Creating SSIDs and Mapping to VLANs on a Cisco WLC
A single physical wireless network routinely serves multiple user populations — corporate employees, contractors, guests, and IoT devices — each with different trust levels, bandwidth needs, and security requirements. Broadcasting one shared SSID for all of them puts every category of user on the same Layer 2 segment: a guest laptop on the same VLAN as the file server. The solution is SSID-to-VLAN mapping: each SSID is a separate logical network backed by its own VLAN and enforced by its own security policy. The Cisco WLC makes this straightforward — a WLAN object ties an SSID, a dynamic interface (VLAN), and a security policy together into a single configuration unit.
This lab creates three WLANs on an already-running WLC: a Corporate WLAN using WPA3-Personal for staff devices, a Guest WLAN using WPA2-Personal with client isolation, and an IoT WLAN using WPA2-Personal with bandwidth limiting. Each WLAN gets its own dynamic interface and VLAN, ensuring complete Layer 2 separation between user groups. The WLC is already set up and at least one AP is joined — if not, complete Configuring a WLC — Getting Started first. The underlying VLANs and trunk must already exist on the switch — see VLAN Creation and Management and Trunk Port Configuration. For the DHCP pools serving each WLAN's subnet, see DHCP Server Configuration.
1. WLAN, SSID, Dynamic Interface — How They Relate
The Three-Layer Mapping
On a Cisco WLC, the path from a wireless client to a wired VLAN involves three linked objects:
Wireless Client
│
│ connects to SSID: "NetsTuts-Corp"
▼
┌─────────────────────────────────────────────────────┐
│ WLAN (WLC object) │
│ Profile Name: Corp-WLAN WLAN ID: 1 │
│ SSID: NetsTuts-Corp │
│ Security: WPA3-Personal / SAE / AES │
│ Interface: corp-clients ◄── dynamic interface │
└─────────────────────────────────────────────────────┘
│
│ WLC tags traffic with VLAN 30
▼
┌─────────────────────────────────────────────────────┐
│ Dynamic Interface: corp-clients │
│ VLAN ID: 30 │
│ IP / Gateway: 192.168.30.1 / 255.255.255.0 │
│ DHCP Server: 192.168.10.200 │
└─────────────────────────────────────────────────────┘
│
│ 802.1Q tagged frame (VLAN 30) on WLC trunk
▼
Switch ──► VLAN 30 ──► DHCP pool 192.168.30.0/24
WLAN Object Key Fields
| Field | Location in GUI | Purpose |
|---|---|---|
| Profile Name | WLANs → WLAN → General | Internal WLC label for this WLAN — used in CLI commands and logging. Not broadcast to clients |
| SSID | WLANs → WLAN → General | The network name clients see and connect to. May differ from the Profile Name |
| WLAN ID | Auto-assigned (1–512) | Numeric ID used in WLC CLI commands: config wlan enable 1 |
| Interface | WLANs → WLAN → General | The dynamic interface (VLAN) client traffic is forwarded to. This is the SSID-to-VLAN link |
| Layer 2 Security | WLANs → WLAN → Security → Layer 2 | WPA2, WPA3, or WPA2+WPA3 with PSK or 802.1X authentication |
| Status | WLANs → WLAN → General | Enabled/Disabled — when disabled, the SSID is not broadcast and clients cannot connect |
WPA2 vs WPA3 — Security Protocol Comparison
Choosing the right security protocol is critical for any wireless deployment. For a full overview of wireless security concepts see Wi-Fi Security.
