Информационное Руководство для Cisco Cisco 2000 Series Wireless LAN Controller

Скачать
Страница из 23
Q. How do I encrypt the configuration files on the WLC?
A. Encryption of configuration files is already available in WLCs. If you choose from the
WLC GUI, Commands > Upload File, you see the Configuration File Encryption
checkbox.
You can force the file to be encrypted through WCS in this way.
From the WCS GUI, choose Configure controller. It displays the list of WLCs
configured in the WCS. Click on a WLC.
♦ 
In the left−hand side, click the commands option. You receive a list of controller
commands.
♦ 
Under Upload/Download Commands ,choose download config from the
drop−down menu. At this time, you see this message: Note: Configuration file
encryption key is not set. Downloading configuration file will fail if encryption
key is needed. Please click here to setup encryption.
♦ 
Basically, you can force the WCS to always set an encryption key for WLC configurations.
Encryption is not enabled by default, but it can be enabled both in WLC and WCS, as needed.
Q. How do WLCs support oversized access points?
A. Controller software release 5.0 or later allows you to upgrade to an oversized access point
image by automatically deleting the recovery image to create sufficient space. This feature
affects only access points with 8 MB of flash (the 1100, 1200, and 1310 series access points).
All newer access points have a larger flash size than 8 MB. As of August 2007, there are no
oversized access point images, but as new features are added, the access point image size will
continue to grow. For more information, refer to the Supporting Oversized Access Point
Images section of the Cisco Wireless LAN Controller Configuration Guide, Release 6.0.
Related Information
Cisco Wireless LAN Controller Modules
• 
Cisco Wireless LAN Controllers Q&A
• 
802.11 MAC Counters on WLC 
• 
Cisco Wireless LAN Controller Configuration Guide, Release 7.0
• 
Wireless Support Page
• 
Technical Support & Documentation − Cisco Systems
• 
Contacts & Feedback | Help | Site Map
© 2014 − 2015 Cisco Systems, Inc. All rights reserved. Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks of
Cisco Systems, Inc.
Updated: Oct 08, 2009
Document ID: 69561