12-02-2023 07:53 AM
Solved! Go to Solution.
12-03-2023 02:48 PM - edited 12-03-2023 03:17 PM
12-03-2023 06:07 PM
So then Rich, for the flexconnect configuration, I need to create a wlan profile for each ssid, then a policy profile for each vlan with that vlan assigned in the policy profile, then a policy tag that maps each wlan profile to each of those policy profiles, then each assigned vlan also added to a single flex profile, right?
12-04-2023 03:16 AM
Yes but not clear what you mean by "then each assigned vlan also added to a single flex profile, right?":
The VLANs for the SSIDs are defined in the flex profile for the AP - a bit like you define VLANs for a router or switch to use.
Have a read through these:
https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/213911-understand-catalyst-9800-wireless-contro.html
https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/config-guide/newconfigmodel/b_catalyst-9800-configuration-model.html
https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/213945-understand-flexconnect-on-9800-wireless.html
https://mrncciew.com/2023/01/21/9800-flexconnect-basics/
12-04-2023 03:41 AM
That is where all of this gets confusing. I don't have a 9800 in place, only the EWC. Most of the documentation for flex connect assumes there is a remote appliance. The only EWC configuration example (https://www.cisco.com/c/en/us/products/collateral/wireless/embedded-wireless-controller-catalyst-access-points/white-paper-c11-743398.html) is really vague on the flex connect part and does not explain how the flexconnect profile relates to the policy profile. I only understood the need for one policy profile for each vlan based on Scotts picture above. Here are some screenshots of what I meant above:
Then I would tag the aps with those profiles. Am I missing anything?
12-04-2023 03:50 AM
>...Most of the documentation for flex connect assumes there is a remote appliance
Since you only do flexconnect the principles remain the same.
>...Then I would tag the aps with those profiles. Am I missing anything?
Not really try it out ; verify controller configuration afterwards with CLI command show tech wireless ; feed the output into
Wireless Config Analyzer
Not convinced ? ; checkout This is so good
(!)
M.
12-06-2023 09:08 AM
Yes when reading the general 9800 guides you just have to remember anything applying to central switching (user traffic switched by WLC) is not relevant in the EWC context because it only supports flex local switching which means all the EWC does is configure the AP.
12-06-2023 11:11 AM
Ro rich, does my configuration look good above? I am really struggling getting this thing working. When I first boot it up, clients connect, but then they just drop out of no where, and eventually, connections try to connect and fail. When they do connect, they are in the proper vlan and they have an IP in the DHCP range for that vlan (switch is handling the DHCP). Just frustrating. I defaulted and am reconfiguring. I will post a config for both the EWC and the 9200 switch when I am finished if it fails again so that you guys can take a look. I have done everything major that the Wireless Config Analyzer says to do.
12-06-2023 11:41 AM
To be honest I do almost everything on CLI so I haven't looked over your config specifically. I just find it easier to read a few lines of text instead of trying to decipher screenshots <smile>
Maybe post the "show run" config when you're finished configuring along with "show ap tag summ" and "sh wireless client mac-address <aaaa.bbbb.cccc> detail" for one of the connected clients.
12-06-2023 12:42 PM
I'm learning CLI slowly but surely. I will send you all those things tonight when I get home. Thanks so much!
12-06-2023 06:23 PM
Here are the CLI outputs Rich:
EMBEDED WIRELESS CONTROLLER
Wed Dec 06 2023 20:02:56 GMT-0600 (Central Standard Time)
===================================================================================
#show run
Building configuration...
Current configuration : 13209 bytes
!
! Last configuration change at 22:34:47 UTC Tue Dec 5 2023 by admin
! NVRAM config last updated at 06:17:33 UTC Wed Dec 6 2023 by admin
!
version 16.12
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
service call-home
no platform punt-keepalive disable-kernel-core
no platform punt-keepalive settings
platform console serial
!
hostname WLAN_Controller
!
boot-start-marker
boot-end-marker
!
!
enable secret 9
!
aaa new-model
!
!
aaa authentication login default local
!
!
!
!
!
!
aaa session-id common
clock timezone UTC -6 0
no fips authorization-key
call-home
! If contact email address in call-home is configured as sch-smart-licensing@cisco.com
! the email address configured in Cisco Smart License Portal will be used as contact email address to send SCH notifications.
contact-email-addr sch-smart-licensing@cisco.com
profile "CiscoTAC-1"
active
destination transport-method http
no destination transport-method email
!
!
!
!
ip name-server 208.67.222.222 208.67.220.220
login on-success log
!
!
!
!
!
!
flow exporter default-flow-exporter
destination local wlc
!
!
flow monitor default-flow-monitor
exporter default-flow-exporter
record wireless avc basic
!
!
access-session mac-move deny
password encryption aes
!
crypto pki trustpoint SLA-TrustPoint
enrollment pkcs12
revocation-check crl
!
crypto pki trustpoint TP-self-signed-3395605568
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-3395605568
revocation-check none
rsakeypair TP-self-signed-3395605568
!