| Feature | WPA2 (802.11i) | WPA3 (Wi-Fi Alliance 2018) |
|---|---|---|
| Personal key exchange | PSK — 4-way handshake (vulnerable to offline dictionary attack if captured) | SAE (Simultaneous Authentication of Equals) — resistant to offline dictionary attacks, forward secrecy |
| Enterprise auth | 802.1X / EAP — RADIUS-based per-user credentials | 802.1X / EAP — same as WPA2 plus 192-bit security suite option (WPA3-Enterprise) |
| Encryption | AES-CCMP (128-bit) | AES-GCMP (128-bit Personal, 256-bit Enterprise) |
| Open network protection | None — open SSIDs are completely unencrypted | OWE (Opportunistic Wireless Encryption) — encrypts open networks without authentication |
| Management frame protection | Optional (PMF — 802.11w) | Mandatory — 802.11w always required |
| Client compatibility | Universal — all Wi-Fi devices since 2004 | Requires WPA3-capable client (most post-2019 devices) |
| Transition mode | — | WPA2+WPA3 mixed mode allows both client types on the same SSID |
2. Lab Topology & Design
Three WLANs are created on NetsTuts-WLC, each mapped to a separate VLAN and dynamic interface. The WLC connects to NetsTuts_SW1 via a trunk carrying all VLANs. A single AP (AP2802i, already joined) broadcasts all three SSIDs simultaneously:
NetsTuts-WLC (already running)
Management: 192.168.10.50 / VLAN 10
|
Trunk (VLANs 10,20,30,40,50)
|
NetsTuts_SW1
|
─────────────────────────────────
| |
Gi1/0/2 Gi1/0/3
AP2802i Admin PC
(broadcasts 3 SSIDs) 192.168.10.5
┌─────────────────────────────────────────────────────┐
│ WLAN 1: Corp-WLAN │
│ SSID: NetsTuts-Corp Security: WPA3+WPA2 / SAE │
│ Interface: corp-clients VLAN 30 192.168.30.0/24 │
├─────────────────────────────────────────────────────┤
│ WLAN 2: Guest-WLAN │
│ SSID: NetsTuts-Guest Security: WPA2 / PSK │
│ Interface: guest VLAN 40 192.168.40.0/24 │
│ Client Isolation: ON P2P Blocking: ON │
├─────────────────────────────────────────────────────┤
│ WLAN 3: IoT-WLAN │
│ SSID: NetsTuts-IoT Security: WPA2 / PSK │
│ Interface: iot-devices VLAN 50 192.168.50.0/24 │
│ Bandwidth: 1 Mbps down / 512 Kbps up │
└─────────────────────────────────────────────────────┘
| WLAN | SSID | VLAN | Subnet | Security | Special |
|---|---|---|---|---|---|
| Corp-WLAN | NetsTuts-Corp | 30 | 192.168.30.0/24 | WPA3+WPA2 / SAE / AES | 802.11w PMF mandatory |
| Guest-WLAN | NetsTuts-Guest | 40 | 192.168.40.0/24 | WPA2 / PSK / AES | Client isolation, P2P blocking |
| IoT-WLAN | NetsTuts-IoT | 50 | 192.168.50.0/24 | WPA2 / PSK / AES | Per-client bandwidth limit |
3. Step 1 — Add New VLANs to the Switch Trunk
VLANs 40 and 50 are new — they must be created on the switch and added to the WLC trunk before the dynamic interfaces are configured on the WLC. The WLC will reject or silently fail to tag traffic if the VLAN is not allowed on the trunk:
NetsTuts_SW1>en NetsTuts_SW1#conf t Enter configuration commands, one per line. End with CNTL/Z. ! ── Create the new VLANs ───────────────────────────────── NetsTuts_SW1(config)#vlan 40 NetsTuts_SW1(config-vlan)#name GUEST NetsTuts_SW1(config-vlan)#exit NetsTuts_SW1(config)#vlan 50 NetsTuts_SW1(config-vlan)#name IOT-DEVICES NetsTuts_SW1(config-vlan)#exit ! ── Add VLANs 40 and 50 to the WLC uplink trunk ────────── NetsTuts_SW1(config)#interface GigabitEthernet1/0/48 NetsTuts_SW1(config-if)#switchport trunk allowed vlan add 40,50 NetsTuts_SW1(config-if)#exit NetsTuts_SW1(config)#end NetsTuts_SW1#wr Building configuration... [OK] ! ── Verify trunk carries all required VLANs ───────────── NetsTuts_SW1#show interfaces GigabitEthernet1/0/48 trunk Port Mode Encapsulation Status Native vlan Gi1/0/48 on 802.1q trunking 1 Port Vlans allowed on trunk Gi1/0/48 10,20,30,40,50 Port Vlans allowed and active in management domain Gi1/0/48 10,20,30,40,50 Port Vlans in spanning tree forwarding state and not pruned Gi1/0/48 10,20,30,40,50
switchport trunk allowed vlan add appends the new
VLANs to the existing allowed list without removing VLANs already
permitted. Using switchport trunk allowed vlan 40,50
(without add) would replace the entire
allowed list with only VLANs 40 and 50 — a common mistake that
drops management connectivity immediately. Always use add
when extending an existing trunk. Verify with
show interfaces trunk that all five VLANs appear in
the "Vlans in spanning tree forwarding state" section — if a
VLAN appears in "allowed" but not in "forwarding," it may not be
active in the switch's VLAN database.
