Appendix - Supporting Topics

This appendix contains the following sections:

LAN port functionality for different models

Cisco Business AP Model Type Wired Ethernet Ports AP Mode Mesh Mode

CBW140AC

Primary AP Capable

1 (Uplink POE-PD)

NA

NA

CBW145AC

Primary AP Capable

2 ports on the back of the device (1 Uplink POE-PD, 1 passthrough)

4 ports on the bottom of the device (1 POE-PSE LAN, 2 LAN, and 1 passthrough)

RLAN

Ethernet Bridging

CBW240AC

Primary AP Capable

2 (1 Uplink POE-PD, 1 LAN)

RLAN

Ethernet Bridging

CBW141AC

Mesh Extender

4 ( 1 POE-PSE LAN, 3 LAN)

NA

Ethernet Bridging

CBW142AC

Mesh Extender

NONE

NA

NA

CBW143AC

Mesh Extender

1 (1 POE-PD LAN)

NA

Ethernet Bridging

LED Color Indicators for Cisco Business Wireless APs

This chapter provides information on the LED behavior for Primary APs and Mesh Extenders. It also details the LED states during TFTP and HTTP upgrades.

LED behavior for Primary Capable Access Points

The Cisco access point has an LED indicator on the face of the unit for CBW140AC, CBW240AC, CBW141AC, CBW142AC and CBW143AC AP models. For the CBW145AC model, the LED is located on its lateral side. You can check the device activity based on the LED pattern.

After you have mounted the access point, connect and power up the access point. Observe the LED state to determine the device operation. The following table provides description for different states of the LED and their patterns on the AP device.

For normal Reload of Primary Capable APs, the LED states are as follows:

Table 1. LED behavior for Primary Capable Access Points
Stages of LED States CBW240AC CBW140AC CBW145AC

Stage — 1

POE cable plug in

Red LED (1sec)

Blinking Green (3-4 secs)

Blinking Green (3-4 secs)

Stage — 2

Mode button pressed

Blinking Green and Amber (below 20 secs)

Blinking Green (after 20 secs when keep it pressed)

Blinking Green and Amber (below 20 secs)

Blinking Green (after 20 secs when keep it pressed)

Blinking Red and Amber (below 20 secs)

Blinking Green (after 20 secs when keep it pressed)

Stage — 3

Mode button released / Pressed for more than 60 seconds (Logs: Starting Image…)

Blinking Green

Blinking Green

Blinking Green

Note

 

The Mode Button functionality described in Stage 1, 2 and 3 above are applicable for both Mesh Extenders and Primary Capable Access Points.

Stage — 4

Sequence of Boot up (Logs: Linux Version….)

Solid Green

Solid Green

Solid Green

Stage — 5

Sequence of Boot up (Logs: 5g radio Domain...)

Blinking Green

Blinking Green

Blinking Green

Stage — 6

Radio Init Stage and waiting for Uplink IP config

Blinking Red

Blinking Red

Blinking Red

Stage — 7

IP assigned and Capwap Init (If a Primary AP exists in network moves to stage 8 else switchdriver process starts)

Cyclic change of Red , Amber , Green

Cyclic change of Red , Amber , Green

Cyclic change of Red , Amber , Green

Stage — 8

Capwap discovery to join state and image data response followed by image upgrade if version mismatch and reload (LED stages1-7)

Blinking Amber

Blinking Amber

Blinking Amber

Stage — 9

Capwap setup, configure and run without clients connected (skip stage-8 if the image version is same)

Blinking Green

Blinking Green

Blinking Green

Stage — 10

At least one client connected

Solid Green

Solid Green

Solid Green

LED behavior for Mesh Extenders

The Stage 1-6 in the following table is similar for both the Primary capable APs and Mesh extenders. The different stages for mesh joining process is as follows:

Table 2. LED behavior for Mesh Extenders
Process Mesh Extenders— CBW 141AC / CBW142AC / CBW143AC

Mesh Stage —1

Starting mesh through searching for parent

Blinking Red

Mesh Stage — 2

Mesh AP image data

Note

 

If Mesh AP image version doesn’t match the Primary AP version, the Mesh AP will begin upgrade, then reload. Reload will cycle through Primary Capable Stages 1-6, then Mesh stages 1 & 2.

Cyclic change of Red, Amber, Green

Mesh Stage — 3

Mesh AP image data

Note

 

If the mesh image version doesn't match the primary AP version, and the mesh AP has started to upgrade the image version, then the LED will repeat stages 1-6 and mesh stages 1 & 2.

Blinking Amber

Mesh Stage — 4

Mesh AP joined Primary AP

Blinking Green

Stage — 5

At least one client connected

Solid Green

LED behavior during TFTP / HTTP Upgrade

When the AP or Mesh Extender starts to pre-download (TFTP or HTTP) the LED will begin Blinking Amber.

LED Display Settings

To enable, disable or set the LED display to blink an access point, do the following using the web UI:

Procedure


Step 1

Navigate to Monitoring>Network Summary>Access Points.

Step 2

Click on any one of the access point available from the list for which you want to enable/disable the LED.

Step 3

Click Tools from the list of menu available.

Step 4

Click AP LED disable to turn off the LED display. By default the LED is in the ON state.

Step 5

To identify a particular access point from a group of access points placed together, click Blink AP LED.


Primary AP Failover and Election Process

Primary AP Redundancy for Failover

In a Cisco Business Wireless network, not all APs have the capability to work as a Primary AP. See Supported Cisco Access Points to know which AP models are capable of working as a Primary AP.

In order to enable a failover, your network must have two or more active APs with Primary AP capability. In the event of a failover, one of these other APs will automatically be elected as a Primary. The newly elected Primary will have the same IP and configuration as the original Primary. From an administrator perspective, there will be no difference between the original Primary and the newly elected Primary in case of a failover.


Note


Clients that connect to the Primary AP will lose connectivity during a failover.


Primary AP Forced Failover

You can manually force any AP, that has the capability to work as a Primary AP, to become the Primary AP. This forced failover of the Primary AP to another Primary-capable AP of your choice can be performed using the Primary AP UI.

To perform a forced failover using the Primary AP UI:

  1. Choose Wireless Settings > Access Points.

  2. In the Access Points window, click the Edit icon adjacent to the AP you want to set as Primary.

    The Edit window with the General tab is displayed.

  3. Under the General tab, next to the Operating Mode field, click Make Me Primary AP.


Note


The Make Me Primary button is available only for the subordinate APs that are capable of participating in the Primary election process.


When you force the failover of the Primary to an AP of your choice, using the UI, the current Primary AP reboots while the new AP takes over as the Primary AP, with the IP address and configuration as the previous Primary. The previous Primary, after rebooting, comes back online and joins the new Primary AP as a subordinate AP.


Note


Like any failover, the forced failover causes downtime in the Cisco Business Wireless network. During this downtime, clients associated to wired uplink APs will not face any disruption in service and no new clients can be connected.


Primary AP Election Process

In a Cisco Business Wireless network, when the Primary AP shuts down, one of the other Primary-capable APs in this deployment is automatically designated as the Primary AP. The automatic selection of the Primary AP among the Primary-capable APs is as per an internal automatic Primary election process. This process is used to both detect the failure of the Primary AP and to designate the new Primary AP among the eligible APs. This process is based on Virtual Router Redundancy Protocol (VRRP) that algorithmically determines the next Primary AP, based on the following parameters listed in the order of descending precedence:

  • The AP configured as next-preferred Primary.

  • The AP with the least load in terms of the number of associated clients.

  • Among APs with a similar client load, the AP with the lowest MAC address.

Pre-downloading an Image to an Access Point

To minimize network outages, an upgrade software image is downloaded to the access point from the Primary AP without resetting the access point or losing network connectivity. This means that, first the upgrade image to the Primary AP is downloaded and then the image is downloaded to all the Primary capable APs and Mesh Extenders while the network is still up. When the Primary AP reboots, the access points are disassociated and reboot. The Primary AP comes up first, followed by the access points, all with their upgraded images. Once the Primary AP responds to the discovery request sent by an access point with its discovery response packet, the access point sends a join request.

Creating a Guest Network

Login to the Primary AP Web UI, and navigate to Wireless Settings > WLANs.

Procedure


Step 1

Click Add new WLAN/RLAN.

Step 2

Set Profile name and SSID under the General tab.

Step 3

Under WLAN Security tab, enable Guest Network using the slider toggle button.

Step 4

Choose the type of web portal in the Captive Portal option. It can be either Internal Splash Page or External Splash Page.

Step 5

Choose one of the Access Type for Authentication.

