Дерево страниц
Перейти к концу метаданных
Переход к началу метаданных

Вы просматриваете старую версию данной страницы. Смотрите текущую версию.

Сравнить с текущим просмотр истории страницы

Версия 1 Текущий »

Description

Allocating and configuring a vlan when connecting new APs can be a time-consuming task. Also it is not always possible to provide L2 channel from AP to ESR. In this case it is necessary to use the scheme of AP connection through L3 network of the operator. The architecture assumes that the operator's access network provides L3 connectivity between ESR, SoftWLC and AP primary address. In this case AP builds L2 GRE (EoGRE) tunnels, which eliminates the need to lay a vlan through the operator's access network from AP to ESR - it is enough to terminate AP vlan on any router or L3 switch supporting DHCP-relay to give AP primary address, which in option 43 will contain ESR addresses for building GRE tunnels. On the ESR side, the functionality to automatically raise counter tunnels, called wireless-controller, is configured. This enabling scheme is called WiFi L3.

There are two modes of tunnel creation:

  1. Creation using local ESR configuration profile – this mode is called"Local configuration profile of SoftGRE tunnel".
  2. Creation of data tunnels using radius exchange with PCRF, which receives information about which data tunnels should be raised according to AP position in EMS tree and its SSID settings – this mode is called"Dynamic configuration profile of SoftGRE tunnel".

WiFi license is required to access the wireless-controller ESR functionality. You can check if you have a WiFi license by using the show license command:

esr-1000# show licence 
Licence information
-------------------
Name:    eltex
Version: 1.0
Type:    ESR-1000
S/N:     NP00000033
MAC:     A8:F9:4B:AB:B3:80
Features:
 WIFI - Wi-Fi controller

The following terminology will be used to refer to the functionality associated with the use of GRE tunnelling:

  • EoGRE - general name of L2 GRE tunnelling
  • GRE - the tunnels that AP raises
  • SoftGRE - the tunnels that ESR raises

Communication scheme

Here is the example of communication scheme which uses the following addressing:

vlanSubnetDescriptionESR addressSoftWLC addressRouter address, R1
100192.168.100.0/23AP configuration subnet (primary addresses)----192.168.0.1
20010.0.0.0/28GRE termination address subnet

10.0.0.1

10.0.0.2

--10.0.0.3
310.10.10.0/23AP configuration subnet (secondary addresses)10.10.10.1----
10100.64.0.0/22SSID AP users' subnet100.64.0.1----
120010.20.20.0/28subnet for communication with SoftWLC complex10.20.20.110.20.20.2--
3500172.16.0.0/28subnet for Internet172.16.0.2----

Table 1.

The diagram is shown in the digure below:

Fig.1 Communication scheme via L3 access network of the operator

ESR configuration architecture is shown in the figure below:

Fig. 2 ESR configuration architecture by connecting AP via operator access L3 network

Network description

  1. Access to the Internet is performed in vlan 3500, using the default gateway 172.16.0.1 (router-NAT) for the default route. User egress is done by routing to router-NAT, which performs NAT translation of user addresses to the Internet.
  2. ESR control network is located in vlan 1200, subnet 10.20.20.20.0/28, which is also used for interaction with SoftWLC complex.
  3. APs receive the primary IP address from 192.168.100.0/23 network via DHCP-relay switch/router from the DHCP server installed on the server with SoftWLC. In option 43, suboptions 11 and 12, 2 addresses are passed to raise GRE tunnels: 10.0.0.0.1 and 10.0.0.2 (see description of How to configure option 43, and other DHCP configuration aspects). In this case, all traffic from the APs will be untagged. The APs raise 2 EoGRE tunnels from the primary address received via DHCP to the addresses received in suboptions 11 and 12:
        - in Management GRE tunnel to the address 10.0.0.1 with vlan id = 1, the AP management traffic is transmitted.
        - in Data GRE tunnel to the address 10.0.0.2 with vlan id = N, the traffic of users connected to the AP, on which SSID is configured (in the given example vlans 10 and 11) is transmitted. 
  4. Through Management GRE tunnel (vlan id 1) DHCP requests are received from the AP, which are redirected to SoftWLC using DHCP-relay on ESR. The DHCP server configured on SoftWLC issues an IP address from the network 10.10.10.0.0/23 for the AP, the gateway will be bridge 3 ESR with the address 10.10.10.1. In option 43.10 the address of SoftWLC server is passed: 10.20.20.2, (see the description of How to configure option 43, and other DHCP configuration aspects). The same address will be used to exchange service information between the AP and SoftWLC. 
  5. SSID 1 and SSID 2 are configured on the AP, vlan id 10 and 11 are specified. All user traffic will be forwarded from vlan 10 and 11 inside Data GRE tunnel to ESR. DHCP requests from the client, using DHCP-relay ESR will be forwarded to SoftWLC. Users get addresses from bridge 10 network ESR 100.64.0.0.0/22, gateway address 100.64.0.1.

