Extreme Networks AP3917E Wireless 802.11 a/ac+b/g/n Access Point User Manual WiNG 5 9 1 System Reference Guide Part 3

Extreme Networks, Inc. Wireless 802.11 a/ac+b/g/n Access Point WiNG 5 9 1 System Reference Guide Part 3

WiNG 5.9.1 System Reference Guide Part 3

Download: Extreme Networks AP3917E Wireless 802.11 a/ac+b/g/n Access Point User Manual WiNG 5 9 1 System Reference Guide Part 3
Mirror Download [FCC.gov]Extreme Networks AP3917E Wireless 802.11 a/ac+b/g/n Access Point User Manual WiNG 5 9 1 System Reference Guide Part 3
Document ID3831159
Application ID1vEiqYghBbOtWV0jNCvQWg==
Document DescriptionWiNG 5.9.1 System Reference Guide Part 3
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize459.29kB (5741098 bits)
Date Submitted2018-04-27 00:00:00
Date Available2017-11-30 00:00:00
Creation Date2018-04-26 17:55:45
Producing SoftwareAcrobat Distiller 17.0 (Windows)
Document Lastmod2018-04-26 17:56:02
Document TitleWiNG 5.9.1 Wireless Controller and Service Platform System Reference Guide
Document CreatorFrameMaker 2017
Document Author: Extreme Networks

Management Access
Figure 12-4 Administrators screen
3 If creating a new administrator, enter a user name in the User Name field. This is a mandatory field for new
administrators and cannot exceed 32 characters. Optimally assign a name representative of the user and role.
4 Provide a strong password for the administrator within the Password field, once provided, Reconfirm the
password to ensure its accurately entered. This is a mandatory field.
5 Select Access options to define the permitted access for the user. Access modes can be assigned to
management user accounts to restrict which management interfaces the user can access. A management user
can be assigned one or more access roles allowing access to multiple management interfaces. If required, all
four options can be selected and invoked simultaneously.
Web UI
Select this option to enable access to the device’s Web User Interface.
Telnet
Select this option to enable access to the device using TELNET.
SSH
Select this option to enable access to the device using SSH.
Console
Select this option to enable access to the device’s console.
6 Select the Administrator Role for the administrator using this profile. Only one role can be assigned.
Superuser
Select this option to assign complete administrative rights to the user.
This entails all the roles listed for all the other administrative roles.
System
The System role provides permissions to configure general settings like
NTP, boot parameters, licenses, perform image upgrades, auto install,
manager redundancy/clustering and control access.
Network
The Network role provides privileges to configure all wired and wireless
parameters like IP configuration, VLANs, L2/L3 security, WLANs, radios,
and captive portal.
Security
Select Security to set the administrative rights for a security
administrator allowing configuration of all security parameters.
Wireless Controller and Service Platform System Reference Guide
12 - 6
Management Access
Monitor
Select Monitor to assign permissions without any administrative rights.
The Monitor option provides read-only permissions.
Help Desk
Assign this role to someone who typically troubleshoots and debugs
problems reported by the customer. The Help Desk manager typically
runs troubleshooting utilities (like a sniffer), executes service
commands, views/retrieves logs and reboots the controller or service
platform. However, Help Desk personnel are not allowed to conduct
controller or service platform reloads.
Web User
Select Web User to assign the administrator privileges needed to add
users for authentication.
Device Provisioning
Select Device Provisioning to assign an administrator privileges to
update (provision) device configuration files or firmware. Such updates
run the risk of overwriting and losing a device’s existing configuration
unless the configuration is properly archived.
Vendor Admin
Select this option to create a vendor-admin user role group so this
particular user type can access offline device-registration portal data.
Vendors are assigned username/password credentials for securely onboarding devices. Devices are moved to a vendor allowed VLAN
immediately after this on-boarding process, so vendors do require
unique administration roles. When the Vendor-Admin role is selected,
provide the vendor’s Group name for RADIUS authentication. The
vendor's RADIUS group takes precedence over the statically configured
group for device registration.
7 Select the OK button to save the administrator’s configuration. Select Reset to revert to the last saved
configuration.
12.1.1.2 Setting an Allowed Location Configuration
Adding or Editing a Management Access Policy
Extreme Networks’ WiNG and NSight applications may have the same users with different permissions defined in
each application. Various user roles are supported in WiNG (superuser, system-admin, network-admin, securityadmin, device-provisioning-admin, helpdesk and monitor). With NSight, a user logging into the NSight UI should
also have an access control restriction based on the role they’re assigned. For example, a WiNG user with helpdesk
privileges should have access to only the site (RF Domain) in which the helpdesk is situated, and the location tree
should contain only one RF Domain. Similarly, when a user responsible for a set of sites logs in NSight, their
location tree needs to contain the RF Domains for which they’re responsible.
To set an allowed location configuration:
Wireless Controller and Service Platform System Reference Guide
12 - 7
Management Access
Select the Allowed Locations tab from the Management Policy screen.
Figure 12-5 Management Policy screen - Allowed Locations tab
The Allowed Locations screen lists existing users and their permitted locations.
2 Select Add to create a new allowed location, Edit to modify an existing location or Delete to permanently
remove a user name and location from the list of those available.
Figure 12-6 Adding Allowed Locations screen
3 Set the following allowed location parameters:
Name
Define a 32 character maximum user name whose access is a mapped
to a specific site (RF Domain).
Wireless Controller and Service Platform System Reference Guide
12 - 8
Management Access
Locations
Create locations and use the navigation arrows to move them into the
list of those enabled once saved.
4 Select OK to update the allowed location configuration. Select Reset to the last saved configuration.
12.1.1.3 Setting the Access Control Configuration
Adding or Editing a Management Access Policy
Restricting remote access to a controller or service platform ensures only trusted hosts can communicate with
enabled management services. This ensures only trusted hosts can perform management tasks and provide
protection from brute force attacks from hosts attempting to break into the controller or service platform
managed network.
Administrators can permit management connections to be established on any IP interface on the controller or
service platform (including IP interfaces used to provide captive portal guest access). Administrators can restrict
management access by limiting access to a specific host (IP address), subnet, or ACL on the controller or service
platform.
Refer to the Access Control tab to allow/deny management access to the network using strategically selected
protocols (HTTP, HTTPS, Telnet, SSH or SNMP). Access options can be either enabled or disabled as required.
Disabling unused interfaces is recommended to close unnecessary security holes. The Access Control tab is not
meant to function as an ACL (in routers or other firewalls), where you can specify and customize specific IPs to
access specific interfaces.
• Source hosts - Management access can be restricted to one or more hosts by specifying their IP addresses
• Source subnets - Management access can be restricted to one or more subnets
• IP ACL - Management access can be based on the policies defined in an IP based ACL
In the following example, a controller has two IP interfaces defined with VLAN10 hosting management and
network services and VLAN70 providing guest services. For security the guest network is separated from all
trusted VLANs by a firewall.
Interface
Description
IP Address
Management
VLAN10
Services
Yes
Yes
VLAN70
Guest
Yes
No
By default, management services are accessible on both VLAN10 and VLAN70, and that’s not desirable to an
administrator. By restricting access to VLAN10, the controller only accepts management sessions on VLAN10.
Management access on VLAN70 is longer available.
Administrators can secure access to a controller or service platform by disabling less secure interfaces. By default,
the CLI, SNMP and FTP disable interfaces that do not support encryption or authentication. However, Web
management using HTTP is enabled. Insecure management interfaces such as Telnet, HTTP and SNMP should be
disabled, and only secure management interfaces, like SSH and HTTPS should be used to access the controller or
service platform managed network.
The following table demonstrates some interfaces provide better security than others:
Access Type
Encrypted
Authenticated
Default State
Telnet
No
Yes
Disabled
SNMPv2
No
No
Enabled
Wireless Controller and Service Platform System Reference Guide
12 - 9
Management Access
SNMPv3
Yes
Yes
Enabled
HTTP
No
Yes
Disabled
HTTPS
Yes
Yes
Disabled
FTP
No
Yes
Disabled
SSHv2
Yes
Yes
Disabled
To set an access control configuration for the Management Access policy:
Select the Access Control tab from the Management Policy screen.
Figure 12-7 Management Policy screen - Access Control tab
Wireless Controller and Service Platform System Reference Guide
12 - 10
Management Access
2 Set the following parameters required for Telnet access:
Enable Telnet
Select the checkbox to enable Telnet device access. Telnet provides a
command line interface to a remote host over TCP. Telnet provides no
encryption, but it does provide a measure of authentication. Telnet
access is disabled by default.
Telnet Port
Set the port on which Telnet connections are made (1 - 65,535). The
default port is 23. Change this value using the spinner control next to
this field or by entering the port number in the field.
3 Set the following parameters required for SSH access:
Enable SSHv2
Select the checkbox to enable SSH device access. SSH (Secure Shell)
version 2, like Telnet, provides a command line interface to a remote
host. SSH transmissions are encrypted and authenticated, increasing
the security of transmission. SSH access is disabled by default.
SSHv2 Port
Set the port on which SSH connections are made. The default port is
22. Change this value using the spinner control next to this field or by
entering the port number in the field.
4 Set the following HTTP/HTTPS parameters:
Enable HTTP
Select the checkbox to enable HTTP device access. HTTP provides
limited authentication and no encryption.
Enable HTTPS
Select the checkbox to enable HTTPS device access. HTTPS
(Hypertext Transfer Protocol Secure) is more secure plain HTTP.
HTTPS provides both authentication and data encryption as opposed
to just authentication (as is the case with HTTP).
NOTE: If the a RADIUS server is not reachable, HTTPS or SSH management access
to the controller or service platform may be denied.
5 Select the Enable Rest Server option, within the Rest Server field, to facilitate device on-boarding. When
selected, the REST server allows vendor-specific users access to the online device registration portal. All
requests and responses to and from the on-boarding portal are handled by the REST server through restful
Application Programming Interface (API) transactions. The REST server serves the Web pages used to associate
a device’s MAC address with a specific vendor group. This option is enabled by default.
6 Set the following parameters required for FTP access:
Enable FTP
Select the checkbox to enable FTP device access. FTP (File Transfer
Protocol) is the standard protocol for transferring files over a TCP/IP
network. FTP requires administrators enter a valid username and
password authenticated locally. FTP access is disabled by default.
FTP Username
Specify a username required when logging in to the FTP server. The
username cannot exceed 32 characters.
FTP Password
Specify a password required when logging in to the FTP server.
Reconfirm the password in the field provided to ensure it has been
entered correctly. The password cannot exceed 63 characters.
FTP Root Directory
Provide the complete path to the root directory in the space provided.
The default setting has the root directory set to flash:/
Wireless Controller and Service Platform System Reference Guide
12 - 11
Management Access
7 Set the following General parameters:
Idle Session Timeout
Specify an inactivity timeout for management connection attempts (in
seconds) from 0 - 4,320.
Message of the Day
Enter message of the day text (no longer then 255 characters)
displayed at login for clients connecting via the CLI.
8 Set the following Access Restrictions parameters:
Filter Type
Select a filter type for access restriction. Options include IP Access
List, Source Address or None. To restrict management access to
specific hosts, select Source Address as the filter type and provide the
allowed addresses within the Source Hosts field.
IP Access List
If the selected filter type is IP Access List, select an access list from
the drop-down menu or select the Create button to define a new one.
IP based firewalls function like Access Control Lists (ACLs) to filter/
mark packets based on the IP from which they arrive, as opposed to
filtering packets on layer 2 ports. IP firewalls implement uniquely
defined access control policies, so if you don't have an idea of what
kind of access to allow or deny, a firewall is of little value, and could
provide a false sense of network security.
Source Hosts
If the selected filter type is Source Address, enter an IP Address or IP
Addresses for the source hosts. To restrict management access to
specific hosts, select Source Address as the filter type and provide the
allowed addresses within the Source Hosts field.
Source Subnets
If the selected filter type is Source Address, enter a source subnet or
subnets for the source hosts. To restrict management access to
specific subnets, select Source Address as the filter type and provide
the allowed addresses within the Source Subnets field.
Logging Policy
If the selected filter is Source Address, enter a logging policy for
administrative access. Options includes None, Denied Requests or All.
Wireless Controller and Service Platform System Reference Guide
12 - 12
Management Access
9 Set the User Lockout Settings. Click the Add Row button and configure the following role-based user-account
lockout and unlock criteria:
Role
Specify the user-role for which account lockout is to be enabled. The
options are:
•
•
•
•
•
•
•
•
device-provisioning-admin
helpdesk
monitor
network-admin
security-admin
system-admin
vendor-admin
web-suer-admin
Note, you can enable account lockout for multiple roles. After
specifying the role/roles, set the Lockout Time and Number of
Password Attempts.
User-account lockout is individually applied to each account within
the specified role/roles. For example, consider the ‘monitor’ role
having two users: ‘user1’ and ‘user2’. The Number of Password
Attempts and Lockout Time is set at ‘5’ attempts and ‘10’ minutes
respectively. In this scenario, user2 makes 5 consecutive, failed login
attempts, and the user2 account is locked out for 10 minutes.
However, during this lockout time the user1 account remains active.
Lockout Time
Specify the maximum time for which an account remains locked.
Specify a value from 0 to 600 minutes. The value ‘0’ indicates that the
account is permanently locked.
Number of Password
Attempts
Specify the maximum number of consecutive, failed attempts allowed
before an account is locked. Specify a value from 1 to 100.
10 Select OK to update the access control configuration. Select Reset to the last saved configuration.
12.1.1.4 Setting the Authentication Configuration
Adding or Editing a Management Access Policy
Refer to the Authentication tab to define how user credential validation is conducted on behalf of a Management
Access policy. If utilizing an external authentication resource, an administrator can optionally apply a TACACS
policy. Terminal Access Controller Access - Control System+ (TACACS+) is a protocol created by CISCO to provide
access control to network devices (routers, network access servers or other networked devices) through one or
more centralized servers. TACACS provides separate authentication, authorization, and accounting services running
on different servers.
To configure an external authentication resource:
Wireless Controller and Service Platform System Reference Guide
12 - 13
Management Access
Select the Authentication tab from the Management Policy screen.
Figure 12-8 Management Policy screen - Authentication tab
2 Define the following settings to authenticate management access requests:
Local
Select whether the authentication server resource is centralized
(local), or whether an external authentication resource is deployed for
validating user access. Local is enabled by default.
RADIUS
If local authentication is disabled, define whether the RADIUS server is
External or Fallback.
AAA Policy
Define the AAA policy used to authenticate user validation requests to
the controller or service platform managed network. Select the Create
icon as needed to define a new AAA policy or select the Edit icon to
modify an existing policy.
TACACS
If local authentication is disabled, optionally select Authentication or
Fallback (only one authentication or fallback option can be selected)
or Accounting and Authorization. TACACS policies control user access
to devices and network resources while providing separate
accounting, authentication, and authorization services.
AAA TACACS Policy
Select an existing AAA TACACS policy (if available), or select Create
to define a new policy or Edit to modify an existing one.
3 Select OK to update the authentication configuration. Select Reset to the last saved configuration.
12.1.1.5 Setting the SNMP Configuration
Adding or Editing a Management Access Policy
Optionally use the Simple Network Management Protocol (SNMP) to communicate with devices within the
network. SNMP is an application layer protocol that facilitates the exchange of management information between
the controller or service platform and a managed device. SNMP enabled devices listen on port 162 (by default) for
SNMP packets from the controller or service platform’s management server. SNMP uses read-only and read-write
community strings as an authentication mechanism to monitor and configure supported devices. The read-only
Wireless Controller and Service Platform System Reference Guide
12 - 14
Management Access
community string is used to gather statistics and configuration parameters from a supported wireless device. The
read-write community string is used by a management server to set device parameters. SNMP is generally used to
monitor a system’s performance and other parameters.
SNMP Version
Encrypted
Authenticated
Default State
SNMPv1
No
No
Disabled
SNMPv2
No
No
Enabled
SNMPv3
Yes
Yes
Enabled
To configure SNMP Management Access:
Select the SNMP tab from the Management Policy screen.
Figure 12-9 Management Policy screen - SNMP tab
2 Enable or disable SNMP v1, SNMPv2 and SNMPv3.
Enable SNMPv1
SNMP v1exposes a device’s management data so it can be managed
remotely. Device data is exposed as variables that can be accessed
and modified as text strings, with version 1 being the original
(rudimentary) implementation. SNMPv1 is enabled by default.
Wireless Controller and Service Platform System Reference Guide
12 - 15
Management Access
Enable SNMPv2
Select the checkbox to enable SNMPv2 support. SNMPv2 provides
device management using a hierarchical set of variables. SNMPv2 uses
Get, GetNext, and Set operations for data management. SNMPv2 is
enabled by default.
Enable SNMPv3
Select the checkbox to enable SNMPv3 support. SNMPv3 adds
security and remote configuration capabilities to previous versions.
The SNMPv3 architecture introduces the user-based security model
(USM) for message security and the view-based access control model
(VACM) for access control. The architecture supports the concurrent
use of different security, access control and message processing
techniques. SNMPv3 is enabled by default.
3 Set the SNMP v1/v2 Community String configuration. Use the + Add Row function as needed to add additional
SNMP v1/2 community strings, or select an existing community string’s radio button and select the Delete icon
to remove it.
Community
Define a public or private community designation. By default, SNMPv2
community strings on most devices are set to public, for the read-only
community string, and private for the read-write community string.
Access Control
Set the access permission for each community string used by devices
to retrieve or modify information. Available options include:
Read Only - Allows a remote device to retrieve information.
Read-Write - Allows a remote device to modify settings.
IP SNMP ACL
Set the IP SNMP ACL used along with community string. Use the
drop-down menu to select an existing ACL. Use the Create icon to
create and add a new ACL. Select an existing ACL and the Edit icon to
update an existing ACL.
4 Set the SNMPv3 Users configuration. Use the + Add Row function as needed to add additional SNMPv3 user
configurations, or select a SNMP user’s radio button and select the Delete icon to remove the user.
User Name
Use the drop-down menu to define a user name of snmpmanager,
snmpoperator or snmptrap.
Authentication
Displays the authentication scheme used with the listed SNMPv3 user.
The listed authentication scheme ensures only trusted and authorized
users and devices can access the network.
Encryption
Displays the encryption scheme used with the listed SNMPv3 user.
Password
Provide the user’s password in the field provided. Select the Show
check box to display the actual character string used in the password,
while leaving the check box unselected protects the password and
displays each character as “*”.
5 Select OK to update the SNMP configuration. Select Reset to revert to the last saved configuration.
12.1.1.6 SNMP Trap Configuration
Adding or Editing a Management Access Policy
The managed network can use SNMP trap receivers for fault notifications. SNMP traps are unsolicited notifications
triggered by thresholds (or actions), and are therefore an important fault management tool.
A SNMP trap receiver is the destination of SNMP messages (external to the controller or service platform). A trap
is like a Syslog message, just over another protocol (SNMP). A trap is generated when a device consolidates event
Wireless Controller and Service Platform System Reference Guide
12 - 16
Management Access
information and transmits the information to an external repository. The trap contains several standard items, such
as the SNMP version, community etc.
SNMP trap notifications exist for most controller or service platform operations, but not all are necessary for dayto-day operation.
To define a SNMP trap configuration for receiving events at a remote destination:
Select the SNMP Traps tab from the Management Policy screen.
Figure 12-10 Management Policy screen - SNMP Traps tab
2 Select the Enable Trap Generation checkbox to enable trap generation using the trap receiver configuration
defined. This feature is disabled by default.
3 Refer to the Trap Receiver table to set the configuration of the external resource dedicated to receiving trap
information. Select Add Row + as needed to add additional trap receivers. Select the Delete icon to
permanently remove a trap receiver.
IP Address
Sets the IP address of the external server resource dedicated to
receiving the SNMP traps on behalf of the controller or service
platform.
Port
Set the port of the server resource dedicated to receiving SNMP traps.
The default port is port 162.
Version
Sets the SNMP version to use to send SNMP traps. SNMPv2 is the
default.
Trap Community
Provide a 32 character maximum trap community string. The
community string functions like a user id or password allowing access
to controller or Access Point resources. If the community string is
correct, the controller or Access Point provides with the requested
information. If the community string is incorrect, the device controller
or Access Point discards the request and does not respond.
Community strings are used only by devices which support SNMPv1
and SNMPv2c. SNMPv3 uses username/password authentication,
along with an encryption key. The default setting is public.
Wireless Controller and Service Platform System Reference Guide
12 - 17
Management Access
4 Select OK to update the SNMP Trap configuration. Select Reset to revert to the last saved configuration.
12.1.1.7 T5 PowerBroadband SNMP
Adding or Editing a Management Access Policy
A T5 controller, once enabled as a supported external device, can provide data to WiNG to assist in a T5’s
management within a WiNG supported subnet populated by both types of devices.
To define a T5 controller power broadband SNMP configuration:
Select the T5 Power Broadband tab from the Management Policy screen.
Figure 12-11 Management Policy screen - T5 PowerBroadband tab
2 Set the following SNMP settings:
Contact
Set a 64 character maximum contact name for the administration of
T5 controller SNMP events.
Enable Server
Select this option to enable SNMP event management for the T5
controller. This setting is disabled by default.
Location
Set a 64 character maximum location for the SNMP resource
dedicated to T5 controller support.
Traps
Select this option for SNMP trap support for the T5 controller. A trap
is like a Syslog message, just over another protocol (SNMP). A trap is
generated when a device consolidates event information and
transmits the information to an external repository. The trap contains
several standard items, such as the SNMP version, community etc.
Wireless Controller and Service Platform System Reference Guide
12 - 18
Management Access
3 Set the SNMP v1/v2c Community String configuration for T5 controller usage. Use the + Add Row function as
needed to add additional SNMP v1/2 community strings, or select an existing community string’s radio button
and select the Delete icon to remove it.
Community
Set a 32 character maximum SNMP community string.
Access
Set the access permission for each community string used by devices
to retrieve or modify information. Available options include:
Read Only - Allows a remote device to retrieve information.
Read-Write - Allows a remote device to modify settings.
IP
Set the IP address of the SNMP manager.
4 Use the Host table to define up to 4 SNMP receiver resource IP addresses.
5 Select OK to update the configuration. Select Reset to revert to the last saved configuration.
12.2 EX3500 Management Policies
The EX3500 series switch is a Gigabit Ethernet Layer 2 switch with either 24 or 48 10/100/1000-BASE-T ports, and
four Small Form Factor Pluggable (SFP) transceiver slots for fiber connectivity. Each 10/100/1000 Mbps port
supports both the IEEE 802.3af and IEEE 802.3at-2009 PoE standards. Each EX3500 series switch includes an
SNMP-based management agent, which provides both in-band and out-of-band access for management. An
EX3500 series switch utilizes an embedded HTTP Web agent and command line interface (CLI) somewhat
different from the WiNG operating system, while still enabling the EX3500 series switch to provide WiNG
controllers PoE and port management resources.
Going forward NX9600, NX9500, NX7500, NX5500 WiNG managed services platforms and WiNG VMs can
discover, adopt and partially manage EX3500 series Ethernet switches, as DHCP option 193 has been added to
support external device adoption. DHCP option 193 is a simplified form of DHCP options 191 and 192 used by WiNG
devices currently. DHCP option 193 supports pool1, hello-interval and adjacency-hold-time parameters.
NOTE: WiNG can partially manage an EX3500 without using DHCP option 193. In
this case the EX3500 must be directly configured to specify the IPv4 addresses of
potential WiNG adopters, using the EX3500 controller host ip address
CLI command.
WiNG service platforms leave the proprietary operating system running the EX3500 switches unmodified, and
partially manage them utilizing standardized WiNG interfaces. WiNG service platforms use a translation layer to
communicate with EX3500 series switches.
To set EX3500 management settings for user EX3500 user group creation, authentication, password management
and SNMP:
Select Configuration.
2 Select Management.
3 Refer to the upper, left-hand, portion of the UI and select EX3500 Management Policy.
Wireless Controller and Service Platform System Reference Guide
12 - 19
Management Access
Figure 12-12 EX3500 Management Policy screen
The screen lists those EX3500 management policies created thus far. Select Add to create a new EX3500
management policy, Edit to modify the attributes of a policy or Delete to remove an obsolete list from those
available. Existing lists can be copied or renamed as needed.
For more information, refer to the following:
• EX3500 User Groups
• EX3500 Authentication
• EX3500 Exec Password Management
• EX3500 System Settings
• EX3500 SNMP Management
• EX3500 SNMP Users
12.2.1 EX3500 User Groups
EX3500 switch user groups are stored in a local database on the WiNG service platform. Each user group can be
assigned unique access levels and passswords to provide administrative priority.
To set an EX3500 user group configuration:
Select Configuration.
2 Select Management.
3 Refer to the upper, left-hand, portion of the UI and select EX3500 Management Policy.
4 The screen lists those EX3500 management policies created thus far. Select Add to create a new EX3500
management policy, Edit to modify an existing policy or Delete to remove an obsolete policy. Existing lists can
be copied or renamed as needed.
5 If creating a new EX35000 user group, assign it a Name up to 32 characters. Select Continue.
Wireless Controller and Service Platform System Reference Guide
12 - 20
Management Access
Figure 12-13 EX3500 Management Policy User Group screen
6 Select Add to create a new EX3500 user group, Edit to modify an existing group or Delete to remove an
obsolete group. Set the following User Group attributes:
Figure 12-14 User Group Add/Edit screen
Access Level
Use the spinner control to set an access level from 0 - 15 serving as the
access priority of each user group requesting access and interoperability
with an EX3500 switch. Access level 0 corresponds to a guest user with
minimal access to commands while access level 15 corresponds to an
administrator user with full access to all commands.
Wireless Controller and Service Platform System Reference Guide
12 - 21
Management Access
Hash Type
Select either 0 or 7 to define the hash in plain text (0) or encrypted
characters (7).
Admin Password
Create a 32 character maximum password for the EX3500 user group.
7 Select OK when completed to update the EX3500 user group configuration. Select Reset to revert the screen
back to its last saved configuration.
12.2.2 EX3500 Authentication
Management access to an EX3500 switch can be enabled/disabled as required using separate interfaces and
protocols (HTTP, SSH). Disabling un-used and insecure interfaces and unused management services can
dramatically reduce an attack footprint and free resources within an EX3500 management policy.
To authenticate an EX3500 management policy:
Select Configuration from the Web UI.
2 Select Management.
3 Refer to the upper, left-hand, portion of the UI and select EX3500 Management Policy.
4 The screen lists those EX3500 management policies created thus far. Select Add to create a new EX3500
management policy, Edit to modify an existing policy or Delete to remove an obsolete policy. Existing lists can
be copied or renamed as needed.
5 Select the Authentication tab.
Figure 12-15 EX35000 Management Policy Authentication screen
6 Select the following HTTP server settings to authenticating a HTTP connection to an EX3500:
Server
When selected, access the EX3500 using HTTP from any Windows PC,
Linux PC or other device that uses HTTP. This setting is enabled by default.
Port
Set the HTTP port number from 1 - 65,535. The default port is 80.
Secure Server
Select this option to secure HTTP over a designated secure port.
Wireless Controller and Service Platform System Reference Guide
12 - 22
Management Access
Secure Port
Use the spinner control to select a secure port from 1 - 65, 535.
7 Select the following SSH server settings to authenticate a SSH connection to an EX3500:
Server
When selected, access the EX3500 using SSH from any Windows PC, Linux
PC or other device that uses SSH. This setting is enabled by default.
Retries for SSH
Set the maximum number of retries, from 1 - 5, for connection to the SSH
server resource. The default setting is 3.
Server Key
Set the SSH server key length from 512 - 1,024. The default length
is 768.
Time Out
Set the inactivity timeout for the SSH server resource from 1 - 120 seconds.
When this setting is exceeded, the SSH server resource becomes
unreachable and must be reauthenticated. The default value is 120 seconds.
8 Select OK when completed to update the EX3500 authentication configuration. Select Reset to revert the
screen back to its last saved configuration.
12.2.3 EX3500 Exec Password Management
Each EX3500 management policy can have a unique exec password with its own privilege level assigned. Utilize
these passwords as specific EX3500 management sessions require priority over others.
To administrate EX3500 management passwords and their privileges:
Select Configuration from the Web UI.
2 Select Management.
3 Refer to the upper, left-hand, portion of the UI and select EX3500 Management Policy.
4 The screen lists those EX3500 management policies created thus far. Select Add to create a new EX3500
management policy, Edit to modify an existing policy or Delete to remove an obsolete policy. Existing lists can
be copied or renamed as needed.
5 Select the Exec Password tab.
Wireless Controller and Service Platform System Reference Guide
12 - 23
Management Access
Figure 12-16 EX35000 Management Policy Exec Password screen
6 Select Add to create a new EX3500 exec password, Edit to modify an existing password configuration or Delete
to remove an obsolete password.
Figure 12-17 EX35000 Management Policy Exec Password Add/Edit screen
7 Assign a privilege level from 0 - 15. 0 provides the least access, while level 15 provides the most access. The
commands available at each level vary.
8 Select the following Exec Password settings:
Hash Type
Select either 0 or 7 to define the hash in plain text (0) or encrypted
characters (7).
Wireless Controller and Service Platform System Reference Guide
12 - 24
Management Access
Exec Privilege
Password
Create a 32 character maximum password for the EX3500 exec password.
9 Select OK when completed to update the EX3500 exec password. Select Reset to revert the screen back to its
last saved configuration.
12.2.4 EX3500 System Settings
An EX3500 management policy can be customized to include high and low alarm thresholds for EX3500 memory
and CPU utilization.
The Memory and CPU rising and falling thresholds control when the EX3500 generates SNMP traps if these
thresholds are exceeded. A trap is generated when the utilization exceeds the rising threshold, and another trap is
generated after the utilization drops below the falling threshold. These thresholds do not protect the resource, they
provide notification of an excessive use of the resource.
To administrate EX3500 management policy memory and CPU threshold settings:
Select Configuration from the Web UI.
2 Select Management.
3 Refer to the upper, left-hand, portion of the UI and select EX3500 Management Policy.
4 The screen lists those EX3500 management policies created thus far. Select Add to create a new EX3500
management policy, Edit to modify an existing policy or Delete to remove an obsolete policy. Existing lists can
be copied or renamed as needed.
5 Select the System tab.
Figure 12-18 EX35000 Management Policy System screen
6 Set the following Memory - Alarm Configuration threshold settings:
Falling Threshold
Set the threshold for clearing the EX3500 memory utilization alarm. Once
the rising threshold is exceeded, the memory utilization must drop below
this threshold for the alarm to clear. The threshold is set as a percentage
from 1 - 100, with a default of 90.
Rising Threshold
Set the threshold for EX3500 memory utilization as too high. The threshold
is set as a percentage from 1 - 100, with a default of 95.
Wireless Controller and Service Platform System Reference Guide
12 - 25
Management Access
7 Set the following CPU - Alarm Configuration threshold settings:
Falling Threshold
Set the threshold for clearing the EX3500 CPU (processor) utilization
alarm. Once the rising threshold is exceeded, the CPU (processor)
utilization must drop below this threshold for the alarm to clear. The
threshold is set as a percentage from 1 - 100, with a default of 70.
Rising Threshold
Set the notification threshold for EX3500 CPU (processor) utilization as too
high. The threshold is set as a percentage from 1 - 100, with a default of 90.
8 Select OK when completed to update the EX3500 system threshold settings. Select Reset to revert the screen
back to its last saved configuration.
12.2.5 EX3500 SNMP Management
Optionally use the Simple Network Management Protocol (SNMP) with the EX3500 management policy for
statistics gathering, or to fully manage the EX3500. SNMP is an application layer protocol that facilitates the
exchange of management information between the controller or service platform and a managed device. SNMP
enabled devices listen on port 161 (by default) for SNMP packets from the controller or service platform’s
management server. SNMP uses read-only and read-write community strings as an authentication mechanism to
monitor and configure supported devices. The read-only community string is used to gather statistics and
configuration parameters from a supported wireless device. The read-write community string is used by a
management server to set device parameters. SNMP is generally used to monitor a system’s performance and
other parameters.
To the EX3500’s SNMP management policy configuration:
Select Configuration from the Web UI.
2 Select Management.
3 Refer to the upper, left-hand, portion of the UI and select EX3500 Management Policy.
4 The screen lists those EX3500 management policies created thus far. Select Add to create a new EX3500
management policy, Edit to modify an existing policy or Delete to remove an obsolete policy. Existing lists can
be copied or renamed as needed.
5 Select the SNMP tab.
Wireless Controller and Service Platform System Reference Guide
12 - 26
Management Access
Figure 12-19 EX35000 Management Policy SNMP screen
6 Set the following SNMP settings:
Enable
Select the checkbox to enable SNMPv1, SNMPv2 or SNMPv3 support. The
SNMP version utilized is selected and mapped to a user group within the
Group table.
Contact
Define a 255 character maximum SNMP contact name for responsible for
the WiNG administration of the EX3500 switch.
Local Engine ID
Set a 64 character maximum local engine ID. The local engine ID is the
administratively unique identifier of an SNMPv3 engine used for
identification, not addressing. There are two parts of an engine ID: prefix
and suffix. The prefix is formatted according to the specifications defined in
RFC 3411.
Location
Assign a 255 character maximum EX3500 switch location reflecting the
switch’s physical deployment location.
Wireless Controller and Service Platform System Reference Guide
12 - 27
Management Access
7 Select + Add Row and set the following Community Strings:
Name
Define a public or private community designation. By default, SNMPv2
community strings on most devices are set to public, for the read-only
community string, and private for the read-write community string.
Access
Set the access permission for each community string used by devices to
retrieve or modify information. Available options include:
Read Only - Allows a remote device to retrieve information.
Read-Write - Allows a remote device to modify settings.
8 Select + Add Row and set the following Group settings for SNMP management of the EX3500:
Group Name
Define a 32 character maximum name for this SNMP group. A maximum of
17 groups can be set for EX3500 model switches.
Authentication
If utilizing SNMPv3 as the version for this group, select whether auth,
noauth or priv is applied to this group as a credential exchange and
validation mechanism. This setting is not enabled if utilizing either SNMPv1
or SNMPv2.
Version
Apply either SNMPv1, SNMPv2 or SNMPv3 to this EX3500 SNMP group.
SNMP v2 is identical to version 1, but it adds support for 64 bit counters.
Most devices support SNMP v2c automatically. However, there are some
devices that require you to explicitly enable v2, and that poses no risk.
SNMP v3 adds security to the 64 bit counters provided with SNMP v2.
SNMP v3 adds both encryption and authentication, which can be used
together or separately. Its setup is more complex than just defining a
community string. But if you require security, SNMP v3 is recommended.
Notify View
Set a 32 character maximum notify string to restrict and filter the objects in
the notification.
Read View
Set an optional 32 character maximum string indicating that users who
belong to this group have read access to the EX3500 switch.
Write View
Set an optional 32 character maximum string indicating that users who
belong to this group have write access to the EX3500 switch.
9 Set the following SNMP Traps for SNMP event management of the EX3500:
Authentication
Select the checkbox to enable trap generation for user authentication
events when accessing a EX3500 switch from a WiNG managed controller.
This feature is disabled by default.
Enable SNMP Trap
Select the checkbox to enable EX3500 MAC generation traps. When
enabled a trap is generated when a dynamic MAC address is added or
removed to/from the switch's address table. This feature is disabled by
default.
Link Up Down
Select this option to generate a trap a when either a link is established or
broken between the EX3500 switch and a connected device (WiNG
managed or not).
10 Refer to the SNMP View table and select + Add Row to include or exclude up to 31 SNMP views.
View Name
Enter a 32 alphanumeric character maximum name to identify the EX3500
SNMP MIB view. A view is a set of MIB view subtrees, or a family of
subtrees, where each is a subtree within the managed object naming tree.
Create MIB views to control the OID range that SNMPv3 users can access.
Wireless Controller and Service Platform System Reference Guide
12 - 28
Management Access
OID Tree
Provide an OID string to include or exclude from the view. The OID string is
128 characters in length.
View Access
Designate whether view access is included or excluded for the subtree or
family of subtrees from the MIB view. If creating an excluded view subtree,
consider creating a corresponding included entry with the same view name
to allow subtrees outside of the excluded subtree to be included.
11 Refer to the Notify Filter table and select + Add Row to set up to 5 remote resources for archive and retrieval.
Name
Enter a 26 character maximum name for the filter. Notifications indicate
erroneous user authentication requests, restarts, connection closures,
connection loss to a neighbor router or other events.
Remote Host
Provide a destination IP address for a remote server resource for trap
filters.
12 Refer to the Remote Engine table and select + Add Row to set up to 5 remote IDs and addresses.
Remote Engine IP
Enter a remote engine IP address for the remote SNMP agent of the device
where the user resides.
Remote Engine Id
Provide an Id 9 - 64 characters in length. If configuring the EX3500
management for SNMP V3, is it necessary to configure an engine ID, as
passwords are localized using the SNMP ID of the SNMP engine. The
remote agent's SNMP engine ID is needed when computing authentication
from a password.
13 Refer to the Host table and select + Add Row to set the trap receiver host configuration.
Authentication
If using SNMPv3, define the authentication scheme for user credential
validation as either auth, noauth or priv.
Community String
Provide the 1 - 32 character text community strings for accessing EX3500
switch configuration files. SNMP uses read-only and read-write community
strings as an authentication mechanism to monitor and configure
supported devices.
Inform
Enable this option to enable an EX3500 switch to send inform requests to
SNMP managers.Traps are not as reliable than informs since an
acknowledgment is not sent from the receiving end when a trap is
received. A SNMP manager that receives an inform acknowledges the
message with an SNMP response.
IP
Define the trap receiver’s IP address.
Retry
Set the number of server connection retries (from 1 - 255). When no
response is received after the last retry attempt, the connection session is
terminated with the trap receiver IP address.
Timeout
Configures the duration (in seconds) the host connection process is
shutdown temporarily before a reset of the process is attempted for the set
number of retries.
UDP Port
Set the port of the server resource dedicated to receiving EX3500 switch
SNMP traps. The default port is port 162.
Wireless Controller and Service Platform System Reference Guide
12 - 29
Management Access
Version
Set whether SNMP version 1, 2 or 3 is used with this dedicated host.
Versions 1 and 2 provide no data security. SNMPv3 adds security and
remote configuration capabilities to previous versions. The SNMPv3
architecture introduces the user-based security model (USM) for message
security and the view-based access control model (VACM) for access
control.
12.2.6 EX3500 SNMP Users
An EX3500 SNMP management session utilizes unique SNMP users with specific authentication and privacy
parameters.
To administrate EX3500 SNMP users and their permissions:
Select Configuration from the Web UI.
2 Select Management.
3 Refer to the upper, left-hand, portion of the UI and select EX3500 Management Policy.
4 The screen lists those EX3500 management policies created thus far. Select Add to create a new EX3500
management policy, Edit to modify an existing policy or Delete to remove an obsolete policy. Existing lists can
be copied or renamed as needed.
5 Select the SNMP User tab.
Figure 12-20 EX3500 SNMP User screen
6 Review the following EX3500 SNMP user credentials to determine whether a new user requires creation on an
existing user configuration needs modification:
User Name
Displays the 32 character maximum SNMP user name assigned the specific
SNMP version and remote SNMP server resource listed. More than one user
can be assigned to the same EX3500 SNMP user group.
Wireless Controller and Service Platform System Reference Guide
12 - 30
Management Access
Version
Lists whether SNMPv1, SNMPv2 or SNMPv3 is applied to this EX3500 SNMP
user. SNMP v2 is identical to version 1, but it adds support for 64 bit
counters. Most devices support SNMP v2c automatically. However, there are
some devices that require you to explicitly enable v2, and that poses no
risk. SNMP v3 adds security to the 64 bit counters provided with SNMP v2.
SNMP v3 adds both encryption and authentication, which can be used
together or separately. Its setup is more complex than just defining a
community string. But if you require security, SNMP v3 is recommended.
Remote IP Address
Lists the remote server resource designated for receiving SNMP trap and
inform event messages for the listed SNMP user.
Group Name
Lists the 32 character maximum name assigned to this SNMP group, as
SNMP access rights are organized by groups. The trap group name can be
any string and is embedded in the community name field of a trap. A
maximum of 17 groups can be set for EX3500 model switches.
7 Select Add to create a new user configuration or Edit to modify the attributes of an existing EX3500 SNMP user
configuration.
Figure 12-21 EX3500 SNMP User Add/Edit screen
8 Set the following SNMP user credentials for the EX3500 SNMP user:.
User Name
Enter a 32 character maximum SNMP user name for EX3500 SNMP session
management.
Version
Use the drop-down menu to define whether SNMPv1, SNMPv2 or SNMPv3
is applied to this EX3500 SNMP user configuration. SNMP v2 is identical to
version 1, but it adds support for 64 bit counters. Most devices support
SNMP v2c automatically. However, there are some devices that require you
to explicitly enable v2, and that poses no risk. SNMP v3 adds security to
the 64 bit counters provided with SNMP v2. SNMP v3 adds both encryption
and authentication, which can be used together or separately. Its setup is
more complex than just defining a community string. But if you require
security, SNMP v3 is recommended.
Wireless Controller and Service Platform System Reference Guide
12 - 31
Management Access
Remote IP Address
Set the remote server resource IP address designated for receiving SNMP
trap and inform event messages for this SNMP user.
Group Name
Enter a 32 character maximum for a SNMP group. The group name can be
any string and is embedded in the community name field of a SNMP trap.
Encryption
When using SNMPv3, the Encryption option becomes available to scramble
packet contents and prevent them from exposure to unauthorized sources.
Authentication
When using SNMPv3, the Authentication option becomes available to
ensure messaging is from a valid source. SNMPv3 uses the user-based
security model (USM) for message security and the view-based access
control model (VACM) for access control. USM specifies authentication and
encryption. VACM specifies access-control rules.
Authentication
Password
Enter a 8 - 40 character ASCII authentication password. The selected
authentication password ensures only trusted and authorized users can
access an EX3500 SNMP management session.
Private Type
Use the drop-down menu to specify the privacy type. The Advanced
Encryption Standard (AES) is utilized as one of the privacy protocol options
for SNMPv3 messages in either an aes128, aes192 or aes256 format and are
recommended. 3DES and des56 are also options, but are considered
somewhat insecure and vulnerable to brute-force-attacks.
Private Password
Enter a 8 - 64 character ASCII password to secure the privacy type
selected.
9 Select OK when completed to update the EX3500 SNMP user settings. Select Reset to revert the screen back to
its last saved configuration.
12.3 Hierarchical Tree
Tree Setup is unique because it is not a policy (which is reused in other objects), but rather a global configuration
that represents the tree displayed for Dashboard, Operations and Statistics. However since it is set as a
configuration, it follows the standard configuration methods, and requires a Commit before it taking effect and a
Save to become persistent across reboots.
ADSP can run as a virtual machine on NX9500 and NX9510 model service platforms. WiNG communicates with
ADSP using a single sign-on (SSO) authentication mechanism. Once the user is logged in, WiNG gains access to
ADSP without being prompted to login again at ADSP. There is no synchronization between the WiNG and ADSP
databases. ADSP has its own user database stored locally within its virtual machine. This local database is
accessed if a user logs directly into ADSP.
WiNG and ADSP must be consistent in the manner events are reported up through a network hierarchy to ensure
optimal interoperability and event reporting. To provide such consistency, WiNG has added support for an ADSPlike hierarchal tree. The tree resides within WiNG, and ADSP reads it from WiNG and displays the network
hierarchy in its own ADSP interface. The hierarchal tree can also be used to launch ADSP modules (like Spectrum
Analyzer) directly from WiNG.
NOTE: The Hierarchical tree is available on both controllers and service platforms,
but not Access Points.
WiNG uses the following containers within the tree to be consistent with ADSP’s hierarchy conventions:
Wireless Controller and Service Platform System Reference Guide
12 - 32
Management Access
•
•
•
•
Country
Region
City
Campus
Hierarchy rules are enforced in the containers. For example, a city can be created under a country or region, but
not vice versa. An RF Domain can be placed in any container. However, there cannot be any additional containers
under the RF Domain.
WiNG’s RF Domain’s already use areas and floors, and these will continue to work as they currently do. Floors are
also numbered to be consistent with ADSP’s usage.
To configure a hierarchal tree to use with ADSP:
Select Configuration.
2 Select Management.
3 Refer to the upper, left-hand, portion of the UI and select Tree Setup.
The Tree Setup screen displays with a System node that requires population with the containers to represent
the deployment shared between WiNG and ADSP.
The Country, Region, City and Campus containers can be defined in any order, but at least one of these
containers is required within the hierarchy before the RF Domain can be added and the hierarchy defined as
valid.
Figure 12-22 Hierarchal Tree screen
4 To add a Country, Region, City or Campus to the tree, select System from the upper, left-hand, portion of the
Tree Setup screen. An add child link displays on the right-hand side of the display.
If adding a Country, select a deployment country from the Type drop-down menu and use the Name dropdown menu to scroll to the country of deployment where the RF Domain resides. Adding a country first is a
good idea since regions, city and campus can all be added as child items in the tree structure. However, the
selected country is an invalid tree node until a RF Domain is applied.
Wireless Controller and Service Platform System Reference Guide
12 - 33
Management Access
If adding a region, select Region from the Type drop-down menu and use the Name parameter to enter its
name. Select Add to display the region. A city and campus can be added as child items in the tree structure
under a region. An RF Domain can be mapped anywhere down the hierarchy for a region and not just directly
under a Country. For example, a region can have city and campus and one RF Domain mapped.
If adding a City, select City from the Type drop-down menu and use the Name parameter to enter its name.
Select Add to display the city. Only a campus can be added as a child item under a city. The city is an invalid
tree node until a RF Domain is applied somewhere within the directory tree.
If adding a Campus, select Campus from the Type drop-down menu and use the Name parameter to enter its
name. Select Add to display the campus. A Campus is the last node in the hierarchy before A RF Domain, and it
cannot be valid unless it has a RF Domain mapped to it.
NOTE: If a complete tree configuration has been saved and exported for archive to
remote location, it can be imported back into the Tree Setup screen and utilized
without having to re-configure the containers and RF Domain of that tree. Select
Import to utilize and existing tree configuration.
NOTE: If a tree container (country, region, city or campus) has a red box around it, it
either has invalid attributes or a RF Domain requires addition.
5 Select the add RF Domain link at the right-hand side of any container to display an Unmapped RF Domain
screen.
6 Provide the default RF Domain name whose deployment area and floor is mapped graphically, and whose
events are shared between WiNG and ADSP. Select Add to display the RF Domain within its respective place in
the tree hierarchy. A default RF Domain can also be dragged into the tree from the right-hand side of the
screen.
Once the RF Domain is in the tree, select the add child link at the right-hand side of the RF Domain to display a
screen where the RF Domain deployment Area and Floor are defined. Once define, select Add to populate the
tree with the Area and Floor.
Provide the Map URL to upload the floor plan created under an Area. Each area can have multiple floors
NOTE: While the MAP URL graphic file represents the RF Domain’s physical device
deployment area, devices cannot be dragged into topology or manipulated. To
define a network topology that allows an administrator to add devices and
manipulate locations, refer to Network View on page 4-27.
7 Edit a tree node at any time by selecting it from amongst the Tree Setup screen, and referring to the right-hand
side of the screen where a field displays to modify the container.
8 Optionally, select Tree Import Export Template to upload a template.csv file if one is needed for container
configuration.
A sample of the tree template is provided here for reference.
Row Description
record type (folder),server,Name,Description,Type,Floor Number,Path(slash delimited),Command(add|delete)
Actual Row is CSV file
Wireless Controller and Service Platform System Reference Guide
12 - 34
Management Access
folder,localhost,US,Country Description,Country,,
folder,localhost,Southeast,Region Description,Region,,US
folder,localhost,Alpharetta,City Description,City,,US/Southeast
folder,localhost,Sanctuary Park,Campus Description,Campus,,US/Southeast/Alpharetta
folder,localhost,The Falls 1125,Domain Description,RFDomain,,US/Southeast/Alpharetta/Sanctuary Park
folder,localhost,Queens,,Area,,US/Southeast/Alpharetta/Sanctuary Park/The Falls 1125
folder,localhost,FloorQLab,,Floor,1,US/Southeast/Alpharetta/Sanctuary Park/The Falls 1125/Queens
folder,localhost,FloorSLab,,Floor,2,US/Southeast/Alpharetta/Sanctuary Park/The Falls 1125/Queens
folder,localhost,FloorTLab,,Floor,3,US/Southeast/Alpharetta/Sanctuary Park/The Falls 1125/Queens
In the CSV file, configure specific tree node properties.
Index 1 : Record Type. This value is always 'folder'. Import/export allows the configuration of folder nodes only.
Leaf nodes cannot be configured like devices.
Index 2 : Server Name. This value is always 'localhost' as we are supporting the import/export from localhost
only.
Index 3 : Name. This configures the name/label of the tree node. This is the value which is visible to the user in
Tree node.
Index 4 : Description. This configures the additional information in form, which user wants to store with the
Tree node.
Index 5 : Type. This configures the type of the Tree node. Type can take one of the value "country, region, city,
campus, rfdomain, area, floor".
Index 6 : Floor Number. This is configures the floor number. This is applicable only for the floor node.
Index 7 : Path. This is /'(slash delimited) from the 'root'.
Index 8 : add|delete. Allows manipulation of the node. If no value is specified, the default is 'add' . If value is
'delete' then reference node is removed.
9 Select Import Tree Structure to optionally import a .csv file with pre-defined the containers and RF Domain.
Importing an existing tree saves an administrator from creating a new one from the beginning.
10 Once the tree topology is defined to your satisfaction, select Export Tree Structure to archive the tree topology
(in .csv file format) to a defined location.
The exported tree topology can be re-imported and automatically displayed within the Tree Setup screen at
any time.
11 Select OK to update the tree setup configuration. Select Reset to revert to the last saved configuration.
NOTE: Since the tree is set as a configuration, it follows standard configuration
methods, and requires a Commit before it taking effect and A Save to become
persistent across reboots.
Wireless Controller and Service Platform System Reference Guide
12 - 35
Management Access
12.4 Management Access Deployment Considerations
Before defining a access control configuration as part of a Management Access policy, refer to the following
deployment guidelines to ensure the configuration is optimally effective:
• Unused management protocols should be disabled to reduce a potential attack against managed resources. For
example, if a device is only being managed by the Web UI and SNMP, there is no need to enable CLI interfaces.
• Use management interfaces providing encryption and authentication. Management services like HTTPS, SSH
and SNMPv3 should be used when possible, as they provide both data privacy and authentication.
• By default, SNMPv2 community strings on most devices are set to public for the read-only community string
and private for the read-write community string. Legacy devices may use other community strings by default.
• SNMPv3 should be used for SNMP device management, as it provides both encryption, and authentication.
• Enabling SNMP traps can provide alerts for isolated attacks at both small managed radio deployments or
distributed attacks occurring across multiple managed sites.
• Whenever possible, centralized RADIUS management should be enabled. This provides better management and
control of management usernames and passwords and allows administrators to quickly change credentials in
the event of a security breach.
Wireless Controller and Service Platform System Reference Guide
12 - 36
13
Diagnostics
Resident diagnostic capabilities enable administrators to understand how devices are performing and troubleshoot
issues impacting device performance. Performance and diagnostic information is collected and measured on
controllers and service platforms for any anomalies potentially causing a key processes to fail.
Numerous tools are available within the Diagnostics menu. Some filter events, others allow you to view logs and
manage files generated when hardware or software issues are detected.
The diagnostics are managed as follows:
• Fault Management
• Crash Files
• Advanced Diagnostics
13.1 Fault Management
Fault management enables user's administering multiple sites to assess how individual devices are performing and
review issues impacting the network. Use the Fault Management screens to administrate errors generated by the
controller or service platform, Access Point or wireless client.
To assess the Fault Management configuration:
Select Diagnostics > Fault Management.
The Filter Events screen displays by default. Use this screen to configure how events are tracked. By default, all
events are enabled, and an administrator has to turn off events that do not require tracking.
Figure 13-1 Fault Management Filter Events screen
Use the Filter Events screen to create filters for managing detected events. Events can be filtered based on
severity, module received, source MAC, device MAC and client MAC address.
Wireless Controller and Service Platform System Reference Guide
13 - 1
Diagnostics
2 Define the following Customize Event Filters parameters for the Fault Management configuration:
Severity
Set the filtering severity. Select from the following:
All Severities – All events are displayed, irrespective of their severity
Critical – Only critical events are displayed
Error – Only errors and above are displayed
Warning – Only warnings and above are displayed
Informational – Only informational and above events are displayed
Module
Select the module from which events are tracked. When a module is
selected, events from other modules are not tracked. Remember this
when interested in events generated by a particular module. Individual
modules can be selected (such as TEST, LOG, FSM etc.) or all modules can
be tracked by selecting All Modules.
Source
Set the MAC address of the source device to be tracked. Setting a MAC
address of 00:00:00:00:00:00 allows all devices to be tracked.
Message Substring
Optionally append a text message (substring) to the event filter to assist
the administrator in distinguishing this filter from others with similar
attributes.
NOTE: Leave the fields to a default value of 00:00:00:00:00:00 to track all MAC
addresses.
3 Select the Add to Active Filters button to create a new filter and add it to the Active Event Filters table. When
added, the filter uses the current configuration defined in the Customize Event Filters field.
4 Refer to the Active Event Filters table to set the following parameters for the Fault Management configuration:
a. To activate all the events in the Active Events Filters table, select the Enable All Events button. To stop event
generation, select Disable All Events.
b. To enable an event in the Active Event Filters table, click the event to select it. Then, select the Activate Defined
Filter(s) button.
NOTE: Filters cannot be persisted across sessions. They have to be created every
time a new session is established.
5 Select View Events from the upper, left-hand, side of the Diagnostics > Fault Management menu.
Wireless Controller and Service Platform System Reference Guide
13 - 2
Diagnostics
Figure 13-2 Fault Management View Events screen
Use the View Events screen to track and troubleshoot events using the source and severity levels defined in the
Configure events screen.
6 Define the following Customize Event Filters parameters for the Fault Management configuration:
Timestamp
Displays the Timestamp (time zone specific) when the fault occurred.
Module
Displays the module used to track the event. Events detected by other
module are not tracked.
Message
Displays error or status messages for each event listed.
Severity
Displays the severity of the event as defined for tracking from the
Configuration screen. Severity options include:
All Severities – All events are displayed irrespective of their severity
Critical – Only critical events are displayed
Error – Only errors and above are displayed
Warning – Only warnings and above are displayed
Info – Only informational and above events are displayed
Source
Displays the MAC address of the tracked source device.
Hostname
Lists the administrator assigned hostname of the tracked source device.
7 Select Clear All to clear events and begin new event data gathering.
8 Select Event History from the upper, left-hand, side of the Diagnostics > Fault Management menu.
Wireless Controller and Service Platform System Reference Guide
13 - 3
Diagnostics
Figure 13-3 Fault Management Event History screen
The Event History screen displays events for controllers, service platforms and Access Points. The Controller(s)
tab displays by default. Information on this tab can be filtered by controllers and service platforms, then further
by a RF Domain. Similarly, the Access Point(s) tab displays information for each RF Domain on the Access
Point and this information can be further filtered on the devices adopted by this Access Point.
Within the Controller(s) tab, select the controller from the Select a Controller field to filter events to display. To
filter messages further, select a RF Domain from the Filter by RF Domain field.
10 Within the Access Point(s) tab, select the RF Domain from the Select a RF Domain field to filter events to
display. To filter messages further, select a device from the Filter by Device field.
11 Select Fetch Historical Events from the lower, right-hand, side of the UI to populate the table with either device
or RF Domain events. The following event data is fetched and displayed:
Timestamp
Displays the Timestamp (time zone specific) when the fault occurred.
Module
Displays the module used to track the event. Events detected by other
module are not tracked.
Message
Displays error or status messages for each event listed.
Severity
Displays the severity of the event as defined for tracking from the
Configuration screen. Severity options include:
All Severities – All events are displayed irrespective of their severity
Critical – Only critical events are displayed
Error – Only errors and above are displayed
Warning – Only warnings and above are displayed
Info – Only informational and above events are displayed
Source
Displays the MAC address of the source device tracked by the selected
module.
Hostname
Lists the administrator assigned hostname of the source device tracked
by the selected module.
Wireless Controller and Service Platform System Reference Guide
13 - 4
Diagnostics
RF Domain
Displays the RF Domain membership of the source device tracked by the
selected module.
12 Select Clear All to clear events and begin new event data gathering.
13.2 Crash Files
Use the Crash Files screen to review files created when a controller or service platform encounters a critical error
or malfunction. Use crash files to troubleshoot issues specific to the device on which a crash event was generated.
These are issues impacting the core (distribution layer). Once reviewed, files can be deleted or transferred for
archive. Crash files can be sent to a support team to expedite issues with the reporting device.
Select Diagnostics > Crash Files to display the crash file information.
Once a target device has been selected its crash file information displays in the viewer on the right.
Figure 13-4 Crash Files information
2 Refer to the following crash file information for the selected device.
File Name
Displays the name of the file generated when a crash event occurred. This
is the file available for copy to an external location for archive and remote
administration.
Size
Lists the size of the crash file, as this information is often needed when
copying files to an external location.
Last Modified
Displays the Timestamp (time zone specific) when the most recent
update to the file occurred.
Actions
Displays the action taken in direct response to the detected crash event.
3 Select Copy to copy a selected crash file to an external location. Select Delete to remove a selected crash file.
Wireless Controller and Service Platform System Reference Guide
13 - 5
Diagnostics
13.3 Advanced Diagnostics
Refer to Advanced UI Diagnostics to review and troubleshoot any potential issue with the resident User Interface
(UI). The UI Diagnostics screen provides diagnostic tools to identify and correct issues with the UI. Diagnostics can
also be performed at the device level for the Access Point radios and connected clients.
13.3.1 UI Debugging
Advanced Diagnostics
Use the UI Debugging screen to view debugging information for a selected device.
To review device debugging information:
Select Diagnostics > Advanced > UI Debugging to display the UI Debugging menu options.
The UI debugging information displays within the NETCONF Viewer by default.
Figure 13-5 UI Debugging screen - NETCONF Viewer
2 Use the NETCONF Viewer to review NETCONF information. NETCONF is a proprietary tag-based configuration
protocol for devices. Messages are exchanged using XML tags.
3 The Real Time NETCONF Messages area lists an XML representation of any message generated by the system.
The main display area of the screen is updated in real time.
4 Refer to the Request Response and Time Taken fields on the bottom of the screen to assess the time to receive
and respond to requests. The time is displayed in microseconds.
5 Use the Clear button to clear the contents of the Real Time NETCONF Messages area. Use the Find parameter
and the Next button to search for message variables in the Real Time NETCONF Messages area.
Wireless Controller and Service Platform System Reference Guide
13 - 6
Diagnostics
13.3.2 Viewing UI Logs
Advanced Diagnostics
Use the UI logs to periodically assess user interface (UI) events by type, category and severity to assess whether
any administrative corrective actions are warranted.
To view UI log information:
Select Diagnostics > Advanced > View UI Logs to display the Flex Logs and Error Logs screens. The Flex Logs
screen displays by default, but both tabs list the same information for either UI logs or UI error logs
respectively.
Figure 13-6 View UI Logs screen - Flex Logs tab
2 Refer to the following UI event or error log parameters:
Sequence
Displays a numeric number for the generation of the listed UI events. If
changing the data display from a sequential display, these numbers can
be used to assess the chronology of the UI event generation.
Date/Time
Lists the date and time when each listed UI log event occurred. Use this
information to assess whether time was factor in the generation of one or
more events and whether their timestamp increases their significance.
Type
Displays each listed log entry’s event or error type. Some events are
DEBUG while others are INFO. Categorize collectively as specific events
warrant additional administration.
Category
Lists each event or error’s system defined category as a means of further
filtering specific events or system collected error logs. This is helpful when
assess whether specific events or errors impact multiple UI functions.
Wireless Controller and Service Platform System Reference Guide
13 - 7
Diagnostics
Message
Displays the system generated message for the functions impacted by
each listed UI or error. Use this data in combination with the date, type
and category to assess whether specific messages are related and their
significance worthy of immediate administration.
3 Select Clear All to remove all the log or error entries from the screen and begin a new data collection.
13.3.3 Viewing UI Sessions
Advanced Diagnostics
Refer to the View Sessions screen to assess specific user interface sessions by individual user.s
To view UI session information:
Select Diagnostics > Advanced > View Sessions.
Figure 13-7 View Sessions Screen
2 Refer to the following UI session data to assess its significance:
Cookie
Displays a numeric session cookie which identifies the session
corresponding to it. This information can be used to further filter specific
user sessions to the network route used.
From
Lists the numeric IP address used by each listed user as their network
identifier into the WiNG user interface.
Role
Displays each user’s defined administrative role. Each role has different
access and administrative privileges.
Start Time
Lists the time each listed user began their WiNG interface UI session.
Does this start time correspond to a known UI event or error condition?
User
Displays each user’s SNMP administrative access protocol and their
session permissions.
3 Select a specific user session and Delete to remove the selected session from those listed for administration.
Wireless Controller and Service Platform System Reference Guide
13 - 8
14
Operations
The functions within the controller or service platform’s Operations menu allow firmware and configuration files
management and certificate generation for managed devices. In a clustered environment, these operations can be
performed on one controller or service platform, then propagated to each member of the cluster and onwards to
the devices managed by each cluster member.
A certificate links identity information with a public key enclosed in the certificate. Device certificates can be
imported and exported to and from the controller or service platform to a secure remote location for archive and
retrieval as they are required for application to other managed devices.
Self Monitoring At Run Time RF Management (Smart RF) is an innovation designed to simplify RF configurations
for new deployments, while (over time) providing on-going deployment optimization and radio performance
improvements. The Smart RF functionality scans the managed network to determine the best channel and transmit
power for each managed Access Point radio. Smart RF policies can be applied to specific RF Domains, to add site
specific deployment configurations and self recovery values to groups of devices within pre-defined physical RF
coverage areas.
For more information, refer to the following:
• Device Operations
• Certificates
• Smart RF
14.1 Device Operations
Updated device firmware and configuration files are periodically released to the Support Web site. If an Access
Point’s (or its associated device’s) firmware is older than the version on the Web site, update to the latest firmware
version for full feature functionality and optimal controller or service platform utilization. Additionally, selected
devices can either have a primary or secondary firmware image applied or fallback to a selected firmware image if
an error occurs in the update process.
For more information, refer to the following:
• Operations Summary on page 14-1
• Adopted Device Upgrades
• Using the File Management Browser
• Restarting Adopted Devices
• Captive Portal Configuration
• Crypto CMP Certificate
• RAID Operations
• Re-elect Controller
14.1.1 Operations Summary
Device Operations
The Summary screen displays by default when Operations is selected from the controller or service platform’s main
menu bar.
Wireless Controller and Service Platform System Reference Guide
Operations
The Summary screen displays firmware information for a specific device selected from either the RF Domain or
Network tabs on the left-hand side of the screen.
NOTE: When displaying the Summary screen at the RF Domain level of the UI’s
hierarchal tree, the screen does not display a field for a device’s Primary and
Secondary firmware image. At the RF Domain level, the Summary screen just lists
the Hostname, MAC Address, Online status, Device Type and Is Controller
designations for the devices comprising the selected RF Domain. A RF Domain must
be selected from the hierarchal tree and expanded to list the devices comprising the
RF Domain. From there, individual controllers, service platforms and Access Points
can be selected and their properties modified.
Figure 14-1 Device Details screen
Wireless Controller and Service Platform System Reference Guide
Operations
Refer to the following to determine whether a firmware image needs to be updated for the selected device, or
a device requires a restart or revert to factory default settings.
Version
Displays the primary and secondary firmware image version from the
wireless controller.
Build Date
Displays the date the primary and secondary firmware image was built
for the selected device.
Install Date
Displays the date the firmware was installed for the selected device.
Fallback
Lists whether fallback is currently enabled for the selected device.
When enabled, the device reverts back to the last successfully
installed firmware image if something were to happen in its next
firmware upgrade that would render the device inoperable.
Current Boot
Lists firmware image for the device on the current boot.
Upgrade Status
Displays the status of the last firmware upgrade performed for each
listed device managed by this controller or service platform.
Firmware Upgrade
Select this option to display the firmware upgrade window for the
selected device. Select the Apply button to perform the function.
Reload
Select this option to restart the selected device. Selecting this option
restarts the target device using the specified options in the settings
window. Restarting a device resets all data collection values to zero.
Select the Reload button to perform the function.
2 Refer to the device table for basic information for known device types. The device table displays the Device
Type, Controller status, Online, Offline and Total device counts.
14.1.1.1 Upgrading Device Firmware
Operations Summary
Controllers and service platforms can conduct firmware updates on behalf of their managed devices.
To update the firmware of a managed device:
Select a device from the browser.
2 Select the Firmware Upgrade button.
Figure 14-2 Firmware Update screen
3 By default, the Firmware Upgrade screen displays the server parameters for the target device firmware file.
Wireless Controller and Service Platform System Reference Guide
Operations
4 Provide the following information to accurately define the location of the target device firmware file:
Protocol
Select the protocol used for updating the device firmware. Available
options include:
tftp
ftp
sftp
http
cf
usb1-4
Port
Use the spinner control or manually enter the value to define the port
used by the protocol for firmware updates. This option is not valid for cf
or usb1-4.
Host
Provide the hostname or numeric IPv4 or IPv6 formatted address of the
server used to update the firmware. This option is not valid for cf and
usb1-4. A hostname cannot contain an underscore.
User Name
Define the user name used to access either a FTP or SFTP server.
Password
Specify the password for the user account to access a FTP or a SFTP
server.
Path/File
Specify the path to the firmware file. Enter the complete relative path to
the file on the server.
5 Select Apply to start the firmware update. Select Abort to terminate the firmware update. Select Close to close
the upgrade popup. The upgrade continues in the background.
14.1.2 Adopted Device Upgrades
Device Operations
An administrator can designate controllers, service platforms or Access Points as RF Domain managers capable of
receiving firmware files from the NOC (NX7500 or NX9000 series service platforms) then provisioning other
devices within their same RF Domain. Controllers, service platforms and Access Points can now all update the
firmware of different device models within their RF Domain. However, firmware updates cannot be made
simultaneously to devices in different site deployments.
To administer a device upgrade and administrate upgrade status and history:
Select the Operations.
2 Ensure Devices is selected from the Operations menu on the top, left-hand, side of the screen.
3 Expand the System node on the left-hand side of the screen, select a RF Domain and one of its member
devices.
4 Select the Adopted Device Upgrade tab. The screen displays with the Device Upgrade List selected by default.
Wireless Controller and Service Platform System Reference Guide
Operations
Figure 14-3 Device Upgrade List screen
5 Select a controller, service platform or Access Point model from the Device Type List drop-down menu. This is
the device model intended to provision firmware to the devices selected within the All Devices table below.
NOTE: If selecting the Device Upgrade screen from the RF Domain level of the UI’s
hierarchal tree, there’s an additional Upgrade from Controller option to the right of
the Device Type List. Select this option to provision selected device models within
the same RF Domain from this RF Domain manager. If expanding a RF Domain and
selecting a member device, the upgrade tab is entitled Adopted Device Upgrade,
as an upgrade is made from an elected RF Domain Manager device. There’s also an
additional Device Image File screen to select the device image type and set the
transfer protocol.
6 Use the Scheduled Upgrade Time option to set when the upgrade occurs. To perform an upgrade immediately,
select Now. To schedule the upgrade to take place at a specified time, enter a date and time in the appropriate
fields.
7 Refer to the Scheduled Reboot Time option to schedule when an updated device is rebooted to implement the
updated firmware. To reboot immediately, select Now. To schedule the reboot to take place at a future time to
keep the device in service, enter a date and time in the appropriate fields.
Use the No Reboot option to keep from rebooting after an upgrade. Select Staggered Reboot to avoid
upgrading devices simultaneously and risk bringing down the network. When selected, devices are rebooted
incrementally to preserve network availability. Select Force Upgrade to initiate an Access Point firmware
upgrade and reboot at the present time.
NOTE: The Scheduled Upgrade Time and Scheduled Reboot Time are your local
system’s time. They’re not the Access Point, controller, service platform or VX time
and are not synched with the device.
Wireless Controller and Service Platform System Reference Guide
Operations
Use the All Devices table to select controller, service platform and Access Point models for firmware updates
from the device model selected from the Device Type List.
Refer to the MAC Address and Device Type values to help determine the specific models available for upgrade
within the RF domain. Use the Version and Upload Version values to assess each listed device’s current
firmware as well as the firmware version available to a device upgrade.
8 Select Device Image File.
Figure 14-4 Device Image File screen
9 Select a controller, service platform or Access Point model from the Device Image Type drop-down menu.
Selecting All makes each controller, service platform and Access Point model images available for updates on
those specific models.
10 Select the Basic link to enter a URL pointing to the location of the controller, service platform or Access Point
image files for the device update(s).
11 Selecting Advanced lists additional options for the device’s firmware image file location:
Protocol
Select the protocol for device firmware file management and transfer.
Available options include:
tftp
ftp
sftp
http
cf
Port
Designate the port for transferring the firmware files used in the
upgrade operation. Enter the port number directly or use the spinner
control.
Wireless Controller and Service Platform System Reference Guide
Operations
Host
Specify a numerical IP address or textual Hostname of the resource
used to transfer files to the devices designated for a firmware update. A
hostname cannot contain an underscore.
Path / File
Define the path to the file on the file repository resource. Enter the
complete relative path to the file.
12 Select the Load Image button to upload the device firmware in preparation of an upgrade.
The firmware image is loaded to the flash/upgrade directory (not the flash/cache directory). If the NOC pushes
the image, then it is loaded to flash/cache/upgrade.
13 Select Upgrade Status to assess the administration, scheduling and progress of device firmware updates.
Figure 14-5 Upgrade Status screen
14 Refer to the Upgrade Status field to assess the completion of in-progress upgrades.
Number of devices
currently being
upgraded
Lists the number of firmware upgrades currently in-progress and
downloading for selected devices. Once the device has the image it
requires a reboot to implement the firmware image.
Number of devices
currently being booted
Lists the number devices currently booting after receiving an upgrade
image. The reboot is required to implement the new image and renders
the device offline during that period. Using the Device Upgrade List,
reboots can be staggered or placed on hold to ensure device remains in
service.
Number of devices
waiting in queue to be
upgraded
Lists the number of devices waiting to receive a firmware image from
their provisioning controller, service platform or Access Point. Each
device can have its own upgrade time defined, so the upgrade queue
could be staggered.
Wireless Controller and Service Platform System Reference Guide
Operations
Number of devices
waiting in queue to be
upgraded
Lists the number of devices waiting to reboot before actively utilizing its
upgraded image. The Device Upgrade List list allows an administrator to
disable or stagger a reboot time, so device reboots may not occur
immediately after an upgrade. The reboot operation renders the device
offline until completed so reboots can scheduled for periods of reduced
load.
Number of devices
marked for cancellation
Lists the number of upgrades that have been manually cancelled during
the upgrade operation.
15 Refer to the following status reported for each current or scheduled upgrade operation:
Device Type
Displays the model number of devices pending an upgrade. Each listed
device is provisioned an image file unique to that model.
Hostname
Lists the factory encoded MAC address of a device either currently
upgrading or in the queue of scheduled upgrades.
MAC Address
Lists the factory encoded MAC address of a device either currently
upgrading or in the queue of scheduled upgrades.
Result
Lists the state of an upgrade operation (downloading, waiting for a
reboot etc.).
Upgrade Time
Displays whether an upgrade is immediate or set by an administrator
for a specific time. Staggering upgrades is helpful to ensure a sufficient
number of devices remain in service at any given time while others are
upgrading.
Reboot Time
Displays whether a reboot is immediate or time set by an administrator
for a specific time. Reboots render the device offline, so planning
reboots carefully is central to ensuring a sufficient number of devices
remain in service.
Progress
Lists the number of specific device types currently upgrading.
Retries
Displays the number of retries, if any, needed for an in-progress
firmware upgrade operation.
Last Status
Lists the last reported upgrade and reboot status of each listed in
progress or planned upgrade operation.
