C H A P T E R 3 Configuring Security Solutions 3-1Cisco Unified Wireless Network Solution Security 3-2 Layer 1 Solutions 3-2 Layer 2 Solutions 3-2 Layer 3 Solutions 3-2 Single Point of C
Trang 1Americas Headquarters
Cisco Systems, Inc
170 West Tasman Drive
Trang 2The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system All rights reserved Copyright © 1981, Regents of the University of California
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CCVP, the Cisco logo, and Welcome to the Human Network are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn is a service mark of Cisco Systems, Inc.; and Access Registrar, Aironet, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, LightStream, Linksys, MeetingPlace, MGX, Networkers, Networking Academy, Network Registrar, PIX, ProConnect, ScriptShare, SMARTnet, StackWise, The Fastest Way
to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc and/or its affiliates in the United States and certain other countries All other trademarks mentioned in this document or Website are the property of their respective owners The use of the word partner does not imply a partnership relationship between Cisco and any other company (0711R)
Trang 3Related Publications -xxiii
Obtaining Documentation, Obtaining Support, and Security Guidelines -xxiv
Relationship with Cisco Location Appliances 1-5
Comparison of WCS Base and WCS Location 1-6
Installing WCS for Windows 2-4
Installing WCS for Linux 2-10
Customizing Tabs on the WCS Home Page 2-17
Customizing Content on the WCS Home Page 2-18
Using the Cisco WCS User Interface 2-20
Menu Bar 2-21
Monitor Menu 2-21
Configure Menu 2-21
Trang 4C H A P T E R 3 Configuring Security Solutions 3-1
Cisco Unified Wireless Network Solution Security 3-2
Layer 1 Solutions 3-2
Layer 2 Solutions 3-2
Layer 3 Solutions 3-2
Single Point of Configuration Policy Manager Solutions 3-3
Rogue Access Point Solutions 3-3
Rogue Access Point Challenges 3-3
Tagging and Containing Rogue Access Points 3-3
Rogue Management 3-3
Integrated Security Solutions 3-4
Using WCS to Convert a Cisco Unified Wireless Network Solution from Layer 3 to Layer 2 Mode 3-5
Configuring a Firewall for WCS 3-6
Access Point Authorization 3-6
Management Frame Protection (MFP) 3-7
Guidelines for Using MFP 3-8
Configuring Intrusion Detection Systems (IDS) 3-9
Viewing IDS Sensors 3-9
Configuring IDS Signatures 3-9
Uploading IDS Signatures 3-12
Downloading IDS Signatures 3-13
Enabling or Disabling IDS Signatures 3-14
Viewing IDS Signature Events 3-17
Enabling Web Login 3-17
Downloading Customized Web Authentication 3-18
Connecting to the Guest WLAN 3-21
Deleting a Guest User 3-21
Certificate Signing Request (CSR) Generation 3-22
Trang 5C H A P T E R 4 Performing System Tasks 4-1
Adding System Components to the WCS Database 4-2
Adding a Controller to the WCS Database 4-2
Adding a Location Appliance to the WCS Database 4-2
Additional Functionality with Location Appliance 4-3
Using WCS to Update System Software 4-4
Downloading Vendor Device Certificates 4-5
Downloading Vendor CA Certificates 4-5
Using WCS to Enable Long Preambles for SpectraLink NetLink Phones 4-6
Creating an RF Calibration Model 4-7
C H A P T E R 5 Adding and Using Maps 5-1
Creating Maps 5-2
Adding a Campus 5-2
Adding Buildings 5-3
Adding a Building to a Campus Map 5-3
Adding a Standalone Building 5-4
Adding Outdoor Areas 5-6
Enabling Location Presence on a Location Server 5-7
Searching Maps 5-9
Finding Coverage Holes 5-10
Adding and Enhancing Floor Plans 5-10
Adding Floor Plans to a Campus Building 5-11
Adding Floor Plans to a Standalone Building 5-12
Using the Map Editor to Enhance Floor Plans 5-13
Using the Map Editor to Draw Polygon Areas 5-14
Using Planning Mode to Calculate Access Point Requirements 5-17
Adding Access Points 5-24
Placing Access Points 5-26
Creating a Network Design 5-28
Designing a Network 5-28
Changing Access Point Positions by Importing and Exporting a File 5-34
Using Chokepoints to Enhance Tag Location Reporting 5-35
Adding Chokepoints to the WCS Database and Map 5-35
Removing Chokepoints from the WCS Database and Map 5-42
Monitoring Chokepoints 5-43
Monitoring Maps 5-43
Monitoring Predicted Coverage
Trang 6Access Point Layer 5-45
AP Mesh Info Layer 5-46
Clients Layer 5-47
802.11 Tags Layer 5-48
Rogue APs Layer 5-49
Rogue Clients Layer 5-50
Monitoring Channels on a Floor Map 5-51
Monitoring Transmit Power Levels on a Floor Map 5-51
Monitoring Coverage Holes on a Floor Map 5-52
Monitoring Clients on a Floor Map 5-53
Monitoring Outdoor Areas 5-54
Importing or Exporting WLSE Map Data 5-55
Creating and Applying Calibration Models 5-58
Analyzing Element Location Accuracy Using Testpoints 5-64
Assigning Testpoints to a Selected Area 5-65
Using the Accuracy Tool to Conduct Accuracy Testing 5-68
Using Scheduled Accuracy Testing to Verify Accuracy of Current Location 5-69
Using On-Demand Accuracy Testing to Test Location Accuracy 5-70
C H A P T E R 6 Monitoring Wireless Devices 6-1
Monitoring Rogue Access Points, Adhocs, and Clients 6-2
Interpreting Security Summary Window 6-2
Malicious Rogue Access Points 6-4
Friendly Rogue Access Points 6-4
Unclassified Rogue Access Points 6-5
Rogue Adhocs 6-6
Most Recent Security Alerts 6-7
Most Recent Malicious Rogue Access Points 6-7
Most Recent Rogue Adhocs 6-7
Signature Attacks 6-7
Access Point Threats / Attacks 6-8
Client Security Related 6-8
IPSEC Failures 6-8
Monitoring Rogue Access Point 6-8
Monitoring Rogue Adhoc 6-10
Monitoring Rogue Clients 6-10
Monitoring Shunned Clients 6-11
Rogue Access Point Location, Tagging, and Containment 6-12
Detecting and Locating Rogue Access Points
Trang 7Monitoring Clients 6-15
WLAN Client Troubleshooting 6-16
Enabling Automatic Client Troubleshooting 6-30
Finding Clients 6-30
Receiving Radio Measurements 6-34
Monitoring Mesh Networks Using Maps 6-35
Monitoring Mesh Link Statistics Using Maps 6-35
Monitoring Mesh Access Points Using Maps 6-38
Monitoring Mesh Access Point Neighbors Using Maps 6-40
Monitoring Mesh Health 6-42
Mesh Statistics for an Access Point 6-44
Viewing the Mesh Network Hierarchy 6-49
Using Mesh Filters to Modify Map Display of Maps and Mesh Links 6-50
Viewing Google Earth Maps 6-52
Google Earth Settings 6-53
Viewing Clients Identified as WGBs 6-54
Running a Link Test 6-55
Retrieving the Unique Device Identifier on Controllers and Access Points 6-57
Coverage Hole 6-60
Monitoring Pre-Coverage Holes 6-60
Viewing DHCP Statistics 6-62
C H A P T E R 7 Managing WCS User Accounts 7-1
Adding WCS User Accounts 7-2
Deleting WCS User Accounts 7-4
Changing Passwords 7-4
Monitoring Active Sessions 7-5
Viewing or Editing User Information 7-6
Viewing or Editing Group Information 7-7
Setting Lobby Ambassador Defaults 7-9
Editing the Default Lobby Ambassador Credentials 7-10
Viewing the Audit Trail 7-10
Enabling Audit Trails for Guest User Activities 7-12
Creating Guest User Accounts 7-12
Creating a Lobby Ambassador Account 7-14
Editing a Lobby Ambassador Account 7-15
Logging in to the WCS User Interface as a Lobby Ambassador 7-16
Trang 8Managing WCS Guest User Accounts 7-16
Adding Guest User Accounts 7-17
Guest User Credentials 7-18
Viewing and Editing Guest Users 7-18
Deleting Guest User Templates 7-19
Scheduling WCS Guest User Accounts 7-20
Printing or E-mailing WCS Guest User Details 7-21
Logging the Lobby Ambassador Activities 7-21
C H A P T E R 8 Configuring Mobility Groups 8-1
Overview of Mobility 8-2
Symmetric Tunneling 8-5
Overview of Mobility Groups 8-5
When to Include Controllers in a Mobility Group 8-7
Messaging among Mobility Groups 8-7
Configuring Mobility Groups 8-8
Prerequisites 8-8
Setting the Mobility Scalability Parameters 8-11
Mobility Anchors 8-13
Configuring Mobility Anchors 8-13
Configuring Multiple Country Codes 8-15
Creating Config Groups 8-18
Adding New Group 8-19
Configuring Config Groups 8-20
Adding or Removing Controllers from Config Group 8-20
Adding or Removing Templates from the Config Group 8-21
Applying Config Groups 8-21
Auditing Config Groups 8-22
Rebooting Config Groups 8-22
Downloading Software 8-23
Downloading IDS Signatures 8-24
Downloading Customized WebAuth 8-25
C H A P T E R 9 Configuring Controllers and Access Points 9-1
Trang 9Viewing Audit Status (for Controllers) 9-5
Viewing Latest Network Audit Report 9-6
Pinging a Network Device from a Controller 9-7
Enabling Load-Based CAC for Controllers 9-7
Enabling High Density 9-9
Requirements 9-9
Optimizing the Controller to Support High Density 9-10
Configuring 802.3 Bridging 9-12
Configuring an RRM Threshold Controller (for 802.11a/n or 802.11b/g/n) 9-12
Configuring EDCA Parameters for Individual Controller 9-13
Configuring SNMPv3 9-13
Configuring Global Credentials for Access Points 9-14
Autonomous to LWAPP Migration Support 9-15
Adding IOS Access Points to WCS 9-16
Adding IOS Access Points by Device Information 9-16
Adding Autonomous Access Points by CSV File 9-17
Viewing Autonomous Access Points in WCS 9-17
Work Group Bridge (WGB) Mode 9-18
Autonomous Access Point to LWAPP Access Point Migration 9-18
Adding/Modifying a Migration Template 9-18
Configuring Access Points 9-19
Configuring Access Point Radios for Location Optimized Monitor Mode 9-24
Scheduling Radio Status 9-25
Viewing Scheduled Tasks 9-25
Viewing Audit Status (for Access Points) 9-26
Searching Access Points 9-26
Viewing or Editing Rogue Access Point Rules 9-27
Configuring Spectrum Experts 9-28
Adding a Spectrum Expert 9-28
Monitoring Spectrum Experts 9-28
Spectrum Experts > Summary 9-29
Interferers > Summary 9-29
Spectrum Experts Details 9-30
Configuring Wired Guest Access 9-30
C H A P T E R 10 Using Templates 10-1
Adding Controller Templates 10-1
Trang 10Configuring General Templates 10-4
Configuring QoS Templates 10-7
Configuring a Traffic Stream Metrics QoS Template 10-8
Configuring WLAN Templates 10-9
Security 10-12
QoS 10-17
Advanced 10-18
Configuring H-REAP AP Groups 10-21
Configuring a File Encryption Template 10-22
Configuring a RADIUS Authentication Template 10-23
Configuring a RADIUS Accounting Template 10-25
Configuring a LDAP Server Template 10-26
Configuring a TACACS+ Server Template 10-27
Configuring a Network Access Control Template 10-28
Configuring a Local EAP General Template 10-29
Configuring a Local EAP Profile Template 10-31
Configuring an EAP-FAST Template 10-32
Configuring Network User Credential Retrieval Priority Templates 10-34
Configuring a Local Network Users Template 10-34
Configuring Guest User Templates 10-36
Configuring a User Login Policies Template 10-37
Configuring a MAC Filter Template 10-38
Configuring an Access Point or LBS Authorization 10-39
Configuring a Manually Disabled Client Template 10-40
Configuring a CPU Access Control List (ACL) Template 10-41
Configuring a Rogue Policies Template 10-42
Configuring a Rogue AP Rules Template 10-43
Configuring a Rogue AP Rule Groups Template 10-45
Configuring a Friendly Access Point Template 10-47
Configuring a Client Exclusion Policies Template 10-48
Configuring an Access Point Authentication and MFP Template 10-50
Configuring a Web Authentication Template 10-51
Downloading a Customized Web Authentication Page 10-53
Configuring Access Control List Templates 10-55
Configuring a Policy Name Template (for 802.11a/n or 802.11b/g/n) 10-56
Configuring High Density Templates 10-59
Configuring a Voice Parameter Template (for 802.11a/n or 802.11b/g/n) 10-61
Configuring a Video Parameter Template (for 802.11a/n or 802.11b/g/n) 10-62
Configuring EDCA Parameters through a Controller Template 10-63
Trang 11Configuring an RRM Threshold Template (for 802.11a/n or 802.11b/g/n) 10-65
Configuring an RRM Interval Template (for 802.11a/n or 802.11b/g/n) 10-66
Configuring an 802.11h Template 10-67
Configuring a High Throughput Template (for 802.11a/n or 802.11b/g/n) 10-68
Configuring a Mesh Template 10-69
Configuring a TFTP Server Template 10-71
Configuring a Trap Receiver Template 10-71
Configuring a Trap Control Template 10-72
Configuring a Telnet SSH Template 10-74
Configuring a Legacy Syslog Template 10-75
Configuring a Multiple Syslog Template 10-76
Configuring a Local Management User Template 10-77
Configuring a User Authentication Priority Template 10-78
Applying Controller Templates 10-79
Adding Access Point Templates 10-79
Configuring Access Point Templates 10-80
Configuring Radio Templates 10-82
Selecting Access Points 10-84
Applying the Report 10-84
C H A P T E R 11 Performing Maintenance Operations 11-1
Checking the Status of WCS 11-2
Checking the Status of WCS on Windows 11-2
Checking the Status of WCS on Linux 11-2
Stopping WCS 11-3
Stopping WCS on Windows 11-3
Stopping WCS on Linux 11-3
Backing Up the WCS Database 11-4
Scheduling Automatic Backups 11-4
Performing a Manual Backup 11-5
Backing Up the WCS Database (for Windows) 11-5
Backing Up the WCS Database (for Linux) 11-5
Restoring the WCS Database 11-6
Restoring the WCS Database (for Windows) 11-6
Restoring the WCS Database (for Linux) 11-7
Importing the Location Appliance into WCS 11-8
Importing and Exporting Asset Information 11-10
Importing Asset Information 11-10
Trang 12Auto-Synchronizing Location Appliances 11-11
Backing Up Location Appliance Data 11-12
Uninstalling WCS 11-15
Uninstalling WCS on Windows 11-15
Uninstalling WCS on Linux 11-15
Upgrading WCS 11-16
Using the Installer to Upgrade WCS for Windows 11-16
Using the Installer to Upgrade WCS for Linux 11-19
Manually Upgrading WCS on Windows 11-20
Manually Upgrading WCS on Linux 11-20
Upgrading the Network 11-21
Reinitializing the Database 11-21
Recovering the WCS Password 11-21
C H A P T E R 12 Configuring Hybrid REAP 12-1
Overview of Hybrid REAP 12-2
Hybrid-REAP Authentication Process 12-2
Hybrid REAP Guidelines 12-4
Configuring Hybrid REAP 12-4
Configuring the Switch at the Remote Site 12-4
Configuring the Controller for Hybrid REAP 12-6
Configuring an Access Point for Hybrid REAP 12-9
Connecting Client Devices to the WLANs 12-11
Hybrid REAP Access Point Groups 12-12
Hybrid-REAP Groups and Backup RADIUS Servers 12-13
Hybrid-REAP Groups and Local Authentication 12-13
Configuring Hybrid-REAP Groups 12-13
Auditing an H-REAP Group 12-16
C H A P T E R 13 Alarms and Events 13-1
Using the Alarm Dashboard 13-1
Monitoring Alarms 13-4
Using Edit View 13-5
Using Search 13-6
Monitoring Failed Objects 13-7
Monitoring Rogue Access Point Alarms 13-7
Monitoring Rogue Access Point Details 13-9
Monitoring Rogue Adhoc Alarms 13-10
Trang 13Monitoring Rogue Adhoc Details 13-11
Detecting Access Points 13-12
Monitoring Events 13-12
Monitoring Rogue Clients 13-13
Monitoring E-mail Notifications 13-13
Monitoring Security Configurations 13-14
Alarm and Event Dictionary 13-14
Notification Format 13-15
Traps Added in Release 2.0 13-15
Traps Added in Release 2.1 13-33
Traps Added in Release 2.2 13-37
Traps Added in Release 3.0 13-39
Traps Added in Release 3.1 13-41
Traps Added in Release 3.2 13-44
Traps Added In Release 4.0 13-45
Traps Added/Updated in Release 4.0.96.0 13-49
Traps Added or Updated in Release 4.1 13-51
Traps Added or Updated in Release 4.2 13-58
Traps Added or Updated in Release 5.0 13-62
Accessing the Schedule Panel 14-3
Access Point Reports 14-4
Viewing or Modifying Access Point Reports 14-4
Creating a New Access Point Report 14-5
Audit Reports 14-5
Viewing or Modifying Audit Reports 14-6
Creating a New Network Configuration Audit Report 14-6
Client Reports 14-7
Viewing or Modifying Client Reports 14-7
Creating a New Client Report 14-8
Inventory Reports 14-8
Viewing or Modifying Inventory Reports 14-9
Creating a New Inventory Report 14-9
Mesh Reports
Trang 14Viewing or Modifying Mesh Reports 14-11
Creating a New Mesh Report 14-11
Performance Reports 14-12
Viewing or Modifying Performance Reports 14-12
