Cisco Unified Wireless Guest Access Services

Table Of Contents

Cisco Unified Wireless Guest Access Services

Introduction

Scope

Wireless Guest Access Overview

Wireless Guest Access using a Centralized Controller Architecture

Non-Controller Based Wireless Guest Access

Wireless Controller Guest Access

Supported Platforms

WLAN Anchors and Ethernet in IP to Support Guest Access

Anchor Controller Deployment Guidelines

Anchor Controller Positioning

DHCP Services

Routing

Anchor Controller Sizing and Scaling

Anchor Controller Redundancy

Web Portal Authentication

User Redirection

Guest Credentials Management

Local Controller Lobby Admin Access

Guest User Authentication

External Authentication

Guest Pass-through

Guest Access Configuration

Anchor Controller Interface Configuration

Guest VLAN Interface Configuration

Anchor Controller DHCP Configuration (Optional)

Adding a New DHCP Scope to the Anchor Controller

Mobility Group Configuration

Defining a Default Mobility Domain Name for the Anchor Controller (Optional)

Defining Mobility Group Members for the Anchor Controller

Adding an Anchor Controller as a Mobility Group Member in the Remote Controller

Guest WLAN Configuration

Guest WLAN Configuration for the Remote Controller

Enabling the Guest WLAN

Guest WLAN Configuration on the Anchor Controller

Guest WLAN Policies for the Anchor Controller

Web Portal Page Configuration and Management

Internal Web Page Management

Internal Web Certificate Management

Support for External Web Redirection

Guest Management

Guest Management Using WCS

Applying Credentials

Managing Guest Credentials Directly on the Anchor Controller

Configuring the Maximum Number of User Accounts

Guest User Management Caveats

External Radius Authentication

Adding a RADIUS Server

External Access Control

Verifying Guest Access Functionality

Troubleshooting Guest Access

System Monitoring

Debug Commands


Cisco Unified Wireless Guest Access Services


The introduction of Wireless LAN (WLAN) technologies in the enterprise has changed the way corporations and small-to-medium businesses function by freeing staff and network resources from the constraints of fixed network connectivity.

WLAN has also changed how individuals access the Internet and their corporate networks from public locations. The advent of Public WLAN (Hotspots) has caused mobile workers to become accustomed to being able to access their corporate network from practically anywhere.

Introduction

The paradigm of public access has extended to the enterprise itself. Long gone is the scenario where it was sufficient for a company to provide its partners, visitors, and guests with a place to sit and possibly an outside line with which to make phone calls. Our highly mobile, information-on-demand culture requires on-demand network connectivity. A half-day spent at a partner or customer venue without access to one's own network resources can impact the productivity of a meeting, service or sales call, and reduce the overall personal productivity of the guest who is away from their office. For this reason, enterprise guest access services are becoming increasingly important and a necessity in the corporate environment.

While there is broad recognition that guest networking is becoming increasingly important, there is also well-founded apprehension over how one safeguards their internal company information and infrastructure assets. Ironically, unbeknownst to many enterprises, their network might already play host to guests who, in an uncontrolled manner, find ways to access the Internet via improperly implemented wired or wireless networks. These guests are not hackers in the true sense, but otherwise well-intentioned individuals trying to get their jobs done. So, on the surface, while it might sound risky to implement a guest access solution, when implemented correctly, an enterprise that implements a guest access solution will most likely improve their overall security posture as a result of the network audits associated with the implementation process.

In addition to overall improved security, implementing a guest access network offers these additional general benefits:

Authentication and authorization control of guests based on variables including date, duration, and bandwidth

An audit mechanism to track who is currently using, or has used, the network

Additional benefits of a wireless-based guest access include the following:

It provides wider coverage by including areas such as lobbies and other common areas that otherwise might not have been wired for network connectivity.

It removes the need for designated guest access areas or rooms.

Scope

Several architectures can be implemented to offer guest access in the enterprise. It is not the goal of this chapter to cover all possible solutions. Instead, this chapter focuses on the implementation of wireless guest networking using the Cisco centralized controller and lightweight AP (LWAPP) architecture. For more information on deploying wired and wireless Guest Access services in other topology scenarios, see the following URL: http://www.cisco.com/en/US/docs/solutions/Enterprise/Network_Virtualization/GuestAcc.html.

Wireless Guest Access Overview

Ideally, the implementation of a wireless guest network uses as much of an enterprise's existing wireless and wired infrastructure as possible to avoid the cost and complexity of building a physical overlay network. Assuming this is the case, the following additional elements and functions are needed:

A dedicated guest WLAN/SSID—Implemented throughout the campus wireless network wherever guest access is needed

Guest traffic segregation—Requires implementing Layer 2 or Layer 3 techniques across the campus network to restrict where guests are allowed to go.

Access control—Involves using imbedded access control functionality within the campus network or implementing an external platform to control guest access to the Internet from the enterprise network.

Guest user credential management—A process by which a sponsor can create temporary credentials in behalf of a guest. This function might be resident within an access control platform or it might be a component of AAA or some other management system.

Wireless Guest Access using a Centralized Controller Architecture

The Cisco Centralized WLAN solution offers a flexible, easy-to-implement method for deploying wireless guest access by using Ethernet in IP (RFC3378) within the centralized architecture. Ethernet in IP is used to create a tunnel across a Layer 3 topology between two WLAN controller endpoints. The benefit of this approach is that there are no additional protocols or segmentation techniques that must be implemented to isolate guest traffic from the enterprise. See Figure 12-1 for an example of guest access topology using a centralized WLAN architecture.

Figure 12-1 Centralized Controller Guest Access

As shown in Figure 12-1, a controller is located in the enterprise's DMZ where it performs an anchor function. This anchor controller is responsible for terminating EoIP tunnels that originate from other campus WLAN controllers throughout the network. Remote controllers are responsible for termination, management, and standard operation of the various WLANs provisioned throughout the enterprise, including one or more guest WLANs. Guest WLANs, instead of being bridged locally to a corresponding VLAN, are bridged via an EoIP tunnel to the anchor controller. Specifically, guest WLAN data frames are bridged via LWAPP to the remote controller and via EoIP for the campus WLC to a guest VLAN defined at the anchor WLC. In this way, guest user traffic is forwarded to the Internet transparently, with no visibility by, or interaction with, other traffic in the enterprise.

