Iuwne10 S05 L06

31
© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-1 Cisco WCS Administration Monitoring the Network with Cisco WCS

Transcript of Iuwne10 S05 L06

Page 1: Iuwne10 S05 L06

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-1

Cisco WCS Administration

Monitoring the Network with Cisco WCS

Page 2: Iuwne10 S05 L06

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-2

Initial Screen—Home

Page 3: Iuwne10 S05 L06

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-3

Home > Edit Tabs

Page 4: Iuwne10 S05 L06

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-4

Home > Edit Content

Page 5: Iuwne10 S05 L06

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-5

Home > Personalized Tab

Page 6: Iuwne10 S05 L06

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-6

The Monitor Menu

Page 7: Iuwne10 S05 L06

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-7

The Alarm Dashboard

Refreshes every 15 seconds Four levels:

– Clear = no alarm

– Yellow = minor alarm

– Orange = major alarm

– Red = critical alarm

Page 8: Iuwne10 S05 L06

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-8

Monitor > Controllers

Page 9: Iuwne10 S05 L06

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-10

Monitor > Access Points

Page 10: Iuwne10 S05 L06

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-12

Monitor > Clients

Page 11: Iuwne10 S05 L06

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-14

Associated Clients (vs. Time)

Page 12: Iuwne10 S05 L06

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-15

Monitor > Clients > Troubleshoot

Page 13: Iuwne10 S05 L06

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-16

Monitor > Security

Page 14: Iuwne10 S05 L06

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-18

Monitor > Security—Rogues

Page 15: Iuwne10 S05 L06

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-19

Monitor > Security—Miscellaneous

Page 16: Iuwne10 S05 L06

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-20

Monitor > Alarms

Page 17: Iuwne10 S05 L06

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-21

Monitor > Events

Page 18: Iuwne10 S05 L06

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-22

Cisco WCS Location

Ability to locate any 802.11 active device

Accuracy:

– 90% to within 10 meters, 50% to within 5 meters

– Depends on environment characteristics and calibration

On demand, one device with Cisco WCS alone

Up to 2500 devices with Cisco Location Appliance

– 30-day history (configurable)

Can identify and locate non-802.11 interference with Spectrum Intelligence sensor

Page 19: Iuwne10 S05 L06

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-23

Location Tracking Methods

RF Closest AP Pro: Simple, with no new technology requirement

Con: Limited accuracy, since an AP can easily cover several thousand square feet

RF Triangulation Pro: More accurate than a single RF RSSI

Con: Limited accuracy; does not account for effects of building material which may cause reflection, attenuation or multipath

RF Fingerprinting Pro: GPS-like accuracy

Con: More comprehensive (requires RF prediction tools)

Page 20: Iuwne10 S05 L06

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-24

Location Tracking Using Closest AP

John Bartenhagen
Q2Dev: In all instances, "dbm" should be "dBm".In bottom right blue box, there should be a comma after "iso-dbm". -EDIT.
Page 21: Iuwne10 S05 L06

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-25

Location Tracking Using Triangulation

John Bartenhagen
Q2Dev: In all instances, "dbm" should be "dBm". -EDIT.
Page 22: Iuwne10 S05 L06

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-26

Location Tracking Using RF Fingerprinting

RF fingerprinting traces signal strength for every signal heard by a Cisco AP in the network, which allows accounting for reflection and multipath.

Then a RF fingerprint is created from every point on the coverage map, which allows Cisco WCS to accurately place an icon and create a probability color grid.

Page 23: Iuwne10 S05 L06

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-27

Cisco WCS Location Without Appliance

Page 24: Iuwne10 S05 L06

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-28

Cisco WCS Location with Appliance

Cisco WCS with Location and Location Appliance accuracy 90% to within 10 meters, and 50% to within 5 meters

Page 25: Iuwne10 S05 L06

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-29

Searching for a Device

Page 26: Iuwne10 S05 L06

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-30

Search > Clients

Page 27: Iuwne10 S05 L06

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-31

Search > Clients (Cont.)

Page 28: Iuwne10 S05 L06

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-32

Recent/Present Map

Page 29: Iuwne10 S05 L06

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-33

Summary

The home page for each user consists of tabs that can be personalized.

Cisco WCS also has a Monitor menu, where each type of device can be verified.

An alarm dashboard can give an alert in case of an unusual event.

Controllers can be monitored and managed.

APs can be verified individually or through a network summary.

Detailed information about clients can be displayed.

Page 30: Iuwne10 S05 L06

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-34

Summary (Cont.)

Each security-related event can be checked before you take further action.

Cisco WCS has a summary page where alarms are grouped and displayed, even when the alarm-triggering event is not in the network anymore.

All events can be accessed and assigned to different administrative users, depending on their nature.

Cisco WCS has a location capability to identify the position on a map of any wireless device.

Page 31: Iuwne10 S05 L06

© 2008 Cisco Systems, Inc. All rights reserved. IUWNE v1.0—5-35