Preview only show first 10 pages with watermark. For full document please download

Avaya Vena Unified Access For Ers 8800/8600

   EMBED


Share

Transcript

Unified Access 1.0 Engineering Avaya VENA Unified Access for ERS 8800/8600 and WLAN 8100 Technical Configuration Guide Avaya Networking Document Date: November 2012 Document Number: NN48500-643 Document Version: 1.0 avaya.com © 2012 Avaya Inc. All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document is complete and accurate at the time of printing, Avaya assumes no liability for any errors. Avaya reserves the right to make changes and corrections to the information in this document without the obligation to notify any person or organization of such changes. Documentation disclaimer Avaya shall not be responsible for any modifications, additions, or deletions to the original published version of this documentation unless such modifications, additions, or deletions were performed by Avaya. End User agree to indemnify and hold harmless Avaya, Avaya‘s agents, servants and employees against all claims, lawsuits, demands and judgments arising out of, or in connection with, subsequent modifications, additions or deletions to this documentation, to the extent made by End User. Link disclaimer Avaya is not responsible for the contents or reliability of any linked Web sites referenced within this site or documentation(s) provided by Avaya. Avaya is not responsible for the accuracy of any information, statement or content provided on these sites and does not necessarily endorse the products, services, or information described or offered within them. Avaya does not guarantee that these links will work all the time and has no control over the availability of the linked pages. Warranty Avaya provides a limited warranty on this product. Refer to your sales agreement to establish the terms of the limited warranty. In addition, Avaya‘s standard warranty language, as well as information regarding support for this product, while under warranty, is available to Avaya customers and other parties through the Avaya Support Web site: http://www.avaya.com/support Please note that if you acquired the product from an authorized reseller, the warranty is provided to you by said reseller and not by Avaya. Licenses THE SOFTWARE LICENSE TERMS AVAILABLE ON THE AVAYA WEBSITE, HTTP://SUPPORT.AVAYA.COM/LICENSEINFO/ ARE APPLICABLE TO ANYONE WHO DOWNLOADS, USES AND/OR INSTALLS AVAYA SOFTWARE, PURCHASED FROM AVAYA INC., ANY AVAYA AFFILIATE, OR AN AUTHORIZED AVAYA RESELLER (AS APPLICABLE) UNDER A COMMERCIAL AGREEMENT WITH AVAYA OR AN AUTHORIZED AVAYA RESELLER. UNLESS OTHERWISE AGREED TO BY AVAYA IN WRITING, AVAYA DOES NOT EXTEND THIS LICENSE IF THE SOFTWARE WAS OBTAINED FROM ANYONE OTHER THAN AVAYA, AN AVAYA AFFILIATE OR AN AVAYA AUTHORIZED RESELLER, AND AVAYA RESERVES THE RIGHT TO TAKE LEGAL ACTION AGAINST YOU AND ANYONE ELSE USING OR SELLING THE SOFTWARE WITHOUT A LICENSE. BY INSTALLING, DOWNLOADING OR USING THE SOFTWARE, OR AUTHORIZING OTHERS TO DO SO, YOU, ON BEHALF OF YOURSELF AND THE ENTITY FOR WHOM YOU ARE INSTALLING, DOWNLOADING OR USING THE SOFTWARE (HEREINAFTER REFERRED TO INTERCHANGEABLY AS "YOU" AND "END USER"), AGREE TO THESE TERMS AND CONDITIONS AND CREATE A BINDING CONTRACT BETWEEN YOU AND AVAYA INC. OR THE APPLICABLE AVAYA AFFILIATE ("AVAYA"). Copyright Except where expressly stated otherwise, no use should be made of the Documentation(s) and Product(s) provided by Avaya. All content in this documentation(s) and the product(s) provided by Avaya including the selection, arrangement and design of the content is owned either by Avaya or its licensors and is protected by copyright and other intellectual property laws including the sui generis rights relating to the protection of databases. You may not modify, copy, reproduce, republish, upload, post, transmit or distribute in any way any content, in whole or in part, including any code and software. Unauthorized reproduction, transmission, dissemination, storage, and or use without the express written consent of Avaya can be a criminal, as well as a civil offense under the applicable law. Third Party Components Certain software programs or portions thereof included in the Product may contain software distributed under third party agreements ("Third Party Components"), which may contain terms that expand or limit rights to use certain portions of the Product ("Third Party Terms"). Information regarding distributed Linux OS source code (for those Products that have distributed the Linux OS source code), and identifying the copyright holders of the Third Party Components and the Third Party Terms that apply to them is available on the Avaya Support Web site: http://support.avaya.com/Copyright. Trademarks The trademarks, logos and service marks ("Marks") displayed in this site, the documentation(s) and product(s) provided by Avaya are the registered or unregistered Marks of Avaya, its affiliates, or other third parties. Users are not permitted to use such Marks without prior written consent from Avaya or such third party which may own the Mark. Nothing contained in this site, the documentation(s) and product(s) should be construed as granting, by implication, estoppel, or otherwise, any license or right in and to the Marks without the express written permission of Avaya or the applicable third party. Avaya is a registered trademark of Avaya Inc. All non-Avaya trademarks are the property of their respective owners. Downloading documents For the most current versions of documentation, see the Avaya Support. Web site: http://www.avaya.com/support Contact Avaya Support Avaya provides a telephone number for you to use to report problems or to ask questions about your product. The support telephone number is 1-800-242-2121 in the United States. For additional support telephone numbers, see the Avaya Web site: http:// www.avaya.com/support. November 2012 Avaya VENA Unified Access Technical Configuration Guide 2 avaya.com Abstract This Technical Configuration Guide describes how to configure an Avaya VENA Unified Access solution. Avaya implemented this solution by combining the functionality of the Avaya WLAN Controller 8100 (WC 8100) with the Avaya Ethernet Routing Switch 8800/8600 (ERS 8800/8600). This document also provides an overview of the Unified Access solution, which describes the technology, components, configuration considerations, and best design practices. Information in this Technical Configuration Guide has been obtained through Avaya Networking interoperability testing and additional technical discussions. Testing was conducted at the Avaya Networking Test Lab. The audience for this Technical Configuration Guide is intended to be Avaya Sales teams, Partner Sales teams and end-user customers. All of these groups can benefit from understanding the common design practices and recommended components for an Avaya VENA Unified Access solution. Acronym Key Throughout this guide the following acronyms will be used: AT: access tunnel HCF Hybrid Coordination Function MD: mobility domain MT: mobility tunnel MU: mobile unit MVLAN: mobility VLAN RF radio frequency RSSI receive signal strength indication SMLT: Split MultiLink Trunking SSID service set identifiers SVP SpectraLink Voice Priority VoWLAN Voice over WLAN WIDS: wireless intrusion detection system WIPS: wireless intrusion prevention system WCP: wireless control point WMS: WLAN management system WSP: wireless switching point November 2012 Avaya VENA Unified Access Technical Configuration Guide 3 avaya.com Table of Contents Figures .......................................................................................................................................................... 6 Tables............................................................................................................................................................ 6 1. 2. 3. Introduction to Avaya VENA Unified Access ........................................................................................ 8 1.1 Unified Access Component Overview ........................................................................................... 8 1.2 Tunnels Types ............................................................................................................................. 11 1.3 Licensing ..................................................................................................................................... 12 1.4 Implementation and configuration considerations....................................................................... 12 1.4.1 Recommendations for Medium Enterprises ........................................................................................... 12 1.4.2 Recommendations for Large Enterprises ............................................................................................... 12 1.4.3 Trusted Edge Ports ................................................................................................................................ 13 1.4.4 WSP VLAN Server ................................................................................................................................. 13 1.4.5 Jumbo Frames and MTU Size ................................................................................................................ 13 1.4.6 Access Tunnel Support .......................................................................................................................... 13 1.4.7 MGID Usage........................................................................................................................................... 14 Upgrade paths to Avaya VENA Unified Access .................................................................................. 14 2.1 Required Components ................................................................................................................ 15 2.2 Network Upgrade Procedures ..................................................................................................... 15 2.3 WCP Upgrade Procedures .......................................................................................................... 15 2.4 WSP Upgrade Procedures .......................................................................................................... 17 2.5 Upgrade Verification Procedures ................................................................................................ 19 2.5.1 AMDC Verification: ................................................................................................................................. 19 2.5.2 WSP Verification: ................................................................................................................................... 19 2.5.3 Mobility Unit Verification: ........................................................................................................................ 20 Testing Methodology ........................................................................................................................... 21 3.1 Test Results ................................................................................................................................ 21 4. Configuration Examples ...................................................................................................................... 23 5. Wireless LAN Configuration ................................................................................................................ 24 5.1 WCP Configuration – Part 1 ........................................................................................................ 24 5.1.1 VLAN and IP configuration ..................................................................................................................... 24 5.1.2 Wireless Configuration ........................................................................................................................... 27 5.2 WSP Configuration ...................................................................................................................... 28 5.3 Connect APs to network .............................................................................................................. 39 5.3.1 Stackable PoE Switch ............................................................................................................................ 39 5.3.2 8007 Switch – ERS 8800 switch connected to the PoE switch above .................................................... 39 5.3.3 DHCP Server – DHCP Scope for AP ..................................................................................................... 40 November 2012 Avaya VENA Unified Access Technical Configuration Guide 4 avaya.com 5.4 WCP Configuration – Part 2 ........................................................................................................ 41 6. Wireless Clients .................................................................................................................................. 