![Note](images/note.png)
Note
You must configure the Appliance Platform before configuring Infrastructure
Management.
For this example, a CISCO device and a static IP address are used.
-
This is critical for Cisco AP ADSP Management. Validate supported firmware:
Cisco 1230 Thick AP 12.3.8-JEC2(ED) or Cisco 1130 Thick AP 12.4-10b(JDA).
-
Collect all the passwords on the device to be managed. For example, for a
Cisco device, you need the enable password and a login.
-
Enable SSH/Telnet if it is not enabled on the Cisco device.
-
Make sure that Cisco devices have at least a RSA modulus of 768 bits or higher
or your server will not talk to it via SSH.
-
Make sure that you have a supported TFTP or FTP server set up so that both the
ADSP and the managed device can reach it. ADSP recommends FTP:IIS Win2k and TFTP
3C Daemon. Both methods have to allow for overwriting the configuration file
because when a configuration is changed, the server creates a new file with the
same name and will again push it to the relay server.
-
Enable SNMP on the device and verify that you can execute snmpwalk from the
server. You will need the IP address and community string for the device. To
verify SNMP connectivity, from the server, run the following command against
your target device: snmpwalk -v2c -c <community string> <IP Addr>.
-
Add a CLI profile using the default Cisco Autonomous 12x0/11x0 device type (or
other device type) as a template.
- Go to .
- Select Cisco Autonomous 12x01/11x0 from the
CLI Configuration drop-down menu.
- Click the New Profile button.
- Enter a name for your profile.
- Update the CLI commands, if necessary.
- Click OK. Your newly created profile should now
be available in the list of profiles.
- Select a floor for the device.
![Note](images/note.png)
Note
The floor should already exist. If
it does not, use tree setup to create it (Configuration > Appliance
Platform > Tree Setup).
- Select Override settings.
- Select your newly created profile by clicking its radio button.
![Note](images/note.png)
Note
If your profile is the only available profile, it will be
selected automatically.
- Click Apply.
Since the profile is incomplete right now, the system will not apply it. Only
complete profiles are delivered to the device. So, in this example, the full
set of profiles will not be applied until the very last step. When Device
Access and Communication Settings are configured and have a valid relay
server set up and running, the profile will be applied. The
device-mgmt.log file in
/usr/local/smx/log can be used to verify what is
going on.
-
Create a Channels profile and apply it to the floor the device is placed as
follows:
- Go to .
- Select the floor.
- Select Override settings.
- Select the proper settings.
- Click Apply.
-
Configure Device Access as follows:
- Go to
- Select the floor.
- Select Override settings.
- Enter the enable password for Cisco (Cisco).
- Enter the User ID (Cisco) and Password (Cisco).
- Go to the Interfaces tab.
- Enable SSH.
- Enable SNMP and enter passwords for the Read/Write community. Then,
enter password for a Trap Destination including your server IP address.
![Note](images/note.png)
Note
You must also add the Trap Community and destination to get
traps on your server. This can be done from the server CLI: .
- Click Apply.
-
Ensure that the device firmware is current. (). If firmware is not current, update it.
-
Create a Radio Settings configuration for the device and apply it to the floor
the device is placed. You must include some data rates.
- Go to
- Select the floor.
- Select Override settings.
- Select the proper settings.
- Click Apply.
-
Configure RF-Domain and apply to by selecting the scope where the floor is
placed on as follows:
- Go to
- Select the floor.
- Select Override settings.
- Enter RF-Domain information.
- Click Apply.
-
Create WLAN profile and apply it by associating the profile with the location
that contains the managed device.
- Go to .
- Click New Profile.
- Enter information for the WLAN Profile in the
General and Security
tabs.
- Click OK.
- Ensure that the appliance is selected in the network tree and select
Enable configuration.
- Select the floor.
- Select Override settings.
- Select the WLAN Profile.
- Click Apply.
The profile is now complete but ADSP cannot communicate with the Cisco
device.
-
If you have not already done so during the Appliance Platform configuration,
import the device into your network using SNMP discovery using a single IP
address. This can be done with .
![Note](images/note.png)
Note
Select SNMP discovery with a target folder of a floor created in the
Appliance Platform configuration. You can use the Device Import Rules or
manually select the floor.
-
Set automatic status polling and automatic data collection for 3 minutes, and
turn on automatic configuration correction ().
-
If necessary, configure the Communication Settings so what ADSP can
communicate with the device. HTTP is only used for Airwave and WLSE devices so
this is not needed for Cisco devices. On the General tab,
enable data collection and enable configuration. For
SNMP, set version to v2c with proper read/write community
information. Under Console tab, add the same user you
have for device access and enable password information so that ADSP can talk to
the CISCO device. Now ADSP can communicate with the CISCO device.
- Go to .
- Select the floor.
- Select Override settings.
- Enter SNMP information.
- Enter Console information.
- Click Apply.
-
Verify that changes made to your applicable profiles are now being pushed out
to the Cisco device. The relay server should have a copy of the rendered profile
and it should match what is on the Cisco device.
- A simple test to verify changes are being pushed to the is to change the
WLAN profile that is applied to the AP. This change will be immediately
pushed if everything is working.
- A console connection can be used to watch the profile being pushed to
the AP.
- Checking the relay server ftp/tftp root directory will allow you to look
at the configuration that is rendered and pushed to the device.
- Looking at /usr/local/smx/log/device-mgmt.log, you can watch as the
server configures the device.
- Alarms will be present if the configuration is incomplete.
- Alarms will be present if the Relay server cannot be reached.
Changes are pushed immediately to the device in the following
circumstances:
- The device is managed already and something in its profile changes.
- The device is moved to another location that is configured.
Changes are NOT pushed when a device is discovered; this will happen during
polling.