on 04-01-2024 10:54 AM
With the evolution of software defined networking (SDN) and cloud native technologies, every organization is looking for a network solution in their campus which has following characteristics:
Cisco offers combination of Meraki wireless and SDA fabric solution for large to medium size customers to achieve all the above mentioned characteristics of campus network solution.
Cisco Meraki cloud managed WiFi access points (AP) are easy to manage enterprise wireless LAN and other side Cisco Software Defined Access (SDA) is very popular software defined campus access networking solution. Thus, many Cisco customers are looking forward to deploy Meraki WiFi AP over SDA campus.
This document describes validated design with Control, data and management packet flows, software and hardware details used during testing, step by step on-boarding configuration and detailed test procedure to validate successful on-boarding of Meraki AP onboard over Cisco SDA Fabric.
Before going into the configuration and testing steps, lets first understand the existing SDA Fabric wireless design and Meraki wireless design. After having clear understanding of both the wireless network design, you will learn configuration and testing of Meraki wireless over SDA fabric.
SDA wireless solution is controller managed solution, where in AP is wireless extender of wireless controller. All the management, control and data traffic flow through controller, as depicted in diagrams below.
Management data: The data (configuration, statistics, monitoring, etc.) that flows from Meraki devices (wireless access points, switches, security appliances) to the Meraki cloud over a secure internet connection.
User data: Data related to user traffic (web browsing, internal applications, etc.). User data does not flow through the Meraki cloud, instead flowing directly to their destination on the LAN or across the WAN.
Meraki uses an event-driven remote procedure call (RPC) engine for Meraki devices to communicate to the dashboard and for Meraki servers to send and receive data. Meraki hardware devices act as the server/receiver as the Meraki cloud initiates calls to the devices for data collection and configuration deployment. The cloud infrastructure is the initiator, so configurations can be executed in the cloud before the devices are actually online or even physically deployed.
Now, lets see how this hybrid solution can be deployed and tested.
This solution design is tested in lab environment where following hardware and software version are used:
Below is the Physical diagram of the Meraki AP with SDA infrastructure used for the testing.
Lab setup is created with standard SDA design where Border and control functionalities are running on Catalyst 9500 and fabric edge node is running with Catalyst 9300. Meraki AP MR series is connected to fabric edge.
In lab configuration, below steps were followed to onboard the Meraki APs in SDA Fabric:
This is required due to a limitation in the Catalyst Center UI that the flooding on the AP Pool cannot be enabled.
int gig1/0/20
switchport trunk native vlan 4062
switchport trunk allowed vlan 4062,24,99,1023
switchport mode trunk
spanning-tree bpduguard enable
int gig1/0/20
no device-tracking attach-policy IPDT_POLICY
After configuring above steps we can see that AP is reachable and available in Meraki dashboard. AP has got IP address from the ip pool, Meraki_AP_MGMT, that was configured in Cisco catalyst center. From Meraki dashboard we can ping IP address of the AP.
Really helpful in deploying the meraki wireless in SDA fabric.
It will be good to cover other details like how the Data plane connection from Meraki AP is different to Fabric Edge compared to Catalyst AP. example - Catalyst AP (FEW) mode will create the VXLAN with the Fabric edge when connected directly or when behind Extended nodes. Authors should also include ports/protocols that need to be opened to allow communication from MR APs to the Meraki cloud.
Great document. Can you apply and enforce an SGT tag policy to an authorized wireless endpoint connected to a Meraki AP in the SDA environment?
What's the reason we need the remove the IPDT policy with the command:
no device-tracking attach-policy IPDT_POLICY
Is it for roaming?
Do you also need to enable the Intra-Subnet Routing?
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: