A company deploys a Cisco wireless network over the campus. Wireless network access is needed for visitors to access the internet while on campus. What are two best practices in setting up APs and WLCs for secure wireless connections for visitors? (Choose two.)

IT Questions BankCategory: CCNPA company deploys a Cisco wireless network over the campus. Wireless network access is needed for visitors to access the internet while on campus. What are two best practices in setting up APs and WLCs for secure wireless connections for visitors? (Choose two.)
A company deploys a Cisco wireless network over the campus. Wireless network access is needed for visitors to access the internet while on campus. What are two best practices in setting up APs and WLCs for secure wireless connections for visitors? (Choose two.) 1ITExamAnswers Staff asked 1 month ago
A company deploys a Cisco wireless network over the campus. Wireless network access is needed for visitors to access the internet while on campus. What are two best practices in setting up APs and WLCs for secure wireless connections for visitors? (Choose two.)

  • only using private IP addresses for APs and clients
  • using static IP addressing for clients to better locate visitor clients
  • putting the anchor controller specific for visitors behind firewall
  • configuring a WLC to be a static anchor controller specific for visitors to associate
  • deploying autonomous APs for visitors

Explanation: In Layer 3 roaming, anchor and foreign controllers are normally determined automatically. When a client first associates with an AP and a controller, that controller becomes its anchor controller. When the client roams to a different controller, that controller can take on the foreign role. However, sometimes it is desirable to control which WLC to be the anchor controller. For example, guest users should not be allowed to associate with just any controller in the network. Guests might be forced onto a specific controller that is situated behind a firewall or contained in a protected environment. This objective can be achieved by configuring one controller to be a static anchor for a WLAN so that other controllers will direct clients toward it through Layer 3 roaming tunnels.

More Questions: Chapters 17 – 19: Wireless Essentials Exam


Related Articles