Upgraded By
Lists the model of the controller, service platform or Access Point RF
Domain manager that’s provisioning an image to a listed device.
16 Optionally select Cancel (from the lower, right-hand corner of the screen) to cancel the upgrade of devices
under the selected RF Domain. The Cancel button is enabled only if there are device undergoing upgrade and
they’re are selected for cancellation.
17 Select Upgrade History.
Wireless Controller and Service Platform System Reference Guide
Operations
Figure 14-6 Upgrade History screen
18 Refer to the following Upgrade History status:
Hostname
Displays the administrator assigned Hostname for each listed controller,
service platform or Access Point that’s received an update.
Device Type
Displays the controller, service platform or Access Point model
upgraded by a firmware update operation.
MAC Address
Displays the device Media Access Control (MAC) or hardware address
for a device that’s received an update.
Result
Displays the upgrade result for each listed device.
Time
Displays the time and date of the last status received from an upgraded
device.
Retries
Displays the number of retries, if any, needed for the firmware upgrade
operation.
Upgraded By
Displays the administrator credentials responsible for initiating each
listed upgrade operation.
Last Status
Displays the last status update received for devices that have been
upgraded.
19 Select the Clear History button to clear the current update information for each listed device and begin new
data collections.
Wireless Controller and Service Platform System Reference Guide
Operations
14.1.3 Using the File Management Browser
Device Operations
Controllers and service platforms maintain a File Browser allowing an administrator to review the files residing on a
controller or service platform’s internal or external memory resource. Directories can be created and maintained for
each File Browser location and folders and files can be moved and deleted as an administrator interprets
necessary.
NOTE: The File Management tab is not available at the RF Domain level of the UI’s
hierarchal tree. A RF Domain must be selected and expanded to display the RF
Domain’s member devices. Once expanded, selected a RF Domain member device
to ensure the File Management UI option is available.
To administer files for managed devices and memory resources:
Select the Operations > Devices > File Management.
Figure 14-7 File Browser screen - flash
2 Refer to the following to determine whether a file needs to be deleted or included in a new folder for the
selected internal (flash, system, nvram) or external (cf, USB1-4) memory resource. The following display for each
available memory resource:
File Name
Displays the name of the file residing on the selected flash, system,
nvram or usb1-4 location. The name cannot be modified from this
location.
Size (Kb)
Displays the size of the file in kb. Use this information to help determine
whether the file should be moved or deleted in respect to available
system memory.
Wireless Controller and Service Platform System Reference Guide
10
Operations
Last Modified
Lists a timestamp for the last time each listed file was modified. Use this
information to determine the file’s relevance or whether it should be
deleted.
File Type
Displays the type for each file including binary, text or empty.
3 If needed, use the Create Folder utility to create a folder that servers as a directory for some or all of the files
for a selected memory resource.
4 Select Transfer File to invoke a subscreen where the local or server file source and target (destination) are
defined as well as the file transfer protocol and external destination location or resource. For more information,
see Managing File Transfers on page 14-11.
5 Optionally, use the Delete Folder or Delete File buttons to remove a folder or file from within the controller,
service platform or Access Point’s current memory resource.
14.1.3.1 Managing File Transfers
Device Operations
Controllers and service platforms can administer files on managed devices. Transfer files from a device to this
controller, to a remote server or from a remote server to the controller. An administrator can transfer logs,
configurations and crash dumps.
To administer files for managed devices:
Select the Operations > Devices > File Management
2 Select the Transfer File button.
Figure 14-8 File Transfers screen
Wireless Controller and Service Platform System Reference Guide
11
Operations
3 Set the following file management source and target directions as well as the configuration parameters of the
required file management activity:
Source
Select the source of the file transfer.
Select Server to indicate the source of the file is a remote server.
Select Local to indicate the source of the file is local to this controller or
service platform.
File
If the source is Local, enter the name of the file to be transferred.
Protocol
Select the protocol for file management. Available options include:
tftp
ftp
sftp
http
cf
usb1-4
This parameter is required only when Server is selected as the Source.
Port
Specify the port for transferring files. This option is not available for cf,
and usb1-4. Enter the port number directly or use the spinner control.
This parameter is required only when Server is selected as the Source.
Host
If needed, specify a hostname or numeric IP address of the serve
transferring the file. This option is not valid for cf and usb1-4. If a
hostname is provided, an IP Address is not needed. A hostname cannot
contain an underscore.
This field is only available when Server is selected in the From field.
User Name
Provide a user name to access a FTP or a SFTP server.
This parameter is required only when Server is selected as the Source,
and the selected protocol is ftp or sftp.
Password
Provide a password to access the FTP or SFTP server.
This parameter is required only when Server is selected as the Source,
and the selected protocol is ftp or sftp.
Path / File
Define the path to the file on the server. Enter the complete relative
path to the file.
This parameter is required only when Server is selected as the Source.
Target
Select the target destination to transfer the file.
Select Server if the destination is a remote server, then provide a URL to
the location of the server resource or select Advanced and provide the
same network address information described above.
Select Local if the destination is this controller or service platform.
4 Select Copy to begin the file transfer. Selecting Reset reverts the screen to its last saved configuration.
Wireless Controller and Service Platform System Reference Guide
12
Operations
14.1.4 Restarting Adopted Devices
Device Operations
Adopted devices may periodically require restarting to implement firmware updates or other maintenance
activities.
NOTE: The Adopted Device Restart tab is not available at the RF Domain level of
the UI’s hierarchal tree. A RF Domain must be selected and expanded to display the
RF Domain’s member devices. Once expanded, selected a RF Domain member
device to ensure the Adopted Device Restart option is available.
To restart controller or service platform adopted Access Points:
Select the Operations > Devices > Adopted Device Restart.
Figure 14-9 Adopted Device Restart screen
2 The Adopted AP Restart table displays the following information for each Adopted AP:
Hostname
Displays the specified Hostname for each known Access Point.
MAC Address
Displays the primary Media Access Control (MAC) or hardware address
for each known Access Point.
Type
Displays the Access Point model number for each adopted Access
Point.
Version
Displays the current firmware version for each adopted Access Point.
Reason
Lists the administrator defined reason an adopted device has been
queued for a restart.
Wireless Controller and Service Platform System Reference Guide
13
Operations
3 To restart an Access Point (or Access Points), select the checkbox to the left of each Access Point to restart and
configure the following options:
Force Reload
To force a reload of an Access Point or Access Points, select the Force
Reload checkbox next to each AP.
Delay (Seconds)
Specify the amount of time, in seconds, before the Access Point restart
should be executed. Delaying the restart may allow a selected Access
Point to complete its current duty cycle.
Message
Displays any messages associated with each adopted Access Point
Reload Status
Click the Reload Status button next to each adopted Access Point to
display their current status information.
14.1.5 Captive Portal Configuration
Device Operations
A captive portal is an access policy that provides temporary and restrictive access to the controller or service
platform managed wireless network.
A captive portal policy provides secure authenticated access using a standard Web browser. Captive portals
provide authenticated access by capturing and re-directing a wireless user's Web browser session to a captive
portal login page where the user must enter valid credentials to access the wireless network. Once logged into the
captive portal, additional Terms and Agreement, Welcome, Fail and No Service pages provide the administrator
with a number of options on screen flow and appearance.
Captive portal authentication is used primarily for guest or visitor access to the network, but is increasingly used to
provide authenticated access to private network resources when 802.1X EAP is not a viable option. Captive portal
authentication does not provide end-user data encryption, but it can be used with static WEP, WPA-PSK or WPA2PSK encryption.
The Captive Portal Pages enable the management of the client access request pages and their transfer to the
controller or service platform managed wireless network.
To manage captive portal pages:
Select the Operations > Devices > Captive Portal Pages. The AP Upload List displays by default.
Use the AP Upload List to provide connected Access Points with specific captive portal configurations so they can
successfully provision login, welcome and condition pages to requesting clients attempting to access the wireless
network using a captive portal.
Wireless Controller and Service Platform System Reference Guide
14
Operations
Figure 14-10 Captive Portal Pages - AP Upload List screen
2 Use the Captive Portal List drop-down menu to select an existing captive portal configuration to upload to an
Access Point and display to requesting client devices as they login and adhere to the terms required set for
access.
NOTE: If selecting the Captive Portal Pages screen from the System and RF
Domain levels of the UI’s hierarchal tree, there’s an additional Upload from
Controller option to the right of the Captive Portal List drop-down menu. Select this
option to upload existing captive portal pages from this device’s managing
controller or service platform.
3 Use Scheduled Upload Time to set the time of the captive portal page upload. Select Now to immediately start.
Use the date, hour and minute spinner controls to set a future date and time for the upload.
NOTE: The Scheduled Upload Time is your local system’s time. It’s not the Access
Point, controller, service platform or VX time and it is not synched with the device.
The All Devices table lists the hostname and MAC address of devices adopted by this Access Point.
4 At the device level, use the arrow buttons (>> > < <<) to move selected devices from the All Devices table to
the Upload List table. The Upload List table displays the Access Points to which the captive portal pages are
applied.
5 Select Upload from the lower right-hand side of the screen to upload the captive portal pages to the
designated Access Points.
6 Select the CP Pages Image File tab.
Wireless Controller and Service Platform System Reference Guide
15
Operations
Figure 14-11 Captive Portal Pages - CP Page Image File screen
7 Use the Captive Portal List drop-down menu to select an existing policy. This policy contains the image (or set
of login and conditions pages) requesting clients will navigate and complete before granted access to the
network using the unique permissions of the captive portal.
8 Set the following protocols, ports and network address information for sending image files to captive portal
provisioning Access Points:
Protocol
Define the protocol (transfer medium) used to forward the image files
to the Access Points provisioning captive portal files to requesting
clients. Available options include:
• tftp
• ftp
• sftp
• http
The protocol parameter is required only when Server is selected as the
Source and the Advanced option is used.
Host
If needed, specify a Hostname of the server transferring the file. This
option is not valid for cf, usb1, and usb2. If a hostname is provided, an IP
Address is not needed. A hostname cannot contain an underscore. This
field is only available when Server is selected in the From field.
Port
Specify the port for transferring files. Enter the port number directly or
use the spinner control.
User Name
Provide a user name to access the FTP or SFTP server. This parameter
is required only when the selected protocol is ftp or sftp.
Wireless Controller and Service Platform System Reference Guide
16
Operations
Password
Provide a password to access the FTP or SFTP server. This parameter is
required only when the selected protocol is ftp or sftp.
Path/File
Define the path to the file on the server. Enter the complete relative path
to the file.
9 Select Load Image to upload the image file. Optionally, refer to the Load Image Status field to review the status
of the current upload.
10 Select the Status tab.
Figure 14-12 Captive Portal Pages - Status screen
11 Refer to the Status tab to review the progress of Captive Portal Pages upload.
Hostname
Displays the hostname of the recipient device to which the captive
portal files are directed.
MAC
Displays the factory encoded MAC address of the recipient device.
State
Displays the target device’s current operational state within the
controller or service platform managed network.
Progress
Displays the completion progress of each captive portal upload
operation.
Retries
Lists the number of retries needed to upload the captive portal files to
each listed device.
Last Status
Displays the last known status of the captive portal page uploaded to
each listed device.
12 Select Clear History to clear the history displayed in the Status tab and begin new data collections.
Wireless Controller and Service Platform System Reference Guide
17
Operations
14.1.6 Crypto CMP Certificate
Device Operations
Certificate Management Protocol (CMP) is an Internet protocol to obtain and manage digital certificates in a Public
Key Infrastructure (PKI) network. A Certificate Authority (CA) issues the certificates using the defined CMP.
Using CMP, a device can communicate to a CMP supported CA server, initiate a certificate request and download
the required certificates from the CA server. CMP supports multiple request options through for device
communicating to a CMP supported CA server. The device can initiate a request for getting the certificates from
the server. It can also auto update the certificates which are about to expire.
The CMP client on the controller, service platform or Access Point triggers a request for the configured CMS CA
server. Once the certificate is validated and confirmed from the CA server it is saved on the device and becomes
part of the trustpoint. During the creation of the CMP policy the trustpoint is assigned a name and client
information. An administrator can use a manually created trustpoint for one service (like HTTPs) and use the CMP
generated trustpoint for RADIUS EAP certificate based authentication.
To assess existing certificates and, if necessary, renew a certificate:
Select Operations > Devices > Crypto CMP Certificate. This option is selectable at the controller level.
Figure 14-13 Crypto CMP Certificate screen
2 Review the following Crypto CMP certificate information to assess whether a certificate requires renewal:
Hostname
Lists the administrator assigned hostname of the CMP resource
requesting a certificate renewal from the CMP CA server.
MAC Address
Lists the hardware encoded MAC address of the CMP server resource.
Wireless Controller and Service Platform System Reference Guide
18
Operations
Trust Point Name
Lists the 32 character maximum name assigned to the target trustpoint.
A trustpoint represents a CA/identity pair containing the identity of the
CA, CA specific configuration parameters, and an association with an
enrolled identity certificate.
Trust Point Valid Until
The expiration of the CMP certificate is checked once a day. When a
certificate is about to expire a certificate renewal can initiated with the
server via an existing IPsec tunnel. If the tunnel is not established, the
CMP renewal request is not sent.
3 Select Trigger Certificate Renewal to begin update the credentials of the certificate. If a renewal succeeds, the
newly obtained certificate overwrites an existing certificate. If the renewal fails, an error is logged.
4 Select Refresh to update the screen to the last saved configuration.
14.1.7 RAID Operations
Device Operations
An administrator can configure a NX7530 or a NX9000 series RAID supported service platform with respect to
both its collective drive array as well as individual drive behavior and diagnostics. The service platform’s array
alarm can be silenced, drive LEDs can be illuminated and stopped, drive consistency (integrity) checks can be
made and the array can be prepared for drive replacements.
NOTE: RAID controller drive arrays are available within NX7530 and NX9000 series
service platforms (NX9000, NX9500 and NX9510 models) only. However, they can
be administrated on behalf of a profile by a different model service platform or
controller.
To administrate the service platform’s drive array and its member drives:
NOTE: The RAID tab is not available at the RF Domain level of the UI’s hierarchal
tree. A RF Domain must be selected and expanded to display the RF Domain’s
member devices. Once expanded, selected a RF Domain member NX7530, NX9000,
NX9500 or NX9510 model device to ensure the RAID option is available.
Wireless Controller and Service Platform System Reference Guide
19
Operations
Select Operations > Devices > RAID.
Figure 14-14 RAID screen
2 Conduct the following array diagnostic operations from within the RAID Manage Array field:
silence
Select silence to stop (silence) the service platform’s RAID controller
array alarm. When a drive is rendered offline for any reason, the service
platform’s array controller alarm is invoked.
locate-stop
Select locate-stop to stop the LEDs of all the drives within the array.
check-start
Select check-start to initiate a consistency check on the RAID array.
3 Conduct the following drive diagnostic operations from within the RAID Manage Drive field:
remove
Select remove to prepare a selected drive for physically removing it from
the drive array. The remove command can be applied to either an online
or hot spare drive.
install
Once a new drive is installed, it must be prepared for active array
utilization. Select install to dedicate a selected drive to repair a degraded
array and begin an array rebuild operation.
spare
Select spare to define a selected unused drive as a hot spare that can be
dedicate as an active array drive if one of the two online array drives
were to fail.
locate
Select locate to flash a selected drive’s LED so it can easily located
within the drive array.
4 Select Execute to initiate the selected command from either the RAID Manage Array or RAID Manage Drive
fields.
To view the service platform’s current RAID array status, drive utilization and consistency check information,
refer to RAID Statistics on page 15-114.
Wireless Controller and Service Platform System Reference Guide
20
Operations
14.1.8 Re-elect Controller
Device Operations
Use the Controller Re-election screen to identity available Access Point resources within a selected RF Domain and
optionally make some, or all, of the Access Points available to initiate tunnel connections.
NOTE: Take care when selecting Access Points for controller re-election, as client
connections may be broken on upon re-election. Ensure an elected Access Point's
client load can be compensated by another Access Point in the same RF Domain.
To re-elect controller adoption resources for tunnel establishment:
NOTE: The Re-elect Controller tab is only available at the RF Domain level of the
UI’s hierarchal tree and is not available for individual controllers, service platforms
and Access Points.
Select Operations.
2 Ensure a RF Domain is selected from the Operations menu on the top, left-hand, side of the screen. Otherwise,
the Re-elect Controller screen cannot be located, as it does not display at either the system or device levels of
the hierarchal tree.
3 Select the Re-elect Controller tab.
Wireless Controller and Service Platform System Reference Guide
21
Operations
Figure 14-15 Re-elect Controller screen
4 Refer to the Available APs column, and use the > button to move the selected Access Point into the list of
Selected APs available for RF Domain Manager candidacy. Use the >> button to move all listed Access Points
into the Selected APs table.
The re-election process can be achieved through the selection of an individual Access Point, or through the
selection of several Access Points with a specific Tunnel Controller Name matching the selected Access Points.
5 Select Re-elect to designate the Selected AP(s) as resources capable of tunnel establishment.
14.2 Certificates
A certificate links identity information with a public key enclosed in the certificate.
A certificate authority (CA) is a network authority that issues and manages security credentials and public keys for
message encryption. The CA signs all digital certificates it issues with its own private key. The corresponding public
key is contained within the certificate and is called a CA certificate. A browser must contain this CA certificate in
its Trusted Root Library so it can trust certificates signed by the CA's private key.
Depending on the public key infrastructure, the digital certificate includes the owner's public key, the certificate
expiration date, the owner's name and other public key owner information.
Wireless Controller and Service Platform System Reference Guide
22
Operations
Each certificate is digitally signed by a trustpoint. The trustpoint signing the certificate can be a certificate
authority, corporation or individual. A trustpoint represents a CA/identity pair containing the identity of the CA,
CA-specific configuration parameters and an association with an enrolled identity certificate.
SSH keys are a pair of cryptographic keys used to authenticate users instead of, or in addition to, a username/
password. One key is private and the other is public key. Secure Shell (SSH) public key authentication can be used
by a client to access managed resources, if properly configured. A RSA key pair must be generated on the client.
The public portion of the key pair resides with the controller or service platform, while the private portion remains
on a secure local area of the client.
For more information on the certification activities support by the controller or service platform, refer to the
following:
• Certificate Management
• RSA Key Management
• Certificate Creation
• Generating a Certificate Signing Request
14.2.1 Certificate Management
Certificates
If not wanting to use an existing certificate or key with a selected device, an existing stored certificate can be
leveraged from a different managed device for use with the target device. Device certificates can be imported and
exported to and from the controller or service platform to a secure remote location for archive and retrieval as
they are required for application to other managed devices.
To configure trustpoints for use with certificates:
Select Operations > Manage Certificates.
2 Select a device from amongst those displayed in either the RF Domain or Network panes on the left-hand side
of the screen.
Wireless Controller and Service Platform System Reference Guide
23
Operations
Figure 14-16 Manage Certificates screen
3 Select a device from amongst those displayed to review its certificate usage within the controller or service
platform managed network.
4 Refer to the All Certificate Details to review the certificate’s properties, self-signed credentials, validity period
and CA information.
5 To import a certificate to the controller or service platform, select the Import button from the bottom of the
Manage Certificates screen.
An Import New Trustpoint screen displays where CA certificates, CRLs and signed certificates can optionally be
imported to the controller or service platform once the network credentials of the file transfer have been
defined.
Wireless Controller and Service Platform System Reference Guide
24
Operations
Figure 14-17 Import New Trustpoint screen
6 To optionally import a CA certificate to the controller or service platform, select the Import CA button from the
Import New Trustpoint screen.
A CA is a network authority that issues and manages security credentials and public keys for message
encryption. The CA signs all digital certificates it issues with its own private key. The corresponding public key
is contained within the certificate and is called a CA certificate.
Wireless Controller and Service Platform System Reference Guide
25
Operations
Figure 14-18 Import New Trustpoint - Import CA screen
7 Define the following configuration parameters required for the Import CA of the CA certificate:
Trustpoint Name
Enter the 32 character maximum name assigned to the target trustpoint
signing the certificate. A trustpoint represents a CA/identity pair containing
the identity of the CA, CA specific configuration parameters, and an
association with an enrolled identity certificate.
URL
Provide the complete URL to the location of the trustpoint. If needed, select
Advanced to expand the dialog to display network address information to
the location of the target trustpoint. The number of additional fields
populating the screen is dependent on the selected protocol.
Advanced / Basic
Click the Advanced or Basic link to switch between a basic URL and an
advanced location to specify trustpoint location.
Protocol
Select the protocol used for importing the target CA certificate. Available
options include:
tftp
ftp
sftp
http
cf
usb 1-4
Port
Use the spinner control to set the port. This option is not valid for cf and usb1
- 4.
Wireless Controller and Service Platform System Reference Guide
26
Operations
Host
Provide the hostname or numeric IP4 or IPv6 formatted IP address of the
server used to export the trustpoint. IPV6 provides enhanced identification
and location information for computers on networks routing traffic across
the Internet. IPv6 addresses are composed of eight groups of four
hexadecimal digits separated by colons. Providing a host is not required for
cf and usb1-4. A hostname cannot contain an underscore.
Path/File
Specify the path or filename of the CA certificate. Enter the complete
relative path to the file on the server.
Cut and Paste
Select the Cut and Paste radio button to simply copy an existing trustpoint
into the cut and paste field. When pasting, no additional network address
information is required.
8 Select OK to import the defined CA certificate. Select Cancel to revert the screen to its last saved configuration.
9 Select the Import CRL button from the Import New Trustpoint screen to optionally import a CRL to the
controller or service platform.
If a certificate displays within the Certificate Management screen with a CRL, that CRL can be imported into the
controller or service platform. A certificate revocation list (CRL) is a list of certificates that have been revoked
or are no longer valid. A certificate can be revoked if the CA had improperly issued a certificate, or if a privatekey is compromised. The most common reason for revocation is the user no longer being in sole possession of
the private key.
For information on creating a CRL to use with a trustpoint, refer to Setting the Profile’s Certificate Revocation
List (CRL) Configuration on page 8-166.
Figure 14-19 Import New Trustpoint - Import CRL screen
Wireless Controller and Service Platform System Reference Guide
27
Operations
10 Define the following configuration parameters required for the Import of the CRL:
Trustpoint Name
Enter the 32 character maximum name assigned to the target trustpoint
signing the certificate. A trustpoint represents a CA/identity pair containing
the identity of the CA, CA-specific configuration parameters, and an
association with an enrolled identity certificate.
From Network
Select the From Network radio button to provide network address
information to the location of the target CRL. The number of additional
fields that populate the screen is also dependent on the selected protocol.
This is the default setting.
URL
Provide the complete URL to the location of the CRL. If needed, select
Advanced to expand the dialog to display network address information to
the location of the CRL. The number of additional fields that populate the
screen is also dependent on the selected protocol.
Protocol
Select the protocol used for importing the CRL. Available options include:
tftp
ftp
sftp
http
cf
usb1-4
Port
Use the spinner control to set the port. This option is not valid for cf and
usb1-4.
Host
Provide the hostname or numeric IP4 or IPv6 formatted IP address of the
server used to export the trustpoint. IPV6 provides enhanced identification
and location information for computers on networks routing traffic across
the Internet. IPv6 addresses are composed of eight groups of four
hexadecimal digits separated by colons. Providing a host is not required for
cf and usb1-4. A hostname cannot contain an underscore.
Path/File
Specify the path to the CRL. Enter the complete relative path to the file on
the server.
Cut and Paste
Select the Cut and Paste radio button to simply copy an existing CRL into
the cut and paste field. When pasting a CRL, no additional network address
information is required.
11 Select OK to import the CRL. Select Cancel to revert the screen to its last saved configuration.
12 To import a signed certificate to the controller or service platform, select Import Signed Cert from the Import
New Trustpoint screen.
Signed certificates (or root certificates) avoid the use of public or private CAs. A self-signed certificate is an
identity certificate signed by its own creator, thus the certificate creator also signs off on its legitimacy. The
lack of mistakes or corruption in the issuance of self signed certificates is central.
Self-signed certificates cannot be revoked which may allow an attacker who has already gained access to
monitor and inject data into a connection to spoof an identity if a private key has been compromised. However,
CAs have the ability to revoke a compromised certificate, preventing its further use.
Wireless Controller and Service Platform System Reference Guide
28
Operations
Figure 14-20 Import New Trustpoint - Import Signed Cert
13 Define the following parameters required for the Import of the Signed Certificate:
Trustpoint Name
Enter the 32 character maximum trustpoint name with which the certificate
should be associated.
From Network
Select the From Network radio button to provide network address
information to the location of the signed certificate. The number of
additional fields that populate the screen is dependent on the selected
protocol. From Network is the default setting.
URL
Provide the complete URL to the location of the signed certificate. If
needed, select Advanced to expand the dialog to display network address
information to the location of the signed certificate. The number of
additional fields populating the screen is dependent on the selected
protocol.
Protocol
Select the protocol for importing the signed certificate. Available options
include:
tftp
ftp
sftp
http
cf
usb1-4
Port
Use the spinner control to set the port. This option is not valid for cf and
usb1-4.
Wireless Controller and Service Platform System Reference Guide
29
Operations
Host
Provide the hostname or numeric IP4 or IPv6 formatted IP address of the
server used to import the trustpoint. IPV6 provides enhanced identification
and location information for computers on networks routing traffic across
the Internet. IPv6 addresses are composed of eight groups of four
hexadecimal digits separated by colons. Providing a host is not required for
cf and usb1-4. A hostname cannot contain an underscore.
Path/File
Specify the path to the signed certificate. Enter the complete relative path
to the file on the server.
Cut and Paste
Select the Cut and Paste radio button to simply copy an existing signed
certificate into the cut and paste field. When pasting a signed certificate, no
additional network address information is required.
14 Select OK to import the signed certificate. Select Cancel to revert the screen to its last saved configuration.
15 To optionally export a trustpoint from the controller or service platform to a remote location, select the Export
button from the Certificate Management screen.
Once a certificate has been generated on the controller or service platform’s authentication server, export the
self signed certificate. A digital CA certificate is different from a self signed certificate. The CA certificate
contains the public and private key pairs. The self certificate only contains a public key. Export the self
certificate for publication on a Web server or file server for certificate deployment or export it in to an active
directory group policy for automatic root certificate deployment.
Figure 14-21 Certificate Management - Export Trustpoint screen
16 Define the following configuration parameters required for the Export of the trustpoint.
Trustpoint Name
Enter the 32 character maximum name assigned to the trustpoint. The
trustpoint signing the certificate can be a certificate authority, corporation
or individual.
Wireless Controller and Service Platform System Reference Guide
30
Operations
URL
Provide the complete URL to the location of the trustpoint. If needed, select
Advanced to expand the dialog to display network address information to
the location of the trustpoint. The number of additional fields that populate
the screen is dependent on the selected protocol.
Protocol
Select the protocol used for exporting the target trustpoint. Available
options include:
tftp
ftp
sftp
http
cf
usb1-4
Port
Use the spinner control to set the port. This option is not valid for cf and
usb1-4.
Host
Provide the hostname or numeric IPv4 or IPv6 formatted address of the
server used to export the trustpoint. IPV6 provides enhanced identification
and location information for computers on networks routing traffic across
the Internet. IPv6 addresses are composed of eight groups of four
hexadecimal digits separated by colons. Providing a host is not required for
cf and usb1-4. A hostname cannot contain an underscore.
Path/File
Specify the path to the trustpoint. Enter the complete relative path to the
file on the server.
17 Select OK to export the defined trustpoint. Select Cancel to revert the screen to its last saved configuration.
18 To optionally delete a trustpoint, select the Delete button from within the Certificate Management screen.
Provide the trustpoint name within the Delete Trustpoint screen and optionally select Delete RSA Key to
remove the RSA key along with the trustpoint. Select OK to proceed with the deletion, or Cancel to revert to
the Certificate Management screen.
14.2.2 RSA Key Management
Certificates
Refer to the RSA Keys screen to review existing RSA key configurations applied to managed devices. If an existing
key does not meet the needs of a pending certificate request, generate a new key or import/export an existing key
to and from a remote location.
Rivest, Shamir, and Adleman (RSA) is an algorithm for public key cryptography. It’s an algorithm that can be used
for certificate signing and encryption. When a device trustpoint is created, the RSA key is the private key used
with the trustpoint.
To review existing device RSA key configurations, generate additional keys or import/export keys to and from
remote locations:
Wireless Controller and Service Platform System Reference Guide
31
Operations
Select RSA Keys tab from the Certificate Management screen.
Figure 14-22 Certificate Management - RSA Keys screen
2 Select a listed device to review its current RSA key configuration.
Each key can have its size and character syntax displayed. Once reviewed, optionally generate a new RSA key,
import a key from a selected device, export a key from the controller or service platform to a remote location
or delete a key from a selected device.
3 Select Generate Key to create a new key with a defined size.
Wireless Controller and Service Platform System Reference Guide
32
Operations
Figure 14-23 Certificate Management - Generate RSA Keys screen
4 Define the following configuration parameters required for the Import of the key:
Key Name
Enter the 32 character maximum name assigned to the RSA key.
Key Size
Set the size of the key as either 2048 (bits) or 4096 (bits). Leaving this value
at the default setting of 2048 is recommended to ensure optimum
functionality.
5 Select OK to generate the RSA key. Select Cancel to revert the screen to its last saved configuration.
6 To optionally import a CA certificate to the controller or service platform, select the Import button from the
Certificate Management > RSA Keys screen.
Wireless Controller and Service Platform System Reference Guide
33
Operations
Figure 14-24 Certificate Management - Import New RSA Key screen
7 Define the following parameters required for the Import of the RSA key:
Key Name
Enter the 32 character maximum name assigned to identify the RSA key.
Key Passphrase
Define the key used by both the controller or service platform and the
server (or repository) of the RSA key. Select the Show to expose the actual
characters used in the passphrase. Leaving the Show unselected displays
the passphrase as a series of asterisks “*”.
URL
Provide the complete URL to the location of the RSA key. If needed, select
Advanced to expand the dialog to display network address information to
the location of the target key. The number of additional fields that populate
the screen is dependent on the selected protocol.
Advanced / Basic
Select either the Advanced or Basic link to switch between a basic URL and
an advanced location to specify key location.
Protocol
Select the protocol used for importing the target key. Available options
include:
tftp
ftp
sftp
http
cf
usb1-4
Port
Use the spinner control to set the port. This option is not valid for cf and
usb1-4.
Wireless Controller and Service Platform System Reference Guide
34
Operations
Host
Provide the hostname or numeric IPv4 or IPv6 formatted address of the
server used to import the RSA key. IPV6 provides enhanced identification
and location information for computers on networks routing traffic across
the Internet. IPv6 addresses are composed of eight groups of four
hexadecimal digits separated by colons. Providing a host is not required for
cf and usb1-4. A hostname cannot contain an underscore.
Path/File
Specify the path to the RSA key. Enter the complete relative path to the key
on the server.
8 Select OK to import the defined RSA key. Select Cancel to revert the screen to its last saved configuration.
9 To optionally export a RSA key from the controller or service platform to a remote location, select the Export
button from the Certificate Management > RSA Keys screen.
Export the key to a redundant RADIUS server to import it without generating a second key. If there’s more
than one RADIUS authentication server, export the certificate and don’t generate a second key unless you want
to deploy two root certificates.
Figure 14-25 Certificate Management - Export RSA Key screen
10 Define the following configuration parameters required for the Export of the RSA key.
Key Name
Enter the 32 character maximum name assigned to the RSA key.
Key Passphrase
Define the key passphrase used by both the controller or service platform
and the server. Select Show to expose the actual characters used in the
passphrase. Leaving the Show unselected displays the passphrase as a
series of asterisks “*”.
Wireless Controller and Service Platform System Reference Guide
35
Operations
URL
Provide the complete URL to the location of the key. If needed, select
Advanced to expand the dialog to display network address information to
the location of the target key. The number of additional fields that populate
the screen is dependent on the selected protocol.
Protocol
Select the protocol used for exporting the RSA key. Available options
include:
tftp
ftp
sftp
http
cf
usb1-4
Port
Use the spinner control to set the port. This option is not valid for cf and
usb1-4.
Host
Provide the hostname or numeric IPv4 or IPv6 formatted address of the
server used to export the RSA key. IPV6 provides enhanced identification
and location information for computers on networks routing traffic across
the Internet. IPv6 addresses are composed of eight groups of four
hexadecimal digits separated by colons. Providing a host is not required for
cf and usb1-4. A hostname cannot contain an underscore.
Path/File
Specify the path to the key. Enter the complete relative path to the key on
the server.
11 Select OK to export the defined RSA key. Select Cancel to revert the screen to its last saved configuration.
12 To optionally delete a key, select the Delete button from within the Certificate Management > RSA Keys screen.
Provide the key name within the Delete RSA Key screen and select Delete Certificates to remove the certificate.
Select OK to proceed with the deletion, or Cancel to revert back to the Certificate Management screen.
14.2.3 Certificate Creation
Certificates
The Create Certificate screen provides the facility for creating new self-signed certificates. Self signed certificates
(often referred to as root certificates) do not use public or private CAs. A self signed certificate is a certificate
signed by its own creator, with the certificate creator responsible for its legitimacy.
To create a self-signed certificate that can be applied to a managed device:
Wireless Controller and Service Platform System Reference Guide
36
Operations
Select the Create Certificate tab the Certificate Management screen.
Figure 14-26 Certificate Management - Create Certificate screen
2 Define the following configuration parameters required to Create New Self-Signed Certificate:
Certificate Name
Enter the 32 character maximum name assigned to identify the name of the
trustpoint associated with the certificate. A trustpoint represents a CA/
identity pair containing the identity of the CA, CA-specific configuration
parameters, and an association with an enrolled identity certificate.
RSA Key
To create a new RSA key, select Create New to define a 32 character
maximum name used to identify the RSA key. Set the size of the key (2048,
4096 bits). Leave this value at the default setting of 2048 to ensure
optimum functionality. To use an existing key, select Use Existing and select
a key from the drop-down menu.
3 Set the following Certificate Subject Name parameters required for the creation of the certificate:
Certificate Subject
Name
Select either auto-generate to automatically create the certificate's subject
credentials or user-configured to manually enter the credentials of the self
signed certificate. The default setting is auto-generate.
Country (C)
Define the Country used in the certificate. The field can be modified by the
user to other values. This is a required field and must not exceed 2
characters.
Wireless Controller and Service Platform System Reference Guide
37
Operations
State (ST)
Enter a State/Prov. for the state or province name used in the certificate.
This is a required field.
City (L)
Enter a City to represent the city used in the certificate. This is a required
field.
Organization (O)
Define an Organization for the organization represented in the certificate.
This is a required field.
Organizational Unit
(OU)
Enter an Org. Unit for the organization unit represented in the certificate.
This is a required field.
Common Name (CN)
If there’s a common name (IP address) for the organizational unit issuing
the certificate, enter it here.
4 Select the following Additional Credentials required for the generation of the self signed certificate:
Email Address
Provide an Email Address used as the contact address for issues relating to
this certificate request.
Domain Name
Enter a fully qualified domain name (FQDN) is an unambiguous domain
name that specifies the node's position in the DNS tree hierarchy absolutely.
To distinguish an FQDN from a regular domain name, a trailing period is
added. For example, somehost.example.com. An FQDN differs from a
regular domain name by its absoluteness, since a suffix is not added.
IP Address
Specify the IP address used as the destination for certificate requests.
5 Select the Generate Certificate button at the bottom of the Create Certificate screen to produce the certificate.
14.2.4 Generating a Certificate Signing Request
Certificates
A certificate signing request (CSR) is a message from a requestor to a certificate authority to apply for a digital
identity certificate. The CSR is composed of a block of encrypted text generated on the server the certificate will
be used on. It contains information included in the certificate, including organization name, common name
(domain name), locality, and country.
A RSA key must be either created or applied to the certificate request before the certificate can be generated. A
private key is not included in the CSR, but is used to digitally sign the completed request. The certificate created
with a particular CSR only worked with the private key generated with it. If the private key is lost, the certificate is
no longer functional.The CSR can be accompanied by other identity credentials required by the certificate
authority, and the certificate authority maintains the right to contact the applicant for additional information.
If the request is successful, the CA sends an identity certificate digitally signed with the private key of the CA.
To create a CSR:
Select Operations > Certificates.
2 Select a device from amongst those displayed in either the RF Domain or Network panes on the left-hand side
of the screen.
3 Select Create CSR.
Wireless Controller and Service Platform System Reference Guide
38
Operations
Figure 14-27 Create CSR screen
4 Define the following configuration parameters required to Create New Certificate Signing Request (CSR):
RSA Key
To create a new RSA key, select Create New to define a 32 character
maximum name used to identify the RSA key. Set a 2,048 bit key. To use an
existing key, select Use Existing and select a key from the drop-down menu.
5 Set the following Certificate Subject Name parameters:
Certificate Subject
Name
Select either the auto-generate radio button to automatically create the
certificate's subject credentials or select user-configured to manually enter
the credentials of the self signed certificate. The default setting is autogenerate.
Country (C)
Define the Country used in the CSR. The field can be modified by the user
to other values. This is a required field and must not exceed 2 characters.
State (ST)
Enter a State/Prov. for the state or province name used in the CSR. This is a
required field.
City (L)
Enter a City to represent the city name used in the CSR. This is a required
field.
Organization (O)
Define an Organization for the organization used in the CSR. This is a
required field.
Wireless Controller and Service Platform System Reference Guide
39
Operations
Organizational Unit
(OU)
Enter an Org. Unit for the name of the organization unit used in the CSR.
This is a required field.
Common Name (CN)
If there’s a common name (IP address) for the organizational unit issuing
the certificate, enter it here.
6 Select the following Additional Credentials required for the generation of the CSR:
Email Address
Provide an email address used as the contact address for issues relating to
this CSR.
Domain Name
Enter a fully qualified domain name (FQDN) is an unambiguous domain
name that specifies the node's position in the DNS tree hierarchy absolutely.
A trailing period is added to distinguish an FQDN from a regular domain
name. For example, somehost.example.com. An FQDN differs from a
regular domain name by its absoluteness, since a suffix is not added.
IP Address
Specify the IP address used as the controller or service platform destination
for certificate requests.
7 Select the Generate CSR button at the bottom of the screen to produce the CSR.
14.3 Smart RF
Self Monitoring At Run Time RF Management (Smart RF) is an innovation designed to simplify RF configurations
for new deployments, while (over time) providing on-going deployment optimization and radio performance
improvements.
The Smart RF functionality scans the managed network to determine the best channel and transmit power for
each wireless controller managed Access Point radio. Smart RF policies can be applied to specific RF Domains, to
apply site specific deployment configurations and self recovery values to groups of devices within pre-defined
physical RF coverage areas.
Smart RF also provides self recovery functions by monitoring the managed network in real-time and provides
automatic mitigation from potentially problematic events such as radio interference, coverage holes and radio
failures. Smart RF employs self recovery to enable a WLAN to better maintain wireless client performance and site
coverage during dynamic RF environment changes, which typically require manual reconfiguration to resolve.
Smart RF is supported in standalone and clustered environments. In standalone environments, the individual
controller or service platform manages the calibration and monitoring phases. In clustered environments, a single
controller or service platform is elected a Smart Scan master and the remaining cluster members operate as Smart
RF clients. In cluster operation, the Smart Scan master coordinates calibration and configuration and during the
monitoring phase receives information from the Smart RF clients. Smart RF calibration can be triggered manually
or continues at run-time, all the time.
Smart RF is supported on wireless controllers managing Access Points in either standalone or clustered
environments.
Within the Operations node, Smart RF is managed within selected RF Domains, using the Access Points that
comprise the RF Domain and their respective radio and channel configurations as the basis to conduct Smart RF
calibration operations.
Wireless Controller and Service Platform System Reference Guide
40
Operations
14.3.1 Managing Smart RF for an RF Domain
Smart RF
When calibration is initiated, Smart RF instructs adopted radios (within a selected RF Domain) to beacon on a
specific legal channel, using a specific transmit power setting. Smart RF measures the signal strength of each
beacon received from both managed and unmanaged neighboring APs to define a RF map of the neighboring
radio coverage area. Smart RF uses this information to calculate each managed radio’s RF configuration as well as
assign radio roles, channel and power.
Within a well planned RF Domain, any associated radio should be reachable by at least one other radio. The Smart
RF feature records signals received from its neighbors. Access Point to Access Point distance is recorded in terms
of signal attenuation. The information is used during channel assignment to minimize interference.
To conduct Smart RF calibration for an RF Domain:
Select Operations > Smart RF.
2 Expand the System mode in the upper, left-hand, side of the user interface to display the RF Domains available
for Smart RF calibration.
3 Select a RF Domain from amongst those displayed.
The Smart RF screen displays information specific to the devices within the selected RF Domain using data
from the last interactive calibration.
Figure 14-28 Smart RF screen
4 Refer to the following to determine whether a Smart RF calibration or an interactive calibration is required:
Hostname
Displays the assigned Hostname for each member of the RF
Domain.
AP MAC Address
Displays the hardware encoded MAC address assigned to each
Access Point radio within the selected RF Domain. This value cannot
be modified as past of a calibration activity.
Wireless Controller and Service Platform System Reference Guide
41
Operations
Radio MAC Address
Displays the hardware encoded MAC address assigned to each
Access Point radio within the selected RF Domain. This value cannot
be modified as past of a calibration activity.
Radio Index
Displays a numerical index assigned to each listed Access Point
radio when it was added to the managed network. This index helps
distinguish this radio from others within this RF Domain with similar
configurations. This value is not subject to change as a result of a
calibration activity, but each listed radio index can be used in Smart
RF calibration.
Old Channel
Lists the channel originally assigned to each listed Access Point
MAC address within this RF Domain. This value may have been
changed as part an Interactive Calibration process applied to this RF
Domain. Compare this Old Channel against the Channel value to
right of it (in the table) to determine whether a new channel
assignment was warranted to compensate for a coverage hole.
Channel
Lists the current channel assignment for each listed Access Point, as
potentially updated by an Interactive Calibration. Use this data to
determine whether a channel assignment was modified as part of
an Interactive Calibration. If a revision was made to the channel
assignment, a coverage hole was detected on the channel as a result
of a potentially failed or under performing Access Point radio within
this RF Domain.
Old Power
Lists the transmit power assigned to each listed Access Point MAC
address within this RF Domain. The power level may have been
increased or decreased as part an Interactive Calibration process
applied to this RF Domain. Compare this Old Power level against the
Power value to right of it (in the table) to determine whether a new
power level was warranted to compensate for a coverage hole.
Power
This column displays the transmit power level for the listed Access
Point MAC address after an Interactive Calibration resulted in an
adjustment. This is the new power level defined by Smart RF to
compensate for a coverage hole.
Smart Sensor
Defines whether a listed Access Point is smart sensor on behalf of
the other Access Point radios comprising the RF Domain.
State
Displays the current state of the Smart RF managed Access Point
radio. Possible states include: Normal, Offline and Sensor.
Type
Displays the radio type (802.11an, 802.11bgn etc.) of each listed
Access Point radio within the selected RF Domain.
5 Select the Refresh button to (as needed) to update the contents of the Smart RF screen and the attributes of
the devices within the selected RF Domain.
6 Select the Clear Config button to remove a displayed Smart RF configuration.
7 Select the Clear History button to revert the statistics counters to zero to begin a new assessment.
Wireless Controller and Service Platform System Reference Guide
42
15
Statistics
This chapter describes statistics displayed by the graphical user interface (GUI). Statistics are available for
controllers or service platforms and their managed devices.
A Smart RF statistical history is available to assess adjustments made to device configurations to compensate for
detected coverage holes or device failures.
Statistics display detailed information about controller or service platform peers, health, device inventories, wireless
clients associations, adopted AP information, rogue APs and WLANs.
Access Point statistics can be exclusively displayed to validate connected Access Points, their VLAN assignments
and their current authentication and encryption schemes.
Wireless client statistics are available for an overview of client health. Wireless client statistics includes RF quality,
traffic utilization and user details. Use this information to assess if configuration changes are required to improve
network performance.
Guest access statistics are also available for the periodic review of wireless clients requesting the required pass
code, authentication and access into the WiNG managed guest network.
For more information, see:
• System Statistics
• RF Domain Statistics
• Controller Statistics
• Access Point Statistics
• Wireless Client Statistics
• Guest Access Statistics
NOTE: NOC controllers (NX9000, NX9500, NX9510, NX7500, and RFS6000) can
utilize an analytics developer interface as an additional tool available to
administrators to review specific APIs in granular detail. For more information, see
Analytics Developer Interface on page 15-332.
15.1 System Statistics
Statistics
The System screen displays information supporting managed devices or peer controllers. Use this information to
asses the overall state of the devices comprising the system. Systems data is organized as follows:
• Health
• Inventory
• Adopted Devices
• Pending Adoptions
• Offline Devices
• Device Upgrade
• Licenses
• WIPS Summary
Wireless Controller and Service Platform System Reference Guide
15 - 1
Statistics
15.1.1 Health
System Statistics
The Health screen displays the overall performance of the controller or service platform managed network
(system). This includes device availability, overall RF quality, resource utilization and network threat perception.
To display the health of the wireless controller managed network:
Select the Statistics menu from the Web UI.
2 Select the System node from the left navigation pane.
3 Select Health from the left-hand side of the UI.
Figure 15-1 System - Health screen
4 The Devices field displays the total number of devices in the controller or service platform managed network.
The pie chart is a proportional view of how many devices are functional and currently online. Green indicates
online devices and red offline devices detected within the controller or service platform managed network.
5 The Offline Devices table displays a list of detected devices in the network that are currently offline but
available as potential managed resources.
The table displays the number of offline devices within each impacted RF Domain. Assess whether the
configuration of a particular RF Domain is contributing to an excessive number of offline devices.
Wireless Controller and Service Platform System Reference Guide
15 - 2
Statistics
6 The Traffic Utilization table displays the top 5 RF Domains with the most effective resource utilization.
Utilization is dependent on the number of devices connected to the RF Domain.
Top 5
Displays the top 5 RF Domains in terms of usage index. Utilization
index is a measure of how efficiently the domain is utilized. This value
is defined as a percentage of current throughput relative to the
maximum possible throughput. The values are:
0-20 – Very low utilization
20-40 – Low utilization
40-60 – Moderate utilization
60 and above – High utilization
RF Domain
Displays the name of the RF Domain.
Client Count
Displays the number of wireless clients associated with the RF Domain.
7 The Device Types table displays the kinds of devices detected within the system. Each device type displays the
number currently online and offline.
8 Use the RF Quality table to isolate poorly performing radio devices within specific RF Domains. This information
is a starting point to improving the overall quality of the wireless controller managed network.The RF Quality
area displays the RF Domain performance. Quality indices are:
• 0 – 50 (Poor)
• 50 – 75 (Medium)
• 75 – 100 (Good).
The RF Quality field displays the following:
Worst 5
Displays five RF Domains with the lowest quality indices in the wireless
controller managed network. The value can be interpreted as:
0-50 – Poor quality
50-75 – Medium quality
75-100 – Good quality
RF Domain
Displays the name of the RF Domain wherein system statistics are
polled for the poorly performing device.
9 The System Security table defines a Threat Level as an integer value indicating a potential threat to the system.
It’s an average of the threat indices of all the RF Domains managed by the wireless controller.
Threat Level
Displays the threat perception value. This value can be interpreted as:
0-2 – Low threat level
3-4 – Moderate threat level
5 – High threat level
RF Domain
Displays the name of the target RF Domain for which the threat level
is displayed.
10 Select Refresh at any time to update the statistics counters to their latest values.
Wireless Controller and Service Platform System Reference Guide
15 - 3
Statistics
15.1.2 Inventory
System Statistics
The Inventory screen displays information about the physical hardware managed within the system by its member
controller or service platforms. Use this information to assess the overall performance of wireless controller
managed devices.
To display the inventory statistics:
Select the Statistics menu from the Web UI.
2 Select the System node from the left navigation pane.
3 Select Inventory from the left-hand side of the UI.
Figure 15-2 System - Inventory screen
4 The Devices field displays an exploded pie chart depicting controller, service platform and Access Point device
type distribution by model. The device on the left displays managing controller models. Select View Legends to
assess connected Access Points. Use this information to assess whether these are the correct models for the
original deployment objective.
5 The Radios table displays radios deployed within the wireless controller managed network. This area displays
the total number of managed radios and top 5 RF Domains in terms of radio count. The Total Radios value is
the total number of radios in this system.
Top Radio Count
Displays the radios index of each listed top radio.
RF Domain
Displays the name of the RF Domain the listed radios belong. The RF
Domain displays as a link that can be selected to display configuration
and network address information in greater detail.
Last Update
Displays the UTC timestamp when each listed client was last seen on
the network.
Wireless Controller and Service Platform System Reference Guide
15 - 4
Statistics
6 The Clients table displays the total number of wireless clients managed by the controller or service platform.
This Top Client Count table lists the top 5 RF Domains, in terms of the number of wireless clients adopted:
Top Client Count
Displays the client index of each listed top performing client.
RF Domain
Displays the name of the client RF Domain.
Last Update
Displays the UTC timestamp when the client count was last reported.
7 Select Refresh to update the statistics counters to their latest values.
15.1.3 Adopted Devices
System Statistics
The Adopted Devices screen displays a list of devices adopted to the wireless controller managed network (entire
system). Use this screen to view a list of devices and their current status.
To view adopted AP statistics:
Select the Statistics menu from the Web UI.
2 Select the System node from the left navigation pane.
3 Select Adopted Devices from the left-hand side of the UI.
Figure 15-3 System - Adopted Devices screen
The Adopted Devices screen provides the following:
Adopted Device
Displays administrator assigned hostname of the adopted device. Select
the adopted device link to display configuration and network address
information in greater detail.
Type
Displays the adopted Access Point’s model type.
Wireless Controller and Service Platform System Reference Guide
15 - 5
Statistics
RF Domain Name
Displays the domain the adopted AP has been assigned to. Select the RF
Domain to display configuration and network address information in
greater detail.
Model Number
Lists the model number of each AP that’s been adopted to the controller
or service platform since this screen was last refreshed.
Config Status
Displays the configuration file version in use by each listed adopted
device. Use this information to determine whether an upgrade would
increase the functionality of the adopted device.
Config Errors
Lists any errors encountered when the listed device was adopted by the
controller or service platform.
Adopter Hostname
Lists the administrator hostname assigned to the adopting controller or
service platform.
Adoption Time
Displays a timestamp for each listed device that reflects when the device
was adopted by the controller or service platform.
Startup Time
Provides a date stamp when the adopted device was restarted post
adoption.
Refresh
Select Refresh to update the statistics counters to their latest values.
15.1.4 Pending Adoptions
System Statistics
The Pending Adoptions screen displays those devices detected within the controller or service platform coverage
area, but have yet to be adopted by the controller or service platform. Review these devices to assess whether
they could provide radio coverage to wireless clients needing support.
To view pending AP adoptions to the controller or service platform:
Select the Statistics menu from the Web UI.
2 Select the System node from the left navigation pane.
3 Select Pending Adoptions from the left-hand side of the UI.
Wireless Controller and Service Platform System Reference Guide
15 - 6
Statistics
Figure 15-4 System - Pending Adoptions screen
The Pending Adoptions screen displays the following:
MAC Address
Displays the MAC address of the device pending adoption. Select the MAC
address to view device configuration and network address information in
greater detail.
Type
Displays the AP type.
IP Address
Displays the current IP Address of the device pending adoption.
VLAN
Displays the VLAN the device pending adoption will use as a virtual
interface with its adopting controller or service platform.
Reason
Displays a status (reason) as to why the device is pending adoption.
Discovery Option
Displays the discovery option code for each AP listed pending adoption.
Last Seen
Displays the date and time stamp of the last time the device was seen.
Click the arrow next to the date and time to toggle between standard time
and UTC.
Add to Devices
Select a listed AP and select the Add to Devices button to begin the
adoption process for this detected AP.
Refresh
Click the Refresh button to update the list of pending adoptions.
15.1.5 Offline Devices
System Statistics
The Offline Devices screen displays a list of devices in the controller or service platform managed network or RF
Domain that are currently offline. Review the contents of this screen to help determine whether an offline status is
still warranted.
To view offline device potentially available for adoption by the controller or service platform:
Wireless Controller and Service Platform System Reference Guide
15 - 7
Statistics
Select the Statistics menu from the Web UI.
2 Select the System node from the left navigation pane.
3 Select Offline Devices from the left-hand side of the UI.
Figure 15-5 System - Offline Devices screen
The Ofp indentfline Devices screen provides the following:
Hostname
Lists the administrator assigned hostname provided when the device was
added to the controller or service platform managed network.
MAC Address
Displays the factory encoded MAC address of each listed offline device.
Type
Displays the offline Access Point’s model type.
RF Domain Name
Displays the name of the offline device’s RF Domain membership, if
applicable. Select the RF Domain to display configuration and network
address information in greater detail.
Reporter
Displays the hostname of the device reporting the listed device as offline.
Select the reporting device name to display configuration and network
address information in greater detail.
Area
Lists the administrator assigned deployment area where the offline device
has been detected.
Floor
Lists the administrator assigned deployment floor where the offline device
has been detected.
Connected To
Lists the offline’s device’s connected controller, service platform or peer
model Access Point.
Last Update
Displays the date and time stamp of the last time the device was detected
within the controller or service platform managed network. Click the arrow
next to the date and time to toggle between standard time and UTC.
Refresh
Select Refresh to update the statistics counters to their latest values.
Wireless Controller and Service Platform System Reference Guide
15 - 8
Statistics
15.1.6 Device Upgrade
System Statistics
The Device Upgrade screen displays available licenses for devices within a cluster. It displays the total number of
AP licenses.
To view a licenses statistics within the controller or service platform managed network:
Select the Statistics menu from the Web UI.
2 Select the System node from the left navigation pane.
3 Select Device Upgrade from the left-hand side of the UI.
Figure 15-6 System - Device Upgrade screen
4 Select Device Upgrade from the left-hand side of the UI.
Upgraded By Device
Displays the MAC address of the controller, service platform or peer
model Access Point that performed an upgrade.
Type
Displays the model type of the adopting controller, service platform
or Access Point. An updating Access Point must be of the same
model as the Access Point receiving the update.
Device Hostname
List the administrator assigned hostname of the device receiving an
update.
History ID
Displays a unique timestamp for the upgrade event.
Last Update Status
Displays the initiation, completion or error status of each listed
upgrade operation.
Time Last Upgraded
Lists the date and time of each upgrade operation.
Retries Count
Displays the number of retries required in an update operation.
Wireless Controller and Service Platform System Reference Guide
15 - 9
Statistics
State
Displays the done or failed state of an upgrade operation.
Clear History
Select Clear History to clear the screen of its current status and begin
a new data collection.
Refresh
Select Refresh to update the screen’s statistics counters to their latest
values.
15.1.7 Licenses
System Statistics
The Licenses statistics screen displays available licenses for devices within a cluster. It displays the total number of
AP licenses. Native (local) and Guest license utilization can now be separately tracked as well.
To view a licenses statistics within the controller or service platform managed network:
Select the Statistics menu from the Web UI.
2 Select the System node from the left navigation pane.
3 Select Licenses from the left-hand side of the UI.
Figure 15-7 System - Licenses screen
4 The Local Licenses table provides the following information:
Cluster/Hostname
Lists the administrator assigned cluster hostname whose license
count and utilization is tallied in this Local Licenses table.
Wireless Controller and Service Platform System Reference Guide
15 - 10
Statistics
AP Licenses Installed
Lists the number of Access Point connections available to this
controller or service platform under the terms of the current license.
Lent AP Licenses
Displays the number of Access Point licenses lent (from this
controller or service platform) to a cluster member to compensate for
an Access Point’s license deficiency.
Total AP Licenses
Displays the total number of Access Point connection licenses
currently available to this controller or service platform.
AP License Usage
Lists the number of Access Point connections currently utilized by
this controller or service platform out of the total available under the
terms of the current license.
Remaining AP Licenses
Lists the remaining number of AP licenses available from the pooled
license capabilities of all the members of the cluster.
AAP Licenses Installed
Lists the number of Adaptive Access Point connections available to
this controller or service platform under the terms of the current
license.
Lent AAP Licenses
Displays the number of Adaptive Access Point licenses lent (from this
controller or service platform) to a cluster member to compensate for
an Access Point licenses deficiency.
Total AAP Licenses
Displays the total number of Adaptive Access Point connection
licenses currently available to this controller or service platform.
AAP Licenses Usage
Lists the number of Adaptive Access Point connections currently
utilized by this controller or service platform out of the total available
under the terms of the current license.
Remaining AAP Licenses
Lists the remaining number of AAP licenses available from the pooled
license capabilities of all the members of the cluster.
Validity
Displays validity information for the license’s legal usage with the
controller or service platform.
5 The Global Licenses table provides the following information:
Cluster AP Adoption
Licenses
Displays the current number of Access Point adoption licenses utilized by
controller or service platform connected Access Points within a cluster.
Cluster Total AP Licenses Displays the total number of Access Point adoption licenses available to
controller or service platform connected Access Points within a cluster.
Cluster AAP Adoption
Licenses
Displays the current number of Adaptive Access Point adoption licenses
utilized by controller or service platform connected Access Points within a
cluster.
Cluster Total AAP
Licenses
Displays the total number of Adaptive Access Point adoption licenses
available to controller or service platform connected Access Points within
a cluster.
6 The AP Licenses table provides the following information:
Cluster Maximum AP
Lists the maximum number of Access Points permitted in a cluster under
the terms of the current license.
7 The Featured Licenses area provides the following information:
Hostname
Displays the administrator assigned hostname of the controller, service
platform or Access Point whose potentially implemented a advanced
security, WIPS or Analytics feature licenses.
Wireless Controller and Service Platform System Reference Guide
15 - 11
Statistics
Advanced Security
Displays whether the separately licensed Advanced Security application is
installed for each hostname.
Hotspot Analytics
Displays whether a separately licensed Analytics application is installed
for supported NX9500 and NX9510 service platforms.
8 Select the Details tab.
Refer to the Details screen to further assess the total number of cluster member licenses available, cluster
memberships, current utilization versus total licenses available, borrowed licenses, remaining licenses and
license validity.
9 Refer to the following license utilization data:
Cluster/Hostname
Lists the administrator assigned cluster hostname whose license
count and utilization is listed and tallied for member controllers,
service platforms or Access Points.
AP Licenses Installed
Lists the number of Access Point connections available to this
controller or service or peer Access Point under the terms of the
current license.
Borrowed AP Licenses
Displays the number of Access Point licenses temporarily borrowed
from a cluster member to compensate for an AP license deficiency.
Total AP Licenses
Displays the total number of Access Point connection licenses
currently available to clustered devices.
AP Licenses Usage
Lists the number of Access Point connections currently utilized out of
the total available under the terms of current licenses.
Remaining AP Licenses
Lists the remaining number of AP licenses available from the pooled
license capabilities of cluster members.
AAP Licenses Installed
Lists the number of Adaptive Access Point connections available
under the terms of current licenses.
Borrowed AAP Licenses
Displays the number of Adaptive Access Point licenses temporarily
borrowed from a cluster member to compensate for an AAP license
deficiency.
Total AAP Licenses
Displays the total number of Adaptive Access Point connection
licenses currently available to clustered devices.
AAP Licenses Usage
Lists the number of Adaptive Access Point connections currently
utilized out of the total available under the terms of the current
licenses.
Remaining AAP Licenses
Lists the remaining number of AAP licenses available from the pooled
license capabilities of all the members of the cluster.
Validity
Displays validity information for the license’s legal usage by cluster
member devices.
Refresh
Select Refresh to update the screen’s statistics counters to their latest
values.
15.1.8 WIPS Summary
System Statistics
The Wireless Intrusion Protection System (WIPS) provides continuous protection against wireless threats and acts
as an additional layer of security complementing wireless VPNs and existing encryption and authentication
policies. Controllers and service platforms support WIPS through the use of dedicated sensor devices, designed to
Wireless Controller and Service Platform System Reference Guide
15 - 12
Statistics
actively detect and locate unauthorized AP devices. After detection, they use mitigation techniques to block
devices using manual termination, air lockdown or port suppression.
The WIPS Summary screen lists RF Domains residing in the system and reports the number of unauthorized and
interfering devices contributing to the potential poor performance of the RF Domain’s network traffic. Additionally,
the number of WIPS events reported by each RF Domain is also listed to help an administrator better mitigate
risks to the network.
To review and assess the impact of rogue and interfering Access Points, as well as the occurrence of WIPS events
within the controller or service platform’s managed system:
Select the Statistics menu from the Web UI.
2 Select the System node from the left navigation pane.
3 Select WIPS Summary from the left-hand side of the UI.
Figure 15-8 System - WIPS Summary screen
4 Refer to the following WIPS data reported for each RF Domain in the system:
RF Domain
Lists the RF Domain within the system reporting rogue and
interfering Access Point event counts. Use this information to assess
whether a particular RF Domain is reporting an excessive number of
events or a large number of potentially invasive rogue Access Points
versus the other RF Domains within the controller, service platform or
Access Point managed system.
Number of Rogue APs
Displays the number of unsanctioned devices in each listed RF
Domain. Unsanctioned devices are those devices detected within the
listed RF Domain, but have not been deployed by a administrator as
a known and approved controller or service platform managed
device.
Wireless Controller and Service Platform System Reference Guide
15 - 13
Statistics
Number of Interfering
APs
Displays the number of devices exceeding the interference threshold
in each listed RF Domain. Each RF Domain utilizes a WIPS policy with
a set interference threshold (from -100 to -10 dBm). When a device
exceeds this noise value, its defined as an interfering Access Point
capable of disrupting the signal quality of other sanctioned devices
operating below an approved RSSI maximum value.
Number of WIPS Events
Lists the number of devices triggering a WIPS event within each
listed RF Domain.Each RF Domain utilizes a WIPS policy where
excessive, MU and AP events can have their individual values set for
event generation. An administrator can enable or disable the filtering
of each listed event and set the thresholds required for the
generation of the event notification and filtering action.
5 Select the WIPS Report button to launch a sub-screen to filter how WIPS reports are generated for the system.
Figure 15-9 System - WIPS Summary screen
Select Summary to capture all WIPS data or just select Only Rogue APs, Only Interferer APs for All APs to
refine event reporting to a specific type of WIPS activity. Select Generate Report to compile and archive the
results of the query.
6 Select Refresh to update the screen’s statistics counters to their latest values.
15.2 RF Domain Statistics
Statistics
The RF Domain screens display status for a selected RF domain. This includes the RF Domain health and device
inventory, wireless clients and Smart RF functionality. RF Domains allow administrators to assign regional,
regulatory and RF configuration to devices deployed in a common coverage area such as on a building floor, or
site. Each RF Domain contains regional, regulatory and sensor server configuration parameters and may also be
assigned policies that determine Access, SMART RF and WIPS configuration.
Use the following information to obtain an overall view of the performance of the selected RF Domain and
troubleshoot issues with the domain or any member device.
• Health
• Inventory
• Devices
• AP Detection
• Wireless Clients
• Device Upgrade
• Wireless LANs
Wireless Controller and Service Platform System Reference Guide
15 - 14
Statistics
•
•
•
•
•
•
•
•
•
•
Radios
Bluetooth
Mesh
Mesh Point
SMART RF
WIPS
Captive Portal
Application Visibility (AVC)
Coverage Hole Summary
Coverage Hole Details
15.2.1 Health
RF Domain Statistics
The Health screen displays general status information for a selected RF Domain, including data polled from all its
members.
To display the health of a controller or service platform’s RF Domain:
Select the Statistics menu from the Web UI.
2 Select a RF Domain from under the System node on the top, left-hand side, of the screen.
3 Select Health from the RF Domain menu.
Wireless Controller and Service Platform System Reference Guide
15 - 15
Statistics
Figure 15-10 RF Domain - Health screen
4 The Domain field displays the name of the RF Domain manager. The RF Domain manager is the focal point for
the radio system and acts as a central registry of applications, hardware and capabilities. It also serves as a
mount point for all the different pieces of the hardware system file.
5 The Devices field displays the total number of online versus offline devices in the RF Domain, and an exploded
pie chart depicts their status.
6 The Radio Quality field displays information on the RF Domain’s RF quality. The RF quality index is the overall
effectiveness of the RF environment as a percentage of the connect rate in both directions, as well as the retry
and error rate. This area also lists the worst 5 performing radios in the RF Domain.
The RF Quality Index can be interpreted as:
• 0-20 – Very poor quality
• 20-40 – Poor quality
• 40-60 – Average quality
• 60-100 – Good quality
Wireless Controller and Service Platform System Reference Guide
15 - 16
Statistics
7 Refer to the Radio Quality table for RF Domain member radios requiring administration to improve
performance:
Worst 5 Radios
Displays five radios with the lowest average quality in the RF Domain.
Radio ID
Lists each radio’s administrator defined hostname and its radio
designation (radio 1, radio 2 or radio 3).
Radio Type
Displays the radio type as either 5 GHz or 2.4 GHz.
8 Refer to the Client Quality table for RF Domain connected clients requiring administration to improve
performance:
Worst 5 Clients
Displays the five clients having the lowest average quality indices.
Client MAC
Displays the hardcoded radio MAC of the wireless client.
Vendor
Displays the vendor name of the wireless client.
9 Refer to the WLAN Utilization field to assess the following:
Total WLANs
Displays the total number of WLANs managed by RF Domain member
Access Points.
Top 5
Displays the five RF Domain utilized WLANs with the highest average
quality indices.
WLAN Name
Displays the WLAN Name for each of the Top 5 WLANs in the Access
Point RF Domain.
SSID
Lists the SSD utilized by each listed top 5 performing RF Domain
WLANs.
10 The Radio Traffic Utilization area displays the following:
Max. User Rate
Displays the maximum recorded user rate in kbps.
Top 5 Radios
Displays five radios with the best average quality in the RF Domain.
Radio ID
Lists each radio’s administrator defined hostname and its radio
designation (radio 1, radio 2 or radio 3).
Radio Type
Displays the radio type as either 5 GHz or 2.4 GHz.
11 Refer to the Client Traffic Utilization table:
Top 5 Clients
Displays the five clients having the highest average quality indices.
Client MAC
Displays the client’s hardcoded MAC address used a hardware
identifier.
Vendor
Lists each client’s manufacturer.
12 The Wireless Security area indicates the security of the transmission between WLANs and the wireless clients
they support. This value indicates the vulnerability of the WLANs.
RF Domain Threat Level Indicates the threat from the wireless clients trying to find network
vulnerabilities within the Access Point RF Domain. The threat level is
represented by an integer.
Wireless Controller and Service Platform System Reference Guide
15 - 17
Statistics
Rogue APs
Lists the number of unauthorized Access Points detected by RF
Domain member devices.
WIPS Events
Lists the number of WIPS events generated by RF Domain member
devices.
13 The Traffic Statistics statistics table displays the following information for transmitted and received packets:
Total Bytes
Displays the total bytes of data transmitted and received within the
Access Point RF Domain.
Total Packets
Lists the total number of data packets transmitted and received within
the Access Point RF Domain.
User Data Rate
Lists the average user data rate within the Access Point RF Domain.
Bcast/Mcast Packets
Displays the total number of broadcast/multicast packets transmitted
and received within the Access Point RF Domain.
Management Packets
This is the total number of management packets processed within the
Access Point RF Domain.
Tx Dropped Packets
Lists total number of dropped data packets within the Access Point RF
Domain.
Rx Errors
Displays the number of errors encountered during data transmission
within the Access Point RF Domain. The higher the error rate, the less
reliable the connection or data transfer.
14 The SMART RF Activity area displays the following:
Time Period
Lists the time period when Smart RF calibrations or adjustments were
made to compensate for radio coverage holes or interference.
Power Changes
Displays the total number of radio transmit power changes that have
been made using SMART RF within the Access Point RF Domain.
Channel Changes
Displays the total number of radio transmit channel changes that have
been made using SMART RF within the Access Point RF Domain.
Coverage Changes
Displays the total number of radio coverage area changes that have
been made using SMART RF within the Access Point RF Domain.
15.2.2 Inventory
RF Domain Statistics
The Inventory screen displays an inventory of RF Domain member Access Points, connected wireless clients,
wireless LAN utilization and radio availability.
To display RF Domain inventory statistics:
Select the Statistics menu from the Web UI.
2 Select a RF Domain from under the System node on the top, left-hand side, of the screen.
3 Select Inventory from the RF Domain menu.
Wireless Controller and Service Platform System Reference Guide
15 - 18
Statistics
Figure 15-11 RF Domain - Inventory screen
4 The Device Types table displays the total members in the RF Domain. The exploded pie chart depicts the
distribution of RF Domain members by controller and Access Point model type.
5 The Radios by Band field displays the total number of radios using 802.11an and 802.11bgn bands within the RF
Domain. The number of radios designated as sensors is also represented.
6 The Radios by Channel field displays the radio channels utilized by RF Domain member devices in two separate
charts. One chart displays for 5 GHz channels and the other for 2.4 GHz channels.
7 The Top 5 Radios by Clients table displays the highest 5 performing wireless clients connected to RF Domain
members.
Total Wireless Clients
Displays the total number of clients connected to RF Domain
members.
AP Name
Displays the clients connected and reporting Access Point. The name
displays as a link that can be selected to display Access Point data in
greater detail.
Wireless Controller and Service Platform System Reference Guide
15 - 19
Statistics
Client Count
List the number of connected clients to each listed RF Domain
member Access Point.
Radio Id
Lists each radio’s administrator defined hostname and its radio
designation (radio 1, radio 2 etc.). The name displays as a link that can
be selected to display Access Point data in greater detail.
Radio Band
Lists each client’s operational radio band.
Location
Displays system assigned deployment location for the client.
8 Refer to the WLANs table to review RF Domain WLAN, radio and client utilization. Use this information to help
determine whether the WLANs within this RF Domain have an optimal radio and client utilization.
9 The Clients by Band bar graph displays the total number of RF Domain member clients by their IEEE 802.11
radio type.
10 The Clients by Channel pie charts displays the channels used by RF Domain member clients using 5GHz and
2.4GHz radios.
11 Periodically select Refresh to update the contents of the screen to their latest values.
15.2.3 Devices
RF Domain Statistics
The Devices screen displays RF Domain member hardware data, connected client counts, radio data and network
IP address.
To display RF Domain member device statistics:
Select the Statistics menu from the Web UI.
2 Select a RF Domain from under the System node on the top, left-hand side, of the screen.
3 Select Devices from the RF Domain menu.
Wireless Controller and Service Platform System Reference Guide
15 - 20
Statistics
Figure 15-12 RF Domain - Devices screen
Device
Displays the system assigned name of each device that’s a member of
the RF Domain. The name displays as a link that can be selected to
display configuration and network address information in greater
detail.
AP MAC Address
Displays each device’s factory encoded MAC address as its hardware
identifier.
Type
Displays each device model within the selected RF Domain.
Client Count
Displays the number of clients connected with each listed device.
Supported Access Point models support up to 256 clients per Access
Point, with the exception of AP6521 model, which only supports 128.
Radio Count
Displays the number of radios on each listed device.
IP Address
Displays the IP address each listed device is using as a network
identifier.
Refresh
Select the Refresh button to update the statistics counters to their
latest values.
15.2.4 AP Detection
RF Domain Statistics
The AP Detection screen displays information about detected Access Points that are not members of a RF Domain.
They could be authorized devices or potential rogue devices.
To view device information on detected Access Points:
Select the Statistics menu from the Web UI.
2 Select a RF Domain from under the System node on the top, left-hand side, of the screen.
3 Select AP Detection from the RF Domain menu.
Wireless Controller and Service Platform System Reference Guide
15 - 21
Statistics
Figure 15-13 RF Domain - AP Detection screen
The AP Detection screen displays the following:
MAC Address
Displays the hardware encoded MAC address of each listed Access
Point detected by a RF Domain member device. The MAC address is
set at the factory and cannot be modified via the management
software. The MAC address displays as a link that can be selected to
display RF Domain member device information in greater detail.
Channel
Displays the channel of operation used by the detected Access Point.
The channel must be utilized by both the Access Point and its
connected client and be approved for the target deployment country.
SSID
Displays the Service Set ID (SSID) of the network to which the
detected Access Point belongs.
