Advanced

This chapter contains the following sections:

Managing SNMP

Simple Network Management Protocol (SNMP) is a popular network management protocol used for collecting information from all the devices in the network and configuring and managing these devices. You can configure both SNMPv2c and SNMPv3 access modes using the Primary AP web interface.

Configuring SNMP Access

You can configure the following SNMP access modes for the Primary AP:

  • SNMPv2c only

  • SNMPv3 only

  • Both SNMPv2c and SNMPv3

  • Neither SNMPv2c nor SNMPv3

Procedure


Step 1

Navigate to Advanced > SNMP.

Step 2

In the SNMP window, enable SNMP Service option for querying the configuration using MIB browser. By default, the SNMP service is disabled.

Step 3

Select the appropriate check box next to the SNMP Access to enable the desired SNMP mode. The SNMP access mode is disabled by default.

The selected SNMP access mode is enabled.

For information about configuring SNMPv3 users using CBW AP, see topics on SNMPv3 later in this chapter.

Step 4

In the Read-Only Community field, enter the desired community name.

Step 5

In the Read-Write Community field, enter the desired community name.

Note

 

The Read-Only / Read-Write Community field must contain a minimum of 8 characters in a combination of lowercase/uppercase letters, digits, and special characters.

Step 6

Click Apply to save the SNMP access configurations.


SNMP Trap Receivers

A Simple Network Management Protocol (SNMP) Trap receiver captures, displays and logs SNMP Traps. Traps are notices of events that are sent immediately to the SNMP client's trap receiver from the Primary AP instead of waiting for a poll – a request – to the device by the SNMP client.

To add a SNMP Trap Receiver, do the following:

Procedure


Step 1

Navigate to Advanced > SNMP > Add New SNMP Trap Receiver.

Step 2

In the Add SNMP Trap Receiver window, configure the following fields:

  1. Receiver Name—Enter the desired username for the new Trap Receiver.

  2. IP Address—Specify the IP address of the Trap Receiver to which you wish to connect.

  3. Status—Enable/Disable the Trap Receiver. By default, it is enabled.

  4. SNMPv3—If you have configured SNMP v3 access and have SNMPv3 User, then enable this option. By default, it is disabled.

  5. SNMPv3 User—Map the SNMPv3 User details for the Trap receiver entry, if SNMPv3 toggle is enabled.

The SNMP Trap Receiver table shows the list of SNMP Trap Receivers configured in the network.

Step 3

Click Apply.

To Edit/Delete the SNMP Trap Receivers, click the Edit/Delete icon in the row containing the SNMP Trap Receiver whose details you wish to modify or delete.

The SNMP Trap Receivers table is refreshed and the updated entry appears in the table.

Note

 

Few traps are enabled by default. For a complete list of available traps, refer to SNMP Traps in CBW AP.


Add an SNMPv3 User

Procedure


Step 1

Navigate to Advanced > SNMP.

Step 2

Click the Add New SNMP v3 User button under the SNMP v3 Users section.

Step 3

In the Add SNMP v3 User window, enter the following details:

Field Description

User Name

Enter the desired username for the new SNMPv3 user.

Access Mode

From the drop-down list, select one of the desired modes:

  • Read Only

  • Read/Write

The default is Read Only.

Authentication protocol

From the Authentication Protocol drop-down list, select one of the options:

  • HMAC-MD5

  • HMAC-SHA

  • None

The default authentication protocol is HMAC-SHA.

Authentication Password

Enter the desired authentication password. Use a minimum password length of 12 - 31 characters.

Confirm Authentication Password

Confirm the authentication password specified above.

You can select the Show Password checkbox to display the entries in the Authentication Password and the Confirm Authentication Password fields and verify if the characters match.

Privacy Protocol

From the drop-down list, select one of the options:

  • CBC-DES

  • CFB-AES-128

  • None

The default privacy protocol is CFB-AES-128.

Privacy Password

Enter the desired privacy password. Use a minimum password length of 12 - 31 characters.

Confirm Privacy Password

Confirm the privacy password specified above.

Select the Show Password checkbox to display the entries in the Privacy Password and the Confirm Privacy Password fields and verify if the characters match.

Step 4

Click Apply to create a new SNMPv3 user.

The newly added SNMP v3 User appears in the SNMP v3 Users table on the SNMP window. You can add up to a maximum of 7 SNMPv3 users.


Delete SNMPv3 User

Procedure


Step 1

Navigate to Advanced > SNMP.

Step 2

In the SNMP Setup, click the icon in the row containing the SNMPv3 user you wish to delete.

A warning message is displayed to confirm the action.

Step 3

Click Yes in the pop-up window.

The SNMP v3 Users table is refreshed and the deleted entry is removed from the table.


Setting Up System Message Logs

The System Message Log feature logs the system events to a remote server called a Syslog server. Each system event triggers a Syslog message containing the details of that event.