Creating a New Performance Report 14-12
Security Reports 14-13
Viewing or Modifying Security Reports 14-14
Creating a New Security Report 14-14
C H A P T E R 15 Administrative Tasks 15-1
Running Background Tasks 15-2
Performing a Task 15-2
Importing Tasks Into ACS 15-4
Adding WCS to an ACS Server 15-4
Adding WCS as a TACACS+ Server 15-5
Adding WCS UserGroups into ACS for TACACS+ 15-6
Adding WCS to ACS server for Use with RADIUS 15-9
Adding WCS UserGroups into ACS for RADIUS 15-10
Adding WCS to a Non-Cisco ACS Server for Use with RADIUS 15-13
Setting AAA Mode 15-15
Auto Provisioning 15-16
Viewing Detailed Auto Provisioning Device Information 15-19
Editing a Current Auto Provisioning Filter 15-19
Deleting an Auto Provisioning Filter 15-20
Viewing Details of an Auto Provisioned Filter 15-20
Setting Auto Provisioning 15-21
Turning Password Rules On or Off 15-21
Configuring TACACS+ Servers 15-22
Configuring RADIUS Servers 15-23
Establishing Logging Options 15-24
Performing Data Management Tasks 15-25
Trang 15SNMP Settings 15-30
Setting User Preferences 15-31
C H A P T E R 16 Google Earth Maps 16-1
Creating an Outdoor Location Using Google Earth 16-1
Understanding Geographical Coordinates for Google Earth 16-1
Creating and Importing Coordinates in Google Earth (KML File) 16-2
Creating and Importing Coordinates as a CSV File 16-4
Importing a File into WCS 16-6
Viewing Google Earth Maps 16-6
Google Earth Settings 16-8
A P P E N D I X A Appendix A: Troubleshooting and Best Practices A-1
Troubleshooting Cisco Compatible Extensions Version 5 Client Devices A-2
Diagnostic Channel A-2
Configuring the Diagnostic Channel A-2
Web Auth Security on WLANs A-3
Debug Commands A-4
Debug Strategy A-4
Best Practices A-9
A P P E N D I X B Appendix B: WCS and End User Licenses B-1
WCS Licenses B-2
Types of Licenses B-2
Licensing Enforcement B-3
Product Authorization Key Certificate B-3
Determining Which License To Use B-4
Installing a License B-4
Managing Licenses B-5
Adding a License B-5
Deleting a License B-6
Backup and Restore License B-6
Open Source License Acknowledgements B-6
OpenSSL/Open SSL Project B-6
End User License Agreement B-7
A P P E N D I X C Appendix C: Supported Hardware C-1
Supported Cisco WLSE Management Stations C-2
Trang 16Autonomous Access Points Convertible to LWAPP C-2
Installation and Configuration C-2
Installing Cisco WCS C-2
Upgrading to Red Hat Enterprise Linux 4 C-3
Configuring the Converted Appliance C-3
Licensing C-6
WLSE Upgrade License C-6
Trang 17Obtaining Documentation and Submitting a Service Request
For information on obtaining documentation, submitting a service request, and gathering additional
information, see the monthly What’s New in Cisco Product Documentation, which also lists all new and
revised Cisco technical documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed
and set content to be delivered directly to your desktop using a reader application The RSS feeds are a free
service and Cisco currently supports RSS version 2.0 The preface provides an overview of the Cisco Wireless Control System Configuration Guide, references related publications, and explains how to
obtain other documentation and technical assistance, if necessary It contains these sections:
• Audience, page xviii
• Purpose, page xviii
• Organization, page xviii
• Conventions, page xix
• Related Publications, page xix
• Obtaining Documentation, Obtaining Support, and Security Guidelines, page xx
Trang 18This guide describes the Cisco Wireless Control System (WCS) It is meant for networking professionals who use WCS to manage a Cisco Unified Wireless Network Solution To use this guide, you should be familiar with the concepts and terminology associated with wireless LANs
This guide contains the following chapters:
Chapter 1, “Overview,” describes the Cisco Unified Wireless Network Solution and the Cisco Wireless Control System (WCS)
Chapter 2, “Getting Started,” describes how to prepare WCS for operation
Chapter 3, “Configuring Security Solutions,” describes security solutions for wireless LANs
Chapter 4, “Performing System Tasks,” describes how to use WCS to add a controller and location appliance to the WCS database, update system software, enable long preambles for SpectraLink NetLink phones, and create an RF calibration model
Chapter 5, “Adding and Using Maps,” describes how to add maps to the Cisco WCS database and use them to monitor your wireless LAN
Chapter 6, “Monitoring Wireless Devices,” describes how to use WCS to monitor your wireless LANs
Chapter 7, “Managing WCS User Accounts,” describes how to add, delete, and change the passwords of WCS user accounts It also describes creating a guest user account on WCS and how to configure it for limited activity
Chapter 8, “Configuring Mobility Groups” provides an overview of mobility and mobility groups and describes how to configure them
Chapter 9, “Configuring Controllers and Access Points,”describes how to configure controllers and access points for specific tasks within the Cisco WCS database
Chapter 10, “Using Templates” describes how to set parameters for multiple devices without having to re-enter the common information
