FlexConnect Question

Hey guys,
I am currently studying for CCNA Wireless exams, and I have several questions regarding FlexConnect.
In my lab, I have ROAS setup and my router is providing DHCP for my laptops and AP at branch. The 5508 WLC is not connected to this network.
This is my switch config on my 2950 switch interface:
interface FastEthernet0/1
description ***LINK TO 1142-AP01***
switchport trunk native vlan 221
switchport mode trunk
spanning-tree portfast
end
interface FastEthernet0/2
description ***LINK TO 3602-AP02
switchport trunk native vlan 221
switchport mode trunk
end
interface FastEthernet0/16
description ***TRUNK PORT TO 2620 Fa0/0***
switchport trunk native vlan 96
switchport mode trunk
speed 100
duplex full
end
My controller is 5508 with 7.4 code. I configure my both 1142 and 3602 APs from local to FlexConnect (then they reboots), but when I went to FlexConnect tab on 1142 and tick the "VLAN Support" and entered the native vlan then Apply. I don't get the WLAN I configure for Flexconnect.
This is what I have with 3602 AP. From here I do see the two WLAN I made for flexconnect.
At this point, I am not sure why the 1142 is not showing the two WLANs I created, but it works on 3602 AP.
I can see the the flexconnet SSIDs, but I can't join either one. I followed this guide  https://supportforums.cisco.com/docs/DOC-24082
Also, What is the difference between using "Enable OfficeExtend AP" and "VLAN Support" in FlexConnect tab?
How would I know which one to use? Can you please give an example where and when to use Office Extend and VLAN Support?
Thank you in advance

Hello steelinquisitor,
Thank you for contacting the Sales Acceleration Center (SAC) regarding your recent inquiry, Case Number 80884
Case Description:
FlexConnect Question
Case Solution:
Please use the ap management as the native vlan
As per your confirmation, I am going to close the case for this specific inquiry. We strive to provide you with excellent service. Please feel free to reach out to me or any member of the SAC team if we can be of any further assistance or if you have any other related questions in the future. We value your input and look forward to serving you moving forward. Hello steelinquisitor,
Thank you for contacting the Sales Acceleration Center (SAC) regarding your recent inquiry, Case Number 80884
Case Description:
FlexConnect Question
Case Solution:
Please use the ap management as the native vlan
As per your confirmation, I am going to close the case for this specific inquiry. We strive to provide you with excellent service. Please feel free to reach out to me or any member of the SAC team if we can be of any further assistance or if you have any other related questions in the future. We value your input and look forward to serving you moving forward.

Similar Messages

  • I would like a Question About Flexconnect HA N+1 After WLC 1 Down and AP go to Joint WLC 2

    Hi everyone
    I would like  a Question About Flexconnect HA N+1 After WLC 1 Down and AP go to Joint WLC 2
    -Cisco WLC 8500   =  2 unit  version 7.6.130.10
    -Mode Flexconnect     HA  N+1
    -AP Joint WLC 1 and 2  mode HA N+1  
    I would like After WLC 1 Down is AP Go to joint WLC 2  Client associate in AP can use DATA Traffic between AP Failover ??
    I think Mode Flexconnect client can use data traffic if WLC 1 , 2 Down becasuse Mode flex data traffic not go to WLC ??
    I think true ??
    thank you

    Hello
    You should try a flexconnect deployment
    combined with locally switched SSIDs, which
    should comply with your requirements.
    fp

  • Flexconnect Radius Server Overwrite interface Question

    Hello All,
    Can someone confirm/comment on the following:
    In a flexconnect scenario, for site 1, i would like to source the radius requests to a remote radius (at the flexconnect site 1).  as i can understand i need to enable the RAdius Server Overwrite interface option. Is that all?
     Also, for flexconnect sites X this can also be done per WLAN X configuration. 
    Is this correct?
    Thanks