!
crypto pki certificate chain SLA-TrustPoint
certificate ca 01
30820321 30820209 A0030201 02020101 300D0609 2A864886 F70D0101 0B050030
32310E30 0C060355 040A1305 43697363 6F312030 1E060355 04031317 43697363
6F204C69 63656E73 696E6720 526F6F74 20434130 1E170D31 33303533 30313934
3834375A 170D3338 30353330 31393438 34375A30 32310E30 0C060355 040A1305
43697363 6F312030 1E060355 04031317 43697363 6F204C69 63656E73 696E6720
526F6F74 20434130 82012230 0D06092A 864886F7 0D010101 05000382 010F0030
82010A02 82010100 A6BCBD96 131E05F7 145EA72C 2CD686E6 17222EA1 F1EFF64D
CBB4C798 212AA147 C655D8D7 9471380D 8711441E 1AAF071A 9CAE6388 8A38E520
1C394D78 462EF239 C659F715 B98C0A59 5BBB5CBD 0CFEBEA3 700A8BF7 D8F256EE
4AA4E80D DB6FD1C9 60B1FD18 FFC69C96 6FA68957 A2617DE7 104FDC5F EA2956AC
7390A3EB 2B5436AD C847A2C5 DAB553EB 69A9A535 58E9F3E3 C0BD23CF 58BD7188
68E69491 20F320E7 948E71D7 AE3BCC84 F10684C7 4BC8E00F 539BA42B 42C68BB7
C7479096 B4CB2D62 EA2F505D C7B062A4 6811D95B E8250FC4 5D5D5FB8 8F27D191
C55F0D76 61F9A4CD 3D992327 A8BB03BD 4E6D7069 7CBADF8B DF5F4368 95135E44
DFC7C6CF 04DD7FD1 02030100 01A34230 40300E06 03551D0F 0101FF04 04030201
06300F06 03551D13 0101FF04 05300301 01FF301D 0603551D 0E041604 1449DC85
4B3D31E5 1B3E6A17 606AF333 3D3B4C73 E8300D06 092A8648 86F70D01 010B0500
03820101 00507F24 D3932A66 86025D9F E838AE5C 6D4DF6B0 49631C78 240DA905
604EDCDE FF4FED2B 77FC460E CD636FDB DD44681E 3A5673AB 9093D3B1 6C9E3D8B
D98987BF E40CBD9E 1AECA0C2 2189BB5C 8FA85686 CD98B646 5575B146 8DFC66A8
467A3DF4 4D565700 6ADF0F0D CF835015 3C04FF7C 21E878AC 11BA9CD2 55A9232C
7CA7B7E6 C1AF74F6 152E99B7 B1FCF9BB E973DE7F 5BDDEB86 C71E3B49 1765308B
5FB0DA06 B92AFE7F 494E8A9E 07B85737 F3A58BE1 1A48A229 C37C1E69 39F08678
80DDCD16 D6BACECA EEBC7CF9 8428787B 35202CDC 60E4616A B623CDBD 230E3AFB
418616A9 4093E049 4D10AB75 27E86F73 932E35B5 8862FDAE 0275156F 719BB2F0
D697DF7F 28
quit
crypto pki certificate chain TP-self-signed-3395605568
certificate self-signed 01
30820330 30820218 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 33333935 36303535 3638301E 170D3231 31313037 30303034
33355A17 0D333030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D33 33393536
30353536 38308201 22300D06 092A8648 86F70D01 01010500 0382010F 00308201
0A028201 0100A7BA DB3AA54D 76E6A250 501F264E 75071E3F 541FEFAB E944FEE0
1FF1848E A58820B6 6F257AF6 7C39C19F 5EAFE2D0 27741BD5 20EFFD14 12A148E0
66A06F3D 3AF7DA27 BF29C94C 5FE7E0FA 43FC7EAD 949CDC53 9BCC9210 12362A1F
671D6E33 45B284E0 7F73949E 1F748894 39C07EAD 239B75A0 221455C6 3E0E02D6
CF2ECC4A ACD6E75C BE42F593 DD34F09A 53180904 80C43A79 3DFC8FB5 FDEA6B1B
813E3A31 1010A53D C28BE646 84F02F4F 9D6D9D23 A13369A5 A6AEDD3C B5699459
DA433562 74992C99 AE9889AF B91EAC09 679C7866 189D16D9 E74E728B 7910FD1C
1D570791 89F26FFA 9CA19395 9CCB956C B6A58122 21D3187F 1C496F13 EE7512F0
F0EFFED7 2E170203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF
301F0603 551D2304 18301680 1425DC21 45CE6974 80E6E0E2 35B3ACE3 9D18D5D0
1A301D06 03551D0E 04160414 25DC2145 CE697480 E6E0E235 B3ACE39D 18D5D01A
300D0609 2A864886 F70D0101 05050003 82010100 75833A82 91DCFF27 51981D0A
17E455DE 3C345301 0378BCA6 F5CF1CAA 496102BC 8DE4BE55 E20F6921 AF9EADFE
255D8BCE B4F18DE3 48A1BE68 4AB54420 79CC821B 1910E145 5AB0B177 44B648C0
7D56A5DC 2D6EF14A C4022F66 439F4C24 0BC37988 A01BE979 9C9E7D97 A9AEA806
0CF79277 44EBFEBA 677E22AC EEC23F69 E9211291 44CB3F4D 5EBB196B 763AAA17
1E5D96B0 FFD172B8 BBEF540A A0DE9C50 34EE8D97 6D080D56 44D58578 65827598
1C0AE165 96AE9925 71054D0F 384E104A 445B3B17 8BEED3BA C86DCD86 61024ECA
81FE5F73 C960C0F3 92CAB660 7BFB3F17 3F521EF7 6433C02A C997B930 2B83C014
FBD2AD7E 84D6D0C5 805F4D01 0E686E1C 78F11571
quit
!
crypto pki certificate pool
cabundle nvram:ios_core.p7b
!
service-template webauth-global-inactive
inactivity-timer 3600
service-template DEFAULT_LINKSEC_POLICY_MUST_SECURE
linksec policy must-secure
service-template DEFAULT_LINKSEC_POLICY_SHOULD_SECURE
linksec policy should-secure
service-template DEFAULT_CRITICAL_VOICE_TEMPLATE
voice vlan
service-template DEFAULT_CRITICAL_DATA_TEMPLATE
memory free low-watermark processor 33020
!
license udi pid C9800-AP sn
device classifier
username admin privilege 15 secret 9
!
redundancy
mode sso
!
!
!
!
!
!
!
interface GigabitEthernet0
description Management Interface
mac-address 0000.5e00.0101
ip dhcp client client-id GigabitEthernet0
ip dhcp client broadcast-flag clear
ip address 192.168.10.30 255.255.255.0
no negotiation auto
!
ip http server
ip http authentication local
ip http secure-server
ip http secure-trustpoint CISCO_IDEVID_SUDI
ip http client source-interface GigabitEthernet0
ip forward-protocol nd
ip tftp blocksize 8192
ip route 0.0.0.0 0.0.0.0 GigabitEthernet0 250
ip dns server
!
!
logging trap debugging
!
!
!
!
control-plane
!
banner exec ^C
########################################################################################################
# #
# Welcome to the Cisco Catalyst 9800-AP Embedded Wireless Controller command line interface. #
# #
# Please see command reference guide for the complete list of supported commands for this release: #
# https://www.cisco.com/c/en/us/td/docs/wireless/embedded_wireless_controller_configuration_guide.html #
# #
########################################################################################################
^C
banner login ^CWireless LAN Controller^C
!
line con 0
exec-timeout 0 0
stopbits 1
line vty 0
length 0
transport input ssh
line vty 1 4
transport input ssh
line vty 5 15
transport input ssh
line vty 16 50
!
ntp server 1.ciscome.pool.ntp.org
ntp server 0.ciscome.pool.ntp.org
ntp server 2.ciscome.pool.ntp.org
!
!
!
!
!
wireless aaa policy default-aaa-policy
wireless cts-sxp profile default-sxp-profile
no wireless ipv6 ra wired
wireless management interface GigabitEthernet0
wireless profile airtime-fairness default-atf-policy 0
wireless profile flex default-flex-profile
description "default flex profile"
native-vlan-id 10
wireless profile flex lewis-home-flex-profile
description "Lewis Home Flex Profile"
native-vlan-id 10
vlan-name Users
vlan-id 40
vlan-name Guests
vlan-id 50
wireless profile image-download default
description "default image download profile"
wireless profile mesh default-mesh-profile
description "default mesh profile"
wireless profile policy user-policy-profile
autoqos mode fastlane
no central association
no central dhcp
no central switching
description "User Policy Profile"
dhcp-tlv-caching
no exclusionlist
http-tlv-caching
service-policy input platinum-up
service-policy output platinum
vlan 40
no shutdown
wireless profile policy guest-policy-profule
autoqos mode fastlane
no central association
no central dhcp
no central switching
description "Guest Policy Profile"
dhcp-tlv-caching
no exclusionlist
http-tlv-caching
service-policy input platinum-up
service-policy output platinum
vlan 50
no shutdown
wireless profile policy default-policy-profile
autoqos mode fastlane
no central association
no central dhcp
no central switching
description "default policy profile"
http-tlv-caching
ipv4 flow monitor default-flow-monitor input
ipv4 flow monitor default-flow-monitor output
service-policy input platinum-up
service-policy output platinum
vlan 10
no shutdown
wireless tag site default-site-tag
ap-profile lewis-home-ap-profile
description "Lewis Home Site Tag"
flex-profile lewis-home-flex-profile
no local-site
wireless tag policy default-policy-tag
description "default policy-tag"
wireless tag policy lewis-home-policy-tag
description "Lewis Home Policy Tag"
wlan "Lewis Home Guest" policy guest-policy-profule
wlan "Lewis Home Wireless" policy user-policy-profile
wireless tag rf default-rf-tag
description "default RF tag"
wireless tag rf lewis-home-rf-tag
description "Lewis Home RF Tag"
wireless fabric control-plane default-control-plane
wlan "Lewis Home Guest" 2 "Lewis Home Guest Test"
mdns-sd gateway
security wpa psk set-key ascii 8 N`EMQ[ZifUTQ\VNNifJLB_[WdSZVBgAAB
no security wpa akm dot1x
security wpa akm psk
wmm require
no shutdown
wlan "Lewis Home Wireless" 1 "Lewis Home Wireless Test"
mdns-sd gateway
security wpa psk set-key ascii 8 HH]QOh\[cDH\EhDCV_DJSeNe[BOLUIAAB
no security wpa akm dot1x
security wpa akm psk
wmm require
no shutdown
ap dot11 24ghz rf-profile Low_Client_Density_rf_24gh
coverage data rssi threshold -90
coverage level 2
coverage voice rssi threshold -90
description "pre configured Low Client Density rfprofile for 2.4gh radio"
high-density rx-sop threshold low
tx-power v1 threshold -65
no shutdown
ap dot11 24ghz rf-profile High_Client_Density_rf_24gh
description "pre configured High Client Density rfprofile for 2.4gh radio"
high-density rx-sop threshold medium
rate RATE_11M disable
rate RATE_12M mandatory
rate RATE_1M disable
rate RATE_2M disable
rate RATE_5_5M disable
rate RATE_6M disable
tx-power min 7
no shutdown
ap dot11 24ghz rf-profile Typical_Client_Density_rf_24gh
description "pre configured Typical Client Density rfprofile for 2.4gh radio"
rate RATE_11M disable
rate RATE_12M mandatory
rate RATE_1M disable
rate RATE_2M disable
rate RATE_5_5M disable
rate RATE_6M disable
no shutdown
ap dot11 24ghz rrm channel cleanair-event
ap dot11 24ghz rrm channel cleanair-event rogue-contribution
ap dot11 24ghz edca-parameters fastlane
ap dot11 5ghz rf-profile Low_Client_Density_rf_5gh
coverage data rssi threshold -90
coverage level 2
coverage voice rssi threshold -90
