Cisco Cisco IOS XE 3.5E
![Cisco](https://files.manualsbrain.com/attachments/7380d0050044647c30f5c24bbbf5d0c0b6d9bb84/common/fit/150/50/faa183d287233c52228cfea3dbc2a127fe780f60564fcb0955d9c3d1cd23/brand_logo.png)
27
Release Notes for Catalyst 3850 Series Switch, Cisco IOS XE Release 3.2.xSE
OL-28114-04
Features
Efficient AP upgrade
When upgrading the image of an AP, you can use
the pre-image download feature to reduce the
amount of time the AP is unavailable to serve
clients.
the pre-image download feature to reduce the
amount of time the AP is unavailable to serve
clients.
AAA override (VLAN and ACL)
When AAA Override option is set, the controller
allows the RADIUS server to set VLAN or ACL
on a per-MAC address basis and override the
global values for the VLAN and ACL as
configured on the WLAN.
allows the RADIUS server to set VLAN or ACL
on a per-MAC address basis and override the
global values for the VLAN and ACL as
configured on the WLAN.
Basic AAA functions
Authentication is used to ensure that the person
attempting to use the device or service is
authorized to use it according to the credentials
configured. Authorization is used to configure the
specific actions a user (or group of users) is
allowed to perform on a device. Accounting is
used for billing purposes to log the amount of
packets or traffic forwarded through a device.
attempting to use the device or service is
authorized to use it according to the credentials
configured. Authorization is used to configure the
specific actions a user (or group of users) is
allowed to perform on a device. Accounting is
used for billing purposes to log the amount of
packets or traffic forwarded through a device.
Posturing
A service that Cisco ISE provides is to scan
endpoint compliancy; for example, AV/AS
software installation and its definition file validity
(known as Posture).
endpoint compliancy; for example, AV/AS
software installation and its definition file validity
(known as Posture).
Extensible Authentication Protocol (EAP)
Authentication
Authentication
EAP is an authentication framework frequently
used in wireless networks for providing transport
and usage of keying material and parameters
generated by EAP methods which include PEAP,
EAP-FAST, TLS, and so on.
used in wireless networks for providing transport
and usage of keying material and parameters
generated by EAP methods which include PEAP,
EAP-FAST, TLS, and so on.
Accounting
Enables you to track the services that are accessed
and the amount of network resources that are
consumed.
and the amount of network resources that are
consumed.
Device Profiling
Provides the functionality in discovering and
determining the capabilities of all the attached
endpoints on your network, regardless of their
device types, to ensure and maintain appropriate
access to your network. It primarily collects an
attribute or a set of attributes of all the endpoints
on network and classifies them according to their
profiles.
determining the capabilities of all the attached
endpoints on your network, regardless of their
device types, to ensure and maintain appropriate
access to your network. It primarily collects an
attribute or a set of attributes of all the endpoints
on network and classifies them according to their
profiles.
Central Guest access
Allows a guest user to connect to a designated
WLAN and access the guest network as
configured by the administrator after completing
the configured authentication.
WLAN and access the guest network as
configured by the administrator after completing
the configured authentication.
Table 9
Wireless Features (continued)
Feature
Description