Chapter 11, “Performing Maintenance Operations,” describes how to check the status of, stop, uninstall, and upgrade WCS It also provides instructions for backing up and restoring the WCS database
Chapter 12, “Configuring Hybrid REAP,”describes hybrid REAP and explains how to configure this feature on controllers and access points
Chapter 13, “Alarms and Events” defines alarms and events and what constitutes each
Trang 19Conventions
Chapter 14, “Running Reports,”describes the various reports that can be generated to run on an immediate and scheduled basis for use with diagnosing system and network health
Chapter 15, “Administrative Tasks,” describes certain administrative tasks you can perform with WCS
Appendix A, “Troubleshooting and Best Practices,” provides some troubleshooting and best practices tips for a few of the more complicated features
Appendix B, “WCS and End User Licenses,” provides the end user license and warranty that apply to WCS
Appendix C, “Conversion of a WLSE Autonomous Deployment to a WCS Controller Deployment”
describes how to convert a Cisco Wireless LAN Solution Engine (WLSE) network management appliance to a Cisco Wireless Control System (WCS) network management station
Conventions
This publication uses the following conventions to convey instructions and information:
• Commands and keywords are in boldface text.
• Variables are in italicized text.
Note Means reader take note Notes contain helpful suggestions or references to material not contained in this
manual
Caution Means reader be careful In this situation, you might do something that could result in equipment
damage or loss of data
Related Publications
For more information about WCS and related products, refer to the following documents:
• Wireless Control System Online Help
• Release Notes for Cisco Wireless Control System 4.2 for Windows or Linux
• Cisco Location Application Configuration Guide 3.1
• Release Notes for Cisco Location Appliance Software 3.1
Note Click this link to browse to these documents:
http://www.cisco.com/en/US/products/hw/wireless/tsd_products_support_category_home.html
Trang 20Obtaining Documentation, Obtaining Support, and Security Guidelines
For information on obtaining documentation, obtaining support, providing documentation feedback, security guidelines, and also recommended aliases and general Cisco documents, see the monthly
What’s New in Cisco Product Documentation, which also lists all new and revised Cisco technical
documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Trang 21C H A P T E R 1 Overview
This chapter describes the Cisco Unified Wireless Network Solution and the Cisco Wireless Control System (WCS) It contains these sections:
• Overview of the Cisco Unified Wireless Network Solution, page 1-2
• Overview of WCS, page 1-3
• WCS Versions, page 1-4
• WCS User Interface, page 1-7
• Cisco WCS Navigator, page 1-7
Trang 22Overview of the Cisco Unified Wireless Network Solution
The Cisco Unified Wireless Network solution is designed to provide 802.11 wireless networking solutions for enterprises and service providers It simplifies the deployment and management of large-scale wireless LANs and enables a unique best-in-class security infrastructure The operating system manages all data client, communications, and system administration functions, performs radio resource management (RRM) functions, manages system-wide mobility policies using the operating system security solution, and coordinates all security functions using the operating system security framework
The Cisco Unified Wireless Network Solution consists of Cisco Unified Wireless Network Controllers
(hereafter called controllers) and their associated lightweight access points controlled by the operating
system, all concurrently managed by any or all of the operating system user interfaces:
• An HTTPS full-featured web user interface hosted by Cisco controllers can be used to configure and monitor individual controllers
• A full-featured command line interface (CLI) can be used to configure and monitor individual controllers
• The Cisco Wireless Control System (WCS) can be used to configure and monitor one or more controllers and associated access points WCS has tools to facilitate large-system monitoring and control It runs on Windows 2003 and Red Hat Enterprise Linux ES/AS 4 servers
• An industry-standard SNMP V1, V2c, and V3 interface can be used with any SNMP-compliant third-party network management system
The Cisco Unified Wireless Network Solution supports client data services, client monitoring and control, and all rogue access point detection, monitoring, and containment functions It uses lightweight access points, controllers, and the optional WCS to provide wireless services to enterprises and service providers
Note This document refers to controllers throughout Unless specified otherwise, the descriptions herein
apply to all Cisco Unified Wireless Network Controllers, including but not limited to Cisco 2000 and
2100 Series Unified Wireless Network Controllers, Cisco 4100 Series Unified Wireless Network Controllers, Cisco 4400 Series Unified Wireless Network Controllers, and controllers within the Cisco
Wireless Services Module (WiSM) and Cisco 26/28/37/38xx Series Integrated Services Routers.
