Cisco Rogue Management in a Unified Wireless Network

Great explanation of Rogue Management – especially interesting with the differences in controller models and and Local Mode vs Monitor Mode.

WLC 6.0.199.4 is back on CCO

Get it before it gets pulled again! 🙂
Release notes are at:
http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn6_0_199_4.html

And it does indeed include as a resolved caveat:

CSCti21621      Switch CAM table is not updated after L2 roam.

Cisco’s playing games

6.0.199.4 has been pulled from CCO but the release notes from 6.0.199.0 are back up as ‘new’.

WLC Code 6.0.199.4 is on CCO!

Release notes can be found at:
http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn6_0_199.html

This of course is the rev that we expect fixes that nasty L2 roam issue. Standard code qualification caveats strongly recommended. 🙂
  -Sam

Why do you configure a controller that way?

So, I was digging on the WLC Config Analyzer (a great tool by itself!) at:
https://supportforums.cisco.com/docs/DOC-1373

And I stumbled across the list of checks that it does and (more importantly) how it determines that it’s values are ‘preferred’. If you goto:
https://supportforums.cisco.com/docs/DOC-1176
And scroll down you’ll see the list of the Config Analyzer errors and why it thinks those errors are pertinent (including links to supporting documentation!). If you ever wanted a good solid list of supporting documentation for configuration options, this is the best I’ve seen!

Cisco WLC captured web auth character limitations

Nice to know:

Step 5 If you want the user to be directed to a particular URL (such as the URL for your company) after login,
enter the desired URL (such as http://www.AcompanyBC.com) in the Redirect URL After Login field. You
can enter up to 254 characters.
Note The controller supports web authentication redirects only to HTTP (HTTP over TCP) servers. It
does not support web authentication redirects to HTTPS (HTTP over SSL) servers.
Step 6 If you want to create your own headline on the login page, enter the desired text in the Headline field.
You can enter up to 127 characters. The default headline is “Welcome to the Cisco wireless network.”
Step 7 If you want to create your own message on the login page, enter the desired text in the Message field.
You can enter up to 2047 characters. The default message is “Cisco is pleased to provide the Wireless
LAN infrastructure for your network. Please login and put your air space to work.”

Of course you can use a web-auth bundle to overcome this limitation but you should keep it in mind if you’re using the built in captured web portal.

Cisco has pulled the release notes for WLC version 6.0.199.0

http://www.cisco.com/en/US/products/ps6366/prod_release_notes_list.html

Coincidence? Could this be due to the Vocera bug or just an oversight by a webmaster? The code is still available for download and it’s still listed on the AssureWave site (hah!) – just no release notes…

SQL Injection Vulnerability in Cisco WCS

Cisco Wireless Control System (WCS) contains a SQL injection vulnerability that could allow an authenticated attacker full access to the vulnerable device, including modification of system configuration; create, modify and delete users; or modify the configuration of wireless devices managed by WCS.

This has been fixed in version 6.0.196.0.
More details at:
http://www.cisco.com/en/US/products/products_security_advisory09186a0080b4091e.shtml

Planning your CleanAir refresh?

Read these and discuss it with your AM to make sure you’re getting the best price you can!

http://www.cisco.com/en/US/prod/collateral/wireless/ps5678/ps10981/product_bulletin_c25-605628.pdf

http://www.cisco.com/en/US/prod/collateral/wireless/ps5678/ps6108/eol_c51-506614.pdf