Cisco WAP121 Admin Guide
Cisco WAP121 Admin Guide
GUIDE
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks,
go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner
does not imply a partnership relationship between Cisco and any other company. (1110R)
78-20373-02
Contents
7
7
Logging Out
Getting Started
12
Window Navigation
13
13
Navigation Pane
13
Management Buttons
14
15
System Summary
15
Network Interfaces
17
Traffic Statistics
18
18
Associated Clients
19
21
23
TSPEC AP Statistics
24
Radio Statistics
25
26
Log
27
Chapter 3: Administration
28
System Settings
29
User Accounts
29
Adding a User
30
30
Time Settings
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
31
Contents
Log Settings
33
33
34
Email Alert
Email Alert Examples
HTTP/HTTPS Service
35
37
38
38
39
40
Upgrade Firmware
41
TFTP Upgrade
41
HTTP Upgrade
42
Firmware Recovery
43
45
45
46
47
Copy/Save Configuration
47
Reboot
48
DiscoveryBonjour
49
Packet Capture
49
50
51
52
55
Support Information
Chapter 4: LAN
56
57
Port Settings
57
58
IPv6 Addresses
59
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
Contents
Chapter 5: Wireless
62
Radio
62
Rogue AP Detection
69
70
72
72
Networks
73
73
VLAN IDs
74
Configuring VAPs
74
77
None (Plain-text)
77
Static WEP
77
Dynamic WEP
79
WPA Personal
81
WPA Enterprise
83
Scheduler
85
85
86
Scheduler Association
87
Bandwidth Utilization
88
MAC Filtering
88
88
89
WDS Bridge
90
92
92
WorkGroup Bridge
93
Quality of Service
96
WPS Setup
99
WPS Overview
Usage Scenarios
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
99
100
Contents
WPS Roles
101
101
102
Client Enrollment
102
103
Lockdown Capability
103
104
External Registration
104
105
105
WPS Process
105
107
107
107
108
109
109
110
RADIUS Server
110
802.1X Supplicant
112
Password Complexity
114
WPA-PSK Complexity
115
116
116
ACL
116
IPv4 and IPv6 ACLs
117
MAC ACLs
117
Configuring ACLs
117
Class Map
124
124
125
Policy Map
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
129
Contents
130
132
134
SNMP Overview
134
135
Views
137
Groups
138
Users
140
Targets
141
143
144
Instance Configuration
145
Instance Association
148
148
151
Local Groups
152
Local Users
153
Authenticated Clients
154
155
157
157
158
159
160
160
Access Points
Configuring the WAP Device for Single Point Setup
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
162
162
Contents
164
164
165
165
166
Sessions
166
Channel Management
167
169
169
170
Wireless Neighborhood
Viewing Details for a Cluster Member
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
170
171
173
1
Getting Started
This chapter provides an introduction to the Wireless Access Point (WAP) devices
web-based configuration utility, and includes these topics:
Getting Started
Window Navigation
Browser Restrictions
If you are using Internet Explorer 6, you cannot directly use an IPv6 address
to access the WAP device. You can, however, use the Domain Name System
(DNS) server to create a domain name that contains the IPv6 address, and
then use that domain name in the address bar in place of the IPv6 address.
When using Internet Explorer 8, you can configure security settings from
Internet Explorer. Select Tools > Internet Options and then select the
Security tab. Select Local Intranet and select Sites. Select Advanced and
then select Add. Add the intranet address of the WAP device (http://<ip-
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
Getting Started
Starting the Web-Based Configuration Utility
address>) to the local intranet zone. The IP address can also be specified
as the subnet IP address, so that all addresses in the subnet are added to
the local intranet zone.
If you have multiple IPv6 interfaces on your management station, use the
IPv6 global address instead of the IPv6 local address to access the WAP
device from your browser.
Enter the IP address of the WAP device that you are configuring in the address bar
on the browser and then press Enter. The Login page opens.
To find your IP address, you can use the Cisco FindIT Network Discovery
Utility. This tool enables you to automatically discover all supported Cisco
Small Business devices in the same local network segment as your
computer. For more information, go to cisco.com and enter www.cisco.com/
go/findit.
For further instructions on how to locate the IP address of your WAP device,
see the WAP device Quick Start Guide.
STEP 2 Enter the user name and password. The factory default user name is cisco and the
If this is the first time that you logged on with the default user name (cisco) and the
default password (cisco) or your password has expired, the Change Admin
Password page opens. Enter the new password and confirm it, click Apply, and
then click Close. The new password is saved. Then, enter the user name cisco and
the new password on the Login page.
See Using the Access Point Setup Wizard for instructions on using the wizard.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
Getting Started
Using the Access Point Setup Wizard
Logging Out
By default, the configuration utility logs out after 10 minutes of inactivity. See
HTTP/HTTPS Service for instructions on changing the default timeout period.
To log out, click Logout in the top right corner of the configuration utility.
can then change the default password for logging in. For all other settings, the
factory default configurations apply.
You must log in again after changing your password.
STEP 1 Click Next on the Welcome page of the Wizard. The Configure Device - IP
and specify a New Cluster Name. When you configure your devices with the
same cluster name and enable Single Point Setup mode on other WAP devices,
they automatically join the group.
If you already have a cluster on your network, you can add this device to it by
clicking Join an Existing Cluster, and then entering the Existing Cluster Name.
If you do not want this device to participate in a Single Point Setup at this time,
click Do not Enable Single Point Setup.
(Optional) You can enter text in the AP Location field to note the physical location
of the WAP device.
STEP 5 Click Next. The Configure Device - Set System Date and Time window appears.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
Getting Started
Using the Access Point Setup Wizard
STEP 6 Select your time zone, and then set the system time manually or set up the WAP
device to get its time from an NTP server. For a description of these options, see
Time Settings.
STEP 7 Click Next. The Enable Security - Set Password window appears.
STEP 8 Enter a New Password and enter it again in the Confirm Password text box. For
network.
STEP 11 Click Next. The Enable Security - Secure Your Wireless Network window appears.
STEP 12 Choose a security encryption type and enter a security key. For a description of
It is suggested that you assign a different VLAN ID from the default (1) to wireless
traffic, in order to segregate it from management traffic on VLAN 1.
STEP 15 Click Next.
For the WAP121 device, the Wizard displays the Summary - Confirm Your Settings
window. Skip to STEP 24.
For the WAP321 device, the Wizard displays the Enable Captive Portal - Create
Your Guest Network window.
STEP 16 Select whether or not to set up an authentication method for guests on your
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
10
Getting Started
Using the Access Point Setup Wizard
STEP 18 Click Next. The Wizard displays the Enable Captive Portal - Secure Your Guest
Network window.
STEP 19 Choose a security encryption type for the guest network and enter a security key.
window.
STEP 21 Specify a VLAN ID for the guest network. The guest network VLAN ID should be
window.
STEP 23 Select Enable Redirect URL and specify a fully qualified domain name or IP
address in the Redirect URL field (including http://). If specified, guest network
users are redirected to the specified URL after authenticating.
STEP 24 Click Next. The Wizard displays the Summary - Confirm Your Settings window.
STEP 25 Review the settings that you configured. Click Back to reconfigure one or more
settings. If you click Cancel, all settings are returned to the previous or default
values.
STEP 26 If they are correct, click Submit. Your WAP setup settings are saved and a
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
11
Getting Started
Getting Started
Getting Started
To simplify device configuration through quick navigation, the Getting Started
page provides links for performing common tasks. The Getting Started page is the
default window every time you log into the configuration utility.
Linked Page
Initial Setup
Radio
Networks
LAN
Run WPS
WPS Setup
Device
Status
System Summary
System Summary
Wireless Status
Network Interfaces
Quick
Access
User Accounts
Upgrade Firmware
Backup/Restore Configuration
Download/Backup
Configuration File
Support
Forums
Other
Resources
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
12
Getting Started
Window Navigation
Window Navigation
This section describes the features of the configuration utility.
Buttons
Button Name
Description
(User)
Log Out
About
Help
Navigation Pane
A navigation pane, or main menu, is located on the left side of each page. The
navigation pane is a list of the top-level features of the WAP devices. If a main
menu item is preceded by an arrow, select to expand and display the submenu of
each group. You can then select on the desired submenu item to open the
associated page.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
13
Getting Started
Window Navigation
Management Buttons
The table below describes the commonly used buttons that appear on various
pages in the system.
Management Buttons
Button Name
Description
Add
Cancel
Clear All
Delete
Edit
Refresh
Save
Update
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
14
2
Status and Statistics
This chapter describes how to display status and statistics and contains these
topics:
System Summary
Network Interfaces
Traffic Statistics
Associated Clients
TSPEC AP Statistics
Radio Statistics
Log
System Summary
The System Summary page shows basic information such as the hardware model
description, software version, and the time that has elapsed since the last reboot.
To view system information, select Status and Statistics > System Summary in
the navigation pane. Or, select System Summary under Device Status on the
Getting Started page.
The System Summary page shows this information:
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
15
System UptimeThe time that has elapsed since the last reboot.
The TCP/UDP Service table shows basic information about protocols and
services operating on the WAP.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
16
Time WaitThe closing sequence has been initiated and the WAP is
waiting for a system-defined timeout period (typically 60 seconds)
before closing the connection.
You can click Refresh to refresh the screen and show the most current information.
Network Interfaces
Use the Network Interfaces page to show configuration and status information
about the wired and wireless interfaces. To show the Network Interfaces page,
select Status and Statistics > Network Interface in the navigation pane.
The Network Interfaces page shows this information:
Interface StatusThis table lists status information for each Virtual Access
Point (VAP) and on each Wireless Distribution System (WDS) interface.
If the VAP has been configured, the table lists the SSID, the administrative
status (up or down), the MAC address of the radio interface, the VLAN ID,
the name of any associated scheduler profile, and the current state (active
or inactive). The state indicates whether the VAP is exchanging data with a
client.
You can click Refresh to refresh the screen and show the most current information.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
17
Traffic Statistics
Use the Traffic Statistics page to view basic information about the WAP. It also
provides a real-time display of transmit and receive statistics for the Ethernet
interface, the Virtual Access Points (VAPs), and any WDS interfaces. All transmit
and receive statistics reflect the totals since the WAP was last started. If you
reboot the WAP, these figures indicate transmit and receive totals since the reboot.
To show the Traffic Statistics page, select Status and Statistics > Traffic
Statistics in the navigation pane.
The Traffic Statistics page shows summary data and statistics for traffic in each
direction.
Total PacketsThe total packets sent (in Transmit table) or received (in
Received table) by this WAP device.
Total BytesThe total bytes sent (in Transmit table) or received (in
Received table) by this WAP device.
Total Dropped BytesThe total number of dropped bytes sent (in Transmit
table) or received (in Received table) by this WAP device.
You can click Refresh to refresh the screen and show the most current information.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
18
VLAN IDVirtual LAN (VLAN) ID. You can use VLANs to establish multiple
internal and guest networks on the same WAP device. The VLAN ID is set on
the VAP tab.See Configuring VAPs.
Additional information appears for the transmit and receive direction for each
WorkGroup Bridge interface:
Total BytesThe total number of bytes bridged between the wired clients
in the WorkGroup Bridge and the wireless network.
You can click Refresh to refresh the screen and show the most current information.
Associated Clients
You can use the Associated Clients page to view the client stations associated
with a particular access point.
To show the Associated Clients page, select Status and Statistics > Associated
Clients in the navigation pane.
The associated stations are shown along with information about packet traffic
transmitted and received for each station.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
19
If the WAP device uses IEEE 802.1X or WPA security, it is possible for a
client association to appear as authenticated (through IEEE 802.11
security) although it is not actually authenticated through the second
layer of security.
From Station/To StationFor the From Station, the counters indicate the
packets or bytes received by the wireless client. For the To Station, the
counters indicate the number of packets and bytes transmitted from the
WAP device to the wireless client.
-
Up TimeThe amount of time the client has been associated with the WAP
device.
You can click Refresh to refresh the screen and show the most current information.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
20
bidirectional
User PriorityUser Priority (UP) for this TS. The UP is sent with each
packet in the UP portion of the IP header. Typical values are as follows:
-
6 or 7 for voice
4 or 5 for video
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
21
Excess Usage EventsNumber of times that the client has exceeded the
medium time established for its TSPEC. Minor, infrequent violations are
ignored.
Statistics:
DirectionThe traffic direction for this TS. Direction can be one of these
options:
bidirectional
From StationShows the number of packets and bytes received from the
wireless client and the number of packets and bytes that were dropped
after being received.
-
You can click Refresh to refresh the screen and show the most current information.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
22
Real-time transmit and receive statistics for the radio interface and the
network interface(s).
All of the transmit and receive statistics shown are totals since the WAP device
was last started. If you reboot the WAP device, these figures indicate transmit and
receive totals since the reboot.
To view TSPEC status and statistics, select Status and Statistics > TSPEC Status
and Statistics in the navigation pane.
The TSPEC Status and Statistics page provides this status information for the
WLAN (Radio) and VAP interfaces:
StatusWhether the TSPEC session is enabled (up) or not (down) for the
corresponding Access Category.
NOTE Status is a configuration status (it does not necessarily represent the
Medium Time AdmittedTime allocated for this Access Category over the
transmission medium to carry data. This value should be less than or equal
to the maximum bandwidth allowed over the medium for this TS.
These statistics appear separately for the transmit and receive paths on the
wireless radio interface:
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
23
These statistics appear separately for the transmit and receive paths on the
network interfaces (VAPs):
Total Voice BytesTotal TS voice bytes sent (in Transmit table) or received
(in Received table) by this WAP device for this VAP.
You can click Refresh to refresh the screen and show the most current information.
TSPEC AP Statistics
The TSPEC AP Statistics page provides information on the voice and video Traffic
Streams accepted and rejected by the WAP device. To view the TSPEC AP
Statistics page, select Status and Statistics > TSPEC AP Statistics in the
navigation pane.
You can click Refresh to refresh the screen and show the most current information.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
24
Radio Statistics
You can use the Radio Statistics page to show packet-level and byte-level
statistics for the wireless radio interface. To view the Radio Statistics page, select
Status and Statistics > Radio Statistics in the navigation pane.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
25
You can click Refresh to refresh the screen and show the most current information.
Email Alert StatusThe Email Alert configured status. The status is either
Enabled or Disabled. The default is Disabled.
Time Last Email SentThe day, date, and time when the last email was
sent.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
26
Log
The Log page shows a list of system events that generated a log entry, such as
login attempts and configuration changes. The log is cleared upon a reboot and
can be cleared by an administrator. Up to 512 events can be shown. Older entries
are removed from the list as needed to make room for new events.
To view the Log page, select Status and Statistics > Log Status in the navigation
pane.
You can click Refresh to refresh the screen and show the most current information.
You can click Clear All to clear all entries from the log.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
27
3
Administration
This chapter describes how to configure global system settings and perform
diagnostics.
It contains these topics:
System Settings
User Accounts
Time Settings
Log Settings
Email Alert
HTTP/HTTPS Service
Upgrade Firmware
Firmware Recovery
Copy/Save Configuration
Reboot
DiscoveryBonjour
Packet Capture
Support Information
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
28
Administration
System Settings
System Settings
The System Settings page enables you to configure information that identifies the
WAP device within the network.
To configure system settings:
STEP 1 Select Administration > System Settings in the navigation pane.
