05-23-2024 11:46 PM - edited 06-07-2024 04:00 AM
Contributors
Sanatomba Singh @moisingh for MESH
Alexander Charles Stephan Savarinathan @asavarin for RLAN
Raman Ratan for WGB
A wireless mesh networking use cisco Access Points to extend network coverage wirelessly. Mesh networking can employ indoor and outdoor Mesh Access Points, cisco C9800 wireless controllers, Cisco DNA Center to provide scalable, central management and mobility between indoor and outdoor deployments. CAPWAP control manages the connection of Mesh Access points to the network.
End-to-end security within the mesh network is supported by employing Advanced Encryption Standard (AES) encryption between the wireless mesh access points and Wi-Fi Protected Access 2 (WPA2) clients.
Hardware Platform |
Model Name |
Access Points |
Cisco Aironet outdoor - 1542, 1562, 1572 |
Cisco Aironet Wave2 indoor- 1815i, 1815m, 1830,1850, 2800, 3800 and 4800 |
|
Cisco Aironet AX- 9130, 9124 |
|
Cisco Aironet IOT- IW6300, 6300, IW9167 Series. |
|
Cisco wireless controller |
C9800-80 |
Cisco DNA Center |
1.4 release onward |
Cisco Prime Infrastructure |
3.7 release onward |
Mesh Access Points should be configured with bridge mode. Access points in a mesh network operate in one of the following two ways.
Access Points can be order as a Mesh mode or can be converted from the local mode to Mesh Mode. To use access point as a root access point, you must reconfigure the mesh access points.
While the RAPs have wired connections to their controller, MAPs have wireless connections to their controller via the RAP or another MAP. MAPs communicate among themselves and back to the RAP using wireless connections over the 802.11a/n/ac/ax radio backhaul. MAPs use the Cisco Adaptive Wireless Path Protocol (AWPP) to determine the best path through the other mesh access points to the controller.
End-to-end security within the mesh network is supported by employing Advanced Encryption Standard (AES) encryption between the wireless mesh access points and Wi-Fi Protected Access 2 (WPA2) and WPA3 clients. A mesh access point establishes AWPP link with a parent Mesh AP which is already connected to the Controller before starting CAPWAP discovery.
By default, RAP or MAP does not generate Bridge Protocol Data Unit (BPDU) itself. However, the RAP or MAP forwards the BPDU to upstream devices if the RAP or MAP received the BPDU from its connected wired or wireless interface across the network.
By default, bridge mode AP behaves as a local mode AP. To make a mesh AP work in flex-connect mode, flex- bridge mode was introduced which supports flex-connect features while operating in bridge mode.
Flex mode APs are connected to trunk port with but for mesh only RAP’s connected port can be trunk port, not the MAP connected port. For ethernet bridging MAPs ethernets need to be in trunk mode. The default mode of ethernet in bridge and flex-bridge mode is trunk and default native VLAN is 0.
Ethernet Bridging – Wired clients behind RAP and MAP
a. Same VLAN for both clients.
b. Different VLAN for both clients.
WGB
a. WGB behind the RAP
b. WGB behind the MAP
Uplink loss detection.
Subset channel Synchronization
Fast convergence
Daisy-chaining.
MAP Roaming.
a. From one RAP to another RAP b. From one MAP to another MAP c. Intra-WNCD and Inter-WNCD d. Inter Controller
MAP Joining
a. MAP and RAP same or different models. b. Different types of securities.
c. Controller upgrade or reboot.
Multicast with Mesh
Mac Authorization list configuration
• aaa authorization credential-download <method_list_name> group radius <radius_server_group_name>
Creating Mesh Profile and map authorization list
AP joins controller as Local mode or Mesh mode. Change AP mode to bridge mode and role to mesh/root Change AP mode from local mode to bridge.
• ap name <ap_name> mode bridge
Subset Channel Synchronization enable controller to send all connected RAPs channel to MAPs to enable faster
convergence. Specify the Backhaul Slot for the Root AP
• ap name <RAP_name> mesh backhaul radio dot11 <24ghz/5ghz> <slot slot-id>
In SDA deployments, client traffic is sent over an overlay network that is managed by LISP (Location/ID Separation Protocol) control plane.
Then overlay wired clients are sending native traffic to FE (normal 802.3 frames).
In Wireless SDA deployments, APs are extension of the fabric. It means that APs are allowed to
encapsulate/decapsulate wireless client traffic in VxLAN and exchange these with FE.
On data plane side, wireless client traffic is encapsulated in VxLAN and tunneled to FE.
FE has a specific interface called Access Tunnel which will take care of VxLAN processing.
Every Mesh AP is a fabric AP. It means that every MAP located behind a RAP (Root AP) will have a corresponding access tunnel on RAP FE.
Each MAP is a fabric AP and thus encapsulates client traffic in VxLAN and tunnels this traffic towards FE.
MAP AP will have an access tunnel plumbed on FE and will be able to encapsulate client traffic toward this tunnel without any change in infrastructure device (HW or SW). FE will create an access tunnel for
the MAP as it would have done it for any other fabric AP.
The challenges in SDA mesh deployment is mesh is dynamic. The link between MAP (Mesh AP) and
parent is wireless so can be unstable or impacted by RF conditions. That’s why a MAP can “roam” to a new parent and this without breaking the session with the WLC (CAPWAP). So, the real challenge of supporting Mesh in SDA deployment is to manage MAP roaming events to limit the traffic loss/latency.
Mesh COS AP shall be configurable as fabric AP (no IOS AP support).
Mesh Fabric AP shall keep wireless client connection during a mesh wireless uplink update (mesh roam).
Mesh Fabric AP, after a successful roam, shall be able to reestablish VxLAN traffic with limited traffic
impact.
Mesh Fabric AP shall be able to roam to an AP of the same fabric (Intra-fabric).
Mesh SDA solution shall be able to forward wireless client traffic with an MTU of 1500 bytes.
show fabric ap summary
show wireless fabric client summary
show wireless stats fabric control-plane all
show wireless mesh ap tree
show wireless mesh ap fabric summary
show ap name <name> mesh roam history
show lisp all instance-id * ethernet database
show lisp all instance-id * ipv4 database
A Remote LAN (RLAN) is used for authenticating wired clients using the controller. Once the wired client successfully joins the controller, the LAN ports can switch the traffic between central or local switching mode as per configuration. The traffic from wired client is treated as wireless client traffic by adding wireless header.
The RLAN module in AP will send the authentication/association requests for the wired client to get authenticated. The authentication of wired client through RLAN is like wireless client. RLAN uses slot 2 for configuration and control messages between the AP and WLC when you enable the OfficeExtend mode for an access point DTLS data encryption
RLAN over SDA(Fabric)–. This feature should add functionality to route traffic via VxLAN tunnel.
Controller Workflow: Controller will authenticate the client like any other local mode client. It will send client registration to map server after client is authenticated and reached mobility complete state.
To enable fabric configuration for RLAN clients, we need to configure the vnid and sgt tag information for rlan policy in addition to the existing configuration. We plan to reuse fabric policy configuration for wireless clients for rlan clients by providing a knob to configure fabric policy profile under rlan policy configuration. This information should be pushed to AP.
AP Workflow: Ap flow is same as local mode of RLAN.
Authentication Methods
Open auth
Local auth
802.1x auth
Mac Filtering
WebAuth
RLAN Authentication Fallback
From 802.1X to MAC authenecation bypass (MAB) and vice versa
The solution is validated with the hardware and software listed in the following table. For the complete list of hardware and software supported
Hardware platform |
Model Name |
Access points |
Cisco Catalyst 9124 Series AP Cisco Catalyst 9105AXW Cisco Aironet OEAP 1810 series Cisco Aironet 1815T series Cisco Aironet 1810W series Cisco Aironet 1815W Cisco Catalyst IW6300 Heavy Duty Series Access Points Cisco 6300 Series Embedded Services Access Points |
Cisco wireless controller |
C9800-80 C9800-40 C9800-L C9800-CL |
Cisco DNA Center |
|
The second Ethernet port in Cisco Aironet 1850, 2800, and 3800 Series APs is used as a link aggregation (LAG) port, by default. It is possible to use this LAG port as an RLAN port when LAG is disabled.
The following APs use LAG port as an RLAN port:
Feature |
Local Mode |
Flex Mode |
Fabric Local Mode |
Basic RLAN feature with one client like Phone or Laptop |
Supported |
Supported |
Supported |
Multi-Client per port |
Supported |
Supported |
Supported |
Port Security – ACL / Firewall |
Not Supported |
Not Supported |
Not Supported |
Split Tunneling |
Not Supported |
Not Supported |
Not Supported |
Vlan Support on RLAN |
Supported |
Supported |
Supported |
802.1x on RLAN |
Supported |
Supported |
Supported |
Mac Filtering + 802.1x on RLAN |
Supported |
Supported |
Supported |
Web Auth on RLAN |
Supported |
Supported |
Supported |
AAA override on RLAN |
Supported |
Supported |
Supported |
Local authentication |
Supported |
Supported |
Supported |
IPv6 ACL or Flexible Netflow |
Supported |
Supported |
Supported |
MAB |
Supported |
Supported |
Supported |
WEB ACL |
Not Supported |
Supported |
Not Supported |
SGT |
Not Supported |
Not Supported |
Supported |
Device |
Show commands |
Controller |
show remote-lan summary show remote-lan id <id> show remote-lan name <profile-name show remote-lan all show remote-lan policy summary show ap name <ap_name> lan port summary show wireless client summary show wireless client username cisco show wireless client mac-address <mac> detail show ap tag summary show wireless tag policy summary show wireless tag policy detailed <rlan_policy_tag_name> |
Access Point |
show wired client |
Device |
Debug commands |
Controller |
set platform software trace wncd chassis active R0 all-modules debug debug wireless mac <rlan client mac> set plat soft trace wncd chassis active r0 lisp-agent- ? lisp-agent-api lisp-agent-db lisp-agent-fsm l isp-agent-ha lisp-agent-internal lisp-agent-lib lisp-agent-lispmsg lisp-agent-shim lisp-agent-transport |
Access Point |
debug rlan critical debug rlan errors debug rlan events debug rlan info debug client <mac-addr> |
Flex + RLAN configuration:
FABRIC + RLAN
ap remote-lan profile-name rlanprofile_local_auth 17
local-auth eap_name
security dot1x authentication-list wcm_local
no shutdown
wireless tag policy policy-tag-rlan-local-Auth
remote-lan rlanprofile_local_auth policy rlan-policy-802X-localauth port-id 1
wireless tag site Rlan-local-Auth
ap profile RLAN
ap 843d.c670.3c40
policy-tag policy-tag-rlan-local-Auth
site-tag Rlan-local-Auth
ap name AP843D.C670.3C40 lan port-id 1 enable
The client scale depends on Ethernet port which are available on a RLAN supported AP Model. Each LAN port on an AP is supports max of 4 clients.
Glossary
RLAN: Remote Local Area Network
OEAP:OfficeExtend access point
DTLS: Datagram Transport Layer Security
ACL: Access Control List
SDA: Software Defined Access
EWLC: Elastic Wireless Lan Controller
A workgroup bridge (WGB) is an Access Point mode to provide wireless connectivity to wired clients that are connected to the Ethernet port of the WGB AP directly or via a switch. A WGB connects a wired network over a single wireless segment by learning the MAC addresses of its wired clients on the Ethernet interface and report them to the WLC through infrastructure AP using Internet Access Point Protocol (IAPP) messaging.
The WGB establishes a single wireless connection to the root AP on any one 2.4Ghz or 5 Ghz radio, which in turn treats the WGB as a wireless client. The WGB can serve wireless clients on the other radio.
Hardware Platform |
Model Name |
Version |
Access Points
|
Cisco Aironet 2700, 3700, and 1572 Series |
Requires autonomous image |
Cisco Aironet 2800, 3800, 4800, 1562, and |
Cisco IOS-XE image starting 16.10 |
|
Cisco Catalyst 9105, 9115 |
Cisco IOS-XE image starting 17.8 |
|
Cisco Catalyst 9120, 9130, 9124 |
|
|
IW6300 and ESW6300 Series |
|
|
Cisco Wireless Controller |
C9800-80, C9800-40 C9800-L, C9800-CL |
Starting 16.10 |
Remote Site Switch |
Cisco Catalyst 9 series Cisco Catalyst 3850 |
|
Cisco DNA Centre controller |
|
|
Cisco Prime Infrastructure |
|
3.10.4 + System Patch |
Features |
Wave1 Aps |
Wave2 and Cat91xx Aps |
802.11r |
Supported |
Supported |
QOS |
Supported |
Supported |
UWGB mode |
Supported |
Supported on Wave 2 APs |
IGMP Snooping or Multicast |
Supported |
Supported |
802.11w |
Supported |
Supported |
PI support (without SNMP) |
Supported |
Not supported |
IPv6 |
Supported |
Supported |
VLAN |
Supported |
Supported |
802.11i (WPAv2) |
Supported |
Supported |
Broadcast tagging/replicate |
Supported |
Supported |
Unified VLAN client |
Implicitly supported (No CLI required) |
Supported |
WGB client |
Supported |
Supported |
802.1x – PEAP, EAP-FAST, EAP-TLS |
Supported |
Supported |
NTP |
Supported |
Supported |
Wired client support on all LAN ports |
Supported in Wired-0 and Wired-1 interfaces |
Supported in all Wired-0, 1 and LAN ports 1, 2, and 3 |
Sample psk config on eWLC :
wlan <wlan profile name> <wlan id> <ssid name>ap-type workgroup-bridge
configure ssid-profile ssid-profile-name ssid radio-serv-name authentication {open | psk preshared-key key-management {dot11r | wpa2 | dot11w |{optional | required }}| eap profile eap-profile-name key-management {dot11r | wpa2 | dot11w|{optional | required}}
configure dot11radio radio-interface mode wgb ssid-profile profle-name
configure dot11radio radio-int mode root-ap
configure dot11Radio <0|1> wlan add ssid-profile-name ssid-number
Client Hardware Specs |
Access Points |
|
Mesh |
Windows, Macmini |
9130, 9124, 2800, 3800, 4800, 1542, 1562 |
RLAN |
Windows, Macmini |
C9105AXW, C9105AXW, 3802E |
WGB |
Windows |
Root Ap - 3800, 2800, 9130, CW9163 WGB - 9130, 9120, 3700 |
Thanks to Ian Procyk for his feedback on customer deployments
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide