Addressing Table Device R-B-10 WLC-10 Admin LT-1 laptop RADIUS server Instructions G0/0/0.10 G0/0/0.100 G0/0/0.172 Interface management...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Addressing Table Device R-B-10 WLC-10 Admin LT-1 laptop RADIUS server Instructions G0/0/0.10 G0/0/0.100 G0/0/0.172 Interface management WLAN 10 NIC NIC NIC Address and Prefix 192.168.10.1/24 192.168.100.1/24 172.16.1.1/24 192.168.100.254 192.168.10.254/24 192.168.100.23 DHC 172.16.1.100/24 Wireless LAN Controller 1. Username/password are the default admin/admin. Connect to the WLC over HTTPS to the management interface. 2. Create a new interface: Name: WLAN 10. VLAN 10, physical port 1 3. Configure addressing (DHCP pool configured on the subinterface that is assigned to VLAN 10 on router R-B-10) 4. Configure the WLC with the RADIUS server IPv4 address 5. Use a shared secret of RADsecret 6. Create a new WLAN. Name it WLAN 10 and configure the SSID as SSID-10 7. The wireless LAN should use the VLAN interface that was previously configured 8. Configure the WLAN to use the WPA2 security policy and dot1x Authentication Key Management 9. Configure the WLAN to use the RADIUS server that was previously configured to authenticate wireless users 10. Open the Advanced tab and scroll down to the Flexconnect sections. Activate FlexConnect Local Switching and FlexConnect Local Auth 11. Verify that the WLAN is configured and operational 12. Name the DHCP scope Wired_Admin 13. Start the scope at address 192.168.100.240. End the scope at address 192.168.100.249 14. Other information required found in Addressing Table 15. Configure an SNMP server to receive traps from WLC a. Use the community name branch-wireless b. Use 172.16.1.100 as the server address 16. Configure LT-1 laptop to connect to WLAN 17. Create a new wireless profile on the host. Name: work net 18. Configure SSID profile for WLAN 19. Use enterprise authentication, username: user1 password: user1Pass 20. When finished, click Connect to Network. It will take time for the connection to be established. Branch-101 RADIUS Server W-Admin Host S4-1 o WLC-10 Remote Branch LAN Management: 192.168.100.0/24 Users: 192.168.10.0/24 LAP-1 Laptop Addressing Table Device R-B-10 WLC-10 Admin LT-1 laptop RADIUS server Instructions G0/0/0.10 G0/0/0.100 G0/0/0.172 Interface management WLAN 10 NIC NIC NIC Address and Prefix 192.168.10.1/24 192.168.100.1/24 172.16.1.1/24 192.168.100.254 192.168.10.254/24 192.168.100.23 DHC 172.16.1.100/24 Wireless LAN Controller 1. Username/password are the default admin/admin. Connect to the WLC over HTTPS to the management interface. 2. Create a new interface: Name: WLAN 10. VLAN 10, physical port 1 3. Configure addressing (DHCP pool configured on the subinterface that is assigned to VLAN 10 on router R-B-10) 4. Configure the WLC with the RADIUS server IPv4 address 5. Use a shared secret of RADsecret 6. Create a new WLAN. Name it WLAN 10 and configure the SSID as SSID-10 7. The wireless LAN should use the VLAN interface that was previously configured 8. Configure the WLAN to use the WPA2 security policy and dot1x Authentication Key Management 9. Configure the WLAN to use the RADIUS server that was previously configured to authenticate wireless users 10. Open the Advanced tab and scroll down to the Flexconnect sections. Activate FlexConnect Local Switching and FlexConnect Local Auth 11. Verify that the WLAN is configured and operational 12. Name the DHCP scope Wired_Admin 13. Start the scope at address 192.168.100.240. End the scope at address 192.168.100.249 14. Other information required found in Addressing Table 15. Configure an SNMP server to receive traps from WLC a. Use the community name branch-wireless b. Use 172.16.1.100 as the server address 16. Configure LT-1 laptop to connect to WLAN 17. Create a new wireless profile on the host. Name: work net 18. Configure SSID profile for WLAN 19. Use enterprise authentication, username: user1 password: user1Pass 20. When finished, click Connect to Network. It will take time for the connection to be established. Branch-101 RADIUS Server W-Admin Host S4-1 o WLC-10 Remote Branch LAN Management: 192.168.100.0/24 Users: 192.168.10.0/24 LAP-1 Laptop
Expert Answer:
Related Book For
Principles of Information Security
ISBN: 978-1285448367
4th Edition
Authors: Michael E. Whitman, Herbert J. Mattord
Posted Date:
Students also viewed these computer network questions
-
The following additional information is available for the Dr. Ivan and Irene Incisor family from Chapters 1-5. Ivan's grandfather died and left a portfolio of municipal bonds. In 2012, they pay Ivan...
