User Manual for CISCO models including: IOS-XE Wireless EFT, IOS-XE Wireless EFT, Wireless EFT, EFT, IOS-XE
File Info : application/pdf, 39 Pages, 5.46MB
DocumentDocumentIOS-XE 17.11.1 Wireless EFT Guide TME Team 11AX 11AC 11N 11A/ 11B 11G G 1. INTRODUCTION ...................................................................................................................................................3 PROVIDING FEEDBACK AND REQUESTING SUPPORT ....................................................................................................................... 5 IOS-XE 17.11.1 Wireless EFT Guide 2. NETWORK TOPOLOGY...............................................................................................................................................7 3. PRE-REQUISITES ........................................................................................................................................................7 3.1. TEST SETUP ................................................................................................................................................................... 8 3.2. UPGRADE PATHS .......................................................................................................................................................... 10 4. COMPATIBILITY MATRIX..........................................................................................................................................10 5. FEATURES TO TEST ..................................................................................................................................................11 5.1 C9800 JUMBO FRAME SUPPORT FOR RADIUS/AAA PACKETS................................................................................................. 11 Feature Overview: ...................................................................................................................................................... 11 Pre-Requisite: ............................................................................................................................................................. 11 Configuration: ............................................................................................................................................................ 11 5.2 ENHANCEMENT IN CLIENT STEERING DURING ROLLING AP UPGRADE ........................................................................................ 13 Feature Overview: ...................................................................................................................................................... 13 Pre-Requisite: ............................................................................................................................................................. 13 Configuration & Verification: ..................................................................................................................................... 13 5.3 EFFICIENT AP IMAGE DOWNLOAD THROUGH TCP................................................................................................................. 14 FEATURE OVERVIEW:............................................................................................................................................................ 14 Pre-Requisite: ............................................................................................................................................................. 15 Configuration & Verification: ..................................................................................................................................... 15 5.4 INTELLIGENTLY DISABLE 2.4 GHZ RADIOS ............................................................................................................................ 16 Feature Overview: ...................................................................................................................................................... 16 5.5 USABILITY: AAA CLI REQUEST ................................................................................................................................. 17 FEATURE OVERVIEW:............................................................................................................................................................ 17 Pre-Requisite: ............................................................................................................................................................. 18 Configuration & Verification: ..................................................................................................................................... 18 Configuration: ............................................................................................................................................................ 18 No configuration needed. .......................................................................................................................................... 18 Verification:................................................................................................................................................................ 18 5.6 RPC FOR SYSLOG CONFIGURATION.................................................................................................................................... 18 FEATURE OVERVIEW:............................................................................................................................................................ 18 Pre-Requisite: ............................................................................................................................................................. 18 Configuration & Verification: ..................................................................................................................................... 19 5.7 IMPROVEMENTS TO BUILT-IN CAPTIVE PORTAL .................................................................................................................... 20 5.8 MULTI AUTHENTICATION COMBINATION OF 802.1X W/AAA OVERRIDE (DYNAMIC VLAN ASSIGNMENT) AND LWA (CONSENT) ON C9800 .............................................................................................................................................................................. 23 FEATURE OVERVIEW:............................................................................................................................................................ 23 Pre-Requisite: ............................................................................................................................................................. 23 Configuration & Verification: ..................................................................................................................................... 23 Limitations: ................................................................................................................................................................ 24 5.9 LOCATION-CAPABLE ATTRIBUTE IN THE ACCESS-REQUEST MESSAGES AS PART OF RFC5580 ......................................................... 24 FEATURE OVERVIEW:............................................................................................................................................................ 24 PRE-REQUISITE: .................................................................................................................................................................. 25 Configuration & Verification: ..................................................................................................................................... 