[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 566
  • Last Modified:

Wireless LAN Controller, will this work?

Hi,

I need some assistance from anybody with wireless LAN controller experience. I've read the configuration guide but it doesn't make it clear that it will work with my weird setup. Unfortunately we don't have another WLC that I could test it out with so I just want to know if this will work.

It's wireless clients that connect to the WLAN are authenticated through the LDAP server, and after joining the WLAN they only have access to the internet out the DSL modem(VLAN192) and not VLAN 1. Does anybody see any caveats, aside from the native VLAN usage.

Thank-you,

Tony


wireless.jpg
0
virtuatony
Asked:
virtuatony
  • 2
2 Solutions
 
Jimmy Larsson, CISSP, CEHNetwork and Security consultantCommented:
The WLC cannot authenticate users via LDAP, only radius. If you setup your server to talk radius that is taken care of. Which vlan to terminate the clients on is just a matter of getting that vlan into the wlc (if not already there), create a virtual interface in wlc for that vlan and connect the wlan/ssid to that virtual interface.

No caveats as far as I can see.

/Kvistofta
0
 
virtuatonyAuthor Commented:
Since the router can only do one vlan per port the clients would have to terminate on VLAN192 should this work?

For the authentication I was planning on doing web authentication using LDAP as seen here: http://www.cisco.com/en/US/products/ps6366/products_configuration_example09186a0080a03e09.shtml

Thanks,

Tony
0
 
Jimmy Larsson, CISSP, CEHNetwork and Security consultantCommented:
Yes, that sounds reasonable. LDAP works fine with web-auth.

/Kvistofta
0

Featured Post

 The Evil-ution of Network Security Threats

What are the hacks that forever changed the security industry? To answer that question, we created an exciting new eBook that takes you on a trip through hacking history. It explores the top hacks from the 80s to 2010s, why they mattered, and how the security industry responded.

  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now