• Home
  • Cisco
  • 642-637 Securing Networks with Cisco Routers and Switches (SECURE) Dumps

Pass Your Cisco 642-637 Exam Easy!

100% Real Cisco 642-637 Exam Questions & Answers, Accurate & Verified By IT Experts

Instant Download, Free Fast Updates, 99.6% Pass Rate

Archived VCE files

File Votes Size Date
File
Cisco.ActualTests.642-637.v2013-06-23.by.groso.136q.vce
Votes
29
Size
9.55 MB
Date
Jun 24, 2013
File
Cisco.ActualTests.642-637.v2013-04-03.by.azazredhat.135q.vce
Votes
1
Size
6.1 MB
Date
Apr 03, 2013
File
Cisco.ActualTests.642-637.v2012-08-03.by.Neil.133q.vce
Votes
1
Size
6.36 MB
Date
Aug 12, 2012
File
Cisco.Actualtest.642-637.v2012-05-18.by.neil.122q.vce
Votes
1
Size
5.01 MB
Date
May 17, 2012
File
Cisco.Passguide.642-637.v2011-05-14.by.Ignativs.78q.vce
Votes
1
Size
2.22 MB
Date
May 16, 2011

Cisco 642-637 Practice Test Questions, Exam Dumps

Cisco 642-637 (Securing Networks with Cisco Routers and Switches (SECURE)) exam dumps vce, practice test questions, study guide & video training course to study and pass quickly and easily. Cisco 642-637 Securing Networks with Cisco Routers and Switches (SECURE) exam dumps & practice test questions and answers. You need avanset vce exam simulator in order to study the Cisco 642-637 certification exam dumps & Cisco 642-637 practice test questions in vce format.

Mastering the Fundamentals of the Cisco 642-637 Exam

The journey towards achieving the Cisco Certified Network Professional Wireless (CCNP Wireless) certification begins with a solid understanding of its core components. The Cisco 642-637, also known as Conducting Cisco Unified Wireless Site Survey (CUWSS), was a crucial exam in this track. While this specific exam code has been retired and replaced by newer versions, the fundamental principles it covered remain evergreen and are foundational to modern wireless networking. This series will delve into the concepts that were central to the Cisco 642-637 exam, providing a comprehensive overview that is still highly relevant for any wireless network engineer today.

This initial part of our series lays the groundwork, exploring the essential concepts of radio frequency (RF) behavior, the intricacies of antenna technology, and the basic principles of planning a wireless network. Understanding these elements is not just about passing an exam; it's about building robust, reliable, and secure wireless networks that meet the demanding needs of modern businesses. We will break down complex topics into digestible segments, ensuring a clear path from fundamental theory to practical application, a methodology central to the Cisco 642-637 preparation process.

Introduction to the Cisco Unified Wireless Network

The Cisco Unified Wireless Network (CUWN) represents a centralized architecture for managing wireless local area networks (WLANs). This model was a significant evolution from early standalone, or "autonomous," access point (AP) deployments. In a CUWN, a Wireless LAN Controller (WLC) acts as the brain of the network, managing multiple lightweight access points (LAPs) simultaneously. This centralization simplifies configuration, enhances security, and provides a holistic view of the entire wireless infrastructure. The Cisco 642-637 exam placed a heavy emphasis on understanding this architecture as it forms the basis for all design and survey activities.

The core components of this architecture include the WLC, the LAPs, and a management platform, which was often the Cisco Wireless Control System (WCS) and has now evolved into Cisco Prime Infrastructure and DNA Center. LAPs, once associated with a controller, download their configuration and firmware, effectively becoming extensions of the WLC. This split-MAC architecture, where some functions are handled by the AP and others by the controller, is a key concept. It allows for seamless client roaming, centralized policy enforcement, and efficient management of the RF environment across the entire enterprise.

Core Principles of Radio Frequency (RF)

A deep understanding of RF principles is non-negotiable for any wireless engineer and was a cornerstone of the Cisco 642-637 exam. RF is the medium through which all wireless data travels. Unlike wired networks that use predictable copper or fiber optic cables, RF operates in an unseen, shared, and often unpredictable environment. Key characteristics to understand include frequency, wavelength, amplitude, and phase. Frequency, measured in Hertz (Hz), determines the number of wave cycles per second. Wi-Fi networks primarily operate in the 2.4 GHz and 5 GHz frequency bands, each with distinct properties affecting range and data rates.

