04-27-2025 05:27 PM
Hello,
I'm currently using a Cisco 9105AXI in EWC mode, and I'm experiencing an issue where I cannot ping the VIP (Virtual IP) address assigned to the controller.
Here are the details
The CAPWAP real IP of the AP is pingable.
I can access the GUI using the VIP address (via HTTPS).
I can ping the gateway from the AP.
There is no issue with CAPWAP join or GUI communication.
However, ICMP (ping) fails only to the VIP address, while everything else works fine.
Is it expected behavior that the VIP does not respond to ICMP echo requests?
Or is there a way to explicitly enable ping replies to the EWC VIP address?
I’ve already verified that:
The VIP is correctly assigned and appears in show wireless management interface.
There is no ACL or firewall blocking ICMP from the source.
Any suggestions or clarifications would be appreciated.
Thanks in advance!
04-27-2025 08:45 PM
Can you share 'show tech wireless' please.
04-27-2025 09:11 PM - edited 04-27-2025 09:12 PM
i will show you tomarrow i'm in different place right now
05-02-2025 11:07 PM - edited 05-02-2025 11:09 PM
05-02-2025 11:46 PM
I just had a look into the STW and based on that could you please adjust these and see if that helps -
Current Config - wireless management interface Vlan12
Change to - wireless management interface GigabitEthernet0
Current Config -
ip route 0.0.0.0 0.0.0.0 10.8.12.254
ip route 0.0.0.0 0.0.0.0 Vlan12 250
Change To -
ip route 0.0.0.0 0.0.0.0 10.8.12.254
ip route 0.0.0.0 0.0.0.0 GigabitEthernet0 250
Add this config -
ip default-gateway10.8.12.254
05-02-2025 11:54 PM
i can test it 5/7 korea is in long weekend now
05-07-2025 06:10 PM
i added ip default-gateway10.8.12.254 this but still don't work
I don’t understand why only this device behaves this way.
On other devices, we configured the management interface as a VLAN instead of using Gi0, and there were no issues.
For reference, we are currently setting up around 400 APs, and only a few of them are experiencing this issue — where ping fails only to the VIP, while other connectivity is working fine.
04-28-2025 08:15 AM
@alsgur0416 The VIP is specifically intended to be non-routable.
https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/technical-reference/c9800-best-practices.html#VirtualIPaddress
It is only intended to be accessed by intercepting http requests from wireless clients for web auth, nothing else.
There are a few things about EWC which behave differently to WLC so wouldn't surprise me if this is expected behaviour. Either way you should never be routing any traffic to the VIP so you should not be trying to ping it either. It should not be externally accessible for security reasons. It's only intended to be a virtual web server IP for web auth.
> The VIP is correctly assigned and appears in show wireless management interface.
The wireless management interface on EWC should always be GigabitEthernet0
You should not be using the VIP for the wireless management interface!
https://www.cisco.com/c/en/us/td/docs/wireless/controller/ewc/17-15/config-guide/ewc_cg_17_15/overview_of_the_controller.html#task_gs1_qzh_kpb
There is no "show wireless management interface" command - maybe you mean "show wireless interface summary"?
05-02-2025 11:17 PM - edited 05-02-2025 11:20 PM
Thank you for your response. I have a few follow-up questions.
First, is it Cisco’s recommendation that the VIP used for GUI access does not respond to ping, but still allows GUI access?
If so, does this mean SSH access should still work without issues?
Also, in our setup, the wireless management interface is not using Gi0 but is configured on a management VLAN instead — could this also be a potential issue?
++ Is the guide you provided for the 9800 also applicable to the 9105 in EWC mode?
05-03-2025 08:51 AM - edited 05-03-2025 09:15 AM
> First, is it Cisco’s recommendation that the VIP used for GUI access does not respond to ping, but still allows GUI access? If so, does this mean SSH access should still work without issues?
- I have already explained that the Virtual IP is only supposed to be used for web auth. If you try to use it for anything else then you can expect unpredictable and untested behaviour.
> Also, in our setup, the wireless management interface is not using Gi0 but is configured on a management VLAN instead — could this also be a potential issue?
- It certainly could be! I don't believe EWC is intended to support VLAN at all which is why there is no VLAN menu like on a regular 9800 so I don't know how you even managed to configure that. I've just experimented and found you can add a dot1q sub-interface on CLI but I'm pretty sure that is not supported so the behaviour could be unpredictable. Aha - in fact I see from your STW that you actually configured SVI (vlan) interfaces - those are definitely not supported on EWC because Gig0 is not a switch interface. I also see you have configured your WLAN vlan interfaces there too - that's just a mistake because EWC only supports Flexconnect Local Switching - the VLANs are only supported on the AP not on the EWC. If you want to define the VLANs for the AP then you must do that in your wireless flex profile:
C9120AXI-EWC(config-wireless-flex-profile)#?
acl-policy ACL policy description
arp-caching enable arp-caching
cts Enable/Disable cts features for all APs in this profile
default Set a command to its defaults
description Add a description for the flex profile
dhcp Configure DHCP
exit Exit sub-mode
fallback-radio-shut Enables the radio interface shutdown
ip Flex group IP configuration subcommands
join-min-latency Enables least latency join for a flexconnect AP
local-accounting Configure local accounting
local-auth Configure local-auth
mdns-sd Enable/Disable mDNS features for all APs in this profile
native-vlan-id Enter native vlan-id information
no Negate a command or set its defaults
office-extend Enables the OfficeExtend AP mode for a flexconnect AP
predownload enable predownload
resilient Enables/Disables Standalone mode in flex+bridge AP
umbrella-profile umbrella profile description
vlan-name Enter vlan name
The VLAN definitions on the EWC itself are meaningless.
> Is the guide you provided for the 9800 also applicable to the 9105 in EWC mode?
- The clue is in the name of the guide: Cisco Embedded Wireless Controller on Catalyst Access Points Configuration Guide, IOS XE 17.15.x
If you want to start using advanced 9800 features then you should really consider using 9800-CL not EWC.
05-07-2025 06:12 PM
Thank you for your response.
I checked the link you shared and saw that GigabitEthernet0 is used as the management interface in the example.
However, that appears to be just one example — I didn’t see anything that explicitly states “it’s best practice to always use Gi0 for the management interface,” so I’m not quite sure what your recommendation is based on.
We are currently deploying around 400 APs, and in most of our EWC MAIN devices, the VIP responds to ping just fine with the current VLAN-based management setup.
This issue only occurs on a few specific EWC MAIN devices.
05-07-2025 06:57 PM
What you see in the GUI is what is supported on the EWC platform - it's an intentionally reduced feature set from a regular 9800 series controller with a number of limitations.
The IOS may allow you to configure other things (just because they haven't removed the commands) but they are untested and unsupported.
If you choose to use unsupported features then you do so at your own risk - the results can be unreliable and unpredictable - as you have discovered. And just because they (sort of) work on the current release doesn't mean they'll keep working on a later release.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide