If you have a flat network you can't segregate the traffic. You can create the SSID's you have listed, but they will be mapped to the vlan everything is on. If you are using AD and want to authenticate with that, then I suggest you also have a radius server and you need to also use 802.1x. Devices that connect need to support 802.1x. I don't know what devices you have nor what it can or can't support, but in an ideal environment, all your staff laptops are joined to the domain so you can push out the wireless GPO. Students and Guest, well that depends on what you want to do with them. Students are also in AD, but you will need to supply instructions on how they would setup their devices to connect. if you plan on using 802.1x.
Might be best to talk to your local SE to help plan what you need to do. Typically we would sit with a customer for a couple hours or a day to gather information to determine the best setup.
Help out other by using the rating system and marking answered questions as "Answered"
Scenes you are using single vlan so the point of have multiple SSID is useless and the better approach will be using the AD for both authentication and managing the Group policy for both. In this way you can manage both students and Staff Kindly see the following link for step by step config and understand Group policy
Transferring Crash file from standby:
Login to the Active WLC in HA.
(Cisco Controller) >transfer upload datatype crash
(Cisco Controller) >transfer upload filename <Desired filename>
(Cisco Controller) >transfer up...
This is the start of a display filter cross reference between Wireshark and OmniPeek.
The 1st installment is a table of advanced filters. More filters will be added as time allows.
It is a living doc, so check back for changes every so often
Please feel ...
I have created a Powershell script to automatically add a Wireless Guest User on Cisco WLCs. (tested on 2500 Series)
The script should be completely self explanatory.
Powershell SNMP Module (Install-Module -Name SNMP)
SNMP Write Access to...