STEP 2 Enter the parameters:
System ContactA contact person for the WAP device. The System
Contact can be 0 to 255 characters long and can include spaces and special
characters.
STEP 3 Click Save. The changes are saved to the Startup Configuration.
User Accounts
One management user is configured on the WAP device by default:
Password: cisco
You can use the User Accounts page to configure up to four additional users and to
change a user password.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
29
Administration
User Accounts
Adding a User
To add a new user:
STEP 1 Select Administration > User Accounts in the navigation pane.
The User Account Table shows the currently configured users. The user cisco is
preconfigured in the system to have Read/Write privileges.
All other users can have Read Only Access, but not Read/Write access.
STEP 2 Click Add. A new row of text boxes appears.
STEP 3 Check the box for the new user and select Edit.
STEP 4 Enter a User Name between 1 to 32 alphanumeric characters. Only numbers 0 to
STEP 6 Click Save. The changes are saved to the Startup Configuration.
NOTE To delete a user, select the check box next to the user name and select Delete. To
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
30
Administration
Time Settings
The User Account Table shows the currently configured users. The user cisco is
preconfigured in the system to have Read/Write privileges. The password for the
user cisco can be changed.
STEP 2 Select the user to configure and click Edit.
STEP 3 Enter a New Password between 1 and 64 characters and then enter the same
STEP 4 Click Save. The changes are saved to the Startup Configuration.
NOTE If you change your password, you must log in again to the system.
Time Settings
A system clock provides a network-synchronized time-stamping service for
software events such as message logs. You can configure the system clock
manually or configure the WAP device as a Network Time Protocol (NTP) client
that obtains the clock data from a server.
Use the Time Settings page to set the system time manually or to configure the
system to acquire its time settings from a preconfigured NTP server. By default,
the WAP device is configured to obtain its time from a predefined list of NTP
servers.
The current system time appears at the top of the page, along with the System
Clock Source option.
To use NTP to have the WAP device automatically acquire its time settings:
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
31
Administration
Time Settings
STEP 1 For the System Clock Source field, select Network Time Protocol (NTP).
STEP 2 Configure these parameters:
STEP 3 Select Adjust Time for Daylight Savings if daylight savings time is applicable to
Daylight Savings StartSelect the week, day, month, and time when
daylight savings time starts.
Daylight Savings EndSelect the week, day, month, and time when
daylight savings time ends.
STEP 4 Click Save. The changes are saved to the Startup Configuration.
System DateSelect the current month, day, and year date from the dropdown lists.
System TimeSelect the current hour and minutes in 24-hour clock format,
such as 22:00:00 for 10 p.m.
STEP 3 Select Adjust Time for Daylight Savings if daylight savings time is applicable to
Daylight Savings StartSelect the week, day, month, and time when
daylight savings time starts.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
32
Administration
Log Settings
Daylight Savings EndSelect the week, day, month, and time when
daylight savings time ends.
STEP 4 Click Save. The changes are saved to the Startup Configuration.
Log Settings
You can use the Log Settings page to enable log messages to be saved in
permanent memory. You can also send logs to a remote host.
!
CAUTION Enabling persistent logging can wear out the flash (nonvolatile) memory and
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
33
Administration
Log Settings
STEP 3 Click Save. The changes are saved to the Startup Configuration.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
34
Administration
Email Alert
UDP PortThe logical port number for the syslog process on the remote
host. The range is from 1 to 65535. The default port is 514.
Using the default port is recommended. If you choose to reconfigure the log
port, make sure that the port number you assign to syslog is available for use.
STEP 3 Click Save. The changes are saved to the Startup Configuration.
If you enabled a Remote Log host, clicking Save activates remote logging. The
WAP device sends its kernel messages real-time for display to the remote log
server monitor, a specified kernel log file, or other storage, depending on your
configurations.
If you disabled a Remote Log host, clicking Save disables remote logging.
NOTE After new settings are saved, the corresponding processes may be stopped and
restarted. When this happens, the WAP device may lose connectivity. We
recommend that you change WAP device settings when a loss of connectivity will
least affect your wireless clients.
Email Alert
Use the email alert feature to send messages to the configured email addresses
when particular system events occur.
The feature supports mail server configuration, message severity configuration,
and up to three email address configurations to send urgent and non-urgent email
alerts.
TIP
Do not use your personal email address, which would unnecessarily expose your
personal email login credentials. Use a separate email account instead. Also be
aware that many email accounts keep a copy of all sent messages by default.
Anyone with access to this email account has access to the sent messages.
Review your email settings to ensure that they are appropriate for the privacy
policy of your business.
To configure the WAP device to send email alerts:
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
35
Administration
Email Alert
From Email AddressEnter the address to show as the sender of the email.
The address is a 255 character string with only printable characters. No
address is configured by default.
Data EncryptionEnter the mode of security for the outbound email alert.
The alert can be sent using secure TLS protocol or the default Open
protocol. Using secure TLSv1 protocol can prevent eavesdropping and
tampering during the communication across the public network.
PortEnter the SMTP port number to use for outbound emails. The range is
a valid port number from 0 to 65535. The default port is 465. The port
generally depends on the mode used by the email provider.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
36
Administration
Email Alert
UsernameEnter the username for the email account that will be used to
send these emails. Typically (but not always) the username is the full email
address including the domain (such as [email protected]). The specified
account will be used as the email address of the sender. The username can
be from 1 to 64 alphanumeric characters.
PasswordEnter the password for the email account that will be used to
send these emails. The password can be from 1 to 64 characters.
Email SubjectEnter the text to appear in the email subject line. This can be
up to a 255 character alphanumeric string.
STEP 5 Click Test Mail to send a test email to validate the configured email account.
STEP 6 Click Save. The changes are saved to the Startup Configuration.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
37
Administration
HTTP/HTTPS Service
HTTP/HTTPS Service
Use the HTTP/HTTPS Service page to enable and configure web-based
management connections. If HTTPS is used for secure management sessions, you
also use the HTTP/HTTPS Service page to manage the required SSL certificates.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
38
Administration
HTTP/HTTPS Service
HTTP PortThe logical port number to use for HTTP connections, from
1025 to 65535. The default port number for HTTP connections is the wellknown IANA port number 80.
HTTPS PortThe logical port number to use for HTTP connections, from
1025 to 65535. The default port number for HTTP connections is the wellknown IANA port number 443.
STEP 4 Click Save. The changes are saved to the Startup Configuration.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
39
Administration
Management Access Control
If an SSL certificate (with a .pem extension) exists on the WAP device, you can
download it to your computer as a backup. In the Download SSL Certificate (From
Device to PC) area, select HTTP or TFTP for the Download Method and click
Download.
If you select HTTP, you are prompted to confirm the download and then to
browse to the location to save the file on your network.
If you select TFTP, additional fields appear to enable you to enter the File
Name to assign to the downloaded file, and enter the TFTP server address
where the file will be downloaded.
You can also upload a certificate file (with a .pem extension) from your computer to
the WAP device. In the Upload SSL Certificate (From PC to Device) area, select
HTTP or TFTP for the Upload Method.
For HTTP, browse to the network location, select the file, and click Upload.
For TFTP, enter the File Name as it exists on the TFTP server and the TFTP
Server IPv4 Address, then click Upload. The filename cannot contain the
following characters: spaces, <, >, |, \, : , (, ), &, ; , #, ? , *, and two or more
successive periods.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
40
Administration
Upgrade Firmware
!
CAUTION Verify any IP address that you enter. If you enter an IP address that does not match
your Administrative computer, you will lose access to the configuration interface. It
is highly recommend to give the Administrative computer a static IP address, so the
address does not change over time.
To create an access list:
STEP 1 Select Administration > Management Access Control in the navigation pane.
STEP 2 Select Enable for the Management ACL Mode.
STEP 3 Enter up to five IPv4 and five IPv6 addresses that will be allowed access.
STEP 4 Verify the IP addresses are correct.
STEP 5 Click Save. The changes are saved to the Startup Configuration.
Upgrade Firmware
As new versions of the WAP device firmware become available, you can upgrade
the firmware on your devices to take advantage of new features and
enhancements. The WAP device uses a TFTP or HTTP client for firmware
upgrades.
After you upload new firmware and the system reboots, the newly added
firmware becomes the primary image. If the upgrade fails, the original firmware
remains as the primary image.
NOTE When you upgrade the firmware, the access point retains the existing configuration
information.
TFTP Upgrade
To upgrade the firmware on an access point using TFTP:
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
41
Administration
Upgrade Firmware
The Product ID (PID) and active and inactive firmware versions appear.
STEP 2 Select TFTP for Transfer Method.
STEP 3 Enter a name (1 to 256 characters) for the image file in the Source File Name field,
including the path to the directory that contains the image to upload.
For example, to upload the ap_upgrade.tar image located in the /share/builds/ap
directory, enter: /share/builds/ap/ap_upgrade.tar
The firmware upgrade file supplied must be a tar file. Do not attempt to use bin
files or files of other formats for the upgrade; these types of files do not work.
The filename cannot contain the following items: spaces, <, >, |, \, : , (, ), &, ; , #, ? , *,
and two or more successive periods.
STEP 4 Enter the TFTP Server IPv4 Address and click Upgrade.
Uploading the new software may take several minutes. Do not refresh the page or
navigate to another page while uploading the new software, or the software
upload is aborted. When the process is complete the access point restarts and
resumes normal operation.
STEP 5 To verify that the firmware upgrade completed successfully, log into the user
interface and display the Upgrade Firmware page and view the active firmware
version.
HTTP Upgrade
To upgrade using HTTP:
STEP 1 Select HTTP for Transfer Method.
STEP 2 If you know the name and path to the new file, enter it in the Source File Name
field. Otherwise, click the Browse button and locate the firmware image file on
your network.
The firmware upgrade file supplied must be a tar file. Do not attempt to use bin
files or files of other formats for the upgrade; these types of files do not work.
STEP 3 Click Upgrade to apply the new firmware image.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
42
Administration
Firmware Recovery
Uploading the new software may take several minutes. Do not refresh the page or
navigate to another page while uploading the new software, or the software
upload is aborted. When the process is complete, the access point restarts and
resumes normal operation.
STEP 4 To verify that the firmware upgrade completed successfully, log into the user
interface, display the Upgrade Firmware page, and view the active firmware
version.
Firmware Recovery
The WAP device has a firmware recovery feature that enables the restoration of a
valid image on the WAP device after a failed download. If the power goes down
during an image download, the WAP device might not be able to boot. In this
event, although the image is not usable, the boot loader file that loads the firmware
image from flash memory to RAM should continue to be functional. An HTTP
server is embedded in the boot loader file, enabling the administrator to connect
to the WAP device over the LAN port and use a web browser to download and
install a new firmware image.
The WAP device enters the HTTP firmware recovery mode when it is booted and
the boot loader cannot find a valid image in flash memory. In this mode, the boot
loader sets the internal network port to the following static IP address:
IP Address: 192.168.1.254
An HTTP server starts and listens for client connections on port 80.
NOTE The Firmware Recovery page is shown in the web-based configuration utility only
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
43
Administration
Firmware Recovery
NOTE You can access the system across a network if the default gateway IP
address is 192.168.1.1.
STEP 3 Open a web browser and enter the IP address of the switch in the address bar
(192.168.1.254).
NOTE The HTTP firmware recovery features support the following
browsers:
-
A progress bar appears while the file is downloading. The following message
appears upon a successful download:
100% Complete
File downloaded successfully. Please wait while the file is being written to
flash. System will automatically reboot.
The file selected by administrator is downloaded to RAM and is validated for the
following conditions:
The STK file size is within the partition limits (4.5 MB is reserved for this file).
If these conditions are met, the file is written to flash memory and the system is
rebooted using the new firmware.
If any of these checks fail, the image is not written to flash memory and the
recovery process is stopped. You can restart the recovery process with a correct
image file.
If the transfer is aborted because the browser window is refreshed or closed, the
session is cleared and the session times out immediately. If the transfer is aborted
because the network is unreachable, the session times out after 45 seconds. After
the session times out, you can begin the recovery process again.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
44
Administration
Download/Backup Configuration File
NOTE In addition to downloading and uploading these files to another system, you can
copy them to different file types on the WAP device. See Copy/Save
Configuration.
pane.
STEP 2 Select Via TFTP or Via HTTP/HTTPS as the Transfer Method.
STEP 3 Select Backup (AP to PC) as the Save Action.
STEP 4 For a TFTP backup only, enter the Destination File Name with an .xml extension.
Also include the path where the file is to be placed on the server and then enter
the TFTP Server IPv4 Address.
The filename cannot contain the following characters: spaces, <, >, |, \, : , (, ), &, ; , #,
? , *, and two or more successive periods.
STEP 5 For a TFTP backup only, enter the TFTP Server IPv4 Address.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
45
Administration
Download/Backup Configuration File
STEP 7 Click Save to begin the backup. For HTTP backups, a window appears to enable
pane.
STEP 2 Select Via TFTP or Via HTTP/HTTPS as the Transfer Method.
STEP 3 Select Download (PC to AP) as the Save Action.
STEP 4 For a TFTP download only, enter the Source File Name with an .xml extension.
Include the path (where the file exists on the server) and enter the TFTP Server
IPv4 Address.
The filename cannot contain the following characters: spaces, <, >, |, \, : , (, ), &, ; , #,
? , *, and two or more successive periods.
STEP 5 Select which configuration file on the WAP device that you want replaced with the
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
46
Administration
Configuration Files Properties
If the downloaded file overwrites the Startup Configuration file, and the file passes
a validity check, then the downloaded configuration takes effect the next time the
WAP device reboots.
STEP 6 Click Save to begin the upgrade or backup. For HTTP downloads, a window
appears to enable you to browse to select the file to download. When the
download is finished, a window indicates success.
!
CAUTION Ensure that power to the WAP device remains uninterrupted while the configuration
Copy/Save Configuration
The Copy/Save Configuration page enables you to copy files within the WAP
device file system. For example, you can copy the Backup Configuration file to the
Startup Configuration file type, so that it is used the next time you boot up the
WAP device.
To copy a file to another file type:
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
47
Administration
Reboot
STEP 3 For the Destination File Name, select the file type to be replaced with the file you
are copying.
STEP 4 Click Save to begin the copy process.
Reboot
You can use the Reboot page reboot the WAP device.
STEP 1 To reboot the WAP, select Administration > Reboot in the navigation pane.
STEP 2 Select one of these options:
A window appears to enable you to confirm or cancel the reboot. The current
management session might be terminated.
STEP 3 Click OK to reboot.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
48
Administration
DiscoveryBonjour
DiscoveryBonjour
Bonjour enables the WAP device and its services to be discovered by using
multicast DNS (mDNS). Bonjour advertises services to the network and answers
queries for the service types that it supports, simplifying network configuration in
small business environments.
The WAP device advertises these service types:
Packet Capture
The wireless packet capture feature enables capturing and storing packets
received and transmitted by the WAP device. The captured packets can then be
analyzed by a network protocol analyzer, for troubleshooting or performance
optimization. There are two methods of packet capture:
Local capture method Captured packets are stored in a file on the WAP
device. The WAP device can transfer the file to a TFTP server. The file is
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
49
Administration
Packet Capture
Click Administration > Packet Capture to show the Packet Capture page. From
the Packet Capture page you can:
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
50
Administration
Packet Capture
Client Filter MAC AddressSpecifies the MAC address for WLAN client
filtering.
