Network Admission Control & ACL,s

In doc
http://www.cisco.com/en/US/customer/products/ps6350/products_configuration_guide_chapter09186a00804dfa81.html
with regard to the interface ACL it says
access-list access-list-number {permit | deny} protocol source destination
Example:
Router (config)# access-list 105 permit udp any any
or
Router (config)# access-list 105 permit ip host 192.168.0.2 any
or
Router (config)# access-list 105 deny ip any any
Normally "access-list 105 deny ip any any"
would block everything. Is NAC clever enough to allow EAPoUDP traffic through this ACL. If so what is the point of the previous 2 examples, if not what is the point of blocking everything

I believe it should be as below:
Router (config)# access-list 105 permit udp any any
or
Router (config)# access-list 105 permit ip host 192.168.0.2 any
and
Router (config)# access-list 105 deny ip any any

Similar Messages

  • Network Admission Control - Symantec

    I am trying to set up NAC in such a way that if one of our VPN clients does not have a certain version of the Symantec Antivirus or higher, it will only grant them access to the proper download. My current test scenario is Cisco ACS 4.0 and a Cisco VPN Concentrator 3015 with 4.7.2 J I have downloaded documentation, but I am unclear as to what I will need from Symantec and also, can this be done without install CTA on remote devices? Thank to all of you for your help.
    Dwane

    Yes, CTA is compulsory in this scenario and you cannot avoid that. After installation chwck whether you are hitting the error
    " %EOU-6-CTA: IP=193.99.83.250| CiscoTrustAgent=NOTDETECTED"

  • Does Crypto call admission control only apply to dynamic SAs?

    Hi,
    In my DMVPN phase 2 implementation, I have implemented crypto call admission control for IKE SAs on my spokes. This limit is set to 20 which is enough for my network.
    I have three hubs per region and site-to-site connectivity is only enabled on one of these routers.(hub 3). hub 1 & 2 only provide connectivity to other resources outside the DMVPN.
    If the IKE SA limit is reached on a spoke and there are other IKE requests which are being rejected - and let's say my hub1 goes down or the spoke just loses the tunnel.
    Before the tunnels to the hub1 is recovered, the spoke accepts the IKE requests which it was previously rejecting and again the IKE SA limit is reached. Now the hub1 are back on line – it will not be able to establish a tunnel ,right?
    If over a period of time the same thing happens with my hub2 then my spoke gets a bit isolated, right?
    The hubs have static IKE policy (unique PSKs) while the site-to-site tunnels are dynamic.
    In other words, does the crypto call admission limit apply only to dynamic crypto sessions or to all crypto sessions?
    I think the former. In that case, can a priority be configured for the static IKE SAs over the dynamic ones?
    Kind regards
    Nasir

    Nasir,
    There should not be a differentiator for CAC between static and dynamic. It counts overall IKE and IKE in-negotiations SAs. IKE doesn't necessarily need to know whether session is static or dynamic...
    http://www.cisco.com/en/US/docs/ios-xml/ios/security/a1/sec-cr-c3.html#GUID-84CA3908-A3C5-43E5-B8B5-0DED44EAEEC4
    You're right this is midleading, I'm going to get in touch with documentation team to make this a bit more explicit.
    M.

  • Query: Best practice SAN switch (network) access control rules?

    Dear SAN experts,
    Are there generic SAN (MDS) switch access control rules that should always be applied within the SAN environment?
    I have a specific interest in network-based access control rules/CLI-commands with respect to traffic flowing through the switch rather than switch management traffic (controls for traffic flowing to the switch).
    Presumably one would want to provide SAN switch demarcation between initiators and targets using VSAN, Zoning (and LUN Zoning for fine grained access control and defense in depth with storage device LUN masking), IP ACL, Read-Only Zone (or LUN).
    In a LAN environment controlled by a (gateway) firewall, there are (best practice) generic firewall access control rules that should be instantiated regardless of enterprise network IP range, TCP services, topology etc.
    For example, the blocking of malformed TCP flags or the blocking of inbound and outbound IP ranges outlined in RFC 3330 (and RFC 1918).
    These firewall access control rules can be deployed regardless of the IP range or TCP service traffic used within the enterprise. Of course there are firewall access control rules that should also be implemented as best practice that require specific IP addresses and ports that suit the network in which they are deployed. For example, rate limiting as a DoS preventative, may require knowledge of server IP and port number of the hosted service that is being DoS protected.
    So my question is, are there generic best practice SAN switch (network) access control rules that should also be instantiated?
    regards,
    Will.

    Hi William,
    That's a pretty wide net you're casting there, but i'll do my best to give you some insight in the matter.
    Speaking pure fibre channel, your only real way of controlling which nodes can access which other nodes is Zones.
    for zones there are a few best practices:
    * Default Zone: Don't use it. unless you're running Ficon.
    * Single Initiator zones: One host, many storage targets. Don't put 2 initiators in one zone or they'll try logging into each other which at best will give you a performance hit, at worst will bring down your systems.
    * Don't mix zoning types:  You can zone on wwn, on port, and Cisco NX-OS will give you a plethora of other options, like on device alias or LUN Zoning. Don't use different types of these in one zone.
    * Device alias zoning is definately recommended with Enhanced Zoning and Enhanced DA enabled, since it will make replacing hba's a heck of a lot less painful in your fabric.
    * LUN zoning is being deprecated, so avoid. You can achieve the same effect on any modern array by doing lun masking.
    * Read-Only exists, but again any modern array should be able to make a lun read-only.
    * QoS on Zoning: Isn't really an ACL method, more of a congestion control.
    VSANs are a way to separate your physical fabric into several logical fabrics.  There's one huge distinction here with VLANs, that is that as a rule of thumb, you should put things that you want to talk to each other in the same VSANs. There's no such concept as a broadcast domain the way it exists in Ethernet in FC, so VSANs don't serve as isolation for that. Routing on Fibre Channel (IVR or Inter-VSAN Routing) is possible, but quickly becomes a pain if you use it a lot/structurally. Keep IVR for exceptions, use VSANs for logical units of hosts and storage that belong to each other.  A good example would be to put each of 2 remote datacenters in their own VSAN, create a third VSAN for the ports on the array that provide replication between DC and use IVR to make management hosts have inband access to all arrays.
    When using IVR, maintain a manual and minimal topology. IVR tends to become very complex very fast and auto topology isn't helping this.
    Traditional IP acls (permit this proto to that dest on such a port and deny other combinations) are very rare on management interfaces, since they're usually connected to already separated segments. Same goes for Fibre Channel over IP links (that connect to ethernet interfaces in your storage switch).
    They are quite logical to use  and work just the same on an MDS as on a traditional Ethernetswitch when you want to use IP over FC (not to be confused with FC over IP). But then you'll logically use your switch as an L2/L3 device.
    I'm personally not an IP guy, but here's a quite good guide to setting up IP services in a FC fabric:
    http://www.cisco.com/en/US/partner/docs/switches/datacenter/mds9000/sw/4_1/configuration/guides/cli_4_1/ipsvc.html
    To protect your san from devices that are 'slow-draining' and can cause congestion, I highly recommend enabling slow-drain policy monitors, as described in this document:
    http://www.cisco.com/en/US/partner/docs/switches/datacenter/mds9000/sw/5_0/configuration/guides/int/nxos/intf.html#wp1743661
    That's a very brief summary of the most important access-control-related Best Practices that come to mind.  If any of this isn't clear to you or you require more detail, let me know. HTH!

  • Network UI control

    Hello,
    I have been searching through any and all documentation I can find regarding using the Network UI control to consume XML but have been hard pressed to find anything explaining event handling in a sufficient manner.  I have a very basic tree which consists of multiple nodes which can, at most, have 1 child.  I'd like to wire this up so that a user can click on a node triggering an event that allows me to programatically launch a Web Dynpro component. 
    I feel that I am close however I cannot get the code right.  Does anyone have a useful link or perhaps a code snippet illustrating how to do this?
    Thanks in advance!

    If the problem is unclear, please let me know and I can elaborate as needed!
    Edited by: ROBERT BAGGETT on Jul 3, 2008 12:37 AM

  • Network color control -

     HP Officejet Pro 8500A A910a  How is color controled with an ethernet network connection?  Printer properties have been set to black ink only, the printer continues to print in full color. The printer setting webpage has no option for color.

    Kaynray
    Had you been using wired networking before you began to set up wireless? Had you given yourself Administration status with command-u, or were you using default TCP/IP and AppleTalk windows? Had you used command-k from the TCP/IP window to name a location (configuration)? Failing that your automatically assigned configuration would have been Default. It is worth your while from the standpoint of security to use these facilities, and, if necessary to set up a different configuration for wi-fi, lest there be any conflict in TCP/IP Preferences between an older wired or dial-up configuration and the wireless. If you wish to overwrite the old configuration by editing it, that is possible. You can choose, if you wish, to maintain several different configurations and connection modes with different names. As an administrator, you are able to change between them at will in much the same way as OS X provides, although the windows and access methods look different.
    Apple IIe; 68K: 11DT + 4PB; PPC: 5DT + 3PB; G3: 6DT     System 6.0.8 to OS 10.4.x

  • Airport Extreme - Guest Network - Bandwidth Control

    Hello Everyone,
    I'm in need to deploy a solution to someone in a bar and I wanted to know if it's possible to do it with the Airport Extreme of Apple.
    I already saw some study cases, and I not sure if it's possible to do what I pretend.
    This is the cenario:
    The user have in his office an ISP router with wireless that provides him with network connectivity for all his devices, in his office.
    But where the clients are the signal doesn't get there, so we passed a cable to the bar, and we want to deploy there network guest access to the clients.
    The thing is that we want to make the clients network to don't have access to the internal network devices, and then to controll at what velocity then can connect. Providing sometimes higher speeds, and other times lower speeds. (bandwidth management / limited).
    Is it possible for me to use the Airport extreme for that? If not, do I have any other solution?
    Thanks in advance.
    Regards!

    As stated this is not consumer level router functionality.
    You either need a router that takes a third party firmware.. eg Gargoyle.. just google for it as I am not allowed to post details.
    Or you need a pro wireless hotspot solution. These are expensive..$500-1000 but work without bothering the business owner.. you provide each person who buys a drink a printout ticket with username and password.. which allow both limited time and bandwidth. It is better than just making a free for all. There are also methods where people can login with credit card details.. but I think it is better to use the ticket type system.
    For a cheap free for all.. as I said look at gargoyle.

  • Mailbox database admission control by maximum mailboxdatabase size limit

    I would like to have a feature which allowes to set a maximum size limit on a mailboxdatabase. This way we can keep the mailboxdatabases around a certain size. Existing mailboxex within the mailboxdatabase can grow according to their sizing
    limits but no new mailboxes can be added or moved to it. In collaboration with the new automatic distribution feature you can migrate more efficiently and keep maintenance and restores times low.

    Hello,
    Accroding to your description, I understand that you want to set a maximum size limit on a mailboxdatabase. Your purpose for this doing is that existing mailboxes size within the mailboxdatabase can grow, but new mailboxes can't be added or
    moved to it? If so, I'm afraid that there is no way to set a maximum size limit on a mailboxdatabase in exchange 2013 server. But we can control automatic mailbox distribution sing database scopes.
    Here is an article for your reference.
    http://technet.microsoft.com/en-us/library/ff628332(v=exchg.150).aspx
    If I have any misunderstanding, please free let me know.
    If you have any feedback on our support, please click
    here
    Cara Chen
    TechNet Community Support

  • How can I manage new Firefox for Mac on my network. Control users Home Pages for Mobile User Accounts.

    I am running Mac Computers in a School. Current Mountain Lions OS and current Firefox Browser. We log in using mobile accounts. How can we manage Firefox so all users get the same home page and settings.
    If I can do locally or through a profile, that would be great

    hello, you could use the mozilla.cfg file in the firefox program folder in order to lock or set certain preferences - here is some general information on how to set that up: http://kb.mozillazine.org/Locking_preferences
    and specific guide to set the homepage can be found here: http://mike.kaply.com/2012/08/29/setting-the-default-firefox-homepage-with-autoconfig/ (this blog also contains may other helpful resources for deploying firefox)

  • Network Adminssion Control, 802.1x & Novell Clients to have a single login.

