how is a remote management HTTPS access connection secured?

When using a Cisco WLC version 7.0 with a default configuration, how is a remote management
HTTPS access connection secured?

When using a Cisco WLC version 7.0 with a default configuration, how is a remote management
HTTPS access connection secured?

A.
The Cisco WLC uses a pre-shared key to authenticate the user, which limits the number of
potential users that can access the controller.

B.
The Cisco WLC generates its own local web administration SSL certificate and automatically
applies it to the GUI.

C.
The Cisco WLC uses a CA certificate for SSL access.

D.
The Cisco WLC uses HTTPS to secure the HTTP session via a preconfigured password that
generates a certificate for each session.



Leave a Reply 2

Your email address will not be published. Required fields are marked *


nephelai

nephelai

gui

===============
You can protect communication with the GUI by enabling HTTPS. HTTPS protects HTTP browser
sessions by using the Secure Socket Layer (SSL) protocol. When you enable HTTPS, the
controller generates its own local web administration SSL certificate and automatically applies it
to the GUI. You also have the option of downloading an externally generated certificate.
http://www.cisco.comIc/enlus/td/docs/wirelesslcontroller/S-
OlconfigurationlguidelControllerSOCG/OBOintf.html