    Hi pana,
    Answers below :
    Meaning that, even if i configure the Flexconnect groups with local authentication, then how does the Flexconnect ap reach the local radius?
    When you are working with local authentication, the AP will communicate with the local RADIUS Server using the local routing in the branch office without the 802.1X traffic being sending to the WLC......the AP will communicate directly to the local radius server using it IP address and the local routing. (This communication is transparent if you see from the WLC because the WLC will not intermediate the authentication between the client and RADIUS, who will intermediate is the AP. The WLC will receive informations when the AP is in connected mode about the client and the authentication method and etc after the user was authenticated).
    Example :
                                                                                                               RADIUS SERVER
    WLC ----SWITCH L3------ROUTER----(MPLS Link)-----ROUTER---SWITCH L3---AP
    The WLC continues managing the Access Point but will  not"talk" to the RADIUS Server, who will "talk" to the RADIUS Server is the AP in the branch office using the SWITCH L3 (Asumming that you have the RADIUS in one network and the AP in another network in the same branch office)
    Understand now ?
    As i can understand, in a local switching/local authentication scenario the Flexconnect ap can only map a WLAN to local VLAN( route-able network on the remote site) that serves for the users-data plane. Then in conjunction with the radius server override option, how can this FlexconnectAP send requests to the local radius? I can only suppose that it will do so using the users locally mapped VLAN/WLAN but i cant reference this anywhere. 
    The AP will only send the requests do the local radius only if you configure the FlexConnect Local Auth and FlexConnect Group. Enabling this option the AP will use it IP Address to communicate with RADIUS without the WLC intermedianting this communication.
    Without the FlexConnect Local Auth enable in the WLAN the AP will continue directing the 802.1X requests to the WLC and the WLC will send to the RADIUS Server and in this situation if you enabled the radius overwrite interface the WLC will try to reach the RADIUS Server using the WLAN interface and not the management the interface. (You do not need the radius overwrite interface option to work with Local Auth if you want to use the AP as a Authenticatior, you only use this interface if you want that the WLC with central authentication direct the 802.1X authentications to the RADIUS)
    One information about the VLAN/WLAN is really mapped statically but you can manipulate it using the RADIUS Atrributes, changing the VLANs from the USERs based in the AD Group and after the authentication. It can work in local auth scenario or central auth scenario.
    http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Mobility/emob73dg/emob73/ch7_HREA.html#pgfId-1103070
    I hope it helps and if not helps i think i am not understanding the real question.

  • Understanding Flexconnect - Local vs Central Switching, and WLC failover scenario ??

    Hello Experts
    We have one WLC 5508 in Building1, few 2700 Series AP in Building1, and one 1252AG in Building2. The LAN subnet is same for both Buildings connected via a dark fiber.
    My requirement is to have Central Switching in Building1 since WLC is located locally, and Local Switching in Building2 to avoid inter-building traffic, for both Buildings we already one VLAN/IP Subnet. (Both Buildings access resources from a central Datacenter which hosts all the servers.)
    Questions:
    1. Is the above scenario possible using single SSID ? My understanding is that one WLAN+SSID can't have both Local and Central switching enabled.
    2. In Flexconnect Central Switching mode, during WLC failure, does the switching change to Local switching automatically ?
    3. When I choose Local Switching for a specific WLAN, does it Locally switch always , or does it Locally switch only when WLC is down ?
    4. We want to use Microsoft PEAP using AD User Authentication. When Local Authentication is enabled on WLC, I understand that when WLC fails (and RADIUS Server is still reachable), can we still have the AP directly contact RADIUS server as a direct client and provide 802.1X Microsoft PEAP authentication. Guess this is Primary Backup Radius Server configuration. Is this understanding correct ?
    Thanks.