Getting the primary AP address and sending traffic is done without the vlan tag. Therefore, to direct this traffic to the correct vlan, you must assign it the correct tag on the switch port to which the AP is connected. Below is a configuration example for MES switches:

interface gigabitethernet1/0/1
 description AP_1
 switchport mode accesss
 switchport access vlan 100
!

Eltex AP, after receiving a primary address with 43 option 11, 12 under options, will form two GRE tunnels for management and user traffic and will become unavailable for management (via telnet, ssh, web-gui) at the primary AP address. Management will become available at the secondary address (management address) received through the GRE management tunnel.

MTU of packets transmitted within EoGRE

Encapsulation of packets in EoGRE tunnels causes the MTU for transmitted traffic to be reduced by 42 bytes. This means that the MTU for AP management and user traffic (under the standard L3 MTU of 1500 bytes on the transport network) will be 1458 bytes. This value will be set automatically when ESR automatically raises tunnels.

Also, to reduce the number of ICMP packets of the "fragmentation needed" type and to prevent TCP sessions of clients from being dropped, it is necessary to adjust the TCP MSS substitution on all interfaces that transmit AP management and user traffic in accordance with the obtained MTU - ip tcp adjust-mss 1418.

The above calculations correspond to the MTU L3 of the transport network through which GRE packets are transmitted, 1500 bytes. In case it is necessary to increase MTU for AP user packets to the standard value of 1500 bytes encapsulated in EoGRE, it is necessary to increase MTU L3 on the transport network and ESR to 1542 bytes.

ESR configuration

Download the licence to be able to use the Wireless-Controller functionality:

 Adding license to ESR
#Download the licence file from TFTP server
esr-1000# copy tftp://<IP аaddress of tftp server>:/<serial number of ESR>.lic system:licence
|******************************************| 100% (678B) Licence loaded successfully. Please reboot system to apply changes.
#After a successful download, reboot the ESR
esr-1000#reload system
Do you really want to reload system ? (y/N): y

To purchase a licence, please contact Eltex commercial department. The model and serial number of the ESR must be provided.

In general, router configuration involves the following algorithm:

  1. Developing an addressing plan, allocating subnets and addresses (an example is shown in Table 1 above).
  2. Setting up the initial ESR configuration, which is done through a console connection. During this configuration the factory configuration of ESR is removed, the ip address of management is configured and telnet/SSH access is enabled, the firewall is configured to allow these connections (or it is disabled on the management interface by the ip firewall disable command).
  3. ESR connections to the network and configuration of paired equipment.
  4. Configuring interfaces.
  5. Configuring the parameters of communication with the radius server.
  6. Configuring and enabling Wireless-Controller functionality.
  7. Configuring firewall rules.
  8. Configuring additional functionality - SNMP server, NTP client.

Before configuring the router it is required to reset the configuration to default. The example commands correspond to ESR software version 1.11.0. In the given configuration example the SoftGRE dynamic tunnel configuration profile will be used.

Enable telnet, SSH control:

ip telnet server
ip ssh server

Create object profiles of tcp/udp ports, subnets:

object-group service dhcp_server
  port-range 67
exit
object-group service dhcp_client
  port-range 68
exit
object-group network MGMT
  ip prefix 10.10.10.0/23
  ip prefix 10.20.20.0/28
exit

On ESR 100/200/1000 type routers, disable spanning-tree because the router will connect through a single port:

no spanning-tree

Create security zones:

security zone trusted
exit
security zone untrusted
exit
security zone gre
exit
security zone user
exit

Configure SNMP parameters to be able to control the router status from the SoftWLC side:

 SNMP
snmp-server
snmp-server system-shutdown
snmp-server community "public11" ro
snmp-server community "private1" rw

