Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
0596100523
To understand WLANs it is important to understand the 802.11 protocols and their operations. These two books do an excellent job in presenting this information and is used throughout this and other presentations. Thanks to Pejman Roshan and Jonathan Leary at Cisco Systems, authors of 802.11 Wireless LAN Fundamentals for allowing me to use their graphics and examples for this presentation. Also thanks to Matthew Gast for author of 802.11 Wireless Networks, The Definitive Guide 2 for allowing me to use their graphics and examples for this presentation.
Note:
You may see the reference (see WLAN pres.) in many of these slides. I have left out a lot of the detail for this presentation. You can refer to the books that I have recommended or review the powerpoint slides on my WLAN class web page. http://www.cabrillo.edu/~rgraziani/courses/cis140.html
802.11 Standards
Overview of Standardization
Standardization of networking functions has done much to further the development of affordable, interoperable networking products. This is true for wireless products as well. Prior to the development of standards, wireless systems were plagued with low data rates, incompatibility, and high costs. Standardization provides all of the following benefits: Interoperability among the products of multiple vendors Faster product development Stability Ability to upgrade Cost reductions
5
802.11 is a family of protocols, including the original specification, 802.11, 802.11b, 802.11a, 802.11g and others. Officially called the IEEE Standard for WLAN MAC and PHY specifications. 802.11 is just another link layer for 802.2 802.11 is sometimes called wireless Ethernet, because of its shared lineage with Ethernet, 802.3. The wired network side of the network could be Ethernet, Token Ring, etc.(we will always use Ethernet in our examples) Access Points and Bridges act as translation bridges between 802.11 and 802.3 (or other other protocol)
6
Three types of WLAN Topologies: Independent Basic Service Sets (IBSS) Basic Service Set (BSS) Extended Service Set (ESS) Service Set A logical grouping of devices. WLANs provide network access by broadcasting a signal across a wireless radio frequency. Transmitter prefaces its transmissions with a Service Set Identifier (SSID) A station may receive transmissions from transmitters with the same or different SSIDs.
IBSS consists of a group of 802.11 stations directly communicating with each other. No Access Point used Also known as an ad-hoc network. Our focus will be BSSs and ESSs.
BSS, also known as an Infrastructure BSS (never called IBSS) Requires an Access Point (AP) Converts 802.11 frames to Ethernet and visa versa Known as a translation bridge Stations do not communicate directly, but via the AP APs typically have an uplink port that connects the BSS to a wired network (usually Ethernet), known as the Distribution System (DS).
10
Multiple BSSs can be connected together with a layer 2 backbone network to form an Extended Service Set (ESS). 802.11 does not specify the backbone network The backbone network is also known as the Distribution System (DS) and could be wired or wireless. Stations are associated with only one AP at a time.
11
Access Points
Access Point (AP) Translates (converts) 802.11 frames to Ethernet and visa versa Known as a translation bridge Typically provides wireless-to-wired bridging function All BSS communications must go through the AP, even between two wireless stations
12
13
Using NetStumbler
14
802.11 has some similarities with Ethernet but it is a different protocol. Access Points are translation bridges.
16
802.11 Frames
802.11 Frames Data Frames (most are PCF) Data Null data Data+CF+Ack Data+CF+Poll Data+CF+Ac+CF+Poll CF-Ack CF-Poll CF-Cak+CF-Poll Control Frames RTS CTS ACK CF-End CF-End+CF-Ack
Management Frames Beacon Probe Request Probe Response Authentication Deauthentication Association Request Association Response Reassociation Request Reassociation Response Disassociation Announcement Traffic Indication
17
CSMA/CD
CSMA/CA
Both CSMA/CD and CSMA/CA are half-duplex architectures Ethernet uses CSMA/CD Collision Detection Ethernet devices detect a collision as when the data is transmitted 802.11 uses CSMA/CA Collision Avoidance 802.11 devices only detect a collision when the transmitter has not received an Acknowledgement. Stations also use CS/CCA (see WLAN pres.) Stations also use a virtual carrier-sense function, NAV (see WLAN pres.) 18
CSMA/CA CSMA/CD The 802.11 standard makes it mandatory that all stations implement the DCF (Distributed Coordination Function), a form of carrier sense multiple access with collision avoidance (CSMA/CA). The main goal of CSMA/CA is to avoid having stations transmit at the same time, which will then result in collisions and eventual retransmissions. However, collisions may still occur and when they do stations may or may not be able to detect them (hidden node problem).
