Cisco Wireless LAN Controller Con Guration Guide, Release 7.2
Cisco Wireless LAN Controller Con Guration Guide, Release 7.2
Chapter Contents
nformation About Ports
Information About Distribution System Ports
Guidelines and Limitations
Information About Service Ports
Guidelines and Limitations
nformation About Interfaces
Guidelines and Limitations
Additional References
Configuring the Management Interface
Information About the Management Interface
Guidelines and Limitations
Configuring the Management Interface
Configuring the Management Interface (GUI)
Configuring the Management Interface (CLI)
Configuring the AP-Manager Interface
Information About the AP-Manager Interface
Guidelines and Limitations
Configuring the AP-Manager Interface
Configuring the AP-Manager Interface (GUI)
Configuring the AP-Manager Interface (CLI)
Additional References
Configuring Virtual Interfaces
Information About Virtual Interfaces
Guidelines and Limitations
Configuring Virtual Interfaces
Configuring Virtual Interfaces (GUI)
Configuring Virtual Interfaces (CLI)
Configuring Service-Port Interfaces
Information About Service-Port Interfaces
Guidelines and Limitations
Configuring Service-Port Interfaces
Configuring Service-Port Interfaces (GUI)
Configuring Service-Port Interfaces (CLI)
Configuring Dynamic Interfaces
Information About Dynamic Interfaces
Guidelines and Limitations
Configuring Dynamic Interfaces
Configuring Dynamic Interfaces (GUI)
Configuring Dynamic Interfaces (CLI)
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-2/configuration/guide/cg/cg_ports_interfaces.html 1/34
4/2/22, 12:17 PM Cisco Wireless LAN Controller Configuration Guide, Release 7.2 - Chapter 3 - Configuring Ports and Interfaces [Cisco Wirele…
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-2/configuration/guide/cg/cg_ports_interfaces.html 2/34
4/2/22, 12:17 PM Cisco Wireless LAN Controller Configuration Guide, Release 7.2 - Chapter 3 - Configuring Ports and Interfaces [Cisco Wirele…
Figure 4-1 Ports on the Cisco 5500 Series Wireless LAN Controllers
1
Redundant port for future use (RJ-45) 6 SFP distribution system ports 1–8
2 Service port (RJ-45) 7 Management port LEDs
3 Console port (RJ-45) 8 SFP distribution port Link and
Activity LEDs
4 9 Power supply (PS1 and PS2),
USB ports 0 and 1 (Type A) System (SYS), and Alarm (ALM)
LEDs
5 Console port (Mini USB Type B) 10 Expansion module slot
Note You can use only one console port (either RJ-45 or mini USB).
When you connect to one console port, the other is disabled.
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-2/configuration/guide/cg/cg_ports_interfaces.html 3/34
4/2/22, 12:17 PM Cisco Wireless LAN Controller Configuration Guide, Release 7.2 - Chapter 3 - Configuring Ports and Interfaces [Cisco Wirele…
A distribution system port connects the controller to a neighbor switch and serves as the data path between
these two devices.
Note The Gigabit Ethernet ports on the Cisco 5508 Controllers accept these SX/LC/T small form-factor plug-in
(SFP) modules:
- 1000BASE-SX SFP modules, which provide a 1000-Mbps wired connection to a network through an
850nM (SX) fiber-optic link using an LC physical connector
- 1000BASE-LX SFP modules, which provide a 1000-Mbps wired connection to a network through a
1300nM (LX/LH) fiber-optic link using an LC physical connector
- 1000BASE-T SFP modules, which provide a 1000-Mbps wired connection to a network through a copper
link using an RJ-45 physical connector
Each distribution system port is, by default, an 802.1Q VLAN trunk port. The VLAN trunking characteristics of the
port are not configurable.
These five types of interfaces are available on the controller. Four of these are static and are configured at setup
time:
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-2/configuration/guide/cg/cg_ports_interfaces.html 4/34
4/2/22, 12:17 PM Cisco Wireless LAN Controller Configuration Guide, Release 7.2 - Chapter 3 - Configuring Ports and Interfaces [Cisco Wirele…
Note You are not required to configure an AP-manager interface on Cisco 5500 Series Controllers.
Each interface is mapped to at least one primary port, and some interfaces (management and dynamic) can be
mapped to an optional secondary (or backup) port. If the primary port for an interface fails, the interface
automatically moves to the backup port. In addition, multiple interfaces can be mapped to a single controller port.
Note For Cisco 5500 Series Controllers in a non-link-aggregation (non-LAG) configuration, the management
interface must be on a different VLAN than any dynamic AP-manager interface. Otherwise, the management
interface cannot fail over to the port that the AP-manager is on.
Note Cisco 5500 Series Controllers do not support fragmented pings on any interface.
Additional References
See the “Configuring Link Aggregation” section if you want to configure the controller to dynamically map the
interfaces to a single port channel rather than having to configure primary and secondary ports for each interface.
For CAPWAP, the controller requires one management interface to control all inter-controller communications and
one AP-manager interface to control all controller-to-access point communications, regardless of the number of
ports.
