Home > Cisco > Router > Cisco Router 860, 880 Series User Manual

Cisco Router 860, 880 Series User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Cisco Router 860, 880 Series User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 53 Cisco manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							 
    PART 3
    Configuring and Administering the 
    Wireless Device 
    						
    							Americas Headquarters:
    Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
    © 2008 Cisco Systems, Inc. All rights reserved.
    Service Set Identifier (SSID)
    In the role of an access point, a wireless device can support up to 16 SSIDs. In the role of a wireless 
    bridge, the device is typically configured with one SSID. In the following sections, this module describes 
    how to configure and manage service set identifiers (SSIDs) on the wireless device:
     Understanding SSIDs, page 1
     Configuring SSIDs, page 2
     Guest Mode SSID, page 4
     Including an SSID in an SSIDL IE, page 5
     Assigning IP Redirection for an SSID, page 6
     Multiple Basic SSIDs, page 8
     Using a RADIUS Server for SSID Authorization, page 11
     NAC Support for MBSSID, page 12
    Understanding SSIDs
    The Service Set Identifier (SSID) is a unique token that identifies an 802.11 wireless network. It is used 
    by wireless devices to identify a network, and establish and maintain wireless connectivity. An SSID 
    must be configured and assigned to an interface before a wireless client device can associate with an 
    access point. 
    Multiple SSIDs on Wireless Devices in the Access Point Role
    You can configure up to 16 SSIDs on a wireless device in the role of an access point and configure a 
    unique set of parameters for each SSID. For example, you might use one SSID to allow guests limited 
    access to the network and another SSID to allow authorized users access to secure data. 
    All SSIDs are active at the same time. Client devices can associate to the access point if the wireless 
    client device SSID matches one of the access point SSIDs configured. If the client device meets the other 
    security requirements configured on the access point for that SSID, the client device is allowed to join 
    a network.  
    						
    							Service Set Identifier (SSID)
      Configuring SSIDs
    2
    Configuring SSIDs
    OL-11499-01
    SSIDs on Wireless Devices in Other Roles
    In the role of a wireless bridge, typically the bridges are configured with one SSID, as a bridge does not 
    associate wirelessly with clients. (A wireless device in the role of a workgroup bridge can associate with 
    wireless clients and might be configured with multiple SSIDs. For a complete description of wireless 
    device roles, see the “Roles and the Associations of Wireless Devices” module.)
    Configuring SSIDs
    SSIDs are created globally and then assigned to an interface. The SSID is inactive until you use the ssid 
    configuration interface command to assign the SSID to a specific radio interface. 
    In Cisco IOS Release 12.3(4)JA and later, you can configure SSIDs globally or on a specific radio 
    interface. When you create an SSID using the ssid interface command, the access point stores the SSID 
    in global configuration mode. 
    SSID Parameters
    These are the parameters you can configure for each SSID:
     Guest mode
     VLAN
     Client authentication method
    NoteFor detailed information on supported client authentication types, see the software 
    configuration guide for your wireless device.
     Maximum number of client associations
     RADIUS accounting for traffic using the SSID 
     Redirection of packets received from client devices
    If your network uses VLANs, you can assign one SSID to a VLAN, and client devices using the SSID 
    are grouped in that VLAN.
    Using Spaces in SSIDs
    In Cisco IOS Release 12.4 and later, you can include spaces in an SSID. Trailing spaces (spaces at the 
    end of an SSID) are invalid. However, earlier versions of Cisco IOS allowed SSIDs to include trailing 
    spaces. Trailing spaces make it appear that you have identical SSIDs configured on the access point; 
    however, the trailing spaces make each SSID unique. 
    For example, this sample output from a show configuration privileged EXEC command does not show 
    spaces in SSIDs:
    ssid buffalo
        vlan 77
        authentication open 
    						
    							Service Set Identifier (SSID)
      Configuring SSIDs
    3
    Configuring SSIDs
    OL-11499-01
    ssid buffalo    vlan 17
        authentication open
    ssid buffalo
        vlan 7
        authentication open
    The SSIDs appear to be identical, when in fact they are unique as a result of trailing spaces. This sample 
    output from a show dot11 associations privileged EXEC command shows the spaces in the SSIDs:
    SSID [buffalo] :
    SSID [buffalo ] :
    SSID [buffalo  ] : 
    NoteThis command shows only the first 15 characters of the SSID. Use the show dot11 associations client 
    command to see SSIDs having more than 15 characters.
    Creating a Global SSID
    Use the dot11 ssid global configuration command to create an SSID. Then you can apply the ssid 
    configuration interface command to assign the SSID to a specific interface. 
    When an SSID is created in global configuration mode, you use the ssid configuration interface 
    command to attach the SSID to an interface without entering SSID configuration mode. If you create an 
    SSID on the interface (in interface mode) that has not been created in global configuration mode, the 
    ssid command puts you into SSID configuration mode for the new SSID.
    NoteSSIDs created in Cisco IOS Releases 12.4 or later become invalid if you downgrade the IOS software to 
    an earlier release.
    To create a global SSID, follow these steps, beginning in privileged EXEC mode. After you create an 
    SSID, you can assign it to specific radio interfaces.
    Command Purpose
    Step 1configure terminalEnters global configuration mode.
    Step 2dot11 ssid ssid-stringCreates a global SSID and enter SSID configuration 
    mode for this SSID. 
    The SSID can consist of up to 32 alphanumeric, 
    case-sensitive, characters.
    The first character cannot contain the !, #, or ; 
    character.
    +, ], /, , TAB, and trailing spaces are invalid 
    characters for SSIDs. 
    Step 3interface dot11radio radio-interfaceEnters interface configuration mode for the radio 
    interface to which you want to assign the SSID.  
    						
    							Service Set Identifier (SSID)
      Guest Mode SSID
    4
    Configuring SSIDs
    OL-11499-01
    SSID Configuration Example
    This example shows how to:
     Name an SSID
     Configure the SSID for RADIUS accounting
     Set the maximum number of client devices that can associate using this SSID to 15
     Assign the SSID to a VLAN
     Assign the SSID to a radio interface
    AP# configure terminal
    AP(config)# dot11 ssid batman
    AP(config-ssid)# accounting accounting-method-list
    AP(config-ssid)# max-associations 15AP(config-ssid)# vlan 3762
    AP(config-ssid)# exit
    AP(config)# interface dot11radio 0AP(config-if)# ssid batman
    AP(config-if)#end
    Viewing Global SSIDs
    Use this command to view configuration details for SSIDs that are configured globally:
    AP# show running-config ssid ssid-string
    Guest Mode SSID
    The guest-mode SSID is included in beacon frames and in responses to probe requests without an SSID 
    that matches the other access point SSIDs or with a wildcard SSID. Enabling guest mode for an SSID 
    helps clients that passively scan (do not transmit probe requests) to associate with the access point. The 
    access point can have one guest-mode SSID or none at all. (See the 
    “Multiple Basic SSIDs” section on 
    page 8 to learn how to include multiple SSIDs in a beacon.)
    If no guest-mode SSID exists, the access point beacon contains no SSID and probe requests with a 
    wildcard SSID are ignored. Disabling the guest mode makes the networks slightly more secure.
    To enable a guest SSID, create the SSID and use the guest-mode command. For example:
    AP(config-if-ssid)# guest-mode 
    To disable a guest SSID, use the no guest-mode command.
    NoteWhen you enable guest-SSID mode for the 802.11g radio, you will enable guest mode for the 802.11b 
    radio as well, because they both operate in the same 2.4Ghz band.
    Step 4ssid ssid-stringAssigns the global SSID that you created in Step 2 
    to the radio interface.
    Use the no form of the command to disable the 
    SSID.
    Step 5endReturns to privileged EXEC mode. 
    						