snmp-server host 10.20.20.2
exit

snmp-server enable traps
snmp-server enable traps config
snmp-server enable traps config commit
snmp-server enable traps config confirm
snmp-server enable traps environment
snmp-server enable traps environment pwrin
snmp-server enable traps environment pwrin-insert
snmp-server enable traps environment fan
snmp-server enable traps environment fan-speed-changed
snmp-server enable traps environment fan-speed-high
snmp-server enable traps environment memory-flash-critical-low
snmp-server enable traps environment memory-flash-low
snmp-server enable traps environment memory-ram-critical-low
snmp-server enable traps environment memory-ram-low
snmp-server enable traps environment cpu-load
snmp-server enable traps environment cpu-critical-temp
snmp-server enable traps environment cpu-overheat-temp
snmp-server enable traps environment cpu-supercooling-temp
snmp-server enable traps environment board-overheat-temp
snmp-server enable traps environment board-supercooling-temp
snmp-server enable traps environment sfp-overheat-temp
snmp-server enable traps environment sfp-supercooling-temp
snmp-server enable traps environment switch-overheat-temp
snmp-server enable traps environment switch-supercooling-temp
snmp-server enable traps wifi
snmp-server enable traps wifi wifi-tunnels-number-in-bridge-high
snmp-server enable traps file-operations
snmp-server enable traps file-operations successful
snmp-server enable traps file-operations failed
snmp-server enable traps file-operations canceled
snmp-server enable traps interfaces
snmp-server enable traps interfaces rx-utilization-high
snmp-server enable traps interfaces tx-utilization-high
snmp-server enable traps interfaces number-high
snmp-server enable traps screen
snmp-server enable traps screen dest-limit
snmp-server enable traps screen source-limit
snmp-server enable traps screen icmp-threshold
snmp-server enable traps screen udp-threshold
snmp-server enable traps screen syn-flood
snmp-server enable traps screen land
snmp-server enable traps screen winnuke
snmp-server enable traps screen icmp-frag
snmp-server enable traps screen udp-frag
snmp-server enable traps screen icmp-large
snmp-server enable traps screen syn-frag
snmp-server enable traps screen unknown-proto
snmp-server enable traps screen ip-frag
snmp-server enable traps screen port-scan
snmp-server enable traps screen ip-sweep
snmp-server enable traps screen syn-fin
snmp-server enable traps screen fin-no-ack
snmp-server enable traps screen no-flag
snmp-server enable traps screen spoofing
snmp-server enable traps screen reserved
snmp-server enable traps screen quench
snmp-server enable traps screen echo-request
snmp-server enable traps screen time-exceeded
snmp-server enable traps screen unreachable
snmp-server enable traps screen tcp-all-flags
snmp-server enable traps entity
snmp-server enable traps entity config-change
snmp-server enable traps entity-sensor
snmp-server enable traps entity-sensor threshold
snmp-server enable traps envmon
snmp-server enable traps envmon fan
snmp-server enable traps envmon shutdown
snmp-server enable traps envmon supply
snmp-server enable traps envmon temperature
snmp-server enable traps flash
snmp-server enable traps flash insertion
snmp-server enable traps flash removal
snmp-server enable traps snmp
snmp-server enable traps snmp authentication
snmp-server enable traps snmp coldstart
snmp-server enable traps snmp linkdown
snmp-server enable traps snmp linkup
snmp-server enable traps syslog

Create interfaces for communication with management and user subnets of AP SSID, SoftWLC complex, Internet, AP primary addresses:

bridge 3
  description "AP_MANAGMENT"
  security-zone trusted
  ip address 10.10.10.1/23
  ip helper-address 10.20.20.2
  ip tcp adjust-mss 1418
  protected-ports local
  enable
exit
bridge 10
  description "AP_SSID_USERS"
  security-zone user
  ip address 100.64.0.1/22
  ip helper-address 10.20.20.2
  ip tcp adjust-mss 1418
  location data10
  protected-ports local
  enable
exit

interface gigabitethernet 1/0/1.200
  description "GRE_AP"
  security-zone gre
  ip address 10.0.0.1/28
  ip address 10.0.0.2/28
exit
interface gigabitethernet 1/0/1.1200
  description "MANAGMENT"
  security-zone trusted
  ip address 10.20.20.1/28
  ip tcp adjust-mss 1418
exit
interface gigabitethernet 1/0/1.3500
  description "INTERNET"
  security-zone untrusted
  ip address 172.16.0.2/28
  ip tcp adjust-mss 1418
exit

Enable global forwarding of DHCP requests:

ip dhcp-relay

Add a default gateway:

ip route 0.0.0.0/0 172.16.0.1

Add a route to the AP's primary address subnet:

ip route 192.168.100.0/23 10.0.0.3

Configure communication with the radius server (PCRF):

If SoftWLC redundancy is used and Eltex-PCRF service is running a cluster - you need to configure interaction for each service by its real address in ESR configuration and specify both instances in aaa radius-profile configuration! It is not allowed to use VRRP address for communication!