description "pre configured Low Client Density rfprofile for 5gh radio"
high-density rx-sop threshold low
tx-power v1 threshold -60
no shutdown
ap dot11 5ghz rf-profile High_Client_Density_rf_5gh
description "pre configured High Client Density rfprofile for 5gh radio"
high-density rx-sop threshold medium
rate RATE_6M disable
rate RATE_9M disable
tx-power min 7
tx-power v1 threshold -65
no shutdown
ap dot11 5ghz rf-profile Typical_Client_Density_rf_5gh
description "pre configured Typical Density rfprofile for 5gh radio"
no shutdown
ap dot11 5ghz rrm channel cleanair-event
ap dot11 5ghz rrm channel cleanair-event rogue-contribution
ap dot11 5ghz edca-parameters fastlane
ap country US
ap tag-source-priority 2 source filter
ap tag-source-priority 3 source ap
ap location name Default_Location
description Default_Location
ap profile default-ap-profile
description "default ap profile"
mgmtuser username admin password 8 secret 8
ap profile lewis-home-ap-profile
description "Lewis Home AP Profile"
hyperlocation ble-beacon 0
hyperlocation ble-beacon 1
hyperlocation ble-beacon 2
hyperlocation ble-beacon 3
hyperlocation ble-beacon 4
ap a49b.cd2a.47e4
policy-tag lewis-home-policy-tag
rf-tag lewis-home-rf-tag
ap a49b.cd2a.59fc
policy-tag lewis-home-policy-tag
rf-tag lewis-home-rf-tag
end
Wed Dec 06 2023 20:03:59 GMT-0600 (Central Standard Time)
===================================================================================
#sh ap tag summ
Number of APs: 2
AP Name AP Mac Site Tag Name Policy Tag Name RF Tag Name Misconfigured Tag Source
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Laundry_Room a49b.cd2a.47e4 default-site-tag lewis-home-policy-tag lewis-home-rf-tag No Static
Hallway a49b.cd2a.59fc default-site-tag lewis-home-policy-tag lewis-home-rf-tag No Static
Wed Dec 06 2023 20:13:24 GMT-0600 (Central Standard Time)
===================================================================================
#show wireless client mac-address 88E9.FE56.2CFC detail
Client MAC Address : 88e9.fe56.2cfc
Client IPv4 Address : 192.168.41.29
Client IPv6 Addresses : fe80::102a:3381:c8ef:3a94
Client Username: N/A
AP MAC Address : e44e.2d44.3f20
AP Name: Laundry_Room
AP slot : 1
Client State : Associated
Policy Profile : user-policy-profile
Flex Profile : lewis-home-flex-profile
Wireless LAN Id: 1
WLAN Profile Name: Lewis Home Wireless
Wireless LAN Network Name (SSID): Lewis Home Wireless Test
BSSID : e44e.2d44.3f2f
Connected For : 1054 seconds
Protocol : 802.11ac
Channel : 100
Client IIF-ID : 0x90000009
Association Id : 1
Authentication Algorithm : Open System
Session Timeout : 1800 sec (Remaining time: 746 sec)
Session Warning Time : Timer not running
Input Policy Name : platinum
Input Policy State : Installed
Input Policy Source : QOS Internal Policy
Output Policy Name : voice-client-avc
Output Policy State : Installed
Output Policy Source : QOS Internal Policy
WMM Support : Enabled
U-APSD Support : Enabled
U-APSD value : 0
APSD ACs : BK, BE, VI, VO
Fastlane Support : Enabled
Client Active State : Active
Power Save : OFF
Current Rate : m7 ss3
Supported Rates : 9.0,18.0,36.0,48.0,54.0
Mobility:
Move Count : 0
Mobility Role : Local
Mobility Roam Type : None
Mobility Complete Timestamp : 12/07/2023 01:55:39 UTC
Client Join Time:
Join Time Of Client : 12/07/2023 01:55:39 UTC
Policy Manager State: Run
Last Policy Manager State : IP Learn Complete
Client Entry Create Time : 1054 seconds
Policy Type : WPA2
Encryption Cipher : CCMP (AES)
Authentication Key Management : PSK
AAA override passphrase : No
Encrypted Traffic Analytics : No
Protected Management Frame - 802.11w : No
EAP Type : Not Applicable
VLAN : 40
Multicast VLAN : 0
WFD capable : No
Managed WFD capable : No
Cross Connection capable : No
Support Concurrent Operation : No
Session Manager:
Point of Attachment : capwap_90000006
IIF ID : 0x90000006
Authorized : TRUE
Session timeout : 1800
Common Session ID: 000000000000004DFCFC842F
Acct Session ID : 0x00000000
Last Tried Aaa Server Details:
Server IP :
Auth Method Status List
Method : None
Local Policies:
Service Template : wlan_svc_user-policy-profile (priority 254)
VLAN : 40
Absolute-Timer : 1800
Server Policies:
Resultant Policies:
VLAN Name :
VLAN : 40
Absolute-Timer : 1800
DNS Snooped IPv4 Addresses : None
DNS Snooped IPv6 Addresses : None
Client Capabilities
CF Pollable : Not implemented
CF Poll Request : Not implemented
Short Preamble : Not implemented
PBCC : Not implemented
Channel Agility : Not implemented
Listen Interval : 0
Fast BSS Transition Details :
Reassociation Timeout : 0
11v BSS Transition : Not implemented
11v DMS Capable : No
QoS Map Capable : No
FlexConnect Data Switching : Local
FlexConnect Dhcp Status : Local
FlexConnect Authentication : Central
FlexConnect Central Association : No
Client Statistics:
Number of Bytes Received : 11606853
Number of Bytes Sent : 3220538
Number of Packets Received : 7352
Number of Packets Sent : 19559
Number of Policy Errors : 0
Radio Signal Strength Indicator : -63 dBm
Signal to Noise Ratio : 31 dB
Fabric status : Disabled
Client Scan Reports
Assisted Roaming Neighbor List
Nearby AP Statistics:
EoGRE : No/Simple client
Device Type : Apple-Device
Device Name : APPLE, INC.
