Cisco Wireless Control System Configuration Guide, Release 7.0
Chapter 19: Tools Menu
Downloads: This chapterpdf (PDF - 198.0KB) The complete bookPDF (PDF - 30.32MB) | Feedback

Tools Menu

Table Of Contents

Tools Menu

Using Voice Audit

Controller Tab

Rules Tab

Reports Tab

Voice Audit Details

Voice Audit Report Results

Verifying Location Accuracy

Using the Location Accuracy Tool to Test Location Accuracy

Using Scheduled Accuracy Testing to Verify Accuracy of Current Location

Using On-Demand Location Accuracy Testing

Viewing Configuration Audit Summary

Configuring Migration Analysis

Upgrading Autonomous Access Points

Viewing a Firmware Upgrade Report

Changing Station Role to Root Mode

Viewing a Role Change Report

Running Migration Analysis

Viewing a Migration Analysis Report


Tools Menu


The Tools menu provides access to the Voice Audit, Location Accuracy Tool, Configuration Audit Summary, and Migration Analysis features of Cisco WCS.

Using Voice Audit

WCS provides an auditing mechanism to check the controller configuration and to ensure that any deviations from the deployment guidelines are highlighted as Audit Violation.

To access the Voice Audit feature, select Tools > Voice Audit.

The WCS Voice Audit has three tabs: Controllers, Rules, Reports.

Controller Tab

The Controllers tab allows you to choose the controller(s) on which to run the voice audit.


Note


To select the controller(s) for the voice audit, follow these steps:


Step 1 Choose Tools > Voice Audit.

Step 2 Click the Controllers tab.

Step 3 From the Run audit on drop-down list, select from All Controllers, a Floor Area, or a Single Controller.

All Controllers—No additional Controller information necessary.

A Floor Area—From the drop-down lists, select the applicable Campus, Building, Floor, and Controller.

A Single Controller—Select the applicable controller from the drop-down list.

Step 4 Click the Rules tab to determine the rules for this voice audit. See Rules Tab for more information.


Rules Tab

The Rules tab allows you to indicate the applicable VoWLAN SSID and the applicable rules for this voice audit.

To indicate the rules for the voice audit, follow these steps:


Step 1 In the Tools > Voice Audit page, select the Rules tab.

Step 2 Type the applicable VoWLAN SSID in the VoWLAN SSID text box.

Step 3 From the Rules List, select the check boxes of the applicable rules for this voice audit (see Table 19-1).


Note The red circle indicates an invalid rule (due to insufficient data). The green circle indicates a valid rule.


Table 19-1 Rules List for Voice Audit

Rule
Rule Details

VoWLAN SSID

Description—Checks whether or not the VoWLAN SSID exists.

Rule validity—User defined VoWLAN SSID.

CAC: 7920

Description—Checks whether or not 7920 AP CAC is enabled for VoWLAN.

Rule validity—User defined VoWLAN SSID.

CAC: 7920 Clients

Description—Checks whether or not the 7920 Client CAC is disabled for VoWLAN.

Rule validity—User defined VoWLAN SSID.

DHCP Assignment

Description—Checks whether or not DHCP assignment is disabled for VoWLAN.

Rule validity—User defined VoWLAN SSID.

MFP Client

Description—Checks whether or not MFP Client protection is not set to Required for VoWLAN.

Rule validity—User defined VoWLAN SSID.

Platinum QoS

Description—Checks whether or not QoS is set to Platinum (Voice) for VoWLAN.

Rule validity—User defined VoWLAN SSID.

Non Platinum QoS

Description—Checks that QoS is not set to Platinum for non-VoWLAN.

Rule validity—User defined VoWLAN SSID.

WMM

Description—Checks whether or not WMM is enabled for VoWLAN.

Rule data—Select Allowed or Required from the drop-down list.

Rule validity—User defined VoWLAN SSID.

CCKM

Description—Checks whether or not CCKM is enabled for VoWLAN.

Rule validity—User defined VoWLAN SSID.

ACM

Description—Checks whether or not Admission Control is enabled.

