Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Wireless LAN Controller, will this work?

Posted on 2010-08-18
3
Medium Priority
?
556 Views
Last Modified: 2012-05-10
Hi,

I need some assistance from anybody with wireless LAN controller experience. I've read the configuration guide but it doesn't make it clear that it will work with my weird setup. Unfortunately we don't have another WLC that I could test it out with so I just want to know if this will work.

It's wireless clients that connect to the WLAN are authenticated through the LDAP server, and after joining the WLAN they only have access to the internet out the DSL modem(VLAN192) and not VLAN 1. Does anybody see any caveats, aside from the native VLAN usage.

Thank-you,

Tony


wireless.jpg
0
Comment
Question by:virtuatony
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 17

Accepted Solution

by:
Kvistofta earned 500 total points
ID: 33466539
The WLC cannot authenticate users via LDAP, only radius. If you setup your server to talk radius that is taken care of. Which vlan to terminate the clients on is just a matter of getting that vlan into the wlc (if not already there), create a virtual interface in wlc for that vlan and connect the wlan/ssid to that virtual interface.

No caveats as far as I can see.

/Kvistofta
0
 

Author Comment

by:virtuatony
ID: 33467495
Since the router can only do one vlan per port the clients would have to terminate on VLAN192 should this work?

For the authentication I was planning on doing web authentication using LDAP as seen here: http://www.cisco.com/en/US/products/ps6366/products_configuration_example09186a0080a03e09.shtml

Thanks,

Tony
0
 
LVL 17

Assisted Solution

by:Kvistofta
Kvistofta earned 500 total points
ID: 33467574
Yes, that sounds reasonable. LDAP works fine with web-auth.

/Kvistofta
0

Featured Post

Hire Technology Freelancers with Gigs

Work with freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely, and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Multi-source agreements are important because they set standards that all manufacturers should follow to ensure that devices are compatible with multiple vendors. The multi-source agreement (MSA) is an agreement that establishes how multiple vendors…
For Sennheiser, comfort, quality and security are high priority areas. This paper addresses the security of Bluetooth technology and the supplementary security that Sennheiser’s Contact Center and Office (CC&O) headsets provide.  
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

618 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question