Пример
radius-server host 10.20.20.2
  key ascii-text testing123
  timeout 11
  source-address 10.20.20.1
  auth-port 31812
  acct-port 31813
  retransmit 2
  dead-interval 10
exit
radius-server host 10.20.20.3
  key ascii-text testing123
  timeout 11
  source-address 10.20.20.1
  auth-port 31812
  acct-port 31813
  retransmit 2
  dead-interval 10
exit
aaa radius-profile PCRF
  radius-server host 10.20.20.2
  radius-server host 10.20.20.3
exit


radius-server timeout 10
radius-server host 10.20.20.2
  key ascii-text testing123
  timeout 11
  source-address 10.20.20.1
  auth-port 31812
  acct-port 31813
  retransmit 2
  dead-interval 10
exit
aaa radius-profile PCRF
  radius-server host 10.20.20.2
exit
das-server COA
  key ascii-text testing123
  port 3799
  clients object-group MGMT
exit
aaa das-profile COA
  das-server COA
exit

Configuring profiles for tunnels bring up:

tunnel softgre 1
  description "managment"
  mode management
  local address 10.0.0.1
  default-profile
  enable
exit
tunnel softgre 1.1
  bridge-group 3
  enable
exit
tunnel softgre 2
  description "data"
  mode data
  local address 10.0.0.2
  default-profile
  enable
exit

Configure and enable the "Wireless-Controller" functionality:

wireless-controller
  nas-ip-address 10.20.20.1
  data-tunnel configuration radius
  aaa das-profile COA
  aaa radius-profile PCRF
  enable
exit

Configure the firewall rules:

#Allow receiving all GRE packets and ICMP requests from the gre zone:
security zone-pair gre self
  rule 1
    action permit
    match protocol gre
    enable
  exit
  rule 2
    action permit
    match protocol icmp
    enable
  exit
exit

#Allow the router to accept all packets from MGMT subnets:
security zone-pair trusted self
  rule 1
    action permit
    match source-address MGMT
    enable
  exit
exit

#Allow traffic exchange between trusted zones within the used subnets:
security zone-pair trusted trusted 
  rule 1
    action permit
    match source-address MGMT
    enable
  exit
exit

#Allow any traffic from the trusted zone to pass through to AP users:
security zone-pair trusted user
  rule 1
    action permit
    enable
  exit
exit

#Allow any traffic from the trusted zone to pass through to the gre zone:
security zone-pair trusted gre
  rule 1
    action permit
    enable
  exit
exit

#Allow the router to accept DHCP from AP users so that they can obtain addresses:
security zone-pair user self
  rule 1
    action permit
    match protocol udp
    match source-port dhcp_client
    match destination-port dhcp_server
    enable
  exit
exit

#Allow users to prolong an address obtained by DHCP:
security zone-pair user trusted
  rule 1
    action permit
    match protocol udp
    match source-port dhcp_client
    match destination-port dhcp_server
    enable
  exit
exit

#Allow all traffic from users to the Internet:
security zone-pair user untrusted
  rule 1
    action permit
    enable
  exit
exit

Adding an ESR to the EMS tree

Open EMS, stand on the node to which we plan to add ESR and click the "+" button located at the top left of the node tree:

Fig. 3.

In the window that opens, in the field:

  • "Object name" - specify random ESR name "esr-gre".
  • "Type" - select the type of equipment corresponding to the used type of ESR "ESR1000".
  • "IP address" - specify the ESR management address ESR "10.20.20.1".

Click the "Add" button.

After that it is necessary to stand on the added ESR (if it does not appear in the tree - click the button above "" ) open the "Access" tab on the right:

Рис. 4.

In the opened window edit the fields:

  • "File protocol" - choose "FTP".
  • "Read community" - specify the name of SNMP RO community, configured earlier "public11".
  • "Write community" - specify the name of SNMP RW community, configured earlier "private1".

When adding ESR-100/200, the value of the "ESR mode" field will be "StationCE".

In this case it is necessary to change the field value to "Station", otherwise such ESR will not be used to build data tunnels for AP.

Change the radius password that will be used when interacting with the ESR. To do this, open "RADIUS" → "Access Point Management" in the EMS menu. Select the previously added ESR (in case of a large number of devices you can filter by ESR IP address) and click the "Edit" button:

Рис. 5.

In the opened window in the "Key" field set the previously configured for ESR key "testing123" and click "Accept".

Appendix

Full configuration of ESR for dynamic configuration profile of SoftGRE tunnel

 configuration of ESR for dynamic configuration profile of SoftGRE tunnel
#!/usr/bin/clish
#18

object-group service dhcp_server
  port-range 67
exit
object-group service dhcp_client
  port-range 68
exit

object-group network MGMT
  ip prefix 10.10.10.0/23
  ip prefix 10.20.20.0/28
exit

radius-server timeout 10
radius-server host 10.20.20.2
  key ascii-text encrypted 88B11079B9014FAAF7B9
  timeout 11
  source-address 10.20.20.1
  auth-port 31812
  acct-port 31813
  retransmit 2
  dead-interval 10
exit
aaa radius-profile PCRF
  radius-server host 10.20.20.2
exit
das-server COA
  key ascii-text encrypted 88B11079B9014FAAF7B9
  port 3799
  clients object-group MGMT
exit
aaa das-profile COA
  das-server COA
exit

