WLC and AP Power settings

Phil Morgan • February 12, 2018

AP Power settings made easy

To fully understand and sometimes troubleshoot our wireless networks, we need to know exactly what is going on with our AP s, especially what power they are outputting. So in this post we are going to look at AP Power settings made easy.

A man is drawing a diagram of an internet network

The Problem – Different AP models each have their own Power Levels

The problem we face is that different models of AP, each have their own set of power levels.

Cisco only tells us a number between 1 and X. 1 is full power, every number we add to it is a decrease of 3dB. Some APs go to 5, some go to 8. The same AP on 2.4GHz can have a different range on 5GHz.

This is further complicated by moving an AP from one UNII band in 5GHz to another, still in 5GHz, can completely change its power level range.

What we need is a simple easy way to know exactly what is going on with our power ranges, and what an AP’s power level is set to.

Well, never fear, Cisco has given us tools to help us with this.

The command ” show ap config 802.11a <ap_name> ” will show us lots of information about the power settings, see Table 1 below. We see the number of supported levels, how they map to dBm, the current power level, and whether the power has been set manually or by RRM.

Note: there is a lot of output from this command, the output shown is a snippet from several pages down – you need to press “spacebar” several times to get to this. It usually comes right after the speeds!

 

Table 1: “show ap config 802.11a <ap_name>” output (WLC 5508 8.5 code, 3602 AP)

Tx Power
Num Of Supported Power Levels … 8
Tx Power Level 1 ……………………….. 23 dBm
Tx Power Level 2 ………………………. 20 dBm
Tx Power Level 3 ………………………. 17 dBm
Tx Power Level 4 ………………………. 14 dBm
Tx Power Level 5 ………………………. 11 dBm
Tx Power Level 6 ……………………….. 8 dBm
Tx Power Level 7 ……………………….. 5 dBm
Tx Power Level 8 ………………………. 2 dBm
Tx Power Configuration …………….. CUSTOMIZED
Current Tx Power Level ……………… 3
Tx Power Assigned By ……………….. User

 

In fact, pressing spacebar again gives us more information about the AP channel, we can see this in table 2 below.

Table 2: further output of “show ap config 802.11a <ap_name>” command output (WLC 5508 8.5 code, 3602 AP)

Phy OFDM parameters
Configuration ……………………….. CUSTOMIZED
Current Channel …………………… 149
Channel Assigned By …………….. User
Extension Channel ……………. …. ABOVE
Channel Width………………….. …. 40 MHz
Allowed Channel List……………… 36,40,44,48,52,56,60,64,100,
…………………………………………….. 104,108,112,116,132,136,140,
…………………………………………….. 149,153,157,161,165

 

Here, we can see the current channel set, the channel width, is the extension above or below the current channel (in this case 802.11n +1 channel bonding). We can also see the allowed channels, and whether the channel selection has been set manually or by RRM.

Connecting to the AP (I consoled into the AP CLI, as I did with the WLC), we see it also has some commands we can use.

”show controllers dot11radio 1 freq” will show us the frequency and the channel we are on, as well as other channels supported, see Table 3 below. (In this case “controllers” refers to the hardware controller in the interface, not the WLC – controller).

 

Table 3: “show controllers dot11radio 1 freq” output (WLC 5508 8.5 code, 3602 AP)

Carrier Set: United states (US) (-A)
Uniform Spreading Required: Yes
Configured Frequency: 5745 MHz Channel 149 40MHz, extended above
Serving Frequency: 5745 MHz Channel 149 40MHz, extended above
Allowed Frequencies: * Dynamic Frequency Selection (DFS) only
5180( 36) 5200( 40) 5220( 44) 5240( 48) *5260( 52) *5280( 56) *5300( 60) *5320( 64) *5500(100) *5520(104) *5540(108) *5560(112) *5580(116) *5660(132) *5680(136) *5700(140) 5745(149) 5765(153) 5785(157) 5805(161) 5825(165)

Listen Frequencies:
5180( 36) 5200( 40) 5220( 44) 5240( 48) 5260( 52) 5280( 56) 5300( 60) 5320( 64) 5500(100) 5520(104) 5540(108) 5560(112) 5580(116) 5600(120) 5620(124) 5640(128) 5660(132) 5680(136) 5700(140) 5720(144) 5745(149) 5765(153) 5785(157) 5805(161) 5825(165)
Beacon Flags: 0, Interface Flags 2020105, Interface Events 0, Mode 9; Beacons are enabled; Probes are enabled

 

Note: The text has scrolled over the end-of-line, I left it like this, as this is how it appears on the screen.

