I admit: I don't use RADIUS! I've got many (in my opinion) good reasons why not - I won't bother you with that.
I configure my BR350 with static 128 bit keys as they're supposed to link two LANs. I tell those boxes to expire the key at some time and expects the software to exchange some new keys.
But do they shift keys? Or do I in fact keep using my static keys?
Would it be possible anyway to use that RADIUS-thing? I mean - the only connection to the outside world from the 'satelite-LAN' is through the air. And the boxes are set up only to accept encrypted traffic in order to keep everybody else away.
A RADIUS server is necessary for Dynamic WEP keys.
If you don't use a RADIUS server you can still get Ciscos enhancements to **static** WEP. There are;
Message Integrity Check (MIC)
MIC prevents attacks on encrypted packets called bit-flip attacks. During a bit-flip attack, an intruder intercepts an encrypted message, alters it slightly, and retransmits it, and the receiver accepts the retransmitted message as legitimate. The MIC, implemented on both the bridge and all associated client devices, adds a few bytes to each packet to make the packets tamper-proof.
Temporal Key Integrity Protocol (TKIP)
Temporal Key Integrity Protocol (TKIP), also known as WEP key hashing, defends against an attack on WEP in which the intruder uses an unencrypted segment called the initialization vector (IV) in encrypted packets to calculate the WEP key. TKIP removes the predictability that an intruder relies on to determine the WEP key by exploiting IVs. TKIP protects both unicast and broadcast WEP keys.
Further information on Cisco Bridge security features is available here;
Transferring Crash file from standby:
Login to the Active WLC in HA.
(Cisco Controller) >transfer upload datatype crash
(Cisco Controller) >transfer upload filename <Desired filename>
(Cisco Controller) >transfer up...
This is the start of a display filter cross reference between Wireshark and OmniPeek.
The 1st installment is a table of advanced filters. More filters will be added as time allows.
It is a living doc, so check back for changes every so often
Please feel ...
I have created a Powershell script to automatically add a Wireless Guest User on Cisco WLCs. (tested on 2500 Series)
The script should be completely self explanatory.
Powershell SNMP Module (Install-Module -Name SNMP)
SNMP Write Access to...