Hi guys,I did up a traffic flow diagram explaining how traffic flows (high-level) from User to controller.Could someone please validate to see if I am on the right track?Many thanks
Looks quite accurate; just in Step 5, you will first have GRE decapsulation to get back the 802.11 frame, then decryption.In step 3, the authentication will happen at the controller and from the client device, not at the AP; but diagram is not fully clear on where the authentication happens.Think this (old) presentation has some good slides on Tunnel/Bridge/Decrypt-Tunnel.
Thanks Herman.I will make the neccessary adjustments.Thanks for the slide too
Hi Herman, in the diagram, was this for the Tunnel mode bit or Decrypt mode?
"first have GRE decapsulation to get back the 802.11 frame, then decryption" is for tunnel mode.
© Copyright 2023 Hewlett Packard Enterprise Development LPAll Rights Reserved.