dell networking campus switching and mobility reference architecture

62
A Dell Reference Architecture Dell Networking Campus Switching and Mobility Reference Architecture 2.0 Dell Networking Solutions Engineering April 2014

Upload: gareth-segree

Post on 23-Dec-2015

74 views

Category:

Documents


9 download

DESCRIPTION

Dell Networking Campus Switching and Mobility Reference Architecture

TRANSCRIPT

Page 1: Dell Networking Campus Switching and Mobility Reference Architecture

A Dell Reference Architecture

Dell Networking Campus Switching and Mobility Reference Architecture 2.0 Dell Networking Solutions Engineering April 2014

Page 2: Dell Networking Campus Switching and Mobility Reference Architecture

2 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

Revisions

Date Description

April 2014 Ver. 1.0 - Dell Networking Campus Switching and Mobility Architecture 2.0

Ashish Malpani, Pratik Mehta, Manjesh Siddamurthy, Colin King, Ed Blazek, Mike Matthews and Kevin Locklear

©2014 Dell Inc., All rights reserved.

Except as stated below, no part of this document may be reproduced, distributed or transmitted in any form or by any

means, without express permission of Dell.

You may distribute this document within your company or organization only, without alteration of its contents.

THIS DOCUMENT IS PROVIDED “AS-IS”, AND WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED. IMPLIED

WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE SPECIFICALLY DISCLAIMED.

PRODUCT WARRANTIES APPLICABLE TO THE DELL PRODUCTS DESCRIBED IN THIS DOCUMENT MAY BE FOUND

AT: http://www.dell.com/learn/us/en/19/terms-of-sale-commercial-and-public-sector Performance of network

reference architectures discussed in this document may vary with differing deployment conditions, network loads, and

the like. Third party products may be included in reference architectures for the convenience of the reader. Inclusion

of such third party products does not necessarily constitute Dell’s recommendation of those products. Please consult

your Dell representative for additional information.

Trademarks used in this text:

Dell™, the Dell logo, Dell Boomi™, Dell Precision™ ,OptiPlex™, Latitude™, PowerEdge™, PowerVault™,

PowerConnect™, OpenManage™, EqualLogic™, Compellent™, KACE™, FlexAddress™, Force10™ and Vostro™ are

trademarks of Dell Inc. Other Dell trademarks may be used in this document. Cisco Nexus®, Cisco MDS®, Cisco NX-

0S®, and other Cisco Catalyst® are registered trademarks of Cisco System Inc. EMC VNX®, and EMC Unisphere® are

registered trademarks of EMC Corporation. Intel®, Pentium®, Xeon®, Core® and Celeron® are registered trademarks

of Intel Corporation in the U.S. and other countries. AMD®is a registered trademark and AMD Opteron™, AMD

Phenom™ and AMD Sempron™ are trademarks of Advanced Micro Devices, Inc. Microsoft®, Windows®, Windows

Server®, Internet Explorer®, MS-DOS®, Windows Vista® and Active Directory® are either trademarks or registered

trademarks of Microsoft Corporation in the United States and/or other countries. Red Hat® and Red Hat® Enterprise

Linux® are registered trademarks of Red Hat, Inc. in the United States and/or other countries. Novell® and SUSE® are

registered trademarks of Novell Inc. in the United States and other countries. Oracle® is a registered trademark of

Oracle Corporation and/or its affiliates. Citrix®, Xen®, XenServer® and XenMotion® are either registered trademarks

or trademarks of Citrix Systems, Inc. in the United States and/or other countries. VMware®, Virtual SMP®, vMotion®,

vCenter® and vSphere® are registered trademarks or trademarks of VMware, Inc. in the United States or other

countries. IBM® is a registered trademark of International Business Machines Corporation. Broadcom® and

NetXtreme® are registered trademarks of Broadcom Corporation. Qlogic is a registered trademark of QLogic

Corporation. Other trademarks and trade names may be used in this document to refer to either the entities claiming

the marks and/or names or their products and are the property of their respective owners. Dell disclaims proprietary

interest in the marks and names of others.