25 5.10 C9800 OPTIMIZATION OF CLIENT EXCLUSION TIME WITH WPA3 SAE .................................................................................... 25 FEATURE OVERVIEW:............................................................................................................................................................ 25 Pre-Requisite: ............................................................................................................................................................. 26 Configuration & Verification: ..................................................................................................................................... 26 5.11 MESH: BACKGROUND SCANNING .................................................................................................................................... 26 FEATURE OVERVIEW:............................................................................................................................................................ 26 Pre-Requisite: ............................................................................................................................................................. 27 2|Page IOS-XE 17.11.1 Wireless EFT Guide Topology: ................................................................................................................................................................... 27 Configuration & Verification: ..................................................................................................................................... 27 5.12 ZERO WAIT DFS: SUPPORT ON C9136 ............................................................................................................................ 29 FEATURE OVERVIEW:............................................................................................................................................................ 29 Pre-Requisite: ............................................................................................................................................................. 30 Configuration & Verification: ..................................................................................................................................... 30 Testcases: ................................................................................................................................................................... 33 5.13 UNABLE TO QUERY OIDS FROM CISCO-LWAPP-AP-MIB ON 9800- MIGRATION HALTED ....................................................... 34 FEATURE OVERVIEW:............................................................................................................................................................ 34 Pre-Requisite: ............................................................................................................................................................. 34 Configuration & Verification: ..................................................................................................................................... 34 5.14 SNMP OIDS - PHASE 2 ................................................................................................................................................ 35 FEATURE OVERVIEW:............................................................................................................................................................ 35 Pre-Requisite: ............................................................................................................................................................. 35 Configuration & Verification: ..................................................................................................................................... 35 OID Verification on Cisco Catalyst 9800 Controller: ................................................................................................... 36 Use these commands on 9800 CLI.............................................................................................................................. 36 1. Introduction Cisco Enterprise Wireless solutions are resilient, have the integrated security, and employ adaptive and insightful intelligence providing useful insight into your network. With intent-based networking built on Cisco Digital Network Architecture, Cisco Enterprise Wireless solutions go beyond the latest Wi-Fi 6 and WiFi 6E (802.11ax) standard and are ready for the growing user expectations, IoT devices and next gen clouddriven applications. 3|Page IOS-XE 17.11.1 Wireless EFT Guide Cisco Catalyst 9800 Series Wireless Controllers: The Catalyst controllers streamline the best of RF excellence with open, programmable Cisco IOS® XE benefits, meaning you no longer have two operating systems to manage. These modular, reliable, and highly secure controllers are flexible enough to deploy anywhere-- including your choice of cloud. Cisco Catalyst® 9100 Access Points: Going beyond the Wi-Fi 6 and 6E standard, the Cisco Catalyst 9100 access points provide integrated security, resiliency, and operational flexibility, as well as increased network intelligence. These access points extend Cisco's intent-based network and scale to the growing demands of the Internet of Things (IoT) while fully supporting the latest innovations and newest technologies, making them perfect for organizations of all sizes. To get a complete overview and learn more about Cisco Enterprise Wireless Products and Solutions, please visit the following page: https://www.cisco.com/c/en/us/products/wireless/index.html - ~resources Cisco Catalyst 9800 Series Wireless Controllers based on IOS-XE was introduced to the market in the end of 2018 with IOS-XE Release 16.10.1. There have been constant innovations, new platform introductions, feature enhancements and feature parity additions over the last couple of years to make Cisco Catalyst 9800 Series Wireless Controllers and Cisco Catalyst 9100 Access Points, the best in enterprise class in the market. 4|Page IOS-XE 17.11.1 Wireless EFT Guide This document provides feature overview, configuration and test scenarios for few selected wireless features based on customer interest, for early field trial of IOS-XE Release 17.11.1. We are pleased to welcome you to the EFT for the IOS-XE Wireless Software Release 17.11.1. Cisco recognizes and appreciates the time and effort that will be evaluating the features in this software release and hope that you will find it meets your expectations. This software and accompanied documentation are being provided to you under the non-disclosure agreement between you, your organization and Cisco. Please do not discuss this project and its features outside of the discussions on Cisco Beta related mailing lists. This software is pre-release software and as such should never be used in a commercial operating environment or with mission critical data. We recommend that you install this software on a test network/system initially and then move to production testing as you are more comfortable with it. Please use the software as you would normally in your day-to-day tasks and report any problems that you find. Providing Feedback and requesting support Details on providing feedback are given below. Also note that throughout the project we may ask for feedback on specific areas of the software. Your feedback is vital to Cisco Systems in providing you with the features and utility that you require to realize your individual mission. This EFT represents an opportunity to see if this addresses your needs and to provide input regarding its suitability. The EFT program start dates and timelines have been communicated to you under a separate communication by the EFT administrator. During the EFT period, at least one