<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Ask the Experts: Configuring, Troubleshooting and Monitoring in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139361#M22390</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;unsure if debug not showing anything or getting debug output with no reference to find rogue on wire.&lt;/P&gt;&lt;P&gt;be sure to run this on wlc.&lt;/P&gt;&lt;PRE style="font-size: 15px; color: #000000;"&gt;(Cisco Controller) &amp;gt; &lt;STRONG&gt;debug dot11 rldp enable&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what's the config on security&amp;gt;&amp;gt; wps&amp;gt;&amp;gt; general&amp;gt;&amp;gt; &lt;SPAN style="font-size: 10pt;"&gt;Rogue Location Discovery Protocol &amp;gt;&amp;gt; drop down. Since you're using local mode ap for rldp, it should be selected as "All APs" option. there is no option to say local mode/monitor/mesh/hreap mode AP only. it has to be either monitor for monitor mode only and AllAPs for the rest of the AP modes or it can be disabled.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 08 Apr 2013 23:36:18 GMT</pubDate>
    <dc:creator>Saravanan Lakshmanan</dc:creator>
    <dc:date>2013-04-08T23:36:18Z</dc:date>
    <item>
      <title>Ask the Experts: Configuring, Troubleshooting and Monitoring Wireless Security Policies with Saravanan Lakshmanan</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139356#M22385</link>
      <description>&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/2/9/3/133392-saravalak.png" align="left" alt="Configuring, Troubleshooting and Monitoring Wireless Security Policies with Saravanan Lakshmanan" border="0" hspace="10" style="padding-right: 10px; padding-bottom: 10px;" width="90" /&gt;&lt;STRONG&gt;With Saravanan Lakshmanan&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Welcome to the Cisco Support Community Ask the Expert conversation. This is an opportunity to learn and ask questions about&amp;nbsp; how to monitor, troubleshoot and configure Wireless Networks using Security Protection Policies. It includes Rogue Detection, Rogue Location Discovery Protocol (RLDP), Rogue Detector, Rogue Rules, wireless intrusion detection services&amp;nbsp; (wIDS), Rogue Containment, AP Authentication, client exclusion features that touches Mobility, RF grouping from wireless LAN controller.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;Saravanan Lakshmanan&lt;/STRONG&gt; is a Customer Support Engineer in Cisco's Technical Assistance Center (TAC) specializing in Wireless Technologies.&amp;nbsp; He is an expert in debugging and troubleshooting Cisco Wireless LAN Controllers (WLANs), wireless LAN services, unified access points, wireless LAN security, autonomous APs, VoWifi, authentication authorization accounting (AAA), and radio frequency (RF). Lakshmanan helps solve high severity and critical wireless issues for Cisco's customers and partners.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to use the rating system to let Saravanan know if you have received an adequate response.&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Saravanan might not be able to answer each question due to the volume expected during this event. Remember that you can continue the conversation on the Wireless sub-community &lt;A _jive_internal="true" href="https://community.cisco.com/community/netpro/wireless-mobility/security-network-management" rel="nofollow" target="_blank"&gt;Security and Network Management&lt;/A&gt;&amp;nbsp; shortly after the event. &lt;STRONG&gt;This event lasts through Friday April 19, 2013&lt;/STRONG&gt;. Visit this forum often to view responses to your questions and the questions of other community members. &lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 06:51:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139356#M22385</guid>
      <dc:creator>ciscomoderator</dc:creator>
      <dc:date>2021-07-04T06:51:27Z</dc:date>
    </item>
    <item>
      <title>Ask the Experts: Configuring, Troubleshooting and Monitoring Wir</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139357#M22386</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Adding doc link for reference:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rogue AP:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Rogue Management in a Unified Wireless Network&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6366/products_tech_note09186a0080b40901.shtml"&gt;http://www.cisco.com/en/US/products/ps6366/products_tech_note09186a0080b40901.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Rogue Detection under Unified Wireless Networks&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/tech/tk722/tk809/technologies_white_paper09186a0080722d8c.shtml"&gt;http://www.cisco.com/en/US/tech/tk722/tk809/technologies_white_paper09186a0080722d8c.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Rule Based Rogue Classification in Wireless LAN Controllers (WLC) and Wireless Control System (WCS)&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6366/products_tech_note09186a0080ad6b8d.shtml"&gt;http://www.cisco.com/en/US/products/ps6366/products_tech_note09186a0080ad6b8d.