BRKEWN-2011 – Managing An Enterprise WLAN With Cisco Prime Infrastructure
Presenter: Paul Lysander, Technical Marketing Engineer, Cisco
“How many of you are not using PI 3.x?” –Paul; perhaps 10-20% put up their hands.
Morning after the customer Appreciation Event. Good turnout. 
Where does PI fit in the network?
- PI gets information from the network; it’s not the source of data
- Sources include: wireless LAN controller, CMX, ISE
Side note: PI 3.1 maintenance release 1 (MR1) is coming next week. When released, it will be the generally recommended release for customers to run.
Create Sites and Location Groups before adding devices to the inventory. These groups are used throughout PI. Eg: a Site can be used with a Virtual Domain to provide role-based access to devices in the environment (Admin1 can’t see Admin2’s devices; Admin1 only session Campus1 and SuperAdmin sees all). Device membership in a site can be done statically or by policy.
- Administration > Users > Virtual Domains (create and edit Virtual Domains)
- Administration > Users > Users, Roles & AAA (map users to a Domain)
Config Templates:
- Discovery: templates can be discovered by pulling in the config (or parts thereof) from an already configured WLC
New feature in 3.1: Plug and Play for Continue reading

Thanks to all who submitted questions to the HPE Subscriber Data Management Webinar where we learned about the technology principles of next gen SDM.