Chapter 9. Access Points
This chapter covers the following subjects:
• IEEE 802.1X and Wireless
• Configuring IEEE 802.1X on Access Points and Wireless LAN Controller
• Configuration Example Based on Some EAP Types Available on ACS 4.2 and ACS 5.1
This chapter is an extension of Chapter 8, “IOS Switches.” The fundamental concepts that you learned in the previous chapter also apply to wireless infrastructure. The configuration part on ACS will also remain the same while configuring Protected Extensible Authentication Protocol (PEAP) and Extensible Authentication Protocol-Transport Layer Security (EAP-TLS). In the case of wireless infrastructure, you need only configure a wireless device for EAP authentication (authenticator). In today’s world, ...
Get AAA Identity Management Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.