Rule data—Select the check box for 802.11a/n ACM, 802.11b/g/n ACM, or both.

Rule validity—At least one band must be selected.

DTPC

Description—Checks whether or not Dynamic Transmit Power Control is enabled.

Rule data—Select the check box for 802.11a/n DTPC, 802.11b/g/n DTPC, or both.

Rule validity—At least one band must be selected.

Expedited Bandwidth

Description—Checks whether or not Expedited Bandwidth is enabled.

Rule data—Select the check box for 802.11a/n Expedited Bandwidth, 802.11b/g/n Expedited Bandwidth, or both.

Rule validity—At least one band must be selected.

Load Based CAC

Description—Checks whether or not Load Based Admission Control (CAC) is enabled.

Rule data—Select the check box for 802.11a/n Load Based CAC, 802.11b/g/n Load Based CAC, or both.

Rule validity—At least one band must be selected.

CAC: Max Bandwidth

Description—Checks whether or not Maximum RF Bandwidth for Call Admission Control is configured properly.

Rule data—Enter percentages in the text boxes for Maximum Allowed Bandwidth for 802.11a/n and 802.11b/g/n.

Rule validity—Data for at least one band must be provided. Valid range is 0—100%.

CAC: Reserved Roaming Bandwidth

Description—Checks whether or not Reserved Roaming Bandwidth for Call Admission Control is configured properly.

Rule data—Enter percentages in the text boxes for Maximum Reserved Roaming Bandwidth for 802.11a/n and 802.11b/g/n.

Rule validity—Data for at least one band must be provided. Valid range is 0—100%.

Pico Cell mode

Description—Checks whether or not Pico Cell mode is disabled.

Rule data—Select the check boxes for 802.11a/n Pico Cell mode, 802.11b/g/n Pico Cell mode, or both.

Rule validity—At least one band must be selected.

Beacon Period

Description—Checks whether or not Beacon Period is configured properly.

Rule data—Enter the time (ms) in the text boxes for Beacon Period for 11a/n and 11b/g/n.

Rule validity—Data for at least one band must be provided. Valid range is 20—1000. Enter 0 or keep it empty if a band should not be checked.

Short Preamble

Description—Checks whether or not Short Preamble is enabled for 11b/g.

Fragmentation Threshold

Description—Checks whether or not Fragmentation Threshold is configured properly.

Rule data—Enter the threshold amount (bytes) in the text boxes for Fragmentation Threshold for 11a/n and 11b/g/n.

Rule validity—Data for at least one band must be provided. Valid range is 256—2346. Enter 0 or keep it empty if a band should not be checked.

Data Rate

Description—Checks whether or not Data Rates are configured properly.

Data Rate configuration for 11b/g—Select Disabled, Supported, or Mandatory for each Mbps category.

Data Rate configuration for 11a—Select Disabled, Supported, or Mandatory for each Mbps category.

Aggressive Load Balancing

Description—Checks whether or not Aggressive Load Balancing is disable.

QoS Profile

Description—Checks that QoS Profiles are not altered from default values.

EAP Request Timeout

Description—Checks whether or not EAP Request Timeout is configured properly.

Rule data—Enter the time limit (sec) for the EAP Request Timeout

Rule validity—Data cannot be left blank or as zero. Valid range is 1—120.

ARP Unicast

Description—Checks whether or not ARP Unicast is disabled.



Note Use the Reset button to reset the rules to the default configuration.


Step 4 When the rules are configured for this voice audit, click Save to save the current configuration or Save and Run to save the configuration and run the report.

Step 5 Click the Report tab to view the Report results. See Reports Tab for more information.


Reports Tab

The Voice Audit Report provides a summary of the voice audit details and report results.

Voice Audit Details

Voice Audit Report Results

Voice Audit Details

The Voice Audit details provides the following information:

Audit Status—Indicates whether or not the audit is complete.

Start Time and End Times—Indicates the time at which the voice audit began and ended.

# Total Devices—Indicates the number of devices involved in the voice audit.

# Completed Devices—Indicates the number of devices the tool attempted to audit.


Note If a controller is unreachable, the audit skips it. The Voice Audit will not complete any rule checks for that controllers.


