Solved

Configure cisco Wireless Lan Controller via custom Web Application

Posted on 2014-11-18
3
232 Views
Last Modified: 2014-11-24
Hi,

I want to configure WLC using a custom Web Application built on PHP. For example I am doing MAC Filtering, so I want to add/remove a MAC address from the list that I can do via a web application built using PHP and in that application I enter the MAC address and click submit the MAC address is added to the WLC.

How can I achieve this via PHP? Can anybody provide a link which contains an example to configure WLC via WEB Application
0
Comment
Question by:Vipin Kumar
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 46

Expert Comment

by:Craig Beck
ID: 40450949
I don't think you'll find a link that will show you how to do this.  The best you'll get is to make a PHP script that can make changes via Telnet or SSH - that's exactly how Cisco's own WLC Management tool (Prime Infrastructure) does it.
0
 
LVL 1

Author Comment

by:Vipin Kumar
ID: 40451363
can you provide a link/example  which shows an example script how to make changes via telnet or ssh using PHP.
0
 
LVL 46

Accepted Solution

by:
Craig Beck earned 500 total points
ID: 40451749
As I said, I doubt you'll find a link or example which will show you specifically how to do this with a Cisco WLC, but this link shows how to Telnet in PHP...

http://www.geckotribe.com/php-telnet/
0

Featured Post

Salesforce Made Easy to Use

On-screen guidance at the moment of need enables you & your employees to focus on the core, you can now boost your adoption rates swiftly and simply with one easy tool.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Need WiFi? Often, there are perfectly good networks that don't have WiFi capability - and there's a need to add it.  - Perhaps you have an Ethernet port into a network but no WiFi nearby. - Perhaps you have a powerline extender and no WiFi at the…
Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question