We happen to have a very large open wireless implementation that uses an external webauth page that authenticates against our RADIUS. We are also using the Lobby Ambassador for employees that drop in for a week or two at a time, and those users are on the same SSID as everyone else.
For obvious reasons, we want to secure our SSID with WPA2-802.1x. When we do this our Lobby Ambassador will no longer function since those temporary usernames and passwords will be in the controllers.
My question is this: Is there a way to use WLAN Profiles so that I can have a profile for WPA2 and our Lobby Ambassador under the same SSID? I understand the Lobby Ambassador users won't be secure and this isn't the best practice, but can it be done?
No, you can’t have different security policy under one SSID. If you enable WPA/WPA2 with 802.1X, all client must use this to authenticate. But there shouldn’t be any problem to have two SSID, one for employees and one for external users, like guests and consultants.
Transferring Crash file from standby:
Login to the Active WLC in HA.
(Cisco Controller) >transfer upload datatype crash
(Cisco Controller) >transfer upload filename <Desired filename>
(Cisco Controller) >transfer up...
This is the start of a display filter cross reference between Wireshark and OmniPeek.
The 1st installment is a table of advanced filters. More filters will be added as time allows.
It is a living doc, so check back for changes every so often
Please feel ...
I have created a Powershell script to automatically add a Wireless Guest User on Cisco WLCs. (tested on 2500 Series)
The script should be completely self explanatory.
Powershell SNMP Module (Install-Module -Name SNMP)
SNMP Write Access to...