I am not sure of the Article but their use is straight forward.
commands->download file to controller (vendor CA certificate) (vendor device certificate) MUST BE IN PEM format
Here device certificate and server certificate can be uploaded. Use case is EAP-TLS support when WLC is acting like a radius server. It needs to present its certificate and also validate client certificate when they present the same.So needs two certificates.
management->http-https: (X) ssl cert
Here it just needs to present the certificate so that your browser doesnt give the warning.Go to Management >https..to upload certificate for this purpose.
security->web auth-> (x) ssl cert
This certificate would be presented during web-auth when Internal web-server of the WLC is hit and you dont want warning because of that in your browser.Go to Security >web-auth>certificate to upload this certificate. This is attached to the virtual ip.From 7.6 onwards ..it has to be fully chained.
Additionally you can force WLC to use device certificate as HTTPS management certificate using the command:
Transferring Crash file from standby:
Login to the Active WLC in HA.
(Cisco Controller) >transfer upload datatype crash
(Cisco Controller) >transfer upload filename <Desired filename>
(Cisco Controller) >transfer up...
This is the start of a display filter cross reference between Wireshark and OmniPeek.
The 1st installment is a table of advanced filters. More filters will be added as time allows.
It is a living doc, so check back for changes every so often
Please feel ...
I have created a Powershell script to automatically add a Wireless Guest User on Cisco WLCs. (tested on 2500 Series)
The script should be completely self explanatory.
Powershell SNMP Module (Install-Module -Name SNMP)
SNMP Write Access to...