In this converged access product platform,
you should have some familiarity with the new Cisco 3850 switch, especially the
answer for “how to configure a Cisco 3850 switch for basic wireless
connectivity?” Now, let’s share the 5 key points of using 3850 as WLC firstly.
1. Attach your access points directly to
your 3850 switches (every wiring closet you should have this in order to all
building AP to be connect to this new environment)
2. Wireless management vlan & AP
management vlan should be identical. (If you configure vlan 20 as wireless
management in 3850 switch all your APs connected to this switch should be on
access vlan 20.)
3. Enable Mobility Controller (MC)
functionality to terminate CAP/WAP (or register AP). By default, when you enable
wireless management, switch will act as Mobility Agent (MA) & not able to
terminate CAP/WAP.
4. “ipbase” or “ipservices” feature set to
be there for CAP/WAP termination.”lanbase” cannot be used.
5. Given 3850 switch stack can support
maximum 50 APs.
![]()  | 
| Catalyst 3850 switch (the picture is from Cisco.com) | 
In the following example, we will have two
3850 switches stacked together. (We will have latest software code- IOS-XE
3.2.3SE on this switch. Then let’s get down to business:
New image to flash of Cisco 3850 switch:
3850-1#copy
tftp://192.168.20.51/firmware/cat3k_caa-universalk9.SPA.03.02.03.SE.150-1.EX3.bin
flash:
Destination
filename [cat3k_caa-universalk9.SPA.03.02.03.SE.150-1.EX3.bin]? 
Accessing
tftp://192.168.20.51/firmware/cat3k_caa-universalk9.SPA.03.02.03.SE.150-1.EX3.bin...
Loading
firmware/cat3k_caa-universalk9.SPA.03.02.03.SE.150-1.EX3.bin from 192.168.20.51
(via Vlan999): 
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!
[OK -
223743040 bytes]
 There are two modes called
"INSTALL" & "BUNDLE" available in these new switches.
If you want to boot in "INSTALL" mode you have to copy the image onto
flash first. In "BUNDLE" mode, you can keep the image on TFTP &
boot if required. But in BUNDLE mode switch require more memory to do this
function, meanwhile, the preferred method is doing it via "INSTALL"
mode.
You can use "software install file
<file_location>“command to install new software onto your switch. At the
end it will prompt to reload the switch as shown below: 
3850-1#software
install file flash:cat3k_caa-universalk9.SPA.03.02.03.SE.150-1.EX3.bin
Preparing
install operation...
[1]:
Copying software from active switch 1 to switch 2
[1]:
Finished copying software to switch 2
[1
2]: Starting install operation
[1
2]: Expanding bundle flash:cat3k_caa-universalk9.SPA.03.02.03.SE.150-1.EX3.bin
[1
2]: Copying package files
[1
2]: Package files copied
[1
2]: Finished expanding bundle
flash:cat3k_caa-universalk9.SPA.03.02.03.SE.150-1.EX3.bin
[1
2]: Verifying and copying expanded package files to flash:
[1
2]: Verified and copied expanded package files to flash:
[1
2]: Starting compatibility checks
[1
2]: Finished compatibility checks
[1
2]: Starting application pre-installation processing
[1
2]: Finished application pre-installation processing
[1]:
Old files list:
 Removed cat3k_caa-base.SPA.03.02.02.SE.pkg
 Removed cat3k_caa-drivers.SPA.03.02.02.SE.pkg
 Removed cat3k_caa-infra.SPA.03.02.02.SE.pkg
 Removed
cat3k_caa-iosd-universalk9.SPA.150-1.EX2.pkg
 Removed cat3k_caa-platform.SPA.03.02.02.SE.pkg
 Removed cat3k_caa-wcm.SPA.10.0.111.0.pkg
[2]:
Old files list:
 Removed cat3k_caa-base.SPA.03.02.02.SE.pkg
 Removed cat3k_caa-drivers.SPA.03.02.02.SE.pkg
 Removed cat3k_caa-infra.SPA.03.02.02.SE.pkg
 Removed cat3k_caa-iosd-universalk9.SPA.150-1.EX2.pkg
 Removed cat3k_caa-platform.SPA.03.02.02.SE.pkg
 Removed cat3k_caa-wcm.SPA.10.0.111.0.pkg
[1]:
New files list:
 Added cat3k_caa-base.SPA.03.02.03.SE.pkg
 Added cat3k_caa-drivers.SPA.03.02.03.SE.pkg
 Added cat3k_caa-infra.SPA.03.02.03.SE.pkg
 Added
cat3k_caa-iosd-universalk9.SPA.150-1.EX3.pkg
 Added cat3k_caa-platform.SPA.03.02.03.SE.pkg
 Added cat3k_caa-wcm.SPA.10.0.120.0.pkg
[2]:
New files list:
 Added cat3k_caa-base.SPA.03.02.03.SE.pkg
 Added cat3k_caa-drivers.SPA.03.02.03.SE.pkg
 Added cat3k_caa-infra.SPA.03.02.03.SE.pkg
 Added
cat3k_caa-iosd-universalk9.SPA.150-1.EX3.pkg
 Added cat3k_caa-platform.SPA.03.02.03.SE.pkg
 Added cat3k_caa-wcm.SPA.10.0.120.0.pkg
[1
2]: Creating pending provisioning file
[1
2]: Finished installing software. New software will load on reboot.