    							Service Set Identifier (SSID)
      Including an SSID in an SSIDL IE
    5
    Configuring SSIDs
    OL-11499-01
    SSID Guest Mode Configuration Example
    This example shows how to:
     Name an SSID
     Configure the SSID for guest mode
     Assign the SSID to a radio interface
    AP# configure terminal
    AP(config)# dot11 ssid batman
    AP(config-ssid)# guest-modeAP(config-ssid)# exit
    AP(config)# interface dot11radio 0
    AP(config-if)# ssid batmanAP(config-if)#end
    Including an SSID in an SSIDL IE
    The access point beacon can advertise only one SSID. However, you can use Service Set Identification 
    List (SSIDL), information element (IE) in the access point beacon to alert client devices of additional 
    SSIDs on the access point. When you designate an SSID to be included in an SSIDL IE, client devices 
    detect that the SSID is available, and they also detect the security settings required to associate using 
    that SSID. 
    NoteWhen multiple BSSIDs is enabled on the access point, the SSIDL IE does not contain a list of SSIDs; it 
    contains only extended capabilities. (See the 
    “Multiple Basic SSIDs” section on page 8 to learn how to 
    include multiple SSIDs in a beacon.)
    To include an SSID in an SSIDL IE, follow these steps, beginning in privileged EXEC mode:
    Use the no form of the command to disable SSIDL IEs.
    CommandPurpose
    Step 1configure terminalEnters global configuration mode.
    Step 2interface dot11radio radio-interfaceEnters interface configuration mode for the radio 
    interface. 
    Step 3ssid ssid-stringEnters configuration mode for a specific SSID.
    Step 4information-element ssidl [advertisement] [wps]Includes an SSIDL IE in the access point beacon that 
    advertises the access point’s extended capabilities, 
    such as 802.1x and support for Microsoft Wireless 
    Provisioning Services (WPS).
    Use the advertisement option to include the SSID 
    name and capabilities in the SSIDL IE. Use the wps 
    option to set the WPS capability flag in the SSIDL 
    IE. 
    						
    							Service Set Identifier (SSID)
      Assigning IP Redirection for an SSID
    6
    Configuring SSIDs
    OL-11499-01
    Assigning IP Redirection for an SSID
    IP redirection for an SSID on an access point redirects all packets sent from client devices associated to 
    that SSID to a specific IP address. 
    You can redirect all packets from client devices that are associated using an SSID, or you can redirect 
    only packets that are directed to specific TCP or UDP ports. When you configure the access point to 
    redirect only the packets that are addressed to specific ports, the access point redirects those packets 
    from clients using the SSID and drops all other packets from clients.
    IP redirection is used mainly on wireless LANs serving handheld devices that use a central software 
    application and are statically configured to communicate with a specific IP address. For example, the 
    wireless LAN administrator at a retail store or warehouse might configure IP redirection for its bar code 
    scanners, which all use the same scanner application and all send data to the same IP address.
    NoteWhen you ping from the access point to a client device that is associated by using an IP-redirect SSID, 
    the response packets from the client are redirected to the specified IP address and are not received by the 
    terminal that initiated the ping.
    Figure 1 shows the processing flow that occurs when the access point receives client packets from clients 
    associated using an IP-redirect SSID.
    Figure 1 Processing Flow for IP Redirection
    121298
    Reset packets
    destination address
    to IP-redirect
    addressIncrement 
    IP-redirect
    forward packet
    counterForward 
    packet
    Drop 
    packet Increment IP-
    redirect drop
    packet counter IP-redirect
    enabled? Incoming packet
    from client
    TCP or
    UDP port
    filters enabled?
     Port number in 
    packet match 
    port permit
    number?
    N
    N
    N Y
    Y
    Y 
    						
