EasyManua.ls Logo

Cisco 4400 Series User Manual

Cisco 4400 Series
796 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #765 background imageLoading...
Page #765 background image
E-5
Cisco Wireless LAN Controller Configuration Guide
OL-17037-01
Appendix E Logical Connectivity Diagrams
Catalyst 3750G Integrated Wireless LAN Controller Switch
Because there can be several switches in a stack, the switch_number parameter is used to indicate to
which controller in the stack this session should be directed. Once a session is established, the user
interacts with the controller CLI. Entering exit terminates the session and returns the user to the switch
CLI.
Show Commands
These commands are used to view the status of the internal controller. They are initiated from the switch.
show platform wireless-controller switch_number summary
Information similar to the following appears:
Switch Status State
1 up operational
2 up operational
show platform wireless-controller switch_number status
Information similar to the following appears:
Switch Service IP Management IP SW Version Status
------+---------------+---------------+---------------+-------
1 127.0.1.1 70.1.30.1 4.0.52.0 operational
2 127.0.1.2 70.1.31.1 4.0.45.0 operational
show platform wireless-controller switch_number management-info
sw vlan ip gateway http https mac version
1 0 70.1.30.1/16 70.1.1.1 1 1 0016.9dca.d963 4.0.52.0
2 0 70.1.31.1/16 70.1.1.1 0 1 0016.9dca.dba3 4.0.45.0
Debug Commands
The Wireless Control Protocol (WCP) is an internal keep-alive protocol that runs between the switch and
the controller. It enables the switch to monitor the health of the controller and to report any problems. It
uses UDP and runs over the two internal Gigabit ports, but it creates an internal VLAN 4095 to separate
control traffic from data traffic. Every 20 seconds the switch sends a keep-alive message to the controller.
If the controller does not acknowledge 16 consecutive keep-alive messages, the switch declares the
controller dead and sends a reset signal to reboot the controller.
These commands are used to monitor the health of the internal controller.
This command is initiated from the controller.
debug wcp ?
where ? is one of the following:
packet—Debugs WCP packets.
events—Debugs WCP events.
Information similar to the following appears:
Tue Feb 7 23:30:31 2006: Received WCP_MSG_TYPE_REQUEST
Tue Feb 7 23:30:31 2006: Received WCP_MSG_TYPE_REQUEST,of type WCP_TLV_KEEP_ALIVE
Tue Feb 7 23:30:31 2006: Sent WCP_MSG_TYPE_RESPONSE,of type WCP_TLV_KEEP_ALIVE
Tue Feb 7 23:30:51 2006: Received WCP_MSG_TYPE_REQUEST
Tue Feb 7 23:30:51 2006: Received WCP_MSG_TYPE_REQUEST,of type WCP_TLV_KEEP_ALIVE
Tue Feb 7 23:30:51 2006: Sent WCP_MSG_TYPE_RESPONSE,of type WCP_TLV_KEEP_ALIVE
Tue Feb 7 23:31:11 2006: Received WCP_MSG_TYPE_REQUEST
Tue Feb 7 23:31:11 2006: Received WCP_MSG_TYPE_REQUEST,of type WCP_TLV_KEEP_ALIVE
Tue Feb 7 23:31:11 2006: Sent WCP_MSG_TYPE_RESPONSE,of type WCP_TLV_KEEP_ALIVE

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Cisco 4400 Series and is the answer not in the manual?

Cisco 4400 Series Specifications

General IconGeneral
Product TypeWireless LAN Controller
ManageableYes
Management PortYes
Power over Ethernet (PoE)No
Operating Temperature32 to 104°F (0 to 40°C)
SecurityWPA, WPA2, 802.1X, AES, TKIP
Power SupplyAC Power Supply
Wireless LAN StandardIEEE 802.11a/b/g/n
Form FactorRack-mountable
RedundancyYes
Operating Humidity10% to 90% non-condensing

Summary

CHAPTER 1 Overview

Operating System Security

Explains the Layer 1, 2, and 3 security components and policies.

Identity Networking

Describes how to apply parameters to clients based on their profile.

Cisco Wireless LAN Controller Failover Protection

Describes how access points associate with backup controllers if the primary fails.

CHAPTER 2 Using the Web-Browser and CLI Interfaces

Using the Web-Browser Interface

Describes the GUI for configuring parameters and monitoring status.

Using the CLI

Explains how to use the text-based interface for configuration and monitoring.

CHAPTER 3 Configuring Ports and Interfaces

CHAPTER 4 Configuring Controller SettingsWireless Device Access

Using the Configuration Wizard

Describes configuring basic settings for the first time or after a reset.

Configuring DHCP Proxy

Explains enabling/disabling DHCP proxy globally or per WLAN.

Configuring Administrator Usernames and Passwords

Instructions for setting admin credentials to prevent unauthorized access.

Configuring IP-MAC Address Binding

Enforces strict IP-to-MAC binding in client packets.

Configuring Quality of Service

Explains providing better service for selected network traffic.

CHAPTER 5 Configuring Security Solutions

Cisco UWN Solution Security

Includes overview, Layer 1, 2, 3, and integrated security solutions.

Configuring RADIUS

Explains RADIUS as a client/server protocol for centralized security.

Configuring TACACS+

Details TACACS+ as a protocol for centralized security.

Configuring Local Network Users

Explains adding local users to the controller database.

Configuring LDAP

Describes configuring LDAP server as a backend database.

Configuring Local EAP

Explains local EAP authentication for users and clients.

Configuring and Applying Access Control Lists

Explains rules to limit interface access.

Configuring Management Frame Protection

Provides security for unprotected 802.11 management messages.

Configuring Identity Networking

Describes how to apply policies based on user profiles.

Managing Rogue Devices

Describes security solutions for rogue devices.

Configuring IDS

Explains configuring intrusion detection system sensors and signatures.

Configuring wIPS

Details the adaptive wireless intrusion prevention system.

CHAPTER 6 Configuring WLANsWireless Device Access

WLAN Overview

Describes controlling up to 512 WLANs and AP groups.

Configuring WLANs

Lists sections on creating WLANs, DHCP, security, QoS, etc.

CHAPTER 7 Controlling Lightweight Access Points

Configuring Global Credentials for Access Points

Details setting global username/password for APs.

Configuring Authentication for Access Points

Explains 802.1X authentication between AP and switch.

Configuring Backup Controllers

Details configuring primary, secondary, tertiary controllers for APs.

Configuring Failover Priority for Access Points

Explains assigning priorities for AP failover.

CHAPTER 8 Controlling Mesh Access Points

Adding Mesh Access Points to the Mesh Network

Details connecting APs to the controller and managing settings.

CHAPTER 9 Managing Controller Software and Configurations

Upgrading Controller Software

Details the process and guidelines for upgrading controller software.

Transferring Files to and from a Controller

Explains uploading/downloading device certificates, CA certificates, PACs, and config files.

Clearing the Controller Configuration

Steps to clear the active configuration in NVRAM.

Erasing the Controller Configuration

Steps to reset the controller configuration to default settings.

Resetting the Controller

Describes methods to reset the controller via CLI or console.

CHAPTER 10 Managing User Accounts

Creating Guest User Accounts

Explains creating lobby administrator and guest user accounts.

Web Authentication Process

Describes the web authentication process and security alerts.

Choosing the Web Authentication Login Page

Provides instructions for specifying the content and appearance of the login page.

Configuring Wired Guest Access

Details configuring wired guest access on a network.

CHAPTER 11 Configuring Radio Resource ManagementWireless Device Access

Overview of Radio Resource Management

Explains RRM software's role in RF management.

Configuring an RF Group

Instructions for configuring RF groups via GUI or CLI.

Configuring RRM

Details how to modify RRM configuration parameters.

Enabling Rogue Access Point Detection in RF Groups

Configures APs to detect rogue APs within RF groups.

CHAPTER 12 Configuring Mobility GroupsWireless Device Access

Configuring Mobility Groups

Provides instructions for configuring mobility groups via GUI or CLI.

CHAPTER 13 Configuring Hybrid REAPWireless Device Access

Configuring Hybrid REAP

Provides instructions for configuring Hybrid REAP on controllers and APs.

APPENDIX A Safety Considerations and Translated Safety Warnings

Safety Considerations

General guidelines for installing Cisco UWN Solution products.

Warning Definition

Explains the meaning of warning symbols and safety instructions.

APPENDIX D Troubleshooting

Using the CLI to Troubleshoot Problems

Provides CLI commands for gathering information and debugging.

Related product manuals