The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Feedback
Cisco Catalyst 9800 Series Wireless Controller, Cisco IOS XE 17.18.2
Notice of upcoming changes in the Cisco IOS XE 17.18.2 release and beyond
Communications, services, and additional information:
Cisco Catalyst 9800 Series Wireless Controller, Cisco IOS XE 17.18.2
Cisco Catalyst 9800 Series Wireless Controllers comprise next-generation wireless controllers (referred to as controller in this document) built for intent-based networking. The controllers use Cisco IOS XE software and integrate the radio frequency (RF) capabilities from Cisco Aironet with the intent-based networking capabilities of Cisco IOS XE to create a best-in-class wireless experience for your organization.
The controllers are available in multiple forms to cater to your deployment options:
● Catalyst 9800 Series Wireless Controller Appliance
o Cisco Catalyst 9800 Series Wireless Controllers (C9800-L, C9800-40, C9800-80)
o Cisco CW9800 Series Wireless Controllers (CW9800L, CW9800M, CW9800H1, CW9800H2)
● Catalyst 9800 Series Wireless Controller for Cloud
● Embedded Wireless Controller (EWC) on Catalyst 9000 Series Switches
This document describes the new software features that were introduced or enhanced, change in behavior, issues, supported hardware, and so on, for Cisco IOS XE 17.18.2.
This section provides a brief description of the new software features introduced in this release.
Table 1. New software features for Cisco Catalyst 9800 Series Wireless Controllers, Release 17.18.2
| Product impact |
Feature |
Description |
| Software Reliability |
TrustSec policy High Availability support for FlexConnect mode APs |
This feature ensures that Cisco TrustSec SGACL enforcement remains available and consistent during High Availability events such as Stateful Switchover (SSO) between wireless controllers. This provides uninterrupted security policy enforcement on FlexConnect mode APs even during controller failover or redundancy events. For more information, see Cisco TrustSec. |
| TLS signature algorithm enhancements for NDcPP v3.0e |
Cisco IOS XE 17.18.2 introduces crucial TLS signature algorithm enhancements, specifically for products operating in FIPS Common Criteria (CC) mode, to achieve full compliance with the NDcPP v3.0e security standard. This feature significantly strengthens network security by removing outdated and less secure signature algorithms and ciphersuites, thereby protecting against known vulnerabilities. It outlines the approved, robust signature algorithms for TLS and DTLS applications, including EST TLS clients, RadSec, Syslog, and HTTP Secure servers. The following commands are introduced:
●
logging tls-profile
tls-profile-name
●
ciphersuite
●
ip http secure-ciphersuite
ciphersuites
●
ip http client secure-ciphersuite
ciphersuites
For more information, see FIPS. |
|
| AP name in beacon with vendor-specific information elements (IEs) |
This feature introduces a new vendor-specific information element (IE) to advertise the AP name in beacon and probe response frames, supporting AP names up to 32 characters. Legacy CCX Aironet IE behavior remains unchanged and continues to advertise AP names with a 16-character limit when CCX is enabled. The new IE is disabled by default and can be enabled independently through GUI, CLI, or NETCONF-YANG using the advertise ap-name configuration. When enabled alongside CCX, both the legacy CCX IE and the new AP name IE are advertised. This feature provides an alternative mechanism for clients to receive the full AP hostname without impacting the existing CCX-based deployments. For more information, see WLANs. |
|
| Wireless Active Testing (WAT) with ThousandEyes |
With this release, Wireless Active Testing with ThousandEyes allows you to enable Cisco Wireless 9172H APs to act as synthetic clients, proactively identifying Wi-Fi issues in real time. By integrating the ThousandEyes Endpoint Agent, these wall plate APs perform end-to-end wireless onboarding and application performance tests directly at the network edge, delivering wireless assurance insights and driving towards an optimal user experience. For more information, see Wireless Active Testing with ThousandEyes and Cisco Active Testing for Wireless with ThousandEyes On-Prem Deployment Guide. |
|
| Fast Switching on RLAN Ports in Cisco Wireless 9172 Series Access Points |
From this release, fast switching for RLAN client traffic is supported on Cisco Wireless 9172 Series Access Points. For more information, see Remote LANs. |
|
| Ease of setup
|
Smart Spaces location and AnyLocate capabilities |
AnyLocate capabilities enhance indoor location services by leveraging ultra-wideband (UWB) and Wi-Fi fine timing measurement (FTM). This suite enables precise indoor wayfinding and asset tracking, transforming APs into powerful location sensors. The following commands are introduced:
●
[no] geolocation uwb wayfinding
●
geolocation uwb wayfinding b-duration
●
[no] geolocation height-above-the-floor
●
show ap geolocation uwb wayfinding
●
show ap geolocation uwb asset-trackings
|
| SAE client exclusion visibility |
The SAE client exclusion visibility feature in Cisco IOS XE 17.18.2 centralizes client authentication failure and exclusion data on the controller. This significantly reduces manual log collection and operational costs in Flex central authentication deployments with SAE-enabled WLANs, providing administrators with improved visibility, syslog messages for events, and configurable control over client exclusion durations. For more information, see IP Theft. |
|
| Cisco Support Assistant integration in the controller GUI |
This feature integrates the Cisco Support Assistant (CSA) directly within the controller GUI. You can now open TAC cases, upload logs, record screens, and access contextual help directly from within the controller GUI, and without installing the Chrome browser extension. You can find a feature demonstration here. For more information, see Overview of the Controller. |
|
| Enhanced client data enrichment with new complex event processing (CEP) gather point |
In this release, a new CEP gather point has been added to the Cisco-IOS-XE-wireless-client-global-oper module, using the xpath: /client-global-oper-data/client-cnsld-data. This enhancement consolidates data from multiple sources—including common-oper-data, dot11-oper-data, traffic-stats, and sisf leafs—using the client MAC address as the key. |
|
| Catalyst 9800 Series Wireless Controller for Cloud (C9800-CL) support for Cloud Monitoring for wireless |
The C9800-CL virtual wireless controllers can now be onboarded directly to the Meraki dashboard through the new virtual Catalyst registration service. This enables C9800-CL to benefit from the same simple, secure Meraki cloud connectivity and monitoring experience as physical C9800 appliances. |
|
| Packet Capture support for Cloud Monitoring for wireless |
Support for manual and scheduled packet capture on cloud-monitored APs enables administrators to remotely initiate on-demand captures or automate recurring capture schedules directly from the Meraki dashboard. This facilitates faster root-cause analysis and streamlined troubleshooting, all without requiring on-site access to the AP. |
|
| Compliance |
6 GHz country support for Vietnam |
From Cisco IOS XE 17.18.2 onwards, Vietnam (VN) is added to the list of countries that support the 6 GHz radio band. For more information, see Countries and Regulations. |
|
|
Additional country support for Cisco Wireless 9179F Access Points |
From Cisco IOS XE 17.18.2 onwards, numerous countries support the Cisco Wireless 9179F APs, enhancing functionality and broadening deployment options worldwide. For more information, see Countries and Regulations. |
Product analytics
Cisco IOS XE Product Analytics collects device Systems Information for the purposes of understanding product usage, enabling product improvements and product development, and assisting in product adoption and sales support. Only summarized data of feature usage and statistical counters of configuration are collected. No personal identifiable information, such as MAC/IP addresses, usernames, custom configuration names, or user provided strings, are collected as part of Cisco IOS XE Product Analytics. Cisco processes this data following the General Terms, the Cisco Privacy Statement, and any other applicable agreement with Cisco.
See Cisco Enterprise Networking Product Analytics Frequently Asked Questions.
● With Cisco IOS XE 17.18.2, the Cisco Wireless 9174I Series Wi-Fi 7 Access Points (CW9174I), Cisco Wireless 9174E Series Wi-Fi 7 Access Points (CW9174E), and Cisco Wireless 9171I Series Wi-Fi 7 Access Points (CW9171I) are supported.
The CW9174I APs, CW9174E APs, and CW9171I APs, are tri-band (2.4 GHz, 5 GHz, 6 GHz) APs. The APs support full interoperability with leading 802.11be, 802.11ax, and legacy clients, and a hybrid deployment with other APs and controllers. For a full listing of the APs' features and specifications, see:
Cisco Wireless 9174 (I/E) Series Wi-Fi 7 Access Point Data Sheet
Cisco Wireless 9171I Series Wi-Fi 7 Access Point Data Sheet
For more information regarding the AP hardware, see:
Cisco Wireless 9174I Series Wi-Fi 7 Access Point Hardware Installation Guide
Cisco Wireless 9174E Series Wi-Fi 7 Access Point Hardware Installation Guide
Cisco Wireless 9171I Series Wi-Fi 7 Access Point Hardware Installation Guide
Note: Software support for CW9174I, CW9174E, and CW9171I is available for all countries in this release. We recommend that you consult the Product Approval Status page to check individual country compliance approval: https://cae-cnc-prd.cisco.com/pdtcnc/#/.
● Cisco CW9800L Wireless Controller (CW9800L): CW9800L is the next-generation entry-level controller for small campuses and distributed branches, offering a significant boost in performance and features. Supporting up to 10 Gbps throughput, 500 APs, and 10,000 clients, the CW9800L delivers double the capacity and increased performance compared to the base C9800-L.
The latest release adds an external redundant power supply option for greater reliability, up to 10dB quieter operation for noise-sensitive environments, and hardware acceleration for advanced encryption—ensuring secure, high-performance connectivity for modern enterprises.
For more information, see Cisco CW9800L Wireless Controller Hardware Installation Guide and Cisco CW9800L Wireless Controller Data Sheet.
Table 2. Change in behavior for Cisco Catalyst 9800 Series Wireless Controllers, Release 17.18.2
| Feature |
Description |
| The show AP command does not work for 5 GHz with slot 0 |
AP models such as CW9176D1 and CW9176I with dual-band radios support 5 GHz operation on slot 0, but the controller only recognizes slots 1 and 2 for 5 GHz commands. As a result, the commands targeting 5 GHz on slot 0 return an invalid input error. This limitation affects both command execution and slot selection prompts, impacting management of these APs. With the change in behavior, the show ap ap-name dot11 dual-band urwb detail command has been added to display dual-band radio details to address this gap. |
| WLAN Compatibility Improvements for Wi-Fi 6E and Wi-Fi 7 in the WLAN GUI page |
WLAN compatibility improvements for Wi-Fi 6E and Wi-Fi 7 include:
● Individual compatibility checks: Each WLAN now has its own dedicated compatibility check for Wi-Fi 7, with Wi-Fi 6E status displayed alongside.
