1.0 |
Implementing the Network Infrastructure to Support WLANs
Configuring and Troubleshooting the Network Infrastructure to Support WLANs
|
1.01. |
Cisco Discovery Protocol |
1.02. |
VTP Modes (Server, Client, Transparent) |
1.03. |
VLANs vs. Routed Interfaces |
1.04. |
Trunks vs. Access Ports |
1.05. |
Load Balancing |
1.06. |
Link Aggregation |
1.07. |
Spanning Tree Protocol Manipulations |
1.08. |
HSRP |
1.09. |
Implementing Initial Network Connectivity in WLCs (Management Interface, AP-Manager, Virtual Interface, Service Port Interface, Dynamic Interface Configuration) |
1.10. |
VLAN Filtering |
1.11. |
WLC as DHCP Server |
1.12. |
Wireless Services Module (WiSM) Setup |
1.13. |
Configuring Power over Ethernet |
1.14. |
Configuring Client Supplicant (ADU, CSSC) to Connect and Authenticate to SSIDs Using EAP, PEAP, EAP-FAST, LEAP and EAP-TLS, WEP, WPA, and WPAv2 |
1.15. |
Implementing Relevant Network and Management Services on Switches, APs, LWAPPs, Location Appliance Server, WLCs, and Cisco WCS (NTP, Syslog, DHCP, SNMP, FTP, TFTP, HTTP, HTTPS, Telnet, SSH) |
1.16. |
Implementing QoS Services over the Wired Infrastructure |
1.17. |
Configuring Marking Using DSCP |
1.18. |
Configuring Marking Using IP Precedence |
1.19. |
Configuring Marking Using CoS |
1.20. |
Configuring CoS to DSCP Mappings |
1.21. |
Configuring Policing (Modular QoS) |
1.22. |
Static Routing |
1.23. |
Basic Dynamic Routing (OSPF, EIGRP) |
1.24. |
Subnetting |
1.25. |
Troubleshooting Basic Network Connectivity Issues Using Traceroute, Extended Ping, Debugs, etc. |
1.26. |
Implementing Basic Enterprise Multicast (IGMP, PIM) |
2.0 |
Implementing Autonomous Infrastructure
Configuring and Troubleshooting Autonomous Infrastructure
|
2.01. |
Implementing VLAN Trunking |
2.02. |
Understanding Mode of Operation for WDS and Infrastructure APs |
2.03. |
Implementing a WDS Solution |
2.04. |
Implementing a WDS Solution Using a RADIUS Server |
2.05. |
Implementing WDS Server Groups |
2.06. |
Configuring Infrastructure APs to Use the WDS Service |
2.07. |
Understanding the EAP Protocols That Are Supported from a Cisco IOS AP Configured as a Local Authenticator |
2.08. |
Configuring NAS Devices to Use the Local Authenticator AP |
2.09. |
MAC Authentication vs. EAP Authentication |
2.10. |
Assigning Shared Settings from a Group of Users, Such as SSID, VLAN, etc. |
2.11. |
Troubleshooting Failing Authentications |
2.12. |
Configuring SSID and MBSSID on the Autonomous AP |
2.13. |
Configuring and Assigning Different Characteristics to an SSID |
2.13.1. |
Security |
2.13.2. |
Authentication |
2.13.3. |
Encryption |
2.14. |
Mapping VLANs to SSIDs |
2.15. |
Advanced Radio Setting Parameters (Such as DTIM) |
2.16. |
Advertising (or Hiding) SSID Presence to WLAN Clients |
2.17. |
Understanding Radio Roles and Their Individual Attributes |
2.18. |
AP External Antenna Settings |
2.19. |
Impact of the Antenna Characteristics Settings |
2.20. |
Configuring Filters on AP Radio Interfaces |
2.21. |
AP Access Management |
2.22. |
Management Frame Protection |
2.23. |
Implementing Multicast Settings (IGMP, PIM) |
2.24. |
Implementing Wireless QoS |
2.25. |
Implementing Peer-to-Peer Blocking |
2.26. |
Configuring Client Access Limitations |
2.27. |
Troubleshooting Bridge Connectivity Problems |
2.28. |
Bridging Multiple VLANs Across a Point-to-Point Link |
2.29. |
Filtering VLANs Across a Point-to-Point Link |
2.30. |
Determining and Troubleshooting the Parent-Child Relationship in an 802.11 Bridge Link |
2.31. |
Fine-Tuning Point-to-Point Connections to Maintain a Reliable Link |
2.32. |
Converting Autonomous APs to LWAPP APs Using Different Methods (Upgrade Tool, Cisco WCS Templates) |
3.0 |
Implementing a Unified Infrastructure
Configuring and Troubleshooting a Unified Infrastructure
|
3.01. |
WLC Interface Settings (Management Interface, AP-Manager Interface, Virtual Interface, Service Port Interface, Dynamic Interface) |
3.02. |
WLC – Tagged vs. Untagged Interfaces |
3.03. |
WLC – Link Aggregation (LAG vs. Backup Interface) |
3.04. |
WLC – SNMP |
3.05. |
Mobility – Asymmetric vs. Symmetric Tunneling |
3.06. |
Mobility Anchor |
3.07. |
Mobility – Layer 2 and Layer 3 Roaming |
3.08. |
Mobility – AP Failover Within a Mobility Group |
3.09. |
Mobility – AP Failover Outside a Mobility Group |
3.10. |
Troubleshooting Roaming Issues |
3.11. |
Implementing WLANs |
3.12. |
WLAN to Interface Mapping |
3.13. |
WLANs – Configuring DHCP (on Cisco IOS Software, Windows Server, and WLCs) |
3.14. |
WLANs – Configuring Peer-to-Peer Blocking |
3.15. |
WLANs – Configuring Layer 2 Security |
3.15.1. |
802.1X |
3.15.2. |
WPA vs. WPA2 |
3.15.3. |
Static WEP |
3.15.4. |
Cisco Key Integrity Protocol |
3.15.5. |
TKIP |
3.15.6. |
Cisco Centralized Key Management |
3.15.7. |
PSK |
3.15.8. |
AES |
3.16. |
WLANs – Configuring WLAN Override |
3.17. |
WLANs – Configuring Access Point Groups |
3.18. |
WLANs – Configuring Radio Policies |
3.19. |
WLANs – Configuring AP Modes (Local, H-REAP, Monitor, Sniffer, Rogue Detector) |
3.20. |
WLANs – Configuring WLAN QoS Settings |
3.21. |
WLANs – Cisco Aironet Extensions |
3.22. |
WLANs - Client Exclusion |
3.23. |
WLANs – Web Authentication |
3.24. |
Implementing Ethernet Multicast Support on the WLC |
3.25. |
Configuring a Multicast IP Address |
3.26. |
Implementing and Controlling Management Access |
3.27. |
Different ACL Types |
3.28. |
CPU ACL |
3.29. |
Configuring Device Access Control |
3.30. |
Configuring Local Management Users |
3.31. |
Configuring Cisco Secure ACS (TACACS+ and RADIUS) for Authenticating, Authorizing, and Accounting |
3.32. |
Management Users |
3.33. |
Controller Redundancy |
3.34. |
Configuring Primary, Secondary, and Tertiary Controllers |
3.35. |
Implementing LWAPP Discovery Mechanisms |
3.35.1. |
OTAP |
3.35.2. |
Cisco IOS DHC |
3.35.3. |
DHCP Option 43 |
3.35.4. |
Windows DHCP Server 2003 |
3.35.5. |
Windows 2003 DNS |
3.35.6. |
Troubleshooting the Discovery Process |
3.36. |
Implementing Auto-RF to Adapt to Site Requirements |
3.37. |
802.11h |
3.38. |
Radio Resource Management Settings: |
3.38.1. |
Coverage Hole Detection Tuning |
3.38.2. |
Dynamic Channel Assignment (DCA) vs. Static |
3.38.3. |
Dynamic Transmit Power Control (DTPC) vs. Static |
3.38.4. |
RF Groups |
3.39. |
Validating Trap Generation, Notifications in Cisco WCS and WLC |
3.40. |
Wireshark and Cisco Spectrum Expert |
4.0 |
Implementing Unified Controllers and APs
Configuring and Troubleshooting Unified Controllers and APs
|
4.01. |
Implementing Peer-to-Peer Blocking |
4.02. |
Implementing Security |
4.02.1. |
Configuring WPS Settings |
4.02.2. |
Configuring MFP and AP Authentication |
4.02.3. |
Configuring AP Authorization |
4.02.4. |
Rogue APs |
4.02.5. |
Configuring WLC IDS |
4.02.6. |
Configuring EAP-FAST |
4.02.7. |
Configuring EAP-TLS |
4.02.8. |
Configuring PEAP |
4.02.9. |
Configuring LEAP |
4.03. |
Applying an Access Control List to an Interface |
4.04. |
Applying an Access Control List to the Controller CPU |
4.05. |
Applying an Access Control List to a WLAN |
4.06. |
Implementing Wireless QoS |
4.07. |
802.11e Configuration (EDCA, WMM, etc.) |
4.08. |
Implementing Local EAP Authentication Against the Local User List |
4.09. |
Implementing Local EAP Authentication Against an External LDAP |
4.10. |
Implementing Layer 3 Security Policies (Web Authentication, Pass-Through, ACLs) |
