Converged Access Mobility Design & Architecture
|
|
|
- Britney Dalton
- 10 years ago
- Views:
Transcription
1
2 Converged Access Design & Architecture 2
3 Agenda What is Converged Access? Deploying One Network: Converged Access Wireless Deployment Options The new Converged Access Architecture Converged Access IP Addressing How to deploy a Converged Access network? CleanAir & RRM WebAuth & Guest Anchor (GA) Security Features Bringing Together Wired and Wireless 3
4 Agenda What is Converged Access? Deploying One Network: Converged Access Wireless Deployment Options The new Converged Access Architecture Converged Access IP Addressing How to deploy a Converged Access network? CleanAir & RRM WebAuth & Guest Anchor (GA) Security Features Bringing Together Wired and Wireless 4
5 One Network with Converged Access Cisco Wireless LAN Controller Internal Resources One Network Corporate Network Cisco Access Point Catalyst Catalyst Switch Internet 3850 Cisco Firewall Converged Access Mode Integrated wireless controller Distributed wired/wireless datalan Mgmt plane (CAPWAP termination Solution on switch) WirelessPolicy Control One System ISE Access Control Server Identity Mgmt Guest One Management Server Prime NAC Profiler
6 Converged Wired/Wireless Access Benefits Single platform for wired and wireless Network wide visibility for faster troubleshooting Consistent security and quality of service control Maximum resiliency with fast stateful recovery Scale with distributed wired and wireless data plane Common IOS, same administration point, one release Wired and wireless traffic visible at every hop Hierarchical bandwidth management and distributed policy enforcement Layered network high availability design with stateful switchover 480G stack bandwidth; 40G wireless/switch; efficient multicast Unified Access - One Policy One Management One Network
7 Agenda What is Converged Access? Deploying One Network: Converged Access Wireless Deployment Options The new Converged Access Architecture Converged Access IP Addressing How to deploy a Converged Access network? CleanAir & RRM WebAuth & Guest Anchor (GA) Security Features Bringing Together Wired and Wireless 7
8 UA One Network: Converged Wired/Wireless Access Components One Policy with Identity Services Engine (ISE) BYOD policy management Device profiling and posture Guest access portal One Management with Cisco Prime 2.0 Full wired and wireless management User/device centric view Intuitive troubleshooting workflows Who? What? When? Where? How? Catalyst 3850 ISE Catalyst 4500-E SUP Cisco Prime 5760 Wireless Controller Catalyst 3850 Industry s first fully integrated wired and wireless switch Wireless: 480G stack, 50 APs, 2K clients, 40G Flexible Netflow, Granular QoS Sup 8E on Catalyst 4500E 888 Gbps. Sup 7-E equiv TCAM Wireless: 40G Capacity, 50 APs, 2K clients 8 x 10G SFP+ FNF, VSS* 5760 Wireless Controller Consistent IOS with Catalyst G, 1K APs, 12K Clients, N+1 Redundancy FNF, Granular QOS B e s t - in- C l a s s Pe r fo r m a n c e, S e c u r i t y, a n d Re s i l i e n c y * - Software Roadmap. Expected to be added within months
9 NEW Catalyst 3850 Switch Wireless CAPWAP Termination Up to 50 APs/2000 clients per stack, and 40G per switch 480 Gbps Stacking Bandwidth Up to 2000 Clients per Stack Full POE+ FRU Fans, Power Supplies Stackpower Granular QoS/Flexible NetFlow Line Rate on All Ports 40 Gbps Uplink Bandwidth B u i l t o n C i s c o s I n n o vative D o p p l e r A S I C
10 Cisco WLC 5760 Centralised, or Converged Access Deployment Modes Up to 1000 Access Points First IOS-Based Wireless LAN Controller Up to 12,000 Concurrent Clients 6x 1/10G SFP+ uplinks with LAG Granular QOS/Flexible NetFlow 60 Gbps Wireless Bandwidth FRU Fans FRU Power Supplies Built on Cisco s Innovative Doppler ASIC
11 Converged Access Deployment Mode - Three Use Cases INTEGRATED CONTROLLER OPTIONS EXTERNAL MOBILITY CONTROLLER NEEDED ISE Prime ISE Prime DMZ Controller ISE Prime Controller 5508 or WISM2 with SW Upgrade or new 5760 WAN Catalyst 3850 INTEGRATED CONTROLLER New Catalyst 3850 INTEGRATED CONTROLLER INTEGRATED CONTROLLER New Catalyst 3850 New Catalyst 3850 Agent Catalyst 3750 Employee 11 Guest Access Points AP CAPWAP Tunnels Access Points BRANCH SMALL/MEDIUM CAMPUS LARGE CAMPUS UP TO 50 ACCESS POINTS UP TO 2,000 CLIENTS ALL WAN SERVICES AVAILABLE UP TO 250 ACCESS POINTS UP TO 16,000 CLIENTS VISIBILITY, CONTROL, RESILIENCY UP TO 72,000 ACCESS POINTS UP TO 864,000 CLIENTS LARGEST LAYER 3 ROAMING DOMAINS Capwap Tunnel Standard Ethernet, No Tunnels Guest Tunnel from Switch to DMZ Controller
12 Agenda What is Converged Access? Deploying One Network: Converged Access Wireless Deployment Options The new Converged Access Architecture Converged Access IP Addressing How to deploy a Converged Access network? CleanAir & RRM WebAuth & Guest Anchor (GA) Security Features Bringing Together Wired and Wireless 12
13 Cisco One Network: Wireless Deployment Modes One Policy, One Management, One Network Unified Access Wireless Autonomous FlexConnect Centralised Converged Access Unparalleled Deployment Flexibility
14 Unified Access Wireless Deployment Modes Autonomous FlexConnect Centralised Converged Access WAN Standalone APs Traffic Distributed at AP Traffic Centralised at Controller Traffic Distributed at Switch Target Positioning Purchase Decision Small Wireless Network Branch Campus Branch and Campus Wireless only Wireless only Wireless only Wired and Wireless Benefits Key Considerations Simple and cost-effective for small networks Limited RRM, no Rogue detection Highly scalable for large number of remote branches Simple wireless operations with DC hosted controller L2 roaming only WAN BW and latency requirements Simplified operations with centralised control for Wireless Wireless Traffic visibility at the controller System throughput Wired and Wireless common operations One Enforcement Point One OS (IOS) Traffic visibility at every network layer Performance optimised for 11ac Catalyst 3850 in the access layer
15 Architecture Constructs CUWN Tunnel Types Intranet Group Data Centre / Service block Internet ISE PI EoIP Tunnel ( < 7.2) CAPWAP Option in 7.3 Foreign WLC Guest Anchor WLC #1 Well-known, proven architecture LEGEND WLC #2 CAPWAP Tunnels Encrypted (see Notes) Notes AP AP SSID VLAN Mapping (at controller) SSID2 SSID1 SSID3 AP Inter-Controller (Guest Anchor) EoIP / CAPWAP Tunnel Inter-Controller EoIP / CAPWAP Tunnel AP-Controller CAPWAP Tunnel Control Session + Data Plane AP / WLC CAPWAP Tunnels are an IETF Standard UDP ports used 5246: Encrypted Control Traffic 5247: Data Traffic (non-encrypted or DTLS Encrypted (configurable)) Inter-WLC Tunnels EoIP IP Protocol 97 AireOS 7.3 introduces CAPWAP option Used for inter-wlc L3 Roaming and Guest Anchor AP Existing Unified Wireless Deployment today
16 Architecture Constructs Data Centre / Service block CUWN Product Examples Group Controllers WLC 5508, WiSM2 WLC #1 Core Switches Catalyst 6500-E Intranet EoIP Tunnel ( < 7.2) CAPWAP Option in 7.3 WLC #2 Internet ISE Controller WLC 5508 PI Foreign WLC Guest Anchor Well-known, proven architecture CAPWAP Tunnels AP AP AP AP Distribution Switches Catalyst 4500-E, 6500-E Access Switches Catalyst 3750-X, 4500-E Access Points AP3600, 1140, etc. Some typical examples of products we see used today at various points in the CUWN solution set, for wireless as well as wired connectivity SSID2 SSID1 SSID3 Existing Unified Wireless Deployment today
17 Converged Access Deployment Overview MO Domain PI ISE Group MC MC Sub-Domain #1 SPG SPG MA Sub-Domain #2 MA MA MA MA MA Cisco Converged Access Deployment
18 Converged Access Components Physical vs. Logical Entities Physical Entities Agent (MA) Terminates CAPWAP tunnel from AP Controller (MC) Manages mobility within and across Sub-Domains Oracle (MO) Superset of MC, allows for Scalable Management within a Domain Logical Entities Groups Grouping of Controllers (MCs) to enable Fast Roaming, Radio Frequency Management, etc. Switch Peer Group (SPG) Localises traffic for roams within its Distribution Block MA, MC, Group functionality all exist in today s controllers (4400, 5500, WiSM2) Cisco Converged Access Deployment
19 Converged Access Physical Entities Agents (MAs) Service Block ISE PI MA MA MA MA is the first level in the hierarchy of MA / MC / MO One MA per Catalyst 3850 Stack Maintains Client DB of locally served clients Interfaces to the Controller (MC) AP AP AP Cisco Converged Access Deployment
20 Converged Access Physical Entities Controllers (MCs) Service Block ISE PI MC MA AP AP MC MA MA AP Mandatory element in design Can be hosted on a MA (smaller deployments) Manages mobility-related configuration of the downstream MAs Maintains Client DB within a SubDomain (1 x MC = One Sub-Domain) Handles RF functions (including RRM) Multiple MCs can be grouped together in a Group for scalability Supported platforms are Catalyst 3850, WiSM2, 5508, and 5760 Cisco Converged Access Deployment
21 Agenda What is Converged Access? Deploying One Network: Converged Access Wireless Deployment Options The new Converged Access Architecture Converged Access IP Addressing How to deploy a Converged Access network? CleanAir & RRM WebAuth & Guest Anchor (GA) Security Features Bringing Together Wired and Wireless 21
22 Architecture AirOS Group defined: Group of Wireless LAN Controllers (WLCs) in a network with the same Group name WLC 3 Provides Seamless and Fast roaming for clients Up to 24 WLCs members in one Group, statically configured WLC 1 WLC 4 Full mesh of tunnels between members Messages can be sent using Multicast Control Messages UDP port 1666 for un-encrypted traffic User Data traffic EoIP (IP protocol 97) NAT between members is supported WLC 2 Group
23 Architecture AirOS Domain (List) defined: Group of controllers configured on a single WLC that specifies members in different mobility groups Group 1 Group 2 Provides seamless for clients (client keep original IP address) Up to 72 WLCs in one WLC s List Full mesh of tunnels between members Messages can be sent using Multicast Control Messages UDP port 1666 for un-encrypted traffic User Data traffic EoIP (IP protocol 97) NAT between members is supported Domain