19
IEEE mandated access mechanism for 802.11 is DCF (Distributed Coordination Function) Basis for CSMA/CA There is also the PCF (Point Coordination Function) (See WLAN pres.)
20
DCF Operation
An example will be coming!
In DCF operation, a station wanting to transmit : Checks to see if radio link is clear, CS/CCA Carrier Sense, Clear Channel Assessment (see WLAN presentation) Checks its NAV timer (coming) to see if someone else is using the medium. If medium is available DCF uses a random backoff timer to avoid collisions and sends the frame. Transmitting station only knows the 802.11 frame got there if it receives an ACK. May also use RTS/CTS to reduce collisions (see WLAN pres.)
21
Duration Field
An example will be coming!
Duration/ID field The number of microseconds (millionths of a second) that the medium is expected to remain busy for transmission currently in progress. Transmitting device sets the Duration time in microseconds. Includes time to: Transmit this frame to the AP (or to the client if an AP) The returning ACK The time in-between frames, IFS (Interframe Spacing) All stations monitor this field! All stations update their NAV (Network Allocation Vector) timer.
22
NAV Timer
An example will be coming!
All stations have a NAV (Network Allocation Vector) timer. Virtual carrier-sensing function Protects the sequence of frames from interruption. Martha sends a frame to George. Since wireless medium is a broadcast-based (not broadcast frame) shared medium, all stations including Vivian receive the frame. Vivian updates her NAV timer with the duration value. Vivian will not attempt to transmit until her NAV is decremented to 0. Stations will only update their NAV when the duration field value received is greater than 23 their current NAV.
What if a station is in range of the AP but not the Host A? (Hidden node problem see WLAN pres.) 24
802.11 uses four different interframe spaces used to determine medium access (note: microsecond = millionth of a second): DIFS DCF Interface Space Minimum amount of medium idle time until contention-based services begin.
PIFS PCF Interframe Space Used by PCF (See WLAN pres.) SIFS Short Interframe Space Used for highest priority transmission, ACKs, RTS, CTS (See WLAN pres.) EIFS Extended Interframe Space Not a fixed interval and used only when there is an error in frame transmission. (See WLAN pres.) 25
Example
Im waiting
Scenario: Both Vivian and George want to transmit frames. Both stations have same NAV values and physically sense when the medium is idle. Both are waiting for Marthas transmission to end and the medium to become available. The medium now becomes available.
26
Im waiting
Example
Random backoff slots
George and Vivian are both wanting to transmit. Both perform the following: Both sense that medium is available using Physical and Virtual Carriers Sensing: Physical: Physically senses medium is idle (CS/CCA see WLAN pres). Virtual: NAV timer is 0 Both waits DIFS (DCF Interface Space) Contention window begins. Uses random backoff algorithm to determine when it can attempt to access the medium. (next)
27
Example
Vivian (7), George (31)
Both Vivian and George calculate their random backoff algorithm to randomly selects a value from 0 to 255. Vivian has a slot time of 7 George a slot time of 31. Vivian wins! The destination of her frame is George (could have been a station on the wired network.)
28
Example
Others update NAV
(((
)))
Vivian transmits, setting the Duration ID to the time needed to transmit, ACK and IFSs. George with a higher slot will see the 802.11 frame from Vivian and wait to transmit. Assuming their was not a collision from another station, Martha and George update their NAVs.
29
Example
The frame arrives at the AP. After the SIFS: The AP sends an ACK back to Vivian, which is how Vivian knows the frame was received by the AP. The AP now has the frame and must contend for access to the medium like all other stations. Remember, 802.11 uses a half-duplex, shared medium and the AP has to contend for access just like all other devices!
30
Y yyy
Access Point 2
A
xxx
yyy
xxx
yyy
IP Packet
32
Four address fields The address of these fields is dependent upon the source and destination for the 802.11 frame. Address 4 is optional and not commonly used, except for WDS (wireless distribution system, bridge to bridge).
33
To DS: indicates if frame is destined for the DS or AP (1 bit). From DS: indicates if frame is sourced from the DS or AP (1bit).
34
ToDS 0 1 0 1
FromDS 0 0 1 1
Note: Some documentation is misleading stating that the ToDS is set to 1 only when the destination is on the wired side of the AP.
35
A
aaa
111
B
bbb
111
aaa
bbb
Lets look at these options: Host A to Host B Host A to Host X Host X to Host A
36
X
xxx
Distribution System (DS)
Access Point 1 Access Point 2
A
aaa
111
B
bbb
Each BSS is assigned a BSSID. Not to be confused with SSID or ESSID. BSSID 48 bit identifier which distinguishes it from other BSSs in the network, used for filtering. In a BSS, the BSSID is the MAC address of the wireless interface. Remember, normal switches (bridges) may have MAC addresses, but these addresses are only used for management purposes and not for layer 2 frame forwarding (addressing).
37
BSSID
38
X
xxx
Distribution System (DS)
Access Point 1 Access Point 2
A
aaa
111
B
bbb
Address 1 Receiver address Address 2 Transmitter address Address 3 Ethernet/wireless SA, Ethernet/wireless DA, or BSSID
Receiver: Receives a frame on the wireless medium, but may not be the final destination, i.e. AP Transmitter: Sends a frame on to the wireless medium, but may not be the original source (didnt necessarily create the frame), i.e. AP
39
X
xxx
Distribution System (DS)
Access Point 1 Access Point 2
A
aaa Host A to AP 1
Rec. Trans. DA
111
B
bbb
111
1 0
aaa
bbb
AP1 to Host B
Rec.
Trans.
SA
bbb
111
aaa
Address 1 Receiver address Address 2 Transmitter address Address 3 Ethernet/wireless SA, Ethernet/wireless DA, or BSSID
40
Access Points are translation bridges. From 802.11 to Ethernet, and from Ethernet to 802.11 The data/frame body is re-encapsulated with the proper layer 2 frame (Ethernet or 802.11). Certain addresses are copied between the two types of frames.
41
X
xxx
Distribution System (DS)
Access Point 1 Access Point 2
aaa
Rec. Trans. DA
111
B
bbb
111
aaa
xxx
The Ethernet DA and SA are the source and destination addresses just like on traditional Ethernet networks. Destination Address Host X Source Address Host A
42
X
xxx
Distribution System (DS)
Access Point 1 Access Point 2
aaa
Rec. Trans.
A
DA
111
B
bbb
111
aaa
xxx
xxx
aaa
AP 1 to Host X
The AP (bridge) knows which MAC addresses are on on its wireless interface and maintains a table with those MAC addresses. (from the Association process later) When the AP receives an 802.11 frame, it examines the Address 3 address. If Address 3 is not in its table of wireless MACs it knows it needs to translate the frame to an Ethernet frame. The AP copies the Address 3 address to the Ethernet Destination Address, and 43 Address 2 (Transmitter address) is copied to the Ethernet Source Address.
Y
111
Access Point 1 Access Point 2
A
aaa
B
bbb
44
X
xxx
Distribution System (DS)
Access Point 1 Access Point 2
aaa
111
B
bbb
Rec.
copied
Trans.
SA
aaa
111
xxx
The AP (bridge) knows which MAC address on on its wireless interface and maintains a table with those MAC addresses. (via Association process later)
When the AP receives an Ethernet frame, it examines the Destination address. If Destination Address is in its table of wireless MACs it knows it needs to translate the frame to an 802.11 frame. The AP copies the Destination address to the 802.11 Address 1, and Ethernet Source is 45 copied to the Address 3 address (SA in this case).