    Hi
    The LAN subnet is same for both Buildings connected via a dark fiber.
    If this is the case there is no need of FlexConnet, as you have enough bandwidth & same L2 extended in those two buildings. Typically FlexConnect is for branch deployment where WAN link bandwidth is a concern.
    Anyway if you want to do this & here is the answer for your specific queries.
    1. Is the above scenario possible using single SSID ? My understanding is that one WLAN+SSID can't have both Local and Central switching enabled.
    You can have both local switching & central switching available for a given SSID. Only FlexConnect mode AP will do Local switching & all Local mode AP will do central switching, though both using the same SSID.
    2. In Flexconnect Central Switching mode, during WLC failure, does the switching change to Local switching automatically ?
    No, if it is central switching SSID, when WLC is not available client won't able to join this SSID. It is not fall back to Local switching.
    3. When I choose Local Switching for a specific WLAN, does it Locally switch always , or does it Locally switch only when WLC is down ?
    This is applicable only to FlexConnect mode APs & it always do local switching if that configured. If WLC is not reachable AP will go on "standalone mode" & still do local switching.
    4. We want to use Microsoft PEAP using AD User Authentication. When Local Authentication is enabled on WLC, I understand that when WLC fails (and RADIUS Server is still reachable), can we still have the AP directly contact RADIUS server as a direct client and provide 802.1X Microsoft PEAP authentication. Guess this is Primary Backup Radius Server configuration. Is this understanding correct ?
    Yes, when this option configured & WLC is not reachable (but RADIUS is reachable) then AP will act as Authenticator & pass radius messages to Auth Server directly.
    This is a very good Ciscolive presentation you should see as it describe lots of these features & which WLC codes they introduced.
    BRKEWN-2016 - Architecting Network for Branch Offices with Cisco Unified Wireless
    HTH
    Rasika
    **** Pls rate all useful responses ****

  • Question about Ap isolation...

    I have a WRT54GS,  ad all works fine with it. I have recently obtained an old laptop that I installed with a wireless PCI card. Once in a while, if I have both laptops online at the same time, both get timeouts on packets. I was wondering if setting AP isolation to 'active' would help with this. 

    While Leo technically answered your question with regard to FlexConnect, be weary of the fact that you will need to have local switched WLANs if you plan on having them available on controller failure:
    FlexConnect Backup Scenario
    WAN Down Behavior (Bootup Standalone Mode) (Can't Contact WLC)
    Central Switched WLANs will shutdown
    Web-auth WLANs will shutdown
    Local Switched WLANs will be up :
    Only Open, Shared and WPA-PSK are allowed.
    Local 802.1x allowed with local authentication or local RADIUS
    Unsupported featuresRRM, CCKM, WIDS, Location, Other AP Mode, NAC.
    For the full list of supported features using central/local switching view the following feature matrix:
    http://www.cisco.com/c/en/us/support/docs/wireless/5500-series-wireless-controllers/112042-technote-product-00.html

  • ISE dACL for FlexConnect AP

    hello all,
    I found a similar thread, but it didn't exactly answer my question:
    https://supportforums.cisco.com/discussion/12114056/flex-connect-user-acl-aps-locally-switched
    Should I configure a regular ACL, or Airespace ACL on ISE, to support FlexConnect mode AP's?
    On the FlexConnect AP's (WLC), do I configure a regular ACL, or FlexConnect ACL?
    The FlexConnect AP's are running a few SSID's, some are centrally switched, and some are locally switched.
    Thanks,
    Kevin

    It depends which version of WLC,  v 7.4.110 has a bug (Unfortunately, I don't remember the bug Id).  You need to create a regular and FlexConnect using the same name.  With recent version (I'm using 7.6.130), you don't need the regular ACL, just a FlexConnect ACL.  So, to answer your question, with FlexConnect, you must use FlexConnect ACL.
    Good links:
    http://www.cisco.com/c/en/us/td/docs/wireless/controller/7-4/configuration/guides/consolidated/b_cg74_CONSOLIDATED/b_cg74_CONSOLIDATED_chapter_010001110.html
    http://www.cisco.com/c/en/us/support/docs/security/identity-services-engine/116143-config-cise-posture-00.html

  • FlexConnect, EAP-TLS and dynamic VLAN assignments

    I need to integrate Cisco ISE and WLC5508 with FlexConnect (local switching) using EAP-TLS security for wireless clients across multiple floors (dynamic VLAN assignments based on floor level). The AP model used is 3602.
    I have some questions:
    - What RADIUS Attribute can be used for dynamic VLAN assignments based on floor level? Is there an option where I can group all LWAPs in same floor for getting certain VLAN from ISE?
    - I intend to use WLC software version 7.2 since 7.3 is latest version. Has someone use WLC software version 7.3 without any major bugs/issues pertaining to FlexConnect and EAP-TLS?
    - I read some documents saying L3 roaminig is where the associated WLC has changed. However if user move to different subnet but still associated to the same WLC, would this be consider as L3 roaming too?
    Can someone assist to clear my confusion here? any reference url for layer 2 and layer 3 roaming details is appreciated. Thanks

    I'll give this a shot:)
    For radius vlan attributes, bothe ACS and ISE in the policies have the ability to just enter the vlan id in the profile. You can either do that or use the IETF attributes.
    The RADIUS attributes to configure for VLAN assignment are IETF RADIUS attributes 64, 65, and 81, which control VLAN assignment of users and groups. See RFC 2868 for more information.
    64 (Tunnel-Type) should be set to VLAN (Integer = 13)
    65 (Tunnel-Medium-Type) should be set to 802 (Integer = 6)
    81 (Tunnel-Private-Group-ID) should be set to the VLAN number. This can also be set to VLAN name if using a Cisco IOS device (excludes Aironet and Wireless Controllers however).
    You can find this by searching on Google.... A lot of examples out there
    v7.2 and v7.3 I have had no issues with, with any type of encryption used. With 7.0 and 7.2, I would use the latest due to the Windows 8 fix.
    Layer 3 roaming is what's going to happen if the AP's are in local mode. This means that the client will keep their IP address no matter what ap they are connected to and or WLC as long as the mobility group is the same. So a user who boots up in floor 1 will keep its IP address even if he or she roams to the 12th floor and as long as he or she didn't loose wireless connection.
    FlexConnect you can do that. The AP's are trunked and need to have the vlans. So what your trying to do will be disruptive to clients. When the roam to another floor ap that is FlexConnect locally switched, they will drop and have to re-associate in order to get a new IP address.
    Hope this helps.
    Sent from Cisco Technical Support iPhone App

  • WLC Flexconnect with AAA and MAC authentication

    hi,
    i am having cisco WLC with 7.4.121 version and i am having remote side access points to be connected to this controller and remote access point will have different vlan on the remote side itself.
    my question is i am having  Radius authentication for the clients who are all connecting from all the access points and MAC filtering also.
    My radius server is placed in the HQ where we have WLC. which method of flexconnect switchign will give be both AAA and MAc filter options to be working.
    one more question,
    is it possible to make each AP seperate MAC filters On the WLC.
    thanks
    cyril

    If you are planning on doing machine authentication i.e authentication of machine with username password by the AAA server at then this is possible using flexconnect local switching enabled provided you have your AAA server accessible via the local VLAN at the remote site.
    In case you are planning on doing mac-filtering using WLC and username/password authentication using AAA server then this cannot be achieved when you enable Flexconnect local switching as you do not get an option to configure the mac-filtering on Flex-connect groups.Hence you would need to use central authentication.
    Actually the best option for you is that you either deploy a local site AAA server and do both the authentications via your radius server or use Central authentication with Flexconnect APs incase this is not feasible.
    Hope this clears you doubts!!!
    Note: Please do not forget to rate and accept as solution incase the post is valid.

  • WLC 7.4 and Flexconnect AP support

    Hi all,
    Forgive me for not finding it on my own since I am sure it exists. Does anyone have a link to a support chart that shows where support for APs stops on WLC 7.4 code? Specifically, while running APs in Flexconnect mode? Thanks in advance

    Sure, it's always in the release notes.
    http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn74.html#wp1029587
    HTH,
    Steve
    Please remember to rate useful posts, and mark questions as answered

