Dell W-Series 277 Instant 6.4.3.1-4.2 User Guide - Page 387

W-IAP Configuration for Scenario 2-IPSec: Single Datacenter with Multiple controllers for Redundancy

Page 387 highlights

Table 76: W-IAP Configuration for Scenario 2-IPSec: Single Datacenter with Multiple controllers for Redundancy Configuration Steps CLI Commands UI Procedure NOTE: The IP range configuration on each branch will be the same. Each W-IAP will derive a smaller subnet based on the client count scope using the Branch ID (BID) allocated by controller. 6. Create authentication servers for user authentication. The example in the next column assumes 802.1X SSID. (ap)(config)# wlan auth-server server1 (ap)(Auth Server "server1")# ip 10.2.2.1 (ap)(Auth Server "server1")# port 1812 (ap)(Auth Server "server1")# acctport 1813 (ap)(Auth Server "server1")# key "presharedkey" (ap)(Auth Server "server1")# exit See Configuring an External Server for Authentication (ap)(config)# wlan auth-server server2 (ap)(Auth Server "server2")# ip 10.2.2.2 (ap)(Auth Server "server2")# port 1812 (ap)(Auth Server "server2")# acctport 1813 (ap)(Auth Server "server2")# key "presharedkey" 7. Configure wired and wireless SSIDs using the authentication servers and access rules created above and enable authentication survivability. Configure wired ports to operate in L3 mode and associate distributed L3 mode VLAN 30 to the wired port profile. (ap)(config) # wired-port-profile wired-port (ap)(wired-port-profile "wired-port")# switchportmode access (ap)(wired-port-profile "wired-port")# allowed-vlan all (ap)(wired-port-profile "wired-port")# native-vlan 30 (ap)(wired-port-profile "wired-port")# no shutdown (ap)(wired-port-profile "wired-port")# access-rulename wired-port (ap)(wired-port-profile "wired-port")# type employee (ap)(wired-port-profile "wired-port")# auth-server server1 (ap)(wired-port-profile "wired-port")# auth-server server2 (ap)(wired-port-profile "wired-port")# dot1x (ap)(wired-port-profile "wired-port")# exit (ap)(config)# enet1-port-profile wired-port See Configuring a Wired Profile and Wireless Network Profiles Configure a wireless SSID to operate in L2 mode and associate Centralized L2 mode VLAN 20 to the WLAN SSID profile. (ap)(config) # wlan ssid-profile guest (ap)(SSID Profile "guest")# enable (ap)(SSID Profile "guest")# type guest (ap)(SSID Profile "guest")# essid guest (ap)(SSID Profile "guest")# opmode opensystem (ap)(SSID Profile "guest")# vlan 20 (ap)(SSID Profile "guest")# auth-server server1 (ap)(SSID Profile "guest")# auth-server server2 (ap)(SSID Profile "guest")# captive-portal internal NOTE: This example uses internal captive portal use case using external authentication server. You can also use an external 387 | IAP-VPN Deployment Scenarios Dell Networking W-Series Instant 6.4.3.1-4.2.0.0 | User Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403

387
| IAP-VPN Deployment Scenarios
Dell Networking W-Series Instant 6.4.3.1-4.2.0.0 | User Guide
Configuration Steps
CLI Commands
UI Procedure
NOTE:
The IP range configuration on each branch will be the
same. Each W-IAP will derive a smaller subnet based on the client
count scope using the Branch ID (BID) allocated by controller.
6.
Create authentication
servers for user
authentication. The
example in the next
column assumes 802.1X
SSID.
(ap)(config)# wlan auth-server server1
(ap)(Auth Server "server1")# ip 10.2.2.1
(ap)(Auth Server "server1")# port 1812
(ap)(Auth Server "server1")# acctport 1813
(ap)(Auth Server "server1")# key "presharedkey"
(ap)(Auth Server "server1")# exit
(ap)(config)# wlan auth-server server2
(ap)(Auth Server "server2")# ip 10.2.2.2
(ap)(Auth Server "server2")# port 1812
(ap)(Auth Server "server2")# acctport 1813
(ap)(Auth Server "server2")# key "presharedkey"
See
Configuring an
External Server
for
Authentication
7.
Configure wired and
wireless SSIDs using the
authentication servers
and access rules created
above and enable
authentication
survivability.
Configure wired ports to operate in L3 mode and associate
distributed L3 mode VLAN 30 to the wired port profile.
(ap)(config) # wired-port-profile wired-port
(ap)(wired-port-profile "wired-port")# switchport-
mode access
(ap)(wired-port-profile "wired-port")# allowed-vlan
all
(ap)(wired-port-profile "wired-port")# native-vlan
30
(ap)(wired-port-profile "wired-port")# no shutdown
(ap)(wired-port-profile "wired-port")# access-rule-
name wired-port
(ap)(wired-port-profile "wired-port")# type employee
(ap)(wired-port-profile "wired-port")# auth-server
server1
(ap)(wired-port-profile "wired-port")# auth-server
server2
(ap)(wired-port-profile "wired-port")# dot1x
(ap)(wired-port-profile "wired-port")# exit
(ap)(config)# enet1-port-profile wired-port
Configure a wireless SSID to operate in L2 mode and associate
Centralized L2 mode VLAN 20 to the WLAN SSID profile.
(ap)(config) # wlan ssid-profile guest
(ap)(SSID Profile "guest")# enable
(ap)(SSID Profile "guest")# type guest
(ap)(SSID Profile "guest")# essid guest
(ap)(SSID Profile "guest")# opmode opensystem
(ap)(SSID Profile "guest")# vlan 20
(ap)(SSID Profile "guest")# auth-server server1
(ap)(SSID Profile "guest")# auth-server server2
(ap)(SSID Profile "guest")# captive-portal internal
NOTE:
This example uses internal captive portal use case using
external authentication server. You can also use an external
See
Configuring a
Wired Profile
and
Wireless
Network
Profiles
Table 76:
W-IAP Configuration for Scenario 2—IPSec: Single Datacenter with Multiple controllers for Redundancy