In: Computer Science
Fast secure roaming mechanisms are heavily tested on the CWT exam. Changes in the WLAN environment can cause headaches to the Wireless administrator. Discuss with your fellow classmates some of the most stable ways that you as an administrator might troubleshoot and eliminate some of these issues within your wireless network.
This describes the various forms of wireless roaming and
fast-secure roaming ways on the market for IEEE 802.11 Wireless
LANs (WLANs) supported on the Cisco Unified Wireless Network
(CUWN).
This doesn't give all of the specifics regarding however every
methodology works or however they're organized. the most purpose of
this document is to explain the variations between the assorted
techniques on the market, their blessings and limitations, and also
the frames-exchange on every methodology. samples of area unita
network|WLAN|wireless fidelity|WiFi|local area network|LAN}
Controller (WLC) debugs are provided, and wireless packet captures
square measure employed in order to research and make a case for
the events that occur for every roaming methodology
delineate.
IEEE 802.11 wireless local area network Fundamentals
IEEE 802.11 wireless local area network Security
IEEE 802.1X/EAP Basics
Components Used
The information during this relies on Cisco wireless local area
network Controller software package Version seven.4, however most
of the right outputs and behaviors delineate would possibly apply
to any software package version that supports the ways mentioned.
Specifics of all the ways explained here stay a similar on later
Cisco wireless local area network Controller codes (up to version
eight.3 by the time this text was updated).
Background info
Before an outline of the various fast-secure roaming ways on the
market for WLANs is given, it's vital to know however the wireless
local area network association method works, and the way a daily
roaming event happens once there's no security organized on the
Service Set symbol (SSID).
When AN 802.11 wireless shopper connects to AN Access purpose
(AP), before it begins to pass traffic (wireless information
frames), it initial should pass the fundamental 802.11 Open System
authentication method. Then, the association method should be
completed. consider the Open System authentication method as
"connecting the cable" on the AP that the shopper selects. this is
often vital to know, as a result of it's continually the wireless
shopper that selects that AP is most well-liked, and bases the
choice on multiple factors that modify between vendors. this is
often why the shopper begins this method by causing the
Authentication frame to the chosen AP, as shown later during this
part. The AP cannot request that you just establish a
affiliation.