Solved

WLC avc profile

Posted on 2015-02-18
4
241 Views
Last Modified: 2015-02-18
On the cisco wlc 5508 we have quite a number of users that stream in our remote offices.  I've created an avc profile, applied it to a test wlan and run some tests.    I wonder if there is a way to identify the individual workstations streaming?    I see that i can go to monitor applications and it shows me the apps being utilized under the ssid.   And i can go into monitor clients and click on each individual client and go to their avc tab.  But we have almost 1000k clients.   Is there a way even in cli to pin down which clients are streaming youtube for example?    We're not using an exporter of any to dump the netflow packets at least at the moment.   if there is a way to view it on the wlc itself?    please advise.  Thanks so much
0
Comment
Question by:techlinden
  • 3
4 Comments
 

Author Comment

by:techlinden
ID: 40616953
should have written we have almost 1000 clients.  not 100,000 clients.  :)
0
 
LVL 45

Accepted Solution

by:
Craig Beck earned 500 total points
ID: 40616996
You need Cisco Prime Infrastructure for this - it will give detailed breakdown of what each user is doing.

http://www.cisco.com/c/en/us/products/collateral/cloud-systems-management/prime-infrastructure/solution_overview_c22-728972.html#_Toc411379825
0
 

Author Comment

by:techlinden
ID: 40617052
dang.  i was afraid someone would say that.
0
 

Author Closing Comment

by:techlinden
ID: 40617054
thanks.  I'll read up on the link you sent.
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Using in-flight Wi-Fi when you travel? Business travelers beware! In-flight Wi-Fi networks could rip the door right off your digital privacy portal. That’s no joke either, as it might also provide a convenient entrance for bad threat actors.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question