CG Ports Interfaces
CG Ports Interfaces
Figure 4-1 Ports on the Cisco 5500 Series Wireless LAN Controllers
1 2 3 4 5 6
251197
Model 5508
RP SP USB0 USB1 EN EN 1 2 3 4 5 6 7 8 PS1 PS2 SYS ALM
7 8 9 10
1 Redundant port for future use (RJ-45) 6 SFP distribution system ports 1–8
2 Service port (RJ-45) 7 Management port LEDs
3 Console port (RJ-45) 8 SFP distribution port Link and Activity LEDs
Power supply (PS1 and PS2), System (SYS), and
4 USB ports 0 and 1 (Type A) 9 Alarm (ALM) LEDs
Console port (Mini USB Type B) Expansion module slot
Note You can use only one console port
(either RJ-45 or mini USB). When
you connect to one console port,
5 the other is disabled. 10
Note The Gigabit Ethernet ports on the Cisco 5508 Controllers accept these SX/LC/T small
form-factor plug-in (SFP) modules:
- 1000BASE-SX SFP modules, which provide a 1000-Mbps wired connection to a network
through an 850nM (SX) fiber-optic link using an LC physical connector
- 1000BASE-LX SFP modules, which provide a 1000-Mbps wired connection to a network
through a 1300nM (LX/LH) fiber-optic link using an LC physical connector
- 1000BASE-T SFP modules, which provide a 1000-Mbps wired connection to a network
through a copper link using an RJ-45 physical connector
Each distribution system port is, by default, an 802.1Q VLAN trunk port. The VLAN trunking
characteristics of the port are not configurable.
Note You are not required to configure an AP-manager interface on Cisco 5500 Series
Controllers.
Note For Cisco 5500 Series Controllers in a non-link-aggregation (non-LAG) configuration, the management
interface must be on a different VLAN than any dynamic AP-manager interface. Otherwise, the
management interface cannot fail over to the port that the AP-manager is on.
Note Cisco 5500 Series Controllers do not support fragmented pings on any interface.
Additional References
See the “Configuring Link Aggregation” section on page 4-26 if you want to configure the controller to
dynamically map the interfaces to a single port channel rather than having to configure primary and
secondary ports for each interface.
Note The management interface uses the controller’s factory-set distribution system MAC address.
Note Select the Quarantine check box if you want to configure this VLAN as unhealthy or you
want to configure network access control (NAC) out-of-band integration. Doing so causes
the data traffic of any client that is assigned to this VLAN to pass through the controller. See
Chapter 8, “Working with WLANs,” for more information about NAC out-of-band
integration.
• NAT address (only Cisco 2500 Series Controllers and Cisco 5500 Series Controllers are configured
for dynamic AP management)
Note Select the Enable NAT Address check box and enter the external NAT IP address if you
want to be able to deploy your Cisco 2500 Series Controllers or Cisco 5500 Series Controller
behind a router or other gateway device that is using one-to-one mapping network address
translation (NAT). NAT allows a device, such as a router, to act as an agent between the
Internet (public) and a local network (private). In this case, it maps the controller’s intranet
IP addresses to a corresponding external address. The controller’s dynamic AP-manager
interface must be configured with the external NAT IP address so that the controller can send
the correct IP address in the Discovery Response.
Note The NAT parameters are supported for use only with one-to-one-mapping NAT, where each
private client has a direct and fixed mapping to a global address. The NAT parameters do not
support one-to-many NAT, which uses source port mapping to enable a group of clients to
be represented by a single IP address.
Note If a Cisco 2500 Series Controllers or Cisco 5500 Series Controller is configured with an
external NAT IP address under the management interface, the APs in local mode cannot
associate with the controller. The workaround is to either ensure that the management
interface has a globally valid IP address or ensure that external NAT IP address is valid
internally for the local APs.
• VLAN identifier
Note Enter 0 for an untagged VLAN or a nonzero value for a tagged VLAN. We recommend using
tagged VLANs for the management interface.
Note For Cisco 2500 Series Controllers or Cisco 5500 Series Controllers, the management
interface acts like an AP-manager interface by default. If desired, you can disable the
management interface as an AP-manager interface and create another dynamic interface as
an AP manager.