If the System Message Logging feature is enabled, the Primary AP sends a message to the syslog server configured on the Primary AP.

Before you begin

Set up a Syslog server in your network before you start the following procedure.

Procedure


Step 1

Navigate to Advanced >Logging.

The Logging window appears.

Step 2

Click Add Server to add a new Syslog Server.

The System Message Log feature is enabled.

Step 3

In the Syslog Server IP field, enter the IPv4 address of the server to which the syslog messages are sent and click Apply. The table displays the list of Syslog server configured in the network. You can delete the Syslog server if you wish.

Step 4

Set the severity level for filtering the syslog messages that are sent to the syslog server. From the Log Syslog Level drop-down list, you can choose the severity level from one of the following (listed in the order of severity):

  • Emergencies (0) (Highest severity)

  • Alerts (1)

  • Critical (2)

  • Errors (3)

  • Warnings (4)

  • Notifications (5) (Default)

  • Informational (6)

  • Debugging (7) (Lowest severity)

Messages with a severity equal to or less than the set level are sent to the syslog server.

Step 5

Click Apply.


System Logs

This feature is used to analyze the system logs depending upon the log level that the user sets. To view the logs in Primary AP UI, do the following configurations.

Procedure


Step 1

Navigate to Advanced>Logging. The Logging window is displayed.

Step 2

From the Log Buffer level drop-down list, choose the required log level for the system logs to be redirected to the logging buffer.

The System logs will be displayed in the Logs section of the same page.

The wireless client events such as Assoc, Auth, Success, or failure logs will be logged in the Notification level (5).

Step 3

Click Clear to clear the logs displayed in the Primary AP UI.


Optimizing RF Parameters

To maximize your network's Wi-Fi performance, you can optimize the coverage and quality of the radio frequency (RF) signals.

Procedure


Step 1

Navigate to Advanced > RF Optimization.

Step 2

Enable the RF Optimization option to enhance your Wi-Fi performance by adjusting the radio parameters of the AP.

By default, Medium client density based RF settings is applied.

Step 3

Select the Client Density by moving the slider and choose the Traffic Type.

To know the values that are set when low, typical, or high client density type is selected, see RF Parameter Optimization Settings.

Step 4

Click Apply to save the changes.


Advanced RF Parameters

In addition to changing the client density and traffic type, you can also use the advanced parameters to maximize your network's Wi-Fi performance. The following sections provide details for the same.

Optimized Roaming

Optimized roaming resolves the problem of sticky clients that remain associated to access points that are far away and outbound clients that attempt to connect to a Wi-Fi network without having a stable connection. Optimized roaming allows clients to disassociate based on the RSSI of the client data packets and data rate. The client is disassociated if the RSSI alarm condition is met and the current data rate of the client is lower than the optimized roaming data rate threshold.

Optimized roaming also prevents client association when the client's RSSI is low by checking the RSSI of the incoming client against the RSSI threshold. This check prevents the clients from connecting to a Wi-Fi network unless the client has a viable connection. In many scenarios, even though clients can hear beacons and connect to a Wi-Fi network, the signal might not be strong enough to support a stable connection.

You can also configure the client coverage reporting interval for a radio by using optimized roaming.

Optimized Roaming is useful in the following scenarios:

  • To address the sticky client challenge by proactively disconnecting clients.

  • To actively monitor data RSSI packets.

  • To disassociate a client when the RSSI is lower than the set threshold.

Restrictions for Optimized Roaming

When BSS transition is sent to 802.11v capable clients before the disconnect timer expires, the client is disconnected forcefully. BSS transition is enabled by default for 802.11v capable clients.

Configuring Optimized Roaming

Before you begin

Ensure you have switched to Expert View to be able to configure optimized roaming via Primary AP UI.

Procedure


Step 1

Navigate to Advanced > RF Optimization. The RF Optimization page allows you to configure Optimized Roaming parameters, Data Rates, Channels, Global Interferer detection.

Step 2

In the RF Optimization page, enable the 2.4GHz/5GHz Optimized Roaming toggle button to set interval and threshold values.

If 2.4GHz/5GHz Optimized Roaming is enabled, the following parameters are displayed.

  • 2.4GHz/ 5GHz Interval

  • 2.4GHz/ 5GHz Threshold

Step 3

In the 2.4GHz Interval and 5GHz Interval text boxes, specify the values for the interval at which an access point reports the client coverage statistics to the Primary AP.

2.4GHz/5GHz Interval

Configures the client coverage reporting interval for 2.4GHz and 5GHz networks. The interval ranges from 5 seconds to 90 seconds (default). If you configure a low reporting interval, the network can get overloaded with coverage report messages. The client coverage statistics includes data packet RSSIs, Coverage Hole Detection and Mitigation (CHDM) pre-alarm failures, retransmission requests, and current data rates.

  • By default, the AP sends client statistics to the Primary AP every 90 seconds.

