cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
897
Views
2
Helpful
10
Replies

Splitting a 9800-40 HA pair

WayneWeezy
Level 1
Level 1

Hello, I have a 9800-40 WLC in an HA pair covering 2 sites that are connected via 1gb MPLS circuit. It has been requested to break the HA pair and move one controller to the other site. Each site uses its own vlan's for users connecting so I am trying to figure out the steps needed to make this split successful. The plan is to break the HA on the primary, and remove all vlans/ssid's from the 2nd WLC and take it to the remote site. I will need to assign a new management IP on it as well. My question is once I have the 2nd WLC online at the remote site I will disable the AP's on the switches as they are going to the primary, but when they come back online how will they find the local WLC instead of the one across the WAN? Am I missing any other key steps to this?

10 Replies 10

The WLC HA use active WLC mgmt IP in dns or dhcp to make AP discover it' 

Since now you split it' I think ypu need one side to change it mgmt IP and use this IP in dns/dhcp in that site to make AP discover WLC in that site.

MHM

WayneWeezy
Level 1
Level 1

thats right, I recall creating a DHCP scope option 43 when they were first set up, pointing to the HA WLC. So I will need to create a new VLAN on the remote site for the AP's, and add that option 43 pointing to the standalone remote WLC. Then on my switchports for the AP's, I will need to change the native vlan command to point to that new one. Does that sound accurate?

marce1000
VIP
VIP

 

  - This is not a good plan, in the context of 'coming from an HA pair' ; if that is needed the current HA solution which was        implemented is lost. Ok, let's then leave that alone for the moment : if you target a controller for  a new purpose then configure it   from scratch (again) for that purpose. Note that when checking out a 9800 configuration you can always use CLI command
show tech wireless and feed that into Wireless Config Analyzer
                                              Note that this not work with show tech 

   Note  that in a solid business context HA was configured for a good reason and with that some reason , then another controller
   should have been bought for this (new) purpose. Besides if the left over controller is left also with the HA configuration in place
   unwanted side effects could occur, and then in essence it should be reconfigured too from scratch.

 M.



-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
    When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '

WayneWeezy
Level 1
Level 1

I understand an HA pair is going to be the best solution, but this is a management call at this point. A perfect scenario would be getting an HA pair at each site but I dont forsee that happening. Are you saying if I break HA, I will lose configurations on the secondary? If the config remains, my thought was 90% of the work was already done and a few minor changes would be needed. I would need to remove the vlans, ssids, policies and management IP. Everything else would be the same, including the ISE integrations. So from what I understand you are recommending wiping the WLC and building it out from scratch at the remote site?

 

  >... Are you saying if I break HA, I will lose configurations on the secondary? If the config remains...
    - Then a better approach would be the following : save the running configuration from the current (primary) controller
       to an external repository 2) Initialize the 'new' controller (former standby).  3) On the saved configuration from the
       former primary = review it with an editor and make the needed changes to make the new controller to become
       functional for the new place (such as management ip etc.). Then copy that configuration into the new controller and of course save it too
       And foremost   as mentioned : issue the command show tech wireless and feed the output into
      Wireless Debug Analyzer
      As stated this procedure does not work from a simple show tech output ; when this procedure is used (mandatory)
      then in the resulting excell all errors red-flagged in the wlc-checkresults tab must always be corrected!!

  M.      
 



-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
    When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '

Rich R
VIP
VIP

I would recommend running them as N+1 redundancy for each other which is better than no redundancy at all.
The APs in site A have WLC A as primary and WLC B as secondary.  The APs in site B have WLC B as primary and WLC A as secondary.  And you configure option 43 accordingly at each site (remember you can configure both WLC IPs in option 43 with f108.01.02.03.04.05.06.07.08 where 1.2.3.4 and 5.6.7.8 are the WLC IPs.  This means you'll need both sites' configs on both WLCs and to keep them updated with any changes at either site.

I like this idea. I was told the plan was to get rid of the MPLS connection between sites and just go with a VPN, will this still work?

Just need to keep in mind possible impact of MTU reduction caused by VPN overhead because CAPWAP traffic is UDP.

The APs can do path MTU discovery but that relies on all the components between the AP and WLC behaving correctly to enable MTU discovery.  Otherwise you'll need to consider static MTU setting which I mentioned at https://community.cisco.com/t5/wireless/capwap-3-data-keepalive-err-failed-to-receive-data-keep-alive/m-p/5157023/highlight/true#M274228 earlier.

Leo Laohoo
Hall of Fame
Hall of Fame

@WayneWeezy wrote:
I understand an HA pair is going to be the best solution

For a 9800-40/-80, HA SSO is not ideal with the one (or more) following scenarios: 

1.  More than 50% AP count, i.  e.  more than 1000 APs; 
2.  More than 50% daily client count, i.  e.  more than 16k client per day; 
3.  External Web Authentication (PSK is fine)

N + 1 is better because different "VSS"-related processes will not be "misbehaving" (so to speak).

Also, be aware of the recently-revised (03 May 2024) of the Cisco Catalyst 9800 Series Configuration Best Practices.  

WayneWeezy
Level 1
Level 1

thanks for all the replies. I think I have a plan in place

Review Cisco Networking for a $25 gift card