24 Inter-Controller Roaming: Layer 2 Client Database Client Database client context VLAN X WLC 1 WLC 2 Message Exchange Layer 2: same VLAN present on both controllers Client database context is moved from WLC1 to WLC2 Client database is updated with new AP and security info Client becomes LOCAL to WLC-2 Roaming Data Path No IP address refresh needed. Data flows as shown
25 Inter-Controller Roaming: Layer 3 Client Database VLAN X Client Database VLAN Z Layer 3: different client VLAN on controllers client context WLC 1 WLC 2 Message Exchange WLC-2 knows it doesn't have VLAN X Client database entry is copied from WLC1 to WLC2 Client database is updated with new AP and security info
26 Inter-Controller Roaming: Layer 3 (continue..) VLAN X VLAN Z Client Database Client Database client context WLC 1 context WLC 2 Message Exchange EoIP tunnel client WLC-1 is still the anchor for the client session Traffic goes through the EoIP tunnel and exit again in VLAN X No IP address change needed Roaming Data Path
27 Key considerations: Control Plane Full mesh of mobility tunnels among all controllers in a mobility group: Every mobility event (first association or roaming) interrupts all controllers in the Group, since messages are sent to all the controllers in the Group. Station initial attachment: Mobile Announce messages need to timeout 3 times before WLC realises it s a new client and station s association is processed Group Mobile Announce Mobile Announces Mobile Handoff Roam A distributed and hierarchical approach to mobility, instead of a full mesh, limits the scope of the mobile announcements
28 Key considerations: Data Plane Today wireless Data Plane is centralised, wireless traffic is overlaid on top of the wired network: All traffic hair-pinned back through the central Controller (local mode) Traffic is not visible as it s inside a CAPWAP tunnel Policies are usually applied in different places of the network for wired (switch) and wireless (Controller) A distributed wireless and wired data plane brings: 1. Scalability: as wireless is terminated at access switch, same level of performance is delivered for wireless and wired 2. Enable end to end traffic visibility for all traffic types from network access. Same tool for troubleshooting that are available for wired 3. Common policy enforcement point for wired and wireless 4. High Availability: wireless controller fault is isolated (for example to a single switch/floor) 5. Rich media optimisation: support mission critical application with Qos applied closest to the source
29 Converged Access: Architecture Oracle Controller Group N Subdomain A Subdomain B Group M Agent Peer Group 1 Peer Group 2 Domain 14ms 50ms 80ms 120ms > 250ms Fast Roam Full Authentication
30 Converged Access Components Scalability Scalability 3850 as MC WiSM2 Max number of MC in Domain Max number of MC in Group Max number of MAs in Sub-domain (so per MC) Max number of SPGs in Sub-domain Max number of MAs in a SPG
31 Point of Attachment (PoA) vs Point of Presence (PoP) Controller 1. The station s PoA is where its data path is initially processed upon entry in the network 2. The station s PoP is the place in the wired network where the station is being advertised 3. Before a user roams, PoP and PoA are in the same place 4. If users associate and remain stationary, this is their traffic flow 5. Note: traffic doesn t flow through MC PG PoP MA MA MA PoA AP AP AP in CAPWAP traffic traffic
32 Protocol: Client first association Oracle ISE 1. AAA client Authentication 2. PMK update Controller Mobile Announce Handoff Complete NACK AAA auth 3. PMK Push (to all MAs in subdomain and other MCs in Group) 4. Mobile Announce MA to MC 5. Mobile Announce MC to MO 6. Mobile Announce NACK MO to MC 7. Mobile Announce NACK MC to MA Agent PMK push NACK Mobile Handoff PMK Announce Complete update Handoff Notifications PoP PoA ARP Agent Agent 8. Handoff Complete MA to MC 9. Handoff Complete MC to MO 10. Handoff Notification to MAs (in the Peer Group) 11. PoP sends ARP and traffic flows as shown Peer Group A Peer Group N Home Subdomain
33 Client First Association: Front Lobby Feature What: when configured, the client first PoA is load balanced across the switches in the SPG. When the client joins, the switch checks if its load is over a configurable threshold and send a message to anchor the client to least loaded switch in SPG. Why: large number of clients could potentially attach to a single MA whose APs are situated close to the front door/lobby. This would result into congestion at that home switch whereas other MAs would be underutilised. This is even worse if the client s data path is anchored at the home switch. How to configure it: the feature is ON by DEFAULT and it s possible to change the threshold value. By default is 50% (of the max client allowed) To configure a different threshold use the following command on a per MA base: 3850(config)#wireless mobility load-balance threshold? < > Threshold value for number of clients that can be anchored locally
34 Basic Roam types: L2/L3 When wireless client roams to a switch where client VLAN is present, it is considered as L2 Roam - In CUWN this would imply that the PoP moves to the new switch - In Converged Access this is configurable and by default the data path is anchored at the home switch (feature called Sticky/L2 anchoring, see next slides). When wireless client roams across L3 subnets (i.e. to switches where its own VLAN is not present), it is considered as L3 Roam. - same as CUWN, tunnelling is used to keep the client s IP address In both cases, client will continue to maintain its original IP address: this is called seamless mobility.
35 Intra Switch Roaming Controller Home Subdomain 1. Client roams 2. Internal database is updated 3. event is transparent to other members of the SPG and to MC Local switch Other Agents Peer Group Roam
36 Intra Switch Peer Group (SPG) Roaming Control Plane Controller 1. Client roams Handoff Handoff complete Complete ACK Home Subdomain 2. Mobile Announce to Anchor MA 3. Handoff to Foreign 4. Handoff Complete to MC Foreign switch Mobile Handoff Announce Handoff Notifications Anchor switch Other Agents 5. Handoff Notifications sent to other MAs in the same SPG 6. Handoff Complete (ACK) 7. Note: messages to MC are kept to minimum, the roaming is faster Peer Group Roam
37 Inter SPG Roaming, same sub-domain Control Plane Controller Home Subdomain 1. Client roams 2. Foreign has no info about the client: Mobile Announce to MC 3. Mobile Announce forwarded 4. Handoff to Foreign Other Agents Handoff Mobile Complete Announce Handoff Notification Foreign switch Handoff ACK Handoff Mobile announce Anchor switch Station Left Other Agents 5. Handoff complete to MC 6. Handoff Notification 7. Station Left message Peer Group B Peer Group A 8. Handoff ACK Roam
38 Inter SPG Roaming, same sub-domain Data Plane Other Agents Peer Group B Controller 1. Client is at home switch Home Subdomain Foreign switch MTE PoA PoP Anchor switch Peer Group A Other Agents 2. Traffic flows through PoP on anchor switch 3. Client roams 4. PoA moves to Foreign 5. PoP remains at anchor switch 6. MTE tunnelling functionality is used 7. Traffic flows as shown Roam
39 Inter sub-domain roaming Control Plane Controller Group Handoff Mobile Handoff Complete Announce ACK Handoff Complete ACK Oracle (optional) Mobile announce Controller 1. Client roams 2. Mobile Announce to MC 3. (Mobile Announce to MO) Foreign Subdomain Home Subdomain 4. Mobile Announce forwarded to Anchor through MC Other Agents Handoff Mobile Announce Complete Handoff Notification Foreign switch Handoff Anchor switch Mobile announce Station Left Other Agents 5. Direct Handoff to Foreign 6. Handoff complete to MC 7. Station Left messages 8. Handoff Notifications Peer Group B Peer Group A 9. Handoff to other MCs (and MO) Roam 10. Handoff ACKs
40 Inter sub-domain roaming Data Plane Group Oracle 1. Client is at home switch Controller MTE MTE Controller 2. Traffic flows through PoP on anchor switch Foreign Subdomain Home Subdomain 3. Client roams 4. PoA moves to Foreign 5. PoP remains at anchor switch Other Agents Foreign switch PoA PoP Anchor switch Other Agents 6. MTE tunnelling functionality is used 7. Traffic flows as shown Peer Group B Peer Group A Roam
41 Agenda What is Converged Access? Deploying One Network: Converged Access Wireless Deployment Options The new Converged Access Architecture Converged Access IP Addressing How to deploy a Converged Access network? CleanAir & RRM WebAuth & Guest Anchor (GA) Security Features Bringing Together Wired and Wireless 41
42 Converged Access IP Addressing For Wireless Management / APs Wireless LAN Management for directly-attached APs on Catalyst 3850 APs need to be in the same VLAN as the Wireless Management interface: interface GigabitEthernet1/0/1 description to_ap switchport access vlan 20 switchport mode access interface Vlan20 ip address ! wireless management interface Vlan20 If you do not define a wireless management VLAN on the 3850 (i.e. no wireless management interface vlan X in the config), the switch will then be transparent to AP attachment and everything will continue to operate as it does today on a 3750-X, i.e. AP attachment to centralised controller, DHCP option 43 controller assignment, etc. As soon as you define a «Wireless management interface VLAN», the Catalyst 3850 will intercept all incoming AP requests, and terminate / process them at the local CPU. Cisco Converged Access Deployment
43 Converged Access IP Addressing Options Multiple options exist for how to assign user subnets in Converged Access. Several possible IP addressing deployment models exist for wired / wireless use Option 1 Separate wired and wireless VLANs, per wiring closet Option 2 Merged wired and wireless VLANs, per wiring closet Option 3 Separate wired VLANs per wiring closet, spanned wireless VLAN across multiple wiring closets (below a single distribution) There are trade-offs between each of these IP addressing design models. On the following slides, we have attempted to summarise some of the pluses and minuses of each of these IP addressing options. Prescriptive guidance for IP address deployment in Converged Access requires additional testing and validation. Cisco Converged Access Deployment
44 Converged Access IP Addressing Option 1 OPTION 1 Separate VLANs / subnets per wiring closet, for wired and wireless In this design option, separate and distinct subnets are configured per Converged Access wiring closet, for both wired and wireless users VLAN 11 wired VLAN 12 wireless VLAN 21 wired VLAN 22 wireless! ""#$$%&' () *! ""#$$%&' () *! ""#$$%&' () *! ""#$$%&' () * VLAN 31 wired VLAN 32 wireless VLAN 41 wired VLAN 42 wireless! "#$% +#", ($#! ""#$$%&' () * VLAN 51 wired VLAN 52 wireless! ""#$$%&' () * VLAN 61 wired VLAN 62 wireless ADVANTAGES - Easy to understand maps well to customer expectations for wired design - Can match any wired deployment (L2/L3) - Can create separate wired and wireless policies based on VLAN - Eliminates DHCP contention wired/wireless DRAWBACKS - May lead to more subnets required - May be hard to size wireless subnets for number of anticipated wireless clients, per wiring closet (may lead to wasted IP address space for wireless use, potentially)! "#$% %$&' () * 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Converged Access Deployment
45 Converged Access IP Addressing Option 2 OPTION 2 Merged VLANs / subnets per wiring closet, for wired and wireless In this design option, wired and wireless users and devices share common subnets per CA wiring closet (i.e. one or more wired / wireless VLANs per wiring closet) ADVANTAGES - Leads to fewer subnets req d vs. Opt. 1 VLAN 11 wired and wireless VLAN 21 wired and wireless VLAN 31 wired and wireless! ""#$$%&' () *! ""#$$%&' () *! ""#$$%&' () *! ""#$$%&' () * VLAN 41 wired and wireless! "#$% +#", ($#! ""#$$%&' () * VLAN 51 wired and wireless! ""#$$%&' () * VLAN 61 wired and wireless DRAWBACKS - Potential dual-attached device issues (possible client-side bridging issues) - No longer possible to apply separate per- VLAN policies for wired / wireless - May be hard to size combined subnets appropriately for number of wired / wireless clients, per wiring closet (may be slightly more efficient vs. Opt 1) - Possible DHCP contention, wired / wireless! "#$% %$&' () * 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Converged Access Deployment
46 Converged Access IP Addressing Option 3 OPTION 3 Separate wired VLANs / subnets per wiring closet, with wireless VLAN spanned In this design option, separate and distinct subnets are configured per CA wiring closet, for both wired and wireless users, with wireless spanned below dist. VLAN 11 wired VLAN 100 wireless VLAN 21 wired VLAN 100 wireless! ""#$$%&' () *! ""#$$%&' () *! ""#$$%&' () *! ""#$$%&' () * VLAN 31 wired VLAN 100 wireless VLAN 41 wired VLAN 100 wireless! "#$% +#", ($#! ""#$$%&' () * VLAN 51 wired VLAN 100 wireless! ""#$$%&' () * VLAN 61 wired VLAN 100 wireless ADVANTAGES - Can create separate wired and wireless policies based on VLAN - Leads to fewer subnets req d vs. Opt. 1 (only one wireless subnet below dist.) - Easier to size wireless subnet(s) below distribution layer (closer correspondence - to IP addressing in the CUWN model) DRAWBACKS - Optimised with VSS, or single-controlplane, at distribution (to avoid L2 loops) - Topology differs, wired vs. wireless! "#$% %$&' () * 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential Cisco Converged Access Deployment
47 Agenda What is Converged Access? Deploying One Network: Converged Access Wireless Deployment Options The new Converged Access Architecture Converged Access IP Addressing How to deploy a Converged Access network? CleanAir & RRM WebAuth & Guest Anchor (GA) Security Features Bringing Together Wired and Wireless 47
48 Converged Access Deployment Mode Branch use case INTEGRATED CONTROLLER OPTIONS EXTERNAL MOBILITY CONTROLLER NEEDED DMZ Prime ISE ISE Prime Controller ISE Prime 5508 or WISM2 with SW Upgrade or new 5760 WAN 3850 INEGRATED CONTROLLER New Catalyst 3850 INTEGRATED CONTROLLER New Catalyst 3850 New Catalyst 3850 Agent Catalyst 3750 AP Capwap Tunnels Employee Guest Access Points Access Points BRANCH SMALL CAMPUS LARGE CAMPUS UP TO 50 ACCESSS POINTS UP TO 250 ACCESS POINTS GREATER THAN 250 ACCESS POINTS Capwap Tunnel 2013 Cisco and/or Standard its affiliates. Ethernet, All No rights Tunnels reserved. Guest Tunnel from Switch to DMZ Controller
49 Converged Access Deployment Mode Branch - Configuration Management VLAN Configuration interface Vlan31 description MANAGEMENT VLAN ip address SVIs for client VLANs defined locally on the switch Prime ISE interface Vlan32 description Client VLAN32 ip address WAN interface Vlan33 description Client VLAN33 ip address Wireless Management Interface Configuration 3850(config)#wireless management interface VLAN31 This activates the MA functionality 3850 INTEGRATED CONTROLLER 3850#show wireless Interface summary Wireless Interface Summary AP Manager on management Interface: Enabled Interface Name Interface Type VLAN ID IP Address IP Netmask MAC Address Vlan31 Management ce.0a55 BRANCH Guest
50 Converged Access Deployment Mode Branch - Configuration Configuring Controller 3850(config)#wireless mobility controller This activates the MC functionality Prime ISE role changed to Controller Please save config and reboot the whole stack 3850#sh wireless mobility summary Controller Summary: After reboot WAN Role : Controller Protocol Port : Group Name : default Oracle IP Address : DTLS Mode : Enabled Domain ID for r : 0xac34 Keepalive Interval : 10 Keepalive Count : 3 Control Message DSCP Value : 0 Domain Member Count : 1 Link Status is Control Path Status : Data Path Status Controllers configured in the Domain: IP Public IP Group Name Multicast IP Link Status default UP : UP 3850 INTEGRATED CONTROLLER BRANCH Guest
51 Converged Access Deployment Mode Branch - Configuration Access Point port configuration interface GigabitEthernet1/0/15 description - Access port for Access points switchport access vlan 31 switchport mode access Access Points need to be configured on Wireless Management VLAN Prime ISE 3850#show ap summary Number of APs: 1 Global AP User Name: Not configured Global AP Dot1x User Name: Not configured WAN AP Name AP Model Ethernet MAC Radio MAC State AP3502I 3502I c47d.4f3a.ed80 04fe.7f49.58c0 Registered 3850 INTEGRATED CONTROLLER WLAN Configuration 3850(config)#wlan WPA-PSK 4 wpa-psk 3850(config-wlan)#client vlan (config-wlan)#no security wpa akm dot1x 3850(config-wlan)#security wpa akm psk set-key ascii 0 Cisco (config-wlan)#no shut WLAN sample configuration BRANCH Guest
52 Converged Access Deployment Mode Branch - Configuration Client Connectivity 3850r#sh wireless client summary Number of Local Clients : 1 MAC Address AP Name WLAN State Protocol f81e.dfe2.e80e AP3502I 4 UP 11n(5) Prime ISE WAN 3850#sh wcdb database all Total Number of Wireless Clients = 1 Clients Waiting to Join = 0 Local Clients = 1 Anchor Clients = 0 Foreign Clients = 0 MTE Clients = INTEGRATED CONTROLLER Mac Address VlanId IP Address Src If Auth Mob f81e.dfe2.e80e x00FF5BC RUN LOCAL BRANCH Guest
53 Converged Access Deployment Mode Small Campus use case INTEGRATED CONTROLLER OPTIONS EXTERNAL MOBILITY CONTROLLER NEEDED DMZ Prime ISE ISE Prime Controller ISE Prime 5508 or WISM2 with SW Upgrade or new 5760 WAN 3850 INEGRATED CONTROLLER New Catalyst 3850 INTEGRATED CONTROLLER New Catalyst 3850 New Catalyst 3850 Agent Catalyst 3750 AP Capwap Tunnels Employee Guest Access Points Access Points BRANCH SMALL CAMPUS LARGE CAMPUS UP TO 50 ACCESSS POINTS UP TO 250 ACCESS POINTS GREATER THAN 250 ACCESS POINTS Capwap Tunnel 2013 Cisco and/or Standard its affiliates. Ethernet, All No rights Tunnels reserved. Guest Tunnel from Switch to DMZ Controller
54 Converged Access Deployment Mode Small Campus SPG configuration 3850-MC#sh wireless mobility summary SPG configuration on 3850 acting as MC Controller Summary: 3850-MC(config)#wireless mobility controller peer-group GroupABC Role : Controller Protocol Port : MC(config)#wireless Group Name mobility controller : peer-group default GroupABC member ip public-ip Oracle IP Address : DTLS Mode Domain ID for r : 0xac34 Keepalive Interval : 10 Keepalive Count : 3 Control Message DSCP Value : acting as MA Domain Member Count : 1 : Enabled ISE Prime interface Vlan21 Link Status is Control Path Status : Data Path Status description MANAGEMENT VLAN ip address Controllers configured in the Domain: 3850-MC(config)#wireless IP Public IP Group Name mobility Multicast controller IP Link ip Status New Catalyst 3850 INTEGRATED CONTROLLER New Catalyst default UP : UP AP Capwap Tunnels Switch Peer Group Name : GroupABC Switch Peer Group Member Count : 1 Bridge Domain ID : 0 Multicast IP Address : IP Public IP Link Status UP: UP Both control and data plane needs to be UP SMALL CAMPUS Access Points
55 Converged Access Deployment Mode Large Campus use case INTEGRATED CONTROLLER OPTIONS EXTERNAL MOBILITY CONTROLLER NEEDED DMZ Prime ISE ISE Prime Controller ISE Prime 5508 or WISM2 with SW Upgrade or new 5760 WAN 3850 INEGRATED CONTROLLER New Catalyst 3850 INTEGRATED CONTROLLER New Catalyst 3850 New Catalyst 3850 Agent Catalyst 3750 AP Capwap Tunnels Employee Guest Access Points Access Points BRANCH SMALL CAMPUS LARGE CAMPUS UP TO 50 ACCESSS POINTS UP TO 250 ACCESS POINTS GREATER THAN 250 ACCESS POINTS Capwap Tunnel 2013 Cisco and/or Standard its affiliates. Ethernet, All No rights Tunnels reserved. Guest Tunnel from Switch to DMZ Controller
56 Converged Access Deployment Mode Large Campus - Configuration Configure 5760 as MC and member of SPG interface Vlan21 description MANAGEMENT VLAN ip address Controller ISE Prime 5508 or WISM2 with SW Upgrade or new (config)#wireless management interface VLAN (config)#wireless mobility controller peer-group GroupABC 5760(config)#wireless mobility controller peer-group GroupABC member ip public-ip Configure 3850 as MA interface Vlan21 description MANAGEMENT VLAN ip address New Catalyst 3850 Agent Catalyst (config)#wireless mobility controller ip Access Points LARGE CAMPUS