4.11. |
Creating Guest User Accounts |
4.12. |
Lobby Ambassador |
4.13. |
Web Authentication |
4.14. |
Configuring Wired Guest Access (With or Without Anchor Controller) |
4.15. |
Configuring Wireless Guest Access (With or Without Anchor Controller) |
4.16. |
Anchor Controller |
4.17. |
Implementing Layer 2 Security Policies |
4.17.1. |
802.1X |
4.17.2. |
WPA vs. WPA2 |
4.17.3. |
Static WEP |
4.17.4. |
Cisco Key Integrity Protocol |
4.17.5. |
TKIP |
4.17.6. |
Cisco Centralized Key Management |
4.17.7. |
PSK |
4.17.8. |
AES |
4.17.9. |
Mac Filtering |
4.18. |
Implementing Local DHCP Services for Clients on the WLC |
4.19. |
Implementing AAA (WLC to RADIUS and LDAP) |
4.20. |
Configuring the Cisco Secure ACS (RADIUS, TACACS+) Server |
4.20.1. |
ACS – User Setup Parameters |
4.20.2. |
ACS – Group Setup Parameters |
4.20.3. |
ACS – Network Configuration Parameters |
4.20.4. |
ACS – System Configuration Parameters |
4.20.5. |
ACS – External User Database Settings |
4.20.6. |
ACS – Reports and Activity |
4.20.7. |
ACS – Create and Enroll Server Certificate |
4.20.8. |
ACS – Global Authentication |
4.20.9. |
ACS – Group Mappings |
4.20.10. |
ACS – VLAN Assignment |
4.21. |
Adding AAA Clients |
4.22. |
Troubleshooting Client Connectivity Problems Using Extended Pings, Traceroute, and Debugs |
5.0 |
Implementing Cisco Unified WCS and Location
Configuring and Troubleshooting Cisco Unified WCS and Location
|
5.01. |
Managing Cisco WCS User Accounts |
5.02. |
Adding Controllers to Cisco WCS |
5.03. |
Implementing Location Appliance Server to Cisco WCS |
5.04. |
SNMP |
5.05. |
Creating and Deploying Controller Templates |
5.06. |
Preparing Import Building and Floor Map |
5.06.1. |
AP Placement |
5.06.2. |
Antenna Orientation |
5.06.3. |
Calibration |
5.07. |
Creating a Floor Coverage Proposal Using the Planning Mode Tool |
5.08. |
Performing Maintenance Operations |
5.09. |
Performing System Tasks |
5.10. |
Tracking Parameters |
5.11. |
Filtering Parameters |
5.12. |
History Parameters |
5.13. |
Notification Parameters |
5.14. |
Asset Information |
5.15. |
Tune Location Services |
5.15.1. |
Tracking Parameters |
5.15.2. |
Notifications |
5.15.3. |
Timers |
5.16. |
Validating Client Connectivity and Troubleshooting the Client via Cisco WCS and WLC |
5.17. |
Validating Location Information in Cisco WCS and WLC |
5.18. |
Validating Security Events with Cisco WCS and WLC |
5.18.1. |
IDS |
5.18.2. |
Rogue Detection, Management |
5.18.3. |
Alarms and Events |
5.18.4. |
Alerts |
5.19. |
Validating Trap Generation and Notifications in Cisco WCS and WLC |
5.20. |
Running Reports |
5.21. |
Troubleshooting Client Roaming |
5.22. |
Troubleshooting Client Connectivity Issues |
6.0 |
Implementing Voice over Wireless
Configuring and Troubleshooting Voice over Wireless
|
6.01. |
Implementing Support for Cisco Unified Wireless IP Phone 7920 and 7921 Deployments for both Unified and Autonomous |
6.02. |
Configuring Cisco Unified Wireless IP Phone 7920 and 7921 to Join the Call Manager |
6.03. |
Cisco Unified Wireless IP Phone 7920 and 7921 Profile Configuration |
6.04. |
Implementing Security Settings (Encryption and Authentication) on Phone and Infrastructure |
6.04.1. |
802.1X |
6.04.2. |
WPA vs. WPA2 |
6.04.3. |
Static WEP |
6.04.4. |
Cisco Key Integrity Protocol |
6.04.5. |
TKIP |
6.04.6. |
Cisco Centralized Key Management |
6.04.7. |
PSK |
6.04.8. |
AES |
6.05. |
Fast Secure Roaming |
6.06. |
Configuring Voice QoS |
6.06.1. |
EDCA |
6.06.2. |
WMM |
6.06.3. |
CAC |
6.06.4. |
802.11e |
6.07. |
Configuring End-to-End QoS Marking (over Both Wired and Wireless Infrastructure) |
6.08. |
Audit Voice Deployment |
6.09. |
Troubleshooting Connectivity Issues |