Дерево страниц
Перейти к концу метаданных
Переход к началу метаданных

Вы просматриваете старую версию данной страницы. Смотрите текущую версию.

Сравнить с текущим просмотр истории страницы

Версия 1 Следующий »

General information

An example of implementation of a fault-tolerant scheme for enabling ESRs operating in wireless-controller mode is shown in Fig. 1:

Fig. 1.

As can be seen from the scheme shown in Fig. 1:

  • ESR redundancy is performed using the VRRP protocol, according to the "Active-Standby" scheme;
  • to exclude the switch to which the ESR is connected as a single point of failure, stacking switches are included using link aggregation. The physical links of the ESR used in the aggregated link are included in different switches of the stack.

Traffic processing is performed by the ESR VRRP MASTER. In case of its failure, the VRRP mastery is taken over by the ESR VRRP BACKUP. Last-mile router redundancy (NAT router in Fig. 1) is not covered in this paper. It can be accomplished in the same way using VRRP or by using a different enabling scheme (this scheme can be found in Configuring ESR in wireless-controller mode with last-mile router redundancy).

When using channel aggregation on ESR you cannot use sub-interfaces on the "port-channel" interface.

Enabling scheme

The enabling scheme will be considered on the example of real addressing shown in Table 1.

Table 1.

DescriptionBridgeVLANSubnetwork

ESR VRRP MASTER

IP address

VRRP IP

ESR VRRP BACKUP

IP address

GRE termiation addressesbridge 12308192.168.200.16/28192.168.200.19/28

192.168.200.17/32

192.168.200.18/32

192.168.200.20/28
AP addresses configuration subnetwork (secondary addresses)bridge 3310.255.252.0/2310.255.252.2/2310.255.252.1/3210.255.252.3/23
Subnetwork for interaction with SoftWLCbridge 42300100.123.0.0/24100.123.0.173/24100.123.0.174/32100.123.0.175/24
Access to the Internetbridge 52301172.16.0.0/28172.16.0.2/28172.16.0.4/32172.16.03/28
SSID1 AP clients subnetworkbridge 1010198.18.148.0/22198.18.148.2/22198.18.148.1/32198.18.148.3/22
SSID2 AP clients subnetworkbridge 1111198.18.152.0/22198.18.152.2/22198.18.152.1/32198.18.152.3/22
Primary AP addresses subnetwork--100192.168.240.0/23------

The network scheme is shown in Fig.2:

Fig. 2.

A chematic diagram of the ESR configuration architecture is shown on Fig.3:

Fig. 3.

  1. Access to the Internet is performed in vlan 2301, using the default gateway 172.16.0.1 (router-NAT) for the default route. User egress is done by routing to router-NAT, which performs NAT translation of user addresses to the Internet.
  2. ESR control network is located in vlan 2300, subnet 100.123.0.0/24, which is also used for interaction with SoftWLC complex (ip address 100.123.0.2).
  3. APs receive the primary IP address from 192.168.240.0/23 network via DHCP-relay switch/router from the DHCP server installed on the server with SoftWLC. In option 43, suboptions 11 and 12, 2 addresses are passed to raise GRE tunnels: 192.168.200.17 and 192.168.200.18 (see description of How to configure option 43, and other DHCP configuration aspects). In this case, all traffic from the APs will be untagged. The APs raise 2 EoGRE tunnels from the primary address received via DHCP to the addresses received in suboptions 11 and 12:
        - in Management GRE tunnel to the address 192.168.200.17 with vlan id = 1, the AP management traffic is transmitted.
        - in Data GRE tunnel to the address 192.168.200.18 with vlan id = N, the traffic of users connected to the AP, on which SSID is configured (in the given example vlans 10 and 11) is transmitted. 
  4. Through Management GRE tunnel (vlan id 1) DHCP requests are received from the AP, which are redirected to SoftWLC using DHCP-relay on ESR. The DHCP server configured on SoftWLC issues an IP address from the network 10.255.252.0/23 for the AP, the gateway will be bridge 3 ESR with the address 10.255.252.1. In option 43.10 the address of SoftWLC server is passed: 10.123.0.2, (see the description of How to configure option 43, and other DHCP configuration aspects). The same address will be used to exchange service information between the AP and SoftWLC. 
  5. SSID 1 and SSID 2 are configured on the AP using SoftWLC complex, which will tag user traffic with vlan 10 and 11 tag respectively. All user traffic will be forwarded from vlan 10 and 11 inside Data GRE tunnel to ESR. DHCP client requests using DHCP relay ESR will be forwarded to SoftWLC. Users get addresses from bridge 10 ESR network 198.18.148.0/22, gateway address 198.18.148.1. Bridge 11 ESR users get addresses from network 198.18.152.0/22, gateway address 198.18.152.1.

