Workgroup Bridges. Cisco WGBs. Information About Cisco Workgroup Bridges. Cisco WGBs, page 1 Third-Party WGBs and Client VMs, page 9

Similar documents
Using Cisco Workgroup Bridges

Configuring Repeater and Standby Access Points and Workgroup Bridge Mode

Configuring Client Profiling

Configuring FlexConnect Groups

Multicast VLAN, page 1 Passive Clients, page 2 Dynamic Anchoring for Clients with Static IP Addresses, page 5

Configuring Cipher Suites and WEP

Configuring Repeater and Standby Access Points and Workgroup Bridge Mode

Configuring FlexConnect Groups

Configuring Repeater and Standby Access Points and Workgroup Bridge Mode

Configuring DHCP. Restrictions for Configuring DHCP for WLANs. Information About the Dynamic Host Configuration Protocol. Internal DHCP Servers

Configuring DHCP. Restrictions for Configuring DHCP for WLANs. Information About the Dynamic Host Configuration Protocol. Internal DHCP Servers

Access Point as a Workgroup Bridge Configuration Example

Configuring Repeater and Standby Access Points

DHCP. DHCP Proxy. Information About Configuring DHCP Proxy. Restrictions on Using DHCP Proxy

Configuring WLANsWireless Device Access

Configuring OfficeExtend Access Points

Web Authentication Proxy on a Wireless LAN Controller Configuration Example

Editing WLAN SSID or Profile Name for WLANs (CLI), page 6

CCIE Wireless v3 Workbook Volume 1

Configuring a Wireless LAN Connection

Configuring Layer2 Security

Configuring AP Groups

Configuring a Basic Wireless LAN Connection

Configuring AP Groups

WLC 7.0 and Later: VLAN Select and Multicast Optimization Features Deployment Guide

Interoperability guide Phoenix Contact WLAN clients with Cisco Wireless LAN Controllers (WLC) Published:

Configuring WEP and WEP Features

CCIE Wireless v3.1 Workbook Volume 1

Securing a Wireless LAN

FlexConnect. Information About FlexConnect

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Securing Wireless LAN Controllers (WLCs)

Configuring Hybrid REAP

Configuring Authentication Types

Configuring VLANs CHAPTER

CCIE Wireless v3 Lab Video Series 1 Table of Contents

Configuring Auto-Anchor Mobility

Configuring NAC Out-of-Band Integration

Deploying Cisco Wireless Enterprise Networks

P ART 3. Configuring the Infrastructure

ITCertMaster. Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way!

Cisco Deploying Basic Wireless LANs

Configuring Multiple SSIDs

Cisco Catalyst 6500 Series Wireless LAN Services Module: Detailed Design and Implementation Guide

Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services

The Wireless LAN Controller (WLC) supports two modes of DHCP operations in case an external DHCP server is used:

Configuring WDS, Fast Secure Roaming, Radio Management, and Wireless Intrusion Detection Services

Wireless LAN Controller (WLC) Design and Features FAQ

Internetwork Expert s CCNP Bootcamp. Wireless LANs. WLANs replace Physical (layer 1) and Data Link (layer 2) transports with wireless

Mobility Groups. Information About Mobility

Exam HP2-Z32 Implementing HP MSM Wireless Networks Version: 7.1 [ Total Questions: 115 ]

Wireless LAN Controller Web Authentication Configuration Example

Chromecast as mdns Service in order to Cast Screen Configuration on WLC

Software-Defined Access Wireless

Per-WLAN Wireless Settings

exam. Number: Passing Score: 800 Time Limit: 120 min CISCO Deploying Cisco Wireless Enterprise Networks. Version 1.

Configuring a WLAN for Static WEP

Configuring the Access Point/Bridge for the First Time

Numerics INDEX. 2.4-GHz WMIC, contrasted with 4.9-GHz WMIC g 3-6, x authentication 4-13

Wireless LAN Controller (WLC) Mobility Groups FAQ

Configuring WLAN Security

Configure Flexconnect ACL's on WLC

Configure 802.1x Authentication with PEAP, ISE 2.1 and WLC 8.3

Software-Defined Access Wireless

Configuring the WMIC for the First Time

Configuring VLANs CHAPTER

FortiNAC. Cisco Airespace Wireless Controller Integration. Version: 8.x. Date: 8/28/2018. Rev: B

Wireless LAN Controller Mesh Network Configuration Example

Cisco Wireless LAN Controller Module

CCNP SWITCH (22 Hours)

Summary. Deployment Guide: Configuring the Cisco Wireless Security Suite 1 OL

Configuring Auto-Anchor Mobility

Using RLX2-IHx Bridging Client on Cisco Wireless Infrastructure

Software-Defined Access Wireless

LAB: Configuring LEAP. Learning Objectives

Securing Cisco Wireless Enterprise Networks ( )

ISR Wireless Configuration Example

Deployment Guide for Cisco Guest Access Using the Cisco Wireless LAN Controller, Release 4.1

Cisco 440X Series Wireless LAN Controllers Deployment Guide

Cisco Aironet 350 (DS) AP IOS Software

Using Access Point Communication Protocols

Vendor: HP. Exam Code: HP2-Z32. Exam Name: Implementing HP MSM Wireless Networks. Version: Demo

Configuring a VAP on the WAP351, WAP131, and WAP371

accounting (SSID configuration mode) through encryption mode wep accounting (SSID configuration mode) through

Configuring VLANs. Understanding VLANs

Test Results Summary for Cisco Unified Wireless LAN Test 7.5 for Japan (Release )

WLAN Timeouts. Timeouts. Timeout for Disabled Clients. Session Timeout. Information About Configuring a Timeout for Disabled Clients

Cisco Exam. Volume: 147 Questions

accounting (SSID configuration mode) through encryption mode wep

Cisco Exam Questions and Answers (PDF) Cisco Exam Questions BrainDumps

Managing Rogue Devices

Real4Test. Real IT Certification Exam Study materials/braindumps

Mesh Deployment Modes

Template information can be overridden on individual devices.

AP Power and LAN Connections

CMX Connected Experiences- Social, SMS and Custom Portal Registration Configuration Example

EAP Authentication with RADIUS Server

Cisco Structured Wireless-Aware Network (SWAN) Implementation Guide

Configuring Management Frame Protection

Viewing Status and Statistics

Transcription:

Cisco WGBs, page 1 Third-Party WGBs and Client VMs, page 9 Cisco WGBs Information About Cisco A workgroup bridge (WGB) is a mode that can be configured on an autonomous IOS access point to provide wireless connectivity to a lightweight access point on behalf of clients that are connected by Ethernet to the WGB access point. A WGB connects a wired network over a single wireless segment by learning the MAC addresses of its wired clients on the Ethernet interface and reporting them to the lightweight access point using Internet Access Point Protocol (IAPP) messaging. The WGB provides wireless access connectivity to wired clients by establishing a single wireless connection to the lightweight access point. The lightweight access point treats the WGB as a wireless client. A Cisco IOS AP as a WGB using the Cisco IOS 15.2 or later releases support Protected Extensible Authentication Protocol (PEAP) with the controller. Figure 1: WGB Example 1

Information About Cisco If the lightweight access point fails, the WGB attempts to associate to another access point. The following are some guidelines for Cisco : The WGB can be any autonomous access point that supports the workgroup bridge mode and is running Cisco IOS Release 12.4(3g)JA or later releases (on 32-MB access points) or Cisco IOS Release 12.3(8)JEB or later releases (on 16-MB access points). These access points include the AP1120, AP1121, AP1130, AP1231, AP1240, and AP1310. Cisco IOS releases prior to 12.4(3g)JA and 12.3(8)JEB are not supported. If your access point has two radios, you can configure only one for workgroup bridge mode. This radio is used to connect to the lightweight access point. We recommend that you disable the second radio. Enable the workgroup bridge mode on the WGB as follows: On the WGB access point GUI, choose Workgroup Bridge for the role in radio network on the Settings > Network Interfaces page. On the WGB access point CLI, enter the station-role workgroup-bridge command. See the sample WGB access point configuration in the WGB Configuration Example section. The following features are supported for use with a WGB: Guest N+1 redundancy Local EAP Open, WEP 40, WEP 128, CKIP, WPA+TKIP, WPA2+AES, LEAP, EAP-FAST, and EAP-TLS authentication modes Wired clients connected to the WGB are not authenticated for security. Instead, the WGB is authenticated against the access point to which it associates. Therefore, we recommend that you physically secure the wired side of the WGB. Wired clients connected to a WGB inherit the WGB s QoS and AAA override attributes. To enable the WGB to communicate with the lightweight access point, create a WLAN and make sure that Aironet IE is enabled. If you have to apply ACL to WGB during run time, do not modify the ACL configuration for interface in the controller during run time. If you need to modify any ACLs, then you must disable all WLANs that are in the controller or disable both the 802.11a and 80.11b networks. Also, ensure that there are no clients associated and mapped to that interface and then you can modify the ACL settings. 2

Workgroup Bridge (WGB) Downstream Broadcast On Multiple VLANs Workgroup Bridge (WGB) Downstream Broadcast On Multiple VLANs Cisco Wireless LAN Controller (WLC) Release 8.3 provides an enhancement to broadcast traffic support on multiple 802.1Q VLAN workgroup bridge (WGB) deployments that traverse mesh networks and in Local mode. Specifically, support for WGB downstream broadcasts over multiple VLANs (to differentiate and prioritize traffic); and, bridging of VLAN traffic to wired clients connected to the WGB. Applications for this functionality are commonly found in the transportation and mining industries. For more information, see CSCub87583. Supported platforms: Access point (AP) and WGB support:: IW3700 Series 1552H/SA/SD/WU Series Supported AP mode: Local mode Bridge mode Figure 2: Workgroup Downstream Broadcast on Multiple VLAN Prerequisites You need to create the dynamic interfaces and bind them to the interface group before you proceed with the configuration. 3

Workgroup Bridge (WGB) Downstream Broadcast On Multiple VLANs 1 Create the dynamic interfaces, by choosing CONTROLLER > Interfaces > New on WLC. Add any dynamic interface that needs to support the downstream broadcast on Multiple VLANs feature into the interface group. 2 Bind the dynamic interfaces with Interface Groups, by choosing CONTROLLER > Interface Groups > Add Group on WLC. 3 Bind the Interface Groups to WLAN. Choose WLAN. Under the specific WLAN General confirmation tab, choose the proper interface group. Cisco Wireless Controller Configuration (CLI Only) To enable or disable the downlink broadcast packet VLAN tagging on a WLAN (new command): (Cisco Controller) >config wlan wgb broadcast-tagging {enable disable} wlan-id This feature is disabled by default. To enable this feature, you need to enable Broadcast Forwarding on WLC, by choosing Controller > General and choose Enabled from the Broadcast Forwarding drop-down list. To enable this feature, you should also configure the AP Multicast Mode to Multicast rather than Unicast, by clicking Controller > General > AP Multicast Mode and choosing Multicast, and then assign Multicast Group Address. WGB Configuration (CLI Only) You can configure the following on : Broadcast Tagging Native VLANs By default, Broadcast Tagging is disabled. By default, only Native VLAN broadcasts can be forwarded to wired clients in Native VLANs. You use the no command to disable VLAN configurations on the WGB as shown in the examples below. 4