• Physical port assignment (for all controllers except the Cisco 5500 Series Controller)
• Primary and secondary DHCP servers
Note To create ACLs, follow the instructions in Chapter 7, “Configuring Security Solutions.”
Step 1 Enter the show interface detailed management command to view the current management interface
settings.
Note The management interface uses the controller’s factory-set distribution system MAC address.
Step 2 Enter the config wlan disable wlan-number command to disable each WLAN that uses the management
interface for distribution system communication.
Step 3 Enter these commands to define the management interface:
• config interface address management ip-addr ip-netmask gateway
• config interface quarantine vlan management vlan_id
Note Use the config interface quarantine vlan management vlan_id command to configure a
quarantine VLAN on the management interface.
Note Enter 0 for an untagged VLAN or a nonzero value for a tagged VLAN. We recommend using
tagged VLANs for the management interface.
• config interface ap-manager management {enable | disable} (for Cisco 5500 Series Controllers
only)
Note Use the config interface ap-manager management {enable | disable} command to enable
or disable dynamic AP management for the management interface. For Cisco 5500 Series
Controllers, the management interface acts like an AP-manager interface by default. If
desired, you can disable the management interface as an AP-manager interface and create
another dynamic interface as an AP manager.
• config interface port management physical-ds-port-number (for all controllers except the 5500
series)
• config interface dhcp management ip-address-of-primary-dhcp-server
[ip-address-of-secondary-dhcp-server]
Note See Chapter 7, “Configuring Security Solutions,” for more information on ACLs.
Step 4 Enter these commands if you want to be able to deploy your Cisco 5500 Series Controller behind a router
or other gateway device that is using one-to-one mapping network address translation (NAT):
• config interface nat-address management {enable | disable}
• config interface nat-address management set public_IP_address
NAT allows a device, such as a router, to act as an agent between the Internet (public) and a local network
(private). In this case, it maps the controller’s intranet IP addresses to a corresponding external address.
The controller’s dynamic AP-manager interface must be configured with the external NAT IP address so
that the controller can send the correct IP address in the Discovery Response.
Note These NAT commands can be used only on Cisco 5500 Series Controllers and only if the
management interface is configured for dynamic AP management.
Note These commands are supported for use only with one-to-one-mapping NAT, where each private
client has a direct and fixed mapping to a global address. These commands do not support
one-to-many NAT, which uses source port mapping to enable a group of clients to be represented
by a single IP address.
Note Enter 0 for an untagged VLAN or a nonzero value for a tagged VLAN. We recommend using
tagged VLANs for the AP-manager interface.
Note The AP-manager interface’s IP address must be different from the management interface’s
IP address and may or may not be on the same subnet as the management interface. However,
we recommend that both interfaces be on the same subnet for optimum access point
association.
Note To create ACLs, follow the instructions in Chapter 7, “Configuring Security Solutions.”
Step 1 Enter the show interface summary command to view the current interfaces.
Note If the system is operating in Layer 2 mode, the AP-manager interface is not listed.
Step 2 Enter the show interface detailed ap-manager command to view the current AP-manager interface
settings.
Step 3 Enter the config wlan disable wlan-number command to disable each WLAN that uses the AP-manager
interface for distribution system communication.
Step 4 Enter these commands to define the AP-manager interface:
• config interface address ap-manager ip-addr ip-netmask gateway
• config interface vlan ap-manager {vlan-id | 0}
Note Enter 0 for an untagged VLAN or a nonzero value for a tagged VLAN. We recommend using
tagged VLANs for the AP-manager interface.
Note See Chapter 7, “Configuring Security Solutions,” for more information on ACLs.
Additional References
See the “Configuring Multiple AP-Manager Interfaces” section on page 4-32 for information on creating
and using multiple AP-manager interfaces.
Note See Chapter 7, “Configuring Security Solutions,” for additional information on web
authentication.
IP address must be set (it cannot be 0.0.0.0), and no other device on the network can have the same
address as the virtual interface. A virtual interface must be configured with an unassigned and
unused gateway IP address. A virtual interface IP address is not pingable and should not exist in any
routing table in your network. In addition, a virtual interface cannot be mapped to a backup port.
