Enterprise Mobility 8-5 Deployment Guide
Enterprise Mobility 8-5 Deployment Guide
Enterprise Mobility 8-5 Deployment Guide
5 Design Guide
Last Updated: 8/19/18
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH
IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY
THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California,
Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981,
Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE
SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DIS-
CLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MER-
CHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A
COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL,
OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO
DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this
URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1721R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command
display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in
illustrative content is unintentional and coincidental.
CAPWAP 2-1
Split MAC Architecture 2-3
Encryption 2-5
Layer 3 Tunnels 2-6
CAPWAP Modes 2-9
WLC Discovery & Selection 2-11
AP Priming 2-13
Core Components 2-15
Cisco Wireless LAN Controllers 2-16
Cisco 2504 Wireless Controller 2-18
Cisco 3504 Wireless Controller 2-19
Cisco 5508 Wireless Controller 2-20
Cisco 5520 Wireless Controller 2-21
Cisco Flex 7500 Wireless Controller 2-22
Cisco 8510 Wireless Controllers 2-23
Cisco 8540 Wireless Controller 2-24
Cisco Wireless Services Module 2 2-25
Virtual Wireless LAN Controller 2-26
Cisco Aironet Access Points 2-27
Indoor 802.11n Access Points 2-27
Indoor 802.11ac Access Points 2-34
Cisco Prime Infrastructure 2-39
Licensing Options 2-40
Scaling 2-41
High Availability 2-43
AP / Client Failover 2-43
RF Basics 3-1
Regulatory Domains 3-3
Operating Frequencies 3-4
2.4 GHz - 802.11b/g/n 3-4
5 GHz - 802.11a/n/ac 3-7
Understanding the IEEE 802.11 Standards 3-12
Deployment Considerations 3-13
Planning for RF Deployment 3-19
Different Deployment Types of WLAN Coverage 3-19
Coverage Requirements 3-19
High Density Client Coverage Requirements 3-20
Roaming and Voice Coverage Requirements 3-21
Location-Aware Coverage Requirements 3-23
Flexible Radio Architecture (FRA) Radio’s and Coverage Requirements 3-24
Power Level and Antenna Choice 3-24
Omni-Directional Antennas 3-26
Directional Antenna’s 3-27
Newer antenna designs 3-29
Hyperlocation Feature Introduction 3-31
Overview of Hyperlocation 3-31
RF Deployment Best Practices 3-32
802.1X 4-3
Identity PSK 4-3
Authentication and Encryption 4-3
Identity PSK for non-802.1X authentication 4-4
Extensible Authentication Protocol 4-4
Authentication 4-5
Supplicants 4-6
Authenticator 4-7
Authentication Server 4-8
Encryption 4-9
TKIP Encryption 4-9
Removal of TKIP from Wi-Fi® Devices 4-10
AES Encryption 4-12
Four-Way Handshake 4-12
Proactive Key Caching (PKC) and CCKM 4-14
Rogue AP 4-57
Air/RF Detection 4-58
Location 4-59
Wire Detection 4-59
Switch Port Tracing 4-60
Rogue AP Containment 4-60
Management Frame Protection 4-60
Cisco TrustSec SXP 4-62
Restrictions for Cisco TrustSec SXP 4-63
Introduction 6-1
Architecture 8-10
Control and Provisioning of Wireless Access Points 8-10
CAPWAP Discovery on a Mesh Network 8-10
Dynamic MTU Detection 8-11
Air Time Fairness in Mesh Deployments Rel 8.4 8-11
Pre-requisite and Supported Features in 8.4 release 8-11
Cisco Air Time Fairness (ATF) Use Cases 8-11
ATF Functionality and Capabilities 8-12
Adaptive Wireless Path Protocol 8-13
Mesh Neighbors, Parents, and Children 8-15
Mesh AP Back-Ground Scan rel 8.3 8-17
Mesh Deployment Modes 8-19
Wireless Backhaul 8-19
Universal Access 8-19
Point-to-Point Wireless Bridging 8-20
Point-to-Multipoint Wireless Bridging 8-21
Wireless Backhaul Data Rate 8-22
ClientLink Technology 8-22
Controller Planning 8-24
Wireless Mesh Network Coverage Considerations 8-24
Cell Planning and Distance 8-25
For the Cisco 1520 Series Access Points 8-25
Collocating Mesh Access Points 8-25
Collocating AP1500s on Adjacent Channels 8-25
Collocating AP1500s on Alternate Adjacent Channels 8-25
CleanAir 8-26
CleanAir Advisor 8-26
Wireless Mesh Mobility Groups 8-26
Multiple Controllers 8-26
Increasing Mesh Availability 8-27
Multiple RAPs 8-29
Indoor Mesh Interoperability with Outdoor Mesh 8-30
Connecting the Cisco 1500 Series Mesh APs to the Network 8-30
Introduction 10-1
Scope 10-2
Creating Employee WLAN with WPA2 Enterprise/ External RADIUS and MAC
Filtering 13-21
Creating Guest WLAN with Captive Portal on CMX Connect 13-21
Creating Wireless Networks 13-23
This chapter summarizes the benefits and characteristics of the Cisco Unified Wireless Network for the
enterprise. The Cisco Unified Wireless Network solution offers secure, scalable, cost-effective wireless
LANs for business critical mobility. The Cisco Unified Wireless Network is the industry’s only unified
wired and wireless solution to cost-effectively address the wireless LAN (WLAN) security, deployment,
management, and control issues facing enterprises. This powerful indoor and outdoor solution combines
the best elements of wired and wireless networking to deliver high performance, manageable, and secure
WLANs with a low total cost of ownership.
WLAN Introduction
The mobile user requires the same accessibility, security, quality-of-service (QoS), and high availability
currently enjoyed by wired users. Whether you are at work, at home, on the road, locally or
internationally, there is a need to connect. The technological challenges are apparent, but to this end,
mobility plays a role for everyone. Companies are deriving business value from mobile and wireless
solutions. What was once a vertical market technology is now mainstream, and is an essential tool in
getting access to voice, real-time information, and critical applications such as e-mail and calendar,
enterprise databases, supply chain management, sales force automation, and customer relationship
management.
• Easier adds, moves, and changes and lower support and maintenance costs—Temporary networks
become much easier to set up, easing migration issues and costly last-minute fixes.
• Improved efficiency—Studies show WLAN users are connected to the network 15 percent longer per
day than hard-wired users.
• Productivity gains—Promotes easier access to network connectivity, resulting in better use of
business productivity tools. Productivity studies show a 22 percent increase for WLAN users.
• Easier to collaborate—Facilitates access to collaboration tools from any location, such as meeting
rooms; files can be shared on the spot and requests for information handled immediately.
• More efficient use of office space—Allows greater flexibility for accommodating groups, such as
large team meetings.
• Reduced errors—Data can be directly entered into systems as it is being collected, rather than when
network access is available.
• Improved efficiency, performance, and security for enterprise partners and guests—Promoted by
implementing guest access networks.
• Improved business resilience—Increased mobility of the workforce allows rapid redeployment to
other locations with WLANs.
• Easily manage central or remote APs—Network managers must be able to easily deploy, operate,
and manage hundreds to thousands of APs within the WLAN campus deployments and branch
offices or retail, manufacturing, and health care locations. The desired result is one framework that
provides medium-sized to large organizations the same level of security, scalability, reliability, ease
of deployment, and management that they have come to expect from their wired LANs.
• Enhanced Security Services—WLAN Intrusion Prevention System (IPS) and Intrusion Detection
System (IDS) control to contain wireless threats, enforce security policy compliance, and safeguard
information.
• Voice Services—Brings the mobility and flexibility of wireless networking to voice communications
via the Cisco Unified Wired and Wireless network and the Cisco Compatible Extensions
voice-enabled client devices.
• Location Services — Simultaneous tracking of hundreds to thousands of Wi-Fi and active RFID
devices from directly within the WLAN infrastructure for critical applications such as high-value
asset tracking, IT management, location-based security, and business policy enforcement.
• Guest Access— Provides customers, vendors, and partners with easy access to a wired and wireless
LANs, helps increase productivity, facilitates real-time collaboration, keeps the company
competitive, and maintains full WLAN security.
WLANs in the enterprise have emerged as one of the most effective means for connecting to a larger
corporate network or to the internet. Figure 1-1 shows the elements of the Cisco Unified Wireless
Network.
The interconnected elements that work together to deliver a unified enterprise-class wireless solution
include:
• Client devices
• Access points (APs)
• Network unification through controllers
• World-class network management
• Mobility services
Beginning with a base of client devices, each element adds capabilities as the network needs evolve and
grow, interconnecting with the elements above and below it to create a comprehensive, secure WLAN
solution.
This chapter discusses the key design and operational considerations associated with the deployment of
Cisco Unified Wireless Networks enterprise.
This chapter discusses:
• CAPWAP
• Core Components
• Roaming
• Broadcast and Multicast on the WLC
• Design Considerations
• Operation and Maintenance
Much of the material in this chapter is explained in more detail in later chapters of this design guide. For
more information on Cisco Unified Wireless Technology, see the Cisco White Paper on deployment
strategies related to the Cisco 5500 Series Wireless LAN Controller at:
http://www.cisco.com/en/US/products/ps10315/prod_white_papers_list.html
CAPWAP
The Internet Engineering Task Force (IETF) standard Control and Provisioning of Wireless Access
Points Protocol (CAPWAP) is the underlying protocol used in the Cisco Centralized WLAN
Architecture (functional architecture of the Cisco Unified Wireless Network solution). CAPWAP
provides the configuration and management of APs and WLANs in addition to encapsulation and
forwarding of WLAN client traffic between an AP and a WLAN controller (WLC).
CAPWAP is based on the Lightweight Access Point Protocol (LWAPP) but adds additional security with
Datagram Transport Layer Security (DTLS). CAPWAP uses the User Datagram Protocol (UDP) and can
operate either over Internet Protocol version 4 (IPv4) or Internet Protocol version 6 (IPv6). Table 2-1
lists the protocol and ports implemented for each CAPWAP version:
IPv6 mandates a complete payload checksum for User Datagram Protocol (UDP) which impacts the
performance of the AP and the WLC. To maximize performance for IPv6 deployments, the AP and WLC
implements UDP Lite that only performs a checksum on the header rather than the full payload.
Note In the Releases 5.2 and later, LWAPP has been depreciated and has been replaced by CAPWAP. Older LWAPP
APs joining a WLC running on 5.2 or later will be automatically upgraded to support CAPWAP.
Figure 2-1 shows a high-level diagram of a basic centralized WLAN deployment, where CAPWAP APs
connect to a WLC via the CAPWAP protocol. In Releases 8.0 and later, CAPWAP can operate either in
an IPv4 or IPv6 transport modes. By default, IPv4 is preferred but is configurable (discussed later in this
section).
Note Although CAPWAP is made up of a number of functional components, only those that influence the
design and operation of a centralized WLAN network are discussed in this design guide.
A generic 802.11 AP, at the simplest level as shown in Figure 2-3, is nothing more than an 802.11
MAC-layer radio that bridges WLAN clients to a wired-network, based on association to a Basic Service
Set Identifier (BSSID). The 802.11 standard extends the single AP concept (above) to allow multiple
APs to provide an Extended Service Set (ESS), as shown in Figure 2-4, where multiple APs use the same
ESS Identifier (ESSID, commonly referred to as an SSID) to allow a WLAN client to connect to a
common network through more than one AP.
The CAPWAP split MAC concept in Figure 2-5 does all of the functions normally performed by
individual APs and distributes them between two functional components:
• CAPWAP AP
• WLC
The two are linked across a network by the CAPWAP protocol and together provide equivalent
radio/bridging services in a manner that is simpler to deploy and manage than individual APs.
Note Although split MAC facilitates Layer 2 connectivity between the WLAN clients and the wired interface
of the WLC, this does not mean that the CAPWAP tunnel will pass all traffic. The WLC forwards only
IP EtherType frames, and its default behavior is to not forward broadcast and multicast traffic. This is
important to keep in mind when considering multicast and broadcast requirements in a WLAN
deployment.
The simple, timing-dependent operations are generally managed locally on the CAPWAP AP, while
more complex, less time-dependent operations are managed on the WLC.
Encryption
Releases 6.0 and later provide support for encrypting CAPWAP control and data packets exchanged
between an AP and a WLC using DTLS. DTLS is an IETF protocol based on TLS. All Cisco access
points and controllers are shipped with a Manufacturing Installed Certificate (MIC) which are used by
an AP and WLC by default for mutual authentication and encryption key generation. Cisco also supports
Locally Significant Certificates (LSC) to provide additional security for enterprises who wish to issue
certificates from their own Certificate Authority (CA).
Note By default, DTLS uses a RSA 128-bit AES / SHA-1 cipher suite which is globally defined using the
config ap dtls-cipher-suite command. Alternative ciphers include 256-bit AES with SHA-1 or
SHA-256.
DTLS is enabled by default to secure the CAPWAP control channel but is disabled by default for the data
channel. No DTLS license is required to secure the control channel. All CAPWAP management and
control traffic exchanged between an AP and WLC is encrypted and secured by default to provide control
plane privacy and prevent Man-In-the-Middle (MIM) attacks.
CAPWAP data encryption is optional and is enabled per AP. Data encryption requires a DTLS license to
be installed on the WLC prior to being enabled on an AP. When enabled, all WLAN client traffic is
encrypted at the AP before being forwarded to the WLC and vice versa. DTLS data encryption is
automatically enabled for OfficeExtend APs but is disabled by default for all other APs. Most APs are
deployed in a secure network where data encryption is not necessary. In contrast, traffic exchanged
between an OfficeExtend AP and WLC is forwarded over an unsecured public network, where data
encryption is important.
Note Please consult your Local Government regulations to ensure that DTLS encryption is permitted. For
example, DTLS data encryption is currently prohibited in Russia.
Note Enabling DTLS data encryption will impact the performance of both the APs and WLCs. Therefore DTLS
data encryption should only be enabled on APs deployed over an unsecured network.
Layer 3 Tunnels
Unlike LWAPP which operated in either a Layer 2 or Layer 3 mode, CAPWAP only operates in Layer 3
and requires IP addresses to be present on both the AP and WLC. CAPWAP uses UDP for IPv4
deployments and UDP or UDP Lite (default) for IPv6 deployments to facilitate communication between
an AP and WLC over an intermediate network. CAPWAP is able to perform fragmentation and
reassembly of tunnel packets allowing WLAN client traffic to make use of a full 1500 byte MTU without
having to adjust for any tunnel overhead.
Note In order to optimize the fragmentation and reassembly process, the number of fragments that the WLC or
AP expect to receive is limited. The ideally supported MTU size for deploying the Cisco Unified Wireless
Network is 1500 bytes, but the solution operates successfully over networks where the MTU is as small as
500 bytes.
The figures below are of CAPWAP packet captures used to illustrate CAPWAP operation over an IPv4
network. The sample decodes were captured using a Wireshark packet analyzer.
Figure 2-6 shows a partial decode of a CAPWAP control packet. This packet originates from the WLC
using UDP destination port 5246 (as do all CAPWAP control packets from the WLC). Control Type 12
represents a configuration command used to pass AP configuration information to the CAPWAP AP by
the WLC. CAPWAP control packet payloads are AES encrypted by default using DTLS when an AP
joins the WLC.
Figure 2-7shows a partial decode of a CAPWAP packet containing an 802.11 probe request. This packet
originates from the CAPWAP AP to the WLC using UDP destination port 5246 (as do all CAPWAP
encapsulated 802.11 frames). In this example, Received Signal Strength Indication (RSSI) and
Signal-to-Noise Ratio (SNR) values are also included in the CAPWAP packet to provide RF information
to the WLC. Note that DTLS data encryption is not enabled in this example.
Figure 2-8 shows another CAPWAP-encapsulated 802.11 frame, but in this case it is an 802.11 data
frame, similar to that shown in Figure 2-7. It contains a complete 802.11 frame, as well as RSSI and SNR
information for the WLC. This figure is shown to illustrate that an 802.11 data frame is treated the same
by CAPWAP as the other 802.11 frames. Figure 2-8 highlights that fragmentation is supported for
CAPWAP packets to accommodate the minimum MTU size between the AP and the WLC.
Note In the Wireshark decode, the frame control decode bytes have been swapped; this is accomplished during
the Wireshark protocol analysis of the CAPWAP packet to take into account that some APs swap these
bytes. DTLS data encryption is not enabled in this example.
CAPWAP Modes
In the Releases 8.0 and later, Cisco Unified Wireless Network (CUWN) supports access points and
controllers using IPv4 and/or IPv6 addressing. Network administrators can deploy APs and WLCs over
a pure IPv4 or IPv6 network as well as dual-stack network to facilitate the transition from an IPv4 to
IPv6. As part of the 8.0 Release, the CAPWAP protocol and discovery mechanisms have been enhanced
to support IPv6. CAPWAP can now operate in IPv4 (CAPWAPv4) or IPv6 (CAPWAPv6) modes to suit
the specific network environment.
To support both IP protocol versions, network administrators can configure a preferred CAPWAP mode
(CAPWAPv4 or CAPWAPv6) through which an AP joins the WLC. The prefer-mode can be defined at
two levels:
• Global Configuration (Figure 2-9)
• AP Group Specific (Figure 2-10
In the CAPWAP mode, the AP selects is dependent on various factors including the IP address versions
implemented on both the AP and WLC, the primary / secondary / tertiary WLC addresses defined on the
AP and the prefer-mode pushed to the AP.
The following outlines the CAPWAP operating mode configurations that are available:
• Default—The Global prefer-mode is set to IPv4 and the default AP Group prefer-mode is set to
un-configured. By default an AP will prefer IPv4 unless the AP has been primes with a primary,
secondary or tertiary WLC IPv6 address.
• AP-Group Specific—The prefer-mode (IPv4 or IPv6) is pushed to an AP only when the prefer-mode
of an AP-Group is configured and the AP belongs to that group. If no prefer-mode is defined, the
Global prefer-mode is inherited.
• Global—The prefer-mode is pushed to the default AP Group and all other AP-Groups on which the
prefer-mode is not configured. Note that the prefer-mode cannot be manually defined on for the
default AP Group.
• Join Failure—If an AP with a configured prefer-mode attempts to join the controller and fails, it will
fall back to the other mode and attempt to join the same controller. When both modes fail, AP will
move to the next discovery response.
• Static Configuration—Static IP configuration will take precedence over the Global or AP Group
Specific prefer-mode. For example, if the Global prefer-mode is set to IPv4 and the AP has a static
Primary Controller IPv6 address defined, the AP will join the WLC using the CAPWAPv6 mode.
AP Group Specific prefer-mode provides flexibility as it allows the administrator to specifically
influence the CAPWAP transport mode utilized by different groups of APs. This allows APs deployed
across different buildings or sites to operate using different CAPWAP modes. For example, APs within
a campus that have already migrated to IPv6 can join a WLC using CAPWAPv6 while APs at remote
sites that are yet to transition to IPv6 can join a WLC using CAPWAPv4. An individual WLC with a
dual-stack configuration can support CAPWAP APs operating in both CAPWAPv4 and CAPWAPv6
modes.
Note An AP running an older image that is not IPv6 capable can join an IPv6 capable WLC only if the WLC
has an IPv4 address assigned. The same is true for an IPv6 capable AP joining an IPv4 capable WLC
(assuming the AP has an IPv4 address assigned). For IPv6 deployments, it is recommended that at least
one discoverable WLC be configured to support IPv4.
For a full overview of the IPv6 enhancements introduced in 8.0, see the Cisco Wireless LAN Controller
IPv6 Deployment Guide.
Step 1 Broadcast Discovery—The AP sends a CAPWAP discovery message to the IPv4 broadcast address
(255.255.255.255). Any WLC connected to the same VLAN will see the discovery message and will in
turn reply with a unicast IPv4 discovery response.
Step 2 Multicast Discovery—The AP sends a CAPWAP discovery message to the all controllers multicast
group address (FF01::18C). Any WLC connected to the same VLAN will see the discovery message and
will in turn reply with IPv6 discovery response.
Step 3 Locally Stored Controller IPv4 or IPv6 Address Discovery—If the AP was previously associated to a
WLC, the IPv4 or IPv6 addresses of the primary, secondary, and tertiary controllers are stored in the APs
non-volatile memory (NVRAM). This process of storing controller IPv4 or IPv6 addresses on an AP for
later deployment is called priming the access point.
Step 4 DHCP Discovery—DHCPv4 and/or DHCPv6 servers are configured to advertise WLC IP addresses to
APs using vendor-specific options:
– DHCPv4 Discovery using Option 43—DHCPv4 servers use option 43 to provide one or more
WLC management IPv4 addresses to the AP. Option 43 values are supplied to an AP in the
DHCPv4 offer and acknowledgment packets.
– DHCPv6 Discovery using Option 52—DHCPv6 servers use option 52 to provide one or more
WLC management IPv6 addresses to the AP. Option 52 values are supplied to an AP in the
DHCPv6 advertise and reply packets.
Step 5 DNS Discovery—The AP sends a DNS query to the DNSv4 and/or DNSv6 servers to attempt to resolve
cisco-capwap-controller.localdomain (where localdomain is the AP domain name provided by DHCP):
– DNSv4 Discovery—Address records are defined on the name servers for the
cisco-capwap-controller hostname for each WLC managed IPv4 address to be supplied to the
AP. When queried, the name server will respond with a list of IPv4 addresses for each A record
that was defined.
– DNSv6 Discovery—Address records are defined on the name server for the
cisco-capwap-controller hostname for each WLC managed IPv6 address to be supplied to the
AP. When queried, the name server will respond with a list of IPv6 addresses for each AAAA
record that was defined.
Up to three address records can be defined on the DNSv4 or DNSv6 name servers to be supplied to an
AP. Each record corresponds to the primary, secondary and tertiary WLC IPv4 or IPv6 addresses.
Step 6 If after steps 1 – 5 no CAPWAP discovery response is received, the AP resets and restarts the discovery
process.
Once the AP selects a WLC, the AP chooses to join through CAPWAPv4 or CAPWAPv6, depending on
the CAPWAP prefer-mode pushed to the AP.
AP Priming
For most deployments, DHCP or DNS discovery is used to provide one or more seed WLC addresses. A
subsequent WLC discovery response provides the AP with a full list of WLC mobility group members.
An AP is normally configured with a list of one to three WLC management IP addresses (Primary,
Secondary and Tertiary) that represent the preferred WLCs.
If the preferred WLCs become unavailable or are over-subscribed, the AP chooses another WLC from
the list of WLCs learned in the CAPWAP discover responsei.e., the least-loaded WLC.
Note When priming an AP, the Primary Controller, Secondary Controller and Tertiary Controller management
addresses can either be IPv4 or IPv6. It does not matter as long as the defined address is reachable by
the AP. However, it is not possible to define both IPv4 and IPv6 addresses for a single entry. Each entry
can contain only one IPv4 or IPv6 address.
Core Components
The Cisco Unified Wireless Network (CUWN) is designed to provide a high performance and scalable
802.11ac wireless services for enterprises and service providers. A Cisco wireless solution simplifies the
deployment and management of large-scale wireless LANs in centralized or distributed deployments
while providing a best-in-class security, user experience and services.
The Cisco Unified Wireless Network consists of:
• Cisco Wireless LAN Controllers (WLCs)
• Cisco Aironet Access Points (APs)
• Cisco Prime Infrastructure (PI)
• Cisco Mobility Services Engine (MSE)
This section describes available product options for the WLCs, APs and PI. For additional information,
see the Cisco Mobility Services Engine.
Note For convenience and consistency, this document refers to all Cisco Wireless LAN Controllers as WLCs,
Aironet Access Points as APs and Cisco Prime Infrastructure as PI.
Cisco Flex
Cisco 2504 Cisco 5508 Cisco 5520 7510 Cisco 8510 Cisco 8540 Wireless Virtual
Wireless Wireless Wireless Wireless Wireless Wireless Services Wireless
Controller Controller Controller Controller Controller Controller Module 2 Controller
Form Factor 1U 1U 1U 1U 1U 2U - Software
Appliance Appliance Appliance Appliance Appliance Appliance
Platform N/A N/A N/A N/A N/A N/A - N/A
Integration
Scalability 75 x Access 500 x 1500 x 6000 x 6000 x 6000 x - 200 (small)
Points Access Access Access Access Access /3000(large)
Points Points Points Points Points Access Points
1,000 x
Clients 7,000 x 20,000 x 64,000 x 64,000 x 64,000 x 6,000 (small)
Clients Clients Clients Clients Clients Clients/32,000
1 Gbps
(large) x
Throughput 8 Gbps 20 Gbps 2000 x 10 Gbps 40 Gbps
Clients
Throughput Throughput FlexConnect Throughput Throughput
Groups 200 (small) /
3000 (large) x
FlexConne ct
Groups
Base AP 0.5, 15, 25 0, 12, 25, 0 and 50 0, 300, 500, 0, 300, 500, 0 and 1000 - 5 APs
Licenses and 50 APs 50, 100 and APs 1000, 2000, 1000, 2000, APs
250 AP 3000 and 3000 and
Increments 6000 APs 6000 APs
(CISL
Based)
AP Adder 1.5 and 25 5, 25, 50, 1 AP 100, 200, 100, 200, 1 AP - 1,5 and 25 AP
Licenses AP 100 and 250 Increment 500 and 500 and Increments Increments
Increments AP (Right to 1000 AP 1000 AP (Right to (Right to Use)
(CISL Increments Use) Increments Increments Use)
Based) (CISL (Right to (Right to
Based) Use) Use)
High N+1 N+1 SSO N+1 SSO N+1 SSO N+1 SSO N+1 SSO - N+1
Availability
Cisco Flex
Cisco 2504 Cisco 5508 Cisco 5520 7510 Cisco 8510 Cisco 8540 Wireless Virtual
Wireless Wireless Wireless Wireless Wireless Wireless Services Wireless
Controller Controller Controller Controller Controller Controller Module 2 Controller
Uplink 4 x1G 8 x 1G 2x1G/10G 1x10G 1x10G 4x1G/10G - 1 X virtual
Interfaces Ethernet Ethernet Ethernet Ethernet Ethernet Ethernet
Ports (RJ45) Ports (SFP) Ports Ports (SFP+) Ports Ports
(SFP/SFP+) (SFP+) (SFP/SFP+)
Power External AC AC AC AC/DC AC/DC AC/DC AC/DC Host
Power (Redundant (Redundant (Dual (Dual (Dual Dependant
(Catalyst
Supply PSU PSU Redundant) Redundant) Redundant)
Chassis)
Option) Option)
Positioning Branch, Enterprise, Enterprise, Central Site Enterprise, Enterprise Enterprise SP-Wi-Fi,
Small Office Campus & Campus & Controller Large Large Campus Controller less
Full service Full service for Large Campus, SP Campus, SP branches,
branch branch Number of Wi-Fi, Full Wi-Fi, Full Small Office.
Distributed Scale Scale
Controller- Branch Branch
less
Branches
AP Count Range 5 - 75
License Entitlement CISL Based
Connectivity 4 x 1G Ethernet Ports (RJ-45)
Power External AC Power Supply
Max Throughput 1 Gbps
Max FlexConnect Groups 30
Max APs / FlexConnect Group 20
Max Rogue APs 2,000
Max Rogue Clients 2,500
Max RFID Tags 500
Max APs / RF Group 500
Max AP Groups 75
Max Interface Groups 64
Max Interface / Interface 64
Group
Max VLANs 16
Max WLANs 16
Fast Secure Roaming Clients / 700
PMK Cache
For more information on Cisco 2504 Wireless Controller, see the Cisco 2500 Series Wireless
Controllers.
For more information on Cisco 2504 Wireless Controller, see the Cisco 3500 Series Wireless
Controllers.
For more information about the Cisco 5508 Wireless Controller, see the Cisco 5500 Series Wireless
Controllers.
For more information about the Cisco 5520 Wireless Controller, see the Cisco 5500 Series Wireless
Controller.
Cisco 5520 Wireless Deployment Type Central Site Controller for Large
Controller Number of Distributed,
Controller-less Branches
Operational Modes FlexConnect, Flex+Bridge
Maximum Scale 6,000 APs
64,000 Clients
AP Count Range 300 – 6,000
License Entitlement Right to Use (EULA)
Connectivity 2 x 10G Ethernet Ports (SFP+) /
1 Active
Power AC/DC (Dual Redundant)
Max Throughput —
Max FlexConnect Groups 2,000
Max APs / FlexConnect Group 100
Max Rogue APs 32,000
Max Rogue Clients 24,000
Max RFID Tags 50,000
Max APs / RF Group 6000
Max AP Groups 6000
Max Interface Groups 512
Max Interface / Interface 64
Group
Max VLANs 4,095
Max WLANs 512
Fast Secure Roaming Clients / 64,000
PMK Cache
For more information, see the Cisco Flex 7500 Series Wireless Controllers.
For more information about the Cisco 8510 Wireless Controller, see the Cisco 8500 Series Wireless
Controllers.
For more information about the Cisco 8540 Wireless Controller, see the Cisco 8500 Series Wireless
Controllers.
Note The Cisco Virtual Wireless Controller is supported on industry-standard virtualization infrastructure
including VMWare’s ESXi (5.x and higher), Microsoft Hyper-V and Linux KVM. vWLC is also
supported on the Cisco Unified Computing System Express (UCS Express) platform for the second
generation of Integrated Services Routers. Amazon AWS support has been added in the 8.5 release.
Note Cisco 1500 series MESH APs are mentioned briefly below, but this design guide does not address
wireless MESH applications or MESH deployment guidelines. For more information about the Cisco
MESH solution, see the Cisco Mesh Networking Solution Deployment Guide.
Cisco Aironet
Cisco Aironet 600 700W Series Cisco Aironet Cisco Aironet Cisco Aironet 3600
Series 1600 Series 2600 Series Series
Wi-Fi Standard 802.11a/b/g/n 802.11a/b/g/n 802.11a/b/g/n 802.11a/b/g/n 802.11a/b/g/n/ac
Number of Dual (2.4Ghz and 5 Dual (2.4Ghz Dual (2.4Ghz and Dual (2.4Ghz and Tri (2.4Ghz and 5 Ghz)
Radios Ghz) and 5 Ghz) 5 Ghz) 5 Ghz)
Max data Rate 300 Mbps 300 Mbps 300 Mbps 450 Mbps 450 Mbps (802.11n)
1.3Gbps (802.11ac
Module)
MIMO Radio 2x3 2x2 3x3 3x4 802.11n: 4x4
Design 802.11ac: 3x3
Spatial Streams 2 Spatial Streams 2 Spatial 2 Spatial Streams 3 Spatial Streams 3 Spatial Streams
Streams
Antennas Internal Internal 1600i Internal 2600i: Internal 3600i: Internal
1600e External 2600e: External 3600e: External
3600p: External
CleanAIR 2.0 — — CleanAir Express Yes Yes
ClientLink 2.0 — — Yes Yes Yes
Cisco — BandSelect BandSelect BandSelect BandSelect
Innovations Videostream Videostream Videostream Videostream
Cisco Aironet
Cisco Aironet 600 700W Series Cisco Aironet Cisco Aironet Cisco Aironet 3600
Series 1600 Series 2600 Series Series
Modularity USB* — — — 802.11ac Wave 1
Module
USC Small Cell Module
Wireless Security
Module (WSM)
Power AC DC, DC, 802.3afPoE DC, 802.3afPoE DC, 802.3afPoE,
802.3afPoE, 802.3at PoE+,
802.3at PoE+ Enhanced PoE,
Universal PoE
Interfaces 5x1G Ethernet Ports 1x1G Ethernet 1x1G Ethernet 1x1G Ethernet 1x1G Ethernet Uplink
(RJ-)45 Uplink Port Uplink Port Uplink Port Port (RJ-45)
(RJ-45) (RJ-45) (RJ-45)
1x1G Ethernet WAN
Ports (RJ-45) 4x1G Ethernet
User Ports
(RJ-45)
The Cisco Aironet 600 Series OfficeExtend Access Points provide highly secure enterprise wireless
coverage to home. These dual-band, 802.11n access points extend the corporate network to home
tele-workers and mobile contractors. The access point connects to the home’s broadband internet access
and establishes a highly secure tunnel to the corporate network so that remote employees can access data,
voice, video, and cloud services for a mobility experience consistent with that at the corporate office.
The dual-band, simultaneous support for 2.4 GHz and 5 GHz radio frequencies helps assure that
corporate devices are not affected by congestion caused by common household devices that use the 2.4
GHz band. The Cisco Aironet 600 Series OfficeExtend Access Points are purposely designed for the
teleworker by supporting secure corporate data access and maintaining connectivity for personal home
devices with segmented home traffic.
For more information about the Cisco Aironet 600 Series, see the Cisco Aironet 600 Series OfficeExtend
Access Point.
The Cisco Aironet 700W Series offers a compact wall-plate mountable access point for hospitality and
education-focused customers looking to modernize their networks to handle today’s increasingly
complex wireless access demands.
With 802.11n dual-radio 2 x 2 Multiple-Input Multiple-Output (MIMO) technology providing at least
six times the throughput of existing 802.11a/g networks, the Cisco Aironet 700W Series offers the
performance advantage of 802.11n quality at a competitive price.
As part of the Cisco Unified Wireless Network, the 700W Series Access Point provides low total cost of
ownership and investment protection by integrating seamlessly with the existing network.
The new Cisco Aironet 1600 Series Access Point is an enterprise-class, entry-level, 802.11n based
access point designed to address the wireless connectivity needs of small and medium-sized enterprise
networks.
The Aironet 1600 Series delivers great performance at an attractive price for customers, while providing
advanced functionality such as CleanAir Express for better cover through spectrum intelligence and
Clientlink 2.0 for entry level networks that have a mixed client base. In addition to these features, the
Aironet 1600 series includes 802.11n based 3x3 MIMO technology with two spatial streams, making it
ideal for small and medium-sized enterprises.
The Aironet 1600 Series also provides at least six times the throughput of existing 802.11a/g networks.
As part of the Cisco Aironet Wireless portfolio, the Cisco Aironet 1600 Series access point provides low
total cost of ownership and investment protection by integrating seamlessly with the existing network.
With an entry-level path to 802.11n migration, the Aironet 1600 Series can add capacity to the network
for future growth for expanding applications and bandwidth.
Designed with rapidly evolving mobility needs in mind, the Cisco Aironet 1600 Series Access Point
addresses the Bring-Your-Own-Device (BYOD) trend by providing advanced functionality at the right
price point.
The Cisco Aironet 2600 Series Access Point delivers the most advanced features in its class with great
performance, functionality, and reliability at a great price. The 802.11n based Aironet 2600 Series
includes 3x4 MIMO, with three spatial streams, Cisco CleanAir, ClientLink 2.0, and VideoStream
technologies, to help ensure an interference-free, high-speed wireless application experience. Next to the
Cisco Aironet 3600 Series in performance and features, the Aironet 2600 Series sets the new standard
for enterprise wireless technology.
Designed with rapidly evolving mobility needs in mind, the Aironet 2600 Series access point is packed
with more BYOD-enhancing functionality than any other access point at its price point. The new Cisco
Aironet 2600 Series sustains reliable connections at higher speeds farther from the access point than
competing solutions resulting in more availability of 450 Mbps data rates. Optimized for consumer
devices, the Aironet 2600 Series accelerates client connections and consumes less mobile device battery
power than competing solutions.
Delivering up to three times more coverage versus competition for tablets, smartphones, and high-
performance laptops, the industry’s first 4x4 MIMO, three-spatial-stream access point delivers mission
critical reliability. Current solutions struggle to scale to meet demands on the wireless networks from
the influx of diverse mobile devices and mobile applications. The Cisco Aironet 3600 Series sustains
reliable connections at higher speeds further from the access point than competing solutions, resulting
in up to three times more availability of 450 Mbps rates, and optimizing the performance of more mobile
devices. Cisco Aironet 3600 Series is an innovative, modular platform that offers unparalleled
investment protection with future module expansion to support incoming 802.11ac clients with 1.3 Gbps
rates, or offer comprehensive security and spectrum monitoring and control.
Cisco Aironet 3600 Series includes Cisco ClientLink 2.0 to boost performance and range for clients and
includes Cisco CleanAir spectrum intelligence for a self-healing, self-optimizing network.
If you operate a small or medium-sized enterprise network, deploy the Cisco Aironet 1700 Series Access
Point for the latest 802.11ac Wi-Fi technology at an attractive price. The 1700 Series meets the growing
requirements of wireless networks by delivering better performance than 802.11n and providing key RF
management features for improved wireless experiences.
The 1700 Series supports 802.11ac Wave 1 standard capabilities. That includes a theoretical connection
rate up to 867 Mbps.
Ideal for small and medium-sized networks, the Cisco Aironet 1850 Series delivers industry-leading
performance for enterprise and service provider markets through enterprise-class 4x4 MIMO,
four-spatial-stream access points that support the IEEE’s new 802.11ac Wave 2 specification. The
Aironet 1850 Series extends support to a new generation of Wi-Fi clients, such as smartphones, tablets,
and high-performance laptops that have integrated 802.11ac Wave 1 or Wave 2 support.
The Cisco Aironet 2700 Series of Wi-Fi access points (APs) delivers industry-leading 802.11ac
performance at a price point ideal for plugging capacity and coverage gaps in dense indoor
environments. The Aironet 2700 Series extends 802.11ac speed and features to a new generation of
smartphones, tablets, and high-performance laptops now shipping with the faster, 802.11ac Wi-Fi radios.
The Aironet 2700 series supports 802.11ac Wave 1 in its first implementation, providing a theoretical
connection rate of up to 1.3 Gbps. That’s roughly triple the rates offered by today’s high-end 802.11n
APs. The boost helps you stay ahead of the performance and bandwidth expectations of today’s mobile
worker, who usually uses multiple Wi-Fi devices instead of just one. As such, users are adding
proportionally larger traffic loads to the wireless LAN, which has outpaced ethernet as the default
enterprise access network.
For more information, see the Cisco Aironet 2700 Series Access Point.
With the industry’s only enterprise class 4x4 MIMO, three-spatial-stream access points that support the
IEEE’s 802.11ac Wave 1 specification, the Cisco Aironet 3700 Series delivers industry-leading
performance and a High Density (HD) experience for both the enterprise and service provider markets.
The Aironet 3700 Series extends support to a new generation of Wi-Fi clients, such as smartphones,
tablets, and high-performance laptops that have integrated 802.11ac support.
In its first implementation, 802.11ac wave 1 provides a rate of up to 1.3 Gbps, roughly triple the rates
offered by today’s high-end 802.11n access points. This provides the necessary foundation for enterprise
and service provider networks alike to stay ahead of the performance and bandwidth expectations and
needs of their wireless users.
Due to its convenience, wireless access is increasingly the preferred form of network connectivity for
corporate users. Along with this shift, there is an expectation that wireless should not slow down user’s
day-to-day work, but should enable a high-performance experience while allowing users to move freely
around the corporate environment by utilizing a purpose-built innovative Chipset with the best-in-class
RF Architecture for a HD experience.
Cisco Prime Infrastructure is a network management that connects the network to the device to the user
to the application, end-to-end and all in one. Its capabilities permit:
• Single-pane-of-glass management—Delivers a single, unified platform for day-0 and day-1
provisioning and day-n assurance. It accelerates device and services deployment and helps you to
rapidly resolve problems that can affect the end-user experience. Minimize the amount of time you
spend managing the network so you can maximize the time you spend using it to grow your business.
• Simplified deployment of Cisco value-added features—Makes the design and fulfillment of Cisco
differentiated features and services fast and efficient. With support for technologies such as
Intelligent WAN (IWAN), Distributed Wireless with Converged Access, Application Visibility and
Control (AVC), Zone-Based Firewall, and Cisco TrustSec 2.0 Identity-Based Networking Services,
it helps you get the most from the intelligence built-in to your Cisco devices as quickly as possible.
• Application visibility—Configures and used as a source of performance data embedded Cisco
instrumentation and industry-standard technologies to deliver networkwide, application-aware
visibility. These technologies include NetFlow, Network-Based Application Recognition 2
(NBAR2), Cisco Medianet technologies, Simple Network Management Protocol (SNMP), and
more. The innovative coupling of application visibility and lifecycle management of Cisco Prime
Infrastructure makes it easier to find and resolve problems by providing insight into the health of
applications and services in the context of the health of the underlying infrastructure.
• Management for mobile collaboration—Answers the who, what, when, where, and how of wireless
access. It includes 802.11ac support, correlated wired-wireless client visibility, unified access
infrastructure visibility, spatial maps, converged security and policy monitoring and troubleshooting
with Cisco Identity Services Engine (ISE) integration, location-based tracking of interferers, rogues,
and Wi-Fi clients with Cisco Mobility Services Engine (MSE) and Cisco CleanAir integration,
lifecycle management, RF prediction tools, and more.
• Management across network and compute—Delivers powerful lifecycle management and service
assurance to help you manage and maintain the many devices and services running on your
branch-office, campus, and data center networks. It provides key capabilities such as discovery,
inventory, configuration, monitoring, troubleshooting, reporting, and administration. With a single
view and point of control, it lets you reap the benefits of One Management across both network and
computer.
• Centralized visibility of distributed networks—Large or global organizations often distribute
network management by domain, region, or country. Cisco Prime Infrastructure Operations Center
lets you visualize up to 10 Cisco Prime Infrastructure instances, scaling your network-management
infrastructure while maintaining central visibility and control.
Licensing Options
Cisco Prime Infrastructure is a single installable software package with licensing options to expand and
grow functions and coverage as needed.
• Lifecycle—Simplifies the day-to-day operational tasks associated with managing the network
infrastructure across all lifecycle phases (design, deploy, operation, and report) for Cisco devices
including routers, switches, access points, and more.
• Assurance—Provides application performance visibility using device instrumentation as a source of
rich performance data to help assure consistent application delivery and an optimal end-user
experience.
• Cisco UCS Server Management—Offers lifecycle and assurance management for Cisco UCS B- and
C-Series Servers.
• Operations center—Enables visualization of up to 10 Cisco Prime Infrastructure instances from one
central management console. One license is required for each Cisco Prime Infrastructure supported
instance.
• High-Availability Right to Use (RTU)—Permits high-availability configuration with one primary
and one secondary instance in a high-availability pair.
• Collector—Increases the NetFlow processing limit on the Cisco Prime Infrastructure management
node. This license is used in conjunction with the Assurance license.
• Ready-to-use gateway RTU—Entitles you to deploy a separate gateway for use with the ready-to-use
feature, where new devices can call in to the gateway to receive their configuration and software
image.
Note Cisco Prime Infrastructure 2.2 is available for new customers, and upgrade options are available for
existing customers running on prior versions. Upgrade options are also available for Cisco Network
Control System (NCS), Cisco Wireless Control System (WCS), and Cisco Prime LAN Management
Solution (LMS) customers. For details refer to:
http://www.cisco.com/c/en/us/products/cloud-systems-management/prime-infrastructure/datasheet-listi
ng.html.
Scaling
Cisco Prime Infrastructure 2.2 is available for purchase as a virtual or physical appliance. The virtual
appliance can be installed on top of VMware’s industry-standard hypervisor and is available in multiple
versions to support networks of different sizes. A physical appliance is also available for large network
deployments, when dedicated CPU and memory resources are required.
• Physical Appliance (Second Generation)—Based on the Cisco UCS C220 M4 Rack Server.
• Virtual Appliance—ESXi Version 5.0, 5.1 or 5.5.
Table 2-3 provides a scaling matrix for Cisco Prime Infrastructure 2.2 for both the virtual and physical
appliances:
Table 2-3 Cisco Prime Infrastructure 2.2 Scaling Matrix
High Availability
The following section provides an overview of the High Availability (HA) deployment options available
for a Cisco Unified Wireless Network.
AP / Client Failover
The N+1 redundancy model requires additional permanent AP licenses are purchased for each backup
WLC. A backup WLC can either be dedicated for redundancy or support APs during normal operation.
Each WLC is managed independently and does not share configuration. The necessary WLANs, AP
Groups and RF Groups must be defined on each backup WLC to ensure seamless operation during a
failure.
The example shown in Figure 2-14 demonstrates a simple N+1 deployment with two WLCs each
supporting 250 x APs during normal operation. To provide redundancy each WLC has 500 permanent
AP licenses installed to ensure that all of the APs are supported in the event that one of the WLCs
becomes unreachable. APs connected to WLC-1 are configured to use WLC-2 as their secondary WLC
while APs connected to WLC-2 are configured to use WLC-1 as their secondary WLC.
Note For large deployments, if the preferred WLCs are unavailable or over-subscribed, the AP chooses another
WLC from the list of WLCs within the mobility group learned in the CAPWAP discover response that is
the least-loaded WLC.
The N+1 HA architecture can provide redundancy for both centralized and FlexConnect AP
deployments. WLC redundancy can be provided within the same campus/site or between geographically
separate data centers. The HA WLC is managed independently and does not share configuration with the
primary WLCs. Each WLC needs to be configured and managed separately. The necessary WLANs, AP
Groups and RF Groups must be defined on the HA WLC to ensure seamless operation during a failover.
If a primary WLC becomes unreachable or fails, the affected APs failover to the HA WLC. A HA WLC
is only licensed to support APs for up to 90-days. As soon as an AP joins the HA WLC a 90-day timer
will start. A warning message will be displayed if APs are still present on the HA WLC after the 90-day
interval expires. A HA WLC can only be used as a secondary WLC for 90 days without a warning
message.
The example shown in Figure 2-15 demonstrates a simple N+1 HA deployment for a 500 AP
deployment. Both of the primary WLCs have 250 permanent AP licenses installed. The HA WLC model
is selected to initially support 500 APs and provide room for future growth. APs connected to WLC-1
and WLC-2 are configured to use WLC-BACKUP as their secondary WLC.
Note HA-SKUs are available for the 2500 series, 5500 series, 7500 series, 8500 series wireless controllers as
well as the WiSM2. An N+1 HA deployment can consist of WLCs of different models (for example 5508
WLCs operating as primary and a 5520 WLC HA-SKU operating as a backup.
Note For additional details please see the “High Availability (SSO) deployment guide” at:
http://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/8-1/HA_SSO_DG/High_Availability
_DG.html.
The HA-SSO architecture consists of both AP and client SSO which combine to provide sub-second
failure detection and failover without impacting wireless services to clients. AP SSO was initially
introduced in release 7.3 while client SSO was introduced in release 7.5:
• AP SSO – Allows the APs to establish a CAPWAP tunnel with the active WLC and share a mirror
copy of the AP database with the standby-hot WLC. The APs do not go into a CAPWAP discovery
state during a failover. There is only one CAPWAP tunnel maintained at a time between the APs and
the WLC that is in an active state. The overall goal for AP SSO is to reduce downtime in wireless
networks due to failure conditions that may occur such as a WLC or network failover.
• Client SSO – To provide seamless failover without impacting service, there needs to be support for
seamless transition of both clients and APs from the active WLC to the standby-hot WLC. With
Client SSO, a client's information is synchronized to the standby-hot WLC when the client
associates to the active WLC or the client’s parameters change. All fully authenticated clients are
synced to the standby-hot WLC and thus, client re-association is avoided during a switch over
making the failover seamless for the APs as well as for the clients. This results in zero client service
downtime and no SSID outages.
AP and client SSO is supported by the 3504, 5500 series, 7500 series and 8500 series WLCs as well as
the Wireless Services Module 2. Each appliance based WLC supports a dedicated redundancy port while
the WiSM2 implements a redundancy VLAN. The redundancy port is used to exchange keep-alive
messages as well as synchronize configuration and state information. Redundancy ports are either be
directly connected or indirectly connected through an intermediate layer 2 network. Table 2-4 provides
a summary of HA SSO support for each model of WLC:
Table 2-4 HA-SSO Support by Controller Platform
Cisco 8510 Wireless Yes Yes (7.3 and above) Yes (7.5 and above)
Controller
Cisco 8540 Wireless Yes Yes (8.1 and above) Yes (8.1 and above)
Controller
Note The implementation of AP and Client SSO is dependent on the software release operating on the primary
and secondary WLCs and cannot be independently configured. For example if HA is enabled and both
WLCs support 8.1, both AP SSO and Client SSO will be implemented.
A redundancy port / VLAN is mandatory for HA-SSO deployments and are used to synchronize
configuration / state as well as exchange keep-alive packets. A redundancy port / VLAN is also used for
role negotiation. Appliance based WLCs such as the 3504, 5500 series, 7500 series and 8500 series
controllers implement a dedicated Ethernet redundancy port while the WiSM2 implements a redundancy
VLAN.
In release 7.5 and above, the redundancy ports for appliance based WLCs can be interconnected via a
dedicated Ethernet cable or indirectly connected at layer 2 over intermediate switches using a dedicated
non-routable VLAN. Direct connections with fiber over media converters is also supported. Figure 2-17
demonstrates the supported redundancy port connection options.
For WiSM-2 based deployments, HA-SSO is supported for both single chassis and multiple chassis
deployments. Multi chassis deployments are supported using VSS or by extending the redundancy
VLAN. The redundancy VLAN must be dedicated and non-routable. Figure 2-18 demonstrates the
chassis deployment options.
Considerations
When connecting redundancy ports or VLANs over an intermediate L2 network, the following
considerations must be met:
• The round trip time (RTT) latency between the peers must be 400 milliseconds or less (80
milliseconds by default). The RTT is 80% of the keepalive timer which is configurable in the range
of 100 (default) – 400 milliseconds. A higher RTT requires the keepalive timer to be increased.
• A minimum of 60 Mbps of bandwidth is required between the peers.
• A minimum 1,500 byte MTU path is required between the peers.
Topologies
The following section provides an overview of the typical topologies used when deploying HA-SSO
within a Cisco Unified Wireless Network (CUWN). For simplicity each example shows appliance based
WLCs with their redundancy ports directly connected. Each topology also applies to WiSM2
deployments.
For each of the below designs, the Catalyst distribution switches provide a boundary between the
wireless services block and core layers. This boundary provides two key functions for the LAN. On the
Layer 2 side, the distribution layer creates a boundary for spanning tree protocol (STP), limiting
propagation of Layer 2 faults. On the Layer 3 side, the distribution layer provides a logical point to
summarize IP routing information when it enters the network. The summarization reduces IP route tables
for easier troubleshooting and reduces protocol overhead for faster recovery from failures.
Note The above architecture also applies to WiSM2 deployments. The equivalent WISM2 design consisting
of a single Catalyst 6500 series chassis with two WiSM2 modules installed.
as the wireless management and wireless user VLANs must be extended between the Catalyst switches.
This results in a looped multilayer architecture that requires a spanning tree protocol and a first-hop
routing protocol:
• With this architecture you cannot implement routed ports or a routed port-channel between the
Catalyst switches. Instead a link-local VLAN with switched virtual interfaces (SVIs) must be used.
This allows the wireless VLANs to be extended between the Catalyst switches while maintaining a
multilayer design.
• For loop prevention spanning tree protocol (STP) must be enabled for each of the wireless VLANs.
The Catalyst switch connected to the primary WLC must be configured as the STP root bridge for
each VLAN.
• First-hop router redundancy such as HSRP must be enabled and configured for each wireless VLAN.
The distribution switch connected to the primary WLC must be configured as the HSRP master for
each VLAN.
During normal operation the Catalyst switch connecting to the active WLC is the first-hop router for
each of the wireless management and wireless user VLANs. This minimizes the traffic that crosses the
link between the pair of Catalysts switches as it is both the STP root and the HSRP master. If the primary
Catalyst switch fails, HA-SSO will failover to the standby-hot WLC. If the primary Catalyst switch loses
connectivity to the core network, a HA-SSO failover will not occur as the primary WLC can still
communicate with the standby-hot WLC through the port-channel established between the two Catalyst
switches.
Note The above architecture also applies to WiSM2 deployments. The equivalent WISM2 design consisting
of two Catalyst 6500 series chassis configured for multilayer operation each with a WiSM2 module
installed.
Note The above architecture also applies to WiSM2 deployments. The equivalent WISM2 design consisting of
two Catalyst 6500 series chassis in a VSS configuration each with a WiSM2 module installed.
Considerations
• The channel mode for the port-channel on the neighboring Catalyst switch or VSS connecting to the
WLCs must be set to mode on (static). The WLC software release 8.1 does not support LACP or
PaGP protocols.
• When connecting HA-SSO WLCs to multilayer distribution switches:
• The wireless management and user VLANs are 802.1Q tagged between the Catalyst distribution
switches. This will result in a multilayer looped design.
• For loop prevention it is recommended that rapid spanning tree protocol be enabled for the wireless
management and wireless user VLANs. The Catalyst switch is connected to the primary WLC
during normal operation should be configured as the STP root bridge for each wireless VLAN.
• A first-hop routing protocol such as HSRP must be enabled for the wireless management and user
VLANs. The Catalyst switch that is connected to the primary WLC during normal operation should
be configured as the HSRP master for each wireless VLAN.
• Appliance based WLC redundancy ports can be directly connected or indirectly connected at layer
2. If indirectly connected it is recommended that you extend a dedicated non-routable 2 VLAN
between each of the Catalyst switches.
• If the redundancy ports are extended over an intermediate L2 network, the latency, bandwidth and
MTU requirements outlined in the previous section must be followed.
Fast Restart
The Fast restart enhancement aims to reduce network and service downtime by up to 73% when making
changes to the following features:
• LAG Configuration Change
• Mobility Mode Change
• Web-Auth Certificate Change
• Clear Configuration
Without fast restart, the above changes required a full system restart. Fast restart feature is supported on
the Cisco WLC 3504, WLC 5520, 7510, 8510, 8540 and vWLC starting release 8.1. It can be invoked
using the CLI by issuing the Restart command or by clicking Save and Restart within the Web-UI.
Considerations
When implementing LAG, the following considerations should be made:
• A Cisco WLC does not send CDP advertisements on a LAG interface.
• All WLC Ethernet ports in the LAG must operate at the same speed. You cannot mix Gigabit and
10Gigabit ports.
• The channel mode for the port-channel on the neighboring Catalyst switch or VSS connecting to the
WLCs must be set to mode on (static). The WLC software release 8.1 does not support LACP or
PaGP protocols.
• You cannot separate the WLC Ethernet ports into separate LAG groups.
• Only one AP-manager interface is supported as all Ethernet ports are bundled into a single logical
port.
• When you enable LAG, all dynamic AP-manager interfaces and untagged interfaces are deleted, and
all WLANs are disabled and mapped to the management interface. The management, static
AP-manager, and VLAN-tagged dynamic interfaces are assigned to the LAG port.
• When you enable LAG, the WLC sends packets out on the same port on which it received them. If
a CAPWAP packet from an AP enters the controller on physical port 1, the WLC removes the
CAPWAP wrapper, processes the packet, and forwards it to the network on physical port 1.
Mobility Groups
A mobility group is a set of controllers, identified by the same mobility group name that defines the
realm of seamless roaming for wireless clients. By creating a mobility group, you can enable multiple
WLCs in a network to dynamically share essential client, AP and RF information as well as forward data
traffic when inter-controller or inter-subnet roaming occurs. WLCs in the same mobility group can share
the context and state of client devices as well as their list of access points so that they do not consider
each other’s access points as rogue devices. With this information, the network can support
inter-controller wireless LAN roaming and controller redundancy.
A mobility group forms a mesh of authenticated tunnels between member WLCs, thereby allowing any
WLC to directly contact another WLC within the group, as shown in Figure 2-24.
In release 8.0 and above, mobility tunnels can be established between WLC peers using either Internet
Protocol version 4 (IPv4) or Internet Protocol version 6 (IPv6). The implementation of IPv4 or IPv6
tunnels is driven by the mobility configuration defined for each peer. Table 2-5 lists the protocol and
ports implemented for each mobility tunnel version:
Internet
Protocol IP Protocol DST Port Description
Version 4 17 (UDP) 16,666 IPv4 Mobility Tunnel Control Channel
97 (EITHERIP) - IPv4 Mobility Tunnel Data Channel
Version 6 17 (UDP) 16,666 IPv6 Mobility Tunnel Control Channel
17 (UDP) 16,667 IPv6 Mobility Tunnel Data Channel
foreign WLC where a static mobility tunnel is needed. The same is true for each foreign WLC where a
static mobility tunnel is being configured; the anchor WLC must be defined as a static mobility group
member in the foreign WLC.