57 Converged Access Deployment Mode Configuration Large Campus Group configuration 5760(config)#wireless mobility group name sevt-lab 5760(config)#wireless mobility group member ip public-ip Verify the configuration Controller ISE Prime 5508 or WISM2 with SW Upgrade or new simo#sh wireless mobility summary Controller Summary: Controllers configured Role in the Domain: : Controller Protocol Port : IP Address Group Public IP Name Address Group Name : sevt-lab Multicast IP Status Oracle : Disabled Oracle - Ip Address sevt-lab : UP DTLS Mode sevt-lab : Enabled UP Domain ID for r : 0x2fee Switches configured Keepalive in Group20 Interval switch Peer Group: : 1 10 Keepalive Count : 3 IP Address Public IP Address Status Control Message DSCP Value : Group Members Configured : UP New Catalyst 3850 Agent Catalyst 3750 Access Points LARGE CAMPUS
58 Agenda What is Converged Access? Deploying One Network: Converged Access Wireless Deployment Options The new Converged Access Architecture Converged Access IP Addressing How to deploy a Converged Access network? CleanAir & RRM WebAuth & Guest Anchor (GA) Security Features Bringing Together Wired and Wireless 58
59 RRM-CleanAir Data in Converged Access AP=>MA=>MC WLC 5760 RF Parameters DB (MC- not GL) RRM GL/member DCA/TPC/Group algorithms Catalyst UA 3850 WiSM-2 CleanAir DB CleanAir (IDR -MC) DB CleanAir (AQ -MC) DB (Config -MC) MC RRM Config RRM Manager RF Parameters DB (Group Leader) CHDM MC WLC-5508 RX-Sensitivity Radio Config RF and SI Spectrum Sensing RRM Agent Radio Metrics k/CCX DFS/Radar CHDM MA Radio Config SI RX/TX -Neigh RRM Measure DFS AP
60 RF Grouping and Distribution Controller Member Controller Group Leader Controller Member Unified Switch Unified Switch Unified Switch Unified Switch Unified Switch Unified Switch WLC version 7.3 MR1 supported for RRM with Converged Access NO RF Groups and Profiles at FCS - Static and Auto Grouping supported
61 Basic RRM Configuration Tips Converged Access what to expect It s possible that you ve not had a true default controller in a while, so check things you normally wouldn t after an upgrade for instance 1 Mbps is the mandatory minimum data rate by default. Sh tech-support wireless on MC/RF Group leader Grouping Mode Mind the previous discussion regarding compatibilities and group options static leader is my preference for now but automatic works Data Rates will likely need to be touched and changed Channels default s should be ok for most folks. Check and ensure that they match
62 Where to look for RRM information For AP specific RRM metrics these can only be viewed on the MA (think of this as the local controller ) For RRM RF Group functions Algorithm s such as Grouping, Channel, and Txpower may be viewed on either MA or MC but as with Unified Access only devices having local AP s will show stats: edison#sh ap dot11 2 channel Automatic Channel Assignment Channel Assignment Mode : AUTO Channel Update Interval : 600 seconds Anchor time (Hour of the day) : 0 Channel Update Contribution : SN.. Channel Assignment Leader : katana ( ) DCA Sensitivity Level : MEDIUM (10 db) Channel Energy Levels Minimum : -82 Average : -82 Maximum : -82 Channel Dwell Times Minimum : 4 hours 0 minutes 13 seconds Average : 4 hours 0 minutes 13 seconds Maximum : 4 hours 0 minutes 13 seconds b Auto-RF Channel List b Auto-RF Allowed Channel List : 1,6,11 Auto-RF Unused Channel List : 2,3,4,5,7,8,9,10 MA MC and RF GL katana#sh ap dot11 2 channel Automatic Channel Assignment Channel Assignment Mode : AUTO Channel Update Interval : 600 seconds Anchor time (Hour of the day) : 0 Channel Update Contribution : SN.. Channel Assignment Leader : katana ( ) Last Run : 21 seconds ago DCA Sensitivity Level : MEDIUM (10 db) Channel Energy Levels Minimum : unknown Average : unknown Maximum : unknown Channel Dwell Times Minimum : unknown Average : unknown Maximum : unknown b Auto-RF Channel List b Auto-RF Allowed Channel List : 1,6,11 Auto-RF Unused Channel List : 2,3,4,5,7,8,9,10
63 Where to look for RRM information For AP specific RF configurations these can be viewed on the MA (think of this as the local controller ) For RRM RF Group functions Algorithm s such as Grouping, Channel, and Txpower may be viewed on either MA or MC but as with Unified Access only devices having local AP s will show stats: edison#sh ap dot11 2 group Radio RF Grouping b Group Mode : AUTO b Group Update Interval: 600 seconds b Group Leader : katana ( ) b Group Member : Cisco_69:9a:64( ) katana( ) MC and RF GL MA katana#sh ap dot11 2 group Radio RF Grouping b Group Mode : STATIC b Group Update Interval: 600 seconds b Group Leader : katana ( ) b Group Member : katana( ) Cisco_69:9a64( ) edison( ) (*Not a Manager) b Last Run : 506 seconds ago Agents RF membership information No of b MA RF-members : 1 MA Member name IP address edison Sh tech-support wireless on the MC/RF Groupleader will save a lot of typing
64 CleanAir for Converged Access Works the same as it does in legacy Unified (yes really) Some defaults will need to be touched Requires PI 2.0 for any upper level display features information is available for all functions from the command line SE Connect is supported must be launched manually AQ, IDR, Convergence, security and Trap reporting all work well All CleanAir information only available at the MC level All Cleanair MC not MA AP interface cleanair enable/disable on MA
65 CleanAir Mitigation All CleanAir configs generally fall under the CleanAir tag Except mitigation commands EDRRM and PDA are CleanAir driven but function through DCA katana(config)#ap dot11 2 rrm channel? cleanair-event Configure cleanair event-driven RRM parameters dca Config b dynamic channel assignment algorithm parameters device Configure persistent non-wifi device avoidance in the b channel assignment foreign Configure foreign AP b interference avoidance in the channel assignment load Configure Cisco AP b load avoidance in the channel assignment noise Configure b noise avoidance in the channel assignment cleanair-event = EDRRM device = PDA
66 Agenda What is Converged Access? Deploying One Network: Converged Access Wireless Deployment Options The new Converged Access Architecture Converged Access IP Addressing How to deploy a Converged Access network? CleanAir & RRM WebAuth & Guest Anchor (GA) Security Features Bringing Together Wired and Wireless 66
67 Converged Access Deployment Mode Configuration Large Campus WebAuth Portal Characteristics SPG MC/ MA ISE WebAuth MA Intranet Internet FW WebAuth MA AP AP AP Guest Guest Employee Employee CPI WebAuth Cat3850 AP CAPWAP Tunnels Guest Employee Small ~ Mid-Size Independent or Remote Branch Distributed Guest WebAuth Portal in each MA ** MC must be up in SPG for MA to WebAuth Wireless Guest Traffic get s POP at MA WebAuth Portal on-box, Customisable Login Page, or re-direct, input, Click-2-Accept Acceptable Use Page, Passthru/Consent, Logout Page Authenticating: local database/aaa/ldap/ncs-lobby Ambassador Security: Pre-Auth ACL, AAA override for DACL, Enhanced QOS(MQC) Class assignment, Session-Timeout, Black Listing Visibility: Netflow Seamless L2/L3 Roaming
68 CA Mid-Size & Small Branch WebAuth & Guest Anchor with CT5760 & Cat3850 SPG MC/ MA AP MA Guest Employee CAPWAP Tunnels MA AP AP AP Guest Employee MA Guest Employee Cat3850 Foreign Guest Employee Data Centre Service block CAPWAP Tunnel Intranet CT5760 Guest Anchor WebAuth Portal & GA Characteristics Small ~ Mid-Size Independent Branch With Cat3850 Central Guest WebAuth Portal in CT5760 GA ** No Centralised Wired Guest at FCS ** No Guest Anchor for UA3850, only Foreign. Wireless Guest Traffic get s POP at GA Provides granular centralised profiling ISE Policy Decision Point (PDP) of Guest devices Provides simple aggregation to DMZ for Firewall and Web Filtering of all Guest. WebAuth Portal on-box, Customisable Login Page, or re-direct, input, Click-2-Accept Acceptable Use Page, Passthru/Consent, Logout Page Authenticating: local database/aaa/ldap/ncs-lobby Ambassador Security: Pre-Auth ACL, AAA override for DACL, Enhanced QOS(MQC) Class assignment, Session-Timeout, Black Listing Visibility: Netflow 2013 Cisco and/or its affiliates. All rights reserved. Seamless L2/L3 Cisco Roaming Public WebAuth ISE CPI FW
69 CA Large Campus WebAuth & Guest Anchor with Centralised CT5760 AP AP AP AP Guest Employee CAPWAP Tunnels Guest Employee Distributed Service block Guest Employee 5760 Cat3750 Guest Employee Data Centre Service block CAPWAP Tunnel Intranet 5760 Guest Anchor WebAuth Portal & GA Characteristics Large Local Switch - Independent Branch (No Cat3850) Central Guest WebAuth Portal in CT5760 GA Wireless Guest Traffic get s POP at GA Provides granular centralised profiling (PDP) of Guest devices Provides simple aggregation to DMZ for Firewall and Web Filtering of all Guest. WebAuth Portal on-box, Customisable Login Page, or re-direct, input, Click-2-Accept Acceptable Use Page, Passthru/Consent, Logout Page Authenticating: local database/aaa/ldap/ncs-lobby Ambassador Security: Pre-Auth ACL, AAA override for DACL, Enhanced QOS(MQC) Class assignment, Session-Timeout, Black Listing Visibility: Netflow Seamless L2/L3 Roaming WebAuth ISE CPI FW
70 Converged Access Guest Anchor (GA) & IRCM Restrictions 5508/WiSM-2 as a Guest Anchor WLC for existing AireOS WLC you need to upgrade to 7.3MR1 & run New Mode (re-boot) All the controllers in the network must be reconfigured to operate in New mode, part if which changes EoIP to CAPWAP tunnels (re-boot) Any Foreign 5508/WiSM-2 needs to upgrade to 7.3MR1 and configured to operate in New Mode Foreign AireOS platforms (2500/7500/8500/v-WLC) do not support New mode and are not supported. Foreign 5760/3850 New CAPWAP Tunnels New CAPWAP Tunnels Foreign 5508/WiSM-2 New 5760/5508/WiSM-2 Guest Anchor New Mode X X Classic EoIP Tunnels Foreign 2500/7500/ 8500/v-WLC Classic EoIP Tunnels Pre-7.3MR1 And classic Mode
