Cisco Cisco Wireless LAN Controller Module Guía Para Resolver Problemas

Descargar
Página de 13
Securing Wireless LAN Controllers (WLCs)
Document ID: 109669
Contents
Introduction
 Prerequisites
      Requirements
      Components Used
      Conventions
 Traffic Handling in WLCs
 Controlling Traffic
 Controlling Management Access
 CPU ACLs
      Example
      Testing Before CPU ACL
      Testing After the CPU ACL
      Strict CPU ACLs
 Control Plane Policing
 Strong Encryption for HTTPs traffic
 Session Control
      Telnet/SSH Settings
      Console Port
 Putting all Together
 Security Practices
 Related Information
Introduction
This document offers an overview of several important aspects needed to handle the security interaction
between Wireless LAN Controllers (WLCs) and the network where they are connected. This document
focuses primarily on traffic control, and does not address WLANs security policies, AAA or WPS.
Topics affecting the traffic with destination to the controller are covered in this document, and not related
to traffic which is related to user to network.
Note: Validate changes before applying them to your network, as some of the examples in this document can
block administrative access to your controllers if applied incorrectly.
Prerequisites
Requirements
Cisco recommends that you have knowledge of these topics:
Knowledge of how to configure the WLC and Lightweight Access Point (LAP) for basic operation
• 
Basic knowledge of the OSI model
• 
Understanding how Access Control List (ACL) works
•