EFT software refresh will be available during the EFT phase. In order to include as many fixes as possible in this refresh release; you and your staff are encouraged to test this software and provide feedback as early in the program as is 5|Page IOS-XE 17.11.1 Wireless EFT Guide possible. There will be a cut-off at which point we will freeze development in order to test and release the update image. The update will contain important fixes and all participants are recommended to upgrade once the EFT refresh software is available. If you find issues or have additional comments or feedback after the EFT program concludes we still, as always welcome your feedback! For us to track found issues, provide comments, or ask questions you can submit your query to: polariswireless-beta@cisco.com Catalyst 9800 IOS XE 17.11.1 Software EFT Images: Below location can be used to pull the latest EFT Images: Catalyst 9800 platforms: Catalyst 9800-CL Wireless Controller for Cloud - https://software.cisco.com/download/beta/1572566934 Catalyst 9800-80 Wireless Controller - https://software.cisco.com/download/beta/1536549615 Catalyst 9800-L Wireless Controller - https://software.cisco.com/download/beta/1597144509 Catalyst 9800-40 Wireless Controller - https://software.cisco.com/download/beta/1388071271 EWC (Embedded Wireless Controller on AP): Catalyst 9130AXI Access Point - https://software.cisco.com/download/beta/773616253 Catalyst 9120AXI Access Point - https://software.cisco.com/download/beta/792652702 Catalyst 9117AXI Access Point - https://software.cisco.com/download/beta/811480614 Catalyst 9115AXI Access Point - https://software.cisco.com/download/beta/811599778 Again, thank you for your time an effort in helping Cisco to meet your needs. We value this relationship and look forward to your comments and continued support. Please do not hesitate to contact us if you have any questions now, or at any point during the EFT. Wireless Features targeted for EFT (Early Field Trial) in IOS-XE Release 17.11.1: Simplicity: · C9800 Jumbo Frame Support for Radius/AAA packets · Enhancement in client steering during Rolling AP Upgrade · Efficient AP image download through TCP · Intelligently disable 2.4 GHz radios · Usability: AAA CLI request · RPC for Syslog Configuration Security: · Improvements to Built-in Captive Portal · Multi Authentication Combination of 802.1x w/AAA Override (Dynamic Vlan Assignment) and LWA (consent) on C9800 · Location-Capable attribute in the Access-Request messages as part of RFC5580 · C9800 optimization of client exclusion time with WPA3 SAE 6|Page IOS-XE 17.11.1 Wireless EFT Guide Connectivity: · Mesh: Background Scanning · Zero Wait DFS: Support on C9136 Sustainability: · Unable to query OIDs from CISCO-LWAPP-AP-MIB on 9800- Migration halted · SNMP OIDs - Phase 2 2. Network Topology 3. Pre-requisites 7|Page IOS-XE 17.11.1 Wireless EFT Guide 3.1. Test Setup Feature Mandatory Equipment 1 x C9800-80 WLC 1 x ISE (or other Radius Server that supports the MTU) C9800 Jumbo Frame Support for Radius/AAA packets (1*Access Point and 1*client for verification on Auth traffic) 2 x C9800 WLC 3 x C9100 Access Point Enhancement in client steering during Rolling AP Upgrade 1 x Wireless client 1 x C9800 WLC Efficient AP image download through TCP 1 x Access Point 1 x C9800 WLC Intelligently disable 2.4 GHz radios 1 x C9100 Access Point 1 x Wireless client 1 x C9800 WLC 1 x Access Point 1 x Wireless Client Usability: AAA CLI request 1 x ISE (or other Radius Server) 1 x C9800 WLC RPC for Syslog Configuration 1 x Syslog Server 1 x C9800 WLC 1 x Access Point Improvements to Built-In Captive Portal 1 x Wireless client 1 x C9800 WLC Multi Authentication Combination of 802.1x w/AAA Override (Dynamic Vlan Assignment) and LWA (consent) on C9800 Location-Capable attribute in the Access-Request messages as part of RFC5580 1 x Access Point 1 x Wireless client 1 x C9800 WLC 8|Page IOS-XE 17.11.1 Wireless EFT Guide C9800 optimization of client exclusion time with WPA3 SAE Mesh: Background Scanning Zero Wait DFS: Support on C9136 Unable to query OIDs from CISCO-LWAPP-AP-MIB on 9800Migration halted SNMP OIDs - Phase 2 1 x Access Point 1 x Wireless client 1x ISE or (or other Radius Server) 1 x C9800 WLC 1 x C9100 Access Point 1 x Wireless client 1 x C9800 WLC 3 x C9124 Access Points 1 x C9800 WLC 1 x C9136 Access Points 1 x C9800 WLC 1 x Access Point 1 x Wireless client 1 x C9800 WLC 1 x Access Point 1 x Wireless client Feature C9800 Jumbo Frame Support for Radius/AAA packets Enhancement in client steering during Rolling AP Upgrade Efficient AP image download through TCP Intelligently disable 2.4 GHz radios Usability: AAA CLI request RPC for Syslog Configuration Improvements to Built-In Captive Portal Multi Authentication Combination of 802.1x w/AAA Override (Dynamic Vlan Assignment) and LWA (consent) on C9800 Location-Capable attribute in the Access-Request C9800 Support Yes Yes Yes Yes Yes Yes Yes Yes Yes EWC Support TBD TBD Not Supported TBD TBD TBD TBD TBD TBD SDA Support TBD TBD TBD TBD TBD TBD TBD TBD TBD 9|Page IOS-XE 17.11.1 Wireless EFT Guide messages as part of RFC5580 C9800 optimization of client exclusion time Yes TBD TBD with WPA3 SAE Mesh: Background Scanning Yes TBD TBD Zero Wait DFS: Support on C9136 Yes TBD TBD Unable to query OIDs from CISCO-LWAPP-AP-MIB Yes TBD TBD on 9800- Migration halted SNMP OIDs - Phase 2 Yes TBD TBD 3.2. Upgrade Paths For the purpose of this EFT program, Cisco recommends following the below upgrade path a) 17.3.6 -> 17.11.1 EFT Image (Cisco qualified) b) 17.6.4 -> 17.11.1 EFT Image (Cisco qualified) c) 17.10.1 -> 17.11.1 EFT Image (Cisco qualified) Note: If the customers have C9130 running 17.3.x, to successfully upgrade to 17.11, please upgrade to 17.6.x first. https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/17-3/release-notes/rn-17-39800.html#Cisco_Concept.dita_9d1727be-e4ff-48e0-bbfd-cdb60f7b4054 4. Compatibility Matrix Access Point IOS-XE AP1540/AP1560 AP1815/AP1830/AP 1840/AP1852/AP18 00i 17.11.1 Cisco DNA Center 2.3.5.x 2.3.4.x 2.3.3.x Cisco DNA Spaces DNA Space Connector 2.x Prime 3.10.2 3.10.1 3.10 CMX CMX 10.6.3 MRx ISE 3.0 + latest patch 2.7+ 10 | P a g e IOS-XE 17.11.1 Wireless EFT Guide AP2800/AP3800/ AP4800 C9105AX C9115AX C9120AX C9124AX C9130AX C9136AX CW9162I CW9164I CW9166I latest patch 2.6 + latest patch 2.4 + latest patch 5. Features to Test 5.1 C9800 Jumbo Frame Support for Radius/AAA packets Feature Overview: In all the Polaris-releases (till date), by default the radius packet Fragmentation is done at 1396 bytes in the intermediate layer. Which means "interface IP MTU configuration" is not honored. This leading to below issues like Fragmentation size is fixed and Jumbo Frames are not supported. By adding this feature, the interface IP MTU configuration will be honored. Which would cover all the possible customer use-cases with the consistent behavior on outgoing RADIUS packet. With the new design, the RADIUS packet gets fragmented at interface IP MTU configured value. User has to configure the required IP MTU value under the interface config and in order to use the configured IP MTU value for RADIUS transaction user has to configure the interface name under the corresponding RADIUS group. Pre-Requisite: · This feature will be supported on all platforms from 17.11.1 version. · Jumbo packet support is available on ISE 3.1 version onwards Configuration: Interface configuration: interface <Interface Name> no switchport mtu 5000 -> setup the Max MTU Range 11 | P a g e IOS-XE 17.11.1 Wireless EFT Guide ip address x.x.x.x x.x.x.x ip mtu <bytes> -> setup the IP MTU Radius Configuration on controller: aaa group server radius RADIUS_GROUP server name radius_server1 ip radius source-interface <Interface Name> ISE Configuration interface <Interface Name> ip mtu <bytes> Note: If IP MTU is changed on ISE, please expect a network service restart for ISE. Verification: Packet capture on Radius Packets: 12 | P a g e IOS-XE 17.11.1 Wireless EFT Guide 5.2 Enhancement in client steering during Rolling AP Upgrade Feature Overview: During software upgrades, the Rolling AP Upgrade allows there to be minimal network connectivity downtime. This is because when an AP goes to reload with the new image, the surrounding APs will be up to serve clients. When an AP is selected to reload, the clients currently connected to it need to roam to a different AP. To do this, the AP will no longer respond to client join requests, and it will send 802.11v BSS transition management frames to all the clients supporting 802.11v. This will notify them the AP is going to reload and to roam to a new AP. For clients that do not support 802.11v or do not roam, the controller will de-authenticate all the clients connected to the AP. For more information on Rolling AP Upgrade, please check this link : https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/17-6/configguide/b_wl_17_6_cg/m_hitless_upgrade.html Pre-Requisite: · Cisco Catalyst 9800 Wireless LAN Controller running IOS XE 17.11.1 Configuration & Verification: To enable client steering: C9800# conf t C9800(config)# ap upgrade staggered client-steering To disable client steering: C9800# conf t C9800(config)# no ap upgrade staggered client-steering 13 | P a g e IOS-XE 17.11.1 Wireless EFT Guide To configure de-authenticating clients during upgrade before the AP reloads: C9800# conf t C9800(config)# ap upgrade staggered client-deauth To configure not de-authenticating clients during upgrade before the AP reloads: C9800# conf t C9800(config)# no ap upgrade staggered client-deauth 5.3 Efficient AP image download through TCP Feature Overview: Prior to IOS XE 17.11.1, the AP image download during software upgrades utilized the CAPWAP control tunnel. However, the CAPWAP control tunnel is often occupied as it is used for many other purposes. Also, the image download time is limited by the CAPWAP window size. There is also a heavy load on the C9800 as the AP image downloads cause the WNCD processes to heavily utilize the CPU. With IOS XE 17.11.1, AP image downloads move out of the CAPWAP control tunnel and into the out-of-band data plane, allowing the image downloads to happen over HTTPS. By moving the download process to HTTPS, the load on the WNCd processes is reduced and frees the CAPWAP control path. Furthermore, by utilizing HTTPS and TCP, the image downloads are faster and more flexible as the link type and speed can be specified. If the HTTPS download fails, there is seamless fallback to the CAPWAP control tunnel. By default, the image upgrade will leverage port 8443 in order to avoid impact on the WebUI and telemetry streams on the C9800. This can be changed to fit the deployment. The mechanism for AP image download is as follows: 14 | P a g e IOS-XE 17.11.1 Wireless EFT Guide WNCd Access Point AP Join / Pre-download Process Web Server Curl / HTTP GET Request to issue Java Web Token (JWT) using AP Parameters (AP-Name, AP-MAC, Privilege) NGINX will generate the JWT using the AP Parameters HTTP response with JWT Send JWT to AP HTTP GET request with JWT for new image AP Join / Pre-download Process to continue Pre-Requisite: Configuration & Verification: To enable AP upgrade to use HTTPS: C9800# conf t C9800(config)# ap upgrade method https To configure the AP file transfer port: C9800# conf t C9800(config)# ap file-transfer https port <port_number> Note: If left unconfigured, the C9800 will use port 8443. To verify that the AP image download is using HTTPS: C9800# show ap upgrade method AP upgrade method HTTPS : Enabled> To verify that the AP image download is using HTTPS: C9800# show ap file-transfer https summary Configured port : 8443 Operational port : 8443 To verify that the AP supports image download over HTTPS: C9800# show ap name SITE4-9120-1 config general | sec Upgrade AP Upgrade Out-Of-Band Capability : Enabled To verify that the AP image download over HTTPS: C9800# show ap name SITE4-9120-1 config general | sec Upgrade AP Upgrade Out-Of-Band Capability : Enabled 15 | P a g e IOS-XE 17.11.1 Wireless EFT Guide 5.4 Intelligently disable 2.4 GHz radios Feature Overview: FRA Flexible Radio Assignment XOR Dual-Band Radios RRM Radio Resource Management To provide a configurable option to move redundant dual band XOR radios in the network to monitor role only. Current IOS-XE implementation, FRA moves redundant dual-band (XOR 2.4GHz/5GHz) radios to either 5GHz client serving or Monitor function. There is no choice but to select a particular option based on the deployment. This feature will allow customers to configure and choose as per their requirements. FRA evaluates 2.4GHz coverage only and determines if overlapping coverage is creating interference. If detected, the feature will move dual-band (XOR 2.4/5GHz) radio to either a 5GHz Client serving or Monitor role. As per the current implementation, there is no option to choose. This feature implements a configuration option in the 2.4GHz RF profile to select the radio to move to monitor-only mode. As part of this feature, the customer will have a configurable option to select the redundant dualband (XOR 2.4/5GHz) radios in the network to operate in a monitor role. Currently, there is no option to choose an FRA that will move radios to either 5GHz client serving or monitor. With this option, customers can choose based on their deployment. Pre-Requisite: · Cisco Catalyst 9800 Wireless LAN Controller running IOS XE 17.11.1 · APs: C9115, C9120, C9130, C9136, CW9164, CW9166, CW9162 Configuration & Verification: Default-RF-Profile [Global Config]: wlc(config)#ap dot11 24ghz fra action ? monitor Configures FRA action as monitor 2.4GHz RF-Profile mdc-prod-wc2(config)#ap dot11 24ghz rf-profile madhu-rf-profile-24 mdc-prod-wc2(config-rf-profile)#fra action ? monitor Configures FRA action as monitor WebUI Configuration [1/2 ] Navigate: Configuration > Radio Configuration > RRM > FRA > 2.4/ 5GHz Flexible Radio > FRA Action 16 | P a g e IOS-XE 17.11.1 Wireless EFT Guide WebUI Configuration [2/2 ] Navigate: Configuration > Tags & Profiles > RF/Radio > Advanced > FRA Action Select: Update and Apply to Device Show Commands mdc-prod-wc2#sh ap fra FRA State : Enabled FRA Freeze : Disabled FRA Operation State : Up FRA Sensitivity : higher (85%) FRA Interval : 1 Hour(s) Service Priority : Coverage Client Aware FRA : Enabled Client Select : 25% Client Reset : 5% FRA Action : 2.4GHz/Monitor Last Run : 3069 seconds ago Show CLI [2/2] mdc-prod-wc2#sh ap rf-profile <rf-profile name> detail | sec FRA Client Aware FRA : Disabled FRA Action : 2.4GHz/Monitor mdc-prod-wc2#sh ap name AP7872.5DED.CB74 config slot 0 | sec Attribute Attributes for Slot 0 Radio Type : 802.11n - 2.4/5 GHz Radio Mode : Monitor Radio Role : Monitor Assignment Method : Auto Monitor Mode Reason : Automatically Switched by FRA 5.5 Usability: AAA CLI request Feature Overview: To increase the user readability on show command for AAA server, a new CLI "show aaa server brief" is introduced which will show all the necessary details in tabular format. And the column includes the following information: · Access Requests · Access Accept · Access Reject · Access Timeouts · Outstanding Access Transactions · Uptime · Accounting Requests · Accounting response · Accounting Timeouts · Outstanding Accounting Transactions · Total Requests (Auth+Acct) 17 | P a g e IOS-XE 17.11.1 Wireless EFT Guide · Total Responses(Auth+Acct) Pre-Requisite: Cisco Catalyst 9800 Wireless LAN Controller running IOS