# Rules—Indicates the number of rules selected for the voice audit.

Voice Audit Report Results

The Voice Audit Report results include the following information:

IP Address—Indicates the IP Address for the controller involved in the voice audit.

Rule—Indicates the rule that was applied for this controller.

Result—Indicates the result (Skipped, Violation, Unreachable) of the applied rule.


Note If there is no mismatch between the current configuration and a rule value, no results are displayed for that rule.


Details—Defines an explanation for the rule results.


Note If the applied rule results in a Violation, the Details link provides additional information including Name, the Device Value, and the Rule Value. Hold your mouse cursor over the link to view the additional details.


Time—Provides a timestamp for the voice audit.

Verifying Location Accuracy

By verifying for location accuracy, you are ensuring that the existing access point deployment can estimate the true location of an element within 10 meters at least 90% of the time.

You can analyze the location accuracy of non-rogue and rogue clients, asset tags, and interferers by using the Accuracy Tool.

The Accuracy Tool enables you to run either a scheduled or on-demand location accuracy test. Both tests are configured and executed through a single page.

Using the Location Accuracy Tool to Test Location Accuracy

There are two ways to test location accuracy:

Scheduled Accuracy Testing-Employed when clients, tags and interferers are already deployed and associated to the wireless LAN infrastructure. Scheduled tests can be configured and saved when clients, tags and interferers are already pre-positioned so that the test can be run on a regularly scheduled basis.

On-Demand Accuracy Testing-Employed when elements are associated but not pre-positioned. On demand testing allows you to test the location accuracy of clients, tags and interferers at a number of different locations. It is generally used to test the location accuracy for a small number of clients, tags and interferers.

Both are configured and executed through a single page.


Note You must enable the Advanced Debug option in Cisco WCS to use the Scheduled and On-demand location accuracy testing features. The Location Accuracy Tool does not appear as an option under the Tools menu when the Advanced Debug option is not enabled.


To enable the advanced debug option in Cisco WCS, follow these steps:


Step 1 In Cisco WCS, choose Monitor > Maps.

Step 2 Select Properties from the Select a command drop-down list, and click Go.

Step 3 In the page that appears, select Enabled for the Advanced Debug Mode option. Click OK.


Note If Advanced Debug is already enabled, you do not need to do anything further. Click Cancel.


You can now run location accuracy tests on the mobility services engine using the Location Accuracy Tool.

Proceed to either the "Using Scheduled Accuracy Testing to Verify Accuracy of Current Location" or "Using On-Demand Location Accuracy Testing" section.


Using Scheduled Accuracy Testing to Verify Accuracy of Current Location

To configure a scheduled accuracy test, follow these steps:


Step 1 Choose Tools > Location Accuracy Tool.

Step 2 Choose New Scheduled Accuracy Test from the Select a command drop-down list.

Step 3 Enter a test name.

Step 4 Select an area type from the drop-down list.

Step 5 Campus is configured as Root Area by default. There is no need to change this setting.

Step 6 Choose the building from the drop-down list.

Step 7 Choose the floor from the drop-down list.

Step 8 Choose the begin and end time of the test by entering the days, hours, and minutes. Hours are represented using a 24-hour clock.


Note When entering the test start time, be sure to allow enough time prior to the test start to position testpoints on the map.


Step 9 Choose the destination point for the test results. You can have the report emailed to you or you can download the test results from the Accuracy Tests > Results page. Reports are in PDF format.


Note If you select the email option, a SMTP Mail Server must first be defined for the target email address. Choose Administrator > Settings > Mail Server Configuration to enter the appropriate information.


Step 10 Click Position Testpoints. The floor map appears with a list of all clients, tags, and interferers on that floor with their MAC addresses.

Step 11 Click the check box next to each client, tag and interferer for which you want to check the location accuracy.

When you select the MAC address check box for a client or tag or interferer, two overlapping icons appear on the map for that element.

One icon represents the actual location and the other the reported location.


