LWAP Commands

capwap ap controller ip address

To configure the controller IP address into the CAPWAP access point from the access point’s console port, use the capwap ap controller ip address command.

capwap ap controller ip address A.B.C.D

Syntax Description

A.B.C.D

IP address of the controller.

Command Default

None

Usage Guidelines

This command must be entered from an access point’s console port.


Note

The access point must be running Cisco IOS Release 12.3(11)JX1 or later releases.


Examples

The following example shows how to configure the controller IP address 10.23.90.81 into the CAPWAP access point:

ap_console >capwap ap controller ip address 10.23.90.81

capwap ap dot1x

To configure the dot1x username and password into the CAPWAP access point from the access point’s console port, use the capwap ap dot1x command.

capwap ap dot1x username user_name password password

Syntax Description

user_name

Dot1x username.

password

Dot1x password.

Command Default

None

Usage Guidelines

This command must be entered from an access point’s console port.


Note

The access point must be running Cisco Access Point IOS Release 12.3(11)JX1 or later releases.


Examples

This example shows how to configure the dot1x username ABC and password pass01:

ap_console >capwap ap dot1x username ABC password pass01

capwap ap hostname

To configure the access point host name from the access point’s console port, use the capwap ap hostname command.

capwap ap hostname host_name

Syntax Description

host_name

Hostname of the access point.

Command Default

None

Usage Guidelines

This command must be entered from an access point’s console port.


Note

The access point must be running Cisco IOS Release 12.3(11)JX1 or later releases. This command is available only for the Cisco Lightweight AP IOS Software recovery image (rcvk9w8) without any private-config. You can remove the private-config by using the clear capwap private-config command.


Examples

This example shows how to configure the hostname WLC into the capwap access point:

ap_console >capwap ap hostname WLC

capwap ap ip address

To configure the IP address into the CAPWAP access point from the access point’s console port, use the capwap ap ip address command.

capwap ap ip address A.B.C.D

Syntax Description

A.B.C.D

IP address.

Command Default

None

Usage Guidelines

This command must be entered from an access point’s console port.


Note

The access point must be running Cisco Access Point IOS Release 12.3(11)JX1 or later releases.


Examples

This example shows how to configure the IP address 10.0.0.1 into CAPWAP access point:

ap_console >capwap ap ip address 10.0.0.1

capwap ap ip default-gateway

To configure the default gateway from the access point’s console port, use the capwap ap ip default-gateway command.

capwap ap ip default-gateway A.B.C.D

Syntax Description

A.B.C.D

Default gateway address of the capwap access point.

Command Default

None

Usage Guidelines

This command must be entered from an access point’s console port.


Note

The access point must be running Cisco Access Point IOS Release 12.3(11)JX1 or later releases.


Examples

This example shows how to configure the CAPWAP access point with the default gateway address 10.0.0.1:

ap_console >capwap ap ip default-gateway 10.0.0.1

capwap ap log-server

To configure the system log server to log all the CAPWAP errors, use the capwap ap log-server command.

capwap ap log-server A.B.C.D

Syntax Description

A.B.C.D

IP address of the syslog server.

Command Default

None

Usage Guidelines

This command must be entered from an access point’s console port.


Note

The access point must be running Cisco Access Point IOS Release 12.3(11)JX1 or later releases.


Examples

This example shows how to configure the syslog server with the IP address 10.0.0.1:

ap_console >capwap ap log-server 10.0.0.1

capwap ap primary-base

To configure the primary controller name and IP address into the CAPWAP access point from the access point’s console port, use the capwap ap primary-base command.


Note

This command configures the IPv4 and IPv6 address for Cisco Wave 2 APs.


capwap ap primary-base WORD A.B.C.D

Syntax Description

WORD

Name of the primary controller.

A.B.C.D

IP address of the primary controller.

Command Default

None

Usage Guidelines

This command must be entered from an access point’s console port in enable mode (elevated access).

Examples

This example shows how to configure the primary controller name WLC1 and primary controller IP address 209.165.200.225 into the CAPWAP access point:

ap_console >capwap ap primary-base WLC1 209.165.200.225

capwap ap primed-timer

To configure the primed timer into the CAPWAP access point, use the capwap ap primed-timer command.

capwap ap primed-timer { enable | disable}

Syntax Description

enable

Enables the primed timer settings

disable

Disables the primed timer settings.

Command Default

None

Usage Guidelines

This command must be entered from an access point’s console port.


Note

The access point must be running Cisco Access Point IOS Release 12.3(11)JX1 or later releases.


Examples

This example shows how to enable the primed-timer settings:

ap_console >capwap ap primed-timer enable

capwap ap secondary-base

To configure the name and IP address of the secondary Cisco WLC into the CAPWAP access point from the access point’s console port, use the capwap ap secondary-base command.

capwap ap secondary-base controller_name controller_ip_address

Syntax Description

controller_name

Name of the secondary Cisco WLC.

controller_ip_address

IP address of the secondary Cisco WLC.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

This command must be entered from an access point’s console port.


Note

The access point must be running Cisco Access Point IOS Release 12.3(11)JX1 or later releases.


Examples

This example shows how to configure the secondary Cisco WLC name as WLC2 and secondary Cisco WLC IP address 209.165.200.226 into the CAPWAP access point:

ap_console >capwap ap secondary-base WLC2 209.165.200.226

capwap ap tertiary-base

To configure the name and IP address of the tertiary Cisco WLC into the CAPWAP access point from the access point’s console port, use the capwap ap tertiary-base command.

capwap ap tertiary-base WORDA.B.C.D

Syntax Description

WORD

Name of the tertiary Cisco WLC.

A.B.C.D

IP address of the tertiary Cisco WLC.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

This command must be entered from an access point’s console port.


Note

The access point must be running Cisco IOS Release 12.3(11)JX1 or later releases.


Examples

This example shows how to configure the tertiary Cisco WLC with the name WLC3 and secondary Cisco WLC IP address 209.165.200.227 into the CAPWAP access point:

ap_console >capwap ap tertiary-base WLC3 209.165.200.227

lwapp ap controller ip address

To configure the Cisco WLC IP address into the FlexConnect access point from the access point’s console port, use the lwapp ap controller ip address command.

lwapp ap controller ip address A.B.C.D

Syntax Description

A.B.C.D

IP address of the controller.

Command Default

None

Usage Guidelines

This command must be entered from an access point’s console port.

Prior to changing the FlexConnect configuration on an access point using the access point’s console port, the access point must be in standalone mode (not connected to a controller) and you must remove the current LWAPP private configuration by using the clear lwapp private-config command.


Note

The access point must be running Cisco IOS Release 12.3(11)JX1 or higher releases.


Examples

The following example shows how to configure the controller IP address 10.92.109.1 into the FlexConnect access point:


ap_console > lwapp ap controller ip address 10.92.109.1

config 802.11-a antenna extAntGain

To configure the external antenna gain for the 4.9-GHz and 5.8-GHz public safety channels on an access point, use the config 802.11-a antenna extAntGain commands.

config { 802.11-a49 | 802.11-a58} antenna extAntGain ant_gain cisco_ap { global | channel_no}

Syntax Description

802.11-a49

Specifies the 4.9-GHz public safety channel.

802.11-a58

Specifies the 5.8-GHz public safety channel.

ant_gain

Value in .5-dBi units (for instance, 2.5 dBi = 5).

cisco_ap

Name of the access point to which the command applies.

global

Specifies the antenna gain value to all channels.

channel_no

Antenna gain value for a specific channel.

Command Default

Channel properties are disabled.

Usage Guidelines

Before you enter the config 802.11-a antenna extAntGain command, disable the 802.11 Cisco radio with the config 802.11-a disable command.

After you configure the external antenna gain, use the config 802.11-a enable command to reenable the 802.11 Cisco radio.

Examples

The following example shows how to configure an 802.11-a49 external antenna gain of 10 dBi for AP1:

(Cisco Controller) >config 802.11-a antenna extAntGain 10 AP1

config 802.11-a channel ap

To configure the channel properties for the 4.9-GHz and 5.8-GHz public safety channels on an access point, use the config 802.11-a channel ap command.

config { 802.11-a49 | 802.11-a58} channel ap cisco_ap { global | channel_no}

Syntax Description

802.11-a49

Specifies the 4.9-GHz public safety channel.

802.11-a58

Specifies the 5.8-GHz public safety channel.

cisco_ap

Name of the access point to which the command applies.

global

Enables the Dynamic Channel Assignment (DCA) on all 4.9-GHz and 5.8-GHz subband radios.

channel_no

Custom channel for a specific mesh access point. The range is 1 through 26, inclusive, for a 4.9-GHz band and 149 through 165, inclusive, for a 5.8-GHz band.

Command Default

Channel properties are disabled.

Examples

The following example shows how to set the channel properties:

(Cisco Controller) >config 802.11-a channel ap

config 802.11-a txpower ap

To configure the transmission power properties for the 4.9-GHz and 5.8-GHz public safety channels on an access point, use the config 802.11-a txpower ap command.

config { 802.11-a49 | 802.11-a58} txpower ap cisco_ap { global | power_level}

Syntax Description

802.11-a49

Specifies the 4.9-GHz public safety channel.

802.11-a58

Specifies the 5.8-GHz public safety channel.

txpower

Configures transmission power properties.

ap

Configures access point channel settings.

cisco_ap

Name of the access point to which the command applies.

global

Applies the transmission power value to all channels.

power_level

Transmission power value to the designated mesh access point. The range is from 1 to 5.

