RRM Basics
Radio Resource Management(RRM) is a hard topic to understand. Following videos from Jerome Henry will help you a lot to get an overview of this topic. I highly recommend view these few times to get...
View ArticleConfiguring RRM
In this post we will see how to configure RRM on a cisco WLC. APs send neighbor messages every 60s at max power, at lowest data rate and on all serviced channels to the multicast address of...
View ArticleConfiguring DCA
Dynamic Channel Assignment (DCA) handled by RF group leader for a particular RF group. DCA algorithm takes following information into account 1. Load Measurement (Every AP measure the % total time...
View ArticleWireless Mobility Basics
A mobility even occur if a client roams between access points. As wireless clients move between APs on the same controller and APs join to different controller within the network four different types...
View ArticleConfiguring Mobility on WLC
In this post we will see how to configure mobility in Cisco WLC environment. Here is the topology where we have two WLCs. LWAP-02 register for WLC1 & LWAP-03 registers for WLC2. First of all you...
View ArticleConfiguring TPC
Controllers use the TPC (Tx Power Control) algorithm to determine whether the power of an AP needs to be adjusted down. Reducing the power of an AP helps mitigate co-channel interference with another...
View ArticleConfiguring Coverage Hole Detection (CHD)
The controller uses the quality of client signal levels reported by the APs to determine if the power level of that AP needs to be increased. Coverage Hole Detection (CHD) is controller independent, so...
View ArticleConfiguring ClientLink
Client Link (know as beamforming as well) is a spatial-filtering mechanism used at a transmitter to improve the received signal power or signal to noise (SNR) ratio at an intended receiver(client)....
View ArticleL2 – Inter Controller Roaming
In this post we will see how L2 Inter Controller Roaming works. I am using the following topology where previously configured for Mobility.(See Configuring WLC Mobility post before this) Since this is...
View ArticleL3 – Inter Controller Roaming
In this post we will see how L3 – Inter Controller Mobility works. I have slightly change my topology to test that. Notice that I have assigned different interfaces (Vlan 12 & Vlan 14) for “guest”...
View ArticleAP Registration
AP Registration to a WLC is two parts; the discovery & the join phase. Following diagram shows this concept. Usually Discovery request handled by Management Interface of a WLC & Join Requests...
View ArticleDeubug EAP Client Authentication
Here is the debug client <mac-address> output when my C7921 phone while associate to the network.My wireless network is configured for 802.1X + CCKM. This is a good troubleshooting command to...
View ArticleTSPEC
TSPEC allows 802.11 wireless client to signal its traffic requirement to the AP. The client includes the TSPEC in the add traffic stream(ADDTS). TSPEC from client include data rate, packet size, number...
View ArticleWLC – Web Authentication
Web Authentication or Web Auth is a layer 3 security method that allow client to pass DHCP & DNS traffic only untill they have passed some form of authentication. This is greatly used in wireless...
View ArticleInspiring Triple CCIE Success Story
I found the below inspiring blog post (Push Bhatkoti who has achieved his 3rd CCIE – Voice, Security & Service Provider) about his latest CCIE success. Tripple CCIE, so What ? You can get lot out...
View ArticleAuto-Anchor Mobility
In auto-anchor mobility mode, a subset of a mobility group is specified as the anchor controllers for a WLAN. You can use this feature to restrict a WLAN to a single subnet regardless of a client’s...
View ArticleAuto-Anchor Foreign Mapping
In Auto-Anchor mobility solution one objective was to assign guest users single subnet IP irrespective of their entry point to the network. But if you have a large corporate environment at multiple...
View ArticleMobility Ping Tests
Controllers in a mobility list communicate with each other by controlling information over a UDP port 16666 ( src & dst port are both 16666 ) & data traffic through an EoIP tunnel (IP protocol...
View ArticleStatic IP Clients Mobility
At times you may want to configure static IP addresses for wireless clients. When these wireless clients move about in a network, they could try associating with other controllers. If the clients try...
View ArticleRF Power Terminology
There are few terms such as dB, dBi, dBm are used to describe the amount of change in power measured at points in a system to a reference power level. The term dBi is used to describe the power gain...
View Article