Network Deployment in Small- and Medium-Sized Stores (AR Router Functioning as an Egress Gateway)
Application Scenario and Service Requirements
Application Scenario
This case is applicable to a small- or medium-sized store with multiple APs deployed to provide wireless access. In the store, a small number of wired terminals are allowed to access the network and about 200 guests access the network concurrently in peak hours.
Service Requirements
A small- or medium-sized store intends to build a network and has the following requirements:
- Guests access the Internet using wireless terminals. There are approximate 200 guests in peak hours.
- The store provides Internet access and mobile office services for employees who use wireless and wired terminals. There are around 20 employees in the store.
- Wireless terminals can access the Internet only after successful authentication.
Solution Design
Figure 2-81 shows a recommended networking based on service requirements.
- Wired access
Employees can work and access the Internet using wired terminals in the management area.
In the networking, the S5731-S functions as both a DHCP server to assign IP addresses to wired terminals and a wired access gateway.
- Wi-Fi coverage
A WLAN covers the guest area and management area. Using wireless terminals, guests in the guest area can access the Internet and employees in the management area can work and access the Internet as well.
In the networking, the AC6605 manages wireless services, and APs register with the AC across a Layer 3 network and forward service data packets in direct forwarding mode.
The S5731-S functions as a DHCP server to assign IP addresses to all APs and wireless terminals.
- Network egress
Network address translation (NAT) is configured on the AR6300 to translate public and private IP addresses.
The AR6300 connects to the Internet through PPPoE dial-up.
- Security
An ACL is configured on the S5731-S to control guest access so that wireless users in the guest area can access only the Internet but not terminals in the management area.
The AC6605 manages wireless services. Wireless terminals in the guest area and management area use Portal authentication and WPA-WPA2 authentication, respectively.
In this case, eight APs are deployed in the guest area, and one AP and one wired terminal (PC) are deployed in the management area. Determine the number of APs and wired terminals in each area as needed.
To prevent interference between APs and ensure optimal WLAN coverage, determine the positions where APs are to be installed, channel, bandwidth, and cabling solution according to WLAN Network Planning Guide before deploying APs.
Deployment Roadmap and Data Plan
Deployment Roadmap
- Configure the egress router AR6300.
- Configure PPPoE dialup for Internet access.
- Configure the LAN.
- Configure routes.
- Configure the S5731-S switch.
- Create VLANs, create VLANIF interfaces, and configure IP addresses for the VLANIF interfaces.
- Add VLANs to interfaces on the switch.
- Enable the DHCP server function. The switch then can assign IP addresses to APs, and wired and wireless terminals.
- Configure an ACL to control user access. Guests in the guest area can access only the Internet. This ensures data security in the management area.
- Configure a default static route with the next hop being the IP address of a downlink interface on the egress router.
- Configure the AC6605.
- Configure network interconnection.
- Configure APs to go online.
- Configure WLAN services.
Data Plan
Item |
Description |
---|---|
VLAN 100 |
Wireless access management VLAN of the AC, also used for communication between the switch and AC |
VLAN 102 |
VLAN to which APs belong |
VLAN 103 |
VLAN to which uplink interfaces of the switch belong, used for communication between the switch and AR router |
VLAN 2000 |
Wireless access VLAN in the guest area |
VLAN 2100 |
Wireless access VLAN in the management area |
VLAN 2200 |
Wired access VLAN in the management area |
Device |
Interface Number |
VLAN to Which the Interface Belongs |
IP Address |
Description |
---|---|---|---|---|
AR6300 |
GE0/0/2 |
- |
10.103.1.2/24 |
Downlink interface for communicating with the S5731-S |
GE0/0/0 |
- |
Negotiated IP address |
Uplink egress connected to an external network |
|
S5731-S |
GE0/0/1 to GE0/0/8 |
VLAN 102 and VLAN 2000 |
VLANIF 102: 10.102.1.1/24 VLANIF 2000: 192.168.200.1/24 |
Interfaces connected to the AP6050DNs in the guest area |
GE0/0/9 |
VLAN 102 and VLAN 2100 |
VLANIF 102: 10.102.1.1/24 VLANIF 2100: 192.168.210.1/24 |
Interface connected to the AP6050DN in the management area |
|
GE0/0/10 |
VLAN 2200 |
VLANIF 2200: 192.168.220.1/24 |
Interface providing access for a wired terminal in the management area |
|
GE0/0/11 |
VLAN 100 |
VLANIF 100: 10.100.1.1/24 |
Interface connected to the AC6605 |
|
GE0/0/12 |
VLAN 103 |
VLANIF 103: 10.103.1.1/24 |
Interface connected to the AR6300 |
|
AC6605 |
GE0/0/1 |
VLAN 100 |
10.100.1.2/24 |
Interface connected to the S5731-S |
Device |
Destination IP Address/Mask |
Next Hop/Outbound Interface |
Description |
---|---|---|---|
AR6300 |
10.102.1.0/24 |
10.103.1.1 |
Route destined for APs |
192.168.200.0/24 |
10.103.1.1 |
Route destined for wireless terminals in the guest area |
|
192.168.210.0/24 |
10.103.1.1 |
Route destined for wireless terminals in the management area |
|
192.168.220.0/24 |
10.103.1.1 |
Route destined for wired terminals in the management area |
|
S5731-S |
0.0.0.0/0.0.0.0 |
10.103.1.2 |
Default route |
AC6605 |
0.0.0.0/0.0.0.0 |
10.100.1.1 |
Default route with the next hop being VLANIF 100 of the switch |
Item |
Data |
---|---|
Source NAT policy |
Enabled |
Internet access mode |
PPPoE dial-up |
LAN gateway address/mask |
10.103.1.2/255.255.255.0 |
Item |
Data |
---|---|
VLAN |
VLAN 100 VLAN 102 VLAN 103 VLAN 2000 VLAN 2100 VLAN 2200 |
IP address |
VLANIF 100: 10.100.1.1/24 VLANIF 102: 10.102.1.1/24 VLANIF 103: 10.103.1.1/24 VLANIF 2000: 192.168.200.1/24 VLANIF 2100: 192.168.210.1/24 VLANIF 2200: 192.168.220.1/24 |
DHCP |
Interface address pools: VLANIF 102: 10.102.1.1/24 (for APs); DHCP server option: 43; sub-option: 3; ascii: 10.100.1.2 VLANIF 2000: 192.168.200.1/24 (for wireless terminals in the guest area) VLANIF 2100: 192.168.210.1/24 (for wireless terminals in the management area) VLANIF 2200: 192.168.220.1/24 (for wired terminals in the management area) |
DNS server |
IP address: 114.114.114.114 |
ACL |
|
Item |
Data |
---|---|
Management VLAN for APs |
VLAN 100 |
WLAN AC source interface |
VLANIF 100: 10.100.1.2/24 |
Guest Wi-Fi (covering the guest area) |
|
Employee Wi-Fi (covering the guest and management areas) |
|
Authentication-free rule |
DNS server address: 114.114.114.114 |
Device Requirements and Versions
Deployment Procedure
Configuring the AR6300
Preparations
Before the configuration, log in to the web system of the AR router using a PC and perform the following operations:
- Change the IP address of the PC to 192.168.1.x, for example, 192.168.1.100. The IP address cannot be set to 192.168.1.1.
- Connect the PC to the management interface (marked with the Management silkscreen) of the AR router using Ethernet cables.
- Visit https://192.168.1.1 using a browser on the PC and log in using the default username and password. The default username and password are available in AR Router Default Usernames and Passwords (Enterprise Network or Carrier). If you have not obtained the access permission of the document, see Help on the website to find out how to obtain it.
Change the password as prompted upon the first login.
Configuring the S5731-S
Preparations
Before the configuration, you need to log in to the web system of the switch using a PC and perform the following operations.
In this example, all configurations of the S5731-S are performed in traditional management mode. If the switch is in NETCONF mode, log in to the switch through the web system and switch to the traditional management mode.
- Connect the PC to the first Ethernet interface on the switch using network cables.
- Press and hold down the MODE button for at least 6 seconds. When all indicators on the switch are steady green, the switch enters the initial configuration mode. After the switch enters the initial configuration mode, the default IP address 192.168.1.253/24 is configured for VLANIF 1 by default.
- Configure the PC with an IP address that is on the same subnet as the default IP address of the switch so that the PC and switch can communicate with each other at Layer 3.
- Visit https://192.168.1.253 using a browser on the PC and log in using the default username and password. Change the password as prompted upon the first login. The default username and password are available in S Series Switches Default Usernames and Passwords (Enterprise Network or Carrier). If you have not obtained the access permission of the document, see Help on the website to find out how to obtain it.
- By default, the switch works in traditional management mode. If the switch works in NETCONF mode, log in to the switch's web system, choose Device Working Mode to Traditional management mode, and click Apply. , set
Procedure
- Create VLANs, create VLANIF interfaces, and configure IP addresses for the VLANIF interfaces.
- Add interfaces on the switch to VLANs.
- Enable the DHCP server function.
- Configure an ACL to limit access of wireless end users in the guest area.
- Choose Configuration > Security Services > ACL from the main menu. The ACL configuration page is displayed.