● Comprehensive compatibility assessment: Compatibility is evaluated based on settings, including WPA3, cipher, PMF configurations, and band enablement.
● Enhanced navigation: New hyperlinks make it easier to move between configuration pages.
● Improved monitoring view: The updated view provides detailed information on SSID compatibility and the current operational status.
|
| Support for Spectrum Preference (SP) bias in Automated Frequency Coordination (AFC) |
With the introduction of AFC and SP, managing SP bias has become increasingly important, especially for deployments using CW9179F or external-antenna 6 GHz APs in high-ceiling environments, where reliability is critical. This enhancement provides an option to enable SP Bias within RRM, ensuring optimal performance and compliance, particularly in AFC environments. To operate the radio in SP mode, at least five AFC channels must be available based on the configuration (including channel width, DCA channel list, and PSC settings), and the AFC license must support a minimum power level of 1. |
| Deprecation of commands of obsolete features in local MAC |
This update introduces a warning message for certain wireless configuration commands as part of a feature deprecation process. Previously, these configuration commands could be used without any warnings:
● OSEN:
security wpa osen
● Aggressive Load Balancing:
load-balance
● WEP:
security static-wep-key
● Airtime Fairness (ATF
): wireless profile airtime-fairness
profile-name id
From 17.18.2 onwards, using any of these commands displays a warning message indicating that the features are deprecated. |
| CW9179F Environmental Pack Serial Number is displayed in the AP command output |
Starting with 17.18.2, the output of show commands (for example, show ap name ap-name config general) have been updated to include the CW9179F Environmental Pack Serial Number. In the earlier release, this information was not displayed in the command output. With this enhancement, you can now easily view the CW9179F Environmental Pack Serial Number directly from the command output improving visibility and simplifying device management. |
Notice of upcoming changes in the Cisco IOS XE 17.18.2 release and beyond
Cisco is committed to safeguarding our products and customer networks against increasingly sophisticated threat actors. As computing power and the threat landscape have evolved, some features and protocols currently in use have become vulnerable to attack. While more secure alternatives are now available, legacy protocols may still be in use in some environments.
To improve network security, reduce the attack surface, and protect sensitive data, Cisco is phasing out legacy and insecure features and protocols, encouraging customers to transition to more secure alternatives. This process is gradual and designed to minimize operational impact. This is part of a broader initiative to make Cisco products more secure by default and secure by design.
Starting with the Cisco IOS XE 17.18.2 release and in future releases, Cisco software will display warning messages when configuring features or protocols that do not provide sufficient security such as those transmitting sensitive data without encryption or using outdated encryption mechanisms. Warnings will also appear when security best practices are not followed, along with suggestions for secure alternatives.
This list is subject to change, but the following is a list of features and protocols that are planned to generate warnings from version Cisco IOS XE 17.18.2.
Release notes for each release will describe exact changes for that release.
● Plain-text and weak credential storage: Type 0 (plain text), 5 (MD5), or 7 (Vigenère cipher) in configuration files.
Recommendation: Use Type 6 (AES) for reversible credentials, and Type 8 (PBKDF2-SHA-256) or Type 9 (Scrypt) for non-reversible credentials.
● SSHv1:
Recommendation: Use SSHv2.
● SNMPv1 and SNMPv2, or SNMPv3 without authentication and encryption:
Recommendation: Use SNMPv3 with authentication and encryption (authPriv).
● MD5 (authentication) and 3DES (encryption) in SNMPv3:
Recommendation: Use SHA1 or, preferably, SHA2 for authentication, and AES for encryption.
● IP source routing based on IP header options:
Recommendation: Do not use this legacy feature.
● TLS 1.0 and TLS 1.1:
Recommendation: Use TLS 1.2 or later.
● TLS ciphers using SHA1 for digital signatures:
Recommendation: Use ciphers with SHA256 or stronger digital signatures.
● HTTP:
Recommendation: Use HTTPS.
● Telnet:
Recommendation: Use SSH for remote access.
● FTP and TFTP:
Recommendation: Use SFTP or HTTPS for file transfers.
● On-Demand Routing (ODR):
Recommendation: Use a standard routing protocol in place of CDP-based routing information exchange.
● BootP server:
Recommendation: Use DHCP or secure boot features such as Secure ZTP.
● TCP and UDP small servers (echo, chargen, discard, daytime):
Recommendation: Do not use these services on network devices.
● IP finger:
Recommendation: Do not use this protocol on network devices.
● NTP control messages:
Recommendation: Do not use this feature.
● TACACS+ using pre-shared keys and MD5:
Recommendation: Use TACACS+ over TLS 1.3, introduced in release Cisco IOS XE 17.18.1.
● Wireless LAN Controller, CAPWAP DTLS:
Recommendation: Do not use DTLSv1.0 and weaker ciphersuites.
● Wireless LAN Controller, WLAN:
Recommendation: Do not use 802.1x key management security.
● Wireless LAN Controller, Mobility:
Recommendation: Do not use weaker ciphers and use stronger ciphers.
● Wireless LAN Controller, NMSP:
Recommendation: Do not use weaker ciphers and use strong ciphers.
Cisco is committed to supporting customers through this transition. Subsequent releases on the Cisco IOS XE 17.18 train will continue to support these features but will display warnings if they are used. Future release trains may impose additional restrictions on these features which will be communicated through release notes.
To see additional information about the issues, click the bug ID to access the Bug Search Tool (BST).
Table 3. Resolved issues in Cisco Catalyst 9800 Series Wireless Controllers, Release 17.18.2
| Description |
|
| WMI IP is null (0.0.0.0) in the CAPWAP packet while forwarding the multicast traffic |
|
| Audit session ID changes after inter-WNCd roam on Central Web Authentication (CWA) with PSK |
|
| 17.15.3 multicast traffic fails post to controller switchover |
|
| Controller does not forward downstream packets to the wireless client after switchover |
|
| Controller crash after predownload initiated |
|
| C9800 controller unable to handle new client connections due to memory failure |
|
| 17.18.1: C9800-L stand-by crash @ Process = EWLC IOSD CAPWAP PROCESS |
|
| C9800-CL: show ap summary command output column misalignment |
|
| [URWB_CW] Show AP command not working for 5ghz with slot 0 |
|
| Frequent channel changes seen on 6 GHz |
|
| High Availability not forming due to Active and Standby configuration being out of sync |
|
| Bulk sync failing after multiple SSO |
|
| Access point data tunnel going to NULL state an unable to recover it as it incorrectly detects an existing session already in place |
|
| SJC Alpha - 17.18.2 alpha APs not joining controller- stuck in DTLS |
|
| C9800 controller unexpected crash at fair_q_hash modules due to invalid QOS parameters |
|
| linux_iosd crash seen on C9800 in process IGMPSN |
|
| 9800 controller memory leak in /tmp/rp/tdldb_rcow database handle WNCD_DB |
|
| Multicast stream occasionally stuck after WGB roaming between COS APs |
|
| Unexpected reloads when processing the command \"show ap sum sort name\" |
|
| CDP Proximity: AP not resolving via CDP/LLDP when they are on different site tag |
|
| /client-oper-data/dot11-oper-data invalid value |
|
| High Channel Utilization due to high interference on 6GHz channels |
|
| EMUL DB records are not destroyed and increasing the memory utilization |
|
| 9800 controller reboots due memory leak in wncloudm |
|
| Controller crash after issuing the command “ap geolocation ranging accurate method uwb” |
|
| [APCI] MLO Rogue Containment for all bands is not working |
|
| Unable to fill roaming OI field when adding an ANQP server |
|
| Cisco Catalyst 9800-40 controller displays random CPU spikes on EZMAN |
|
| Optimize rogue/neighbor bssid processing by WNCD when the bssid-neighbor-stats config is enabled |
|
| C9800 not enforcing SGT policies for static/sxp tags on the same L2 network |
|
| Request for RPC support for dual band radio use-cases |
|
| Controller reboots unexpectedly due to an assertion failure in WNCd process |
|
| Policy details are not updating properly in User Administration |
|
| Controller console flooded with "wncd: Failed to handle IGMP join" errors |
|
| 17.9.3 - Slot values shows ok for status-desc in the response body of the REST API call |
|
| RF profiles is not displayed in the controller CLI through 'show wireless tag rf all' |
|
| C9400 switch fails to provide \"show running-config | format netconf-xml\" |
|
| Showing blank in Assisted Roaming prediction-minimum Value in CLI |
|
| C9800-CL public cloud VLAN page In GUI fails to load |
|
| Flex CA LS MLO OKC roam fails as controller is not sending Add Mobile |
|
| Enable SP bias in AFC operation |
|
| Configuration syntax for flex site tags is out of order. no local site not specified before flex site configs |
|
| \"open-roaming-oi allow-all beacon\" does not advertise 5A03BA0000 in dot11 beacon frames |
|
| \"no shutdown\" not accepting if trying to change the configs under WLAN |
|
| After the AP refresh, the old AP name is not being retained or carried over to the new AP |
|
| IP theft feature is disconnecting the legit client when there is an event |
|
| Invalid character in AP name causing AP bulk provisioning failures |
|
| Controller reloaded due to a crash on RRM process |
|
| AAA CUI Attribute missing in the controller |
|
| The controller DNS Servers added to the DHCP pool are not visible in the Web UI |
|
| Mobility tunnel between 9800-40 controller and AireOS controller flapping, after upgrade of 9800-40 controller to 17.15.4 |
|
| Controller failover issue due to rogue containment |
|
| Controller GUI does not show Trustpoints in PKI Management Trustpoints tab 17.12 |
|
| Wireless controller reloads due to Segmentation Fault on WNCD process |
|