  • If the Interval is set to a value other than the 90 second default, the client statistics will be sent only during failure cases.

2.4GHz/5GHz Threshold

Configures the threshold data rates for 2.4GHz and 5GHz. The Threshold values are disabled by default.

  • For 2.4GHz, the threshold values that can be configured are: 1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, 54 Mbps.

    Optimized roaming disassociates clients based on the RSSI of the client data packet and data rate. The client is disassociated if the current data rate of the client is lower than the Optimized Roaming Data Rate Threshold.

  • For 5GHz, the threshold values that can be configured are: 6, 9, 12, 18, 24, 36, 48, 54 Mbps.

Event Driven RRM

This toggle allows an AP in distress to bypass normal RRM intervals and immediately change channels. This is a global setting and can be enabled or disabled.

Interferer detection

This is a global setting which enables the Primary AP to detect the non Wi-Fi sources. By default, it is disabled.

5GHz Channel Width

This drop-down option controls how broad the signal is for transferring data as 20MHz/40MHz/80MHz/Best. By increasing the channel width, we can increase the speed and throughput of a wireless broadcast. This Global setting is set to Best by default.

Step 4

Set the threshold data rates of the client by manipulating the 2.4GHz Data Rates and 5GHz Data Rates sliders.

The following data rates are available:

  • 2.4GHz—1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, 54 Mbps

  • 5GHz—6, 9, 12, 18, 24, 36, 48, 54 Mbps

Step 5

Select DCA Channels—One can select or click individual channels to be included in DCA for 2.4GHz and 5GHz band.

Note

 

A green underline below the channel number indicates that it is selected. Click to unselect the same.


Target Waketime and Broadcast TWT

Target Waketime

Target Wake Time (TWT) is a power-saving mode that allows the client to stay asleep and to wake up only at pre-scheduled (target) times to exchange data with the Access Point.

2.4GHz

This toggle is used to globally enable/disable Target Waketime support for 2.4GHz radio in all Wi-Fi 6 APs/Mesh Extenders in the network. By default, this is Enabled.

5GHz

This toggle is used to globally enable/disable Target Waketime support for 5GHz radio in all Wi-Fi 6 APs/Mesh Extenders in the network. By default, this is Enabled.

Broadcast TWT Support

2.4GHz

This toggle is used to globally enable/disable Broadcast TWT support for 2.4GHz radio in all Wi-Fi 6 APs/Mesh Extenders in the network. By default, this is Enabled.

5GHz

This toggle is used to globally enable/disable Broadcast TWT support for 5GHz radio in all Wi-Fi 6 APs/Mesh Extenders in the network. By default, this is Enabled.

BSS Color

2.4GHz

This toggle is used to globally enable/disable BSS Color support for 2.4GHz radio in all Wi-Fi 6 APs/Mesh Extenders in the network. By default, this is Enabled.

5GHz

This toggle is used to globally enable/disable BSS Color support for 5GHz radio in all Wi-Fi 6 APs/Mesh Extenders in the network. By default, this is Enabled.

BSS Color Auto Assignment

2.4GHz

This drop-down is used to globally enable/disable BSS Color Auto Assignment for 2.4GHz radio in all Wi-Fi 6 APs/Mesh Extenders in the network. By default, this is Enabled.

5GHz

This toggle is used to globally enable/disable BSS Color support for 5GHz radio in all Wi-Fi 6 APs/Mesh Extenders in the network. By default, this is Enabled.

RF Profiles

RF Profiles allows you to tune groups of APs that share a common coverage zone together and selectively change how RRM will operates the APs within that coverage zone. For example, a university might deploy a high density of APs in an area where a high number of users will congregate or meet. This situation requires that you manipulate both data rates and power to address the cell density while managing the co-channel interference. In adjacent areas, normal coverage is provided and such manipulation would result in a loss of coverage.

Using RF profiles and AP groups allows you to optimize the RF settings for AP groups that operate in different environments or coverage zones. RF profiles are created for the 802.11 radios. RF profiles are applied to all APs that belong to a group, where all APs in that group will have the same profile settings.

The RF profile gives you the control over the data rates and power (TPC) values. One can either associate a built in RF Profile with AP Groups, or create a new RF Profile and then associate that with the AP Group.

To configure the RF Profile, do the following:

Procedure


Step 1

Switch to Expert View in the CBW Web-UI by clicking the bi-directional arrows toggle button on the top-right.

Step 2

Navigate to Advanced > RF Profiles.

Step 3

Click Add New RF Profile.

Step 4

Under the General tab, configure the following:

  • RF Profile Name—Provide a RF Profile name.

  • RF Profile description—Provide an one-line reference for it.

  • Band—Select the band 2.4GHz or 5GHz.

  • Maximum Clients per radio—Select the maximum clients per radio. By default, it is 200. The maximum value that is configurable is 200.

  • Rx SOP Threshold—Receiver Start of Packet Detection Threshold (RxSOP) determines the Wi-Fi signal level in dBm at which an access point's radio demodulates and decodes a packet. The default value is Auto.

    As the Wi-Fi level increases, the radio sensitivity decreases and the receiver cell size becomes smaller. Reduction of the cell size affects the distribution of clients in the network. RxSOP is used to address clients with weak RF links, sticky clients, and client load balancing across access points. RxSOP helps to optimize the network performance at high-density deployments (i.e larger number of clients) where access points need to optimize the nearest and strongest clients.

  • Multicast data rate—Use the Data rates option to specify the rate at which the multicast traffic can be transmitted between the access points and the client. The default value is Auto.

Step 5

In the 802.11 tab, set the data rates and MCS for the RF profile.

  • Data Rates—Use the Data rates option to specify the rate at which the data can be transmitted between the access points and the client. The default rate is 11 Mbps.

  • MCS Settings—The MCS settings determine the number of spatial streams, the modulation, the coding rate, and the data rate values that are used. Ensure that all of the 0 to 31 MCS data rate indices are enabled (which is the default setting).

Step 6

In the RRM tab, set the following parameters:

  • Channel Width—By default, 20 MHz and cannot be changed.

  • Select DCA Channels—The DCA dynamically manages channel assignment for an AP group. It also evaluates the assignments on a per AP radio basis. The DCA makes decisions during an RSSI based cost metric function which evaluates performance based on interference for each available channel.

    It dynamically adjusts the channel plan to maintain performance of individual radios.

Step 7

In the Client Distribution tab, set the following parameters:

  • Window—In the Window size text box, enter a value between 0 and 20. The default size is 5. The window size becomes part of the algorithm that determines whether an access point is too heavily loaded to accept more client associations.

    The access point with the lowest number of clients has the lightest load. The window size and the number of clients on the access point with the lightest load forms the threshold. Access points with more client associations than this threshold is considered busy, and clients can associate only to access points with client counts lower than the threshold.

  • Denial—In the Denial Count text box, enter a value between 1 and 10. The denial count sets the maximum number of association denials during load balancing. The default size is 3.

Step 8

Click Apply.


RF Parameter Optimization Settings

Use this feature to select the appropriate RF Parameter Optimization settings for your deployment. The following table shows the default values when low, typical, or high client density type is selected.


Note


If you do not enable RF Parameter Optimization during the initial configuration wizard, then client density is set to Typical (the default value), and RF traffic type is set to Data (the default value).

The TPC (Tx Power Control) algorithm determines whether the power of an AP needs to be adjusted down. Reducing the power of an AP helps mitigate co-channel interference with another AP on same channel in close proximity.


Table 1. RF Optimization Table
Parameter Dependency Typical (Default Profile) High Density (Where throughput is most important) Low Density (For coverage in open spaces)

TX Power

Global per band

Default

Higher

Highest

TPC Threshold, TPC Min, and TPC max (These parameters are equivalent to TX Power)

Specific RF profile per band

TPC Threshold:

  • -70 dBm for 5 GHz

  • -70 dBm for 2.4 GHz

TPC Min: Default at -10dBm

TPC Max: Default at 30 dBm

TPC Threshold:

  • -65 dB for 5GHz

  • -70 dB for 2.4 GHz

TPC Min: +7 dBm for 2.4 GHz and -10 dBm for 5GHz.

TPC Max: Default at 30 dB

TPC Threshold:

  • -60 dBm for 5GHz

  • -65 dBm for 2.4 GHz

TPC Min: -10 dBm

TPC Max: Default at 30 dBm

RX Sensitivity

Global per band (Advanced RX-SOP) RF profiles

Default (Automatic)

Medium (RX-SOP)

Low

CCA Threshold

Global per band 802.11a only (hidden) RF Profiles

Default (0)

Default (0)

Default (0)

Coverage RSSI Threshold

Global per band Data and Voice RSSI RF Profiles

Default (Data: -80dBm, Voice: -80dBm)

Default (Data: -80dBm, Voice: -80dBm)

Default (Data: -90dBm, Voice: -80dBm)

Coverage Client Count

Global per band (Coverage Exception) RF Profiles (Coverage Hole Detection)

Default (3 clients)

Default (3 clients)

Lower (2 clients)

Data Rates

Global per band (network) RF Profiles

12 Mbp mandatory

9Mbp supported

1, 2, 5.5, 6, 11 Mbp disabled

12 Mbp mandatory

9Mbp supported

1, 2, 5.5, 6, 11 Mbp disabled

CCK rates enabled

1, 2, 5.5, 6, 9, 11, 12 Mbp enabled

Troubleshooting in Primary AP

To troubleshoot in the Primary AP, there are features that allow you to check the connectivity, internet access, radio admin state and to analyze the logs depending upon the log level setting. The following sections describe these features.