Command Default

The default transmission power properties for the 4.9-GHz and 5.8-GHz public safety channels on an access point is disabled.

Examples

The following example shows how to configure an 802.11-a49 transmission power level of 4 for AP1:


(Cisco Controller) >config 802.11-a txpower ap 4 AP1

config 802.11 antenna diversity

To configure the diversity option for 802.11 antennas, use the config 802.11 antenna diversity command.

config 802.11{ a | b} antenna diversity { enable | sideA | sideB} cisco_ap

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

enable

Enables the diversity.

sideA

Specifies the diversity between the internal antennas and an external antenna connected to the Cisco lightweight access point left port.

sideB

Specifies the diversity between the internal antennas and an external antenna connected to the Cisco lightweight access point right port.

cisco_ap

Cisco lightweight access point name.

Command Default

None

Examples

The following example shows how to enable antenna diversity for AP01 on an 802.11b network:

(Cisco Controller) >config 802.11a antenna diversity enable AP01

The following example shows how to enable diversity for AP01 on an 802.11a network, using an external antenna connected to the Cisco lightweight access point left port (sideA):

(Cisco Controller) >config 802.11a antenna diversity sideA AP01

config 802.11 antenna extAntGain

To configure external antenna gain for an 802.11 network, use the config 802.11 antenna extAntGain command.

config 802.11{ a | b} antenna extAntGain antenna_gain cisco_ap

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

antenna_gain

Antenna gain in 0.5 dBm units (for example, 2.5 dBm = 5).

cisco_ap

Cisco lightweight access point name.

Command Default

None

Usage Guidelines

Before you enter the config 802.11 antenna extAntGain command, disable the 802.11 Cisco radio with the config 802.11 disable command.

After you configure the external antenna gain, use the config 802.11 enable command to enable the 802.11 Cisco radio.

Examples

The following example shows how to configure an 802.11a external antenna gain of 0.5 dBm for AP1 :

(Cisco Controller) >config 802.11 antenna extAntGain 1 AP1

config 802.11 antenna mode

To configure the Cisco lightweight access point to use one internal antenna for an 802.11 sectorized 180-degree coverage pattern or both internal antennas for an 802.11 360-degree omnidirectional pattern, use the config 802.11 antenna mode command.

config 802.11{ a | b} antenna mode { omni | sectorA | sectorB} cisco_ap

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

omni

Specifies to use both internal antennas.

sectorA

Specifies to use only the side A internal antenna.

sectorB

Specifies to use only the side B internal antenna.

cisco_ap

Cisco lightweight access point name.

Command Default

None

Examples

The following example shows how to configure access point AP01 antennas for a 360-degree omnidirectional pattern on an 802.11b network:

(Cisco Controller) >config 802.11 antenna mode omni AP01

config 802.11 antenna selection

To select the internal or external antenna selection for a Cisco lightweight access point on an 802.11 network, use the config 802.11 antenna selection command.

config 802.11{ a | b} antenna selection { internal | external} cisco_ap

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

internal

Specifies the internal antenna.

external

Specifies the external antenna.

cisco_ap

Cisco lightweight access point name.

Command Default

None

Examples

The following example shows how to configure access point AP02 on an 802.11b network to use the internal antenna:

(Cisco Controller) >config 802.11a antenna selection internal AP02

config 802.11 beamforming

To enable or disable Beamforming (ClientLink) on the network or on individual radios, enter the config 802.11 beamforming command.

config 802.11{ a | b} beamforming { global | ap ap_name} { enable | disable}

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

global

Specifies all lightweight access points.

ap ap_name

Specifies the Cisco access point name.

enable

Enables beamforming.

disable

Disables beamforming.

Command Default

None

Usage Guidelines

When you enable Beamforming on the network, it is automatically enabled for all the radios applicable to that network type.

Follow these guidelines for using Beamforming:

  • Beamforming is supported only for legacy orthogonal frequency-division multiplexing (OFDM) data rates (6, 9, 12, 18, 24, 36, 48, and 54 mbps).


    Note

    Beamforming is not supported for complementary-code keying (CCK) data rates (1, 2, 5.5, and 11 Mbps).


  • Beamforming is supported only on access points that support 802.11n (AP1250 and AP1140).

  • Two or more antennas must be enabled for transmission.

  • All three antennas must be enabled for reception.

  • OFDM rates must be enabled.

    If the antenna configuration restricts operation to a single transmit antenna, or if OFDM rates are disabled, Beamforming is not used.

Examples

The following example shows how to enable Beamforming on the 802.11a network:

(Cisco Controller) >config 802.11 beamforming global enable 

config 802.11 disable

To disable radio transmission for an entire 802.11 network or for an individual Cisco radio, use the config 802.11 disable command.

config 802.11{ a | b} disable { network | cisco_ap}

Syntax Description

a

Configures the 802.11a on slot 1 and 802.11ac radio on slot 2. radio.

b

Specifies the 802.11b/g network.

network

Disables transmission for the entire 802.11a network.

cisco_ap

Individual Cisco lightweight access point radio.

Command Default

The transmission is enabled for the entire network by default.

Usage Guidelines

  • You must use this command to disable the network before using many config 802.11 commands.
  • This command can be used any time that the CLI interface is active.

Examples

The following example shows how to disable the entire 802.11a network:

(Cisco Controller) >config 802.11a disable network

The following example shows how to disable access point AP01 802.11b transmissions:

(Cisco Controller) >config 802.11b disable AP01

config advanced 802.11 profile clients

To set the Cisco lightweight access point clients threshold between 1 and 75 clients, use the config advanced 802.11 profile clients command.

config advanced 802.11{ a | b} profile clients { global | cisco_ap} clients

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

global

Configures all 802.11a Cisco lightweight access points.

cisco_ap

Cisco lightweight access point name.

clients

802.11a Cisco lightweight access point client threshold between 1 and 75 clients.

Command Default

The default Cisco lightweight access point clients threshold is 12 clients.

Examples

The following example shows how to set all Cisco lightweight access point clients thresholds to 25 clients:

(Cisco Controller) >config advanced 802.11 profile clients global 25
Global client count profile set.

The following example shows how to set the AP1 clients threshold to 75 clients:

(Cisco Controller) >config advanced 802.11 profile clients AP1 75
Global client count profile set.

config advanced 802.11 profile customize

To turn customizing on or off for an 802.11a Cisco lightweight access point performance profile, use the config advanced 802.11 profile customize command.

config advanced 802.11{ a | b} profile customize cisco_ap { on | off}

Syntax Description

a

Specifies the 802.11a/n network.

b

Specifies the 802.11b/g/n network.

cisco_ap

Cisco lightweight access point.

on

Customizes performance profiles for this Cisco lightweight access point.

off

Uses global default performance profiles for this Cisco lightweight access point.

Command Default

The default state of performance profile customization is Off.

Examples

The following example shows how to turn performance profile customization on for 802.11a Cisco lightweight access point AP1:

(Cisco Controller) >config advanced 802.11 profile customize AP1 on

config advanced 802.11 profile foreign

To set the foreign 802.11a transmitter interference threshold between 0 and 100 percent, use the config advanced 802.11 profile foreign command.

config advanced 802.11{ a | b} profile foreign { global | cisco_ap} percent

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

global

Configures all 802.11a Cisco lightweight access points.

cisco_ap

Cisco lightweight access point name.

percent

802.11a foreign 802.11a interference threshold between 0 and 100 percent.

Command Default

The default foreign 802.11a transmitter interference threshold value is 10.

Examples

The following example shows how to set the foreign 802.11a transmitter interference threshold for all Cisco lightweight access points to 50 percent:

(Cisco Controller) >config advanced 802.11a profile foreign global 50

The following example shows how to set the foreign 802.11a transmitter interference threshold for AP1 to 0 percent:

(Cisco Controller) >config advanced 802.11 profile foreign AP1 0

config advanced 802.11 profile noise

To set the 802.11a foreign noise threshold between –127 and 0 dBm, use the config advanced 802.11 profile noise command.

config advanced 802.11{ a | b} profile noise { global | cisco_ap} dBm

Syntax Description

a

Specifies the 802.11a/n network.

b

Specifies the 802.11b/g/n network.

global

Configures all 802.11a Cisco lightweight access point specific profiles.

cisco_ap

Cisco lightweight access point name.

dBm

802.11a foreign noise threshold between –127 and 0 dBm.

Command Default

The default foreign noise threshold value is –70 dBm.

Examples

The following example shows how to set the 802.11a foreign noise threshold for all Cisco lightweight access points to –127 dBm:

(Cisco Controller) >config advanced 802.11a profile noise global -127

The following example shows how to set the 802.11a foreign noise threshold for AP1 to 0 dBm:

(Cisco Controller) >config advanced 802.11a profile noise AP1 0

config advanced 802.11 profile throughput

To set the Cisco lightweight access point data-rate throughput threshold between 1000 and 10000000 bytes per second, use the config advanced 802.11 profile throughput command.

config advanced 802.11{ a | b} profile throughput { global | cisco_ap} value

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

global

Configures all 802.11a Cisco lightweight access point specific profiles.

cisco_ap

Cisco lightweight access point name.

value

802.11a Cisco lightweight access point throughput threshold between 1000 and 10000000 bytes per second.