Note To enter a MAC address for a client or tag or interferer that is not listed, select the Add New MAC check box and enter the MAC address, and click Go. An icon for the element appears on the map. If the newly added element is on the mobility services engine but on a different floor, the icon appears in the left corner (0,0 position).


Step 12 If the actual location for an element is not the same as the reported location, drag the actual location icon for that element to the correct position on the map.


Note Only the actual location icon can be dragged.


Step 13 Click Save when all elements are positioned. A page appears confirming successful accuracy testing.

Step 14 Click OK to close the confirmation page. You are returned to the Accuracy Tests summary page.


Note The accuracy test status appears as Scheduled when the test is about to execute. A status of Running appears when the test is in progress and Idle when the test is complete. A Failure status appears when the test is not successful.


Step 15 To view the results of the location accuracy test, click Test name and then click Download on the page that appears.

The Scheduled Location Accuracy Report includes the following information:

A summary location accuracy report that details the percentage of elements that fell within various error ranges

An error distance histogram

A cumulative error distribution graph

An error distance over time graph

A summary by each MAC address whose location accuracy was tested noting its actual location, error distance and a map showing its spatial accuracy (actual vs. calculated location) and error distance over time for each MAC.

Using On-Demand Location Accuracy Testing

An on-demand accuracy test is run when elements are associated but not pre-positioned. On-demand testing allows you to test the location accuracy of clients, tags, and interferers at a number of different locations. You generally use it to test the location accuracy for a small number of clients, tags, and interferers.

To run an on-demand accuracy test, follow these steps:


Step 1 Choose Tools > Location Accuracy Tool.

Step 2 Choose New On demand Accuracy Test from the Select a command drop-down list.

Step 3 Enter a test name.

Step 4 Select the area type from the drop-down list.

Step 5 Campus is configured as root area by default. There is no need to change this setting.

Step 6 Choose the building from the drop-down list.

Step 7 Choose the floor from the drop-down list.

Step 8 View test results in the Accuracy Tests > Results page. Reports are in PDF format.

Step 9 Click Position Testpoints. The floor map appears with a red cross hair at the (0,0) coordinate.

Step 10 To test the location accuracy and RSSI of a location, select either client or tag or interferer from the drop-down list on the left. A list of all MAC addresses for the selected option (client or tag or interferer) appear in a drop-down list to its right.

Step 11 Select a MAC address from the drop-down list, move the red cross hair to a map location, and click the mouse to place it.

Step 12 From the Zoom percentage drop-down list, choose the zoom percentage for the map.

The X and Y text boxes are populated with the coordinates based on the position of the red cross hair in the map.

Step 13 Click Start to begin collecting accuracy data.

Step 14 Click Stop to finish collecting data. You should allow the test to run for at least two minutes before clicking Stop.

Step 15 Repeat Step 10 to Step 14 for each testpoint that you want to plot on the map.

Step 16 Click Analyze when you are finished mapping the testpoints.

Step 17 Click the Results tab on the page that appears.

The on-demand accuracy report includes the following information:

A summary location accuracy report that details the percentage of elements that fell within various error ranges

An error distance histogram

A cumulative error distribution graph

Step 18 To download accuracy test logs from the Accuracy Tests summary page:

a. Select the listed test check box and select either Download Logs or Download Logs for Last Run from the Select a command menu.

b. Click Go.

The Download Logs option downloads the logs for all accuracy tests for the selected test(s).

The Download Logs for Last Run option downloads logs for only the most recent test run for the selected test(s).


Viewing Configuration Audit Summary

Choose Tools > Config Audit to launch the Configuration Audit Summary page (see Figure 19-1).

Figure 19-1 Tools > Config Audit Summary Page

This page provides a summary of the following:

Total Enforced Config Groups—Identifies the count of config group templates which are configured for Background Audit and enforcement enabled.

Click the link to launch the Config Group page to view config groups with Enforce Configuration enabled.

Total Mismatched Controllers—Identifies the number of mismatched controllers. Mismatched controllers indicate that there were configuration differences found between the WCS and the controller during the last audit.

Click the link to launch the controller list sorted on the mismatched audit status column. Click an item in the Audit Status column to view the audit report for this controller.