-
Design a Java class that represents a cache with a fixed size. It should support operations like add, retrieve, and remove, and it should evict the least recently used item when it reaches capacity.
-
Solve exponential equation. Express irrational solutions in exact form and as a decimal rounded to three decimal places. 2 2x + 2 x - 12 = 0
-
What are reasons that a person may have a poor net cash flow yet be considered to be in good financial health?
-
Describe some techniques that car salespeople might use in negotiating the price of the car. What should you be aware of at no-haggle dealerships?
-
Allergies occur when the immune system is abnormally sensitive to particular substances. Why do people sometimes take antihistamines for their allergies? Can you guess from the word antihistamine...
-
Harmon Company had the following two transactions related to its delivery truck. 1. Paid $38 for an oil change. 2. Paid $400 to install special shelving units, which increase the operating efficiency...
-
Creative Solutions Corporation issued 1 , 0 0 0 shares to MacKay in exchange for $ 1 2 , 0 0 0 . Creative Solutions Corporation borrowed $ 3 0 , 0 0 0 from the bank, promising to repay it in two...
-
List supplier id, name, and city of any supplied food with its price is more than a nested query to find food items in the FOOD table that the price are more than Use a subquery or also called a...
-
Tasha Toy Incorporated, issued the corporate bond has a coupon of 6.5 percent and pays interest annually. The face value is RM1,000 and the current market price is RM1,108.15. The bond matures in 10...
-
What is an asset, and why is it important to understand its value? 2. How do businesses or individuals categorize and classify their assets? 3. What is the difference between tangible and intangible...
-
Nonfinancial has a greater profit than financial. Manufacturing has the greatest profit with retail trade in second place and transportation and warehousing in last. Durable goods has a greater...
-
Function 1: Password Checker function _one (pwd) Create a JavaScript function that meets the following requirements: Is passed a string representing a potential password The function determines if...
-
Given the function f(x) = 7x + 10 x < 0 7x+20 x > 0 Calculate the following values: f(-1) = f(0) = f(2) =
-
Julie Smith is the principal of Frederick High School in Winchester, VA. During the first full week of fall-semester, the Frederick County Sheriffs Department conducts an Active Shooter Emergency...
-
Cannabis Lecture would like to branch into the edibles market and has decided to sell some of its cultivation equipment. The equipment falls into a CCA class with a 20% CCA rate. They purchased the...
-
suppose a nickel-contaminated soil 15 cm deep contained 800 mg/kg Ni, Vegetation was planted to remove the nickel by phytoremediation. The above-ground plant parts average 1% Ni on a dry-weight bas...
-
Search the Web for examples of issue-specific security policies. What types of policies can you find? Draft a simple issue-specific policy using the format provided in the text that outlines Fair and...
-
Define a secure facility. What is the primary objective of the design of such a facility? What are some of the secondary objectives of the design of a secure facility?
-
How does a network-based IDPS differ from a host-based IDPS?
-
Resource leveling is a method to: a. Make sure everyone working on the project has approximately the same amount of work to accomplish b. A technique in which start and finish dates are adjusted...
-
Resources should be estimated against which entity: a. The deliverables level of the WBS b. Critical project constraints c. The Risk Breakdown Structure d. The schedule activities
-
When are the resource requirements estimated? a. After the activities have been defined but before the schedule has been developed b. After the schedule has been developed but before the activities...
Study smarter with the SolutionInn App