[1
2]: Committing provisioning file
[1
2]: Do you want to proceed with reload? [yes/no]: yes
[2]:
Reloading
[1]:
Pausing before reload
Now look at your flash directory, there could
be multiple versions of the .conf files & .pkg files depending on the number
of images came with your switch and the frequency you upgraded the switch. You
can clean this directory using “software clean” command which will result
deleting all unwanted file from your directory. In this way you will only keep
3.2.3SE related files on your flash.
3850-1#dir
Directory
of flash:/
85193
-rw- 2097152 Sep 28 2013 14:28:26 +10:00 nvram_config
85187
-rw- 74410468 Jan 1 1970 11:01:11 +11:00 cat3k_caa-base.SPA.03.02.00SE.pkg
85188
-rw- 2773680 Jan 1 1970 11:01:12 +11:00 cat3k_caa-drivers.SPA.03.02.00.SE.pkg
85189
-rw- 32478044 Jan 1 1970 11:01:12 +11:00 cat3k_caa-infra.SPA.03.02.00SE.pkg
85190
-rw- 30393116 Jan 1 1970 11:01:12 +11:00 cat3k_caa-iosd-universalk9.SPA.150-1.EX.pkg
85191
-rw- 18313952 Jan 1 1970 11:01:12 +11:00 cat3k_caa-platform.SPA.03.02.00.SE.pkg
85192
-rw- 63402700 Jan 1 1970 11:01:12 +11:00 cat3k_caa-wcm.SPA.10.0.100.0.pkg
85199
-rw- 1224 Sep 28 2013 14:19:19 +10:00 packages.conf
85196
-rw- 8916 Sep 26 2013 15:59:58 +10:00 vlan.dat
85195
-rw- 114 Jun 6 2013 08:31:45 +10:00 express_setup.debug
85194
-rw- 1224 Sep 25 2013 02:20:20 +10:00 packages.conf.00-
 7750 -rw- 74369252 Sep 25 2013 02:20:16 +10:00
cat3k_caa-base.SPA.03.02.02.SE.pkg
 7751 -rw- 5808828 Sep 25 2013 02:20:16 +10:00
cat3k_caa-drivers.SPA.03.02.02.SE.pkg
 7752 -rw- 32488292 Sep 25 2013 02:20:16 +10:00
cat3k_caa-infra.SPA.03.02.02.SE.pkg
 7753 -rw- 30403764 Sep 25 2013 02:20:16 +10:00
cat3k_caa-iosd-universalk9.SPA.150-1.EX2.pkg
 7754 -rw- 16079584 Sep 25 2013 02:20:16 +10:00
cat3k_caa-platform.SPA.03.02.02.SE.pkg
 7755 -rw- 64580300 Sep 25 2013 02:20:17 +10:00
cat3k_caa-wcm.SPA.10.0.111.0.pkg
85186
-rw- 223743040 Sep 28 2013 13:30:24 +10:00 cat3k_caa-universalk9.SPA.03.02.03.SE.150-1.EX3.bin
85198
-rw- 1218 Jan 1 1970 11:01:22 +11:00 packages.conf.01-
30979
-rw- 74369716 Sep 28 2013 14:19:15 +10:00 cat3k_caa-base.SPA.03.02.03.SE.pkg
30980
-rw- 5808828 Sep 28 2013 14:19:15 +10:00 cat3k_caa-drivers.SPA.03.02.03.SE.pkg
30981
-rw- 32496484 Sep 28 2013 14:19:15 +10:00 cat3k_caa-infra.SPA.03.02.03.SE.pkg
30982
-rw- 30418104 Sep 28 2013 14:19:15 +10:00
cat3k_caa-iosd-universalk9.SPA.150-1.EX3.pkg
30983
-rw- 16059104 Sep 28 2013 14:19:15 +10:00
cat3k_caa-platform.SPA.03.02.03.SE.pkg
30984
-rw- 64586444 Sep 28 2013 14:19:15 +10:00 cat3k_caa-wcm.SPA.10.0.120.0.pkg
1621966848
bytes total (723390464 bytes free)
3850-1#software
clean 
Preparing
clean operation...