no spanning-tree

security zone trusted
exit
security zone untrusted
exit
security zone gre
exit
security zone user
exit


snmp-server
snmp-server system-shutdown
snmp-server community "public11" ro
snmp-server community "private1" rw

snmp-server host 10.20.20.2
exit

snmp-server enable traps
snmp-server enable traps config
snmp-server enable traps config commit
snmp-server enable traps config confirm
snmp-server enable traps environment
snmp-server enable traps environment pwrin
snmp-server enable traps environment pwrin-insert
snmp-server enable traps environment fan
snmp-server enable traps environment fan-speed-changed
snmp-server enable traps environment fan-speed-high
snmp-server enable traps environment memory-flash-critical-low
snmp-server enable traps environment memory-flash-low
snmp-server enable traps environment memory-ram-critical-low
snmp-server enable traps environment memory-ram-low
snmp-server enable traps environment cpu-load
snmp-server enable traps environment cpu-critical-temp
snmp-server enable traps environment cpu-overheat-temp
snmp-server enable traps environment cpu-supercooling-temp
snmp-server enable traps environment board-overheat-temp
snmp-server enable traps environment board-supercooling-temp
snmp-server enable traps environment sfp-overheat-temp
snmp-server enable traps environment sfp-supercooling-temp
snmp-server enable traps environment switch-overheat-temp
snmp-server enable traps environment switch-supercooling-temp
snmp-server enable traps ports
snmp-server enable traps ports port-counters-errors
snmp-server enable traps wifi
snmp-server enable traps wifi wifi-tunnels-number-in-bridge-high
snmp-server enable traps file-operations
snmp-server enable traps file-operations successful
snmp-server enable traps file-operations failed
snmp-server enable traps file-operations canceled
snmp-server enable traps interfaces
snmp-server enable traps interfaces rx-utilization-high
snmp-server enable traps interfaces tx-utilization-high
snmp-server enable traps interfaces number-high
snmp-server enable traps bras
snmp-server enable traps bras sessions-number-high
snmp-server enable traps screen
snmp-server enable traps screen dest-limit
snmp-server enable traps screen source-limit
snmp-server enable traps screen icmp-threshold
snmp-server enable traps screen udp-threshold
snmp-server enable traps screen syn-flood
snmp-server enable traps screen land
snmp-server enable traps screen winnuke
snmp-server enable traps screen icmp-frag
snmp-server enable traps screen udp-frag
snmp-server enable traps screen icmp-large
snmp-server enable traps screen syn-frag
snmp-server enable traps screen unknown-proto
snmp-server enable traps screen ip-frag
snmp-server enable traps screen port-scan
snmp-server enable traps screen ip-sweep
snmp-server enable traps screen syn-fin
snmp-server enable traps screen fin-no-ack
snmp-server enable traps screen no-flag
snmp-server enable traps screen spoofing
snmp-server enable traps screen reserved
snmp-server enable traps screen quench
snmp-server enable traps screen echo-request
snmp-server enable traps screen time-exceeded
snmp-server enable traps screen unreachable
snmp-server enable traps screen tcp-all-flags
snmp-server enable traps entity
snmp-server enable traps entity config-change
snmp-server enable traps entity-sensor
snmp-server enable traps entity-sensor threshold
snmp-server enable traps envmon
snmp-server enable traps envmon fan
snmp-server enable traps envmon shutdown
snmp-server enable traps envmon supply
snmp-server enable traps envmon temperature
snmp-server enable traps flash
snmp-server enable traps flash insertion
snmp-server enable traps flash removal
snmp-server enable traps snmp
snmp-server enable traps snmp authentication
snmp-server enable traps snmp coldstart
snmp-server enable traps snmp linkdown
snmp-server enable traps snmp linkup
snmp-server enable traps syslog

bridge 3
  description "AP_MANAGMENT"
  security-zone trusted
  ip address 10.10.10.1/23
  ip helper-address 10.20.20.2
  ip tcp adjust-mss 1418
  protected-ports local
  enable
exit
bridge 10
  description "AP_SSID_USERS"
  security-zone user
  ip address 100.64.0.1/22
  ip helper-address 10.20.20.2
  ip tcp adjust-mss 1418
  location data10
  protected-ports local
  enable
exit

interface gigabitethernet 1/0/1.200
  description "GRE_AP"
  security-zone gre
  ip address 10.0.0.1/28
  ip address 10.0.0.2/28
exit
interface gigabitethernet 1/0/1.1200
  description "MANAGMENT"
  security-zone trusted
  ip address 10.20.20.1/28
  ip tcp adjust-mss 1418
exit
interface gigabitethernet 1/0/1.3500
  description "INTERNET"
  security-zone untrusted
  ip address 172.16.0.2/28
  ip tcp adjust-mss 1418
exit
tunnel softgre 1
  description "managment"
  mode management
  local address 10.0.0.1
  default-profile
  enable
exit
tunnel softgre 1.1
  bridge-group 3
  enable
exit
tunnel softgre 2
  description "data"
  mode data
  local address 10.0.0.2
  default-profile
  enable
exit

