Cisco Structured
Implementing the Cisco SWAN Framework
When the encryption key negotiations are complete, the WDS reports all its registered infrastructure access points to the CiscoWorks WLSE for management. After the infrastructure access points are managed on the CiscoWorks WLSE, the CiscoWorks WLSE interrogates the infrastructure access points with SNMP to complete its internal inventory tables.
After the interrogation is complete, the Cisco SWAN framework is totally constructed and other advanced features are used.
The following is a check list for implementing the Cisco SWAN framework for the access
•Configure the AAA server for infrastructure authentication
•Configure the AAA server for WLAN client authentication
•Prepare the CiscoWorks WLSE for managing the WLAN devices
•Configure the WDS access point(s)
•Configure the infrastructure access points
The following is a check list for implementing the Cisco SWAN framework for the
•Configure the AAA server for infrastructure authentication
•Configure the AAA server for WLAN client authentication
•Prepare the CiscoWorks WLSE for managing the WLAN devices
•Configure the WLSM
•Configure the infrastructure access points
The following three subsections provide the details for each of these tasks. The first subsection focuses on the tasks common to both the access
Common Tasks
The required tasks common to both the
•Configuring the AAA server to support infrastructure authentication
•Configuring the AAA server to support WLAN client authentication
•Preparing the CiscoWorks WLSE for managing WLAN devices
Infrastructure authentication currently requires Cisco LEAP. Typically customers use CiscoSecure ACS for LEAP authentication. Both infrastructure and client authentication can use ACS. In many customer environments, AAA support for Cisco LEAP is not available for infrastructure authentication. As an alternative for infrastructure authentication, the local RADIUS server embedded in the access point IOS is used. This document reviews the steps to configure the ACS and the local RADIUS servers on the access point for infrastructure authentication. Other
Configuring the CiscoSecure ACS Server for Infrastructure Authentication
To use the CiscoSecure ACS server for infrastructure authentication, you must complete the following tasks:
Cisco Structured
14 |
| |
|