• All controllers within a mobility group must be configured with the same virtual interface IP
address. Otherwise, inter-controller roaming may appear to work, but the handoff does not complete,
and the client loses connectivity for a period of time.
Note To ensure connectivity and web authentication, the DNS server should always point to the
virtual interface. If a DNS hostname is configured for the virtual interface, then the same
DNS host name must be configured on the DNS server(s) used by the client.
Step 1 Enter the show interface detailed virtual command to view the current virtual interface settings.
Step 2 Enter the config wlan disable wlan-number command to disable each WLAN that uses the virtual
interface for distribution system communication.
Step 3 Enter these commands to define the virtual interface:
• config interface address virtual ip-address
Note For ip-address, enter any fictitious, unassigned, and unused gateway IP address.
Note The service-port interface uses the factory-set service-port MAC address of the controller.
Step 1 Enter the show interface detailed service-port command to view the current service-port interface
settings.
Note The service-port interface uses the controller’s factory-set service-port MAC address.
Step 3 The service port is used for out-of-band management of the controller. If the management workstation
is in a remote subnet, you may need to add a route on the controller in order to manage the controller
from that remote workstation. To do so, enter this command:
config route add network-ip-addr ip-netmask gateway
Step 4 Enter the save config command to save your changes.
Step 5 Enter the show interface detailed service-port command to verify that your changes have been saved.
Note Select the Quarantine check box if you want to configure this VLAN as unhealthy or you
want to configure network access control (NAC) out-of-band integration. Doing so causes
the data traffic of any client that is assigned to this VLAN to pass through the controller. See
Chapter 8, “Working with WLANs,” for more information about NAC out-of-band
integration.
• Physical port assignment (for all controllers except the 5500 series)
• NAT address (only for Cisco 5500 Series Controllers configured for dynamic AP management)
Note Select the Enable NAT Address check box and enter the external NAT IP address if you
want to be able to deploy your Cisco 5500 Series Controller behind a router or other gateway
device that is using one-to-one mapping network address translation (NAT). NAT allows a
device, such as a router, to act as an agent between the Internet (public) and a local network
(private). In this case, it maps the controller’s intranet IP addresses to a corresponding
external address. The controller’s dynamic AP-manager interface must be configured with
the external NAT IP address so that the controller can send the correct IP address in the
Discovery Response.
Note The NAT parameters are supported for use only with one-to-one-mapping NAT, where each
private client has a direct and fixed mapping to a global address. The NAT parameters do not
support one-to-many NAT, which uses source port mapping to enable a group of clients to
be represented by a single IP address.
• Dynamic AP management
Note When you enable this feature, this dynamic interface is configured as an AP-manager
interface (only one AP-manager interface is allowed per physical port). A dynamic interface
that is marked as an AP-manager interface cannot be used as a WLAN interface.
Note Set the APs in a VLAN that is different than the dynamic interface configured on the
controller. If the APs are in the same VLAN as the dynamic interface, the APs are not
registered on the controller and the “LWAPP discovery rejected” and “Layer 3 discovery
request not received on management VLAN” errors are logged on the controller.
• VLAN identifier
• Fixed IP address, IP netmask, and default gateway
• Primary and secondary DHCP servers
• Access control list (ACL) name, if required
Note See Chapter 7, “Configuring Security Solutions,” for more information on ACLs.
Note To ensure proper operation, you must set the Port Number and Primary DHCP Server
parameters.
Note When you apply a flow policer or an aggregate policer at the ingress of a Dynamic Interface VLAN for
the Upstream (wireless to wired) traffic, it is not possible to police because the VLAN based policy has
no effect and no policing occurs. When the traffic comes out of the WiSM LAG (L2) and hits the Switch
Virtual Interface (SVI) (L3), the QoS policy applied is a VLAN-based policy that has no effect on the
policing.