First Seen
Provides a timestamp when the detected Access Point was first
detected by a RF Domain member device.
Top Reporter Hostname Lists the administrator assigned hostname of the top performing RF
Domain member detecting the listed Access Point MAC address.
Consider this top performer the best resource for information on the
detected Access Point and its potential threat.
Vendor
Lists the manufacturer of the detected Access Point as an additional
means of assessing its potential threat to the members of this RF
Domain and its potential for interoperability with RF Domain device
members.
VLAN
Lists the numeric VLAN ID (virtual interface) the detected Access
Point was detected on by members of this RF Domain.
RSSI
Displays the Received Signal Strength Indicator (RSSI) of the detected
Access Point. Use this variable to help determine whether a device
connection would improve network coverage or add noise.
Is Interferer
Lists whether the detected device exceeds the administrator defined
RSSI threshold (from -100 to -10 dBm) determining whether a
detected Access Point is classified as an interferer.
Wireless Controller and Service Platform System Reference Guide
15 - 22
Statistics
Is Rogue
Displays whether the detected device has been classified as a rogue
device whose detection threatens the interoperation of RF Domain
member devices.
Termination Active
Lists whether Air Termination is active and applied to the detected
Access Point. Air termination lets you terminate the connection
between your wireless LAN and any Access Point or client associated
with it. If the device is an Access Point, all clients dis-associated with
the Access Point. If the device is a client, its connection with the
Access Point is terminated. Air Termination is disabled by default.
Terminate
Select the Terminate button to remove the selected Access Point from
RF Domain membership.
Clear All
Select Clear All to reset the statistics counters to zero and begin a new
data collection.
WIPS Report
Select WIPS Report launch a subscreen to save a WIPS report (in PDF
format) to a specified location. This is a recommended practice to
capture RF Domain member Access Point client connection
terminations in a format that can be archived externally.
Refresh
Select the Refresh button to update the statistics counters to their
latest values.
15.2.5 Wireless Clients
RF Domain Statistics
The Wireless Clients screen displays device information for wireless clients connected to RF Domain member
Access Points. Review this content to determine whether a client should be removed from Access Point association
within the selected RF Domain.
To review a RF Domain’s connected wireless clients:
Select the Statistics menu from the Web UI.
2 Select a RF Domain from under the System node on the top, left-hand side, of the screen.
3 Select Wireless Clients from the RF Domain menu.
Wireless Controller and Service Platform System Reference Guide
15 - 23
Statistics
Figure 15-14 RF Domain - Wireless Clients screen
The Wireless Clients screen displays the following:
MAC Address
Displays the hostname (MAC address) of each listed wireless client. This
address is hard-coded at the factory and can not be modified. The address
displays as a link that can be selected to display RF Domain member
device and network address information in greater detail.
IP Address
Displays the current IP address the wireless client is using for a network
identifier.
IPv6 Address
Displays the current IPv6 formatted IP address a listed wireless client is
using as a network identifier. IPv6 is the latest revision of the Internet
Protocol (IP) designed to replace IPv4. IPv6 addresses are composed of
eight groups of four hexadecimal digits separated by colons.
Hostname
Displays the unique administrator assigned hostname when the client’s
configuration was originally set.
Role
Lists the role assigned to each controller, service platform or Access Point
managed client.
Client Identity
Lists the client’s operating system vendor identity (Android, Windows etc.)
Vendor
Displays the vendor (or manufacturer) of the wireless client.
Band
Lists the 2.4 or 5 GHz radio band the listed client is currently utilizing with
its connected Access Point, controller or service platform within the RF
Domain.
AP Hostname
Displays the administrator assigned hostname of the Access Point to which
the client is connected.
Radio MAC
Lists the hardware encoded MAC address of the Access Point radio to
which the client is currently connected within the RF Domain.
WLAN
Displays the name of the WLAN the wireless client is currently using for its
interoperation within the RF Domain.
Wireless Controller and Service Platform System Reference Guide
15 - 24
Statistics
VLAN
Displays the VLAN ID the client’s connected Access Point has defined for
use as a virtual interface.
Last Active
Displays the time when this wireless client was last detected by a RF
Domain member.
RF Domain Name
Lists each client’s RF Domain membership as defined by its connected
Access Point and associated controller or service platform.
Disconnect All
Clients
Select the Disconnect All Clients button to terminate each listed client’s
connection and RF Domain membership.
Disconnect Client
Select a specific client MAC address and select the Disconnect Client
button to terminate this client’s connection and RF Domain membership.
Refresh
Select the Refresh button to update the statistics counters to their latest
values.
15.2.6 Device Upgrade
RF Domain Statistics
The Device Upgrade screen reports information about devices receiving updates the RF Domain member
provisioning the device. Use this screen to assess version data and upgrade status.
To view wireless device upgrade data for RF Domain members:
Select the Statistics menu from the Web UI.
2 Select a RF Domain from under the System node on the top, left-hand side, of the screen.
3 Select Device Upgrade from the RF Domain menu.
Figure 15-15 RF Domain - Device Upgrade screen
The Device Upgrade screen displays the following for RF Domain member devices:
Upgraded By
Lists the name of the device performing an update on behalf of a RF
Domain member peer device.
Wireless Controller and Service Platform System Reference Guide
15 - 25
Statistics
Type
Displays the model of the device receiving an update. An updating Access
Point must be of the same model as the Access point receiving the
update.
Device Hostname
Lists the administrator assigned hostname of each device receiving an
update from a RF Domain member.
History Id
Lists the RF Domain member device’s MAC address along with a history ID
appended to it for each upgrade operation.
Last Update Status
Displays the last status message from the RF Domain member device
performing the upgrade operation.
Time Last Upgrade
Displays a timestamp for the last successful upgrade.
Retries Count
Lists the number of retries needed for each listed RF Domain member
update operation.
State
Lists whether the upgrade operation is completed, in-progress, failed or
whether an update was made without a device reboot.
Clear History
Select Clear History to remove the upgrade records for RF Domain
member devices. Unlike the Refresh function (that updates existing data),
Clear History removes the update record from the screen.
Refresh
Select the Refresh button to update the statistics counters to their latest
values.
15.2.7 Wireless LANs
RF Domain Statistics
The Wireless LANs screen displays the name, network identification and radio quality information for the WLANs
currently being utilized by RF Domain members.
To view wireless LAN statistics for RF Domain members:
Select the Statistics menu from the Web UI.
2 Select a RF Domain from under the System node on the top, left-hand side, of the screen.
3 Select Wireless LANs from the RF Domain menu.
Wireless Controller and Service Platform System Reference Guide
15 - 26
Statistics
Figure 15-16 RF Domain - Wireless LANs screen
The Wireless LANs screen displays the following:
WLAN Name
Displays the name assigned to each WLAN upon its creation within the
controller or service platform managed network.
SSID
Displays the Service Set ID (SSID) assigned to the WLAN upon its creation
within the controller or service platform managed network.
Traffic Index
Displays the traffic utilization index of each listed WLAN, which measures
how efficiently the traffic medium is used. It’s defined as the percentage of
current throughput relative to the maximum possible throughput. Traffic
indices are: 0 – 20 (very low utilization), 20 – 40 (low utilization), 40 – 60
(moderate utilization), and 60 and above (high utilization).
Radio Count
Displays the number of radios deployed in each listed WLAN by RF
Domain member devices.
Tx Bytes
Displays the average number of packets (in bytes) sent on each listed RF
Domain member WLAN.
Tx User Data Rate
Displays the average data rate per user for packets transmitted on each
listed RF Domain member WLAN.
Rx Bytes
Displays the average number of packets (in bytes) received on each listed
RF Domain member WLAN.
Rx User Data Rate
Displays the average data rate per user for packets received on each listed
RF Domain member WLAN.
Disconnect All
Clients
Select the Disconnect All Clients button to terminate each listed client’s
WLAN membership from this RF Domain.
Refresh
Select the Refresh button to update the statistics counters to their latest
values.
Wireless Controller and Service Platform System Reference Guide
15 - 27
Statistics
15.2.8 Radios
RF Domain Statistics
The Radio screens displays information on RF Domain member Access Point radios. Use these screens to
troubleshooting radio issues negatively impacting RF Domain performance.
For more information, refer to the following:
• Status
• RF Statistics
• Traffic Statistics
15.2.8.1 Status
To view the RF Domain radio statistics:
Select the Statistics menu from the Web UI.
2 Select a RF Domain from under the System node on the top, left-hand side, of the screen.
3 Expand Radios from the RF Domain menu and select Status.
Figure 15-17 RF Domain - Radio Status screen
The Radio Status screen displays the following:
Radio
Displays the name assigned to each listed RF Domain member Access
Point radio. Each name displays as a link that can be selected to display
radio information in greater detail.
Radio MAC
Displays the MAC address as a numerical value factory hardcoded to each
listed RF Domain member Access Point radio.
Radio Type
Defines whether the radio is operating within the 2.4 or 5 GHz radio band.
Access Point
Displays the user assigned name of the RF Domain member Access Point
to which the radio resides.
AP Type
Lists the model type of each RF Domain member Access Point.
State
Displays the radio’s current operational state.
Wireless Controller and Service Platform System Reference Guide
15 - 28
Statistics
Channel Current
(Config)
Displays the current channel each listed RF Domain member Access Point
radio is broadcasting on.
Power Current
(Config)
Displays the current power level the radio is using for its transmissions.
Clients
Displays the number of clients currently connected to each listed RF
Domain member Access Point radio. Supported models can manage up to
256 clients per radio.
Refresh
Select the Refresh button to update the statistics counters to their latest
values.
15.2.8.2 RF Statistics
To view the RF Domain radio statistics:
Select the Statistics menu from the Web UI.
2 Select a RF Domain from under the System node on the top, left-hand side, of the screen.
3 Expand Radios from the RF Domain menu and select RF Statistics.
Figure 15-18 RF Domain - Radio RF Statistics screen
The RF Statistics screen displays the following:
Radio
Displays the name assigned to each listed RF Domain member radio. Each
name displays as a link that can be selected to display radio information in
greater detail.
Signal
Displays the power of listed RF Domain member radio signals in dBm.
Noise
Lists the level of noise (in - X dbm format) reported by each listed RF
Domain member Access Point.
SNR
Displays the signal to noise ratio (SNR) of each listed RF Domain member
radio.
Tx Physical Layer
Rate
Displays the data transmit rate for each RF Domain member radio’s
physical layer. The rate is displayed in Mbps.
Wireless Controller and Service Platform System Reference Guide
15 - 29
Statistics
Rx Physical Layer
Rate
Displays the data receive rate for each RF Domain member radio’s physical
layer. The rate is displayed in Mbps.
Avg Retry Number
Displays the average number of retries for each RF Domain member radio.
Error Rate
Displays the average number of retries per packet. A high number
indicates possible network or hardware problems.
RF Quality Index
Displays an integer (and performance icon) that indicates the overall RF
performance for each listed radio. The RF quality indices are:
0 – 50 (Poor)
50 – 75 (Medium)
75 – 100 (Good)
Refresh
Select the Refresh button to update the statistics counters to their latest
values.
15.2.8.3 Traffic Statistics
The Traffic Statistics screen displays transmit and receive data as well as data rate and packet drop and error
information for RF Domain member radios. Individual RF Domain member radios can be selected and to
information specific to that radio as troubleshoot requirements dictate.
Select the Statistics menu from the Web UI.
2 Select a RF Domain from under the System node on the top, left-hand side, of the screen.
3 Expand Radios from the RF Domain menu and select Traffic Statistics.
Figure 15-19 RF Domain - Radio Traffic Statistics screen
The Radio Traffic screen displays the following:
Radio
Displays the name assigned to each listed RF Domain member Access
Point radio. Each name displays as a link that can be selected to display
radio information in greater detail.
Wireless Controller and Service Platform System Reference Guide
15 - 30
Statistics
Tx Bytes
Displays the total number of bytes transmitted by each RF Domain
member Access Point radio. This includes all user data as well as any
management overhead data.
Rx Bytes
Displays the total number of bytes received by each RF Domain member
Access Point radio. This includes all user data as well as any management
overhead data.
Tx Packets
Displays the total number of packets transmitted by each RF Domain
member Access Point radio. This includes all user data as well as any
management overhead packets.
Rx Packets
Displays the total number of packets received by each RF Domain
member Access Point radio. This includes all user data as well as any
management overhead packets.
Tx User Data Rate
Displays the rate (in kbps) user data is transmitted by each RF Domain
member Access Point radio. This rate only applies to user data and does
not include any management overhead.
Rx User Data Rate
Displays the rate (in kbps) user data is received by each RF Domain
member Access Point radio. This rate only applies to user data and does
not include any management overhead.
Tx Dropped
Displays the total number of transmitted packets which have been
dropped by each RF Domain member Access Point radio. This includes all
user data as well as any management overhead packets that were
dropped.
Traffic Index
Displays the traffic utilization index of RF Domain member Access Point
radios, which measures how efficiently the traffic medium is utilized within
this RF Domain. It’s defined as the percentage of current throughput
relative to the maximum possible throughput. Traffic indices are: 0 – 20
(very low utilization), 20 – 40 (low utilization), 40 – 60 (moderate
utilization) and 60 and above (high utilization).
Refresh
Select the Refresh button to update the statistics counters to their latest
values.
15.2.9 Bluetooth
RF Domain Statistics
AP-8432 and AP-8533 model Access Points utilize a built in Bluetooth chip for specific Bluetooth functional
behaviors in a WiNG managed network. AP-8432 and AP-8533 models support both Bluetooth classic and
Bluetooth low energy technology. These platforms can use their Bluetooth classic enabled radio to sense other
Bluetooth enabled devices and report device data (MAC address, RSSI and device calls) to an ADSP server for
intrusion detection. If the device presence varies in an unexpected manner, ADSP can raise an alarm.
AP-8432 and AP-8533 model Access Points support Bluetooth beaconing to emit either iBeacon or EddystoneURL beacons. The Access Point’s Bluetooth radio sends non-connectable, undirected low-energy (LE)
advertisement packets on a periodic basis. These advertisement packets are short, and sent on Bluetooth
advertising channels that conform to already-established iBeacon and Eddystone-URL standards.
To view Bluetooth radio statistics for RF Domain member Access Points:
Select the Statistics menu from the Web UI.
2 Select a RF Domain from under the System node on the top, left-hand side, of the screen.
Wireless Controller and Service Platform System Reference Guide
15 - 31
Statistics
3 Select Bluetooth.
Figure 15-20 RF Domain - Bluetooth screen
The RF Domain Bluetooth screen displays the following:
Name
Lists the name of the Access Point’s Bluetooth radio.
Alias
If an alias has been defined for the Access Point its listed here. The
alias value is expressed in the form of :
B. If the administrator has defined a
hostname for the Access Point, it’s used in place of the Access Point’s
default hostname.
Radio State
Displays the current operational state (On/Off) of the Bluetooth radio.
Off Reason
If the Bluetooth radio is offline, this field states the reason.
Radio MAC
Lists the Bluetooth radio’s factory encoded MAC address serving as
this device’s hardware identifier on the network.
Hostname
Lists the hostname set for the Access Point as its network identifier.
Device MAC
Lists the Access Point’s factory encoded MAC address serving as this
device’s hardware identifier on the network.
AP Location
Lists the Access Point’s administrator assigned deployment location.
Radio Mode
Lists an Access Point’s Bluetooth radio functional mode as either btsensor or le-beacon.
Beacon Period
Lists the Bluetooth radio’s beacon transmission period from
100 -10,000 milliseconds.
Beacon Type
Lists the type of beacon currently configured.
Last Error
Lists descriptive text on any error that’s preventing the Bluetooth radio
from operating.
Refresh
Select Refresh to update the screen’s statistics counters to their latest
values.
Wireless Controller and Service Platform System Reference Guide
15 - 32
Statistics
15.2.10 Mesh
RF Domain Statistics
Mesh networking enables users to wirelessly access broadband applications anywhere (even in a moving vehicle).
Initially developed for secure and reliable military battlefield communications, mesh technology supports public
safety, public access and public works. Mesh technology reduces the expense of wide-scale networks, by
leveraging Wi-Fi enabled devices already deployed.
To view Mesh statistics for RF Domain member Access Point and their connected clients:
Select the Statistics menu from the Web UI.
2 Select a RF Domain from under the System node on the top, left-hand side, of the screen.
3 Select Mesh.
Figure 15-21 RF Domain - Mesh screen
The RF Domain Mesh screen displays the following:
Client
Displays the configured hostname for each mesh client connected to a
RF Domain member Access Point.
Client Radio MAC
Displays the hardware encoded MAC address for each mesh client
connected to a RF Domain member Access Point.
Portal
Displays a numerical portal Index ID for the each mesh client
connected to a RF Domain member Access Point.
Portal Radio MAC
Displays the hardware encoded MAC address for each radio in the RF
Domain mesh network.
Connect Time
Displays the total connection time for each listed client in the RF
Domain mesh network.
Refresh
Select the Refresh button to update the statistics counters to their
latest values.
Wireless Controller and Service Platform System Reference Guide
15 - 33
Statistics
15.2.11 Mesh Point
RF Domain Statistics
To view Mesh Point statistics for RF Domain member Access Point and their connected clients:
Select the Statistics menu from the Web UI.
2 Select a RF Domain from under the System node on the top, left-hand side, of the screen.
3 Select Mesh Point.
The MCX Geographical View displays by default.
Figure 15-22 RF Domain - Mesh Point MCX Geographical View screen
The MCX Geographical View screen displays a map where icons of each device in the RF Domain are overlaid.
This provides a geographical overview of the location of each RF Domain member device.
4 Use the N, W, S and E buttons to move the map in the North, West, South and East directions respectively. The
slider next to these buttons enables zooming in and out of the view. The available fixed zoom levels are World,
Country, State, Town, Street and House.
5 Use the Maximize button to maximize this view to occupy the complete screen. Use the Refresh button to
update the status of the screen.
6 Select the MCX Logical View tab to view a logical representation of the Meshpoint.
Wireless Controller and Service Platform System Reference Guide
15 - 34
Statistics
Figure 15-23 RF Domain - Mesh Point MCX Logical View screen
The Concentric and hierarchical buttons define how the mesh point is displayed in the MCX Logical View
screen. In the Concentric mode, the mesh is displayed as a concentric arrangement of devices with the root
mesh at the centre and the other mesh device arranged around it.
In the hierarchical arrangement, the root node of the mesh is displayed at the top of the mesh tree and the
relationship of the mesh nodes are displayed as such.
Use the Meshpoint Name drop down to select a mesh point to see the graphical representation of that mesh
point. The view can further be filtered based on the values Neighbor or Path selected in the Meshpoint View
field.
7 Select the Device Type tab.
Wireless Controller and Service Platform System Reference Guide
15 - 35
Statistics
Figure 15-24 RF Domain - Mesh Point Device Type screen
The Root field displays the Mesh ID and MAC Address of the configured root mesh points in the RF Domain.
8 The Non Root field displays the Mesh ID and MAC Address of all configured non-root mesh points in the RF
Domain. displays the Mesh ID and MAC Address of all configured non-root mesh points in the RF Domain.
9 The Mesh Point Details field on the bottom portion of the screen displays tabs for General, Path, Root, Multicast
Path, Neighbors, Security and Proxy. Refer to the following:
The General tab displays the following:
Mesh Point Name
Displays the name of each configured mesh point in the RF Domain.
MAC
Displays the MAC Address of each configured mesh point in the RF
Domain.
Hostname
Displays the administrator assigned hostname for each configured
mesh point in the RF Domain.
Configured As Root
Indicates whether a mesh point is configured to act as a root device.
(Yes/No).
Is Root
A root mesh point is defined as a mesh point connected to the WAN
and provides a wired backhaul to the network (Yes/No).
Wireless Controller and Service Platform System Reference Guide
15 - 36
Statistics
Meshpoint Identifier
The MP identifier is used to distinguish between other mesh points
both on the same device and on other devices. This is used by a user
to setup the preferred root configuration.
Interface ID
The IFID uniquely identifies an interface associated with the MPID.
Each mesh point on a device can be associated with one or more
interfaces.
Radio Interface
Uniquely identifies the radio interface on which the Mesh Point
operates.
Next Hop IFID
Lists the ID of the interface on which the next hop for the mesh
network can be found.
Next Hops Use Time
Lists the time when the next hop in the mesh network topology was
last utilized.
Root Hops
Number of hops to a root and should not exceed 4 in general practice.
If using the same interface to both transmit and receive, then you will
get approximately half the performance every additional hop out.
Root MP ID
Displays the ID of the root device for this mesh point.
Root Bound Time
Displays the duration this mesh point has been connected to the mesh
root.
IFID Count
Displays the number of Interface IDs (IFIDs) associated with all the
configured mesh points in the RF Domain.
The Path tab displays the following:
Mesh Point Name
Displays the name of each configured mesh point in the RF Domain.
Meshpoint Identifier
The identifier is used to distinguish between other mesh points both
on the same device and on other devices. This is used by a user to
setup the preferred root configuration.
Destination Addr
The destination is the endpoint of mesh path. It may be a MAC
address or a mesh point ID.
Next Hop IFID
The Interface ID of the mesh point that traffic is being directed to.
Is Root
A root mesh point is defined as a mesh point that is connected to the
WAN and provides a wired backhaul to the network (Yes/No).
MiNT ID
Displays the MiNT Protocol ID for the global mint area identifier. This
area identifier separates two overlapping mint networks and need only
be configured if the administrator has two mint networks that share
the same packet broadcast domain.
Hops
Number of hops to a root and should not exceed 4 in general practice.
If using the same interface to both transmit and receive, then you will
get approximately half the performance every additional hop out.
Mobility
Displays whether the mesh point is a mobile or static node. Displays
True when the device is mobile and False when the device is not
mobile.
Metric
A measure of the quality of the path. A lower value indicates a better
path.
State
Indicates whether the path is currently Valid of Invalid.
Binding
Indicates whether the path is bound or unbound.
Wireless Controller and Service Platform System Reference Guide
15 - 37
Statistics
Timeout
The timeout interval in mili-seconds. The interpretation this value will
vary depending on the value of the state.
Sequence
The sequence number also known as the destination sequence
number. It is updated whenever a mesh point receives new
information about the sequence number from RREQ, RREP, or RERR
messages that may be received related to that destination.
The Root tab displays the following:
Mesh Point Name
Displays the name of each configured mesh point in the RF Domain.
Recommended
Displays the root that is recommended by the mesh routing layer.
Root MPID
The MP identifier is used to distinguish between other mesh points
both on the same device and on other devices. This is used by a user
to setup the preferred root configuration.
Next Hop IFID
The IFID of the next hop. The IFID is the MAC Address on the
destination device.
Radio Interface
This indicates the interface that is used by the device to communicate
with this neighbor. The values are 2.4 and 5.8, indicating the frequency
of the radio that is used to communicate with the neighbor.
Bound
Indicates whether the root is bound or unbound.
Metric
Displays the computed path metric between the neighbor and their
root mesh point.
Interface Bias
This field lists any bias applied because of the Preferred Root Interface
Index.
Neighbor Bias
This field lists any bias applied because of the Preferred Root NextHop Neighbor IFID.
Root Bias
This field lists any bias applied because of the Preferred Root MPID.
The Multicast Path tab displays the following:
Mesh Point Name
Displays the name of each configured mesh point in the RF Domain.
Subscriber Name
The identifier is used to distinguish between other mesh points both
on the same device and on other devices. This is used by a user to
setup the preferred root configuration.
Subscriber MPID
Lists the subscriber ID to distinguish between other mesh point
neighbor devices in the RF Domain.
Group Address
Displays the MAC address used for the Group in the mesh point.
Timeout
The timeout interval in seconds. The interpretation this value will vary
depending on the value of the state. If the state is Init or In Progress,
the timeout duration has no significance. If the state is Enabled, the
timeout duration indicates the amount of time left before the security
validity check is initiated. If the state is Failed, the timeout duration is
the amount of time after which the system will retry.
The Neighbors tab displays the following:
Mesh Point Name
Displays the name of each configured mesh point in the RF Domain.
Wireless Controller and Service Platform System Reference Guide
15 - 38
Statistics
Destination Addr
Displays the MeshID (MAC Address) of each mesh point in the RF
Domain.
Neighbor MP ID
The MAC Address that the device uses to define the mesh point in the
device that the neighbor is a part of. It is used to distinguish the
device that is the neighbor.
Neighbor IFID
The MAC Address used by the interface on the neighbor device to
communicate with this device. This may define a particular radio or
Ethernet port that communicates with this device over the mesh.
Root MP ID
The MAC Address of the neighbor's root mesh point.
Is Root
A root mesh point is defined as a mesh point that is connected to the
WAN and provides a wired backhaul to the network. Yes if the mesh
point that is the neighbor is a root mesh point or No if the mesh point
that is the neighbor is not a root mesh point.
Mobility
Displays whether the Mesh Point is a mobile or static node. Displays
True when the device is mobile and False when the device is not
mobile.
Radio Interface
This indicates the interface that is used by the device to communicate
with this neighbor. The values are 2.4 and 5.8, indicating the frequency
of the radio that is used to communicate with the neighbor.
Mesh Root Hops
The number of devices between the neighbor and its root mesh point.
If the neighbor is a root mesh point, this value will be 0. If the
neighbor is not a root mesh point but it has a neighbor that is a root
mesh point, this value will be 1. Each mesh point between the
neighbor and its root mesh point is counted as 1 hop.
Resourced
Displays whether the mesh point has been resourced or not. The Mesh
Connex neighbor table can contain more neighbors than the AP
supports. If the neighbor is resourced, it will take away a one of the
resources for a wireless client device to be used for meshing. Displays
True when the device is resourced and False when the device is not.
Link Quality
An abstract value depicting the quality of the mesh link between the
device and the neighbor. The range is from 0 (weakest) to 100
(strongest).
Link Metric
This value shows the computed path metric from the device to the
neighbor mesh point using this interface. The lower the number the
better the possibility that the neighbor will be chosen as the path to
the root mesh point.
Root Metric
The computed path metric between the neighbor and their root mesh
point.
Wireless Controller and Service Platform System Reference Guide
15 - 39
Statistics
Rank
The rank is the level of importance and is used for automatic resource
management.
8 – The current next hop to the recommended root.
7 – Any secondary next hop to the recommended root to has a good
potential route metric.
6 – A next hop to an alternate root node.
5 – A downstream node currently hopping through to get to the root.
4 – A downstream node that could hop through to get to the root, but
is currently not hopping through any node (look at authentication, as
this might be an issue).
3 – A downstream node that is currently hopping through a different
node to get to the root, but could potentially have a better route
metric if it hopped through this node.
2 – Reserved for active peer to peer routes and is not currently used.
1 - A neighbor bound to the same recommended root but does not
have a potential route metric as good as the neighbors ranked 8 and 7.
0 – A neighbor bound to a different root node.
-1 – Not a member of the mesh as it has a different mesh ID.
All client devices hold a rank of 3 and can replace any mesh devices
lower than that rank.
Age
Displays the number of miliseconds since the mesh point last heard
from this neighbor.
The Security tab displays the following:
Mesh Point Name
Displays the name of each configured mesh point in the RF Domain.
Mesh Point Identifier
The destination is the endpoint of mesh path. It may be a MAC
address or a mesh point ID.
Radio Interface
This indicates the interface that is used by the device to communicate
with this neighbor. The values are 2.4 and 5.8, indicating the frequency
of the radio that is used to communicate with the neighbor.
Interface ID
The IFID uniquely identifies an interface associated with the MPID.
Each mesh point on a device can be associated with one or more
interfaces.
State
Displays the Link State for each mesh point:
Init - indicates the link has not been established or has expired.
Enabled - indicates the link is available for communication.
Failed - indicates the attempt to establish the link failed and cannot be
retried yet.
In Progress - indicates the link is being established but is not yet
available.
Timeout
Displays the maximum value in seconds that the link is allowed to stay
in the In Progress state before timing out.
Wireless Controller and Service Platform System Reference Guide
15 - 40
Statistics
Keep Alive
Yes indicates that the local MP will act as a supplicant to authenticate
the link and not let it expire (if possible). No indicates that the local
MP does not need the link and will let it expire if not maintained by
the remote MP.
The Proxy tab displays the following:
Mesh Point Name
Displays the name of each configured mesh point in the RF Domain.
Destination Addr
The destination is the endpoint of mesh path. It may be a MAC
address or a mesh point ID.
Proxy Address
Displays the MAC Address of the proxy used in the mesh point.
Age
Displays the age of the proxy connection for each of the mesh points
in the RF Domain.
Proxy Owner
The owner’s (MPID) is used to distinguish the neighbor device.
Persistence
Displays the persistence (duration) of the proxy connection for each of
the mesh points in the RF Domain.
VLAN
The VLAN ID used as a virtual interface with this proxy. A value of
4095 indicates that there is no VLAN ID.
10 Select the Device Brief Info tab from the top of the screen.
The Device Brief Info screen is divided into 2 fields, All Roots and Mesh Points and MeshPoint Details.
Wireless Controller and Service Platform System Reference Guide
15 - 41
Statistics
Figure 15-25 RF Domain - Mesh Point Device Brief Info screen
The All Roots and Mesh Points field displays the following:
MAC
Displays the MAC Address of each configured mesh point in the RF
Domain.
Mesh Point Name
Displays the name of each configured mesh point in the RF Domain.
Hostname
Displays the administrator assigned hostname for each configured
mesh point in the RF Domain.
Configured as Root
A root mesh point is defined as a mesh point connected to the WAN,
providing a wired backhaul to the network (Yes/No).
Is Root
Indicates whether the current mesh point is a root meshpoint (Yes/
No).
Destination Addr
The destination is the endpoint of mesh path. It may be a MAC
address or a mesh point ID.
Root Hops
The number of devices between the selected mesh point and the
destination device.
IFID Count
Displays the number of Interface IDs (IFIDs) associated with all the
configured mesh points in the RF Domain.
Wireless Controller and Service Platform System Reference Guide
15 - 42
Statistics
11 The MeshPoint Details field on the bottom portion of the screen displays tabs for General, Path, Root, Multicast
Path, Neighbors, Security and Proxy. Refer to the following:
The General tab displays the following:
Mesh Point Name
Displays the name of each configured mesh point in the RF Domain.
MAC
Displays the MAC Address of each configured mesh point in the RF
Domain.
Hostname
Displays the hostname for each configured mesh point in the RF
Domain.
Configured as Root
A root mesh point is defined as a mesh point that is connected to the
WAN and provides a wired backhaul to the network (Yes/No).
Is Root
A root mesh point is defined as a mesh point that is connected to the
WAN and provides a wired backhaul to the network (Yes/No).
Mesh Point Identifier
The destination is the endpoint of mesh path. It may be a MAC
address or a mesh point ID.
Next Hop IFID
Identifies the ID of the interface on which the next hop for the mesh
network can be found.
Next Hops Use Time
Lists the time when the next hop in the mesh network topology was
last utilized.
Root Hops
Number of hops to a root and should not exceed 4 in general practice.
If using the same interface to both transmit and receive, then you will
get approximately half the performance every additional hop out.
Root MP ID
Lists the interface ID of the interface on which the next hop for the
mesh network can be found.
Root Bound time
Displays the duration this mesh point has been connected to the mesh
root.
IFID Count
Displays the number of Interface IDs (IFIDs) associated with all the
configured mesh points in the RF Domain.
The Path tab displays the following:
Mesh Point Name
Displays the name of each configured mesh point in the RF Domain.
Destination Addr
The destination is the endpoint of mesh path. It may be a MAC address
or a mesh point ID.
Destination
The MAC Address used by the interface on the neighbor device to
communicate with this device. This may define a particular radio or
Ethernet port that communicates with this device over the mesh.
Is Root
A root mesh point is defined as a mesh point that is connected to the
WAN and provides a wired backhaul to the network (Yes/No).
MiNT ID
Displays the MiNT Protocol ID for the global mint area identifier. This
area identifier separates two overlapping mint networks and need only
be configured if the administrator has two mint networks that share
the same packet broadcast domain.
Next Hop IFID
The Interface ID of the mesh point that traffic is being directed to.
Hops
Number of hops to a root and should not exceed 4 in general practice.
If using the same interface to both transmit and receive, then you will
get approximately half the performance every additional hop out.
Wireless Controller and Service Platform System Reference Guide
15 - 43
Statistics
Mobility
Displays whether the mesh point is a mobile or static node. Displays
True when the device is mobile and False when the device is not
mobile.
Metric
A measure of the quality of the path. A lower value indicates a better
path.
State
Indicates whether the path is currently Valid of Invalid.
Binding
Indicates whether the path is bound or unbound.
Timeout
The timeout interval in seconds. The interpretation this value will vary
depending on the value of the state. If the state is Init or In Progress,
the timeout duration has no significance. If the state is Enabled, the
timeout duration indicates the amount of time left before the security
validity check is initiated. If the state is Failed, the timeout duration is
the amount of time after which the system will retry.
Sequence
The sequence number also known as the destination sequence
number. It is updated whenever a mesh point receives new information
about the sequence number from RREQ, RREP, or RERR messages
that may be received related to that destination.
The Root tab displays the following:
Mesh Point Name
Displays the name of each configured mesh point in the RF Domain.
Recommended
Displays the root that is recommended by the mesh routing layer.
Root MPID
The MP identifier is used to distinguish between other mesh points
both on the same device and on other devices. This is used by a user
to setup the preferred root configuration.
Next Hop IFID
The IFID of the next hop. The IFID is the MAC Address on the
destination device.
Radio Interface
This indicates the interface that is used by the device to communicate
with this neighbor. The values are 2.4 and 5.8, indicating the frequency
of the radio that is used to communicate with the neighbor.
Bound
Indicates whether the root is bound or unbound.
Metric
Displays the computed path metric between the neighbor and their
root mesh point.
Interface Bias
This field lists any bias applied because of the preferred root Interface
Index.
Neighbor Bias
This field lists any bias applied because of the preferred root next-hop
Neighbor IFID.
Root Bias
This field lists any bias applied because of the preferred root MPID.
The Multicast Path tab displays the following:
Mesh Point Name
Displays the name of each configured mesh point in the RF Domain.
Subscriber Name
Lists the subscriber name is used to distinguish between other mesh
point neighbors both on the same device and on other devices.
Subscriber MPID
Lists the subscriber ID to distinguish between other mesh point
neighbors both on the same device and on other devices.
Group Address
Displays the MAC address used for the Group in the mesh point.
Wireless Controller and Service Platform System Reference Guide
15 - 44
Statistics
Path Timeout
The timeout interval in seconds. The interpretation this value will vary
depending on the value of the state. If the state is Init or In Progress,
the timeout duration has no significance. If the state is Enabled, the
timeout duration indicates the amount of time left before the security
validity check is initiated. If the state is Failed, the timeout duration is
the amount of time after which the system will retry.
The Neighbors tab displays the following:
Mesh Point Name
Displays the name of each configured mesh point in the RF Domain.
Mesh Point Identifier
The destination is the endpoint of mesh path. It may be a MAC
address or a mesh point ID.
Neighbor MP ID
The MAC Address that the device uses to define the mesh point in the
device that the neighbor is a part of. It is used to distinguish the
device that is the neighbor.
Neighbor IFID
The MAC Address used by the interface on the neighbor device to
communicate with this device. This may define a particular radio or
Ethernet port that communicates with this device over the mesh.
Root MP ID
The mesh point ID of the neighbor's root mesh point.
Is Root
A root mesh point is defined as a mesh point that is connected to the
WAN and provides a wired backhaul to the network. Yes if the mesh
point that is the neighbor is a root mesh point or No if the mesh point
that is the neighbor is not a root mesh point.
Mobility
Displays whether the mesh point is a mobile or static node. Displays
True when the device is mobile and False when the device is not
mobile.
Radio Interface
This indicates the interface that is used by the device to communicate
with this neighbor. The values are 2.4 and 5.8, indicating the frequency
of the radio that is used to communicate with the neighbor.
Mesh Root Hops
The number of devices between the neighbor and its root mesh point.
If the neighbor is a root mesh point, this value will be 0. If the
neighbor is not a root mesh point but it has a neighbor that is a root
mesh point, this value will be 1. Each mesh point between the
neighbor and its root mesh point is counted as 1 hop.
Resourced
Displays whether the mesh point has been resourced or not. The Mesh
Connex neighbor table can contain more neighbors than the AP
supports. If the neighbor is resourced, it will take away a one of the
resources for a wireless client device to be used for meshing. Displays
True when the device is resourced and False when the device is not.
Link Quality
An abstract value depicting the quality of the mesh link between the
device and the neighbor. The range is from 0 (weakest) to 100
(strongest).
Link Metric
This value shows the computed path metric from the device to the
neighbor mesh point using this interface. The lower the number the
better the possibility that the neighbor will be chosen as the path to
the root mesh point.
Root Metric
The computed path metric between the neighbor and their root mesh
point.
Wireless Controller and Service Platform System Reference Guide
15 - 45
Statistics
Rank
The rank is the level of importance and is used for automatic resource
management.
8 – The current next hop to the recommended root.
7 – Any secondary next hop to the recommended root to has a good
potential route metric.
6 – A next hop to an alternate root node.
5 – A downstream node currently hopping through to get to the root.
4 – A downstream node that could hop through to get to the root, but
is currently not hopping through any node (look at authentication, as
this might be an issue).
3 – A downstream node that is currently hopping through a different
node to get to the root, but could potentially have a better route
metric if it hopped through this node.
2 – Reserved for active peer to peer routes and is not currently used.
1 - A neighbor bound to the same recommended root but does not
have a potential route metric as good as the neighbors ranked 8 and 7.
0 – A neighbor bound to a different root node.
-1 – Not a member of the mesh as it has a different mesh ID.
All client devices hold a rank of 3 and can replace any mesh devices
lower than that rank.
Age
Displays the number of miliseconds since the mesh point last heard
from this neighbor.
The Security tab displays the following:
Mesh Point Name
Displays the name of each configured mesh point in the RF Domain.
Mesh Point Identifier
The destination is the endpoint of mesh path. It may be a MAC
address or a mesh point ID.
Radio Interface
This indicates the interface that is used by the device to communicate
with this neighbor. The values are 2.4 and 5.8, indicating the frequency
of the radio that is used to communicate with the neighbor.
Interface ID
The IFID uniquely identifies an interface associated with the MPID.
Each mesh point on a device can be associated with one or more
interfaces.
State
Displays the Link State for each mesh point:
Init - indicates the link has not been established or has expired.
Enabled - indicates the link is available for communication.
Failed - indicates the attempt to establish the link failed and cannot be
retried yet.
In Progress - indicates the link is being established but is not yet
available.
Timeout
Displays the maximum value in seconds that the link is allowed to stay
in the In Progress state before timing out.
Wireless Controller and Service Platform System Reference Guide
15 - 46
Statistics
Keep Alive
Yes indicates the local MP acts as a supplicant to authenticate the link
and not let it expire (if possible). No indicates that the local MP does
not need the link and will let it expire if not maintained by the remote
MP.
The Proxy tab displays the following:
Mesh Point Name
Displays the name of each configured mesh point in the RF Domain.
Mesh Point Identifier
The destination is the endpoint of mesh path. It may be a MAC
address or a mesh point ID.
Proxy Address
Displays the MAC Address of the proxy used in the mesh point.
Age
Displays the age of the proxy connection for each of the mesh points
in the RF Domain.
Proxy Owner
The owner (MPID) is used to distinguish the device that is the
neighbor.
VLAN
The VLAN ID used as a virtual interface with this proxy. A value of
4095 indicates that there is no VLAN ID.
12 Select Device Data Transmit.
Wireless Controller and Service Platform System Reference Guide
15 - 47
Statistics
Figure 15-26 RF Domain - Mesh Point Device Data Transmit screen
13 Review the following transmit and receive statistics for Mesh nodes:
Data Bytes (Bytes):
Transmitted Bytes
Displays the total amount of data, in Bytes, transmitted by mesh
points in the RF Domain.
Data Bytes (Bytes):
Received Bytes
Displays the total amount of data, in Bytes, received by mesh points in
the RF Domain.
Data Bytes (Bytes):
Total Bytes
Displays the total amount of data, in Bytes, transmitted and received
by mesh points in the RF Domain.
Data Packets
Throughput (Kbps):
Transmitted Packets
Displays the total amount of data, in packets, transmitted by mesh
points in the RF Domain.
Data Packets
Throughput (Kbps):
Received Packets
Displays the total amount of data, in packets, received by mesh points
in the RF Domain.
Data Packets
Throughput (Kbps):
Total Packets
Displays the total amount of data, in packets, transmitted and received
by mesh points in the RF Domain.
Wireless Controller and Service Platform System Reference Guide
15 - 48
Statistics
Data Rates (bps):
Transmit Data Rate
Displays the average data rate, in kbps, for all data transmitted by
mesh points in the RF Domain.
Data Rates (bps):
Receive Data Rate
Displays the average data rate, in kbps, for all data received by mesh
points in the RF Domain.
Data Rates (bps): Total
Data Rate
Displays the average data rate, in kbps, for all data transmitted and
received by mesh points in the RF Domain.
Packets Rate (pps):
Displays the average packet rate, in packets per second, for all data
Transmitting Packet rate transmitted and received by mesh points in the RF Domain.
Packets Rate (pps):
Received Packet rate
Displays the average packet rate, in packets per second, for all data
received and received by mesh points in the RF Domain.
Packets Rate (pps):
Total Packet Rate
Displays the average data packet rate, in packets per second, for all
data transmitted and received by mesh points in the RF Domain.
Data Packets Dropped
and Errors: Tx Dropped
Displays the total number of transmissions that were dropped mesh
points in the RF Domain.
Data Packets Dropped
and Errors: Rx Errors
Displays the total number of receive errors from mesh points in the RF
Domain.
Broadcast Packets: Tx
Bcast/Mcast Pkts
Displays the total number of broadcast and multicast packets
transmitted from mesh points in the RF Domain.
Broadcast Packets: Rx
Bcast/Mcast Pkts
Displays the total number of broadcast and multicast packets received
from mesh points in the RF Domain.
Broadcast Packets: Total Displays the total number of broadcast and multicast packets
Bcast/Mcast Pkts
transmitted and received from mesh points in the RF Domain.
Management Packets:
Displays the total number of management packets transmitted
Transmitted by the node through the mesh point node.
Management Packets:
Received by the node
Displays the total number of management packets received through
the mesh point node.
Management Packets:
Total Through the
domain
Displays the total number of management packets that were
transmitted and received through the mesh point node.
Data Indicators: Traffic
Index
Displays True of False to indicate whether or not a traffic index is
present.
Data Indicators: Max
User Rate
Displays the maximum user throughput rate for mesh points in the RF
Domain.
Data Distribution:
Neighbor Count
Displays the total number of neighbors known to the mesh points in
the RF Domain.
Data Distribution: Radio Displays the total number of neighbor radios known to the mesh
Count
points in the RF Domain.
15.2.12 SMART RF
RF Domain Statistics
When invoked by an administrator, Self-Monitoring At Run Time (Smart RF) instructs Access Point radios to
change to a specific channel and begin beaconing using the maximum available transmit power. Within a wellplanned deployment, any RF Domain member Access Point radio should be reachable by at least one other radio.
Smart RF records signals received from its neighbors as well as signals from external, un-managed radios. AP-to-
Wireless Controller and Service Platform System Reference Guide
15 - 49
Statistics
AP distance is recorded in terms of signal attenuation. The information from external radios is used during channel
assignment to minimize interference.
To view the Smart RF summary for RF Domain member Access Point radios:
Select the Statistics menu from the Web UI.
2 Select a RF Domain from under the System node on the top, left-hand side, of the screen.
3 Select SMART RF from the RF Domain menu.
4 Expand the SMART RF menu and select Summary.
The summary screen enables administrators to assess the efficiency of RF Domain member device channel
distributions, sources of interference potentially requiring Smart RF adjustments, top performing RF Domain
member device radios and the number of power, channel and coverage changes required as part of a Smart
RF performance compensation activity.
Figure 15-27 RF Domain - Smart RF Summary screen
5 The Channel Distribution field lists how RF Domain member devices are utilizing different channels to optimally
support connect devices and avoid congestion and interference with neighboring devices. Assess whether the
channel spectrum is being effectively utilized and whether channel changes are warranted to improve RF
Domain member device performance.
6 Review the Top 10 interference table to assess RF Domain member devices whose level of interference exceeds
the threshold set (from -100 to -10 dBm) for acceptable performance.
Interferer
Lists the administrator defined name of the interfering RF Domain
member device.
Wireless Controller and Service Platform System Reference Guide
15 - 50
Statistics
Vendor
Displays the vendor name (manufacturer) of the interfering RF Domain
member device radio.
Radio
Lists each offending device’s radio name contributing to the top 10
interference listing.
Radio MAC
Displays the factory encoded hardware MAC address assigned to the
RF Domain member device radio.
Channel
Displays the channel each of the 10 poorly performing RF Domain
member devices was detected on. Numerous interfering devices on
the same channel could define the need for better channel
segregation to reduce the levels of detected interference.
RSSI
Lists a relative signal strength indication (RSSI) in dBm for those RF
Domain member devices falling into the poorest performing 10 devices
based on the administrator defined threshold value.
7 Review the Top 5 Active Radios to assess the significance of any Smart RF initiated compensations versus their
reported top performance.
Radio MAC
Lists the hardware encoded MAC address of each listed top
performing RF Domain member device radio.
RF Band
Displays the top performing radio’s operation band. This may help
administrate whether more changes were required in the 2.4 GHz band
then 5 GHz or vice versa.
AP Name
Lists the administrator assigned Access Point name used to
differentiate from other RF Domain member Access Point radios. The
name displays in the form of a link that can be selected to display
device information in greater detail.
Power Changes
Displays the number of Smart RF initiated power level changes
reported for this top performing RF Domain member radio.
Channel Changes
Displays the number of Smart RF initiated channel changes reported
for this top performing RF Domain member radio.
Coverage Changes
Displays the number of Smart RF initiated coverage changes reported
for this top performing RF Domain member radio.
8 Refer to the SMART RF Activity table to view the trending of Smart RF compensations.
Time Period
Lists the frequency Smart RF activity is trended for the RF Domain.
Trending periods include the Current Hour, Last 24 Hours or the Last
Seven Days. Comparing Smart RF adjustments versus the last seven
days enables an administrator to assess whether periods of
interference and poor performance were relegated to just specific
periods.
Power Changes
Displays the number of Smart RF initiated power level changes needed
for RF Domain member devices during each of the three trending
periods. Determine whether power compensations were relegated to
known device outages or if compensations were consistent over the
course of a day or week.
Wireless Controller and Service Platform System Reference Guide
15 - 51
Statistics
Channel Changes
Lists the number of Smart RF initiated channel changes needed for RF
Domain member devices during each of the three trending periods.
Determine if channel adjustments were relegated to known device
count increases or decreases over the course of a day or week.
Coverage Changes
Displays the number of Smart RF initiated coverage changes needed
for RF Domain member devices during each of the three trending
periods. Determine if coverage changes were relegated to known
device failures or known periods of interference over the course of a
day or week.
9 Select Refresh to update the Summary to its latest RF Domain Smart RF information.
10 Select Details from the RF Domain menu.
Refer to the General field to review the radio's factory encoded hardware MAC address, the radio index
assigned by the administrator, the 802.11 radio type, its current operational state, the radio's AP hostname
assigned by an administrator, its current operating channel and power.
Figure 15-28 RF Domain - Smart RF Details screen
Refer to the Neighbors table to review the attributes of neighbor radio resources available for Smart RF radio
compensations for other RF Domain member device radios. Individual Access Point hostnames can be selected
and the RF Domain member radio can be reviewed in greater detail. Attenuation is a measure of the reduction
of signal strength during transmission. Attenuation is the opposite of amplification, and is normal when a signal
is sent from one point to another. If the signal attenuates too much, it becomes unintelligible. Attenuation is
measured in decibels. The radio's current operating channel is also displayed, as is the radio's hard coded MAC
address transmit power level and administrator assigned ID. Select Refresh at any time to update the Details
screen to its latest values.
11 Select the Energy Graph tab
Use the Energy Graph to review the radio’s operating channel, noise level and neighbor count. This information
helps assess whether Smart RF neighbor recovery is needed in respect to poorly performing radios.
Wireless Controller and Service Platform System Reference Guide
15 - 52
Statistics
Figure 15-29 RF Domain - Smart RF Energy Graph
12 Select Smart RF History to review the descriptions and types of Smart RF events impacting RF Domain member
devices.
Figure 15-30 RF Domain - Smart RF History screen
Wireless Controller and Service Platform System Reference Guide
15 - 53
Statistics
The SMART RF History screen displays the following RF Domain member historical data:
Time
Displays a time stamp when Smart RF status was updated on behalf
of a Smart RF adjustment within the selected RF Domain.
Type
Lists a high-level description of the Smart RF activity initiated for a RF
Domain member device.
Description
Provides a more detailed description of the Smart RF event in respect
to the actual Smart RF calibration or adjustment made to compensate
for detected coverage holes and interference.
Refresh
Select the Refresh button to update the statistics counters to their
latest values.
15.2.13 WIPS
RF Domain Statistics
Refer to the Wireless Intrusion Protection Software (WIPS) screens to review a client blacklist and events reported
by a RF Domain member Access Point.
For more information, see:
• WIPS Client Blacklist
• WIPS Events
15.2.13.1 WIPS Client Blacklist
WIPS
The Client Blacklist displays clients detected by WIPS and removed from RF Domain utilization. Blacklisted clients
are not allowed to associate to RF Domain member Access Point radios.
To view the WIPS client blacklist:
Select the Statistics menu from the Web UI.
2 Select a RF Domain from under the System node on the top, left-hand side, of the screen.
3 Expand the WIPS menu item and select Client Blacklist.
Wireless Controller and Service Platform System Reference Guide
15 - 54
Statistics
Figure 15-31 RF Domain - WIPS Client Blacklist screen
The WIPS Client Blacklist screen displays the following:
Event Name
Displays the name of the blacklisting wireless intrusion event detected by
a RF Domain member Access Point.
Blacklisted Client
Displays the MAC address of the unauthorized (blacklisted) client
intruding the RF Domain.
Time Blacklisted
Displays the time when the wireless client was blacklisted by a RF Domain
member Access Point.
Total Time
Displays the time the unauthorized (now blacklisted) device remained in
the RF Domain.
Time Left
Displays the time the blacklisted client remains on the list.
Refresh
Select the Refresh button to update the statistics counters to their latest
values.
15.2.13.2 WIPS Events
WIPS
Refer to the WIPS Events screen to assess WIPS events detected by RF Domain member Access Point radios and
reported to the controller or service platform.
To view the rogue Access Point statistics:
Select the Statistics menu from the Web UI.
2 Select a RF Domain from under the System node on the top, left-hand side, of the screen.
3 Expand the WIPS menu item and select WIPS Events.
Wireless Controller and Service Platform System Reference Guide
15 - 55
Statistics
Figure 15-32 RF Domain - WIPS Events screen
The WIPS Events screen displays the following:
Event Name
Displays the event name of the intrusion detected by a RF Domain
member Access Point.
Reporting AP
Displays the MAC address of the RF Domain member Access Point
reporting the event.
Originating Device
Displays the MAC address of the device generating the event.
Detector Radio
Displays the radio number detecting the WIPS event.
Time Reported
Displays a time stamp of when the event was reported by the RF
Domain member Access Point radio.
Clear All
Select the Clear All button to clear the statistics counters and begin a
new data collection.
Refresh
Select the Refresh button to update the statistics counters to their
latest values.
15.2.14 Captive Portal
RF Domain Statistics
A captive portal is guest access policy for providing guests temporary and restrictive access to the controller or
service platform managed wireless network. Captive portal authentication is used primarily for guest or visitor
access to the network, but is increasingly being used to provide authenticated access to private network resources
when 802.1X EAP is not a viable option. Captive portal authentication does not provide end-user data encryption,
but it can be used with static WEP, WPA-PSK or WPA2-PSK encryption.
To view the RF Domain captive portal statistics:
Select the Statistics menu from the Web UI.
2 Select a RF Domain from under the System node on the top, left-hand side, of the screen.
3 Select Captive Portal from the RF Domain menu.
Wireless Controller and Service Platform System Reference Guide
15 - 56
Statistics
Figure 15-33 RF Domain - Captive Portal
The screen displays the following Captive Portal data for requesting clients:
Client MAC
Displays the MAC address of each listed client requesting captive
portal access to the controller or service platform managed network.
This address can be selected to display client information in greater
detail.
Hostname
Lists the administrator assigned hostname of the device requesting
captive portal access to network’s RF Domain resources.
Client IP
Displays the IPv4 formatted address of each listed client using its
connected RF Domain member Access Point for captive portal access.
Client IPv6
Displays any IPv6 formatted address of any listed client using its
connected RF Domain member Access Point for captive portal access.
IPv6 is the latest revision of the Internet Protocol (IP) designed to
replace IPv4. IPV6 provides enhanced identification and location
information for computers on networks routing traffic across the
Internet. IPv6 addresses are composed of eight groups of four
hexadecimal digits separated by colons.
Captive Portal
Lists the name of the RF Domain captive portal currently utilized by
each listed client.
Port Name
Lists the name virtual port used for captive portal session direction.
Authentication
Displays the authentication status of requesting clients attempting to
connect to the controller or service platform via the captive portal.
WLAN
Displays the name of the WLAN the requesting client would use for
interoperation with the controller or service platform.
VLAN
Displays the name of the VLAN the client would use as a virtual
interface for captive portal operation with the controller or service
platform.
Wireless Controller and Service Platform System Reference Guide
15 - 57
Statistics
Remaining Time
Displays the time after which a connected client is disconnected from
the captive portal.
Refresh
Select the Refresh button to update the statistics counters to their
latest values.
15.2.15 Application Visibility (AVC)
RF Domain Statistics
RF Domain member devices inspect every byte of each application header packet allowed to pass through the
WiNG managed network. When an application is recognized and classified by the WiNG application recognition
engine, administrator defined actions can be applied to that specific application. For information on categorizing,
filtering and logging the application data allowed to proliferate the WiNG managed network, refer to Application
Policy on page 7-54 and Application on page 7-58.
To view the RF Domain application utilization statistics:
Select the Statistics menu from the Web UI.
2 Select a RF Domain from under the System node on the top, left-hand side, of the screen.
3 Select Application Visibility (AVC) from the RF Domain menu.
Figure 15-34 RF Domain - Application Visibility
Wireless Controller and Service Platform System Reference Guide
15 - 58
Statistics
4 Refer to the Top Applications graph to assess the most prolific, and allowed, application data passing through
RF Domain member devices.
Total Bytes
Displays the top ten RF Domain member utilized applications in
respect to total data bytes passing through the RF Domain member
WiNG managed network. These are only the administrator allowed
applications approved for proliferation within the RF Domain member
device.
Bytes Uploaded
Displays the top ten RF Domain member applications in respect to
total data bytes uploaded through the RF Domain member WiNG
managed network. If this application data is not aligned with
application utilization expectations, consider allowing or denying
additional applications and categories or adjusting their precedence
(priority).
Bytes Downloaded
Displays the top ten RF Domain member applications in respect to
total data bytes downloaded from the RF Domain member WiNG
managed network. If this application data is not aligned with
application utilization expectations, consider allowing or denying
additional applications and categories or adjusting their precedence
(priority).
5 Refer to the Application Detailed Stats table to assess specific application data utilization:
Application Name
Lists the RF Domain member allowed application name whose data
(bytes) are passing through the WiNG managed network.
Uploaded
Displays the number of uploaded application data (in bytes) passing
the through the WiNG managed network.
Downloaded
Displays the number of downloaded application data (in bytes)
passing the through the WiNG managed network.
Num Flows
Lists the total number of application data flows passing through RF
Domain member devices for each listed application. An application
flow can consist of packets in a specific connection or media stream.
Application packets with the same source address/port and
destination address/port are considered one flow.
Clear Application Stats
Select this option to clear the application assessment data counters
and begin a new assessment.
Refresh
Select the Refresh button to update the statistics counters to their
latest values.
6 Select the Category tab.
Categories are existing WiNG or user defined application groups (video, streaming, mobile, audio etc.) that
assist administrators in filtering (allowing or denying) application data. For information on categorizing
application data, refer to Application Policy on page 7-54 and Application on page 7-58.
Wireless Controller and Service Platform System Reference Guide
15 - 59
Statistics
Figure 15-35 RF Domain - Application Category Visibility
7 Refer to the Top Categories graph to assess the most prolific, and allowed, application data categories utilized
by RF Domain member devices.
Total Bytes
Displays the top ten RF Domain member application categories in
respect to total data bytes passing through the RF Domain member
WiNG managed network. These are only the administrator allowed
application categories approved for proliferation within the RF
Domain.
Bytes Uploaded
Displays the top ten RF Domain member application categories in
respect to total data bytes uploaded through the RF Domain member
WiNG managed network. If this category data is not aligned with
application utilization expectations, consider allowing or denying
additional categories or adjusting their precedence (priority).
Bytes Downloaded
Displays the top ten RF Domain member application categories in
respect to total data bytes downloaded from the RF Domain member
WiNG managed network. If this category data is not aligned with
application utilization expectations, consider allowing or denying
additional categories and categories or adjusting their precedence
(priority).
8 Refer to the Category Detailed Stats table to assess specific application category data utilization:
Category Name
Lists the RF Domain member allowed category whose application data
(in bytes) is passing through the WiNG managed network.
Wireless Controller and Service Platform System Reference Guide
15 - 60
Statistics
Uploaded
Displays the number of uploaded application category data (in bytes)
passing the through the WiNG managed network.
Downloaded
Displays the number of downloaded application category data (in
bytes) passing the through the WiNG managed network.
Num Flows
Lists the total number of application category data flows passing
through RF Domain member devices. A category flow can consist of
packets in a specific connection or media stream. Packets with the
same source address/port and destination address/port are considered
one flow.
Clear Application Stats
Select this option to clear the application category assessment data
counters and begin a new assessment.
Refresh
Select the Refresh button to update the statistics counters to their
latest values.
15.2.16 Coverage Hole Summary
RF Domain Statistics
Periodically refer to a selected RF Domain’s coverage hole summary to assess the RF Domain member Access
Point radios reporting coverage hole adjustments. When coverage hole recovery is enabled and a deployment area
radio coverage hole is detected, Smart RF determines the radio’s power increase compensation required based on
a reporting client’s signal to noise (SNR) ratio. If a client’s SNR is above the administrator threshold, its connected
Access Point’s transmit power is increased until the noise rate falls below the threshold.
To view a RF Domain’s coverage hole summary:
Select the Statistics menu from the Web UI.
2 Select a RF Domain from under the System node on the top, left-hand side, of the screen.
3 Select Coverage Hole Detection from the RF Domain menu and expand this item to display its submenu
options.
4 Select Summary.
Wireless Controller and Service Platform System Reference Guide
15 - 61
Statistics
Figure 15-36 RF Domain - Coverage Hole Summary
The screen displays the following RF Domain coverage hole summarization data:
AP Hostname
Displays each RF Domain member Access Point hostname reporting a
coverage hole compensation event. This can be helpful in assessing
whether specific Access Points consistently report coverage holes and
whether additional Access Point placements are required to
compensate for poorly performing radios.
Coverage Hole Incidents Lists each reporting Access Point’s coverage hole incident count since
Count
the screen was last cleared. Periodically assess whether a specific
Access Point’s high incident count over a trended repeatable period
warrants additional Access Point placements in that same radio
coverage area to reduce a coverage hole.
Clear Coverage
Incidents
Select this option to clear the statistics counters and begin a new
coverage hole summary for RF Domain member Access Point radios.
Refresh
Select the Refresh button to update the statistics counters to their
latest values.
15.2.17 Coverage Hole Details
RF Domain Statistics
In addition to the RF Domain’s Coverage Hole Summary, a specific Access Point’s coverage hole history can be
reviewed in detail. Consider using different RF Domain member Access Points or their connected clients to help
validate the data reported before compensating for the coverage hole by increasing the radio transmit power of
neighboring Access Points.
To review specific RF Domain member Access Point coverage hole information:
Select the Statistics menu from the Web UI.
2 Select a RF Domain from under the System node on the top, left-hand side, of the screen.
Wireless Controller and Service Platform System Reference Guide
15 - 62
Statistics
3 Select Coverage Hole Detection from the RF Domain menu and expand this item to display its submenu
options.
4 Select Detail.
Figure 15-37 RF Domain - Coverage Hole Details
5 Use the Filtered By option to define whether the RF Domain’s coverage hole details are provided by a selected
Access Point (AP) or by a specific RF Domain member Access Point’s connected Client. Consider filtering by
different RF Domain member devices to validate the accuracy of a reported coverage hole before increasing the
transmit power of neighboring radios to compensate.
6 Refer to the Enter MAC Address parameter to define a RF Domain member Access Point MAC address or
Hostname or just a client MAC address. This is the selected device reporting coverage hole details to the listed
RF Domain member Access Point.
7 Select Filter to begin the coverage hole data collection using the Access Point or client details provided. Refer
to the following to review the data reported:
Hostname
Lists the administrator assigned hostname used as each listed Access
Point’s network identifier. This is the Access Point whose client(s) are
reporting coverage hole RSSI data.
Radio
Lists the Access Point radio receiving and reporting coverage hole RSSI
data from the listed client MAC. Each supported Access Point has at
least two radios, with the exception of AP6521 model, which is a singleradio model.
BSSID
Displays the basic service set identifier (BSSID) included in an Access
Point’s wireless packet transmissions. Packets need to go to their
correct destination. While a SSID keeps packets within the correct
WLAN there’s usually multiple Access Points within each WLAN. A
BSSID identifies the correct Access Point and its connected clients.
Client MAC
Lists each connected client’s hardware encoded MAC address. This is
the client reporting coverage hole RSSI data to its connected Access
Point radio.
RSSI
Displays the Received Signal Strength Indicator (RSSI) of the detecting
Access Radio or client.
Wireless Controller and Service Platform System Reference Guide
15 - 63
Statistics
Date-Time
Displays the date and time when each listed Access Point received its
coverage hole indecent information.
Clear Coverage
Incidents
Select this option to clear the statistics counters and begin a new
coverage hole assessment for RF Domain member Access Point radios.
Refresh
Select the Refresh button to update the statistics counters to their
latest values.
15.3 Controller Statistics
Statistics
The Wireless Controller screen displays information about peer controllers or service platforms and their connected
Access Points. As members of a cluster, a controller or service platform manages its own network and is ready to
assume the load of an offline peer. The screen displays detailed statistics which include network health, inventory
of devices, wireless clients, adopted APs, rogue APs and WLANs. For more information, refer to the following:
• Health
• Device
• Cluster Peers
• Web-Filtering
• Application Visibility (AVC)
• Application Policy
• Device Upgrade
• Mirroring
• Adoption
• AP Detection
• Guest User
• Wireless LANs
• Policy Based Routing
• Radios
• Mesh
• Interfaces
• RAID Statistics
• Border Gateway Protocol (BGP) Statistics
• Power Status
• PPPoE
• OSPF
• L2TPv3
• VRRP
• Critical Resources
• LDAP Agent Status
• Mint Links
• Guest Users
• GRE Tunnels
• Dot1x
• Network
• DHCPv6 Relay & Client
Wireless Controller and Service Platform System Reference Guide
15 - 64
Statistics
•
•
•
•
•
•
•
•
•
DHCP Server
Firewall
VPN
Viewing Certificate Statistics
WIPS Statistics
Sensor Server
Bonjour Services
Captive Portal Statistics
Network Time
15.3.1 Health
Controller Statistics
The Health screen displays details such as hostname, device name, RF Domain name, radio RF quality and client
RF quality.
To view controller or service platform device health data:
Select the Statistics tab from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select Health from the left-hand side of the UI.
Wireless Controller and Service Platform System Reference Guide
15 - 65
Statistics
Figure 15-38 Wireless Controller - Health screen
The Device Details field displays the following:
Hostname
Displays the administrator assigned hostname of the controller or
service platform.
Device MAC
Displays the MAC address of the controller.
Primary IP
Lists the network address used by this controller or service platform as
a network identifier.
Type
Displays the RFS series controller or NX series service platform type.
RF Domain Name
Displays the controller’s domain membership. The name displays in the
form of a link that can be selected to display a detailed description of
the RF Domain configuration.
Model Number
Displays the RFS series controller or NX series service platform type.
Version
Displays the version of the image running on the controller or service
platform.
Uptime
Displays the cumulative time since the controller or service platform
was last rebooted or lost power.
CPU
Displays the controller or service platform processor name.
RAM
Displays the CPU memory in use.
Wireless Controller and Service Platform System Reference Guide
15 - 66
Statistics
System Clock
Displays the system clock information.
The Access Point Health (w/ cluster members) chart shows how many Access Points are online and how many
are offline. These are APs with cluster members directly managed by the wireless controller. This data does not
include Access Points associated to other controllers or service platforms in the same cluster.
The Radio RF Quality Index field displays RF quality (overall effectiveness of the RF environment). Use this
table to assess radio performance for improvement ideas.
The RF Quality Index field displays the following:
RF Quality Index
Displays the five radios with the lowest average quality.
Radio Id
Displays the hardware encoded MAC address of the radio.
Radio Type
Displays the radio type used by this Access Point.
The Radio Utilization Index field measures how efficiently the traffic medium is used. It’s defined as the
percentage of the current throughput relative to the maximum relative possible throughput:
Total Bytes
Displays the total bytes of data transmitted and received by the
controller or service platform since the screen was last refreshed.
Total Packets
Lists the total number of data packets transmitted and received by the
controller or service platform since the screen was last refreshed.
Total Dropped
List the number of dropped data packets by a controller or service
platform managed Access Point radio since the screen was last
refreshed.
The Client RF Quality Index field displays the RF quality of the clients. Use this table to troubleshoot radios not
optimally performing:
Worst 5
Displays the five client radios with the lowest quality indices.
Client MAC
Displays the MAC address of the client.
Retry Rate
Displays the excessive retry rate of each listed controller or service
platform managed client.
4 Select Refresh to update the statistics counters to their latest values.
15.3.2 Device
Controller Statistics
The Device statistics screen provides detailed information about the selected device.
To view controller or service platform device statistics:
Select the Statistics tab from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select Device from the left-hand side of the UI.
Wireless Controller and Service Platform System Reference Guide
15 - 67
Statistics
Figure 15-39 Wireless Controller - Device screen
The System field displays the following:
Model Number
Displays the model number for the selected controller or service
platform.
Serial Number
Displays the serial number factory encoded on the controller or service
platform at the factory.
Version
Displays the unique alphanumeric firmware version name for the
controller or service platform firmware.
Boot Partition
Displays the boot partitioning type.
Fallback Enabled
Displays whether fallback is enabled. The fallback feature enables a
user to store both a legacy and new firmware version in memory. You
can test the new software and use an automatic fallback mechanism,
which loads the old version, if the new version fails.
Fallback Image
Triggered
Displays whether the fallback image has been triggered. The fallback is
a legacy software image stored in device memory. This allows an user
to test a new version and revert to the older version if needed.
Next Boot
Designates this version as the version used the next time the controller
or service platform is booted.
The System Resources field displays the following:
Available Memory (MB)
Displays the available memory (in MB) available on the selected
controller or service platform.
Wireless Controller and Service Platform System Reference Guide
15 - 68
Statistics
Total Memory (MB)
Displays the controller or service platform’s total memory.
Currently Free RAM
Displays the Access Point’s free RAM space. If its very low, free up
some space by closing some processes.
Recommended Free
RAM
Displays the recommended RAM required for routine operation.
Current File Descriptors Displays the controller or service platform’s current file description.
Maximum File Current
File Descriptors
Displays the controller or service platform’s maximum file description.
CPU Load 1 Minute
Lists the typical controller or service platform processor load over 1
minute.
CPU Load 5 Minutes
Lists the typical controller or service platform processor load over 5
minutes.
CPU Load 15 Minutes
Lists the typical controller or service platform processor load over 15
minutes.
The Upgrade Status field displays firmware upgrade statistics. The table provides the following:
Upgrade Status
Displays whether the image upgrade was successful.
Upgrade Status Time
Displays the time of the upgrade.
The IP Domain field displays the following:
IP Domain Name
Displays the name of the IP Domain service used with the selected
controller or service platform.
IP Domain Lookup state Lists the current state of the lookup operation.
The Fan Speed field displays the following:
Number
Displays the number of fans supported on the this controller or service
platform.
Speed (Hz)
Displays the fan speed in Hz.
The Temperature field displays the following:
Number
Displays the number of temperature elements used by the controller or
service platform.
Temperature
Displays the current temperature (in Celsius) to assess a potential
Access Point overheat condition.
The Kernal Buffers field displays the following:
Buffer Size
Lists the sequential buffer size.
Current Buffers
Displays the current buffers available to the selected controller or
service platform.
Maximum Buffers
Lists the maximum buffers available to the selected controller or
service platform.
Wireless Controller and Service Platform System Reference Guide
15 - 69
Statistics
The Firmware Images field displays the following:
Primary Build Date
Displays the build date when this version was created.
Primary Install Date
Displays the date this version was installed on the controller or service
platform.
Primary Version
Displays the primary version string.
Secondary Build Date
Displays the build date when this secondary version was created.
Secondary Install Date
Displays the date this secondary version was installed on the controller
or service platform.
Secondary Version
Displays the secondary version string.
FGPA Version
Displays the version of FGPA firmware used by the controller or
service platform.
PoE Version Firmware
Lists the Power-Over-Ethernet (PoE) version firmware.
The AP Licenses field displays the following:
AP Licenses
Displays the number of AP licenses currently available on the
controller or service platform. This value represents the maximum
number of licenses the controller or service platform can adopt.
AP Adoptions
Displays the number of Access Points adopted by this controller or
service platform.
AP License
Displays the license string of the AP.
The AAP Licenses field displays the following:
AAP Licenses
Displays the number of AAP licenses currently available on the
controller or service platform. This value represents the maximum
number of licenses the controller or service platform can adopt.
AAP Adoptions
Displays the number of adaptive Access Points adopted by this
controller or service platform.
AAP License
Displays the license string of the adaptive Access Point.
The Additional Licenses area displays the following information:
ADSEC
Displays Advanced Security licenses. This enables the Role Based
firewall and increases the number of IP Sec VPN tunnels. The
maximum number of IP Sec VPN tunnels varies by platform.
WIPS
Displays the number of WIPS licenses utilized by the controller or
service platform.
Hotspot Analytics
Displays whether an advanced hotspot analytics license is in use and
applied to the controller or service platform.
The IP Name Servers table displays the following:
Name Server
Displays any custom Name Server mappings on the controller or
service platform.
Type
Displays the type of DNS mapping, if any, on the controller or service
platform.
Wireless Controller and Service Platform System Reference Guide
15 - 70
Statistics
The IPv6 Name Servers table displays the following:
Name Server
Displays any custom IPv6 formatted IP address Name Server mappings
on the controller or service platform.
Type
Displays the type of DNS mapping, if any, on the controller or service
platform.
The IPv6v Hop Limit table displays the following:
Hop Limit
Lists the maximum number of times IPv6 traffic can hop. The IPv6
header contains a hop limit field that controls the number of hops a
datagram can be sent before being discarded (similar to the TTL field
in an IPv4 header).
The IPv6 Delegated Prefixes table displays the following:
IPv6 Delegated Prefix
If IPv6, prefix delegation is used to assign a network address prefix,
configuring the controller or service platform with the prefix.
Prefix Name
Lists the 32 character maximum name for the IPv6 delegated prefix
used as an easy to remember alias for an entire IPv6 address.
DHCPv6 Client State
Displays the current DHCPv6 client state as impacted by the IPv6
delegated prefix.
Interface Name
Lists the interface over which IPv6 prefix delegation occurs.
T1 timer (seconds)
Lists the amount of time in seconds before the DHCP T1 (delay before
renew) timer expires.
T2 timer (seconds)
Lists the amount of time in seconds before the DHCP T2 (delay before
rebind) timer expires.
Last Refreshed
(seconds)
Lists the time, in seconds, since IPv6 prefix delegation has been
updated.
Preferred Lifetime
(seconds)
Lists is the time in seconds (relative to when the packet is sent) the
IPv6 formatted addresses remains in a preferred state on the selected
interface. The preferred lifetime must always be less than or equal to
the valid lifetime.
Valid Lifetime (seconds) Displays the time in seconds (relative to when the packet is sent) the
IPv6 formatted address remains in a valid state on the selected
interface. The valid lifetime must always be greater than or equal to
the preferred lifetime.
15.3.3 Cluster Peers
Controller Statistics
Refer to the Cluster Peers screen to review device address and version information for peer devices within a
cluster.
To view controller or service platform cluster peer statistics:
Select the Statistics tab from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select Cluster Peers from the left-hand side of the UI.
Wireless Controller and Service Platform System Reference Guide
15 - 71
Statistics
Figure 15-40 Wireless Controller - Cluster Peers screen
The Cluster Peers screen displays the following:
Wireless Controller
Displays the IP addresses of current cluster member controller or
service platform. The name displays in the form of a link that can be
selected to display a detailed description of the controller or service
platform’s configuration.
MAC Address
Displays the MAC addresses of current cluster members.
Type
Displays the type of cluster peer (by controller or service platform
model).
RF Domain Name
Displays each member’s RF Domain name. The name displays in the
form of a link that can be selected to display a detailed description of
the RF Domain’s configuration.
Online
Displays whether a controller or service platform is online. If online, a
green check mark displays, if it is offline a red X displays.
Version
Displays the numeric firmware version currently running on the
controller or service platform. Use this version as the basis for
comparison on whether newer versions are available from the support
site that may provide increased functionality and a broader feature set.
Refresh
Select the Refresh button to update the screen’s statistics counters to
their latest values.
15.3.4 Web-Filtering
Controller Statistics
The Web-Filtering screen displays information on Web requests for content and whether the requests were
blocked or approved based on URL filter settings defined for the selected controller or service platform. A URL
filter is comprised of several filter rules. A whitelist bans all sites except the categories and URL lists defined in the
whitelist. The blacklist allows all sites except the categories and URL lists defined in the blacklist.
To view this controller’s Web filter statistics:
Wireless Controller and Service Platform System Reference Guide
15 - 72
Statistics
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select Web-Filtering.
Figure 15-41 Wireless Controller - Web Filtering screen
The Web-Filtering Requests field displays the following information:
Total Blocks
Lists the number of Web request hits against content blocked in the URL
blacklist.
Total Requests
Lists the total number of requests for URL content cached locally on this
controller or service platform.
Total URL Cache
Entries
Displays the number of chached URL data entries made on this controller
or service platform on the request of requesting clients requiring URL data
managed by the controller or service platform and their respective
whitelist or blacklist.
The Top Categories field helps administrators assess the content most requested, blocked and approved based
on the defined whitelist and blacklist permissions:
Top Categories Requested
Lists those Web content categories most requested by clients managed by
this controller or service platform. Use this information to assess whether
the permissions defined in the blacklist and whitelist optimally support
these client requests for cached Web content.
Wireless Controller and Service Platform System Reference Guide
15 - 73
Statistics
Top Categories Blocked
Lists those Web content categories blocked most often for requesting
clients managed by this controller or service platform. Use this information
to periodically assess whether the permissions defined in the blacklist and
whitelist still restrict the desired cached Web content from requesting
clients. Remember, a whitelist bans all sites except the categories and URL
lists defined in the whitelist. The blacklist allows all sites except the
categories and URL lists defined in the blacklist.
Top Categories Approved
Lists those Web content categories approved most often on behalf of
requesting clients managed by this controller or service platform.
Periodically review this information to assess whether this cached and
available Web content still adhere’s to your organization’s standards for
client access.
The Web Filter Status field displays the following information:
Name
Displays the name of the filter whose URL rule set has been invoked.
Blacklist Category
Lists the blacklist category whose URL filter rule set has caused data to be
filtered to a requesting client. Periodically assess whether these rules are
still relevant to the data requirements of requesting clients.
VLAN
Lists the impacted controller or service platform VLAN whose Web data
traffic has been filtered based on the restrictions in the listed blacklist
category.
WLAN
Lists the impacted controller or service platform WLAN whose Web data
traffic has been filtered based on the restrictions in the listed blacklist
category. Periodically assess whether clients are segregated to the correct
WLAN based on their cached Web data requirements and impending filter
rules.
4 Periodically select Refresh to update this screen to its latest values.
15.3.5 Application Visibility (AVC)
Controller Statistics
Controllers and service platforms can inspect every byte of each application header packet allowed to pass their
managed radio devices. When an application is recognized and classified by the WiNG application recognition
engine, administrator defined actions can be applied to that specific application. For information on categorizing,
filtering and logging the application data allowed to proliferate the controller or service platform managed
network, refer to Application Policy on page 7-54 and Application on page 7-58.
To view controller or service platform application utilization statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select Application Visibility (AVC).
Wireless Controller and Service Platform System Reference Guide
15 - 74
Statistics
Figure 15-42 Controller - Application Visibility
4 Refer to the Top Applications graph to assess the most prolific, and allowed, application data passing through
the controller and service platform.
Total Bytes
Displays the top ten utilized applications in respect to total data bytes
passing through the controller or service platform managed network.
These are only the administrator allowed applications approved for
proliferation within the controller or service platform managed
network.
Bytes Uploaded
Displays the top ten applications in respect to total data bytes
uploaded through the controller or service platform managed network.
If this application data is not aligned with application utilization
expectations, consider allowing or denying additional applications and
categories or adjusting their precedence (priority).
Bytes Downloaded
Displays the top ten applications in respect to total data bytes
downloaded from the controller or service platform managed network.
If this application data is not aligned with application utilization
expectations, consider allowing or denying additional applications and
categories or adjusting their precedence (priority).
5 Refer to the Application Detailed Stats table to assess specific application data utilization:
Application Name
Lists the allowed application name whose data (bytes) are passing
through the controller or service platform managed network
Uploaded
Displays the number of uploaded application data (in bytes) passing
the through the controller or service platform managed network.
Wireless Controller and Service Platform System Reference Guide
15 - 75
Statistics
Downloaded
Displays the number of downloaded application data (in bytes)
passing the through the controller or service platform managed
network.
Num Flows
Lists the total number of application data flows passing through the
controller or service platform for each listed application. An application
flow can consist of packets in a specific connection or media stream.
Application packets with the same source address/port and
destination address/port are considered one flow.
Clear Application Stats
Select this option to clear the application assessment data counters
and begin a new assessment. Selecting this option will not clear
category stats, just application stats.
Refresh
Select the Refresh button to update the statistics counters to their
latest values.
6 Select the Category tab.
Categories are existing WiNG or user defined application groups (video, streaming, mobile, audio etc.) that
assist administrators in filtering (allowing or denying) application data. For information on categorizing
application data, refer to Application Policy on page 7-54 and Application on page 7-58.
Figure 15-43 Controller - Application Category Visibility
Wireless Controller and Service Platform System Reference Guide
15 - 76
Statistics
7 Refer to the Top Categories graph to assess the most prolific, and allowed, application data categories utilized
by the controller or service platform.
Total Bytes
Displays the top ten application categories in respect to total data
bytes passing through the controller or service platform managed
network. These are only the administrator allowed application
categories approved for proliferation within the controller or service
platform managed network.
Bytes Uploaded
Displays the top ten application categories in respect to total data
bytes uploaded through the controller or service platform managed
network. If this category data is not aligned with application utilization
expectations, consider allowing or denying additional categories or
adjusting their precedence (priority).
Bytes Downloaded
Displays the top ten application categories in respect to total data
bytes downloaded from the controller or service platform managed
network. If this category data is not aligned with application utilization
expectations, consider allowing or denying additional categories and
categories or adjusting their precedence (priority).
8 Refer to the Category Detailed Stats table to assess specific application category data utilization:
Category Name
Lists the allowed category whose application data (in bytes) is passing
through the controller or service platform network.
Uploaded
Displays the number of uploaded application category data (in bytes)
passing the through the controller or service platform managed
network.
Downloaded
Displays the number of downloaded application category data (in
bytes) passing the through the controller or service platform managed
network.
Num Flows
Lists the total number of application category data flows passing
through controller or service platform managed devices. A category
flow can consist of packets in a specific connection or media stream.
Packets with the same source address/port and destination address/
port are considered one flow.
Clear Category Stats
Select this option to clear the application category assessment data
counters and begin a new assessment. Selecting this option will not
clear application stats, just category stats.
Refresh
Select the Refresh button to update the statistics counters to their
latest values.
15.3.6 Application Policy
Controller Statistics
When an application is recognized and classified by the WiNG application recognition engine, administrator
defined actions can be applied to that specific application. An application policy defines the rules or actions
executed on recognized HTTP (Facebook), enterprise (Webex) and peer-to-peer (gaming) applications or
application-categories.
For each rule defined, a precedence is assigned to resolve conflicting rules for applications and categories. A deny
rule is exclusive, as no other action can be combined with a deny. An allow rule is redundant with other actions,
Wireless Controller and Service Platform System Reference Guide
15 - 77
Statistics
since the default action is allow. An allow rule is useful when wanting to deny packets for a category, but wanting
to allow a few applications in the same category to proceed. In such a cases, add an allow rule for applications
with a higher precedence then a deny rule for that category.
Mark actions mark packets for a recognized application and category with DSCP/8021p values used for QoS. Ratelimits create a rate-limiter applied to packets recognized for an application and category. Ingress and egress rates
need to be specified for the rate-limiter, but both are not required. Mark and rate-limit are the only two actions
that can be combined for an application and category. All other combinations are invalid.
To view controller or service platform application policy statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select Application Policy.
Figure 15-44 Controller - Application Policy
4 Refer to the Rules table to review the results of the application policies put in place thus far from this managing
controller or service platform.
Action
Displays the action executed on the listed application.
Allow - Allows packets for a specific application and its defined
category type (social networking etc.). This is the default
Deny - Denies (restricts) the action applied to a specific application or
a specific application category
Mark - Marks recognized packets with DSCP/8021p value
Rate-limit - Rate limits packets from specific application types.
Type
Displays the application policy type applied.
Precedence
Lists the priority (from 1 - 256) for the application policy rule. The
lower the value, the higher the priority assigned to this rule’s
enforcement action and the category and application assigned. A
precedence also helps resolve conflicting rules for applications and
categories.
Wireless Controller and Service Platform System Reference Guide
15 - 78
Statistics
Action Hit Count
Displays the number of times each listed application policy action has
been triggered.
Refresh
Select the Refresh button to update the statistics counters to their
latest values.
15.3.7 Device Upgrade
Controller Statistics
The Device Upgrade screen displays information about the devices receiving updates within the controller or
service platform managed network. Use this screen to gather version data, install firmware images, boot an image
and upgrade status.
Controllers, service platforms or Access Points can be RF domain managers capable of receiving device firmware
files from the NOC (NX7500 or NX9000 series service platforms) then provisioning other devices within their
same RF domain. Controllers, service platforms and Access Points can now all update the firmware of different
device models within their RF domain. However, firmware updates cannot be made simultaneously to devices in
different site deployments.
To view the upgrade statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select Device Upgrade.
Figure 15-45 Wireless Controller - Device Upgrade screen
The Upgrade screen displays the following information:
Device Hostname
Displays the administrator assigned hostname of the device receiving the
update.
Type
Displays the model type of the device receiving a firmware update from
the provisioning controller or service platform.
State
Displays the current state of the Access Point upgrade (done, failed etc.).
Wireless Controller and Service Platform System Reference Guide
15 - 79
Statistics
Time Last Upgraded Displays the date and time of the last successful upgrade operation.
Retries Count
Displays the number of retries made in an update operation.
Upgraded By
Displays the MAC address of the controller or service platform that
performed the upgrade operation.
Last Update Status
Displays the status of the last upgrade operation (Start Upgrade, Update
error etc.).
Clear History
Select the Clear History button to clear the screen of its current status and
begin a new data collection.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.3.8 Mirroring
Controller Statistics
NX4524 and NX6524 model service platforms have the ability to mirror data packets transmitted or received on
any of their GE ports (GE port 1 - 24). Both transmit and receive packets can be mirrored from a source to a
destination port as needed to provide traditional spanning functionality on the 24 GE ports.
Port mirroring is not supported on NX4500 or NX6500 models, as they only utilize GE ports 1 - 2. Additionally,
port mirroring is not supported on uplink (up) ports or wired ports on any controller or service platform model.
To view NX4524 or NX6524 model service platform port mirroring statistics:
Select the Statistics tab from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select Mirroring from the left-hand side of the UI.
Figure 15-46 Wireless Controller - Mirroring screen
Wireless Controller and Service Platform System Reference Guide
15 - 80
Statistics
The Mirroring screen displays the following statistical data:
Source
Lists the GE port (1 - 24) used as the data source to span packets to
the selected destination port. The packets spanned from the selected
source to the destination depend on whether Inbound, Outbound or
Any was selected as the direction. A source port cannot be a
destination port.
Destination
Displays the GE port (1 - 24) used as the port destination to span
packets from the selected source. The destination port serves as a
duplicate image of the source port and can be used to send packets to
a network diagnostic without disrupting the behavior on the original
port. The destination port transmits only mirrored traffic and does not
forward received traffic. Additionally, address learning is disabled on
the destination port.
Direction
Lists the direction data packets are spanned from the selected source
to the defined destination. Packets spanned from the source to the
destination depend on whether Inbound (received packets only),
Outbound (transmitted packets only) or Any (packets in either
direction) was selected.
Refresh
Select the Refresh button to update the screen’s statistics counters to
their latest values.
15.3.9 Adoption
Controller Statistics
The Adoption screens lists Access Points adopted by the controller or service platform, and includes model, RF
Domain membership, configuration status and device uptime information. For additional AP adoption information,
including an adoption history and pending adoptions, see:
• AP Adoption History
• Pending Adoptions
To view device adoption statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select Adoption > Adopted Devices from the left-hand side of the UI.
Wireless Controller and Service Platform System Reference Guide
15 - 81
Statistics
Figure 15-47 Wireless Controller - Adopted Devices screen
The Adopted Devices screen displays the following:
Device
Displays the name assigned to the adopted device by the
management software. The Access Point name displays as a link that
can be selected to display configuration and network address
information in greater detail.
Type
Lists the model type of each Access Point managed by the selected
controller or service platform (the controller or service platform listed
in the Adopter Hostname column).
RF Domain Name
Displays the RF Domain memberships of each listed adopted device.
Model Number
Displays the model number of the adopted device.
Status
Lists whether an adopted Access Point has been configured
(provisioned) by its connected Access Point or service platform.
Errors
Lists any errors encountered when the each listed Access Point was
adopted by the controller or service platform.
Adopter Hostname
Lists the hostname assigned to the adopting controller or service
platform.
Adoption Time
Displays a timestamp for each listed Access Point reflecting when the
device was adopted by the controller or service platform.
Startup Time
Lists the time the adopted device was last started up and detected on
the network.
Refresh
Select the Refresh button to update the screen’s statistics counters to
their latest values.
Wireless Controller and Service Platform System Reference Guide
15 - 82
Statistics
15.3.9.1 AP Adoption History
Controller Statistics
The AP Adoption History screen displays a list of devices adopted to the controller or service platform managed
network. Use this screen to view a list of devices and their current status.
To view adopted AP Adoption History statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select Adoption > AP Adoption History from the left-hand side of the UI.
Figure 15-48 Wireless Controller - AP Adoption History screen
The AP Adoption History screen displays the following
Event Name
Displays the current adoption status of each AP as either adopted or unadopted.
AP MAC Address
Displays the Media Access Control (MAC) address of each Access Point
that the controller or service platform has attempted to adopt.
Reason
Displays the adoption reason message string for each event in the
adoption history statistics table.
Event Time
Displays the day, date and time for each Access Point adoption attempt by
this controller or service platform.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
Wireless Controller and Service Platform System Reference Guide
15 - 83
Statistics
15.3.9.2 Pending Adoptions
Controller Statistics
The Pending Adoptions screen displays devices still pending (awaiting) adoption to the controller or service
platform managed network. Review this data to assess whether adoption is still beneficial and to troubleshoot
issues preventing adoption.
To view adopted AP statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select Adoption > Pending Adoptions from the left-hand side of the UI.
Figure 15-49 Wireless Controller - Pending Adoptions screen
The Pending Adoptions screen provides the following
MAC Address
Displays the MAC address of the device pending adoption.
Type
Displays the AP’s model type.
IP Address
Displays the current IP address of the device pending adoption.
VLAN
Displays the current VLAN number (virtual interface ID) of the device
pending adoption.
Reason
Displays the status code as to why the device is still pending adoption.
Discovery Option
Displays the discovery option code for each AP listed pending adoption.
Last Seen
Displays the date and time stamp of the last time the device was seen.
Click the arrow next to the date and time to toggle between standard time
and UTC.
Add to Devices
Select a device from amongst those displayed and select Add to Devices
to validate the adoption of the selected device and begin the process of
connecting the device to the controller or service platform managed
network.
Refresh
Select Refresh to update the statistics counters to their latest values.
Wireless Controller and Service Platform System Reference Guide
15 - 84
Statistics
15.3.10 AP Detection
Controller Statistics
The AP Detection screen displays potentially hostile Access Points, their SSIDs, reporting AP, and so on.
Continuously revalidating the credentials of detected devices reduces the possibility of an Access Point hacking
into the controller or service platform managed network.
To view AP detection statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select AP Detection from the left-hand side of the UI.
Figure 15-50 Wireless Controller - AP Detection screen
The AP Detection screen displays the following:
Unsanctioned AP
Displays the MAC address of unsanctioned APs detected within the
controller or service platform radio coverage area. Unsanctioned APs
are detected APs without deployment approval.
Reporting AP
Lists the Access Point whose radio detected the unsanctioned AP. The
Access Point displays as a link that can be selected to display
configuration and network address information in greater detail.
SSID
Displays the SSID of each unsanctioned AP.
AP Mode
Displays the operating mode of the unsanctioned device.
Radio Type
Displays the unsanctioned AP’s radio type. The radio can be 802.11b,
802.11bg, 802.1bgn, 802.11a or 802.11an.
Channel
Displays the channel where the unsanctioned AP was detected.
RSSI
Lists the Received Signal Strength Indicator (RSSI) for each listed AP.
Wireless Controller and Service Platform System Reference Guide
15 - 85
Statistics
Last Seen
Displays when the unsanctioned AP was last seen by the detecting AP.
Clear All
Select Clear All to clear all the screen’s statistic counters and begin
detecting new Access Points.
Refresh
Select Refresh to update the statistics counters to their latest values.
15.3.11 Guest User
Controller Statistics
The Guest User screen displays read only device information for guest clients associated with the selected
controller or service platform. Use this information to assess if configuration changes are required to improve
network performance.
To view a controller or service platform’s connected guest user client statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select Guest User from the left-hand side of the UI.
Figure 15-51 Wireless Controller - Guest User screen
The Guest User screen displays the following:
Client MAC
Displays the hardcoded MAC address assigned to the guest client at
the factory and can not be modified. The address displays as a link
that can be selected to display configuration and network address
information in greater detail.
IP Address
Displays the unique IP address of the guest client. Use this address as
necessary throughout the applet for filtering and device intrusion
recognition and approval.
IPv6 Address
Displays the current IPv6 formatted IP address a listed guest client is
using as a network identifier. IPv6 is the latest revision of the Internet
Protocol (IP) designed to replace IPv4. IPv6 addresses are composed
of eight groups of four hexadecimal digits separated by colons.
Wireless Controller and Service Platform System Reference Guide
15 - 86
Statistics
Hostname
Displays the hostname (MAC addresses) of connected guest clients.
The hostname displays as a link that can be selected to display
configuration and network address information in greater detail.
Role
Lists the guest client’s defined role within the controller or service
platform managed network.
Client Identity
Displays the unique vendor identity of the listed device as it appears
to its adopting controller or service platform.
Vendor
Displays the name of the client vendor (manufacturer).
Band
Displays the 2.4 or 5 GHz radio band on which the listed guest client
operates.
AP Hostname
Displays the administrator assigned hostname of the Access Point to
which this guest client is associated.
Radio MAC
Displays the MAC address of the radio which the guest client is
connected.
WLAN
Displays the name of the WLAN the guest client is currently assigned
for its Access Point interoperation.
VLAN
Displays the VLAN ID the guest client’s connected Access Point has
defined as a virtual interface.
Last Active
Displays the time when this guest client was last seen (or detected) by
a device within the controller or service platform managed network.
Disconnect Client
Select a specific client and select the Disconnect Client button to
terminate this guest client’s connection to its controller or service
platform connected Access Point radio.
Refresh
Select Refresh to update the statistics counters to their latest values.
15.3.12 Wireless LANs
Controller Statistics
The Wireless LANs statistics screen displays performance statistics for each controller or service platform managed
WLAN. Use this information to assess if configuration changes are required to improve connected Access Point
and client performance.
To view the wireless LAN statistics for the controller or service platform:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select Wireless LANs from the left-hand side of the UI.
Wireless Controller and Service Platform System Reference Guide
15 - 87
Statistics
Figure 15-52 Wireless Controller - Wireless LANs screen
The Wireless LANs screen displays the following:
WLAN Name
Displays the name of the WLANs the controller or service platform is
currently utilizing for client connections and QoS segregation.
SSID
Displays the Service Set ID each listed WLAN is using as an identifier.
Traffic Index
Displays the traffic utilization index, which measures how efficiently
the traffic medium is used. It’s defined as the percentage of current
throughput relative to the maximum possible throughput. Traffic
indices are:
0 – 20 (very low utilization)
20 – 40 (low utilization)
40 – 60 (moderate utilization)
60 and above (high utilization)
Radio Count
Displays the number of radios currently in use by devices utilizing the
listed controller or service platform managed WLAN.
Tx Bytes
Displays data transmit activity (in bytes) on each listed WLAN.
Tx User Data Rate
Displays the average user data rate on each listed WLAN.
Rx Bytes
Displays the data received in bytes on each listed WLAN.
Rx User Data Rate
Displays the average user data rate for packets received by controller
or service platform connected devices using this WLAN.
Disconnect All Clients
Select Disconnect All Clients to terminate the all client WLAN
memberships.
Refresh
Select Refresh to update the statistics counters to their latest values.
15.3.13 Policy Based Routing
Controller Statistics
The Policy Based Routing statistics screen displays statistics for selective path packet redirection. PBR can
optionally mark traffic for preferential services (QoS). PBR is applied to incoming routed packets, and a route-map
Wireless Controller and Service Platform System Reference Guide
15 - 88
Statistics
is created containing a set of filters and associated actions. Based on the actions defined in the route-map, packets
are forwarded to the next relevant hop. Route-maps are configurable under a global policy called routing-policy,
and applied to profiles and devices.
To review controller PBR statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select Policy Based Routing.
Figure 15-53 Wireless Controller - Policy Based Routing screen
The Policy Based Routing screen displays the following:
Precedence
Lists the numeric precedence (priority) assigned to each listed PBR
configuration. A route-map consists of multiple entries, each carrying a
precedence value. An incoming packet is matched against the route-map with
the highest precedence (lowest numerical value).
Primary Next
Hop IP
Lists the IP address of the virtual resource that, if available, is used with no
additional route considerations.
Primary Next
Hop State
Displays whether the primary hop is being applied to incoming routed packets.
Secondary Next
Hop IP
If the primary hop is unavailable, a second resource is used. This column lists
the address set for the alternate route in the election process.
Secondary Next
Hop State
Displays whether the secondary hop is being applied to incoming routed
packets.
Wireless Controller and Service Platform System Reference Guide
15 - 89
Statistics
Default Next
Hop IP
If a packet subjected to PBR does not have an explicit route to the destination,
the configured default next hop is used. This is either the IP address of the
next hop or the outgoing interface. Only one default next hop is available. The
difference between the next hop and the default next-hop is in case of former,
PBR occurs first, then destination based routing. In case of the latter, the order
is reverse.
Default Next
Hop State
Displays whether the default hop is being applied to incoming routed packets.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.3.14 Radios
Controller Statistics
The radio Status screen provides radio association data, including radio ID, connected APs, radio type, quality index
and Signal to Noise Ratio (SNR).
To view the radio statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select Radio from the left-hand side of the UI.
Figure 15-54 Wireless Controller - Radio Status screen
The Radios Status screen provides the following information:
Radio
Displays the model and numerical value assigned to the radio as its unique
identifier. Optionally, select the listed radio (it displays as a link) to display
radio configuration information in greater detail.
Radio MAC
Displays the MAC address assigned to the radio as its unique hardware
identifier.
Wireless Controller and Service Platform System Reference Guide
15 - 90
Statistics
Radio Type
Defines whether the radio is operating in the 2.4 GHz or 5 GHz radio band.
Access Point
Displays the administrator assigned system name of each listed Access
Point. Optionally, select the listed Access Point to display Access Point
configuration information in greater detail.
AP Type
Lists the model type of the Access Point housing the listed radio.
State
Displays the current operational state (On/Off) of each radio.
Channel Current
(Config)
Displays the administrator configured channel each listed radio is
broadcasting on.
Power Current
(Config)
Displays the administrator configured power level the radio is using for its
transmissions.
Clients
Displays the number of wireless clients associated with each listed radio.
Refresh
Select Refresh to update the statistics counters to their latest values.
4 Select RF Statistics from the expanded Radios menu.
Figure 15-55 Wireless Controller - Radio RF Statistics screen
The RF Statistics screen provides the following information:
Radio
Displays the name assigned to each listed radio. Each radio name displays
as a link that can be selected to display radio information in greater detail.
Signal
Displays the power of each listed radio signal in dBm.
SNR
Displays the signal to noise ratio (SNR) of each listed radio.
SNR is a measure that compares the level of a desired signal to the level of
background noise. It is defined as the ratio of signal power to the noise
power. A ratio higher than 1:1 indicates more signal than noise.
Tx Physical Layer
Rate
Displays the data transmit rate for each radio’s physical layer. The rate is
displayed in Mbps.
Rx Physical Layer
Rate
Displays the data receive rate for each radio’s physical layer. The rate is
displayed in Mbps.
Avg Retry Rate
Displays the average number of retries for each radio.
Wireless Controller and Service Platform System Reference Guide
15 - 91
Statistics
Error Rate
Displays the average number of retries per packet. A high number
indicates possible network or hardware problems.
Quality Index
Displays the client’s RF quality. The RF quality index is the overall
effectiveness of the RF environment, as a percentage of the connect rate
in both directions as well as the retry rate and the error rate. RF quality
index value can be interpreted as:
0 – 20 - very poor quality
20 – 40 - poor quality
40 – 60 - average quality
60 – 100 - good quality
Refresh
Select Refresh to update the statistics counters to their latest values.
5 Select Traffic Statistics from the expanded Radios menu.
Figure 15-56 Wireless Controller - Radio Traffic Statistics screen
The Traffic Statistics screen provides the following information:
Radio
Displays the name assigned to each listed radio. Each radio name displays
as a link that can be selected to display radio configuration and network
address information in greater detail.
Tx Bytes
Displays the amount of transmitted data in bytes for each radio.
Rx Bytes
Displays the amount of received data in bytes for each radio.
Tx Packets
Displays the amount of transmitted data in packets for each radio.
Rx Packets
Displays the amount of received data in packets for each radio.
Tx User Data Rate
Displays the average speed in kbps of data transmitted to users for each
radio.
Rx User Data Rate
Displays the average speed (in kbps of data) received from users for each
radio.
Tx Dropped
Displays the number of transmissions (packets) dropped by each listed
radio. An excessive number of drops and a high error rate could be an
indicator to lighten the radio’s current load.
Wireless Controller and Service Platform System Reference Guide
15 - 92
Statistics
Traffic Index
Displays the traffic utilization index of each listed radio, which measures
how efficiently the traffic medium is used. It’s defined as the percentage of
current throughput relative to the maximum possible throughput. Traffic
indices are: 0 – 20 (very low utilization), 20 – 40 (low utilization), 40 – 60
(moderate utilization), and 60 and above (high utilization).
Refresh
Select Refresh to update the statistics counters to their latest values.
15.3.15 Mesh
Controller Statistics
The Mesh screen provides detailed statistics on each of Mesh capable client within the selected controller or
service platform’s radio coverage area.
To view Mesh statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select Mesh from the left-hand side of the UI.
Figure 15-57 Wireless Controller - Mesh screen
The Mesh screen displays the following:
Client
Displays the name assigned to each mesh client when added to the
controller or service platform managed network.
Client Radio MAC
Displays the factory encoded Media Access Control (MAC) address of
each device within the controller or service platform managed mesh
network.
Wireless Controller and Service Platform System Reference Guide
15 - 93
Statistics
Portal
Mesh portals are mesh enabled devices connected to an external
network that forward traffic in and out. Mesh devices must find paths
to a portal to access the Internet. When multiple portals exist, the
Mesh point must select one.
Portal Radio MAC
Lists the MAC addresses of those Access Points serving as mesh
portals.
Connect Time
Displays the total (elapsed) connection time for each client within the
controller or service platform managed mesh network.
Refresh
Select Refresh to update the statistics counters to their latest value.
15.3.16 Interfaces
Controller Statistics
The Interface screen provides detailed statistics on each of the interfaces available on the selected controller or
service platform. Use this screen to review the statistics for each interface. Interfaces vary amongst supported
hardware model controllers and service platforms.
To review controller or service platform interface statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Expand the Interfaces menu from the left-hand side of the UI.
4 Select General.
Figure 15-58 Wireless Controller - General Interface screen
Interface Statistics support the following:
Wireless Controller and Service Platform System Reference Guide
15 - 94
Statistics
•
•
•
•
General Interface Details
IPv6 Address
Multicast Groups Joined
Network Graph
15.3.16.1 General Interface Details
Interfaces
The General tab provides information on a selected controller or service platform interface such as its MAC
address, type and TX/RX statistics.
The General table displays the following:
Name
Displays the name of the controller or service platform interface ge1,
up 1etc.
Interface MAC Address
Displays the MAC address of the interface.
IP Address
IP address of the interface.
IP Address Type
Displays the IP address type, either IPv4 or IPv6.
Secondary IP
Displays a list of secondary IP resources assigned to this interface.
Hardware Type
Displays the networking technology.
Index
Displays the unique numerical identifier for the interface.
Access Setting
Displays the VLAN mode as either Access or Trunk.
Access VLAN
Displays the tag assigned to the native VLAN.
Native VLAN
The native VLAN allows an Ethernet device to associate untagged
frames to a VLAN when no 802.1Q frame is included in the frame.
Additionally, the native VLAN is the VLAN untagged traffic is directed
over when using a port in trunk mode.
Tagged Native VLAN
When a frame is tagged, the 12 bit frame VLAN ID is added to the
802.1Q header so upstream Ethernet devices know which VLAN ID the
frame belongs to. The device reads the 12 bit VLAN ID and forwards
the frame to the appropriate VLAN. When a frame is received with no
802.1Q header, the upstream device classifies the frame using the
default or native VLAN assigned to the Trunk port. A native VLAN
allows an Ethernet device to associate untagged frames to a VLAN
when no 802.1Q frame is included in the frame.
Allowed VLANs
Displays the list of allowed virtual interface(s) on this interface.
Administrative Status
Displays whether the interface is currently UP or DOWN.
Operational Status
Lists whether the selected interface is currently UP (operational) or
DOWN.
The IPv6 Mode and MTU table displays the following information:
IPv6 Mode
Lists the current IPv6 mode is utilized.
IPv6 MTU
Lists the IPv6 formatted largest packet size that can be sent over the
interface.
Wireless Controller and Service Platform System Reference Guide
15 - 95
Statistics
The Specification table displays the following information:
Media Type
Displays the physical connection type of the interface.
Medium types include:
Copper - Used on RJ-45 Ethernet ports
Optical - Used on fibre optic gigabit Ethernet ports
Protocol
Displays the routing protocol used by the interface.
MTU
Displays the maximum transmission unit (MTU) setting configured on
the interface. The MTU value represents the largest packet size that
can be sent over the interface. 10/100 Ethernet ports have a maximum
setting of 1500.
Mode
The mode can be either:
Access – The Ethernet interface accepts packets only from native
VLANs.
Trunk – The Ethernet interface allows packets from a list of VLANs you
can add to the trunk.
Metric
Displays the metric associated with the interface’s route.
Maximum Speed
Displays the maximum speed the interface uses to transmit or receive
data.
Admin Speed
Displays the speed the port can transmit or receive. This value can be
either 10, 100, 1000 or Auto. This value is the maximum port speed in
Mbps. Auto indicates the speed is negotiated between connected
devices.
Operator Speed
Displays the current speed of data transmitted and received over the
interface.
Admin Duplex Setting
Displays the administrator’s duplex setting.
Current Duplex Setting
Displays the interface as either half duplex, full duplex or unknown.
The Traffic table displays the following:
Good Octets Sent
Displays the number of octets (bytes) with no errors sent by the
interface.
Good Octets Received
Displays the number of octets (bytes) with no errors received by the
interface.
Good Packets Sent
Displays the number of good packets transmitted.
Good Packets Received
Displays the number of good packets received.
Mcast Pkts Sent
Displays the number of multicast packets sent through the interface.
Mcast Pkts Received
Displays the number of multicast packets received through the
interface.
Ucast Pkts Sent
Displays the number of unicast packets sent through the interface.
Ucast Pkts Received
Displays the number of unicast packets received through the interface.
Bcast Pkts Sent
Displays the number of broadcast packets sent through the interface.
Bcast Pkts Received
Displays the number of broadcast packets received through the
interface.
Packet Fragments
Displays the number of packet fragments transmitted or received
through the interface.
Wireless Controller and Service Platform System Reference Guide
15 - 96
Statistics
Jabber Pkts
Displays the number of packets transmitted through the interface
larger than the MTU.
The Errors table displays the following:
Bad Pkts Received
Displays the number of bad packets received through the interface.
Collisions
Displays the number of collisions over the selected interface.
Late Collisions
A late collision is any collision that occurs after the first 64 octets of
data have been sent. Late collisions are not normal, and usually the
result of out of specification cabling or a malfunctioning device.
Excessive Collisions
Displays the number of excessive collisions. Excessive collisions occur
when the traffic load increases to the point a single Ethernet network
cannot handle it efficiently.
Drop Events
Displays the number of dropped packets transmitted or received
through the interface.
Tx Undersize Pkts
Displays the number of undersized packets transmitted through the
interface.
Oversize Pkts
Displays the number of oversized packets transmitted through the
interface.
MAC Transmit Error
Displays the number of failed transmits due to an internal MAC
sublayer error (that’s not a late collision), due to excessive collisions or
a carrier sense error.
MAC Receive Error
Displays the number of received packets that failed due to an internal
MAC sublayer (that’s not a late collision), an excessive number of
collisions or a carrier sense error.
Bad CRC
Displays the CRC error. The CRC is the 4 byte field at the end of every
frame. The receiving station uses it to interpret if the frame is valid. If
the CRC value computed by the interface does not match the value at
the end of frame, it is considered as a bad CRC.
The Receive Errors table displays the following:
Rx Frame Errors
Displays the number of frame errors received at the interface. A frame
error occurs when data is received, but not in an expected format.
Rx Length Errors
Displays the number of length errors received at the interface. Length
errors are generated when the received frame length was either less or
over the Ethernet standard.
Rx FIFO Errors
Displays the number of FIFO errors received at the interface. First-in
First-out queueing is an algorithm that involves buffering and
forwarding of packets in the order of arrival. FIFO entails no priority.
There is only one queue, and all packets are treated equally. An
increase in FIFO errors indicates a probable hardware malfunction.
Rx Missed Errors
Displays the number of missed packets. Packets are missed when the
hardware received FIFO has insufficient space to store an incoming
packet.
Rx Over Errors
Displays the number of overflow errors received. Overflows occur
when a packet size exceeds the allocated buffer size.
Wireless Controller and Service Platform System Reference Guide
15 - 97
Statistics
The Transmit Errors field displays the following:
Tx Errors
Displays the number of packets with errors transmitted on the
interface.
Tx Dropped
Displays the number of transmitted packets dropped from the
interface.
Tx Aborted Errors
Displays the number of packets aborted on the interface because a
clear-to-send request was not detected.
Tx Carrier Errors
Displays the number of carrier errors on the interface. This generally
indicates bad Ethernet hardware or bad cabling.
Tx FIFO Errors
Displays the number of FIFO errors transmitted at the interface. Firstin First-Out queueing is an algorithm that involves the buffering and
forwarding of packets in the order of arrival. FIFO uses no priority.
There is only one queue, and all packets are treated equally. An
increase in the number of FIFO errors indicates a probable hardware
malfunction.
Tx Heartbeat Errors
Displays the number of heartbeat errors. This generally indicates a
software crash, or packets stuck in an endless loop.
Tx Window Errors
Displays the number of window errors transmitted. TCP uses a sliding
window flow control protocol. In each TCP segment, the receiver
specifies the amount of additional received data (in bytes) the receiver
is willing to buffer for the connection. The sending host can send only
up to that amount. If the sending host transmits more data before
receiving an acknowledgment, it constitutes a window error.
Refresh
Select Refresh to update the statistics counters to their latest value.
15.3.16.2 IPv6 Address
Interfaces
IPv6 is the latest revision of the Internet Protocol (IP) designed to replace IPv4. IPV6 provides enhanced
identification and location information for computers on networks routing traffic across the Internet. IPv6
addresses are composed of eight groups of four hexadecimal digits separated by colons.
To view controller or service platform IPv6 address utilization:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Expand the Interfaces menu from the left-hand side of the UI.
4 Select the IPv6 Address tab.
Wireless Controller and Service Platform System Reference Guide
15 - 98
Statistics
Figure 15-59 Wireless Controller - Interface IPv6 Address screen
5 The IPv6 Addresses table displays the following:
IPv6 Addresses
Lists the IPv6 formatted addresses currently utilized by the controller
or service platform in the selected interface.
Status
Lists the current utilization status of each IPv6 formatted address
currently in use by this controller or service platform’s selected
interface.
Address Type
Lists whether the address is unicast or multicast in its utilization over
the selected controller or service platform interface.
Preferred Lifetime
(seconds)
Lists is the time in seconds (relative to when the packet is sent) the
IPv6 formatted addresses remains in a preferred state on the selected
interface. The preferred lifetime must always be less than or equal to
the valid lifetime.
Valid Lifetime (seconds) Displays the time in seconds (relative to when the packet is sent) the
IPv6 formatted address remains in a valid state on the selected
interface. The valid lifetime must always be greater than or equal to
the preferred lifetime.
6 Select the Link Local Address & Traffic Report tab to assess data traffic and errors discovered in transmitted
and received IPv6 formatted data packets.
Wireless Controller and Service Platform System Reference Guide
15 - 99
Statistics
Figure 15-60 Wireless Controller - Interface IPv6 Address screen
7 Verify the following Local Link Address data for the IPv6 formatted address:
Address
Lists the IPv6 local link address. IPv6 requires a link local address
assigned to every interface the IPv6 protocol is enabled on, even when
one or more routable addresses are assigned.
Status
Lists the IPv6 local link address utilization status and its current
availability.
Preferred Lifetime
(seconds)
Lists is the time in seconds (relative to when the packet is sent) the
local link addresses remains in the preferred state on the selected
interface. The preferred lifetime must always be less than or equal to
the valid lifetime.
Valid Lifetime (seconds) Displays the time in seconds (relative to when the packet is sent) the
local link addresses remains in the valid state on the selected interface.
The valid lifetime must always be greater than or equal to the
preferred lifetime.
8 Verify the following IPv6 formatted Traffic data:
Packets In
Lists the number of IPv6 formatted data packets received on the
selected controller or service platform interface since the screen was
last refreshed.
Packets Out
Lists the number of IPv6 formatted data packets transmitted on the
selected controller or service platform interface since the screen was
last refreshed.
Bytes In
Displays the number of octets (bytes) with no errors received by the
selected interface.
Bytes Out
Displays the number of octets (bytes) with no errors sent by the
selected interface.
Wireless Controller and Service Platform System Reference Guide
15 - 100
Statistics
Bad Packets Received
Displays the number of bad IPv6 formatted packets received through
the interface.
Bad CRC
Displays the CRC error. The CRC is the 4 byte field at the end of every
frame. The receiving station uses it to interpret if the frame is valid. If
the CRC value computed by the interface does not match the value at
the end of frame, it is considered as a bad CRC.
Collisions
Displays the number of collisions over the selected interface. Excessive
collisions occur when the traffic load increases to the point a single
Ethernet network cannot handle it efficiently. A late collision is any
collision that occurs after the first 64 octets of data have been sent.
Late collisions are not normal, and usually the result of out of
specification cabling or a malfunctioning device.
9 Review the following Receive Errors for IPv6 formatted data traffic:
Receive Length Errors
Displays the number of IPv6 length errors received at the interface.
Length errors are generated when the received IPv6 frame length was
either less or over the Ethernet standard.
Receive Over Errors
Displays the number of IPv6 overflow errors received. Overflows occur
when a packet size exceeds the allocated buffer size.
Receive Frame Errors
Displays the number of IPv6 frame errors received at the interface. A
frame error occurs when data is received, but not in an expected
format.
Receive FIFO Errors
Displays the number of IPv6 FIFO errors received at the interface.
First-in First-out queueing is an algorithm that involves buffering and
forwarding of packets in the order of arrival. FIFO entails no priority.
There is only one queue, and all IPv6 formatted packets are treated
equally. An increase in FIFO errors indicates a probable hardware
malfunction.
Receive Missed Errors
Displays the number of missed IPv6 formatted packets. Packets are
missed when the hardware received FIFO has insufficient space to
store an incoming packet.
10 Review the following Transmit Errors for IPv6 formatted data traffic:
Transmit Errors
Displays the number of IPv6 formatted data packets with errors
transmitted on the interface.
Transmit Aborted Errors Displays the number of IPv6 formatted packets aborted on the
interface because a clear-to-send request was not detected.
Transmit Carrier Errors
Displays the number of IPv6 formatted carrier errors on the interface.
This generally indicates bad Ethernet hardware or bad cabling.
Transmit FIFO Errors
Displays the number of IPv6 formatted FIFO errors transmitted at the
interface. First-in First-Out queueing is an algorithm that involves the
buffering and forwarding of packets in the order of arrival. FIFO uses
no priority. There is only one queue, and all packets are treated
equally. An increase in the number of FIFO errors indicates a probable
hardware malfunction.
Transmit Heartbeat
Errors
Displays the number of IPv6 formatted heartbeat errors. This generally
indicates a software crash, or packets stuck in an endless loop.
Wireless Controller and Service Platform System Reference Guide
15 - 101
Statistics
Transmit Window Errors Displays the number of IPv6 formatted window errors transmitted.
TCP uses a sliding window flow control protocol. In each TCP segment,
the receiver specifies the amount of additional received data (in bytes)
the receiver is willing to buffer for the connection. The sending host
can send only up to that amount. If the sending host transmits more
data before receiving an acknowledgment, it constitutes a window
error.
Refresh
Select Refresh to update the statistics counters to their latest value.
15.3.16.3 Multicast Groups Joined
Interfaces
Multicast groups scale to a larger set of destinations by not requiring prior knowledge of who or how many
destinations there are. Multicast devices uses their infrastructure efficiently by requiring the source to send a
packet only once, even if delivered to a large number of devices. Devices replicate a packet to reach multiple
receivers only when necessary.
Controllers and service platforms are free to join or leave a multicast group at any time. There are no restrictions
on the location or members in a multicast group. A host may be a member of more than one multicast group at
any given time and does not have to belong to a group to send messages to members of a group.
To view the controller or service platform multicast group memberships on the selected interface:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Expand the Interfaces menu from the left-hand side of the UI.
4 Select Multicast Groups Joined.
Wireless Controller and Service Platform System Reference Guide
15 - 102
Statistics
Figure 15-61 Wireless Controller - Interface Multicast Groups Joined screen
5 The screen displays the following:
Group
Lists the name of existing multicast groups whose current members
share multicast packets with one another on this selected interface as
a means of collective interoperation.
Users
Lists the number of devices currently interoperating on this interface
in each listed multicast group. Any single device can be a member of
more then one group at a time.
6 Periodically select Refresh to update the screen’s counters to their latest values.
Wireless Controller and Service Platform System Reference Guide
15 - 103
Statistics
15.3.16.4 Network Graph
Interfaces
The Network Graph tab displays statistics the controller or service platform continuously collects for its interfaces.
Even when the interface statistics graph is closed, data is still collected. Display the interface statistics graph
periodically for assessing the latest interface information. Up to three different stats can be selected and displayed
within the graph.
To view a detailed graph for an interface, select an interface and drop it on to the graph. The graph displays Port
Statistics as the Y-axis and the Polling Interval as the X-axis. Use the Polling Interval from the drop-down menu to
define the intervals for which data is displayed on the graph.
To view the Interface Statistics graph:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Expand the Interfaces menu from the left-hand side of the UI.
4 Select Network Graph. Use the Parameters drop-down menu to specify what’s trended in the graph.
Figure 15-62 Wireless Controller - Interface Network Graph screen
Wireless Controller and Service Platform System Reference Guide
15 - 104
Statistics
15.3.17 Border Gateway Protocol (BGP) Statistics
Controller Statistics
Border Gateway Protocol (BGP) is an inter-ISP routing protocol which establishes routes between ISPs. ISPs use
BGP to exchange routing and reachability information between Autonomous Systems (AS) on the Internet. BGP
makes routing decisions based on paths, network policies and/or rules configured by network administrators. The
primary role of a BGP system is to exchange network reachability information with other BGP peers. This
information includes information on AS that the reachability information traverses. This information is sufficient to
create a graph of AS connectivity from which routing decisions can be created and rules enforced.
An Autonomous System (AS) is a set of routers under the same administration that use Interior Gateway Protocol
(IGP) and common metrics to define how to route packets within the AS. AS uses inter-AS routing to route
packets to other ASs. For an external AS, an AS appears to have a single coherent interior routing plan and
presents a consistent picture of the destinations reachable through it.
Routing information exchanged through BGP supports only destination based forwarding (it assumes a router
forwards packets based on the destination address carried in the IP header of the packet).
BGP uses TCP as its transport protocol. This eliminates the need to implement explicit update fragmentation,
retransmission, acknowledgement, and sequencing. BGP listens on TCP port 179. The error notification mechanism
used in BGP assumes that TCP supports a graceful close (all outstanding data is delivered before the connection is
closed).
NOTE: BGP is only supported on RFS6000 and NX9500 model controllers and
service platforms.
BGP statistics are available to assist an administrator in assessing the status of the service platforms’s BGP feature
and its neighbor BGP peers. Much of the configuration information can be filtered from the Route Filters screen.
To review BGP statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select BGP from the left-hand side of the UI. The BGP Summary tab displays by default.
Wireless Controller and Service Platform System Reference Guide
15 - 105
Statistics
Figure 15-63 Wireless Controller - BGP - Summary screen
The Summary tab displays the following:
Neighbor
Lists the IP address of neighbor BGP supported devices.
ASN
Lists the Autonomous System Number (ASN) assigned to each listed
neighbor BGP peer. ASN is a set of routers under the same administration
that use Interior Gateway Protocol (IGP) and common metrics to define
how to route packets
Msg Sent
Lists the number of messages sent out of this BGP peer.
Msg Received
Lists the number of messages received by this BGP peer.
In Queue
Lists the number of messages in the controller or service platform queue
that have not yet been read (processed).
Out Queue
Lists the number of messages in the controller or service platform queue
that have not yet been sent.
Status
Displays the status of each listed BGP neighbor as Active or Disabled.
Uptime
Displays the time duration in HH:MM:SS format since the connection to this
neighbor BGP peer was established.
4 Periodically select Refresh to update the screen’s counters to their latest value.
5 Select the Neighbor tab.
Wireless Controller and Service Platform System Reference Guide
15 - 106
Statistics
Figure 15-64 Wireless Controller - BGP - Neighbor screen
The Neighbor tab displays the following BGP neighbor information:
Neighbor
Lists the IP address of neighbor BGP supported peer controllers or service
platforms. Each IP address displays as a link to display BGP supported
device data in greater detail.
Remote AS
Lists the AS number configured on this BGP neighbor. An Autonomous
System (AS) is a set of routers under the same administration that use
Interior Gateway Protocol (IGP) and common metrics to define how to
route packets within the AS.
Local AS
Lists the AS number (1 - 4,294,967,295) configured on this BGP wireless
controller or service platforms.
MD5 Enabled
A green check defines MD5 authentication enabled on the listed BGP
neighbor. A red X means disabled. MD5 is a message digest algorithm
using a cryptographic hash producing a 128-bit (16-byte) hash value,
usually expressed in text as a 32 digit hexadecimal number. MD5 has been
utilized in a wide variety of cryptographic applications, and is also
commonly used to verify data integrity.
Link Type
Lists the type of BGP link. Displays internal if the link type is iBGP. Displays
external if the link type is eBGP. iBGP exchanges routing table information
between routers within an autonomous system. eBGP exchanges routing
table information between hosts outside an autonomous system.
Status
Displays the current Active or Inactive state of each listed BGP neighbor
device.
Uptime
Displays the uptime for each listed BGP neighbor.
Remote Router
Lists the IP address used by the BGP remote router resource as a network
identifier.
Hold Time
Displays the duration, in seconds, for the hold (delay) of packet
transmissions to each listed BGP neighbor device.
Keepalive
Displays the duration, in seconds, for the keep alive timer used to maintain
the connection to each listed BGP neighbor device.
Wireless Controller and Service Platform System Reference Guide
15 - 107
Statistics
Clear Routes
Select the Clear Retries item (within the table) this to reset and clear all
routes received from this BGP neighbor.
6 Optionally select the IP address of a listed BGP neighbor device to launch the following screen for more
granular device information for the selected peer device:
Figure 15-65 Wireless Controller - BGP - Neighbor - Statistics screen
The BGP neighbor Statistics screen displays route information for the following kinds of routes:
• Advertised – Displays route information for routes advertised to the selected neighbor device.
• Received – Displays route information for routes received from the selected neighbor device.
• Routes – Displays the route information for routes learned from the selected neighbor device.
7 Refer to the following for details on the displayed route. The fields are common to all the screens.
Route Status
Displays the status of this route. Route statuses include:
Suppressed – This route has been suppressed.
Damped – This route has been damped due to flapping.
History - This route is kept in memory to retain flap-dampening statistics.
This route is not currently announced by the peer.
Valid – This route is a valid route.
Best – This route is the best route of all the routes utilized.
RIB Failure - A route with better administrative distance is already present,
a memory failure exists or the number of routes in VPN routing/forwarding
(VRF) exceeds the route-limit configured under the VRF instance.
Removed – This route has been removed from the routes list and is no
longer available to BGP supported neighbor devices.
Network
Displays network information for this route.
Next Hop
Displays the IP address of the next hop in this route.
Wireless Controller and Service Platform System Reference Guide
15 - 108
Statistics
Local Pref
Lists the IP address of this controller or service platform’s preferred next
hop for the route.
Weight
Displays the weight assigned to this route. Weight is used to decide the
preferred route when the same route is learned from multiple neighbors.
The route with the highest weight is always chosen.
Metric
Lists a measure (metric) of the quality of the path. A lower value indicates
a better path.
AS-Path
Displays the AS Path information for this route.
Origin
Displays the IP address of the route’s origin.
8 Select the Refresh button to update the information displayed in this screen to the latest values. Use the Exit
button to exit to the Neighbor screen.
9 Select Route Filters tab.
This screen provides eight (8) different filters for viewing route statistics. Route statistics can be filtered on
eight (8) different parameters.
Figure 15-66 Wireless Controller - BGP - Route Filter screen
The Route Filters tab supports the following route filters:
• BGP Stats Details – Routes are filtered on BGP statistics details.
• Community List – Routes are filtered on the community lists included in each route.
• Community – Routes are filtered on the community information included in each route,
• Expanded Community List – Routes are filtered on the expanded community information included in each
route.
• Prefix List – Routes are filtered on the prefix list included in each route.
• Filter List – Routes are filtered on the filter list included in each route.
• Regular Expression – Routes are filtered based on regular expressions.
• Route Map – Routes are filtered on the route map information included in each route.
10 Select BGP Stats Detail from the Select Filter Type list.
Wireless Controller and Service Platform System Reference Guide
15 - 109
Statistics
Figure 15-67 Wireless Controller - BGP - Route Filter - BGP Stats Detail
11 Use the Type Specific Network field to filter statistics based on the provided IP or Network information. Select
Show Details to display the list of filtered routes.
Route Status
Displays the status of this route. Route status options include:
Suppressed – This route has been suppressed.
Damped – This route has been damped due to flapping.
History - This route is kept in memory to retain flap-dampening statistics.
This route is not currently announced by the peer.
Valid – This route is a valid route.
Best – This route is the best route of all routes.
RIB Failure – A route with better administrative distance is already present,
a memory failure exists or the number of routes in VPN routing/forwarding
(VRF) exceeds the route-limit configured under the VRF instance.
Removed – This route has been removed from the routes list.
Network
Displays network information for this route.
Next Hop
Displays the IP address of the next hop resource utilized in this route.
Local Pref
Lists the IP address of this controller or service platform’s preferred next
hop for this route. The local preference indicates the preferred path when
there are multiple paths to the same destination. The path having the
highest preference value is preferred. The preference value is sent to all
routers and access servers in the local AS.
Weight
Displays the weight assigned to this route. Weight is used to decide the
preferred route when the same route is learned from multiple neighbors.
The route with the highest weight is always chosen.
Metric
Lists a measure (metric) of the quality of the path. A lower value indicates
a better path. This value is the Multi Exit Discriminator (MED) evaluated by
BGP during the best path selection process.
Path
Displays path information for this route.
Origin
Displays the IP address of the origin for this route.
12 Select Community List from the Select Filter Type list.
Wireless Controller and Service Platform System Reference Guide
15 - 110
Statistics
Figure 15-68 Wireless Controller - BGP - Route Filter - Community List
13 Use the Type Community List field to filter the statistics based on the community type of the route. Select
Show Details to display the list of filtered routes.
NOTE: The following table is common to these filter types:
Community List
Community
Prefix List
Filter List
Regular Expression
Route Map
Route Status
Displays the status of this route. The route status could be one of:
Suppressed – This route has been suppressed.
Damped – This route has been damped due to flapping.
History - This route is kept in memory to retain flap-dampening statistics.
This route is not currently announced by the peer.
Valid – This route is a valid route.
Best – This route is the best route of all routes.
RIB Failure – A route with better administrative distance is already present,
a memory failure exists or the number of routes in VPN routing/forwarding
(VRF) exceeds the route-limit configured under the VRF instance.
Removed – This route has been removed from the routes list.
Network
Displays network information for this route.
Next Hop
Displays the IP address of the next hop in this route.
Local Pref
Lists the IP address of this controller or service platform’s preferred next
hop for this route.
The local preference indicates the preferred path when there are multiple
paths to the same destination. The path having the highest preference
value is preferred. This preference value is sent to all routers and access
servers in the local AS.
Weight
Displays the weight assigned to this route. Weight is used to decide the
preferred route when the same route is learned from multiple neighbors.
The route with the highest weight is always chosen.
Metric
Lists a measure of the quality of the path. A lower value indicates a better
path. This value is the Multi Exit Discriminator (MED) evaluated by BGP
during the best path selection process.
AS-Path
Displays AS path information for this route.
Origin
Displays the IP address of the origin for this route.
Wireless Controller and Service Platform System Reference Guide
15 - 111
Statistics
Select Community from the Select Filter Type list.
Figure 15-69 Wireless Controller - BGP - Route Filter - Community
14 Use the Type Community drop-down menu to filter the statistics based on the community of the route. Routes
can be filtered on:
• local-AS - Displays routes that prevent the transmission of packets outside the local AS.
• no-advertise - Displays routes not advertised to any peer, either internal or external.
• no-export - Displays routes not advertised to BGP peers, keeping this route within an AS.
• aa:nn - Filters routes based on the AS Number specified. The first part (aa) represents the AS number. The
second part (nn) represents a 2-byte number. Routes matching this number are filtered.
15 Select Show Details to display the list of filtered routes.
16 Select Prefix List from the Select Filter Type list.
Figure 15-70 Wireless Controller - BGP - Route Filter - Prefix List
17 Use the Type Prefix list field to filter the statistics based on the prefix of the route. Select Show Details to
display the list of filtered routes.
18 Select Filter List from the Select Filter Type list.
Figure 15-71 Wireless Controller - BGP - Route Filter - Filter List
19 Use the Type Filter List field to filter the statistics based on the filter list of the route. Select Show Details to
display the list of filtered routes.
20 Select Regular Expression from the Select Filter Type list.
Figure 15-72 Wireless Controller - BGP - Route Filter - Regular Expression
Wireless Controller and Service Platform System Reference Guide
15 - 112
Statistics
21 Use the Type Regular Expression field to filter the routes based on regular expressions. Select Show Details to
display the list of filtered routes.
22 Select Route Map from the Select Filter Type list.
Figure 15-73 Wireless Controller - BGP - Route Filter - Route Map
23 Use the Type Route Map field to filter the routes based on route maps (enhanced packet filters). Select Show
Details to display the list of filtered routes.
24 Select Expanded Community List from the Select Filter Type list.
Figure 15-74 Wireless Controller - BGP - Route Filter - Expanded Community
25 Use the Type Expanded list to filter routes based on route-maps. Select Show Details to display a list of filtered
routes.
26 Select State tab.
Figure 15-75 Wireless Controller - BGP - State
The State screen displays the following:
Maximum Routes
Allowed
Lists the maximum number of routes allowed on the selected BGP wireless
controller or service platforms.
Routes Received
Lists the number of routes received from all the BGP peers.
Current Ignore
Count
Lists the number of times the BGP daemon has been put in the Ignore
state.
Ignore Count
Allowed
Lists the maximum number of times the BGP daemon can be put in an
Ignore state before entering permanent ignore state.
Reset Time
Lists the time after which ignore state count is reset to 0 and BGP
daemon continues in the state it was in previously.
Wireless Controller and Service Platform System Reference Guide
15 - 113
Statistics
Ignore Time
Lists the time duration after which BGP daemon shall exit the Ignore state.
Current State
Lists the current state of this BGP route utilized on the wireless controller
or service platforms.
Select Refresh to update the statistic counters to their latest values.
15.3.18 RAID Statistics
Controller Statistics
RAID statistics are available to assist an administrator in assessing the status of the service platform’s RAID array,
including each physical drive. The information within the RAID statistics screen is polled by the service platform
from the RAID controller hardware, then forwarded to the WiNG operating system.
NOTE: RAID controller drive arrays are available within NX7500 and NX9000 series
service platforms (NX9000, NX9500 and NX9510 models) only. However, they can
be administrated on behalf of a profile by a different model service platform or
controller.
For information on setting the service platform drive array configuration as well as the diagnostic behavior of its
member drives, refer to RAID Operations on page 14-19.
To view RAID statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select RAID from the left-hand side of the UI.
Wireless Controller and Service Platform System Reference Guide
15 - 114
Statistics
Figure 15-76 Wireless Controller - RAID Status screen
4 The Status field displays the following:
Size
Lists the size of the RAID drive array. The size is the total physical
memory space available on the two physical drives comprising the
active RAID controller.
State
Displays whether the drive array is currently in an optimal operation
state or degraded, and in need of administration to perform
diagnostics and perhaps prepare a standby drive for hot spare
replacement.
Alarm Enable
Displays whether the RAID alarm has been enabled to sound the
service platform’s chassis alarm upon detection of a RAID controller
degradation event. The RAID alarm is enabled by default. For
information on enabling or disabling the service platform RAID alarm,
see General Profile Configuration on page 8-5.
5 Refer to the Last Check field to assess the time, progress and results of the RAID array’s most recent
consistency check:
Date
Lists the date and time of the RAID controller’s most recent
consistency check on the integrity of the drive array.
Result
Displays true for a successful RAID array consistency check and false
for a failed consistency check. A false indication would trigger the
service platform’s chassis alarm if RAID alarm is enabled.
Progress
Displays the progress of an in process consistency check in both
percentage complete and minutes utilized (for example, 78%/116min).
Wireless Controller and Service Platform System Reference Guide
15 - 115
Statistics
6 Use the Physical Drives field to assess the RAID array’s drive utilization and whether the drives are currently
online:
Slot
Lists RAID array’s drive slot utilization. Since there is only one RAID
array controller reporting status to the service platform, its important
to know if other drive slots house hot spare drives available as
additional resources should one of the dedicated drives fail.
State
Displays whether a physical slot within the RAID array has a drive
installed, and whether the drive is currently online.
7 Select Refresh at any time to update either the screen’s statistic counters to their latest value.
15.3.19 Power Status
Controller Statistics
Periodically review the controller or service platform power status to assess the power budget and PoE capability
(if supported).
PoE is supported on RFS4000 and RFS6000 model controllers.
To view Power Status statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select Power Status from the left-hand side of the UI.
Wireless Controller and Service Platform System Reference Guide
15 - 116
Statistics
Figure 15-77 Wireless Controller - Power Status screen
The Power Status provides the following information for supported controllers or service platforms:
Device
Displays the administrator assigned device name for the controller or
service platform.
Temperature
Displays the internal system temperature for the controller or service
platform.
PoE Enabled
Displays whether or not Power over Ethernet (PoE) is enabled for the
controller or service platform. When enabled, the controller or service
platform supports 802.3af PoE on each of its ge ports. The PoE allows
users to monitor port power consumption and configure power usage
limits and priorities for each ge port.
Power Limit
Displays the total watts available for Power over Ethernet on the
controller or service platform. The value should be between 0 - 40
watts.
Port Name
Displays the GE port name on the controller or service platform.
Priority
Displays the power priority for the listed port as either Critical, High or
Low. This is the priority assigned to this port versus the power
requirements of the other supports available on the controller or
service platform.
System Voltage
Displays the total current system voltage for the controller or service
platform.
Wireless Controller and Service Platform System Reference Guide
15 - 117
Statistics
System Guard Band
Displays the amount of voltage allocated to a System Guard Band. A
System Guard Band is an amount of voltage allocated to prevent
power loss or cycling on connected PoE devices when the power draw
goes above the PoE Power Budget.
Power Budget
Displays the total amount of voltage on the controller or service
platform allocated for use in Power over Ethernet.
Power Consumption
Displays the current amount of power being consumed by PoE devices
on the controller or service platform.
Non-Standard PoE
power budget
Displays the amount of voltage allocated to non 802.3af or 802.3at
PoE devices.
Port Name
Displays the GE port name for each PoE capable port on the controller
or service platform.
Voltage
Displays the voltage in use by each PoE capable port on the controller
or service platform.
Current
Displays the amount of current in milliwatts being used by each PoE
capable port on the controller or service platform.
Power
Displays whether or not each PoE capable port on the controller or
service platform is providing power.
Class Type
Displays the PoE class type including 802.3af, 802.3at and nonstandard PoE types.
Port Status
Displays the status of each PoE capable port on the controller or
service platform. It will display either Enabled or Disabled.
Refresh
Select Refresh to update the statistics counters to their latest value.
15.3.20 PPPoE
Controller Statistics
The PPPoE statistics screen displays stats derived from the PPPoE capable controller or service platform’s access
to high-speed data and broadband networks. PPPoE uses standard encryption, authentication, and compression
methods as specified by the PPPoE protocol. PPPoE enables point-to-points connection to an ISP over existing
Ethernet interface.
Power over Ethernet is supported on RFS4000 and RFS6000 model controllers. When enabled, the controller
supports 802.3af PoE on each of its ge ports.
To review a selected controller or service platform’s PPPoE statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select PPPoE from the left-hand side of the UI.
Wireless Controller and Service Platform System Reference Guide
15 - 118
Statistics
Figure 15-78 Wireless Controller - PPPoE screen
The Configuration Information field screen displays the following:
Shutdown
Displays whether a high speed client mode point-to-point connection has
been enabled using the PPPoE protocol. A green checkmark defines the
connection as enabled. A red X defines the connection as shutdown.
Service
Lists the 128 character maximum PPPoE client service name provided by
the service provider.
DSL Modem
Network (VLAN)
Displays the PPPoE VLAN (client local network) connected to the DSL
modem. This is the local network connected to DSL modem.
Authentication Type Lists authentication type used by the PPPoE client whose credentials must
be shared by its peer. Supported authentication options include None, PAP,
CHAP, MSCHAP, and MSCHAP-v2.
Username
Displays the 64 character maximum username used for authentication
support by the PPPoE client.
Password
Displays the 64 character maximum password used for authentication by
the PPPoE client.
Client Idle Timeout
The controller or service platform uses the listed timeout so it does not sit
idle waiting for input from a PPPoE client and the server that may never
come.
Keep Alive
If a keep alive is utilized (enabled displays a green checkmark, disabled a
red X) the point-to-point connect to the PPPoE client is continuously
maintained and not timed out.
Maximum
Transmission Unit
(MTU)
Displays the PPPoE client maximum transmission unit (MTU) from 500 1,492. The MTU is the largest physical packet size in bytes a network can
transmit. Any messages larger than the MTU are divided into smaller
packets before being sent. A PPPoE client should be able to maintain its
point-to-point connection for this defined MTU size.
Wireless Controller and Service Platform System Reference Guide
15 - 119
Statistics
4 Refer to the Connection Status field.
The Connection Status table lists the MAC address, SID, Service information, MTU and status of each route
destination peer. To provide this point-to-point connection, each PPPoE session learns the Ethernet address of
a remote PPPoE client, and establishes a session. PPPoE uses both a discover and session phase to identify a
client and establish a point-to-point connection. By using such a connection, a wireless WAN failover is
available to maintain seamless network access if the Wired WAN were to fail
5 Select the Refresh button to update the screen’s statistics counters to their latest values.
15.3.21 OSPF
Controller Statistics
Open Shortest Path First (OSPF) is a link-state interior gateway protocol (IGP). OSPF routes IP packets within a
single routing domain (autonomous system), like an enterprise LAN. OSPF gathers link state information from
neighbor routers and constructs a network topology. The topology determines the routing table presented to the
Internet Layer which makes routing decisions based solely on the destination IP address found in IP packets.
Refer to the following for detailed descriptions of the tabs available within the OSPF statistics screen:
• OSPF Summary
• OSPF Neighbors
• OSPF Area Details
• OSPF Route Statistics
• OSPF Interface
• OSPF State
15.3.21.1 OSPF Summary
OSPF
To view OSPF summary statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select OSPF from the left-hand side of the UI.
Wireless Controller and Service Platform System Reference Guide
15 - 120
Statistics
Figure 15-79 Wireless Controller - OSPF Summary tab
The Summary tab describes the following data fields:
General
The general field displays the router ID assigned for this OSPF connection,
RFC compliance information and LSA data.
ABR/ASBR
Details
Lists Autonomous System Boundary Router (ASBR) data relevant to OSPF
routing, including the ASBR, ABR and ABR type. An Area Border Router
(ABR) is a router that connects one or more areas to the main backbone
network. It is considered a member of all areas it is connected to. An ABR
keeps multiple copies of the link-state database in memory, one for each area
to which that router is connected An ASBR is a router connected to more than
one Routing protocol and exchanges routing information with routers in other
protocols. ASBRs typically also run an exterior routing protocol (for example,
BGP), or use static routes, or both. An ASBR is used to distribute routes
received from other, external ASs throughout its own autonomous system.
Routers in other areas use ABR as next hop to access external addresses. Then
the ABR forwards packets to the ASBR announcing the external addresses
SPF
Refer to the SPF field to assess the status of the shortest path forwarding
(SFF) execution, last SPF execution, SPF delay, SPF due in, SPF hold multiplier,
SPF hold time, SPF maximum hold time and SPF timer due flag.
Wireless Controller and Service Platform System Reference Guide
15 - 121
Statistics
Stub Router
The summary screen displays information relating to stub router
advertisements and shutdown and startup times. An OSPF stub router
advertisement allows a new router into a network without immediately routing
traffic through the new router and allows a graceful shut down or reload a
router without dropping packets that are destined for other networks. This
feature introduces three configuration options that allow you to configure a
router that is running the OSPF protocol to advertise a maximum or infinite
metric to all neighbors.
4 Select the Refresh button to update the statistics counters to their latest values.
15.3.21.2 OSPF Neighbors
OSPF
OSPF establishes neighbor relationships to exchange routing updates with other routers. A controller or service
platform supporting OSPF sends hello packets to discover neighbors and elect a designated router. The hello
packet includes link state information and list of neighbors. OSPF is savvy with layer 2 topologies. If on a point-topoint link, OSPF knows it is sufficient, and the link stays up. If on a broadcast link, the router waits for election
before determining if the link is functional.
To view OSPF neighbor statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select OSPF from the left-hand side of the UI.
4 Select the Neighbor Info tab.
Figure 15-80 Wireless Controller - OSPF Neighbor Info tab
Wireless Controller and Service Platform System Reference Guide
15 - 122
Statistics
The Neighbor Info tab describes the following:
Router ID
Displays the router ID assigned for this OSPF connection. The router is a level
three Internet Protocol packet switch. This ID must be established in every
OSPF instance. If not explicitly configured, the highest logical IP address is
duplicated as the router identifier. However, since the router identifier is not an
IP address, it does not have to be a part of any routable subnet in the
network.
Neighbor
Priority
Displays each listed neighbor’s priority in respect to becoming the designated
router managing the OSPF connection. The designated router is the router
interface elected among all routers on a particular multi-access network
segment.
IF Name
Lists the name assigned to the router interface used to support connections
amongst OSPF enabled neighbors.
Neighbor
Address
Lists the IP address of the neighbor sharing the router interface with each
listed router ID.
Request Count
Lists the connection request count (hello packets) to connect to the router
interface, discover neighbors and elect a designated router.
Retransmit
Count
Lists the connection retransmission count attempted in order to connect to the
router interface, discover neighbors and elect a designated router. A
designated router (DR) is the router interface elected among all routers on a
particular multi-access network segment, generally assumed to be broadcast.
Dead Time
Lists the dead time between neighbors in the network topology that are
currently utilizing the listed router ID.
Self Neighbor
State
Displays the self-neighbor status assessment used to discover neighbors and
elect a designated router.
Source Address
Displays the single source address used by all neighbor routers to obtain
topology and connection status. This form of multicasting significantly reduces
network load.
Summary Count
Routes that originate from other areas are called summary routes. Summary
routes are not flooded in a totally stubby or NSSA totally stubby area.
5 Select the Refresh button to update the statistics counters to their latest values.
15.3.21.3 OSPF Area Details
OSPF
An OSPF network is subdivided into routing areas (with 32 bit area identifiers) to simplify administration and
optimize traffic utilization. Areas are logical groupings of hosts and networks, including routers having interfaces
connected to an included network. Each area maintains a separate link state database whose information may be
summarized towards the rest of the network. An OSPF Area contains a set of routers exchanging Link State
Advertisements (LSAs) with others in the same area. Areas limit LSAs and encourage aggregate routes. Areas are
identified by 32-bit IDs, expressed either in decimal, or octet-based dot-decimal notation.
To view OSPF area statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select OSPF from the left-hand side of the UI.
Wireless Controller and Service Platform System Reference Guide
15 - 123
Statistics
4 Select the Area Details tab.
Figure 15-81 Wireless Controller - OSPF Area Details tab
The Area Details tab describes the following:
OSPF Area ID
Lists the connection request count (hello packets) to connect to the router
interface, discover neighbors and elect a designated router.
OSPF INF
Lists the interface ID (virtual interface for dynamic OSPF routes) supporting
each listed OSPF area ID.
Fully adj
numbers
Fully adjusted numbers strip away the effects of other non OSPF and LSA
factors and events, leaving only relevant OSPF area network route events
counted.
Auth Type
Lists the authentication schemes used to validate the credentials of dynamic
route connections and their areas.
Total LSA
Lists the Link State Advertisements (LSAs) of all entities using the dynamic
route (in any direction) in the listed area ID.
Router LSA
Lists the Link State Advertisements of the router supporting each listed area
ID. The router LSA reports active router interfaces, IP addresses, and
neighbors.
Network LSA
Displays which routers are joined together by the designated router on a
broadcast segment (e.g. Ethernet). Type 2 LSAs are flooded across their own
area only. The link state ID of the type 2 LSA is the IP interface address of the
designated route.
Summary LSA
The summary LSA is generated by ABR to leak area summary address info
into another areas. ABR generates more than one summary LSA for an area if
the area addresses cannot be properly aggregated by only one prefix.
