Volume 2 - Chapter 2: Analyzing Cisco Wireless Architectures Flashcards
A self-contained access point that can terminate wireless clients onto wired networks locally is referred to as?
An autonomous AP.
Describe the layer 2 requirements to support an autonomous AP.
Since an autonomous AP needs to carry the wireless traffic to the wired network locally, all VLANs associated with the SSIDs it is broadcasting need to be trunked to the AP.
Describe the downside of using autonomous APs.
They become significantly more difficult to manage as the network scales out; each AP is managed individually.
Cloud-based APs are examples of what?
Automous APs.
They are not managed locally, but still directly carry wireless data onto the wired network.
In regards to wireless planes, describe the difference between the control plane and data planes.
The data plane refers to the process of end-user data passing through the AP.
The control plane refers to the processes needed to manage and monitor the AP.
RF Transmit Receive, MAC Management, and Encryption are examples of ____ that are performed by the ____.
Real-Time Functions
Access Point.
RF Management, client authentication, security, and QoS are examples of ____ that are performed by the ____.
Management Functions
Wireless Controller (WLC)
Describe the purpose of the Split-MAC architecture.
Split-MAC Architecture is used to split MAC responsibilities between the WLC and AP.
The tunneling protocol used to carry traffic from the AP and the WLC is referred to as?
CAPWAP
The Control and Provisioning of Wireless Access Points.
What types of tunnels are utilized by the APs and WLC when using CAPWAP
CAPWAP Control Messages and CAPWAP Data.
Describe the difference between the CAPWAP Control Messages and CAPWAP Data.
The control messages/tunnel are used to configure the AP and manage its operation.
The data tunnel is used for carrying the end-user’s traffic
True or false:
CAPWAP data messages are encrypted by default.
False, encryption must be manually enabled.
What type of encryption is used for data messages when encryption is enabled?
Datagram Transport Layer Security (DTLS).
What port is used for CAPWAP Control messages?
UDP Port 5246.
What port is used for CAPWAP Data messages?
UDP Port 5247.
What comes pre-installed with APs and WLCs to allow them to securely authenticate to each other?
X.509 Certificates.