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Classifying Rogue Access Points&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/wireless/controller/7.4/configuration/guides/security_solution/config_security_chapter_010100.html"&gt;http://www.cisco.com/en/US/docs/wireless/controller/7.4/configuration/guides/security_solution/config_security_chapter_010100.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Managing Rogue Devices&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/wireless/controller/7.4/configuration/guides/security_solution/config_security_chapter_010011.html"&gt;http://www.cisco.com/en/US/docs/wireless/controller/7.4/configuration/guides/security_solution/config_security_chapter_010011.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Trusted AP Policies on a Wireless LAN Controller&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/tech/tk722/tk809/technologies_white_paper09186a0080921cc2.shtml"&gt;http://www.cisco.com/en/US/tech/tk722/tk809/technologies_white_paper09186a0080921cc2.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;wIDS:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Configuring IDS Signatures&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/wireless/controller/7.3/configuration/guide/b_wlc-cg_chapter_0110.html#d115989e11090a1635"&gt;http://www.cisco.com/en/US/docs/wireless/controller/7.3/configuration/guide/b_wlc-cg_chapter_0110.html#d115989e11090a1635&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;AP Authentication:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Infrastructure Management Frame Protection (MFP) with WLC and LAP Configuration Example&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/tech/tk722/tk809/technologies_configuration_example09186a008080dc8c.shtml"&gt;http://www.cisco.com/en/US/tech/tk722/tk809/technologies_configuration_example09186a008080dc8c.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Configuring Management Frame Protection&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/wireless/controller/7.3/configuration/guide/b_wlc-cg_chapter_0110.html#d115989e7135a1635"&gt;http://www.cisco.com/en/US/docs/wireless/controller/7.3/configuration/guide/b_wlc-cg_chapter_0110.html#d115989e7135a1635&lt;/A&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Configuring Client Exclusion Policies&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/wireless/controller/7.3/configuration/guide/b_wlc-cg_chapter_0110.html#d115989e7541a1635"&gt;http://www.cisco.com/en/US/docs/wireless/controller/7.3/configuration/guide/b_wlc-cg_chapter_0110.html#d115989e7541a1635&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Apr 2013 07:07:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139357#M22386</guid>
      <dc:creator>Saravanan Lakshmanan</dc:creator>
      <dc:date>2013-04-08T07:07:44Z</dc:date>
    </item>
    <item>
      <title>Ask the Experts: Configuring, Troubleshooting and Monitoring Wir</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139358#M22387</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Saravanan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;trying to find rogue on wire using rldp technique but unable to find so far. how long does it take the trigger to detect, using linksys ap as rogue. just like the doc mentioned having similar setup. enabled those rldp debugs but no glimpse of the wlc finding rogue on wire.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Apr 2013 20:27:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139358#M22387</guid>
      <dc:creator>Robert1478</dc:creator>
      <dc:date>2013-04-08T20:27:12Z</dc:date>
    </item>
    <item>
      <title>Ask the Experts: Configuring, Troubleshooting and Monitoring Wir</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139359#M22388</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Robert, &lt;SPAN style="font-size: 10pt;"&gt;what's the wlc code, AP model used, if possible share the debug output.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Apr 2013 22:43:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139359#M22388</guid>
      <dc:creator>Saravanan Lakshmanan</dc:creator>
      <dc:date>2013-04-08T22:43:15Z</dc:date>
    </item>
    <item>
      <title>Ask the Experts: Configuring, Troubleshooting and Monitoring Wir</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139360#M22389</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;5500 running 7.0.240.0, 3500 on local. linksys using open auth, getting debug&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Apr 2013 23:32:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139360#M22389</guid>
      <dc:creator>Robert1478</dc:creator>