UI Indicator

Once you login into the Primary AP GUI, navigate to Monitoring > Network Summary. Check the following indicators:

  • LAN Indicator—Shows if the default gateway IP of management interface is reachable.

  • Internet Indicator—Shows if the public DNS (8.8.8.8) is reachable.

  • Wireless Indicator—Checks the wireless connectivity by looping through all the APs present in Primary AP for both the global networks provided both networks (A and B) are enabled. If any of the network is down in any of the APs, the wireless status is considered to be down. Otherwise, the wireless indicator is operational

Using Primary AP Tools


Note


This feature is available only for administrative user accounts with read and write privileges.

You use the Primary AP Tools page to manage the following operations:

Restarting the Primary AP

Follow the steps below to restart the Primary AP.

  1. Navigate to Advanced > Primary AP Tools.

  2. Click Restart Primary AP.

Clearing the Primary AP Configuration and Resetting to Factory Defaults

Procedure


Step 1

Choose Advanced>Primary AP Tools.

Step 2

In the Primary AP Tools page, click Factory Default Primary AP.

This erases the current Primary AP configuration, resets the configuration to the factory-default values, and reboots the Primary AP.

Step 3

After the Primary AP reboots, proceed to Launching the Setup Wizard.


Clearing Configurations for All APs and Resetting to Factory Default

This procedure resets all the CBW APs (including Primary AP) to factory-default configuration.

Procedure

Step 1

Choose Advanced>Primary AP Tools.

Step 2

In the Primary AP Tools page, click Factory Default All APs.

This erases the current configuration in all the APs simultaneously, resets the configuration to the factory-default values, and reboots all the APs.

Note

 

Primary AP will be rebooted at last.

Step 3

After the Primary AP reboots, proceed to Launching the Setup Wizard.


Export and Import Primary AP Configuration

Exporting / Saving Primary AP Configuration

At any time, you can export the current Primary AP configuration to a .txt file format.

To export the current configuration follow the steps below.

  1. Navigate to Advanced > Primary AP Tools.

  2. Click Export Configuration under Configuration management.

  3. Set the direction as download and Transfer Mode as HTTP.

The configuration file is saved on the device in which the Primary UI is being viewed. By default the file is saved as config.txt in your downloads folder.

Importing / Restoring Primary AP Configuration

To import a configuration from a previously saved configuration file, which is in .TXT file format follow the steps below.

  1. Navigate to Advanced > Primary AP Tools.

  2. Under Configuration management, select direction as Upload.

  3. Select the Transfer mode as HTTP/TFTP/SFTP/FTP.

If HTTP is selected as Transfer mode, browse the file and click Apply.

If FTP/SFTP/TFTP is selected as Transfer mode, configure the IP address, File path, File name, and other mandatory parameters and click Apply.


Note


You can also do regular import of configuration file, by selecting FTP/SFTP/TFTP transfer mode and by enabling Scheduled Update and configuring the Frequency, Time, window.

By default, the option is disabled.


The import causes all Primary AP-capable APs in the network to reboot. When the APs come back online, the Primary AP Election process happens and a Primary AP comes online with the new imported Primary AP configuration.

For more information about the Primary AP Election Process, see Primary AP Failover and Election Process.

Saving the Primary AP Configuration

Access points have two kinds of memory:

  • The active, but volatile RAM

  • The nonvolatile RAM (NVRAM)

During normal operation, the current configuration of the Cisco Business Wireless AP resides on the RAM of the Primary AP. During a reboot, the volatile RAM is completely erased, but the data on the NVRAM is retained.

You can save the Primary AP configuration from the RAM to the NVRAM. This ensures that in the event of a reboot, the Primary AP can restart with the last saved configuration.

To save the Primary AP current configuration from the RAM to the NVRAM:

  1. Click Save Configuration at the top-right of the Primary AP web interface.

  2. Click Ok.

Upon successful saving of the configuration, a message conveying the same is displayed.

Troubleshooting Files

This section helps you to download the Support Bundle which includes configuration, logs and crash files for trouble shooting.


Note


Disable the Pop-up blocker in your browser settings so you can upload or download the configuration file.


Click Download Support Bundle for downloading support bundle to local machine.

The support bundle can also be downloaded via FTP Server if configured.

  1. Specify the following:

    • IP address

    • File path

    • Username

    • password

    • server port

  2. Select Apply settings and Export.

Cisco Business Wireless will attempt to export troubleshooting files as soon as they are generated. If export of troubleshooting files to FTP server is successful, the files are deleted from Cisco Business Wireless.

Troubleshooting Tools

The following tools can be used for troubleshooting:

SSHv2 Access

  1. Switch to the Expert View, if you are currently in the Standard View.

  2. Enable Secure Shell Version 2 (SSHv2) access mode for Primary AP console, that uses data encryption and a secure channel for data transfer. By default, this is Disabled.

    Note


    By default, SSH is disabled for all APs that are connected to the CBW network. SSH can be enabled only by TAC for debugging purposes.