ASBR Summary
LSA
Originated by ABRs when an ASBR is present to let other areas know where
the ASBR is. These are supported just like summary LSAs.
Wireless Controller and Service Platform System Reference Guide
15 - 124
Statistics
NSSA LSA
Routers in a Not-so-stubby-area (NSSA) do not receive external LSAs from
Area Border Routers, but are allowed to send external routing information for
redistribution. They use type 7 LSAs to tell the ABRs about these external
routes, which the Area Border Router then translates to type 5 external LSAs
and floods as normal to the rest of the OSPF network.
Redistribution into an NSSA area creates a special type of LSA known as TYPE
7, which can exist only in an NSSA area. An NSSA ASBR generates this LSA,
and an NSSA ABR router translates it into type 5 LSA which gets propagated
into the OSPF domain.
Opaque Area
LSA CSUM
Displays the Type-10 opaque link area checksum with the complete contents
of the LSA.
Opaque link
CSUM
Displays the Type-10 opaque link checksum with the complete contents of the
LSA.
5 Select the Refresh button to update the statistics counters to their latest values.
15.3.21.4 OSPF Route Statistics
OSPF
Refer to the Routes tab to assess the status of OSPF Border Routes, External Routes, Network Routes and Router
Routes.
To view OSPF route statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select OSPF from the left-hand side of the UI.
4 Select the Routes tab. Border Routes display by default.
An area border router (ABR) connects (links) more than one area. Usually an ABR is used to connect nonbackbone areas to the backbone. If OSPF virtual links are used an ABR will also be used to connect the area
using the virtual link to another non-backbone area. Border routes use internal OSPF routing table entries to an
ABR or Autonomous System Boundary Router (ASBR). Border routers maintain an LSDB for each area
supported. They also participate in the backbone.
5 Refer to External Routes tab.
Wireless Controller and Service Platform System Reference Guide
15 - 125
Statistics
Figure 15-82 Wireless Controller - OSPF External Routes tab
External routes are external to area, originate from other routing protocols (or different OSPF processes) and
are inserted into OSPF using redistribution. A stub area is configured not to carry external routes. Each external
route can be tagged by the advertising router, enabling the passing of additional information between routers.
Each external route can also be tagged by the advertising router, enabling the passing of additional
information between routers on the boundary of the autonomous system.
The External route tab displays a list of external routes, the area impacted, cost, path type, tag and type 2 cost.
Cost factors may be the distance of a router (round-trip time), network throughput of a link, or link availability
and reliability, expressed as simple unit-less numbers. This provides a dynamic process of traffic load balancing
between routes of equal cost.
6 Refer to the Network Routes tab.
Wireless Controller and Service Platform System Reference Guide
15 - 126
Statistics
Figure 15-83 Wireless Controller - OSPF Network Routes tab
Network routes support more than two routers, with the capability of addressing a single physical message to
all attached routers (broadcast). Neighboring routers are discovered dynamically using OSPF hello messages.
This use of the hello protocol takes advantage of broadcast capability. An OSPF network route makes further
use of multicast capabilities, if they exist. Each pair of routers on the network is assumed to communicate
directly.
The network tab displays the network name, impacted OSPF area, cost, destination and path type.
7 Select the Router Routes tab.
Wireless Controller and Service Platform System Reference Guide
15 - 127
Statistics
Figure 15-84 Wireless Controller - OSPF Router Routes tab
An internal (or router) route connects to one single OSPF area. All of its interfaces connect to the area in which
it is located and does not connect to any other area.
8 Select the Refresh button (within any of the four OSPF Routes tabs) to update the statistics counters to their
latest values
15.3.21.5 OSPF Interface
OSPF
An OSPF interface is the connection between a router and one of its attached networks. An interface has state
information associated with it, which is obtained from the underlying lower level protocols and the routing
protocol itself. A network interface has associated a single IP address and mask (unless the network is an
unnumbered point-to-point network). An interface is sometimes also referred to as a link.
To view OSPF interface statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select OSPF from the left-hand side of the UI.
4 Select the OSPF Interface tab.
Wireless Controller and Service Platform System Reference Guide
15 - 128
Statistics
Figure 15-85 Wireless Controller - OSPF Interface tab
The OSPF Interface tab describes the following:
Interface Name
Displays the IP addresses and mask defined as the virtual interface for
dynamic OSPF routes. Zero config and DHCP can be used to generate route
addresses, or a primary and secondary address can be manually provided.
Interface Index
Lists the numerical index used for the OSPF interface. This interface ID is in the
hello packets establishing the OSPF network connection.
Bandwidth(kb)
Lists the OSPF interface bandwidth (in Kbps) from 1 - 10,000,000.
Interface flags
Displays the flag used to determine the interface status and how to proceed.
MTU
Lists the OSPF interface maximum transmission unit (MTU) size. The MTU is
the largest physical packet size (in bytes) a network can transmit. Any packets
larger than the MTU are divided into smaller packets before being sent.
OSPF Enabled
Lists whether OSPF has been enabled for each listed interface. OSPF is
disabled by default.
UP/DOWN
Displays whether the OSPF interface (the dynamic route) is currently up or
down for each listed interface. An OSPF interface is the connection between a
router and one of its attached networks.
5 Select the Refresh button to update the statistics counters to their latest values.
15.3.21.6 OSPF State
OSPF
An OSPF enabled controller or service platform sends hello packets to discover neighbors and elect a designated
router for dynamic links. The hello packet includes link state data periodically updated on all OSPF members. The
controller or service platform tracks link state information to help assess the health of the OSPF dynamic route.
Wireless Controller and Service Platform System Reference Guide
15 - 129
Statistics
To view OSPF state statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select OSPF from the left-hand side of the UI.
4 Select the OSPF State tab.
Figure 15-86 Wireless Controller - OSPF State tab
The OSPF State tab describes the following:
OSPF state
Displays the OSPF link state amongst neighbors within the OSPF topology.
Link state information is maintained in a link-state database (LSDB) which is a
tree image of the entire network topology. Identical copies of the LSDB are
periodically updated through flooding on all OSPF supported nodes. Flooding
is the part of the OSPF protocol that distributes and synchronizes the linkstate database between OSPF routers.
OSPF ignore
state count
Lists the number of times state requests have been ignored between the
controller or service platform and its peers within this OSPF supported
broadcast domain.
OSPF ignore
state monitor
timeout
Displays the timeout that, when exceeded, prohibits the controller or service
platform from detecting changes to the OSPF link state.
OSPF ignore
state timeout
Displays the timeout that, when exceeded, returns the controller or service
platform back to state assessment amongst neighbors in the OSPF topology.
OSPF max
ignore state
count
Displays whether an OSPF state timeout is being ignored and not utilized in
the transmission of state update requests amongst neighbors within the OSPF
topology.
OSPF max routes States the maximum number of routes negotiated amongst neighbors within
the OSPF topology.
Wireless Controller and Service Platform System Reference Guide
15 - 130
Statistics
OSPF routes
received
Lists the routes received and negotiated amongst neighbors within the OSPF
topology.
5 Select the Refresh button to update the statistics counters to their latest values.
15.3.22 L2TPv3
Controller Statistics
Use L2TP V3 to create tunnels for transporting layer 2 frames. L2TP V3 enables a controller or service platform to
create tunnels for transporting Ethernet frames to and from bridge VLANs and physical ports. L2TP V3 tunnels can
be defined between WING devices and other devices supporting the L2TP V3 protocol.
To review a selected controller or service platform’s L2TPv3 statistics:
6 Select the Statistics menu from the Web UI.
7 Select a Wireless Controller node from the left navigation pane.
8 Select L2TPv3 Tunnels.
Figure 15-87 Wireless Controller - L2TPv3 screen
Wireless Controller and Service Platform System Reference Guide
15 - 131
Statistics
The L2TPv3 screen displays the following:
Tunnel Name
Displays the name of each listed L2TPv3 tunnel assigned upon creation. Each
listed tunnel name can be selected as a link to display session data specific to
that tunnel. The Sessions screen displays cookie size information as well as
psuedowire information specific to the selected tunnel. Data is also available to
define whether the tunnel is a trunk session and whether tagged VLANs are
used. The number of transmitted, received and dropped packets also display to
provide a throughput assessment of the tunnel connection. Each listed session
name can also be selected as a link to display VLAN information specific to that
session. The VLAN Details screen lists those VLANs used an interface in L2TP
tunnel establishment.
Local Address
Lists the IP address assigned as the local tunnel end point address, not the
tunnel interface’s IP address. This IP is used as the tunnel source IP
address. If a local address is not specified, the source IP address is chosen
automatically based on the tunnel peer IP address.
Peer Address
Lists the IP address of the L2TP tunnel peer establishing the tunnel
connection.
Tunnel State
States whether the tunnel is Idle (not utilized by peers) or is currently
active.
Peer Host Name
Lists the assigned peer hostname used as matching criteria in the tunnel
establishment process.
Peer Control
Connection ID
Displays the numeric identifier for the tunnel session. This is the peer
pseudowire ID for the session. This source and destination IDs are
exchanged in session establishment messages with the L2TP peer.
Control Connection
ID
Displays the router ID(s) sent in tunnel establishment messages with a
potential peer device.
Up Time
Lists the amount of time the L2TP connection has remained established
amongst peers sharing the L2TPv3 tunnel connection. The Up Time is
displayed in a Days: Hours: Minutes: Seconds: format. If D:0 H:0 M:0 S:0 is
displayed, the tunnel connection is not currently established.
Encapsulation
Protocol
Displays either IP or UDP as the peer encapsulation protocol. The default
setting is IP. UDP uses a simple transmission model without implicit
handshakes. Tunneling is also called encapsulation. Tunneling works by
encapsulating a network protocol within packets carried by the second
network.
Critical Resource
Displays monitored critical resources. Critical resources are device IP
addresses or interface destinations interopreted as critical to the health of
the network. Critical resources allow for the continuous monitoring of
these defined addresses. A critical resource, if not available, can result in
the network suffering performance degradation. A critical resource can be
a gateway, AAA server, WAN interface or any hardware or service on
which the stability of the network depends.
VRRP Group
Lists a VRRP group ID (if utilized). A VRRP group is only enabled when
the establishment criteria is set to vrrp-master. A VRRP master responds
to ARP requests, forwards packets with a destination link MAC layer
address equal to the virtual router MAC layer address, rejects packets
addressed to the IP associated with the virtual router and accepts packets
addressed to the IP associated with the virtual router.
Wireless Controller and Service Platform System Reference Guide
15 - 132
Statistics
Establishment
Criteria
Displays the tunnel establishment criteria for this tunnel. Tunnel
establishment involves exchanging 3 message types (SCCRQ, SCCRP and
SCCN) with the peer. Tunnel IDs and capabilities are exchanged during the
tunnel establishment with the host.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest value.
9 To view per-session statistics for a specific L2TPv3 tunnel, click the Tunnel Name link. The sessions for the
selected L2TPv3 tunnel are displayed.
10 Click the VLAN ID of the desired session to display session statistics.
15.3.23 VRRP
Controller Statistics
The VRRP statistics screen displays Virtual Router Redundancy Protocol (VRRP) configuration statistics supporting
router redundancy in a wireless network requiring high availability.
To review a selected controller or service platform’s VRRP statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select VRRP.
Figure 15-88 Wireless Controller - VRRP screen
Wireless Controller and Service Platform System Reference Guide
15 - 133
Statistics
4 Refer to the Global Error Status field to review the various sources of packet errors logged during the
implementation of the virtual route.
Errors include the mismatch of authentication credentials, invalid packet checksums, invalid packet types,
invalid virtual route IDs, TTL errors, packet length errors and invalid (non matching) VRRP versions.
5 Refer to the Router Operations Summary for the following status:
VRID
Lists a numerical index (1 - 254) used to differentiate VRRP configurations.
The index is assigned when a VRRP configuration is initially defined. This
ID identifies the virtual router a packet is reporting status for. The ID
displays as a link that can optionally selected to list the ID’s VRRP
information in greater detail.
Virtual IP Address
Lists the virtual interface IP address used as the redundant gateway
address for the virtual route.
Master IP Address
Displays the IP address of the elected VRRP master. A VRRP master (once
elected) responds to ARP requests, forwards packets with a destination
link layer MAC address equal to the virtual router MAC address, rejects
packets addressed to the IP address associated with the virtual router and
accepts packets addressed to the IP address associated with the virtual
router.
Interface Name
Displays the interfaces selected to supply VRRP redundancy failover
support.
Version
Display VRRP version 3 (RFC 5798) or 2 (RFC 3768) as selected to set the
router redundancy. Version 3 supports sub-second (centisecond) VRRP
failover and support services over virtual IP.
State
Displays the current state of each listed virtual router ID.
Clear Router Status
Select the Clear Router Status button to clear the Router Operations
Summary table values to zero and begin new data collections.
Clear Global Error
Status
Select the Clear Global Error Status button to clear the Global Error Status
table values to zero and begin new data collections.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
6 Optionally select a VRID to list the ID’s VRRP information in greater detail.
Wireless Controller and Service Platform System Reference Guide
15 - 134
Statistics
Figure 15-89 Wireless Controller - VRRP VRID Detail screen
7 The Configuration field lists the following for the selected VRID:
VRID
Lists this selected ID’s assigned ID. The index is assigned when a VRRP
configuration is initially defined. This ID identifies the virtual router a
packet is reporting status for.
Interface
Displays the interfaces selected to supply VRRP redundancy failover
support.
Version
Displays the VRRP version scheme used with the configuration. VRRP
version 3 (RFC 5798) and 2 (RFC 3768) are selectable to set the router
redundancy. Version 3 supports sub-second (centisecond) VRRP failover
and support services over virtual IP. For more information on the VRRP
protocol specifications (available publicly) refer to http://www.ietf.org/rfc/
rfc3768.txt (version 2) and http://www.ietf.org/rfc/rfc5798.txt (version 3).
Priority
Lists the ID’s numerical value (from 1 - 254) used for the virtual router
master election process. The higher the numerical value, the higher the
priority in the election process.
Delta Priority
Displays the configured priority (by the set value) when the monitored
interface is down. When critical resource monitoring, the configured value
is incremented by the value defined.
CRM Down Action
Lists the critical resource down action applied to this listed VRID.
No. of Virtual IP
Address
Lists the number of virtual interface IP address used as the redundant
gateway address for the virtual route.
Virtual IP Addresses Lists the virtual interface IP address set as the redundant gateway address
for the virtual route.
Wireless Controller and Service Platform System Reference Guide
15 - 135
Statistics
Advertisement
Interval
Lists the interval for unsolicited router assignments.The advertisement
interval is the minimum interval between sending router updates. Sending
too many updates creates flapping of routes leading to possible
disruption.
Sync Group
Lists whether a VRRP sync group is assigned to this VRRP ID’s group of
virtual IP addresses. This triggers VRRP failover if an advertisement is not
received from the virtual masters that are part of this VRRP sync group.
Preempt
Lists whether preempt is enabled for the selected ID. Preempt ensures a
high priority backup router is available to preempt a lower priority backup
router resource. The default setting is enabled. When selected, the
preempt delay option becomes enabled to set the actual delay interval for
pre-emption. This setting determines if a node with a higher priority can
take over all the Virtual IPs from the nodes with a lower priority.
Preempt Delay
If preempt is enabled, this item lists the delay interval (in seconds) for preemption.
8 The Operational State field lists the following for the selected VRID:
Virtual MAC Address Lists the alpha numeric virtual MAC address utilized by the selected VRID.
Local IP Address
This address represents an alternative to an interface IP address. The last
byte of the address (XX) is the VRID, which is different for each virtual
router in the network
Critical Resource
Displays the critical resource currently utilized by the selected VRID.
CRM Status
Lists operational network status of the critical resource used by this VRID.
Sync Group Failure
Lists any sync failures detected with the sync group of virtual IP addresses.
Interface Status
Lists the operational network status of the interfaces selected to supply
VRRP redundancy failover support.
9 The Router Status field lists the following router performance and error data:
Master Transitions
Lists the number of transitions to master router designation that have
occurred with this VRID’s router.
Master Reason
Displays an event message in respect the dedicated VRRP router’s
availability.
Advertisement Pkts
Received
Lists the number of router advertisements received by this selected VRID.
Router advertisements are periodically sent to hosts or sent in response to
solicitation requests. Router advertisements contain prefixes used for link
determination, address configuration and maximum hop limits.
Advertisement
Interval Errors
Lists this VRID’s number of advertisement prefix errors for link
determination, address configuration and maximum hop limits.
Advertisement Pkts
Sent
Lists the number of router advertisements sent by this selected VRID.
Router advertisements are periodically sent to hosts or sent in response to
solicitation requests. Router advertisements contain prefixes used for link
determination, address configuration and maximum hop limits.
Received Pkts in Init Lists the number of packets received by the selected VRID when a router
State
receives a hello packet but the local router ID is not listed in the received
neighbor field. This means bidirectional communication is not been
established.
Wireless Controller and Service Platform System Reference Guide
15 - 136
Statistics
Received Pkts with
Priority Zero
Lists this VRID’s number of received packets with a value of zero.
Sent Pkts with
Priority Zero
Lists this VRID’s number of sent packets with a value of zero.
Address List Errors
Lists the number of router event errors detected where an address that
could not be resolved and bidirectional communication could not be
established.
10 Refer to the Monitor Interface field to assess the names of this VRID’s interface utilization and their respective
statuses.
15.3.24 Critical Resources
Controller Statistics
The Critical Resources statistics screen displays a list of device IP addresses on the network (gateways, routers
etc.). These defined IP addresses are critical to the health of the controller or service platform managed network.
These device addresses are pinged regularly by the Access Point. If there is a connectivity issue, an event is
generated stating a critical resource is unavailable.
To view controller or service platform Critical Resource statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select Critical Resource from the left-hand side of the UI.
Figure 15-90 Wireless Controller - Critical Resource screen
4 Refer to the General field to assess the Monitor Interval and Monitor Using Flows Interval used to poll for
updates from the critical resource IP listed for Source IP For Port-Limited Monitoring. Monitoring Retries before
Marking Resource as DOWN are the number of retry connection attempts permitted before this listed resource
is defined as down (offline).
Wireless Controller and Service Platform System Reference Guide
15 - 137
Statistics
5 Refer to the following List of Critical Resources:
Critical Resource Name
Lists the name of the resource being monitored by the controller or
service platform.
Via
Lists the VLAN used by the critical resource as a virtual interface. the
VLAN displays as a link than can be selected to list configuration and
network address information in greater detail.
Status
Defines the operational state of each listed critical resource VLAN
interface (Up or Down).
Error Reason
Provides an error status as to why the critical resource is not available
over its designated VLAN.
Mode
Defines the operational state of each listed critical resource (up or
down).
Refresh
Select Refresh to update the statistics counters to their latest values.
15.3.25 LDAP Agent Status
Controller Statistics
When LDAP has been specified as an external resource (as opposed to local RADIUS resources) to validate PEAPMS-CHAP v2 authentication requests, user credentials and password information needs to be made available
locally to successfully connect to the external LDAP server. Up to two LDAP Agents (primary and secondary
external resources) can be defined as external resources for PEAP-MS-CHAP v2 authentication requests. For more
information on setting LDAP agents as part of the RADIUS server policy, see Configuring RADIUS Server Policies
on page 11-57.
To view controller or service platform LDAP agent statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select LDAP Agent Status from the left-hand side of the UI.
Figure 15-91 Wireless Controller - LDAP Agent Status screen
Wireless Controller and Service Platform System Reference Guide
15 - 138
Statistics
The LDAP Agent Status screen displays the following:
LDAP Agent Primary
Lists the primary IP address of a remote LDAP server resource used by
the controller or service platform to validate PEAP-MS-CHAP v2
authentication requests. When a RADIUS server policy’s data source is
set to LDAP, this is the first resource for authentication requests.
LDAP Agent Secondary
Lists the secondary IP address of a remote LDAP server resource used
by the controller or service platform to validate PEAP-MS-CHAP v2
authentication requests. When a RADIUS server policy’s data source is
set to LDAP, this is the second resource for authentication requests.
Message
Displays any system message generated in the controller or service
platform’s connection with the primary or secondary LDAP agent. If
there’s a problem with the username and password used to connection
to the LDAP agent it would be listed here.
Status
Displays whether the controller or service platform has successfully
joined the remote LDAP server domain designated to externally
validate PEAP-MS-CHAP v2 authentication requests.
Refresh
Select Refresh to update the statistics counters to their latest values.
15.3.26 Mint Links
Controller Statistics
Wireless controllers and Access Points use the MiNT protocol as the primary means of device discovery and
communication for Access point adoption and management. MiNT provides a mechanism to discover neighbor
devices in the network, and exchange packets between devices regardless of how these devices are connected (L2
or L3).
MiNT provides the means to secure communications at the transport layer. Using MiNT, a device can be configured
to only communicate with other authorized (MiNT enabled) devices of the same model. MiNT links can be
established over a VLAN (Among Access Points on a VLAN) or IP (remote access point to controller).
MiNT Links are automatically created between controllers and Access Points during adoption using MLCP (MiNT
Link Creation Protocol). They can also be manually created between a controller and Access Point (or) between
Access Points. MiNT links are manually created between controllers while configuring a cluster.
Level 2 (or) remote MiNT links are controller aware links, and requires IP network for communication. This level 2
MiNT links at access points are intended for remote Adaptive AP deployment and management from NOC. With
Level2 MiNT links, access points are only aware of the controllers and not about other Access points. Level 2 MiNT
links also provide partitioning, between Access Points deployed at various remote sites.
To view controller or service platform Mint link statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select Mint Links from the left-hand side of the UI.
Wireless Controller and Service Platform System Reference Guide
15 - 139
Statistics
Figure 15-92 Wireless Controller - Mint Links screen
The Mint Links screen lists the name of the impacted VLAN or link in the form of a link that can be selected to
display more granular information about that VLAN. A green check mark or a red X defines whether the listed
VLAN is listening to traffic, forced to stay up or unused with the Mint link. The level column specifies whether the
listed Mint link is traditional switching link (level 2) or a routing link (level 3). The type column defines whether the
listed Mint link is a VLAN or an IPv4 or IPv6 type network address. The dis column lists how each link was
discovered.
Refer to the secure column to assess whether the listed links are isolated between peers. The local ip column lists
the IP address assigned as the link’s end point address, not the interface’s IP address. The natted column lists
whether the link is NAT enabled or disabled for modifying network address information in IP packet headers in
transit. The cost defines the cost for a packet to travel from its originating port to its end point destination.
The hello seq number and hello interval define the interval between hello keep alive messages between link end
points. While the adj hold time sets the time after the last hello packet when the connected between end points is
defined as lost.
The static and dynamic link columns state whether each listed link is static route using a manually configured route
entry, or a dynamic route characterized by its destination The rim column defines whether the listed link is
managed remotely. The control vlan column states whether the listed link has enabled as a control VLAN. Lastly,
the clustering column states whether listed link members discover and establish connections to other peers and
provide self-healing in the event of cluster member failure.
4 Periodically select Refresh to update the screen’s data counters to their latest values.
5 If needed, select a Mint link from the name column to display more granular information for that link.
Wireless Controller and Service Platform System Reference Guide
15 - 140
Statistics
Figure 15-93 Wireless Controller - Mint Link Details screen
The first table lists the Mint link’s name and level specifying whether the Mint link is traditional switching link
(level 2) or a routing link (level 3). The cost defines the cost for a packet to travel from its originating port to its
end point destination. The hello interval lists the time between hello keep alive messages between link end
points. The adj hold time sets the time after the last hello packet when the connected between end points is
defined as lost.
The Adjacencies table lists neighbor devices by their hardware identifiers and operational state to help
determine their availability as Mint link end points and peers. The up time lists the selected link’s detection on
the network and the last hello lists when the last hello message was exchanged.
6 Periodically select Refresh to update the statistics counters to their latest values.
15.3.27 Guest Users
Controller Statistics
A captive portal is an access policy for providing guests temporary and restrictive access to the wireless network.
A captive portal configuration provides secure authenticated access using a standard Web browser. Captive portals
provide authenticated access by capturing and re-directing a wireless user's Web browser session to a captive
portal login page where the user must enter valid credentials to access to the network. Captive portals can have
their access durations set by an administrator to either provide temporary access to the controller or service
platform managed network or provide access without limitations.
For information on setting captive portal duration and authentication settings, refer to Configuring Captive Portal
Policies on page 11-1.
To view the controller or service platform guest user utilization:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select Guest Users from the left-hand side of the UI.
Wireless Controller and Service Platform System Reference Guide
15 - 141
Statistics
Figure 15-94 Wireless Controller – Guest Users screen
The Guest Users screen describes the following:
Name
Lists the administrator assigned name of the client utilizing the controller
or service platform for guest access to the wireless network.
Configured Time
Displays the restricted permissions each listed client was initially
(days:hrs:mins:secs) configured for their captive portal guest user session with this managing
controller or service platform.
Remaining Time
Displays the time each listed client has remaining in their captive portal
(days:hrs:mins:secs) guest user session with this managing controller or service platform.
Configured
Kilobytes
Lists the maximum configured bandwidth consumable by the listed guest
user (in kilobytes).
Remaining Kilobytes Lists the remaining bandwidth available to the listed guest user (in
kilobytes). This is the difference between the configured (maximum)
bandwidth and the users’s current utilization.
Configured
Downlink Rate
(kbps)
Specifies the download speed configured for the listed guest user. When
bandwidth is available, the user can download data at the specified rate
(in kilobytes per second). If a guest user has a bandwidth based policy
and exceeds the specified data limit, their speed is throttled to the defined
reduced downlink rate. For more information, refer to Defining User Pools
on page 11-53.
Configured Uplink
Rate (kbps)
Specifies the upload speed dedicated to the listed guest user. When
bandwidth is available, the user is able to upload data at the specified rate
(in kilobytes per second). If a guest user has a bandwidth based policy
and exceeds the specified data limit, their speed is throttled to the
reduced uplink rate. For more information, refer to Defining User Pools on
page 11-53.
Current Downlink
Rate (Kbps)
Lists the listed guest user’s current downlink rate in kbps. Use this
information to assess whether this user’s configured downlink rate is
adequate for their session requirements and whether their reduced
downlink rate need adjustment if the configured downlink rate is
exceeded. For more information, refer to Defining User Pools on page 1153.
Wireless Controller and Service Platform System Reference Guide
15 - 142
Statistics
Current Uplink Rate
(Kbps)
Lists the listed guest user’s current uplink rate in kbps. Use this
information to assess whether this user’s configured uplink rate is
adequate for their session requirements and whether their reduced uplink
rate need adjustment if the configured uplink rate is exceeded. For more
information, refer to Defining User Pools on page 11-53.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest value.
15.3.28 GRE Tunnels
Controller Statistics
Generic Routing Encapsulation (GRE) is one of the available tunneling mechanisms which uses IP as the transport
protocol and can be used for carrying many different passenger protocols. The tunnels behave as virtual point-topoint links that have two endpoints identified by the tunnel source and tunnel destination addresses at each
endpoint.
Use the GRE Tunnel screen to view information on the traffic flow in a GRE tunnel.
To view the GRE Tunnel statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select GRE Tunnels from the left-hand side of the UI.
Figure 15-95 Wireless Controller – GRE Tunnel screen
The GRE Tunnels screen describes the following:
GRE State
Displays the current operational state of the GRE tunnel.
Wireless Controller and Service Platform System Reference Guide
15 - 143
Statistics
Peer IP Address
Displays the IP address of the peer device on the remote end of the GRE
tunnel.
Tunnel Id
Displays the session ID of an established GRE tunnel. This ID is only viable
while the tunnel is operational and does not carry to subsequent sessions.
Total Packets
Received
Displays the total number of packets received from a peer at the remote
end of the GRE tunnel.
Total Packets Sent
Displays the total number of packets sent from this controller or service
platform to a peer at the remote end of the GRE tunnel.
Total Packets
Dropped
Lists the number of packets dropped from tunneled exchanges between
this controller or service platform and a peer at the remote end of the
VPN tunnel
Clear
Select Clear to revert the screen counters to zero and begin a new data
collection.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest value.
15.3.29 Dot1x
Controller Statistics
Dot1x (or 802.1x) is an IEEE standard for network authentication. Devices supporting Dot1x allow the automatic
provision and connection to the wireless network without launching a Web browser at login. When within range of
a Dot1x network, a device automatically connects and authenticates without needing to manually login.
To view the Dot1x statistics:
Select the Statistics menu from the Web UI.
2 Select the Wireless Controller node from the left navigation pane.
3 Select Dot1x from the left-hand side of the UI.
Wireless Controller and Service Platform System Reference Guide
15 - 144
Statistics
Figure 15-96 Wireless Controller – Dot1x screen
4 Refer to the following Dot1xAuth statistics:
AAA Policy
Lists the AAA policy currently being utilized for authenticating user
requests.
Guest Vlan Control
Lists whether guest VLAN control has been allowed (or enabled). This is
the VLAN traffic is bridged on if the port is unauthorized and guest VLAN
globally enabled. A green checkmark designates guest VLAN control as
enabled. A red X defines guest VLAN control as disabled.
System Auth Control Lists whether Dot1x authorization is globally enabled for the controller or
service platform. A green checkmark designates Dot1x authorization
globally enabled. A red X defines Dot1x as globally disabled.
5 Review the following Dot1x Auth Ports utilization information:
Name
Lists the controller or service platform ge ports subject to automatic
connection and authentication using Dot1x.
Auth SM
Lists whether Dot1x authentication is forced over the listed port.
Auth VLAN
Lists the numeric VLAN ID used as a virtual interface for authentication
requests over the listed port.
BESM
Lists whether an authentication request is pending on the listed port.
Client MAC
Lists the MAC address of requesting clients seeking authentication over
the listed port.
Wireless Controller and Service Platform System Reference Guide
15 - 145
Statistics
Guest VLAN
Lists the guest VLAN utilized for the listed port. This is the VLAN traffic is
bridged on if the port is unauthorized and guest VLAN globally enabled.
Host
Lists whether the host is a single entity or not.
Pstatus
Lists whether the listed port has been authorized for Dot1x network
authentication.
6 Refer to the MacAuth table to assess the AAA policy applied to MAC authorization requests.
7 Review the following MAC Auth Ports utilization information:
Name
Lists the controller or service platform ge ports subject to automatic
connection and MAC authentication using Dot1x.
Authorized
Lists whether MAC authorization using Dot1x has been authorized
(permitted) on the listed ge port. A green checkmark designates Dot1x
authorization as permitted. A red X defines authorization as disabled.
Enabled
Lists whether MAC authorization using Dot1x has been enabled on the
listed ge port. A green checkmark designates Dot1x authorization as
allowed. A red X defines authorization as disabled.
MAC Auth
Lists the port’s factory encoded MAC address.
8 Select the Refresh button to update the screen’s statistics counters to their latest value.
15.3.30 Network
Controller Statistics
Use the Network screen to view information for ARP, DHCP, Routing, MLD and Bridging. Each of these screens
provides enough data to troubleshoot issues related to the following:
• ARP Entries
• Route Entries
• Default Routes
• Bridge
• IGMP
• MLD
• LACP
• Traffic Shaping
• DHCP Options
• Cisco Discovery Protocol
• Link Layer Discovery Protocol
• IPv6 Neighbor Discovery
• MSTP
15.3.30.1 ARP Entries
Network
The Address Resolution Protocol (ARP) is a networking protocol for determining a network host’s hardware
address when its IP address or network layer address is known.
To view the ARP entries on the network statistics screen:
Wireless Controller and Service Platform System Reference Guide
15 - 146
Statistics
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Expand the Networks menu from the left-hand side of the UI.
4 Select ARP.
Figure 15-97 Wireless Controller - Network ARP screen
The ARP Entries screen displays the following:
IP Address
Displays the IP address of the client being resolved on behalf of the
controller or service platform.
ARP MAC Address
Displays the MAC address of the device where an IP address is being
resolved.
Type
Defines whether the entry was added statically or created dynamically
in respect to network traffic. Entries are typically static.
VLAN
Displays the name of the virtual interface where the IP address was
found.
Refresh
Select the Refresh button to update the screen’s statistics counters to
their latest values.
15.3.30.2 Route Entries
Network
The Route Entries screen displays data for routing packets to a defined destination. When an existing destination
subnet does not meet the needs of the network, add a new destination subnet, subnet mask and gateway as
needed for either IPv4 or IPv6 formatted data packets.
IPv4 operates as a best effort delivery method, as it does not guarantee delivery, and does not ensure proper
sequencing or duplicate delivery (unlike (TCP). IPv4 hosts can use link local addressing to provide local
connectivity.
Wireless Controller and Service Platform System Reference Guide
15 - 147
Statistics
IPv6 is the latest revision of the Internet Protocol (IP) designed to replace IPv4. IPV6 provides enhanced
identification and location information for devices on networks routing traffic across the Internet. IPv6 addresses
are composed of eight groups of four hexadecimal digits separated by colons.
To view the route entries:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Expand the Network menu from the left-hand side of the UI.
4 Select Route Entries. The IPv4 Route Entries tab displays by default.
Figure 15-98 Wireless Controller - IPv4 Route Entries screen
The IPv4 Route Entries screen provides the following information:
Destination
Displays the IPv4 formatted address of the destination route address.
Distance
Lists the hop distance to a desired route. Devices regularly send
neighbors their own assessment of the total cost to get to all known
destinations. A neighboring device examines the information and
compares it to their own routing data. Any improvement on what’s
already known is inserted in that device’s own routing tables. Over
time, each networked device discovers the optimal next hop for each
destination.
Route
Lists the IPv4 formatted IP address used for routing packets to a
defined destination.
Flags
The flag signifies the condition of the direct or indirect route.
Gateway
Displays the gateway IP address used to route packets to the
destination subnet.
Interface
Displays the name of the controller interface or VLAN utilized by the
destination subnet.
Wireless Controller and Service Platform System Reference Guide
15 - 148
Statistics
Metric
Lists the metric (or cost) of the route to select (or predict) the best
route. The metric is computed using a routing algorithm, and covers
information bandwidth, network delay, hop count, path cost, load,
MTU, reliability, and communication cost.
Refresh
Select Refresh to update the display to the latest values.
5 Select the IPv6 Route Entries tab to review route data for IPv6 formatted traffic.
Figure 15-99 Wireless Controller - IPv6Route Entries screen
The IPv6 Route Entries screen provides the following information:
Destination
Displays the IPv6 formatted address of the destination route address.
IPv6 addresses are composed of eight groups of four hexadecimal
digits separated by colons.
Gateway
Displays the gateway IP address used to route packets to the
destination subnet.
Interface
Displays the name of the controller interface or VLAN utilized by the
destination subnet.
Flag
The flag signifies the condition of the direct or indirect route.
Refresh
Select Refresh to update the display to the latest values.
15.3.30.3 Default Routes
Network
In an IPv6 supported environment unicast routing is always enabled. A controller or service platform routes IPv6
formatted traffic between interfaces as long as the interfaces are enabled for IPv6 and ACLs allow IPv6 formatted
traffic. However, an administrator can add a default routes as needed.
Static routes are manually configured. They work fine in simple networks. However, static routes with topology
changes require an administrator to manually configure and modify the corresponding route revisions. Default
routes are useful, as they forward packets that match no specific routes in the routing table.
Wireless Controller and Service Platform System Reference Guide
15 - 149
Statistics
To view controller or service platform default routes:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Expand the Network menu from the left-hand side of the UI.
4 Select Default Routes. The IPv4 Default Routes tab displays by default.
Figure 15-100 Wireless Controller - IPv4 Default Routes screen
The IPv4 Default Routes screen provides the following information:
DNS Server
Lists the address of the DNS server providing IPv4 formatted address
assignments on behalf of the controller or service platform.
Gateway Address
Lists the IP address of the gateway resource used with the listed route.
Installed
A green checkmark defines the listed route as currently installed on
the controller or service platform. A red X defines the route as not
currently installed and utilized.
Metric
The metric (or cost) could be the distance of a router (round-trip
time), link throughput or link availability.
Monitor Mode
Displays where in the network the route is monitored for utilization
status.
Source
Lists whether the route is static or an administrator defined default
route. Static routes are manually configured. Static routes work
adequately in simple networks. However, static routes with topology
changes require an administrator to manually configure and modify
the corresponding route revisions. Default routes are useful, as they
forward packets that match no specific routes in the routing table.
Monitoring Status
Lists whether the defined IPv4 route is currently reachable on the
controller or service platform managed network. If not, perhaps a
topology change has occurred to a static route requiring a default
route be utilized.
Refresh
Select Refresh to update the display to the latest values.
Wireless Controller and Service Platform System Reference Guide
15 - 150
Statistics
5 Select the IPv6 Default Routes tab to review default route availabilities for IPv6 formatted traffic.
Figure 15-101 Wireless Controller - IPv6 Default Routes screen
The IPv6 Default Routes screen provides the following information:
Gateway Address
Lists the IP address of the gateway resource used with the listed route.
Installed
A green checkmark defines the listed IPv6 default route as currently
installed on the controller or service platform. A red X defines the
route as not currently installed and utilized.
Interface Name
Displays the interface on which the IPv6 default route is being utilized.
Lifetime
Lists the lifetime representing the valid usability of the default IPv6
route.
Preference
Displays the administrator defined IPv6 preferred route for IPv6 traffic.
Source
Lists whether the route is static or an administrator defined default
route. Static routes are manually configured. Static routes work
adequately in simple networks. However, static routes with topology
changes require an administrator to manually configure and modify
the corresponding route revisions. Default routes are useful, as they
forward packets that match no specific routes in the routing table.
Status
Lists whether the defined IPv6 route is currently reachable on the
controller or service platform managed network. If not, perhaps a
topology change has occurred to a static route requiring a default
route be utilized.
Refresh
Select Refresh to update the display to the latest values.
15.3.30.4 Bridge
Network
Bridging is a forwarding technique making no assumption about where a particular network address is located. It
depends on flooding and the examination of source addresses in received packet headers to locate unknown
devices. Once a device is located, its location is stored in a table to avoid broadcasting to that device again.
Wireless Controller and Service Platform System Reference Guide
15 - 151
Statistics
Bridging is limited by its dependency on flooding, and is used in local area networks only. A bridge and a controller
or service platform are very similar, since a controller or service platform is a bridge with a number of ports.
To view network bridge information:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Expand the Network menu from the left-hand side of the UI.
4 Select Bridge.
Figure 15-102 Wireless Controller - Network Bridge screen
The Bridge screen displays the following:
Bridge Name
Displays the numeric ID of the network bridge.
MAC Address
Displays the MAC address of each listed bridge.
Interface
Displays the controller or service platform physical port interface the
bridge uses to transfer packets. Interface availability is slightly different
amongst supported controller and service platform models.
VLAN
Displays the VLAN the bridge is using as a virtual interface within the
controller or service platform managed network.
Forwarding
Displays whether the bridge is forwarding packets.
Refresh
Select Refresh to update the statistics counters to the latest values.
15.3.30.5 IGMP
Network
Internet Group Management Protocol (IGMP) is a protocol used for managing members of IP multicast groups. The
Access Point listens to IGMP network traffic and forwards the IGMP multicast packets to radios on which the
Wireless Controller and Service Platform System Reference Guide
15 - 152
Statistics
interested hosts are connected. On the wired side of the network, the Access Point floods all the wired interfaces.
This feature reduces unnecessary flooding of multicast traffic in the network.
To view network IGMP configuration options:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Expand the Network menu from the left-hand side of the UI.
4 Select IGMP.
Figure 15-103 Wireless Controller - Network IGMP screen
The Group field describes the following:
VLAN
Displays the group VLAN where the multicast transmission is conducted.
Group Address
Displays the Multicast Group ID supporting the statistics displayed. This
group ID is the multicast address hosts are listening to.
Port Members
Displays the ports on which multicast clients have been discovered. For
example, ge1, radio1, etc. Ports can vary somewhat amongst supported
controller and service platform models.
Version
Displays each listed group IGMP version compatibility as either version 1, 2
or 3.
The Multicast Router (MRouter) field describes the following:
VLAN
Displays the group VLAN where the multicast transmission is conducted.
Learn Mode
Displays the learning mode used by the router as either Static or PIMDVMRP.
Port Members
Displays the physical ports on which multicast clients have been
discovered by the multicast router. For example, ge1, radio1, etc. Ports can
vary somewhat amongst supported controller and service platform
models.
Wireless Controller and Service Platform System Reference Guide
15 - 153
Statistics
MiNT IDs
Lists MiNT IDs for each listed VLAN. MiNT provides the means to secure
Access Point profile communications at the transport layer. Using MiNT, an
Access Point can be configured to only communicate with other
authorized (MiNT enabled) Access Points of the same model.
Query Interval
Lists the IGMP query interval implemented when the querier functionality
is enabled. The default value is 60 seconds.
Version
Lists the multicast router IGMP version compatibility as either version 1, 2
or 3. The default setting is 3.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.3.30.6 MLD
Network
Multicast Listener Discovery (MLD) snooping enables a controller, service platform or Access Point to examine MLD
packets and make forwarding decisions based on content. MLD is used by IPv6 devices to discover devices
wanting to receive multicast packets destined for specific multicast addresses. MLD uses multicast listener queries
and multicast listener reports to identify which multicast addresses have listeners and join multicast groups.
MLD snooping caps the flooding of IPv6 multicast traffic on controller, service platform or Access Point VLANs.
When enabled, MLD messages are examined between hosts and multicast routers and to discern which hosts are
receiving multicast group traffic. The controller, service platform or Access Point then forwards multicast traffic
only to those interfaces connected to interested receivers instead of flooding traffic to all interfaces.
To view network MLD configuration options:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Expand the Network menu from the left-hand side of the UI.
4 Select MLD.
Wireless Controller and Service Platform System Reference Guide
15 - 154
Statistics
Figure 15-104 Wireless Controller - Network MLD screen
The Multicast Listener Discovery (MLD) Group field describes the following:
VLAN
Displays the group VLAN where the MLD groups multicast transmission is
conducted.
Group Address
Displays the Multicast Group ID supporting the statistics displayed. This
group ID is the multicast address hosts are listening to.
Port Members
Displays the ports on which MLD multicast clients have been discovered.
For example, ge1, radio1, etc. Ports can vary somewhat amongst supported
controller and service platform models.
Version
Displays each listed group’s version compatibility as either version 1, 2 or 3.
The IPv6 Multicast Router (MRouter) field describes the following:
VLAN
Displays the group VLAN where the multicast transmission is conducted.
MiNT IDs
Lists MiNT IDs for each listed VLAN. MiNT provides the means to secure
communications at the transport layer. Using MiNT, a controller or service
platform can be configured to only communicate with other authorized
(MiNT enabled) devices.
Learn Mode
Displays the learning mode used by the router as either Static or PIMDVMRP.
Port Members
Displays the physical ports on which multicast clients have been
discovered by the multicast router. For example, ge1, radio1, etc. Ports can
vary somewhat amongst supported controller and service platform
models.
Query Interval
Lists the query interval implemented when the querier functionality is
enabled. The default value is 60 seconds.
Version
Lists the multicast router version compatibility as either version 1, 2 or 3.
The default setting is 3.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
Wireless Controller and Service Platform System Reference Guide
15 - 155
Statistics
15.3.30.7 LACP
Network
Link Aggregation Control Protocol (LACP) is used to dynamically determine if link aggregation is possible and then to
automatically configure the aggregation. LACP is a part of the IEEE 802.1ad standard and allows the switch to
dynamically reconfigure the link aggregation groups (LAGs). A LAG is enabled only if the LACP determines that
the remote device is also using LACP and is able to join the LAG.
To view network LACP statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Expand the Network menu from the left-hand side of the UI.
4 Select LACP. The System and Aggregator Statistics tab displays by default.
Figure 15-105 Wireless Controller - Network LACP - System And Aggregator Statistics screen
The System field describes the following:
System Identifier
Displays the MAC address of the device.
System Priority
Displays the system’s LACP priority value.
The Aggregator Statistics field describes the following:
Aggregator Name
Displays the name of the port channel configured on this device.
Wireless Controller and Service Platform System Reference Guide
15 - 156
Statistics
Interface
Displays the name of the interface for which these statistics are being displayed.
LACPDU Sent
Displays the number of Link Aggregation Control Protocol Data Units
(LACPDUs) sent from this device.
LACPDU Received
Displays the number of LACPDUs received by this device.
Marker Sent
Displays the number of marker packets sent. Marker packets are sent to the
remote device to ensure that all frames transmitted through the link have been
received.
Marker Received
Displays the number of marker packet responses received from the remote
device.
Packets Error Sent
Displays the total number packets transmitted with error
Packets Error
Received
Displays the total number packets received with error
Figure 15-106 Wireless Controller - Network LACP screen - Aggregator Details tab
5 Select the Aggregator Details tab. This field describes the following:
Aggregator Name
Displays the name of the link aggregator (LAG).
Interface
Displays the name of the interface that is a member of the LAG.
MAC Address
Displays the MAC address of the physical interface.
Wireless Controller and Service Platform System Reference Guide
15 - 157
Statistics
MUX machine state
Displays the state of the multiplexer state machine for the aggregation
port. The values are:
• attached – Displays the state as attached, when the multiplexer state
machine is initiating the process of attaching the port to the selected
aggregator.
• detached – Displays the state as detached, when the multiplexer state
machine is initiating the process of detaching the port from the
aggregator.
• collecting/distributing – Displays the state as collecting/distributing.
Collecting and distributing states are merged together to form a combined
state (coupled control). Because independent control is not possible, the
coupled control state machine does not wait for the partner to signal that
collection has started before enabling both collection and distribution.
15.3.30.8 Traffic Shaping
Network
Traffic shaping regulates network data transfers to ensure a specific performance level. Traffic shaping delays the
flow of packets defined as less important than prioritized traffic streams. Traffic shaping enables traffic control out
an interface to match its flow to the speed of a remote target’s interface and ensure traffic conforms applied
policies. Traffic can be shaped to meet downstream requirements and eliminate network congestion when data
rates are in conflict.
Apply traffic shaping to specific applications to apply application categories. When application and ACL rules are
conflicting, an application takes precedence over an application category, then ACLs.
To view network the controller or service platform’s traffic shaping configuration:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Expand the Network menu from the left-hand side of the UI.
4 Select Traffic Shaping. The Status screen displays by default, and lists the controller or service platform’s traffic
shaping status.
Wireless Controller and Service Platform System Reference Guide
15 - 158
Statistics
Figure 15-107 Wireless Controller - Network Traffic Shaping screen
5 Select Statistics.
6 Refer to the following Traffic Shaping statistics:
Rate
The rate configuration controls the maximum traffic rate sent or received
on an interface. Consider this form of rate limiting on interfaces at the
edge of a network to limit traffic into or out of the network. Traffic within
the set limit is sent and traffic exceeding the set limit is dropped or sent
with a different priority.
Priority
Lists the traffic shaper queue priority. There are 8 queues (0 - 7), and
traffic is queued in each based on incoming packets 802.1p markings.
Packets Sent
Provides a baseline of the total number of packets sent to assess packet
delays and drops as a result of the filter rules applied in the traffic shaping
configuration.
Packets Delayed
Lists the packets defined as less important than prioritized traffic streams
and delayed as a result of traffic shaping filter rules applied.
Packets Dropped
Lists the packets defined as less important than prioritized traffic streams,
delayed and eventually dropped as a result of traffic shaping filter rules
applied.
Current Length
Lists the packet length of the data traffic shaped to meet downstream
requirements.
Current Latency
Traffic shaping latency is the time limit after which packets start dropping
as a result of the traffic prioritization filter rules applied.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.3.30.9 DHCP Options
Network
Controllers and service platforms contain an internal Dynamic Host Configuration Protocol (DHCP) server. The
DHCP server can provide the dynamic assignment of IP addresses automatically from existing address pools. This
Wireless Controller and Service Platform System Reference Guide
15 - 159
Statistics
is a protocol that includes IP address allocation and delivery of host-specific configuration parameters from a
DHCP server to a host. Some of these parameters include IP address, gateway and network mask.
To view network DHCP options:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Expand the Network menu from the left-hand side of the UI.
4 Select DHCP Options.
Figure 15-108 Wireless Controller - Network DHCP Options screen
The DHCP Options screen describes the following:
Server Information
Lists server information specific to each DHCP server resource available to
requesting clients for the dynamic assignment of IP addresses.
Image File
Displays the image file name. BOOTP or the bootstrap protocol can be
used to boot diskless clients. An image file is sent from the boot server.
The file contains the operating system image. DHCP servers can be
configured to support BOOTP.
Configuration
Displays the name of the configuration file on the DHCP server.
Legacy Adoption
Displays legacy (historical) device adoption information.
Adoption
Displays pending (current) adoption information.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.3.30.10 Cisco Discovery Protocol
Network
The Cisco Discovery Protocol (CDP) is a proprietary Data Link Layer network protocol implemented in Cisco
networking equipment and used to share information about network devices.
To view a controller or service platform’s CDP Statistics:
Wireless Controller and Service Platform System Reference Guide
15 - 160
Statistics
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Expand the Network menu from the left-hand side of the UI.
4 Select Cisco Discovery Protocol.
Figure 15-109 Wireless Controller - Network CDP screen
The Cisco Discovery Protocol screen displays the following:
Capabilities
Displays the capabilities code for Cisco neighbors.
Device ID
Displays the configured device ID or name for each device in the table.
Local Port
Displays the local port name for each CDP capable device.
Platform
Displays the model number of the CDP capable device.
Port ID
Displays the identifier for the local port.
TTL
Displays the time to live (TTL) for each CDP connection.
Clear Neighbors
Click Clear Neighbors to remove all known CDP neighbors from the table.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.3.30.11 Link Layer Discovery Protocol
Network
The Link Layer Discovery Protocol (LLDP) or IEEE 802.1AB is a vendor-neutral data link layer protocol used by
network devices for advertising of (announcing) their identity, capabilities, and interconnections on a IEEE 802
LAN network. The protocol is formally referred to by the IEEE as Station and Media Access Control Connectivity
Discovery.
To view a controller or service platform’s Link Layer Discovery Protocol statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
Wireless Controller and Service Platform System Reference Guide
15 - 161
Statistics
3 Expand the Network menu from the left-hand side of the UI.
4 Select Link Layer Discovery Protocol.
Figure 15-110 Wireless Controller - Network LLDP screen
The Link Layer Discovery Protocol screen displays the following:
Capabilities
Displays the Access Point capabilities code.
Device ID
Displays the configured device ID or name for each device in the table.
Enabled Capabilities Displays which LLDP capabilities are currently utilized by the listed device.
Local Port
Displays the physical local port name for each LLDP capable device.
Platform
Displays the model number of the LLDP capable device and its firmware
load.
Port ID
Displays the identifier for the local port.
TTL
Displays the time to live (TTL) for each LLDP connection.
Clear Neighbors
Click Clear Neighbors to remove all known LLDP neighbors from the table.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.3.30.12 IPv6 Neighbor Discovery
Network
IPv6 neighbor discovery uses ICMP messages and solicited multicast addresses to find the link layer address of a
neighbor on the same local network, verify the neighbor’s reachability and track neighboring devices.
Upon receiving a neighbor solicitation message, the destination replies with neighbor advertisement (NA). The
source address in the advertisement is the IPv6 address of the device sending the message. The destination
address in the advertisement message is the IPv6 address of the device sending the neighbor solicitation. The data
portion of the NA includes the link layer address of the node sending the neighbor advertisement.
Neighbor solicitation messages also verify the availability of a neighbor once its the link layer address is identified.
When a node wants to verify the reachability of a neighbor, the destination address in a neighbor solicitation
message is the unicast address of the neighbor.
Wireless Controller and Service Platform System Reference Guide
15 - 162
Statistics
A neighbor is interpreted as reachable when an acknowledgment is returned indicating packets have been
received and processed. If packets are reaching the device, they’re also reaching the next hop neighbor, providing
a confirmation the next hop is reachable.
To view a controller or service platform’s IPv6 neighbor statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Expand the Network menu from the left-hand side of the UI.
4 Select IPv6 Neighbor Discovery.
Figure 15-111 Wireless Controller - Network IPv6 Neighbor screen
The IPv6 Neighbor screen displays the following:
IPv6 Address
Lists an IPv6 IP address for neighbor discovery. IPv6 hosts can configure
themselves automatically when connected to an IPv6 network using the
neighbor discovery protocol via CMPv6 router discovery messages. When
first connected to a network, a host sends a link-local router solicitation
multicast request for its configuration parameters; routers respond to such
a request with a router advertisement packet that contains Internet Layer
configuration parameters. IPv6 addresses are composed of eight groups of
four hexadecimal digits separated by colons.
MAC Address
Lists the factory encoded hardware MAC address of the neighbor device
using an IPv6 formatted IP address as its network identifier.
Type
Displays the device type for the neighbor solicitation. Neighbor
solicitations request the link layer address of a target node while providing
the sender’s own link layer address to the target. Neighbor solicitations are
multicast when the node needs to resolve an address and unicast when
the node seeks to verify the reachability of a neighbor. Options include
Host, Router and DHCP Server.
VLAN
Lists the virtual interface (from 1 - 4094) used for the required neighbor
advertisements and solicitation messages used for neighbor discovery.
Wireless Controller and Service Platform System Reference Guide
15 - 163
Statistics
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.3.30.13 MSTP
Network
The Multiple Spanning Tree Protocol (MSTP) provides an extension to RSTP to optimize the usefulness of VLANs.
MSTP allows for a separate spanning tree for each VLAN group, and blocks all but one of the possible alternate
paths within each spanning tree topology.
If there’s just one VLAN in the Access Point managed network, a single spanning tree works fine. However, if the
network contains more than one VLAN, the network topology defined by single STP would work, but it’s possible
to make better use of the alternate paths available by using an alternate spanning tree for different VLANs or
groups of VLANs.
MSTP includes all of its spanning tree information in a single Bridge Protocol Data Unit (BPDU) format. BPDUs are
used to exchange information bridge IDs and root path costs. Not only does this reduce the number of BPDUs
required to communicate spanning tree information for each VLAN, but it also ensures backward compatibility
with RSTP. MSTP encodes additional region information after the standard RSTP BPDU as well as a number of
MSTI messages. Each MSTI messages conveys spanning tree information for each instance. Each instance can be
assigned a number of configured VLANs. The frames assigned to these VLANs operate in this spanning tree
instance whenever they are inside the MST region. To avoid conveying their entire VLAN to spanning tree mapping
in each BPDU, the Access Point encodes an MD5 digest of their VLAN to an instance table in the MSTP BPDU. This
digest is used by other MSTP supported devices to determine if the neighboring device is in the same MST region
as itself.
To view a controller or service platform’s MSTP statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Expand the Network menu from the left-hand side of the UI.
4 Select MSTP.
Wireless Controller and Service Platform System Reference Guide
15 - 164
Statistics
Figure 15-112 Wireless Controller - Network MSTP screen
The MST Config field displays the name assigned to the MSTP configuration, its digest, format ID, name and
revision.
The MST Bridge field lists the filters and guards that have been enabled and whether Cisco interoperability if
enabled.
The MST Bridge Port Detail field lists specific controller or service platform port status and their current state.
15.3.31 DHCPv6 Relay & Client
Controller Statistics
DHCPv6 is a networking protocol for configuring IPv6 hosts with IP addresses, IP prefixes or other configuration
attributes required on an IPv6 network. DHCPv6 relay agents receive messages from clients and forward them a
DHCPv6 server. The server sends responses back to the relay agent and the relay agent sends the responses to the
client on the local link.
To assess the DHCPv6 relay configuration:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select DHCP Relay & Client from the left-hand side of the UI.
Wireless Controller and Service Platform System Reference Guide
15 - 165
Statistics
Figure 15-113 Wireless Controller - DHCPv6 Relay and Client screen
4 The DHCPv6 Relay Status tables defines the following:
Interfaces
Displays the controller or service platform interface used for DHCPv6
relay.
State
Displays the current operational state of the DHCPv6 server to assess
its availability as a viable IPv6 provisioning resource.
5 The DHCPv6 Client Received Options tables defines the following:
Client Identifier
Lists whether the reporting client is using a hardware address or client
identifier as its identifier type within requests to the DHCPv6 server.
Server Identifier
Displays the server identifier supporting client DHCPv6 relay message
reception.
DNS Servers
Lists the DNS server resources supporting relay messages received
from clients.
Domain Name
Lists the domain to which the remote server resource belongs.
Interface
Displays the interfaces dedicated to client DHCPv6 relay message
reception.
Refresh Time (Seconds) Lists the time (in seconds) since the data populating the DHCPv6
client received options table has been refreshed.
Server Preference
Lists the preferred DHCPv6 server resource supporting relay messages
received from clients.
SIP Domain Name
Lists the SIP domain name supporting DHCPv6 client telephone
extensions or voice over IP systems.
SIP Server
Displays the SIP server name supporting DHCPv6 telephone
extensions or voice over IP systems.
Enterprise ID
Lists the enterprise ID associated with DHCPv6 received client options.
Wireless Controller and Service Platform System Reference Guide
15 - 166
Statistics
6 Refer to the Vendor Options table for the following:
Code
Lists the relevant numeric DHCP vendor code.
Data
Lists the supporting data relevant to the listed DHCP vendor code.
7 Select the Refresh button to update the screen’s statistics counters to their latest values.
15.3.32 DHCP Server
Controller Statistics
Controllers and service platforms contain an internal Dynamic Host Configuration Protocol (DHCP) server. DHCP
can provide IP addresses automatically. DHCP is a protocol that includes mechanisms for IP address allocation and
delivery of host-specific configuration parameters (IP address, network mask gateway etc.) from a DHCP server to
a host.
To review DHCP server statistics, refer to the following:
• Viewing General DHCP Information
• Viewing DHCP Binding Information
• Viewing DHCP Server Networks Information
15.3.32.1 Viewing General DHCP Information
DHCP Server
To view General DHCP status and binding information for both DHCPv4 and DHCPv6:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller from the left navigation pane.
3 Expand the DHCP Server menu from the left-hand side of the UI.
4 Select General.
Figure 15-114 Wireless Controller - DHCP Server General screen
Wireless Controller and Service Platform System Reference Guide
15 - 167
Statistics
5 The DHCPv4 Status and DHCPv6 Status tables defines the following:
Interfaces
Displays the controller or service platform interface used with the
DHCPv4 or DHCPv6 resource for IP address provisioning.
State
Displays the current operational state of the DHCPv4 or DHCPv6
server to assess its availability as a viable IP provisioning resource.
6 The DDNS Bindings table displays the following:
IP Address
Displays the IP address assigned to the requesting client.
Name
Displays the domain name mapping corresponding to the listed IP
address.
7 The DHCP Manual Bindings table displays the following:
IP Address
Displays the IP address for clients requesting DHCP provisioning
resources.
Client Id
Displays the client’s ID used to differentiate requesting clients.
8 Select the Refresh button to update the screen’s statistics counters to their latest values.
15.3.32.2 Viewing DHCP Binding Information
DHCP Server
The DHCP Binding screen displays DHCP binding information such as expiry time, client IP addresses and their
MAC address.
Controllers and service platforms build and maintain a DHCP snooping table (DHCP binding database). A
controller or service platform uses the snooping table to identify and filter untrusted messages. The DHCP binding
database keeps track of DHCP addresses assigned to ports, as well as filtering DHCP messages from untrusted
ports. Incoming packets received on untrusted ports, are dropped if the source MAC address does not match the
MAC in the binding table.
To view the DHCP binding information:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Expand the DHCP Server menu from the left-hand side of the UI.
4 Select Bindings.
Wireless Controller and Service Platform System Reference Guide
15 - 168
Statistics
Figure 15-115 Wireless Controller - DHCP Server Bindings screen
The Bindings screen displays the following:
Expiry Time
Displays the expiration of the lease used by the client for controller or
service platform DHCP resources.
IP Address
Displays the IP address of each listed client requesting DHCP services.
DHCP MAC Address
Displays the MAC address of each listed client requesting DHCP
services.
Clear
Select a table entry and select Clear to remove the client from the list
of devices requesting DHCP services from the controller or service
platform.
Clear All
Select Clear All to remove all listed clients from the list of requesting
clients.
Refresh
Select the Refresh button to update the screen’s statistics counters to
their latest values.
15.3.32.3 Viewing DHCP Server Networks Information
DHCP Server
The DHCP server maintains a pool of IP addresses and client configuration parameters (default gateway, domain
name, name servers etc). On receiving a valid client request, the server assigns the requestor an IP address, a lease
(the validity of time), and other IP configuration parameters.
The Networks screen provides network pool information such as the subnet for the addresses you want to use
from the pool, the pool name, the used addresses and the total number of addresses.
To view the DHCP Server Networks information:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Expand the DHCP Server menu from the left-hand side of the UI.
4 Select Networks.
Wireless Controller and Service Platform System Reference Guide
15 - 169
Statistics
Figure 15-116 Wireless Controller - DHCP Server Networks screen
The Networks screen displays the following:
Name
Displays the name of the virtual network (VLAN) from which IP addresses
can be issued to DHCP client requests on the listed controller or service
platform interface.
Subnet Address
Displays the subnet for the IP addresses used from the network pool.
Used Addresses
Displays the number of host IP addresses allocated by the DHCP server.
Total Addresses
Displays the total number of IP addresses available in the network pool for
requesting clients.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.3.33 Firewall
Controller Statistics
A firewall is designed to block unauthorized access while permitting authorized communications. It’s a device or a
set of devices configured to permit or deny computer applications based on a set of rules. For more information,
refer to the following:
• Viewing Packet Flow Statistics
• Viewing Denial of Service Statistics
• IP Firewall Rules
• IPv6 Firewall Rules
• MAC Firewall Rules
• NAT Translations
• Viewing DHCP Snooping Statistics
• IPv6 Neighbor Snooping
Wireless Controller and Service Platform System Reference Guide
15 - 170
Statistics
15.3.33.1 Viewing Packet Flow Statistics
Firewall
The Packet Flows screen displays data traffic packet flow utilization. The chart lists the different protocol flows
supported, and displays a proportional view of the flows in respect to their percentage of data traffic utilized. The
Total Active Flows field displays the total number of flows supported by the controller or service platform.
To view the packet flow statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Expand the Firewall menu from the left-hand side of the UI.
4 Select Packets Flows.
Select Clear All to revert the statistics counters to zero and begin a new data collection, or select Refresh to
update the display to the latest values.
Figure 15-117 Firewall Packet Flows
15.3.33.2 Viewing Denial of Service Statistics
Firewall
A denial-of-service attack (DoS attack), or distributed denial-of-service attack, is an attempt to make a computer
resource unavailable to its intended users. Although the means to carry out a DoS attack may vary, it generally
consists of a concerted effort to prevent an Internet site or service from functioning efficiently.
One common attack involves saturating the target’s (victim’s) machine with external communications requests,
such that it cannot respond to legitimate traffic, or responds so slowly as to be rendered effectively unavailable.
DoS attacks are implemented by either forcing the targeted computer(s) to reset, or consuming its resources so
that it can no longer provide its intended service.
The Denial of Service screen displays attack type, number of occurrences, and time of last occurrence.
To view the denial of service statistics:
Wireless Controller and Service Platform System Reference Guide
15 - 171
Statistics
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Expand the Firewall menu from the left-hand side of the UI.
4 Select Denial of Service.
Figure 15-118 Wireless Controller - Firewall DoS screen
The Denial of Service screen displays the following:
Attack Type
Displays the DoS attack type. The controller or service platform
supports enabling or disabling 24 different DoS attack filters.
Count
Displays the number of times each DoS attack was observed by the
controller or service platform’s firewall.
Last Occurrence
Displays the amount of time since the DoS attack has been observed
by the controller or service platform’s firewall.
Clear All
Select Clear All to revert the statistics counters to zero and begin a
new data collection.
Refresh
Select the Refresh button to update the screen’s statistics counters to
their latest values.
15.3.33.3 IP Firewall Rules
Firewall
Create firewall rules to let any computer send IPv4 traffic to, or receive traffic from, programs, system services,
computers or users. Firewall rules can be created to provide one of the three actions listed below that match the
rule’s criteria:
• Allow a connection
• Allow a connection only if it is secured through the use of Internet Protocol security
• Block a connection
Rules can be created for either inbound or outbound traffic.
To view existing IPv4 firewall rules:
Wireless Controller and Service Platform System Reference Guide
15 - 172
Statistics
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Expand the Firewall menu from the left-hand side of the UI.
4 Select IP Firewall Rules.
Figure 15-119 Wireless Controller - Firewall IP Firewall Rules screen
The IP Firewall Rules screen displays the following:
Precedence
Displays the precedence (priority) applied to packets. Every rule has a
unique precedence value between 1 - 5000. You cannot add two rules with
the same precedence value.
Friendly String
This is a string that provides more information as to the contents of the
rule. This is for information purposes only.
Hit Count
Displays the number of times each IP ACL has been triggered.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.3.33.4 IPv6 Firewall Rules
Firewall
IPV6 provides enhanced identification and location information for computers on networks routing traffic across
the Internet. These hosts require firewall packet protection unique to IPv6 traffic, as IPv6 addresses are composed
of eight groups of four hexadecimal digits separated by colons. IPv6 hosts can configure themselves automatically
when connected to an IPv6 network using the neighbor discovery (ND) protocol via ICMPv6 router discovery
messages. When first connected to a network, a host sends a link-local router solicitation multicast request for its
configuration parameters; routers respond to such a request with a router advertisement packet that contains
Internet layer configuration parameters.
• Allow an IPv6 formatted connection
• Allow a connection only if it is secured through the use of IPv6 security
• Block a connection and exchange of IPv6 formatted packets
Wireless Controller and Service Platform System Reference Guide
15 - 173
Statistics
To view existing IPv6 firewall rules:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Expand the Firewall menu from the left-hand side of the UI.
4 Select IPv6 Firewall Rules.
Figure 15-120 Wireless Controller - Firewall IPv6 Firewall Rules screen
The IPv6 Firewall Rules screen displays the following:
Precedence
Displays the precedence (priority) applied to IPV6 formatted packets.
Unlike IPv4, IPV6 provides enhanced identification and location
information for computers on networks routing traffic across the Internet.
IPv6 addresses are composed of eight groups of four hexadecimal digits
separated by colons. Every rule has a unique precedence value between 1 5000. You cannot add two rules with the same precedence value.
Friendly String
This is a string that provides more information as to the contents of the
IPv6 specific IP rule. This is for information purposes only.
Hit Count
Displays the number of times each IPv6 ACL has been triggered.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.3.33.5 MAC Firewall Rules
Firewall
The ability to allow or deny client access by MAC address ensures malicious or unwanted users are unable to
bypass security filters. Firewall rules can use one of the three following actions based on a rule criteria:
• Allow a connection
• Allow a connection only if it is secured through the MAC firewall security
• Block a connection
To view MAC firewall rules:
Wireless Controller and Service Platform System Reference Guide
15 - 174
Statistics
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Expand the Firewall menu from the left-hand side of the UI.
4 Select MAC Firewall Rules.
Figure 15-121 Wireless Controller - Firewall MAC Firewall Rules screen
The MAC Firewall Rules screen displays the following:
Precedence
Displays the precedence (priority) applied to packets. The rules within an
Access Control Entries (ACL) list are based on their precedence values.
Every rule has a unique precedence value between 1 and 5000. You
cannot add two rules with the same precedence value.
Friendly String
This string provides more information as to the contents of the rule. This is
for information purposes only.
Hit Count
Displays the number of times each WLAN ACL has been triggered.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.3.33.6 NAT Translations
Firewall
Network Address Translation (NAT) is a technique to modify network address information within IP packet headers
in transit. This enables mapping one IP address to another to protect wireless controller managed network address
credentials. With typical deployments, NAT is used as an IP masquerading technique to hide private IP addresses
behind a single, public facing, IP address.
NAT can provide a profile outbound Internet access to wired and wireless hosts connected to either an Access
Point or a wireless controller. Many-to-one NAT is the most common NAT technique for outbound Internet access.
Many-to-one NAT allows an Access Point or wireless controller to translate one or more internal private IP
addresses to a single, public facing, IP address assigned to a 10/100/1000 Ethernet port or 3G card.
To assess the controller or service platform’s NAT configuration and statistics.
Wireless Controller and Service Platform System Reference Guide
15 - 175
Statistics
Select the Statistics menu from the Web UI.
2 Select an Access Point node from the left navigation pane.
Expand the Firewall menu from the left-hand side of the UI.
3 Select NAT Translations.
Figure 15-122 Wireless Controller - Firewall NAT Translation screen
4 The NAT Translations screen displays the following:
Protocol
Displays the translation protocol as either TCP, UDP or ICMP.
Forward Source IP
Displays the internal network IP address for forward facing NAT
translations.
Forward Source Port Displays the internal network (virtual) port for forward facing NAT
translations.
Forward Dest IP
Displays the external network destination IP address for forward facing
NAT translations.
Forward Dest Port
Displays the external network destination port for forward facing NAT
translations.
Reverse Source IP
Displays the internal network IP address for reverse facing NAT
translations.
Reverse Source Port Displays the internal network port for reverse facing NAT translations.
Reverse Dest IP
Displays the external network destination IP address for reverse facing
NAT translations.
Reverse Dest Port
Displays the external network destination port for reverse facing NAT
translations.
Wireless Controller and Service Platform System Reference Guide
15 - 176
Statistics
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.3.33.7 Viewing DHCP Snooping Statistics
Firewall
When DHCP servers are allocating IP addresses to the clients, DHCP snooping can strengthen the security on the
LAN allowing only clients with specific IP/MAC addresses.
To view the DHCP snooping statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Expand the Firewall menu from the left-hand side of the UI.
4 Select DHCP Snooping.
Figure 15-123 Wireless Controller - Firewall DHCP Snooping screen
The DHCP Snooping screen displays the following:
MAC Address
Displays the MAC address of the client.
Node Type
Displays the NetBios node with an IP pool from which IP addresses
can be issued to client requests on this interface.
IP Address
Displays the IP address used for DHCP discovery and requests
between the DHCP server and DHCP clients.
Netmask
Displays the subnet mask used for DHCP discovery and requests
between the DHCP server and DHCP clients.
VLAN
Displays the controller or service platform virtual interface ID used for
a new DHCP configuration.
Wireless Controller and Service Platform System Reference Guide
15 - 177
Statistics
Lease Time
When a DHCP server allocates an address for a DHCP client, the client
is assigned a lease (which expires after a designated interval defined
by the administrator). The lease is the time an IP address is reserved
for re-connection after its last use. Using short leases, DHCP can
dynamically reconfigure networks in which there are more computers
than available IP addresses. This is useful, for example, in education
and customer environments where client users change frequently. Use
longer leases if there are fewer users.
Time Elapsed Since
Displays the amount of time elapsed since the DHCP server was last
updated.
Last Update
Clear All
Select Clear All to revert the counters to zero and begin a new data
collection.
Refresh
Select the Refresh button to update the screen’s counters to their
latest values.
15.3.33.8 IPv6 Neighbor Snooping
Firewall
IPv6 snooping bundles layer 2 IPv6 hop security features, such as IPv6 neighbor discovery (ND) inspection, IPv6
address gleaning and IPv6 device tracking. When IPv6 ND is configured on a device, packet capture instructions
redirect the ND protocol and DHCP for IPv6 traffic up to the controller for inspection.
A database of connected IPv6 neighbors is created from the IPv6 neighbor snoop. The database is used by IPv6 to
validate the link layer address, IPv6 address and prefix binding of the neighbors to prevent spoofing and potential
redirect attacks.
To review IPv6 neighbor snooping statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Expand the Firewall menu from the left-hand side of the UI.
4 Select IPv6 Neighbor Snooping.
Wireless Controller and Service Platform System Reference Guide
15 - 178
Statistics
Figure 15-124 Wireless Controller - Firewall IPv6 Neighbor Snooping screen
The IPv6 Neighbor Snooping screen displays the following:
MAC Address
Displays the hardware encoded MAC address of an IPv6 client
reporting to the controller or service platform.
Node Type
Displays the NetBios node type from an IPv6 address pool from which
IP addresses can be issued to requesting clients.
IPv6 Address
Displays the IPv6 address used for DHCPv6 discovery and requests
between the DHCPv6 server and DHCP clients.
VLAN
Displays the controller or service platform virtual interface ID used for
a new DHCPv6 configuration.
Mint Id
Lists MiNT IDs for each listed VLAN. MiNT provides the means to
secure communications at the transport layer. Using MiNT, a device
can be configured to only communicate with other authorized (MiNT
enabled) devices of the same model.
Snoop Id
Lists a numeric snooping ID associated with each packet inspection
snooping session conducted by the controller or service platform.
Time Elapsed Since
Displays the amount of time elapsed since the DHCPv6 server was last
updated.
Last Update
Clear Neighbors
Select Clear Neighbors to revert the counters to zero and begin a new
data collection.
Refresh
Select the Refresh button to update the screen’s counters to their
latest values.
Wireless Controller and Service Platform System Reference Guide
15 - 179
Statistics
15.3.34 VPN
Controller Statistics
IPSec VPN provides a secure tunnel between two networked peer controllers or service platforms. Administrators
can define which packets are sent within the tunnel, and how they are protected. When a tunnelled peer sees a
sensitive packet, it creates a secure tunnel and sends the packet through the tunnel to its remote peer destination.
Tunnels are sets of security associations (SA) between two peers. SAs define the protocols and algorithms applied
to sensitive packets and specify the keying mechanisms used by tunnelled peers. SAs are unidirectional and exist
in both the inbound and outbound direction. SAs are established per the rules and conditions of defined security
protocols (AH or ESP).
Crypto maps combine the elements comprising IPSec SAs. Crypto maps also include transform sets. A transform
set is a combination of security protocols, algorithms and other settings applied to IPSec protected traffic. One
crypto map is utilized for each IPsec peer, however for remote VPN deployments one crypto map is used for all
the remote IPsec peers.
Internet Key Exchange (IKE) protocol is a key management protocol standard used in conjunction with IPSec. IKE
enhances IPSec by providing additional features, flexibility, and configuration simplicity for the IPSec standard. IKE
automatically negotiates IPSec SAs, and enables secure communications without time consuming manual preconfiguration.
VPN statistics are partitioned into the following:
• IKESA
• IPSec
15.3.34.1 IKESA
VPN
The IKESA screen allows for the review of individual peer security association statistics.
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select VPN and expand the menu to reveal its sub menu items.
4 Select IKESA.
Wireless Controller and Service Platform System Reference Guide
15 - 180
Statistics
Figure 15-125 Wireless Controller - VPN IKESA screen
Review the following VPN peer security association statistics:
Peer
Lists IDs for peers sharing security associations (SA) for tunnel
interoperability. When a peer sees a sensitive packet, it creates a secure
tunnel and sends the packet through the tunnel to its destination.
Version
Displays each peer’s IKE version used for auto IPSec secure authentication
with the IPSec gateway and other controllers or service platforms.
State
Lists the online or offline state of each listed peer’s SA.
Lifetime
Displays the lifetime for the duration of each listed peer IPSec VPN
security association. Once the set value is exceeded, the association is
timed out.
Local IP Address
Displays each listed peer’s local tunnel end point IP address. This address
represents an alternative to an interface IP address.
Clear/Clear All
Select Clear to remove a selected peer. Select the Clear All button to clear
each peer of its current status and begin a new data collection.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
Wireless Controller and Service Platform System Reference Guide
15 - 181
Statistics
15.3.34.2 IPSec
VPN
Use the IPSec VPN screen to assess tunnel status between networked peers.
To view IPSec VPN status for tunnelled peers:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select VPN and expand the menu to reveal its sub menu items.
4 Select IPSec.
Figure 15-126 Wireless Controller - VPN IPSec screen
Review the following VPN peer security association statistics:
Peer
Lists IP addresses for peers sharing security associations (SA) for tunnel
interoperability. When a peer sees a sensitive packet, it creates a secure
tunnel and sends the packet through the tunnel to its destination.
Local IP Address
Displays each listed peer’s local tunnel end point IP address. This address
represents an alternative to an interface IP address.
Protocol
Lists the security protocol used with the VPN IPSec tunnel connection.
SAs are unidirectional, existing in each direction and established per
security protocol. Options include ESP and AH.
State
Lists the state of each listed peer’s security association.
SPI In
Lists stateful packet inspection (SPI) status for incoming IPSec tunnel
packets. SPI tracks each connection traversing the IPSec VPN tunnel and
ensures they are valid.
SPI Out
Lists SPI status for outgoing IPSec tunnel packets. SPI tracks each
connection traversing the IPSec VPN tunnel and ensures they are valid.
Mode
Displays the IKE mode. IPSEC has two modes in IKEv1 for key exchanges.
Aggressive mode requires 3 messages be exchanged between the IPSEC
peers to setup the SA, Main requires 6 messages
Wireless Controller and Service Platform System Reference Guide
15 - 182
Statistics
Clear All
Select the Clear All button to clear each peer of its current status and
begin a new data collection.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.3.35 Viewing Certificate Statistics
Controller Statistics
The Secure Socket Layer (SSL) protocol is used to ensure secure transactions between Web servers and browsers.
This protocol uses a third-party, a certificate authority, to identify one end or both ends of the transactions. A
browser checks the certificate issued by the server before establishing a connection.
For more information, see:
• Viewing Trustpoints Statistics
• Viewing the RSA Key Details
15.3.35.1 Viewing Trustpoints Statistics
Viewing Certificate Statistics
Each certificate is digitally signed by a trustpoint. The trustpoint signing the certificate can be a certificate
authority, corporate or individual. A trustpoint represents a CA/identity pair containing the identity of the CA, CAspecific configuration parameters and an association with an enrolled identity certificate.
To view controller or service platform trustpoint statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select Certificate and expand the menu to reveal its sub menu items.
4 Select Trustpoint.
Wireless Controller and Service Platform System Reference Guide
15 - 183
Statistics
Figure 15-127 Wireless Controller - Certificates Trustpoint screen
The Certificate Details field displays the following:
Subject Name
Describes the entity to which the certificate is issued.
Alternate Subject
Name
Lists alternate subject information about the certificate as provided to the
certificate authority.
Issuer Name
Displays the name of the organization issuing the certificate.
Serial Number
Lists the unique serial number of the certificate.
RSA Key Used
Displays the name of the key pair generated separated, or automatically
when selecting a certificate.
IS CA
Indicates whether this certificate is an authority certificate (Yes/No).
Is Self Signed
Displays whether the certificate is self-signed (Yes/No).
Server Certification
Present
Displays whether a server certification is present or not (Yes/No).
CRL Present
Displays whether a Certificate Revocation List (CRL) is present (Yes/No). A
CRL contains a list of subscribers paired with digital certificate status. The
list displays revoked certificates along with the reasons for revocation. The
date of issuance and the entities that issued the certificate are also
included.
Wireless Controller and Service Platform System Reference Guide
15 - 184
Statistics
The Validity field displays the following:
Valid From
Displays the certificate’s issue date stating the beginning of the
certificate’s validity.
Valid Until
Displays the certificate’s expiration date.
The Certificate Authority (CA) Details field displays the following:
Subject Name
Displays information about the entity to which the certificate is issued.
Alternate Subject
Name
This section provides alternate information about the certificate as
provided to the certificate authority. This field is used to provide more
information that supports information provided in the Subject Name field.
Issuer Name
Displays the organization issuing the certificate.
Serial Number
Lists the unique serial number of each certificate issued.
The Certificate Authority Validity field displays the following:
Validity From
Displays the date when the validity of a CA begins.
Validity Until
Displays the date when the validity of a CA expires.
5 Select the Refresh button to update the screen’s statistics counters to their latest values.
15.3.35.2 Viewing the RSA Key Details
Viewing Certificate Statistics
Rivest, Shamir, and Adleman (RSA) is an algorithm for public key cryptography. It’s the first algorithm known to be
suitable for signing as well as encryption.
The RSA Keys screen displays a list of RSA keys installed in the selected Access Point. RSA Keys are generally used
for establishing a SSH session, and are a part of the certificate set used by RADIUS, VPN and HTTPS.
To view the RSA Key details:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select Certificate and expand the menu to reveal its sub menu items.
4 Select RSA Keys.
Wireless Controller and Service Platform System Reference Guide
15 - 185
Statistics
Figure 15-128 Wireless Controller - Certificates RSA Keys screen
The RSA Key Details field describes the size (in bits) of the desired key. If not specified, a default key size of
1024 is used.
The RSA Public Key field describes the public key’s character set used for encrypting messages. This key is
known to everyone.
5 Select the Refresh button to update the screen’s statistics counters to their latest values.
15.3.36 WIPS Statistics
Controller Statistics
Wireless Intrusion Protection System (WIPS) detects the presence of unauthorized Access Points. Unauthorized
attempts to access the WLAN is generally accompanied by intruding clients finding network vulnerabilities. Basic
forms of this behavior can be monitored and reported without a dedicated WIPS deployment. When the
parameters exceed a configurable threshold, the controller or service platform generates a SNMP trap and reports
the result via the management interfaces. Basic WIPS functionality does not require monitoring APs and does not
perform off-channel scanning.
For more information, see:
• Viewing the Client Blacklist
• Viewing WIPS Event Statistics
15.3.36.1 Viewing the Client Blacklist
WIPS Statistics
This Client Blacklist displays blacklisted clients detected using WIPS. Blacklisted clients are not allowed to associate
to connected devices within the controller or service platform managed network.
To view the client blacklist screen:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
Wireless Controller and Service Platform System Reference Guide
15 - 186
Statistics
3 Select WIPS and expand the menu to reveal its sub menu items.
4 Select Client Blacklist.
Figure 15-129 Wireless Controller - WIPS Client Blacklist screen
The Client Blacklist screen displays the following:
Event Name
Displays the name of the detected wireless intrusion resulting in a
blacklisting of the client from controller or service platform resources.
Blacklisted Client
Displays the MAC address of the intruding client device pending
exclusion from the controller or service platform managed network.
Time Blacklisted
Displays the time this client was blacklisted.
Total Time
Displays the duration the unauthorized device remained in the WLAN.
Time Left
Displays the duration after which the blacklisted client is removed from
the blacklist.
Refresh
Select the Refresh button to update the screen’s statistics counters to
their latest values.
15.3.36.2 Viewing WIPS Event Statistics
The WIPS Events screen displays event information for rogue Access Point intrusions within the controller or
service platform managed network.
To view WIPS event statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select WIPS and expand the menu to reveal its sub menu items.
Wireless Controller and Service Platform System Reference Guide
15 - 187
Statistics
4 Select WIPS Events
Figure 15-130 Wireless Controller - WIPS Events screen
The WIPS Events screen displays the following:
Event Name
Displays the name of the detected intrusion event.
Reporting AP
Displays the hostname of the AP reporting each intrusion. The Access
Point displays as a link that can be selected to provide configuration and
network address information in greater detail.
Originating Device
Displays the MAC address of the intruder AP.
Detector Radio
Displays which AP radio is making the intrusion detection.
Time Reported
Displays the time when the intruding AP was detected.
Clear All
Select Clear All to reset the statistics counters to zero and begin a new
data collection.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.3.37 Sensor Server
Controller Statistics
Sensor servers allow the monitor and download of data from multiple sensors and remote locations using
Ethernet, TCP/IP or serial communication. Repeaters are available to extend the transmission range and combine
sensors with various frequencies on the same receiver.
To view the Sensor Server statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select Sensor Servers from the left-hand side of the controller or service platform UI.
Wireless Controller and Service Platform System Reference Guide
15 - 188
Statistics
Figure 15-131 Wireless Controller - Sensor Server screen
The Sensor Servers screen displays the following:
IP Address/
Hostname
Displays a list of sensor server IP addresses. These are sensor resources
available to the controller or service platform.
Port
Displays the port on which this server is listening.
Status
Displays whether the server is connected or not connected.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.3.38 Bonjour Services
Controller Statistics
Bonjour is Apple’s zero-configuration networking (Zeroconf) implementation. Zeroconf is a group of technologies
including service discovery, address assignment and hostname resolution. Bonjour locates the devices (printers,
computers etc.) and services these computers provide over a local network.
Bonjour provides a method to discover services on a LAN. Bonjour allows users to set up a network without any
configuration. Services such as printers, scanners and file-sharing servers can be found using Bonjour. Bonjour only
works within a single broadcast domain. However, with a special DNS configuration, it can be extended to find
services across broadcast domains.
To view the Bonjour service statistics:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select Bonjour Services from the left-hand side of the controller or service platform UI.
Wireless Controller and Service Platform System Reference Guide
15 - 189
Statistics
Figure 15-132 Wireless Controller - Bonjour Services screen
Refer to the following Bonjour service utilization stats:
Service Name
Lists the services discoverable by the Bonjour gateway. Services can either
be pre-defined Apple services (scanner, printer etc.) or an alias not
available on the predefined list.
Instance Name
Lists the name of each Bonjour service instance (session) utilized by the
controller or service platform.
IP Address
Lists the network IP address utilized by the listed Bonjour service
providing resources to the controller or service platform.
Port
Displays the port used to secure a connection with the listed Bonjour
service.
Vlan
Lists the VLAN(s) on which a listed Bonjour service is routable.
Vlan Type
Lists the VLAN type as either a local bridging mode or a shared tunnel.
Expiry
Lists the expiration date of the listed Bonjour service, and its availability to
discover resources on the LAN.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.3.39 Captive Portal Statistics
Controller Statistics
A captive portal redirects an HTTP client to a Web page (usually for authentication purposes) before
authenticating for Internet access. A captive portal turns a Web browser into an authenticator. This is done by
Wireless Controller and Service Platform System Reference Guide
15 - 190
Statistics
intercepting packets (regardless of the address or port) until the user opens a browser and attempts to access the
Internet. At that time, the browser is redirected to a Web page requiring authentication.
To view the controller or service platform captive portal statistics:
Select the Statistics tab from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select Captive Portal from the left-hand side of the controller or service platform UI.
Figure 15-133 Wireless Controller - Captive Portal screen
The Captive Portal screen displays the following:
Client MAC
Displays the requesting client’s MAC address. The MAC displays as a link
that can be selected to display client configuration and network address
information in greater detail.
Client IP
Displays the requesting client’s IPv4 formatted IP address.
Client IPv6
Displays the requesting client’s IPv6 formatted IP address.
Captive Portal
Displays the captive portal name that each listed client is utilizing for guest
access to controller resources.
Port Name
Lists the controller or service platform port name supporting the captive
portal connection with the listed client MAC address.
Authentication
Displays the authentication status of the requesting client.
WLAN
Displays the name of the WLAN the client belongs to.
VLAN
Displays the name of the requesting client’s VLAN interface.
Remaining Time
Displays the time after which the client is disconnected from the captive
portal managed Internet.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
Wireless Controller and Service Platform System Reference Guide
15 - 191
Statistics
15.3.40 Network Time
Controller Statistics
Network Time Protocol (NTP) is central to networks that rely on their controller or service platform to supply
system time. Without NTP, system time is unpredictable, which can result in data loss, failed processes and
compromised security. With network speed, memory, and capability increasing at an exponential rate, the
accuracy, precision, and synchronization of network time is essential in a controller or service platform managed
network. The controller or service platform can use a dedicated server to supply system time. The controller or
service platform can also use several forms of NTP messaging to sync system time with authenticated network
traffic.
15.3.40.1 Viewing NTP Status
Network Time
The NTP Status screen displays performance (status) information relative to the NTP association status. Verify the
NTP status to assess the controller or service platform’s current NTP resource.
To view the NTP status of a managed network:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select Network Time.
4 Select NTP Status.
Figure 15-134 Wireless Controller - NTP Status screen
Refer to the NTP Status table to review the accuracy and performance of the controller or service platform’s
synchronization with an NTP server.
Clock Offset
Displays the time differential between the controller or service
platform time and the NTP resource.
Wireless Controller and Service Platform System Reference Guide
15 - 192
Statistics
Frequency
An SNTP server clock’s skew (difference) for the controller or service
platform and the dedicated NTP resource.
Leap
Indicates if a second is added or subtracted to SNTP packet
transmissions, or if transmissions are synchronized.
Precision
Displays the precision of the controller’s time clock (in Hz). The values
that normally appear in this field range from -6 for mains-frequency
clocks to -20 for microsecond clocks.
Reference Time
Displays the time stamp the local clock was last set or corrected.
Reference
Displays the address of the time source the controller or service
platform is synchronized to.
Root Delay
The total round-trip delay in seconds. This variable can take on both
positive and negative values, depending on relative time and
frequency offsets. The values that normally appear in this field range
from negative values (a few milliseconds) to positive values (several
hundred milliseconds).
Root Dispersion
The difference between the time on the root NTP server and it’s
reference clock. The reference clock is the clock used by the NTP
server to set its own clock.
Stratum
Displays how many hops the controller or service platform is from its
current NTP resource.
Refresh
Select the Refresh button to update the screen’s statistics counters to
their latest values.
15.3.40.2 Viewing NTP Associations
Network Time
The interaction between the controller or service platform and an SNTP server constitutes an association. SNTP
associations can be either peer associations (the controller or service platform synchronizes to another system or
allows another system to synchronize to it), or a server associations (only the controller or service platform
synchronizes to the SNTP resource, not the other way around).
To view the NTP associations:
Select the Statistics menu from the Web UI.
2 Select a Wireless Controller node from the left navigation pane.
3 Select Network Time.
4 Select NTP Associations.
Wireless Controller and Service Platform System Reference Guide
15 - 193
Statistics
Figure 15-135 Wireless Controller - NTP Association screen
The NTP Associations screen provides the controller or service platform’s current NTP associations:
Delay Time
Displays the round-trip delay (in seconds) for SNTP broadcasts
between the SNTP server and the controller or service platform.
Display
Displays the time difference between the peer NTP server and the
onboard wireless controller clock.
Offset
Displays the calculated offset between the controller or service
platform and the SNTP server. The controller or service platform
adjusts its clock to match the server’s time. The offset gravitates
towards zero overtime, but never completely reduces its offset to zero.
Poll
Displays the maximum interval between successive messages (in
seconds) to the nearest power of two.
Reach
Displays the status of the last eight SNTP messages. If an SNTP packet
is lost, the lost packet is tracked over the next eight SNTP messages.
Reference IP Address
Displays the address of the time source the controller or service
platform is synchronized to.
Server IP Address
Displays the numerical IP address of the SNTP resource (server)
providing SNTP updates to the controller.
State
Displays the NTP association status code.
Status
Displays the NTP peer’s current status.
Time
Displays the timestamp of the last NTP packet received from the NTP
peer.
Refresh
Select the Refresh button to update the screen’s statistics counters to
their latest values.
Wireless Controller and Service Platform System Reference Guide
15 - 194
Statistics
15.4 Access Point Statistics
Statistics
The Access Point statistics screens displays controller or service platform connected Access Point performance,
health, version, client support, radio, mesh, interface, DHCP, firewall, WIPS, sensor, captive portal, NTP and load
information. Access point statistics consists of the following:
• Health
• Device
• Web-Filtering
• Application Visibility (AVC)
• Device Upgrade
• Adoption
• AP Detection
• Guest User
• Wireless LANs
• Policy Based Routing
• Radios
• Mesh
• Interfaces
• RTLS
• PPPoE
• Bluetooth
• OSPF
• L2TPv3 Tunnels
• VRRP
• Critical Resources
• LDAP Agent Status
• Mint Links
• Guest Users
• GRE Tunnels
• Dot1x
• Network
• DHCPv6 Relay & Client
• DHCP Server
• Firewall
• VPN
• Certificates
• WIPS
• Sensor Servers
• Bonjour Services
• Captive Portal
• Network Time
• Load Balancing
• Environmental Sensors (AP8132 Models Only)
Wireless Controller and Service Platform System Reference Guide
15 - 195
Statistics
15.4.1 Health
Access Point Statistics
The Health screen displays a selected Access Point’s hardware version and software version. Use this information
to fine tune the performance of an Access Point. This screen should also be the starting point for troubleshooting
an Access Point since it’s designed to present a high level display of Access Point performance efficiency.
To view the Access Point health:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Health.
Figure 15-136 Access Point - Health screen
The Device Details field displays the following information:
Hostname
Displays the AP’s unique name as assigned within the controller or service
platform managed network. A hostname is assigned to a device connected
to a computer network.
Device MAC
Displays the MAC address of the AP. This is factory assigned and cannot
be changed.
Primary AP
Displays the IP address of assigned to this device either through DHCP or
through static IP assignment.
Type
Displays the Access Point’s model type.
Model Number
Displays the Access Point’s model number to help further differentiate the
Access Point from others of the same model series and defined country of
operation.
Wireless Controller and Service Platform System Reference Guide
15 - 196
Statistics
RF Domain Name
Displays the Access Point’s RF Domain membership. Unlike a controller or
service platform, an Access Point can only belong to one RF Domain
based on its model. The domain name appears as a link that can be
selected to show RF Domain utilization in greater detail.
Version
Displays the Access Point’s current firmware version. Use this information
to assess whether an upgrade is required for better compatibility.
Uptime
Displays the cumulative time since the Access Point was last rebooted or
lost power.
CPU
Displays the processor core.
RAM
Displays the free memory available with the RAM.
System Clock
Displays the system clock information.
The Radio RF Quality Index field displays the following:
RF Quality Index
Displays Access Point radios and their quality indices. RF quality index
indicates the overall RF performance. The RF quality indices are:
0 – 50 (poor)
50 – 75 (medium)
75 – 100 (good)
Radio Id
Displays a radio’s hardware encoded MAC address The ID appears as a link
that can be selected to show radio utilization in greater detail.
Radio Type
Identifies whether the radio is a 2.4 or 5 GHz.
The Radio Utilization Index field displays the following:
Total Bytes
Displays the total bytes of data transmitted and received by the Access
Point since the screen was last refreshed.
Total Packets
Lists the total number of data packets transmitted and received by the
Access Point since the screen was last refreshed.
Total Dropped
List the number of dropped data packets by an Access Point radio since
the screen was last refreshed.
The Client RF Quality Index field displays the following:
Worst 5
Displays clients having lowest RF quality within the network.
Client MAC
Displays the MAC addresses of the clients with the lowest RF indices.
Retry Rate
Displays the average number of retries per packet. A high number
indicates possible network or hardware problems.
4 Select the Refresh button as needed to update the screen’s statistics counters to their latest values.
15.4.2 Device
Access Point Statistics
The Device screen displays basic information about the selected Access Point. Use this screen to gather version
information, such as the installed firmware image version, the boot image and upgrade status.
Wireless Controller and Service Platform System Reference Guide
15 - 197
Statistics
To view the device statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Device.
Figure 15-137 Access Point - Device screen
The System field displays the following:
Model Number
Displays the model of the selected Access Point to help distinguish its
exact SKU and country of operation.
Serial Number
Displays the numeric serial number set for the Access Point.
Version
Displays the software (firmware) version on the Access Point.
Boot Partition
Displays the boot partition type.
Fallback Enabled
Displays whether this option is enabled. This method enables a user to
store a known legacy version and a new version in device memory. The
user can test the new software, and use an automatic fallback, which loads
the old version on the Access Point if the new version fails.
Fallback Image
Triggered
Displays whether the fallback image was triggered. The fallback image is
an old version of a known and operational software stored in device
memory. This allows a user to test a new version of software. If the new
version fails, the user can use the old version of the software.
Wireless Controller and Service Platform System Reference Guide
15 - 198
Statistics
Next Boot
Designates this version as the version used the next time the AP is booted.
The System Resources field displays the following:
Available Memory
(MB)
Displays the available memory (in MB) available on the Access Point.
Total Memory (MB)
Displays the Access Point’s total memory.
Currently Free RAM
Displays the Access Point’s free RAM space. If its very low, free up some
space by closing some processes.
Recommended Free Displays the recommended RAM required for routine operation.
RAM
Current File
Descriptors
Displays the Access Point’s current file description.
Maximum File
Descriptors
Displays the Access Point’s maximum file description.
CPU Load 1 Minute
Lists this Access Point’s CPU utilization over a 1 minute span.
CPU Load 5 Minutes
Lists this Access Point’s CPU utilization over a 5 minute span.
CPU Load 15 Minutes Lists this Access Point’s CPU utilization over a 15 minute span.
The Upgrade Status field displays the following:
Upgrade Status
Displays the status of the last firmware upgrade performed by this
controller or service platform.
Upgrade Status Time Lists a time stamp defining the occurrence of the most recent upgrade
operation.
The Fan Speed field displays the following:
Number
Displays the number of fans supported on the this Access Point.
Speed (Hz)
Displays the fan speed in Hz.
The Temperature field displays the following:
Number
Displays the number of temperature elements used by the Access Point.
Temperature
Displays the current temperature (in Celsius) to assess a potential Access
Point overheat condition.
The Kernal Buffers field displays the following:
Buffer Size
Lists the sequential buffer size.
Current Buffers
Displays the current buffers available to the selected Access Point.
Maximum Buffers
Lists the maximum buffers available to the selected Access Point.
The IP Domain field displays the following:
Number
Displays the number of fans supported on the this Access Point.
Wireless Controller and Service Platform System Reference Guide
15 - 199
Statistics
Speed (Hz)
Displays the fan speed in Hz.
The IP Name Servers field displays the following:
Name Server
Displays the names of the servers designated to provide DNS resources to
this Access Point.
Type
Displays the type of server for each server listed.
The Firmware Images field displays the following:
Primary Build Date
Displays the build date when this Access Point firmware version was
created.
Primary Install Date
Displays the date this version was installed.
Primary Version
Displays the primary version string.
Secondary Build Date
Displays the build date when this version was created.
Secondary Install Date
Displays the date this secondary version was installed.
Secondary Version
Displays the secondary version string.
FPGA Version
Displays whether a FPGA supported firmware load is being utilized.
PoE Firmware Version
Displays whether a PoE supported firmware load is being utilized.
The IPv6 Name Servers field displays the following:
Name Server
List the IPv6 name server hosting a network service for providing
responses to queries against a directory. The IPv6 name server maps a
human recognizable identifier to a system’s internal identifier. This
service is performed by the server in response to a network service
protocol request.
Type
Lists the type of IPv6 name server mapping a human readable
identifier to system identifier.
The Sensor Lock field displays the following:
Sensor Lock
Displays whether a lock has been applied to Access Point sensor
capabilities.
The Power Management field displays the following:
Power Management
Mode
Displays the power mode currently invoked by the selected Access
Point.
Power Management
Status
Lists the power status of the Access Point.
Ethernet Power Status
Displays the Access Point’s Ethernet power status.
Radio Power Status
Displays the power status of the Access Point’s radios.
Wireless Controller and Service Platform System Reference Guide
15 - 200
Statistics
The IPv6v Hop Limit table displays the following:
Hop Limit
Lists the maximum number of times IPv6 traffic can hop. The IPv6
header contains a hop limit field that controls the number of hops a
datagram can be sent before being discarded (similar to the TTL field
in an IPv4 header).
The IPv6 Delegated Prefixes table displays the following:
IPv6 Delegated Prefix
In IPv6, prefix delegation is used to assign a network address prefix,
configuring the controller or service platform with the prefix.
Prefix Name
Lists the name assigned to the IPv6 delegated prefix.
DHCPv6 Client State
Displays the current DHCPv6 client state as impacted by the IPv6
delegated prefix.
Interface Name
Lists the interface over which IPv6 prefix delegation occurs.
T1 timer (seconds)
Lists the amount of time in seconds before the DHCP T1 (delay before
renew) timer expires.
T2 timer (seconds)
Lists the amount of time in seconds before the DHCP T2 (delay before
rebind) timer expires.
Last Refreshed
(seconds)
Lists the time, in seconds, since IPv6 prefix delegation has been
updated.
Preferred Lifetime
(seconds)
Lists is the time in seconds (relative to when the packet is sent) the
IPv6 formatted addresses remains in a preferred state on the selected
interface. The preferred lifetime must always be less than or equal to
the valid lifetime.
Valid Lifetime (seconds) Displays the time in seconds (relative to when the packet is sent) the
IPv6 formatted address remains in a valid state on the selected
interface. The valid lifetime must always be greater than or equal to
the preferred lifetime.
4 Select Refresh to update the statistics counters to their latest values.
15.4.3 Web-Filtering
Access Point Statistics
The Web-Filtering screen displays information on Web requests for content and whether the requests were
blocked or approved based on URL filter settings defined for the selected Access Point. A URL filter is comprised
of several filter rules. A whitelist bans all sites except the categories and URL lists defined in the whitelist. The
blacklist allows all sites except the categories and URL lists defined in the blacklist.
To view this Access Point’s Web filter statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Web-Filtering.
Wireless Controller and Service Platform System Reference Guide
15 - 201
Statistics
Figure 15-138 Access Point - Web Filtering screen
The Web-Filtering Requests field displays the following information:
Total Blocks
Lists the number of Web request hits against content blocked in the URL
blacklist.
Total Requests
Lists the total number of requests for URL content cached locally on this
Access Point.
Total URL Cache
Entries
Displays the number of chached URL data entries made on this Access
Point on the request of requesting clients requiring URL data managed by
the Access Point and their respective whitelist or blacklist.
The Top Categories field helps administrators assess the content most requested, blocked or approved based
on the defined whitelist and blacklist permissions:
Top Categories Requested
Lists those Web content categories most requested by clients managed
by this Access Point. Use this information to assess whether the
permissions defined in the blacklist and whitelist optimally support these
client requests for cached Web content.
Wireless Controller and Service Platform System Reference Guide
15 - 202
Statistics
Top Categories Blocked
Lists those Web content categories blocked most often for requesting
clients managed by this Access Point. Use this information to periodically
assess whether the permissions defined in the blacklist and whitelist still
restrict the desired cached Web content from requesting clients.
Remember, a whitelist bans all sites except the categories and URL lists
defined in the whitelist. The blacklist allows all sites except the categories
and URL lists defined in the blacklist.
Top Categories Approved
Lists those Web content categories approved most often on behalf of
requesting clients managed by this Access Point. Periodically review this
information to assess whether this cached and available Web content still
adhere’s to your organization’s standards for client access.
The Web Filter Status field displays the following information:
Name
Displays the name of the filter whose URL rule set has been invoked.
Blacklist Category
Lists the blacklist category whose URL filter rule set has caused data to be
filtered to a requesting client. Periodically assess whether these rules are
still relevant to the data requirements of requesting clients.
VLAN
Lists the impacted Access Point VLAN whose Web data traffic has been
filtered based on the restrictions in the listed blacklist category.
WLAN
Lists the impacted Access Point WLAN whose Web data traffic has been
filtered based on the restrictions in the listed blacklist category.
Periodically assess whether clients are segregated to the correct WLAN
based on their cached Web data requirements and impending filter rules.
4 Periodically select Refresh to update this screen to its latest values.
15.4.4 Application Visibility (AVC)
Access Point Statistics
Access Points can inspect every byte of each application header packet allowed to pass to their connected clients.
When an application is recognized and classified by the WiNG application recognition engine, administrator
defined actions can be applied to that specific application. For information on categorizing, filtering and logging
the application data allowed to proliferate the WiNG network, refer to Application Policy on page 7-54 and
Application on page 7-58.
To view Access Point application utilization statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Application Visibility (AVC).
Wireless Controller and Service Platform System Reference Guide
15 - 203
Statistics
Figure 15-139 Access Point - Application Visibility
4 Refer to the Top Applications graph to assess the most prolific, and allowed, application data passing through
the Access Point.
Total Bytes
Displays the top ten utilized applications in respect to total data bytes
passing through the Access Point. These are only the administrator
allowed applications approved for proliferation within the Access Point
managed network.
Bytes Uploaded
Displays the top ten applications in respect to total data bytes
uploaded through the Access Point managed network. If this
application data is not aligned with application utilization expectations,
consider allowing or denying additional applications and categories or
adjusting their precedence (priority).
Bytes Downloaded
Displays the top ten applications in respect to total data bytes
downloaded from the Access Point managed network. If this
application data is not aligned with application utilization expectations,
consider allowing or denying additional applications and categories or
adjusting their precedence (priority).
5 Refer to the Application Detailed Stats table to assess specific application data utilization:
Application Name
Lists the allowed application name whose data (bytes) are passing
through the Access Point managed network.
Uploaded
Displays the number of uploaded application data (in bytes) passing
the through the Access Point managed network.
Wireless Controller and Service Platform System Reference Guide
15 - 204
Statistics
Downloaded
Displays the number of downloaded application data (in bytes)
passing the through the Access Point managed network.
Num Flows
Lists the total number of application data flows passing through the
Access Point for each listed application. An application flow can
consist of packets in a specific connection or media stream.
Application packets with the same source address/port and
destination address/port are considered one flow.
Clear Application Stats
Select this option to clear the application assessment data counters
and begin a new assessment.
Refresh
Select the Refresh button to update the statistics counters to their
latest values.
6 Select the Category tab.
Categories are existing WiNG or user defined application groups (video, streaming, mobile, audio etc.) that
assist administrators in filtering (allowing or denying) application data. For information on categorizing
application data, refer to Application Policy on page 7-54 and Application on page 7-58.
Figure 15-140 Access Point - Application Category Visibility
7 Refer to the Top Categories graph to assess the most prolific, and allowed, application data categories utilized
by the Access Point.
Total Bytes
Displays the top ten application categories in respect to total data
bytes passing through the Access Point managed network. These are
only the administrator allowed application categories approved for
proliferation within the Access Point managed network.
Wireless Controller and Service Platform System Reference Guide
15 - 205
Statistics
Bytes Uploaded
Displays the top ten application categories in respect to total data
bytes uploaded through the controller or service platform managed
network. If this category data is not aligned with application utilization
expectations, consider allowing or denying additional categories or
adjusting their precedence (priority).
Bytes Downloaded
Displays the top ten application categories in respect to total data
bytes downloaded from the Access Point managed network. If this
category data is not aligned with application utilization expectations,
consider allowing or denying additional categories and categories or
adjusting their precedence (priority).
8 Refer to the Category Detailed Stats table to assess specific application category data utilization:
Category Name
Lists the allowed category whose application data (in bytes) is passing
through the Access Point managed network.
Uploaded
Displays the number of uploaded application category data (in bytes)
passing the through the Access Point managed network.
Downloaded
Displays the number of downloaded application category data (in
bytes) passing the through the Access Point managed network.
Num Flows
Lists the total number of application category data flows passing
through Access Point connected clients. A category flow can consist of
packets in a specific connection or media stream. Packets with the
same source address/port and destination address/port are considered
one flow.
Clear Application Stats
Select this option to clear the application category assessment data
counters and begin a new assessment.
Refresh
Select the Refresh button to update the statistics counters to their
latest values.
15.4.5 Device Upgrade
Access Point Statistics
The Device Upgrade screen displays information about devices receiving updates and the devices used to provision
them. Use this screen to gather version data, install firmware images, boot an image and upgrade status.
To view the device upgrade statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Device Upgrade.
Wireless Controller and Service Platform System Reference Guide
15 - 206
Statistics
Figure 15-141 Access Point - Device Upgrade screen
The Upgrade screen displays the following information:
Device Hostname
Displays the administrator assigned hostname of the Access Point
receiving the update.
Type
Displays the Access Point model type of the device receiving a firmware
update from the provisioning Access Point.
State
Displays the current state of the Access Point upgrade (done, failed etc.).
Time Last Upgraded Displays the date and time of the last successful Access Point firmware
upgrade operation.
Retries Count
Displays the number of retries made in an Access Point firmware update
operation.
Upgraded By
Displays the MAC address of the Access Point that performed the upgrade
operation.
Last Update Status
Displays the status of the last upgrade operation (Start Upgrade, Update
Error etc.).
Clear History
Select the Clear History button to clear the screen of its current status and
begin a new data collection.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
Wireless Controller and Service Platform System Reference Guide
15 - 207
Statistics
15.4.6 Adoption
Access Point Statistics
Access point adoption stats are available for both currently adopted and Access Points pending adoption.
Historical data can be also be fetched for adopted Access Points.
For more information, refer to the following:
• Adopted APs
• AP Adoption History
• AP Self Adoption History
• Pending Adoptions
15.4.6.1 Adopted APs
Adoption
The Adopted APs screen lists Access Points adopted by the selected Access Point, their RF Domain memberships
and network service information.
To view adopted Access Point statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Expand the Adoption menu item.
4 Select Adopted APs.
Figure 15-142 Access Point - Adopted APs screen
The Adopted APs screen displays the following:
Access Point
Displays the name assigned to the adopted Access Point as part of its
device configuration.
Type
Lists the each listed Access Point type adopted by this Access Point.
Wireless Controller and Service Platform System Reference Guide
15 - 208
Statistics
RF Domain Name
Displays each Access Point’s RF Domain membership. An Access Point
can only share RF Domain membership with other Access Points of
the same model.
Model Number
Displays each listed Access Point’s numeric model (AP6532, AP6562,
etc.).
Status
Displays each listed Access Point’s configuration status to help
determine its service role.
Errors
Lists any configuration errors that may be hindering a clean adoption.
Adopted By
Lists the adopting Access Point.
Adoption time
Displays each listed Access Point’s time of adoption.
Startup Time
Displays each listed Access Point’s in service time since last offline.
Refresh
Select the Refresh button to update the screen’s statistics counters to
their latest values.
15.4.6.2 AP Adoption History
Adoption
The AP Adoption History screen displays a list of peer Access Points and their adoption event status.
To review a selected Access Point’s adoption history:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand the a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Expand the Adoption menu item.
4 Select AP Adoption History.
Figure 15-143 Access Point - AP Adoption History screen
Wireless Controller and Service Platform System Reference Guide
15 - 209
Statistics
The Adopted Devices screen describes the following historical data for adopted Access Points:
Event Name
Displays the adoption status of each listed Access Point as either adopted
or un-adopted.
AP MAC Address
Displays the MAC address of each Access Point this Access Point has
attempted to adopt.
Reason
Displays the reason code for each event listed.
Event Time
Displays day, date and time for each Access Point adoption attempt.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.4.6.3 AP Self Adoption History
Adoption
The AP Self Adoption History displays an event history of peer Access Points that have adopted to the selected
Access Point.
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand the a RF Domain, select a
controller, and select one of its connected Access Points.
3 Expand the Adoption menu item.
4 Select AP Self Adoption History.
Figure 15-144 Access Point - AP Self Adoption History screen
The AP Self Adoption History screen describes the following historical data for adopted Access Points:
Event History
Displays the self adoption status of each AP as either Adopted or unadopted.
MAC
Displays the hardware encoded Media Access Control (MAC) of the auto
adopted Access Point.
Reason
Displays the adoption reason code for an Access Point’s auto adoption.
Wireless Controller and Service Platform System Reference Guide
15 - 210
Statistics
Adoption Time
Displays a timestamp for the Access Point’s auto-adoption by the
controller or service platform.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.4.6.4 Pending Adoptions
Adoption
The Pending Adoptions screen displays a list of devices yet to be adopted to this peer Access Point, or Access
Points in the process of adoption.
To view pending Access Point statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand the a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Expand the Adoption menu item.
4 Select Pending Adoptions.
Figure 15-145 Access Point - Pending Adoptions screen
The Pending Adoptions screen provides the following:
MAC Address
Displays the MAC address of the device pending adoption.
Type
Displays the Access Point’s model type.
IP Address
Displays the current network IP Address of the device pending adoption.
VLAN
Displays the current VLAN used as a virtual interface by device pending
adoption.
Reason
Displays the status as to why the device is still pending adoption and has
not yet successfully connected to this Access Point.
Discovery Option
Displays the discovery option code for each AP listed pending adoption.
Wireless Controller and Service Platform System Reference Guide
15 - 211
Statistics
Last Seen
Displays the date and time stamp of the last time the device was seen.
Click the arrow next to the date and time to toggle between standard time
and UTC.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.4.7 AP Detection
Access Point Statistics
The AP Detection screen displays potentially hostile Access Points, their SSIDs, reporting AP, and so on.
Continuously revalidating the credentials of detected devices reduces the possibility of an Access Point hacking
into the network.
To view the AP detection statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select AP Detection.
Figure 15-146 Access Point - AP Detection
The AP Detection screen displays the following:
Unsanctioned AP
Displays the MAC address of a detected Access Point that is yet to be
authorized for interoperability within the Access Point managed network.
Reporting AP
Displays the hardware encoded MAC address of the radio used by the
detecting Access Point. Select an Access Point to display configuration
and network address information in greater detail.
SSID
Displays the WLAN SSID the unsanctioned Access Point was detected on.
AP Mode
Displays the operating mode of the unsanctioned Access Point.
Radio Type
Displays the type of the radio on the unsanctioned Access Point. The radio
can be 802.11b, 802.11bg, 802.1bgn, 802.11a or 802.11an.
Wireless Controller and Service Platform System Reference Guide
15 - 212
Statistics
Channel
Displays the channel the unsanctioned Access Point is currently
transmitting on.
RSSI
Lists a relative signal strength indication (RSSI) for a detected (and
perhaps unsanctioned) Access Point.
Last Seen
Displays the time (in seconds) the unsanctioned Access Point was last
seen on the network.
Clear All
Select the Clear All button to clear the screen of its current status and
begin a new data collection.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.4.8 Guest User
Access Point Statistics
The Guest User screen displays credential information for wireless clients associated with an Access Point. Use this
information to assess if configuration changes are required to improve network performance.
To view guest user statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Guest User.
Figure 15-147 Access Point - Guest User screen
The Guest User screen displays the following client information:
Client MAC
Displays the hardcoded MAC address assigned to the guest client at the
factory. The address displays as a link that can be selected to display
configuration and network address information in greater detail.
Wireless Controller and Service Platform System Reference Guide
15 - 213
Statistics
IP Address
Displays the unique IP address of the guest client. Use this address as
necessary throughout the applet for filtering and device intrusion
recognition and approval.
IPv6 Address
Displays the current IPv6 formatted IP address a listed guest client is using
as a network identifier. IPv6 is the latest revision of the Internet Protocol
(IP) designed to replace IPv4. IPv6 addresses are composed of eight
groups of four hexadecimal digits separated by colons.
Hostname
Displays the hostname (MAC addresses) of connected guest clients. The
hostname displays as a link that can be selected to display configuration
and network address information in greater detail.
Role
Lists the guest client’s defined role within the Access Point managed
network.
Client Identity
Displays the unique identity of the listed guest client as it appears to its
adopting Access Point.
Vendor
Displays the name of the client vendor (manufacturer).
Band
Displays the 802.11 radio band on which the listed guest client operates.
AP Hostname
Displays the administrator assigned hostname of the Access Point to
which this Access Point is adopted.
Radio MAC
Displays the MAC address of the radio which the wireless client is using.
WLAN
Displays the name of the WLAN the Access Point's using with each listed
guest client. Use this information to determine if the client's WLAN
assignment best suits its intended deployment in respect to the WLAN's
QoS objective.
VLAN
Displays the VLAN ID each listed guest client is currently mapped to as a
virtual interface for Access Point interoperability.
Last Active
Displays the time when this guest client was last seen (or detected) by a
device within the Access Point managed network.
Disconnect Client
Select a specific client MAC address and select the Disconnect Client
button to terminate this client’s connection to its Access Point.
Refresh
Select the Refresh button to update the screen's statistics counters to their
latest values.
15.4.9 Wireless LANs
Access Point Statistics
The Wireless LANs screen displays an overview of Access Point WLAN utilization. This screen displays Access Point
WLAN assignment, SSIDs, traffic utilization, number of radios the Access Point is utilizing on the WLAN and
transmit and receive statistics.
To review a selected Access Point’s WLAN statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Wireless LANs.
Wireless Controller and Service Platform System Reference Guide
15 - 214
Statistics
Figure 15-148 Access Point - Wireless LANs screen
The Wireless LANs screen displays the following:
WLAN Name
Displays the name of the WLAN the Access Point is currently using for
client transmissions.
SSID
Displays each listed WLAN’s Service Set ID (SSID) used as the WLAN’s
network identifier.
Traffic Index
Displays the traffic utilization index, which measures how efficiently the
WLAN’s traffic medium is used. It’s defined as the percentage of current
throughput relative to maximum possible throughput. Traffic indices are:
0 – 20 (very low utilization)
20 – 40 (low utilization)
40 – 60 (moderate utilization)
60 and above (high utilization)
Radio Count
Displays the cumulative number of peer Access Point radios deployed
within each listed WLAN.
Tx Bytes
Displays the average number of transmitted bytes sent on each listed
WLAN.
Tx User Data Rate
Displays the transmitted user data rate in kbps for each listed WLAN.
Rx Bytes
Displays the average number of packets in bytes received on each listed
WLAN.
Rx User Data Rate
Displays the received user data rate on each listed WLAN.
Disconnect All
Clients
Select an WLAN then Disassociate All Clients to terminate the client
connections within that WLAN.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
Wireless Controller and Service Platform System Reference Guide
15 - 215
Statistics
15.4.10 Policy Based Routing
Access Point Statistics
The Policy Based Routing statistics screen displays statistics for selective path packet redirection. PBR can
optionally mark traffic for preferential services (QoS). PBR is applied to incoming routed packets, and a route-map
is created containing a set of filters and associated actions. Based on the actions defined in the route-map, packets
are forwarded to the next relevant hop. Route-maps are configurable under a global policy called routing-policy,
and applied to profiles and devices.
To review Access Point PBR statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Policy Based Routing.
Figure 15-149 Access Point - Policy Based Routing screen
The Policy Based Routing screen displays the following:
Precedence
Lists the numeric precedence (priority) assigned to each listed PBR
configuration. A route-map consists of multiple entries, each carrying a
precedence value. An incoming packet is matched against the route-map with
the highest precedence (lowest numerical value).
Primary Next
Hop IP
Lists the IP address of the virtual resource that, if available, is used with no
additional route considerations.
Primary Next
Hop State
Displays whether the primary hop is applied to incoming routed packets (UP/
UNREACHABLE).
Wireless Controller and Service Platform System Reference Guide
15 - 216
Statistics
Secondary Next
Hop IP
If the primary hop is unavailable, a second resource is used. This column lists
the address set for the alternate route in the election process.
Secondary Next
Hop State
Displays whether the secondary hop is applied to incoming routed packets
(UP/UNREACHABLE).
Default Next
Hop IP
If a packet subjected to PBR does not have an explicit route to the destination,
the configured default next hop is used. This is either the IP address of the
next hop or the outgoing interface. Only one default next hop is available. The
difference between the next hop and the default next-hop is in case of former,
PBR occurs first, then destination based routing. In case of the latter, the order
is reverse.
Default Next
Hop State
Displays whether the default hop is being applied to incoming routed packets.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.4.11 Radios
Access Point Statistics
The Radio statistics screens display information on Access Point radios. The actual number of radios depend on
the Access Point model and type. This screen displays information on a per radio basis. Use this information to
refine and optimize the performance of each radio and therefore improve network performance.
The Access Point’s radio statistics screens provide details about associated radios. It provides radio ID, radio type,
RF quality index etc. Use this information to assess the overall health of radio transmissions and Access Point
placement.
Each of these screens provide enough statistics to troubleshoot issues related to the following three areas:
• Status
• RF Statistics
• Traffic Statistics
Individual Access Point radios display as selectable links within each of the three Access Point radio screens. To
review a radio’s configuration in greater detail, select the link within the Radio column of either the Status, RF
Statistics or Traffic Statistics screens.
Additionally, navigate the Traffic, WMM TSPEC, Wireless LANs and Graph options available on the upper, left-hand
side, of the screen to review radio traffic utilization, WMM QoS settings, WLAN advertisement and radio graph
information in greater detail. This information can help determine whether the radio is properly configured in
respect to its intended deployment objective.
Wireless Controller and Service Platform System Reference Guide
15 - 217
Statistics
15.4.11.1 Status
Use the Status screen to review Access Point radio stats in detail. Use the screen to assess radio type, operational
state, operating channel and current power to assess whether the radio is optimally configured.
To view Access Point radio statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Expand the Radios menu item.
4 Select Status.
Figure 15-150 Access Point - Radio Status screen
The radio Status screen provides the following information:
Radio
Displays the name assigned to the radio as its unique identifier. The name
displays in the form of a link that can be selected to launch a detailed
screen containing radio throughout data.
Radio MAC
Displays the factory encoded hardware MAC address assigned to the
radio.
Radio Type
Displays the radio as supporting the 2.4 or 5 GHZ radio band or
functioning as a sensor device.
State
Lists a radio’s On/Off operational designation.
Channel Current
(Config)
Displays the configured channel each listed radio is set to transmit and
receive on.
Power Current
(Config)
Displays the configured power each listed radio is using to transmit and
receive.
Clients
Displays the number of connected clients currently utilizing the listed
Access Point radio.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
Wireless Controller and Service Platform System Reference Guide
15 - 218
Statistics
15.4.11.2 RF Statistics
Use the RF Statistics screen to review Access Point radio transmit and receive statistics, error rate and RF quality.
To view Access Point radio RF statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Expand the Radios menu item.
4 Select RF Statistics.
Figure 15-151 Access Point - Radio RF Statistics screen
The RF Statistics screen lists the following:
Radio
Displays the name assigned to the radio as its unique identifier. The name
displays in the form of a link that can be selected to launch a detailed
screen containing radio throughout data.
Signal
Displays the radio’s current power level in - dBm.
SNR
Displays the signal to noise ratio of the radio’s associated wireless clients.
Tx Physical Layer
Rate
Displays the data transmit rate for the radio’s physical layer. The rate is
displayed in Mbps.
Rx Physical Layer
Rate
Displays the data receive rate for the radio’s physical layer. The rate is
displayed in Mbps.
Avg Retry Number
Displays the average number of retries per packet. A high number
indicates possible network or hardware problems. Assess the error rate in
respect to potentially high signal and SNR values to determine whether
the error rate coincides with a noisy signal.
Error Rate
Displays the total number of received packets which contained errors for
the listed radio.
Wireless Controller and Service Platform System Reference Guide
15 - 219
Statistics
Quality Index
Displays the traffic utilization index of the radio. This is expressed as an
integer value. 0 – 20 indicates very low utilization, and 60 and above
indicate high utilization.
Quality Index
Displays an integer that indicates overall RF performance. The RF quality
indices are:
0 – 50 (poor)
50 – 75 (medium)
75 – 100 (good)
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.4.11.3 Traffic Statistics
Refer to the Traffic Statistics screen to review Access Point radio transmit and receive statistics, data rate, and
packets dropped during both transmit and receive operations.
To view the Access Point radio traffic statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Expand Radios.
4 Select Traffic Statistics.
Figure 15-152 Access Point - Radio Traffic Statistics screen
The Traffic Statistics screen displays the following:
Radio
Displays the name assigned to the radio as its unique identifier. The name
displays in the form of a link that can be selected to launch a detailed
screen containing radio throughout data.
Wireless Controller and Service Platform System Reference Guide
15 - 220
Statistics
Tx Bytes
Displays the total number of bytes transmitted by each listed radio. This
includes all user data as well as any management overhead data.
Rx Bytes
Displays the total number of bytes received by each listed radio. This
includes all user data as well as any management overhead data.
Tx Packets
Displays the total number of packets transmitted by each listed radio. This
includes all user data as well as any management overhead packets.
Rx Packets
Displays the total number of packets received by each listed radio. This
includes all user data as well as any management overhead packets.
Tx User Data Rate
Displays the rate (in kbps) user data is transmitted by each listed radio.
This rate only applies to user data and does not include management
overhead.
Rx User Data Rate
Displays the rate (in kbps) user data is received by the radio. This rate only
applies to user data and does not include management overhead.
Tx Dropped
Displays the total number of transmitted packets dropped by each listed
radio. This includes all user data as well as management overhead packets
that were dropped.
Traffic Index
This area displays the traffic index, which measures how efficiently the
traffic medium is utilized. It’s defined as the percentage of current
throughput relative to the maximum possible throughput.The indices
include:
0 – 20 (Very low utilization)
20 – 40 (Low utilization)
40 – 60 (Moderate utilization)
60 and above (High utilization)
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.4.12 Mesh
Access Point Statistics
The Mesh screen provides detailed statistics on each Mesh capable client available within the selected Access
Point’s radio coverage area.
To view the Mesh statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Mesh.
Wireless Controller and Service Platform System Reference Guide
15 - 221
Statistics
Figure 15-153 Access Point - Mesh screen
The Mesh screen describes the following:
Client
Displays the system assigned name of each member of the mesh
network.
Client Radio MAC
Displays the MAC address of each client radio in the mesh network.
Portal
Mesh points connected to an external network and forward traffic in
and out are Mesh Portals. Mesh points must find paths to a Portal to
access the Internet. When multiple Portals exist, the Mesh point must
select one.
Portal Radio MAC
Lists the MAC addresses of those Access Points serving as mesh
portals.
Connect Time
Displays the elapsed connection time for each listed client in the mesh
network.
Refresh
Select the Refresh button to update the screen’s statistics counters to
their latest values.
15.4.13 Interfaces
Access Point Statistics
The Interface screen provides detailed statistics on each of the interfaces available on the selected Access Point.
Use this screen to review the statistics for each interface. Interfaces vary amongst supported Access Point models.
To review Access Point interface statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Interfaces.
The General tab displays by default.
Wireless Controller and Service Platform System Reference Guide
15 - 222
Statistics
Figure 15-154 Access Point- General Interface screen
Interface Statistics support the following:
• General Interface Details
• IPv6 Address
• Multicast Groups Joined
• Network Graph
15.4.13.1 General Interface Details
Interfaces
The General tab provides information on a selected Access Point interface such as its MAC address, type and TX/
RX statistics.
The General table displays the following:
Name
Displays the name of the Access Point interface ge1, vlan1 etc.
Interface MAC Address
Displays the MAC address of the interface.
IP Address
IP address of the interface.
IP Address Type
Displays the IP address type, either IPv4 or IPv6.
Secondary IP
Displays a list of secondary IP resources assigned to this interface.
Hardware Type
Displays the networking technology.
Index
Displays the unique numerical identifier for the interface.
Access VLAN
Displays the tag assigned to the native VLAN.
Access Setting
Displays the VLAN mode as either Access or Trunk.
Administrative Status
Displays whether the interface is currently UP or DOWN.
Operational Status
Lists whether the selected interface is currently UP (operational) or
DOWN.
Wireless Controller and Service Platform System Reference Guide
15 - 223
Statistics
The IPv6 Mode and MTU table displays the following:
IPv6 Mode
Lists the current IPv6 mode utilized.
IPv6 MTU
Lists the IPv6 formatted largest packet size that can be sent over the
interface.
The Specification table displays the following information:
Media Type
Displays the physical connection type of the interface.
Medium types include:
Copper - Used on RJ-45 Ethernet ports
Optical - Used on fibre optic gigabit Ethernet ports
Protocol
Displays the routing protocol used by the interface.
MTU
Displays the maximum transmission unit (MTU) setting configured on
the interface. The MTU value represents the largest packet size that
can be sent over a link. 10/100 Ethernet ports have a maximum setting
of 1500.
Mode
Lists whether traffic on the listed port is Layer 2 or Layer 3.
Metric
Displays the metric associated with the interface’s route.
Maximum Speed
Displays the maximum speed the interface uses to transmit or receive
data.
Admin Speed
Displays the speed the port can transmit or receive. This value can be
either 10, 100, 1000 or Auto. This value is the maximum port speed in
Mbps. Auto indicates the speed is negotiated between connected
devices.
Operator Speed
Displays the current speed of data transmitted and received over the
interface.
Admin Duplex Setting
Displays the administrator’s duplex setting.
Current Duplex Setting
Displays the interface as either half duplex, full duplex or unknown.
The Traffic table displays the following:
Good Octets Sent
Displays the number of octets (bytes) with no errors sent by the
interface.
Good Octets Received
Displays the number of octets (bytes) with no errors received by the
interface.
Good Packets Sent
Displays the number of good packets transmitted.
Good Packets Received
Displays the number of good packets received.
Mcast Pkts Sent
Displays the number of multicast packets sent through the interface.
Mcast Pkts Received
Displays the number of multicast packets received through the
interface.
Ucast Pkts Sent
Displays the number of unicast packets sent through the interface.
Ucast Pkts Received
Displays the number of unicast packets received through the interface.
Bcast Pkts Sent
Displays the number of broadcast packets sent through the interface.
Bcast Pkts Received
Displays the number of broadcast packets received through the
interface.
Wireless Controller and Service Platform System Reference Guide
15 - 224
Statistics
Packet Fragments
Displays the number of packet fragments transmitted or received
through the interface.
Jabber Pkts
Displays the number of packets transmitted through the interface
larger than the MTU.
The Errors table displays the following:
Bad Pkts Received
Displays the number of bad packets received through the interface.
Collisions
Displays the number of collisions over the selected interface.
Late Collisions
A late collision is any collision that occurs after the first 64 octets of
data have been sent. Late collisions are not normal, and usually the
result of out of specification cabling or a malfunctioning device.
Excessive Collisions
Displays the number of excessive collisions. Excessive collisions occur
when the traffic load increases to the point a single Ethernet network
cannot handle it efficiently.
Drop Events
Displays the number of dropped packets transmitted or received
through the interface.
Tx Undersize Pkts
Displays the number of undersized packets transmitted through the
interface.
Oversize Pkts
Displays the number of oversized packets transmitted through the
interface.
MAC Transmit Error
Displays the number of failed transmits due to an internal MAC
sublayer error (that’s not a late collision), due to excessive collisions or
a carrier sense error.
MAC Receive Error
Displays the number of received packets that failed due to an internal
MAC sublayer (that’s not a late collision), an excessive number of
collisions or a carrier sense error.
Bad CRC
Displays the CRC error. The CRC is the 4 byte field at the end of every
frame. The receiving station uses it to interpret if the frame is valid. If
the CRC value computed by the interface does not match the value at
the end of frame, it is considered as a bad CRC.
The Receive Errors table displays the following:
Rx Frame Errors
Displays the number of frame errors received at the interface. A frame
error occurs when data is received, but not in an expected format.
Rx Length Errors
Displays the number of length errors received at the interface. Length
errors are generated when the received frame length was either less or
over the Ethernet standard.
Rx FIFO Errors
Displays the number of FIFO errors received at the interface. First-in
First-out queueing is an algorithm that involves buffering and
forwarding of packets in the order of arrival. FIFO entails no priority.
There is only one queue, and all packets are treated equally. An
increase in FIFO errors indicates a probable hardware malfunction.
Rx Missed Errors
Displays the number of missed packets. Packets are missed when the
hardware received FIFO has insufficient space to store an incoming
packet.
Rx Over Errors
Displays the number of overflow errors received. Overflows occur
when a packet size exceeds the allocated buffer size.
Wireless Controller and Service Platform System Reference Guide
15 - 225
Statistics
The Transmit Errors field displays the following:
Tx Errors
Displays the number of packets with errors transmitted on the
interface.
Tx Dropped
Displays the number of transmitted packets dropped from the
interface.
Tx Aborted Errors
Displays the number of packets aborted on the interface because a
clear-to-send request was not detected.
Tx Carrier Errors
Displays the number of carrier errors on the interface. This generally
indicates bad Ethernet hardware or bad cabling.
Tx FIFO Errors
Displays the number of FIFO errors transmitted at the interface. Firstin First-Out queueing is an algorithm that involves the buffering and
forwarding of packets in the order of arrival. FIFO uses no priority.
There is only one queue, and all packets are treated equally. An
increase in the number of FIFO errors indicates a probable hardware
malfunction.
Tx Heartbeat Errors
Displays the number of heartbeat errors. This generally indicates a
software crash, or packets stuck in an endless loop.
Tx Window Errors
Displays the number of window errors transmitted. TCP uses a sliding
window flow control protocol. In each TCP segment, the receiver
specifies the amount of additional received data (in bytes) the receiver
is willing to buffer for the connection. The sending host can send only
up to that amount. If the sending host transmits more data before
receiving an acknowledgment, it constitutes a window error.
4 Select the Refresh button to update the screen’s statistics counters to their latest values.
15.4.13.2 IPv6 Address
Interfaces
IPv6 is the latest revision of the Internet Protocol (IP) designed to replace IPv4. IPV6 provides enhanced
identification and location information for computers on networks routing traffic across the Internet. IPv6
addresses are composed of eight groups of four hexadecimal digits separated by colons.
To view IPv6 address utilization:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Expand the Interfaces menu from the left-hand side of the UI.
4 Select IPv6 Address.
Wireless Controller and Service Platform System Reference Guide
15 - 226
Statistics
Figure 15-155 Access Point - Interface IPv6 Address screen
5 The IPv6 Addresses table displays the following:
IPv6 Addresses
Lists the IPv6 formatted addresses currently utilized by the Access
Point on the selected interface.
Status
Lists the current utilization status of each IPv6 formatted address
currently in use by this controller or Access Point’s selected interface.
Address Type
Lists whether the address is unicast or multicast in its utilization over
the selected Access Point interface.
Preferred Lifetime
(seconds)
Lists is the time in seconds (relative to when the packet is sent) the
IPv6 formatted addresses remains in a preferred state on the selected
interface. The preferred lifetime must always be less than or equal to
the valid lifetime
Valid Lifetime (seconds) Displays the time in seconds (relative to when the packet is sent) the
IPv6 formatted address remains in a valid state on the selected
interface. The valid lifetime must always be greater than or equal to
the preferred lifetime.
6 Select the Link Local Address & Traffic Report tab to assess data traffic and errors discovered in transmitted
and received IPv6 formatted data packets.
Wireless Controller and Service Platform System Reference Guide
15 - 227
Statistics
Figure 15-156 Access Point - Interface IPv6 Address screen
7 Verify the following Local Link Address data for the IPv6 formatted address:
Address
Lists the IPv6 local link address. IPv6 requires a link local address
assigned to every interface the IPv6 protocol is enabled on, even when
one or more routable addresses are assigned.
Status
Lists the IPv6 local link address utilization status and its current
availability.
Preferred Lifetime
(seconds)
Lists is the time in seconds (relative to when the packet is sent) the
local link addresses remains in the preferred state on the selected
interface. The preferred lifetime must always be less than or equal to
the valid lifetime.
Valid Lifetime (seconds) Displays the time in seconds (relative to when the packet is sent) the
local link addresses remains in the valid state on the selected interface.
The valid lifetime must always be greater than or equal to the
preferred lifetime.
8 Verify the following IPv6 formatted Traffic data:
Packets In
Lists the number of IPv6 formatted data packets received on the
selected Access Point interface since the screen was last refreshed.
Packets Out
Lists the number of IPv6 formatted data packets transmitted on the
selected Access Point interface since the screen was last refreshed.
Refresh
Periodically select Refresh to update the screen’s counters to their
latest values.
9 Review the following Receive Errors for IPv6 formatted data traffic:
Receive Length Errors
Displays the number of IPv6 length errors received at the interface.
Length errors are generated when the received IPv6 frame length was
either less or over the Ethernet standard.
Wireless Controller and Service Platform System Reference Guide
15 - 228
Statistics
Receive Over Errors
Displays the number of IPv6 overflow errors received. Overflows occur
when a packet size exceeds the allocated buffer size.
Receive Frame Errors
Displays the number of IPv6 frame errors received at the interface. A
frame error occurs when data is received, but not in an expected
format.
Receive FIFO Errors
Displays the number of IPv6 FIFO errors received at the interface.
First-in First-out queueing is an algorithm that involves buffering and
forwarding of packets in the order of arrival. FIFO entails no priority.
There is only one queue, and all IPv6 formatted packets are treated
equally. An increase in FIFO errors indicates a probable hardware
malfunction.
Receive Missed Errors
Displays the number of missed IPv6 formatted packets. Packets are
missed when the hardware received FIFO has insufficient space to
store an incoming packet.
10 Review the following Transmit Errors for IPv6 formatted data traffic:
Transmit Errors
Displays the number of IPv6 formatted data packets with errors
transmitted on the interface.
Transmit Aborted Errors Displays the number of IPv6 formatted packets aborted on the
interface because a clear-to-send request was not detected.
Transmit Carrier Errors
Displays the number of IPv6 formatted carrier errors on the interface.
This generally indicates bad Ethernet hardware or bad cabling.
Transmit FIFO Errors
Displays the number of IPv6 formatted FIFO errors transmitted at the
interface. First-in First-Out queueing is an algorithm that involves the
buffering and forwarding of packets in the order of arrival. FIFO uses
no priority. There is only one queue, and all packets are treated
equally. An increase in the number of FIFO errors indicates a probable
hardware malfunction.
Transmit Heartbeat
Errors
Displays the number of IPv6 formatted heartbeat errors. This generally
indicates a software crash, or packets stuck in an endless loop.
Transmit Window Errors Displays the number of IPv6 formatted window errors transmitted.
TCP uses a sliding window flow control protocol. In each TCP segment,
the receiver specifies the amount of additional received data (in bytes)
the receiver is willing to buffer for the connection. The sending host
can send only up to that amount. If the sending host transmits more
data before receiving an acknowledgment, it constitutes a window
error.
Refresh
Select Refresh to update the statistics counters to their latest value.
15.4.13.3 Multicast Groups Joined
Interfaces
Multicast groups scale to a larger set of destinations by not requiring prior knowledge of who or how many
destinations there are. Multicast devices uses their infrastructure efficiently by requiring the source to send a
packet only once, even if delivered to a large number of devices. Devices replicate a packet to reach multiple
receivers only when necessary.
Access Points are free to join or leave a multicast group at any time. There are no restrictions on the location or
members in a multicast group. A host may be a member of more than one multicast group at any given time and
does not have to belong to a group to send messages to members of a group.
Wireless Controller and Service Platform System Reference Guide
15 - 229
Statistics
To view the Access Point’s multicast group memberships on the selected interface:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Interfaces.
4 Select Multicast Groups Joined.
Figure 15-157 Access Point - Interface Multicast Groups Joined screen
5 The screen displays the following:
Group
Lists the name of existing multicast groups whose current members
share multicast packets with one another on this selected interface as
a means of collective interoperation.
Users
Lists the number of devices currently interoperating on this interface
in each listed multicast group. Any single device can be a member of
more then one group at a time.
6 Periodically select Refresh to update the screen’s counters to their latest values.
Wireless Controller and Service Platform System Reference Guide
15 - 230
Statistics
15.4.13.4 Network Graph
Interfaces
The Network Graph displays statistics the Access Point continuously collects for its interfaces. Even when the
interface statistics graph is closed, data is still collected. Display the interface statistics graph periodically for
assessing the latest interface information. Up to three different stats can be selected and displayed within the
graph.
To view a detailed graph for an interface, select an interface and drop it on to the graph. The graph displays Port
Statistics as the Y-axis and the Polling Interval as the X-axis. Use the Polling Interval from the drop-down menu to
define the intervals data is displayed on the graph.
To view the Interface Statistics graph:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Interfaces.
4 Select Network Graph. Use the Parameters drop-down menu to specify interface values to trend.
Figure 15-158 Access Point- Interface Network Graph screen
Wireless Controller and Service Platform System Reference Guide
15 - 231
Statistics
15.4.14 RTLS
Access Point Statistics
The real time locationing system (RTLS) enables accurate location determination and presence detection
capabilities for Wi-Fi-based devices, Wi-Fi-based active RFID tags and passive RFID tags. While the operating
system does not support locationing locally, it does report the locationing statistics of both Aeroscout and Ekahau
tags.
To review a selected Access Point’s RTLS statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select RTLS.
Figure 15-159 Access Point - RTLS screen
The Access Point RTLS screen displays the following for Aeroscout tags:
Engine IP
Lists the IP address of the Aeroscout locationing engine.
Engine Port
Displays the port number of the Aeroscout engine.
Send Count
Lists the number location determination packets sent by the locationing
engine.
Recv Count
Lists the number location determination packets received by the
locationing engine.
Tag Reports
Displays the number of tag reports received from locationing equipped
radio devices supporting RTLS.
Nacks
Displays the number of Nack (no acknowledgement) frames received from
RTLS supported radio devices providing locationing services.
Wireless Controller and Service Platform System Reference Guide
15 - 232
Statistics
Acks
Displays the number of Ack (acknowledgment) frames received from RTLS
supported radio devices providing locationing services.
Lbs
Displays the number of location based service (LBS) frames received from
RTLS supported radio devices providing locationing services.
AP Status
Provides the status of peer APs providing locationing assistance.
AP Notifications
Displays a count of the number of notifications sent to Access Points that
may be available to provide RTLS support.
Send Errors
Lists the number of send errors received by the RTLS initiating Access
Point.
Error Message Count Displays a cumulative count of error messages received from RTLS
enabled Access Point radios.
The Access Point RTLS screen displays the following for Ekahau tags:
Tag Reports
Displays the number of tag reports received from locationing equipped
radio devices supporting RTLS.
4 Select the Refresh button to update the screen’s statistics counters to their latest values.
15.4.15 PPPoE
Access Point Statistics
The PPPoE statistics screen displays stats derived from the AP’s access to high-speed data and broadband
networks. PPPoE uses standard encryption, authentication, and compression methods as specified by the PPPoE
protocol. PPPoE enables Access Points to establish a point-to-point connection to an ISP over existing Ethernet
interface.
To review a selected Access Point’s PPPoE statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select PPPoE.
Wireless Controller and Service Platform System Reference Guide
15 - 233
Statistics
Figure 15-160 Access Point - PPPoE screen
The Configuration Information field screen displays the following:
Shutdown
Displays whether a high speed client mode point-to-point connection has
been enabled using the PPPoE protocol.
Service
Lists the 128 character maximum PPPoE client service name provided by
the service provider.
DSL Modem
Network (VLAN)
Displays the PPPoE VLAN (client local network) connected to the DSL
modem. This is the local network connected to DSL modem.
Authentication Type Lists authentication type used by the PPPoE client whose credentials must
be shared by its peer Access Point. Supported authentication options
include None, PAP, CHAP, MSCHAP, and MSCHAP-v2.
Username
Displays the 64 character maximum username used for authentication
support by the PPPoE client.
Password
Displays the 64 character maximum password used for authentication by
the PPPoE client.
Client Idle Timeout
The Access Point uses the listed timeout so it does not sit idle waiting for
input from the PPPoE client and the server, that may never come.
Keep Alive
If a keep alive is utilized, the point-to-point connect to the PPPoE client is
continuously maintained and not timed out.
Maximum
Transmission Unit
(MTU)
Displays the PPPoE client maximum transmission unit (MTU) from 500 1,492. The MTU is the largest physical packet size in bytes a network can
transmit. Any messages larger than the MTU are divided into smaller
packets before being sent. A PPPoE client should be able to maintain its
point-to-point connection for this defined MTU size.
4 Refer to the Connection Status field.
The Connection Status table lists the MAC address, SID, Service information, MTU and status of each route
destination peer. To provide this point-to-point connection, each PPPoE session learns the Ethernet address of
Wireless Controller and Service Platform System Reference Guide
15 - 234
Statistics
a remote PPPoE client, and establishes a session. PPPoE uses both a discover and session phase to identify a
client and establish a point-to-point connection. By using such a connection, a Wireless WAN failover is
available to maintain seamless network access if the Access Point’s Wired WAN were to fail.
5 Select the Refresh button to update the screen’s statistics counters to their latest values.
15.4.16 Bluetooth
Access Point Statistics
AP-8432 and AP-8533 model Access Points utilize a built in Bluetooth chip for specific Bluetooth functional
behaviors in a WiNG managed network. AP-8432 and AP-8533 models support both Bluetooth classic and
Bluetooth low energy technology. These platforms can use their Bluetooth classic enabled radio to sense other
Bluetooth enabled devices and report device data (MAC address, RSSI and device calls) to an ADSP server for
intrusion detection. If the device presence varies in an unexpected manner, ADSP can raise an alarm.
AP-8432 and AP-8533 model Access Points support Bluetooth beaconing to emit either iBeacon or EddystoneURL beacons. The Access Point’s Bluetooth radio sends non-connectable, undirected low-energy (LE)
advertisement packets on a periodic basis. These advertisement packets are short, and sent on Bluetooth
advertising channels that conform to already-established iBeacon and Eddystone-URL standards.
To view Bluetooth radio statistics for an Access Point:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Point
3 Select Bluetooth.
Figure 15-161 Access Point - Bluetooth screen
The Access Point’s Bluetooth screen displays the following:
Name
Lists the name of the Access Point’s Bluetooth radio.