71 "New Mode IRCM New Inter-Release Controller Compatibility Matrix CT5760 Converged Access Service New AireOS 7.3MR1 IOS 10.0 Layer 2 and Layer 3 Roaming X X Cat3850 Wireless Guest Anchor/Termination 2* 3* Rogue Detection X X Fast Roaming (CCKM) in a mobility group X X WiSM-2 Location Services X X Radio Resource Management 1* 1* (RRM) CT5508 Management Frame Protection (MFP) X X AP Failover NOTES: 1. For RRM Converged Access is compatible with CUWN release 7.3 MR1 but does not support RF Profiles and Groups. 2. New is only supported on AireOS CT5508 & WiSM-2 platforms but does not for any IRCM or GA with CT2500/CT7500/CT8500/v-WLC 3. Guest Anchor Termination is only supported on CT5760/CT5508/WiSM-2. CT5760/CT5508/WiSM-2/Cat3850 all supported as a Foreign. New Mode enables compatibility with Converged Access Classic Mode IS NOT compatible with New Mode No Simultaneous Support
72 Agenda What is Converged Access? Deploying One Network: Converged Access Wireless Deployment Options The new Converged Access Architecture Converged Access IP Addressing How to deploy a Converged Access network? CleanAir & RRM WebAuth & Guest Anchor (GA) Security Features Bringing Together Wired and Wireless 72
73 Need for Integrated One Policy Wired Policy A Corporate Device Wireless Policy B Employee VPN Policy C Personal Device Wired Wireless Policy D Policy E User Contractor Device Wired Wireless Policy F Policy G Contractor Personal Device Wired Wireless Policy H Policy I Guest Personal Device Wired/Wireless How do we make security policy consistent to every wired and wireless device? Policy J
74 Wired and Wireless One Policy Corporate Wired Device 5 Dot1x Authentication 1 Dot1x Authentication ISE ISE Corporate Wireless Device Employee Personal Device Same-SSID CAPWAP 3 2 AuthZ with dvlan 30; dacl Permit ip any any; Dot1x Authentication 802.1Q Trunk 4 Authz with dvlan 40; dacl Restricted Access VLAN 30 VLAN 40 Employee using the same SSID, can be associated to different VLAN interfaces and policy after EAP authentication Employee using corporate wired and wireless device with their AD user id can be assigned to same VLAN 30 to have full access to the network Employee using personal idevice with their AD user id can be assigned to VLAN 40 and policy to access internet only 6 AuthZ with dvlan 30; dacl Permit ip any any Corporate Resources Internet
75 Personal Device Wired and Wireless authorisation policy for personal device
76 Corporate Device Wired and Wireless converged authorisation policy for Corporate device Check based corporate device MAC address in white list EAP Chaining supported for user and device authentication
77 Policy Enforcement on Converged Access Policy enforcement done in IOS for both wired & wireless For wireless clients WCM will decide which policy to be applied Client Roaming: L3 roam ACL policies will be applied on anchor switch L2 Roam ACL polices handoff to newer switch ACL type supported 1. Per-User ACL : - Highly centralised group-to-policy 2. Filter-ID ACL :- Distributed group-to-policy. 3. Downloadable ACL :- Optimised centralised group-to-policy. Group-specific ACL are defined on authentication server. 4. Redirect ACL : URL redirection 5. PACL, RACL, VACL :- ACL for routed ports and MAC, ACL for IPV4 and IPV6 traffic, ACL for VLAN. Policy resides on the switch. Another distributed group-to-policy
78 Controller Agent Oracle Agent Downloadable ACL ISE Peer Group Managed AP Agent 1. Wireless Client request Association 2. MA respond back with Association 3. WCM triggers IOS module to do authentication 4. Auth Manager starts authentication process for client with AAA server 5. AAA server respond with authentication success with dacl name and version number in policy attributes 6. If switch has downloaded this dacl previously and has current version it uses cache version 7. If switch does not have current version then it query server for latest dacl
79 Downloadable ACL Downloadable ACL can be defined for both Wired and Wireless client It provides network policy enforcement based on user/device authorisation profile Configuring dacl policy on the fly and it get pushed
80 BYOD Policy AAA Override URL redirection COA dacl dvlan Cisco AV pair Qos policy push Profiling and posturing Guest Access
81 Device Enrollment and Provisioning Use case 1: Single SSID-Employee Access Controller Agent Oracle Agent Peer Group Managed AP ISE Policy 3. PEAP Authentication 4. Server Authenticate CoA Agent 5. URLredirect 1. Connect Corp SSID 1. Employee associates to BYOD- Secure SSID 2. Employee enters username and password 3. MA does PEAP authentication 4. Server authenticate 5. MA does client URL redirection 6. Device registration page load & MAC get prepopulated 7. Employee registers device 8. Supplicant Provisioned and certificate installed 9. CoA occurs and supplicant authenticate using EAP-TLS 10. dvlan, dacl, QoS policy for Employee pushed to MA 2. Enter username/password
82 Device Enrollment and Provisioning Use case 2: Dual SSID-Employee & Guest Controller Agent Oracle Agent Peer Group Managed AP ISE Agent 2. URL redirect on MA 7. Employee connects corp SSID 1. Connect Open SSID 1. User(Employee or Guest) associates to BYOD-Open SSID 2. User redirected to CWA guest portal 3. Based on credential user redirect to guest or employee registration portal 4. Mac address pre-populated user registers device 5. Supplicant gets provisioned & certificate installed 6. Employee disconnect Open SSID 7. Employee associates corp SSID get corp vlan, dacl, QoS 8. Guest in Guest VLAN, Internet only ACL, Guest Qos
83 BYOD Single And Dual SSID Configuration on Converged Access Secure Corporate Access SSID Guest Access SSID Wired port Configuration
84 BYOD Single And Dual SSID Authentication, Authorisation and Accounting profile Dot1x enable Change of Authorisation Radius server attributes 6,8,25 are attributes for Service-type, framed-ip and class.
85 URL Redirection User connects to provisioning SSID and gets redirected to Guest Portal after launching browser
86 Rogue AP/Client Management Phases There are three main phases of rogue AP/Client management in the Unified Access solution: 1. Detection Listen for non-infrastructure access points, clients and ad-hocs 11n rogue considerations 2. Classification Rogue rules based on RSSI, SSID, Clients, etc. Assessing if rogue is on wired infrastructure 3. Mitigation Switch port shutting Location pin-pointing Over the air containment
87 AP List Management & Distribution 3. MC updates AP List Agent Controller 1. New AP Joins Agent 6. Other MCs delete APs reported by this MC 2. MA notifies MC Agent Controller Agents Agent Controller 1. New AP joins successfully 2. MA notifies MC in its domain 3. MC updates AP list 4. Distributes List to all MCs in same domain 5. When MA gone - its MC deletes all APs & notifies other MCs 6. When MC gone - all other MCs delete APs reported by this MC
88 True Rogue AP Detection Controller Agent Controller Agent 1. Each AP maintains its Neighbour (N) List 2. New AP appears Agent Agent Controller Agent 3. AP detects Rogue AP (Not in N List) 4. Sends Rogue Report to MA 5. MA queries MC to check New AP on Global AP List 7. True Rogue AP 6. MC notifies MC AP Not on Global List 7. New AP True ROGUE AP
89 False Positive Detection Controller Agent Controller Agent 1. For some reason, APz Not on Neighbour List of APx Agent Agent Controller 2. APz detected as Rogue AP 3. APz sends Rogue Report to MA APx MA 4. MA queries MC about APz on Global AP List APz 5. MC notifies MA as Yes 6. APz False Positive 6. So, APz is a False Rogue AP
90 Rogue Classification Rules Detected as Rogue Rogue Rule: SSID: Starbucks; RSSI: -80dBm Rogue Rule: SSID: Corporate; RSSI: -70dBm Marked as Friendly Marked as Malicious No matching Rogue Rule Marked as Unclassified
91 Switch Port Tracing Controller Agent Oracle 6. Updates SPT 3. Query CAM Table Agent Peer Group Prime MSE 1. Prime finds closest AP 4. Query Next CAM Table Agent 5. Match Found; Shut Port 1. Prime finds closest AP detecting Rogue 2. AP retrieves its CDP Neighbours 3. Prime uses SNMP to query nearest MA CAM table: Match Rogue AP MAC by +/-1 & +/-2 AND by OUI 4. If no match found query next hop 5. If match found eliminate managed device & eliminate by location 6. Update SPT status on Prime 2. Show CDP Neighbour Managed AP Rogue AP
92 wips Controller Agent Oracle Agent Pri me MSE Agent 1. Attack Launched against Corporate Infrastructure 2. Detected on AP 3. CAPWAP AP Communicated to MA 4. Passed transparentely to MSE via NMSP 5. Logged into wips Database on MSE, sent to Prime via SNMP traps 6. Display on Prime 7. Feature parity with CUWN architecture Peer Group wips mode AP
93 CIDS 1. MC Configures and registers IPS Appliance IPS 2. MC query Shun List Agent 1. MC configures & registers IPS appliance Shun List aggregated & propogated to other MC Controller 5. Notify MA Shun MA store List to Shun Shun to Client MAs List Agent Agent Peer Group Agent Controller Agent 7. MA shun Client 2. MC query Shun list from IPS Sensor via HTTPS 3. MC aggregate Shun List and Propagate to other MC in same mobility group 4. Pushes Shun list to MA 5. Notify MA to Shun Client on list 6. MA receive and store Shun list 7. MA Shun client on list
94 AP Dot1x Oracle Prime 1. In earlier Architecture, CAPWAP AP connect to WLC via Switch 2. No Port Access Control Controller WLC In Converged Access, CAPWAP tunnel terminates at MA itself 4. AP does the 802.1x Auth Agent Agent Advantages: 1. Protect network against physical tapping 2. No NEAT support needed CAPWAP AP
95 Agenda What is Converged Access? Deploying One Network: Converged Access Wireless Deployment Options The new Converged Access Architecture Converged Access IP Addressing How to deploy a Converged Access network? CleanAir & RRM WebAuth & Guest Anchor (GA) Security Features Bringing Together Wired and Wireless 95
96 Bringing Together Wired and Wireless How Are We Addressing This Shift? Control plane functionality on NG Controller (also possible on upgraded 5508s, WiSM2s for brownfield deployments, or NG Converged Access switches for small, branch deployments) Controller Next-Generation WLAN Controller (5760) Data plane functionality on NG Switches (also possible on NG Controllers, for deployments in which a centralised approach is preferred) Next-Generation Switches (Catalyst 3850s) Enabled by Cisco s strength in Silicon and Systems Doppler ASIC An Evolutionary Advance to Cisco s Wired + Wireless Portfolio, to address device and bandwidth scale, and services demands.
