The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Configuring Quality of Service
Quality of service (QoS) refers to the capability of a network to provide better service to selected network traffic over various technologies. The primary goal of QoS is to provide priority including dedicated bandwidth, controlled jitter and latency (required by some real-time and interactive traffic), and improved loss characteristics.
The controller supports four QoS levels:
Platinum/Voice—Ensures a high quality of service for voice over wireless.
Silver/Best Effort—Supports normal bandwidth for clients. This is the default setting.
Bronze/Background—Provides the lowest bandwidth for guest services.
![]() Note | VoIP clients should be set to Platinum. |
You can configure the bandwidth of each QoS level using QoS profiles and then apply the profiles to WLANs. The profile settings are pushed to the clients associated to that WLAN. In addition, you can create QoS roles to specify different bandwidth levels for regular and guest users. Follow the instructions in this section to configure QoS profiles and QoS roles. You can also define the maximum and default QoS levels for unicast and multicast traffic when you assign a QoS profile to a WLAN.
The wireless rate limits can be defined on both upstream and downstream traffic. Rate limits can be defined per SSID and/or specified as a maximum rate limit for all clients. These rate limits can be individually configured.
You can configure the Platinum, Gold, Silver, and Bronze QoS profiles.
Step 1 | Disable the 802.11a and 802.11b/g networks so that you can configure the QoS profiles by entering these commands: | ||||
Step 2 | Change the profile
description by entering this command:
config qos description {bronze | silver | gold | platinum }description | ||||
Step 3 | Define the average data rate
for TCP traffic per user or per SSID by entering this command:
config qos average-data-rate {bronze | silver | gold | platinum} {per-ssid | per-client} {downstream | upstream} rate
| ||||
Step 4 | Define the peak data rate for
TCP traffic per user or per SSID by entering this command:
config qos burst-data-rate {bronze | silver | gold | platinum} {per-ssid | per-client} {downstream | upstream} rate | ||||
Step 5 | Define the average real-time
data rate for UDP traffic per user or per SSID by entering this command:
config qos average-realtime-rate {bronze | silver | gold | platinum} {per-ssid | per-client} {downstream | upstream} rate | ||||
Step 6 | Define the peak real-time
data rate for UDP traffic per user or per SSID by entering this command:
config qos burst-realtime-rate {bronze | silver | gold | platinum} {per-ssid | per-client} {downstream | upstream} rate | ||||
Step 7 | Define the maximum and
default QoS levels for unicast and multicast traffic when you assign a QoS
profile to a WLAN by entering this command:
config qos priority {bronze | gold | platinum | silver} {maximum priority} {default unicast priority} {default multicast priority} You choose from the following options for the maximum priority, default unicast priority, and default multicast priority parameters: | ||||
Step 8 | Define the
maximum value (0–7) for the priority tag associated with packets that fall
within the profile, by entering these commands:
config qos protocol-type {bronze | silver | gold | platinum} dot1p config qos dot1p-tag {bronze | silver | gold | platinum} tag
| ||||
Step 9 | Reenable the 802.11a and 802.11b/g networks so that you can configure the QoS profiles by entering these commands: | ||||
Step 10 | Apply the new QoS profile to a WLAN, by entering these commands: config wlan qos <WLAN ID> {bronze | silver | gold | platinum} |
QoS Profile per WLAN
Cisco UWN solution WLANs support four levels of QoS: Platinum/Voice, Gold/Video, Silver/Best Effort (default), and Bronze/Background. You can configure the voice traffic WLAN to use Platinum QoS, assign the low-bandwidth WLAN to use Bronze QoS, and assign all other traffic between the remaining QoS levels.
The WLAN QoS level defines a specific 802.11e user priority (UP) for over-the-air traffic. This UP is used to derive the over-the-wire priorities for non-WMM traffic, and it also acts as the ceiling when managing WMM traffic with various levels of priorities.
The wireless rate limits can be defined on both upstream and downstream traffic. Rate limits can be defined per SSID and/or specified as a maximum rate limit for all clients. These rate limits can be individually configured.
![]() Note | The IEEE 802.11e UP value for DSCP values that are not mentioned in the table is calculated by considering 3 MSB bits of DSCP. For example, the IEEE 802.11e UP value for DSCP 32 (100 000 in binary), would be the decimal equivalent of the MSB (100) which is 4. The 802.11e UP value of DSCP 32 is 4. |
If you have not already done so, configure one or more QoS profiles using the instructions in the Configuring QoS Profiles (GUI) section.
Step 1 | Choose WLANs to open the WLANs page. |
Step 2 | Click the ID number of the WLAN to which you want to assign a QoS profile. |
Step 3 | When the WLANs > Edit page appears, choose the QoS tab. |
Step 4 | From the Quality of Service (QoS) drop-down list, choose one of the following: |
Step 5 | To define the data rates on a per-user basis, do the following: |
Step 6 | To define the data rates on a per-SSID basis, do the following: |
Step 7 | Click Apply. |
Step 8 | Click Save Configuration. |
Step 1 | Assign a QoS profile to a WLAN by entering this command: |
Step 2 | To override QoS profile rate limit parameters, enter this command: config wlan override-rate-limit wlan-id {average-data-rate | average-realtime-rate | burst-data-rate | burst-realtime-rate} {per-ssid | per-client} {downstream | upstream} rate |
Step 3 | Enter the save config command. |
Step 4 | Verify that you have properly assigned the QoS profile to the WLAN by entering this command:
Information similar to the following appears: WLAN Identifier.................................. 1 Profile Name..................................... test Network Name (SSID).............................. test Status........................................... Enabled MAC Filtering.................................... Disabled Broadcast SSID................................... Enabled AAA Policy Override.............................. Disabled Number of Active Clients......................... 0 Exclusionlist.................................... Disabled Session Timeout.................................. 0 Interface........................................ management WLAN ACL......................................... unconfigured DHCP Server...................................... 1.100.163.24 DHCP Address Assignment Required................. Disabled Quality of Service............................... Silver (best effort) WMM.............................................. Disabled ... |
Quality of Service Roles
After you configure a QoS profile and apply it to a WLAN, it limits the bandwidth level of clients associated to that WLAN. Multiple WLANs can be mapped to the same QoS profile, which can result in bandwidth contention between regular users (such as employees) and guest users. In order to prevent guest users from using the same level of bandwidth as regular users, you can create QoS roles with different (and presumably lower) bandwidth contracts and assign them to guest users.
You can configure up to ten QoS roles for guest users.
![]() Note | If you choose to create an entry on the RADIUS server for a guest user and enable RADIUS authentication for the WLAN on which web authentication is performed rather than adding a guest user to the local user database from the controller, you need to assign the QoS role on the RADIUS server itself. To do so, a “guest-role” Airespace attribute needs to be added on the RADIUS server with a datatype of “string” and a return value of “11.” This attribute is sent to the controller when authentication occurs. If a role with the name returned from the RADIUS server is found configured on the controller, the bandwidth associated to that role is enforced for the guest user after authentication completes successfully. |
Step 1 | Choose to open the QoS Roles for the Guest Users page.
This page shows any existing QoS roles for guest users.
| ||||
Step 2 | Click New to create a new QoS role. The QoS Role Name > New page appears. | ||||
Step 3 | In the Role Name text box, enter a name for the new QoS role. The name should uniquely identify the role of the QoS user (such as Contractor, Vendor, and so on). | ||||
Step 4 | Click Apply. | ||||
Step 5 | Click the name of the QoS role to edit the bandwidth of a QoS
role. The
Edit QoS
Role Data Rates page appears.
| ||||
Step 6 | Define the average data rate for TCP traffic on a per-user basis by entering the rate in Kbps in the Average Data Rate text box. You can enter a value between 0 and 60,000 Kbps (inclusive). A value of 0 imposes no bandwidth restriction on the QoS role. | ||||
Step 7 | Define the peak data rate for TCP traffic on a per-user
basis by entering the rate in Kbps in the Burst Data Rate text box. You can
enter a value between 0 and 60,000 Kbps (inclusive). A value of 0 imposes no
bandwidth restriction on the QoS role.
| ||||
Step 8 | Define the average real-time rate for UDP traffic on a per-user basis by entering the rate in Kbps in the Average Real-Time Rate text box. You can enter a value between 0 and 60,000 Kbps (inclusive). A value of 0 imposes no bandwidth restriction on the QoS role. | ||||
Step 9 | Define the peak real-time rate for UDP traffic on a
per-user basis by entering the rate in Kbps in the
Burst
Real-Time Rate text box. You can enter a value between 0 and 60,000
Kbps (inclusive). A value of 0 imposes no bandwidth restriction on the QoS
role.
| ||||
Step 10 | Click Apply. | ||||
Step 11 | Click Save Configuration. | ||||
Step 12 | Apply a QoS role to a guest user by following the instructions in the Configuring Local Network Users for the Controller (GUI) section. |
Step 1 | Create a QoS role for a guest user by entering this command: config netuser guest-role create role_name
| ||||||
Step 2 | Configure the bandwidth contracts for a QoS role by entering these commands:
| ||||||
Step 3 | Apply a QoS role to a guest user by entering this command: config netuser guest-role apply username role_name For example, the role of Contractor could be applied to guest user jsmith.
| ||||||
Step 4 | Save your changes by entering this command: | ||||||
Step 5 | See a list of the current QoS roles and their bandwidth parameters by entering this command:
Information similar to the following appears: Role Name........................................ Contractor Average Data Rate........................... 10 Burst Data Rate............................. 10 Average Realtime Rate....................... 100 Burst Realtime Rate......................... 100 Role Name........................................ Vendor Average Data Rate........................... unconfigured Burst Data Rate............................. unconfigured Average Realtime Rate....................... unconfigured Burst Realtime Rate...................... unconfigured |
Configuring QoS Mapping
The QoS Map feature maintains the QoS policies in situations where appropriate QoS markings that match the application type are not marked by clients or applications. The administrator gets to map the differentiated services code point (DSCP) to user priority (UP) values and also is able to mark from UP to DSCP in a Cisco WLC.
With QoS in enabled state, the QoS feature is advertised by the AP in the frame. The map is propagated through a frame to a compatible device when it associates or re-associates with the network.
With QoS in disabled state, the default map is propagated to the AP and the clients from Cisco WLC.
This feature is supported on all Cisco AP models.
QoS Map feature is not configurable on the Cisco WLC GUI
You can configure QoS Map only when this feature is in disabled state
This feature does not function with non-801.11u supported hardware. The frames with QoS map is not sent to these clients, yet, the packets sent by these clients follow the DSCP-UP map that you have configured
Ensure that you configure all UP values from 0 to 7 before QoS Map is enabled
Ensure the DSCP range for each user priority is non-overlapping
Ensure the DSCP High Value is greater than or equal to the DSCP Low Value
You can configure up to 21 exceptions at a time
Network needs to be disabled before enabling the QoS maps
We recommend that you disable QoS Map to change the QoS map configuration. When the QoS map is disabled, the DSCP values reset to default values automatically.
![]() Note |
Step 1 | Disable the 802.11a/n/ac and 802.11b/g/n networks so that you can configure the QoS map.
To disable the radio networks, choose Wireless > 802.11a/n/ac or 802.11b/g/n > Network, uncheck the 802.11a (or 802.11b/g) Network Status check box, and click Apply. |
Step 2 | Choose to open the QoS map page. |
Step 3 | To disable the QoS Map feature, perform the following steps: |
Step 4 | To modify the UP to DSCP Map, perform the following steps: |
Step 5 | To create a DSCP exception, perform the following steps: |
Step 6 | To delete a
DSCP Exception, hover your cursor over the blue drop-down arrow for the DSCP
Exception and click
Remove.
Click OK when you are prompted to confirm your action. |
Step 7 | To clear the DSCP Exception list, click Clear ALL. |
Step 8 | Check or uncheck the Trust DSCP UpStream check box to enable or disable the marking of the upstream packets. |
Step 9 | To enable the QoS Map feature, choose Enable from the QoS Map drop-down list. |
Step 10 | Click Apply. |
Step 11 | Reenable the 802.11 networks.