    Hi Sir,
    My customer would like to have OTP, if NAC and 802.1x come into picture. At the moment, they are running Novell client for Windows version 4.9SP2 authenticating to Novell LDAP server.
    How can NAC and 802.1x be integrated into one time password (OTP)? If not what is the alternative best solution can we propose to them ?

    With NAC Phase 1, which uses IOS Routers as the NAD, the Trust Verification occurs using EAP over UDP. User credentials are not part of the items passed by the CTA to the policy server. So however you log into the machine will be your authentication experience.
    With NAC Phase 2, which uses L2 switches as the NAD, the Trust Verification is planned to use EAP over 802.1x. The user will be authenticated and authorized by the switch by way of the ACS AAA server. The 802.1x supplicant that you use will dictate whether or not a single login occurs. Choices for supplicants include the embedded supplicant Microsoft offers and supplicants from 3rd parties, such as Funk.
    So you do not have to wait for NAC Phase 2 to take advantage of NAC today. While planning for NAC Phase 2, it would be a good idea to plan out your 802.1x strategy & even implement 802.1x to make sure it is ready to layer the NAC Trust Verification on top of it.
    Please let us know if you have any follow-up questions.
    thanks
    peter
    ps - pls rate these posts so we know if we have provided you with an answer that helps!

  • Need help configuring Oracle for admission control&analysis(diploma thesis)

    Hi, board team!
    I encountered your site by searching for professional Oracle-Boards.
    The threads I found on this site are all very helpful and very professional!
    Sorry, for my bad english. I will try to explain everything in a very detailed way, so that you will hopefully know what i mean.
    But let me explain what's my problem.
    I am a student and now I am writing my diploma thesis (Analysis of Capacity mechanism in Oracle) and I have to set up an Oracle 10g Database. I managed to install Oracle using the Universal Installer. In my opinion it's a very helpful tool!
    But I have difficulties configuring the Database.
    The Database has to determine comparable results. I generate 3 different types of users. Each user has its own characterisations (IO and CPU consumption). The consumption for each user is always the same! (When a certain user connects to a databse the transactions/queries will be always the same).
    To determine this Resource-Consumption I programmed an infinite loop (written in PL/SQL) -> infinite and equal queries.
    Unfortunately the results are not comparable. The longer the loop is running the more different the results are. The results are not significant.
    I think this is because of the Redo-Log-Buffers, which grow with every Transaction. (I'm sorry for wrong estimates, but I'm just a newbie with Oracle and database-systems).
    After that I tried to shut down the databse after EACH measurement and finally restart the database. Now the results were all about the same.
    Are there any solutions to make it more efficient?
    What would you do?
    After the measurements, I will write them into a Table (for each user: IO- and CPU-Consumption).
    If one of the three users connects to the databse again, there will be an analysis algorithm, which queries this table and collects the measured values and the actual system-utilization (V_$-table). Therefore i will write a small program in PL/SQL. The analysis-Function is a "Black-box". I just use the functionality and submit User-consumptions and system-utilization. The function returns a value (0 or 1; 0=deny, 1=allow).
    I thought to implement my small-program with the Trigger-functionality or VPD. The PL/SQL-procedure will be called after a user logged on to the database. The significant values will be queried and submitted to the "black-box" (programmed in java). The submission to this "black-box" should by implemented with Java RMI or Java Beans.
    Are there any better possibilities?
    Thanks for your support!
    Now i will install Windows 2003 Server and Oracle 10g r2
    Best regards,
    mailya
    "Poor" Server:
    Fujitsu Siemens Computers Celsius 400
    P4 1700 MHz
    1GB RAM
    40 GB HDD
    OS: Win 2003 Server Enterprise
    DB: Oracle 10g R2

