Nac Wil
Nac Wil
Abstract
This report summarizes key concepts and practical lab implementations related to
centralized access control and wireless infrastructure in modern networks. The focus is on
the configuration and understanding of RADIUS, TACACS+, Wireless LAN Controllers, and
Cisco DNA Center using Cisco Packet Tracer and CLI-based setups. The goal is to simplify
enterprise-grade topics for job readiness and field application.
Amisha Tehra
Included Lab Configurations:
1. RADIUS Server Authentication on Cisco Router
2. TACACS+ Device Access Control using AAA
3. Wireless LAN Controller (WLC) Setup & AP Management
4. Cisco DNA Center – Introduction & Network Automation Use Case
Tools Used:
Cisco Packet Tracer
Cisco 2900/2911 Routers
Cisco 2960 Series Switches
PC, Laptop, and Wireless Devices
CLI Configuration + Server Setup
Optional: Cisco DNA Center Emulator/Simulator View
Note:
This report contains custom topologies, AAA configurations, wireless setups, lab screenshots, and
simplified explanations of each topic for practical understanding and interview preparation.
This report focuses on RADIUS, TACACS+, Wireless LAN Controller (WLC), and Cisco DNA Center
implementations using Cisco Packet Tracer.
1
1. Introduction
Modern networks demand centralized control over user access, device privileges, and wireless infrastructure.
RADIUS and TACACS+ are key AAA protocols used for authentication and admin access control. Wireless LAN
Controllers (WLCs) simplify the management of wireless networks, while Cisco DNA Center brings automation, policy
control, and visibility under one umbrella. This report introduces each concept with simplified explanations followed
by hands-on lab setups.
What is it?
RADIUS is a protocol used to authenticate (verify identity), authorize (decide permissions), and account (track
usage) for users trying to access a network.
To centrally manage login credentials for network users. Instead of setting up passwords on every router
or switch, use one RADIUS server.
Where is it used?
Simple Example:
A company employee connects to office Wi-Fi and enters a username/password. This request is sent to a
RADIUS server which checks if the credentials are correct and allows access.
What is it?
A Cisco proprietary protocol similar to RADIUS but used mainly for controlling access to network devices
like routers and switches.
To allow different levels of access for different users. One admin may view configs, another can make
changes — all controlled centrally.
Provides granular control (e.g., one user can run only ‘show’ commands, another can run config
commands)
Separates authentication, authorization, and accounting clearly
2
Where it's used?
Simple Example:
You’re one of three network admins. TACACS+ ensures only you can run conf t while others can only use
show commands
What is it?
WLC is a device (or software) that centrally manages all access points (APs) in a wireless network.
Corporate offices
Hospitals
Airports
University campuses
Simple Example:
Imagine you have 50 access points across different floors. A WLC helps you configure them all in one go —
no need to touch each AP one by one.
What is it?
DNA Center is Cisco’s platform for network automation, monitoring, and policy control.
To automate network configs, track real-time performance, apply security policies, and get detailed
analytics — all from one dashboard.
Where is it used?
Enterprise networks
Smart campuses
IT environments needing centralized visibility and control
3
Simple Example:
Instead of manually configuring VLANs on each switch, DNA Center lets you configure multiple devices at
once and even shows you where performance is dropping.
Authentication
Authorization
Accounting
These are the three core steps used to secure access to a network or device.
Example:
You try to access a router using telnet. The router asks for your username and password — this is
authentication.
Once you're authenticated, authorization checks what level of access you have.
Example:
One user might be allowed to only use show commands, while another can use conf t to make changes. That
control is authorization.
Example:
It records that user admin1 logged in at 3 PM and entered configuration mode.
IN SIMPLE TERMS:
TERM QUESTION IT ANSWERS REAL-WORLD MEANING
AUTHENTICATION Who are you? Login ID check
AUTHORIZATION What are you allowed to do? Access level (read-only, admin, etc.)
ACCOUNTING What did you do? Activity logging for auditing and tracking
4
WHERE IS AAA USED?
