Introduction |
|
xxiv | |
|
Part I Wireless Design (ENWLSD) |
|
|
3 | (202) |
|
Chapter 1 Wireless Design Requirements |
|
|
4 | (20) |
|
"Do I Know This Already?" Quiz |
|
|
5 | (2) |
|
|
7 | (1) |
|
Following a Design Process |
|
|
7 | (1) |
|
Evaluating Customer Requirements |
|
|
8 | (2) |
|
Evaluating Client Requirements |
|
|
10 | (5) |
|
Examining Client 802.11 Capabilities |
|
|
11 | (2) |
|
Examining Client RF Capabilities |
|
|
13 | (1) |
|
Examining Client Security Capabilities |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
Evaluating Security Requirements |
|
|
16 | (1) |
|
|
17 | (5) |
|
|
17 | (1) |
|
Voice/Video Deployment Model |
|
|
18 | (2) |
|
Location Deployment Model |
|
|
20 | (2) |
|
AP Deployment Model Summary |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
23 | (1) |
|
Chapter 2 Conducting an Offsite Site Survey |
|
|
24 | (20) |
|
"Do I Know This Already?" Quiz |
|
|
24 | (2) |
|
|
26 | (1) |
|
The Effect of Material Attenuation on Wireless Design |
|
|
26 | (2) |
|
Common Deployment Models for Different Industries |
|
|
28 | (5) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
33 | (1) |
|
Designing with Regulations in Mind |
|
|
33 | (4) |
|
Choosing the Right Survey Type |
|
|
37 | (1) |
|
A Survey of Wireless Planning Tools |
|
|
38 | (1) |
|
Conducting a Predictive Site Survey |
|
|
39 | (2) |
|
|
41 | (1) |
|
|
41 | (1) |
|
|
42 | (1) |
|
|
42 | (1) |
|
|
42 | (2) |
|
Chapter 3 Conducting an Onsite Site Survey |
|
|
44 | (22) |
|
"Do I Know This Already?" Quiz |
|
|
45 | (1) |
|
|
46 | (1) |
|
Performing a Walkthrough Survey |
|
|
46 | (3) |
|
Performing a Layer 1 Survey |
|
|
49 | (5) |
|
|
49 | (3) |
|
Interferer Types and Effects |
|
|
52 | (1) |
|
Surveying for Interferers |
|
|
53 | (1) |
|
Performing a Layer 2 Survey |
|
|
54 | (8) |
|
|
54 | (5) |
|
Data vs. Voice vs. Location Deployments |
|
|
59 | (3) |
|
Performing a Post-Deployment Onsite Survey |
|
|
62 | (2) |
|
|
64 | (1) |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
65 | (1) |
|
|
65 | (1) |
|
Chapter 4 Physical and Logical Infrastructure Requirements |
|
|
66 | (18) |
|
"Do I Know This Already?" Quiz |
|
|
67 | (1) |
|
|
68 | (1) |
|
Physical Infrastructure Requirements |
|
|
68 | (8) |
|
|
69 | (1) |
|
|
69 | (2) |
|
|
71 | (1) |
|
|
71 | (1) |
|
|
72 | (1) |
|
Ceiling and Wall Mounting Access Points |
|
|
73 | (1) |
|
Mounting Access Points Below a Suspended Ceiling |
|
|
74 | (1) |
|
Mounting Access Points Above the Ceiling Tiles |
|
|
74 | (1) |
|
Grounding and Securing Access Points |
|
|
75 | (1) |
|
Logical Infrastructure Requirements |
|
|
76 | (5) |
|
|
76 | (3) |
|
AAA and DHCP Services Logical Path |
|
|
79 | (1) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
82 | (1) |
|
|
82 | (1) |
|
|
82 | (2) |
|
Chapter 5 Applying Wireless Design Requirements |
|
|
84 | (26) |
|
"Do I Know This Already?" Quiz |
|
|
85 | (2) |
|
|
87 | (1) |
|
|
87 | (7) |
|
Considering Receive Sensitivity |
|
|
88 | (1) |
|
Considering the Signal-to-Noise Ratio |
|
|
89 | (2) |
|
Further AP Cell Considerations |
|
|
91 | (3) |
|
Expanding Coverage with Additional APs |
|
|
94 | (4) |
|
Designing a Wireless Network for Data |
|
|
98 | (1) |
|
Designing a Wireless Network for High Density |
|
|
99 | (6) |
|
Limiting the Transmit Power Level |
|
|
102 | (1) |
|
Leveraging APs and Antennas |
|
|
103 | (2) |
|
Designing a Wireless Network for Voice and Video |
|
|
105 | (2) |
|
Designing a Wireless Network for Location |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
109 | (1) |
|
Chapter 6 Designing Radio Management |
|
|
110 | (26) |
|
"Do I Know This Already?" Quiz |
|
|
110 | (3) |
|
|
113 | (1) |
|
|
113 | (17) |
|
Discovering the RF Neighborhood with NDP |
|
|
115 | (3) |
|
|
118 | (2) |
|
Transmit Power Control (TPC) |
|
|
120 | (4) |
|
Dynamic Channel Assignment (DCA) |
|
|
124 | (3) |
|
|
127 | (1) |
|
Flexible Radio Assignment (FRA) |
|
|
128 | (2) |
|
Localizing RRM with RF Profiles |
|
|
130 | (2) |
|
Optimizing AP Cell Sensitivity with RxSOP |
|
|
132 | (2) |
|
|
134 | (1) |
|
|
134 | (1) |
|
|
135 | (1) |
|
|
135 | (1) |
|
Chapter 7 Designing Wireless Mesh Networks |
|
|
136 | (28) |
|
"Do I Know This Already?" Quiz |
|
|
137 | (1) |
|
|
138 | (1) |
|
Mesh Network Architecture and Components |
|
|
138 | (4) |
|
|
139 | (2) |
|
Access Point Roles in a Mesh Network |
|
|
141 | (1) |
|
Mesh Network Architecture Overview |
|
|
141 | (1) |
|
Site Preparation and Planning |
|
|
142 | (5) |
|
Supported Frequency Bands |
|
|
143 | (1) |
|
Dynamic Frequency Selection |
|
|
144 | (1) |
|
Antenna and Mounting Considerations for Outdoor Mesh |
|
|
145 | (2) |
|
Mesh Convergence and Traffic Flows |
|
|
147 | (5) |
|
Adaptive Wireless Path Protocol |
|
|
147 | (3) |
|
Traffic Flow Through the Mesh |
|
|
150 | (1) |
|
|
151 | (1) |
|
Cisco Wi-Fi Mesh Configuration |
|
|
152 | (3) |
|
Daisy-Chaining Wireless Mesh Links |
|
|
155 | (3) |
|
|
158 | (3) |
|
Workgroup Bridging Overview |
|
|
158 | (1) |
|
Configuring Workgroup Bridges |
|
|
159 | (2) |
|
|
161 | (1) |
|
|
161 | (1) |
|
|
162 | (1) |
|
|
162 | (1) |
|
|
162 | (2) |
|
Chapter 8 Designing for Client Mobility |
|
|
164 | (24) |
|
"Do I Know This Already?" Quiz |
|
|
164 | (3) |
|
|
167 | (1) |
|
|
167 | (4) |
|
|
168 | (1) |
|
Intra-Controller (Layer 2) Roam |
|
|
168 | (1) |
|
Inter-Controller (Layer 2) Roam |
|
|
168 | (1) |
|
Inter-Controller (Layer 3) Roam |
|
|
169 | (2) |
|
Organizing Roaming Behavior with Mobility Groups |
|
|
171 | (5) |
|
Defining the Mobility Hierarchy |
|
|
171 | (2) |
|
Exploring Mobility Operations |
|
|
173 | (2) |
|
Validating the Mobility Hierarchy and Tunneling |
|
|
175 | (1) |
|
Optimizing AP Selection for Client Roaming |
|
|
176 | (3) |
|
Optimizing the AP Scanning Process |
|
|
176 | (1) |
|
Optimizing with CCX Assistance |
|
|
177 | (1) |
|
Optimizing with 802.1 lk Assistance |
|
|
178 | (1) |
|
Optimizing with 802.1 lv Assistance |
|
|
179 | (1) |
|
Optimizing Security Processes for Roaming |
|
|
179 | (7) |
|
|
179 | (3) |
|
PMKID Caching or SKC Caching |
|
|
182 | (1) |
|
Opportunistic Key Caching (OKC) |
|
|
182 | (1) |
|
|
182 | (1) |
|
|
183 | (1) |
|
802.1 1r: Fast BSS Transition (FT) |
|
|
183 | (2) |
|
Fast Secure Roaming Review |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
|
187 | (1) |
|
Chapter 9 Designing High Availability |
|
|
188 | (17) |
|
"Do I Know This Already?" Quiz |
|
|
188 | (2) |
|
|
190 | (2) |
|
Making Controller Connectivity More Resilient |
|
|
192 | (1) |
|
Designing High Availability for APs |
|
|
193 | (4) |
|
|
195 | (1) |
|
Detecting a Controller Failure |
|
|
196 | (1) |
|
|
197 | (1) |
|
Designing High Availability for Controllers |
|
|
197 | (4) |
|
|
197 | (1) |
|
|
198 | (1) |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
201 | (1) |
|
|
201 | (1) |
|
|
201 | (1) |
|
|
202 | (3) |
|
Part II Wireless Implementation (ENWLSI) |
|
|
205 | (259) |
|
Chapter 10 Implementing FlexConnect |
|
|
206 | (36) |
|
"Do I Know This Already?" Quiz |
|
|
208 | (2) |
|
|
210 | (1) |
|
Remote Office Wireless Deployment Modes |
|
|
210 | (2) |
|
FlexConnect Overview and Requirements |
|
|
212 | (3) |
|
|
213 | (1) |
|
WAN Requirements for FlexConnect |
|
|
214 | (1) |
|
Implementing FlexConnect with AireOS |
|
|
215 | (7) |
|
Convert the AP to FlexConnect Mode |
|
|
215 | (1) |
|
Configure the Locally Switched WLANs |
|
|
216 | (1) |
|
Configure the Native VLAN and WLAN-to-VLAN Mapping |
|
|
217 | (2) |
|
Implementing FlexConnect Groups |
|
|
219 | (3) |
|
FlexConnect High Availability and Resiliency |
|
|
222 | (3) |
|
FlexConnect Resiliency Scenarios |
|
|
222 | (1) |
|
|
222 | (1) |
|
Configuring AAA Survivability |
|
|
223 | (1) |
|
CAPWAP Message Aggregation |
|
|
224 | (1) |
|
|
225 | (3) |
|
|
226 | (1) |
|
FlexConnect Split Tunneling (Using the Split ACL Mapping Feature) |
|
|
227 | (1) |
|
FlexConnect Smart AP Image Upgrades |
|
|
228 | (2) |
|
Implementing FlexConnect with IOS-XE Controllers |
|
|
230 | (6) |
|
A Summary of FlexConnect Best Practices Recommendations |
|
|
236 | (1) |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
239 | (1) |
|
|
239 | (1) |
|
|
239 | (1) |
|
|
240 | (2) |
|
Chapter 11 Implementing Quality of Service on a Wireless Network |
|
|
242 | (38) |
|
"Do I Know This Already?" Quiz |
|
|
243 | (1) |
|
|
244 | (1) |
|
An Overview of Wireless QoS Principles |
|
|
244 | (12) |
|
The Distributed Coordination Function |
|
|
246 | (4) |
|
Retrofitting DCF--Enhanced Distributed Channel Access (EDCA) |
|