4. Step 2 — Create Dynamic Interfaces on the WLC
One dynamic interface per new VLAN is required. Navigate to CONTROLLER → Interfaces → [New] and create both interfaces before creating the WLANs that reference them:
── Interface 1: Guest VLAN ────────────────────────────── WLC GUI: CONTROLLER → Interfaces → [New] Interface Name: guest VLAN Identifier: 40 [Apply] IP Address: 192.168.40.1 Netmask: 255.255.255.0 Gateway: 192.168.40.1 Primary DHCP Server: 192.168.10.200 Physical Port: 1 VLAN ID: 40 [Apply] → [Save Configuration] ── Interface 2: IoT VLAN ──────────────────────────────── WLC GUI: CONTROLLER → Interfaces → [New] Interface Name: iot-devices VLAN Identifier: 50 [Apply] IP Address: 192.168.50.1 Netmask: 255.255.255.0 Gateway: 192.168.50.1 Primary DHCP Server: 192.168.10.200 Physical Port: 1 VLAN ID: 50 [Apply] → [Save Configuration]
Verify All Dynamic Interfaces (WLC CLI)
(NetsTuts-WLC) > show interface summary Number of Interfaces.......................... 5 Interface Name Port Vlan Id IP Address Type Ap Mgr ───────────────────────────────────────────────────────────────────── corp-clients 1 30 192.168.30.1 Dynamic No guest 1 40 192.168.40.1 Dynamic No iot-devices 1 50 192.168.50.1 Dynamic No management 1 10 192.168.10.50 Static Yes virtual N/A N/A 192.0.2.1 Static No
5. Step 3 — Create the Corporate WLAN (WPA3+WPA2)
Navigate to WLANs → Create New → [Go]. The Corporate WLAN uses WPA3-Personal (SAE) in transition mode with WPA2 fallback so both legacy and new clients can connect:
── General Tab ───────────────────────────────────────────
Type: WLAN
Profile Name: Corp-WLAN
SSID: NetsTuts-Corp
WLAN ID: 1
Status: Enabled ✓
Broadcast SSID: Enabled ✓
── Security / Layer 2 Tab ────────────────────────────────
Layer 2 Security: WPA+WPA2
WPA Policy: Disabled
WPA2 Policy: Enabled ✓
WPA2 Encryption: AES ✓
Auth Key Mgmt: SAE+PSK (transition mode — WPA3+WPA2)
PMF: Required (mandatory for WPA3 clients)
Optional for WPA2 clients in transition
PSK Format: ASCII
PSK: NetsTuts@Corp2026!
── QoS Tab ───────────────────────────────────────────────
Quality of Service: Platinum (Voice)
WMM Policy: Required
── Advanced Tab ──────────────────────────────────────────
Allow AAA Override: Disabled
P2P Blocking: Disabled
Client Exclusion: Enabled (Timeout: 60 sec)
Session Timeout: 1800 sec (30 min)
DHCP Server Override: Disabled
── General Tab → Interface ──────────────────────────────
Interface / Interface Group(G): corp-clients
[Apply] → [Save Configuration]
6. Step 4 — Create the Guest WLAN (WPA2 with Isolation)
The Guest WLAN uses WPA2-PSK with a simpler passphrase. Client isolation prevents guests from communicating directly with each other or discovering other wireless devices on the network. P2P blocking prevents peer-to-peer traffic between guest clients:
── General Tab ─────────────────────────────────────────── Type: WLAN Profile Name: Guest-WLAN SSID: NetsTuts-Guest WLAN ID: 2 Status: Enabled ✓ Broadcast SSID: Enabled ✓ ── Security / Layer 2 Tab ──────────────────────────────── Layer 2 Security: WPA+WPA2 WPA2 Policy: Enabled ✓ WPA2 Encryption: AES ✓ Auth Key Mgmt: PSK PMF: Optional PSK Format: ASCII PSK: GuestAccess@2026 ── Security / Layer 3 Tab ──────────────────────────────── Layer 3 Security: None (no web auth for this lab) Passthrough: Disabled ── Advanced Tab ────────────────────────────────────────── P2P Blocking: Drop ◄─── blocks client-to-client traffic Client Exclusion: Enabled (Timeout: 30 sec) Session Timeout: 3600 sec (1 hour — auto-disconnect guests) DHCP Server Override: Disabled Client Load Balancing: Enabled ── General Tab → Interface ────────────────────────────── Interface / Interface Group(G): guest [Apply] → [Save Configuration]
7. Step 5 — Create the IoT WLAN (WPA2 with Bandwidth Limiting)