The behavior of RF signals is influenced by various phenomena. Attenuation is the natural weakening of a signal as it travels through space. Absorption occurs when materials like concrete or water absorb RF energy, further weakening the signal. Reflection happens when signals bounce off surfaces like metal or glass, which can lead to a problem known as multipath. Multipath is when the receiver gets multiple copies of the same signal at slightly different times, potentially causing data corruption. Understanding these behaviors is critical for predicting coverage and performance during a site survey, a key skill tested in the Cisco 642-637.

Another crucial concept is the decibel (dB), a logarithmic unit used to express RF power levels. Because RF power can vary by enormous factors, a logarithmic scale makes the numbers more manageable. A related unit, dBm, represents power relative to one milliwatt. For example, 0 dBm is equal to 1 milliwatt. Understanding the "rules of 3s and 10s" is essential: a 3 dB gain doubles the power, while a 3 dB loss halves it. A 10 dB gain represents a tenfold power increase. These calculations are fundamental for site survey analysis and network design.

Understanding Antenna Theory

Antennas are the components that convert electrical signals into RF waves for transmission and vice versa for reception. Their design and selection are critical to the performance of a WLAN, and this topic was thoroughly examined in the Cisco 642-637 curriculum. Antennas do not create energy; they simply focus or shape the radiated RF energy in specific patterns. This property is known as gain, measured in dBi (decibels relative to an isotropic radiator). An isotropic radiator is a theoretical, perfect antenna that radiates energy equally in all directions, forming a perfect sphere.

There are two primary categories of antennas: omnidirectional and directional. Omnidirectional antennas radiate RF energy in a 360-degree horizontal pattern, often described as a doughnut shape. They are ideal for providing general coverage in open areas, such as a large office floor or a warehouse. They typically have lower gain compared to directional antennas because their energy is spread out over a wider area. Standard dipole or "rubber duck" antennas found on many consumer-grade routers and some enterprise APs are omnidirectional.

Directional antennas, in contrast, concentrate the RF energy in a specific direction. This results in a much stronger signal over a longer distance within that focused beam, but very poor coverage in other directions. Examples include Yagi, patch, and parabolic grid antennas. These are used for point-to-point links between buildings or to provide coverage in long, narrow spaces like hallways or aisles in a retail store. The choice of antenna is a critical design decision that directly impacts coverage, capacity, and interference, making it a key focus of the Cisco 642-637.

The polarization of an antenna refers to the orientation of the electric field of the RF wave it transmits. For optimal communication, the antennas on both the transmitting and receiving devices should have the same polarization. Most Wi-Fi antennas are vertically polarized. Mismatching polarization can result in a significant signal loss, potentially as much as 20 dB or more. Modern technologies like MIMO (Multiple Input, Multiple Output) use multiple antennas with different polarizations to combat the negative effects of multipath and improve data throughput, a concept that builds upon these fundamental antenna principles.

WLAN Security Fundamentals

Security is a paramount concern in any network, but it takes on special importance in wireless networks due to their broadcast nature. The Cisco 642-637 exam required a solid grasp of fundamental WLAN security concepts. The earliest security standard, Wired Equivalent Privacy (WEP), was deeply flawed and is now considered obsolete. It used a weak encryption algorithm and a static key, making it easy to crack. Its successor, Wi-Fi Protected Access (WPA), introduced the Temporal Key Integrity Protocol (TKIP) to fix the major vulnerabilities of WEP.

The modern standard for WLAN security is Wi-Fi Protected Access II (WPA2), which uses the Advanced Encryption Standard (AES) for robust encryption. WPA2 is available in two modes: Personal and Enterprise. WPA2-Personal, also known as WPA2-PSK (Pre-Shared Key), uses a single password for all users. While simple to implement, it is less secure and scalable for business environments. If the key is compromised, the entire network is at risk, and changing the key for all users can be a logistical challenge.

WPA2-Enterprise provides a much higher level of security by authenticating each user individually. This is achieved using the IEEE 802.1X standard, which involves three components: a supplicant (the client device), an authenticator (the access point), and an authentication server, typically a RADIUS (Remote Authentication Dial-In User Service) server. Users authenticate with their own credentials, such as a username and password. This allows for granular access control, centralized user management, and individual accountability, making it the standard for enterprise deployments and a key area of study for the Cisco 642-637.