Do not configure wired clients in the same VLAN or subnet of the service port of the controller on the
network. If you configure wired clients on the same subnet or VLAN as the service port, it is not possible to
access the management interface of the controller.
Typically, you define the management, AP-manager, virtual, and service-port interface parameters using
the Startup Wizard. However, you can display and configure interface parameters through either the GUI or
CLI after the controller is running.
Step 2 Click management link. The Interfaces > Edit page appears.
Note The management interface uses the controller’s factory-set distribution system MAC address.
Note Select the Quarantine check box if you want to configure this VLAN as unhealthy or you want to configure
network access control (NAC) out-of-band integration. Doing so causes the data traffic of any client that is
assigned to this VLAN to pass through the controller. See “Working with WLANs,” for more information
about NAC out-of-band integration.
NAT address (only Cisco 2500 Series Controllers and Cisco 5500 Series Controllers are configured for
dynamic AP management)
Note Select the Enable NAT Address check box and enter the external NAT IP address if you want to be able to
deploy your Cisco 2500 Series Controllers or Cisco 5500 Series Controller behind a router or other gateway
device that is using one-to-one mapping network address translation (NAT). NAT allows a device, such as a
router, to act as an agent between the Internet (public) and a local network (private). In this case, it maps the
controller’s intranet IP addresses to a corresponding external address. The controller’s dynamic AP-
manager interface must be configured with the external NAT IP address so that the controller can send the
correct IP address in the Discovery Response.
Note The NAT parameters are supported for use only with one-to-one-mapping NAT, where each private client
has a direct and fixed mapping to a global address. The NAT parameters do not support one-to-many NAT,
which uses source port mapping to enable a group of clients to be represented by a single IP address.
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-2/configuration/guide/cg/cg_ports_interfaces.html 6/34
4/2/22, 12:17 PM Cisco Wireless LAN Controller Configuration Guide, Release 7.2 - Chapter 3 - Configuring Ports and Interfaces [Cisco Wirele…
Note If a Cisco 2500 Series Controllers or Cisco 5500 Series Controller is configured with an external NAT IP
address under the management interface, the APs in local mode cannot associate with the controller. The
workaround is to either ensure that the management interface has a globally valid IP address or ensure that
external NAT IP address is valid internally for the local APs.
VLAN identifier
Note Enter 0 for an untagged VLAN or a nonzero value for a tagged VLAN. We recommend using tagged VLANs
for the management interface.
Note For Cisco 2500 Series Controllers or Cisco 5500 Series Controllers, the management interface acts like an
AP-manager interface by default. If desired, you can disable the management interface as an AP-manager
interface and create another dynamic interface as an AP manager.
Physical port assignment (for all controllers except the Cisco 5500 Series Controller)
Primary and secondary DHCP servers
Access control list (ACL) setting, if required
Note To create ACLs, follow the instructions in Chapter7, “Configuring Security Solutions”
Step 5 If you made any changes to the management or virtual interface, reboot the controller so that your
changes take effect.
Note The management interface uses the controller’s factory-set distribution system MAC address.
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-2/configuration/guide/cg/cg_ports_interfaces.html 7/34
4/2/22, 12:17 PM Cisco Wireless LAN Controller Configuration Guide, Release 7.2 - Chapter 3 - Configuring Ports and Interfaces [Cisco Wirele…
Note Use the config interface quarantine vlan management vlan_id command to configure a quarantine VLAN
on the management interface.
Note Enter 0 for an untagged VLAN or a nonzero value for a tagged VLAN. We recommend using tagged VLANs
for the management interface.
Note Use the config interface ap-manager management {enable | disable} command to enable or disable
dynamic AP management for the management interface. For Cisco 5500 Series Controllers, the
management interface acts like an AP-manager interface by default. If desired, you can disable the
management interface as an AP-manager interface and create another dynamic interface as an AP manager.
Step 4 Enter these commands if you want to be able to deploy your Cisco 5500 Series Controller behind a router
or other gateway device that is using one-to-one mapping network address translation (NAT):
NAT allows a device, such as a router, to act as an agent between the Internet (public) and a local network
(private). In this case, it maps the controller’s intranet IP addresses to a corresponding external address. The
controller’s dynamic AP-manager interface must be configured with the external NAT IP address so that the
controller can send the correct IP address in the Discovery Response.
Note These NAT commands can be used only on Cisco 5500 Series Controllers and only if the management
interface is configured for dynamic AP management.
Note These commands are supported for use only with one-to-one-mapping NAT, where each private client has
a direct and fixed mapping to a global address. These commands do not support one-to-many NAT, which
uses source port mapping to enable a group of clients to be represented by a single IP address.
Step 7 If you made any changes to the management interface, enter the reset system
command to reboot the
controller in order for the changes to take effect.
