1.0 |
Implementing the Network Infrastructure to Support WLANs Configuring and Troubleshooting the Network Infrastructure to Support WLANs |
1.01. | Cisco Discovery Protocol |
1.02. | VTP Modes (Server, Client, Transparent) |
1.03. | VLANs vs. Routed Interfaces |
1.04. | Trunks vs. Access Ports |
1.05. | Load Balancing |
1.06. | Link Aggregation |
1.07. | Spanning Tree Protocol Manipulations |
1.08. | HSRP |
1.09. | Implementing Initial Network Connectivity in WLCs (Management Interface, AP-Manager, Virtual Interface, Service Port Interface, Dynamic Interface Configuration) |
1.10. | VLAN Filtering |
1.11. | WLC as DHCP Server |
1.12. | Wireless Services Module (WiSM) Setup |
1.13. | Configuring Power over Ethernet |
1.14. | Configuring Client Supplicant (ADU, CSSC) to Connect and Authenticate to SSIDs Using EAP, PEAP, EAP-FAST, LEAP and EAP-TLS, WEP, WPA, and WPAv2 |
1.15. | Implementing Relevant Network and Management Services on Switches, APs, LWAPPs, Location Appliance Server, WLCs, and Cisco WCS (NTP, Syslog, DHCP, SNMP, FTP, TFTP, HTTP, HTTPS, Telnet, SSH) |
1.16. | Implementing QoS Services over the Wired Infrastructure |
1.17. | Configuring Marking Using DSCP |
1.18. | Configuring Marking Using IP Precedence |
1.19. | Configuring Marking Using CoS |
1.20. | Configuring CoS to DSCP Mappings |
1.21. | Configuring Policing (Modular QoS) |
1.22. | Static Routing |
1.23. | Basic Dynamic Routing (OSPF, EIGRP) |
1.24. | Subnetting |
1.25. | Troubleshooting Basic Network Connectivity Issues Using Traceroute, Extended Ping, Debugs, etc. |
1.26. | Implementing Basic Enterprise Multicast (IGMP, PIM) |
2.0 |
Implementing Autonomous Infrastructure Configuring and Troubleshooting Autonomous Infrastructure |
2.01. | Implementing VLAN Trunking |
2.02. | Understanding Mode of Operation for WDS and Infrastructure APs |
2.03. | Implementing a WDS Solution |
2.04. | Implementing a WDS Solution Using a RADIUS Server |
2.05. | Implementing WDS Server Groups |
2.06. | Configuring Infrastructure APs to Use the WDS Service |
2.07. | Understanding the EAP Protocols That Are Supported from a Cisco IOS AP Configured as a Local Authenticator |
2.08. | Configuring NAS Devices to Use the Local Authenticator AP |
2.09. | MAC Authentication vs. EAP Authentication |
2.10. | Assigning Shared Settings from a Group of Users, Such as SSID, VLAN, etc. |
2.11. | Troubleshooting Failing Authentications |
2.12. | Configuring SSID and MBSSID on the Autonomous AP |
2.13. | Configuring and Assigning Different Characteristics to an SSID |
2.13.1. | Security |
2.13.2. | Authentication |
2.13.3. | Encryption |
2.14. | Mapping VLANs to SSIDs |
2.15. | Advanced Radio Setting Parameters (Such as DTIM) |
2.16. | Advertising (or Hiding) SSID Presence to WLAN Clients |
2.17. | Understanding Radio Roles and Their Individual Attributes |
2.18. | AP External Antenna Settings |
2.19. | Impact of the Antenna Characteristics Settings |
2.20. | Configuring Filters on AP Radio Interfaces |
2.21. | AP Access Management |
2.22. | Management Frame Protection |
2.23. | Implementing Multicast Settings (IGMP, PIM) |
2.24. | Implementing Wireless QoS |
2.25. | Implementing Peer-to-Peer Blocking |
2.26. | Configuring Client Access Limitations |
2.27. | Troubleshooting Bridge Connectivity Problems |
2.28. | Bridging Multiple VLANs Across a Point-to-Point Link |
2.29. | Filtering VLANs Across a Point-to-Point Link |
2.30. | Determining and Troubleshooting the Parent-Child Relationship in an 802.11 Bridge Link |
2.31. | Fine-Tuning Point-to-Point Connections to Maintain a Reliable Link |
2.32. | Converting Autonomous APs to LWAPP APs Using Different Methods (Upgrade Tool, Cisco WCS Templates) |
3.0 |
Implementing a Unified Infrastructure Configuring and Troubleshooting a Unified Infrastructure |
3.01. | WLC Interface Settings (Management Interface, AP-Manager Interface, Virtual Interface, Service Port Interface, Dynamic Interface) |
3.02. | WLC – Tagged vs. Untagged Interfaces |
3.03. | WLC – Link Aggregation (LAG vs. Backup Interface) |
3.04. | WLC – SNMP |
3.05. | Mobility – Asymmetric vs. Symmetric Tunneling |
3.06. | Mobility Anchor |
3.07. | Mobility – Layer 2 and Layer 3 Roaming |
3.08. | Mobility – AP Failover Within a Mobility Group |
3.09. | Mobility – AP Failover Outside a Mobility Group |
3.10. | Troubleshooting Roaming Issues |
3.11. | Implementing WLANs |
3.12. | WLAN to Interface Mapping |
3.13. | WLANs – Configuring DHCP (on Cisco IOS Software, Windows Server, and WLCs) |
3.14. | WLANs – Configuring Peer-to-Peer Blocking |
3.15. | WLANs – Configuring Layer 2 Security |
3.15.1. | 802.1X |
3.15.2. | WPA vs. WPA2 |
3.15.3. | Static WEP |
3.15.4. | Cisco Key Integrity Protocol |
3.15.5. | TKIP |
3.15.6. | Cisco Centralized Key Management |
3.15.7. | PSK |
3.15.8. | AES |
3.16. | WLANs – Configuring WLAN Override |
3.17. | WLANs – Configuring Access Point Groups |
3.18. | WLANs – Configuring Radio Policies |
3.19. | WLANs – Configuring AP Modes (Local, H-REAP, Monitor, Sniffer, Rogue Detector) |
3.20. | WLANs – Configuring WLAN QoS Settings |
3.21. | WLANs – Cisco Aironet Extensions |
3.22. | WLANs - Client Exclusion |
3.23. | WLANs – Web Authentication |
3.24. | Implementing Ethernet Multicast Support on the WLC |
3.25. | Configuring a Multicast IP Address |
3.26. | Implementing and Controlling Management Access |
3.27. | Different ACL Types |
3.28. | CPU ACL |
3.29. | Configuring Device Access Control |
3.30. | Configuring Local Management Users |
3.31. | Configuring Cisco Secure ACS (TACACS+ and RADIUS) for Authenticating, Authorizing, and Accounting |
3.32. | Management Users |
3.33. | Controller Redundancy |
3.34. | Configuring Primary, Secondary, and Tertiary Controllers |
3.35. | Implementing LWAPP Discovery Mechanisms |
3.35.1. | OTAP |
3.35.2. | Cisco IOS DHC |
3.35.3. | DHCP Option 43 |
3.35.4. | Windows DHCP Server 2003 |
3.35.5. | Windows 2003 DNS |
3.35.6. | Troubleshooting the Discovery Process |
3.36. | Implementing Auto-RF to Adapt to Site Requirements |
3.37. | 802.11h |
3.38. | Radio Resource Management Settings: |
3.38.1. | Coverage Hole Detection Tuning |
3.38.2. | Dynamic Channel Assignment (DCA) vs. Static |
3.38.3. | Dynamic Transmit Power Control (DTPC) vs. Static |
3.38.4. | RF Groups |
3.39. | Validating Trap Generation, Notifications in Cisco WCS and WLC |
3.40. | Wireshark and Cisco Spectrum Expert |
4.0 |
Implementing Unified Controllers and APs Configuring and Troubleshooting Unified Controllers and APs |
4.01. | Implementing Peer-to-Peer Blocking |
4.02. | Implementing Security |
4.02.1. | Configuring WPS Settings |
4.02.2. | Configuring MFP and AP Authentication |
4.02.3. | Configuring AP Authorization |
4.02.4. | Rogue APs |
4.02.5. | Configuring WLC IDS |
4.02.6. | Configuring EAP-FAST |
4.02.7. | Configuring EAP-TLS |
4.02.8. | Configuring PEAP |
4.02.9. | Configuring LEAP |
4.03. | Applying an Access Control List to an Interface |
4.04. | Applying an Access Control List to the Controller CPU |
4.05. | Applying an Access Control List to a WLAN |
4.06. | Implementing Wireless QoS |
4.07. | 802.11e Configuration (EDCA, WMM, etc.) |
4.08. | Implementing Local EAP Authentication Against the Local User List |
4.09. | Implementing Local EAP Authentication Against an External LDAP |
4.10. | Implementing Layer 3 Security Policies (Web Authentication, Pass-Through, ACLs) |
4.11. | Creating Guest User Accounts |
4.12. | Lobby Ambassador |
4.13. | Web Authentication |
4.14. | Configuring Wired Guest Access (With or Without Anchor Controller) |
4.15. | Configuring Wireless Guest Access (With or Without Anchor Controller) |
4.16. | Anchor Controller |
4.17. | Implementing Layer 2 Security Policies |
4.17.1. | 802.1X |
4.17.2. | WPA vs. WPA2 |
4.17.3. | Static WEP |
4.17.4. | Cisco Key Integrity Protocol |
4.17.5. | TKIP |
4.17.6. | Cisco Centralized Key Management |
4.17.7. | PSK |
4.17.8. | AES |
4.17.9. | Mac Filtering |
4.18. | Implementing Local DHCP Services for Clients on the WLC |
4.19. | Implementing AAA (WLC to RADIUS and LDAP) |
4.20. | Configuring the Cisco Secure ACS (RADIUS, TACACS+) Server |
4.20.1. | ACS – User Setup Parameters |
4.20.2. | ACS – Group Setup Parameters |
4.20.3. | ACS – Network Configuration Parameters |
4.20.4. | ACS – System Configuration Parameters |
4.20.5. | ACS – External User Database Settings |
4.20.6. | ACS – Reports and Activity |
4.20.7. | ACS – Create and Enroll Server Certificate |
4.20.8. | ACS – Global Authentication |
4.20.9. | ACS – Group Mappings |
4.20.10. | ACS – VLAN Assignment |
4.21. | Adding AAA Clients |
4.22. | Troubleshooting Client Connectivity Problems Using Extended Pings, Traceroute, and Debugs |
5.0 |
Implementing Cisco Unified WCS and Location Configuring and Troubleshooting Cisco Unified WCS and Location |
5.01. | Managing Cisco WCS User Accounts |
5.02. | Adding Controllers to Cisco WCS |
5.03. | Implementing Location Appliance Server to Cisco WCS |
5.04. | SNMP |
5.05. | Creating and Deploying Controller Templates |
5.06. | Preparing Import Building and Floor Map |
5.06.1. | AP Placement |
5.06.2. | Antenna Orientation |
5.06.3. | Calibration |
5.07. | Creating a Floor Coverage Proposal Using the Planning Mode Tool |
5.08. | Performing Maintenance Operations |
5.09. | Performing System Tasks |
5.10. | Tracking Parameters |
5.11. | Filtering Parameters |
5.12. | History Parameters |
5.13. | Notification Parameters |
5.14. | Asset Information |
5.15. | Tune Location Services |
5.15.1. | Tracking Parameters |
5.15.2. | Notifications |
5.15.3. | Timers |
5.16. | Validating Client Connectivity and Troubleshooting the Client via Cisco WCS and WLC |
5.17. | Validating Location Information in Cisco WCS and WLC |
5.18. | Validating Security Events with Cisco WCS and WLC |
5.18.1. | IDS |
5.18.2. | Rogue Detection, Management |
5.18.3. | Alarms and Events |
5.18.4. | Alerts |
5.19. | Validating Trap Generation and Notifications in Cisco WCS and WLC |
5.20. | Running Reports |
5.21. | Troubleshooting Client Roaming |
5.22. | Troubleshooting Client Connectivity Issues |
6.0 |
Implementing Voice over Wireless Configuring and Troubleshooting Voice over Wireless |
6.01. | Implementing Support for Cisco Unified Wireless IP Phone 7920 and 7921 Deployments for both Unified and Autonomous |
6.02. | Configuring Cisco Unified Wireless IP Phone 7920 and 7921 to Join the Call Manager |
6.03. | Cisco Unified Wireless IP Phone 7920 and 7921 Profile Configuration |
6.04. | Implementing Security Settings (Encryption and Authentication) on Phone and Infrastructure |
6.04.1. | 802.1X |
6.04.2. | WPA vs. WPA2 |
6.04.3. | Static WEP |
6.04.4. | Cisco Key Integrity Protocol |
6.04.5. | TKIP |
6.04.6. | Cisco Centralized Key Management |
6.04.7. | PSK |
6.04.8. | AES |
6.05. | Fast Secure Roaming |
6.06. | Configuring Voice QoS |
6.06.1. | EDCA |
6.06.2. | WMM |
6.06.3. | CAC |
6.06.4. | 802.11e |
6.07. | Configuring End-to-End QoS Marking (over Both Wired and Wireless Infrastructure) |
6.08. | Audit Voice Deployment |
6.09. | Troubleshooting Connectivity Issues |