Wireless Edge Services xl Module 2.0 Update NPI Technical Training June 2007

Similar documents
Configuring Network Address Translation (NAT)

Wireless Local Area Networks (WLANs)

VLANs. Application Note

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

Configuration Guide for RFMS 3.0 Initial Configuration. WiNG5 How-To Guide. Network Address Translation. July 2011 Revision 1.0

Enabling NAT and Routing in DGW v2.0 June 6, 2012

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

Proxy Server, Network Address Translator, Firewall. Proxy Server

RAP Installation - Updated

Lab Configuring Access Policies and DMZ Settings

Planning for Information Network

Penn State Wireless 2.0 and Related Services for Network Administrators

Lucent VPN Firewall Security in x Wireless Networks

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version Rev.

Set Up a VM-Series Firewall on the Citrix SDX Server

OSBRiDGE 5XLi. Configuration Manual. Firmware 3.10R

Topic 7 DHCP and NAT. Networking BAsics.

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

GregSowell.com. Mikrotik Basics

Firewall Defaults and Some Basic Rules

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Configuring Network Address Translation

Securing Networks with PIX and ASA

108Mbps Super-G TM Wireless LAN Router with XR USER MANUAL

Chapter 3 Security and Firewall Protection

VLSM & IP ADDRESSING EXAMPLE QUESTIONS with answers;

Microsegmentation Using NSX Distributed Firewall: Getting Started

NETE-4635 Computer Network Analysis and Design. Designing a Network Topology. NETE Computer Network Analysis and Design Slide 1

Reference to common tasks

WAN Failover Scenarios Using Digi Wireless WAN Routers

How to configure your Thomson SpeedTouch 780WL for ADSL2+

FSM73xx GSM73xx GMS72xxR Shared access to the Internet across Multiple routing VLANs using a Prosafe Firewall

Skills Assessment Student Training Exam

Case Study - Configuration between NXC2500 and LDAP Server

To configure firewall policies, you must install the Policy Enforcement Firewall license.

Configuring a customer owned router to function as a switch with Ultra TV

Chapter 6 Virtual Private Networking Using SSL Connections

What is VLAN Routing?

HOWTO: How to configure IPSEC gateway (office) to gateway

LevelOne WBR-3405TX. User`s Manual. 11g Wireless AP Router

Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4

QuickSpecs. Models. Features and Benefits Mobility. ProCurve Wireless Edge Services zl Module. ProCurve Wireless Edge Services zl Module Overview

Lab Developing ACLs to Implement Firewall Rule Sets

UIP1868P User Interface Guide

1:1 NAT in ZeroShell. Requirements. Overview. Network Setup

D-Link Central WiFiManager Configuration Guide

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Virtual Data Centre. User Guide

Network Address Translation (NAT)

Network Security Topologies. Chapter 11

Network Virtualization Network Admission Control Deployment Guide

How to Configure Web Authentication on a ProCurve Switch

Configuring the BIG-IP and Check Point VPN-1 /FireWall-1

Barracuda Link Balancer Administrator s Guide

Technical Support Information

SonicWALL PCI 1.1 Implementation Guide

Configuring Security for FTP Traffic

Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

< Introduction > This technical note explains how to connect New SVR Series to DSL Modem or DSL Router. Samsung Techwin Co., Ltd.

iboss Enterprise Deployment Guide iboss Web Filters

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Multi-Homing Dual WAN Firewall Router

nexvortex Setup Template

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

Using Remote Desktop Software with the LAN-Cell 3

Broadband Phone Gateway BPG510 Technical Users Guide

Configuring PA Firewalls for a Layer 3 Deployment

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Lab Configuring Access Policies and DMZ Settings

Computer Networking. Definitions. Introduction

Configuring Routers and Their Settings

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

Multi-Homing Security Gateway

Pre-lab and In-class Laboratory Exercise 10 (L10)

V310 Support Note Version 1.0 November, 2011

UTM10 in multi-ssid, multi-vlan network with WMS5316. Network diagram

- Introduction to Firewalls -

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Using the NetVanta 7100 Series

Network Address Translation (NAT)

Cisco Networking Professional-6Months Project Based Training

Firewalls. Chapter 3

Interconnecting Cisco Network Devices 1 Course, Class Outline

Chapter 7. Address Translation

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

HP Load Balancing Module

Design and Implementation Guide. Apple iphone Compatibility

Cisco - Configure the 1721 Router for VLANs Using a Switch Module (WIC-4ESW)

GregSowell.com. Mikrotik Security

Implementing PCoIP Proxy as a Security Server/Access Point Alternative

Using Remote Desktop Software with the LAN-Cell

This chapter describes how to set up and manage VPN service in Mac OS X Server.

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

Network/VPN Overlap How-To with SonicOS 2.0 Enhanced Updated 9/26/03 SonicWALL,Inc.

Port Forwarding your Router for Use with a Network DVR

Chapter 12 Supporting Network Address Translation (NAT)

Implementing Network Address Translation and Port Redirection in epipe

Transcription:

ProCurve Wireless Edge Services xl Module v.2 Software NPI Technical Training NPI Technical Training Version: 1.5 12 June 2007 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Sample excerpt Rev. 1.5 1

Discussion Topics Layer 3 RP adoption Internal RADIUS server Firewall and ACLs Internal DHCP server NAT Types of NAT supported Guidelines for configuring NAT Configuring NAT Expanded redundancy groups Improved roaming between modules sflow support GRE Secure NTP Web-Users Other enhancements Rev. 1.5 2 The Wireless Edge Services xl Module s internal firewall also supports NAT, often in conjunction with the module s role as a router and DHCP server. Rev. 1.5 2

Types of NAT Dynamic, or many-to-one, NAT translates source address using port address translation (PAT) Static, or one-to-one, NAT translates either source address or destination address WLAN 1 = VLAN 8 192.168.1.50 192.168.1.40 192.168.1.50 10.1.1.15 192.168.1.40 10.1.1.20 Dynamic Source NAT VLAN 1: 10.1.1.10 Wired Network = VLAN 1 10.1.1.10:1211 10.1.1.15 10.1.1.10:1212 10.1.1.20 WLAN 1 = VLAN 8 192.168.1.50 192.168.1.40 192.168.1.50 192.168.1.1 192.168.1.40 192.168.1.1 Static Destination NAT VLAN 8: 192.168.1.1 192.168.1.50 10.1.1.15 192.168.1.40 10.1.1.15 Server 10.1.1.15 Rev. 1.5 3 The two types of NAT you will configure on your Wireless Edge Services xl Module are dynamic NAT and static NAT. They have a couple of major differences, the first being that, you can only configure dynamic NAT on source IP addresses, whereas, you can configure static NAT on either source or destination IP addresses. The other big difference is that if you are configuring dynamic NAT, you choose IP addresses by using ACLs, and the Wireless Module NATs the many source addresses specified in that ACL to the same IP address on one of its interfaces (also called overloading the interface). Port address translation (PAT) is what enables the module to translate multiple IP addresses to the same IP address. The module assigns different source port numbers each NATed address so that it can keep track of the device to which return traffic belongs, even though all return traffic is destined to the same IP address. Instead of using ACLs for static NAT, however, you configure IP addresses and port settings manually. I will explain these configurations in more detail a little later on. One more thing to remember: the Wireless Module automatically handles all traffic in a NAT session. So, for example, when the server in the wired network shown in the top section of the slide sends return traffic, it sends it to 10.1.1.10 the apparent source of the traffic. But the Wireless Module forwards the return traffic to the correct wireless station using PAT. Similarly, when the server shown in the bottom half of the slide sends return traffic back to the wireless stations, the Wireless Module automatically conceals the server s address, translating it to the original destination address. Rev. 1.5 3

Guidelines for Configuring NAT Wireless Module implements NAT on the border between: Inside (private) network Outside (public) network You define inside and outside interfaces for your NAT implementation. Wireless network = Inside Downlink Wireless Edge Services xl Module WLAN VLANs VLANs VLAN 8 VLAN 1 Uplink VLAN 1 RPs VLAN 12 Inside Outside Wired Network = Outside Inside NAT is applied to traffic incoming on inside interfaces The inside traffic is routed to the outside network Rev. 1.5 4 Before you plan your NAT configuration, you must understand how the Wireless Edge Services xl Module divides interfaces into inside and outside interfaces. In theory, an inside interface in one that connects to a private network, and an outside interface is one that connects to a public network. However, you might define public and private in various ways. The most important distinction between the inside and outside networks is that for whatever reason IP addresses used in one cannot be supported in the other. For example, the Wireless Module might place wireless stations in subnetworks isolated within the wireless world. You decide to define these isolated subnetworks as the inside network and the wired network as the outside network. Devices in the wired network do not know about the subnetworks and IP addresses used in the wireless network. So the Wireless Module applies dynamic source NAT to inside traffic and, in the wired network, masquerades as the source of all traffic from the wireless network. As you can see in the picture, the Wireless Module applies inside NAT on traffic that arrives on inside interfaces. If you configured outside NAT, the module would apply it on traffic incoming on an outside interface, here VLAN 1. Note that the Wireless Module must route traffic in order to perform NAT. Rev. 1.5 4