To enable an ingress L3 VLAN-based policy on the SVI, you must enable a VLAN-based QoS equivalent
to the mls qos-vlan-based command on the WiSM LAG. All the previous 12.2(33)SXI releases, which
support Auto LAG for WiSM only, such as 12.2(33)SXI, 12.2(33)SXI1, 12.2(33)SXI2a, 12.2(33)SXI3,
and so on, do not have this WiSM CLI. Therefore, the VLAN-based QoS policy applied at the ingress of
the SVI for wireless to wired traffic never polices any traffic coming out of the WiSM LAG that hits the
SVI. The commands that are equivalent to the mls qos-vlan-based command are as follows:
Virtual Switching System: wism switch switch_no module module_no controller controller_no
qos-vlan-based
Step 1 Enter the show interface summary command to view the current dynamic interfaces.
Step 2 View the details of a specific dynamic interface by entering this command:
show interface detailed operator_defined_interface_name.
Note Interface names that contain spaces must be enclosed in double quotes. For example: config interface
create "vlan 25".
Step 3 Enter the config wlan disable wlan_id command to disable each WLAN that uses the dynamic interface
for distribution system communication.
Step 4 Enter these commands to configure dynamic interfaces:
• config interface create operator_defined_interface_name {vlan_id | x}
• config interface address operator_defined_interface_name ip_addr ip_netmask [gateway]
• config interface vlan operator_defined_interface_name {vlan_id | 0}
• config interface port operator_defined_interface_name physical_ds_port_number
• config interface ap-manager operator_defined_interface_name {enable | disable}
Note Use the config interface quarantine vlan interface_name vlan_id command to configure a
quarantine VLAN on any interface.
Note See Chapter 7, “Configuring Security Solutions,” for more information on ACLs.
Step 5 Enter these commands if you want to be able to deploy your Cisco 5500 Series Controller behind a router
or other gateway device that is using one-to-one mapping network address translation (NAT):
• config interface nat-address dynamic-interface operator_defined_interface_name {enable |
disable}
• config interface nat-address dynamic-interface operator_defined_interface_name set
public_IP_address
NAT allows a device, such as a router, to act as an agent between the Internet (public) and a local network
(private). In this case, it maps the controller’s intranet IP addresses to a corresponding external address.
The controller’s dynamic AP-manager interface must be configured with the external NAT IP address so
that the controller can send the correct IP address in the Discovery Response.
Note These NAT commands can be used only on Cisco 5500 Series Controllers and only if the
dynamic interface is configured for dynamic AP management.
Note These commands are supported for use only with one-to-one-mapping NAT, whereby each
private client has a direct and fixed mapping to a global address. These commands do not support
one-to-many NAT, which uses source port mapping to enable a group of clients to be represented
by a single IP address.
Step 6 Enter the config wlan enable wlan_id command to reenable each WLAN that uses the dynamic interface
for distribution system communication.
Step 7 Enter the save config command to save your changes.
Step 8 Enter the show interface detailed operator_defined_interface_name command and show interface
summary command to verify that your changes have been saved.
Note If desired, you can enter the config interface delete operator_defined_interface_name
command to delete a dynamic interface.
Note If link aggregation (LAG) is enabled, there can be only one AP-manager interface.
We recommend having a separate dynamic AP-manager interface per controller port. See the
“Configuring Multiple AP-Manager Interfaces” section on page 4-32 for instructions on configuring
multiple dynamic AP-manager interfaces.
As shown in Figure 4-7, each controller port connection is an 802.1Q trunk and should be configured as
such on the neighbor switch. On Cisco switches, the native VLAN of an 802.1Q trunk is an untagged
VLAN. If you configure an interface to use the native VLAN on a neighboring Cisco switch, make sure
you configure the interface on the controller to be untagged.
Note A zero value for the VLAN identifier (on the Controller > Interfaces page) means that the interface is
untagged.
The default (untagged) native VLAN on Cisco switches is VLAN 1. When controller interfaces are
configured as tagged (meaning that the VLAN identifier is set to a nonzero value), the VLAN must be
allowed on the 802.1Q trunk configuration on the neighbor switch and not be the native untagged VLAN.
We recommend that tagged VLANs be used on the controller. You should also allow only relevant
VLANs on the neighbor switch’s 802.1Q trunk connections to controller ports. All other VLANs should
be disallowed or pruned in the switch port trunk configuration. This practice is extremely important for
optimal performance of the controller.