INTERVIEW TIP:
“AAA is the foundation of network access control. It verifies users, controls what they can do, and logs
their actions. It works best with RADIUS or TACACS+ servers in enterprise setups.”
OBJECTIVE:
To configure a Cisco router using the AAA model with a RADIUS server for centralized user authentication.
This helps secure access and manage users from a single point.
To verify who is connecting to the network — mainly users like employees connecting over Wi-Fi or VPN.
✅ It gives central control over usernames and passwords.
✅ Reduces the need to configure credentials on every router/switch.
Think of RADIUS as a security guard who checks ID before letting anyone into the network.
5
NETWORK TOPOLOGY:
IP ADDRESSING TABLE
DEVICE INTERFACE IP ADDRESS DEFAULT GATEWAY
6
ROUTER0 CONFIGURATION
ROUTER 0
7
VERIFICATION & OUTPUT
8
2. AAA DEBUG VERIFICATION
From Router0 CLI: debug aaa authentication
Output during login attempt:
* AAA/AUTHEN/LOGIN(0000001A): Pick method list 'ssh'
* RADIUS: Received Access-Accept
This confirms that the RADIUS server authenticated the user successfully, and the login request was accepted.
undebug all (Later)
All debug logging disabled after verification.
9
4. SHOW RUNNING CONFIGURATION OUTPUT
10
11
CHECK OUTPUT ON ROUTER:
Once logged in, type:
>enable
>cisco ← (if using enable password)
#show run
12
EXPECTED OUTPUT:
CONCLUSION:
In this lab, we successfully configured RADIUS authentication using a centralized server in Cisco Packet
Tracer. The setup included a router, switch, PC, and a RADIUS server, all connected in a flat network.
We implemented AAA (Authentication, Authorization, Accounting) services on the router and verified
remote login through SSH from PC0 using RADIUS credentials stored on Server0.
Key outcomes:
This lab reinforces how centralized user management using RADIUS simplifies network security and
ensures scalable, consistent control across enterprise infrastructure.
13
Lab 2: TACACS+ Configuration (via Telnet)
OBJECTIVE:
To configure and test a Cisco switch for Telnet-based login authentication using a centralized TACACS+
server in Cisco Packet Tracer.
WHAT IS TACACS+?
TACACS+ (Terminal Access Controller Access-Control System Plus) is a Cisco protocol that controls who
can log in to network devices like switches and routers — and what they can do after logging in.
In enterprise networks
On devices accessed by multiple admins
In teams needing role-based access
How it works:
Think of it like a receptionist who checks your name and job role before letting you in the server room.
NETWORK TOPOLOGY:
Topology stays the same — but now Switch0 is the AAA client and Telnet is used for remote access.
14
CONFIGURATION
On Switch0 (TACACS+ Client):
aaa authorization exec default group tacacs+ local Controls user privilege levels after login (authorization step)
line vty 0 4 and login authentication tauth Applies AAA authentication to Telnet sessions
enable password cisco Optional if you're not using enable secret, but fine for labs
15
On Server0 (TACACS+ Setup):
16
VERIFICATION & OUTPUT
From PC0 Command Prompt:
Ping 10.0.0.1
telnet 10.0.0.1
Enter username: amisha
Enter password: cisco
17
✅ If successful, the switch will display the prompt SW1>, confirming that the Telnet login was authenticated by the
TACACS+ server.
In this lab, Telnet was used to test TACACS+ login from a client system to the switch. While Telnet is functionally
valid for such testing and supported in Cisco Packet Tracer, it is not secure for real-world use, as all data (including
usernames and passwords) is transmitted in plain text.
In production environments, SSH (Secure Shell) should always be used instead of Telnet to ensure encrypted and
secure communication between clients and network devices.
Using Telnet in this lab allowed a quick and clear demonstration of AAA authentication and TACACS+ server
interaction without needing RSA key generation or domain name settings.
CONCLUSION
This lab demonstrated how to configure Telnet login authentication using TACACS+ on a Cisco switch. The
TACACS+ server handled username/password verification, centralizing control and enforcing login security.
We verified:
This setup is a real-world example of centralized admin control with minimal device-side user
management.
18
What Did We Do in RADIUS and TACACS+ Labs?
We used a RADIUS server to authenticate a user (like an employee) trying to log into a router over SSH.
Goal:
Let the RADIUS server verify user credentials before giving access to the router.
Simple Steps:
1. PC0 runs:
ssh -l amisha 10.0.0.1
2. Router sends the login request to Server0 (RADIUS server).
3. Server checks:
o Does user "amisha" exist?
o Is password "cisco" correct?
4. If yes → access granted
If no → access denied
Real-World Use:
Used for Wi-Fi logins, VPN, and employee access in networks — anytime a user needs authentication.
Interview Line:
“RADIUS is used for authenticating end users across the network — like Wi-Fi or VPN access — and it
combines authentication and authorization into one step.”
19
2. TACACS+ LAB – ADMIN ACCESS CONTROL
What we did:
Goal:
Let the TACACS+ server verify the admin login and control what commands they can run.
Simple Steps:
1. PC0 runs:
telnet 10.0.0.1
2. Switch sends the login info to Server0 (TACACS+ server).
3. Server checks:
o Is user "amisha" allowed to log in?
o What privilege level or commands can she use?
4. If yes → login allowed, user enters SW1> prompt
Real-World Use:
Used to control admin access to devices like switches and routers in companies — especially when many
engineers manage the same network.
Interview Line:
“TACACS+ is used for managing device admin access — it separates authentication, authorization, and
accounting, which gives more granular control.”
20
Lab 3: Wireless LAN Controller Configuration
OBJECTIVE:
To configure a Wireless LAN Controller (WLC) to centrally manage Lightweight Access Points (LAPs), assign
IPs via DHCP, and enable wireless connectivity for end devices like smartphones.
WLC OVERVIEW
What is a WLC?
A Wireless LAN Controller (WLC) manages all the wireless access points (APs) in a network from a single
central interface. You don’t have to configure each AP individually — the WLC does that job for you.
Where is it used?
THEORY:
A Wireless LAN Controller (WLC) centrally manages wireless networks. In enterprise setups, it handles APs,
WLANs, security policies, and client authentication. Lightweight Access Points (LWAPs) rely on WLCs to
function properly.
Since WLC has no console interface, a PC is required to access the web-based GUI. A DHCP server is also
necessary to dynamically assign IP addresses to wireless clients.
IP ADDRESSING TABLE:
DEVICE INTERFACE IP ADDRESS SUBNET MASK DEFAULT GATEWAY
SERVER0 FastEthernet0 192.168.1.100 255.255.255.0 -
WLC Management 192.168.1.1 255.255.255.0 192.168.1.100
ACCESS POINT DHCP via Server Auto - 192.168.1.1
PC0 DHCP via Server Auto 192.168.1.1
SMARTPHONES DHCP via Server Auto 192.168.1.1
CONFIGURATION STEPS:
22
Step 2: Configure Server0 as DHCP Server
23
Step 3: Configure the Access Point
Access Point should now get IP automatically via DHCP and register with WLC.
24
Apply the details:
25
Click on Apply.
26
Step 5: WLC Web Configuration
1. Open web browser again with https://192.168.1.1 Login in with username and password.
2. You’ll see summary of configurations we did.
27
o Go to WLANs tab inside AP Group
Add the WLAN Student
o Save
28
2. Confirm IP is assigned from 192.168.1.x range.
29
4. You can see changes on devices.
VERIFICATION:
Smartphone0 IP is 192.168.1.7
Smartphone1 IP is 192.168.1.10
30
NOTE ON DEVICE COMPATIBILITY IN PACKET TRACER
Laptop devices in Packet Tracer (e.g., PT-Laptop-NM-1W-A) often fail to receive DHCP IPs when
connecting to wireless SSIDs managed by a WLC. This is due to wireless module limitations and
inconsistent support for WPA2-PSK and DHCP. Even with correct SSID and passphrase, laptops may fall
back to APIPA (169.x.x.x).