Protocol Map : 0x000009 (OUI, DHCP)
Protocol : DHCP
Type : 12 15
Data : 0f
00000000 00 0c 00 0b 4a 65 72 65 6d 79 73 2d 4d 42 50 |....Jeremys-MBP |
Type : 55 16
Data : 10
00000000 00 37 00 0c 01 79 03 06 0f 6c 72 77 fc 5f 2c 2e |.7...y...lrw._,.|
Max Client Protocol Capability: 802.11ac Wave 2
NETWORK SWITCH
Wed Dec 06 2023 20:14:50 GMT-0600 (Central Standard Time)
===================================================================================
#show run
Building configuration...
Current configuration : 35211 bytes
!
! Last configuration change at 19:58:31 CST Wed Dec 6 2023 by admin
! NVRAM config last updated at 20:54:49 CST Tue Dec 5 2023 by admin
!
version 17.6
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec localtime
service timestamps log datetime msec localtime
service call-home
platform punt-keepalive disable-kernel-core
!
hostname Network_Switch
!
!
vrf definition Mgmt-vrf
!
address-family ipv4
exit-address-family
!
address-family ipv6
exit-address-family
!
enable secret 9
!
!
!
!
no aaa new-model
clock timezone CST -6 0
switch 1 provision c9200l-48p-4g
!
!
!
!
vtp mode transparent
!
!
!
!
!
ip routing
!
!
!
!
!
ip name-server 8.8.8.8 1.1.1.1
no ip domain lookup
ip dhcp excluded-address 192.168.10.0 192.168.10.30
ip dhcp excluded-address 192.168.10.50 192.168.10.255
ip dhcp excluded-address 192.168.40.0 192.168.41.0
ip dhcp excluded-address 192.168.41.251 192.168.41.255
ip dhcp excluded-address 192.168.50.0 192.168.50.99
ip dhcp excluded-address 192.168.50.200 192.168.50.255
!
ip dhcp pool Users
network 192.168.40.0 255.255.254.0
default-router 192.168.40.1
dns-server 8.8.8.8 1.1.1.1
lease 7
!
ip dhcp pool WirelessAPS
network 192.168.10.0 255.255.255.0
default-router 192.168.10.20
dns-server 8.8.8.8 1.1.1.1
lease infinite
!
ip dhcp pool Guests
network 192.168.50.0 255.255.255.0
default-router 192.168.50.1
dns-server 8.8.8.8 1.1.1.1
lease infinite
!
!
!
ip arp inspection validate src-mac dst-mac ip
no ip igmp snooping vlan 40
login on-success log
ipv6 nd raguard policy HOST_POLICY
!
udld enable
!
!
!
crypto pki trustpoint SLA-TrustPoint
enrollment pkcs12
revocation-check crl
!
crypto pki trustpoint TP-self-signed-3080461521
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-3080461521
revocation-check none
rsakeypair TP-self-signed-3080461521
!
!
crypto pki certificate chain SLA-TrustPoint
certificate ca 01
30820321 30820209 A0030201 02020101 300D0609 2A864886 F70D0101 0B050030
32310E30 0C060355 040A1305 43697363 6F312030 1E060355 04031317 43697363
6F204C69 63656E73 696E6720 526F6F74 20434130 1E170D31 33303533 30313934
3834375A 170D3338 30353330 31393438 34375A30 32310E30 0C060355 040A1305
43697363 6F312030 1E060355 04031317 43697363 6F204C69 63656E73 696E6720
526F6F74 20434130 82012230 0D06092A 864886F7 0D010101 05000382 010F0030
82010A02 82010100 A6BCBD96 131E05F7 145EA72C 2CD686E6 17222EA1 F1EFF64D
CBB4C798 212AA147 C655D8D7 9471380D 8711441E 1AAF071A 9CAE6388 8A38E520
1C394D78 462EF239 C659F715 B98C0A59 5BBB5CBD 0CFEBEA3 700A8BF7 D8F256EE
4AA4E80D DB6FD1C9 60B1FD18 FFC69C96 6FA68957 A2617DE7 104FDC5F EA2956AC
7390A3EB 2B5436AD C847A2C5 DAB553EB 69A9A535 58E9F3E3 C0BD23CF 58BD7188
68E69491 20F320E7 948E71D7 AE3BCC84 F10684C7 4BC8E00F 539BA42B 42C68BB7
C7479096 B4CB2D62 EA2F505D C7B062A4 6811D95B E8250FC4 5D5D5FB8 8F27D191
C55F0D76 61F9A4CD 3D992327 A8BB03BD 4E6D7069 7CBADF8B DF5F4368 95135E44
DFC7C6CF 04DD7FD1 02030100 01A34230 40300E06 03551D0F 0101FF04 04030201
06300F06 03551D13 0101FF04 05300301 01FF301D 0603551D 0E041604 1449DC85
4B3D31E5 1B3E6A17 606AF333 3D3B4C73 E8300D06 092A8648 86F70D01 010B0500
03820101 00507F24 D3932A66 86025D9F E838AE5C 6D4DF6B0 49631C78 240DA905
604EDCDE FF4FED2B 77FC460E CD636FDB DD44681E 3A5673AB 9093D3B1 6C9E3D8B
