You need to have "Accept Manufactured Installed Certificate (MIC)" checked, or the WLC won't accept the AP in the first place. If you are also doing mac-filtering in order to ensure that only the specified APs are accepted, then you would also check the "Authorize MIC APs against auth-list or AAA" box and enter the MAC addresses in the auth-list. Just checking "Authorize MIC APs against auth-list or AAA" doesn't mean that the WLC will accept APs with a MIC, only that the ones that could potentially connect are then authorized against the mac-filter. Think of it as the difference between authentication (accept the MIC) and authorization (check to see if it is in the mac-filter list).
Jason Boyers, CCIE #26024 (Wireless) Blog: netboyers.wordpress.com On Wed, Feb 5, 2014 at 8:18 AM, cisco 2006 <[email protected]> wrote: > > > > Well , I'm going to reconfigure the switches and WLC from the beginning . > Could any one help me how to start the configuration in the switches an > controller . > > the controller is 5508 7.4 > the APs are 3600 > > Many thanks and best Regards, > Israa > > ------------------------------ > On Wed, Feb 5, 2014 3:28 PM AST (Arabian) Brendon Hwang wrote: > > >can you get below again? > > > >show auth-list > >show traplog > > > >Regards, > >Brendon > > > > > > > > > >On 5 Feb 2014, at 11:03 pm, cisco 2006 <[email protected]> wrote: > > > >I put in the mac addr authentication list , but also in vane. > > > > > > > > > >On Wednesday, 5 February 2014, 14:55, Brendon Hwang <[email protected]> > wrote: > >I think Raul was going into right direction. > > > >In other email thread you have 6c416a297355 mac addr failing AAA. isn't > that mac addr of AP in question? > >You should put that mac addr into auth-list if that's the case > > > >Regards, > >Brendon > > > > > > > > > >On 5 Feb 2014, at 10:20 pm, cisco 2006 <[email protected]> wrote: > > > > > >I change the policy as follows because when I use Accept Manufactured > Installed Certificate (MIC) all APs disappear . > > > > > > > >AP Policies > > > >Policy Configuration > > > >Accept Self Signed Certificate (SSC) > >Accept Manufactured Installed Certificate (MIC) > >Accept Local Significant Certificate (LSC) > >Authorize MIC APs against auth-list or AAA > >Authorize LSC APs against auth-list > >AP Authorization List > >Entries 1 - 2 of 2 > > > >Search by MAC > >MAC Address Certificate Type SHA1 Key Hash > > > > > > > > > > > > > > > >All AP > >Entries 1 - 1 of 1 > >Current Filter None [Change Filter] [Clear Filter] > > > >Number of APs > >AP Name AP Model AP MAC AP Up Time Admin > Status Operational Status Port AP Mode Certificate Type > OEAP Primary SW version Backup SW version AP Sub Mode > Download Status Upgrade Role (Master/Slave) > > > > > > > > > >On Wednesday, 5 February 2014, 14:15, Raul Manzano <[email protected]> > wrote: > >Can you attach a screenshot about the AP policies of your WLC??? > > > > > > > > > >2014-02-05 <[email protected]>: > >Send CCIE_Wireless mailing list submissions to > > [email protected] > > > >To subscribe or unsubscribe via the World Wide Web, visit > > http://onlinestudylist.com/cgi-bin/mailman/listinfo/ccie_wireless > >or, via email, send a message with subject or body 'help' to > > [email protected] > > > >You can reach the person managing the list at > > [email protected] > > > >When replying, please edit your Subject line so it is more specific > >than "Re: Contents of CCIE_Wireless digest..." > > > > > >Today's Topics: > > > > 1. Re: CCIE_Wireless Digest, Vol 58, Issue 20 (cisco 2006) > > > > > >---------------------------------------------------------------------- > > > >Message: 1 > >Date: Wed, 5 Feb 2014 10:52:51 +0000 (GMT) > >From: cisco 2006 <[email protected]> > >To: cisco 2006 <[email protected]>, Raul Manzano > > <[email protected]>, "[email protected]" > > <[email protected]> > >Subject: Re: [OSL | CCIE_Wireless] CCIE_Wireless Digest, Vol 58, Issue > > 20 > >Message-ID: > > <[email protected]> > >Content-Type: text/plain; charset="iso-8859-1" > > > >Trap Logs ???? > >Number of Traps since last reset?? 