|
250 | (1) |
|
|
250 | (3) |
|
Arbitrated Interframe Space Number (AIFSN) |
|
|
253 | (1) |
|
Contention Window Enhancements |
|
|
254 | (1) |
|
Transmission Opportunity (TXOP) |
|
|
254 | (1) |
|
802.11 Transmission Specification (TSpec) |
|
|
255 | (1) |
|
Implementing QoS Policies on the Wireless Controller |
|
|
256 | (11) |
|
QoS Mapping and Marking Schemes Between the Client and Controller |
|
|
256 | (2) |
|
Handling QoS Marking in the WLAN |
|
|
258 | (2) |
|
Implementing QoS on the AireOS Controller |
|
|
260 | (3) |
|
Implementing QoS on the IOS-XE Controller |
|
|
263 | (4) |
|
Implementing QoS for Wireless Clients |
|
|
267 | (3) |
|
Implementing Client QoS Marking Schemes |
|
|
267 | (1) |
|
Mapping DSCP to UP in the Client |
|
|
268 | (2) |
|
Implementing Application Visibility and Control |
|
|
270 | (7) |
|
Implementing AVC on a Cisco Wireless Controller |
|
|
272 | (3) |
|
Implementing AutoQoS with Fastlane |
|
|
275 | (2) |
|
|
277 | (1) |
|
|
277 | (1) |
|
|
278 | (1) |
|
|
278 | (1) |
|
|
278 | (2) |
|
Chapter 12 Implementing Multicast |
|
|
280 | (22) |
|
"Do I Know This Already?" Quiz |
|
|
280 | (3) |
|
|
283 | (1) |
|
|
283 | (10) |
|
Multicast Delivery in a Wireless Network |
|
|
285 | (3) |
|
|
288 | (2) |
|
Implementing Wireless Multicast |
|
|
290 | (3) |
|
|
293 | (4) |
|
Implementing Multicast Direct |
|
|
297 | (3) |
|
|
300 | (1) |
|
|
300 | (1) |
|
|
300 | (1) |
|
|
301 | (1) |
|
|
301 | (1) |
|
Chapter 13 Location Services Deployment |
|
|
302 | (28) |
|
"Do I Know This Already?" Quiz |
|
|
303 | (1) |
|
|
304 | (1) |
|
|
304 | (8) |
|
Indoor Location Protocols |
|
|
305 | (1) |
|
Infrastructure and 802.11-Based Location |
|
|
306 | (1) |
|
Cell of Origin Techniques |
|
|
306 | (1) |
|
RSSI Trilateration Techniques |
|
|
307 | (1) |
|
Angle of Arrival (AoA) Techniques |
|
|
308 | (1) |
|
802.11 Frames Used for Location |
|
|
309 | (2) |
|
|
311 | (1) |
|
Deploying Location Services |
|
|
312 | (8) |
|
Location Engines and Services |
|
|
314 | (2) |
|
Configuring APs and WLCs for Location Support |
|
|
316 | (1) |
|
Deploying DNA Spaces, MSE, and CMX |
|
|
316 | (1) |
|
|
316 | (1) |
|
CMX Deployment Configuration |
|
|
317 | (1) |
|
DNA Spaces Deployment Configuration |
|
|
318 | (2) |
|
Tracking Clients, RFID Tags, Rogues, and Interferers |
|
|
320 | (4) |
|
Tracking Mobile Devices with CMX |
|
|
320 | (4) |
|
Tracking Mobile Devices with DNA Spaces |
|
|
324 | (1) |
|
Customizing Location Services |
|
|
324 | (4) |
|
Customizing CMX Location Services |
|
|
325 | (2) |
|
Customizing DNA Spaces Location Services |
|
|
327 | (1) |
|
|
328 | (1) |
|
|
328 | (1) |
|
|
329 | (1) |
|
|
329 | (1) |
|
|
329 | (1) |
|
Chapter 14 Advanced Location Services Implementation |
|
|
330 | (36) |
|
"Do I Know This Already?" Quiz |
|
|
331 | (1) |
|
|
332 | (1) |
|