Beyond encryption and authentication, other security threats must be considered. Rogue access points are unauthorized APs connected to the corporate network, creating a significant security backdoor. A rogue AP can be deployed maliciously by an attacker or inadvertently by an employee trying to set up their own wireless access. A CUWN architecture helps in detecting and locating these rogue devices by having its managed APs constantly scan the airwaves for other Wi-Fi devices. Mitigating these threats is a core competency for wireless professionals.

The Site Survey Process

The very name of the Cisco 642-637 exam, Conducting Cisco Unified Wireless Site Survey, highlights the importance of this process. A site survey is the systematic process of planning and designing a WLAN to meet specific requirements for coverage, capacity, and performance. It is not simply about placing APs wherever there is a power outlet. A proper survey involves a detailed analysis of the physical environment, identification of potential RF interference, and careful planning of AP placement and configuration to create a robust and reliable network.

The process typically begins with a requirements gathering phase. This involves interviewing stakeholders to understand the business needs. Key questions include: What types of applications will be used? What is the required data rate? How many users will be on the network simultaneously? What types of devices will be connecting? What are the security requirements? The answers to these questions will define the design criteria for the network and are a crucial first step before any physical survey work begins. This initial planning phase is a major component of the Cisco 642-637 methodology.

Following the planning phase is the physical survey itself. This can be broken down into two main types: a predictive survey and an on-site survey. A predictive survey uses software tools to model the RF environment. The engineer imports floor plans into the software, draws walls and defines their material types, and then places virtual APs to predict the resulting RF coverage. This is an excellent starting point for designing a network, especially for new buildings where physical access is not yet possible. It provides a solid baseline for the design.

An on-site survey involves going to the physical location with specialized hardware and software to take real-world RF measurements. This can be a pre-deployment survey (also known as an AP-on-a-stick survey) to validate a predictive model, or a post-deployment survey to verify that the installed network meets the design requirements. During an AP-on-a-stick survey, a single AP is mounted on a tripod at a proposed location and powered up. The surveyor then walks the area, taking measurements to map the actual RF coverage from that specific location. This empirical data is far more accurate than a predictive model alone.

The final stage is the analysis and reporting. The data collected from the survey tools is compiled into a comprehensive report. This report typically includes heatmaps showing RF signal strength, signal-to-noise ratio (SNR), and co-channel interference across the floor plan. It also provides a detailed bill of materials, a map with the precise locations for AP installation, and specific configuration recommendations for channels and power levels. This final document serves as the blueprint for the network installation team and is the ultimate deliverable of the site survey process emphasized in the Cisco 642-637.

Configuring the Cisco Unified Wireless Network for the 642-637

Building on the foundational knowledge of RF principles and survey methodologies covered in the first part of this series, this section dives into the practical aspects of configuring a Cisco Unified Wireless Network (CUWN). The Cisco 642-637 exam required not only the ability to plan a wireless network but also a strong understanding of how to implement that plan on Cisco hardware. This part will explore the initial setup of a Wireless LAN Controller (WLC), the configuration of Wireless LANs (WLANs), and the deployment of various access point modes.

The transition from theory to practice is a critical step for any network engineer. Understanding the graphical user interface (GUI) and command-line interface (CLI) of a Cisco WLC is essential for day-to-day operations. We will walk through the key configuration steps, from initial boot-up to creating a fully functional and secure wireless network. This hands-on knowledge is what separates a novice from an expert and was a key differentiator for candidates taking the Cisco 642-637. We will focus on the logic behind the configuration choices, ensuring a deep understanding of the technology.

Initial Wireless LAN Controller (WLC) Setup

The Wireless LAN Controller is the central point of management in the Cisco Unified Wireless Network architecture. Before it can manage any access points or service any clients, it must undergo an initial configuration. When a WLC is powered on for the first time, it runs through a startup wizard that prompts the administrator for basic setup information. This can be done via a console connection. The wizard asks for essential details such as the system name, administrative username and password, and network interface configurations.