      <dc:date>2013-04-08T23:32:44Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Experts: Configuring, Troubleshooting and Monitoring</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139361#M22390</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;unsure if debug not showing anything or getting debug output with no reference to find rogue on wire.&lt;/P&gt;&lt;P&gt;be sure to run this on wlc.&lt;/P&gt;&lt;PRE style="font-size: 15px; color: #000000;"&gt;(Cisco Controller) &amp;gt; &lt;STRONG&gt;debug dot11 rldp enable&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what's the config on security&amp;gt;&amp;gt; wps&amp;gt;&amp;gt; general&amp;gt;&amp;gt; &lt;SPAN style="font-size: 10pt;"&gt;Rogue Location Discovery Protocol &amp;gt;&amp;gt; drop down. Since you're using local mode ap for rldp, it should be selected as "All APs" option. there is no option to say local mode/monitor/mesh/hreap mode AP only. it has to be either monitor for monitor mode only and AllAPs for the rest of the AP modes or it can be disabled.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Apr 2013 23:36:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139361#M22390</guid>
      <dc:creator>Saravanan Lakshmanan</dc:creator>
      <dc:date>2013-04-08T23:36:18Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Experts: Configuring, Troubleshooting and Monitoring</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139362#M22391</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;wow!! thanks started working when set to all&lt;/P&gt;&lt;P&gt;would like to excercise rogue detector feature&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Apr 2013 23:52:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139362#M22391</guid>
      <dc:creator>Robert1478</dc:creator>
      <dc:date>2013-04-08T23:52:01Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Experts: Configuring, Troubleshooting and Monitoring</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139363#M22392</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;3500 as RD and monitor ap, been long enough and couldn't find wire rogue flag enabled on controller&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;this time guess got everything right. debug showing got wired mac and sure cisco seeing the linksys. &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;power cycling linksys to force arp&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Apr 2013 01:23:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139363#M22392</guid>
      <dc:creator>Robert1478</dc:creator>
      <dc:date>2013-04-09T01:23:54Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Experts: Configuring, Troubleshooting and Monitoring</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139364#M22393</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Well, unfortunatlely there are two bugs with Rogue Detector feature, use the code that has fix on it.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Rogue AP detection on wire fails if radio mac is +/- 1 of ethernet mac&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId="&gt;http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId=&lt;/A&gt;&lt;A href="https://www.cisco.com/cisco/psn/bssprt/bss?searchType=bstbugidsearch&amp;amp;page=bstBugDetail&amp;amp;BugID=CSCub75472" target="_blank"&gt;CSCub75472&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Fixed-In 7.4(100.0).&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Cant find rogue on wire, if rogue ap on non native vlan of RD's trunk&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId="&gt;http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId=&lt;/A&gt;&lt;A href="https://www.cisco.com/cisco/psn/bssprt/bss?searchType=bstbugidsearch&amp;amp;page=bstBugDetail&amp;amp;BugID=CSCue09354" target="_blank"&gt;CSCue09354&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Fixed-In 7.4MR(yet to release).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Apr 2013 02:07:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139364#M22393</guid>
      <dc:creator>Saravanan Lakshmanan</dc:creator>
      <dc:date>2013-04-09T02:07:25Z</dc:date>
    </item>
    <item>
      <title>Ask the Experts: Configuring, Troubleshooting and Monitoring Wir</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139365#M22394</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; hi everyone is there any one would like to help me&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i got following situation&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;how to share router one fastethernet port (e.g fa0/0) with different network addresses(e.g 192.168.1.1 and 192.168.2.1 and 192.168.3.1) when using them as a gateway using RIP or static routing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any one please help me..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Apr 2013 18:19:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139365#M22394</guid>
      <dc:creator>black.robber</dc:creator>
      <dc:date>2013-04-10T18:19:28Z</dc:date>
    </item>
    <item>
      <title>Ask the Experts: Configuring, Troubleshooting and Monitoring Wir</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139366#M22395</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Muhammad&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please post your question to LAN - Switching, Routing section.&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/community/netpro/network-infrastructure/switching?view=discussions"&gt;https://supportforums.cisco.com/community/netpro/network-infrastructure/switching?view=discussions&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Saravanan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Apr 2013 18:48:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139366#M22395</guid>