DNS Servers

  • Choose Umbrella to use Public Open DNS Services

  • Choose User Defined DNS to configure custom defined DNS Services.

Ping Test

This is similar to the client ping test. You can use this test to check if a particular IP (IP received by sub-ordinate APs or client or open DNS IP) is reachable.

Example: Ping 8.8.8.8

DNS

This feature is used to verify if a particular DNS entered is valid.

Example: Ping google.com

Radius Response

This operates like a simulation tool to verify if the Primary AP is able to reach the RADIUS server. For this, you should have at least one WLAN with WPA2 Enterprise as the access type. It is also used to verify if the username and password details exist in the RADIUS server.

Click Start to run all the tests above.

Uploading Files

This section details the process to upload files to the Primary AP from WebUI using the local file upload such as (HTTP), FTP or TFTP.

To upload a file, follow the steps below:

Procedure


Step 1

Navigate to Advanced > Primary AP Tools > Upload File.

Step 2

Select the File Type to upload. It can be one of the following:

OUI file

This file contains list of device MAC-IDs and specific owner for the device MAC-ID. The latest file can be downloaded from http://standards-oui.ieee.org/oui.txt. Only a .txt file format is allowed.

EAP Device Certificate

These are the certificates that are needed for Extensible Authentication Protocol (EAP) based authentication of the device.

Once the certificate is uploaded successfully, reload the Primary AP to apply the new certificate.

EAP CA Certificate

Certificate Authority (CA) Certificates that are needed for Extensible Authentication Protocol (EAP) based authentication. Only a .pem, .crt file format are allowed.

CCO Root CA Certificate

CloudCenter Orchestrator (CCO) Root CA based certificate for authentication of the device. Only a .crt file format is allowed.

A CCO Root CA is a Certificate Authority that owns one or more trusted roots. That means that they have roots in the trust stores of the major browsers.

CBD Serv CA Certificate

The CA certs is used to establish a secure communication from CBW to CBD. If the CBD has updated the self-signed certificate then that certificate file should be uploaded in the CBW.

If connection between CBW and CBD is based on CBD probe or if the CBD uses certificate signed by a trusted certificate authority, CBD Server CA Certificate upload is not required. The allowed certificate file formats are .pem, .crt, and .cert.

WEBAUTH Certificate

This certificate is used for Captive portal. By default, CBW AP uses self-signed certificate for guest users. You can also upload custom certificate for captive portal using this option. Only .pem file format is allowed.

WEBADMIN Certificate

This certificate used for CBW Primary AP UI Access. By default, CBW AP uses self-signed certificate for management access page. You can also upload custom certificate for management access using this option. Only .pem file format is allowed. Please ensure that CommonName and SubjectAltName in the custom certificate is ciscobusiness.cisco.

For both Web Auth or Web Admin certificate to upload:
  • When the certificate is uploaded successfully, the Primary AP has to be reloaded to apply the new certificate.

  • The root CA certificate has to be installed in the client browser.

Step 3

Select HTTP, FTP, or TFTP for the Transfer Mode and provide relevant details.

Step 4

If the Transfer Mode is HTTP (Local Machine), click Browse and upload the file. If the Transfer Mode is FTP/TFTP, then please enter the server IP, filename, file path and upload the file.

Step 5

Enter the Certificate password.

This field is available only for EAP Device Certificate or Webauth Certificate or Webadmin Certificate File Type.

The fields Certificate name and Valid up to show the certificate name and the validity of the certificated that is used by the CBW AP.

Step 6

Click Apply settings and Import to upload the new certificate.

The status of the certificate upload can be viewed in the same page. Once the certificate upload is successful, the Certificate Name and Valid up to fields will be updated.


Certificates

This section displays the list of all certificates that are installed on CBW Primary AP. For each certificate, the following details will be displayed.

  • Name - The name of the certificate.

  • Common Name - The fully qualified domain name (FQDN) of the certificate

  • Start Date/End Date - Displays the start and end date of the certificate during which the certificate would be valid.

  • Status - Displays whether the certificate is Active or Expired based on the validity period of the certificate.

Security Settings

This section explains how to control the client traffic using the Primary AP UI, using the option to create ACL rules and apply those rules at WLAN level.

This section also contains details about how to create and configure an ACL.

Access Control Lists

The Access Control Lists (ACLs) is a set of rules that is used to filter network traffic. ACLs contains a list of conditions that categorize packets and help you determine when to allow or deny network traffic.

The ACLs on Cisco Business Wireless APs supports both IP based and domain based filtering. The rules can be applied either before authentication (pre-Auth ACLs) or after authentication (post-Auth ACLs).

You can selectively allow URLs of your choice without authorizations. With this feature, more than one IP can be learned for the FQDN configured in the URL rule, for both pre-auth and post-auth.