    Hi, board team!
    I encountered your site by searching for professional Oracle-Boards.
    The threads I found on this site are all very helpful and very professional!
    Sorry, for my bad english. I will try to explain everything in a very detailed way, so that you will hopefully know what i mean.
    But let me explain what's my problem.
    I am a student and now I am writing my diploma thesis (Analysis of Capacity mechanism in Oracle) and I have to set up an Oracle 10g Database. I managed to install Oracle using the Universal Installer. In my opinion it's a very helpful tool!
    But I have difficulties configuring the Database.
    The Database has to determine comparable results. I generate 3 different types of users. Each user has its own characterisations (IO and CPU consumption). The consumption for each user is always the same! (When a certain user connects to a databse the transactions/queries will be always the same).
    To determine this Resource-Consumption I programmed an infinite loop (written in PL/SQL) -> infinite and equal queries.
    Unfortunately the results are not comparable. The longer the loop is running the more different the results are. The results are not significant.
    I think this is because of the Redo-Log-Buffers, which grow with every Transaction. (I'm sorry for wrong estimates, but I'm just a newbie with Oracle and database-systems).
    After that I tried to shut down the databse after EACH measurement and finally restart the database. Now the results were all about the same.
    Are there any solutions to make it more efficient?
    What would you do?
    After the measurements, I will write them into a Table (for each user: IO- and CPU-Consumption).
    If one of the three users connects to the databse again, there will be an analysis algorithm, which queries this table and collects the measured values and the actual system-utilization (V_$-table). Therefore i will write a small program in PL/SQL. The analysis-Function is a "Black-box". I just use the functionality and submit User-consumptions and system-utilization. The function returns a value (0 or 1; 0=deny, 1=allow).
    I thought to implement my small-program with the Trigger-functionality or VPD. The PL/SQL-procedure will be called after a user logged on to the database. The significant values will be queried and submitted to the "black-box" (programmed in java). The submission to this "black-box" should by implemented with Java RMI or Java Beans.
    Are there any better possibilities?
    Thanks for your support!
    Now i will install Windows 2003 Server and Oracle 10g r2
    Best regards,
    mailya
    "Poor" Server:
    Fujitsu Siemens Computers Celsius 400
    P4 1700 MHz
    1GB RAM
    40 GB HDD
    OS: Win 2003 Server Enterprise
    DB: Oracle 10g R2

  • Unity Connection 8.x Call Admission Control

    Hi,
    I am trying to find out if there is a separate CAC mechanism for Cisco Unity Connection.  Or does it depend on Call Manager Locations for CAC?
    Thanks
    James

    CAC has to be configured either on CUCM and/or on GKs, CUC has nothing to do with it.
    HTH
    java
    if this helps, please rate
    www.cisco.com/go/pdihelpdesk

  • Network Securty with ACL

    Hello,
    I have 8 2950 Switches which are divided into 13 VLANs.
    Let say vlan2 has 10 ports. PC1 connects to Port1 until PC10 connects to Port10. I want to apply the Access-list to VLAN2, meaning that I allow only 10 IP addresses of every PCs that connect to VLAN2 Port, but if another PCs that have different IP address. The Access-list will drop and can not access or connect to the ports that connect to vlan2. In this case, how to apply the access-list?
    Any feedback or solution is appreciated.
    Regards,
    VIN

    Hello,
    the solution would depend on the switch model you have. There are standard image and enhanced image models; can you check which one you have ?
    The easiest would be to post the output of ´show version´...
    Regards,
    GP

  • CUCM: Call Admission Control (CAC) in MPLS environment

    Hello,
    could anybody help me in setup location based CAC in CUCM 9.1.
    I have read already some ducumentaion, but it's not entirely clear to me.
    The statement in these documetaion is: ".. assign the apropriate bandwith to the locations ...".
    But as far as I know I can assign the bandwidth only to pairs of locations. I guess it's not the idea to put the bandwidth from each location to all the other locations...
    So, should I put the bandwith from each location to the hub_none location?
    Which devices do I have to put then into the hub_location?
    How does it work when a phone in one location calls another phone in another location?
    What about the HQ devices?
    I have a centralized environment: one CUCM cluster (and phones + central gateways) in the HQ and 12 sites (with phones and local gateways) all connected via MPLS cloud.
    Thanks for any comment.