IoT devices typically require only minimal bandwidth. Configuring per-client bandwidth contracts prevents any single IoT device from consuming excessive network resources. Rate limiting is configured through a Bandwidth Contract on the QoS tab:
── General Tab ───────────────────────────────────────────
Type: WLAN
Profile Name: IoT-WLAN
SSID: NetsTuts-IoT
WLAN ID: 3
Status: Enabled ✓
Broadcast SSID: Enabled ✓
── Security / Layer 2 Tab ────────────────────────────────
Layer 2 Security: WPA+WPA2
WPA2 Policy: Enabled ✓
WPA2 Encryption: AES ✓
Auth Key Mgmt: PSK
PMF: Optional
PSK Format: ASCII
PSK: IoTNetwork@2026
── QoS Tab ───────────────────────────────────────────────
Quality of Service: Bronze (Background)
WMM Policy: Allowed
Bandwidth Contract:
Per Client Bandwidth: Downstream: 1000 Kbps (1 Mbps)
Upstream: 512 Kbps
── Advanced Tab ──────────────────────────────────────────
P2P Blocking: Drop
Client Exclusion: Enabled (Timeout: 60 sec)
Session Timeout: 86400 sec (24 hours — IoT devices stay connected)
DHCP Addr. Assignment: Required (IoT devices must use DHCP — no static IPs)
DTIM Period: 3 (longer beacon interval saves IoT device battery)
── General Tab → Interface ──────────────────────────────
Interface / Interface Group(G): iot-devices
[Apply] → [Save Configuration]
8. Verification
show wlan summary (WLC CLI)
(NetsTuts-WLC) > show wlan summary Number of WLANs.................................. 3 WLAN ID WLAN Profile Name / SSID Status Interface Name PMF ─────── ───────────────────────────────────── ──────── ─────────────── ───── 1 Corp-WLAN / NetsTuts-Corp Enabled corp-clients Req 2 Guest-WLAN / NetsTuts-Guest Enabled guest Opt 3 IoT-WLAN / NetsTuts-IoT Enabled iot-devices Opt
show wlan 1 (WLC CLI — Corp WLAN Detail)
(NetsTuts-WLC) > show wlan 1
WLAN Identifier.................................. 1
Profile Name..................................... Corp-WLAN
Network Name (SSID).............................. NetsTuts-Corp
Status........................................... Enabled
MAC Filtering.................................... Disabled
Broadcast SSID................................... Enabled
AAA Policy Override.............................. Disabled
Number of Active Clients......................... 4
Exclusionlist Timeout............................ 60 seconds
Session Timeout.................................. 1800 seconds
WMM.............................................. Required
QoS.............................................. Platinum
Security
802.11 Authentication:......................... Open System
Static WEP Keys................................ Disabled
802.1X......................................... Disabled
Wi-Fi Protected Access (WPA/WPA2).............. Enabled
WPA (SSN IE)................................. Disabled
WPA2 (RSN IE)................................ Enabled
WPA2 Encryption:........................... AES
Auth Key Mgmt (AKM):
PSK...................................... Enabled
SAE...................................... Enabled
PMF........................................... Required
Interface........................................ corp-clients
WLAN ACL......................................... unconfigured
DHCP Server...................................... 192.168.10.200
show wlan [id] command provides the complete
security and interface configuration for a single WLAN. Key
confirming fields: SAE: Enabled and
PSK: Enabled confirms WPA3/WPA2 transition mode.
PMF: Required confirms WPA3 management frame
protection. Number of Active Clients: 4 confirms
corporate devices are connecting and being placed on the corp-clients
interface. Interface: corp-clients confirms the
VLAN 30 mapping. DHCP Server: 192.168.10.200
shows where DHCP relays are forwarded.
