routeprotocol.com

routeprotocol

  • Troubleshooting Wireless

    When it comes to troubleshooting wireless networks, there are three things that are required for a client to connection to an access point succesfully: The client is in range of the access point The client is able to successfully authenticate with the access point The client is able to gain a DHCP lease from the…

  • Wireless WebAuth Authentication

    Web authentication differs from other methods of authentication as it presents the user with content to read and interact with before giving full access to the network. It can prompt for user credentials, display information about the enterprises network they are connecting too, or terms and conditions on the networks purpose and use. The user…

  • Wireless EAP Based Authentication using Local EAP

    If the environment is small or there is no RADIUS server in production, an authentication that is built into the Cisco wireless controller can be used. The local EAP service needs to be defined on the controller. Navigate to Security -> Local EAP -> Profiles and click the New button. A name is required to…

  • Wireless EAP Based Authentication using RADIUS Servers

    Configure one or more external RADIUS servers in the Security > AAA > RADIUS section. Enter the servers IP address and the shared secret key that the wireless controller uses to communicate with the RADIUS server and ensure the server is set to Enabled. To use the RADIUS server with wireless network clients make sure…

  • Wireless Authentication – EAP

    Authenticating a client normally requires a challenge, then a response, then a decision on whether to grant access. The challenge and response can involve a range of encryption keys and algorithms with unique requirements to pass information between the client and access point. Extensible Authentication Protocol (EAP) provides a framework that allows for building of…

  • Wireless Authentication – Pre Shared Key

    One methods of a secure connection to a wireless network is by utilising one of the Wi-Fi Protected Access (WPA) technologies, WPA1, WPA2, or the latest version, WPA3. Each version of Wi-Fi Protected Access is certified by the Wi-Fi Alliance so a client and wireless access point utilising the same version of Wi-Fi Protected Access…

  • Wireless Authentication – Open

    The original 802.11 standard has two choices in authenticating a client, Open Authentication and WEP (Wired Equivalent Privacy) Open Authentication offers open access to a wireless network. The only requirement is that a 802.11 authentication request must be made before it attempts to associate with an access point. Any 802.11 can authenticate to gain access…

  • Locating Wireless Network Devices

    Device location can be important to a business or enterprise network. A large store may be interested in tracking protentional customers as they walk around the store, or a museum as they walk around exhibits to present relevant content. A client can be located to which access point they are associated too, but it can…

  • Cisco Wireless Controller Mobility Groups

    Cisco Wireless Controllers can be organised into mobility groups to help with intercontroller roaming. If there are two controllers that are assigned to the same mobility group, clients will be able to quickly roam between them. Layer 2 and Layer 3 roaming is supported for Mobility Groups along with the assistance technologies for roaming: CCKM,…

  • Wireless Roaming Between Centralised Controllers

    Larger wireless networks may be supported by more than one wireless controller with access points distributed across them Clients can roam from one access point to another, but they may also roam from one controller to another dependant on the access point. Layer 2 Roaming When a client moves from one controller to another when…