- Auto Anchor SSID between Wireless LAN Controllers acting as MC
- Enabling Central Web Authentication on ISE
- Configuring Auto Anchor and Mobility Groups on Wireless Services
- Configuring Wireless Multicast on Wireless LAN Controllers
- Converged Access Consolidated Quick Reference Templates for Wireless LAN
- Converged Access Controller AP Join Issue Troubleshoot with Traces
- Converged Access Controllers MAC Address Entry for Network Mobility Service Protocol
- Configuration Example: Converged Access Management through Prime Infrastructure with SNMP v2 and v3
- Converged Access Path Maximum Transmission Unit Discovery
- Third-Party Certificate Installation on Converged Access Wireless LAN Controllers
- Configuration Example: Converged Access for WLC EAP-FAST with Internal RADIUS Server
- Converged Access and WLC Local EAP Authentication Configuration Example
- Configuration Example: Custom Web Authentication with Local Authentication
- Dynamic VLAN Assignment with Converged Access and ACS 5.2 Configuration Example
- Configuration Example: External RADIUS Server EAP Authentication
- External Web Authentication on Converged Access
- Installing Wireless Services
- Local Web Authentication with External RADIUS Authentication
- Local Web Authentication on Converged Access
- PEAP Authentication with Microsoft NPS Configuration
- QoS on Converged Access Controllers and Lightweight Access Points
- Configuration Example: TACACS Administrator Access to Converged Access Wireless LAN Controllers
- Configuration Example: Unified Access WLC Guest Anchor with Converged Access
- VideoStream Troubleshooting
- Custom Web Authentication Locally Hosted on WLC or an External Server
- Wireless Converged Access Chromecast Configuration Example
- Web Passthrough Configuration Example
- Configuration Examples: WPA2-PSK and Open Authentication
Wireless Converged Access Chromecast Configuration Example
![]() Note | This document is an expansion of the Chromecast Deployment Guide. Refer to the Chromecast Deployment Guide for more details on Converged Access configuration on AireOS WLCs. |
Prerequisites
-
We recommend that you have basic knowledge on Cisco Catalyst 3850 Series, Cisco Catalyst 3650 Series, Cisco Catalyst 3560-CX Series, and Cisco 2960-CX Series Switches for Converged Access in Cisco IOS Release 3.6.x or later. 
Tip
Refer to Converged Access Consolidated Quick Reference Templates for information about the latest available Release Notes for Converged Access Release 3.6.x or later
-
Ensure that Switch Virtual Interfaces (SVIs) and DHCP pools or snooping are pre-configured.
Supported Platforms and Releases
The information in this document is based on the following:
-
Cisco Catalyst 3650 Series Switches
-
Cisco Catalyst 3850 Series Switches
-
Cisco Catalyst 4500Sup8E Series Switches
![]() Note | The information in this document refers to devices in a specific lab environment. Descriptions of the devices are provided with default configuration values. If you are on a live network, you must understand the potential impact of all the commands. |
Configuring Chromecast Support
Perform the following Global and WLAN configurations to launch Chromecast support on Cisco Catalyst 3850 Series, Cisco Catalyst 3650 Series, Cisco Catalyst 3560-CX Series, and Cisco 2960-CX Series Switches for Converged Access:
Configuring Wireless Mutlicast Globally
Perform the following tasks to configure wireless multicast globally:
Configuring WLAN
To configure the WLAN for Chromecast, perform the following steps:
| Step 1 |
Enable the peer-to-peer blocking mode. | ||
| Step 2 | Enable the support on multicast VLAN. The following sample is an example for configuring WLAN using external RADIUS authentication, MAC-filter, and AAA-override: aaa new-model
!
!
aaa group server radius ISE
server name ISE
!
aaa authentication dot1x ISE group ISE
radius server ISE
address ipv4 x.x.x.x auth-port 1645 acct-port 1646
key XXXXX
dot1x system-auth-control
wlan Chromecast <WLAN ID> Chromecast
aaa-override
mac-filtering ISE¬
client vlan <VLAN ID>
no peer-blocking
ip multicast vlan <vlanid> // If using vlan select feature//
no security wpa
no security wpa akm dot1x
no security wpa wpa2
no security wpa wpa2 ciphers aes
security dot1x authentication-list ISE
session-timeout 1800
no shutdown
|

Feedback