For example, if you want your guests to use their Google/Facebook accounts for authenticating, then use Social Login as the Access Type for your Guest WLAN.

Step 6

Choose the ACL Name if you want the guest to access or block few sites / IP.

Step 7

Click Apply to create the Guest WLAN.

Once the Guest connects to your Guest WLAN, it pop ups an Authentication page, and the network access is provided if successfully authenticated.

Note

 
  • You can also export Guest information by navigating to Monitoring > Network Summary > Guests option.

  • The login page of the Guest WLAN can be configured in Web UI under Wireless Settings > Guest WLAN page. Refer to the section Setting a Login Page for WLAN Guest Users.


Resetting a Device to Factory Default


Note



To reset the AP or Mesh extender to factory default using the Mode button, do the following:

  1. Remove or unplug the Power to device.

  2. Press and hold the Mode button while re-applying power to the device.

  3. Once the LED pattern changes to Green/off, release the Mode button and allow the device to continue booting up.

The location of the Mode button on various CBW models is described in the following table:

Table 3. Mode button Location on the CBW Models
Device Model Mode Button Location

CBW140AC & CBW141ACM

Located near the Ethernet ports and labeled Mode.

CBW142ACM & CBW143ACM

Located near to the Kensington lock as displayed in the following Mode Button and Kensington Lock figure.

CBW145AC

Located on the rear of the device and labeled Mode.

CBW240AC

A small hole located next to the USB port.

The following figure displays the location of the mode button on the CBW142ACM and CBW143ACM devices:

Figure 1. Mode Button and Kensington Lock
Image Number Description

1

Mode button, on the right side of the AP

2

Kensington security lock slot


Note


If the Mode button is pressed for over 60 seconds, factory defaults reset will be ignored or if it is pressed after the device boots up, it is ignored.

After a few seconds, the device LED will begin blinking alternating Green/Amber for 20 seconds, then switch to Green/off.



Note


In the CBW145, the LED blinks Red/Amber during the 20 second countdown while the Mode button is pressed.


SNMP Traps in CBW AP

You can configure the SNMP trap receiver in CBW UI and receive the SNMP traps. The SNMP Trap receiver can be configured using the Web UI by navigating to Advanced > SNMP. The following table lists the set of SNMP traps available in CBW AP and the instance at which these traps are triggered:

Table 4. SNMP Traps in CBW AP
Category Trap Name Purpose

System/Primary AP

Authentication Flag

Sending traps with invalid SNMP access

Multiple Users Flag

Sending of traps when multiple logins of Primary AP are active

configsave

Sending of traps when Primary AP save config called by UI/CLI

strong-pwd check

Sending of traps when Primary AP user credential’s password policy is changed

802.11 client

Excluded

Wireless client exclusion trap; If any client excluded by Primary AP, triggers this trap

Max Client Wrning Threshold

Triggers the trap when the system reaches 90% of max client associated with this Primary AP

Nac-Alert Traps

Sending of traps when the client joined on NAC enabled WLAN

WebAuthUserLogin

Guest user login on Guest WLAN

WebAuthUserLogout

Guest user logged out/client delete from Primary AP

Cisco AP

AuthFailure

Access point authentication failure trap while Access point joining to the Primary AP it checks the mac filter. It is applicable in Mesh mode.

Register

Access point join/disjoin from the Primary AP

InterfaceUp

Access point radio interface up/down trap

modeChange

Any operational mode change

802.11 Security

WEP/WPA Decrypt Error

Sending traps if any wep/wpa decrypt error detected on any of the APs

IDS Signature attack detected

Sending traps if any IDS signature attack (Assoc, deauth flood) is detected by the Access point

AAA

auth

Sending when an AAA authentication failure occurs for management user, net user, or MAC filter.

servers

sending when no RADIUS servers are responding

Rogue

Rogueap

Sending trap when detects the Rogue AP

Auto-RF Profiles(RRM)

Client/Channels Load,Noise, interference, coverage hole

Sending trap when failure or max threshold reached for the RRM measurements

Txpower

Send trap when Access points radio’s tx power level changed

Channel

Send trap when Access points radio’s channel changed

Mesh

auth failure

Send trap when Mesh Extender’s authentication is failed

child excluded parent

Sending trap if Mesh Extender excludes the parent node

parent change

Send trap if mesh extender changes the parent

child moved

Send trap if mesh extender moved from this parent

excessive parent change

Send trap if mesh extender change parent rapidly

onsetSnr

Send trap if parent SNR is poor (less than 12)

abate SNR

Send trap if parent SNR is high ( more than 60)

excessive association

Send trap if mesh extender attempted too many association (10 count without success)

excessive children

Send trap if any node has more than 20 mesh extenders (this will not hit for SMB customers)

Deployment and Troubleshooting Guidelines

This section provides details on deployment and troubleshooting issues.

Placing an AP/ Mesh Extender

  • Consider to place the Mesh extenders in the line of sight of the Primary/Primary Capable AP or another Mesh Extender. Walls and other objects between the Mesh Extender and the Primary/Primary Capable AP or other Mesh Extender may interfere or reduce connectivity.

  • Check the SSID signal strength of the Primary AP and place the Mesh Extender in a location that has enough signal strength.

  • The following table captures the recommended maximum distance between the CBW APs (considering the cell overlap as well). These values (approx.) are computed in the open space. We recommend the distance range to avoid interference by other APs and Mesh disconnection issues.

    AP Meters Foot

    CBW140AC

    15 to 18

    50 to 60

    CBW145AC

    15 to 18

    50 to 60

    CBW240AC

    18 to 21

    60 to 70

    CBW141ACM

    15 to 18

    50 to 60

    CBW142ACM

    10 to 13

    32 to 42

    CBW143ACM

    10 to 13

    32 to 42

  • Avoid placing the Mesh Extenders very close to each other and other Primary Capable APs.

  • Locate the Mesh Extenders where the Signal to Noise Ratio (SNR) value is good (more than 30). To check the SNR value, navigate to Monitoring > Network Summary > Mesh Extender.

You can also identify the Nearest APs for each Mesh Extender by checking on Nearest APs field under Monitoring > Access Points. Select the Mesh Extender and then refer to the General section in the Access Point View page.

Setting Up Channel of Primary/Primary capable APs

The Radio channel settings for Access Points and Mesh extenders default to Automatic. The channel settings for an Access Point or Mesh Extender can be changed in the Web UI by navigating to Wireless Settings > Access Points, and selecting the Edit AP action from the table. A pop-up window will have a tab for Radio 1 (2.4 GHz) and Radio 2 (5 GHz). For Mesh extenders, the backhaul radio channel is controlled by the Primary AP (by default 5 GHz) and cannot be changed in the Mesh Extender window.

Following are some of the instances in which you would need to change the channel of Primary/Primary capable APs for better performance.

By default, the APs in mesh deployment are configured with the mesh backhaul radio configured for channel number 36 and channel width as 80MHz in 5GHz radio.

  • If additional Primary Capable APs are deployed to primarily provide additional capacity, then they should be deployed on a different channel than its neighboring Primary/ Primary Capable APs to minimize the co-channel interference.

  • If many Rogue APs are present in the AP’s current channel, then change the channel of the Primary capable APs. To view the Rogue APs, navigate to Monitoring > Rogues > Access Points.

  • If Channel Utilization is high (greater than 75) and Interference is high in the serving channel, then change the channel in the AP. You can view the following error logs by navigating to Advanced > Logging > Logs.

    Following is an example of a log displayed in the Logs window:

    
    *RRM-DCLNT-5_0: Dec 25 16:51:34.543: %RRM-3-HIGHCHANNEL_UTIL: rrmLrad.c:7678
     Interference is high on AP: APA453.0E1F.E480 [Level: 85] on Radio: 
    5Ghz(Radio2).Change Channel (Wireless->Access Points->Edit AP->Radio->Channel) to get better/stable performance.
  • Choose non-DFS channels (36-48, 149-165) for maximizing the coverage, as DFS channels (channel 52 - 144) will have low power level. To change the channel for the AP:

  1. Navigate to Wireless Settings > Access Points.

  2. Select the AP to edit the channel.

  3. Change the Channel under Radio 2 in Mesh deployments.

In Non-Mesh deployment:
  1. switch to Expert view

  2. Navigate to Advanced > RF optimization > Select DCA channels > 5Ghz.

  3. Deselect the DFS channel numbers.


Note


Nations apply their own RF emission regulations to the allowable channels, allowed users and maximum power levels within the frequency ranges.


