2.13 WLAN Configuration

Configure a WPA2 Enterprise WLAN on the WLC

SNMP and RADIUS

As per the diagram, PC1 is a server running SNMP (Simple Network Management Protocol) and RADIUS (Remote Authentication Dial-In User Service) software.

SNMP is used to monitor and log the network. This can be achieved by configuring the WLC to forward all SNMP Log Messages which are known as SNMP Traps to the SNMP Server PC1.

The same Server PC1 is also a RADIUS server that will serve as the primary WLAN Authentication method and also serve as an AAA Server (Authentication, Authorization, and Accounting. By opting for such a setup, users will have to enter their own username and password credentials to Authenticate to the WiFI rather than entering a publicly known pre-shared key.

Thanks to such method, individual user access can be tracked and audited if required. User accounts can be added and/or removed in a central location resulting in ease of user management and monitoring.

A RADIUS server is required for WLANs that use WPA2 Enterprise authentication.

Configure SNMP Server Information

On Cisco WLCs, SNMP configuration is covered through the following 7 steps:

  1. Click on the “MANAGEMENT” tab
  2. Click “SNMP” to expand its sub-menus
  3. Click “TRAP RECEIVERS” to see the existing SNMP Servers
  4. Click “NEW” to configure the SNMP Trap
  5. Enter the SNMP Community Name
  6. Enter the IP Address of the SNMP Server
  7. Click “Apply

The WLC will now start forwarding SNMP log messages to the SNMP server specified.

Configure RADIUS Server Information

In such a case, Authentication will be handled by the RADIUS server running on PC1.

To configure the WLC with the RADIUS server information, click the SECURITY tab > RADIUS > Authentication. No RADIUS servers are currently configured. Click New… to add PC-A as the RADIUS server.

On Cisco WLCs, RADIUS Server configuration is covered through the following 7 steps:

  1. Click on the “SECURITY” tab
  2. Click “RADIUS
  3. Click “AUTHENTICATION
  4. Click “NEW” to add a RADIUS Server
  5. Enter the IP Address of the RADIUS Server
  6. Enter the Shared Secret to be used between the server and the WLC and not the clients connection
  7. Click “Apply

Once the changes are applied, the list of configured RADIUS Authentication Servers will refresh with the new server listed, and clients will start to authenticate and associate to the network via the RADIUS Server specified.

Configure a new Interface

On Cisco WLCs, a VLAN Interface configuration is covered through the following 8 steps:

  1. Click on “CONTROLLERS
  2. Click on “INTERFACE
  3. Click on “NEW
  4. Configure the VLAN name and ID
  5. Configure the port and Interface addressing
  6. Configure the DHCP server address
  7. Apply the changes and Confirm
  8. Verify the Interfaces

Configure a DHCP Scope

On Cisco WLCs, a DHCP Scope configuration is covered through the following 5 steps:

  1. Click on “INTERNAL DHCP SERVER
  2. Click on “DHCP SCOPE
  3. Click on “NEW
  4. Name the newly created DHCP scope
  5. Verify the new DHCP scope in the list
  6. Configure and enable the new DHCP scope
  7. Verify the enable DHCP scope

Configure a WPA2 Enterprise WLAN

By default, any newly created WLANs on the WLC will use WPA2 with AES (Advanced Encryption System). 802.1X is the default key management protocol utilized to communicate with the RADIUS Server.

At this stage, the only thing left to do is to create a new WLAN to use interface VLAN (ex.3).

On Cisco WLCs, Configuring a WLAN to use a VLAN Interface is covered through the following 12 steps:

  1. Click “WLANS
  2. Click on “GO” next to the “CREATE NEW” dropdown
  3. Configure the WLAN Name and SSID
  4. Click the “ENABLED” checkbox
  5. Choose “VLAN 3” and click “APPLY” and “OK” on the dialog
  6. Click the “SECURITY” tab
  7. Verify that “AES” is the encryption method
  8. Verify that “802.1X” is the authentication protocol
  9. Click “AAA SERVERS” tab
  10. Select the RADIUS server with the right IP from the dropdown next to “Server 1”
  11. Click “APPLY
  12. Verify the new WLAN is available.