XE 17.11.1 Configuration & Verification: Configuration: No configuration needed. Verification: show aaa server brief 5.6 RPC for Syslog Configuration Feature Overview: This feature enhancement provides yang RPC support for CLI `send log' such that they can send the syslog message to device. Basically, IOS-XE exec CLI send log, sends the specified logs to the syslog server. It helps to validate both syslog server and device to send and receive syslogs, now this can be achieved through the yang programable interface. Pre-Requisite: Cisco Catalyst 9800 Wireless LAN Controller running IOS XE 17.11.1 18 | P a g e IOS-XE 17.11.1 Wireless EFT Guide Configuration & Verification: Yang RPC support of this CLI `send log 'will provide a mechanism to push the syslog message to device. In turn, device will send this message to configured syslog server. The Netconf-yang and restconf should be configured on the C9800 C9800#show running-config | in rest restconf C9800#show running-config | in netconf netconf-yang Generally, the `send log' is configured from CLI but in 17.11 we can send it through programable interface as shown below There should not be any empty message On WLC we see the myMessage is printed in the log message. Following are the restrictions on the inputs: 19 | P a g e IOS-XE 17.11.1 Wireless EFT Guide · String in the log-message should be in plain text format. · Empty log-message is not allowed. · Special characters allowed in log message, mnemonics, and facility. · No space allowed in Facility name and Mnemonics unlike log message. · There are below 3 ways for inputs: 1. Only log-message (In this case log-message will be sent with default severity, facility, and mnemonics). 2. Severity along with log-message(In this case log-message will be sent with default facility, and mnemonics) 3. All 4 options log message, severity, facility, and mnemonics. · Below is the list of default values: 1. Severity 7 2. Facility "SYS" 3. Mnemonics "USERLOG_DEBUG" 5.7 Improvements to Built-in Captive Portal Feature Overview: International customers across varying legal entities must comply with all local laws. A legal requirement that is becoming more apparent is the inclusion of local languages in all operations. Within current implementations of IOS-XE, the login portal banner text section is limited of around 200 chars. Additionally, the software does not allow for the input of special chars such as "ö" or "à". Within 17.11.1, the banner text CLI input limit will be enhanced to accommodate up to 400 chars. Furthermore, both banner text and banner title strings displayed in the HTML login page, will now be able to support special characters such as "ö" or "à" etc. Since the multi-line banner is supported via CLI, it is possible to configure via YANG as well. If the input string provided exceeds the maximum limit, an error message will be thrown indicating the same, and the config will be rejected. The Webauth login portal banner comprises of two parts. 1. Banner title This can be customized using banner title <> CLI under webauth parameter map. The default title string is "Welcome to the Cisco Web-Authentication network." 2. Banner text This can be customized using banner text <> CLI under webauth parameter map. The default text string is "Cisco is pleased to provide web-authentication infrastructure for your network. Please login." 20 | P a g e IOS-XE 17.11.1 Wireless EFT Guide Limitations: 1. No WebUI support for this feature. 2. Parser has a limitation of 254 characters per line (including the CLI keywords). Hence, user will need to keep this in account while providing the input Pre-Requisite: · Cisco Catalyst 9800 Wireless LAN Controller running IOS XE 17.11.1 · Users must have knowledge of Local Web-Auth, Banner text and banner title. Configuration & Verification: 21 | P a g e IOS-XE 17.11.1 Wireless EFT Guide Troubleshooting: Below IOS debug can be enabled to see if there was any problem in banner config. debug ip admission all On binos side, we can enable wncd all module verbose logs and collect the traces. RA internal logs can also be collected for client-related debugging. Below command outputs should also be collected. show parameter-map type webauth name <> test platform software database get sm_exec_context/tbl_webauth_parammap;name=<name of parameter map> sh platform software process database wncd ch ac R0 details SM_CONFIG_DB "table tbl_webauth_parammap" content 22 | P a g e IOS-XE 17.11.1 Wireless EFT Guide 5.8 Multi Authentication Combination of 802.1x w/AAA Override (Dynamic Vlan Assignment) and LWA (consent) on C9800 Feature Overview: In a university setup, clients authenticate using 802.1X. As part of 802.1X authentication, AAA server pushes the policies to be applied for the client. VLAN is one attribute which is pushed from AAA server. Since dot1x is secure and happens without any user intervention, the end users are not aware of which network they are connected to. This could lead to problems if the clients connect to university Wifi and the users post inappropriate posts or visit inappropriate sites. To circumvent this problem, the university has configured for WebAuth authentication post 802.1X. Web-Consent is used as part of WebAuth to inform the end users that they are connected to the University Wifi. However, as part of Web-Consent, since, no AAA policy is applied, the previously applied AAA policy gets removed. This results in VLAN change and leads to client disconnection. This cycle continues and the client doesn't get network access. To fix this problem, CLI is introduced. If this CLI is configured, then the policy applied via Consent would be merged with the policy applied for 802.1X/MAB. Pre-Requisite: · Cisco Catalyst 9800 Wireless LAN Controller running IOS XE 17.11.1 · Users must have knowledge on Multi Auth concepts, LWA(Consent), AAA override. Configuration & Verification: Enabling the Feature from CLI: Device# configure terminal Device(config)#parameter-map type webauth LWA_consent Device(config-params-parameter-map)#type consent Device(config-params-parameter-map)#consent activation-mode merge Disabling the Feature from CLI: Device# configure terminal Device(config)#parameter-map type webauth LWA_consent Device(config-params-parameter-map)#no consent activation-mode merge Show command with feature enabled from CLI: JD_9800-L_1#sh parameter-map type webauth name LWA_consent Parameter Map Name : LWA_consent 23 | P a g e IOS-XE 17.11.1 Wireless EFT Guide Banner Title Banner Text Type Auth-proxy Init State time Webauth max-http connection Webauth logout-window Webauth success-window Consent Email Activation Mode Sleeping-Client Webauth login-auth-bypass: : Consent Title : Please accept the consent : consent : 300 sec : 200 : Enabled : Enabled : Disabled : Merge : Disabled policy applied via Consent would be merged with the policy applied for 802.1X/MAB. Show command with feature disabled from CLI: JD_9800-L_1#sh parameter-map type webauth name LWA_consent Parameter Map Name : LWA_consent Consent Email : Disabled Activation Mode : Replace policy applied via Consent would not be merged with the policy applied for 802.1X/MAB. Limitations: · No WebUI support for this feature. · No SNMP support. Only Yang support would be added for this feature. · When "activation-mode merge" is not configured on WebAuth parameter-map, then the default activation-mode is REPLACE-ALL. This means that user-profile for consent would replace all previously applied user-profile policies. 5.9 Location-Capable attribute in the Access-Request messages as part of RFC5580 Feature Overview: The RFC 5580 location attributes convey location-related information for authentication and accounting exchanges. The location information is useful in several scenarios. Wireless networks are deployed in public places, such as shopping malls, airports, hotels, and coffee shops by a diverse set of operators, such as wireless internet service providers (WISPs), cellular network operators, and fixed broadband networks. In all these scenarios, the network may need to know the user location to enable location-aware authorization, billing, or services. 24 | P a g e IOS-XE 17.11.1 Wireless EFT Guide Please refer to the IOS-XE 17.9 config guide for configuring RFC 5508 location attributes https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/17-9/configguide/b_wl_17_9_cg/m_rfc-5580-loc-att-on-the-controller.html#Cisco_Reference.dita_aed3a65e9f99-4d8b-bddb-a6c4e9c3fe54 RFC 5580 mentions three location delivery methods for location information to AAA server, as mentioned below: 1: Location delivery based on Out-of-Band agreement 2: Location delivery based on Initial request 3: Location delivery based on Mid-Session request In IOS-XE 17.11 release we are enhancing this feature by adding the location-capable attribute in the access request to the out-of-band agreement. Pre-Requisite: · Cisco Catalyst 9800 Wireless LAN Controller running IOS XE 17.11.1 · Users must have knowledge of AAA and 802.1x Configuration & Verification: Location-Capable attribute is sent as part of access requests only in case of method 2 (Location delivery based on Initial request) which is initial-request-based, but we are providing the support for this attribute in out-of-band which is (Location delivery based on Out-of-Band agreement) To enable this attribute following command needs to be configured on C9800. Currently, its only supported from CLI C9800(config)#radius-server attribute wireless location delivery outof-band include-location-capable 5.10 C9800 optimization of client exclusion time with WPA3 SAE Feature Overview: The SAE client exclusion mechanism is designed to protect the system from using computational resources on processing invalid authentication requests from malicious users. If a client fails SAE authentication multiple times (up to 5), the C9800 will exclude the client for an exclusion time frame (default 60 sec). During this exclusion time, all authentication requests from this client are dropped. In local mode, SAE authentication is processed on WLC which counts the number of authentication failures and adds client into the exclusion list when the count reaches a predefined threshold. The client will be allowed to connect again after the exclusion timeout. The timeout 25 | P a g e IOS-XE 17.11.1 Wireless EFT Guide value is configurable to allow flexibility in enforcing client exclusion. Prior to IOS XE 17.11.1, SAE exclusion implementation starts the exclusion process at client cleanup time after authentication failure. It takes a couple of more message exchanges between C9800 and client to reach the cleanup state. As the client may back off before sending the next message, SAE commit, after authentication failure, the time lapse varies between the failure and the start of exclusion. We can optimize the flow by starting the exclusion process right at the authentication failure (SAE confirm message mismatch) time. This avoids the delay and excludes client sooner. Pre-Requisite: · Cisco Catalyst 9800 Wireless LAN Controller running IOS XE 17.11.1 · This feature is for Local Mode deployments only. Configuration & Verification: The optimization for WPA3 SAE client exclusion takes places in the background, and no extra configuration needs to be done. To verify the client exclusions: C9800# show wireless exclusionlist client mac-address f2f8.4a03.a0e8 detail Client State : Excluded Client MAC Address : f2f8.4a03.a0e8 Client IPv4 Address: N/A Client IPv6 Address: N/A Client Username: N/A Exclusion Reason : SAE authentication failure Authentication Method : None Protocol: N/A AP MAC Address : 0c75.bdb1.3f20 AP Name: AP0C75.BDB1.EDA8 AP slot : 0 Wireless LAN Id : 7 Wireless LAN Name: VLAN Id : 0 5.11 Mesh: Background Scanning Feature Overview: Cisco Mesh access points (MAP) are interconnected over wireless links in a spanning tree like topology. A MAP connected to the network via ethernet uplink is designated as the root MAP aka RAP. AWPP protocol is used to maintain the tree and form the tree. When a MAP comes up, it tries to look for another MAP (parent) to join to reach the gateway eventually via a RAP. The same happens when a MAP loose connectivity with its existing parent. This procedure is known as mesh tree convergence. This document aims to improve the convergence procedure to make is faster and robust. A MAP in search its parent uplink undergoes following procedures: 26 | P a g e IOS-XE 17.11.1 Wireless EFT Guide 1) Parent loss detection (if connected already) 2) Scan (passive) for a new parent across all / subset of regulatory domain channels 3) Seek (request/response) on newfound parent on scanned/operable channels 4) Evaluate and choose the best neighbor 5) Select the neighbor as potential parent and authenticate via selected parent to WLC 6) Retain / Renew IP and 7) Restart CAPWAP to join back the WLC This procedure today could take from tens of seconds to a minute. We plan to implement the following to improve it: Mesh Background Scanning and auto parent selection are mechanisms used by a MAP to find and connect faster to a better potential parent across channels and always maintain its uplink with a best parent. Pre-Requisite: C9800 running in latest EFT IOS-XE image with Mesh network Up and running. Topology: Configuration & Verification: To enable Background Scanning: In Mesh Profile (wireless profile mesh default-mesh-profile), enable the background scanning(background-scanning) Verification: Check the background scanning in show wireless profile mesh detailed <mesh profile> 27 | P a g e IOS-XE 17.11.1 Wireless EFT Guide Configure: C9800-CL-AWS(config)#wireless profile mesh <profile_name> C9800-CL-AWS(config-wireless-mesh-profile)#background-scanning Verify: C9800-CL-AWS#show wireless profile mesh detailed <profile_name> Mesh Profile Name : <profile_name> ------------------------------------------------- Description : custom mesh profile Bridge Group Name : custom_bgn_name Background Scan : ENABLED <<<<<<<< 1. Enable background scanning and verify functionality works as expected on C9124 MAP. a) Enable background scanning and verify functionality works as expected on C9124 MAP. b) Verify mesh network is UP and running stable. c) Enable background scanning. d) On C9124 MAP verify that feature is enabled and functioning. Use: · show mesh stats · show mesh history recent · show mesh adjacency all · show mesh convergence · show mesh res · show mesh bgscan config backhaul · show mesh bgscan config slot 1 · show mesh bgscan channels backhaul · show mesh bgscan channels slot 1 · show mesh bgscan status backhaul · show mesh bgscan status slot 1 · show mesh bgscan schedule backhaul · show mesh bgscan schedule slot 1 e) Verify that MAP UT is aware of the full channel list on which mesh peers from the same BNG operate, i.e. it is receiving complete information's during RES provisioning. f) Verify MAP UT is able to establish full adjacencies with radio neighbors that belong to the same BGN. g) Verify MAP UT will not create adjacencies with radio neighbors that are not members of the same BGN 2. Verify impact on client traffic when background scanning is enabled on C9124 a) C9124 MAP is operating on 5GHz backhaul channel. b) Wireless clients are connected to 2.4GHz client serving radio and generating constant traffic. c) Enable background scanning. d) Verify that background scanning has no impact on client's traffic. 