Recommendation on Mesh Hop Count

  • Data Traffic: Maximum of 4 hops

  • Voice Traffic: Maximum of 2 hops

Grouping Mesh Extenders using BGN name

You can also deploy more than one Primary capable AP in your network in the same sector (area), and can logically group the Mesh Extenders by configuring BGN string under Wireless Settings > Access Points > Edit Access point > Mesh tab. By default, the BGN value is set with first 10 characters of the configured SSID during initial setup. If BGN is configured, then Mesh Extenders will select the same BGN configured Parent and if there are no matched BGN configured parent, then it will select any parent in the network and periodically disconnect and check for matched BGN parent.


Note


This option is available in Expert View only.


Best practices for HTTP Image Upgrade

  • Prefer wired client to do the image upgrade or wireless client with good connection score.

  • Place the wireless client near the Primary AP and ensure it is connected to a Primary AP while trying to upgrade image through HTTP image transfer method.

  • Ensure your wireless client has high signal strength (greater than -65 dBm) and a good connection score (higher than 75%) to avoid any image download failures.

  • If the image upgrade constantly fails, then use Cisco.com mode for Image upgrade.

  • When uploading the images using HTTP method, if you see a Transfer fail error on the Chrome browser, then the self-signed certificate of Primary AP should be added in the Trusted Root Authority. Following are the steps to add the certificate:

Adding Self-Signed certificate of Primary AP in Windows:
  1. Navigate to the Primary AP UI using https://ciscobusiness.cisco or https://<managementip>, and click through the usual warnings for untrusted certificates.

  2. In the address bar, right click on the red warning triangle that reads, Not Secure. From the resulting menu, select Certificate to display the certificate.

  3. In the pop-up window, select the Details tab, and click Copy to File at the bottom right of the tab.

  4. This launches the Certificate Export Wizard. Click Next at the bottom.

  5. In the radio-button dialogue, select the format. Leave the default DER encoded binary X.509 (.CER) and click Next.

  6. Use Browse to select a folder path to download the exported cert. Click Next to export the certificate and then click Finish.

  7. You should see another pop-up window confirming the export was successful. Click OK.

  8. In the original Certificate pop-up window, click OK again.

  9. Next, open the Chrome Settings page and click Privacy and security tab on the left navigation pane. Click the more arrow to expand this section. Choose the Manage certificates area.

  10. In the pop-up Certificates window, select the Trusted Root Certification Authorities tab, and click on the Import button; this will launch the Certificate Import Wizard.

  11. Click Next. Select Browse and use the explorer window to locate the certificate you exported in the earlier step.

  12. Click Next and then Finish. In the Security Warning pop-up, click on Yes; you should see yet another pop-up letting you know that the import was successful.

  13. Restart Chrome, and navigate to the Primary AP UI using https://<managementip>. You should see a closed padlock and Secure annotation to the left of the URL.

Adding Self-signed certificate of Primary AP in macOS:

Navigate to the Primary AP UI using https://ciscobusiness.cisco or https://<managementip>. Do the following in Chrome:

  1. Navigate to Developer Tools > Security tab.

  2. Click View Certificate to see the certificate.

  3. Click and drag the image to your desktop.

  4. Open the Keychain Access utility in OS X.

  5. Select the System option on the left.

  6. Click the lock icon on the upper-left to enable changes.

  7. In the lower left, select the Certificates option.

  8. Drag the certificate you copied to the desktop into the list of certificates.

  9. After the certificate is added to the System keychain, double-click to open.

  10. Expand the Trust section. For the first option, pick Always Trust.

  11. Quit Chrome and all other browsers and navigate to the Primary AP UI using https://<managementip>. You should see the closed padlock and Secure annotation to the left of the URL.


Note


Use https://<managementip> to access the Primary AP UI, if the self-signed certificate is added to your machine.


Resolving connection issues between CBW and CBD

  • If the connection is based on a CBD probe, please ensure that the SNMP configuration in CBD and CBW are the same. To configure the SNMP details of the device on CBD, refer to Managing Device Credentials in the Cisco Business Dashboard Administration Guide.

  • If the connection between CBD and CBW is a direct management connection, ensure the following:

    • Verify if the credentials specified in CBD Settings page, is the same as created in CBD.

    • Verify if the correct certificate file is uploaded in CBW (in case CBD uses self-signed certificate).

    • Verify that the name or IP address configured for the Dashboard in CBW is listed in the Subject-Alternative-Name field of the dashboard's certificate

    • Check the system logs in the logging page.