61 7. Verify Client Connectivity .................................................................................................................... 63 8. 7.1 Normal operations ....................................................................................................................... 63 7.2 Roaming ...................................................................................................................................... 64 Reference Documentation .................................................................................................................. 66 November 2012 Avaya VENA Unified Access Technical Configuration Guide 5 avaya.com Figures Figure 1 – Unified Access Model ................................................................................................................ 10 Figure 2 – Unified Access Tunnels (Access and Mobility) .......................................................................... 11 Figure 3 – Configuration Example Topology............................................................................................... 23 Tables Table 1 – Test Results ................................................................................................................................ 22 November 2012 Avaya VENA Unified Access Technical Configuration Guide 6 avaya.com Conventions This section describes the text, image, and command conventions used in this document. Symbols    Tip – Highlights a configuration or technical tip. Note – Highlights important information to the reader. Warning – Highlights important information about an action that may result in equipment damage, configuration or data loss. Text Bold text indicates emphasis. Italic text in a Courier New font indicates text the user must enter or select in a menu item, button or command: ERS5520-48T# show running-config Output examples from Avaya devices are displayed in a Lucida Console font: ERS5520-48T# show sys-info Operation Mode: Switch MAC Address: 00-12-83-93-B0-00 PoE Module FW: 6370.4 Reset Count: 83 Last Reset Type: Management Factory Reset Power Status: Primary Power Autotopology: Enabled Pluggable Port 45: None Pluggable Port 46: None Pluggable Port 47: None Pluggable Port 48: None Base Unit Selection: Non-base unit using rear-panel switch sysDescr: Ethernet Routing Switch 5520-48T-PWR HW:02 FW:6.0.0.10 Mfg Date:12042004 November 2012 SW:v6.2.0.009 HW Dev:H/W rev.02 Avaya VENA Unified Access Technical Configuration Guide 7 avaya.com 1. Introduction to Avaya VENA Unified Access Enterprises have to address the rapid growth in mobile traffic and high bandwidth video applications. The Avaya VENA Unified Access solution solves this problem that is stretching the limits of existing WLAN networks. Avaya‘s next generation architecture integrates the wired and wireless networks so that Enterprises no longer have to build out separate wired and WLAN networks. The Unified Access solution splits the control and data forwarding functions and implements each of them in the most logical and cost effective place in the network. This splitting of functions enables Unified Access to accomplish its primary goal of unifying wired and wireless switching with unprecedented scaling and performance. • Control operations such as managing APs are still performed by the WLAN 8100 Controller, which is referred to as the Wireless Control Point (WCP) • Data forwarding functions are now implemented in the ERS 8800/8600, which is referred to as the Wireless Switching Point (WSP). Splitting the control and data forwarding functions reduces the packet processing scalability requirement on the WLAN 8100 Controller and transfers the data forwarding to the ERS 8800/8600. Because the ERS 8800/8600 forwards both wired and wireless traffic, the Unified Access solution fully integrates your network infrastructure without adding more switching equipment. To implement this solution, simply add APs and enable the data forwarding function for WLAN on the ERS 8800/8600. This solution also scales much higher and is more resilient than traditional WLAN overlay models because the ERS 8800/8600 is much more robust at forwarding.  Note – It is important to note that the Unified Access solution does not impact any traditional WLAN services such as E911, Ekahau location, Site Survey, RF resiliency, Voice over WLAN, Captive Portal, ID Engine Guest Portal, and wireless intrusion detection and prevention systems (WIDS/WIPS). 1.1 Unified Access Component Overview The following are the minimum requirements of this solution: WLAN 8100 Controller Release 2.0 Ethernet Routing Switch 8800/8600 Release 7.2 The WLAN 8100 Controller serves strictly as a WCP in the Unified Access solution. In this role, the WCP supports the following management functions: Associates APs to WSPs and reassigns APs to WSPs to maintain load balance. Manages all AP functions such as: auto-RF, User Authentication, Captive Portal, AP configuration. These functions are identical in both Unified Access and traditional WLAN overlay solutions. Manages the WSPs, which is a new function that puts the WCP in charge of configuring the wireless functions of the WSPs. When authentication or roaming occurs, the WCP is responsible for communicating any change in mobility context to WSPs and handling the WSP-to-WSP handover. November 2012 Avaya VENA Unified Access Technical Configuration Guide 8 avaya.com Manages all auxiliary functions that are part of either wireless solution such as Guest Portals, WIDS/WIPS collection, User Authentication, Location Management, Load Sharing, Roaming Management, and Session Tracking.  Note – The WLAN 8100 Controller can serve as both a WCP and WSP in a traditional WLAN or as strictly a WCP in a Unified Access solution. In Release 2.0, if the WLAN 8180 Controller is configured as a WCP-only device, then all the controllers in the mobility domain must be WCPonly mode controllers. The ERS 8800/8600 serves as the WSP, which unifies wireless and wired switching in a single device. In this role, the WSP communicates with the WCP to manage the mobility context of a mobile client. This means that the WSP manages all user data from an AP onto the network. It terminates the access tunnel from an AP, decapsulates traffic, and inserts traffic onto the wired network. The WSP also maintains mobility tunnels with other WSPs (at the control of the WCP) to allow for user mobility across APs inside a mobility domain. The Access Point functions change the least in a Unified Access solution. APs maintain all of their traditional functions, at the direction of the WCP, and they are still powered by a Power over Ethernet (PoE) switch such as the ERS 5520. The only significant difference is that APs now communicate with both the WCP (for control traffic) and with a WSP (for data traffic). The following figure and scenarios show how traffic from the Building 1 and Building 2 terminate: If the destination of the associated client or roamed client is within the distribution layer, the mobility traffic is L2 switched within the distribution layer. If the destination is associated to the other building's Mobility VLAN (MVLAN), the mobility traffic is switched using the mobility tunnel to the destination WSP. If the destination is not local and not associated to the other building's MVLAN, then the mobility traffic gets L3 routed by the core. November 2012 Avaya VENA Unified Access Technical Configuration Guide 9 avaya.com Figure 1 – Unified Access Model November 2012 Avaya VENA Unified Access Technical Configuration Guide 10 avaya.com 1.2 Tunnels Types APs use control channels to send control traffic to the WCP and access tunnels to send data traffic to a WSP. This traffic split is the defining feature of Unified Access. For the data traffic, the WSP supports two types of tunnels: • Access tunnels provide a logical connection between the AP and the WSP. • Mobility tunnels provide a logical connection between two WSPs. You do not have to manage any of these tunnels. All of that is taken care of by the Mobility Agent in the Unified Access software. The Mobility Agent is in constant communication between the WSP and WCP to create, configure, load balance, and maintain the tunnels. The maximum number of tunnels is 2000. However, for SMLT configurations Avaya supports half of the maximum tunnels, therefore 1000 tunnels. This is a combined number that includes WLAN access, WLAN mobility, and IPv6 tunnels. The ERS 8800/8600 WSP supports up to 1024 Access Tunnels and 16 Mobility Tunnels to other WSPs.  Note – A WSP serves a particular mobility VLAN if that mobility VLAN is mapped to one of the local VLANs on that WSP. "Serving" in this case means bridging traffic on this VLAN or IProuting it. Figure 2 – Unified Access Tunnels (Access and Mobility) November 2012 Avaya VENA Unified Access Technical Configuration Guide 11 avaya.com 1.3 Licensing Unified Access does not require any additional licensing. • For the WLAN 8100 Controller, the Release 2.0 licensing model is the same as in previous releases. The license is AP-count based and is offered with 16 (locked), 64, 128, and 256 increments. You can also pool licenses as before to allow customers to grow their network by adding licenses to whichever WLAN 8100 Controller they prefer. • For the WLAN 8100 Wireless Management Software (WMS), you must have a valid Base License Certificate. • For the ERS 8800/8600, no additional license beyond the Base License is required. • Avaya separately offers 3rd party licensing for applications such as Ekahau location service. 1.4 Implementation and configuration considerations This section describes some factors to consider as you set up your Unified Access network. 1.4.1 Recommendations for Medium Enterprises For scaling purposes, Avaya defines a medium enterprise as having approximately 2500 network devices and half of those are mobile (1250 devices). In an enterprise of this size, apply the following deployment recommendations: • 512 Access Points • 2 ERS 8800/8600 WSPs (balanced and redundant) • 2 WLAN 8180 WCPs (Redundant) • No more than 10 APs per 1 GbE uplink capacity from edge to core (100 APs per 10 GbE) that is shared with other edge ports 1.4.2 Recommendations for Large Enterprises For scaling purposes, Avaya defines a large enterprise as having approximately 5000 network devices and half of those are mobile (2500 devices). In an enterprise of this size, apply the following deployment recommendations: • 1024 Access Points • 4 ERS 8800/8600 WSPs (balanced and redundant) • 2 WLAN 8180 WCPs (scale WCPs as you add more WSPs) • No more than 10 APs per 1 GbE uplink capacity from edge to core (100 APs per 10 GbE) that is shared with other edge ports November 2012 Avaya VENA Unified Access Technical Configuration Guide 12 avaya.com 1.4.3 Trusted Edge Ports The AP and WSP send WLAN control traffic that is exchanged between them with the high priority bit set. This is to ensure that the control traffic is not dropped even if there is line rate traffic flowing on the port between the AP and the WSP. By default, the ports on the ERS 8800/8600 where the WSP resides are untrusted so they discard the priority bit. This may result in loss of control traffic and bring down the tunnel.  Note – Avaya strongly recommends that you configure any port that carries control traffic as trusted so that the priority bits are honored. To determine if a port is trusted or untrusted, enter the following command: • In the CLI, enter show port info 802.1p-override • In the ACLI, enter show qos 802.1p-override If a port is untrusted, enter the following command to make it trusted: • In the CLI, enter config ethernet 802.1p-override disable • In the ACLI Interface Configuration mode, enter default qos 802.1p-override 1.4.4 WSP VLAN Server VLAN servers are learned dynamically. However, if a WSP is part of an SMLT Switch Cluster, it is a good design practice and Avaya recommends mapping the same VLAN server to both the WSP and its SMLT peer. 1.4.5 Jumbo Frames and MTU Size In networks supporting Unified Access, you must set the maximum transmission unit (MTU) size on all PoE switches to 1572. If the MTU size of 1572 is not supported, you must enable jumbo frames on all the PoE switches. 1.4.6 Access Tunnel Support Access tunnels must send and receive periodic keepalive hellos to keep them active. However, when there are a lot of tunnels on a single physical interface, it causes large bursts of high priority keepalive packets to be sent out of the physical interface. This causes control packet drops, which in turn cause tunnels to drop.  