Дерево страниц
Перейти к концу метаданных
Переход к началу метаданных

Вы просматриваете старую версию данной страницы. Смотрите текущую версию.

Сравнить с текущим просмотр истории страницы

Версия 1 Текущий »

Description

General information

The architecture, assumes that when connecting APs via L2 network, vlan for AP management subnet and vlan for SSID user subnet will be allocated. For each additional SSID a new separate vlan will be allocated. All vlans will be terminated on the ESR. This scheme is called WiFi L2. Let us consider the scheme using the example shown in Fig. 1. It is assumed that the entire SoftWLC complex is installed on one server and has one address for communication with other system components.

Fig. 1 Communication scheme at AP connection via L2 access network

The following subnets are used in the given scheme of communication:

vlanSubnetDescriptionESR addressSoftWLC address
310.10.10.0/23AP configuration subnet10.10.10.1
10100.64.0.0/22SSID AP users' subnet100.64.0.1
120010.20.20.0/28subnetwork for communication with SoftWLC complex10.20.20.110.20.20.2
3500172.16.0.0/28subnet for Internet172.16.0.2

ESR configuration architecture is shown below in Figure 2.

Fig. 2 ESR configuration architecture by connecting AP via operator access L2 network

Network description

  1. Access to the Internet is performed in vlan 3500, using the default gateway 172.16.0.1 (router-NAT) for the default route. User egress is done by routing to router-NAT, which performs NAT translation of user addresses to the Internet.
  2. ESR control network is located in vlan 1200, subnet 10.20.20.20.0/28, which is also used for interaction with SoftWLC complex.
  3. APs receive the management IP address in vlan 3 from the DHCP server deployed on SoftWLC, from the network 10.10.10.0.0/23. In option 43, the SoftWLC server address is transmitted (see How to configure option 43, and other DHCP configuration aspects). At the same time AP sends packets from the management address without vlan tag, so on the switch, on the port of which it is connected, the untagged traffic from AP should be tagged with vlan ID 3. Then vlan 3 comes to ESR, where it is terminated on sub-interface gi1/0/1.3, whose address (10.10.10.10.1) will be the default gateway for AP management address.
  4. SSID is configured on the AP, with vlan ID 10. The traffic of this SSID will be coming from the point with tag 10, so on the switch port to which the AP is connected we configure vlan 10 in tagged mode and bring it to ESR. On the ESR, vlan 10 comes on the sub-interface gi1/0/1.10, which address 100.64.0.1 will be the default gateway for SSID users.
  5. All user traffic will be passed from vlan 10 to the ESR. DHCP requests from the client will be redirected to SoftWLC using DHCP-relay ESR.


AP management traffic is sent without a vlan tag. Therefore, to direct this traffic to the correct vlan, you must assign it the correct tag on the switch port to which the AP is connected. Below is a configuration example for MES switches:

interface gigabitethernet1/0/1
 description AP_1
 switchport mode trunk
 switchport trunk allowed vlan add 10
 switchport trunk native vlan 3
 switchport forbidden default-vlan
!

ESR configuration

 Before making router settings, it is required to reset the configuration to default. Example commands correspond to ESR software version 1.11.0.

Enable telnet, SSH control:

ip telnet server
ip ssh server

Create object profiles tcp/udp ports, subnets:

object-group service dhcp_server
  port-range 67
exit
object-group service dhcp_client
  port-range 68
exit
object-group network MGMT
  ip prefix 10.10.10.0/23
  ip prefix 10.20.20.0/28
exit

On routers like ESR10/20/100/200/1000, disable spanning-tree because the router will connect through single port:

no spanning-tree

Create security zones:

security zone trusted
exit
security zone untrusted
exit
security zone user
exit

Configure SNMP parameters so that the router status can be monitored by SoftWLC:

 SNMP
snmp-server
snmp-server system-shutdown
snmp-server community "public11" ro
snmp-server community "private1" rw

