You are here
WL0014 - WLC L2 Security Local EAP (Part 2)
Difficulty Level:
Lab Document:
<Please login to see the content>
Category:
Wireless
The video shows you how to configure Cisco Wireless LAN Controller to act as a RADIUS server and provide 802.1X authentication to wireless client using Local EAP feature. We will use OpenSSL to generate CSR and have it signed for controller identity certificate. Authentication tested includes PEAP, EAP-TLS, and EAP-FAST. We will primarily use controller local user database but will also discuss and demonstrate limitation of using LDAP.
Part 2 of this video covers Local EAP configuration and testing
Topic:
- Local EAP
- Password Policies
- Local Net Users
- AAA LDAP
- OpenSSL CSR Generation and Certificate Install
- Local EAP Authentication and Profile
1 comments
802.1X auth (LDAP) EAP
Sir i have once implemented a LDAP auth for my WLAN
1.WPA+WPA2
2.802.1x auth check
3.Configured the LDAP Server
4.Called the LDAP server in AAA LDAP Option
5.Selected a EAP=PEAP Profile (all else is unchecked)
6.selected interim update
7.in Security TAB changed Auth. Priorities to LDAP
And Configured the Client with WPA2 enterprise with CISCO PEAP Protocol ad Unchecked the Varify the server certificated and Selected the Prompt Username and password box there.
And It worked sir .
of possible can you share this in video for our other aspirants.