Non-Controller Based Wireless Guest Access

In place of using a centralized WLAN architecture, the biggest challenge in implementing guest access services is the segmentation (isolation) of guest traffic from the rest of the enterprise. This is especially true for wired networks or wireless networks that use autonomous (fat) APs. Some method of traffic segmentation must be implemented beginning with a separate WLAN or VLAN, coupled with a policy that is applied at the first Layer 3 hop in the network. Possible options include the following:

Distributed ACLs—This method involves implementing ACLs throughout the enterprise to restrict guests from accessing network resources within the host enterprise network (see Figure 12-2).

Figure 12-2 Segmentation using Distributed ACLs

Policy based routing (PBR) and GRE tunnels—GRE tunnels are used to create a logical overlay network through which guest traffic is directed to the Internet edge or DMZ. Policy-based routing is used to classify and enforce guest traffic into the tunnels. Companies that have deployed, or are looking to deploy, a PBR/GRE should seriously consider, if at all possible, VRF-lite with GRE (see Figure 12-3).

Figure 12-3 Segmentation using PBR into GRE Tunnels

VRF-Lite and GRE or mGRE tunnels—This technique is similar to the PBR/GRE method. An overlay network is created through the implementation of GRE tunnels. However, instead of policy routing traffic into the tunnels, the guest access VLAN and interfaces, along with the tunnel interfaces, are assigned to a virtual routing and forwarding (VRF) instance. This ensures guest traffic can be forwarded only through the tunnels (see Figure 12-4 and Figure 12-5).

Figure 12-4 Segmentation using VRF-lite and GRE

Figure 12-5 Segmentation with VRF-Lite and mGRE

Each of the methods described here has benefits and drawbacks. Additional challenges for the enterprise include the following:

Determining which method to use

Modifying existing topologies to accommodate a given segmentation method or introducing new versions of code into the network

The added complexity of managing a logical overlay network

In addition, it simply might not be practical or possible for an enterprise to implement one of the segmentation methods described in this chapter. In that case, and if wireless guest access is all that is needed, deploying guest services using a centralized WLAN controller architecture is a good alternative.

Otherwise, if an enterprise requires both wireless and wired guest access, see the guest access documentation at the following URL: http://www.cisco.com/en/US/docs/solutions/Enterprise/Network_Virtualization/GuestAcc.html.

The remainder of this chapter focuses on the implementation of wireless guest networking using the Cisco Centralized Controller solution.

Wireless Controller Guest Access

The Cisco Wireless Controller Guest Access solution is self-contained and does not require any external platforms to perform access control, web portal, or AAA services. All these functions are configured and run within the anchor controller. However, the option exists to implement one or all of these functions externally and that is covered later in the chapter.

Supported Platforms

The anchor function, which includes tunnel termination, web authentication, and access control is supported on the following WLC platforms (using version 4.0 and later software images):

Cisco 4400 Series

Cisco 6500 Series (WISM)

Cisco 3750 with integrated WLC

The following WLC platforms cannot be used for anchor functions, but can be used for normal controller operations and guest tunnel origination to an anchor controller:

Cisco WLAN Controller Module for Integrated Service Routers (ISR)

Cisco 2000 Series

WLAN Anchors and Ethernet in IP to Support Guest Access

A key feature of the Cisco centralized controller architecture is the ability to statically map one or more provisioned WLANs to a specific controller (anchor) within the network, using an EoIP tunnel. By using this technique, a guest WLAN and all associated guest traffic can be transported transparently across the enterprise network to an anchor controller that resides in the Internet DMZ (see Figure 12-6).

Figure 12-6 Static EoIP Tunnels

Figure 12-7 shows a sniffer trace of an Ethernet in IP tunnel (highlighted) between a branch wireless controller with a guest WLAN provisioned and an anchor controller that is performing local web authentication. The first IP detail shown represents the Ethernet in IP tunnel between the branch and anchor controllers. The second IP detail is that of guest traffic (in this case, a DNS query).

Figure 12-7 Sample Ethernet in IP Sniffer Trace

Anchor Controller Deployment Guidelines

This section provides guidelines for deploying an anchor controller to support wireless guest access.

Anchor Controller Positioning

Because the anchor controller is responsible for termination of guest WLAN traffic and subsequent access to the Internet, it should be positioned in the enterprise's Internet DMZ. By doing so, rules can be established within the firewall to precisely manage communications between authorized controllers throughout the enterprise and the anchor controller. Such rules might including filtering on source or destination controller addresses, UDP port 16666 for inter-WLC communication, and IP protocol ID 97 Ethernet in IP for client traffic. Other rules that might be needed include the following:

TCP 161 and 162 for SNMP

UDP 69 for TFTP

TCP 80 or 443 for HTTP, or HTTPS for GUI access

TCP 23 or 22 for Telnet, or SSH for CLI access

Depending on the topology, the firewall can be used to protect the anchor controller from outside threats.

For the best possible performance and because of its suggested positioning in the network, it is strongly recommended that the guest anchor controller be dedicated to supporting guest access functions only. In other words, the anchor controller should not be used to support guest access in addition to controlling and managing LWAPP APs in the enterprise.

DHCP Services

As previously described, guest traffic is transported at Layer 2 via EoIP. Therefore, the first point at which DHCP services can be implemented is either locally on the anchor controller or the controller can relay client DHCP requests to an external server. See Guest Access Configuration for configuration examples.

Routing

Guest traffic egress occurs at the anchor controller. Guest WLANs are mapped to a specific physical interface or VLAN on the anchor. Depending on the topology, this interface or VLAN might connect to an interface on a firewall, or directly to an Internet border router. Therefore, a client's default gateway IP is either that of the firewall or the address of a VLAN or interface on the first hop router. For ingress routing, it is assumed the guest VLAN is directly connected to a DMZ interface on a firewall or to an interface on a border router. In either case, the guest (VLAN) subnet is known as a directly connected network and advertised accordingly.

Anchor Controller Sizing and Scaling

The most cost-effective platform to support guest networking in most enterprise deployments is the Cisco 4400 Series controller. Assuming the controller is being deployed to support guest access and tunnel termination functions only, the 4402 with support for 12 APs is sufficient because it is assumed the controller is not going to be used to manage LWAPP APs in the network.

A single 4400 Series controller can support EoIP tunnels from up to 40 other controllers within the enterprise. Additionally, the 4400 supports up to 2500 simultaneous users and has a forwarding capacity of 2 Gbps.

Anchor Controller Redundancy

Anchor controller redundancy is expected to be supported in future releases.

Web Portal Authentication

The Cisco Centralized Guest Access solution can make use of a built-in web portal that is used to solicit guest credentials for authentication and offers simple branding capabilities, along with the ability to display disclaimer or acceptable use policy information (see Figure 12-8).