[1
2]: Cleaning up unnecessary package files
[1
2]: No path specified, will use booted path flash:packages.conf
[1
2]: Cleaning flash:
[1]:
Preparing packages list to delete ...
 cat3k_caa-base.SPA.03.02.03.SE.pkg
 File is in use, will not delete.
 cat3k_caa-drivers.SPA.03.02.03.SE.pkg
 File is in use, will not delete.
 cat3k_caa-infra.SPA.03.02.03.SE.pkg
 File is in use, will not delete.
 cat3k_caa-iosd-universalk9.SPA.150-1.EX3.pkg
 File is in use, will not delete.
 cat3k_caa-platform.SPA.03.02.03.SE.pkg
 File is in use, will not delete.
 cat3k_caa-wcm.SPA.10.0.120.0.pkg
 File is in use, will not delete.
 packages.conf
 File is in use, will not delete.
[2]:
Preparing packages list to delete ...
 cat3k_caa-base.SPA.03.02.03.SE.pkg
 File is in use, will not delete.
 cat3k_caa-drivers.SPA.03.02.03.SE.pkg
 File is in use, will not delete.
 cat3k_caa-infra.SPA.03.02.03.SE.pkg
 File is in use, will not delete.
 cat3k_caa-iosd-universalk9.SPA.150-1.EX3.pkg
 File is in use, will not delete.
 cat3k_caa-platform.SPA.03.02.03.SE.pkg
 File is in use, will not delete.
 cat3k_caa-wcm.SPA.10.0.120.0.pkg
 File is in use, will not delete.
 packages.conf
 File is in use, will not delete.
[1]:
Files that will be deleted:
 cat3k_caa-base.SPA.03.02.00SE.pkg
 cat3k_caa-base.SPA.03.02.02.SE.pkg
 cat3k_caa-drivers.SPA.03.02.00.SE.pkg
 cat3k_caa-drivers.SPA.03.02.02.SE.pkg
 cat3k_caa-infra.SPA.03.02.00SE.pkg
 cat3k_caa-infra.SPA.03.02.02.SE.pkg
 cat3k_caa-iosd-universalk9.SPA.150-1.EX.pkg
 cat3k_caa-iosd-universalk9.SPA.150-1.EX2.pkg
 cat3k_caa-platform.SPA.03.02.00.SE.pkg
 cat3k_caa-platform.SPA.03.02.02.SE.pkg
 cat3k_caa-universalk9.SPA.03.02.03.SE.150-1.EX3.bin
 cat3k_caa-wcm.SPA.10.0.100.0.pkg
 cat3k_caa-wcm.SPA.10.0.111.0.pkg
 packages.conf.00-
 packages.conf.01-
[2]:
Files that will be deleted:
 cat3k_caa-base.SPA.03.02.00SE.pkg
 cat3k_caa-base.SPA.03.02.02.SE.pkg
 cat3k_caa-drivers.SPA.03.02.00.SE.pkg
 cat3k_caa-drivers.SPA.03.02.02.SE.pkg
 cat3k_caa-infra.SPA.03.02.00SE.pkg
 cat3k_caa-infra.SPA.03.02.02.SE.pkg
 cat3k_caa-iosd-universalk9.SPA.150-1.EX.pkg
 cat3k_caa-iosd-universalk9.SPA.150-1.EX2.pkg
 cat3k_caa-platform.SPA.03.02.00.SE.pkg
 cat3k_caa-platform.SPA.03.02.02.SE.pkg
 cat3k_caa-universalk9.SPA.03.02.03.SE.150-1.EX3.bin
 cat3k_caa-wcm.SPA.10.0.100.0.pkg
 cat3k_caa-wcm.SPA.10.0.111.0.pkg
 packages.conf.00-
 packages.conf.01-
[1
2]: Do you want to proceed with the deletion? [yes/no]: yes
[1
2]: Clean up completed
3850-1#dir
Directory
of flash:/
85193
-rw- 2097152 Sep 28 2013 14:28:26 +10:00 nvram_config
85199
-rw- 1224 Sep 28 2013 14:19:19 +10:00 packages.conf
85196
-rw- 8916 Sep 26 2013 15:59:58 +10:00 vlan.dat
85195
-rw- 114 Jun 6 2013 08:31:45 +10:00 express_setup.debug
30979
-rw- 74369716 Sep 28 2013 14:19:15 +10:00 cat3k_caa-base.SPA.03.02.03.SE.pkg
30980
-rw- 5808828 Sep 28 2013 14:19:15 +10:00 cat3k_caa-drivers.SPA.03.02.03.SE.pkg
30981
-rw- 32496484 Sep 28 2013 14:19:15 +10:00 cat3k_caa-infra.SPA.03.02.03.SE.pkg
30982
-rw- 30418104 Sep 28 2013 14:19:15 +10:00
cat3k_caa-iosd-universalk9.SPA.150-1.EX3.pkg
30983
-rw- 16059104 Sep 28 2013 14:19:15 +10:00 cat3k_caa-platform.SPA.03.02.03.SE.pkg
30984
-rw- 64586444 Sep 28 2013 14:19:15 +10:00 cat3k_caa-wcm.SPA.10.0.120.0.pkg
1621966848
bytes total (1393401856 bytes free)
In this step, you can verify switch is
having upgraded image in each member of the switch stack.