A crucial part of the initial setup is configuring the various interfaces on the WLC. The management interface is the primary IP address used for in-band management of the controller, such as accessing the web GUI or using SSH. It is also the source interface for communication with access points. A separate AP-manager interface is also required; this is the interface to which Lightweight Access Points (LAPs) will connect to join the controller. Dynamic interfaces, also known as VLAN interfaces, are created to map wireless user traffic to specific VLANs on the wired network. Proper interface configuration is fundamental and a common topic in the Cisco 642-637.

The startup wizard also configures fundamental wireless parameters. This includes setting the network name or Service Set Identifier (SSID) for the first WLAN, defining the security method (such as WPA2-PSK), and configuring RADIUS server information if WPA2-Enterprise is being used. It will also ask for virtual gateway IP address, which is used for mobility management and DHCP relay functions. Completing this wizard establishes a baseline configuration, allowing the administrator to access the controller's web interface for more detailed and advanced configuration tasks.

Once the initial setup is complete, access points can discover and join the controller. There are several methods for an AP to discover a WLC. It can use a Layer 3 broadcast on its local subnet, use DNS to resolve the name CISCO-CAPWAP-CONTROLLER, or use DHCP options. If the APs are on a different subnet from the WLC's management interface, one of these Layer 3 discovery methods must be configured on the wired network infrastructure. The process of an AP joining a controller is a critical sequence of events that every wireless engineer must understand.

Configuring WLANs and Security

Once the WLC is online, the next step is to create the Wireless LANs (WLANs) that will provide service to clients. In the WLC's terminology, a WLAN is a logical profile that ties together an SSID, a security policy, and a network interface. An administrator can create multiple WLANs on a single controller, each with its own distinct settings. For example, one WLAN could be for corporate users with 802.1X security, while another could be for guests with a simple web authentication portal. The Cisco 642-637 curriculum required proficiency in creating and managing these profiles.

When creating a WLAN, the first step is to define the profile name and the SSID. The SSID is the name that is broadcasted to wireless clients. Next, you must associate the WLAN with one of the dynamic interfaces configured on the WLC. This association determines which VLAN the wireless client traffic will be placed on once it enters the wired network. This is how wireless users are segmented from other parts of the network, which is a fundamental security and network design practice.

The security tab for a WLAN profile is where the most critical settings are configured. For Layer 2 security, you can choose from options like WPA2 with Pre-Shared Key (PSK) or 802.1X. If 802.1X is chosen, the WLC must be configured with the IP address and shared secret of a RADIUS authentication server. This server will be responsible for validating user credentials. You can also configure Layer 3 security options, such as web authentication, which is commonly used for guest networks. This method redirects users to a web portal where they must accept terms and conditions or enter credentials before gaining network access.

Advanced settings for each WLAN allow for fine-tuning performance and client behavior. These include Quality of Service (QoS) profiles, which can prioritize traffic for applications like voice and video. You can also set session timeouts, configure client exclusion policies, and enable features like DHCP required, which forces clients to obtain an IP address via DHCP. A thorough understanding of all these options is necessary to build a WLAN that is not only functional but also secure and optimized for the specific needs of the environment, a key objective of the Cisco 642-637.

Understanding Access Point Operational Modes

Cisco access points can operate in several different modes, each serving a specific purpose within the Unified Wireless Network. The default and most common mode is Local mode. In Local mode, the AP actively serves clients on a specific channel while also monitoring the RF environment on that same channel for interference and rogue devices. The AP transmits and receives data traffic for connected clients, tunneling it back to the WLC via the Control and Provisioning of Wireless Access Points (CAPWAP) protocol.

Another important mode is FlexConnect. This mode is designed for branch office or remote site deployments where there is no local WLC. A FlexConnect AP connects to a central WLC over a WAN link. In this mode, the AP can switch traffic locally at the branch office instead of tunneling it all back to the central controller. This saves WAN bandwidth and allows the wireless network to continue functioning even if the connection to the central WLC is lost. This operational resiliency makes FlexConnect a popular and important design choice, frequently discussed in the context of the Cisco 642-637.

For dedicated RF monitoring and security, APs can be placed in Monitor mode. A monitor mode AP does not serve any clients. Instead, it dedicates its radios to scanning all wireless channels to detect rogue devices, intrusion attempts, and interference sources. This data is then reported back to the WLC and the management system. This provides a much more comprehensive view of the RF environment than the limited off-channel scanning that a Local mode AP can perform. A network with high-security requirements will often have a mix of Local and Monitor mode APs.