28 | P a g e IOS-XE 17.11.1 Wireless EFT Guide 5.12 Zero Wait DFS: Support on C9136 Feature Overview: · The U-Nii-2 and U-Nii-2C(e) bands also known as the "DFS Channels" (Dynamic Frequency Assignment) require a 60 second (or more) Channel Availability Check (CAC) before being used by Wi-Fi to ensure no radar is in operation. · Zero Wait DFS allows for using the AP's resources to perform a preemptive CAC before a channel change is initiated, eliminating the 60-600 second delay experienced on a channel change to any DFS channel Prior to 17.8 IOS-XE release, DFS CAC has been performed on demand as a precursor to assuming WiFi operations on a channel. This behavior is required to verify that there is no operating radar on the channel we will assume. Once accessed, scanning must continue during channel operation and be immediately abandoned if Radar is detected. When RRM assigns a channel, it assigns the "best" channel available in the current DCA run. There is also a second-best channel assigned at the time which is labeled as a future channel. In the event of a radar detection on the current DFS channel, the Future channel would be scanned and then used. This "Mini DCA" run ensured that the succession channel was already a good choice based on the channel adjacencies. If that future channel happened to be a DFS required channel, then the AP would scan 60 seconds (or 600 seconds if ETSI TDWR Channels 120, 124, 128) and then assume beaconing again on the new channel. The Zero Wait DFS feature was introduced originally in IOS-XE 17.9 for ETSI and FCC Catalyst C9130 AP. The IOS-XE 17.11 release adds support for the Catalyst C9136 AP's. Zero Wait DFS is heavily dependent on local regulatory bodies rules, and as such there are differences in the methods used, but minimal difference to the outcomes experienced. ETSI Regulatory: The concept of Pre-CAC is supported. In ETSI, once a channel has been cleared by CAC it can be considered cleared by the AP and used without additional CAC indefinitely until the AP is restarted. · This allows the AP to scan as few or as many channels as we wish to hold for future use · If AP needs to use a future channel, it may do so without performing CAC · If Radar is detected on the serving channel, AP can move to a Pre-CAC Channel and broadcast immediately. This feature effectively removes the 10-minute (600 second) penalty for using a TDWR channel (120,124,128) in ETSI. FCC Regulatory: FCC approach differs in that there is not provision for Pre-CAC. In FCC a channel is only valid as long as a receiver is listening to it and providing CAC data. This rule means that we can still CAC a future channel choice, but it must be continuously CAC'd if we are to assume it radar free and begin 29 | P a g e IOS-XE 17.11.1 Wireless EFT Guide immediate operations. DCA already calculates the "second best" channel in any channel assignment as of the time of the DCA run. With the second-best channel we have a valid, If slightly less optimal, channel already selected that won't conflict with the rest of the APs to be used in the event of a Radar detection. This channel can be continuously CAC'd and in this way maintain readiness for immediate operations by the AP at any time. The Catalyst C9130 and C9136 radio chipsets have 3 DFS scanning engines. Running in Tri-Radio mode will demand that two of these engines be engaged if two DFS channels are assigned. However, the 3rd goes unused and can be dedicated to scan the future channel(s). · This allows the AP to continuously scan a future channel (determined by DCA) · If AP needs to use a future channel, it may do so without performing CAC · If Radar is detected on the serving channel, AP can move to the future Channel and broadcast immediately. NOTE: Future channel CAC is performed continuously without impact to serving radio operations for zero client impact. Dual 5 GHz Considerations: Pre-CAC covers all channels and scenarios for the ETSI region. Rolling CAC for FCC presents a couple of possible scenarios. In FCC we can continuously CAC only one future channel. If both 5 GHz interfaces are assigned DFS channels, then only one can have a fully CAC'd and ready future channel. In the event that we do have two interfaces with DFS channels assigned, the second best channel for each must still maintain 100 MHz separation from the other interfaces channel at all times. In many cases this will end up in a different band all together. In cases where both Future channels are DFS as well, then the interface with the highest number of clients will get the priority for rolling CAC. If the other interface detects radar -its channel change will have to perform a normal CAC (60 seconds) before assuming operations. Pre-Requisite: 1. C9136I or C9130 -B or -E AP's 2. C9800 Controller running the 17.11.1 EFT code 3. Console access to the controller Testing this feature is straight forward. All states can be shown presently in CLI show commands. Configuration can be achieved at the GUI or CLI levels. Configuration & Verification: Zero Wait DFS can be enabled at the global level for all AP's on the WLC or through an RF profile to manage a subset of APs. There is no configuration options for this feature. 30 | P a g e IOS-XE 17.11.1 Wireless EFT Guide To enable Zero Wait DFS on the GUI: On the controller GUI - select Configuration=>RRM=>5 GHz Band=> DCA and choose Zero Wait DFS option, check the box to enable at the global level. To enable Globally from the CLI: C9800-L_17_11(config)#AP dot11 5ghz rrm channel zero-wait-dfs To disable, use the no command: C9800-L_17_11(config)#no AP dot11 5ghz rrm channel zero-waitdfs In all cases to verify that the feature is globally enabled, use the following show command to determine the current global state for Zero Wait DFS: C9800-L_17_11#sh ap dot11 5ghz channel | i Zero Zero Wait DFS : Enabled NOTE: Enabling Zero Wait DFS will only affect APs that it is supported on, presently just the Catalyst C9130AX AP's. Other APs that are not supported will not be affected by the configuration option. Enable Zero Wait DFS selectively through an RF Profile: 31 | P a g e IOS-XE 17.11.1 Wireless EFT Guide Zero Wait DFS can also be selectively applied through an RF -Profile allowing granular selection of a subset of APs for which this setting will apply. There is no prerequisite for enabling at the global level: From the GUI, navigate from the main menu to: Configuration=> Tags & Profiles => RF/Radio Select the 5 GHz RF Profile to modify or create a new one and select RRM/DCA and check Zero Wait DFS check box. To enable Zero Wait DFS in an RF Profile from the CLI: C9800-L_17_11(config)#ap dot11 5ghz rf-profile <profile name> C9800-L_17_11(config-rf-profile)#channel zero-wait-dfs C9800-L_17_11(config-rf-profile)#no channel zero-wait-dfs To verify the state of Zero Wait DFS for an individual AP, use the following show commands: C9800-L_17_11#sh ap name C9130i_9f.6e.a0 config slot 1 | s Zero Zero Wait DFS Parameters Zero Wait DFS Capable : Yes CAC Domain : FCC Zero Wait DFS Enabled : Enabled DFS Channel Inclusion list : 60,64,104 DFS Channel Exclusion list : 52,56,100,108,112,116,120,124,128,132,136,140,144 Pre-CAC Status : NA (this is FCC so there is no Pre-CAC capability) Reserved Channel CAC Status : In Progress (indicates that off channel scanning is being run) Reserved Channel : 108 Reserved Channel Width : 40 M The Example above is for an FCC AP below is the example for ETSI AIRV_VWLC2#sh ap name AP1416.9D28.0CC4 config slot 1 | s Zero Zero Wait DFS Parameters Zero Wait DFS Capable : Yes CAC Domain : ETSI 32 | P a g e IOS-XE 17.11.1 Wireless EFT Guide Zero Wait DFS Enabled : Enabled DFS Channel Inclusion list : 52,132 DFS Channel Exclusion list : 56,60,64,100,104,108,112,116,136,140 Pre-CAC Status : In progress (ETSI Pre-CAC, running) Reserved Channel CAC Status : In Progress (indicates that off channel scanning is being run) Reserved Channel : 100 Reserved Channel Width : 20 MHz Testcases: In order to test Zero Wait DFS, follow the steps below. Note: It is important to match the suggested configuration as the test radar command on the AP only operates on a 20 MHz channel, using this against an AP with wider channels can get unpredictable results. To test either FCC or ETSI 1. Configure the AP for a single slot 5 GHz. Either turn off tri-band mode (operate as 8x8) or disable the slot 2 radio. 2. Ensure that Zero Wait DFS is configured and that a reserve channel has been selected a. C9800-L_17_11#sh ap name <AP-Name> config slot 1 | s Zero Zero Wait DFS Parameters Zero Wait DFS Capable CAC Domain : Yes : FCC Zero Wait DFS Enabled : Enabled DFS Channel Inclusion list DFS Channel Exclusion list : 52,60 : 56,64,100,104,108,112,116,120,124,128,132,136,140,144 Pre-CAC Status Reserved Channel CAC Status : NA : Complete Reserved Channel Reserved Channel Width : 60 : 20 MHz 3. On the AP CLI execute the Test Spectrum Radar command test spectrum radar signal dot11Radio 1 center-frequency <MHz> bandwidth 20 The Center Frequency of the 20 MHz channel assignment needs to be entered in MHz. for channel 52, this value is 5260 MHz, channel bandwidth should be set to 20 MHz. 4. Once the radar signal is triggered the AP should resume operations on the "reserve" channel immediately, without the usual 60 second CAC delay. C9800-L_17_11#sh ap name C9130i_9f.6e.a0 config slot 1 | s Zero Zero Wait DFS Parameters Zero Wait DFS Capable CAC Domain : Yes : FCC Zero Wait DFS Enabled : Enabled 33 | P a g e IOS-XE 17.11.1 Wireless EFT Guide DFS Channel Inclusion list : 60 New Operating channel the former reserve channel DFS Channel Exclusion list : 52,56,64,100,104,108,112,116,120,124,128,132,136,140,144 Pre-CAC Status : NA Reserved Channel CAC Status : In Progress CAC is in progress for the new Reserve Channel Reserved Channel : 56 Channel 56 will be the new reserve channel Reserved Channel Width : 20 MHz 5.13 Unable to query OIDs from CISCO-LWAPP-AP-MIB on 9800Migration halted Feature Overview: This is a AireOS parity Feature. Few AP MIB OIDs are missing in C9800 WLCs. This feature is to add support of those missing OIDs. Pre-Requisite: No specific pre-requisite needed. SNMP should be enabled in the C9800. Configuration & Verification: 1) Bring up a C9800 with the latest validated EFT image provided through EFT program. 2) Connect an access point to this C9800 3) Create a WLAN and connect a client to this WLAN 4) Configure the SNMP communities(read/write) 5) Make sure the C9800 is responding to the SNMP queries 6) Validate the following latest introduced OIDs (walk/get/get next/set) a) cLApSlotWlanStats b) cLApRadioWlanInfoEntry c) cLApActiveClientCount d) cLApAssociatedClientCount e) cLApMemoryCurrentUsage f) cLApMemoryAverageUsage g) cLApCpuCurrentUsage h) cLApCpuAverageUsage i) cLApGlobalAPConnectCount j) clsSysApConnectCount k) cLApWlanStatsAssocClientNum l) cLApWlanStatsOnlineUserNum 34 | P a g e IOS-XE 17.11.1 Wireless EFT Guide 5.14 SNMP OIDs - Phase 2 Feature Overview: This feature is to cater customer request to support few SNMP variables which are useful for 9800 deployments. Following are the new OID additions: · bsnDot11EssNumberOfMobileStations · bsnDot11EssNumApsUp · bsnDot11EssNumApsDown · bsnAPOperationStatus · cLApUpTime · bsnGlobalDot11SystemMobileStations · cLApGlobalAPConnectCount Pre-Requisite: · Cisco Catalyst 9800 Wireless LAN Controller running IOS XE 17.11.1 · SNMP manager should be enabled · Private or Public SNMP community should be configured Configuration & Verification: Start with verifying if SNMP manager is enabled and communities are added on the Cisco Catalyst 9800 controller. sri-dao#sh run | i snmp snmp-server group v3_ro_users v3 priv read primeview snmp-server group v3_rw_users v3 priv write primeview snmp-server view primeview is included snmp-server community public RO snmp-server community private RW snmp-server community testrw RW snmp-server trap-source Vlan8 snmp-server packetsize 5000 snmp-server enable traps snmp authentication linkdown linkup coldstart warmstart snmp-server enable traps wireless wireless_mobility snmp-server enable traps config snmp-server enable traps rf snmp-server host 10.104.174.58 public snmp-server host 9.2.14.175 public snmp-server host 9.5.11.19 public 35 | P a g e IOS-XE 17.11.1 Wireless EFT Guide snmp-server manager field phy_ ht_cfg.cfg_data.snmp_freq_string field radio_oper_data.phy_ht_cfg.cfg_data.snmp_freq_string field radio_oper_data.phy_ht_cfg.cf8_data. snmp_ freq_string OID Verification on Cisco Catalyst 9800 Controller: Use these commands on 9800 CLI bsnDot11EssNumberOfMobileStations katar2#sh wlan id <id> 1.3.6.1.4.1.14179.2.1.1.1.38 5 - wlan id 0.56.223.37.172.64 - ap radio mac in decimal format katar2#snmp get v2c 9.5.47.11 public oid 1.3.6.1.4.1.14179.2.1.1.1.38.5 SNMP Response: reqid 1, errstat 0, erridx 0 bsnDot11EssNumberOfMobileStations.5 = 0 katar2#snmp set v2c 9.5.47.11 public oid 1.3.6.1.4.1.14179.2.1.1.1.38.5 counter 5 SNMP Response: reqid 19, errstat 17, erridx 1 bsnDot11EssNumberOfMobileStations.5 = 5 bsnDot11EssNumApsUp 1.3.6.1.4.1.14179.2.1.1.1.66 katar2#snmp get v2c 9.5.47.11 public oid 1.3.6.1.4.1.14179.2.1.1.1.66.5 SNMP Response: reqid 2, errstat 0, erridx 0 bsnDot11EssNumApsUp.5 = 1 katar2#snmp set v2c 9.5.47.11 public oid 1.3.6.1.4.1.14179.2.1.1.1.66.5 gauge 10 SNMP Response: reqid 20, errstat 17, erridx 1 bsnDot11EssNumApsUp.5 = 10 36 | P a g e IOS-XE 17.11.1 Wireless EFT Guide bsnDot11EssNumApsDown 1.3.6.1.4.1.14179.2.1.1.1.67 katar2#snmp get v2c 9.5.47.11 public oid 1.3.6.1.4.1.14179.2.1.1.1.67.5 SNMP Response: reqid 5, errstat 0, erridx 0 bsnDot11EssNumApsDown.5 = 0 katar2#snmp set v2c 9.5.47.11 public oid 1.3.6.1.4.1.14179.2.1.1.1.67.5 gauge 3 SNMP Response: reqid 21, errstat 17, erridx 1 bsnDot11EssNumApsDown.5 = 3 bsnAPOperationStatus katar2#show ap summary (under state column). Registered = 1 1.3.6.1.4.1.14179.2.2.1.1.6 katar2#snmp get v2c 9.5.47.11 public oid 1.3.6.1.4.1.14179.2.2.1.1.6.0.56.223.37.172.64 SNMP Response: reqid 6, errstat 0, erridx 0 bsnAPOperationStatus.0.56.223.37.172.64 = 1 katar2#snmp set v2c 9.5.47.11 public oid1.3.6.1.4.1.14179.2.2.1.1.6.0.56.223.37.172.64 integer 50 SNMP Response: reqid 22, errstat 17, erridx 1 bsnAPOperationStatus.0.56.223.37.172.64 = 50 cLApUpTime 37 | P a g e IOS-XE 17.11.1 Wireless EFT Guide 1.3.6.1.4.1.9.9.513.1.1.1.1.6 katar2#snmp get v2c 9.5.47.11 public oid 1.3.6.1.4.1.9.9.513.1.1.1.1.6.0.56.223.37.172.64 SNMP Response: reqid 7, errstat 0, erridx 0 cLApUpTime.0.56.223.37.172.64 = 348500 katar2#snmp set v2c 9.5.47.11 public oid 1.3.6.1.4.1.9.9.513.1.1.1.1.6.0.56.223.37.172.64 timeticks 52345 SNMP Response: reqid 23, errstat 17, erridx 1 cLApUpTime.0.56.223.37.172.64 = 52345 bsnGlobalDot11SystemMobileStations 1.3.6.1.4.1.14179.2.3.5.1.1 katar2#snmp get v2c 9.5.47.11 public oid 1.3.6.1.4.1.14179.2.3.5.1.1.0 SNMP Response: reqid 9, errstat 0, erridx 0 bsnGlobalDot11SystemMobileStations.0 = 0 katar2#snmp set v2c 9.5.47.11 public oid 1.3.6.1.4.1.14179.2.3.5.1.1 gauge 7 SNMP Response: reqid 24, errstat 17, erridx 1 bsnGlobalDot11SystemMobileStations = 7 cLApGlobalAPConnectCount katar2#show ap summary Number of APs: 1.3.6.1.4.1.9.9.513.1.3.35 katar2#snmp get v2c 9.5.47.11 public oid 1.3.6.1.4.1.9.9.513.1.3.35.0 SNMP Response: reqid 11, errstat 0, erridx 0 cLApGlobalAPConnectCount.0 = 9 katar2#snmp set v2c 9.5.47.11 public oid 1.3.6.1.4.1.9.9.513.1.3.35.0 gauge 4 38 | P a g e IOS-XE 17.11.1 Wireless EFT Guide SNMP Response: reqid 25, errstat 17, erridx 1 cLApGlobalAPConnectCount.0 = 4 39 | P a g e