Page 3: Dell Networking Campus Switching and Mobility Reference Architecture

3 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

Table of contents Revisions ............................................................................................................................................................................................. 2

1 Introduction ................................................................................................................................................................................ 5

2 Campus Networks Designed for End-User Connectivity ................................................................................................... 7

2.1 Dell Networking N-Series Ethernet Switches ............................................................................................................ 7

2.1.1 Dell Networking N4000 Series ..................................................................................................................................... 7

2.1.2 Dell Networking N3000 Series ..................................................................................................................................... 8

2.2 Dell Networking W-Series Wireless LAN ..................................................................................................................... 9

2.2.1 Dell Networking W-7200 Series Controllers.............................................................................................................. 9

2.2.2 Dell Networking W-AP220 Series 802.11ac Access Point ....................................................................................... 9

2.2.3 Dell Networking Instant W-AP220 Series Controllerless 802.11ac Access Point .............................................. 10

2.2.4 Dell Networking Instant W-IAP155/P Controllerless 802.11n Access Point ........................................................ 11

2.2.5 Dell Networking W-Series ClearPass Access Management System ..................................................................... 11

2.3 Network Management Solutions ............................................................................................................................... 12

2.3.1 Wired Management Solution ...................................................................................................................................... 12

2.3.2 Wireless Management Solutions ................................................................................................................................ 13

2.4 Dell SonicWALL NSA Series ......................................................................................................................................... 13

3 Campus Reference Design .................................................................................................................................................... 15

3.1 Campus Reference Design Topology ....................................................................................................................... 15

3.2 Large Campus ................................................................................................................................................................ 16

4 Campus Switching Architecture ........................................................................................................................................... 19

4.1 Important Features & Best Practices ......................................................................................................................... 19

4.1.1 Multi-switch Link Aggregation (MLAG) ..................................................................................................................... 20

4.1.2 Virtual LAN’s and Virtual LAN Routing ....................................................................................................................... 22

4.1.3 Spanning Tree ................................................................................................................................................................ 23

4.1.4 Virtual Router Redundancy Protocol ......................................................................................................................... 23

4.1.5 Security & Authentication ............................................................................................................................................ 24

4.1.6 Stacking........................................................................................................................................................................... 25

4.1.7 Quality of Service .......................................................................................................................................................... 27

5 Campus Mobility Architecture ............................................................................................................................................... 29

5.1 W-Series Controller Based WLAN .............................................................................................................................. 29

5.1.1 W-Series Controller Topology .................................................................................................................................... 29

Page 4: Dell Networking Campus Switching and Mobility Reference Architecture

4 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

5.1.2 WLAN Main Campus Configuration ........................................................................................................................... 30

5.2 W-Series Instant Access Point – Remote Deployments ........................................................................................ 39

5.2.1 W-Series Instant Access Point Networks .................................................................................................................. 39

5.2.2 W-Series Instant Access Points for Teleworkers ..................................................................................................... 39

5.3 W-ClearPass Access Management ........................................................................................................................... 40

5.3.1 W-ClearPass Policy Manager ..................................................................................................................................... 40

5.3.2 W-ClearPass Applications............................................................................................................................................ 44

6 Campus Network Management System .............................................................................................................................. 46

6.1 Open Manage Network Manager ............................................................................................................................... 46

6.2 W-Airwave ...................................................................................................................................................................... 49

6.2.1 W-Airwave Interface ..................................................................................................................................................... 49

6.2.2 W-Airwave Features ...................................................................................................................................................... 51

7 Campus Firewall ....................................................................................................................................................................... 57

7.1 Best Practices & Important Features ......................................................................................................................... 57

7.1.1 Active/Standby High Availability ................................................................................................................................. 57

7.1.2 Security Services Licenses ........................................................................................................................................... 58

7.1.3 NAT Policies, Zones & Firewall ................................................................................................................................... 59

A Resources and References ..................................................................................................................................................... 61

B Attachments .............................................................................................................................................................................. 62

Support and Feedback ................................................................................................................................................................... 62

Page 5: Dell Networking Campus Switching and Mobility Reference Architecture

5 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

1 Introduction Modern campus network deployments are changing at a rapid pace. IT managers are being simultaneously

driven to support an increasing variety of users and devices throughout their organizations, while adapting

their networks to address the needs of key business functions, and striving to provide reliability,

performance, and flexibility. Today’s businesses require campus networks to provide reliable, high-

performance wired and wireless connectivity that is capable of delivering rich applications and access to

corporate resources irrespective of device form factors.

