Sunday 8 November 2015

Cisco wireless LAN controller WLC ROAM configuration

CISCO WIRELESS LAN CONTROLLER ROAMING
CONFIGURATION
Objective;
  1. 1.     Create a COMMON WLAN on both the
    controllers
  2. 2.     Configure the same mobility group on
    both controllers
  3. 3.    
    Confirm Virtual interface is the same
    on both controllers
  4. 4.    
    Configure each controller as the same
    mobility group member          
  5. 5.    
    Verify Laptop connection to AP 1
  6. 6.    
    Disable AP 1
  7. 7.    
    Verify Laptop connection to AP 2




























Thursday 29 October 2015

How to convert Cisco access point from autonomous mode to lwapp



HOW TO
CHANGE CISCO AP FROM AUTONOMOUS TO LWAPP

1.  
Download
the IOS
2.  
Connect
PC LAN interface and Access Point LAN interface
3.  
Check connectivity
between PC and Access point
4.  
Start
TFTP server and ensure folder is correct
5.  
Type the
command;
archive
download-sw /force-reload tftp://192.168.0.42/c1130-k9w8-tar.124-25e.JAP4.tar


Wait
for IOS to upload and extract




Tuesday 27 October 2015

How to configure standalone Cisco access point from GUI and configure WPA2 authentication


CONFIGURE CISCO STANDALONE  AP FROM THE GUI



Network Diagram











1.  Assign static IP address to AP
2.  Create SSID name of WLAN1
3.  Broadcast the SSID
4.  NO security
5.  Enable wireless interfaces
6.  Check connectivity
7.  Configure AP with a WPA2 PSK authentication



Monday 26 October 2015

CISCO AIR WIRELESS LAN CONTROLLER CONFIGURATION LAB part 1

CISCO WIRELESS LAN CONTROLLER CONFIGURATION

Objective;
1.    Configure a cisco WLC using CLI setup wizard   
2.    Connect to the Controller using Web interface
3.    Allow telnet connections to the controller
4.    Create a WLAN with open authentication
5.    Create a DHCP scope to support local clients
6.    Verify AP
7.    Connect to new WLAN

1. Management interface 10.1.1.100/24 AP uses this interface to discover
controller
2. AP Manager interface 10.1.1.101/24 Used for L3 comms to all AP- now gone
3. Service port interface Used for OOB management 192.168.0.200/24


887 Router configuration
Interface
fastEthernet 3
Description
trunk link to 2960switch1
Switchport
mode trunk
!
Interface
fastEthernet 0
Description
access link to internet
Switchport
mode access
Switchport
access vlan 1
!
Interface
vlan 1
Description
VLAN 1 SVI to internet
Ip
address 192.168.0.202 255.255.255.0
Ip nat
outside
!
Interface
vlan 10
Description
default gateway for WLAN10
Ip
address 10.1.1.1 255.255.255.0
Ip nat
inside
!
Interface
vlan 20
Description
default gateway for WLAN20
Ip
address 20.1.1.1 255.255.255.0
Ip nat
inside
!
Ip nat
inside source list 1 interface vlan1 overload
!
access-list
1 permit 10.0.0.0 0.255.255.255
access-list
1 permit 20.0.0.0 0.255.255.255
Ip
route 0.0.0.0 0.0.0.0 vlan1 192.168.0.1
!

2960 Switch Configuration

vlan
10
 name WLAN10
!
vlan
20
 name WLAN20
!
interface
FastEthernet0/1
Description
link to router fastEthernet3
 switchport mode trunk
!
interface
FastEthernet0/2
description
link to wireless AP1
 switchport access vlan 10
!
interface
GigabitEthernet0/1
description
link to WLC1
 switchport mode trunk
!
interface
vlan 1
description
OOB management of switch
ip
address 192.168.0.201 255.255.255.0
!
ip
default-gateway 192.168.0.1


