SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Wireless Clients Understanding the Cisco Compatible Extensions Program
The Cisco Compatible Extensions Program ,[object Object],[object Object],[object Object]
Cisco Compatible Extensions Program for Wi-Fi Tags   ,[object Object],[object Object],[object Object]
Cisco Compatible Extensions Explained
Cisco Compatible Extensions Example: Cisco Centralized Key Management Cisco Centralized Key Management allows the wireless infrastructure to cache the credentials, thus removing the need to conduct a full reauthentication when roaming
Cisco Compatible Extensions Example: AP-Specified Maximum Power In a heterogeneous environment, a power difference between clients and AP can prevent clients from being heard by the AP. With Cisco Compatible Extensions, the AP can detect and automatically configure the optimal transmit power for the client.
Cisco Compatible Extensions Example: Enhanced Roaming Ping-pong effect occurs when a wireless client is at the edge of two cells and hops between them. Cisco Compatible Extensions allows the AP to determine “inner regions” where scanning is not required and “outer regions” where the client, about to lose connection, would be allowed to scan for a better AP.
Cisco Compatible Extensions Example: Client Link Test Client link test allows the AP to query the client for its own reading of the AP signal, and provide a deeper view of the client connection to the network
Cisco Compatible Extensions Example: Client Reporting Client reporting allows the AP to get information from the client about its various parameters. This allows the administrator to collect data to optimize the network, but also, for example, for the AP to learn where the client would prefer to connect, and to redirect it to the right AP, if it is in range.
Cisco Compatible Extensions Example: Client MFP When using MFP, client and AP use a key to authenticate management messages, thus making AP impersonation virtually impossible
Cisco Compatible Extensions Features and Versions Summary  AP-assisted roaming Cisco Centralized Key Management enhancement Gratuitous probe  Response Diagnostic channel Association Location service AP-assisted roaming Cisco Centralized Key Management with other EAP types AP-directed roaming Location Keep alive Link test AP-assisted roaming Cisco Centralized Key Management with EAP-FAST Single sign on: LEAP, EAP-FAST AP-assisted roaming Cisco Centralized Key Management with LEAP Proxy ARP information element Mobility And Management Expedited bandwidth request U-APSD TSPEC CAC Voice metrics Voice over IP Wi-Fi Multimedia (WMM) eDCF Multiple SSIDs/VLANs on AP VLANs and QoS Management Frame Protection for clients NAC (wireless) EAT-TLS PEAP-MSCHAP WPA2 EAP-FAST PEAP-GTC WPA WEP IEEE 802.1X LEAP Cisco TKIP Security v5 v4 v3 v2 v1
Summary ,[object Object],[object Object],[object Object]
 

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Cato Management Console
Cato Management ConsoleCato Management Console
Cato Management Console
 
Mule integration solutions
Mule  integration solutionsMule  integration solutions
Mule integration solutions
 
Mule api and service management
Mule api and service managementMule api and service management
Mule api and service management
 
Comstor Mobility Express update
Comstor Mobility Express updateComstor Mobility Express update
Comstor Mobility Express update
 
NVK WiFi Solution 2015
NVK WiFi Solution 2015 NVK WiFi Solution 2015
NVK WiFi Solution 2015
 
Mule esb stripe
Mule esb stripeMule esb stripe
Mule esb stripe
 
Comcast SD-WAN Network Diagram
Comcast SD-WAN Network DiagramComcast SD-WAN Network Diagram
Comcast SD-WAN Network Diagram
 
Intelligent Transport
Intelligent TransportIntelligent Transport
Intelligent Transport
 
Aruba ClearPass Exchange Deep Dive
Aruba ClearPass Exchange Deep DiveAruba ClearPass Exchange Deep Dive
Aruba ClearPass Exchange Deep Dive
 
Mule esb–api layer
Mule esb–api layerMule esb–api layer
Mule esb–api layer
 
Mule saas
Mule  saasMule  saas
Mule saas
 
Enhancing mobile apps in the public facing enterprise with the aruba meridian...
Enhancing mobile apps in the public facing enterprise with the aruba meridian...Enhancing mobile apps in the public facing enterprise with the aruba meridian...
Enhancing mobile apps in the public facing enterprise with the aruba meridian...
 
Container Networking
Container NetworkingContainer Networking
Container Networking
 
Working with mobile app developers to enable indoor location based services
Working with mobile app developers to enable indoor location based servicesWorking with mobile app developers to enable indoor location based services
Working with mobile app developers to enable indoor location based services
 
DEVNET-1153 Enterprise Application to Infrastructure Integration – SDN Apps
DEVNET-1153	Enterprise Application to Infrastructure Integration – SDN AppsDEVNET-1153	Enterprise Application to Infrastructure Integration – SDN Apps
DEVNET-1153 Enterprise Application to Infrastructure Integration – SDN Apps
 
Benefits of disaggregation and open source networking in data centers
Benefits of disaggregation and open source networking in data centersBenefits of disaggregation and open source networking in data centers
Benefits of disaggregation and open source networking in data centers
 
Anypoint Platform Deployment Strategies
Anypoint Platform Deployment StrategiesAnypoint Platform Deployment Strategies
Anypoint Platform Deployment Strategies
 
Deploying mobile unified communications and collaboration (UCC) with Microsof...
Deploying mobile unified communications and collaboration (UCC) with Microsof...Deploying mobile unified communications and collaboration (UCC) with Microsof...
Deploying mobile unified communications and collaboration (UCC) with Microsof...
 
