Chanalyzer is marketed for larger campuses, while the InSSIDer Office and Personal is targeted to smaller environments. I think that both have great value, but in this post I will focus on Chanalyzer.
Access point groups (AP groups) help us as wireless network designers/administrators control our wireless networks and distribute WLANs with better precision. For each AP group created we are allowed up to 16 WLANs to support… In fact, the first 16 WLAN ID’s are automatically assigned to what is called the ‘default-group‘ on a Cisco WLC — This is something to be cognizant of when deploying AP groups and WLANs on your network, because all of the APs that join your WLC can join this default group… by default.
We also have control over the RF in these AP groups thanks to RF Profiles. Creating RF Profiles to attach to our AP groups gives us the ability to set DCA/TPC thresholds, data rates and several other options.
You have the power! You have a lot of power to tune and distribute your WLANs with AP groups. There are other related topics that will be covered in upcoming posts, but the following will discuss how to construct an AP group and add an AP to the new group.
This post is about the lightweight AP (LAP) registration process to the Cisco wireless LAN controller (WLC).
To troubleshoot an AP that will not join, we should first understand the process in which a Cisco LAP will try to register to a Cisco WLC.
Like many network devices, the LAP will request an IP address when you apply power and a network connection, unless you have configured a BVI1 IP address statically. The LAP must have an IP address in order to begin the discovery and join process.
I am currently working on a mobility lab, but I ran into an issue today. I recently acquired a 4402 to compliment my other lab gear, but I forgot (until today) that the console port on the 4402 is kicking it old school.
There you are… Gazing at your terminal emulator wondering why you see this
% Invalid input detected at ‘^’ marker.
after you try to configure a lightweight access point from the CLI.
This is a built in safety net to prevent you from doing something stupid from the CLI of a centrally managed AP.
But wait – What if I told you that it is possible to configure from the terminal? If you think you can handle all of the power that comes along with knowing the truth, then take the red pill… Stay in Wonderland, and I will show you how deep the rabbit hole goes.
Have you ever wanted to go back in time and review output or input from a terminal session? Have you ever wanted to present undeniable proof about your CLI syntax, with time stamps, to your team or a customer?
If your answers to the above questions is yes, then you should be logging your terminal sessions.
Logging your sessions is a simple, yet a very important CYA policy that you should be practicing.