Figure 1-1 shows the Cisco Unified Wireless Network Solution components, which can be simultaneously deployed across multiple floors and buildings
Trang 23WCS runs on Windows 2003 and Red Hat Enterprise Linux ES 4.0 and AS 4.0 servers On both Windows and Linux, WCS can run as a normal application or as a service, which runs continuously and resumes running after a reboot
The WCS user interface enables operators to control all permitted Cisco Unified Wireless Network Solution configuration, monitoring, and control functions through Internet Explorer 6.0 or later Operator permissions are defined by the administrator using the WCS user interface Administration menu, which enables the administrator to manage user accounts and schedule periodic maintenance tasks
WCS simplifies controller configuration and monitoring while reducing data entry errors WCS uses the industry-standard SNMP protocol to communicate with the controllers
Trang 24It also includes graphical views of the following:
• Autodiscovery of access points as they associate with controllers
• Autodiscovery and containment or notification of rogue access points
• Map-based organization of access point coverage areas, which is helpful when the enterprise spans more than one geographical area
• Rogue adhoc
• User-supplied campus, building, and floor plan graphics, which show the following:
– Locations and status of managed access points
– Locations of rogue access points based on the signal strength received by the nearest managed Cisco access points
– Coverage hole alarm information for access points based on the received signal strength from clients This information appears in a tabular rather than map format
– RF coverage mapsThe WCS Base also provides system-wide control of the following:
– Streamlined network, controller, and managed access point configuration using customer-defined templates
– Network, controller, and managed access point status and alarm monitoring
– Automated and manual data client monitoring and control functions
– Automated monitoring of rogue access points, rogue ad hocs, coverage holes, security violations, controllers, and access points
– Full event logs for data clients, rogue access points, coverage holes, security violations, controllers, and access points
– Automatic channel and power level assignment by radio resource management (RRM)
– User-defined automatic controller status audits, missed trap polling, configuration backups, and policy cleanups
– Real-time location of rogue access points and rogue ad hocs to the nearest Cisco access point
– Real-time and historical location of clients to the nearest Cisco access point
Trang 25Chapter 1 Overview
WCS Versions
WCS Base + Location
The WCS Location includes all the features of the WCS Base as well as these enhancements:
• On-demand location of rogue access points and rogue ad hocs to within 33 feet (10 meters)
• On-demand location of clients to within 33 feet (10 meters)
• Ability to use location appliances to collect and return historical location data viewable in the WCS Location user interface
Relationship with Cisco Location Appliances
When WCS Location is used, end users can also deploy Cisco 2700 Series Location Appliances The location appliance enhances the high-accuracy built-in WCS Location capabilities by computing, collecting, and storing historical location data, which can be displayed in WCS In this role, the location appliance acts as a server to a WCS server by collecting, storing, and passing on data from its associated controllers
After a quick command line interface (CLI) configuration, the remaining location appliance configuration can be completed using the WCS user interface After each location appliance is configured, it communicates directly with its associated controllers to collect operator-defined location data The associated WCS server operators can then communicate with each location appliance to transfer and display selected data
The location appliance can be backed up to any WCS server into an operator-defined FTP folder, and the location appliance can be restored from that server at any time and at defined intervals Also, the location appliance database can be synchronized with the WCS server database at any time Operators can use the location appliance features and download new application code to all associated appliances from any WCS server
When WCS is enhanced with a location appliance, it can display historical location data for up to 2,500 laptop clients, palmtop clients, VoIP telephone clients, radio frequency identifier (RFID) asset tags, rogue access points, rogue ad hocs, and rogue clients for each location appliance in the Cisco Unified Wireless Network Solution Operators can configure location appliances to collect this data and statistics
at defined intervals
You can also use WCS to configure location appliance event notification parameters Event notification
is a feature that enables you to define conditions that cause the location appliance to send notifications
to the listeners whom you have specified in WCS
In this way, WCS acts as a notification listener It receives notifications from the location appliance in the form of the locationNotifyTrap trap as part of the bsnwras.my MIB file WCS translates the traps into user interface alerts and displays the alerts in the following format:
Trang 26Note Refer to the Cisco Location Application Configuration Guide for more detailed information about the
location appliance and its use with WCS
Comparison of WCS Base and WCS Location
Table 1-1 compares the WCS Base and WCS Location features
Table 1-1 WCS Base and WCS Location Features
Features
WCS Base
WCS Location
Location and tracking
Client data services, security, and monitoring
Rogue access point detection and containment using access points Yes Yes
Radio resource managementReal-time channel assignment and rogue access point detection and containment
Real-time interference detection and avoidance, transmit power control, channel assignment, client mobility management, client load distribution, and coverage hole detection
Supported workstations
Trang 27Note Cisco recommends Internet Explorer 6.0 or later on a Windows workstation for full access to WCS
functionality
Cisco WCS Navigator
The Cisco Wireless Control System Navigator (Cisco WCS Navigator) manages multiple Cisco WCSs (running the same version as Navigator) and provides a unified view of the network It uses SOAP/XML over HTTPs to communicate with individual WCSs With WCS Navigator, there is monitoring
functionality and reporting capability across all WCSs In addition, network wide searches are available
In Windows and Linux, Cisco WCS Navigator runs as a service, which runs continuously and resumes running after a reboot