| FEW: Client IP-MAC address binding features cause high number of CAPWAP control traffic during client join or slow roaming events |
|
| The controller crashed several times during the RRM process |
|
| Cannot import PFX from GUI, but works from CLI |
|
| CW9800M GUI displays incorrect Wi-Fi 7 client connection speed |
|
| The controller is not displaying Fabric Media Stream clients in Web GUI |
|
| Cisco Catalyst 9124AXE-E APs identifies antennas wrongly |
|
| AP9120 crashed due to kernel panic |
|
| Functional SJC Alpha CW9176I AP Kernel Crash on ap-17.18.0.45 |
|
| Cisco Aironet 3800 APs display client authentication issue after AP Migration to a controller running 17.15.3 |
|
| Cisco Catalyst 9124 AP in mesh mode encounters poor iperf traffic performance |
|
| 9166 will not allow 802.1x QoS WLAN markers/VAP but will Open and PSK |
|
| C9130AX - RHL driver bootup failure causes sh crash, which triggers kernel panic. |
|
| C9130AX - RHL bootup failure due to Wbpll handshake failure. |
|
| Cisco Wave 2 APs performing with fast transition with 802.1X authentication send incorrect M2 message during re-key on session timeout |
|
| 11be APs degrading DSCP 34/AF41 QoS to Best Effort and/or Background to downstream traffic |
|
| 9120 AP unexpected reload due to Radio firmware beacon TX stuck |
|
| CSBUCS-793 : 17.18.1 : UWB Firmware crashes seen on CW9178/CW9176 APs |
|
| BLE firmware not updated when Access Point image is downgraded |
|
| SJC Alpha CW9166I Kernel crash on ap-17.18.0.75 image |
|
| BGL18 Alpha: 9120 AP crashed due to kernel panic |
|
| EWC 9124 Crash - Controller log indicates Internal error: Oops: 96000004 [#1] SMP[#08006182, #08069984] |
|
| CW9166I AP Radio 1 crash due to beacon stuck on ap-17.18.1.6 |
|
| AP1852 sends excessive BAR flood due to Client not responding to data |
|
| SJC Alpha CW9178I AP core_grpcd on ap-17.18.2.12 |
|
| 17.18.2: CW9172 Observed crash while running longevity |
|
| Flex WLAN VLAN mappings not retained on COS APs with 9800 controller |
|
| CW9178 AP not taking clients in 2.4 GHz due to MAC HW Hang/PHY Error |
|
| SJC Alpha C9136, C9164, C9166, C9178, C9176 AP core-ble_transport on ap-17.18.2.27 |
|
| Catalyst 9105 APs stops ACKing frames due to RX Stuck and fails for clients connected in 5 GHz Slot |
|
| SJC Alpha CleanAir cores seen on APs due to Scan Radio Down on ap-17.18.2.30 |
|
| Kernel Panic at pc : dp_rx_peer_map_handler+0x6a8/0x12c0 in 17.18.2 |
|
| WAT IOx Upgrade of TE EPA Sometimes Fails and Creates New Agent on TE Platform |
|
| [17.18.2 - EWLC SIT] - AP9176/9178 ranging crashes continuously |
|
| SST:17.12.6: Crash due to radio failures (Beacon Stuck) seen on 1832 or 1852 APs |
|
| Roaming failure in FlexConnect mode with WPA3-SAE and OKC enabled |
|
| 9136 AP - Air quality and temperature sensor status not reflecting as disabled |
|
| Cisco IOx app channel is down due to a state mismatch between the IOx and CAF apps on the Cisco Catalyst 9136 AP |
|
| AP crash due to radio failure (too many radio failures) |
|
| AP serial number in IOX application |
|
| AP failed to join controller with multiple iCAP subscription client statistics filter in join profile |
|
| IW9167EH- AP Seen CleanAird core file during, during this testing AP was just connected, no active activity |
|
| Malformed scan packets on Silabs NCP |
|
| 17.15.4: Kernel panic during assert recovery |
|
| Observing randomly ICMP packet drops with 3802 AP and propietary high roaming device |
|
| 17.15.4 [SST] - CAPWAPd Crash on 9162 AP's while notifying to spaces_grpcd |
|
| IOX app not able to communicate with IOt chip |
|
| Association response frames were missing in the anomaly PCAP after mapping the \"Invalid RSNIE/Rate mismatch\" bad profile on WiFi-7 APs. |
|
| CW9178 AP not taking in clients on 2.4 GHz |
|
| ThousandEyes Endpoint Agent Fails to Download with OpenSSL Error |
|
| Client sending HE capabilities to Wi-Fi 5 AP triggers association failure |
|
| COS APs does not keep manual Geolocation coordinates across reboots |
|
| 9166 AP Radio Interface down after booting up process |
|
| AP9162: Radio1 FW Core dump |
|
| 9172H: RLAN clients still seen on controller when fast switching enabled |
|
| Wireless Active Testing (WAT) ThousandEyes Endpoint Agent is testing wrong gateway |
|
| C9130 AP fails to send Discovery Request with IPv6 Address post an Outage. |
|
| 1815 AP Trace Event Crash |
|
| C9120/C9130 COS AP showing false positive TDD Transmit and Wi-Fi Inv. Ch interferer alerts |
|
| CleanAir not reporting on specific APs – 9120 |
|
| CW9176 showing two MAC addresses behind the switchport |
|
| IW9167EH: Kernel panic running 17.15.2 |
To see additional information about the issues, click the bug ID to access the Bug Search Tool (BST). This section lists the open issues that apply to the current release and might apply to releases earlier than Cisco Catalyst 9800 Series Wireless Controllers, Release 17.18.2. An issue that is open for an earlier release and is still unresolved applies to all future releases until it is resolved.
Table 4. Open issues in Cisco Catalyst 9800 Series Wireless Controllers, Release 17.18.2
| Bug ID |
Description |
| 17.12.6a ->17.18.2 ISSU, AP disjoin after active -> standby |
|
| SST: ndbmand cores are seen after ISSU upgrade from 17.15.x to 17.18.2 with CATC, NETCONF not working |
|
| AP gets disconnected post SSO as AP packets do not reach the controller post SSO |
|
| 17.18.2: Power table update for CW9174I, CW9174E, and CW9171I - US - Mexico 2.4 GHz separation |
|
| C9800-L encounters kernel unresponsiveness due to IntelResetRequest |
|
| Large number of APs (2K+) take several minutes to join N+1 controller when Primary goes down |
|
| Controller mem is noticed due to wsa_db |
|
| High CPU in wncd 99%-100% after change AP name to AP name that already exist in the controller |
|
| Cisco 8821 IP Phones experiencing reliability issue with 9136 APs |
|
| AP crash on 9174I running 17.18.2EFT10: Kernel Panic |
|
| C9178: Clients unable to join 2.4 radio due to MAC HW Hang/PHY Error |
|
| 9120 WGB taking long time to send authentication requests after scan is done during roaming same channel |
|
| 9120 WGB taking long time to send authentication request after scan is done while roaming different channels |
|
| WGB 9105 crashes when wired0 flaps \"NMI watchdog: BUG: soft lockup - CPU#x stuck for xxs\" |
|
| C9105 AP stops accepting clients due to RX too late errors CSP |
|
| C9120 AP capwapd process crash without reboot |
|
| C9120 COS AP crash NMI watchdog: BUG: soft lockup - CPU stuck for #s! wl0-kthrd CSP |
|
| 9800 standby chassis shows Cisco Unknown Power Supply and same SN on output from \"show inventory\" 17.12.4 |
|
| In file manager, when selecting one file in the location box, download fails |
|
| Remove Mesh country restriction warning from UI |
|
| No AQ info output for 6 GHz band \"show ap dot11 6ghz cleanair air-quality summary\" command in the controller |
|
| Antenna Gain configuration via RESTCONF RPC fails for AP models 3800E and 9120AXE \u2014 \u201cslot: 0 does not have a dedicated radio\u201d error |
|
| Cisco Catalyst 9166i APs are unable to detect RRM neighbors on 5GHz radio while on channel 56 |
|
| Unexpected reboot on controller produced due to wncd process due to assertion failure |
|
| Ucode crash with segfault in cce_sce_classify |
|
| 9800 - Global config is not overridden by the RF profile |
|
| PAED process crashes every 24 after record pruning and DB query errors |
|
| AP BLE Radio Status \"Powered Off\" despite \"no ap dot15 shutdown\" configuration enabled on the controller |
|
| 9166 APs keep crashing when 6GHz radio is on, using RO country code on controller version 17.15.3 |
|
| Controller client entries causing AP to reach max number of clients per radio |
The known issues for Cisco IOS XE 17.18.2 include:
2.4 GHz output power in CW9174(I/E) and CW9171I APs
For the CW9174x and CW9171x APs, the 2.4 GHz output power has been lowered in the U.S. and Canada regulatory domains for channels 1 to 4, channel 10, and channel 11. This issue occurs only in version 17.18.2 and will be resolved with CSCws44009.
| Channels |
2.4 GHz output power for U.S and Canada regulatory domains |
| 1 |
9 dBm |
| 2 |
12 dBM |
| 3 |
15 dBm |
| 4 |
18 dBm |
| 5 |
20 dBm |
| 6 |
20 dBm |
| 7 |
20 dBm |
| 8 |
20 dBm |
| 9 |
20 dBm |
| 10 |
18 dBm |
| 11 |
15 dBm |
Cisco Wireless 9174E Series AP operates in On-Channel Neighbor Discovery Protocol (NDP) mode by default
The Cisco Wireless 9174E Series Access Point operates in On-Channel Neighbor Discovery Protocol (NDP) mode by default. In this mode, NDP is transmitted on the client-serving radio and received by the auxiliary (Aux) or scan radio. You can also configure the AP to Off-Channel mode. In Off-Channel mode, NDP is transmitted on the Aux/scan radio and received by the client-serving radio. Typically, NDP is transmitted at higher power level in 6 GHz. However, when the 9174E operates in Off-Channel mode, the NDP Tx power is the same for both 6 GHz SP and LPI due to Board Data File (BDF) limitations.
Compatibility matrix
The following table provides software compatibility information. For more information, see Cisco Wireless Solutions Software Compatibility Matrix.
Table 5. Compatibility Matrix for Cisco Catalyst 9800 Series Wireless Controllers, Release 17.18.2
| Cisco Catalyst 9800 Series Wireless Controller Software |
Cisco Identity Services Engine |
Cisco Prime Infrastructure |
Cisco AireOS-IRCM Interoperability |
Cisco Catalyst Center |
Cisco CMX |
| IOS XE 17.18.2 |
3.4 3.3 3.2 3.1 3.0
* all with latest patches |
Not available |
8.10 latest MR 8.5 latest MR
|
11.1.1
|
GUI system requirements
The following subsections list the hardware and software required to access the Cisco Catalyst 9800 Controller GUI.
Table 6. Hardware requirements
| Processor speed |
DRAM |
Number of colors |
Resolution |
Font size |
| 233 MHz minimum Note: We recommend 1 GHz. |
512 MB Note: We recommend 1-GB DRAM. |
256 |
1280 x 800 or higher |
Small |
Software requirements
Operating Systems:
● Windows 7 or later
● macOS X 10.11 or later
Browsers:
● Google Chrome: Version 59 or later (on Windows and Mac)
● Microsoft Edge: Version 40 or later (on Windows)
● Safari: Version 10 or later (on Mac)
● Mozilla Firefox: Version 60 or later (on Windows and Mac)
Note that Firefox version 63.x is not supported.
The controller GUI uses Virtual Terminal (VTY) lines for processing HTTP requests. At times, when multiple connections are open, the default number of VTY lines of 15 set by the device might get exhausted. Therefore, we recommend that you increase the number of VTY lines to 50.
To increase the VTY lines in a device, run the following commands in the following order:
Device# configure terminal
Device(config)# line vty 50
The best practice is to configure the service tcp-keepalives to monitor the TCP connection to the device.
Device(config)# service tcp-keepalives-in
Device(config)# service tcp-keepalives-out
Before you upgrade
Ensure that you familiarize yourself with the following points before proceeding with the upgrade:
● ISSU process recommendations for Cisco IOS XE 17.18.2:
o This is applicable only for ISSU upgrades.
o Direct ISSU upgrade from 17.12 to 17.18.2 will result in AP reload after 17.18.2 ISSU upgrade with approximate downtime of five minutes (may depend on the network traffic and congestion) - Due to CSCws53690.
To avoid AP reload (CSCws53690) from 17.12 to 17.18, perform intermediate N+1 ISSU upgrade (17.12.x -> 17.15.4d -> 17.18.2). Intermediate upgrade should be done only from 17.15.4d.
o Any ISSU upgrade from 17.15.x to 17.18.2 will not impact AP reload issue. We recommend that you reconfigure NETCONF/YANG on 17.18.2 after rolling AP upgrades due to CSCws58703, if NETCONF connection is down.
● If you have APs in remote sites, behind a WAN link, read the following document to accelerate the image download and make it more reliable: https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/223125-understand-access-point-image-upgrades.html.
● When you upgrade from Cisco IOS XE 17.9.5 or lower, or 17.12.2 or lower, to Cisco IOS XE 17.18.2, the controller WebUI does not support images greater than 1.5 GB.
Workaround:
o Upgrade using the CLI commands, or,
o Upgrade to 17.9.6, 17.12.3, or higher, then upgrade to 17.18.2.
● For images: If upgrading from 17.9.6 or lower, 17.12.4 or lower, or 17.15.1 or lower, to 17.18.2, Cisco Catalyst Wi-Fi 6 APs may fail to upgrade their image due to lack of space on the temporary partition.
Workaround:
o Reboot the impacted APs using a power cycle, then procced to upgrade normally.
For more information, see CSCwm08044 and CSCwm07499.
● APs running older release code (before 8.10.190.0, 17.3.8, 17.6.5, 17.9.3 or older), may get into a boot loop when upgrading software over a WAN link. For more information, see: https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/220443-how-to-avoid-boot-loop-due-to-corrupted.html.
● The following Wave 1 APs are not supported in 17.18.2 and higher, and they will not join the controller. We recommend that you validate the current models before upgrading:
o Cisco Aironet 1570 Series Access Point
o Cisco Aironet 1700 Series Access Point
o Cisco Aironet 2700 Series Access Point
o Cisco Aironet 3700 Series Access Point
● From Cisco IOS XE Dublin 17.10.x, Key Exchange and MAC algorithms like diffie-hellman-group14-sha1, hmac-sha1, hmac-sha2-256, and hmac-sha2-512 are not supported by default and it may impact some SSH clients that only support these algorithms. If required, you can add them manually. For information on manually adding these algorithms, see the SSH Algorithms for Common Criteria Certification document available at: https://www.cisco.com/c/en/us/td/docs/routers/ios/config/17-x/sec-vpn/b-security-vpn/m_sec-secure-shell-algorithm-ccc.html.
● If APs fail to detect the backup image after running the archive download-sw command, perform the following steps:
o Upload the image using the no-reload option of the archive download-sw command:
Device# archive download-sw /no-reload tftp://<tftp_server_ip>/<image_name>
o Restart the CAPWAP process using capwap ap restart command. This allows the AP to use the correct backup image after the restart (reload is not required.)
Device# capwap ap restart
The AP will lose connection to the controller during the join process. When the AP joins the new controller, it will see a new image in the backup partition. So, the AP will not download a new image from the controller.
● Fragmentation lower than 1500 is not supported by the RADIUS packets generated by wireless clients in the Gi0 (OOB) interface.
● While upgrading to Cisco IOS XE 17.3.x and later releases, if the ip http active-session-modules none command is enabled, you will not be able to access the controller GUI using HTTPS. To access the GUI using HTTPS, run the following commands in the order specified below:
ip http session-module-list pkilist OPENRESTY_PKI
ip http active-session-modules pkilist
● Cisco Aironet 1815T OfficeExtend Access Point will be in local mode when connected to the controller. However, when it functions as a standalone AP, it gets converted to FlexConnect mode.
● The Cisco Catalyst 9800-L Wireless Controller may fail to respond to the BREAK signals received on its console port during boot time, preventing users from getting to the ROMMON. This problem is observed on the controllers manufactured until November 2019, with the default config-register setting of 0x2102. This problem can be avoided if you set config-register to 0x2002.
This problem is fixed in the 16.12(3r) ROMMON for Cisco Catalyst 9800-L Wireless Controller.
For information about how to upgrade the ROMMON, see the Upgrading ROMMON for Cisco Catalyst 9800-L Wireless Controllers section of the Upgrading Field Programmable Hardware Devices for Cisco Catalyst 9800 Series Wireless Controllers document.
● By default, the controller uses a TFTP block size value of 512, which is the lowest possible value. This default setting is used to ensure interoperability with legacy TFTP servers. If required, you can change the block size value to 8192 to speed up the transfer process, using the ip tftp blocksize command in global configuration mode.
● If the following error message is displayed after a reboot or system crash, we recommend that you regenerate the trustpoint certificate: ERR_SSL_VERSION_OR_CIPHER_MISMATCH.
Use the following commands in the order specified below to generate a new self-signed trustpoint certificate:
device# configure terminal
device(config)# no crypto pki trustpoint trustpoint_name
device(config)# no ip http server
device(config)# no ip http secure-server
device(config)# ip http server
device(config)# ip http secure-server
device(config)# ip http authentication local/aaa
● Do not deploy OVA files directly to VMware ESXi 6.5. We recommend that you use an OVF tool to deploy the OVA files.
● Ensure that you remove the controller from Cisco Prime Infrastructure before disabling or enabling Netconf-YANG. Otherwise, the system may reload unexpectedly.
● From Cisco IOS XE Bengaluru 17.4.1 onwards, the telemetry solution provides a name for the receiver address instead of the IP address for telemetry data. This is an additional option. During the controller downgrade and subsequent upgrade, there is likely to be an issue—the upgrade version uses the newly named receivers, and these are not recognized in the downgrade. The new configuration gets rejected and fails in the subsequent upgrade. Configuration loss can be avoided when the upgrade or downgrade is performed from Cisco Catalyst Center.
● Communication between Cisco Catalyst 9800 Series Wireless Controller and Cisco Prime Infrastructure uses different ports:
o All the configurations and templates available in Cisco Prime Infrastructure are pushed through SNMP and CLI, using UDP port 161.
o Operational data for controller is obtained over SNMP, using UDP port 162.
o AP and client operational data leverage streaming telemetry:
Cisco Prime Infrastructure to controller: TCP port 830 is used by Cisco Prime Infrastructure to push the telemetry configuration to the controller (using NETCONF).
Controller to Cisco Prime Infrastructure: TCP port 20828 is used for Cisco IOS XE 16.10.x and 16.11.x, and TCP port 20830 is used for Cisco IOS XE 16.12.x, 17.1.x and later releases.
● The Cisco Centralized Key Management (CCKM) feature was deprecated in Cisco IOS XE 17.10.x but currently remains supported. However, support for CCKM will be removed in a future release. Therefore, we recommend that you migrate to Fast Transition (FT) with 802.1X authentication and validate the configuration with supported key caching mechanisms.
● To migrate public IP address from 16.12.x to 17.x. ensure that you configure the service internal command. If you do not configure the service internal command, the IP address does not get carried forward.
● RLAN support with Virtual Routing and Forwarding (VRF) is not available.
● When you encounter the SNMP error SNMP_ERRORSTATUS_NOACCESS 6, it means that the specified SNMP variable is not accessible.
● We recommend that you perform a controller reload whenever there is a change in the controller's clock to reflect an earlier time.
● The DTLS version (DTLSv1.0) is deprecated for Cisco Aironet 1800 based on latest security policies. Therefore, any new out-of-box deployments of Cisco Aironet 1800 APs will fail to join the controller, and you will get the following error message:
%APMGR_TRACE_MESSAGE-3-WLC_GEN_ERR: Chassis 1 R0/2: wncd: Error in AP Join,
AP <AP-name>,
mac:<MAC-address>Model AIR-AP1815W-D-K9, AP negotiated unexpected DTLS version v1.0
To onboard new Cisco Aironet 1800 APs and to establish a CAPWAP connection, explicitly set the DTLS version to 1.0 in the controller using the following configuration:
config terminal
ap dtls-version dtls_1_0
end
Note: Setting the DTLS version to 1.0 affects all the existing AP CAPWAP connections. We recommend that you apply the configuration only during a maintenance window. After the APs download the new image and join the controller, ensure that you remove the configuration.
● Before you begin a downgrade process, you must manually remove the configurations which are applicable in the current version but not in the older version. Otherwise, you might encounter unexpected behavior.
● To upgrade the field programmable hardware devices for Cisco Catalyst 9800 Series Wireless Controllers, see Upgrading Field Programmable Hardware Devices for Cisco Catalyst 9800 Series Wireless Controllers.