In addition, business owners are asking their IT staff to be more agile by delivering the access in ever-

shorter deployment times, with fewer resources.

The Dell Networking Campus Reference Architecture (CRA) provides solutions to address these key

problems facing small and large businesses. The reference architecture is a blue print for a modern

campus network (Figure 1) providing an understanding of the network design principles and best practices.

Using the Reference Architecture enables network designers to get a running start on their deployments

so they can quickly deliver valued solutions to their business.

The reference architecture addresses the following:

Designing a modern end-to-end campus network to deliver wired and wireless user connectivity

incorporating switching, mobility and security

Simplifying the complex deployment and manageability of separate sites in a campus or across

branches

Delivering a modern approach to access and aggregation that minimizes downtime in campus

networks and enables 24x7 access

Enabling user access management and dynamic policy assignment for guests, employees, and

contractors based on their roles

Enabling users to self-provision corporate and guest access on a variety of devices (BYOD)

Providing the latest technology to address speed, bandwidth, redundancy, and failure resistant

networks

A network that performs best is one which delivers the current business and user needs, is built on a solid

infrastructure, and enables the business and its goals to scale on demand.

Page 6: Dell Networking Campus Switching and Mobility Reference Architecture

6 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

Figure 1 Campus Global View

Page 7: Dell Networking Campus Switching and Mobility Reference Architecture

7 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

2 Campus Networks Designed for End-User Connectivity Dell Networking products provide all the pieces of the puzzle to enable your workforce to perform both

efficiently and reliably (Figure 2).

Figure 2 Dell Campus Network

2.1 Dell Networking N-Series Ethernet Switches Dell Networking Ethernet switch product line delivers end-to-end modern campus network solutions

utilizing the latest switching technologies. The topology and features used in the CRA enable a loop-free

and fully active/active design for high-performance, fault-tolerant campus switching networks. These

energy-efficient 1/10GbE switches are designed for modernizing and scaling campus networks.

2.1.1 Dell Networking N4000 Series The heart of the modern campus consists of N4000 Series 10GbE Layer 3 switches (Figure 3). These

switches provide a power-efficient and flexible 10GbE switching solution for simple scalability and high

density.

Page 8: Dell Networking Campus Switching and Mobility Reference Architecture

8 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

Figure 3 Dell Networking N4000 Series

The N4000 series switches also feature Multi-chassis Link Aggregation (MLAG) to support loop-free

redundancy without spanning tree.

The architecture with MLAG allows two Dell Networking switches to act as a single switch to provide

multiple paths across the network. The benefits of MLAG include:

Failover in cases of failed cables or switches

Increased bandwidth of up to double the bandwidth of a single switch

Elimination of port blocking as well as reconvergence delays of spanning tree

2.1.2 Dell Networking N3000 Series The access layer of the featured network is comprised of N3000 Series 1GbE Layer 3 switches (Figure 4).

They provide a resilient 1GbE switching solution for advanced Layer 3 distribution and dense stacking. Dual

hot swappable 80 Plus certified power supplies add resiliency and the capacity to provide up to 48 ports

of PoE+ in a 1RU footprint.

Figure 4 Dell Networking N3000 Series

In this architecture, the N3000 Series are deployed using high performance stacking across the campus to

connect and power:

Wireless Access Points and end-user wired client devices

IP cameras

VoIP phones

Security and Control devices

Page 9: Dell Networking Campus Switching and Mobility Reference Architecture

9 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

2.2 Dell Networking W-Series Wireless LAN Dell Networking’s wireless product line is a best in class enterprise solution. The W-Series offers the latest

in wireless technology and access solutions to better manage, secure, and maintain your network.

Dell Networking’s W-Series WLAN products offer both centralized controller based and distributed

controllerless solutions. With this architectural flexibility, the W-Series product line offers a wide variety of

capacity and performance options to fit any campus, branch and teleworker deployments.

2.2.1 Dell Networking W-7200 Series Controllers The W-7200 Series controllers are high-density, power-efficient 1U devices that can support up to 2048

Access Points and 32K users with 40Gbps of encrypted throughput. The campus reference design utilizes

the W-7210 Controller (Figure 5), which provides support for up to 512 Access Points and over 16K

concurrent users/devices.