NOTE The MAC filter is active only when a capture is performed on an
802.11 interface.
STEP 2 Depending on the selected method, refer to the steps in the Local Packet Capture
capture is restarted. Modifying the parameters while the packet capture is running
does not affect the current packet capture session. To begin using new parameter
values, an existing packet capture session must be stopped and restarted.
VAP0VAP0 traffic.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
51
Administration
Packet Capture
Capture DurationEnter the time duration in seconds for the capture. The
range is from 10 to 3600. The default is 60.
Max Capture File SizeEnter the maximum allowed size for the capture file
in KB. The range is from 64 to 4096. The default is 1024.
STEP 3 Click Save. The changes are saved to the Startup Configuration.
STEP 4 Click Start Capture.
In Packet File Capture mode, the WAP device stores captured packets in the RAM
file system. Upon activation, the packet capture proceeds until one of these events
occurs:
The Packet Capture Status area of the page shows the status of a packet capture,
if one is active on the WAP device.
Click Refresh to show the latest data from the WAP device.
NOTE To stop a packet file capture, click Stop Capture.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
52
Administration
Packet Capture
A Microsoft Windows computer running the Wireshark tool allows you to display,
log, and analyze captured traffic. The remote packet capture facility is a standard
feature of the Wireshark tool for Windows. Linux version does not work with the
WAP device.
When remote capture mode is in use, the WAP device does not store any captured
data locally in its file system.
If a firewall is installed between the Wireshark computer and the WAP device, the
traffic for these ports must be allowed to pass through the firewall. The firewall
must also be configured to allow the Wireshark computer to initiate a TCP
connection to the WAP device.
To initiate a remote capture on a WAP device:
STEP 1 Click Administration > Packet Capture.
STEP 2 Enable Promiscuous Capture.
STEP 3 For the Packet Capture Method, select Remote.
STEP 4 For the Remote Capture Port, use the default port (2002), or if you are using a
port other than the default, enter the desired port number used for connecting
Wireshark to the WAP device. The port range is from 1025 to 65530.
STEP 5 If you want to save the settings for use at another time, click Save. (The selection
default, or enter the port number if you used a port other than the default.
STEP 6 Click OK.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
53
Administration
Packet Capture
STEP 7 Select the interface from which you need to capture packets. At the Wireshark
popup window, next to the IP address, there is a pull-down list for you to select the
interfaces. The interface can be one of the following:
Linux bridge interface in the wap device
--rpcap://[192.168.1.220]:2002/brtrunk
Wired LAN interface
-- rpcap://[192.168.1.220]:2002/eth0
VAP0 traffic on radio 1
-- rpcap://[192.168.1.220]:2002/wlan0
802.11 traffic
-- rpcap://[192.168.1.220]:2002/radio1
At WAP321, VAP1 ~ VAP7 traffic
-- rpcap://[ 192.168.1.220]:2002/wlan0vap1 ~ wlan0vap7
At WAP321, VAP1 ~ VAP3 traffic
-- rpcap://[ 192.168.1.220]:2002/wlan0vap1 ~ wlan0vap3
You can trace up to four interfaces on the WAP device at the same time. However,
you must start a separate Wireshark session for each interface. To initiate
additional remote capture sessions, repeat the Wireshark configuration steps; no
configuration needs to be done on the WAP device.
NOTE The system uses four consecutive port numbers, starting with the configured port
for the remote packet capture sessions. Verify that you have four consecutive port
numbers available. We recommend that if you do not use the default port, use a port
number greater than 1024.
When you are capturing traffic on the radio interface, you can disable beacon
capture, but other 802.11 control frames are still sent to Wireshark. You can set up
a display filter to show only:
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
54
Administration
Packet Capture
In remote capture mode, traffic is sent to the computer running Wireshark through
one of the network interfaces. Depending on the location of the Wireshark tool, the
traffic can be sent on an Ethernet interface or one of the radios. To avoid a traffic
flood caused by tracing the packets, the WAP device automatically installs a
capture filter to filter out all packets destined to the Wireshark application. For
example, if the Wireshark IP port is configured to be 58000, then this capture filter
is automatically installed on the WAP device:
not portrange 58000-58004
Due to performance and security issues, the packet capture mode is not saved in
NVRAM on the WAP device; if the WAP device resets, the capture mode is
disabled and then you must reenable it to resume capturing traffic. Packet capture
parameters (other than mode) are saved in NVRAM.
Enabling the packet capture feature can create a security issue: Unauthorized
clients may be able to connect to the WAP device and trace user data. The
performance of the WAP device also is negatively impacted during packet
capture, and this impact continues to a lesser extent even when there is no active
Wireshark session. To minimize the performance impact on the WAP device during
traffic capture, install capture filters to limit which traffic is sent to the Wireshark
tool. When capturing 802.11 traffic, a large portion of the captured frames tends to
be beacons (typically sent every 100 ms by all APs). Although Wireshark supports
a display filter for beacon frames, it does not support a capture filter to prevent the
WAP device from forwarding captured beacon packets to the Wireshark tool. To
reduce the performance impact of capturing the 802.11 beacons, disable the
capture beacons mode.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
55
Administration
Support Information
default, the captured packets are stored in the folder file /tmp/apcapture.pcap on
the WAP device.
STEP 3 Specify a TFTP Server IPv4 Address in the field provided.
STEP 4 Click Download.
Support Information
The Support Information page enables you to download a text file that contains
detailed configuration information about the AP. The file includes software and
hardware version information, MAC and IP addresses, the administrative and
operational status of features, user-configured settings, traffic statistics, and more.
You can provide the text file to technical support personnel to assist them in
troubleshooting problems.
To show the Support Information page, select Administration > Support
Information in the navigation pane.
Click Download to generate the file based on current system settings. After a
short pause, a window appears to enable you to save the file to your computer.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
56
4
LAN
This chapter describes how to configure the port, network, and clock settings of
the WAP devices.
It includes these topics:
Port Settings
IPv6 Addresses
Port Settings
The Port Settings page enables you to view and configure settings for the port
that physically connects the WAP device to a local area network.
To view and configure LAN settings:
STEP 1 Select LAN > Port Settings in the navigation area.
The Operational Status area shows the type of port used for the LAN port and the
Link characteristics, as configured in the Administrative Settings area. If the
settings change through configuration or auto negotiation, you can click Refresh to
show the latest settings.
STEP 2 Enable or disable Auto Negotiation.
When enabled, the port negotiates with its link partner to set the fastest link
speed and duplex mode available.
When disabled, you can manually configure the port speed and duplex
mode.
STEP 3 If autonegotiation is disabled, select a Port Speed (10/100 Mb/s for the WAP121,
and 10/100/1000 Mb/s for the WAP321) and the duplex mode (Half- or Fullduplex).
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
57
LAN
VLAN and IPv4 Address Settings
When Green Ethernet Mode is enabled, the WAP device automatically enters
a low-power mode when energy on the line is lost, and it resumes normal
operation when energy is detected.
STEP 5 Click Save. The changes are saved to the Startup Configuration.
The page shows Global Settings and IPv4 Settings. The Global Settings area
shows the MAC address of the LAN interface port. This field is read-only.
STEP 2 Configure these Global Settings:
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
58
LAN
IPv6 Addresses
Management VLAN IDThe VLAN associated with the IP address you use
to access the WAP device. Provide a number between 1 and 4094 for the
Management VLAN ID. The default is 1.
This VLAN is also the default untagged VLAN. If you already have a
management VLAN configured on your network with a different VLAN ID, you
must change the VLAN ID of the management VLAN on the WAP device.
Connection TypeBy default, the DHCP client on the Cisco WAP121 and
WAP321 automatically broadcasts requests for network information. If you
want to use a static IP address, you must disable the DHCP client and
manually configure the IP address and other network information.
Select one of these values from the list:
-
Static IPYou manually configure the IPv4 address. The IPv4 address
should be in a form similar to xxx.xxx.xxx.xxx (192.0.2.10).
STEP 4 Click Save. The changes are saved to the Startup Configuration.
NOTE After new settings are saved, the corresponding processes may be stopped and
restarted. When this happens, the WAP device may lose connectivity. We
recommend that you change WAP device settings when a loss of connectivity will
least affect your wireless clients.
IPv6 Addresses
You can use the IPv6 Addresses page to configure the WAP device to use IPv6
addresses.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
59
LAN
IPv6 Addresses
Static IPv6You manually configure the IPv6 address. The IPv6 address
should be in a form similar to xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx
(2001:DB8::CAD5:7D91).
Static IPv6 AddressThe static IPv6 address. The WAP device can have a
static IPv6 address even if addresses have already been configured
automatically.
Static IPv6 Address Prefix LengthThe prefix length of the static address,
which is an integer in the range of 0 to 128. The default is 0.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
60
LAN
IPv6 Addresses
IPv6 Link Local AddressThe IPv6 address used by the local physical link.
The link local address is not configurable and is assigned by using the IPv6
Neighbor Discovery process.
STEP 3 Click Save. The changes are saved to the Startup Configuration.
NOTE After new settings are saved, the corresponding processes may be stopped and
restarted. When this happens, the WAP device may lose connectivity. We
recommend that you change WAP device settings when a loss of connectivity will
least affect your wireless clients.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
61
5
Wireless
Radio
Rogue AP Detection
Networks
Scheduler
Scheduler Association
Bandwidth Utilization
MAC Filtering
WDS Bridge
WorkGroup Bridge
Quality of Service
WPS Setup
WPS Process
Radio
Radio settings directly control the behavior of the radio in the WAP device and its
interaction with the physical medium; that is, how and what type of signal the WAP
device emits.
To configure radio settings:
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
62
Wireless
Radio
time interval in seconds for the WAP device to report associated clients that do
not adhere to mandatory admission control procedures. The reporting occurs
through the system log and SNMP traps. Enter a time from 0 to 900 seconds. The
default is 300 seconds.
STEP 3 In the Basic Settings area, configure these settings:
NOTE Local regulations may prohibit the use of certain radio modes. Not all
modes are available in all countries.
MAC AddressThe Media Access Control (MAC) address for the interface.
The MAC address is assigned by the manufacturer and cannot be changed.
ModeThe IEEE 802.11 standard and frequency the radio uses. Select one
of the available modes:
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
63
Wireless
Radio
ChannelThe portion of the radio spectrum the radio uses for transmitting
and receiving.
The range of available channels is determined by the mode of the radio
interface and the country code setting. If you select Auto for the channel
setting, the WAP device scans available channels and selects a channel
where the least amount of traffic is detected.
Each mode offers a number of channels, depending on how the spectrum is
licensed by national and transnational authorities such as the Federal
Communications Commission (FCC) or the International Telecommunication
Union (ITU-R).
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
64
Wireless
Radio
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
65
Wireless
Radio
Transmit PowerA percentage value for the transmit power level for this
WAP device.
The default value of 100 percent can be more cost-efficient than a lower
percentage because it gives the WAP device a maximum broadcast range
and reduces the number of access points needed.
To increase the capacity of the network, place WAP devices closer together
and reduce the value of the transmit power. This helps reduce overlap and
interference among access points. A lower transmit power setting can also
keep your network more secure because weaker wireless signals are less
likely to propagate outside of the physical location of your network.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
66
Wireless
Radio
Some channel ranges and country code combinations have relatively low
maximum transmit power. When attempting to set the transmit power to the
lower ranges (for example, 25% or 12%), the expected drop in power may
not occur, because certain power amplifiers have minimum transmit power
requirements.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
67
Wireless
Radio
Rate LimitThe rate limit for multicast and broadcast traffic. The limit
should be greater than 1, but less than 50 packets per second. Any traffic
that falls below this rate limit will always conform and be transmitted to
the appropriate destination. The default and maximum rate limit setting is
50 packets per second.
OffThe WAP device ignores TSPEC requests from client stations. Use
this setting if you do not want to use TSPEC to give QoS-capable devices
priority for time-sensitive traffic.
OffA station can send and receive voice priority traffic without
requiring an admitted TSPEC; the WAP device ignores voice TSPEC
requests from client stations.
TSPEC Voice ACM LimitThe upper limit on the amount of traffic the WAP
device attempts to transmit on the wireless medium using a voice AC to gain
access. The default limit is 20 percent of total traffic.
TSPEC Video ACM Mode Regulates mandatory admission control for the
video access category. By default, TSPEC Video ACM mode is off. The
options are:
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
68
Wireless
Rogue AP Detection
Off A station can send and receive video priority traffic without
requiring an admitted TSPEC; the WAP device ignores video TSPEC
requests from client stations.
TSPEC Video ACM LimitThe upper limit on the amount of traffic that the
WAP device attempts to transmit on the wireless medium using a video AC
to gain access. The default limit is 15 percent of total traffic.
STEP 5 Click Save. The changes are saved to the Startup Configuration.
!
CAUTION After new settings are saved, the corresponding processes may be stopped and
restarted. When this happens, the WAP device may lose connectivity. We
recommend that you change WAP device settings when a loss of connectivity will
least affect your wireless clients.
Rogue AP Detection
A Rogue AP is an access point that has been installed on a secure network without
explicit authorization from a system administrator. Rogue access points pose a
security threat because anyone with access to the premises can ignorantly or
maliciously install an inexpensive wireless WAP device that can potentially allow
unauthorized parties to access the network.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
69
Wireless
Rogue AP Detection
The WAP device performs an RF scan on all channels to detect all APs in the
vicinity of the network. If rogue APs are detected, they are shown on the Rogue AP
Detection page. If an AP listed as a rogue is legitimate, you can add it to the Known
AP List.
NOTE The Detected Rogue AP List and Trusted AP List provide information that you can
use to take further action. The AP does not have any control over rogue APs on the
lists and cannot apply any security policies to APs detected through the RF scan.
When AP detection is enabled, the radio periodically switches from its operating
channel to scan other channels within the same band.
ActionIf the AP is in the Detected Rogue AP List, you can click Trust to
move the AP to the Trusted AP List.
If the AP is in the Trusted AP list, you can click Untrust to move the AP to the
Detected Rogue AP List.
NOTE The Detected Rogue AP List and Trusted AP List provide information.
The WAP device does not have any control over the APs on the list and
cannot apply any security policies to APs detected through the RF scan.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
70
Wireless
Rogue AP Detection
Off indicates that the Security mode on the rogue device is set to None
(no security).
NOTE You can use the Networks page to configure security on the AP.
BandThe IEEE 802.11 mode being used on the rogue AP. (For example,
IEEE 802.11a, IEEE 802.11b, IEEE 802.11g.)
The number shown indicates the mode:
SignalThe strength of the radio signal emitting from the rogue AP. If you
hover the mouse pointer over the bars, a number representing the strength
in decibels (dB) appears.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
71
Wireless
Rogue AP Detection
Last BeaconThe date and time of the last beacon received from the
rogue AP.
RatesSupported and basic (advertised) rate sets for the rogue AP. Rates
are shown in megabits per second (Mbps).
All Supported Rates are listed, with Basic Rates shown in bold. Rate sets
are configured on the Radio page.
The list contains the MAC addresses of all APs that have been added to the
Known AP List. By default, the filename is Rogue2.cfg. You can use a text editor or
web browser to open the file and view its contents.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
72
Wireless
Networks
The file that you import must be a plain-text file with a .txt or .cfg extension. Entries
in the file are MAC addresses in hexadecimal format with each octet separated by
colons, for example 00:11:22:33:44:55. You must separate entries with a single
space. For the AP to accept the file, it must contain only MAC addresses.