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-2/configuration/guide/cg/cg_ports_interfaces.html 8/34
4/2/22, 12:17 PM Cisco Wireless LAN Controller Configuration Guide, Release 7.2 - Chapter 3 - Configuring Ports and Interfaces [Cisco Wirele…
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-2/configuration/guide/cg/cg_ports_interfaces.html 9/34
4/2/22, 12:17 PM Cisco Wireless LAN Controller Configuration Guide, Release 7.2 - Chapter 3 - Configuring Ports and Interfaces [Cisco Wirele…
Step 2 Click AP-Manager Interface. The Interface > Edit page appears.
Note Enter 0 for an untagged VLAN or a nonzero value for a tagged VLAN. We recommend using tagged VLANs
for the AP-manager interface.
Note The AP-manager interface’s IP address must be different from the management interface’s IP address and
may or may not be on the same subnet as the management interface. However, we recommend that both
interfaces be on the same subnet for optimum access point association.
Note To create ACLs, follow the instructions in Chapter7, “Configuring Security Solutions”
Step 5 If you made any changes to the management or virtual interface, reboot the controller so that your
changes take effect.
Note If the system is operating in Layer 2 mode, the AP-manager interface is not listed.
Note Enter 0 for an untagged VLAN or a nonzero value for a tagged VLAN. We recommend using tagged VLANs
for the AP-manager interface.
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-2/configuration/guide/cg/cg_ports_interfaces.html 10/34
4/2/22, 12:17 PM Cisco Wireless LAN Controller Configuration Guide, Release 7.2 - Chapter 3 - Configuring Ports and Interfaces [Cisco Wirele…
Additional References
See the “Configuring Multiple AP-Manager Interfaces” section for information on creating and using multiple AP-
manager interfaces.
Acts as the DHCP server placeholder for wireless clients that obtain their IP address from a DHCP server.
Serves as the redirect address for the web authentication login page.
Note See “Configuring Security Solutions,” for additional information on web authentication.
Note To ensure connectivity and web authentication, the DNS server should always point to the virtual interface. If
a DNS hostname is configured for the virtual interface, then the same DNS host name must be configured on
the DNS server(s) used by the client.
Step 5 If you made any changes to the management or virtual interface, reboot the controller so that your
changes take effect.
Note For ip-address, enter any fictitious, unassigned, and unused gateway IP address.
Step 4 Enter the reset system command. At the confirmation prompt, enter Y to save your configuration changes
to NVRAM. The controller reboots.
Step 2 Click the service-port link to open the Interfaces > Edit page.
Note The service-port interface uses the factory-set service-port MAC address of the controller.
Step 5 If you made any changes to the management or virtual interface, reboot the controller so that your
changes take effect.
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-2/configuration/guide/cg/cg_ports_interfaces.html 13/34
4/2/22, 12:17 PM Cisco Wireless LAN Controller Configuration Guide, Release 7.2 - Chapter 3 - Configuring Ports and Interfaces [Cisco Wirele…
Note The service-port interface uses the controller’s factory-set service-port MAC address.
server [
ip-address-of-secondary-dhcp-server
]
To disable the DHCP server: config interface dhcp service-port none
To configure the IP address: config interface address service-port
ip-addr ip-netmask
Step 3 The service port is used for out-of-band management of the controller. If the management workstation is
in a remote subnet, you may need to add a route on the controller in order to manage the controller from
that remote workstation. To do so, enter this command:
You can configure zero, one, or multiple dynamic interfaces on a distribution system port. However, all dynamic
interfaces must be on a different VLAN or IP subnet from all other interfaces configured on the port. If the port is
untagged, all dynamic interfaces must be on a different IP subnet from any other interface configured on the port.
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-2/configuration/guide/cg/cg_ports_interfaces.html 14/34
4/2/22, 12:17 PM Cisco Wireless LAN Controller Configuration Guide, Release 7.2 - Chapter 3 - Configuring Ports and Interfaces [Cisco Wirele…
Step 3 Enter an interface name and a VLAN identifier, as shown in Figure 4-6.
Note Select the Quarantine check box if you want to configure this VLAN as unhealthy or you want to configure
network access control (NAC) out-of-band integration. Doing so causes the data traffic of any client that is
assigned to this VLAN to pass through the controller. See “Working with WLANs,” for more information
about NAC out-of-band integration.
Physical port assignment (for all controllers except the 5500 series)
NAT address (only for Cisco 5500 Series Controllers configured for dynamic AP management)
Note Select the Enable NAT Address check box and enter the external NAT IP address if you want to be able to
deploy your Cisco 5500 Series Controller behind a router or other gateway device that is using one-to-one
mapping network address translation (NAT). NAT allows a device, such as a router, to act as an agent
between the Internet (public) and a local network (private). In this case, it maps the controller’s intranet IP
addresses to a corresponding external address. The controller’s dynamic AP-manager interface must be
configured with the external NAT IP address so that the controller can send the correct IP address in the
Discovery Response.
Note The NAT parameters are supported for use only with one-to-one-mapping NAT, where each private client
has a direct and fixed mapping to a global address. The NAT parameters do not support one-to-many NAT,
which uses source port mapping to enable a group of clients to be represented by a single IP address.