CBW AP supports the following:

  • IPv4 and IPv6

  • Wildcard match - Out of the 32 URL rules, a maximum of 20 characters can be wildcard matches.

  • Allow/Deny Rules for any post-auth use.

  • Configuration of ACL using the FQDN.

  • 32 URL rules that can be configured per ACL name.


Note


The features that are listed above are also applicable to post-auth.


The Primary AP is configured with the ACL name as per the WLAN, or an AP group, or an AP, or the data returned by the AAA server. The data path of the AP, monitors the DNS requests or responses and learns the IP address of the configured DNS names; and allows traffic for the IP addresses that have been learned.

If the ACL action Allow is used for a DNS response, the IP address will be added to the snooped list. For post-auth ACL, if the URL action Deny is used, AP modifies the DNS response and sends the 0.0.0.0 IP address to the client.

The two types of DNS ACL supported on Wave 2 APs are:

  • Pre-Auth or Web-Auth DNS ACL: These ACLs have URLs set to Allow before the client authentication phase. If the client has the URL rule set to Allow, then the client data is switched locally. If the URLs do not match any rule, then all the packets are forwarded to the Primary AP.

    By default, if the client data does not match any of the configured rules on the AP, the AP sends that traffic to the Primary AP for L3 authorization.

  • Post-Auth DNS ACL: These ACLs are applied when the client is running. Post-Auth ACL name can be configured on the WLAN and it can be overridden by the ACL name configured on the AAA server for a given client. If the ACL rule action is set to Deny for any URL, these URLs do not get any IP addresses in the DNS response. The APs over-write the DNS response with 0.0.0.0 and sends it to the client.

Configuring Access Control Lists (ACL)

To configure Access Control Lists (ACLs) for pre-auth, follow the steps below:

Note


  • Enabling the policy ACL, will make the ACL to be added to default-flex-group and pushed down to APs.

  • You can create a maximum of 32 IPv4 and IPv6 ACLs.

  • You can also configure both IP and URL rules for the same ACL name.

  • ACL rules are applied to the VLAN. Multiple WLANs can use the same VLAN and inherit ACL rules, if any.


Procedure


Step 1

Navigate to Advanced > Security Settings.

Step 2

In the Security Settings, click Add new ACL.

The Add ACL Rule window is displayed.

Step 3

To add new ACL rules, do the following steps:

  1. Choose the ACL Type. It can be either IPV4 or IPV6.

  2. Enter the ACL Name.

  3. Use the Policy ACL toggle button, to enable or disable the ACL policy.

    The device that supports policy-based ACLs allows you to apply access control policies across object groups. An object group is a group of IP addresses or a group of TCP or UDP ports. When you create a rule, you specify the object groups rather than specifying IP addresses or ports.

  4. Click the Add IP Rule button.

  5. In the Add/Edit IP ACLs window, enter the following details and click Apply:

    Action

    From the Action drop-down list, choose Deny for the ACL to Block packets or Permit for the ACL to allow packets.

    The default is set to Deny. The AP can permit or deny only IP packets in an ACL. Other types of packets, such as ARP packets cannot be specified.

    Protocol

    Specify the type of protocol. From the Protocol drop-down list, choose the protocol ID of the IP packets to be used for this ACL. It can be one of the following or other layer 3 protocols.

    • Any—Any protocol (this is the default value)

    • TCP—Transmission Control Protocol

    • UDP—User Datagram Protocol

    • ICMP—Internet Control Message Protocol

    • ESP—IP Encapsulating Security Payload

    • AH—Authentication Header

    • GRE—Generic Routing Encapsulation

    • IP in IP—Internet Protocol (IP) in IP (permits or denies IP-in-IP packets)

    • Eth Over IP—Ethernet-over-Internet Protocol

    • OSPF—Open Shortest Path First

    Other

    Any other Internet Assigned Numbers Authority (IANA) protocol. If you choose Other, enter the number of the desired protocol in the Protocol text box. You can find a list of available protocols in the IANA website.

    When you specify Others as the protocol, you must specify the protocol number in the text box that appears.

    Source IP/Mask

    You can specify the starting range (here source IP) for applying the IP ACL.

    Mask

    Masks are used with IP addresses in IP ACLs to specify what should be permitted and denied. Example: 255.255.255.0

    Source Port

    You can choose a single TCP/UDP source port to which packets are matched.

    Dest. IP Address/Mask

    You can specify the ending range (destination IP) for applying the IP ACL.

    Dest. Port

    If you have chosen TCP or UDP, you will need to specify a Destination Port. This destination port can be used by applications that send and receive data to and from the networking stack. Some ports are designated for certain applications such as Telnet, SSH, HTTP, and so on.

    DSCP

    From the DSCP drop-down list, choose one of these options to specify the differentiated services code point (DSCP) value of this ACL. DSCP is an IP header text box that can be used to define the quality of service across the Internet. You can choose:

    • Any—Any DSCP (this is the default value).