security zone-pair gre self
  rule 1
    action permit
    match protocol gre
    enable
  exit
  rule 2
    action permit
    match protocol icmp
    enable
  exit
exit
security zone-pair trusted self
  rule 1
    action permit
    match source-address MGMT
    enable
  exit
exit
security zone-pair trusted trusted
  rule 1
    action permit
    match source-address MGMT
    enable
  exit
exit
security zone-pair trusted user
  rule 1
    action permit
    enable
  exit
exit
security zone-pair trusted gre
  rule 1
    action permit
    enable
  exit
exit
security zone-pair user self
  rule 1
    action permit
    match protocol udp
    match source-port dhcp_client
    match destination-port dhcp_server
    enable
  exit
exit
security zone-pair user trusted
  rule 1
    action permit
    match protocol udp
    match source-port dhcp_client
    match destination-port dhcp_server
    enable
  exit
exit
security zone-pair user untrusted
  rule 1
    action permit
    enable
  exit
exit


ip dhcp-relay

ip route 0.0.0.0/0 172.16.0.1
ip route 192.168.100.0/23 10.0.0.3

wireless-controller
  nas-ip-address 10.20.20.1
  data-tunnel configuration radius
  aaa das-profile COA
  aaa radius-profile PCRF
  enable
exit
ip telnet server
ip ssh server

Full configuration of ESR for local configuration profile of SoftGRE tunnel

The main difference from the above configuration is the absence of settings for interaction with radius-server and related functionality in Wireless-Controller settings. Added local profiles for SoftGRE data tunnels with vlaps 10 and 11, which will be included in Bridge 10.

 Configuration of ESR for local configuration profile of SoftGRE tunnel
#!/usr/bin/clish
#18

object-group service dhcp_server
  port-range 67
exit
object-group service dhcp_client
  port-range 68
exit

object-group network MGMT
  ip prefix 10.10.10.0/23
  ip prefix 10.20.20.0/28
exit

no spanning-tree

security zone trusted
exit
security zone untrusted
exit
security zone gre
exit
security zone user
exit


snmp-server
snmp-server system-shutdown
snmp-server community "public11" ro
snmp-server community "private1" rw

snmp-server host 10.20.20.2
exit

snmp-server enable traps
snmp-server enable traps config
snmp-server enable traps config commit
snmp-server enable traps config confirm
snmp-server enable traps environment
snmp-server enable traps environment pwrin
snmp-server enable traps environment pwrin-insert
snmp-server enable traps environment fan
snmp-server enable traps environment fan-speed-changed
snmp-server enable traps environment fan-speed-high
snmp-server enable traps environment memory-flash-critical-low
snmp-server enable traps environment memory-flash-low
snmp-server enable traps environment memory-ram-critical-low
snmp-server enable traps environment memory-ram-low
snmp-server enable traps environment cpu-load
snmp-server enable traps environment cpu-critical-temp
snmp-server enable traps environment cpu-overheat-temp
snmp-server enable traps environment cpu-supercooling-temp
snmp-server enable traps environment board-overheat-temp
snmp-server enable traps environment board-supercooling-temp
snmp-server enable traps environment sfp-overheat-temp
snmp-server enable traps environment sfp-supercooling-temp
snmp-server enable traps environment switch-overheat-temp
snmp-server enable traps environment switch-supercooling-temp
snmp-server enable traps ports
snmp-server enable traps ports port-counters-errors
snmp-server enable traps wifi
snmp-server enable traps wifi wifi-tunnels-number-in-bridge-high
snmp-server enable traps file-operations
snmp-server enable traps file-operations successful
snmp-server enable traps file-operations failed
snmp-server enable traps file-operations canceled
snmp-server enable traps interfaces
snmp-server enable traps interfaces rx-utilization-high
snmp-server enable traps interfaces tx-utilization-high
snmp-server enable traps interfaces number-high
snmp-server enable traps bras
snmp-server enable traps bras sessions-number-high
snmp-server enable traps screen
snmp-server enable traps screen dest-limit
snmp-server enable traps screen source-limit
snmp-server enable traps screen icmp-threshold
snmp-server enable traps screen udp-threshold
snmp-server enable traps screen syn-flood
snmp-server enable traps screen land
snmp-server enable traps screen winnuke
snmp-server enable traps screen icmp-frag
snmp-server enable traps screen udp-frag
snmp-server enable traps screen icmp-large
snmp-server enable traps screen syn-frag
snmp-server enable traps screen unknown-proto
snmp-server enable traps screen ip-frag
snmp-server enable traps screen port-scan
snmp-server enable traps screen ip-sweep
snmp-server enable traps screen syn-fin
snmp-server enable traps screen fin-no-ack
snmp-server enable traps screen no-flag
snmp-server enable traps screen spoofing
snmp-server enable traps screen reserved
snmp-server enable traps screen quench
snmp-server enable traps screen echo-request
snmp-server enable traps screen time-exceeded
snmp-server enable traps screen unreachable
snmp-server enable traps screen tcp-all-flags
snmp-server enable traps entity
snmp-server enable traps entity config-change
snmp-server enable traps entity-sensor
snmp-server enable traps entity-sensor threshold
snmp-server enable traps envmon
snmp-server enable traps envmon fan
snmp-server enable traps envmon shutdown
snmp-server enable traps envmon supply
snmp-server enable traps envmon temperature
snmp-server enable traps flash
snmp-server enable traps flash insertion
snmp-server enable traps flash removal
snmp-server enable traps snmp
snmp-server enable traps snmp authentication
snmp-server enable traps snmp coldstart
snmp-server enable traps snmp linkdown
snmp-server enable traps snmp linkup
snmp-server enable traps syslog