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-2/configuration/guide/cg/cg_ports_interfaces.html 15/34
4/2/22, 12:17 PM Cisco Wireless LAN Controller Configuration Guide, Release 7.2 - Chapter 3 - Configuring Ports and Interfaces [Cisco Wirele…
Dynamic AP management
Note When you enable this feature, this dynamic interface is configured as an AP-manager interface (only one
AP-manager interface is allowed per physical port). A dynamic interface that is marked as an AP-manager
interface cannot be used as a WLAN interface.
Note Set the APs in a VLAN that is different than the dynamic interface configured on the controller. If the APs are
in the same VLAN as the dynamic interface, the APs are not registered on the controller and the “LWAPP
discovery rejected” and “Layer 3 discovery request not received on management VLAN” errors are logged
on the controller.
VLAN identifier
Fixed IP address, IP netmask, and default gateway
Primary and secondary DHCP servers
Access control list (ACL) name, if required
Note To ensure proper operation, you must set the Port Number and Primary DHCP Server parameters.
Step 7 Repeat this procedure for each dynamic interface that you want to create or edit.
Note When you apply a flow policer or an aggregate policer at the ingress of a Dynamic Interface VLAN for the
Upstream (wireless to wired) traffic, it is not possible to police because the VLAN based policy has no effect
and no policing occurs. When the traffic comes out of the WiSM LAG (L2) and hits the Switch Virtual
Interface (SVI) (L3), the QoS policy applied is a VLAN-based policy that has no effect on the policing.
To enable an ingress L3 VLAN-based policy on the SVI, you must enable a VLAN-based QoS equivalent to
the mls qos-vlan-based command on the WiSM LAG. All the previous 12.2(33)SXI releases, which support
Auto LAG for WiSM only, such as 12.2(33)SXI, 12.2(33)SXI1, 12.2(33)SXI2a, 12.2(33)SXI3, and so on, do
not have this WiSM CLI. Therefore, the VLAN-based QoS policy applied at the ingress of the SVI for wireless
to wired traffic never polices any traffic coming out of the WiSM LAG that hits the SVI. The commands that
are equivalent to the mls qos-vlan-based command are as follows:
Virtual Switching System: wism switch switch_no module module_no controller controller_no qos-vlan-
based
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-2/configuration/guide/cg/cg_ports_interfaces.html 16/34
4/2/22, 12:17 PM Cisco Wireless LAN Controller Configuration Guide, Release 7.2 - Chapter 3 - Configuring Ports and Interfaces [Cisco Wirele…
Step 2 View the details of a specific dynamic interface by entering this command:
Note Interface names that contain spaces must be enclosed in double quotes. For example: config interface
create "vlan 25".
Note Use the config interface ap-manager operator_defined_interface_name {enable | disable} command to
enable or disable dynamic AP management. When you enable this feature, this dynamic interface is
configured as an AP-manager interface (only one AP-manager interface is allowed per physical port). A
dynamic interface that is marked as an AP-manager interface cannot be used as a WLAN interface.
Note Use the config interface quarantine vlan interface_name vlan_id command to configure a quarantine VLAN
on any interface.
Step 5 Enter these commands if you want to be able to deploy your Cisco 5500 Series Controller behind a router
or other gateway device that is using one-to-one mapping network address translation (NAT):
NAT allows a device, such as a router, to act as an agent between the Internet (public) and a local network
(private). In this case, it maps the controller’s intranet IP addresses to a corresponding external address. The
controller’s dynamic AP-manager interface must be configured with the external NAT IP address so that the
controller can send the correct IP address in the Discovery Response.
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-2/configuration/guide/cg/cg_ports_interfaces.html 17/34
4/2/22, 12:17 PM Cisco Wireless LAN Controller Configuration Guide, Release 7.2 - Chapter 3 - Configuring Ports and Interfaces [Cisco Wirele…
Note These NAT commands can be used only on Cisco 5500 Series Controllers and only if the dynamic interface
is configured for dynamic AP management.
Note These commands are supported for use only with one-to-one-mapping NAT, whereby each private client
has a direct and fixed mapping to a global address. These commands do not support one-to-many NAT,
which uses source port mapping to enable a group of clients to be represented by a single IP address.
Note If desired, you can enter the config interface delete operator_defined_interface_name command to delete
a dynamic interface.
Note If link aggregation (LAG) is enabled, there can be only one AP-manager interface.
We recommend having a separate dynamic AP-manager interface per controller port. See the “Configuring
Multiple AP-Manager Interfaces” section for instructions on configuring multiple dynamic AP-manager interfaces.
Figure 4-7 shows the relationship between ports, interfaces, and WLANs.
As shown in Figure 4-7, each controller port connection is an 802.1Q trunk and should be configured as such on
the neighbor switch. On Cisco switches, the native VLAN of an 802.1Q trunk is an untagged VLAN. If you
configure an interface to use the native VLAN on a neighboring Cisco switch, make sure you configure the
interface on the controller to be untagged.