STEP 3 Choose whether to replace the existing Trusted AP List or add the entries in the
When the import is complete, the screen refreshes and the MAC addresses of the
APs in the imported file appear in the Known AP List.
Networks
Virtual Access Points (VAPs) segment the wireless LAN into multiple broadcast
domains that are the wireless equivalent of Ethernet VLANs. VAPs simulate
multiple access points in one physical WAP device. Up to four VAPs are supported
on the WAP121 and up to eight VAPs are supported on the WAP321.
Each VAP can be independently enabled or disabled, with the exception of VAP0.
VAP0 is the physical radio interface and remains enabled as long as the radio is
enabled. To disable operation of VAP0, the radio itself must be disabled.
Each VAP is identified by a user-configured Service Set Identifier (SSID). Multiple
VAPs cannot have the same SSID name. SSID broadcasts can be enabled or
disabled independently on each VAP. SSID broadcast is enabled by default.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
73
Wireless
Networks
?, ", $, [, \, ], and +.
The allowable characters are:
ASCII 0x20, 0x21, 0x23, 0x25 through 0x2A, 0x2C through 0x3E, 0x40
through 0x5A, 0x5E through 0x7E.
In addition, these three characters cannot be the first character:
!, #, and ; (ASCII 0x21, 0x23, and 0x3B, respectively).
Trailing and leading spaces (ASCII 0x20) are not permitted.
NOTE This means that spaces are allowed within the SSID, but not as the first or last
VLAN IDs
Each VAP is associated with a VLAN, which is identified by a VLAN ID (VID). A VID
can be any value from 1 to 4094, inclusive. The WAP121 supports five active
VLANs (four for WLAN plus one management VLAN). The WAP321 supports nine
active VLANs (eight for WLAN plus one management VLAN).
By default, the VID assigned to the configuration utility for the WAP device is 1,
which is also the default untagged VID. If the management VID is the same as the
VID assigned to a VAP, then the WLAN clients associated with this specific VAP
can administer the WAP device. If needed, an access control list (ACL) can be
created to disable administration from WLAN clients.
Configuring VAPs
To configure VAPs:
STEP 1 Select Wireless > Networks in the navigation pane.
STEP 2 Select the Enabled check box for the VAP you want to configure.
Or
If VAP0 is the only VAP configured on the system, and you want to add a VAP, click
Add. Then, select the VAP and click Edit.
STEP 3 Configure the parameters:
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
74
Wireless
Networks
!
CAUTION Be sure to enter a VLAN ID that is properly configured on the network. Network
problems can result if the VAP associates wireless clients with an improperly
configured VLAN.
When a wireless client connects to the WAP device by using this VAP, the WAP
device tags all traffic from the wireless client with the VLAN ID you enter in this field,
unless you enter the port VLAN ID or use a RADIUS server to assign a wireless
client to a VLAN. The range for the VLAN ID is from 1 to 4094.
NOTE If you change the VLAN ID to a different ID than the current
management VLAN ID, WLAN clients associated with this specific VAP
cannot administer the device. Verify the configuration of the untagged and
management VLAN IDs on the LAN page. For more information, see VLAN
and IPv4 Address Settings.
SSID NameA name for the wireless network. The SSID is an alphanumeric
string of up to 32 characters. Choose a unique SSID for each VAP.
NOTE If you are connected as a wireless client to the same WAP device that
you are administering, resetting the SSID will cause you to lose connectivity
to the WAP device. You need to reconnect to the new SSID after you save
this new setting.
None
Static WEP
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
75
Wireless
Networks
Dynamic WEP
WPA Personal
WPA Enterprise
If you select a security mode other than None, additional fields appear.
These fields are explained in Configuring Security Settings.
NOTE We recommend using WPA Personal or WPA Enterprise as the
MAC FilteringSpecifies whether the stations that can access this VAP are
restricted to a configured global list of MAC addresses. You can select one
of these types of MAC filtering:
-
LocalUse the MAC Authentication list that you configure on the MAC
Filtering page.
STEP 4 Click Save. The changes are saved to the Startup Configuration.
!
CAUTION After new settings are saved, the corresponding processes may be stopped and
restarted. When this happens, the WAP device may lose connectivity. We
recommend that you change WAP device settings when a loss of connectivity will
least affect your wireless clients.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
76
Wireless
Networks
NOTE To delete a VAP, select the VAP and click Delete. To save your deletion permanently,
None (Plain-text)
If you select None as your security mode, no additional security settings are
configurable on the WAP device. This mode means that any data transferred to
and from the WAP device is not encrypted. This security mode can be useful
during initial network configuration or for problem solving, but it is not
recommended for regular use on the internal network because it is not secure.
Static WEP
Wired Equivalent Privacy (WEP) is a data encryption protocol for 802.11 wireless
networks. All wireless stations and access points on the network are configured
with a static 64-bit (40-bit secret key + 24-bit initialization vector (IV)) or 128-bit
(104-bit secret key + 24-bit IV) Shared Key for data encryption.
Static WEP is not the most secure mode available, but it offers more protection
than setting the security mode to None (Plain-text), as it does prevent an outsider
from easily sniffing out unencrypted wireless traffic.
WEP encrypts data moving across the wireless network based on a static key.
(The encryption algorithm is a stream cipher called RC4.)
These parameters configure Static WEP:
Transfer Key IndexA key index list. Key indexes 1 through 4 are available.
The default is1.
The Transfer Key Index indicates which WEP key the WAP device uses to
encrypt the data it transmits.
64 bits
128 bits
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
77
Wireless
Networks
ASCII
Hex
WEP KeysYou can specify up to four WEP keys. In each text box, enter a
string of characters for each key. The keys you enter depend on the key
type selected:
-
Use the same number of characters for each key as specified in the
Characters Required field. These are the RC4 WEP keys shared with the
stations using the WAP device.
Each client station must be configured to use one of these same WEP keys
in the same slot as specified on the WAP device.
ensure it can exchange traffic with an WAP device. A station must have
the correct WEP key to be able to successfully access and decrypt data
from the WAP device, and to transmit readable data to the WAP device.
-
Shared Key authentication requires the client station to have the correct
WEP key in order to associate with the WAP device. When the
authentication algorithm is set to Shared Key, a station with an incorrect
WEP key cannot associate with the WAP device.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
78
Wireless
Networks
Both Open System and Shared Key. When you select both
authentication algorithms, client stations configured to use WEP in
shared key mode must have a valid WEP key in order to associate with
the WAP device. Also, client stations configured to use WEP as an open
system (shared key mode not enabled) can associate with the WAP
device even if they do not have the correct WEP key.
All client stations must have the Wireless LAN (WLAN) security set to WEP,
and all clients must have one of the WEP keys specified on the WAP device
in order to decode AP-to-station data transmissions.
The WAP device must have all keys used by clients for station-to-AP
transmit so that it can decode the station transmissions.
The same key must occupy the same slot on all nodes (AP and clients). For
example, if the WAP device defines abc123 key as WEP key 3, then the
client stations must define that same string as WEP key 3.
Client stations can use different keys to transmit data to the access point.
(Or they can all use the same key, but using the same key is less secure
because it means one station can decrypt the data being sent by another.)
On some wireless client software, you can configure multiple WEP keys and
define a client station transfer key index, and then set the stations to encrypt
the data they transmit using different keys. This ensures that neighboring
access points cannot decode other access point transmissions.
You cannot mix 64-bit and 128-bit WEP keys between the access point and
its client stations.
Dynamic WEP
Dynamic WEP refers to the combination of 802.1x technology and the Extensible
Authentication Protocol (EAP). With Dynamic WEP security, WEP keys are changed
dynamically.
EAP messages are sent over an IEEE 802.11 wireless network using a protocol
called EAP Encapsulation Over LANs (EAPOL). IEEE 802.1X provides dynamically
generated keys that are periodically refreshed. An RC4 stream cipher is used to
encrypt the frame body and cyclic redundancy checking (CRC) of each 802.11
frame.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
79
Wireless
Networks
This mode requires the use of an external RADIUS server to authenticate users.
The WAP device requires a RADIUS server that supports EAP, such as the
Microsoft Internet Authentication Server. To work with Microsoft Windows clients,
the authentication server must support Protected EAP (PEAP) and MSCHAP V2.
You can use any of a variety of authentication methods that the IEEE 802.1X mode
supports, including certificates, Kerberos, and public key authentication. You must
configure the client stations to use the same authentication method the WAP
device uses.
These parameters configure Dynamic WEP:
Use Global RADIUS Server SettingsBy default, each VAP uses the
global RADIUS settings that you define for the WAP device (see RADIUS
Server). However, you can configure each VAP to use a different set of
RADIUS servers.
To use the global RADIUS server settings, ensure that the check box is
selected.
To use a separate RADIUS server for the VAP, uncheck the check box and
enter the RADIUS server IP address and key in these fields:
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
80
Wireless
Networks
KeyThe shared secret key that the WAP device uses to authenticate to
the primary RADIUS server.
You can use up to 63 standard alphanumeric and special characters. The
key is case sensitive and must match the key configured on the RADIUS
server. The text you enter is shown as asterisks.
Key 2 to Key 4The RADIUS key associated with the configured backup
RADIUS servers. The server at Server IP (IPv6) Address 2 uses Key 2, the
server at Server IP (IPv6) Address 3 uses Key 3, and so on.
WPA Personal
WPA Personal is a Wi-Fi Alliance IEEE 802.11i standard, which includes AES-CCMP
and TKIP encryption. The Personal version of WPA uses a pre-shared key (PSK)
instead of using IEEE 802.1X and EAP as is used in the Enterprise WPA security
mode. The PSK is used for an initial check of credentials only. WPA Personal is also
referred to as WPA-PSK.
This security mode is backwards-compatible for wireless clients that support the
original WPA.
These parameters configure WPA Personal:
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
81
Wireless
Networks
WPAThe network has client stations that support the original WPA
and none that support the newer WPA2.
If the network has a mix of clients, some of which support WPA2 and others
which support only the original WPA, select both of the check boxes. This
lets both WPA and WPA2 client stations associate and authenticate, but
uses the more robust WPA2 for clients who support it. This WPA
configuration allows more interoperability in place of some security.
TKIP
CCMP (AES)
You can select either or both. Both TKIP and AES clients can associate with
the WAP device. WPA clients must have one of these keys to be able to
associate with the WAP device:
-
Clients not configured to use WPA Personal are not able to associate with
the WAP device.
KeyThe shared secret key for WPA Personal security. Enter a string of at
least 8 characters to a maximum of 63 characters. Acceptable characters
include uppercase and lowercase alphabetic letters, the numeric digits, and
special symbols such as @ and #.
Key Strength MeterThe WAP device checks the key against complexity
criteria such as how many different types of characters (uppercase and
lowercase alphabetic letters, numbers, and special characters) are used
and how long the string is. If the WPA-PSK complexity check feature is
enabled, the key is not accepted unless it meets the minimum criteria. See
WPA-PSK Complexity for information on configuring the complexity check.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
82
Wireless
Networks
WPA Enterprise
WPA Enterprise with RADIUS is an implementation of the Wi-Fi Alliance IEEE
802.11i standard, which includes CCMP (AES), and TKIP encryption. The
Enterprise mode requires the use of a RADIUS server to authenticate users.
This security mode is backwards-compatible with wireless clients that support
the original WPA.
These parameters configure WPA Enterprise:
WPAIf all client stations on the network support the original WPA but
none support the newer WPA2, and then select WPA.
WPA and WPA2If you have a mix of clients, some of which support
WPA2 and others which support only the original WPA, select both WPA
and WPA2. This setting lets both WPA and WPA2 client stations
associate and authenticate, but uses the more robust WPA2 for clients
who support it. This WPA configuration allows more interoperability, in
place of some security.
TKIP
CCMP (AES)
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
83
Wireless
Networks
By default both TKIP and CCMP are selected. When both TKIP and CCMP
are selected, client stations configured to use WPA with RADIUS must have
one of these addresses and keys:
Use Global RADIUS Server SettingsBy default, each VAP uses the
global RADIUS settings that you define for the WAP device (see RADIUS
Server). However, you can configure each VAP to use a different set of
RADIUS servers.
To use the global RADIUS server settings, make sure the check box is
selected.
To use a separate RADIUS server for the VAP, uncheck the box and enter the
RADIUS server IP address and key in these fields:
Key 1The shared secret key for the global RADIUS server. You can use up
to 63 standard alphanumeric and special characters. The key is case
sensitive, and you must configure the same key on the WAP device and on
your RADIUS server. The text you enter is shown as asterisks to prevent
others from seeing the RADIUS key as you type.
Key 2 to Key 4The RADIUS key associated with the configured backup
RADIUS servers. The server at Server IP (IPv6) Address 2 uses Key 2, the
server at Server IP (IPv6) Address 3 uses Key 3, and so on.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
84
Wireless
Scheduler
Scheduler
The Radio and VAP Scheduler allows you to configure a rule with a specific time
interval for VAPs or radios to be operational, which automates the enabling or
disabling of the VAPs and radio.
One way you can use this feature is to schedule the radio to operate only during
the office working hours in order to achieve security and reduce power
consumption. You can also use the Scheduler to allow access to VAPs for wireless
clients only during specific times of day.
The WAP device supports up to 16 profiles. Only valid rules are added to the
profile. Up to 16 rules are grouped together to form a scheduling profile. Periodic
time entries belonging to the same profile cannot overlap.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
85
Wireless
Scheduler
The Scheduler Operational Status area indicates the current operation status of
the Scheduler:
STEP 3 To add a profile, enter a profile name in the Scheduler Profile Configuration text
box and click Add. The profile name can be up to 32 alphanumeric characters.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
86
Wireless
Scheduler Association
STEP 4 From the Day of the Week menu, select the recurring schedule for the rule. You
can configure the rule to occur daily, each weekday, each weekend day (Saturday
and Sunday), or any single day of the week.
STEP 5 Set the start and end times:
Start TimeThe time when the radio or VAP is operationally enabled. The
time is in HH:MM 24-hour format. The range is <00-23>:<00-59>. The default
is 00:00.
End TimeThe time when the radio or VAP is operationally disabled. The
time is in HH:MM 24-hour format. The range is <00-23>:<00-59>. The default
is 00:00.
STEP 6 Click Save. The changes are saved to the Startup Configuration.
NOTE A Scheduler profile must be associated with a radio interface or a VAP interface to
NOTE To delete a rule, select the profile from the Profile Name column and click Delete.
Scheduler Association
The Scheduler profiles need to be associated with the WLAN interface or a VAP
interface to be effective. By default, there are no Scheduler profiles created, and
no profile is associated with any radio or VAP.
Only one Scheduler profile can be associated with the WLAN interface or each
VAP. A single profile can be associated with multiple VAPs. If the Scheduler profile
associated with a VAP or the WLAN interface is deleted, then the association is
removed.
To associate a Scheduler profile with the WLAN interface or a VAP:
STEP 1 Select Wireless > Scheduler Association in the navigation pane.
STEP 2 For the WLAN interface or a VAP, select the profile from the Profile Name list.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
87
Wireless
Bandwidth Utilization
Bandwidth Utilization
Use the Bandwidth Utilization page to configure how much of the radio bandwidth
can be used before the WAP device stops allowing new client associations. This
feature is disabled by default.