Figure 5 Dell Networking W-7200 Series Mobility Controller

This centralized controller-based solution features:

Policy Enforcement

Application aware monitoring and enforcement

Redundancy topologies and centralized licensing

Spectrum monitoring

Wireless Intrusion Protection

Advanced Cryptography

VPN termination

2.2.2 Dell Networking W-AP220 Series 802.11ac Access Point Dell Networking W-AP220 series access points (Figure 6) are purpose-built 802.11ac enterprise access

points. The campus reference design utilizes the W-AP225 Access Point to support the fastest

performance and largest capacity available. It features:

1.9 Gbps aggregate throughput

1.3 Gbps in 5GHz

Page 10: Dell Networking Campus Switching and Mobility Reference Architecture

10 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

600 Mbps in 2.4GHz

Adaptive Radio Management

Active RF spectrum management for optimal WLAN performance

ClientMatch technology

Infrastructure controlled client connectivity and roaming optimization

Internal and external antenna options

Figure 6 Dell Networking W-AP220 Series

2.2.3 Dell Networking Instant W-AP220 Series Controllerless 802.11ac Access

Point The campus reference design utilizes the W-IAP225 for remote buildings and offices. These Instant Access

Points feature a virtual controller for a distributed controllerless solution. The simplicity of configuration

and deployment make Instant products a perfect solution for remote sites with limited IT expertise onsite.

Instant APs offer many of the same enterprise class features as normal Aps, including

Over-the-air Provisioning

VPN

Integrated Firewall

Airwave and ClearPass integration

Page 11: Dell Networking Campus Switching and Mobility Reference Architecture

11 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

2.2.4 Dell Networking Instant W-IAP155/P Controllerless 802.11n Access Point The W-IAP155/P access points (Figure 7) have the same software as the W-IAP220 Series IAPs above. They

support 802.11n and have a very useful form-factor that makes them perfect for the desktop or small

business applications. They include four GbE Ethernet ports to enable the connection of peripherals. The

PoE version sources two ports for connecting devices requiring PoE power. The CRA uses the W-IAP155/P

as a Remote Access Point solution.

Figure 7 Dell Networking Instant W-IAP155

2.2.5 Dell Networking W-Series ClearPass Access Management System A modern campus must deliver appropriate access to users with context-aware policies that take into

account

Who the user is

What their role is

What type of device they are using

When are they connected

Where they are

What applications they are using on the network

The W-ClearPass (Figure 8) is a highly integrated access management solution incorporating AAA,

Guest/Visitor Management, Employee Onboarding, and a NAC. It provides role and device based network

access control for employees, contractors and guests across wired, wireless and VPN infrastructures.

Built-in Remote Authentication Dial-In User Service (RADIUS), Terminal Access Controller Access Control

System (TACACS+), profiling, onboarding, guest access, health checks and the ability to leverage third-

party mobile device management solutions ensure seamless policy enforcement across the entire

Page 12: Dell Networking Campus Switching and Mobility Reference Architecture

12 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

network. Centrally managed network access policies provide the comprehensive authentication

capabilities that are required for today’s highly mobile workforce, regardless of the type of device or

device ownership. Automated services let users securely connect their own devices, register AirPlay and

AirPrint enabled devices for sharing, and create guest access credentials. The result is a consistent and

scalable network access control solution that exceeds the security requirements for Bring Your Own

Device (BYOD) and IT managed devices.

Figure 8 W-ClearPass Appliance

Key features of W-ClearPass include:

Policy Management – role enforcement for WLAN, LAN, and VPN networks

Onboard – BYOD, auto-provisioning

OnGuard – Posture, health checks

Guest – self-service guest access

3rd

party Mobile Device Management (MDM) and Network Access Control (NAC) integration

Built-in Authentication, Authorization and Accounting (AAA) services – RADUIS, TACACS+, Kerberos

Web, 802.1X, non-802.1X authentication and authorization

2.3 Network Management Solutions

2.3.1 Wired Management Solution Dell Networking OpenManage Network Manager

OpenManage Network Manager (OMNM) is a centralized management solution for Dell networking

environments. OMNM provides discovery, configuration management, monitoring and reporting for the

entire Dell Networking family of products.

