image

Understanding and Configuring 802.1X Port-Based Authentication

802.1X defines 802.1X port-based authentication as a client-server based access control and authentication protocol that restricts unauthorized clients from connecting to a LAN through publicly accessible ports. An authentication server validates each supplicant (client) connected to an authenticator (network access switch) port before making available any services offered by the switch or the LAN. Until Read More

image

LACP vs PAGP

In order to create maximum availability and stability for networks, link redundancy or redundant links are emphasized by enterprises and data centers when deploying networks. Etherchannel technology is the most effective way to achieve network redundancy by providing automatic recovery for the loss of a link. When configuring Etherchannel across network devices such as switches Read More

image

How to Convert a Cisco CAPWAP AP to a Mobility Express AP

by: François Vergès This article will explains how to convert a CAPWAP AP to a Cisco Mobility Express AP. The AP model used as an example in this article is a Cisco Aironet 2802i. Note: if you are planning on doing an AP-on-a-stick site survey with a Cisco Aironet 2800 or 3800, you will have Read More

image

Wi-Fi Roaming: Intra-controller vs Inter-controller vs Inter-subnet

A mobility even occur if a client roams between access points. As wireless clients move between APs on the same controller and APs join to different controller within the network four different types of roaming events can take place. 1. Intra Controller2. Inter Controller3. Inter-Subnet (Inter Controller – Layer 3) Intra Controller Roaming : If a Read More

image

How to Configure Allowed VLANs on Cisco Trunk

By default, all VLANs are allowed across the trunk link. We can verify that using the show interfaces trunk command: You can prevent traffic from certain VLANs from traversing a trunked link using the following interface mode command: switchport trunk allowed vlan {add | all | except | remove} vlan-list For example, to prevent traffic from VLAN Read More