A WLC can be member of only one mobility group for the purpose of supporting dynamic
inter-controller client roaming. A WLC that is configured as an auto anchor does not have to be in the
same mobility group as the foreign WLCs. It is possible for a WLC to be a member of one mobility group
while at the same time, act as an auto anchor for a WLAN originating from foreign WLCs that are
members of other mobility groups. For a discussion on mobility anchor configuration, see, Chapter 10,
“Cisco Unified Wireless Network Guest Access Services.”
AP Groups
An AP group is logical grouping of APs within a geographic area such as a building, floor or remote
branch office that share common WLAN, RF, Hotspot 2.0 and location configurations. AP groups are
useful in a Cisco Unified Wireless Network deployment as they allow administrators to assign specific
configurations to different groups of APs. For example AP groups can be used to control which WLANs
are advertised in different buildings in a campus, the interface or interface groups WLAN clients are
assigned or the RRM and 802.11 radio parameters for radios in specific coverage areas to support
high-density designs.
Supported AP group specific configurations include:
• CAPWAP Preferred Mode – Used to determine if the AP prefers IPv4 or IPv6 CAPWAP modes.
• NAS-ID – Used by the WLC for RADIUS authentication and accounting.
• WLAN – WLAN assignments, interface / interface group mappings and NAC state
• RF Profile Assignments – 802.11, RRM, high density and client load balancing configurations.
• Hotspot 2.0 – 802.11u venue configuration and languages.
• Location – HyperLocation configuration.
By default each AP is automatically assigned to a default AP group named “default-group” and WLANs
IDs (1-16) map to this default group. WLANs with IDs greater than 16 require a custom AP group to be
defined. When customized AP groups are defined on a WLC, the APs must be manually assigned to the
AP group.
Note AP groups do not allow multicast roaming across group boundaries. For more information, see:
http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Mobility/emob41dg/emob41dg-wrapper/ch
5_QoS.html.
AP Group Considerations
Creating an AP group is simple and well documented. However, there are a few important considerations
to keep in mind:
• If an AP does not belong to an AP group, it is assigned to the default AP group named
“default-group” and will inherit any configurations applied to that group.
• As a Cisco best practice it is recommended that the customized AP group configurations on the
primary, secondary and tertiary WLCs be consistent. If an AP joins a WLC with an undefined AP
group name, the AP maintains its assigned AP group (NVRAM) but will inherit any configurations
applied to the default-group. This can result in misconfigured APs and an undesirable user
experience.
• Suppose that the interface mapping for a WLAN in the AP group table is the same as the WLAN
interface. If the WLAN interface is changed, the interface mapping for the WLAN in the AP group
table also changes to reflect the new WLAN interface.
• Suppose that the interface mapping for a WLAN in the AP group table is different from the one
defined for the WLAN. If the WLAN interface is changed, then the interface mapping for the WLAN
in the AP group table does not change to the new WLAN interface.
• If you clear the configuration on a controller, all of the AP groups (except the AP group named
“default-group”) will disappear.
• The default access point group can have up to 16 WLANs associated with it. The WLAN IDs for the
default access point group must be less than or equal to 16. If a WLAN with an ID greater than 16
is created in the default access point group, the WLAN SSID will not be broadcasted. All WLAN
IDs in the default access point group must have an ID that is less than or equal to 16. WLANs with
IDs greater than 16 require a custom AP group to be defined.
• The OfficeExtend 600 Series access point supports a maximum of two WLANs and one remote
LAN. If you have configured more than two WLANs and a remote LAN on the WLC, you must
assign the Office Extend 600 Series APs to a customized AP group. The support for two WLANs
and one remote LAN still applies to the default AP group. Additionally the WLAN/remote LAN ids
must be lower than 8.
• All OfficeExtend access points should be in the same AP group, and that AP group should contain
no more than 15 WLANs. A controller with OfficeExtend access points in an access point group
publishes only up to 15 WLANs to each connected OfficeExtend access point because it reserves
one WLAN for the personal SSID.
• Cisco recommends that you configure all FlexConnect APs (in the same branch / site) in the same
AP group and FlexConnect group. This ensures that all the APs at a site inherit the correct
WLAN-VLAN mappings.
AP Group Applications
AP groups can be used to solve several business challenges within a Cisco Unified Wireless Network.
This section provides some common use-cases where AP groups can solve these problems:
• Controlling which WLANs are advertised by APs within specific geographic locations. For example
in a campus deployment separate AP groups can be employed to only advertise a guest WLAN in
public areas vs. campus wide. For retail deployments AP groups can be employed to advertise
unique SSIDs for different brands stores (mergers and acquisitions) or to provide guest Wi-Fi
services to subsets of retail stores.
As shown in Figure 2-26 a WLC supporting remote FlexConnect APs has been configured with three
separate AP groups to support remote retail stores of different brands and client support. Stores 1 and 3
are the same brand and both share a common corporate SSID, however a separate AP group is required
for store 3 as this store it offers guest Wi-Fi to patrons which is not yet available in store 1.
Store 2 is a different brand that implements a different corporate SSID. A separate AP group is required
to support store 2 as the client devices in the store have not yet been migrated to the standard corporate
SSID.
• Reducing broadcast domain sizes by mapping WLAN clients to different interfaces or interface
groups within a WLC. For example in a campus deployment, AP groups can be employed to map
WLAN clients in separate buildings or floors to separate interfaces or interface groups on a single
WLC.
As shown in Figure 2-27, a WLC has three dynamic interfaces configured, each with a site-specific
VLAN (VLANs 22, 32 and 42). Each site-specific VLAN and associated APs are mapped to the same
WLAN SSID using AP groups. A corporate user associating to the WLAN on an AP in the AP group
corresponding to VLAN 22 is assigned an IP address on the VLAN 22 subnet. Likewise, a corporate user
associating to the WLAN on an AP in the AP group corresponding to VLAN 32 is assigned an IP address
on the VLAN 32 subnet and so on. Roaming between the site-specific VLANs is handled internally by
the WLC as a Layer 3 roaming event and because of this the wireless LAN client maintains its original
IP address.
• Optimizing the RF environment within geographic locations to support different client densities.
APs in coverage areas can be assigned different RF profiles optimized to support different client
needs or densities.
As shown in Figure 2-28, a WLC has been configured with two AP groups to support different AP and
client densities. One AP group is configured for APs and clients deployed in a typical density while the
second AP group is configured to support APs and clients in a high density.
• Migrating APs from Internet Protocol version 4 (IPv4) to Internet Protocol version 6 (IPv6). AP
groups can be employed to switch the APs CAPWAP preferred mode from IPv4 to IPv6 as individual
buildings or sites are transitioned.
As shown in Figure 2-29, a WLC has been configured with two AP groups to aid in the transition from
IPv4 to IPv6. Each AP group is configured with a specific CAPWAP preferred mode that determines the
IP Protocol used by the APs when joining a WLC.
RF Groups
An RF group is a logical collection of Cisco WLCs that coordinate to perform RRM in a globally
optimized manner to perform network calculations on a per-radio basis. An RF group exists for each
802.11 network type. Clustering Cisco WLCs into a single RF group enable the RRM algorithms to scale
beyond the capabilities of a single Cisco WLC. Controller software can scale to support up to 20 WLCs
and 6,000 APs in an RF group.
RF Groups and RRM is discussed in more detail in Chapter 3, WLAN RF Design Considerations” but
can be summarized as follows:
• CAPWAP APs periodically send out neighbor messages over the air that includes the WLC IP
address and a hashed message integrity check (MIC) derived from a timestamp and the BSSID of
the AP.
• The hashing algorithm uses a shared secret (the RF Group Name) that is configured on the WLC and
is pushed out to each AP. APs sharing the same secret are able to validate messages from each other
using the MIC. When APs belonging to other WLCs hear validated neighbor messages at a signal
strength of -80 dBm or stronger, their WLCs dynamically become members of the RF group.
• Members of an RF group elect an RF domain leader to maintain a master power and channel scheme
for the RF group.
• The RF group leader analyzes real-time radio data collected by the system and calculates a master
power and channel plan.
Note RF groups and mobility groups are similar in that they both define clusters of WLCs, but they are different
in terms of their use. An RF group facilitates scalable, system-wide dynamic RF management while a
mobility group facilitates scalable, system-wide mobility and WLC redundancy.
Roaming
Mobility, or roaming, is the ability of a WLAN client to maintain its association seamlessly from one
AP to another securely and with as little latency as possible. This section explains how mobility works
when WLCs are included in a Cisco Unified Wireless Network.
When a WLAN client associates and authenticates to an AP, the WLC places an entry for that client in
its client database. This entry includes the client MAC and IP addresses, security context and
associations, quality of service (QoS) contexts, the WLAN, SSID and the associated AP. The WLC uses
this information to forward frames and manage traffic to and from the wireless client. Figure 2-30 shows
a wireless client that roams from one AP to another when both APs are joined to the same controller.
When the WLAN client moves its association from one AP to another, the WLC simply updates the client
database with the newly associated AP. If necessary, new security context and associations are
established as well.
The process becomes more complicated, however, when a client roams from an AP joined to one WLC
to an AP joined to a different WLC. It also varies based on whether the WLCs are operating on the same
VLAN. Figure 2-31 shows inter-controller roaming, which occurs when the WLCs interfaces or
interface groups are support the same VLAN.
When the client associates to an AP joined to a new controller, the new WLC exchanges mobility
messages with the original WLC, and the client database entry is moved to the new WLC. New security
context and associations are established if necessary, and the client database entry is updated for the new
AP. This process remains transparent to the user.
Figure 2-32 shows inter-subnet roaming, which occurs when the WLCs interfaces are on different
VLANs.
Inter-subnet roaming is similar to inter-controller roaming in that the WLCs exchange mobility messages
on the client roam. However, instead of moving the client database entry to the new WLC, the original
controller marks the client with an Anchor entry in its own client database. The database entry is copied
to the new controller client database and marked with a Foreign entry in the new WLC. The roam remains
transparent to the wireless client, and the client maintains its VLAN membership and original IP address.
In inter-subnet roaming, WLANs on both anchor and foreign WLCs need to have the same network
access privileges and no source-based routing or source-based firewalls in place. Otherwise, the clients
may experience connectivity issues after the handoff.
Note If a client roams in web authentication state, the client is considered as a new client on another controller
instead of considering it as a mobile client.
Figure 2-33 shows inter-subnet roaming for IPv6 clients, which occurs when the WLCs interfaces are on
different VLANs. The process is identical to inter-subnet roaming shown in Figure 2-32 where the
roamed client’s traffic is tunneled to the anchor WLC. All ICMPv6 RS, NA and NS packets are tunneled
to the anchor WLC so that the IPv6 client can maintain its original VLAN and IPv6 address providing a
seamless roaming experience.
Note In rel 8.5 and above SNMP (Simple Network Management Protocol) over Internet Protocol security
(IPSec) supported over IPv6 interfaces was added.st Secure Roaming
Before discussing the various fast roaming methods supported by a Cisco Unified Wireless Network
(CUWN), it is important to understand how clients are authenticated and validated when connecting to
a WPA2 WLAN using PSK or 802.1X key management. This information is important to provide
additional context when understanding how fast secure roaming is implemented for each method.
Even though WPA/WPA2-PSK and WPA/WPA2-EAP methods authenticate and validate the WLAN
clients in different ways, both use the same rules for the key management process. Whether the key
management of a WPA2 WLAN is PSK or 802.1X, the process known as the 4-way handshake begins
the key negotiation between the WLC/AP and the client with a Master Session Key (MSK) being used
as the original key material once the client is validated with the specific authentication method used.
Here is a summary of the process:
• An MSK is derived from the EAP authentication phase when WPA/WPA2 with 802.1X key
management is used, or from the pre-shared key when WPA/WPA2 with PSK is used.
• From the MSK, the client and WLC/AP derive the Pairwise Master Key (PMK).
• Once these two Master Keys have been derived, the client and the WLC/AP initiate the 4-Way
handshake with the Master Keys as the seeds to negotiate the actual encryption keys:
– Pairwise Transient Key (PTK) – The PTK is derived from the PMK and used in order to encrypt
unicast frames with the client.
– Group Transient Key (GTK) – The Group Transient Key (GTK) is derived from the GMK, and
is used in order to encrypt multicast/broadcast on this specific SSID/AP.
Fast secure roaming aims to reduce the amount of time it takes a client to roam between APs in a CUWN.
Fast roaming is achieved by implementing clever key management and distribution techniques that can
avoid subsequent EAP authentications and/or the 4-way handshakes during a roam. Avoiding these
phases reduces the amount of time it takes a client to reassociate to a new AP limiting the perceptible
delay for time sensitive applications such as Voice over IP (VoIP).
The following section provides a brief overview of each of the supported fast secure roaming method
available in the 8.0 release.
Note For more detailed information on each of the fast secure roaming methods described in this section
(including packet captures and debugs), see the Cisco troubleshooting technote titled “802.11 WLAN
Roaming and Fast-Secure roaming” at:
http://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/116493-technote-tech
nology-00.html.
CCKM can be implemented with all of the different encryption methods available for WLANs including
WEP, TKIP, and AES. It is also supports multiple EAP methods (dependent upon the CCX version
supported by the client devices).
With CCKM, the initial association to the WLAN is similar to WPA/WPA2, where an MSK (also known
here as the Network Session Key) is mutually derived from a successful authentication with a RADIUS
server. This master key is sent from the server to the WLC after a successful authentication, and is cached
as the basis for derivation of all subsequent keys for the lifetime of the client session. The WLC and
client derive the seed information that is used for fast secure roaming based on CCKM, performing a
4-way handshake (similar to WPA/WPA2), in order to derive the unicast (PTK) and multicast/broadcast
(GTK) encryption keys.
When a CCKM client roams to a new AP, it sends a single Reassociation Request frame to the CAPWAP
AP (including an MIC and a sequentially incrementing Random Number), and provides enough
information (including the new BSSID MAC address) in order to derive the new PTK. With this
Reassociation Request, the WLC and new AP also have enough information in order to derive the new
PTK, so they simply respond with a Reassociation Response, avoiding both the EAP authentication and
4-way handshake.
Summary:
• Is supported by Cisco and third-party clients that are CCX compatible.
• Supports different encryption and EAP methods (depending on CCX version).
• Fast roaming is performed by avoiding the 802.1X/EAP authentications and 4-way handshakes.
• Supported for both Centralized and FlexConnect deployments (locally or centrally switched):
– Centralized – Works across APs and WLCs in the same Mobility group
– FlexConnect – Works across APs in the same FlexConnect group
• FlexConnect WLANs can be configured for local or centralized authentication using central or local
switching.
• FlexConnect APs are supported in connected or standalone modes – however there are restrictions
as to how the MSK is shared in standalone mode.
If the wireless client roams back to an AP (where it has previously associated), the client sends a
Reassociation Request frame that lists multiple PMKIDs, which informs the AP of the PMKs cached
from all of the APs where the client has previously authenticated. As the client is roaming back to an AP
that also has a PMK cached for this client, it does not need to reauthenticate to derive a new PMK. The
client simply goes through the WPA2 4-way handshake in order to derive the new transient encryption
keys. The roam back has to occur within a limited time window configurable on the client (default 720
minutes in Windows).
In a CUWN centralized deployment, the cached PMKs for each CAPWAP AP are managed and
maintained by the WLC. As separate PMKs are generated for each client per AP, scaling is limited. As
such PMK caching is not recommended for large scale enterprise deployments and is not widely adopted.
Summary:
• Is referred to as Sticky Key Caching (SKC) in Cisco documentation.
• Is only supported for WPA2 WLANs using 802.1X or PSK key management.
• Due to the inefficient key management has severe scaling limitations which makes it unsuitable for
large scale enterprise deployments. A WLC can only cache PMK entries for up to eight APs per
client. Old cache entries are removed to store newly created entries if a client roams between more
than 8 APs.
• Fast roaming is performed by avoiding 802.1X or PSK authentication during a roam. A fast roam is
only provided if:
– The client roams to an AP it has previously associated with.
– The AP/WLC has the PMK cache entries for the client. In other words the cache entries have
not been removed due to successive roams.
• Does not function across WLCs in a mobility domain. WLCs do not exchange PMKs with mobility
peers.
• Not supported for FlexConnect deployments.
This fast secure roaming method avoids 80.1X/EAP authentication when roaming because it reutilizes
the original PMK cached by the client and the WLCs. The client only has to perform a WPA2 4-way
handshake in order to derive new encryption keys.
• Each time the wireless client connects to a specific AP, a PMKID is hashed based on: the client MAC
address, the AP MAC address (BSSID of the WLAN), and the PMK derived with that AP. As PKC
caches the same original PMK for all of the APs and the specific client, when a client roams to
another AP, the only value that changes in order to hash the new PMKID is the new APs MAC
address.
• When the client initiates roaming to a new AP and sends the Reassociation Request frame, it adds
the PMKID on the WPA2 RSN Information Element if it wants to inform the AP that a cached PMK
is used for fast secure roaming. As it already knows the MAC address of the BSSID (AP) for where
it roams, then the client simply hashes the new PMKID that is used on this Reassociation Request.
When the AP receives this request from the client, it also hashes the PMKID with the values that it
already has (the cached PMK, the client MAC address, and its own AP MAC address), and responds
with the successful Reassociation Response that confirms the PMKIDs matched. The cached PMK
can be used as the seed that starts a WPA2 4-way handshake in order to derive the new encryption
keys thus avoiding the EAP authentication phase.
Summary:
• Is referred to as Proactive Key Caching (PKC) in Cisco documentation but is not the same
implementation as what has been defined as part of the 802.11i amendment.
• Is enabled by default for WPA2 WLANs using 802.1X key management.
• Fast roaming is performed by avoiding 802.1X/EAP authentications during a roam.
• Supported for centralized deployments.
• Provides scaling making it suitable for large scale enterprise deployments.
• Functions across WLCs in a mobility domain.
• Not supported for FlexConnect deployments.
The main disadvantage to OKC is in how the PMKs are distributed to the APs in the mobility zone.
Unless the AP management / control protocol is secured using a mechanism such as Datagram Transport
Layer Security (DTLS), the PMKs are distributed insecurely.
In a CUWN, OKC is supported by default on WPA2 WLANs using 802.1X key management for
FlexConnect deployments. In a FlexConnect deployment the mobility zone that defines the APs the
PMKs are distributed to is the FlexConnect group. When client successfully authentications, the WLC
distributes the PMK to all the APs in the FlexConnect group. As Cisco’s implementation of CAPWAP
is secured using DTLS, the PMK key distribution is secure.
As the PMK distribution is managed by the WLC it requires all of the FlexConnect APs to be in
connected mode. If the FlexConnect APs at a site transition into standalone mode, fast secure roaming
can only be provided for existing clients.
Summary:
• Opportunistic Key Caching (OKC) is used interchangeably with Proactive Key Caching (PKC),
however they are not the same thing.
• Is not defined as an IEEE 802.11 standard.
• Is enabled by default for WPA2 WLANs using 802.1X key management for FlexConnect
deployments.
• Fast roaming is performed by avoiding 802.1X/EAP authentications during a roam.
• Supported for FlexConnect only (locally or centrally switched).
• FlexConnect APs must be in connected mode when the PMK is initially derived.
• Functions across APs in the same FlexConnect group that are associated to the same WLC.
With 802.11r, the wireless client performs just one initial authentication against the WLAN
infrastructure when a connection is established to the first AP, and performs fast secure roaming while
roaming between APs within the same FT mobility domain. APs that use the same SSID (known as an
Extended Service Set or ESS) handle the same FT keys. The way the APs handle the FT mobility domain
keys is identical to PKC/OKC. For a CUWN, the WLC performs this task for all the CAPWAP APs under
its control and uses mobility messaging in order to exchange FT keys between other WLC peers within
its Mobility group.
Here is a summary of the key hierarchy:
• An MSK is still derived on the client supplicant and RADIUS server from the initial 802.1X/EAP
authentication phase (transferred from the RADIUS server to the WLC once the authentication is
successful). This MSK is used as the seed for the FT key hierarchy. When you use WPA2-PSK
instead of an EAP authentication method, the PSK is the MSK.
• A Pairwise Master Key R0 (PMK-R0) is derived from the MSK, which is the first-level key of the
FT key hierarchy. The key holders for this PMK-R0 are the WLC and the client.
• A second-level key, called a Pairwise Master Key R1 (PMK-R1), is derived from the PMK-R0, and
the key holders are the client and the APs managed by the WLC that holds the PMK-R0.
• The third and final level key of the FT key hierarchy is the PTK, which is the final key used in order
to encrypt the 802.11 unicast data frames (similar to the other methods that use WPA/TKIP or
WPA2/AES). This PTK is derived on FT from the PMK-R1, and the key holders are the client and
the APs managed by the WLC.
802.11r is supported by default for both Centralized and FlexConnect deployments (centralized or local
switching). To be supported by FlexConnect the WLAN authentication must be centralized. 802.11r is
not supported on FlexConnect APs using local authentication or FlexConnect APs operating in
standalone mode. FlexConnect APs within a given 802.11r roaming domain should belong to the same
FlexConnect group.
Summary:
1. Only supported on WPA2 WLANs using PSK or 802.1X key management.
2. Fast roaming is performed by avoiding 802.1X/EAP authentications and 4-way handshakes during
a roam.
3. Supported for both Centralized and FlexConnect (centralized or locally switched) deployments:
a. Centralized – Works across WLCs in the same Mobility group.
b. FlexConnect – Works across APs in the same FlexConnect group.
4. FlexConnect requires WLANs to be configured for centralized authentication, local authentication
is not supported. Fast secure roaming is not supported on FlexConnect APs operating in standalone
mode.
Note For Additional details on IEEE 802.11r and other 802.11 amendments, please see 802.11r Fast
Transition Roaming
Considerations
The following provides some considerations that need to be made when selecting a fast secure roaming
method for WLANs:
• It is very important to understand that fast secure roaming methods are developed in order to
accelerate the roaming process when clients move between APs on WPA2 WLANs with security
enabled. When no WLAN security is in place, there is no 802.1X/EAP authentication or 4-way
handshake that can be avoided to accelerate the roam.
• 802.11r is the only fast secure roaming method that supports WPA2-PSK. 802.11r accelerates
WPA2-PSK roaming events avoiding the 4-way handshake.
• None of the fast secure roaming methods will work in FlexConnect deployments when WLANs are
configured for local authentication. If local authentication is enabled, the clients will perform a full
authentication during a roam.
• All of the fast secure roaming methods have their advantages and disadvantages, but in the end, you
must verify that the wireless client stations support the specific method that you want to implement.
You must select the best method that is supported by the wireless clients that connect to the specific
WLAN/SSID. For example, in some deployments you might create a WLAN with CCKM for Cisco
wireless IP Phones (which support WPA2/AES with CCKM, but not 802.11r), and then another
WLAN with WPA2/AES via 802.11r/FT for wireless clients that support 802.11r (or use OKC/PKC,
if this is what is supported).
• If the 802.1X clients do not support any of the fast secure roaming methods available, those clients
will always experience delays when roaming between APs. The 802.1X clients will need to perform
a full 802.1X/EAP authentication and 4-way handshake during a roaming event. This can cause
disruptions to applications and services.
• All fast secure roaming methods (except PMKID/SKC) are supported between APs managed by
different WLCs (inter-controller roaming), as long as the WLCs are members of the same Mobility
group.
Adaptive 11r
802.11r enabled WLAN provides faster roaming for wireless client devices. It is desired that Apple iOS
devices be able to join a WLAN with 11r enabled for better roaming experience. However, if 11r is
enabled on a WLAN, the legacy devices that do not recognize the FT AKM’s beacons and probe
responses will not be able to join the WLAN. We need a way to identify the Client device capability and
allow 11r capable device to join on the WLAN as an FT enabled device and at the same time to allow
legacy device to join as an 11i/WPA2 device. Cisco WLC Software release 8.3 will enable 802.11r on
an 802.11i-enabled WLAN selectively for Apple devices . The capable Apple devices will identify this
functionality and perform an FT Association on the WLAN. The Cisco Wireless infrastructure will allow
FT association on the WLAN from devices that can negotiate FT association on a non-FT WLAN.
In addition, with WLC AireOS code 8.3, 802.11k and 11v features are enabled by default on an SSID.
These features help clients roam better by telling them when to roam and providing them with
information about neighboring APs so that no time is wasted scanning when roaming is needed. Since
Apple devices support dual-band, the 802.11k neighbor list is updated on dual-band, adaptively for 1.
On the Cisco Infrastructure side, Cisco AP will advertise the support for adaptive 802.11r in beacons and
probes, and FT over the DS capability will be set.
On the client side, Apple devices running iOS 10 or higher will look for the adaptive 11r feature support
in the IE. If the capability bit is set, it will look for AKM (dot1x or PSK) and use FT dot1x or FT PSK
respectively. The Apple device will send IE with FT support in its association request and also include
the Vendor specific OUI.
Cisco WLAN will process the association request and respond with 802.11r support in association
response, allowing FT association. The 4-Way handshake will involve FT Association.
This feature is supported on Local mode as well as FlexConnect mode APs, for all 802.11n and 802.11ac
wave 1 APs for AireOS code release 8.32 and higher and 8.3.11.0 for Wave2 APs
2. AP1600/2600 Series Access Points, AP1700/2700 Series Access Points, AP3500 Series Access Points, AP3600
Series Access Points + 11ac Module, WSM, Hyperlocation module, 3602P, AP3700 Series Access Points +
WSM, 3702P, OEAP600 Series OfficeExtend Access Points, AP700 Series Access Points, AP700W Series
Access Points, AP1530 Series Access Points, AP1550 Series Access Points, AP1570 Series Access Points,
and AP1040/1140/1260 Series Access Points.
The WLC CAPWAP split MAC method treats broadcast traffic differently, as shown in Figure 2-35. In
this case, when a broadcast packet is sent by a client, the AP/WLC does not forward it back out the
WLAN, and only a subset of all possible broadcast messages are forwarded out a given WLAN's wired
interface at the WLC.
Note The protocols forwarded under which situations is discussed in the following section.
DHCP
The WLC acts as a DHCP relay agent for associated WLAN clients. The WLC unicasts client DHCP
requests to a locally configured or upstream DHCP server except during Layer 3 client roaming
(discussed in more detail below). DHCP server definitions are configured for each dynamic interface,
which in turn is associated with one or more WLANs. DHCP relay requests are forwarded by way of the
dynamic interfaces using the source IP address of a given dynamic interface. Because the WLC knows
which DHCP server to use for a given interface/WLAN, there is no need to broadcast client DHCP
requests out its wired and wireless interfaces.
This method accomplishes the following:
• It eliminates the need for DHCP requests to be broadcasted beyond the WLC.
• The WLC becomes part of the DHCP process, thereby allowing it to learn the MAC/IP address
relationships of connected WLAN clients, which in turn allows the WLC to enforce DHCP policies
and mitigate against IP spoofing or denial-of-service (DoS) attacks.
VideoStream
The VideoStream feature makes the IP multicast stream delivery reliable over the air, by converting the
broadcast frame over the air to a unicast frame. Each VideoStream client acknowledges receiving a video
IP multicast stream. VideoStream is supported on all Cisco APs.
The following are the recommended guidelines for configuring VideoStream on the controller:
• The AP1100 and AP1200 do not support the reliable multicast feature.
• Ensure that the multicast feature is enabled. As a best practice Cisco recommends configuring IP
multicast on the controller with multicast-multicast mode.
• Check for the IP address on the client device. The device should have an IP address from the
respective VLAN.
• Verify that the AP has joined the controllers.
• Ensure that the clients are able to associate to the configured WLAN at 802.11a/n/ac speed.
Design Considerations
For a Cisco Unified Wireless Network deployment, the primary design considerations are WLC location
and AP/WLC connectivity. This section will briefly discuss these topics for centralized (local-mode) AP
deployments and make general recommendations where appropriate. Recommendations and design
considerations for FlexConnect AP deployments are not covered in this section and are instead discussed
in Chapter 7, “FlexConnect”.
WLC Location
A Cisco Unified Wireless Network allows the WLCs to be centrally located or distributed within a
campus depending on the size and type of the deployment. The different deployment types and
considerations are described in the following sections.
WLC Homologation
Prior to release 8.2 only 20 countries were supported on the WLC, begin with release 8.2 110 countries
are supported on the WLC for distributed controller configuration and concurrent country support with
different region-specific APs.
http://www.cisco.com/c/dam/assets/prod/wireless/wireless-compliance-tool/index.html#wp9005314
Reference Architectures
Cisco’s recommendation for the WLC placement is dependent on the size and scale of the Cisco Unified
Wireless Network deployment. The following section provides reference architectures with
recommended WLC placement and redundancy configuration for small, medium, large and very large
campus networks each based on Cisco’s hierarchical design principles. A reference architecture for a
remote branch office deployment using local-mode APs is also provided at the end this section.
Note Additional details for Cisco validated designs and best practices can be viewed at:
http://www.cisco.com/c/en/us/solutions/enterprise/design-zone/index.html
Small Campus
Figure 2-38 shows the recommended WLC placement for a CUWN deployment for a small campus
network implementing a distribution layer operating as a collapsed core. The distribution layer provides
connectivity to the WLCs, WAN and Internet edge. Depending on the size of the LAN, the WLCs may
connect directly to distribution layer or be connected by means of a dedicated switch block (as shown).
The small campus in this example is a single building with multiple access layer switches.
Figure 2-39 shows additional details for the wireless services block for a small campus network
deployment. In this example a pair of WLCs are connected to a dedicated services switch block (Catalyst
chassis or resilient stack) that connects to the distribution layer. The services switch block can be
dedicated to services or connect both the data center and services blocks. The switch block is connected
to the distribution layer using layer 3 links implementing EIGRP or OSPF for route aggregation. The
WLCs in this example are considered to be centralized.
The WLCs connect to the services switch block using static port-channels configured for 802.1Q VLAN
tagging. The wireless management, data and voice VLANs are all 802.1Q tagged between the WLCs and
the services switch block. The services switch block provides first-hop unicast and multicast routing for
each of the wireless VLANs.
For a small campus deployment Cisco recommends a pair of Cisco 5508 or Cisco 5520 WLCs configured
for HA-SSO. The WLC model you select will depend on the specific throughput that is required for the
site. The redundancy ports for both WLCs are directly connected as both WLCs reside in the same
physical data center. The APs are configured to use the HA-SSO pair as their primary WLC. All
configuration is automatically synchronized between the active and standby-hot WLC.
Medium Campus
Figure 2-40 shows the recommended WLC placement for a CUWN deployment for a medium campus
network implementing a dedicated distribution layer. The benefits for deploying a dedicated distribution
layer for larger networks is well documented and understood. The WLCs in this architecture connect
directly to the core layer by means of a dedicated switch block. The medium campus in this example is
a single building with multiple floors each with multiple access layer switches.
Figure 2-41 shows additional details for the wireless services block for a medium campus deployment.
In this example a pair of WLCs are connected to a dedicated services switch block that connects to the
core layer. The services switch block is a pair of Catalyst switches configured for multilayer or VSS.
The services switch block is connected to the core layer using layer 3 links implementing EIGRP or
OSPF for route aggregation. The WLCs in this example are considered to be centralized.
The WLCs connect to the services switch block using static port-channels configured for 802.1Q VLAN
tagging. The wireless management, data and voice VLANs are all 802.1Q tagged between the WLCs and
the services switch block. The services switch block provides first-hop unicast and multicast routing for
each of the wireless VLANs.
For a medium campus deployment Cisco recommends a pair of Cisco 3504, Cisco 5508 or Cisco 5520
WLCs configured for HA-SSO. The WLC model you select will depend on the specific throughput that
is required for the site. The redundancy ports for both WLCs are directly connected as both WLCs reside
in the same physical data center. The APs are configured to use the HA-SSO pair as their primary WLC.
All configuration is automatically synchronized between the active and standby-hot WLC.
Large Campus
Figure 2-42 shows the recommended WLC placement for a CUWN deployment for a large campus
network consisting of multiple buildings connected to a campus core. The WLCs in this architecture are
distributed between the buildings where each pair of WLCs manages the APs within their given building.
The WLCs in this architecture connect directly to the distribution layer within each building.
As multiple pairs of WLCs are distributed throughout the campus, each WLC is assigned as a member
of the same Mobility group to provide seamless mobility to clients as they roam throughout the campus.
The WLCs in each building are assigned different wireless management and user VLANs that terminate
at the distribution layer within each given building. Mobility tunnels are used to forward roam user’s
traffic between the foreign and anchor WLCs through the campus core.
Distributing the WLCs between the buildings provides several scaling advantages as the number of
wireless clients supported by a CUWN increases. As more devices are added to the wireless network,
the number of layer 2 and layer 3 table entries that are processed and maintained by the service block
switches increases exponentially. This results in a higher CPU load on the service block switches.
Why is this consideration important? The current generation of WLCs can scale to support up to 6,000
APs and 64,000 clients. In a pure IPv4 environment, this can result in a 128,000 entries being processed
and maintained by the service block switches. As most wireless clients also support a dual-stack, the
number of entries that are processed and maintained increase further.
As a best practice Cisco recommends distributing the WLCs for large campus deployments supporting
25,000 or more wireless clients. Distributing the WLCs spreads the MAC, ARP and ND processing and
table maintenance between the distribution layer switches reducing CPU load. This architecture also
allows for faster convergence during a distribution layer failure as only a subset of the entries need to be
re-learned by the affected distribution layer. If the campus deployment supports fewer than 25,000
clients, a centralized WLC architecture can be employed where the WLCs are connected to the core by
means of a dedicated switch block (see medium campus).
Figure 2-43 shows additional details for the wireless services block for a large campus deployment. In
this example each pair of WLCs are connected to the distribution layer switches within each building.
The distribution layer switches are Catalyst switches configured as multilayer or VSS that connect to the
core layer using layer 3 links. EIGRP or OSPF is used for route aggregation.
The WLCs connect to the distribution switches using static port-channels configured for 802.1Q VLAN
tagging. The wireless management, data and voice VLANs are all 802.1Q tagged between the WLCs and
the distribution switches. The distribution switches provides first-hop unicast and multicast routing for
each wireless VLAN.
For large campus deployments Cisco recommends a pair of Cisco 5520 or 8540 WLCs within each
distribution layer configured for HA-SSO. The WLC model that you select for each building will depend
on the number of APs and the throughput required for each building. The redundancy ports for both
WLCs can be directly connected or extended over a dedicated layer 2 VLAN depending on the physical
location of the distribution layer switches.
The APs within each building are configured to use their local HA-SSO pair as their primary WLC.
Additional redundancy is provided using N+1 redundancy by configuring a different buildings HA-SSO
pair as the secondary WLC. The necessary WLANs, AP groups and RF groups are defined on both the
primary and secondary HA-SSO pairs.
Note The configuration requirements of the distribution layer switches different depending on if they are
configured as multilayer or VSS. A detailed overview of the requirements for each implementation is
provided in the High Availability, page 2-43 section of this chapter.
Figure 2-44shows the recommended WLC placement for a CUWN deployment for a very large campus
network supporting hundreds of buildings that connect to a distributed core layer. Each distributed core
switch acting as a distribution layer within the campus core. Large buildings in the campus implement
their own distribution and access layers while smaller buildings implement only an access layer.
The WLCs in this architecture are distributed between the core layer switches where each pair of WLCs
manages the APs for groups of buildings. Each wireless services block can support up to 6,000 APs,
25,000 and 40Gbps of throughput. The WLCs in each wireless services block are assigned different
wireless management and user VLANs that terminate at the distributed / core layer servicing each group
of buildings. The number of required wireless services blocks being determined by the number of
wireless devices that need to be supported.
The example campus network shown in Figure 2-44 implements four separate wireless services blocks,
each block supporting groups of buildings placed into a specific zone. This CUWN design comfortably
scaling to support up to 24,000 APs and 100,000 clients.
The Mobility group design for a very large campus is also an important consideration and is dependent
on the wireless coverage provided between the buildings and zones. Ideally the buildings placed into
each zone representing a wireless coverage area.
• If continuous wireless coverage is provided within each zone and between zones, a single Mobility
group can be defined. Each pair of WLCs configured as members of the same Mobility group.
Wireless clients will be able to seamlessly roam throughout the campus while maintaining their
original network membership.
• If continuous wireless coverage is only provided within each zone, separate Mobility groups must
be deployed. Each pair of WLCs configured with a separate Mobility group. Wireless clients will be
able to maintain their network membership within the zone and be assigned to a new network when
they connect to an AP in a separate zone.
• If continuous wireless coverage is provided between some of the zones, the WLCs servicing those
zones maybe assigned to the same Mobility group. Wireless clients will be able to maintain their
network membership within those zones and be assigned to a new network when they connect to an
AP in a separate zone.
Figure 2-45 shows additional details for the wireless services block for a very large campus deployment.
In this example each pair of WLCs are connected to the distribution / core layer switches servicing each
group of buildings. The distribution / core layer switches are Catalyst switches configured as multilayer
or VSS that are interconnected using layer 3 links. EIGRP, OSPF or BGP is used for route aggregation.
The WLCs connect to the distributed core switches using static port-channels configured for 802.1Q
VLAN tagging. The wireless management, data and voice VLANs are all 802.1Q tagged between the
WLCs and the distributed / core switches. The distribution / core switches provides first-hop unicast and
multicast routing for each wireless VLAN.
For very large campus deployments Cisco recommends a pair of Cisco 8540 WLCs within each
distribution layer configured for HA-SSO. The redundancy ports for both WLCs can be directly
connected or extended over a dedicated layer 2 VLAN depending on the physical location of the
distribution layer switches.
The APs within each zone are configured to use their designated HA-SSO pair as their primary WLC.
Additional redundancy is provided using N+1 redundancy by configuring a different zones HA-SSO pair
as the secondary WLC. The necessary WLANs, AP groups and RF groups are defined on both the
primary and secondary HA-SSO pairs.
Note The configuration requirements of the distribution layer switches different depending on if they are
configured as multilayer or VSS. A detailed overview of the requirements for each implementation is
provided in the High Availability, page 2-43 section of this chapter.
Branch
A Cisco Unified Wireless Network provides two architectures to support remote branch offices
connected over a wide area network (WAN). For branch sites network administrators can implement APs
operating in local or FlexConnect modes. Both CUWN architectures operate differently and solve
different business needs. This section provides details for local mode AP deployments only. Additional
details and recommendations for FlexConnect AP deployments is discussed in Chapter 7,
“FlexConnect”.
A branch site implementing local mode APs follows the small campus architecture where a WLC is
placed directly within a branch. All CAPWAP tunnels stay within the branch. If multiple branch sites
with local mode APs are deployed, it is considered a distributed architecture as WLCs are deployed in
one or more branches connected by means of a WAN.
Figure 2-46 shows the recommended WLC placement for a CUWN deployment for a small branch
network implementing a distribution layer operating as a collapsed core. The distribution layer provides
connectivity to the WLCs, WAN and Internet edge. Depending on the size of the branch, the WLCs may
connect directly to distribution layer (as shown) or be connected by means of a dedicated switch block.
The branch network in this example is a single building with one distribution layer two access layer
switches.
Figure 2-47 shows additional details for the wireless services block for a branch network deployment.
In this example a pair of WLCs are connected directly to the distribution layer using static port-channels
configured for 802.1Q VLAN tagging. The wireless management, data and voice VLANs are all 802.1Q
tagged between the WLCs and the distribution layer. The distribution layer provides first-hop unicast
and multicast routing for each of the wireless VLANs.
For a branch office deployment Cisco recommends a pair of Cisco 2504 WLCs configured for N+1 HA.
The Cisco 2504 WLC is designed specifically for branch office deployments and can scale to support up
to 75 APs. Both WLCs are configured are assigned to the same Mobility group and are configured to
support the same interfaces / interface groups, WLANs, AP groups and RF groups. The APs are
configured to use the permanently licensed WLC as their primary WLC and the HA-SKU WLC as their
secondary WLC.
Note Cisco does not support deploying local mode APs using a centralized WLC over a wide area network. If
remote APs need to be supported over a WAN, Cisco recommends implementing the FlexConnect
architecture.
Traffic Engineering
Any WLAN traffic that is tunneled to a centralized WLC is then routed from the location of the WLC to
its end destination in the network. Depending on the distance of the tunnel and location of the WLC,
WLAN client traffic might not otherwise follow an optimal path to a given destination. In the case of a
traditional access topology or distributed WLC deployment, client traffic enters the network at the edge
and is optimally routed from that point based on destination address.
The longer tunnels and potentially inefficient traffic flows associated with a centralized deployment
model can be partially mitigated by positioning the WLCs in that part of the network where most of the
client traffic is destined (for example, a data center). Given the fact that most enterprise client traffic goes
to servers in the data center and the enterprise backbone network is of low latency, any overhead
associated with inefficient traffic flow would be negligible and would be of no consequence when
considering a centralized deployment model over a distributed one.
For most enterprises, the introduction of a WLAN does not result in the introduction of new applications,
at least not immediately. Therefore, the addition of a Cisco Unified Wireless Network alone is not likely
to have a significant impact on the volume of campus backbone traffic.
AP Connectivity
APs should be on different subnets from the end users (802.11 clients). This is consistent with general
best-practice guidelines that specify that infrastructure management interfaces should be on a separate
subnet from end users. Additionally, Cisco recommends that Catalyst Integrated Security Features
(CISF) be enabled on the CAPWAP AP switch ports to provide additional protection to the WLAN
infrastructure. (FlexConnect AP connectivity is discussed in Chapter 7, “FlexConnect”).
DHCP is generally the recommended method for AP address assignment, because it provides a simple
mechanism for providing current WLC address information for ease of deployment. A static IP address
can be assigned to APs, but requires more planning and individual configuration. Only APs with console
ports permit static IP address configuration.
In order to effectively offer WLAN QoS within the Cisco Unified Wireless Network, QoS should also
be enabled throughout the wired network that provides connectivity between CAPWAP APs and the
WLCs.
• Client can maintain IP address and policy across heterogeneous access networks with different
technologies and/or vendors.
• Bypass MAC address scaling limitation of the L2 switch connecting to the WLC.
• Lawful Intercept (LI).
The EoGRE Tunneling offers the following benefits for mobile operators:
• Reduces network congestion by reducing OpEx and increasing network efficiency by offloading 3G
and 4G traffic.
• Provides access to 3G and 4G core in spite of a lack of weak cell signal, leading to subscriber
retention.
• Lowers CapEx on per user basis or bandwidth basis in dense metro environments.
The EoGRE tunneling offers the following benefits for wireline and Wi-Fi operators:
primary or active tunnel fails, the secondary or standby tunnel will take over the operation of the EoGRE
tunnel. Intra-controller and Inter-controller mobility is also supported with the EoGRE tunnel
configuration.
The WLC in release 8.1 and above supports two tunnel type configurations on the northbound interface:
1. IP/GRE as defined in PMIPv6 (RFC 5213) – L3
2. Ethernet over GRE – L2
Only one type of tunnel is supported per WLAN. EoGRE is supported on either open or 802.1x based
WLANs. Tunneled clients support EAP-SIM or EAP-AKA mode only. Other authentication modes are
not supported by the tunneled clients.
When open SSID WLAN is used, either all local/simple or all tunneled clients are supported but cannot
be mixed on the same WLAN. However, 802.1x authenticated simple or tunneled EoGRE clients are
supported on the same WLAN.
Prior to Release 8.3, only WLANs configured for Open and WPA2-802.1X were supported.
It is now possible to assign EoGRE Tunnel Profiles to WLANs configured for Internal WebAuth and
WPA2-PSK. WLANs configured with WPA2-PSK / WPA2-802.1X and Internal WebAuth are also
supported.
Based on authentication, clients will be separated into local or tunneled mode. The WLC supports two
types of user’s traffic such as Remote-Tunneled and Local on the same WLAN.
Local users traffic is defined as traffic that is locally bridged by the WLC.
Remote-Tunneled user traffic is defined as traffic of remote-tunnel users and is tunneled by the WLC to
a TGW.
AAA override for EoGRE users is supported. Tunnel gateway can also act as AAA proxy.
If AAA Override is enabled on the controller for EoGRE EAP authenticated clients:
• WLC parses Access Accept and looks for MPC-Protocol-Type, such as EoGRE, GTPv2 or PMIPv6.
• If the Protocol-Type AVP exists, WLC looks for all parameters related to that tunnel-type. The static
profile is ignored and the AAA provided parameters are used to setup tunnel.
• If AVP is not present, WLC uses static profile on WLC to determine tunnel type based on the realm
extracted from user name.
• If some of the parameters are not present, the authentication fails. For example, if everything is
present except T-GW IP, then the client authentication fails.
• If the MPC-Protocol-Type is None, then it will be simple IP.
Some of the attributes that can be returned by the AAA server are: User-Name, Calling-Station-Id,
gw-domain-name, mn-service, cisco-mpc-protocol-interface, and eogre_vlan_id.
Note In redundancy tunnel configuration mode, the keep-alive pings will be sent from every FC AP that is
configured in the EoGRE tunnel mode.
For additional design and configuration details please see the EoGRE Deployment Guide at the link
below
https://www.cisco.com/c/en/us/support/wireless/wireless-lan-controller-software/products-technical-re
ference-list.html
WLC Discovery
The different WLC discovery mechanisms for APs (discussed earlier) make initial deployment of
CAPWAP APs very simple. Options include:
• Staging (priming) CAPWAP APs in advance using a WLC in a controlled environment
• Deploying them right out of the box by using one of the auto discovery mechanisms (DHCP or DNS)
Although auto discovery is highly useful, a network administrator will generally want to be able to
control which WLC an AP will join once it is connected to the network for the first time. Subsequently,
an administrator will want to define which WLC will be the primary for a given AP during normal
operation in addition to configuring secondary and tertiary WLCs for backup purposes.
AP Distribution
In a typical initial WLAN deployment, the APs automatically distribute themselves across the available
WLCs based on the load of each WLC. Although this process makes for an easy deployment, there are
a number of operational reasons not to use the auto distribution method.
APs in the same physical location should be joined to the same WLC. This makes it easier for general
management, operations and maintenance, allowing staff to control the impact that various operational
tasks will have on a given location, and to be able to quickly associate WLAN issues with specific WLCs,
whether it be roaming within a WLC, or roaming between WLCs.
The elements used to control AP distribution across multiple WLCs are:
• Primary, secondary, and tertiary WLC names – Each AP can be configured with a primary,
secondary, and tertiary WLC name, which in turn determines the first three WLCs in the mobility
group that the AP will prefer to join regardless of the load variations across WLCs in the mobility
group.
• Master WLC – When an AP joins a WLC for the first time in a mobility group, it is not yet
configured with a preferred primary, secondary, and tertiary WLC; therefore, it will be eligible to
partner with any WLC (within the mobility group) depending upon the perceived WLC load. If a
WLC is configured as a master WLC, all APs without primary, secondary, and tertiary WLC
definitions will join with the master WLC. This allows operations staff to easily find newly joined
APs and control when they go into production by defining the primary, secondary, and tertiary
WLCs name parameters.
Best Practices
For convenience of network deployment engineers, starting with CUWN software release 8.1, a best
practices checklist is available within the dashboard for WLAN controllers (Figure 2-48). The checklist
is used to fine tune WLC configuration to match the best practices as suggested by Cisco. The checklist
compares the local configuration on the WLC with recommended best practices and highlights all of the
features that differ. The check also provides a simple configuration panel to turn on the best practices.
Use of best practices is highly recommended for all CUWN deployments.
The dashboard checks the adherence for each recommended feature and provides feedback about the
compliance of each one. A best practice score is displayed based on the number of recommended
features that are enabled. Each recommended features is categorized as either Infrastructure, Security or
RF Management and the majority can be enabled directly within the dashboard using a single mouse
click. Additional information about a specific feature as well as the benefits are also provided in the
dashboard.
Note A full list of each of the current best practices provided in the dashboard is available at:
http://www.cisco.com/c/en/us/td/docs/wireless/controller/best-practices/base/b_bp_wlc.html
The WLAN Configuration Best Practice under these sections expands into a detailed listing of best
practices enabled and disabled on a per-WLAN Basis which lends to easy visualization of the best
practice feature gaps
Note A full list of each of the current best practices provided in the dashboard is available at:
https://www.cisco.com/c/en/us/td/docs/wireless/controller/best-practices/base/b_bp_wlc.html
This chapter describes the basic information necessary to understand radio frequency (RF)
considerations in planning for various wireless local area network (WLAN) environments. The topics of
this chapter includes:
• Regulatory domains and RF considerations
• IEEE 802.11 standards
• RF spectrum implementations of 802.11b/g/n (2.4-GHz) and 802.11a/n/ac (5-GHz)
• Planning for RF deployment
• Radio resource management (RRM) algorithms and configuration
• RF Profiles and fine tuning
RF Basics
In the United States there are three main bands (frequency ranges) allocated for unlicensed industrial,
scientific, and medical (ISM) usage.
The ISM bands are designated as the:
• 900 MHz band: 902 to 928 MHz
• 2.4 GHz band (IEEE 802.11b/g/n): 2.4 to 2.4835 GHz
• 5 GHz band (IEEE 802.11a/n/ac):
• 5.150 to 5.250 GHz (UNII-1)Originally for indoor use only (indoor/outdoor now permitted US)
– 5.250 to 5.350 GHz (UNII-2a)
– 5.350 to 5.470 GHz (U-NII-2b) <-Proposed but not yet approved
– 5.5504 to 5.725 GHz (UNII-2c)
– 5.725 to 5.875 GHz (UNII-3)
– 5.825 to 5.925 GHz (U-NII-4)
The 900 MHz band is not used for Wi-Fi. Each of the remaining bands has different characteristics and
for Wi-Fi the pro’s and con’s depend on what your coverage and capacity goals are, and what is already
occupying the spectrum in your location. See deployment considerations later in this chapter for more
detail.
It is important to understand how Wi-Fi differs from modern day LAN implementations. A modern day
wired LAN is most often a full duplex, switched infrastructure. This means that traffic is sent and
received simultaneously and switched between active ports, so a client can both transmit and receive
concurrently. A telephone conversation is full duplex – see Figure 3-1.
Wi-Fi on the other hand is half duplex (Fig. 2), meaning we can either Transmit (Tx) to or Receive (Rx)
from a client/AP on the medium, the clients and the network take turns accessing the medium – it is a
shared broadcast and collision domain. Wi-Fi is contention based – meaning there are rules for stations
trying to access the medium and collisions (due to two or more stations simultaneously accessing the
medium) are worked out fairly so everyone gets a chance.
the channel selection to coordinate multiple AP’s and neighbors for optimal performance. (See Radio
Resource Management - RRM below in this document.)
Channel assignment and reuse for the network is a big factor in determining the airtime efficiency and
ultimately the bandwidth that can be delivered to the clients. When two AP’s can hear one another on
the same channel the result can be co-channel interference unless the overlapping BSS is managed
carefully. Whether co-channel interference is the result of your own AP’s, or your AP and a neighbor
doesn’t matter– either way the AP’s must share the channel. In order to produce a good physical design,
four things must be considered:
• AP placement
• AP operating band (2.4 GHz or 5 GHz)
• AP channels selected
• AP power levels assigned
The goal in a good design is to produce even wireless coverage (similar conditions end to end) with
minimal co-channel interference maximizing the available potential bandwidth for the client devices.
Cisco’s RRM, Radio Resource Management, calculates and assigns the best channels and power
combinations using measured, over the air metrics. Over The Air observations include Wi-Fi networks
operating within the infrastructure as well as existing external users Wi-Fi and non-Wi-Fi of the
spectrum. RRM will mitigate co-channel assignments and balance power, but if there are no open
channels available, or the AP’s are simply too close together the only choice remaining is sharing the
channel with an existing user. This happens in congested environments and two different networks may
have to share the same bandwidth. If one or the other is not busy – the other may use all of the bandwidth.
If both become busy, they will share the bandwidth 50/50 due to 802.11’s contention mechanisms
(“listen before talk”) that are designed to ensure fair access.
Regulatory Domains
Devices that operate in unlicensed bands do not require a formal licensing process by the end user.
However equipment designed and built for operating 802.11 in the ISM bands is obligated to follow the
government regulations for the region it is to be used in. “Unlicensed, does not mean “without rules”.
Cisco Wireless equipment is designed and certified to operate and meet the regulatory requirements for
specific regions. Regulatory designations are either included in the part numbers for pre provisioned
region.
The end user bears responsibility for correct implementation and ensuring that the correct equipment is
used for the specified region. Your Cisco sales team can guide you in selection. For provisioning a
universal AP – at least one AP must be provisioned using the smart-phone application to ensure the GPS
location of the AP. This ensures that the AP is physically located in the region being activated for. Once
provisioning of the first UAP is completed, other UAP’s may be provisioned off the initial UAP with
enable radio interfaces.
The regulatory agencies in different regions of the world monitor the unlicensed bands according to their
individual criteria. WLAN devices must comply with the specifications of the relevant governing
regulatory body. Although the regulatory requirements do not affect the interoperability of IEEE
802.11b/g/n- and 802.11a/n/ac-compliant products, the regulatory agencies do set certain criteria in the
product implementation. For example, the RF emission requirements for WLAN are designed to
minimize the amount of interference any radio (not just Wi-Fi) can generate or receive from any other
radio in the same proximity. It is the responsibility of the WLAN vendor to obtain product certification
from the relevant regulatory body. And it is the responsibility of the installer to ensure that the resulting
installation does not exceed those requirements. We recommend and certify the use of antenna’s and
radio combinations that meet regulatory requirements.
Besides following the requirements of the regulatory agencies, Cisco ensures interoperability with other
vendors through various Wi-Fi Alliance (WFA) certification programs (www.wi-fi.org).
Operating Frequencies
The 2.4-GHz band regulations of 802.11b/g/n have been relatively constant, given the length of time they
have been in operation. The FCC (U.S) allows for 11 channels, ETSI (and most other parts of the world)
allow for up to 13 channels, and Japan allows up to 14 channels but requires a special license and
operating modes to operate in channel 14.
Countries that adhere to the 5.0-GHz band regulations of 802.11a/n/ac are more diverse in the channels
they allow and their rules for operation. In general, with the advancement of 802.11ac most are now
considering opening more spectrum for 5 GHz Wi-Fi – and all have more non overlapping channels in
5 GHz than is available anywhere in 2.4 GHz.
These frequency bands and their associated protocols can and do change as the technology evolves and
regulatory rules change. All Cisco AP’s regulatory certifications and allowed frequencies and channels
are documented in their individual data.
802.11b
The 802.11b protocol was ratified as an amendment to the 802.11 standards in 1999. It added support
for data rates of 5.5 and 11 Mbps and enjoys broad user acceptance and vendor support. 802.11b has
been deployed by thousands of organizations, as it was the first standardized specification for modern
Wi-Fi communications. It is the least efficient of all the protocols available today, which means that you
will exhaust available airtime quite rapidly using this protocol and with less airtime; you can support
less users. 802.11b is based on a single transmitter/receiver design and suffers from multipath frequency
phenomena that affects reliability and makes design more difficult. What remains of true 802.11b clients
can generally be found in application specific appliances such as bar code scanners or printers generally
in Logistics, Retail or Health Care verticals. Modern day radios that are able to support 802.11b are
generally all implemented on radios designed for 802.11n and improve the reliability (MRC Receivers),
but not the efficiency of the 802.11b standard.
802.11g
The 802.11g protocol, which was ratified as an amendment to the 802.11 IEEE standards in 2003,
operates in the same spectrum as and is backwardly compatible with the 802.11b specification. The
802.11g standard uses a completely different modulation technique (OFDM) and supports data rates of
6, 9, 12, 18, 24, 36, 48, and 54 Mbps. While backwardly compatible, this compatibility comes at a cost
to airtime and additional management overhead required for 802.11b which reduces the overall gains
that could be realized with 802.11g when operating in an 11g only client environment. Performance in
a mixed 802.11b 802.11g environment will cost as much as 50% of a cells potential capacity. Initial
802.11g radios like 802.11b designs also had a single receiver and transmitter and where subject to a lot
of the same reliability issues in implementation.