Page 13: Dell Networking Campus Switching and Mobility Reference Architecture

13 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

Automated discovery

Configure and manage device groups

Monitor health and performance

Automate common configuration actions

Firmware deployment

2.3.2 Wireless Management Solutions

2.3.2.1 Dell Networking W-Airwave Wireless Management Suite The W-Airwave Wireless Management Suite (AWMS) delivers operational efficiency for teams managing

rapidly changing networks and mobile users who connect via the wireless LAN as well as wired Ethernet

ports. AWMS provides a wide range of actionable information, from time-sensitive alerts to historical

reporting. With data that spans days, months, and seasons, the information is always available to spot

trends, plan capacity and design the right strategies for the organization.

Key features in W-Airwave:

Efficient Configuration Management

VisualRF – real-time wireless coverage maps

Planning and Provisioning

Multi-vendor support

MDM integration

IDS and Rouge AP containment

2.4 Dell SonicWALL NSA Series The Dell SonicWALL Next-Generation Firewall Series (Figure 9) secures distributed enterprises, small- to

medium-sized organizations, branch offices, school campuses and government agencies with

Next-generation firewall security

Multi-core architecture

Deep packet inspection technology

Lowered complexity and cost

Intrusion prevention

Gateway anti-malware

SSL decryption

Page 14: Dell Networking Campus Switching and Mobility Reference Architecture

14 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

Figure 9 Dell SonicWALL NSA 6600

Dell SonicWALL Next-Generation Firewalls provide industry leading protection, performance, and

scalability with the highest number of concurrent connections, lowest latency, no file size limitations and

superior connections per second in their class.

Utilizing the same architecture found in the flagship SuperMassive Next-Generation Firewall line, which

was initially developed for the most demanding carriers and enterprises, the Dell SonicWALL Network

Security Appliance (NSA) Series delivers that same enterprise-class security and performance while also

providing Dell’s acclaimed expertise in delivering ease of use and high value to small and medium-size

organizations.

Page 15: Dell Networking Campus Switching and Mobility Reference Architecture

15 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

3 Campus Reference Design The goal of the Campus Reference Architecture is to help IT managers evaluate and plan for an end-to-

end campus network. This document shows how wired, wireless, network access, and network

management fit together.

The campus network is designed around the number and type of users and device types (wired and

mobile) and scales with it. The present reference architecture is built around 3000 users on a modern

campus who connect using both wired and wireless devices.

3.1 Campus Reference Design Topology Figure 10 andFigure 11 show the entire campus network, it includes all the key parts needed for medium to

large campus deployments.

Figure 10 Featured Campus Network

Page 16: Dell Networking Campus Switching and Mobility Reference Architecture

16 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

Figure 11 Campus Network Building Layout

3.2 Large Campus The reference architecture covers a simple illustration for a large campus with 3000 users/ports accessible

throughout two five-story buildings. There is a single server room and each floor contains three wiring

closets. The server room contains the aggregation switches, wireless controllers, firewalls, and network

and policy management appliances.

Allowing for growth is an important consideration in building out any network. Best practice is to reserve

approximately 10% of the ports to easily expand network capacity without equipment additions.

This illustration uses five Dell Networking N3048 switches used in each of the switch closets. In addition to

the stack of Dell Networking N3048’s, each closet will contain one N3048P (POE+) switch. The list below

shows the breakout and assumption for this illustration.

Page 17: Dell Networking Campus Switching and Mobility Reference Architecture

17 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

Access Switches: (16 stacks)

Total of 80qty N3048 switches

3840 total Ethernet ports

384 ports reserved for future growth

3000 ports , one for each user

456 ports for misc. devices (printers, sensors, etc.)

Total of 16qty N3048P switches

768 total POE+ ports

76 ports reserved for future growth

Approx. 150 ports used for Access Points

542 POE+ ports for misc. devices (VoIP phones, cameras, etc.)

The requirements for each deployment vary widely based on the needs of a company. Your deployment

may need a POE port to support a phone at each desk. With this campus reference design, it’s easy to

expand to include more switches in each stack.

This illustration uses a single aggregation layer in one building. IT managers may prefer to implement a

multiple tiered design (Figure 9) or use existing routing infrastructure to connect buildings.