Total Config Audit Alarms—Identifies the number of alarms generated when audit discrepancies are enforced on config groups.

Click the link to view all config audit alarm details.


Note If enforcement fails, a critical alarm is generated on the config group. If enforcement succeeds, a minor alarm is generated on the config group. The alarms have links to the audit report where you can view list of discrepancies for each controller.


Most recent 5 audit alarms—Lists the most recent configuration audit alarms including the object name, event type, and date and time for the audit alarm.

Click <View All> to view the applicable Alarm page which includes all configuration audit alarms.

Configuring Migration Analysis

Follow these steps to view the Migration Analysis Summary.


Note You can also access the migration analysis summary by choosing Configure > Migration Templates and selecting View Migration Analysis Summary from the Select a command drop-down list.



Step 1 Choose Tools > Migration Analysis.

The autonomous access points are eligible for migration only if all the criteria has a pass status. A red X designates ineligibility, and a green checkmark designates eligibility. These columns represent the following:

Privilege 15 Criteria—The Telnet credential provided as part of the autonomous access point discovery must be privilege 15.

Software Version—Conversion is supported only from 12.3(7)JA releases excluding 12.3(11)JA, 12.3(11)JA1, 12.3(11)JA2, and 12.3(11)JA3.

Role Criteria—A wired connection between the access point and controller is required to send the association request; therefore, the following autonomous access point roles are required:

root

root access point

root fallback repeater

root fallback shutdown

root access point only

Radio Criteria—In dual-radio access points, the conversion can happen even if only one radio is of the supported type.

Upgrading Autonomous Access Points

You can choose to upgrade the autonomous access points manually or automatically. In the Migration Analysis page, you can select the access point with the software version listed as failed and choose Upgrade Firmware from the Select a command drop-down list. This process upgrades the autonomous firmware image of the Cisco IOS access point to a supported version.

WCS uses a Telnet-based connection to upgrade the access point firmware. If you choose the automatic option, the internal TFTP server is used with the default images present in WCS. The default images as per device type are as follows:

ap801-k9w7-tar.124-10b.JA3.tar

c1100-k9w7-tar.123-7.JA5.tar

c1130-k9w7-tar.123-7.JA5.tar

c1200-k9w7-tar.123-7.JA5.tar

c1240-k9w7-tar.12307.JA5.tar

c1250-k9w7-tar.124-10b.JA3.tar

c1310-k9w7-tar.123-7.JA5.tar

If you choose the manual option, you are presented with an additional screen where TFTP server IP, file path, and file path name must be entered. The final page is the report page.

Viewing a Firmware Upgrade Report

Choose View Firmware Upgrade Report from the Select a command drop-down list to view a current report of the upgrade status for the selected access point.

The following information displays:

AP Address—IP address of the access point.

Status—Current status of the firmware upgrade.

TimeStamp—Indicates the date and time of the upgrade.

AP Logs

Click OK to return to the Migration Analysis Summary page.

See "Upgrading Autonomous Access Points" section for more information.

Changing Station Role to Root Mode

Because a wired connection between the access point and controller is required to send the association request, the autonomous access point must be assigned the appropriate role. If the role shows as ineligible, you can choose Change Station Role to Root Mode from the Select a command drop-down list.

Viewing a Role Change Report

Because a wired connection between the access point and controller is required to send the association request, the autonomous access point must be assigned the appropriate role.

To view a report of these role changes, choose View Role Change Report from the Select a command drop-down list. The following information displays:

AP Address—IP address of the access point.

Status—Current status of the role change.

TimeStamp—Indicates the date and time of the upgrade.

AP Logs

Click OK to return to the Migration Analysis Summary page.

Running Migration Analysis

You can choose Run Migration Analysis from the Select a command drop-down list of the Migration Analysis Summary page. The resulting migration analysis summary shows the current status of different criteria. Initially, migration analysis is run automatically when the access point is discovered.

Viewing a Migration Analysis Report

You can choose View Migration Analysis Report from the Select a command drop-down list of the Migration Analysis Summary page to generate a report. The report includes the following:

Access point address

Status

Timestamp

Access point logs