802.11n
The 802.11n protocol, which was ratified as an amendment to the 802.11 standards in 2009 allows for
usage in either 2.4 or 5 GHz bands and introduces MIMO (multiple input, multiple output) using
multiple radios allows for encoding multiple Spatial Stream’s simultaneously (i.e) up to 4 times the data
in the same amount of airtime theoretically, 3 spatial Streams is the practical limit. The 2.4 GHz band
supports data rates up to 216 Mbps (assuming 20 MHz channel and 3 spatial stream transmitter). 802.11n
also specifies a wider channel operation at 40 MHz commonly referred to as a bonded channel as it
requires two 20 MHz channels to make a single 40 MHz channel. We do not support bonding of channels
in 2.4 GHz because of interference issues associated with only having 3 non-overlapping channels
available (Figure 3-3). The number of devices, which support 3 spatial streams, is limited to higher end
laptops and tablets as well as access points. Two spatial stream devices are more plentiful but still limited
to Laptops and tablets, with only a few of the newest smartphones now support multiple spatial streams.
In all cases, 802.11n products introduced a technology for receivers called MRC (Maximal Ratio
Combining) a technique which relied on multiple receivers/antenna’s to mitigate the reliability issues
associated with early 802.11b and 802.11g/a receivers and improved the overall reliability and
performance of Wi-Fi. Therefore, modern 802.11n based radios improve on reliability when operating
under the 802.11g standard.
Channel plans for the 2.4 GHz band identify 14 Overlapping channels, but only 3 of these are Channels
1,6,11 are highlighted below, note that all other channels overlap or share boundaries and in the US only
1,6,11 are available for non-interfering channel operation.
Note In some regulatory domains, it has been suggested that a 4 channel plan will work. This continues to
come up time and again however without going into a lot of detail about what happens outside of the
channel boundaries – there is simply not enough space between channels left for this to work practically
in anything but the least dense environments. Also consider that the majority of the world agrees on
1,6,11 and most radios will default to this channel plan – in such a case if you have selected 1,5,9,13 any
radio using the standard channels will interfere with at least one – in most cases 2 of your channels – We
do not recommend it for these reasons.
Valid strategies for reducing the congestion in 2.4 GHz include reduction in self interference by:
1. Disabling the 802.11b data rates – this will reduce the area of coverage/interference and eliminate
the least efficient protocols from the air
2. Choosing a relatively high minimum mandatory data rates – this also reduces effective
coverage/interference and data rates of 12-18 Mbps are used in high density deployments
3. No more than 3-4 SSID’s (WLAN’s) on any one AP, as each AP must broadcast each configured
WLAN – this can dramatically reduce the management overhead associated with the physical
channel
4. Eliminate known non Wi-Fi interference sources, CleanAir can help you identify, evaluate and
locate these.
For interference coming from neighboring Wi-Fi networks that are not part of your solutions. All involve
additional hardware and complexity in design. If you have a valid need for critical operations in 2.4 GHz
it is recommended that you employ someone who has experience with this level of design.
5 GHz - 802.11a/n/ac
Operating in the unlicensed portion of the 5 GHz radio band, 802.11a/n/ac radios are immune to
interference from ALL devices that operate in the 2.4 GHz band, including non Wi-Fi interference from
consumer devices. The 5 GHz band available for Wi-Fi use can differ significantly around the world from
100 to 300 MHz, but in all cases there is more bandwidth available than in 2.4 GHz spectrums.
Because the 802.11a/n/ac standards operate in a different frequency range, 2.4 and 5 GHz band devices
can operate in the same physical environment without interfering with each other. Most Cisco AP’s
support both 2.4 and 5 GHz dual band operation. There are three protocol specifications ratified for use
in 5 GHz Wi-Fi, 802.11a, 802.11n and 802.11ac. The range of frequencies/channels is broken into
different frequency segments in 5 GHz – and the range of frequencies has increased over time. In the
United States we have:
• 5.150 to 5.250 GHz (UNII-1 - 4 Channels 36-48)
• 5.250 to 5.350 GHz (UNII-2 - 4 Channels 52-64)
• 5.470 to 5.725 GHz (UNII-2c - 12 Channels 100-144)
• 5.725 to 5.825 GHz (UNII-3 - 5 Channels 140-165)
• 5.825 to 5.925 GHz (U-NII-4 - 4 Channels 169-181)
All three protocols are backwardly compatible using identical mechanisms and work quite well together
with no noticeable penalties for mixed operation apparent due to a common encoding technology. The
primary differences are airtime efficiency.
Channel assignments in 5 GHz bands are much more straightforward in that all assignments are NON
Overlapping channels with a minimum of 5 MHz separation maintained between channels.
802.11a
802.11a protocol, which was ratified as an amendment to the 802.11 standards in 1999 and is identical
in most respects to the 802.11g standard except the band in which it operates and no need for backward
compatibility for 802.11b. 802.11a supports speeds of 6, 9, 18, 24, 36, 48 and 54 Mbps. This is largely
considered a legacy protocol in 2015 and you likely will not find many native 802.11a devices left in the
wild. You may still see the 802.11a protocol in the air – but it is much more likely that this protocol is
being used on a device that is natively at least an 802.11n device.
802.11n
802.11n protocol, which was ratified as an amendment to the 802.11 standards in 2009 allowed for
operation in 2.4 GHz as well as 5 GHz. It also included several enhancements that allowed for wider
channel operation (up to 40 MHz up from 20 MHz) with two times the channel width, one can expect
twice the capacity or speed. This protocol introduced a new concept in radio design – MIMO – or
Multiple Input, Multiple Output. Using multiple spatial streams allows simultaneous encoding of
separate streams of data within the same signal and increased the density of data that could be sent at
one time providing an order of magnitude increase in capacity and speed. The data rates for 802.11n
needed to accommodate a varying number of spatial streams (dictated by individual radio design) as well
as the encoding method used. The new data rate structure adopted MCS (Modulation and Coding
Scheme) as a substitute for the then standard Data Rate.
MIMO or the use of Multiple Spatial Streams requires separate transmitters and receivers in order to
operate – 1 for each Spatial Stream being coded. More radios require more power and antennas, for this
reason the exact number of spatial streams that a given radio supports is often a design decision related
to available power and real estate on a given device. In practical terms the more power and space a device
has, the more spatial streams it can support. Hence AP’s with wired power sources mostly support
multiple spatial streams, as do many laptops and tablets. Smartphones with limited battery and space
generally support a single spatial stream (there are exceptions, but not many). You will also find a range
of capabilities related to cost and performance. The transmitter is the real power drain –SISO or Single
input – Single Output) do support multiple receivers improving (and MRC – a dramatically improved
receiver technology) even if they do not support multiple transmitters (and the ability to do multiple
spatial streams). Notation for 802.11n radios is typically seen as 3x3:2 or 2x3:2 or 1x2:1 where as
(#TX)x(#RX) and :# spatial streams supported.
802.11ac
802.11ac protocol which was ratified as an amendment to the 802.11 standards in 2013
Note There is only one 802.11ac standard, but there were two different timeliness for bringing 11ac to market
commonly referred to by the market as Wave 1 and Wave 2. Both have been released as of the date of
this writing.
802.11ac built upon many of the lessons learned in 802.11n and permitted up to 8 spatial streams using
up to a 160 MHz channel. The first Wave 1 products to market supported up to 80 MHz channels with
three spatial streams. All devices Wi-Fi certified for 802.11ac W1 must operate at 20, 40 and 80 MHz
channel width. In the 802.11n specification 40 MHz operation was vendor optional and allowed for a
mismatch of client capabilities to network design. Not all 802.11n devices can take advantage of a 40
MHz channel plan and see no gain for the reduced number of channels.
Wave 2 products being marketed today implement up to 4 spatial streams and a 160 MHz channel width,
this is formed by bonding 2x80 MHz channels together as a single channel (consuming a total of 4x20
MHz channel assignments). Again, 4 spatial streams means 4 transmitters and receivers (and antennas)
– so there is a real estate issue right away with 8 Tx/Rx chains for a single band radio.
Note Just like 802.11n which supported up to 4 Spatial Streams, the practical limit was 3 Streams as gains
from a fourth are miniscule. 8 Spatial Streams for 802.11ac is unlikely on a single 5 GHz radio. Pay
attention as some manufacturers are marketing 4 ss on 2.4 and 4 ss on 5 GHz as 8 spatial streams – not
quite the same thing. For More on Spatial Streams see Fundamentals of Spatial Streams with Rob Lloyd
for an excellent short discussion.
The other major contribution to Wi-Fi coming with Wave 2 is MU-MIMO – That is Multi User MIMO.
With 802.11ac MU-MIMO is possible to serve multiple clients on separate spatial streams
simultaneously.This functionality does require that a client support MU-MIMO, and we are seeing client
support growing as of this writing For an in depth view of 802.11ac see: 802.11ac: The Fifth Generation
of Wi-Fi Technical White Paper
– Terminal Doppler Weather Radar (TDWR) bands (channels 120, 124 & 128) are permitted with
new test requirements for Dynamic Frequency Selection (DFS)
– New power spectral density and above/below band edge emission requirements for U-NII-3
(5.725-5.85 MHz)
• The creation of protocols that can consume ever larger channels (20/40/80/160 MHz) involves lot of
pressure on the existing channels today. Due to regulatory restrictions, it is not always possible to
bond channels in two separate frequency ranges (even though the 80+80 mode in 11ac enables this)
– and today we have gaps between the channels defined, so there are real limits. In the US, more
spectrum has already been granted (the return of channels 120, 124, 128) and facilitated the use of
two 160 MHz channel possibilities. Additional spectrum has been requested to bridge gaps in ranges
and is in currently under consideration to allow for more. World Wide, other regulatory agencies are
taking note as.
• US Channel and band assignments for 20, 40, 80 and 160 MHz channels are depicted below with
future requested allocations noted.
The data rate increases for 802.11ac come in three forms, either more spatial streams (1-8), wider
channels (20/40/20/160 MHz) or expansion of encoding rates. 802.11n was limited to 2 channel widths,
and 4 spatial streams (only 3 of which are practical) – so MCS 1-23 was used to define the speeds – with
0-7 defining the data rate for 1 spatial stream, and 8-15, 16-23 repeating those rates on first 2, then 3
spatial streams. We have 8 spatial streams now – so something needed to be done. I wish it were simpler
– but MCS 0-9 now define the modulation and coding rate only. Multipliers are used to calculate the
impact of additional spatial streams, and or additional channel widths. The table below shows up to 2
spatial streams and all channel widths. It’s not easier – but it is easier in the long run given the challenge.
Note the multiplier rules below the table.
802.11ad
802.11ad is different from 802.11a/b/g/n/ac in that it does not use 2.4 GHz or 5 GHz. This standard
originally referred to as WiGig utilizes frequencies in the 60 GHz range. The very high millimeter
frequency range limits the range often to devices in the very near field. The higher the frequency the
more energy it takes to propagate, it is suggested that this technology with its short range yet high
potential throughput (up to 7 Gbps) makes this technology a nice fit of personal area network or wireless
USB/video applications.
Task
Group Project
MAC Develop one common MAC for WLANs in conjunction with a physical layer entity
(PHY) task group.
PHY Develop three WLAN PHYs—Infrared, 2.4 GHz FHSS, 2.4 GHz DSSS.
a Develop PHY for 5 GHz UNII band.
b Develop higher rate PHY in 2.4 GHz band.
c Cover bridge operation with 802.11 MACs (spanning tree).
d Define physical layer requirements for 802.11 operation in other regulatory domains
(countries).
e Enhance 802.11 MAC for QoS. (see Chapter 5)
f Develop recommended practices for Inter Access Point Protocol (IAPP) for
multi-vendor use.
g Develop higher speed PHY extension to 802.11b (54 Mbps).
h Enhance 802.11 MAC and 802.11a/n/ac PHY-Dynamic Frequency selection (DFS),
Transmit Power control (TPC).
i Enhance 802.11 MAC security and authentication mechanisms.
j Enhance the 802.11 standard and amendments to add channel selection for 4.9 GHz
and 5 GHz in Japan.
k To facilitate roaming, an 11k capable client associated with an AP requests a list of
suitable neighbor APs. The 802.11k capable AP responds with a list of neighbor APs
on the same WLAN along with their current Wi-Fi channel numbers.
m Perform editorial maintenance, corrections, improvements, clarifications, and
interpretations relevant to documentation for 802.11 family specifications.
Task
Group Project
n Focus on high throughput extensions (>100 Mbps at MAC SAP) in 2.4 GHz and/or 5
GHz bands.
o Provide Fast Handoffs in Voice over WLAN (goal is around 50 ms)
p Focus on vehicular communications protocol aimed at vehicles, such as toll
collection, vehicle safety services, and commerce transactions using cars.
r 802.11r introduces a new concept of roaming where the initial handshake with the
new AP is done even before the client leaves the current AP. This is called Fast
Transition (FT)
s Define a MAC and PHY for meshed networks that improves coverage with no single
point of failure.
t Provide a set of performance metrics, measurement methodologies, and test
conditions to enable manufacturers, test labs, service providers, and users to measure
the performance of 802.11 WLAN devices and networks at the component and
application level.
u Provide functionality and interface between an IEEE 802.11 access network
(Hotspot) and any external network.
v Provide extensions to the 802.11 MAC/PHY to provide network management for
stations (STAs).
w Provide mechanisms that enable data integrity, data origin authenticity, replay
protection, and data confidentiality for selected IEEE 802.11 management frames
including but not limited to: action management frames, de-authentication and
disassociation frames.
ac This amendment specifies enhancements to the 802.11 MAC and PHY to support
very high throughput (500-1000 Mbps) in the 5 GHz bands.
Deployment Considerations
Wi-Fi is a relatively mature technology today. While there are still places where Wi-Fi is not present, it
is hard to find any place where there are people and places, that doesn’t have some signal coverage today.
A good way to look at this is: the more independent neighbors you have – the more Wi-Fi interference
you either already have – or possibly will. This is often at its worst in multi-dwelling facilities where
many disparate company offices share a single building and spectrum.
This is of critical importance, since Wi-Fi passes through walls and floors and must operate and accept
all interference from other Wi-Fi and non Wi-Fi devices alike. What this means is that to the degree that
your network devices can hear other networks – they will share the available airtime with those other
networks. If you and your neighbor are both heavy users, in the areas that your networks overlap you
will both get less bandwidth than the connection speeds would suggest. For both networks waiting on
the other to access the channel will cost time (and less time on the air leads to less throughput).
Using 2.4 GHz in a congested metropolitan city, multi dwelling facility, or shopping mall will enjoy
variable success at best and frequently can be unusable at worst. Best Practices recommends three
non-overlapping channels in most of the world. In a densely deployed environment with multiple
different network owners– someone is always trying the other 8-10 channels in hope that this will buy
some advantage in an over filled spectrum. Most often, it does not; in fact choosing channels that overlap
others makes it worse for everyone.
When two AP’s are on the same channel, the contention mechanisms of each allow for fair access to the
channel between them. An AP on a different but overlapping channel can’t demodulate the 802.11
packets on the overlapped frequencies and it appears only as noise. Without the 802.11 mac layer, no
coordination is possible between the two AP’s. Errors, and collisions increase for both AP’s cell’s
increasing utilization and wasting precious airtime. If you live in a region where a 4 channel plan is
possible (1, 5, 9, 13) keep in mind that many client drivers will not enable channels 12 and 14 by default.
Also most consumer and many AP systems default to using channels 1, 6, 11. Under these conditions
channel 6 will interfere with both channel 5 and 9, and channel 11 interferes with 9 and 13 and vice versa.
If your neighbors are using 1, 6, 11 – you should too – it will perform better.
If an application is critical to business operations, plan on using 5 GHz. Once upon a time – this was
more difficult to do as 5 GHz devices were less prevalent. This is not the case today as most
manufacturers are focusing on 802.11ac as the standard for their products and 802.11ac only operates in
5 GHz.
If you absolutely must deploy a critical function on 2.4 GHz understand why and what is driving that
requirement (specifically which devices) and consider replacing these with updated hardware. You can
only put so many 2.4 GHz radios in close proximity to one another and once the channels are full – they
are full.
A look at the Wi-Fi Alliance certification database (Wi-Fi Alliance certification product-finder)
confirms that 5 GHz support is plentiful in todays devices. Consider these findings from the latest results
• As of August 2015 – 2,409 Smartphones/tablets have certified 5 GHz 802.11n operation.
– 477 of which where certified in 2013
– 591 in 2014/15 – all 802.11ac
– Total WFA certifications for the same period is 3167 putting 2.4 GHz only devices at 24% of
the current Market (this down from 32% 6 months previous)
– The majority of these being low end consumer gear
In Figure 3-6 you can see the difference in usable signal for both the 2.4 GHz band on the left, and the
5 GHz signal on the right using the same Tx power setting. In the Unii-3 band – power can be increased
to 23 dBm and 5 GHz can cover more than 2.4 GHz but only in that band. The numbers of people who
will share the fixed bandwidth available for the AP in each are contained within the cell’s footprint.
There are multiple protocol standards available in the 802.11 standard, in fact everything that has been
ratified since 1999 is still required for WFA certification and present in all hardware that supports the
band it belongs to. That doesn’t mean that you need to use it though. The choices you make in deciding
which protocols to support (and which NOT to) can have a big impact on your networks efficiency.
By efficiency we mean the use of airtime. The faster a station can get onto and off of the air, the more
airtime will be available for other stations. 802.11b as previously mentioned was one the first protocols
implemented in 2.4 GHz. Today it is truly a unique example amongst all other Wi-Fi protocols as both
the coding and modulation methods are completely different than every other protocol that has been
ratified since.
As a group – the legacy protocols of 802.11b, a and g all used a wide guard interval of 800 ms. The guard
interval is a time space between radio symbols (characters) being transmitted that ensures they do not
collide in the air. 802.11n and 802.11ac have an optional short Guard Interval, but in practice all products
implement this option. You can see the gains that a short guard interval provides in the 802.11n data rate
chart (Table 3- 1 802.11n MCS 1-23 data rates), they are significant.
802.11n and 802.11ac also provide for block ACK, or block acknowledgments, which allows for higher
efficiency gains by allowing a large block of packets to be acknowledged all at one. The legacy protocols
all send a packet – get a response – one by one. This adds a considerable number of frames to the
transaction for reliability that is largely no longer needed with modern standards.
Think about it this way - a golf cart has 4 wheels and a steering wheel just like an automobile– but you
would hardly let it enter a formula one race. Imagine the outcome of that – and that’s pretty much what
happens in a no holds barred Wi-Fi network.
Figure 3-7 below compares the airtime requirements of different protocol standards and data rates using
different sized packets over the air. This shows airtime (µs) consumed per packet, before any gains from
aggregation are realized. It is easy to see that even a modest 802.11n or ac speed can move twenty 1024
byte packets before 802.11b can move 1.
Note The lower the data rate – the longer the airtime required for a given packet size. Less over all data can
be accommodated within each second. Less available bandwidth is the result.
As a network architect, the concern is to provide services that everyone can use. The good news is that
by and large there are very few environments where you will find a “real” requirement for native 802.11b
or legacy protocols today.
Cisco WLC’s have several options available for implementing the most popular and necessary speeds.
The various network types and decision points is detailed later in this document to ensure you to
understand the need of implementing a well-tuned network from the start.
Many of the channels available in 5 GHz are known as DFS channels. DFS stands for Dynamic
Frequency Selection and along with TPC (Transmit Power Control) define co-existence mitigations (i.e.,
detect and avoid) for radar while operating in the UNII-2 and UNII-2e bands (channels 52-144). These
mechanisms are detailed in an amendment to the 802.11 standard.
The 802.11h standard was crafted to solve problems like interference with satellites and radar which also
legally use the 5 GHz band as primary users. A primary user has priority over the frequency range of
UNii-2 and UNii2e. It is Wi-Fi’s job, as a condition of using these frequencies, to not interfere with any
primary users. While this standard was introduced to primarily address European regulations, it is used
by many other regions of the world today to achieve the same goals of more operational 5 GHz spectrum
for Wi-Fi.
In 2004, the US added channels 100-140 in the UNII-2e (e stands for extended) band with rules requiring
802.11h certification which allow us to peacefully coexist with Primary licensed users of the 5 GHz
frequencies in this range. For Europe these channels represent most of their available 5 GHz spectrum
today. Before the rules and mechanisms where worked out, Europe was limited to only 4 channels in 5
GHz. At the same time in the US we had UNII-1, 2 and 3 for a total of 13 channels.
In order to not interfere with licensed band users – the requirement is pretty straightforward:
1. The Wi-Fi equipment must be able to detect radar and satellite emissions
2. Before using a channel in this range – a “channel master” (an Infrastructure AP) must first listen for
60 seconds and determine that the channel is clear of Radar
3. If a radar signal is detected, the Wi-Fi channel master – and all the clients associated to it have to
abandon the channel immediately and not return to it for 30 minutes at which time it can be cleared
again for Wi-Fi use if no radar emissions are detected.
U-Nii-2e channels got a bad name early in 2004 in the US by Network Administrators. Clients were slow
to adopt the new rules initially – so using these channels in the infrastructure meant you could (and some
did) inadvertently configure a channel that some clients wouldn’t be able to use – creating a coverage
hole for that client type. There was also many undue concerns about DFS operations (the requirements
for scanning and time required) in a production network. The concern was if DFS detected radar, a
channel change followed by waiting a full minute before resuming transmissions was viewed as
disruptive – however the behavior is not disruptive as RRM places the AP initially into a non DFS
channel. The channel is blocked for 30 minutes and then made available again to RRM by means of
background scanning to clear the required listening time. Once the channel is available we can choose
to use it or remain on the current channel – depending which is better for the clients.
It has been a decade since the addition of these channels and 802.11h logic. In Europe DFS is and has
been making 5 GHz Wi-Fi possible and even flourish. Client vendors vary, the majority support the DFS
channels just fine as there is no additional logic required by the client.
If you are within 5 Miles of an airport or shipping port and have concerns, evaluate by monitoring the
channel range with Cisco AP’s. Cisco leads the industry in certified hardware models and function for
DFS operation and flexibility, monitoring the channels will alert you to any potential interference and
identify the affected channels.
Site Survey
A site survey is an important tool. It will tell you who is operating around you – and more importantly
where and how much that interferes with your intended coverage zones. It also allows identification of
mounting locations, existing cable plants, infrastructure requirements, architectural oddities, and yields
a plan to get the coverage your particular application requires. Because RF interacts with the physical
world around it, and all buildings and offices are different so is each network to a degree. Unfortunately,
there is no one size fits all for Wi-Fi. There are recommendations by deployment type and it is possible
to generalize what is likely to be encountered. If you have not done a site survey in a while – keep in
mind what has changed since the last one before you decide against it.
1. The protocols and radio technology
2. How the users will use the network (likely everyone, and for almost anything)
3. How many clients the network supports (likely a lot more users count as atleast two devices these
days and many have more)
4. The primary use of the network (very likely changed since the initial plan and implementation)
While early WLAN designs focused on coverage in order to get a few casual users signal everywhere,
todays WLAN designs are more focused on capacity – as the number of users has increased – and what
we are demanding of the network has gone up exponentially. A capacity design requires more AP’s in
closer proximity to manage the number of users who are sharing the bandwidth of the cell. Increasing
placement density should have a plan.
If you decide to conduct your own survey and plan – tools are important. There are multiple free tools
on line and available as downloads. However if you want professional results – you need professional
tools.
The free tools can provide simple solutions for smaller less complex projects. But if you are looking to
provide ubiquitous multi media coverage in a multi-floor/multi building campus – you need a good tool
to balance the elements that will be required for success. Planning tools have evolved with the radio
technologies and applications in use today. A familiarity with the design elements and applications is
required to produce a good plan.
Cisco Prime Infrastructure has a planning tool built in – and you can import and export maps and plans
between CPI and many top Survey and Planning applications such as Ekahau ESS, Airmagnet Pro
Planner and Survey.
For more on Site Surveys – See Site Survey Guidelines for WLAN Deployment
Having a site survey done for 802.11ac now – will yield good information that can be used again and
again as the network grows and continues to evolve. It depends on the size of your project and level of
knowledge with regards to Wi-Fi if this is something that you should contract out in part or as a whole.
Coverage Requirements
Most application specific coverage guidelines describe the signal level or coverage at the cell edge
required for good operation as a design recommendation. This is generally a negative RSSI value like
-67 dBm. It’s important to understand that this number assumes good signal to noise ratio of 25 dB with
a noise floor of -92 dBm. If the noise floor is higher than -92 dBm then -67 dBm may not be enough
signal to support the minimum data rates required for the application to perform it’s function.
For Location-Aware services, deploying a network to a specification on -67 dBm is fine – however what
matters to Location-Aware applications is how the network hears the client – not how the client hears
network. For Location-Aware we need to hear the client at three AP’s or more at a level of >= -75 dBm
for it to be part of the calculation. (-72 is the recommended design minimum)
Clients are a big consideration when planning coverage. They come in all shapes and sizes these days,
and as a result individual implementations can and do vary widely on their opinion of a given RF signal.
For instance, the laptop you are using for Surveying may show -67 dBm at the cell edge, the tablet might
show -68 dBm, and the smartphone may show -70 dBm. These are all very different opinions and affect
roaming and data rates that each individual will use. Overbuilding to accommodate this varying opinion
assures a trouble free installation. When taking measurements using the device that will support the
application is the best approach. Understanding that your smartphones are generally 5 dB off your survey
tool will let you develop good rules for design (like add or subtract 5 dB to what ever the reading is from
your survey tool). Then test and tune the resulting implementation.
For most Enterprise installations higher density conference rooms and the like can be handled just fine
using internal Omni Directional antenna AP’s. Cisco’s RRM will handle the channel and power required
to make it work. At a certain point – with too many AP’s being too close together – RRM will configure
for the most optimal efficiency possible, but there must be spectrum available or it can do nothing. You
can only turn the AP’s power down so much, and the Omni directional antenna pattern will hear other
adjacent AP’s and the user experience will suffer. Coverage levels at 2500 sq feet per AP and up should
be fine at 5 GHz with 20/40 MHz channels. For 2.4 GHz requirements at cell densities going below 2500
sq feet, you will likely need directional antennas to physically limit the transmit and receiver patterns of
the AP and get useful smaller cells.
There are many features that have been specifically developed to manage and configure High Density
client/AP environments; they are part of a group of features known as HDX (High Density Experience).
See the HDX deployment guide below for specifics of each feature:
High Density Experience (HDX) Deployment Guide
coverage of one cell and establish association within coverage on another without delay. Too little
overlap encourages “sticky” clients, meaning a client holding onto an AP well after it moves into the
coverage area of another AP.
When designing for network coverage, consider the amount of overlap in the required signal range you
are getting. Overlap should be 10-15% (15-20% for Voice) of the total coverage area. Voice is
particularly sensitive as the conversation is real time – and any coverage lapse will result in broken audio
or potentially a lost call. An easy way to calculate overlap – measure the distance from the AP that you
reach -67 dBm – multiply that distance x 1.4 for 15-20% or 1.3 for 10-15% and that’s where your next
AP goes.
Data rates are also matter, as the usable cell size increases with lower data rates and decreases with
higher data rates. Higher Data Rates require a higher SNR, and since the noise floor is theoretically
constant – the closer the client is to the signal (the AP) the higher the SNR and the resulting data rate
will be. We can enforce minimum data rates in configuration, and when a client can no longer support a
given data rate – it will have to move.
Figure 3-9 shows the Cell overlap and the effect that data rates have on cell size.
A good physical design enables and supports roaming at the physical layer. Only the client decides when
to roam though and the decisions it makes are based on the clients observation of the network. There
have been multiple amendments added to the 802.11 specification specifically to help clients make better
decisions based on network infrastructure observations. See these guides for additional information on
Roaming and configuring Cisco hardware/software to enable good roaming transitions. Cisco supports
802.11r, 802.11k, and 802.11v which assists capable clients in making good decisions and affords some
control from the infrastructure to enforce design goals:
• High Density Experience (HDX) Deployment Guide - see Optimized Roaming
The Best Practices-Location Aware-WLAN Design Considerations is a must read chapter and still quite
relevant as the physical requirements for the design have not changed. The entire document Wi-Fi
Location Based Services 4.1 Design Guide is a good reference for Theory, particularly the first chapter
Location Tracking Approaches will familiarize you with the technology.
Location Services Coverage considerations – All of the AP3800/2800 models greatly enhance location
resolution. In the I/E/P models –the ability to transform the flexible radio to a monitor role increases
greatly the dwell time in both bands and produces more input for the location algorithms. This is
managed again by the FRA algorithm, which will right size 2.4 GHz – and with the ability to put the
redundant radios into a monitor role – actually improves location resolution.
Note In non-flexible AP’s, the only resolution to excessive 2.4 GHz radios was to disable the radio completely,
which reduced visibility and location resolution for 2.4 GHz. The 2800/3800 H model – is purpose built
with a location array antenna to support AoA calculations specifically for greatly improved location
resolution and accuracy. The H models also host their own BlueTooth radio and antenna to support BLE
applications making it the all around location use case best in class radio. If your application requires
highly accurate location results – this is the radio you should be considering.
• Gain—A measure of increase in power introduced by the antenna over a theoretical (isotropic)
antenna that transmits the RF energy equally in all directions. Gain also affects received signals and
can assist weaker client devices by increasing the signal presented to the receiver.
– Front To Back Ratio or FTB – the opposite of gain is signal rejection – the opposite direction
of the gain in an antenna is less sensitive than the focus of the antenna, and this property can be
used to isolate your cell from unwanted signals behind the antenna for instance.
• Direction—The shape of the antenna transmission pattern. Different antenna types have different
radiation patterns that provide various amounts of gain in different directions. A highly directional
antenna will produce a very tight beam pattern. Outside of the area of focus, signals erode quickly
which allows more cells to be placed in the same physical space without interference.
• Polarization—Indicates the direction of the electric field. An RF signal has both an electric and
magnetic field. If the electric field is orientated vertically, the wave will have a vertical polarization.
A good analogy for how an antenna works is the reflector in a flashlight. The reflector concentrates and
intensifies the light beam in a particular direction similar to what a parabolic dish antenna does to an RF
source in a radio system. The antenna however is both the ears and the mouth of the AP – so
characteristics of a given antenna work for both transmit and receive. Many different antenna designs
exist to serve different purposes some of the more familiar designs appear below in Fig. 11
Gain and direction mandate range, speed, and reliability while polarization affects reliability and
isolation of noise.
For more information on antenna selection, see the Cisco Aironet Antennas and Accessories Reference
Guide
Omni-Directional Antennas
Omni-directional antennas have a different radiation patterns compared to isotropic antennas; the
isotropic antenna is theoretical and therefore all physical antennas are different to the isotropic antenna.
Any change in shape of the radiation pattern of an isotropic antenna is experienced as gain and increases
directionality. The dipole Omni-directional antenna features a radiation pattern that is nearly symmetric
about a 360 degree’s axis in the horizontal plane and 75 degrees in the vertical plane (assuming the dipole
antenna is standing vertically). The radiation pattern of an Omni-directional antenna generally resembles
a donut in shape and hence is directional. The higher the rated gain in dBi of a given Omni-Directional
antenna, the more focused the energy is (generally in the vertical plane) and directional it becomes. See
the comparison between an isotropic and Omni-Directional dipole antenna in Fig. 12 below. Note the
views are from the side.
Most modern day internal antenna AP models beginning with the AP 1140 use internal antenna stubs
with multiple transmitters and receivers. Unlike the simple Dipole antenna, this produces a pattern that
has an improved donut shape. In the antenna plots below – note the elevation plane and how the energy
is predominantly focused downward in Fig. 13.
This makes the AP least sensitive on the back – the part that is facing the ceiling in most installations.
Omni-Directional antenna’s work well, and are easy to implement – to a point. If you are faced with
increasing the density of AP’s to accommodate more capacity requirements, then you will see increasing
channel utilization from self-interference. This happens because the antenna pattern is designed for
maximum coverage. 3000-6000 sq ft (280 -560 sq meters) of coverage per AP can be managed with the
internal antennas, if your coverage requirements are at the minimum or denser than this, you should
consider directional antennas.
Directional Antenna’s
A directional antenna differs from an Omni-Directional antenna in that the energy is focused in a
particular way to achieve different coverage goals. Most people assume that a directional antenna is used
specifically for gain – to increase power. While it can be used for that reason and achieve greater
distances, it is more often used in Wi-Fi to control the size (and shape) of the transmit and receive cell.
For current Cisco indoor AP’s (3600e, 2600e, 3700e, 2700e the antenna selections are all dual band
(each antenna covers 2.4 and 5 GHz) patch type antenna’s designed for different coverage distances. The
3 most popular are below.
Each antenna is designed for a specific purpose in mind. One of the things about antenna selection that
must be considered is the Beamwidth. Beamwidth describes coverage area of an antenna, however it does
not describe how hard or soft the edge of that coverage is. For that you need to look at the antenna’s
pattern in a plot.
The plot below is from one antenna of the AIR-ANT2566D4M-R antenna, it is designed to provide good
coverage over a general area. The beamwidth of this antenna at 2.4 GHz 105o x 70o and describes the
point where the peak gain of the antenna falls by 3 dB. What’s important in a directional antenna is what
happens after that 3 dB. Note the blue marks on the antenna plot below at the rated beamwidth, the gain
falls sharply after the rated beamwidth. This is exactly what needs to happen to put more AP’s closer
together for higher capacity.
If the antenna can not hear, it may not interfere with your AP. We only have 3 channels in 2.4 GHz;
channel re-use in a dense deployment is already a problem there. With a good antenna, you can make the
cell size smaller and get more radios closer together and provide adequate capacity in your design for
2.4 GHz users. 5 GHz has more channels, however with 20/40/80 MHz Channel widths, we are using
channels up faster, and cell isolation is becoming more of a problem.
Other problems that can be solved using directional antennas include high interference environments –
a shopping mall for instance – most of the stores in a shopping mall will have installed some kind of
Wi-Fi, and this creates interference for your Wi-Fi. Using directional antennas, you can isolate your store
from the neighbors by focusing the ears of the AP inward, and making the receive sensitivity less behind
the antenna. The front to Back ratio of an antenna is responsible for this – think of it like cupping your
hands over your ears to hear a distant sound – when you do this you focus the sound energy into your
ears, but you also shield your ears to the surrounding noise and this produces a better Signal to Noise
ratio – you experience it as better more intelligible sound. Putting a directional antenna on your AP will
focus it’s ears and it will experience a better sound with less noise as well.
When the smart antenna is not installed the antenna on top of the unit are in Dual Radiating Element
(DRE) mode, if the smart antenna connector is installed the XOR (2.4 or 5 GHz depending on the mode)
goes out the smart connector. In this mode the XOR radio (unless in monitor mode) can only be
configured for one band 2.4 GHz or the other band 5 GHz. This is in Single Radiating Element (SRE)
mode.
Antenna control (default and when the smart antenna connector is used)
In addition to new antennas being designed with the smart connector, conventional antennas using
RP-TNC connectors may attach to the 2800/3800e series using the smart connector.
For more on this topic see the AP-3800 deployment guide at the following URL
https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/8-3/b_cisco_aironet_series_2800_
3800_access_point_deployment_guide.pdf
Smart connector using 3600/3700 Series with Hyperlocation module
The smart antenna connector on the 3700 series operates a little differently, when a Hyperlocation
module is installed in a 3600 or 3700 Series Access Point, a special antenna array can be used for
location accuracy. The Hyperlocation array is not compatible with the 2800 and 3800 series.
Overview of Hyperlocation
Hyperlocation is a combination of a new Hyperlocation module with Advanced Security that replaces
the older WSSI/WSM: AIR-RM3000M module which does not support Hyperlocation as it lacks the
ability to support an advanced Hyperlocation antenna system.
• Advanced WSM support (as a stand-alone module) similar to the older WSM but with 802.11 20,40
and 80 MHz support (non-serving radio)
• Advanced WSM & location when used with the Hyperlocation antenna
• FastLocate support (non-serving radio)
• Integrated Bluetooth Low Energy “BLE” Beacon transmit capability.
The Hyperlocation methodology of calculating location using Angle of Arrival (AoA) tracks 802.11
OFDM clients (meaning 802.11a/g/n/ac clients) that are associated (connected) on the network and is
able to do so with much higher accuracy than conventional Real Time Location Systems (RTLS) that
rely on only RSSI (RF Signal Strength).
The final calculation of location not only utilizes Cisco's AoA method but also takes into account many
other factors including RSSI for a very accurate location assessment.
Note AoA Hyperlocation (at this time) does not track “pure” 802.11b clients as AoA works best with OFDM
emissions meaning 802.11a/g/n/ac associated clients so 802.11b clients will be tracked using
conventional RSSI data.
Components Cisco Hyperlocation System – antenna array connects via plug in module using smart
antenna connector
For more on Hyperlocation see the Hyperlocation deployment guide at the following URL:
https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/8-1/Halo-DG/b_hyperlocation-de
ployment-guide.html
single 20 MHz channel to accommodating channel and power solutions for 20, 40, 80, and soon 160
MHz channels all inter-operating in the same spectrum. And in most cases – backward compatibility and
a mix of protocols must be considered as well. Even if your organization has standardized – you almost
assuredly have neighbors and internal resources that have not.
RF Grouping
The RF Grouping Algorithm is responsible for identifying and consolidating hardware groupings under
an elected or chosen leader–all resources that belong to the same network–WLC’s and AP’s alike. This
forms the RF Group which then becomes a logical configuration domain. The Network resources are
identified by the RF Group Name, which was entered on the initial controller configuration. The group
name is shared by all the WLC’s on the same network. AP’s connected to the controllers learn the group
name from their controller and in turn broadcast it over the air in NDP (Neighbor Discovery Protocol)
messages for other AP’s to hear and report back to their controllers what their individual RF
Neighborhoods look like. Metrics such as noise, interference, channel utilization, and how near or far
it’s neighbors are from a particular AP’s view will be reported and saved for subsequent action by the
algorithms that make up RRM.
Note ALL RRM configurations are performed only on the RF Group Leader, configuration made on member
controller have no effect on the running RRM algorithms and would only be effective if that
controller/band becomes the RF Group Leader for the network.
Automatic RF Grouping
RF Grouping is automatic by default, and in a multiple controller configuration–any controller belonging
to the same RF group will participate in an election process designating 1 or more WLC’s as the RF
Group Leader(s). The 2.4 GHz (802.11b,g,n) band and the 5 GHz (802.11a,n,ac) band each must have
their own RF Group Leader.Both RF Group Leaders can reside on the same physical controller. They
may not necessarily be so, and until the introduction of FRA,there was no real requirement that they do
reside on the same physical controller. With FRA both bands must be on the same physical WLC
designated as the RF Group Leader. Best Practice moving forward is to use static as the RF grouping
method to ensure you have control in larger deployments. If your deployment resides on a single HA
pair of controllers then its already taken care of, else use Static.
In order for Automatic RF Grouping to be effective, each controller you wish to be included in the same
RF Group must have active AP’s attached to them, and the AP’s must be able to hear at least one other
controllers AP’s. You MUST, connect your AP’s to the controllers that you want to form as a group first
else each controller will assume that it is it’s own RF Group Leader. If your design incorporates a single
controller on each site, and the sites are geographically separated each controller will be it’s own group
leader for both bands at each site, as the AP’s from one site will not hear AP’s at another geographically
separated site.
Static RF Grouping
Static RF Grouping allows user selection of the RF Group Leader(s) and manual assignment of group
members. All WLC’s must have a wired network path to one another – there is no over the air component
so active AP’s are not necessary to form a static group but wired connectivity between the controllers is
a must. Once the RF Group is created – RRM operates the same using over the air metrics.
Note It is not quite a best practice to use static RF Grouping – however it is highly recommended as always
ensuring you are actively on the RF Group Leader can and does at times lead to confusion – the level of
which expands with the more WLC’s you have in the group.
There are a number of controller models, and some are more capable than others. In both Auto and Static
mode, there is a hierarchy applied that prevents a 2500 series controller from becoming the group leader
over an 8540 series controller. The largest most capable controller should be selected as the RF Group
Leader.
The RF Group Leader is where all measurements, configurations, and calculations that are being used to
manage the RF Group and RRM will be sent and stored. The WLC’s RRM configuration on the RF
Group Leader is the configuration that is used by RRM for the RF Group. It is important to synchronize
the RRM configurations on all of your controllers, in automatic RF Grouping mode – the RF Group
leader can change for several reasons – and if the configuration is different, then the behavior of the RF
Group will change when the leader changes.
Configurations at the RF Group Leader level are considered Global – as they affect the entire RF Group.
RRM allows for RF Profiles; which can be created and applied to individual AP groups (sub groupings
of AP’s by functional or physical attributes) that span multiple controllers and override the global
configurations to allow localization for a different RF environment or role. A High Client Density vs. a
Coverage model design will require different Data Rates and TPC thresholds at a minimum to function
properly. RF Profiles can be applied to AP Groups (collections of AP’s in different coverage models for
instance) and a separate configuration can be applied to each.
For more information on the specifics of RRM’s RF Grouping Algorithm see -Radio Resource
Management White Paper RF Grouping Algorithm which covers grouping mechanisms, as well as over
the air measurement activities and intervals.
RF Grouping Configuration
On the WLC GUI, Navigate to the Wireless, 802.11a/n/ac or 802.11b/g/n, RRM, RF Grouping.
Note Information regarding configuration is provided as an example and to help you get started. Information
regarding RF Grouping changes by necessity with the introduction of new products and capabilities – it
is highly recommended that you refer to the currentrevision of this document located here: Radio
Resource Management White Paper - RF Grouping Algorithm for granular analysis of your specific
needs.
1. Group Mode—The default mode for the RF Grouping algorithm is AUTO this should be fine for
most installations Use the Static mode – by selecting Leader and adding member WLC’s if you have
many controllers operating in a shared RF domain. If you are selecting Static, there is a practical
limit to the number of AP’s that can be configured within an RF Group. For all controllers up to the
5500 series this is 2x the licensed AP count, for 75xx and 85xx the limit is 6000 AP’s. Design your
RF Grouping to keep groups of AP’s and controllers together for like spaces and buildings. Whats
important to the RF group is AP’s that can hear one another and need to be configured together
should be in the same RF Group and managed by the same RF Group Leader. Create a new RF Group
for geographically separated facilities.
2. Restart—after changing the mode – and applying the changes – the restart button –“restarts” the
grouping algorithm
3. Information—informs the user of the status for the viewed controller on current mode, the current
RF Group Leader, the protocol version (important as not all version will play together – see Cisco
Wireless Solutions Software Compatibility Matrix IRCM section, the algorithms interval, current
AP and member controller counts.
4. RF Group Member—used for adding member controllers to a Static leader
5. List of current members and status—full list of member status messages can be found in -Radio
Resource Management White paper RF Grouping Algorithm
Startup Mode assumes no hysteresis; it is intended for aggressively selecting an initial channel plan and
spreading out the radios coverage in the selected spectrum.
This is important to remember when you are making changes to your network such as–
• Adding additional radios
• Changing channel width assignments (adding 802.11n or 802.11ac radios)
• Removing Radios from service
All of these things represent a major change to the operating environment, and invoking startup mode
will ensure the best solution to the new question. RRM will adjust for these under normal conditions but
it will do so with the Hysteresis applied and may not result in the most optimal answer for the new
operating environment.
The default DCA settings are quite adequate; a majority of networks are running with these settings
today. Changes to the defaults should be understood and implemented only to solve issues.
DCA Configuration
Default settings for DCA are shown below. The defaults should be adequate for most installations,
exceptions will be noted below. The DCA configuration screen is displayed below – 5 GHz is shown here
for example, the notable differences from the 2.4 GHz screen is the channel width selection (4) below.
We do not support Bonded channels in 2.4 GHz as there are not enough channels or spectrum for this to
be practical in a multi AP installation.
Note The following configuration discussion is a subset of DCA’s functions. For an in depth discussion –
please refer to the Radio Resource management White Paper - DCA where current content regarding
features and version are maintained.
• Avoid Foreign AP interference—Default is selected, this counts neighbor rogue AP’s and
encourages DCA to work around them. If you are in a congested area, it may be better to disable this
contribution. In a congested neighbor environment this can initiate a lot of channel changes – try the
default first though.
• Avoid Cisco AP Load—The default is Disabled. This measures Load only on Your (Cisco) AP’s.
This contribution makes DCA more sensitive to conditions and encourages MORE channel changes.
In practice, Client experience is better riding through transient load peaks.
• Avoid Non-802.11 Noise—The default is selected – This prioritizes Noise contribution which is
defined as any signal that can not be demodulated as 802.11, this includes a lot of noise which is
unintelligible 802.11 due to collisions, or simply being to low for proper demodulation. This should
always be selected.
• Avoid Persistent Non-WiFi Interference—The default is Disabled, if you have CleanAir AP’s, this
selection allows for contribution of Non-Wi-Fi persistent signals such as Microwave Ovens,
Outdoor Bridges, Video Surveillance Cameras and should be selected. When CleanAir discovers
such a device, it allows for the addition of a Bias to the affected channel for the detecting AP to
encourage a better channel selection – even if the device is not active at the moment. Microwave
oven’s operate heavily during the lunch hour and again late afternoon – this makes RRM remember
and avoid the impacted channels on devices that can hear the interference full time for 7 days and
expires if no other detections have been made in that time.
3. Channel Assignment Leader – identifies the group leader mac and IP address of the Group leader
for this band, Last Auto Channel Assignment tells you in seconds how long ago DCA ran.
4. DCA Channel Sensitivity – The default is Medium. This setting determines the Hysteresis used to
make a channel change decision. DCA compares the score of the current channel against all other
possible channels – and will change to a better channel IF it meets or exceeds this metric. Medium
is 10 dB better in 2.4 GHz and 15 dB better in 5 GHz. Low= 5 dB (more aggressive) and High=20
dB (less aggressive) for both bands. This determines how Much better a channel must be in order to
change.
5. Channel Width – The Default is 20 MHz This selects the Global Channel Width, selections can also
be overridden at the RF profile, or individual radio level. This only affects 802.11n and 802.11ac
capable AP’s, a selection of 80 MHz will set 802.11n Radios to 40 MHz
6. Avoid Check for non-DFS channels – The default is disabled. DFS requires that there be at least one
non-DFS channel available in the DCA channel list. If you are deploying Outdoor AP’s in ETSI
regulatory – there are no non DFS channels available for outdoor – selecting this prevents the
enforcement of requiring a NON-DFS channel.
7. DCA Channel List – the top part shows you what channels are currently configured, the list allows
you to select and deselect channels. Adding or deleting channels requires that the band (2.4 or 5
GHz) be disabled before making changes.
8. Extended UNii2 channels- the default for this is disabled, enabling will add channels 100-144
automatically to the DCA channel List. This is a best practice today – especially for
802.11n/802.11ac 40/80 MHz channel selection.
9. Event Driven RRM – EDRRM is enabled by default – best practice is to enable. EDRRM allows
RRM to work with CleanAir Air Quality (AQ) and permits a CleanAir AP that experiencing a
classified catastrophic interference to mitigate it by changing channels. What do we mean by
catastrophic? In the event a non Wi-Fi interference source broadcasts at 100% duty cycle, it will
completely block the channel for that AP, neither clients or AP will be able to speak because they
listen before they talk – and every time they listen, they will hear energy. The decision is made on
the AP and independent of DCA (this happens within 30 seconds). RRM will know of this change
and prevent the AP from changing back for a period of 1 hour. There are 4 sensitivity thresholds
Low AQ=35
Medium AQ=50 (default)
High AQ=60
Custom User Threshold - be careful here
1. For new installations – ensure that ALL of your AP’s are mounted and associated with the controller
before restarting the controller or initiating DCA reset
• DCA can be restarted and initialized at the command line with the command config 802.11a/b
channel global restart - to verify operation check the DCA config page in the GUI under
wireless=>802.11a/b=>RRM=>DCA will display Startup.
2. Re- initialize DCA any time there is a major change to the requirements of the channel plan
• Change in channel bandwidth (20/40/80)
• Adding additional AP’s
• Changing DCA channels (adding or subtracting UNII2e channels for instance)
3. Default options are best, with the exception of “Avoid Foreign AP Interference” which may be
unchecked if your installation has a lot of rogue neighbors and channel changes happen daily for
this reason.
We will cover more on how to tune TPC for optimal coverage in the best practices below.
TPC Configuration
The default selections for TPC should be adequate for a normal enterprise office environment. The
default TPC user threshold assumes a 10 ft (3 meter) ceiling height.See the RRM White Paper – Transmit
Power Control for an in-depth discussion regarding TPC’s functions and configuration best practices.
1. Choose TPC Version – TPC v1 is the default selection. TPCv2 can be used for higher density designs
and coupled with channel mode will yield better capacity if AP’s are closer together with less
reduction in power. Installations where AP cell size is 3K sq feet and under in large open areas
should consider this – coupled with the command line argument “channel mode”. This limits TPCv2
functionality to only looking at neighbors on the same channel. Only one version may be selected
as this is a global command affecting the entire RF group. If this is selected on a member controller
– it will have no effect on the RF group unless that controller becomes the Group Leader.
2. Power Level Assignment Algorithm
• Automatic—Default and runs at 600 second (10 minute) intervals.
• On Demand—Will only run on the next scheduled interval (600 seconds) if Invoke Power Update is
depressed. Power levels are frozen unless the Invoke command is received but TPC continues to run
in the background.
• Fixed—Allows a manual power level to be assigned to all AP’s; this is not recommended for several
reasons.
– All AP’s will be on the Selected Power Level indication; however depending on the 5 GHz
channel assignment, may have very different power output in dBm. See Reference Guides under
Access points and refer to Channels and Maximum Power for your model under documentation.
– This excludes all AP’s from the TPC algorithm.
3. Min/Maximum power level assignment—Default is “Disabled” (note that values of -10 and 30 dBm
are not supported on ANY Cisco AP). This is a per controller override – and allows setting a
minimum and maximum power level that will be allowed on ALL AP’s attached to that controller.
If TPC attempts to apply a setting higher or lower than the local controllers Min/Max, it is
overridden by this setting. See above for Channels and Maximum power as the entry is in dBm and
will produce the closest max or minimum power to an actual allowed power on the AP being applied
to. This setting can also be made at the RF Profile level and applied to a select AP group – this is
recommended for larger deployments containing multiple coverage and capacity zones.
4. Power level assignment leader – identifies the active RF Group leader for the band. Last power level
assignment shows seconds since last assignment was made.
5. Power Threshold (-80 to -50 dBm) – This tells the TPC algorithm the value you want for the cell
edge. TPC uses this the threshold value for neighbors in the calculation to determine the optimal
power level of the AP’s.
• TPCv1—The default is -70 dBm and assumes a normal office space with 10 foot ceilings, if your
application has High Ceilings – 15-20+ feet you may need to adjust this threshold up to receive
adequate power at the floor. The measurement is made using NDP packets between AP’s. If the AP’s
have all been placed in a hallway, this can negatively affect coverage in rooms on either side of the
hallway – measurements should be taken – mitigation may require different placement of the AP’s.
• TPCv2—The default is -65 dBm.
6. TPCv1 Channel Aware – This is a new feature added in version 8.5. It adds the ability in TPCv1 to
consider co-channel neighbors in it’s calculation, which allows a more aggressive assignment by
TPC while ensuring that co-channel interference does NOT increase. This generally provides 2-3
dB more power with no consequences over the previous TPCv1 algorithm alone.
Note Data RSSI entry is also used for Optimized Roaming threshold – if optimized roaming is enabled at the
global level. Please read Optimized Roaming before enabling.
4. Minimum Failed Client Count per AP—The default is 3. This determines how many clients must
exceed either the voice or the data threshold from above in order for a Coverage Hole to be alerted,
this also works in conjunction with the Coverage Exception Level below.
5. Coverage Exception Level per AP – this setting determines what percentage of total clients on a
given AP need to exceed the threshold to declare a coverage hole and woks in conjunction with
minimum Failed Clients from above.
Coverage Hole detection and Mitigation is highly tunable with the exception of the thresholds, the
default settings are generally sufficient. Minimum client count and coverage exception work together
and the default count of 3 clients with a coverage exception of 25% says for example that if 3 clients are
below the threshold – in order to act there must be 12 clients currently associated (3=25% of 12). CHDM
also listens for clients on every AP in order to determine if a failed client is really in a coverage whole,
or if it is simply not roaming. In the event that we can hear a client from an AP better than the one it is
currently associated too, this will be counted as a false positive and not count towards a coverage hole
event. If both conditions are met, Coverage Hole Mitigation can increase the AP’s power by one power
level to attempt to fix the coverage. RRM will then re-evaluate coverage requirements on the next DCA
and TPC run.
Optimized Roaming
Optimized Roaming is a tool that can help resolve the problem of sticky clients that remain stubbornly
associated to an access point instead of roaming to a more robust available connection. The client alone
makes the decision when and to whom to roam, and not all clients are created equal. The optimized
roaming feature borrows some of the same rich data gathered from the AP’s as the coverage hole
algorithm detailed above in this chapter. Optimized roaming looks at the Data RSSI of the client as
measured by the AP against the Data RSSI threshold set in the Coverage Hole configuration dialogue.
If a client falls bellow this threshold, the client is sent a disassociation message (Reason 4 – Timeout) .
The default configurations are Optimized Roaming is disabled, and the Data RSSI in Coverage hole is
used for CH calculations. Optimized Roaming also has an optional metric – Data Rate – which is
disabled by default and can be used to form a double gate based on the RSSI threshold AND the Data
Rate of the received data packets. If Data Rate is also used – then both must be true to trigger a
dis-association event.
Optimized Roaming, once triggered for a given client, also prevents client re-association when the
client's RSSI is bellow threshold – and requires the client to be 6 dB above the disassociation threshold
to re-associate to that AP. It is for this reason alone – that it is not advised to also use the less known
RSSI low check feature. The two thresholds DO NOT work in conjunction with one another and you can
inadvertently lock out a cell’s access.
Enable/Disable-disabled by default.
Optimized Roaming Interval – 90 seconds is the default, decreasing this interval places an un-necessary
load on the AP and controller and it is highly recommended that you do not change this interval unless
directed to do so by TAC or other suitable Technical support guidance. This will also require disabling
of the network (band 2.4 or 5 GHz) that you wish to change.
1. Enable/Disable-disabled by default.
2. Optimized Roaming Interval – 90 seconds is the default, decreasing this interval places an
un-necessary load on the AP and controller and it is highly recommended that you do not change
this interval unless directed to do so by TAC or other suitable Technical support guidance. This will
also require disabling of the network (band 2.4 or 5 GHz) that you wish to change.
3. Data Rate Threshold–establishes the minimum acceptable data rate to be used in conjunction with
the Data RSSI threshold. Be careful as this is an additional criteria that will be used to make the
trigger decision and BOTH the RSSI and the Datarate Criteria must be met for a disassociation to
be sent.
– Monitor –Dedicated Sensor2.4 and 5 GHz Monitoring (increasing the resolution for each
channel 24 times over a client serving radio)
– DNA-c Wireless Assurance Sensor (provides active client mode to perform tests on surrounding
AP’s at the direction of Service Assurance under the DNA architecture)
FRA uses RRM’s neighbor (NDP) database to:
• Locate neighboring 2.4 GHz AP’s relative positions to one another
• Calculate the required coverage area for each AP at -67 dBm*
• Analyze the results for each AP’s coverage and evaluate neighboring AP’s Coverage Overlap as a
percentage of total coverage of the target cell
*For the DNA-c Wireless Assurance Sensor Role – Coverage is not always at -67 and can be driven lower
to permit more sensor’s to be selected over 2.4 GHz coverage requirements.
A radio is marked redundant when the COF (Coverage Overlap Factor) exceeds the configurable
required coverage threshold. Coverage Overlap Factor is a number from 1-100% that represents for a
given AP, What percentage of it’s cell for AP-1 0-100% of its cell is effectively covered at -67 dBm buy
up to 3 neighboring AP’s. If that number is 100%, then AP-1 could effectively be disabled – with no
negative impact to the effective client coverage. Rather than disabling this radio, we re-assign it in one
of multiple roles listed above. FRA will mark the radio as redundant and we re-use that interface to
provide additional value/intelligence to the network.