11635 ?? > >Number of Traps since log last viewed?? 5767 ?? > >Log > >System Time > >Trap > >0 Wed Feb 5 01:42:43 2014 AP Disassociated. Base Radio > MAC:d0:c7:89:0b:1a:b0 > >1 Wed Feb 5 01:42:43 2014 AP's Interface:1(802.11a) Operation State Down: > Base Radio MAC:d0:c7:89:0b:1a:b0 Cause=New Discovery Status:NA > >2 Wed Feb 5 01:42:43 2014 AP's Interface:0(802.11b) Operation State Down: > Base Radio MAC:d0:c7:89:0b:1a:b0 Cause=New Discovery Status:NA > >3 Wed Feb 5 01:40:17 2014 Configuration Saved from Web Interface > >4 Wed Feb 5 01:38:08 2014 AAA Authentication Failure for > UserName:6c416a297355 User Type: WLAN USER > >5 Wed Feb 5 01:38:02 2014 AAA Authentication Failure for > UserName:6c416a297355 User Type: WLAN USER > >6 Wed Feb 5 01:37:47 2014 AAA Authentication Failure for > UserName:6c416a297355 User Type: WLAN USER > >7 Wed Feb 5 01:37:41 2014 AAA Authentication Failure for > UserName:6c416a297355 User Type: WLAN USER > >8 Wed Feb 5 01:37:26 2014 AAA Authentication Failure for > UserName:6c416a297355 User Type: WLAN USER > >9 Wed Feb 5 01:37:20 2014 AAA Authentication Failure for > UserName:6c416a297355 User Type: WLAN USER > > > > > > > >On Wednesday, 5 February 2014, 13:35, cisco 2006 <[email protected]> > wrote: > > > >Yes it is disable > > > > > > > >On Wednesday, 5 February 2014, 12:20, Raul Manzano <[email protected]> > wrote: > > > >Ok, but?"authorize mic aps against auth-list or AAA" is enable or > disable, because this option, unless you want to authorizate your AP > against AAA or MAc-filtering must be disabled. > > > >Cheers > > > > > > > >2014-02-05 <[email protected]>: > > > >Send CCIE_Wireless mailing list submissions to > >>? ? ? ? [email protected] > >> > >>To subscribe or unsubscribe via the World Wide Web, visit > >>? ? ? ? > http://onlinestudylist.com/cgi-bin/mailman/listinfo/ccie_wireless > >>or, via email, send a message with subject or body 'help' to > >>? ? ? ? [email protected] > >> > >>You can reach the person managing the list at > >>? ? ? ? [email protected] > >> > >>When replying, please edit your Subject line so it is more specific > >>than "Re: Contents of CCIE_Wireless digest..." > >> > >> > >>Today's Topics: > >> > >>? ?1. Re: CCIE_Wireless Digest, Vol 58, Issue 18 (cisco 2006) > >> > >> > >>---------------------------------------------------------------------- > >> > >>Message: 1 > >>Date: Wed, 5 Feb 2014 09:11:11 +0000 (GMT) > >>From: cisco 2006 <[email protected]> > >>To: Raul Manzano <[email protected]>, > >>? ? ? ? "[email protected]" > >>? ? ? ? <[email protected]> > >>Subject: Re: [OSL | CCIE_Wireless] CCIE_Wireless Digest, Vol 58, Issue > >>? ? ? ? 18 > >>Message-ID: > >>? ? ? ? <[email protected]> > >>Content-Type: text/plain; charset="iso-8859-1" > >> > >> > >> > >>Yes , I did the accept manufacture installed certificate but I recieved > this : > >> > >> > >> > >>Reason For Last Unsuccessful Attempt ? ?RADIUS authorization is pending > for the AP > >> > >> > >> > >> > >>On Wednesday, 5 February 2014, 11:57, Raul Manzano <[email protected]> > wrote: > >> > >>Try ti review in Security / AP policies that "accept manufacture > installed certificate" are enabled, also "authorize mic aps against > auth-list