snmp-server host 10.20.20.2
exit

snmp-server enable traps
snmp-server enable traps config
snmp-server enable traps config commit
snmp-server enable traps config confirm
snmp-server enable traps environment
snmp-server enable traps environment pwrin
snmp-server enable traps environment pwrin-insert
snmp-server enable traps environment fan
snmp-server enable traps environment fan-speed-changed
snmp-server enable traps environment fan-speed-high
snmp-server enable traps environment memory-flash-critical-low
snmp-server enable traps environment memory-flash-low
snmp-server enable traps environment memory-ram-critical-low
snmp-server enable traps environment memory-ram-low
snmp-server enable traps environment cpu-load
snmp-server enable traps environment cpu-critical-temp
snmp-server enable traps environment cpu-overheat-temp
snmp-server enable traps environment cpu-supercooling-temp
snmp-server enable traps environment board-overheat-temp
snmp-server enable traps environment board-supercooling-temp
snmp-server enable traps environment sfp-overheat-temp
snmp-server enable traps environment sfp-supercooling-temp
snmp-server enable traps environment switch-overheat-temp
snmp-server enable traps environment switch-supercooling-temp
snmp-server enable traps file-operations
snmp-server enable traps file-operations successful
snmp-server enable traps file-operations failed
snmp-server enable traps file-operations canceled
snmp-server enable traps interfaces
snmp-server enable traps interfaces rx-utilization-high
snmp-server enable traps interfaces tx-utilization-high
snmp-server enable traps interfaces number-high
snmp-server enable traps screen
snmp-server enable traps screen dest-limit
snmp-server enable traps screen source-limit
snmp-server enable traps screen icmp-threshold
snmp-server enable traps screen udp-threshold
snmp-server enable traps screen syn-flood
snmp-server enable traps screen land
snmp-server enable traps screen winnuke
snmp-server enable traps screen icmp-frag
snmp-server enable traps screen udp-frag
snmp-server enable traps screen icmp-large
snmp-server enable traps screen syn-frag
snmp-server enable traps screen unknown-proto
snmp-server enable traps screen ip-frag
snmp-server enable traps screen port-scan
snmp-server enable traps screen ip-sweep
snmp-server enable traps screen syn-fin
snmp-server enable traps screen fin-no-ack
snmp-server enable traps screen no-flag
snmp-server enable traps screen spoofing
snmp-server enable traps screen reserved
snmp-server enable traps screen quench
snmp-server enable traps screen echo-request
snmp-server enable traps screen time-exceeded
snmp-server enable traps screen unreachable
snmp-server enable traps screen tcp-all-flags
snmp-server enable traps entity
snmp-server enable traps entity config-change
snmp-server enable traps entity-sensor
snmp-server enable traps entity-sensor threshold
snmp-server enable traps envmon
snmp-server enable traps envmon fan
snmp-server enable traps envmon shutdown
snmp-server enable traps envmon supply
snmp-server enable traps envmon temperature
snmp-server enable traps flash
snmp-server enable traps flash insertion
snmp-server enable traps flash removal
snmp-server enable traps snmp
snmp-server enable traps snmp authentication
snmp-server enable traps snmp coldstart
snmp-server enable traps snmp linkdown
snmp-server enable traps snmp linkup
snmp-server enable traps syslog

Create interfaces to communicate with management and user SSID subnets of AP, SoftWLC complex, Internet:

interface gigabitethernet 1/0/1.3
  description "AP_MANAGMENT"
  security-zone trusted
  ip address 10.10.10.1/23
  ip helper-address 10.20.20.2
exit
interface gigabitethernet 1/0/1.10
  description "AP_SSID_USERS"
  security-zone user
  ip address 100.64.0.1/22
  ip helper-address 10.20.20.2
exit
interface gigabitethernet 1/0/1.1200
  description "MANAGMENT"
  security-zone trusted
  ip address 10.20.20.1/28
exit
interface gigabitethernet 1/0/1.3500
  description "INTERNET"
  security-zone untrusted
  ip address 172.16.0.2/28
exit

Enable global forwarding of DHCP requests:

ip dhcp-relay

Add default gateway:

ip route 0.0.0.0/0 172.16.0.1

Configure firewall rules:

#Allow the router to accept all packages from MGMT subnets:
security zone-pair trusted self
  rule 1
    action permit
    match source-address MGMT
    enable
  exit
exit

#Allow traffic exchange between trusted zones within the used subnets:
security zone-pair trusted trusted 
  rule 1
    action permit
    match source-address MGMT
    enable
  exit
exit

#Allow any traffic from the trusted zone to pass through to AP users:
security zone-pair trusted user
  rule 1
    action permit
    enable
  exit
exi

#Allow the router to accept DHCP from AP users so that they can obtain addresses:
security zone-pair user self
  rule 1
    action permit
    match protocol udp
    match source-port dhcp_client
    match destination-port dhcp_server
    enable
  exit
exit

#Allow users to extend an address obtained via DHCP:
security zone-pair user trusted
  rule 1
    action permit
    match protocol udp
    match source-port dhcp_client
    match destination-port dhcp_server
    enable
  exit
exit