Note – If the tunnels are formed over an MLT, the tunnels are distributed over individual MLT members. Therefore, this limitation is less likely to happen. To avoid dropping any tunnels, see the Release Notes — Software Release 7.2 (NN46205–402) for the recommended maximum number of tunnels to configure per physical interface. November 2012 Avaya VENA Unified Access Technical Configuration Guide 13 avaya.com 1.4.7 MGID Usage Multicast Group ID (MGID) is a hardware mechanism that the switch uses to send data to several ports simultaneously. Instead of sending the data to a specific port number, the data is directed to an MGID. The switch maintains a table that maps MGIDs to their member ports. VLANs and IP Multicast use MGIDs, and the system also reserves a small number of MGIDs for system functions. There are 4000 MGIDs in the system and they are used as follows: • There are two pools by default: 2000 MGIDs for VLANs and 2000 MGIDs for IP Multicast. • Each VLAN consumes 1 MGID (2 MGIDs if an IST exists). • IP Multicast consumes 1 MGID for each flow. Depending on which services are running on the switch, MGIDs may become limited. In Unified Access, this is a concern for roaming users that dynamically need MGIDs. To ensure that there are adequate MGIDs available, use the following command to monitor MGID usage: show sys mgid-usage Number of MGIDs used for VLANs : (524) Number of MGIDs used for multicast : (0) Number of MGIDs remaining for VLANs : (1512) Number of MGIDs remaining for multicast : (2048) If necessary, use the following command to reduce the IP Multicast MGID pool, which increases the number for the remote VLAN pool: config sys set multicast-resource-reservation The above command reserves MGIDs for IP Multicast and the is a number between 64 and 4083. 2. Upgrade paths to Avaya VENA Unified Access This section lists the high-level configuration procedures in the order that they should be performed to deploy your WLAN network. The specific configuration procedures used in the Avaya Networking Test Lab are in Configuration Examples. You can upgrade your network to install the Avaya VENA Unified Access solution in the following deployments: • Greenfield, which includes brand new installations as well as installations upgrading from the WLAN 2300 Series switches to the ERS 8800/8600 • ERS 8800/8600 with no WLAN solution • ERS 8800/8600 with an existing WLAN solution  Tip – For information on how to design your WLAN network, see Design Guide for WLAN 8100 Series (NN48500–587). This guide provides recommended designs, best practices, and an explanation of common deployment issues. November 2012 Avaya VENA Unified Access Technical Configuration Guide 14 avaya.com 2.1 Required Components The following components are the minimum requirements to implement the Unified Access solution: • WC 8180 with software Release 2.0 or later running in the WCP operating mode, not in the default WC (combined WCP+WSP) mode. Controllers must match in one mobility domain. For example, a WC (WCP+WSP) controller cannot be in the same domain as a WCP controller. This may require an interim upgrade to a pre-2.0 release depending upon the existing revision of SW on the WLAN 8180s and APs. • ERS Power over Ethernet switch such as an ERS 8300, ERS 5520, or ERS 4548 • 8120 AP with software Release 2.0 or later • DHCP server • RADIUS server • ERS 8600/8800 with software Release 7.2 or later (only a Base license is required) • ERS 8800/8600 hardware that supports Release 7.2. This includes an 8895 SF/CPU or an 8692 SF/CPU with SuperMezz. Release 7.2 or later supports R and RS modules only. • Wireless clients 2.2 Network Upgrade Procedures Complete the following procedures to upgrade to a Unified Access network: 1. Refer to the Design Guide for WLAN 8100 Series (NN48500–587) to design your WLAN network. 2. If this is a new data network, install an Ethernet network that includes the recommended number of ERS 8800/8600 switches to serve as WSPs. Otherwise, go to the next step. 3. Upgrade the targeted ERS 8800/8600 WSP devices to Release 7.2. 4. Verify that the existing data network has full connectivity after upgrading to Release 7.2 code. 5. Install and configure PoE switches to provide PoE to the APs. (For information, refer to the specific configuration guide for the ERS switch you choose to install: ERS 8300, ERS 5520, or ERS 4548.) 6. Install and configure a DHCP server for the MUs and APs in your network. 7. Install and configure a RADIUS server for user authentication, if required by your design. 2.3 WCP Upgrade Procedures Complete the following procedures to configure the Avaya WLAN Controller 8180 (WC 8180) devices as WCPs in a Unified Access network. These procedures outline the steps to configure the AMDC, BMDC and other controllers that join the domain and sync to the AMDC. For detailed configuration steps, refer to the WCP chapters in this document.  Note – Avaya does not support mixed domains where some WC 8180s are in WCP-only mode and other WC 8180s are in the overlay WCP-WSP mode. 1. Install and configure the planned number of WC 8180s to serve as WCPs. 2. Configure all WC 8180s in your network for IP connectivity. November 2012 Avaya VENA Unified Access Technical Configuration Guide 15 avaya.com 3. Configure the wireless domain by configuring automatic promote of discovered APs (load balance) or add APs to the AP database manually. 4. Add mobility VLANs to the WC 8180 controller. 5. Configure wireless network profiles. 6. Configure wireless radio profiles. 7. Configure wireless AP-Profiles. 8. Configure the wireless domain WSPs by adding the base MAC address of each WSP. (To learn the base MAC address, enter show sys info on each WSP.) 9. Use the following commands to have other controllers join the domain and be synced to the AMDC: wireless controller join-domain domain-name mdc-address wireless controller config-sync  Note – The AMDC and BMDC are the only controllers that are Mobility Domain Controller (MDC) capable. 10. Verify that each controller is synced and has joined the domain by entering the following command: show wireless controller domain-membership. 11. Verify that one of the controllers has the domain role of backup MDC by entering the following command: show wireless controller status. 12. Verify on the WC 8180 that the base MAC address of each WSP was added to the WC 8180 WSP Database so they can be managed by the WC 8180. On the AMDC, enter the show wireless wsp status command to make sure all the WSP base MAC addresses were added to the WC 8180 WSP Database. If you have to add a WSP to the database, use the show sys info command on the ERS 8800/8600 to learn its base MAC address. Then on the WC 8180, use the domain wsp command to add the WSP.  Note – Before configuring your ERS 8800/8600s as WSPs, you must first verify connectivity of the DHCP server and all the WC 8180 controllers within your data network. Ping each controller and DHCP server from every potential WSP to verify connectivity is correct. November 2012 Avaya VENA Unified Access Technical Configuration Guide 16 avaya.com 2.4 WSP Upgrade Procedures Complete the following procedures to configure ERS 8800/8600s as WSPs in a Unified Access network. These procedures outline the steps to configure the WSPs. Tips: Avaya recommends enabling the WSP functionality on the ERS 8800/8600 switches that are physically closest to the APs. This design configuration is the most efficient and it improves WLAN switching performance.  Adding the WSP function to an existing ERS 8800/8600 does not interrupt any traffic. However, the APs may experience a brief interruption (less than 3 seconds). Ideally, you should perform this upgrade during a maintenance window. Before configuring your ERS 8800/8600s as WSPs, you must first verify connectivity of the DHCP server and all the WC 8180 controllers within your data network. Ping each controller and DHCP server from every potential WSP to verify connectivity is correct. 1. On every WSP, create a circuitless IP address and use this address as the interface IP under WLAN config. Use a routing protocol to route the CLIP address. The other controllers and WSPs will use this address for connectivity.  Note – Avaya recommends using OSPF to route CLIP addresses. For example, use the following commands: config ip circuitless-ip-int 1 create 3.3.3.3/255.255.255.255 config ip circuitless-ip-int 1 ospf enable config wireless-switch interface-ip 3.3.3.3 2. To serve mobility VLANs remotely in your domain, use the following command to add a remote VLAN MSTP/STP for remote vlans: wireless-switch remote-vlan-mstp  Note – Avaya recommends using an available STG/MSTI for WLAN. Do not use a provisioned STG/MSTI. 3. To serve mobility VLANs remotely in your domain, add VLANs to VLAN reservation. This allows the WSP to dynamically create remote VLANs and use mobility tunnels for remotely served VLANs. For example, use the following command to reserve VLANs 700–709 and 4092 for remote VLANs. config wireless-switch vlan-reservation add 700-709,4092 4. On every WSP, add each WC 8180 controller to the configuration. You can configure up to four controllers, but their order is significant. The WSP tries to connect to the WCP in the order in which they are configured. For example, in the following configuration, the WSP would try to connect to WCP 1 at 104.30.10.11: config wireless-switch lb-controller add 1 104.30.10.11 config wireless-switch lb-controller add 2 104.30.10.12 config wireless-switch lb-controller add 3 104.30.10.13 config wireless-switch lb-controller add 4 104.30.10.14 November 2012 Avaya VENA Unified Access Technical Configuration Guide 17 avaya.com 5. Create VLAN servers on the appropriate WSPs based on WLAN configuration strategy. Use the following example to map the mobility VLANs that were created on the WC 8180 controller during the wireless domain configuration to local VLANs: config wireless-switch vlan-map MV-ENG create l3-mobility server lvid 400 weight 1 config wireless-switch vlan-map MV-SALES create l3-mobility server lvid 200 weight 1 One VLAN server can have a higher priority over the other by changing the weight value.  Note – If the WSP is part of an SMLT cluster, configure the WLAN VLAN Server on the WSP and its SMLT peer in the same way. 6. Leave the value of tcp-udp-base-port set to its default of 61000. If you need to change the value, use the following command and make sure you change all WSPs in the network. config wireless-switch tcp-udp-port  Note – If this port number does not match on all WSPs in the network, the Mobility Tunnels will not form between WSPs. 7. Enable wireless on all configured WSPs: config wireless-switch enable 8. Install each AP into your network connecting to the PoE switches. If necessary, upgrade the APs to the latest software release. November 2012 Avaya VENA Unified Access Technical Configuration Guide 18 avaya.com 2.5 Upgrade Verification Procedures Complete the following procedures to verify connectivity of the AMDC, WSPs, and mobility units. These procedures outline the steps to configure the WSPs. 2.5.1 AMDC Verification: On the AMDC, use the following commands to verify connectivity: 1. Verify that every WSP has a status of Managed: show wireless wsp status 2. Verify that each AP in the network is managed and connected: show wireless ap status 3. Verify that the status of each MU is Authenticated and that its IP address and Mobility VLAN are correct: show wireless client status 4. Verify that the AMDC status is enabled and the operation mode is WCP: show wireless 5. Verify that the Sync State is Master: show wireless controller config-sync-status 6. Verify that the Domain Name is correct and the Domain Role is Active MDC: show wireless controller domain-membership 7. Verify that MDC-Capable is enabled and Domain Role is Active MDC: show wireless controller status 8. Verify that all Mobility VLANs are active: show wireless domain mobility-vlan 2.5.2 WSP Verification: On each WSP, use the following commands to verify connectivity: 1. Verify that you have an active controller: show wireless lb-controller 2. Verify that the status is enabled: show wireless info 3. Verify that the mobility VLANs are advertised by the correct peers: show wireless peer-advertised-vlans by-advertiser 4. Verify that all the access tunnels and mobility tunnels are running: show wireless peer-devices November 2012 Avaya VENA Unified Access Technical Configuration Guide 19 avaya.com 5. Verify that there are mobility tunnels to all of the other WSPs in the domain, and that there is an access tunnel for each AP on the appropriate WSP: show wireless tunnel 6. Verify that the correct VLAN server is on the appropriate WSP and active: show wireless vlan-map 7. After an MU is logged in, verify that a remote VLAN is reserved and serving remote mobility: show wireless vlan-reservation 8. Verify that each mobility VLAN has the correct priority: show wireless vlan-servers 9. Verify that each tunnel increments keepalives: show wireless tunnel-statistics keepalive 2.5.3 Mobility Unit Verification: Use the following commands to verify that the MUs can log into each Service Set Identifier (SSID): 1. On the WC 8180, verify that the status of each MU is Authenticated and that its IP address and Mobility VLAN are correct: show wireless client status 2. On the WSP, after an MU is logged in, verify that a remote VLAN is reserved and serving remote mobility: show wireless vlan-reservation 3. Verify connectivity to each VLAN server with traffic. November 2012 Avaya VENA Unified Access Technical Configuration Guide 20 avaya.com 3. Testing Methodology The Avaya Networking Test Lab started their testing by deploying the Unified Access solution in three different scenarios: Greenfield installation ERS 8800 installation with no WLAN network WLAN installation with no ERS 8800 network After establishing a steady-state environment where all the components in the solution were properly configured and connected as shown in the network topology figure, the lab conducted comprehensive tests using a methodology that verified connectivity under normal conditions and under various fault conditions. From this steady state, links and switches were failed to simulate network outages. These links and switches were then recovered simulating the restoration of the network. The results of each of these tests are detailed in the following Test Results section. 