View Cart
0 Items | Total: US$0.00
Welcome,      Register

You are here

WL0014 - WLC L2 Security Local EAP (Part 2)

Rating: 
4.5
Average: 4.5 (2 votes)
Difficulty Level: 
0
Lab Document: 
<Please login to see the content>
Video Download: 
Title: WL0014 - Video Download $8.00
Purchase WL0014 - Video Download $8.00
The video shows you how to configure Cisco Wireless LAN Controller to act as a RADIUS server and provide 802.1X authentication to wireless client using Local EAP feature. We will use OpenSSL to generate CSR and have it signed for controller identity certificate. Authentication tested includes PEAP, EAP-TLS, and EAP-FAST. We will primarily use controller local user database but will also discuss and demonstrate limitation of using LDAP. 
 
Part 2 of this video covers Local EAP configuration and testing
 
Topic:
  • Local EAP
  • Password Policies
  • Local Net Users
  • AAA LDAP
  • OpenSSL CSR Generation and Certificate Install
  • Local EAP Authentication and Profile

About Author

Metha Chiewanichakorn, CCIE#23585 (Ent. Infra, Sec, SP), is a Cisco networking enthusiast with years of experience in the industry. He is currently working as a consulting engineer for a Cisco partner. As a founder of and an instructor at labminutes.com, Metha enjoys learning and challenges himself with new technologies.

1 comments

Sir i have once implemented a LDAP auth for my WLAN
1.WPA+WPA2
2.802.1x auth check
3.Configured the LDAP Server
4.Called the LDAP server in AAA LDAP Option
5.Selected a EAP=PEAP Profile (all else is unchecked)
6.selected interim update
7.in Security TAB changed Auth. Priorities to LDAP
And Configured the Client with WPA2 enterprise with CISCO PEAP Protocol ad Unchecked the Varify the server certificated and Selected the Prompt Username and password box there.

And It worked sir .

of possible can you share this in video for our other aspirants.

Poll

Vote for the Next Video Series