You are on page 1of 1

Hello.

In this video, we will walk through verifying the profiling configuration on


our pod's virtual Wireless LAN Controller and 3K access switch.
We'll start by opening a new browser tab and then going to the web console of the
Wireless LAN Controller. I already have a bookmark on my browser that I can click
on to go to that URL. I'll log in to the Wireless LAN Controller with the correct
credentials that I've already saved on my PC. Once I'm logged in and on the web
interface, I'll navigate to the wireless LAN, or WLANs section, by clicking that
tab at the top of the page and then clicking the WLANs navigation link on the left
side of the new page that shows.
I'll click on WLAN ID 1 to view the settings for that WLAN, which is the wpa2e WLAN
for my pod. Next, I'll click on the Advanced tab to see those configuration
settings for WLAN 1. Then, I'll scroll down to about halfway down the page until I
see the settings for Local Client Profiling. Here, I can see that DHCP Profiling
and HTTP Profiling are both selected. If I had needed to enable one or both of
these settings, I'd need to click on Apply to apply the new configuration. But
clicking on Apply will also ensure that those settings are applied regardless.
I'll click on OK to close the warning message about changes affecting the WLAN.
I've verified the settings for the clients on that wireless LAN, so I'll now return
to the ISE console by clicking on that tab in my browser. Next, I'll open the
console connection to the 3K access switch. I'll log in to the switch with the
username of admin and the password of ISEisCOOL. Once I'm logged in I'll use the
en, or enable, command to enter privilege mode on the switch so that I can view the
configuration of the switch.
Now, I can use the show run command with the | symbol and then section snmp-server
to limit the output of the command to show only the section of the configuration
related to the SNMP server settings. From the output, I can see that the read-only,
or RO, community is set to ISEisCOOL, which matches the configuration in the ISE
Profiler settings.
We disabled SNMP MAC trap queries in the ISE server. The switch is showing that it
is set to generate MAC notification traps due to its use in another training lab.
This will not affect its interaction with ISE. I can also see that the SNMP server
is set to be the ISE server at 10.1.100.21, and that SNMP version 2c will be used
with that server.
After that, I can use the show run command with the | symbol and then section mac
to limit the output of my command to show only the section of the configuration
related to the MAC address notification settings. I see that the switch is
configured to notify the SNMP server about any MAC changes, which would include
when a MAC address is added or removed from the switches' address table, or also
when a MAC address moves from one switch port to another.
Show run interface vlan 10 shows me that VLAN 10 is configured with two IP helper
addresses. One is set to send DHCP probes and requests to the DHCP server in my
network, which is at 10.1.100.10. But the other helper address command sends those
same DHCP probes and request to the ISE server at 10.1.100.21 to help with
profiling the endpoints.
In the lab, VLAN 10 used as the regular access VLAN, and VLAN 50 is used for guest
access. So I'll repeat the show run command, but now for interface vlan 50, and can
see the same IP helper addresses configured on VLAN 50 as well.

You might also like