3850-1#sh
ver | be SW 
Switch
Ports Model              SW Version        SW Image              Mode   
------
----- -----              ----------        ----------            ----   
     1 56   
WS-C3850-48P      
03.02.03.SE      
cat3k_caa-universalk9 INSTALL
     2 56   
WS-C3850-48P      
03.02.03.SE      
cat3k_caa-universalk9 INSTALL
You can verify boot configuration of your
switch using "show boot" CLI command. As you can see
"packages.conf" file is the boot loading file used in the booting
process. If this file not exists or corrupted, the switch will go onto ROMMON
mode."
3850-1#sh
boot 
---------------------------
Switch
1
---------------------------
Current
Boot Variables:
BOOT
variable = flash:packages.conf;
Boot
Variables on next reload:
BOOT
variable = flash:packages.conf;
Manual
Boot = no
Enable
Break = no
You can access wireless controller GUI
using https://<switch-ipaddress>/wireless URL.
![]()  | 
| Cisco 3850 switch configuration example | 
It is different when compare to CUWN
controllers (5508,2504, etc). Let's see how we can configure the wireless
controller config on this switch. First of all you need to ensure you have the
correct license to start with.
3850-1#show
license right-to-use?
 default Displays the default license
information.
 detail Displays details of all the licenses in
the stack.
 eula Displays the EULA text.
 mismatch Displays mismatch license
information.
 slot Specify switch number
 summary Displays consolidated stack wide
license information.
 usage Displays the usage details of all
licenses.
 | Output modifiers
 <cr>
3850-1#show
license right-to-use summary 
License
Name Type Count Period left
-----------------------------------------------
 lanbase permanent N/A Lifetime
 apcount base 0 Lifetime
 apcount adder 0 Lifetime
 --------------------------------------------
 License Level In Use: ipbase
 License Level on Reboot: ipbase
 Evaluation AP-Count: Disabled
 Total AP Count Licenses: 0 
 AP Count Licenses In-use: 0
 AP Count Licenses Remaining: 0
In Converged Access architecture, 3850 can
act as Mobility Agent (MA) or Mobility Controller (MC). By default it is a MA.
Normally AP license should be on a MC where CAP/WAP tunnels from AP get
terminated. In this case we have only 3850 switch for everything (MC & MA)
so you have to install AP license onto this switch. Remember that maximum 50
APs can be supported by a 3850 switch stack. In our case we will configure 25 licenses
each for the first two members of stack & all APs to be terminated in these
two switches (max 25 in each member).
3850-1#license
right-to-use?
 activate activate particular license level
 deactivate deactivate particular license level
3850-1#license
right-to-use activate?
 apcount configure the AP-count licenses on the
switch
 ipbase activate ipbase license on the switch
 ipservices activate Ipservices license on the
switch
 lanbase activate lanbase license on the switch
3850-1#license
right-to-use activate apcount?
 <1-50> configure the number of adder
licenses
 evaluation activate evaluation license
3850-1#license
right-to-use activate apcount 50?
 slot Specify switch number
3850-1#license
right-to-use activate apcount 50 slot?
 <1-9> Specify switch number
3850-1#license
right-to-use activate apcount 50 slot 1?
 acceptEULA automatically accept the EULA for
the given license
 <cr>
3850-1#license
right-to-use activate apcount 50 slot 1 acceptEULA 
3850-1#license
right-to-use activate apcount 50 slot 2 acceptEULA 
%
switch-2:stack-mgr:ACTIVATION FAIL : Total AP Count Licenses exceed maximum
limit
!
3850-1#license
right-to-use deactivate apcount 25 slot 1 
3850-1#license
right-to-use activate apcount 25 slot 2 acceptEULA
You have to enable the MC functionality of
3850 by using the "wireless mobility controller" CLI command as shown
below.
