User Manual
Table Of Contents
- Wireless Controller
- Contents
- 1. Introduction
- 2. Hardware Descriptions
- 3. System Planning and Deployment Scenarios
- 4. RF Planning and Deployment
- Application, Browser, and Port Requirements for RF Planning
- RF Planning Overview
- Manage a Building and Floors for an RF Plan
- Add a Building and Floors
- Add a Single Floor to a Building
- Scale a Floor
- Add a WiFi Coverage or WiFi Noncoverage Zone to a Floor
- Remove a WiFi Coverage or Noncoverage Zone From a Floor
- Add a WiFi Building Obstacle to a Floor
- Remove a Building Obstacle From a Floor
- Add a WiFi Obstruction Area
- Remove a WiFi Obstruction Area
- Change the Name, Map, or Dimensions of a Floor
- Change the Name of a Building
- Duplicate an Entire Building With All Floors
- Duplicate a Single Floor
- Remove a Single Floor
- Remove an Entire Building With All Its Floors
- Use the WiFi Auto Planning Advisor to Generate an RF Plan for a Floor
- Manually Add and Manage Access Points on a Floor Map for an RF Plan
- Manually Add and Manage Antennas on a Floor Map for an RF Plan
- Display and Recalculate the WiFi Coverage for a Heat Map
- Display or Change the WiFi Inventory for an RF Plan
- Download a Report for an RF Plan
- View the Heat Map for a Deployed Floor Plan
- 5. Installation and Configuration Overview
- 6. Configure the System and Network Settings and Register the Licenses
- 7. Manage Security Profiles and Profile Groups
- WiFi Security Profile Concepts
- Manage Security Profiles for the Basic Profile Group
- Manage Security Profiles for Advanced Profile Groups
- Network Authentication and Data Encryption Options
- Manage Authentication Servers and Authentication Server Groups
- Manage MAC Authentication and MAC Authentication Groups
- Guidelines for External MAC Authentication
- Remove a Local MAC Authentication Group
- 8. Discover and Manage Access Points
- 9. Configure WiFi, Radio Frequency, and QoS Settings
- Basic and Advanced WiFi, Radio Frequency Management, and QoS Configuration Concepts
- Configure the Radio On/Off Settings
- Configure WiFi Settings
- Radio Frequency Management Concepts
- Configure Automatic Transmission Power
- Override Transmission Power for Individual Access Points
- Configure WLAN Healing
- Enable Band Steering
- Configure Automatic Channel Allocation
- Override the Channel and Frequency for an Access Point
- Manage AirQual for a Profile Group
- Manage Quality of Service for an Advanced Profile Group
- Manage Load Balancing
- Manage Rate Limiting
- Manage the LED Behavior
- 10. Manage Rogue Access Points, Guest Network Access, and Users
- Manage Rogue Access Points
- Manage Guest Network Access Through Guest Portals and Captive Portals
- Manage Users, Accounts, and Passwords
- User and Account Concepts
- Change the Password of the Default admin Account of the Wireless Controller
- Add a Management User
- Add a WiFi User
- Add a Captive Portal Account
- Add a Logo and Message on Captive Portal User Information
- Add a Captive Portal User
- Add Multiple Captive Portal Users Simultaneously
- Change the Settings for a User or Account
- Remove Users or Accounts
- Export a List of Users or Accounts
- 11. Maintain the Wireless Controller and Access Points
- Manage the Configuration File or Upgrade the Firmware
- Reboot the Wireless Controller
- Reset the Wireless Controller
- Manage Extended Storage
- Manage Remote Access
- Specify Session Time-Outs
- Save the Logs
- View Alerts and Events
- Manage Licenses
- Reboot Access Points
- Configure Multicast Firmware Upgrade for Access Points
- 12. Manage Stacking and Redundancy
- Stacking Concepts
- Configure a Stack of Wireless Controllers
- Remove a Wireless Controller From a Stack
- Select Which Wireless Controller in a Stack to Configure
- Manage Redundancy for a Single Controller
- Manage a Redundancy Group With N:1 Redundancy
- Replace a Redundant Controller
- Remove a Redundancy Group
- Upgrade Firmware in a Stacked Redundancy Group
- 13. Monitor the WiFi Network and Its Components
- Monitor the Network
- Monitor the Wireless Controller
- View the Wireless Controller Summary Page
- View Wireless Controller Usage
- View Access Points That the Wireless Controller Manages
- View Clients on Access Points That the Wireless Controller Manages
- View Neighboring Clients That the Wireless Controller Detects
- View Neighboring Access Points That the Wireless Controller Does Not Manage
- View Security Profiles That the Wireless Controller Manages
- View DHCP Leases That Are Provided by the Wireless Controller
- View Captive Portal Users on Access Points That the Wireless Controller Manages
- View the Guest Email Address Database for Access Points That the Wireless Controller Manages
- View AirQual for the Channels in a Profile Group
- Monitor the SSIDs on the Wireless Controller
- Monitor Local Clients in the Network
- 14. Troubleshooting and Diagnostics
- Troubleshoot Basic Functioning
- Troubleshoot the Web Management Interface
- Troubleshoot a TCP/IP Network Using the Ping Utility
- Use the Reset Button to Restore Default Settings
- Resolve Problems With Date and Time
- Resolve Network Problems
- Resolve Problems With Access Points
- Use the Diagnostic Tools on the Wireless Controller
- A. Controller-Managed Access Points
- Overview
- Change IP Address and VLAN Settings on a Controller-Managed Access Point
- Reenable the DHCP Client on a Controller-Managed Access Point
- Upgrade or Change Firmware on a Controller-Managed Access Point
- Save and View the Logs on a Controller-Managed Access Point
- Enable Link Aggregation on a WAC740 Access Point
- Change the Password on an Access Point
- Convert an Access Point From Controller-Managed to Standalone
- B. Factory Default Settings, Technical Specifications, and Passwords Requirements
- Index
Troubleshooting and Diagnostics
376
Wireless Controller
5. Configure the settings as described in the following table.
Setting Description
Enable Console Logs Enable the console log settings by selecting the Enable Console Logs check
box.
By default, the console log settings are disabled.
Server IP Address Enter the IP address of the syslog server or UDP server.
Server Port Number Enter the port number of the syslog server or UDP server.
The default port number is the syslog server port 514.
Server / L3 Switch MAC Enter the MAC address of the UDP server or Layer 3 gateway behind which the
UDP server is located:
• If you use a UDP server
, enter the MAC address of the UDP server.
This
MAC address is required to enable the access point to send messages to
the UDP server.
• If the UDP server is in another subnet (that is, the UDP server is located
behind a Layer 3 gateway), enter the MAC address of the gateway instead
of the MAC address of the UDP server
.
Log Level From the Log Level menu, select one of the following levels:
• EMERGENCY (1)
. Emergency messages. Sent when the system is
unstable.
• ALERT (2).
Alert messages. Sent when action must be taken immediately.
• CRITICAL (3)
. Critical messages. Sent when a critical condition occurs.
• ERROR (4). Error messages. Sent when an error condition occurs.
• W
ARNING (5). Warning messages. Sent when a warning condition occurs.
• NOTICE (6). Notification messages. Sent when a normal but significant
condition occurs.
• INFORMA
TION (7). Informational messages.
• DEBUG (8). Debug messages.
6. In the table with access points, select one or more check boxes for access points for which
you want to collect debug logs.
You can select only access point that are in the Connected state. The table can display
WNDAP660, WAC720, WAC730, and W
AC740 access points only.
7. Click the Apply button.
Your settings are saved. The selected access points start generating and sending debug
logs over the network to the syslog or UDP server
. (If a device is connected to the
console port of an access point, the access point also starts sending debug logs over the
console port.)
Note: If you use a syslog server on the network, the number of the logs that are
sent to the syslog server might increase considerably.
Note: If you select EMERGENCY (1), only emergency messages are sent. For
each lower level, the messages of the levels that are higher than the selected
level are also sent. For example, if you select CRITICAL (3), critical messages,
alert messages, and emergency messages are sent. If you select DEBUG (8),
all messages from emergency messages to debug messages are sent.
Selecting DEBUG (8) generates a very large number of messages.