97 Bringing Together Wired and Wireless With a Next-Generation Deployment and Solution Cisco Converged Access Deployment An Evolutionary Advance to Cisco s Wired + Wireless Portfolio, to address device and bandwidth scale, and services demands.
98 Q & A
99 Complete Your Online Session Evaluation Give us your feedback and receive a Cisco Live 2013 Polo Shirt! Complete your Overall Event Survey and 5 Session Evaluations. Directly from your mobile device on the Cisco Live Mobile App By visiting the Cisco Live Mobile Site Visit any Cisco Live Internet Station located throughout the venue Polo Shirts can be collected in the World of Solutions on Friday 8 March 12:00pm-2:00pm Don t forget to activate your Cisco Live 365 account for access to all session material, communities, and on-demand and live activities throughout the year. Log into your Cisco Live portal and click the "Enter Cisco Live 365" button. 99
100
101 Sh tech-support wireless - MA edison#sh tech-support wireless *** show ap capwap timers *** Cisco AP CAPWAP timers AP Discovery timer : 10 AP Heart Beat timeout : 30 *** show ap capwap retransmit *** Global control packet retransmit interval : 3 Global control packet retransmit count : 5 AP Name Retransmit Interval Retransmit Count AP0022.bd18.87c0 3 5 *** show ap dot11 24ghz cleanair air-quality summary *** % This is command is not available on Agent *** show ap dot11 24ghz cleanair air-quality worst ***% This is command is not available on Agent *** show ap dot11 24ghz cleanair config *** % This is command is not available on Agent *** show ap dot11 24ghz cleanair device type all *** % This is command is not available on Agent
102 Unified CleanAir - Getting Started MA ap interface level commands edison#sh ap sum (use sh ap dot11 24Ghz/5GHz to see interfaces) Number of APs: 1 Global AP User Name: cisco Global AP Dot1x User Name: Not configured AP Name AP Model Ethernet MAC Radio MAC Port AP0022.bd18.87c0 3502E 0022.bd18.87c bdcc.d570 Gi1/0/1 ap name AP0022.bd18.87c0 dot11 24ghz/5ghz cleanair (cr) enable interface 2.4/5 GHz ap name AP0022.bd18.87c0 no dot11 5ghz cleanair (cr) to disable MC all cleanair config commands are processed on MC and passed to MA katana#sh ap dot11 2 cleanair config Clean Air Solution... : Disabled Air Quality Settings: Air Quality Reporting... : Disabled Air Quality Reporting Period (min)... : 15 Air Quality Alarms... : Enabled Air Quality Alarm Threshold... : 35 At the MC config prompt (config)# ap dot11 24Ghz cleanair - enable cleanair globally for the device (config)# no ap dot11 24Ghz cleanair disable cleanair globally for the device
103 CleanAir Getting information from the MC katana#sh ap dot11 24Ghz cleanair? air-quality no description config Displays CleanAir Configuration for 2.4GHz band device no description katana#sh ap dot11 24Ghz cleanair device type? all Displays all CleanAir Interferers for 2.4GHz band bt-discovery Displays CleanAir Interferers of type BT Discovery for 2.4GHz band bt-link Displays CleanAir Interferers of type BT Link for 2.4GHz band <snip> katana#sh ap dot11 24Ghz cleanair air-quality summary/worst AQ = Air Quality DFS = Dynamic Frequency Selection AP Name Channel Avg AQ Min AQ Interferers DFS AP0022.bd18.87c No
104 Spectrum Expert Connect Version of SE the opening splash screen adds the remote sensor option You will need the IP address of the AP you just configured You will need the NSI Key You will need to select the radio you wish to view edison#sh ap name AP0022.bd18.87c0 config dot11 24 include IP IP Address Configuration : DHCP IP Address : IP Netmask : Gateway IP Address : edison#sh ap name AP0022.bd18.87c0 config dot11 24 include CleanAir CleanAir Management Information CleanAir Capable : Yes CleanAir Management Admin State : Enabled CleanAir Management Operation State : Up CleanAir NSI Key : 3E3717CCEB38ABFE01C0AE10E0423E42 CleanAir Sensor State : Configured
105 Spectrum Connect to CleanAir All versions/modes of Spectrum Expert connect rely on the NSI protocol for connection Network Spectrum Interface (NSI) is a proprietary protocol using the TCP transport directly between the AP and the Spectrum Expert console. The AP becomes the server, and the client (Spectrum Expert) initiates the connection. A security key is exchanged at session establishment NSI/TCP Connection The AP listens on ports: for 2.4 GHz for 5 GHz Control Plane User Data Plane
106 Wireless WebAuth Local WebAuth Solutions (LWA) Converged Access Cat3850 and CT5760 both support consistent CUWN - LWA models as AireOS 7.0 release features For LWA in Campus with or without using Guest Anchor, within a SPG the MC must be active Central WebAuth (CWA) integration with ISE will be covered in separate session
107 Wireless WebAuth Sample Config CLI! First section is to define our global values and the internal Virtual Address.! This should be common across all WCM nodes. parameter-map type webauth global virtual-ip ipv ! This is for generic WebAuth and will authenticate against internal user database parameter-map type webauth webauth1 type webauth banner text ^C WEBAUTH1^C! This is for generic WebAuth with Concent form Click-2-Accept, no Authentication parameter-map type webauth webconsent type webconsent banner text ^C WEBCONSENT^C! Configure http server in global config. These are needed to enable Web Services in IOS ip http server ip http secure-server ip http active-session-modules none!
108 Wireless WebAuth Sample Config CLI (cont)! This WLAN ua-web1 will advertise an SSID called ua-web1,! Place the user in VLAN 21,! Disable default WPA authentication and Enable web-auth security! Use wcm_local authentication for this security from global AAA Setup! Associate earlier defined parameter-map webauth1! wlan ua-web1 11 ua-web1 client vlan 21 no security wpa security web-auth security web-auth authentication-list wcm_local security web-auth parameter-map webauth1 no shutdown!! Sample AAA Global setup for wcm_local! username abc password E4D aaa new-model aaa local authentication wcm_local authorization wcm_author! aaa user profile local! aaa authentication login wcm_local local aaa authentication dot1x wcm_local local aaa authorization network wcm_local local!
109 Guest Anchor (GA) Converged Access Cat3850 and CT5760 both support consistent CUWN - GA modes as AireOS 7.0 release features Anchor roles are supported on CT5760 and also CT5508/WiSM-2 running New modes only. Foreign Role is supported on Cat3850/CT5760/CT5508/WiSM-2 Authentication Methods: Wired Guest Wireless Guest L2 cloud WLC Guest Anchor CUWN Classic Guest VLAN CAPWAP Tunnel Foreign Controller data tunnel (EOIP) CA New DMZ Anchor Controller #1 Anchor Controller #2 L3 Methods (WebAuth) L3 Authentication happens at Anchor / L2 at Foreign
110 Wireless GA Sample Config CLI! Config on Foreign MC/MA ( )! All Group Configuration must be completed prior to these steps! Place the user in dummy VLAN 1 and establish (GA) Tunnel! to Anchor (GA) controller ( ), Disable Snooping on foreign VLAN! Disable default WPA authentication and Enable web-auth security! Use wcm_local authentication for this security from global AAA Setup.! Associate earlier defined parameter-map webauth1! no ip dhcp snooping vlan 1 wlan ua-web1 11 ua-web4 client vlan 1 mobility anchor no security wpa security web-auth security web-auth authentication-list wcm_local security web-auth parameter-map webauth1 no shutdown!
111 Wireless GA Sample Config CLI! Config on Anchor GA ( )! All Group Configuration must be completed prior to these steps!! Place the user in VLAN 24 and establish (GA) Tunnel to a local GA controller ( )! Disable default WPA authentication and Enable web-auth security! Use wcm_local authentication for this security from global AAA Setup.! Associate earlier defined parameter-map webauth1! wlan ua-web1 11 ua-web4 client vlan 24 mobility anchor no security wpa security web-auth security web-auth authentication-list wcm_local security web-auth parameter-map webauth1 no shutdown!
112 112
Cisco Unified Access Technology Overview: Converged Access
White Paper Cisco Unified Access Technology Overview: Converged Access Introduction Today, less than 1 percent of things in the physical world are network connected. In the near future the growth of the
Cisco Unified Access. Catalyst 3850. Catalina Niculita. Systems Engineer Cisco Romania. 2012 Cisco and/or its affiliates. All rights reserved.
Cisco Unified Access Catalyst 3850 Catalina Niculita Systems Engineer Cisco Romania 2012 Cisco and/or its affiliates. All rights reserved. Cisco Wireless LAN Controller Internal Resources One Network Corporate
Cisco s BYOD / Mobility
Cisco s BYOD / Mobility CONTROL and VISIBILITY for IT DEVICE CHOICE and PREDICTABILITY for Users BALANCE between the number of wired ports and wireless radios 2011 Cisco and/or its affiliates. All rights
CT5760 Controller and Catalyst 3850 Switch Configuration Example
CT5760 Controller and Catalyst 3850 Switch Configuration Example Document ID: 116342 Contributed by Antoine KMEID and Serge Yasmine, Cisco TAC Engineers. Aug 13, 2013 Contents Introduction Prerequisites
Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller
Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller August 2006 Contents Overview section on page 1 Configuring Guest Access on the Cisco Wireless LAN Controller section on page
Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led
Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led Course Description This 3-day instructor-led, hands-on course provides learners with skills and resources required to successfully
Cisco EXAM - 500-451. Enterprise Network Unified Access Essentials. Buy Full Product. http://www.examskey.com/500-451.html
Cisco EXAM - 500-451 Enterprise Network Unified Access Essentials Buy Full Product http://www.examskey.com/500-451.html Examskey Cisco 500-451 exam demo product is here for you to test the quality of the
Passguide 500-451 35q
Passguide 500-451 35q Number: 500-451 Passing Score: 800 Time Limit: 120 min File Version: 18.5 Cisco 500-451 Cisco Unified Access Systems Engineer Exam 100% Valid in US, UK, Australia, India and Emirates.
Best Practices for Configuring Cisco Wireless LAN Controllers
Best Practices for Configuring Cisco Wireless LAN Controllers Aparajita Sood Technical Marketing Engineer, Enterprise Networking #clmel Agenda What is Best Practices? Best Practice Check Points WLAN Express
On-boarding and Provisioning with Cisco Identity Services Engine
On-boarding and Provisioning with Cisco Identity Services Engine Secure Access How-To Guide Series Date: April 2012 Author: Imran Bashir Table of Contents Overview... 3 Scenario Overview... 4 Dual SSID
Cisco TrustSec How-To Guide: Guest Services
Cisco TrustSec How-To Guide: Guest Services For Comments, please email: [email protected] Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...
Top-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,
Web Authentication Proxy on a Wireless LAN Controller Configuration Example
Web Authentication Proxy on a Wireless LAN Controller Configuration Example Document ID: 113151 Contents Introduction Prerequisites Requirements Components Used Conventions Web Authentication Proxy on
MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction.... 3 What Is the Cisco TrustSec System?...
Universal NGWC/3850 Wireless Configuration with Cisco Identity Service Engine. Secure Access How -To Guides Series
Universal NGWC/3850 Wireless Configuration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents 3850 Switch Wireless Configuration...
Aadil Hassim Systems Engineer - Mobility
Aadil Hassim Systems Engineer - Mobility DESIGN AND DEPLOYMENT OF ENTERPRISE WLANS Agenda Controller- Based Architecture Overview Mobility in the Cisco Unified WLAN Architecture Deploying the Cisco Unified
Welch Allyn Acuity Network installation. Best practices
Welch Allyn Acuity Network installation Best practices ii Welch Allyn Network installation 2014 Welch Allyn. All rights are reserved. To support the intended use of the product described in this publication,
VLANs. Application Note
VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static
Using Templates. Information About Templates. Accessing the Controller Template Launch Pad CHAPTER
CHAPTER 11 This chapter describes how to add and apply templates. Templates allow you to set fields that you can then apply to multiple devices without having to reenter the common information. This chapter
D-View 7 Network Management System
Product Highlights Comprehensive Management Manage your network effectively with useful tools and features such as Batch Configuration, SNMP, and Flexible command Line Dispatch Hassle-Free Network Management
TrustSec How-To Guide: On-boarding and Provisioning
TrustSec How-To Guide: On-boarding and Provisioning For Comments, please email: [email protected] Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...
XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
XenMobile Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction... 3 What Is the Cisco TrustSec System?...
Managing the BYOD Evolution
Managing the BYOD Evolution Scott Lee-Guard Systems Engineer Agenda Managing the BYOD Evolution Personal Devices on Network Identification and Security Policy Enforcement Securely On-Board the Device Simplified
Enterprise WLAN Architecture
Enterprise WLAN Architecture Steve Acker Wireless Network Consulting Engineer CCIE #14097 CISSP #86844 2009 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Wireless LAN Mobility Services Security
Tuning Cisco WLC for High Density Deployments - William Jones
@WJComms Tuning Cisco WLC for High Density Deployments - William Jones Assumptions made in this document: Cisco WLCs (2504/5508/8510/WiSM2). APs in Local Mode. 7.6 MR3 Code or higher. No requirement to
Designing Unified Guest Access, Wired and Wireless BRKEWN-2016
1 Designing Unified Guest Access, Wired and Wireless BRKEWN-2016 Agenda Overview : Guest Access as a Supplementary User Authentication Wireless Guest Access Control & Path Isolation Wired Guest Access
Wireless Local Area Networks (WLANs)
4 Wireless Local Area Networks (WLANs) Contents Overview...................................................... 4-3 Configuration Options: Normal Versus Advanced Mode.............. 4-4 Normal Mode Configuration..................................
Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost.
Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost. Peplink. All Rights Reserved. Unauthorized Reproduction Prohibited Presentation Agenda Peplink Balance Pepwave MAX Features
Cisco Wireless Portfolio
Cisco Wireless Portfolio Access Points Cisco Aironet 3600 Series Access Points with CleanAir Technology Cisco Aironet 3600 Series Access Points with Cisco CleanAir technology are the first 802.11n access
Cisco Actualtests 642-584 Exam Questions & Answers
Cisco Actualtests 642-584 Exam Questions & Answers Number: 642-584 Passing Score: 800 Time Limit: 120 min File Version: 33.4 http://www.gratisexam.com/ Cisco 642-584 Exam Questions & Answers Exam Name:
The Ultimate WLAN Management and Security Solution for Large and Distributed Deployments
The Ultimate WLAN Management and Security Solution for Large and Distributed Deployments Centralized WLAN management and auto provisioning Manages up to 0 APs with granular access control Advanced RF management
How To Set Up A Cisco Wireless Network Controller (Wired) With A Wireless Network (Wired And Wireless) With An Ipad Or Ipad (Wired Or Wireless) For A Pb/G/G (Wired/Wired) Or Ip
VIEW Certified Configuration Guide Cisco Systems Inc. 2100/2500/4400/5500/7500/8500 Series WLC (Wireless LAN Controller), WiSM (Wireless Services Module), WiSM2, WLC Module, WLC SW for SRE, 3750G Integrated
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
WLAN Security: Identifying Client and AP Security
WLAN Security: Identifying Client and AP Security 2010 Cisco Systems, Inc. All rights reserved. CUWN v7.0 4-1 Lesson Overview & Objectives Overview This lesson provides detailed discussions on the Cisco
Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected]. 2006 Cisco Systems, Inc. All rights reserved.
Cisco Secure ACS Overview By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected] 2006 Cisco Systems, Inc. All rights reserved. 1 Cisco Secure Access Control System Policy Control and
Wireless Best Practices For Schools
A COSN BEST PRACTICES WHITE PAPER Wireless Best Practices For Schools Guidelines for School System Leaders Brought to you by April 2015 Table of Contents Executive Overview... 3 Coverage and RF Considerations...
Cisco Virtual Office Express
. Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside
Design and Implementation Guide. Apple iphone Compatibility
Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new
Course Contents CCNP (CISco certified network professional)
Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,
Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches
print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your
Cisco Wireless Control System (WCS)
Data Sheet Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform for wireless LAN planning, configuration,
NETE-4635 Computer Network Analysis and Design. Designing a Network Topology. NETE4635 - Computer Network Analysis and Design Slide 1
NETE-4635 Computer Network Analysis and Design Designing a Network Topology NETE4635 - Computer Network Analysis and Design Slide 1 Network Topology Design Themes Hierarchy Redundancy Modularity Well-defined
OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R
OSBRiDGE 5XLi Configuration Manual Firmware 3.10R 1. Initial setup and configuration. OSBRiDGE 5XLi devices are configurable via WWW interface. Each device uses following default settings: IP Address:
WiNG 5.X How-To Guide
WiNG 5.X How-To Guide Captive Portals Part No. TME-12-2012-01 Rev. A MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark Holdings, LLC
Best practices to Deploy High-availability in Wireless LAN Architectures
Best practices to Deploy High-availability in Wireless LAN Architectures Kara Muessig Mobility Consulting Systems Engineer CCIE Wireless #29572 2 Agenda RF HA te Survey RRM CleanAir HA network design Physical
Switch Configuration Required to Support Cisco ISE Functions
APPENDIXC Switch Configuration Required to Support Cisco ISE Functions To ensure Cisco ISE is able to interoperate with network switches and functions from Cisco ISE are successful across the network segment,
Cisco RV 120W Wireless-N VPN Firewall
Cisco RV 120W Wireless-N VPN Firewall Take Basic Connectivity to a New Level The Cisco RV 120W Wireless-N VPN Firewall combines highly secure connectivity to the Internet as well as from other locations
Mobility System Software Quick Start Guide
Mobility System Software Quick Start Guide Version 8.0 P/N 530-041387 Rev.05 Table of Contents About this Guide Using the Web Quick Start (WLC2, WLC8, WLC200,WLC800R, and WLC880R) Remotely Configuring
Application Note Gigabit Ethernet Port Modes
Application Note Gigabit Ethernet Port Modes Application Note Gigabit Ethernet Port Modes Table of Contents Description... 3 Benefits... 4 Theory of Operation... 4 Interaction with Other Features... 7
Intelligent WLAN Controller with Advanced Functions
Intelligent WLAN Controller with Advanced Functions Centralized WLAN management and auto provisioning Manages up to 512 APs with granular access control ZyMESH simplifies complex, inconvenient cabling
WiNG5 CAPTIVE PORTAL DESIGN GUIDE
WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated
Chapter 3. Enterprise Campus Network Design
Chapter 3 Enterprise Campus Network Design 1 Overview The network foundation hosting these technologies for an emerging enterprise should be efficient, highly available, scalable, and manageable. This
Configuring Security Solutions
CHAPTER 3 This chapter describes security solutions for wireless LANs. It contains these sections: Cisco Wireless LAN Solution Security, page 3-2 Using WCS to Convert a Cisco Wireless LAN Solution from
D-Link Central WiFiManager Configuration Guide
Table of Contents D-Link Central WiFiManager Configuration Guide Introduction... 3 System Requirements... 3 Access Point Requirement... 3 Latest CWM Modules... 3 Scenario 1 - Basic Setup... 4 1.1. Install
The All-in-One, Intelligent WLAN Controller
The All-in-One, Intelligent WLAN Controller Centralized management for up to 64* APs ZyMESH mitigates complex, inconvenient cabling Wi-Fi deployments Client steering enhances efficiency of wireless spectrum
Cisco WAP4410N Wireless-N Access Point: PoE/Advanced Security Cisco Small Business Access Points
Cisco WAP4410N Wireless-N Access Point: PoE/Advanced Security Cisco Small Business Access Points Advanced, High-Performance Wireless Access for the Small Business Highlights Supports high-bandwidth applications
Cisco WAP4410N Wireless-N Access Point: PoE/Advanced Security. Cisco Small Business Access Points
Cisco WAP4410N Wireless-N Access Point: PoE/Advanced Security Cisco Small Business Access Points Advanced, High-Performance Wireless Access for the Small Business Highlights Supports high-bandwidth applications
COURSE AGENDA. Lessons - CCNA. CCNA & CCNP - Online Course Agenda. Lesson 1: Internetworking. Lesson 2: Fundamentals of Networking
COURSE AGENDA CCNA & CCNP - Online Course Agenda Lessons - CCNA Lesson 1: Internetworking Internetworking models OSI Model Discuss the OSI Reference Model and its layers Purpose and function of different
Cloud Managed Security with Meraki MX
Cloud Managed Security with Meraki MX Joe Aronow Product Specialist, Meraki MX #clmel Agenda Introduction: Cloud networking Demo IWAN Product Families Q&A Cisco Meraki: who we are and what we do? Complete
Meraki Wireless Solution Comparison
Meraki Wireless Solution Comparison Why Meraki? Simplified cloud management Intuitive interface allows devices to be configured in minutes without training or dedicated staff Centrally manage thousands
Enterprise Best Practices for Apple Mobile Devices on Cisco Wireless LANs
Enterprise Best Practices for Apple Mobile Devices on Cisco Wireless LANs Contents Purpose of this Document, page 2 Introduction, page 2 Wi-Fi Channel Coverage, page 2 Roaming, page 7 Fast Roaming, page
Deploy and Manage a Highly Scalable, Worry-Free WLAN
Deploy and Manage a Highly Scalable, Worry-Free WLAN Centralized WLAN management and auto provisioning Manages up to 512 APs with granular access control simplifies complex, inconvenient cabling Wi-Fi
Application Note User Groups
Application Note User Groups Application Note User Groups Table of Contents Background... 3 Description... 3 Benefits... 4 Theory of Operation... 4 Interaction with Other Features... 6 Configuration...
Barracuda Link Balancer
Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia
NAC Guest. Lab Exercises
NAC Guest Lab Exercises November 25 th, 2008 2 Table of Contents Introduction... 3 Logical Topology... 4 Exercise 1 Verify Initial Connectivity... 6 Exercise 2 Provision Contractor VPN Access... 7 Exercise
Enterprise Best Practices for Apple Mobile Devices on Cisco Wireless LANs
Enterprise Best Practices for Apple Mobile Devices on Cisco Wireless LANs Contents Purpose of this Document, page 2 Introduction, page 2 Wi-Fi Channel Coverage, page 2 Roaming, page 7 Fast Roaming, page
This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.
This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. Copyright 2009 Meraki, Inc. All rights reserved. Trademarks Meraki
Empowering Students with Mobility and BYOD Technology
Empowering Students with Mobility and BYOD Technology Simon Furber Network and Data Centre Manager, Brunel University @SiFurber Ian Foddering Chief Technology Officer, Cisco UK & I @ifodderi #innovatewithmobility
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
APPENDIX 3 LOT 3: WIRELESS NETWORK
APPENDIX 3 LOT 3: WIRELESS NETWORK A. TECHNICAL SPECIFICATIONS MAIN PURPOSE The Wi-Fi system should be capable of providing Internet access directly to a user using a smart phone, tablet PC, ipad or Laptop
Cisco. A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE. City Milan New Delhi Singapore Sydney Toronto. Mc Graw Hill Education
Cisco A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto Contents
Ruckus Wireless ZoneDirector Command Line Interface
Ruckus Wireless ZoneDirector Command Line Interface Reference Guide Part Number 800-70258-001 Published September 2010 www.ruckuswireless.com Contents About This Guide Document Conventions................................................
Cisco RV110W Wireless-N VPN Firewall
Data Sheet Cisco RV110W Wireless-N VPN Firewall Simple, Secure Connectivity for the Small Office/Home Office Figure 1. Cisco RV110W Wireless-N VPN Firewall The Cisco RV110W Wireless-N VPN Firewall provides
DV230 Web Based Configuration Troubleshooting Guide
DV230 Web Based Configuration Troubleshooting Guide 1. Login settings After getting a DHCP IP address from your P1 W1MAX Modem DV-230), open any Internet browser and type in the URL address: http://10.1.1.254
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
Nokia Siemens Networks. CPEi-lte 7212. User Manual
Nokia Siemens Networks CPEi-lte 7212 User Manual Contents Chapter 1: CPEi-lte 7212 User Guide Overview... 1-1 Powerful Features in a Single Unit... 1-2 Front of the CPEi-lte 7212... 1-2 Back of the CPEi-lte
Wireless Controller DWC-1000
Network Architecture Manage up to 6 wireless APs, upgradable to 24 APs 1 per controller Control up to 24 wireless APs, maximum 96 APs 1 per cluster Robust Network Security Wireless Instruction Detection
CISCO WIRELESS CONTROL SYSTEM (WCS)
CISCO WIRELESS CONTROL SYSTEM (WCS) Figure 1. Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform
Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
Good MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Imran Bashir Date: December 2012 Table of Contents Mobile Device Management (MDM)... 3 Overview... 3
Network Configuration Example
Network Configuration Example Configuring Link Aggregation Between EX Series Switches and Ruckus Wireless Access Points Modified: 2015-10-01 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California
Central WLAN management. Centralized WLAN Management. LANCOM WLAN Controller LANCOM WLC Option for Router
Central WLAN management... c o n n e c t i n g y o u r b u s i n e s s Centralized WLAN Management 1 1 LANCOM WLAN Controller LANCOM WLC Option for Router Contents...4 1.1 Starting position...4 1.2 Technical
Vocera Infrastructure Planning Summary. B3000n Compatible
Vocera Infrastructure Planning Summary B3000n Compatible Notice Copyright 2002- Vocera Communications, Inc. All rights reserved. Vocera is a registered trademark of Vocera Communications, Inc. This software
UIP1868P User Interface Guide
UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting
BYOD: BRING YOUR OWN DEVICE.
white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased
Controller Management
Controller Management - Setup & Provisioning - 1 PRONTO SERVICE CONTROLLER (PN-CPP-A-1422) 2 PSC Key Features Fully interoperable with IEEE802.11b/g compliant products External AP support and management
How To Set Up A Cisco Rv110W Wireless N Vpn Network Device With A Wireless Network (Wired) And A Wireless Nvv (Wireless) Network (Wireline) For A Small Business (Small Business) Or Remote Worker
Cisco RV110W Wireless-N VPN Firewall Simple, Secure Connectivity for the Small Office/Home Office Figure 1 Cisco RV110W Wireless-N VPN Firewall The Cisco RV110W Wireless-N VPN Firewall provides simple,
Cisco RV110W Wireless-N VPN Firewall
Data Sheet Cisco RV110W Wireless-N VPN Firewall Simple, Secure Connectivity for the Small Office/Home Office Figure 1. Cisco RV110W Wireless-N VPN Firewall The Cisco RV110W Wireless-N VPN Firewall provides
Wireless LAN Controller (WLC) Design and Features FAQ
Wireless LAN Controller (WLC) Design and Features FAQ Document ID: 98673 Contents Introduction Design FAQ Features FAQ Related Information Introduction This document provides information on the most frequently
Cisco RV215W Wireless-N VPN Router
Data Sheet Cisco RV215W Wireless-N VPN Router Simple, Secure Connectivity for the Small Office and Home Office Figure 1. Cisco RV215W Wireless-N VPN Router The Cisco RV215W Wireless-N VPN Router provides
Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks
Cisco IT Article December 2013 End-to-End Security Policy Control Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks Identity Services Engine is an integral
Best Practices for Outdoor Wireless Security
Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged
Central Web Authentication on Converged Access and Unified Access WLCs Configuration Example
Central Web Authentication on Converged Access and Unified Access WLCs Configuration Example Document ID: 117717 Contributed by Surendra BG, Cisco TAC Engineer. May 27, 2014 Contents Introduction Prerequisites
SOSPG2. Implementing Network Access Controls. Nate Isaacson Security Solution Architect [email protected]
SOSPG2 Implementing Network Access Controls Nate Isaacson Security Solution Architect [email protected] Offer Pa Agenda The BYOD Challenges NAC terms The Big Picture NAC Solutions and Deployment What
FWSM introduction Intro 5/1
Intro 5/0 Content: FWSM introduction Requirements for FWSM 3.2 How the Firewall Services Module Works with the Switch Using the MSFC Firewall Mode Overview Stateful Inspection Overview Security Context
Configuring IPS High Bandwidth Using EtherChannel Load Balancing
Configuring IPS High Bandwidth Using EtherChannel Load Balancing This guide helps you to understand and deploy the high bandwidth features available with IPS v5.1 when used in conjunction with the EtherChannel
New Features in Cisco IOS Software Release 12.2(33)SXI2
. Product Bulletin New Features in Cisco IOS Software Release 12.2(33)SXI2 PB552599 This product bulletin introduces Cisco IOS Software Release 12.2(33)SXI2, highlighting the new features it offers. Introduction
When SDN meets Mobility
When SDN meets Mobility The result is an automated, simpler network that supports the way you work With wireless increasingly becoming the primary means of access for end users, it is essential that any