#Allow all traffic from users to the Internet:
security zone-pair user untrusted
  rule 1
    action permit
    enable
  exit
exit

Appendix

Full configuration of ESR

 ESR configuration
#!/usr/bin/clish
#18

object-group service dhcp_server
  port-range 67
exit
object-group service dhcp_client
  port-range 68
exit

object-group network MGMT
  ip prefix 10.10.10.0/23
  ip prefix 10.20.20.0/28
exit

no spanning-tree

security zone trusted
exit
security zone untrusted
exit
security zone user
exit


snmp-server
snmp-server system-shutdown
snmp-server community "public11" ro
snmp-server community "private1" rw

snmp-server host 10.20.20.2
exit

snmp-server enable traps
snmp-server enable traps config
snmp-server enable traps config commit
snmp-server enable traps config confirm
snmp-server enable traps environment
snmp-server enable traps environment pwrin
snmp-server enable traps environment pwrin-insert
snmp-server enable traps environment fan
snmp-server enable traps environment fan-speed-changed
snmp-server enable traps environment fan-speed-high
snmp-server enable traps environment memory-flash-critical-low
snmp-server enable traps environment memory-flash-low
snmp-server enable traps environment memory-ram-critical-low
snmp-server enable traps environment memory-ram-low
snmp-server enable traps environment cpu-load
snmp-server enable traps environment cpu-critical-temp
snmp-server enable traps environment cpu-overheat-temp
snmp-server enable traps environment cpu-supercooling-temp
snmp-server enable traps environment board-overheat-temp
snmp-server enable traps environment board-supercooling-temp
snmp-server enable traps environment sfp-overheat-temp
snmp-server enable traps environment sfp-supercooling-temp
snmp-server enable traps environment switch-overheat-temp
snmp-server enable traps environment switch-supercooling-temp
snmp-server enable traps ports
snmp-server enable traps ports port-counters-errors
snmp-server enable traps wifi
snmp-server enable traps wifi wifi-tunnels-number-in-bridge-high
snmp-server enable traps file-operations
snmp-server enable traps file-operations successful
snmp-server enable traps file-operations failed
snmp-server enable traps file-operations canceled
snmp-server enable traps interfaces
snmp-server enable traps interfaces rx-utilization-high
snmp-server enable traps interfaces tx-utilization-high
snmp-server enable traps interfaces number-high
snmp-server enable traps bras
snmp-server enable traps bras sessions-number-high
snmp-server enable traps screen
snmp-server enable traps screen dest-limit
snmp-server enable traps screen source-limit
snmp-server enable traps screen icmp-threshold
snmp-server enable traps screen udp-threshold
snmp-server enable traps screen syn-flood
snmp-server enable traps screen land
snmp-server enable traps screen winnuke
snmp-server enable traps screen icmp-frag
snmp-server enable traps screen udp-frag
snmp-server enable traps screen icmp-large
snmp-server enable traps screen syn-frag
snmp-server enable traps screen unknown-proto
snmp-server enable traps screen ip-frag
snmp-server enable traps screen port-scan
snmp-server enable traps screen ip-sweep
snmp-server enable traps screen syn-fin
snmp-server enable traps screen fin-no-ack
snmp-server enable traps screen no-flag
snmp-server enable traps screen spoofing
snmp-server enable traps screen reserved
snmp-server enable traps screen quench
snmp-server enable traps screen echo-request
snmp-server enable traps screen time-exceeded
snmp-server enable traps screen unreachable
snmp-server enable traps screen tcp-all-flags
snmp-server enable traps entity
snmp-server enable traps entity config-change
snmp-server enable traps entity-sensor
snmp-server enable traps entity-sensor threshold
snmp-server enable traps envmon
snmp-server enable traps envmon fan
snmp-server enable traps envmon shutdown
snmp-server enable traps envmon supply
snmp-server enable traps envmon temperature
snmp-server enable traps flash
snmp-server enable traps flash insertion
snmp-server enable traps flash removal
snmp-server enable traps snmp
snmp-server enable traps snmp authentication
snmp-server enable traps snmp coldstart
snmp-server enable traps snmp linkdown
snmp-server enable traps snmp linkup
snmp-server enable traps syslog