Figure 12-8 Controller Web Authentication Page

The web portal page is available on all Cisco WLAN controller platforms and is invoked by default when a WLAN is configured for Layer 3 web policy-based authentication.

If a more complex page is required, administrators have the option of importing and locally storing a customized page. Additionally, if an enterprise wants to use an external web server, the controller can be configured to redirect to it in place of using the internal server. See Guest Access Configuration for web page configuration guidelines.

User Redirection

As is typical for most web-based authentication access, for guest clients to be redirected to the controller web authentication page, they must launch a web browser session and attempt to open a destination URL. For redirection to work correctly, the following conditions must be met:

DNS resolution—The guest access topology must ensure that valid DNS servers are assigned via DHCP and those DNS servers are reachable to users before authentication. When a client associates to a web policy WLAN for authentication, all traffic is blocked except DHCP and DNS. Therefore, DNS servers must be reachable from the anchor controller. Depending on the topology, this might require opening up conduits through a firewall to permit DNS or modifying ACLs on an Internet border router.


Note Clients with static DNS configurations might not work depending on whether the specified DNS servers are reachable from the guest network.


Resolvable Home Page URL—A guest user home page URL must be globally resolvable by DNS. If a user home page is, for example, an internal company home page that cannot be resolved outside of their company intranet, that user is not redirected. In this case, the user must open a URL to a public site such as www.yahoo.com or www.google.com.

HTTP Port 80—If a user home page connects to a web server on a port other than HTTP port 80, they are not redirected. Again, the user needs to open a URL that uses port 80 to be redirected to the controllers web authentication page.


Note In addition to port 80, there is an option to configure one additional port number that the controller can monitor for redirection.The setting is available only through the CLI of the controller: <controller_name> config> network web-auth-port <port>.


Guest Credentials Management

Guest credentials can be created and managed centrally using WCS beginning with release 4.0 and later. A network administrator can establish a limited privilege administrative account within WCS that permits lobby ambassador access for the purpose of creating guest credentials. The only function a lobby ambassador is permitted to do is create and assign guest credentials to a controller serving as an anchor for wireless guest access. See Guest Access Configuration for configuration guidelines.

As with many configuration tasks within WCS, guest credentials are created using templates. For more information regarding administration and use of WCS, see Chapter 8, "Cisco Unified Wireless Control System." A guest user template includes the following information:

User name

Auto generate password (check box) or Administrator assigned password

Confirm password

SSID (select box)—Only WLANs configured for Layer 3 web policy authentication are displayed

Description

Credentials lifetime—days:hours:minutes

After a lobby ambassador has created a guest template, it can be applied to one or more controllers. Only controllers with web policy-configured WLANs are listed as a candidate controller to which the template can be applied.

Guest credentials, when applied, are stored locally on the anchor controller and remain there until expiration of the Lifetime variable defined in the guest template. If a wireless guest is associated and active when their credentials expire, the WLAN controller stops passing traffic from that user, causing them to be disconnected. Unless the guest credentials are re-applied (to the controller), the user is no longer able to authenticate and access the network.


Note The Lifetime variable associated with guest credentials is independent of the WLAN session time-out variable. If a user remains connected beyond the guest WLAN session time-out interval, they are de-authenticated. The user is then redirected to the web portal and, assuming their credentials have not expired, is required to log back in. To avoid annoying redirects for authentication, the guest WLAN session time-out variable should be set accordingly.


Local Controller Lobby Admin Access

In the event a centralized WCS management system is not deployed, a network administrator can establish a local user management account on the anchor controller, which has lobby admin privileges only. A person who logs in to the controller using the lobby admin account has access only to guest user management functions. Options available for local guest management are the same as for guest template creation in WCS:

User name

Auto generate password (check box) or administrator-assigned password

Confirm the password

SSID (check box)

Only WLAs configured for Layer 3 web policy authentication are displayed.

Description

Credentials lifetime—days:hours:minutes

Any credentials that may have been applied to the controller by WCS are shown when an admin logs into the controller using the lobby admin account. The lobby admin account has rights to modify or delete any guest credentials that were created by WCS.

Guest User Authentication

As was previously covered in Guest Credentials Management, when an administrator uses WCS or a local admin account on a controller to create guest user credentials, those credentials are stored locally on the controller, which in the case of a centralized guest access topology, would be the anchor controller.

When a wireless guest logs in through the web portal, the controller handles the authentication in the following order:

1. The controller checks its local database for username and password and, if present, grants access.

If no user credentials are found, then:

2. The controller checks to see if an external RADIUS server has been configured for the guest WLAN (under WLAN configuration settings). See External Radius Authentication, page 12-38 for a configuration example. If so, then the controller creates a RADIUS access-request packet with the user name and password and forwards it to the selected RADIUS server for authentication.

If no specific RADIUS servers have been configured for the WLAN:

3. The controller checks its global RADIUS server configuration settings. Any external RADIUS servers configured with the option to authenticate "network" users are queried with the guest user credentials. See External Radius Authentication, page 12-38 for a configuration example. Otherwise, if no servers have network user selected, and the user has not authenticated as a result of 1 or 2 above, the authentication fails.


Note A RADIUS server can still be used to support network user authentication even if the network user check box is cleared under the global settings. However, to do so, that server must be explicitly selected under a given WLANs RADIUS server settings. See External Radius Authentication, page 12-38 for a configuration example.


External Authentication

The guest account creation (Lobby Ambassador) capabilities available in WCS and locally on the controller can be used only to create and store guest user information locally on the controller. An enterprise may already have developed similar functionality in conjunction with a wired guest access or NAC-type deployment. In this case, the anchor controller/guest WLAN can be configured to forward web portal authentication to an external RADIUS server, as described in Guest User Authentication.

The default protocol used by the controller to authenticate web users is Password Authentication Protocol (PAP). In the event you are authenticating web users to an external AAA server, be sure to verify the protocols supported by that server. The anchor controller can also be configured to use CHAP or MD5-CHAP for web authentication. The method is configured under the general configuration settings of the controller by using the web administrative interface of the controller, or through WCS.

External Authentication using Cisco Secure ACS and Microsoft User Databases

If a guest access deployment is planning to use a Microsoft user database in conjunction with Cisco ACS to authenticate guest users, see the following additional Cisco ACS configuration caveats: http://www.cisco.com/en/US/docs/net_mgmt/cisco_secure_access_control_server_for_windows/4.0/installation/guide/windows/postin.html.

Guest Pass-through

Another variation of wireless guest access is to bypass user authentication altogether and allow open access. However, an enterprise might still want to present an acceptable use policy or disclaimer page to users before granting access. If this is the case, then a guest WLAN can be configured for web policy pass through. In this scenario, a guest user is redirected to a portal page containing disclaimer information. Pass through mode also has an option for a user to enter an e-mail address before connecting (see Figure 12-9 and Figure 12-10 for sample pages). See Guest Access Configuration for configuration examples.

Figure 12-9 Pass-through Welcome AUP Page

Figure 12-10 Pass-through Page with Email

Guest Access Configuration

This section describes how to enable a wireless guest access service using the Cisco Centralized WLAN Controller solution. The configuration tasks require the use of a web browser, Windows IE6 (only). A web session is established with the controller by opening an HTTPS session to the controller management IP address: https://management_IP or optionally to a controller service port IP address.

The following procedures assume there is already a deployed infrastructure of controllers and lightweight APs with the possible exception of the anchor controller platform. See Anchor Controller Deployment Guidelines for more information.


Note Cisco recommends that the configuration steps outlined in this section are followed in the order in which they are presented.


The following references are used throughout the configuration sections:

Remote Controller—Refers to the one or more controllers deployed in an enterprise campus or branch location that are used for managing and controlling a group of lightweight APs. Remote controllers map a guest WLAN into a static EoIP tunnel.

Anchor Controller—Refers to a controller deployed in the enterprise DMZ that is used to perform EoIP tunnel termination, web redirection, and user authentication.


Note Only the relevant portion of a configuration screen capture is shown in this section.


Anchor Controller Interface Configuration

As described in Anchor Controller Positioning, Cisco strongly recommends that the anchor controller be dedicated to guest access functions and not be used to control and manage lightweight APs in the enterprise.

This section does not address all aspects of interface configuration on the anchor controller. It is assumed the reader is familiar with the controller initialization and configuration process required upon initial boot-up using the serial console interface.

This section offers specific information and caveats as it pertains to configuring interfaces on a controller being deployed as an anchor in a guest access topology.

As part of the initial configuration (through serial console interface), you are required to define three static interfaces:

Controller management—This interface/IP is used for communications with other controllers in the network. It is also the interface used to terminate EoIP tunnels that originate from the remote controllers.

AP Manager interface—Even though the controller is not used to manage APs, you are still required to configure this interface. The easiest thing to do is to configure the interface to be on the same VLAN and subnet as the primary management interface.


Note This would not otherwise be recommended in a traditional deployment where the controller is managing lightweight APs.


Virtual Interface—The controller quick start installation documentation recommends defining the virtual IP with an address, such as 1.1.1.1. This address needs to be the same for all controllers that are members of the same mobility group name. This virtual interface is also used as the source IP address when the controller performs web authentication.

Guest VLAN Interface Configuration

The interfaces previously described are for operations and administrative functions associated with the controller. To implement a guest access service, another interface must be defined. This is the interface through which guest traffic is forwarded for routing to the Internet. As previously described in Anchor Controller Positioning, the guest interface will likely connect to a port on a firewall or be switched to an interface on an Internet border router.

Defining a New Interface

Perform the following to define and configure an interface to support guest traffic:


Step 1 Click the Controller tab.

Step 2 In the left pane, click Interfaces. (See Figure 12-11.)

Figure 12-11 Interfaces

Defining an Interface Name and VLAN ID

Step 3 Enter an interface name and VLAN ID. (See Figure 12-12.)

Figure 12-12 Interface Name and VLAN ID

Defining Interface Properties

Step 4 Define the following properties:

Interface IP

Mask

Gateway (for the firewall or next hop router connected to the anchor controller)

DHCP Server IP (If using an external DHCP server, use the IP address of that server in the Primary DHCP Server field.)

See Figure 12-13.

Figure 12-13 Defining Properties



Note If DHCP services are to be managed locally on the anchor controller, populate the primary DHCP server field with the controller management IP address. See Anchor Controller Interface Configuration.


Anchor Controller DHCP Configuration (Optional)

If the anchor controller is going to manage DHCP services for the guest access WLAN, proceed with the following steps.

Adding a New DHCP Scope to the Anchor Controller


Step 1 Click the Controller tab.

Step 2 In the left pane, click Internal DHCP Server.

Step 3 Click New. (See Figure 12-14.)

Figure 12-14 Adding a New DHCP Scope

Defining a Scope Name

Step 4 Define a name for the scope and click Apply. (See Figure 12-15.)

Figure 12-15 Defining a Scope Name

Step 5 Click Edit. (See Figure 12-16.)

Figure 12-16 Editing Scope Name

Defining Scope Properties

Step 6 Define the following minimum information:

Pool start and stop

Network

Mask

Default routers

DNS servers

Step 7 For Status, choose Enabled and click Apply. (See Figure 12-17.)

Figure 12-17 Enabling Scope Properties


Mobility Group Configuration

The following mobility group parameters should already be defined on the remote controllers as part of a standard centralized WLAN deployment. The anchor controller can also be configured with a mobility domain name, but it is not required to support termination of guest WLAN EoIP tunnels.

Defining a Default Mobility Domain Name for the Anchor Controller (Optional)

Assign a default mobility domain name for the anchor controller.


Step 1 Click the Controller tab.

Step 2 Enter a name in the Default Mobility Domain Name field.

Step 3 Click Apply. (See Figure 12-18.)

Figure 12-18 Defining a Default Mobility Domain Name


Defining Mobility Group Members for the Anchor Controller

Each campus (foreign) controller in the enterprise that will support the guest WLAN must be defined as a mobility group member in the anchor controller.


Step 1 Click the Controller tab.

Step 2 In the left pane, click Mobility Groups. (See Figure 12-19.)

Figure 12-19 Defining Mobility Group Members

Adding Remote Controllers as Mobility Group Members

Step 3 Click New to define a MAC and IP address for each remote controller that will support a guest access WLAN. (See Figure 12-20.)

Figure 12-20 Adding Remote Controllers


Adding an Anchor Controller as a Mobility Group Member in the Remote Controller

As described in WLAN Anchors and Ethernet in IP to Support Guest Access, each remote controller maps the guest WLAN into an EoIP tunnel that terminates on the anchor controller. Therefore, the anchor controller must be added as a member of the mobility group in each remote controller.


Step 1 Click New to add the anchor controller IP and MAC address to the mobility members table.

Step 2 Repeat these steps for each remote controller. (See Figure 12-21.)