3850-1(config)#wireless
mobility ?
 controller Configures mobility controller
settings
 dscp Configures the Mobility inter controller DSCP
value
 group Configures the Mobility group parameters
 load-balance Configure mobility load-balance
status
 multicast Configures the Multicast Mode for
mobility messages
 oracle Configures mobility oracle settings
3850-1(config)#wireless
mobility controller ?
 ip no description
 peer-group Configures mobility peer groups 
 <cr>
3850-1(config)#wireless
mobility controller
Now we are one step away to register our
AP. To register AP you should nominate an interface as wireless management
interface. You have to remember that all your AP should be configured with same
vlan access port where you configured for wireless management, otherwise AP
won’t join. In our case we will use vlan21 as wireless management interface &
configure switch port connected to AP in vlan 21.
interface
Vlan21
 ip address 192.168.21.1 255.255.255.0
!
wireless
management interface Vlan21
!
interface
GigabitEthernet1/0/1
switchport
access vlan 21
switchport
mode access
spanning-tree
portfast
Now if you type "show ap summary"
you would see your AP get registered to your 3850 WLC.
3850-1#show
ap summary 
Number
of APs: 1
Global
AP User Name: Not configured
Global
AP Dot1x User Name: Not configured
AP
Name                           AP
Model  Ethernet MAC    Radio MAC       State         
----------------------------------------------------------------------------------------
bc16.6516.790e                    3602I     bc16.6516.790e  f41f.c298.c2a0  Registered
You can change any AP specific
configuration by using "ap name <AP-NAME> x" CLI commands.
Following are the all options available. we will change the name as example.
5508-1#ap
name bc16.6516.790e?
  ap-groupname      Set groupname
  bhrate            Bridge Backhaul Tx Rate
  bridgegroupname   Set bridgegroupname
  bridging          Enable Ethernet-to-Ethernet bridging
  capwap            AP Capwap parameters
  command           Remote execute a command on Cisco AP
  console-redirect  Enable redirecting remote debug output of
Cisco AP to
                    console
  core-dump         Enable memory core dump on Cisco AP
  country           Configure the country of operation
  crash-file        Manage crash data and radio core files
for Cisco AP
  dot11   
         Configures 802.11
parameters
  dot1x-user        Enable the 802.1X credential for the
current AP
  ethernet          Configure Ethernet Port of the AP
  image             Configure image
  led               Enable LED-state for Cisco AP
  link-encryption   Enable link encryption state on Cisco AP
  link-latency      Enable Link Latency on Cisco AP
  location          Configure AP location
  mfp               Enable Management Frame
Protection
  mgmtuser          Configures user name, password and secret
for AP management
  mode              Select AP mode of operation
  monitor-mode      Monitor-mode channel optimization
  name              Configure AP name
  no                Negate a command or set its
defaults
  power             Configure Cisco Power over
Ethernet (PoE) feature for AP
  reset             Reset AP
  reset-button      Disable or enable reset button on AP
  shutdown          Disable AP
  slot              Set slot number
  sniff             Enable sniffing on dot11a/b radio
  ssh               Enable SSH
  static-ip         Set Cisco AP static IP address
configuration
  stats-timer       Set the frequency at which statistics
are sent from AP
  syslog            Set the system logging settings for
Cisco AP
  tcp-adjust-mss    TCP MSS configuration for an AP
  telnet            Enable telnet for Cisco AP
  tftp-downgrade    Initiate AP image downgrade from a TFTP
server
5508-1#ap
name bc16.6516.790e name L3600-1
5508-1#show
ap summary 
Number
of APs: 1
Global
AP User Name: Not configured
Global
AP Dot1x User Name: Not configured
AP
Name                           AP
Model  Ethernet MAC    Radio MAC       State         
----------------------------------------------------------------------------------------
L3600-1                           3602I     bc16.6516.790e  f41f.c298.c2a0  Registered
You can use "show ap name
<AP_NAME> x" CLI commands to view specific AP configurations.
name
L3600-1 ?                    
