- Preface
- Using the Command-Line Interface
- Using the Web Graphical User Interface
- Configuring the Switch for Access Point Discovery
- Configuring Data Encryption
- Configuring Retransmission Interval and Retry Count
- Configuring Adaptive Wireless Intrusion Prevention System
- Configuring Authentication for Access Points
- Converting Autonomous Access Points to Lightweight Mode
- Using Cisco Workgroup Bridges
- Configuring Probe Request Forwarding
- Optimizing RFID Tracking
- Configuring Country Codes
- Configuring Link Latency
- Configuring Power over Ethernet
- Index
- Finding Feature Information
- Prerequisites for Converting Autonomous Access Points to Lightweight Mode
- Information About Autonomous Access Points Converted to Lightweight Mode
- Reverting from Lightweight Mode to Autonomous Mode
- Using DHCP Option 43 and DHCP Option 60
- How Converted Access Points Send Crash Information to the Switch
- Uploading Memory Core Dumps from Converted Access Points
- Displaying MAC Addresses for Converted Access Points
- Configuring a Static IP Address for a Lightweight Access Point
- How to Convert a Lightweight Access Point Back to an Autonomous Access Point
- Authorizing Access Points (CLI)
- Authorizing Access Points (GUI)
- Disabling the Reset Button on Converted Access Points (CLI)
- Monitoring the AP Crash Log Information
- How to Configure a Static IP Address on an Access Point
- Recovering the Access Point Using the TFTP Recovery Procedure
- Configuration Examples for Converting Autonomous Access Points to Lightweight Mode
Converting Autonomous Access Points to Lightweight Mode
Finding Feature Information
Prerequisites for Converting Autonomous Access Points to Lightweight Mode
Access points that are converted to lightweight mode do not support Wireless Domain Services (WDS). Converted access points communicate only with Cisco wireless LAN switchs and cannot communicate with WDS devices. However, the switch provides functionality that is equivalent to WDS when the access point associates to it.
All Cisco lightweight access points support 16 Basic Service Set Identifiers (BSSIDs) per radio and a total of 16 wireless LANs per access point. When a converted access point associates to a switch, only wireless LANs with IDs 1 through 16 are pushed to the access point unless the access point is a member of an access point group.
Access points that are converted to lightweight mode must get an IP address and discover the switch using DHCP, DNS, or IP subnet broadcast.
Information About Autonomous Access Points Converted to Lightweight Mode
You can convert autonomous Cisco Aironet access points to lightweight mode. When you upgrade the access points to lightweight mode, the access point communicates with the switch and receives a configuration and software image from the switch.
See the Upgrading Autonomous Cisco Aironet Access Points to Lightweight Mode document for instructions to upgrade an autonomous access point to lightweight mode:
- Reverting from Lightweight Mode to Autonomous Mode
- Using DHCP Option 43 and DHCP Option 60
- How Converted Access Points Send Crash Information to the Switch
- Uploading Memory Core Dumps from Converted Access Points
- Displaying MAC Addresses for Converted Access Points
- Configuring a Static IP Address for a Lightweight Access Point
Reverting from Lightweight Mode to Autonomous Mode
After you convert an autonomous access point to lightweight mode, you can convert the access point from a lightweight unit back to an autonomous unit by loading a Cisco IOS release that supports autonomous mode (Cisco IOS Release 12.3(7)JA or earlier releases). If the access point is associated with a switch, you can use the switch to load the Cisco IOS release. If the access point is not associated to a switch, you can load the Cisco IOS release using TFTP. In either method, the access point must be able to access a TFTP server that contains the Cisco IOS release to be loaded.
Using DHCP Option 43 and DHCP Option 60
Cisco Aironet access points use the type-length-value (TLV) format for DHCP option 43. You must program the DHCP servers to return the option based on the access point’s DHCP Vendor Class Identifier (VCI) string (DHCP option 60).
For more information about DHCP VCI strings of access points, see http://www.cisco.com/en/US/tech/tk722/tk809/technologies_configuration_example09186a00808714fe.shtml.
See the product documentation for your DHCP server for instructions on configuring DHCP option 43. The Upgrading Autonomous Cisco Aironet Access Points to Lightweight Mode document contains example steps for configuring option 43 on a DHCP server.
If the access point is ordered with the Service Provider Option - AIR-OPT60-DHCP selected, the VCI string for that access point will be different than those strings listed in the previous table. The VCI string has the following suffix: ServiceProvider. For example, a 1260 with this option returns this VCI string: Cisco AP c1260-ServiceProvider.
Note | The switch IP address that you obtain from the DHCP server should be a unicast IP address. Do not configure the switch IP address as a multicast address when configuring DHCP option 43. |
How Converted Access Points Send Crash Information to the Switch
When a converted access point unexpectedly reboots, the access point stores a crash file on its local flash memory at the time of the crash. After the unit reboots, it sends the reason for the reboot to the switch. If the unit rebooted because of a crash, the switch pulls up the crash file using existing CAPWAP messages and stores it in the switch flash memory. The crash information copy is removed from the access point flash memory when the switch pulls it from the access point.