Figure 12-21 Adding an Anchor Controller


Guest WLAN Configuration

The following section describes how to configure a single guest WLAN. The guest WLAN is configured on each remote controller that manages APs where guest access is required.

Even though the anchor controller is not specifically used to manage lightweight APs, it must also be configured with the guest WLAN because the anchor controller represents an extension of the guest WLAN where user traffic is bridged (using LWAPP between the AP and the remote controller and EoIP between the remote controller and the anchor controller) to a physical interface and VLAN.


Note The parameters defined in the WLAN policies page must be configured identically between the anchor and any given remote controller.


Guest WLAN Configuration for the Remote Controller


Step 1 Click the WLANs tab and then click New. (See Figure 12-22.)

Figure 12-22 Guest WLAN Configuration

Defining a Guest WLAN SSID

Step 2 Define an SSID that is intuitive or easily recognized by potential guest users.

The controller automatically assigns a VLAN ID. Administrators have the option selecting 1 - 16, as long as the ID is not already in use by another SSID/ WLAN.

Step 3 Click Apply. (See Figure 12-23.)

Figure 12-23 Defining a Guest WLAN SSID


Defining Guest WLAN Policies

The following list represents typical parameter settings used for a guest WLAN:


Step 1 Set the Layer 2 security policy to None (802.1x is default).

Step 2 Place a check mark in the Web Policy check box and in either the Authentication check box or Pass-through check box. See Guest User Authentication.

Broadcast SSID is enabled by default.

Session time-out default = 0. (no time out).

Anything greater than 0 forces de-authentication after expiration and requires the user to re-authenticate through web portal.

No specific RADIUS servers defined. Authentication is handled by the anchor controller.

QOS: Best Effort.

This value can be changed.

DHCP Addr Assignment: Required.

This forces client to use DHCP. Statically configured clients are not accepted.

Interface name: Management.


Note The interface name must be set to the management interface. This causes the remote controller to initiate an EoIP tunnel via its management IP.


Step 3 Click Apply. (See Figure 12-24.)

Figure 12-24 Defining Guest WLAN Policies


Defining the Guest WLAN Anchor


Step 1 From the WLAN menu, find the newly created guest WLAN.

Step 2 Click Mobility Anchors. (See Figure 12-25.)

Figure 12-25 Defining Guest WLAN Anchors

A drop-down list of eligible controller IP addresses is displayed.

Selecting and Creating an Anchor

Step 3 Select the IP address representing the guest access anchor controller deployed in the network DMZ. This is the IP address configured in Adding an Anchor Controller as a Mobility Group Member in the Remote Controller.

Step 4 Click Mobility Anchor Create. (See Figure 12-26.)

Figure 12-26 Selecting and Creating an Anchor

Verifying the Guest WLAN Mobility Anchor

The following screenshot shows a mobility anchor assigned to the guest WLAN. You can verify that it can be reached by clicking the Ping link as shown above.

Step 5 When finished, click Back. (See Figure 12-27.)

Figure 12-27 Verifying the Guest WLAN Mobility Anchor

Step 6 After defining the mobility anchor, remember to go back and enable the WLAN.


Enabling the Guest WLAN

Perform the following steps to enable the WLAN.


Step 1 Go back to the WLAN configuration page, find the guest WLAN created in Guest WLAN Configuration for the Remote Controller.

Step 2 Click Edit.

Step 3 Click the Admin Status - Enabled check box.

Step 4 Click Apply. (See Figure 12-28.)

Figure 12-28 Enabling the Guest WLAN


This completes the guest WLAN configuration. Repeat all steps from Guest WLAN Configuration for the Remote Controller through Enabling the Guest WLAN for any additional remote controllers.

Guest WLAN Configuration on the Anchor Controller

Guest WLAN configuration on the anchor controller is identical to that performed on the remote controller except for minor differences in the WLAN policies configuration and mobility anchor definition. Repeat all steps from Guest WLAN Configuration for the Remote Controller through Enabling the Guest WLAN on the anchor controller.


Note The SSID used for the guest WLAN must be exactly the same as what was configured on the remote controllers.


Guest WLAN Policies for the Anchor Controller

The policies defined for the guest WLAN on the anchor controller are the same except for the interface to which the WLAN is mapped. In this case, the guest WLAN is going to use the interface created in Guest VLAN Interface Configuration.


Step 1 Click the WLANs tab.

Step 2 Find the guest WLAN and click Edit.

Step 3 Configure the same settings used in Defining a Guest WLAN SSID except under Interface Name choose the interface name created in Guest VLAN Interface Configuration.


Note No RADIUS servers are selected for this WLAN. User authentication of user credentials is handled locally on the controller. See Guest User Authentication.


Step 4 Click Apply. ( See Figure 12-29.)

Figure 12-29 Configuring Guest WLAN Policies


Defining the Guest WLAN Mobility Anchor

The mobility anchor that is used for the guest WLAN is the anchor controller itself.


Step 1 Click the WLANs tab.

Step 2 Find the Guest WLAN and click Mobility Anchors.

Step 3 From the drop-down list, choose the IP address representing the anchor controller. The IP address has (Local) next to it.

Step 4 Click Mobility Anchor Create. (See Figure 12-30.)

Figure 12-30 Defining the Guest WLAN Mobility Anchor

Note that the guest WLAN mobility anchor is local. (See Figure 12-31.)

Figure 12-31 Verifying Guest Mobility Anchor is local

Step 5 Enable the WLAN. Follow the instructions given in Enabling the Guest WLAN.


Web Portal Page Configuration and Management

The internal web server and associated functionality is hosted locally on the anchor controller. When a WLAN is configured to use a web policy, either for authentication or pass-through, the internal web server is invoked by default. No further configuration is required. The internal portal includes a few optional configuration parameters.

Internal Web Page Management


Step 1 Click the Security tab.

Step 2 In the left pane, click Web Login Page.

The configuration screen shown in Figure 12-32 is displayed. You can change the heading and message information that will appear on the portal page. You can also choose a post authentication redirect URL.

Figure 12-32 Configuration Screen

Step 3 Click Apply.

Step 4 Optionally, click Preview to view what the user will see when redirected.


Importing A Web Page

If you want a customized web page, one can be downloaded and stored locally on the anchor controller. To import a customized web page, perform the following steps:


Step 1 Click the Commands tab. (See Figure 12-33.)

Figure 12-33 Importing a Web Page

Step 2 Under File Type choose Web Auth Bundle.

Step 3 Define IP address and file path on TFTP server where the files reside.