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-2/configuration/guide/cg/cg_ports_interfaces.html 18/34
4/2/22, 12:17 PM Cisco Wireless LAN Controller Configuration Guide, Release 7.2 - Chapter 3 - Configuring Ports and Interfaces [Cisco Wirele…
Note A zero value for the VLAN identifier (on the Controller > Interfaces page) means that the interface is
untagged.
The default (untagged) native VLAN on Cisco switches is VLAN 1. When controller interfaces are configured as
tagged (meaning that the VLAN identifier is set to a nonzero value), the VLAN must be allowed on the 802.1Q
trunk configuration on the neighbor switch and not be the native untagged VLAN.
We recommend that tagged VLANs be used on the controller. You should also allow only relevant VLANs on the
neighbor switch’s 802.1Q trunk connections to controller ports. All other VLANs should be disallowed or pruned
in the switch port trunk configuration. This practice is extremely important for optimal performance of the
controller.
Note We recommend that you assign one set of VLANs for WLANs and a different set of VLANs for management
interfaces to ensure that controllers properly route VLAN traffic.
Configuring Ports
This section contains the following topics:
This page shows the current configuration for each of the controller’s ports.
If you want to change the settings of any port, click the number for that specific port. The Port > Configure page
appears.
Note If the management and AP-manager interfaces are mapped to the same port and are members of the same
VLAN, you must disable the WLAN before making a port-mapping change to either interface. If the
management and AP-manager interfaces are assigned to different VLANs, you do not need to disable the
WLAN.
Note The number of parameters available on the Port > Configure page depends on your controller type.
Note In Cisco Wireless LAN Controller Module (NM-AIR-WLC6-K9), Cisco 5500 Series Controller, and Cisco Flex
7500 Series Controllers, the physical mode is always set to auto.
Physical Status—The data rate being used by the port. The available data rates vary based on controller
type. The following options are available:
– Catalyst 3750G Integrated Wireless LAN Controller Switch—1000 Mbps full duplex
Note Some older Cisco access points do not draw PoE even if it is enabled on the controller port. In such cases,
contact the Cisco Technical Assistance Center (TAC).
Note The controller in the Catalyst 3750G Integrated Wireless LAN Controller Switch supports PoE on all ports.
Admin Status
—Enables or disables the flow of traffic through the port. Options: Enable or Disable Default:
Enable.
Note Administratively disabling the port on a controller does not affect the port’s link status. The link can be
brought down only by other Cisco devices. On other Cisco products, however, administratively disabling a
port brings the link down.
Note When a primary port link goes down, messages may get logged internally only and not be posted to a
syslog server. It may take up to 40 seconds to restore logging to the syslog server.
Physical Mode
—Determines whether the port’s data rate is set automatically or specified by the user. The
supported data rates vary based on the controller type. Default: Auto.
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-2/configuration/guide/cg/cg_ports_interfaces.html 20/34
4/2/22, 12:17 PM Cisco Wireless LAN Controller Configuration Guide, Release 7.2 - Chapter 3 - Configuring Ports and Interfaces [Cisco Wirele…
– Catalyst 3750G Integrated Wireless LAN Controller Switch—Auto or 1000 Mbps full duplex
Note You will be prompted with a warning message when the following events occur:
1. When the traffic rate from the data ports exceeds 300 Mbps.
2. When the traffic rate from the data ports exceeds 250 Mbps constantly for 1 minute.
3. When the traffic rate from the data ports falls back to normal from one of the above states for 1 minute.
Link Trap
—Causes the port to send a trap when the port’s link status changes. Options: Enable or Disable
Default: Enable.
Multicast Appliance Mode
—Enables or disables the multicast appliance service for this port. Options:
Enable or Disable Default: Enable.
Step 6 Repeat this procedure for each additional port that you want to configure.
Note The 4-pin mini Type B connector is easily confused with the 5-pin mini Type B connector. They are not
compatible. Only the 5-pin mini Type B connector can be used.
For operation with Microsoft Windows, the Cisco Windows USB console driver must be installed on any PC
connected to the console port. With this driver, you can plug and unplug the USB cable into and from the console
port without affecting Windows HyperTerminal operations.
Note Only one console port can be active at a time. When a cable is plugged into the USB console port, the RJ-
45 port becomes inactive. Conversely, when the USB cable is removed from the USB port, the RJ-45 port
becomes active.
Microsoft Windows 2000, XP, Vista (Cisco Windows USB console driver required)
Apple Mac OS X 10.5.2 (no driver required)
Linux (no driver required)
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-2/configuration/guide/cg/cg_ports_interfaces.html 21/34
4/2/22, 12:17 PM Cisco Wireless LAN Controller Configuration Guide, Release 7.2 - Chapter 3 - Configuring Ports and Interfaces [Cisco Wirele…
http://tools.cisco.com/support/downloads/go/Redirect.x?mdfid=278875243
Step 3 Connect the mini Type B connector to the USB console port on the controller.
Step 4 When prompted for a driver, browse to the USB_Console.inf file on your PC. Follow the prompts to install
the USB driver.
Note Some systems might also require an additional system file. You can download the Usbser.sys file from this
URL:
http://support.microsoft.com/kb/918365
Step 2 From the list on the left side, choose Device Manager
.
Step 3 From the device list on the right side, double-click Ports (COM & LPT)
.
Step 6 From the COM Port Number drop-down list, choose an unused COM port of 4 or lower.
Step 7 Click OK
to save and then close the Advanced Settings dialog box.
Step 8 Click OK
to save and then close the Communications Port Properties dialog box.
The following factors should help you decide which method to use if your controller is set for Layer 3 operation:
With LAG, all of the controller ports need to connect to the same neighbor switch. If the neighbor switch
goes down, the controller loses connectivity.
With multiple AP-manager interfaces, you can connect your ports to different neighbor devices. If one of
the neighbor switches goes down, the controller still has connectivity. However, using multiple AP-manager
interfaces presents certain challenges (as discussed in the “Configuring Multiple AP-Manager Interfaces”
section) when port redundancy is a concern.
Follow the instructions on the page indicated for the method you want to use:
LAG simplifies controller configuration because you no longer need to configure primary and secondary ports for
each interface. If any of the controller ports fail, traffic is automatically migrated to one of the other ports. As long
as at least one controller port is functioning, the system continues to operate, access points remain connected to
the network, and wireless clients continue to send and receive data.
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-2/configuration/guide/cg/cg_ports_interfaces.html 23/34
4/2/22, 12:17 PM Cisco Wireless LAN Controller Configuration Guide, Release 7.2 - Chapter 3 - Configuring Ports and Interfaces [Cisco Wirele…
to Gigabit interface 3/1, and the controller’s port 2 is connected to Gigabit interface 2/1 on the Catalyst
6500 series switch. Both switch ports are assigned to the same channel group.
When a Cisco 5500 Series Controller LAG port is connected to a Catalyst 3750G or a 6500 or 7600 channel
group employing load balancing, note the following:
LAG requires the EtherChannel to be configured for the on mode on both the controller and the Catalyst
switch.
Once the EtherChannel is configured as on at both ends of the link, it does not matter if the Catalyst switch
is configured for either Link Aggregation Control Protocol (LACP) or Cisco proprietary Port Aggregation
Protocol (PAgP) because no channel negotiation is done between the controller and the switch.
Additionally, LACP and PAgP are not supported on the controller.
The load-balancing method configured on the Catalyst switch must be a load-balancing method that
terminates all IP datagram fragments on a single controller port. Not following this recommendation may
result in problems with access point association.
The recommended load-balancing method for Catalyst switches is src-dst-ip
(enter the port-channel
load-balance
src-dst-ip
command).
The Catalyst 6500 series switches running in PFC3 or PFC3CXL mode implement enhanced EtherChannel
load balancing. The enhanced EtherChannel load balancing adds the VLAN number to the hash function,
which is incompatible with LAG. From Release 12.2(33)SXH and later releases, Catalyst 6500 IOS software
offers the exclude vlan
keyword to the port-channel load-balance
command to implement src-dst-ip
load distribution. See the Cisco IOS Interface and Hardware Component Command Reference
for more
information.
Enter the show platform hardware pfc mode
command on the Catalyst 6500 switch to confirm the PFC
operating mode.
The following example shows a Catalyst 6500 series switch in PFC3B mode when you enter the global
configuration port-channel load-balance src-dst-ip
command for proper LAG functionality:
Figure 4-10 Link Aggregation with the Catalyst 6500 Series Neighbor Switch
You cannot configure the controller’s ports into separate LAG groups. Only one LAG group is supported per
controller. Therefore, you can connect a controller in LAG mode to only one neighbor device.
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-2/configuration/guide/cg/cg_ports_interfaces.html 24/34
4/2/22, 12:17 PM Cisco Wireless LAN Controller Configuration Guide, Release 7.2 - Chapter 3 - Configuring Ports and Interfaces [Cisco Wirele…
Note The two internal Gigabit ports on the controller within the Catalyst 3750G Integrated Wireless LAN Controller
Switch are always assigned to the same LAG group.
When you enable LAG or make any changes to the LAG configuration, you must immediately reboot the
controller.
When you enable LAG, you can configure only one AP-manager interface because only one logical port is
needed. LAG removes the requirement for supporting multiple AP-manager interfaces.
When you enable LAG, all dynamic AP-manager interfaces and untagged interfaces are deleted, and all
WLANs are disabled and mapped to the management interface. Also, the management, static AP-manager,
and VLAN-tagged dynamic interfaces are moved to the LAG port.
Multiple untagged interfaces to the same port are not allowed.
When you enable LAG, you cannot create interfaces with a primary port other than 29.
When you enable LAG, all ports participate in LAG by default. You must configure LAG for all of the
connected ports in the neighbor switch.
When you enable LAG, if any single link goes down, traffic migrates to the other links.
When you enable LAG, only one functional physical port is needed for the controller to pass client traffic.
When you enable LAG, access points remain connected to the switch, and data service for users continues
uninterrupted.
When you enable LAG, you eliminate the need to configure primary and secondary ports for each interface.
When you enable LAG, the controller sends packets out on the same port on which it received them. If a
CAPWAP packet from an access point enters the controller on physical port 1, the controller removes the
CAPWAP wrapper, processes the packet, and forwards it to the network on physical port 1. This may not be
the case if you disable LAG.
When you disable LAG, the management, static AP-manager, and dynamic interfaces are moved to port 1.
When you disable LAG, you must configure primary and secondary ports for all interfaces.
When you disable LAG, you must assign an AP-manager interface to each port on the controller. Otherwise,
access points are unable to join.
Cisco 5500 Series Controllers support a single static link aggregation bundle.
LAG is typically configured using the Startup Wizard, but you can enable or disable it at any time through
either the GUI or CLI.
Note LAG is enabled by default and is the only option on the Catalyst 3750G Integrated Wireless LAN Controller
Switch.
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-2/configuration/guide/cg/cg_ports_interfaces.html 25/34
4/2/22, 12:17 PM Cisco Wireless LAN Controller Configuration Guide, Release 7.2 - Chapter 3 - Configuring Ports and Interfaces [Cisco Wirele…
Note Choose Disabled if you want to disable LAG. LAG is disabled by default on the Cisco 5500 but enabled by
default on the Catalyst 3750G Integrated Wireless LAN Controller Switch.
Note Enter the config lag disable command if you want to disable LAG.
LAG Enabled
Configuring Neighbor Devices to Support Link Aggregation
The controller’s neighbor devices must also be properly configured to support LAG.
Each neighbor port to which the controller is connected should be configured as follows:
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-2/configuration/guide/cg/cg_ports_interfaces.html 26/34
4/2/22, 12:17 PM Cisco Wireless LAN Controller Configuration Guide, Release 7.2 - Chapter 3 - Configuring Ports and Interfaces [Cisco Wirele…
no shutdown
Configuring Multiple AP-Manager Interfaces
This section contains the following topics:
Before an access point joins a controller, it sends out a discovery request. From the discovery response that it
receives, the access point can tell the number of AP-manager interfaces on the controller and the number of
access points on each AP-manager interface. The access point generally joins the AP-manager with the least
number of access points. In this way, the access point load is dynamically distributed across the multiple AP-
manager interfaces.
Note Access points may not be distributed completely evenly across all of the AP-manager interfaces, but a
certain level of load balancing occurs.
This configuration has the advantage of load balancing all 100 access points evenly across all four AP-
manager interfaces. If one of the AP-manager interfaces fails, all of the access points connected to the
controller would be evenly distributed among the three available AP-manager interfaces. For example, if
AP-manager interface 2 fails, the remaining AP-manager interfaces (1, 3, and 4) would each manage
approximately 33 access points.
Examples:
– The Cisco 4404-100 Controller supports up to 100 access points and has four ports. To support the
maximum number of access points, you would need to create three (or more) AP-manager interfaces
(see Figure 4-14). If the port of one of the AP-manager interfaces fails, the controller clears the access
points’ state, and the access points must reboot to reestablish communication with the controller using
the normal controller join process. The controller no longer includes the failed AP-manager interface in
the CAPWAP or LWAPP discovery responses. The access points then rejoin the controller and are load
balanced among the available AP-manager interfaces.
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-2/configuration/guide/cg/cg_ports_interfaces.html 27/34
4/2/22, 12:17 PM Cisco Wireless LAN Controller Configuration Guide, Release 7.2 - Chapter 3 - Configuring Ports and Interfaces [Cisco Wirele…
Step 4 Click Apply to commit your changes. The Interfaces > Edit page appears.
Note Do not define a backup port for an AP-manager interface. Port redundancy is not supported for AP-
manager interfaces. If the AP-manager interface fails, all of the access points connected to the controller
through that interface are evenly distributed among the other configured AP-manager interfaces.
Step 6 To make this interface an AP-manager interface, select the Enable Dynamic AP Management check box.
Note Only one AP-manager interface is allowed per physical port. A dynamic interface that is marked as an AP-
manager interface cannot be used as a WLAN interface.
Step 8 Repeat this procedure for each additional AP-manager interface that you want to create.
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-2/configuration/guide/cg/cg_ports_interfaces.html 28/34
4/2/22, 12:17 PM Cisco Wireless LAN Controller Configuration Guide, Release 7.2 - Chapter 3 - Configuring Ports and Interfaces [Cisco Wirele…
Note Only one AP-manager interface is allowed per physical port. A dynamic interface that is marked as an AP-
manager interface cannot be used as a WLAN interface.
save config
Step 4 Repeat this procedure for each additional AP-manager interface that you want to create.
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-2/configuration/guide/cg/cg_ports_interfaces.html 29/34
4/2/22, 12:17 PM Cisco Wireless LAN Controller Configuration Guide, Release 7.2 - Chapter 3 - Configuring Ports and Interfaces [Cisco Wirele…
The VLAN select feature enables you to use a single WLAN that can support multiple VLANs. Clients can get
assigned to one of the configured VLANs. This feature enables you to map a WLAN to a single or multiple
interface VLANs using interface groups. Wireless clients that associate to the WLAN get an IP address from a pool
of subnets identified by the interfaces. The IP address is derived by an algorithm based on the MAC address of
the wireless client. This feature also extends the current AP group architecture where AP groups can override an
interface or interface group to which the WLAN is mapped to, with multiple interfaces using the interface groups.
This feature also provides the solution to auto anchor restrictions where a wireless guest user on a foreign
location can get an IP address from multiple subnets based on their foreign locations or foreign controllers from
the same anchor controller.
When a client roams from one controller to another, the foreign controller sends the VLAN information as part of
the mobility announce message. Based on the VLAN information received, the anchor decides whether the tunnel
should be created between the anchor controller and the foreign controller. If the same VLAN is available on the
foreign controller, the client context is completely deleted from the anchor and the foreign controller becomes the
new anchor controller for the client.
If an interface (int-1) in a subnet is untagged in one controller (Vlan ID 0) and the interface (int-2) in the same
subnet is tagged to another controller (Vlan ID 1), then with the VLAN select, client joining the first controller over
this interface may not undergo an L2 roam while it moves to the second controller. Hence, for L2 roaming to
happen between two controllers with VLAN select, all the interfaces in the same subnet should be either tagged
or untagged.
As part of the VLAN select feature, the mobility announce message carries an additional vendor payload that
contains the list of VLAN interfaces in an interface group mapped to a foreign controller’s WLAN. This VLAN list
enables the anchor to differentiate from a local to local or local to foreign handoff.
Note VLAN pooling applies to wireless clients and centrally switched WLANs.
interface group can exclusively contain either quarantine or nonquarantine interfaces. An interface can be part of
multiple interface groups.
A WLAN can be associated with an interface or interface group. The interface group name and the interface name
cannot be the same.
This feature also enables you to associate a client to specific subnets based on the foreign controller that they are
connected to. The anchor controller WLAN can be configured to maintain a mapping between foreign controller
MAC and a specific interface or interface group (Foreign maps) as needed. If this mapping is not configured,
clients on that foreign controller gets VLANs associated from interface group configured on WLAN.
You can also configure AAA override for interface groups. This feature extends the current access point group
and AAA override architecture where access point groups and AAA override can be configured to override the
interface group WLAN that the interface is mapped to. This is done with multiple interfaces using interface
groups.
This feature enables network administrators to confirure guest anchor restrictions where a wireless guest user at
a foreign location can obtain an IP address from multiple subnets on the foreign location and controllers from
within the same anchor controller.
NM6 series 4 4
The Interface Groups page appears with the list of interface groups already created.
Note To remove an interface group, hover your mouse pointer over the blue drop-down icon and choose
Remove.
The Interface Groups page appears with a list of all interface groups.
Step 2 Click the name of the interface group to which you want to add interfaces.
Step 3 Choose the interface name that you want to add to this interface group from the Interface Name drop-
down list.
Step 5 Repeat Steps 2 and 3 if you want to add multiple interfaces to this interface group.
Note To remove an interface from the interface group, hover your mouse pointer over the blue drop-down arrow
and choose Remove.
Step 2 Click the WLAN ID of the WLAN to which you want to add the interface group.
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-2/configuration/guide/cg/cg_ports_interfaces.html 32/34
4/2/22, 12:17 PM Cisco Wireless LAN Controller Configuration Guide, Release 7.2 - Chapter 3 - Configuring Ports and Interfaces [Cisco Wirele…
Multicast Optimization
This section contains the following topics:
Multicast optimization enables you to create a multicast VLAN which you can use for multicast traffic. You can
configure one of the VLANs of the WLAN as a multicast VLAN where multicast groups are registered. Clients are
allowed to listen to a multicast stream on the multicast VLAN. The MGID is generated using mulicast VLAN and
multicast IP addresses. If multiple clients on the VLAN pool of the same WLAN are listening to a single multicast
IP address, a single MGID is generated. The controller makes sure that all multicast streams from the clients on
this VLAN pool always go out on the multicast VLAN to ensure that the upstream router has one entry for all the
VLANs of the VLAN pool. Only one multicast stream hits the VLAN pool even if the clients are on different VLANs.
Therefore, the multicast packets that are sent out over the air is just one stream.
Step 2 Click on the WLAN ID of the WLAN that you want to choose for a multicast VLAN.
Step 3 Enable the multicast VLAN feature by selecting the Multicast VLAN feature
check box.
Step 4 Choose the VLAN from the Multicast Interface drop-down list.
Quick Links -
About Cisco
Contact Us
Careers
Help
Privacy Statement
Cookies
Trademarks
Sitemap
https://www.cisco.com/c/en/us/td/docs/wireless/controller/7-2/configuration/guide/cg/cg_ports_interfaces.html 34/34