Вы находитесь на странице: 1из 102

IU W N E

Course Management
Overview
Implementing Cisco Unified Wireless Networking Essentials (IUWNE) v1.0 is a five-day day instructor-led course, desig ned to help students prepare for the CCNA wireless certification, an associate-level certification specializ ing in the wireless field. The g oal of the course is to provide students with information and practice activities to prepare them to help desig n, install, config ure, monitor, and conduct basic troubleshooting task s for a Cisco wireless LAN (WLAN) in small and medium-siz e business (SMB) and enterprise installations. This course provides entry-level information, and does not specializ e in any of the advanced features of the Cisco WLAN network solutions.

Outline

The Course Manag ement section of the Course Administration Guide includes these topics: Overview Course Instruction Details

Eq uipment List

Course Evaluations

C o ur s e Ver s io n

This is the orig inal release of the course named Implementing Cisco Unified Wireless Networking Essentials (IUWNE) v1.0.

C o ur s e Ob j ec tiv es

Upon completing this course, the learner will be able to meet these overall obj ectives: Describe the Cisco Unified Wireless Network s basics and config ure a Cisco Unified Wireless Network and a Cisco Mobility Ex press controller Describe the fundamentals of wireless technolog ies

Describe and config ure wireless security

Describe and config ure wireless client config uration tools

Manag e the wireless network from the Cisco WCS Maintain and troubleshoot wireless network s

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

T a r g et A ud ienc e

The primary audience for this course is as follows: Network eng ineers Network administrators Network manag ers Systems eng ineers

The primary audience is formed of individuals involved in the technical handling of Cisco platforms and solutions, namely installing , config uring , operating and troubleshooting . This is a somewhat arbitrary decision to cover only theses areas because many people with Cisco certifications are called on to provide advice in network planning and desig n as well. In this report, the targ et audience will be referred to g enerically as technicians. The secondary audience for this course is as follows: Network desig ners Proj ect manag ers

L ea r ner S k ills a nd K no w led g e

The k nowledg e and sk ills that a learner must have before attending this course are as follows: Interconnecting Cisco Networking D ev ices P art 1 (ICND1) Interconnecting Cisco Networking D ev ices P art 2 (ICND2)

It is also recommended that learners considered for this training have a basic k nowledg e of the following : Cisco Lifecycle Services SONA

Wireless standards (IEEE)

Wireless certification org aniz ation (Wi-Fi Alliance)

Wireless reg ulator environment (FCC, ETSI, and so on)

Learners considered for this training will have demonstrated competencies (k nowledg e, sk ills and attitudes) eq uivalent to the following : Basic computer literacy, including the use of g eneral office software such as Microsoft Word and Microsoft Ex cel

Basic e-mail usag e sk ills

Basic Internet usag e sk ills

Basic Windows navig ation and k eyboard literacy sk ills

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

C o u rs e I n s t ru c t io n Det a il s
I ns tr uc to r R eq uir em ents

This topic provides the information that you need to prepare the course materials and set up the classroom environment.

To teach this course, instructors must have attended the following training or completed the following req uirements: Attend a Train the Trainer (TTT) or open enrollment delivery of a course facilitated by a q ualified Cisco Certified Systems Instructor Be an active Cisco Certified Systems Instructor in g ood standing

Pass an Implementing Cisco Unified Wireless Networking Essentials ex am at the Instructor pass score
Note S u b m i t q u e st i o n s c o n c e r n i n g i n st r u c t o r c e r t i f i c a t i o n t o i c a d @ e x t e r n a l .c i sc o .c o m .

C la s s r o o m

These items should be available for the learner during the course: Lab Guide Student Guide

R ef er enc e M a ter ia ls

Course Evaluation Form

C la s s E nv ir o nm ent

This information describes recommended class siz e and classroom setup: Eig ht pairs of chairs sharing access to eig ht laptops

Room set up classroom style with chairs and tables larg e enoug h for 16 learners

For remote lab delivery, access to Internet for all learners and the instructor

For local labs, rack and floor space to locate all eq uipment

Sufficient power for all eq uipment

Proj ector to display course PowerPoint slides and proj ection screen as needed

C o ur s e F lo w

This is the su ggested course schedule. You may mak e adj ustments based on the sk ills, k nowledg e, and preferences of the learners in attendance. The presentation of all topics is optional for noncertification offerings, but you are encourag ed to use them because they are desig ned to reinforce the lesson concepts and ensure that learners apply some of the concepts.

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

D a y 1 : Cou r se Intr od u c ti on; Intr od u c i ng W i r el ess Netw or k s a nd Top ol og i es; Intr od u c i ng W L A N R F P r i nc i p l es, U nd er sta nd i ng R F M a th em a ti c s; D esc r i b i ng A ntenna e; U nd er sta nd i ng S p r ea d S p ec tr u m Tec h nol og i es 8:008:45 (08300845) 8:4510:00 (08451000) 10:0010:10 (10001010) 10:1011:00 (10101100) 11:0011:30 (11001130) 11:3012:00 (11301200) 12:001:00 (12001300) 1:001:30 (13001330) 1:302:30 (13301430) 2:302:40 (14301440) 2:403:20 (14401520) 3:205:00 (15201700) 5:00 (1700) Co u r se In t r o d u c t i o n In t r o d u c i n g Wi r e l e ss Ne t w o r k s a n d To p o l o g i e s B re a k In t r o d u c i n g WLAN R F P r i n c i p l e s U n d e r st a n d i n g R F M a t h e m a t i c s La b 1-1: B e c o m i n g F a m i l i a r w i t h An t e n n a e a n d R a n g e s L u nc h La b 1-1: B e c o m i n g F a m i l i a r w i t h An t e n n a e a n d R a n g e s (Co n t .) De sc r i b i n g An t e n n a e B re a k La b 1-1: B e c o m i n g F a m i l i a r w i t h An t e n n a e a n d R a n g e s (Co n t .) U n d e r st a n d i n g S p r e a d S p e c t r u m D a y end s Te c h n o l o g i e s

D a y 2 : Intr od u c i ng W i r el ess R eg u l a ti on B od i es, S ta nd a r d s, a nd Cer ti f i c a ti ons; Ex a m i ni ng W i r el ess M ed i a A c c ess; Non-8 0 2 . 1 1 W i r el ess Tec h nol og i es a nd Th ei r Im p a c t on W L A Ns, W i r el ess F r a m e J ou r ney : End to End ; U nd er sta nd i ng Ci sc o U ni f i ed W i r el ess Netw or k s B a si c A r c h i tec tu r e 8:008:30 (08000830) 8:3010:40 (08301040) 10:4010:55 (104001055) 10:5512:00 (10551200) 12:001:00 (12001300) 1:002:45 (13001445) 2:453:00 (14451500) 3:203:20 (13001520) R ev i ew of D a y 1

In t r o d u c i n g Wi r e l e ss R e g u l a t i o n B o d i e s, S t a n d a r d s, a n d Ce r t i f i c a t i o n s B re a k E x a m i n i n g Wi r e l e ss M e d i a Ac c e ss L u nc h La b 1-2: Cr e a t i n g a n Ad H o c (IB S S ) Ne t w o r k a n d An a l y z i n g t h e Co m m u n i c a t i o n B re a k No n -802.11 Wi r e l e ss Te c h n o l o g i e s a n d Th e i r Im p a c t o n WLANS

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

3:204:00 (15201600) 4:005:00 (15001700) 5:00 (1700)

Wi r e l e ss F r a m e J o u r n e y : E n d t o E n d U n d e r st a n d i n g Ci sc o U n i f i e d Wi r e l e ss Ne t w o r k s B a si c Ar c h i t e c t u r e D a y end s

D a y 3 : Conf i g u r i ng a Contr ol l er ; D i sc ov er i ng a nd A ssoc i a ti ng w i th a Contr ol l er : D esc r i b i ng A c c ess P oi nt O p er a ti ona l M od es: R oa m i ng : M a na g i ng th e Netw or k f r om th e Contr ol l er : Conf i g u r i ng a nd M i g r a ti ng S ta nd a l one A c c ess P oi nts; U nd er sta nd i ng th e Ci sc o M ob i l i ty Ex p r ess A r c h i tec tu r e 8:008:30 (08000830) 8:309 :10 (083009 10) 9 :1010:00 (09 101000) 10:0010:15 (10001015) 10:1511:00 (10151100) 11:0011:30 (11001130) 11:3012:00 (11301200) 12:001:00 (12001300) 1:001:40 (13001340) 1:402:10 (14401410) 2:102:20 (14101420) 2:204:00 (14201600) 4:004:25 (16001625) 4:255:00 (16251700) 5:00 (1700) R ev i ew of D a y 2

Co n f i g u r i n g a Co n t r o l l e r La b 2-1: Co n f i g u r i n g a Ci sc o 2106 WLC B re a k Di sc o v e r i n g a n d Asso c i a t i n g w i t h a Co n t r o l l e r De sc r i b i n g Ac c e ss P o i n t O p e r a t i o n a l M o d e s R o a m in g L u nc h M a n a g i n g t h e Ne t w o r k f r o m t h e Co n t r o l l e r

Co n f i g u r i n g a n d M i g r a t i n g S t a n d a l o n e Ac c e ss P o i n t s B re a k La b 2-2: Co n f i g u r i n g a n d M i g r a t i n g a S t a n d a l o n e AP U n d e r st a n d i n g t h e Ci sc o M o b i l i t y E x p r e ss Ar c h i t e c t u r e La b 2-3: In st a l l i n g a n d Co n f i g u r i n g a Ci sc o M o b i l i t y E x p r e ss Wi r e l e ss Co n t r o l l e r a n d AP D a y end s p tor s; tensi ons W L A N p ti on w i th

D a y 4 : U si ng D ef a u l t Conf i g u r a ti on Tool s; D esc r i b i ng Ci sc o A i r onet W L A N Cl i ent A d a D esc r i b i ng th e Ci sc o S ec u r e S er v i c es Cl i ent; U nd er sta nd i ng th e Ci sc o Com p a ti b l e Ex P r og r a m ; O v er v i ew of W L A N S ec u r i ty , Esta b l i sh i ng IEEE 8 0 2 . 1 1 S ec u r i ty ; Centr a l i z i ng A u th enti c a ti on; D esc r i b i ng EA P A u th enti c a ti ons; M a na g i ng A u th enti c a ti on a nd Enc r y W P A a nd W P A 2 ; Conf i g u r i ng W i r el ess S ec u r i ty on Contr ol l er s a nd Cl i ents 8:008:30 (08000830) 8:308:50 (08300850) R ev i ew of D a y 3

U si n g De f a u l t Co n f i g u r a t i o n To o l s

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

8:509 :15 (085009 15) 9 :159 :35 (09 1509 35) 9 :3510:40 (09 351040) 10:40 10:50 (10401050) 10:50 12:00 (10501200) 12:001:00 (12001300) 1:001:15 (13001315) 1:151:35 (13151335) 1:351:50 (13351350) 1:50 2:20 (13501420) 2:202:30 (14201430) 2:303:10 (14301510) 3:103:35 (15101535) 3:355:00 (15351700) 5:00 (1700)

De sc r i b i n g Ci sc o Ai r o n e t WLAN Cl i e n t Ad a p t o r s De sc r i b i n g t h e Ci sc o S e c u r e S e r v i c e s Cl i e n t U n d e r st a n d i n g t h e Ci sc o Co m p a t i b l e E x t e n si o n s P ro g ra m B re a k La b 3-1: In st a l l i n g a n d U si n g t h e Ci sc o ADU La b 3-2: E x p e r i m e n t i n g w i t h Co n n e c t i o n s a n d R o a m i n g L u nc h O v e r v i e w o f WLAN S e c u r i t y E st a b l i sh i n g IE E E 802.11 S e c u r i t y Ce n t r a l i z i n g WLAN Au t h e n t i c a t i o n De sc r i b i n g E AP Au t h e n t i c a t i o n s B re a k M a n a g i n g Au t h e n t i c a t i o n a n d E n c r y p t i o n w i t h WP A a n d WP A2 Co n f i g u r i n g Wi r e l e ss S e c u r i t y o n Co n t r o l l e r s a n d Cl i e n t s La b 4-1: 802.1Q a n d We b Au t h e n t i c a t i o n

La b 4-2: Co n f i g u r i n g E AP -F AS T Au t h e n t i c a t i o n w i t h WP A D a y end s

D a y 5 : Intr od u c i ng W CS a nd Na v i g a tor , Insta l l i ng W CS , A d m i ni ster i ng W CS , W or k i ng w i th Contr ol l er s f r om W CS , W or k i ng w i th M a p s, M oni tor i ng th e Netw or k w i th W CS , M a i nta i ni ng th e S y stem , D esi g n a nd S i te S u r v ey Consi d er a ti ons, Tr ou b l esh ooti ng 8:008:30 (08000830) 8:309 :00 (083009 00) 9 :009 :15 (09 0009 15) 9 :159 :30 (09 1509 30) 9 :309 :45 (09 3009 45) 9 :4510:00 (09 451000) 10:00 10:10 (10001010) R ev i ew of D a y 4

In t r o d u c i n g Ci sc o WCS a n d Ci sc o WCS Na v i g a t o r In st a l l i n g Ci sc o WCS Ad m i n i st e r i n g Ci sc o WCS Wo r k i n g w i t h Co n t r o l l e r s f r o m Wo r k i n g w i t h M a p s B re a k Ci sc o WCS

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

10:1011:10 (10101110) 11:1011:30 (11101130) 11:3012:00 (11301200) 12:001:00 (12001300) 1:001:15 (13001315) 1:151:45 (13151345) 1:452:00 (13451400) 2:002:35 (14001435) 2:353:05 (14351505) 3:054:45 (15051645) 4:455:00 (16451700)

La b 5-1: Co n f i g u r i n g Co n t r o l l e r s a n d AP s f r o m WCS La b 5-2: Wo r k i n g w i t h M a p s M o n i t o r i n g t h e Ne t w o r k w i t h Ci sc o WCS

t h e Ci sc o

La b 5-3: M o n i t o r i n g t h e Ne t w o r k a n d Co n t a i n i n g De v i c e s L u nc h S y st e m M a in t e n a n c e

La b 6-1: B a c k i n g U p t h e Co n t r o l l e r Co n f i g u r a t i o n a n d t h e Ci sc o WCS Da t a b a se F i l e s B re a k De si g n a n d S i t e S u r v e y Co n si d e r a t i o n s U si n g Tr o u b l e sh o o t i n g To o l s La b 6-2: Tr o u b l e sh o o t i n g La b 6-3 O p t i o n a l La b (Tr o u b l e sh o o t i n g w i t h Wi r e sh a r k a n d Co n v e r t i n g a n AP t o Au t o n o m o u s M o d e ) W r a p -u p

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

H ig h -L ev el C o ur s e Outline
Course Introduction

This subtopic provides an overview of how the course is org aniz ed. The course contains these components: Wireless Fundamentals Wireless Clients WLAN Security

Basic Cisco WLAN Installation

WLAN Maintenance and Troubleshooting

Cisco WCS Administration

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

D eta iled C o ur s e Outline


Course Introduction

This in-depth outline of the course structure lists each module and lesson.

The Course Introduction provides learners with the course obj ectives and prereq uisite learner sk ills and k nowledg e. The Course Introduction presents the course flow diag ram and the icons that are used in the course illustrations and fig ures. This course component also describes the curriculum for this course, providing learners with the information that they need to mak e decisions reg arding their specific learning path. Overview Learner Sk ills and Knowledg e

Course Flow

Course Goal and Obj ectives

Additional References

Your Training Curriculum

Cisco Glossary of Terms

Modul e 1 : W irel ess Funda m enta l s


Lesson 1: Intr od u c i ng Wi r el ess Netw or k s a nd Top ol og i es This lesson describes wireless network s and types of topolog ies. Upon completing this lesson, the learner will be able to meet these obj ectives: Describe g eneral wireless topolog ies such as WPAN, WLAN, WMAN, and WWAN Describe network s in infrastructure mode Describe ad hoc network s Describe the evolution of the wireless network

Describe WGBs

Describe SSID

Describe outdoor wireless bridg es Describe outdoor mesh network s Wireless Today The lesson includes these topics: Wireless Usag e and Topolog ies

Describe repeaters

Ad Hoc Network s

Repeaters
1 0

Work g roup Bridg e

Service Set Identifier

Infrastructure Mode

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

Outdoor Wireless Bridg es Outdoor Mesh Network s Lesson 2: Intr od u c i ng WLAN RF Pr i nc i p l es

This lesson describes the principles of wireless LAN (WLAN) RF. Upon completing this lesson, the learner will be able to meet these obj ectives: Describe the concept of wireless spectrum Describe freq uency Describe the concept of waveleng th Describe the concept of amplitude Describe free path loss model Describe absorption Describe multipath Describe scattering Describe LOS Describe refraction Describe the Fresnel z one Describe RSSI and SNR RF Spectrum Freq uency Describe reflection

The lesson includes these topics:

Waveleng th Amplitude Free Path Loss

Reflection Scattering Multipath

Absorption

Fresnel Zone

Line of Sig ht

Refraction

RSSI and SNR

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

1 1

Lesson 3 : U nd er sta nd i ng RF Ma th em a ti c s

This lesson describes basic mathematics that are used in wireless network s. Upon completing this lesson, the learner will be able to meet these obj ectives: Describe watts, milliwatts and decibels Describe dBm Describe dBi and dBd Describe EIRP

The lesson includes these topics:

Decibel Referenced to 1 Milliwatt dBi and dBd Effective Isotropic Radiated Power This lesson includes this activity: Lesson 4 : Desc r i b i ng Antenna e Lab 1:1 Becoming Familiar with Antennae and Rang es

Watts, Milliwatts, and Decibels

This lesson describes wireless antennae. Upon completing this lesson the learner will be able to meet these obj ectives: Describe antenna principles Describe polariz ation

Describe diversity

Describe directional antennae Describe connectors

Describe omnidirectional antennae

Describe the main antenna types

Describe lig htening arrestors Describe splitters The lesson includes these topics: Antennae Principles Polariz ation

Describe attenuators and amplifiers

Diversity

Antenna Types

Omnidirectional Antennae Antennae Accessories: Connectors


1 2 I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W N E ) v 1 .0 20 0 8 C i s c o S y s t e m s , I n c .

Directional Antennae

Lig htning Arrestors Splitters

Attenuators and Amplifiers

Lesson 5 : U nd er sta nd i ng Sp r ea d Sp ec tr u m

This lesson describes spread spectrum technolog ies that are used to send a wireless frame in a wireless network . Upon completing this lesson, the learner will be able to meet these obj ectives: Describe the spread spectrum technolog y Describe DSSS

Tec h nol og i es

Describe the DSSS basic modulations, DBPSK and Q BPSK Describe OFDM Describe the DSSS advanced modulation, CCK

Describe the OFDM basic modulations, BPSK and Q PSK Describe the OFDM advanced modulation, Q AM Describe the issues link ed to channel overlaps and channel reuse Spread Spectrum Concept

The lesson includes these topics: DSSS: Encoding

Orthog onal Freq uency-Division Multiplex ing OFDM Modulations: BPSK and Q PSK OFDM Modulations: Q AM Channels and Overlapping Issues

DSSS Modulation: CCK

DSSS Modulations: DBPSK and DQ PSK

Lesson 6 : Ex a m i ni ng Wi r el ess Reg u l a tor y Bod i es, Sta nd a r d s, a nd Cer ti f i c a ti ons

This lesson describes wireless reg ulation bodies, standards, and certifications. Upon completing this lesson, the learner will be able to meet these obj ectives: Describe the IEEE Describe the Wi-Fi Alliance

Describe the 802.11 family of protocols Describe the 802.11 orig inal protocol Describe the 802.11b protocol Describe the 802.11g protocol Describe the 802.11a protocol

Describe country code reg ulatory bodies such as the FCC and ETSI

Describe how 802.11b and 802.11g interact

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

1 3

Describe the 802.11n protocol

Describe the main benefits of 802.11n for all wireless stations The lesson includes these topics: IEEE Wireless Standards The Wi-Fi Alliance Reg ulatory Bodies

Describe 802.11n max imal ratio combining

Describe 802.11n Transmit Beamforming

Describe 802.11n spatial multiplex ing

Describe 802.11n MAC layer enhancements

Describe 802.11n channel ag g reg ation

Describe the main components of the 802.11n protocol

The 802.11 Orig inal Protocol The 802.11b Protocol The 802.11g Protocol The 802.11a Protocol

The 802.11 Standards for Channels and Speeds

The IEEE 802.11 Family of Protocols

802.11b and 802.11g Coex istence The 802.11n Protocol 802.11n Channel Ag g reg ation 802.11n MIMO: Spatial Multiplex ing

802.11n Components

802.11n MAC Efficiency

802.11n MIMO Benefits

802.11n MIMO: Max imal Ratio Combining

802.11n MIMO: Transmit Beamforming

Lesson 7 : Ex a m i ni ng Wi r el ess Fr a m es a nd Ph y si c s

This lesson describes the different frames that are used in wireless network s and their physical characteristics. Upon completing this lesson, the learner will be able to meet these obj ectives: Describe how frames are sent Describe frame shapes and speeds

Describe the frames that are used to manag e the connection

Describe the manag ement frames that are used to connect to the network

Describe the manag ement frames that are used to discover the network

1 4

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

Describe the power save config uration The lesson includes these topics: Frames Shapes and Speeds Sending Frames

Describe the control frames that are used to improve communication

Manag ement Frames: Discovering the Network Manag ement Frames: Manag ing the Connection Manag ement Frames: Connecting

Power Saving

Control Frames: Improving the Connection

This lesson includes this activity:

Lab 1-2: Creating an Ad Hoc (IBSS) Network and Analyz ing the Communication

Lesson 8 : Non-8 0 2. 11 Wi r el ess Tec h nol og i es a nd Th ei r Im p a c t on WLANs

This lesson describes some of the other RF technolog ies and their impact on Wi-Fi network s. Upon completing this lesson, the learner will be able to meet these obj ectives: Describe Bluetooth and how it interacts with Wi-Fi Describe Zig Bee and how it interacts with Wi-Fi Describe some other sources of RF interference Describe wireless cordless phones and how they may impact Wi-Fi network s

Describe WiMAX and how it can interact with Wi-Fi The lesson includes these topics: Bluetooth Zig Bee Cordless Phones

Other non 802.11 Interferers WiMAX Technolog y Lesson 9 : Wi r el ess Fr a m e Jou r ney : End to End

This lesson describes the j ourney of a wireless frame from a client card to the wired network . Upon completing this lesson, the learner will be able to meet these obj ectives: Describe the j ourney of a wireless frame in the wireless space Describe V LANs Describe V LANs operations

Describe V LANS Membership modes Describe trunk ing with 802.1Q

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

1 5

Describe native V LANS

Config ure V LANs and trunk s The J ourney of a Wireless Frame V LANs V LAN Operation Native V LAN

The lesson includes these topics:

Understanding Trunk ing with 802.1Q

Config uring V LANs and Trunk s

Modul e 2 : B a sic Cisco W LAN

Insta l l a tion

Lesson 1: U nd er sta nd i ng Ci sc o U ni f i ed Wi r el ess Netw or k Ba si c s Ar c h i tec tu r e Upon completing this lesson, the learner will be able to meet these obj ectives: Briefly ex plain how LWAPP work s Describe LWAPP benefits Describe the challeng es solved by the Cisco Unified Wireless Network architecture

Describe the main Cisco APs

Describe the different Cisco Unified Wireless Network hardware component families

Describe the main Cisco WLAN controllers The lesson includes these topics: LWAPP

Describe the components of the Cisco Unified Wireless Network manag ement layer Cisco Unified Wireless Network s Basics

LWAPP Benefits

Cisco Unified Wireless Network Manag ement Layer Lesson 2: Conf i g u r i ng a Contr ol l er

Cisco Unified Wireless Network Hardware: Controllers

Cisco Unified Wireless Network Hardware: Access Points

Cisco Unified Wireless Network Hardware Components

Upon completing this lesson, the learner will be able to meet these obj ectives: Describe the controller boot seq uence Describe the controller ports and config ure its static interfaces

Navig ate in the controller web interface

Provide an initial config uration using the web interface

Provide an initial config uration from the CLI

1 6

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

Use the controller web interface for config uration purposes Manag e the controller config uration and code files Controller Ports and Interfaces The lesson includes these topics: Controller Initial Setup

Controller Web Interface Ex ample Config uration Controller Files

This lesson includes this activity:

Lab 2-1: Config uring a Cisco 2106 WLC

Lesson 3 : Di sc ov er i ng a nd Assoc i a ti ng w i th a Contr ol l er Ex plain the different LWAPP modes

Upon completing this lesson, the learner will be able to meet these obj ectives: Describe how an LWAPP AP discovers WLAN controllers

Describe how an LWAPP AP chooses a WLAN controller and j oins it Plan redundancy for APs and WLAN controllers LWAPP Modes

Describe how an LWAPP AP receives its config uration from a WLAN controller

The lesson includes these topics: AP LWAPP Discovery Phase

AP LWAPP J oin Order Desig n Precautions Config uration Phase

Lesson 4 : Ex a m i ni ng th e Di f f er ent Ac c ess Poi nt Op er a ti ona l Mod es Config ure the different AP modes Describe the local mode Describe the monitor mode Describe the sniffer mode Describe the rog ue detector mode Describe the bridg e mode Access Point Mode

Upon completion of this lesson, the learner will be able to meet these obj ectives:

Config ure and ex plain the hybrid remote-edg e access point (H-REAP) mode

The lesson includes these topics: AP Local Mode


20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

1 7

AP Rog ue Detector Mode AP Bridg e Mode Lesson 5 : Roa m i ng Upon completing this lesson, the learner will be able to meet the following obj ectives: Describe roaming Config ure mobility g roups H-REAP

AP Sniffer Mode

AP Monitor Mode

Describe mobility anchor config uration in asymmetric roaming The lesson includes these topics: Mobility Groups Roaming Concepts

Ex plain the Layer 3 roaming process, asymmetric and symmetric

Ex plain the Layer 2 roaming process

Layer 3 Roaming

Cisco Wireless Layer 2 Roaming

Mobility Anchor Lesson 6 : Ma na g i ng th e Netw or k f r om Upon completing this lesson, the learner will be able to meet the following obj ectives: Monitor and manag e access points Monitor the network from the controller Monitor pag e th e Contr ol l er

Create an internal DHCP scope The lesson includes these topics: Manag ing Access Points Controller Monitor Pag e

Monitor and manag e clients

Monitor and manag e rog ues

DHCP Service

Monitoring and Manag ing Clients

Monitoring and Manag ing Rog ues

Lesson 7 : Conf i g u r i ng a nd Mi g r a ti ng Sta nd a l one Ac c ess Poi nts Connect to a standalone AP to be able to manag e it
N E ) v 1 .0

Upon completing this lesson, the learner will be able to meet the following obj ectives: Use the ex press setup and ex press security to g ive a basic config uration to a standalone AP

1 8

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

20 0 8 C i s c o S y s t e m s , I n c .

Convert a standalone AP to LWAPP using the Cisco IOS-to-LWAPP conversion utility Convert a standalone AP to LWAPP using the Cisco WCS Connecting and Manag ing a Standalone Access Point The lesson includes these topics:

Converting an AP to LWAPP Using Cisco WCS This lesson includes this activity:

Converting a Standalone AP Using a Conversion Utility

Standalone Access Point Ex press Setup and Security

Lab 2-2: Config uring and Mig rating a Standalone AP

Lesson 8 : U nd er sta nd i ng th e Ci sc o Mob i l i ty Ex p r ess Ar c h i tec tu r e Describe the Cisco Smart Business Communication System

Upon completion of this lesson, the learner will be able to meet the following obj ectives: Describe the Cisco 521 Wireless Ex press Lig htweig ht Access Point Describe the Cisco 526 Wireless Ex press Mobility Controller Compare the Cisco Mobility Ex press to the Cisco Unified Wireless Network solutions

Config ure a Cisco 521 Access Point and a Cisco 526 Mobility Ex press Controller The lesson includes these topics: The Cisco 521 Access Point The Cisco Smart Business Communication System

The Cisco 526 Mobility Ex press Controller

Config uring the Cisco Mobility Ex press Solution This lesson includes this activity:

Cisco Mobility Ex press and Cisco Unified Wireless Network Comparison

Lab 2-3: Installing and Config uring a Cisco Mobility Ex press Wireless Controller and AP

Modul e 3 : W irel ess Cl ients


Lesson 1 U si ng Def a u l t Conf i g u r a ti on Tool s Upon completing this lesson, the learner will be able to meet the following obj ectives: Describe Network Manag er for Linux Describe how to connect to a WLAN using Network Manag er Describe AirPort Ex treme for Mac

Describe how to use Network Manag er to config ure a wireless profile Describe how to connect to a WLAN with AirPort

Describe how to use AirPort to config ure a wireless profile

Describe how to use AirPort advanced parameters and diag nostic utilities
C o u r s e A d m in is t r a t io n G u id e 1 9

20 0 8 C i s c o S y s t e m s , I n c .

Describe the Windows WZC utility

Describe how to connect to a WLAN using the WZC

Describe how the WZC scans and associates to network s The lesson includes these topics: Linux Network Manag er Connecting to a WLAN with Network Manag er Enterprise Profiles with Network Manag er

Ex plain how to use the WZC to config ure a wireless profile

WZC Scan Log ic

Config uring a Profile Using WZC

Connecting to Preferred WLANs Using WZC

Windows Wireless Zero Config uration Overview

Advanced Parameters and Diag nostics with AirPort

Config uring a Profile with AirPort Ex treme

Connecting to a WLAN with AirPort Ex treme

Mac AirPort Ex treme Config uration Utility

Lesson 2: Desc r i b i ng Ci sc o Ai r onet WLAN Cl i ent Ad a p tor s Describe the Cisco ADU and Cisco ASTU Describe how to install the Cisco ADU

Upon completion of this lesson, the learner will be able to meet these obj ectives:

Describe how to use the Cisco ADU diag nostic tool

Describe how to config ure the advanced parameters

Describe how to create a profile using the Cisco ADU profile manag er and select the rig ht security profile

Describe how to check connection status window and options

Describe how to use the Cisco Aironet Site Survey Utility and manag e thresholds and AP scan list Describe the Cisco ACAU

Describe the basic functions of the Cisco ACAU for profile manag ement and g lobal setting s The lesson includes these topics: Installing the Cisco ADU Cisco ADU Status Pag e Cisco ADU and ASTU Overview

Cisco ADU Advanced Parameters


20 I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W N E ) v 1 .0 20 0 8 C i s c o S y s t e m s , I n c .

Cisco ADU Profile Manag er

Cisco ADU: Other Tools Cisco ACAU Lesson 3 : Desc r i b i ng th e Ci sc o Sec u r e Ser v i c es Cl i ent Describe the Cisco SSC

Upon completing this lesson, the learner will be able to meet these obj ectives: Describe the Cisco SSC licensing system

Describe the Cisco SSC administration utility basic functions The lesson includes these topics: The Cisco SSC License The Cisco SSC Overview

Describe the Cisco SSC profile (g roups, SSID) creation and manag ement

Describe the Cisco SSC installation

Cisco Secure Services Client Administration Utility Lesson 4 U nd er sta nd i ng th e Ci sc o Com p a ti b l e Ex tensi ons p r og r a m Describe the Cisco Compatible Ex tensions prog ram Upon completing this lesson, the learner will be able to meet these obj ectives: Ex plain how the wireless industry supports it

The Cisco SSC Config uration

Cisco Secure Services Client Installation

Describe some of its main features, such as Cisco Centraliz ed Key Manag ement, enhanced roaming , wireless IPS, client reporting , and client MFP The lesson includes these topics: The Cisco Compatible Ex tensions Prog ram

Cisco Compatible Ex tensions Ex plained Cisco Compatible Ex tensions Ex amples

Cisco Compatible Ex tensions Prog ram for Wi-Fi Tag s

Cisco Compatible Ex tensions Features and V ersions Summary

This lesson includes these activities:

Lab 3-1: Installing and Using the Cisco ADU

Lab 3-2: Ex perimenting with Connections and Roaming

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

21

Mod u l e 4 : WLAN Sec u r i ty Lesson 1: Ov er v i ew Upon completing this module, the learner will be able to meet these obj ectives: Describe authentication Ex plain authentication and encryption of WLAN Sec u r i ty

Describe the encryption process

Describe the Cisco wireless IPS The lesson includes these topics: Authentication Encryption

Describe k ey manag ement possibilities

Describe Manag ement Frame Protection Authentication and Encryption

Advanced Wireless Security: MFP Lesson 2: Esta b l i sh i ng IEEE 8 0 2. 11 Sec u r i ty Config ure open authentication Upon completing this lesson, the learner will be able to meet these obj ectives: Config ure WEP

Advanced Wireless Security

Key Manag ement

Config ure a MAC filter on a WLAN The lesson includes these topics: Authentication: Open Authentication: PSK (WEP)

MAC Filtering

Lesson 3 : Centr a l i z i ng WLAN Au th enti c a ti on Describe IEEE 802.1X Describe EAP

Upon completing this lesson, the learner will be able to meet these obj ections:

Config ure the controller for local EAP The lesson includes these topics: EAP
22

Config ure a RADIUS server as an authentication source on the controller

802.1X

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

Sources of Authentication: RADIUS Local EAP Lesson 4 : Desc r i b i ng EAP Au th enti c a ti ons Ex plain certificates

Upon completing this lesson, the learner will be able to meet these obj ections: Describe EAP-TLS Describe PEAP

Describe EAP-FAST Describe LEAP and name some other EAPs Certificates

The lesson includes these topics: Public Key Infrastructure

EAP-TLS PEAP

EAP-FAST LEAP and Some Other EAP Types

Lesson 5 : Ma na g i ng Au th enti c a ti on a nd Enc r y p ti on w i th WPA a nd WPA2 Describe WPA

Upon completing this lesson, the learner will be able to meet these obj ectives: Describe WPA authentication

Describe WPA encryption

Describe WPA2 and 802.11i

Compare WPA, WPA2 and 802.11i

Describe Cisco Centraliz ed Key Manag ement Wi-Fi Protected Access

The lesson includes these topics: WPA Authentication

Cisco Centraliz ed Key Manag ement and WPA2 Key Manag ement Lesson 6 : Conf i g u r i ng Wi r el ess Sec u r i ty on Contr ol l er s a nd Cl i ents Describe the different security config uration options Upon completing this lesson, the learner will be able to meet these obj ectives: Config ure IEEE 802.1X on the controller
20 0 8 C i s c o S y s t e m s , I n c .

WPA, WPA2, and 802.11i Comparison

WPA2 and 802.11i

WPA Encryption

C o u r s e A d m in is t r a t io n G u id e

23

Config ure web authentication The lesson includes these topics: IEEE 802.1X

Config ure WLAN security on the main client types, WZC, ADU, Network Manag er and Mac AirPort Ex treme

Config ure WPA and WPA2 on the controller

Security Config uration Options WPA and WPA2

Web Authentication

Client Config uration

This lesson includes these activities:

Lab 4-1: 802.1Q and Web Authentication

Lab 4-2: Config uring EAP-FAST Authentication with WPA

Modul e 5 : Cisco W CS Adm inistra tion


Lesson 1: Intr od u c i ng Ci sc o WCS a nd Ci sc o WCS Na v i g a tor Upon completing this lesson, the learner will be able to meet these obj ectives: Describe Cisco WCS location capabilities Describe Cisco WCS and its position in the manag ement layer

Describe Cisco WCS Navig ator The lesson includes these topics: Cisco WCS Location

Describe the main features of Cisco WCS

Ex plain the different Cisco WCS versions and licenses

Cisco WCS Position in the Manag ement layer

Cisco WCS Navig ator Lesson 2: Insta l l i ng Ci sc o WCS Upon completing this lesson, the learner will be able to meet these obj ectives: Install Cisco WCS Describe the hardware req uirements for Cisco WCS

Cisco WCS Features

Cisco WCS License System and V ersions

Connect to Cisco WCS and install a license file

V erify Cisco WCS installation

24

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

The lesson includes these topics: Cisco WCS Installation

Cisco WCS Installation Req uirements

Connecting and Installing a License Lesson 3 : Ad m i ni ster i ng Ci sc o WCS Upon completing this lesson, the learner will be able to meet these obj ectives: Describe the Administration menu Manag e back g round task s Log in to Cisco WCS and discover the interface

V erifying the Installation

Define alarm freq uency and preferences The lesson includes these topics: Administration Menu Cisco WCS Log in

Config ure Cisco WCS files and setting s

Config ure Cisco WCS log s

Manag e your password and understand how users are g rouped and created

Administration > AAA

Administration > Back g round Task s Administration > Log g ing

Administration > Setting s

Administration > User Preferences Ci sc o WCS

Lesson 4 : Wor k i ng w i th Contr ol l er s f r om

Upon completing this lesson, the learner will be able to meet these obj ectives: Add controllers to the Cisco WCS Audit network devices config uration from Cisco WCS

Autoprovision controllers from Cisco WCS The lesson includes these topics: Audits Adding Controllers

Config ure network devices using templates

Config uring Policy Templates Autoprovisioning

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

25

Lesson 5 : Wor k i ng w i th Ma p s

Upon completing this lesson, the learner will be able to meet these obj ectives: Add a campus map to Cisco WCS Describe the various map types and map editors used in Cisco WCS

Add a building to a campus Position APs on a map

Add floor maps to building s in Cisco WCS

Use the planning tool to help AP planning and deployment The lesson includes these topics: Monitor > Maps > Campus Maps and Planning Overview

Use the map editor to enhance Cisco WCS maps

Planning Tool This lesson includes these activities: Lab 5-2: Work ing with Maps Lab 5-1: Config uring Controllers and APs from the Cisco WCS

Map Editor

Monitor > Maps > Building > New Floor Area > Add AP

Monitor > Maps > Building > New Floor Area

Monitor > Maps > Building

Lesson 6 : Moni tor i ng th e Netw or k w i th Ci sc o WCS Personaliz e the Cisco WCS home pag e

Upon completing this lesson, the learner will be able to meet these obj ectives: Describe the Monitor pag e Monitor controllers Use the Alarms dashboard

Monitor events Locate devices

Monitor alarms

Monitor security

Monitor clients

Monitor access points

The lesson includes these topics: Monitor Pag e


26

Customiz ing the Home Pag e

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

Locating Devices

Monitor > Events

Monitors > Alarms

Monitor > Security

Monitor > Clients

Monitor Access Points

Monitor Controllers

Alarm Dashboard

This lesson includes this activity:

Lab 5-3: Monitoring the Network and Containing Devices

Modul e 6 : W LAN
Lesson 1: Sy stem

Ma intena nce a nd Troub l esh ooting


Ma i ntena nc e

Upon completing this lesson, the learner will be able to meet these obj ectives: Upg rade the controller code Back up and restore the controller config uration

Back up and restore the Cisco WCS database and upg rade the Cisco WCS software The lesson includes these topics: Controller Config uration Back up Controller Code Upg rade

Cisco WCS Back up

This lesson includes this activity:

Lab 6-1: Back ing Up the Controller Config uration and the Cisco WCS Database Files

Lesson 2: Desi g n a nd Si te Su r v ey Consi d er a ti ons

Upon completing this lesson, the learner will be able to meet these obj ectives: Describe the main non-802.11 types of interferers Describe how building materials can affect a wireless sig nal

Describe the characteristics of a wireless cell desig ned for data, voice, or location

The lesson includes these topics: Sources of Interference

Building Material and Interference

Cells and Usag e

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

27

Lesson 3 : Tr ou b l esh ooti ng Tool s

Upon completing this lesson, the learner will be able to meet these obj ectives: V erify common points on the controller or the client that are common sources of connection issues Use the Layer2/Layer3 troubleshooting approach Use the CLI debug and s h o w commands Use visual elements to troubleshoot Layer 1 issues

Describe the Cisco Spectrum Ex pert and Spectrum Intellig ence The lesson includes these topics: LED Status Controller and Client Issues

Describe some third-party tools used for wireless troubleshooting

Use the Cisco WCS client troubleshooting tool

Describe the controller log s and system messag es

Using Log s

Layer 2 and Layer 3 Troubleshooting

debug and s h o w Commands

Cisco Spectrum Ex pert This lesson includes these activities: Lab 6-3 Optional Lab (Troubleshooting with Wireshark and Converting an AP to Autonomous Mode) Lab 6-2: Troubleshooting

Third-Party Tools

Cisco WCS Client Troubleshooting Tool

28

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

C o u rs e E va l u a t io n s

Cisco uses a post-course evaluation system, Metrics That Matter (MTM), for its instructor-led courses. The instructor must ensure that each student is aware of the confidential evaluation process and that all students submit an evaluation for each course. There are two options for students to complete the evaluation. A URL will be made available, specific to each Cisco Learning Partner. Obtain the URL from your MTM system administrator before the last day of class.

For Cl a sses w ith Internet Access

1. Upon completion of the course, instruct the students to enter the URL into their browser. 2. Mak e sure that the students input their e-mail address (used only for a follow-up evaluation).
Note

S i x t y d a y s f o l l o w i n g a l e a r n i n g e v e n t , st u d e n t s w i l l r e c e i v e a b r i e f f o l l o w -u p e v a l u a t i o n , a n d , a g a i n , r e sp o n se s w i l l b e k e p t c o n f i d e n t i a l . E -m a i l a d d r e sse s w i l l n o t b e u se d f o r m a r k e t i n g p u r p o se s. (If st u d e n t s d o n o t h a v e e -m a i l a d d r e sse s, t h e y m a y t y p e i n a d u m m y a d d r e ss.)

3. Instruct the students to select the appropriate course from the drop-down list. 4. Instruct the students to complete the course evaluation and click Submit one time only. 5. Advise the students to wait for Thank you to appear on the screen before leaving .

For Cl a sses W ith out Internet Access

A paper-based version of the post-course evaluation is available. Your MTM system administrator can provide you with copies. 1. Distribute paper-based evaluations at the beg inning of the last day of class. 2. Instruct the students to complete the survey only after completing the course. 3. Collect the evaluations and submit them to your MTM system administrator.

To V iew

E v a l ua tion R esul ts

1. Go to www.metricsthatmatter.com/client, where client is the CLP name. (Reminder: All data is confidential; you will see only your own data.) 2. Log in using your ID and the password sent to you from MTM or provided by your company MTM system administrator to ensure confidentiality. 3. Choose Menu Option Learner Evaluation Reports: Class Evaluation Summary Report Evaluation Retrieval Tool

To view your post-course evaluation results:

4. Search for and select the appropriate class.

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

29

L ab S etup
Overview
The purpose of the Lab Setup section is to assist in the setup and config uration of the training eq uipment for Implementing Cisco Unified Wireless Networking Essentials (IUWNE) v1.0 course. This section includes these topics: Hardware and Software Req uirements Lab Topolog y

Work station Config uration General Lab Setup

Lab Eq uipment Config uration

Lab 4-1: 802.1Q and web Authentication

Lab 3-2: Ex perimenting with Connections and Roaming

Lab 3-1: Installing and Using the Cisco ADU

Lab 2-3: Installing and Config uring a Cisco Mobility Ex press Wireless Controller and AP

Lab 2-2: Config uring and Mig rating a Standalone AP

Lab 2-1: Config uring a Cisco 2106 WLC

Lab 1-2: Creating an Ad Hoc (IBSS) Network and Analyz ing the Communication

Lab 1-1: Becoming Familiar with Antennae and Rang es

Lab 4-2: Config uring EAP-FAST Authentication with WPA

Lab 5-2: Work ing with Maps

Lab 5-1: Config uring controllers and APs from the Cisco WCS

Lab 5-3: Monitoring the Network and Containing Devices

Lab 6-2: Troubleshooting

Lab 6-1: Back ing Up the Controller Config uration and the Cisco WCS Database Files

Lab 6-3: Optional Lab (Troubleshooting with Wireshark and Converting an AP to Autonomous Mode) Config uration Files Summary

30

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

Teardown and Restoration

Lab Activity Solutions

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

31

L a b T o p o lo g y

This topic describes the lab topolog y for Implementing Cisco Unified Wireless Networking Essentials (IUWNE) v1.0.

This view is limited to two pods for clarity. Eig ht pods are ex pected in the lab setup. The lab only has one server, but 8 Cisco 2106 Wireless LAN Controllers (Cisco 2106 WLC), 8 Cisco 526 Wireless Ex press Mobility Controllers (Cisco 526 Mobility Controller), 8 Cisco 521 Wireless Ex press Lig htweig ht Access Points (Cisco 521 AP) and 8 Cisco Aironet 1252 APs.

Lab Topology, Backbone View (Two Pods)

2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

IU W

N E v 1 . 0 4

32

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

L a b Top ol og y , Com m on Eq u i p m ent

Pod 1 and Pod 2 Common Equipment

2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

IU W

N E v 1 . 0 5

L a b Top ol og y , VP N Vi ew

L og ic al V iew

of V PN

2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

IU W

N E v 1 . 0 6

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

33

L a b Top ol og y D i a g r a m

( S tu d ent P od Vi ew )

Lab Topology, Pod X

2 0 0 8 C is c o S y s te m s , In c . A ll r ig h t s r e s e r v e d .

IU W

N E v 1 . 0 3

Ta b l e 1: Cor e Dev i c es
D ev i c e Na m e A b b r ev i a ti on C3560E R trts R trv p n A ssi g ned P od N/A N/A N/A Netw or k A d d r ess, m a sk / 2 4 10.100.1.253 10.100.1.252 10.100.1.254 A d d i ti ona l Inf or m a ti on

D ev i c e Na m e Ca t a l y st 3560E R t r TS R tr V P N

Inter f a c e N/A N/A N/A

34

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

Ta b l e 2: Wor k g r ou p Dev i c es
D ev i c e Na m e A b b r ev i a ti on 2106-1 526-1 1252-1 A ssi g ned P od 1 1 1 Netw or k A d d r ess, m a sk / 2 4 10.10.1.10/24 10.10.1.100/24 10.10.1.50 E l se 10.10.1.21 - 25 521-1 La p t o p 1 2106-2 526-2 1252-2 1 1 2 2 2 NIC NIC 4 2 NIC 10.10.1.30 10.10.1.240 10.20.1.10/24 10.20.1.100/24 10.20.1.50 E l se 10.20.1.21 - 25 521-2 La p t o p 2 2106-3 526-3 1252-3 2 2 3 3 3 NIC NIC 4 2 NIC 10.20.1.30 10.20.1.240 10.30.1.10/24 10.30.1.100/24 10.30.1.50 E l se 10.30.1.21 - 25 521-3 La p t o p 3 2106-4 526-4 1252-4 3 3 4 4 4 NIC NIC 4 2 NIC 10.30.1.30 10.30.1.240 10.40.1.10/24 10.40.1.100/24 10.40.1.50 E l se 10.40.1.21 - 25 521-4 La p t o p 4 2106-5 526-5 4 4 5 5 NIC NIC 4 2 10.40.1.30 10.40.1.240 10.50.51.10/24 10.50.1.100/24
C o u r s e A d m in is t r a t io n G u id e 35

D ev i c e Na m e 2106 c o n t r o l l e r g ro u p 1 526 c o n t r o l l e r g ro u p 1 1252 AP g r o u p 1 521 AP g r o u p 1 La p t o p g r o u p 1 2106 c o n t r o l l e r g ro u p 2 526 c o n t r o l l e r g ro u p 2 1252 AP g r o u p 2 521 AP g r o u p 2 La p t o p g r o u p 2 2106 c o n t r o l l e r g ro u p 3 526 c o n t r o l l e r g ro u p 3 1252 AP g r o u p 3 521 AP g r o u p 3 La p t o p g r o u p 3 2106 c o n t r o l l e r g ro u p 4 526 c o n t r o l l e r g ro u p 4 1252 AP g r o u p 4 521 AP g r o u p 4 La p t o p g r o u p 4 2106 c o n t r o l l e r g ro u p 5 526 c o n t r o l l e r g ro u p 5
20 0 8 C i s c o S y s t e m s , I n c .

Inter f a c e 4 2 NIC

A d d i ti ona l Inf or m a ti on

Au t o n o m o u s w i t h st a t i c LWAP P w i t h DH CP

Au t o n o m o u s w i t h st a t i c LWAP P w i t h DH CP

Au t o n o m o u s w i t h st a t i c LWAP P w i t h DH CP

Au t o n o m o u s w i t h st a t i c LWAP P w i t h DH CP 30

D ev i c e Na m e 1252 AP g r o u p 5 521 AP g r o u p 5 La p t o p g r o u p 5 2106 c o n t r o l l e r g ro u p 5 526 c o n t r o l l e r g ro u p 6 1252 AP g r o u p 6 521 AP g r o u p 6 La p t o p g r o u p 6 2106 c o n t r o l l e r g ro u p 7 526 c o n t r o l l e r g ro u p 7 1252 AP g r o u p 7 521 AP g r o u p 7 La p t o p g r o u p 7 2106 c o n t r o l l e r g ro u p 8 526 c o n t r o l l e r g ro u p 8 1252 AP g r o u p 8 521 AP g r o u p 8 La p t o p g r o u p 8

D ev i c e Na m e A b b r ev i a ti on 1252-5

A ssi g ned P od 5

Inter f a c e NIC

Netw or k A d d r ess, m a sk / 2 4 10.50.1.50 E l se 10.50.1.21 - 25

A d d i ti ona l Inf or m a ti on Au t o n o m o u s w i t h st a t i c LWAP P w i t h DH CP

521-5 La p t o p 5 2106-6 526-6 1252-6

5 5 6 6 6

NIC NIC 4 2 NIC

10.50.1.30 10.50.1.240 10.60.1.10/24 10.60.1.100/24 10.60.1.50 E l se 10.60.1.21 - 25 Au t o n o m o u s w i t h st a t i c LWAP P w i t h DH CP

521-6 La p t o p 6 2106-7 526-7 1252-7

6 6 7 7 7

NIC NIC 4 2 NIC

10.60.1.30 10.60.1.240 10.70.1.10/24 10.70.1.100/24 10.70.1.50 E l se 10.70.1.21 - 25 Au t o n o m o u s w i t h st a t i c LWAP P w i t h DH CP

521-7 La p t o p 7 2106-8 526-8 1252-8

7 7 8 8 8

NIC NIC 4 2 NIC

10.70.1.30 10.70.1.240 10.80.1.10/24 10.80.1.100/24 10.80.1.50 E l se 10.80.1.21 - 25 Au t o n o m o u s w i t h st a t i c LWAP P w i t h DH CP

521-8 La p t o p 8

8 8

NIC NIC

10.80.1.30 10.80.1.240

36

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

Ta b l e 3 : C3 5 6 0 E Ca b l i ng
VL A N 101 101 101 101 101 102 102 102 102 102 103 103 103 103 103 104 104 104 104 104 105 105 105 105 105 106 106 106 106 106 107
20 0 8 C i s c o S y s t e m s , I n c .

Inter f a c e G i 0/0/1 G i 0/0/2 G i 0/0/3 G i 0/0/4 G i 0/0/5 G i 0/0/6 G i 0/0/7 G i 0/0/8 G i 0/0/9 G i 0/0/10 G i 0/0/11 G i 0/0/12 G i 0/0/13 G i 0/0/14 G i 0/0/15 G i 0/0/16 G i 0/0/17 G i 0/0/18 G i 0/0/19 G i 0/0/20 G i 0/0/21 G i 0/0/22 G i 0/0/23 G i 0/0/24 G i 0/0/25 G i 0/0/26 G i 0/0/27 G i 0/0/28 G i 0/0/29 G i 0/0/30 G i 0/0/31

R em ote D ev i c e 2106-1 1252-1 526-1 521-1 La p t o p 1 2106-2 1252-2 526-2 521-2 La p t o p 2 2106-3 1252-3 526-3 521-3 La p t o p 3 2106-4 1252-4 526-4 521-4 La p t o p 4 2106-5 1252-5 526-5 521-5 La p t o p 5 2106-6 1252-6 526-6 521-6 La p t o p 6 2106-7

Inter f a c e 4 NIC 2 NIC NIC 4 NIC 2 NIC NIC 4 NIC 2 NIC NIC 4 NIC 2 NIC NIC 4 NIC 2 NIC NIC 4 NIC 2 NIC NIC 4

R em a r k s

(Wi l l b e c o m e t r u n k (TR ) i n a l a b ; TR t o b e c o n f i g u r e d b y st u d e n t s.)

(Wi l l b e c o m e t r u n k i n a l a b ; TR t o b e c o n f i g u r e d b y st u d e n t s.)

(Wi l l b e c o m e t r u n k i n a l a b ; TR t o b e c o n f i g u r e d b y st u d e n t s.)

TR t o b e c o n f i g u r e d b y st u d e n t s.

(Wi l l b e c o m e t r u n k i n a l a b ; TR t o b e c o n f i g u r e d b y st u d e n t s.)

(Wi l l b e c o m e t r u n k i n a l a b ; TR t o b e c o n f i g u r e d b y st u d e n t s.)

C o u r s e A d m in is t r a t io n G u id e

37

VL A N 107 107 107 107 108 108 108 108 108 TR TR TR TR TR

Inter f a c e G i 0/0/32 G i 0/0/33 G i 0/0/34 G i 0/0/35 G i 0/0/36 G i 0/0/37 G i 0/0/38 G i 0/0/38 G i 0/0/40 G i 0/0/41 G i 0/0/42 G i 0/0/43 G i 0/0/44 G i 0/0/45

R em ote D ev i c e 1252-7 526-7 521-7 La p t o p 7 2106-8 1252-8 526-8 521-8 La p t o p 8 R trV P N R t r TS WCS We b K V M 1 We b K V M 2

Inter f a c e NIC 2 NIC NIC 4 NIC 2 NIC NIC f a 0/1 f a 0/1 NIC f a 0/1 f a 0/1

R em a r k s (Wi l l b e c o m e t r u n k i n a l a b ; TR t o b e c o n f i g u r e d b y st u d e n t s.)

(Wi l l b e c o m e t r u n k i n a l a b , TR t o b e c o n f i g u r e d b y st u d e n t s.)

3 5 6 0 E IP Ad d r esses
VL A N 101 102 103 104 105 106 107 108 100 IP a d d r ess 10.10.1.253 10.20.1.253 10.30.1.253 10.40.1.253 10.50.1.253 10.60.1.253 10.70.1.253 10.80.1.253 10.10.100.1 M a sk /24 /24 /24 /24 /24 /24 /24 /24 /24 R em a r k s

38

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

H a rd wa re a n d S o f t wa re Req u irem en t s
H a r d w a r e L is t
The hardware listed in the following table is sug g ested for this learning product.
Backbone Equipment to Sh ar e Acr os s al l Pod s Mfr P a rt # D es c ri p t i o n C is c o C is c o
WS -C3560E 48P D-S F CIS CO 1841S E C/K 9

C a ta ly s t 3 5 6 0 E 4 8 1 0 /1 0 0 /1 0 0 0 P o E + 2 * 1 0 G E ( X 2 ) , 1 1 5 0 W , I P B s / w -> B a c k b o n e s w i t c h fo r a l l p o d s - P o E , V L A N , D H C P 1 8 4 1 S ec u ri t y B u n d l e, A d v . S ec u ri t y , 6 4 F L / 2 5 6 D R V P N S erv er ->

C is c o

CIS CO 2811 NM -32A CAB -O CTALAS Y NC= H WIC-8A CAB -H DAS Y NC P CS e rv e r WCS S TANDAR DK 9 WCS AP B AS E -50 We b -K V M sw i t c h

2 8 1 1 w / A C P W R , 2 F E , 4 H W I C s , 2 P V D Ms , 1 N ME , 2 A I MS , I P B A S E , 6 4 F / 2 5 6 D -> T erm i n a l S erv er fo r c o n s o l e p o rt s


32 p o r t Asy n c h r o n o u s M o d u l e 8 Le a d O c t a l Ca b l e (68 p i n t o 8 M a l e R J -45s) 8-P o r t Asy n c H WIC H i g h De n si t y 8-p o r t E IA-232 Asy n c Ca b l e R e q u i r e s: Wi n d o w s 2003 S v r , 4G + m e m o r y - u se d f o r Ci sc o WCS , IIS S e r v e r WCS To p Le v e l S K U f o r AP c a p a c i t y o p t i o n s

V a rie s Ci sc o

WCS -S t a n d a r d -K 9 50 AP s. Li c e n se O n l y . E x a m p l e : S t a r Te c h .c o m E n h a n c e d K V M S w i t c h O v e r IP S V 841H DIE - K V M sw i t c h - 8 p o r t s + Ca b l e s

V a rie s V a rie s

P o w e r e d AP C sw i t c h

E x a m p l e: B a y T ec h P o w er S w i t c h 2 0 o u t l et s w i t c h ed R P C -2 8

Equipment Need ed Per Pod ( mul tipl y by number of pod s ) C is c o C is c o C is c o C is c o


AIR -WLC526K 9 AIR LAP 521G -AK 9 AIR WLC2106-K 9 AIR LAP 1250= AIR R M 1252A-AK 9 = AIR -R M 1250B LANK = Ci sc o WLC526 M o b i l i t y E x p r e ss Co n t r o l l e r 802.11g LWAP P AP In t e g r a t e d An t e n n a s F CC Cn f g 2100 S e r i e s WLAN Co n t r o l l e r f o r u p t o 6 Li g h t w e i g h t AP s M o d u l a r U n i f i e d AP P l a t f o r m (n o r a d i o m o d u l e s); S p a r e

802.11a /n -d 2.0 5-G H z R a d i o M o d u l e ; 3 R P -TNC; F CC; S p a re AP 1250 b l a n k r a d i o m o d u l e sl o t c o v e r - c o v e r s o p e n 2.4G H z sl o t

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

39

V a ri es

AIR ANT5135DG R = 30 d B i a tte n u a to r La p t o p - 802.3 + 802.11 Ai r P Ca p Cl a ssi c AIR -CB 21AG A-K 9

5-G H z 3.5 d B i Di p o l e S t r a i g h t An t R P -TNC G r a y Q t y 1; S p a re 5.0-G H z a t t e n u a t o r - 30 d B i - R P -TNC

V a ri es A i rP C a p C is c o

R eq u i res : 1 0 B a s eT ; ( ex : D el l P W i rel es s p i n t erfa c e

2 + G H z ; I n t el 4 9 6 rec i s i o n a c k et s n

2 G R A 5 a b g n M2 3 0 0 i ffer - 8

M; W i n X P P ro ; 8 0 2 . 3 w i rel es s ; P C MC I A + U S B ) 0 2 . 1 1 b / g c a p t u re -> U S B

802.11a /b /g Ca r d b u s Ad a p t e r ; F CC Cn f g

S o f tw a r e L is t

The software listed in the following table is sug g ested for this learning product.
D esc r i p ti on Ci sc o IO S S o f t w a r e R e l e a se 12.3.8(J A) Wi n d o w s 2003 S P 1 o n se r v e r Wi r e sh a r k 0.9 9 .8 Co o k b o o k f r e e X M L e d i t o r Ci sc o Ai r o n e t De sk t o p U t i l i t y 4.0 WLC c o d e 5.0 WCS v 5.0 w i t h l i c e n se M o b i l i t y E x p r e ss Co n t r o l l e r c o d e 4.2 M o b i l i t y E x p r e ss Co n f i g u r a t i o n Assi st a n t 1.5 F r e e TF TP so f t w a r e , su g g e st Tf t p d 32 AP t o LAP M i g r a t i o n To o l v 3.5 P Cs: Wi n d o w s X P V a r ie s Ci sc o M i c r o so f t Ci sc o M fr. Ci sc o P a r t Nu m b er TB D N/A TB D TB D TB D TB D TB D TB D TB D N/A TB D N/A Q ty . 1p e r d e v ic e 1 p e r c l a ss 1p e r la p to p 1p e r la p to p 1p e r la p to p 1p e r d e v ic e 1 p e r c l a ss 1p e r d e v ic e 1p e r la p to p 1p e r la p to p 1p e r la p to p 1p e r P C/l a p t o p

40

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

W o rk s t a t io n C o n f ig u ra t io n
Cl a ss P Cs

These instructions describe how to set up the lab when work stations are req uired.

If you use a remote lab, Steps 1 to 4 apply to class PCs only. If you use a local lab, sk ip this part and g o to Step 5.
S tep 1 S tep 2 S tep 3 S tep 4

Mak e sure that PCs have Windows installed, browser capability, and proper access to the Internet. Mak e sure that PCs have Flash plug -in installed, It is req uired to access Cisco WCS. Download and install Cisco V PN Client software, and provide a shortcut on the desk top. Copy Cisco V PN client profiles from the instructor CD to V PN Client profiles directory.

La b La p top s

Steps 5 and following apply to the laptops in the lab or the local eq uipment. Remote laptops should have their IP address properly set (refer to the lab maps), and config ured to allow remote access via remote desk top. Install X P SP2, plus any critical categ ory patch for Windows X P Pro, BIOS and Intel wireless card. Install Wireshark sniffer software from the instructor CD, and provide a shortcut on the desk top. Install Cisco Config uration Assistant from the instructor CD, and provide a shortcut on the desk top. Install a TFTP server from the instructor CD, and provide a shortcut on the desk top. Install the Cook book free X ML editor, and provide a shortcut on the desk top. Put on the desk top the IOS-to-LWAPP folder, along with the files it contains.

S tep 5 S tep 6 S tep 7 S tep 8 S tep 9 S tep 1 0 S tep 1 1

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

41

L a b E q u ip m en t C o n f ig u ra t io n
N otes on D el iv ery
Lab Eq uipment

This eq uipment config uration information is necessary for initial setup of the lab config uration.

A TFTP server is req uired on the remote laptops. Some task s in the lab ex ercises req uire a TFTP server and direct control of it by the learner. Some of the core switch ports to the pods are config ured by the learners. The instructor config ures the rest of it, and should verify the connectivity between the devices common to the class. Learners can access their controllers both from the CLI using the terminal server and from the web interface using their connection to the switch. Ensure that all eq uipment is properly wired to their respective switches. Save in startup-config of Cat3560E config uration file MainSwitchConfig .tx t.

The Cisco Aironet 1252 APs should be in standalone mode.

Controllers should be reset to factory default.

Cisco WCS should be installed and ready. Root password should be Wlan2day. For WCS http port, choose 81. Use the default https port, 443. Back up the Cisco WCS database. It will be restored at the end of the class to bring WCS back to this orig inal state. On the same machine as Cisco WCS (10.100.1.1), start IIS with a default web server, pointing to a sample pag e containing the file index .htm.

The Cisco 521 APs should have their config uration cleared and be in LAP mode. Their IP addresses should be statically defined prior to the class to 10.X 0.1.30, where X is the pod number.

The Cisco 526 Mobility Controllers should be reset to factory default.

On the same machine as Cisco WCS (10.100.1.1), a DNS server should be installed, and have a host entry in the root domain for test.ex ample.com, pointing to 17 2.16.9 0.253. Terminal server and V PN g ateway should be config ured to provide access to the remote lab.

42

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

G en era l L a b S et u p
S tep 1 S tep 2 S tep 3 S tep 4 S tep 5 S tep 6 S tep 7 S tep 8 S tep 9 S tep 1 0 S tep 1 1 S tep 1 2

This information details the procedure to set up and config ure the lab eq uipment. Interconnect all the lab devices eq uipment. Mak e sure that each Cisco 1252 AP config uration is cleared (clear config from the controller) if the APs are still in LWAPP mode. Mak e sure that each Cisco 1252 AP is converted to autonomous mode and that the config uration is cleared (erase startup-config ). Clear the Cisco 2106 WLC config uration (clear config , reset system without save). Clear the Cisco 521 APs config uration (clear config ). Maintain or config ure their IP addresses to the static req uired value, 10.X 0.1.30/24, where X is the pod number. Clear the Cisco 526 Mobility Controllers config uration. In the remote laptops, clear any remaining community on the Cisco Config uration Assistant. In the remote laptops, mak e sure that the Cisco ADU is uninstalled and the profiles removed. In the remote laptops, mak e sure that no Preferred network remains in the Windows Wireless Zero Config uration (WZC) utility. In the remote laptops, mak e sure that the IOS-to-LWAPP folder is on the desk top. In the remote laptops, mak e sure that the req uired prog rams are available as per the previous section. On the class server, install Cisco WCS on ports 81 and 443. Perform a Cisco WCS back up with Cisco WCS in its empty state. You will be able to restore the Cisco WCS to empty state after the class by restoring this back up. On the class server, set up a DNS server, and create an entry for test.ex ample.com pointing to the class server itself. On the class server, create a basic ex ample pag e and store it in the default web server folder. Start the web service. On the main switch, inj ect the MainSwitchConfig .tx t file. In the class PCs, mak e sure that the req uired prog rams are available and that connectivity to the Internet is possible.

S tep 1 3 S tep 1 4 S tep 1 5 S tep 1 6

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

43

L a b 1-1: B ec o m in g F a m il ia r wit h An t en n a e a n d Ra n g es
This topic details the lab activity for Lab 1-1.

Ob j ec tiv es

You will complete these task s in this lab: Determine the EIRP from the AP, cable, and antenna specifications provided Convert milliwatts to dBm and back

Determine which AP is best adapted to which situation

Vis ua l Ob j ec tiv e

The fig ure displays the lab topolog y that you will use to complete this lab.

Visual Objective for Lab 1-1: B ecom in g F am iliar w ith A n ten n as an d R an g es

x mW = y dBm

2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

IU W

N E v 1 . 0 7

44

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

S etup

This lab is a paper and pencil lab only. There is no specific hardware setup for it.

A d d itio na l S etup N o tes C o m m o n I s s ues

Task 3 tak es the antennae directly from the courseware slides. Feel free to add some other scenarios using some other Cisco antennae referenced at the end of Lesson 4 on antennae.

This subtopic presents common issues for this lab:

In Task 1, students sometimes g et confused if they are not used to math calculations. It may be useful to check that everyone is at the same pace by doing the first q uestions at the class level, then let each student carry on. Some students are faster than others. You may want to add your own q uestions in Task 1 for the fast students, or determine a targ et for the number of q uestions to answer, and leave the rest for after-class activities.

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

45

L a b 1-2 : C rea t in g a n Ad H o c (I B S S ) N et wo rk a n d An a l y z in g t h e C o m m u n ic a t io n
This topic details the lab activity for Lab 1-2.

Ob j ec tiv es

You will complete these task s in this lab: Connect to your remote laptop Connect to the remote lab

V erify the internal card setting s

Create an ad hoc network and analyz e the communication

Vis ua l Ob j ec tiv e

The fig ure displays the lab topolog y that you will use to complete this lab.

V is ual O b j ec tiv e f or L ab 1-2: Cr eating an A d H oc ( I B S S ) N etw or k and A nal y z ing th e Communic ation

2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

IU W

N E v 1 . 0 8

46

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

S etup

The table describes how to set up lab config urations with eq uipment for this lab.
D ev i c e Cl a ss P C Cl a ss P C Cl a ss P C R e m o te la p to p R e m o te la p to p R e m o te la p to p Conf i g u r a ti on F i l e to Insta l l V P N c lie n t P CF f i l e t o a c c e ss th e r e m o te la b R e m o t e d e sk t o p u t ilit y R e m o t e a c c e ss Ai r p c a p U S B d o n g le a n d p ro g ra m Wi r e sh a r k Conf i g u r a ti on Instr u c ti ons Th e Ci sc o V P N c l i e n t sh o u l d b e a v a i l a b l e o n t h e c l a ss P C d e sk t o p s. Th e P CF f i l e t o a c c e ss t h e r e m o t e l a b sh o u l d b e a v a i l a b l e o n t h e Cl a ss P Cs d e sk t o p . Th e Wi n d o w s d e sk t o p c l i e n t u t i l i t y sh o u l d b e a v a i l a b l e o n t h e c l a ss P C. R e m o t e a c c e ss v i a R DP sh o u l d b e a l l o w e d o n t h e r e m o t e l a p t o p s, a n d r e m o t e a c c e ss c r e d e n t i a l s c o n fig u r e d . Th e Ai r p c a p c a p t u r e U S B a d a p t e r a n d i t s d r i v e r s sh o u l d b e i n st a l l e d i n t h e r e m o t e l a p t o p . Wi r e sh a r k sh o u l d b e i n st a l l e d i n t h e r e m o t e l a p t o p .

I ns tr uc to r N o tes

In this lab, two laptops (that is two pods) work in a team to create a common WLAN, of ad hoc type, and use Wireshark to analyz e the communication. Pod 1 work s with Pod 2, Pod 3 with Pod 4, Pod 5 with Pod 6, and Pod 7 with Pod 8. A k ey element to this lab is that each Pod member of each team coordinates its action with the other pod, because a mistak e from one pod affects the lab of the partner pod. Tak e some time at the beg inning of the lab to describe the team concept and the different steps of the lab (such as mak ing sure that the channels are the same, config ured correctly and have the same SSID, and that they start the capture at the same time).

C o m m o n I s s ues

This subtopic presents common issues for this lab.

W i n do w s c l i en t : Windows k eeps the config ured SSIDs. If you run the class several times, the SSID to config ure appears in the list of Preferred network s. Althoug h we ask students to delete all Preferred network profiles, some students may ig nore the instruction and decide that the WLAN is already there. This may result in the ad hoc network failure if both sides are on passive state. Remove the profile and ask to recreate it to solve this issue. I P a ddr es s : Some students config ure a /24 mask , and see and ping all the other pods. This problem is not a maj or issue for the lab but can be distracting .

C h a n n el : Sometimes students sk ip the channel setting step, and cannot see the other pod SSID because they listen to the wrong channel. An invisible SSID can be a wrong SSID config uration or a channel issue.

D up l i c a t e I P a ddr es s : Some students config ure the first IP address (19 2.168.10.1) reg ardless of the pod they are in. This creates a duplicate IP address issue, where a typical symptom is the inability to ping properly. Mak e sure that each pod k nows which IP address is allocated to them.
20 0 8 C i s c o S y s t e m s , I n c . C o u r s e A d m in is t r a t io n G u id e 47

S t a t i c I P : Mak e sure that the static IP address is removed at the end of the lab because k eeping it will impact the nex t lab. W

i r es h a r k M A C a ddr es s es : Some students enter MAC addresses using O (the O letter) instead of 0 (z ero). Wireshark returns an error messag e. Remind them that a MAC address may contain a 0 (z ero), but no O (O letter).

48

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

L a b 2 -1: C o n f ig u rin g a C is c o 2 10 6 W L C
This topic details the lab activity for Lab 2-1.

Ob j ec tiv es

You will complete these task s in this lab:

Allow open authentication access throug h your WLAN Create a DHCP scope to support your local clients V erify the presence of your AP

Allow Telnet connections to your controller

Connect to your config ured controller using the web interface

Config ure a Cisco 2106 WLC using the CLI setup wiz ard

Vis ua l Ob j ec tiv e

The fig ure displays the lab topolog y that you will use to complete this lab.

V is ual O b j ec tiv e f or L ab 2-1: Conf ig ur ing a Cis c o 210 6 W L C

2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

IU W

N E v 1 . 0 9

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

49

S etup

The table describes how to set up lab config urations with eq uipment for this lab.
D ev i c e Ci sc o 2106 WLC Ci sc o 1252 AP Conf i g u r a ti on F i l e to Insta l l No n e No n e Conf i g u r a ti on Instr u c ti ons Th e Ci sc o 2106 c o n t r o l l e r sh o u l d b e i n t h e i n i t i a l w i z a r d st a t e , w i t h n o c o n f i g u r a t i o n . Th e Ci sc o 1252 AP sh o u l d b e i n a u t o n o m o u s m o d e .

I ns tr uc to r N o tes

This lab is straig htforward. It aims at config uring the Cisco 2106 WLC throug h the CLI wiz ard, and then creating some basic config uration parameters from the web interface. The Cisco 1252 AP is still in autonomous mode at this stag e, and cannot be found, so no WLAN is available for students to test and ex periment with.

C o m m o n I s s ues

This subtopic presents common issues for this lab.

C r eden t i a l i s s ues : In this lab, the Cisco 2106 administrator credentials are entered only once (the password is entered twice). Two types of classical issues occur:

C L I s et up i n i t i a l q ues t i o n : In Task 1, Step 7 , students are advised that when enabling the CLI session to their controller, the first q uestion needs to be System name. Some students may press Enter to test the CLI connection, thus providing a default answer to the first q uestion(s). Typing - (minus sig n) and Enter tak es the operator back one q uestion. Mak e sure that each pod has their controller name properly config ured, showing that the problem did not occur.

Some students incorrectly use the credentials g iven to connect to the remote lab throug h the V PN tunnel as controller access credentials, instead of using a dm i n X and c i s c o . They do not always remember to use the correct credentials. Try the V PN credentials if connection to the controller is not possible with adminX and cisco.

Some students mistype the administrator username and cannot connect to the controller when it reboots. If the history of the terminal you use for the class allows it, browse back to check what the entered value was. If you cannot g o back that far, reboot the controller, press Escape at boot time, and use Option 5 to delete the config uration and start ag ain. If you cannot reboot the controller remotely, an easy way around the problem is to add the controller to Cisco WCS. (It uses SNMP, not username and password, so the only needed parameter is the controller IP address.) You can then add the correct username and password pair to the controller from the Cisco WCS interface.

50

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

L a b 2 -2 : C o n f ig u rin g a n d M ig ra t in g a S t a n d a l o n e AP
This topic details the lab activity for Lab 2-2.

Ob j ec tiv es

You will complete these task s in this lab:

Mig rate your autonomous AP to LWAPP

Config ure your autonomous AP via its web interface

Check your autonomous AP parameters

Vis ua l Ob j ec tiv e

The fig ure displays the lab topolog y that you will use to complete this lab.

Visual Objective for Lab 2-2: C on fig urin g an d M ig ratin g a S tan d alon e A P

2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

IU W

N E v 1 . 0 1 0

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

51

S etup

The table describes how to set up lab config urations with eq uipment for this lab.
D ev i c e R e m o te la p to p R e m o te la p to p M a i n sw i t c h Conf i g u r a ti on F i l e to Insta l l IO S -t o -LWAP P fo ld e r Tf t p d No n e Conf i g u r a ti on Instr u c ti ons In t h e r e m o t e l a p t o p , t h e IO S -t o -LWAP P f o l d e r sh o u l d b e o n t h e d e sk t o p . Th e t f t p d a p p l i c a t i o n sh o u l d b e i n st a l l e d a n d r e a d y t o u se . O n t h e m a i n sw i t c h , m a k e su r e t o sh u t p o r t s t o 526 c o n t r o l l e r s o n a l l p o d s.

I ns tr uc to r N o tes

In this lab, students connect to the Cisco 1252 AP in autonomous mode, first from the CLI to check parameters and g ive a static IP address, then from the web interface to config ure the AP. Students mig rate the AP to LWAPP using the archived download CLI command. They then check and config ure the AP from the controller.

C o m m o n I s s ues

This subtopic presents common issues for this lab.

A P do es n t r es p o n d: When connecting to the console, some pods may not g et connectivity to their AP. Issuing s h ut / n o s h ut on the AP port on the switch to reboot the AP usually solves the issue. A P i n L W A P P m o de: If the AP has not been mig rated back to autonomous mode in the previous class, it is of course still in LWAPP mode. Students do not always differentiate the CLI prompts between autonomous and LWAPP mode. They may not realiz e the issue and think that they mistyped or misused the CLI. Be sure to check that the APs are in autonomous mode before the lab.

R em o t e l a p t o p j o i n s t h e W

A P c r eden t i a l s l o s t : If the AP has a remaining config uration from a previous class, Cisco and Cisco credentials may not be available. Try root/Public1! . In the first lab, a static IP address was used. If students did not remove it, the remote laptop wireless card is in the wrong subnet. It will j oin at Layer 2 but fail at Layer 3. L A N but c a n n o t a c c es s t h e n et w o r k :

A c c es s p o i n t do es n t j o i n t h e c o n t r o l l er : Sometimes the AP converted to LWAPP mode does not j oin the controller. Check these parameters: Use the AP console CLI to check that the AP was actually mig rated to LWAPP

If ports to Cisco 526 Mobility Controllers are not shut on the class main switch, wireless clients will receive an IP address from the Cisco 526 Mobility Controller. Mak e sure that ports to Cisco 526 Mobility Controllers are shut on the main switch before starting this lab.

52

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

Use the AP console CLI to check the AP IP address. It should be in the same subnet as the controller Manag ement/AP manag er. Use the s h o w i p i n t er f a c es br i ef command to verify. If the AP is in a wrong subnet, chang e the AP manag er interface to the AP subnet. The AP should j oin. Config ure the AP correct IP address, reboot it, and then chang e the AP manag er IP address back to the correct value. Use the debug l w a p p er r o r s en a bl e or debug l w a p p ev en t s en a bl e commands to check if the AP is in rang e of the controller. Students sometimes config ure the controller for their own country, which may be different from the country where the lab is. If the reg ulatory domain is different, the AP will not j oin. Chang e the controller to the correct reg ulatory domain.

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

53

L a b 2 -3: I n s t a l l in g a n d C o n f ig u rin g a C is c o M o b il it y E x p res s W irel es s C o n t ro l l er a n d AP


This topic details the lab activity for Lab 2-3.

Ob j ec tiv es

You will complete these task s in this lab:

Use the Cisco Config uration Assistant

Manag e your Cisco Mobility Ex press AP

Config ure your Cisco Mobility Ex press Wireless Controller

Vis ua l Ob j ec tiv e

The fig ure displays the lab topolog y that you will use to complete this lab.

Visual Objective for Lab 2-3 : I n stallin g an d C on fig urin g a C isco M obility E x p ress W ireless C on troller an d A P

2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

IU W

N E v 1 . 0 1 1

54

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

S etup

The table describes how to set up lab config urations with eq uipment for this lab.
D ev i c e R e m o te la p to p Cl a ss sw i t c h Conf i g u r a ti on F i l e to Insta l l CCA In i t i a l c o n f i g .t x t Conf i g u r a ti on Instr u c ti ons In t h e r e m o t e l a p t o p , Ci sc o Co n f i g u r a t i o n Assi st a n t sh o u l d b e i n st a l l e d . In t h e lo a d e d n o DH c re a te c l a ss sw i t c h , t h e i n i t i a l c o n f i g sh o ,w h e r e p o r tsfo r e a c h p o d a r e in CP se r v e r i s i n st a l l e d , a n d c r e d e d w ith lim ite d p r iv ile g e fo r e a c h p u ld b e a V LAN, n t ia ls w e r e o d .

Issu e a no sh u t c o m m a n d t o a l l p o r t s t o Ci sc o 521 AP s a n d Ci sc o 526 M o b i l i t y Co n t r o l l e r s.

I ns tr uc to r N o tes

In this lab, students config ure their Cisco 526 Mobility Controller using a CLI wiz ard. This section is very similar to the Cisco 2106 WLC config uration section in Lab 2-1. The Cisco 521 AP is already in LWAPP mode and should j oin the controller without mig ration. Nex t, students create a DHCP scope on the switch to support wireless clients and the AP, since the Cisco 526 Mobility Controller does not have an internal DHCP server.

Then, students use the Cisco Config uration Assistant to manag e the controller and create a WLAN.

C o m m o n I s s ues

This subtopic presents common issues for this lab.

C r eden t i a l i s s ues : In this lab, the Cisco 2106 WLC administrator credentials are entered only once (the password is entered twice). Two types of classical issues occur:

C L I w i z a r d m es s a ges : The Cisco 526 Mobility Controller sends status and debug messag es to the console by default. These messag es may disturb some students. Some pods may req uire you to help to complete the wiz ard and mak e sure that each req uired step was completed properly, without pressing Enter, which is the default value.

Some students incorrectly use the credentials g iven to connect to the remote lab throug h the V PN tunnel as controller access credentials, instead of a dm i n X and c i s c o . The do not always remember to use the correct credentials. Try the V PN credentials if connection to the controller is not possible with adminX and cisco.

Some students mistype the administrator username, and cannot connect to the controller when it reboots. If the history of the terminal you use for the class allows it, browse back to check what the entered value was. If you cannot g o back that far, reboot the controller, press Escape at boot time, and use Option 5 to delete the config uration and start ag ain. There is no Cisco WCS support for the Cisco 526 Mobility Controller, so support local to the lab is needed to reboot if the first method failed.

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

55

C i s c o C o n f i gur a t i o n A s s i s t a n t : If the community created with the Cisco Config uration Assistant is not removed from one class to the other, its creation g enerates an error messag e. Check that no community remains in the Cisco Config uration Assistant from the previous class before this lab.

D H C P s c o p e: Students unfamiliar with DHCP scopes on Cisco IOS software-based devices sometimes mistype the ex cluded address list, and end up allocating IP addresses already used by their controller. This mistak e results in an unstable connection to the controller web interface and the AP or both, and the AP does not j oin the controller. Check the switch console for this k ind of mistak e.

56

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

L a b 3-1: I n s t a l l in g a n d U s in g t h e C is c o ADU
This topic details the lab activity for Lab 3-1.

Ob j ec tiv es

You will complete these task s in this lab: Install the Cisco ADU Use the Cisco ADU and implement the Cisco Site Survey Utility

Vis ua l Ob j ec tiv e

The fig ure displays the lab topolog y that you will use to complete this lab.

V is ual O b j ec tiv e f or L ab 3 -1: I ns tal l ing and U s ing th e Cis c o A D U

2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

IU W

N E v 1 . 0 1 2

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

57

S etup

The table describes how to set up lab config urations with eq uipment for this lab.
D ev i c e R e m o te la p to p Conf i g u r a ti on F i l e to Insta l l Ci sc o ADU i n st a l l file Conf i g u r a ti on Instr u c ti ons Th e Ci sc o ADU i n st a l l f i l e sh o u l d b e o n t h e d e sk t o p o f t h e r e m o t e l a p t o p . Th e Ci sc o WLAN a d a p t e r P CM CIA c a r d sh o u l d b e i n se r t e d i n t h e P CM CIA sl o t .

I ns tr uc to r N o tes

In this lab, students will install the Cisco Aironet Desk top Utility (ADU) along with the Cisco Site Survey Utility. They will then learn to use the tools throug h a few basic discovery and config uration seq uences.

C o m m o n I s s ues

This subtopic presents common issues for this lab.

A l r ea dy i n s t a l l ed A D U : If the lab has not been cleared properly between classes, the Cisco ADU is already installed and double-click ing the installation file does not provide the install option. Choose to uninstall, and then reboot the remote laptop. The RDP connection to the remote laptop is temporarily lost. Ig nore the windows messag e about new hardware found and start the lab from its beg inning . I n t er n a l a da p t er v er s us C i s c o W L A N a da p t er : In this lab and in the nex t ones, students are ask ed to disable the card they do not use for the lab and only enable the card needed. At the end of the lab, both cards are disabled. This method avoids confusion between cards. Some students still g et confused and try to manag e the internal card with the Cisco ADU or the Cisco card with Windows WZC. It may be useful to remind the class about which utility manag es which device before starting this lab. W i r es h a r k f i l t er : Students are ask ed to use a filter in Wireshark to only capture traffic coming from their Cisco WLAN adapter. They use the et h er h o s t x x .x x .x x .x x command. An error in the ether host section may result in the filter not being understood by Wireshark , and therefore no filter being added, thus creating a larg e amount of pack ets in the capture window. An error in the card MAC address results in no frames being captured at all. Check the Wireshark filter if any of these events occur.

58

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

L a b 3-2 : E x p erien c in g C o n n ec t io n s a n d Ro a m in g
This topic details the lab activity for Lab 3-2.

Ob j ec tiv es

You will complete these task s in this lab: Connect to a specific AP

Create a WLAN common to two g roups

Force roaming from one AP to the other

Vis ua l Ob j ec tiv e

The fig ure displays the lab topolog y that you will use to complete this lab.

Visual Objective for Lab 3 -2: E x p erim en tin g w ith C on n ection s an d R oam in g

2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

IU W

N E v 1 . 0 1 3

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

59

S etup

There is no specific req uired setup preparation for this lab. It is built on the resulting config uration of the previous lab.

I ns tr uc to r N o tes

In this lab, two pods work in teams to ex perience roaming . Pod 1 work s with Pod 2, Pod 3 with Pod 4, Pod 5 with Pod 6, and Pod 7 with Pod 8. Pods start by creating a common WLAN and mobility g roup. Then one AP is disabled, so that only one AP remains available for both pods. Pods then associate to the common SSID using this sing le AP. They use a continuous ping to follow the connection status. The second AP is then switched back to on. Because the connection to the first AP should have a q uality level g ood enoug h for a connection, the pods laptops do not roam and stay connected to the first AP. This first AP is then disabled. Disabling disconnects the clients. The clients have no choice but to scan, detect the second AP offering the same SSID, and associate to it. Students follow this process throug h the ping status. Tak e some time to ex plain the g oal of this lab so that students do not g et lost in the different steps and so that they k eep a g lobal perspective on what is to be seen and achieved.

C o m m o n I s s ues

This subtopic presents common issues for this lab.

C o n n ec t i v i t y : If the mobility g roup is the same but controllers do not k now each other because of a config uration mistak e (wrong peer IP address or burnt-in MAC address), roaming fails. A step is here to ensure that students test connectivity to the peer before moving on to the roaming step. Some students sk ip the step and also misconfig ure the peer coordinates. Check peer connectivity if roaming fails.

C a s e s en s i t i v e: SSIDs and Mobility g roup names should be entered ex actly as they appear in the lab g uide. Some students do not use capitals and cannot see their peer g roup SSID. Check the SSID name.

M o bi l i t y gr o up s : A k ey point to this lab is that both controllers k now each other so that roaming is possible. If mobility g roups are different, roaming may be possible althoug h may also req uire a new association process. Roaming should be transparent because authentication is simplified, but may imply an additional delay in the roaming time. Mak e sure that the mobility g roup is the same on both controllers.

60

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

L a b 4-1: 8 0 2 . 1Q
Ob j ec tiv es

This topic details the lab activity for Lab 4-1.

a n d W eb Au t h en t ic a t io n

You will complete these task s in this lab:

Create a V LAN interface on the controller Create a trunk port on a switch Create a Web Authentication WLAN

Connect to the WLAN

Ex periment with ex clusion policies

Vis ua l Ob j ec tiv e

The fig ure displays the lab topolog y that you will use to complete this lab.

V is ual O b j ec tiv e f or L ab 4 -1: 8 0 2. 1Q W eb A uth entic ation

and

2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

IU W

N E v 1 . 0 1 4

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

61

S etup

The table describes how to set up lab config urations with eq uipment for this lab.
D ev i c e DNS se r v e r Conf i g u r a ti on F i l e to Insta l l No n e Conf i g u r a ti on Instr u c ti ons Cr e a t e a h o st e n t r y i n t h e DNS se r v e r f o r t h e t e st .e x a m p l e .c o m h o st , p o i n t i n g t o t h e IP a d d r e ss 9 0.9 0.9 0.253.

I ns tr uc to r N o tes

In this lab, students work with web authentication, V LANs, and web authentication ex clusion policies.

They create a dynamic interface on the Cisco 526 Mobility Controller, and a web authentication WLAN with traffic sent to the new dynamic interface. Until now, all traffic was sent to the manag ement interface, which was untag g ed. The controller port on the switch was until now in the same V LAN as the remote laptop and the Cisco 521 AP. Because there is a new interface with a different V LAN tag , the port cannot be an access port anymore and communication to the switch using the new interface fails. Students are then ask ed to connect to the switch and turn the port to the controller to trunk mode, to allow the V LAN tag to be received and understood on the switch side. This process is ex plained in the lab, but you may want to spend some time summariz ing access versus trunk port issues before beg inning this lab. Students then create a Local Net User, associated to the web authentication WLAN, and ex periment with ex clusion policies by entering the wrong password several times.

C o m m o n I s s ues

This subtopic presents common issues for this lab.

W eb W L A N n o t a v a i l a bl e: After creating a Web Authentication WLAN, rebooting the controller is req uired. Some students may want to ig nore this step. The result is that web authentication is not possible. Mak e sure that the controller was rebooted if association to the web authentication WLAN is impossible.

S w i t c h i s s ues : If the students do not follow the steps carefully, their AP may be disconnected when they turn the switch port to trunk mode, and may associate to another controller. They may not realiz e it or j ust mention that their wireless client cannot detect or associate to the Web Authentication WLAN. Check the switch port to the controller config uration, and reboot the AP to solve this issue.

D N S i s s ues : In the Web authentication process, the first step is to associate to the WLAN, which is usually not an issue. The second step is to enter a URL, in this lab test.ex ample.com, in the browser address bar. The client connection is then redirected to the controller for authentication purposes. If you use a remote lab, the remote laptop has at least two connections to the network : the wired interface used to access the remote desk top and the wireless interface. For this lab to succeed and the redirection to work , it is crucial that the DNS req uest g oes via the wireless interface, that is via the controller, seen throug h its virtual g ateway IP address, 1.1.1.1. If a DNS server is config ured in the wired interface parameters, Windows will always prefer the Ethernet interface because it is faster than the wireless interface. The result is that 1.1.1.1 remains unreachable and the no authentication
N E ) v 1 .0 20 0 8 C i s c o S y s t e m s , I n c .

62

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N o l o gi n p a ge, a c c es s gr a n t ed t o t h e n et w o r k : When the authentication succeeds, access is g ranted to the network and a popup window appears for log out purposes. Some students close this window and try to re-access the authentication pag e to work on the ex clusion policies part. They cannot access the log in pag e anymore, and still can ping the 9 0.9 0.9 0.253 g ateway or the controller virtual g ateway. Open a browser to https://1.1.1.1/log out.html. The pag e should appear. Click log out to close the previous session, and ex plain that closing the window does not close the session before the session times out.

E x c l us i o n p o l i c i es : The ex clusion policies are tested by entering the correct username, but a wrong password a certain number of times. Some students do not understand the process very well and believe that the wrong password is the same as wrong credentials. They enter a random username and random password for each attempt and are not ex cluded. Ex plain that the username has to be the same each time, and the password wrong , for consistency in the client identity to occur.

pag e appears. Mak e sure that no DNS server is config ured for the wired interface, and that a static route is set to hit 1.1.1.1 via the wireless interface (otherwise, here ag ain, even if the DNS is reached via the wireless interface, redirection to 1.1.1.1 is sent to the Ethernet interface because it is faster than the wireless interface and also has a default route to any destination). A note is written about this issue in the lab g uide itself. You may want to ex plain it to the class to mak e sure that advanced students dont decide to disable the Ethernet interface to avoid the issue: all connection to the remote laptop would be lost.

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

63

L a b 4-2 : C o n f ig u rin g E AP -F AS T Au t h en t ic a t io n wit h W P A


This topic details the lab activity for Lab 4-2.

Ob j ec tiv es

You will complete these task s in this lab:

Config ure the Cisco ADU to associate to this WLAN

Create and config ure a local EAP based EAP-FAST WLAN

Vis ua l Ob j ec tiv e

The fig ure displays the lab topolog y that you will use to complete this lab.

V is ual O b j ec tiv e f or L ab 4 -2: Conf ig ur ing EA P-F A S T A uth entic ation w ith W PA

2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

IU W

N E v 1 . 0 1 5

64

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

S etup

There is no specific req uired setup preparation for this lab. It is built on the resulting config uration of the previous lab.

I ns tr uc to r N o tes

Please read the important issue about remote laptop hang ing .

In this lab, students will config ure a WLAN for EAP-FAST authentication and WPA (TKIP) encryption. Because the Cisco 2106 WLC supports local EAP, they will also config ure the controller to authenticate the users locally. This lab usually g enerates q uestions from students who dont have any prior wireless or security ex perience. You may want to spend some time at the end of the lab summariz ing the difference between authentication and encryption, local EAP, and RADIUS-based authentication.

C o m m o n I s s ues

This subtopic presents common issues for this lab.

R em o t e l a p t o p h a n gs : For undetermined reasons, it may happen that the remote laptop hang s during the EAP-FAST authentication phase. This problem usually happens when students g et disconnected from the remote desk top session before the PAC has been provisioned to the remote laptop via a second confirmation prompt that remains pending indefinitely. This problem usually does not happen if students do not g et disconnected from the remote wireless laptop remote desk top session before the PAC is provisioned and the authentication successful. Once the remote laptop hang s, remote access becomes impossible and only a local (local to the remote lab) manual reboot is possible. There is no direct k nown solution for this issue. To avoid it, follow these steps: Mak e sure students k eep their connection to the remote laptop, without closing the remote desk top session, throug hout all the EAP-FAST first failed authentication, then PAC provisioning , and then successful authentication phases.

E A P F A S T a ut h en t i c a t i o n f a i l s : Some students do not follow carefully the steps req uired for config uring local EAP. The result is that EAP authentication fails. The source can be at any stag e of the config uration process. The easiest way to troubleshoot this issue is to g o throug h each step, one at a time, with the failing pod, to identify which parameter was misconfig ured. The use of the debug a a a series of commands is another possible way to help students with this issue. The display of such commands is usually too complex for beg inner students to interpret the results by themselves.

C i s c o c a r d l ef t a c t i v e: Mak e sure that students do disable the Cisco card at the end of this lab. If the card is left to active state, RDP connection in later labs is sometimes impacted and the connection hang s.

This issue may or may not occur depending on the ex act hardware specification and software profile of your remote lab. If it occurs too often, you mig ht want to replace this lab with a more basic WPA/PSK config uration.

If this issue happens, once the remote laptop has been rebooted, mak e sure to complete the authentication phase before closing the remote desk top session. Preferably, the lab should be completed and the Cisco ADU disabled at that point.

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

65

L a b 5-1: C o n f ig u rin g C o n t ro l l ers a n d AP s f ro m t h e C is c o W C S


This topic details the lab activity for Lab 5-1.

Ob j ec tiv es

You will complete these task s in this lab:

Manag e controller and AP from the Cisco WCS

Add controller and AP to the Cisco WCS

Create credentials on the Cisco WCS and personaliz e the interface

Vis ua l Ob j ec tiv e

The fig ure displays the lab topolog y that you will use to complete this lab.

Visual Objective for Lab 5 -1 : C on fig urin g C on trollers an d A P s from th e C isco W C S I n terface

2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

IU W

N E v 1 . 0 1 6

66

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

S etup

The table describes how to set up lab config urations with eq uipment for this lab.
D ev i c e R e m o t e l a b se r v e r Conf i g u r a ti on F i l e to Insta l l No n e Conf i g u r a ti on Instr u c ti ons Ci sc o WCS sh a n d l i c e n se u p u se d f o r t h e f i r r e m a in in g ite m o u l d b e i n st a l l e d i n t h e c l a ss se r v e r l o a d e d . Th e Ci sc o WCS se r v e r , st t i m e h e r e , sh o u l d n o t h a v e a n y f r o m a p r e v i o u s c l a ss.

I ns tr uc to r N o tes

In this lab, students connect to the Cisco WCS server. They first create their own account, and personaliz e the home pag e for their user.