For an in depth discussion of FRA and how it makes coverage calculations please see – RRM White
Paper – Flexible Radio Assignment
Note In order for FRA to operate – both the 2.4GHz RF Group Leader, and the 5 GHz RF Group leader must
reside on the same physical WLC – this is most often the case under automatic RF Grouping – but it is
not always the case. If you are operating accros multiple WISM’s or 5508 controllers – it is highly
recommended to use Static RF Group Configuration if enabling FRA.
FRA operates in 3 modes which can be selected via the Service Priority selection in the Global FRA
configuration Dialogue.
• Coverage–Traditional configuration in which the coverage estimation is maintained at -67 dBm and
role selection by DCA is either 5 GHz(priority) or Monitor Role (if 5 GHz is already saturated.
• Client Aware–new in 8.5, follows the same decision thresholds as Coverage but implements the
ability for a monitor Role assignment to be pressed into service as a second 5 GHz interface in the
event the primary 5 GHz channel becomes very busy.
Service Assurance–This mode adjusts both the COF required to meet FRA Sensitivity threshold as well
as the target coverage RSSI to modify FRA aggressiveness. The output also gives an indication of the
% of the network that would be covered. Aggressiveness is adjustable by means of the Sensor Threshold
selection dialogue – see below –
For a full discussion on FRA see Radio Resource Management White Paper
FRA Configuration
Configuration for FRA involves running the algorithm (global – on the RF Group Leader) as well as at
the AP ( the radio interface is either in FRA Auto or Manual mode). The global or WLC level –is
implemented – for the entire RF group and requires that both RF Groups Leaders (2.4 GHz and 5 GHz)
reside on the same physical controller. The default configuration on the WLC for the FRA algorithm is
Disabled (in the 8.2-8.5 releases).
Note FRA will likely be enabled by default in 8.6. A default value – will only apply to a new controller
installation, an upgrade to a new version will respect the current setting and make no changes. If the
upgrade is to a version of code in which the feature was not present – then the Default value will apply
to the newly added feature.
The other part of the configuration involves the Radio Interfaces that you want the Global FRA algorithm
to have control of. At the radio configuration level – the dual-band radios are all in auto FRA by default.
This will allow FRA to control them as soon as you enable it at the global level. The other option for
the radios is Manual mode – which prevents FRA from assigning a new role, but allows the algorithm to
make the COF calculations and otherwise run considering those radios in it’s output – but without
driving changes.
3. Interval– Minimum 1 hour, maximum 24 hours. In all cases – this must be set higher than DCA’s
run interval.
4. Service Priority–(new in 8.5) changes the mode FRA will run in and allows prioritization on what
role the redundant radios will be assigned.
Coverage–this is the only priority available prior to version 8.5. It sets the Cell Coverage target for FRA
to -67 dBm, and respects the selected Sensitivity Threshold of low, medium, and high. The priority for
a redundant radio in order of preference by DCA is:
1. Second 5 GHz interface–DCA will first try to add the additional interface into the existing 5
GHz channel plan based on DCA’s assessment of co-channel interference. This calculation is
very much affected by channel bandwidth (20/40/80/160) and the density of the network (how
close together the existing AP’s are). If not possible – DCA will place the redundant radio in
monitor role.
2. Monitor Role–the redundant Dual Band radio is placed in a full time scanning mode for both
the 2.4 and 5 GHz bands. Prior to version 8.4, this was a lifetime assignment unless one of the
contributing radios (those covering it’s cell) indicated a coverage hole, in which case the radio
is returned to service in 2.4 GHz instantly. In 8.4, logic was added to allow DCA to re-evaluate
5 GHz assignment after the initial assignment has been in the monitor role for at least 30
minutes. DCA will continue to see if the radio can be assigned to a 5 GHz role each time it runs
Client Aware–Is new in version 8.5. Client aware uses the same values as the coverage service priority
(target -67 dBm and Threshold) to make decisions on redundancy. However if the Radio role is placed
in Monitor role – if allows FRA to monitor the load on the dedicated 5 GHz interface and strongly
encourage DCA to add it to 5 GHz and deal with increased client density. Think of this as very High
Density on demand.
Note It is very possible to leave 2.4 GHz with less coverage than may be required by increasing Sensor
Threshold aggressiveness. See below for the full discussion on what this means.
Table 3-6
As the target RSSI Decreases the acceptable cell size will increase (become larger) and we will accept
a lower power level across the cell in order to increase the number of radios we mark redundant.
Swlwcting the Sensor Priority Sensor Threshold – allows FRA to mark any interface redundant that has
90% of it’s cell area covered by others at or greater than a signal strength of -79 dBm. This is going to
allow for a lot more sensors than Client Priority will with a coverage overlap factor of 100% at or greater
than -67 dBm.
A radio marked redundant when the Service Priority is Service Assurance, it continues to be handed to
DCA, and will be assigned a 5 GHz or Monitor role as above. However – if DNA Center determins that
it needs to turn the interface into an active client to carry out assurance testing – then that’s what that
radio will do – when called. Once the testing is done – the radio is returned to service in its previous role.
For a full discussion on FRA see the Radio Resource Management White Paper
RF Profiles
RRM at the Global Level set’s configuration parameters that apply to every AP associated with the RF
Group. Back when Wireless LAN Controllers had relatively low maximum numbers of AP’s (e.g.,100),
that was fine. Things change, and not only have AP limits jumped up so have users consumption of
network resources. Different use cases like High Client Density or Capacity model vs. Coverage models
require different optimizations to be efficient and meet design goals. In High Density, we are asking to
optimize users experience when close to a lot of AP’s – at minimal distances. For Coverage we are
optimizing for maximum cell coverage and reliable connection at distance from the AP in thin coverage.
RF Profiles allows for modifications to be applied to select groups of AP’s contained in the same AP
Group. You can configure an RF Profile for each radio on the AP, 2 RF Profiles per AP Group may be
applied. The classic use case for this is a lecture hall or large theater where a high Capacity design is
required to manage a high client density. Surrounding this theater however are hallways and open areas
where coverage is the bigger concern. A single global RRM setting for all of these AP’s will result in a
configuration that is likely not optimized for either environment. Placing the AP’s inside the theater in
one AP group (perhaps grouped with AP’s from other High Client density locations) and the AP’s in the
coverage areas like hallways and open areas in another AP group. Now you can configure RF Profiles
that optimize the required configurations to the intended design.
RF Profiles allow control over many functions beyond RRM’s algorithms; many of the HDX features
can also be customized for a specific group. On the controller’s Wireless menu – select
/Wireless/Advanced/RF Profiles:
We will cover the configuration options contained in an RF Profile first. Then we will cover the intended
use and configurations for the example profiles. In order to create a new RF Profile, go to Wireless >
RF Profiles and select “New….” (Fig. 19 bullet 2) and open the New RF Profile dialogue.
RF Profile - General
On the general tab – you can enter a short description regarding the use of this profile; you have 64
characters max. The general Tab Identifies what band the profile is created for and the RF Profile name
– neither of these can be edited after creation. If a mistake was made on the name during creation, you
need to delete the profile and re-create with the correct name.
RF Profile - 802.11
The 802.11 tab gives you control over the network settings which are controller specific not global.
These settings in RF Profiles override the controller Global configuration for the AP group it is applied
to
The 802.11 tab allows selection of data rates and their mode. On a Cisco AP a data rate can be in one of
3 states
1. Disabled—not allowed by the AP
2. Supported—allowed but not required by the AP
3. Mandatory—The client must support this data rate
The Minimum (lowest) Mandatory Data Rate (in the example above 9 Mbps) determines the speed at
which the beacon and all other subsequent broadcast messages will be sent at. In order for a client to
associate with an AP using 9 Mbps as the minimum Mandatory data rate, the client must be able to
complete association at 9 Mbps or faster or the client will not be allowed to join the AP. This effectively
limits the cell size of the AP to clients close enough to support 9 Mbps. This is a good default value for
average installations. In higher client density the value may be 12 Mbps, or in extreme high client density
designs where cell sizes are at their minimum you may even select 18,24 or 36 Mbps depending on the
design requirements.
The second Highest Mandatory data rate (24 Mbps in the example above) will be the default multicast
speed if auto multicast is not set (it is by default)
A data rate that is marked as supported, may be used by the client and the AP will honor it.
A data rate that is marked disabled will not be honored by the AP.
MCS data rates can be selected or de-selected only. Deselecting these rates will prevent the AP from
using them. All Data rates and selections are broadcast to potential clients in the beacon frame, and your
changes here will be reflected in the beacon message.
RF Profile - RRM
The RRM tab within an RF Profile allows for overriding the global parameters set at the RF Group Level.
1. TPC, allows for a custom Min/Max power level to be assigned for the entire AP Group, also a
custom TPC threshold for either TPCv1 or 2. NOTE: Selection of the TPC version is a global
selection only and either the TPCv1 or v2 threshold will be used as appropriate.
2. DCA, while not all the features of DCA are included at the RF Profile level the most important are,
for instance avoiding foreign AP interference may well perform better disabled in a rogue rich
environment. You can also set custom channel plans using a copy of the DCA channel list. In order
for a channel to be available within the RF Profile – it must be selected at the global DCA channel
List.
3. Coverage Hole Detection, is replicated completely and applies to all WLAN’s assigned to the AP
Group, individual WLANs may have coverage hole enabled or disabled on the global configuration
per controller.
Note Data RSSI entry is also used for Optimized Roaming threshold, if optimized roaming is enabled at the
global level. Please read Optimized Roaming before enabling.
4. Profile Threshold For Traps, allows setting of other thresholds within the RF profile – for instance
in a high client density area – more of everything will be normal – this allows you to make trap alert
messages useful for an AP group which otherwise may be set too low.
The High Density tab allows for optimizing certain HDX features at the RF Profile level on an AP group.
• High Density Parameters, allows selection of the maximum number of allowed clients on a radio
interface. This selection will simply deny access to any client number over the selected number. The
default value is 200. It is recommended to leave this at the default value.
• Rx SOP, allows selection of a RX Start Of Packet Sensitivity threshold – the selections are High,
Medium, Low, auto – the default is Auto. A thorough understanding of RX-SOP how it works and
the settings is highly advised. RX-SOP changes the receive sensitivity by setting a threshold RSSI
that a logical packet must meet in order to be received as Wi-Fi. See – High Density Experience
Features Release 8.0 for more on RX-SOP settings.
• Multicast Parameters – the default is Auto, or you may select a single dedicated data rate that all
multicast packets will use.
The Client Distribution tab gives you control over Load Balancing and Band Select options
• Load Balancing, allows setting of a threshold on an AP at which additional clients will be denied
with a status code of 17 which states that the AP can not process this request now because it has too
many clients, you can select the number of clients 0-20 and the number of denials that will be sent
before admission is granted. This is important, as client devices do not universally support status
code 17. Load Balancing can be better ensured by the selection of proper data rates and good
network design.
• Band Select, 802.11b/2.4 GHz profile only – Selection of the probe response box enables band
Select configuration at the RF Profile level and overrides the configuration settings at the global
level allowing for more aggressive band Select operation on a selected AP group only.
WLAN Express
With release 8.0 we’ve included a new day 0/1 startup dialogue that guides the user through questions
targeting best practices for Wireless LAN Controller deployment. The configuration dialogue and
options are designed to support the Cisco Wireless LAN Controller Configuration Best Practices. The
dialogue supports the application of suitable RF settings for low, medium, and high Client/AP density
and will apply suitable selections for data rates, and features designed to support higher density
environments. While no building or installation is ever the same, generalizations can be applied based
on the density of the Access Point deployment and intended number of clients.
In addition to the startup dialogue, there are 3 pre-configured RF profiles contained on the controller that
you can use for reference or apply as is. The configuration settings for these are below.
Low
Typical Density
(Enterprise - (Coverage Legacy
Default High Density Open (if disabled
Dependency Profile) (Throughput) Space) RF opt)
TPC Threshold Global per band Default -65 dBm -60 dBm Default
Specific RF Profile per (5GHz) (5GHz)
band -70 dBm -65 dBm
(2.4GHz) (2.4 GHz)
TPC Min Global per band Default 7 dBm Default Default
Specific RF Profile per
band
TPC Max Global per band Default Default Default Default
Specific RF Profile per
band
Rx Sensitivity Global per band Default Medium low Default
(rxsop) (Advanced Rx Sop)
RF profiles
Coverage RSSI Global per band Default Default Higher Default
Threshold data and voice RSSI in
(Coverage)
RF Profile
CCA Global per band Default Default Default Default
Threshold
802.11 a only (hidden)
RF Profile
Coverage Global Per band Default Default Lower Default
Client (Coverage Exception) (1-3)
Count RF Profiles (Coverage
Hole Detection)
Data Rates Global per band 12 Mbps 12 Mbps CCK rates default
(network) mandatory mandatory enable
RF Profiles 9 supported 9 supported
1, 2, 5.5, 6,
1, 2, 5.5, 6, 11 1, 2, 5.5, 6, 11 9,11,12
Mbps disable Mbps disable Mbps
enable
Band Select Per WLAN basis Enable Enabled Disable Enable
Low
Typical Density
(Enterprise - (Coverage Legacy
Default High Density Open (if disabled
Dependency Profile) (Throughput) Space) RF opt)
SI Global per band (Clean Enable Enable Enable Enable
Air)
ED-RRM Disable Disable Disable Disable
Global per band (DCA) Enable
PDA Enable Enable Enable
Global per band
(802.11a/802.11b
channel…)
High Density
High Density in this context should be thought of as any area where the average cell size is 3000-2000
sq feet (280-185 sq meters) and multiple AP’s have been deployed for Capacity reasons. Typical client
counts would be 50-100 clients per cell.
AP’s spaced at a distance of roughly 60 feet (18 meters) = 3000 sq ft cell size.
AP’s spaced at a distance of 50 feet (15 meters) = 2000 sq ft cell size
If you are engineering a specific theater, or lecture hall and increasing capacity to handle a density of 1
user per sq/meter you should follow the design recommendations for minimum data rates and power
levels.
Typical Density
Typical density will apply to most every other area of an enterprise installation, or common areas and
cube’s where active clients are spread out a bit but continuous coverage is provided. The average cell
size would be 3000 – 5000 sq feet (280-460 m sq) and the average number of users per cell would be
10-30.
AP’s spaced at a distance of 60 feet (18 meters) = 3000 sq ft cell size.
AP’s spaced at a distance of 80 feet (24 meters)= 5000 sq ft cell size
Low Density
The low density threshold is provided for very large cells of 5000 sq feet or more. In this profile – all
data rates are enabled, and power levels are increased through the TPC threshold to provide coverage
over the maximum distance of the cell edge. Lower data rates mean higher airtime utilization per user,
so the capacity is limited by airtime in this configuration. This would be a fine configuration for an
individual hot spot application or for outdoor coverage of an open field. This is also very close to the
default AP configurations if no selection is made.
RF Power Terminology
The terms such as dB, dBi, dBr and dBm are used to describe the amount of change in power measured
at points in a system, as perceived by the radio or compared to a reference power level. The following
sections cover their differences and provide general rules for their use. Effective isotropic radiated power
(EIRP) is also described.
dB
The term dB (decibel) is mainly used to describe attenuation or amplification of the signal level. dB is
a logarithmic ratio of a signal to another standardized value. This means that the dB by itself is not a
measurement For example, dBm is where the signal level value is being compared to 1 milliwatt of
power, and dBW is where the value is being compared to 1 watt of power.
The mathematical equation is:
power (in dB) = 10 * log10 (signal/reference)
Substituting in real numbers (signal 100 mW, reference 1 mW) provides a value in dB of 20 (100 = 10
squared; taking the exponent 2 and multiplying by 10 gives you 20).
Keep in mind that it is logarithmic, meaning that it increases or decreases exponentially and not linearly,
and it is a ratio of a given value to a reference. Also keep in mind that every increase of 10 dB represents
a multiplication by 10 (for example, 0 dBm = 1 mw, 10 dBm = 10 mw, 20 dBm = 100mW, and 30 dBm
= 1000mW (1W).
Given that it is logarithmic, there are general rules to take into consideration. An increase or decrease of
3 dB means that the signal doubled (double the power) or halved, respectively. An increase or decrease
of 10 dB means that the signal went up by 10 times or down to 1/10th of the original value.
Indoor and outdoor WLAN deployments each offer separate challenges in RF deployments that need to
be analyzed separately. However, there are a few general rules for indoor use. For every increase of 9
dB, the indoor coverage area should double. For every decrease of 9 dB, the indoor coverage area should
be cut in half.
dBm
The term dBm (dB milliwatt) uses the same calculation as described in the dB section but has a reference
value of 1 mW (0.001 W). Power in Wi-Fi is always below 1 mW.
Taking into consideration the example given above in the dB section, if the power increased from 1 mW
to 100 mW at the radio, the power level would increase from 0 dBm to 20 dBm.
Besides describing transmitter power, dBm can also describe receiver sensitivity. Receiver sensitivity is
in represented as minus dBm (-dBm) because the relatively low transmit power used in Wi-Fi – received
signals are always below 1 mW. The sensitivity indicates the lowest power the receiver can effectively
receive before it considers the signal unintelligible.
dBi
The term dBi (dB isotropic) describes the forward gain of a real antenna compared with the hypothetical
isotropic antenna. An isotropic antenna (a theoretical or imaginary antenna) is one that sends the same
power density perfectly in all directions.
Antennas are compared to this ideal measurement, and all FCC calculations use this measurement (dBi).
For example, a Cisco omni-directional AIR-ANT4941 antenna has a gain of 2.2 dBi, meaning that the
maximum energy density of the antenna is 2.2 dB greater than an isotropic antenna.
The Cisco Unified Wireless Network solution provides end-to-end security of architecture and product
security features to protect wireless local area network (WLAN) endpoints, the WLAN infrastructure,
and client communications.
The Cisco Unified Wireless Network solution builds upon the base security features of the IEEE
802.11-2012 standard by enhancing radio frequency (RF) and network-based security features to ensure
overall security.
802.1X
802.1X is an IEEE framework for port-based access control as adopted by the 802.11i security
workgroup. The framework provides authenticated access to WLAN networks.
• The 802.11 association process creates a "virtual" port for each WLAN client at the AP.
• The AP blocks all data frames apart from 802.1X-based traffic.
• The 802.1X frames carry the EAP authentication packets, which are passed through to the AAA
server by the AP.
• If the EAP authentication is successful, the AAA server sends an EAP success message to the AP,
where the AP then allows data traffic from the WLAN client to pass through the virtual port.
• Before opening the virtual port, data link encryption is established between the WLAN client and
the AP. This is to ensure no other WLAN client can access the port established for authenticating
clients.
Identity PSK
The Identity PSK (IPSK) feature supports the growing number of devices that are getting connected to
the Internet and do not support the 802.1x security protocol. These devices can connect to the network
using the WSA-PSK protocol. Using the IPSK feature, you can easily and securely connect individual
device or group of devices on the network with unique pre-shared keys.
• Encryption:
– AES-CCMP encryption (WPA2)
– TKIP encryption enhancements: key hashing (per-packet keying), message integrity check
(MIC) and broadcast key rotation via WPA/WPA2 or WEP TKIP Cisco Key Integrity Protocol
(CKIP)
• EAP request—The request packet is sent by the authenticator to the supplicant. Each request has a
type field that indicates what is being requested; for example, supplicant identity and EAP type to
be used. A sequence number allows the authenticator and the peer to match an EAP response to each
EAP request.
• EAP response—The response packet is sent by the supplicant to the authenticator, and uses a
sequence number to match the initiating EAP request. The type of the EAP response generally
matches the EAP request, except if the response is a negative-acknowledgment (NAK).
• EAP success—The success packet is sent, from the authenticator to the supplicant, when successful
authentication occurs.
• EAP failure—The failure packet is sent, from the authenticator to the supplicant, when unsuccessful
authentication occurs.
When using EAP in an 802.11i compliant system, the AP operates in EAP pass-through mode.
Pass-through mode checks the code identifier and the length fields, and then forwards EAP packets
received from the client supplicant to the AAA. EAP packets received by the authenticator from the AAA
server are forwarded to the supplicant. Figure 4-2 is an example of an EAP protocol flow.
Authentication
Depending on your requirements, various authentication protocols such as PEAP, EAP-TLS, and
EAP-FAST are used in secure wireless deployments. Regardless of the protocol, they all use 802.1X,
EAP, and RADIUS as their underlying transport.
These protocols allow network access control based on the successful authentication of the WLAN client
and vice-versa. This solution also provides authorization through policies communicated through the
RADIUS protocol, as well as RADIUS accounting.
EAP types used for performing authentication are described in more detail below. The primary factor
affecting the choice of EAP protocol is the authentication system (AAA) currently used. Ideally, a secure
WLAN deployment should not require the introduction of a new authentication system, but rather should
leverage the authentication systems that are already in place.
Supplicants
The various EAP supplicants that are available in the marketplace reflect the diversity of authentication
solutions available and customer preferences.
Table 4-1 shows a summary of common EAP supplicants:
• EAP-FAST—EAP-Flexible Authentication via Secured Tunnel. Uses a tunnel similar to that used in
PEAP, but does not require the use of Public Key Infrastructure (PKI).
• PEAP MSCHAPv2—Protected EAP MSCHAPv2. Uses a Transport Layer Security (TLS) tunnel,
(the IETF standard of SSL) to protect an encapsulated MSCHAPv2 exchange between the WLAN
client and the authentication server.
• PEAP GTC—Protected EAP Generic Token Card (GTC). Uses a TLS tunnel to protect a generic
token card exchange; for example, a one-time password or LDAP authentication.
• EAP-TLS—EAP Transport Layer Security. Uses PKI to authenticate both the WLAN network and
the WLAN client, requiring both a client certificate and an authentication server certificate.
PEAP
Cisco MS-CHAPv PEAP
EAP-FAST 2 EAP-GTC EAP-TLS
1
Single sign-on (MSFT AD only) Yes Yes Yes Yes
Login scripts (MSFT AD only) Yes Yes Some Yes2
Password change (MSFT AD) Yes Yes Yes N/A
Microsoft AD database support Yes Yes Yes Yes
ACS local database support Yes Yes Yes Yes
3
LDAP database support Yes No Yes Yes
4
OTP authentication support Yes No Yes No
RADIUS server certificate required? No Yes Yes Yes
Client certificate required? No No No Yes
5 6
Anonymity Yes Yes Yes No
1. Supplicant dependent
2. Machine account and machine authentication is required to support the scripts.
3. Automatic provisioning is not supported on with LDAP databases.
4. Supplicant dependent
5. Supplicant dependent
6. Supplicant dependent
Authenticator
The WLC is the authenticator acting as a relay for EAP messages exchanged between the 802.1X-based
supplicant and the RADIUS authentication server. Once authentication is completed successfully, the
WLC receives the following:
• A RADIUS packet containing the EAP success message.
• An encryption key, which is generated at the authentication server during the EAP authentication.
• RADIUS vendor-specific attributes (VSAs) for communicating policy.
Figure 4-3 displays the logical location of the authenticator within the overall authentication
architecture. The authenticator controls network access using the 802.1X protocol, and relays EAP
messages between the supplicant and the authentication server.
• Packet no.17 is the EAP message informing the supplicant and the authenticator that the
authentication was successful; in addition, Packet no.17 carries encryption keys and authorization
information, in the form of RADIUS VSAs, to the authenticator.
Authentication Server
The authentication server used in the Cisco Secure Unified Wireless Network solution is the Cisco
Access Control Server (ACS) and the Cisco Identity Services Engine (ISE). ACS is available as software
that is installed on a Windows servers, or as an appliance. ISE is available as software that is installed
on the VM server. Alternatively, the authentication server role can be implemented within specific
WLAN infrastructure devices such as local authentication services on an IOS AP, local EAP
authentication support within the WLC, AAA services integrated in any AAA server that supports the
required EAP types.
Figure 4-4 shows the logical location of the authentication server within the overall wireless
authentication architecture, where it performs the EAP authentication via a RADIUS tunnel.
After the completion of a successful EAP authentication, the authentication server sends an EAP success
message to the authenticator. This message tells the authenticator that the EAP authentication process
was successful, and passes the pair-wise master key (PMK) to the authenticator that is in turn used as
the basis for creating the encrypted stream between the WLAN client and the AP.
Encryption
Encryption is a necessary component of WLAN security to provide privacy over a local RF broadcast
network. Any new deployment should be using either TKIP (WPA/WPA2) or AES encryption.
In WPA and WPA2, the encryption keys are derived during the four-way handshake discussed later in
this section.
TKIP Encryption
Enterprise-level encryption mechanisms specified by 802.11i are certified as WPA/WPA2 and wIPS by
the Wi-Fi Alliance: Temporal Key Integrity Protocol (TKIP), and Advanced Encryption Standard (AES).
TKIP is the certified encryption method. It provides support for legacy WLAN equipment by addressing
the original flaws associated with the 802.11 WEP encryption method. It does this by making use of the
original RC4 core encryption algorithm.
The hardware refresh cycle of WLAN client devices is such that TKIP and AES is likely to be a common
encryption option for a number of years to come. The AES encryption is the preferred method because
it brings the WLAN encryption standards into alignment with broader IT industry standards and best
The two primary functions of TKIP are the generation of a per-packet key using RC4 encryption of the
MAC service data unit (MSDU) and a message integrity check (MIC) in the encrypted packet. The
per-packet key is a hash of the transmission address, the frame initialization vector (IV), and the
encryption key. The IV changes with each frame transmission, so the key used for RC4 encryption is
unique for each frame.
The MIC is generated using the Michael algorithm to combine a MIC key with user data. The use of the
Michael algorithm is a trade-off because its low computational overhead is good for performance, but it
can be susceptible to an active attack. To address this, WPA includes countermeasures to safeguard
against these attacks that involve temporarily disconnecting the WLAN client and not allowing a new
key negotiation for 60 seconds. Unfortunately, this behavior can itself become a type of DoS attack.
Many WLAN implementations provide an option to disable this countermeasure feature.
Recommendations:
• Network administrators should purchase or deploy equipment that supports WPA2.
• Network administrators should configure their APs to be WPA2 only.
• Equipment vendors should proactively transition away from TKIP support by discouraging its use
to their customer base, and removing the functionality in product as internal research indicates when
their market no longer needs it.
For equipment vendors, Wi-Fi Alliance recommends that they discourage the use of TKIP in the short
term, and ultimately remove TKIP from all Wi-Fi devices when their market no longer needs it. At a
minimum, vendors should remove TKIP and any "TKIP-only" mode configurations from the primary
device interface. Access to the "TKIP-only" configuration mode via a secondary configuration interface
is acceptable. The requirement to go to a secondary interface is a mechanism used to restrict TKIP usage
to only those deployments with legacy devices; other deployments will typically use the primary
configuration interface.
Transitional Exception:
Vendors should remove TKIP and any "TKIP-only" mode configurations from the primary device
interface. Access to the "TKIP-only" configuration mode via a secondary configuration interface is
acceptable (CLI).
For more information, see Technical Note - Removal of TKIP from Wi-Fi Devices.
We developed a set of commands to configure TKIP from CLI mode only as was recommended by the
Wi-Fi alliance:
(Cisco Controller) >config wlan security wpa wpa1 ciphers tkip <en/dis> <wlan#>
(Cisco Controller) >test wlan standalone-tkip <enable/disable> <wlan#>>
If the same configuration is attempted from the GUI interface the following will be displayed on the
screen:
AES Encryption
Figure 4-6 displays the basic AES counter mode/CBC MAC Protocol (CCMP) flow chart. CCMP is one
of the AES encryption modes, where the counter mode provides confidentiality and CBC MAC provides
message integrity.
In the CCMP procedure, additional authentication data (AAD) is taken from the MAC header and
included in the CCM encryption process. This protects the frame against alteration of the non-encrypted
portions of the frame.
To protect against replay attacks, a sequenced packet number (PN) is included in the CCMP header. The
PN and portions of the MAC header are used to generate a nonce that is in turn used by the CCM
encryption process.
Four-Way Handshake
The four-way handshake is the method used to derive the encryption keys to encrypt wireless data
frames. Figure 4-7 graphically represents the frame exchanges used to generate the encryption keys.
These keys are referred to as temporal keys.
The encryption keys are derived from the PMK that is mutually derived during the EAP authentication.
This PMK is sent to the authenticator in the EAP success message, but is not forwarded to the supplicant
because the supplicant has derived its own copy of the PMK.
1. The authenticator sends an EAPOL-Key frame containing an authenticator nonce (ANonce), which
is a random number generated by the authenticator.
The supplicant derives a PTK from the ANonce and supplicant nonce (SNonce), which is a random
number generated by the client/supplicant.
2. The supplicant sends an EAPOL-Key frame containing an SNonce, the RSN information element
from the (re)association request frame, and an MIC.
The authenticator derives a PTK from the ANonce and SNonce and validates the MIC in the
EAPOL-Key frame.
3. The authenticator sends an EAPOL-Key frame containing the ANonce, the RSN information
element from its beacon or probe response messages; the MIC, determining whether to install the
temporal keys; and the encapsulated group temporal key (GTK), the multicast encryption key.
4. The supplicant sends an EAPOL-Key frame to confirm that the temporal keys are installed.
The distribution of these cached PMKs to APs is greatly simplified in the Cisco Unified Wireless
Network deployment. The PMK is simply cached in the controller(s) and made available to all APs that
connect to it. The PMK is also shared with all other controllers that make up a mobility group with the
anchor controller.
Cisco Centralized Key Management (CCKM) is a Cisco standard supported by Cisco Compatible
Extensions clients to provide fast secure roaming (FSR). The principle mechanism for accelerating the
roaming process is the same as PKC, which is to use a cached PMK. However, the implementation in
CCKM is slightly different, which makes the two mechanisms incompatible with each other.
The state of the key cache for each WLAN client can be seen with the show pmk-cache all command.
This identifies which clients are caching the keys, and which key caching mechanism is being used. The
802.11r workgroup is responsible for the standardization of an FSR mechanism for 802.11.
The WLC supports both CCKM and PKC on the same WLAN -802.1x+CCKM, as shown in the
following example:
Figure 4-10 illustrates one of the primary features of the architecture: how APs use the CAPWAP
protocol to communicate with and tunnel traffic to a WLC.
The EAP types supported locally on the WLC are LEAP, EAP-FAST, EAP-TLS, and PEAP.
Figure 4-15 displays the window where you can select the local EAP profiles.
WLC can use its local database for authentication data, and it can also access an LDAP directory to
provide data for EAP-FAST or EAP-TLS authentication. The user credential database priority (LDAP
versus Local) is configurable, as shown in Figure 4-16.
• If you are using an external web server with a Cisco 5500 Series Controller or a controller network
module, you must configure a pre-authentication ACL on the WLAN for the external web server.
• If you apply an ACL to an interface or a WLAN, wireless throughput is degraded when downloading
from a 1-GBps file server. To improve throughput, remove the ACL from the interface or WLAN,
move the ACL to a neighboring wired device with a policy rate-limiting restriction, or connect the
file server using 100 Mbps rather than 1 Gbps.
• Multicast traffic received from wired networks that is destined to wireless clients is not processed
by WLC ACLs. Multicast traffic initiated from wireless clients, destined to wired networks or other
wireless clients on the same controller, is processed by WLC ACLs.
• ACLs are configured on the controller directly or configured through templates. The ACL name
must be unique.
• You can configure ACL per client (AAA overridden ACL) or on either an interface or a WLAN. The
AAA overridden ACL has the highest priority. However, each interface, WLAN, or per client ACL
configuration that you apply can override one another.
• If peer-to-peer blocking is enabled, traffic is blocked between peers even if the ACL allows traffic
between them.
• Authentication traffic has to go through the Cisco WLC for this feature to be supported, even if
DNS-based ACL is local to the AP.
• When you create an ACL, it is recommended to perform the two actions (create an ACL or ACL rule
and apply the ACL or ACL rule) continuously either from CLI or GUI.
Figure 4-17 displays the ACL Configuration page. The ACL can specify source and destination address
ranges, protocols, source and destination ports, DSCP, and direction in which the ACL is to be applied.
An ACL can be created out of a sequence of various rules.
Figure 4-19 Illustration of Layer 2 ACL available for configuration on the WLC
At the client authentication phase, the ISE server returns the pre-authentication ACL (url-redirect-acl).
The DNS snooping is performed on the AP for each client until the registration is complete and the client
is in SUPPLICANT PROVISIONING state. When the ACL configured with the URLs is received on the
Cisco WLC, the CAPWAP payload is sent to the AP enabling DNS snooping on the client and the URLs
to be snooped.
With URL snooping in place, the AP learns the IP address of the resolved domain name in the DNS
response. If the domain name matches the configured URL, then the DNS response is parsed for the IP
address, and the IP address is sent to the Cisco WLC as a CAPWAP payload. The Cisco WLC adds the
IP address to the allowed list of IP addresses and thus the client can access the URLs configured.
Figure 4-20 Illustration of DNS based ACL available for configuration on the WLC
to restrict URLs for all protocol including HTTP and HTTPS. URL Filtering ACL is defined as set of
URLs, which are associated with Allow/Deny action for all URLs. This is defined under an ACL type,
either a white or black list. A mix of white and black list rules is not supported. An external server's ip
address is configured which is used to redirect blocked page to client if the access URL is blocked as per
configuration.
WLC snoops the DNS response for the client and if the URL is allowed as per the configuration (ACL
rule), DNS response will be sent to the client. If the URL is not allowed as per the configuration (ACL
rule), the resolved IP will be overwritten with an external server's IP (which we would have configured)
and returned to the client. This external server will redirect blocked page to the clients. Counters for the
allowed and denied DNS responses are viewable for an ACL as they are getting hit.
Platform Support
1. Feature support is available on 3504 ( begin with rel 8.5) , 5520 and 8540. It is not supported on
5508, 8510, vWLC, 2504 and ME.
2. Supported in Local mode and Flex central switching only.
Considerations
1. Wildcard support (e.g. *.domain.com)
2. 10 Wildcards
3. 5 subdomains per wildcard
4. URL Filtering includes
1. Support of 100 URLs
a. No Sub-URL support (e.g. www.domain.com and www.domain.com/resources)
Domain Filtering
Domain Filtering is a new enhancement that is being introduced as part of the 8.3 release. This
enhancement complements the Application Visibility Control (AVC) filtering currently available on the
WLC. AVC filtering only supports the protocols and applications that are defined in the Protocol Pack
for a given AirOS release allowing specific applications to be dropped, marked or rate-limited. Domain
Filtering builds upon AVC by using the NBAR2 engine to look deeper into the application layer
matching on both the application type (e.g. HTTP) and host (e.g. www.cisco.com). In the 8.3 release
administrators can now define ACLs and rules which can be applied to WLANs, Interfaces or Local
Domain Filtering is based on the NBAR2 engines filtering capabilities using field extraction. The latest
NBAR2 engine supports 120 custom applications. URLs can be defined as a custom application and be
classified by the engine:
1. URLs are classified using ACLs defined on the WLC. Each ACL has rules defined that determine
the URLs to be matched.
2. The NBAR2 engine is configured to extract the URL field (if present) in the packets passed to it.
Field extraction is performed per flow to optimize performance.
3. The WLC passes HTTP packets to the NBAR2 engine to extract the URL. If present, the NBAR2
engine returns the host-name (for example www.cisco.com) as the URL to the WLC.
4. The WLC implements filtering logic for the extracted URLs and takes the appropriate forwarding
action (i.e. permit or denies the flow).
• This release supports a maximum of 100 x URL ACLs:
– Each ACL supports a maximum of 64 rules.
– Each rule has either a permit or deny action. At least one permit rule must be defined per URL
ACL for traffic to be permitted.
– Each ACL has an implicit “deny all rule” as the last rule. If a URL does not match any of the
rules, it is dropped by the WLC.
– Each rule is inspected in order of precedence (lowest to highest). The first rule in the ACL that
is matched is applied to the flow.
– Each rule supports a maximum length 32 characters.
– Each rule must match the exact subdomain, domain and top level domain you wish to match
(example www.cisco.com, tools.cisco.com or partners.cisco.com).
– Partial matches using wildcards or regular expressions are not supported in this release
(example. www.c*.com or *.cisco.com).
– No support for folders, file-names or extensions is provided in this release (example
www.cisco.com/resources/index.html). A rule matching www.cisco.com will be applied to
www.cisco.com/c/en/us/support.index.html as well as http://www.cisco.com/c/en/us/buy.html.
– One wildcard (*) rule with a permit or deny action is supported per ACL. The wildcard matches
all URLs.
• No support for AVC Profiles for matched URLs is provided in this release. URL ACLs and rules are
defined separately then applied to WLANs, Interfaces or Local Policies.
• No support for IPv6 in this release (IPv4 support only). • No support for PI is provided in this
release.
Note Release 8.4 supports HTTP URLs only. HTTPS URL support will be introduced in a later release.
• Scenario 1—A ACL and rules are defined to deny access to specific HTTP URLs. This is commonly
referred to as Blacklisting.
• Scenario 2—A ACL and rules are defined to only permit access to specific HTTP URLs. This is
commonly referred to as Whitelisting.
URL ACLs can be assigned dynamically to clients using Local Policies or directly to WLANs or
Interfaces:
– Local Policy–The URL ACL is applied to all clients assigned the Local Policy. URL ACLs
assigned using Local Policies have the highest priority and will override URL ACLs assigned
to the WLAN or Interface. ?
– WLANs–The URL ACL is applied to all clients associated to the WLAN (unless a URL ACL
is assigned to a client using a Local Policy). URL ACLs assigned to a WLAN will override a
URL ACL assigned to an Interface. ?
– Interfaces–The URL ACL is applied to all traffic forwarded specific interface.?The following
steps demonstrate how to assign URL ACLs on a WLC to WLANs, Interfaces and Local
Policies.
For complete deployment scanarios and configuration steps please review the Domain Filtering
Deployment Guide at the link below
https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/8-3/b_domain_filtering.html
DNS request always precedes web request. Wireless Lan Controller intercepts DNS request from the
client and redirects the query to Cisco Umbrella in the cloud (208.67.222.222, 208.67.220.220). Cisco
Umbrella servers resolve the DNS query and enforces preconfigured security filtering rules on a per
identity basis to mark the domain as either malicious which will return a blocked page to client or safe
returning resolved IP address to client.
1. WLC registration with Cisco Umbrella server is a one-time process and happens over a secure
HTTPS tunnel
2. Obtain API Token for device (WLC) registration from Cisco Umbrella dashboard
3. Apply the Token on Wireless Lan Controller. This should register the device to Cisco Umbrella
account. Next, create Cisco Umbrella Profile/s on WLC. Profiles will automatically be pushed to the
Cisco Umbrella as Identities and policy will be enforced on a per identity basis
4. Wireless client traffic flow from to Cisco Umbrella server
5. A wireless client sends a DNS request to WLC
6. WLC snoops the DNS packet and tags it with a Cisco Umbrella Profile. Profile is the identity of the
packet which also resides on Cisco Umbrella
7. This EDNS packet is redirected to the Cisco Umbrella cloud server for name resolution
8. Cisco Umbrella then enforces a policy on it depending on the identity and applies category based
filtering rules to ensure organization compliance
9. Depending on the rules, it either returns a blocked page or resolved ip address to the client for the
DNS request queried
OpenDNS Support
• WLC supported platform- 3504 (Begin with rel 8.5), 5508,5520,7500,8510 and 8540.
• ME, 2500 and vWLC are not supported
• AP mode supported–Local mode, Flex central switching.
• 10 different OpenDNS Profiles configurable on WLC
• Guest (Foreign–Anchor) scenario, profile applies at Anchor WLC
OpenDNS Limitations
• Client is connected to a web proxy and does not send DNS query to resolve the server address
• Application or host uses IP address directly instead of DNS to query domains
Cisco Umbrella configuration steps on Wireless Controller involve enabling Cisco Umbrella function,
configuring API Token, creating Profile/s and mapping the profile to either a WLAN, an AP group or a
Local Policy.
Peer-to-Peer Blocking
The WLC can be configured to block communication between clients on the same WLAN. This prevents
potential attacks between clients on the same subnet by forcing communication through the router.
Figure 4-21 is the configuration screen for peer-to-peer blocking on the WLC.
Note This is a not a global setting on the WLC and applies to a specific WLANs in later releases.
Wireless IDS
The WLC performs WLAN IDS analysis using information obtained from all of the connected APs, and
reports detected attacks to WLC as well to the WCS. The Wireless IDS analysis is complementary to any
analysis that can otherwise be performed by a wired network IDS system. The embedded Wireless IDS
capability of the WLC analyzes 802.11and WLC-specific information that is not otherwise visible or
available to a wired network IDS system.
The wireless IDS signature files used by the WLC are included in WLC software releases; however, they
can be updated independently using a separate signature file. Custom signatures are displayed in the
Custom Signatures window.
Figure 4-22 is the Standard Signatures window in the WLC.
Local Mode with wIPS provides wIPS detection “on-channel”, which means attackers will be detected
on the channel that is serving clients. For all other channels, ELM provides best effort wIPS detection.
This means that every frame the radio would go “off-channel” for a short period of time. While
"off-channel", if an attack occurs while that channel is scanned, the attack will be detected.
An example of Local Mode with wIPS on an AP3600, the 2.4 GHz radio is operating on channel 6. The
AP will constantly monitor channel 6, any attacks on channel 6 will be detected and reported. If an
attacker attacks channel 11, while the AP is scanning channel 11 “off-channel”, the attack will be
detected.
The features of ELM are:
• Adds wIPS security scanning for 7x24 on channel scanning (2.4 GHz and 5 GHz), with best effort
off channel support.
• The access point is additionally serving clients and with the G2 Series of Access Points enables
CleanAir spectrum analysis on channel (2.4 GHz and 5 GHz).
• Adaptive wIPS scanning in data serving local and FlexConnect APs.
• Protection without requiring a separate overlay network.
• Supports PCI compliance for the wireless LANs.
• Full 802.11 and non-802.11 attack detection.
• Adds forensics and reporting capabilities.
• Flexibility to set integrated or dedicated MM APs.
• Pre-processing at APs minimize data backhaul (that is, works over very low bandwidth links).
• Low impact on the serving data.
Monitor Mode
Monitor Mode provides wIPS detection "off-channel", which means the access point will dwell on each
channel for an extend period of time, this allows the AP to detect attacks on all channels. The 2.4GHz
radio will scan all 2.4GHz channels, while the 5GHz channel scans all 5GHz channels. An additional
access point would need to be installed for client access.
Some of the features of Monitor Mode are:
• The Monitor Mode Access Point (MMAP) is dedicated to operate in Monitor Mode and has the
option to add wIPS security scanning of all channels (2.4GHz and 5GHz).
• The G2 Series of Access Points enable CleanAir spectrum analysis on all channels (2.4GHz and
5GHz).
• MMAPs do not serve clients.
In the traditional wIPS deployment, a recommended ratio is 1 monitor mode AP to every 5 local mode
APs (ratio can vary based on network design and expert guidance for best coverage). With ELM, you
simply enable the ELM feature for all of the APs, effectively adding monitor mode wIPS operations to
local data-serving mode AP while still maintaining performance.
AP 3600/3700 with Wireless Security Module (WSM): The Evolution of Wireless Security and Spectrum
A Cisco 3600/3700 series Access point with the WSM module (AIR-RM300M=) uses a combination of
"on-channel" and "off-channel". This means that the AP3600/3700 2.4 GHz and 5 GHz will scan the
channel that they are serving clients and the WSM module would operate in monitor mode and scan all
channels.
Some of the features of the WSM Module are:
• Industry's first Access Point enabling the ability to simultaneously Serve clients, wIPS security scan,
and analyze the spectrum using CleanAir Technology.
• Dedicated 2.4 GHz and 5 GHz radio with its own antennas enabling 7x24 scanning of all wireless
channels in the 2.4 GHz and 5 GHz bands.
• A single Ethernet infrastructure provides simplified operation with fewer devices to manage and
optimized return on investment of the AP3600 wireless infrastructure and the Ethernet wired
infrastructure.
Cisco gen 1 module wireless security module (AIR-RM3000M=) is capable of scanning attacks over the
air only on 20 MHz channel. It is incapable of detecting attacks on 11ac rates. Cisco introduced the new
Hyperlocation module with advanced security (AIR-RM3010L-x-K9= )that is capable to detecting
attacks on 11ac rates and reporting to the MSE.
Following is the comparison table with differences between the two security modules. The part numbers
are different and WSM can only scan 20MHz channels while ASM can scan 20/40/80MHz. Both are field
upgradable modules that go on 3600 and 3700 APs. The gen2 modules comes with a hyper location
antenna array for location accuracy and it can work independently of the antenna array.
AP in Monitor mode provides dedicated wIPS security scanning of all channels (2.4GHz and 5GHz)
for over the air attacks.
Local Mode with wIPS provides wIPS detection “on-channel”, which means attackers will be detected
on the channel that is serving clients. For all other channels, ELM provides best effort wIPS detection.
This means that every frame the radio would go “off-channel” for a short period of time. While
“off-channel”, if an attack occurs while that channel is scanned, the attack will be detected. FRA radio
in ELM client serving mode is still capable of serving clients.
For additional information and configuration steps please see wIPS deployment guide at the link below:
https://www.cisco.com/c/en/us/td/docs/wireless/technology/wips/deployment/guide/WiPS_deployment
_guide.html
CleanAir Integration
Cisco CleanAir technology is a spectrum-aware, self-healing, and self-optimizing wireless network that
mitigates the impact of wireless interference and offers performance protection for 802.11n networks.
The ELM feature compliments CleanAir operations with similar performance and benefits as monitor
mode AP deployments, including these existing CleanAir spectrum-aware benefits:
• Dedicated silicon-level RF intelligence
• Spectrum-aware, self-healing, and self-optimizing
• Non-standard channel threat and interference detection and mitigation
• Non-Wi-Fi detection such as Bluetooth, microwave, cordless phones, and so forth
• Detect and locate RF layer DOS attacks such as RF jammers
1. In order for an alarm to be triggered on the Cisco Adaptive wIPS system, an attack must be launched
against a legitimate Access Point or Client. Legitimate Access Points and clients are discovered
automatically in a Cisco Unified Wireless Network by 'trusting' devices broadcasting the same
'RF-Group' name. In this configuration, the system dynamically maintains a list of local-mode
Access Points and their associated clients. The system can also be configured to 'trust' devices by
SSID using the SSID Groups feature. Only attacks, which are considered harmful to the WLAN
infrastructure, are propagated upwards to the rest of the system.
2. Once an attack has been identified by the wIPS Mode Access Point engine, an alarm update is sent
to the Wireless LAN Controller and is encapsulated inside the CAPWAP control tunnel.
3. The Wireless LAN Controller will transparently forward the alarm update from the Access Point to
the wIPS Service running on the Mobility Services Engine. The protocol used for this
communication is NMSP.
4. Once received by the wIPS Service on the Mobility Services Engine, the alarm update will be added
to the alarm database for archival and attack tracking. An SNMP trap is forwarded to the Prime
Infrastructure containing the attack information. If multiple alarm updates are received referencing
the same attack (for example, if multiple Access Points hear the same attack) only one SNMP trap
will be sent to Prime Infrastructure.
5. The SNMP trap containing the alarm information is received and displayed by Prime Infrastructure.
• Release 7.2 and later wireless IPS functionality requires monitor mode (that is, non-client-serving)
access points
• Release 7.2.xxx and later wireless IPS functionality requires access points in local mode with wIPS
(that is, client-serving)
The minimum code versions required for the Wireless Security Module (WSM):
• Wireless LAN Controller(s)—Version 7.4.XX or greater
• Cisco Prime Infrastructure—Version 1.3.XX or greater
• Mobility Services Engine—Version 7.4.XX or greater
As depicted in the above diagram, a wIPS deployment is based on hearing 802.11 management and
control frames which are used by a majority of attacks to cause harm. This is in contrast to a data Access
Points deployment that is surveyed to provide higher throughput data rates anywhere from 24Mbps to
54Mbps.
There are numerous factors that go into deciding exactly the number of wIPS Access Points that are
required for a specific environment. Given that each prospective deployment's security requirements and
environmental conditions are different, there is no hard and fast rule that will address the needs of every
deployment but a few generalized guidelines must be taken into account.
The main factors, which affect the number of wIPS Access Points required, are as follows.
monitor mode, and 3600 series Access points with the WSM module. Overlaying wIPS protection and
data shares many of the components including controllers and Prime Infrastructure thus reducing
duplicate infrastructure costs.
Forensics
The Cisco Adaptive wIPS system provides the ability to capture attack forensics for further investigation
and troubleshooting purposes. At a base level, the forensics capability is a toggle-based packet capture
facility, which provides the ability to log and retrieve a set of wireless frames. This feature is enabled on
a per attack basis from within the wIPS profile configuration of PI.
Once enabled, the forensics feature is triggered once a specific attack alarm is seen over the airwaves.
The forensic file will be created based on the packets contained within the buffer of the wIPS Mode AP
that triggered the original alarm. This file is transferred to the Wireless LAN Controller via CAPWAP,
which then forwards the forensic file via NMSP to the wIPS Service running on the Mobility Services
Engine. The file is stored within the forensic archive on the MSE until the user configured disk space
limit for forensics is reached. By default this limit is 20 GB, which when reached will cause the oldest
forensic files to be removed. Access to the forensic file can be obtained by opening the alarm on the
Prime Infrastructure, which contains a hyperlink to the forensic file. The files are stored as a '.CAP' file
format which can be opened by either WildPacket's Omnipeek, AirMagnet Wi-Fi Analyzer, Wireshark
or any other packet capture program which supports this format. See Wireshark for detailed information.
Client Exclusion
In addition to Wireless IDS, the WLC is able to take additional steps to protect the WLAN infrastructure
and WLAN clients. The WLC is able to implement policies that exclude WLAN clients whose behavior
is considered threatening or inappropriate. Figure 4-25 shows the Exclusion Policies window, containing
the following currently supported client exclusion policies:
• Excessive 802.11 association failures—Possible faulty client or DoS attack
• Excessive 802.11 authentication failures—Possible faulty client or DoS attack
• Excessive 802.1X authentication failures—Possible faulty client or DoS attack
• Maximum 802.1X —AAA Failure Attempts (1-10)
• IP theft or IP reuse—Possible faulty client or DoS attack
• Excessive web authentication failures—Possible DoS or password-cracking attack
the active AP sends de-authentication messages to all connected clients and then shuts down the radio
interface. Then, it associates to the rogue AP as a client. The AP then tries to obtain an IP address from
the rogue AP and forwards a User Datagram Protocol (UDP) packet (port 6352) that contains the local
AP and rogue connection information to the controller through the rogue AP. If the controller receives
this packet, the alarm is set to notify the network administrator that a rogue AP was discovered on the
wired network with the RLDP feature. RLDP has 100% accuracy in rouge AP detection. It detects Open
APs and NAT APs.
A rogue access point is moved to a contained state either automatically or manually. The controller
selects the best available access point for containment and pushes the information to the access point.
The access point stores the list of containments per radio. For auto containment, you can configure the
controller to use only the monitor mode access point.
3. Rogue Client Validation—use the AAA, MSE server or local database to validate if rogue clients
are valid clients, select the Validate Rogue Clients.
MSE responds with information about whether the rogue client is a valid learned client or not. The
controller can contain or consider the rogue client as a threat.
4. Detect and Report Ad-Hoc Networks—if necessary select ad hoc rogue detection and reporting.
5. Rogue Detection Report Interval—the time interval, in seconds, at which APs should send the
rogue detection report to the controller. The valid range is 10 seconds to 300 seconds, and the default
value is 10 seconds.
6. Rogue Detection Minimum RSSI—the minimum Received Signal Strength Indicator (RSSI) value
that a rogue entry should have for APs to detect the rogue and for a rogue entry to be created in the
controller. The valid range is -128 dBm to -0 dBm, and the default value is 0 dBm. This feature is
applicable to all the AP modes. There can be many rogues with very weak RSSI values that do not
provide any valuable information in rogue analysis. Therefore, you can use this option to filter
rogues by specifying the minimum RSSI value at which APs should detect rogues.
7. Rogue Detection Transient Interval—time interval at which a rogue should be scanned for by the
AP after the first time the rogue is scanned. After the rogue is scanned for consistently, updates are
sent periodically to the controller. Thus, the APs filter the transient rogues, which are active for a
very short period and are then silent. The valid range is between 120 seconds to 1800 seconds, and
the default value is 0. The rogue detection transient interval is applicable to the monitor mode APs
only.
Caution When you select any of the Auto Contain parameters and click Apply, the following message is
displayed:
"Using this feature may have legal consequences. Do you want to continue?"
The 2.4-GHz and 5-GHz frequencies in the Industrial, Scientific, and Medical (ISM) band are open to
the public and can be used without a license. As such, containing devices on another party's network
could have legal consequences.
Figure 4-27 Illustrates Rogue Policies configuration options; RLDP security levels and enablement on
the Aps; also it shows the validation configuration against AAA or MSE.
Rogue AP
The Cisco Unified Wireless Networking solution, as shown in Figure 4-28, provides a complete solution
for rogue APs. This solution provides:
• Air/RF detection—Detection of rogue devices by observing/sniffing beacons and 802.11 probe
responses.
• Rogue AP location—Use of the detected RF characteristics and known properties of the managed
RF network to locate the rogue device.
• Wire detection—A mechanism for tracking/correlating the rogue device to the wired network.
• Rogue AP isolation—A mechanism to prevent client connection to a rogue AP.
Air/RF Detection
The two AP RF detection deployment models are:
• Standard AP deployment
• Monitor mode AP deployment
Both deployment models support RF detection and are not limited to rogue APs, but can also capture
information upon detection of ad-hoc clients and rogue clients (the users of rogue APs). An AP that is
configured for monitor mode is dedicated to scanning the RF channels and does not support client
association or data transmission.
When searching for rogue APs, an AP goes off channel for 50 ms to listen for rogue clients, and to
monitor noise and channel interference. The channels scanned are configured in the global WLAN
network parameters for 802.11a and 802.11b/g.
Any detected prospective rogue client(s) and/or access points are sent to the controller to gather the
following information:
• Rogue AP MAC address
• Rogue AP name
• Rogue connected client(s) MAC address
• Whether the frames are protected with WPA, WEP and WEP2
• The preamble
• Signal-to-noise ratio (SNR)
• Received signal strength indication (RSSI)
• Switchport tracing
The prospective rogue client/AP is not labeled a rogue until the WLC receives another report from a
trusted AP or until the completion of a second detection cycle. The trusted AP moves to the same
channel, as the prospective rogue, to monitor for rogue client/AP, noise, or interference. If the same
client/AP is detected a second time, they are then labeled as rogue on the WLC.
Once labeled as a rogue, the WLC determines if this rogue is attached to the local network or is simply
a neighboring AP. In either case, an AP that is not part of the managed Cisco Unified Wireless Network
is considered a rogue.
In monitor mode, the trusted AP does not carry user traffic; it is dedicated to scanning channels. This
mode of deployment is most common when a customer does not want to support WLAN services in a
particular area, but wants to monitor that area for rogue APs and rogue clients.
Location
The location features of Cisco Prime Infrastructure can be used to provide a floor plan indicating the
approximate location of a rogue AP. The floor plan displays the location of all legitimate APs, and
highlights the location of a rogue AP with the skull-and-crossbones icon. For additional information on
the Cisco Unified Wireless Network location features, see Cisco Wireless Location Appliance.
Wire Detection
Situations can exist where the Cisco Prime Infrastructure rogue location feature is not effective, such as
in branch offices with only a few APs or where floor plan information might not be available. In these
cases, the Cisco Unified Wireless Network solution offers two wire-based detection options:
• Rogue detector AP
• Rogue Location Discovery Protocol (RLDP)
If an AP is configured as a rogue detector, its radio is turned off and its role is to listen on the wired
network for MAC addresses of clients associated to rogue APs; that is, rogue clients. The rogue detector
listens for ARP packets that include rogue client MAC addresses. When it detects one of these ARPs, it
reports this to the WLC, providing verification that the rogue AP is attached to the same network as the
Cisco Unified Wireless Network.
To maximize the likelihood of capturing ARP information, the rogue AP detector is connected to all
available broadcast domains using a Switched Port Analyzer (SPAN) port. Multiple rogue AP detector
APs can be deployed to capture the various aggregated broadcast domains that exist on a typical network.
If a rogue client resides behind a wireless router (a common home WLAN device), its ARP requests are
not seen on the wired network, so an alternative to the rogue detector AP method is needed. Additionally,
rogue detector APs might not be practical for some deployments because of the large number of
broadcast domains to be monitored (such as in the main campus network).
The RLDP option can aid in these situations. In this case, a standard AP, upon detecting a rogue AP, can
attempt to associate with the rogue AP as a client and send a test packet to the controller, which requires
the AP to stop behaving as a standard AP and temporarily go into client mode. This action confirms that
the rogue AP in question is actually on the network, and provides IP address information that indicates
its logical location in the network. Given the difficulties in deriving location information in branch
offices coupled with the likelihood of a rogue being located in multi-tenant buildings, rogue AP detector
and RLDP are useful tools that augment location-based rogue AP detection.
Rogue AP Containment
Rogue AP connected clients, or rogue ad-hoc connected clients, can be contained by sending 802.11
de-authentication packets from nearby APs. This should be done only after steps have been taken to
ensure that the AP is truly a rogue AP, because it is illegal to do this to a legitimate AP in a neighboring
WLAN. This is why the automatic rogue AP containment feature is removed from the solution.
To determine whether rogue AP clients are also clients on the enterprise WLAN, the client MAC address
can be compared with MAC addresses collected by the AAA during 802.1X authentication. This allows
for the identification of potential WLAN clients that might have been compromised or users who are not
following security policies.
among all controllers in a mobility group; different mobility groups have different keys allowing
validation of all WLAN management frames processed, by the WLCs, in that mobility group
(Figure 4-29).
Both infrastructure-side and client MFP are currently possible, but client MFP requires Cisco
Compatible Extensions v5 WLAN clients to learn the mobility group MFP key before they can detect
and reject invalid frames.
MFP provides the following benefits:
• Authenticates 802.11 management frames generated by the WLAN network infrastructure.
• Allows detection of malicious rogues that spoof a valid AP MAC or SSID to avoid detection as a
rogue AP, or as part of a man-in-the-middle attack.
• Increases the effectiveness of the rogue AP and WLAN IDS signature detection of the solution.
• Provides protection of client devices using Cisco Compatible Extensions v5.
• Supported by standalone AP.
Two steps are required to enable MFP: enabling it under the Security tab on the WLC (Figure 4-30) and
enabling it on the WLANs in the mobility group (Figure 4-26).
Cisco devices use the SGT Exchange Protocol (SXP) to propagate SGTs across network devices that do
not have hardware support for Cisco TrustSec. SXP is the software solution to avoid CTS hardware
upgrade on all switches. WLC will be supporting SXP as part of TrustSec Architecture. The SXP sends
SGT information to the CTS-enabled switches so that appropriate role-based access control lists
(RBACLs) can be activated depending on the role information represented by the SGT. By default, the
controller always works in the Speaker mode. To implement the SXP on a network, only the egress
distribution switch needs to be CTS-enabled, and all the other switches can be non-CTS-capable
switches.
The SXP runs between any access layer and distribution switch or between two distribution switches.
The SXP uses TCP as the transport layer. CTS authentication is performed for any host (client) joining
the network on the access layer switch similar to an access switch with CTS-enabled hardware. The
access layer switch is not CTS hardware enabled. Therefore, data traffic is not encrypted or
cryptographically authenticated when it passes through the access layer switch. The SXP is used to pass
the IP address of the authenticated device, that is a wireless client, and the corresponding SGT up to the
distribution switch. If the distribution switch is CTS hardware enabled, the switch inserts the SGT into
the packet on behalf of the access layer switch. If the distribution switch is not CTS hardware enabled,
the SXP on the distribution switch passes the IP-SGT mapping to all the distribution switches that have
CTS hardware. On the egress side, the enforcement of the RBACL occurs at the egress L3 interface on
the distribution switch.
The following are some guidelines for Cisco TrustSec SXP:
• SSXP is supported on the following security policies only:
– WPA2-dot1x
– WPA-dot1x
– 802.1x (Dynamic WEP)
– MAC Filtering using RADIUS servers
– Web authentication using RADIUS servers for user authentication
• SXP is supported for both IPv4 and IPv6 clients.
• Controller always operates in the Speaker mode.
For more information, see Cisco TrustSec.
Implementation
Every end point that touches the TrustSec domain gets classified by ISE based on end user identity like
role, device-type (other client attributes) and is associated with a unique tag called SGT (Security Group
Tag) that is then shared with the device that requested the client authentication upon successful
authentication. This allows grouping of clients based on client identity attributes thereby reducing the
number of Access Control Entities (ACE) considerably. A major benefit to SGACL use is the
consolidation of access ACEs and the operational savings involved with maintenance of those traditional
access lists.
Trustsec solution is realized across three distinct phases within TrustSec domain.
a. Client classification at ingress by a centralized policy database (ISE) and assigning unique
SGT to client based on client identity attributes like role etc.
b. Propagation of IP to SGT binding to neighboring devices using SXPv4 and / or inline tagging
methods
c. SGACL policy enforcement. AP will be enforcement point for central / local switching (central
authentication
SXPv4 on AP
WLC still supports SXPv2 Speaker mode to propagate IP to SGT bindings to neighboring devices, we
don’t support SXPv4. AP will support SXPv4 listener and speaker mode.
Any device that participates in the CTS network requires it to be authenticated and trusted. In order to
facilitate the authentication process new devices connected to CTS network under goes an enrollment
process where in the device obtains the credentials that is specifically needed for CTS device
authentication and obtain general CTS environment information.
The WLC device enrollment is initiated by the WLC as part of PAC provisioning with ISE server. The
WLC will initiate EAP-FAST and obtains a PAC. This is accomplished by a using the infrastructure of
LOCAL-EAP EAP-FAST PAC-provisioning. The PAC obtained uniquely maps to the Device ID. If the
Device ID changes, PAC data associated with the previous Device ID is removed from the PAC store.
PAC provisioning is triggered when a radius server instance is enabled to provision the PAC.
In case of High Availability (HA) setup, PACs will be synced to the standby box.
Environment Data
CTS Environment data is a set of information or attributes that helps the device to perform CTS related
functions.
The device (AirOS WLC) acquires the environment data from the authentication server when the device
first joins a Cisco Trust Sec domain by sending a secure radius access-request. The authentication server
returns RADIUS Access-Accept with attributes including environment expiry timeout attributes. This is
the time interval that controls how often the Cisco Trust Sec device must refresh its environment data.
Inline Tagging
Inline tagging functionality is a transport mechanism by which a wireless controller or an access point
understand the source SGT (S-SGT). It covers the following two types
• Central switching- For centrally switched packets, WLC performs inline tagging for all packets
sourced from wireless clients that reside on the WLC by tagging it with Cisco Meta Data (CMD)
tag. For packets inbound from the DS, inline tagging also involves WLC will strip the packet of the
header and send it to the AP over CAPWAP for the AP to learn the S-SGT tag. SGACL enforcement
will happen at the AP.
• Local switching- For transmitting ,locally switched traffic AP performs inline tagging for packets
sourced from clients that reside on the AP. When receiving traffic, AP will handle both locally
switched and centrally switched packets and use S-SGT tag for packets and apply the SGACL
policy.
With wireless TrustSec enabled on WLC the choice of also enabling and configuring SXP to exchange
tags with the switches is optional and both modes i.e. SXP speaker mode and inline tagging are
supported; however there is no use case to have both SXP and wireless TrustSec on AP to be enabled
simultaneously.
Work Flow
Before a WLC can start downloading SGACL policies from ISE it must initiate PAC (Protected Access
Credential) provisioning over a EAP-FAST TLS tunnel. This will be used to download SGACL as
required based on authenticated client SGT tag. Currently ISE supports SGACL policy download for
given destination SGT (D-SGT) from all known source SGT (S-SGT). When a wireless client is
authenticated by ISE, WLC receives a SGT associated with the client. WLC will treat client SGT as
D-SGT and initiate download of SGACL policy names for the destination from ISE. The policy names
returned will be all possible / known S-SGTs paired with the specific client D-SGT. These policies
associated with the D-SGT are cached on WLC and pushed to the AP associated with the client.
Client classification happens at ingress by centralized policy database (ISE) that assigns a unique S-SGT
to client based on client identity as per policy rules. SGACL download and policy is enforced (associated
with the D-SGT) on the egress side.
1. SGACL enforcement for local and central switched traffic happens on AP and not on WLC.
2. In a flex mode AP doing local authentication, enforcement point will be the AP.
Table 4-2
Feature Platform
Inline SGT tagging and SG-ACL enforcement APs 17xx, 27xx,37xx, 18xx, 28xx and 38xx
WLCs 3504, 5520 and 8540
Figure 4-31
Configuration Verification
The management system Cisco Prime can provide on-demand or regularly-scheduled configuration audit
reports, which compare the complete current running configuration of a WLC and its registered access
points with that of a known valid configuration stored in the management system Cisco Prime databases.
Any exceptions between the current running configuration and the stored database configuration are
noted and brought to the attention of the network administrator via screen reports (Figure 4-31).
• Clients
• Inventory
• Mesh
• Performance
• Security
Password Policies
The password policies allows administrator to enforce strong password checks on newly created
passwords for additional management users of controller and access point. The following are the
requirements enforced on the new password:
• When the controller is upgraded from old version, all the old passwords are maintained as it is, even
though the passwords are weak. After the system upgrade, if strong password checks are enabled,
the same is enforced from that time and the strength of previously added passwords will not be
checked or altered.
• Depending on the settings done in the Password Policy page, the local management, access point,
management use and SNM3 user configuration is affected.
Figure 4-32 illustrates the password policies for Local Management User, AP, Management User and
SNMPv3 user.
This chapter describes quality of service (QoS) and Application Visibility and Control (AVC) and
Airtime Fairness (ATF) in the context of WLAN implementations. This chapter describes WLAN QoS
and AVC in general, but does not provide in-depth coverage on topics such as security, segmentation,
and voice over WLAN (VoWLAN), although these topics have a QoS component.
This chapter is intended for those who are tasked with designing and implementing enterprise WLAN
deployments using Cisco Unified Wireless Network technology.
QoS Overview
QoS refers to the capability of a network to provide differentiated service to selected network traffic over
various network technologies. QoS technologies provide the following benefits:
• Provide building blocks for business multimedia and audio applications used in campus, WAN, and
service provider networks
• Allow network managers to establish service-level agreements (SLAs) with network users
• Enable network resources to be shared more efficiently and expedite the handling of mission-critical
applications
• Manage time-sensitive multimedia and audio application traffic to ensure that this traffic receives
higher priority, greater bandwidth, and less delay than best-effort data traffic
With QoS, bandwidth can be managed more efficiently across WLANs, LANs and WANs. QoS provides
enhanced and reliable network service by doing the following:
• Supporting dedicated bandwidth for critical users and applications
• Controlling jitter and latency (required by real-time traffic)
• Managing and minimizing network congestion
• Shaping network traffic to smooth the traffic flow
• Setting network traffic priorities
CAPWAP CAPWAP
Si
IP
350983
QoS Parameters
QoS is defined as the measure of performance for a transmission system that reflects its transmission
quality and service availability. Service availability is a crucial component of QoS. Before QoS can be
successfully implemented, the network infrastructure must be highly available.
Network transmission quality is determined by the elements of latency, jitter, and loss, as shown in
Table 5-1.
Element Description
Latency Latency (or delay) is the amount of time it takes for a packet to reach the receiving
endpoint after being transmitted from the sending endpoint. This time period is called
the end-to-end delay and can be divided into two areas:
• Fixed network delay—Includes encoding and decoding time (for audio and
video), and the finite amount of time required for the electrical or optical pulses
to traverse the media en route to their destination.
• Variable network delay—Generally refers to network conditions, such as queuing
and congestion, that can affect the overall time required for transit.
Jitter Jitter (or delay-variance) is the difference in the end-to-end latency between packets.
For example, if one packet requires 100 ms to traverse the network from the source
endpoint to the destination endpoint, and the next packet requires 125 ms to make the
same trip, the jitter is calculated as 25 ms.
Loss Loss (or packet loss) is a comparative measure of packets successfully transmitted
and received to the total number that were transmitted. Loss is expressed as the
percentage of packets that were dropped.
CAPWAP
CAPWAP
Si
350984
• Network downstream—Traffic leaving the wireless LAN controller (WLC) traveling to the AP. QoS
can be applied at this point to prioritize and rate-limit traffic to the AP
• Network upstream—Traffic leaving the AP, traveling to the WLC. The AP classifies traffic from the
AP to the upstream network according to the traffic classification rules of the AP.
Note WLAN client support for WMM does not mean that the client traffic automatically benefits from WMM.
The applications looking for the benefits of WMM assign an appropriate priority classification to their
traffic and the operating system needs to pass that classification to the WLAN interface. In purpose-built
devices, such as VoWLAN handsets, this is done as part of the design. However, if implementing on a
general purpose platform such as a PC, application traffic classification and OS support must be
implemented before the WMM features can be used to good effect.
Even without WMM support on the WLAN client, the Cisco Unified Wireless Network solution is able
to provide network prioritization in both network upstream and network downstream situations.
Interframe Spaces
The 802.11 standard defines interframe spaces (IFS) as:
• Short interframe space (SIFS)—10 µs
• PCF interframe space (PIFS)—SIFS + 1 x slot time = 30 µs
• DCF interframe space (DIFS)—50 µs SIFS + 2 x slot time = 50 µs
Note The base timing used in the IFS example shown in Figure 5-3 is for 802.11b. The timing in
802.11g and 802.11a are different, but the principles applied are the same.
IFS allow 802.11 to control which traffic gets first access to the channel after carrier sense declares the
channel to be free. Generally, 802.11 management frames and frames not expecting contention (a frame
that is part of a sequence of frames) use SIFS, and data frames use DIFS, as shown in Figure 5-3.
DIFS
PIFS
Contention window
SIFS
Busy medium Backoff window Next frame (t)
Slot time
91228
as long as the medium is idle
Random Backoff
When DCF has a data frame ready to be transmitted, the DCF goes through the following steps:
1. DCF generates a random backoff number between zero and a minimum contention window (see
aCWmin, aCWmax, and Retries, page 5-6).
2. DCF waits until the channel is free for a DIFS interval.
3. If the channel is still free, DCF begins to decrement the random backoff number for every slot time
(20 µs) that the channel remains free.
4. If the channel becomes busy (such as when a station gets to zero), DCF stops the decrement and
steps 2 and 3 are repeated.
5. If the channel remains free until the random backoff number reaches zero, DCF allows the frame to
be transmitted.
Figure 5-4 shows a simplified example of how the DCF process works. In this DCF process no
acknowledgements are shown and no fragmentation occurs.
Backoff time
91229
Backoff time remaining
511
aCWmax
255
127
aCWmin
63
91230
31 retries
Note These values are for 802.11b implementations. Values can be different for different physical layer
implementations.
Wi-Fi Multimedia
This section describes three important Wi-Fi multimedia (WMM) topics:
• WMM Access
• WMM Classification
• WWM Queues
WMM Access
WMM is a Wi-Fi Alliance certification of support for a set of features from an 802.11e draft. This
certification is for both clients and APs, and certifies the operation of WMM. WMM is primarily the
implementation of the EDCA component of 802.11e. Additional Wi-Fi certifications are planned to
address other components of the 802.11e.
WMM Classification
WMM uses the 802.1P classification scheme (part of the IEEE 802.1D MAC Bridges standard). This
classification scheme has eight priorities that WMM maps to four access categories with WMM
designations:
• AC_BK—Background
• AC_BE—Best effort
• AC_VI—Video
• AC_VO—Voice
As shown in Table 5-2, these access categories map to the four queues (see WMM Queues, page 5-9)
required by WMM devices.
802.1P
Priority 802.1P Priority Designation Access Category_WMM Designation
Lowest 1 BK AC_BK
2 -
0 BE AC_BE
3 EE
4 CL AC_VI
5 VI
6 VO AC_VO
Highest 7 NC
Figure 5-6 shows the WMM data frame format. Note that even though WMM maps the eight 802.1P
classifications to four access categories, the 802.11D classification is sent in the frame.
2 2 6 6 6 2 0 or 6 0 or 2 n 4
Frame Seq QoS
Dur A1 A2 A3 A4 Body FCS
control control control
Acknowledge ------- 00
132599
The WMM and IEEE 802.11e classifications are different from the classifications recommended and
used in the Cisco Unified Wireless Network, which are based on IETF recommendations. The primary
difference in classification is the changing of audio and video traffic to 5 and 4 user priorities (UPs),
respectively. This allows the 6 classification to be used for Layer 3 network control. To be compliant
with both standards, the Cisco Unified Wireless Network solution performs a conversion between the
various classification standards when the traffic crosses the wireless-wired boundary.
WMM Queues
Figure 5-7 shows the queuing performed on a WMM client or AP. There are four separate queues, one
for each of the access categories. Each of these queues contends for the wireless channel in a similar
manner to the DCF mechanism described above, with each of the queues using different IFS, aCWmin,
and aCWmax values. If more than one frame from different access categories collide internally, the
frame with the higher priority is sent and the lower priority frame adjusts its backoff parameters as
though it had collided with a frame external to the queuing mechanism. This system is called enhanced
distributed channel access (EDCA).
Application
Figure 5-8 illustrates the principles behind EDCF, where different interframe spacing and aCWmin and
aCWmax values (for clarity aCWmax is not shown) are applied per traffic classification. Different traffic
types wait different IFS before counting down their random backoff. The aCW value used to generate
the random backoff number also depends on the traffic classification. For example, the aCWmin[3] for
Voice is 23-1, and aCWmin[5] for best-effort traffic is 25-1. High priority traffic has a small IFS and a
small aCWmin value, giving a short random backoff, whereas best-effort traffic has a longer IFS and
large aCWmin value that on average gives a large random backoff number.
Frame
Defer Frame Defer Frame
Voice
Best effort Defer Defer Defer
132601
The EDCA process follows the sequence:
1. While Station X is transmitting its frame, three other stations determine that they must transmit a
frame. Each station defers because a frame was already being transmitted, and each station generates
a random backoff.
2. Because the Voice station has a traffic classification of voice (audio), it has an arbitrated interframe
space (AIFS) of two and uses an initial aCWmin of three. Therefore the station must defer the
countdown of its random backoff for two slot times. It also has a short random backoff value.
3. The best-effort station has an AIFS of three and a longer random backoff time, because its aCWmin
value is five.
4. The Voice station has the shortest random backoff time and therefore starts transmitting first. When
Voice starts transmitting all other stations defer.
5. After the Voice station finishes transmitting, all stations wait their AIFS then begin to decrement
their random backoff counters again.
6. The best-effort station then completes decrementing its random backoff counter and begins
transmission. All other stations defer.
This can happen even though there might be a Voice station waiting to transmit. This shows that
best-effort traffic is not diminished by Voice traffic because the random backoff decrementing
process eventually brings the best-effort backoff down to similar sizes as high priority traffic, and
that the random process might, on occasion, generate a small random backoff number for best-effort
traffic.
7. The process continues as other traffic enters the system.
The access category settings shown in Table 5-3 and Table 5-4 are, by default, the same for an 802.11a
radio and are based on formulas defined in WMM.
Note Table 5-3 refers to the parameter settings on a client, which are slightly different from the settings for
an AP. The AP has a larger AIFS[n] for audio and video admission controls (ACs).
The overall impact of the different AIFS, CWmin, and aCWmax values is difficult to illustrate in timing
diagrams because their impact is more statistical in nature. It is easier to compare the AIFS and the size
of the random backoff windows, as shown in Figure 5-8.
When comparing Voice and Background frames as examples, these traffic categories have CWmin values
of 23-1 (7) and 25-1 (31), and AIFS of 2 and 7, respectively. This is an average delay of 5 (2+7/1) slot
times before transmitting an audio frame, and an average of 22 slot (7+31/2) times for Background
frame. Therefore, Voice frames are statistically much more likely to be sent before Background frames.
Figure 5-10 shows the WMM information in a probe response. Apart from the WMM access-category
information contained in this element, the client also learns which WMM categories require admission
control. As can be seen in this example, the Voice admission control (AC) is set to mandatory. This
requires the client to transmit the request to the AP, and have the request accepted, before it can use this
AC. Admission control is further discussed in different parts of this chapter.
efficient use of client power than the regular listening for beacons method, at a period controlled by
the delivery traffic indication message (DTIM) interval. This is because the latency and jitter
requirements of audio are such that a wireless VoIP client would either not be in power-save mode
during a call, resulting in reduced talk times, or would use a short DTIM interval that results in
reduced standby times. The use of U-APSD allows the use of long DTIM intervals to maximize
standby time without sacrificing call quality. The U-APSD feature can be applied individually
across access categories, allowing U-APSD can be applied to the audio ACs in the AP, but the other
ACs still use the standard power-save mode feature.
• The secondary benefit of this feature is increased call capacity. The coupling of transmission
buffered data frames from the AP with the triggering data frame from the WLAN client allows the
frames from the AP to be sent without the accompanying IFS and random backoff, thereby reducing
the contention experience by call.
Figure 5-11 shows a sample frame exchange for the standard 802.11 power save delivery process.
153867
Client Full Power
Access Delay
The client in power-save mode first detects that there is data waiting for it at the AP via the presence of
the TIM in the AP beacon. The client must power-save poll (PS-Poll) the AP to retrieve that data. If the
data sent to the client requires more than one frame to be sent, the AP indicates this in the sent data
frame. This process requires the client to continue sending power-save polls to the AP until all the
buffered data is retrieved by the client.
This presents two major problems. The first is that it is quite inefficient, requiring the PS-polls, as well
as the normal data exchange, to go through the standard access delays associated with DCF. The second
issue, being more critical to audio traffic, is that retrieving the buffered data is dependent on the DTIM,
which is a multiple of the beacon interval. Standard beacon intervals are 100 ms, and the DTIM interval
can be integer multiples of this. This introduces a level of jitter that is generally unacceptable for audio
calls, and audio handsets switch from power-save mode to full transmit and receive operation when a
audio call is in progress. This gives acceptable audio quality but reduces battery life. The Cisco 7921G
Unified Wireless IP Phone addresses this issue by providing a PS-Poll feature that allows the 7921G to
generate PS-Poll requests without waiting for a beacon TIM. This allows the 7921G to poll for frames
when it has sent a frame, and then go back to power-save mode. This feature does not provide the same
efficiency as U-APSD, but improves battery life for 7921G phones on WLANs without U-APSD.
Figure 5-12 shows an example of traffic flows with U-APSD. In this case, the trigger for retrieving traffic
is the client sending traffic to the AP. The AP, when acknowledging the frame, tells the client that data
is queued for it and that it should stay connected. The AP then sends data to the client, typically as a
TXOP burst where only the first frame has the EDCF access delay. All subsequent frames are then sent
directly after the acknowledgment frame. In a VoWLAN implementation there is likely to be only one
frame queued at the AP. The VoWLAN client is able to go into sleep mode after receiving that frame
from the AP.
153868
Client Full Power Client Full Power
EDCA Delay
This approach overcomes both the disadvantages of the previous scheme, in that it is much more
efficient. The timing of the polling is controlled by way of the client traffic, which in the case of audio
is symmetric, so if the client is transmitting a frame every 20 ms, it would be expecting to receive a frame
every 20 ms as well. This would introduce a maximum jitter of 20 ms, rather than an n * 100 ms jitter.
The Add Traffic Stream (ADDTS) function is used by WLAN client to send an admission request to an
AP. Signaling its TSpec request to the AP, an admission request is in one of two forms:
• ADDTS action frame—Created when a phone call is originated or terminated by a client associated
to the AP. The ADDTS contains TSpec and could contain a traffic stream rate set (TSRS)
information element (IE).
• Association and re-association message—The association message might contain one or more
TSpecs and one TSRS IE if the station wants to establish the traffic stream as part of the association.
The re-association message might contain one or more TSpecs and one TSRS IE if an station roams
to another AP.
The ADDTS contains the TSpec element that describes the traffic request. See Figure 5-13 and
Figure 5-14 for examples of an ADDTS request and response between a Cisco 7921 WLAN handset and
a Cisco AP. Apart from key data describing the traffic requirements, such as data rates and frame sizes,
the TSpec element also tells the AP the minimum physical rate that the client device will use. This allows
the calculation of how much time that station can potentially consume in transmitting and receiving in
this TSpec, and therefore allowing the AP to calculate whether it has the resources to meet the TSpec.
TSpec admission control is used by the WLAN client (target clients are VoIP handsets) when a call is
initiated and during a roam request. During a roam, the TSpec request is appended to the re-association
request.
TSpec support is not required by clients. But when a WLAN is configured with call admission control
(CAC) for either audio or video that client that is not in support of TSpec is must send the audio and
video packets at a Best effort QoS level (see QoS Profiles, page 5-17). So, if the WLAN is set at QoS
level of audio or video and CAC is enabled then the correct behavior for a client without ADDTS logic
is to send the audio and video traffic with Best effort markings. If a TSpec capable clients has its ADDTS
request reject be the Wi-Fi channel utilization is high than the configured CAC limit. That client per
specification is supposed to mark the audio and video packets at Best effort.
QoS Profiles
Primary among these are the QoS profiles used by the WLC. As shown in Figure 5-15, the QoS profiles
can be configured as:
• Bronze—Background
• Gold—Video applications
• Platinum—Voice applications
• Silver—Best effort
Each of the profiles shown in Figure 5-15 allows the configuration of bandwidth contracts, RF usage
control, and the maximum 802.1P classification allowed.
Note Cisco generally recommends that the Per-User Bandwidth Contracts settings be left at their default
values and that the 802.11 WMM features be used to provide differentiated services.
For WLANs using a given profile, Voice or other profile classification in that profile controls two
important class of service (CoS) behaviors:
• Determines what CoS value packets initiated from the WLC are marked with.
The value of the CoS parameter is used to mark the CoS of all CAPWAP (Control And Provisioning
of Wireless Access Points) packets for the WLAN using that profile. So a WLAN with a platinum
QoS profile, and the 802.1P mark of 6, will have its CAPWAP packets from the application manager
interface of the controller marked with CoS of 5. The WLC adjusts the CoS to be compliant with
Cisco QoS baseline recommendations. The reason why it is important to maintain the IEEE CoS
marking in the configuration is below. If the WLAN is configured to trust CoS rather than DSCP at
the network connection to the WLC, the CoS value is used for the DSCP of the CAPWAP packets
received by the AP; and eventually the WMM classification and queuing for WLAN traffic. This is
because the WLAN WMM classification of a frame is derived from the DSCP value of the CAPWAP
packet carrying that frame.
• Determines the maximum CoS value that can be used by clients connected to that WLAN.
The 802.1P classification sets the maximum CoS value that is admitted on a WLAN with that
profile.
WMM audio traffic arrives with a CoS of 6 at the AP, and the AP automatically performs a CoS-to-DSCP
mapping for this traffic based on a CoS of 6. If the CoS value in the WLC configuration is set to a value
less than 6, this changed value is used by the WLAN QoS profile at the AP to set the maximum CoS
marking used and therefore which WMM admission control (AC) to use.
The key point is that with the Cisco Unified Wireless Network, you should always think in terms of
IEEE 802.11e classifications and allow the Unified Wireless Network Solution to take responsibility for
converting between IEEE classification and the Cisco QoS baseline.
The WLAN can be configured with various default QoS profiles, as shown in Figure 5-16. Each of the
QoS profiles are annotated with their typical use. In addition, clients can be assigned a QoS profile based
on their identity, through authentication, authorization and accounting (AAA). For a typical enterprise,
WLAN deployment parameters such as per-user bandwidth contracts and over-the-air QoS, should be
left at their default values, and standard QoS mechanisms, such as WMM and wired QoS, should be used
to provide optimum QoS to clients.
WMM Policy
In addition to QoS profiles, WMM Policy for the WLAN allows you to control additional WMM options,
as shown in Figure 5-17. The WMM options are:
• Disabled—The WLAN does not advertise WMM capabilities nor allow WMM negotiations
• Allowed—The WLAN does allow WMM and non-WMM clients
• Required—Only WMM-enabled clients can be associated with this WLAN
IP Phones
Figure 5-18 shows the basic QoS Enhanced Basis Service Set (QBSS) information element (IE)
advertised by a Cisco AP. The Load field indicates the portion of available bandwidth currently used to
transport data on that AP.
There are actually three QBSS IEs that need to be supported in certain situations:
• Old QBSS—Draft 6 (pre-standard)
• New QBSS—Draft 13 802.11e (standard)
• New distributed CAC load IE—A Cisco information element
The QBSS used depends on the WMM and Cisco 792x VoIP phone settings on the WLAN.
792x phone support, as shown in Figure 5-19, is a component of the WLC WLAN configuration that
enables the AP to include the appropriate QBSS element in its beacons. WLAN clients with QoS
requirements, such as Cisco 792x phones, use these advertised QoS parameters to determine the best AP
with which to associate.
The WLC provides 792x phone support through the client call admission control (CAC) limit. This
support includes:
• Client CAC limit—The 7920 uses a call admission control setting that is set on the client. This
supports legacy 7920 code-pre 2.01.
• AP CAC limit—The 7920 uses CAC settings learned from WLAN advertisement.
The various combinations of WMM, client CAC limit, and AP CAC limit settings result in different
QBSS IEs being sent:
• If only WMM is enabled, IE number 2 (802.11e standard) QBSS Load IE is sent out in the beacons
and probe responses.
• If 7920 client CAC limit is to be supported, IE number 1 (the pre-standard QBSS IE) is sent out in
the beacons and probe responses on the 802.11b/g radios.
• If 7920 AP CAC limit is to be supported, the number 3 QBSS IE is sent in the beacons and probe
responses for bg radios.
Note The various QBSS IEs use the same ID, and therefore the three QBSSs are mutually exclusive. For
example, the beacons and probe responses can contain only one QBSS IE.
The CAC parameters include the Max RF Bandwidth (%) that a radio can be using and still accept the
initiation of a VoWLAN call through a normal ADDTS request. The range of that value is 5 to 85 percent
of the channel bandwidth.
The Reserved Roaming Bandwidth (%) parameter specifies how much capacity is reserved to be able to
respond to ADDTS requests during association or re-association, and which are VoWLAN clients with
calls in progress that are trying to roam to that AP.
To enable AC based upon these parameters, select the Admission Control (ACM) check box. This enables
AC based upon the capacity of the AP but it does not take into account the possible channel loading
impact of other APs in the area. To include this channel loading in capacity calculations, select the both
Load-Based AC and Admission Control (ACM) check boxes.
Note Voice and video load-based CAC applies to non-mesh APs. For mesh APs, only static CAC is applicable.
SIP CAC support requires either static or load-based CAC. If you are using Static CAC then SIP CAC
support allows the configuration of the of the number of calls on the AP. Generally the dynamic the
load-balanced approach is the better way of managing quantity of calls to prevent the quality from
suffering from over subscription of calls on the Wi-Fi channel.
In the Voice Parameters window (Figure 5-19), the Metrics Collection option specifies whether data is
collected on audio or video calls for use by Cisco Prime Infrastructure.
Figure 5-20 shows an example of one of the audio statistics reports available with Cisco Prime
Infrastructure. The example shows the calls established on the radio of one AP and the number of calls
that roamed to that AP. This report and other audio statistics can be scheduled or performed on request
(ad-hoc) and either displayed graphically in Cisco Prime Infrastructure or written to a file.
5
Number of Calls
221947
0
5/29/07 5/29/07 5/29/07 5/29/07
8:30 PM 8:40 PM 8:50 PM 9:00 PM
Time
Note CAC is performed only for voice and video QoS profiles.
Figure 5-20 shows the effect of having a low percent of bandwidth set aside for audio CAC calls. Only
enough bandwidth was reserved for four calls, but the calls were able to roam to other Wi-Fi channels.
Figure 5-21 shows CAC options for media streaming. Max RF Bandwidth is shared between the audio,
video and media streaming. The Voice, Video, and Media tabs each have their own Max RF Bandwidth
that are added together for an aggregated total of the complete bandwidth reservation for media on a
Wi-Fi channel. While each tab shows a maximum value of 85 percent for the field, the overall Max RF
Bandwidth value is actually the sum of all three fields. If Max RF Bandwidth in the Voice tab is set to
85 percent then in video tab and media tabs the Max RF Bandwidth fields must be set to zero percent. If
you wanted some bandwidth with CAC behavior on audio, video and data, then you could set the value
to 25 percent in the fields of each tab. This would have a channel bandwidth limit for media of 75
percent. With each media type getting one quarter of the bandwidth and with data getting one fourth (1/4)
of the bandwidth.
CAC for video behaves like audio CAC. The purpose of CAC for video is to limit the amount of video
calling so that the quality of active video calls is not negatively impacted by additional video being added
to the Wi-Fi channel.
Note See the WLC configuration guide for more details on these and the other configuration options.
Clients
CAPWAP
CA
PW
AP
Controller
CAPWAP dot1q Si
CAPWAP
P
P WA
A
350985
C
CAPWAP
Multiple classification mechanisms and client capabilities require multiple strategies. These strategies
include:
• CAPWAP control frames require prioritization so they are marked with a DSCP classification of
CS6 (an IP routing class).
• WMM-enabled clients have the classification of their frames mapped to a corresponding DSCP
classification for CAPWAP packets to the WLC. This mapping follows the standard IEEE
CoS-to-DSCP mapping, with the exception of the changes necessary for QoS baseline compliance.
This DSCP value is translated at the WLC to a CoS value on 802.1Q frames leaving the WLC
interfaces.
• Non-WMM clients have the DSCP of their CAPWAP tunnel set to match the default QoS profile for
that WLAN. For example, the QoS profile for a WLAN supporting 792x phones would be set to
platinum, resulting in a DSCP classification of EF for data frames packets from that AP WLAN.
• CAPWAP data packets from the WLC have a DSCP classification that is determined by the DSCP
of the wired data packets sent to the WLC. The 80211.e classification used when transmitting frames
from the AP to a WMM client is determined by the AP table converting DSCP to WMM
classifications.
Note The WMM classification used for traffic from the AP to the WLAN client is based on the DSCP value
of the CAPWAP packet, and not the DSCP value of the contained IP packet. Therefore, it is critical that
an end-to-end QoS system be in place.
AVVID 802.1p
AVVID 802.1 UP-Based Traffic Type AVVID IP DSCP UP IEEE 802.11e UP
Network control 56 7 —
Inter-network control (CAPWAP 48 6 7
control, 802,11 management
Voice 46 (EF) 5 6
Video 34 (AF41) 4 5
Voice Control 26 (AF31) 3 4
Background (gold) 18 (AF21) 2 2
Background (gold) 20 (AF22) 2 2
Background (gold) 22 (AF23) 2 2
Background (silver) 10 (AF11) 1 1
Background (silver) 12 (AF12) 1 1
Background (silver) 14 (AF13) 1 1
Best Effort 0 (BE) 0 0, 3
Background 2 0 1
Background 4 0 1
Background 6 0 1
1. The IEEE 802.11e UP (user priority) value for DSCP values that are not mentioned in the table is calculated by considering
3 MSB bits of DSCP. For example, the IEEE 802.11e UP value for DSCP 32 (100 000 in binary), would be the decimal
converted value of the MSB (100) which is 4. The 802.11e UP value of DSCP 32 is 4.
For downstream traffic, FlexConnect APs use the incoming dot1q tag from the Ethernet side and then
use this to queue and mark the WMM values on the radio of the locally-switched VLAN.
The WLAN QoS profile is applied to both upstream and downstream packets. For downstream traffic, if
an 802.1P value that is higher than the default WLAN value is received, the default WLAN value is used.
For upstream traffic, if the client sends an WMM value that is higher than the default WLAN value, the
default WLAN value is used. For non-WMM traffic there is no CoS marking on the client frames from
the AP.
Flexconnect AAA override of QoS profile per client is supported on 802.11ac Wave 2 APs in rel
8.4.100.0 and above. Using this feature, QoS can be selectively fine-tuned for a specific user.
Feature Overview
On the Cisco Infrastructure side, Cisco AP will advertise the support for Fastlane as soon as the feature
is enabled on the target WLAN.
On the client side, Apple devices running iOS 10 or higher will look for Fastlane support in Information
Elements set in the AP beacons and probe responses. The Apple iOS 10 device will also send a specific
IE marking its support for Fastlane.
When Fastlane is enabled on a first WLAN, the controller is automatically configured for optimal QoS
support for Wi-Fi devices. In particular, the global Platinum profile is configured to allow traffic up to
Voice, and sets the Unicast Default Priority and the Multicast Default Priority parameters to Best Effort.
Per user bandwidth contracts are disabled on that profile, along with 802.1p. The Platinum profile is then
attached to the target WLAN. Wireless CAC (ACM) and Expedited Bandwidth are enabled for the Voice
queue for both bands, and the maximum voice bandwidth is set to 50%. A DSCP-to-UP and UP-to-DSCP
customized map is configured to map the values recommended by the IETF RFC 45941 and
draft-szigetti-ieee-802-11-012. DSCP is trusted for upstream traffic. An AutoQoS profile is created, that
1. https://tools.ietf.org/html/rfc4594
applies the recommended marking to the most common 32 well-known applications that typically
require differentiated QoS treatment. When Application Visibility is enabled on the target WLAN, this
Auto-QoS profile is automatically applied.
Apple iOS 10 devices can receive a QoS profile (provisioned using standard Apple profile provisioning
techniques). This QoS profile lists the applications that can be put in a whitelist. Applications in a
whitelist are authorized to apply upstream QoS marking using Apple Service_Type method.
Applications that are not in the Whitelist do not mark upstream QoS in a Fastlane network. By default,
all applications are whitelisted (i.e. without a QoS whitelist, all applications can mark QoS; when a
whitelist is deployed, only applications in the whitelist will mark QoS using the Service_Type method,
other applications will receive best effort or background QoS treatment). When iOS 10 devices,
supporting Fastlane, associate to a WLAN that is configured for Fastlane, they apply the QoS profile
they previously received. The AP also trusts the iOS 10 QoS marking. In particular, traffic marked as
Voice is trusted even if the client does not perform admission control (ADDTS).
This feature is supported on Local mode as well as FlexConnect mode APs, for all 802.11n and 802.11ac
wave 1 APs for AireOS code release 8.33 and 8.3.110.0 for Wave 2 APs.
Configurations Steps
1. Create a new WLAN. Fastlane is not enabled by default.
This can be changed using the GUI or the CLI command:
config qos Fastlane enable/disable wlan <wlan id>
A warning message will show, expressing that enabling Fastlane on a WLAN will make global changes,
and therefore will temporarily disable both bands (both bands are re-enabled automatically as the
command completes).
2. Verify that:
• Fastlane is enabled in the WLAN QoS tab.
• The WLAN QoS profile is now set to Platinum.
Access Points + 11ac Module, WSM, Hyperlocation module, 3602P, AP3700 Series Access Points +
WSM, 3702P, OEAP600 Series OfficeExtend Access Points, AP700 Series Access Points, AP700W
Series Access Points, AP 1530 Series Access Points, AP 1550 Series Access Points, AP1570 Series
Access Points, 2800 Series Access Points, 3800 Series Access Points, 1560 series Mesh APs and AP
1040/1140/1260 Series Access Points.
• In Wireless > QoS > Profiles > Platinum, Unicast Default Priority and Multicast Default Priority are
set to Best Effort. Wired QoS protocol is set to None.
• In Wireless > QoS > QoS Map, QoS map is enabled, along with Trust DSCP Upstream. The QoS
map creates 19 exceptions to map well-known DSCP values to the value recommended by the IETF.
All other DSCP values are mapped to the general UP matching their 3 MSB.
• In Wireless > 802.11a/n/ac > Media, Call Admission Control is now enabled, with 50% max RF
bandwidth allocated to Voice traffic. The same setting is visible in the Wireless > 802.11b/g/n >
Media page.
2. https://tools.ietf.org/html/draft-szigeti-tsvwg-ieee-802-11-02
3. AP1600/2600 Series Access Points, AP1700/2700 Series Access Points, AP3500 Series Access Points, AP3600
Series Access Points + 11ac Module, WSM, HALO, 3602P, , AP3700 Series Access Points + WSM, HALO,
3702P, , OEAP600 Series OfficeExtend Access Points, AP700 Series Access Points, AP700W Series Access
Points, AP1530 Series Access Points, AP1550 Series Access Points, AP1570 Series Access Points, 2800
Series Access Points, 3800 Series Access Points and AP1040/1140/1260 Series Access Points
• In Wireless > 802.11a/n/ac > EDCA Parameters, the EDCA Profile is now Fastlane. The same
setting is visible in the Wireless > 802.11b/g/n > EDCA Parameters page.
1. Application Visibility is an optional element of Fastlane configuration. You can enable Fastlane on
a WLAN without enabling Application Visibility.
When Application Visibility is enabled on a Fastlane WLAN, the recommended Auto-QoS-AVC Profile
is applied to the WLAN. You cannot apply another AVC profile, unless you choose to also disable
Fastlane.
CLI Command:
config wlan avc <wlan id> visibility enable
2. You can disable Fastlane for individual WLANs. The WLAN QoS policy will be returned to Silver
(default), and Application Visibility will be reset to its defaults (disabled). Once the command
completes, you can edit the WLAN and manually change the associated QoS profile and enabled
Application Visibility if needed:
CLI Command:
Config qos Fastlane disable wlan <wlan id>
3. Once Fastlane has been disabled on all WLANs, you can also revert the WLC global QoS
configuration to its defaults. To do so, use the Fastlane global configuration page. Fastlane cannot
be disabled globally if a WLAN still has Fastlane enabled. When Fastlane is disabled globally, the
Platinum QoS profile is reset to defaults (Maximum Priority stays to Voice, but Unicast Default
Priority and Multicast Default Priority are reset to Voice). Wireless CAC (ACM) is disabled for
Voice, and the associated maximum bandwidth is returned to its default, 75%. QoS maps are
disabled and upstream QoS uses UP instead of DSCP.
CLI Command:
Config qos Fastlane disable global
Note Although you need to disable Fastlane globally to return the WLC global QoS configuration to its
defaults, you do not need to enable Fastlane globally. Enabling Fastlane on a first WLAN also enables
Fastlane global parameters.
AP Switch Configuration
The QoS configuration of the AP switch is minor because the switch must trust the DSCP of the
CAPWAP packets that are passed to it from the AP. There is no CoS marking on the CAPWAP frames
coming from the AP. Below is an example of this configuration. Note that this configuration addresses
only the classification and that queuing commands can be added depending on local QoS policy.
interface GigabitEthernet1/0/1
switchport access vlan 100
switchport mode access
mls qos trust dscp
spanning-tree portfast
end
In trusting the AP DSCP values, the access switch is trusting the policy set for that AP by the WLC. The
maximum DSCP value assigned to client traffic is based on the QoS policy applied to the WLAN on that
AP.
If you want to have a more precise degree of control you can implement QoS classification policies on
the WLAN-client VLANs.
• Initialization traffic—Generated when a CAPWAP AP is booted and joins a CAPWAP system. For
example, initialization traffic could be generated by controller discovery, AP configuration, and AP
firmware updates.
Note CAPWAP image packets from the controller are marked best effort, but their acknowledgement
is marked CS6. Note that no sliding window protocol is used and each additional packet is sent
only after an acknowledgement. This type of handshaking minimizes the impact of downloading
files over a WLAN.
• 801.11 data frames—Client data and 802.1X data from the client is classified according to the
WLAN QoS settings, but packets containing 802.1X frames from the WLC are marked CS4. 802.11
data traffic classification depends on the QoS policies applied in the WLAN configuration and is not
automatic. The default classification for WLAN data traffic is Best effort.
Classification Considerations
The DSCP classification used for CAPWAP control traffic is CS6 (an IP routing class) and is intended
for IP routing protocols such as Border Gateway Protocol (BGP), Open Shortest Path First (OSPF),
Enhanced Interior Gateway Routing Protocol (EIGRP), and others.
The current CAPWAP DSCP classification represents a classification that, although optimal for the
WLAN system, might not align with your QoS policies and needs.
In particular, you might want to minimize the amount of CS6-classified traffic generated by the WLAN
network. You might want to stop CS6 traffic generated by client activity such as probe requests. The
easiest way to do this is to reclassify the CAPWAP 802.11 CS6 traffic to be a DSCP value with a lower
QoS priority. The fact that the CAPWAP UDP port used is different from that used by CAPWAP data,
and the default DSCP marking, allow for remarking this traffic without resorting to deep packet
inspection.
In addition, you might want to ensure that CAPWAP initialization traffic does not impact routing traffic.
The easiest way to ensure this is to mark with a lower priority the CAPWAP control traffic that is in
excess of the background rate.
The following example shows a router configuration for remarking CAPWAP data packets marked as
CS6 to a more appropriate value of CS3. This moves the traffic to a more suitable classification, at the
level of call control, rather than at the level of network control.
class-map match-all CAPWAPDATACS6
match access-group 110
match dscp cs6
!
policy-map CAPWAPDATACS6
class CAPWAPDATACS6
set dscp cs3
!
interface FastEthernet0
ip address 192.168.203.1 255.255.255.252
service-policy input CAPWAPDATACS6
!
access-list 110 remark CAPWAP Data
access-list 110 permit udp 192.168.101.0 0.0.0.255 host 192.168.60.11 eq 5247
access-list 110 permit udp 192.168.101.0 0.0.0.255 host 192.168.62.11 eq 5247
access-list 111 remark CAPWAP Control
access-list 111 permit udp 192.168.101.0 0.0.0.255 host 192.168.60.11 eq 5246
access-list 111 permit udp 192.168.101.0 0.0.0.255 host 192.168.62.11 eq 5246
The following is an example of rate limiting the CAPWAP control traffic from the WAN site to minimize
the impact of the CS6-marked control traffic on routing traffic. Note that the rate limit configuration does
not drop non-conforming traffic, but simply reclassifies that traffic.
Note The following is an example and not a recommendation. Under normal circumstances, and following the
design guidelines for deploying APs over a WAN connection, it is unlikely that CAPWAP control traffic
would impact the WAN routing protocol connection.
interface Serial0
ip address 192.168.202.2 255.255.255.252
rate-limit output access-group 111 8000 3000 6000 conform-action transmit exceed-action
set-dscp-transmit 26
access-list 111 remark CAPWAP Control
access-list 111 permit udp 192.168.101.0 0.0.0.255 host 192.168.60.11 eq 5246
access-list 111 permit udp 192.168.101.0 0.0.0.255 host 192.168.62.11 eq 5246
!
For more information on WLAN QoS and 802.11e, see the IEEE 802.11 Handbook: A Designer’s
Companion, 2nd Edition, by Bob O’Hara and Al Petrick. ISBN: 978-0-7381-4449-8
Note Currently, we cap an incoming DSCP packet based on the configured QoS profile. There exists a default
DSCP value for each QoS profile. Any packet with DSCP value greater than this is capped to this default
value.
With QoS Map, the capping values need to be dynamic. All UPs are configured with a lower to higher
DSCP range. The capping values should be the upper DSCP of the QoS Profile UP. For example, UP 5
is configured with 30 to 40. So, Gold QoS Profile should be capped with DSCP 40.
In a Video profile, DSCP would still be capped to 34. In other words, DSCP is used to derive the
CAPWAP outer header DSCP value upstream and downstream, but the QoS profile ceiling still applies.
AireOS controller code 8.1 MR1 also allows you to manually define the DSCP to UP and UP to DSCP
translation values. This flexibility allows you to face any upstream and downstream unexpected QoS
markings and still maintain a consistent policy. The UP to DSCP and DSCP to UP customized mapping
is configured in a single command. For example, suppose that UP 6 should always translate to DSCP 46
upstream, you would configure this combination with the following command:
(Cisco Controller) >config qos qosmap up-to-dscp-map 6 46
The same command can be extended to also configure the reverse mapping. For example, suppose that
DSCP 40 to 48 should translate to UP 6 downstream, you would configure this combination with the
following command:
(Cisco Controller) >config qos qosmap up-to-dscp-map 6 46 40 48
Note that the above configuration is not intended to be a recommended configuration, but is just an
example. You would configure with the same logic the 7 UPs and their DSCP mapping. Also, note that
the default value upstream (46 in the example above) does not need to be in the range defined for the
downstream direction (40 to 48 in the example above). For example, suppose that you decided that UP
6 should translate upstream to DSCP 34, but also that downstream DSCP 40 to 48 should translate to UP
6, you could enter the following command (this is a possibility, not a recommended configuration):
(Cisco Controller) >config qos qosmap up-to-dscp-map 6 34 40 48
You can also configure exceptions in the range for the downstream traffic DSCP to UP mapping. For
example, suppose that a specific traffic marked DSCP 44 should translate to UP 5 in your network, you
could configure the 40 to 48 range to translate to UP 6, with an exception for DSCP 44, as follows:
(Cisco Controller) >config qos qosmap up-to-dscp-map 6 46 40 48
(Cisco Controller) >config qos qosmap dscp-to-up-exception 44 5
Note that this exception applies to the downstream mapping, not to the upstream mapping. The upstream
mapping will follow the rules determined by the up to DSCP map.
Step 1 To configure the manual mapping, make sure that your target networks are disabled, as you are going to
change the way these networks forward frames:
(Cisco Controller) >config 802.11a disable network
(Cisco Controller) >config 802.11b disable network
Step 2 QoS maps are disabled by default. If you enabled the maps, temporarily disable the custom mapping to
make changes:
(Cisco Controller) >config qos qosmap disable
QoS map is now disabled.
Step 3 Configure the custom UP to DSCP and DSCP to UP mapping. Note that you have to configure all 7 UPs
to enable customization. For example:
(Cisco Controller) >config qos qosmap up-to-dscp-map 0 0 0 63
(Cisco Controller) >config qos qosmap up-to-dscp-map 1 8
(Cisco Controller) >config qos qosmap up-to-dscp-map 2 10
(Cisco Controller) >config qos qosmap up-to-dscp-map 3 18
(Cisco Controller) >config qos qosmap up-to-dscp-map 4 34
(Cisco Controller) >config qos qosmap up-to-dscp-map 5 32
(Cisco Controller) >config qos qosmap up-to-dscp-map 6 46
(Cisco Controller) >config qos qosmap up-to-dscp-map 7 0
The first line achieves two objectives: map UP 0 to DSCP 0, but also maps all DSCP values to UP 0. This
allows you to be compliant with IETF RFC 4594 section 3.1 and reset all unspecified DSCP values to 0.
Step 4 Configure exceptions for standard traffic, for example as follows:
(Cisco Controller) >config qos qosmap dscp-to-up-exception 8 1
(Cisco Controller) >config qos qosmap dscp-to-up-exception 10 2
(Cisco Controller) >config qos qosmap dscp-to-up-exception 12 2
(Cisco Controller) >config qos qosmap dscp-to-up-exception 14 2
(Cisco Controller) >config qos qosmap dscp-to-up-exception 16 0
(Cisco Controller) >config qos qosmap dscp-to-up-exception 18 3
(Cisco Controller) >config qos qosmap dscp-to-up-exception 20 3
(Cisco Controller) >config qos qosmap dscp-to-up-exception 22 3
(Cisco Controller) >config qos qosmap dscp-to-up-exception 24 4
(Cisco Controller) >config qos qosmap dscp-to-up-exception 26 4
(Cisco Controller) >config qos qosmap dscp-to-up-exception 28 4
(Cisco Controller) >config qos qosmap dscp-to-up-exception 30 4
(Cisco Controller) >config qos qosmap dscp-to-up-exception 32 5
(Cisco Controller) >config qos qosmap dscp-to-up-exception 34 4
Step 5 You can also decide to use the wireless client packet DSCP in the upstream direction, instead of the UP
value. Note that if you enable DSCP trust upstream, you will not use the UP to DSCP translation values
for the upstream traffic. However, you will still use the DSCP ranges to UP translations for the
downstream traffic, as well as any exceptions:
(Cisco Controller) >config qos qosmap trust-dscp-upstream enable
The DSCP trust upstream is enabled.
Step 6 At any time during your configuration, you can remove the exceptions you created:
(Cisco Controller) >config qos qosmap delete-dscp-exception
Step 7 You can also delete the manual mapping entirely:
(Cisco Controller) >config qos qosmap default
Step 8 Once your configuration is complete, you can verify the mapping:
(Cisco Controller) >show qos qosmap
Status: Disabled
UP-TO-DSCP Map:
Up Default DSCP Start DSCP End DSCP
0 0 0 63
1 8
2 10
3 18
4 34
5 32
6 46
7 0
Exception List:
DSCP UP
8 1
10 2
12 2
14 2
16 0
18 3
20 3
22 3
24 3
26 4
28 4
30 4
32 5
34 4
36 4
38 4
40 5
46 6
Trust DSCP Upstream: Enabled
Step 9 Once the configuration is completed, you can activate the manual mapping, and re-enable your networks:
(Cisco Controller) >config qos qosmap enable
QoS map is now enabled.
(Cisco Controller) >config 802.11a enable network
(Cisco Controller) >config 802.11b enable network
such as Netflix or YouTube. With Network Based Application Recognition (NBAR2) engine running on
the WLC, AVC provides application-aware control of over 13000 applications. Protocol Pack files that
contain the algorithms to discover those applications come preloaded on the controller or can be
upgraded to the latest versions dynamically.
The key use cases for NBAR AVC are capacity planning, network usage base lining, and better
understanding of the applications that are consuming bandwidth. Trending of application usage helps the
network administrator to plan for network infrastructure upgrade, improve quality of experience by
protecting key applications from bandwidth-hungry applications when there is congestion on the
network, capability to prioritize or de-prioritize, and drop certain application traffic.
AVC is supported on the 2500, 3504, 5520, 8540, 2500, 5508, 7500, 8500, and WiSM2 controllers on
Local and FlexConnect modes (for WLANs configured for central switching only) since release 7.4.
Release 8.1 introduces support for Application Visibility and Control (AVC) for locally switched
WLANs on FlexConnect APs on 5508, 5500 series, 8500 series, 7500, WiSM2, and vWLC. WLC 3500
support was added begin with rel 8.5.
The key use cases for NBAR are capacity planning, network usage base lining, and better understanding
of the applications that are consuming bandwidth. Trending of application usage helps network
administrator to plan for network infrastructure upgrade, improve quality of experience by protecting
key applications from bandwidth-hungry applications when there is congestion on the network,
capability to prioritize or de-prioritize, and drop certain application traffic.
.
Complete list of protocols supported in the release is posted at the following link:
http://www.cisco.com/en/US/docs/ios-xml/ios/qos_nbar/prot_lib/config_library/nbar-prot-pack-library.
html
In Release 8.0, an AVC profile can be mapped to a local policy for a client with a particular device type.
Local policies can be configured with a different AVC/mDNS profile name based on the AAA override
to restrict the policy from being able to use the services not allowed by the profile on the same WLAN.
Cisco currently offers a rich set of features which provide device identification, onboarding, posture, and
policy, through ISE. This new feature on the WLC does the profiling of devices based on protocols such
as HTTP, DHCP, and so on to identify the end devices on the network. The user can configure the
device-based policies and enforce per user or per device policy on the network. The WLC also displays
statistics based on per user or per device end points and policies applicable per device.
With BYOD (Bring your own device), this feature has an impact on understanding the different devices
on the network. With this, BYOD can be implemented on a small scale within the WLC itself.
AVC Monitoring
As previously mentioned, visibility of traffic can be monitored:
• Globally for all WLANs
• Individual WLAN
• Individual client
Once the monitor entry is created and the exporter entry is mapped to the same, it should be mapped to
the WLAN.
To map the exporter entry to WLAN:
1. Click WLANs
2. Click the specific WLAN ID.
3. Click the QoS tab
4. Choose the created monitor entry from the NetFlow Monitor drop-down list.
5. Click Apply.
Cisco Prime has to be preconfigured with PAM. After PAM is configured with WLAN and wireless client
has traffic going with specific preconfigured applications, administrator should see application usage per
WLAN. Navigate to Home > Detail Dashboards > End User Experience. In the Filters area, select
Network Aware as WLAN, that is, 10.10.10.56 client in the following example, and then click GO.
