To configure global settings for all access points on your network, you can perform the following tasks on the
page.Cisco access points are shipped from the factory with “Cisco” as the default enable password. This password allows users to log in to the unprivileged mode and execute show and debug commands, which poses a security threat. The default enable password must be changed to prevent unauthorized access and to enable users to execute configuration commands from the access point’s console port.
You can configure 8021.1X authentication between lightweight access points and the switch. The access point acts as an 802.1X supplicant and is authenticated by the switch using EAP-FAST with anonymous PAC provisioning. You can set global authentication settings that all access points inherit as they join the controller, which includes all access points that are currently joined to the controller and any that join in the future. If desired, you can override the global authentication settings and assign unique authentication settings for a specific access point.
You can configure primary and secondary backup controllers for all access points (which are used if primary, secondary, or tertiary controllers are not responsive) in this order: primary, secondary, tertiary, primary backup, and secondary backup. In addition, you can configure various timers, including heartbeat timers and discovery request timers. To reduce the controller failure detection time, you can configure the fast heartbeat interval (between the controller and the access point) with a smaller timeout value. When the fast heartbeat timer expires (at every heartbeat interval), the access point determines if any data packets have been received from the controller within the last interval. If no packets have been received, the access point sends a fast echo request to the controller.
When a device goes out of service, the access point associated with it falls back to the next available controller. Before associating itself to a new device, the access point first tries to establish a connection with the existing device that it is associated with. It sends a request (known as a retransmission) at regular intervals to the device and for a specified number of times (retry count). If the access point does not get an acknowledgment from the device, it tries to associate itself to the next available device.
You can configure the retransmission intervals and retry counts both at a global as well as a specific access point level.
Note: Ensure that the Reset Threshold value is always less than the Trigger Threshold value.
If your access points are Bluetooth Low Energy (BLE) enabled, they can transmit beacon messages or small packets of data or attributes transmitted over a low energy link. These BLE beacons are frequently used for health monitoring, proximity detection, asset tracking, and in-store navigation.
© 2018 Cisco Systems, Inc. All rights reserved.