CMX and DNA Spaces Services and Licenses |
|
|
332 | (2) |
|
CMX Services and Licenses |
|
|
333 | (1) |
|
DNA Spaces Services and Licenses |
|
|
333 | (1) |
|
|
334 | (8) |
|
Implementing CMX Analytics |
|
|
334 | (1) |
|
|
335 | (1) |
|
Configuring Analytics Widgets |
|
|
336 | (2) |
|
Implementing DNA Spaces Analytics |
|
|
338 | (1) |
|
|
338 | (1) |
|
Managing DNA Spaces Analytics |
|
|
339 | (3) |
|
Implementing Guest Portals |
|
|
342 | (9) |
|
Implementing CMX Connect Service |
|
|
342 | (1) |
|
|
342 | (1) |
|
Configuring the WLC for Guest Portal Services |
|
|
343 | (3) |
|
|
346 | (1) |
|
Configuring a Portal on CMX |
|
|
346 | (3) |
|
Implementing DNA Spaces Connect Service |
|
|
349 | (1) |
|
Creating a New Portal from Scratch |
|
|
349 | (1) |
|
Creating a New Portal from a Template |
|
|
350 | (1) |
|
|
351 | (5) |
|
|
352 | (1) |
|
|
353 | (3) |
|
Ensuring Location Operational Efficiency |
|
|
356 | (8) |
|
Deploying MSE High Availability |
|
|
356 | (2) |
|
Managing Location Accuracy |
|
|
358 | (1) |
|
|
358 | (2) |
|
|
360 | (1) |
|
Verifying Location Accuracy on MSE |
|
|
361 | (1) |
|
Customizing RF Calibration Model on PI |
|
|
362 | (1) |
|
Verifying Hyperlocation Configuration |
|
|
362 | (2) |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
365 | (1) |
|
Chapter 15 Security for Wireless Client Connectivity |
|
|
366 | (36) |
|
"Do I Know This Already?" Quiz |
|
|
367 | (2) |
|
|
369 | (1) |
|
Implementing 802.1X and AAA on Wireless Architectures |
|
|
369 | (11) |
|
Wireless Network Authentication Framework |
|
|
369 | (2) |
|
Extensible Authentication Protocol (EAP) |
|
|
371 | (3) |
|
Implementing Client Security on the Wireless Controller and ISE |
|
|
374 | (6) |
|
Implementing Client Profiling |
|
|
380 | (5) |
|
Wireless Client Profiling Principles |
|
|
380 | (2) |
|
Configuring Local Client Profiling on the Wireless Controller |
|
|
382 | (3) |
|
Implementing BYOD and Guest |
|
|
385 | (13) |
|
Implementing BYOD and Guest |
|
|
385 | (1) |
|
Local Web Authentication (LWA) with the Wireless Controller |
|
|
386 | (5) |
|
Local Web Authentication on an IOS-XE Controller |
|
|
391 | (1) |
|
Local Web Authentication with an Anchor Controller |
|
|
391 | (1) |
|
Certificate Provisioning on the Wireless Controller |
|
|
392 | (1) |
|
LWA and Self-Registration |
|
|
393 | (1) |
|
Central Web Authentication (CWA) with ISE |
|
|
394 | (3) |
|
Native Supplicant Provisioning Using ISE |
|
|
397 | (1) |
|
|
398 | (1) |
|
|
399 | (1) |
|
|
399 | (1) |
|
|
399 | (1) |
|
|
400 | (2) |
|
Chapter 16 Monitoring and Troubleshooting WLAN Components |
|
|
402 | (38) |
|
"Do I Know This Already?" Quiz |
|
|
403 | (2) |
|
|
405 | (1) |
|
Using Reports on Cisco Prime Infrastructure and DNAC |
|
|
405 | (11) |
|
Reports on Cisco Prime Infrastructure |
|
|
406 | (1) |
|
|
407 | (3) |
|