Step 4 Click Download to begin.


There are some caveats to be aware of with regard to downloading a web auth bundle:

Choose Web Auth Bundle from the drop-down list to ensure that the files are stored in the correct directory on the controller.

The Web Auth Bundle, must be a .tar file of the html and image files being used to create the web login page. When downloaded, the controller will untar the files and place them in the appropriate directory.

The Web Auth Bundle (tar file) cannot be larger than 1 MB.

The file name for the html logon page must be login.html.

Selecting an Imported Web Auth Page

To use a customized web auth page that has been downloaded to the controller, perform the following:


Step 1 Click the Security tab.

Step 2 In the left pane, click Web Login Page.

Step 3 From the Web Authentication Type drop-down list choose Customized (Downloaded)

Step 4 Click Preview to view the downloaded page.

Step 5 Click Apply when finished. (See Figure 12-34.)

Figure 12-34 Selecting an Imported Web Auth Page


Internal Web Certificate Management

The web auth login page uses SSL for safeguarding user credentials. For simplicity, the controller uses a self-signed certificate. Because the certificate is self-signed, guest users can expect to see a pop-up alert similar to the following when they are redirected to the authentication page shown in Figure 12-35.

Figure 12-35 Authentication Page

At this point, the user can proceed by either clicking Yes or they can choose View Certificate and manually install it as a trusted site.

The web server uses the virtual interface IP address configured inAnchor Controller Interface Configuration as its source address. If a host name is defined along with the IP address, that host name must be resolvable by DNS so that:

The client is redirected to the web auth page.

The user does not encounter a web certificate error because of conflicts between hostname and host IP address.

Importing an External Web Certificate

In those cases where a legitimate web certificate issued by a trusted root CA is required, one can be downloaded to the controller by performing the following:


Step 1 Click the Security tab.

Step 2 In the left pane, click Web Auth Certificate. (See Figure 12-36.)

Figure 12-36 Importing an External Web Certificate

Step 3 Place a check mark in the Download SSL Certificate check box

Step 4 Complete the required fields for downloading the certificate.

Step 5 Click Apply.

Step 6 After the certificate has been downloaded, reboot the server.


Support for External Web Redirection

In some cases, an enterprise might already have deployed a web portal system to support wired guest access or NAC functionality. If this is the case, the anchor controller can be configured to redirect wireless guest users to an external web portal:


Step 1 Click the Security tab.

Step 2 In the left pane, click Web Login Page. (See Figure 12-37.)

Figure 12-37 Supporting External Web Redirection

Step 3 Fill in the Web Server IP and URL fields.

Step 4 Click Apply.


Guest Management

If guest credentials are going to be stored locally on the anchor controller, there are two methods by which they can be created and posted to the controller:

Through the WCS lobby administration interface

Directly on the controller through a local lobby admin account

Guest Management Using WCS

The following configuration examples assume WCS version 4.0 has been installed, configured, and a lobby ambassador account has been established. See Chapter 8, "Cisco Unified Wireless Control System," for more information on installing and configuring WCS.


Step 1 Log in to WCS using the Lobby Ambassador credentials assigned by the system administrator. (See Figure 12-38.)

Figure 12-38 Using WCS

After logging in, the screen shown in Figure 12-39 is displayed.

Figure 12-39 Adding a Template

Step 2 To add a user template, from the drop-down list, choose Add Template and click Go.

The screen shown in Figure 12-40 appears.

Figure 12-40 Guest User Template

Step 3 To creating user credentials, enter a username and password (auto or manual).

Step 4 Select the WLAN / SSID the guest account applies to. (only WLANs configured to use a web policy are displayed).

Step 5 Enter the lifetime for credentials.

Step 6 Enter a description for the user.

Step 7 Click Save.


Applying Credentials

After the credentials have been created, the screen shown in Figure 12-41 offers the option to apply them to one or more controllers.

Figure 12-41 Applying Credentials


Step 1 Click Apply to Controllers.

As shown in Figure 12-42, a list of eligible controllers is displayed (only those controllers that have been configured with the guest WLAN are displayed).

Figure 12-42 Apply to Controllers Screen


Note The guest WLAN will have been configured on the anchor controller and one or more remote controllers. The anchor controller is the only controller where the guest credentials need to be applied.


Step 2 To apply credentials to the anchor controller, from the list of controllers, choose the anchor controller, and click OK.

A confirmation page that verifies that the user credentials were saved to the anchor controller is displayed. (See Figure 12-43.)

Figure 12-43 Confirmation Page

Step 3 In the left pane, click Guest Users to return to the summary page. (See Figure 12-44.)

Figure 12-44 Summary Page

Step 4 To edit guest credentials, from the summary page, click the user name that you want to edit.

The user template is displayed, as shown in Figure 12-45.

Figure 12-45 Editing Guest Credentials

In this page, you can make the following modifications if desired:

Change the WLAN to which the credentials apply.

Change the user description.

Change the Lifetime of the credentials.

Apply the credentials to other controllers.

Delete the user template.


Note If a user template is deleted from WCS while a user is active, they are de-authenticated.


Managing Guest Credentials Directly on the Anchor Controller

The following procedure assumes a network administrator has established a Local Management User account with Lobby Admin privileges on the controller.


Step 1 Log in to the anchor controller using the lobby admin credentials assigned by the system administrator. Remember that conduits might need to be opened through a firewall to permit HTTP/HTTPS for web administration of the controller. See Anchor Controller Positioning.

After login, the screen shown in Figure 12-46is displayed.

Figure 12-46 Anchor Controller Login

Step 2 Click New.

The screen shown in Figure 12-47 appears.

Figure 12-47 Creating User Credentials

Step 3 To create user credentials, perform the following steps:

a. enter a username and password (manual or auto).

b. Select the WLAN/SSID to which the guest account applies (only WLANs configured with web policy will be displayed).

c. Enter a lifetime for the credentials.

d. Enter a description for the user.

Step 4 Click Apply.

The screen shown in Figure 12-48 appears and shows the newly added guest user.

Figure 12-48 Guest Users List

From this screen you have the option to do the following:

Edit the existing user

Delete the existing user

Add a new user

Configuring the Maximum Number of User Accounts

The default number of guest user accounts that can be defined on the controller is 512. This value can be changed by completing the following steps.


Step 1 Click the Security tab. (See Figure 12-49.)

Figure 12-49 Configuring the Maximum Number of User Accounts

Step 2 In the left pane, click General under AAA properties.

Step 3 Configure the maximum number of user database entries (between 512 and 2048).