show client summary (WLC CLI)
(NetsTuts-WLC) > show client summary Number of Clients................................ 7 MAC Address AP Name WLAN SSID Status Protocol ──────────────── ───────── ──── ─────────────── ──────── ──────── a4:c3:f0:11:22:33 AP2802i 1 NetsTuts-Corp Associated 11ac 00:1a:2b:3c:4d:5e AP2802i 1 NetsTuts-Corp Associated 11ax b8:27:eb:aa:bb:cc AP2802i 2 NetsTuts-Guest Associated 11n c4:29:96:dd:ee:ff AP2802i 3 NetsTuts-IoT Associated 11n
show client summary confirms clients are connecting
to the correct WLANs. The WLAN column shows the
WLAN ID — verify each client is on the expected WLAN ID
(1=Corp, 2=Guest, 3=IoT). The Protocol column
shows the 802.11 protocol in use — 11ax (Wi-Fi 6) and 11ac
(Wi-Fi 5) clients on the Corp WLAN suggest modern devices capable
of WPA3. An 11n client on the IoT WLAN is typical for legacy
sensors. If a client appears on the wrong WLAN (e.g., IoT device
on Corp WLAN), the device is connecting to the wrong SSID —
check device wireless settings.
show client detail [MAC] (WLC CLI)
(NetsTuts-WLC) > show client detail a4:c3:f0:11:22:33 Client MAC Address............................... a4:c3:f0:11:22:33 Client Username.................................. N/A AP MAC Address................................... a0:e0:af:xx:yy:zz AP Name.......................................... AP2802i WLAN.............................................. 1 SSID.............................................. NetsTuts-Corp BSSID............................................ a0:e0:af:xx:yy:01 IP Address....................................... 192.168.30.15 Association State................................ Associated PMF State........................................ Required Authentication Algorithm......................... SAE Encryption Cipher................................ CCMP-128 (AES) QoS Level........................................ Platinum VLAN............................................. 30 Data Rate....................................... 433.3 Mbps
Verification Command Summary
| Command | What It Shows | Primary Use |
|---|---|---|
show wlan summary |
All WLANs with status, interface mapping, and PMF state | Confirm all three WLANs are enabled and mapped to correct dynamic interfaces |
show wlan [id] |
Full security and interface configuration for a single WLAN | Verify security settings (SAE/PSK/PMF) and DHCP relay target for a specific WLAN |
show interface summary |
All WLC interfaces with VLAN IDs and IP addresses | Confirm dynamic interfaces are present with correct VLANs before assigning to WLANs |
show client summary |
All connected clients with AP, WLAN ID, SSID, and 802.11 protocol | Verify clients are connecting to the correct WLAN and confirm client counts per SSID |
show client detail [MAC] |
Complete per-client security details — auth algorithm, encryption, PMF, VLAN, IP, data rate | Confirm individual client is using correct security (SAE vs PSK) and is on correct VLAN |
show interfaces trunk (SW1) |
Trunk port VLAN allowed list and forwarding state | Verify all client VLANs (30,40,50) are in forwarding state on WLC uplink trunk |
9. Troubleshooting SSID and VLAN Mapping Issues
| Problem | Symptom | Cause | Fix |
|---|---|---|---|
| Clients on wrong subnet after connecting | Guest clients get 192.168.30.x addresses instead of 192.168.40.x. Client is on the wrong VLAN | Guest-WLAN is mapped to corp-clients interface (VLAN 30) instead of guest interface (VLAN 40) — wrong interface selected during WLAN creation | Edit Guest-WLAN: WLANs → Guest-WLAN → General tab → Interface → change to "guest". Apply and save. Clients already connected will receive a new DHCP lease on reconnect. |
| SSID not visible to clients after creation | New WLAN is created but does not appear in client Wi-Fi scan | WLAN Status is Disabled, Broadcast SSID is unchecked, or the AP has not received the updated configuration from the WLC yet | Check WLAN status: WLANs → confirm green status icon. Enable: config wlan enable [id] on WLC CLI. Verify Broadcast SSID is checked. Allow 30–60 seconds for AP to receive and apply WLAN config. On WLC CLI: show wlan [id] → confirm "Status: Enabled". |
| WPA3 clients cannot connect but WPA2 clients can | Corporate devices supporting WPA3 fail authentication; WPA2 devices succeed on the same SSID | PMF is set to Required but the WPA3 SSID was not created with SAE enabled in Auth Key Mgmt. Or the AP firmware does not support WPA3 and needs an upgrade from the WLC | Verify SAE is enabled: show wlan 1 → check "SAE: Enabled". If SAE is not listed, edit the WLAN and add SAE to Auth Key Mgmt. Check AP firmware version: show ap config general AP2802i → Software Ver must support WPA3 (requires 8.10+ on most Cisco APs). |
