Cisco Cisco Access Registrar 4.2 Especificaciones Pagina 517

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 636
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 516
12-9
Cisco Wireless LAN Controller Configuration Guide
OL-13826-01
Chapter 12 Configuring Hybrid REAPWireless Device Access
Configuring Hybrid REAP
Note If NAC is enabled and you created a quarantined VLAN and want to use it for this WLAN,
make sure to select it from the Interface drop-down box on the General tab. Also, check the
Allow AAA Override check box on the Advanced tab to ensure that the controller checks
for a quarantine VLAN assignment.
h. Click Apply to commit your changes.
i. Click Save Configuration to save your changes.
Step 2 Follow these steps to create a locally switched WLAN. In our example, this is the second WLAN
(employee-local).
a. Follow the substeps in Step 1 to create a new WLAN. In our example, this WLAN is named
“employee-local.
b. When the WLANs > Edit page appears, modify the configuration parameters for this WLAN. In our
employee WLAN example, you would need to choose WPA+WPA2 for Layer 2 Security from the
Security > Layer 2 tabs and then set the WPA+WPA2 parameters.
Note Be sure to enable this WLAN by checking the Status check box on the General tab. Also,
be sure to enable local switching by checking the H-REAP Local Switching check box on
the Advanced tab. When you enable local switching, any hybrid-REAP access point that
advertises this WLAN is able to locally switch data packets (instead of tunneling them to the
controller).
Note For hybrid-REAP access points, the interface mapping at the controller for WLANs
configured for H-REAP Local Switching is inherited at the access point as the default VLAN
tagging. This can be easily changed per SSID, per hybrid-REAP access point.
Non-hybrid-REAP access points tunnel all traffic back to the controller, and VLAN tagging
is dictated by each WLAN’s interface mapping.
c. Click Apply to commit your changes.
d. Click Save Configuration to save your changes.
Step 3 Follow these steps if you also want to create a centrally switched WLAN that is used for guest access.
In our example, this is the third WLAN (guest-central). You might want to tunnel guest traffic to the
controller so you can exercise your corporate data policies for unprotected guest traffic from a central
site.
Note Chapter 9 provides additional information on creating guest user accounts.
a. Follow the substeps in Step 1 to create a new WLAN. In our example, this WLAN is named
“guest-central.
b. When the WLANs > Edit page appears, modify the configuration parameters for this WLAN. In our
employee WLAN example, you would need to choose None for both Layer 2 Security and Layer 3
Security on the Security > Layer 2 and Security > Layer 3 tabs and check the Web Policy check box
and make sure Authentication is selected on the Layer 3 tab.
Vista de pagina 516
1 2 ... 512 513 514 515 516 517 518 519 520 521 522 ... 635 636

Comentarios a estos manuales

Sin comentarios