Another command typed on the AP “ show controllers dot11radio powercfg ” will show us the number of power levels, the range of power levels allowed, and the current power level setting. (In this case “controllers” again refers to the hardware controller in the interface, not the WLC – controller).

 

Table 4: “show controller dot11radio 1 powercfg” output (WLC 5508 8.5 code, 3602 AP)

Configured TxPower: 17 dBm (Level Index 3)
Allowed Power Levels: 23 20 17 14 11 8 5 2 dBm
Allowed Client Power Levels: 23 20 17 14 11 8 5 2 dBm

So, there we have it. We now have an easy way to determine the power levels in use from the WLC’s and the AP’s perspectives.

See you next time!

 

If you are looking to make your mark in the IT Industry, then NC-Expert offers excellent training courses aimed at relevant IT industry certifications – contact us today to get started.

NC-Expert Blog

By Rie Vainstein March 31, 2025
A Digital Shield for Your Online Adventures As tech professionals, we often spend a good chunk of our lives navigating the digital realm. Whether you’re troubleshooting a network, coding a new app, or just binge-watching the latest series, one thing is clear: your connection to the internet is a double-edged sword. It’s both incredibly convenient and, if not properly secured, a potential vulnerability. Enter the VPN (Virtual Private Network) our trusty, digital bodyguard. If you’re not already using one, or if you’re not entirely sure why you should, let’s walk through some of the reasons why a VPN is essential for anyone working in IT and, frankly, for anyone who uses the internet. What Is a VPN? In simple terms, a VPN creates a secure, encrypted tunnel between your device and the internet. It allows your data to travel securely, masking your IP address, and ensuring that no one (be it hackers or nosy advertisers) can track or intercept your online activity. Think of it as your personal “cloak of invisibility” in the digital world! 
By Phil Morgan March 13, 2025
Troubleshooting Wireless Networks with Ekahau: A Professional Engineer’s Guide Wireless networks have become the backbone of modern business infrastructure. From office environments to large-scale enterprises, ensuring a seamless wireless experience is essential for productivity. However, despite advancements in Wi-Fi technology, network performance issues often arise, ranging from signal interference and dead zones to capacity overloads and channel mismanagement. To tackle these issues efficiently, professional engineers rely on powerful tools. One such tool, Ekahau AI Pro, has become a gold standard in the wireless industry for troubleshooting and optimizing Wi-Fi networks. This blog delves into troubleshooting wireless networks using Ekahau tools, providing practical examples and technical insights to guide professional engineers in improving network performance.
By Rie Vainstein March 3, 2025
Futureproofing Our Security In our increasingly connected world, the security of digital information has never been more critical. From banking transactions to private communications, our data is constantly transmitted and stored across the internet. The current systems that protect this data rely on cryptography, a branch of mathematics that helps keep information secure by encoding it in ways that are difficult to decode without the proper key. However, with the rise of quantum computers, traditional cryptography is facing new and significant threats. This is where Post-Quantum Cryptography comes into play. What is Post-Quantum Cryptography? Post-Quantum Cryptography (PQC) [1] refers to cryptographic algorithms that are specifically designed to be secure against the power of quantum computers. Quantum computers, once they become practical, will be capable of solving complex mathematical problems much faster than classical computers. This will render many of the encryption methods we rely on today [such as RSA (Rivest, Shamir, and Adleman – initials of the inventors) and ECC (Elliptic Curve Cryptography)] vulnerable to attack. Quantum computers operate on quantum bits, or “qubits”, which can exist in multiple states simultaneously, unlike classical bits that are either a zer (0) or one (1). This allows quantum computers to perform certain calculations exponentially faster than classical computers. For example, in a matter of seconds, a quantum computer could potentially break an RSA key, which is considered secure by today’s standards. As quantum computing technology advances, the need for PQC becomes even more urgent.