      <dc:creator>Saravanan Lakshmanan</dc:creator>
      <dc:date>2013-04-10T18:48:32Z</dc:date>
    </item>
    <item>
      <title>Ask the Experts: Configuring, Troubleshooting and Monitoring Wir</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139367#M22396</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;What am I supposed to do with unclassified rogue AP?&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;I understand that if they don't look a thread I can mark them as "Friendly External" to no receive more alarms about them. Is it ok?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;The problem is what happens&amp;nbsp; if this external Friendly AP change the SSID for a Managed SSID (an SSID is using our controller). Then, this AP is a threat, but is not longer detected for the controller as Malicious&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Is it a bug?&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;or am I not managing unclassified Rogue correctly?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Apr 2013 07:02:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139367#M22396</guid>
      <dc:creator>jmprats</dc:creator>
      <dc:date>2013-04-11T07:02:47Z</dc:date>
    </item>
    <item>
      <title>Ask the Experts: Configuring, Troubleshooting and Monitoring Wir</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139368#M22397</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Hi there,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;I have installed about 2 days ago one Cisco WCS 2504 and 11 APs. Everything is doing well regarding to WPA authentication. But I have a Radius Server that is also running with some issues on wireless:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;- Unless I open network settings and click connect on that config I cannot obtain a valid IP Address;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;- Roaming is not working also;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;I'm still getting issues regarding Radius;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp; - WPA2 Wlan still ok (144Mbit), but dont know when roaming works (how can I know/change these settings?);&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp; - Radius autenticated with 802.11 Data Encryption on 40 bits Key size connects always at 54Mbps (g) and auto authenticate but dont know when roaming works (how can I know/change these settings?);&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&amp;nbsp; - Radius with 802.11 Data Encryption with none key size, doesnt authenticate connects 144Mbit but doesnt acquire IP Address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TY&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Apr 2013 19:52:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139368#M22397</guid>
      <dc:creator>goncalo.girao</dc:creator>
      <dc:date>2013-04-11T19:52:10Z</dc:date>
    </item>
    <item>
      <title>Ask the Experts: Configuring, Troubleshooting and Monitoring Wir</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139369#M22398</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What am I supposed to do with unclassified rogue AP?&lt;/P&gt;&lt;P&gt;//You can classify them using rogue rules. Ex: Managed ssid, any AP that are not joined to WLC and broadcasting your ssid will be classified under the rogue rule.&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I understand that if they don't look a thread I can mark them as "Friendly External" to no receive more alarms about them. Is it ok?&lt;/P&gt;&lt;P&gt;//Yes, if it found to be legitimate AP then mark it is Friendly.&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;The problem is what happens&amp;nbsp; if this external Friendly AP change the SSID for a Managed SSID (an SSID is using our controller). Then, this AP is a threat, but is not longer detected for the controller as Malicious.&lt;/P&gt;&lt;P&gt;//Mostly, have seen deployment that admin configure the SSID that's not similar to their neighbor, However have seen giving common name like 'wallstreet' for ex: and later they change it to different one for their guest wlan. So there is intentional and accidental, if its your neighbor company you can always talk to their admin about it.&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Is it a bug?&lt;/P&gt;&lt;P&gt;//No.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Apr 2013 22:52:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139369#M22398</guid>
      <dc:creator>Saravanan Lakshmanan</dc:creator>
      <dc:date>2013-04-11T22:52:20Z</dc:date>
    </item>
    <item>
      <title>Ask the Experts: Configuring, Troubleshooting and Monitoring Wir</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139370#M22399</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Get debug client output when the wireless client seeing the issue. &lt;/P&gt;&lt;P&gt;WLC&amp;gt;debug client &lt;MAC addr="" of="" test="" client=""&gt;&lt;/MAC&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the client doesn't get an ip then it can't join wlc and success roaming is not possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To achieve N datarate using N AP and Client follow this doc:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Configure 802.11n on the WLC&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6366/products_tech_note09186a0080a3443f.shtml"&gt;http://www.cisco.com/en/US/products/ps6366/products_tech_note09186a0080a3443f.shtml&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;802.11n requires AES encryption to be enabled on WLANs used by 802.11n clients. You can use a WLAN with NONE as Layer 2 Security. However, if you configure any Layer 2 security, 802.11n requires WPA2 AES enabled to operate at 11n rates. &lt;SPAN style="font-size: 10pt;"&gt;Ensure that WMM is set to &lt;/SPAN&gt;&lt;STRONG style="color: #000000; font-size: 12px;"&gt;Allowed &lt;/STRONG&gt;&lt;SPAN style="font-size: 10pt;"&gt; on the WLAN profile in order to achieve 802.11n rates.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Apr 2013 22:59:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139370#M22399</guid>
      <dc:creator>Saravanan Lakshmanan</dc:creator>
      <dc:date>2013-04-11T22:59:57Z</dc:date>
    </item>
    <item>
      <title>Ask the Experts: Configuring, Troubleshooting and Monitoring Wir</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139371#M22400</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you. &lt;/P&gt;&lt;P&gt;are rldp scalable to work across mobility tunnel. both wlc1 &amp;amp; 2 added as mobility member with tunnels up, wired mac found on wlc1 and wireless mac identified by wlc2, with rldp enabled on both wlc.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Apr 2013 23:10:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139371#M22400</guid>
      <dc:creator>Robert1478</dc:creator>
      <dc:date>2013-04-11T23:10:11Z</dc:date>
    </item>
    <item>
      <title>Ask the Experts: Configuring, Troubleshooting and Monitoring Wir</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139372#M22401</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE jivemacro="quote"&gt;&lt;P&gt;Saravanan Lakshmanan wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Get debug client output when the wireless client seeing the issue.&lt;/P&gt;&lt;P&gt;WLC&amp;gt;debug client &lt;MAC addr="" of="" test="" client=""&gt;&lt;/MAC&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;GG -&amp;gt; Cant do it right now, not at the office.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the client doesn't get an ip then it can't join wlc and success roaming is not possible.&lt;/P&gt;&lt;P&gt;GG-&amp;gt; I'm only not getting valid IP Address when the key is set to none (see attch image)&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="134762" alt="Screen Shot 2013-04-12 at 00.25.13.png" src="https://community.cisco.com/Screen+Shot+2013-04-12+at+00.25.13.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To achieve N datarate using N AP and Client follow this doc:&lt;/P&gt;&lt;P&gt;Configure 802.11n on the WLC&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/ps6366/products_tech_note09186a0080a3443f.shtml" rel="nofollow"&gt;http://www.cisco.com/en/US/products/ps6366/products_tech_note09186a0080a3443f.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;802.11n requires AES encryption to be enabled on WLANs used by 802.11n clients. You can use a WLAN with NONE as Layer 2 Security. However, if you configure any Layer 2 security, 802.11n requires WPA2 AES enabled to operate at 11n rates. Ensure that WMM is set to &lt;STRONG style="color: #000000; font-size: 12px;"&gt;Allowed &lt;/STRONG&gt;on the WLAN profile in order to achieve 802.11n rates.&lt;/P&gt;&lt;P&gt;GG-&amp;gt; WMM is set to &lt;STRONG&gt;Allowed. &lt;/STRONG&gt;I'm using Mac os X Free open radius. Not sure how can I see encryption Type.&lt;/P&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Apr 2013 23:28:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139372#M22401</guid>
      <dc:creator>goncalo.girao</dc:creator>
      <dc:date>2013-04-11T23:28:34Z</dc:date>
    </item>
    <item>
      <title>Ask the Experts: Configuring, Troubleshooting and Monitoring Wir</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139373#M22402</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;*apfReceiveTask: Apr 12 10:26:06.994: mac_address_client apfMsExpireMobileStation (apf_ms.c:5009) Changing state for mobile mac_address_client on AP f0:29:29:xx:xx:xx from Associated to Disassociated&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*apfReceiveTask: Apr 12 10:26:06.994: mac_address_client Scheduling deletion of Mobile Station:&amp;nbsp; (callerId: 45) in 10 seconds&lt;/P&gt;&lt;P&gt;*apfMsConnTask_7: Apr 12 10:26:12.114: mac_address_client Reassociation received from mobile on AP f0:29:29:a9:16:20&lt;/P&gt;&lt;P&gt;*apfMsConnTask_7: Apr 12 10:26:12.114: mac_address_client 192.168.3.200 8021X_REQD (3) Changing ACL 'none' (ACL ID 255) ===&amp;gt; 'none' (ACL ID 255) --- (caller apf_policy.c:1626)&lt;/P&gt;&lt;P&gt;*apfMsConnTask_7: Apr 12 10:26:12.114: mac_address_client Applying site-specific IPv6 override for station mac_address_client - vapId 2, site 'default-group', interface 'management'&lt;/P&gt;&lt;P&gt;*apfMsConnTask_7: Apr 12 10:26:12.114: mac_address_client Applying IPv6 Interface Policy for station mac_address_client - vlan 0, interface id 0, interface 'management'&lt;/P&gt;&lt;P&gt;*apfMsConnTask_7: Apr 12 10:26:12.114: mac_address_client STA - rates (8): 130 132 139 150 36 48 72 108 12 18 24 96 0 0 0 0&lt;/P&gt;&lt;P&gt;*apfMsConnTask_7: Apr 12 10:26:12.114: mac_address_client STA - rates (12): 130 132 139 150 36 48 72 108 12 18 24 96 0 0 0 0&lt;/P&gt;&lt;P&gt;*apfMsConnTask_7: Apr 12 10:26:12.114: mac_address_client 192.168.3.200 8021X_REQD (3) Deleted mobile LWAPP rule on AP [f0:29:29:a9:1e:50]&lt;/P&gt;&lt;P&gt;*apfMsConnTask_7: Apr 12 10:26:12.114: mac_address_client Updated location for station old AP f0:29:29:a9:1e:50-0, new AP f0:29:29:a9:16:20-0&lt;/P&gt;&lt;P&gt;*apfMsConnTask_7: Apr 12 10:26:12.115: mac_address_client 192.168.3.200 8021X_REQD (3) Initializing policy&lt;/P&gt;&lt;P&gt;*apfMsConnTask_7: Apr 12 10:26:12.115: mac_address_client 192.168.3.200 8021X_REQD (3) Change state to AUTHCHECK (2) last state RUN (20)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*apfMsConnTask_7: Apr 12 10:26:12.115: mac_address_client 192.168.3.200 AUTHCHECK (2) Change state to 8021X_REQD (3) last state RUN (20)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*apfMsConnTask_7: Apr 12 10:26:12.115: mac_address_client 192.168.3.200 8021X_REQD (3) DHCP required on AP f0:29:29:a9:16:20 vapId 2 apVapId 2for this client&lt;/P&gt;&lt;P&gt;*apfMsConnTask_7: Apr 12 10:26:12.115: mac_address_client Not Using WMM Compliance code qosCap 00&lt;/P&gt;&lt;P&gt;*apfMsConnTask_7: Apr 12 10:26:12.115: mac_address_client 192.168.3.200 8021X_REQD (3) Plumbed mobile LWAPP rule on AP f0:29:29:a9:16:20 vapId 2 apVapId 2&lt;/P&gt;&lt;P&gt;*apfMsConnTask_7: Apr 12 10:26:12.115: mac_address_client apfMsAssoStateInc&lt;/P&gt;&lt;P&gt;*apfMsConnTask_7: Apr 12 10:26:12.115: mac_address_client apfPemAddUser2 (apf_policy.c:223) Changing state for mobile mac_address_client on AP f0:29:29:a9:16:20 from Disassociated to Associated&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*apfMsConnTask_7: Apr 12 10:26:12.115: mac_address_client Stopping deletion of Mobile Station: (callerId: 48)&lt;/P&gt;&lt;P&gt;*apfMsConnTask_7: Apr 12 10:26:12.115: mac_address_client Sending Assoc Response to station on BSSID f0:29:29:a9:16:20 (status 0) ApVapId 2 Slot 0&lt;/P&gt;&lt;P&gt;*apfMsConnTask_7: Apr 12 10:26:12.115: mac_address_client apfProcessAssocReq (apf_80211.c:5237) Changing state for mobile mac_address_client on AP f0:29:29:xx:xx:xx from Associated to Associated&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*dot1xMsgTask: Apr 12 10:26:12.118: mac_address_client Station mac_address_client setting dot1x reauth timeout = 1800&lt;/P&gt;&lt;P&gt;*dot1xMsgTask: Apr 12 10:26:12.118: mac_address_client dot1x - moving mobile mac_address_client into Connecting state&lt;/P&gt;&lt;P&gt;*dot1xMsgTask: Apr 12 10:26:12.118: mac_address_client Sending EAP-Request/Identity to mobile mac_address_client (EAP Id 1)&lt;/P&gt;&lt;P&gt;*osapiBsnTimer: Apr 12 10:26:41.994: mac_address_client 802.1x 'txWhen' Timer expired for station mac_address_client and for message = M0&lt;/P&gt;&lt;P&gt;*dot1xMsgTask: Apr 12 10:26:41.994: mac_address_client dot1x - moving mobile mac_address_client into Connecting state&lt;/P&gt;&lt;P&gt;*dot1xMsgTask: Apr 12 10:26:41.994: mac_address_client Sending EAP-Request/Identity to mobile mac_address_client (EAP Id&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2013 08:33:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139373#M22402</guid>
      <dc:creator>goncalo.girao</dc:creator>
      <dc:date>2013-04-12T08:33:17Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Experts: Configuring, Troubleshooting and Monitoring</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139374#M22403</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please attach complete debug output to a file, this one not showing why client couldn't connect back to the roamed AP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Apr 2013 01:05:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139374#M22403</guid>
      <dc:creator>Saravanan Lakshmanan</dc:creator>
      <dc:date>2013-04-16T01:05:34Z</dc:date>
    </item>
    <item>
      <title>Re: Ask the Experts: Configuring, Troubleshooting and Monitoring</title>
      <link>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139375#M22404</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Everything ok. Was the encription has you said. Ty&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Apr 2013 06:07:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/ask-the-experts-configuring-troubleshooting-and-monitoring/m-p/2139375#M22404</guid>
      <dc:creator>goncalo.girao</dc:creator>
      <dc:date>2013-04-16T06:07:55Z</dc:date>
    </item>
  </channel>
</rss>