| Guest clients can see other guests' devices | Guest A can ping or discover Guest B's device despite P2P Blocking being configured | P2P Blocking is set to "Disable" instead of "Drop" on the Guest WLAN, or clients are on different APs and the traffic is being switched at the VLAN level on the wired network before WLC can block it | Verify P2P Blocking: WLANs → Guest-WLAN → Advanced tab → P2P Blocking → must be "Drop". Note: P2P Blocking only prevents direct wireless client-to-client traffic on the same AP. For true isolation between clients across APs, also configure a private VLAN or ACL on the switch for VLAN 40 to block intra-VLAN traffic. |
| IoT clients not getting DHCP after adding VLAN 50 | IoT devices associate but receive APIPA addresses (169.254.x.x) — DHCP fails | VLAN 50 not in the trunk allowed list on the switch, or DHCP server has no pool for 192.168.50.0/24, or iot-devices dynamic interface pointing to wrong DHCP server IP | Check trunk: show interfaces Gi1/0/48 trunk → VLAN 50 must be in forwarding state. Add if missing: switchport trunk allowed vlan add 50. Verify DHCP pool for 192.168.50.0/24 exists on the DHCP server. Check WLC interface: show interface detailed iot-devices → confirm DHCP server IP is correct. |
| Bandwidth limiting not enforced on IoT WLAN | IoT devices exceed configured 1 Mbps limit — bandwidth contracts appear to have no effect | Per-client bandwidth contracts require the QoS profile on the WLAN to be set to Bronze or Silver — Platinum QoS overrides bandwidth contracts. Or the feature is not supported on the current WLC/AP firmware version | Verify QoS on IoT-WLAN: WLANs → IoT-WLAN → QoS tab → Quality of Service must be "Bronze". Also confirm bandwidth contract values are saved: downstream 1000 Kbps, upstream 512 Kbps. Test with a speed test from an IoT VLAN device and monitor with show client detail [MAC]. |
Key Points & Exam Tips
- Each WLAN on a Cisco WLC is a combination of an SSID, a security policy, and a dynamic interface (VLAN). The dynamic interface is the critical link that places wireless clients on the correct VLAN and subnet. Always create the dynamic interface before creating the WLAN that references it.
- If a WLAN is created without selecting a dynamic interface, it defaults to the management interface — placing all wireless clients on the management VLAN. This is a serious security misconfiguration that requires immediate correction.
- New VLANs must be created on the switch and added to the WLC trunk before configuring the corresponding dynamic interface on the WLC. Use
switchport trunk allowed vlan add— notswitchport trunk allowed vlan— to avoid removing existing VLANs. - WPA3-Personal uses SAE (Simultaneous Authentication of Equals) instead of PSK. SAE provides forward secrecy and resistance to offline dictionary attacks. WPA2+WPA3 transition mode (SAE+PSK in Auth Key Mgmt) allows both WPA3 and WPA2 clients on the same SSID — the recommended approach when deploying WPA3 in mixed environments.
- PMF (Protected Management Frames, 802.11w) is mandatory for WPA3 and optional for WPA2. In WPA3+WPA2 transition mode, set PMF to Required for WPA3 clients and Optional for WPA2 clients. Setting PMF to Disabled blocks WPA3 clients entirely.
- P2P Blocking on the WLAN prevents direct wireless client-to-client traffic within the same SSID — essential for guest WLANs. It operates at the AP/WLC level. For isolation between clients on different APs using the same SSID, additional switch-level controls (private VLAN or ACL on the client VLAN) are required.
- Per-client bandwidth contracts on the QoS tab cap individual device throughput — important for IoT WLANs. QoS must be set to Bronze or Silver for bandwidth limiting to be enforced; Platinum QoS bypasses bandwidth contracts.
- The WLC supports up to 512 WLANs per controller (model-dependent). Each AP broadcasts a maximum of 16 SSIDs at any given time — exceeding this limit on a single AP means not all WLANs will be broadcast. Use AP Groups to assign specific WLANs to specific APs.
show wlan summaryconfirms WLAN status and interface mapping.show client detail [MAC]confirms per-client authentication algorithm (SAE or PSK), VLAN assignment, and IP address — the most important post-connection verification commands.- On the CCNA exam: know the WLAN-to-dynamic-interface-to-VLAN mapping chain, the difference between WPA2 PSK and WPA3 SAE, why transition mode is needed, what P2P Blocking does, and why VLAN configuration on the switch trunk must be done before WLC interface creation.