Solved

cisco 2504 configuration another questiom

Posted on 2014-11-02
13
459 Views
Last Modified: 2016-06-10
I have a guest user SSID set up on a  2504  Cisco WLC which I would like to configure to use the local on board database   username and password instead of psk shared key . Do any body  know who to set this up  ?
0
Comment
Question by:thombie
  • 8
  • 3
  • 2
13 Comments
 
LVL 26

Expert Comment

by:Predrag Jovic
ID: 40418026
0
 

Author Comment

by:thombie
ID: 40418029
this seems to talk about web page authentication.  this not what i need.
0
 

Author Comment

by:thombie
ID: 40418030
so a user clicks on the SSID from  a mobile device  he is presented with  a username  and password. I do not have a radius server. I want to use the local database created on the WLC
0
 
LVL 26

Expert Comment

by:Predrag Jovic
ID: 40418053
As much as I can see that is what you need (maybe I am wrong) :)
SSID from  a mobile device  he is presented with  a username  and password
That is as much as I know Web authentication :)
You need to create Web authentication (clients are authorized based from local username and password database on WLC) - no need to use Tacacs or Radius
Managing User Accounts

This chapter describes how to create and manage guest user accounts, how the web authentication process works, and how to customize the web authentication login page. It contains these sections:

    Creating Guest User Accounts
    Obtaining a Web Authentication Certificate
    Web Authentication Process
    Choosing the Web Authentication Login Page
    Configuring Wired Guest Access

Creating Guest User Accounts

The controller can provide guest user access on WLANs. The first step in creating guest user accounts is to create a lobby administrator account, also known as a lobby ambassador account. Once this account has been created, a lobby ambassador can create and manage guest user accounts on the controller. The lobby ambassador has limited configuration privileges and access only to the web pages used to manage the guest accounts.

The lobby ambassador can specify the amount of time that the guest user accounts remain active. After the specified time elapses, the guest user accounts expire automatically.

The local user database is limited to a maximum of 2048 entries, which is also the default value (on the Security > AAA > General page). This database is shared by local management users (including lobby ambassadors), local network users (including guest users), MAC filter entries, exclusion list entries, and access point authorization list entries. Together they cannot exceed the configured maximum value.
0
 

Author Comment

by:thombie
ID: 40419113
Hi I  want to to do the same thing with out a web page.   on the attachment the  you can see that phone pops up with a username and password IMAG0197.jpg  I want  to know if you can point the SSID to the local database
0
 
LVL 26

Expert Comment

by:Predrag Jovic
ID: 40419126
I'm sorry, it is simple web page, but it is a web page.
And, it is connected to local database.
:)
0
Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

 

Author Comment

by:thombie
ID: 40419177
So I have create a page then log in  ?
0
 

Author Comment

by:thombie
ID: 40419179
I cant just tell the  the SSID to use the local database ?
0
 

Accepted Solution

by:
thombie earned 0 total points
ID: 40419567
I would I needed to do.  Here   http://mrncciew.com/2013/04/21/configuring-local-eap-on-wlc/

which worked.
0
 
LVL 45

Expert Comment

by:Craig Beck
ID: 40427143
I already answered the same question in another thread.  Did you not search?? :-)
0
 

Author Comment

by:thombie
ID: 40427960
sorry for the  miss undertanding
0
 
LVL 45

Expert Comment

by:Craig Beck
ID: 40428133
No you didn't misunderstand... I was just saying someone else has asked the same question which was answered previously.  Glad you got sorted either way.
0
 

Author Closing Comment

by:thombie
ID: 40430064
I found the solution.
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Hi there, This article summarizes what you need if you are going to set up your home or small business Network Attached Storage (NAS) to be accessible from the internet. Of course there are configuration differences based on your NAS or router ma…
#Citrix #Citrix Netscaler #HTTP Compression #Load Balance
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now