O'Reilly logo

AAA Identity Management Security by Brandon J. Carroll, - CCIE #23837, Premdeep Banga, - CCIE #21713, Vivek Santuka, - CCIE #17621

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9. Access Points

This chapter covers the following subjects:

• IEEE 802.1X and Wireless

• Configuring IEEE 802.1X on Access Points and Wireless LAN Controller

• Configuration Example Based on Some EAP Types Available on ACS 4.2 and ACS 5.1

This chapter is an extension of Chapter 8, “IOS Switches.” The fundamental concepts that you learned in the previous chapter also apply to wireless infrastructure. The configuration part on ACS will also remain the same while configuring Protected Extensible Authentication Protocol (PEAP) and Extensible Authentication Protocol-Transport Layer Security (EAP-TLS). In the case of wireless infrastructure, you need only configure a wireless device for EAP authentication (authenticator). In today’s world, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required