111 aaa
So how do Ethernet switches know where the wireless stations are? Just like wired stations using the source address of frames that came from the wireless station via the access point. Here the switch learns from the incoming Ethernet frame that Source Address aaa is on port 2 and enters that in its MAC address table. Any frames coming into the switch (ex. port 1) with a Destination Address of aaa, the switch knows to forward those frames out port 2 (towards the AP).
46
Station Connectivity
48
Station Connectivity
Successful Authentication Successful Association
Station connectivity is a explanation of how 802.11 stations select and communicate with APs.
49
Station Connectivity
Probe process Authentication process
Successful Authentication
Association process
Successful Association
Three processes: Probe Process (or scanning) The Authentication Process The Association Process Only after a station has both authenticated and associated with the access point can it use the Distribution System (DS) services and communicate with devices beyond the access point.
50
The Probe Process (Scanning) done by the wireless station Passive - Beacons Active Probe Requests Used by client to determine: SSID Supported data rates Security Depends on device drive of wireless adapter or the software utility you are using. Cisco adapters do active scanning when associating, but use passive scanning for some tests. In either case, beacons are still received and used by the wireless stations for other things besides scanning (coming).
51
52
From the AP
53
Station Connectivity
Probe process Authentication process
Successful Authentication
Association process
Successful Association
Station connectivity processes: Probe Process (or scanning) The Authentication Process The Association Process Only after a station has both authenticated and associated with the access point can it use the Distribution System (DS) services and communicate with devices beyond the access point.
54
Authentication Process
On a wired network, authentication is implicitly provided by the physical cable from the PC to the switch. Authentication is the process to ensure that stations attempting to associate with the network (AP) are allowed to do so. 802.11 specifies two types of authentication: Open-system Shared-key (WEP, WPA, WPA2, etc.)
55
Station Connectivity
Probe process Authentication process
Successful Authentication
Association process
Successful Association
Station connectivity processes: Probe Process (or scanning) The Authentication Process The Association Process Only after a station has both authenticated and associated with the access point can it use the Distribution System (DS) services and communicate with devices beyond the access point.
56
Association Process
1. Association Request 2. Association Response
The association process is logically equivalent to plugging into a wired network. Once this process is completed, the wireless station can use the DS and connect to the network and beyond. A wireless station can only associate with one AP (802.11 restriction) During the 802.11 association process the AP maps a logical port known as the Association Identifier (AID) to the wireless station. The AID is equivalent to a port on a switch and is used later in Power Save Options. The association process allows the DS to keep track of frames destined for the wireless station, so they can be forwarded.
57
A key factor in wireless is mobility, which implies batteries. To preserve battery power the 802.11 specification provides for power saving operations on the wireless clients. 802.11 categories for power savings refer to: Unicast frames Broadcast/Multicast frames
58
The Cisco ACU has three options for Power Saving: CAM (Constantly Awake Mode) MAX PSP (Max Power Savings) Fast PSP (Fast Power Saving Mode) (see WLAN pres).
59
beacon
A client enters low-power mode by turning off its radio. The AP buffers (holds) frames destined for that station while it is in PS mode. At a certain interval the client wakes up to listen for a beacon from the AP. The beacon contains information on whether or not there are frames for this station at the AP. If there are no frames buffered for this station it can return to PS mode.
60
The basics: If there are frames buffered for this station it will poll the AP for those frames. The AP will then send the frames to the station.
61
Management Frames Beacon Probe Request Probe Response Authentication Deauthentication Association Request Association Response Reassociation Request Reassociation Response Disassociation Announcement Traffic Indication
62
Integrating WLANs
Access VLAN 10
SSID Marketing
SSID Marketing
SSID Engineering
AP is a translational bridge, bridging tow dissimilar mediums. AP is in charge of mapping a VLAN to an SSID. For multiple VLANs (SSIDs) a trunk will need bo be created between the AP and the switch.
64
WLAN Cells
When APs overlap, adjacent APs cannot use identical frequencies otherwise you have interference. Roaming: A client moving from one AP to another. Any data that the client was sending needs to be relayed from one AP to the new AP.
65
Roaming
Layer 2 roaming: A WLAN device moves, the original and the new AP offer coverage for the same IP subnet, so the devices IP address is still be valid after the roam. Layer 3 roaming: Client moves from an AP that covers one IP subnet to an AP that covers another IP subnet. Would mean a new IP address and default gateway that are valid within the new APs IP subnet Causes existing data sessions or voice sessions to fail. Solution: Cisco Unified Wireless Network and Intercontroller roaming.
66
WLAN Architecture
BSS Range
68
Switched Routed
AP can support multiple SSIDs if multiple VLANs are extended to it over a trunk link. If you want to offer the same SSIDs from several automous APs, the VLANS must be extended to the APs in a contiguous manner. Problem is that the SSID and its VLAN would have to be extended everywhere the user could possibly roam. This would cause end-to-end or campus-wide VLANs which is not good network 69 design practice.
Traditional WLAN
Cisco Unified Wireless Network Architecture centralizes many traditional capabilities moving many functions to a central location including: WLAN security WLAN deployment WLAN management WLAN control
70
Traditional WLAN
Real-time processes include: Sending/receiving 802.11 frames, AP beacons, probes, data encryption. Management processes include: RF management, roaming management, QoS, security. Including all those association, authentication, power saving, etc. tasks we saw previously.
71
LAP
WLC
LWAPP or CAPWAP
Encapsulated Data
LAP or LWAP (Lightweight Access Point) Performs only the real-time 802.11 operations. Layer 1 and 2 operations The IOS image and local intelligence is stripped down compared to autonomous APs. Dependent upon the WLC for all other operations. WLC (Wireless LAN Controller) Performs all management functions This is known as split-MAC architecture
72
Two devices have a LWAPP or CAPWAP tunnel to exchange 802.11 messages and client data. LAP and WLC can be in the same VLAN/IP subnet or different ones. The LWAPP or CAPWAP tunnel allows user data to be switched or routed across the campus network. LWAPP (Lightweight Access Point Protocol) Developed by Cisco, submitted as draft RFC 4118 CAPWAP (Control and Provisioning Wireless Access Points protocol) The resulting standard.
73
Control messages are authenticated and encrypted so the LAP is securely controlled by the WLC. This also prevents rogue APs from being introduced into the network. Data Packets to and from wireless clients associated with the LAP are encapsulated with the LWAPP or CAPWAP tunnel but are not encrypted or otherwise secured between the LAP and WLC.
74
WLC (Wireless LAN Controller) functions: Dynamic channel assignment Chooses and configures RF channel for each LAP. Transmit power optimization Sets transmit power for each LAP based on size of coverage area needed. Self-healing wireless coverage If a LAP radio dies other LAPs can have their power increased. Flexible client roaming Manages Layer 2 and 3 roaming. Dynamic client load balancing If multiple LAPs are in same coverage area, WLC can associate clients with the least used LAP. RF monitoring Scans channels to monitor RF usage, interference, noise, and signals from regue APs. Security management Require clients to get their IP address from a trusted DHCP 75 server before allowing them to associate.
WLC available on several platforms including WLC module for ISR routers (2800 and 3800). The easiest way to distinguish between a regular AP and a LAP is to look at the part number of the AP. LAP (Lightweight AP Protocol [LWAPP])Part numbers always begin with AIR-LAPXXXX. Autonomous AP (Cisco IOS Software)Part numbers always begin with AIR-APXXXX. 76
WCS
Cisco Wireless Control System (WCS) Optional - Allows for easier management of several WLCs. Server platform which uses a GUI front-end. Uses floor plans to display dynamic representations of wireless coverage. Can be used with Cisco Wireless Location Appliance to track the location of thousands of clients.
77
LAPs (Lightweight Access Point) are designed to be zero touch configuration. Gets is configuration parameters from the WLC Do not need to configure it through its console port or over the network. LAP Operations Step 1: LAP obtains an IP address from DHCP server Step 2: LAP learns IP address of an available WLCs DHCP server adds option 43 to its reply containing a list of WLCs, or LAP broadcasts a join request message (as long as the WLC on the local subnet) Step 3: LAP sends a join request to the first WLC in its list. Step 4: WLC compares IOS image number stored to the one stored on the WLC. If they differ the LAP download the code on the WLC and reboots. Step 5: WLCP and LAP build a secure LWAPP or CAPWAP tunnel for management traffic, and LWAPP or CAPWAP tunnel (not secured) for wireless client data.
78
HREAP
WLC
When LAP is cut off from WLC client associations are dropped and no data can pass over the WLAN. Cisco Hybrid Remote Edge Access Point (HREAP) is used when LAPs are separated from WLCS over a WAN link. The LAPs can keep operating even while the WAN link is down and the WLC is not available like an autonomous AP. Allows wireless clients to keep communicating within the remote site.
79
Traffic Patterns
Single VLANs
Traffic patterns differ than traditional WLANs. Client data passes: From Client A to LAP From LAP to WLC From WLC back to LAP From LAP to Client B Encryption is still handled between the LAP and the client.
BSS Range
81
Multiple VLANs
With traditional WLANs the access VLANs must be extended or trunked between APs and multilayer switch. This is not the case with LAPs and WLCs. There are two VLANs A and B with their respective SSIDs A and B. The VLANs exist on the trunk between the MLC and SW2 but go no further. The LAPs and the WLC are connected by VLAN Z which is can be totally isolated from VLANs A and B. VLANs A and B are carried over the LWAPP tunnel so they are logically connected between the LAP and the WLC.
82
Traditional Roaming
A WLAN designer must determine whether clients will require seamless roaming from access point to access point. IEEE 802.11 IAPP (Inter-Access Point Protocol). Initial Association: Probing (Probe Request, Probe Response) Authentication (Authentication Request, Authentication Response) Association (Association Request, Association Response) 802.11 does not allow associating with more than one AP.
84
Traditional Roaming
IAPP: Please send buffered frames for IAPP: Ok! * Packet - Source MAC of client
The client initiates the roaming (re-association) process. As the client is moving out of range of its associated AP, the signal strength will start to drop off. At the same time, the strength of another AP will begin to increase. The re-association process then occurs, including authentication.
* AP(B) must update MAC address tables on infrastructure switches to prevent to loss of data. AP(B) sends an Ethernet frame to AP(A) with the source MAC address of the client so all the switches can update their SAT/MAC tables.
85
With autonomous APs when a client roams its association moves from one AP to another. Client must negotiate the move independently and the APs must also make sure any buffered data from the client is passed along with the association. WLC supports both Layer 2 and Layer 3 roaming.
86
Intracontroller Roaming
Both LAP1 and LAP2: Use SSID MyWLAN Joined to the same WLC Client roams into area covered by AP2. Although the AP has changed the same controller is providing the association with through the LWAPP or CAPWAP tunnel. This is known as intracontroller roaming.
87
Intracontroller Roaming
Intracontroller roaming. The WLC (controller) simply updates its tables to begin using the LWAPP or CAPWAP tunnel to LAP2. Any leftover data that was buffered for the prior association with LAP1 is easily shifted to new association with LAP2.
88
Same IP address
Intercontroller roaming: When LAPs are supported by multiple WLCs (controllers) for redundancy, load balancing or scalability. Client moves to LAP2s cell the same SSID is found. Client moves it association to WLC2. As long as WLC1 and WLC2 are in the same subnet they can easily hand off the clients association. Uses a mobility message to exchange information about the client.
89
Same IP address
When the mobility exchange occurs the client begins using the LWAPP or CAPWAP tunnel between LAP2 and WLC2. Client IP address has not changed. Roaming process completely transparent to the client.