They then add their Cisco 2106 WLC, and chang e some config uration parameters from the Cisco WCS interface to understand how controllers and APs can be manag ed from the Cisco WCS interface.

C o m m o n I s s ues

C o n n ec t i o n i s s ues : Some students assume that, because this lab is about Cisco WCS, it should be performed from the remote laptop RDP interface. Ex plain that manag ing the network does not imply wireless connection. With RDP, only one connection is possible from each pod, using direct web connection to Cisco WCS from the class PCs allows all students to connect at the same time.

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

67

L a b 5-2 : W o rk in g wit h M a p s
Ob j ec tiv es
You will complete these task s in this lab: Enhance the map by adding walls Add maps to the Cisco WCS

This topic details the lab activity for Lab 5-2.

Position an AP on the map and manag e it

Vis ua l Ob j ec tiv e

The fig ure displays the lab topolog y that you will use to complete this lab.

Visual Objective for Lab 5 -2: W ork in g w ith M ap s

2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

IU W

N E v 1 . 0 1 7

68

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

S etup

The table describes how to set up lab config urations with eq uipment for this lab.
D ev i c e Cl a ss P C Conf i g u r a ti on F i l e to Insta l l No n e Conf i g u r a ti on Instr u c ti ons Ci sc o WCS m a p s (c a m p u s a n d f l o o r ) sh o u l d b e a v a i l a b l e o n t h e c l a ss P C d e sk t o p a t t h e b e g i n n i n g o f th isla b .

I ns tr uc to r N o tes C o m m o n I s s ues

In this lab, students add campus and floor maps to the Cisco WCS. They then use Map Editor to scale the floor map and create obstacles. They then position their AP on the map.

This subtopic presents common issues for this lab.

M a p edi t o r : Many students discover the Map Editor eng ine, and sometimes fail to clearly understand how to use it, and why some icons in the menu appear or disappear. Some students also do not clearly understand how many walls should be drawn, especially because their lab g uide is printed in black and white and obstacle colors are not seen. You may want to spend a few minutes before the lab showing on the screen how to use Map Editor and draw walls. You may also want to bring the .doc copy of the lab g uide to the screen to show the walls, and ex plain that the more walls will be drawn, the more accurate the heat map will be.

M a p s di m en s i o n i s s ues : Building s should be created from the campus map, and the floor map should be created from the building map. Some students do not click the campus map before creating the building , or do not click the building map before creating the floor map. This failure results in issues such as map scale problems and error messag es. V erify that the map creation was properly layered: building in campus and floor in building . The first occurrence of this issue may appear in Task 2 of this lab.

C o n n ec t i o n i s s ues : Some students assume that because this lab is about adding APs, it should be performed from the remote laptop RDP interface. There are no maps in the remote laptop and they g et confused. Ex plain that manag ing the network does not imply wireless connection.

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

69

L a b 5-3: M o n it o rin g t h e N et wo rk a n d C o n t a in in g Devic es


This topic details the lab activity for Lab 5-3.

Ob j ec tiv es

You will complete these task s in this lab:

Use the Cisco WCS to contain a rog ue.

Use the Cisco WCS to located devices

Use the Cisco WCS to monitor events

Vis ua l Ob j ec tiv e

The fig ure displays the lab topolog y that you will use to complete this lab.

Visual Objective for Lab 5 -3 : M on itorin g th e N etw ork an d C on tain in g D evices

2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

IU W

N E v 1 . 0 1 8

70

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

S etup

There is no specific req uired setup preparation for this lab. It is built on the resulting config uration of the previous lab.

I ns tr uc to r N o tes

In this lab, students use the Monitor menu to check for the presence of rog ue APs. They then associate to one of the previously created WLANs and locate their device on the map. Location work s, but is not accurate because they have only one locating AP. Location is then improved when all class APs are on the same map. Students then try to contain their AP, seen as rog ue, and observe the effect of the containment on their client connection.

C o m m o n I s s ues

This subtopic presents common issues for this lab.

N o r o gue: Each pod AP is seen as unk nown by the other pods and reported as such to the Cisco WCS. If the class is run with only two pods, because they are in the same mobility g roup for the roaming lab, none of the classs APs is reported as rog ue. Config ure two different mobility g roups and remove each controller from the other Mobility g roup list. Rog ues should appear after a few minutes. W r o n g r o gue: Some students are tempted to randomly contain detected APs to duplicate the lab process on other APs. Tak e some time to ex plain, before the lab, that containment has leg al issues, and that it is important that students not tak e the risk of containing valid clients of WLANs that would be in rang e of the remote lab. Students should only contain their own AP to see the effect of containment on their own connection.

S el f -c o n t a i n m en t : The fact that students contain their own APs is sometimes confusing if not ex plained. Tak e some time to ex plain, before or after the lab, that the containment process uses one or several APs to contain another AP. They cannot use an AP to contain itself, as they precisely try to contain their AP. In this lab, each student has ex tensive administrative rig hts on the Cisco WCS and the network controllers. Containing their own AP actually implies using another g roup AP for this purpose. The AP is not containing itself.

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

71

L a b 6-1: B a c k in g U p t h e C o n t ro l l er C o n f ig u ra t io n a n d t h e C is c o W C S Da t a b a s e F il es
This topic details the lab activity for Lab 6-1.

Ob j ec tiv es

You will complete these task s in this lab:

Use a TFTP server to save your controller config uration files and manipulate them.

Use the command line to save your controller config uration files and manipulate them

Vis ua l Ob j ec tiv e

The fig ure displays the lab topolog y that you will use to complete this lab.

V is ual O b j ec tiv e f or L ab 6 -1: B ac k ing U p th e Contr ol l er Conf ig ur ation and th e Cis c o W CS D atab as e F il es

2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

IU W

N E v 1 . 0 1 9

72

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

S etup

The table describes how to set up lab config urations with eq uipment for this lab.
D ev i c e R e m o te la p to p Conf i g u r a ti on F i l e to Insta l l Co o k t o p Conf i g u r a ti on Instr u c ti ons Th e Co o k t o p X M L e d i t o r sh o u l d b e i n st a l l e d a n d a v a i l a b l e o n t h e r e m o t e l a p t o p d e sk t o p .

I ns tr uc to r N o tes

In this lab, students will use the command line to ex amine their controller config uration files. They will then capture part of the command-based config uration file and will edit it in Notepad. They will then reinj ect the modified section into their controller via the command line.

They will the use a TFTP server to upload the config uration file to their remote laptop, where they will observe the file structure using an X ML editor.

C o m m o n I s s ues

This subtopic presents common issues for this lab.

C o n t r o l l er c o n f i gur a t i o n di s a p p ea r s : The lab is desig ned to avoid student mistak es where some critical parts of the config uration file are altered.

During the Notepad edition part, some students may be tempted to modify more than the virtual g ateway IP address. Ex plain that some items cannot be chang ed blindly. Chang ing some items such as Administrator password will g enerate an error. During the Cook top phase, students are ask ed not to chang e any config uration parameter, but j ust to ex amine the config uration file structure and content. Some students are tempted to try to modify some items before reinj ecting the file back to the controller via TFTP. Each section of the file has a specific check sum. Chang ing a value without recalculating the check sum results in a check sum error when the controller reboots and the config uration file is ig nored, leading to the initial wiz ard. The only solution at that point is to reconfig ure the controller via the wiz ard. Because this lab tak es place toward the end of the class, most of the items created in the previous labs are not needed anymore, so a basic reconfig uration is enoug h.

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

73

L a b 6-2 : T ro u b l es h o o t in g G a m es
This topic details the lab activity for Lab 6-2.

Ob j ec tiv es

You will complete these task s in this lab:

Troubleshoot your controller for issues related to client access.

Troubleshoot your controller for issues related to the APs

Troubleshoot your controller for issues related to the controller itself

Vis ua l Ob j ec tiv e

The fig ure displays the lab topolog y that you will use to complete this lab.

Visual Objective for Lab 6 -2: T roublesh ootin g

2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

IU W

N E v 1 . 0 2 0

74

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

S etup

The table describes how to set up lab config urations with eq uipment for this lab.
D ev i c e Wi r e l e ss r e l a t e d i t e m Conf i g u r a ti on F i l e to Insta l l No n e Conf i g u r a ti on Instr u c ti ons Th c o p a d a tro c la e i n st r u c t o r c h n t r o l l e r , AP , o r ra m e te r o n th e n g e r o u s to le t u b l e sh o o t i n g o ss t o t h e l a b . a n g c lie c la st u d n th e sa p a ra n t . Do n o ss sw i t c h e n tse x p e d e v ic e m e te r o n t c h a n g e b e c a u se e r im e n t th a t c o n n a a n y it is e c tsth e

I ns tr uc to r N o tes

This lab is a troubleshooting lab where you, as an instructor, are ex pected to introduce misconfig uration items into the learners controllers and have them find the issues. Do encourag e them to use the debug LWAPP errors enable and debug LWAPP event enable for any issue related to APs, and the client troubleshooting tool on Cisco WCS for any issue related to clients.

Here are a few ideas of issues that you could create. This is an open list; you do not need to run all the issues. You should use the most relevant scenarios depending on your class level and the available time. Do not hesitate to add your own misconfig uration ideas. Always mak e sure that the problems can be found by the students using the tools they k now. This lab is to encourag e them and show them that mistak es can be found, not to g ive the impression that some mistak es are so trick y that only a computer g uru would find the issue. Keep in mind that the main point of this lab is to apply a method. Remind students that they should be sure of what caused the issue before chang ing any config uration item. If chang ing the config uration item does not solve the problem, remind students to revert the values back to what they were before moving on to another parameter. Chang e the country code on the controller, and reboot the AP. The AP wont connect anymore, and debug LWAPP errors enable will show the country mismatch.

V ariant to the previous: While having the interface to up, use WLAN override to disable the relevant SSID. Not detecting the SSID will direct the learner to the controller config uration. Ex amining the controller config uration will show the problem.

Shut the radio on the AP config uration pag e, and ask the students to associate to the relevant SSID. Not detecting the SSID will direct the learner to the controller config uration. Ex amining the controller config uration will show the problem.

Chang e the controller system time to 2000. Reboot the AP. The AP wont be accepted because its certificate would be emitted in the future from the controller standpoint. This is a difficult bug ; debug LWAPP error enable only shows a certificate error. Use this issue only with fast-paced or advanced learners. Tag the AP manag er interface and manag ement interface with an unsupported tag on the trunk . Reboot the AP. Debug LWAPP events enable will show unsupported V LAN tag . Beware, the controller web interface will become inaccessible as soon as the manag ement interface Tag is chang ed; debug g ing can be done only from the Terminal Server serial connection.

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

75

Disable HTTPS access to the controller and allow HTTP. Learners will usually try to solve an IP addressing issue before realiz ing the problem. Show interfaces summary on the CLI should show that nothing is wrong with the IP addressing and V LAN assig nment. Point to a wrong DHCP server in one of the WLANs. Ask learners to connect. The Cisco WCS client troubleshooting tool should direct them towards the IP addressing issue.

Chang e the administrative username and password on the controller, and ask learners to solve the issue. Manag ing the controller from Cisco WCS should allow learners to spot the issue and re-send the correct values.

V ariant of the previous scenario: Create a wrong interface on the controller (for ex ample, V LAN 120), send the Web Auth WLAN to this interface, and ask learners to ping the 9 0.9 0.9 0.253 IP address after successful connection. The Cisco WCS client debug g ing tool or c l i en t di r ec t i c o n f i g command will show the issue.

Create a wrong DHCP scope for the Web authentication WLAN, and ask learners to ping the 9 0.9 0.9 0.253 IP address after successful connection. Cisco WCS client debug g ing tool or client direct iconfig command will show the issue.

C o m m o n I s s ues

This subtopic presents common issues for this lab.

O v er -t r o ubl es h o o t i n g: The aim of this lab is not to find the issue as fast as possible, but to apply systematic methodolog y to determine the orig in of the issue, and then (and only then) fix it. Some students use a g uess approach and try to chang e parameters without being sure that they are the rig ht ones to alter in order to solve the problem. This can render a controller unusable and definitely brok en. The only way back is to undo the chang es they tried or troubleshoot the issues they added.

76

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

L a b 6-3: Op t io n a l L a b (T ro u b l es h o o t in g wit h W ires h a rk a n d C o n vert in g a n AP t o Au t o n o m o u s M o d e)


This topic details the lab activity for Lab 6-3.

Ob j ec tiv es

You will complete these task s in this lab:

Convert an LWAPP AP to standalone mode.

Use Wireshark to troubleshoot a connection

Vis ua l Ob j ec tiv e

The fig ure displays the lab topolog y that you will use to complete this lab.

V is ual O b j ec tiv e f or L ab 6 -3 : O ptional L ab

2 0 0 8 C is c o S y s te m s , In c . A ll r ig h ts r e s e r v e d .

IU W

N E v 1 . 0 2 1

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

77

S etup

There is no specific req uired setup preparation for this lab. It is built on the resulting config uration of Lab 6-1.

I ns tr uc to r N o tes

This lab is a troubleshooting lab where you, as an instructor, are ex pected to introduce misconfig uration items into the learners controllers and have them find the issues using the OmniPeek software. You need some time to prepare the lab. Start by setting all the Cisco 521 APs to Channel 1, with max imum transmit power from the learners Cisco 526 WLCs. This setup will create a lot of interferences. Then config ure the V LAN9 0 interface to point to a dummy address for its DHCP server, for ex ample the controller interface itself. Then ask students to connect to the Webauth WLAN with the Cisco adapter while sniffing with OmniPeek and to fig ure out what is wrong by look ing at the capture.

C o m m o n I s s ues

This subtopic presents common issues for this lab.

N o i n t er f er en c e: Learners often do not find the interference issue, and they assume that the situation is normal. Remind them that there should not be any lost frames in the capture.

W eb a ut h f o r go t t en : Learners often forg et to authenticate on the Web auth because they stare at the OmniPeek window, and assume that something there is why DHCP has failed. Remind them of this order: Layer 2 authentication and association, DHCP, and then web authentication.

78

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

C o n f ig u ra t io n F il es S u m m a ry
Conf i g u r a ti on F i l ena m e In d e x .h t m M a i n sw i t c h .t x t

This topic details the course config uration files, which provide information about the starting condition of each lab.
Com m ents Th i s f i l e i s a sa m p l e h t m l f i l e t o b e p u t o n t h e m a i n c l a ss se r v e r (10.100.1.1) w e b se r v e r . Th i s f i l e i s t h e i n i t i a l c o n f i g u r a t i o n f i l e f o r t h e m a i n sw i t c h .

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

79

L a b Ac t ivit y S o l u t io n s

This section presents the solutions to the practice activities.

L a b 1 -1 A ns w er K ey : P o w er C o nv er s io ns
Ta sk 1

When you complete this activity, you will g et results similar to the ones displayed here.
13 dB m 16 dB m 3 3 dB m 2 0 0 m W 0 .0 5 m W 0 .0 0 2 5 m W dB i = dB d + 2 .14 , an d dB d = dB i - 2 .14 . 7 .2 4 dB i = 7 .2 4 - 2 .14 = 5 .1 dB i 11.4 4 dB i dB i = dB d + 2 .14 , an d dB d = dB i - 2 .14 . 13 .5 6 dB d = 13 .5 6 + 2 .14 = 15 .7 dB d 2 1 dB i 18 .8 6 dB d 2 .14 dB i = 0 dB d. 3 .2 8 dB d = 5 .4 2 dB i . 3 .2 8 dB d i s f ar m or e pow e r f u l t h an 2 .14 dB i . T h e di f f e r e n ce i s 3 .2 8 dB ( dB i or dB d), m or e t h an t w i ce t h e pow e r . 3 .4 1 dB i = as a r e f e r e b e e n 4 .18 di f f e r e n ce 2 .5 5 n ce , w dB d, ( dB i dB d. dB m can h e r e as dB d an t h e com par i s on or dB d), al m os n ot b e con v e r t e d dB i com par e w ou l d h av e b e t t w i ce t h e pow d t o dB i or dB d. dB m e x pr e s s e s a pow e r w i t h t h e m i l l i w at t pow e r s w i t h an t e n n a r e f e r e n ce s . I f t h e s e con d v al u e h ad e n pos s i b l e : 4 .18 dB d = 6 .3 2 dB i , w h i ch i s a 2 .9 1 dB e r.

Q1) Q2 ) Q3 ) Q4 ) Q5 ) Q6 ) Q7 ) Q8 ) Q9 ) Q10 ) Q11) Q12 ) Q13 )

Ta sk 2

Q1) Q2 ) Q3 ) Q4 ) Q5 ) Q6 ) Q7 ) Q8 )

A 2 1-dB i di s h an t e n n a w ou l d b e b e s t . A n 8 .1-dB i pat ch an t e n n a w ou l d b e b e s t . A 5 .2 -dB i om n i di r e ct i on al an t e n n a w ou l d b e b e s t . E I R P = T x ( dB m ) cab l e l os s + an t e n n a g ai n . 4 0 m W E I R P = 16 3 + 13 .5 = 2 6 .5 dB m . 2 0 m W i s 13 dB m . 2 0 f e e t of cab l e i n cu r s a 1 dB l os s . E I R P = 13 1 + 5 .2 = 17 .2 dB m . 10 0 m W i s 2 0 dB m . E I R P = 2 0 + 8 .5 = 2 8 .5 dB m . E I R P = T x ( dB m ) cab l e l os s + an t e n n a g ai n . H e r e : 2 0 = T x 3 + 3 . T x s h ou l d b e 2 0 dB m , or 10 0 m W . E I R P = T x ( dB m ) cab l e l os s + an t e n n a g ai n . H e r e : 17 = T x 9 -0 .5 + 13 .5 . T x s h ou l d b e 13 dB m or 2 0 m W . i s 16 dB m .

80

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

Q9 )

E I R P = T x ( dB m ) cab l e l os s + an t e n n a g ai n . 4 0 m W i s 16 dB m . H e r e : 17 = 16 - cab l e l os s + 5 .2 . C ab l e l os s s h ou l d b e 4 .2 dB . 2 .8 dB pe r 10 0 f e e t i m pl i e s t h e n e e d t o u s e 15 0 f e e t of cab l e .

Ta sk 3

S te p2 ) S te p3 ) S te p4 ) S te p6 ) S te p7 ) S te p8 ) S t e p 10 ) S t e p 11) S t e p 12 )

du al pat ch an t e n n a a l ar g e h al l or w ar e h ou s e a pi l l ar ( w i t h e ach pat ch on on e s i de ) D i r e ct i on al an t e n n a poi n t -t o-poi n t l on g r an g e l i n k a r oof t op om n i di r e ct i on al an t e n n a ope n s pace or m e e t i n g r oom ce i l i n g cov e r ag e

L a b 1 -2 A ns w er K ey : C r ea ting a n A d H o c ( I B S S ) N etw o r k a nd A na ly z ing th e C o m m unic a tio n


When you complete this activity, you will g et similar results to the ones displayed here:

Ta sk 4

Step 43: The most common frame is the beacon, which is sent 10 times per seconds. Step 44: You should see data pack ets such as the ping s. Step 45: The freq uency depends on the g roup. Step 46: 1 Mb/s. Step 47 : 100 ms. Step 48: 1, 2, 5.5 and 11 Mb/s. Step 49 : 802.11b. Step 50: IBSSID Step 51: Yes, the Intel 49 65AGN supports WMM. Step 52: Data frames are sent at the optimum speed from the sender perspective and ACKs are sent at the mandatory speed immediately below the speed used for the data frame.

L a b 2 -1 A ns w er K ey : C o nf ig ur ing a C is c o 2 1 0 6 W L C
Show running-c onfig 8 0 2 . 11a c a c v oic e tsp e c 8 0 2 . 11a c a c v id e o tsp e 8 0 2 . 11a c a c v oic e stre 8 0 2 . 11b c a c v oic e tsp e
20 0 8 C i s c o S y s t e m s , I n c .

When you complete this activity, you will g et a similar config uration to the one displayed here:
-ina c tiv ity -tim e c -ina c tiv ity -tim a m -siz e 8 4 0 0 0 m a c -ina c tiv ity -tim out ignore e out ignore x -stre a m s 2 e out ignore
C o u r s e A d m in is t r a t io n G u id e 81

8 0 2 . 11b c a c v id e o tsp e c -ina c tiv ity -tim e out ignore 8 0 2 . 11b c a c v oic e stre a m -siz e 8 4 0 0 0 m a x -stre a m s 2 a a a a uth m gm t l oc a l ra d ius l oc a tion rssi-ha l f-l ife ta gs 0 l oc a tion rssi-ha l f-l ife c l ie nt 0 l oc a tion rssi-ha l f-l ife rogue -a p s 0 l oc a tion e x p iry ta gs 5 l oc a tion e x p iry c l ie nt 5 l oc a tion e x p iry c a l ib ra ting-c l ie nt 5 l oc a tion e x p iry rogue -a p s 5 a p sy sl og host gl ob a l 2 5 5 . 2 5 5 . 2 5 5 . 2 5 5 d hc p c re a te -sc op e p od 1-1 d hc p a d d re ss-p ool p od 1-1 10 . 10 . 1. 2 1 10 . 10 . 1. 2 6 d hc p d e fa ul t-route r p od 1-1 10 . 10 . 1. 2 5 4 d hc p e na b l e p od 1-1 d hc p d ns-se rv e rs p od 1-1 10 . 10 0 . 1. 1 d hc p ne tb ios-na m e -se rv e r p od 1-1 10 . 10 0 . 1. 1 d hc p ne twork p od 1-1 10 . 10 . 1. 0 2 5 5 . 2 5 5 . 2 5 5 . 0 inte rfa c e a d d re ss a p -m a na ge r 10 . 10 . 1. 11 2 5 5 . 2 5 5 . 2 5 5 inte rfa c e a d d re ss m a na ge m e nt 10 . 10 . 1. 10 2 5 5 . 2 5 5 . 2 5 5 inte rfa c e a d d re ss v irtua l 1. 1. 1. 1 inte rfa c e d hc p a p -m a na ge r p rim a ry 10 . 10 . 1. 10 inte rfa c e d hc p m a na ge m e nt p rim a ry 10 . 10 . 1. 10 inte rfa c e p ort a p -m a na ge r 1 inte rfa c e p ort m a na ge m e nt 1 l oa d -b a l a nc ing wind ow 5 l ogging b uffe re d 6 l ogging sy sl og host 0 . 0 . 0 . 0 m e sh se c urity e a p m gm tuse r a d d a d m in1 * * * * re a d -write m ob il ity group d om a in P od 1 m ob il ity d sc p v a l ue for inte r-c ontrol l e r m ob il ity ne twork te l ne t e na b l e ne twork ota p -m od e d isa b l e ne twork rf-ne twork -na m e P od 1 ra d ius fa l l b a c k -te st m od e off ra d ius fa l l b a c k -te st use rna m e c isc o-p rob e ra d ius fa l l b a c k -te st inte rv a l 3 0 0 se ssions tim e out 0 snm p v e rsion v 2 c e na b l e snm p v e rsion v 3 e na b l e sy sna m e 2 10 6 -1 wl a n c re a te 1 I U W N E -1 I U W N E -1 wl a n ra d io 2 8 0 2 . 11a wl a n se ssion-tim e out 1 d isa b l e wl a n se ssion-tim e out 2 18 0 0 wl a n wm m a l l ow 1 wl a n wm m a l l ow 2 wl a n se c urity wp a d isa b l e 1 wl a n ra d ius_ se rv e r a c c t d isa b l e 2 wl a n se c urity sta tic -we p -k e y e nc ry p tion 1 10 4 < m od e wl a n se c urity sta tic -we p -k e y e nc ry p tion 2 10 4 < m od 1 wl a n se c urity wp a a k m ft re a ssoc ia tion-tim e 2 0 1 wl a n se c urity wp a a k m ft ov e r-the -a ir e na b l e 1 wl a n se c urity wp a a k m ft ov e r-the -d s e na b l e 1 wl a n se c urity wp a a k m ft re a ssoc ia tion-tim e 2 0 2 wl a n se c urity wp a a k m ft ov e r-the -a ir e na b l e 2 wl a n se c urity wp a a k m ft ov e r-the -d s e na b l e 2 wl a n se c urity wp a wp a 1 e na b l e 2 wl a n se c urity wp a wp a 1 c ip he rs tk ip e na b l e 2 wl a n se c urity wp a wp a 2 d isa b l e 2 wl a n e na b l e 2 e

. 0 . 0

10 . 10 . 1. 2 5 4 10 . 10 . 1. 2 5 4

p a c k e ts 0

unk nown> < p a sswd hid d e n> 1 unk nown> < p a sswd hid d e n>

82

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

L a b 2 -2 A ns w er K ey : C o nf ig ur ing a nd M ig r a ting a S ta nd a lo ne A P
( C isc o C ontrol l e r) > show a N um b e r of AP s. . . . . . . . . . . . . G l ob a l AP U se r N a m e . . . . . . . AP N a m e Sl ots P ort C ountry ------------------ --------- ---- ------12 5 2 -1 2 M od ul e 5 1 U S ( C isc o C ontrol l e r) > show a p sum . . . . . . . . . . AP M m a . . . . od ry . . . . . . . . . . . . . . . . 1 . . . . . . . . . . . . . . . . N ot C onfigure d e l E the rne t M AC

When you complete this activity, you will g et a similar config uration to the one displayed here:

L oc a tion ----------I U W N E

------------------AI R -L AP 12 5 2 AG -A-K 9 p c onfig ge ne ra l . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

----------------0 0 : 1d : 4 5 : 9 1: 3 7 : 10

12 5 2 -1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 12 5 2 -1 U S - U nite d 8 0 2 . 11b g: -AB U S - U nite d 8 0 2 . 11a : -A 1 0 0 : 1d : 4 5 : 9 1: 3 D H C P 10 . 10 . 1. 2 2 2 5 5 . 2 5 5 . 2 5 5 . 0 10 . 10 . 1. 2 5 4 D isa b l e d D isa b l e d I U W N E L a b none 2 6 0 1-1 N ot C onfigure d N ot C onfigure d N ot AD M I R E G I D isa L oc a G l ob D isa 5 . 0 . 12 . 4 3 . 0 . 18 0 E na b E na b D isa C onfigure d N _ E N AB L E D ST E R E D b l e d D isa b l e d , d . 0 . 0 0 L oc a l :

C isc o AP I d e ntifie r. . . . . . . . . . . . . . . . . . . . C isc o AP N a m e . . . . . . . . . . . . . . . . . . . . . . . . . . C ountry c od e . . . . . . . . . . . . . . . . . . . . . . . . . . . R e gul a tory D om a in a l l owe d b y C ountry . . . AP C ountry c od e . . . . . . . . . . . . . . . . . . . . . . . . AP R e gul a tory D om a in. . . . . . . . . . . . . . . . . . . Switc h P ort N um b e r . . . . . . . . . . . . . . . . . . . . M AC Ad d re ss. . . . . . . . . . . . . . . . . . . . . . . . . . . . I P Ad d re ss C onfigura tion. . . . . . . . . . . . . . . I P Ad d re ss. . . . . . . . . . . . . . . . . . . . . . . . . . . . . I P N e tM a sk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . G a te wa y I P Ad d r. . . . . . . . . . . . . . . . . . . . . . . . T e l ne t Sta te . . . . . . . . . . . . . . . . . . . . . . . . . . . Ssh Sta te . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C isc o AP L oc a tion. . . . . . . . . . . . . . . . . . . . . . C isc o AP G roup N a m e . . . . . . . . . . . . . . . . . . . . P rim a ry C isc o Switc h N a m e . . . . . . . . . . . . . . P rim a ry C isc o Switc h I P Ad d re ss. . . . . . . . Se c ond a ry C isc o Switc h N a m e . . . . . . . . . . . . Se c ond a ry C isc o Switc h I P Ad d re ss. . . . . . T e rtia ry C isc o Switc h N a m e . . . . . . . . . . . . . T e rtia ry C isc o Switc h I P Ad d re ss. . . . . . . Ad m inistra tiv e Sta te . . . . . . . . . . . . . . . . . . O p e ra tion Sta te . . . . . . . . . . . . . . . . . . . . . . . M irroring M od e . . . . . . . . . . . . . . . . . . . . . . . . AP M od e . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . P ub l ic Sa fe ty . . . . . . . . . . . . . . . . . . . . . . . . . D isa b l e d R e m ote AP D e b ug . . . . . . . . . . . . . . . . . . . . . . . S/ W V e rsion . . . . . . . . . . . . . . . . . . . . . . . . . . B oot V e rsion . . . . . . . . . . . . . . . . . . . . . . . . . M ini I O S V e rsion . . . . . . . . . . . . . . . . . . . . . . Sta ts R e p orting P e riod . . . . . . . . . . . . . . . . L E D Sta te . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . P oE P re -Sta nd a rd Switc h. . . . . . . . . . . . . . . . P oE P owe r I nj e c tor M AC Ad d r. . . . . . . . . . . . N um b e r O f Sl ots. . . . . . . . . . . . . . . . . . . . . . . . AP M od e l . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I O S V e rsion. . . . . . . . . . . . . . . . . . . . . . . . . . . . R e se t B utton. . . . . . . . . . . . . . . . . . . . . . . . . . . AP Se ria l N um b e r. . . . . . . . . . . . . . . . . . . . . . . AP C e rtific a te T y p e . . . . . . . . . . . . . . . . . . . . M a na ge m e nt F ra m e P rote c tion V a l id a tion. D isa b l e d ) AP U se r M od e . . . . . . . . . . . . . . . . . . . . . . . . . . . AP U se r N a m e . . . . . . . . . . . . . . . . . . . . . . . . . . . C isc o AP sy ste m l ogging host. . . . . . . . . . . AP U p T im e . . . . . . . . . . . . . . . . . . . . . . . . . . . . . AP L W AP P U p T im e . . . . . . . . . . . . . . . . . . . . . . . J oin D a te a nd T im e . . . . . . . . . . . . . . . . . . . . .
20 0 8 C i s c o S y s t e m s , I n c .

Sta te s 8 0 2 . 11a : -AB Sta te s 7 : 10

l a l : b l e 14 8 . 10 5 1.

2 AI R -L AP 12 5 2 AG -A-K 9 12 . 4 ( 13 d ) J A E na b l e d F T X 12 0 19 0 6 W M a nufa c ture I nsta l l e d E na b l e d ( G l ob a l M F P N ot N ot 2 5 5 . 0 d a 0 d a Sa t C onfigure C onfigure 2 5 5 . 2 5 5 . 2 y s, 0 5 h y s, 0 5 h F e b 16 0 0 d d

l e d l e d b l e d

5 5 3 3 m 3 0 s 3 2 m 2 9 s : 2 4 : 5 1 2 0 0 8
83

C o u r s e A d m in is t r a t io n G u id e

L a b 2 -3 A ns w er K ey : I ns ta lling a nd C o nf ig ur ing a C is c o M o b ility E x p r es s W ir eles s C o ntr o ller a nd A P


Ta sk 1

J oin T a k e n T im e . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E the rne t P ort D up l e x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . E the rne t P ort Sp e e d . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

0 d a y s, Auto Auto

0 0

h 0 1 m

0 0

When you complete this activity, you will g et a similar config uration to the one displayed here:

( C isc o C ontrol l e r) > show running-c onfig 8 0 2 . 11a c a c v oic e tsp e c -ina c tiv ity -tim e out ignore 8 0 2 . 11a c a c v oic e stre a m -siz e 8 4 0 0 0 m a x -stre a m s 2 8 0 2 . 11b c a c v oic e tsp e c -ina c tiv ity -tim e out ignore 8 0 2 . 11b c a c v oic e stre a m -siz e 8 4 0 0 0 m a x -stre a m s 2 a d v a nc e d l oc a tion e x p iry ta gs 12 0 0 a d v a nc e d l oc a tion e x p iry c l ie nt 15 0 a d v a nc e d l oc a tion e x p iry c a l ib ra ting-c l ie nt 3 0 a d v a nc e d l oc a tion e x p iry rogue -a p s 12 0 0 inte rfa c e a d d re ss a p -m a na ge r 10 . 10 . 1. 10 1 2 5 5 . 2 5 5 . 2 5 5 . 0 inte rfa c e a d d re ss m a na ge m e nt 10 . 10 . 1. 10 0 2 5 5 . 2 5 5 . 2 5 5 . 0 inte rfa c e a d d re ss v irtua l 1. 1. 1. 1 inte rfa c e d hc p a p -m a na ge r p rim a ry 2 5 5 . 2 5 5 . 2 5 5 . 2 5 5 inte rfa c e d hc p m a na ge m e nt p rim a ry 2 5 5 . 2 5 5 . 2 5 5 . 2 5 5 inte rfa c e p ort a p -m a na ge r 1 inte rfa c e p ort m a na ge m e nt 1 l ogging b uffe re d 1 m e sh se c urity e a p m gm tuse r a d d a d m in1 * * * * re a d -write m ob il ity group d om a in P od 1 m sgl og l e v e l c ritic a l ne twork te l ne t e na b l e ne twork rf-ne twork -na m e P od 1 sy sna m e 5 2 6 -1 wl a n c re a te 1 I U W N E -10 2 I U W N E -10 2 wl a n se c urity wp a d isa b l e 1 wl a n se c urity wp a d isa b l e 2 wl a n d hc p _ se rv e r 1 10 . 10 . 1. 11 re q uire d 8 0 2 . 11a d isa b l e ne twork wl a n e na b l e 2

10 . 10 . 1. 2 5 4 10 . 10 . 1. 2 5 4

Ta sk 3

L a b 3 -1 A ns w er K ey : I ns ta lling a nd U s ing th e C is c o A D U
There is no answer k ey for this lab.

O n the switc h: Show running-c onfig outp ut om itte d I p d hc p e x c l ud e d -a d d I p d hc p e x c l ud e d -a d d I p d hc p p ool P od 1 N e twork 10 . 10 . 1. 0 2 5 D e fa ul t-route r 10 . 10 L e a se 0 4 D ns-se rv e r 10 . 10 0 . 1. outp ut om itte d

re ss 10 . 10 . 1. 1 10 . 10 . 1. 3 0 re ss 10 . 10 . 1. 3 6 10 . 10 . 1. 2 5 5 5 . 2 5 5 . 2 5 5 . 0 . 1. 2 5 4 1

84

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

L a b 3 -2 A ns w er K ey : E x p er im enting w ith C o nnec tio ns a nd R o a m ing


Show running-c onfig 8 0 2 . 11a c a c v oic e tsp e c -ina c tiv ity -tim e out ignore 8 0 2 . 11a c a c v id e o tsp e c -ina c tiv ity -tim e out ignore 8 0 2 . 11a c a c v oic e stre a m -siz e 8 4 0 0 0 m a x -stre a m s 2 8 0 2 . 11b c a c v oic e tsp e c -ina c tiv ity -tim e out ignore 8 0 2 . 11b c a c v id e o tsp e c -ina c tiv ity -tim e out ignore 8 0 2 . 11b c a c v oic e stre a m -siz e 8 4 0 0 0 m a x -stre a m s 2 a a a a uth m gm t l oc a l ra d ius L oc a tion Sum m a ry Al gorithm use d : Av e ra ge C l ie nt R SSI e x p iry tim e out: 5 se c H a l f l ife : 0 se c N otify T hre shol d : 0 d b C a l ib ra ting C l ie nt R SSI e x p iry tim e out: 5 se c H a l f l ife : 0 se c R ogue AP R SSI e x p iry tim e out: 5 se c H a l f l ife : 0 se c N otify T hre shol d : 0 d b R F I D T a g R SSI e x p iry tim e out: 5 se c H a l f l ife : 0 se c N otify T hre shol d : 0 d b l oc a tion rssi-ha l f-l ife ta gs 0 l oc a tion rssi-ha l f-l ife c l ie nt 0 l oc a tion rssi-ha l f-l ife rogue -a p s 0 l oc a tion e x p iry ta gs 5 l oc a tion e x p iry c l ie nt 5 l oc a tion e x p iry c a l ib ra ting-c l ie nt 5 l oc a tion e x p iry rogue -a p s 5 a p sy sl og host gl ob a l 2 5 5 . 2 5 5 . 2 5 5 . 2 5 5 d hc p c re a te -sc op e Sc op e 1-1 d hc p a d d re ss-p ool Sc op e 1-1 10 . 10 . 1. 2 1 10 . 10 . 1. 2 5 d hc p d e fa ul t-route r Sc op e 1-1 10 . 10 . 1. 2 5 4 d hc p e na b l e Sc op e 1-1 d hc p d ns-se rv e rs Sc op e 1-1 10 . 10 0 . 1. 1 d hc p l e a se Sc op e 1-1 14 4 0 0 d hc p ne tb ios-na m e -se rv e r Sc op e 1-1 10 . 10 0 . 1. 1 d hc p ne twork Sc op e 1-1 10 . 10 . 1. 0 2 5 5 . 2 5 5 . 2 5 5 . 0 l oc a l -a uth m e thod fa st se rv e r-k e y 7 3 6 5 6 3 7 2 6 5 7 4 inte rfa c e a d d re ss a p -m a na ge r 10 . 10 . 1. 11 2 5 5 . 2 5 5 . 2 5 5 . 0 10 . 10 . 1. 2 5 4 inte rfa c e a d d re ss m a na ge m e nt 10 . 10 . 1. 10 2 5 5 . 2 5 5 . 2 5 5 . 0 10 . 10 . 1. 2 5 4 inte rfa c e a d d re ss v irtua l 1. 1. 1. 1 inte rfa c e d hc p a p -m a na ge r p rim a ry 10 . 10 . 1. 10 inte rfa c e d hc p m a na ge m e nt p rim a ry 10 . 10 . 1. 10 inte rfa c e p ort a p -m a na ge r 1 inte rfa c e p ort m a na ge m e nt 1 l oa d -b a l a nc ing wind ow 5 m e sh se c urity e a p m gm tuse r a d d a d m in1 * * * * re a d -write m ob il ity group d om a in P od 12 m ob il ity group m e m b e r a d d 0 0 : 1e : 13 : 5 0 : a 6 : 6 0 10 . 2 0 . 1. 10 m ob il ity d sc p v a l ue for inte r-c ontrol l e r m ob il ity p a c k e ts 0 ne twork we b m od e e na b l e ne twork te l ne t e na b l e ne twork m gm t-v ia -d y na m ic -inte rfa c e e na b l e ne twork ota p -m od e d isa b l e ne twork rf-ne twork -na m e P od 12 ra d ius fa l l b a c k -te st m od e off
20 0 8 C i s c o S y s t e m s , I n c .

When you complete this activity, you will g et a similar config uration to the one displayed here:

C o u r s e A d m in is t r a t io n G u id e

85

L a b 4 -1 A ns w er K ey : 8 0 2 . 1 Q

ra d ius fa l l b a c k -te st use rna m e c isc o-p rob e ra d ius fa l l b a c k -te st inte rv a l 3 0 0 snm p v e rsion v 2 c e na b l e snm p v e rsion v 3 e na b l e sy sna m e 2 10 6 -1 wl a n c re a te 1 I U W N E -1 I U W N E -1 wl a n c re a te 2 R oa m ing I U W N E -R O AM 1 wl a n se ssion-tim e out 1 18 0 0 wl a n se ssion-tim e out 2 18 0 0 wl a n wm m a l l ow 1 wl a n wm m a l l ow 2 wl a n se c urity wp a d isa b l e 1 wl a n se c urity wp a d isa b l e 2 wl a n se c urity wp a a k m ft re a ssoc ia tion-tim wl a n se c urity wp a a k m ft ov e r-the -a ir e na b wl a n se c urity wp a a k m ft ov e r-the -d s e na b l wl a n se c urity wp a a k m ft re a ssoc ia tion-tim wl a n se c urity wp a a k m ft ov e r-the -a ir e na b wl a n se c urity wp a a k m ft ov e r-the -d s e na b l wl a n e na b l e 2

e 2 0 1 l e 1 e 1 e 2 0 2 l e 2 e 2

( C isc o C ontrol l e r) > show running-c onfig 8 0 2 . 11a c a c v oic e tsp e c -ina c tiv ity -tim e out ignore 8 0 2 . 11a c a c v oic e stre a m -siz e 8 4 0 0 0 m a x -stre a m s 2 8 0 2 . 11b c a c v oic e tsp e c -ina c tiv ity -tim e out ignore 8 0 2 . 11b c a c v oic e stre a m -siz e 8 4 0 0 0 m a x -stre a m s 2 a d v a nc e d l oc a tion e x p iry ta gs 12 0 0 a d v a nc e d l oc a tion e x p iry c l ie nt 15 0 a d v a nc e d l oc a tion e x p iry c a l ib ra ting-c l ie nt 3 0 a d v a nc e d l oc a tion e x p iry rogue -a p s 12 0 0 inte rfa c e c re a te v l a n9 0 9 0 inte rfa c e a d d re ss a p -m a na ge r 10 . 10 . 1. 10 1 2 5 5 . 2 5 5 . 2 inte rfa c e a d d re ss m a na ge m e nt 10 . 10 . 1. 10 0 2 5 5 . 2 5 5 . 2 inte rfa c e a d d re ss v irtua l 1. 1. 1. 1 inte rfa c e a d d re ss d y na m ic -inte rfa c e v l a n9 0 9 0 . 9 0 . 9 9 0 . 9 0 . 9 0 . 2 5 3 inte rfa c e d hc p a p -m a na ge r p rim a ry 2 5 5 . 2 5 5 . 2 5 5 . 2 5 5 inte rfa c e d hc p m a na ge m e nt p rim a ry 2 5 5 . 2 5 5 . 2 5 5 . 2 5 5 inte rfa c e d hc p d y na m ic -inte rfa c e v l a n9 0 p rim a ry 9 0 inte rfa c e v l a n v l a n9 0 9 0 inte rfa c e p ort a p -m a na ge r 1 inte rfa c e p ort m a na ge m e nt 1 inte rfa c e p ort v l a n9 0 1 l ogging b uffe re d 1 m e sh se c urity e a p m gm tuse r a d d a d m in1 * * * * re a d -write m ob il ity group d om a in P od 12 m sgl og l e v e l c ritic a l ne tuse r a d d we b use r1 c isc o 2 use rT y p e p e rm a ne nt d b a se d W L AN ne tuse r wl a n-id we b use r1 2 ne twork te l ne t e na b l e ne twork rf-ne twork -na m e P od 12 sy sna m e 5 2 6 -1 wl a n c re a te 1 I U W N E -10 2 I U W N E -10 2 wl a n c re a te 2 W e b _ Authe ntic a tion I U W N E -W e b 1 wl a n inte rfa c e 2 v l a n9 0 wl a n se c urity wp a d isa b l e 1 wl a n se c urity wp a d isa b l e 2 wl a n d hc p _ se rv e r 1 10 . 10 . 1. 11 re q uire d 8 0 2 . 11a d isa b l e ne twork wl a n e na b l e 2

When you complete this activity, you will g et a similar config uration to the one displayed here:

a nd W eb A uth entic a tio n

5 5 . 0 5 5 . 0 0 . 10

10 . 10 . 1. 2 5 4 10 . 10 . 1. 2 5 4 2 5 5 . 2 5 5 . 2 5 5 . 0

. 9 0 . 9 0 . 2 5 4

Formatted: French (France)

e sc rip tion U se r for the

W e b

86

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

On the switch:
Show running-config interface g0/3 Switchport trunk encapsulation dot1q Switchport mode trunk Switchport trunk native vlan 10

L a b 4 -2 A ns w er K ey : C o nf ig ur ing E A P -F A S T A uth entic a tio n w ith W P A


Show running-c onfig 8 0 2 . 11a c a c v oic e tsp e c -ina c tiv ity -tim e out ignore 8 0 2 . 11a c a c v id e o tsp e c -ina c tiv ity -tim e out ignore 8 0 2 . 11a c a c v oic e stre a m -siz e 8 4 0 0 0 m a x -stre a m s 2 8 0 2 . 11b c a c v oic e tsp e c -ina c tiv ity -tim e out ignore 8 0 2 . 11b c a c v id e o tsp e c -ina c tiv ity -tim e out ignore 8 0 2 . 11b c a c v oic e stre a m -siz e 8 4 0 0 0 m a x -stre a m s 2 a a a a uth m gm t l oc a l ra d ius l oc a tion rssi-ha l f-l ife ta gs 0 l oc a tion rssi-ha l f-l ife c l ie nt 0 l oc a tion rssi-ha l f-l ife rogue -a p s 0 l oc a tion e x p iry ta gs 5 l oc a tion e x p iry c l ie nt 5 l oc a tion e x p iry c a l ib ra ting-c l ie nt 5 l oc a tion e x p iry rogue -a p s 5 a p sy sl og host gl ob a l 2 5 5 . 2 5 5 . 2 5 5 . 2 5 5 d hc p c re a te -sc op e P od 1 d hc p a d d re ss-p ool P od 110 . 10 . 1. 2 1 10 . 10 . 1. 2 6 d hc p d e fa ul t-route r P od 110 . 10 . 1. 2 5 4 d hc p e na b l e P od 1 d hc p d ns-se rv e rs P od 110 . 10 0 . 1. 1 d hc p ne tb ios-na m e -se rv e r P od 110 . 10 0 . 1. 1 d hc p ne twork P od 110 . 10 . 1. 0 2 5 5 . 2 5 5 . 2 5 5 . 0 l oc a l -a uth e a p -p rofil e a d d E AP -F AST 1 l oc a l -a uth e a p -p rofil e c e rt-issue r c isc o E AP -F AST 1 l oc a l -a uth e a p -p rofil e m e thod a d d fa st E AP -F AST 1 l oc a l -a uth use r-c re d e ntia l s l d a p l oc a l -a uth m e thod fa st se rv e r-k e y 7 3 6 5 6 3 7 2 6 5 7 4 l oc a l -a uth e a p -p rofil e c e rt-v e rify c a -issue r d isa b l e inte rfa c e a d d re ss a p -m a na ge r 10 . 10 . 1. 11 2 5 5 . 2 5 5 . 2 5 5 . 0 inte rfa c e a d d re ss m a na ge m e nt 10 . 10 . 1. 10 2 5 5 . 2 5 5 . 2 5 5 . 0 inte rfa c e a d d re ss v irtua l 1. 1. 1. 1 inte rfa c e d hc p a p -m a na ge r p rim a ry 10 . 10 . 1. 10 inte rfa c e d hc p m a na ge m e nt p rim a ry 10 . 10 . 1. 10 inte rfa c e p ort a p -m a na ge r 1 inte rfa c e p ort m a na ge m e nt 1 l d a p re tra nsm it-tim e out 1 3 0 l oa d -b a l a nc ing wind ow 5 l ogging b uffe re d 6 l ogging sy sl og host 0 . 0 . 0 . 0 m e sh se c urity e a p m gm tuse r a d d a d m in1 * * * * re a d -write m ob il ity group d om a in G roup 1 m ob il ity d sc p v a l ue for inte r-c ontrol l e r m ob il ity p a c ne tuse r a d d F a stuse r1 * * * * wl a n 2 use rT y p e p e rm a ne nt ne tuse r wl a n-id fa stuse r1 2 ne twork te l ne t e na b l e ne twork ota p -m od e d isa b l e ne twork rf-ne twork -na m e P od 1
20 0 8 C i s c o S y s t e m s , I n c .

When you complete this activity, you will g et a similar config uration to the one displayed here:

E AP -F AST 1 10 . 10 . 1. 2 5 4 10 . 10 . 1. 2 5 4

k e ts 0 d e sc rip tion

Formatted: German (Germany)

C o u r s e A d m in is t r a t io n G u id e

87

L a b 5 -1 A ns w er K ey : C o nf ig ur ing C o ntr o ller s a nd A P s f r o m C is c o W C S


When you complete this activity, will g et similar results to the one displayed here:

ra d ius fa l l b a c k -te st m od e off ra d ius fa l l b a c k -te st use rna m e c isc o-p rob e ra d ius fa l l b a c k -te st inte rv a l 3 0 0 se ssions tim e out 0 snm p v e rsion v 2 c e na b l e snm p v e rsion v 3 e na b l e sy sna m e 2 10 6 -1 wl a n c re a te 1 I U W N E -1 I U W N E -1 wl a n c re a te 2 E AP _ F AST I U W N E -F AST 1 wl a n l oc a l -a uth e na b l e E AP -F AST 1 2 wl a n ra d io 2 8 0 2 . 11a wl a n se ssion-tim e out 1 d isa b l e wl a n se ssion-tim e out 2 18 0 0 wl a n wm m a l l ow 1 wl a n wm m a l l ow 2 wl a n se c urity wp a d isa b l e 1 wl a n ra d ius_ se rv e r a c c t d isa b l e 2 wl a n l d a p a d d 2 1 wl a n se c urity sta tic -we p -k e y e nc ry p tion 1 1 wl a n se c urity sta tic -we p -k e y e nc ry p tion 2 1 wl a n se c urity wp a a k m ft re a ssoc ia tion-tim wl a n se c urity wp a a k m ft ov e r-the -a ir e na b wl a n se c urity wp a a k m ft ov e r-the -d s e na b l wl a n se c urity wp a a k m ft re a ssoc ia tion-tim wl a n se c urity wp a a k m ft ov e r-the -a ir e na b l wl a n se c urity wp a a k m ft ov e r-the -d s e na b l wl a n se c urity wp a wp a 1 e na b l e 2 wl a n se c urity wp a wp a 1 c ip he rs tk ip e na b l e wl a n se c urity wp a wp a 2 d isa b l e 2 wl a n e na b l e 2

10 4 10 4

< m od e < m od e

unk nown> unk nown>

< p a sswd < p a sswd

hid d e n> hid d e n>

e 2 0 1 l e 1 e 1 e 2 0 2 e 2 e 2 2

th e

Ta sk 2

Step 18: You should see the class main switch; the port depends on the g roup.

L a b 5 -2 A ns w er K ey : W o r k ing w ith M a p s
Ta sk 2

When you complete this activity, you will g et similar results to the one displayed here:

Step 9 : The lab is about 10 m wide and 11 m hig h in its long er ex tent.

L a b 5 -3 A ns w er K ey : M o nito r ing th e N etw o r k a nd C o nta ining D ev ic es


There is no answer k ey for this lab.

88

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

L a b 6 -1 A ns w er K ey : B a c k ing U p C o ntr o ller C o nf ig ur a tio n a nd th e C is c o W C S D a ta b a s e F iles


When you complete this activity, will g et similar results to those displayed here: Show running -config

Show running-c onfig 8 0 2 . 11a c a c v oic e tsp e c -ina c tiv ity -tim e out ignore 8 0 2 . 11a c a c v id e o tsp e c -ina c tiv ity -tim e out ignore 8 0 2 . 11a c a c v oic e stre a m -siz e 8 4 0 0 0 m a x -stre a m s 2 8 0 2 . 11b c a c v oic e tsp e c -ina c tiv ity -tim e out ignore 8 0 2 . 11b c a c v id e o tsp e c -ina c tiv ity -tim e out ignore 8 0 2 . 11b c a c v oic e stre a m -siz e 8 4 0 0 0 m a x -stre a m s 2 a a a a uth m gm t l oc a l ra d ius l oc a tion rssi-ha l f-l ife ta gs 0 l oc a tion rssi-ha l f-l ife c l ie nt 0 l oc a tion rssi-ha l f-l ife rogue -a p s 0 l oc a tion e x p iry ta gs 5 l oc a tion e x p iry c l ie nt 5 l oc a tion e x p iry c a l ib ra ting-c l ie nt 5 l oc a tion e x p iry rogue -a p s 5 a p sy sl og host gl ob a l 2 5 5 . 2 5 5 . 2 5 5 . 2 5 5 d hc p c re a te -sc op e P od 1 d hc p a d d re ss-p ool P od 110 . 10 . 1. 2 1 10 . 10 . 1. 2 6 d hc p d e fa ul t-route r P od 110 . 10 . 1. 2 5 4 d hc p e na b l e P od 1 d hc p d ns-se rv e rs P od 110 . 10 0 . 1. 1 d hc p ne tb ios-na m e -se rv e r P od 110 . 10 0 . 1. 1 d hc p ne twork P od 110 . 10 . 1. 0 2 5 5 . 2 5 5 . 2 5 5 . 0 l oc a l -a uth e a p -p rofil e a d d E AP -F AST 1 l oc a l -a uth e a p -p rofil e c e rt-issue r c isc o E AP -F AST 1 l oc a l -a uth e a p -p rofil e m e thod a d d fa st E AP -F AST 1 l oc a l -a uth use r-c re d e ntia l s l d a p l oc a l -a uth m e thod fa st se rv e r-k e y 7 3 6 5 6 3 7 2 6 5 7 4 l oc a l -a uth e a p -p rofil e c e rt-v e rify c a -issue r d isa b l e inte rfa c e a d d re ss a p -m a na ge r 10 . 10 . 1. 11 2 5 5 . 2 5 5 . 2 5 5 . 0 inte rfa c e a d d re ss m a na ge m e nt 10 . 10 . 1. 10 2 5 5 . 2 5 5 . 2 5 5 . 0 inte rfa c e a d d re ss v irtua l 1. 1. 1. 1 inte rfa c e d hc p a p -m a na ge r p rim a ry 10 . 10 . 1. 10 inte rfa c e d hc p m a na ge m e nt p rim a ry 10 . 10 . 1. 10 inte rfa c e p ort a p -m a na ge r 1 inte rfa c e p ort m a na ge m e nt 1 l d a p re tra nsm it-tim e out 1 3 0 l oa d -b a l a nc ing wind ow 5 l ogging b uffe re d 6 l ogging sy sl og host 0 . 0 . 0 . 0 m e sh se c urity e a p m gm tuse r a d d a d m in1 * * * * re a d -write m ob il ity group d om a in P od 1 m ob il ity d sc p v a l ue for inte r-c ontrol l e r m ob il ity p a c ne tuse r a d d F a stuse r1 * * * * wl a n 2 use rT y p e p e rm a ne nt ne tuse r wl a n-id F a stuse r1 2 ne twork te l ne t e na b l e ne twork ota p -m od e d isa b l e ne twork rf-ne twork -na m e P od 1 ra d ius fa l l b a c k -te st m od e off ra d ius fa l l b a c k -te st use rna m e c isc o-p rob e ra d ius fa l l b a c k -te st inte rv a l 3 0 0 se ssions tim e out 0 snm p v e rsion v 2 c e na b l e snm p v e rsion v 3 e na b l e sy sna m e 2 10 6 -1 wl a n c re a te 1 I U W N E -1 I U W N E -1 wl a n c re a te 2 E AP _ F AST I U W N E -F AST 1 wl a n l oc a l -a uth e na b l e E AP -F AST 1 2
20 0 8 C i s c o S y s t e m s , I n c .

E AP -F AST 1 10 . 10 . 1. 2 5 4 10 . 10 . 1. 2 5 4

k e ts 0 d e sc rip tion

Formatted: German (Germany)

C o u r s e A d m in is t r a t io n G u id e

89

Controller X ML version:
<XML_config_variables> <XML_config_variables-aaaLocalEapCfg.xml-7741ad65> <LocalAuth-EAP-Configuration> <DataBaseName>Local EAP Database</DataBaseName> <method> <fast> <serverKeyEnc> <iv>02a73af1a97673be3790122d2ecacec1</iv> <mac>a6aa51e29b7c2485d490570211a7cb6f7c28a4ae</mac> <passwd>01179a42d90d1bd06a1e7caa18fee13a00000000000000000000000000000000</passwd > </serverKeyEnc> </fast> </method> <EAP-Profiles index="0"> <active>ENABLE</active> <profileName>prfMaP1500LlEAuth93</profileName> <profileHandle>195437080</profileHandle> <certIssuer>legacy</certIssuer> <Enable-Disable-flags>-123</Enable-Disable-flags> <methodParams> <localCertRequired>Required</localCertRequired> <clientCertRequired>Required</clientCertRequired> </methodParams> <methods index="0"> <methodType>43</methodType> <methodName>fast</methodName> </methods> <data>195437180</data> </EAP-Profiles> </LocalAuth-EAP-Configuration> <XML_crc_file_size>1023</XML_crc_file_size> <XML__CRC__CHECKSUM>3969282295</XML__CRC__CHECKSUM> </XML_config_variables-aaaLocalEapCfg.xml-7741ad65> <XML_config_variables-aaaapiFileDbCfgData.xml-ba700b76> <User-Access-Configuration> <numItems>1</numItems> <length>223424</length> <maxItems>512</maxItems> <numOfRWUsers>1</numOfRWUsers> <userDatabase index="0" arraySize="512"> <userName>admin1</userName> <serviceType>6</serviceType>
90 I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W N E ) v 1 .0 20 0 8 C i s c o S y s t e m s , I n c .

wl wl wl a wl wl wl wl wl wl 1 wl 1 wl wl wl wl wl a wl wl wl wl wl

a n ra d io 2 8 0 2 . 11a a n se ssion-tim e out 1 d n se ssion-tim e out 2 18 a n wm m a l l ow 1 a n wm m a l l ow 2 a n se c urity wp a d isa b l a n ra d ius_ se rv e r a c c t a n l d a p a d d 2 1 a n se c urity sta tic -we p a n se c urity

isa b l e 0 0 e 1 d isa b l e 2 < m od e < m od e unk nown> unk nown> < p a sswd < p a sswd hid d e n> hid d e n> -k e y

e nc ry p tion 1 10 4 e nc ry p tion 2 10 4

sta tic -we p -k e y a k a k a a k a a k a k m a a k a wp a wp a wp a a a m m m a a m m

a n se c urity wp a n se c urity wp a n se c urity wp a n se c urity wp n se c urity wp a a n se c urity wp a n se c urity wp a n se c urity wp a n se c urity wp a n e na b l e 2

ft re a ssoc ia tion-tim ft ov e r-the -a ir e na b ft ov e r-the -d s e na b l ft re a ssoc ia tion-tim ft ov e r-the -a ir e na b l ft ov e r-the -d s e na b l 1 e na b l e 2 1 c ip he rs tk ip e na b l e 2 d isa b l e 2

e 2 0 1 l e 1 e 1 e 2 0 2 e 2 e 2 2

Formatted: Portuguese (Brazil)

<passwordStore> <ps_type>PS_STATIC_AES128CBC_SHA1</ps_type> <iv>d988dbd8ca6ed6d3b885885adca8474f</iv> <mac>c52df09a410ea11f3a0ebae6b5d188aaf258726f</mac> <max_passwd_len>50</max_passwd_len> <passwd_len>64</passwd_len> <passwd>3f33b257d1d5bf8f73f7f88a4b27113b4620283bd06892b0bb45e84dabbdbb874c95fa1a 6d252523aa776805b8080259756658316f5623cd4d44e57c35e972250000</passwd> </passwordStore> </userDatabase> </User-Access-Configuration> <XML_crc_file_size>782</XML_crc_file_size> <XML__CRC__CHECKSUM>3297450704</XML__CRC__CHECKSUM> </XML_config_variables-aaaapiFileDbCfgData.xml-ba700b76> <XML_config_variables-apfCfgData.xml-82be6d39> <APCommon-Configuration> <ConfigIsComplete>0</ConfigIsComplete> <NumOfWLANs>2</NumOfWLANs> <WirelessLANData index="1"> <ProfileName>IUWNE-1</ProfileName> <ProfileNameLen>7</ProfileNameLen> <Identifier>1</Identifier> <Status>ENABLED</Status> <BroadcastSSIDEnabled>1</BroadcastSSIDEnabled> <CcxAironetIeSupportEnabled>1</CcxAironetIeSupportEnabled> <Security> <SecurityType>16384</SecurityType> <wepPolicy> <configData> <Dot11Encryption>WEP104</Dot11Encryption> <KeyIndex>1</KeyIndex> </configData> </wepPolicy> <dot1xPolicy> <configData> <AuthTimeout>1800</AuthTimeout> </configData> </dot1xPolicy> <wifiPolicy> <configData> <mcastCipher>4</mcastCipher> <rsnIeData>30160100000fac040100000fac040100000fac0128000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000</rsnIeData> <rsnIeLen>24</rsnIeLen> <warpIeData>dd0a00c0b90100000008010100000000000000000000000000000000000000000000 000000000000000000000000000000000000000000000000000000000000</warpIeData> <warpIeLen>12</warpIeLen> </configData> </wifiPolicy> <ipsecPolicy> <configData> <IpsecIkePhase1Mode>MAIN</IpsecIkePhase1Mode> </configData> </ipsecPolicy> <VlanLocalAddress>10.10.1.10</VlanLocalAddress> <VlanLocalNetmask>255.255.255.0</VlanLocalNetmask> <GWAddress>10.10.1.254</GWAddress> <BlacklistTimeout>60</BlacklistTimeout> <InterfaceName>management</InterfaceName> <WmePolicy>ALLOWED</WmePolicy> </Security> <Ssid>IUWNE-1</Ssid> <apfVapSsidLen>7</apfVapSsidLen> </WirelessLANData> <Dot11BConfig> <Dot11bBand>
20 0 8 C i s c o S y s t e m s , I n c . C o u r s e A d m in is t r a t io n G u id e 91

Formatted: Polish

<Dot11NumberOfChannels>11</Dot11NumberOfChannels> <Dot11MaximumTransmitPowerLevel>27</Dot11MaximumTransmitPowerLevel> <Dot11MaxAntennaGainAllowed>6</Dot11MaxAntennaGainAllowed> </Dot11bBand> <Dot11gSupported>Supported</Dot11gSupported> </Dot11BConfig> <Dot11AConfig> <Dot11aBand index="0"> <Dot11FirstChannelNumber>36</Dot11FirstChannelNumber> <Dot11NumberOfChannels>4</Dot11NumberOfChannels> <Dot11MaximumTransmitPowerLevel>17</Dot11MaximumTransmitPowerLevel> <Dot11FirstDCAChannelNumber>36</Dot11FirstDCAChannelNumber> <Dot11MaxAntennaGainAllowed>6</Dot11MaxAntennaGainAllowed> </Dot11aBand> <Dot11aBand index="1"> <Dot11BandState>1</Dot11BandState> <RequiresRadar>1</RequiresRadar> <Dot11FirstChannelNumber>52</Dot11FirstChannelNumber> <Dot11ChannelSpacing>4</Dot11ChannelSpacing> <Dot11NumberOfChannels>4</Dot11NumberOfChannels> <Dot11MaximumTransmitPowerLevel>23</Dot11MaximumTransmitPowerLevel> <Dot11FirstDCAChannelNumber>52</Dot11FirstDCAChannelNumber> <Dot11DCAChannelSpacing>4</Dot11DCAChannelSpacing> <Dot11DCANumberOfChanels>4</Dot11DCANumberOfChanels> <Dot11MaxAntennaGainAllowed>6</Dot11MaxAntennaGainAllowed> </Dot11aBand> <Dot11aBand index="2"> <Dot11BandState>1</Dot11BandState> <RequiresRadar>1</RequiresRadar> <Dot11FirstChannelNumber>100</Dot11FirstChannelNumber> <Dot11ChannelSpacing>4</Dot11ChannelSpacing> <Dot11NumberOfChannels>5</Dot11NumberOfChannels> <Dot11MaximumTransmitPowerLevel>23</Dot11MaximumTransmitPowerLevel> <Dot11FirstDCAChannelNumber>100</Dot11FirstDCAChannelNumber> <Dot11DCAChannelSpacing>4</Dot11DCAChannelSpacing> <Dot11DCANumberOfChanels>5</Dot11DCANumberOfChanels> <Dot11MaxAntennaGainAllowed>6</Dot11MaxAntennaGainAllowed> </Dot11aBand> <Dot11aBand index="3"> <Dot11BandState>1</Dot11BandState> <RequiresRadar>1</RequiresRadar> <Dot11FirstChannelNumber>132</Dot11FirstChannelNumber> <Dot11ChannelSpacing>4</Dot11ChannelSpacing> <Dot11NumberOfChannels>3</Dot11NumberOfChannels> <Dot11MaximumTransmitPowerLevel>23</Dot11MaximumTransmitPowerLevel> <Dot11FirstDCAChannelNumber>132</Dot11FirstDCAChannelNumber> <Dot11DCAChannelSpacing>4</Dot11DCAChannelSpacing> <Dot11DCANumberOfChanels>3</Dot11DCANumberOfChanels> <Dot11MaxAntennaGainAllowed>6</Dot11MaxAntennaGainAllowed> </Dot11aBand> <Dot11aBand index="4"> <Dot11BandState>1</Dot11BandState> <Dot11FirstChannelNumber>149</Dot11FirstChannelNumber> <Dot11ChannelSpacing>4</Dot11ChannelSpacing> <Dot11NumberOfChannels>5</Dot11NumberOfChannels> <Dot11MaximumTransmitPowerLevel>30</Dot11MaximumTransmitPowerLevel> <Dot11FirstDCAChannelNumber>149</Dot11FirstDCAChannelNumber> <Dot11DCAChannelSpacing>4</Dot11DCAChannelSpacing> <Dot11DCANumberOfChanels>4</Dot11DCANumberOfChanels> <Dot11MaxAntennaGainAllowed>6</Dot11MaxAntennaGainAllowed> </Dot11aBand> <Dot11aBand index="5"> <Dot11BandState>1</Dot11BandState> <Dot11FirstChannelNumber>190</Dot11FirstChannelNumber> <Dot11ChannelSpacing>6</Dot11ChannelSpacing> <Dot11NumberOfChannels>2</Dot11NumberOfChannels> <Dot11MaximumTransmitPowerLevel>20</Dot11MaximumTransmitPowerLevel> <Dot11MaxAntennaGainAllowed>17</Dot11MaxAntennaGainAllowed>
92 I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W N E ) v 1 .0 20 0 8 C i s c o S y s t e m s , I n c .

</Dot11aBand> <Dot11aDefaultCfg> <defaultChan>36</defaultChan> </Dot11aDefaultCfg> </Dot11AConfig> <Dot11CountryCode>US</Dot11CountryCode> <networkName>Group1</networkName> <Dot11MultiCountryCode index="0">US</Dot11MultiCountryCode> </APCommon-Configuration> <XML_crc_file_size>5811</XML_crc_file_size> <XML__CRC__CHECKSUM>3881916614</XML__CRC__CHECKSUM> </XML_config_variables-apfCfgData.xml-82be6d39> <XML_config_variables-apfRogueData.xml-114ab423> <RogueAP-Configuration> <RogueList index="0"> <level>1</level> </RogueList> </RogueAP-Configuration> <XML_crc_file_size>142</XML_crc_file_size> <XML__CRC__CHECKSUM>1488059387</XML__CRC__CHECKSUM> </XML_config_variables-apfRogueData.xml-114ab423> <XML_config_variables-cliWebCfgData.xml-a3523f1a> <XML_crc_file_size>22</XML_crc_file_size> <XML__CRC__CHECKSUM>1389374175</XML__CRC__CHECKSUM> </XML_config_variables-cliWebCfgData.xml-a3523f1a> <XML_config_variables-dhcpCfgData.xml-92584a2f> <DHCP-Configuration> <scopes index="0"> <scopeName>Scope 1-1</scopeName> <DHCPEnabled>ENABLED</DHCPEnabled> <leaseTime>14400</leaseTime> <poolStart>21.1.10.10</poolStart> <poolEnd>29.1.10.10</poolEnd> <poolLastAllocated>25.1.10.10</poolLastAllocated> <defaultRoute index="0">254.1.10.10</defaultRoute> <network>0.1.10.10</network> <netmask>0.255.255.255</netmask> <dnsServer index="0">1.1.100.10</dnsServer> <wins index="0">1.1.100.10</wins> </scopes> </DHCP-Configuration> <XML_crc_file_size>575</XML_crc_file_size> <XML__CRC__CHECKSUM>393978620</XML__CRC__CHECKSUM> </XML_config_variables-dhcpCfgData.xml-92584a2f> <XML_config_variables-dot1qCfg.xml-3cf45304> <XML_crc_file_size>22</XML_crc_file_size> <XML__CRC__CHECKSUM>1389374175</XML__CRC__CHECKSUM> </XML_config_variables-dot1qCfg.xml-3cf45304> <XML_config_variables-ldapCfgData.xml-1778a2ce> <LDAP-Configuration> <LDAP-Database-Name>LDAP Database</LDAP-Database-Name> </LDAP-Configuration> <XML_crc_file_size>129</XML_crc_file_size> <XML__CRC__CHECKSUM>3519211832</XML__CRC__CHECKSUM> </XML_config_variables-ldapCfgData.xml-1778a2ce> <XML_config_variables-logCfgData.xml-3d9622e2> <XML_crc_file_size>22</XML_crc_file_size> <XML__CRC__CHECKSUM>1389374175</XML__CRC__CHECKSUM> </XML_config_variables-logCfgData.xml-3d9622e2> <XML_config_variables-meshFileCfg.xml-436a659c> <MESH-Configuration> <cfg> <isChanged>1</isChanged> <profileName>prfMaP1500LlEAuth93</profileName> </cfg> </MESH-Configuration> <XML_crc_file_size>175</XML_crc_file_size> <XML__CRC__CHECKSUM>3717743609</XML__CRC__CHECKSUM> </XML_config_variables-meshFileCfg.xml-436a659c>
20 0 8 C i s c o S y s t e m s , I n c . C o u r s e A d m in is t r a t io n G u id e 93

<XML_config_variables-mmCfgData.xml-2a91608> <Mobility-Manager-Configuration> <group>Group1</group> </Mobility-Manager-Configuration> <XML_crc_file_size>120</XML_crc_file_size> <XML__CRC__CHECKSUM>2303725361</XML__CRC__CHECKSUM> </XML_config_variables-mmCfgData.xml-2a91608> <XML_config_variables-nimSlot0.xml-bcd6b57f> <XML_crc_file_size>22</XML_crc_file_size> <XML__CRC__CHECKSUM>1389374175</XML__CRC__CHECKSUM> </XML_config_variables-nimSlot0.xml-bcd6b57f> <XML_config_variables-policyCfgData.xml-40f47081> <XML_crc_file_size>22</XML_crc_file_size> <XML__CRC__CHECKSUM>1389374175</XML__CRC__CHECKSUM> </XML_config_variables-policyCfgData.xml-40f47081> <XML_config_variables-rrmCfgData.xml-89a365cb> <RadioResourceManager-Configuration> <rrm2 index="1"> <rrmAllowedChans> <chanCnt>20</chanCnt> <chans index="8">100</chans> <chans index="9">104</chans> <chans index="10">108</chans> <chans index="11">112</chans> <chans index="12">116</chans> <chans index="13">132</chans> <chans index="14">136</chans> <chans index="15">140</chans> <chans index="16">149</chans> <chans index="17">153</chans> <chans index="18">157</chans> <chans index="19">161</chans> </rrmAllowedChans> </rrm2> </RadioResourceManager-Configuration> <XML_crc_file_size>668</XML_crc_file_size> <XML__CRC__CHECKSUM>1600534478</XML__CRC__CHECKSUM> </XML_config_variables-rrmCfgData.xml-89a365cb> <XML_config_variables-sigCfg.xml-2d0c8484> <XML_crc_file_size>22</XML_crc_file_size> <XML__CRC__CHECKSUM>1389374175</XML__CRC__CHECKSUM> </XML_config_variables-sigCfg.xml-2d0c8484> <XML_config_variables-simCfgData.xml-47629dc4> <System-Interface-Configuration> <systemName>2106-1</systemName> <systemIpAddress>192.168.1.1</systemIpAddress> <systemGateway>0.0.0.0</systemGateway> </System-Interface-Configuration> <XML_crc_file_size>224</XML_crc_file_size> <XML__CRC__CHECKSUM>3204326577</XML__CRC__CHECKSUM> </XML_config_variables-simCfgData.xml-47629dc4> <XML_config_variables-simQosCfgData.xml-11069211> <XML_crc_file_size>22</XML_crc_file_size> <XML__CRC__CHECKSUM>1389374175</XML__CRC__CHECKSUM> </XML_config_variables-simQosCfgData.xml-11069211> <XML_config_variables-simVlanCfgData.xml-a2f725a> <VLAN-Configuration> <simInterface index="0"> <InterfaceName>management</InterfaceName> <vlanStatus>CREATED</vlanStatus> <vlanLocalAddress>10.10.1.10</vlanLocalAddress> <vlanLocalNetmask>255.255.255.0</vlanLocalNetmask> <vlanLocalGateway>10.10.1.254</vlanLocalGateway> <vlanDhcpProtocolState>1</vlanDhcpProtocolState> <vlanDhcpPrimaryServer>10.10.1.10</vlanDhcpPrimaryServer> <vlanPortNumber>1</vlanPortNumber> <GatewayResolvedState>RESOLVED</GatewayResolvedState> <vlanGatewayMac>0:1e:7a:ad:52:a9</vlanGatewayMac> </simInterface>
94 I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W N E ) v 1 .0 20 0 8 C i s c o S y s t e m s , I n c .

<simInterface index="1"> <InterfaceName>service-port</InterfaceName> <vlanId>-1</vlanId> <vlanInterfaceType>Service-Port</vlanInterfaceType> <vlanDhcpProtocolState>3</vlanDhcpProtocolState> <vlanInterfaceId>3</vlanInterfaceId> </simInterface> <simInterface index="2"> <InterfaceName>virtual</InterfaceName> <vlanId>-1</vlanId> <vlanStatus>CREATED</vlanStatus> <vlanInterfaceType>Virtual</vlanInterfaceType> <vlanLocalAddress>1.1.1.2</vlanLocalAddress> <vlanDhcpProtocolState>1</vlanDhcpProtocolState> </simInterface> <simInterface index="3"> <InterfaceName>ap-manager</InterfaceName> <vlanStatus>CREATED</vlanStatus> <vlanInterfaceType>VLAN</vlanInterfaceType> <vlanLocalAddress>10.10.1.11</vlanLocalAddress> <vlanLocalNetmask>255.255.255.0</vlanLocalNetmask> <vlanLocalGateway>10.10.1.254</vlanLocalGateway> <vlanDhcpProtocolState>1</vlanDhcpProtocolState> <vlanDhcpPrimaryServer>10.10.1.10</vlanDhcpPrimaryServer> <vlanPortNumber>1</vlanPortNumber> <vlanInterfaceId>1</vlanInterfaceId> <GatewayResolvedState>RESOLVED</GatewayResolvedState> <vlanGatewayMac>0:1e:7a:ad:52:a9</vlanGatewayMac> <vlanFlags>1</vlanFlags> </simInterface> </VLAN-Configuration> <XML_crc_file_size>1949</XML_crc_file_size> <XML__CRC__CHECKSUM>3145401149</XML__CRC__CHECKSUM> </XML_config_variables-simVlanCfgData.xml-a2f725a> <XML_config_variables-snmpCfgData.xml-4f1f9d7c> <SNMP-Configuration> <snmpV3User index="0"> <agentUserAuthKeyStore> <iv>9af0c956b3ef198c2bbe657e02cb5746</iv> <mac>b5b769a4a62137da506ed909dfd4f3e1fe2605bb</mac> <passwd>df9e7cc2d2bbc09cbfa42c4942b3ddb00000000000000000000000000000000000000000 000000000000000000000000</passwd> </agentUserAuthKeyStore> <agentUserPrivKeyStore> <iv>e9460c2cc054846a9399f6ca905c808e</iv> <mac>d043b534f8587048cf403886b6254f4600b4f35e</mac> <passwd>ff7682febf472d078b453ca2c0574a480000000000000000000000000000000000000000 000000000000000000000000</passwd> </agentUserPrivKeyStore> </snmpV3User> <snmpTrapMgr index="0"> <agentTrapMgrCommunityName>127.0.0.1</agentTrapMgrCommunityName> <agentTrapMgrIpAddr>127.0.0.1</agentTrapMgrIpAddr> <agentTrapMgrStatus>1</agentTrapMgrStatus> </snmpTrapMgr> </SNMP-Configuration> <XML_crc_file_size>925</XML_crc_file_size> <XML__CRC__CHECKSUM>3737039482</XML__CRC__CHECKSUM> </XML_config_variables-snmpCfgData.xml-4f1f9d7c> <XML_config_variables-sshpmCfgData.xml-41181e3e> <SSHPolicyManagerConfigData> <sshpmIPv4VirtualAddress>1.1.1.2</sshpmIPv4VirtualAddress> <sshpmIPv4VirtualIPString>1.1.1.1</sshpmIPv4VirtualIPString> </SSHPolicyManagerConfigData> <XML_crc_file_size>214</XML_crc_file_size> <XML__CRC__CHECKSUM>755129620</XML__CRC__CHECKSUM> </XML_config_variables-sshpmCfgData.xml-41181e3e> <XML_config_variables-trapMgrCfgData.xml-bd5b2af3> <XML_crc_file_size>22</XML_crc_file_size>
20 0 8 C i s c o S y s t e m s , I n c . C o u r s e A d m in is t r a t io n G u id e 95

Formatted: Portuguese (Brazil)

Formatted: Portuguese (Brazil)

<XML__CRC__CHECKSUM>1389374175</XML__CRC__CHECKSUM> </XML_config_variables-trapMgrCfgData.xml-bd5b2af3> <XML_config_variables-webCustomizations.xml-3adfbbe> <Custom-WEB-Configuration> <wlans index="3"> <useGlobalFlag>0</useGlobalFlag> </wlans> </Custom-WEB-Configuration> <XML_crc_file_size>156</XML_crc_file_size> <XML__CRC__CHECKSUM>289798437</XML__CRC__CHECKSUM> </XML_config_variables-webCustomizations.xml-3adfbbe> <XML_config_variables-xmlVersion.xml-d62125ee> <XML_config_version>1.7</XML_config_version> <XML_config_image_version>4.2.99.0</XML_config_image_version> <XML_crc_file_size>130</XML_crc_file_size> <XML__CRC__CHECKSUM>567147269</XML__CRC__CHECKSUM> </XML_config_variables-xmlVersion.xml-d62125ee> </XML_config_variables>

L a b 6 -2 A ns w er K ey : T r o ub les h o o ting
There is no answer k ey for this lab.

L a b 6 -3 A ns w er K ey : T r o ub les h o o ting w ith W ir es h a r k

Your AP is set on Channel 1, which is overcrowded, thus causing many collisions and losses. Chang ing it to another channel reduces the loss rate. If your client cannot g et an IP address, which is the case here, the web authentication is not involved. The only element is the DHCP server. You controller interface sends the client to a wrong DHCP server address.

96

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

T ea rd o wn a n d Res t o ra t io n
S tep 1

This topic describes how to tear down and restore the eq uipment that is used in the course. From the Cisco 1252 CLI, if AP are still in LWAPP mode, clear the root/Public1! password defined during the labs, by entering , in privileg ed mode (not in config mode): clear lwapp private-config Mak e sure that each Cisco 1252 AP basic config uration item is cleared as well (clear config from the controller) if the APs are still in LWAPP mode. Mak e sure that each Cisco 1252 AP is back to autonomous mode and that their config uration is cleared (erase startup-config ). Clear the 2106 controllers config uration (clear config , reset system without save). Clear the 521 APs config uration (clear config ). Maintain the static IP address 10.X 0.1.30/24, where X is the pod number. Clear the Cisco 526 Mobility Controller config uration. In the remote laptops, clear the communities on the Cisco Config uration Assistant. In the remote laptops, uninstall the Cisco ADU, and remove the profiles. In the remote laptops, delete the Preferred network s in the Windows WZC. In the remote laptops, remove files that students may have left on the desk top. On the main switch, reload without saving , or inj ect the initialconfig file, to remove the students scopes and trunk s. In the lab server, restore the database you back ed up during WCS initial installation, to bring WCS back to installed, empty database state.

S tep 2 S tep 3 S tep 4 S tep 5 S tep 6 S tep 7 S tep 8 S tep 9 S tep 1 0 S tep 1 1 S tep 1 2

hostna m e I U W N E -SW e na b l e se c re t iforgot2 ! use rna m e instruc tor p riv il use rna m e stud e nt1 p a ssword use rna m e stud e nt2 p a ssword use rna m e stud e nt3 p a ssword use rna m e stud e nt4 p a ssword use rna m e stud e nt5 p a ssword use rna m e stud e nt6 p a ssword use rna m e stud e nt7 p a ssword use rna m e stud e nt8 p a ssword no a a a ne w-m od e l sy ste m m tu routing 15 0 0 ip sub ne t-z e ro ip routing no ip d om a in-l ook up ip d hc p e x c l ud e d -a d d re ss 9 ip d hc p p ool V L AN 9 0 ne twork 9 0 . 9 0 . 9 0 . 0 2 5 5 . d ns-se rv e r 10 . 10 0 . 1. 1 d e fa ul t-route r 9 0 . 9 0 . 9 0 l e a se 0 4 sp a nning-tre e m od e p v st sp a nning-tre e e x te nd sy ste v l a n inte rna l a l l oc a tion p
20 0 8 C i s c o S y s t e m s , I n c .

The MainSwithConfig file can be found in the Instructor CD. Its content is as follows:
e ge 15 p a ssword c isc o c isc o c isc o c isc o c isc o c isc o c isc o c isc o iforgot2 !

0 . 9 0 . 9 0 . 1 9 0 . 9 0 . 9 0 . 10 2 5 5 . 2 5 5 . 0 . 2 5 3 m -id ol ic y

a sc e nd ing
C o u r s e A d m in is t r a t io n G u id e 97

inte rfa c e F a stE the rne t0 no ip a d d re ss inte rfa c e G iga b itE the rne t0 / d e sc rip tion P od 1 - 2 10 6 W L switc hp ort a c c e ss v l a n 10 sp a nning-tre e p ortfa st inte rfa c e G iga b itE the rne t0 / d e sc rip tion P od 1 - 12 5 2 AP switc hp ort a c c e ss v l a n 10 sp a nning-tre e p ortfa st inte rfa c e G iga b itE the rne t0 / d e sc rip tion P od 1 - 5 2 6 W L C switc hp ort a c c e ss v l a n 10 sp a nning-tre e p ortfa st inte rfa c e G iga b itE the rne t0 / d e sc rip tion P od 1 - 5 2 1 AP switc hp ort a c c e ss v l a n 10 sp a nning-tre e p ortfa st inte rfa c e G iga b itE the rne t0 / d e sc rip tion P od 1 - L a p top switc hp ort a c c e ss v l a n 10 sp a nning-tre e p ortfa st inte rfa c e G iga b itE the rne t0 / d e sc rip tion P od 2 - 2 10 6 W L switc hp ort a c c e ss v l a n 2 0 sp a nning-tre e p ortfa st inte rfa c e G iga b itE the rne t0 / d e sc rip tion P od 2 - 12 5 2 AP switc hp ort a c c e ss v l a n 2 0 sp a nning-tre e p ortfa st inte rfa c e G iga b itE the rne t0 / d e sc rip tion P od 2 - 5 2 6 W L C switc hp ort a c c e ss v l a n 2 0 sp a nning-tre e p ortfa st inte rfa c e G iga b itE the rne t0 / d e sc rip tion P od 2 - 5 2 1 AP switc hp ort a c c e ss v l a n 2 0 sp a nning-tre e p ortfa st inte rfa c e G iga b itE the rne t0 / d e sc rip tion P od 2 - L a p top switc hp ort a c c e ss v l a n 2 0 sp a nning-tre e p ortfa st inte rfa c e G iga b itE the rne t0 / d e sc rip tion P od 3 - 2 10 6 W L switc hp ort a c c e ss v l a n 3 0 sp a nning-tre e p ortfa st inte rfa c e G iga b itE the rne t0 / d e sc rip tion P od 3 - 12 5 2 AP switc hp ort a c c e ss v l a n 3 0 sp a nning-tre e p ortfa st inte rfa c e G iga b itE the rne t0 / d e sc rip tion P od 3 - 5 2 6 W L C switc hp ort a c c e ss v l a n 3 0 sp a nning-tre e p ortfa st inte rfa c e G iga b itE the rne t0 / d e sc rip tion P od 3 - 5 2 1 AP switc hp ort a c c e ss v l a n 3 0 sp a nning-tre e p ortfa st inte rfa c e G iga b itE the rne t0 / d e sc rip tion P od 3 - L a p top switc hp ort a c c e ss v l a n 3 0 sp a nning-tre e p ortfa st inte rfa c e G iga b itE the rne t0 / d e sc rip tion P od 4 - 2 10 6 W L switc hp ort a c c e ss v l a n 4 0 sp a nning-tre e p ortfa st inte rfa c e G iga b itE the rne t0 / d e sc rip tion P od 4 - 12 5 2 AP
98

C 2

C 7

10

11

12

13

14

15

16

17
N E ) v 1 .0 20 0 8 C i s c o S y s t e m s , I n c .

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

switc hp ort a c sp a nning-tre e inte rfa c e G iga d e sc rip tion P switc hp ort a c sp a nning-tre e inte rfa c e G iga d e sc rip tion P switc hp ort a c sp a nning-tre e inte rfa c e G iga d e sc rip tion P switc hp ort a c sp a nning-tre e inte rfa c e G iga d e sc rip tion P switc hp ort a c sp a nning-tre e inte rfa c e G iga d e sc rip tion P switc hp ort a c sp a nning-tre e inte rfa c e G iga d e sc rip tion P switc hp ort a c sp a nning-tre e inte rfa c e G iga d e sc rip tion P switc hp ort a c sp a nning-tre e inte rfa c e G iga d e sc rip tion P switc hp ort a c sp a nning-tre e inte rfa c e G iga d e sc rip tion P switc hp ort a c sp a nning-tre e inte rfa c e G iga d e sc rip tion P switc hp ort a c sp a nning-tre e inte rfa c e G iga d e sc rip tion P switc hp ort a c sp a nning-tre e inte rfa c e G iga d e sc rip tion P switc hp ort a c sp a nning-tre e inte rfa c e G iga d e sc rip tion P switc hp ort a c sp a nning-tre e inte rfa c e G iga d e sc rip tion P switc hp ort a c sp a nning-tre e inte rfa c e G iga d e sc rip tion P switc hp ort a c sp a nning-tre e inte rfa c e G iga d e sc rip tion P switc hp ort a c sp a nning-tre e inte rfa c e G iga d e sc rip tion P
20 0 8 C i s c o S y s t e m s , I n c .

c e ss v l a n 4 0 p ortfa st b itE the rne t0 / od 4 - 5 2 6 W L C c e ss v l a n 4 0 p ortfa st b itE the rne t0 / od 4 - 5 2 1 AP c e ss v l a n 4 0 p ortfa st b itE the rne t0 / od 4 - L a p top c e ss v l a n 4 0 p ortfa st b itE the rne t0 / od 5 - 2 10 6 W L c e ss v l a n 5 0 p ortfa st b itE the rne t0 / od 5 - 12 5 2 AP c e ss v l a n 5 0 p ortfa st b itE the rne t0 / od 5 - 5 2 6 W L C c e ss v l a n 5 0 p ortfa st b itE the rne t0 / od 5 - 5 2 1 AP c e ss v l a n 5 0 p ortfa st b itE the rne t0 / od 5 - L a p top c e ss v l a n 5 0 p ortfa st b itE the rne t0 / od 6 - 2 10 6 W L c e ss v l a n 6 0 p ortfa st b itE the rne t0 / od 6 - 12 5 2 AP c e ss v l a n 6 0 p ortfa st b itE the rne t0 / od 6 - 5 2 6 W L C c e ss v l a n 6 0 p ortfa st b itE the rne t0 / od 6 - 5 2 1 AP c e ss v l a n 6 0 p ortfa st b itE the rne t0 / od 6 - L a p top c e ss v l a n 6 0 p ortfa st b itE the rne t0 / od 7 - 2 10 6 W L c e ss v l a n 7 0 p ortfa st b itE the rne t0 / od 7 - 12 5 2 AP c e ss v l a n 7 0 p ortfa st b itE the rne t0 / od 7 - 5 2 6 W L C c e ss v l a n 7 0 p ortfa st b itE the rne t0 / od 7 - 5 2 1 AP

18

19

2 0

2 1

2 2

2 3

2 4

2 5

2 6

2 7

2 8

2 9

3 0

3 1

3 2

3 3

3 4
C o u r s e A d m in is t r a t io n G u id e 99

switc hp ort a c c e ss v l a n 7 0 sp a nning-tre e p ortfa st inte rfa c e G iga b itE the rne t0 / d e sc rip tion P od 7 - L a p top switc hp ort a c c e ss v l a n 7 0 sp a nning-tre e p ortfa st inte rfa c e G iga b itE the rne t0 / d e sc rip tion P od 8 - 2 10 6 W L switc hp ort a c c e ss v l a n 8 0 sp a nning-tre e p ortfa st inte rfa c e G iga b itE the rne t0 / d e sc rip tion P od 8 - 12 5 2 AP switc hp ort a c c e ss v l a n 8 0 sp a nning-tre e p ortfa st inte rfa c e G iga b itE the rne t0 / d e sc rip tion P od 8 - 5 2 6 W L C switc hp ort a c c e ss v l a n 8 0 sp a nning-tre e p ortfa st inte rfa c e G iga b itE the rne t0 / d e sc rip tion P od 8 - 5 2 1 AP switc hp ort a c c e ss v l a n 8 0 sp a nning-tre e p ortfa st inte rfa c e G iga b itE the rne t0 / d e sc rip tion P od 8 - L a p top switc hp ort a c c e ss v l a n 8 0 sp a nning-tre e p ortfa st inte rfa c e G iga b itE the rne t0 / inte rfa c e G iga b itE the rne t0 / inte rfa c e G iga b itE the rne t0 / d e sc rip tion to V P N route r switc hp ort trunk e nc a p sul a switc hp ort trunk na tiv e v l switc hp ort m od e trunk inte rfa c e G iga b itE the rne t0 / inte rfa c e G iga b itE the rne t0 / d e sc rip tion to T S route r switc hp ort trunk e nc a p sul a switc hp ort m od e trunk inte rfa c e G iga b itE the rne t0 / switc hp ort a c c e ss v l a n 10 0 inte rfa c e G iga b itE the rne t0 / inte rfa c e G iga b itE the rne t0 / inte rfa c e G iga b itE the rne t0 / inte rfa c e G iga b itE the rne t0 / inte rfa c e G iga b itE the rne t0 / inte rfa c e G iga b itE the rne t0 / inte rfa c e T e nG iga b itE the rne inte rfa c e T e nG iga b itE the rne inte rfa c e V l a n1 ip a d d re ss 10 . 1. 1. 2 5 3 2 5 5 . inte rfa c e V l a n10 ip a d d re ss 10 . 10 . 1. 2 5 3 2 5 5 inte rfa c e V l a n2 0 ip a d d re ss 10 . 2 0 . 1. 2 5 3 2 5 5 inte rfa c e V l a n3 0 ip a d d re ss 10 . 3 0 . 1. 2 5 3 2 5 5 inte rfa c e V l a n4 0 ip a d d re ss 10 . 4 0 . 1. 2 5 3 2 5 5 inte rfa c e V l a n5 0 ip a d d re ss 10 . 5 0 . 1. 2 5 3 2 5 5 inte rfa c e V l a n6 0 ip a d d re ss 10 . 6 0 . 1. 2 5 3 2 5 5 inte rfa c e V l a n7 0 ip a d d re ss 10 . 7 0 . 1. 2 5 3 2 5 5 inte rfa c e V l a n8 0 ip a d d re ss 10 . 8 0 . 1. 2 5 3 2 5 5 inte rfa c e V l a n9 0 ip a d d re ss 9 0 . 9 0 . 9 0 . 2 5 3 2 5
1 0 0

3 5

3 6

3 7

3 8

3 9

4 0

4 1 4 2 4 3 tion d ot1q a n 9 9 4 4 4 5 tion d ot1q 4 6 4 7 4 8 4 9 5 0 5 1 5 2 t0 / 1 t0 / 2 2 5 5 . 2 5 5 . 0 . 2 5 5 . 2 5 5 . 0 . 2 5 5 . 2 5 5 . 0 . 2 5 5 . 2 5 5 . 0 . 2 5 5 . 2 5 5 . 0 . 2 5 5 . 2 5 5 . 0 . 2 5 5 . 2 5 5 . 0 . 2 5 5 . 2 5 5 . 0 . 2 5 5 . 2 5 5 . 0 5 . 2 5 5 . 2 5 5 . 0


N E ) v 1 .0 20 0 8 C i s c o S y s t e m s , I n c .

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

ip c l a ssl e ss ip http se rv e r ip http a uthe ntic a tion ip http se c ure -se rv e r c ontrol -p l a ne p riv il e ge d hc p l e v e l 1 p riv il e ge d hc p l e v e l 1 p riv il e ge d hc p l e v e l 1 p riv il e ge d hc p l e v e l 1 p riv il e ge d hc p l e v e l 1 p riv il e ge d hc p l e v e l 1 p riv il e ge d hc p l e v e l 1 p riv il e ge d hc p l e v e l 1 p riv il e ge d hc p l e v e l 1 p riv il e ge inte rfa c e l e v p riv il e ge inte rfa c e l e v p riv il e ge inte rfa c e l e v p riv il e ge inte rfa c e l e v p riv il e ge inte rfa c e l e v p riv il e ge inte rfa c e l e v p riv il e ge inte rfa c e l e v p riv il e ge c onfigure l e v p riv il e ge c onfigure l e v p riv il e ge c onfigure l e v p riv il e ge c onfigure l e v p riv il e ge c onfigure l e v p riv il e ge c onfigure l e v p riv il e ge c onfigure l e v p riv il e ge c onfigure l e v p riv il e ge e x e c l e v e l 1 p riv il e ge e x e c l e v e l 1 p riv il e ge e x e c l e v e l 1 p riv il e ge e x e c l e v e l 1 l ine c on 0 l ine v ty 0 4 p a ssword c isc o l ogin l oc a l l e ngth 0 l ine v ty 5 15 p a ssword c isc o l ogin l oc a l e nd

l oc a l d e fa ul t-route r ne twork d ns-se rv e r op tion d om a in-na m e l e a se ne tb ios-na m e -se rv e r op tion 6 0 a sc ii op tion 4 3 a sc ii e l 1 switc hp ort e l 1 switc hp ort m od e trunk e l 1 switc hp ort trunk e nc a p d ot e l 1 switc hp ort trunk na tiv a v l a n e l 1 switc hp ort trunk na tiv e v l a n e l 1 switc hp ort a c c e ss e l 1 switc hp ort a c c e ss v l a n e l 1 inte rfa c e e l 1 inte rfa c e switc hp ort e l 1 ip d hc p e l 1 ip d hc p p ool e l 1 ip d hc p e x c l ud e d -a d d re ss e l 1 ip d hc p p ool d e fa ul t-route r e l 1 ip d hc p p ool te st d e fa ul t-route r e l 1 inte rfa c e switc hp ort m od e trunk c onfigure te rm ina l show run switc hp ort p ing

20 0 8 C i s c o S y s t e m s , I n c .

C o u r s e A d m in is t r a t io n G u id e

1 0 1

1 0 2

I m p le m e n t in g C is c o U n if ie d W ir e le s s N e t w o r k in g E s s e n t ia ls ( I U W

N E ) v 1 .0

20 0 8 C i s c o S y s t e m s , I n c .

Вам также может понравиться