3.1 Test Results The following table summarizes the test results: Test Case Test Result Verify that control traffic and data traffic are separated by the VRFs. Pass Verify that an ERS 8800 configured as a WSP does not interrupt any existing non-WSP traffic. Pass Verify that APs rebalance across WSPs after upgrading to Unified Access. Pass Create SSIDs without authentication to verify that MUs are still associated to an AP without authentication. Pass Verify that MUs can be authenticated correctly through IDE. Pass Configure different AP profiles to verify that the client supports a and bg modes. Pass Move clients from one AP area to another to verify that roaming happens properly between the different-PHY radio profiles. This test case includes testing voice quality, video quality, data traffic, push-to-talk, and E911. Pass Verify that roaming happens properly between APs connected to the same WSP. Pass Verify that roaming happens properly between APs connected to different WSPs within the same domain. Pass November 2012 Avaya VENA Unified Access Technical Configuration Guide 21 avaya.com Verify that roaming happens properly between APs connected to different WSPs within the same domain but with different VLAN mapping. Pass The remote VLAN was automatically created on the new WSP and all data traffic from the roamed MU is tunneled to the VLAN server WSP and then forwarded out. Configure WIDS to verify that a rogue AP is reported as "rogue" in the rf-scan table and that APs associated to other WSPs are not labeled as ―rogue.‖ Pass Fail over an SMLT link between the WSP and its SMLT edge to verify that APs associated through this SMLT link do not lose any traffic. Pass Recover the failed SMLT link to verify that APs associated through this SMLT link do not lose any traffic. Pass Fail over all SMLT links between one WSP and all of its peer WSPs to verify that APs associated through this SMLT link do not lose any traffic. Pass Recover the failed SMLT link to verify that APs associated through this SMLT link do not lose any traffic. Pass Fail over all the uplinks between a WSP and then recover them back to verify that the peer WSP takes over when one WSP peer is unreachable. Pass Table 1 – Test Results November 2012 Avaya VENA Unified Access Technical Configuration Guide 22 avaya.com 4. Configuration Examples The following figure shows the topology of the network described in this example. Figure 3 – Configuration Example Topology For this example, we will configure the following: AP o Although the AP can be placed anywhere in the work, for this example, we will use two APs (AP-1 and AP-2) connected via an Avaya PoE switch as illustrated in the above diagram. o The Avaya PoE switch in turn is connected to an ERS 8800 switch, named 8007, as shown in the diagram above for connectivity to the OSPF routed core. Wireless Control Point (WCP) 8180 o Core VLAN 60 with IP address of 10.5.60.5/24 o The following Mobility VLANs all provisioned with security mode of wpa-enterprise and to authenticate against Avaya‘s Ignition Server.  Sales1: SSID Sales-Ott  Guest1: SSID Guest  Eng1: SSID Eng-Ott  labott: SSID Lab-Ott November 2012 Avaya VENA Unified Access Technical Configuration Guide 23 avaya.com o Setup AP Profile 2 using Radio Profiles 3 and 4  o Note that you can omit this step. It just demonstrates show to set up new AP and Radio profiles. Manually set up the AP configuration so that AP #1 uses WSP-1 and AP#2 uses WSP-2. RADIUS server using Avaya‘s Ignition Server o IDE in turn is setup to authenticate all users against Windows Active Directory Wireless Switch Point (WSP) o WSP-1 with VLANs 1001 and 1002 VLAN mapping to mobility VLANs Sales1 and Guest1 respectively o WSP-2 with VLANs 1003 and 1004 VLAN mapping to mobility VLANs Eng1 and labott respectively 5. Wireless LAN Configuration 5.1 WCP Configuration – Part 1 5.1.1 1 VLAN and IP configuration Power on the WC 8180, connect the console cable, press Ctrl+Y to start, select Command Line Interface to go to the CLI: WC8180>enable WC8180#configure terminal You can disable the main menu if you like by entering the cmd-interface cli command. 2 Configure the VLAN, in our example VLAN 60, as the management and wireless services VLAN: WC8180(config)#vlan create 60 name wlan_data-60 type port WC8180(config)#vlan configcontrol automatic WC8180(config)#vlan ports 23-24 tagging tagall WCP8180(config)#vlan mem remove 1 23-24 WC8180(config)#vlan members add 60 23-24 WC8180(config)#vlan mgmt 60 3 As the WCP 8180 is connected to an SMLT cluster, create an MLT and disable Spanning Tree: WCP8180(config)#mlt 1 name smltcore enable member 23-24 learning disable WCP8180(config)#mlt 1 loadbalance advance November 2012 Avaya VENA Unified Access Technical Configuration Guide 24 avaya.com 4 Enable VLACP and discard untagged frames as per the SMLT recommendations: WCP8180(config)#vlacp macaddress 01:80:c2:00:00:0f WCP8180(config)#vlacp enable WCP8180(config)#interface fastEthernet 23-24 WCP8180(config-if)#vlacp timeout short WCP8180(config-if)#vlacp timeout-scale 5 WCP8180(config-if)#vlacp enable WCP8180(config-if)#exit WCP8180(config)#vlan ports 23,24 filter-untagged-frame enable WCP8180(config)#show vlacp interface 23,24 =============================================================================== VLACP Information =============================================================================== PORT ADMIN OPER HAVE FAST SLOW TIMEOUT TIMEOUT ETH ENABLED ENABLED PARTNER TIME TIME TYPE SCALE MAC TYPE ADDRESS ------------------------------------------------------------------------------23 true true yes 500 30000 short 5 8103 00:00:00:00:00:00 24 true true yes 500 30000 short 5 8103 00:00:00:00:00:00 5 Add the management IP address: WC8180(config)#interface vlan 60 WC8180(config-if)#ip address 10.5.60.5 255.255.255.0 WC8180(config-if)#exit 6 Add IP routes and enable IP routing: WC8180(config)#ip route 0.0.0.0 0.0.0.0 10.5.60.1 1 WC8180(config)#ip route 0.0.0.0 0.0.0.0 10.5.60.1 enable WC8180(config)#ip routing 7 Verify IP configuration and routes: WC8180(config)#show vlan ip ============================================================================== Vid ifIndex Address Mask MacAddress Offset Routing ============================================================================== Primary Interfaces -----------------------------------------------------------------------------60 10060 10.5.60.5 255.255.255.0 2C:F4:C5:E9:B6:81 2 Enabled ------------------------------------------------------------------------------ November 2012 Avaya VENA Unified Access Technical Configuration Guide 25 avaya.com % Total of Primary Interfaces: 1 WC8180(config)#show ip route =============================================================================== Ip Route =============================================================================== DST MASK NEXT COST VLAN PORT PROT TYPE PRF ------------------------------------------------------------------------------0.0.0.0 0.0.0.0 10.5.60.1 1 60 T#1 S IB 5 10.5.60.0 255.255.255.0 10.5.60.5 1 60 ---- C DB 0 Total Routes: 2 ------------------------------------------------------------------------------TYPE Legend: I=Indirect Route, D=Direct Route, A=Alternative Route, B=Best Route, E=Ecmp Route, U=Unresolved Route, N=Not in HW 8 Verify IP connectivity: WCP8180(config)#ping 10.5.60.1 Host is reachable 9 Enable Telnet and SNMP: WC8180(config)#telnet-access enable WC8180(config)#snmp-server enable November 2012 Avaya VENA Unified Access Technical Configuration Guide 26 avaya.com 5.1.2 1 Wireless Configuration Configure the wireless system interface. This example uses VLAN 60’s IP address: WC8180(config)#wireless WC8180(config-wireless)#interface-ip 10.5.60.5 2 Change the mode of operation to control-plane only (wcp) mode: WC8180(config-wireless)#operation-mode wcp  Before you change the operation mode of the control to WCP, verify that the controller is not wireless enabled using the command show wireless and verify that the Status is Disabled. Also verify that the controller is not a member of a mobility domain using the command show wireless controller domain-membership. 3 Enable the wireless system interface: WCP8180(config-wireless)#enable 4 Verify that the wireless system interface is configured and enabled. Also verify that the operation mode of the controller is set to WCP: WCP8180(config-wireless)#show wireless Operation Mode : WCP Status : Enabled Interface IP : 10.5.60.5 TCP/UDP base port : 61000 Base MAC Address 5 : 2C:F4:C5:E9:B6:00 Configure the controller to be Mobility Domain Controller (MDC) capable. This example uses the following domain password - Avaya@1234WLAN# WCP8180(config-wireless)#controller mdc-capable % Domain password should be between 10-15 characters long. % Password must contain a minimum of 2 upper, 2 lowercase letters % 2 numbers and 2 special characters like !@#$%^&*() Enter domain password: Avaya@1234WLAN# Verify Domain password: ********** November 2012 Avaya VENA Unified Access Technical Configuration Guide 27 avaya.com 5 Verify that the controller is MDC capable: WCP8180(config-wireless)#show wireless controller info MDC-Capable  6 : Enabled The controller is now provisioned for wireless services and to act as a wireless control point (WCP) in the mobility domain Create a mobility domain and join the WCP with the mobility domain. In this example, the mobility domain is named AVAYA: WCP8180(config-wireless)#exit WCP8180(config)#exit WCP8180#wireless controller join-domain domain-name ottlab mdc-address 10.5.60.5 Enter Domain Secret: Avaya@1234WLAN# Use 'show wireless controller domain-membership' to see join status. WCP8180#show wireless controller domain-membership Domain Name : ottlab Domain Role : Active MDC Domain Action Status : Join Success Action Failure Reason : None 5.2 WSP Configuration In this example, we will be configuring WSP1 and WSP2 using CLI on WSP1 and ACLI on WSP2. 1 Log on to the ERS 8800 (WSP2) and enter configuration mode: ERS-8606:5>enable ERS-8606:5#configure terminal 2 Log on to the ERS 8800 (WSP) CLI and add CLI prompts if you wish: WSP 1: ERS-8606:5# config cli prompt WSP1 WSP 2: ERS-8606:5(config)#snmp-server name WSP2 3 Create a core VLAN on WSP1 and WSP2. This example enables OSPF in the core VLAN: WSP 1: WSP1:5# config vlan 25 create byport-mstprstp 0 WSP1:5# config vlan 25 ports add 1/1 November 2012 Avaya VENA Unified Access Technical Configuration Guide 28 avaya.com WSP1:5# config vlan 25 ip create 10.16.1.2/30 WSP1:5# config vlan 25 ip ospf enable WSP 2: WSP2:5(config)#vlan create 27 type port-mstprstp 0 WSP2:5(config)#vlan member add 27 1/1 WSP2:5(config)#interface vlan 27 WSP2:5(config-if)#ip address 10.16.1.6 255.255.255.252 WSP2:5(config-if)#ip ospf enable WSP2:5(config-if)#exit 4 Verify VLAN creation using the following command: WSP1:5# show vlan info port 25 ================================================================================ Vlan Port ================================================================================ VLAN PORT ACTIVE STATIC NOT_ALLOW ID MEMBER MEMBER MEMBER MEMBER -------------------------------------------------------------------------------25 1/1 1/1 WSP2:5(config)#show vlan members 27 ================================================================================ Vlan Port ================================================================================ VLAN PORT ACTIVE STATIC NOT_ALLOW ID MEMBER MEMBER MEMBER MEMBER -------------------------------------------------------------------------------- 27 5 1/1 1/1 Create local VLANs on the WSP for the wireless clients. This example creates VLANs 1001 and 1002 on WSP1 and 1003 and 1004 on WSP2: WSP 1: WSP1:5# config vlan 1001 create byport-mstprstp 0 name "Sales1" WSP1:5# config vlan 1001 ip create 10.16.101.1/24 WSP1:5# config vlan 1001 ip dhcp-relay enable WSP1:5# config vlan 1001 ip ospf interface-type passive WSP1:5# config vlan 1002 ip ospf advertise-when-down enable November 2012 Avaya VENA Unified Access Technical Configuration Guide 29 avaya.com WSP1:5# config vlan 1001 ip ospf enable WSP1:5# config vlan 1002 create byport-mstprstp 0 name "Guest1" WSP1:5# config vlan 1002 ip create 10.16.102.1/24 WSP1:5# config vlan 1002 ip dhcp-relay enable WSP1:5# config vlan 1002 ip ospf