04-29-2022 07:35 AM - edited 10-19-2023 12:41 PM
So maybe I am over thinking this or perhaps its not possible. I am trying to have clients maintain internal network connectivity by means of their VLAN and access internet for any http/https traffic. Similar to split tunneling or split traffic like we do with VPN. One would think I can connect an outside internet line to the WLC and perhaps configure an SVI and allow access to VLAN xxx out to the internet?
We have a network that is fairly simplistic.
The wireless clients are on VLANxxx. They get internal DHCP, and authenticate to RADIUS. We are trying to create a local breakout to the internet for their internet traffic so it does not hit our MPLS line and use precious resource. I know the WLC has Layer capabilities so I wonder if I can somehow setup a direct local breakout from this, or should I do inter VLAN routing, or is there an easier path? Internet ISP can be routable if needed, abut I have an internal IP from its own switch at: 10.x.x.x
Here is a simple diagram:
Outside internet to connect to WLC (10.x.x.x)
^
Client> AP (flex) > WLC (Has SSID and VLAN SVI)/Switch > Core
04-29-2022 07:45 AM
If your SSID is already in flexconnect mode, then the solution is pretty easy. Is basically routing task. Corp traffic you sent do MPLS and internet traffic you send local.
From a Security perspective, we could add a firewall on the topology but from connectivity perspective, no required.
04-29-2022 08:11 AM - edited 10-19-2023 12:42 PM
Our APs are in flexconnect but are local to the facility. The wireless clients are on the VLANxxxx from cores and our APs are on VLANxx for management. The outside internet is also provided here. What would be a configuration to try? There is no route to outside internet.
04-29-2022 08:47 AM
The important thing is the WLAN.. Is the option "FlexConnect Local Switching " checked on the WLC? If not, then the traffic is sent to the WLC and then the scenario is different.
04-29-2022 08:50 AM - edited 10-19-2023 12:42 PM
Removed
04-30-2022 08:00 AM
I know this feature but I am not sure it can apply in WLC9800
05-07-2022 04:36 AM - edited 05-07-2022 04:39 AM
Office-extend is a different feature - designed for homeworkers and probably not appropriate for this scenario. Also that guide is for AireOS.
Some things still not clear from your descriptions:
- Is your WLC on the same site as the APs or is the WLC at a different site? (I'm getting the impression the WLC is at a separate central site)
- You want to break out the internet traffic at the local site?
- Your "simple diagram" doesn't show what's between the AP and the WLC - so what is there? Or are you saying your AP is physically connected directly to the WLC?
Might be easier to put your diagram on a drawing showing all the relevant connectivity. It's very difficult to answer your question without knowing all those details.
For general Flexconnect overview: https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/213945-understand-flexconnect-on-9800-wireless.html
There is a feature called Split Tunneling for FlexConnect that you might be able to use although it's really intended for accessing specific local services eg. printer. But you might be able to use it to break out everything except the traffic going to specific core services.
Actually looking at their example I think they're doing exactly what you want to - sending a specific IP for central switching and everything else local.
05-09-2022 01:11 PM - edited 10-19-2023 12:44 PM
We tried setting up a VRF on our 9300 switches with network advantage only to realize they are not VRF NAT aware, the 16.12.4 ios at least does not support the vrf statement for ip nat inside. So back to the WLC:
Our WLC and APs are all local to one site. Wireless management on VLAN xx (along with controller IP) and APs. Clients getting IP off VLAN xx, and mobile clients we have setup for VLAN xxx (10.74.x.x). We are trying to give mobile clients direct internet connectivity without the use of another router or FW. Then ACL it off. We saw that the WLC had routing capabilities with NAT, so we figured we will try.
We simply want to give clients access to the internet without going through our local MPLS.
05-09-2022 03:39 PM
9800 is not supposed to be used as a router, with or without VRF.
Many router commands functions may still be there and some may even work but wireless BU have been removing them from the WLC IOS-XE so even if they work today they might not work in the next release. If you use them then you do so at your own risk.
Why not do the NAT in global VRF on 9300L? (if it even supports that?) The 9300L range is basic and really only intended as a simple switch so no surprise it doesn't support advanced routing features.
05-09-2022 04:23 PM - edited 10-19-2023 12:44 PM
Makes sense for the WLC. It just makes things easier. The 9300 does not support Nat over VRF, or intra-VRF NAT...yet that is. The statement is missing from when to designate the "ip nat inside....overload". Every direction we turn is a wall.
05-10-2022 07:20 AM
This is basically Layer 3 routing, I recommend you connect your Internet router to L3 switch directly. I would manipulate routing in order to achieve this, if using static routes I would add more specific routes towards MPLS where the subnets are defined and default route towards Internet in your L3 switch.
For MPLS
ip route 10.0.0.0 255.0.0.0 <MPLS Router IP>
ip route X.X.X.X X.X.X.X <MPLS Router IP>
For Internet
ip route 0.0.0.0 0.0.0.0 <Internet Router IP>
05-10-2022 09:18 AM - edited 10-19-2023 12:45 PM
But I noticed that when doing a traceroute to 8.8.8.8 the route it takes is through is the VLAN of the client or the L3 GW, and out to the MPLS router
IS there anyway to curb this?
05-10-2022 10:35 AM
05-10-2022 01:15 PM
05-10-2022 03:28 PM
It's called policy based routing. Standard routing is based on the packet's destination address. Policy based routing allows you to base the routing decision on source and/or destination address and other characteristics independent of the routing table. In this case you would send everything originating from the mobile client subnet source range to the next hop IP of your internet router.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide