Dell W-Series 334 Instant 6.4.3.1-4.2 User Guide - Page 383

AP Connected Switch Configuration

Page 383 highlights

Table 75: W-IAP Configuration for Scenario 1-IPSec: Single Datacenter Deployment with No Redundancy Configuration Steps CLI Commands UI Procedure authentication servers and access rules created above and enable authentication survivability. (ap)(config) # wired-port-profile wired-port (ap)(wired-port-profile "wired-port")# switchportmode access (ap)(wired-port-profile "wired-port")# allowed-vlan all (ap)(wired-port-profile "wired-port")# native-vlan 20 (ap)(wired-port-profile "wired-port")# no shutdown (ap)(wired-port-profile "wired-port")# access-rulename wired-port (ap)(wired-port-profile "wired-port")# type employee (ap)(wired-port-profile "wired-port")# auth-server server1 (ap)(wired-port-profile "wired-port")# auth-server server2 (ap)(wired-port-profile "wired-port")# dot1x (ap)(wired-port-profile "wired-port")# exit (ap)(config)# enet1-port-profile wired-port Wired Profile and Wireless Network Profiles 7. Create access rule for wired and wireless authentication. In this example, the rule permits all traffic. Configure a wireless SSID to operate in L3 mode and associate distributed L3 mode VLAN 30 to the WLAN SSID profile. (ap)(config) # wlan ssid-profile wireless-ssid (ap)(SSID Profile "wireless-ssidt")# enable (ap)(SSID Profile "wireless-ssid")# type employee (ap)(SSID Profile "wireless-ssid")# essid wirelessssid (ap)(SSID Profile "wireless-ssid")# opmode wpa2-aes (ap)(SSID Profile "wireless-ssid")# vlan 30 (ap)(SSID Profile "wireless-ssid")# auth-server server1 (ap)(SSID Profile "wireless-ssid")# auth-server server2 (ap)(SSID Profile "wireless-ssid")# authsurvivability For wired profile: (ap)(config)# wlan access-rule wired-port (ap)(Access Rule "wired-port")# rule any any match any any any permit For WLAN SSID: (ap)(config)# wlan access-rule wireless-ssid (ap)(Access Rule "wireless-ssid")# rule any any match any any any permit See Configuring ACL Rules for Network Services NOTE: Ensure that you execute the commit apply command in the Instant CLI before saving the configuration and propagating changes across the W-IAP cluster. AP Connected Switch Configuration Client VLANs defined in this example must be opened on the upstream switches in multi AP deployments, as client traffic from slave to master is tagged with the client VLAN. 383 | IAP-VPN Deployment Scenarios Dell Networking W-Series Instant 6.4.3.1-4.2.0.0 | User Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403

383
| IAP-VPN Deployment Scenarios
Dell Networking W-Series Instant 6.4.3.1-4.2.0.0 | User Guide
Configuration Steps
CLI Commands
UI Procedure
authentication servers
and access rules created
above and enable
authentication
survivability.
(ap)(config) # wired-port-profile wired-port
(ap)(wired-port-profile "wired-port")# switchport-
mode access
(ap)(wired-port-profile "wired-port")# allowed-vlan
all
(ap)(wired-port-profile "wired-port")# native-vlan
20
(ap)(wired-port-profile "wired-port")# no shutdown
(ap)(wired-port-profile "wired-port")# access-rule-
name wired-port
(ap)(wired-port-profile "wired-port")# type employee
(ap)(wired-port-profile "wired-port")# auth-server
server1
(ap)(wired-port-profile "wired-port")# auth-server
server2
(ap)(wired-port-profile "wired-port")# dot1x
(ap)(wired-port-profile "wired-port")# exit
(ap)(config)# enet1-port-profile wired-port
Configure a wireless SSID to operate in L3 mode and associate
distributed L3 mode VLAN 30 to the WLAN SSID profile.
(ap)(config) # wlan ssid-profile wireless-ssid
(ap)(SSID Profile "wireless-ssidt")# enable
(ap)(SSID Profile "wireless-ssid")# type employee
(ap)(SSID Profile "wireless-ssid")# essid wireless-
ssid
(ap)(SSID Profile "wireless-ssid")# opmode wpa2-aes
(ap)(SSID Profile "wireless-ssid")# vlan 30
(ap)(SSID Profile "wireless-ssid")# auth-server
server1
(ap)(SSID Profile "wireless-ssid")# auth-server
server2
(ap)(SSID Profile "wireless-ssid")# auth-
survivability
Wired Profile
and
Wireless
Network
Profiles
7.
Create access rule for
wired and wireless
authentication. In this
example, the rule
permits all traffic.
For wired profile:
(ap)(config)# wlan access-rule wired-port
(ap)(Access Rule "wired-port")# rule any any match
any any any
permit
For WLAN SSID:
(ap)(config)# wlan access-rule wireless-ssid
(ap)(Access Rule "wireless-ssid")# rule any any
match any any any permit
See
Configuring
ACL Rules for
Network
Services
NOTE:
Ensure that you execute the
commit apply
command in the Instant CLI before saving the configuration and
propagating changes across the W-IAP cluster.
Table 75:
W-IAP Configuration for Scenario 1—IPSec: Single Datacenter Deployment with No Redundancy
AP Connected Switch Configuration
Client VLANs defined in this example must be opened on the upstream switches in multi AP deployments, as
client traffic from slave to master is tagged with the client VLAN.