Solved

How do I authenticate wireless users via cisco ACS 5.1 ??

Posted on 2010-08-12
3
1,036 Views
Last Modified: 2013-11-29
Scenario: I have a cisco ACS ver 5.1, cisco WLC 5508, Cisco AP 1140 (light weight) and an end user laptop.

Req: When the laptop user tries to access the wireless network via AP, he should be authenticated via the ACS 5.1
 Is it possible ?? If yes... how ?
0
Comment
Question by:wolverine_r2k
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 14

Accepted Solution

by:
anoopkmr earned 500 total points
ID: 33433717
it is possible
try the below link
http://www.cisco.com/en/US/tech/tk722/tk809/technologies_configuration_example09186a0080665d18.shtml#c2

you have to configure WLC for radius autherntication . by default ACS is  Radius ready .

just create local users in ACS .
0
 
LVL 35

Expert Comment

by:Ernie Beek
ID: 37475069
This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
0

Featured Post

Manage your data center from practically anywhere

The KN8164V features HD resolution of 1920 x 1200, FIPS 140-2 with level 1 security standards and virtual media transmissions at twice the speed. Built for reliability, the KN series provides local console and remote over IP access, ensuring 24/7 availability to all servers.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Microwave IP VPN or Wireless Bridging 26 89
Import CSV with All modify groups 17 89
Protecting Server 2003 against Ransomware 2 82
Cisco WAP551 and Guest Users 6 19
Most MSPs worth their salt are already offering cybersecurity to their customers. But cybersecurity as a service is wide encompassing and can mean many things.  So where are MSPs falling in this spectrum?
No single Antivirus application (despite claims by manufacturers) will catch or protect you from all Virus / Malware or Spyware threats. That doesn't stop you from further protecting yourself however - and this article is to show you how.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question