D98987BF E40CBD9E 1AECA0C2 2189BB5C 8FA85686 CD98B646 5575B146 8DFC66A8
467A3DF4 4D565700 6ADF0F0D CF835015 3C04FF7C 21E878AC 11BA9CD2 55A9232C
7CA7B7E6 C1AF74F6 152E99B7 B1FCF9BB E973DE7F 5BDDEB86 C71E3B49 1765308B
5FB0DA06 B92AFE7F 494E8A9E 07B85737 F3A58BE1 1A48A229 C37C1E69 39F08678
80DDCD16 D6BACECA EEBC7CF9 8428787B 35202CDC 60E4616A B623CDBD 230E3AFB
418616A9 4093E049 4D10AB75 27E86F73 932E35B5 8862FDAE 0275156F 719BB2F0
D697DF7F 28
quit
crypto pki certificate chain TP-self-signed-3080461521
certificate self-signed 01
30820330 30820218 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 33303830 34363135 3231301E 170D3233 31303133 31373138
31385A17 0D333331 30313231 37313831 385A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D33 30383034
36313532 31308201 22300D06 092A8648 86F70D01 01010500 0382010F 00308201
0A028201 0100B797 1D073FC4 4E4C5CDC 8EE01600 27B83FE1 73AE4208 BC54F04A
59837E1F 99EA26F2 3BC684BA 672EC35D 4BFBE972 ACCC405B 35C1A358 4C2C592B
0B6B87B5 F184B209 B87E0B06 603E5567 F7395F1B 819ABA5D 0E66D6E9 8B6C5B51
2DD25FAE 793BEF9C FB991525 B52AC67A 4C7C8CAE 0AF942DB FF68BED7 F6068520
3283B23E 23D034A5 A8044E03 DB92044A 98BD38FC 3A5BDF91 5F6197F0 EDCBAAA8
DE6FE12A 34E9DB06 24C7BCBA 1A21C1BC D713AACE 78325ED0 2EB44CA9 5533A5A9
C659FB56 3A8E53F9 91743AED 84C64CAD 70FB4C2A 2D12D921 F5E4F49C 9667C3BB
272E3289 64709272 EC4BFCAA 13C1FB9B F0D33490 FE548B29 0DCD68E2 C967411C
2057CB32 BC110203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF
301F0603 551D2304 18301680 14ADECF5 AD057734 6DF16F3F 453CAB16 196ADAE2
62301D06 03551D0E 04160414 ADECF5AD 0577346D F16F3F45 3CAB1619 6ADAE262
300D0609 2A864886 F70D0101 05050003 82010100 300171BA 24314A30 1028420D
441CDA1B 03A67233 F945784B 5C11E6CF 153CE808 CC0FDF73 4D6971E1 2B256099
EC7D833C 91E58898 FCA08678 17EAF0DF B366DDA7 7C34ED2B 5095B7ED E9230FF8
55D0B1CF C2664814 5AC73853 0BF3B1C4 27D99A0F 7930060E 5D9CBD69 F1FDBBCD
5F0AC646 A1B53915 CFE060B0 ED48E411 99C3AD9D A60FB342 F3B28AA0 B41B7ACE
B2C953B2 FD06E6A3 5F2B70B1 D5B36C52 53F81373 22D84EEF F21A6F08 4D0D76DD
9FCAF102 7D4CA143 ACB2D039 FF9ECD9D C2631359 9FD55E40 FEC7B423 9BEEAD8C
D1EEF19A 8AD2FE2E 13C11750 8590F65F F67D257E 08CDD2DC FC48F80A 3B107FEA
652D0582 F6B3FEC1 F045FF7D B5360E73 C9CA4932
quit
!
crypto pki certificate pool
cabundle nvram:ios_core.p7b
!
!
port-channel load-balance src-dst-ip
license boot level network-advantage addon dna-advantage
!
!
diagnostic bootup level minimal
!
spanning-tree mode rapid-pvst
spanning-tree extend system-id
spanning-tree vlan 40,50,60 priority 4096
spanning-tree vlan 250 priority 20480
memory free low-watermark processor 10633
!
errdisable recovery cause udld
errdisable recovery cause bpduguard
errdisable recovery cause security-violation
errdisable recovery cause channel-misconfig
errdisable recovery cause pagp-flap
errdisable recovery cause dtp-flap
errdisable recovery cause link-flap
errdisable recovery cause sfp-config-mismatch
errdisable recovery cause gbic-invalid
errdisable recovery cause l2ptguard
errdisable recovery cause psecure-violation
errdisable recovery cause port-mode-failure
errdisable recovery cause dhcp-rate-limit
errdisable recovery cause pppoe-ia-rate-limit
errdisable recovery cause mac-limit
errdisable recovery cause storm-control
errdisable recovery cause inline-power
errdisable recovery cause arp-inspection
errdisable recovery cause loopback
errdisable recovery cause psp
errdisable recovery cause mrp-miscabling
errdisable recovery cause loopdetect
username admin privilege 15 secret 9
!
redundancy
mode sso
!
!
transceiver type all
monitoring
!
vlan 8
name Native
!
vlan 9
name Blackhole
!
vlan 10
name Managment
!
vlan 40
name Users
!
vlan 50
name Guests
!
vlan 60
name Voice
!
vlan 70
name Security
!
vlan 80
name Video
!
vlan 100
name Audio
!
vlan 250
name WAN
!
