Example for Configuring VPN Traversal Between the AC and APs
Service Requirements
Enterprise users can access the network through WLANs, which is the basic requirement of mobile office. Furthermore, users' services are not affected during roaming in the coverage area.
APs are located in an enterprise branch, while the AC is located at the headquarters. Administrators require unified AP management by the AC and protection on traffic exchanged between the branch and headquarters. Therefore, an IPSec tunnel is established between the branch and headquarters to protect traffic.
Networking Requirements
- AC networking mode: IPSec tunnel between the AC at the headquarters and APs in the branch.
- DHCP deployment mode: Router_1 functions as a DHCP server to assign IP addresses to APs and STAs.
- Service data forwarding mode: direct forwarding
Data Planning
Item |
Data |
---|---|
WLAN service data planning on the AC |
|
Management VLAN for APs |
VLAN 200 |
Service VLAN for STAs |
VLAN 101 |
DHCP server |
Router_1 functions as a DHCP server to assign IP addresses to APs and STAs. |
IP address pool for APs |
10.23.100.2-10.23.100.254/24 |
IP address pool for STAs |
10.23.101.2-10.23.101.254/24 |
AC's source interface address |
VLANIF 200: 10.23.200.1/24 |
AP group |
|
Regulatory domain profile |
|
SSID profile |
|
Security profile |
|
VAP profile |
|
IPSec data planning on Router_2 |
|
IKE parameters |
|
IPSec parameters |
|
IPSec policy |
Connection name: map1
|
Configuration Roadmap
- Configure network interworking of the AC, APs, and other network devices.
- Configure IPSec parameters to set up an IPSec tunnel.
Configure an IP address and a static route on each interface to implement communication between both ends.
Configure ACLs and define the data flows to be protected by the IPSec tunnel.
Configure an IPSec proposal to define the traffic protection method.
Configure IKE peers and define the attributes used for IKE negotiation.
Configure an IPSec policy, and apply the ACL, IPSec proposal, and IKE peers to the IPSec policy to define the data flows to be protected and protection method.
Apply the IPSec policy to the interface so that the interface can protect traffic.
- Configure the APs to go online.
- Create an AP group and add APs that require the same configuration to the group for unified configuration.
- Configure AC system parameters, including the country code and source interface used by the AC to communicate with the APs.
- Configure the AP authentication mode and import the APs offline to allow the APs to go online.
- Configure WLAN service parameters for STAs to access the WLAN.
Configuration Notes
- No ACK mechanism is provided for multicast packet transmission on air interfaces. In addition, wireless links are unstable. To ensure stable transmission of multicast packets, they are usually sent at low rates. If a large number of such multicast packets are sent from the network side, the air interfaces may be congested. You are advised to configure multicast packet suppression to reduce impact of a large number of low-rate multicast packets on the wireless network. Exercise caution when configuring the rate limit; otherwise, the multicast services may be affected.
- In direct forwarding mode, you are advised to configure multicast packet suppression on switch interfaces connected to APs.
- In tunnel forwarding mode, you are advised to configure multicast packet suppression in traffic profiles of the AC.
Configure port isolation on the interfaces of the device directly connected to APs. If port isolation is not configured and direct forwarding is used, a large number of unnecessary broadcast packets may be generated in the VLAN, blocking the network and degrading user experience.
In tunnel forwarding mode, the management VLAN and service VLAN cannot be the same. Only packets from the management VLAN are transmitted between the AC and APs. Packets from the service VLAN are not allowed between the AC and APs.
Procedure
- Configure the network devices.# On Switch, add GE0/0/1 and GE0/0/2 to VLAN 100 and VLAN 101. VLAN 100 is the default VLAN of GE0/0/1.
<HUAWEI> system-view [HUAWEI] sysname Switch [Switch] vlan batch 100 101 [Switch] interface gigabitethernet 0/0/1 [Switch-GigabitEthernet0/0/1] port link-type trunk [Switch-GigabitEthernet0/0/1] port trunk pvid vlan 100 [Switch-GigabitEthernet0/0/1] port trunk allow-pass vlan 100 101 [Switch-GigabitEthernet0/0/1] port-isolate enable [Switch-GigabitEthernet0/0/1] quit [Switch] interface gigabitethernet 0/0/2 [Switch-GigabitEthernet0/0/2] port link-type trunk [Switch-GigabitEthernet0/0/2] port trunk allow-pass vlan 100 101 [Switch-GigabitEthernet0/0/2] quit
# On Router_1, add GE1/0/0 to VLAN 100 and VLAN 101. If the peer end of GE0/0/1 is at 192.168.1.2/24, set the IP address of GE0/0/1 to 192.168.1.1/24.<Huawei> system-view [Huawei] sysname Router_1 [Router_1] vlan batch 100 101 [Router_1] interface gigabitethernet 1/0/0 [Router_1-GigabitEthernet1/0/0] port link-type trunk [Router_1-GigabitEthernet1/0/0] port trunk allow-pass vlan 100 101 [Router_1-GigabitEthernet1/0/0] quit [Router_1] interface gigabitethernet 0/0/1 [Router_1-GigabitEthernet0/0/1] ip address 192.168.1.1 255.255.255.0 [Router_1-GigabitEthernet0/0/1] quit
# Configure a default route with the next hop address 192.168.1.2 on Router_1.[Router_1] ip route-static 0.0.0.0 0.0.0.0 192.168.1.2
# On Router_2, add GE1/0/0 to VLAN 200. Create VLANIF 200 and set its IP address to 10.23.200.2/24. If the peer end of GE0/0/1 is at 192.168.2.2/24, set the IP address of GE0/0/1 to 192.168.2.1/24.<Huawei> system-view [Huawei] sysname Router_2 [Router_2] vlan batch 200 [Router_2] interface gigabitethernet 1/0/0 [Router_2-GigabitEthernet1/0/0] port link-type trunk [Router_2-GigabitEthernet1/0/0] port trunk allow-pass vlan 200 [Router_2-GigabitEthernet1/0/0] quit [Router_2] interface gigabitethernet 0/0/1 [Router_2-GigabitEthernet0/0/1] ip address 192.168.2.1 255.255.255.0 [Router_2-GigabitEthernet0/0/1] quit [Router_2] interface vlanif 200 [Router_2-Vlanif200] ip address 10.23.200.2 24 [Router_2-Vlanif200] quit
# Configure a static route from Router_2 to APs with the next hop address 192.168.2.2 on Router_2.[Router_2] ip route-static 10.23.100.0 255.255.255.0 192.168.2.2 [Router_2] ip route-static 192.168.1.0 255.255.255.0 192.168.2.2
- Configure a DHCP server to assign IP addresses to APs and STAs.# Configure Router_1 as a DHCP server to assign IP addresses to APs and STAs.
[Router_1] dhcp enable [Router_1] interface vlanif 100 [Router_1-Vlanif100] ip address 10.23.100.1 255.255.255.0 [Router_1-Vlanif100] dhcp select global [Router_1-Vlanif100] quit [Router_1] ip pool ap [Router_1-ip-pool-ap] gateway-list 10.23.100.1 [Router_1-ip-pool-ap] network 10.23.100.0 mask 24 [Router_1-ip-pool-ap] option 43 sub-option 3 ascii 10.23.200.1 [Router_1-ip-pool-ap] quit [Router_1] interface vlanif 101 [Router_1-Vlanif101] ip address 10.23.101.1 255.255.255.0 [Router_1-Vlanif101] dhcp select interface [Router_1-Vlanif101] quit
Configure the DNS server as required. The common methods are as follows:- In interface address pool scenarios, run the dhcp server dns-list ip-address &<1-8> command in the VLANIF interface view.
- In global address pool scenarios, run the dns-list ip-address &<1-8> command in the IP address pool view.
- Configure ACLs and define the data flows to be protected by the IPSec tunnel.# On Router_2, configure an ACL to protect the data flows from the AC (IP address 10.23.200.0/24) at the headquarters to the APs (IP address 10.23.100.0/24) in the branch.
[Router_2] acl number 3101 [Router_2-acl-adv-3101] rule permit ip source 10.23.200.0 0.0.0.255 destination 10.23.100.0 0.0.0.255 [Router_2-acl-adv-3101] quit
# On Router_1, configure an ACL to protect the data flows from the APs (IP address 10.23.100.0/24) in the branch to the AC (IP address 10.23.200.0/24) at the headquarters.[Router_1] acl number 3101 [Router_1-acl-adv-3101] rule permit ip source 10.23.100.0 0.0.0.255 destination 10.23.200.0 0.0.0.255 [Router_1-acl-adv-3101] quit
- Configure IPSec.
- Configure system parameters for the AC.
- Configure APs to go online.
- Configure WLAN services.
# Click Create. The Basic Information page is displayed.
# Set the SSID name, forwarding mode, and service VLAN.
# Click Next. The Security Authentication page is displayed.
# Set Security settings to Key (applicable to personnel networks) and set the key.
# Click Next. The Access Control page is displayed.
# Set Binding the AP group to ap-group1.
# Click Finish.
- Set the AP channel and power.
- Verify the configuration.