    							Service Set Identifier (SSID)
      Assigning IP Redirection for an SSID
    7
    Configuring SSIDs
    OL-11499-01
    Guidelines for Using IP Redirection
    Keep these guidelines in mind when using IP redirection:
     The access point does not redirect broadcast, unicast, or multicast BOOTP/DHCP packets from 
    client devices.
     Access control list parameters take precedence over IP redirection.
    Configuring IP Redirection
    To configure IP redirection for an SSID, follow these steps, beginning in privileged EXEC mode:
    NoteACL logging is not supported on the bridging interfaces of access point platforms. When applied on a 
    bridging interface, it works as if the interface were configured without the log option, and logging does 
    not take effect. However ACL logging does work for the BVI as long as a separate ACL is used for the 
    BVI.
    The following example shows how to configure IP redirection for an SSID without applying an ACL. 
    The access point redirects all packets that it receives from client devices associated to the SSID batman 
    to the IP address:
    AP# configure terminal
    AP(config)# interface dot11radio 0AP(config-if)# ssid batman
    AP(config-if-ssid)# ip redirection host 10.91.104.91
    AP(config-if-ssid-redirect)# end
    Command Purpose
    Step 1configure terminalEnters global configuration mode.
    Step 2interface dot11radio radio-interfaceEnters interface configuration mode for the radio 
    interface. 
    Step 3ssid ssid-stringEnters configuration mode for a specific SSID.
    Step 4ip redirection host ip-addressEnters IP-redirect configuration mode for the IP 
    address. 
    If you do not specify an access control list (ACL) 
    which defines TCP or UDP ports for redirection, the 
    access point redirects all packets that it receives 
    from client devices.
    Step 5ip redirection host ip-address access-group acl in(Optional) Specifies an ACL to apply to the 
    redirection of packets. Only packets sent to the 
    specific UDP or TCP ports defined in the ACL are 
    redirected. The access point discards all received 
    packets that do not match the parameters defined in 
    the ACL. The in parameter specifies that the ACL is 
    applied to the incoming interface of the access point. 
    						
    							Service Set Identifier (SSID)
      Multiple Basic SSIDs
    8
    Configuring SSIDs
    OL-11499-01
    The following example shows how to configure IP redirection only for packets sent to the specific TCP 
    and UDP ports specified in an ACL applied to the BVI1 interface. When the access point receives 
    packets from client devices associated by using the SSID robin, it redirects packets sent to the specified 
    ports to the IP address and discards all other packets:
    AP# configure terminal
    AP(config)# interface bvi1AP(config-if-ssid)# ip redirection host 10.91.104.91 access-group redirect-acl in
    AP(config-if-ssid)# end
    Multiple Basic SSIDs
    A standard beacon or responses to probe responses to probe requests with no SSID or a wildcard SSID 
    contain only one SSID, the guest-mode SSID if a guest-mode SSID is configured. When multiple basic 
    SSIDs (BSSIDs) are enabled, all the SSIDs are included in the beacon. Cisco 802.11a, 802.11b/g, and 
    802.11n radios support up to 8 BSSIDs. 
    NoteDevices on your wireless LAN that are configured to associate to a specific access point based on the 
    access point MAC address (for example, client devices, hot standby units, or workgroup bridges) might 
    lose their association when you add or delete a multiple BSSID. When you add or delete a multiple 
    BSSID, check the association status of devices configured to associate to a specific access point. If 
    necessary, reconfigure the disassociated device to use the BSSID’s new MAC address.
    Configuring Multiple Basic SSIDs
    This section describes how to enable multiple basic SSIDs on an access point radio interface. 
    Requirements for Configuring Multiple BSSIDs
    To configure multiple BSSIDs, your access points must meet these minimum requirements:
     VLANs must be configured.
     Access points must run Cisco IOS Release 12.4 or later.
     Wireless devices must contain a radio that supports multiple BSSIDs. To determine whether a radio 
    supports multiple basic SSIDs, enter the show controllers radio_interface command. The radio 
    supports multiple basic SSIDs if the results include this line:
    Number of supported simultaneous BSSID on radio_interface: 8 
    Guidelines for Using Multiple BSSIDs
    Keep these guidelines in mind when configuring multiple BSSIDs:
     RADIUS-assigned VLANs are not supported when you enable multiple BSSIDs.
     When you enable BSSIDs, the access point automatically maps a BSSID to each SSID. You cannot 
    manually map a BSSID to a specific SSID.
     When multiple BSSIDs are enabled on the access point, the Service Set Identification List (SSIDL), 
    information element (IE) SSIDL IE does not contain a list of SSIDs; it contains only extended 
    capabilities. 
    						
    All Cisco manuals Comments (0)

    Related Manuals for Cisco Router 860, 880 Series User Manual