![]() ![]() ![]() Optionally, it can be a specified Model name, software version, description and assign Network Device groups based on device types, location or WLCs.Ī.b.c.d correspond to the WLC's interface that sends the authentication requested. Open ISE console and navigate to Administration > Network Resources > Network Devices > Add as shown in the image. Navigate to WLANs > WLAN ID > General and enable the SSID as shown in the image. Navigate to WLANs > WLAN ID > Advanced and enable Allow AAA Override, optionally specify the Session Timeout as shown in the image. Enable Allow AAA Override and optionally increase the session timeout Navigate to Security > AAA Servers and choose the desired RADIUS server, then hit Apply as shown in the image. Assign the RADIUS server to the WLAN.ĬLI: > config wlan radius_server auth add Choose a name for the SSID and profile, then click Apply as shown in the image. Open the GUI of the WLC and navigate to WLANs > Create New > Go as shown in the image. Enter the RADIUS server information as shown in the image.ĬLI: > config radius auth add 1812 ascii ![]() Open the GUI of the WLC and navigate to SECURITY > RADIUS > Authentication > New as shown in the image. In order to allow communication between RADIUS server and WLC, it is needed to register RADIUS server on WLC and vice versa. Create the authorization profile on ISE.Create the Service Set Identifier (SSID) in the WLC.Declare RADIUS Server on WLC and vice versa to allow communication with each other.If your network is live, make sure that you understand the potential impact of any command. All of the devices used in this document started with a cleared (default) configuration. The information in this document was created from the devices in a specific lab environment. The information in this document is based on these software and hardware versions: Prerequisites RequirementsĬisco recommends that you have knowledge of these topics: This documents describes how to set up a Wireless Local Area Network (WLAN) with 802.1x security and Virtual Local Area Network (VLAN) override with Protected Extensible Authentication Protocol (PEAP) as Extensible Authentication Protocol (EAP). ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |