<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Wireless Access in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/wireless-access/m-p/2403662#M12129</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks to you both,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How about this?&amp;nbsp; Machine authentication for domain computers along with a RADIUS server and client side certificates?&amp;nbsp; The Guest SSID should only require a user name and password though.&amp;nbsp; Is this doable?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 14 Jan 2014 21:04:47 GMT</pubDate>
    <dc:creator>Scott Hanson</dc:creator>
    <dc:date>2014-01-14T21:04:47Z</dc:date>
    <item>
      <title>Wireless Access</title>
      <link>https://community.cisco.com/t5/wireless/wireless-access/m-p/2403659#M12122</link>
      <description>&lt;P&gt;All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;looking for some suggestions on improving wireless security through restricting what devices can connect.&amp;nbsp; I have been told about MAC lists, certificates, ACLs and a number of other things.&amp;nbsp; Environment is a 5508 WLC at a central site with mostly 1142 and 1262 LWAPs at various remote sites.&amp;nbsp; 2-3 SSIDs at each site and all SSIDs are the same across all sites to make it easy for users when visiting other sites.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance!&amp;nbsp; All replies rated.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P.S.&amp;nbsp; I misspelled "visiting" and the spell check here suggested "fisting"&amp;nbsp; as a suitable replacement.&amp;nbsp; ha.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 06:57:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wireless-access/m-p/2403659#M12122</guid>
      <dc:creator>Scott Hanson</dc:creator>
      <dc:date>2021-07-05T06:57:57Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless Access</title>
      <link>https://community.cisco.com/t5/wireless/wireless-access/m-p/2403660#M12124</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;MAC-based filter is no longer a safe haven because a lot of wireless sniffer can immediately pick up the MAC address of known clients.&lt;BR /&gt;&lt;BR /&gt;Good enforcement policy for RADIUS/TACACS coupled with 802.1x is a sure bet to ensure corporate networks are access by legitimate corporate clients only.&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support Wii App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Jan 2014 20:08:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wireless-access/m-p/2403660#M12124</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2014-01-14T20:08:43Z</dc:date>
    </item>
    <item>
      <title>Wireless Access</title>
      <link>https://community.cisco.com/t5/wireless/wireless-access/m-p/2403661#M12126</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It depends on what you really want to accomplish.&amp;nbsp; For example, if you have a radius server and active directory and all the computers are domain computers, you can use machine authentication to only allow domain computers access to the network.&amp;nbsp; Other ways is to use PEAP with AD user credentials or use of certificates on the clients side.&amp;nbsp; All of this is 802.1x with different flavors.&amp;nbsp; 802.1x requires a radius server and a certificate on the radius.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another way to go is Cisco ISE which can profile devices and you can then decide what devices can access the network.&amp;nbsp; Without really knowing what you have and what you want done, its hard to say what you can do:)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, &lt;BR /&gt; &lt;BR /&gt;Scott &lt;BR /&gt; &lt;BR /&gt;Help out other by using the rating system and marking answered questions as "Answered"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Jan 2014 20:12:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wireless-access/m-p/2403661#M12126</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2014-01-14T20:12:36Z</dc:date>
    </item>
    <item>
      <title>Wireless Access</title>
      <link>https://community.cisco.com/t5/wireless/wireless-access/m-p/2403662#M12129</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks to you both,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How about this?&amp;nbsp; Machine authentication for domain computers along with a RADIUS server and client side certificates?&amp;nbsp; The Guest SSID should only require a user name and password though.&amp;nbsp; Is this doable?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Jan 2014 21:04:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wireless-access/m-p/2403662#M12129</guid>
      <dc:creator>Scott Hanson</dc:creator>
      <dc:date>2014-01-14T21:04:47Z</dc:date>
    </item>
    <item>
      <title>Wireless Access</title>
      <link>https://community.cisco.com/t5/wireless/wireless-access/m-p/2403663#M12131</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;Machine authentication for domain computers along with a RADIUS server and client side certificates? &lt;/PRE&gt;&lt;P&gt;Very common scenario.&amp;nbsp; Doable.&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;The Guest SSID should only require a user name and password though.&amp;nbsp; Is this doable?&lt;/PRE&gt;&lt;P&gt; Sure.&amp;nbsp; Many scenarios. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.&amp;nbsp; Who hands out the username and passwords?&lt;/P&gt;&lt;P&gt;2.&amp;nbsp; Time-based login (how many hours does the username and password last and/or guest wireless is only accessible during these times). &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Jan 2014 21:10:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wireless-access/m-p/2403663#M12131</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2014-01-14T21:10:44Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless Access</title>
      <link>https://community.cisco.com/t5/wireless/wireless-access/m-p/2403664#M12134</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Leo,&lt;BR /&gt;&lt;BR /&gt;Who hands out the username and passwords?&lt;BR /&gt;&lt;BR /&gt;Cisco's office in Chicago does for guest:)&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Jan 2014 21:17:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wireless-access/m-p/2403664#M12134</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2014-01-14T21:17:57Z</dc:date>
    </item>
  </channel>
</rss>

