We have several 7921G phones which we want to integrate in our WiFi network. Such WiFi is protected by using EAP-TLS, so we have installed the corresponding certificates to one testing phone. We have discovered that the phone does not support certificates with RSA keys with a size greater than than 2048 bits and, at the same time, their signatures must be always generated by using the SHA1 hashing algorithm. This fact also appears in the related documentation of the phone. As a consequence we have a problem since the root certificate of the CA use a key of 4096 bits and the SHA256 algorithm. We have also updated the firmware to the latest version without success regarding this. Anyone knows if there is any plan to a firmware update to support keys with a greater size and another hashing algorithms? Currently, SHA1 algorithm is considered as deprecated and the security community recommends to use another hash algorithm, as the same as occurs with the size of the keys.
Transferring Crash file from standby:
Login to the Active WLC in HA.
(Cisco Controller) >transfer upload datatype crash
(Cisco Controller) >transfer upload filename <Desired filename>
(Cisco Controller) >transfer up...
This is the start of a display filter cross reference between Wireshark and OmniPeek.
The 1st installment is a table of advanced filters. More filters will be added as time allows.
It is a living doc, so check back for changes every so often
Please feel ...
I have created a Powershell script to automatically add a Wireless Guest User on Cisco WLCs. (tested on 2500 Series)
The script should be completely self explanatory.
Powershell SNMP Module (Install-Module -Name SNMP)
SNMP Write Access to...