58. WIRELESS CONFIGURATION
TOPOLOGY INTRODUCTION
Click to enlarge
INTERNAL PC (VLAN 100) ACCESSING DEFAULT GATEWAY via Internal CAPWAP tunnel
Click to enlarge
REACHING External GUEST PC via DEFAULT GATEWAY + Internal and External CAPWAP tunnels
Click to enlarge
LAYER 3 SWITCH CONFIGURATION (SW1)
Click to enlarge
PART 2 of configuration
Note DHCP “Option 43”
Click to enlarge
WLC SETUP
This helps set up the WLC to allow GUI configuration
Click to enlarge
Click to enlarge
Why Jeremy chose FRANCE for Country Code (has to do with regulatory domain of equipment)
Click to enlarge
Click to enlarge
ACCESSING THE WLC GUI
Click to enlarge
Click to enlarge
Click to enlarge
Click to enlarge
Click to enlarge
WLC CONFIGURATION
Click to enlarge
WLC PORTS
- WLC PORTS are the PHYSICAL PORTS that cables connect to
- WLC INTERFACES are the logical interfaces within the WLC (ie: SVIs on a SWITCH)
- WLCs have a few different PORTS:
- SERVICE PORT
- A dedicated MANAGEMENT PORT
- Used for OUT-OF-BAND management
- Must connected to a SWITCH ACCESS PORT because it only supports one VLAN
- This PORT can be used to connect to the DEVICE while it is booting, performing system recovery, etc.
- DISTRIBUTION SYSTEM PORT
- These are the standard NETWORK PORTS that connect to the “DISTRIBUTION SYSTEM” (WIRED NETWORK) and are used for DATA traffic.
- These PORTS usually connect to SWITCH TRUNK PORTS, and if multiple distribution PORTS are used they can form a LAG
- CONSOLE PORT
- This is a standard CONSOLE PORT, either RJ45 or USB
- REDUNDANCY PORT
- This PORT is used to connect to another WLC to form a HIGH AVAILABILITY (HA) pair
- SERVICE PORT
Click to enlarge
WLC INTERFACES
-
MANAGEMENT INTERFACES
- Used for management traffic such as TELNET, SSH, HTTP, HTTPS, RADIUS authentication, NTP, SYSLOG, etc.
- CAPWAP TUNNELS are also formed to / from the WLC’s management INTERFACE
-
REDUNDANCY MANAGEMENT INTERFACE
- When TWO WLCs are connected by their REDUNDANCY PORTS, one WLC is “ACTIVE” and the other is “STANDBY”
- This INTERFACE can be used to connect to and manage the “STANDBY” WLC
-
VIRTUAL INTERFACE
- This INTERFACE is used when communicating with WIRELESS CLIENTS to relay DHCP requests, perform CLIENT WEB AUTHENTICATION, etc.
-
SERVICE PORT INTERFACE
- If the SERVICE PORT is used, this INTERFACE is bound to it and used for OUT-OF-BAND MANAGEMENT
-
DYNAMIC INTERFACE
- These are the INTERFACES used to map a WLAN to a VLAN
- For example :
- TRAFFIC from the “INTERNAL” WLAN will be sent to the WIRED NETWORK from the WLCs “INTERNAL” DYNAMIC INTERFACE
WLAN CONFIGURATION
Click “NEW”
Click to enlarge
Fill in details of the interface and click “APPLY”
Click to enlarge
Fill out details (IP, Netmask, Gateway…) and then click “APPLY”
Click to enlarge
INTERNAL interface has now been created
Click to enlarge
Now, repeat the above steps for the GUEST interface
Click to enlarge
Fill out details (IP, Netmask, Gateway…) and then click “APPLY”
Click to enlarge
Click to enlarge
Now that all the INTERFACES are created, we can start WLAN CONFIGURATION
Click to enlarge
Click to enlarge
INTERNAL WLAN is set to “MANAGEMENT”, it needs to be changed to “INTERNAL”
Click to enlarge
SECURITY will also need to be changed from [WPA2] to [WPA2 PSK]
Click to enlarge
(Need to CHECK the PSK “Enable” box at the bottom)
Change the PSK FORMAT to “ASCII” and enter a PASSWORD (at least 8 chars in length)
Click to enlarge
Click to enlarge
-
WEB AUTHENTICATION
- After the WIRELESS CLIENTS gets an IP ADDRESS and tries to access a WEB PAGE, they will have to enter a USERNAME and PASSWORD to AUTHENTICATE
-
WEB PASSTHROUGH
- Similar to the above, but NO USERNAME or PASSWORD are required
- A warning or statement is displayed and the CLIENT simply has to agree to gain access to the INTERNET
-
CONDITIONAL and SPLASH PAGE web redirect options are similar but additionally require 802.1x LAYER 2 AUTHENTICATION
QoS
Click to enlarge
Default QoS setting is “SILVER” (Best Effort). This can be changed depending on the class of traffic being sent through the WLAN
ADVANCED SETTINGS
Click to enlarge
Click to enlarge
CONFIGURING A NEW WLAN (GUEST)
Click to enlarge
Change STATUS to “ENABLED” and INTERFACE GROUP to “GUEST”
Click to enlarge
Click to enlarge
Now, we need to change the SECURITY POLICY to [WPA2][Auth(PSK)]
Returning to MONITORING, we can see the changes we made to the CONFIGURATION
Click to enlarge
Current number of CLIENTS is now 0. By connecting to the WLANS, these numbers should change. To SEE a list of the CLIENTS connected, click the left-hand side “CLIENTS” tab
Click to enlarge
Click to enlarge
ADDTIONAL WLC FEATURES
WIRELESS tab showing a list of the APs currently in the NETWORK
Click to enlarge
Clicking on an AP shows information and configuration settings for it
Click to enlarge
MANAGEMENT tab allows you change the ways you can MANAGE the WLC
Clicking “Mgmt Via Wireless” allows you change if you can access MANAGEMENT via WI-FI
Click to enlarge
Click to enlarge
SECURITY tab can allow us to create ACCESS LISTS
Click to enlarge
First, NAME the ACL and what kind of IP ADDRESS it’s for
Click to enlarge
CLICK “Add New Rule” to specify the ACL Rules (What traffic can pass)
Click to enlarge
Click to enlarge
Click to enlarge
We now need to APPLY the ACL (just like applying it to an INTERFACE on a ROUTER)
Click “CPU ACL” from the left-hand menu
Click to enlarge
Select the new ACL from the pull-down list and then click “APPLY”
Click to enlarge
Click to enlarge