Restrictions for Cisco When you have multiple VLAN configurations on WGB, you need to configure the encryption cipher mode and keys as the following example shows: encryption vlan 861 mode ciphers aes-ccm encryption vlan 862 mode ciphers aes-ccm encryption vlan 864 mode ciphers aes-ccm Then, you should configure the encryption cipher mode globally on the multicast or broadcast interface by entering the following command: encryption mode ciphers aes-ccm VLAN Broadcast Tagging Configuration To enable broadcast tagging on a VLAN (new command): (WGB) (config)#workgroup-bridge unified-vlan-client broadcast-tagging To disable broadcast tagging on a VLAN: (WGB) (config)#no workgroup-bridge unified-vlan-client broadcast-tagging The no workgroup-bridge unified-vlan-client broadcast-tagging command will disable workgroup-bridge unified-vlan-client as well. Make sure you have workgroup-bridge unified-vlan-client configured properly to enable the multiple vlan feature. Restrictions for Cisco The WGB can associate only with lightweight access points. Only WGBs in client mode (which is the default value) are supported. Those WGBs in infrastructure mode are not supported. Perform one of the following to enable client mode on the WGB: On the WGB access point GUI, choose Disabled for the Reliable Multicast to WGB parameter. On the WGB access point CLI, enter the no infrastructure client command. VLANs are not supported for use with WGBs. See the sample WGB access point configuration in the WGB Configuration Example section. The following features are not supported for use with a WGB: 5

Restrictions for Cisco Idle timeout Web authentication If a WGB associates to a web-authentication WLAN, the WGB is added to the exclusion list, and all of the WGB wired clients are deleted. The WGB supports a maximum of 20 wired clients. If you have more than 20 wired clients, use a bridge or another device. The DirectStream feature from the controller does not work for clients behind workgroup bridges and the stream is denied. With Layer 3 roaming, if you plug a wired client into the WGB network after the WGB has roamed to another controller (for example, to a foreign controller), the wired client s IP address displays only on the anchor controller, not on the foreign controller. If a wired client does not send traffic for an extended period of time, the WGB removes the client from its bridge table, even if traffic is continuously being sent to the wired client. As a result, the traffic flow to the wired client fails. To avoid the traffic loss, prevent the wired client from being removed from the bridge table by configuring the aging-out timer on the WGB to a large value using the following Cisco IOS commands on the WGB: configure terminal bridge bridge-group-number aging-time seconds exit end where bridge-group-number is a value between 1 and 255, and seconds is a value between 10 and 1,000,000 seconds. We recommend configuring the seconds parameter to a value greater than the wired client s idle period. When you delete a WGB record from the controller, all of the WGB wired clients records are also deleted. These features are not supported for wired clients connected to a WGB: MAC filtering Link tests Idle timeout The broadcast forwarding toward wired WGB clients works only on the native VLAN. If additional VLANs are configured, only the native VLAN forwards broadcast traffic. Wired clients behind a WGB cannot connect to a DMZ/Anchor controller. To enable wired clients behind a WGB to connect to an anchor controller in a DMZ, you must enable VLANs in the WGB using the config wgb vlan enable command. The dot11 arp-cache global configuration command that you can enter on the access point that is in WGB mode is not supported. WGB clients do not show enc-cipher and AKM because they are wired clients. WGB APs, however, show correct values of enc-cipher and AKM. 6

WGB Configuration Example WGB Configuration Example The following is an example of the configuration of a WGB access point using static WEP with a 40-bit WEP key: ap# configure terminal Enter configuration commands, one per line. End with CNTL/Z. ap(config)# dot11 ssid WGB_with_static_WEP ap(config-ssid)# authentication open ap(config-ssid)# guest-mode ap(config-ssid)# exit ap(config)# interface dot11radio 0 ap(config)# station-role workgroup-bridge ap(config-if)# encry mode wep 40 ap(config-if)# encry key 1 size 40 0 1234567890 ap(config-if)# ssid WGB_with_static_WEP ap(config-if)# end Verify that the WGB is associated to an access point by entering this command on the WGB: show dot11 association Information similar to the following appears: ap# show dot11 associations 802.11 Client Stations on Dot11Radio0: SSID [FCVTESTING] : MAC Address IP address Device Name Parent State 000b.8581.6aee 10.11.12.1 WGB-client map1 - Assoc ap# Viewing the Status of (GUI) Step 1 Step 2 Step 3 Choose Monitor > Clients to open the Clients page. The WGB text box on the right side of the page indicates whether any of the clients on your network are workgroup bridges. Click the MAC address of the desired client. The Clients > Detail page appears. The Client Type text box under Client Properties shows WGB if this client is a workgroup bridge, and the Number of Wired Client(s) text box shows the number of wired clients that are connected to this WGB. See the details of any wired clients that are connected to a particular WGB as follows: a) Click Back on the Clients > Detail page to return to the Clients page. b) Hover your cursor over the blue drop-down arrow for the desired WGB and choose Show Wired Clients. The WGB Wired Clients page appears. If you want to disable or remove a particular client, hover your cursor over the blue drop-down arrow for the desired client and choose Remove or Disable, respectively. c) Click the MAC address of the desired client to see more details for this particular client. The Clients > Detail page appears. 7