- Click the VLAN ACL tab, set VLAN ID to 2000, and click Add to add an ACL rule.Figure 2-94 Configuring an ACL rule
Table 2-129 describes the involved configuration items.
- Click Apply. ACL rules are configured.
- Configure a default route.Click
, as shown in Figure 2-95. The default route is configured.
Configuring the AC6605
Preparations
- Activate the license on the Huawei ESDP website by binding the activation password to the ESN of the WLAN AC, that is, the SN on the label. Then download the generated license file.
Before the configuration, you need to log in to the web system of the WLAN AC using a PC and perform the following operations:
- Change the IP address of the wired network port on the PC to 169.254.1.x, such as 169.254.1.100. The IP address cannot be set to 169.254.1.1.
- Connect the PC to any idle network port on the AC using a network cable.
- Visit https://169.254.1.1 using a browser on the PC and log in using the default username and password. The default username and password are available in WLAN Default Usernames and Passwords (Enterprise Network or Carrier). If you have not obtained the access permission of the document, see Help on the website to find out how to obtain it.
Change the password as prompted upon the first login.
Verifying the Configuration
- Verify whether guests in the guest area can access the WLAN and ensure that the following requirements can be met:
- The WLAN with the SSID guest is available to wireless end users in the guest area. After connecting to WLAN and performing operations as promoted, guests can be authenticated successfully and access the Internet.
- Wireless terminals in the guest area can obtain IP addresses on the subnet 192.168.200.0/24 after associating with the SSID guest.
- Wireless end users in the guest area, such as guests using laptops, cannot ping the wireless access gateway (192.168.210.1) in the management area.
- Verify whether employees in the management area can access the Internet and ensure that the following requirements are met:
- The WLAN with the SSID employee is available to wireless end users in the management area. End users have access to the Internet after entering the password YsHsjx_202206.
- Wireless terminals in the management area can obtain IP addresses on the subnet 192.168.210.0/24 after associating with the SSID employee.
- Wired end users in the management area can access the Internet and obtain IP addresses on the subnet 192.168.220.0/24.
- Wired end users in the management area can ping the wireless access gateway (192.168.210.1) in the management area.
Configuration Files
# dns resolve dns proxy enable # acl name GigabitEthernet0/0/0 2999 rule 5 permit # interface Dialer1 link-protocol ppp ppp chap user admin ppp chap password cipher %^%#Tj#S%h%p:+J`b#~!2&lFqh79>gVT0<Br@=(H43UN%^%# ppp pap local-user admin password cipher %^%#qLq_5;^}n*B#['~ii{+.]U)0U\ra`PB\7:ZXL=\I%^%# ppp ipcp dns admit-any ppp ipcp dns request ip address ppp-negotiate dialer user arweb dialer bundle 1 dialer number 1 autodial dialer-group 1 nat outbound 2999 # interface Vlanif1 ip address 10.103.1.2 255.255.255.0 # interface GigabitEthernet0/0/0 pppoe-client dial-bundle-number 1 # interface GigabitEthernet0/0/2 portswitch # dialer-rule dialer-rule 1 ip permit # ip route-static 0.0.0.0 0.0.0.0 Dialer1 ip route-static 10.102.1.0 255.255.255.0 10.103.1.1 ip route-static 192.168.200.0 255.255.255.0 10.103.1.1 ip route-static 192.168.210.0 255.255.255.0 10.103.1.1 ip route-static 192.168.220.0 255.255.255.0 10.103.1.1 # return
# vlan batch 100 102 to 103 2000 2100 2200 # dhcp enable # acl name vlan2000 3999 rule 5 deny ip source 192.168.200.0 0.0.0.255 destination 192.168.220.0 0.0.0.255 rule 10 deny ip source 192.168.200.0 0.0.0.255 destination 192.168.210.0 0.0.0.255 # interface Vlanif100 ip address 10.100.1.1 255.255.255.0 # interface Vlanif102 ip address 10.102.1.1 255.255.255.0 dhcp select interface dhcp server dns-list 114.114.114.114 dhcp server option 43 sub-option 3 ascii 10.100.1.2 # interface Vlanif103 ip address 10.103.1.1 255.255.255.0 # interface Vlanif2000 ip address 192.168.200.1 255.255.255.0 dhcp select interface dhcp server dns-list 114.114.114.114 # interface Vlanif2100 ip address 192.168.210.1 255.255.255.0 dhcp select interface dhcp server dns-list 114.114.114.114 # interface Vlanif2200 ip address 192.168.220.1 255.255.255.0 dhcp select interface dhcp server dns-list 