Cisco Cisco Wireless LAN Controller Module Guía Para Resolver Problemas
Securing Wireless LAN Controllers (WLCs)
Document ID: 109669
Contents
Introduction
Prerequisites
Requirements
Components Used
Conventions
Traffic Handling in WLCs
Controlling Traffic
Controlling Management Access
CPU ACLs
Example
Testing Before CPU ACL
Testing After the CPU ACL
Strict CPU ACLs
Control Plane Policing
Strong Encryption for HTTPs traffic
Session Control
Telnet/SSH Settings
Console Port
Putting all Together
Security Practices
Related Information
Prerequisites
Requirements
Components Used
Conventions
Traffic Handling in WLCs
Controlling Traffic
Controlling Management Access
CPU ACLs
Example
Testing Before CPU ACL
Testing After the CPU ACL
Strict CPU ACLs
Control Plane Policing
Strong Encryption for HTTPs traffic
Session Control
Telnet/SSH Settings
Console Port
Putting all Together
Security Practices
Related Information
Introduction
This document offers an overview of several important aspects needed to handle the security interaction
between Wireless LAN Controllers (WLCs) and the network where they are connected. This document
focuses primarily on traffic control, and does not address WLANs security policies, AAA or WPS.
between Wireless LAN Controllers (WLCs) and the network where they are connected. This document
focuses primarily on traffic control, and does not address WLANs security policies, AAA or WPS.
Topics affecting the traffic with destination to the controller are covered in this document, and not related
to traffic which is related to user to network.
to traffic which is related to user to network.
Note: Validate changes before applying them to your network, as some of the examples in this document can
block administrative access to your controllers if applied incorrectly.
block administrative access to your controllers if applied incorrectly.
Prerequisites
Requirements
Cisco recommends that you have knowledge of these topics:
Knowledge of how to configure the WLC and Lightweight Access Point (LAP) for basic operation
•
Basic knowledge of the OSI model
•
Understanding how Access Control List (ACL) works
•