Fostering the Evolution of Network Based Cloud Service Providers.
Fostering the Evolution of Network Based Cloud Service Providers.Fostering the Evolution of Network Based Cloud Service Providers.
Fostering the Evolution of Network Based Cloud Service Providers.
 
Orchestrated Assurance
Orchestrated Assurance Orchestrated Assurance
Orchestrated Assurance
 

Ähnlich wie Iuwne10 S03 L04

14.) wireless (hyper dense wi fi)
14.) wireless (hyper dense wi fi)14.) wireless (hyper dense wi fi)
14.) wireless (hyper dense wi fi)
Jeff Green
 
Colubris Basic Customer Presentation
Colubris Basic Customer PresentationColubris Basic Customer Presentation
Colubris Basic Customer Presentation
daten
 

Ähnlich wie Iuwne10 S03 L04 (20)

14.) wireless (hyper dense wi fi)
14.) wireless (hyper dense wi fi)14.) wireless (hyper dense wi fi)
14.) wireless (hyper dense wi fi)
 
ICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solutionICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solution
 
ICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solutionICC Networking Link Series unified controller solution
ICC Networking Link Series unified controller solution
 
S5068 Presentation Live
S5068 Presentation LiveS5068 Presentation Live
S5068 Presentation Live
 
What you should pay attention to cisco aironet access point while purchasing
What you should pay attention to cisco aironet access point while purchasingWhat you should pay attention to cisco aironet access point while purchasing
What you should pay attention to cisco aironet access point while purchasing
 
Huawei AC6508 Wireless Access Controller Datasheet.pdf
Huawei AC6508 Wireless Access Controller Datasheet.pdfHuawei AC6508 Wireless Access Controller Datasheet.pdf
Huawei AC6508 Wireless Access Controller Datasheet.pdf
 
Service Provider Wi-Fi Networks: Scaling Signaling Transactions (White Paper)
Service Provider Wi-Fi Networks:  Scaling Signaling Transactions (White Paper)Service Provider Wi-Fi Networks:  Scaling Signaling Transactions (White Paper)
Service Provider Wi-Fi Networks: Scaling Signaling Transactions (White Paper)
 
Module 5 Wireless Network Design Considerations
Module 5   Wireless Network Design ConsiderationsModule 5   Wireless Network Design Considerations
Module 5 Wireless Network Design Considerations
 
4ipnet_Product_Catalogue_2016
4ipnet_Product_Catalogue_20164ipnet_Product_Catalogue_2016
4ipnet_Product_Catalogue_2016
 
Sales presentation EAP1200H
Sales presentation EAP1200HSales presentation EAP1200H
Sales presentation EAP1200H
 
2500 controller
2500 controller2500 controller
2500 controller
 
Colubris Basic Customer Presentation
Colubris Basic Customer PresentationColubris Basic Customer Presentation
Colubris Basic Customer Presentation
 
Cisco Intelligent WAN: Enabling the Next-Generation Branch
Cisco Intelligent WAN: Enabling the Next-Generation BranchCisco Intelligent WAN: Enabling the Next-Generation Branch
Cisco Intelligent WAN: Enabling the Next-Generation Branch
 
Meru Presentation
Meru PresentationMeru Presentation
Meru Presentation
 
Innovations in Mobility
Innovations in MobilityInnovations in Mobility
Innovations in Mobility
 
Simplifying the secure data center
Simplifying the secure data centerSimplifying the secure data center
Simplifying the secure data center
 
Acit Mumbai - understanding vpns
Acit Mumbai - understanding vpnsAcit Mumbai - understanding vpns
Acit Mumbai - understanding vpns
 
Vivpn pp tfinal
Vivpn pp tfinalVivpn pp tfinal
Vivpn pp tfinal
 
Презентация Huawei на совместном вебинаре, 30.11.2016
Презентация Huawei на совместном вебинаре, 30.11.2016 Презентация Huawei на совместном вебинаре, 30.11.2016
Презентация Huawei на совместном вебинаре, 30.11.2016
 
Service Provider Architectures for Tomorrow by Chow Khay Kid
Service Provider Architectures for Tomorrow by Chow Khay KidService Provider Architectures for Tomorrow by Chow Khay Kid
Service Provider Architectures for Tomorrow by Chow Khay Kid
 

Mehr von Ravi Ranjan

Mehr von Ravi Ranjan (20)

Iuwne10 S06 L04
Iuwne10 S06 L04Iuwne10 S06 L04
Iuwne10 S06 L04
 
Iuwne10 S06 L03
Iuwne10 S06 L03Iuwne10 S06 L03
Iuwne10 S06 L03
 
Iuwne10 S06 L02
Iuwne10 S06 L02Iuwne10 S06 L02
Iuwne10 S06 L02
 
Iuwne10 S06 L01
Iuwne10 S06 L01Iuwne10 S06 L01
Iuwne10 S06 L01
 
Iuwne10 S05 L07
Iuwne10 S05 L07Iuwne10 S05 L07
Iuwne10 S05 L07
 
Iuwne10 S05 L06
Iuwne10 S05 L06Iuwne10 S05 L06
Iuwne10 S05 L06
 
Iuwne10 S05 L05
Iuwne10 S05 L05Iuwne10 S05 L05
Iuwne10 S05 L05
 
Iuwne10 S05 L04
Iuwne10 S05 L04Iuwne10 S05 L04
Iuwne10 S05 L04
 
Iuwne10 S05 L03
Iuwne10 S05 L03Iuwne10 S05 L03
Iuwne10 S05 L03
 
Iuwne10 S05 L02
Iuwne10 S05 L02Iuwne10 S05 L02
Iuwne10 S05 L02
 
Iuwne10 S05 L01
Iuwne10 S05 L01Iuwne10 S05 L01
Iuwne10 S05 L01
 
Iuwne10 S04 L07
Iuwne10 S04 L07Iuwne10 S04 L07
Iuwne10 S04 L07
 
Iuwne10 S04 L06
Iuwne10 S04 L06Iuwne10 S04 L06
Iuwne10 S04 L06
 
Iuwne10 S04 L04
Iuwne10 S04 L04Iuwne10 S04 L04
Iuwne10 S04 L04
 
Iuwne10 S04 L05
Iuwne10 S04 L05Iuwne10 S04 L05
Iuwne10 S04 L05
 
Iuwne10 S04 L02
Iuwne10 S04 L02Iuwne10 S04 L02
Iuwne10 S04 L02
 
Iuwne10 S04 L01
Iuwne10 S04 L01Iuwne10 S04 L01
Iuwne10 S04 L01
 
Iuwne10 S04 L03
Iuwne10 S04 L03Iuwne10 S04 L03
Iuwne10 S04 L03
 
Iuwne10 S03 L05
Iuwne10 S03 L05Iuwne10 S03 L05
Iuwne10 S03 L05
 
Iuwne10 S03 L03
Iuwne10 S03 L03Iuwne10 S03 L03
Iuwne10 S03 L03
 

Kürzlich hochgeladen

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 

Kürzlich hochgeladen (20)

The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 

Iuwne10 S03 L04

  • 1. Wireless Clients Understanding the Cisco Compatible Extensions Program
  • 2.
  • 3.
  • 5. Cisco Compatible Extensions Example: Cisco Centralized Key Management Cisco Centralized Key Management allows the wireless infrastructure to cache the credentials, thus removing the need to conduct a full reauthentication when roaming
  • 6. Cisco Compatible Extensions Example: AP-Specified Maximum Power In a heterogeneous environment, a power difference between clients and AP can prevent clients from being heard by the AP. With Cisco Compatible Extensions, the AP can detect and automatically configure the optimal transmit power for the client.
  • 7. Cisco Compatible Extensions Example: Enhanced Roaming Ping-pong effect occurs when a wireless client is at the edge of two cells and hops between them. Cisco Compatible Extensions allows the AP to determine “inner regions” where scanning is not required and “outer regions” where the client, about to lose connection, would be allowed to scan for a better AP.
  • 8. Cisco Compatible Extensions Example: Client Link Test Client link test allows the AP to query the client for its own reading of the AP signal, and provide a deeper view of the client connection to the network
  • 9. Cisco Compatible Extensions Example: Client Reporting Client reporting allows the AP to get information from the client about its various parameters. This allows the administrator to collect data to optimize the network, but also, for example, for the AP to learn where the client would prefer to connect, and to redirect it to the right AP, if it is in range.
  • 10. Cisco Compatible Extensions Example: Client MFP When using MFP, client and AP use a key to authenticate management messages, thus making AP impersonation virtually impossible
  • 11. Cisco Compatible Extensions Features and Versions Summary AP-assisted roaming Cisco Centralized Key Management enhancement Gratuitous probe Response Diagnostic channel Association Location service AP-assisted roaming Cisco Centralized Key Management with other EAP types AP-directed roaming Location Keep alive Link test AP-assisted roaming Cisco Centralized Key Management with EAP-FAST Single sign on: LEAP, EAP-FAST AP-assisted roaming Cisco Centralized Key Management with LEAP Proxy ARP information element Mobility And Management Expedited bandwidth request U-APSD TSPEC CAC Voice metrics Voice over IP Wi-Fi Multimedia (WMM) eDCF Multiple SSIDs/VLANs on AP VLANs and QoS Management Frame Protection for clients NAC (wireless) EAT-TLS PEAP-MSCHAP WPA2 EAP-FAST PEAP-GTC WPA WEP IEEE 802.1X LEAP Cisco TKIP Security v5 v4 v3 v2 v1
  • 12.
  • 13.