In order for the WCS Navigator to detect the regional WCSs, you must manually add them to the system using either the IP address or hostname and specify the login credentials for each of the regional WCSs After being added, WCS Navigator provides summary information and links to the regional WCS systems
Trang 29C H A P T E R 2 Getting Started
This chapter describes how to prepare WCS for operation It contains these sections:
• Prerequisites, page 2-2
• System Requirements, page 2-2
• Installing WCS for Windows, page 2-4
• Installing WCS for Linux, page 2-11
• Starting WCS, page 2-12
• Logging into the WCS User Interface, page 2-13
• Customizing Content on the WCS Home Page, page 2-18
• Using the Cisco WCS User Interface, page 2-20
Trang 30Before installing the Cisco WCS, ensure that you have completed the following:
• Met the necessary hardware and software requirements as listed in the “System Requirements” section on page 2-2 for Cisco WCS
• Updated your system with the necessary critical updates and service packs
Note Refer to the latest release notes for information on the service packs and patches required for correct operation of Cisco WCS
• Verified that the following ports are open during installation and startup:
– HTTP: configurable during install (80 by default)
– HTTPS: configurable during install (443 by default)
High End Server
• Up to 3000 Cisco Aironet lightweight access points, 1250 standalone access points, and 750 Cisco wireless LAN controllers
• 3.16-GHz Intel Xeon Quad processor with 8-GB RAM
• 80-GB minimum free disk space on your hard drive
Note The free disk space listed is a minimum requirement but may be different for your system,
depending on the number of backups
Trang 31Chapter 2 Getting Started
System Requirements
Standard Server
• Up to 2000 Cisco Aironet lightweight access points , 1000 standalone access points, and 150 Cisco wireless LAN controllers and 1000 autonomous access points
• 3.2-GHz Intel Dual Core processor with 4-GB RAM
• 40-GB minimum of free disk space on your hard drive
Low End Server
• Up to 500 Cisco Aironet lightweight access points, 200 standalone access points, and 125 Cisco wireless LAN controllers
• 3.06-GHz Intel processor with 2-GB RAM
• 30-GB minimum free disk space on your hard drive
Operating Systems Requirements
The following operating systems are supported:
– Windows 2003/SP2 or later with all critical and security Windows updates installed 64-bit installations are not supported
– Red Hat Linux Enterprise Server 4.0 Update 5 or Advanced Server 4.0 Update 5 Only 32-bit operating system installations are supported 64-bit operating system installations are not supported
– Windows 2003 and Redhat Linux version support on VmWare ESX 3.0.1 version and above
Note VmWare must be installed on a system with these minimum requirements:
Quad CPU running at 3.16 GHz
8 GBs RAM
200 GB hard drive
Note Individual operating systems running WCS in VmWare must follow the specifications for the size of WCS you intend to use
Note Cisco WCS can be installed on Red Hat Linux Enterprise Server 4.0, but version 4.0 will not
be supported in future releases Please plan on migrating to Red Hat Linux Enterprise Server 5.0
WCS on WLSE
• Up to 1500 Cisco Aironet lightweight access points and 100/375 Cisco wireless LAN controllers
• 3-GHz Intel Pentium4 processor with 3 GB RAM
• 38-GB of free space on your hard drive
WCS Portal
Trang 32• 30K access points
Cisco WCS User Interface
The Cisco WCS user interface requires Internet Explorer 6.0/SP1 or later, with the Flash plug-in version 9.0.47.0 The Cisco WCS user interface has been tested and verified using Internet Explorer 6.0 on a Windows workstation
Note The screen resolution should be set to 1024 x 768 pixels for both WCS and Navigator
Client Requirements
In order for clients to access WCS, they must have a minimum of 1-GB RAM and a 2-GHz processor The client device should not be running any CPU or memory intensive applications
Installing WCS for Windows
This section describes how to install Cisco WCS for Windows operating systems Before installing Cisco WCS, refer to the “Prerequisites” section on page 2-2 and the “System Requirements” section on page 2-2 These sections give an overview of the system requirements and measures that you should take prior to the installation You must have administrator privileges on Windows If you receive a message that a previous version of WCS was detected, you must continue with one of two upgrade options Refer
to the “Upgrading WCS” section on page 11-15
If installing WCS for Linux, see the “Installing WCS for Linux” section on page 2-11
Guidelines Before Installing WCS
Note • You cannot install the WCS software if the username used to log into the server contains special
characters such as exclamation marks (!) To ensure successful installation, log into the server using
a username with no special characters before installing the software
• Cisco WCS does not support the underscore character (_) in the name of the Windows server running the WCS software If the server name contains an underscore, you can install the WCS software, but WCS fails to start
• You must install WCS on a dedicated Windows server with no other services running (including those running as primary or secondary domain controllers) to avoid conflict with WCS
To install Cisco WCS, follow these steps:
Step 1 Insert the Windows Cisco WCS CD into the CD-ROM drive and double click the
WCS-STANDARD-K9-5.0.XX.Y.exe file where 5.0.XX.Y is the software build If you received the installer from Cisco.com, double click the WCS-STANDARD-WB-K9-5-0-XX-Y.exe file that you downloaded to your local drive
Step 2 The Install Anywhere window appears and prepares the system for installation After a few seconds, the
Introduction window appears, followed by the license agreement window (see Figure 2-1) You must click the “I accept the terms of the License Agreement” option to continue
Trang 33Chapter 2 Getting Started
Installing WCS for Windows
Figure 2-1 License Agreement Window
Step 3 If the install wizard detects a previous version of WCS, you see a window similar to Figure 2-2 or
Figure 2-3 If a previous version is detected, you must proceed as an upgrade and refer to the“Upgrading WCS” section on page 11-15 For a first-time install, continue to Step 4
Trang 34Figure 2-2 Ineligible for Automated Upgrade
Trang 35Chapter 2 Getting Started
Installing WCS for Windows
Figure 2-3 Previous Installation Detected
Step 4 The Check Ports window appears (see Figure 2-4) In the Check Ports window, change the default HTTP
and HTTPS ports if necessary and click Next to open the Choose Install Type window The default ports
for HTTP and HTTPS are 80 and 443, respectively
Trang 36Figure 2-4 Check Ports Window
Step 5 Enter and re-enter the root password The rules for a strong password are as follows:
• The minimum password length is 8
• The password cannot contain the username or the reverse of the username
• The password cannot be Cisco or ocsic (Cisco reversed).