interface gigabitethernet 1/0/1.3
  description "AP_MANAGMENT"
  security-zone trusted
  ip address 10.10.10.1/23
  ip helper-address 10.20.20.2
exit
interface gigabitethernet 1/0/1.10
  description "AP_SSID_USERS"
  security-zone user
  ip address 100.64.0.1/22
  ip helper-address 10.20.20.2
exit
interface gigabitethernet 1/0/1.1200
  description "MANAGMENT"
  security-zone trusted
  ip address 10.20.20.1/28
exit
interface gigabitethernet 1/0/1.3500
  description "INTERNET"
  security-zone untrusted
  ip address 172.16.0.2/28
exit
security zone-pair trusted self
  rule 1
    action permit
    match source-address MGMT
    enable
  exit
exit
security zone-pair trusted trusted
  rule 1
    action permit
    match source-address MGMT
    enable
  exit
exit
security zone-pair trusted user
  rule 1
    action permit
    enable
  exit
exit
security zone-pair user self
  rule 1
    action permit
    match protocol udp
    match source-port dhcp_client
    match destination-port dhcp_server
    enable
  exit
exit
security zone-pair user trusted
  rule 1
    action permit
    match protocol udp
    match source-port dhcp_client
    match destination-port dhcp_server
    enable
  exit
exit
security zone-pair user untrusted
  rule 1
    action permit
    enable
  exit
exit


ip dhcp-relay

ip route 0.0.0.0/0 172.16.0.1

ip telnet server
ip ssh server

DHCP server configuration

 The following is an example of a DHCP server configuration based on the above addressing. ISC-DHCP-SERVER is used as the DHCP server.

 /etc/dhcp/dhcpd.conf
default-lease-time 86400;
max-lease-time 87000;

log-facility local7;

#listening subnet
subnet 10.20.20.0 netmask 255.255.255.240 {}

#Description of equipment that will be allowed to receive the control address
class "ELTEX-DEVICES" {
	match if (
		(substring (option vendor-class-identifier, 0, 14)="ELTEX_WEP-12AC") or
		(substring (option vendor-class-identifier, 0, 14)="ELTEX_WOP-12AC") or
		(substring (option vendor-class-identifier, 0, 14)="ELTX_WEP-12AC") or
		(substring (option vendor-class-identifier, 0, 14)="ELTX_WOP-12AC") or
		(substring (option vendor-class-identifier, 0, 13)="ELTEX_WEP-2AC") or
		(substring (option vendor-class-identifier, 0, 12)="ELTEX_WOP-2L") or
		(substring (option vendor-class-identifier, 0, 12)="ELTEX_WEP-2L") or
		(substring (option vendor-class-identifier, 0, 12)="ELTEX_WEP-1L")
	);
}

#AP configuration subnet in vlan 3
subnet 10.10.10.0 netmask 255.255.254.0 {
	pool {
		option routers 10.10.10.1;
		range 10.10.10.2 10.10.11.254;
		option vendor-encapsulated-options 0A:0A:31:30:2e:32:30:2e:32:30:2e:32;
		allow members of "ELTEX-DEVICES";
		option domain-name-servers 172.16.0.254;
	}
}

#SSID vlan 10 AP users' subnet
subnet 100.64.0.0 netmask 255.255.252.0 {
	default-lease-time 3600;
	max-lease-time 3700;
	pool {
		option routers 100.64.0.1;
		range 10.64.0.2 100.64.3.254;
		option domain-name-servers 172.16.0.254;
	}
}

Example of NAT configuration on ESR

If it is not intend to use a third-party router to perform client address translation to the Internet, NAT can be configured directly on the ESR. Below is an example of such a configuration:

 NAT configuration
object-group network nat
  ip prefix 100.64.0.0/22
exit

nat source
  ruleset NAT
    to zone untrusted
    rule 1
      match source-address nat
      action source-nat interface
      enable
    exit
  exit
exit

Bridge interface usage

When using sub-interfaces for SSID vlan termination, it is necessary to allocate and use a separate subnet for each vlan. In order to use one address space for termination of different vlans, it is necessary to use "Bridge" type interface. In this case, the user subnet is assigned to the "Bridge" interface, and the sub-interfaces that terminate the vlan are included in it. The following is an example of a configuration where two vlans 10 and 11 need to be terminated into the same address space:

 Configuration example
#Delete the previously created sub-interface for vlan 10 termination
no interface gigabitethernet 1/0/1.10

#Create an interface with "Bridge" type
bridge 10
  description "AP_SSID_USERS"
  security-zone user
  ip address 100.64.0.1/22
  ip helper-address 10.20.20.2
  protected-ports local
  enable
exit

interface gigabitethernet 1/0/1.10
  bridge-group 10
exit
interface gigabitethernet 1/0/1.11
  bridge-group 10
exit
  • Нет меток