Wireless Controller and Service Platform System Reference Guide
15 - 235
Statistics
Alias
If an alias has been defined for the Access Point its listed here. The
alias value is expressed in the form of :
B. If the administrator has defined a
hostname for the Access Point, it’s used in place of the Access Point’s
default hostname.
Radio State
Displays the current operational state (On/Off) of the Bluetooth radio.
Off Reason
If the Bluetooth radio is offline, this field states the reason.
Radio MAC
Lists the Bluetooth radio’s factory encoded MAC address serving as
this device’s hardware identifier on the network.
Hostname
Lists the hostname set for the Access Point as its network identifier.
Device MAC
Lists the Access Point’s factory encoded MAC address serving as this
device’s hardware identifier on the network.
AP Location
Lists the Access Point’s administrator assigned deployment location.
Radio Mode
Lists an Access Point’s Bluetooth radio functional mode as either btsensor or le-beacon.
Beacon Period
Lists the Bluetooth radio’s beacon transmission period from
100 -10,000 milliseconds.
Beacon Type
Lists the type of beacon currently configured.
Last Error
Lists descriptive text on any error that’s preventing the Bluetooth radio
from operating.
Refresh
Select Refresh to update the screen’s statistics counters to their latest
values.
15.4.17 OSPF
Access Point Statistics
Open Shortest Path First (OSPF) is a link-state interior gateway protocol (IGP). OSPF routes IP packets within a
single routing domain (autonomous system), like an enterprise LAN. OSPF gathers link state information from
neighbor routers and constructs a network topology. The topology determines the routing table presented to the
Internet Layer which makes routing decisions based solely on the destination IP address found in IP packets.
Refer to the following for detailed descriptions of the tabs available within the OSPF statistics screen:
• OSPF Summary
• OSPF Neighbors
• OSPF Area Details
• OSPF Route Statistics
• OSPF Route Statistics
• OSPF State
Wireless Controller and Service Platform System Reference Guide
15 - 236
Statistics
15.4.17.1 OSPF Summary
OSPF
To view OSPF summary statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen), expand the default node and
select an Access Point for statistical observation.
3 Select OSPF. The Summary tab displays by default.
Figure 15-162 Access Point - OSPF Summary tab
The Summary tab describes the following information fields:
General
The general field displays the router ID assigned for this OSPF connection,
RFC compliance information and LSA data.
Wireless Controller and Service Platform System Reference Guide
15 - 237
Statistics
ABR/ASBR
Details
Lists Autonomous System Boundary Router (ASBR) data relevant to OSPF
routing, including the ASBR, ABR and ABR type. An Area Border Router
(ABR) is a router that connects one or more areas to the main backbone
network. It is considered a member of all areas it is connected to. An ABR
keeps multiple copies of the link-state database in memory, one for each area
to which that router is connected An ASBR is a router connected to more than
one Routing protocol and exchanges routing information with routers in other
protocols. ASBRs typically also run an exterior routing protocol (for example,
BGP), or use static routes, or both. An ASBR is used to distribute routes
received from other, external ASs throughout its own autonomous system.
Routers in other areas use ABR as next hop to access external addresses. Then
the ABR forwards packets to the ASBR announcing the external addresses.
SPF
Refer to the SPF field to assess the status of the shortest path forwarding
(SFF) execution, last SPF execution, SPF delay, SPF due in, SPF hold multiplier,
SPF hold time, SPF maximum hold time and SPF timer due flag.
Stub Router
The summary screen displays information relating to stub router
advertisements and shutdown and startup times. An OSPF stub router
advertisement allows a new router into a network without immediately routing
traffic through the new router and allows a graceful shut down or reload a
router without dropping packets that are destined for other networks. This
feature introduces three configuration options that allow you to configure a
router that is running the OSPF protocol to advertise a maximum or infinite
metric to all neighbors.
4 Select the Refresh button to update the statistics counters to their latest values.
15.4.17.2 OSPF Neighbors
OSPF
OSPF establishes neighbor relationships to exchange routing updates with other routers. An Access Point
supporting OSPF sends hello packets to discover neighbors and elect a designated router. The hello packet
includes link state information and list of neighbors. OSPF is savvy with layer 2 topologies. If on a point-to-point
link, OSPF knows it is sufficient, and the link stays up. If on a broadcast link, the router waits for election before
determining if the link is functional.
To view OSPF neighbor statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen), expand the default node and
select an Access Point for statistical observation.
3 Select OSPF.
4 Select the Neighbor Info tab.
Wireless Controller and Service Platform System Reference Guide
15 - 238
Statistics
Figure 15-163 Access Point - OSPF Neighbor Info tab
The Neighbor Info tab describes the following:
Router ID
Displays the router ID assigned for this OSPF connection. The router is a level
three Internet Protocol packet switch. This ID must be established in every
OSPF instance. If not explicitly configured, the highest logical IP address is
duplicated as the router identifier. However, since the router identifier is not an
IP address, it does not have to be a part of any routable subnet in the
network.
Neighbor
Priority
Displays each listed neighbor’s priority in respect to becoming the designated
router managing the OSPF connection. The designated router is the router
interface elected among all routers on a particular multi-access network
segment.
IF Name
Lists the name assigned to the router interface used to support connections
amongst OSPF enabled neighbors.
Neighbor
Address
Lists the IP address of the neighbor sharing the router interface with each
listed router ID.
Request Count
Lists the connection request count (hello packets) to connect to the router
interface, discover neighbors and elect a designated router.
Retransmit
Count
Lists the connection retransmission count attempted in order to connect to the
router interface, discover neighbors and elect a designated router. A
designated router (DR) is the router interface elected among all routers on a
particular multi-access network segment, generally assumed to be broadcast.
Dead Time
Lists the dead time between neighbors in the network topology that are
currently utilizing the listed router ID.
Self Neighbor
State
Displays the self-neighbor status assessment used to discover neighbors and
elect a designated router.
Source Address
Displays the single source address used by all neighbor routers to obtain
topology and connection status. This form of multicasting significantly reduces
network load.
Wireless Controller and Service Platform System Reference Guide
15 - 239
Statistics
Summary Count
Routes that originate from other areas are called summary routes. Summary
routes are not flooded in a totally stubby or NSSA totally stubby area.
5 Select the Refresh button to update the statistics counters to their latest values.
15.4.17.3 OSPF Area Details
OSPF
An OSPF network is subdivided into routing areas (with 32 bit area identifiers) to simplify administration and
optimize traffic utilization. Areas are logical groupings of hosts and networks, including routers having interfaces
connected to an included network. Each area maintains a separate link state database whose information may be
summarized towards the rest of the network. An OSPF Area contains a set of routers exchanging Link State
Advertisements (LSAs) with others in the same area. Areas limit LSAs and encourage aggregate routes. Areas are
identified by 32-bit IDs, expressed either in decimal, or octet-based dot-decimal notation.
To view OSPF area statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen), expand the default node and
select an Access Point for statistical observation.
3 Select OSPF.
4 Select the Area Details tab.
Figure 15-164 Access Point - OSPF Area Details tab
The Area Details tab describes the following:
OSPF Area ID
Displays either the integer (numeric ID) or IP address assigned to the OSPF
area as a unique identifier.
OSPF INF
Lists the interface ID (virtual interface for dynamic OSPF routes) supporting
each listed OSPF area ID.
Wireless Controller and Service Platform System Reference Guide
15 - 240
Statistics
Fully adj
numbers
Fully adjusted numbers strip away the effects of other non OSPF and LSA
factors and events, leaving only relevant OSPF area network route events
counted.
Auth Type
Lists the authentication schemes used to validate the credentials of dynamic
route connections and their areas.
Total LSA
Lists the Link State Advertisements (LSAs) of all entities using the dynamic
route (in any direction) in the listed area ID.
Router LSA
Lists the Link State Advertisements of the router supporting each listed area
ID. The router LSA reports active router interfaces, IP addresses, and
neighbors.
Network LSA
Displays which routers are joined together by the designated router on a
broadcast segment (e.g. Ethernet). Type 2 LSAs are flooded across their own
area only. The link state ID of the type 2 LSA is the IP interface address of the
designated route.
Summary LSA
The summary LSA is generated by ABR to leak area summary address info
into another areas. ABR generates more than one summary LSA for an area if
the area addresses cannot be properly aggregated by only one prefix.
ASBR Summary
LSA
Originated by ABRs when an ASBR is present to let other areas know where
the ASBR is. These are supported just like summary LSAs.
NSSA LSA
Routers in a Not-so-stubby-area (NSSA) do not receive external LSAs from
Area Border Routers, but are allowed to send external routing information for
redistribution. They use type 7 LSAs to tell the ABRs about these external
routes, which the Area Border Router then translates to type 5 external LSAs
and floods as normal to the rest of the OSPF network.
Redistribution into an NSSA area creates a special type of LSA known as TYPE
7, which can exist only in an NSSA area. An NSSA ASBR generates this LSA,
and an NSSA ABR router translates it into type 5 LSA which gets propagated
into the OSPF domain.
Opaque Area
LSA CSUM
Displays the Type-10 opaque link area checksum with the complete contents
of the LSA. Type-10 Opaque LSAs are not flooded beyond the borders of their
associated area.
Opaque link
CSUM
Displays the Type-10 opaque link checksum with the complete contents of the
LSA.
5 Select the Refresh button to update the statistics counters to their latest values.
15.4.17.4 OSPF Route Statistics
OSPF
Refer to the Routes tab to assess the status of OSPF Border Routes, External Routes, Network Routes and Router
Routes.
To view OSPF route statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen), expand the default node and
select an Access Point for statistical observation.
3 Select OSPF.
Wireless Controller and Service Platform System Reference Guide
15 - 241
Statistics
4 Select the Routes tab. The Border Routers tab display by default.
An area border router (ABR) connects (links) more than one area. Usually an ABR is used to connect nonbackbone areas to the backbone. If OSPF virtual links are used an ABR will also be used to connect the area
using the virtual link to another non-backbone area. Border routes use internal OSPF routing table entries to an
ABR or Autonomous System Boundary Router (ASBR). Border routers maintain an LSDB for each area
supported. They also participate in the backbone.
5 Refer to External Routes tab.
Figure 15-165 Access Point - OSPF External Routes tab
External routes are external to area, originate from other routing protocols (or different OSPF processes) and
are inserted into OSPF using redistribution. A stub area is configured not to carry external routes. Each external
route can be tagged by the advertising router, enabling the passing of additional information between routers.
Each external route can also be tagged by the advertising router, enabling the passing of additional
information between routers on the boundary of the autonomous system.
The External route tab displays a list of external routes, the area impacted, cost, path type, tag and type 2 cost.
Cost factors may be the distance of a router (round-trip time), network throughput of a link, or link availability
and reliability, expressed as simple unit-less numbers. This provides a dynamic process of traffic load balancing
between routes of equal cost.
6 Refer to the Network Routes tab.
Wireless Controller and Service Platform System Reference Guide
15 - 242
Statistics
Figure 15-166 Access Point - OSPF Network Routes tab
Network routes support more than two routers, with the capability of addressing a single physical message to
all attached routers (broadcast). Neighboring routers are discovered dynamically using OSPF hello messages.
This use of the hello protocol takes advantage of broadcast capability. An OSPF network route makes further
use of multicast capabilities, if they exist. Each pair of routers on the network is assumed to communicate
directly.
The network tab displays the network name, impacted OSPF area, cost, destination and path type.
7 Select the Router Routes tab.
Figure 15-167 Access Point - OSPF Router Routes tab
Wireless Controller and Service Platform System Reference Guide
15 - 243
Statistics
An internal (or router) route connects to one single OSPF area. All of its interfaces connect to the area in which
it is located and does not connect to any other area.
8 Select the Refresh button (within any of the four OSPF Routes tabs) to update the statistics counters to their
latest values.
15.4.17.5 OSPF Interface
OSPF
An OSPF interface is the connection between a router and one of its attached networks. An interface has state
information associated with it, which is obtained from the underlying lower level protocols and the routing
protocol itself. A network interface has associated a single IP address and mask (unless the network is an
unnumbered point-to-point network). An interface is sometimes also referred to as a link.
To view OSPF interface statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen), expand the default node and
select an Access Point for statistical observation.
3 Select OSPF.
4 Select the OSPF Interface tab.
Figure 15-168 Access Point - OSPF Interface tab
The OSPF Interface tab describes the following:
Interface Name
Displays the IP addresses and mask defined as the virtual interface for
dynamic OSPF routes. Zero config and DHCP can be used to generate route
addresses, or a primary and secondary address can be manually provided.
Interface Index
Lists the numerical index used for the OSPF interface. This interface ID is in the
hello packets establishing the OSPF network connection.
Bandwidth (kb)
Lists the OSPF interface bandwidth (in Kbps) in the range of 1 - 10,000,000.
Interface Flags
Displays the flag used to determine the interface status.
Wireless Controller and Service Platform System Reference Guide
15 - 244
Statistics
MTU
Lists the OSPF interface maximum transmission unit (MTU) size. The MTU is
the largest physical packet size (in bytes) a network can transmit. Any packets
larger than the MTU are divided into smaller packets before being sent.
OSPF Enabled
Lists whether OSPF has been enabled for each listed interface. OSPF is
disabled by default.
UP/DOWN
Displays whether the OSPF interface (the dynamic route) is currently up or
down for each listed interface. An OSPF interface is the connection between a
router and one of its attached networks.
5 Select the Refresh button to update the statistics counters to their latest values.
15.4.17.6 OSPF State
OSPF
An OSPF enabled Access Point sends hello packets to discover neighbors and elect a designated router for
dynamic links. The hello packet includes link state data maintained on each Access Point and is periodically
updated on all OSPF members. The Access Point tracks link state information to help assess the health of the
OSPF dynamic route.
To view OSPF state statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen), expand the default node and
select an Access Point for statistical observation.
3 Select OSPF.
4 Select the OSPF State tab.
Figure 15-169 Access Point OSPF - State tab
Wireless Controller and Service Platform System Reference Guide
15 - 245
Statistics
The OSPF State tab describes the following:
OSPF state
Displays the OSPF link state amongst neighbors within the OSPF topology.
Link state information is maintained in a link-state database (LSDB) which is a
tree image of the entire network topology. Identical copies of the LSDB are
periodically updated through flooding on all OSPF supported nodes. Flooding
is the part of the OSPF protocol that distributes and synchronizes the linkstate database between OSPF routers.
OSPF ignore
state count
Lists the number of times state requests have been ignored between the
Access Point and its peers within this OSPF supported broadcast domain.
OSPF ignore
state monitor
timeout
Displays the timeout that, when exceeded, prohibits the Access Point from
detecting changes to the OSPF link state.
OSPF ignore
state timeout
Displays the timeout that, when exceeded, returns the Access Point back to
state assessment amongst neighbors in the OSPF topology.
OSPF max
ignore state
count
Displays whether an OSPF state timeout is being ignored and not utilized in
the transmission of state update requests amongst neighbors within the OSPF
topology.
OSPF max routes States the maximum number of routes negotiated amongst neighbors within
the OSPF topology.
OSPF routes
received
Lists the routes received and negotiated amongst neighbors within the OSPF
topology.
5 Select the Refresh button to update the statistics counters to their latest values.
15.4.18 L2TPv3 Tunnels
Access Point Statistics
Access Points use L2TP V3 to create tunnels for transporting layer 2 frames. L2TP V3 enables an Access Point to
create tunnels for transporting Ethernet frames to and from bridge VLANs and physical ports. L2TP V3 tunnels can
be defined between WING devices and other devices supporting the L2TP V3 protocol.
To review a selected Access Point’s L2TPv3 statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select L2TPv3.
Wireless Controller and Service Platform System Reference Guide
15 - 246
Statistics
Figure 15-170 Access Point - L2TPv3 screen
The Access Point L2TPv3 Tunnels screen displays the following:
Tunnel Name
Displays the name of each listed L2TPv3 tunnel assigned upon creation.
Each listed tunnel name can be selected as a link to display session data
specific to that tunnel. The Sessions screen displays cookie size
information as well as psuedowire information specific to the selected
tunnel. Data is also available to define whether the tunnel is a trunk
session and whether tagged VLANs are used. The number of transmitted,
received and dropped packets also display to provide a throughput
assessment of the tunnel connection. Each listed session name can also be
selected as a link to display VLAN information specific to that session. The
VLAN Details screen lists those VLANs used an Access Point interface in
L2TP tunnel establishment.
Local Address
Lists the IP address assigned as the local tunnel end point address, not the
tunnel interface’s IP address. This IP is used as the tunnel source IP
address. If a local address is not specified, the source IP address is chosen
automatically based on the tunnel peer IP address.
Peer Address
Lists the IP address of the L2TP tunnel peer establishing the tunnel
connection.
Tunnel State
States whether the tunnel is Idle (not utilized by peers) or is currently
active.
Peer Host Name
Lists the assigned peer hostname used as matching criteria in the tunnel
establishment process.
Peer Control
Connection ID
Displays the numeric identifier for the tunnel session. This is the peer
pseudowire ID for the session. This source and destination IDs are
exchanged in session establishment messages with the L2TP peer.
CTRL Connection ID
Displays the router ID(s) sent in tunnel establishment messages with a
potential peer device.
Up Time
Lists the amount of time the L2TP connection has remained established
amongst peers sharing the L2TPv3 tunnel connection. The Up Time is
displayed in a Days: Hours: Minutes: Seconds: format. If D:0 H:0 M:0 S:0 is
displayed, the tunnel connection is not currently established.
Wireless Controller and Service Platform System Reference Guide
15 - 247
Statistics
Encapsulation
Protocol
Displays either IP or UDP as the peer encapsulation protocol. The default
setting is IP. UDP uses a simple transmission model without implicit
handshakes. Tunneling is also called encapsulation. Tunneling works by
encapsulating a network protocol within packets carried by the second
network.
Critical Resource
Lists critical resources for this tunnel. Critical resources are device IP
addresses on the network (gateways, routers etc.). These IP addresses are
critical to the health of the network. These device addresses are pinged
regularly by Access Points. If there’s a connectivity issue, an event is
generated stating a critical resource is unavailable.
VRRP Group
Displays the VRRP group name if configured. VRRP configurations support
router redundancy in a wireless network requiring high availability.
Establishment
Criteria
Displays the tunnel establishment criteria for this tunnel. Tunnel
establishment involves exchanging 3 message types (SCCRQ, SCCRP and
SCCN) with the peer. Tunnel IDs and capabilities are exchanged during the
tunnel establishment with the host.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest value.
15.4.19 VRRP
Access Point Statistics
The VRRP statistics screen displays Virtual Router Redundancy Protocol (VRRP) configuration statistics supporting
router redundancy in a wireless network requiring high availability.
To review a selected Access Point’s VRRP statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select VRRP.
Wireless Controller and Service Platform System Reference Guide
15 - 248
Statistics
Figure 15-171 Access Point - VRRP screen
4 Refer to the Global Error Status field to review the various sources of packet errors logged during the
implementation of the virtual route.
Errors include the mismatch of authentication credentials, invalid packet checksums, invalid packet types,
invalid virtual route IDs, TTL errors, packet length errors and invalid (non matching) VRRP versions.
5 Refer to the Router Operations Summary for the following status:
VRID
Lists a numerical index (1 - 254) used to differentiate VRRP configurations.
The index is assigned when a VRRP configuration is initially defined. This
ID identifies the virtual router a packet is reporting status for.
Virtual IP Address
Lists the virtual interface IP address used as the redundant gateway
address for the virtual route.
Master IP Address
Displays the IP address of the elected VRRP master. A VRRP master (once
elected) responds to ARP requests, forwards packets with a destination
link layer MAC address equal to the virtual router MAC address, rejects
packets addressed to the IP address associated with the virtual router and
accepts packets addressed to the IP address associated with the virtual
router.
Interface Name
Displays the interfaces selected on the Access Point to supply VRRP
redundancy failover support.
Version
Display VRRP version 3 (RFC 5798) or 2 (RFC 3768) as selected to set the
router redundancy. Version 3 supports sub-second (centisecond) VRRP
failover and support services over virtual IP.
State
Displays the current state of each listed virtual router ID.
Clear Router Status
Select the Clear Router Status button to clear the Router Operations
Summary table values to zero and begin new data collections.
Clear Global Error
Status
Select the Clear Global Error Status button to clear the Global Error Status
table values to zero and begin new data collections.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
Wireless Controller and Service Platform System Reference Guide
15 - 249
Statistics
15.4.20 Critical Resources
Access Point Statistics
The Critical Resources statistics screen displays a list of device IP addresses on the network (gateways, routers
etc.). These IP addresses are critical to the health of the controller or service platform managed network. These
device addresses are pinged regularly by managed Access Points. If there’s a connectivity issue, an event is
generated stating a critical resource is unavailable. Thus, each device’s VLAN, ping mode and state is displayed for
the administrator.
To review a selected Access Point’s critical resource statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Critical Resources.
Figure 15-172 Access Point - Critical Resources screen
4 Refer to the General field to assess the Monitor Interval and Monitor Using Flows Interval used to poll for
updates from the critical resource IP listed for Source IP For Port-Limited Monitoring. Monitoring Retries before
Marking Resource as DOWN are the number of retry connection attempts permitted before this listed resource
is defined as down (offline).
The Access Point Critical Resource screen displays the following:
Critical Resource
Name
Lists the name of the critical resource monitored by the Access Point.
Critical resources are device IP addresses on the network (gateways,
routers etc.). These IP addresses are critical to the health of the network.
These device addresses are pinged regularly by Access Points. If there’s a
connectivity issue, an event is generated stating a critical resource is
unavailable.
Via
Lists the VLAN used by the critical resource as a virtual interface. The
critical resource displays as a link than can be selected to list configuration
and network address information in greater detail.
Wireless Controller and Service Platform System Reference Guide
15 - 250
Statistics
Status
Defines the operational state of each listed critical resource VLAN interface
(either Up or Down).
Error Reason
Provides an error status as to why the critical resource is not available over
its designated VLAN.
Mode
Displays the operational mode of each listed critical resource.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.4.21 LDAP Agent Status
Access Point Statistics
When LDAP has been specified as an external resource (as opposed to local Access Point RADIUS resources) to
validate PEAP-MS-CHAP v2 authentication requests, user credentials and password information needs to be made
available locally to successfully connect to the external LDAP server. Up to two LDAP Agents (primary and
secondary external resources) can be defined as external resources for PEAP-MS-CHAP v2 authentication requests.
AP6521 model Access Point does not support this feature in Standalone AP or Controller AP mode. However,
AP6521 model is supported when adopted and managed by a controller or service platform.
For more information on setting LDAP agents as part of the RADIUS server policy, see Configuring RADIUS Server
Policies on page 11-57.
To view Access Point LDAP agent statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select LDAP Agent Status.
Figure 15-173 Access Point - LDAP Agent Status screen
Wireless Controller and Service Platform System Reference Guide
15 - 251
Statistics
The LDAP Agent Status screen displays the following:
LDAP Agent Primary
Lists the primary IP address of a remote LDAP server resource used by
the Access Point to validate PEAP-MS-CHAP v2 authentication
requests. When a RADIUS server policy’s data source is set to LDAP,
this is the first resource for authentication requests.
LDAP Agent Secondary
Lists the secondary IP address of a remote LDAP server resource used
by the Access Point to validate PEAP-MS-CHAP v2 authentication
requests. When a RADIUS server policy’s data source is set to LDAP,
this is the second resource for authentication requests.
Message
Displays any system message generated in the Access Point’s
connection with the primary or secondary LDAP agent. If there’s a
problem with the username and password used to connection to the
LDAP agent, it would be listed here.
Status
Displays whether the Access Point has successfully joined the remote
LDAP server domain designated to externally validate PEAP-MS-CHAP
v2 authentication requests.
Refresh
Select Refresh to update the statistics counters to their latest values.
15.4.22 Mint Links
Access Point Statistics
Wireless controllers and Access Points use the MiNT protocol as the primary means of device discovery and
communication for Access point adoption and management. MiNT provides a mechanism to discover neighbor
devices in the network, and exchange packets between devices regardless of how these devices are connected (L2
or L3).
MiNT provides the means to secure communications at the transport layer. Using MiNT, a device can be configured
to only communicate with other authorized (MiNT enabled) devices of the same model. MiNT links can be
established over a VLAN (Among Access Points on a VLAN) or IP (remote access point to controller).
MiNT Links are automatically created between controllers and Access Points during adoption using MLCP (MiNT
Link Creation Protocol). They can also be manually created between a controller and Access Point (or) between
Access Points. MiNT links are manually created between controllers while configuring a cluster.
Level 2 (or) remote MiNT links are controller aware links, and requires IP network for communication. This level 2
MiNT links at access points are intended for remote Adaptive AP deployment and management from NOC. With
Level2 MiNT links, access points are only aware of the controllers and not about other Access points. Level 2 MiNT
links also provide partitioning, between Access Points deployed at various remote sites.
To view an Access Point’s Mint links:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Mint Links from the left-hand side of the UI.
Wireless Controller and Service Platform System Reference Guide
15 - 252
Statistics
Figure 15-174 Access Point - Mint Links screen
The Mint Links screen lists the name of the impacted VLAN or link in the form of a link that can be selected to
display more granular information about that VLAN. A green check mark or a red X defines whether the listed
VLAN is listening to traffic, forced to stay up or unused with the Mint link. The level column specifies whether the
listed Mint link is traditional switching link (level 2) or a routing link (level 3). The type column defines whether the
listed Mint link is a VLAN or an IPv4 or IPv6 type network address. The dis column lists how each link was
discovered.
Refer to the secure column to assess whether the listed links are isolated between peers. The local ip column lists
the IP address assigned as the link’s end point address, not the interface’s IP address. The natted column lists
whether the link is NAT enabled or disabled for modifying network address information in IP packet headers in
transit. The cost defines the cost for a packet to travel from its originating port to its end point destination.
The hello seq number and hello interval define the interval between hello keep alive messages between link end
points. While the adj hold time sets the time after the last hello packet when the connected between end points is
defined as lost.
The static and dynamic link columns state whether each listed link is static route using a manually configured route
entry, or a dynamic route characterized by its destination The rim column defines whether the listed link is
managed remotely. The control vlan column states whether the listed link has enabled as a control VLAN. Lastly,
the clustering column states whether listed link members discover and establish connections to other peers and
provide self-healing in the event of cluster member failure.
4 Periodically select Refresh to update the screen’s data counters to their latest values.
5 If needed, select a Mint link from the name column to display more granular information for that link.
Wireless Controller and Service Platform System Reference Guide
15 - 253
Statistics
Figure 15-175 Access Point - Mint Link Details screen
The first table lists the Mint link’s name and level specifying whether the Mint link is traditional switching link
(level 2) or a routing link (level 3). The cost defines the cost for a packet to travel from its originating port to its
end point destination. The hello interval lists the time between hello keep alive messages between link end
points. The adj hold time sets the time after the last hello packet when the connected between end points is
defined as lost.
The Adjacencies table lists neighbor devices by their hardware identifiers and operational state to help
determine their availability as Mint link end points and peers. The up time lists the selected link’s detection on
the network and the last hello lists when the last hello message was exchanged.
6 Periodically select Refresh to update the statistics counters to their latest values.
15.4.23 Guest Users
Access Point Statistics
A captive portal is an access policy for providing guests temporary and restrictive access to the wireless network.
A captive portal configuration provides secure authenticated access using a standard Web browser. Captive portals
provide authenticated access by capturing and re-directing a wireless user's Web browser session to a captive
portal login page where the user must enter valid credentials to access to the network. Captive portals can have
their access durations set by an administrator to either provide temporary access to the Access Point managed
network or provide access without limitations.
For information on setting captive portal duration and authentication settings, refer to Configuring Captive Portal
Policies on page 11-1.
To view current Access Point guest user utilization:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
Wireless Controller and Service Platform System Reference Guide
15 - 254
Statistics
3 Select Guest Users.
Figure 15-176 Access Point – Guest Users screen
The Guest Users screen describes the following:
Name
Lists the administrator assigned name of the client utilizing the Access
Point for guest access to the WiNG managed wireless network.
Configured Time
Displays the restricted permissions each listed client was initially
(days:hrs:mins:secs) configured for their captive portal guest user session with this managing
Access Point.
Remaining Time
Displays the time each listed client has remaining in their captive portal
(days:hrs:mins:secs) guest user session with this Access Point.
Configured
Kilobytes
Lists the maximum configured bandwidth consumable by the listed guest
user (in kilobytes).
Remaining Kilobytes Lists the remaining bandwidth available to the listed guest user (in
kilobytes). This is the difference between the configured (maximum)
bandwidth and the users’s current utilization.
Configured
Downlink Rate
(kbps)
Specifies the download speed configured for the listed guest user. When
bandwidth is available, the user can download data at the specified rate
(in kilobytes per second). If a guest user has a bandwidth based policy
and exceeds the specified data limit, their speed is throttled to the defined
reduced downlink rate. For more information, refer to Defining User Pools
on page 11-53.
Configured Uplink
Rate (kbps)
Specifies the upload speed dedicated to the listed guest user. When
bandwidth is available, the user is able to upload data at the specified rate
(in kilobytes per second). If a guest user has a bandwidth based policy
and exceeds the specified data limit, their speed is throttled to the
reduced uplink rate. For more information, refer to Defining User Pools on
page 11-53.
Wireless Controller and Service Platform System Reference Guide
15 - 255
Statistics
Current Downlink
Rate (Kbps)
Lists the listed guest user’s current downlink rate in kbps. Use this
information to assess whether this user’s configured downlink rate is
adequate for their session requirements and whether their reduced
downlink rate need adjustment if the configured downlink rate is
exceeded. For more information, refer to Defining User Pools on page 1153.
Current Uplink Rate
(Kbps)
Lists the listed guest user’s current uplink rate in kbps. Use this
information to assess whether this user’s configured uplink rate is
adequate for their session requirements and whether their reduced uplink
rate need adjustment if the configured uplink rate is exceeded. For more
information, refer to Defining User Pools on page 11-53.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest value.
15.4.24 GRE Tunnels
Access Point Statistics
Generic Routing Encapsulation (GRE) is one of the available tunneling mechanisms which uses IP as the transport
protocol and can be used for carrying many different passenger protocols. The tunnels behave as virtual point-topoint links that have two endpoints identified by the tunnel source and tunnel destination addresses at each
endpoint.
To review a selected Access Point’s GRE statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select GRE Tunnels.
Wireless Controller and Service Platform System Reference Guide
15 - 256
Statistics
Figure 15-177 Access Point - GRE Tunnels screen
The Access Point GRE Tunnels screen displays the following:
GRE State
Displays the current operational state of the GRE tunnel.
Peer IP Address
Displays the IP address of the peer device on the remote end of the GRE
tunnel.
Tunnel Id
Displays the session ID of an established GRE tunnel. This ID is only viable
while the tunnel is operational.
Total Packets
Received
Displays the total number of packets received from a peer at the remote
end of the GRE tunnel.
Total Packets Sent
Displays the total number of packets sent from this Access Point to a peer
at the remote end of the GRE tunnel.
Total Packets
Dropped
Lists the number of packets dropped from tunneled exchanges between
this Access Point and a peer at the remote end of the VPN tunnel
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest value.
15.4.25 Dot1x
Access Point Statistics
Dot1x (or 802.1x) is an IEEE standard for network authentication. Devices supporting Dot1x allow the automatic
provision and connection to the wireless network without launching a Web browser at login. When within range of
a Dot1x network, a device automatically connects and authenticates without needing to manually login.
To view the Dot1x statistics:
Wireless Controller and Service Platform System Reference Guide
15 - 257
Statistics
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Dot1x from the left-hand side of the UI.
Figure 15-178 Access Point – Dot1x screen
4 Refer to the following Dot1xAuth statistics:
AAA Policy
Lists the AAA policy currently being utilized for authenticating user
requests.
Guest Vlan Control
Lists whether guest VLAN control has been allowed (or enabled). This is
the VLAN traffic is bridged on if the port is unauthorized and guest VLAN
globally enabled. A green checkmark designates guest VLAN control as
enabled. A red X defines guest VLAN control as disabled.
System Auth Control Lists whether Dot1x authorization is globally enabled for the Access Point.
A green checkmark designates Dot1x authorization globally enabled. A red
X defines Dot1x as globally disabled.
5 Review the following Dot1x Auth Ports utilization information:
Name
Lists the Access Point ge ports subject to automatic connection and
authentication using Dot1x.
Wireless Controller and Service Platform System Reference Guide
15 - 258
Statistics
Auth SM
Lists the current authentication state of the listed port.
Auth VLAN
Lists the virtual interface utilized post authentication.
BESM
Lists whether an authentication request is pending on the listed port.
Client MAC
Lists the MAC address of requesting clients seeking authentication over
the listed port.
Guest VLAN
Lists the guest VLAN utilized for the listed port. This is the VLAN traffic is
bridged on if the port is unauthorized and guest VLAN globally enabled.
Host
Lists whether the host is a single entity or not.
Pstatus
Lists whether the listed port has been authorized for Dot1x network
authentication.
6 Refer to the MacAuth table to assess the AAA policy applied to MAC authorization requests.
7 Review the following MAC Auth Ports utilization information:
Name
Lists the Access Point ge ports subject to automatic connection and MAC
authentication using Dot1x.
Authorized
Lists whether MAC authorization using Dot1x has been authorized
(permitted) on the listed ge port. A green checkmark designates Dot1x
authorization as authorized. A red X defines authorization as disabled.
Enabled
Lists whether MAC authorization using Dot1x has been enabled on the
listed ge port. A green checkmark designates Dot1x authorization as
allowed. A red X defines authorization as disabled.
MAC Auth
Lists the MAC address corresponding to the listed Access Point port
interface on which authentication requests are made.
8 Select the Refresh button to update the screen’s statistics counters to their latest value.
15.4.26 Network
Access Point Statistics
Use the Network screen to view information for performance statistics for ARP, DHCP, Routing and Bridging.For
more information, refer to the following:
• ARP Entries
• Route Entries
• Default Routes
• Bridge
• IGMP
• MLD
• Traffic Shaping
• DHCP Options
• Cisco Discovery Protocol
• Link Layer Discovery Protocol
• IPv6 Neighbor Discovery
• MSTP
Wireless Controller and Service Platform System Reference Guide
15 - 259
Statistics
15.4.26.1 ARP Entries
Network
Address Resolution Protocol (ARP) is a protocol for mapping an IP address to a device address recognized in the
local network. An address is 32 bits long. In an Ethernet local area network, however, addresses for attached
devices are 48 bits long. (The physical machine address is also known as a MAC address.) A table, usually called
the ARP cache, is used to maintain a correlation between each MAC address and its corresponding IP address.
ARP provides the protocol rules for making this correlation and providing address conversion in both directions.
To view an Access Point’s ARP statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Network and expand the menu to reveal its submenu items.
4 Select ARP Entries.
Figure 15-179 Access Point - Network ARP screen
The ARP Entries screen describes the following:
IP Address
Displays the IP address of the client resolved on behalf of the Access
Point.
ARP MAC Address
Displays the MAC address corresponding to the IP address being resolved.
Type
Lists the type of ARP entry.
VLAN
Displays the system assigned VLAN ID where an IP address was found.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
Wireless Controller and Service Platform System Reference Guide
15 - 260
Statistics
15.4.26.2 Route Entries
Network
The Route Entries screen displays data for routing packets to a defined destination. When an existing destination
subnet does not meet the needs of the network, add a new destination subnet, subnet mask and gateway as
needed for either IPv4 or IPv6 formatted data packets.
IPv4 operates as a best effort delivery method, as it does not guarantee delivery, and does not ensure proper
sequencing or duplicate delivery (unlike (TCP). IPv4 hosts can use link local addressing to provide local
connectivity.
IPv6 is the latest revision of the Internet Protocol (IP) designed to replace IPv4. IPV6 provides enhanced
identification and location information for devices on networks routing traffic across the Internet. IPv6 addresses
are composed of eight groups of four hexadecimal digits separated by colons.
To view IPv4 and IPv6 route entries:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Network and expand the menu to reveal its sub menu items.
4 Select Route Entries. The IPv4 Route Entries tab displays by default.
Figure 15-180 Access Point - Network IPv4 Route Entries screen
The IPv4 Route Entries screen lists the following:
Destination
Displays the IPv4 formatted address of the destination route address.
Wireless Controller and Service Platform System Reference Guide
15 - 261
Statistics
Distance
Lists the hop distance to a desired route. Devices regularly send
neighbors their own assessment of the total cost to get to all known
destinations. A neighboring device examines the information and
compares it to their own routing data. Any improvement on what’s
already known is inserted in that device’s own routing tables. Over
time, each networked device discovers the optimal next hop for each
destination.
Route
Lists the IPv4 formatted IP address used for routing packets to a
defined destination.
Flags
The flag signifies the condition of the direct or indirect route.
Gateway
Displays the gateway IP address used to route packets to the
destination subnet.
Interface
Displays the name of the controller interface or VLAN utilized by the
destination subnet.
Metric
Lists the metric (or cost) of the route to select (or predict) the best
route. The metric is computed using a routing algorithm, and covers
information bandwidth, network delay, hop count, path cost, load,
MTU, reliability, and communication cost.
Refresh
Select Refresh to update the display to the latest values.
5 Select the IPv6 Route Entries tab to review route data for IPv6 formatted traffic.
Figure 15-181 Wireless Controller - IPv6 Route Entries screen
The IPv6 Route Entries screen lists the following:
Destination
Displays the IPv6 formatted address of the destination route address.
Gateway
Displays the gateway IP address used to route packets to the
destination subnet.
Interface
Displays the name of the controller interface or VLAN utilized by the
destination subnet.
Flag
The flag signifies the condition of the direct or indirect route.
Refresh
Select Refresh to update the display to the latest values.
Wireless Controller and Service Platform System Reference Guide
15 - 262
Statistics
15.4.26.3 Default Routes
Network
In an IPv6 supported environment unicast routing is always enabled. A controller or service platform routes IPv6
formatted traffic between interfaces as long as the interfaces are enabled for IPv6 and ACLs allow IPv6 formatted
traffic. However, an administrator can add a default routes as needed.
Static routes are manually configured. They work fine in simple networks. However, static routes with topology
changes require an administrator to manually configure and modify the corresponding route revisions. Default
routes are useful, as they forward packets that match no specific routes in the routing table.
To view Access Point default routes:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Network and expand the menu to reveal its sub menu items.
4 Select Default Routes. The IPv4 Default Routes tab displays by default.
Figure 15-182 Access Point - IPv4 Default Routes screen
The IPv4 Default Routes screen provides the following information:
DNS Server
Lists the address of the DNS server providing IPv4 formatted address
assignments on behalf of the Access Point.
Gateway Address
Lists the IP address of the gateway resource used with the listed route.
Installed
A green checkmark defines the listed route as currently installed on
the Access Point. A red X defines the route as not currently installed
and utilized.
Metric
The metric (or cost) could be the distance of a router (round-trip
time), link throughput or link availability.
Wireless Controller and Service Platform System Reference Guide
15 - 263
Statistics
Monitor Mode
Displays where in the network the route is monitored for utilization
status.
Source
Lists whether the route is static, a DHCP-Client or an administrator
defined default route. Static routes are manually configured. Static
routes work adequately in simple networks. However, static routes
with topology changes require an administrator to manually configure
and modify the corresponding route revisions. Default routes are
useful, as they forward packets that match no specific routes in the
routing table.
Monitoring Status
Lists whether the defined IPv4 route is currently reachable on the
Access Point managed network. If not, perhaps a topology change has
occurred to a static route requiring a default route be utilized.
Refresh
Select Refresh to update the display to the latest values.
5 Select the IPv6 Default Routes tab to review default route availabilities for IPv6 formatted traffic.
Figure 15-183 Wireless Controller - IPv6 Default Routes screen
The IPv6 Default Routes screen provides the following information:
Gateway Address
Lists the IP address of the gateway resource used with the listed route.
Installed
A green checkmark defines the listed IPv6 default route as currently
installed on the Access Point. A red X defines the route as not
currently installed and utilized.
Interface Name
Displays the interface on which the IPv6 default route is being utilized.
Lifetime
Lists the lifetime representing the valid usability of the default IPv6
route.
Preference
Displays the administrator defined IPv6 preferred route for IPv6 traffic.
Wireless Controller and Service Platform System Reference Guide
15 - 264
Statistics
Source
Lists whether the route is static or an administrator defined default
route. Static routes are manually configured. Static routes work
adequately in simple networks. However, static routes with topology
changes require an administrator to manually configure and modify
the corresponding route revisions. Default routes are useful, as they
forward packets that match no specific routes in the routing table.
Status
Lists whether the defined IPv6 route is currently reachable on the
Access Point managed network. If not, perhaps a topology change has
occurred to a static route requiring a default route be utilized.
Refresh
Select Refresh to update the display to the latest values.
15.4.26.4 Bridge
Network
Bridging is a forwarding technique used in networks. Bridging makes no assumption about where a particular
address is located. It relies on the flooding and examination of source addresses in received packet headers to
locate unknown devices. Once a device is located, its location is stored in a table to avoid broadcasting to that
device again. Bridging is limited by its dependency on flooding, and is used in local area networks only. A bridge
and an Access Point are very much alike, as an Access Point can be viewed as a bridge with a number of ports.
The Bridge screen provides details about the Integrate Gateway Server (IGS), which is a router connected to an
Access Point. The IGS performs the following:
• Issues IP addresses
• Throttles bandwidth
• Permits access to other networks
• Times out old logins
The Bridging screen also provides information about the Multicast Router (MRouter), which is a router program
that distinguishes between multicast and unicast packets and how they should be distributed along the Multicast
Internet. Using an appropriate algorithm, a multicast router instructs a switching device what to do with the
multicast packet.
To view an Access Point’s Bridge statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Network and expand the menu to reveal its sub menu items.
4 Select Bridge.
Wireless Controller and Service Platform System Reference Guide
15 - 265
Statistics
Figure 15-184 Access Point - Network Bridge screen
5 Review the following bridge configuration attributes:
Bridge Name
Displays the numeric ID of the network bridge.
MAC Address
Displays the MAC address of the bridge selected.
Interface
Displays the interface (Access Point physical port name) where the bridge
transferred packets. Supported Access Points models have different port
configurations.
VLAN
Displays the VLAN the bridge uses a virtual interface.
Forwarding
Displays whether the bridge is forwarding packets.
6 Select Refresh to update the counters to their latest values.
15.4.26.5 IGMP
Network
Internet Group Management Protocol (IGMP) is a protocol used for managing members of IP multicast groups. The
Access Point listens to IGMP network traffic and forwards the IGMP multicast packets to radios on which the
interested hosts are connected. On the wired side of the network, the Access Point floods all the wired interfaces.
This feature reduces unnecessary flooding of multicast traffic in the network
To view a network’s IGMP configuration:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Network and expand the menu to reveal its sub menu items.
4 Select IGMP.
Wireless Controller and Service Platform System Reference Guide
15 - 266
Statistics
Figure 15-185 Access Point - Network IGMP screen
The Group field displays the following:
VLAN
Displays the group VLAN where the multicast transmission is conducted.
Group Address
Displays the Multicast Group ID supporting the statistics displayed. This
group ID is the multicast address that hosts are listening to.
Port Members
Displays the ports on which multicast clients have been discovered by the
Access Point. For example, ge1, radio1, etc.
Version
Displays each listed group IGMP version compatibility as either version 1, 2
or 3.
The Multicast Router (MRouter) field displays the following:
VLAN
Displays the group VLAN where the multicast transmission is conducted.
Learn Mode
Displays the learning mode used by the router as either Static or
PIM-DVMRP.
Port Members
Displays the ports on which multicast clients have been discovered by the
multicast router. For example, ge1, radio1, etc.
MiNT IDs
Lists MiNT IDs for each listed VLAN. MiNT provides the means to secure
Access Point profile communications at the transport layer. Using MiNT, an
Access Point can be configured to only communicate with other
authorized (MiNT enabled) Access Points of the same model.
Query Interval
Lists the IGMP query interval implemented when the querier functionality
is enabled. The default value is 60 seconds.
Version
Lists the multicast router IGMP version compatibility as either version 1, 2
or 3. The default setting is 3.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
Wireless Controller and Service Platform System Reference Guide
15 - 267
Statistics
15.4.26.6 MLD
Network
Multicast Listener Discovery (MLD) snooping enables a controller, service platform or Access Point to examine MLD
packets and make forwarding decisions based on content. MLD is used by IPv6 devices to discover devices
wanting to receive multicast packets destined for specific multicast addresses. MLD uses multicast listener queries
and multicast listener reports to identify which multicast addresses have listeners and join multicast groups.
MLD snooping caps the flooding of IPv6 multicast traffic on controller, service platform or Access Point VLANs.
When enabled, MLD messages are examined between hosts and multicast routers and to discern which hosts are
receiving multicast group traffic. The controller, service platform or Access Point then forwards multicast traffic
only to those interfaces connected to interested receivers instead of flooding traffic to all interfaces.
To view network MLD configuration options:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Network and expand the menu to reveal its sub menu items.
4 Select MLD.
Figure 15-186 Access Point - Network MLD screen
Wireless Controller and Service Platform System Reference Guide
15 - 268
Statistics
The Multicast Listener Discovery (MLD) Group field describes the following:
VLAN
Displays the group VLAN where the MLD groups multicast transmission is
conducted.
Group Address
Displays the Multicast Group ID supporting the statistics displayed. This
group ID is the multicast address hosts are listening to.
Port Members
Displays the ports on which MLD multicast clients have been discovered.
For example, ge1, radio1, etc. Ports can vary somewhat amongst supported
Access Point models.
Version
Displays each listed group’s version compatibility as either version 1, 2 or 3.
The IPv6 Multicast Router (MRouter) field describes the following:
VLAN
Displays the group VLAN where the multicast transmission is conducted.
MiNT IDs
Lists MiNT IDs for each listed VLAN. MiNT provides the means to secure
communications at the transport layer. Using MiNT, an Access Point can be
configured to only communicate with other authorized (MiNT enabled)
devices.
Learn Mode
Displays the learning mode used by the router as either Static or PIMDVMRP.
Port Members
Displays the physical ports on which multicast clients have been
discovered by the multicast router. For example, ge1, radio1, etc. Ports can
vary somewhat amongst supported Access Point models.
Query Interval
Lists the query interval implemented when the querier functionality is
enabled. The default value is 60 seconds.
Version
Lists the multicast router version compatibility as either version 1, 2 or 3.
The default setting is 3.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.4.26.7 Traffic Shaping
Network
Traffic shaping regulates network data transfers to ensure a specific performance level. Traffic shaping delays the
flow of packets defined as less important than prioritized traffic streams. Traffic shaping enables traffic control out
an interface to match its flow to the speed of a remote target’s interface and ensure traffic conforms applied
policies. Traffic can be shaped to meet downstream requirements and eliminate network congestion when data
rates are in conflict.
Apply traffic shaping to specific applications to apply application categories. When application and ACL rules are
conflicting, an application takes precedence over an application category, then ACLs.
To view network Access Point traffic shaping configuration:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Expand the Network menu from the left-hand side of the UI.
4 Select Traffic Shaping. The Status screen displays by default, and lists the Access Point’s traffic shaping status.
Wireless Controller and Service Platform System Reference Guide
15 - 269
Statistics
Figure 15-187 Access Point - Network Traffic Shaping Statistics screen
5 Select Statistics.
6 Refer to the following Traffic Shaping statistics:
Rate
The rate configuration controls the maximum traffic rate sent or received
on an interface. Consider this form of rate limiting on interfaces at the
edge of a network to limit traffic into or out of the network. Traffic within
the set limit is sent and traffic exceeding the set limit is dropped or sent
with a different priority.
Priority
Lists the traffic shaper queue priority. There are 8 queues (0 - 7), and
traffic is queued in each based on incoming packets 802.1p markings.
Packets Sent
Provides a baseline of the total number of packets sent to assess packet
delays and drops as a result of the filter rules applied in the traffic shaping
configuration.
Packets Delayed
Lists the packets defined as less important than prioritized traffic streams
and delayed as a result of traffic shaping filter rules applied.
Packets Dropped
Lists the packets defined as less important than prioritized traffic streams,
delayed and eventually dropped as a result of traffic shaping filter rules
applied.
Current Length
Lists the packet length of the data traffic shaped to meet downstream
requirements.
Current Latency
Traffic shaping latency is the time limit after which packets start dropping
as a result of the traffic prioritization filter rules applied.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.4.26.8 DHCP Options
Network
Supported Access Points can use a DHCP server resource to provide the dynamic assignment of IP addresses
automatically. This is a protocol that includes IP address allocation and delivery of host-specific configuration
parameters from a DHCP server to a host. Some of these parameters are IP address, gateway and network mask.
Wireless Controller and Service Platform System Reference Guide
15 - 270
Statistics
The DHCP Options screen provides the DHCP server name, image file on the DHCP server, and its configuration.
To view a network’s DHCP Options:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Network and expand the menu to reveal its sub menu items.
4 Select DHCP Options.
Figure 15-188 Access Point - Network DHCP Options screen
The DHCP Options screen displays the following:
Server Information
Displays the DHCP server hostname used on behalf of the Access Point.
Image File
Displays the image file name. BOOTP or the bootstrap protocol can be
used to boot diskless clients. An image file is sent from the boot server.
The image file contains the image of the operating system the client will
run. DHCP servers can be configured to support BOOTP.
Configuration
Displays the name of the configuration file on the DHCP server.
Legacy Adoption
Displays historical device adoption information on behalf of the Access
Point.
Adoption
Displays adoption information on behalf of the Access Point.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
Wireless Controller and Service Platform System Reference Guide
15 - 271
Statistics
15.4.26.9 Cisco Discovery Protocol
Network
The Cisco Discovery Protocol (CDP) is a proprietary Data Link Layer network protocol implemented in Cisco
networking equipment and used to share information about network devices.
To view an Access Point’s CDP statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Network and expand the menu to reveal its sub menu items.
4 Select Cisco Discovery Protocol.
Figure 15-189 Access Point - Network CDP screen
The Cisco Discovery Protocol screen displays the following:
Capabilities
Displays the capabilities code for the device as either Router, Trans Bridge,
Source Route Bridge, Host, IGMP or Repeater.
Device ID
Displays the configured device ID or name for each listed device.
Local Port
Displays the local port name (Access Point physical port) for each CDP
capable device. Supported Access Point models have unique port
configurations.
Platform
Displays the model number of the CDP capable device interoperating with
the Access Point.
Port ID
Displays the Access Point’s numeric identifier for the local port.
TTL
Displays the time to live (TTL) for each CDP connection.
Clear Neighbors
Select Clear Neighbors to remove CDP neighbors from the table and begin
a new data collection.
Refresh
Select Refresh to update the statistics counters to their latest values.
Wireless Controller and Service Platform System Reference Guide
15 - 272
Statistics
15.4.26.10 Link Layer Discovery Protocol
Network
The Link Layer Discovery Protocol (LLDP) or IEEE 802.1AB is a vendor-neutral Data Link Layer protocol used by
network devices for advertising of (announcing) their identity, capabilities, and interconnections on a IEEE 802
LAN network. The protocol is formally referred to by the IEEE as Station and Media Access Control Connectivity
Discovery.
To view a network’s Link Layer Discovery Protocol statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Network and expand the menu to reveal its sub menu items.
4 Select Link Layer Discovery.
Figure 15-190 Access Point - Network LLDP screen
The Link Layer Discovery Protocol screen displays the following:
Capabilities
Displays the capabilities code for the device.
Device ID
Displays the configured device ID or name for each device in the table.
Enabled Capabilities Displays which device capabilities are currently enabled.
Local Port
Displays the local port name (Access Point physical port) for each LLDP
capable device. Supported Access Point models have unique port
configurations.
Platform
Displays the model number of the LLDP capable device interoperating
with the Access Point.
Port ID
Displays the identifier for the local port.
TTL
Displays the time to live (TTL) for each LLDP connection.
Clear Neighbors
Select Clear Neighbors to remove all known LDP neighbors from the table.
Refresh
Select Refresh to update the statistics counters to their latest values.
Wireless Controller and Service Platform System Reference Guide
15 - 273
Statistics
15.4.26.11 IPv6 Neighbor Discovery
Network
IPv6 neighbor discovery uses ICMP messages and solicited multicast addresses to find the link layer address of a
neighbor on the same local network, verify the neighbor’s reachability and track neighboring devices.
Upon receiving a neighbor solicitation message, the destination replies with neighbor advertisement (NA). The
source address in the advertisement is the IPv6 address of the device sending the message. The destination
address in the advertisement message is the IPv6 address of the device sending the neighbor solicitation. The data
portion of the NA includes the link layer address of the node sending the neighbor advertisement.
Neighbor solicitation messages also verify the availability of a neighbor once its the link layer address is identified.
When a node wants to verify the reachability of a neighbor, the destination address in a neighbor solicitation
message is the unicast address of the neighbor.
A neighbor is interpreted as reachable when an acknowledgment is returned indicating packets have been
received and processed. If packets are reaching the device, they’re also reaching the next hop neighbor, providing
a confirmation the next hop is reachable.
To view an Access Point’s IPv6 neighbor statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Expand the Network menu from the left-hand side of the UI.
4 Select IPv6 Neighbor Discovery
Figure 15-191 Access Point - Network IPv6 Neighbor screen
Wireless Controller and Service Platform System Reference Guide
15 - 274
Statistics
The IPv6 Neighbor screen displays the following:
IPv6 Address
Lists an IPv6 IP address for neighbor discovery. IPv6 hosts can configure
themselves automatically when connected to an IPv6 network using the
neighbor discovery protocol via CMPv6 router discovery messages. When
first connected to a network, a host sends a link-local router solicitation
multicast request for its configuration parameters; routers respond to such
a request with a router advertisement packet that contains Internet Layer
configuration parameters. IPv6 addresses are composed of eight groups of
four hexadecimal digits separated by colons.
MAC Address
Lists the factory encoded hardware MAC address of the neighbor device
using an IPv6 formatted IP address as its network identifier.
Type
Displays the device type for the neighbor solicitation. Neighbor
solicitations request the link layer address of a target node while providing
the sender’s own link layer address to the target. Neighbor solicitations are
multicast when the node needs to resolve an address and unicast when
the node seeks to verify the reachability of a neighbor. Options include
Host, Router and DHCP Server.
VLAN
Lists the virtual interface (from 1 - 4094) used for the required neighbor
advertisements and solicitation messages used for neighbor discovery.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.4.26.12 MSTP
Network
The Multiple Spanning Tree Protocol (MSTP) provides an extension to RSTP to optimize the usefulness of VLANs.
MSTP allows for a separate spanning tree for each VLAN group, and blocks all but one of the possible alternate
paths within each spanning tree topology.
If there’s just one VLAN in the Access Point managed network, a single spanning tree works fine. However, if the
network contains more than one VLAN, the network topology defined by single STP would work, but it’s possible
to make better use of the alternate paths available by using an alternate spanning tree for different VLANs or
groups of VLANs.
MSTP includes all of its spanning tree information in a single Bridge Protocol Data Unit (BPDU) format. BPDUs are
used to exchange information bridge IDs and root path costs. Not only does this reduce the number of BPDUs
required to communicate spanning tree information for each VLAN, but it also ensures backward compatibility
with RSTP. MSTP encodes additional region information after the standard RSTP BPDU as well as a number of
MSTI messages. Each MSTI messages conveys spanning tree information for each instance. Each instance can be
assigned a number of configured VLANs. The frames assigned to these VLANs operate in this spanning tree
instance whenever they are inside the MST region. To avoid conveying their entire VLAN to spanning tree mapping
in each BPDU, the Access Point encodes an MD5 digest of their VLAN to an instance table in the MSTP BPDU. This
digest is used by other MSTP supported devices to determine if the neighboring device is in the same MST region
as itself.
To view a controller or service platform’s MSTP statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
Wireless Controller and Service Platform System Reference Guide
15 - 275
Statistics
3 Expand the Network menu from the left-hand side of the UI.
4 Select MSTP.
Figure 15-192 Access Point- Network MSTP screen
The MST Config field displays the name assigned to the MSTP configuration, its digest, format ID, name and
revision.
The MST Bridge field lists the filters and guards that have been enabled and whether Cisco interoperability if
enabled.
The MST Bridge Port Detail field lists specific Access Point port status and their current state.
15.4.27 DHCPv6 Relay & Client
Access Point Statistics
DHCPv6 is a networking protocol for configuring IPv6 hosts with IP addresses, IP prefixes or other configuration
attributes required on an IPv6 network. DHCPv6 relay agents receive messages from clients and forward them a
DHCPv6 server. The server sends responses back to the relay agent, and the relay agent sends the responses to
the client on the local link
To assess an Access Point’s DHCPv6 relay configuration:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
Wireless Controller and Service Platform System Reference Guide
15 - 276
Statistics
3 Select DHCP Relay & Client from the left-hand side of the UI.
Figure 15-193 Access Point - DHCPv6 Relay and Client screen
4 The DHCPv6 Status tables defines the following:
Interfaces
Displays the Access Point interface used for DHCPv6 relay.
State
Displays the current operational state of the DHCPv6 server to assess
its availability as a viable IPv6 provisioning resource.
5 The DHCPv6 Status tables defines the following:
Client Identifier
Lists whether the reporting client is using a hardware address or client
identifier as its identifier type within requests to the DHCPv6 server.
Server Identifier
Displays the server identifier supporting client DHCPv6 relay message
reception.
DNS Servers
Lists the DNS server resources supporting relay messages received
from clients.
Domain Name
Lists the domain to which the remote server resource belongs.
Interface
Displays the interfaces dedicated to client DHCPv6 relay message
reception.
Refresh Time (Seconds) Lists the time (in seconds) since the data populating the DHCPv6
client received options table has been refreshed.
Server Preference
Lists the preferred DHCPv6 server resource supporting relay messages
received from clients.
SIP Domain Name
Lists the SIP domain name supporting DHCPv6 client telephone
extensions or voice over IP systems.
Wireless Controller and Service Platform System Reference Guide
15 - 277
Statistics
SIP Server
Displays the SIP server name supporting DHCPv6 telephone
extensions or voice over IP systems.
Enterprise ID
Lists the enterprise ID associated with DHCPv6 received client options.
6 Refer to the Vendor Options table for the following:
Code
Lists the relevant numeric DHCP vendor code.
Data
Lists the supporting data relevant to the listed DHCP vendor code.
15.4.28 DHCP Server
Access Point Statistics
Access Point’s utilize an internal Dynamic Host Configuration Protocol (DHCP) server. DHCP can provide IP
addresses automatically. DHCP is a protocol that includes mechanisms for IP address allocation and delivery of
host-specific configuration parameters (IP address, network mask gateway etc.) from a DHCP server to a host.
To review DHCP server statistics, refer to the following:
• Viewing General DHCP Information
• Viewing DHCP Binding Information
• Viewing DHCP Server Networks Information
15.4.28.1 Viewing General DHCP Information
DHCP Server
To view General DHCP status and binding information for both DHCPv4 and DHCPv6:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Expand the DHCP Server menu from the left-hand side of the UI.
4 Select General.
Wireless Controller and Service Platform System Reference Guide
15 - 278
Statistics
Figure 15-194 Access Point - DHCP Server General screen
5 The DHCPv4 Status and DHCPv6 Status tables defines the following:
Interfaces
Displays the Access Point interface used with the DHCPv4 or DHCPv6
resource for IP address provisioning.
State
Displays the current operational state of the DHCPv4 or DHCPv6
server to assess its availability as a viable IP provisioning resource.
6 The DDNS Bindings table displays the following:
IP Address
Displays the IP address assigned to the requesting client.
Name
Displays the domain name mapping corresponding to the listed IP
address.
7 The DHCP Manual Bindings table displays the following:
IP Address
Displays the IP address for clients requesting DHCP provisioning
resources.
Client Id
Displays the client’s ID used to differentiate requesting clients.
8 Select the Refresh button to update the screen’s statistics counters to their latest values.
15.4.28.2 Viewing DHCP Binding Information
DHCP Server
The DHCP Binding screen displays DHCP binding information such as expiry time, client IP addresses and their
MAC address.
Access Points build and maintain a DHCP snooping table (DHCP binding database). An Access Point uses the
snooping table to identify and filter untrusted messages. The DHCP binding database keeps track of DHCP
Wireless Controller and Service Platform System Reference Guide
15 - 279
Statistics
addresses assigned to ports, as well as filtering DHCP messages from untrusted ports. Incoming packets received
on untrusted ports, are dropped if the source MAC address does not match the MAC in the binding table.
To view the DHCP binding information:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Expand the DHCP Server menu from the left-hand side of the UI.
4 Select Bindings.
Figure 15-195 Access Point - DHCP Server Bindings screen
The Bindings screen displays the following:
Expiry Time
Displays the expiration of the lease used by the client for Access Point
DHCP resources.
IP Address
Displays the IP address of each listed client requesting DHCP services.
DHCP MAC Address
Displays the MAC address of each listed client requesting DHCP
services.
Clear
Select a table entry and select Clear to remove the client from the list
of devices requesting DHCP services from the Access Point.
Clear All
Select Clear All to remove all listed clients from the list of requesting
clients.
Refresh
Select the Refresh button to update the screen’s statistics counters to
their latest values.
15.4.28.3 Viewing DHCP Server Networks Information
DHCP Server
The DHCP server maintains a pool of IP addresses and client configuration parameters (default gateway, domain
name, name servers etc). On receiving a valid client request, the server assigns the requestor an IP address, a lease
(the validity of time), and other IP configuration parameters.
Wireless Controller and Service Platform System Reference Guide
15 - 280
Statistics
The Networks screen provides network pool information such as the subnet for the addresses you want to use
from the pool, the pool name, the used addresses and the total number of addresses.
To view the DHCP Server Networks information:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Expand the DHCP Server menu from the left-hand side of the UI.
4 Select Networks.
Figure 15-196 Access Point - DHCP Server Networks screen
The Networks screen displays the following:
Name
Displays the name of the virtual network (VLAN) from which IP addresses
can be issued to DHCP client requests on the listed Access Point interface.
Subnet Address
Displays the subnet for the IP addresses used from the network pool.
Used Addresses
Displays the number of host IP addresses allocated by the DHCP server.
Total Addresses
Displays the total number of IP addresses available in the network pool for
requesting clients.
5 Select the Refresh button to update the screen’s statistics counters to their latest values.
15.4.29 Firewall
Access Point Statistics
A firewall is a part of a computer system or network designed to block unauthorized access while permitting
authorized communications. It’s a device or set of devices configured to permit or deny access to the controller or
service platform managed network based on a defined set of rules.
This screen is partitioned into the following:
• Packet Flows
Wireless Controller and Service Platform System Reference Guide
15 - 281
Statistics
•
•
•
•
•
•
•
Denial of Service
IP Firewall Rules
IPv6 Firewall Rules
MAC Firewall Rules
NAT Translations
DHCP Snooping
IPv6 Neighbor Snooping
15.4.29.1 Packet Flows
Firewall
The Packet Flows screen displays data traffic packet flow utilization. The chart represents the different protocol
flows supported, and displays a proportional view of the flows in respect to their percentage of data traffic utilized.
The Total Active Flows graph displays the total number of flows supported. Other bar graphs display for each
individual packet type.
To view Access Point packet flows statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Firewall and expand the menu to reveal its sub menu items.
4 Select Packet Flows.
5 Periodically select Refresh to update the statistics counters to their latest values. Clear All clears all the statistics
counters and begins a new data collection.
Figure 15-197 Access Point - Firewall Packet Flows screen
Wireless Controller and Service Platform System Reference Guide
15 - 282
Statistics
15.4.29.2 Denial of Service
Firewall
A denial-of-service attack (DoS attack) or distributed denial-of-service attack is an attempt to make a computer
resource unavailable to its intended users. Although the means to carry out a DoS attack may vary, it generally
consists of concerted efforts to prevent an Internet site or service from functioning efficiently.
One common method involves saturating the target’s machine with external communications requests, so it cannot
respond to legitimate traffic or responds so slowly as to be rendered effectively unavailable. DoS attacks are
implemented by either forcing the targeted computer(s) to reset, or consume its resources so it can’t provide its
intended service.
The DoS screen displays the types of attack, number of times it occurred and the time of last occurrence.
To view Access Point DoS attack information:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Firewall and expand the menu to reveal its sub menu items.
4 Select Denial of Service.
Figure 15-198 Access Point - Firewall Denial of Service screen
The Denial of Service screen displays the following:
Attack Type
Displays the Denial of Service (DoS) attack type.
Count
Displays the number of times the Access Point’s firewall has detected each
listed DoS attack.
Last Occurrence
Displays the when the attack event was last detected by the Access Point
firewall.
Wireless Controller and Service Platform System Reference Guide
15 - 283
Statistics
Clear All
Select the Clear All button to clear the screen of its current status and
begin a new data collection.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.4.29.3 IP Firewall Rules
Firewall
Create firewall rules to let any computer to send IPv4 formatted traffic to, or receive traffic from, programs, system
services, computers or users. Firewall rules can be created to take one of the three actions listed below that match
the rule’s criteria:
• Allow an IPv4 connection
• Allow an IPv4 connection only if it is secured through the use of Internet Protocol security
• Block a connection
Rules can be created for either inbound or outbound IPv4 formatted packet traffic. To view IPv4 firewall rules:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Firewall and expand the menu to reveal its sub menu items.
4 Select IP Firewall Rules.
Figure 15-199 Access Point - Firewall IP Firewall Rules screen
The IP Firewall Rules screen displays the following:
Precedence
Displays the precedence value applied to packets. The rules within an
Access Control Entries (ACL) list are based on precedence values. Every
rule has a unique precedence value between 1 and 5000. You cannot add
two rules with the same precedence.
Wireless Controller and Service Platform System Reference Guide
15 - 284
Statistics
Friendly String
The friendly string provides information as to which firewall the rules
apply.
Hit Count
Displays the number of times each firewall rule has been triggered.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.4.29.4 IPv6 Firewall Rules
Firewall
IPV6 provides enhanced identification and location information for computers on networks routing traffic across
the Internet. These hosts require firewall packet protection unique to IPv6 traffic, as IPv6 addresses are composed
of eight groups of four hexadecimal digits separated by colons. IPv6 hosts can configure themselves automatically
when connected to an IPv6 network using the neighbor discovery (ND) protocol via ICMPv6 router discovery
messages. When first connected to a network, a host sends a link-local router solicitation multicast request for its
configuration parameters; routers respond to such a request with a router advertisement packet that contains
Internet layer configuration parameters.
• Allow an IPv6 formatted connection
• Allow a connection only if it is secured through the use of IPv6 security
• Block a connection and exchange of IPv6 formatted packets
To view existing IPv6 firewall rules:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Expand the Firewall menu from the left-hand side of the UI.
4 Select IPv6 Firewall Rules.
Figure 15-200 Access Point- Firewall IPv6 Firewall Rules screen
Wireless Controller and Service Platform System Reference Guide
15 - 285
Statistics
The IPv6 Firewall Rules screen displays the following:
Precedence
Displays the precedence (priority) applied to IPV6 formatted packets.
Unlike IPv4, IPV6 provides enhanced identification and location
information for computers on networks routing traffic across the Internet.
IPv6 addresses are composed of eight groups of four hexadecimal digits
separated by colons. Every rule has a unique precedence value between 1 5000. You cannot add two rules with the same precedence value.
Friendly String
This is a string that provides more information as to the contents of the
IPv6 specific IP rule. This is for information purposes only.
Hit Count
Displays the number of times each IPv6 ACL has been triggered.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.4.29.5 MAC Firewall Rules
Firewall
The ability to allow or deny Access Point connectivity by client MAC address ensures malicious or unwanted clients
are unable to bypass the Access Point’s security filters. Firewall rules can be created to support one of the three
actions listed below that match the rule’s criteria:
• Allow a connection
• Allow a connection only if it’s secured through the MAC firewall security
• Block a connection
To view the Access Point’s MAC Firewall Rules:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Firewall and expand the menu to reveal its sub menu items.
4 Select MAC Firewall Rules.
Wireless Controller and Service Platform System Reference Guide
15 - 286
Statistics
Figure 15-201 Access Point - Firewall MAC Firewall Rules screen
The MAC Firewall Rules screen displays the following information:
Precedence
Displays a precedence value, which are applied to packets. The rules
within an Access Control Entries (ACL) list are based on their precedence.
Every rule has a unique precedence between 1 and 5000. You cannot add
two rules with the same precedence value.
Friendly String
This is a string that provides information as to which firewall the rules
apply.
Hit Count
Displays the number of times each WLAN ACL has been triggered.
Refresh
Select the Refresh button to update the screen’s statistics counters to
their latest values.
15.4.29.6 NAT Translations
Firewall
Network Address Translation (NAT) is a technique to modify network address information within IP packet headers
in transit. This enables mapping one IP address to another to protect wireless controller managed network address
credentials. With typical deployments, NAT is used as an IP masquerading technique to hide private IP addresses
behind a single, public facing, IP address.
NAT can provide a profile outbound Internet access to wired and wireless hosts connected to either an Access
Point or a wireless controller. Many-to-one NAT is the most common NAT technique for outbound Internet access.
Many-to-one NAT allows an Access Point or wireless controller to translate one or more internal private IP
addresses to a single, public facing, IP address assigned to a 10/100/1000 Ethernet port or 3G card.
Wireless Controller and Service Platform System Reference Guide
15 - 287
Statistics
To view the Firewall’s NAT translations:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Firewall and expand the menu to reveal its sub menu items.
4 Select NAT Translations.
Figure 15-202 Access Point - Firewall NAT Translation screen
The NAT Translations screen displays the following:
Protocol
Lists the NAT translation IP protocol as either TCP, UDP or ICMP.
Forward Source IP
Displays the source IP address for the forward NAT flow.
Forward Source Port Displays the source port for the forward NAT flow (contains ICMP ID if it is
an ICMP flow).
Forward Dest IP
Displays the destination IP address for the forward NAT flow.
Forward Dest Port
Destination port for the forward NAT flow (contains ICMP ID if it is an ICMP
flow).
Reverse Source IP
Displays the source IP address for the reverse NAT flow.
Reverse Source Port Displays the source port for the reverse NAT flow (contains ICMP ID if it is
an ICMP flow).
Reverse Dest IP
Displays the destination IP address for the reverse NAT flow.
Reverse Dest Port
Displays the destination port for the reverse NAT flow (contains ICMP ID if
it is an ICMP flow).
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
Wireless Controller and Service Platform System Reference Guide
15 - 288
Statistics
15.4.29.7 DHCP Snooping
Firewall
When DHCP servers are allocating IP addresses to clients on the LAN, DHCP snooping can be configured to better
enforce the security on the LAN to allow only clients with specific IP/MAC addresses.
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Firewall and expand the menu to reveal its sub menu items.
4 Select DHCP Snooping.
Figure 15-203 Access Point - Firewall DHCP Snooping screen
The DHCP Snooping screen displays the following:
MAC Address
Displays the MAC address of the client requesting DHCP resources from
the controller or service platform.
Node Type
Displays the NetBios node from which IP addresses can be issued to client
requests on this interface.
IP Address
Displays the IP address used for DHCP discovery, and requests between
the DHCP server and DHCP clients.
Netmask
Displays the subnet mask used for DHCP discovery, and requests between
the DHCP server and DHCP clients.
VLAN
Displays the VLAN used as a virtual interface for the newly created DHCP
configuration.
Lease Time
When a DHCP server allocates an address for a DHCP client, the client is
assigned a lease (which expires after a designated interval defined by the
administrator). The lease time is the time an IP address is reserved for reconnection after its last use. Using very short leases, DHCP can
dynamically reconfigure networks in which there are more computers than
there are available IP addresses. This is useful, for example, in education
and customer environments where client users change frequently. Use
longer leases if there are fewer users.
Wireless Controller and Service Platform System Reference Guide
15 - 289
Statistics
Time Elapsed Since
Last Updated
Displays the time the server was last updated.
Clear All
Select the Clear All button to clear the screen of its current status and
begin a new data collection.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.4.29.8 IPv6 Neighbor Snooping
Firewall
Access Points listen to IPv6 formatted network traffic and forward IPv6 packets to radios on which the interested
hosts are connected.
To review IPv6 neighbor snooping statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Expand the Firewall menu from the left-hand side of the UI.