114.114.114.114 # interface GigabitEthernet0/0/1 port link-type trunk port trunk pvid vlan 102 undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 102 2000 # interface GigabitEthernet0/0/2 port link-type trunk port trunk pvid vlan 102 undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 102 2000 # interface GigabitEthernet0/0/3 port link-type trunk port trunk pvid vlan 102 undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 102 2000 # interface GigabitEthernet0/0/4 port link-type trunk port trunk pvid vlan 102 undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 102 2000 # interface GigabitEthernet0/0/5 port link-type trunk port trunk pvid vlan 102 undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 102 2000 # interface GigabitEthernet0/0/6 port link-type trunk port trunk pvid vlan 102 undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 102 2000 # interface GigabitEthernet0/0/7 port link-type trunk port trunk pvid vlan 102 undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 102 2000 # interface GigabitEthernet0/0/8 port link-type trunk port trunk pvid vlan 102 undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 102 2000 # interface GigabitEthernet0/0/9 port link-type trunk port trunk pvid vlan 102 undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 102 2100 # interface GigabitEthernet0/0/10 port link-type access port default vlan 2200 loopback-detect enable port description desktop undo trust 8021p # interface GigabitEthernet0/0/11 port link-type trunk undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 100 # interface GigabitEthernet0/0/12 port link-type access port default vlan 103 # ip route-static 0.0.0.0 0.0.0.0 10.103.1.2 # traffic-filter vlan 2000 inbound acl name vlan2000 # return
# portal local-server ip 10.100.1.3 portal local-server url 10.100.1.3 portal local-server https ssl-policy default_policy port 20000 # vlan batch 100 2000 2100 2200 # authentication-profile name guest portal-access-profile guest web-description inner+local authentication-scheme guest # free-rule-template name default_free_rule free-rule 1 destination ip 114.114.114.114 mask 255.255.255.255 # portal-access-profile name guest portal local-server enable # aaa authentication-scheme guest authentication-mode none local-user admin password irreversible-cipher $1a$D[%AQ7aQQ0$z%oZMBn:`%##J2VG6;R&~1n!JTfvI0t`+uH`<K+)$ # interface Vlanif100 ip address 10.100.1.2 255.255.255.0 # interface GigabitEthernet0/0/1 port link-type trunk undo port trunk allow-pass vlan 1 port trunk allow-pass vlan 100 # ip route-static 0.0.0.0 0.0.0.0 10.100.1.1 # capwap source interface vlanif100 # wlan traffic-profile name guest rate-limit client up 1000 rate-limit client down 2000 security-profile name guest security open security-profile name employee security wpa-wpa2 psk pass-phrase %^%#F)&d'L_r}$$%`O9)#'>O%I*KC<O^!X%kI+6V'HhK%^%# aes-tkip ssid-profile name guest ssid guest ssid-profile name employee ssid employee vap-profile name guest service-vlan vlan-id 2000 ssid-profile guest security-profile guest traffic-profile guest authentication-profile guest vap-profile name employee service-vlan vlan-id 2100 ssid-profile employee security-profile employee ap-group name ap-group1 radio 0 vap-profile guest wlan 1 vap-profile employee wlan 2 radio 1 vap-profile guest wlan 1 vap-profile employee wlan 2 radio 2 vap-profile guest wlan 1 vap-profile employee wlan 2 ap-group name ap-group2 radio 0 vap-profile employee wlan 1 radio 1 vap-profile employee wlan 1 radio 2 vap-profile employee wlan 1 ap-id 0 type-id 30 ap-mac 00e0-fc76-e360 ap-sn 210235449210CB000010 ap-group ap-group1 ap-id 1 type-id 30 ap-mac 00e0-fc76-e361 ap-sn 210235449210CB000011 ap-group ap-group1 ap-id 2 type-id 30 ap-mac 00e0-fc76-e362 ap-sn 210235449210CB000012 ap-group ap-group1 ap-id 3 type-id 30 ap-mac 00e0-fc76-e363 ap-sn 210235449210CB000013 ap-group ap-group1 ap-id 4 type-id 30 ap-mac 00e0-fc76-e364 ap-sn 210235449210CB000014 ap-group ap-group1 ap-id 5 type-id 30 ap-mac 00e0-fc76-e365 ap-sn 210235449210CB000015 ap-group ap-group1 ap-id 6 type-id 30 ap-mac 00e0-fc76-e366 ap-sn 210235449210CB000016 ap-group ap-group1 ap-id 7 type-id 30 ap-mac 00e0-fc76-e367 ap-sn 210235449210CB000017 ap-group ap-group1 ap-id 8 type-id 30 ap-mac 00e0-fc76-e368 ap-sn 210235449210CB000018 ap-group ap-group1 ap-id 9 type-id 56 ap-mac 00e0-fc76-e369 ap-sn 210235449210CB000019 ap-group ap-group2 # return