Uploading Memory Core Dumps from Converted Access Points
By default, access points converted to lightweight mode do not send memory core dumps to the switch. This section provides instructions to upload access point core dumps using the switch GUI or CLI.
Displaying MAC Addresses for Converted Access Points
There are some differences in the way that controllers display the MAC addresses of converted access points on information pages in the controller GUI:
On the AP Summary page, the controller lists the Ethernet MAC addresses of converted access points.
On the AP Detail page, the controller lists the BSS MAC addresses and Ethernet MAC addresses of converted access points.
On the Radio Summary page, the switch lists converted access points by the radio MAC address.
Configuring a Static IP Address for a Lightweight Access Point
If you want to specify an IP address for an access point rather than having one assigned automatically by a DHCP server, you can use the controller GUI or CLI to configure a static IP address for the access point. Static IP addresses are generally used only for deployments with a limited number of users.
An access point cannot discover the switch using domain name system (DNS) resolution if a static IP address is configured for the access point, unless you specify a DNS server and the domain to which the access point belongs. You can configure these parameters using either the switch CLI or the GUI.
How to Convert a Lightweight Access Point Back to an Autonomous Access Point
Converting a Lightweight Access Point Back to an Autonomous Access Point (CLI)
1.
enable
2.
ap
name
Cisco_AP
tftp-downgrade
tftp_server_ip_address
tftp_server_image_filename
DETAILED STEPS
Converting a Lightweight Access Point Back to an Autonomous Access Point (Using the Mode Button and a TFTP Server)
Step 1 | Configure the PC on which your TFTP server software runs with a static IP address in the range of 10.0.0.2 to 10.0.0.30. | ||
Step 2 | Make sure that the PC contains the access point image file (such as c1140-k9w7-tar.123-7.JA.tar for a 1140 series access point) in the TFTP server folder and that the TFTP server is activated. | ||
Step 3 | Rename the access point image file in the TFTP server folder to c1140-k9w7-tar.default for a 1140 series access point. | ||
Step 4 | Connect the PC to the access point using a Category 5 (CAT5) Ethernet cable. | ||
Step 5 | Disconnect power from the access point. | ||
Step 6 | Press and hold the
MODE button while you
reconnect power to the access point.
| ||
Step 7 | Hold the MODE button until the status LED turns red (approximately 20 to 30 seconds), and release the MODE button. | ||
Step 8 | Wait until the access point reboots as indicated by all LEDs turning green followed by the Status LED blinking green. | ||
Step 9 | After the access point reboots, reconfigure the access point using the GUI or the CLI. |
Authorizing Access Points (CLI)
1.
enable
2.
configure terminal
3.
ap auth-list ap-policy authorize-ap
4.
username user_name mac aaa attribute list list_name
5.
aaa new-model
6.
aaa authorization credential-download auth_list local
7.
aaa attribute list list
8.
aaa session-id common
9.
aaa local authentication default authorization default
10.
show ap name Cisco_AP config general
DETAILED STEPS
Command or Action | Purpose | |
---|---|---|
Step 1 |
enable Example: Switch# enable
|
Enters privileged EXEC mode. |
Step 2 |
configure terminal Example: Switch# configure terminal
|
Enters global configuration mode. |
Step 3 |
ap auth-list ap-policy authorize-ap Example: Switch(config)# ap auth-list ap-policy
authorize-ap
|
Configures an access point authorization policy. |
Step 4 | username user_name mac aaa attribute list list_name Example: Switch(config)# username aaa.bbb.ccc mac aaa attribute list attrlist
| Configures the MAC address of an access point locally. |
Step 5 | aaa new-model Example: Switch(config)# aaa new-model
| Enables new access control commands and functions. |
Step 6 | aaa authorization credential-download auth_list local Example: Switch(config)# aaa authorization credential-download auth_download local
| Downloads EAP credentials from the local server. |
Step 7 | aaa attribute list list Example: Switch(config)# aaa attribute list alist
| Configures AAA attribute list definitions. |
Step 8 | aaa session-id common Example: Switch(config)# aaa session-id common
| Configures the AAA common session ID. |
Step 9 | aaa local authentication default authorization default Example: Switch(config)# aaa local authentication default authorization default
| Configures the local authentication method list. |
Step 10 | show ap name Cisco_AP config general Example: Switch(config)# show ap name AP01 config general
| Displays the configuration information that corresponds to a specific access point. |
Authorizing Access Points (GUI)
Disabling the Reset Button on Converted Access Points (CLI)
You can enable or disable the Reset button on access points that are converted to lightweight mode. The Reset button is labeled MODE on the outside of the access point.
Note | The procedure to perform this task using the controller GUI is not currently available. |
1.
enable
2.
configure terminal
3.
no ap reset-button
4.
end
5.
ap name Cisco_AP reset-button
DETAILED STEPS
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 |
enable Example: Switch# enable
|
Enters privileged EXEC mode. | ||
Step 2 |
configure terminal Example: Switch# configure terminal
|
Enters global configuration mode. | ||
Step 3 | no ap reset-button Example: Switch(config)# no ap reset-button
|
| ||
Step 4 | end Example: Switch(config)# end
| Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. | ||
Step 5 |
ap name Cisco_AP reset-button Example: Switch# ap name AP02 reset-button
|
Enables the Reset button on the converted access point that you specify. |
Monitoring the AP Crash Log Information
Note | The procedure to perform this task using the switch GUI is not currently available. |
1.
enable
2.
show ap crash-file
DETAILED STEPS
Command or Action | Purpose |
---|
How to Configure a Static IP Address on an Access Point
Configuring a Static IP Address on an Access Point (CLI)
1.
enable
2.
ap name Cisco_AP static-ip ip-address static_ap_address netmask static_ip_netmask gateway static_ip_gateway
3.
enable
4.
configure terminal
5.
ap static-ip name-server nameserver_ip_address
6.
ap static-ip domain static_ip_domain
7.
end
8.
show ap name Cisco_AP config general
DETAILED STEPS
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 |
enable Example: Switch# enable
|
Enters privileged EXEC mode. | ||
Step 2 | ap name Cisco_AP static-ip ip-address static_ap_address netmask static_ip_netmask gateway static_ip_gateway
Example: Switch# ap name AP03 static-ip ip-address
9.9.9.16 netmask 255.255.0.0 gateway 9.9.9.2
| Configures a static IP address on the access point. This command contains the following keywords and arguments:
The access point reboots and rejoins the switch, and the static IP address that you specify is pushed to the access point. After the static IP address has been sent to the access point, you can configure the DNS server IP address and domain name. You must perform Steps 3 and 4 after the access points reboot. | ||
Step 3 |
enable Example: Switch# enable
|
Enters privileged EXEC mode. | ||
Step 4 |
configure terminal Example: Switch# configure terminal
|
Enters global configuration mode. | ||
Step 5 | ap static-ip name-server nameserver_ip_address Example: Switch(config)# ap static-ip name-server
10.10.10.205
| Configures a DNS server so that a specific access point or all access points can discover the switch using DNS resolution.
| ||
Step 6 | ap static-ip domain static_ip_domain Example: Switch(config)# ap static-ip domain domain1
| Configures the domain to which a specific access point or all access points belong.
| ||
Step 7 | end Example: Switch(config)# end
| Returns to privileged EXEC mode. Alternatively, you can also press Ctrl-Z to exit global configuration mode. | ||
Step 8 | show ap name Cisco_AP config general Example: Switch# show ap name AP03 config general
| Displays the IP address configuration for the access point. |
Configuring a Static IP Address on an Access Point (GUI)
Step 1 |
Choose
. The All APs page is displayed. |
Step 2 | Click the name of the access point. The AP > Edit page is displayed. |
Step 3 | In the General tab, in the IP Config area, select the Static IP check box if you want to assign a static IP address to the access point. |
Step 4 | Enter the following details: |
Step 5 | Click Apply. The access point reboots and rejoins the switch, and the static IP address that you specified is sent to the access point. |
Step 6 | After the static IP address has been sent to the access point, configure the DNS IP Address and Domain Name. |
Step 7 | Click Apply. |
Step 8 | Click Save Configuration. |
Recovering the Access Point Using the TFTP Recovery Procedure
Step 1 | Download the required recovery image from Cisco.com (ap3g2-k9w8-tar.152-2.JA.tar) and install it in the root directory of your TFTP server. |
Step 2 | Connect the TFTP server to the same subnet as the target access point and power-cycle the access point. The access point boots from the TFTP image and then joins the switch to download the oversized access point image and complete the upgrade procedure. |
Step 3 | After the access point has been recovered, you can remove the TFTP server. |
Configuration Examples for Converting Autonomous Access Points to Lightweight Mode
Displaying the IP Address Configuration for Access Points: Example
This example shows how to display the IP address configuration for the access point:
Switch# show ap name AP03 dot11 24ghz config general
Cisco AP Identifier.............. 4
Cisco AP Name............................. AP6
IP Address Configuration.................. Static IP assigned
IP Address................................ 10.10.10.118
IP NetMask................................ 255.255.255.0
Gateway IP Addr........................... 10.10.10.1
Domain.................................... Domain1
Name Server............................... 10.10.10.205
...
Displaying Access Point Crash File Information: Example
This example shows how to display access point crash file information. Using this command, you can verify whether the file is downloaded to the switch:
Switch# show ap crash-file
Local Core Files:
lrad_AP1130.rdump0 (156)
The number in parentheses indicates the size of the file. The size should
be greater than zero if a core dump file is available.