Cisco Cisco 5760 Wireless LAN Controller
21
Release Notes for Cisco 5760 Controller, Cisco IOS XE Release 3.2.xSE
OL-28114-04
Features
Client and RFID tag location (see Context aware) The controller enables you to configure
radio-frequency identification (RFID) tag
tracking. RFID tags are small wireless devices
that are affixed to assets for real-time location
tracking. They operate by advertising their
location using special 802.11 packets, which are
processed by access points, the controller, and the
mobility services engine.
tracking. RFID tags are small wireless devices
that are affixed to assets for real-time location
tracking. They operate by advertising their
location using special 802.11 packets, which are
processed by access points, the controller, and the
mobility services engine.
Efficient AP upgrade
When upgrading the image of an AP, you can use
the pre-image download feature to reduce the
amount of time the AP is unavailable to serve
clients.
the pre-image download feature to reduce the
amount of time the AP is unavailable to serve
clients.
HA SKU and licensing
A high availability SKU AIR-CT5760-HA-K9 is
available to deploy as a redundant N+1 controller
in case the primary controller goes down.
available to deploy as a redundant N+1 controller
in case the primary controller goes down.
You do not need to purchase duplicate AP scale
licensing on the redundant controller.
licensing on the redundant controller.
AAA override (VLAN and ACL)
When AAA Override option is set, the controller
allows the RADIUS server to set VLAN or ACL
on a per-MAC address basis and override the
global values for the VLAN and ACL as
configured on the WLAN.
allows the RADIUS server to set VLAN or ACL
on a per-MAC address basis and override the
global values for the VLAN and ACL as
configured on the WLAN.
Basic AAA functions
Authentication is used to ensure that the person
attempting to use the device or service is
authorized to use it according to the credentials
configured. Authorization is used to configure the
specific actions a user (or group of users) is
allowed to perform on a device. Accounting is
used for billing purposes to log the amount of
packets or traffic forwarded through a device.
attempting to use the device or service is
authorized to use it according to the credentials
configured. Authorization is used to configure the
specific actions a user (or group of users) is
allowed to perform on a device. Accounting is
used for billing purposes to log the amount of
packets or traffic forwarded through a device.
Posturing
A service that Cisco ISE provides is to scan
endpoint compliancy; for example, AV/AS
software installation and its definition file validity
(known as Posture).
endpoint compliancy; for example, AV/AS
software installation and its definition file validity
(known as Posture).
Extensible Authentication Protocol (EAP)
Authentication
Authentication
EAP is an authentication framework frequently
used in wireless networks for providing transport
and usage of keying material and parameters
generated by EAP methods which include PEAP,
EAP-FAST, TLS, and so on.
used in wireless networks for providing transport
and usage of keying material and parameters
generated by EAP methods which include PEAP,
EAP-FAST, TLS, and so on.
Accounting
Enables you to track the services that are accessed
and the amount of network resources that are
consumed.
and the amount of network resources that are
consumed.
Table 8
Wireless Features (continued)
Feature
Description