4 Select IPv6 Neighbor Snooping.
Figure 15-204 Access Point- Firewall IPv6 Neighbor Snooping screen
The IPv6 Neighbor Snooping screen displays the following:
MAC Address
Displays the MAC address of the IPv6 client.
Node Type
Displays the NetBios node with an IPv6 address pool from which IP
addresses can be issued to client requests on this interface.
IPv6 Address
Displays the IPv6 address used for DHCPv6 discovery and requests
between the DHCPv6 server and DHCP clients.
VLAN
Displays an Access Point virtual interface ID used for a new DHCPv6
configuration.
Wireless Controller and Service Platform System Reference Guide
15 - 290
Statistics
Mint Id
Lists MiNT IDs for each listed VLAN. MiNT provides the means to
secure communications at the transport layer. Using MiNT, a device
can be configured to only communicate with other authorized (MiNT
enabled) devices of the same model.
Snoop Id
Lists the numeric snooping session ID generated when Access Points
listen to IPv6 formatted network traffic and forward IPv6 packets to
radios.
Time Elapsed Since
Displays the amount of time elapsed since the DHCPv6 server was last
updated.
Last Update
Clear Neighbors
Select Clear Neighbors to revert the counters to zero and begin a new
data collection.
Refresh
Select the Refresh button to update the screen’s counters to their
latest values.
15.4.30 VPN
Access Point Statistics
IPSec VPN provides a secure tunnel between two networked peer controllers or service platforms. Administrators
can define which packets are sent within the tunnel, and how they are protected. When a tunnelled peer sees a
sensitive packet, it creates a secure tunnel and sends the packet through the tunnel to its remote peer destination.
Tunnels are sets of security associations (SA) between two peers. SAs define the protocols and algorithms applied
to sensitive packets and specify the keying mechanisms used by tunnelled peers. SAs are unidirectional and exist
in both the inbound and outbound direction. SAs are established per the rules and conditions of defined security
protocols (AH or ESP).
Crypto maps combine the elements comprising IPSec SAs. Crypto maps also include transform sets. A transform
set is a combination of security protocols, algorithms and other settings applied to IPSec protected traffic. One
crypto map is utilized for each IPsec peer, however for remote VPN deployments one crypto map is used for all
the remote IPsec peers.
Internet Key Exchange (IKE) protocol is a key management protocol standard used in conjunction with IPSec. IKE
enhances IPSec by providing additional features, flexibility, and configuration simplicity for the IPSec standard. IKE
automatically negotiates IPSec SAs, and enables secure communications without time consuming manual preconfiguration.
VPN statistics are partitioned into the following:
IKESA
IPSec
15.4.30.1 IKESA
VPN
The IKESA screen allows for the review of individual peer security association statistics.
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
Wireless Controller and Service Platform System Reference Guide
15 - 291
Statistics
3 Select VPN and expand the menu to reveal its sub menu items.
4 Select IKESA.
Figure 15-205 Access Point - VPN IKESA screen
5 Review the following VPN peer security association statistics:
Peer
Lists peer IDs for peers sharing security associations (SA) for tunnel
interoperability. When a peer sees a sensitive packet, it creates a secure
tunnel and sends the packet through the tunnel to its destination.
Version
Displays each peer’s IKE version used for auto IPSec secure authentication
with the IPSec gateway and other controllers or service platforms.
State
Lists the state of each listed peer’s security association (whether
established or not).
Lifetime
Displays the lifetime for the duration of each listed peer IPSec VPN
security association. Once the set value is exceeded, the association is
timed out.
Local IP Address
Displays each listed peer’s local tunnel end point IP address. This address
represents an alternative to an interface IP address.
Clear All
Select the Clear All button to clear each peer of its current status and
begin a new data collection.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.4.30.2 IPSec
VPN
Use the IPSec VPN screen to assess tunnel status between networked peers.
To view IPSec VPN status for tunnelled peers:
Wireless Controller and Service Platform System Reference Guide
15 - 292
Statistics
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points
3 Select VPN and expand the menu to reveal its sub menu items.
4 Select IPSec.
Figure 15-206 Access Point - VPN IPSec screen
5 Review the following VPN peer security association statistics:
Peer
Lists IP addresses for peers sharing security associations (SAs) for tunnel
interoperability. When a peer sees a sensitive packet, it creates a secure
tunnel and sends the packet through the tunnel to its destination.
Local IP Address
Displays each listed peer’s local tunnel end point IP address. This address
represents an alternative to an interface IP address.
Protocol
Lists the security protocol used with the VPN IPSec tunnel connection.
SAs are unidirectional, existing in each direction and established per
security protocol. Options include ESP and AH.
State
Lists the state of each listed peer’s security association.
SPI In
Lists stateful packet inspection (SPI) status for incoming IPSec tunnel
packets. SPI tracks each connection traversing the IPSec VPN tunnel and
ensures they are valid.
SPI Out
Lists SPI status for outgoing IPSec tunnel packets. SPI tracks each
connection traversing the IPSec VPN tunnel and ensures they are valid.
Mode
Displays the IKE mode. IPSEC has two modes in IKEv1 for key exchanges.
Aggressive mode requires 3 messages be exchanged between the IPSEC
peers to setup the SA, Main requires 6 messages.
Clear All
Select the Clear All button to clear each peer of its current status and
begin a new data collection.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
Wireless Controller and Service Platform System Reference Guide
15 - 293
Statistics
15.4.31 Certificates
Access Point Statistics
The Secure Socket Layer (SSL) protocol ensures secure transactions between Web servers and browsers. SSL uses
a third-party certificate authority to identify one (or both) ends of a transaction. A browser checks the certificate
issued by the server before establishing a connection.
This screen is partitioned into the following:
• Trustpoints
• RSA Keys
15.4.31.1 Trustpoints
Certificates
Each certificate is digitally signed by a trustpoint. The trustpoint signing the certificate can be a certificate
authority, corporate or individual. A trustpoint represents a CA/identity pair containing the identity of the CA, CAspecific configuration parameters and an association with an enrolled identity certificate.
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points
3 Select Certificates and expand the menu to reveal its sub menu items.
4 Select Trustpoints.
Wireless Controller and Service Platform System Reference Guide
15 - 294
Statistics
Figure 15-207 Access Point - Certificate Trustpoint screen
The Certificate Details field displays the following:
Subject Name
Lists details about the entity to which the certificate is issued.
Alternate Subject
Name
Displays alternative details to the information specified under the Subject
Name field.
Issuer Name
Displays the name of the organization issuing the certificate.
Serial Number
The unique serial number of the certificate issued.
RSA Key Used
Displays the name of the key pair generated separately, or automatically
when selecting a certificate.
IS CA
Indicates whether this certificate is an authority certificate (Yes/No).
Is Self Signed
Displays whether the certificate is self-signed (Yes/No).
Server Certificate
Present
Displays whether a server certification is present or not (Yes/No).
CRL Present
Displays whether a Certificate Revocation List (CRL) is present (Yes/No). A
CRL contains a list of subscribers paired with digital certificate status. The
list displays revoked certificates along with the reasons for revocation. The
date of issuance and the entities that issued the certificate are also
included.
Wireless Controller and Service Platform System Reference Guide
15 - 295
Statistics
5 Refer to the Validity field to assess the certificate duration beginning and end dates.
6 Review the Certificate Authority (CA) Details and Validity information to assess the subject and certificate
duration periods.
7 Periodically select the Refresh button to update the screen’s statistics counters to their latest values.
15.4.31.2 RSA Keys
Certificates
Rivest, Shamir, and Adleman (RSA) is an algorithm for public key cryptography. It’s the first algorithm known to be
suitable for signing, as well as encryption.
The RSA Keys screen displays a list of RSA keys installed in the selected Access Point. RSA Keys are generally used
for establishing a SSH session, and are a part of the certificate set used by RADIUS, VPN and HTTPS.
To view the RSA Key details:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points
3 Select Certificates and expand the menu to reveal its sub menu items.
4 Select RSA Keys.
Figure 15-208 Access Point - Certificate RSA Keys screen
The RSA Key Details field displays the size (in bits) of the desired key. If not specified, a default key size of 1024
is used.
The RSA Public Key field lists the public key used for encrypting messages.
5 Periodically select the Refresh button to update the screen’s statistics counters to their latest values.
Wireless Controller and Service Platform System Reference Guide
15 - 296
Statistics
15.4.32 WIPS
Access Point Statistics
A Wireless Intrusion Prevention System (WIPS) monitors the radio spectrum for the presence of unauthorized
Access Points and take measures to prevent an intrusion. Unauthorized attempts to access a controller or service
platform managed WLAN is generally accompanied by anomalous behavior as intruding clients try to find network
vulnerabilities. Basic forms of this behavior can be monitored and reported without a dedicated WIPS. When the
parameters exceed a configurable threshold, a SNMP trap is generated that reports the results via management
interfaces.
The WIPS screens provide details about the blacklisted clients (unauthorized Access Points) intruded into the
network. Details include the name of the blacklisted client, the time when the client was blacklisted, the total time
the client remained in the network, etc. The screen also provides WIPS event details.
For more information, see:
• WIPS Client Blacklist
• WIPS Events
15.4.32.1 WIPS Client Blacklist
WIPS
This Client Blacklist displays blacklisted clients detected by this Access Point using WIPS. Blacklisted clients are not
allowed to associate to this Access Points.
To view the WIPS client blacklist for this Access Point:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select WIPS and expand the menu to reveal its sub menu items.
4 Select Client Blacklist.
Figure 15-209 Access Point - WIPS Client Blacklist screen
Wireless Controller and Service Platform System Reference Guide
15 - 297
Statistics
The WIPS Client Blacklist screen displays the following:
Event Name
Displays the name of the event that resulted in the blacklisting.
Blacklisted Client
Displays the MAC address of the unauthorized and blacklisted device
intruding this Access Point’s radio coverage area.
Time Blacklisted
Displays the time when the client was blacklisted by this Access Point.
Total Time
Displays the time the unauthorized (now blacklisted) device remained in
this Access Point’s WLAN.
Time Left
Displays the time the blacklisted client remains on the list.
Refresh
Select the Refresh button to update the statistics counters to their latest
values.
15.4.32.2 WIPS Events
WIPS
To view the WIPS events statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select WIPS and expand the menu to reveal its sub menu items.
4 Select WIPS Events.
Figure 15-210 Access Point - WIPS Events screen
The WIPS Events screen provides the following:
Event Name
Displays the name of the detected wireless intrusion event.
Reporting AP
Displays the MAC address of the Access Point reporting the listed
intrusion.
Originating Device
Displays the MAC address of the intruding device.
Detector Radio
Displays the number of the detecting Access Point radio.
Wireless Controller and Service Platform System Reference Guide
15 - 298
Statistics
Time Reported
Displays the time when the intrusion event was detected.
Clear All
Select the Clear All button to clear the screen of its current status and
begin a new data collection.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.4.33 Sensor Servers
Access Point Statistics
Sensor servers allow the monitor and download of data from multiple sensors and remote locations using Ethernet
TCP/IP or serial communication. Repeaters are available to extend the transmission range and combine sensors
with various frequencies on the same receiver.
To view the network address and status information of the sensor server resources available to the Access Point:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Sensor Servers.
Figure 15-211 Access Point - Sensor Servers screen
The Sensor Servers screen displays the following:
IP Address/
Hostname
Displays a list of sensor server IP addresses or administrator assigned
hostnames. These are the server resources available to the Access Point
for the management of data uploaded from dedicated sensors.
Port
Displays the numerical port where the sensor server is listening.
Unconnected server resources are not able to provide sensor reporting.
Status
Displays whether the server resource is connected or not.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
Wireless Controller and Service Platform System Reference Guide
15 - 299
Statistics
15.4.34 Bonjour Services
Access Point Statistics
Bonjour is Apple’s zero-configuration networking (Zeroconf) implementation. Zeroconf is a group of technologies
that include service discovery, address assignment and hostname resolution. Bonjour locates the devices (printers,
computers etc.) and services these computers provide over a local network.
Bonjour provides a method to discover services on a LAN. Bonjour allows users to set up a network without any
configuration. Services such as printers, scanners and file-sharing servers can be found using Bonjour. Bonjour only
works within a single broadcast domain. However, with a special DNS configuration, it can be extended to find
services across broadcast domains.
To view the Bonjour service statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Bonjour Services from the left-hand side of the Access Point UI.
Figure 15-212 Access Point - Bonjour Services screen
Refer to the following Bonjour service utilization stats.:
Service Name
Lists the services discoverable by the Bonjour gateway. Services can either
be pre-defined Apple services (scanner, printer etc.) or an alias not
available on the predefined list.
Instance Name
Lists the name of each Bonjour service instance (session) utilized by the
Access Point.
Wireless Controller and Service Platform System Reference Guide
15 - 300
Statistics
IP Address
Lists the network IP address utilized by the listed Bonjour service providing
resources to the Access Point.
Port
Displays the port used to secure a connection with the listed Bonjour
service.
Vlan
Lists the VLAN(s) on which a listed Bonjour service is routable.
Vlan Type
Lists the VLAN type as either a local bridging mode or a shared tunnel.
Expiry
Lists the expiration date of the listed Bonjour service, and its availability to
discover resources on the LAN.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.4.35 Captive Portal
Access Point Statistics
A captive portal forces a HTTP client to use a special Web page for authentication before using the Internet. A
captive portal turns a Web browser into a client authenticator. This is done by intercepting packets regardless of
the address or port, until the user opens a browser and tries to access the Internet. At that time, the browser is
redirected to a Web page.
To view the captive portal statistics of an Access Point:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Captive Portal.
Figure 15-213 Access Point - Captive Portal screen
The Captive Portal screen displays the following:
Client MAC
Displays the requesting client’s MAC address. The MAC displays as a link
that can be selected to display client configuration and network address
information in greater detail.
Wireless Controller and Service Platform System Reference Guide
15 - 301
Statistics
Client IP
Displays the requesting client’s IPv4 formatted IP address.
Client IPv6
Displays the requesting client’s IPv6 formatted IP address.
Captive Portal
Displays the captive portal name that each listed client is utilizing for
guest access to Access Point resources.
Port Name
Lists the Access Point port name supporting the captive portal connection
with the listed client MAC address.
Authentication
Displays the authentication status of the requesting client.
WLAN
Displays the name of the WLAN the client belongs to.
VLAN
Displays the name of the requesting client’s VLAN interface.
Remaining Time
Displays the time after which the client is disconnected from the captive
portal managed Internet.
Refresh
Select the Refresh button to update the screen’s statistics counters to
their latest values.
15.4.36 Network Time
Access Point Statistics
Network Time Protocol (NTP) is central to networks that rely on their Access Point(s) to supply system time.
Without NTP, Access Point supplied network time is unpredictable, which can result in data loss, failed processes,
and compromised security. With network speed, memory, and capability increasing at an exponential rate, the
accuracy, precision, and synchronization of network time is essential in an Access Point managed enterprise
network. The Access Point can use a dedicated server to supply system time. The Access Point can also use several
forms of NTP messaging to sync system time with authenticated network traffic.
The Network Time screen provides detailed statistics of an associated NTP Server of an Access Point. Use this
screen to review the statistics for each Access Point.
The Network Time statistics screen consists of two tabs:
• NTP Status
• NTP Association
15.4.36.1 NTP Status
Network Time
To view the Network Time statistics of an Access Point:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Network Time.
Wireless Controller and Service Platform System Reference Guide
15 - 302
Statistics
Figure 15-214 Access Point - NTP Status screen
The NTP Status tab displays by default with the following information:
Clock Offset
Displays the time differential between the Access Point’s time and its NTP
resource’s time.
Frequency
Indicates the SNTP server clock’s skew (difference) for the Access Point.
Leap
Indicates if a second is added or subtracted to SNTP packet transmissions,
or if transmissions are synchronized.
Precision
Displays the precision of the time clock (in Hz). The values that normally
appear in this field range from -6, for mains-frequency clocks, to -20 for
microsecond clocks.
Reference Time
Displays the time stamp the Access Point’s clock was last synchronized or
corrected.
Reference
Displays the address of the time source the Access Point is synchronized
to.
Root Delay
The total round-trip delay in seconds. This variable can take on both
positive and negative values, depending on relative time and frequency
offsets. The values that normally appear in this field range from negative
values (a few milliseconds) to positive values (several hundred
milliseconds).
Root Dispersion
The difference between the time on the root NTP server and its reference
clock. The reference clock is the clock used by the NTP server to set its
own clock.
Stratum
Displays how many hops the Access Point is from its current NTP time
resource.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
Wireless Controller and Service Platform System Reference Guide
15 - 303
Statistics
15.4.36.2 NTP Association
Network Time
The interaction between the Access Point and an NTP server constitutes an association. NTP associations can be
either peer associations (the Access Point synchronizes to another system or allows another system to synchronize
to it), or a server associations (only the Access Point synchronizes to the NTP resource, not the other way around).
To view the Access Point’s NTP association statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Network Time.
4 Select the NTP Association tab.
Figure 15-215 Access Point - NTP Association screen
The NTP Association screen displays the following:
Delay Time
Displays the round-trip delay (in seconds) for broadcasts between the NTP
server and the Access Point.
Display
Displays the time difference between the peer NTP server and the Access
Point’s clock.
Offset
Displays the calculated offset between the Access Point and the NTP
server. The Access Point adjusts its clock to match the server’s time value.
The offset gravitates towards zero, but never completely reduces its offset
to zero.
Poll
Displays the maximum interval between successive messages (in seconds)
to the nearest power of two.
Reach
Displays the status of the last eight SNTP messages. If an SNTP packet is
lost, the lost packet is tracked over the next eight SNTP messages.
Wireless Controller and Service Platform System Reference Guide
15 - 304
Statistics
Reference IP
Address
Displays the address of the time source the Access Point is synchronized
to.
Server IP Address
Displays the numerical IP address of the SNTP resource (server) providing
SNTP updates to the Access Point.
State
Displays the NTP association status code.
Status
Displays how many hops the Access Point is from its current NTP time
source.
Time
Displays the time of the last statistics update.
Refresh
Select the Refresh button to update the screen’s statistics counters to their
latest values.
15.4.37 Load Balancing
Access Point Statistics
An Access Point load can be viewed in a graph and filtered to display different load attributes. The Access Point’s
entire load can be displayed, as well as the separate loads on the 2.4 and 5 GHz radio bands. The channels can
also be filtered for display. Each element can either be displayed individually or collectively in the graph.
To view the Access Point’s load balance in a filtered graph format:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Load Balancing.
Wireless Controller and Service Platform System Reference Guide
15 - 305
Statistics
Figure 15-216 Access Point - Load Balancing screen
The Load Balancing screen displays the following:
Load Balancing
Select any of the options to display any or all of the following information
in the graph below: AP Load, 2.4GHz Load, 5GHz Load, and Channel. The
graph section displays the load percentages for each of the selected
variables over a period of time, which can be altered using the slider
below the upper graph.
Client Requests
Events
The Client Request Events displays the Time, Client, Capability, State,
WLAN and Requested Channels for all client request events on the Access
Point. Supported Access Points can support up to 256 clients per Access
Point.
Wireless Controller and Service Platform System Reference Guide
15 - 306
Statistics
15.4.38 Environmental Sensors (AP8132 Models Only)
Access Point Statistics
A sensor module is a USB environmental sensor extension to an AP8132 model Access Point. It provides a variety
of sensing mechanisms, allowing the monitoring and reporting of the radio coverage area. The output of the
sensor's detection mechanisms are viewable using either the Environmental Sensor screen.
To view an AP8132 model Access Point’s environmental statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, and select one of its connected Access Points.
3 Select Environment.
Figure 15-217 Access Point - Environmental Sensor screen (Light tab)
The Light tab displays by default, with additional Temperature, Motion and Humidity tabs available for unique
sensor reporting. Each of these sensor measurements helps the administrator determine whether the immediate
deployment area is occupied by changes in the Access Point's environment.
4 Refer to the Light table to assess the sensor's detected light intensity within the Access Point’s immediate
deployment area.
Light intensity is measured by the sensor in lumens. The table displays the Current Light Intensity (lumens) and
a 20 Minute Average of Light Intensity (lumens). Compare these two items to determine whether the
deployment location remains consistently lit, as an administrator can power off the Access Point’s radios when
no activity is detected in the immediate deployment area. For more information, see Profile Environmental
Sensor Configuration (AP8132 Only) on page 8-222.
Wireless Controller and Service Platform System Reference Guide
15 - 307
Statistics
5 Refer to the Light Intensity Trend Over Last Hour graph to assess the fluctuation in lighting over the last hour.
Use this graph to assess the deployment areas light intensity of particular hours of the day as needed to
conjunction with the daily graph immediately below it.
6 Refer to the Light Intensity Trend Over Last Day graph to assess whether lighting is consistent across specific
hours of the day. Use this information to help determine whether the Access Point can be upgraded or powered
off during specific hours of the day.
Select the Temperature tab.
Figure 15-218 Access Point - Environmental Sensor screen (Temperature tab)
8 Refer to the Temperature table to assess the sensor's detected temperature within the Access Point’s
immediate deployment area.
Temperature is measured in centigrade. The table displays the Current Temperature (centigrade) and a 20
Minute Average Temperature (centigrade). Compare these two items to determine whether the deployment
location remains consistently heated. For more information on enabling the sensor, see Profile Environmental
Sensor Configuration (AP8132 Only) on page 8-222.
9 Refer to the Temperature Trend Over Last Hour graph to assess the fluctuation in ambient temperature over the
last hour. Use this graph in combination with the Light and Motions graphs (in particular) to assess the
deployment area’s activity level.
10 Refer to the Temperature Trend Over Last Day graph to assess whether deployment area temperature is
consistent across specific hours of the day. Use this information to help determine whether the Access Point
can be upgraded or powered off during specific hours of the day.
11 Select the Motion tab.
Wireless Controller and Service Platform System Reference Guide
15 - 308
Statistics
Figure 15-219 Access Point - Environmental Sensor screen (Motion tab)
12 Refer to the Motion table to assess the sensor's detected movement within the Access Point’s immediate
deployment area.
Motion is measured in intervals. The table displays the Current Motion (count per interval) and a 20 Minute
Average Motion (count per interval). Compare these two items to determine whether the Access Point’s
deployment location remains consistently occupied by client users. For more information on enabling the
sensor, see Profile Environmental Sensor Configuration (AP8132 Only) on page 8-222.
13 Refer to the Motion Trend Over Last Hour graph to assess the fluctuation in user movement over the last hour.
Use this graph in combination with the Light and Temperature graphs (in particular) to assess the deployment
area’s activity level.
14 Refer to the Motion Trend Over Last Day graph to assess whether deployment area user movement is
consistent across specific hours of the day. Use this information to help determine whether the Access Point
can be upgraded or powered off during specific hours of the day.
15 Select the Humidity tab.
Wireless Controller and Service Platform System Reference Guide
15 - 309
Statistics
Figure 15-220 Access Point - Environmental Sensor screen (Humidity tab)
16 Refer to the Humidity table to assess the sensor's detected humidity fluctuations within the Access Point’s
immediate deployment area.
Humidity is measured in percentage. The table displays the Current Humidity (percent) and a 20 Minute
Average Humidity (percent). Compare these two items to determine whether the deployment location remains
consistently humid (often a by-product of temperature). For more information on enabling the sensor, see
Profile Environmental Sensor Configuration (AP8132 Only) on page 8-222.
17 Refer to the Humidity Trend Over Last Hour graph to assess the fluctuation in humidity over the last hour. Use
this graph in combination with the Temperature and Motions graphs (in particular) to assess the deployment
area’s activity levels.
18 Refer to the Humidity Trend Over Last Day graph to assess whether deployment area humidity is consistent
across specific hours of the day. Use this information to help determine whether the Access Point can be
upgraded or powered off during specific hours of the day.
15.5 Wireless Client Statistics
Statistics
The wireless client statistics display read-only statistics for a client selected from within its connected Access Point
and controller or service platform directory. It provides an overview of the health of wireless clients in the
controller or service platform managed network. Use this information to assess if configuration changes are
required to improve client performance.
Wireless clients statistics can be assessed using the following criteria:
• Health
Wireless Controller and Service Platform System Reference Guide
15 - 310
Statistics
•
•
•
•
•
Details
Traffic
WMM TSPEC
Association History
Graph
15.5.1 Health
Wireless Client Statistics
The Health screen displays information on the overall performance of a selected wireless client.
To view the health of a wireless client:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, an Access Point, then a connected client.
3 Select Health.
Figure 15-221 Wireless Client - Health screen
The Wireless Client field displays the following:
Client MAC
Displays the factory encoded MAC address of the selected wireless client.
Hostname
Lists the hostname assigned to the client when initially managed by the
controller, service platform or Access Point.
Vendor
Displays the vendor name (manufacturer) of the wireless client.
Wireless Controller and Service Platform System Reference Guide
15 - 311
Statistics
State
Displays the current operational state of the wireless client. The client’s
state can be idle, authenticated, roaming, associated or blacklisted.
IP Address
Displays the IP address the selected wireless client is currently utilizing as
a network identifier.
WLAN
Displays the client’s connected Access Point WLAN membership. This is
the WLAN whose QoS settings should account for the clients’s radio traffic
objective.
Radio MAC
Displays the Access Point radio MAC address the wireless client is
connected to on the network.
VLAN
Displays the VLAN ID the Access Point has defined for use as a virtual
interface with the client.
The User Details field displays the following:
Username
Displays the unique name of the administrator or operator managing the
client’s connected Access Point, controller or service platform.
Authentication
Lists the authentication scheme applied to the client for interoperation
with the Access Point.
Encryption
Lists the encryption scheme applied to the client for interoperation with
the Access Point.
Captive Portal Auth. Displays whether captive portal authentication is enabled for the client as
a guest access medium to the controller or service platform managed
network.
The RF Quality Index field displays the following:
RF Quality Index
Displays information on the RF quality for the selected wireless client. The
RF quality index is the overall effectiveness of the RF environment as a
percentage of the connect rate in both directions, as well as the retry and
error rate. RF quality index can be interpreted as:
0 – 20 (Very poor quality)
20 – 40 (Poor quality)
40 – 60 (Average quality)
60 – 100 (Good quality)
Average Retry
Number
Displays the average number of retries per packet. A high number
indicates possible network or hardware problems.
SNR
Displays the signal to noise (SNR) ratio of the connected wireless client.
Signal
Displays the power of the radio signals in - dBm.
Noise
Displays the disturbing influences on the signal by interference of signals
in - dBm.
Error Rate
Displays the number of received bit rates altered due to noise, interference
and distortion. It’s a unitless performance measure.
The Association field displays the following:
AP Hostname
Lists the administrator assigned device name of the client’s connected
Access Point.
Wireless Controller and Service Platform System Reference Guide
15 - 312
Statistics
AP
Displays the MAC address of the client’s connected Access Point.
Radio
Lists the target Access Point that houses the radio. Select the Access Point
to view performance information in greater detail.
Radio ID
Lists the hardware encoded MAC address the radio uses as a hardware
identifier that further distinguishes the radio from others within the same
device.
Radio Number
Displays the Access Point’s radio number (either 1, 2 or 3) to which the
selected client is associated.
Radio Type
Displays the radio type. The radio can be 802.11b, 802.11bg, 802.11bgn,
802.11a or 802.11an.
4 The Traffic Utilization field displays statistics on the traffic generated and received by the selected client. This
area displays the traffic index, which measures how efficiently the traffic medium is utilized. It’s defined as the
percentage of current throughput relative to the maximum possible throughput.
Traffic indices are:
• 0 – 20 (Very low utilization)
• 20 – 40 (Low utilization)
• 40 – 60 (Moderate utilization)
• 60 and above (High utilization)
The Traffic Utilization table displays the following:
Total Bytes
Displays the total bytes processed by the Access Point’s connected
wireless client.
Total Packets
Displays the total number of packets processed by the wireless client.
User Data Rate
Displays the average user data rate in both directions.
Physical Layer Rate
Displays the average packet rate at the physical layer in both directions.
Tx Dropped Packets Displays the number of packets dropped during transmission.
Rx Errors
Displays the number of errors encountered during data transmission. The
higher the error rate, the less reliable the connection or data transfer
between the client and connected Access Point.
Select the Refresh button to update the screen’s statistics counters to their latest values.
15.5.2 Details
Wireless Client Statistics
The Details screen provides granular performance information for a selected wireless client.
To view the details screen of a connected wireless client:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, an Access Point, then a connected client.
3 Select Details.
Wireless Controller and Service Platform System Reference Guide
15 - 313
Statistics
Figure 15-222 Wireless Client - Details screen
The Wireless Client field displays the following:
SSID
Displays the client’s Service Set ID (SSID).
Hostname
Lists the hostname assigned to the client when initially managed by the
controller, service platform or Access Point managed network.
Device Type
Displays the client device type providing the details to the operating
system.
RF Domain
Displays the RF Domain to which the connected client is a member via its
connected Access Point, controller or service platform. The RF Domain
displays as a link that can be selected to display configuration and
network address information in greater detail.
OS
Lists the client’s operating system (Android etc.).
Browser
Displays the browser type used by the client to facilitate its wireless
connection.
Type
Lists the client manufacturer (or vendor).
Role
Lists the client’s defined role in the controller, service platform or Access
Point managed network.
Wireless Controller and Service Platform System Reference Guide
15 - 314
Statistics
Role Policy
Lists the user role set for the client as it became a controller, service
platform or Access Point managed device.
Client Identity
Displays the unique vendor identity of the listed device as it appears to its
adopting controller or service platform.
Client Identity
Precedence
Lists the numeric precedence this client uses in establishing its identity
amongst its peers.
Protected
A green checkmark defines management frames as protected between
Management Frames this client and its associated Access Point radio. A red X states that
management frames are disabled for the client and its connected radio.
Transmit Power
Management
Lists the number power management frames exchanged between this
client and its connected Access Point radio. Lists zero when disabled.
The User Details field displays the following:
Username
Displays the unique name of the administrator or operator managing the
client’s connected Access Point.
Authentication
Lists the authentication scheme applied to the client for interoperation
with its connected Access Point radio.
Encryption
Lists the encryption scheme applied to the client for interoperation with its
connected Access Point radio.
Captive Portal Auth. Displays whether captive portal authentication is enabled. When enabled,
a restrictive set of access permissions may be in effect.
The Connection field displays the following:
Idle Time
Displays the time for which the wireless client remained idle.
Last Active
Displays the time in seconds the wireless client was last interoperating
with its connected Access Point.
Last Association
Displays the duration the wireless client was in association with its
connected Access Point.
Session Time
Displays the duration for which a session can be maintained by the
wireless client without it being dis-associated from the Access Point.
SM Power Save
Mode
Displays whether this feature is enabled on the wireless client. The spatial
multiplexing (SM) power save mode allows an 802.11n client to power
down all but one of its radios. This power save mode has two sub modes
of operation: static operation and dynamic operation.
Power Save Mode
Displays whether this feature is enabled or not. To prolong battery life, the
802.11 standard defines an optional Power Save Mode, which is available on
most 80211 clients. End users can simply turn it on or off via the card
driver or configuration tool. With power save off, the 802.11 network card is
generally in receive mode listening for packets and occasionally in transmit
mode when sending packets. These modes require the 802.11 NIC to keep
most circuits powered-up and ready for operation.
WMM Support
Displays whether WMM is enabled or not in order to provide data packet
type prioritization between the Access Point and connected client.
40 MHz Capable
Displays whether the wireless client has 802.11n channels operating at 40
MHz.
Wireless Controller and Service Platform System Reference Guide
15 - 315
Statistics
Max Physical Rate
Displays the maximum data rate at the physical layer.
Max User Rate
Displays the maximum permitted user data rate.
MC2UC Streams
Lists the number or multicast to unicast data streams detected.
The Association field displays the following:
AP
Displays the MAC address of the client’s connected Access Point.
BSS
Displays the Basic Service Set (BSS) the Access Point belongs to. A BSS is
a set of stations that can communicate with one another.
Radio Number
Displays the Access Point radio the wireless client is connected to.
Radio Type
Displays the radio type. The radio can be 802.11b, 802.11bg, 802.11bgn,
802.11a or 802.11an.
Rate
Displays the permitted data rate for Access Point and client interoperation.
The 802.11 Protocol field displays the following:
High-Throughput
Displays whether high throughput is supported. High throughput is a
measure of the successful packet delivery over a communication channel.
RIFS
Displays whether this feature is supported. RIFS is a required 802.11n
feature that improves performance by reducing the amount of dead time
between OFDM transmissions.
Negotiated Fast BSS Lists whether Fast BSS transition is negotiated. This indicates support for a
Transition
seamless fast and secure client handoff between two Access Points,
controllers or service platforms.
Unscheduled APSD
Displays whether APSD is supported. APSD defines an unscheduled
service period, which is a contiguous period of time during which the
Access Point is expected to be awake.
AID
Displays the Association ID (AID) established by an AP. 802.11 association
enables the Access Point to allocate resources and synchronize with a
client. A client begins the association process by sending an association
request to an Access Point. This association request is sent as a frame. This
frame carries information about the client and the SSID of the network it
wishes to associate. After receiving the request, the Access Point considers
associating with the client, and reserves memory space for establishing an
AID for the client.
Max AMSDU Size
Displays the maximum size of AMSDU. AMSDU is a set of Ethernet frames
to the same destination that are wrapped in a 802.11n frame. This values is
the maximum AMSDU frame size in bytes.
Max AMPDU Size
Displays the maximum size of AMPDU. AMPDU is a set of Ethernet frames
to the same destination that are wrapped in an 802.11n MAC header.
AMPDUs are used in a very noisy environment to provide reliable packet
transmission. This value is the maximum AMPDU size in bytes.
Interframe Spacing
Displays the interval between two consecutive Ethernet frames.
Wireless Controller and Service Platform System Reference Guide
15 - 316
Statistics
Short Guard Interval Displays the guard interval in micro seconds. Guard intervals prevent
interference between data transmissions. The guard interval is the space
between characters being transmitted. The guard interval eliminates intersymbol interference (ISI). ISI occurs when echoes or reflections from one
character interfere with another character. Adding time between
transmissions allows echo's and reflections to settle before the next
character is transmitted. A shorter guard interval results in shorter
character times which reduces overhead and increases data rates by up to
10%.
4 Select the Refresh button to update the screen’s statistics counters to their latest values.
15.5.3 Traffic
Wireless Client Statistics
The traffic screen provides an overview of client traffic utilization in both the transmit and receive directions. This
screen also displays a RF quality index.
To view the traffic statistics of a wireless clients:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, an Access Point, then a connected client.
3 Select Traffic.
Figure 15-223 Wireless Client - Traffic screen
Traffic Utilization statistics employ an index, which measures how efficiently the traffic medium is used. It’s
defined as the percentage of current throughput relative to the maximum possible throughput.
Traffic indices are:
Wireless Controller and Service Platform System Reference Guide
15 - 317
Statistics
• 0 – 20 (Very low utilization)
• 20 – 40 (Low utilization)
• 40 – 60 (Moderate utilization)
• 60 and above (High utilization)
This screen also provides the following:
Total Bytes
Displays the total bytes processed (in both directions) by the Access
Point’s connected client.
Total Packets
Displays the total number of data packets processed (in both directions)
by the Access Point’s connected wireless client.
User Data Rate
Displays the average user data rate.
Packets per Second
Displays the packets processed per second.
Physical Layer Rate
Displays the data rate at the physical layer level.
Bcast/Mcast Packets Displays the total number of broadcast/multicast packets processed by
the client.
Management
Packets
Displays the number of management (overhead) packets processed by the
client.
Tx Dropped Packets Displays the client’s number of dropped packets while transmitting to its
connected Access Point.
Tx Retries
Displays the total number of client transmit retries with its connected
Access Point.
Rx Errors
Displays the errors encountered by the client during data transmission. The
higher the error rate, the less reliable the connection or data transfer
between client and connected Access Point.
Rx Actions
Displays the number of receive actions during data transmission with the
client’s connected Access Point.
Rx Probes
Displays the number of probes sent. A probe is a program or other device
inserted at a key juncture in a for network for the purpose of monitoring
or collecting data about network activity.
Rx Power Save Poll
Displays the power save using the Power Save Poll (PSP) mode. Power
Save Poll is a protocol, which helps to reduce the amount of time a radio
needs to powered. PSP allows the WiFi adapter to notify the Access Point
when the radio is powered down. The Access Point holds any network
packet to be sent to this radio.
The RF Quality Index area displays the following information:
RF Quality Index
Displays information on the RF quality of the selected wireless client. The
RF quality index is the overall effectiveness of the RF environment as a
percentage of the connect rate in both directions as well as the retry rate
and the error rate. The RF quality index value can be interpreted as:
0 – 20 (Very low utilization)
20 – 40 (Low utilization)
40 – 60 (Moderate utilization)
60 and above (High utilization)
Retry Rate
Displays the average number of retries per packet. A high number
indicates possible network or hardware problems.
Wireless Controller and Service Platform System Reference Guide
15 - 318
Statistics
SNR (dBm)
Displays the connected client’s signal to noise ratio (SNR). A high SNR
could warrant a different Access Point connection to improve performance.
Signa (dBm)
Displays the power of the radio signals in - dBm.
Noise (dBm)
Displays the disturbing influences on the signal in - dBm.
Error Rate (ppm)
Displays the number of received bit rates altered due to noise, interference
and distortion. It’s a unitless performance measure.
MOS Score
Displays average voice call quality using the Mean Opinion Score (MOS)
call quality scale. The MOS scale rates call quality on a scale of 1-5, with
higher scores being better. If the MOS score is lower than 3.5, it’s likely
users will not be satisfied with the voice quality of their call.
R-Value
R-value is a number or score used to quantitatively express the quality of
speech in communications systems. This is used in digital networks that
carry Voice over IP (VoIP) traffic. The R-value can range from 1 (worst) to
100 (best) and is based on the percentage of users who are satisfied with
the quality of a test voice signal after it has passed through a network
from a source (transmitter) to a destination (receiver). The R-value scoring
method accurately portrays the effects of packet loss and delays in digital
networks carrying voice signals.
4 Select the Refresh button to update the screen’s statistics counters to their latest values.
15.5.4 WMM TSPEC
Wireless Client Statistics
The 802.11e Traffic Specification (TSPEC) provides a set of parameters that define the characteristics of the traffic
stream, (operating requirement and scheduling etc.). The sender TSPEC specifies parameters available for packet
flows. Both sender and the receiver use TSPEC.
The TSPEC screen provides information about TSPEC counts and TSPEC types utilized by the selected wireless
client.
To view the TSPEC statistics:
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, an Access Point, then a connected client.
3 Select WMM TSPEC.
Wireless Controller and Service Platform System Reference Guide
15 - 319
Statistics
Figure 15-224 Wireless Client - WMM TSPEC screen
The top portion of the screen displays the TSPEC stream type and whether the client has roamed.
The Ports Stats field displays the following:
Sequence Number
Lists a sequence number that’s unique to this WMM TSPEC uplink or
downlink data stream.
Direction Type
Displays whether the WMM TSPEC data stream is in the uplink or downlink
direction.
Request Time
Lists each sequence number’s request time for WMM TSPEC traffic in the
specified direction. This is time allotted for a request before packets are
actually sent.
Used Time
Displays the time the client used TSPEC. The client sends a delete traffic
stream (DELTS) message when it has finished communicating.
TID
Displays the parameter for defining the traffic stream. TID identifies data
packets as belonging to a unique traffic stream.
4 Periodically select Refresh to update the screen to its latest values.
15.5.5 Association History
Wireless Client Statistics
Refer to the Association History screen to review this client’s Access Point connections. Hardware device
identification, operating channel and GHz band data is listed for each Access Point. The Association History can
help determine whether the client has connected to its target Access Point and maintained its connection, or has
roamed and been supported by unplanned Access Points in the controller or service platform managed network.
To view a selected client’s association history:
Wireless Controller and Service Platform System Reference Guide
15 - 320
Statistics
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, an Access Point, then a connected client.
3 Select Association History.
Figure 15-225 Wireless Client - Association History screen
Refer to the following to discern this client’s Access Point association history:
Access Point
Lists the Access Point MAC address this client has connected to, and is
being managed by.
BSSID
Displays the BSSID of each previously connected Access Point.
Channel
Lists the channel shared by both the Access Point and client for
interoperation, and to avoid congestion with adjacent channel traffic.
Band
Lists the 2.4 or 5GHz radio band this clients and its connect Access Point
are using for transmit and receive operations.
Time
Lists the historical connection time between each listed Access Point and
this client.
4 Select Refresh to update the screen to its latest values.
15.5.6 Graph
Wireless Client Statistics
Use the client Graph to assess a connected client’s radio performance and diagnose performance issues that may
be negatively impact performance. Up to three selected performance variables can be charted at one time. The
graph uses a Y-axis and a X-axis to associate selected parameters with their performance measure.
To view a graph of this client’s statistics:
Wireless Controller and Service Platform System Reference Guide
15 - 321
Statistics
Select the Statistics menu from the Web UI.
2 Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain, select a
controller or service platform, an Access Point then a connected client.
3 Select Graph.
4 Use the Parameters drop down menu to define from 1- 3 variables assessing client signal noise, transmit or
receive values.
5 Use the Polling Interval drop-down menu to define the interval the chart is updated. Options include 30
seconds, 1 minute, 5 minutes, 20 minutes or 1 hour. 30 seconds is the default value.
Figure 15-226 Wireless Client - Graph
6 Select an available point in the graph to list the selected performance parameter, and display that parameter’s
value and a time stamp of when it occurred.
15.6 Guest Access Statistics
Statistics
Guest client statistics are uniquely available for wireless clients requesting the required pass code, authentication
and access into the WiNG managed guest client network
Guest Access statistics can be assessed for the following:
• Guest Access Cumulative Statistics
• Social Media Statistics
• Reports
• Notifications
• Guest Access Database
Wireless Controller and Service Platform System Reference Guide
15 - 322
Statistics
15.6.1 Guest Access Cumulative Statistics
Guest Access Statistics
The Statistics screen displays information on the WiNG managed guest client network. Its includes browser
utilization, new versus returning user trends, client user age, client operating system, device type proliferation and
gender trending.
To view a cumulative set of client guest access statistics:
Select the Statistics menu from the Web UI.
2 Select Guest Access above the navigation pane (on the upper left-hand side of the screen, directly to the right
of System).
3 Select Statistics.
Figure 15-227 Guest Access - Statistics screen
4 Refer to the top of the screen to configure how the following trending periods and user filters are set for guest
access statistics trending and reporting:
Timeline
Use the drop-down menu to specify whether statistics are gathered for 1Day, 1-Month, 1-Week, 2-Hours, 30-Mins or 5-Hours. Timelines support the
latest time period from present. For example, specifying 30-Mins displays
statistics for the most recent 30 minutes trended.
RF Domain
Use the drop-down menu to select a single RF Domain from which to filter
guest access statistics. Optionally select All to include data from each RF
Domain supported.
Wireless Controller and Service Platform System Reference Guide
15 - 323
Statistics
WLAN
Use the drop down menu to filter guest access statistics to a specific
WLAN. A single WLAN can belong to more then one RF Domain.
5 Refer to the following to assess guest client browser, operating system, age, gender and new versus returning
status to assess whether guest client utilization is in line with WiNG guest access deployment objectives:
Device Browser
Displays guest user browser utilization in pie-chart format. Each client
browser type (Chrome, Firefox, Safari and Internet Explorer) detected
within the defined trending period displays uniquely in its own color for
easy differentiation. The number of guest clients utilizing each browser
also displays numerically.
User Walk-in Trends Walk-in trending enables an administrator to filter new guest access
clients versus return guest clients out of the total reported for the
trending period and selected RF Domain and WLAN. New guest users
(blue), return guests (red) or total guests can either be collectively
displayed or individually displayed by selecting one, two or all three of the
options.
Age Range
Displays guest user age differentiation in pie-chart format. Age ranges are
uniquely color coded as Less Than 18, 18 to 20, 21 to 24, 25 to 34, 35 to 44,
45 to 54, 55 to 64 and Greater Than 64. Each age group detected within
the trending period displays uniquely in its own color for easy
differentiation. Each age range also displays numerically. Periodically
assess whether the age ranges meet expectations for guest client access
within the WiNG managed guest network.
Operating System
Displays guest client operating system utilization in pie-chart format. Each
client operating system type (Android, Windows 7, Windows 8, Apple iOS
and Macintosh) displays uniquely in its own color for easy differentiation.
The number of guest clients utilizing each operating system also displays
numerically.
Visitors
Displays return guest clients versus new guest clients in pie-chart format.
Both new and returning clients display uniquely in their own color for easy
differentiation. Periodically assess whether the number of returning guest
clients is line with the guest network’s deployment objectives in respect to
the RF Domain(s) and WLAN(s) selected for trending.
Customer Loyalty
App
Graphically displays the number of guest clients with loyalty application
presence enabled. Loyalty application detection occurs on the Access
Point to which the client is associated, allowing a retail administrator to
assess whether a captive portal client is using specific retail (loyalty)
applications in their captive portal. This setting is enabled by default.
Devices
Displays guest client device type utilization in pie-chart format. Each client
device type (Windows PC, Macintosh, Apple iPad, Android Mobile and
Motorola Droid) displays uniquely in its own color for easy differentiation.
The number of each device type detected also displays numerically to
help assess their proliferation with WiNG managed guest network.
Gender
Displays guest client gender in pie-chart format. Detected male and
female guest users display uniquely in their own color for easy
differentiation. Guest clients whose gender is unspecified also displays to
help assess the undetermined gender client count out of total. The
number of male, female and unspecified guest clients also displays
numerically.
Wireless Controller and Service Platform System Reference Guide
15 - 324
Statistics
Select the Refresh button to update the screen’s statistics counters to their latest values.
15.6.2 Social Media Statistics
Guest Access Statistics
Device registration using social media login credentials requires user validation through the guest user's social
media account. The guest user authenticates with an administrator configured social media server like Facebook or
Google. Upon successful authentication, the guest user's social media profile data (collected from the social media
server) is registered on the device.
To view guest access social media utilization for guest clients:
Select the Statistics menu from the Web UI.
2 Select Guest Access above the navigation pane (on the upper left-hand side of the screen, directly to the right
of System).
3 Select Social.
Figure 15-228 Guest Access - Social screen
4 Refer to the top of the screen to configure how the following trending periods and user filters are set for guest
access social media trending:
Timeline
Use the drop-down menu to specify whether social media statistics are
gathered for 1-Day, 1-Month, 1-Week, 2-Hours, 30-Mins or 5-Hours.
Timelines support the latest time period from present. For example,
specifying 30-Mins displays statistics for the most recent 30 minutes
trended.
Wireless Controller and Service Platform System Reference Guide
15 - 325
Statistics
RF Domain
Use the drop-down menu to select a single RF Domain from which to filter
social media guest access statistics. Optionally select All to include data
from each RF Domain supported.
WLAN
Use the drop down menu to filter guest access social media statistics to a
specific WLAN. A single WLAN can belong to more then one RF Domain.
The data displays in bar graph format, with the total number of social media authenticating clients listed in
green, and those currently online displayed in orange for both Google and Facebook authenticating clients.
Refer to the Local graph to assess those clients requiring captive portal authentication as a fallback mechanism
for guest registration through social media authentication.
5 Periodically select Refresh to update the statistics counters to their latest values.
15.6.3 Reports
Guest Access Statistics
Report queries can be filtered and run to obtain information on targeted guest clients within the WiNG guest
network.
To generate customized guest client reports:
Select the Statistics menu from the Web UI.
2 Select Guest Access above the navigation pane (on the upper left-hand side of the screen, directly to the right
of System).
3 Select Reports.
Figure 15-229 Guest Access - Reports screen
4 Select the drop-down menu at the top, left-hand, side of the screen to define whether the guest client’s report
data is fetched based on its MAC, Name, Mobile, Email, Member or Time. Once provided, enter an appropriate
search string to generate a report for the target guest client. When completed with the report’s search strings,
select Get Data.
Wireless Controller and Service Platform System Reference Guide
15 - 326
Statistics
5 Refer to the User Data table to review the following report output:
MAC
Displays the factory encoded hardware MAC address assigned to this
guest client at the factory by the manufacturer. This is the guest client’s
hardware identifier added to the guest user database. If the guest client
requests access later, this MAC address is validated against the guest user
database, and the client is allowed access to the WiNG managed guest
network.
Name
Lists the name used for guest access authentication and pass code
generation.
Email
Lists the E-Mail address used for guest access authentication and the
receipt of the required passcode.
Mobile
Lists the guest client’s registered mobile number used for guest access
authentication requests and the receipt of the required passcode.
Source
Lists the source (Facebook, Google) whose username and password were
used as the clients’s social media authenticator.
15.6.4 Notifications
Guest Access Statistics
For each registered guest user, a passcode is sent by E-mail, SMS or both. A guest management policy defines Email host and SMS gateway commands, along with credentials required for sending a passcode to guest client via
E-mail and SMS Users can configure up to 32 different guest management policies. Each policy enables the user to
configure the SMS gateway, SMS message body, E-mail SMTP server, E-mail subject contents and E-mail message
body. There can be only one guest management policy active per device at any one time.
The short message service (SMS) is the text messaging service component of phone, E-Mail and mobile systems.
SMS uses standardized communications protocols to allow fixed or mobile phone devices to exchange text
messages.
To review guest client notification statistics:
Select the Statistics menu from the Web UI.
2 Select Guest Access above the navigation pane (on the upper left-hand side of the screen, directly to the right
of System).
3 Select Notification.
Wireless Controller and Service Platform System Reference Guide
15 - 327
Statistics
Figure 15-230 Guest Access - Notification screen
4 Review the following Clickatell Gateway information. By default, clickatell is the host SMS gateway server
resource for guest access.
Status
Displays an icon as a visual indicator of the gateway status. Green defines
the gateway as available. Red indicates the gateway is down and
unavailable.
Session ID
Lists an event ID for the clickatell gateway session credential and passcode
exchange.
Message ID
Lists the unique SMS message ID created for the successful message
exchange with the clickatell host SMS gateway server.
Last SMS Time
Lists the timestamp appended to the sent time of the clickatell SMS
gateway message.
Last SMS Number
Lists the numeric status code returned in response to a SMS gateway
server guest access request.
Last SMS Sent Status Lists the associated status strings returned in response to a SMS gateway
server guest access request.
Wireless Controller and Service Platform System Reference Guide
15 - 328
Statistics
Last SMS
Authentication
Status
Lists the SMS authentication credential and validation message exchange
status for the listed clieckatell gateway session ID.
5 Review the following SMS to SMTP Gateway information.
Last E-Mail Time
Displays the most recent E-Mailed passcode to a guest via SMS. SMS
enables guest users to register with their E-Mail or mobile device ID as the
primary key for authentication.
Last E-Mail To
Lists the recipient of the most recent SMS to SMTP server credential E-mail
exchange containing the required passcode for the registered guest.
Last E-Mail Status
Lists the completion status of the most recent server SMS to SMTP
gateway credential exchange containing the required passcode for the
authenticating guest client.
6 Review the following Email Gateway information.
Last E-Mail Time
Displays the time of the most recent E-Mailed passcode to a guest access
requesting client. Guest users can register with their E-mail credentials as
the primary means of authentication.
Last E-Mail To
Lists the recipient of this session’s server E-Mail credential exchange
containing the required passcode for the authenticating guest client.
Last E-Mail Status
Lists the completion status of the most recent server E-Mail credential
exchange containing the required passcode for the authenticating guest
client.
15.6.5 Guest Access Database
Guest Access Statistics
Refer to the Database screen to periodically import or export guest access information to and from a WiNG
managed device. The import or export of the guest access database is supported in JSON format only. Archiving
guest access utilization data is a good way to assess periods of high and low utilization and better plan for client
guest access consumption of controller or Access Point network resources.
To administrate the guest access database:
Select the Statistics menu from the Web UI.
2 Select Guest Access above the navigation pane (on the upper left-hand side of the screen, directly to the right
of System).
3 Select Database.
Wireless Controller and Service Platform System Reference Guide
15 - 329
Statistics
Figure 15-231 Guest Access - Database Import/Export screen
4 Select Export to archive guest access data (in JSON or CSV format) to a designated remote location, or Import
to upload guest access utilization data back to the WiNG managed controller, service platform or Access Point.
5 If conducting an Export operation, provide the following to refine the data exported:
Format
Define whether the guest access data is exported in JSON or CSV format.
JavaScript Object Notation (JSON) is an open standard format using text
to export data objects consisting of attribute value pairs. A commaseparated values (CSV) file stores tabular data in plain text. Plain text
means that the file is interpreted a sequence of characters, so that it is
human-readable with a standard text editor. Each line of the file is a data
record. Each record consists of one or more fields, separated by commas.
Timeline
Use the drop-down menu to specify whether guest access statistics are
exported for the previous 1-Day, 1-Month, 1-Week, 2-Hours, 30-Mins or 5Hours. Timelines support the latest time period from present. For example,
specifying 30-Mins exports statistics trended over the most recent 30
minutes.
RF Domain
Use the drop-down menu to select a single RF Domain from which to filter
social media guest access statistics. Optionally select All to include data
from each RF Domain supported.
WLAN
Use the drop down menu to filter guest access social media statistics to a
specific WLAN. A single WLAN can belong to more then one RF Domain.
Wireless Controller and Service Platform System Reference Guide
15 - 330
Statistics
6 When exporting or importing guest access data (regardless or format), provide the following URL data to
accurately configure the remote host.
Format
Select the data transfer protocol used for exporting or importing guest
access data. Available options include:
tftp
ftp
sftp
Port
Use the spinner control to set the virtual port for the for the export or
import operation.
Host
Provide a textual hostname or numeric IP address of the server used for
guest access data transfer operations. Hostnames cannot include an
underscore character.
Select IPv4 Address to use an IPv4 formatted address as the host. Select
IPv6 Address to use an IPv6 formatted address as the host. IPV6 provides
enhanced identification and location information for computers on
networks routing traffic across the Internet. IPv6 addresses are composed
of eight groups of four hexadecimal digits separated by colons.
User Name
If using FTP or SFTP and the data transfer protocol, enter the username
required by the remote FTP or SFTP server resource.
Password
If using FTP or SFTP and the data transfer protocol, enter the password
required by the remote FTP or SFTP server resource.
Path/File
Specify the path to the server resource where guest access data is either
exported or imported. Enter the complete relative path to the file on the
server. If electing to use SFTP as the file transfer protocol, its
recommended the path/file be set using the command line interface (CLI).
7 When the URL data is accurately entered, select the Export or Import button respectively to initiate the
operation.
8 Optionally select the Delete tab to purge either all or part of the guest user database.
Figure 15-232 Guest Access - Database Deletion screen
Wireless Controller and Service Platform System Reference Guide
15 - 331
Statistics
9 Select All to remove the contents of the entire database. Select Any to invoke a drop-down menu where Mac,
Name, Mobile, Email or a WLAN can be selected to refine the database removal to just a selected entity. Enter
the name of the MAC address, user, mobile number or WLAN you wish to remove from the database, then
select Delete.
15.7 Analytics Developer Interface
Statistics
The analytics developer interface is an additional tool available to administrators to review specific APIs in granular
detail. The developer interface is available to elected NOC controllers or service platforms capable of provisioning
all of its peer controllers, service platforms and adopted devices. NOC controllers include NX9000, NX9500,
NX9510, NX7500, and RFS6000 models.
To access the developer interface:
Connect to controller using its existing IP address, but append /stats to the end of the IP address as follows:
http:///stats or https:///stats
The following login screen displays for the developer interface:
Figure 15-233 Developer Interface - Login screen
2 Provide the same Username and Password credentials you’re currently utilizing for a typical controller login.
Once the login credentials are successfully entered, the following screen displays:
Figure 15-234 Developer Interface - Main screen
Refer to the following for more detailed descriptions of the functionality available to administrators using the
analytics developer interface:
• Download REST API Toolkit
• API Assessment
15.7.1 Download REST API Toolkit
Analytics Developer Interface
Sample Representational State Transfer (REST) code can be downloaded from the toolkit. REST is a software
design schema for Web application development.
Wireless Controller and Service Platform System Reference Guide
15 - 332
Statistics
To download sample REST API code:
Select Download REST api toolkit from the Web UI.
A File Download screen displays prompting for the desired location of the download or whether the files
should be opened directly.
Figure 15-235 Developer Interface -File Download screen
2 Open the zip archive and review the Readme file to assess the contents and how they can be leveraged for API
creation and modification.
Sample Ruby Client
A sample ruby client is provided as part of this package. The Ruby client can be used as a sample to pull statistics
data from NXAnalytics. The response from NXAnalytics is in JSON format.
Contents
Readme.txt file.
Ruby script files:
NXAStatsClient.rb
NXARESTClient.rb
NXAResultsJSONParser.rb
NXALogin.rb
NXAException.rb
NXAConstants.rb
NXAConnectionParams.rb
Wireless Controller and Service Platform System Reference Guide
15 - 333
Statistics
Requirements To Run Sample Ruby Client
Ruby 2.0 or above. The sample has been tested with Ruby 2.0. To download Ruby use the following:
https://www.ruby-lang.org/en/downloads/or http://rubyinstaller.org/
Additional Ruby Gems needed to run the sample client are the following.
- ipaddress
- json
- rest-client
Please install the gems before running the sample client.
How To Run the Program From Command Line
ruby NXAStatsClient 
 
[wlan | rfdomain | radio | client | captive-portal | client-assoc-disassoc]

 

Sample:
ruby NXAStatsClient 172.20.33.45 https 443 rfdomain 600 admin admin 30
Wireless Controller and Service Platform System Reference Guide
15 - 334
Statistics
How To Run the Program From IDE
If you are using Eclipse or APTANA or any other IDE please do the following.
- Choose appropriate network proxy settings
- Configure IDE to choose appropriate Ruby interpreter
- Create a Ruby project
- Copy the Ruby files as part of package to the new Ruby project
- Define the arguments required for the main Ruby program
- Run the main Ruby program
15.7.2 API Assessment
Analytics Developer Interface
Refer to the toolkit’s API functionality to review a collection of APIs for specific feature groups, including captive
portals, client associations and disassociations, client stats, RF Domains.
To review the toolkit’s built-in set of APIs:
Select API from the Web UI.
Figure 15-236 Developer Interface - API
2 Select an available feature from the catalog of features.
Wireless Controller and Service Platform System Reference Guide
15 - 335
Statistics
An administrator can either launch a query for a selected feature or select catalog to expose the schema for a
selected feature.
3 Select query to display the NX2 Raw Query Interface.
Figure 15-237 Developer Interface - API Raw Query Interface
4 Select Go to initiate the query for the selected item.
Wireless Controller and Service Platform System Reference Guide
15 - 336
Statistics
Figure 15-238 Developer Interface - API Raw Query Results
The results of the query display the values currently set for the selected feature. This information cannot be
manipulated as a configurable API attribute, though this information can be utilized as criteria for API attribute
creation.
5 From the NX2 Features Interface, select a feature from those available and select catalog.
Wireless Controller and Service Platform System Reference Guide
15 - 337
Statistics
Figure 15-239 Developer Interface - API Catalog
The catalog item selection displays the values currently set for the selected feature. As with queries, this
information cannot be manipulated as a configurable API attribute, though this information can be utilized as
criteria for API attribute creation.
Wireless Controller and Service Platform System Reference Guide
15 - 338
16
Analytics
A NX9500 and NX9510 model service platforms can provide granular and robust analytic reporting for a RFS4000
and RFS6000 controller managed network. Using analytics, data is collected and reported at varying intervals.
Analytic data is culled from WLANs at either the system, RF Domain, controller/service platform or Access Point
level.
Analytics can parse and process events within the NOC managed network as events are received.
The analytics display resembles the Health and Inventory pages available to controllers and Access Points, though
Analytics provides performance information at a far more granular level.
The analytics user interface populates information within a data store, with multiple displays partitioned by
performance function. The data store is a customizable display managed with just the content the administrator
wants viewed. The data store is purged after 90 days if no administration is conducted sooner.
A separate analytics license is enforced at the NOC. The license restricts the number of Access Point streams
processed at the NOC or forwarded to partner systems for further processing. The analytics feature can be turned
on at select APs by enabling them in configuration. This way the customer can enable analytics on a select set of
APs and not the entire system as long as the number of APs on which it is enabled is less than or equal to the
total number of AP analytics licenses available at the NOC controller.
For more information, see:
• System Analytics
• RF Domain Analytics
• Wireless Controller Analytics
• Access Point Analytics
• Analytic Event Monitoring
16.1 System Analytics
Analytics can be administrated at the system level to include all RF Domains, their controller or service platform
memberships, adopted Access Points and their connected clients. For information on monitoring analytic events,
refer to Analytic Event Monitoring.
To administrate analytics system-wide:
Select Statistics from the Web UI.
2 Select the Analytics menu item directly to the right of the System menu item within Statistics.
The analytics screen displays with Captive Portal data displayed by default.
Refer to the arrow icon located in the top, right-hand, side of each panel to define whether the display is in
Chart format, a Table or whether you would like the output for that parameter saved as a PDF report at a user
specified location.
Wireless Controller and Service Platform System Reference Guide
16 - 1
Analytics
Figure 16-1 System Analytics - Captive Portal screen
3 Refer to the upper, right-hand, portion of the analytics interface and define the trending period for the data
displayed. Options include Last 1 Day, Last 3 Days, Last 1 Week, Last 2 Weeks, Last 3 Weeks, Last 1 Month, Last 2
Months or Last 3 Months. Today is the default setting for trending analytics data.
4 Refer to the following Captive Portal analytic data trended and reported in real-time on the selected interval:
Device Types
Displays a pie chart (by default) of the captive portal clients (smart
phones, tablets, laptops etc.). Select the table icon from the top, righthand, side of the field to display the data in table format. Both the pie
chart and table display the device type and the percentage of those
devices only within the captive portal.
Device OS
Displays a pie chart (by default) of connected devices (using captive
portal authentication), differentiated by their operating system (Windows,
Linux, Android etc.). Select the table icon from the top, right-hand, side of
the field to display the data in table format. Both the pie chart and table
display the OS type and the percentage of that device OS type only
within the captive portal.
Browser Types
Displays a pie chart (by default) of the browser types utilized by captive
portal authenticated devices. Select the table icon from the top, righthand, side of the field to display the data in table format. Both the pie
chart and table display the OS type by percentage of utilization only
within the captive portal.
Wireless Controller and Service Platform System Reference Guide
16 - 2
Analytics
Top X URLs
Reports the top visited URLs by connected clients using captive portal
authentication. Use the spinner control to refine the number of URLs
reported, then select Reload to update the display. Set whether the
content is displayed as a chart or as a table.
Search Terms
Lists the number of unique clients who searched for using a search term.
Each display option lists the search term and the number of times each
term was searched by a connected captive portal client. For example, if
there’s two clients (clients A and B), and client A searched for
"extremenetworks" 5 times and B searched for "extremenetworks" 2
times. The count would be 2 and not 7. As with URLs, search terms are
normalized (aggregated daily).
Normalized URLs
Reports URLs visited most often, normalized (aggregated daily), by
devices using captive portal authentication. Select the arrow to the left of
each listed URL timestamp to populate the URL and Count columns with
the specific URLs visited and the number of times they’ve been visited.
Unique vs Repeat
Users
Displays a breakdown of repeat versus new users to the captive portal.
Both a chart and a table display are available, each with a timestamp of
when the data was collected.
Device Count Per AP
Displays the number of top performing Access Points reporting
connected client counts using captive portal authentication.
Clients in WLAN
Displays the number of managed WLANs reporting connected client
counts. Client analytics are trended every 75 minutes.
5 Select Client Analytics to display analytic level data for connected wireless clients.
NOTE: Be sure to select the Search button adjacent to the Search for Wireless
Client parameter to ensure the tables are populated and refreshed with detected
wireless clients. Client analytics are trended every 75 minutes.
Wireless Controller and Service Platform System Reference Guide
16 - 3
Analytics
Figure 16-2 System Analytics - Client Analytics screen
6 Refer to the following Client Analytics trended at the selected interval:
Hostname
Lists the administrator assigned hostname set for each listed client when
connected to the controller, service platform or Access Point managed
network.
Mac Address
Displays the factory encoded MAC address for the listed client as a
hardware manufacturing ID.
IP Address
Lists the IP addresses the client is using as a wireless network identifier
within the controller, service platform or Access Point managed network.
RF Domain
Lists the client’s current RF Domain membership. RF Domains allow
administrators to assign regional, regulatory and RF configuration to
devices deployed in a common coverage area such as on a building floor,
or site. Each RF Domain contains regional, regulatory and sensor server
configuration parameters and may also be assigned policies that
determine access, Smart RF and WIPS configuration.
Access Point
Displays an administrator assigned hostname for each listed Access Point
whose radio is providing a network connection for the wireless network.
Wireless Controller and Service Platform System Reference Guide
16 - 4
Analytics
The Client Analytics screen contains Web Activity, Traffic and RF displays within the lower half of the screen.
Each of these analytics display an administrator’s choice of graphical or tabled data for the client’s Web
activity, SNR, network interference, signal quality and packet retries.
Figure 16-3 System Analytics - Client Web Activity screen
7 The Web Activity field displays by default with the following content trended in the selected interval:
Bandwidth
Displays the client’s Web activity bandwidth utilization in Bits per second
(Bps) in either chart or table format.
URL Visited
Displays URLs visited by a selected client in either chart or table format.
Either display contains the Web destination URL and the number of times
the URL was accessed by the client.
Search Terms
Displays terms used as search Web search criteria by connected clients in
either chart or table format. Either display contains the search item and
the number of times the term was searched by the client.
8 Select Traffic.
Wireless Controller and Service Platform System Reference Guide
16 - 5
Analytics
Figure 16-4 System Analytics - Client Traffic screen
9 Refer to the following client Traffic analytics trended at the selected interval:
Tx/Rx Bps
Displays the Bits per second (Bps) speed of data both transmitted from
and received at the listed client, in either chart or table format.
Signal to Noise Ratio Displays the connected client’s signal to noise ratio (SNR) and a time
stamp of its reporting. A high SNR could warrant a different Access Point
connection to improve performance.
Tx/Rx Rate
Displays the connected client’s transmit and receive data rate in either
chart or table format.
10 Select RF.
Figure 16-5 System Analytics - Client RF screen
Wireless Controller and Service Platform System Reference Guide
16 - 6
Analytics
11
Refer to the following client RF analytics trended in the selected interval:
RF Quality Index
Displays the overall effectiveness of the system-wide RF environment as a
percentage of the connect rate in both directions. The RF quality index
value can be interpreted as:
0 – 20 (Very low utilization)
20 – 40 (Low utilization)
40 – 60 (Moderate utilization)
60 and above (High utilization)
Average Retries
Displays the rate of client connection retry attempts and a timestamp of
their occurrence in either chart or table format. A high number indicates
potential network or hardware issues.
12 Select Smart RF to display system-level power and channel compensation analytics:
Figure 16-6 System Analytics - Smart RF screen
13 Refer to the following system-wide power level, channel and coverage Smart RF analytics trended in real-time
at the administrator defined interval:
Power Level Changes Displays the number of Smart RF power level compensations made for
the system’s RF Domains during the defined analytic reporting interval.
This helps an administrator assess the device power changes needed to
accommodate a potentially failed or poorly performing device and
provides an overall insight into the overall duty cycle requirements of a
particular RF Domain.
Channel Changes
Displays the number of Smart RF channel change compensations made
for the system’s RF Domains during the defined analytic reporting
interval.
Coverage Changes
Displays the number of Smart RF coverage change compensations made
for the system’s RF Domains during the defined analytic reporting
interval.
Wireless Controller and Service Platform System Reference Guide
16 - 7
Analytics
16.2 RF Domain Analytics
Additional analytics are available at the RF Domain level of the user interface for trending data for specific groups
of RF Domain member devices. RF Domain analytics are trended every 60 minutes. For information on monitoring
analytic events, refer to Analytic Event Monitoring.
To administrate RF Domain level analytics:
Select Statistics from the Web UI.
2 Select the Analytics menu item directly to the right of the System menu item within Statistics.
3 Expand the System hierarchy on the left-hand side of the user interface and select a RF Domain.
The Analytics screen displays with the Captive Portal tab displayed by default. This is the same data presented
at the system level of the user interface. For more information on captive portal analytics, see System Analytics
on page 16-1.
4 Select Traffic to assess throughput and bandwidth utilization information reported collectively for selected RF
Domain member devices. Use the WLAN drop-down menu to refine whether traffic statistics are reported for a
particular RD Domain WLAN or reported collectively for all WLANs.
Refer to the arrow icon located in the top, right-hand, side of each panel to define whether the display is in
Chart format, a Table or whether you would like the output for that parameter saved as a PDF report at a user
specified location.
Wireless Controller and Service Platform System Reference Guide
16 - 8
Analytics
Figure 16-7 RF Domain Analytics - Traffic screen
5 Refer to the upper, right-hand, portion of the analytics interface and define the trending period for the data
displayed. Options include Yesterday, Last 24 Hours, Last 3 Days, Last 1 Week, Last 2 Weeks, Last 3 Weeks, Last 1
Month, Last 2 Months or Last 3 Months. Today is the default setting for trending analytics data.
6 Refer to the following Traffic analytic data trended and reported for RF Domain member devices:
Throughput
Lists RF Domain member device throughput (in Mbps) as an overall
indicator of RF traffic activity of all RF Domain member devices. Assess
whether specific times of the day require additional RF domain member
device support to adequately support RF traffic requirements.
Tx/Rx Bps
Displays transmit and receive data (in Bps) for RF Domain member
devices over the listed trending period.
Bandwidth Usage
Lists RF Domain member bandwidth utilization (in Kbps) to help an
administrator assess periods os sustainable versus unsustainable activity.
Average Client Count Displays RF Domain member Access Points and their connected client
per AP
counts. Assess whether particular client counts are excessive, and whether
loads can be better distributed amongst RF Domain member Access
Points. Client analytics are trended every 75 minutes.
Client Count
Lists RF Domain member Access Point connected client counts. Use the
trending data to assess periods of high versus low client connection
activity. Client analytics are trended every 75 minutes.
Wireless Controller and Service Platform System Reference Guide
16 - 9
Analytics
Wireless Traffic
Distribution
Displays a chart of unicast versus management frames transmitted by RF
Domain member devices.
7 Select RF to display RF Domain member device RF quality, detected network interference (noise) and device
connection retries.
Figure 16-8 RF Domain Analytics - RF screen
Refer to the following RF analytics trended for a selected RF Domain:
RF Quality Index
Displays the trended graph of the effectiveness of a selected RF Domain’s
RF environment as a percentage of the connect rate in both directions.
The RF quality index value can be interpreted as:
0 – 20 (Very low utilization)
20 – 40 (Low utilization)
40 – 60 (Moderate utilization)
60 and above (High utilization).
Signal to Noise Ratio Displays a selected RF Domain’s connected client signal to noise ratio
(SNR) and a time stamp of its reporting. A high SNR could warrant power
compensation to account for poorly performing radios.
Retry Rate
Lists the number of retry attempts for requesting client connections to RF
Domain member device radios.
Wireless Controller and Service Platform System Reference Guide
16 - 10

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : No
Has XFA                         : No
XMP Toolkit                     : Adobe XMP Core 5.4-c005 78.147326, 2012/08/23-13:03:03
Modify Date                     : 2018:04:26 17:56:02-07:00
Create Date                     : 2018:04:26 17:55:45-07:00
Metadata Date                   : 2018:04:26 17:56:02-07:00
Creator Tool                    : FrameMaker 2017
Format                          : application/pdf
Title                           : WiNG 5.9.1 Wireless Controller and Service Platform System Reference Guide
Description                     : Wireless Controller and Service Platform System Reference Guide
Creator                         : Extreme Networks
Document ID                     : uuid:69f5897b-35f3-487e-9a45-37ccc572c87f
Instance ID                     : uuid:6dab3042-2a18-426d-9078-02fee74ab856
Producer                        : Acrobat Distiller 17.0 (Windows)
Page Count                      : 429
Author                          : Extreme Networks
Subject                         : Wireless Controller and Service Platform System Reference Guide
EXIF Metadata provided by EXIF.tools
FCC ID Filing: QXO-AP3917E

Navigation menu