Other specialized modes include Rogue Detector, Sniffer, and Bridge mode. A Rogue Detector AP is optimized for detecting rogue devices on the wired network by listening for MAC addresses of wireless clients. A Sniffer mode AP captures all wireless traffic on a specific channel and forwards it to a packet analysis tool like Wireshark for deep troubleshooting. Bridge mode is used to create wireless point-to-point or point-to-multipoint links between buildings, effectively using the APs as a wireless Ethernet cable. Each mode has a specific use case, and a network architect must choose the right mode for the job.

Radio Resource Management (RRM)

One of the most powerful features of the Cisco Unified Wireless Network is Radio Resource Management, or RRM. RRM is a suite of algorithms that run on the WLC to automatically manage and optimize the RF environment. It dynamically adjusts the channel and transmit power settings of the access points to create the best possible performance for wireless clients. This automation eliminates the need for manual RF planning in many situations and helps the network adapt to changing RF conditions. A grasp of RRM is essential for anyone working with Cisco wireless and for the Cisco 642-637.

RRM's two primary functions are Transmit Power Control (TPC) and Dynamic Channel Assignment (DCA). The TPC algorithm adjusts the power level of each AP to provide adequate coverage without causing excessive co-channel interference. It aims to set the power level of an AP so that its signal is received by its nearest neighbor at a specific threshold, typically around -70 dBm. This prevents APs from shouting too loudly and interfering with each other, which is a common problem in dense deployments.

The DCA algorithm assigns the optimal channel to each AP to minimize co-channel and adjacent channel interference. The WLC builds a picture of the entire RF environment by collecting information from all its APs. It then runs the DCA algorithm, typically on a periodic basis or when a major RF event occurs, to calculate a new channel plan for the entire network. This ensures that adjacent APs are on non-overlapping channels whenever possible, which is crucial for performance, especially in the crowded 2.4 GHz band.

RRM also includes features for coverage hole detection and mitigation. If a client device has a poor connection and its signal strength drops below a certain threshold, the WLC can detect this "coverage hole." It can then attempt to mitigate the issue by temporarily increasing the transmit power of the surrounding APs to provide better coverage in that area. RRM is a complex but powerful tool, and while its default settings work well in many cases, understanding how to tune its parameters is a hallmark of an experienced wireless engineer.

Managing Mobility and Roaming

Client roaming is the process of a wireless device moving its connection from one access point to another without losing network connectivity. In a CUWN architecture, this process is managed by the WLC, which makes roaming seamless and fast. Because the WLC acts as a central anchor point for all client traffic, a client's IP address and session state can be maintained even as it moves between APs that are managed by the same controller. This is a form of Layer 2 roaming, as the client remains on the same IP subnet.

When multiple controllers are deployed in a large network, for instance across a large university campus, clients may need to roam between APs that are managed by different WLCs. To support this, the controllers are grouped into a mobility group. Controllers within a mobility group share information about clients, allowing a client to roam between them without having to re-authenticate or obtain a new IP address. This is known as inter-controller roaming, or Layer 3 roaming if the controllers are on different subnets.

The WLC uses a concept called an RF Group, which is related to but distinct from a mobility group. The WLCs designated as part of the same RF Group, and with a shared RF Group Name, collaborate on RRM calculations. One controller is dynamically elected as the RF Group Leader. This leader collects RF data from all APs associated with all controllers in the group and then runs the TPC and DCA algorithms for the entire group. This ensures that a consistent and optimized RF plan is applied across the entire campus, preventing controllers from making isolated and potentially conflicting decisions.

Proper mobility design is critical for applications that are sensitive to latency and packet loss, such as voice and video over Wi-Fi. Fast and seamless roaming ensures that a voice call does not drop as a user walks down a hallway. Technologies like 802.11k, 802.11r, and 802.11v, collectively known as Fast Transition, help to optimize the roaming process by allowing clients to gather information about neighboring APs more efficiently and transition their connection more quickly. Configuring and troubleshooting mobility was a significant part of the Cisco 642-637 skill set.