  auto-rf          Auto-RF information for a Cisco AP
  bhmode   
       Show Cisco Bridge Backhaul
Mode
  bhrate           Show Cisco Bridge Backhaul Rate
  cac              Display Call Admission Control
details
  capwap           AP Capwap parameters
  ccx              Shows ccx related information
  cdp              Shows Cisco AP cdp information
  channel          Shows the channel information of an
Cisco AP
  config           Shows the configuration of an Cisco
AP
  core-dump        Shows the AP memory core dump setting
for an Cisco AP
  data-plane       Show data plane status
  dot11            Show 802.11 parameters
  ethernet         Shows ethernet information
  eventlog         Downloads and displays the event log
of a Cisco AP
  image            Shows the images present on a Cisco
AP
  inventory        Displays the inventory of a Cisco AP
  link-encryption  Show link encryption status
  service-policy   Show service policy information
  tcp-adjust-mss   Show tcp-adjust-mss  for an AP
  wlan             Show BSSIDs for each AP
5508-1#show
ap name L3600-1 config general 
Cisco
AP Name                                  
: L3600-1
Cisco
AP Identifier                            
: 3
Country
Code                                    :
AU  - Australia
Regulatory
Domain Allowed by Country            :
802.11bg:-A     802.11a:-N
AP
Country Code                                
: AU  - Australia
AP
Regulatory Domain                           
: Unconfigured
Switch
Port Number                             
: Gi1/0/1
MAC
Address                                     : bc16.6516.790e
IP
Address Configuration                       
: DHCP
IP
Address                                     
: 192.168.21.53
IP
Netmask                                     
: 255.255.255.0
Gateway
IP Address                              :
192.168.21.254
CAPWAP
Path MTU                                
: 1500
Telnet
State                                   
: Disabled
SSH
State                                      
: Disabled
Cisco
AP Location                               : default
location
Cisco
AP Group Name                            
: default-group
Administrative
State                            :
Enabled
Operation
State                                 :
Registered
AP
Mode                                         : Local
AP
Submode                                     
: Not Configured
Remote
AP Debug                                
: Disabled
Logging
Trap Severity Level                     :
informational
Software
Version                                : 10.0.101.0
Boot
Version                                   
: 15.2.2.4
Stats
Reporting Period                         
: 180
LED
State                                      
: Enabled
PoE
Pre-Standard Switch                        
: Disabled
PoE
Power Injector MAC Address                 
: Disabled
Power
Type/Mode                                
: Power Injector/Normal Mode
Number
of Slots                                
: 2
AP
Model                                       
: 3602I
AP
Image                                        :
C3600-K9W8-M
IOS
Version                                    
: 15.2(2)JN$
Reset
Button                                   
: Enabled
AP
Serial Number                               
: FGL1721X3K5
AP
Certificate Type                             : Manufacture Installed
Management
Frame Protection Validation          :
Disabled
AP
User Mode                                   
: Automatic
AP
User Name                                   
: Not Configured
AP
802.1X User Mode                            
: Not Configured
AP
802.1X User Name                            
: Not Configured
Cisco
AP System Logging Host                   
: 255.255.255.255
AP Up
Time                                     
: 3 days 20 hours 14 minutes 26 seconds 
AP
CAPWAP Up Time                              
: 3 days 20 hours 12 minutes 57 seconds 
Join
Date and Time                             
: 09/24/2013 19:01:11
If you want to configure global settings
for all APs then you have to go for the configuration mode & then use
"ap x " CLI command as shown below. We will change Country code as
example. You can add upto 20 country codes if you have AP in multiple
countries.
3850-1#conf
t
Enter
configuration commands, one per line. 
End with CNTL/Z.
3850-1(config)#ap
?
  auth-list         Configure Access Point authorization
list
  bridging          Enable/Disable Ethernet-to-Ethernet
bridging on all Cisco APs
  capwap            ap capwap parameters
  cdp               Enable/Disable CDP for all Cisco
APs
  core-dump         Enable/Disable memory core dump on all
Cisco APs
  country           Configure the country of operation
  dot11             Configures 802.11 parameters
  dot1x             Configure the 802.1X credential
for all APs
  ethernet          Configure Ethernet Port on all Cisco
APs
  group             Manage AP Groups VLAN feature
  led               Enable/Disable LED-state for all
Cisco APs
  link-encryption   Enable link encryption state on all Cisco
AP's
  link-latency      Enable Link Latency on all Cisco AP's
  mgmtuser          Configure the user for AP management
  power             Configure Cisco Power over
Ethernet (PoE) feature for all AP's
  reporting-period  Configure AP rogue/error reporting period
  reset-button      Enable/Disable reset button for all Cisco
APs
  static-ip         Set Cisco AP static IP address
configuration
  syslog            Configure the system logging
settings for Cisco AP
  tcp-adjust-mss    Enable/Disable TCP MSS configuration for
all Cisco APs
  tftp-downgrade    Initiate AP image downgrade from a TFTP
server for all Cisco APs
3850-1(config)#ap
country ?
  WORD 
Enter the country code (e.g. US,MX,IN) upto a maximum of 20 countries
3850-1(config)#ap
country AU
Changing
country code could reset channel and RRM grouping configuration. If running in
RRM One-Time mode, reassign channels after this command. Check customized APs
for valid channel values after this command. 
Are
you sure you want to continue? (y/n)[y]: y
3850-1(config)#
Next we will configure a WLAN.
5508-1(config)#wlan
?
