O'Reilly logo

Cisco Wireless LAN Security by Andrew Balinsky, Darrin Miller, Krishna Sankar, Sri Sundaralingam

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

SWAN Central Switching Deployment: Configuration Guidelines and Examples

This section addresses configuration guidelines for SWAN central switching deployment mode. This deployment mode is discussed in detail in Chapter 9. Using the central switching deployment mode, both control and user traffic is aggregated by the central switch that is equipped with a WLAN services module. Thus, this deployment mode enables a single point of ingress for both WLAN user and control traffic into the wired network.

The WLAN security methods discussed in the section “WLAN Security Methods: Configuration Guidelines and Examples” also apply to the central switching deployment mode. One of the major changes made in the SWAN central switching deployment mode is that ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required