bridge 3
  description "AP_MANAGMENT"
  security-zone trusted
  ip address 10.10.10.1/23
  ip helper-address 10.20.20.2
  ip tcp adjust-mss 1418
  protected-ports local
  enable
exit
bridge 10
  description "AP_SSID_USERS"
  security-zone user
  ip address 100.64.0.1/22
  ip helper-address 10.20.20.2
  ip tcp adjust-mss 1418
  location data10
  protected-ports local
  enable
exit

interface gigabitethernet 1/0/1.200
  description "GRE_AP"
  security-zone gre
  ip address 10.0.0.1/28
  ip address 10.0.0.2/28
exit
interface gigabitethernet 1/0/1.1200
  description "MANAGMENT"
  security-zone trusted
  ip address 10.20.20.1/28
  ip tcp adjust-mss 1418
exit
interface gigabitethernet 1/0/1.3500
  description "INTERNET"
  security-zone untrusted
  ip address 172.16.0.2/28
  ip tcp adjust-mss 1418
exit
tunnel softgre 1
  description "managment"
  mode management
  local address 10.0.0.1
  default-profile
  enable
exit
tunnel softgre 1.1
  bridge-group 3
  enable
exit
tunnel softgre 2
  description "data"
  mode data
  local address 10.0.0.2
  default-profile
  enable
exit
tunnel softgre 2.10
  bridge-group 10
  enable
exit
tunnel softgre 2.11
  bridge-group 10
  enable
exit

security zone-pair gre self
  rule 1
    action permit
    match protocol gre
    enable
  exit
  rule 2
    action permit
    match protocol icmp
    enable
  exit
exit
security zone-pair trusted self
  rule 1
    action permit
    match source-address MGMT
    enable
  exit
exit
security zone-pair trusted trusted
  rule 1
    action permit
    match source-address MGMT
    enable
  exit
exit
security zone-pair trusted user
  rule 1
    action permit
    enable
  exit
exit
security zone-pair trusted gre
  rule 1
    action permit
    enable
  exit
exit
security zone-pair user self
  rule 1
    action permit
    match protocol udp
    match source-port dhcp_client
    match destination-port dhcp_server
    enable
  exit
exit
security zone-pair user trusted
  rule 1
    action permit
    match protocol udp
    match source-port dhcp_client
    match destination-port dhcp_server
    enable
  exit
exit
security zone-pair user untrusted
  rule 1
    action permit
    enable
  exit
exit

ip dhcp-relay

ip route 0.0.0.0/0 172.16.0.1
ip route 192.168.100.0/23 10.0.0.3

wireless-controller
  enable
exit
ip telnet server
ip ssh server

Bridge interface usage

Only "Bridge" type interface can be used for terminating GRE tunnels coming from AP, because EoGRE terminated sub-tunnels provide L2 connectivity and can be included only in this type of interfaces.
It is allowed to include tunnels with different vlan-ID values into one interface of the "Bridge" SoftGRE type.
For "Bridge" type interfaces terminating SoftGRE tunnels from AP it is always recommended to enable port isolation to prevent traffic exchange between SoftGRE interfaces. Enabling is done with the "protected-ports local" command.
If a vlan is used in the settings of the interface of the "Bridge" type, it is necessary to exclude the vlan from isolation with the command "protected-ports exclude vlan" to allow traffic exchange between SoftGR tunnels.

