Wireless 4 Notes
Wireless 4 Notes
-----
CAT1
-----
vlan 10-15,20,30
exit
!
Interface vlan 101
ip address 10.0.1.11 255.255.255.0
no shut
!
default interface range gig 1/0/10-11
!
Interface range gig 1/0/10-11
channel-group 21 mode on
no shut
!
Interface port-channel 21
switchport mode trunk
!
Interface vlan 10
ip address 10.0.10.11 255.255.255.0
no shut
!
Interface gig 1/0/1
switchport mode access
switchport access vlan 11
!
Interface vlan 11
ip address 10.0.11.11 255.255.255.0
no shut
!
Interface vlan 15
ip address 10.0.15.11 255.255.255.0
no shut
!
Interface vlan 20
ip address 10.0.20.11 255.255.255.0
no shut
!
Interface vlan 13
ip address 10.0.13.11 255.255.255.0
no shut
!
ip dhcp excluded-address 10.0.11.1 10.0.11.100
ip dhcp excluded-address 10.0.12.1 10.0.12.100
ip dhcp excluded-address 10.0.15.1 10.0.15.100
ip dhcp excluded-address 10.0.20.1 10.0.20.100
ip dhcp excluded-address 10.0.30.1 10.0.30.100
ip dhcp excluded-address 10.0.40.1 10.0.40.100
!
ip dhcp pool AP1
network 10.0.11.0 /24
default-router 10.0.11.11
dns-server 10.0.1.12
option 43 hex f104.0A00.0A15
!
ip dhcp pool AP2
network 10.0.15.0 /24
default-router 10.0.15.11
dns-server 10.0.1.12
!
ip dhcp pool AP3
network 10.0.12.0 /24
default-router 10.0.12.22
dns-server 10.0.1.12
option 43 hex f104.0A00.0A15
!
ip dhcp pool EXECS
network 10.0.20.0 /24
default-router 10.0.20.11
dns-server 10.0.1.12
!
ip dhcp pool EMPLOYEES
network 10.0.30.0 /24
default-router 10.0.30.22
dns-server 10.0.1.12
!
ip dhcp pool GUESTS
network 10.0.40.0 /24
default-router 10.0.40.22
dns-server 10.0.1.12
!
no router eigrp 1
router eigrp 111
network 10.0.0.0
passive-interface default
no passive-interface vlan 13
-----
CAT2
-----
vlan 10-15,20,30
exit
!
default interface range gig 1/0/10-11
!
Interface range gig 1/0/10-11
channel-group 21 mode on
no shut
!
Interface port-channel 21
switchport mode trunk
!
Interface vlan 14
ip address 10.0.14.22 255.255.255.0
no shut
!
Interface gig 1/0/3
switchport mode access
switchport access vlan 12
!
Interface vlan 12
ip address 10.0.12.22 255.255.255.0
ip helper-address 10.0.13.11
no shut
!
Interface vlan 13
ip address 10.0.13.22 255.255.255.0
no shut
!
Interface vlan 30
ip address 10.0.30.22 255.255.255.0
ip helper-address 10.0.13.11
no shut
!
Interface vlan 40
ip address 10.0.40.22 255.255.255.0
ip helper-address 10.0.13.11
no shut
!
Interface loopback0
ip address 199.1.1.1 255.255.255.0
!
no router eigrp 1
router eigrp 111
network 10.0.0.0
network 199.1.1.0
passive-interface default
no passive-interface vlan 13
==================================================
Basic Wireless Network with ISE and AD Integration
==================================================
***************************************
WLC
***************************************
----------------------------------
1. Configure the VLAN Interfaces
----------------------------------
-------------------------------------------
2. Configure the relationship towards ISE
-------------------------------------------
Security -> AAA -> RADIUS -> Authentication
-------------------------------------------
3. Configure the WLAN using ISE
-------------------------------------------
General
Security:
Advanced Tab:
***************************************
ISE
***************************************
---------------------------------------
1. Configure the relationship with WLC
---------------------------------------
Administration -> Network Resources -> Network Device Groups -> Add
Name: HQ-WLCs
Name: WLC1
IP Address: 10.0.10.21
Network Device Group: HQ-WLCs
Protocol : RADIUS
Key: cisco123
---------------------------------------
2. Configure integration with AD
---------------------------------------
A. Administration -> Identity Management -> Exernal Identity Sources -> Active
Directory -> Add
B. Administration -> Identity Management -> Exernal Identity Sources -> Active
Directory -> Groups
---------------------------------------
3. Configure the Authorization Profiles
---------------------------------------
Policy -> Policy Elements -> Results -> Authorization -> Authorization Profile ->
Add
Name: EXECS-PROFILE
VLAN: 20
Name: EMPLOYEES-PROFILE
VLAN: 30
-----------------------------------------------------------------------------
4. Configure the Authorization Policy to link the conditions to the Profile
-----------------------------------------------------------------------------
Name: EXECS-POLICY
Conditions:
AD-ABC:ExternalGroup equals adgroup1 [AD Group]
RADIUS:Called-Station endswith ABC [SSID]
Wireless_802.1x [Specifying the Condition for Wireless Users]
Device:DeviceType equals HQ-WLCs [The WLC or WLC Group]
=========================================
2. Guest - HotSpot
=========================================
------
WLC
------
---------------------------------
1. Create the ACL for Pre-Auth
---------------------------------
Name: ISE
Permit to communicate to DHCP, DNS and ISE only. This is the Pre-Auth ACL.
------------------------------------
2. Create a special SSID for GUESTS
------------------------------------
Name: GUESTS
SSID: GUEST
Interface: guests
Enabled: Checked
Security Tab:
Layer 2: None; MAC Filtering
Advanced Tab:
------
ISE
------
--------------------------------------------------------------------
1. Add the Guest VLAN Interface of WLC as a Client address to WLC1
--------------------------------------------------------------------
Administration -> Network Resources -> Network Devices -> WLC1 -> Edit
Add : 10.0.40.99
--------------------------------------------------------------------
2. Create the HOTSPOT Guest Portal
--------------------------------------------------------------------
Work Centers -> Guest Access -> Portals and Components -> Guest Portals -> Create -
> Hotspot
Name:ABC-HotSpot
AUP Page Settings:
Require Code: Cisco123
Save
--------------------------------------------------------------------
3. Create an Authorization Profile
--------------------------------------------------------------------
Policy -> Policy Elements -> Results -> Authorization -> Authorization Profile ->
Add
Name: ABC-GUEST-HOTSPOT
Web Redirection:
Type: HotSpot
ACL: ISE
Value:ABC-HotSpot
Save
--------------------------------------------------------------------
4. Create Authorization Policies
--------------------------------------------------------------------
Name:GUEST-ACCESS
Condition: EndpointGroup = GuestEndpoint
Permission: PermitAccess
Name:GUEST-AUTHENTICATION
Condition:Wireless_MAB
RADIUS:called-station endswith GUEST
Permission: ABC-GUEST-HOTSPOT
=========================================
3. Guest - Sponsor Portal
=========================================
------------------------------------------------------------------------
1. Create the Group and User Accounts for Creating the Guest Accounts
------------------------------------------------------------------------
Administration -> Identity Management -> Groups -> EndUser Identity Groups -> Add
Name: ABC-SponsorGroup
Name: khawar
Password: Cisco123*
Group: ABC-SponsorGroup
------------------------------------------------------------------------
2. Create a location which helps in control time/date of login for Guest
------------------------------------------------------------------------
Work Centers -> Guest Access -> Settings -> Guest Location and SSIDs
Name: Chicago
Timezone: CST6
------------------------------------------------------------------------
3. Create the Guest Type
------------------------------------------------------------------------
Work Centers -> Guest Access -> Portals & Components -> Guest Types -> Create
Name: ChicagoGuests
Configure the limits for the Guest like the number of simultaneous Logins....
------------------------------------------------------------------------
4. Create the Sponsor Groups
------------------------------------------------------------------------
Work Centers -> Guest Access -> Portals & Components -> Sponsor Groups -> Create
Name:ChicagoSponsors
Members: ABC-SPONSOR-GROUP
Guest Type that can be created: ChicagoGuests
Locations: Chicago
------------------------------------------------------------------------
5. Login as Sponsor to create the accounts
------------------------------------------------------------------------
Work Centers -> Guest Access -> Portals & Components -> Sponsor Portal -> default
FirstName: Ccie
LastName: Wireless1
FirstName: Ccie
LastName: Wireless2
------
WLC
------
---------------------------------
1. Create the ACL for Pre-Auth
---------------------------------
Name: ISE
Permit to communicate to DHCP, DNS and ISE only. This is the Pre-Auth ACL.
------------------------------------
2. Create a special SSID for GUESTS
------------------------------------
Name: GUESTS
SSID: GUEST
Interface: guests
Enabled: Checked
Security Tab:
Layer 2: None; MAC Filtering
Advanced Tab:
-------------------------------------------------------------------
1. Create the Sponsor Guest Portal
--------------------------------------------------------------------
Work Centers -> Guest Access -> Portals and Components -> Guest Portals -> Create -
> SponsorPortal
Name:ABC-SponsorPortal
Portal Settings:
Employess using this portal as : ChicagoGuests
Login Page:
Include AUP
Save
--------------------------------------------------------------------
2. Create an Authorization Profile
--------------------------------------------------------------------
Policy -> Policy Elements -> Results -> Authorization -> Authorization Profile ->
Add
Name: ABC-GUEST-SponsorPortal
Web Redirection:
Save
--------------------------------------------------------------------
4. Create Authorization Policies
--------------------------------------------------------------------
Name:GUEST-ACCESS
Condition: EndpointGroup = GuestEndpoint
Permission: PermitAccess
Name:GUEST-AUTHENTICATION
Condition:Wireless_MAB
RADIUS:called-station endswith GUEST
Permission: ABC-GUEST-Sponsor-Portal
===============================================
4. MAB for AP to authenticate based on ISE
===============================================
Administration -> Identity Management -> Groups -> EndPoint Groups -> Add
Name: LEGIT-APs
MAC: xxxx.xxxx.xxxx
Static Group Assignment : LEGIT-APs
Name: LEGIT-AP-POLICY
Name: CAT1
IP Address: 10.0.1.11
Protocol: RADIUS
Key: cisco123
Submit
aaa new-model
!
radius server ISE
address ipv4 10.0.1.5 auth-port 1812 acct-port 1813
key cisco123
!
aaa group server radius RAD-AUTH
server name ISE
!
aaa authentication dot1x default group RAD-AUTH
aaa authorization network default group RAD-AUTH
!
dot1x system-auth-control
!
int gig 1/0/1
authentication order mab dot1x
authentication priority mab dot1x
mab
authentication port-control auto
no shut
==================================
5. Mobility Express
==================================
-----------------------------------------------------------------------
1. Configure the Switchport as a Trunk with a VLAN (FlexConnect type)
-----------------------------------------------------------------------
------
CAT1
------
-----------------------------------------------------------------------
2. Configure the AP to load the ME Capable Image
-----------------------------------------------------------------------
------
CAT1
------
ap-type mobility-express
Note: It will reload as an AP. If there is not Controller on the segment, it will
also load the controller.