Scheduling and Managing Reports |
|
|
410 | (2) |
|
Reports on Cisco DNA Center |
|
|
412 | (1) |
|
|
412 | (2) |
|
|
414 | (2) |
|
Managing Alarms on Cisco Prime Infrastructure and DNAC |
|
|
416 | (6) |
|
Alarms in Cisco Prime Infrastructure |
|
|
416 | (1) |
|
|
417 | (3) |
|
|
420 | (2) |
|
Troubleshooting Client Connectivity |
|
|
422 | (12) |
|
Building a Troubleshooting Method |
|
|
422 | (2) |
|
|
424 | (2) |
|
WLC, PI, and DNAC Client Troubleshooting Tools |
|
|
426 | (1) |
|
Client Troubleshooting on the WLC |
|
|
426 | (4) |
|
Client Troubleshooting in Cisco Prime Infrastructure |
|
|
430 | (1) |
|
Client Troubleshooting in Cisco DNA Center |
|
|
431 | (3) |
|
Troubleshooting and Managing RF Interferences |
|
|
434 | (2) |
|
WLC Interference Management Tools |
|
|
434 | (2) |
|
Interferers on Cisco PI and DNAC |
|
|
436 | (1) |
|
|
436 | (1) |
|
|
437 | (1) |
|
|
437 | (1) |
|
|
437 | (1) |
|
|
438 | (2) |
|
Chapter 17 Device Hardening |
|
|
440 | (18) |
|
"Do I Know This Already?" Quiz |
|
|
441 | (1) |
|
|
442 | (1) |
|
Implementing Device Access Controls |
|
|
442 | (8) |
|
|
443 | (1) |
|
AAA Configuration Overview on the Wireless Controller |
|
|
444 | (2) |
|
Implementing TACACS+ Profiles and Command Authorization |
|
|
446 | (4) |
|
Implementing Access Point Authentication |
|
|
450 | (4) |
|
Implementing CPU ACLs on the Wireless Controller |
|
|
454 | (2) |
|
|
456 | (1) |
|
|
456 | (1) |
|
|
457 | (1) |
|
|
457 | (1) |
|
|
457 | (1) |
|
Chapter 18 Final Preparation |
|
|
458 | (6) |
|
|
458 | (1) |
|
Tools for Final Preparation |
|
|
459 | (3) |
|
Pearson Cert Practice Test Engine and Questions on the Website |
|
|
459 | (1) |
|
Accessing the Pearson Test Prep Software Online |
|
|
459 | (1) |
|
Accessing the Pearson Test Prep Software Offline |
|
|
459 | (1) |
|
|
460 | (1) |
|
|
461 | (1) |
|
|
461 | (1) |
|
Chapter-Ending Review Tools |
|
|
462 | (1) |
|
Suggested Plan for Final Review/Study |
|
|
462 | (1) |
|
|
462 | (2) |
|
|
464 | (8) |
|
|
465 | (2) |
|
|
467 | (2) |
|
|
469 | (3) |
|
Appendix B Software-Defined Access with Wireless |
|
|
472 | (10) |
|
SDA Network Architecture--Underlay and Overlay Networks |
|
|
475 | (1) |
|
Fabric Control, Data, and Security Planes |
|
|
476 | (2) |
|
Wireless Capabilities of SDA |
|
|
478 | (4) |
|
Appendix C RRM TPC Algorithm Example |
|
|
482 | (14) |
|
Viewing an NDP Neighbor List |
|
|
482 | (3) |
|
Neighbor Lists for the Example Scenario |
|
|
485 | (3) |
|
Performing the TPC Algorithm |
|
|
488 | (8) |
|
Appendix D Answers Appendix |
|
|
496 | (12) |
|
Appendix E CCNP Enterprise Wireless Design ENWLSD 300-425 and Implementation ENWLSI 300-430 Exam Updates |
|
|
508 | (3) |
|
Always Get the Latest at the Book's Product Page |
|
|
508 | (1) |
|
|
509 | (2) |
Glossary |
|
511 | (15) |
Index |
|
526 | |
Appendix F Study Planner (online) |
|