1. Tubelator AI
  2. >
  3. Videos
  4. >
  5. Education
  6. >
  7. Master Implementing Cisco Enterprise Wireless Networks (ENWLSI) v1.1 Online | Koenig Solutions

Master Implementing Cisco Enterprise Wireless Networks (ENWLSI) v1.1 Online | Koenig Solutions

Available In Following Subtitles
English
Variant 1
Posted on:
Learn the ins and outs of Implementing Cisco Enterprise Wireless Networks (ENWLSI) v1.1 with this online course offered by Koenig Solutions. Understand the concept of identity networking, where WLAN policies are enforced based on client identity rather than SSID, ensuring secure and efficient wireless network management.
tubelator logo

Instantly generate YouTube summary, transcript and subtitles!

chrome-icon Install Tubelator On Chrome

Video Summary & Chapters

No chapters for this video generated yet.

Video Transcript

0:09
This topic was AAA overwriting.
0:13
So let's understand about this topic.
0:16
What this topic is all about.
0:19
So you can also read.
0:23
The Cisco Unified Wireless Network Solutions supports identity networking.
0:28
Like identity networking is something you can say.
0:32
It is a concept in which the WLAN policies are assigned and enforced
0:37
based on the identity of the wireless line rather than the SSID. Very very important.
0:43
Please read it again. So I repeat Cisco Unified Wireless Network Solution supports identity
0:51
networking and what this identity means? It is a concept in which the policies are assigned
0:58
based on the identity of the
1:00
client not on the basis of SSID. So that means even though if you're using an SSID JAWS and
1:10
if you have two clients, client number one and number two, you can easily perform any
1:17
kind of modifications or you can control the access over the identity of the client on
1:24
the basis of this client identity not on the basis of SSID. Previously what we did, we
1:31
can see that whenever we want to assign this SSID, it must be assigned to a separate VLAN.
1:39
The users who are connected to this VLAN will go to a particular location. The users want
1:44
to connect to this VLAN go to a particular location. But in this case, rather than on
1:48
the basis of SSID, we can do the modifications or we can assign the policies on the basis
1:53
of identity of the clan. So very very important feature will be there.
1:59
Triple A
2:00
overruns. Okay, next without identity-based network WLAN security and
2:12
performance settings assignments are restricted to the level. These
2:17
restrictions can lead to the creation of several VLANs in a society which is
2:21
unnecessary with identity-based network. An example is having executing sales and
2:28
and the service ID. So where all the VLANs or all the WLANs are the departments in the
2:38
same company but must operate in different VLANs. So always remember whenever I'm talking
2:44
about the sales department, IT department, executive department, they are a part of the
2:52
company. They are a part of a company and they all work inside of the company but they
2:58
all must be apart.
3:00
from each other on the basis of VLANs.
3:04
We don't want that the executive communication can go to the sales department or to the IT department.
3:11
So this is a very important thing by which we can create the VLANs.
3:15
So it must operate on the different VLANs with the identity-based network.
3:25
You can create one VLAN or WLAN for this with the name of COC
3:30
and assigned to the correct VLAN at the time that each user authenticates.
3:36
So very, very important thing.
3:39
Next, the allow AAA override options of a WLAN allow you to configure the WLAN
3:47
for the identity network. This feature can allow you.
3:51
This option lets you apply VLAN tagging, quality of service, ACLs,
3:56
based on the radius attribute from the AAA server.
4:00
And we can also see how they can implement those things.
4:04
But first of all, let's see this example.
4:08
Let's see this example.
4:09
So in this example, it will say, OK, so in this figure,
4:17
this is user 1.
4:20
Authenticate and redirect to VLAN number 10.
4:24
And user 2, on the same SSID, redirect to VLAN number 4.
4:29
Very, very important and good example.
4:31
both the users are connected to which SSID? This one. But this user through the CAPEP
shape-icon

Download extension to view full transcript.

chrome-icon Install Tubelator On Chrome