Solved

How can I monitor a CISCO AIR CAP3501 ?

Posted on 2014-09-23
7
508 Views
Last Modified: 2014-10-06
I have a CISCO 5508 Wireless controller and I have attached some  Accesspoints CISCO 3501 , and I have noticed that in the  Wireless area scope  sometimes the time response is too slow,, and I think the problem is that someone in the wireless network is saturating it. I have the Solarwinds Engineer toolset and I wonder if there is a specific tool to monitor the Accesspoint  in order to figure or discover who is saturating the network. I tried but I don't know where I configure in the AP  the  community parameter. Can somebody tell me which tool I must use ?  and where I configure the community string in the CISCO 3501  AP?
0
Comment
Question by:Apolo Victores
  • 4
  • 3
7 Comments
 
LVL 45

Accepted Solution

by:
Craig Beck earned 500 total points
Comment Utility
There is only one tool which will allow you to do this - Cisco's Prime Infrastructure.  The problem is that you can't monitor a CAPWAP AP with standard SNMP - it tunnels all control traffic to the WLC, so you have to interrogate it, not the AP.  Similarly, you don't enter SNMP details into the AP; you do that on the WLC also.
0
 

Author Comment

by:Apolo Victores
Comment Utility
Thank you! and also I would say that  Accesspoint AIRCAP device shares the bandwidth and it is not a switchable device.
0
 

Author Closing Comment

by:Apolo Victores
Comment Utility
Thank you so much!!  is there a training material  for this WLC operation?
0
Give your grad a cloud of their own!

With up to 8TB of storage, give your favorite graduate their own personal cloud to centralize all their photos, videos and music in one safe place. They can save, sync and share all their stuff, and automatic photo backup helps free up space on their smartphone and tablet.

 
LVL 45

Expert Comment

by:Craig Beck
Comment Utility
There is training material available for the WLC and Prime Infrastructure.
0
 

Author Comment

by:Apolo Victores
Comment Utility
Can you send me the link please?
0
 
LVL 45

Expert Comment

by:Craig Beck
Comment Utility
0
 

Author Comment

by:Apolo Victores
Comment Utility
Thank you so much!!
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

If your business is like most, chances are you still need to maintain a fax infrastructure for your staff. It’s hard to believe that a communication technology that was thriving in the mid-80s could still be an essential part of your team’s modern I…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now