EasyManua.ls Logo

Cisco SD2008T-NA User Manual

Cisco SD2008T-NA
406 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #2 background image
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public
domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CCSP, CCVP, the Cisco Square Bridge logo, Follow Me Browsing, and StackWise are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn,
and iQuick Study are service marks of Cisco Systems, Inc.; and Access Registrar, Aironet, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, Cisco, the Cisco
Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel,
EtherFast, EtherSwitch, Fast Step, FormShare, GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard,
LightStream, Linksys, MeetingPlace, MGX, the Networkers logo, Networking Academy, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, ProConnect,
RateMUX, ScriptShare, SlideCast, SMARTnet, The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or
its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (0601R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the
document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
Cisco Wireless LAN Controller Configuration Guide
Copyright © 2007 Cisco Systems, Inc.
All rights reserved.

Table of Contents

Other manuals for Cisco SD2008T-NA

Question and Answer IconNeed help?

Do you have a question about the Cisco SD2008T-NA and is the answer not in the manual?

Cisco SD2008T-NA Specifications

General IconGeneral
Quality of Service (QoS)Yes
Power over EthernetNo
Mounting TypeDesktop
Jumbo Frame SupportYes
Dimensions160 x 104 x 28 mm (6.3 x 4.1 x 1.1 in)
Operating Temperature0° to 40°C (32° to 104°F)
Storage Temperature-20° to 70°C (-4° to 158°F)
Humidity10% to 90% noncondensing

Summary

Chapter 1 Overview

Cisco Unified Wireless Network Solution Overview

Describes the Cisco Unified Wireless Network (UWN) Solution for 802.11 wireless networking.

Operating System Security

Explains the security components of the operating system for wireless LANs, including Layer 1, 2, and 3 security.

Chapter 2 Using the Web-Browser and CLI Interfaces

Using the Web-Browser Interface

Details the web-browser interface (GUI) for configuring and monitoring controllers and access points.

Configuring the GUI for HTTPS

Steps to protect GUI communication by enabling HTTPS, including certificate generation and loading.

Using the CLI

Describes the command-line interface (CLI) for configuring, monitoring, and accessing debugging capabilities.

Chapter 3 Configuring Ports and Interfaces

Overview of Ports and Interfaces

Explains the key concepts of ports, interfaces, and WLANs for controller connectivity.

Management Interface

Describes the default interface for in-band management and Layer 2 communications with access points.

AP-Manager Interface

Explains the AP-manager interface used for Layer 3 communications between controller and access points.

Configuring the Management, AP-Manager, Virtual, and Service-Port Interfaces

Provides instructions for configuring controller interfaces typically defined via the Startup Wizard or via GUI/CLI.

Using the GUI to Configure the Management, AP-Manager, Virtual, and Service-Port Interfaces

Step-by-step guide to configuring controller interfaces using the GUI.

Using the CLI to Configure the Management, AP-Manager, Virtual, and Service-Port Interfaces

Instructions for displaying and configuring management, AP-manager, virtual, and service-port interfaces via CLI.

Configuring Dynamic Interfaces

Provides instructions for configuring dynamic interfaces using either the GUI or CLI.

Using the GUI to Configure Dynamic Interfaces

Step-by-step guide to creating or editing dynamic interfaces using the GUI.

Using the CLI to Configure Dynamic Interfaces

Instructions for configuring dynamic interfaces using the CLI.

Configuring Ports

Details how to view port status and edit configuration parameters for controller ports.

Configuring Spanning Tree Protocol

Describes Spanning Tree Protocol (STP) for path redundancy and preventing network loops.

Enabling Link Aggregation

Explains link aggregation (LAG) as a partial implementation of the 802.3ad port aggregation standard.

Configuring a 4400 Series Controller to Support More Than 48 Access Points

Explains methods to support more access points per port on 4400 series controllers.

Chapter 4 Configuring Controller SettingsWireless Device Access

Using the Configuration Wizard

Describes how to configure basic controller settings using the configuration wizard on CLI or GUI.

Resetting the Device to Default Settings

Provides instructions for resetting the controller to factory default settings using CLI or GUI.

Configuring Administrator Usernames and Passwords

Guide to creating and managing administrator accounts to prevent unauthorized access and configuration.

Configuring RADIUS Settings

Steps to configure RADIUS server settings for accounting or authentication.

Changing the Default Values of SNMP Community Strings

Advises changing default SNMP community strings ('public', 'private') for security reasons.

Changing the Default Values for SNMP v3 Users

Advises changing default SNMP v3 username, authentication password, and privacy password for security.

Configuring Client Roaming

Explains seamless client roaming across access points managed by the same or different controllers.

CCX Layer 2 Client Roaming

Explains CCX Layer 2 client roaming enhancements like access point assisted roaming and enhanced neighbor lists.

Configuring Voice and Video Parameters

Explains configuring parameters affecting voice and video quality, like Call Admission Control and U-APSD.

Call Admission Control

Describes Call Admission Control (CAC) for maintaining QoS during wireless LAN congestion.

Configuring the Supervisor 720 to Support the WiSM

Explains the configuration of the Supervisor 720 to support the WiSM module in a Catalyst 6500 switch.