As can be seen from the addressing in Table 1 and the scheme in Fig. 3, six VRRP instances will be used in the configuration - for all interfaces. This is necessary to make both ESRs appear as one device from the routing point of view (EMS and PCRF will communicate with both ESRs using their real addresses).

There are the following requirements for VRRP configuration:

  • All VRRP instances must be included in the same group, in this example this would be "vrrp group 1". This will ensure that all instances in the same group will always be in the same VRRP MASTER or BACKUP state and will prevent a non-consistent VRRP state where the same ESR has different VRRP states on different interfaces.
  • All VRRP instances of each router must have the same priority - in the current example, for the ESR VRRP MASTER is 200 and for the ESR VRRP BACKUP is 100.
  • The current example uses the "vrrp preempt disable" setting, which prevents a higher priority VRRP instance from capturing mastery if the lower priority instance is already in the master state - it must be configured the same on all routers (you can choose not to use this setting, but doing so will cause the higher priority VRRP router to always capture mastery, which can lead to unwanted mastery switches).

To enable VRRP functionality on each Bridge ESR configure the following:

bridge <№>
  vrrp id <значение приоритета>
  vrrp ip <IP-адрес VRRP>
  vrrp priority <приоритет>
  vrrp group <№ группы>
  vrrp preempt disable
  vrrp
exit

WiFi must also be enabled on the subnet interfaces of the AP management address subnets and user subnets:

bridge <№>
  ports vrrp filtering enable
  ports vrrp filtering exclude vlan
exit

The "ports vrrp filtering enable" setting will prevent VRRP announcements from being sent to user tunnels, and the "ports vrrp filtering exclude vlan" setting will allow VRRP announcements to be sent to the Bridge vlan for VRRP to work correctly.

Важно!

If the "vrrp preempt disable" setting is not used, it is necessary to set "vrrp preempt delay <time in seconds>" to at least 180 seconds in the VRRP configurations on the interfaces. This will prevent the higher priority router from immediately seizing mastery after booting. If this is not done, the router that captured the VRRP mastery after booting will not have time to synchronize the state of the AP tunnels and they will be brought up again as the AP triggers the gre keepalive mechanism.

ESR configuration

ESR tuning will be considered on an example based on the circuit shown in Fig. 3. The wireless-controller configuration will use the SoftGRE dynamic tunnel configuration profile. Do not forget that a license is required to access the wirless-controller functionality (more details can be found in the Configuring ESR by connecting AP via L3 access network (WiFi L3 diagram)).

Configure the necessary initial settings, they will be the same for both ESRs:

 ESR VRRP MASTER/BACKUP
object-group service dhcp_server
  port-range 67
exit
object-group service dhcp_client
  port-range 68
exit
object-group network MGMT
  ip prefix 192.168.200.16/28
  ip prefix 10.255.252.0/23
exit
object-group network SoftWLC
  ip address-range 100.123.0.2
exit

no spanning-tree

security zone trusted
exit
security zone untrusted
exit
security zone gre
exit
security zone user
exit

vlan 3,10,11,2300-2301,2308
exit

ip dhcp-relay

ip telnet server
ip ssh server

We configure the port-channel interface, assign it the necessary vlan and include physical interfaces in it, this configuration will also be the same on both ESRs:

 ESR VRRP MASTER/BACKUP
interface port-channel 1
  mode switchport
  switchport forbidden default-vlan
  switchport general acceptable-frame-type tagged-only
  switchport general allowed vlan add 3,10-11,2300-2301,2308 tagged
exit
interface gigabitethernet 1/0/1
  mode switchport
  channel-group 1 mode auto
exit
interface gigabitethernet 1/0/2
  mode switchport
  channel-group 1 mode auto
exit

If tengigabitethernet interfaces are used in the port-channel configuration - you must explicitly specify the speed on the port-channel interface:

 Нажмите здесь для раскрытия...
interface port-channel 1
  mode switchport
  speed 10G
exit
interface tengigabitethernet 1/0/1
  mode switchport
  channel-group 1 mode auto
exit
interface tengigabitethernet 1/0/2
  mode switchport
  channel-group 1 mode auto
exit

The "speed 1000M" is the default value and is not displayed in the configuration.