Viewing the Status of (CLI) The Client Type text box under Client Properties shows WGB Client, and the rest of the text boxes on this page provide additional information for this client. Viewing the Status of (CLI) Step 1 Step 2 See any WGBs on your network by entering this command: show wgb summary See the details of any wired clients that are connected to a particular WGB by entering this command: show wgb detail wgb_mac_address Debugging WGB Issues (CLI) Before You Begin Enable debugging for IAPP messages, errors, and packets by entering these commands: debug iapp all enable Enables debugging for IAPP messages. debug iapp error enable Enables debugging for IAPP error events. debug iapp packet enable Enables debugging for IAPP packets. Debug an roaming issue by entering this command: debug mobility handoff enable Debug an IP assignment issue when DHCP is used by entering these commands: debug dhcp message enable debug dhcp packet enable Debug an IP assignment issue when static IP is used by entering these commands: debug dot11 mobile enable debug dot11 state enable 8

Third-Party WGBs and Client VMs Third-Party WGBs and Client VMs Information About Non-Cisco When a Cisco workgroup bridge (WGB) is used, the WGB informs the access points of all the clients that it is associated with. The controller is aware of the clients associated with the access point. When non-cisco WGBs are used, the controller has no information about the IP address of the clients on the wired segment behind the WGB. Without this information, the controller drops the following types of messages: ARP REQ from the distribution system for the WGB client ARP RPLY from the WGB client DHCP REQ from the WGB client DHCP RPLY for the WGB client The following are some guidelines for non-cisco workgroup bridges: The controller can accommodate non-cisco WGBs so that the controller can forward ARP, DHCP, and data traffic to and from the wired clients behind workgroup bridges by enabling the passive client feature. To configure your controller to work with non-cisco WGBs, you must enable the passive client feature so that all traffic from the wired clients is routed through the WGB to the access point. All traffic from the wired clients is routed through the work group bridge to the access point. For FlexConnect APs in local switching, non-cisco workgroup-bridge clients in bridged mode are supported using the config flexconnect group group-name dhcp overridden-interface enable command. When a WGB wired client leaves a multicast group, the downstream multicast traffic to other WGB wired clients is interrupted briefly. If you have clients that use PC virtualization software such as VMware, you must enable this feature. We have tested multiple third-party devices for compatibility but cannot ensure that all non-cisco devices work. Support for any interaction or configuration details on the third-party device should be discussed with the device manufacturer. You must enable the passive client functionality for all non-cisco workgroup bridges. You might need to use the following commands to configure DHCP on clients: Disable DHCP proxy by using the config dhcp proxy disable command. Enable DHCP boot broadcast by using the config dhcp proxy disable bootp-broadcast enable command. 9

Restrictions for Non-Cisco Restrictions for Non-Cisco Only Layer 2 roaming is supported for WGB devices. Layer 3 security (web authentication) is not support for WGB clients. Visibility of wired hosts behind a WGB on a controller is not supported because the non-cisco WGB device performs MAC hiding. Cisco WGB supports IAPP. ARP poisoning detection does not work on a WLAN when the flag is enabled. VLAN select is not supported for WGB clients. Some third-party WGBs need to operate in non-dhcp relay mode. If problems occur with the DHCP assignment on devices behind the non-cisco WGB, use the config dhcp proxy disable and config dhcp proxy disable bootp-broadcast disable commands. The default state is DHCP proxy enabled. The best combination depends on the third-party characteristics and configuration. 10