Note We recommend that you assign one set of VLANs for WLANs and a different set of VLANs for
management interfaces to ensure that controllers properly route VLAN traffic.
Configuring Ports
This section contains the following topics:
• Information About Configuring Ports, page 4-22
• Configuring Ports (GUI), page 4-22
This page shows the current configuration for each of the controller’s ports.
If you want to change the settings of any port, click the number for that specific port. The Port >
Configure page appears.
Note If the management and AP-manager interfaces are mapped to the same port and are members of
the same VLAN, you must disable the WLAN before making a port-mapping change to either
interface. If the management and AP-manager interfaces are assigned to different VLANs, you
do not need to disable the WLAN.
Note The number of parameters available on the Port > Configure page depends on your controller
type.
Note In Cisco Wireless LAN Controller Module (NM-AIR-WLC6-K9), Cisco 5500 Series Controller,
and Cisco Flex 7500 Series Controllers, the physical mode is always set to auto.
• Physical Status—The data rate being used by the port. The available data rates vary based on
controller type. The following options are available:
– 5500 series—1000 Mbps full duplex
– WiSM—1000 Mbps full duplex
– Controller network module—100 Mbps full duplex
– Catalyst 3750G Integrated Wireless LAN Controller Switch—1000 Mbps full duplex
• Link Status—Port’s link status. Values:Link Up or Link Down
• Link Trap—Whether the port is set to send a trap when the link status changes. Values:Enable or
Disable
• Power over Ethernet (PoE)—If the connecting device is equipped to receive power through the
Ethernet cable and if so, provides –48 VDC. Values:Enable or Disable
Note Some older Cisco access points do not draw PoE even if it is enabled on the controller port. In
such cases, contact the Cisco Technical Assistance Center (TAC).
Note The controller in the Catalyst 3750G Integrated Wireless LAN Controller Switch supports PoE
on all ports.
Note Administratively disabling the port on a controller does not affect the port’s link status. The link
can be brought down only by other Cisco devices. On other Cisco products, however,
administratively disabling a port brings the link down.
Note When a primary port link goes down, messages may get logged internally only and not be posted
to a syslog server. It may take up to 40 seconds to restore logging to the syslog server.
• Physical Mode—Determines whether the port’s data rate is set automatically or specified by the
user. The supported data rates vary based on the controller type. Default: Auto.
– 5500 series—Fixed 1000 Mbps full duplex
– WiSM—Auto or 1000 Mbps full duplex
– Controller network module—Auto or 100 Mbps full duplex
– Catalyst 3750G Integrated Wireless LAN Controller Switch—Auto or 1000 Mbps full duplex
Note You will be prompted with a warning message when the following events occur:
1. When the traffic rate from the data ports exceeds 300 Mbps.
2. When the traffic rate from the data ports exceeds 250 Mbps constantly for 1 minute.
3. When the traffic rate from the data ports falls back to normal from one of the above states for
1 minute.
• Link Trap—Causes the port to send a trap when the port’s link status changes. Options:Enable or
Disable Default:Enable.
• Multicast Appliance Mode—Enables or disables the multicast appliance service for this port.
Options:Enable or Disable Default:Enable.
Step 3 Click Apply to commit your changes.
Step 4 Click Save Configuration to save your changes.
Step 5 Click Back to return to the Ports page and review your changes.
Step 6 Repeat this procedure for each additional port that you want to configure.
Note The 4-pin mini Type B connector is easily confused with the 5-pin mini Type B connector. They are not
compatible. Only the 5-pin mini Type B connector can be used.
For operation with Microsoft Windows, the Cisco Windows USB console driver must be installed on any
PC connected to the console port. With this driver, you can plug and unplug the USB cable into and from
the console port without affecting Windows HyperTerminal operations.
Note Only one console port can be active at a time. When a cable is plugged into the USB console port, the
RJ-45 port becomes inactive. Conversely, when the USB cable is removed from the USB port, the RJ-45
port becomes active.
Note Some systems might also require an additional system file. You can download the Usbser.sys file
from this URL:
http://support.microsoft.com/kb/918365
Changing the Cisco USB Systems Management Console COM Port to an Unused
Port
The USB driver is mapped to COM port 6. Some terminal emulation programs do not recognize a port
higher than COM 4. If necessary, change the Cisco USB systems management console COM port to an
unused port of COM 4 or lower.
Step 1 From your Windows desktop, right-click My Computer and choose Manage.
Step 2 From the list on the left side, choose Device Manager.
Step 3 From the device list on the right side, double-click Ports (COM & LPT).
Step 4 Right-click Cisco USB System Management Console 0108 and choose Properties.
Step 5 Click the Port Settings tab and click the Advanced button.
Step 6 From the COM Port Number drop-down list, choose an unused COM port of 4 or lower.
Step 7 Click OK to save and then close the Advanced Settings dialog box.
Step 8 Click OK to save and then close the Communications Port Properties dialog box.
LAG simplifies controller configuration because you no longer need to configure primary and secondary
ports for each interface. If any of the controller ports fail, traffic is automatically migrated to one of the
other ports. As long as at least one controller port is functioning, the system continues to operate, access
points remain connected to the network, and wireless clients continue to send and receive data.
connected to two different Gigabit modules (slots 2 and 3) within the Catalyst 6500 Series Switch.
The controller’s port 1 is connected to Gigabit interface 3/1, and the controller’s port 2 is connected
to Gigabit interface 2/1 on the Catalyst 6500 series switch. Both switch ports are assigned to the
same channel group.
When a Cisco 5500 Series Controller LAG port is connected to a Catalyst 3750G or a 6500 or 7600
channel group employing load balancing, note the following:
• LAG requires the EtherChannel to be configured for the on mode on both the controller and the
Catalyst switch.
• Once the EtherChannel is configured as on at both ends of the link, it does not matter if the Catalyst
switch is configured for either Link Aggregation Control Protocol (LACP) or Cisco proprietary Port
Aggregation Protocol (PAgP) because no channel negotiation is done between the controller and the
switch. Additionally, LACP and PAgP are not supported on the controller.
• The load-balancing method configured on the Catalyst switch must be a load-balancing method that
terminates all IP datagram fragments on a single controller port. Not following this recommendation
may result in problems with access point association.
• The recommended load-balancing method for Catalyst switches is src-dst-ip (enter the
port-channel load-balance src-dst-ip command).
• The Catalyst 6500 series switches running in PFC3 or PFC3CXL mode implement enhanced
EtherChannel load balancing. The enhanced EtherChannel load balancing adds the VLAN number
to the hash function, which is incompatible with LAG. From Release 12.2(33)SXH and later
releases, Catalyst 6500 IOS software offers the exclude vlan keyword to the port-channel
load-balance command to implement src-dst-ip load distribution. See the Cisco IOS Interface and
Hardware Component Command Reference for more information.
• Enter the show platform hardware pfc mode command on the Catalyst 6500 switch to confirm the
PFC operating mode.
The following example shows a Catalyst 6500 series switch in PFC3B mode when you enter the
global configuration port-channel load-balance src-dst-ip command for proper LAG
functionality:
# show platform hardware pfc mode PFC operating mode
PFC operating mode : PFC3B
# show EtherChannel load-balance
EtherChannel Load-Balancing Configuration:
src-dst-ip
The following example shows Catalyst 6500 series switch in PFC3C mode when you enter the
exclude vlan keyword in the port-channel load- balance src-dst-ip exclude vlan command:
# show platform hardware pfc mode
PFC operating mode : PFC3C
# show EtherChannel load-balance
EtherChannel Load-Balancing Configuration:
src-ip enhanced
# mpls label-ip
• If the recommended load-balancing method cannot be configured on the Catalyst switch, then
configure the LAG connection as a single member link or disable LAG on the controller.
Figure 4-10 Link Aggregation with the Catalyst 6500 Series Neighbor Switch
• You cannot configure the controller’s ports into separate LAG groups. Only one LAG group is
supported per controller. Therefore, you can connect a controller in LAG mode to only one neighbor
device.
Note The two internal Gigabit ports on the controller within the Catalyst 3750G Integrated
Wireless LAN Controller Switch are always assigned to the same LAG group.
• When you enable LAG or make any changes to the LAG configuration, you must immediately reboot
the controller.
• When you enable LAG, you can configure only one AP-manager interface because only one logical
port is needed. LAG removes the requirement for supporting multiple AP-manager interfaces.
• When you enable LAG, all dynamic AP-manager interfaces and untagged interfaces are deleted, and
all WLANs are disabled and mapped to the management interface. Also, the management, static
AP-manager, and VLAN-tagged dynamic interfaces are moved to the LAG port.
• Multiple untagged interfaces to the same port are not allowed.
• When you enable LAG, you cannot create interfaces with a primary port other than 29.
• When you enable LAG, all ports participate in LAG by default. You must configure LAG for all of
the connected ports in the neighbor switch.
• When you enable LAG, if any single link goes down, traffic migrates to the other links.
• When you enable LAG, only one functional physical port is needed for the controller to pass client
traffic.
• When you enable LAG, access points remain connected to the switch, and data service for users
continues uninterrupted.
• When you enable LAG, you eliminate the need to configure primary and secondary ports for each
interface.
• When you enable LAG, the controller sends packets out on the same port on which it received them.
If a CAPWAP packet from an access point enters the controller on physical port 1, the controller
removes the CAPWAP wrapper, processes the packet, and forwards it to the network on physical
port 1. This may not be the case if you disable LAG.
• When you disable LAG, the management, static AP-manager, and dynamic interfaces are moved to
port 1.
• When you disable LAG, you must configure primary and secondary ports for all interfaces.
• When you disable LAG, you must assign an AP-manager interface to each port on the controller.
Otherwise, access points are unable to join.
• Cisco 5500 Series Controllers support a single static link aggregation bundle.
• LAG is typically configured using the Startup Wizard, but you can enable or disable it at any time
through either the GUI or CLI.
Note LAG is enabled by default and is the only option on the Catalyst 3750G Integrated Wireless
LAN Controller Switch.
Note Choose Disabled if you want to disable LAG. LAG is disabled by default on the Cisco 5500 but
enabled by default on the Catalyst 3750G Integrated Wireless LAN Controller Switch.
Note Enter the config lag disable command if you want to disable LAG.
Note Access points may not be distributed completely evenly across all of the AP-manager interfaces, but a
certain level of load balancing occurs.
This configuration has the advantage of load balancing all 100 access points evenly across all four
AP-manager interfaces. If one of the AP-manager interfaces fails, all of the access points connected
to the controller would be evenly distributed among the three available AP-manager interfaces. For
example, if AP-manager interface 2 fails, the remaining AP-manager interfaces (1, 3, and 4) would
each manage approximately 33 access points.
Note Do not define a backup port for an AP-manager interface. Port redundancy is not supported for
AP-manager interfaces. If the AP-manager interface fails, all of the access points connected to
the controller through that interface are evenly distributed among the other configured
AP-manager interfaces.
Step 6 To make this interface an AP-manager interface, select the Enable Dynamic AP Management check
box.
Note Only one AP-manager interface is allowed per physical port. A dynamic interface that is marked
as an AP-manager interface cannot be used as a WLAN interface.
Note See Chapter 7, “Configuring Security Solutions,” for more information on ACLs.
Note Only one AP-manager interface is allowed per physical port. A dynamic interface that is marked
as an AP-manager interface cannot be used as a WLAN interface.
Note VLAN pooling applies to wireless clients and centrally switched WLANs.
• The following controllers are supported: Cisco Flex 7500, Cisco 5508, WiSM-2, 2500 Series
Controllers.
Step 1 Choose Controller > Interface Groups from the left navigation pane.
The Interface Groups page appears with the list of interface groups already created.
Note To remove an interface group, hover your mouse pointer over the blue drop-down icon and choose
Remove.
Step 3 Choose the interface name that you want to add to this interface group from the Interface Name
drop-down list.
Step 4 Click Add Interface to add the interface to the Interface group.
Step 5 Repeat Steps 2 and 3 if you want to add multiple interfaces to this interface group.
Note To remove an interface from the interface group, hover your mouse pointer over the blue drop-down
arrow and choose Remove.
Multicast Optimization
This section contains the following topics:
• Information About Multicast Optimization, page 4-43
• Configuring Multicast VLAN, page 4-43