!
class-map match-any system-cpp-police-ewlc-control
description EWLC Control
class-map match-any MULTIMEDIA-STREAMING-QUEUE
match dscp af31
match dscp af32
match dscp af33
class-map match-any system-cpp-police-topology-control
description Topology control
class-map match-any system-cpp-police-sw-forward
description Sw forwarding, L2 LVX data packets, LOGGING, Transit Traffic
class-map match-any CONTROL-MGMT-QUEUE
match dscp cs7
match dscp cs6
match dscp cs3
match dscp cs2
class-map match-any TRANSACTIONAL-DATA-QUEUE
match dscp af21
match dscp af22
match dscp af23
class-map match-any system-cpp-default
description EWLC data, Inter FED Traffic
class-map match-any VIDEO-PRIORITY-QUEUE
match dscp cs5
match dscp cs4
class-map match-any system-cpp-police-sys-data
description Openflow, Exception, EGR Exception, NFL Sampled Data, RPF Failed
class-map match-any system-cpp-police-punt-webauth
description Punt Webauth
class-map match-any BULK-SCAVENGER-DATA-QUEUE
match dscp af11
match dscp af12
match dscp af13
match dscp cs1
class-map match-any system-cpp-police-l2lvx-control
description L2 LVX control packets
class-map match-any system-cpp-police-forus
description Forus Address resolution and Forus traffic
class-map match-any system-cpp-police-multicast-end-station
description MCAST END STATION
class-map match-any system-cpp-police-high-rate-app
description High Rate Applications
class-map match-any system-cpp-police-multicast
description MCAST Data
class-map match-any system-cpp-police-l2-control
description L2 control
class-map match-any system-cpp-police-dot1x-auth
description DOT1X Auth
class-map match-any system-cpp-police-data
description ICMP redirect, ICMP_GEN and BROADCAST
class-map match-any MULTIMEDIA-CONFERENCING-QUEUE
match dscp af41
match dscp af42
match dscp af43
class-map match-any system-cpp-police-stackwise-virt-control
description Stackwise Virtual OOB
class-map match-any non-client-nrt-class
class-map match-any system-cpp-police-routing-control
description Routing control and Low Latency
class-map match-any system-cpp-police-protocol-snooping
description Protocol snooping
class-map match-any system-cpp-police-dhcp-snooping
description DHCP snooping
class-map match-any PRIORITY-QUEUE
match dscp ef
class-map match-any system-cpp-police-ios-routing
description L2 control, Topology control, Routing control, Low Latency
class-map match-any system-cpp-police-system-critical
description System Critical and Gold Pkt
class-map match-any system-cpp-police-ios-feature
description ICMPGEN,BROADCAST,ICMP,L2LVXCntrl,ProtoSnoop,PuntWebauth,MCASTData,Transit,DOT1XAuth,Swfwd,LOGGING,L2LVXData,ForusTraffic,ForusARP,McastEndStn,Openflow,Exception,EGRExcption,NflSampled,RpfFailed
!
policy-map 2P6Q3T
class PRIORITY-QUEUE
priority level 1
police rate percent 10
class VIDEO-PRIORITY-QUEUE
priority level 2
police rate percent 20
class CONTROL-MGMT-QUEUE
bandwidth remaining percent 10
queue-buffers ratio 10
class MULTIMEDIA-CONFERENCING-QUEUE
bandwidth remaining percent 10
queue-buffers ratio 10
queue-limit dscp af43 percent 80
queue-limit dscp af42 percent 90
queue-limit dscp af41 percent 100
class MULTIMEDIA-STREAMING-QUEUE
bandwidth remaining percent 10
queue-buffers ratio 10
queue-limit dscp af33 percent 80
queue-limit dscp af32 percent 90
queue-limit dscp af31 percent 100
class TRANSACTIONAL-DATA-QUEUE
bandwidth remaining percent 10
queue-buffers ratio 10
queue-limit dscp af23 percent 80
queue-limit dscp af22 percent 90
queue-limit dscp af21 percent 100
class BULK-SCAVENGER-DATA-QUEUE
bandwidth remaining percent 5
queue-buffers ratio 10
queue-limit dscp values cs1 af13 percent 80
queue-limit dscp values af12 percent 90
queue-limit dscp values af11 percent 100
class class-default
bandwidth remaining percent 25
queue-buffers ratio 25
policy-map system-cpp-policy
!
!
!
!
!
!
!
!
!
!
!
!
!
!
!
interface GigabitEthernet0/0
vrf forwarding Mgmt-vrf
ip address 192.168.10.20 255.255.255.0
!
interface GigabitEthernet1/0/1
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/2
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/3
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/4
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/5
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/6
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/7
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/8
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/9
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/10
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/11
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/12
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/13
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/14
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/15
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/16
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/17
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/18
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/19
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/20
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/21
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/22
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/23
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/24
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/25
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/26
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/27
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/28
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/29
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/30
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/31
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/32
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/33
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/34
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/35
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/36
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/37
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/38
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/39
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/40
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/41
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/42
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/43
description Laundry Room Wireless Access Point
switchport trunk native vlan 10
switchport trunk allowed vlan 10,40,50,60,70,80,100
switchport mode trunk
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast disable
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/44
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/45
description Hallway Wireless Access Point
switchport trunk native vlan 10
switchport trunk allowed vlan 10,40,50,60,70,80,100
switchport mode trunk
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast disable
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/46
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/47
description Management Interface
switchport access vlan 10
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/0/48
switchport access vlan 40
switchport mode access
switchport port-security maximum 11
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
switchport port-security
ip arp inspection limit rate 100
ipv6 nd raguard attach-policy HOST_POLICY
spanning-tree portfast
ip verify source
ip dhcp snooping limit rate 100
!
interface GigabitEthernet1/1/1
description Link to Edge Router
switchport access vlan 250
switchport trunk native vlan 8
switchport mode access
ip arp inspection trust
logging event trunk-status
load-interval 30
spanning-tree portfast disable
ip dhcp snooping trust
!