Next, configure the Bridge type interfaces for vlan termination and VRRP operation:

 ESR VRRP MASTER
bridge 1
  vlan 2308
  security-zone gre
  ip address 192.168.200.19/28
  vrrp id 1
  vrrp ip 192.168.200.17/32
  vrrp ip 192.168.200.18/32 secondary
  vrrp priority 200
  vrrp group 1
  vrrp preempt disable
  vrrp
  enable
exit
bridge 3
  vlan 3
  unknown-unicast-forwarding disable
  security-zone trusted
  ip address 10.255.252.2/23
  ip helper-address 100.123.0.2
  vrrp id 3
  vrrp ip 10.255.252.1/32
  vrrp priority 200
  vrrp group 1
  vrrp preempt disable
  vrrp
  ip tcp adjust-mss 1400
  protected-ports local
  protected-ports exclude vlan
  ports vrrp filtering enable
  ports vrrp filtering exclude vlan
  enable
exit
bridge 4
  vlan 2300
  security-zone trusted
  ip address 100.123.0.173/24
  vrrp id 23
  vrrp ip 100.123.0.175/32
  vrrp priority 200
  vrrp group 1
  vrrp preempt disable
  vrrp
  ip tcp adjust-mss 1400
  enable
exit
bridge 5
  vlan 2301
  security-zone untrusted
  ip address 172.16.0.2/28
  vrrp id 5
  vrrp ip 172.16.0.4/32
  vrrp priority 200
  vrrp group 1
  vrrp preempt disable
  vrrp
  ip tcp adjust-mss 1400  
  enable
exit
bridge 10
  vlan 10
  unknown-unicast-forwarding disable
  security-zone user
  ip firewall disable
  ip address 198.18.148.2/22
  vrrp id 10
  vrrp ip 198.18.148.1/32
  vrrp priority 200
  vrrp group 1
  vrrp preempt disable
  vrrp
  ip tcp adjust-mss 1400
  location data10
  protected-ports radius
  protected-ports exclude vlan
  ports vrrp filtering enable
  ports vrrp filtering exclude vlan
  enable
exit
bridge 11
  vlan 11
  unknown-unicast-forwarding disable
  security-zone user
  ip firewall disable
  ip address 198.18.152.2/22
  ip helper-address 100.123.0.2
  vrrp id 11
  vrrp ip 198.18.152.1/32
  vrrp priority 200
  vrrp group 1
  vrrp preempt disable
  vrrp
  ip tcp adjust-mss 1400
  location data11
  protected-ports radius
  protected-ports exclude vlan
  ports vrrp filtering enable
  ports vrrp filtering exclude vlan
  enable
exit
 ESR VRRP BACKUP
bridge 1
  vlan 2308
  security-zone gre
  ip address 192.168.200.20/28
  vrrp id 1
  vrrp ip 192.168.200.17/32
  vrrp ip 192.168.200.18/32 secondary
  vrrp priority 100
  vrrp group 1
  vrrp preempt disable
  vrrp
  enable
exit
bridge 3
  vlan 3
  unknown-unicast-forwarding disable
  security-zone trusted
  ip address 10.255.252.3/23
  ip helper-address 100.123.0.2
  vrrp id 3
  vrrp ip 10.255.252.1/32
  vrrp priority 100
  vrrp group 1
  vrrp preempt disable
  vrrp
  ip tcp adjust-mss 1400
  protected-ports local
  protected-ports exclude vlan
  ports vrrp filtering enable
  ports vrrp filtering exclude vlan
  enable
exit
bridge 4
  vlan 2300
  security-zone trusted
  ip address 100.123.0.175/24
  vrrp id 23
  vrrp ip 100.123.0.174/32
  vrrp priority 100
  vrrp group 1
  vrrp preempt disable
  vrrp
  ip tcp adjust-mss 1400
  enable
exit
bridge 5
  vlan 2301
  security-zone untrusted
  ip address 172.16.0.3/28
  vrrp id 5
  vrrp ip 172.16.0.4/32
  vrrp priority 100
  vrrp group 1
  vrrp preempt disable
  vrrp
  ip tcp adjust-mss 1400  
  enable
exit
bridge 10
  vlan 10
  unknown-unicast-forwarding disable
  security-zone user
  ip firewall disable
  ip address 198.18.148.3/22
  vrrp id 10
  vrrp ip 198.18.148.1/32
  vrrp priority 100
  vrrp group 1
  vrrp preempt disable
  vrrp
  ip tcp adjust-mss 1400
  location data10
  protected-ports radius
  protected-ports exclude vlan
  ports vrrp filtering enable
  ports vrrp filtering exclude vlan
  enable
exit
bridge 11
  vlan 11
  unknown-unicast-forwarding disable
  security-zone user
  ip firewall disable
  ip address 198.18.152.3/22
  ip helper-address 100.123.0.2
  vrrp id 11
  vrrp ip 198.18.152.1/32
  vrrp priority 100
  vrrp group 1
  vrrp preempt disable
  vrrp
  ip tcp adjust-mss 1400
  location data11
  protected-ports radius
  protected-ports exclude vlan
  ports vrrp filtering enable
  ports vrrp filtering exclude vlan
  enable
exit