90
Same IP address
WLC controllers are in different subnets (VLANs A and B). Do not have to have end-to-end or campus wide VLANs. Client begins in cell with association to WLC1. Obtains an IP address within VLAN A LAP1 offers VLAN A on its SSID MyWLAN All traffic passes between LAP1 and WLC1 onto VLAN A.
91
Same IP address
Client roams into cell provided by LAP2. LAP2 offers access to a different VLAN, VLAN B. The clients IP address remains the same. But WLC1 and WLC2 are in different subnets (VLANs A and B). Client IP address has moved into a foreign subnet.
92
Same IP address
Two WLCs (controllers) begin to work together to provide continue service for the client without the client needing to obtain an new IP address. WLCs (controllers) bring up an Ether-IP tunnel (RFC 3378) between them. Carries some of the clients data traffic Encapsulates Ethernet frame inside an IP packet using protocol 97. WLC1 encapsulates packets and sends them to WLC2. WLC2 unencapsulates the packets into their original form.
93
Same IP address
Traffic leaving the client travels from LAP2 to WLC2 onto the network even though it is on a foreign subnet. Its just a packet in an Ethernet frame. Dest MAC Source MAC [ IP Packet: Source IP Dest IP - ] Traffic coming in towards the client takes a different path. Traffic enters MLS (L3 switch) Because the packet has an IP address on VLAN 3 it is routed/switched out VLAN A to WLC1. WLC1 accepts the traffic and forwards it to the appropriate WLC controller that has the current association with the client. WLC1 sends the traffic to WLC2 through the Ether-IP tunnel. WLC2 forwards the traffic to LAP2 and onto the client.
94
Foreign Agent
Same IP address
The client originally joined the WLAN on WLC1, so WLC1 is known as the anchor. WLC2 is serving a client on a different subnet so it is known as the foreign agent. As the client continues to roam the foreign agent will change but the anchor will remain the same. To do this WLCs are configured into logical mobility groups. Up to 24 WLCs Number of LAPs vary depending upon LAP platform. If a client must move between mobility groups, its IP address and all of its session information maintained by the WLC will be dropped.
95
Switch(config)# interface gig 0/1 Switch(config-if)# switchport trunk encapsulation dot1q Switch(config-if)# switchport trunk allowed vlan 10, 20 Switch(config-if)# switchport mode trunk Switch(config-if)# spanning-tree portfast trunk
APs are normally at the access layer. Each SSID is supported by the AP mapped to a VLAN. When multiple SSIDs/VLANs are used need to configure switchport as a trunk. The is spanning-tree portfast trunk used to shorten the time required for STP to bring up the trunk link to forwarding state quickly.
97
Distribution(config)# vlan 10, 20, 50, 55 Distribution(config)# interface vlan 10 Configure the SVIs Distribution(config-if)# ip address 172.30.10.1 255.255.255.0 Distribution(config)# interface vlan 20 Distribution(config-if)# ip address 172.30.10.1 255.255.255.0 Distribution(config)# interface vlan 50 Distribution(config-if)# ip address 172.30.50.1 255.255.255.0 Distribution(config)# interface vlan 55 Distribution(config-if)# ip address 172.30.55.1 255.255.255.0 Distribution(config)# interface fa 0/1 <must carry vlan 50> Distribution(config-if)# switchport trunk encapsulation dot1q Distribution(config-if)# switchport mode trunk Distribution(config)# interface gig 1/2 <must carry vlans 10, 20 & 55> Distribution(config-if)# switchport trunk encapsulation dot1q Distribution(config-if)# switchport mode trunk
VLAN 50 is created to access the LAPs. VLAN 55 is created to access the WLC.
98
Access(config)# interface fa 0/1 Access(config-if)# switchport trunk encapsulation dot1q Access(config-if)# switchport mode trunk Access(config)# interface fa 0/2 Access(config-if)# switchport mode access Access(config-if)# switchport access vlan 50 Access(config-if)# spanning-tree portfast
99
CIS 187 Multilayer Switched Networks (CCNP Switch) Integrating Wireless LANs
Rick Graziani Cabrillo College graziani@cabrillo.edu Spring 2010