- Preface
- Using the Command-Line Interface
- Using the Web Graphical User Interface
-
- Configuring the Switch for Access Point Discovery
- Configuring Data Encryption
- Configuring Retransmission Interval and Retry Count
- Configuring Adaptive Wireless Intrusion Prevention System
- Configuring Authentication for Access Points
- Converting Autonomous Access Points to Lightweight Mode
- Using Cisco Workgroup Bridges
- Configuring Probe Request Forwarding
- Optimizing RFID Tracking
- Configuring Country Codes
- Configuring Link Latency
- Configuring Power over Ethernet
-
- Preventing Unauthorized Access
- Controlling Switch Access with Passwords and Privilege Levels
- Configuring TACACS+
- Configuring RADIUS
- Configuring Kerberos
- Configuring Local Authentication and Authorization
- Configuring Secure Shell (SSH)
- Configuring Secure Socket Layer HTTP
- Configuring IPv4 ACLs
- Configuring IPv6 ACLs
- Configuring DHCP
- Configuring IP Source Guard
- Configuring Dynamic ARP Inspection
- Configuring IEEE 802.1x Port-Based Authentication
- Configuring Web-Based Authentication
- Configuring Port-Based Traffic Control
- Configuring IPv6 First Hop Security
- Configuring Cisco TrustSec
- Configuring Wireless Guest Access
- Managing Rogue Devices
- Classifying Rogue Access Points
- Configuring wIPS
- Configuring Intrusion Detection System
-
- Administering the System
- Performing Switch Setup Configuration
- Configuring Right-To-Use Licenses
- Configuring Administrator Usernames and Passwords
- Configuring 802.11 parameters and Band Selection
- Configuring Aggressive Load Balancing
- Configuring Client Roaming
- Configuring Application Visibility and Control
- Configuring Voice and Video Parameters
- Configuring RFID Tag Tracking
- Configuring Location Settings
- Monitoring Flow Control
- Configuring SDM Templates
- Configuring System Message Logs
- Configuring Online Diagnostics
- Managing Configuration Files
- Configuration Replace and Configuration Rollback
- Working with the Flash File System
- Working with Cisco IOS XE Software Bundles
- Troubleshooting the Software Configuration
- Index
Configuring VLAN Groups
- Finding Feature Information
- Prerequisites for VLAN Groups
- Restrictions for VLAN Groups
- Information About VLAN Groups
- How to Configure VLAN Groups
- Where to Go Next
- Additional References
- Feature History and Information for VLAN Groups
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for VLAN Groups
A VLAN should be present in the switch to be able to add it to the VLAN group.
Restrictions for VLAN Groups
The number of VLANs mapped to a VLAN group is not limited by Cisco IOS Software Release. But if the number of VLANs in a VLAN group exceed the recommended value of 32, the mobility behavior is unexpected and in the VLAN group, L2 multicast breaks for some VLANs. So it is the responsibility of the administrator to configure feasible number of VLANs in a VLAN group. When a VLAN is added to a VLAN group mapped to a WLAN which already has 32 VLANs, a warning is generated. But when a new VLAN group is mapped to a WLAN with more than 32 VLANs, an error is generated.
For expected behavior of the VLAN group, the VLANs mapped in the group must be present in the switch. The static IP client behavior is not supported.
Information About VLAN Groups
Whenever a wireless client connects to a wireless network (WLAN), the client is placed in a VLAN that is associated with the WLAN. In a large venue such as an auditorium, a stadium, or a conference room where there are numerous wireless clients, having only a single WLAN to accommodate many clients might be a challenge.
The VLAN group feature uses a single WLAN that can support multiple VLANs. The clients can get assigned to one of the configured VLANs. This feature maps a WLAN to a single VLAN or multiple VLANs using the VLAN groups. When a wireless client associates to the WLAN, the VLAN is derived by an algorithm based on the MAC address of the wireless client. A VLAN is assigned to the client and the client gets the IP address from the assigned VLAN. This feature also extends the current AP group architecture and AAA override architecture, where the AP groups and AAA override can override a VLAN or a VLAN group to which the WLAN is mapped.
How to Configure VLAN Groups
Creating VLAN Groups (CLI)
1.
configure terminal
2.
vlan group
WORD
vlan-list
vlan-ID
3.
end
DETAILED STEPS
Removing VLAN Group (CLI)
1.
configure terminal
2.
vlan group
WORD
vlan-list
vlan-ID
3.
no vlan group
WORD
vlan-list
vlan-ID
4.
end
DETAILED STEPS
Creating VLAN Groups (GUI)
To create a VLAN group using the switch web UI, you must:
Adding a VLAN Group to WLAN (CLI)
1.
configure terminal
2.
wlan WORD number
3.
client vlan WORD
4.
end
DETAILED STEPS
Adding a VLAN Group to WLAN (GUI)
To add a VLAN group to WLAN using the switch web UI, you must follow the steps defined in this procedure.
Removing VLAN Groups (GUI)
To remove a VLAN groups using the switch web UI, you must:
Viewing VLANs in VLAN Groups (CLI)
| Commands | Description |
|---|---|
| show vlan group | Displays the list of VLAN groups with its name and the VLANs that are available. |
| show vlan group group-name <group_name> | Displays the specified VLAN group details. |
| show wireless vlan group <group_name> | Displays the specified wireless VLAN group details. |
Viewing VLAN Groups (GUI)
To view a VLAN groups using the switch web UI, you must:
Where to Go Next
After configuring VLAN groups, you can configure the following:
Additional References
Related Documents
| Related Topic | Document Title |
|---|---|
|
For complete syntax and usage information for the commands used in this chapter. |
|
|
VLAN access-maps |
Security Configuration Guide (Catalyst 3650 Switches) Security Command Reference (Catalyst 3650 Switches) |
|
VLAN and Mobility Agents |
Mobility Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) |
|
Cisco Flexible NetFlow |
Cisco Flexible NetFlow Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) Flexible Netflow Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) |
|
IGMP Snooping |
IP Multicast Routing Command Reference (Catalyst 3650 Switches) IP Multicast Routing Configuration Guide (Catalyst 3650 Switches) |
|
IPv6 |
|
|
SPAN |
Network Management Command Reference (Catalyst 3650 Switches) Network Management Configuration Guide (Catalyst 3650 Switches) |
|
Platform-independent configuration information |
Identity Based Networking Services Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches) |
Error Message Decoder
| Description | Link |
|---|---|
|
To help you research and resolve system error messages in this release, use the Error Message Decoder tool. |
https://www.cisco.com/cgi-bin/Support/Errordecoder/index.cgi |
Standards and RFCs
| Standard/RFC | Title |
|---|---|
|
RFC 1573 |
Evolution of the Interfaces Group of MIB-II |
|
RFC 1757 |
Remote Network Monitoring Management |
|
RFC 2021 |
SNMPv2 Management Information Base for the Transmission Control Protocol using SMIv2 |
MIBs
| MIB | MIBs Link |
|---|---|
|
All supported MIBs for this release. |
To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL: |
Technical Assistance
| Description | Link |
|---|---|
|
The Cisco Support website provides extensive online resources, including documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. |
Feature History and Information for VLAN Groups
Release |
Modification |
|---|---|
Cisco IOS XE 3.3SE |
This feature was introduced. |
Cisco IOS XE 3.3SE |
VLAN GUI support. |
Feedback