I have an autonoumus APs installed inside my LAN (4 APs just plugged to the switch broadcasting three available VLANs from the switch with three SSIDs), i configured 3 diiferent WPA2 keys for them.
So any user when access any of them, i just type the key and the key kept stored on the user labtop forever, and in new windows OS, user can uncheck the wireless key and can see it and give it to other unkown users who can access my LAN without being known.
So, can any one inform me what is the best scenario to overcome this issue?
If you are trying to prevent users from adding their own device, why not lock down the wireless profile so they can't check that. Hopefully these are part of your domain computers. You can also do Mac filtering if you don't have many devices to manage (easy to spoof a Mac address though). Users will have to k ow how to spoof a Mac to bypass that. If you have AD, you can bring up a radius server and do 802.1x authentication using machine authentication. But again, these have to be domain computers.
Transferring Crash file from standby: Login to the Active WLC in HA.
From CLI: (Cisco Controller) >transfer upload datatype crash (Cisco
Controller) >transfer upload filename (Cisco
Controller) >transfer upload mode tftp (Cisco Controller) >transfer
This is the start of a display filter cross reference between Wireshark
and OmniPeek. The 1st installment is a table of advanced filters. More
filters will be added as time allows. It is a living doc, so check back
for changes every so often Please feel f...