Advanced Security and Guest Access for the Cisco 642-637

Having covered the fundamentals of RF, site surveys, and basic WLC configuration, this third part of our series focuses on one of the most critical aspects of any wireless network: security. The Cisco 642-637 exam placed a strong emphasis on the ability to design and implement robust security policies. We will move beyond the basics of WPA2 and explore the intricacies of 802.1X authentication, delve into the various Extensible Authentication Protocol (EAP) types, and examine how to securely provide network access for guests and visitors.

In today's environment, a breach in wireless security can have devastating consequences for an organization. Therefore, a wireless engineer must be proficient in implementing a multi-layered security approach. This includes strong encryption, robust authentication, and mechanisms to detect and mitigate wireless threats. This section will provide a detailed look at the enterprise-grade security features available in the Cisco Unified Wireless Network, equipping you with the knowledge required to build a secure and resilient wireless infrastructure, in line with the objectives of the Cisco 642-637 certification.

Deep Dive into 802.1X and EAP

As introduced earlier, 802.1X is the IEEE standard for port-based network access control, providing an enterprise-grade authentication framework. It is the foundation of WPA2-Enterprise. The framework involves a supplicant (the client), an authenticator (the AP), and an authentication server (a RADIUS server). The actual authentication process, however, is carried out by a specific method encapsulated within the 802.1X framework. This method is defined by the Extensible Authentication Protocol (EAP). EAP is not a single protocol but rather a framework that supports many different authentication types.

The choice of EAP type is a critical security decision. It determines how the user and the network will prove their identities to each other. Some EAP types use digital certificates for authentication, while others use username and password credentials. A key difference between EAP types is whether or not they create a secure, encrypted tunnel to protect the user's credentials as they travel from the client to the authentication server. EAP methods that provide this protection are known as "tunneled" EAP types. The Cisco 642-637 required a thorough understanding of these different methods and their use cases.

One of the most common tunneled EAP types is Protected EAP, or PEAP. With PEAP, the authentication server first presents a digital certificate to the client. The client verifies this certificate to ensure it is talking to a legitimate server. Once this trust is established, a secure TLS (Transport Layer Security) tunnel is created between the client and the server. Inside this encrypted tunnel, the client can safely send its username and password for authentication, typically using a method called Microsoft Challenge-Handshake Authentication Protocol version 2 (MS-CHAPv2).

Another widely used EAP type is EAP-TLS (Transport Layer Security). This is considered one of the most secure EAP methods available. Unlike PEAP, which only requires a certificate on the server side, EAP-TLS requires a digital certificate on both the server and every single client device. The client and server exchange certificates to mutually authenticate each other. While this provides very strong security, it introduces significant administrative overhead, as a unique certificate must be issued and managed for every user and device. This makes it less common than PEAP but ideal for high-security environments.

A third important method is EAP-FAST (Flexible Authentication via Secure Tunneling). Developed by Cisco, EAP-FAST is similar to PEAP in that it creates a secure tunnel. However, it does not require a server-side certificate. Instead, it uses a Protected Access Credential (PAC), which is a unique shared secret established between the client and the authentication server during the initial connection. EAP-FAST was designed to be a lightweight and fast alternative to PEAP, though its use has declined as PEAP has become the de facto standard in many enterprises.

Configuring Guest Wireless Access

Providing wireless access to guests, visitors, and contractors is a common requirement for almost every organization. However, this access must be provided in a way that does not compromise the security of the internal corporate network. The goal is to give guests simple, controlled access to the internet while keeping them completely isolated from internal resources. The Cisco Unified Wireless Network offers several flexible and secure methods for implementing guest access, a key topic for the Cisco 642-637.

The most common method for guest access is using a web-based authentication portal, also known as a captive portal. With this method, guest users connect to an open or PSK-secured SSID. When they open a web browser, they are automatically redirected to a login page. This page can be customized with the company's branding and can require the user to simply accept an acceptable use policy, enter a pre-assigned username and password, or self-register to receive credentials via email or SMS. This process is managed through the Layer 3 security settings on the WLAN profile.

The isolation of guest traffic is critically important. This is typically achieved by placing the guest WLAN on a dedicated VLAN that is firewalled off from the rest of the corporate network. This VLAN should only have a path out to the internet and no route to any internal subnets. Additionally, the WLC has a feature called "P2P Blocking" which can be enabled on the guest WLAN. This feature prevents guest clients connected to the same AP from communicating directly with each other, enhancing security in a public environment.