  WORD     
Enter Profile Name up to 32 alphanumeric characters
  shutdown 
Enable/disable all WLANs
5508-1(config)#wlan
MRN-CCIEW ?
  <1-64> 
Create WLAN Identifier
  <cr>
5508-1(config)#wlan
MRN-CCIEW 1 ?
  WORD 
Enter SSID (Network Name) up to 32 alphanumeric characters
  <cr>
5508-1(config)#wlan
MRN-CCIEW 1 MRN-CCIEW 
5508-1(config-wlan)#no
shutdown
You can verify WLAN configuration in your
“show running-config all” output.
5508-1#show
running-config all | section wlan
wlan
MRN-CCIEW 1 MRN-CCIEW
 accounting-list 
 channel-scan defer-time 100
 client association limit 0
 client vlan default
 dtim dot11 24ghz 1
 dtim dot11 5ghz 1
 exclusionlist timeout 60
 ip access-group web none
 ip access-group none
 ip dhcp server 0.0.0.0
 ipv6 traffic-filter web none
 ipv6 traffic-filter none
 mac-filtering 
 radio all
 security dot1x authentication-list 
 security dot1x encryption 104
 security static-wep-key authentication open
 security tkip hold-down 60
 security web-auth authentication-list 
 security web-auth parameter-map 
 service-policy client input unknown
 service-policy client output unknown
 service-policy input unknown
 service-policy output unknown
 session-timeout 1800
 no shutdown
You can configure any WLAN specific configs
as shown below. You have to shutdown the WLAN before make any changes.
5508-1(config)#wlan
MRN-CCIEW 1 MRN-CCIEW 
5508-1(config-wlan)#?
  aaa-override         AAA policy override
  accounting-list      Set the accounting list for IEEE 802.1x
  band-select          Allow|Disallow Band Select on a WLAN.
  broadcast-ssid       Set broadcast SSID on a WLAN
  call-snoop           Call Snooping support
  ccx                  Configure Cisco Client
Extension options
  channel-scan         Configures off channel scanning
deferral parameters
  chd                  Set CHD per WLAN
  client               WLAN configuration for clients
  datalink             WLAN Datalink commands
  default  
           Set a command to its
defaults
  diag-channel         Set Diagnostics Channel Capability on
a WLAN
  dtim                 Set the DTIM period for the
WLAN 
  exclusionlist        Set exclusion-listing on WLAN
  exit                 Exit sub-mode
  ip                   WLAN IP configuration
commands
  ipv6                 IPv6 WLAN subcommands
  load-balance         Allow|Disallow Load Balance on a WLAN.
  local-auth           Set the EAP Profile on a WLAN
  mac-filtering        Set MAC filtering support on WLAN
  media-stream         Configures media stream
  mfp                  Configures Management Frame
Protection
  mobility             Configure mobility
  nac                  Configures Radius NAC
support(Identity Service Engine).
  no      
            Negate a command or
set its defaults
  passive-client       Configures passive client feature
  peer-blocking        Configure peer-to-peer blocking on a
WLAN
  radio                Configures the Radio Policy
  roamed-voice-client  Configure Roaming Attrbutes for Voice Clients
  security             Configures the security policy for
a WLAN
  service-policy       Configure WLAN QOS Service Policy
  session-timeout      Configures client timeout
  shutdown     
       Disable WLAN
  sip-cac              Configure Wlan Sip-Cac attributes
  static-ip            Configures static IP client
tunneling support on a WLAN.
  uapsd                Configure WMM UAPSD attributes
for Wlan
  wgb                  Configures WGB support on the
WLAN
  wmm                  Configures WMM (WME)
5508-1(config-wlan)#client
vlan 51
%
switch-1:wcm:Request failed - WLAN in the enabled state.
5508-1(config-wlan)#shut
5508-1(config-wlan)#client
vlan 51
5508-1(config-wlan)#radio
?
  all     
Enable all available radios
  dot11a  
Enable 802.11a radio only
  dot11ag 
Enable 802.11 a and g radios
  dot11bg 
Enable 802.11b and g radios
  dot11g  
Enable 802.11g radio only
5508-1(config-wlan)#radio
dot11a 
5508-1(config-wlan)#wmm
?
  allowed 
Allows WMM on the WLAN
  require 
Requires WMM enabled clients on the WLAN
5508-1(config-wlan)#wmm
require 
5508-1(config-wlan)#ip
?
  access-group 
Specify WLAN ACL
  dhcp         
Configure DHCP parameters for WLAN
  flow         
Flexible Netflow commands
  multicast    
Configure multicast
  verify       
verify
5508-1(config-wlan)#ip
dhcp ?
  opt82    
Set DHCP option 82 for wireless clients on this WLAN 
  required 
Specify whether DHCP address assignment is required
  server   
Configures the WLAN's IPv4 DHCP Server
5508-1(config-wlan)#ip
dhcp server 192.168.51.1
5508-1(config-wlan)#no
shut
You can verify WLAN settings “show wlan id
<WLAN_ID>” CLI command as shown below.