or AAA" are disabled unless you are using a AAA or internal > MAC-filter to authorize the join in this WLC. > >> > >>Cheers > >> > >> > >> > >>2014-02-05 <[email protected]>: > >> > >>Send CCIE_Wireless mailing list submissions to > >>? ? ? ? [email protected] > >> > >>To subscribe or unsubscribe via the World Wide Web, visit > >>? ? ? ? > http://onlinestudylist.com/cgi-bin/mailman/listinfo/ccie_wireless > >>or, via email, send a message with subject or body 'help' to > >>? ? ? ? [email protected] > >> > >>You can reach the person managing the list at > >>? ? ? ? [email protected] > >> > >>When replying, please edit your Subject line so it is more specific > >>than "Re: Contents of CCIE_Wireless digest..." > >> > >> > >>Today's Topics: > >> > >>? ?1. Re: AP not joined to WLC (cisco 2006) > >> > >> > >>---------------------------------------------------------------------- > >> > >>Message: 1 > >>Date: Wed, 5 Feb 2014 08:46:25 +0000 (GMT) > >>From: cisco 2006 <[email protected]> > >>To: Brendon Hwang <[email protected]> > >>Cc: "[email protected]" > >>? ? ? ? <[email protected]> > >>Subject: Re: [OSL | CCIE_Wireless] AP not joined to WLC > >>Message-ID: > >>? ? ? ? <[email protected]> > >>Content-Type: text/plain; charset="iso-8859-1" > >> > >>I can only get these output > >> > >> > >> > >>(Cisco Controller) debug>capwap errors enable? > >> > >>(Cisco Controller) debug>*spamApTask1: Feb 04 22:06:27.284: > sshpmFreePublicKeyHandle: freeing public key > >> > >>*spamApTask0: Feb 04 23:40:31.348: d0:c7:89:0b:1f:40 State machine > handler: Failed to process ?msg type = 3 state = 0 from 10.128.20.13:8308 > >> > >>?? > >>(Cisco Controller) debug> > >>(Cisco Controller) debug> ?*spamApTask0: Feb 04 23:40:31.348: > d0:c7:89:0b:1f:40 Failed to parse CAPWAP packet from 10.128.20.13:8308 > >> > >>*spamApTask1: Feb 04 23:42:01.311: 00:00:00:00:00:00 Invalid event > Capwap_heart_beat_timer_expiry & state Capwap_no_state combination > >> > >>*spamApTask1: Feb 04 23:42:01.311: d0:c7:89:0b:1f:40 Event = > Capwap_heart_beat_timer_expiry State = Capwap_no_state > >> > >>*spamApTask1: Feb 04 23:42:01.311: Failed to process timer message 1 > >> > >>? > >> > >>(Cisco Controller) debug>capwap events enable? > >> > >>(Cisco Controller) debug>*spamApTask1: Feb 04 23:43:31.927: > d0:c7:89:0b:1a:b0 DTLS connection not found, creating new connection for > 10:128:20:12 (38710) 10:128:20:10 (5246) > >> > >>*spamApTask1: Feb 04 23:43:32.403: d0:c7:89:0b:1a:b0 Allocated index > from main list, Index: 127 > >> > >>*spamApTask1: Feb 04 23:43:32.403: d0:c7:89:0b:1a:b0 DTLS keys for > Control Plane are plumbed successfully for AP 10.128.20.12. Index 128 > >> > >>*spamApTask2: Feb 04 23:43:32.403: d0:c7:89:0b:1a:b0 DTLS Session > established server (10.128.20.10:5246), client (10.128.20.12:38710) > >>*spamApTask2: Feb 04 23:43:32.403: d0:c7:89:0b:1a:b0 Starting wait join > timer for AP: 10.128.20.12:38710 > >> > >>*spamApTask1: Feb 04 23:43:37.403: d0:c7:89:0b:1a:b0 Join Request from > 10.128.20.12:38710 > >> > >>*spamApTask1: Feb 04 23:43:37.404: d0:c7:89:0b:1a:b0 Deleting AP entry > 10.128.20.12:38710 from temporary database. > >>*spamApTask1: Feb 04 23:43:37.404: d0:c7:89:0b:1a:b0 MIC AP is not > allowed to join by config > >> > >> > >> > >> > >>On Wednesday, 5 February 2014, 11:30, Brendon Hwang <[email protected]> > wrote: > >> > >>Hello, > >> > >>You can try below. ?I am not sure what info had been delivered from you > to other guys hence I just ask few useful information you can gather if > console is possible. > >> > >>show capwap client config > >>show capwap client rcb > >> > >>- do this if AP keeps on