    I'd recommend you to read the SRND before further questions, it's all explained in there.
    Simpy put, consider hub_none your HQ, you can change the same, then configure a location for each remote site with the BW they can use.
    It'll be a hub and spoke, BW will be deducted from the link from X site to hub_none, and from hub_none to site Y to account for the call.
    Again, SRND covers this very nicely.

  • Growing a WLAN beyond a class C network (WLC2504, AP2700), AP groups?

    We're about to grow our network by expanding to a new office a few floor up putting us at a size no longer fit for a class C network (> 255 devices). For obvious reasons I don't want to increase the network's size beyond that either.
    The equipment used is a 1 x WLC 2504 and 15 x AP2700. It's set up to run the APs in local mode for now and in terms of wireless traffic that should still work fine.
    Since the offices are about 100 meters apart and require users to travel even further to get to from one to the other roaming between them is not really important and associating to an AP in the wrong office is unlikely given the distance. There is a fiber connection between the two offices.
    What I do need is for users to be able to authenticate with the same credentials and for the same SSID to be used in both locations. I'm thinking this is best solved by giving each office it's own IP-range and AP Groups but maybe there are other alternatives?
    Also I haven't managed to successfully get AP Groups to work. I have created a new interface on the controller with a different VLAN, DHCP server, etc. Then I added a WLAN to an AP Group but changed the interface to the newly created (different from the one set up in the WLAN). However when I associate to an AP in that AP group I still end up on the same VLAN as on the APs in the default-group.
    Is changing of VLAN mapping only available for FlexConnect APs?
    There is also a prerequisite in the documentation (linked below) that "the required access control list (ACL) must be defined on the router that serves the VLAN or subnet"? I haven't really understood what type of ACL this would be? The network as such is set up in an ASA firewall and has internet access, dhcp and so forth set.
    http://www.cisco.com/c/en/us/td/docs/wireless/controller/7-6/configuration-guide/b_cg76/b_cg76_chapter_01011100.html
    I believe one solution would be to just create two WLANs with different profile name and VLAN but otherwise similar and assign them to different AP groups? This would also assume I stop using the default AP group and keep APs in two other AP groups since all WLANs exist in the default group.
    Any help or guidance is appreciated.