Specifying Addresses for Your NAT Implementation Local IP address an IP address as it appears before translation Global IP address an IP address as it appears after translation Source NAT Local address 10.1.8.50 RP WLAN VLAN 1 VLAN 8 10.1.1.10 10.1.8.10 VLAN 1 Global address Destination NAT 10.1.8.50 WLAN RP VLAN 1 VLAN 8 10.1.1.10 10.1.8.10 Local address VLAN 1 10.1.1.15 Global address Rev. 1.5 5 As you set up NAT, you will specify local and global addresses, so you must understand how the Wireless Module defines these addresses. A local IP address is an IP address (either source or destination depending on the type of NAT) as it appears before it is translated with NAT. A global IP address, conversely, is the IP address as it appears after it is translated with NAT. For source NAT, the concept is straight-forward enough. For example, a station in a wireless network could have a local IP address of 10.1.8.50. After this address is translated by the module, the station would have a global IP address of 10.1.1.10, which is the Wireless Module s address in VLAN 1 (the VLAN used in the wired network). Each local address would, of course, be different for each wireless station, but typically (that is, with dynamic NAT) every local addresses would be translated to the same global address of 10.1.1.10. Destination NAT reverses the local and global addresses. For example, you might set up destination NAT to force wireless stations to contact a private server at a public address (say, the address of the Wireless Module on the wireless network) rather than at the server s private address. Originally, the wireless station destines the traffic to the Wireless Module (the address that the server appears to use), so that is the local address. The global address is the server s actual IP address because this is the address after destination NAT has occurred. Rev. 1.5 5

Plan Your NAT Configuration Consider your network topology and security needs Determine your requirements for NAT Conserve IP addresses and separate VLANs for wireless and wired traffic Conceal IP addresses of servers on the private, wired network Record the IP addresses needed for your NAT configuration Rev. 1.5 6 Now you have all the concepts and tools you need to plan your NAT configuration. First, consider your network topology and security needs and determine your requirements for NAT. In other words, which types of NAT must you configure, and to which traffic should you apply NAT? There are a couple of reasons why you might want to use NAT. In the first scenario, you want to separate wireless and wired subnetworks to conserve address space on your LAN and perhaps to increase security. However, you want to integrate wireless traffic onto the wired network with a minimum of hassle. You don t want to configure routes back to the wireless subnetworks and so forth. Have the module place wireless stations in a certain VLAN reserved for them. Remember to configure DHCP to assign addresses to wireless stations in that VLAN. Define the VLAN as an inside VLAN, and configure dynamic NAT on inside traffic. Now, all wireless stations seem to have the address on one of the Wireless Module s outside interfaces. In the second scenario, you configure NAT because you need to conceal IP addresses used in your LAN from wireless users. You would still want to separate wired and wireless VLANs. However, instead of configuring inside source NAT, you would configure inside destination NAT. Wireless stations direct traffic to the private servers to a public address, and the Wireless Module translates the destination to the correct server address. You set up static definitions for destination NAT. Each definition allows you to map a destination port, as well as IP address, to a particular new address, so several wired servers can share the same public address advertised to wireless users. Once you have decided what your requirements are, record the IP addresses necessary for your NAT configuration. Rev. 1.5 6

Configure an ACL to Select Traffic for Dynamic NAT Determine which IP addresses the standard IP ACL should select: Typically, permit all addresses in subnets corresponding to the NATed interfaces. Often, these addresses are issued through DHCP. In this example, you would configure an ACL with two rules: permit 10.1.8.0/24 permit 10.1.12.0/24 Wireless network = Inside Downlink Wireless Edge Services xl Module WLANs VLANs RPs VLAN 8 VLAN 1 VLAN 12 Inside Outside Uplink DHCP Pools Pool 1 (VLAN 8) 10.1.8.0/24... Pool 2 (VLAN 12) 10.1.12.0/24... Rev. 1.5 7 Remember that with dynamic NAT, you select the local source addresses on which to apply NAT by configuring a standard IP ACL. The simplest way to configure the ACL is to first determine to which interfaces NAT applies. Each VLAN is, of course, associated with a subnetwork, and stations in the VLAN use IP addresses in that subnetwork often assigned through DHCP. Typically, you should permit NAT on all addresses in these subnets. In this example, you are configuring dynamic source NAT on inside traffic and the inside interfaces will be VLANs 8 and 12. The DHCP pools in the slide show the subnetworks associated with the VLANs, and the slide also lists the two rules for permitting addresses in those subnets. We ve laid the groundwork for planning the NAT configuration. Now I ll take you step through the Web browser screens. Rev. 1.5 7

Define Outside or Inside Interfaces 1 3 4 5 2 Rev. 1.5 8 You will now learn how to assign interfaces as either inside or outside interfaces, as I talked about earlier. NAT configurations have no effect until you do this. To define an interface to either inside or outside, you need to go to the Add Interface screen. Get there by selecting Security > NAT and clicking the Interfaces tab. To add an interface, click the Add button. The Add Interface screen displays. In the Interface field, use the drop-down menu to select an interface configured on the module (such as VLAN1, shown in the slide). In the Type field, use the drop-down menu to select either Inside (Private) or Outside (Public). Then click the OK button. Rev. 1.5 8

Configure Dynamic Translation 1 3 4 2 Rev. 1.5 9 You can now configure dynamic NAT. For each NAT configuration that will use dynamic NAT, you need to first set up an ACL, as I mentioned earlier, to select the source addresses for NAT. Now select Security > NAT and click the Dynamic Translation tab. Then click the Add button. On the Add Dynamic Translation screen, from the NAT Interface drop-down menu, select the interfaces to which dynamic NAT applies: Inside (Private) or Outside (Public). You just defined these interfaces, so you should remember which type you want. Then, in the NAT Address Type field, leave the setting at Source, since it is the only option permitted for dynamic translation. From the Access List drop-down menu, select the ACL you already configured. Remember: for inside NAT choose an ACL that selects IP addresses in inside VLANs and vice versa for outside NAT. Next, from the Interface drop-down menu, select one of the module s VLAN or tunnel interfaces. The Wireless Module translates the source address to the IP address on the specified interface. Ethernet interfaces are named vlan1, vlan2, and so on; GRE tunnel interfaces are named tunnel1, tunnel2, and so on. You should select an interface of a different type than the NAT interface for this configuration. For example, if you have selected Inside (Private) for the NAT Interface, choose, for the Interface, an interface on the outside network. If you are configuring dynamic NAT on wireless traffic, choose an interface that is tagged on the uplink port. Then click the OK button. The definition for dynamic translation is now listed on the Security > NAT > Dynamic Translation screen. Rev. 1.5 9

Configure Static NAT 1 3 4 5 2 Rev. 1.5 10 This slide shows you how to configure static translation should you decide that this is the type of NAT best for you environment. Select Security > NAT and click the Static Translation tab. Then click the Add button, which will take you to the Add Static Translation screen. The NAT section of this screen, gives you similar choices to those for the first two drop-down menus of the dynamic NAT screen. For the Interface Type, select either Inside (Private) or Outside (Public), remembering the definitions you made earlier. So if you choose Inside (Public), the Wireless Module applies this static NAT definition to traffic that arrives on an inside interface as defined by you. Unlike for dynamic NAT, you can choose the Address Type: Source (translate the source IP address in the IP header) or Destination (translate the destination IP address in the IP header). Next, in the Local Address field, enter the IP address to be translated. This address depends on the your choice for the Address Type. Remember that a few slides ago, you saw where to find the local and global addresses for both source and destination NAT. Then, choose either TCP or UDP in the Protocol drop-down menu and, in the Local Port field, enter the port on which traffic to be translated arrives (from 1 through 65,535). These are important settings for destination NAT because it allows you to set up port forwarding. For example, you can configure one definition that applies to only HTTP traffic and another that applies only to FTP traffic, and both types of traffic reach the appropriate server. Finally, in the Global Address field, enter the address as it should appear after translation. In the Global Port field, enter the port to which the Wireless Module should forward the traffic. This field is optional and provides port translation. (If you don t enter anything, the module sends the traffic to the port on which it arrived.) For example, your company s Web server uses a private port. Traffic for the server is destined to the Wireless Module and the standard HTML port (80). The Wireless Module translates the traffic to the Web server s private address and a private port, selected by your company. The private port is what you enter in the Global Port field. Click the OK button. The static NAT definition is now listed on the Security > NAT > Static Translation screen. Rev. 1.5 10

View NAT Status 1 Rev. 1.5 11 Now that you have configured NAT, you can check its status. To view NAT status, select Security > NAT and click the Status tab. The screen displays a row for each active session to which the Wireless Edge Services xl Module has applied NAT. The columns show the IP addresses associated with the session: Inside-Global refers to the source IP address as it appears in the destination network (that is after translation). Inside-Local refers to the source IP address as it appears originally in the source network. Outside-Global refers to the destination IP address as it appears after translation in the destination device s network Outside-Local refers to the destination IP address as it appears originally in the source device s network. For example, if you have configured dynamic source NAT on inside traffic, the Inside-Local column lists the IP address of the source device in the inside network, and the Inside-Global column lists the translated IP address. Rev. 1.5 11

Use Model Securing a small network from less trusted wireless traffic Wireless Services xl Module As a Router, DHCP Server, and RADIUS Server Servers VLAN 4 10.1.4.0/24 MyCompany WPA with 802.1X Dynamic VLANs Downlink WLAN 1 VLAN 8 Dynamic VLANs VLAN 12 VLAN 14 Firewall ACLs NAT Uplink Management VLAN VLAN 4 (Servers) DHCP Pools VLAN 12 10.1.12.0/24 VLAN 14 10.1.14.0/24 RADIUS requests RADIUS Server Employees Contractors VLAN 12 VLAN 14 Rev. 1.5 12 We ve covered a lot of capabilities. Let s pause for a minute and look at how to combine them for a complete solution. The company in this scenario has a relatively small LAN with limited security capabilities. However, the company does have several servers that store sensitive information. The company s new Wireless LAN System is intended to provide mobile access to these servers for contractors and employees. However, network administrators are well aware that without careful planning granting mobile access for legitimate users can easily lead to allowing unauthorized access by illegitimate users. The first step to securing the network is guarding the WLAN with strong encryption and user-based authentication. The company chooses WPA with 802.1X. Even though this small company does not have a RADIUS server, the internal RADIUS server on the Wireless Module enables it to choose this high-security option. The internal server also enables dynamic VLANs; the module places mobile users in two different VLANs based on whether they are employees or contractors. As you can see, after the module s RADIUS server assigns users to VLANs, the module also takes responsibility, as a DHCP server, for assigning IP addresses to the wireless stations. Finally, the module routes traffic from the wireless stations to the servers VLAN, which is tagged on the module s uplink port. As the module routes the traffic, it runs basic firewall checks and applies the appropriate ACLs. For example, you could place an ACL on the VLAN 14 interface (the contractors VLAN) that permits access to one server, but denies access to another. The module also implements NAT, translating IP addresses for the wireless stations to the module s IP address on the server VLAN, allowing the servers to send traffic back to the VLANs for wireless users. Rev. 1.5 12

Use Model Securing wireless and wired traffic in a small network VLAN 4 10.1.4.0/24 Servers LAN Dynamic VLANs Wireless Services xl Module As a Router, DHCP Server, and RADIUS Server MyCompany WPA with 802.1X Dynamic VLANs Downlink WLAN 1 VLAN 8 Dynamic VLANs VLAN 12 VLAN 14 Firewall ACLs NAT Uplink Management VLAN VLAN 4 (Servers) 802.1X DHCP Pools VLAN 12 10.1.12.0/24 VLAN 14 10.1.14.0/24 RADIUS requests RADIUS Server Employees Contractors VLAN 12 VLAN 14 RADIUS requests Rev. 1.5 13 This use model is similar to the last. However, this company is very small and has decided to use the Wireless Edge Services xl Module to provide services for all stations wired as well as wireless. Wired stations connect to the wireless services-enabled switch, which enforces 802.1X on all interfaces to which workstations might connect. You ve configured the switch as a client on the Wireless Module s internal RADIUS server, and the switch forwards RADIUS requests to this server, allowing wired stations to complete 802.1X authentication. At this point, the Wireless Module treats the wired stations much as it would wireless stations. It places them in dynamic VLANs and issues IP addresses to them from its DHCP pool. The Wireless Module can route and filters traffic that it receives from the wired stations, just as it routes and filters that from the wireless stations. Note, however, that you must tag the module s uplink port for these VLANs to allow the module to receive traffic on them from the wired stations. Rev. 1.5 13

Rev. 1.5 14 Rev. 1.5 14