To overcome this issue, I used Smartphones and later added a Tablet device, where I successfully
configured the same SSID Student with WPA2-PSK passphrase 1234567890. The Tablet connected successfully
via DHCP and could communicate with other wireless clients.
31
CONCLUSION:
In this lab, we successfully configured a Wireless LAN Controller (WLC) along with a Lightweight Access
Point, DHCP server, and wireless clients. The configuration allowed wireless devices to obtain IP addresses
dynamically and communicate with each other over the SSID student secured by WPA2-PSK.
What We Did in the WLC Lab (with APs, Smartphones, and Tablet)
WHAT WE DID:
We created and configured a WLAN (SSID = Student) on the WLC and secured it using WPA2-PSK with
passphrase 1234567890.
Then we connected wireless devices (smartphones and tablet) to the Student Wi-Fi network and tested if
they could communicate (ping) with each other.
32
WHY WE DID IT:
This is exactly what happens in real offices, colleges, and hospitals where IT teams don’t configure 20+
APs one by one — instead, they use a WLC to push settings to all APs.
So even if we typed the right SSID and password, Laptop0 couldn’t join the network properly. It’s a
limitation of Packet Tracer, not your mistake.
IN SIMPLE WORDS:
We built a real-world Wi-Fi setup using Cisco tools, proved that the WLC can manage wireless devices from one
place, and tested device communication.
We also diagnosed a tool-specific problem (laptop wireless bug) and smartly solved it by using other compatible
devices.
33
Lab 4: Cisco DNA Center Lab
OBJECTIVE:
To configure Cisco DNA Center in a simulated enterprise environment using Packet Tracer. This includes IP
addressing, enabling SSH on routers and switches, connecting and discovering devices from the DNA
Controller, and monitoring devices through its GUI-based dashboard.
THEORY:
Cisco DNA Center (Digital Network Architecture Center) is a centralized network controller and
management dashboard. It allows administrators to automate device configuration, manage network
policies, discover and monitor connected devices, and ensure end-to-end visibility and control.
Where is it Used?
How It Works:
DNA Center connects to network devices (routers, switches) over SSH. Once IPs and credentials are
configured, the controller discovers devices automatically. From there, it can push configurations, monitor
devices, and apply policies via a GUI dashboard.
34
NETWORK TOPOLOGY
Devices Used:
IP ADDRESSING SCHEME:
DEVICE INTERFACE IP ADDRESS SUBNET MASK
ROUTER0 (MUMBAI) G0/0/0 10.0.0.1 255.0.0.0
SWITCH0 (SW1) VLAN 1 10.0.0.2 255.0.0.0
SWITCH1 (SW2) VLAN 1 10.0.0.3 255.0.0.0
ROUTER1 (DELHI) G0/0/0 10.0.0.4 255.0.0.0
DNA CONTROLLER NIC 10.0.0.100 255.0.0.0
PC0 NIC 10.0.0.10 255.0.0.0
35
CONFIGURATION
Step 1: Power ON Multilayer Switches
Select each switch → Physical Tab → Power switch ON.
Step 2: SSH Configuration on All Devices
Router0 – Mumbai
Switch0 – SW1
36
Router1 – Delhi
Switch1 – SW2
37
Step 3: IP Address Configuration
Router0
Switch0 – SW1
Switch1 – SW2
Router1
PC0 Settings:
IP Address: 10.0.0.10
Subnet Mask: 255.0.0.0
IP Address: 10.0.0.100
Subnet Mask: 255.0.0.0
No default gateway required (same LAN)
38
Since IP addressing is complete on all devices, let's now verify connectivity and SSH access before we go to
the DNA Center GUI setup.
VERIFICATION STEPS
Check that the assigned interface (G0/0/0 or VLAN 1) shows Status: up, Protocol: up.
39
FROM PC0 TERMINAL OR CMD:
40
All should respond successfully.
Expected Output:
Once we confirm pings and SSH are working, we’ll jump into DNA Center's GUI via browser and begin
device discovery.
41
DNA CENTER SETUP VIA PC0 (WEB GUI):
Login to Controller:
Monitoring panel shown, which devices are connected and their health is shown here, task is to discover
which devices is connected to your LAN. On left there is menu option click on that.
42
Add Credentials for Device Discovery:
Start Discovery:
43
Once started, DNA Center will discover all connected SSH-enabled devices.
Network Device: will let you know that discovery has done or not it will show the details of all devices
connected.
Navigate to Dashboard
44
Tabs:
o Assurance → Device Health
45
o Path Trace → View packet path(apply source and destination address to check path)
46
o Policy → Setting the ground rules for how traffic flows in your network securely, efficiently,
and as per company needs.
SERVICE IP ADDRESS
NTP 10.0.0.50
SYSLOG 10.0.0.60
DNS 8.8.8.8
47
Click Push Config to apply to discovered devices.
48
OUTPUT
On Router or any device check if the above configurations applied or not using #show run
Final Outcome:
49
WHAT WE DID IN DNA CENTER (QUICK SUMMARY)
After configuring SSH and IP on all devices, we used the DNA Center web interface (http://10.0.0.100) via
PC0 to manage and monitor the network.
We:
DISCOVERY Starts the process of scanning and identifying devices via SSH/IP. You enter IP range, select
credentials, and begin discovery.
ASSURANCE Provides visibility into device performance, client health, and event logs. Helps in
troubleshooting.
POLICY Let’s you apply policies like ACLs, VLANs, segmentation, NTP/Syslog/DNS settings to devices.
NETWORK Section to configure global services like: NTP – Time server, Syslog – Log server, DNS – Domain
SETTINGS Name Resolution
50
Cisco DNA Center Interface – Key Panels and Their Roles
DASHBOARD
This is the home panel of DNA Center. It gives you a real-time overview of your entire network. You can
see:
It's like the network control room where everything important is visible at a glance.
PROVISIONING
This panel is where you handle the onboarding and management of devices. Under Provisioning, you do
things like:
You can think of this as the "setup and deployment" section of DNA Center.
CREDENTIALS
Located under Provisioning, this section is where you save login details for accessing network devices (like
routers and switches). Without credentials, DNA Center cannot connect to your devices during discovery.
DISCOVERY
This feature scans the network to find all devices connected to your main switch or router. It supports
protocols like:
51
You choose:
If SSH is properly configured and IPs are reachable, DNA Center will auto-detect all connected routers,
switches, and hosts.
ASSURANCE
Device Health
Client Health
Network Trends
NETWORK SETTINGS
After adding these services with their IPs, you click “Push Config” to apply them to all discovered devices.
POLICY
This is where you apply intent-based networking. You define rules and automation policies to manage:
Example: If you want only admin PCs to reach certain VLANs, you can create a Policy to enforce that rule
on all routers/switches with one click.
52
PATH TRACE
This tool lets you simulate and visualize the path a packet would take through your network.
Steps:
DNA Center will map out every hop (router/switch) the packet travels through. This helps in
troubleshooting network bottlenecks or verifying ACLs.
SUMMARY TABLE
PANEL/OPTION PURPOSE
DASHBOARD Shows network status, device health, alerts, and quick summaries
PROVISIONING Manages devices, discovery, credentials, deployment
CREDENTIALS Stores SSH login details for network devices
DISCOVERY Scans and finds devices via CDP or IP range
ASSURANCE Monitors real-time health and performance of network devices
NETWORK SETTINGS Configures NTP, Syslog, DNS, and other services
POLICY Defines rules and automation for network access, traffic, and control
PATH TRACE Simulates the data flow route to check connectivity
WHAT WE DID, WHY WE DID IT, AND HOW IT WORKED (DNA CENTER LAB)
What We Did
In this lab, we created a complete enterprise-like network environment and configured Cisco DNA Center
(Digital Network Architecture Center) to act as a centralized network controller. We used a total of four
devices (2 routers and 2 switches), connected via proper cabling, assigned IP addresses, and enabled SSH
for secure remote access. Then, we accessed the DNA Center via PC0’s browser, performed device
discovery, added SSH credentials, and verified that all devices were being monitored centrally.
Why We Did It
This lab reflects how modern networks are managed today, especially in large organizations where manual
configuration of each device is impractical.
53
How It Worked
1. SSH Configurations: First, we powered on both multilayer switches and configured SSH access on
each router and switch. This allowed secure remote access using the DNA Center.
2. IP Addressing: We assigned IP addresses to all routers and switches on Gigabit and VLAN 1
interfaces, making them reachable over the network.
3. PC & DNA Controller Setup: PC0 was given IP 10.0.0.10 and used as an access point to open DNA
Center's GUI at IP 10.0.0.100.
4. Login to DNA Center: We logged into the web interface using default credentials admin/admin.
5. Credential Setup: We added SSH credentials (username and password) so DNA Center could
authenticate to each device.
6. Device Discovery: We selected Discovery and entered the IP of SW2 (10.0.0.3). DNA Center used
CDP (Cisco Discovery Protocol) to automatically find other connected SSH-enabled devices.
7. Monitoring the Network: After discovery, we were able to view:
o Network Topology (graphically)
o Device health under Assurance
o Host devices connected
o Run path trace to simulate traffic flow
8. Service Configuration: We added optional services:
o NTP: 10.0.0.50
o Syslog: 10.0.0.60
o DNS: 8.8.8.8
These services can be pushed from DNA Center to discovered devices as a policy.
CONCLUSION
This lab demonstrated how Cisco DNA Center simplifies the management of complex enterprise networks
through centralized automation. Instead of configuring devices individually, we used a single controller to
discover, monitor, and manage all connected routers and switches. After assigning IP addresses and
enabling SSH, the controller successfully discovered devices via SSH credentials. Through its GUI
dashboard, we accessed network health, applied policies, and traced packet paths. This setup reflects how
modern enterprise networks operate using Software-Defined Networking (SDN) principles — allowing
faster configuration, easier troubleshooting, and consistent policy enforcement across the entire
infrastructure.
Summary Table
54
Final Reflection: Network Security & Automation Labs
This report explored four key labs focused on securing and managing enterprise networks using Cisco tools.
Each lab simulated realistic scenarios where device configuration, access control, wireless management,
and automation were applied using Cisco Packet Tracer. The goal was to practice how networks are
managed efficiently and securely in real-world setups.
This lab introduced AAA using the RADIUS protocol, with the router acting as the AAA client. A username-password
combination was verified via the RADIUS server during SSH login from a PC. This setup showed how centralized
authentication simplifies and secures access control across networks.
Here, TACACS+ was configured on a switch, allowing both login and exec authorization through Server0. Unlike
RADIUS, TACACS+ separates authentication and authorization. The remote login was done using Telnet, and the
results helped understand how network admins can enforce detailed access policies.
We configured a WLC-2504 to manage wireless connectivity through a centrally controlled WLAN. A secure WLAN
named Student was created using WPA2-PSK authentication. After correctly assigning the Lightweight Access Point
(LAP) to a custom AP group, wireless devices were able to join the network. Smartphones and a tablet were
successfully connected and tested for communication, confirming that the SSID broadcast and DHCP services were
functioning as expected. This lab demonstrated how wireless access can be efficiently managed using centralized
WLC settings.
This lab focused on Cisco DNA Center as a centralized controller for managing enterprise networks. After setting up
SSH and IPs on routers and switches, the DNA Controller was used to discover devices, monitor network health,
apply policies, and configure services like NTP, DNS, and Syslog—all through a web-based dashboard. This
demonstrated the efficiency of software-defined networking and automation.
FINAL THOUGHT
Each lab reinforced critical areas of enterprise networking—from secure user authentication to centralized
wireless and SDN-based automation. These practical exercises helped simulate how modern IT
environments are built, managed, and secured.
End of Report.
55