Cisco Systems OL-17037-01 manual Global Configuration

Page 6

Chapter 7 Controlling Lightweight Access Points

Configuring Global Credentials for Access Points

Also in controller software release 5.0 or later, after an access point joins the controller, the access point enables console port security, and you are prompted for your username and password whenever you log into the access point’s console port. When you log in, you are in non-privileged mode, and you must enter the enable password in order to use the privileged mode.

Note These controller software release 5.0(or later) features are supported on all access points that have been converted to lightweight mode, except the 1100 series. VxWorks access points are not supported.

The global credentials that you configure on the controller are retained across controller and access point reboots. They are overwritten only if the access point joins a new controller that is configured with a global username and password. If the new controller is not configured with global credentials, the access point retains the global username and password configured for the first controller.

Note You need to keep careful track of the credentials used by the access points. Otherwise, you might not be able to log into an access point’s console port. If you ever need to return the access points to the default Cisco/Cisco username and password, you must clear the controller’s configuration and the access point’s configuration to return them to factory default settings. To clear the controller’s configuration, choose Commands > Reset to Factory Default > Reset on the controller GUI, or enter clear config on the controller CLI. To clear the access point’s configuration, enter clear ap config Cisco_AP on the controller CLI. Once the access point rejoins a controller, it adopts the default Cisco/Cisco username and password.

You can use the controller GUI or CLI to configure global credentials for access points that join the controller.

Using the GUI to Configure Global Credentials for Access Points

Using the controller GUI, follow these steps to configure global credentials for access points that join the controller.

Step 1 Click Wireless > Access Points > Global Configuration to open the Global Configuration page (see Figure 7-1).

Figure 7-1 Global Configuration Page

Cisco Wireless LAN Controller Configuration Guide

7-6

OL-17037-01

 

 

Image 6
Contents Controlling Lightweight Access Points Access Point Communication Protocols Guidelines for Using CapwapController Discovery Process Page Verifying that Access Points Join the Controller Config network master-base enableConfig network master-base disable Configuring Global Credentials for Access Points Viewing Capwap MTU InformationDebugging Capwap Global Configuration All APs Details for Credentials Save config Show ap config general CiscoAPShow ap summary Configuring Authentication for Access Points Lwapp ap dot1x username username password passwordUsing the GUI to Configure Authentication for Access Points ControllerCisco Wireless LAN Controller Configuration Guide Using the CLI to Configure Authentication for Access Points Config ap dot1xuser add username user password password allConfig ap dot1xuser disable all CiscoAP AP Dot1x User Mode field shows CustomizedEmbedded Access Points Configuring the Switch for AuthenticationDns-server ipaddress Default-router ipaddress Ip dhcp pool poolnameAutonomous Access Points Converted to Lightweight Mode Reverting from Lightweight Mode to Autonomous Mode Using a Controller to Return to a Previous ReleaseAuthorizing Access Points Authorizing Access Points Using SSCsAuthorizing Access Points Using MICs Authorizing Access Points Using LSCs Using the GUI to Configure LSCConfig certificate lsc ca-cert add delete Config certificate lsc enable disableConfig certificate lsc ca-server http//urlport/path Config certificate lsc other-params keysizeConfig certificate lsc ap-provision auth-list add APmacaddr Config certificate lsc ap-provision revert-cert retriesShow certificate lsc summary Using the GUI to Authorize Access Points Show certificate lsc ap-provisionConfig auth-list add mic ssc lsc apmac apkey Using the CLI to Authorize Access PointsConfig auth-list ap-policy mic ssc lsc enable disable Show auth-listUsing Dhcp Option 43 and Dhcp Option Troubleshooting the Access Point Join ProcessControlling Lightweight Access Points Show ap config global Configuring the Syslog Server for Access PointsViewing Access Point Join Information Show ap join stats summary allJoined Converted Access Points Send Radio Core Dumps to Controller Debug ap enable disable command cmd CiscoAPUsing the CLI to Retrieve Radio Core Dumps Using the GUI to Upload Radio Core DumpsShow ap crash-file Using the CLI to Upload Radio Core Dumps Transfer upload startUploading Memory Core Dumps from Converted Access Points Using the GUI to Upload Access Point Core DumpsDisplay of MAC Addresses for Converted Access Points Using the CLI to Upload Access Point Core DumpsSupporting Oversized Access Point Images Config ap reset-button enable disable ap-nameallCisco Workgroup Bridges WGB ExampleGuidelines for Using WGBs Configure terminal Sample WGB Configuration Using the GUI to View the Status of Workgroup BridgesShow dot11 association 11 Clients Detail 12 WGB Wired Clients Debug dhcp message enable Debug dhcp packet enable Using the CLI to View the Status of Workgroup BridgesUsing the CLI to Debug WGB Issues Debug dot11 mobile enable Debug dot11 state enableConfiguring Backup Controllers Using the GUI to Configure Backup Controllers 14 Global Configuration15 All APs Details for High Availability Using the CLI to Configure Backup Controllers Config advanced timers ap-discovery-timeout interval Config advanced timers auth-timeout intervalConfiguring Failover Priority for Access Points 130016 Global Configuration Using the CLI to View Failover Priority Settings EnabledConfiguring Country Codes Guidelines for Configuring Multiple Country CodesUsing the GUI to Configure Country Codes 19 All APs Details for Advanced Using the CLI to Configure Country Codes Show country supportedShow country Show country channels Config 802.11a enable network config 802.11b enable network Controlling Lightweight Access Points Guidelines for Migration Migrating Access Points to the -U Regulatory DomainConfig country J3 Show ap migrateConfig ap migrate j52w52 all apname Using the W56 Band in Japan Dynamic Frequency SelectionOptimizing Rfid Tracking on Access Points Using the GUI to Optimize Rfid Tracking on Access Points20 802.11b/g/n Cisco APs Configure Using the CLI to Optimize Rfid Tracking on Access Points Config ap monitor-mode tracking-opt CiscoAPConfig 802.11b enable CiscoAP Config advanced probe limit numprobes interval Configuring Probe Request ForwardingConfig advanced probe filter enable disable Show ap monitor-mode summaryInventory Performing a Link Test 22 All APs Details for InventoryUsing the GUI to Perform a Link Test Link Test Configuring Link Latency Using the CLI to Perform a Link TestUsing the GUI to Configure Link Latency 25 All APs Details for AdvancedUsing the CLI to Configure Link Latency Config ap link-latency enable disable CiscoAP allConfiguring Power over Ethernet Config ap link-latency reset CiscoAPUsing the GUI to Configure Power over Ethernet EPoE Power EPoE Mode 15.4 W Optimized 20 WCisco Wireless LAN Controller Configuration Guide Using the CLI to Configure Power over Ethernet Config ap power injector enable CiscoAP all installedConfig ap power injector enable CiscoAP all override Debug ap command led flash seconds CiscoAP Configuring Flashing LEDsUsing the GUI to View Clients Viewing ClientsControlling Lightweight Access Points Viewing Clients 28 Search Clients 29 Clients Detail Using the CLI to View Clients AP MACS69 OL-17037-01