For more sophisticated guest management, an external guest access server, such as the Cisco Identity Services Engine (ISE), can be integrated with the WLC. ISE provides advanced features like guest user self-registration, sponsored guest access (where an employee must approve a guest's access), and time-based access policies. It also allows for much more extensive customization of the captive portal experience. While a full ISE deployment is a complex topic, understanding its role in providing secure guest access is part of a comprehensive wireless security skill set.

Another approach is to use a dedicated WLC in the Demilitarized Zone (DMZ) of the network specifically for guest traffic. In this design, guest APs tunnel their traffic to this DMZ controller, which is already located outside the main corporate firewall. This provides a very strong physical and logical separation between guest and corporate traffic. While this architecture provides the highest level of security, it also adds cost and complexity. The choice of guest access architecture depends on the organization's specific security requirements and budget.

Wireless Intrusion Prevention and Detection

Beyond controlling who can get on the network, a comprehensive security strategy must also focus on detecting and preventing malicious activity in the RF airspace. The broadcast nature of Wi-Fi makes it susceptible to a variety of attacks. The Cisco Unified Wireless Network includes a built-in Wireless Intrusion Prevention System (WIPS) capability, known as Adaptive wIPS. This system leverages the managed access points to monitor the airwaves for threats. This was a key security feature covered in the Cisco 642-637 syllabus.

The system uses a signature-based approach to detect known wireless attacks. These signatures can identify activities like denial-of-service (DoS) attacks, where an attacker floods the airwaves with de-authentication or disassociation frames to disrupt client connectivity. It can also detect man-in-the-middle attacks, where an attacker sets up a malicious AP (an "evil twin") with the same SSID as the corporate network to trick users into connecting and capturing their traffic. The system maintains a database of these attack signatures, which is regularly updated.

When a threat is detected, the system can take several actions. First, it will generate an alert that is sent to the network administrator via the management platform. This allows for immediate investigation. For certain types of attacks, the system can take active containment measures. For example, if a rogue AP is detected, a nearby managed AP can send de-authentication frames to any clients that are connected to the rogue device, effectively disconnecting them from the threat. This containment must be used carefully, as it can have legal implications and can also disrupt legitimate nearby wireless networks.

The effectiveness of the WIPS system depends heavily on the placement and mode of the access points. While Local mode APs provide some WIPS capability, they can only scan for threats on their primary service channel. For comprehensive protection, it is recommended to deploy dedicated Monitor mode APs. These APs do not serve clients and spend 100% of their time scanning all channels for threats. A well-designed network will typically have a ratio of about one Monitor mode AP for every five Local mode APs to provide robust security coverage.

The management platform, such as Cisco Prime Infrastructure or DNA Center, plays a crucial role in the WIPS architecture. It is the central repository for all security events and provides the tools for analyzing threats, tracking down the physical location of rogue devices, and generating reports for security audits. The ability to quickly identify, locate, and mitigate wireless threats is a critical skill for a wireless security professional and a core component of the knowledge required for the Cisco 642-637.

Management Frame Protection (MFP)

Management frames are a category of 802.11 frames that are used to manage the wireless connection. These include frames like probe requests, beacons, authentication, and association frames. Historically, these frames were sent unencrypted and without any integrity checks. This made them vulnerable to spoofing, allowing an attacker to forge management frames to launch attacks, such as the de-authentication DoS attack mentioned previously. To counter this, the 802.11w standard was developed, which provides protection for these critical frames.

Cisco's implementation of this standard is called Management Frame Protection (MFP). MFP protects management frames by adding a Message Integrity Check (MIC) to each one. This allows the receiving device to verify that the frame was sent by a legitimate network device and has not been tampered with. This effectively prevents an attacker from spoofing management frames and launching many common wireless attacks. MFP is a key security feature that should be enabled in any secure wireless deployment.

MFP can be configured in two main modes: Infrastructure MFP and Client MFP. Infrastructure MFP protects management frames sent by the access points. This is relatively easy to enable and provides a good baseline of protection. Client MFP provides protection for management frames sent by the client devices. For Client MFP to work, the client device itself must support the 802.11w standard. When Client MFP is enabled, both the AP and the client must be capable of MFP for the client to be able to connect.

The WLC allows for granular configuration of MFP. It can be set to be disabled, optional, or required on a per-WLAN basis. When set to optional, MFP-capable clients will use it, while non-capable clients can still connect without it. When set to required, only MFP-capable clients are allowed to connect to the WLAN. For the highest level of security, MFP should be set to required, but this may impact older client devices that do not support the standard. This trade-off between security and compatibility is a common consideration in network design.

Enabling MFP is a simple yet highly effective way to harden a wireless network against a wide range of common attacks. It is considered a best practice for enterprise wireless security. A thorough understanding of what MFP is, how it works, and how to configure it was an important piece of the security puzzle for the Cisco 642-637 exam, demonstrating a candidate's ability to implement layered security controls.

Maintaining and Troubleshooting the Cisco 642-637 Wireless Network

After successfully planning, deploying, and securing a Cisco Unified Wireless Network, the job of a wireless engineer shifts to ongoing maintenance and troubleshooting. This fourth part of our series addresses the operational aspects of managing a wireless network, a critical skill set tested by the Cisco 642-637 exam. A well-designed network can still encounter problems due to environmental changes, client device issues, or configuration errors. Being able to efficiently identify, diagnose, and resolve these issues is what defines an effective network administrator.

We will explore the common tools and methodologies used to troubleshoot connectivity, performance, and RF-related problems within the CUWN architecture. From leveraging the rich diagnostic features of the Wireless LAN Controller to using external tools for packet analysis, this section will provide a practical guide to keeping a wireless network running smoothly. Proactive monitoring and a structured approach to troubleshooting are essential for minimizing downtime and ensuring a positive user experience, which are the ultimate goals of any network management strategy.

Troubleshooting Client Connectivity Issues

One of the most common tickets a network administrator will receive is "I can't connect to the Wi-Fi." This simple complaint can have a multitude of root causes, and a systematic approach is needed to solve it efficiently. The troubleshooting process should start by isolating the problem. Is it affecting a single user, a group of users in a specific area, or all users on a particular WLAN? Answering this question helps to narrow down the potential scope of the issue. The Cisco 642-637 emphasized this logical, step-by-step troubleshooting methodology.

The WLC's web interface is the primary tool for investigating client connectivity problems. The Monitor tab provides a detailed view of all currently associated clients. Here, you can search for a specific client by its MAC address to see its status. The client details page provides a wealth of information, including the AP it is connected to, its signal strength (RSSI), signal-to-noise ratio (SNR), the security policy being applied, and its IP address. This single page can often provide enough clues to identify the problem.

For example, if the client is stuck in the authentication phase, it points to a problem with the 802.1X/RADIUS configuration or incorrect credentials being used by the client. If the client authenticates but fails to get an IP address, the issue likely lies with the DHCP server or the VLAN configuration on the wired network. The WLC also provides detailed logs and debug commands that can show the step-by-step process of a client attempting to join the network, revealing exactly where the process is failing.

A common issue is a client with a low RSSI and SNR, indicating a poor RF connection. This could be due to the client being too far from the AP, or it could be a sign of RF interference. This is where the knowledge from the site survey process becomes invaluable. By understanding the expected coverage in a given area, you can determine if the client's performance is abnormal. The WLC's RRM dashboards can also be used to check for high interference levels or channel utilization in the area where the client is located.


Go to testing centre with ease on our mind when you use Cisco 642-637 vce exam dumps, practice test questions and answers. Cisco 642-637 Securing Networks with Cisco Routers and Switches (SECURE) certification practice test questions and answers, study guide, exam dumps and video training course in vce format to help you study with ease. Prepare with confidence and study using Cisco 642-637 exam dumps & practice test questions and answers vce from ExamCollection.

Read More


SPECIAL OFFER: GET 10% OFF

Pass your Exam with ExamCollection's PREMIUM files!

  • ExamCollection Certified Safe Files
  • Guaranteed to have ACTUAL Exam Questions
  • Up-to-Date Exam Study Material - Verified by Experts
  • Instant Downloads

SPECIAL OFFER: GET 10% OFF

Use Discount Code:

MIN10OFF

A confirmation link was sent to your e-mail.
Please check your mailbox for a message from support@examcollection.com and follow the directions.

Download Free Demo of VCE Exam Simulator

Experience Avanset VCE Exam Simulator for yourself.

Simply submit your e-mail address below to get started with our interactive software demo of your free trial.

sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |