Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

Play button

Play button



Click to flip

13 Cards in this Set

  • Front
  • Back

Cisco controllers offer three techniques to minimize thetime and effort spent on key exchanges during roams:

-Cisco Centralized Key Management

-Key Caching


Define Cisco Centralized Key Management (CCKM)-

One controller maintains a database ofclients and keys on behalf of its APs and provides them to other controllers and theirAPs as needed during client roams. CCKM requires Cisco Compatible Extensions (CCX)support from clients.

Define Key Caching-

Each client maintains a list of keys used with prior AP associations andpresents them as it roams. The destination AP must be present in this list, which is limitedto eight AP-key entries.

Define 802.11r-

An 802.11 amendment that addresses fast roaming or fast BSS transition; a clientcan cache a portion of the authentication server’s key and present that to future APsas it roams. The client can also maintain its QoS parameters as it roams.

Local-to-Foreign Roam

Layer 3 inter-controller roam that allows the client to continue using the same IP address. A tunnel is built from the original controller to the new controller.

Anchor Controller vs. Foreign Controller

Anchor- Original controller

Foreign- Controller that device has roamed to

Under Monitor > Clients, a client who has roamed will be shown as:

802.11(Mobile), under Protocol

If two centralized controllers are configured to belong to the same mobility group, clientscan roam quickly between them because of the following features being supported:

Layer 2 and Layer 3 roaming are both supported, alongwith CCKM, key caching, and 802.11r credential caching. (Clients who roam between controllers that are not in the same mobility groups must authenticate between each roam)

In a centralized controller environment, thelist can contain up to

72 controllers, with up to 24 controllers in each mobility group.

Define Mobility Agent

controller function that handles mobility tasks facing theclients. For example, an MA terminates the CAPWAP tunnels that connect the controllerto the APs that have joined it. An MA also maintains a database of all client associations.Because the MA function faces the clients, it is in a convenient location to handle any security,QoS, and other policies that affect client activity

Define Mobility Controller

a function further upstream that manages roamingfor one or more Mobility Agents. It also performs higher-level tasks, such as CiscoRadio Resource Management (RRM) and wireless intrusion protection system (wIPS), andmanages guest wireless access.

Point of Presence

The WLC that anchors a client’s IP address, where the clientmeets the wired network. This is the point where the wireless client’s MAC address isseen from the perspective of the wired network. The PoP is also the point at which securitypolicies that affect the client are applied.

Point of Attachment

The WLC that terminates the CAPWAP tunnel to the APwhere a client is currently located. The PoA is also the point at which QoS and roamingpolicies can be applied, closest to the client.