• Netflow statistics are sent at an interval of 30 seconds (Not user configurable. Current value is 90
seconds).
• Netflow record will be sent even for the unclassified applications with new flow record.
• Netflow will be sent on enabling AVC on that WLAN.
• IPv6 traffic is not supported in Netflow in release 8.2.
• Netflow sending initial template will be sent from Control plane.
• Netflow export on service port is not supported.
The software is available for web download on the URL as indicated below:
https://www.lancope.com/stealthwatch-evaluation-application
1. Sign up for Stealth Watch Evaluation and download the software
2. Then download the latest "FlowCollector for Netflow Virtual Edition install OVF Files v 6.6"
Prior to release 8.2 Netflow configuration on WLC was done by associating the fixed record
ipv4_client_app_flow_record to the Netflow monitor. Now along with this we will support a new fixed
record called ipv4_client_src_dst_flow_record the same will be allowed in cli and GUI at the places
shown below.
Note Since only one netflow exporter is present per controller, it has to be between the old and new record
formats.
In this instance, a university is sharing a WLAN between students, faculty, and guests. The guest network
can be further partitioned by service provider. Each group can be assigned a certain percentage of
airtime.
Enterprise or Hospitality or Retail
In this instance, the venue is sharing a WLAN between employees and guests. The guest network can be
further partitioned by service provider. The guests could be sub-grouped by tier of service type with each
subgroup being assigned a certain percentage of airtime, for example a paid group is entitled to more
airtime than the free group.
Time Shared Managed Hotspot
In this instance, the business entity managing the hotspot, such as a service provider or an enterprise,
can allocate and subsequently lease airtime to other business entities.
ATF Functionality and Capabilities
• ATF policies are applied only in the downlink direction (AP transmitting frames to client). Only
airtime in the downlink direction, that is AP to client, can be controlled accurately by the AP.
Although airtime in the uplink direction, that is client to AP, can be measured, it cannot be strictly
controlled. Although the AP can constrain airtime for packets that it sends to clients, the AP can
only measure airtime for packets that it ‘hears’ from clients because it cannot strictly limit their
airtime.
• ATF policies are applied only on wireless data frames; management and control frames gets ignored.
• When ATF is configured per-SSID, each SSID is granted airtime according to the configured policy.
• ATF can be configured to either drop or defer frames that exceed their airtime policies. If the frame
is deferred, it will be buffered and transmit at some point in the future when the offending SSID has
a sufficient airtime budget. Of course, there is a limit as to how many frames can be buffered. If this
limit is crossed, frames will be dropped regardless.
• ATF can be globally enabled or disabled
• ATF can be enabled or disabled on an individual access point, AP group or entire network
• ATF will be supported on the 1550-128Mb, 1570, 1700, 2600, 2700, 3700, 3600, 3500, series access
points in local and FlexConnect mode.
• ATF results and statistics are available on the wireless controller.
ATF Client Fair Sharing/per client entitlement is introduced in 8.2 release. Client fair share ensures the
clients within a SSID/WLAN are treated equally based on their utilization of the radio bandwidth.
Benefit
Prior to release 8.2, SSID based Airtime entitlement is accomplished. However, with SSID based
Airtime Fairness, there is no guarantee for the clients within the SSID to be treated equally based on
their utilization of the radio bandwidth. There is a potential risk where one or few clients shall end up
utilizing the complete airtime allocated for a SSID/WLAN by ruining the opportunity of Wi-Fi
experience for rest of the clients within the same SSID.
To overcome this problem, in 8.2 release each ATF policy have a new option to turn on or off client fair
sharing among clients associated to a policy. This option can be executed while creating, modifying the
policy in the Wireless LAN Controller. Customer can use this option or feature to provide fair sharing
of Airtime between clients associated to a SSID. As shown below all the clients associated to SSID gets
equal air time.
ATF Phase 2 (With Client Fair Sharing)
Table 5-9
Access Points
1550
1550 (64 (128
MB) MB) 1570 3700 1530 1540 1560
Features
Basic Mesh Yes Yes Yes Yes Yes Yes 8.4
Flex+Mesh Yes Yes Yes Yes Yes No No
Fast No 8.3 8.3 Yes 8.3 No 8.4
Convergence
(background
scanning)
Wired Clients Yes Yes Yes No Yes No No
on RAP
Daisy Chain 7.6 7.6 7.6 No 7.6 No No
LSC Yes Yes Yes Yes Yes No No
Table 5-9
Access Points
1550
1550 (64 (128
MB) MB) 1570 3700 1530 1540 1560
PSK 8.2 8.2 8.2 8.2 8.2 8.5 8.4
provisioning:
MAP-RAP
authentication
their users though each MAP accessing the same medium. To compare this in non-mesh scenario, where
there can be neighboring local mode unified Aps in the arena next to each other in different rooms
serving to their respective clients on the same channel with each providing 100% radio airtime
downstream. Therefore, ATF has no control over enforcing clients in two different neighboring AP’s
accessing the same medium. Similarly, it’s applicable for MAPs in a Mesh tree.
For Outdoor/Indoor Mesh Aps, Airtime fairness must be supported on client access radios which serve
regular clients as same as how we currently support ATF on non-mesh unified local mode Aps to serve
the clients and additionally it must also be supported on backhaul radios which bridge the traffic to/from
the clients on client access radios to RAPs (one hop) or through MAPs to RAPs (multiple hops). Its bit
tricky to support ATF on backhaul radio’s using the same SSID/Policy/Weight/Client fair sharing model.
Since backhaul radio’s doesn’t have SSIDs and it always bridges traffic through their hidden backhaul
nodes. Therefore, on the backhaul radios either in RAP or MAP, the radio airtime downstream will be
fair shared equally based on the number of backhaul nodes. This approach eliminates the problem and
provides fairness to users across wireless mesh network in the case where the clients associated to 2nd
hop MAP can stall the clients associated to 1st hop MAP where 2nd hop MAP is connected wireless to
1st hop MAP through backhaul radio though the Wi-Fi users in the MAPs are separated by a physical
location. In the scenario, when a backhaul radio has an option to serve normal clients through universal
client access feature, ATF considers the regular clients into single node and group them into it. It
enforces the Airtime by equally fair sharing the radio airtime downstream based on the number of nodes
(backhaul nodes + single node for regular clients). We will see more details how this solution is turned
into design in the next sections.
The Framework behind the ATF monitor mode is to allow the user to view and get the stats of overall
Air Time being used i.e. to report the Air Time usage for all the AP transmissions. The ATF in monitor
mode can be enabled on following levels.
• Disable Mode: By default ATF is disabled on the WLC
• Monitor Mode: To monitor airtime usage on your network
• Enforce—Policy Mode: Assigning ATF policies on your network
• Strict Enforcement
• Optimized
For additional configuration and deployment details please the ATF Deployment Guide at the Link
Below:
http://www.cisco.com/c/en/us/support/wireless/wireless-lan-controller-software/products-technical-ref
erence-list.html
Introduction
This chapter describes the Cisco Unified Wireless Multicast in IP multicast forwarding and provides
information on how to deploy multicast in a wireless environment. A prerequisite for using the multicast
performance functionality is that a multicast-enabled network must be configured on all routers between
the controllers and the Access Points (APs). To accommodate networks that do not support multicast,
the controller continues to support the original unicast packet forwarding mechanism.
IP multicast is a delivery protocol for information to a group of destinations. It uses the most efficient
strategy to deliver the information over each link of the network. It sends only one copy of the
information at each hop of the network, creating copies only when the links to the destinations split.
Typically, many of today’s networks applications use unicast packets i.e., from one source to one
destination. However, when multiple receivers require the same data, replicating the data from the source
to all the receivers as individual unicast packets increases the network load. IP multicast enables efficient
transfer of data from a set of sources to a dynamically formed set of receivers.
IP multicast is typically used today for one way streaming media, such as video to large groups of
receivers. Many cable TV operators, educational institutions and large enterprises have deployed IP
multicast for their content delivery needs. Additionally, there have been some uses of audio and video
conferencing using multicast. Another widespread use of multicast within campus and commercial
networks is for file distribution, particularly to deliver operating system images and updates to remote
hosts. IP multicast has also seen deployment within the financial sector for applications such as stock
tickers and hoot-n-holler systems.
CAPWAP
One CAPWAP
multicast packet out. CAPWAP
CAPWAP
351018
Network replicates
packets as needed.
Effectively, enabling Global Multicast mode delivers the multicast packet to each access point. This
allows the routers in the network to use standard multicast techniques to replicate and deliver multicast
packets to the APs. For the CAPWAP multicast group, the controller becomes the multicast source and
the APs become the multicast receivers.
Note A prerequisite for using the multicast performance functionality is that a multicast enabled network is
configured on all routers between the controllers and the APs. To accommodate networks that do not
support multicast, the controller continues to support the original unicast packet forwarding mechanism.
Note With multicast enabled, any kind of multicast packet received on the VLAN from the first hop router is
transmitted over the wireless including HSRP hellos, all router, routing protocol, and PIM multicast
packets.
After the administrator enables multicast (multicast mode is disabled by default), configures a CAPWAP
multicast group, and enables IGMP snooping, the access point downloads the controller’s CAPWAP
multicast group address during the normal join process (at boot time) to the controller. After an access
point joins a controller and downloads its configuration, the AP issues an Internet Group Management
Protocol (IGMP) join request to join the controller’s CAPWAP multicast group. This triggers the normal
setup for the multicast state in the multicast-enabled routers between the controller and APs. The source
IP address for the multicast group is the controller’s management interface IP address, not the
AP-manager IP address used for Layer 3 mode. Once the AP has joined the controllers CAPWAP
multicast group, the multicast algorithm for client multicast traffic works as described below.
When the source of the multicast group is on the wired LAN:
• When the controller receives a multicast packet from any of the client VLANs on the first hop router,
it transmits the packet to the CAPWAP multicast group via the management interface at the best
effort QoS classification. The QoS bits for the CAPWAP multicast packet are hard coded at the
lowest level and are not user changeable.
• The multicast-enabled network delivers the CAPWAP multicast packet to each of the access points
that have joined the CAPWAP multicast group, using the normal multicast mechanisms in the
routers to replicate the packet along the way as needed so that the multicast packet reaches all APs
(Figure 6-1). This relieves the controller from replicating the multicast packets.
• Access points may receive other multicast packets but will only process the multicast packets that
are sourced from the controller they are currently joined to; any other copies are discarded. If more
than one WLAN is associated to the VLAN interface where the original multicast packet was
sourced, the AP transmits the multicast packet over each WLAN (following the WLAN bitmap in
the CAPWAP header). Additionally, if that WLAN is on both radios (802.11g and 802.11a), both
radios transmit the multicast packet on the WLAN if there are clients associated, even if those clients
did not request the multicast traffic.
When the source of the multicast group is a wireless client:
• The multicast packet is unicast (CAPWAP encapsulated) from the AP to the controller similar to
standard wireless client traffic.
• The controller makes two copies of the multicast packet. One copy is sent out the VLAN associated
with the WLAN it came on, enabling receivers on the wired LAN to receive the multicast stream and
the router to learn about the new multicast group. The second copy of the packet is
CAPWAP-encapsulated and is sent to the CAPWAP multicast group so that wireless clients may
receive the multicast stream.
Ethernet IP Tunnel
Controller 1 Controller 2
Subnet A Subnet B
CAPWAP CAPWAP CAPWAP CAPWAP
AP A AP B AP C AP D
351019
Client Data
Multicast Data
Note In the event of a client roam, there is a slight disruption in the multicast session; in some applications it
might be considered unsuitable for use.
Step 3 If you want to enable IGMP snooping, check the Enable IGMP Snooping check box. If you want to
disable IGMP snooping, leave the check box unchecked. The default value is disabled.
Step 4 To set the IGMP timeout, enter a value between 30 and 7200 seconds in the IGMP Timeout text box.
The controller sends three queries in one timeout value at an interval of timeout/ 3 to see if any clients
exist for a particular multicast group. If the controller does not receive a response through an IGMP
report from the client, the controller times out the client entry from the MGID table. When no clients are
left for a particular multicast group, the controller waits for the IGMP timeout value to expire and then
deletes the MGID entry from the controller. The controller always generates a general IGMP query (that
is, to destination address 224.0.0.1) and sends it on all WLANs with an MGID value of 1.
Step 5 Enter the IGMP Query Interval (seconds).
Note The number of multicast addresses supported per VLAN for a Cisco WLC is 100.
Step 6 If you have a multicast enabled network, choose Multicast from the AP Multicast Mode drop-down list
to use the method where the network replicates the packets.
Step 7 If you do not have a multicast enabled network, choose Unicast from the AP Multicast Mode
drop-down list to use the method where the controller replicates the packets.
Step 8 Choose Multicast from the AP Multicast Mode drop-down list and enter a multicast group address.
This option is shown in Figure 6-3.
Figure 6-3 Commands to turn on Ethernet Multicast Mode via the GUI.
Caution Although not recommended, any multicast address can be assigned to the CAPWAP multicast group
including the reserved link local multicast addresses used by OSPF, EIGRP, PIM, HSRP, and other
multicast protocols.
Cisco recommends that multicast addresses be assigned from the administratively scoped block 239/8.
IANA has reserved the range of 239.0.0.0-239.255.255.255 as administratively scoped addresses for use
in private multicast domains (see the note below for additional restrictions). These addresses are similar
in nature to the reserved private IP unicast ranges (such as 10.0.0.0/8) defined in RFC 1918. Network
administrators are free to use the multicast addresses in this range inside of their domain without fear of
conflicting with others elsewhere in the Internet. This administrative or private address space should be
used within the enterprise and blocked from leaving or entering the autonomous domain (AS).
Note Do not use the 239.0.0.X address range or the 239.128.0.X address range. Addresses in these ranges
overlap with the link local MAC addresses and will flood out all switch ports even with IGMP snooping
turned on.
Cisco recommends that enterprise network administrators further subdivide this address range into
smaller geographical administrative scopes within the enterprise network to limit the “scope” of
particular multicast applications. This is used to prevent high-rate multicast traffic from leaving a
campus (where bandwidth is plentiful) and congesting the WAN links. It also allows for efficient
filtering of the high bandwidth multicast from reaching the controller and the wireless network.
For more information on multicast address guidelines, refer to the document at the following URL:
http://www.cisco.com/en/US/tech/tk828/technologies_white_paper09186a00802d4643.shtml
Table 6-1 Pros and Cons of using the same Multicast Group or Different Groups
Note A wired client anywhere in the network may request the CAPWAP multicast stream and receive it from
all sources (if multicast boundaries are not applied). Multicast streams are not encrypted when they are
encapsulated in the CAPWAP multicast packet. Therefore, it is recommended that multicast boundaries
be implemented to block this type of access.
In the past, Time To Live field in the IP Multicast datagram was used for creating Auto-RP administrative
boundaries using the ttl-threshold command. This has been superseded by the ip multicast boundary
interface mode command, which filters IP multicast traffic and also Auto-RP messages. Cisco
recommends using the new command.
Other useful commands include the ip multicast rate-limit interface command. This command
enforces low rates on the wireless VLANs. Without it, even if the network engineer filters the high rate
multicast addresses, a low rate multicast address cannot exceed its rate.
A typical example on a wireless client VLAN is given below. For more information on other multicast
commands for a multicast enabled network refer to http://www.cisco.com/go/multicast. Filtering for
multicast-enabled traffic also allows you to prevent propagation of certain worms like the sasser worm
which relied on the TCP and ICMP transports with multicast addresses. Blocking these types of traffic
with multicast group addresses does not affect most applications since they typically use UDP or TCP
for streaming.
In the following example, packets to the multicast group range 239.0.0.0 to 239.127.255.255 from any
source will have their packets rate-limited to 128 kbps. The example also sets up a boundary for all
multicast addresses not in the lower administratively scoped addresses. In addition, hosts serviced by
Vlan40 can only join the lower administrative groups 239.0.0.0 to 239.127.255.255.
mls qos
!
class-map match-all multicast_traffic
description Permit Low Rate Multicast Range of 239.0.0.0 to 239.127.0.0 match access-group
101
!
policy-map multicast
description Rate Limit Multicast traffic to 2.56mps with burst of 12800 bytes class
multicast_traffic
police cir 2560000 bc 12800 be 12800 conform-action transmit exceed-action drop
!
interface Vlan40
description To Wireless Clients
ip address 10.20.40.3 255.255.255.0
ip pim sparse-mode
ip multicast boundary 1 ip igmp access-group 30 standby 40 ip 10.20.40.1
standby 40 preempt
service-policy output multicast
!
access-list 1 remark Permit Low Rate Multicast Range of 239.0.0.0 to 239.127.0.0 for
multicast boundary
access-list 1 permit 239.0.0.0 0.127.255.255
!
access-list 30 remark Only Allow IGMP joins to this Multicast Group Range access-list 30
permit 239.0.0.0 0.127.255.255
!
access-list 101 remark Permit Low Rate Multicast Range of 239.0.0.0 to 239.127.0.0 for
class-map
access-list 101 permit ip any 239.0.0.0 0.127.255.255
We look at two different deployments (distributed and centralized) and how they impact roaming with
multicast clients. In a centralized deployment, WLC WLAN interfaces are attached to the same VLANs/
subnets, the multicast streams is uninterrupted when a multicast client roams from APs on one WLC to
an AP on another WLC. The centralized deployment creates a flat WLC client multicast network. The
reason centralized WLCs do not affect multicast roaming is because once the multicast stream is
requested from a single multicast client on a WLAN, it streams out all APs on that WLAN, on all radios
(802.11g and 802.11a), on all WLCs, even if that access point WLAN has no clients associated with it
that have requested the multicast traffic. If you have more than one WLAN associated to the VLAN, the
AP transmits the multicast packet over each WLAN. Both the unicast mode CAPWAP packet and the
multicast mode CAPWAP packet contain a WLAN bitmap that tells the receiving AP which WLAN it
must forward the packet over.
The distributed deployment does not have this problem because while the WLANs are the same, the
WLCs are attached to different VLANs. This means that when the multicast client roams to a new WLC,
the WLC will first query the client for its multicast group memberships. At this point the client responds
with its group membership report and the WLC forwards this message to the appropriate multicast group
address through the VLAN associated with its local VLAN. This allows the client to resume its multicast
session through the foreign WLC.
The distributed deployment reduces the amount of multicast traffic on the APs because, although the
WLAN SSIDs are the same, the WLCs are attached to different VLANs. WLAN multicast traffic
depends on a client request on the VLAN of that WLC. Table 6-2 lists the advantages and disadvantages
of distributed and collocated deployments.
Table 6-2 Pros and Cons of Centralized WLCs and Distributed WLCs
Additional Considerations
Two areas for additional consideration in multicast deployment are when implementing AP groups, and
FlexConnect and APs. AP groups allow APs on the same controller to map the same WLAN (SSID) to
different VLANs. If a client is roaming between APs in different groups, the multicast session will not
function properly as this is currently not supported. Currently, the WLC forwards multicast only for the
VLAN configured on the WLAN and does not take into consideration VLANs configured in AP groups.
FlexConnect APs allow the local termination of WLANs at the network edge rather than at the WLC,
and the multicast behavior is controlled at that edge. If a FlexConnect WLAN is terminated on a WLC
and multicast is enabled on that WLC, multicast is delivered to that FlexConnect WLAN, if the
CAPWAP multicast group is allowed to extend to the FlexConnect network location.
Even if the CAPWAP multicast packets are not able to transit the network to the FlexConnect AP, WLAN
clients on that FlexConnect AP are able to send IGMP joins to the network connected to the WLC, as
these are unicast messages.
• Interface local—Interface local multicast addresses are intended for transmission of multicast
within a node.
• Site local—Site local multicast addresses are intended for use within a single site.
Figure 6-4 lays out the format of an IPv6 multicast address.
Similar to the unicast address space, there are some reserved or special use multicast addresses. A couple
of the more common multicast groups and their intended use are mentioned below. For a more
comprehensive list of currently assigned multicast addresses, see:
http://www.iana.org/assignments/ipv6-multicast-addresses
Some of the more common multicast addresses seen on IPv6 systems include:
• FF02::1—Link local, all nodes address
• FF02::2—Link local, all routers address
• FF02:0:0:0:0:1:FFXX:XXXX—Link local, solicited-node address
128 bits
Group ID (112 bits)
225114
E = Global
Note Unlike previous versions of releases, IPv6 Unicast traffic support does not mandate for Global
Multicast Mode to be enabled on the controller. IPv6 Unicast traffic support is enabled automatically.
Step 1 For IPv6 Multicast to be enabled, check the Enable Global Multicast Mode check box.
Step 2 Check the Enable MLD Snooping check box to support IPv6 forwarding decisions.
Note To enable MLD Snooping, you must enable Global Multicast Mode of the controller.
Step 4 To verify that IPv6 multicast traffic is being snooped, go to Monitor > Multicast. Note that both IPv4
(IGMP) and IPv6 (MLD) multicast groups are listed. Click MGID to view the wireless clients joined to
that group address.
Bonjour - 8.1
Bonjour - 7.4 (Phase 1) Bonjour - 7.5 (Phase 2) Bonjour - 8.0 (Phase 3) (Phase 4)
• Bonjour service with mDNS • Support of mDNS services • Bonjour GW with access • Number of
gateway for wired and wireless across L3 domains policy controlled service supported
services discovery services is
• Introduction of mDNS AP
scaled
• Bonjour service policy applied for Bonjour service • Device service mapping to
per interface or per WLAN snooping on 10 wired access policy
VLANs
• mDNS services cached on the • Bonjour group and single
controller • LSS – Location Specific access policy management
Services
• Bonjour services available on • Bonjour profile control by
all controller seen L2 domains • Priority MAC of Bonjour local policy
service
• Bonjour services supported on • Introduction of Bonjour
the Anchor controller • Origin based service administrator to manage
discovery specific Bonjour services
• Bonjour services supported
from Cisco Prime
with L2 and L3 roaming • 6400 services and service
providers per service type
• 100 services and 64 service
providers per service type
• Support of FlexConnect APs in
central mode
224.0.0.251 VLAN X
CAPWAP
VLAN Y
353290
CAPWAP Tunnel
224.0.0.251
VLAN X Apple TV
To address this issue, Cisco WLC acts as a Bonjour Gateway. The WLC listens for Bonjour services and
by caching those Bonjour advertisements (AirPlay, AirPrint, and so on) from the source/host, for
example AppleTV, it responds back to Bonjour clients when a request for service is initiated. The
following illustrates this process:
Step 3 The controller listens for the client queries for services.
Step 4 The controller sends a unicast response to the client queries for bonjour services.
mDNS AP
The mDNS AP feature allows the controller to have visibility of wired service providers that are on
VLANs not visible to the controller. You can configure any AP as an mDNS AP and enable the AP to
forward mDNS packets to the controller. VLAN visibility on the controller is achieved by APs that
forward the mDNS advertisements to the controller. The mDNS packets between the AP and the
controller are forwarded in Control and Provisioning of Wireless Access Points (CAPWAP) data tunnel
that is similar to the mDNS packets from a wireless client. Only CAPWAP v4 tunnels are supported. APs
can be in either the access port or the trunk port to learn the mDNS packets from the wired side and
forward them to the controller. You can use the configurable knob that is provided on the controller to
start or stop mDNS packet forwarding from a specific AP. You can also use this configuration to specify
the VLANs from which the AP should snoop the mDNS advertisements from the wired side. The
maximum number of VLANs that an AP can snoop is 10.
If the AP is in the access port, you should not configure any VLANs on the AP to snoop. The AP sends
untagged packets when a query is to be sent. When an mDNS advertisement is received by the mDNS
AP, the VLAN information is not passed on to the controller. The service provider's VLAN that is
learned through the mDNS AP's access VLAN is maintained as 0 in the controller.
By default, the mDNS AP snoops in native VLAN. When an mDNS AP is enabled, native VLAN
snooping is enabled by default and the VLAN information is passed as 0 for advertisements received on
the native VLAN.
The mDNS AP feature is supported only on local mode and monitor mode APs. The mDNS AP
configuration is retained on those mDNS APs even if global mDNs snooping is disabled. If an mDNS
AP is reset or associated with the same controller or another controller, one of the following occurs:
• If the global snooping is disabled on the controller, a payload is sent to the AP to disable mDNS
snooping.
• If the global snooping is enabled on the controller, the configuration of the AP before the reset or
the association procedure is retained.
The process flow for the mDNS AP feature is as follows:
Uplink (Wired infrastructure to AP to Controller)
1. Receives the 802.3 mDNS packet on configured VLANs.
2. Forwards the received mDNS packet over CAPWAP.
3. Populates multicast group ID (MGID) based on the received VLAN.
Downlink (Controller to AP to Wired Infrastructure)
1. Receives an mDNS query over CAPWAP from the controller.
2. Forwards the query as 802.3 packet to wired infrastructure.
3. The VLAN is identified from dedicated MGIDs.
• Apple devices such as iPads and iPhones can discover Apple TV through Bluetooth. This might
result in Apple TVs being visible to end users. Because Apple TVs are not supported on mDNS
access policy, Cisco recommends you to disable Bluetooth on Apple TVs.
Note Please refer the latest WLC release notes for the AP models supporting the mDNS mode and mDNS APs
supported.https://www.cisco.com/c/en/us/td/docs/wireless/controller/release/notes/crn84.html
As mentioned in the figure above, improvements to Bonjour services are made. Bonjour policies are
introduced to allow per service instance (MAC address) configuration that mandates how the service
instance is shared, which is articulated as follows:
• Service instance is shared with whom (user-id).
• Service instance is shared with which role/s (client-role).
• Location where the Service Instance allowed to be accessed (Client Location)
This configuration can be applied to wired and wireless service instances, and the response to any query
will solely be based on the policy configured for each service instance. This allows selective sharing of
service instances based on the location, user-id, or role. As most service publishing devices are wired,
this allows filtering of wired services at par with wireless service instances. While mDNS profile
associated with the client checks for service type being queried before responding to the query, the
access policy further allows filtering of specific service instances based on querying client location, role,
or user-id.
With Bonjour access policy, there are two levels of filtering the client queries, which are as follows:
• At the service type level by using the mDNS profile.
• At the service instance level using the access policy associated with the service instance.
A service instance or a set of service instances discovered and cached by the WLC can be associated
with an access policy filter, which acts like a lens that determines which clients and what kind of client
context (role or user-id) can see and access the service instance.
Note Service instances that are not configured with any access policy will be mapped to the default access
policy, which allows only the administrator user role, by default, to receive the service instances.
Additional users can be configured and added in the default policy.
• Bonjour access policy filters can be configured for specific service instances identified by the MAC
address of the devices publishing the services.
• Bonjour access policy is associated with a service group name that contains one or more MAC
addresses of the devices publishing the Bonjour services.
• The service group name is then attached to the service instance when it is discovered and cached at
the WLC.
• While traversing the list of service instances in response to a client query, each instance will be
evaluated to verify if the querying client location, role, or user-id are allowed access to the service
instance before including the same in the response.
If the same MAC address is configured in multiple service groups, it means the service instance will be
associated with all the service group names that are configured with this MAC address. All the access
policies associated with the MAC addressee’s service group names will be evaluated until the decision
is to include the service instance. Currently, a maximum of five service groups are supported for a single
MAC address. Service group configurations can be done even when mDNS snooping is disabled or
offline, and the access policy comes into effect when the services are discovered. It can also be done
dynamically when snooping is already enabled.
As shown in the table above, in release 8.1, 5508 controller is scaled down to support only 1000 services
at full scale (500 APs and 7000 clients). With 80% scale (400 APs and 5400 users), the same 5508
controller supports 2400 services. Similarly, WiSM-2 supports 2000 services at full scale (1000 APs and
15000) and 4800 services at 80% scale. Number of Bonjour services remains unchanged on the 7500 and
vWLC controllers. 5520 and 8500 series controllers support 16,000 services in release 8.1. On 2504
controller, the number of services drop significantly due to memory limitation and running Bonjour
services was not recommended in rel 8.1. Therefore, it was recommended that Bonjour deployment on
the 2504 should be limited to testing or very limited number of services. In rel 8.2 changes have been
made and it is possible to run up to 200 Bonjour services on the 2504 controller with 8.2 software.
Note Location validation is implicit and will be the first level of access policy filtering even before ROLE and
USER-ID credentials of the client are verified.
Table 6-4 depicts a possible policy configuration with the service group named AppleTV-teachers.
Table 6-4 Example for Policy Configuration with the Service Group Name
Service Group
Name MAC Address Service Name Location Type Location
AppleTV-teachers e8:b7:48:9b:f0:20 AppleTV-class1 AP-GROUP 6-FLR
e8:b7:48:9b:f0:21 AppleTV-class2 AP-NAME AP4403.a740.bc97
— — — —
e2:34:23:11:32:eb AppleTV-class9 AP-NAME same
— — — —
e8:c7:38:9c:f1:32 AppleTV -class3 AP-GROUP any
Two protocols are implemented on Chromecast to support discovery, the first is the DIAL Protocol over
SSDP. This is the primary system used for the old version1 of Google Cast. The second protocol uses
mDNS (multicast Domain Name System) protocol to search for available Chromecast on the wireless
network. This is the primary way of discovering a Chromecast that supports the v2 API and is more
popular. In this document, we will focus on mDNS device discovery for Chromecast. Devices using
DIAL protocol for Chromecast discovery are outside of the scope of the document.
Note Chromecast works with a growing number of Apps. chromecast.com/apps. We have tested with chrome
browser (with Chromecast extension installed) on Windows7 and MacBook Air clients and with
Chromecast app on Android Samsung Galaxy S4, S6 Edge phones.
Deployment Considerations
mDNS protocol operates on service announcements and service queries which allow devices to ask and
advertise specific applications such as:
• Printing Services
• File Sharing Services
To address this issue Cisco WLC acts as a Chromecast Gateway. The WLC listens for Chromecast
services and by caching those Chromecast advertisements from the source/host e.g. Chromecast server,
responds back to Chrome clients when a request for service is initiated. The following illustrates this
process.
1. The controller listens for chromecast service/advertisements.
Step 2 Create a WLAN for clients. By default mDNS Snooping is enabled on WLAN. To confirm, choose
WLAN id > Advanced tab and make sure that the mDNS Snooping option is Enabled. Select the mDNS
Profile as the default-mdns-profile to allow the mDNS services that you require to be advertised on a
particular WLAN. Click Apply.
Wi-Fi Considerations
Chromecast devices do not support 802.1x, so Cisco recommends to create a separate SSID for
Chromecast that supports WPA2 PSK (Pre-Shared Key).
FlexConnect (previously known as Hybrid Remote Edge Access Point or H-REAP) is a wireless solution
for branch office and remote office deployments. It enables you to configure and control access points
in a branch or remote office from the corporate office through a wide area network (WAN) link without
the deployment of a controller in each office. The FlexConnect access points (APs) can switch client data
traffic locally and perform client authentication locally. When they are connected to the controller, they
can also send traffic back to the controller.
Supported Platforms
FlexConnect is only supported on these components:
• Cisco AP-1130, AP-1240, AP-1040, AP-1140, AP-1260, AP-1250, AP-3500, AP-1600, AP-2600,
AP-3600, AP-3700, AP-1700, AP-2700, AP 700, AP-1520, AP-1530, AP-1550, AP-1570 access
points
• 1815i, 1815W, 1815-OEAP, 1540 1560 Legacy APs: 3500, OEAP 600,3600, 2600, 1600, 3700,
2700, 1700, 702, 702W, 802,1530, 1552WU, 1550, 1570, 1800 series, 2800 series, 3800 series
• Cisco 5520, 8540, Flex 7500, Cisco 8500, 4400, 5500, 3504 and 2500 series controllers
• Cisco WiSM-2
• Cisco virtual controller (vWLC)
FlexConnect Terminology
For clarity, this section provides a summary of the FlexConnect terminology and definitions used
throughout this chapter.
Switching Modes
FlexConnect APs are capable of supporting the following switching modes concurrently, on a
per-WLAN basis.
Local Switched
Locally-switched WLANs map wireless user traffic to discrete VLANs via 802.1Q trunking, either to an
adjacent router or switch. If so desired, one or more WLANs can be mapped to the same local 802.1Q
VLAN.
A branch user, who is associated to a local switched WLAN, has their traffic forwarded by the on-site
router. Traffic destined off-site (to the central site) is forwarded as standard IP packets by the branch
router. All AP control/management-related traffic is sent to the centralized Wireless LAN Controller
(WLC) separately via Control and Provisioning of Wireless Access Points protocol (CAPWAP).
Central Switched
Central switched WLANs tunnel both the wireless user traffic and all control traffic via CAPWAP to the
centralized WLC where the user traffic is mapped to a dynamic interface/VLAN on the WLC. This is the
normal CAPWAP mode of operation.
The traffic of a branch user, who is associated to a central switched WLAN, is tunneled directly to the
centralized WLC. If that user needs to communicate with computing resources within the branch (where
that client is associated), their data is forwarded as standard IP packets back across the WAN link to the
branch location. Depending on the WAN link bandwidth, this might not be desirable behavior.
Operation Modes
There are two modes of operation for the FlexConnect AP.
Connected mode—The WLC is reachable. In this mode the FlexConnect AP has CAPWAP connectivity
with its WLC.
Standalone mode—The WLC is unreachable. The FlexConnect has lost or failed to establish CAPWAP
connectivity with its WLC: for example, when there is a WAN link outage between a branch and its
central site.
FlexConnect States
A FlexConnect WLAN, depending on its configuration and network connectivity, is classified as being
in one of the following defined states.
Authentication-Central/Switch-Central
This state represents a WLAN that uses a centralized authentication method such as 802.1X, VPN, or
web. User traffic is sent to the WLC via CAPWAP. This state is supported only when FlexConnect is in
connected mode (Figure 7-2); 802.1X is used in the example, but other mechanisms are equally
applicable.
Authentication-Central/Switch-Local
This state represents a WLAN that uses centralized authentication, but user traffic is switched locally.
This state is supported only when the FlexConnect AP is in connected mode (Figure 7-3); 802.1X is used
in the Figure 7-3 example, but other mechanisms are equally applicable.
FlexConnect
CAPWAP dot1q
Centralized
350999
WLAN Controller
Authentication-Down/Switch-Local
A WLAN that requires central authentication (as explained above) rejects new users. Existing
authenticated users continue to be switched locally until session time-out (if configured). The WLAN
continues to beacon and respond to probes until there are no more (existing) users associated to the
WLAN. This state occurs as a result of the AP going into standalone mode (Figure 7-4).
FlexConnect OR
CAPWAP dot1q
Centralized
351001
Existing
WLAN Controller
User
User Data CAPWAP Control
Local Switched User Data 802.1x
Authentication-local/switch-local
This state represents a WLAN that uses open, static WEP, shared, or WPA2 PSK security methods. User
traffic is switched locally. These are the only security methods supported locally if a FlexConnect goes
into standalone mode. The WLAN continues to beacon and respond to probes (Figure 7-5). Existing
users remain connected and new user associations are accepted. If the AP is in connected mode,
authentication information for these security types is forwarded to the WLC.
351000
Existing CAPWAP Control WLAN Controller
User
Local Auth
Local Switched Data
CAPWAP Control
Note All 802.11 authentication and association processing occurs regardless of which operational mode the
AP is in. When in connected mode, the FlexConnect AP forwards all association/authentication
information to the WLC. When in standalone mode, the AP cannot notify the WLC of such events, which
is why WLANs that make use of central authentication/switching methods are unavailable.
Applications
The FlexConnect AP offers greater flexibility in how it can be deployed, such as:
• Branch wireless connectivity
• Branch guest access
• Public WLAN hotspot
• Wireless BYOD in Branch sites
CAPWAP
FlexConnect
Centralized
WLAN Controller
VLAN Local Access WLAN 1
WLAN 2 VLAN Local Access WLAN 2
Management VLAN
CAPWAP Control
351021
Branch Corporate Central
Mobile
Worker
Centralized
WLAN Controller
FlexConnect AZR
CAPWAP Internet
Cisco
SSG
Walled
351002
Garden
Deployment Considerations
The following section covers the various implementation and operational caveats associated with
deploying FlexConnect APs.
WAN Link
For the FlexConnect AP to function predictably, keep in mind the following with respect to WAN link
characteristics:
• Latency—A given WAN link should not impose latencies greater than 100 ms. The AP sends
heartbeat messages to the WLC once every thirty seconds. If a heartbeat response is missed, the AP
sends five successive heartbeats (one per second) to determine whether connectivity still exists. If
connectivity is lost, the FlexConnect AP switches to standalone mode.
Similarly, AP and WLC exchange echo CAPWAP packet to check the connectivity. If the echo
CAPWAP packet response is missed, the AP sends five successive echo CAPWAP packets (every
three seconds) to determine whether the connectivity still exists. If the connectivity is lost, the
FlexConnect AP switches to standalone mode. (see Operation Modes, page 7-3 for operation mode
definitions). The AP itself is relatively delay tolerant. However, at the client, timers associated with
authentication are sensitive to link delay, and thus a constraint of < 100 ms is required. Otherwise,
the client can time-out waiting to authenticate, which can cause other unpredictable behaviors, such
as looping.
• Bandwidth—WAN links should be at least 128 kbps for deployments when up to eight APs are being
deployed at a given location. If more than eight APs are deployed, proportionally more bandwidth
should be provisioned for the WAN link.
• Path MTU—An MTU no smaller than 500 bytes is required.
Roaming
When a FlexConnect AP is in connected mode, all client probes, association requests, 802.1x
authentication requests, and corresponding response messages are exchanged between the AP and the
WLC via the CAPWAP control plane. This is true for open, static WEP, and WPA PSK-based WLANs
even though CAPWAP connectivity is not required to use these authentication methods when the AP is
in standalone mode.
• Dynamic WEP/WPA—A client that roams between FlexConnect APs using one of these key
management methods performs full authentication each time it roams. After successful
authentication, new keys are passed back to the AP and client. This behavior is no different than a
standard centralized WLAN deployment, except that in an FlexConnect topology, there can be link
delay variations across the WAN, which can in turn impact total roam time. Depending on the WAN
characteristics, RF design, back end authentication network, and authentication protocols being
used, roam times may vary.
• WPA2—To improve client roam times, WPA2 introduced key caching capabilities, based on the
IEEE 802.11i specification. Cisco created an extension to this specification called Proactive Key
Caching (PKC). PKC today is supported only by the Microsoft Zero Config Wireless supplicant and
the Funk (Juniper) Odyssey client. Cisco CCKM is also compatible with WPA2.
Remote branch locations requiring predictable, fast roaming behavior in support of applications
such as wireless IP telephony should consider deploying a local WLC (Virtual Controller on UCS
blade or 2500 WLC).
Note A client that roams (for a given local switched WLAN) between FlexConnect APs that map the WLAN
to a different VLAN/subnet will renew their IP addresses to ensure that they have an appropriate address
for the network to which they have roamed.
Location Services
FlexConnect deployments typically consist of only a handful of APs at a given location. Cisco maintains
strict guidelines regarding the number and placement of APs to achieve the highest level of location
accuracy. As such, although it is possible to obtain location information from FlexConnect deployments,
the level of accuracy may vary greatly across remote location deployments.
QoS Considerations
For WLANs that are centrally-switched, the FlexConnect AP handles QoS in the same way as standard
APs. Locally-switched WLANs implement QoS differently.
For locally-switched WLANs with Wi-Fi MultiMedia (WMM) traffic, the AP marks the dot1p value
within the dot1q VLAN tag for upstream traffic. This happens only for tagged VLANs, not the native
VLAN.
For downstream traffic, FlexConnect uses the incoming dot1p tag from the locally-switched Ethernet and
uses this to queue and mark the WMM values associated with frames destined to a given user across the
RF link.
The WLAN QoS profile is applied both for upstream and downstream packets. For downstream, if an
802.1p value that is higher than the default WLAN value is received, the default WLAN value is used.
For upstream, if the client sends a WMM value that is higher than the default WLAN value, the default
WLAN value is used. For non-WMM traffic, there is no CoS marking on the client frames from the AP.
For more information see Chapter 5, “Cisco Unified Wireless QoS, AVC and ATF.”
Note Cisco strongly recommends that appropriate queuing/policing mechanisms be implemented across the
WAN to ensure proper handling of traffic based on its DSCP setting. An appropriate priority queue
should be reserved for CAPWAP control traffic to ensure that a FlexConnect AP does not inadvertently
cycle between connected and standalone modes because of congestion.
FlexConnect Solution
The FlexConnect solution enables you to:
• Centralize control and management traffic.
• Distribute the client data traffic at each Branch Office.
• Ensure traffic flow is going to its final destination in the most efficient manner.
Note These authentication restrictions do not apply to clients whose data traffic is distributed at the branch.
Table 7-2 Layer 3 Security Support for Centrally and Locally Switched Users
WAN
Deployment Bandwidth WAN RTT APs per Clients per
Type (Min) Latency (Max) Branch (Max) Branch (Max)
Data 64 kbps 300 ms 5 25
Data 640 kbps 300 ms 50 1000
Data 1.44 Mbps 1 sec 50 1000
Data + Voice 128 kbps 100 ms 5 25
Data + Voice 1.44 Mbps 100 ms 50 1000
Data + Flex 75 Kbps 300 ms 5 25
AVC
FlexConnect Groups
Because all of the FlexConnect APs at each branch site are part of a single FlexConnect Group,
FlexConnect Groups ease the organization of each branch site.
To increase the resiliency of the branch, administrators can configure a primary backup RADIUS server
or both a primary and secondary backup RADIUS server. These servers are used only when the
FlexConnect AP is not connected to the controller.
For additional configuration details please see the Controller Configuration Guide.
Step 10 Repeat Step 7 and Step 8 to add all of the APs to this FlexConnect Group Store 1.
Note Maintaining 1:1 ratio between the AP-Group and FlexConnect group simplifies network management.
Step 11 Navigate to Local Authentication > Protocols tabs and then check the Enable LEAP Authentication
check box.
Step 12 Click Apply.
Note If you have a backup controller, make sure the FlexConnect groups are identical and AP MAC address
entries are included per FlexConnect group.
Step 14 Set the UserName, Password and Confirm Password fields, and then click Add to create user entry in
the LEAP server residing on the AP.
Step 15 Repeat Step 13 until your local username list is exhausted. You cannot configure or add more than 100
users.
Step 16 Click Apply after entering all local user information. The user count is verified.
Note Local Authentication is supported only for FlexConnect with Local Switching. Always make sure to
create the FlexConnect Group before enabling Local Authentication under WLAN
Local Authentication
Figure 7-8 illustrates clients continuing to perform 802.1X authentication even after the FlexConnect
Branch APs lose connectivity with the controller. As long as the RADIUS/ACS server is reachable from
the Branch site, wireless clients will continue to authenticate and access wireless services.
In other words, if the RADIUS/ACS is located inside the Branch, then clients will authenticate and
access wireless services even during a WAN outage.
• Configure Local Backup RADIUS server to increase the resiliency of the branch taking into
consideration failures at the WAN, WLC failures, and failures at the RADIUS server.
• This feature is also used for remote offices where the WAN latency to the central site is high.
• Administrators can configure a primary backup RADIUS server or both the primary and secondary
backup RADIUS server. FlexConnect AP in standalone mode can be configured to perform full
802.1X authentication to a backup RADIUS server.
• These servers are used when the FlexConnect AP is not connected to the controller or when the
WLAN is configured for local authentication.
• If the RADIUS/ACS is located inside the branch, then the clients will authenticate and access
wireless services even during a WAN outage.
Note When configuring local backup RADIUS server, note the following limitation: When a local backup
RADIUS server is used in the branch, the IP addresses of all the APs acting as authenticators must be
added on the RADIUS server.
Note The Local Authentication feature can be used in conjunction with the FlexConnect backup RADIUS
server feature. If a FlexConnect Group is configured with both backup RADIUS server and local
authentication, the FlexConnect AP always attempts to authenticate clients using the primary backup
RADIUS server first, followed by the secondary backup RADIUS server (if the primary is not
reachable), and finally, the Local EAP Server on FlexConnect AP itself (if the primary and secondary
are not reachable).
Local EAP
You can configure the controller to allow a FlexConnect AP in standalone or connected mode to perform
LEAP or EAP-FAST authentication for up to 100 statically configured users. The controller sends the
static list of user names and passwords to each FlexConnect AP of that particular FlexConnect Group
when it joins the controller. Each AP in the group authenticates its own associated clients.
This feature is ideal for customers who are migrating from a standalone AP network to a lightweight
FlexConnect AP network and are not interested in maintaining a large user database or adding another
hardware device to replace the RADIUS server functionality available in the standalone AP.
The FlexConnect APs need to obtain the CCKM/OKC cache information for all the clients that might
associate so that they can process it quickly instead of sending it back to the controller.
• If the VLAN is returned as one of the AAA attributes and that VLAN is not present in the
FlexConnect AP database, traffic will switch centrally. If that VLAN is also not present on the WLC,
the client will be assigned a VLAN/Interface mapped to a WLAN on the WLC.
• If the VLAN is returned as one of the AAA attributes and that VLAN is present in the FlexConnect
AP database, traffic will switch locally.
• If the VLAN is not returned from the AAA server, the client is assigned a WLAN mapped VLAN
on that FlexConnect AP and traffic is switched locally.
Traffic flow on WLANs configured for Local Switching when FlexConnect APs are in standalone mode
are as follows:
• If the VLAN returned by the AAA server is not present in the FlexConnect AP database, the client
will be put on a default VLAN (that is, a WLAN mapped VLAN on a FlexConnect AP). When the
AP connects back, this client is de-authenticated and will switch traffic centrally.
• If the VLAN returned by the AAA server is present in the FlexConnect AP database, the client is
placed into a returned VLAN and traffic will switch locally.
• If the VLAN is not returned from the AAA server, the client is assigned a WLAN mapped VLAN
on that FlexConnect AP and traffic will switch locally.
FlexConnect ACL
With the introduction of ACLs on FlexConnect, there is a mechanism to cater to the need of access
control at the FlexConnect AP for protection and integrity of locally-switched data traffic from the AP.
FlexConnect ACLs are created on the WLC and should then be configured with the VLAN present on
the FlexConnect AP or FlexConnect group using VLAN-ACL mapping, which will be for AAA override
VLANs. These are then pushed to the AP.
FlexConnect ACL can be created with rules in order to permit all of the devices present at the local
site/network. When packets from a wireless client on the Corporate SSID match the rules in the
FlexConnect ACL configured on OEAP, that traffic is switched locally and the rest of the traffic (that is,
implicit deny traffic) will switch centrally over CAPWAP.
The Split Tunneling solution assumes that the subnet/VLAN associated with a client in the central site
is not present in the local site (that is, traffic for clients that receive an IP address from the subnet present
on the central site will not be able to switch locally).
The Split Tunneling functionality is designed to switch traffic locally for subnets that belong to the local
site in order to avoid WAN bandwidth consumption. Traffic that matches the FlexConnect ACL rules are
switched locally, and NAT operation is performed changing the client’s source IP address to the
FlexConnect AP’s interface IP address that is route-able at the local site/network.
Fault Tolerance
FlexConnect fault tolerance allows wireless access and services to branch clients when the FlexConnect
Branch APs:
• Lose connectivity with the primary controller.
• Are switching to the secondary controller.
• Are re-establishing connection to the primary controller.
FlexConnect fault tolerance, along with the local EAP, provides zero branch downtime during a network
outage. This feature is enabled by default and cannot be disabled. It requires no configuration on the
controller or AP. However, to ensure fault tolerance works smoothly and is applicable, these criteria
should be maintained:
• WLAN ordering and configurations have to be identical across the primary and backup controllers.
• VLAN mapping has to be identical across the primary and backup controllers.
• Mobility domain name has to be identical across the primary and backup controllers.
• Use FlexConnect 7500 as both the primary and backup controllers.
Peer-to-Peer Blocking
Peer-to-peer (P2P) blocking is supported for clients associated on local switching WLAN. Per WLAN,
peer-to-peer configuration is pushed by the controller to the FlexConnect AP. P2P blocking can be
configured on a WLAN with any of these three actions:
• Disabled—Disables P2P blocking and bridged traffic locally, within the controller, for clients in the
same subnet. This is the default value.
• Drop—This causes the controller to discard packets for clients in the same subnet.
• Forward Up-Stream—This forwards a packet on the upstream VLAN. The devices above the
controller decide what action to take regarding the packet.
P2P Summary
• P2P Blocking is configured per WLAN.
• Per WLAN, P2P blocking configuration is pushed by the WLC to FlexConnect APs.
• P2P blocking action configured as drop or upstream-forward on a WLAN is treated as P2P blocking
enabled on the FlexConnect AP.
P2P Limitations
• In FlexConnect solution, P2P blocking configuration cannot be applied only to a particular
FlexConnect.
• AP or subset of APs. It is applied to all FlexConnect APs that broadcast the SSID.
• Unified solution for central switching clients supports P2P upstream-forward. However, this is not
supported in the FlexConnect solution. This is treated as P2P drop, and client packets are dropped
instead of forwarded to the next network node.
• Unified solution for central switching clients supports P2P blocking for clients associated to
different APs. However, this solution targets only clients connected to the same AP. FlexConnect
ACLs can be used as a work around for this limitation.
This feature recompenses the drawbacks that degrade the video delivery as the video streams and clients
scale in a branch network. VideoStream makes video multicast to wireless clients more reliable and
facilitates better usage of wireless bandwidth in the branch.
• The primary and secondary controllers for a FlexConnect AP must have the same configuration.
Otherwise, the AP might lose its configuration, and certain features (such as WLAN overrides,
VLANs, static channel number, and so on) may not operate as expected. In addition, make sure to
duplicate the SSID of the FlexConnect AP and its index number on both controllers.
• Client connections are restored only for locally-switched clients that are in the RUN state when the
AP moves from standalone mode to connected mode. After the AP moves from the standalone mode
to the connected mode, the AP’s radio is also reset.
• Session time-out and re-authentication are performed when the AP establishes a connection to the
controller.
• If a session timer expires, the client user name, current/support rate, and listen interval values are
reset to the default values. When the client connection is re-established, the controller does not
restore the client’s original attributes.
• Multiple FlexConnect groups can be defined in a single location. There is no deployment restriction
on the number of FlexConnect APs per location.
• In FlexConnect mode, the AP can receive multicast packets only in unicast form.
• FlexConnect APs support a 1-1 network address translation (NAT) configuration and a port address
translation (PAT) for all features except true multicast. Multicast is supported across NAT
boundaries when configured using the unicast option. FlexConnect APs also support a many-to-one
NAT/PAT boundary, except when you want true multicast to operate for all centrally-switched
WLANs.
Note Although NAT and PAT are supported for FlexConnect APs, they are not supported on the corresponding
controller. Cisco does not support configurations in which the controller is behind a NAT/PAT boundary.
• VPN and PPTP are supported for locally-switched traffic if these security types are accessible
locally at the AP.
• NAC out-of-band integration is supported only on WLANs configured for FlexConnect central
switching. It is not supported on WLANs configured for FlexConnect local switching.
• Workgroup bridges and universal workgroup bridges are supported on FlexConnect APs for
locally-switched clients.
• FlexConnect APs do not support client load balancing.
• FlexConnect supports IPv6 clients by bridging the traffic to a local VLAN, similar to IPv4 operation.
• FlexConnect does not support IPv6 ACLs, neighbor discovery caching, or DHCPv6 snooping of
IPv6 NDP packets.
• FlexConnect APs with locally-switched WLANs cannot perform IP Source Guard and prevent ARP
spoofing. For centrally-switched WLANs, the wireless controller performs the IP Source Guard and
ARP Spoofing. To prevent ARP spoofing attacks in FlexConnect APs with local switching, Cisco
recommends you to use ARP inspection.
The services offered by the network can classified into two protocols:
• 802.11u MSAP
• 802.11u Hotspot 2.0
Starting from AireOS code 8.5 Passpoint on 11ac Wave-2 AP (1800 series, 2800 & 3800) can be
enabled. It is not just feature parity of Wave-1 AP, but updating technology to the latest Passpoint 2.0.
Cisco APs now provides pervasive support of Passpoint certification and interoperability all across AP
models. WLC supports Passpoint 2.0 since AireOS 8.2 code and in 8.5 Cisco added Wave-2 AP supports.
Also, Mobility Express running 8.5 also gets Passpoint 2.0 feature.
This chapter provides design and deployment guidelines for the deployment of secure enterprise,
campus, and metropolitan Wi-Fi networks within the Cisco Wireless Mesh Networking solution, a
component of the Cisco Unified Wireless Network solution.
Note For more detailed information about Cisco Wireless Mesh Networking, including configuration and
deployment, refer to the Cisco Mesh Access Points, Design and Deployment Guide, Release 8.5.
Mesh networking employs Cisco Aironet 1500 Series outdoor mesh access points (APs) and indoor mesh
APs along with the Cisco Wireless LAN Controller (WLC), and Cisco Prime Infrastructure to provide
scalable, central management and mobility between indoor and outdoor deployments. The Control and
Provisioning of Wireless Access Points (CAPWAP) protocol manages the connection of the mesh APs
to the network.
End-to-end security within the mesh network is- supported by employing Advanced Encryption
Standard (AES) encryption between the wireless mesh access points and Wi-Fi Protected Access 2
(WPA2) clients. This document also outlines radio frequency (RF) components to consider when
designing an outdoor network.
The features described in this chapter are for the following products:
• Cisco Aironet 1570 (1572) series outdoor mesh access points
• Cisco Aironet 1560 (1562) series outdoor mesh access points
• Cisco Aironet 1540 (1542) Series outdoor mesh access points
• Cisco Aironet 1550 (1552) series outdoor mesh access points
• Cisco Aironet 1530 series outdoor mesh access points
• Cisco Aironet 1600, 2600, 3600, 3500, 1700, 2700 and 3700 series indoor mesh access points
• Mesh features in Cisco Wireless LAN Controller
• Mesh features in Cisco Prime Infrastructure
Note All access points are configured and shipped as mesh access points. To use an access point as a root
access point, you must reconfigure the mesh access point to a root access point. In all mesh networks,
ensure that there is at least one root access point.
While the RAPs have wired connections to their controller, the MAPs have wireless connections to their
controller.
MAPs communicate among themselves and back to the RAP using wireless connections over the
802.11a/n radio backhaul. MAPs use the Cisco Adaptive Wireless Path Protocol (AWPP) to determine
the best path through the other mesh access points to the controller.
Bridge mode access points support CleanAir in mesh backhaul at 5GHz frequency and provides only the
interference device report (IDR) and Air Quality Index (AQI) reports.
Note The RAP or MAP does not generate Bridge Protocol Data Unit (BPDU) itself. However, the RAP or
MAP forwards the BPDU to upstream devices if the RAP or MAP received the BPDU from its connected
wired or wireless interface across the network.
Figure 8-1 shows the relationship between RAPs and MAPs in a mesh network.
Network Access
Wireless mesh networks can simultaneously carry two different traffic types. They are as follows:
• Wireless LAN client traffic
• MAP Ethernet port traffic
Wireless LAN client traffic terminates on the controller, and the Ethernet traffic terminates on the
Ethernet ports of the mesh access points.
Access to the wireless LAN mesh for mesh access points is managed by the following authentication
methods:
• MAC authentication—Mesh access points are added to a database that can be referenced to ensure
they are provided access to a given controller and mesh network.
• External RADIUS Authentication—Mesh access points can be externally authorized using a
RADIUS server such as Cisco ACS (4.1 and later) or ISE 2.X that supports the client authentication
type of Extensible Authentication Protocol-FAST (EAP-FAST) with certificates.
Network Segmentation
Membership to the wireless LAN mesh network for mesh access points is controlled by the bridge group
names (BGNs). Mesh access points can be placed in similar bridge groups to manage membership or
provide network segmentation.
Note The Cisco 1040 Series, 1140 Series, and 1260 Series access points have feature parity with
CiscoWireless Release 8.0. Features introduced in Cisco Wireless Release 8.1 and later are notsupported
on these access points.
Note For more information about controller software support for access points, see the Cisco Wireless
Solutions Software Compatibility Matrix at
http://www.cisco.com/en/US/docs/wireless/controller/5500/tech_notes/
Wireless_Software_Compatibility_Matrix.html.
Enterprise 11n/ac mesh is an enhancement added to the CUWN feature to work with the 802.11n/ac
access points. Enterprise 11ac mesh features are compatible with non-802.11ac mesh but adds higher
backhaul and client access speeds. The 802.11ac indoor access points are two-radio Wi-Fi infrastructure
devices for select indoor deployments. One radio can be used for local (client) access for the access point
and the other radio can be configured for wireless backhaul. The backhaul is supported only on the
5-GHz radio. If Universal Backhaul Access is enabled, the 5-GHz radio can be used for local (client)
access as well as a backhaul.
Enterprise 11ac mesh supports P2P, P2MP, and mesh types of architectures.
You have a choice of ordering indoor access points directly into the bridge mode, so that these access
points can be used directly as mesh access points. If you have these access points in a local mode
(non-mesh), then you have to connect these access points to the controller and change the AP mode to
the bridge mode (mesh). This scenario can become cumbersome particularly if the volume of the access
points being deployed is large and if the access points are already deployed in the local mode for a
traditional non-mesh wireless coverage.
.The Cisco indoor mesh access points are equipped with the following two simultaneously operating
radios:
• From rel 8.2 2.4 GHz radio used for data backhaul and client access if UBA is enable
• 5-GHz radio used for data backhaul and client access if Universal Backhaul Access is enabled
The 5-GHz radio supports the 5.15 GHz, 5.25 GHz, 5.47 GHz, and 5.8 GHz bands.
in each office. The FlexConnect mode can switch client data traffic locally and perform client
authentication locally when the connection to the controller is lost. When connected to the
controller, the FlexConnect mode can also tunnel traffic back to the controller.
• Monitor mode—In this mode, the AP radios are in the receive state. The AP scans all the channels
every 12 seconds for rogue client beacons, noise floor measurements, interference, IDS events, and
CleanAir intruders.
• Rogue Detector mode—In this mode, the AP radio is turned off, and the AP listens only to the wired
traffic. The controller passes the APs that are configured as rogue detectors as well as lists of
suspected rogue clients and AP MAC addresses. The rogue detector listens for ARP packets and can
be connected to all broadcast domains through a trunk link.
• Sniffer mode—In this mode, the AP captures and forwards all packets on a channel to a remote
device that decodes the packets with packet analyzer software such as Wireshark.
• Bridge mode—In this mode, the AP is configured to build a wireless mesh network where wired
network cabling is not available.
• Flex+Bridge mode—In this mode, both the Flexconnect and Bridge mode configuration options are
available on the access point.
Note You can configure these modes using both the GUI and CLI. For configuration instructions, see the Cisco
Wireless LAN Controller Configuration Guide. Cisco Wireless Mesh Access Points, Design and
Deployment Guide, Release 8.5
Note MAPs can only be configured in Bridge / Flex+Bridge mode regardless of their wired or wireless
backhaul. If the MAPs have a wired backhaul, you must change their AP role to RAP before you change
the AP Mode.
For complete details and specification of all models of outdoor Mesh AP please visit this links
below:https://www.cisco.com/c/en/us/products/wireless/outdoor-wireless/index.html?stickynav=1
Frequency Bands
Both the 2.4-GHz and 5-GHz frequency bands are supported on the indoor and outdoor access points.
All 1500 series Mesh APs support Channel Bands as indicated below.
U-NII-1
This band can now be used indoors and outdoors
Maximum power is increased to 30 dBm (1 Watt) assuming antenna is 6 dBi
Power should be reduced by 1 dB for every dB antenna gain exceeds 6 dBi
When used outdoors, EIRP power in the upwards direction above 30 degrees is limited to 125 mW (20.9
dBm)
U-NII-2A and U-NII2C
Must include Dynamic Frequency Selection (DFS) radar detection
Terminal Doppler Weather Radar (TWDR) bands (channels 120, 124 & 128) are now available with new
DFS test requirements
U-NII-3
Band extended from 5825 MHz to 5850 MHz
Europe
U-NII-1
23 dBm Maximum - Not permitted for outdoor usage
U-NII-2A
23 dBm Maximum - Not permitted for outdoor usage
U-NII-2C
30 dBm Maximum
U-NII-3
Only available in UK at 23 dBm for Indoor usage only
Previously, devices employing radar operated in frequency subbands without other competing services.
However, controlling regulatory bodies are attempting to open and share these bands with new services
like wireless mesh LANs (IEEE 802.11).
To protect existing radar services, the regulatory bodies require that devices wishing to share the newly
opened frequency subband behave in accordance with the Dynamic Frequency Selection (DFS) protocol.
DFS dictates that to be compliant, a radio device must be capable of detecting the presence of radar
signals. When a radio detects a radar signal, it is required to stop transmitting to for at least 30 minutes
to protect that service. The radio then selects a different channel to transmit on but only after monitoring
it. If no radar is detected on the projected channel for at least one minute, then the new radio service
device may begin transmissions on that channel.
The AP performs a DFS scan on the new DFS channel for 60 seconds. However, if a neighboring AP is
already using that new DFS channel, the AP does not perform the DFS scan.
The process for a radio to detect and identify a radar signal is a complicated task that sometimes leads
to incorrect detects. Incorrect radar detections can occur due to a large number of factors, including due
to uncertainties of the RF environment and the ability of the access point to reliably detect actual
on-channel radar.
The 802.11h standard addresses DFS and Transmit Power Control (TPC) as it relates to the 5-GHz band.
Use DFS to avoid interference with radar and TPC to avoid interference with satellite feeder links.
Antennas
Overview
Antenna choice is a vital component of any wireless network deployment. There are two broad types of
antennas:
• Directional
• Omni-directional
Each type of antenna has a specific use and is most beneficial in specific types of deployments. Because
antennas distribute RF signal in large lobed coverage areas determined by antenna design, successful
coverage is heavily reliant on antenna choice.
An antenna gives a mesh access point three fundamental properties: gain, directivity, and polarization:
• Gain—A measure of the increase in power. Gain is the amount of increase in energy that an antenna
adds to an RF signal.
• Directivity—The shape of the transmission pattern. If the gain of the antenna increases, the coverage
area decreases. The coverage area or radiation pattern is measured in degrees. These angles are
measured in degrees and are called beam-widths.
Note Beamwidth is defined as a measure of the ability of an antenna to focus radio signal energy
toward a particular direction in space. Beamwidth is usually expressed in degrees HB
?(Horizontal Beamwidth); usually, the most important one is expressed in a VB (Vertical
Beamwidth) (up and down) radiation pattern. When viewing an antenna plot or pattern, the angle
is usually measured at half-power (3 dB) points of the main lobe when referenced to the peak
effective radiated power of the main lobe.
Note An 8-dBi antenna transmits with a horizontal beamwidth of 360 degrees, causing the radio waves
to disperse power in all directions. Therefore, radio waves from an 8-dBi antenna do not go
nearly as far as those radio waves sent from a 14-dBi patch antenna (or a third-party dish) that
has a more narrow beamwidth (less than 360 degrees).
• Polarization—The orientation of the electric field of the electromagnetic wave through space.
Antennas can be polarized either horizontally or vertically, though other kinds of polarization are
available. Both antennas in a link must have the same polarization to avoid an additional unwanted
loss of signal. To improve the performance, an antenna can sometimes be rotated to alter
polarization, which reduces interference. A vertical polarization is preferable for sending RF waves
down concrete canyons, and horizontal polarization is generally more preferable for wide area
distribution. Polarization can also be harnessed to optimize for RF bleed-over when reducing RF
energy to adjacent structures is important. Most omni-directional antennas ship with vertical
polarization by default.
Antenna Options
A wide variety of antennas are available to provide flexibility when you deploy the mesh access points
over various terrains. 5 GHz is used as a backhaul and 2.4 GHz is used for client access.
See the Cisco Aironet Antenna and Accessories Reference Guide on Cisco antennas and accessories.
The deployment and design, limitations and capabilities, and basic theories of antennas as well as
installation scenarios, regulatory information, and technical specifications are addressed in detail.
You can use third-party antennas with AP1500s. However, note the following:
• Cisco does not track or maintain information about the quality, performance, or reliability of the
non-certified antennas and cables.
• RF connectivity and compliance is the customer's responsibility.
• Compliance is only guaranteed with Cisco antennas or antennas that are of the same design and gain
as Cisco antennas.
• Cisco Technical Assistance Center (TAC) has no training or customer history with regard to non
Cisco antennas and cables.
With the Prime Infrastructure, network administrators have a solution for RF prediction, policy
provisioning, network optimization, troubleshooting, user tracking, security monitoring, and wireless
LAN systems management. Graphical interfaces make wireless LAN deployment and operations simple
and cost-effective. Detailed trending and analysis reports make the Prime Infrastructure vital to ongoing
network operations.
The Prime Infrastructure runs on a server platform with an embedded database, which provides
scalability that allows hundreds of controllers and thousands of Cisco mesh access points to be managed.
Controllers can be located on the same LAN as the Prime Infrastructure, on separate routed subnets, or
across a wide-area connection.
Architecture
Note CAPWAP significantly reduces capital expenditures (CapEx) and operational expenses (OpEx), which
enables the Cisco wireless mesh networking solution to be a cost-effective and secure deployment option
in enterprise, campus, and metropolitan networks.
Step 1 A mesh access point establishes a link before starting CAPWAP discovery, whereas a non-mesh access
point starts CAPWAP discovery using a static IP for the mesh access point, if any.
Step 2 The mesh access point initiates CAPWAP discovery using a static IP for the mesh access point on the
Layer 3 network or searches the network for its assigned primary, secondary, or tertiary controller. A
maximum of 10 attempts are made to connect.
Note The mesh access point searches a list of controllers configured on the access point (primed)
during setup.
Step 3 If Step 2 fails after 10 attempts, the mesh access point falls back to DHCP and attempts to connect in 10
tries.
Step 4 If both Step 2 and Step 3 fail and there is no successful CAPWAP connection to a controller, then the
mesh access point falls back to LWAPP.
Step 5 If there is no discovery after attempting Step 2, Step 3, and Step 4, the mesh access point tries the next
link.
Table 8-1
Access Points
1550 (64 1550 (128
MB) MB) 1570 3700 1530 1540 1560
Features
Basic Mesh Yes Yes Yes Yes Yes Yes 8.4
Flex+Mesh Yes Yes Yes Yes Yes No No
Fast No 8.3 8.3 Yes 8.3 No 8.4
Convergence
(background
scanning)
Wired Clients Yes Yes Yes No Yes No No
on RAP
Wired Clients Yes Yes Yes No Yes No 8.4
on MAP
Daisy Chain 7.6 7.6 7.6 No 7.6 No No
LSC Yes Yes Yes Yes Yes No No
PSK 8.2 8.2 8.2 8.2 8.2 8.5 8.4
provisioning:
MAP-RAP
authentication
ATF on Mesh No 8.4 8.4 8.4 No No No
Note COS based APs or Wave-2 APs do not support ATF in the rel 8.5.
For more details and ATF configuration steps see Mesh Deployment Guide rel 8.5
https://www.cisco.com/c/en/us/td/docs/wireless/technology/mesh/8-5/b_mesh_85.html
Traffic Flow
The traffic flow within the wireless mesh can be divided into three components:
• Overlay CAPWAP traffic that flows within a standard CAPWAP access point deployment; that is,
CAPWAP traffic between the CAPWAP access point and the CAPWAP controller.
• Wireless mesh data frame flow.
• AWPP exchanges.
As the CAPWAP model is well known and the AWPP is a proprietary protocol, only the wireless mesh
data flow is described. The key to the wireless mesh data flow is the address fields of the 802.11 frames
being sent between mesh access points.
An 802.11 data frame can use up to four address fields: receiver, transmitter, destination, and source.
The standard frame from a WLAN client to an AP uses only three of these address fields because the
transmitter address and the source address are the same. However, in a WLAN bridging network, all four
address fields are used because the source of the frame might not be the transmitter of the frame, because
the frame might have been generated by a device behind the transmitter.
Figure 8-3 shows an example of this type of framing. The source address of the frame is MAP:03:70, the
destination address of this frame is the controller (the mesh network is operating in Layer 2 mode), the
transmitter address is MAP:D5:60, and the receiver address is RAP:03:40.
As this frame is sent, the transmitter and receiver addresses change on a hop-by-hop basis. AWPP is used
to determine the receiver address at each hop. The transmitter address is known because it is the current
mesh access point. The source and destination addresses are the same over the entire path.
If the RAP's controller connection is Layer 3, the destination address for the frame is the default gateway
MAC address, because the MAP has already encapsulated the CAPWAP in the IP packet to send it to the
controller, and is using the standard IP behavior of using ARP to find the MAC address of the default
gateway.
Each mesh access point within the mesh forms an CAPWAP session with a controller. WLAN traffic is
encapsulated inside CAPWAP and is mapped to a VLAN interface on the controller. Bridged Ethernet
traffic can be passed from each Ethernet interface on the mesh network and does not have to be mapped
to an interface on the controller (see Figure 8-4.)
AWPP follows this process in selecting parents for a RAP or MAP with a radio backhaul:
• A list of channels with neighbors is generated by passive scanning in the scan state, which is a subset
of all backhaul channels.
• The channels with neighbors are sought by actively scanning in the seek state and the backhaul
channel is changed to the channel with the best neighbor.
• The parent is set to the best neighbor and the parent-child handshake is completed in the seek state.
• Parent maintenance and optimization occurs in the maintain state.
This algorithm is run at startup and whenever a parent is lost and no other potential parent exists, and is
usually followed by CAPWAP network and controller discovery. All neighbor protocol frames carry the
channel information.
Parent maintenance occurs by the child node sending a directed NEIGHBOR_REQUEST to the parent
and the parent responding with a NEIGHBOR_RESPONSE.
Parent optimization and refresh occurs by the child node sending a NEIGHBOR_REQUEST broadcast
on the same channel on which its parent resides, and by evaluating all responses from neighboring nodes
on the channel.
A parent mesh access point provides the best path back to a RAP. AWPP uses Ease to determine the best
path. Ease can be considered the opposite of cost, and the preferred path is the path with the higher ease.
Ease Calculation
Ease is calculated using the SNR and hop value of each neighbor, and applying a multiplier based on
various SNR thresholds. The purpose of this multiplier is to apply a spreading function to the SNRs that
reflects various link qualities.
Figure 8-6 shows the parent path selection where MAP2 prefers the path through MAP1 because the
adjusted ease value (436906) though this path is greater then the ease value (262144) of the direct path
from MAP2 to RAP.
Parent Decision
A parent mesh access point is chosen by using the adjusted ease, which is the ease of each neighbor
divided by the number of hops to the RAP:
adjusted ease = min (ease at each hop) Hop count
SNR Smoothing
One of the challenges in WLAN routing is the ephemeral nature of RF, which must be considered when
analyzing an optimal path and deciding when a change in path is required. The SNR on a given RF link
can change substantially from moment to moment, and changing route paths based on these fluctuations
results in an unstable network, with severely degraded performance. To effectively capture the
underlying SNR but remove moment-to-moment fluctuations, a smoothing function is applied that
provides an adjusted SNR.
In evaluating potential neighbors against the current parent, the parent is given 20 percent of bonus-ease
on top of the parent's calculated ease, to reduce the ping-pong effect between parents. A potential parent
must be significantly better for a child to make a switch. Parent switching is transparent to CAPWAP
and other higher-layer functions.
Loop Prevention
To ensure that routing loops are not created, AWPP discards any route that contains its own MAC
address. That is, routing information apart from hop information contains the MAC address of each hop
to the RAP; therefore, a mesh access point can easily detect and discard routes that loop.
Note This implementation of BG scanning will be applicable to Marvell-based APs. Specifically, AP1550,
AP1560, AP1570 and IW3702.
A child MAP maintains its uplink with its parent using AWPP - Neighbor Discovery Request/Response
(NDReq/NDResp) messages which are acting as keep-alives. If there are consecutive losses of NDResp
messages, a parent is declared to be lost and the child MAP tries to find its new parent. A MAP maintains
a list of neighbors of current on-channel, and on losing its current parent, it will try roaming to next best
potential neighbor in the same serving channel. But if there are no other neighbors found in same
channel, it has to do scan/seek across all/subset channels to find a parent.
Each off-channel list node will have a neighbor list managing all neighbors heard in that channel. Upon
each off-channel NDReq broadcasts, the neighbors will be updated with latest SNR values based on their
NDResp packets. A misscount parameter will indicate the number of times a neighbor did not respond
to off-channel scan attempt . Each adjacency neighbor will have its adjusted Ease updated after every
BG Scan cycle with latest linkSNR value.
This feature tries to avoid finding a parent across other channels by scan/seek which are time consuming,
but keeps the child MAP updated with all the neighbors across all channels and will help just 'switching'
to a neighbor of any channel and use him as its next parent for its uplink. This 'switching' parent
procedure need not be a triggered event like parent loss detection, but also on identifying a better parent
using 'Auto parent selection algorithm' when the child MAP still has its current parent uplink active. The
" Auto Parent selection algorithm" is based on the new "ease" values. For better convergence calculation
in rel 8.3 a new "Ease" value introduced for smoother and faster parent or neighbor finding and auto
parent connection algorithm. The Ease value is based on SNR, number of Hops, Timers and load values.
For the off-channel neighbors the AdjustedEase value will be used and a best neighbor per off-channel
shall be identified based on its highest AdjustedEase value. StickyEase shall be applicable only for
on-channel parent.
A child MAP will switch between optimal parents based on periodic evaluation of best neighbors across
all off-channels. Best next parent is identified with highest adjustedEase value of another off-channel
neighbor compared to current on-channel parent's stickyEase.
Table below illustrates the new convergence times based on different convergence configuration options.
With the implementation of the latest CCN and Background scan features and fast convergence the First
Hop MAP can achieve a 3 to 4 sec convergence.
Table 8-2
Wireless Backhaul
In a Cisco wireless backhaul network, traffic can be bridged between MAPs and RAPs. This traffic can
be from wired devices that are being bridged by the wireless mesh or CAPWAP traffic from the mesh
APs. This traffic is always AES encrypted when it crosses a wireless mesh link such as a wireless
backhaul.
AES encryption is established as part of the mesh AP neighbor relationship with other mesh APs. The
encryption keys used between mesh APs are derived during the EAP authentication process.
Universal Access
You can configure the backhaul on mesh APs to accept client traffic over its 802.11a radio. This feature
is identified as Backhaul Client Access in the controller GUI (Monitor > Wireless). When this feature
is disabled, backhaul traffic is transmitted only over the 802.11a or 802.11a/n radio and client
association is allowed only over the 802.11b/g or 802.11b/g/n radio. For more information about the
configuration, see Configuring Advanced Features.
For security reasons the Ethernet port on the MAPs is disabled by default. It can be enabled only by
configuring Ethernet bridging on the Root and the respective MAPs. To enable Ethernet bridging using
the controller GUI, choose Wireless > All APs > Details for the AP page, click the Mesh tab, and then
select the Ethernet Bridging check box.
Note The overall throughput of backhaul radio decreases by half for each hop of a mesh tree. When the
Ethernet-bridged clients are used in MAPs and heavy traffic is passed, it may result in a high throughput
consumption, which may cause the downlink MAPs to disassociate from the network due to throughput
starvation.
For security reasons the Ethernet port on the MAPs is disabled by default. It can be enabled only by
configuring Ethernet bridging on the Root and the respective MAPs. To enable Ethernet bridging using
the controller GUI, choose Wireless > All APs > Details from the AP page, click the Mesh tab, and then
check the Ethernet Bridging check box.
Ethernet bridging has to be enabled for the following two scenarios:
• When you want to use the mesh nodes as bridges.
• When you want to connect Ethernet devices such as a video camera on the MAP using its Ethernet
port.
Ensure that you enable Ethernet bridging for every parent mesh AP taking the path from the mesh AP in
question to the controller. For example, if you enable Ethernet bridging on MAP2 in Hop 2, then you
must also enable Ethernet bridging on MAP1 (parent MAP), and on the RAP connecting to the controller.
To configure range parameters for longer links, choose Wireless > Mesh. Optimum distance (in feet)
should exist between the root AP (RAP) and the farthest mesh AP (MAP). Range from the RAP bridge
to the MAP bridge has to be mentioned in feet.
The following global parameter applies to all mesh APs when they join the controller and all existing
mesh APs in the network:
• Range: 150 to 132,000 feet
• Default: 12,000 feet
ClientLink Technology
Many networks still support a mix of 802.11a/g and 802.11n clients. Because 802.11a/g clients (legacy
clients) operate at lower data rates, the older clients can reduce the capacity of the entire network.
Cisco ClientLink technology can help to solve problems related to adoption of 802.11n in mixed-client
networks by ensuring that 802.11a/g clients operate at the best possible rates, especially when they are
near cell boundaries.
Advanced signal processing has been added to the Wi-Fi chipset. Multiple transmit antennas are used to
focus transmissions in the direction of the 802.11a/g client, increasing the downlink signal-to-noise ratio
and the data rate over range, thereby reducing coverage holes and enhancing the overall system
performance. This technology learns the optimum way to combine the signal received from a client and
then uses this information to send packets in an optimum way back to the client. This technique is also
Controller Planning
The following items affect the number of controllers required in a mesh network:
• Mesh APs (RAPs and MAPs) in the network.
• The wired network that connects the RAP and controllers can affect the total number of APs
supported in the network. If this network allows the controllers to be equally available to all APs
without any impact on WLAN performance, the APs can be evenly distributed across all controllers
for maximum efficiency. If this is not the case, and controllers are grouped into various clusters or
PoPs, the overall number of APs and coverage are reduced.
• Number of mesh APs (RAPs and MAPs) supported per controller.
For clarity, non-mesh APs are referred to as local APs in this document.
Note Mesh is fully supported on all above mentioned Cisco Controllers. The Base License (LIC-CT508-Base)
is sufficient for indoor and outdoor APs. The WPlus License (LIC-WPLUS-SW) is merged with the base
license. The WPlus License is not required for indoor mesh APs.
In summary, a 5-GHz antenna isolation determines mesh AP spacing requirements and antenna
proximity must be followed and is dependent upon the adjacent and alternate adjacent channel usage.
CleanAir
The 1550 series leverages 802.11n technology with integrated radio and internal/external antennas. The
1550 series APs are based on the same chipset as the present CleanAir capable Aironet 3600 and 3700
APs. In other words, the 1550 series APs are capable of doing CleanAir.
With the 7.3.101.0 Release, 2600 series APs can mesh with each other and can also provide CleanAir
functionality.
With the 7.2.103.0 Release, 3600 series APs can mesh with each other and can also provide CleanAir
functionality.
With the 7.0.116.0 Release, 3500 series APs can mesh with each other and can also provide CleanAir
functionality.
CleanAir in mesh (1552, 2600, 2700, 3500, 3600 and 3700) can be implemented on the 2.4-GHz radio
and provides clients complete 802.11n data rates while detecting, locating, classifying, and mitigating
radio frequency (RF) interference. This provides a carrier class management and customer experience
and ensures that you have control over the spectrum in the deployed location. CleanAir enabled RRM
technology on the outdoor 11n platform detects, quantifies, and mitigates Wi-Fi and non-Wi-Fi
interference on 2.4-GHz radios. AP1552 supports CleanAir in 2.4 GHz client access mode.
CleanAir Advisor
If CleanAir is enabled on a backhaul radio, CleanAir Advisor is activated. CleanAir Advisor generates
Air Quality Index (AQI) and Interferer Detection Reports (IDR) but the reports are only displayed in the
controller. No action is taken through event driven RRM (ED-RRM). CleanAir Advisor is only present
on the 5-GHz backhaul radio of APs in bridge mode.
Multiple Controllers
The consideration in distance of the CAPWAP controllers from other CAPWAP controllers in the
mobility group, and the distance of the CAPWAP controllers from the RAP, is similar to the
consideration of an CAPWAP WLAN deployment in an enterprise.
There are operational advantages to centralizing CAPWAP controllers, and these advantages need to be
traded off against the speed and capacity of the links to the CAPWAP APs and the traffic profile of the
WLAN clients using these mesh APs.
If the WLAN client traffic is expected to be focused on particular sites, such as the Internet or a data
center, centralizing the controllers at the same sites as these traffic focal points gives the operational
advantages without sacrificing traffic efficiency.
If the WLAN client traffic is more peer-to-peer, a distributed controller model might be a better fit. It is
likely that a majority of the WLAN traffic are clients in the area, with a smaller amount of traffic going
to other locations. Given that many peer-to-peer applications can be sensitive to delay and packet loss,
you should ensure that traffic between peers takes the most efficient path.
Given that most deployments see a mix of client-server traffic and peer-to peer traffic, it is likely that a
hybrid model of CAPWAP controller placement is used, where points of presence (PoPs) are created
with clusters of controllers placed in strategic locations in the network.
The CAPWAP model used in the wireless mesh network is designed for campus networks; that is, it
expects a high-speed, low-latency network between the CAPWAP mesh APs and the CAPWAP
controller.
Figure 8-8 Two RAPs per Cell with the Same Channel
Multiple RAPs
If multiple RAPs are to be deployed, the purpose for deploying these RAPs needs to be considered. If
the RAPs are being deployed to provide hardware diversity, the additional RAP(s) should be deployed
on the same channel as the primary RAP to minimize the convergence time in a scenario where the mesh
transfers from one RAP to another. When you plan RAP hardware diversity, consider the 32 MAPs per
RAP limitation.
If additional RAPs are deployed to primarily provide additional capacity, then the additional RAPs
should be deployed on a different channel than its neighboring RAP to minimize the interference on the
backhaul channels.
Adding a second RAP on a different channel also reduces the collision domain through channel planning
or through RAP cell splitting. Channel planning allocates different non-overlapping channels to mesh
nodes in the same collision domain to minimize the collision probability. RAP cell splitting is a simple,
yet effective, way to reduce the collision domain. Instead of deploying one RAP with omni-directional
antennas in a mesh network, two or more RAPs with directional antennas can be deployed. These RAPs
collocate with each other and operate on different frequency channels. This process divides a large
collision domain into several smaller ones that operate independently.
If the mesh AP bridging features are being used with multiple RAPs, these RAPs should all be on the
same subnet to ensure that a consistent subnet is provided for bridge clients.
If you build your mesh with multiple RAPs on different subnets, MAP convergence times increase if a
MAP has to fail over to another RAP on a different subnet. One way to limit this process from happening
is to use different BGNs for segments in your network that are separated by subnet boundaries.
Caution The indoor APs in a third-party outdoor enclosure can be deployed for limited outdoor deployments,
such as a simple short haul extension from an indoor WLAN to a hop in a parking lot. The 1240, 1250,
1260, 1700, 2600, 2700, 3500e, 3600 and 3700 APs in an outdoor enclosure is recommended because of
its robust environmental and temperature specifications. Additionally, the indoor APs have connectors
to support articulated antennas when the AP is within an outdoor enclosure. Exercise caution with the
SNR values as they may not scale and long-term fades may take away the links for these APs when
compared to a more optimized outdoor 1500 series AP.
Mobility groups can be shared between outdoor mesh networks and indoor WLAN networks. It is also
possible for a single controller to control indoor and outdoor mesh APs simultaneously. The same
WLANs are broadcast out of both indoor and outdoor mesh APs.
Note When an HSRP configuration is in operation on a mesh network, we recommend that the In-Out
multicast mode be configured. For more details on multicast configuration, refer to the Cisco Mesh
Access Points, Design and Deployment Guide.
This chapter provides additional design considerations for deploying voice over WLAN (VoWLAN)
solutions. WLAN configuration specifics can vary depending on the VoWLAN device being used and
the WLAN design. This chapter provides details about key RF and site survey considerations that are
generally applicable to VoWLAN deployments, which were introduced in .Chapter 3, “WLAN RF
Design Considerations”
Softphone applications are key VoWLAN solutions and they are available on a number of hardware and
operating systems platforms. The Cisco JabberTM, application lets you access presence, instant
messaging (IM), audio, video, voice messaging, desktop sharing, and conferencing. Jabber downloads
for smartphones, tablets, and laptops along with information on design guides for each of the variants
can be referred at Cisco Jabber.
Antenna Considerations
The more demanding network requirements of VoWLAN impacts WLAN planning at all levels,
including the choice of antenna. Key antenna considerations are as follows:
• Access point (AP) antenna selection
• Antenna placement
• Handset antenna characteristics
AP Antenna Selection
Cisco recommends a ceiling-mounted antenna solution for VoWLAN applications. Ceiling mounted
antennas and APs with internal antennas are quick and easy to install. More importantly, they place the
radiating portion of the antenna in open space, which allows the most efficient signal propagation and
reception. Cisco APs with internal antennas offer the easiest installation solution, plus the internal
antennas provide a downward signal propagation pattern that is well suited for the majority of
installations. The internal antenna solution is particularly well suited to the open spaces of enterprise
environments.
Cisco offers a variety of multiple-input and multiple-output (MIMO) dual band, dual radiating element
Omni-directional and Directional (patch style) antennas. These multiple element antennas are designed
to take advantage of IEEE 802.11n and .11ac technologies such as Maximum Ratio Combining (MRC)
and unique Cisco performance features such as ClientLink. These technologies combine client phone
packets, (as they are captured on the multiple antennas of the APs) into a single, combined signal that is
stronger. The combined signal provides a better signal-to-noise ratio (SNR) between the phone's
transmitted packet and the general 2.4 or 5 GHz band noise. An important feature of MRC is that it
reduces the upstream packet error rate. Cisco APs use the multiple antennas and 802.11 ClientLink logic
to deliver a higher energy packet to the client phone, which reduces the downstream packet error rate.
These two features improve the mean opinion score (MOS) value of individual VoWLAN calls and the
overall capacity of the Wi-Fi channel of the APs.
Cisco recommends that all antennas be placed 1 to 2 wavelengths away from highly reflective surfaces
such as metal. The length of the 2.4 GHz waves is 4.92 inches (12.5 cm), and the length of the 5 GHz
waves is 2.36 inches (6 cm). The separation of one or more wavelengths between the antenna and
reflective surfaces allows the AP radio a better opportunity to receive a transmission and reduces the
creation of nulls when the radio transmits. Orthogonal frequency-division multiplexing (OFDM), used
by the 802.11g/n and 802.11a/n/ac specifications, helps to mitigate problems with reflections, nulls, and
multipath. However, good antenna placement and the use of the appropriate antenna types provide a
superior solution. The ceiling tile itself is a good absorber of signals transmitted into the area above the
ceiling and reflected back into the coverage area.
For information on MRC, see the IEEE Report.
For more information on ClientLink, refer the following:
• Cisco Wireless ClientLink 3.0 Technology
• Cisco Aironet 3700 Series White Paper
Antennas come in a variety of types and form factors; no single type is best for all applications and
locations. For additional information on the performance and part numbers of various antenna types, see
the Cisco Aironet Antennas and Accessories Reference Guide.
Cisco recommends using the Cisco Aironet dipole dual band AIR-ANT2524D series antenna when
attaching dipole antennas to an AP with dual (2.4 GHz and 5 GHz) band support from the same external
antenna port.
The Aironet dipole dual band antennas provide the advantages of:
• Support for simultaneous 2.4 and 5 GHz dual band transmission and reception (the same as the dual
band omni and patch antennas). The gain on the Aironet dipole dual band antennas is 2.2 dBi for the
2.4 GHz band and 4 dBi for the 5 GHz band.
• Being small and coming in neutral colors of black, grey and white.
• Having an articulating and rotating base.
Antenna Orientation
Cisco recommends that, for APs with multiple antennas, all the antennas be oriented in the same
direction.
Note While APs are often depicted in marketing material showing the antennas arranged in multiple
directions, as shown in Figure 9-1, Cisco does not recommended this practice.
The best MRC and ClientLink performance is obtained when all antennas of an AP are arranged in the
same orientation, as shown in Figure 9-2.
Having all four antennas of the AP in a flat, straight out position increases the overall throughput of the
coverage cell by 2 Mbps when using single spatial stream 802.11n smartphones.
General Recommendations
Cisco recommends for optimum Wi-Fi coverage cell bandwidth and client application performance (for
dipole antenna types of all forms) that:
• Each AP antenna port be populated with an antenna.
• Each port must have the same antenna model.
• Each antenna has the same orientation.
The APs and the protocols they operate with are designed around MRC and ClientLink. Use an antenna
system that follows these recommendations to capitalize on that technology and your AP hardware
investment.
Higher gain antennas may spread the signal further on the horizontal plane, which creates a larger cell
that could also pick up additional noise. This results in a lower SNR that increases the packet error ratio.
SNR is defined by the following criteria:
• Signal—The radiated energy transmitted from one radio that can be received uninterrupted by
another radio. For Wi-Fi this means that the transmitting radio is sending 802.11 protocol packets
that the receiving radio is able to decode.
• Noise—Transmitted energy in the frequency range of the receiving radio that cannot be decoded by
that radio.
The larger the difference in energy between the protocol packet and the background noise, the better the
reception of the protocol packet and the lower the packet error rate and bit error rate. Coverage area
design involves using channels to create the lowest possible packet error rate while maintaining a high
audio call capacity.
Higher gain antennas can also reduce the number of calls on a Wi-Fi channel because of the increased
coverage area. For audio, a ceiling-mounted antenna is preferred over a wall-mounted patch because the
human head and body attenuate 5 dB of the signal (see Figure 9-3). Ceiling mounted antennas are better
positioned to avoid more of this head and body attenuation than most wall-mounted antennas.
Antenna Positioning
Ceiling-mounted antennas typically have better signal paths to handheld phones. The recommended
coverage cell size takes into consideration the signal loss because of the attenuation of human heads and
other obstacles. It is important to understand that the gain of antennas is reciprocal; gain applies equally
to reception and transmission. Antenna gain is not an increase in transmitted power because the radio
produces the transmitted power. The antenna is only a passive device. Gain is derived by focusing the
signal of the radio into a direction, plane, and beam width, much in the same way a flashlight reflector
focuses the light emanating from its bulb.
For further information on WLAN RF planning, see Chapter 3, “WLAN RF Design Considerations”.
Handset Antennas
For phones that integrate the antenna inside the body of the phone, the way the user holds the phone in
their hand can influence signal attenuation by 4 dB. In some cases, a phone held against the head with
the hand covering the antenna can result in a signal drop of 9 dB. The general rule for indoor
deployments is that every 9 dB of signal loss reduces the coverage area in half. Figure 9-3 shows an
example of the difference in radiating power from a handset when held to the head.
The typical smartphone and tablet computer have a Wi-Fi antenna system with negative dB gain. The
typical smartphone antenna is -3 or -4 dBi. The typical laptop has a positive gain from 0 to 2 dBi. This
difference in antenna gain reflects in a difference in coverage range between smartphones, tablets and
laptops at the same AP. For a smartphone or tablet to obtain the best application performance, the AP
channel coverage should be designed to the Wi-Fi capabilities of the smartphones or tablets themselves.
To provide optimum link quality between the smartphone, tablet or laptop and the AP, the AP should
operate with ClientLink enabled. ClientLink is enabled by default with the Cisco wireless LAN
controller (WLC).
Channel Utilization
The 802.11, 802.11b, 802.11n-2.4 GHz and 802.11n protocol specifications use the same 2.4 GHz band
and therefore they must be able to interoperate with each other. This interoperability introduces
additional 802.11 protection protocol logic overhead that reduces channel throughput. Many sites
already have devices using the Wi-Fi frequencies of the 2.4 GHz band, but there are a number of foreign
devices that can use these same frequencies. These foreign devices include Bluetooth, cordless phones,
video game controllers, surveillance cameras, and even microwave ovens. Because the 2.4 GHz band is
so crowded, and coupled with constraints on its channel allocation, Cisco recommends using the 5 GHz
Wi-Fi band for new VoWLAN deployments. The channels available in the 5 GHz band are generally not
as heavily used at most sites (see Figure 9-4). It is important to note that use of the 5 GHz UNII-2
channels for VoWLAN traffic requires the absence of radar. Cisco therefore recommends that there
should be additional testing at any new site to determine whether a particular UNII-2 channel should be
configured to be blocked. The reason is that if an AP detects radar on a channel during normal use, it
must leave that channel until the radar signal is no longer present.
Before the installation of a Cisco Unified Wireless Network, the site can be tested for channel
interference and utilization with tools from AirMagnet, Wild Packets, Cognio, and others. To aid in the
design process, the AP On-Demand Statistics Display report generated by the Cisco Prime Infrastructure
provides a spectrum review of:
• Client count versus RSSI
• Client count versus SNR
• Channel utilization
The ALOHAnet protocol defines a radio channel as full when channel utilization reaches 33 percent.
This means the channel is busy enough that packets must wait for an open time slot before they are
transmitted. The 46 percent channel utilization, as shown in Figure 9-4, is above the channel utilization
wireless packetized Aloha standard.
To reduce channel utilization in the 2.4 GHz band, Cisco recommends moving clients to 5 GHz and
removing the legacy 1 Mbps and 2 Mbps data rates from the 2.4 GHz configuration when legacy devices
are not part of the client makeup.
Note See the Cisco website for current compliance information and also check with your local regulatory
authority to find out what is permitted within your country.
A channel-based design can be implemented horizontally on a single floor, as shown in Figure 9-5.
In a multi-floor design, the channels can be separated vertically between floors to reduce the possibility
of co-channel interference, as shown in Figure 9-6.
Call Capacity
The number of calls on a Wi-Fi channel is limited by a number of factors. First, the RF spectrum used
by the AP and VoWLAN clients cannot be shielded from electromagnetic interference as shielded
twisted-pair CAT 5 cable can. The closest Wi-Fi comes to segmentation is channel separation. The open,
shared RF spectrum of 802.11 creates the possibility for high packet loss. Most of the packet loss is
addressed through retransmission of 802.11 frames, which in turn causes jitter. Figure 9-7 illustrates the
packet loss relationship as a mean opinion score (MOS).
In the 802.11ac specification as well as in 802.11n-2.4 GHz, the highest coverage range is achieved by
the lowest data rate, which is 6 Mbps. For any given power level the lowest packet error rate is also 6
Mbps.
An acceptable coverage area for audio is an area that maintains a packet error rate of 5 percent or less.
The MOS scores are ranked as follows:
• 4.4—Highest MOS score
• 4.3-4.0—Very satisfied to Satisfied
• 4.0-3.6—Some users satisfied
Figure 9-7 above shows that a packet error rate of 5 percent reduces the MOS to a level of Some users
satisfied quality of speech.
The coverage area edge for a phone is the point in the coverage area that lowers the MOS rating to the
Very satisfied category. This coverage area edge is referred to as a cell edge in this design guide. A cell
edge with a 1 percent packet error rate is needed for audio because of the likelihood of multiple phone
clients, data clients, co-channel interference, and other un-accounted for interferers. Cell edge and
coverage design are defined in detail in other sections of this chapter.
If 802.11 and 802.11b are not required to support legacy 2.4 GHz Wi-Fi clients, Cisco recommends
disabling the data rates of 1, 2, 5.5, and 11 MHz.
If these rates are disabled, one or more 802.11n-2.4 GHz data rates must be set to required. Cisco
recommends that the 6 MHz data rate be set to required, but this depends on the cell size design
requirements, which might require using a higher bit rate. If possible, an 802.11n-2.4 GHz-only network
is recommended rather than a combined 802.11b/g network. Most data clients and phone clients
recognize the data rates advertised by the AP in its beacons and probe response. Therefore, clients send
their management, control, multicast, and broadcast packets at the required data rates as advertised by
the AP, while they can send their unicast packets at any of the data rates advertised by the AP. Generally,
unicast packets are sent at a data rate that provides the highest reliable rate for the link between the AP
and client. Cisco APs are capable of sending unicast packets at a data rate that is unique for each
ClientLink.
SNR is an important consideration for packet reception. The receiving radio is either the AP radio or the
phone radio. The SNR is not likely to be the same at both radios of the link. SNR and multipath
interference must be considered at the AP and at the cell edge. Path loss can be assumed to be the same
at both ends of the link.
Cisco recommends that for audio applications the cell edge be determined by using the actual phone at
the desired data rate. The audio packets sent between the AP and the phone in Wi-Fi applications are
generally unicast real-time transport protocol (RTP) G.711 packets with a typical size of 236 bytes. The
RTP packet is based on UDP and IP protocols, and therefore RTP is connectionless. The signal strength,
SNR, data rate, and error rates of the phone call can be seen from the AP statistics, either on the
autonomous AP or the controller-based CAPWAP AP.
Cisco also recommends that coverage testing be done with active calls. The two-way call provides the
downstream (AP to client) packet size and the unicast packet type for ClientLink. The upstream (client
to AP) provides the packets size and unicast packet type for MRC processing on the AP. When doing the
client cell edge range testing, Cisco recommends testing a combination of smartphone, tablet and laptop
models to the same AP from the same location and that the same square feet of space be used for all
clients. This then means that the phones are not tested simultaneously because they could not all share
the same space.
Figure 9-8 shows a sample of the client cell edge dBm values of a phone for 2.4 GHz and 5 GHz.
Figure 9-9 shows a decoded audio G.711 RTP packet. The packet, which originated on a Cisco 7960 desk
phone, is downstream from the AP to a VoWLAN end-point. The over-the-air QoS marking is changed
from the QoS baseline marking of 5 to a user priority of 6, which follows the 802.11e specification. Call
statistics on the Cisco phone can be viewed on the phone or by browsing into the phone using the IP
address of the phone. After that the cell edge dBm value can then be the benchmark value for tools that
are better suited for surveying. A automated survey tool will expedite the coverage design of the site.
When multipath interference is present at a location where signal level measurements are being taken, it
is quite likely that the reported values will fluctuate from packet to packet. A packet can be as much as
5 dB higher or lower than the previous packet. It may take several minutes to obtain an average value for
a given measurement location.
AP Call Capacity
A key part of the planning process for a VoWLAN deployment is to plan the number of simultaneous
audio streams per AP.
Note A call between two phones associated to the same AP is considered as two active audio streams.
When planning the audio stream capacity of the AP, consider the following points:
• The utilization of an unlicensed (shared) 802.11 channel is the real determinant for the number of
simultaneous audio streams an AP can carry.
• Because the channel utilization and AP performance determine the number of audio streams, same
channel and next channel separation are very important. Two APs in the same location, operating on
the same channel, do not provide twice the number of audio streams. In fact, there can be fewer
audio streams than a single AP would provide.
• Cell capacity or bandwidth determines the number of audio streams that can be simultaneously
conducted.
• The QoS features supported in the handsets and VoWLAN deployment should be considered.
• Various handsets have different WLAN QoS features and capabilities that impact the features that
are enabled in the WLAN deployment, and ultimately determine the per-AP audio call capacity of
the AP. Most VoWLAN handsets provide guidance on the number of calls per AP supported by that
phone; this should be considered a best-case figure for situations where the handset is able to use its
optimal QoS features and has full access to the channel capacity.
The actual number of audio streams a channel can support is highly dependent on a number of issues,
including environmental factors and client compliance to Wi-Fi Multimedia (WMM).
The Table 9-1 in lists how Cisco Compatible Extensions benefit VoWLAN call quality.
The 802.11e, WMM, and Cisco Compatible Extension specifications help balance and prevent the
overloading of a cell with audio streams. CAC determines whether there is enough channel capacity to
start a call; if not, the phone can scan for another channel. The primary benefit of U-ASPD is the
preservation of WLAN client power by allowing the transmission of frames from the WLAN client to
trigger the forwarding of client data frames that are being buffered at the AP for power saving purposes.
The Neighbor List option provides the phone with a list that includes channel numbers and channel
capacity of neighboring APs. This is done to improve audio call quality, provide faster roams, and
improve battery life.
Note The -86 dBm separations shown in Figure 9-10 are simplified and are considered ideal. It is not likely
that this 19 dBm of separation can be achieved in most deployments. The most important RF design
criteria are the -67 dBm cell radius and the 20 percent recommended overlap between cells. Designing
to these constraints optimizes channel separation.
For 5 GHz cells, there is less concern about same channel separation because of the number of available
non-overlapping channels. There are 20 channels in the 802.11ac 5 GHz band so a two-channel
separation is almost always possible. In contrast, the 2.4 GHz band has only three channels that do not
overlap in frequency.
For both the 5 GHz and 2.4 GHz bands the cell edge must be at the floor level where a packet error rate
of 1 percent is maintained at the highest data rate desired for a given channel. The data rate is 72 Mbps
for an 802.11n on 2.4 GHz with a one spatial stream client.
The data rate is 150 Mbps for an 802.11n client on the 5 GHz band with a 40 MHz wide channel and
with a one spatial stream client. A laptop running a softphone application such as Jabber can support
three spatial streams and have a date rate to 450 Mbps on a 5 GHz, 40 MHz wide channel. Both an
802.11ac client and an 802.11n client that is only 20 MHz wide and supporting one spatial stream can
share Wi-Fi channel access on a 40 MHz wide channel with an 802.11ac three spatial stream client on a
80 MHz wide channel.
This type of client mixture and protocol mixture is part of the 802.11 specification. The compatibility
for this type of client mixture on the same Wi-Fi frequencies is part of the 802.11n and 802.11ac
specifications.
The major design question is how to define the coverage area for bandwidth and call capacity. Audio call
capacity is about the same for 802.11n and 802.11ac as it was for 802.11n-2.4 GHz and 802.11ac. This
is because of the packet size of the audio G.711 or G.722 frame, which with AES encryption is less than
300 bytes. The small packet size and the ACK logic of the 802.11 specification creates a large overhead
compared to large streaming applications. A video call generates both small audio packets and large
video packets. The video packets are highly compressed and therefore spaced out in comparison to the
audio. Cisco recommends as a guideline to establish the cell edge of coverage. Measure the distance
from the AP that the phone is when the RSSI value of phone on the AP is -67 dBm.
802.11n-2.4 GHz and 802.11ac phone clients can be capable of rates up to 54 Mbps. Current chip sets
support many rates, but transmit power capabilities differ. Cisco highly recommends that all links
between phone clients and APs be established using matching transmit power levels (see Dynamic
Transmit Power Control).
Coverage cells can be created for specific data rates. For a high density deployment or a deployment
where a large number of calls are required within a small floor space, 802.11ac is recommended because
of the number of channels and the 54 Mbps data rate. The lower data rates in 802.11ac can be disabled,
the 24 Mbps data rate can be set to required, while the 36 to 54 Mbps data rates can be left enabled.
After setting the cell edge of -67 dBm, determine where the error rate of 1 percent occurs, and then
examine the SNR value.
The -67 dBm cell edge can be determined as follows:
• Set the phone to its desired transmit power.
• Set the AP to a matching transmit power.
• Place the AP and the desired antenna in the location where the phone will be used.
• With an active call, or while sending and receiving packets equal in size to the G711 codec, measure
the signal level out to the -67 dBm cell edge.
Carefully examine the data sheets of the particular phone device to determine the transmit power levels
and data rates supported by the phone device in a particular Wi-Fi band. For more information, refer the
Data Sheets for Cisco Unified Wireless IP Phones.
The 2.4 GHz maximum transmit power levels vary on different channels and with different AP models.
The 5 GHz maximum transmit power levels vary by model. The Cisco Aironet AP data sheets should be
carefully reviewed to determine which AP model supports which data rates. Figure 9-11 shows an
example of the maximum 5 GHz transmit power in dBm by channel.
The maximum permissible transmit power across the 5 GHz band varies by as much as 6 dB. This means
that when using the maximum allowed transmit power throughout a site that allows all channels, there
will not be equal cell coverage on all channels. It also means that if dynamic channel selection is used,
the cell coverage edge can change based on the channel number. However, dynamic channel selection
can be tuned. The default mode of dynamic channel selection accounts for the difference of maximum
transmit power level by channel.
Cell transmit power on all APs should not exceed the maximum or desired transmit power of the phones.
If the phone's maximum or set transmit power is 13 dBm, Cisco recommends that all APs have a
maximum transmit power of 13 dBm. Therefore, the maximum transmit power on the AP should be set
to an equal level or, if that is not possible, the next higher transmit power level. Equal transmit power is
recommended to avoid one-way audio problems. The AP generally has better receiver sensitivity and
diversity support than the phone, so it should be able to receive the slightly lower strength phone signal.
See Dynamic Transmit Power Control for more information on equal transmit powers.
will greatly improve 2.4 GHz coverage balance and reduce co-channel interference. Other than the
flexible nature of the hardware – everything else about dual band AP’s and power advice remains the
same, as you will only apply this to AP’s operating in both 2.4 and 5 GHz bands.
The licensing requirements of 802.11 do not require clients to have a minimum transmit power and few
if any Wi-Fi devices use the maximum transmit powers allowed by regulations. With a typical Wi-Fi
device, the maximum transmit power capability is at or below 100 mW. This is because Wi-Fi
specifications do not require APs and clients to have matching power levels during associated
connections between themselves. There will always be the possibility that for a short period of time,
while associated, they might not be in the coverage range of each other but still be associated. If this
happens during an active call there is a loss of audio. If the transmit power levels are not equal during
an active call then there is audio loss. Several 802.11 mechanisms help to maintain the connection
between the AP and the phone, one being that they can negotiate a slower data rate. Slower data rates
generally have higher transmit powers than higher data rates. The slower data rates should be avoided in
dense deployments. This is because when a coverage cell needs high throughput and capacity, the slower
data rates for the high packet count phone calls lowers the throughput for all clients on that Wi-Fi
channel and AP.
Cisco highly recommends that the maximum configured transmit power on APs be no higher than the
maximum transmit power the client phones support. Because the current Cisco APs support ClientLink,
Cisco highly recommends that ClientLink be configured. ClientLink dynamically creates a directed
signal towards selected clients. The ClientLink logic changes the signal prorogation on directed packets
but not on broadcast or multicast packets. ClientLink removes the typically omni antenna horizontal
signal prorogation with equal signal energy in all directions. Signal energy is increased in the direction
for the selected clients. The directed signal increases the signal energy at the selected client, improving
downstream signal quality at the phone. This improves the MOS value of the call. Improving the MOS
value reduces retries and improves the throughput in the coverage area for all clients. Because this is a
shaped signal that is directed to a specific location, there is reduced signal in the remaining coverage
areas of the AP. This improves the performance of the channel in areas where there is channel overlap
with broadcast and multicast packets with other APs.
Cisco recommends that each model of phone be tested for its Wi-Fi coverage range. The WLC reports
the receive signal strength indicator (RSSI) of each client at the AP to which the phone is associated.
The value shown in the RSSI field is the signal strength of a packet transmitted from the phone to the
AP. The value indicates how strong the packet transmitted by the phone was at when it was received at
the AP. It is recommended to check the coverage range of the phones and that the phones be placed at
the estimated coverage edge of the AP. Then check the RSSI when a phone is on an active call. The goal
is that at the cell edge (recommended -67dBm RSSI) the packets are sent at a high data rate. See
Figure 9-10 for a reference to the cell edge for VoWLAN Wi-Fi coverage area range. The value of -39
shown in the figure is a very strong signal that is seen when the client phone or device is within a few
feet of the AP.
Testing the phone's coverage has become more important with the advent of smartphones and tablets.
Because the Wi-Fi feature sets of these devices are typically for the consumer market, these devices
typically have few 802.11 features that are considered to support enterprise. The consumer orientation
of most smartphones and tablets does not support DTPC. Therefore, Cisco recommends that the
maximum transmit power for 2.4 GHz and 5 GHz be a dBm value that matches the 2.4 GHz and 5 GHz
band maximum transmit power of your weakest smartphone or tablet. This WLC field value limits the
transmit signal power of the APs, thereby helping to maintain a balance in range of the phone to the AP.
improves the decisions made by the client. Additionally, it increases battery life of the device because it
is neither changing the radio configuration for each channel nor sending probe requests on each channel.
This prevents the devices from having to process all of the probe response frames.
The 802.11r and 802.11e specifications both support the same authentication types: EAP-FAST, LEAP,
EAP-TLS, EAP-TTLS, EAP-SIM, and PEAP versions 1 and 2. This security feature allows an
802.11r-enabled client to authenticate securely to an AP in an exchange of only four packets. Two of the
packets are sent over the Ethernet wires that connect the APs to each other. The other two packets are
sent on the Wi-Fi channels of each AP. This allows the 802.11r client to be authenticated securely to the
AP that it is going to roam to before it actually roams. The result is the 802.11r client can be sending
and receiving data, video, and audio packets after the roam without the delay of the authentication
process. Because the 802.11 header is changed by the addition of the 802.11r parameters, the WLAN for
802.11r clients cannot be shared with clients that are not 802.11r-aware. This means that all clients that
have the SSID assigned by the WLAN with 802.11r enabled must have Wi-Fi radio firmware that is
aware of the 802.11r element in association packets. Limitations to 802.11r fast roaming are:
• Is supported on APs in autonomous mode but requires Wireless Domain Services (WDS).
• Roaming between local authentication and central authentication WLAN is not supported.
Cisco recommends that you use the 802.11r specification as it improves roam times because of a
reduction in the number of packets sent over the Wi-Fi channel between a client that is already
authenticated to the WLAN.
Figure 9-13 Signal Pattern in the 802.11b/g 2.4 GHz Spectrum of a Typical Bluetooth Earpiece
In Figure 9-13 the purple line shows the Max Hold, the maximum transmit power that was reached
during the test. The yellow line shows the maximum transmit power in the last sample period of ten
seconds. The turquoise line shows the average transmit power over the period of the test. The vertical
dashed blue lines separate the three non-overlapping 802.11b/g channels (Ch1, Ch6, and Ch11). The
charting is from 2.400 GHz on the left to 2.500 GHz on the right. From the right edge of the Ch11 vertical
blue line is the part of the 802.11 spectrum used in Europe and Japan. This capture was done with the
AP and clients configured for the North American regulatory domain. This graph shows that the
Bluetooth earpiece was easily transmitting outside of FCC regulations.
Notice that the Bluetooth signal is very narrow. Bluetooth transmits data on a single MHz of frequency,
stops the transmission, moves to another frequency in the 802.11 2.4 GHz band, and then transmits data.
This is repeated continually. The 802.11b and 802.11n-2.4 GHz signals are sent with a combined 22
MHz of frequency. The radio remains on that 22 MHz of frequency. This grouping of 22 MHz is referred
to as the channel. The Max Hold line shows how strong the Bluetooth is while in search mode. The signal
level is above that of a 50 mW (17 dBm) OFDM 802.11n-2.4 GHz radio. A signal of this strength and
duration causes 802.11b/g phones to drop the VoWLAN call. Lesser strength Bluetooth signals cause
jitter, resulting in a lower MOS value. Figure 9-14 shows an example of an Ethereal jitter analysis of
three simultaneous phone calls, each using a Bluetooth earpiece.
All three calls were on the same AP and were to three other phones also on the same AP. For information
on interference with Wi-Fi and Bluetooth, see the IEEE Report.
The factors that affect the impairments introduced to a Bluetooth TDM packet when colliding with Wi-Fi
OFDM include:
• Relative power
• Bandwidth
• Mutual overlap
• Number of colliding OFDM signals
Simulations were performed on the effects of interference between a sample Wi-Fi OFDM packet and
Bluetooth signals, as shown in Figure 9-15. The figure shows the Normal GMSK Bluetooth undistorted
signal TDM characteristics. On the left is frequency versus time (MHz), and on the right is I/Q
amplitudes.
As shown above in the Figure 9-15, the 625-second long hopping Bluetooth packet can interfere with
more than one OFDM packet at a time, especially whenever high-rate OFDM mode packets (where the
length of the packet is much shorter than that of Bluetooth) are subject to the collision.
The introduction of wireless LAN (WLAN) technologies in the enterprise has changed the way
corporations and small-to-medium businesses function by freeing staff and network resources from the
constraints of fixed network connectivity.
WLAN has also changed how individuals access the Internet and their corporate networks from public
locations. The advent of public WLAN hotspots has caused mobile workers to become accustomed to
being able to access their corporate network from practically anywhere.
Introduction
The paradigm of public access has extended to the enterprise itself. Our highly mobile,
information-on-demand culture requires on-demand network connectivity. For this reason, enterprise
guest access services are becoming increasingly important and a necessity in the corporate environment.