5508-1#show
wlan id 1
WLAN
Profile Name     : MRN-CCIEW
================================================
Identifier                                     : 1
Network
Name (SSID)                            :
MRN-CCIEW
Status                                         :
Enabled
Broadcast
SSID                                 : Enabled
Maximum
number of Associated Clients           :
0
AAA
Policy Override                           
: Disabled
Network
Admission Control
  NAC-State                                    : Disabled
Number
of Active Clients                       :
0
Exclusionlist
Timeout                          : 60
Session
Timeout                                :
1800 seconds
CHD
per WLAN                                  
: Enabled
Webauth
DHCP exclusion                         : Disabled
Interface                                      : 51
Interface
Status                               :
Unconfigured
Multicast
Interface                            :
Unconfigured
WLAN
IPv4 ACL                                 
: unconfigured
WLAN
IPv6 ACL                                 
: unconfigured
DHCP
Server                                   
: 192.168.51.1
DHCP
Address Assignment Required              
: Disabled
DHCP
Option 82                                
: Disabled
DHCP
Option 82 Format                         
: ap-mac
DHCP
Option 82 Ascii Mode                     
: Disabled
DHCP
Option 82 Rid Mode                       
: Disabled
QoS
Service Policy - Input
  Policy Name                                  : unknown
  Policy State                                 : None
QoS
Service Policy - Output
  Policy Name                                  : unknown
  Policy State                                 : None
QoS
Client Service Policy
  Input 
Policy Name                          
: unknown
  Output Policy Name                           : unknown
WMM                                            :
Required
Channel
Scan Defer Priority:
  Priority (default)                           : 4
  Priority (default)                           : 5
  Priority (default)                           : 6
Scan
Defer Time (msecs)                       
: 100
Media
Stream Multicast-direct                 
: Disabled
CCX -
AironetIe Support                       
: Enabled
CCX -
Gratuitous ProbeResponse (GPR)           : Disabled
CCX -
Diagnostics Channel Capability          
: Disabled
Dot11-Phone
Mode (7920)                        :
Invalid
Wired
Protocol                                
: None
Peer-to-Peer
Blocking Action                   :
Disabled
Radio
Policy                                  
: 802.11a only
DTIM
period for 802.11a radio                 
: 1
DTIM
period for 802.11b radio                 
: 1
Local
EAP Authentication                      
: Disabled
Mac
Filter Authorization list name             : Disabled
Accounting
list name                           :
Disabled
802.1x
authentication list name                :
Disabled
Security
    802.11 Authentication                      : Open System
    Static WEP Keys                            : Disabled
    802.1X                                     : Disabled
    Wi-Fi Protected Access (WPA/WPA2)          : Enabled
        WPA (SSN IE)                           : Disabled
        WPA2 (RSN IE)                          : Enabled
            TKIP Cipher                        : Disabled
            AES Cipher                         : Enabled
        Auth Key Management
            802.1x                             : Enabled
            PSK                                : Disabled
            CCKM                               : Disabled
    CKIP                                       :
Disabled
    IP Security                                : Disabled
    IP Security Passthru                       : Disabled
    L2TP                                       : Disabled
    Web Based Authentication                   : Disabled
    Conditional Web Redirect                   : Disabled
    Splash-Page Web Redirect                   : Disabled
    Auto Anchor                                : Disabled
    Sticky Anchoring                           : Enabled
    Cranite Passthru                           : Disabled
    Fortress Passthru                          : Disabled
    PPTP                                       :
Disabled
    Infrastructure MFP protection              : Enabled
    Client MFP                                 : Optional
    Webauth On-mac-filter Failure              : Disabled
    Webauth Authentication List Name           : Disabled
    Webauth Parameter Map                      : Disabled
    Tkip MIC Countermeasure Hold-down
Timer    : 60
Call
Snooping                                 
: Disabled
Passive
Client                                 :
Disabled
Non
Cisco WGB                                 
: Disabled
Band
Select                                    : Disabled
Load
Balancing                                
: Disabled
IP
Source Guard                               
: Disabled
By default WLAN is configured with
WPA2/AES. So if you want to check basic client connectivity you can disable it.
Then you should be able to connect your wireless client to this new SSID.
In a separate post we will see how to
configure different security methods for a given SSID.
The material is referred from:


Its really very useful blog. thanks for shearing with us.
ReplyDeletecomparatif vpn
télé française à l'étranger
netflix film en francais