Step 4 Click Apply.


Guest User Management Caveats

Guest credentials can be added using either method above or both methods together.

When using WCS, the lobby admin does not have visibility of user accounts that might have been created locally on the anchor controller. If a WCS lobby admin attempts to add a user name that is already in use, a pop-up window prompting the admin to choose a different user name is displayed.

When adding user accounts locally on the controller, the admin sees all accounts that have been created, including those that were created via WCS.

If a guest user is currently authenticated to a WLAN and their credentials are deleted from WCS or locally on the controller, the user traffic stops flowing, and the user is de-authenticated.

External Radius Authentication

As described in Guest User Authentication, an external RADIUS server can be used to authenticate guest users in place of creating and storing guest credentials locally on the anchor controller. If this method is used, then the lobby admin features described in Guest Management cannot be used. It is assumed that some other guest management system will be used in conjunction with the external RADIUS server.

To configure a guest WLAN to use an external RADIUS server, perform the following configuration steps on the anchor controller.

Adding a RADIUS Server


Step 1 Click the Security tab.

A summary screen is displayed. (See Figure 12-50.)

Figure 12-50 Summary Screen

Step 2 Click New.

The screen shown in Figure 12-51appears.

Figure 12-51 Defining RADIUS Server Settings

Step 3 To define RADIUS server settings, configure the IP address, Shared Secret, and Authentication Port Number as defined on the RADIUS server.

If the Network User check box is cleared, the RADIUS server is used only for user authentication when it is specifically selected under a given WLANs RADIUS setting. Otherwise, if the check box is checked, the server is used globally for all user authentications based on its server priority.

Step 4 Click Apply.

The summary screen shows the newly added server. (See Figure 12-52.)

Figure 12-52 Summary Screen

Step 5 To select a RADIUS server, click the WLANs tab.

Step 6 The screen shown in Figure 12-53 appears.

Figure 12-53 WLANs Tab

Step 7 Find the guest WLAN and click Edit.

The guest WLAN configuration screen is displayed, as shown in Figure 12-54.

Figure 12-54 Guest WLAN Configuration Screen

Step 8 Select the RADIUS server to be used for web authentication from the drop-down list.


External Access Control

The centralized guest access topology described in this chapter can be integrated with an external access control platform such as BBSM or Clean Access.

In this scenario, an enterprise might have already deployed an access control platform in their Internet DMZ to support wired guest access services (see Figure 12-55).

Figure 12-55 Wireless Guest Access with External Access Control

l

As shown in Figure 12-55, The wireless guest access topology remains the same except the guest VLAN interface on the anchor controller, instead of connecting to a firewall or border router, connects to an inside interface on an access control platform such as BBSM.

In this scenario, the BBSM platform is responsible for redirection, web authentication and subsequent access to the Internet. The campus and anchor controllers are only used to tunnel guest WLAN traffic across the enterprise into the DMZ where BBSM or some other platform is used to manage guest access.

Configuration of the guest WLAN, campus and anchor controllers is the same as described in the previous examples. The only exception is that web policy is disabled under the guest WLANs security policy (see Figure 12-56).

Figure 12-56 Guest WLAN Security Policy

The configuration above establishes a WLAN with no security policies. Guest traffic passes through the anchor controller to the inside or untrusted interface of BBSM or Cisco Clean Access Server, where it is blocked until a user has authenticated.

DHCP can be hosted locally on the controller or externally via BBSM or dedicated server.

Its beyond the scope of this chapter to address BBSM or other external platform specific configuration. See the platform documentation for additional configuration guidelines.

Verifying Guest Access Functionality

The guest access service is working correctly if a user:

Can associate to the guest WLAN

Receives an IP address via DHCP

Opens their browser and is redirected to the web authentication page

Enters their credentials and connects to the Internet (or other upstream services)

Troubleshooting Guest Access

The following verifications and troubleshooting tasks assume:

The solution is using the web authentication functionality resident in the anchor controller

User credentials are created and stored locally on the anchor controller

Before attempting to troubleshoot the various symptoms below, at the very least you should be able to ping from the campus (foreign) controller to the anchor controller. If not, verify routing.

Next, you should be able to perform the following advanced pings. These can only be performed via the serial console interfaces of the controllers:

mping neighbor WLC ip

This pings the neighbor controller through the LWAPP control channel.

eping neighbor WLC ip

This pings the neighbor controller through the LWAPP data channel.

If pings go through, but mpings do not, ensure that each WLCs mobility group name is the same and ensure that each WLCs IP, MAC, and mobility group name is entered in every WLC mobility list.

If pings and mpings are successful, but epings are not, check the network to make sure that IP protocol 97 (Ethernet-over-IP) is not being blocked.

User Cannot Associate to the Guest WLAN

Verify the guest WLAN is enabled on the anchor controller and all remote controllers that support the guest WLAN

Verify the guest WLAN SSID is being broadcast.

Verify client adapter/software configuration

User Does Not Obtain an IP Address via DHCP

Verify WLAN configuration settings are identical on the anchor and remote controllers

Verify the guest WLAN is enabled on the anchor controller and all remote controllers that support the guest WLAN

Check for a proper DHCP server address under the guest VLAN interface settings on the anchor controller

If using an external DHCP server, the IP address should be that of the external server.

Verify reachability to the external DHCP server from the anchor controller

If using the anchor controller for DHCP services, the DHCP server IP address should be the controllers management IP address.

Verify that a DHCP scope has been configured and enabled on the controller

Verify that the DHCP scopes network mask is consistent with the mask on the guest VLAN interface.

Verify the DHCP scope does not overlap with any addresses assigned to network infrastructure

User is Not Redirected to Web Auth Page

The following assumes the user is able to associate to the guest WLAN and obtain an IP address

Verify valid DNS servers are being assigned to the client via DHCP

Ensure the DNS servers are reachable from the anchor controller

Verify the URL being opened in the web browser is resolvable

Verify the URL being opened in the web browser is connecting to http port 80


Note The internal web auth server does not redirect incoming requests on ports other than 80.


User Cannot Authenticate

Verify user credentials are active on the anchor controller.

Guest credentials typically have a lifetime associated with them. If the credentials have expired, they do not appear under the Local Net Users list on the anchor controller. Use WCS to re-apply the user template or re-create user credentials locally on the controller. See Guest Management Using WCS and Guest Credentials Management.

Verify user password

User Cannot Connect to Internet or Upstream Service

Verify routing to and from the anchor controller from the firewall or border router connecting to the controller

Verify NAT configuration on firewall or Internet border router (if applicable)

System Monitoring

Following are some monitoring commands that might be helpful in troubleshooting.

Anchor Controller

From the serial console port:

(Cisco Controller) >show client summary 

Number of Clients................................ 1
MAC Address        AP Name            Status         WLAN  Auth  Protocol  Port
-----------------  -----------------  -------------  ----  ----  --------  ----
00:40:96:a6:d5:3a  10.20.100.254      Associated     6     Yes   Mobile    1


Note that the protocol is Mobile. The Auth field reflects the actual status of the user. If the user has passed web auth, the field displays YES. If not, the field shows NO.

Also notice the AP name. This is the management IP address of the remote controller (originating controller).

From the summary information, use the client MAC to show more detail:

(Cisco Controller) >show client detail 00:40:96:a6:d5:3a 
Client MAC Address............................... 00:40:96:a6:d5:3a
Client Username ................................. guest1
AP MAC Address................................... 00:00:00:00:00:00
Client State..................................... Associated     
Wireless LAN Id.................................. 6  
BSSID............................................ 00:00:00:00:00:05  
Channel.......................................... N/A
IP Address....................................... 10.20.31.101
Association Id................................... 0  
Authentication Algorithm......................... Open System
Reason Code...................................... 0  
Status Code...................................... 0  
Session Timeout.................................. 0  
Client CCX version............................... No CCX support
Re-Authentication Timeout........................ 81586
Remaining Re-Authentication Time................. 79010
Mirroring........................................ Disabled
QoS Level........................................ Silver
Diff Serv Code Point (DSCP)...................... disabled
802.1P Priority Tag.............................. disabled
WMM Support...................................... Disabled
Mobility State................................... Export Anchor
Mobility Foreign IP Address...................... 10.20.100.254  <Remote Controller
Mobility Move Count.............................. 1
Security Policy Completed........................ Yes
Policy Manager State............................. RUN
Policy Manager Rule Created...................... Yes
NPU Fast Fast Notified........................... Yes
Policy Type...................................... N/A
Encryption Cipher................................ None
EAP Type......................................... Unknown
Interface........................................ wlan-int 
VLAN............................................. 31
Client Capabilities:
      CF Pollable................................ Not implemented
      CF Poll Request............................ Not implemented
      Short Preamble............................. Not implemented
      PBCC....................................... Not implemented
      Channel Agility............................ Not implemented
      Listen Interval............................ 0
Client Statistics:
      Number of Bytes Received................... 0
      Number of Bytes Sent....................... 0
      Number of Packets Received................. 0
      Number of Packets Sent..................... 0
      Number of Policy Errors.................... 0
      Radio Signal Strength Indicator............ Unavailable
      Signal to Noise Ratio...................... Unavailable
Nearby AP Statistics:
        TxExcessiveRetries: 0
        TxRetries: 0
        RtsSuccessCnt: 0
        RtsFailCnt: 0
        TxFiltered: 0
        TxRateProfile: [0,0,0,0,0,0,0,0,0,0,0,0]

The same information can be obtained through the web configuration and management interface of the controller under Client Detail. (See Figure 12-57.)

Figure 12-57 Monitor > Client Detail

Campus (Foreign) Controller

From the serial console port:

(Cisco Controller) >show client summary 

Number of Clients................................ 1
MAC Address        AP Name            Status         WLAN  Auth  Protocol  Port
-----------------  -----------------  -------------  ----  ----  --------  ----
00:40:96:a6:d5:3a  Branch:24:a6:50    Associated     2     Yes   802.11g   1

Note that the protocol field is 802.11g, whereas the protocol field on the anchor controller for the same client is mobile. The campus (foreign) controller always shows the user as authenticated and the AP name reflects the actual AP to which the client is associated.

Additional details can be obtained using the following:


Cisco Controller) >show client detail 00:40:96:a6:d5:3a

Client MAC Address............................... 00:40:96:a6:d5:3a
Client Username ................................. N/A
AP MAC Address................................... 00:0b:85:24:a6:50
Client State..................................... Associated     
Wireless LAN Id.................................. 2  
BSSID............................................ 00:0b:85:24:a6:5e  
Channel.......................................... 1  
IP Address....................................... Unknown
Association Id................................... 4  
Authentication Algorithm......................... Open System
Reason Code...................................... 0  
Status Code...................................... 0  
Session Timeout.................................. 0  
Client CCX version............................... No CCX support
Re-Authentication Timeout........................ 0  
Remaining Re-Authentication Time................. Timer is not running
QoS Level........................................ Silver
Diff Serv Code Point (DSCP)...................... disabled
802.1P Priority Tag.............................. disabled
WMM Support...................................... Disabled
Mobility State................................... Export Foreign
Mobility Anchor IP Address....................... 10.20.30.41								<anchor controller>
Mobility Move Count.............................. 0
Security Policy Completed........................ Yes
Policy Manager State............................. RUN
Policy Manager Rule Created...................... Yes
Policy Type...................................... N/A
Encryption Cipher................................ None
EAP Type......................................... Unknown
Interface........................................ management <source of EoIP Tunnel>
VLAN............................................. 0
Client Capabilities:
      CF Pollable................................ Not implemented
      CF Poll Request............................ Not implemented
      Short Preamble............................. Implemented
      PBCC....................................... Not implemented
      Channel Agility............................ Not implemented
      Listen Interval............................ 0
Client Statistics:
      Number of Bytes Received................... 83288
      Number of Bytes Sent....................... 310361
      Number of Packets Received................. 670
      Number of Packets Sent..................... 430
      Number of Policy Errors.................... 0
      Radio Signal Strength Indicator............ -30 dBm
      Signal to Noise Ratio...................... 62 dB
Nearby AP Statistics:
        TxExcessiveRetries: 0
        TxRetries: 0
        RtsSuccessCnt: 0
        RtsFailCnt: 0
        TxFiltered: 0
        TxRateProfile: [0,0,0,0,0,0,0,0,0,0,0,0]
      Branch:24:a6:50(slot 1) ................... 
antenna0: 451 seconds ago -26 dBm................ antenna1: 1522 seconds ago -68 dBm

The same information can be obtained through the controller web configuration and management interface under client detail (see Figure 12-57).

Debug Commands

Additional debug commands that might be used from the serial console include the following:

debug mac addr <client mac address>
debug mobility handoff enable
debug mobility directory enable
debug dhcp packet enable
debug pem state enable
debug pem events enable
debug dot11 mobile enable
debug dot11 state enable