the VLAN configuration ID. The range is from 101 to 110 and 200. This range allows to configure consecutive and non-consecutive VLAN ID(s). mdns-sd gateway Example: Device(config-vlan-config)# mdns-sd gateway Enables mDNS gateway on configured VLAN ID(s). service-policy service-policy-name Example: Associates mDNS service-policy to the configured VLAN ID(s). Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2275 Configuring Custom Service Definition (CLI) Cisco DNA Service for Bonjour Step 12 Command or Action Device(config-vlan-mdns-sd)# service-policy VLAN100-POLICY exit Example: Device(config-vlan-mdns-sd)# exit Purpose Exits mDNS gateway configuration mode. Configuring Custom Service Definition (CLI) The Cisco IOS-XE supports mapping of various built-in well-known mDNS service-definition types to key mDNS PTR records and user-friendly names. For example, built-in Apple-TV service-type is associated with _airplay. _tcp.local and _raop. _tcp.local PTR records to successfully enable service in the network. Network administrators create custom service-definition with matching mDNS PTR records to enable end mDNS service-routing in the network. The custom service-definition can be associated to the service-list as described in the following steps: Procedure Step 1 Command or Action enable Example: Device# enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 mdns-sd service-definition service-definition-name Example: Device(config)# mdns-sd service-definition APPLE-CLASSROOM Creates a unique service-definition name for custom service-types. Step 4 service-type custom-mDNS-PTR Example: Configures a regular-expression string for custom mDNS PoinTeR(PTR) record. Device(config-mdns-ser-def)# service-type _classroom. _tcp.local Step 5 exit Example: Device(config-mdns-ser-def)# exit Exits mDNS gateway configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2276 Cisco DNA Service for Bonjour Configuring Service-Routing on Service-Peer (CLI) Configuring Service-Routing on Service-Peer (CLI) The Layer 2 Cisco Catalyst switch in Service-Peer mode builds a service-routing with an upstream distribution-layer switch in the SDG Agent mode. To build service-routing, the Layer 2 Cisco Catalyst switch requires at least one interface with valid IP address to reach the upstream SDG Agent Catalyst switch. The switch management port is unsupported. The following figure illustrates the topology to enable unicast-based service-routing over Layer 2 trunk between access-layer Catalyst switch in the Service-Peer mode and distribution-layer Catalyst switch in SDG Agent mode. Figure 78: Catalyst Service-Peer Service-Routing Configuration To enable service-routing on Cisco Catalyst switch in Service-Peer mode and setup mDNS trust interface settings, follow the procedure given below: Procedure Step 1 Command or Action enable Example: Device# enable Step 2 configure terminal Example: Purpose Enables Privileged EXEC mode. Enter your password, if prompted. Enters the global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2277 Configuring Service-Routing on Service-Peer (CLI) Cisco DNA Service for Bonjour Step 3 Step 4 Step 5 Step 6 Step 7 Command or Action Device# configure terminal Purpose vlan configuration ID Example: Device(config)# vlan configuration 100 Enables Wired and FlexConnect user VLAN configuration for advanced service parameters. One or more VLANs can be created for the same settings. Here, ID refers to the VLAN configuration ID. For example, vlan configuration 101-110, 200 range, allows to configure consecutive and non-consecutive VLAN ID(s). mdns-sd gateway Example: Device(config-vlan-config)# mdns-sd gateway Enables mDNS gateway on configured VLAN ID(s). To enable the respective functionalities, enter the following commands in the mDNS gateway configuration mode: · active-query timer [sec]: Configure to enable refresh discovered services and their records with periodic mDNS Query message for permitted service types. The valid range is from 60 to 3600 seconds. The recommended value is 3600 seconds. · service-mdns-query {ptr | srv | txt}: Permits processing specific Query type. The default query type is PTR. · transport {ipv4 | ipv6 | both}: Permits processing for IPv4, IPv6, or both. It is recommended to use one network type to reduce redundant processing and respond with the same information over two network types. The default network type is IPv4. source-interface ID Example: Device(config-vlan-mdns-sd)# source-interface vlan 4094 Selects the interface with a valid IP address to source service-routing session with the upstream Cisco Catalyst SDG Agent switch. Typically, the management VLAN interface can be used. sdg-agent [IPv4_address] Example: Device(config-vlan-mdns-sd)# sdg-agent 10.0.0.254 Configures the SDG Agent IPv4 address, typically, the management VLAN gateway address. If FHRP mode, then use the FHRP virtual IP address of the management VLAN. exit Example: Device(config-vlan-mdns-sd)# exit Exits the mDNS gateway configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2278 Cisco DNA Service for Bonjour Configuring Location-Based mDNS Configuring Location-Based mDNS By default, the Layer 2 Catalyst switch in the Service-Peer mode enables per-switch mDNS discovery and distribution in FlexConnect wireless users attached locally to the switch. This default per-switch location-based mDNS is supported even when the FlexConnect user VLANs may be extended between multiple Layer 2 Catalyst switches for user mobility purpose. The mDNS service-policy configuration SDG Agent is required to accept policy-based mDNS service provider and receiver information from downstream Service-Peer access-layer switch. Figure 79: Per-Switch Location-Based FlexConnect Configuration Note Configure the mDNS service policy on the distribution layer SDG Agent switch before proceeding to the next configuration step. For more information, see the Configuring mDNS Service Policy (CLI) section. Configuring Service-Routing on SDG Agent (CLI) The Cisco Catalyst 9000 series switches support SDG Agent mode automatically at the distribution layer and enables Unicast mode Bonjour service-routing with the downstream Layer 2 access-layer Ethernet switches connected to the FlexConnect wireless users. The SDG Agent must be configured with mDNS service-policy on wireless FlexConnect user VLAN to accept mDNS service cache from downstream Service-Peer switches. This section provides step-by-step configuration guidelines to enable policy-based service discovery and distribution between locally paired Layer 2 access network switches in the Service-Peer mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2279 Configuring Service-Routing on SDG Agent (CLI) Cisco DNA Service for Bonjour The following figure illustrates unicast service-routing on SDG Agent and downstream Layer 2 access network switches in the Service-Peer mode. Figure 80: Catalyst SDG Agent Service-Routing Configuration Note Configure the mDNS service policy on the distribution layer SDG Agent switch before proceeding to the next configuration step. For more information, see the Configuring mDNS Service Policy (CLI) section. To enable the mDNS service policy and peer-group on SDG Agent switch, and enable Unicast mode service-routing with Layer 2 access network switches in Service-Peer mode, perform the following: Procedure Step 1 Command or Action enable Example: Device# enable Step 2 configure terminal Example: Purpose Enables privileged EXEC mode. Enter your password, if prompted. Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2280 Cisco DNA Service for Bonjour Verifying Local Area Bonjour in Service-Peer Mode Step 3 Step 4 Step 5 Step 6 Step 7 Command or Action Device# configure terminal Purpose mdns-sd service-peer group service-peer-group-name Example: Device(config)# mdns-sd service-peer group group_1 Configures a unique Service-Peer group. peer-group [ID] Assigns a unique peer-group ID to the Example: Service-Peers pair permitting mDNS service discovery and distribution within the assigned Device(config-mdns-svc-peer)# peer-group group list. 1 The valid peer-group range is from 1 to 1000 for each SDG Agent switch. service-policy service-policy-name Example: Device(config-mdns-svc-peer-grp)# service-policy VLAN100-POLICY Associates an mDNS service policy to accept service advertisements and query from the paired Service-Peers. service-peer [IPv4_address] location-group {all | default | id} Example: Device(config-mdns-svc-peer-grp)# service-peer 10.0.0.1 location-group default Device(config-mdns-svc-peer-grp)# service-peer 10.0.0.2 location-group default Configures at least one Service-Peer to accept the mDNS service advertisement or query message. When a group has more than one Service-Peers, the SDG Agent provides Layer 2 Unicast mode routing between the configured peers. For example, the SDG Agent provides Unicast based service gateway function between three (10.0.0.1 and 10.0.0.2) Layer 2 Service-Peer switches matching the associated service-policy. The mDNS service information from the unpaired Layer 2 Service-Peer (10.0.0.3) cannot announce or receive mDNS services with the other grouped Service-Peers (10.0.0.1 and 10.0.0.2). exit Exits mDNS gateway configuration mode. Example: Device(config-mdns-svc-peer-grp)# exit Verifying Local Area Bonjour in Service-Peer Mode This section provides guidelines to verify various Local Area Bonjour domain mDNS service configuration parameters, cache records, statistics and more on the controller in service-peer mode Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2281 Verifying Local Area Bonjour in Service-Peer Mode Cisco DNA Service for Bonjour Table 153: Command or Action Purpose show mdns-sd cache {all | interface | mac | name | Displays available mDNS cache records supporting service-peer | static | type | vlan} multiple variables providing granular source details received from wired or wireless FlexConnect user VLANs. The variables are as follows: · all Displays all available cache records discovered from multiple source connections of a system. · interface Displays available cache records discovered from the specified Layer 3 interface. · mac - Displays available cache records discovered from the specified MAC address. · name - Displays available cache records based on the service provider announced name. · service-peer - Displays available cache records discovered from the specified Layer 2 Service-Peer. · static Displays locally configured static mDNS cache entry. · type Displays available cache records based on the specific mDNS record type, such as, PTR, SRV, TXT, A or AAAA. · vlan - Displays available cache records discovered from the specified Layer 2 VLAN ID in the Unicast mode. show mdns-sd service-definition {name | type} show mdns-sd service-list {direction | name} show mdns-sd service-policy {interface | name} Displays built-in and user-defined custom service-definition that maps service name to the mDNS PTR records. The service-definition can be filtered by name or type. Displays inbound or outbound direction list of configured service-list to classify matching service-types for service-policy. The list can be filtered by name or specific direction. Displays list of mDNS service-policy mapped with inbound or outbound service-list. The service-policy list can be filtered by an associated specified interface or name. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2282 Cisco DNA Service for Bonjour Verifying Local Area Bonjour in SDG Agent Mode Command or Action Purpose show mdns-sd statistics {all | cache | debug | interface | service-list | service-policy | services | vlan} Displays detailed mDNS statistics processed bi-directionally by the system on each mDNS gateway enabled VLAN configured mDNS in Unicast mode. The expanded keyword for mDNS statistics can provide detailed view on interface, policy, service-list, and services. Note This command displays all mDNS packets received from directly connected (Local Mode) or Flex clients in WLAN. show mdns-sd summary {interface | vlan} Displays brief information about mDNS gateway and key configuration status on all wired and wireless FlexConnect user VLANs, and interfaces of the system. Verifying Local Area Bonjour in SDG Agent Mode This section provides guidelines to verify various Local Area Bonjour domain mDNS service configuration parameters, cache records, statistics and more on the controller in SDG Agent mode Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2283 Verifying Local Area Bonjour in SDG Agent Mode Cisco DNA Service for Bonjour Table 154: Command or Action Purpose show mdns-sd cache {all | interface | mac | name | Displays available mDNS cache records supporting service-peer | static | type | vlan | vrf} multiple variables providing granular source details. The variables are as follows: · all Displays all available cache records discovered from multiple source connections of a system. · interface Displays available cache records discovered from the specified Layer 3 interface. · mac - Displays available cache records discovered from the specified MAC address. · name - Displays available cache records based on the service provider announced name. · service-peer - Displays available cache records discovered from the specified Layer 2 Service-Peer. · static Displays locally configured static mDNS cache entry. · type Displays available cache records based on the specific mDNS record type, such as, PTR, SRV, TXT, A or AAAA. · vlan - Displays available cache records discovered from the specified Layer 2 VLAN ID in the Unicast mode. · vrf - Displays per-VRF available cache records based on specific mDNS record type, i.e., PTR, SRV, TXT, A or AAAA. show mdns-sd service-definition {name | type} show mdns-sd service-list {direction | name} show mdns-sd service-policy {interface | name} Displays built-in and user-defined custom service-definition that maps service name to the mDNS PTR records. The service-definition can be filtered by name or type. Displays inbound or outbound direction list of the configured service-list to classify matching service-types for service-policy. The list can be filtered by name or specific direction. Displays list of mDNS service-policy mapped with inbound or outbound service-list. The service-policy list can be filtered by an associated specified interface or name. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2284 Cisco DNA Service for Bonjour Reference Command or Action Purpose show mdns-sd statistics {all | cache | debug | interface | service-list | service-policy | services | vlan} Displays detailed mDNS statistics processed bi-directionally by the system on each mDNS gateway enabled VLAN configured mDNS in Unicast mode. The expanded keyword for mDNS statistics can provide detailed view on interface, policy, service-list, and services. show mdns-sd summary {interface | vlan} Displays brief information about mDNS gateway and key configuration status on all VLANs and interfaces of the system. Reference Table 155: Related Topic Document Title DNA Service for Bonjour Deployment on Cisco Catalyst 9600 Switch Cisco Catalyst 9600 Series Switch Software Configuration Guide, Release 17.5.X DNA Service for Bonjour Deployment on Cisco Catalyst 9500 Switch Cisco Catalyst 9500 Series Switch Software Configuration Guide, Release 17.5.X DNA Service for Bonjour Deployment on Cisco Catalyst 9400 Switch Cisco Catalyst 9400 Series Switch Software Configuration Guide, Release 17.5.X DNA Service for Bonjour Deployment on Cisco Catalyst 9300 Switch Cisco Catalyst 9300 Series Switch Software Configuration Guide, Release 17.5.X Cisco Wide Area Bonjour Application on Cisco DNA Cisco Wide Area Bonjour Application on Cisco DNA Center User Guide Center User Guide, Release 2.2.2 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2285 Reference Cisco DNA Service for Bonjour Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2286 2 0 1 C H A P T E R Configuration Example for Local Mode - Wireless and Wired · Overview, on page 2287 · Configuring Wireless AP Multicast Mode, on page 2288 · Configuration Example for Default Service List and Policy in Wide Area Bonjour Between Multilayer Wired and Wireless Endpoints, on page 2289 · Configuration Example for Customized Service List and Policy in Wide Area Bonjour Between Multilayer Wired and Wireless Endpoints, on page 2291 · Cisco DNA Center Traditional Multilayer Wired and Wireless Configuration, on page 2294 · Verifying Wide Area Bonjour Between Multilayer Wired and Wireless Local Mode, on page 2296 · Reference, on page 2303 Overview This chapter provides configuration guidelines to implement Wide Area Bonjour enabling end-to-end policy-based mDNS service discovery and distribution across multilayer wired and wireless local mode. The first hop mDNS gateway at Layer 2 access switch and the controller must be implemented in service peer mode and paired with LAN and wireless distribution-layer switch in SDG agent role. The network-wide distributed SDG agent must be paired with the Cisco DNA-Center to enable mDNS service-routing across IP core network based on multiple services and network attributes. The following figure illustrates unicast mode bonjour network environment with AirPrint capable printer and user computer (macOS, Microsoft Windows, etc.) connected to same Ethernet switch. The computers and mobile devices of the wireless user are associated to wireless AP in local mode across multi-hop IP boundary from printers. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2287 Configuring Wireless AP Multicast Mode Cisco DNA Service for Bonjour Figure 81: Wide Area Bonjour Service-Routing Multilayer Wired and Wireless Local Mode Configuring Wireless AP Multicast Mode This procedure configures wireless AP multicast on the controller for local mode APs and IP network. The controller must be configured with unique IP multicast address for wireless AP in local mode to permit mDNS communication across wired and wireless networks. Step Controller Service Peer Configuration Step-1 Enable global IP Multicast on Cisco Catalyst 9800 series controller. ! wireless multicast ! Step-2 ! wireless multicast 239.254.254.1 Configure Wireless AP mode to Multicast with unique ! IP Multicast address. The following table provides step-by-step IP multicast configuration guidelines on SDG agent (SDG-1 and SDG-2) at the distribution layer network. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2288 Cisco DNA Service for Bonjour Configuration Example for Default Service List and Policy in Wide Area Bonjour Between Multilayer Wired and Wireless Endpoints Step Switch SDG Agent Configuration WLC SDG Agent Configuration Step-1 Enable IP multicast-routing on distribution layer switches connecting Cisco Wireless Local Mode Access Point and Cisco Wireless LAN Controller. ! ip multicast-routing ! ! ip multicast-routing ! Step-2 Configure IP PIM Rendezvous-Point (RP) on distribution layer switches. ! ! ip pim rp-address 10.150.255.1 ip pim rp-address 10.150.255.1 ! ! Step-3 ! interface Vlan 101 Enable IP PIM on SVI Interface of description CONNECTED TO distribution layer switches WIRELESS AP LOCAL MODE connected Cisco Wireless Local ip pim sparse-mode ! Mode Access Point and Cisco WLC Management VLAN. ! interface Vlan 4094 description CONNECTED TO WIRELESS MGMT WLC ip pim sparse-mode ! Step-4 ! interface range Enable IP PIM on Layer 3 uplink FortyGigabitEthernet 1/1/1 Interface of distribution layer 2 switches connected Cisco Wireless description CORE NETWORK CONNECTED TO IP Local Mode Access Point and ip pim sparse-mode Cisco WLC Management VLAN. ! ! interface range FortyGigabitEthernet 1/1/1 2 description CONNECTED TO IP CORE NETWORK ip pim sparse-mode ! Note IP Multicast must be enabled in the Layer 3 core network to allow Cisco wireless APs in local mode to successfully join the WLC announced multicast group. For more information, refer to the Cisco online documentation to implement IP multicast networks. Configuration Example for Default Service List and Policy in Wide Area Bonjour Between Multilayer Wired and Wireless Endpoints This section provides guidance on configuring Service-Peer, SDG Agent, and Cisco DNA-Center, allowing the wired and wireless endpoints to dynamically discover default service list using Layer 2 unicast and policy. Example: Wired and Wireless Access Layer Service Peer Configuration The following table provides a sample configuration of wired and wireless controller access layer service peer. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2289 Example: Wired and Wireless Distribution Layer SDG Agent Configuration Cisco DNA Service for Bonjour Table 156: Configuring Wired and Wireless Access Layer Service Peer Configuration Step Sample Configuration: SP-1 Service-Peer Configuration Step-1: Enable mDNS gateway and ! set the gateway mode. mdns-sd gateway mode service-peer Note In wireless controller, ! service peer mode is enabled by default with mDNS gateway configuration. Sample Configuration: SP-2 Service-Peer Configuration ! mdns-sd gateway mode service-peer ! Step-2: Activate unicast mDNS gateway and attach service policy on wired VLAN and wireless FlexConnect user VLAN of SP-1 and SP-2 Layer 2 access switch. ! vlan configuration 10, 30 mdns-sd gateway service-policy LOCAL-AREA-POLICY active-query timer 3600 ! ! vlan configuration 20, 30 mdns-sd gateway service-policy LOCAL-AREA-POLICY active-query timer 3600 ! Step-3: Enable unicast service ! routing between wired and wireless vlan configuration 10, 30 vlan configuration 20, 30 mdns-sd gateway mdns-sd gateway service peer and SDG agent using source-interface vlan 4094 source-interface vlan 4094 wired management source VLAN sdg-agent 10.1.1.254 sdg-agent 10.1.1.254 ID and IP address. ! ! Example: Wired and Wireless Distribution Layer SDG Agent Configuration The following table provides a sample configuration of distribution layer SDG agent. Table 157: Configuring Wired and Wireles Distribution Layer SDG Agent Configuration Step Sample Configuration: SDG-1 SDG Agent Step-1: Enable mDNS gateway and set the gateway mode. The default mode is sdg-agent. ! mdns-sd gateway ! Step-2: Activate unicast mDNS gateway on wired VLAN and wireless user VLAN on SDG agents. ! vlan configuration 10, 20, 30 mdns-sd gateway ! Step-3: Configure the service peer-group and attach service-policy on the SDG agent distribution switch and enable service-routing between the assigned Service Peer switch group. ! mdns-sd service-peer group peer-group 1 service-policy LOCAL-AREA-POLICY service-peer 10.1.1.1 location-group default service-peer 10.1.1.2 location-group default ! Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2290 Cisco DNA Service for Bonjour Configuration Example for Customized Service List and Policy in Wide Area Bonjour Between Multilayer Wired and Wireless Endpoints Configuration Step Sample Configuration: SDG-1 SDG Agent Step-4: Associate outbound service-list to a unique service-policy. ! mdns-sd service-policy WIDE-AREA-POLICY service-list WIDE-AREA-SERVICES-OUT ! Step-5: Enable Wide Area Bonjour service-routing with service export configuration association controller IP Address, source interface for stateful connection, and mandatory egress policy for Wide Area service-routing. ! service-export mdns-sd controller DNAC-CONTROLLER-POLICY controller-address 100.0.0.1 controller-source-interface LOOPBACK 0 controller-service-policy WIDE-AREA-POLICY ! Configuration Example for Customized Service List and Policy in Wide Area Bonjour Between Multilayer Wired and Wireless Endpoints This section provides guidance on configuring Service-Peer, SDG Agent and Cisco DNA-Center, allowing the wired and wireless endpoints to dynamically discover printer using Layer 2 unicast and policy. Example: Wired and Wireless Access Layer Service Peer Configuration The following table provides a sample configuration of wired and wireless controller access layer service peer. Table 158: Configuring Wired and Wireless Access Layer Service Peer Configuration Step Sample Configuration: Switch Service Peer Step-1: Enable mDNS gateway and ! set the gateway mode. mdns-sd gateway mode service-peer Note In wireless controller, ! service peer mode is enabled by default with mDNS gateway configuration. Sample Configuration: Wireless Controller Service Peer ! mdns-sd gateway ! Step-2: Create unique mDNS ! inbound policy to permit ingress mdns-sd service-list LOCAL-AREA-SERVICES-IN in AirPrint service announcement on match printer-ipp the Catalyst Switch and wireless ! controller in service peer mode. ! mdns-sd service-list LOCAL-AREA-SERVICES-IN in match printer-ipp ! Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2291 Example: Wired and Wireless Access Layer Service Peer Configuration Cisco DNA Service for Bonjour Configuration Step Sample Configuration: Switch Service Peer Sample Configuration: Wireless Controller Service Peer Step-3: Create unique mDNS outbound policy to permit egress AirPrint service response on the Catalyst Switch and wireless controller in service peer mode ! mdns-sd service-list LOCAL-AREA-SERVICES-OUT out match printer-ipp ! ! mdns-sd service-list LOCAL-AREA-SERVICES-OUT out match printer-ipp ! Step-4: Associate inbound and outbound service list to a unique service policy. ! mdns-sd service-policy LOCAL-AREA-POLICY service-list LOCAL-AREA-SERVICES-IN service-list LOCAL-AREA-SERVICES-OUT ! mdns-sd service-policy LOCAL-AREA-POLICY service-list LOCAL-AREA-SERVICES-IN service-list LOCAL-AREA-SERVICES-OUT ! Step-5: Activate unicast mDNS gateway and attach service policy on wired VLAN and WLAN. · Switch: Activate mDNS gateway per VLAN. ! vlan configuration 10, 20 mdns-sd gateways service-policy LOCAL-AREA-POLICY active-query timer 3600 ! · Controller: Activate mDNS gateway per WLAN policy profile and SSID ! wireless profile policy WLAN-PROFILE shutdown mdns-sd service-policy LOCAL-AREA-POLICY no shutdown ! wlan WLAN-PROFILE 1 blizzard shutdown mdns-sd-interface gateway no shutdown ! Step-6: (Optional) Enable service routing on wired service peer mDNS between local VLANs. Also, enable location-based ! ! mdns-sd location-filter mdns-sd service-policy LOCAL-PROXY LOCAL-AREA-POLICY match location-group default location ap-location vlan 10 ! wireless service on the controller. match location-group default vlan 20 · Switch: Configure location ! filter group to discover and mdns-sd service-list distribute between paired local LOCAL-AREA-SERVICES-OUT match printer-ipps OUT VLAN. location-filter LOCAL-PROXY ! · Controller: Configure wireless location-based services. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2292 Cisco DNA Service for Bonjour Example: Wired and Wireless Distribution Layer SDG Agent Configuration Configuration Step Sample Configuration: Switch Service Peer Sample Configuration: Wireless Controller Service Peer Step-7: Enable unicast service ! routing between wired and wireless vlan configuration 10, 20 mdns-sd gateway mdns-sd gateways source-interface vlan 4094 service peer and SDG agent. source-interface vlan 4094 sdg-agent 10.2.1.254 · Switch: Configure SDG agent ! sdg-agent 10.1.1.254 ! IP and wired management source VLAN ID and IP address. · Controller: Configure SDG Agent IP and wireless management source VLAN ID and IP address. Example: Wired and Wireless Distribution Layer SDG Agent Configuration The following table provides a sample configuration of distribution layer SDG agent. Table 159: Configuring Distribution Layer SDG Agent Configuration Step Sample Configuration: Wired SDG Sample Configuration: Wireless Agent SDG Agent Step-1: Enable mDNS gateway and ! set the gateway mode. mdns-sd gateway ! ! mdns-sd gateway ! Step-2: Activate unicast mDNS ! gateway on wired VLAN and vlan configuration 10, 20 mdns-sd gateway wireless user VLAN on respective ! SDG agents. ! vlan configuration 30 mdns-sd gateway ! Step-3: Create unique controller bound mDNS policy to permit egress AirPrint service discovery and distribution from Catalyst ! mdns-sd service-list WIDE-AREA-SERVICES-OUT out match printer-ipp ! Switch in SDG agent mode. Inbound policy towards controller is not required. ! mdns-sd service-list WIDE-AREA-SERVICES-OUT out match printer-ipp ! Step-4: Associate outbound service-list to a unique service-policy. ! mdns-sd service-policy WIDE-AREA-POLICY service-list WIDE-AREA-SERVICES-OUT ! ! mdns-sd service-policy WIDE-AREA-POLICY service-list WIDE-AREA-SERVICES-OUT ! Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2293 Cisco DNA Center Traditional Multilayer Wired and Wireless Configuration Cisco DNA Service for Bonjour Configuration Step Sample Configuration: Wired SDG Sample Configuration: Wireless Agent SDG Agent Step-5: Enable Wide Area Bonjour ! ! service-routing with service export service-export mdns-sd service-export mdns-sd controller configuration association controller DNAC-CONTROLLER-POLICY controller DNAC-CONTROLLER-POLICY IP Address, source interface for controller-address 100.0.0.1 controller-address 100.0.0.1 stateful connection and mandatory controller-source-interface controller-source-interface egress policy for Wide Area service-routing. LOOPBACK 0 controller-service-policy WIDE-AREA-POLICY LOOPBACK 0 controller-service-policy WIDE-AREA-POLICY ! ! Cisco DNA Center Traditional Multilayer Wired and Wireless Configuration Configuring Service Filters for Traditional Multilayer Wired and Wireless Local Mode (GUI) This procedure implements global service filters, which permit the Cisco Wide Area Bonjour application to dynamically discover and distribute service information between trusted Cisco Catalyst SDG agent switches across the IP network. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Navigate to the Configuration tab in the Wide Area Bonjour application. From the sidebar, select the subdomain for which you want to create the service filter. Check the Service Filter box. Click Service Filter icon from the topology to view a list of the service filters for the selected domain. You can also manually edit existing service filters from this list. Click Create Service Filter. From the Network Mode drop-down list, choose Traditional (the default mode). Enter a unique name for the service filter. (Optional) Enter a description for the service filter. Select one or more service types to permit announcements and queries. Enable or disable service filters after creating them. By default, service filters are enabled. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2294 Cisco DNA Service for Bonjour Configuring Source SDG Agents in Traditional Multilayer Wired and Wireless - Local Mode (GUI) Configuring Source SDG Agents in Traditional Multilayer Wired and Wireless - Local Mode (GUI) This procedure configures discovery of wired printer sources from the LAN distribution switches paired with Layer 2 Catalyst Switches in a service peer role. The wireless distribution switches paired with a controller in a service peer role receive query responses for wired printers and distribute the responses to querying devices over the wireless local mode network. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Click Add in the upper-right portion of the DNA-Center Policy screen. Select the Query SDG agent radio button. By default, the Source radio button is selected. From the SDG Agent/IP drop-down list, select an SDG agent (100.0.0.101) which announces the services, for example, Printer. Select Peer from the Service Layer drop-down list. Uncheck the box Any. By default, this is enabled. Select the query VLAN (Vlan-10) to distribute services (Printer) from a specific network. Enable or disable services from the selected query IPv4 subnet. By default, this is enabled. Enable or disable services from the selected query IPv6 subnet. By default, this is enabled. Enter the service peer IPv4 address (10.1.1.1). Click the + icon to add more service peers, if any. Select Any to accept services from any peer on a selected VLAN. (Optional) Click Add Next to add more source SDG agents. (Repeat the preceding steps.) Click DONE. Click CREATE. Configuring Query SDG Agents in Traditional Multilayer Wired and Wireless - Local Mode (GUI) This procedure configures distributed services to query SDG agents connected to a controller in service peer mode, based on a policy. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Click Add in the upper-right portion of the DNA-Center Policy screen. Select the Query SDG agent radio button. By default, the Source radio button is selected. From the SDG Agent/IP drop-down list, select an SDG agent (100.0.0.102) that receives queries for the services (Printer). Select Peer from the Service Layer drop-down list. Uncheck the box Any. By default, this is enabled. Select the query VLAN (Vlan-30) to distribute services (Printer) to a specific network. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2295 Verifying Wide Area Bonjour Between Multilayer Wired and Wireless Local Mode Cisco DNA Service for Bonjour Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Enable or disable services from the selected query IPv4 subnet. By default, this is enabled. Enable or disable services from the selected query IPv6 subnet. By default, this is enabled. Enter the service peer IPv4 address (10.2.1.254). Click the + icon to add more service-peers, if any. Select Any to accept services from any peer on a selected VLAN. (Optional) Click Add Next to add more query agents. (Repeat the preceding steps.) Click DONE. Click CREATE. Verifying Wide Area Bonjour Between Multilayer Wired and Wireless Local Mode This section provides step-by-step mDNS configuration and service discovery and distribution status based on applied policy on Wired Layer 2 access switch in service peer and SDG agent mode. Verifying Wired Service-Peer Configuration Use the following commands on the Cisco Catalyst switch in service peer (SP-1) mode to determine the operational status after applying configuration and discovering the AirPrint service from the local network. Device# show mdns-sd summary vlan 10 VLAN: 10 ========================================== mDNS Gateway: Enabled mDNS Service Policy: LOCAL-AREA-POLICY Active Query: Enabled : Periodicity 3600 Seconds Transport Type: IPv4 Service Instance Suffix: Not Configured mDNS Query Type: ALL SDG Agent IP: 10.1.1.254 Source Interface: Vlan4094 Device# show mdns-sd service-policy name LOCAL-AREA-POLICY Service Policy Name Service List IN Name Service List Out Name =============================================================================== LOCAL-AREA-POLICY LOCAL-AREA-SERVICES-IN LOCAL-AREA-SERVICES-OUT Device# show mdns-sd cache vlan 10 Name _universal. _sub. _ipp. _tcp.local Type TTL/ Vlan-Id/ MAC Address RR Record Data Remaining Interface-name PTR 4500/4486 Vl10 ac18.2651.03fe Bldg-1-FL1-PRN. _ipp. _tcp.local Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2296 Cisco DNA Service for Bonjour Verifying Wired Service-Peer Configuration Name _ipp. _tcp.local Bldg-1-FL1PRN. _ipp. _tcp.local Bldg-1-FL1PRN.local Bldg-1-FL1PRN.local Bldg-1-FL1PRN. _ipp. _tcp.local Type TTL/ Vlan-Id/ MAC Address RR Record Data Remaining Interface-name PTR 4500/4486 Vl10 ac18.2651.03fe Bldg-1-FL1-PRN. _ipp. _tcp.local SRV 4500/4486 Vl10 ac18.2651.03fe Bldg-1-FL1-PRN. local A 4500/4486 Vl10 ac18.2651.03fe 10.153.1.1 AAAA 4500/4486 Vl10 TXT 4500/4486 Vl10 ac18.2651.03fe 2001:10:153: 1:79: A40C:6BEE: AEEC ac18.2651.03fe (451)'txtvers=1''priorit ty=EPSON WF-3620 usb_MFG=EPSON'' usb_MDL=W~'~ Device# show mdns-sd statistics vlan 10 mDNS Statistics Vl10: mDNS packets sent : 612 IPv4 sent : 612 IPv4 advertisements sent : 0 IPv4 queries sent : 612 IPv6 sent :0 IPv6 advertisements sent : 0 IPv6 queries sent :0 Unicast sent :0 mDNS packets rate limited :0 mDNS packets received : 42 advertisements received : 28 queries received : 14 IPv4 received : 42 IPv4 advertisements received: 28 IPv4 queries received : 14 IPv6 received :0 IPv6 advertisements received: 0 IPv6 queries received :0 mDNS packets dropped :0 ========================================= Query Type : Count ========================================= PTR : 12 SRV :0 A :0 AAAA :0 TXT :0 ANY :3 ================================================= PTR Name Advertisement Query Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2297 Verifying Wired SDG Agent Configuration and Service-Routing Status Cisco DNA Service for Bonjour ================================================= _ipp. _tcp.local 9 4 Verifying Wired SDG Agent Configuration and Service-Routing Status This section provides information on mDNS configuration and service-routing on Wired SDG Agent (SDG-1) with locally attached Layer 2 access switches in Service-Peer (SP-1) mode and with centrally paired Cisco DNA-Center for Wide Area Bonjour service-routing. Device# show mdns-sd summary vlan 10 VLAN: 10 ========================================== mDNS Gateway : Enabled mDNS Service Policy : LOCAL-AREA-POLICY Active Query : Disabled Transport Type : IPv4 Service Instance Suffix : Not-Configured mDNS Query Type : ALL SDG Agent IP : Not-Configured Source Interface : Not-Configured Device# show mdns-sd cache vlan 10 VLAN: 10 ========================================== mDNS Gateway : Enabled mDNS Service Policy : LOCAL-AREA-POLICY Active Query : Disabled Transport Type : IPv4 Service Instance Suffix : Not-Configured mDNS Query Type : ALL SDG Agent IP : Not-Configured Source Interface : Not-Configured Name Type TTL/ Remaining Vlan-Id MAC Address RR Record Data /Interface-name _universal. PTR _sub._ipp ._tcp.local 4500/4500 Vl10 ac18.2651.03fe Bldg-1-FL1-PRN. _ipp. _tcp.local _ipp. _tcp.local PTR 4500/4500 Vl10 ac18.2651.03fe Bldg-1-FL1-PRN. _ipp. _tcp.local Bldg-1-FL1- SRV PRN. _ipp. _tcp.local 4500/4500 Vl10 ac18.2651.03fe 0 0 631 Bldg-1-FL1-PRN. local Bldg-1-FL1 A -PRN.local 4500/4500 Vl10 ac18.2651.03fe 10.153.1.1 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2298 Cisco DNA Service for Bonjour Verifying Wired SDG Agent Configuration and Service-Routing Status Name Type Bldg-1-FL1PRN.local AAAA Bldg-1-FL1- TXT PRN. _ipp. _tcp.local TTL/ Remaining 4500/4500 4500/4500 Vlan-Id MAC Address RR Record Data /Interface-name Vl10 ac18.2651.03fe 2001:10:153: 1:79: A40C:6BEE: AEEC Vl10 ac18.2651.03fe (451)'txtvers=1'priority=30' ty=EPSON WF-3620 Series'' usb_MFG=EPSONu'sb'_MDL=W~' Device# show mdns-sd sp-sdg statistics Average Input rate (pps) Average Output rate (pps) Messages received: Query ANY query Advertisements Advertisement Withdraw Interface down Vlan down Service-peer ID change Service-peer cache clear Resync response Messages sent: Query response ANY Query response Cache-sync Get service-instance One min, 5 mins, 1 hour : 0, 0, 0 : 0, 0, 0 : 15796 :0 : 28 :0 :0 :0 :0 : 12 :6 : 5975 :0 : 61 :0 Device# show mdns-sd controller detail Controller: DNAC-Policy IP: 100.0.0.1, Dest Port : 9991, Src Port : 42446, State : UP Source Interface : Loopback0, MD5 Disabled Hello Timer 30 sec, Dead Timer 120 sec, Next Hello 00:00:24 Uptime 2d05h (17:02:37 UTC Jan 15 2021) Service Buffer: Enabled Service Announcement: Filter: DNAC-CONTROLLER-POLICY Count 50, Delay Timer 30 sec, Pending Announcement 0, Pending Withdraw 0 Total Export Count 56, Next Export in 00:00:24 Service Query: Query Suppression Enabled Query Count 50, Query Delay Timer 15 sec, Pending 0 Total Query Count 15791, Next Query in 00:00:09 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2299 Verifying Wireless Service-Peer Configuration and Service Status Cisco DNA Service for Bonjour Verifying Wireless Service-Peer Configuration and Service Status The command given below helps determine the operational status after applying configuration and discovering the AirPrint service from the remote network. Device# show mdns-sd summary mDNS Gateway: Enabled Mode: Service Peer Service Announcement Periodicity (in seconds): 30 Service Announcement Count: 50 Service Query Periodicity (in seconds): 15 Service Query Count: 50 Active Response Timer (in seconds): Disabled ANY Query Forward: Disabled SDG Agent IP: 10.2.1.254 Source Interface: Vlan4094 Active Query Periodicity (in minutes): 15 Transport Type: IPv4 mDNS AP service policy: default-mdns-service-policy Device# show wireless profile policy detailed WLAN-PROFILE | sec mDNS mDNS Gateway mDNS Service Policy name : LOCAL-AREA-POLICY Device# show mdns-sd statistics wlan-id 1 mDNS Packet Statistics ------------------------------------------------mDNS stats last reset time: 01/10/21 21:38:19 mDNS packets sent: 4592 IPv4 sent: 4592 IPv4 advertisements sent: 4592 IPv4 queries sent: 0 IPv6 sent: 0 IPv6 advertisements sent: 0 IPv6 queries sent: 0 Multicast sent: 0 IPv4 sent: 0 IPv6 sent: 0 mDNS packets received: 297 advertisements received: 80 queries received: 217 IPv4 received: 297 IPv4 advertisements received: 80 IPv4 queries received: 217 IPv6 received: 0 IPv6 advertisements received: 0 IPv6 queries received: 0 mDNS packets dropped: 297 Query Type Statistics PTR queries received: 1720 SRV queries received: 8 A query received: 8 AAAA queries received: 8 TXT queries received: 97 ANY queries received: 153 OTHER queries received: 0 Device# show mdns-sd sp-sdg statistics mDNS SP Statistics Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2300 Cisco DNA Service for Bonjour Verifying Wireless SDG Agent Configuration and Service-Routing Status last reset time: 01/10/21 21:37:36 Messages sent: Query ANY query Advertisements Advertisement Withdraw Service-peer ID change Service-peer cache clear Resync response Messages received: Query response ANY Query response Cache-sync Get service-instance : 12675 :0 : 24 :0 :0 :7 :5 : 4619 :0 : 48 :0 Device# show mdns-sd query-db MDNS QUERY DB Client MAC: 4c32. 7593.e3af Vlan ID: 30 Wlan ID: 1 Location Group ID: 0 PTR Name(s): _ipp. _tcp.local Verifying Wireless SDG Agent Configuration and Service-Routing Status This section providees information on mDNS configuration and service-routing on Wireless SDG Agent (SDG-2) with locally attached controller in service peer (SP-2) mode and with centrally paired Cisco DNA-Center for Wide Area Bonjour service-routing. Device# show mdns-sd summary vlan 30 VLAN: 30 ========================================== mDNS Gateway : Enabled mDNS Service Policy : LOCAL-AREA-POLICY Active Query : Disabled Transport Type : IPv4 Service Instance Suffix : Not Configured mDNS Query Type : ALL SDG Agent IP : Not Configured Source Interface : Not Configured Device# show mdns-sd sp-sdg statistics Average Input rate (pps) Average Output rate (pps) Messages received: Query ANY query Advertisements Advertisement Withdraw Interface down Vlan down Service-peer ID change Service-peer cache clear Resync response One min, 5 mins, 1 hour :0, 0, 0 :0, 0, 0 : 12191 :0 :0 :0 :0 :0 :0 : 18 : 10 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2301 Verifying Cisco DNA-Center Configuration and Service-Routing Status Cisco DNA Service for Bonjour Messages sent: Query response ANY Query response Cache-sync Get service-instance : 1975 :0 : 19 :0 Device# show mdns-sd controller detail Controller: DNAC-Policy IP: 100.0.0.1, Dest Port : 9991, Src Port : 42931, State : UP Source Interface: Loopback0, MD5 Disabled Hello Timer 30 sec, Dead Timer 120 sec, Next Hello 00:00:19 Uptime 2d05h (17:10:18 UTC Jan 15 2021) Service Buffer: Enabled Service Announcement: Filter: DNAC-CONTROLLER-POLICY Count 50, Delay Timer 30 sec, Pending Announcement 0, Pending Withdraw 0 Total Export Count 0, Next Export in 00:00:19 Service Query: Query Suppression Enabled Query Count 50, Query Delay Timer 15 sec, Pending 0 Total Query Count 17093, Next Query in 00:00:19 Verifying Cisco DNA-Center Configuration and Service-Routing Status The Cisco Wide Area Bonjour application supports comprehensive assurance capabilities to manage service-routing with network-wide distributed Cisco Catalyst switches in SDG-Agent role and mDNS services discovered over Wide Area Bonjour domain. The assurance capabilities in Cisco Wide Area Bonjour provides ability to determine service-routing state, mDNS service state and many more information at various levels for day-2 operations, analysis and troubleshooting. Each category serves unique function to manage and troubleshoot Wide Area Bonjour service-routing for day-2 operation. This sub-section provides brief overview for each category of monitor function: · Dashboard: The landing page of Cisco Wide Area Bonjour application provides key statistics in various formats to quickly determine service-routing health across the network. The network administrator can monitor operational status of service-routing with SDG Agent devices, historical chart of service discovery request, processing and drops from network-wide distributed devices and top five talkers across the network. · Sub-Domain 360°: The network administrator can briefly collect statistics and status counts in 360° view. The left-panel monitoring, and configuration bar is automatically open upon clicking selected sub-domain to verify configured policies, discovered service-instances on per sub domain basis of the configuration section. · Monitor: A comprehensive 3-tier monitoring and troubleshooting function of Cisco Wide Area Bonjour application for various day-2 operations. The detail view of SDG Agent, Service-Instance and advanced Troubleshooting capabilities allows network administrator to manage and troubleshoot Wide Area Bonjour domain with single of glass on Cisco DNA-Center. For more information, see Cisco Wide Area Bonjour on Cisco DNA Center User Guide, Release 2.1.2 guide. The assurance capabilities and operation details are explained in Monitor the Cisco Wide Area Bonjour Application chapter to manage Cisco Wide Area Bonjour application with various supporting service-routing assurance function. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2302 Cisco DNA Service for Bonjour Reference Reference Table 160: Related Topic Document Title DNA Service for Bonjour Deployment on Cisco Catalyst 9600 Switch Cisco Catalyst 9600 Series Switch Software Configuration Guide, Release 17.5.X DNA Service for Bonjour Deployment on Cisco Catalyst 9500 Switch Cisco Catalyst 9500 Series Switch Software Configuration Guide, Release 17.5.X DNA Service for Bonjour Deployment on Cisco Catalyst 9400 Switch Cisco Catalyst 9400 Series Switch Software Configuration Guide, Release 17.5.X DNA Service for Bonjour Deployment on Cisco Catalyst 9300 Switch Cisco Catalyst 9300 Series Switch Software Configuration Guide, Release 17.5.X Cisco Wide Area Bonjour Application on Cisco DNA Cisco Wide Area Bonjour Application on Cisco DNA Center User Guide Center User Guide, Release 2.2.2 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2303 Reference Cisco DNA Service for Bonjour Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2304 2 0 2 C H A P T E R Configuration Example for FlexConnect Mode Wireless and Wired · Overview, on page 2305 · Configuration Example for Default Service List and Policy in FlexConnect Mode - Wireless and Wired, on page 2306 · Configuration Example for Customized Service List and Policy in FlexConnect Mode - Wireless and Wired, on page 2309 · Verifying Configuration Example for FlexConnect Mode - Wireless and Wired, on page 2313 · Reference, on page 2317 Overview This chapter provides configuration guidelines to implement Local Area Bonjour enabling end-to-end policy-based mDNS service discovery and distribution across multilayer wired and wireless FlexConnect local-switching mode. The first hop mDNS gateway at Layer 2 access switch must be implemented in service peer mode and paired with common distribution-layer switch in SDG agent role IP gateway function to wired and wireless clients. The network-wide distributed SDG agent can be paired alternatively with the Cisco DNA Center to enable mDNS service-routing across IP core network providing mDNS service assurance, monitoring and troubleshooting. The following figure illustrates unicast mode bonjour network environment with AirPrint capable printer and wireless user computer (macOS, Microsoft Windows, and so on.) connected to the same Ethernet switch. The network administrator implements the policy permitting additional endpoints associated to nearby location Ethernet switch to discover and use remote AirPrint capable Printer without flooding mDNS over wired and wireless networks. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2305 Configuration Example for Default Service List and Policy in FlexConnect Mode - Wireless and Wired Cisco DNA Service for Bonjour Figure 82: Local Area Bonjour Service-Routing Multilayer Wired and Wireless FlexConnect Local-Switching Mode Configuration Example for Default Service List and Policy in FlexConnect Mode - Wireless and Wired This section provides guidance on configuring Service-Peer, SDG Agent, and Cisco DNA Center, allowing the wired and wireless endpoints to dynamically discover the default service list using Layer 2 unicast and policy. Example: Wired and Wireless Access Layer Service Peer Configuration The following table provides a sample configuration of wired and wireless controller access layer service peer. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2306 Cisco DNA Service for Bonjour Example: Wired and Wireless Access Layer Service Peer Configuration Table 161: Configuring Wired and Wireless Access Layer Service Peer Configuration Step Sample Configuration: SP-1 Service-Peer Configuration Sample Configuration: SP-2 Service-Peer Configuration Step-1: Enable mDNS gateway and ! set the gateway mode. mdns-sd gateway mode service-peer ! ! mdns-sd gateway mode service-peer ! Step-2: Create unique mDNS ! inbound policy to permit ingress mdns-sd service-list LOCAL-AREA-SERVICES-IN in AirPrint service announcement and match printer-ipp query on the Catalyst Switch in ! service peer mode. ! mdns-sd service-list LOCAL-AREA-SERVICES-IN in match printer-ipp ! Step-3: Create unique mDNS outbound policy to permit egress AirPrint service response on the Catalyst Switch in service peer mode ! mdns-sd service-list LOCAL-AREA-SERVICES-OUT out match printer-ipp ! ! mdns-sd service-list LOCAL-AREA-SERVICES-OUT out match printer-ipp ! Step-4: Associate inbound and outbound service list to a unique service policy. ! mdns-sd service-policy LOCAL-AREA-POLICY service-list LOCAL-AREA-SERVICES-IN service-list LOCAL-AREA-SERVICES-OUT ! mdns-sd service-policy LOCAL-AREA-POLICY service-list LOCAL-AREA-SERVICES-IN service-list LOCAL-AREA-SERVICES-OUT ! Step-5: Activate unicast mDNS gateway and attach service policy on wired VLAN and wireless FlexConnect user VLAN of SP-1 and SP-2 Layer 2 access switch. ! vlan configuration 10, 30 mdns-sd gateway service-policy LOCAL-AREA-POLICY active-query timer 3600 ! ! vlan configuration 20, 30 mdns-sd gateway service-policy LOCAL-AREA-POLICY active-query timer 3600 ! Step-6: Enable service routing on ! wired service peer mDNS between mdns-sd location-filter LOCAL-PROXY mDNS source and receiver local match location-group default VLANs. vlan 10 Note match location-group default This step is optional vlan 30 for SP-2 switch as it ! does not have local mDNS service provider endpoints or mdns-sd service-list LOCAL-AREA-SERVICES-OUT OUT match printer-ipps location-filter LOCAL-PROXY VLANs. ! Step-7: Enable unicast service ! routing between wired and wireless vlan configuration 10, 30 vlan configuration 20, 30 mdns-sd gateway mdns-sd gateway service peer and SDG agent using source-interface vlan 4094 source-interface vlan 4094 wired management source VLAN sdg-agent 10.1.1.254 sdg-agent 10.1.1.254 ID and IP address. ! ! Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2307 Example: Wired and Wireless Distribution Layer SDG Agent Configuration Cisco DNA Service for Bonjour Example: Wired and Wireless Distribution Layer SDG Agent Configuration The following table provides a sample configuration of distribution layer SDG agent. Table 162: Configuring Wired and Wireles Distribution Layer SDG Agent Configuration Step Sample Configuration: SDG-1 SDG Agent Step-1: Enable mDNS gateway and set the gateway mode. The default mode is sdg-agent. ! mdns-sd gateway ! Step-2: Create a unique mDNS inbound policy to permit ingress AirPrint service announcement and query the Catalyst Switch in Service-Peer mode. ! mdns-sd service-list LOCAL-AREA-SERVICES-IN in match printer-ipp ! Step-3: Create a unique mDNS outbound policy to permit egress AirPrint service response on Catalyst Switch in Service-Peer mode. ! mdns-sd service-list LOCAL-AREA-SERVICES-OUT out match printer-ipp ! Step-4: Associate the inbound and outbound service-list to a unique service-policy. ! mdns-sd service-policy LOCAL-AREA-POLICY service-list LOCAL-AREA-SERVICES-IN service-list LOCAL-AREA-SERVICES-OUT ! Step-5: Activate unicast mDNS gateway on wired VLAN and wireless user VLAN on SDG agents. ! vlan configuration 10, 20, 30 mdns-sd gateway ! Step-6: Configure the service peer-group and attach service-policy on the SDG agent distribution switch and enable service-routing between the assigned Service Peer switch group. ! mdns-sd service-peer group peer-group 1 service-policy LOCAL-AREA-POLICY service-peer 10.1.1.1 location-group default service-peer 10.1.1.2 location-group default ! Step-7: Create a unique controller bound mDNS policy to permit egress AirPrint service discovery and ! mdns-sd service-list WIDE-AREA-SERVICES-OUT distribution from Catalyst Switch in SDG agent mode. out Inbound policy towards controller is not required. match printer-ipp ! Step-8: Associate outbound service-list to a unique service-policy. ! mdns-sd service-policy WIDE-AREA-POLICY service-list WIDE-AREA-SERVICES-OUT ! Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2308 Cisco DNA Service for Bonjour Configuration Example for Customized Service List and Policy in FlexConnect Mode - Wireless and Wired Configuration Step Sample Configuration: SDG-1 SDG Agent Step-9: Enable Wide Area Bonjour service-routing with service export configuration association controller IP Address, source interface for stateful connection, and mandatory egress policy for Wide Area service-routing. ! service-export mdns-sd controller DNAC-CONTROLLER-POLICY controller-address 100.0.0.1 controller-source-interface LOOPBACK 0 controller-service-policy WIDE-AREA-POLICY ! Configuration Example for Customized Service List and Policy in FlexConnect Mode - Wireless and Wired This section provides guidance on configuring Service-Peer, SDG Agent, and Cisco DNA Center, allowing the wired and wireless endpoints to dynamically discover printer using Layer 2 unicast and policy. Example: Wired and Wireless Access Layer Service Peer Configuration The following table provides a sample configuration of wired and wireless controller access layer service peer. Table 163: Configuring Wired and Wireless Access Layer Service Peer Configuration Step Sample Configuration: SP-1 Service-Peer Configuration Sample Configuration: SP-2 Service-Peer Configuration Step-1: Enable mDNS gateway and ! set the gateway mode. mdns-sd gateway mode service-peer ! ! mdns-sd gateway mode service-peer ! Step-2: Create unique mDNS ! inbound policy to permit ingress mdns-sd service-list LOCAL-AREA-SERVICES-IN in AirPrint service announcement and match printer-ipp query on the Catalyst Switch in ! service peer mode. ! mdns-sd service-list LOCAL-AREA-SERVICES-IN in match printer-ipp ! Step-3: Create unique mDNS outbound policy to permit egress AirPrint service response on the Catalyst Switch in service peer mode ! mdns-sd service-list LOCAL-AREA-SERVICES-OUT out match printer-ipp ! ! mdns-sd service-list LOCAL-AREA-SERVICES-OUT out match printer-ipp ! Step-4: Associate inbound and outbound service list to a unique service policy. ! mdns-sd service-policy LOCAL-AREA-POLICY service-list LOCAL-AREA-SERVICES-IN service-list LOCAL-AREA-SERVICES-OUT ! mdns-sd service-policy LOCAL-AREA-POLICY service-list LOCAL-AREA-SERVICES-IN service-list LOCAL-AREA-SERVICES-OUT ! Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2309 Example: Wired and Wireless Distribution Layer SDG Agent Configuration Cisco DNA Service for Bonjour Configuration Step Sample Configuration: SP-1 Service-Peer Configuration Sample Configuration: SP-2 Service-Peer Configuration Step-5: Activate unicast mDNS gateway and attach service policy on wired VLAN and wireless FlexConnect user VLAN of SP-1 and SP-2 Layer 2 access switch. ! vlan configuration 10, 30 mdns-sd gateway service-policy LOCAL-AREA-POLICY active-query timer 3600 ! ! vlan configuration 20, 30 mdns-sd gateway service-policy LOCAL-AREA-POLICY active-query timer 3600 ! Step-6: Enable service routing on ! wired service peer mDNS between mdns-sd location-filter LOCAL-PROXY mDNS source and receiver local match location-group default VLANs. vlan 10 Note match location-group default This step is optional vlan 30 for SP-2 switch as it ! does not have local mDNS service provider endpoints or mdns-sd service-list LOCAL-AREA-SERVICES-OUT OUT match printer-ipps location-filter LOCAL-PROXY VLANs. ! Step-7: Enable unicast service ! routing between wired and wireless vlan configuration 10, 30 vlan configuration 20, 30 mdns-sd gateway mdns-sd gateway service peer and SDG agent using source-interface vlan 4094 source-interface vlan 4094 wired management source VLAN sdg-agent 10.1.1.254 sdg-agent 10.1.1.254 ID and IP address. ! ! Example: Wired and Wireless Distribution Layer SDG Agent Configuration The following table provides a sample configuration of distribution layer SDG agent. Table 164: Configuring Wired and Wireles Distribution Layer SDG Agent Configuration Step Sample Configuration: SDG-1 SDG Agent Step-1: Enable mDNS gateway and set the gateway mode. The default mode is sdg-agent. ! mdns-sd gateway ! Step-2: Create a unique mDNS inbound policy to permit ingress AirPrint service announcement and query the Catalyst Switch in Service-Peer mode. ! mdns-sd service-list LOCAL-AREA-SERVICES-IN in match printer-ipp ! Step-3: Create a unique mDNS outbound policy to permit egress AirPrint service response on Catalyst Switch in Service-Peer mode. ! mdns-sd service-list LOCAL-AREA-SERVICES-OUT out match printer-ipp ! Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2310 Cisco DNA Service for Bonjour Cisco DNA Center Traditional Multilayer Wired and Wireless Configuration Configuration Step Sample Configuration: SDG-1 SDG Agent Step-4: Associate the inbound and outbound service-list to a unique service-policy. ! mdns-sd service-policy LOCAL-AREA-POLICY service-list LOCAL-AREA-SERVICES-IN service-list LOCAL-AREA-SERVICES-OUT ! Step-5: Activate unicast mDNS gateway on wired VLAN and wireless user VLAN on SDG agents. ! vlan configuration 10, 20, 30 mdns-sd gateway ! Step-6: Configure the service peer-group and attach service-policy on the SDG agent distribution switch and enable service-routing between the assigned Service Peer switch group. ! mdns-sd service-peer group peer-group 1 service-policy LOCAL-AREA-POLICY service-peer 10.1.1.1 location-group default service-peer 10.1.1.2 location-group default ! Step-7: Create a unique controller bound mDNS policy to permit egress AirPrint service discovery and ! distribution from Catalyst Switch in SDG agent mode. mdns-sd out service-list WIDE-AREA-SERVICES-OUT Inbound policy towards controller is not required. match printer-ipp ! Step-8: Associate outbound service-list to a unique service-policy. ! mdns-sd service-policy WIDE-AREA-POLICY service-list WIDE-AREA-SERVICES-OUT ! Step-9: Enable Wide Area Bonjour service-routing with service export configuration association controller IP Address, source interface for stateful connection, and mandatory egress policy for Wide Area service-routing. ! service-export mdns-sd controller DNAC-CONTROLLER-POLICY controller-address 100.0.0.1 controller-source-interface LOOPBACK 0 controller-service-policy WIDE-AREA-POLICY ! Cisco DNA Center Traditional Multilayer Wired and Wireless Configuration Configuring Service Filters for Traditional Multilayer Wired and Wireless FlexConnect LocalSwitching Mode (GUI) This procedure implements global service filters, which permit the Cisco Wide Area Bonjour application to dynamically discover and distribute service information between trusted Cisco Catalyst SDG agent switches across the IP network. Procedure Step 1 Navigate to the Configuration tab in the Wide Area Bonjour application. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2311 Cisco DNA Service for Bonjour Configuring Source SDG Agents in Traditional Multilayer Wired and Wireless FlexConnect Local- Switching Mode (GUI) Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 From the sidebar, select the sub-domain for which you want to create the service filter. Check the Service Filter box. Click Service Filter icon from the topology to view a list of the service filters for the selected domain. You can also manually edit existing service filters from this list. Click Create Service Filter. From the Network Mode drop-down list, choose Traditional (the default mode). Enter a unique name for the service filter. (Optional) Enter a description for the service filter. Select one or more service types to permit announcements and queries. Enable or disable service filters after creating them. By default, service filters are enabled. Configuring Source SDG Agents in Traditional Multilayer Wired and Wireless FlexConnect LocalSwitching Mode (GUI) This procedure configures discovery of wired printer sources from the LAN distribution switches paired with Layer 2 Catalyst Switches in a service peer role. The wireless distribution switches paired with a controller in a service peer role receive query responses for wired printers and distribute the responses to querying devices over the wireless FlexConnect local switching mode network. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Click Add on the upper-right of DNAC. Click the Source radio button to select a source SDG agent. By default, this radio button is selected. From the SDG Agent/IP drop-down list, select an SDG agent (100.0.0.101) which announces the services, for example, Printer. Select Peer from the Service Layer drop-down list. Uncheck the box Any. By default, this is unchecked. Select the query VLAN (Vlan-10) to distribute services (Printer) from a specific network. Enable or disable services from the selected query IPv4 subnet. By default, this is enabled. Enable or disable services from the selected query IPv6 subnet. By default, this is enabled. Enter the service peer IPv4 address (10.1.1.1). Note Select Any to accept services from any peer on a selected VLAN. (Optional) Click Add Next to add more source SDG agents. (Repeat the preceding steps.) Click DONE. Click CREATE. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2312 Cisco DNA Service for Bonjour Configuring Query SDG Agents in Traditional Multilayer Wired and Wireless FlexConnect Local- Switching Mode (GUI) Configuring Query SDG Agents in Traditional Multilayer Wired and Wireless FlexConnect LocalSwitching Mode (GUI) This procedure configures distributed services to query SDG agents connected to a controller in service peer mode, based on a policy. If the network environment is different, see the Cisco Wide Area Bonjour on Cisco DNA Center User Guide, Release 2.1.2. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Click Add on the upper-right of DNAC. Select the Query SDG agent radio button. By default, the Source radio button is selected. From the SDG Agent/IP drop-down list, select an SDG agent (100.0.0.102) that receives queries for the services (Printer). Select Peer from the Service Layer drop-down list. Uncheck the box Any. By default, this is enabled. Select the query VLAN (Vlan-30) to distribute services (Printer) to a specific network. Enable or disable services from the selected query IPv4 subnet. By default, this is enabled. Enable or disable services from the selected query IPv6 subnet. By default, this is enabled. Enter the service peer IPv4 address (10.2.1.254). Click the + icon to add more service-peers, if any. Select Any to accept services from any peer on a selected VLAN. (Optional) Click Add Next to add more query agents. (Repeat the preceding steps.) Click DONE. Click CREATE. Verifying Configuration Example for FlexConnect Mode Wireless and Wired This section provides step-by-step mDNS configuration and service discovery and distribution status based on applied policy on Wired Layer 2 access switch in service peer and SDG agent mode. Verifying Wired Service-Peer Configuration Use the following commands on the Cisco Catalyst switch in service peer (SP-1 and SP-2) mode to determine the operational status after applying configuration and discovering the AirPrint service from the local network. Device# show mdns-sd summary vlan 10 VLAN: 10 ========================================== mDNS Gateway: Enabled mDNS Service Policy: LOCAL-AREA-POLICY Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2313 Verifying Wired Service-Peer Configuration Cisco DNA Service for Bonjour Active Query: Enabled : Periodicity 3600 Seconds Transport Type: IPv4 Service Instance Suffix: Not Configured mDNS Query Type: ALL SDG Agent IP: 10.1.1.254 Source Interface: Vlan4094 Device# show mdns-sd service-policy name LOCAL-AREA-POLICY Service Policy Name Service List IN Name Service List Out Name =============================================================================== LOCAL-AREA-POLICY LOCAL-AREA-SERVICES-IN LOCAL-AREA-SERVICES-OUT Device# show mdns-sd cache vlan 10 Name Type TTL/ Remaining _universal. _sub. _ipp. _tcp.local PTR 4500/4486 _ipp. _tcp.local PTR 4500/4486 Bldg-1-FL1-PRN. _ipp. _tcp.local SRV 4500/4486 Bldg-1-FL1PRN.local A 4500/4486 Bldg-1-FL1PRN.local AAAA 4500/4486 Bldg-1-FL1-PRN. _ipp. _tcp.local TXT 4500/4486 Device# show mdns-sd statistics vlan 10 mDNS Statistics Vl10: mDNS packets sent : 612 IPv4 sent : 612 IPv4 advertisements sent : 0 IPv4 queries sent : 612 IPv6 sent :0 IPv6 advertisements sent : 0 IPv6 queries sent :0 Unicast sent :0 mDNS packets rate limited :0 mDNS packets received : 42 advertisements received : 28 queries received : 14 IPv4 received : 42 IPv4 advertisements received: 28 IPv4 queries received : 14 Vlan-Id/ MAC Address RR Record Data Interface-name Vl10 ac18.2651.03fe Bldg-1-FL1-PRN. _ipp. _ Vl10 ac18.2651.03fe Bldg-1-FL1-PRN. _ipp. _ Vl10 ac18.2651.03fe 0 0 631 Bldg-1-FL1-PRN Vl10 ac18.2651.03fe 10.153.1.1 Vl10 ac18.2651.03fe 2001:10:153: 1:79:A40C: Vl10 ac18.2651.03fe (451)'txtvers=1''priority=3 ty=EPSON WF-3620 Ser usb_MFG=EPSON'' usb_MDL=W~'~ Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2314 Cisco DNA Service for Bonjour Verifying Wired SDG Agent Configuration and Service-Routing Status IPv6 received :0 IPv6 advertisements received: 0 IPv6 queries received :0 mDNS packets dropped :0 ========================================= Query Type : Count ========================================= PTR : 12 SRV :0 A :0 AAAA :0 TXT :0 ANY :3 ================================================= PTR Name Advertisement Query ================================================= _ipp. _tcp.local 9 4 Verifying Wired SDG Agent Configuration and Service-Routing Status This section provides information on mDNS configuration and service-routing on Wired and Wireless SDG Agent (SDG-1) with locally attached Layer 2 access switches in Service-Peer (SP-1 and SP-2) mode and with centrally paired Cisco DNA Center for Wide Area Bonjour service-routing. Device# show mdns-sd summary vlan 10 VLAN: 10 ========================================== mDNS Gateway : Enabled mDNS Service Policy : LOCAL-AREA-POLICY Active Query : Disabled Transport Type : IPv4 Service Instance Suffix : Not Configured mDNS Query Type : ALL SDG Agent IP : Not-Configured Source Interface : Not-Configured Device# show mdns-sd cache vlan 10 Name Type _universal. _sub. PTR _ipp. _tcp.local _ipp._tcp.local PTR Bldg-1-FL1- SRV PRN. _ipp._tcp.local Bldg-1-FL1 A -PRN.local TTL/ Remaining 4500/4500 4500/4500 4500/4500 Vlan-Id MAC Address RR Record Data /Interface-name Vl10 ac18.2651.03fe Bldg-1-FL1-PRN. _ipp. _tcp.local Vl10 ac18.2651.03fe Bldg-1-FL1-PRN. _ipp. _tcp.local Vl10 ac18.2651.03fe 0 0 631 Bldg-1-FL1-PRN.local 4500/4500 Vl10 ac18.2651.03fe 10.153.1.1 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2315 Verifying Wired SDG Agent Configuration and Service-Routing Status Cisco DNA Service for Bonjour Name Type Bldg-1-FL1PRN.local AAAA Bldg-1-FL1-PRN. TXT _ipp._tcp.local TTL/ Remaining 4500/4500 4500/4500 Vlan-Id MAC Address RR Record Data /Interface-name Vl10 ac18.2651.03fe 2001:10:153: 1:79 A40C:6BEE: AEEC Vl10 ac18.2651.03fe (451)'txtvers=1'priority=30' ty=EPSON WF-3620 Series'' usb_MFG=EPSONu'sb'_MDL=W~' Device# show mdns-sd sp-sdg statistics Average Input rate (pps) Average Output rate (pps) Messages received: Query ANY query Advertisements Advertisement Withdraw Interface down Vlan down Service-peer ID change Service-peer cache clear Resync response Messages sent: Query response ANY Query response Cache-sync Get service-instance One min, 5 mins, 1 hour : 0, 0, 0 : 0, 0, 0 : 15796 :0 : 28 :0 :0 :0 :0 : 12 :6 : 5975 :0 : 61 :0 Device# show mdns-sd controller detail Controller: DNAC-Policy IP: 100.0.0.1, Dest Port : 9991, Src Port : 42446, State : UP Source Interface: Loopback0, MD5 Disabled Hello Timer 30 sec, Dead Timer 120 sec, Next Hello 00:00:24 Uptime 2d05h (17:02:37 UTC Jan 15 2021) Service Buffer: Enabled Service Announcement: Filter: DNAC-CONTROLLER-POLICY Count 50, Delay Timer 30 sec, Pending Announcement 0, Pending Withdraw 0 Total Export Count 56, Next Export in 00:00:24 Service Query: Query Suppression Enabled Query Count 50, Query Delay Timer 15 sec, Pending 0 Total Query Count 15791, Next Query in 00:00:09 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2316 Cisco DNA Service for Bonjour Verifying Cisco DNA Center Configuration and Service Routing Status Verifying Cisco DNA Center Configuration and Service Routing Status The Cisco Wide Area Bonjour application supports comprehensive assurance capabilities to manage service routing with network-wide distributed Cisco Catalyst switches in SDG Agent role and mDNS services discovered over Wide Area Bonjour domain. The assurance capabilities in Cisco Wide Area Bonjour provides the ability to determine service routing state, mDNS service state, and many more information at various levels for day-2 operations, analysis and troubleshooting. Each category serves unique function to manage and troubleshoot Wide Area Bonjour service routing for day-2 operation. This sub-section provides brief overview for each category of monitor function: · Dashboard: The landing page of Cisco Wide Area Bonjour application provides key statistics in various formats to quickly determine service routing health across the network. The network administrator can monitor operational status of service routing with SDG Agent devices, historical chart of service discovery request, processing and drops from network-wide distributed devices and top five talkers across the network. · Sub-Domain 360°: The network administrator can briefly collect statistics and status counts in 360° view. The left-panel monitoring, and configuration bar is automatically open upon clicking selected sub-domain to verify configured policies, discovered service-instances on per sub-domain basis of the configuration section. · Monitor: A comprehensive 3-tier monitoring and troubleshooting function of Cisco Wide Area Bonjour application for various day-2 operations. The detail view of SDG Agent, Service-Instance, and advanced Troubleshooting capabilities allows network administrator to manage and troubleshoot Wide Area Bonjour domain with a single pane of glass on Cisco DNA Center. For more information, see Cisco Wide Area Bonjour on Cisco DNA Center User Guide, Release 2.1.2 guide. The assurance capabilities and operation details are explained in Monitor the Cisco Wide Area Bonjour Application chapter to manage Cisco Wide Area Bonjour application with various supporting service routing assurance function. Reference Table 165: Related Topic Document Title DNA Service for Bonjour Deployment on Cisco Catalyst 9600 Switch Cisco Catalyst 9600 Series Switch Software Configuration Guide, Release 17.5.X DNA Service for Bonjour Deployment on Cisco Catalyst 9500 Switch Cisco Catalyst 9500 Series Switch Software Configuration Guide, Release 17.5.X DNA Service for Bonjour Deployment on Cisco Catalyst 9400 Switch Cisco Catalyst 9400 Series Switch Software Configuration Guide, Release 17.5.X DNA Service for Bonjour Deployment on Cisco Catalyst 9300 Switch Cisco Catalyst 9300 Series Switch Software Configuration Guide, Release 17.5.X Cisco Wide Area Bonjour Application on Cisco DNA Cisco Wide Area Bonjour Application on Cisco DNA Center User Guide Center User Guide, Release 2.2.2 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2317 Reference Cisco DNA Service for Bonjour Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2318 X I X PA R T Multicast Domain Name System · Multicast Domain Name System, on page 2321 2 0 3 C H A P T E R Multicast Domain Name System · Introduction to mDNS Gateway, on page 2322 · Guidelines and Restrictions for Configuring mDNS AP, on page 2322 · Enabling mDNS Gateway (GUI), on page 2324 · Enabling or Disabling mDNS Gateway (GUI), on page 2324 · Enabling or Disabling mDNS Gateway (CLI), on page 2325 · Creating Default Service Policy, on page 2326 · Creating Custom Service Definition (GUI), on page 2327 · Creating Custom Service Definition, on page 2327 · Creating Service List (GUI), on page 2328 · Creating Service List, on page 2329 · Creating Service Policy (GUI), on page 2330 · Creating Service Policy, on page 2331 · Configuring a Local or Native Profile for an mDNS Policy, on page 2333 · Configuring an mDNS Flex Profile (GUI), on page 2333 · Configuring an mDNS Flex Profile (CLI), on page 2334 · Applying an mDNS Flex Profile to a Wireless Flex Connect Profile (GUI), on page 2334 · Applying an mDNS Flex Profile to a Wireless Flex Connect Profile (CLI), on page 2335 · Enabling the mDNS Gateway on the VLAN Interface, on page 2335 · Location-Based Service Filtering, on page 2336 · Nearest mDNS-Based Wired Service Filtering, on page 2343 · Configuring mDNS AP, on page 2354 · Enabling mDNS Gateway on the RLAN Interface, on page 2355 · Enabling mDNS Gateway on Guest LAN Interface, on page 2358 · Associating mDNS Service Policy with Wireless Profile Policy (GUI), on page 2359 · Associating mDNS Service Policy with Wireless Profile Policy, on page 2359 · Enabling or Disabling mDNS Gateway for WLAN (GUI), on page 2362 · Enabling or Disabling mDNS Gateway for WLAN, on page 2363 · mDNS Gateway with Guest Anchor Support and mDNS Bridging, on page 2364 · Configuring mDNS Gateway on Guest Anchor, on page 2364 · Configuring mDNS Gateway on Guest Foreign (Guest LAN), on page 2365 · Configuring mDNS Gateway on Guest Anchor, on page 2365 · Configuring mDNS Gateway on Guest Foreign (Guest WLAN), on page 2366 · Verifying mDNS Gateway Configurations, on page 2366 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2321 Introduction to mDNS Gateway Multicast Domain Name System Introduction to mDNS Gateway Multicast Domain Name System (mDNS) is an Apple service discovery protocol which locates devices and services on a local network with the use of mDNS service records. The Bonjour protocol operates on service announcements and queries. Each query or advertisement is sent to the Bonjour multicast address ipv4 224.0.0.251 (ipv6 FF02::FB). This protocol uses mDNS on UDP port 5353. The address used by the Bonjour protocol is link-local multicast address and therefore is only forwarded to the local L2 network. As, multicast DNS is limited to an L2 domain for a client to discover a service it has to be part of the same L2 domain, This is not always possible in any large scale deployment or enterprise. In order to address this issue, the Cisco Catalyst 9800 Series Wireless Controller acts as a Bonjour Gateway. The controller then listens for Bonjour services, caches these Bonjour advertisements (AirPlay, AirPrint, and so on) from the source or host. For example, Apple TV responds back to Bonjour clients when asked or requested for a service. This way you can have sources and clients in different subnets. By default, the mDNS gateway is disabled on the controller. To enable mDNS gateway functionality, you must explicitly configure mDNS gateway using CLI or Web UI. The source IP address of all outgoing mDNS packets use the mDNS source interface VLAN SVI IP address. By default, wireless management interface will be the source interface. Guidelines and Restrictions for Configuring mDNS AP · Cisco recommends deploying scalable Wide Area Bonjour to route mDNS service between Wired and Wireless networks. Cisco Catalyst 9800 Series Wireless LAN Controller (WLC) introduces a new mDNS gateway called Service-Peer mode to replace the classic mDNS flood-n-learn to support Enterprise-grade scalable, stateful, and reliable complete unicast-based mDNS service-routing with upstream gateway Cisco Catalyst 9000 Series Switches. For more information, see Cisco DNA Service for Bonjour. · The mDNS AP (classic flood-n-learn based feature) is enhanced with complete unicast-based service-routing using Cisco Wide Area Bonjour supporting flood-free Wired and Wireless networks to overcome several operational, scalable, and service resiliency challenges. · The mDNS AP extends the mDNS flood from Wired VLANs to AP and further extends over the CAPWAP tunnel to WLC for central processing across Core network. Cisco recommends that the mDNS AP must be considered only for small network environments. · The mDNS AP is supported only in Local and Monitor modes. If Cisco Wireless AP is in FlexConnect mode, the Fabric mode AP does not support mDNS AP feature. For more information on how to enable the mDNS service-routing for various distributed Wireless modes, see Cisco DNA Service for Bonjour. · Wireless users connected to mDNS AP may not be able to browse the Wired mDNS services across flooded Wired VLAN to mDNS AP. · The Wired mDNS service-provider VLANs must be extended to flood the mDNS traffic upto mDNS AP ethernet port in trunk mode settings. The Wired VLAN extension to mDNS AP may include other Wired flood traffic, such as Broadcast, Unknown Unicast, and Layer 2 Multicast that impacts the mDNS AP scale and performance. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2322 Multicast Domain Name System Guidelines and Restrictions for Configuring mDNS AP · It is recommended to have minimum one mDNS AP for each Layer 3 Access switch. All Wired mDNS traffic is flooded using alternate L2 methods, if single mDNS AP is shared between multiple Layer 3 Access switch. · The maximum mDNS AP scale limit for each Cisco Catalyst 9800 Series Wireless LAN Controller (WLC) is limited. · The maximum mDNS Wired VLAN count for each WLC is limited. · The old Wired mDNS service entry continues to be advertised to all Wireless users up to 4500 seconds based on the mDNS cache timers on WLC. The stale entries require manual clearing from local cache in WLC. · The mDNS AP does not support mDNS Query packet suppression or rate-limiter in AP. The Wired mDNS flood from all Wired VLAN is extended to WLC for central processing of policy enforcement. · The maximum number of flooded packets for each second processing from Wired VLANs to mDNS AP is limited. The mDNS AP performance and reliability may get compromised in large network environments. · A maximum of 10 Wired VLANs' mDNS flood can be extended to mDNS AP. Combined large Wired VLAN and mDNS AP scale may impact scale and performance in AP and WLC. · Only one mDNS AP is supported for each Wired VLAN. Multiple mDNS APs cannot be configured to map the same Wired VLAN ID as it causes service instability and duplicate processing. · High Availability is not supported in multiple mDNS AP. The mDNS services across Wired and Wireless network gets disrupted when connectivity to mDNS AP is lost due to any kinds of failures. · Only one Wired mDNS service-policy is supported for all network-wide mDNS AP. · The following limitations hold true when mDNS AP introduces LSS-based mDNS service filtering between flooded Wired VLANs to Wireless: · A single mDNS AP with LSS enabled can distribute Wired mDNS services only to nearby limited APs in neighbor list. The Wireless users connected to the non-neighbor list may not be able to discover any Wired mDNS services. · Only one mDNS AP can be deployed in each Wired VLAN. The Wired VLANs need to be reconfigured across LAN network to enable unique LSS-based mDNS AP in locations. For instance, to achieve mDNS service discovery in each floor, the Wired VLAN or Subnet must be on each floor with one mDNS AP per floor to discover all other APs as neighbor in the same floor. · The mDNS AP do not support IPv6 for Wired mDNS service-provider or service-receiver. Only IPv4 is supported. · The mDNS AP do not support role-based mDNS service filtering between Wired and Wireless networks. · The mDNS AP do not detect and auto-resolve duplicate mDNS service-instance names across Wired VLANs. The Cisco Catalyst 9800 Series Wireless LAN Controller (WLC) discovers and records the first service instance with unique name in its local cache database. If a duplicate service instance name is discovered, the WLC rejects the duplicate name and does not distribute it to the Wireless clients. · Wireless link-local gets enabled automatically, when wireless multicast is enabled. When wireless link-local is enabled, only mDNS Bridging mode is supported. To use mDNS Gateway for wired services, disable wireless link-local. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2323 Enabling mDNS Gateway (GUI) Multicast Domain Name System · In the mDNS gateway mode, controller does not support service discovery from the mDNS messages using multiple IP fragments. Enabling mDNS Gateway (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Configuration > Services > mDNS. In the Global section, toggle the slider to enable or disable the mDNS Gateway. From the Transport drop-down list, choose one of the following types: · ipv4 · ipv6 · both Enter an appropriate timer value in Active-Query Timer. The valid range is between 1 to 120 minutes. The default is 30 minutes. From the mDNS-AP Service Policy drop-down list, choose an mDNS service policy. Note Service policy is optional only if mDNS-AP is configured. If mDNS-AP is not configured, the system uses default-service-policy. Click Apply. Enabling or Disabling mDNS Gateway (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Services > mDNS > Global. Enable or disable the mDNS Gateway toggle button. Choose ipv4 or ipv6 or both from the Transport drop-down list. Enter the Active-Query Timer. Click Apply. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2324 Multicast Domain Name System Enabling or Disabling mDNS Gateway (CLI) Enabling or Disabling mDNS Gateway (CLI) Note · mDNS gateway is disabled by default globally on the controller. · You need both global and WLAN configurations to enable mDNS gateway. Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 mdns-sd gateway Example: Device(config)# mdns-sd gateway Enables mDNS gateway. Step 4 location {ap-location | ap-name | Filters mDNS gateway based on location. location-group | lss | regex | site-tag | ssid} Here, Example: · ap-location signifies location-based Device(config-mdns-sd)# location site-tag filtering using AP location. · ap-name signifies location-based filtering using AP name. · location-group signifies location-based filtering using location group. · lss signifies location-based filtering using Location Specific Services (LSS). · regex signifies location-based filtering using Regular Expression. · site-tag signifies location-based filtering using site tag. · ssid signifies location-based filtering using SSID. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2325 Creating Default Service Policy Multicast Domain Name System Step 5 Step 6 Step 7 Step 8 Command or Action Purpose Note The lss is the default location filter, if mDNS gateway is configured globally. transport {ipv4 | ipv6 | both} Example: Device(config-mdns-sd)# transport ipv4 Processes mDNS message on a specific transport. Here, ipv4 signifies that the IPv4 mDNS message processing is enabled. This is the default value. ipv6 signifies that the IPv6 mDNS message processing is enabled. both signifies that the IPv4 and IPv6 mDNS message is enabled for each network. active-query timer active-query-periodicity Example: Device(config-mdns-sd)# active-query timer 15 Changes the periodicity of mDNS multicast active query. Note An active query is a periodic mDNS query to refresh dynamic cache. Here, active-query-periodicity refers to the active query periodicity in Minutes. The valid range is from 1 to 120 minutes. Active query runs with a default periodicity of 30 minutes. source-interface vlan vlan-id Configures the source interface to communicate Example: between SDG agent and service peer. By default, wireless management interface is used. Device(config-mdns-sd)# source-interface The interface that you configure will be used vlan 101 for all mDNS transactions. exit Example: Device(config-mdns-sd)# exit Returns to global configuration mode. Creating Default Service Policy When the mdns gateway is enabled on any of the WLANs by default, mdns-default-service-policy is associated with it. Default service policy consists of default-service-list and their details are explained in this section. You can override the default service policy with a custom service policy. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2326 Multicast Domain Name System Creating Custom Service Definition (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Create a service-definition if the service is not listed in the preconfigured services. Create a service list for IN and OUT by using the service-definitions. Use the existing service list to create a new service. For more information, refer to Creating Service Policy section. Attach the mdns-service-policy to the profile or VLAN that needs to be enforced. To check the default-mdns-service list, use the following command: show mdns-sd default-service-list Creating Custom Service Definition (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Services > mDNS. In the Service Definition section, click Add. In the Quick Setup: Service Definition page that is displayed, enter a name and description for the service definition. Enter a service type and click + to add the service type. Click Apply to Device. Creating Custom Service Definition Service definition is a construct that provides an admin friendly name to one or more mDNS service types or A pointer (PTR) Resource Record Name. By default, few built-in service definitions are already predefined and available for admin to use. In addition to built-in service definitions, admin can also define custom service definitions. You can execute the following command to view the list of all the service definitions (built-in and custom): Device# show mdns-sd master-service-list Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2327 Creating Service List (GUI) Multicast Domain Name System Step 2 Step 3 Command or Action configure terminal Example: Device# configure terminal mdns-sd service-definition service-definition-name Example: Device(config)# mdns-sd service-definition CUSTOM1 Purpose Enters global configuration mode. Configures mDNS service definition. Note · All the created custom service definitions are added to the primary service list. · Primary service list comprises of a list of custom and built-in service definitions. Step 4 Step 5 service-type string Configures mDNS service type. Example: Device(config-mdns-ser-def)# service-type _custom1._tcp.local exit Example: Device(config-mdns-ser-def)# exit Returns to global configuration mode. Creating Service List (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Configuration > Services > mDNS. In the Service List section, click Add. In the Quick Setup: Service List page that is displayed, enter a name for the service list. From the Direction drop-down list, choose IN for inbound filtering or OUT for outbound filtering. From the Available Services drop-down list, choose a service type to match the service list. Note To allow all services, choose the all option. Click Add Services. From the Message Type drop-down list, choose the message type to match from the following options: · any--To allow all messages. · announcement--To allow only service advertisements or announcements for the device. · query--To allow only a query from the client for a service in the network. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2328 Multicast Domain Name System Creating Service List Step 8 Step 9 Click Save to add services. Click Apply to Device. Creating Service List mDNS service list is a collection of service definitions. Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 mdns-sd service-list service-list-name {IN | OUT} Example: Device(config)# mdns-sd service-list Basic-In IN Device(config)# mdns-sd service-list Basic-Out OUT Configures mDNS service list. · IN: Provides inbound filtering. · Out: Provides outbound filtering. Step 4 match service-definition-name message-type Matches the service to the message type. {announcement | any | query} Here, service-definition-name refers to the Example: names of services, such as, airplay, airserver, Device(config-mdns-sl-in)# match CUSTOM1 airtunes, and so on. message-type query Note To add a service, the service name must be part of the primary service list. If the mDNS service list is set to IN, you get to view the following command: match service-definition-name message-type {announcement | any | query}. If the mDNS service list is set to Out, you get to view the following command: match service-definition-name. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2329 Creating Service Policy (GUI) Multicast Domain Name System Step 5 Step 6 Step 7 Command or Action Purpose (OR) match all message-type {announcement | any Matches all services to the message type. | query} Note To add a service, the service name Example: must be part of the primary Device(config-mdns-sl-in)# match all service list. message-type query If the mDNS service list is set to IN, you get to view the following command: match all message-type {announcement | any | query}. If the mDNS service list is set to OUT, you get to view the following command: match all. In case of IN or OUT filter, if any of the service contains the same or subset of the message type (query or announcement), the match all is not allowed unless the existing services are removed. show mdns-sd service-list {direction | name Displays inbound or outbound direction list of } the configured service-list to classify matching service-types for service-policy. The list can be filtered by name or specific direction. exit Example: Device(config-mdns-sl-in)# exit Returns to global configuration mode. Creating Service Policy (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Configuration > Services > mDNS. In the Service Policy section, click Add. In the Quick Setup: Service Policy page that is displayed, enter a name for the service policy. From the Service List Input drop-down list, choose one of the types. From the Service List Output drop-down list, choose one of the types. From the Location drop-down list, choose the location you want to associate with the service list. Click Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2330 Multicast Domain Name System Creating Service Policy Creating Service Policy mDNS service policy is used for service filtering while learning services or responding to queries. Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 mdns-sd service-policy service-policy-name Enables mDNS service policy. Example: Device(config)# mdns-sd service-policy mdns-policy1 Step 4 location {ap-location | ap-name | location-group | lss | regex | site-tag | ssid} Example: Filters mDNS service types based on location filter. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2331 Creating Service Policy Multicast Domain Name System Command or Action Device(config-mdns-ser-pol)# location lss Purpose Note · If location filter is not applied during service policy, the global location filter (default=lss) will be considered. · The location filter from the service policy takes precedence even if the global location filter is configured. · In Location Specific Services (LSS) based filtering, the mDNS gateway responds with the service instances learnt from the neighboring APs of the querying client AP. Other service instances for the rest of APs are filtered. · In Site tag based filtering, the mDNS gateway responds with the service instances that belong to the same site-tag as that of querying client. · The mDNS gateway responds back with wired services even if the location based filtering is configured. Step 5 Step 6 service-list service-list-name {IN | OUT} Configures various service-list names for IN Example: and OUT directions. Device(config-mdns-ser-pol)# service-list Note VLAN100-list IN If an administrator decides to create or use a custom service policy, then the custom service policy must be configured with service-lists for both directions (IN and OUT); otherwise, the mDNS Gateway will not work (will not learn services if there is no IN service-list, or will not reply or announce services learned if there is no OUT service-list). exit Example: Returns to global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2332 Multicast Domain Name System Configuring a Local or Native Profile for an mDNS Policy Command or Action Device(config-mdns-ser-pol)# exit Purpose Configuring a Local or Native Profile for an mDNS Policy When an administrator configures local authentication and authorization and does not expect to get any mDNS policy from the AAA server, the administrator can configure a local or native profile to select a mDNS policy based on user, role, or device type. When this local or native profile is mapped to the wireless profile policy, mDNS service policy is applied on the mDNS packets that are processed on that WLAN. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 service-template template-name Example: Device(config)# service-template mdns Configures the service-template or identity policy. Step 3 mdns-service-policy mdns-policy-name Example: Device(config-service-template)# mdns-service-policy mdnsTV Configures the mDNS policy. Step 4 exit Example: Device(config-service-template)# exit Returns to global configuration mode. Configuring an mDNS Flex Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Configuration > Services > mDNS. In the mDNS Flex Profile section, click Add. The Add mDNS Flex Profile window is displayed. In the Profile Name field, enter the flex mDNS profile name. In the Service Cache Update Timer field, specify the service cache update time. The default value is 1 minute. The valid range is from 1 to 100 minutes. In the Statistics Update Timer field, specify the statistics update timer. The default value is 1 minute. The valid range is from 1 to 100 minutes. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2333 Configuring an mDNS Flex Profile (CLI) Multicast Domain Name System Step 6 Step 7 In the VLANs field, specify the VLAN ID. You can enter multiple VLAN IDs separated by commas, or enter a range of VLAN IDs. Maximum number of VLANs allowed is 16. Click Apply to Device. Configuring an mDNS Flex Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 mdns-sd flex-profile mdns-flex-profile-name Enters the mDNS Flex Profile mode. Example: Device(config)# mdns-sd flex-profile mdns-flex-profile-name Step 3 update-timer service-cache service-cache timer-value <1-100> Example: Device(config-mdns-flex-profile)# update-timer service-cache 60 Configures the mDNS update service cache timer for the flex profile. The default value is 1 minute. Value range is between 1 minute and 100 minutes. Step 4 update-timer statistics statistics timer-value Configures the mDNS update statistics timer <1-100> for the flex profile. Example: Device(config-mdns-flex-profile)# update-timer statistics 65 The default value is 1 minute. The valid range is from 1 to 100 minutes. Step 5 wired-vlan-range wired-vlan-range value Example: Device(config-mdns-flex-profile)# wired-vlan-range 10 - 20 Configures the mDNS wired VLAN range for the flex profile. The default value is 1 minute. The valid range is from 1 minute to 100 minutes. Applying an mDNS Flex Profile to a Wireless Flex Connect Profile (GUI) Procedure Step 1 Choose Configuration > Tags & Profiles > Flex. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2334 Multicast Domain Name System Applying an mDNS Flex Profile to a Wireless Flex Connect Profile (CLI) Step 2 Step 3 Step 4 Click Add. The Add Flex Profile window is displayed. Under the General tab, from the mDNS Flex Profile drop-down list, choose a flex profile name from the list. Click Apply to Device. Applying an mDNS Flex Profile to a Wireless Flex Connect Profile (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile flex wireless-flex-profile-name Enters wireless flex profile configuration mode. Example: Device# wireless profile flex wireless-flex-profile-name Step 3 mdns-sd mdns-flex-profile Example: Device(config-wireless-flex-profile)# mdns-sd mdns-flex-profile-name Enables the mDNS features for all the APs in the profile Enabling the mDNS Gateway on the VLAN Interface This procedure configures the mDNS service policy for a specific VLAN. This allows the administrator to configure different settings to the mDNS packets on per VLAN interface basis and not on per WLAN basis. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 interface vlan vlan-interface-number Example: Device(config)# interface vlan 200 Purpose Enters global configuration mode. Configures a VLAN ID and enters interface configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2335 Location-Based Service Filtering Multicast Domain Name System Step 3 Step 4 Step 5 Step 6 Command or Action Purpose ip address ip-address subnet-mask Configures the IP address for the interface. Example: Device(config-if)# ip address 111.1.1.1 255.255.255.0 mdns-sd gateway Example: Device(config-if)# mdns-sd gateway Enables mDNS configuration on a VLAN interface. service-policy service-policy-name Configures the service policy. Example: Note Device(config-if-mdns-sd)# service-policy test-mDNS-service-policy If specific service-policy-name is not defined, the VLAN will use the default-mdns-service-policy by default. By default, default-mDNS-service-policy gets created in the system and it will use default-mDNS-service-list configuration for filtering mDNS service announcement and queries. end Example: Device(config-if-mdns-sd)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Location-Based Service Filtering Prerequisite for Location-Based Service Filtering You need to create the Service Definition and Service Policy. For more information, see Creating Custom Service Definition section and Creating Service Policy section. Configuring mDNS Location-Based Filtering Using SSID When a service policy is configured with the SSID as the location name, the response to the query will be the services that were learnt on that SSID. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2336 Multicast Domain Name System Configuring mDNS Location-Based Filtering Using AP Name Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 mdns-sd service-policy service-policy-name Configures the service policy. Example: Device(config)# mdns-sd service-policy mdns-policy1 Step 3 location ssid Example: Device(config-mdns-ser-pol)# location ssid Configures location-based filtering using SSID. Step 4 end Example: Device(config-mdns-ser-pol)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring mDNS Location-Based Filtering Using AP Name When a service policy is configured with the AP name as the location, the response to the query will be the services that were learnt on that AP. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 mdns-sd service-policy service-policy-name Configures the service policy. Example: Device(config)# mdns-sd service-policy mdns-policy1 Step 3 location ap-name Example: Device(config-mdns-ser-pol)# location ap-name Configures location-based filtering using an AP name. Step 4 end Example: Device(config-mdns-ser-pol)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2337 Configuring mDNS Location-Based Filtering Using AP Location Multicast Domain Name System Configuring mDNS Location-Based Filtering Using AP Location When a service policy is configured with location as the AP-location, the response to the query will be the services that were learnt on all the APs using the same AP "location" name (not to be confused with "site-tag"). Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 mdns-sd service-policy service-policy-name Configures the service policy. Example: Device(config)# mdns-sd service-policy mdns-policy1 Step 3 location ap-location Example: Device(config-mdns-ser-pol)# location ap-location Configures location-based filtering using the AP location. Step 4 end Example: Device(config-mdns-ser-pol)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring mDNS Location-Based Filtering Using Regular Expression · When a service policy is configured with the location as a regular expression that matches the corresponding AP name, the response to the query will be the services that were learnt on a group of APs based on the AP name. · When a service policy is configured with the location as a regular expression that matches the corresponding AP location, the response to the query will be the services that were learnt on a group of APs based on the AP location. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 mdns-sd service-policy service-policy-name Configures the service policy. Example: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2338 Multicast Domain Name System Configuring mDNS Location-Based Filtering Using Location Group Step 3 Step 4 Command or Action Purpose Device(config)# mdns-sd service-policy mdns-policy1 location regex {ap-location regular-expression Configures location-based filtering using regular | ap-name regular-expression} expression. Example: Device(config-mdns-ser-pol)# location regex ap-location dns_location Device(config-mdns-ser-pol)# location regex ap-name dns_name end Returns to privileged EXEC mode. Example: Device(config-mdns-ser-pol)# end Alternatively, you can also press Ctrl-Z to exit global configuration mode. Note To filter the services for which AP names have the specific keyword such as AP-2FLR-SJC-123, you can use the regex AP name as AP-2FLR- to match the services that are learnt from the set of access points. Configuring mDNS Location-Based Filtering Using Location Group Feature History for mDNS Location-Based Filtering Using Location Group (Microlocation) This table provides release and related information for the feature explained in this module. This feature is also available in all the releases subsequent to the one in which they are introduced in, unless noted otherwise. Table 166: Feature History for mDNS Location-Based Filtering Using Location Group (Microlocation) Release Cisco IOS XE Cupertino 17.9.1 Feature mDNS Location-Based Filtering Using Location Group (Microlocation) Feature Information The controller is enhanced to support microlocation from wireless clients tagged with the location group (mDNS Group ID) tag. From Cisco IOS-XE 17.3 onwards, location grouping is done based on AP names. From Cisco IOS-XE 17.9 onwards, location grouping is extended to AP location. Information About mDNS Location-Based Filtering Using Location Group (Microlocation) In the context of Apple Bonjour, Microlocation refers to the smaller subset of a wireless location. This is also referred to as mDNS AP Group or Location Group. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2339 Use Cases for mDNS Location-Based Filtering Using Location Group (Microlocation) Multicast Domain Name System To create an mDNS AP location group, perform the following procedure: 1. Define multiple rules with priority in the wireless rule-based mDNS application. Note The rules have AP microlocation grouping as AP name or AP location. 2. Match the highest priority rule-based on the configured regular expression with AP name and AP location-based grouping. 3. Map an AP to a location group (mDNS Group ID). Note When you delete or modify a rule, the corresponding APs are revalidated (using the capwap restart command) to apply the updated configuration. AP Microlocation Support Based on AP Location From Cisco IOS-XE 17.3 onwards, AP location is configured using the ap name name location location command. From Cisco IOS-XE 17.9 onwards, AP location is leveraged to group APs belonging to a location to form a location group. By default, AP microlocation, based on either AP name or AP location, is disabled. Use Cases for mDNS Location-Based Filtering Using Location Group (Microlocation) · Restricts services across departments. · Shares files across building or sites. · Teachers or students, doctors or patients, employees or groups need service visibility in contained environment without intervening with IT to change to L2 or L3 networks. Prerequisites for mDNS Location-Based Filtering Using Location Group (Microlocation) You must have configured the mDNS rule. By default, the AP name-based microlocation grouping is used. Enabling Location Group (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2340 Multicast Domain Name System Adding APs to a Location Group (CLI) Step 2 Step 3 Step 4 Step 5 Command or Action Purpose mdns-sd service-policy service-policy-name Configures mDNS service policy. Example: Device(config)# mdns-sd service-policy mdns-policy1 service-list service-list-name {in | out} Example: Configures service lists for IN and OUT directions. Device(config-mdns-ser-pol)# service-list VLAN100-list in Device(config-mdns-ser-pol)# service-list VLAN300-list out location location-group Example: Device(config-mdns-ser-pol)# location location-group Configures location-based filtering using location group. end Example: Device(config-mdns-ser-pol)# end Returns to privileged EXEC mode. Adding APs to a Location Group (CLI) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless rule application mdns Example: Configures wireless rule-based MDNS application. Device(config)# wireless rule application mdns Step 3 rule-priority rule_priority rule-name rule_name Example: Device(config-app-rule)# rule-priority 2011 rule-name R2011 Configures rule priority. Here, · rule_priority: The valid range is from 0 to 4096. Note 0 is the lower priority number and 4096 is the higher priority number. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2341 Adding APs to a Location Group (CLI) Multicast Domain Name System Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Command or Action Purpose · rule_name: The rule name can be between 1 to 32 characters. Note When you configure the rule priority, you will be prompted as follows: Changing regex string or other rule configuration may cause associated APs to rejoin When you see this prompt, enter Y to continue with the configuration. regex regular_expression_string Example: Configures rule-based on AP name or AP location to match the regular expression. Device(config-rule-params)# regex AP_Name action-type grouping Groups APs based on the filter string. Example: Device(config-rule-params)# action-type grouping group-id location_group_identifier Configures the mDNS location group identifier. Example: Valid range for location_group_identifier is 1 Device(config-rule-action-mdns)# group-id to 4096. 44 group-method ap location Example: Device(config-rule-action-mdns)# group-method ap location Configures AP location-based grouping. Note If you consider group-method as ap location, the regex captures the AP_LOC_NAME. By default, the group-method is configured with AP_NAME. group-name location_group_name Example: Device(config-rule-action-mdns)# group-name G2011 end Example: Device(config-rule-action-mdns)# end Configures mDNS location group name. Returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2342 Multicast Domain Name System Verifying AP Location Verifying AP Location To verify the mDNS location Group ID associated with an AP, use the following command: Device# show ap config general | sec MDNS | AP Name Cisco AP Name : AP2800 MDNS Group Id : 101 MDNS Rule Name : R101 MDNS Group Method : AP Location To verify all the APs associated with the configured mDNS rule name, use the following command: Device# show wireless associated-ap mdns-rule-name R1 AP MAC AP Name ------------------------------------------------------------------ 0cd0.f894.a840 AP0CD0.F894.083C 4001.7a03.8560 APA023.9F66.4F96 -------------------- To verify all the APs associated with the configured mDNS location group ID, use the following command: Device# show wireless associated-ap mdns-group-id 1 AP MAC AP Name ------------------------------------------------------------------ 0cd0.f894.a840 AP0CD0.F894.083C 4001.7a03.8560 APA023.9F66.4F96 -------------------- To verify the mDNS group method detail for each AP, use the following command: Device# show ap config general | inc MDNS|AP Name|Location Cisco AP Name : AP-1 MDNS Group Id : 100 MDNS Rule Name : R100 MDNS Group Method : AP Location To verify the mDNS group method detail for each rule, use the following command: Device# show wireless rule application mdns Rule Name : R100 Rule Priority : 100 Regular Expression : AP0 Action Type : MDNS Grouping MDNS Group ID : 100 MDNS Group Name : G100 MDNS Group Method: AP Location Nearest mDNS-Based Wired Service Filtering Feature History for Nearest mDNS-Based Wired Service Filtering This table provides release and related information for features explained in this module. These features are available on all releases subsequent to the one they were introduced in, unless noted otherwise. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2343 Information About Nearest mDNS-Based Wired Service Filtering Multicast Domain Name System Table 167: Feature History for Nearest mDNS-Based Wired Service Filtering Release Cisco IOS XE Cupertino 17.8.1 Feature Nearest mDNS-Based Wired Service Filtering Feature Information This feature supports the following functionalities: · Nearest mDNS based wired service filtering. (Supported in Central switched Local mode.) · Custom wired service policy support for FlexConnect mode. · VLAN and MAC based wired service filtering. (Supported in Central switched Local mode.) Information About Nearest mDNS-Based Wired Service Filtering Prior to Cisco IOS XE 17.8.1 release, the wireless clients discover the following: · All wired services from mDNS-AP. · Service providers on VLANs visible to the controller. Note The current filtering is supported only for wireless services. From Cisco IOS XE 17.8.1 onwards, the wireless clients are enhanced to support filter-based on the nearest wired service provider. Note The controller classifies the wired services as the nearest wired services once the LSS is enabled. The mDNS-AP forwards or advertises the nearest wired services. The following figure illustrates the nearest wired service provider and discovery: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2344 Multicast Domain Name System Information About Nearest mDNS-Based Wired Service Filtering Figure 83: Nearest Wired Service Provider and Discovery As per the figure, the controller is associated with the following four APs: · CAPWAP AP-1 · CAPWAP AP-2 · CAPWAP AP-3 · CAPWAP AP-4 The client connected to CAPWAP AP-1 is wireless and advertises the service Apple TV-1. Similarly, the client connected to CAPWAP AP-2 is wireless and advertises the service MacBook query client. The CAPWAP AP-3 is enabled as an mDNS-AP. This AP then discovers the wired services on VLANs and forwards them to the controller. In this case, the client advertising the service AppleTV-3 is a wired service. The client is then discovered by CAPWAP AP-3 and forwarded to the controller. You will also view another client connected to CAPWAP AP-3 that is wireless and advertises the service AppleTV-2. The client connected to CAPWAP AP-4 is wireless and advertises the service Printer-2 and iPad query client. Also, a client is connected directly to the controller, which advertises the Printer-1. The controller covers cache populated from both wireless and wired service providers. The controller populates the following cache: · AppleTV-1 (Wireless service from CAPWAP AP-1) · AppleTV-2 (Wireless service from CAPWAP AP-3) · AppleTV-3 (Wired service from mDNS-AP enabled AP-3) Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2345 Information About Custom Wired Service Policy Support for FlexConnect Mode Multicast Domain Name System · Printer-1 (Wired service from directly bridged service provider) · Printer-2 (Wireless service from AP-4) When LSS is enabled, AP-1 and AP-2 discover each other as LSS neighbors. Similarly, AP-3 and AP-4 discover each other as LSS neighbors. MacBook discovers the following services: · AppleTV-1 (Wireless service from AP-1) · Printer-1 (Wired service from the directly bridged service provider) Note MacBook does not discover the wired service AppleTV-3 (forwarded by mDNS-AP AP-3). The AP-2 does not see AP-3 as the LSS neighbor. Thus, the controller does not classify the wired service AppleTV-3 as nearby. iPad discovers the following services: · AppleTV-2 (Wireless service from AP-3) · AppleTV-3 (Wired service from mDNS-AP enabled AP-3) · Printer-1 (Wired service from directly bridged service provider) · Printer-2 (Wireless service from AP-4) Note iPad discovers the wired service AppleTV-3 (forwarded by mDNS-AP AP-3). The AP-4 sees AP-3 as the LSS neighbor. Thus, the controller classifies the wired service AppleTV-3 as nearby. Note This feature supports only the wired services advertised by mDNS-AP in centrally switched local mode. Information About Custom Wired Service Policy Support for FlexConnect Mode From Cisco IOS XE 17.8.1 release onwards, the custom service policy for wired services is supported in a Flex profile. Here, the service policy refers to the mDNS service policy. Information About VLAN and MAC Based Wired Service Filtering Prior to Cisco IOS XE 17.8.1 release, service filtering was based on service types, location type, and location filter. These filters are applicable for wireless services. However, they are not supported for wired services. From Cisco IOS XE 17.8.1 release onwards, the VLAN and MAC based filtering is supported for wired services. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2346 Multicast Domain Name System Prerequisite for Nearest mDNS-Based Wired Service Filtering Note · In case of wired services, the VLAN and MAC based filtering is applicable for OUT direction filter advertised by mDNS-AP and directly bridged wired services. · The VLAN and MAC based filtering is applicable for centrally switched local mode. Prerequisite for Nearest mDNS-Based Wired Service Filtering · Enable the mDNS gateway on the controller. Use Cases The following are the use cases: · Nearest mDNS-Based Wired Service Filtering. · Custom Wired Service Policy Support for FlexConnect Mode. · VLAN and MAC Based Wired Service Filtering. While migrating from AireOS wireless controllers to the Cisco Catalyst 9800 Series Wireless Controllers, the following limitations occur: · The wireless clients discover all the wired services and not just the nearby service from the wired service provider when central switched local mode and LSS in enabled. The wired services belong to the forwarded mDNS-AP and directly bridged ones. · There is no provision to apply the custom service policy for wired services when locally switched FlexConnect mode is enabled. The mDNS flex profile must have the custom wired service policy as well. · There is no provision to filter based on the VLAN and MAC address for wired services in centrally switched local mode. Configuring Wired Service Policy Support in Flex Profile Creating Service List (CLI) Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2347 Creating Service List (CLI) Multicast Domain Name System Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Command or Action configure terminal Example: Device# configure terminal mdns-sd service-list service-list-name IN Example: Device(config)# mdns-sd service-list srvc_list_in IN match service-definition-name Example: Device(config)# match airplay Example: Device(config)# match printer_ipp Purpose Enters global configuration mode. Configures mDNS service list for inbound filtering. Matches the service to the service definition name. Here, service-definition-name refers to the names of services, such as, airplay, airserver, airtunes, and so on. Note To add a service, the service name must be part of the primary service list. The same set of service list will be used for both IN and OUT filters. mdns-sd service-list service-list-name OUT Example: Device(config)# mdns-sd service-list srvc_lst_out OUT Configures mDNS service list for outbound filtering. match service-definition-name Matches the service to the service definition Example: name. Here, service-definition-name refers to the names of services, such as, airplay, airserver, Device(config-mdns-sl-out)# match airplay airtunes, and so on. Note To add a service, the service name must be part of the primary service list. The same set of service list will be used for both IN and OUT filters. exit Example: Device(config-mdns-sl-out)# exit Exits mDNS service list configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2348 Multicast Domain Name System Creating Service Policy (CLI) Creating Service Policy (CLI) Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 mdns-sd service-policy service-policy-name Configures mDNS service policy. Example: Device(config)# mdns-sd service-policy custom_wired_policy Step 4 service-list service-list-name {in | out} Example: Configures service lists for IN and OUT directions. Device(config-mdns-ser-pol)# service-list srvc_list_in IN Device(config-mdns-ser-pol)# service-list srvc_list_out OUT Step 5 location lss Example: Device(config-mdns-ser-pol)# location lss Enables Location Specific Services (LSS) for the mDNS service. Step 6 exit Example: Device(config-mdns-ser-pol)# exit Exits mDNS service policy configuration mode. Configuring an mDNS Flex Profile (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Services > mDNS. In the mDNS Flex Profile section, click Add. In the Add mDNS Flex Profile window that is displayed, enter the Flex mDNS profile name in the Profile Name field. In the Service Cache Update Timer field, specify the service cache update time. The value range is between 1 and 100 minutes. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2349 Configuring an mDNS Flex Profile (CLI) Multicast Domain Name System Step 5 Step 6 Step 7 Step 8 In the Statistics Update Timer field, specify the statistics update timer. The value range is between 1 and 100 minutes. In the VLANs field, specify the VLAN ID. You can enter multiple VLAN IDs separated by commas or enter a range of VLAN IDs. Maximum number of VLANs allowed is 16. Enter or select a Wired Service Policy from the drop-down list to associate a Wired filter to mDNS Flex-Profile. In addition to filtering mDNS service queries based on the static default service list, wired filter will support filtering based on custom service lists. The new wired service-policy will be added to flex-profile construct to support the custom wired service-policy. The AP will apply this configuration for wired services and the respective IN and OUT filters will be used for advertisements and queries only if the custom wired service-policy is configured in mDNS flex-profile. In case a custom service-policy is removed from the mDNS flex-profile, the AP will remove the custom service-policy and apply the default service-policy for wired services. This feature is supported only in locally switched FlexConnect mode. Click Apply to Device. Configuring an mDNS Flex Profile (CLI) Procedure Step 1 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. Step 2 configure terminal Example: Device# configure terminal Enters global configuration mode. Step 3 mdns-sd flex-profile mdns-flex-profile-name Configures an mDNS Flex profile. Example: Device(config)# mdns-sd flex-profile custom_flex_profile Step 4 update-timer service-cache timer-value <1-100> Example: Device(config-mdns-flex-prof)# update-timer service-cache 15 Configures the mDNS update service cache timer for the flex profile. The default value is 1 minute. Value range is between 1 minute and 100 minutes. Step 5 update-timer statistics statistics timer-value Configures the mDNS update statistics timer <1-100> for the flex profile. Example: Device(config-mdns-flex-prof)# update-timer statistics 10 The default value is 1 minute. The valid range is from 1 to 100 minutes. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2350 Multicast Domain Name System Configuring VLAN and MAC Based Wired Service Filtering (CLI) Step 6 Step 7 Step 8 Command or Action wired-vlan-range wired-vlan-range value Example: Device(config-mdns-flex-prof)# wired-vlan-range 30 Purpose Configures the mDNS wired VLAN range for the flex profile. The default value is 1 minute. The valid range is from 1 minute to 100 minutes. wired-service-policy service-policy-name Associates the wired service policy with mDNS Example: flex profile. Device(config-mdns-flex-prof)# Note wired-service-policy custom_wired_policy Here, service-policy-name refers to the mDNS service policy created earlier. For more information, refer to Creating Service Policy (CLI). end Example: Device(config-mdns-flex-prof)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Configuring VLAN and MAC Based Wired Service Filtering (CLI) Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Command or Action enable Example: Device> enable Purpose Enables privileged EXEC mode. Enter your password, if prompted. configure terminal Example: Device# configure terminal Enters global configuration mode. mdns-sd wired-filter wired-filter-name Example: Device(config)# mdns-sd wired-filter WIRED_FILTER_APPLE_TV Configures an mDNS wired filter. match mac service-provider-mac-address1 Matches the wired filter with the MAC address Example: of the wired service. Device(config-mdns-wired-filter)# match mac a886.ddb2.05e9 match vlan range Example: Matches the wired filter with the VLAN of the wired service. Device(config-mdns-wired-filter)# match vlan 100 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2351 Configuring VLAN and MAC Based Wired Service Filtering (CLI) Multicast Domain Name System Step 6 Step 7 Step 8 Step 9 Step 10 Step 11 Step 12 Step 13 Command or Action Purpose exit Exits mDNS gateway configuration mode. Example: Device(config-mdns-wired-filter)# exit configure terminal Example: Device# configure terminal Enters global configuration mode. mdns-sd service-list service-list-name IN Example: Device(config)# mdns-sd service-list srvc_lst_in IN Configures mDNS service list for inbound filtering. match service-definition-name Example: Device(config)# match airplay Matches the service to the names of the services. Here, service-definition-name refers to the names of services, such as, airplay, airserver, airtunes, and so on. mdns-sd service-list service-list-name OUT Configures mDNS service list for outbound Example: filtering. Device(config)# mdns-sd service-list srvc_lst_out OUT match apple-tv wired-filter wired-filter-name Matches the Apple TV related wired filter. Example: Device(config-mdns-sl-out)# match apple-tv wired-filter WIRED_FILTER_APPLE_TV mdns-sd service-policy service-policy-name Enables mDNS service policy. Example: Device(config)# mdns-sd service-policy custom_policy service-list service-list-name {IN | OUT} Example: Device(config-mdns-ser-pol)# service-list srvc_lst_in IN Device(config-mdns-ser-pol)# service-list srvc_lst_in OUT Configures various service-list names for IN and OUT directions. Note If an administrator decides to create or use a custom service policy, then the custom service policy must be configured with service-lists for both directions (IN and OUT); otherwise, the mDNS Gateway will not work (will not learn services if there is no IN service-list, or will not reply or announce services learned if there is no OUT service-list). Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2352 Multicast Domain Name System Verifying mDNS-Based Wired Service Filtering Step 14 Step 15 Command or Action Purpose location ap-group Configures AP location based filtering. Example: Device(config-mdns-ser-pol)# location ap-group end Example: Device(config-mdns-ser-pol)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Verifying mDNS-Based Wired Service Filtering To view the wired service list IN and OUT details, use the following command: Device# show mdns status Global mDNS gateway:Enabled vap_id ssid mdns_mode 0 myFisaiC Bridge 1 rguestcpC Bridge 2 RK-FLEX Bridge 3 RK-MDNS Gateway 4 GUHOAsaiC Bridge 5 - Bridge 6 - Bridge 7 - Bridge 8 - Bridge 9 - Bridge 10 - Bridge 11 - Bridge 12 - Bridge 13 - Bridge 14 - Bridge 15 - Bridge Active query interval:30 vap service_list_in service_list_out location 0 default-mdns-service-list_IN default-mdns-service-list_OUT 0 1 default-mdns-service-list_IN default-mdns-service-list_OUT 0 2 default-mdns-service-list_IN default-mdns-service-list_OUT 0 3 default-mdns-service-list_IN default-mdns-service-list_OUT 0 4 default-mdns-service-list_IN default-mdns-service-list_OUT 0 Wired vlan configuration: mdns stats timer: 1 mdns cache timer: 1 AP Sync VLAN: 1 Wired service list IN: RK-IN_IN Wired service list OUT: RK-OUT_OUT Note This command must be executed on the Flex AP. Also, this applies to the custom wired service policy support in FlexConnect mode. To verify the VLAN and MAC based wired service filtering, use the following command: Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2353 Configuring mDNS AP Multicast Domain Name System Device# show running-config mdns-sd wired-filter mdns-sd wired-filter WIRED_FILTER_APPLE_TV match mac a886.ddb2.05e9 match vlan 100 ! To verify the wired service policy support in Flex Profile, use the following command: Device# show running-config mdns-sd flex-profile mdns-sd flex-profile custom_flex_profile update-timer service-cache 15 update-timer statistics 10 wired-vlan-range 30 wired-service-policy custom_wired_policy ! To verify whether LSS is configured or not, use the following command: Device# show running-config mdns-sd service-policy mdns-sd service-policy custom_policy service-list srvc_lst_in IN service-list srvc_lst_out OUT location lss ! mdns-sd service-list srvc_lst_in IN match apple-tv ! mdns-sd service-list srvc_lst_out OUT match apple-tv wired-filter WIRED_FILTER_APPLE_TV ! Configuring mDNS AP In most of the deployments, the services may be available in VLANs that the APs can hear in the wired side (allowed in the switchport where the AP is directly connected: its own VLAN, or even more VLANs if switchport is a trunk). The following procedure shows how to configure mDNS AP: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 mdns-sd gateway Example: Device(config)# mdns-sd gateway Step 3 ap name ap-name mdns-ap enable vlan vlan-id Example: Purpose Enters global configuration mode. Configures the mDNS gateway. Enables mDNS on the AP, and configures a VLAN for the mDNS AP. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2354 Multicast Domain Name System Enabling mDNS Gateway on the RLAN Interface Step 4 Step 5 Step 6 Step 7 Command or Action Purpose Device# ap name ap1 mdns-ap enable vlan 22 ap name ap-name mdns-ap vlan add vlan-id Adds a VLAN to the mDNS AP. vlan-id ranges Example: from 1 to 4096. Device# ap name ap1 mdns-ap vlan add 200 ap name ap-name mdns-ap vlan del vlan-id Deletes a VLAN from the mDNS AP. Example: Device# ap name ap1 mdns-ap vlan del 2 ap name ap-name mdns-ap disable Example: Device# ap name ap1 mdns-ap disable (Optional) Disables the mDNS AP. end Example: Device# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Note You can configure a maximum of 10 VLANs per AP. Enabling mDNS Gateway on the RLAN Interface By configuring the mDNS gateway mode on the RLAN interface, you can configure the mDNS service policy for a specific RLAN. Procedure Step 1 Step 2 Command or Action configure terminal Example: Device# configure terminal ap remote-lan profile-name remote-lan-profile-name rlan-id Example: Device(config)# ap remote-lan profile-name rlan_test_1 1 Purpose Enters global configuration mode. Configures a remote LAN profile. · remote-lan-profile: Remote LAN profile name. Range is from 1 to 32 alphanumeric characters. · rlan-id: Remote LAN identifier. Range is from 1 to 128. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2355 Enabling mDNS Gateway on the RLAN Interface Multicast Domain Name System Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Command or Action Purpose Note You can create a maximum of 128 RLANs. Also, you cannot use the rlan-id of an existing RLAN while creating another RLAN. mdns-sd-interface {gateway | drop} Example: mdns-sd-interface Device(config-remote-lan)# mdns-sd-interface gateway Enables mDNS configuration on an RLAN interface. no shutdown Restarts the RLAN profile. Example: Device(config-remote-lan)# no shutdown exit Example: Device(config-remote-lan)# exit Exits remote LAN configuration mode. ap remote-lan-policy policy-name profile name Example: Device(config)# ap remote-lan-policy policy-name rlan_named_pp1 Configures the RLAN policy profile and enters wireless policy configuration mode. mdns-sd service-policy service-policy-name Enables an mDNS service policy. Example: Device(config-remote-lan-policy)# mdns-sd service-policy mdnsTV6 central switching Example: Device(config-remote-lan-policy)# central switching Configures the RLAN for central switching. central dhcp Example: Device(config-remote-lan-policy)# central dhcp Configures the central DHCP for centrally switched clients. vlan vlan-name Assigns the profile policy to a VLAN. Example: Device(config-remote-lan-policy)# vlan 141 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2356 Multicast Domain Name System Enabling mDNS Gateway on the RLAN Interface Step 11 Step 12 Step 13 Step 14 Step 15 Step 16 Step 17 Command or Action no shutdown Example: Device(config-remote-lan-policy)# no shutdown Purpose Restarts the RLAN profile. wireless tag policy policy-tag-name Example: Device(config)# wireless tag policy rlan_pt_1 Configures a policy tag. remote-lan remote-lan-profile-name policy Maps the RLAN policy profile to the RLAN rlan-policy-profile-name port-id port-id profile. Example: Device(config-policy-tag)# remote-lan rlan_test_1 policy rlan_named_pp1 port-id 1 Device(config-policy-tag)# remote-lan rlan_test_1 policy rlan_named_pp1 port-id 2 Device(config-policy-tag)# remote-lan rlan_test_1 policy rlan_named_pp1 port-id 3 · remote-lan-profile-name: Name of the RLAN profile. · rlan-policy-profile-name: Name of the policy profile. · port-id: LAN port number on the access point. Range is from 1 to 4. Device(config-policy-tag)# remote-lan rlan_test_1 policy rlan_named_pp1 port-id 4 exit Example: Device(config-policy-tag)# exit Returns to global configuration mode. ap mac-address Example: Device (config)# ap 0042.5AB6.0EF0 Configures the AP and enters the AP tag configuration mode. Note Use the Ethernet MAC address. policy-tag policy-tag-name Example: Device (config-ap-tag)# policy-tag rlan_pt_1 end Example: Device(config-guest-lan)# end Maps a policy tag to the AP. Returns to privileged EXEC mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2357 Enabling mDNS Gateway on Guest LAN Interface Multicast Domain Name System Enabling mDNS Gateway on Guest LAN Interface By configuring the mDNS gateway mode on a Guest LAN interface, you can configure the mDNS service policy for a specific Guest LAN interface. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 guest-lan profile-name guest_lan_profile_name num wired-vlan wired_vlan_num Example: Configures guest LAN profile with a wired VLAN. Note Configures the wired VLAN only for the Guest Foreign controller. Device(config)# guest-lan profile-name open 1 wired-vlan 666 · num: Guest LAN identifier. The valid range is from 1 to 5. · wired_vlan_num: Wired VLAN number. The valid range is from 1 to 4094. Step 3 Step 4 guest-lan profile-name guest_lan_profile_name num Configures the guest LAN profile without a VLAN for the Guest Anchor controller. Example: Device(config)# guest-lan profile-name open 1 mdns-sd-interface {gateway | drop} Configures the mDNS gateway for a Guest Example: LAN. Device(config-guest-lan)# mdns-sd gateway Note You need to enable mDNS gateway globally for the Guest LAN to work. Step 5 end Example: Device(config-guest-lan)# end Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2358 Multicast Domain Name System Associating mDNS Service Policy with Wireless Profile Policy (GUI) Associating mDNS Service Policy with Wireless Profile Policy (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Tags & Profiles > Policy. Click the policy profile name. In the Advanced tab, choose the mDNS service policy from the mDNS Service Policy drop-down list. Click Update & Apply to Device. Associating mDNS Service Policy with Wireless Profile Policy Note You must globally configure the mDNS service policy before associating it with the wireless profile policy. A default mDNS service policy is already attached once the wireless profile policy is created. You can use the following commands to override the default mDNS service policy with any of your service policy: Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 wireless profile policy profile-policy Configures wireless profile policy. Example: Here, profile-policy refers to the name of the Device(config)# wireless profile policy WLAN policy profile. default-policy-profile Step 3 mdns-sd service-policy custom-mdns-service-policy Associates an mDNS service policy with the wireless profile policy. Example: The default mDNS service policy name is Device(config-wireless-policy)# mdns-sd default-mdns-service-policy. service-policy custom-mdns-service-policy Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2359 Associating mDNS Service Policy with Wireless Profile Policy Command or Action Multicast Domain Name System Purpose Note Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2360 Multicast Domain Name System Command or Action Associating mDNS Service Policy with Wireless Profile Policy Purpose The default-mdns-profile-policy uses default-mdns-service-list configuration for filtering mDNS service announcement and queries. In wireless network, the mDNS packets are consumed by the mDNS gateway and clients or device is deprived of learning this service. To share the service with the device and provide ease of configuration to the administrator, a list of few standard service types are shared by default on the wireless network. The list of such standard service types is termed as default service policy that comprises a set of service types. The table covers a sample service list in the default service policy. Table 168: Default Name and mDNS Service Type Default Name mDNS Service Type Apple TV _airplay._tcp.local _raop._tcp.local Apple _home-sharing._tcp.local HomeSharing Printer-IPPS _ipps._tcp.local Apple-airprint _ipp._tcp.local _universal._sub._ipp._tcp.local Google-chromecast _googlecast._tcp.local _googlerpc._tcp.local _googlezone._tcp.local Apple-remote-login _sftp-ssh._tcp.local _ssh._tcp.local Apple-screen-share _rfb._tcp.local Google-expeditions _googexpeditions._tcp.local Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2361 Enabling or Disabling mDNS Gateway for WLAN (GUI) Multicast Domain Name System Command or Action Purpose Default Name mDNS Service Type Multifunction-printer _fax-ipp._tcp.local _ipp._tcp.local _scanner._tcp.local Apple-windows-fileshare _smb._tcp.local Note · Location would be disabled on mDNS default service policy. · You cannot change the contents of the mDNS default service policy. However, you can create separate mDNS service policies and associate them under the wireless policy profile. Step 4 exit Example: Device(config-wireless-policy)# exit Returns to global configuration mode. Enabling or Disabling mDNS Gateway for WLAN (GUI) Procedure Step 1 Step 2 Step 3 Step 4 Choose Configuration > Tags & Profiles > WLANs. Click on the WLAN. In the Advanced tab, choose the mode in mDNS Mode drop-down list. Click Update & Apply to Device. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2362 Multicast Domain Name System Enabling or Disabling mDNS Gateway for WLAN Enabling or Disabling mDNS Gateway for WLAN Note Bridging is the default behaviour. This means that the mDNS packets are always bridged. Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Step 2 wlan profile-name wlan-id ssid-name Example: Device(config)# wlan test 24 ssid1 Purpose Enters global configuration mode. Specifies the WLAN name and ID. · profile-name is the WLAN name which can contain 32 alphanumeric characters · wlan-id is the wireless LAN identifier. The valid range is from 1 to 4096. · ssid-name is the SSID which can contain 32 alphanumeric characters. Note Global configuration must be in place for mDNS gateway to work. Step 3 Step 4 Step 5 Step 6 mdns-sd-interface {gateway | drop} Example: Device(config-wlan)# mdns-sd gateway Device(config-wlan)# mdns-sd drop Enables or disables mDNS gateway and bridge functions on WLAN. exit Example: Device(config-wlan)# exit Returns to global configuration mode. show wlan name wlan-name | show wlan all Verifies the status of mDNS on WLAN. Example: Device# show wlan name test | show wlan all show wireless profile policy Example: Device# show wireless profile policy Verifies the service policy configured in WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2363 mDNS Gateway with Guest Anchor Support and mDNS Bridging Multicast Domain Name System mDNS Gateway with Guest Anchor Support and mDNS Bridging When mDNS Gateway is enabled on both Anchor and Foreign controller, the mDNS gateway functionality is supported in guest anchor deployment where clients on guest LAN or WLAN with guest anchor enabled will be responded with any services or cache from export foreign controller itself. All advertisements received on Guest LAN or WLAN on export foreign are learnt on the export foreign itself. All queries received on guest LAN or WLAN are responded by the export foreign itself. When mDNS Gateway is enabled on Anchor and Disabled on Foreign controller [Bridging Mode], the mDNS gateway functionality is supported in guest anchor deployment where clients on guest LAN or WLAN with guest anchor enabled will be responded with any services or cache from export Anchor even though the clients are connected on Foreign. All advertisements received on guest LAN or WLAN on export foreign is forwarded to Anchor and the cache is stored on the Anchor itself. All queries received on guest LAN or WLAN are responded by the export Anchor itself. Note · You must configure the guest-LAN to a wireless profile policy which is configured with the required mDNS service-policy. · To configure non guest LAN mDNS gateway, see the Introduction to mDNS Gateway chapter. Configuring mDNS Gateway on Guest Anchor Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 guest-lan profile-name guest-lan-profile-name Configures the guest LAN profile with a wired guest-lan-id VLAN. Example: Device(config)# guest-lan profile-name g-lanpro 2 Step 3 mdns-sd gateway Enables mDNS gateway on the guest LAN. Example: Device(config-guest-lan)# mdns-sd gateway Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2364 Multicast Domain Name System Configuring mDNS Gateway on Guest Foreign (Guest LAN) Configuring mDNS Gateway on Guest Foreign (Guest LAN) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 guest-lan profile-name guest-lan-profile-name Configures guest LAN profile with a wired guest-lan-id wired-vlan vlan-id VLAN. Example: Note Device(config)# guest-lan profile-name g-lanpro 2 wired-vlan 230 Configure the wired VLAN only for the Guest Foreign controller. Step 3 mdns-sd gateway Enables mDNS gateway on the guest LAN. Example: Device(config-guest-lan)# mdns-sd gateway Step 4 exit Example: Device(config-wireless-policy)# exit Returns to global configuration mode. Configuring mDNS Gateway on Guest Anchor Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 guest-wlan profile-name guest-lan-profile-name guest-wlan-id Configures the guest WLAN profile with a wired VLAN. Example: Device(config)# guest-wlan profile-name g-lanpro 2 Step 3 mdns-sd gateway Example: Device(config-guest-wlan)# mdns-sd gateway Enables mDNS gateway on the guest WLAN. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2365 Configuring mDNS Gateway on Guest Foreign (Guest WLAN) Multicast Domain Name System Configuring mDNS Gateway on Guest Foreign (Guest WLAN) Procedure Step 1 Command or Action configure terminal Example: Device# configure terminal Purpose Enters global configuration mode. Step 2 guest-wlan profile-name guest-lan-profile-name guest-wlan-id wired-vlan vlan-id Example: Configures guest WLAN profile with a wired VLAN. Note Configure the wired VLAN only for the Guest Foreign controller. Device(config)# guest-wlan profile-name g-lanpro 2 wired-vlan 230 Step 3 mdns-sd gateway Example: Device(config-guest-wlan)# mdns-sd gateway Enables mDNS gateway on the guest WLAN. Step 4 exit Example: Device(config-wireless-policy)# exit Returns to global configuration mode. Verifying mDNS Gateway Configurations To verify the mDNS summary, use the following command: Device# show mdns-sd summary mDNS Gateway: Enabled Active Query: Enabled Periodicity (in minutes): 30 Transport Type: IPv4 To verify the mDNS cache, use the following command: Device# show mdns-sd cache ----------------------------------------------------------- PTR Records --------------------------------------- RECORD-NAME TTL WLAN CLIENT-MAC RR-RECORD-DATA -------------------------------------------------------------------------------------------------------------- _airplay._tcp.local 4500 30 07c5.a4f2.dc01 CUST1._airplay._tcp.local _ipp._tcp.local 4500 30 04c5.a4f2.dc01 CUST3._ipp._tcp.local2 _ipp._tcp.local 4500 15 04c5.a4f2.dc01 CUST3._ipp._tcp.local4 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2366 Multicast Domain Name System Verifying mDNS Gateway Configurations _ipp._tcp.local 4500 10 04c5.a4f2.dc01 CUST3._ipp._tcp.local6 _veer_custom._tcp.local 4500 10 05c5.a4f2.dc01 CUST2._veer_custom._tcp.local8 To verify the mDNS cache from wired service provider, use the following command: Device# show mdns-sd cache wired ----------------------------------------------------------- PTR Records --------------------------------------- RECORD-NAME TTL VLAN CLIENT-MAC RR-RECORD-DATA --------------------------------------------------------------------------------------------------------------- _airplay._tcp.local 4500 16 0866.98ec.97af wiredapple._airplay._tcp.local _raop._tcp.local 4500 16 0866.98ec.97af 086698EC97AF@wiredapple._raop._tcp.local ---------------------------------------------------------- SRV Records ----------------------------------------- RECORD-NAME TTL VLAN CLIENT-MAC RR-RECORD-DATA ----------------------------------------------------------------------------------------------------------------- wiredapple._airplay._tcp.local 4500 16 0866.98ec.97af 0 0 7000 wiredapple.local 086698EC97AF@wiredapple._raop._tcp.local 4500 16 0866.98ec.97af 0 0 7000 wiredapple.local ---------------------------------------------------------- A/AAAA Records ---------------------------------------- RECORD-NAME TTL VLAN CLIENT-MAC RR-RECORD-DATA ------------------------------------------------------------------------------------------------------------------ wiredapple.local 4500 16 0866.98ec.97af 2001:8:16:16:e5:c446:3218:7437 ----------------------------------------------------------- TXT Records ------------------------------------------- RECORD-NAME TTL VLAN CLIENT-MAC RR-RECORD-DATA -------------------------------------------------------------------------------------------------------------------- wiredapple._airplay._tcp.local 4500 16 0866.98ec.97af [343]'acl=0''deviceid=08:66:98:EC:97:AF''features= 086698EC97AF@wiredapple._raop._tcp.local 4500 16 0866.98ec.97af [193]'cn=0,1,2,3''da=true''et=0,3,5''ft=0x5A7FFFF7 To verify the mdns-sd type PTR, use the following command: Device# show mdns-sd cache type {PTR | SRV | A-AAA | TXT} RECORD-NAME TTL WLAN CLIENT-MAC RR-Record-Data ------------------------------------------------------------------------------------------------------------------------------------- _custom1._tcp.local 4500 2 c869.cda8.77d6 service_t1._custom1._tcp.local _custom1._tcp.local 4500 2 c869.cda8.77d6 vk11._custom1._tcp.local _ipp._tcp.local 4500 2 c869.cda8.77d6 service-4._ipp._tcp.local To verify the mdns-sd cache for a client MAC, use the following command: Device# show mdns-sd cache {ap-mac <ap-mac> | client-mac <client-mac> | glan-id <glan-id> | mdns-ap <mac-address> | rlan-id <rlan-id> | wlan-id <wlan-id> | wired} RECORD-NAME TTL WLAN CLIENT-MAC RR-Record-Data ------------------------------------------------------------------------------------------------------------------------------------- Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2367 Verifying mDNS Gateway Configurations Multicast Domain Name System _custom1._tcp.local service_t1._custom1._tcp.local _custom1._tcp.local vk11._custom1._tcp.local _ipp._tcp.local service-4._ipp._tcp.local 4500 2 4500 2 4500 2 c869.cda8.77d6 c869.cda8.77d6 c869.cda8.77d6 ----------------------------------------------------------- SRV Records ------------------------------------------------------------- RECORD-NAME TTL WLAN CLIENT-MAC RR-Record-Data ------------------------------------------------------------------------------------------------------------------------------------- service-4._ipp._tcp.local 4500 2 c869.cda8.77d6 0 0 1212 mDNS-Client1s-275.local vk11._custom1._tcp.local 4500 2 c869.cda8.77d6 0 0 987 mDNS-Client1s-275.local service_t1._custom1._tcp.local 4500 2 c869.cda8.77d6 0 0 197 mDNS-Client1s-275.local ---------------------------------------------------------- A/AAAA Records ----------------------------------------------------------- RECORD-NAME TTL WLAN CLIENT-MAC RR-Record-Data ------------------------------------------------------------------------------------------------------------------------------------- mDNS-Client1s-275.local 4500 2 c869.cda8.77d6 120.1.1.33 ----------------------------------------------------------- TXT Records ------------------------------------------------------------- RECORD-NAME TTL WLAN CLIENT-MAC RR-Record-Data ------------------------------------------------------------------------------------------------------------------------------------- service-4._ipp._tcp.local 4500 2 c869.cda8.77d6 'CLient1' vk11._custom1._tcp.local 'txtvers=11' service_t1._custom1._tcp.local 'txtvers=12' 4500 2 4500 2 c869.cda8.77d6 c869.cda8.77d6 To verify the mdns-sd cache with respect to the RLAN ID, use the following command: Device# show mdns-sd cache rlan-id 1 detail Name: _printer._tcp.local Type: PTR TTL: 4500 RLAN: 1 RLAN Name: rlan_test_1 VLAN: 141 Client MAC: 000e.c688.3942 AP Ethernet MAC: 0042.5ab6.0ef0 Remaining-Time: 4485 Site-Tag: default-site-tag mDNS Service Policy: mdnsTV6 Overriding mDNS Service Policy: NO UPN-Status: Disabled Rdata: printer._printer._tcp.local Name: lab-47-187.local Type: A/AAAA TTL: 4500 RLAN: 1 RLAN Name: rlan_test_1 VLAN: 141 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2368 Multicast Domain Name System Verifying mDNS Gateway Configurations Client MAC: 000e.c688.3942 AP Ethernet MAC: 0042.5ab6.0ef0 Remaining-Time: 4485 Site-Tag: default-site-tag mDNS Service Policy: mdnsTV6 Overriding mDNS Service Policy: NO UPN-Status: Disabled Rdata: 10.15.141.124 To verify the mdns-sd cache with respect to mDNS-AP, use the following command: Device# show mdns-sd cache mdns-ap 706b.b97d.b060 detail Name: _printer._tcp.local Type: PTR TTL: 4500 VLAN: 145 Client MAC: 0050.b626.5bfa mDNS AP Radio MAC: 706b.b97d.b060 mDNS AP Ethernet MAC: 706b.b97c.5208 Remaining-Time: 4480 mDNS Service Policy: mdnsTV Rdata: printer._printer._tcp.local Name: Client-46-153.local Type: A/AAAA TTL: 4500 VLAN: 145 Client MAC: 0050.b626.5bfa mDNS AP Radio MAC: 706b.b97d.b060 mDNS AP Ethernet MAC: 706b.b97c.5208 Remaining-Time: 4480 mDNS Service Policy: mdnsTV Rdata: 10.15.145.103 To verify the mdns-sd cache in detail, use the following command: Device# show mdns-sd cache detail Name: _custom1._tcp.local Type: PTR TTL: 4500 WLAN: 2 WLAN Name: mdns120 VLAN: 120 Client MAC: c869.cda8.77d6 AP Ethernet MAC: 7069.5ab8.33d0 Expiry-Time: 09/09/18 21:50:47 Site-Tag: default-site-tag Rdata: service_t1._custom1._tcp.local To verify the mdns-sd cache statistics, use the following command: Device# show mdns-sd cache statistics mDNS Cache Stats Total number of Services: 4191 To verify the mdns-sd statistics, use the following command: Device# show mdns-sd statistics ------------------------------------------------------ Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2369 Verifying mDNS Gateway Configurations Consolidated mDNS Packet Statistics -----------------------------------------------------mDNS stats last reset time: 03/11/19 04:17:35 mDNS packets sent: 61045 IPv4 sent: 30790 IPv4 advertisements sent: 234 IPv4 queries sent: 30556 IPv6 sent: 30255 IPv6 advertisements sent: 17 IPv6 queries sent: 30238 Multicast sent: 57558 IPv4 sent: 28938 IPv6 sent: 28620 mDNS packets received: 72796 advertisements received: 13604 queries received: 59192 IPv4 received: 40600 IPv4 advertisements received: 6542 IPv4 queries received: 34058 IPv6 received: 32196 IPv6 advertisements received: 7062 IPv6 queries received: 25134 mDNS packets dropped: 87 -----------------------------------------------------Wired mDNS Packet Statistics -----------------------------------------------------mDNS stats last reset time: 03/11/19 04:17:35 mDNS packets sent: 61033 IPv4 sent: 30778 IPv4 advertisements sent: 222 IPv4 queries sent: 30556 IPv6 sent: 30255 IPv6 advertisements sent: 17 IPv6 queries sent: 30238 Multicast sent: 57558 IPv4 sent: 28938 IPv6 sent: 28620 mDNS packets received: 52623 advertisements received: 1247 queries received: 51376 IPv4 received: 32276 IPv4 advertisements received: 727 IPv4 queries received: 31549 IPv6 received: 20347 IPv6 advertisements received: 520 IPv6 queries received: 19827 mDNS packets dropped: 63 -----------------------------------------------------mDNS Packet Statistics, for WLAN: 2 -----------------------------------------------------mDNS stats last reset time: 03/11/19 04:17:35 mDNS packets sent: 12 IPv4 sent: 12 IPv4 advertisements sent: 12 IPv4 queries sent: 0 IPv6 sent: 0 IPv6 advertisements sent: 0 IPv6 queries sent: 0 Multicast sent: 0 IPv4 sent: 0 IPv6 sent: 0 mDNS packets received: 20173 Multicast Domain Name System Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2370 Multicast Domain Name System Verifying mDNS Gateway Configurations advertisements received: 12357 queries received: 7816 IPv4 received: 8324 IPv4 advertisements received: 5815 IPv4 queries received: 2509 IPv6 received: 11849 IPv6 advertisements received: 6542 IPv6 queries received: 5307 mDNS packets dropped: 24 To verify the default service list details, use the following command: Device# show mdns-sd default-service-list -------------------------------------------mDNS Default Service List -------------------------------------------- Service Definition: apple-tv Service Names: _airplay._tcp.local _raop._tcp.local Service Definition: homesharing Service Names: _home-sharing._tcp.local Service Definition: printer-ipps Service Names: _ipps._tcp.local Service Definition: apple-airprint Service Names: _ipp._tcp.local _universal._sub._ipp._tcp.local Service Definition: google-chromecast Service Names: _googlecast._tcp.local _googlerpc._tcp.local _googlezone._tcp.local Service Definition: apple-remote-login Service Names: _sftp-ssh._tcp.local _ssh._tcp.local Service Definition: apple-screen-share Service Names: _rfb._tcp.local Service Definition: google-expeditions Service Names: _googexpeditions._tcp.local Service Definition: multifunction-printer Service Names: _fax-ipp._tcp.local _ipp._tcp.local _scanner._tcp.local Service Definition: apple-windows-fileshare Service Names: _smb._tcp.local To verify the primary service list details, use the following command: Device# show mdns-sd master-service-list -------------------------------------------mDNS Master Service List -------------------------------------------- Service Definition: fax Service Names: _fax-ipp._tcp.local Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2371 Verifying mDNS Gateway Configurations Multicast Domain Name System Service Definition: roku Service Names: _rsp._tcp.local Service Definition: airplay Service Names: _airplay._tcp.local Service Definition: scanner Service Names: _scanner._tcp.local Service Definition: spotify Service Names: _spotify-connect._tcp.local Service Definition: airtunes Service Names: _raop._tcp.local Service Definition: airserver Service Names: _airplay._tcp.local _airserver._tcp.local . . . Service Definition: itune-wireless-devicesharing2 Service Names: _apple-mobdev2._tcp.local To verify the mdns-sd service statistics on the controller, use the following command: Device# show mdns-sd service statistics Service Name Service Count ----------------------------------------------------------------------------- _atc._tcp.local 137 _hap._tcp.local 149 _ipp._tcp.local 149 _rfb._tcp.local 141 _smb._tcp.local 133 _ssh._tcp.local 142 _daap._tcp.local 149 _dpap._tcp.local 149 _eppc._tcp.local 138 _adisk._tcp.local 149 To verify the mDNS-AP configured on the controller and VLAN(s) associated with it, use the following command: Device# show mdns-sd ap Number of mDNS APs.................................. 1 AP Name Ethernet MAC Number of Vlans Vlanidentifiers ---------------------------------------------------------------------------------------------------- AP3600-1 7069.5ab8.33d0 1 300 Further Debug To debug mDNS further, use the following procedure: 1. Run this command at the controller: set platform software trace wncd <0-7> chassis active R0 mdns debug 2. Reproduce the issue. Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2372 Multicast Domain Name System Verifying mDNS Gateway Configurations 3. Run this command to gather the traces enabled: show wireless loadbalance ap affinity wncd 0 AP MAC Discovery Timestamp Join Timestamp Tag Vlanidentifiers --------------------------------------------------------------------------------------- 0cd0.f894.0600 06/30/21 12:39:48 06/30/21 12:40:021 default-site-tag 300 Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2373 Verifying mDNS Gateway Configurations Multicast Domain Name System Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide, Cisco IOS XE Dublin 17.12.x 2374DITA Open Toolkit XEP 4.30.961; modified using iText 2.1.7 by 1T3XT