Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
Hi!When you create a site, regardless if its a "building" or "area", it will always hierarchy wise be placed under the "Global" site.That means, any unassigned devices will be a member of the "Global" site until assigned to a site.Get the Site Id for...
Virtual IP is used for three things:
* DHCP proxying (WLC hides the real DHCP server identity to the clients and shows this instead)
The Virtual IP address does not really matter here.
* Guest login splash page redirection. If WLC is to presen...
Addition to my own post (smile): In a real network I would do:"Managed SSID" - Mark as Malicious and alarm (someone is claiming to be my network!)"RSSI >-95 dBm - Mark as Friendly (ex -70 to -95 probably outside our premises)"RSSI >-70 dBm) - Mark as...
Rogue detection is a way of being aware of other APs in your surroundings, I would not advise on turning the SNMP traps off totally. On the other hand the customer cant really blame you because there are other APs around their network? In 99,9% of al...
Correct, there are different allowed tx power levels for the different 5 GHz bands, in this case we were dimensioning a symmetrical link based on what the weakest client device was able to use uplink for a specific band, and I used the figures given...