interface-type passive WSP1:5# config vlan 1002 ip ospf advertise-when-down enable WSP1:5# config vlan 1002 ip ospf enable WSP1:5# config ip dhcp-relay create-fwd-path agent 10.16.101.1 server 10.12.100.10 mode dhcp state enable WSP1:5# config ip dhcp-relay create-fwd-path agent 10.16.102.1 server 10.12.100.10 mode dhcp state enable WSP 2: WSP2:5(config)#vlan create 1003 name Eng1 type port-mstprstp 0 WSP2:5(config)#interface vlan 1003 WSP2:5(config-if)#ip address 10.17.103.1 255.255.255.0 WSP2:5(config-if)#ip dhcp-relay WSP2:5(config-if)#ip ospf network passive WSP2:5(config-if)#ip ospf advertise-when-down enable WSP2:5(config-if)#ip ospf enable WSP2:5(config-if)#ip dhcp-relay fwd-path 10.12.100.10 WSP2:5(config-if)#ip dhcp-relay fwd-path 10.12.100.10 mode dhcp WSP2:5(config-if)#ip dhcp-relay fwd-path 10.12.100.10 enable WSP2:5(config-if)#exit WSP2:5(config)#vlan create 1004 name labott type port-mstprstp 0 WSP2:5(config)#interface vlan 1004 WSP2:5(config-if)#ip address 10.17.104.1 255.255.255.0 WSP2:5(config-if)#ip dhcp-relay WSP2:5(config-if)#ip ospf network passive WSP2:5(config-if)#ip ospf advertise-when-down enable WSP2:5(config-if)#ip ospf enable WSP2:5(config-if)#ip dhcp-relay fwd-path 10.12.100.10 WSP2:5(config-if)#ip dhcp-relay fwd-path 10.12.100.10 mode dhcp WSP2:5(config-if)#ip dhcp-relay fwd-path 10.12.100.10 enable WSP2:5(config-if)#exit  Since there are no port members for the local WLAN VLANs, it is recommended to enable the OSPF advertise when down option. Note that we will still see an OSPF state delay until the first wireless client connects to the WSP as the OSPF advertise-when-down option requires the interface to at least once have an up state. November 2012 Avaya VENA Unified Access Technical Configuration Guide 30 avaya.com 6 Verify local VLANs creation: WSP1:5# show vlan members ================================================================================ Vlan Port ================================================================================ VLAN PORT ACTIVE STATIC NOT_ALLOW ID MEMBER MEMBER MEMBER MEMBER -------------------------------------------------------------------------------25 1/1 1/1 1001 1002 WSP2:5(config)#show vlan members ================================================================================ Vlan Port ================================================================================ VLAN PORT ACTIVE STATIC NOT_ALLOW ID MEMBER MEMBER MEMBER MEMBER -------------------------------------------------------------------------------27 1/1 1/1 1003 1004 7 Configure a loopback/circuitless IP address to be used for both the OSPF router-id and wireless switch: WSP 1: WSP1:5# config ip circuitless-ip-int 1 create 10.1.1.16/32 WSP1:5# config ip circuitless-ip-int 1 ospf enable WSP 2: WSP2:5(config)#interface loopback 1 WSP2:5(config-if)#ip address 10.1.1.17/32 WSP2:5(config-if)#ip ospf WSP2:5(config-if)#exit 8 Enable OSPF routing and use the loopback address created above as the OSPF router-id and wireless interface IP address: WSP 1: WSP1:5# config ip ospf router-id 10.1.1.16 November 2012 Avaya VENA Unified Access Technical Configuration Guide 31 avaya.com WSP1:5# config ip ospf enable WSP 2: WSP2:5(config)#router ospf WSP2:5(config-ospf)#router-id 10.1.1.17 WSP2:5(config-ospf)#exit WSP2:5(config)#router ospf enable  9 It is recommended that you save configuration on the WSP at regular intervals using the command save config. Verify the IP address assigned to the VLAN interface: WSP1:5# show ip interface ================================================================================ IP Interface - GlobalRouter ================================================================================ INTERFACE IP NET BCASTADDR REASM VLAN BROUTER ADDRESS MASK FORMAT MAXSIZE ID PORT -------------------------------------------------------------------------------Clip1 10.1.1.16 255.255.255.255 ones 1500 -- false Vlan25 10.16.1.2 255.255.255.252 ones 1500 25 false Vlan1001 10.16.101.1 255.255.255.0 ones 1500 1001 false Vlan1002 10.16.102.1 255.255.255.0 ones 1500 1002 false Response from WSP2: WSP2:5(config)#show ip interface ================================================================================ IP Interface - GlobalRouter ================================================================================ INTERFACE IP NET BCASTADDR REASM VLAN BROUTER ADDRESS MASK FORMAT MAXSIZE ID PORT -------------------------------------------------------------------------------Clip1 10.1.1.17 255.255.255.255 ones 1500 -- false Vlan27 10.16.1.6 255.255.255.252 ones 1500 27 false Vlan1003 10.17.103.1 255.255.255.0 ones 1500 1003 false Vlan1004 10.17.104.1 255.255.255.0 ones 1500 1004 false November 2012 Avaya VENA Unified Access Technical Configuration Guide 32 avaya.com 10 Verify the IP OSPF interfaces: WSP1:5# show ip ospf interface ================================================================================ OSPF Interface - GlobalRouter ================================================================================ INTERFACE AREA ADM IFST MET PRI DR/ TYPE AUTH BDR TYPE ID MTU IGNO -------------------------------------------------------------------------------10.1.1.16 0.0.0.0 en DR 10 1 10.1.1.16 pass none dis pass none dis pass none dis brdc none dis 0.0.0.0 10.16.102.1 0.0.0.0 en Down 10 1 0.0.0.0 0.0.0.0 10.16.101.1 0.0.0.0 en DR 10 1 10.16.101.1 0.0.0.0 10.16.1.2 0.0.0.0 en DR 10 1 10.16.1.2 10.16.1.1 WSP2:5(config)#show ip ospf interface ================================================================================ OSPF Interface - GlobalRouter ================================================================================ INTERFACE AREA ADM IFST MET PRI DR/ TYPE AUTH BDR TYPE ID MTU IGNO -------------------------------------------------------------------------------10.1.1.17 0.0.0.0 en DR 10 1 10.1.1.17 pass none dis pass none dis pass none dis brdc none dis 0.0.0.0 10.17.104.1 0.0.0.0 en Down 10 1 0.0.0.0 0.0.0.0 10.17.103.1 0.0.0.0 en Down 10 1 0.0.0.0 0.0.0.0 10.16.1.6  0.0.0.0 en DR 10 1 10.16.1.6 The mobility VLAN OSPF state will be down as ‗Down‘ until a wireless client has successfully authenticated and connected to the network. As shown above, for the local VLAN 1001 on WSP1, the OSPF network of 10.16.101.1 is shown as with a state of ‗DR‘ as a wireless client has successfully connected to the network. November 2012 Avaya VENA Unified Access Technical Configuration Guide 33 avaya.com 11 Verify WSP connectivity with the L2/L3 switch 8000-1: WSP1 WSP2> ping 10.16.1.1 Response from WSP1: 10.16.1.1 is alive Response from WSP2: 10.16.1.1 is alive WSP1 WSP2> ping 10.16.1.5 Response from WSP1: 10.16.1.5 is alive Response from WSP2: 10.16.1.5 is alive 12 Configure the list of controllers on the WSP. In this example, 10.5.60.5 is the WCP IP address: WSP 1: WSP1:5# config wireless-switch lb-controller add 1 10.5.60.5 WSP 2: WSP2:5(config)#wireless WSP2:5(config-wireless)#switch WSP2:5(config-wireless-switch)#lb-controller 1 10.5.60.5 WSP2:5(config-wireless-switch)#exit WSP1:5# show wireless-switch lb-controller Response from WSP1: WC ID WC IP ADDRESS STATUS -------------------------------------------------------------------------------1 10.5.60.5 Configured WSP2:5(config-wireless)#show wireless switch lb-controller WC ID WC IP ADDRESS STATUS -------------------------------------------------------------------------------1 10.5.60.5 November 2012 Configured Avaya VENA Unified Access Technical Configuration Guide 34 avaya.com 13 Assign the loopback/CLIP as the wireless interface IP address: WSP 1: WSP1:5# config wireless-switch interface-ip 10.1.1.16 WSP 2: WSP2:5(config-wireless)#interface-ip 10.1.1.17 14 On the WSP, create a remote VLAN spanning tree group (STG) Id / Instance. This Id is required for wireless clients during an L3 roam: WSP 1: WSP1:5# config wireless-switch remote-vlan-mstp 1 WSP 2: WSP2:5(config-wireless)#switch WSP2:5(config-wireless-switch)#remote-vlan-mstp 1 15 Configure the WSP management interface IP address using the core VLAN IP address: WSP 1: WSP1:5# config wireless-switch mgmt-ip 10.16.1.2 WSP 2: WSP2:5(config-wireless-switch)#mgmt-ip 10.16.1.6 16 Verify the WSP management interface IP address: WSP1:5# show wireless-switch info Response from WSP1: TCP UDP IP ADDRESS BASE PORT STATUS REMOTE MANAGEMENT VLAN MSTP IP -------------------------------------------------------------------------------10.1.1.16 61000 Disable 1 10.16.1.2 WSP2:5(config-wireless-switch)#show wireless TCP UDP IP ADDRESS BASE PORT STATUS -------------------------------------------------------------------------------10.1.1.17 61000 Disable WSP2:5(config-wireless-switch)#show wireless switch REMOTE MANAGEMENT November 2012 Avaya VENA Unified Access Technical Configuration Guide 35 avaya.com VLAN MSTP IP -------------------------------------------------------------------------------1 17 10.16.1.6 Enable wireless on the WSP: WSP 1: WSP1:5# config wireless-switch enable WSP 2: WSP2:5(config-wireless-switch)#exit WSP2:5(config-wireless)#enable  18 Ensure that you assign the CLIP as the wireless interface IP address before you attempt to enable wireless on the WSP. Otherwise the system displays an error Verify the WCP status is enabled and the WLAN interface IP is the CLIP/Loopback address configured above: WSP1:5# show wireless-switch info Response from WSP1: TCP UDP IP ADDRESS BASE PORT STATUS REMOTE MANAGEMENT VLAN MSTP IP -------------------------------------------------------------------------------10.1.1.16 61000 Enable 1 10.16.1.2 WSP2:5(config-wireless)#show wireless TCP UDP IP ADDRESS BASE PORT STATUS -------------------------------------------------------------------------------10.1.1.17 19 61000 Enable Map the mobility VLAN to the local VLAN on the WSP: WSP 1: WSP1:5# config wireless-switch vlan-map Guest1 create l3-mobility server lvid 1002 weight 1 WSP1:5# config wireless-switch vlan-map Sales1 create l3-mobility server lvid 1001 weight 1 WSP 2: WSP2:5(config-wireless)#switch November 2012 Avaya VENA Unified Access Technical Configuration Guide 36 avaya.com WSP2:5(config-wireless-switch)#vlan-map Eng1 l3-mobility server lvid 1003 weight 2 WSP2:5(config-wireless-switch)#vlan-map labott l3-mobility server lvid 1004 weight 2 WSP2:5(config-wireless-switch)#exit WSP2:5(config-wireless)#exit  20 Mobility VLAN to local VLAN mapping must be configured for all controllers in a mobility domain. The mobility VLAN Mobile-Clients is not yet created on the WCP. You can create it at a later point on the controller, using either the CLI, the WMS or the EDM. You can however, map the mobility VLAN Mobile-Clients to the local VLAN on the WSP as an offline mobility VLAN Verify the VLAN mapping: WSP1:5# show wireless-switch vlan-map MOBILITY LOCAL L3 WEIGHT STATE VLAN NAME VLAN ID MOBILITY WCP-V ADMIN MAPPED -------------------------------------------------------------------------------Eng1 0 none 1 active yes no Guest1 1002 server 1 active yes yes Sales1 1001 server 1 active yes yes default-MVLAN 0 none 1 active yes no labott 0 none 1 active yes no WCP-V ADMIN 5 out of 5 entries in all displayed. WSP2:5(config)#show wireless switch vlan-map MOBILITY LOCAL L3 WEIGHT STATE VLAN NAME VLAN ID MOBILITY MAPPED -------------------------------------------------------------------------------Eng1 1003 server 2 active yes yes Guest1 0 none 1 active yes no Sales1 0 none 1 active yes no default-MVLAN 0 none 1 active yes no labott 1004 server 2 active yes yes 21 After completing the WCP configuration steps, verify the client and AP status: WSP1:5# show wireless-switch peer-devices switch Response from WSP1: PEER PEER PEER PEER PEER TYPE MAC ADDR UDP PORT STATUS LOCAL TUNNEL UDP PORT INTERFACE -------------------------------------------------------------------------------- November 2012 Avaya VENA Unified Access Technical Configuration Guide 37 avaya.com MT 00:21:ea:bc:90:00 10.1.1.17 61012 up 61012 WT-1 LOCAL TUNNEL 1 out of 1 entries in all displayed. WSP2:5(config)#show wireless switch peer-device switch PEER PEER PEER PEER PEER TYPE MAC ADDR UDP PORT STATUS UDP PORT INTERFACE -------------------------------------------------------------------------------MT 00:21:ea:bb:d0:00 10.1.1.16 61012 up 61012 WT-1 1 out of 1 entries in all displayed. November 2012 Avaya VENA Unified Access Technical Configuration Guide 38 avaya.com 5.3 Connect APs to network The AP 8120 is powered by Power over Ethernet (PoE). You can connect a PoE switch or an external power injector to the AP. In our example, two APs are connected to an Avaya Stackable PoE switch which in turn is connected to an ERS 8000 switch (named 8007). Through 8007, add VLAN, IP subnet, and enable DHCP relay to the VLAN provisioned on the APs in this example. For this example, we used VLAN 1500 on 8007. 5.3.1 1 Stackable PoE Switch PoE Stackable Switch Configuration: ! ! *** VLAN *** ! vlan ports 24 tagging tagAll filter-untagged-frame enable vlan name 1500 "wlan_ap_vlan1500" vlan configcontrol flexible vlan members 1500 19-20,24 5.3.2 1 8007 Switch – ERS 8800 switch connected to the PoE switch above 8007 Configuration – VLAN and DHCP: # # PORT CONFIGURATION - PHASE I # ethernet 4/35 perform-tagging enable # # VLAN CONFIGURATION - PHASE I # vlan vlan vlan vlan vlan 1500 1500 1500 1500 1500 create byport-mstprstp 0 name "wlan_ap_vlan1500" ports add 4/35 ip create 10.7.115.1/255.255.255.128 ip dhcp-relay enable ip ospf enable # # DHCP CONFIGURATION - GlobalRouter # ip dhcp-relay create-fwd-path agent 10.7.115.1 server 10.12.100.10 mode dhcp state enable November 2012 Avaya VENA Unified Access Technical Configuration Guide 39 avaya.com 5.3.3 1 DHCP Server – DHCP Scope for AP Configure the DHCP server for AP discovery: The Avaya AP 8120 discovers the controller IP addresses using DHCP option 43 or DNS. This example uses the DHCP Option 43. The Option 43 setting must be 08 08 41 56 41 59 41 20 41 50 01 04 0A 05 3C 05, where 0a 05 3c 05 is the HEX representation of the controller IP 10.5.60.5. Example taken from a Windows DHCP server: November 2012 Avaya VENA Unified Access Technical Configuration Guide 40 avaya.com 5.4 WCP Configuration – Part 2 1 Verify that the WSP is discovered by the controller: WCP8180#show wireless domain wsp discovered ------------------------------------------------------------------------WSP MAC WSP IP -------------------- ------------------ Discovery Reason ------------------------------- 00:21:EA:BB:D0:00 10.1.1.16 Not present in WSP DB 00:21:EA:BC:90:00 10.1.1.17 Not present in WSP DB ------------------------------------------------------------------------- 2 Manually promote all discovered WSPs to be managed by the controller: WCP8180#wireless domain discovered-wsp approve-all 3 View the WSP status where a status of Managed indicates that the WSP is managed by the controller: WCP8180#show wireless wsp status Status - Managed(Managed),PeerManagd(Peer Managed) Failed(Connection Failed),Disconcted(Disconnected), Unknown(Unknown) ------------------------------------------------------------------------------Family MAC WSP IP WCP IP Status AP Peer WSP ------- ----------------- --------------- --------------- ---------- ----- ---ERS8800 00:21:EA:BB:D0:00 10.1.1.16 10.5.60.5 Managed 1 1 ERS8800 00:21:EA:BC:90:00 10.1.1.17 10.5.60.5 Managed 1 1 ------------------------------------------------------------------------------Status - Managed(Managed),PeerManagd(Peer Managed) Failed(Connection Failed),Disconcted(Disconnected), Unknown(Unknown) Total number of WSPs: 2 November 2012 Avaya VENA Unified Access Technical Configuration Guide 41 avaya.com 4 Discover the APs by powering on the APs and connecting them to the PoE switch or external power injector: WCP8180#show wireless domain ap discovered Total number of discovered APs = 2 -----------------------------------------------------------------------------AP MAC AP IP AP Model Country Reason ----------------- --------------- -------- ------- ----------------------- 00:1B:4F:6C:07:40 10.7.115.51 AP8120 US Not present in AP DB 00:1B:4F:6C:1F:80 10.7.115.50 AP8120 US Not present in AP DB ------------------------------------------------------------------------------  5 When the AP receives the WC information from the DHCP server, the AP automatically connects to the controller. All discovered APs are placed in the Discovered AP table on the controller. Auto-promote discovered APs to be managed by the controller. All APs managed by the controller are populated in the Domain AP database. You can also, if required, manually add APs to the Domain AP database: WCP8180(config)#wireless WCP8180(config-wireless)#domain auto-promote-discovered-ap % Warning: AP database will be synchronized after running config-sync command.  6 Auto promotion enables all discovered APs to be automatically promoted to the controller managed state as soon as they are discovered Display the AP status. The following commands display the status of the APs and other relevant information. Verify that all APs have a status of Managed to provide the configured wireless services: WCP8180(config-wireless)#show wireless ap status Total APs: 2, Managed APs: 2, Failed APs: 0 ------------------------------------------------------------------------------AP MAC WCP IP WSP IP WCP WSP Need Img Status Status Upgrd ----------------- --------------- --------------- ---------- ---------- ---- 00:1B:4F:6C:07:40 10.5.60.5 10.1.1.16 Managed Connected Yes 00:1B:4F:6C:1F:80 10.5.60.5 10.1.1.17 Managed Connected Yes ------------------------------------------------------------------------------- November 2012 Avaya VENA Unified Access Technical Configuration Guide 42 avaya.com 7 Perform either a bulk or single AP image upgrade. This step is optional. Perform this step if an image upgrade is required: Bulk AP image upgrade WCP8180(config-wireless)#exit WCP8180(config)#exit WCP8180#wireless domain ap image-update start Single AP image upgrade WCP8180# WCP8180#wireless ap image-update ? H.H.H AP MAC Address WCP8180#wireless ap image-update 00:1B:4F:6C:07:40 After you have applied the image upgrade to the APs, verify the upgrade status. Verify that the Need Image Upgrade field displays as No; note you need to wait for the AP to reboot, which takes a couple of minutes: 8 WCP8180#show wireless ap status Total APs: 2, Managed APs: 2, Failed APs: 0 ------------------------------------------------------------------------------AP MAC WCP IP WSP IP WCP WSP Need Img Status Status Upgrd ----------------- --------------- --------------- ---------- ---------- ---- 00:1B:4F:6C:07:40 10.5.60.5 10.1.1.16 Managed Connected No 00:1B:4F:6C:1F:80 10.5.60.5 10.1.1.17 Managed Connected No ------------------------------------------------------------------------------- 9 Verify that the connected APs are discovered by the WSPs: WSP1:5# show wireless-switch peer-devices ap PEER PEER PEER PEER PEER TYPE MAC ADDR UDP PORT STATUS LOCAL TUNNEL UDP PORT INTERFACE -------------------------------------------------------------------------------AT 00:1b:4f:6c:1f:80 10.7.115.50 61012 up 61012 WT-2 1 out of 1 entries in all displayed. WSP2:5#show wireless switch peer-devices ap November 2012 Avaya VENA Unified Access Technical Configuration Guide 43 avaya.com PEER PEER PEER PEER PEER TYPE MAC ADDR UDP PORT STATUS LOCAL TUNNEL UDP PORT INTERFACE -------------------------------------------------------------------------------AT 00:1b:4f:6c:07:40 10.7.115.51 61012 up 61012 WT-2 1 out of 1 entries in all displayed. 10 Create mobility VLAN(s). In this example, we will create mobility VLANs Sales1, Guest1, Eng1, and labott: WCP8180#config term WCP8180(config)#wireless WCP8180(config-wireless)#domain mobility-vlan Sales1 WCP8180(config-wireless)#domain mobility-vlan Guest1 WCP8180(config-wireless)#domain mobility-vlan Eng1 WCP8180(config-wireless)#domain mobility-vlan labott WCP8180(config)#show wireless domain mobility-vlan --------------------------------------------------Mobility VLAN Name Status -------------------------------- ----------------- default-MVLAN Active Sales1 Active Guest1 Active Eng1 Active labott Active --------------------------------------------------Total Number of Mobility VLANs = 5 November 2012 Avaya VENA Unified Access Technical Configuration Guide 44 avaya.com 11 Using Identify Engines (IDE), add the WCP as an Authenticator. For more details on setting up IDE, please refer to the Ignition Server Microsoft NAP with Active Directory Authentication Technical Configuration Guide, publication number NN48500-625: 1. Within Ignition Dashboard, select Configuration > Authenticators > default. Click New. 2. Enter the IP address of the WSP (10.5.60.5), select Authenticator Type Wireless, Vendor Avaya, Device Template ers-switches-avaya, the same RADIUS Shared Secret used on the WCP, applicable Access Policy (in this case, simple authenticate against Microsoft Active Directory), and finally click on OK when done. November 2012 Avaya VENA Unified Access Technical Configuration Guide 45 avaya.com 12 Create a RADIUS profile named ide. In this example, we are using IDE as our RADIUS server which has an IP address of 10.12.120.5: WCP8180(config-wireless)#security WCP8180(config-security)#radius profile ide WCP8180(config-security)#radius server 10.12.120.5 ide WCP8180(config-security)#radius server 10.12.120.5 ide secret WCP8180(config-security)#radius server 10.12.120.5 ide health-check-interval 0 Enter server secret: avaya Verify server secret: ***** WCP8180(config-security)#exit Provided that IDE has been provisioned with the WCP as an authenticator, use the following command to confirm the RADIUS server is up and running: WCP8180(config-wireless)#show wireless security radius server Total radius servers: 1 Server IP Radius Profile Port# Priority Status --------------- -------------------------------- ----- -------- ------10.12.120.5  13 ide 1812 1 Up Please note that by default, a health check using a user name of admin will be forwarded to determine if the RADIUS server is available for authentication. This is useful where multiple RADIUS servers are used where, if the health check mechanism fails on a RADIUS server, a new RADIUS server will be selected. In our example, as we only have one RADIUS server, we simply set the interval to 0 to disable this feature. If you do wish to use this feature, you will need to add a user of admin or a new user and change the configuration of the WCP 8180. Create a network profile. In this example, we will create four network profiles and mobility VLAN associations all authenticated against Identity Engines (IDE) RADIUS server WCP8180(config-wireless)#network-profile 1 Entering network-profile (id = 1) ... WCP8180(config-network-profile)#profile-name Sales WCP8180(config-network-profile)#ssid Sales-Ott WCP8180(config-network-profile)#mobility-vlan Sales1 WCP8180(config-network-profile)#user-validation radius WCP8180(config-network-profile)#radius accounting authentication-profile ide WCP8180(config-network-profile)#security-mode wpa-enterprise WCP8180(config-network-profile)#wpa2 key-type ascii key Avaya1234 WCP8180(config-network-profile)#no dot1x session-key-refresh-period group-key-refreshperiod WCP8180(config-network-profile)#exit November 2012 Avaya VENA Unified Access Technical Configuration Guide 46 avaya.com WCP8180(config-wireless)#network-profile 2 Entering network-profile (id = 2) ... WCP8180(config-network-profile)#profile-name engineering WCP8180(config-network-profile)#ssid Eng-Ott WCP8180(config-network-profile)#mobility-vlan Eng1 WCP8180(config-network-profile)#user-validation radius WCP8180(config-network-profile)#radius accounting authentication-profile ide WCP8180(config-network-profile)#security-mode wpa-enterprise WCP8180(config-network-profile)#wpa2 key-type ascii key Avaya1234 WCP8180(config-network-profile)#no dot1x session-key-refresh-period group-key-refreshperiod WCP8180(config-network-profile)#exit WCP8180(config-wireless)#network-profile 3 Creating network-profile (id = 3) ... WCP8180(config-network-profile)#ssid Guest WCP8180(config-network-profile)#mobility-vlan Guest1 WCP8180(config-network-profile)#user-validation radius WCP8180(config-network-profile)#radius accounting authentication-profile ide WCP8180(config-network-profile)#security-mode wpa-enterprise WCP8180(config-network-profile)#wpa2 key-type ascii key Avaya1234 WCP8180(config-network-profile)#exit WCP8180(config-wireless)#network-profile 4 WCP8180(config-network-profile)#ssid Lab-Ott WCP8180(config-network-profile)#mobility-vlan labott WCP8180(config-network-profile)#user-validation radius WCP8180(config-network-profile)#radius accounting authentication-profile ide WCP8180(config-network-profile)#security-mode wpa-enterprise WCP8180(config-network-profile)#wpa2 key-type ascii key Avaya1234 WCP8180(config-network-profile)#no dot1x session-key-refresh-period group-key-refreshperiod exit WCP8180(config-wireless)#show wireless network-profile ------------------------------------------------------------------------Id Profile Name Mobility VLAN Security Mode Captive Portal --- ------------------- ------------------- -------------- -------------1 Sales Sales1 WPA-Enterprise Disabled 2 engineering Eng1 WPA-Enterprise Disabled 3 network_003 Guest1 WPA-Enterprise Disabled 4 network_004 labott WPA-Enterprise Disabled ------------------------------------------------------------------------- November 2012 Avaya VENA Unified Access Technical Configuration Guide 47 avaya.com 14 Create the Access radio profiles. You can create an a-n or a bg-n radio profile based on the supported radio frequency. This example creates an a-n and bg-n radio profile: WCP8180(config-wireless)#radio-profile 3 access-wids a-n Creating a radio-profile (id = 3) with country-code = US and ap-model AP8120/E. .. Creating a radio-profile (id = 3) ... WCP8180(config-radio-profile)#profile-name A-N WCP8180(config-radio-profile)#exit WCP8180(config-wireless)#radio-profile 4 access-wids bg-n Creating a radio-profile (id = 4) with country-code = US and ap-model AP8120/E. .. Creating a radio-profile (id = 4) ... WCP8180(config-radio-profile)#profile-name BG-N WCP8180(config-radio-profile)#exit 15 Enable Client band steering and load balancing on the configured Access radio profiles: Client Band Steering is a technique used to increase the overall capacity of a dual-band wireless network composed of multiple APs that use both the 2.4 GHz and 5.0 GHz radios. Client stations predominantly support 2.4GHz. Many modern client stations have dual-band support that tends to favor connection to 2.4GHz networks (although some popular modern clients still only support 2.4GHz, e.g. the Apple iPhone 4). As a result, dual-band networks have the 2.4GHz band heavily utilized, and the 5GHz band underutilized. The objective of Client Band Steering is to encourage 5GHz capable client stations to use the 5GHz radio instead of the 2.4GHz radio, leaving the 2.4GHz radio for stations that only support 2.4GHz. As part of Client load-balancing configuration, you enable/disable the Load balancing. After you enable load balancing, you configure the following parameters: utilization-start (%) — Utilization level at which client association load balancing begins utilization-cutoff (%) — Client association load balancing cutoff. If this threshold is exceeded, all further client associations are refused.  This cutoff is useful so that controller CPU utilization is maintained at an optimum level. If CPU utilization goes beyond 100%, it causes the controller to restart which in turn results in an unprecedented controller outage. Enable client band steering and load balancing using the following commands: WC8180(config-wireless)#radio-profile 3 Entering radio-profile (id = 3) configuration mode... WC8180(config-radio-profile)#band-steering enable WC8180(config-radio-profile)#load-balance enable WC8180(config-radio-profile)#load-balance utilization-start 30 WC8180(config-radio-profile)#load-balance utilization-cutoff 60 November 2012 Avaya VENA Unified Access Technical Configuration Guide 48 avaya.com WCP8180(config-radio-profile)#exit WC8180(config-wireless)#radio-profile 4 Entering radio-profile (id = 3) configuration mode... WC8180(config-radio-profile)#band-steering enable WC8180(config-radio-profile)#load-balance enable WC8180(config-radio-profile)#load-balance utilization-start 30 WC8180(config-radio-profile)#load-balance utilization-cutoff 60 WCP8180(config-radio-profile)#exit 16 View the created radio profiles: WCP8180(config-wireless)#show wireless radio-profile 3 detail Radio Profile Id: 3 Name : A-N Configuration Model : AP8120/E Country Code : US Operation Mode : access-wids IEEE 802.11 Mode : 802.11a/n RF Scan - Other Channels : No Broadcast/Multicast Rate Limiting : Disabled Broadcast/Multicast Rate Limit (Normal): 50 pkts/sec Broadcast/Multicast Rate Limit (Burst) : 75 pkts/sec Beacon Interval : 100 msec DTIM Period : 3 Fragmentation Threshold : 2346 RTS Threshold : 2347 Short Retry Limit : 7 Long Retry Limit : 4 Max Transmit Lifetime : 512 msec Max Receive Lifetime : 512 msec Max Clients : 200 Auto Channel Adjustment Mode : Yes Auto Power Adjustment Mode : Yes Non-Auto Transmit Power : 80 % WMM(Wi-Fi Multimedia Mode) : Enabled Band Steering Mode : Enabled Load Balancing Mode : Enabled Load Balance Utilization Start : 30 % Load Balance Utilization Threshold : 60 % November 2012 Avaya VENA Unified Access Technical Configuration Guide 49 avaya.com Station Isolation Mode : Disabled Channel Bandwidth : 40 MHz Primary Channel : Lower 802.11n Protection Mode : Auto SGI(Short Guard Interval) : Disabled STBC(Space Time Block Code) Mode : Enabled Multicast Transmit Rate : Auto APSD(Auto Power Save Delivery) Mode : Enabled No ACK for Incorrectly Received Frames : Disabled RRM(Radio Resource Measurement) : Enabled WCP8180(config-wireless)#show wireless radio-profile 4 detail Radio Profile Id: 4 Name : BG-N Configuration Model : AP8120/E Country Code : US Operation Mode : access-wids IEEE 802.11 Mode : 802.11bg/n RF Scan - Other Channels : No Broadcast/Multicast Rate Limiting : Disabled Broadcast/Multicast Rate Limit (Normal): 50 pkts/sec Broadcast/Multicast Rate Limit (Burst) : 75 pkts/sec Beacon Interval : 100 msec DTIM Period : 3 Fragmentation Threshold : 2346 RTS Threshold : 2347 Short Retry Limit : 7 Long Retry Limit : 4 Max Transmit Lifetime : 512 msec Max Receive Lifetime : 512 msec Max Clients : 200 Auto Channel Adjustment Mode : Yes Auto Power Adjustment Mode : Yes Non-Auto Transmit Power : 80 % WMM(Wi-Fi Multimedia Mode) : Enabled Band Steering Mode : Enabled Load Balancing Mode : Enabled Load Balance Utilization Start : 30 % November 2012 Avaya VENA Unified Access Technical Configuration Guide 50 avaya.com Load Balance Utilization Threshold : 60 % Station Isolation Mode : Disabled Channel Bandwidth : 20 MHz Primary Channel : Lower 802.11n Protection Mode : Auto SGI(Short Guard Interval) : Disabled STBC(Space Time Block Code) Mode : Enabled Multicast Transmit Rate : Auto APSD(Auto Power Save Delivery) Mode : Enabled No ACK for Incorrectly Received Frames : Disabled RRM(Radio Resource Measurement) November 2012 : Enabled Avaya VENA Unified Access Technical Configuration Guide 51 avaya.com 17 Optionally, configure one or more capture profiles for a mobility domain: Capture profiles are used for remote packet capture. Remote packet capture enables live debugging to troubleshoot client related issues. It can also be used to monitor traffic in a wireless network. After you configure a capture profile, you must apply these profiles to specific access points (AP) within the mobility domain to start a packet capture. A default capture profile with profile Id 1 is automatically created. You can choose to use this profile or configure a suitable one using the following steps. WCP8180 (config-wireless)#capture-profile 2 Verify configuration of the capture profile(s). WCP8180(config-capture-profile)#? Capture Profile Configuration Commands default Set a command to its default values direction Filter capture by flow direction duration Stop after elapsed duration in seconds end End wireless capture configuration mode exit Exit from wireless capture configuration mode filters Set filters for the packet capture profile interface Specify the capture interface(s) for the packet capture no Disable capture profile parameters observer-ip IP address of the observer host observer-port L4 port on the observer host profile-name Name of the profile promisc-mode Enable promiscuous capture on selected interfaces snap-length Truncate capture to a specified length (in bytes) WCP8180(config-capture-profile)#exit WCP8180(config-wireless)#show wireless capture-profile <1-4> detail  18 You can configure up to 4 capture profiles. Create an AP profile and assign network and radio profiles to it. This example creates an AP profile named AP-Profile-2 using Radius Index 2 with VAP IDs 1 to 4 for each corresponding Network Profile 1 to 4 configured in step 14 above. For each radio, select the Radio Profiles created in step 15 & 16 (Radio Profiles 3 and 4): WCP8180(config-wireless)#ap-profile 2 Creating ap-profile (id = 2) with country-code = US and ap-model AP8120/E.. WCP8180(config-ap-profile)#profile-name AP-Profile-2 WCP8180(config-ap-profile)#network 2 1 profile-id 1 WCP8180(config-ap-profile)#network 2 2 profile-id 2 November 2012 Avaya VENA Unified Access Technical Configuration Guide 52 avaya.com WCP8180(config-ap-profile)#network 2 3 profile-id 3 WCP8180(config-ap-profile)#network 2 4 profile-id 4 WCP8180(config-ap-profile)#radio 1 profile-id 3 enable WCP8180(config-ap-profile)#radio 2 profile-id 4 enable WCP8180(config-ap-profile)#exit  The network configuration consists of network [<1-2> Radio Index] [<1-16> VAP ID] profile-id [<1-64> Network Profile ID>. WCP8180(config-wireless)#show wireless ap-profile network 2 -------------------------------------------------------------------AP Profile Id Radio Id VAP Id Network Profile Id Radio Operation ------------- -------- ------ ------------------ --------------- 2 1 1 1 On 2 2 1 1 On 2 2 2 2 On 2 2 3 3 On 2 2 4 4 On -------------------------------------------------------------------- WCP8180(config-wireless)#show wireless ap-profile radio 2 ------------------------------------------------------------------------AP Profile Id Radio Id Radio Profile Id Radio Status Supported Model ------------- -------- ---------------- ------------ ---------------- 2 1 3 On AP8120/E 2 2 4 On AP8120/E ----------------------------------------------------------------------- 19 Manually add APs to the Domain AP database. APs (specifically the AP MAC addresses) must be added to the Domain AP database to provide wireless services: WCP8180(config-wireless)#domain ap 00:1B:4F:6C:07:40 Entering domain AP (mac = 00:1B:4F:6C:07:40) configuration mode... WCP8180(config-domain-ap)#profile-id 2 WCP8180(config-domain-ap)#exit WCP8180(config-wireless)#domain ap 00:1B:4F:6C:1F:80 Entering domain AP (mac = 00:1B:4F:6C:07:40) configuration mode... WCP8180(config-domain-ap)#profile-id 2 WCP8180(config-domain-ap)#exit November 2012 Avaya VENA Unified Access Technical Configuration Guide 53 avaya.com  This is an optional step. Perform this step if you need to manually promote an AP to be managed by the controller. If your system is configured for auto-promotion, all discovered APs are automatically added to the Domain AP database and are promoted to be managed by the controller. Using this command, you can also modify other AP parameters. Modification of other parameters is however not shown in the following command sequence. If you wish, you can also manually provision the preferred WCP and WSP such as the following for each AP: WCP8180(config-wireless)#domain ap 00:1B:4F:6C:07:40 Entering domain AP (mac = 00:1B:4F:6C:07:40) configuration mode... WCP8180(config-domain-ap)#profile-id 2 WCP8180(config-domain-ap)#preferred-controller 10.5.60.5 WCP8180(config-domain-ap)#preferred-wsp 10.1.1.16 WCP8180(config-domain-ap)#exit WCP8180(config-wireless)#domain ap 00:1B:4F:6C:1F:80 Entering domain AP (mac = 00:1B:4F:6C:07:40) configuration mode... WCP8180(config-domain-ap)#profile-id 2 WCP8180(config-domain-ap)#preferred-controller 10.5.60.5 WCP8180(config-domain-ap)#preferred-wsp 10.1.1.17 WCP8180(config-domain-ap)#exit 20 Apply the wireless configuration to all APs. Perform a config-sync to apply changes to AP: WCP8180(config-wireless)#exit WCP8180(config)#exit WCP8180#wireless controller config-sync 21 Reset the AP. If you changed the domain AP parameters (for example, if you changed the AP profile), you must reset all APs for the configuration to take effect: WC8180#wireless domain ap reset start November 2012 Avaya VENA Unified Access Technical Configuration Guide 54 avaya.com 22 Display the AP status. The following commands show the status and other relevant information, of the APs. All APs must have the status as Managed to be able to provide the configured wireless services: WCP8180#show wireless ap status Total APs: 2, Managed APs: 2, Failed APs: 0 ------------------------------------------------------------------------------AP MAC WCP IP WSP IP WCP WSP Need Img Status Status Upgrd ----------------- --------------- --------------- ---------- ---------- ---- 00:1B:4F:6C:07:40 10.5.60.5 10.1.1.16 Managed Connected No 00:1B:4F:6C:1F:80 10.5.60.5 10.1.1.17 Managed Connected No ------------------------------------------------------------------------------- WCP8180#show wireless ap status detail Total APs: 2, Managed APs: 2, Failed APs: 0 --------------------------------------------------------------AP (MAC=00:1B:4F:6C:07:40) IP Address : 10.7.115.51 WCP Status : Managed WSP Status : Connected WCP Assignment-Method : Preferred WSP Assignment-Method : Preferred AP Label : Hardware Type : Avaya AP8120 Software Version : 2.0.0.061 Serial Number : LBNNTMJXAD0FTR Location : Country Code : US Band Plan : FCC Locale : US/40 Age (since last update) : 0d:00:00:03 System Up Time : 0d:00:03:23 Discovery Reason : Controller IP via DHCP Managing Controller : Local Controller WCP System IP Address : 10.5.60.5 Profile Id : 2 WCP Managed Time : 0d:00:02:40 November 2012 Avaya VENA Unified Access Technical Configuration Guide 55 avaya.com WSP System IP Address : 10.1.1.16 WSP Connected Time : 0d:00:02:45 Profile Name : AP-Profile-2 Configuration Apply Status : Success Authenticated Clients : 0 Configuration Failure Error : Reset status : Not Started Code Download Status : Not Started Image Upgrade Needed : No Ap Techdump Status : Not Started --------------------------------------------------------------AP (MAC=00:1B:4F:6C:1F:80) IP Address : 10.7.115.50 WCP Status : Managed WSP Status : Connected WCP Assignment-Method : Preferred WSP Assignment-Method : Preferred AP Label : Hardware Type : Avaya AP8120 Software Version : 2.0.0.061 Serial Number : LBNNTMJXAD0FPC Location : Country Code : US Band Plan : FCC Locale : US/40 Age (since last update) : 0d:00:00:04 System Up Time : 0d:00:03:26 Discovery Reason : Controller IP via DHCP Managing Controller : Local Controller WCP System IP Address : 10.5.60.5 Profile Id : 2 WCP Managed Time : 0d:00:02:44 WSP System IP Address : 10.1.1.17 WSP Connected Time : 0d:00:02:49 Profile Name : AP-Profile-2 Configuration Apply Status : Success Authenticated Clients : 0 Configuration Failure Error : Reset status : Not Started November 2012 Avaya VENA Unified Access Technical Configuration Guide 56 avaya.com Code Download Status : Not Started Image Upgrade Needed : No Ap Techdump Status : Not Started --------------------------------------------------------------- 23 Display the AP VAP (SSID) status: WCP8180#show wireless ap vap status AP MAC Address: 00:1B:4F:6C:07:40 -----------------------------------------------------------------------Radio/ # of Auth VAP Id VAP MAC Address SSID Clients -------- ----------------- -------------------------------- 1 / 1 00:1B:4F:6C:07:40 Sales-Ott 0 2 / 1 00:1B:4F:6C:07:50 Sales-Ott 0 2 / 2 00:1B:4F:6C:07:51 Eng-Ott 0 2 / 3 00:1B:4F:6C:07:52 Guest 0 2 / 4 00:1B:4F:6C:07:53 Lab-Ott 0 --------- AP MAC Address: 00:1B:4F:6C:1F:80 -----------------------------------------------------------------------Radio/ # of Auth VAP Id VAP MAC Address SSID Clients -------- ----------------- -------------------------------- 1 / 1 00:1B:4F:6C:1F:80 Sales-Ott 0 2 / 1 00:1B:4F:6C:1F:90 Sales-Ott 0 2 / 2 00:1B:4F:6C:1F:91 Eng-Ott 0 2 / 3 00:1B:4F:6C:1F:92 Guest 0 2 / 4 00:1B:4F:6C:1F:93 Lab-Ott 0 --------- ------------------------------------------------------------------------  The SSID configured in the SSID Settings pane identifies your wireless network to which mobility clients connect to. November 2012 Avaya VENA Unified Access Technical Configuration Guide 57 avaya.com 24 Display the AP radio status: WCP8180#show wireless ap radio status ---------------------------------------------------------------------------AP MAC Radio Operation Channel Power 802.11 Mode Auth Clients ----------------- ----- --------- ------- ----- --------------- -----------00:1B:4F:6C:07:40 1 On 44 80 802.11a/n 0 2 On 11 80 802.11b/g/n 0 ---------------------------------------------------------------------------00:1B:4F:6C:1F:80 1 On 36 80 802.11a/n 0 2 On 11 80 802.11b/g/n 1 ---------------------------------------------------------------------------- 25 Verify wireless client connectivity. At this point the wireless network is ready for client connectivity. Scan for wireless networks and connect a wireless client to the network SalesOtt and Guest1. Verify the client status and details on the WC: WCP8180#show wireless client status Total number of clients: 2 ------------------------------------------------------------------------------Client Client Associated Mobility MAC Address IP Address AP MAC VLAN Status ----------------- --------------- ----------------- --------------- ----------00:13:46:EA:CC:12 10.16.101.102 00:1B:4F:6C:1F:80 Sales1 Auth 14:7D:C5:68:7C:94 10.16.102.111 00:1B:4F:6C:1F:80 Guest1 Auth ------------------------------------------------------------------------------- WCP8180#show wireless client status detail Total number of clients: 2 Client (MAC=00:13:46:EA:CC:12) Client IP Address : 10.16.101.102 SSID : Sales-Ott Mobility Vlan : Sales1 Status : Authenticated Captive Portal Authenticated User : No Transmit Data Rate : 54 Mbps Inactive Period : 0d:00:00:00 November 2012 Avaya VENA Unified Access Technical Configuration Guide 58 avaya.com Age (since last update) : 0d:00:00:01 Network Time : 0d:00:06:19 Associating Controller : Local Controller Controller IP Address : 10.5.60.5 WSP IP Address : 10.1.1.17 802.11n Capable : No STBC Capable : No AP MAC Address : 00:1B:4F:6C:1F:80 BSSID : 00:1B:4F:6C:1F:90 Radio Interface : 2 Channel : 11 Network Profile ID : 1 NetBios Name : Radio Resource Measurement (RRM) : Unsupported Location Report Requests : Unsupported AP Detection via Beacon Table Report : Unsupported Beacon Active Scan Capability : Unsupported Beacon Passive Scan Capability : Unsupported Channel Load Measurement : Unsupported ------------------------------------------------------------Client (MAC=14:7D:C5:68:7C:94) Client IP Address : 10.16.102.111 SSID : Guest Mobility Vlan : Guest1 Status : Disassociated Captive Portal Authenticated User : No Transmit Data Rate : 1 Mbps Inactive Period : 0d:00:00:43 Age (since last update) : 0d:00:00:26 Network Time : 0d:00:01:52 Associating Controller : Local Controller Controller IP Address : 10.5.60.5 WSP IP Address : 10.1.1.17 802.11n Capable : Yes STBC Capable : No AP MAC Address : 00:1B:4F:6C:1F:80 BSSID : 00:1B:4F:6C:1F:92 Radio Interface : 2 Channel : 11 November 2012 Avaya VENA Unified Access Technical Configuration Guide 59 avaya.com Network Profile ID : 3 NetBios Name : Radio Resource Measurement (RRM) : Unsupported 26 Location Report Requests : Unsupported AP Detection via Beacon Table Report : Unsupported Beacon Active Scan Capability : Unsupported Beacon Passive Scan Capability : Unsupported Channel Load Measurement : Unsupported You can also monitor wireless client in the mobility domain using the remote packet capture feature. You must assign the capture profile configured in step 18, to an AP and then start a packet capture instance on the AMDC. You need an observer host PC to view the packet capture:  Before you start a packet capture, ensure that you do the following on the Observer host PC. Download the Netcat application from http://www.downloadnetcat.com/. Launch the Netcat application to open the UDP port for listening. On a Windows PC, download netcat.exe to a folder. On the command prompt navigate to the folder where the executable is saved and enter the command nc.exe -l -p 37008 –u . Launch Wireshark application to capture frames. In this example, 00:1B:4F:6C:07:40 is the MAC address of the AP to which you want to associate the capture profile. 1 is the profile ID of the Capture profile configured in step 18. WC8180# wireless capture-instance start ap 00:1B:4F:6C:07:40 profile 1 View capture instances as follows: To view capture instances for a specific AP: WC8180# show wireless capture-instance ap To view capture instances for a specific profile: WC8180# show wireless capture-instance profile To view all capture instances: WC8180# show wireless capture-instance all For more information on debugging wireless clients using remote packet capture, including further details on instructions and procedure steps for the configuration of capture profiles and capture instances, see Avaya WLAN 8100 WC 8180 CLI Reference (NN47251–107). November 2012 Avaya VENA Unified Access Technical Configuration Guide 60 avaya.com 6. Wireless Clients For a wireless client to connect, at minimum, ensure the following on your wireless client. Since we are using PEAP, there is no need to manually download certificates. 1. Security type is set to WPS-Enterprise. 2. Encryption type is set to AES. 3. Authentication method is set to PEAP. 4. All users have been added; as in our example, all valid users are entered via Microsoft‘s Active Directory For example, assuming we are using a Microsoft Windows 7 client, clicking on the wireless icon located via the bottom right on the screen show display all for SSID‘s advertised as shown below. If any of the SSIDs do not have a green bar and it has a red ―X‖, right-click the corresponding SSID and select properties as shown below. November 2012 Avaya VENA Unified Access Technical Configuration Guide 61 avaya.com Double check the security settings as shown below. November 2012 Avaya VENA Unified Access Technical Configuration Guide 62 avaya.com Verify Client Connectivity 7. 7.1 Normal operations Assuming we have two wireless clients connected to SSID Lab-Ott (WSP-1) and Sales-Ott (WSP-2): 1 Based on the configuration in this example (Section 5.4, step 19), AP-1 (001b.4f6c.0749) would connect to WSP-2 while AP-2 (001b.4f6c.1f80) should connect to WSP-1: WSP1:5# show wireless-switch peer-device ap PEER PEER PEER PEER PEER LOCAL TYPE MAC ADDR UDP PORT STATUS TUNNEL UDP PORT INTERFACE -------------------------------------------------------------------------------AT 00:1b:4f:6c:07:40 10.7.115.51 61012 up 61012 WT-2 PEER LOCAL TUNNEL 1 out of 1 entries in all displayed. WSP2:5#show wireless switch peer-device ap PEER PEER PEER PEER TYPE MAC ADDR UDP PORT STATUS UDP PORT INTERFACE -------------------------------------------------------------------------------AT 00:1b:4f:6c:1f:80 10.7.115.50 61012 up 61012 WT-2 1 out of 1 entries in all displayed. 2 VLANs 1001 (Guest1) and 1002 (Sales1) should be displayed on WSP-1 while VLANs 1003 (Eng1) and 1004 (labott) should be displayed on WSP-2: WSP1:5# show wireless-switch vlan-map MOBILITY LOCAL L3 VLAN NAME VLAN ID MOBILITY WEIGHT STATE WCP-V ADMIN MAPPED -------------------------------------------------------------------------------Eng1 0 none 1 active yes no Guest1 1002 server 1 active yes yes Sales1 1001 server 1 active yes yes default-MVLAN 0 none 1 active yes no labott 0 none 1 active yes no L3 WEIGHT STATE WCP-V ADMIN WSP2:5#show wireless switch vlan-map MOBILITY November 2012 LOCAL Avaya VENA Unified Access Technical Configuration Guide 63 avaya.com VLAN NAME VLAN ID MOBILITY MAPPED -------------------------------------------------------------------------------Eng1 1003 server 2 active yes yes Guest1 0 none 1 active yes no Sales1 0 none 1 active yes no default-MVLAN 0 none 1 active yes no labott 1004 server 2 active yes yes 7.2 Roaming We simulate a roaming move by simply powering off AP-2 (001b.4f6c.1f80). It in turn will result in: The wireless client will connect from AP-2 to AP-1 (001b.4f6c.0740) The wireless client connected to SSID Lab-Ott will tunnel over to WSP-1 o 1 VLAN labott should now be a client on WSP-1 Verify mobility VLAN labott is now a client on WSP-1: WSP1:5#show wireless-switch vlan-map MOBILITY LOCAL L3 WEIGHT STATE VLAN NAME VLAN ID MOBILITY WCP-V ADMIN MAPPED -------------------------------------------------------------------------------Eng1 0 none 1 active yes no Guest1 1002 server 1 active yes yes Sales1 1001 server 1 active yes yes default-MVLAN 0 none 1 active yes no labott 0 client 1 active yes no WCP8180#show wireless client status Total number of clients: 1 ------------------------------------------------------------------------------Client Client Associated Mobility MAC Address IP Address AP MAC VLAN Status ----------------- --------------- ----------------- --------------- ----------00:13:46:EA:CC:12 10.17.104.51 00:1B:4F:6C:07:40 labott Auth 70:05:14:63:A9:F9 10.16.101.101 00:1B:4F:6C:07:40 Sales1 Auth ------------------------------------------------------------------------------- November 2012 Avaya VENA Unified Access Technical Configuration Guide 64 avaya.com 2 We should also see traffic via the tunnel from WSP-2 to WSP-1: WSP1:5#show wireless-switch tunnel ================================================================================ WLAN Tunnels ================================================================================ TUNNEL PEER INTERFACE DEVICE ID PEER IP :UDP PORT TYPE STATUS -------------------------------------------------------------------------------WT-1 00:21:ea:bc:90:00 10.1.1.17 :61012 MT up WT-2 00:1b:4f:6c:07:40 10.7.115.51 :61012 AT up WSP1:5#show wireless-switch tunnel-statistics all ===================================================================================== TUNNEL STATISTICS ===================================================================================== TUNNEL PEER IN OUT IN OUT IN INTERFACE DEVICE ID FRAME FRAME KEEPALIVE KEEPALIVE DISCARD OUT DISCARD ------------------------------------------------------------------------------------WT-1 00:21:ea:bc:90:00 18802 22025 940680 940696 0 0 WT-2 00:1b:4f:6c:07:40 147 116 6684 6684 14 0 November 2012 Avaya VENA Unified Access Technical Configuration Guide 65 avaya.com 8. Reference Documentation For more information on any WLAN 8100 or ERS 8800/8600 feature, go to www.avaya.com/support and download the configuration guide for the relevant feature. Document Title Publication Number Description Avaya VENA Unified Access Technical Configuration Guide NN48500-643 This document shows how to configure the Unified Access network described in this Technical Solution Guide. Design Guide for WLAN 8100 Series NN48500–587 This guide provides recommended designs, best practices, and an explanation of common deployment issues for the WLAN 8100. Avaya WLAN 8100 Quick Start NN47251-111 This document provides a configuration example to get your Unified Access network up and running as soon as possible. Avaya WLAN 8100 Configuration NN47251-305 This document provides detailed information on configuring the WLAN 8100. Avaya ERS 8800/8600 Configuration – Unified Access NN46205-526 This document provides detailed information on the configuration commands in the Unified Access solution. © 2012 Avaya Inc. All Rights Reserved. Avaya and the Avaya Logo are trademarks of Avaya Inc. and are registered in the United States and other countries. All trademarks identified by ®, TM or SM are registered marks, trademarks, and service marks, respectively, of Avaya Inc. All other trademarks are the property of their respective owners. Avaya may also have trademark rights in other terms used herein. References to Avaya include the Nortel Enterprise business, which was acquired as of December 18, 2009. November 2012 Avaya VENA Unified Access Technical Configuration Guide 66