Cisco Cisco IOS XE 3.5E

Page de 50
 
27
Release Notes for Catalyst 3850 Series Switch, Cisco IOS XE Release 3.2.xSE
OL-28114-04
  Features
Efficient AP upgrade 
When upgrading the image of an AP, you can use 
the pre-image download feature to reduce the 
amount of time the AP is unavailable to serve 
clients. 
AAA override (VLAN and ACL)
When AAA Override option is set, the controller 
allows the RADIUS server to set VLAN or ACL 
on a per-MAC address basis and override the 
global values for the VLAN and ACL as 
configured on the WLAN. 
Basic AAA functions
Authentication is used to ensure that the person 
attempting to use the device or service is 
authorized to use it according to the credentials 
configured. Authorization is used to configure the 
specific actions a user (or group of users) is 
allowed to perform on a device. Accounting is 
used for billing purposes to log the amount of 
packets or traffic forwarded through a device.
Posturing
A service that Cisco ISE provides is to scan 
endpoint compliancy; for example, AV/AS 
software installation and its definition file validity 
(known as Posture).
Extensible Authentication Protocol (EAP) 
Authentication
EAP is an authentication framework frequently 
used in wireless networks for providing transport 
and usage of keying material and parameters 
generated by EAP methods which include PEAP, 
EAP-FAST, TLS, and so on.
Accounting 
Enables you to track the services that are accessed 
and the amount of network resources that are 
consumed.
Device Profiling
Provides the functionality in discovering and 
determining the capabilities of all the attached 
endpoints on your network, regardless of their 
device types, to ensure and maintain appropriate 
access to your network. It primarily collects an 
attribute or a set of attributes of all the endpoints 
on network and classifies them according to their 
profiles.
Central Guest access
Allows a guest user to connect to a designated 
WLAN and access the guest network as 
configured by the administrator after completing 
the configured authentication.
Table 9
Wireless Features  (continued)
Feature
Description