To enable the radio networks, choose Wireless > 802.11a/n/ac or 802.11b/g/n > Network, select the 802.11a (or 802.11b/g) Network Status check box. |
Step 12 | Save your configuration. |
Enable, disable or revert to default map by entering this command:
config qos qos-map {enable | disable | default}
The default command resets the UP to DSCP and DSCP to UP table values to default values (255). This also adds DSCP UP exceptions if not present previously.
Set DSCP range for UP by entering this command:
config qos qosmap up-to-dscp-map up dscp-default dscp-start dscp-end
Set an exception for DSCP by entering this command:
config qos qosmap dscp-up-to-exception dscp up
You can run the above command in situations when the client marks DSCP with an unusual value.
Delete a specific DSCP exception by entering this command:
config qos qosmap delete-dscp-exception dscp
You can run the above command in situations when specific exceptions are to be deleted from the QoS map.
Delete all exceptions by entering this command:
config qos qosmap clear-all
You can run the above command in a situation where all the values needs to be cleared from the map.
Enable or disable marking of the upstream packets using the client DSCP by entering this command:
config qos qosmap trust-dscp-upstream {enable | disable }
You can run the above command in situations where the client marks DSCP and not UP, or marks UP to an unusual value. When in enabled state, it will use the DSCP to mark the upstream packets at AP instead of UP
See the QoS mapping configuration by entering this command:
show qos qosmap
Fastlane QoS
The Fastlane QoS feature provides increased quality of service (QoS) treatment for iOS 10 or higher clients. This feature is disabled by default.
![]() Note | You should enable or disable this feature only during a maintenance window when not many clients are connected, as there will be a disruption in service when all the WLANs and the network are disabled and enabled again. |
![]() Note | When Flex Local switching is enabled on the WLAN, default Flex AVC profile is not created and mapped to the WLAN, unlike AUTOQOS-AVC-PROFILE, which is created for central switching and mapped to a WLAN. |
To enable the Fastlane QoS feature per WLAN, use config qos fastlane enable wlan_id command.
When you run the config qos fastlane enable wlan_id command, fastlane is activated on the target WLAN, which enables supporting iOS 10 devices to activate a QoS whitelist in their profile, if present. The command also runs the commands listed in the following table.
![]() Note | If the commands are executed, then Fastlane QoS feature is enabled and applied to the target WLAN. If a command that is associated with the Fastlane QoS feature fails while is being enabled on a WLAN, all the changes will be reverted to their original values, except for QoS map. The QoS map value will revert to the default value instead of the previously configured value. Also, the new AVC Profile will not be deleted; it will only be removed from the WLAN. |
Description |
Commands |
---|---|
Temporarily disables 802.11a and 802.11b networks and WLANs. |
|
Configures the Platinum QoS profile to set unmarked (best effort) unicast packets, and multicast packets, to best effort over wifi link. |
|
Disables 802.1p marking (all wired marking is DSCP-based). |
|
Disables bandwidth limitation for UDP traffic. |
|
Disables bandwidth limitation for UDP bursts. |
|
Enables ACM for 5 GHz and 2.4 GHz. |
|
Limits allocation for voice traffic to 50 percent of available bandwidth on any 5 GHz or 2.4 GHz radio. |
|
Allocates 6 percent of the bandwidth to voice users for roaming. |
|
Sets the EDCA parameters to their values recommended by 802.11-2017. |
|
Enables expedited bandwidth for 5 GHz and 2.4 GHz. |
|
Configures the user priority (UP) to differentiated services code point (DSCP) maps. |
|
Configures DSCP-to-UP mapping exceptions. |
|
Enables DSCP-Trust (new QoS maps). |
|
Creates the Application Visibility and Control (AVC) profile. |
|
Configures AVC to mark voice applications and subcomponents to expedited forwarding (EF) (DSCP 46). |
|
Configures AVC to mark multimedia conferencing applications to assured forwarding (AF) 41 (DSCP 34). |
|
Configures AVC to mark multimedia streaming applications to AF31 (DSCP 26). |
|
Configures AVC to mark signaling protocols to CS3 (DSCP 24). |
|
Configures AVC to mark transactional data applications to AF21 (DSCP 18). |
|
Configures AVC to mark OAM applications to CS2 (DSCP 16). |
|
Configures AVC to mark bulk data applications marking to AF11 (DSCP 10). |
|
Configures AVC to mark scavenger applications to CS1 (DSCP 8). |
|
Applies the platinum QoS profile to the WLAN. |
|
Applies the AVC profile AUTOQOS-AVC-PROFILE to the WLAN ID wlan-id if AVC visibility is enabled on the WLAN. |
|
Re-enables 802.11a and 802.11b networks and WLANs. |
To disable Fastlane QoS in WLANs, use the config qos fastlane disable wlan_id command.