Chapter 5 Configuring Security Solutions

Cisco UWN Solution Security

Details Cisco UWN Solution security, including Layer 1, 2, and 3 security components and policy management.

Layer 2 Solutions

Implements industry-standard security like 802.1X and WPA with AES or TKIP encryption.

Rogue Access Point Solutions

Describes security solutions for detecting, tagging, monitoring, and containing rogue access points.

Tagging and Containing Rogue Access Points

Details how to mark rogue access points as known, alert, or contained to manage security.

Using Management over Wireless

Enables operators to monitor and configure controllers using a wireless client (excludes file transfers).

Configuring DHCP Option 82

Explains how DHCP option 82 provides security by enabling the controller as a DHCP relay agent.

Configuring Access Control Lists

Describes access control lists (ACLs) as rules to limit interface access and traffic control.

Using the GUI to Configure Access Control Lists

Step-by-step guide to configuring ACLs using the controller GUI.

Using the CLI to Configure Access Control Lists

Instructions for configuring ACLs using the controller CLI.

Configuring Management Frame Protection

Details Management Frame Protection (MFP) for 802.11 management frame authentication and DoS attack detection.

Using the GUI to Configure MFP

Steps to globally configure MFP or disable/re-enable it for specific WLANs or access points.

Configuring Identity Networking

Explains the identity networking feature for applying QoS, ACLs, and VLANs based on user profiles.

Configuring AAA Override

Allows applying VLAN tagging, QoS, and ACLs to clients based on RADIUS attributes.

Configuring IDS

Describes the Cisco intrusion detection system (CIDS/IPS) for blocking clients involved in network attacks.

Configuring IDS Signatures

Describes configuring IDS signatures (bit-pattern matching rules) to identify attacks in 802.11 packets.

Configuring AES Key Wrap

Explains how to use AES key wrap for more secure shared secrets between controller and RADIUS server.

Configuring Maximum Local Database Entries

Describes specifying maximum local database entries for storing user authentication information.

Chapter 6 Configuring WLANsWireless Device Access

WLAN Overview

Describes the Cisco UWN Solution's ability to control up to 16 WLANs with unique security policies.

Configuring WLANs

Details various sections for configuring WLANs, including display, creation, DHCP, security, and QoS.

Configuring DHCP

Explains how WLANs can be configured to use internal or external DHCP servers.

Configuring MAC Filtering for WLANs

Details the process of enabling MAC filtering at the WLAN level for client authorization.

Configuring Layer 2 Security

Explains how to assign Layer 2 security settings to WLANs, including Static WEP and Dynamic 802.1X.

Dynamic 802.1X Keys and Authorization

Explains how controllers control 802.1X dynamic keys and support 802.1X dynamic key settings.

WPA1 and WPA2

Describes WPA1 and WPA2 as standards-based security solutions for data protection and access control.

CKIP

Describes Cisco Key Integrity Protocol (CKIP) for encrypting 802.11 media using key permutation and MIC.

Configuring Layer 3 Security

Explains how to configure Layer 3 security settings for a wireless LAN on the controller.

Web-Based Authentication

Explains Web authentication for improving WLAN security with SSL and active scripts.

Configuring Quality of Service

Describes configuring Platinum, Gold, Silver, and Bronze QoS profiles for WLANs.

Configuring Cisco Client Extensions

Explains Cisco Client Extensions (CCX) software and its features for wireless communication.

Enabling WLAN Override

Allows selecting which WLANs are transmitted by access points on a per-access point basis.

Configuring Access Point Groups

Explains mapping users on a WLAN to interfaces and grouping access points for network administration.

Creating Access Point Groups

Steps to create access point groups and assign them to WLANs.

Assigning Access Points to Access Point Groups

Details how to assign access points to created access point groups using GUI or CLI.

Configuring Multiple WLANs with the Same SSID

Enables assigning different Layer 2 security policies to multiple WLANs with the same SSID.

Configuring Conditional Web Redirect with 802.1X Authentication

Allows conditional redirection to a web page after successful 802.1X authentication.

Using the GUI to Configure Conditional Web Redirect

Step-by-step guide to configuring conditional web redirect using the controller GUI.

Chapter 7 Controlling Lightweight Access Points

The Controller Discovery Process

Explains how lightweight access points discover and join controllers using LWAPP protocols.

Cisco 1000 Series Lightweight Access Points

Describes the Cisco 1000 series lightweight access point features, models, and configurations.

Cisco Aironet 1510 Series Lightweight Outdoor Mesh Access Points

Describes the AP1510 as a wireless device for mesh connectivity, supporting client access and bridging.

Configuring and Deploying the AP1510

Procedures to ensure proper operation before deploying AP1510: MAC address, mesh, and bridging parameters.

Adding the MAC Address of the Access Point to the Controller Filter List

Explains the necessity of adding AP MAC addresses to the filter list for authorization.

Configuring Mesh Parameters

Provides instructions for configuring mesh parameters to establish a connection with the controller.

Configuring Bridging Parameters

Provides instructions for configuring the access point's role in the mesh network and related bridging parameters.