• The root password cannot be public.
• No character can be repeated more than three times consecutively in the password
• The password must contain three of the four following character classes: uppercase, lowercase, numbers, and special characters
Step 6 Enter the root FTP password
Step 7 From the FTP Server File window, choose a folder in which to store the FTP server files and click Next
to bring up the TFTP File Server window
Note Store the FTP server files in a folder outside the main installation folder This ensures that the
FTP server files are not deleted if Cisco WCS is uninstalled
Step 8 From the TFTP Server File window, choose a folder in which to store the TFTP server files and click
Next
Note Store the TFTP server files in a folder outside the main installation folder This ensures that the
TFTP server files are not deleted if Cisco WCS is uninstalled
Trang 37Chapter 2 Getting Started
Installing WCS for Windows
Step 9 If you are installing Cisco WCS on a multi-homed server (a server having multiple interfaces), the
installer automatically detects the presence of multiple interfaces The Select Local Interfaces window appears (see Figure 2-5) Choose the interfaces to be used by the server for communicating with
controllers, location appliances and remote FTP servers, and clients Click Next.
Figure 2-5 Select Local Interfaces Window
Step 10 Choose a folder in which to install the Cisco WCS at the Choose Install Folder window (see Figure 2-6)
Click Next to continue.
Trang 38Figure 2-6 Choose Install Folder
Step 11 Follow the prompts that appear on the screen to complete the installation After the installation is
complete, the Install Complete window appears Click Done to complete the installation.
Note You can check the install log to determine if anything went wrong during the installation The
install log is located in the installation root directory if the installation completes If the installation did not complete, the install log resides in the directory from which the installer was run or the install root directory
Trang 39Chapter 2 Getting Started
Installing WCS for Linux
Installing WCS for Linux
You must have root privileges on Linux This section describes how to install Cisco WCS for Linux operating systems
Step 1 If not already done, log in as root, and open an X terminal session
Step 2 Using the command line, perform one of the following:
a. If you are installing from a CD, switch to the /media/cdrom directory
b. If you are installing from Cisco.com, switch to the directory that the install file was downloaded to
For example, if the install file was placed in /root/Desktop, enter cd /root/Desktop.
Step 3 Enter /WCS-STANDARD-K9-5.0.XX.Y.bin (for CD users) or
./WCS-STANDARD-LB-K9-5-0-XX-Y.bin (for Cisco.com users) to start the install script.
The install script prepares the install environment and displays the license agreement You are asked to accept the terms of the license agreement
Step 4 If the install wizard detects a previous version of WCS, you see a message states whether the detected
version is eligible for an automated upgrade or not If a previous version is detected, you must proceed
as an upgrade and refer to the “Upgrading WCS” section on page 11-15 For a first-time installation, continue to Step 5
Step 5 The Check Ports prompt appears In the Check Ports window, change the default HTTP and HTTPS ports
if necessary The default ports for HTTP and HTTPS are 80 and 443, respectively
Step 6 Enter and re-enter the root password The rules for a strong password are as follows:
• The minimum password length is 8
• The password cannot contain the username or the reverse of the username
• The password cannot be Cisco or ocsic (Cisco reversed).
• The root password cannot be public.
• No character can be repeated more than three times consecutively in the password
• The password must contain three of the four character classes: uppercase, lowercase, numbers, and special characters
Step 7 Enter the root FTP password
Step 8 Choose a folder in which to store the FTP server files
Note If the folder does not already exist, you must enter mkdir and create it.
Step 9 Choose a folder in which to store the TFTP server files
Note Store the TFTP server files in a folder outside the main installation folder This ensures that the TFTP server files are not deleted if Cisco WCS is uninstalled
Step 10 If you are installing Cisco WCS on a multi-homed server (a server having multiple interfaces), the
installer automatically detects the presence of multiple interfaces Choose the interfaces to be used by the server for communicating with controllers, location appliances and remote FTP servers, and clients
Step 11 Choose a folder in which to install the Cisco WCS
Trang 40Step 12 Follow the prompts that appear to complete the installation After the installation is complete, the Install
Complete statement appears
Note You can check the install log to determine if anything went wrong during the installation The
install log is located in the installation root directory if the installation completes If the installation did not complete, the install log resides in the directory from which the installer was run or the install root directory
Starting WCS
This section provides instructions for starting WCS on either a Windows or Linux server
In Windows and Linux, Cisco WCS is installed as a service The service runs continuously and resumes after a reboot
Note You can check the status of WCS at any time To do so, follow the instructions in the “Checking the
Status of WCS” section on page 11-2
Starting WCS on Windows
Follow these steps to start WCS when it is installed on Windows
Note When WCS is installed as a Windows service, WCS runs automatically upon system bootup
Step 1 Log into the system as administrator
Step 2 Perform one of the following:
• From the Windows Start menu, click Programs > Wireless Control System> StartWCS.
• From the command prompt, navigate to the WCS installation directory (C:\Program
Files\WCS32\bin) and enter WCS Admin start.
The WCS Admin window appears and displays messages indicating that WCS is starting
Note If you are starting WCS after a restore from release 4.0.66.0 or earlier, the startup may take
longer than expected The WCS Admin window may even indicate that starting WCS has failed Refer to the task viewer to see whether Java is progressively taking CPU space If so, WCS is running
Note If WCS is installed as a service, messages also appear to indicate that the Nms_Server service
is starting
Step 3 Close the WCSAdmin window when the Close button becomes active