- Tubelator AI
- >
- Videos
- >
- Education
- >
- Master Implementing Cisco Enterprise Wireless Networks (ENWLSI) v1.1 Online | Koenig Solutions
Master Implementing Cisco Enterprise Wireless Networks (ENWLSI) v1.1 Online | Koenig Solutions
Learn the ins and outs of Implementing Cisco Enterprise Wireless Networks (ENWLSI) v1.1 with this online course offered by Koenig Solutions. Understand the concept of identity networking, where WLAN policies are enforced based on client identity rather than SSID, ensuring secure and efficient wireless network management.
Video Summary & Chapters
No chapters for this video generated yet.
Video Transcript
This topic was AAA overwriting.
So let's understand about this topic.
What this topic is all about.
So you can also read.
The Cisco Unified Wireless Network Solutions supports identity networking.
Like identity networking is something you can say.
It is a concept in which the WLAN policies are assigned and enforced
based on the identity of the wireless line rather than the SSID. Very very important.
Please read it again. So I repeat Cisco Unified Wireless Network Solution supports identity
networking and what this identity means? It is a concept in which the policies are assigned
based on the identity of the
client not on the basis of SSID. So that means even though if you're using an SSID JAWS and
if you have two clients, client number one and number two, you can easily perform any
kind of modifications or you can control the access over the identity of the client on
the basis of this client identity not on the basis of SSID. Previously what we did, we
can see that whenever we want to assign this SSID, it must be assigned to a separate VLAN.
The users who are connected to this VLAN will go to a particular location. The users want
to connect to this VLAN go to a particular location. But in this case, rather than on
the basis of SSID, we can do the modifications or we can assign the policies on the basis
of identity of the clan. So very very important feature will be there.
Triple A
overruns. Okay, next without identity-based network WLAN security and
performance settings assignments are restricted to the level. These
restrictions can lead to the creation of several VLANs in a society which is
unnecessary with identity-based network. An example is having executing sales and
and the service ID. So where all the VLANs or all the WLANs are the departments in the
same company but must operate in different VLANs. So always remember whenever I'm talking
about the sales department, IT department, executive department, they are a part of the
company. They are a part of a company and they all work inside of the company but they
all must be apart.
from each other on the basis of VLANs.
We don't want that the executive communication can go to the sales department or to the IT department.
So this is a very important thing by which we can create the VLANs.
So it must operate on the different VLANs with the identity-based network.
You can create one VLAN or WLAN for this with the name of COC
and assigned to the correct VLAN at the time that each user authenticates.
So very, very important thing.
Next, the allow AAA override options of a WLAN allow you to configure the WLAN
for the identity network. This feature can allow you.
This option lets you apply VLAN tagging, quality of service, ACLs,
based on the radius attribute from the AAA server.
And we can also see how they can implement those things.
But first of all, let's see this example.
Let's see this example.
So in this example, it will say, OK, so in this figure,
this is user 1.
Authenticate and redirect to VLAN number 10.
And user 2, on the same SSID, redirect to VLAN number 4.
Very, very important and good example.
both the users are connected to which SSID? This one. But this user through the CAPEP