When you disable fastlane for a target WLAN, supporting iOS 10 devices stop using a QoS whitelist for that WLAN. Disabling fastlane for a target WLAN also returns the WLAN configuration to QoS defaults as per the following table.
![]() Note | When the Fastlane QoS feature is disabled per WLAN, all the values will revert to the default state, except the WLAN status, which moves to the previous state. While disabling Fastlane QoS in WLANs, if media stream is enabled, it will be disabled before enabling a Silver profile to QoS. |
Description |
Commands |
||
---|---|---|---|
Disables the WLANs to make changes to WLAN configuration.
|
|||
Applies the Silver (default) QoS profile to the WLAN . |
|||
Removes the AVC profile AUTOQOS-AVC-PROFILE from the WLAN ID wlan-id, if attached. |
|||
Reverts the WLAN to the earlier state (if WLAN was in Enabled state before, it will revert to Enabled state and if WLAN was in Disabled state, it will revert to Disabled state). |
To disable Fastlane QoS globally, use the config qos fastlane disable global command.
When the Fastlane QoS feature is disabled globally, the WLC QoS configuration will be reverted back to the default values shown in the following table.
![]() Note | Fastlane QoS must be disabled on all the WLANs before config qos fastlane disable global command is executed. If a command associated with the Fastlane QoS feature fails while the command is being enabled globally, all the changes will be reverted to their original values, except QoS map, whose value is reverted to the default, instead of the previously configured value. |
Description |
Commands |
---|---|
Temporarily disable 802.11a and 802.11b networks to make changes to QoS Profiles. |
|
Disable all the WLANs to make changes to QoS profile. |
|
Reverts the Platinum QoS profile to the default QoS configuration. |
|
Disables ACM for 2.4 GHz and 5 GHz. Also, reverts Video CAC to its defaults. |
|
Limits voice traffic to the default of the total bandwidth for 2.4 GHz and 5 GHz. |
|
Reverts roaming bandwidth for voice users to its default values. |
|
Reverts the EDCA parameters to their defaults. |
|
Disables the expedited bandwidth for 2.4 GHz and 5 GHz. |
|
Disables the UP-to-DSCP maps. |
|
Re-enable the 802.11a and 802.11b networks. |
|
Reverts the WLAN to the earlier state (if WLAN was in Enabled state before, it will revert to Enabled state and if WLAN was in Disabled state, it will revert to Disabled state.) |
config wlan enable wlan-id |
Media and EDCA
Aggressive Load Balancing
Enabling aggressive load balancing on the controller allows lightweight access points to load balance wireless clients across access points. You can enable aggressive load balancing using the controller.
![]() Note | Clients are load balanced between access points on the same controller. Load balancing does not occur between access points on different controllers. |
When a wireless client attempts to associate to a lightweight access point, association response packets are sent to the client with an 802.11 response packet including status code 17. The code 17 indicates that the AP is busy. The AP does not respond with an association response bearing 'success' if the AP threshold is not met, and with code 17 (AP busy) if the AP utilization threshold is exceeded, and another less busy AP heard the client request.
For example, if the number of clients on AP1 is more than the number of clients on AP2 plus the load-balancing window, then AP1 is considered to be busier than AP2. When a client attempts to associate to AP1, it receives an 802.11 response packet with status code 17, indicating that the access point is busy, and the client attempts to associate to a different access point.
You can configure the controller to deny client associations up to 10 times (if a client attempted to associate 11 times, it would be allowed to associate on the 11th try). You can also enable or disable load balancing on a particular WLAN, which is useful if you want to disable load balancing for a select group of clients (such as time-sensitive voice clients).
![]() Note | Voice Client does not authenticate when delay is configured more than 300 ms. To avoid this configure a Central-Auth, Local Switching WLAN with CCKM, configure a Pagent Router between AP and WLC with a delay of 600 ms (300 ms UP and 300 ms DOWN and try associating the voice client |
Passive scanning clients will be able to associate to an AP irrespective of whether load balancing is enabled or not.
![]() Note | Cisco 600 Series OfficeExtend Access Points do not support client load balancing. With the 7.4 release, FlexConnect access points do support client load balancing. |
You can configure the controller to analyze the WAN interface utilization of neighboring APs and then load balance the clients across the lightly loaded APs. You can configure this by defining a load balancing threshold. By defining the threshold, you can measure the WAN interface utilization percentage. For example, a threshold value of 50 triggers the load balancing upon detecting utilization of 50% or more on an AP-WAN interface.
![]() Note | For a FlexConnect AP the association is locally handled. The load-balancing decisions are taken at the Cisco WLC. A FlexConnect AP initially responds to the client before knowing the result of calculations at the Cisco WLC. Load-balancing doesn't take effect when the FlexConnect AP is in standalone mode. FlexConnect AP does not send (re)association response with status 17 for Load-Balancing as Local mode APs do; instead, it first sends (re)association with status 0 (success) and then deauth with reason 5. |
Step 1 | Choose to open the Load Balancing page. |
Step 2 | In the Client Window Size text box, enter a value between 1 and 20. The window size becomes part of the algorithm that determines whether an access point is too heavily loaded to accept more client associations: load-balancing window + client associations on AP with the lightest load = load-balancing threshold In the group of access points accessible to a client device, each access point has a different number of client associations. The access point with the lowest number of clients has the lightest load. The client window size plus the number of clients on the access point with the lightest load forms the threshold. Access points with more client associations than this threshold is considered busy, and clients can associate only to access points with client counts lower than the threshold. |
Step 3 | In the Maximum Denial Count text box, enter a value between 0 and 10. The denial count sets the maximum number of association denials during load balancing. |
Step 4 | Click Apply. |
Step 5 | Click Save Configuration. |
Step 6 | To enable or disable aggressive load balancing on specific WLANs, do the following: |
Step 1 | Set the client window for aggressive load balancing by entering this command: config load-balancing window client_count You can enter a value between 0 and 20 for the client_count parameter. |
Step 2 | Set the denial count for load balancing by entering this command: config load-balancing denial denial_count You can enter a value between 1 and 10 for the denial_count parameter. |
Step 3 | Save your changes by entering this command: save config |
Step 4 | Enable or disable aggressive load balancing on specific WLANs by entering this command: config wlan load-balance allow {enable | disable} wlan_ID You can enter a value between 1 and 512 for wlan_ID parameter. |
Step 5 | Verify your settings by entering this command: |
Step 6 | Save your changes by entering this command: save config |
Step 7 | Configure the load balance mode on a WLAN by entering this command: config wlan load-balance mode {client-count | uplink-usage} wlan-id This feature requires the AP to upload its uplink usage statistics to the controller periodically. Check these statistics by entering this command: show ap stats system cisco-AP |
Media Session and Snooping
This feature enables access points to detect the establishment, termination, and failure of Session Initiation Protocol (SIP) voice calls and then report them to the controller and Cisco Prime Infrastructure. You can enable or disable Voice over IP (VoIP) snooping and reporting for each WLAN.
When you enable VoIP Media Session Aware (MSA) snooping, the access point radios that advertise this WLAN look for SIP voice packets that comply with SIP RFC 3261. They do not look for non-RFC 3261-compliant SIP voice packets or Skinny Call Control Protocol (SCCP) voice packets. Any SIP packets destined to or originating from port number 5060 (the standard SIP signaling port) are considered for further inspection. The access points track when Wi-Fi Multimedia (WMM) and non-WMM clients are establishing a call, are already on an active call, or are in the process of ending a call. Upstream packet classification for both client types occurs at the access point. Downstream packet classification occurs at the controller for WMM clients and at the access point for non-WMM clients. The access points notify the controller and Cisco Prime Infrastructure of any major call events, such as call establishment, termination, and failure.
The controller provides detailed information for VoIP MSA calls. For failed calls, the controller generates a trap log with a timestamp and the reason for failure (in the GUI) and an error code (in the CLI) to aid in troubleshooting. For successful calls, the controller shows the number and duration of calls for usage tracking purposes. Cisco Prime Infrastructure displays failed VoIP call information in the Events page.
Controller software release 6.0 or later releases support Voice over IP (VoIP) Media Session Aware (MSA) snooping and reporting.
Step 1 | Choose WLANs to open the WLANs page. |
Step 2 | Click the ID number of the WLAN for which you want to configure media session snooping. |
Step 3 | On the WLANs > Edit page, click the Advanced tab. |
Step 4 | Under Voice, select the Media Session Snooping check box to enable media session snooping or unselect it to disable this feature. The default value is unselected. |
Step 5 | Click Apply. |
Step 6 | Click Save Configuration. |
Step 7 | See the VoIP statistics for your access point radios as follows: |
Step 8 | Choose Management > SNMP > Trap Logs to see the traps generated for failed calls. The Trap Logs page appears. For example, log 0 in the figure shows that a call failed. The log provides the date and time of the call, a description of the failure, and the reason why the failure occurred. |
Step 1 | Enable or disable VoIP snooping for a particular WLAN by entering this command: | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Step 2 | Save your changes by entering this command: | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Step 3 | See the status of media session snooping on a particular WLAN by entering this command:
Information similar to the following appears: WLAN Identifier.................................. 1 Profile Name..................................... wpa2-psk Network Name (SSID).............................. wpa2-psk Status........................................... Enabled ... FlexConnect Local Switching........................ Disabled FlexConnect Learn IP Address....................... Enabled Infrastructure MFP protection.............. Enabled (Global Infrastructure MFP Disabled) Client MFP.................................... Optional Tkip MIC Countermeasure Hold-down Timer....... 60 Call Snooping.................................. Enabled | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Step 4 | See the call information for an MSA client when media session snooping is enabled and the call is active by entering this command: show call-control client callInfo client_MAC_address Information similar to the following appears: Uplink IP/port...................................... 192.11.1.71 / 23870 Downlonk IP/port.................................... 192.12.1.47 / 2070 UP.................................................. 6 Calling Party....................................... sip:1054 Called Party........................................ sip:1000 Call ID............................................. 58635b00-850161b7-14853-1501a8 Number of calls for given client is.............. 1 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Step 5 | See the metrics for successful calls or the traps generated for failed calls by entering this command: show call-control ap {802.11a | 802.11b} Cisco_AP {metrics | traps} Information similar to the following appears when you enter show call-control ap {802.11a | 802.11b} Cisco_AP metrics: Total Call Duration in Seconds................... 120 Number of Calls.................................. 10 Information similar to the following appears when you enter show call-control ap {802.11a | 802.11b} Cisco_AP traps: Number of traps sent in one min.................. 2 Last SIP error code.............................. 404 Last sent trap timestamp...................... Jun 20 10:05:06 To aid in troubleshooting, the output of this command shows an error code for any failed calls. This table explains the possible error codes for failed calls.
|
QoS Enhanced BSS
Follow these guidelines to use Cisco 7921 and 7920 Wireless IP Phones with controllers:
Aggressive load balancing must be disabled for each controller. Otherwise, the initial roam attempt by the phone may fail, causing a disruption in the audio path.
The Dynamic Transmit Power Control (DTPC) information element (IE) must be enabled using the config 802.11b dtpc enable command. The DTPC IE is a beacon and probe information element that allows the access point to broadcast information on its transmit power. The 7921 or 7920 phone uses this information to automatically adjust its transmit power to the same level as the access point to which it is associated. In this manner, both devices are transmitting at the same level.
Both the 7921 and 7920 phones and the controllers support Cisco Centralized Key Management (CCKM) fast roaming.
When configuring WEP, there is a difference in nomenclature for the controller and the 7921 or 7920 phone. Configure the controller for 104 bits when using 128-bit WEP for the 7921 or 7920.
For standalone 7921 phones, load-based CAC must be enabled, and the WMM Policy must be set to Required on the WLAN.
The controller supports traffic classification (TCLAS) coming from 7921 phones using firmware version 1.1.1. This feature ensures proper classification of voice streams to the 7921 phones.
When using a 7921 phone with the 802.11a radio of a 1242 series access point, set the 24-Mbps data rate to Supported and choose a lower Mandatory data rate (such as 12 Mbps). Otherwise, the phone might experience poor voice quality.
The QoS Enhanced Basis Service Set (QBSS) information element (IE) enables the access points to communicate their channel usage to wireless devices. Because access points with high channel usage might not be able to handle real-time traffic effectively, the 7921 or 7920 phone uses the QBSS value to determine if they should associate to another access point. You can enable QBSS in these two modes:
Wi-Fi Multimedia (WMM) mode, which supports devices that meet the 802.11E QBSS standard (such as Cisco 7921 IP Phones)
7920 support mode, which supports Cisco 7920 IP Phones on your 802.11b/g network
The 7920 support mode has two options:
Support for 7920 phones that require call admission control (CAC) to be configured on and advertised by the client device (these are typically older 7920 phones)
Support for 7920 phones that require CAC to be configured on and advertised by the access point (these are typically newer 7920 phones)
When access point-controlled CAC is enabled, the access point sends out a Cisco proprietary CAC Information Element (IE) and does not send out the standard QBSS IE.
7920 phones are non-WMM phones with limited CAC functionality. The phones look at the channel utilization of the access point to which they are associated and compare that to a threshold that is beaconed by the access point. If the channel utilization is less than the threshold, the 7920 places a call. In contrast, 7921 phones are full-fledged WMM phones that use traffic specifications (TSPECs) to gain access to the voice queue before placing a phone call. The 7921 phones work well with load-based CAC, which uses the percentage of the channel set aside for voice and tries to limit the calls accordingly.
Because 7921 phones support WMM and 7920 phones do not, capacity and voice quality problems can arise if you do not properly configure both phones when they are used in a mixed environment. To enable both 7921 and 7920 phones to co-exist on the same network, make sure that load-based CAC and 7920 AP CAC are both enabled on the controller and the WMM Policy is set to Allowed. These settings become particularly important if you have many more 7920 users than 7921 users.
We recommend that aggressive load balancing always be turned off either through the controller GUI or CLI in any wireless network that is supporting voice, regardless of vendor. When aggressive load balancing is turned on, voice clients can hear an audible artifact when roaming, if the handset is refused at its first reassociation attempt.
Step 1 | Choose WLANs to open the WLANs page. | ||
Step 2 | Click the ID number of the WLAN for which you want to configure WMM mode. | ||
Step 3 | When the WLANs > Edit page appears, choose the QoS tab to open the WLANs > Edit (Qos) page. | ||
Step 4 | From the WMM Policy drop-down list, choose one of the following options, depending on whether you want to enable WMM mode for 7921 phones and other devices that meet the WMM standard: | ||
Step 5 | Select the 7920 AP CAC check box if you want to enable 7920 support mode for phones that require access point-controlled CAC. The default value is unselected. | ||
Step 6 | Select the 7920 Client CAC check box if you want to enable 7920 support mode for phones that require client-controlled CAC. The default value is unselected.
| ||
Step 7 | Click Apply to commit your changes. | ||
Step 8 | Click Save Configuration to save your changes. |
Step 1 | Determine the ID number of the WLAN to which you want to add QBSS support by entering this command: | ||
Step 2 | Disable the WLAN by entering this command: | ||
Step 3 | Configure WMM mode for 7921 phones and other devices that meet the WMM standard by entering this command: | ||
Step 4 | Enable or disable 7920 support mode for phones that require client-controlled CAC by entering this command: config wlan 7920-support client-cac-limit {enable | disable} wlan_id
| ||
Step 5 | Enable or disable 7920 support mode for phones that require access point-controlled CAC by entering this command: config wlan 7920-support ap-cac-limit {enable | disable} wlan_id | ||
Step 6 | Reenable the WLAN by entering this command: | ||
Step 7 | Save your changes by entering this command: | ||
Step 8 | Verify that the WLAN is enabled and the Dot11-Phone Mode (7920) text box is configured for compact mode by entering this command: |