Prototyping RADIUS Server Policies: Part 3

This is part 3 of my blog series on rapid prototyping in ISE without requiring any networking equipment. This time we're going to perform EAP-TLS (X.509 certificate based) authentication.
Read More

Prototyping RADIUS Server Policies: Part 2

This is part 2 of my blog series on rapid prototyping without any real networking equipment. In part 1 I covered PAP and CHAP authentication and later on in part 3 we will be covering EAP-TLS (X.509 certificate based) authentication.
Read More

Free ThousandEyes Setup

Cisco's ThousandEyes is a tool used to monitor your network experience. When you get those very hard to diagnose issues, typically where users are complaining that the experience isn't very good, it can be very hard to find the root cause. This is where ThousandEyes comes in.
Read More

Prototyping Radius Server Policies - Part 1

The intention of this blog series is to help Radius Server administrators test their configurations - mostly for purposes of learning and rapid prototyping configurations. In part 2 we will cover the use of EAP-PEAP authentication and in part 3 we covering testing of authentication.
Read More

AP Placement - Location Grade Wi-Fi Tracking

Here we review how the typical AP layout for location grade WLAN is laid out - but also take a look at the Cisco Hyperlocation module and how that might help you achieve the highest levels of location accuracy.
Read More

Environmentally Sustainable Network Refresh

As we all seek to reduce our carbon footprint, we have a number of options that we can offer to not only save your business money, but be environmentally responsible at the same time. If you have a lot of equipment to refresh, or you want to partake in the circular economy, there's an offer to suit!
Read More

Cisco Access Points – Naming standards

When you're installing a new wireless network, there's a lot of variables and decisions you need to make, right out of the gate. Some decisions work just fine with small installations, but just don't scale to larger ones. One such decision is the way in which you name your Cisco Access Points.
Read More

Zero Trust Architecture (ZTA) Deployment

Zero Trust Architecture is all about providing a much higher level of security for your users, devices and data, than we've had in the past. The key concept is to only provide access strictly where it is required - hence the Zero Trust. In this blog, we'll take a look at the how you can approach a ZTA deployment.
Read More

Zero Trust Architecture (ZTA) Introduction

Zero Trust Architecture is the latest concept in security architecture. We’re starting to hear this term widely used and in this explainer blog, we take a look at what Zero Trust means – and why you might want to implement this technology.
Read More

Reduce Wi-Fi Congestion with DFS

Wi-Fi can be crippled by too many devices competing for airtime, creating a slower experience for all users. One way to reduce the number of devices competing for airtime is to increase the number of channels in use. How do the Dynamic Frequency Selection (DFS) Channels fit into this picture?
Read More

Start your journey. We make it easy to get started.

Contact IPTel