An engineer must configure AAA on a Cisco 9800 WLC for central web authentication. Which two commands are needed to accomplish this task? (Choose two.)
A.
Device(config)# aaa server radius dynamic-author
Option A (aaa server radius dynamic-author) is essential to enable CoA, which is a core component of CWA. It allows the RADIUS server to dynamically update client sessions (e.g., to redirect or authorize clients after authentication).
Option E (config wlan aaa-override enable <wlan-id>) is critical to enable AAA override, which allows the WLC to apply the dynamic redirect URL and ACL sent by the RADIUS server.
Together, these commands address the core requirements for CWA: enabling CoA for dynamic session management and allowing the WLC to use RADIUS-provided attributes.
B,C,E are wrong, because of "(Cisco Controller) >" this mode is only for old AirOS and not for 9800 which based on IOS XE.
A,D are correct:
WLC-9800-Lab(config)# aaa new-model
WLC-9800-Lab(config)# aaa server radius dynamic-author
WLC-9800-Lab(config-locsvr-da-radius)#client 10.10.10.12 server-key 0 SECRET
WLC-9800-Lab(config-locsvr-da-radius)#do sh inv
NAME: "Chassis", DESCR: "C9800-CL Chassis"
I think people choice of and and AE is due to the command sets being related.
# aaa server radius dynamic-author #
client <radius-server-ip> server-key <shared-key>
A and E , recall there were questions in this 350-401 topic where we were asked what changes must we do for ISE(AAA Server) can assign custom VLAN's to users when they log in , and the right answer there was (first box to check) "enable AAA override" .
For CWA, AAA override must be enabled in the policy profile associated with the WLAN to allow the WLC to apply the redirect URL and ACL sent by the RADIUS server (ISE). Without this, the WLC cannot redirect clients to the authentication portal.
ref: https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/213920-central-web-authentication-cwa-on-cata.html
Here is the relevant part of the configuration of the WLC that corresponds to this example:
aaa new-model
!
aaa authorization network CWAauthz group radius
aaa accounting identity CWAacct start-stop group radius
!
aaa server radius dynamic-author
client <ISE-IP> server-key cisco123
!
aaa session-id common
!
!
radius server ISE-server
address ipv4 <ISE-IP> auth-port 1812 acct-port 1813
key cisco123
!
!
(check the rest in the URL)
so: ANS: AD
Configures the Change of Authorization (CoA) on the controller.
# aaa server radius dynamic-author
Specifies a RADIUS client and the RADIUS key to be shared between a device and a RADIUS client.
# client 123.123.134.112 server-key 0 SECRET
To configure AAA on a Cisco 9800 WLC for central web authentication, you’ll need the following two commands:
Device(config)# aaa server radius dynamic-author: This command enables the RADIUS dynamic authorization feature and enters dynamic authorization local server configuration mode1.
(Cisco Controller) > config wlan aaa-override enable <wlan-id>: This command enables AAA override for a specific WLAN, allowing you to apply custom authentication, authorization, and accounting (AAA) settings for that WLAN1.
Remember to adjust the <wlan-id> placeholder with the actual WLAN ID you want to configure. These commands will help you set up central web authentication effectively on your Cisco 9800 WLC. 🛡️
https://www.cisco.com/c/en/us/td/docs/wireless/controller/9800/17-14/config-guide/b_wl_17_14_cg/m_vewlc_central_web_authentication.html
Configuring AAA for Central Web Authentication
B, C and E does not exist in a 9800 WLC
???????-WLC#configure ?
confirm Confirm replacement of running-config with a new config file
memory Configure from NV memory
network Configure from a TFTP network host
overwrite-network Overwrite NV memory from TFTP network host
replace Replace the running-config with a new config file
revert Parameters for reverting the configuration
terminal Configure from the terminal
<cr> <cr>
Yeah, the classic AireOS controllers use a different OS, apparently Cisco has based the Catalyst 9800 series controllers on IOS instead, hence A & D are correct. The question is meant to confuse those (like me) who have never worked with a Catalyst 9800 series controller before.
From Cisco
A and E are correct.
Step 1
aaa server radius dynamic-author
Example:
Device(config)# aaa server radius dynamic-author
Configures the Change of Authorization (CoA) on the controller.
Step 2
client ISE-IP-add server-key radius-shared-secret
Example:
Device(config-locsvr-da-radius)# client 123.123.134.112 server-key
0 SECRET
A and E
(In my Opinion)
A - configures the WLC to use RADIUS for dynamic authorization (correct)
B - diables AAA override (central web auth, we should want AAA override)
C - configures a RADIUS accounting server (logging, not used for authentication)
D - appears to be configuring a local RADIUS server on device, rather then setting up central web auth.
E - enables AAA override for the WLAN, allowing WLC to use AAA for client authentication/authorization
- Okay, yeah - I'm not sure of this one :(
- forgive me
upvoted 1 times
...
...
This section is not available anymore. Please use the main Exam Page.350-401 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
studyguy42
2 weeks, 2 days agoc48ef2b
4 weeks, 1 day agoIarn
4 months, 1 week agomatass_md
5 months, 2 weeks agostudyguy42
2 weeks, 2 days agoyasmiine
1 year, 2 months agoIgorLVG
1 year, 2 months agomasrur
1 year, 3 months agoAdalberto
1 year, 3 months agoAdalberto
1 year, 3 months agoyou_
1 year, 3 months agodc583a7
1 year, 3 months agofelix_simon
1 year, 3 months agojoseromerogarci
1 year, 3 months agoIdaklesiewicz
1 year, 4 months agoabrielirus123
6 months agoIdaklesiewicz
1 year, 4 months agoIdaklesiewicz
1 year, 4 months agoRickAO76
1 year, 4 months agoRickAO76
1 year, 3 months ago