 Configuration example
bridge 10
  vlan 10
  protected-ports local
  protected-ports exclude vlan
  enable
exit

Output example of information about the status of SoftGRE tunnels on ESR

View information about existing SoftGRE tunnels:

 show tunnels status
esr1000# show tunnels status
Tunnel             Admin   Link    MTU      Local IP           Remote IP          Last change
                   state   state
----------------   -----   -----   ------   ----------------   ----------------   -------------------------
softgre 1          Up      Up      1462     10.0.0.1           192.168.100.15     4 days, 21 minutes and 32
                                                                                  seconds

softgre 1.1        Up      Up      1458     --                 --                 4 days, 21 minutes and 32
                                                                                  seconds

softgre 2          Up      Up      1462     10.0.0.2           192.168.100.15     4 days, 21 minutes and 32
                                                                                  seconds

softgre 2.10       Up      Up      1458     --                 --                 4 days, 21 minutes and 32
                                                                                  seconds

softgre 2.11       Up      Up      1458     --                 --                 4 days, 21 minutes and 32
                                                                                  seconds

softgre 3          Up      Up      1462     10.0.0.1          192.168.100.12     4 days, 21 minutes and 14
                                                                                  seconds

softgre 3.1        Up      Up      1458     --                 --                 4 days, 21 minutes and 14
                                                                                  seconds

softgre 4          Up      Up      1462     10.0.0.2          192.168.100.12     4 days, 21 minutes and 14
                                                                                  seconds

softgre 4.10       Up      Up      1458     --                 --                 4 days, 21 minutes and 14
                                                                                  seconds

softgre 4.11       Up      Up      1458     --                 --                 4 days, 21 minutes and 14
                                                                                  seconds

View information about Bridge type interfaces and the SoftGRE tunnels included in them:

 show interfaces bridge
esr1000# show interfaces bridge
Bridges      Interfaces
----------   --------------------------------------------------------------
bridge 3     softgre 1.1, softgre 3.1
bridge 10    softgre 2.10, softgre 2.11, softgre 4.10, softgre 4.11

DHCP server configuration

The following is an example of a DHCP server configuration, based on the above addressing. ISC-DHCP-SERVER is used as the DHCP server.

 /etc/dhcp/dhcpd.conf
default-lease-time 86400;
max-lease-time 87000;

log-facility local7;

#listening subnet
subnet 10.20.20.0 netmask 255.255.255.240 {}

#Description of equipment that will be allowed to receive the control address
class "ELTEX-DEVICES" {
	match if (
		(substring (option vendor-class-identifier, 0, 14)="ELTEX_WEP-12AC") or
		(substring (option vendor-class-identifier, 0, 14)="ELTEX_WOP-12AC") or
		(substring (option vendor-class-identifier, 0, 14)="ELTX_WEP-12AC") or
		(substring (option vendor-class-identifier, 0, 14)="ELTX_WOP-12AC") or
		(substring (option vendor-class-identifier, 0, 13)="ELTEX_WEP-2AC") or
		(substring (option vendor-class-identifier, 0, 12)="ELTEX_WOP-2L") or
		(substring (option vendor-class-identifier, 0, 12)="ELTEX_WEP-2L") or
		(substring (option vendor-class-identifier, 0, 12)="ELTEX_WEP-1L")
	);
}

#Primary Ap adresses subnet in vlan 100
subnet 192.168.100.0 netmask 255.255.255.0 {
	pool {
		option routers 192.168.100.1;
		range 192.168.100.2 192.168.101.254;
		option vendor-encapsulated-options 0B:08:31:30:2e:30:2e:30:2e:31:0C:08:31:30:2e:30:2e:30:2e:32;
		allow members of "ELTEX-DEVICES";
 }
}

#AP configuration subnet in vlan 3
subnet 10.10.10.0 netmask 255.255.254.0 {
	pool {
		option routers 10.10.10.1;
		range 10.10.10.2 10.10.11.254;
		option vendor-encapsulated-options 0A:0A:31:30:2e:32:30:2e:32:30:2e:32;
		allow members of "ELTEX-DEVICES";
		option domain-name-servers 172.16.0.254;
	}
}

#SSID vlan 10 AP users' subnet
subnet 100.64.0.0 netmask 255.255.252.0 {
	default-lease-time 3600;
	max-lease-time 3700;
	pool {
		option routers 100.64.0.1;
		range 10.64.0.2 100.640.3.254;
		option domain-name-servers 172.16.0.254;
	}
}

Example of NAT configuration on ESR

If it is not intend to use a third-party router to perform client address translation to the Internet, NAT can be configured directly on the ESR. Below is an example of such a configuration:

 NAT configuration
object-group network nat
  ip prefix 100.64.0.0/22
exit

nat source
  ruleset NAT
    to zone untrusted
    rule 1
      match source-address nat
      action source-nat interface
      enable
    exit
  exit
exit
  • Нет меток