    • Specific—A specific DSCP ranging from 0 to 63, which you can specify in the DSCP edit box.

  6. After configuring all the above details, click Apply to configure IP ACL.

  7. Click Add URL Rules.

  8. In the Add/Edit URL ACLs window, enter the URL and specify to permit or deny in the Action field.

    You cannot add the same URL in IPv4 and IPv6.

  9. Click Apply.

On the Security Settings page, the ACL Type, ACL Name, and the Policy Name are listed. You can also view if the policy names are mapped.

Applying the ACL to WLAN at Pre-Auth Level

Procedure


Step 1

Navigate to Wireless Settings > WLANs.

Step 2

In the WLANs window, click the Edit icon next to the Guest WLAN where you want to add the ACL name.

Step 3

In the Edit WLAN window, under the WLAN Security tab, from the ACL Name (IPv4) and ACL Name (IPv6) drop-down lists, choose a value.

Step 4

Click Apply.


Applying the ACL to WLAN at Post-Auth Level

Procedure


Step 1

Navigate to Wireless Settings > WLANs.

Step 2

In the WLANs window, click the Edit icon next to the WLAN where you want to add ACL rules.

The Edit WLAN window is displayed.

Step 3

Under the VLAN & Firewall tab, in the Enable Firewall field, choose Yes to enable the firewall.

Step 4

In the WLAN Post-auth ACL section, select either ACL Name(IPv4) or ACL Name(IPv6), or both.

Step 5

Click Apply.


Configuring AAA Override in WLAN

The Allow AAA Override option of a WLAN allows you to configure the WLAN for identity networking. It allows you to apply VLAN tagging, QoS, and ACLs to individual clients based on the returned RADIUS attributes from the AAA server.

Procedure


Step 1

Switch to the Expert View, if you are currently in the Standard View.

Step 2

Navigate to Wireless Settings > WLANs.

Step 3

In the WLANs window, click the Edit icon next to the WLAN to select it.

Step 4

In the Edit WLAN window, choose the Advanced tab and enable the Allow the AAA Override toggle button.

Step 5

Click Apply.


Cisco Business Dashboard Settings

Cisco Business Dashboard Overview

Cisco Business Dashboard (CBD) is a network management tool for deploying and maintaining Cisco Business Switches, Routers, and Wireless Access Points.

Configuring Cisco Business Dashboard Settings

You can connect CBW Access Points to Cisco Business Dashboard (CBD) by configuring the following parameters under CBD Settings in the Primary AP UI.


Note


The configuration shown below is not applicable if you are using a CBD probe to manage CBW.

When CBW is managed by CBD probe, you are required to configure the SNMP settings on the Primary AP. Refer to Managing SNMP for more details.


  1. Navigate to Advanced > CBD settings. The Cisco Business Dashboard window displays the following parameters:

    • Connection Status—Indicates if the connectivity status between the CBW and CBD is up or down.

    • Agent Version—Specifies the CBD agent version. For example, version 2.6.1


    Note


    To troubleshoot issues with CBD connection, refer to Resolving connection issues between CBW and CBD.


  2. In the CBD settings page, configure the following fields.


    Note


    Ensure that the data you provide on this page matches with the data configured in the CBD application.

    To login and verify the details as configured in the CBD application, refer to Cisco Business Dashboard Administration Guide.


    Dashboard Connection Enabled

    To enable/disable the CBW connection with CBD application.

    Dashboard Name or IP

    Specify the IP address or dashboard name to which you wish to connect.

    The name or IP address specified in this field must be listed in the Subject-Alternative-Name field of the certificate on Cisco Business Dashboard. Refer to the Managing Certificates in the Cisco Business Dashboard Administration Guide for more information on configuring the certificate.

    Dashboard Port

    The default HTTPS port is 443.

    Connection Setup

    You can connect the Cisco Business Wireless (CBW) to Cisco Business Dashboard (CBD) via both Online and Offline methods.

    Click Offline with Access Key if you know the Access Key and Access Key Secret to connect to CBD.

    If not, you can click Online with Web browser. By selecting this option and clicking Save, CBW will automatically communicate with CBD and get the Access Key, Secret, and Certificate required for establishing the connection.

    Access Key ID

    Enter the access key id created in the CBD application. This field will be editable only when Offline Connection Setup is selected.

    Access Key Secret

    Enter the access key secret created in the CBD application. This field will be editable only when Offline Connection Setup is selected.

  3. Click Save to establish a connection between the CBW and CBD.


Note


If the CBD is using a self-signed certificate, download a copy of that certificate from the CBD application. You must import the certificate only when Offline Connection Setup is selected. Follow the instructions below to download:

  1. In the CBD page, navigate to System > Certificate and select the Current Certificate tab.

  2. Click Download at the bottom of the page. The certificate will be downloaded in PEM format by your browser.

To upload the certificate, refer to Uploading Files.