| AP Location and Density Considerations | 35 |
| Office Deployment | 35 |
| Voice Deployment | 36 |
| Active RFID Tag Deployment | 36 |
Chapter 6 | Mobility Controller Configuration | 37 |
| Required Licenses | 37 |
| Configuration Profiles and AP Groups | 37 |
| Configuration Profiles | 37 |
| Profile Types | 38 |
| AP Groups | 39 |
| Profile Planning | 39 |
| SSIDs, VLANs and Role Derivation | 39 |
| SSIDs | 40 |
| VLANs | 40 |
| Role Derivation | 41 |
| Secure Authentication Methods | 41 |
| Authenticating with 802.1X | 42 |
| Authenticating with Captive Portal | 44 |
| Authentication Methods for Legacy Devices | 44 |
| Configuring Roles for Employee, Guest and Application Users | 45 |
| Employee Role | 45 |
| Guest Role | 46 |
| Device Role | 50 |
| Role Variation by Authentication Method | 51 |
| Wireless Intrusion Detection System | 51 |
| Wireless Attacks | 51 |
| Rogue APs | 52 |
Chapter 7 | RF Planning and Operation | 55 |
| RF Plan Tool | 55 |
| Adaptive Radio Management | 56 |
Chapter 8 | Voice over | 59 |
| WMM and QoS | 59 |
| Quality of Service | 59 |
| Traffic Prioritization | 60 |
| Network Wide QoS | 60 |
| Voice Functionality and Features | 60 |
| 60 | |
| Call Admission Control | 60 |
| Comprehensive Voice Management | 61 |
Chapter 9 | Controller Clusters and the Mobility Management System™ | 63 |
Appendix A | Licenses | 67 |
Appendix B | WLAN Extension with Remote AP | 69 |
Appendix C | Alternative Deployment Architectures | 71 |
| Small Network Deployment | 71 |
| Medium Network Deployment | 72 |
| Branch Office Deployment | 73 |
| Pure Remote Access Deployment | 75 |
4 Contents | Campus Wireless Networks Validated Reference Design Version 3.3 Design Guide |