Upgrade path to Cisco IOS XE 17.18.2
Table 7. Upgrade Path to Cisco IOS XE Dublin 17.18.2
| Current software |
Upgrade path for deployments with 9130 or 9124 |
Upgrade path for deployments without 9130 and 9124 |
| 16.10.x |
— Note: The Cisco Catalyst 9130 and 9124 APs are not supported in 16.10.x and 16.11.x releases. |
Upgrade first to 16.12.5 or 17.3.x and then to 17.18.2. |
| 16.11.x |
— |
Upgrade first to 16.12.5 or 17.3.x and then to 17.18.2. |
| 16.12.x |
Upgrade first to 17.3.5 or later or 17.6.x or later, then to 17.9.6 or later or 17.12.x or later, and then to 17.18.2. |
Upgrade first to 17.3.5 or later or 17.6.x or later, and then to 17.18.2. |
| 17.1.x |
Upgrade first to 17.3.5 or later or 17.6.x or later, then to 17.9.6 or later or 17.12.x or later, and then to 17.18.2. |
Upgrade first to 17.3.5 or later and then to 17.18.2. |
| 17.2.x |
Upgrade first to 17.3.5 or later or 17.6.x or later, then to 17.9.6 or later or 17.12.x or later, and then to 17.18.2. |
Upgrade first to 17.3.5 or later and then to 17.18.2. |
| 17.3.1 to 17.3.4 |
Upgrade first to 17.3.5 or later or 17.6.x or later, then to 17.9.6 or later or 17.12.x or later, and then to 17.18.2. |
Upgrade directly to 17.18.2. |
| 17.3.4c or later |
Upgrade to 17.9.6 or later or 17.12.x or later, and then to 17.18.2. |
Upgrade directly to 17.18.2. |
| 17.4.x |
Upgrade first to 17.6.x and then to 17.18.2. |
Upgrade directly to 17.18.2. |
| 17.5.x |
Upgrade first to 17.6.x and then to 17.18.2. |
Upgrade directly to 17.18.2. |
| 17.6.x |
Upgrade to 17.9.6 or later or 17.12.x or later, and then to 17.18.2. |
Upgrade directly to 17.18.2. |
| 17.7.x |
Upgrade to 17.9.6 or later or 17.12.x or later, and then to 17.18.2. |
Upgrade directly to 17.18.2. |
| 17.8.x |
Upgrade to 17.9.6 or later or 17.12.x or later, and then to 17.18.2. |
Upgrade directly to 17.18.2. |
| 17.9.1 to 17.9.5 |
Upgrade to 17.9.6 or later or 17.12.x or later, and then to 17.18.2. |
Upgrade directly to 17.18.2. |
| 17.9.6 or later |
Upgrade directly to 17.18.2. |
Upgrade directly to 17.18.2. |
| 17.10.x |
Upgrade to 17.12.x or later, and then to 17.18.2. |
Upgrade directly to 17.18.2. |
| 17.11.x |
Upgrade to 17.12.x or later, and then to 17.18.2. |
Upgrade directly to 17.18.2. |
| 17.12.x |
Upgrade directly to 17.18.2. |
Upgrade directly to 17.18.2. |
| 17.13.x |
Upgrade directly to 17.18.2. |
Upgrade directly to 17.18.2. |
| 17.14.x |
Upgrade directly to 17.18.2. |
Upgrade directly to 17.18.2. |
| 17.15.x |
Upgrade directly to 17.18.2. |
Upgrade directly to 17.18.2. |
| 17.16.x |
Upgrade directly to 17.18.2. |
Upgrade directly to 17.18.2. |
| 17.17.x |
Upgrade directly to 17.18.2. |
Upgrade directly to 17.18.2. |
| 8.9.x or any 8.10.x version prior to 8.10.171.0 |
Upgrade first to 8.10.171.0 or later, 17.3.5 or later, or 17.6.x or later, then to 17.9.6 or later or 17.12.x or later, and then to 17.18.2. |
Upgrade directly to 17.18.2.
|
Upgrading the controller software
This section describes the various aspects of upgrading the controller software.
Finding the software version
The package files for the Cisco IOS XE software are stored in the system board flash device (flash:).
Use the show version privileged EXEC command to see the software version that is running on your controller.
Note: Although the show version output always shows the software image running on the controller, the model name shown at the end of the output is the factory configuration, and does not change if you upgrade the software license.
Use the show install summary privileged EXEC command to see the information about the active package.
Use the dir filesystem: privileged EXEC command to see the directory names of other software images that you have stored in flash memory.
Software images
● Release: Cisco IOS XE 17.18.2
Image names (9800-80, 9800-40, and 9800-L):
● C9800-80-universalk9_wlc.17.18.x.SPA.bin
● C9800-40-universalk9_wlc.17.18.x.SPA.bin
● C9800-L-universalk9_wlc.17.18.x.SPA.bin
Image names (CW9800M, CW9800H1/CW9800H2, CW9800L)
● CW9800H-wlc-universalk9.17.18.x.SPA.bin
● CW9800M-wlc-universalk9.17.18.x.SPA.bin
● CW9800L-wlc-universalk9.17.18.x.SPA.bin
Image names (9800-CL):
● Cloud: C9800-CL-universalk9.17.18.x.SPA.bin
● Hyper-V/ESXi/KVM: C9800-CL-universalk9.17.18.x.iso, C9800-CL-universalk9.17.18.x.ova
● KVM: C9800-CL-universalk9.17.18.x.qcow2
● NFVIS: C9800-CL-universalk9.17.18.x.tar.gz
Software installation commands
To install and activate a specified file, and to commit changes to be persistent across reloads, run the following command:
device# install add file filename [activate |commit]
To separately install, activate, commit, end, or remove the installation file, run the following command:
device# install ?
Note: We recommend that you use the GUI for installation.
| Commands |
Description |
| add file tftp: filename |
Copies the install file package from a remote location to a device and performs a compatibility check for the platform and image versions |
| activateauto-abort-timer |
Activates the file and reloads the device; the auto-abort-timer keyword automatically rolls back image activation |
| Commit |
Makes changes that are persistent over reloads |
| rollback to committed |
Rolls back the update to the last committed version |
| Abort |
Cancels file activation and rolls back to the version that was running before the current installation procedure started |
| Remove |
Deletes all unused and inactive software installation files |
Licensing
Cisco wireless licenses
Cisco wireless licenses, a part of the Cisco Networking Subscription licensing model, is a software license that helps you to deploy your Wi-Fi 7 Access Points in an on-premise, hybrid, or a cloud managed network. From Cisco IOS XE 17.15.2, Cisco Wireless licenses are supported on Wi-Fi 7 Access Points (APs) and later models.
The Cisco wireless licenses consist of the following tiers:
● Cisco wireless essentials: The tier that provides fundamental features and functionalities that are essential to manage a network.
● Cisco wireless advantage: The tier that supports additional features and capabilities and includes all the essential capabilities in addition to the advanced capabilities to manage a network.
For more information, see Cisco Wireless Licensing.
Interoperability with clients
This section describes the interoperability of the controller software with client devices.
The following table lists the configurations used for testing client devices.
Table 8. Test configuration for interoperability
| Hardware or software parameter |
Hardware or software type |
| Release |
Cisco IOS XE 17.18.2 |
| Cisco Wireless Controller |
|
| Access Points |
See Supported APs |
| Radio |
· 802.11ac · 802.11ax · 802.11a · 802.11g · 802.11n · 802.11be (Wi-Fi 7) |
| Security |
Open, PSK (WPA2-AES), 802.1X (WPA2-AES) (EAP-FAST, EAP-TLS), WPA3 AKM |
| RADIUS |
|
| Types of tests |
Connectivity, traffic (ICMP), and roaming between two APs |
The following table lists the client types on which the tests were conducted. Client types included laptops, hand-held devices, phones, and printers.
Table 9. Client types
| Client type and name |
Driver or software version |
| Laptops |
|
| Acer Aspire E 15 E5-573-3870 (Qualcomm Atheros QCA9377) |
Windows 10 Pro (12.0.0.832) |
| Apple MacBook Air 11 inch |
macOS Sierra 10.12.6 |
| Apple MacBook Air 13 inch |
macOS High Sierra 10.13.4 |
| MacBook Pro Retina |
macOS Catalina |
| MacBook Pro Retina 13 inch early 2015 |
macOS Mojave 10.14.3 |
| MacBook Pro OS X |
macOS X 10.8.5 |
| MacBook Air |
macOS Sierra v10.12.2 |
| MacBook Air 11 inch |
macOS Yosemite 10.10.5 |
| MacBook M1 Chip |
macOS Catalina |
| MacBook M1 Chip |
macOS Ventura 13.2.1 |
| MacBook Pro M2 Chip |
macOS Ventura 13.3 beta |
| MacBook Pro M2 Chip |
macOS Ventura 13.1 |
| Dell Inspiron 2020 Chromebook |
Chrome OS 75.0.3770.129 |
| Google Pixelbook Go |
Chrome OS 97.0.4692.27 |
| HP Chromebook 11a |
Chrome OS 76.0.3809.136 |
| Samsung Chromebook 4+ |
Chrome OS 77.0.3865.105 |
| Dell Latitude (Intel AX210) |
Windows 11 (22.110.x.x) |
| Dell Latitude 3480 (Qualcomm DELL wireless 1820) |
Win 10 Pro (12.0.0.242) |
| Dell Inspiron 15-7569 (Intel Dual Band Wireless-AC 3165) |
Windows 10 Home (21.40.0) |
| Dell Latitude E5540 (Intel Dual Band Wireless AC7260) |
Windows 7 Professional (21.10.1) |
| Dell Latitude E5430 (Intel Centrino Advanced-N 6205) |
Windows 7 Professional (15.18.0.1) |
| Dell Latitude E6840 (Broadcom Dell Wireless 1540 802.11 a/g/n) |
Windows 7 Professional (6.30.223.215) |
| Dell XPS 12 v9250 (Intel Dual Band Wireless AC 8260) |
Windows 10 Home (21.40.0) |
| Dell Latitude 5491 (Intel AX200) |
Windows 10 Pro (21.20.1.1) |
| Dell XPS Latitude12 9250 (Intel Dual Band Wireless AC 8260) |
Windows 10 Home |
| Dell Inspiron 13-5368 Signature Edition |