    (Cisco Controller) >show wlan apgroups
    Total Number of AP Groups........................ 1
    Site Name........................................ default-group
    Site Description................................. <none>
    NAS-identifier................................... Cisco_xx:yy:zz
    AP Operating Class............................... Not-configured
    RF Profile
    2.4 GHz band..................................... <none>
    5 GHz band....................................... <none>
    WLAN ID Interface Network Admission Control Radio Policy
    1 employeenet Disabled None
    2 management Disabled None
    3 guestnet Disabled None
    16 guestnet Disabled None
    --More-- or (q)uit
    *AP3600 with 802.11ac Module will only advertise first 8 WLANs on 5GHz radios.
    AP Name Slots AP Model Ethernet MAC Location Port Country Priority
    AP_Hangout 2 AIR-CAP3602I-E-K9 c0:67:af:xx:yy:zz default location 1 SE 1
    AP_N 2 AIR-CAP3602I-E-K9 c0:67:af:xx:yy:zz default location 1 SE 1
    AP_Investor 2 AIR-CAP3602I-E-K9 c0:67:af:xx:yy:zz default location 1 SE 1
    AP_Extra 2 AIR-CAP3602I-E-K9 c0:67:af:xx:yy:zz default location 1 SE 1
    AP_NW 2 AIR-CAP3602I-E-K9 c0:67:af:xx:yy:zz default location 1 SE 1
    AP_Boardroom 2 AIR-CAP3602I-E-K9 c0:67:af:xx:yy:zz default location 1 SE 1
    AP_Investor 2 AIR-CAP3602I-E-K9 c0:67:af:xx:yy:zz default location 1 SE 1
    AP_NE 2 AIR-CAP3602I-E-K9 c0:67:af:xx:yy:zz default location 1 SE 1
    AP_Reception 2 AIR-CAP3602I-E-K9 c0:67:af:xx:yy:zz default location 1 SE 1
    AP25_NW 2 AIR-CAP2702I-E-K9 f4:0f:1b:xx:yy:zz 8th floor 1 SE 1
    AP25_Hangout 2 AIR-CAP2702I-E-K9 f4:0f:1b:xx:yy:zz 8th floor 1 SE 1
    AP_Event 2 AIR-CAP3602I-E-K9 c0:67:af:xx:yy:zz default location 1 SE 1
    Site Name........................................ employeenet_2
    Site Description................................. 8th floor AP group
    Venue Group Code................................. Unspecified
    --More-- or (q)uit
    Venue Type Code.................................. Unspecified
    NAS-identifier................................... Cisco_xx:yy:zz
    AP Operating Class............................... Not-configured
    RF Profile
    2.4 GHz band..................................... <none>
    5 GHz band....................................... <none>
    WLAN ID Interface Network Admission Control Radio Policy
    1 employeenet_2 Disabled None
    16 guestnet Disabled None
    *AP3600 with 802.11ac Module will only advertise first 8 WLANs on 5GHz radios.
    AP Name Slots AP Model Ethernet MAC Location Port Country Priority
    AP25_undefined 2 AIR-CAP2702I-E-K9 f4:0f:1b:xx.yy:zz 8th floor 1 SE 1
    --More-- or (q)uit
    (Cisco Controller) >
    We're changing the APs out from the 3600 ones to the 2700 although all are not changed yet. Also I only moved one AP to the AP Group I'm trying to get working for the testing.
    (Cisco Controller) >show wlan 1
    WLAN Identifier.................................. 1
    Profile Name..................................... Employeenet
    Network Name (SSID).............................. <company name>
    Status........................................... Enabled
    MAC Filtering.................................... Disabled
    Broadcast SSID................................... Enabled
    AAA Policy Override.............................. Disabled
    Network Admission Control
    Client Profiling Status
    Radius Profiling ............................ Disabled
    DHCP ....................................... Disabled
    HTTP ....................................... Disabled
    Local Profiling ............................. Disabled
    DHCP ....................................... Disabled
    HTTP ....................................... Disabled
    Radius-NAC State............................... Disabled
    SNMP-NAC State................................. Disabled
    Quarantine VLAN................................ 0
    Maximum number of Associated Clients............. 0
    Maximum number of Clients per AP Radio........... 200
    --More-- or (q)uit
    Number of Active Clients......................... 9
    Exclusionlist Timeout............................ 60 seconds
    Session Timeout.................................. 1800 seconds
    User Idle Timeout................................ Disabled
    Sleep Client..................................... disable
    Sleep Client Timeout............................. 12 hours
    User Idle Threshold.............................. 0 Bytes
    NAS-identifier................................... Cisco_xx:yy:zz
    CHD per WLAN..................................... Enabled
    Webauth DHCP exclusion........................... Disabled
    Interface........................................ employeenet
    Multicast Interface.............................. Not Configured
    WLAN IPv4 ACL.................................... unconfigured
    WLAN IPv6 ACL.................................... unconfigured
    WLAN Layer2 ACL.................................. unconfigured
    mDNS Status...................................... Enabled
    mDNS Profile Name................................ default-mdns-profile
    DHCP Server...................................... Default
    DHCP Address Assignment Required................. Disabled
    Static IP client tunneling....................... Disabled
    Quality of Service............................... Silver
    Per-SSID Rate Limits............................. Upstream Downstream
    Average Data Rate................................ 0 0
    --More-- or (q)uit
    Average Realtime Data Rate....................... 0 0
    Burst Data Rate.................................. 0 0