Autonomous Access Points Converted to Lightweight Mode

Explains using an upgrade tool to convert autonomous access points to lightweight mode.

Access Point Authorization

Explains how controllers authorize access points using MICs or self-signed certificates (SSCs).

Dynamic Frequency Selection

Explains Dynamic Frequency Selection (DFS) compliance with regulations for radio devices.

Performing a Link Test

Explains how to use link tests (ping and CCX) to determine radio link quality.

Configuring Cisco Discovery Protocol

Describes Cisco Discovery Protocol (CDP) for device discovery and interface updates.

Configuring Power over Ethernet

Explains how to configure Power over Ethernet (PoE) for LWAPP-enabled access points powered by injectors or switches.

Using the GUI to Configure Power over Ethernet

Step-by-step guide to configuring PoE using the controller GUI.

Using the CLI to Configure Power over Ethernet

Instructions for configuring PoE using the controller CLI.

Authorizing Access Points Using MICs

Describes configuring controllers to authorize access points using MICs via RADIUS servers.

Chapter 8 Managing Controller Software and Configurations

Transferring Files to and from a Controller

Details built-in utilities for uploading and downloading software, certificates, and configuration files.

Upgrading Controller Software

Explains the automatic upgrade of access points when the controller is upgraded.

Updating Controller Software

Follows steps to upgrade controller software using the CLI, GUI, or wireless connection.

Saving Configurations

Describes saving configuration changes from volatile RAM to non-volatile NVRAM using commands.

Resetting the Controller

Explains how to reset the controller and view the reboot process using CLI console.

Chapter 9 Managing User Accounts

Creating Guest User Accounts

Explains how to provide guest user access on WLANs by creating lobby administrator and guest user accounts.

Creating a Lobby Ambassador Account

Describes creating a lobby ambassador account via GUI or CLI for managing guest accounts.

Creating Guest User Accounts as a Lobby Ambassador

Follows steps for a lobby ambassador to create guest user accounts using the controller GUI.

Web Authentication Process

Describes web authentication as a Layer 3 security feature requiring valid username/password for IP traffic.

Choosing the Web Authentication Login Window

Provides instructions for specifying content and appearance of the web authentication login window.

Choosing the Default Web Authentication Login Window

Instructions for using or modifying the default web authentication login window via GUI or CLI.

Using a Customized Web Authentication Login Window from an External Web Server

Guides on using a customized login window configured on an external web server.

Downloading a Customized Web Authentication Login Window

Explains how to compress and download customized login window files (webauth bundle) to the controller.

Chapter 10 Configuring Radio Resource ManagementWireless Device Access

Overview of Radio Resource Management

Explains Radio Resource Management (RRM) software for real-time RF management of wireless networks.

Dynamic Channel Assignment

Explains dynamic channel assignment to avoid signal contention, collision, and interference.

Dynamic Transmit Power Control

Details how the controller dynamically controls access point transmit power based on real-time wireless LAN conditions.

Coverage Hole Detection and Correction

Explains how RRM's coverage hole detection alerts administrators to needs for additional access points.

Client and Network Load Balancing

Describes how RRM load-balances clients across access points for optimal performance and capacity.

Overview of RF Groups

Defines an RF group as a cluster of controllers coordinating dynamic RRM calculations for scalability.

Configuring an RF Group

Provides instructions for configuring RF groups through either the GUI or the CLI.

Viewing RF Group Status

Provides instructions for viewing RF group status through GUI or CLI.

Enabling Rogue Access Point Detection

Explains configuring access points to detect rogue access points by checking beacon/probe-response frames.

Using the GUI to Enable Rogue Access Point Detection

Step-by-step guide to enabling rogue access point detection using the GUI.

Using the CLI to Enable Rogue Access Point Detection

Instructions for enabling rogue access point detection using the CLI.

Configuring Dynamic RRM

Describes modifying controller's dynamic RRM configuration parameters for optimal radio performance.

Using the GUI to Configure Dynamic RRM

Step-by-step guide to configuring dynamic RRM parameters using the GUI.

Configuring CCX Radio Management Features

Explains configuring parameters affecting client location calculations: broadcast requests and location calibration.

Chapter 11 Configuring Mobility GroupsWireless Device Access

Overview of Mobility Groups

Defines a mobility group as a set of controllers for seamless client roaming and dynamic RF management.

Configuring Mobility Groups

Provides instructions for configuring controller mobility groups through GUI or CLI.

Configuring Auto-Anchor Mobility

Explains using auto-anchor mobility to improve load balancing and security for roaming clients.

Chapter 12 Configuring Hybrid REAPWireless Device Access

Configuring Hybrid REAP

Provides instructions for configuring hybrid REAP on switches, controllers, and access points.

Configuring the Controller for Hybrid REAP

Provides instructions for configuring the controller for hybrid REAP using GUI or CLI.

Configuring an Access Point for Hybrid REAP

Provides instructions for configuring an access point for hybrid REAP using controller GUI or CLI.

Appendix A Safety Considerations and Translated Safety Warnings

Safety Considerations

Provides guidelines for installing Cisco UWN Solution products, including antenna and power requirements.

Related product manuals