As you can see from the configuration above, the settings differ only in terms of IP addresses and VRRP priority value.

Let us configure routing: specify the default route and the route to the subnet of the primary addresses of the AP:

 ESR VRRP MASTER/BACKUP
ip route 0.0.0.0/0 172.16.0.1
ip route 192.168.240.0/23 192.168.200.21

Configure the interaction with radius server:

 ESR VRRP MASTER
radius-server host 100.123.0.2
  key ascii-text testing123
  timeout 2
  source-address 100.123.0.173
  auth-port 31812
  acct-port 31813
  retransmit 3
  dead-interval 10
exit
aaa radius-profile PCRF
  radius-server host 100.123.0.2
exit
das-server COA
  key ascii-text testing123
  port 3799
  clients object-group SoftWLC
exit
aaa das-profile COA
  das-server COA
exit
 ESR VRRP BACKUP
radius-server host 100.123.0.2
  key ascii-text testing123
  timeout 2
  source-address 100.123.0.175
  auth-port 31812
  acct-port 31813
  retransmit 3
  dead-interval 10
exit
aaa radius-profile PCRF
  radius-server host 100.123.0.2
exit
das-server COA
  key ascii-text testing123
  port 3799
  clients object-group SoftWLC
exit
aaa das-profile COA
  das-server COA
exit

Configure the wireless-controller:

 ESR VRRP MASTER
tunnel softgre 1
  description "mgmt"
  mode management
  local address 192.168.200.17
  default-profile
  enable
exit
tunnel softgre 1.1
  bridge-group 3
  enable
exit
tunnel softgre 2
  description "data"
  mode data
  local address 192.168.200.18
  default-profile
  enable
exit

wireless-controller
  peer-address 100.123.0.175
  nas-ip-address 100.123.0.173
  vrrp-group 1
  data-tunnel configuration radius
  aaa das-profile COA
  aaa radius-profile PCRF
  enable
exit
 ESR VRRP BACKUP
tunnel softgre 1
  description "mgmt"
  mode management
  local address 192.168.200.17
  default-profile
  enable
exit
tunnel softgre 1.1
  bridge-group 3
  enable
exit
tunnel softgre 2
  description "data"
  mode data
  local address 192.168.200.18
  default-profile
  enable
exit

wireless-controller
  peer-address 100.123.0.173
  nas-ip-address 100.123.0.175
  vrrp-group 1
  data-tunnel configuration radius
  aaa das-profile COA
  aaa radius-profile PCRF
  enable
exit

Let's pay attention to the "vrrp-group 1" parameter in the wireless-controller settings. Thus, the router in the VRRP master state will transmit information about the raised tunnels for AP to the neighbor specified in the "peer-address" setting, and the router in the VRRP backup state will form tunnels for AP using the received information.

Configure the firewall:

 ESR VRRP MASTER/BACKUP
security zone-pair gre self
  rule 1
    action permit
    match protocol gre
    enable
  exit
  rule 2
    action permit
    match protocol icmp
    enable
  exit
  rule 3
    action permit
    match protocol vrrp
    enable
  exit
exit

security zone-pair trusted self
  rule 1
    action permit
    match source-address MGMT
    enable
  exit
  rule 2
    action permit
    match protocol vrrp
    enable
  exit
exit

security zone-pair trusted trusted 
  rule 1
    action permit
    match source-address MGMT
    enable
  exit
exit

security zone-pair trusted user
  rule 1
    action permit
    enable
  exit
exit

security zone-pair trusted gre
  rule 1
    action permit
    enable
  exit
exit

security zone-pair user self
  rule 1
    action permit
    match protocol udp
    match source-port dhcp_client
    match destination-port dhcp_server
    enable
  exit
  rule 2
    action permit
    match protocol vrrp
    enable
  exit
exit

security zone-pair user trusted
  rule 1
    action permit
    match protocol udp
    match source-port dhcp_client
    match destination-port dhcp_server
    enable
  exit
exit

security zone-pair user untrusted
  rule 1
    action permit
    enable
  exit
exit

security zone-pair untrusted self
  rule 1
    action permit
    match protocol vrrp
    enable
  exit
exit

Note that VRRP traffic is allowed for all security zones in the self direction.