interface GigabitEthernet1/1/2
switchport trunk allowed vlan 40,60
switchport mode trunk
ip arp inspection trust
logging event trunk-status
load-interval 30
ip dhcp snooping trust
!
interface GigabitEthernet1/1/3
switchport trunk allowed vlan 40,60
switchport mode trunk
ip arp inspection trust
logging event trunk-status
load-interval 30
ip dhcp snooping trust
!
interface GigabitEthernet1/1/4
switchport trunk allowed vlan 40,60
switchport mode trunk
ip arp inspection trust
logging event trunk-status
load-interval 30
ip dhcp snooping trust
!
interface Vlan1
no ip address
shutdown
!
interface Vlan8
description Native
ip address 192.168.8.1 255.255.255.0
!
interface Vlan9
description Blackhole
ip address 192.168.9.1 255.255.255.0
!
interface Vlan10
description Management
ip address 192.168.10.20 255.255.255.0
!
interface Vlan40
description Users
ip address 192.168.40.1 255.255.254.0
!
interface Vlan50
description Guests
ip address 192.168.50.1 255.255.255.0
!
interface Vlan60
description Voice
ip address 192.168.60.1 255.255.255.0
!
interface Vlan70
description Security
ip address 192.168.70.1 255.255.255.0
!
interface Vlan80
description Video
ip address 192.168.80.1 255.255.255.0
!
interface Vlan100
description Audio
ip address 192.168.100.1 255.255.255.0
!
interface Vlan250
description WAN
ip address 192.168.250.1 255.255.255.0
!
router ospf 1
!
ip default-gateway 192.168.250.10
ip forward-protocol nd
ip http server
ip http authentication local
ip http secure-server
ip route 0.0.0.0 0.0.0.0 192.168.250.10
ip ssh time-out 60
ip ssh version 2
ip scp server enable
!
!
!
!
!
!
!
control-plane
service-policy input system-cpp-policy
!
banner login ^CNetwork Switch^C
!
line con 0
exec-timeout 0 0
stopbits 1
line aux 0
line vty 0 4
login local
length 0
transport input telnet
transport output telnet
line vty 5 15
login local
length 0
transport input telnet
transport output telnet
!
call-home
! If contact email address in call-home is configured as sch-smart-licensing@cisco.com
! the email address configured in Cisco Smart License Portal will be used as contact email address to send SCH notifications.
contact-email-addr sch-smart-licensing@cisco.com
profile "CiscoTAC-1"
active
destination transport-method http
!
!
!
!
!
!
end
12-07-2023 05:54 AM
OK one thing to note after reconfiguration, The primary access point seems to work just fine. I’m able to connect to it every time when I’m right beside it. If I walk over to the other access point, so that I connect to it, it spins and spins and spins, and never gets an IP address. Then I walked back to the primary access point, and I connect right away. Maybe that’s a clue.
12-07-2023 02:49 PM
Can you do a "show ap name Laundry_Room tag detail" and "show ap name Hallway tag detail" just to see all of the tag config on the APs.
At a glance I don't see any obvious issue.
I'm surprised you've disabled spanning-tree portfast on the AP switch ports - you're sure there's no vlan blocking happening there? We use:
spanning-tree portfast trunk
spanning-tree portfast edge trunk
spanning-tree bpdufilter enable
spanning-tree bpduguard disable
12-07-2023 06:02 PM
Let me check those. I just rebooted the switch and the access points powered up differently so that the hallway became the active ewc this time. Now devices will connect it just fine and not the other access point. It seems like even though both access points are broadcasting, only the active one works.
12-07-2023 06:54 PM
Thu Dec 07 2023 20:51:35 GMT-0600 (Central Standard Time)
===================================================================================
#show ap name Laundry_Room tag detail
AP Name : Laundry_Room
AP Mac : a49b.cd2a.47e4
Tag Type Tag Name
-----------------------------
Policy Tag lewis-home-policy-tag
RF Tag lewis-home-rf-tag
Site Tag default-site-tag
Policy tag mapping
------------------
WLAN Profile Name Policy Name VLAN Flex Central Switching IPv4 ACL IPv6 ACL
-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Lewis Home Guest guest-policy-profule NA DISABLED Not Configured Not Configured
Lewis Home Wireless user-policy-profile NA DISABLED Not Configured Not Configured
Site tag mapping
----------------
Flex Profile : lewis-home-flex-profile
AP Profile : lewis-home-ap-profile
Local-site : No
RF tag mapping
--------------
5ghz RF Policy : Global Config
2.4ghz RF Policy : Global Config
Thu Dec 07 2023 20:52:24 GMT-0600 (Central Standard Time)
===================================================================================
#show ap name Hallway tag detail
AP Name : Hallway
AP Mac : a49b.cd2a.59fc
Tag Type Tag Name
-----------------------------
Policy Tag lewis-home-policy-tag
RF Tag lewis-home-rf-tag
Site Tag default-site-tag
Policy tag mapping
------------------
WLAN Profile Name Policy Name VLAN Flex Central Switching IPv4 ACL IPv6 ACL
-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Lewis Home Guest guest-policy-profule NA DISABLED Not Configured Not Configured
Lewis Home Wireless user-policy-profile NA DISABLED Not Configured Not Configured
Site tag mapping
----------------
Flex Profile : lewis-home-flex-profile
AP Profile : lewis-home-ap-profile
Local-site : No
RF tag mapping
--------------
5ghz RF Policy : Global Config
2.4ghz RF Policy : Global Config
12-07-2023 11:48 PM
- Validate the tag configuration using the following command: # wireless config validate
M.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide