--> Recently I faced this problem where some client users were unable to get Cisco Wireless Lan Controller Web Authentication redirection page when they connected to wireless network. --> You can get this problem due to so many reasons, such as i) Wireless LAN Controller F…
Read more--> In order to block downloading from Bit torrents on your wireless network, we can use Application Visibility and Control Feature of Cisco WLC. 1) First, we need to create AVC Profiles in Cisco WLC, by browsing (Wireless --> Application Visibility And Control --> AVC…
Read more--> Peer 2 Peer blocking is a feature that blocks direct communication between wireless clients that present on the WLAN on the same Wireless LAN Controller. --> Peer-to-peer blocking does not block multicast traffic, it only blocks unicast traffic. --> Peer-to-peer blo…
Read more--> Out of Box is a special RF profile for new Light Weight APs that join to the Wireless LAN Controller. --> Whenever new lightweight access point joins to the Wireless LAN Controller then it will be automatically moved to Out of Box RF Profile once we enable this feature…
Read more--> Work Group Bridges (WGB) is a mode that can be configured on Autonomous Access Point. --> Work Group Bridges (WGB) APs are used to relay traffic from the devices that do not have wireless capabilities to the wireless network. --> For example, if you need to provide …
Read more--> The Webauth Sleeping Client is a feature on Cisco Wireless LAN Controller which allows successfully authenticated devices to stay logged in for a configured period without re-authentication. --> The MAC address of the device and the username or password is mapped. Once…
Read more--> IF DHCP Addr. Assignment Required is enabled, wireless users must receive an IP ADDRESS from DHCP Server. --> This feature only allows traffic from users who have obtained their IP address via DHCP. --> Wireless Users configured with static IP address are not allow…
Read more--> Web Authentication is a method where wireless users use a Web interface to enter credentials before being allowed to access the network. --> Wireless User detects the SSID, sends an Authentication request and receives an authentication success reply. --> Layer 2 Au…
Read more--> Recently after implementing the Wireless Network and Web Authentication via LDAP Server on a Cisco Wireless LAN controller – 2504 I had an issue where after approximately every half an hour wireless user would disconnect and they would have to go through the Web Authentic…
Read more--> AP Authentication allows only authorized access points to register with Cisco WLC. --> By default, any Cisco wireless access point can register with Cisco WLC. --> AP Authentication restricts which access points can register with Cisco WLC. 1) MIC --> Each and e…
Read more--> A rogue access point is a wireless access point that has been installed on a secure network without explicit authorization from the network administrator, whether it is added by a well-known employee or by a malicious attacker. --> If a rogue access point is in place, …
Read more--> Aruba Instant Access Points does not require any external wireless controller to manage the WIFI network. --> Any Aruba Instant Access Point can dynamically take up the role of the virtual controller without impacting the network. --> Virtual controller contains a…
Read more--> Coverage holes are the areas where users can't receive the signal from wireless access points. --> If the users on the Access Point are found at low Received Signal Strength Indicator (RSSI) levels, Cisco Acess Point sends coverage hole alarm to the Cisco Wireless …
Read more--> AP Pre-Image Download allows the Access Point to download the updated or upgraded image from the controller without restarting the access point. --> Without AP Pre-Image Download the Access Point downloads the upgraded image after restarting it, which causes a maximum …
Read more1. Before proceeding to upgrade process, please make sure that you take back up of configuration and license file. Please check the documents for configuration and license backup procedure. 2. Please test the reachability of TFTP server from WLC. (Cisco Controller) >p…
Read more--> Recover-Config is used to make the wireless controller to factory default settings. --> In order to make the wireless controller to factory default settings, just reboot the WLC and enter Recover-Config in the username field. --> restore-password is only used to re…
Read more--> Link Aggregation (LAG) in the WLC is the way of configuring the Ether channel in switches. --> LAG simplifies the controller operation by removing the need of configuring the primary and secondary port for each interface. --> If any of the port in LAG fails, traffic…
Read moreThe Wireless LAN Controller (WLC) supports two modes of DHCP operations in case an external DHCP server is used: i) DHCP Proxy --> The DHCP proxy is not ideal for all network environments. The controller modifies and relays all DHCP transactions to provide helper function and…
Read more
haleyew is simply dummy text of the printing and typesetting industry.