rebooting > >>Debug capwap client no-r ?? > >> > >>- mainly you can use below for useful info. > >>debug capwap client event > >> > >> > >>Regards, > >>Brendon > >> > >> > >> > >> > >>On 5 Feb 2014, at 6:38 pm, cisco 2006 <[email protected]> wrote: > >> > >>No I don't have . > >>But if it is neccesary need I will try to access the AP . But what > outputs of commands do you want.? > >> > >> > >>Please not that all interfaces in the same vlan? > >> > >>Interfaces Entries 1 - 6 of 6 > >>Interface Name VLAN Identifier IP Address Interface Type Dynamic AP > Management ? > >>? > >> > >> > >> > >>On Wednesday, 5 February 2014, 10:30, Brendon Hwang <[email protected]> > wrote: > >> > >>Do you have a console connection to AP by any chance? > >> > >> > >>Regards, > >>Brendon > >> > >> > >> > >> > >>On 5 Feb 2014, at 6:24 pm, cisco 2006 <[email protected]> wrote: > >> > >>It is 5508? > >> > >> > >> > >>On Wednesday, 5 February 2014, 10:15, Andreas di Zazzo < > [email protected]> wrote: > >> > >>Btw what controller is it? Since it looks like the access-points are > running MESH image. The virtual WLC do not support that. > >>? > >>From:[email protected] [mailto: > [email protected]] On Behalf Of cisco 2006 > >>Sent: den 5 februari 2014 08:03 > >>To: Jeff Rensink > >>Cc: [email protected] > >>Subject: Re: [OSL | CCIE_Wireless] AP not joined to WLC > >>? > >>Also see this output? > >>? > >>? > >>(Cisco Controller) >debug capwap errors enable? > >>(Cisco Controller) >*spamApTask1: Feb 04 03:18:49.454: d0:c7:89:0b:1f:40 > Join Request: Total msgEleLen = 0? > >>? > >>*spamApTask0: Feb 04 21:58:15.193: d0:c7:89:0b:1f:40 State machine > handler: Failed to process ?msg type = 3 state = 0 from 10.128.20.13:8308 > >>? > >>*spamApTask0: Feb 04 21:58:15.193: d0:c7:89:0b:1f:40 Failed to parse > CAPWAP packet from 10.128.20.13:8308 > >>? > >>*spamApTask1: Feb 04 21:58:25.977: d0:c7:89:0b:1a:b0 Echo Timer Expiry: > Missing Echo from APd0:c7:89:0b:1a:b0, Closing dtls Connection. > >>*spamApTask1: Feb 04 21:58:42.448: d0:c7:89:0b:1a:b0 State machine > handler: Failed to process ?msg type = 3 state = 0 from 10.128.20.12:38711 > >>? > >>*spamApTask1: Feb 04 21:58:42.448: d0:c7:89:0b:1a:b0 Failed to parse > CAPWAP packet from 10.128.20.12:38711 > >>? > >>q*spamApTask0: Feb 04 21:59:08.726: d0:c7:89:0b:1f:40 DTLS connection > was closed > >>*spamApTask1: Feb 04 21:59:24.357: d0:c7:89:0b:1f:40 State machine > handler: Failed to process ?msg type = 3 state = 0 from 10.128.20.13:8309 > >>? > >>*spamApTask1: Feb 04 21:59:24.358: d0:c7:89:0b:1f:40 Failed to parse > CAPWAP packet from 10.128.20.13:8309 > >>? > >>*spamApTask1: Feb 04 21:59:35.981: d0:c7:89:0b:1a:b0 DTLS connection was > closed > >>? > >>? > >>On Wednesday, 5 February 2014, 9:53, cisco 2006 <[email protected]> > wrote: > >>The following are the output of the controller . Also notice that the > exchange of control data is in plain text as follows > >>? > >>Wireless > all aps > ap > advanced > ?Current Data Encryption > Status???????plain text > >>? > >>Please let me know if need any further information . > >>? > >>? > >>(Cisco Controller) >show ap retransmit all > >>Global control packet retransmit interval: 3 > >>Global control packet retransmit count: 5 > >>AP Name???????????? Retransmit Interval? Retransmit count > >>------------------? -------------------? ------------------- > >>AP6c41.6a29.7355?????? N/A(Mesh mode)????? N/A(Mesh mode) > >>? > >>? > >>(Cisco Controller) >show country code > >>Configured Country............................. US? - United States > >>Configured Country Codes > >>??????? US? - United States............................. 802.11a > Indoor,Outdoor / 802.11b / 802.11g > >>? > >>? > >>? > >>On Wednesday, 5 February 2014, 2:11, Jeff Rensink <[email protected]> > wrote: > >>What do you mean by this? ?Can you give us a screenshot of your Country > codes screen? (or a "show country" command in the CLI) > >> > >> > >>Regards, > >>? > >>Jeff Rensink : Sr Instructor : iPexpert > >>CCIE # 24834 :: Wireless / R&S > >>:: World-Class Cisco Certification Training > >> > >> > >>Direct: +1.810.326.1444 > >>:: Free Videos > >>:: Free Training / Product Offerings > >>:: CCIE Blog > >>:: Twitter > >>? > >>On Tue, Feb 4, 2014 at 9:22 AM, cisco 2006 <[email protected]> wrote: > >> > >> > >>also when I configured the country code , it appairs not configured in > regularity domains. > >> > >> > >> > >> > >> > >> > >>------------------------------ > >>On Tue, Feb 4, 2014 6:02 PM AST (Arabian) Maxim Risman wrote: > >> > >>>Hello, what is the WLC version code you are running ? > >>> > >>>Thank you. > >>> > >>> > >>>On Tue, Feb 4, 2014 at 4:56 AM, cisco 2006 <[email protected]> wrote: > >>> > >>> Dear All, > >>> I need you help to solve this issue in my wireless LAN . > >>> When I connect the AP 3600 to the Switch the AP get the IP from the > DHCP > >>> but it is not joined with the WLC 5508 and I get > >>?this output from the > >>> controller . I have to mention that the mangement interface , dynamic > >>> interface and APs in the same VLAN . > >>> > >>> > >>> > >>> > >>> ?*All APs* > >>> ? ? *Entries 1 - 2 of 2* > >>> > >>> ?*Current Filter* > >>> ?*None* > >>> > >>> ?[Change Filter] [Clear Filter] > >>> > >>> ? ?*Number of APs* > >>> > >>> > >>> ?*AP Name* > >>> > >>> ?*AP Model* > >>> ?*AP MAC* > >>> ?*AP Up Time* > >>> ?*Admin Status* > >>> ?*Operational Status* > >>> ?*Port* > >>> ?*AP Mode* > >>> ?*Certificate Type* > >>> ?*OEAP* > >>> ?*Primary SW version* > >>> ?*Backup SW version* > >>> ?*AP Sub Mode* > >>> ?*Download Status* > >>> ?*Upgrade Role (Master/Slave)* > >>> > >>> > >>> > >>> > >>> ?*AP Join Stats* > >>> ? ?*Entries 1 - 2 of 2* > >>> > >>> ? ?*Current Filter:* > >>> ?None > >>> > >>> ?[Change Filter] [Clear Filter] > >>> > >>> > >>> > >>??*Base Radio MAC* > >>> ?*AP Name* > >>> ?*Status* > >>> ?*Ethernet MAC* > >>> ?*IP Address* > >>> ?*Last Join Time* > >>> > >>> > >>> > >>> > >>> > >>> ?*AP Join Stats Detail >* > >>> > >>> ? ?*General* > >>> > >>> ? Base MAC Address > >>> ? ? AP Name > >>> ? ? Ethernet MAC Address > >>> ? ? IP Address > >>> ? ? Status > >>> ? ? *Last AP Join* > >>> > >>> ? *Timestamp* > >>> ?*Message* > >>> > >>?? ? ? ?*Discovery Phase Statistics* > >>> > >>> ? Requests Received > >>> ? ? Responses Sent > >>> ? ? Unsuccessful Request Processed > >>> ? ? Reason For Last Unsuccessful Attempt > >>> ? ? Last Successful Attempt Time > >>> ? ? Last Unsuccessful Attempt Time > >>> ? ? *Join Phase Statistics* > >>> > >>> ? Requests Received > >>> ? ? Responses Sent > >>> ? ? Unsuccessful Request Processed > >>> ? ? Reason For Last Unsuccessful Attempt > >>> ? ? Last Successful Attempt Time > >>> ? ? Last Unsuccessful Attempt Time > >>> ? ? *Configuration Phase Statistics* > >>> > >>> ? Requests Received > >>> ? ? Responses Sent > >>> ? ? Unsuccessful Request Processed > >>> ? ? Reason For Last Unsuccessful Attempt > >>> ? ? Last Successful Attempt Time > >>> ? ? Last Unsuccessful Attempt Time > >>> > >>> ?*Last Error Summary* > >>> > >>> ? Last AP Message Decryption Failure > >>> ? ? Last AP Connection Failure > >>> ? ? Last AP Disconnect Reason > >>> ? ? Last Error Occurred > >>> ? ? Last Error Occurred Reason > >>> ? ? Last Join Error > >>?Timestamp > >>> > >>> > >>> _______________________________________________ > >>> Free CCIE R&S, Collaboration, Data Center, Wireless & Security Videos > :: > >>> > >>> iPexpert on YouTube: www.youtube.com/ipexpertinc > >>> > >>> > >>> > >>> > >>>-- > >>>Best Regards > >>> > >>>Maxim Risman > >> > >>_______________________________________________ > >>Free CCIE R&S, Collaboration, Data Center, Wireless & Security Videos :: > >> > >>iPexpert on YouTube: www.youtube.com/ipexpertinc > >>? > >>? > >>? > >>_______________________________________________ > >>Free CCIE R&S, Collaboration, Data Center, Wireless & Security Videos :: > >> > >>iPexpert on YouTube: www.youtube.com/ipexpertinc > >>? > >> > >>_______________________________________________ > >>Free CCIE R&S, Collaboration, Data Center, Wireless & Security Videos :: > >> > >>iPexpert on YouTube: www.youtube.com/ipexpertinc > >>-------------- next part -------------- > >>An HTML attachment was scrubbed... > >>URL: > </archives/ccie_wireless/attachments/20140205/2c65df39/attachment.html> > >> > >>------------------------------ > >> > >>_______________________________________________ > >>Free CCIE R&S, Collaboration, Data Center, Wireless & Security Videos :: > >> > >>iPexpert on YouTube: www.youtube.com/ipexpertinc > >> > >>End of CCIE_Wireless Digest, Vol 58, Issue 18 > >>********************************************* > >> > >> > >>_______________________________________________ > >>Free CCIE R&S, Collaboration, Data Center, Wireless & Security Videos :: > >> > >>iPexpert on YouTube: www.youtube.com/ipexpertinc > >>-------------- next part -------------- > >>An HTML attachment was scrubbed... > >>URL: > </archives/ccie_wireless/attachments/20140205/48f384fe/attachment.html> > >> > >>------------------------------ > >> > >>_______________________________________________ > >>Free CCIE R&S, Collaboration, Data Center, Wireless & Security Videos :: > >> > >>iPexpert on YouTube: www.youtube.com/ipexpertinc > >> > >>End of CCIE_Wireless Digest, Vol 58, Issue 20 > >>********************************************* > >> > > > >_______________________________________________ > >Free CCIE R&S, Collaboration, Data Center, Wireless & Security Videos :: > > > >iPexpert on YouTube: www.youtube.com/ipexpertinc > > > > > > > >_______________________________________________ > >Free CCIE R&S, Collaboration, Data Center, Wireless & Security Videos :: > > > >iPexpert on YouTube: www.youtube.com/ipexpertinc > >-------------- next part -------------- > >An HTML attachment was scrubbed... > >URL: > </archives/ccie_wireless/attachments/20140205/cc59d588/attachment.html> > > > >------------------------------ > > > >_______________________________________________ > >Free CCIE R&S, Collaboration, Data Center, Wireless & Security Videos :: > > > >iPexpert on YouTube: www.youtube.com/ipexpertinc > > > >End of CCIE_Wireless Digest, Vol 58, Issue 25 > >********************************************* > > > > > >_______________________________________________ > >Free CCIE R&S, Collaboration, Data Center, Wireless & Security Videos :: > > > >iPexpert on YouTube: www.youtube.com/ipexpertinc > > > >_______________________________________________ > >Free CCIE R&S, Collaboration, Data Center, Wireless & Security Videos :: > > > >iPexpert on YouTube: www.youtube.com/ipexpertinc > > > > > > > > > > _______________________________________________ > Free CCIE R&S, Collaboration, Data Center, Wireless & Security Videos :: > > iPexpert on YouTube: www.youtube.com/ipexpertinc >
_______________________________________________ Free CCIE R&S, Collaboration, Data Center, Wireless & Security Videos :: iPexpert on YouTube: www.youtube.com/ipexpertinc