Windows 10 Home (18.40.0.12) |
| FUJITSU Lifebook E556 Intel 8260 (Intel Dual Band Wireless-AC 8260 (802.11n)) |
Windows 8 (19.50.1.6) |
| Lenovo Yoga C630 Snapdragon 850 (Qualcomm AC 2x2 Svc) |
Windows 10 Home |
| Lenovo ThinkPad Yoga 460 (Intel Dual Band Wireless-AC 9260) |
Windows 10 Pro (21.40.0) |
| Note: For clients using Intel wireless cards, we recommend that you update to the latest Intel wireless drivers if the advertised SSIDs are not visible. |
|
| Tablets |
|
| Apple iPad Pro (12.9 inch) 6th Gen |
iOS 16.4 |
| Apple iPad Pro (11 inch) 4th Gen |
iOS 16.4 |
| Apple iPad 2021 |
iOS 15.0 |
| Apple iPad 7the Gen 2019 |
iOS 14.0 |
| Apple iPad MD328LL/A |
iOS 9.3.5 |
| Apple iPad 2 MC979LL/A |
iOS 11.4.1 |
| Apple iPad Air MD785LL/A |
iOS 11.4.1 |
| Apple iPad Air2 MGLW2LL/A |
iOS 10.2.1 |
| Apple iPad Mini 4 9.0.1 MK872LL/A |
iOS 11.4.1 |
| Apple iPad Mini 2 ME279LL/A |
iOS 11.4.1 |
| Apple iPad Mini 4 9.0.1 MK872LL/A |
iOS 11.4.1 |
| Microsoft Surface Pro 3 13 inch (Intel AX201) |
Windows 10 (21.40.1.3) |
| Microsoft Surface Pro 3 15 inch (Qualcomm Atheros QCA61x4A) |
Windows 10 |
| Microsoft Surface Pro 7 (Intel AX201) |
Windows 10 |
| Microsoft Surface Pro 6 (Marvell Wi-Fi chipset 11ac) |
Windows 10 |
| Microsoft Surface Pro X (WCN3998 Wi-Fi Chip) |
Windows |
| Mobile phones |
|
| Apple iPhone 5 |
iOS 12.4.1 |
| Apple iPhone 6s |
iOS 13.5 |
| Apple iPhone 7 MN8J2LL/A |
iOS 11.2.5 |
| Apple iPhone 8 |
iOS 13.5 |
| Apple iPhone 8 Plus |
iOS 14.1 |
| Apple iPhone 8 Plus MQ8D2LL/A |
iOS 12.4.1 |
| Apple iPhone X MQA52LL/A |
iOS 13.1 |
| Apple iPhone 11 |
iOS 15.1 |
| Apple iPhone 12 |
iOS 16.0 |
| Apple iPhone 12 Pro |
iOS 15.1 |
| Apple iPhone 13 |
iOS 15.1 |
| Apple iPhone 13 Mini |
iOS 15.1 |
| Apple iPhone 13 Mini Pro |
iOS 15.1 |
| Apple iPhone SE MLY12LL/A |
iOS 11.3 |
| Apple iPhone SE |
iOS 15.1 |
| ASCOM i63 |
Build v 3.0.0 |
| ASCOM Myco 3 |
Android 9 |
| Cisco IP Phone 8821 |
11.0.6 SR4 |
| Drager Delta |
VG9.0.2 |
| Drager M300.3 |
VG3.0 |
| Drager M300.4 |
VG3.0 |
| Drager M540 |
VG4.2 |
| Google Pixel 3a |
Android 11 |
| Google Pixel 4 |
Android 11 |
| Google Pixel 5 |
Android 11 |
| Google Pixel 6 |
Android 12 |
| Google Pixel 7 |
Android 13 |
| Huawei Mate 20 pro |
Android 9.0 |
| Huawei P20 Pro |
Android 10 |
| Huawei P40 |
Android 10 |
| LG v40 ThinQ |
Android 9.0 |
| One Plus 8 |
Android 11 |
| Oppo Find X2 |
Android 10 |
| Redmi K20 Pro |
Android 10 |
| Samsung Galaxy S9+ - G965U1 |
Android 10.0 |
| Samsung Galaxy S10 Plus |
Android 11.0 |
| Samsung S10 (SM-G973U1) |
Android 11.0 |
| Samsung S10e (SM-G970U1) |
Android 11.0 |
| Samsung Galaxy S20 Ultra |
Android 10.0 |
| Samsung Galaxy S21 Ultra 5G |
Android 13.0 |
| Samsung Galaxy S22 Ultra |
Android 13.0 |
| Samsung Fold 2 |
Android 10.0 |
| Samsung Galaxy Z Fold 3 |
Android 13.0 |
| Samsung Note20 |
Android 12.0 |
| Samsung G Note 10 Plus |
Android 11.0 |
| Samsung Galaxy A01 |
Android 11.0 |
| Samsung Galaxy A21 |
Android 10.0 |
| Sony Experia 1 ii |
Android 11 |
| Sony Experia |
Android 11 |
| Xiaomi Mi 9T |
Android 9 |
| Xiaomi Mi 10 |
Android 11 |
| Spectralink 84 Series |
7.5.0.x257 |
| Spectralink 87 Series |
Android 5.1.1 |
| Spectralink Versity Phones 92/95/96 Series |
Android 10.0 |
| Spectralink Versity Phones 9540 Series |
Android 8.1.0 |
| Vocera Badges B3000n |
4.3.3.18 |
| Vocera Smart Badges V5000 |
5.0.6.35 |
| Zebra MC40 |
Android 4.4.4 |
| Zebra MC40N0 |
Android 4.1.1 |
| Zebra MC92N0 |
Android 4.4.4 |
| Zebra MC9090 |
Windows Mobile 6.1 |
| Zebra MC55A |
Windows 6.5 |
| Zebra MC75A |
OEM ver 02.37.0001 |
| Zebra TC51 |
Android 6.0.1 |
| Zebra TC52 |
Android 10.0 |
| Zebra TC55 |
Android 8.1.0 |
| Zebra TC57 |
Android 10.0 |
| Zebra TC58 |
Android 11.0 |
| Zebra TC70 |
Android 6.1 |
| Zebra TC75 |
Android 10.0 |
| Zebra TC520K |
Android 10.0 |
| Zebra TC8000 |
Android 4.4.3 |
| Printers |
|
| Zebra QLn320 Mobile Printer |
LINK OS 5.2 |
| Zebra ZT230 IndustrialPrinter |
LINK OS 6.4 |
| Zebra ZQ310 Mobile Printer |
LINK OS 6.4 |
| Zebra ZD410 Industrial Printer |
LINK OS 6.4 |
| Zebra ZT410 Desktop Printer |
LINK OS 6.2 |
| Zebra ZQ610 Industrial Printer |
LINK OS 6.4 |
| Zebra ZQ620 Mobile Printer |
LINK OS 6.4 |
| Wireless module |
|
| Intel AX 411 |
Driver v22.230.0.8 |
| Intel AX 211 |
Driver v22.230.0.8, v22.190.0.4 |
| Intel AX 210 |
Driver v22.230.0.8, v22.190.0.4, v22.170.2.1 |
| Intel AX 200 |
Driver v22.130.0.5 |
| Intel 11AC |
Driver v22.30.0.11 |
| Intel AC 9260 |
Driver v21.40.0 |
| Intel Dual Band Wireless AC 8260 |
Driver v19.50.1.6 |
| Samsung S21 Ultra |
Driver v20.80.80 |
| QCA WCN6855 |
Driver v1.0.0.901 |
| PhoenixContact FL WLAN 2010 |
Firmware version: 2.71 |
Supported virtual and hardware platforms
The following table lists the supported virtual and hardware platforms. (See Supported PIDs and ports for the list of supported modules.)
Table 10. Supported virtual and hardware platforms
| Platform |
Description |
| Cisco Catalyst 9800-80 Wireless Controller |
A modular wireless controller with up to 100-GE modular uplinks and seamless software updates. The controller occupies a 2-rack unit space and supports multiple module uplinks. |
| Cisco Catalyst 9800-40 Wireless Controller |
A fixed wireless controller with seamless software updates for mid-size to large enterprises. The controller occupies a 1-rack unit space and provides four 1-GE or 10-GE uplink ports. |
| Cisco Catalyst 9800-L Wireless Controller |
The Cisco Catalyst 9800-L Wireless Controller is the first low-end controller that provides a significant boost in performance and features. |
| Cisco 9800 Series Wireless Controller for Cloud |
A virtual form factor of the Catalyst 9800 Wireless Controller that can be deployed in a private cloud (supports VMware ESXi, Kernel-based Virtual Machine [KVM], Microsoft Hyper-V, and Cisco Enterprise NFV Infrastructure Software [NFVIS] on Enterprise Network Compute System [ENCS] hypervisors), or in the public cloud as Infrastructure as a Service (IaaS) in Amazon Web Services (AWS), Google Cloud Platform (GCP) marketplace, and Microsoft Azure. |
| Embedded Wireless Controller on Catalyst 9000 Series Switches |
The Catalyst 9800 Wireless Controller software for the Cisco Catalyst 9000 switches brings the wired and wireless infrastructure together with consistent policy and management. This deployment model supports only Software Defined-Access (SDA), which is a highly secure solution for small campuses and distributed branches. |
| Cisco CW9800 Series Wireless Controller (CW9800M, CW9800H1, CW9800H2, and CW9800L)
|
The CW9800M controller is the next generation Cisco CW9800 series wireless LAN controller built to deliver a 53% performance improvement while consuming 18% less power when compared to the previous generation models. Additionally, the CW9800M controller supports 3000 APs and 32000 clients to ensure better performance and scale for business-critical networks and provides up to 40 Gbps of forwarding throughput for both normal packet and encrypted packets while remaining a single RU designed to save you space and provide greater flexibility in your datacenters. |
| The CW9800H1 and CW9800H2 controllers are the next-generation Cisco CW9800 wireless LAN controllers that boast up to a 36% increase in performance and consume up to 40% less power compared to their predecessors. Additionally, the CW9800H1 and CW9800H2 models are built with a space-saving single RU design and support up to 6000 APs and 64,000 clients with 100 Gbps of maximum throughput. They also offer a choice of uplinks with either 4 x 25 Gbps (CW9800H1) or 2 x 40 Gbps (CW9800H2) configurations to meet high throughput demands of next-generation wireless requirements. |
|
| The CW9800L controller is the next-generation, low-end controller that provides a significant boost in performance and features. Supporting up to 10 Gbps throughput, 500 APs, and 10,000 clients, the CW9800L delivers double the capacity and increased performance compared to the base C9800-L. |
Supported host environments - public and private cloud
The following table lists the host environments supported for private and public cloud.
Table 11. Supported host environments for public and private cloud
| Host environment |
Software version |
| VMware ESXi |
● VMware ESXi vSphere 6.5, 6.7, 7.0, and 8.0
● VMware ESXi vCenter 6.5, 6.7, 7.0, and 8.0
|
| KVM |
● Linux KVM-based on Red Hat Enterprise Linux 9.2, or latest version
● Ubuntu 16.04.5 LTS, Ubuntu 18.04.5 LTS, Ubuntu 20.04.5 LTS
|
| AWS |
AWS EC2 platform |
| NFVIS |
ENCS 3.8.1 and 3.9.1 |
| GCP |
GCP marketplace |
| Microsoft Hyper-V |
Windows Server 2019, with Hyper-V Manager (Version 10.0.x) |
| Microsoft Azure |
Microsoft Azure |
The following table lists the supported Cisco Catalyst 9800 Series Wireless Controller hardware models.
The base PIDs are the model numbers of the controller.
The bundled PIDs indicate the orderable part numbers for the base PIDs that are bundled with a particular network module. Running the show version, show module, or show inventory command on such a controller (bundled PID) displays its base PID.
Note: Unsupported SFPs will bring down a port. Only Cisco-supported SFPs (GLC-LH-SMD and GLC-SX-MMD) should be used on the route processor (RP) ports of C9800-80-K9 and C9800-40-K9.
Table 12. Supported PIDS and ports
| Controller model |
Description |
| C9800-CL-K9 |
Cisco Catalyst Wireless Controller as an infrastructure for cloud. |
| C9800-80-K9 |
Eight 1/10-Gigabit Ethernet SFP or SFP+ ports and two power supply slots. |
| C9800-40-K9 |
Four 1/10-Gigabit Ethernet SFP or SFP+ ports and two power supply slots. |
| C9800-L-C-K9 |
● 4x2.5/1-Gigabit ports
● 2x10/5/2.5/1-Gigabit ports
|
| C9800-L-F-K9 |
● 4x2.5/1-Gigabit ports
● 2x10/1-Gigabit ports
|
| CW9800H1 |
● 8x1 GE/10 GE SFP ports
● 4x25 GE SFP interfaces
|
| CW9800H2 |
● 8x1 GE/10 GE SFP Ports
● 2X 40 GE QSFP interfaces
|
| CW9800M |
● Four built-in 1 GE /10 GE SFP ports
● Two built-in 25 GE SFP ports
|
| CW9800L |
● 2x 10G/1G SFP Ports (Data Ports)
● 2x1G Copper (RP and SP ports)
|
Supported SFPs
The following table lists the supported SFP models.
Table 13. Supported SFP models
| SFP name |
C9800-80-K9 |
C9800-40-K9 |
C9800-L-F-K9 |
CW9800H1 |
CW9800H2 |
CW9800M |
CW9800L |
| COLORCHIP-C040- Q020-CWDM4-03B |
Supported |
— |
— |
— |
— |
— |
— |
| DWDM-SFP10G-30.33 |
Supported |
Supported |
— |
— |
— |
— |
— |
| DWDM-SFP10G-61.41 |
Supported |
Supported |
— |
— |
— |
— |
— |
| FINISAR-LR – FTLX1471D3BCL (The FINISAR SFPs are not Cisco specific and some of the features, such as DOM, may not work properly.) |
Supported |
Supported |
Supported |
— |
— |
— |
— |
| FINISAR-SR – FTLX8574D3BCL |
Supported |
Supported |
Supported |
— |
— |
— |
— |
| GLC-BX-D |
Supported |
Supported |
Supported |
Supported |
Supported |
Supported |
— |
| GLC-BX-U |
Supported |
Supported |
Supported |
Supported |
Supported |
Supported |
— |
| GLC-EX-SMD |
Supported |
Supported |
— |
Supported |
Supported |
Supported |
— |
| GLC-LH-SMD |
Supported |
Supported |
— |
Supported |
Supported |
Supported |
Supported |
| GLC-SX-MMD |
Supported |
Supported |
Supported |
Supported |
Supported |
Supported |
Supported |
| GLC-T |
Supported |
— |
— |
— |
— |
— |
— |
| GLC-TE |
Supported |
Supported |
Supported |
Supported |
Supported |
Supported |
Supported |
| GLC-ZX-SMD |
Supported |
Supported |
Supported |
Supported |
Supported |
Supported |
— |
| QSFP-100G-LR4-S |
Supported |
— |
— |
— |
— |
— |
— |
| QSFP-100G-SR4-S |
Supported |
— |
— |
— |
— |
— |
— |
| QSFP-40G-BD-RX |
Supported |
— |
— |
— |
— |
— |
— |
| QSFP-40G-ER4 |
Supported |
— |
— |
— |
Supported |
— |
— |
| QSFP-40G-LR4 |
Supported |
— |
— |
— |
Supported |
— |
— |
| QSFP-40G-LR4-S |
Supported |
— |
— |
— |
Supported |
— |
— |
| QSFP-40G-CSR4 |
— |
— |
— |
— |
Supported |
— |
— |
| QSFP-40G-SR4 |
Supported |
— |
— |
— |
Supported |
— |
— |
| QSFP-40G-SR4-S |
Supported |
— |
— |
— |
Supported |
— |
— |
| QSFP-40GE-LR4 |
Supported |
— |
— |
— |
— |
— |
— |
| QSFP-H40G-ACU10M |
— |
— |
— |
— |
Supported |
— |
— |
| QSFP-H40G-CU1M |
— |
— |
— |
— |
Supported |
— |
— |
| QSFP-H40G-CU2M |
— |
— |
— |
— |
Supported |
— |
— |
| QSFP-H40G-CU3M |
— |
— |
— |
— |
Supported |
— |
— |
| QSFP-H40G-CU4M |
— |
— |
— |
— |
Supported |
— |
— |
| QSFP-H40G-CU5M |
— |
— |
— |
— |
Supported |
— |
— |
| QSFP-H40G-CUO-5M |
— |
— |
— |
— |
Supported |
— |
— |
| QSFP-H40G-AOC1M |
— |
— |
— |
— |
Supported |
— |
— |
| QSFP-H40G-AOC2M |
— |
— |
— |
— |
Supported |
— |
— |
| QSFP-H40G-AOC3M |
— |
— |
— |
— |
Supported |
— |
— |
| QSFP-H40G-AOC5M |
— |
— |
— |
— |
Supported |
— |
— |
| QSFP-H40G-AOC7M |
— |
— |
— |
— |
Supported |
— |
— |
| QSFP-H40G-AOC10M |
— |
— |
— |
— |
Supported |
— |
— |
| QSFP-H40G-AOC15M |
— |
— |
— |
— |
Supported |
— |
— |
| QSFP-H40G-AOC20M |
— |
— |
— |
— |
Supported |
— |
— |
| QSFP-H40G-AOC25M |
— |
— |
— |
— |
Supported |
— |
— |
| QSFP-H40G-AOC30M |
— |
— |
— |
— |
Supported |
— |
— |
| SFP-10G-AOC10M |
Supported |
Supported |
— |
— |
— |
— |
Supported |
| SFP-10G-AOC1M |
Supported |
Supported |
— |
Supported |
Supported |
Supported |
Supported |
| SFP-10G-AOC2M |
Supported |
Supported |
— |
Supported |
Supported |
Supported |
Supported |
| SFP-10G-AOC3M |
Supported |
Supported |
— |
Supported |
Supported |
Supported |
Supported |
| SFP-10G-AOC5M |
Supported |
Supported |
— |
Supported |
Supported |
Supported |
Supported |
| SFP-10G-AOC7M |
Supported |
Supported |
— |
Supported |
Supported |
Supported |
Supported |
| SFP-10G-ER |
Supported |
Supported |
— |
Supported |
Supported |
Supported |
— |
| SFP-10G-LR |
Supported |
Supported |
Supported |
Supported |
Supported |
Supported |
Supported |
| SFP-10G-LR-S |
Supported |
Supported |
Supported |
— |
— |
— |
Supported |
| SFP-10G-LR-X |
Supported |
Supported |
Supported |
Supported |
Supported |
Supported |
— |
| SFP-10G-LRM |
Supported |
Supported |
Supported |
— |
— |
— |
— |
| SFP-10G-SR |
Supported |
Supported |
Supported |
Supported |
Supported |
Supported |
Supported |
| SFP-10G-SR-S |
Supported |
Supported |
Supported |
Supported |
Supported |
Supported |
Supported |
| SFP-10G-SR-I |
— |
— |
— |
Supported |
Supported |
Supported |
Supported |
| SFP-10G-SR-X |
Supported |
Supported |
Supported |
— |
— |
— |
— |
| SFP-10G-ZR |
|
|
— |
— |
— |
— |
— |
| SFP-10G-ZR-I |
— |
— |
— |
Supported |
Supported |
Supported |
— |
| SFP-10G-T-X |
— |
— |
— |
Supported |
Supported |
Supported |
— |
| SFP-25G-SR-S |
— |
— |
— |
Supported |
— |
Supported |
— |
| SFP-25G-ER-I |
— |
— |
— |
Supported |
— |
Supported |
— |
| SFP-10/25G-LR-I |
— |
— |
— |
Supported |
— |
Supported |
— |
| SFP-10/25G-LR-S |
— |
— |
— |
Supported |
— |
Supported |
— |
| SFP-10/25G-CSR-S |
— |
— |
— |
Supported |
— |
Supported |
— |
| SFP-10/25G-BXD-I |
— |
— |
— |
Supported |
— |
Supported |
Supported |
| SFP-10/25G-BXU-I |
— |
— |
— |
Supported |
— |
Supported |
Supported |
| SFP-H25G-CU1M |
— |
— |
— |
Supported |
— |
Supported |
— |
| SFP-H25G-CU5M |
— |
— |
— |
Supported |
— |
Supported |
— |
| SFP-25G-AOC1M |
— |
— |
— |
Supported |
— |
Supported |
— |
| SFP-25G-AOC2M |
— |
— |
— |
Supported |
— |
Supported |
— |
| SFP-25G-AOC3M |
— |
— |
— |
Supported |
— |
Supported |
— |
| SFP-25G-AOC5M |
— |
— |
— |
Supported |
— |
Supported |
— |
| SFP-25G-AOC7M |
— |
— |
— |
Supported |
— |
Supported |
— |
| SFP-25G-AOC10M |
— |
— |
— |
Supported |
— |
Supported |
— |
| SFP-H10GB-ACU10M |
Supported |
Supported |
Supported |
Supported |
Supported |
Supported |
Supported |
| SFP-H10GB-ACU7M |
Supported |
Supported |
Supported |
Supported |
Supported |
Supported |
Supported |
| SFP-H10GB- CU1.5M |
Supported |
Supported |
Supported |
— |
— |
— |
— |
| SFP-H10GB-CU1M |
Supported |
Supported |
Supported |
Supported |
Supported |
Supported |
— |
| SFP-H10GB-CU2.5M |
Supported |
Supported |
Supported |
— |
— |
— |
Supported |
| SFP-H10GB-CU2M |
Supported |
Supported |
Supported |
Supported |
Supported |
Supported |
— |
| SFP-H10GB-CU3M |
Supported |
Supported |
Supported |
Supported |
Supported |
Supported |
Supported |
| SFP-H10GB-CU5M |
Supported |
Supported |
Supported |
Supported |
Supported |
Supported |
Supported |
| SFP-H10GB-CU1-5M |
Supported |
Supported |
— |
Supported |
Supported |
Supported |
— |
| Finisar-LR (FTLX1471D3BCL) |
— |
— |
Supported |
Supported |
Supported |
Supported |
Supported |
| Finisar-SR (FTLX8574D3BC) |
— |
— |
— |
Supported |
Supported |
Supported |
Supported |
The Cisco Catalyst 9800 Series Wireless Controller supports a wide range of optics. The list of supported optics is updated on a regular basis. See the tables at the following location for the latest transceiver module compatibility information:
Network protocols and port matrix
Table 14. Cisco Catalyst 9800 series wireless controller - network protocols and port matrix
| Source |
Destination |
Protocol |
Destination port |
Source port |
Description |
| Any |
Cisco Catalyst 9800 Series Wireless Controller |