While there is broad recognition that guest networking is becoming increasingly important, there is also
well-founded apprehension over how to safeguard internal corporate information and infrastructure
assets. When implemented correctly, an enterprise that implements a guest access solution will most
likely improve their overall security posture as a result of the network audits associated with the
implementation process.
In addition to overall improved security, implementing a guest access network offers these additional
general benefits.
• Authentication and authorization control of guests based on variables including date, duration, and
bandwidth.
• An audit mechanism to track who is currently using, or has used, the network.
Additional benefits of a wireless-based guest access include the following:
• It provides wider coverage by including areas such as lobbies and other common areas that
otherwise might not have been wired for network connectivity.
• It removes the need for designated guest access areas or rooms.
Scope
Several architectures can be implemented to offer guest access in the enterprise. It is not the goal of this
chapter to cover all possible solutions. Instead, this chapter focuses on the implementation of wireless
guest networking using the Cisco Unified Wireless Network solution. For more information on
deploying wired and wireless Guest Access services in other topology scenarios, see:
Network Virtualization--Guest and Partner Access Deployment Guide
As illustrated in Figure 10-1 the anchor controller is located in the enterprise DMZ where it performs an
"anchor" function. The anchor controller is responsible for terminating EoIP tunnels that originate from
other campus controller throughout the network. These "foreign" controllers are responsible for
termination, management, and standard operation of the various WLANs provisioned throughout the
enterprise, including one or more guest WLANs. Guest WLANs are transported via an EoIP tunnel to
the anchor controller. Specifically, guest WLAN data frames are encapsulated using CAPWAP from the
AP to the foreign controller and then encapsulated in EoIP from the foreign management system to a
guest VLAN defined on the anchor WLC. In this way, guest user traffic is forwarded to the Internet
transparently, with no visibility by, or interaction with, other traffic in the enterprise.
Supported Platforms
The anchor function, which includes tunnel termination, web authentication, and access control is
supported on the following WLC platforms (using version 8.1 or later):
• WLC 2504
• WLC 3504
• WLC 5508
• WLC 5520
• WiSM-2
• WLC 8510
• WLC 8540
The following WLC platforms cannot be used for anchor functions, but can be used for standard
controller deployments and guest mobility tunnel origination (foreign WLC) to a designated anchor
controller(s):
• Virtual WLC
Figure 10-3 shows a sniffer trace of an Ethernet in IP tunnel (highlighted) between a foreign controller
with a guest WLAN provisioned and an anchor controller that is performing local web authentication.
The first IP detail shown represents the Ethernet in IP tunnel between the foreign and anchor controllers.
The second IP detail is that of guest traffic (in this case, a DNS query).
For the best possible performance and because of its suggested positioning in the network, it is strongly
recommended that the guest anchor controller be dedicated to supporting guest access functions only. In
other words, the anchor controller should not be used to support guest access in addition to controlling
and managing other CAPWAP APs in the enterprise.
DHCP Services
As previously described, guest traffic is transported at Layer 2 via EoIP. Therefore, the first point at
which DHCP services can be implemented is either locally on the anchor controller or the controller can
relay client DHCP requests to an external server. See Guest Access Configuration, for configuration
examples.
Routing
Guest traffic egress occurs at the anchor controller. Guest WLANs are mapped to a dynamic
interface/VLAN on the anchor. Depending on the topology, this interface might connect to an interface
on a firewall, or directly to an Internet border router. Therefore, a client's default gateway IP is either
that of the firewall or the address of a VLAN/interface on the first hop router. For ingress routing, it is
assumed the guest VLAN is directly connected to a DMZ interface on a firewall or to an interface on a
border router. In either case, the guest (VLAN) subnet is known as a directly connected network and
advertised accordingly.
Figure 10-4 Guest Access Topology with Guest Anchor N+1 Redundancy
Note Multicast traffic is not supported over guest tunnels, even if multicast is enabled on the Cisco
Unified Wireless Network.
You can configure a priority to the guest anchor when you configure a WLAN. Priority values range from
1 (high) to 3 (low) or primary, secondary or tertiary and defined priority is displayed with guest anchor.
Only one priority value is allowed per anchor WLC. Selection of guest anchor is round-robin based on
a single priority value. If a guest anchor is down, the fallback would be on guest anchors with equal
priority. If all guest anchors with same priority value are down, the selection would be on a round-robin
basis on next highest priority and so on. Default priority value is 3. If WLC is upgraded to Release 8.1,
it will be marked with priority 3. Priority configurations are retained across reboots. The priority
configuration would be synchronized on HA pair for seamless switchover. Same set of rules apply in
determining the anchor WLC regardless of IPv4 and/or IPv6 addressing. That is, highest priority value
is determinant and not addressing including dual stack case.
Restrictions
• No hard limit on the number of times a priority value is used.
• Feature applies only to wireless and "old" mobility model.
• Maximum supported anchor per WLAN is 24 (same as maximum anchor per WLAN in releases
prior to 8.1).
• Downgrading from Release 8.1 would void this feature since it is not supported on earlier images.
• If a guest anchor with higher priority comes up, the existing connections will not shift to the new
high priority anchor and only the new connections will go to it.
• This feature is applicable when all internal and anchor WLCs are using Release 8.1.
• There should not be a local address with priority of zero at the Internal/Foreign controller. Priority
0 in the output indicates a local IP address. For example at the anchor WLC on DMZ with tunnel
termination.
Deployment Considerations
• Priority configuration should only be done on foreign controller WLAN. On the mobility list if you
are seeing value zero and non-zero that means the same controller is acting as Anchor for few
WLANs and foreign controller for few WLAN, if you have WLC in DMZ and there is no APs
connected to it, then we should not see any non-zero priority for any of its WLANs, as this should
be the terminating point for all the clients on the network.
• Ideally we should not see priority zero on foreign WLC and non-zero on anchor WLC. Example:
10.10.10.10(Site A) and 20.20.20.20(Site B) should not have any priority with zero and DMZ
controller 172.10.10.10(Site A) and 172.20.20.20(Site B) should not have any priority with non-zero
values.
• Here priority values zero is not configurable when we select the controller own IP Address as
anchor. It will automatically set the priority zero if controller own IP address is selected as anchor.
Examples
• Local anchor WLCs may be grouped together with higher priority value than group of remote anchor
WLCs.
• Guest client traffic goes to Anchor WLC(s) that is/are local to internal WLC rather than remote
one(s) due to having higher priority value.
• Guest client traffic will be load balanced in round-robin across local anchor WLCs since local
anchors have same priority value.
• If all local anchor WLCs fail then traffic will be load balanced in round-robin across remote anchor
WLC with next priority level.
The web portal page is available on all Cisco WLAN controller platforms and is invoked by default when
a WLAN is configured for Layer 3 web policy-based authentication.
If a more customized page is required, administrators have the option of importing and locally storing a
customized page. Additionally, if an enterprise wants to use an external web server, the controller can
be configured to redirect to it in place of using the internal server. See Guest Access Configuration, for
web page configuration guidelines.
User Redirection
As is typical for most web-based authentication systems, in order for guest clients to be redirected to the
WLC web authentication page, they must launch a web browser session and attempt to open a destination
URL. For redirection to work correctly, the following conditions must be met:
• DNS resolution—The guest access topology must ensure that valid DNS servers are assigned via
DHCP and those DNS servers are reachable to users prior to authentication. When a client associates
to a web policy WLAN for authentication, all traffic is blocked except DHCP and DNS. Therefore,
the DNS servers must be reachable from the anchor controller. Depending on the topology, this
might require opening up conduits through a firewall to permit DNS or modifying ACLs on an
Internet border router.
Note Clients with static DNS configurations might not work depending on whether their configured
DNS servers are reachable from the guest network.
• Resolvable Home Page URL—The home page URL of a guest user must be globally resolvable by
DNS. If a user home page is, for example, an internal company home page that cannot be resolved
outside of their company intranet, that user is not redirected. In this case, the user must open a URL
to a public site such as www.yahoo.com or www.google.com.
• HTTP Port 80—If the home page of a user is resolvable, but connects to a web server on a port other
than port 80, they are not redirected. Again, the user is required to open a URL that uses port 80 to
be redirected to the WLC web authentication page.
Note In addition to port 80, there is an option to configure one additional port number that the controller can
monitor for redirection. The setting is available only through the CLI of the controller:
Note The Lifetime variable associated with guest credentials is independent of the WLAN session timeout
variable. If a user remains connected beyond the WLAN session timeout interval, they are
de-authenticated. The user is then redirected to the web portal and, assuming their credentials have not
expired, must log back in to regain access. To avoid annoying redirects for authentication, the guest
WLAN session timeout variable should be set appropriately.
Note A RADIUS server can still be used to support network user authentication even if the Network User
check box is cleared under the WLC Security > AAA > RADIUS settings. However, to do so, a server
must then be explicitly selected under the Security > AAA Servers settings of a given WLAN.
External Authentication
WLC and the guest account management (lobby ambassador) capabilities can be used only to create and
apply guest user credentials for local authentication on the WLC. However, there may be cases where an
enterprise already has an existing guest management /authentication solution deployed as part of a wired
guest access or NAC solution. If this is the case, the anchor controller/guest WLAN can be configured
to forward web portal authentication to an external RADIUS server, as described in Guest User
Authentication.
The default protocol used by the controller to authenticate web users is Password Authentication
Protocol (PAP). In the event you are authenticating web users to an external AAA server, be sure to
verify the protocols supported by that server. The anchor controller can also be configured to use CHAP
or MD5-CHAP for web authentication. The web auth protocol type is configured under the Controller
configuration settings of the WLC.
External Authentication using ISE or Cisco Secure ACS and Microsoft User Databases
If a guest access deployment is planning to use ISE or a Microsoft user database in conjunction with
Cisco ACS to authenticate guest users, see the following additional Cisco ACS configuration caveats:
Cisco Secure Access Control System
See specifically the following:
Installation and Upgrade Guide for Cisco Secure Access Control System
Active directory integration with ISE:
Active Directory Integration with Cisco ISE
Guest Pass-through
Another variation of wireless guest access is to bypass user authentication altogether and allow open
access. However, an enterprise may still need to present an acceptable use policy or disclaimer page to
users before granting access. If this is the case, then a guest WLAN can be configured for web policy
pass through. In this scenario, a guest user is redirected to a portal page containing disclaimer
information.
Pass through mode also has an option for a user to enter an e-mail address before connecting (see
Figure 10-6 and Figure 10-7 for sample pages). See Guest Access Configuration, for configuration
examples.
The following procedures assume there is already a deployed infrastructure of controllers and LAPs with
the possible exception of the anchor WLC(s). For more information, see Anchor Controller Deployment
Guidelines.
Note Cisco recommends that the configuration steps outlined in this section be followed in the order in which
they are presented.
Note Only the relevant portion of a given configuration screen capture is shown in this section.
The implementation of the Cisco Unified Wireless Network Guest Access solution can be broken into
the following configuration categories:
• Anchor WLC Installation and Interface configuration—This section briefly discusses installation
requirements, steps and caveats associated with implementing one or more anchor WLCs. When
implementing guest access for the first time in an existing Cisco Unified Wireless Network
deployment, the anchor WLC is usually a new platform that is installed at the Internet edge of an
Enterprise network.
• Mobility Group Configuration—This section outlines the parameters that must be configured in
order for the foreign WLCs to be able to initiate EoIP tunnels to one or more guest anchor WLCs.
The mobility group configuration does not itself create the EoIP tunnels, but rather establishes peer
relationships between the foreign and anchor WLCs in order to support a guest access WLAN
service.
• Guest WLAN Configuration—Highlights WLAN specific configuration parameters that are
required to map the guest WLAN (originating from a foreign WLC) to the anchor WLC. It is during
this portion of the guest access solution configuration that EoIP tunnels are created between the
foreign and anchor WLCs. This section also covers the settings required to invoke Layer 3
redirection for web-based authentication.
• Guest Account Management—This section outlines how to configure and apply guest user
credentials locally on the anchor WLC using controllers the anchor WLC's lobby admin interface.
• Other Features and Solution Options—Discusses other features that may be configured including,
but not limited to:
– Web-portal page configuration and management
– Support for external web redirection
– Pre-authentication ACLs
– Anchor WLC DHCP configuration
– External radius authentication
– External access control
Perform the following to define and configure an interface to support guest traffic:
Note Internal DHCP server is not recommended but if DHCP services are to be implemented locally on the
anchor controller, populate the primary DHCP server field with the management IP address of the
controller. Review if internal DHCP server support is present on the controller platform. If guest N+1
redundancy is being implemented in the DMZ, repeat the above interface configuration for each
additional anchor WLC being deployed.
Defining the Default Mobility Domain Name for the Anchor WLC
Configure a default mobility domain name for the anchor WLC. The anchor's mobility domain name
should be different than what is configured for the foreign WLCs. In the examples below, the WLCs
(foreign controllers) associated with the enterprise wireless deployment are all members of mobility
group 'SRND'. The guest anchor WLC on the other hand, is configured with a different mobility group
name: "ANC". This is done to keep the anchor WLC logically separate from the primary mobility
domain associated with the enterprise wireless deployment.
Figure 10-11 Defining a Default Mobility Domain Name on the Anchor WLC
Step 3 Click New to define a MAC and IP address for each foreign controller that will support the guest access
WLAN. (See Figure 10-13.)
Note The "Group Name" in Figure 10-13 above is the name configured under the foreign WLC's 'Default
Mobility Domain Name', which should be different than the name used by the anchor WLC. The member
IP and MAC address are those addresses associated with the management interface of the foreign WLCs.
Repeat the above steps for each additional foreign WLC that will support the guest WLAN. If more than
one anchor is being deployed (guest anchor redundancy), then repeat the steps in Defining the Default
Mobility Domain Name for the Anchor WLC and Defining Mobility Group Members of the Anchor
WLC.
Step 1 Click New to add the anchor WLC's IP, MAC address, and Group Name to the mobility members table.
Step 2 Repeat these steps for each additional foreign controller. (See Figure 10-14.)
Note If guest anchor redundancy capability is being deployed, two or more anchor WLC entries are added to
each foreign WLC's Mobility Group Members list.
Note It is extremely important to note that all parameters defined in the WLAN Security, QoS, and Advanced
settings tabs, must be configured identically in both the anchor and foreign WLC(s). Figure 10-15 shows
a high level diagram illustrating the WLAN configuration discussed below.
Note The parameters defined in the WLAN Security, QoS, and Advanced settings tabs, must be configured
identically in both the anchor and foreign controller(s).
Step 1 Click the WLANs tab and then click New. (See Figure 10-16.)
Step 2 Define an SSID that is intuitive or easily recognized by potential guest users.
The controller automatically assigns a VLAN ID. Administrators have the option of selecting 1 - 16, as
long as the ID is not already in use by another SSID/ WLAN.
Step 3 Define a Profile Name.
Step 4 Click Apply. (See Figure 10-17.)
After creation of the new WLAN, the configuration page appears, as shown in Figure 10-18.
Note The default interface used by the foreign WLC for the guest WLAN is the management interface. If the
EoIP tunnel cannot be established with the anchor, the foreign controller will disassociate any wireless
clients that were previously associated with the unreachable anchor and then assign new clients and
reassociate clients to the interface configured under the guest WLAN of the foreign itself. Therefore, it
is recommended to link the guest WLAN on the foreign to a non-routable network, or alternatively
configure the DHCP server of the management interface with an unreachable IP address. If the anchor
becomes unreachable, this prevents the guest clients to gain access to the management network.
Step 1 Enable the WLAN by clicking the box next to WLAN Status.
Step 2 Optionally, set the radio policy if you wish to restrict which bands support the guest access.
• Broadcast SSID is enabled by default; leave enabled.
• By default, the WLAN is assigned to the "management" interface of the WLC. Do not change this.
Step 3 Click the Security tab. (See Figure 10-19.)
Step 4 Set the Layer 2 Security to none from its default setting (802.1x WPA/WPA2). (See Figure 10-20.)
Step 6 Click the Web Policy check box (a list of additional options will be presented).
A dialog warning box appears, indicating that the WLC will pass DNS traffic to and from clients prior
to authentication.
Step 7 Select Authentication or Pass-through for the web policy. (See Guest User Authentication).
Note A pre-authentication ACL can be used to apply an ACL that allows un-authenticated clients to connect
to specific hosts or URL destinations before authentication. The ACL is configured under Security >
Access Control Lists. If a pre-authentication ACL is used in conjunction with the web auth policy, it must
include a rule to permit DNS requests; otherwise, the client will be unable to resolve and connect to a
destination host/URL that would otherwise be allowed by the ACL.
Step 9 Optionally, set the upstream QoS profile for the guest WLAN. The default is 'Silver (Best Effort)'. In this
example, the guest WLAN has been re-assigned to the lowest QoS class.
Step 10 Click the Advanced tab. (See Figure 10-24.)
Note Any session timeout greater than 0 (default) forces de-authentication after expiration, and requires the
user to re-authenticate through the web portal.
Note Setting DHCP Addr. Assignment to "Required" is recommended to prevent guest users from attempting
to use the guest network using a static IP configurations.
Step 1 From the WLAN menu on the foreign WLC find the newly created guest WLAN.
Step 2 Highlight and click Mobility Anchors from the right-hand pull-down selection list. (See Figure 10-25.)
Step 3 In the Switch IP Address (Anchor) pull-down selection list, select the IP address corresponding to the
management interface of the anchor WLC deployed in the network DMZ. This is the same IP address
configured in Adding the Anchor WLC as a Mobility Group Member of a Foreign WLC.
Step 4 In the Priority field, select a priority number for the anchor WLC (applicable if there are more than one
anchor WLCs configured).
Step 5 Click Mobility Anchor Create. (See Figure 10-27.)
Once configured, the screen shown in Figure 10-28 shows the mobility anchor (selected from above),
assigned to the Guest WLAN.
For ease of verification, the page displays whether or not the mobility tunnel data path and CAPWAP
control path have been established with the anchor. The pull-down selection list to the right offers the
option to send a ping to the destination anchor WLC.
Step 6 When finished, click Back.
Step 7 Repeat the steps above for each additional anchor WLC being deployed (guest anchor redundancy).
This completes the guest WLAN configuration. Repeat all steps from Foreign WLC-Guest WLAN
Configuration through Establishing the Guest WLAN Mobility Anchor(s) for each additional foreign
WLC that will support the guest WLAN.
Note The SSID defined for the guest WLAN must be exactly the same as what is defined on the foreign WLCs.
The second parameter that differs in configuration from the foreign WLC is the WLAN mobility anchor
configuration. The guest WLAN mobility anchor is the anchor WLC itself.
Note The guest WLAN mobility anchor is local. (See Figure 10-31.)
Because the mobility anchor for the guest WLAN is the anchor WLC itself, the Data and Control Path
status will always show "up". If not, check to ensure that you have selected the local WLC as the anchor
from the 'Switch IP Address (Anchor) drop down menu. Anchor controller will always have priority 0
for the ssid.
Step 5 If guest anchor redundancy is being implemented; repeat the WLAN configuration for each additional
anchor WLC being deployed. Otherwise, this completes the configuration steps required to create the
guest WLAN on the anchor WLC.
Note Ensure that the individual WLC configurations are synchronized with the management system before
creating guest templates.
Log in to the management system using the Lobby Ambassador credentials assigned by the system
administrator. (See Figure 10-32.)
Note Cisco Prime Infrastructure was formally known as WCS and NCS.
Step 1 From the pull-down selection list, select Add Guest User and click Go.
Step 2 The template shown in Figure 10-35 appears.
Note As seen in Figure 10-36, there are various options for where the credentials can be applied, including
being able to control the physical/geographic location where a user can access the guest WLAN. These
include outdoor areas, indoor areas, building, floor, and so on. This location-based access method can
only be used if: 1) the WLAN deployment has been integrated into the management system mapping
database, and 2) the guest WLAN (a WLAN with web policy) does not use mobility anchors.
• Description—Enter a description. The description is displayed on the WLC to which the credentials
are applied under Security > Local Net Users. It is also included in the e-mail that can be sent to a
guest informing them of what credentials to use to access the network.
• Disclaimer—Used in the e-mail that can be sent to a guest user informing them of what credentials
to use to access the network.
Step 5 Click Save when finished. The summary screen shown in Figure 10-37 appears, acknowledging that
credentials have been applied to the anchor controller(s). The admin is also presented with an option to
print or e-mail the credentials to the guest user.
Step 6 Click Print/Email Guest User Credentials. The screen shown in Figure 10-38 appears.
Note For details on setting up an SMTP mail server to support e-mailing guest account information to users,
see the Prime Infrastructure Configuration Guide.
After printing and or e-mailing the account details, the screen shown in Figure 10-39 appears. By
clicking the User Name, an admin can go back and edit the guest account or remove it by checking the
box next to the User Name and selecting Delete Guest User from the pull-down selection list.
Note If a user template is deleted from Cisco Prime Infrastructure while a user is active, they are
de-authenticated.
Step 1 From the pull-down selection list, select Schedule Guest User and click Go.
The template shown in Figure 10-41 appears.
Step 2 Under Guest Information, enter a User Name. User names can be up to 24 characters long. When using
the schedule-based template, administrators have the option to allow the system to automatically
generate the user name for each new day that access is being offered. Also, when using this template,
the system automatically generates the user password. There is no option to manually assign a password.
Step 3 Under Account Configuration, select the following:
• Profile—The pull-down selection list displays a list of WLANs (SSIDs) configured with an L3 Web
Policy.
• User Role—They are predefined by the administrator and are associated with the guests' access
(such as contractor, customer, partner, vendor, visitor, and so on).
• Life Time—Select "limited" or "unlimited".
• Start Time—Select the time, month, and day when the account is to become active.
Note The start time cannot begin within the current day that the account is being created. The start
day must be one or more days beyond the day the account is being created.
• End Time—If the account is "limited", select the stop time, month, and day.
Note The stop day can be a period no longer than 30 days from the start day.
• Days of Week—Depending on the lifetime of the account, administrators have the ability to control
for which days of the week access is available. Click the check boxes next to those days of the week
access is permitted.
Note If "Days of the Week" is selected, the start and stop times represent the period within each day
that access is available. Upon expiry within a given day, Cisco Prime Infrastructure removes the
credentials from the applicable controllers. For each new day/interval that access is permitted,
Cisco Prime Infrastructure automatically generates a new password (and optionally a username),
e-mails it to the guest user, and re-applies the new credentials to the applicable WLCs. If "Days
of the Week" is not defined, access begins based on the start day and time and is continuously
active until the end day and time.
• Apply To—From the pull-down selection list, select Controller List and click the check box next
to the controller(s) representing anchor WLCs. Note that there will be other controllers listed;
however, these represent the foreign WLCs. There is no need to apply user credentials on the foreign
WLCs because the authentication enforcement point is the anchor WLC.
Note As seen in Figure 10-42, there are various options for where the credentials can be applied, including
being able to control the physical/geographic location where a user can access the guest WLAN. These
include outdoor areas, indoor areas, building, floor, and so on. This location-based access method can
only be used if: 1) the WLAN deployment has been integrated into the management system mapping
database, and 2) the guest WLAN (a WLAN with web policy) does not use mobility anchors.
• E-mail Credentials to—Enter the e-mail address for whom an account is being established. This is
a mandatory field.
Note An SMTP mail server must be configured in Cisco Prime Infrastructure so that it can use to send
guest account information. For details, see Cisco Wireless System Configuration Guide.
• Description—Enter a description. The description is displayed on the WLC to which the credentials
are applied under Security > Local Net Users. It is also included in the e-mail that can be sent to a
guest informing them of what credentials to use to access the network.
• Disclaimer—Used in the e-mail that can be sent to a guest user informing them of what credentials
to use to access the network.
Step 4 Click Save when finished. The screen shown in Figure 10-43 appears, acknowledging that the scheduled
account has been created. The admin is also presented with an option to print or e-mail the credentials
to the guest user.
Step 5 Optionally, click Print/Email Guest User Credentials. The screen shown in Figure 10-44 appears.
After printing and/or e-mailing the account details, the summary screen shown in Figure 10-45 appears.
By clicking the User Name, an admin can go back and edit the guest account or remove it by checking
the box next to the User Name and selecting Delete Guest User from the pull-down selection list.
Note If a user template is deleted from Cisco Prime Infrastructure while a user is active, they are
de-authenticated.
This completes the steps required to create a guest account using the lobby ambassador interface in Cisco
Prime Infrastructure.
Step 1 Login to the anchor controller using the lobby admin credentials assigned by the system administrator.
Remember that conduits might need to be opened through a firewall to permit HTTP/HTTPS for web
administration of the controller. See Anchor Controller Positioning.
After login, the screen shown in Figure 10-46 appears.
Step 2 In the left pane, click User Login Policies under AAA.
Step 3 Configure the maximum number of concurrent user logins (between 0-8).
Step 4 Click Apply.
You can download a customized web page and store it locally on the anchor controller. To import a
customized web page, perform the following steps.
To use a customized web auth page that has been downloaded to the controller, perform the following
steps:
Figure 10-54 Web Certificate Security Alert (Firefox 39.0 and Safari)
At this point, you can proceed by either clicking Yes or you can select View Certificate and manually
install it as a trusted site. The web server uses the virtual interface IP address configured in Anchor WLC
Installation and Interface Configuration, as its source address. If a hostname is defined along with the IP
address, that host name must be resolvable by DNS so that:
• The client is redirected to the web auth page.
• The user does not encounter a web certificate error because of conflicts between hostname and host
IP address.
For cases where a legitimate web certificate issued by a trusted root CA is required, one can be
downloaded to the controller by performing the following steps:
Step 2 Place a check mark in the Download SSL Certificate check box.
Step 3 Complete the required fields for downloading the certificate.
Step 4 Click Apply.
Step 5 After the certificate has been downloaded, reboot the server.
Step 3 Fill in the redirect URL after login and external webauth URL fields.
Step 4 Click Apply.
The specific ACL is configured under Security > Access Control Lists (See Figure 10-58 and
Figure 10-59.)
Note If a pre-authentication ACL is used in conjunction with the web auth policy, it must include a rule to
permit DNS requests; otherwise, the client is unable to resolve and connect to a destination host/URL
that is otherwise allowed by the ACL.
Step 3 To define RADIUS server settings, configure the IP address, shared secret, and authentication port
number as defined on the RADIUS server.
If the Network User check box is cleared, the RADIUS server is used only for user authentication when
it is specifically selected under the RADIUS setting of a given WLAN. Otherwise, if the Network User
check box is checked, the server is used globally for all user authentications based on its server priority.
Step 4 Click Apply.
The summary screen shown in Figure 10-62 shows the newly-added server.
Step 6 Find the guest WLAN and click on its Profile Name.
The guest WLAN configuration screen is displayed, as shown in Figure 10-64.
CMX Connect
CMX connect can be an on-Prem or cloud based solution. The CMX Connect service provides an easy
way to create customizable captive portals and to capture visitor information through multiple
onboarding options. Organizations can engage with the visitor on the captive portal or through external
media such as mobile applications, digital signage, or offline marketing.
For comprehensive deployment guide please refer to the following URL
https://support.cmxcisco.com/hc/en-us/articles/216598448-Set-Up-Cisco-CMX-Connect
Work Flow
Sequence of using this feature is as under:
1. Global Admin adds a lobby admin user account on the WLC
2. Global Admin enables lobby-admin-access on required WLANs on the WLC
3. Lobby admin logs into the guest management page on the WLC
4. Lobby admin selects the WLAN (for which lobby admin access is enabled) on which client
whitelisting needs to be enabled
5. Lobby admin disables mac filtering on the WLAN
6. Lobby-admin will be shown a list of current connected clients as well as those already added clients
(whitelisted) for the selected WLAN
7. Lobby-admin selects all or selected clients from the associated client list based of available filtering
options
8. Lobby-admin adds the required or all clients to the client whitelist bucket
9. Lobby admin will enable mac filtering on the WLAN
The roles of read-write admin and lobby admin are broken down in the following order:
When a client is roaming between AP1 and AP2 that are connected to the same controller, the following
steps takes place by default:
Step 1 Client associates with AP1 and requests to roam with AP2.
Step 2 Client sends a FT Authentication Request to AP2 and receives a FT Authentication Response from AP2.
Step 3 Client sends a FT Re-association Request to AP2 and receives a FT Re-association Response from AP2.
Step 4 Client completes its roam from AP1 to AP2.
When a client is roaming between AP1 and AP2 which are connected to different controllers such as
WLC1 and WLC2, respectively, within mobility group, the following steps takes place by default:
Step 1 Client associates with AP1 and requests to roam with AP2.
Step 2 Client sends a FT Authentication Request to AP2 and receives a FT Authentication Response from AP2.
Step 3 WLC-1 sends PMK and mobility message to WLC-2 about the roaming client that uses mobility
infrastructure.
Step 4 Client completes its roam from AP1 to AP2.
When a client is roaming between AP1 and AP2 that are connected to the same controller, the following
steps takes place by default:
Step 1 Client associates with AP1 and requests to roam with AP2.
Step 2 Client sends a FT Authentication Request to AP1 and receives a FT Authentication Response from AP1.
Step 3 The controller sends the pre-authentication information to AP2 as the APs are connected to the same
controller.
Step 4 Client sends a FT Re-association Request to AP2 and receives a FT Re-association Response from AP2.
Step 5 Client completes its roam from AP1 to AP2.
When a client is roaming between AP1 and AP2 that are connected to the different controllers such as
WLC1 and WLC2 respectively within a mobility group, the following steps takes place by default:
Step 1 Client associates with AP1 and requests to roam with AP2.
Step 2 Client sends a FT Authentication Request to AP1 and receives a FT Authentication Response from AP1.
Step 3 WLC-1 sends Pairwise Master Key (PMK) and mobility message to WLC-2 about the roaming client.
Step 4 Client completes its roam from AP1 to AP2.
Note The Over the DS check box gets enabled only when you enable FT.
Step 7 In the Reassociation Timeout field, enter the number of seconds after which the reassociation attempt
of a client to an AP must time out. The valid range is 1 to 100 seconds.
Note The Reassociation Timeout field gets enabled only when you enable FT.
Step 8 Under Authentication Key Management, check the Enable check box of either FT 802.1X or FT PSK
to enable the key. To disable the key, uncheck the Enable check box.
Note If you check the FT PSK check box, from the PSK Format drop-down list, choose ASCII or
Hex and enter the key value.
Step 9 Choose Enable or Disable from the WPA gtk-randomize State drop-down list, to configure the WPA
Group Temporal Key (GTK) to randomize state.
config wlan security ft {enable | disable} Enable or disable 802.11r fast transition
wlan-id parameters.
config wlan security ft over-the-ds {enable | Enable or disable 802.11r fast transition
disable} wlan-id parameters over a distributed system. This is
disabled, by default.
config wlan security ft reassociation-timeout Enables 802.11r fast transition reassociation
timeout-in-seconds wlan-id timeout. The range is between 1 to 100 seconds.
The WLAN configuration contains a new Authenticated Key Management (AKM) type called FT (Fast
Transition).
config wlan security wpa akm ft-psk {enable | disable} wlan-id
config wlan security wpa akm ft-802.1X {enable | disable} wlan-id
Enable or disable the AKM for FT over a DS, enter the following command:
config wlan security wpa akm ft over-the-ds {enable | disable} wlan-id
To view the WLAN and FT parameters on the WLAN, enter the following command:
show wlan wlan-id
Troubleshooting Support
• Enable or disable debugging of FT events, using the following command:
debug ft events {enable | disable}
• Enable or disable debugging of key generation for FT, using the following command:
debug ft keys {enable | disable}
The following elements are implemented in the beacon and probe response on the AP to ensure smooth
integration with Apple handheld devices:
• Country Element—The Country Information Element contains the information required to allow a
station to identify the regulatory domain in which the station is located and to configure its PHY for
operation in that regulatory domain.
• Power Constraint Element—The power constraint element contains the information necessary to
allow a client to determine the local maximum transmit power in the current channel.
• RM Enable Capabilities Element—The RM Capabilities element is five octets long. When this
element is included in a beacon or probe response, it uses bit 1 to signal so that the AP can provide
neighbor list. When used in an association request, bit 1 signifies the client's request for a neighbor
list.
The presence of all three of these IEs signifies that this SSID is configured to provide a neighbor list on
request. For this release we send neighbor list based on the request from the client and not on the
neighbor list capability of the client in the IE.
The following Wireshark capture displays these information elements:
config wlan Configures assisted roaming prediction list for a WLAN. By default,
assisted-roaming prediction the assisted roaming prediction list is disabled.
{enable | disable} wlan-id
config assisted-roaming Configures the maximum number of times a client can deny
denial-maximum count association if the association request is sent to an AP which does not
match any AP on the prediction. The valid range is from 1 to 10, and
the default value is 5.
config assisted-roaming Configures the minimum number of predicted APs required for the
prediction-minimum count prediction list to activate. The default value is 3.
Troubleshooting Support
• Debug a client for assisted roaming, using the following command:
debug mac addr client-mac-addr
• Configure the debugging of all of the 802.11k events, using the following command:
debug 11k all {enable | disable}
• Verify the neighbor requests that are received, using the following command:
debug 11k events {enable | disable}
• Configure the debugging of the client roaming history, using the following command:
debug 11k history {enable | disable}
• Get details of client roaming parameters that are to be imported for offline simulation, using the
following command:
debug 11k simulation {enable | disable}
Troubleshooting Support
• Enable or disable 802.11v debug, using the following command on the WLC:
debug 11v detail
• Track the DMS requests processed by an access point, using the following command on the AP:
debug dot11 dot11v
Disassociation function
Optimized Roaming behavior: Check client stats every 90 seconds(or less), if RSSI fails & data rate fails,
disassociate the client.
Optimized Roaming + 802.11v behavior: If client is BSS Transition capable, instead of disassociating
the client, send the client BSS Transition Request
Restrictions
Client needs to support 802.11v BSS transition.
When Management Frame Protection is negotiated, the AP encrypts the GTK and IGTK values in the
EAPOL-Key frame, which is delivered in message 3 of 4-way handshake.
If the AP later changes the GTK, it sends the new GTK and IGTK to the client using the Group Key
Handshake.
802.11w defines a new Broadcast/Multicast Integrity Protocol (BIP) that provides data integrity and
replay protection for broadcast/multicast robust management frames after successful establishment of an
IGTKSA. It adds a MIC that is calculated using the shared IGTK key.
If the AP is not already engaged in an SA query with the client, the AP shall issue an SA query until a
matching SA query response is received or the Association Comeback time expires. An AP may interpret
reception of a valid protected frame as an indication of a successfully completed SA query. If an SA
query response with a matching transaction identifier is not received within the time period, the AP shall
allow the association process to start without additional SA Query procedures.
Note The 802.11w IGTK key is derived using the 4-way handshake. The key can only be used on
WLANs that are configured for WPA2 security at layer 2.
Step 5 In the Protected Management Frame area, choose the PMF state from the drop-down list. The
following options are available:
• Disabled— Disables 802.11w MFP protection on a WLAN.
• Optional— To be used if the client supports 802.11w.
• Required— Ensures that the clients that do not support 802.11w cannot associate with the
WLAN.
Step 6 If you choose the PMF state as either Optional or Required, perform the following:
• In the Comeback timer field, enter the association comeback interval in milliseconds. The
comeback interval is the time within which the access point re-associates with the client after a
valid security association.
• In the SA Query Timeout field, enter the maximum time before a Security Association (SA)
query times out.
Config wlan security pmf Configure the PMF parameters with the following options:
{disable | optional | • Association-comeback—Configures the 802.11w association. The
required} wlan-id range is from 1to20 seconds.
Config wlan security pmf
• Required— Requires clients to negotiate 802.11w MFP protection
association-comeback
on a WLAN.
timeout-in-seconds wlan-id
• Optional— Enables 802.11w MFP protection on a WLAN.
Config wlan security pmf
saquery-retrytimeout • Saquery-retry-time— Time interval identified in milliseconds in
timeout-in-milliseconds the association response to an already associated client before the
wlan-id association can be tried again. This time interval checks if the client
is a real client and not a rogue client during the association
comeback time. If the client does not respond within this time, the
client association is deleted from the controller. The saquery retry
time in milliseconds. The range is from 100 to 500 ms. The value
must be specified in multiples of 100 milliseconds.
WLAN configuration contains a new Authenticated Key Management (AKM) type called Protected
Management Frames (PMF).
• Configure the 802.1X authentication for PMF, using the following command:
config wlan security wpa akm pmf 802.1x {enable | disable} wlan-id
• Configure the pre-shared key support for PMF, using the command:
config wlan security wpa akm pmf psk {enable | disable} wlan-id
Note 802.11w cannot be enabled on WLANs of None, WEP-40, WEP-104, and WPA (AES or TKIP)
encryption.
Monitoring 802.11w
To display the WLAN and PMF parameters on the WLAN, enter the following command:
show wlan wlan-id
Troubleshooting Support
To configure the debugging of PMF, enter the following command:
debug pmf events {enable | disable}
The Cisco Network Plug and Play solution provides a simple, secure, unified, and integrated offering for
enterprise network customers to ease new branch or campus rollouts, or for provisioning updates to an
existing network. The solution allows use of Cloud Redirection service, on-prem, or combination which
provide a unified approach to provision enterprise networks comprised of Cisco routers, switches, and
wireless devices with a near zero touch deployment experience.
This deployment guide introduces the Cisco Network Plug and Play application for wireless access
points. This application allows you to pre-provision the remote site. When you provision a large site, you
can use the Cisco Network Plug and Play application to pre-provision the site and add access points to
the site. This includes entering access point information and setting up a bootstrap configuration if
required. The bootstrap configuration enables the Plug and Play Agent to configure the access point such
as the WLC info, hostname, AP group, FlexGroup, AP mode, etc.
When you create small sites where pre-provisioning is not required, access points can be deployed
without prior set up on the Cisco Network Plug and Play application and then claimed. When an installer
installs and powers up the access point, it auto-discovers the Cisco APIC-EM controller by using the
DHCP, DNS or cloud redirection service. After the auto-discovery process is complete, the AP either
joins a WLC with configuration from local PnP server, or communicates with the cloud redirection
service for direction to target WLC or PnP server.
Wireless PnP Support:
Table 12-1
Platform Models
Cisco Aironet Wireless Access Points 802.11n Generation 2
702I, 702W, 1600, 2600, 3600 802.11ac Wave 1,
17/27/3700, 18/28/3800 802.11ac Wave 2
CPU
Clock
Virtual Appliance Cores RAM Hard Disk Speed RAID (Hardware)
Cisco APIC-EM installed on a 12 32 GB 200 GB Internal 2.9 GHz RAID 10
Virtual Machine (32 GB) data store
Disk speed
15000 RPM
receives the DHCP Option 43 which is the APIC PnP server IP address, then the PnP Agent on the AP
initiates a HTTPS request to the PnP server. Once the security credentials are validated a full
configuration is pushed down to the AP.
DNS Response:
The PnP agent on the AP starts up with no configuration. The PnP Agent tries to assign an IP address
via DHCP. The AP sends out a DHCP discovery message. If the DNS server IP address is populated as
part of the DHCP response, then the PnP Agent on the AP send a DNS query for the name
‘pnpserver.localdomain’. The DNS server could resolve this to the APIC EM PnP Server IP address. The
PnP Agent on the AP initiates a HTTPS request to the PnP server. Once the security credentials are
validated a full configuration is pushed down to the AP.
Both the above cases are ideal in an Enterprise managed or Service Provider managed network where
the DHCP response or DNS resolution is being managed. If there are scenarios where the AP would
connect onto an unmanaged network or when the DHCP or DNS services are not trusted then there is a
need for a separate entity which could tie in the device ownership with the PnP Server details. The Cisco
PnP Redirect Cloud instance on the Public Internet has this capability.
• Group Repository–External ID Services (e.g. ISE) is leveraged for dynamic User or Device to
Group mapping and policy definition
• Analytics Engine–External Data Collector (e.g. NAE) is leveraged to analyze User or Device to
App flows and monitor fabric status
This architecture is optimized for Wave2 11ac access points in Local mode:
• AP1810
• AP1815
• AP1830
• AP1850
• AP2800
• AP3800
Wave 1 11ac access points are supported with SD-Access wireless with limited feature support
• WLC <-> AP: Control plane WLC and AP communication is via CAPWAP similar to existing modes
• AP <-> Switch: Data Traffic is switched from the AP to the Edge switch using VXLAN Tunnel
encapsulation
• WLC <-> Map Server: The wireless LAN controller communicates with the Mapserver using the
LISP agent running on Port 4342 on the controller
• WLC <-> APIC-EM: APIC-EM uses the CLI interface via SSH/Telnet to configure the WLC
• Switch <-> Mapserver: The fabric enabled switched communicate with the Map Server on LISP Port
4789
• This mode uses CAPWAP Control Plane going tunneling back to the WLC and a distributed
de-coupled VXLAN Data plane
• WLC/APs are integrated into the Fabric and the Access points connect in the overlay
• Traditional CUWN architecture with CAPWAP for Control Plane and Data Plane terminating at the
WLC
• SDA Fabric is just a transport in the wired infrastructure between the APs and the WLC
• This is a possible migration step to full SDA migration
Table 12-2
Table 12-2
Solution Overview
Cisco Mobility Express Solution is specifically designed to help small and medium-sized businesses
easily and cost-effectively deliver enterprise-class wireless access to both employees and customers.
With the Cisco Mobility Express Solution, small and mid-sized networks can now enjoy the same
quality user experiences as large enterprises.
Cisco Mobility Express Solution is an on-premise, managed Wi-Fi solution that:
• Is a virtual Wireless LAN controller function embedded on 802.11ac Wave 2 access points
• Is ideal for small and medium-sized deployments of up to 100 access points
• Is supported on Cisco Aironet® 1540, 1560, 1815W, 1815I, 1815M, 1830, 1850, 2800 and 3800
Series 802.11ac Wave 2 access points
• Can control other Aironet® access points, such as the 1810W, 1700, 2700, and 3700 etc.
• Provides simple over-the-air deployment in under 10 minutes. In addition, one can use Network Plug
and Play to deploy the Wireless LAN controller and bring up a new site
• Can be used to perform Site Survey
Interoperability
• AireOS® Release - Recommended is AireOS® 8.4.100.0 or later.
• Cisco Prime Infrastructure - Prime Infrastructure Release 3.0.1 and later. Please deploy Prime
Infrastructure version which is compatible with AireOS® Release running on Mobility Express.
• Connected Mobility Experiences (CMX) – CMX Connect and CMX Presence Analytics is
supported for both On-Prem and CMX cloud deployments. For On-Prem, use CMX 10.3 or later.
Please deploy CMX On-Prem version which is compatible with AireOS® Release running on
Mobility Express.
• Cisco Identity Services Engine (ISE) - ISE Release 1.2 and later. 802.1x authentication is supported.
• Master Access Point-Cisco Aironet® Access Point which runs the virtual Wireless LAN Controller
function is called the Master AP. In addition to running the virtual Wireless LAN Controller
function, it can also service clients at the same time.
• Subordinate Access Point-Cisco Aironet® Access Points which are managed by Master Access
Point in a Mobility Express network and only service clients are called Subordinate Access Points.
Subordinate Access Points do not actively run the Wireless LAN Controller function even though
they may be capable of running the Wireless LAN Controller function.
There are two parameters which ensures an Access Points can run the Wireless LAN Controller function.
These parameters are displayed in the AP#show version output of the access point. They are as follows:
• AP Image type
• AP Configuration
For an Access Point to run the Wireless LAN Controller function, the two parameters must have the
following value:
• AP Image type: MOBILITY EXPRESS IMAGE
• AP Configuration: MOBILITY EXPRESS CAPABLE
Note On an Access Point with CAPWAP image, the two parameters are not displayed in the AP#show version
output.
Table 13-1 Cisco Aironet® Access Points capable of operating as Master Access Points
Table 13-1 Cisco Aironet® Access Points capable of operating as Master Access Points
Note NOTE: The -x- in the other model numbers is a placeholder for the actual letter indicating the model's
regulatory domain.
Note The -x- in the other model numbers is a placeholder for the actual letter indicating the model's regulatory
domain.
Scale Limits
Cisco Mobility Express supports up to 100 Access Points and 2000 Clients in a single deployment. Given
below are the scale limits per Master Access Point.
If you wish to order Access Points with CAPWAP image, do not select the Access Point SKU (Stock
Keeping Unit) which ends with K9C when placing the order. If you wish to order Access Points with
CAPWAP image, SKU (Stock Keeping Unit) ending with K9 should be selected when placing the order.
Please note that an Access Point with CAPWAP image can also be converted to run Wireless LAN
Controller function by installing the Mobility Express image. Conversely, Access Point with Mobility
Express image can be converted to run as CAPWAP by migrating them to appliance or vWLC based
deployment.
Pre-requisites
1. Decide on the Access Point to be configured as the Master AP which will run the Wireless LAN
Controller function. After the Master AP is configured and operational, additional APs can be added to
the Mobility Express network. Please note that additional APs must have the same software version as
the Master AP for them to join.
2. Decide on DHCP server. Will you be using an external DHCP server (ex. on a switch or router) for access
points and clients or will you be using internal DHCP server on Mobility Express.
Note Please note that mix of internal and external DHCP server is not supported.
If you plan to use an external DHCP server, configure that first before connecting the Master AP. If you
want to use the internal DHCP server, you can configure it in Day 0 Setup Wizard. Please note that
internal DHCP server is typically used for Site Survey so using an External DHCP server for Access
Points and client is recommended unless there is a reason not to.
interface GigabitEthernet1/0/38
In the above example, all Access Points will get an IP address in native VLAN 10. Management IP
address of Wireless LAN Controller will also be in VLAN 10 which must be configured during Day 0.
Client Data traffic will be in VLAN 20, 30 and 40.
Note In a Mobility Express deployment, all access points must be in the same VLAN.
If multiple access points capable of running the Wireless LAN Controller function are connected to the
switch ports simultaneously, one of them would be elected as a designated Master AP and it will start
the Wireless LAN Controller function in Day 0.
After the Wireless LAN Controller function has started in Day 0, it will broadcast the
CiscoAirProvision SSID.
5. Configure the admin account for the Wireless LAN Controller by entering the username and
password. Enter password again to confirm it and click on the Start button.
6. In the Set up your controller section, enter System Name and Country. Date & Time will be
automatically filled from your browser or one can optionally enter the NTP server. If NTP server is
left blank, three NTP pools will automatically be configured. Enable the IP Management and enter
the Management IP address, Subnet Mask and Default Gateway of the Wireless LAN
Controller. Do not enable the DHCP Server. This is because we are using an External DHCP server
in this example. Click on the Next button.
7. Create an Employee Network by entering the Network Name and selecting the Security Type.
For WPA2 Personal, enter the Passphrase twice. For WPA2 Enterprise, enter the RADIUS
Server IP address and shared Secret.
Note NOTE: At this time, WLAN clients will be in the same network as Access Points. To configure WLAN
clients on a different VLAN, go to the WLAN section.
Click Next.
Under Advanced Settings, enable RF Parameter Optimization. Select the Client Density and Traffic
Type for the deployment.
Click Next.
8. Verify the selections and click Apply. Click Ok on the confirm window.
The Master AP will reboot and when it comes back up, it will run the Wireless Controller function.
Using a web browser, access the controller WebUI at https://<management IP address>. Please note that
Management IP address was configured in Step 6 above.
To login into the controller WebUI interface, click Login and enter the username and password
configured in Step 5 above
Note Using a mix of Internal DHCP server and External DHCP in a Mobility Express Deployment is
supported in the Centralized NAT use case.
Pre-requisite
1. Access Points - Cisco 802.11ac Wave 2 access points running Cisco Mobility Express software.
2. Power Source - Depending on the Access Point being used for Site Survey, one can use a power adapter
or a battery pack capable of providing sufficient power to the Access Point.
3. Console Cable(Optional)–Cisco Mobility Express can be configure using the CLI or Over-the-Air. For
configuring Cisco Mobility Express via CLI, a console connect to the Access Point would be required
Procedure
Note For Site Survey, a DHCP server is required and is supported on Cisco Mobility Express. DHCP Server
configuration highlighted below is mandatory if you want to enable DHCP server on Cisco Mobility
Express.
Step 5 Wait for the Access Point to boot up completely. After the Wireless controller has started, log back in to the
controller using administrative username or password configured during the initial setup wizard.
Step 6 (Optional): During the CLI setup wizard, Employee Network Security was configured to PSK. This can
be disabled for easy association of clients and also disable SSID broadcast to avoid unwanted clients
from joining the SSID. To disable PSK and SSID broadcast, enter the following commands in the
Controller CLI.
(Cisco Controller)>config wlan disable 1
(Cisco Controller)>config wlan security wpa disable 1
(Cisco Controller)>config wlan broadcast-ssid disable wlan 1
(Cisco Controller)>config wlan enable 1
(Cisco Controller)>save config
Step 7 To configure channel, TX power, and channel bandwidth for the radios, disable the radio first, make the
changes and then re-enable it.
To change the 2.4GHz radio to channel 6, follow the steps below:
(Cisco Controller)>config 802.11b disable <ap name>
(Cisco Controller)>config 802.11b channel <ap name> <ap name> 6
(Cisco Controller)>config 802.11b enable <ap name>
To change the 2.4GHz radio Transmit Power to power level 3, follow the steps below:
(Cisco Controller)>config 802.11b disable <ap name>
(Cisco Controller)>config 802.11b txPower <ap name> <ap name> 3
(Cisco Controller)>config 802.11b enable <ap name>
To change the 5 GHz radio to channel 44, follow the steps below:
(Cisco Controller)>config 802.11a disable <ap name>
(Cisco Controller)>config 802.11a channel <ap name> <ap name> 44
(Cisco Controller)>config 802.11a enable <ap name>
To change the 5 GHz radio Transmit Power to level 5, follow the steps below:
(Cisco Controller)>config 802.11a disable <ap name>
(Cisco Controller)>config 802.11a txPower <ap name> <ap name> 5
(Cisco Controller)>config 802.11a enable <ap name>
To change the 5 GHz radio channel width to 40MHz, follow the steps below:
Step 1 Navigate to Wireless Settings > DHCP Server and click on Add new Pool button.
Step 2 On the Add DHCP Pool window. Enter the following fields:
• Enter the Pool Name for the WLAN
• Enable the Pool Status
• Enter the VLAN ID for the WLAN
• Enter the Lease Period for the DHCP clients. Default is 1 Day
• Enter the Network/Mask
• Enter the Start IP for the DHCP pool
• Enter the End IP for the DHCP pool
• Enter the Default Gateway for the DHCP pool
Note If the scope is for client devices connecting to the Centralized NAT, one must select Mobility Express
Controller for Default Gateway
Note MAC Filtering using RADIUS or local WLC database is also supported.
Step 1 Navigate to Wireless Settings > WLANs and then click on Add new WLAN button. The Add new WLAN
Window will pop up.
Step 2 In the Add new WLAN window, on the General tab, configure the following:
• Enter the Profile Name
• Enter the SSID
Step 3 Click on the WLAN Security tab and configure the following:
• Select Security Type as WPA2 Enterprise
• Select Authentication Server as External RADIUS
• Select RADIUS Compatibility from the drop-down list
• Select MAC Delimiter from the drop-down list
Step 4 Add the Radius server and configure the following:
• Enter the Radius IP
• Enter the Radius Port
• Enter the Shared Secret
• Click on Tic icon
Step 5 Click Apply.
Step 1 Navigate to Wireless Settings > WLANs and then click on Add new WLAN button. The Add new WLAN
Window will pop up.
Step 2 In the Add new WLAN window, on the General tab, configure the following:
• Enter the Profile Name
• Enter the SSID
Step 3 Enable the Guest Network under the WLAN Security tab.
Step 4 Select Captive Portal as CMX Connect.
Step 5 Enter Captive Portal URL.
Note Captive Portal URL must have the following format: https://yya7lc.cmxcisco.com/visitor/login where
yya7lc is your Account ID.
Step 6 If Guest Clients have to be on a separate VLAN, click on the VLAN & Firewall tab and select Yes for
Use VLAN Tagging and enter the following:
• Enter the native VLAN. This is the VLAN for your APs
• In the VLAN ID field, enter the VLAN for the Guest clients
Note Additional steps are required on CMX Cloud to create the Captive Portal, Site with Access Points and
associating Captive Portal to the Site.
Note Master AP does not have AP images. It facilitates the transfer of new software from the configured
Transfer Mode to the Access Points requesting for Software Update.
Cisco Mobility Express supports the following Transfer Mode for Software Update:
1. Cisco.com -. In this software update method, the software image can be directly streamed from
cisco.com to the individual Access Points. Internet access is required for this transfer mode and
EULA and SMARTNet contract requirements have to be met before software download can be
initiated.
2. HTTP - HTTP transfer mode is supported if the Mobility Express Network has the same model of
Access Points and one can use the AP file from a local machine.
Note If there is a mix of Access Points in the Mobility Express network, Software Update via cisco.com or
TFTP Transfer Method should be used.
3. TFTP - TFTP transfer mode can be used to perform Software Update on a Mobility Express
Network. Master AP facilitates transfer of image from the TFTP server to the individual Access
Points. The AP images are stored and served from the TFTP server upon request.
Note There is no service interruption during pre-image download. After pre-image download is complete on
all APs, a Manual or scheduled reboot of Mobility Express network can be triggered.
Procedure
Step 1 To perform Software Update via Cisco.com, navigate to Management > Software Update and configure
the following:
• Select Cisco.com for Transfer Mode
• Enter Cisco.com Username
• Enter Cisco.com Password
• Enable Automatically Check for Updates. Check is done once in 30 days.
• Click on the Check Now button to retrieve the Latest Software Release and the Recommended
Software Release from Cisco.com.
Step 2 Click Apply.
Step 3 Click on Update button to initiate software update wizard.
Step 4 In the Software Update Wizard, select the Recommended Software Release or Latest Software Release.
Click Next.
Step 5 Select Update Now to initiate software update immediately or Schedule the Update for Later.
Note If Schedule the Update for Later is selected, configure the Set Update Time field.
Step 6 Click on the Auto Restart checkbox if automatic restart of all access points in the network is desired after
the software update is finished. Click Next.
Step 7 Click on Confirm button to start the software update.
To monitor the download progress on individual Access Points, expand the Predownload image status.
Step 1 Enable Expert View on Cisco Mobility Express. Expert View is available on the top banner of the Cisco
Mobility Express WebUI as shown below and enabled various configurable parameters which are not
available in Standard view.
• CleanAir Detection–CleanAir is supported on 2800 and 3800 series access points and one can
choose to enable or disable it.
• 5.0 GHz Channel Width–Global setting is configured to best but one can select 20, 40, 80 or 160
MHz for channel width.
• 2.4 GHz Data Rates–Move the slider to disable/enable data rates in the 2.4 GHz band
• 5.0 GHz Data Rates-Move the slider to disable/enable data rates in the 5.0 GHz band
• Select DCA Channels–One can select (click on individual channels) the channels to be included in
DCA for both 2.4 GHz and 5.0 GHz band
Note Green with an underline below the channel indicates that it is selected.
Note Mobility Express uses MAC 00-00-5E-00-01-VRID where VRID is 1 so if there are other instances of
VRRP running in the environment, use VRID other than 1 for those instances.
Note The previous Master will reboot and the selected Access Point will immediately launch the controller
and become the active Master.
2. Next Preferred Master – Admin can configure the Next Preferred Master from CLI. When this is
configured and the active Master AP fails, the one configured as the Next Preferred Master will be
elected as a Master. To configure the Next Preferred Master, follow the procedure below:
Procedure
Note All 1815 Series Access Points have the same capability.
4. Least Client Load – If here are multiple Access Points with the same capability i.e. multiple 3800
Access points, the one with least client load is elected as the Master Access Point.
5. Lowest MAC Address – If all of the Access Points are the same and have the same client load, then
Access Point with the lowest MAC will be elected as a Master.
Mobility Express supports variety of features as they supported on the UWNC controllers. For complete
listing of the supported features per specific release please see the link below:
https://www.cisco.com/c/en/us/td/docs/wireless/controller/technotes/8-5/b_Mobility_Express_FlexCon
nect_Feature_Matrix.html