  • Mesh design question

    Dear Sirs.
    My customer plans to extend existing wireless coverage and upgrade to controller based network.
    Let me shortly describe the situation based on the attached network map.
    RAP points are installed on the buildings, they have wired uplink.
    MAP points are installed outdoors (in the IP66 sealed ABB boxes) on the poles (height 5 m), only power is present on the poles, no wired uplink.
    Now MAPs (Non root bridges) are connected to RAPs (Root bridges) via 5 GHz interface in bridge mode.
    Red points: already installed Autonomous APs, 1242AG model.
    Green points: APs planned for installation.
    1. In order to upgrage to controller base network I want to install two 2504-25 controllers in failover mode. I have AP-to-LWAPP-Upgrade-Tool and is familiar with the image upgrade procedure. However, I have a question: if I upgrade all existing RAPs and MAPs to LWAPP mode, how the MAPs without wired uplinks will connect to RAPs and then to controller? Should I have physical access to their console port to issue some CLI commands to connect to RAPs?
    2. Can 2504 controller be configured for operation in mesh network mode without additional licenses?
    3. For network expansion I plan to install 3502E access points in sealed boxes. I chose them due to separate 2.4 and 5 GHz antenna ports, in order to use omni antennas for 2.4 client coverage and 5 GHz directional antennas for wireless uplinks. The distance between APs is abou 100 - 250 meters. Is it recomended to use directional antennas for wireless uplinks or I can take 1602E (or 2602E) access points and dual band omni antennas and install a good working mesh network with 5 GHz uplinks on omni antennas?
    4. Can 2504 controller work together with 1242AG, 1602E and 3502E points?
    5. How should MAPs be preconfigured to begin working in mesh network after powering them up on the poles on site?
    Kind reagrds
    Alexei

    1. In order to upgrage to controller base network I want to install two 2504-25 controllers in failover mode. I have AP-to-LWAPP-Upgrade-Tool and is familiar with the image upgrade procedure. However, I have a question: if I upgrade all existing RAPs and MAPs to LWAPP mode, how the MAPs without wired uplinks will connect to RAPs and then to controller? Should I have physical access to their console port to issue some CLI commands to connect to RAPs?
    > The MESH AP's along with your other access points (lightweight) will obtain their code from the WLC when they join. I would always stage the MESH AP's prior to mounting them to certify they work and they can form a link. You would need to purchase a power injectors for each RAP and get a AC power adapter for each MAP.
    The Upgrade tool is to only convert autonomous AP's to lightweight. They stopped supporting 802.11n access points in that tool.
    2. Can 2504 controller be configured for operation in mesh network mode without additional licenses?
    > With the newer code version you will be using, yes. You can have both MESH and traditional Local mode or FlexConnect mode access points.
    3. For network expansion I plan to install 3502E access points in sealed boxes. I chose them due to separate 2.4 and 5 GHz antenna ports, in order to use omni antennas for 2.4 client coverage and 5 GHz directional antennas for wireless uplinks. The distance between APs is abou 100 - 250 meters. Is it recomended to use directional antennas for wireless uplinks or I can take 1602E (or 2602E) access points and dual band omni antennas and install a good working mesh network with 5 GHz uplinks on omni antennas?
    > If these are going to be exposed to the outdoor elements, then you need an outdoor antenna. It's hard to say what antenna you need, but if your using a 3502e, make sure you get an antenna that is a 3 lead so you can utilize all 3 antenna ports. Patches are directional, so if you are going MAP to MAP to MAP to RAP for example, you would need an omni. Patch works if your going Fromm MAP to RAP.
    4. Can 2504 controller work together with 1242AG, 1602E and 3502E points?
    > Yes they can. The code you run in the WLC, you need to make sure it's supported by the access points. Here is a compatibility matrix
    http://www.cisco.com/en/US/docs/wireless/controller/5500/tech_notes/Wireless_Software_Compatibility_Matrix.html
    5. How should MAPs be preconfigured to begin working in mesh network after powering them up on the poles on site?
    > Stage them first. Please reference these guides.
    http://www.cisco.com/en/US/docs/wireless/technology/mesh/7.4/design/guide/mesh74_chapter_010.html
    http://www.cisco.com/en/US/tech/tk722/tk809/technologies_white_paper09186a0080b1c101.shtml
    Sent from Cisco Technical Support iPhone App

  • FlexConnect (aka H-REAP) and Auto-Anchor functionality

    Hi Board,
    I never did H-REAP on my wireless deployments. Now, I have an H-REAP (FlexConnect) requirement for branch offices.
    Also there is the requirement for guest access at the same time.
    From my understanding those features (FlexConnect and Auto-Anchor) should work together.
    Please refer to the following exibit:
    There is a FlexConnect AP at my branch office. The traffic from internal users (SSID "Internal") should be switches locally at the LAP (Lightweight Access Point). At the same time the guest SSID (SSID "Guest") should be tunneled back via CAPWAP to the controller to which the LAP is associated ("Central Controller"). The guest traffic should not emerge (switched) at the "Central Controller", instead it should be tunneled to an anchor controller in a DMZ via an "Ethernet Over IP tunnel" (Auto-Anchor functionality).
    First question: Does this work (FlexConnect in conjunction with Auto-Anchor functionality)?
    If this works, where's the web portal for guest authentication hosted (if using the internal web auth on WLC)? On the "central controller" or the Anchor controller? (I guess at the Anchor Controller in the DMZ, right?)
    Is it possible to leave the guest SSID "open" with no webauth and still using the Anchor Controller? This would be needed if I have an external web authentication service, which would be hosted by a provider.
    Thanks in advance for all your replies!
    Johannes

    The Flex 7500 deployment guide ("
    http://www.cisco.com/en/US/products/ps11635/products_tech_note09186a0080b7f141.shtml
    ") states:
    "The Cisco FlexConnect Solution also supports  Central Client Data Traffic, but it should be limited to Guest data  traffic only."
    later in the document there is a section about Guest access that states "Flex 7500 will allow and continue to support creation of EoIP tunnel to your guest anchor controller in DMZ."
    Hope that helps.

  • Multi-DC Auto-RP with MSDP Design Question

    Most of Cisco design seem to recommend Anycast....then the latest DCAP came out which apppears to combine anycast, auto-rp and msdp but there isn't much sample configs:
    I want to setup the multicast base on page 2-46.
    http://www.cisco.com/en/US/solutions/ns340/ns414/ns742/ns743/ns758/networking_solutions_products_genericcontent0900aecd806c3a8c.pdf
    I have 3 DC link by a MPLS WAN. On each DC redundant cores, I assume I setup Anycast with MSDP and do Auto-RP on the Anycast RP address.
    Assuming Layer 3, on the downstream Distribution and Access, I believe I should setup a static RP pointing to the local DC Cores (ie ip pim rp-address 10.100.106.1 or should I just setup autorp like Edge on next sentence)
    On the Edge WAN routers, I will setup "Ip pim autorp listener"
    So is the above correct?
    I have another question on the "override" option below
    *******DC redundant Cores*****
    interface Loopback105
    description ****MSDP LOCAL PEER ADDRESS****
    ip address 10.100.105.1 255.255.255.255
    interface Loopback106
    description ****ANYCAST RP ADDRESS****
    ip address 10.100.106.1 255.255.255.255
    ip pim sparse-mode
    ip msdp peer 10.100.105.2 connect-source Loopback105
    ip msdp cache-sa-state
    ip msdp originator-id Loopback105
    ip access-list standard AUTO-RP-CONTROL-GROUP
    permit   224.0.1.39
    permit  224.0.1.40
    ip pim rp-address 10.100.106.1 AUTO-RP-CONTROL-GROUP (do I need the “override” option?)
    ip pim send-rp-announce 10.100.106.1 scope 16 group-list AUTO-RP-CONTROL-GROUP
    ip pim send-rp-discovery scope 16

    Hi,
    In the sites you can use local switched SSIDs with your flexconnect APs.
    For this setup you will need on the WLCs:
    -2 SSIDs;
    -0 dynamic interfaces;
    -1 AP group (you could use the default group too);
    -about 12 (300/25) Flexconnect groups - as you can have max. 25 APs per flexconnect group.
    Steps:
    -create the 2 SSIDs and configure them for flexconnect local switching (Advanced TAB). As they are locally switched you don't need any dynamic interfaces and you can map the management interface to them.
    -add the 2 SSIDs  and 300 APs to your AP group (if you created a non default AP group).
    -create the number of flexconnect groups needed with the same configuration on all. Add your APs into the groups and map the WLANs to the local VLAN (VLAN 1 in your case).
    You will have to decide whether you do central or local authentication on your SSIDs depending on loations of your auth servers.
    Best regards,
    Sebastian

  • Some questions about WLC 2504 architecture.

    Good Morning,
    I am in the process of implementing a 2504 with 14 LWAP's... The LWAP's are 1252 and 1262's but this should not matter in reference to my questions.
    Right now i have a test WLAN and Interface set up. 
    XXXXWIRLESS2 and the same for the interface. 
    Both of these are set up on VLAN 8 for test purposes.  My question revolves around the actually switching and routing of the information between the AP's and the controller. 
    I understand that cisco moved to FlexConnect in replacement of HREAP.  Why is this not a default?  it seems to me that the Gig port on the WLC would be a bottleneck for you if all traffic comes back over the CAPWAP tunnel.  Maybe i am not understanding the architecture of the device, but what positive benefit does this serve by sending all traffic back to the WLC instead of out the switches/router to its intended destination? 
    I am under the impression that FlexConnect should do all local switching, instead of sending traffic back over the CAPWAP tunnel.  To me this makes more sense and eliminates bottlenecks in the network. 
    Hopefully someone can enlighten me.
    Thank you,

    "Local" mode is the default mode for all the WLC, as the 5508 and WiSM2 have the ability to have greater than 1G connectivity to the LAN.  This is also partially a holdover from the Airespace days when all of the AP's actually directly connected to the WLC.
    Now for the 2504, I agree that if you have more than ~5 AP you should run in FlexConnect mode, especially if you have a lot of clients that are capapble of 'N' rates.  But it is not necessarily the way that all implementations will go.
    but again, that is IMHO.
    HTH,
    Steve
    Please remember to rate useful posts, and mark questions as answered

  • Enabling FlexConnect

    Hi,
    I have a situation where I have to deploy 1600 APs to a remote controller due to them not being supported by the 2100 series controllers at our local site. There are 1142s connected to the local controllers.
    I have the 1600s configured and they register with the remote controller, but the clients connect to the SSID and receive the remote site's IP addressing.
    To fix this, I've figured out I need to deploy FlexConnect.  I understand that I need to enable FlexConnect Local Switching on the WLAN Profile Advanced tab.
    Here are my questions:
    By enabling FlexConnect on the WLAN profile, will it require FlexConnect to be enabled on all APs, even the 1142s which I do not want to configure that way?
    Also by enabling FlexConnect, will it cause any service disruption to any connected clients on the SSID to APs that are not configured as FlexConnect?
    Thanks.

    By enabling FlexConnect on the WLAN profile, will it require FlexConnect to be enabled on all APs, even the 1142s which I do not want to configure that way?
    No.... This just gives you the option to be able to map a wlan to a vlan at the local site where the FlexConnect AP is located.
    Also by enabling FlexConnect, will it cause any service disruption to any connected clients on the SSID to APs that are not configured as FlexConnect?
    You will have a small glitch when you make any change to an SSID, but its really a small glitch.
    Thanks,
    Scott
    Help out other by using the rating system and marking answered questions as "Answered"

  • Flexconnect - Number of AP pr. Flexconnect Group ?

    Hi All
    I was searching for this question.
    How many APs can you put into a single Flexconnect Group ?
    I know that this varies by platform and software release, but I cannot find the numbers anywhere.
    In the relase notes it is only mentioned that the number of groups have increased (7.2).
    In the configuration guide (7.2), it only says how many APs you can join to a group on the 7500, not any of the other platforms.
    Is there a "FlexConnect Feature Matrix" like page where this information is available ?

    From the 8.0 Configuration guide :
    The number of FlexConnect groups and access point support depends on the platform that you are using. You can configure the following:
    Up to 100 FlexConnect groups and 25 access points per group for a Cisco 5500 Series Controller.
    Up to 1000 FlexConnect groups and 50 access points per group for a Cisco Flex 7500 Series Controller in the 7.2 release.
    Up to 2000 FlexConnect groups and 100 access points per group for Cisco Flex 7500 and Cisco 8500 Series Controllers in the 7.3 release.
    Up to 20 FlexConnect groups and up to 25 access points per group for the remaining platforms
    No mention of WiSM2 or 2504 (but i guess that those numbers are the same as 5508 since they share software).
    The vWLCs numbers are : Supports up to 200 Cisco FlexConnect groups and 100 access points in each FlexConnect group. <- Taken from the vWLC datasheet.

Maybe you are looking for