    Burst Realtime Data Rate......................... 0 0
    Per-Client Rate Limits........................... Upstream Downstream
    Average Data Rate................................ 0 0
    Average Realtime Data Rate....................... 0 0
    Burst Data Rate.................................. 0 0
    Burst Realtime Data Rate......................... 0 0
    Scan Defer Priority.............................. 4,5,6
    Scan Defer Time.................................. 100 milliseconds
    WMM.............................................. Allowed
    WMM UAPSD Compliant Client Support............... Disabled
    Media Stream Multicast-direct.................... Disabled
    CCX - AironetIe Support.......................... Enabled
    CCX - Gratuitous ProbeResponse (GPR)............. Disabled
    CCX - Diagnostics Channel Capability............. Disabled
    Dot11-Phone Mode (7920).......................... Disabled
    Wired Protocol................................... None
    Passive Client Feature........................... Disabled
    Peer-to-Peer Blocking Action..................... Disabled
    Radio Policy..................................... All
    DTIM period for 802.11a radio.................... 1
    DTIM period for 802.11b radio.................... 1
    --More-- or (q)uit
    Radius Servers
    Authentication................................ Global Servers
    Accounting.................................... Global Servers
    Interim Update............................. Disabled
    Framed IPv6 Acct AVP ...................... Prefix
    Dynamic Interface............................. Disabled
    Dynamic Interface Priority.................... wlan
    Local EAP Authentication......................... Disabled
    Security
    802.11 Authentication:........................ Open System
    FT Support.................................... Disabled
    Static WEP Keys............................... Disabled
    802.1X........................................ Disabled
    Wi-Fi Protected Access (WPA/WPA2)............. Enabled
    WPA (SSN IE)............................... Disabled
    WPA2 (RSN IE).............................. Enabled
    TKIP Cipher............................. Disabled
    AES Cipher.............................. Enabled
    Auth Key Management
    802.1x.................................. Disabled
    PSK..................................... Enabled
    CCKM.................................... Disabled
    --More-- or (q)uit
    FT-1X(802.11r).......................... Disabled
    FT-PSK(802.11r)......................... Disabled
    PMF-1X(802.11w)......................... Disabled
    PMF-PSK(802.11w)........................ Disabled
    FT Reassociation Timeout................... 20
    FT Over-The-DS mode........................ Enabled
    GTK Randomization.......................... Disabled
    SKC Cache Support.......................... Disabled
    CCKM TSF Tolerance......................... 1000
    WAPI.......................................... Disabled
    Wi-Fi Direct policy configured................ Disabled
    EAP-Passthrough............................... Disabled
    CKIP ......................................... Disabled
    Web Based Authentication...................... Disabled
    Web-Passthrough............................... Disabled
    Conditional Web Redirect...................... Disabled
    Splash-Page Web Redirect...................... Disabled
    Auto Anchor................................... Disabled
    FlexConnect Local Switching................... Disabled
    flexconnect Central Dhcp Flag................. Disabled
    flexconnect nat-pat Flag...................... Disabled
    flexconnect Dns Override Flag................. Disabled
    flexconnect PPPoE pass-through................ Disabled
    --More-- or (q)uit
    flexconnect local-switching IP-source-guar.... Disabled
    FlexConnect Vlan based Central Switching ..... Disabled
    FlexConnect Local Authentication.............. Disabled
    FlexConnect Learn IP Address.................. Enabled
    Client MFP.................................... Optional
    PMF........................................... Disabled
    PMF Association Comeback Time................. 1
    PMF SA Query RetryTimeout..................... 200
    Tkip MIC Countermeasure Hold-down Timer....... 60
    Eap-params.................................... Disabled
    AVC Visibilty.................................... Disabled
    AVC Profile Name................................. None
    Flow Monitor Name................................ None
    Split Tunnel (Printers).......................... Disabled
    Call Snooping.................................... Disabled
    Roamed Call Re-Anchor Policy..................... Disabled
    SIP CAC Fail Send-486-Busy Policy................ Disabled
    SIP CAC Fail Send Dis-Association Policy......... Disabled
    KTS based CAC Policy............................. Disabled
    Assisted Roaming Prediction Optimization......... Disabled
    802.11k Neighbor List............................ Disabled
    802.11k Neighbor List Dual Band.................. Disabled
    Band Select...................................... Disabled
    --More-- or (q)uit
    Load Balancing................................... Disabled
    Multicast Buffer................................. Disabled
    Mobility Anchor List
    WLAN ID IP Address Status
    802.11u........................................ Disabled
    MSAP Services.................................. Disabled
    Local Policy
    Priority Policy Name
    (Cisco Controller) >
    WLAN ID 2 and 3 are disabled.
    Thanks for looking into this.

Maybe you are looking for