Profile Overrides - Advanced Miscellaneous

To define or override the access point profile's miscellaneous settings:

  1. Select the Advanced → Miscellaneous menu item.

    The miscellaneous settings configuration screen displays.

    Click to expand in new window
    Profile Overrides - Advanced - Miscellaneous Configuration Screen
  2. In the Device RADIUS Authentication Parameters field,
    1. Set a NAS-Identifier Attribute up to 253 characters in length.

      This is the RADIUS NAS-Identifier attribute that typically identifies where a RADIUS message originates.

    1. Set a NAS-Port-Id Attribute up to 253 characters in length.

      This is the RADIUS NAS port ID attribute which identifies the device port where a RADIUS message originates.

  3. In the LEDs (Light Emitting Diodes) field, select one of the following Turn on LEDsoption: to enable the LEDs on an access point.
    • Off (0) - select to disable LEDs on the access point.

    • On (1) - select to enable LEDs on an access point.



      This is the default setting.

    • Flash Pattern (2) - to enable the access point to blink in a manner different from its operational LED behavior.



      Enabling this option allows an administrator to validate that the access point has received its configuration from its managing controller during staging. In the staging process, the administrator adopts the access point to a staging controller to get an initial configuration before the access point is deployed at its intended location. Once the access point has received its initial configuration, its LED blinks in a unique pattern to indicate the initial configuration is complete.

  4. In the MeshConnex field, use the Root Path Monitor Interval option to configure the interval (from 1 - 65,535 seconds) to monitor the path to the root node. This value specifies how often to check if the mesh point is up or down.
  5. In the RADIUS Dynamic Authorization section, set the Additional Port value to enable a Cisco (Identity Services Engine) AAA (Authentication, Authorization and Accounting) server to dynamically authenticate a client.

    Set this value to 1700. The allowed port range is 1 to 65,535.

    When a client device requests access to the network, the Cisco ISE RADIUS server presents the client with a URL where a device‘s compliance is checked for definition file validity (this form of file validity checking is called posture). The check verifies, for example, that the device's anti-virus or anti-spyware software is valid. If the device complies, it is allowed access to the network.

  6. Click OK to save the changes made to the profile's advanced miscellaneous configuration.

    Click Reset to revert to the last saved configuration.