To enable bandwidth utilization:
STEP 1 Select Wireless > Bandwidth Utilization in the navigation pane.
STEP 2 Click Enable for the Bandwidth Utilization setting.
STEP 3 In the Maximum Utilization Threshold box, enter the percentage of network
bandwidth utilization allowed on the radio before the WAP device stops accepting
new client associations.
The valid integer range is from 0 to 100 percent. The default is 70 percent. When
set to 0, all new associations are allowed regardless of the utilization rate.
STEP 4 Click Save. The changes are saved to the Startup Configuration.
NOTE After new settings are saved, the corresponding processes may be stopped and
restarted. When this happens, the WAP device may lose connectivity. We
recommend that you change WAP device settings when a loss of connectivity will
least affect your wireless clients.
MAC Filtering
Media Access Control (MAC) filtering can be used to exclude or allow only listed
client stations to authenticate with the access point. MAC authentication is
enabled and disabled per VAP on the Networks page. Depending on how the VAP
is configured, the WAP device may refer to a MAC filter list stored on an external
RADlUS server, or may refer a MAC filter list stored locally on the WAP device.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
88
Wireless
MAC Filtering
Allow only stations in the listAny station that is not in the Stations List is
denied access to the network through the WAP device.
Block all stations in listOnly the stations that appear in the list are denied
access to the network through the WAP device. All other stations are
permitted access.
NOTE The filter setting also applies to the MAC filtering list stored on the
restarted. When this happens, the WAP device may lose connectivity. We
recommend that you change WAP device settings when a loss of connectivity will
least affect your wireless clients.
RADIUS Server
Attribute
Description
Value
User-Name (1)
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
89
Wireless
WDS Bridge
RADIUS Server
Attribute
Description
Value
User-Password (2)
NOPASSWORD
WDS Bridge
The Wireless Distribution System (WDS) allows you to connect multiple WAP121
and WAP321 devices. With WDS, access points communicate with one another
without wires. This capability is critical in providing a seamless experience for
roaming clients and for managing multiple wireless networks. It can also simplify
the network infrastructure by reducing the amount of cabling required. You can
configure the WAP device in point-to-point or point-to-multipoint bridge mode
based on the number of links to connect.
In the point-to-point mode, the WAP device accepts client associations and
communicates with wireless clients and other repeaters. The WAP device
forwards all traffic meant for the other network over the tunnel that is established
between the access points. The bridge does not add to the hop count. It functions
as a simple OSI Layer 2 network device.
In the point-to-multipoint bridge mode, one WAP device acts as the common link
between multiple access points. In this mode, the central WAP device accepts
client associations and communicates with the clients and other repeaters. All
other access points associate only with the central WAP device that forwards the
packets to the appropriate wireless bridge for routing purposes.
The WAP device can also act as a repeater. In this mode, the WAP device serves
as a connection between two WAP devices that might be too far apart to be within
cell range. When acting as a repeater, the WAP device does not have a wired
connection to the LAN and repeats signals by using the wireless connection. No
special configuration is required for the WAP device to function as a repeater, and
there are no repeater mode settings. Wireless clients can still connect to an WAP
device that is operating as a repeater.
Before you configure WDS on the WAP device, note these guidelines:
WDS only works with Cisco WAP121 and Cisco WAP321 devices.
All Cisco WAP devices participating in a WDS link must have the following
identical settings:
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
90
Wireless
WDS Bridge
Radio
Channel Bandwidth
NOTE When operating bridging in the 802.11n 2.4 GHz band, set the Channel
Bandwidth to 20 MHz, rather than the default 20/40 MHz. In the 2.4 GHz
20/40 MHz band, the operating bandwidth can change from 40 MHz to
20 MHz if any 20 MHz WAP devices are detected in the area. The
mismatched channel bandwidth can cause the link to disconnect.
See Radio (Basic Settings) for information on configuring these settings.
You can have only one WDS link between any pair of WAP devices. That is,
a remote MAC address may appear only once on the WDS page for a
particular WAP device.
TIP
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
91
Wireless
WDS Bridge
Personal mode, the WAP device uses WPA2-PSK with CCMP (AES)
encryption over the WDS link. See WEP on WDS Links or WPA/PSK on
WDS Links following this procedure for more information about encryption
options.
STEP 5 Repeat these steps for up to three additional WDS interfaces.
STEP 6 Click Save. The changes are saved to the Startup Configuration.
STEP 7 Replicate this procedure on the other device or devices connecting to the bridge.
TIP
You can verify that the bridge link is up by going to the Status and Statistics
> Network Interface page. In the Interface Status table, the WLAN0:WDS(x)
status should state Up.
!
CAUTION After new settings are saved, the corresponding processes may be stopped and
restarted. When this happens, the WAP device may lose connectivity. We
recommend that you change WAP device settings when a loss of connectivity will
least affect your wireless clients.
Key LengthIf WEP is enabled, specify the length of the WEP key as
64 bits or 128 bits.
Key TypeIf WEP is enabled, specify the WEP key type: ASCII or Hex.
92
Wireless
WorkGroup Bridge
WDS IDEnter an appropriate name for the new WDS link you have
created. It is important that the same WDS ID is also entered at the other
end of the WDS link. If this WDS ID is not the same for both WAP devices on
the WDS link, they will not be able to communicate and exchange data.
The WDS ID can be any alphanumeric combination.
KeyEnter a unique shared key for the WDS bridge. This unique shared
key must also be entered for the WAP device at the other end of the WDS
link. If this key is not the same for both WAPs, they will not be able to
communicate and exchange data.
The WPA-PSK key is a string of at least 8 characters to a maximum of 63
characters. Acceptable characters include uppercase and lowercase
alphabetic letters, the numeric digits, and special symbols such as @ and #.
WorkGroup Bridge
The WAP device WorkGroup Bridge feature enables the WAP device to extend the
accessibility of a remote network. In WorkGroup Bridge mode, the WAP device
acts as a wireless station (STA) on the wireless LAN. It can bridge traffic between
a remote wired network or associated wireless clients and the wireless LAN that
is connected using the WorkGroup Bridge mode.
The WorkGroup Bridge feature enables support for STA-mode and AP-mode
operation simultaneously. The WAP device can operate in one Basic Service Set
(BSS) as an STA device while operating on another BSS as a WAP device. When
WorkGroup Bridge mode is enabled, the WAP device supports only one BSS for
wireless clients that associate with it, and another BSS with which the WAP
device associates as a wireless client.
It is recommended that WorkGroup Bridge mode be used only when the WDS
bridge feature cannot be operational with a peer WAP device. WDS is a better
solution and is preferred over the WorkGroup Bridge solution. Use WDS if you are
bridging Cisco WAP121 and WAP321 devices. If you are not, then consider
WorkGroup Bridge. When the WorkGroup Bridge feature is enabled, the VAP
configurations are not applied; only the WorkGroup Bridge configuration is
applied.
NOTE The WDS feature does not work when the WorkGroup Bridge mode is enabled on
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
93
Wireless
WorkGroup Bridge
In WorkGroup Bridge mode, the BSS managed by the WAP device while operating
in WAP device mode is referred to as the access point interface, and associated
STAs as downstream STAs. The BSS managed by the other WAP device (that is,
the one to which the WAP device associates as an STA) is referred to as the
infrastructure client interface, and the other WAP device is referred as the
upstream AP.
The devices connected to the wired interface of the WAP device, as well as the
downstream stations associated with the access point interface of the device, can
access the network connected by the infrastructure client interface. To allow the
bridging of packets, the VLAN configuration for the access point interface and
wired interface should match that of the infrastructure client interface.
WorkGroup Bridge mode can be used as range extender to enable the BSS to
provide access to remote or hard-to-reach networks. A single-radio can be
configured to forward packets from associated STAs to another WAP device in the
same ESS, without using WDS.
Before you configure WorkGroup Bridge on the WAP device, note these
guidelines:
All WAP devices participating in WorkGroup Bridge must have the following
identical settings:
-
Radio
Channel Bandwidth
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
94
Wireless
WorkGroup Bridge
NOTE There is an arrow next to SSID for SSID Scanning; this feature is
None
Static WEP
WPA Personal
WPA Enterprise
See Configuring Security Settings for information about WEP and WPA
Personal security settings.
upstream WAP device with the configured credentials. The WAP device may
obtain its IP address from a DHCP server on the upstream link. Alternatively,
you can assign a static IP address. The Connection Status field indicates
whether the WAP is connected to the upstream WAP device. You can click
the Refresh button at the top of the page to view the latest connection
status.
STEP 4 Configure the following additional fields for the Access Point Interface:
SSIDThe SSID for the Access Point Interface does not need to be the
same as the Infrastructure Client SSID. However, if attempting to support a
roaming type of scenario, the SSID and security must be the same.
None
Static WEP
WPA Personal
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
95
Wireless
Quality of Service
DisabledThe set of clients in the APs BSS that can access the
upstream network is not restricted to the clients specified in a MAC
address list.
LocalThe set of clients in the APs BSS that can access the upstream
network is restricted to the clients specified in a locally defined MAC
address list.
RADIUSThe set of clients in the APs BSS that can access the upstream
network is restricted to the clients specified in a MAC address list on a
RADIUS server.
If you select Local or RADIUS, see MAC Filtering for instructions on creating
the MAC filter list.
VLAN IDConfigure the Access Point Interface with the same VLAN ID as
advertised on the Infrastructure Client Interface.
STEP 5 Click Save. The changes are saved to the Startup Configuration.
Quality of Service
The quality of service (QoS) settings provide you with the ability to configure
transmission queues for optimized throughput and better performance when
handling differentiated wireless traffic, such as Voice-over-IP (VoIP), other types of
audio, video, streaming media, and traditional IP data.
To configure QoS on the WAP device, you set parameters on the transmission
queues for different types of wireless traffic and specify minimum and maximum
wait times (through contention windows) for transmission.
WAP Enhanced Distributed Channel Access (EDCA) parameters affect traffic
flowing from the WAP device to the client station.
Station EDCA parameters affect traffic flowing from the client station to the WAP
device.
In normal use, the default values for the WAP device and station EDCA should not
need to be changed. Changing these values affects the QoS provided.
To configure WAP device and Station EDCA parameters:
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
96
Wireless
Quality of Service
These four queues are defined for different types of data transmitted from WAPto-station. If you choose a Custom template, the parameters that define the queues
are configurable; otherwise, they are set to predefined values appropriate to your
selection. The four queues are:
previous step.
Arbitration Inter-Frame SpaceA wait time for data frames. The wait time
is measured in slots. Valid values for AIFS are 1 through 255.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
97
Wireless
Quality of Service
If the first random backoff wait time expires before the data frame is sent, a
retry counter is incremented and the random backoff value (window) is
doubled. Doubling continues until the size of the random backoff value
reaches the number defined in the Maximum Contention Window.
Valid values are 1, 3, 7, 15, 31, 63, 127, 255, 511, or 1024. This value must be
lower than the value for the Maximum Contention Window.
Maximum Burst (WAP only)A WAP EDCA parameter that applies only to
traffic flowing from the WAP to the client station.
This value specifies (in milliseconds) the maximum burst length allowed for
packet bursts on the wireless network. A packet burst is a collection of
multiple frames transmitted without header information. The decreased
overhead results in higher throughput and better performance.
Valid values are 0.0 through 999.
TXOP Limit (Station only)The TXOP Limit is a station EDCA parameter and
only applies to traffic flowing from the client station to the WAP device. The
Transmission Opportunity (TXOP) is an interval of time, in milliseconds, when
a WME client station has the right to initiate transmissions onto the wireless
medium (WM) towards the WAP device. The TXOP Limit maximum value is
65535.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
98
Wireless
WPS Setup
STEP 5 Click Save. The changes are saved to the Startup Configuration.
!
CAUTION After new settings are saved, the corresponding processes may be stopped and
restarted. When this happens, the WAP device may lose connectivity. We
recommend that you change WAP device settings when a loss of connectivity will
least affect your wireless clients.
WPS Setup
This section describes the Wi-Fi Protected Setup (WPS) protocol and its
configuration on the WAP device.
WPS Overview
WPS is a standard that enables simple establishment of wireless networks
without compromising network security. It relieves both the wireless client users
and the WAP device administrators from having to know network names, keys, and
various other cryptographic configuration options.
WPS facilitates network setup by allowing the administrator to use a push button
or PIN to establish wireless networks, which avoids the manual entry of network
names (SSIDs) and wireless security parameters:
Push button: The WPS button is either on the product or a clickable button
on the user interface.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
99
Wireless
WPS Setup
WPS maintains network security by requiring both the users of new client devices
and WLAN administrators to have either physical access to their respective
devices or secure remote access to these devices.
Usage Scenarios
These are typical scenarios for using WPS:
A WAP device administrator purchases a new WAP device that has been
certified by the Wi-Fi Alliance to be compliant with WPS version 2.0, and
wishes to add the WAP device to an existing (wired or wireless) network.
The administrator turns on the WAP device, and then accesses a network
host that supports the WPS registration protocol. The administrator enters
the PIN of the WAP device in the configuration utility of this external
registrar, and triggers the WPS registration process. (On a wired LAN, the
WPS protocol messages are transported through Universal Plug and Play,
or UPnP, protocol.) The host registers the WAP as a new network device and
configures the WAP with new security settings.
A wireless device that does not support WPS must join the WPS-enabled
WLAN. The administrator, who cannot use WPS in this case, instead
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
100
Wireless
WPS Setup
manually configures the device with the SSID, public shared key, and
cryptography modes of the WPS-enabled WAP device. The device joins
the network.
The PIN is either an eight-digit number that uses its last digit as a checksum value,
or a four-digit number with no checksum. Each of these numbers may contain
leading zeroes.
WPS Roles
The WPS standard assigns specific roles to the various components in its
architecture:
The WAP devices act as AP devices and support a built-in registrar. They do not
function as an enrollee.
WPS is operationally disabled on the VAP if any of these conditions are not met.
NOTE Disabling WPS on a VAP does not cause disassociation of any clients previously
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
101
Wireless
WPS Setup
Client Enrollment
Push-button Control
The WAP device enrolls 802.11 clients through WPS by one of two methods: the
Push-Button Control (PBC) method, or the Personal Identification Number (PIN)
method.
The PBC method is when the user of a prospective client pushes a button on the
enrolling device, and the administrator of the WAP device with an enabled built-in
registrar pushes a similar (hardware or software) button. This sequence begins the
enrollment process, and the client device joins the network. Although the Cisco
WAP devices do not support an actual hardware button, the administrator can
initiate the enrollment for a particular VAP using a software button in the webbased configuration utility.
NOTE There is no defined order in which the buttons on the client device and WAP device
must be pressed. Either device can initiate the enrollment. However, if the software
button on the WAP device is pressed, and no client attempts to enroll after 120
seconds, the WAP device terminates the pending WPS enrollment transaction.
PIN Control
A client may also enroll with a registrar by using a PIN. For example, the WAP
device administrator may start an enrollment transaction for a particular VAP by
entering the PIN of a client. When the client detects the WPS-enabled device, the
user can then supply its PIN to the WAP device to continue the enrollment process.
After the WPS protocol has completed, the client securely joins the network. The
client can also initiate this process.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
102
Wireless
WPS Setup
As with the PBC method, if the WAP device begins the enrollment transaction and
no client attempts to enroll after 120 seconds, the WAP device terminates the
pending transaction.
Lockdown Capability
Each WAP device stores a WPS-compatible device PIN in nonvolatile RAM. WPS
requires this PIN if an administrator wants to allow an unconfigured WAP device
(that is, one with only factory defaults, including WPS being enabled on a VAP) to
join a network. In this scenario, the administrator obtains the PIN value from the
configuration utility of the WAP device.
The administrator may wish to change the PIN if network integrity has been
compromised in some way. The WAP device provides a method for generating a
new PIN and storing this value in NVRAM. If the value in NVRAM is corrupted,
erased, or missing, a new PIN is generated by the WAP device and stored in
NVRAM.
The PIN method of enrollment is potentially vulnerable by way of brute force
attacks. A network intruder could try to pose as an external registrar on the
wireless LAN and attempt to derive the PIN value of the WAP device by
exhaustively applying WPS-compliant PINs. To address this vulnerability, in the
event that a registrar fails to supply a correct PIN in three attempts within 60
seconds, the WAP device prohibits any further attempts by an external registrar to
register with the WAP device on the WPS-enabled VAP for 60 seconds. The
lockdown duration increases upon subsequent failures, up to a maximum of 64
minutes. The WAP devices registration functionality goes into permanent
lockdown after the 10th consecutive failed attempt. Reset the device to restart the
registration functionality.
However, wireless client stations may enroll with the WAP device's built-in
registrar, if enabled, during this lockdown period. The WAP device also continues
to provide proxy services for enrollment requests to external registrars.
The WAP device has an additional security features for protecting its device PIN.
After the WAP device has completed registration with an external registrar, and
the resulting WPS transaction has concluded, the device PIN is automatically
regenerated.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
103
Wireless
WPS Setup
Network SSID
If a VAP is enabled for WPS, these configuration parameters are subject to change,
and are persistent between reboots of the WAP device.
External Registration
The WAP device supports registration with WPS External Registrars (ER) on the
wired and wireless LAN. On the WLAN, external registrars advertise their
capabilities within WPS-specific Information Elements (IEs) of their beacon frames;
on the wired LAN, external registrars announce their presence through UPnP.
WPS v2.0 does not require registration with an ER through the user interface. The
administrator can register the WAP device with an ER by:
STEP 1 Entering the ER PIN on the WAP device.
STEP 2 Entering the WAP device PIN on the user interface of the ER.
NOTE The registration process can also configure the WAP device as specified in the VAP
Configuration Changes section, if the WAP device has declared within the WPSspecific IEs of its beacon frames or UPnP messages that it requires such
configuration.
The WAP device can serve as a proxy for up to three external registrars
simultaneously.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
104
Wireless
WPS Setup
!
CAUTION For security reasons, it is recommended, but not required, that you use an HTTPS
The WPS Setup page shows global parameters and status, and parameters and
status of the WPS instance. An instance is an implementation of WPS that is
associated with a VAP on the network. The WAP device supports one instance
only.
STEP 2 Configure the global parameters:
Supported WPS VersionThe WPS protocol version that the WAP device
supports.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
105
Wireless
WPS Setup
WPS Device PINA system-generated eight-digit WPS PIN for the WAP
device. The administrator may use this generated PIN to register the WAP
device with an external registrar.
You can click Generate to generate a new PIN. Generating a new pin is
advisable if network integrity has been compromised.
WPS Instance IDAn identifier for the instance. As there is only one
instance, the only option is wps1.
STEP 4 Click Update. The changes are saved to the Startup Configuration.
The operational status of the instance and the reason for that status appears. See
Enabling or Disabling WPS on a VAP for information about conditions that may
cause the instance to be disabled.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
106
Wireless
WPS Process
Instance Status
The Instance Status area shows the following information about the selected WPS
instance:
You can click Refresh to update the page with the most recent status information.
WPS Process
You can use the WPS Process page to use WPA to enroll a client station on the
network. You can enroll a client using a pin or using the push button method, if
supported on the client station.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
107
Wireless
WPS Process
When you enter the PIN on the client device, the WPS Operational Status changes
to Adding Enrollee. When the enrollment process is complete, the WPS
Operational Status changes to Ready and the Transaction Status changes to
Success.
When the client is enrolled, either the built-in registrar of the WAP device or the
external registrar on the network proceeds to configure the client with the SSID,
encryption mode, and public shared key of a WPS-enabled BSS.
!
CAUTION This enrollment sequence may also work in reverse; that is, you may be able to
initiate the process on the client station by entering the pin of the WAP device.
However, this method is not recommended for security reasons, as it enables the
client to configure the SSID and security settings on the AP. The administrator
should only share the PIN with trusted devices.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
108
Wireless
WPS Process
WPS Radio
WPS VAP
SSID
Security
If the WPS Configuration State field on the WPS Setup page is set to
Unconfigured, then the SSID and Security values are configured by the external
registrar. If the field is set to Configured, then these values are configured by the
administrator.
NOTE You can click Refresh to update the page with the most recent status information.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
109
6
System Security
This chapter describes how to configure security settings on the WAP device
device.
It contains these topics:
RADIUS Server
802.1X Supplicant
Password Complexity
WPA-PSK Complexity
RADIUS Server
Several features require communication with a RADIUS authentication server. For
example, when you configure Virtual Access Points (VAPs) on the WAP device, you
can configure security methods that control wireless client access (see the Radio
page). The Dynamic WEP and WPA Enterprise security methods use an external
RADIUS server to authenticate clients. The MAC address filtering feature, where
client access is restricted to a list, may also be configured to use a RADIUS server
to control access. The Captive Portal feature also uses RADIUS to authenticate
clients.
You can use the Radius Server page to configure the RADIUS servers that are
used by these features. You can configure up to four globally available IPv4 or IPv6
RADIUS servers; however, you must select whether the RADIUS client operates in
IPv4 or IPv6 mode with respect to the global servers. One of the servers always
acts as a primary while the others act as backup servers.
NOTE In addition to using the global RADIUS servers, you can also configure each VAP to
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
110
System Security
RADIUS Server
Key 1The shared secret key that the WAP device uses to authenticate to
the primary RADIUS server.
You can use from 1 to 64 standard alphanumeric and special characters. The
key is case sensitive and must match the key configured on the RADIUS
server. The text you enter appears as asterisks.
Key (2 through 4)The RADIUS key associated with the configured backup
RADIUS servers. The server at Server IP (IPv6) Address 2 uses Key 2, the
server at Server IP (IPv6) Address-3 uses Key 3, and so on.
STEP 3 Click Save. The changes are saved to the Startup Configuration.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
111
System Security
802.1X Supplicant
802.1X Supplicant
IEEE 802.1X authentication enables the access point to gain access to a secured
wired network. You can enable the access point as an 802.1X supplicant (client) on
the wired network. A user name and password that are encrypted using the MD5
algorithm can be configured to allow the access point to authenticate using
802.1X.
On networks that use IEEE 802.1X port-based network access control, a
supplicant cannot gain access to the network until the 802.1X authenticator grants
access. If your network uses 802.1X, you must configure 802.1X authentication
information on the WAP device, so that it can supply it to the authenticator.
The 802.1X Supplicant page is divided into three areas: Supplicant Configuration,
Certificate File Status, and Certificate File Upload.
The Supplicant Configuration area enables you to configure the 802.1X
operational status and basic settings.
STEP 1 Select System Security > 802.1X Supplicant in the navigation pane.
STEP 2 Enter the parameters:
MD5A hash function defined in RFC 3748 that provides basic security.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
112
System Security
802.1X Supplicant
STEP 3 Click Save. The changes are saved to the Startup Configuration.
NOTE After new settings are saved, the corresponding processes may be
stopped and restarted. When this happens, the WAP device may lose
connectivity. We recommend that you change WAP device settings when a
loss of connectivity will least affect your wireless clients.
The Certificate File Status area shows whether a current certificate exists:
The Certificate File Upload area enables you to upload a certificate file to the WAP
device:
STEP 1 Select either HTTP or TFTP as the Transfer Method.
STEP 2 If you selected HTTP, click Browse to select the file.
NOTE To configure the HTTP and HTTPS server settings, see HTTP/HTTPS
Service.
If you selected TFTP, enter the Filename and the TFTP Server IPv4 Address. The
filename cannot contain the following characters: spaces, <, >, |, \, : , (, ), &, ; , #, ? , *,
and two or more successive periods.
STEP 3 Click Upload.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
113
System Security
Password Complexity
Password Complexity
You can configure complexity requirements for passwords used to access the
WAP device configuration utility. Complex passwords increase security.
To configure password complexity requirements:
STEP 1 Select Security > Password Complexity in the navigation pane.
STEP 2 For the Password Complexity setting, select Enable.
STEP 3 Configure the parameters:
STEP 4 Click Save. The changes are saved to the Startup Configuration.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
114
System Security
WPA-PSK Complexity
WPA-PSK Complexity
When you configure VAPs on the WAP device, you can select a method of
securely authenticating clients. If you select the WPA Personal protocol (also
known as WPA pre-shared key or WPA-PSK) as the security method for any VAP,
you can use the WPA-PSK Complexity page to configure complexity requirements
for the key used in the authentication process. More complex keys provide
increased security.
To configure WPA-PSK complexity:
STEP 1 Select Security > WPA-PSK Complexity in the navigation pane.
STEP 2 Click Enable for the WPA-PSK Complexity setting to enable the WAP device to
check WPA-PSK keys against the criteria you configure. If you uncheck the box,
none of these settings are used. WPA-PSK Complexity is disabled by default.
STEP 3 Configure the parameters:
DisableUsers can use the old or previous key after their current key
expires.
STEP 4 Click Save. The changes are saved to the Startup Configuration.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
115
7
Client Quality of Service
This chapter provides an overview of Client quality of service (QoS) and explains
the QoS features available from the Client QoS menu. It contains these topics:
ACL
Class Map
Policy Map
ACL
ACLs are a collection of permit and deny conditions, called rules, that provide
security by blocking unauthorized users and allowing authorized users to access
specific resources. ACLs can block any unwarranted attempts to reach network
resources.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
116
strongly recommended to add a permit rule within the ACL to allow traffic.
MAC ACLs
MAC ACLs are Layer 2 ACLs. You can configure the rules to inspect fields of a
frame such as the source or destination MAC address, the VLAN ID, or the class of
service. When a frame enters or exits the WAP device port (depending on whether
the ACL is applied in the up or down direction), the WAP device inspects the frame
and checks the ACL rules against the content of the frame. If any of the rules match
the content, a permit or deny action is taken on the frame.
Configuring ACLs
Configure ACLs and rules on the ACL Configuration page, and then apply the rules
to a specified VAP.
These steps give a general description of how to configure ACLs:
STEP 1 Select Client QoS > ACL in the navigation pane.
STEP 2 Specify a name for the ACL.
STEP 3 Select the type of ACL to add.
STEP 4 Add the ACL.
STEP 5 Add new rules to the ACL.
STEP 6 Configure the match criteria for the rules.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
117
STEP 7 Use the Client QoS Association page to apply the ACL to one or more VAPs.
ACL NameA name to identify the ACL. The name can contain from 1 to 31
alphanumeric and special characters. Spaces are not allowed.
IPv4
IPv6
MAC
IPv4 and IPv6 ACLs control access to network resources based on Layer 3
and Layer 4 criteria. MAC ACLs control access based on Layer 2 criteria.
STEP 3 Click Add ACL.
ACL Name - ACL TypeThe ACL to configure with the new rule. The list
contains all ACLs added in the ACL Configuration section.
Select New Rule to configure a new rule for the selected ACL.
If rules already exist (even if created for use with other ACLs), you can
select the rule number to add the rule to the selected ACL or to modify
the rule.
When an ACL has multiple rules, the rules are applied to the packet or frame
in the order in which you add them to the ACL. There is an implicit deny all
rule as the final rule.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
118
When you select Deny, the rule blocks all traffic that meets the rule criteria
from entering or exiting the WAP device (depending on the ACL direction
you select). Traffic that does not meet the criteria is forwarded unless this
rule is the final rule. Because there is an implicit deny all rule at the end of
every ACL, traffic that is not explicitly permitted is dropped.
Match Every PacketIf selected, the rule, which either has a permit or deny
action, matches the frame or packet regardless of its contents.
If you select this field, you cannot configure any additional match criteria. The
Match Every Packet option is selected by default for a new rule. You must
clear the option to configure other match fields.
Select From ListSelect one of these protocols: IP, ICMP, IGMP, TCP, or
UDP.
Source PortIncludes a source port in the match condition for the rule. The
source port is identified in the datagram header.
If you select Source Port, choose the port name or enter the port number.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
119
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
120
IP TOS MaskEnter an IP TOS Mask value to identify the bit positions in the
IP TOS Bits value that are used for comparison against the IP TOS field in a
packet.
The IP TOS Mask value is a two-digit hexadecimal number from 00 to FF,
representing an inverted (that is, wildcard) mask. The zero-valued bits in the
IP TOS Mask denote the bit positions in the IP TOS Bits value that are used
for comparison against the IP TOS field of a packet. For example, to check
for an IP TOS value having bits 7 and 5 set and bit 1 clear, where bit 7 is most
significant, use an IP TOS Bits value of 0 and an IP TOS Mask of 00.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
121
Source IPv6 Prefix LengthEnter the prefix length of the source IPv6
address.
IPv6 Flow LabelA 20-bit number that is unique to an IPv6 packet. It is used
by end stations to signify QoS handling in routers (range 0 to 1048575).
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
122
Source MAC AddressSelect this field and enter the source MAC address
to compare against an Ethernet frame.
Source MAC MaskSelect this field and enter the source MAC address
mask specifying which bits in the source MAC to compare against an
Ethernet frame.
For each bit position in the MAC mask, a 0 indicates that the corresponding
address bit is significant and a 1 indicates that the address bit is ignored. For
example, to check only the first four octets of a MAC address, a MAC mask
of 00:00:00:00:ff:ff is used. A MAC mask of 00:00:00:00:00:00 checks all
address bits and is used to match a single MAC address.
Destination MAC AddressSelect this field and enter the destination MAC
address to compare against an Ethernet frame.
VLAN IDSelect this field and enter the specific VLAN ID to compare
against an Ethernet frame.
This field is located in the first/only 802.1Q VLAN tag.
STEP 5 Click Save. The changes are saved to the Startup Configuration.
NOTE To delete an ACL, ensure that it is selected in the ACL Name-ACL Type list, select
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
123
Class Map
The Client QoS feature contains Differentiated Services (DiffServ) support that
allows traffic to be classified into streams and given a certain QoS treatment in
accordance with defined per-hop behaviors.
Standard IP-based networks are designed to provide best-effort data delivery
service. Best-effort service implies that the network delivers the data in a timely
fashion, although there is no guarantee that it will. During times of congestion,
packets may be delayed, sent sporadically, or dropped. For typical Internet
applications, such as email and file transfer, a slight degradation in service is
acceptable and in many cases unnoticeable. However, on applications with strict
timing requirements, such as voice or multimedia, any degradation of service has
undesirable effects.
A DiffServ configuration begins with defining class maps, which classify traffic
according to their IP protocol and other criteria. Each class map can then be
associated with a policy map, which defines how to handle the traffic class.
Classes that include time-sensitive traffic can be assigned to policy maps that
give precedence over other traffic.
You can use the Class Map page to define classes of traffic. Use the Policy Map
page to define policies and associate class maps to them.
IPv4The class map applies only to IPv4 traffic on the WAP device.
IPv6The class map applies only to IPv6 traffic on the WAP device.
The Class Map page appears with additional fields, depending on the Layer 3
protocol selected:
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
124
Use the fields in the Match Criteria Configuration area to match packets to a class.
Select the check box for each field to be used as a criterion for a class and enter
data in the related field. You can have multiple match criteria in a class.
The match criteria fields that are available depend on whether the class map is an
IPv4 or IPv6 class map.
Select From ListMatch the selected protocol: IP, ICMP, IPv6, ICMPv6,
IGMP, TCP, UDP.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
125
A DiffServ mask of 255.255.255.255 indicates that all bits are important, and
a mask of 0.0.0.0 indicates that no bits are important. The opposite is true
with an ACL wildcard mask. For example, to match the criteria to a single host
address, use a mask of 255.255.255.255. To match the criteria to a 24-bit
subnet (for example, 192.168.10.0/24), use a mask of 255.255.255.0.
Source IPv6 Prefix Length (IPv6 only)The prefix length of the source IPv6
address.
IPv6 Flow Label (IPv6 only)A 20-bit number that is unique to an IPv6
packet. It is used by end stations to signify QoS handling in routers (range 0
to 1048575).
Source PortIncludes a source port in the match condition for the rule. The
source port is identified in the datagram header.
If you select the field, choose the port name or enter the port number.
-
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
126
0 to 1023Well-Known Ports
1024 to 49151Registered Ports
49152 to 65535Dynamic and/or Private Ports
Source MAC MaskThe source MAC address mask specifying which bits
in the destination MAC to compare against an Ethernet frame.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
127
For each bit position in the MAC mask, a 0 indicates that the corresponding
address bit is significant and a 1 indicates that the address bit is ignored. For
example, to check only the first four octets of a MAC address, a MAC mask
of 00:00:00:00:ff:ff is used. A MAC mask of 00:00:00:00:00:00 checks all
address bits and is used to match a single MAC address.
The following Service Type fields show for IPv4 only. You can specify one type
of service to use in matching packets to class criteria.
IP TOS Bits (IPv4 only)Uses the packet's Type of Service bits in the IP
header as match criteria.
The IP TOS bit value ranges between (00 to FF). The high-order three bits
represent the IP Precedence value. The high-order six bits represent the IP
Differentiated Services Code Point (DSCP) value.
STEP 3 Click Save. The changes are saved to the Startup Configuration.
NOTE To delete a class map, select it in the Class Map Name list and click Delete. The
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
128
Policy Map
Packets are classified and processed based on defined criteria. The classification
criteria is defined by a class on the Class Map page. The processing is defined by
a policy's attributes on the Policy Map page. Policy attributes may be defined on a
per-class instance basis and determine how traffic that matches the class criteria
is handled.
The WAP device supports up to 50 policy maps. A policy map can contain up to
10 class maps.
To add and configure a policy map:
STEP 1 Select Client QoS > Policy Map in the navigation pane.
STEP 2 Enter a Policy Map Name The name can contain from 1 to 31 alphanumeric and
Police SimpleEstablishes the traffic policing style for the class. The
simple form of the policing style uses a single data rate and burst size,
resulting in two outcomes: conform and nonconform. If you select this field,
configure one of these fields:
-
SendSpecifies that all packets for the associated traffic stream are to be
forwarded if the class map criteria is met.
DropSpecifies that all packets for the associated traffic stream are to be
dropped if the class map criteria is met.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
129
Mark Class of ServiceMarks all packets for the associated traffic stream
with the specified class of service value in the priority field of the 802.1p
header. If the packet does not already contain this header, one is inserted.
The CoS value is an integer from 0 to 7.
Mark IP DSCPMarks all packets for the associated traffic stream with the
IP DSCP value you select from the list or specify.
-
Match to ValueA DSCP value that you specify. The value is an integer
between 0 to 63.
STEP 7 Click Save. The changes are saved to the Startup Configuration.
NOTE To delete a policy map, select it in the Policy Map Name list and click Delete.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
130
parameters.
STEP 3 Select Enable for the Client QoS Global to enable this feature.
STEP 4 Configure these parameters for the selected VAP:
ACL Type DownThe type of ACL to apply to traffic in the outbound (WAP
device-to-client) direction, which can be one of these options:
ACL Name DownThe name of the ACL applied to traffic in the outbound
direction.
After switching the packet or frame to the outbound interface, the ACL's
rules are checked for a match. The packet or frame is transmitted if it is
permitted and discarded if it is denied.
ACL Type UpThe type of ACL that is applied to traffic in the inbound
(client-to-WAP) direction, which can be one of these options:
-
ACL Name UpThe name of the ACL applied to traffic entering the WAP
device in the inbound direction.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
131
When a packet or frame is received by the WAP device, the ACL's rules are
checked for a match. The packet or frame is processed if it is permitted and
discarded if it is denied.
DiffServ Policy UpThe name of the DiffServ policy applied to traffic sent
to the WAP device in the inbound (client-to-WAP) direction.
STEP 5 Click Save. The changes are saved to the Startup Configuration.
ACL Type UpThe type of ACL that is applied to traffic in the inbound
(client-to-WAP) direction, which can be one of these options:
-
IPv4: The ACL examines IPv4 packets for matches to ACL rules.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
132
IPv6: The ACL examines IPv6 packets for matches to ACL rules.
MAC: The ACL examines Layer 2 frames for matches to ACL rules.
ACL Name UpThe name of the ACL applied to traffic entering the WAP in
the inbound direction. When a packet or frame is received by the WAP, the
ACL rules are checked for a match. The packet or frame is processed if it is
permitted and discarded if it is denied.
IPv4: The ACL examines IPv4 packets for matches to ACL rules.
IPv6: The ACL examines IPv6 packets for matches to ACL rules.
MAC: The ACL examines Layer 2 frames for matches to ACL rules.
ACL Name DownThe name of the ACL applied to traffic in the outbound
direction. After switching the packet or frame to the outbound interface, the
ACL rules are checked for a match. The packet or frame is transmitted if it is
permitted and discarded if it is denied.
DiffServ Policy UpThe name of the DiffServ policy applied to traffic sent
to the WAP device in the inbound (client-to-WAP) direction.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
133
8
Simple Network Management Protocol
SNMP Overview
Views
Groups
Users
Targets
SNMP Overview
SNMP defines a standard for recording, storing, and sharing information about
network devices. SNMP facilitates network management, troubleshooting, and
maintenance.
The WAP device supports SNMP versions 1, 2, and 3. Unless specifically noted, all
configuration parameters apply to SNMPv1 and SNMPv2c only. Key components
of any SNMP-managed network are managed devices, SNMP agents, and a
management system. The agents store data about their devices in Management
Information Bases (MIBs) and return this data to the SNMP manager when
requested. Managed devices can be network nodes such as WAP devices,
routers, switches, bridges, hubs, servers, or printers.
The WAP device can function as an SNMP managed device for seamless
integration into network management systems.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
134
By default, an SNMP agent listens only to requests from port 161. However, you
can configure this so that the agent listens to requests on a different port. The valid
range is from 1025 to 65535.
STEP 4 Configure the SNMPv2 settings:
AllThe set of stations that can access the WAP device through SNMP
is not restricted.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
135
A DNS hostname can consist of one or more labels, which are sets of up to
63 alphanumeric characters. If a hostname includes multiple labels, each is
separated by a period (.). The entire series of labels and periods can be up
to 253 characters long.
As with community names, this setting provides a level of security on SNMP
settings. The SNMP agent only accepts requests from the IP address,
hostname, or subnet specified here.
To specify a subnet, enter one or more subnetwork address ranges in the
form address/mask_length where address is an IP address and
mask_length is the number of mask bits. Both formats address/mask and
address/mask_length are supported. For example, if you enter a range of
192.168.1.0/24, this specifies a subnetwork with address 192.168.1.0 and a
subnet mask of 255.255.255.0.
The address range is used to specify the subnet of the designated NMS.
Only machines with IP addresses in this range are permitted to execute get,
and set requests on the managed device. Given the example above, the
machines with addresses from 192.168.1.1 through 192.168.1.254 can
execute SNMP commands on the device. (The address identified by suffix .0
in a subnetwork range is always reserved for the subnet address, and the
address identified by .255 in the range is always reserved for the broadcast
address.)
As another example, if you enter a range of 10.10.1.128/25, machines with IP
addresses from 10.10.1.129 through 10.10.1.254 can execute SNMP requests
on managed devices. In this example, 10.10.1.128 is the network address and
10.10.1.255 is the broadcast address. A total of 126 addresses would be
designated.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
136
STEP 6 Click Save. The changes are saved to the Startup Configuration.
NOTE After new settings are saved, the corresponding processes may be stopped and
restarted. When this happens, the WAP device may lose connectivity. We
recommend that you change WAP device settings when a loss of connectivity will
least affect your wireless clients.
Views
An SNMP MIB view is a family of view subtrees in the MIB hierarchy. A view
subtree is identified by the pairing of an Object Identifier (OID) subtree value with a
bit string mask value. Each MIB view is defined by two sets of view subtrees,
included in or excluded from the MIB view. You can create MIB views to control the
OID range that SNMPv3 users can access.
The WAP device supports a maximum of 16 views.
These notes summarize some critical guidelines regarding SNMPv3 view
configuration. Please read all the notes before proceeding.
NOTE A MIB view called all is created by default in the system. This view contains all
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
137
STEP 3 Check the box in the new row and click Edit:
View NameEnter a name that identifies the MIB view. View names can
contain up to 32 alphanumeric characters.
OIDEnter an OID string for the subtree to include or exclude from the view.
For example, the system subtree is specified by the OID string .1.3.6.1.2.1.1.
STEP 4 Click Save. The view is added to the SNMPv3 Views list and your changes are
Groups
SNMPv3 groups allow you to combine users into groups of different authorization
and access privileges. Each group is associated with one of three security levels:
noAuthNoPriv
authNoPriv
authPriv
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
138
Group NameA name that identifies the group. The default group names
are RO and RW.
Group names can contain up to 32 alphanumeric characters.
Security LevelSets the security level for the group, which can be one of
these options:
-
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
139
Write ViewsThe write access to MIBs for the group, which can be one of
these options:
-
STEP 5 Click Save. The group is added to the SNMPv3 Groups list and your changes are
Users
You can use the SNMP Users page to define users, associate a security level to
each user, and configure security keys per-user.
Each user is mapped to an SNMPv3 group, either from the predefined or userdefined groups, and, optionally, is configured for authentication and encryption.
For authentication, only the MD5 type is supported. For encryption, only the DES
type is supported. There are no default SNMPv3 users on the WAP device, and
you can add up to eight users.
To add SNMP users:
STEP 1 Select SNMP > Users in the navigation pane.
STEP 2 Click Add to create a new row in the SNMPv3 Users table.
STEP 3 Check the box in the new row and click Edit.
STEP 4 Configure the parameters:
User NameA name that identifies the SNMPv3 user. User names can
contain up to 32 alphanumeric characters.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
140
GroupThe group that the user is mapped to. The default groups are
RWAuth, RWPriv, and RO. You can define additional groups on the SNMP
Groups page.
Encryption Pass Phrase(If you specify DES as the privacy type) A pass
phrase to use to encrypt the SNMP requests. The pass phrase must be
between 8 and 32 characters in length.
STEP 5 Click Save. The user is added to the SNMPv3 Users list and your changes are
Targets
SNMPv3 targets send SNMP notifications using Inform messages to the SNMP
Manager. For SNMPv3 targets, only Informs are sent, not traps. For SNMP versions
1 and 2, traps are sent. Each target is defined with a target IP address, UDP port,
and SNMPv3 user name.
NOTE SNMPv3 user configuration (see the Users page) should be completed before
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
141
UDP PortEnter the UDP port to use for sending SNMPv3 targets.
UsersEnter the name of the SNMP user to associate with the target. To
configure SNMP users, see the Users page.
STEP 5 Click Save. The user is added to the SNMPv3 Targets list and your changes are
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
142
9
Captive Portal
This chapter describes the Captive Portal (CP) feature, which allows you to block
wireless clients from accessing the network until user verification has been
established. You can configure CP verification to allow access for both guest and
authenticated users.
NOTE The Captive Portal feature is available only on the Cisco WAP321 device.
Instance Configuration
Instance Association
Local Groups
Local Users
Authenticated Clients
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
143
Captive Portal
Captive Portal Global Configuration
Additional HTTPS PortHTTP traffic over SSL (HTTPS) uses the HTTPS
management port, which is 443 by default. You can configure an additional
port for HTTPS traffic. Enter port number between 1025 and 65535, or 443.
The HTTP and HTTPs ports cannot be the same.
STEP 3 Click Save. The changes are saved to the Startup Configuration.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
144
Captive Portal
Instance Configuration
Instance Configuration
You can create up to two Captive Portal instances; each CP instance is a defined
set of instance parameters. Instances can be associated with one or more VAPs.
Different instances can be configured to respond differently to users as they
attempt to access the associated VAP.
NOTE Before you create an instance, review these bullets first:
Do you need to add a new group? If yes, go to Local Groups to add a group.
Do you need to add a new user? If yes, go to Local Users to add a user.
The Captive Portal Instance Parameters fields reappear with additional options.
STEP 5 Configure the parameters:
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
145
Captive Portal
Instance Configuration
Users page. The away timeout value set on the Local Users page has
precedence over the value configured here, unless the value is set to 0 (the
default). A value of 0 indicates to use the instance timeout value.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
146
Captive Portal
Instance Configuration
Global RADIUSIf the Verification Mode is RADIUS, select this option to the
default Global RADIUS server list to authenticate clients. (See RADIUS
Server for information about configuring the global RADIUS servers.) If you
want the CP feature to use a different set of RADIUS servers, uncheck the
box and configure the servers in the fields on this page.
Key 1The shared secret key that the WAP device uses to authenticate to
the primary RADIUS server.
You can use up to 63 standard alphanumeric and special characters. The key
is case sensitive and must match the key configured on the RADIUS server.
The text you enter is shown as asterisks.
Locale CountThe number of locales associated with the instance. You can
create and assign up to three different locales to each CP instance from the
Web Customization page.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
147
Captive Portal
Instance Association
STEP 6 Click Save. Your changes are saved to the Startup Configuration.
Instance Association
Once you create an instance, you can use the Instance Association page to
associate a CP instance to a VAP. The associated CP instance settings applies to
users who attempt to authenticate on the VAP.
To associate an instance to a VAP:
STEP 1 Select Captive Portal > Instance Association in the navigation pane.
STEP 2 Select the instance name for each VAP you want to associate an instance to.
STEP 3 Click Save. Your change are saved to the Startup Configuration.
You can create up to three different authentication pages with different locales on
your network.
STEP 3 Enter a Web Locale Name to assign to the page. The name can be from 1 to 32
alphanumeric characters.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
148
Captive Portal
Web Portal Customization
STEP 4 From the Captive Portal Instances list, select the CP instance that this locale is
associated with.
You can associate multiple locales with an instance. When a user attempts to
access a particular VAP that is associated with a CP instance, the locales that are
associated with that instance show as links on the authentication page. The user
can select a link to switch to that locale.
STEP 5 Click Save. The changes are saved to the Startup Configuration.
STEP 6 From the Captive Portal Web Locale list, select the locale you created.
The page shows additional fields for modifying the locale. The Locale ID and
Instance Name fields cannot be edited. The editable fields are populated with
default values.
STEP 7 Configure the parameters:
Logo Image NameThe image file to show on the top left corner of the
page. This image is used for branding purposes, such as the company logo.
If you uploaded a custom logo image to the WAP device, you can select it
from the list.
SeparatorThe HTML code for the color of the thick horizontal line that
separates the page header from the page body, in 6-digit hexadecimal
format. The range is from 1 to 32 characters. The default is #BFBFBF.
Account ImageThe image file to show above the login field to depict an
authenticated login.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
149
Captive Portal
Web Portal Customization
Account LabelThe text that instructs the user to enter a user name. The
range is from 1 to 32 characters.
User LabelThe label for the user name text box. The range is from 1 to 32
characters.
Password LabelThe label for the user password text box. The range is
from 1 to 64 characters.
Button LabelThe label on the button that users click to submit their user
name/password for authentication. The range is from 2 to 32 characters. The
default is Connect.
FontsThe name of the font to use for all text on the CP page. You can enter
multiple font names, each separated by a comma. If the first font is not
available on the client system, the next font is used, and so on. For font names
that have spaces, surround the entire name in quotes. The range is from 1 to
512 characters. The default is MS UI Gothic, Arial, sans-serif.
Browser TitleThe text to show in the browser title bar. The range is from 1
to 128 characters. The default is Captive Portal.
Browser ContentThe text that shows in the page header, to the right of the
logo. The range is from 1 to 128 characters. The default is Welcome to the
Wireless Network.
ContentThe instructive text that shows in the page body below the user
name and password text boxes. The range is from 1 to 256 characters. The
default is To start using this service, enter your credentials and click the
connect button.
Accept LabelThe text that instructs users to select the check box to
acknowledge reading and accepting the Acceptance Use Policy. The range
is from 1 to 128 characters. The default is Check here to indicate that you
have read and accepted the Acceptance Use Policy.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
150
Captive Portal
Web Portal Customization
Denied TextThe text that shows when a user fails authentication. The
range is from 1 to 128 characters. The default is Error Invalid Credentials,
please try again!
Welcome TitleThe text that shows when the client has authenticated to
the VAP. The range is from 1 to 128 characters. The default is
Congratulations!
Welcome ContentThe text that shows when the client has connected to
the network. The range is from 1 to 256 characters. The default is You are
now authorized and connected to the network.
STEP 8 Click Save. Your changes are saved to the Startup Configuration.
STEP 9 Click Preview to view the updated page.
NOTE You can click Preview to show the text and images that have already been saved
to the Startup Configuration. If you make a change, click Save before clicking
Preview to see your changes.
Use
Default Width by
Height
Background
10 by 800 pixels
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
151
Captive Portal
Local Groups
Image Type
Use
Default Width by
Height
Logo
168 by 78 pixels
Account
295 by 55 pixels
to the Background Image Name, Logo Image Name, or Account Image fields.
The Web Portal Custom Image page appears.
STEP 2 Browse to select the image.
STEP 3 Click Upload.
STEP 4 Click Back to return to the Web Portal Custom Image page.
STEP 5 Select the Captive Portal Web Locale you want to configure.
STEP 6 For the Background Image Name, Logo Image Name, or Account Image fields,
NOTE To delete an image, on the Web Portal Custom Image page, select it from the Delete
Web Customization Image list and click Delete. You cannot delete the default
images.
Local Groups
Each local user is assigned to a user group. Each group is assigned to a CP
instance. The group facilitates managing the assignment of users to CP instances.
The user group named Default is built-in and cannot be deleted. You can create up
to two additional user groups.
To add local user groups:
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
152
Captive Portal
Local Users
STEP 1 Select Captive Portal > Local Groups in the navigation pane.
STEP 2 Enter a Group Name and click Save. The changes are saved to the Startup
Configuration.
NOTE To delete a group, select it in the Captive Portal Groups list, select the Delete
Local Users
You can configure a captive portal instance to accommodate either guest users
and authorized users. Guest users do not have assigned user names and
passwords.
Authorized users provide a valid user name and password that must first be
validated against a local database or RADIUS server. Authorized users are
typically assigned to a CP instance that is associated with a different VAP than
guest users.
You can use the Local Users page to configure up to 128 authorized users in the
local database.
To add and configure a local user:
STEP 1 Select Captive Portal > Local Users in the navigation pane.
STEP 2 Enter a User Name and click Save.
Show Password as Clear TextWhen enabled, the text you type is visible.
When disabled, the text is not masked as you enter it.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
153
Captive Portal
Authenticated Clients
minutes. The default value is 60. The timeout value configured here has
precedence over the value configured for the captive portal instance, unless
the user value is set to 0. When set to 0, the timeout value configured for the
CP instance is used.
STEP 4 Click Save. The changes are saved to the Startup Configuration.
Authenticated Clients
The Authenticated Clients page provides information about clients that have
authenticated on any Captive Portal instance.
To view the list of authenticated clients, select Captive Portal > Authenticated
Clients in the navigation pane.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
154
Captive Portal
Failed Authentication Clients
Radio IDThe ID of the radio. Because the WAP321 has a single radio, this
field always shows Radio1.
Captive Portal IDThe ID of the Captive Portal instance to which the user
is associated.
You can click Refresh to show the latest data from the WAP device.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
155
Captive Portal
Failed Authentication Clients
Radio IDThe ID of the radio. Because the WAP321 has a single radio, this
field shows Radio1.
Captive Portal IDThe ID of the Captive Portal instance to which the user
is associated.
You can click Refresh to show the latest data from the WAP device.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
156
10
Single Point Setup
This chapter describes how to configure Single Point Setup over multiple WAP
devices.
It includes these topics:
Access Points
Sessions
Channel Management
Wireless Neighborhood
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
157
10
WAP Devices
per Single Point
Setup
Number of
Active Clients
per Single Point
Setup
Maximum
Number of
Clients (Active
and Idle)
WAP121
40
64
WAP321
160
256
want to cluster are the same model. For example, Cisco WAP121 devices can only
cluster with other Cisco WAP121 devices.
It is strongly recommended to run the latest firmware version on all clustered WAP
devices.
NOTE Firmware upgrades are not propagated to all WAP devices in a
that they are interconnected and accessible across the switched LAN network.
STEP 3 Enable Single Point Setup on all WAP devices. See Access Points.
STEP 4 Verify that the WAP devices all reference the same Single Point Setup name. See
Access Points.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
158
10
When two separate Single Point Setup clusters join into a single cluster,
then the latest modified cluster wins arbitration of the configuration and
overwrites and updates the configuration of all clustered WAP devices.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
159
10
Loss of contact with the cluster prevents the WAP device from receiving the
latest operational configuration settings. The disconnection results in a halt
to proper seamless wireless service across the production network.
The WAP device continues to function with the wireless parameters that it
last received from the cluster.
Password Complexity
Client QoS
User Accounts
Email Alert
QoS
Log Settings
Rogue AP Detection
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
160
10
Scheduler
Networks
WPA-PSK Complexity
Time Settings
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
161
10
Port Settings
Bonjour
IPv6 Address
WDS Bridge
IPv6 Tunnel
WPS
Packet Capture
WorkGroup Bridge
Access Points
The Access Points page allows you to enable or disable Single Point Setup on a
WAP device, view the cluster members, and configure the location and cluster
name for a member. You can also click the IP address of a member to configure
and view data on that device.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
162
10
STEP 1 Select Single Point Setup > Access Points in the navigation pane.
Single Point Setup is disabled by default on the WAP device. When disabled, the
Enable Single Point Setup button is visible. If Single Point Setup is enabled, the
Disable Single Point Setup button is visible. You can edit Single Point Setup
options only when Single Point Setup is disabled.
Icons on the right side of the page indicate whether Single Point Setup is enabled
and, if it is, the number of WAP devices that are currently joined in the cluster.
STEP 2 With Single Point Setup disabled, configure the following information for each
Cluster NameEnter the name of the cluster for the WAP device to join, for
example Reception_Cluster.
The cluster name is not sent to other WAP devices. You must configure the
same name on each device that is a member. The cluster name must be
unique for each Single Point Setup you configure on the network. The default
is ciscosb-cluster.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
163
10
The WAP device begins searching for other WAP devices in the subnet that are
configured with the same cluster name and IP version. A potential cluster member
sends advertisements every 10 seconds to announce its presence.
While searching for other cluster members, the status indicates that the
configuration is being applied. Refresh the page to see the new configuration.
If one or more WAP devices are already configured with the same cluster settings,
the WAP device joins the cluster and information on each member shows in a
table.
STEP 4 Repeat these steps on additional WAP devices that you want to join the Single
Point Setup.
Note that the Single Point Setup status and the number of WAP devices are shown
graphically on the right side of the page.
members.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
164
10
STEP 4 (Optional) In the Location field, enter a description of where the access point is
The Single Point Setup status field for that access point will now show Disabled.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
165
10
Sessions
The Sessions page shows information on WLAN clients that are associated with
the WAP devices in the Single Point Setup cluster. Each WLAN client is identified
by its MAC address, along with the device location where it is currently
connected.
NOTE The Sessions page shows a maximum of 20 clients per radio on the clustered WAP
devices. To see all WLAN clients associated with a particular WAP device, view the
Status > Associated Clients page directly on that device.
To view a particular statistic for a WLAN client session, select an item from the
Display list and click Go. You can view information about idle time, data rate, and
signal strength.
A session in this context is the period of time in which a user on a client device
(station) with a unique MAC address maintains a connection with the wireless
network. The session begins when the WLAN client logs on to the network, and
the session ends when the WLAN client either logs off intentionally or loses the
connection for some other reason.
NOTE A session is not the same as an association, which describes a WLAN client
connection to a particular access point. A WLAN client association can shift from
one clustered access point to another within the same session.
To view sessions associated with the cluster, select Single Point Setup >
Sessions in the navigation pane.
The following data shows for each WLAN client session with a Single Point Setup.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
166
10
RateThe negotiated data rate. Actual transfer rates can vary depending on
overhead.
The data transmission rate is measured in megabits per second (Mbps). The
value should fall within the range of the advertised rate set for the mode in
use on the access point. For example, 6 to 54 Mbps for 802.11a.
SignalThe strength of the radio frequency (RF) signal the WLAN client
receives from the access point. The measure is known as Received Signal
Strength Indication (RSSI), and is a value between 0 and 100.
To sort the information shown in the tables by a particular indicator, click the
column label you want to sort by. For example, if you want to see the table rows
ordered by signal strength, click the Signal column label.
Channel Management
The Channel Management page shows the current and planned channel
assignments for WAP devices in a Single Point Setup cluster.
When channel management is enabled, the WAP device automatically assigns
radio channels used by WAP devices in a Single Point Setup cluster. Automatic
channel assignment reduces mutual interference (or interference with other WAP
devices outside of its cluster) and maximizes Wi-Fi bandwidth to help maintain
efficient communication over the wireless network.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
167
10
From the Channel Management page, you can view channel assignments for all
WAP devices in the cluster and stop or start automatic channel management. You
can also use the advanced settings to modify the interference reduction potential
that triggers channel reassignment, change the schedule for automatic updates,
and reconfigure the channel set used for assignments.
STEP 2 To start automatic channel assignment, click Start.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
168
10
No channel usage maps or channel reassignments are made. Only manual updates
affect the channel assignment.
StatusShows the status of the wireless radio in the device. (Some WAP
devices may have more than one wireless radio; each radio is displayed on
a separate line in the table.) The radio status is up (operational) or down (not
operational).
When selected for an access point, automated channel management plans do not
reassign the WAP devices to a different channel as a part of the optimization
strategy. Instead, WAP devices with locked channels are factored in as
requirements for the plan.
Click Save to update the locked setting. Locked devices show the same channel
for the Current Channel Assignments table and the Proposed Channel
Assignments table. Locked devices keep their current channels.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
169
10
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
170
10
The default is one hour, meaning that channel usage is reassessed and the
resulting channel plan is applied every hour.
If you change these settings, click Save. The changes are saved to the active
configuration and the Startup Configuration.
Wireless Neighborhood
The Wireless Neighborhood page shows up to 20 devices within range of each
wireless radio in the cluster. (For example, if a WAP device has two wireless
radios, 40 devices would be displayed for that device.) The Wireless
Neighborhood page also distinguishes between cluster members and
nonmembers.
The Wireless Neighborhood view can help you:
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
171
10
ClusterThe list at the top of the table shows IP addresses for all WAP
devices that are clustered together. (This list is the same as the members
list on the Single Point Setup > Access Points page.)
If there is only one WAP device in the cluster, only a single IP address
column shows, indicating that the WAP device is grouped with itself.
You can click on an IP address to view more details on a particular WAP
device.
Dark Blue BarA dark blue bar and a high signal strength number (for
example 50) indicates good signal strength detected from the neighbor, as
seen by the device whose IP address is listed above that column.
Lighter Blue BarA lighter blue bar and a lower signal strength number (for
example 20 or lower) indicates medium or weak signal strength from the
neighbor, as seen by the device whose IP address is listed above that
column
White BarA white bar and the number 0 indicates that a neighboring
device that was detected by one of the cluster members cannot be
detected by the device whose IP address is listed above that column.
Light Gray BarA light gray bar and no signal strength number indicates
that no signal has been detected from the neighbor, but the neighbor may
have been detected by other members of the cluster.
Dark Gray BarA dark gray bar and no signal strength number indicates
the WAP device itself that corresponds to the IP address listed above it. A
signal strength of zero is displayed because the devices own signal
strength is not measured.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
172
10
SignalThe strength of the radio signal detected from the access point,
measured in decibels (dB).
Beacon AgeThe date and time of the last beacon received from this
access point.
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
173
A
Deauthentication Message Reason Codes
When a client deauthenticates from the WAP device, a message is sent to the
system log. The message includes a reason code that may be helpful in
determining why a client was deauthenticated. You can view log messages when
you click Status and Statistics > Log Status.
The following table describes the deauthentication reason codes.
Reason code
Meaning
Reserved
Unspecified reason
10
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
174
Reason code
Meaning
11
12
13
14
15
16
17
18
19
20
Invalid AKMP
21
22
23
24
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
175
B
Where to Go From Here
Cisco provides a wide range of resources to help you and your customer obtain
the full benefits of the Cisco WAP121 and WAP321 Access Point.
Support
Cisco Small Business
Support Community
www.cisco.com/go/smallbizsupport
www.cisco.com/go/smallbizhelp
www.cisco.com/en/US/support/
tsd_cisco_small_business
_support_center_contacts.html
www.cisco.com/go/smallbizfirmware
Select a link to download firmware for Cisco Small
Business Products. No login is required.
Downloads for all other Cisco Small Business
products, including Network Storage Systems, are
available in the Download area on Cisco.com at
www.cisco.com/go/software (registration/login
required).
www.cisco.com/go/smallbiz_opensource_request
Product Documentation
Cisco Small Business
WAP121 and WAP321
Wireless-N Access Point
with PoE Quick Start Guide
and Administration Guide
http://www.cisco.com/go/100_wap_resources or
http://www.cisco.com/go/300_wap_resources
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
176
www.cisco.com/web/partners/sell/smb
www.cisco.com/smb
Cisco Small Business WAP121 and WAP321 Wireless-N Access Point with PoE
177