The complete ESR configuration is as follows:

 ESR VRRP MASTER
#!/usr/bin/clish
#18
#1.11.4
hostname esr-master

object-group service dhcp_server
  port-range 67
exit
object-group service dhcp_client
  port-range 68
exit

object-group network MGMT
  ip prefix 192.168.200.16/28
  ip prefix 10.255.252.0/23
exit
object-group network SoftWLC
  ip address-range 100.123.0.2
exit

radius-server host 100.123.0.2
  key ascii-text encrypted 88B11079B9014FAAF7B9
  timeout 2
  source-address 100.123.0.173
  auth-port 31812
  acct-port 31813
  retransmit 3
  dead-interval 10
exit
aaa radius-profile PCRF
  radius-server host 100.123.0.2
exit
das-server COA
  key ascii-text encrypted 88B11079B9014FAAF7B9
  port 3799
  clients object-group SoftWLC
exit
aaa das-profile COA
  das-server COA
exit

vlan 3,10-11,2300-2301,2308
exit

no spanning-tree

security zone trusted
exit
security zone untrusted
exit
security zone gre
exit
security zone user
exit


bridge 1
  vlan 2308
  security-zone gre
  ip address 192.168.200.19/28
  vrrp id 1
  vrrp ip 192.168.200.17/32
  vrrp ip 192.168.200.18/32 secondary
  vrrp priority 200
  vrrp group 1
  vrrp preempt disable
  vrrp
  enable
exit
bridge 3
  vlan 3
  unknown-unicast-forwarding disable
  security-zone trusted
  ip address 10.255.252.2/23
  ip helper-address 100.123.0.2
  vrrp id 3
  vrrp ip 10.255.252.1/32
  vrrp priority 200
  vrrp group 1
  vrrp preempt disable
  vrrp
  ip tcp adjust-mss 1400
  protected-ports local
  protected-ports exclude vlan
  ports vrrp filtering enable
  ports vrrp filtering exclude vlan
  enable
exit
bridge 4
  vlan 2300
  security-zone trusted
  ip address 100.123.0.173/24
  vrrp id 23
  vrrp ip 100.123.0.175/32
  vrrp priority 200
  vrrp group 1
  vrrp preempt disable
  vrrp
  ip tcp adjust-mss 1400
  enable
exit
bridge 5
  vlan 2301
  security-zone untrusted
  ip address 172.16.0.2/28
  vrrp id 5
  vrrp ip 172.16.0.4/32
  vrrp priority 200
  vrrp group 1
  vrrp preempt disable
  vrrp
  ip tcp adjust-mss 1400
  enable
exit
bridge 10
  vlan 10
  unknown-unicast-forwarding disable
  security-zone user
  ip firewall disable
  ip address 198.18.148.2/22
  vrrp id 10
  vrrp ip 198.18.148.1/32
  vrrp priority 200
  vrrp group 1
  vrrp preempt disable
  vrrp
  ip tcp adjust-mss 1400
  location data10
  protected-ports radius
  protected-ports exclude vlan
  ports vrrp filtering enable
  ports vrrp filtering exclude vlan
  enable
exit
bridge 11
  vlan 11
  unknown-unicast-forwarding disable
  security-zone user
  ip firewall disable
  ip address 198.18.152.2/22
  ip helper-address 100.123.0.2
  vrrp id 11
  vrrp ip 198.18.152.1/32
  vrrp priority 200
  vrrp group 1
  vrrp preempt disable
  vrrp
  ip tcp adjust-mss 1400
  location data11
  protected-ports radius
  protected-ports exclude vlan
  ports vrrp filtering enable
  ports vrrp filtering exclude vlan
  enable
exit

interface port-channel 1
  mode switchport
  switchport forbidden default-vlan
  switchport general acceptable-frame-type tagged-only
  switchport general allowed vlan add 3,10-11,2300-2301,2308 tagged
exit
interface gigabitethernet 1/0/1
  mode switchport
  channel-group 1 mode auto
exit
interface gigabitethernet 1/0/2
  mode switchport
  channel-group 1 mode auto
exit
tunnel softgre 1
  description "mgmt"
  mode management
  local address 192.168.200.17
  default-profile
  enable
exit
tunnel softgre 1.1
  bridge-group 3
  enable
exit
tunnel softgre 2
  description "data"
  mode data
  local address 192.168.200.18
  default-profile
  enable
exit

security zone-pair gre self
  rule 1
    action permit
    match protocol gre
    enable
  exit
  rule 2
    action permit
    match protocol icmp
    enable
  exit
  rule 3
    action permit
    match protocol vrrp
    enable
  exit
exit
security zone-pair trusted self
  rule 1
    action permit
    match source-address MGMT
    enable
  exit
  rule 2
    action permit
    match protocol vrrp
    enable
  exit
exit
security zone-pair trusted trusted
  rule 1
    action permit
    match source-address MGMT
    enable
  exit
exit
security zone-pair trusted user
  rule 1
    action permit
    enable
  exit
exit
security zone-pair trusted gre
  rule 1
    action permit
    enable
  exit
exit
security zone-pair user self
  rule 1
    action permit
    match protocol udp
    match source-port dhcp_client
    match destination-port dhcp_server
    enable
  exit
  rule 2
    action permit
    match protocol vrrp
    enable
  exit
exit
security zone-pair user trusted
  rule 1
    action permit
    match protocol udp
    match source-port dhcp_client
    match destination-port dhcp_server
    enable
  exit
exit
security zone-pair user untrusted
  rule 1
    action permit
    enable
  exit
exit
security zone-pair untrusted self
  rule 1
    action permit
    match protocol vrrp
    enable
  exit
exit


ip dhcp-relay

ip route 0.0.0.0/0 172.16.0.1
ip route 192.168.240.0/23 192.168.200.21

wireless-controller
  peer-address 100.123.0.175
  nas-ip-address 100.123.0.173
  vrrp-group 1
  data-tunnel configuration radius
  aaa das-profile COA
  aaa radius-profile PCRF
  enable
exit
ip telnet server
ip ssh server
 ESR VRRP BACKUP
#!/usr/bin/clish
#18
#1.11.4
hostname esr-backup

object-group service dhcp_server
  port-range 67
exit
object-group service dhcp_client
  port-range 68
exit

object-group network MGMT
  ip prefix 192.168.200.16/28
  ip prefix 10.255.252.0/23
exit
object-group network SoftWLC
  ip address-range 100.123.0.2
exit

radius-server host 100.123.0.2
  key ascii-text encrypted 88B11079B9014FAAF7B9
  timeout 2
  source-address 100.123.0.175
  auth-port 31812
  acct-port 31813
  retransmit 3
  dead-interval 10
exit
aaa radius-profile PCRF
  radius-server host 100.123.0.2
exit
das-server COA
  key ascii-text encrypted 88B11079B9014FAAF7B9
  port 3799
  clients object-group SoftWLC
exit
aaa das-profile COA
  das-server COA
exit

vlan 3,10-11,2300-2301,2308
exit

no spanning-tree

security zone trusted
exit
security zone untrusted
exit
security zone gre
exit
security zone user
exit


bridge 1
  vlan 2308
  security-zone gre
  ip address 192.168.200.20/28
  vrrp id 1
  vrrp ip 192.168.200.17/32
  vrrp ip 192.168.200.18/32 secondary
  vrrp priority 100
  vrrp group 1
  vrrp preempt disable
  vrrp
  enable
exit
bridge 3
  vlan 3
  unknown-unicast-forwarding disable
  security-zone trusted
  ip address 10.255.252.3/23
  ip helper-address 100.123.0.2
  vrrp id 3
  vrrp ip 10.255.252.1/32
  vrrp priority 100
  vrrp group 1
  vrrp preempt disable
  vrrp
  ip tcp adjust-mss 1400
  protected-ports local
  protected-ports exclude vlan
  ports vrrp filtering enable
  ports vrrp filtering exclude vlan
  enable
exit
bridge 4
  vlan 2300
  security-zone trusted
  ip address 100.123.0.175/24
  vrrp id 23
  vrrp ip 100.123.0.174/32
  vrrp priority 100
  vrrp group 1
  vrrp preempt disable
  vrrp
  ip tcp adjust-mss 1400
  enable
exit
bridge 5
  vlan 2301
  security-zone untrusted
  ip address 172.16.0.3/28
  vrrp id 5
  vrrp ip 172.16.0.4/32
  vrrp priority 100
  vrrp group 1
  vrrp preempt disable
  vrrp
  ip tcp adjust-mss 1400
  enable
exit
bridge 10
  vlan 10
  unknown-unicast-forwarding disable
  security-zone user
  ip firewall disable
  ip address 198.18.148.3/22
  vrrp id 10
  vrrp ip 198.18.148.1/32
  vrrp priority 100
  vrrp group 1
  vrrp preempt disable
  vrrp
  ip tcp adjust-mss 1400
  location data10
  protected-ports radius
  protected-ports exclude vlan
  ports vrrp filtering enable
  ports vrrp filtering exclude vlan
  enable
exit
bridge 11
  vlan 11
  unknown-unicast-forwarding disable
  security-zone user
  ip firewall disable
  ip address 198.18.152.3/22
  ip helper-address 100.123.0.2
  vrrp id 11
  vrrp ip 198.18.152.1/32
  vrrp priority 100
  vrrp group 1
  vrrp preempt disable
  vrrp
  ip tcp adjust-mss 1400
  location data11
  protected-ports radius
  protected-ports exclude vlan
  ports vrrp filtering enable
  ports vrrp filtering exclude vlan
  enable
exit

interface port-channel 1
  mode switchport
  switchport forbidden default-vlan
  switchport general acceptable-frame-type tagged-only
  switchport general allowed vlan add 3,10-11,2300-2301,2308 tagged
exit
interface gigabitethernet 1/0/1
  mode switchport
  channel-group 1 mode auto
exit
interface gigabitethernet 1/0/2
  mode switchport
  channel-group 1 mode auto
exit
tunnel softgre 1
  description "mgmt"
  mode management
  local address 192.168.200.17
  default-profile
  enable
exit
tunnel softgre 1.1
  bridge-group 3
  enable
exit
tunnel softgre 2
  description "data"
  mode data
  local address 192.168.200.18
  default-profile
  enable
exit

security zone-pair gre self
  rule 1
    action permit
    match protocol gre
    enable
  exit
  rule 2
    action permit
    match protocol icmp
    enable
  exit
  rule 3
    action permit
    match protocol vrrp
    enable
  exit
exit
security zone-pair trusted self
  rule 1
    action permit
    match source-address MGMT
    enable
  exit
  rule 2
    action permit
    match protocol vrrp
    enable
  exit
exit
security zone-pair trusted trusted
  rule 1
    action permit
    match source-address MGMT
    enable
  exit
exit
security zone-pair trusted user
  rule 1
    action permit
    enable
  exit
exit
security zone-pair trusted gre
  rule 1
    action permit
    enable
  exit
exit
security zone-pair user self
  rule 1
    action permit
    match protocol udp
    match source-port dhcp_client
    match destination-port dhcp_server
    enable
  exit
  rule 2
    action permit
    match protocol vrrp
    enable
  exit
exit
security zone-pair user trusted
  rule 1
    action permit
    match protocol udp
    match source-port dhcp_client
    match destination-port dhcp_server
    enable
  exit
exit
security zone-pair user untrusted
  rule 1
    action permit
    enable
  exit
exit
security zone-pair untrusted self
  rule 1
    action permit
    match protocol vrrp
    enable
  exit
exit


ip dhcp-relay

ip route 192.168.240.0/23 192.168.200.21
ip route 0.0.0.0/0 172.16.0.1

wireless-controller
  peer-address 100.123.0.173
  nas-ip-address 100.123.0.175
  vrrp-group 1
  data-tunnel configuration radius
  aaa das-profile COA
  aaa radius-profile PCRF
  enable
exit
ip telnet server
ip ssh server

Adding an ESR to the EMS tree

Both ESRs with real interface address 100.123.0.173 and 100.123.0.175 respectively should be added to the EMS tree. The VRRP address 100.123.0.174 will be used as a gateway for routes to the AP management and WiFi user subnets, it will not appear anywhere in the EMS.

Add ESR-VRRP-MASTER - open EMS, stand on the node to which we plan to add ESR and click the "+" button located at the top left of the node tree:

Fig. 4.

In the window that opens, in the field:

  • "Object name" - specify random ESR name "ESR-VRRP-MASTER".
  • "Type" - select the type of equipment corresponding to the used type of ESR "ESR1000".
  • "IP address" - specify the ESR management address ESR "100.123.0.173".

Click the "Add" button.

After that it is necessary to stand on the added ESR (if it does not appear in the tree - click the button above "" ) open the "Access" tab on the right:

Fig. 5.

In the opened window edit the fields:

  • "File protocol" - choose "FTP".
  • "Read community" - specify the name of SNMP RO community, configured earlier "public11".
  • "Write community" - specify the name of SNMP RW community, configured earlier "private1".
  • "Add the VRRP" - check the box. This setting must be enabled when using redundancy with VRRP for the tunnel destruction functionality to work correctly on ESR.

When adding ESR-100/200, the value of the "ESR mode" field will be "StationCE".

In this case it is necessary to change the field value to "Station", otherwise such ESR will not be used to build data tunnels for AP.

Change the radius password that will be used when interacting with the ESR. To do this, open "RADIUS" → "Access Point Management" in the EMS menu. Select the previously added ESR (in case of a large number of devices you can filter by ESR IP address) and click the "Edit" button:

Fig. 6.

In the opened window in the "Key" field set the previously configured for ESR key "testing123" and click "Accept".

Similarly, add ESR-VRRP-BACKUP using its real address 100.123.0.175.

Possible reasons of network failure

Below we will consider possible variants of user traffic passing during normal operation and network failure.

Network operational state

Figure 7 shows the operational state of the network.

Fig. 7.

The traffic of WiFi users connected to the SSID the AP encapsulates in the GRE is routed to the ESR VRRP MASTER (which is in the VRRP MASTER state) where the traffic is decapsulated. Then it is routed to the Internet. The ESR VRRP BACKUP does not participate in traffic processing.

Failure of one of the stack switches

Figure 8 shows the failure state of one of the stack switches to which ESR VRRP MASTER and BACKUP are connected:

Fig. 8.

In this situation, one of the physical interfaces (gi1/0/1 or gi1/0/2) belonging to the port-channel on both ESRs will be disconnected. But, since the remaining interfaces belonging to the port-channel connected to another stack switch will remain in operation, the circuit will remain fully functional and there will be no changes in traffic flow compared to the state before the failure.

Failure of an ESR in the VRRP master state

Figure 9 shows the failure of an ESR in the VRRP MASTER state:

Fig. 9.

In this situation, the VRRP BACKUP ESR, upon detecting the absence of VRRP announcements, will switch to the VRRP MASTER state and begin processing traffic in the same manner as the VRRP ESR MASTER did previously.

Recovery from a failure of an ESR that has a higher VRRP priority

Figure 10 depicts a situation where the ESR VRRP MASTER has returned to operation after a failure:

Fig. 10.

After the ESR VRRP MASTER is brought back online and booted, upon detecting VRRP announcements from the ESR VRRP BACKUP, which is in the VRRP master state, due to the "vrrp preempt disable" setting on the VRRP interfaces, will be in the VRRP backup state and will not attempt to perform a master takeover. Traffic will continue to flow in the preempted state.

Appendixes

Different versions of the spanning-tree protocol family may be used on the switches to which the ESR connects. In this case, it is possible that after the ESR is booted, the switch ports to which it is plugged will not immediately switch to the "forwarding" state and allow traffic to pass. The ESR will then have time to switch to the VRRP MASTER state, which will result in the ESR with a higher VRRP priority taking over the mastery after the traffic transfer starts. There are two ways to avoid this:

  1. Use a switch-side configuration to allow the ports to which the ESR is connected to transition immediately to the "forwarding" state, or disable the spanning-tree protocol.
  2. On all ESR interfaces using VRRP protocol, increase the interval of sending messages with the command "vrrp timers advertise" up to the time required for the switch ports to go to the "forwarding" state. But as a result of this configuration, the failure of ESR VRRP MASTER will be detected only after the specified time interval, which will increase the time of traffic switching to the backup ESR.

Example of port-channel configuration on the MES switch side:

 MES port-channel
interface gigabitethernet 1/0/1
 channel-group 1 mode auto        
exit
!
interface gigabitethernet 2/0/1
 channel-group 1 mode auto
exit
interface port-channel 1
 switchport mode general
 switchport general allowed vlan add 3,10-11,2300-2301,2308 tagged
 spanning-tree disable
 spanning-tree bpdu filtering
 switchport forbidden default-vlan
 switchport general acceptable-frame-type tagged-only
 speed 1000
exit
  • Нет меток