CONTROLLER CONFIG

Controller Management interface IP

10.1.1.100/24

AP manager interface

10.1.1.101/24

Service port for OOB

192.168.0.200/24

2960 switch  OOB

192.168.0.201/24

887 Router  OOB

192.168.0.202/24

887 VLAN 10 IP

10.1.1.1/24

887 VLAN 20 IP

20.1.1.1/24

WLAN10

SSID

WLAN20

SSID

Controller DHCP scope VLAN 10

10.1.1.10 – 10.1.1.20

Controller DHCP scope for VLAN 20

20.1.1.10 – 20.1.1.20

System Name [Cisco_8a:6c:23] (31characters max): WLC1
Enter Administrative User Name (24characters max): admin
Enter Administrative Password (3 to 24 characters): Cisco12345
Re-enter Administrative Password: Cisco12345
Service Interface IP Address
Configuration [static][DHCP]: static
Service Interface IP Address Configuration: 192.168.0.200
Service Interface netmask: 255.255.255.0
Enable Link Aggregation (LAG) [yes][NO]: NO
Management Interface IP Address: 10.1.1.100
Management Interface Netmask: 255.255.255.0
Management Interface Default Router: 192.168.0.1
Management Interface VLAN Identifier (0 = untagged): 10
Management Interface Port Num [1 to 2]: 1
Management Interface DHCP Server IP Address: 10.1.1.100
AP Manager Interface IP Address: 10.1.1.101
AP-Manager is on Management subnet, using same values
AP Manager Interface DHCP Server (10.1.1.100):
Virtual Gateway IP Address: 1.1.1.1
Mobility/RF Group Name: RGGROUP1
Network Name (SSID): WLAN10
Configure DHCP Bridging Mode [yes][NO]: NO
Allow Static IP Addresses [YES][no]: YES
Configure a RADIUS Server now? [YES][no]: NO
Warning! The default WLAN security policy requires a RADIUS server.
Please see documentation for more details.
Enter Country Code list (enter 'help'
for a list of countries) [US]: GB
Enable 802.11b Network [YES][no]: YES
Enable 802.11a Network [YES][no]: YES
Enable 802.11g Network [YES][no]: YES
Enable Auto-RF [YES][no]: YES
Configure a NTP server now? [YES][no]: YES
Enter the NTP server's IP address: 10.1.1.1
Enter a polling interval between 3600 and 604800 secs: 3600


Wednesday 21 October 2015

Cisco 1240 1130 1140 AP LWAPP to Autonomous mode conversion

 HOW TO CHANGE CISCO AP FROM LWAPP TO AUTONOMOUS

1.  Download the IOS
2.  Make sure on File options change view settings to hide extensions for known               file types.
3.  Rename the file .default example ;

For 1240 AP;   c1240-k9w7-tar.default
For 1130 AP;   c1130-k9w7-tar.default

4.  Connect PC LAN interface to Access Point LAN interface
5.  Change PC IP address to 10.0.0.2 or above
6.  Start TFTP server and ensure folder is correct
7.  Boot up the AP and hold the mode button for 30 seconds
8.  Ensure message on console says waiting for mode to be released
9.  That’s it! Wait for IOS to upload and extract




Monday 19 October 2015

HOW TO INSTALL CISCO ASDM ON GNS3 ASA

HOW TO INSTALL CISCO
ASDM ON GNS3 ASA
1.  
Download ASDM file  asdm-649-103.bin
2.  
Basic configuration of ASA
interface GigabitEthernet0
 nameif outside
 security-level 0
 ip address 192.168.0.100 255.255.255.0
!
http server enable
http 192.168.0.101 255.255.255.255
outside
aaa authentication http console LOCAL
!
username admin password cisco
privilege 15
3.  
Install TFTP Server on PC
4.  
Make sure you have Java
5.  
Turn off windows firewall
6.  
TFTP ASDM file to ASA
7.  
https to the ASA
8.  
Download ASDM to PC


9.  
RUN ASDM














Friday 9 October 2015

GNS3 1.3.10 Server error [-3200] from 127.0.0.1:8000: SW1: unable to create generic ...

I upgraded from windows 8.1 to windows 10 upgrade and upgraded GNS3 from 1.3.1 to 1.3.10. 
After the upgrade none of my virtual box machines would connect to GNS3
I solved it by connecting each  virtual box machine via  GNS3 Virtual box;

1. From GNS3 edit then preferences
2. under virtual box VM click virtual box VMs
3. click new
4. choose the VM you want to connect to
5. check the network settings are correct and make sure it selects the correct network interface
6. click apply and o.k.
7. go back to main GNS3 under host you should have the VM machine you want to connect to
8. drag it into the network
9. got to virtual box settings and make change the VM network setting to not attached and make sure cable connected on the advance settings
10. start the host under gns3 (make sure you do not start the VM yourself)
11. GNS3 will now start the VM for you
12. ALL SHOULD WORK!