Command Default

The default Cisco lightweight access point data-rate throughput threshold value is 1,000,000 bytes per second.

Examples

The following example shows how to set all Cisco lightweight access point data-rate thresholds to 1000 bytes per second:

(Cisco Controller) >config advanced 802.11 profile throughput global 1000

The following example shows how to set the AP1 data-rate threshold to 10000000 bytes per second:

(Cisco Controller) >config advanced 802.11 profile throughput AP1 10000000

config advanced 802.11 profile utilization

To set the RF utilization threshold between 0 and 100 percent, use the config advanced 802.11 profile utilization command. The operating system generates a trap when this threshold is exceeded.

config advanced 802.11{ a | b} profile utilization { global | cisco_ap} percent

Syntax Description

a

Specifies the 802.11a network.

b

Specifies the 802.11b/g network.

global

Configures a global Cisco lightweight access point specific profile.

cisco_ap

Cisco lightweight access point name.

percent

802.11a RF utilization threshold between 0 and 100 percent.

Command Default

The default RF utilization threshold value is 80 percent.

Examples

The following example shows how to set the RF utilization threshold for all Cisco lightweight access points to 0 percent:

(Cisco Controller) >config advanced 802.11 profile utilization global 0

The following example shows how to set the RF utilization threshold for AP1 to 100 percent:

(Cisco Controller) >config advanced 802.11 profile utilization AP1 100

config advanced backup-controller primary

To configure a primary backup controller, use the config advanced backup-controller primary command.

config advanced backup-controller primary system name IP addr

Syntax Description

system name

Configures primary|secondary backup controller.

IP addr

IP address of the backup controller.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

To delete a primary backup controller entry (IPv6 or IPv4), enter 0.0.0.0 for the controller IP address.

Examples

The following example shows how to configure the IPv4 primary backup controller:

(Cisco Controller) >config advanced backup-controller primary Controller_1 10.10.10.10

The following example shows how to remove the IPv4 primary backup controller:

(Cisco Controller) >config advanced backup-controller primary Controller_1 10.10.10.10

config advanced backup-controller secondary

To configure a secondary backup controller, use the config advanced backup-controller secondary command.

config advanced backup-controller secondary system name IP addr

Syntax Description

system name

Configures primary|secondary backup controller.

IP addr

IP address of the backup controller.

Command Default

None

Usage Guidelines

To delete a secondary backup controller entry (IPv4 or IPv6), enter 0.0.0.0 for the controller IP address.

Examples

The following example shows how to configure an IPv4 secondary backup controller:

(Cisco Controller) >config advanced backup-controller secondary Controller_2 10.10.10.10

The following example shows how to configure an IPv6 secondary backup controller:

(Cisco Controller) >config advanced backup-controller secondary Controller_2 2001:9:6:40::623

The following example shows how to remove an IPv4 secondary backup controller:

(Cisco Controller) >config advanced backup-controller secondary Controller_2 0.0.0.0

The following example shows how to remove an IPv6 secondary backup controller:

(Cisco Controller) >config advanced backup-controller secondary Controller_2 0.0.0.0

config advanced client-handoff

To set the client handoff to occur after a selected number of 802.11 data packet excessive retries, use the config advanced client-handoff command.

config advanced client-handoff num_of_retries

Syntax Description

num_of_retries

Number of excessive retries before client handoff (from 0 to 255).

Command Default

The default value for the number of 802.11 data packet excessive retries is 0.

Examples

This example shows how to set the client handoff to 100 excessive retries:

(Cisco Controller) >config advanced client-handoff 100

config advanced dot11-padding

To enable or disable over-the-air frame padding, use the config advanced dot11-padding command.

config advanced dot11-padding { enable | disable}

Syntax Description

enable

Enables the over-the-air frame padding.

disable

Disables the over-the-air frame padding.

Command Default

The default over-the-air frame padding is disabled.

Examples

The following example shows how to enable over-the-air frame padding:


(Cisco Controller) > config advanced dot11-padding enable

config advanced assoc-limit

To configure the rate at which access point radios send association and authentication requests to the controller, use the config advanced assoc-limit command.

config advanced assoc-limit { enable [ number of associations per interval | interval ] | disable}

Syntax Description

enable

Enables the configuration of the association requests per access point.

disable

Disables the configuration of the association requests per access point.

number of associations per interval

(Optional) Number of association request per access point slot in a given interval. The range is from 1 to 100.

interval

(Optional) Association request limit interval. The range is from 100 to 10000 milliseconds.

Command Default

The default state of the command is disabled state.

Usage Guidelines

When 200 or more wireless clients try to associate to a controller at the same time, the clients no longer become stuck in the DHCP_REQD state when you use the config advanced assoc-limit command to limit association requests from access points.

Examples

The following example shows how to configure the number of association requests per access point slot in a given interval of 20 with the association request limit interval of 250:

(Cisco Controller) >config advanced assoc-limit enable 20 250

config advanced max-1x-sessions

To configure the maximum number of simultaneous 802.1X sessions allowed per access point, use the config advanced max-1x-sessions command.

config advanced max-1x-sessions no_of_sessions

Syntax Description

no_of_sessions

Number of maximum 802.1x session initiation per AP at a time. The range is from 0 to 255, where 0 indicates unlimited.

Command Default

None

Examples

The following example shows how to configure the maximum number of simultaneous 802.1X sessions:

(Cisco Controller) >config advanced max-1x-sessions 200

config advanced rate

To configure switch control path rate limiting, use the config advanced rate command.

config advanced rate { enable | disable}

Syntax Description

enable

Enables the switch control path rate limiting feature.

disable

Disables the switch control path rate limiting feature.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to enable switch control path rate limiting:

(Cisco Controller) >config advanced rate enable

config advanced probe backoff

To configure the backoff parameters for probe queue in a Cisco AP, use the config advanced probe backoff command.

config advanced probe backoff { enable | disable}

Syntax Description

enable

To use default backoff parameter value for probe response.

disable

To use increased backoff parameters for probe response.

Command Default

Disabled

Examples

The following example shows how to use increased backoff parameters for probe response:

(Cisco Controller) >config advanced probe backoff enable

config advanced probe filter

To configure the filtering of probe requests forwarded from an access point to the controller, use the config advanced probe filter command.

config advanced probe filter { enable | disable}

Syntax Description

enable

Enables the filtering of probe requests.

disable

Disables the filtering of probe requests.

Command Default

None

Examples

The following example shows how to enable the filtering of probe requests forwarded from an access point to the controller:

(Cisco Controller) >config advanced probe filter enable

config advanced probe limit

To limit the number of probes sent to the WLAN controller per access point per client in a given interval, use the config advanced probe limit command.

config advanced probe limit num_probes interval

Syntax Description

num_probes

Number of probe requests (from 1 to 100) forwarded to the controller per client per access point radio in a given interval.

interval

Probe limit interval (from 100 to 10000 milliseconds).

Command Default

The default number of probe requests is 2.
The default interval is 500 milliseconds.

Examples

This example shows how to set the number of probes per access point per client to 5 and the probe interval to 800 milliseconds:

(Cisco Controller) >config advanced probe limit 5 800

config advanced timers

To configure an advanced system timer, use the config advanced timers command.

config advanced timers { ap-coverage-report seconds | ap-discovery-timeout discovery-timeout | ap-fast-heartbeat { local | flexconnect | all} { enable | disable} fast_heartbeat_seconds | ap-heartbeat-timeout heartbeat_seconds | ap-primary-discovery-timeout primary_discovery_timeout | ap-primed-join-timeout primed_join_timeout | auth-timeout auth_timeout | pkt-fwd-watchdog { enable | disable} { watchdog_timer | default} | eap-identity-request-delay eap_identity_request_delay | eap-timeout eap_timeout}

Syntax Description

ap-coverage-report

Configures RRM coverage report interval for all APs.

seconds

Configures the ap coverage report interval in seconds. The range is between 60 and 90 seconds. Default is 90 seconds.

ap-discovery-timeout

Configures the Cisco lightweight access point discovery timeout value.

discovery-timeout

Cisco lightweight access point discovery timeout value, in seconds. The range is from 1 to 10.

ap-fast-heartbeat

Configures the fast heartbeat timer, which reduces the amount of time it takes to detect a controller failure in access points.

local

Configures the fast heartbeat interval for access points in local mode.

flexconnect

Configures the fast heartbeat interval for access points in FlexConnect mode.

all

Configures the fast heartbeat interval for all the access points.

enable

Enables the fast heartbeat interval.

disable

Disables the fast heartbeat interval.

fast_heartbeat_seconds

Small heartbeat interval, which reduces the amount of time it takes to detect a controller failure, in seconds. The range is from 1 to 10.

ap-heartbeat-timeout

Configures Cisco lightweight access point heartbeat timeout value.

heartbeat_seconds

Cisco the Cisco lightweight access point heartbeat timeout value, in seconds. The range is from 1 to 30. This value should be at least three times larger than the fast heartbeat timer.

ap-primary-discovery-timeout

Configures the access point primary discovery request timer.

primary_discovery_timeout

Access point primary discovery request time, in seconds. The range is from 30 to 3600.

ap-primed-join-timeout

Configures the access point primed discovery timeout value.

primed_join_timeout

Access point primed discovery timeout value, in seconds. The range is from 120 to 43200.

auth-timeout

Configures the authentication timeout.

auth_timeout

Authentication response timeout value, in seconds. The range is from 10 to 600.

pkt-fwd-watchdog

Configures the packet forwarding watchdog timer to protect from fastpath deadlock.

watchdog_timer

Packet forwarding watchdog timer, in seconds. The range is from 60 to 300.

default

Configures the watchdog timer to the default value of 240 seconds.

eap-identity-request-delay

Configures the advanced Extensible Authentication Protocol (EAP) identity request delay, in seconds.

eap_identity_request_delay

Advanced EAP identity request delay, in seconds. The range is from 0 to 10.

eap-timeout

Configures the EAP expiration timeout.

eap_timeout

EAP timeout value, in seconds. The range is from 8 to 120.

Command Default

  • The default access point discovery timeout is 10 seconds.

  • The default access point heartbeat timeout is 30 seconds.

  • The default access point primary discovery request timer is 120 seconds.

  • The default authentication timeout is 10 seconds.

  • The default packet forwarding watchdog timer is 240 seconds.

Usage Guidelines

The Cisco lightweight access point discovery timeout indicates how often a Cisco WLC attempts to discover unconnected Cisco lightweight access points.

The Cisco lightweight access point heartbeat timeout controls how often the Cisco lightweight access point sends a heartbeat keepalive signal to the Cisco Wireless LAN Controller.

Examples

The following example shows how to configure an access point discovery timeout with a timeout value of 20:

(Cisco Controller) >config advanced timers ap-discovery-timeout 20

The following example shows how to enable the fast heartbeat interval for an access point in FlexConnect mode:

(Cisco Controller) >config advanced timers ap-fast-heartbeat flexconnect enable 8

The following example shows how to configure the authentication timeout to 20 seconds:

(Cisco Controller) >config advanced timers auth-timeout 20

config ap

To configure a Cisco lightweight access point or to add or delete a third-party (foreign) access point, use the config ap command.

config ap {{ enable | disable} cisco_ap | { add | delete} MAC port { enable | disable} IP_address}

Syntax Description

enable

Enables the Cisco lightweight access point.

disable

Disables the Cisco lightweight access point.

cisco_ap

Name of the Cisco lightweight access point.

add

Adds foreign access points.

delete

Deletes foreign access points.

MAC

MAC address of a foreign access point.

port

Port number through which the foreign access point can be reached.

IP_address

IP address of the foreign access point.

Command Default

None

Examples

The following example shows how to disable lightweight access point AP1:

(Cisco Controller) >config ap disable AP1

The following example shows how to add a foreign access point with MAC address 12:12:12:12:12:12 and IP address 192.12.12.1 from port 2033:

(Cisco Controller) >config ap add 12:12:12:12:12:12 2033 enable 192.12.12.1

config ap autoconvert

To automatically convert all access points to FlexConnect mode or Monitor mode upon associating with the Cisco WLC, use the config ap autoconvert command.

config ap autoconvert { flexconnect | monitor | disable}

Syntax Description

flexconnect

Configures all the access points automatically to FlexConnect mode.

monitor

Configures all the access points automatically to monitor mode.

disable

Disables the autoconvert option on the access points.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

When access points in local mode connect to a Cisco 7500 Series Wireless Controller, they do not serve clients. The access point details are available in the controller. To enable access points to serve clients or perform monitoring related tasks when connected to the Cisco 7500 Series Wireless Controller, the access points must be in FlexConnect mode or Monitor mode.

The command can also be used for conversion of AP modes in Cisco 5520, 8540, and 8510 Series Wireless Controller platforms.

Examples

The following example shows how to automatically convert all access points to the FlexConnect mode:

(Cisco Controller) >config ap autoconvert flexconnect

The following example shows how to disable the autoconvert option on the APs:

(Cisco Controller) >config ap autoconvert disable

config ap bhrate

To configure the Cisco bridge backhaul Tx rate, use the config ap bhrate command.

config ap bhrate { rate | auto} cisco_ap

Syntax Description

rate

Cisco bridge backhaul Tx rate in kbps. The valid values are 6000, 12000, 18000, 24000, 36000, 48000, and 54000.

auto

Configures the auto data rate.

cisco_ap

Name of a Cisco lightweight access point.

Command Default

The default status of the command is set to Auto.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

In previous software releases, the default value for the bridge data rate was 24000 (24 Mbps). In controller software release 6.0, the default value for the bridge data rate is auto . If you configured the default bridge data rate value (24000) in a previous controller software release, the bridge data rate is configured with the new default value (auto) when you upgrade to controller software release 6.0. However, if you configured a non default value (for example, 18000) in a previous controller software release, that configuration setting is preserved when you upgrade to Cisco WLC Release 6.0.

When the bridge data rate is set to auto , the mesh backhaul chooses the highest rate where the next higher rate cannot be used due to unsuitable conditions for that specific rate (and not because of conditions that affect all rates).

Examples

The following example shows how to configure the Cisco bridge backhaul Tx rate to 54000 kbps:

(Cisco Controller) >config ap bhrate 54000 AP01

config ap bridgegroupname

To set or delete a bridge group name on a Cisco lightweight access point, use the config ap bridgegroupname command.

config ap bridgegroupname { set groupname | delete | { strict-matching { enable | disable}}} cisco_ap

Syntax Description

set

Sets a Cisco lightweight access point’s bridge group name.

groupname

Bridge group name.

delete

Deletes a Cisco lightweight access point’s bridge group name.

cisco_ap

Name of a Cisco lightweight access point.

strict-matching

Restricts the possible parent list, if the MAP has a non-default BGN, and the potential parent has a different BGN

enable

Enables a Cisco lightweight access point's group name.

disable

Disables a Cisco lightweight access point's group name.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.
8.0

The strict-matching parameter was added.

Usage Guidelines

Only access points with the same bridge group name can connect to each other. Changing the AP bridgegroupname may strand the bridge AP.

Examples

The following example shows how to delete a bridge group name on Cisco access point’s bridge group name AP02:

(Cisco Controller) >config ap bridgegroupname delete AP02
Changing the AP's bridgegroupname may strand the bridge AP. Please continue with caution.
Changing the AP's bridgegroupname will also cause the AP to reboot.
Are you sure you want to continue? (y/n)

config ap bridging

To configure Ethernet-to-Ethernet bridging on a Cisco lightweight access point, use the config ap bridging command.

config ap bridging { enable | disable} cisco_ap

Syntax Description

enable

Enables the Ethernet-to-Ethernet bridging on a Cisco lightweight access point.

disable

Disables Ethernet-to-Ethernet bridging.

cisco_ap

Name of a Cisco lightweight access point.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to enable bridging on an access point:

(Cisco Controller) >config ap bridging enable nyc04-44-1240

The following example shows hot to disable bridging on an access point:

(Cisco Controller) >config ap bridging disable nyc04-44-1240

config ap cdp

To configure the Cisco Discovery Protocol (CDP) on a Cisco lightweight access point, use the config ap cdp command.

config ap cdp { enable | disable | interface { ethernet interface_number | slot slot_id}} { cisco_ap | all}

Syntax Description

enable

Enables CDP on an access point.

disable

Disables CDP on an access point.

interface

Configures CDP in a specific interface.

ethernet

Configures CDP for an ethernet interface.

interface_number

Ethernet interface number between 0 and 3.

slot

Configures CDP for a radio interface.

slot_id

Slot number between 0 and 3.

cisco_ap

Name of a Cisco lightweight access point.

all

Specifies all access points.


Note

If an AP itself is configured with the keyword all, the all access points case takes precedence over the AP that is with the keyword all.


Command Default

Enabled on radio interfaces of mesh APs and disabled on radio interfaces of non-mesh APs. Enabled on Ethernet interfaces of all APs.

Usage Guidelines

The config ap cdp disable all command disables CDP on all access points that are joined to the controller and all access points that join in the future. CDP remains disabled on both current and future access points even after the controller or access point reboots. To enable CDP, enter the config ap cdp enable all command.


Note

CDP over Ethernet/radio interfaces is available only when CDP is enabled. After you enable CDP on all access points joined to the controller, you may disable and then reenable CDP on individual access points using the config ap cdp {enable | disable} cisco_ap command . After you disable CDP on all access points joined to the controller, you may not enable and then disable CDP on individual access points.


Examples

The following example shows how to enable CDP on all access points:

(Cisco Controller) >config ap cdp enable all

The following example shows how to disable CDP on ap02 access point:

(Cisco Controller) >config ap cdp disable ap02

The following example shows how to enable CDP for Ethernet interface number 2 on all access points:

(Cisco Controller) >config ap cdp ethernet 2 enable all

config ap core-dump

To configure a Cisco lightweight access point’s memory core dump, use the config ap core-dump command.

config ap core-dump { disable | enable tftp_server_ipaddress filename { compress | uncompress} { cisco_ap | all}

Syntax Description

enable

Enables the Cisco lightweight access point’s memory core dump setting.

disable

Disables the Cisco lightweight access point’s memory core dump setting.

tftp_server_ipaddress

IP address of the TFTP server to which the access point sends core dump files.

filename

Name that the access point uses to label the core file.

compress

Compresses the core dump file.

uncompress

Uncompresses the core dump file.

cisco_ap

Name of a Cisco lightweight access point.

all

Specifies all access points.


Note

If an AP itself is configured with the name ‘all’, then the ‘all access points’ case takes precedence over the AP that is named ‘all’.


Command Default

None

Usage Guidelines

The access point must be able to reach the TFTP server.

Examples

The following example shows how to configure and compress the core dump file:

(Cisco Controller) >config ap core-dump enable 209.165.200.225 log compress AP02

config ap crash-file clear-all

To delete all crash and radio core dump files, use the config ap crash-file clear-all command.

config ap crash-file clear-all

Syntax Description

This command has no arguments or keywords.

Command Default

None

Examples

The following example shows how to delete all crash files:

(Cisco Controller) >config ap crash-file clear-all

config ap crash-file delete

To delete a single crash or radio core dump file, use the config ap crash-file delete command.

config ap crash-file delete filename

Syntax Description

filename

Name of the file to delete.

Command Default

None

Examples

The following example shows how to delete crash file 1:

(Cisco Controller) >config ap crash-file delete crash_file_1

config ap crash-file get-crash-file

To collect the latest crash data for a Cisco lightweight access point, use the config ap crash-file get-crash-file command.

config ap crash-file get-crash-file cisco_ap

Syntax Description

cisco_ap

Name of the Cisco lightweight access point.

Command Default

None

Usage Guidelines

Use the transfer upload datatype command to transfer the collected data to the Cisco wireless LAN controller.

Examples

The following example shows how to collect the latest crash data for access point AP3:

(Cisco Controller) >config ap crash-file get-crash-file AP3

config ap crash-file get-radio-core-dump

To get a Cisco lightweight access point’s radio core dump, use the config ap crash-file get-radio-core-dump command.

config ap crash-file get-radio-core-dump slot_id cisco_ap

Syntax Description

slot_id

Slot ID (either 0 or 1).

cisco_ap

Name of a Cisco lightweight access point.

Command Default

None

Examples

The following example shows how to collect the radio core dump for access point AP02 and slot 0:

(Cisco Controller) >config ap crash-file get-radio-core-dump 0 AP02

config ap 802.1Xuser

To configure the global authentication username and password for all access points currently associated with the controller as well as any access points that associate with the controller in the future, use the config ap 802.1Xuser command.

config ap 802.1Xuser add username ap-username password ap-password { all | cisco_ap}

Syntax Description

add username

Specifies to add a username.

ap-username

Username on the Cisco AP.

password

Specifies to add a password.

ap-password

Password.

cisco_ap

Specific access point.

all

Specifies all access points.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

You must enter a strong password . Strong passwords have the following characteristics:

  • They are at least eight characters long.

  • They contain a combination of uppercase and lowercase letters, numbers, and symbols.

  • They are not a word in any language.

    You can set the values for a specific access point.

Examples

This example shows how to configure the global authentication username and password for all access points:

(Cisco Controller) >config ap 802.1Xuser add username cisco123 password cisco2020 all

config ap 802.1Xuser delete

To force a specific access point to use the controller’s global authentication settings, use the config ap 802.1Xuser delete command.

config ap 802.1Xuser delete cisco_ap

Syntax Description

cisco_ap

Access point.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to delete access point AP01 to use the controller’s global authentication settings:

(Cisco Controller) >config ap 802.1Xuser delete AP01

config ap 802.1Xuser disable

To disable authentication for all access points or for a specific access point, use the config ap 802.1Xuser disable command.

config ap 802.1Xuser disable { all | cisco_ap}

Syntax Description

disable

Disables authentication.

all

Specifies all access points.

cisco_ap

Access point.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

You can disable 802.1X authentication for a specific access point only if global 802.1X authentication is not enabled. If global 802.1X authentication is enabled, you can disable 802.1X for all access points only.

Examples

The following example shows how to disable the authentication for access point cisco_ap1:

(Cisco Controller) >config ap 802.1Xuser disable 

config ap dhcp release-override

To configure DHCP release override on Cisco APs, use the config ap dhcp release-override command.

config ap dhcp release-override { enable | disable} { cisco-ap-name | all}

Syntax Description

enable

Enables DHCP release override and sets number of DHCP releases sent by AP to 1. To be used as a workaround for a few DHCP servers that mark the AP's IP address as bad. We recommend that you use this configuration only in highly reliable networks.

disable

Disables DHCP release override and sets number of DHCP releases sent by AP to 3, which is the default value. This ensures that the DHCP server receives the release message even if one of the packets is lost.

cisco-ap-name

Configuration is applied to the Cisco AP that you enter

all

Configuration is applied to all Cisco APs

Command Default

Disabled

Usage Guidelines

Use this command when you are using Cisco lightweight APs with Windows Server 2008 R2 or 2012 as the DHCP server.

config ap ethernet duplex

To configure the Ethernet port duplex and speed settings of the lightweight access points, use the config ap ethernet duplex command.

config ap ethernet duplex [ auto | half | full] speed [ auto | 10 | 100 | 1000] { all | cisco_ap}

Syntax Description

auto

(Optional) Specifies the Ethernet port duplex auto settings.

half

(Optional) Specifies the Ethernet port duplex half settings.

full

(Optional) Specifies the Ethernet port duplex full settings.

speed

Specifies the Ethernet port speed settings.

auto

(Optional) Specifies the Ethernet port speed to auto.

10

(Optional) Specifies the Ethernet port speed to 10 Mbps.

100

(Optional) Specifies the Ethernet port speed to 100 Mbps.

1000

(Optional) Specifies the Ethernet port speed to 1000 Mbps.

all

Specifies the Ethernet port setting for all connected access points.

cisco_ap

Cisco access point.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the Ethernet port duplex half settings as 10 Mbps for all access points:

(Cisco Controller) >config ap ethernet duplex half speed 10 all

config ap ethernet tag

To configure VLAN tagging of the Control and Provisioning of Wireless Access Points protocol (CAPWAP) packets, use the config ap ethernet tag command.

config ap ethernet tag { id vlan_id | disable} { cisco_ap | all}

Syntax Description

id

Specifies the VLAN id.

vlan_id

ID of the trunk VLAN.

disable

Disables the VLAN tag feature. When you disable VLAN tagging, the access point untags the CAPWAP packets.

cisco_ap

Name of the Cisco AP.

all

Configures VLAN tagging on all the Cisco access points.

Command Default

None

Usage Guidelines

After you configure VLAN tagging, the configuration comes into effect only after the access point reboots.

You cannot configure VLAN tagging on mesh access points.

If the access point is unable to route traffic or reach the controller using the specified trunk VLAN, it falls back to the untagged configuration. If the access point joins the controller using this fallback configuration, the controller sends a trap to a trap server such as the Cisco Prime Infrastructure, which indicates the failure of the trunk VLAN. In this scenario, the "Failover to untagged" message appears in show command output.

Examples

The following example shows how to configure VLAN tagging on a trunk VLAN:

(Cisco Controller) >config ap ethernet tag 6 AP1

config ap group-name

To specify a descriptive group name for a Cisco lightweight access point, use the config ap group-name command.

config ap group-name groupname cisco_ap

Syntax Description

groupname

Descriptive name for the access point group.

cisco_ap

Name of the Cisco lightweight access point.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

The Cisco lightweight access point must be disabled before changing this parameter.

Examples

The following example shows how to configure a descriptive name for access point AP01:

(Cisco Controller) >config ap group-name superusers AP01

config ap hotspot

To configure hotspot parameters on an access point, use the config ap hotspot command.

config ap hotspot venue { type group_code type_code | name { add language_code venue_name | delete}} cisco_ap


Syntax Description

venue

Configures venue information for given AP group.

type

Configures the type of venue for given AP group.

group_code

Venue group information for given AP group.

The following options are available:

  • 0—UNSPECIFIED

  • 1—ASSEMBLY

  • 2—BUSINESS

  • 3—EDUCATIONAL

  • 4—FACTORY-INDUSTRIAL

  • 5—INSTITUTIONAL

  • 6—MERCANTILE

  • 7—RESIDENTIAL

  • 8—STORAGE

  • 9—UTILITY-MISC

  • 10—VEHICULAR

  • 11—OUTDOOR

type_code

Venue type information for the AP group.

For venue group 1 (ASSEMBLY), the following options are available:

  • 0—UNSPECIFIED ASSEMBLY

  • 1—ARENA

  • 2—STADIUM

  • 3—PASSENGER TERMINAL

  • 4—AMPHITHEATER

  • 5—AMUSEMENT PARK

  • 6—PLACE OF WORSHIP

  • 7—CONVENTION CENTER

  • 8—LIBRARY

  • 9—MUSEUM

  • 10—RESTAURANT

  • 11—THEATER

  • 12—BAR

  • 13—COFFEE SHOP

  • 14—ZOO OR AQUARIUM

  • 15—EMERGENCY COORDINATION CENTER

For venue group 2 (BUSINESS), the following options are available:

  • 0—UNSPECIFIED BUSINESS

  • 1—DOCTOR OR DENTIST OFFICE

  • 2—BANK

  • 3—FIRE STATION

  • 4—POLICE STATION

  • 6—POST OFFICE

  • 7—PROFESSIONAL OFFICE

  • 8—RESEARCH AND DEVELOPMENT FACILITY

  • 9—ATTORNEY OFFICE

For venue group 3 (EDUCATIONAL), the following options are available:

  • 0—UNSPECIFIED EDUCATIONAL

  • 1—PRIMARY SCHOOL

  • 2—SECONDARY SCHOOL

  • 3—UNIVERSITY OR COLLEGE

For venue group 4 (FACTORY-INDUSTRIAL), the following options are available:

  • 0—UNSPECIFIED FACTORY AND INDUSTRIAL

  • 1—FACTORY

For venue group 5 (INSTITUTIONAL), the following options are available:

  • 0—UNSPECIFIED INSTITUTIONAL

  • 1—HOSPITAL

  • 2—LONG-TERM CARE FACILITY

  • 3—ALCOHOL AND DRUG RE-HABILITATION CENTER

  • 4—GROUP HOME

  • 5 :PRISON OR JAIL

type_code

For venue group 6 (MERCANTILE), the following options are available:

  • 0—UNSPECIFIED MERCANTILE

  • 1—RETAIL STORE

  • 2—GROCERY MARKET

  • 3—AUTOMOTIVE SERVICE STATION

  • 4—SHOPPING MALL

  • 5—GAS STATION

For venue group 7 (RESIDENTIAL), the following options are available:

  • 0—UNSPECIFIED RESIDENTIAL

  • 1—PRIVATE RESIDENCE

  • 2—HOTEL OR MOTEL

  • 3—DORMITORY

  • 4—BOARDING HOUSE

For venue group 8 (STORAGE), the option is:

  • 0—UNSPECIFIED STORAGE

For venue group 9 (UTILITY-MISC), the option is:

  • 0—UNSPECIFIED UTILITY AND MISCELLANEOUS

For venue group 10 (VEHICULAR), the following options are available:

  • 0—UNSPECIFIED VEHICULAR

  • 1—AUTOMOBILE OR TRUCK

  • 2—AIRPLANE

  • 3—BUS

  • 4—FERRY

  • 5—SHIP OR BOAT

  • 6—TRAIN

  • 7—MOTOR BIKE

For venue group 11 (OUTDOOR), the following options are available:

  • 0—UNSPECIFIED OUTDOOR

  • 1—MINI-MESH NETWORK

  • 2—CITY PARK

  • 3—REST AREA

  • 4—TRAFFIC CONTROL

  • 5—BUS STOP

  • 6—KIOSK

name

Configures the name of venue for this access point.

language_code

ISO-639 encoded string defining the language used at the venue. This string is a three-character language code. For example, you can enter ENG for English.

venue_name

Venue name for this access point. This name is associated with the basic service set (BSS) and is used in cases where the SSID does not provide enough information about the venue. The venue name is case sensitive and can be up to 252 alphanumeric characters.

add

Adds the HotSpot venue name for this access point.

delete

Deletes the HotSpot venue name for this access point.

cisco_ap

Name of the Cisco access point.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the venue group as educational and venue type as university:

(Cisco Controller) >config ap hotspot venue type 3 3

config ap image predownload

To configure an image on a specified access point, use the config ap image predownload command.

config ap image predownload { abort | primary | backup} { cisco_ap | all}

Syntax Description

abort

Terminates the predownload image process.

primary

Predownloads an image to a Cisco access point from the controller's primary image.

cisco_ap

Name of a Cisco lightweight access point.

all

(Cisco Controller) >

Specifies all access points to predownload an image.


Note

If an AP itself is configured with the keyword all, the all access points case takes precedence over the AP that is with the keyword all.


Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to predownload an image to an access point from the primary image:

(Cisco Controller) >config ap image predownload primary all

config ap image swap

To swap an access point’s primary and backup images, use the config ap image swap command.

config ap image swap { cisco_ap | all}

Syntax Description

cisco_ap

Name of a Cisco lightweight access point.

all

Specifies all access points to interchange the boot images.


Note

If an AP itself is configured with the keyword all, the all access points case takes precedence over the AP that is with the keyword all.


Command Default

None

Examples

The following example shows how to swap an access point’s primary and secondary images:

(Cisco Controller) >config ap image swap all

config ap led-state

To configure the LED state of an access point or to configure the flashing of LEDs, use the config ap led-state command.

config ap led-state { enable | disable} { cisco_ap | all}

config ap led-state flash { seconds | indefinite | disable} { cisco_ap | dual-band}

Syntax Description

enable

Enables the LED state of an access point.

disable

Disables the LED state of an access point.

cisco_ap

Name of a Cisco lightweight access point.

flash

Configure the flashing of LEDs for an access point.

seconds

Duration that the LEDs have to flash. The range is from 1 to 3600 seconds.

indefinite

Configures indefinite flashing of the access point’s LED.

dual-band

Configures the LED state for all dual-band access points.

Usage Guidelines


Note

If an AP itself is configured with the keyword all, the all access points case takes precedence over the AP that is with the keyword all.


LEDs on access points with dual-band radio module will flash green and blue when you execute the led state flash command.

Command Default

None

Examples

The following example shows how to enable the LED state for an access point:

(Cisco Controller) >config ap led-state enable AP02

The following example shows how to enable the flashing of LEDs for dual-band access points:

(Cisco Controller) >config ap led-state flash 20 dual-band

config ap link-encryption

To configure the Datagram Transport Layer Security (DTLS) data encryption for access points on the 5500 series controller, use the config ap link-encryption command.


Note

If an AP itself is configured with the keyword all, the all access points case takes precedence over the AP that is with the keyword all.


config ap link-encryption { enable | disable} { cisco_ap | all}

Syntax Description

enable

Enables the DTLS data encryption for access points.

disable

Disables the DTLS data encryption for access points.

cisco_ap

Name of a Cisco lightweight access point.

all

Specifies all access points.

Command Default

DTLS data encryption is enabled automatically for OfficeExtend access points but disabled by default for all other access points.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

Only Cisco 5500 Series Controllers support DTLS data encryption. This feature is not available on other controller platforms. If an access point with data encryption enabled tries to join any other controller, the access point joins the controller, but data packets are sent unencrypted.

Only Cisco 1130, 1140, 1240, and 1250 series access points support DTLS data encryption, and data-encrypted access points can join a Cisco 5500 Series Controller only if the wplus license is installed on the controller. If the wplus license is not installed, the access points cannot join the controller.

Examples

The following example shows how to enable the data encryption for an access point:

(Cisco Controller) >config ap link-encryption enable AP02

config ap link-latency

To configure link latency for a specific access point or for all access points currently associated to the controller, use the config ap link-latency command:


Note

If an AP itself is configured with the keyword all, the all access points case takes precedence over the AP that is with the keyword all.


config ap link-latency { enable | disable | reset} { cisco_ap | all}

Syntax Description

enable

Enables the link latency for an access point.

disable

Disables the link latency for an access point.

reset

Resets all link latency for all access points.

cisco_ap

Name of the Cisco lightweight access point.

all

Specifies all access points.

Command Default

By default, link latency is in disabled state.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

This command enables or disables link latency only for access points that are currently joined to the controller. It does not apply to access points that join in the future.

Examples

The following example shows how to enable the link latency for all access points:

(Cisco Controller) >config ap link-latency enable all

config ap location

To modify the descriptive location of a Cisco lightweight access point, use the config ap location command.

config ap location location cisco_ap

Syntax Description

location

Location name of the access point (enclosed by double quotation marks).

cisco_ap

Name of the Cisco lightweight access point.

Command Default

None

Usage Guidelines

The Cisco lightweight access point must be disabled before changing this parameter.

Examples

The following example shows how to configure the descriptive location for access point AP1:

(Cisco Controller) >config ap location “Building 1” AP1

config ap logging syslog level

To set the severity level for filtering syslog messages for a particular access point or for all access points, use the config ap logging syslog level command.

config ap logging syslog level severity_level { cisco_ap | all}

Syntax Description

severity_level

Severity levels are as follows:

  • emergencies—Severity level 0

  • alerts—Severity level 1

  • critical—Severity level 2

  • errors—Severity level 3

  • warnings—Severity level 4

  • notifications—Severity level 5

  • informational—Severity level 6

  • debugging—Severity level 7

cisco_ap

Cisco access point.

all

Specifies all access points.


Note

If an AP itself is configured with the keyword all, the all access points case takes precedence over the AP that is with the keyword all.


Command Default

None

Usage Guidelines

If you set a syslog level, only those messages whose severity is equal to or less than that level are sent to the access point. For example, if you set the syslog level to Warnings (severity level 4), only those messages whose severity is between 0 and 4 are sent to the access point.

Examples

This example shows how to set the severity for filtering syslog messages to 3:

(Cisco Controller) >config ap logging syslog level 3

config ap max-count

To configure the maximum number of access points supported by the Cisco Wireless LAN Controller (WLC), use the config ap max-count command.

config ap max-count number

Syntax Description

number

Number of access points supported by the Cisco WLC.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

The access point count of the Cisco WLC license overrides this count if the configured value is greater than the access point count of the license. A value of 0 indicates that there is no restriction on the maximum number of access points. If high availability is configured, you must reboot both the active and the standby Cisco WLCs after you configure the maximum number of access points supported by the Cisco WLC.

Examples

The following example shows how to configure the number of access points supported by the Cisco WLC:

(Cisco Controller) >config ap max-count 100

config ap mgmtuser add

To configure username, password, and secret password for AP management, use the config ap mgmtuser add command.

config ap mgmtuser add username AP_username password AP_password secret secret 
{ all | cisco_ap}

Syntax Description

username

Configures the username for AP management.

AP_username

Management username.

password

Configures the password for AP management.

AP_password

AP management password.

secret

Configures the secret password for privileged AP management.

secret

AP managemetn secret password.

all

Applies configuration to every AP that does not have a specific username.

cisco_ap

Cisco access point.

Command Default

None

Usage Guidelines

The following requirements are enforced on the password:

  • The password should contain characters from at least three of the following classes: lowercase letters, uppercase letters, digits, and special characters.

  • No character in the password can be repeated more than three times consecutively.

  • The password sould not contain management username or reverse of usename.

  • The password should not contain words like Cisco, oscic, admin, nimda or any variant obtained by changing the capitalization of letters by substituting 1, |, or ! or substituting 0 for o or substituting $ for s.

    The following requirement is enforced on the secret password:

  • The secret password should contain characters from at least three of the following classes: lowercase letters, uppercase letters, digits, or special characters.

Examples

The following example shows how to add a username, password, and secret password for AP management:

(Cisco Controller) > config ap mgmtuser add username acd password Arc_1234 secret Mid_45 all

config ap mgmtuser delete

To force a specific access point to use the controller’s global credentials, use the config ap mgmtuser delete command.

config ap mgmtuser delete cisco_ap

Syntax Description

cisco_ap

Access point.

Command Default

None

Examples

The following example shows how to delete the credentials of an access point:


(Cisco Controller) > config ap mgmtuser delete cisco_ap1

config ap mode

To change a Cisco WLC communication option for an individual Cisco lightweight access point, use the config ap mode command.

config ap mode { bridge | flexconnect submode { none | wips} | local submode { none | wips} | reap | rogue | sniffer | se-connect | monitor submode { none | wips} | } cisco_ap

Syntax Description

bridge

Converts from a lightweight access point to a mesh access point (bridge mode).

flexconnect

Enables FlexConnect mode on an access point.

local

Converts from an indoor mesh access point (MAP or RAP) to a nonmesh lightweight access point (local mode).

reap

Enables remote edge access point mode on an access point.

rogue

Enables wired rogue detector mode on an access point.

sniffer

Enables wireless sniffer mode on an access point.

se-connect

Enables flex+bridge mode on an access point.

flex+bridge

Enables spectrum expert mode on an access point.

submode

(Optional) Configures wIPS submode on an access point.

none

Disables the wIPS on an access point.

wips

Enables the wIPS submode on an access point.

cisco_ap

Name of the Cisco lightweight access point.

Command Default

Local

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

The sniffer mode captures and forwards all the packets from the clients on that channel to a remote machine that runs AiroPeek or other supported packet analyzer software. It includes information on the timestamp, signal strength, packet size and so on.

Examples

The following example shows how to set the controller to communicate with access point AP91 in bridge mode:


(Cisco Controller) > config ap mode bridge AP91

The following example shows how to set the controller to communicate with access point AP01 in local mode:


(Cisco Controller) > config ap mode local AP01

The following example shows how to set the controller to communicate with access point AP91 in remote office (REAP) mode:


(Cisco Controller) > config ap mode flexconnect AP91

The following example shows how to set the controller to communicate with access point AP91 in a wired rogue access point detector mode:


(Cisco Controller) > config ap mode rogue AP91

The following example shows how to set the controller to communicate with access point AP02 in wireless sniffer mode:

(Cisco Controller) > config ap mode sniffer AP02

config ap monitor-mode

To configure Cisco lightweight access point channel optimization, use the config ap monitor-mode command.

config ap monitor-mode { 802.11b fast-channel | no-optimization | tracking-opt | wips-optimized} cisco_ap

Syntax Description

802.11b fast-channel

Configures 802.11b scanning channels for a monitor-mode access point.

no-optimization

Specifies no channel scanning optimization for the access point.

tracking-opt

Enables tracking optimized channel scanning for the access point.

wips-optimized

Enables wIPS optimized channel scanning for the access point.

cisco_ap

Name of the Cisco lightweight access point.

Command Default

None

Examples

The following example shows how to configure a Cisco wireless intrusion prevention system (wIPS) monitor mode on access point AP01:

(Cisco Controller) > config ap monitor-mode wips-optimized AP01

config ap name

To modify the name of a Cisco lightweight access point, use the config ap name command.

config ap name new_name old_name

Syntax Description

new_name

Desired Cisco lightweight access point name.

old_name

Current Cisco lightweight access point name.

Command Default

None

Examples

The following example shows how to modify the name of access point AP1 to AP2:


(Cisco Controller) > config ap name AP1 AP2

config ap packet-dump

To configure the Packet Capture parameters on access points, use the config ap packet-dump command.

config ap packet-dump { buffer-size Size _in_KB| capture-time Time_in_Min| ftp serverip IP_addr path path username usernamepassword password | start MAC_address Cisco_AP | stop | truncate Length_in_Bytes}

config ap packet-dump classifier {{ arp | broadcast | control | data | dot1x | iapp | ip | management | multicast } { enable | disable} | tcp { enable | disable | port TCP_Port { enable | disable} } | udp { enable | disable | port UDP_Port { enable | disable} } }

Syntax Description

buffer-size

Configures the buffer size for Packet Capture in the access point.

Size _in_KB

Size of the buffer. The range is from 1024 to 4096 KB.

capture-time

Configures the timer value for Packet Capture.

Time_in_Min

Timer value for Packet Capture. The range is from 1 to 60 minutes.

ftp

Configures FTP parameters for Packet Capture.

serverip

Configures the FTP server.

IP_addr

IP address of the FTP server.

path path

Configures FTP server path.

username user_ID

Configures the username for the FTP server.

password password

Configures the password for the FTP server.

start

Starts Packet Capture from the access point.

MAC_address

Client MAC Address for Packet Capture.

Cisco_AP

Name of the Cisco access point.

stop

Stops Packet Capture from the access point.

truncate

Truncates the packet to the specified length during Packet Capture.

Length_in_Bytes

Length of the packet after truncation. The range is from 20 to 1500.

classifier

Configures the classifier information for Packet Capture. You can specify the type of packets that needs to be captured.

arp

Captures ARP packets.

enable

Enables capture of ARP, broadcast, 802.11 control, 802.11 data, dot1x, Inter Access Point Protocol (IAPP), IP, 802.11 management, or multicast packets.

disable

Disables capture of ARP, broadcast, 802.11 control, 802.11 data, dot1x, IAPP, IP, 802.11management, or multicast packets.

broadcast

Captures broadcast packets.

control

Captures 802.11 control packets.

data

Captures 802.11 data packets.

dot1x

Captures dot1x packets.

iapp

Captures IAPP packets.

ip

Captures IP packets.

management

Captures 802.11 management packets.

multicast

Captures multicast packets.

tcp

Captures TCP packets.

TCP_Port

TCP port number. The range is from 1 to 65535.

udp

Captures TCP packets.

UDP_Port

UDP port number. The range is from 1 to 65535.

ftp

Configures FTP parameters for Packet Capture.

server_ip

FTP server IP address.

Command Default

The default buffer size is 2 MB. The default capture time is 10 minutes.

Usage Guidelines

Packet Capture does not work during intercontroller roaming.

The controller does not capture packets created in the radio firmware and sent out of the access point, such as a beacon or probe response. Only packets that flow through the Radio driver in the Tx path will be captured.

Use the command config ap packet-dump start to start the Packet Capture from the access point. When you start Packet Capture, the controller sends a Control and Provisioning of Wireless Access Points protocol (CAPWAP) message to the access point to which the client is associated and captures packets. You must configure the FTP server and ensure that the client is associated to the access point before you start Packet Capture. If the client is not associated to the access point, you must specify the name of the access point.

Examples

The following example shows how to start Packet Capture from an access point:


(Cisco Controller) >config ap packet-dump start 00:0d:28:f4:c0:45 AP1

The following example shows how to capture 802.11 control packets from an access point:


(Cisco Controller) >config ap packet-dump classifier control enable

config ap port

To configure the port for a foreign access point, use the config ap port command.

config ap port MAC port

Syntax Description

MAC

Foreign access point MAC address.

port

Port number for accessing the foreign access point.

Command Default

None

Examples

The following example shows how to configure the port for a foreign access point MAC address:

(Cisco Controller) > config ap port 12:12:12:12:12:12 20

config ap power injector

To configure the power injector state for an access point, use the config ap power injector command.

config ap power injector { enable | disable} { cisco_ap | all} { installed | override | switch_MAC}

Syntax Description

enable

Enables the power injector state for an access point.

disable

Disables the power injector state for an access point.

cisco_ap

Name of the Cisco lightweight access point.

all

Specifies all Cisco lightweight access points connected to the controller.

installed

Detects the MAC address of the current switch port that has a power injector.

override

Overrides the safety checks and assumes a power injector is always installed.

switch_MAC

MAC address of the switch port with an installed power injector.


Note

If an AP itself is configured with the keyword all, the all access points case takes precedence over the AP that is with the keyword all.


Command Default

None

Examples

The following example shows how to enable the power injector state for all access points:

(Cisco Controller) > config ap power injector enable all 12:12:12:12:12:12

config ap power pre-standard

To enable or disable the inline power Cisco pre-standard switch state for an access point, use the config ap power pre-standard command.

config ap power pre-standard { enable | disable} cisco_ap

Syntax Description

enable

Enables the inline power Cisco pre-standard switch state for an access point.

disable

Disables the inline power Cisco pre-standard switch state for an access point.

cisco_ap

Name of the Cisco lightweight access point.

Command Default

Disabled.

Examples

The following example shows how to enable the inline power Cisco pre-standard switch state for access point AP02:


(Cisco Controller) > config ap power pre-standard enable AP02

config ap primary-base

To set the Cisco lightweight access point primary Cisco WLC, use the config ap primary-base command.

config ap primary-base controller_name Cisco_AP[ controller_ip_address]

Syntax Description

controller_name

Name of the Cisco WLC.

Cisco_AP

Cisco lightweight access point name.

controller_ip_address

(Optional) If the backup controller is outside the mobility group to which the access point is connected, then you need to provide the IP address of the primary, secondary, or tertiary controller.

Note 

For OfficeExtend access points, you must enter both the name and IP address of the controller. Otherwise, the access point cannot join this controller.

Command Default

None

Usage Guidelines

The Cisco lightweight access point associates with this Cisco WLC for all network operations and in the event of a hardware reset.

OfficeExtend access points do not use the generic broadcast or over-the air (OTAP) discovery process to find a controller. You must configure one or more controllers because OfficeExtend access points try to connect only to their configured controllers.

Examples

The following example shows how to set an access point primary Cisco WLC IPv4 address for an Cisco AP:


(Cisco Controller) > config ap primary-base SW_1 AP2 10.0.0.0

config ap priority

To assign a priority designation to an access point that allows it to reauthenticate after a controller failure by priority rather than on a first-come-until-full basis, use the config ap priority command.

config ap priority { 1 | 2 | 3 | 4} cisco_ap

Syntax Description

1

Specifies low priority.

2

Specifies medium priority.

3

Specifies high priority.

4

Specifies the highest (critical) priority.

cisco_ap

Cisco lightweight access point name.

Command Default

1 - Low priority.

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

In a failover situation, if the backup controller does not have enough ports to allow all the access points in the affected area to reauthenticate, it gives priority to higher-priority access points over lower-priority ones, even if it means replacing lower-priority access points.

Examples

The following example shows how to assign a priority designation to access point AP02 that allows it to reauthenticate after a controller failure by assigning a reauthentication priority 3:


(Cisco Controller) > config ap priority 3 AP02

config ap reporting-period

To reset a Cisco lightweight access point, use the config ap reporting-period command.

config ap reporting-period period

Syntax Description

period

Time period in seconds between 10 and 120.

Command Default

None

Examples

The following example shows how to reset an access point reporting period to 120 seconds:


> config ap reporting-period 120

config ap reset

To reset a Cisco lightweight access point, use the config ap reset command.

config ap reset cisco_ap

Syntax Description

cisco_ap

Cisco lightweight access point name.

Command Default

None

Examples

The following example shows how to reset an access point:


(Cisco Controller) > config ap reset AP2

config ap retransmit interval

To configure the access point control packet retransmission interval, use the config ap retransmit interval command.

config ap retransmit interval seconds { all | cisco_ap}

Syntax Description

seconds

AP control packet retransmission timeout between 2 and 5 seconds.

all

Specifies all access points.

cisco_ap

Cisco lightweight access point name.

Command Default

None

Examples

The following example shows how to configure the retransmission interval for all access points globally:


(Cisco Controller) > config ap retransmit interval 4 all

config ap retransmit count

To configure the access point control packet retransmission count, use the config ap retransmit count command.

config ap retransmit count count { all | cisco_ap}

Syntax Description

count

Number of times control packet will be retransmitted. The range is from 3 to 8.

all

Specifies all access points.

cisco_ap

Cisco lightweight access point name.

Command Default

None

Examples

The following example shows how to configure the retransmission retry count for a specific access point:


(Cisco Controller) > config ap retransmit count 6 cisco_ap

config ap role

To specify the role of an access point in a mesh network, use the config ap role command.

config ap role { rootAP | meshAP} cisco_ap

Syntax Description

rootAP

Designates the mesh access point as a root access point (RAP).

meshAP

Designates the mesh access point as a mesh access point (MAP).

cisco_ap

Name of the Cisco lightweight access point.

Command Default

meshAP .

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

Use the meshAP keyword if the access point has a wireless connection to the controller, or use the rootAP keyword if the access point has a wired connection to the controller. If you change the role of the AP, the AP will be rebooted.

Examples

The following example shows how to designate mesh access point AP02 as a root access point:


(Cisco Controller) > config ap role rootAP AP02
Changing the AP's role will cause the AP to reboot.
Are you sure you want to continue? (y/n)

config ap rst-button

To configure the Reset button for an access point, use the config ap rst-button command.

config ap rst-button { enable | disable} cisco_ap

Syntax Description

enable

Enables the Reset button for an access point.

disable

Disables the Reset button for an access point.

cisco_ap

Name of the Cisco lightweight access point.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Examples

The following example shows how to configure the Reset button for access point AP03:


(Cisco Controller) > config ap rst-button enable AP03

config ap secondary-base

To set the Cisco lightweight access point secondary Cisco WLC, use the config ap secondary-base command.

config ap secondary-base Controller_name Cisco_AP [ Controller_IP_address]

Syntax Description

controller_name

Name of the Cisco WLC.

Cisco_AP

Cisco lightweight access point name.

Controller_IP_address

(Optional). If the backup Cisco WLC is outside the mobility group to which the access point is connected, then you need to provide the IP address of the primary, secondary, or tertiary Cisco WLC.

Note 

For OfficeExtend access points, you must enter both the name and IP address of the Cisco WLC. Otherwise, the access point cannot join this Cisco WLC.

Command Default

None

Command History

Release Modification
7.6 This command was introduced in a release earlier than Release 7.6.

Usage Guidelines

The Cisco lightweight access point associates with this Cisco WLC for all network operations and in the event of a hardware reset.

OfficeExtend access points do not use the generic broadcast or over-the air (OTAP) discovery process to find a Cisco WLC. You must configure one or more Cisco WLCs because OfficeExtend access points try to connect only to their configured Cisco WLCs.

Examples

The following example shows how to set an access point secondary Cisco WLC:


(Cisco Controller) > config ap secondary-base SW_1 AP2 10.0.0.0
			

config ap sniff

To enable or disable sniffing on an access point, use the config ap sniff command.

config ap sniff { 802.11a | 802.11b} { enable channel server_ip | disable} cisco_ap

Syntax Description

802.11a

Specifies the 802.11a network.

802.11b

Specifies the 802.11b network.

enable

Enables sniffing on an access point.

channel

Channel to be sniffed.

server_ip

IP address of the remote machine running Omnipeek, Airopeek,AirMagnet, or Wireshark software.

disable

Disables sniffing on an access point.

cisco_ap

Access point configured as the sniffer.

Command Default

Channel 36.

Usage Guidelines

When the sniffer feature is enabled on an access point, it starts sniffing the signal on the given channel. It captures and forwards all the packets to the remote computer that runs Omnipeek, Airopeek, AirMagnet, or Wireshark software. It includes information on the timestamp, signal strength, packet size and so on.

Before an access point can act as a sniffer, a remote computer that runs one of the listed packet analyzers must be set up so that it can receive packets sent by the access point. After the Airopeek installation, copy the following .dll files to the location where airopeek is installed:

  • socket.dll file to the Plug-ins folder (for example, C:\Program Files\WildPackets\AiroPeek\Plugins)

  • socketres.dll file to the PluginRes folder (for example, C:\Program Files\WildPackets\AiroPeek\ 1033\PluginRes)

Examples

The following example shows how to enable the sniffing on the 802.11a an access point from the primary Cisco WLC:


(Cisco Controller) > config ap sniff 80211a enable 23 11.22.44.55 AP01

config ap ssh

To enable Secure Shell (SSH) connectivity on an access point, use the config ap ssh command.

config ap ssh { enable | disable} cisco_ap

Syntax Description

enable

Enables the SSH connectivity on an access point.

disable

Disables the SSH connectivity on an access point.

cisco_ap

Cisco access point name.

Command Default

None

Usage Guidelines

The Cisco lightweight access point associates with this Cisco wireless LAN controller for all network operation and in the event of a hardware reset.

Examples

The following example shows how to enable SSH connectivity on access point Cisco_ap2:


> config ap ssh enable cisco_ap2

config ap static-ip

To configure Static IP address settings on Cisco lightweight access point , use the config ap static-ip command.

config ap static-ip { enable Cisco_AP AP_IP_addr IP_netmask /prefix_length gateway | disable Cisco_AP| add { domain { Cisco_AP | all} domain_name | nameserver { Cisco_AP | all} nameserver-ip} | delete { domain | nameserver} { Cisco_AP | all}}

Syntax Description

enable

Enables the Cisco lightweight access point static IP address.

disable

Disables the Cisco lightweight access point static IP address. The access point uses DHCP to get the IP address.

Cisco_AP

Cisco lightweight access point name.

AP_IP_addr

Cisco lightweight access point IP address

IP_netmask/prefix_length

Cisco lightweight access point network mask.

gateway

IP address of the Cisco lightweight access point gateway.

add

Adds a domain or DNS server.

domain

Specifies the domain to which a specific access point or all access points belong.

all

Specifies all access points.

domain_name

Specifies a domain name.

nameserver

Specifies a DNS server so that a specific access point or all access points can discover the controller using DNS resolution.

nameserver-ip

DNS server IP address.

delete

Deletes a domain or DNS server.


Note