Solved

Questions about Cisco Wireless setup.

Posted on 2008-06-17
3
280 Views
Last Modified: 2013-11-09
Hello Experts,
We are implementing a wireless warehouse inventory scanning system and I would like to make it as secure as possible.
Network Infrastructure is Dell layer2 switches - one subnet.
Access Points are Cisco AP1242AG

1) I would like to restrict the wireless hand-held scanner devices to only certain LAN IP's, Is this possible? Example please.

2) I would like to allow laptops to connect to the same AP's but restrict them to only the Internet, Is this possible? Example please.

3) I would like to use the same SSID's on all AP's for the hand-held scanners as well as the laptop access with the same restrictions, Is this possible? Example please.

4) Recommendations?

Let me know if any more detail is needed.
Thanks
0
Comment
Question by:Starrett2005
  • 2
3 Comments
 
LVL 5

Expert Comment

by:rslqld
ID: 21810015
1) Depending on number of hand-held devices, static DHCP leases may be your best bet. Assuming you have a central DHCP server or router, just add the leases there and configure each AP to perform DHCP pass-through via web interface or CLI.

2) Those Cisco APs have support for ACLs - create an ACL to permit IP traffic to your internal subnet, and the final entry in the ACL to deny all other destinations.

3) You can do this - any APs that have overlaping signal are best set 5 channels apart to prevent interference - e.g. AP1 is on channel 6 and is within range of AP2 so put AP2 on channel 11.
0
 

Author Comment

by:Starrett2005
ID: 21812153
1) I would like to restrict the wireless hand-held scanner devices to only certain LAN IP's, Is this possible? Example please.
A) Depending on number of hand-held devices, static DHCP leases may be your best bet. Assuming you have a central DHCP server or router, just add the leases there and configure each AP to perform DHCP pass-through via web interface or CLI.
Q) (15 devices)Would the restriction to the application server IP be done with ACL's as well?

2) I would like to allow laptops to connect to the same AP's but restrict them to only the Internet, Is this possible? Example please.
A) Those Cisco APs have support for ACLs - create an ACL to permit IP traffic to your internal subnet, and the final entry in the ACL to deny all other destinations.
Q) Do I need multiple VLANs for different restrictions on SSID's? And if so, do my network switches need to support VLAN trunking on the ports the Aironet are connected?

3) I would like to use the same SSID's on all AP's for the hand-held scanners as well as the laptop access with the same restrictions, Is this possible? Example please.
A) You can do this - any APs that have overlaping signal are best set 5 channels apart to prevent interference - e.g. AP1 is on channel 6 and is within range of AP2 so put AP2 on channel 11.
Q) Will this be OK if all Aironet AP's are configured as root? I'm hoping the same SSID will prevent an connection poblems when a device moves into range of another AP.
0
 

Accepted Solution

by:
Starrett2005 earned 0 total points
ID: 25308569
More research on my questions reveals that the Cisco wireless controller will provide better functinality than just using the WAP devices themselves. At this time we are not ready to purchase the controllers.
0

Featured Post

Zoho SalesIQ

Hassle-free live chat software re-imagined for business growth. 2 users, always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
belkin wifi stick 12 89
Multiple Wireless Networks, Same SSID 8 91
Cisco 2702e Antenna Extension for better coverage 3 66
Unifi AP 4 48
DECT technology has become a popular standard for wireless voice communication. DECT devices are not likely to be affected by other electronic devices and signals because they operate in a separate frequency-band.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now