TCP |
22 |
Any |
SSH |
| Any |
Cisco Catalyst 9800 Series Wireless Controller |
TCP |
23 |
Any |
Telnet |
| Any |
Cisco Catalyst 9800 Series Wireless Controller |
TCP |
80 |
Any |
HTTP |
| Any |
Cisco Catalyst 9800 Series Wireless Controller |
TCP |
443 |
Any |
HTTPS |
| Any |
Cisco Catalyst 9800 Series Wireless Controller |
UDP |
161 |
Any |
SNMP agent |
| Any |
Any |
UDP |
5353 |
5353 |
mDNS |
| Any |
Cisco Catalyst 9800 Series Wireless Controller |
UDP |
69 |
69 |
TFTP |
| Any |
DNS Server |
UDP |
53 |
Any |
DNS |
| Any |
Cisco Catalyst 9800 Series Wireless Controller |
TCP |
830 |
Any |
NetConf |
| Any |
Cisco Catalyst 9800 Series Wireless Controller |
TCP |
443 |
Any |
REST API |
| Any |
WLC Protocol |
UDP |
1700 |
Any |
Receive CoA packets |
| AP |
Cisco Catalyst 9800 Series Wireless Controller |
UDP |
5246 |
Any |
CAPWAP Control |
| AP |
Cisco Catalyst 9800 Series Wireless Controller |
UDP |
5247 |
Any |
CAPWAP Data |
| AP |
Cisco Catalyst 9800 Series Wireless Controller |
UDP |
5248 |
Any |
CAPWAP MCAST |
| AP |
Cisco Catalyst Center |
TCP |
32626 |
Any |
Intelligent capture and RF telemetry |
| AP |
AP |
UDP |
16670 |
Any |
Client Policies (AP-AP) |
| Cisco Catalyst 9800 Series Wireless Controller |
Cisco Catalyst 9800 Series Wireless Controller |
UDP |
16666 |
16666 |
Mobility Control |
| Cisco Catalyst 9800 Series Wireless Controller |
SNMP |
UDP |
162 |
Any |
SNAMP Trap |
| Cisco Catalyst 9800 Series Wireless Controller |
RADIUS |
UDP |
1812/1645 |
Any |
RADIUS Auth |
| Cisco Catalyst 9800 Series Wireless Controller |
RADIUS |
UDP |
1813/1646 |
Any |
RADIUS ACCT |
| Cisco Catalyst 9800 Series Wireless Controller |
TACACS+ |
TCP |
49 |
Any |
TACACS+ |
| Cisco Catalyst 9800 Series Wireless Controller |
Cisco Catalyst 9800 Series Wireless Controller |
UDP |
16667 |
16667 |
Mobility |
| Cisco Catalyst 9800 Series Wireless Controller |
NTP Server |
UDP |
123 |
Any |
NTP |
| Cisco Catalyst 9800 Series Wireless Controller |
Syslog Server |
UDP |
514 |
Any |
SYSLOG |
| AP |
Cisco Catalyst 9800 Series Wireless Controller |
HTTPS |
8443 |
Any |
Out of Band AP Image Download Cisco CleanAir Spectral Capture
|
| Cisco Catalyst 9800 Series Wireless Controller |
NetFlow Server |
UDP |
9996 |
Any |
NetFlow |
| Cisco Catalyst 9800 Series Wireless Controller |
Cisco Connected Mobile Experiences (CMX) |
UDP |
16113 |
Any |
NMSP |
| Cisco Catalyst Center |
Cisco Catalyst 9800 Series Wireless Controller |
TCP |
32222 |
Any |
Device Discovery |
| Cisco Catalyst Center |
Cisco Catalyst 9800 Series Wireless Controller |
TCP |
25103 |
Any |
Telemetry Subscriptions |
The following Cisco APs are supported in this release:
Table 15. Supported APs
| AP type |
AP names |
| Indoor Access Points
|
● Cisco Catalyst 9105AX (I/W) Access Points
● Cisco Catalyst 9115AX (I/E) Access Points
● Cisco Catalyst 9117AX (I) Access Points
● Cisco Catalyst 9120AX (I/E/P) Access Points
● Cisco Catalyst 9130AX (I/E) Access Points
● Cisco Catalyst 9136AX Access Points
● Cisco Catalyst 9162 (I) Series Access Points
● Cisco Catalyst 9164 (I) Series Access Points
● Cisco Catalyst 9166 (I/D1) Series Access Points
● Cisco Wireless 9171 (I) Series Wi-Fi 7 Access Points
● Cisco Wireless 9172 (I) Series Wi-Fi 7 Access Points
● Cisco Wireless 9172 (H) Series Wi-Fi 7 Access Points
● Cisco Wireless 9174 (I/E) Series Wi-Fi 7 Access Points
● Cisco Wireless 9176 (I/D1) Series Wi-Fi 7 Access Points
● Cisco Wireless 9178 (I) Series Wi-Fi 7 Access Points
● Cisco Wireless 9179 (F) Series Wi-Fi 7 Access Points
● Cisco Aironet 1815 (I/W/M/T), 1830 (I), 1840 (I), and 1852 (I/E) Access Points
● Cisco Aironet 1800i Access Point
● Cisco Aironet 2800 (I/E) Series Access Points
● Cisco Aironet 3800 (I/E/P) Series Access Points
● Cisco Aironet 4800 (I) Series Access Points
|
| Outdoor Access Points
|
● Cisco Aironet 1540 (I/D) Series Access Points
● Cisco Aironet 1560 (I/D/E) Series Access Points
● Cisco Catalyst Industrial Wireless 6300 Heavy Duty Series Access Point
● Cisco 6300 Series Embedded Services Access Point
● Cisco Catalyst 9124AX (I/D/E) Access Points
● Cisco Catalyst 9163 (E) Series Access Points
● Cisco Catalyst Industrial Wireless 9167 (I/E) Heavy Duty Access Points
● Cisco Catalyst Industrial Wireless 9165E Rugged Access Point
● Cisco Catalyst Industrial Wireless 9165D Heavy Duty Access Point
|
| Integrated Access Points |
Integrated Access Point on Cisco 1100 ISR (ISR-AP1100AC-x, ISR-AP1101AC-x, and ISR-AP1101AX-x) |
| Network Sensor |
Cisco Aironet 1800s Active Sensor |
| Pluggable Modules |
Cisco Wi-Fi Interface Module (WIM) - WP-WIFI6-x
|
Supported AP channels and maximum power settings
Supported access point channels and maximum power settings on Cisco APs are compliant with the regulatory specifications of channels, maximum power levels, and antenna gains of every country in which the access points are sold. For more information about the supported access point transmission values in Cisco IOS XE software releases, see the Detailed Channels and Maximum Power Settings document at https://www.cisco.com/c/en/us/support/wireless/catalyst-9100ax-access-points/products-technical-reference-list.html.
For information about Cisco Wireless software releases that support specific Cisco AP modules, see Cisco Access Points Supported in Cisco Wireless Controller Platform Software Releases.
Cisco Wireless Controller:
For more information about the Cisco wireless controller, lightweight APs, and mesh APs, see these documents:
Cisco Wireless Solutions Software Compatibility Matrix
Cisco Catalyst 9800 Series Wireless Controller Software Configuration Guide
Cisco Catalyst 9800 Series Wireless Controller Command Reference
Cisco Catalyst 9800 Series Configuration Best Practices
In-Service Software Upgrade Matrix
Upgrading Field Programmable Hardware Devices for Cisco Catalyst 9800 Series Wireless Controllers
The installation guide for your controller is available at:
All Cisco Wireless Controller software-related documentation
Cisco Catalyst 9800 Series Wireless Controller Data Sheets:
Wireless Product Comparison:
Compare specifications of Cisco wireless APs and controllers
Wireless LAN Compliance Lookup
Cisco AireOS to Cisco Catalyst 9800 Wireless Controller Feature Comparison Matrix
Cisco Access Points–Statement of Volatility:
The STATEMENT OF VOLATILITY is an engineering document that provides information about the device, the location of its memory components, and the methods for clearing device memory. Refer to the data security policies and practices of your organization and take the necessary steps required to protect your devices or network environment.
The Cisco Aironet and Catalyst AP Statement of Volatility (SoV) documents are available on the Cisco Trust Portal.
You can search by the AP model to view the SoV document.
Cisco Prime Infrastructure:
Cisco Prime Infrastructure Documentation
Cisco Spaces:
Cisco Catalyst Center:
Cisco Catalyst Center Documentation
Product Analytics
Cisco Enterprise Networking Product Analytics Frequently Asked Questions
Communications, services, and additional information:
● To receive timely, relevant information from Cisco, sign up at Cisco Profile Manager.
● To get the business impact you’re looking for with the technologies that matter, visit Cisco Services.
● To submit a service request, visit Cisco Support.
● To discover and browse secure, validated enterprise-class apps, products, solutions, and services, visit Cisco DevNet.
● To obtain general networking, training, and certification titles, visit Cisco Press.
● To find warranty information for a specific product or product family, access Cisco Warranty Finder.
Cisco Bug Search Tool (BST) is a gateway to the Cisco bug-tracking system, which maintains a comprehensive list of defects and vulnerabilities in Cisco products and software. The BST provides you with detailed defect information about your products and software.
To provide feedback about Cisco technical documentation, use the feedback form available on the right pane of every online document.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
© 2025 Cisco Systems, Inc. All rights reserved.