Aggregation Switches:

Total of 2qty N4064F switches

128 total SFP+ ports

12 ports reserved for future growth

32 ports used to connect 16 access stacks

4 ports used to connect 2 firewalls

80 ports to connect 40 misc. severs/appliances

Wireless Controllers and APs:

Total of 2qty W-7210 controllers

W-7210- 512 campus or remote AP capacity

51 APs for future growth

150 APs used for main campus (20 users per AP)

37 APs used as Air Monitors (optional, 1 Air Monitor per 4 APs)

274 APs for teleworkers

Instant APs (remote site)- quantity dependent on users at remote site

Page 18: Dell Networking Campus Switching and Mobility Reference Architecture

18 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

W-ClearPass:

Total of 1qty 5K appliance

Supports up to 5,000 authenticated devices

Additional 5K appliances can be added to form a cluster at any time

W-Airwave:

W-Airwave is sold as a per device license.

Additional licenses can be purchased at any time.

Number of devices limited by server size and capability

Open Manage Network Manager:

OMNM is sold as a per device license

Additional licenses can be purchased at any time.

Number of devices limited by server size and capability

SonicWALL:

Total of 2qty NSA6600

License per HA pair

4qty 10 GbE SFP+ ports for optimal bandwidth to/from aggregation switches

4000 user support for single sign-on

12.0 Gbps firewall inspection throughput

Organizations with remote offices or remote workers are discussed in this reference architecture in the

Campus Mobility Architecture section of this document. Traditional wired switching solutions for the

remote sites are not covered in this example. However, the wireless features to connect to the corporate

campus network are validated and discussed in Campus Mobility Architecture.

Page 19: Dell Networking Campus Switching and Mobility Reference Architecture

19 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

4 Campus Switching Architecture The Dell networking N-series based campus switching architecture modernizes the campus network by

Supporting loop-free redundancy without spanning tree by using MLAG to create high availability

and full bandwidth utilization

Interfacing seamlessly with existing infrastructure for greater interoperability and integration

Uniting various networking products with the latest open standard protocols for more network

choice

The Dell campus switching architecture 2.0 (Figure 12) is based on the MLAG feature running on the new

6.1. operating system. In this architecture two N4064F aggregation switches form peers to each other

while the two stacks of N3000 access switches form partners to MLAG peers. Each switch stack serves

part of one floor of a campus building, which is aggregated by two 10gig uplinks. The N4064F aggregation

layer switches easily scale and support up to 24 stacks of access switches.

Figure 12 Dell campus Aggregator & Access switch Topology

This architecture provides increased bandwidth by overcoming the limitation of spanning tree to block

redundant ports. The design is highly redundant in terms of both link failure and switch failure.

4.1 Important Features & Best Practices The following sections outline some of the features & guidelines to consider while designing network.

Page 20: Dell Networking Campus Switching and Mobility Reference Architecture

20 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

4.1.1 Multi-switch Link Aggregation (MLAG) In older network deployments, redundant links between two switches are bundled together in a Link

Aggregation Group (LAG). This allows the links to appear as a single link in the spanning tree topology. The

advantage is that all LAG member links can be in the forwarding state and a link failure can be recovered in

milliseconds. This allows the bandwidth on the redundant links to be utilized. However, LAGs are limited to

connecting multiple links between two partner switches, which leaves the switch as a single point of

failure in the topology.

Dell Networking MLAG extends the LAG’s bandwidth advantage across multiple Dell Networking switches

connected to a LAG partner device. The LAG partner device is oblivious to the fact that it is connected

over a LAG to two peer Dell Networking switches; instead, the two switches appear as a single switch to

the partner. All links can carry data traffic across a physically diverse topology and in the case of a link or

switch failure; traffic can continue to flow with minimal disruption.

MLAGs provide an Active-Active split aggregation deployment across two switches acting as one. MLAG

creates a more resilient network with higher bandwidth capabilities.

Note: The peer link between peer switches requires a native VLAN be configured in order to

communicate keep-alive messages. MLAG peer switches must be from the same vendor.

Dell Networking N-Series provide a very flexible MLAG feature that can be used to create multiple

topologies. Few examples are shown in Figure 13.

The topologies here are shown for information purposes only and are not part of the Large Campus

deployment referenced throughout this reference architecture.

Page 21: Dell Networking Campus Switching and Mobility Reference Architecture

21 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

QSFP+

MASTERSYS FAN PSU

RS-232

ETHERNETLNK ACT4644424038363432302826242220181614121086420 48 56

52 60

SFP+

Force10 S4810P

QSFP+

MASTERSYS FAN PSU

RS-232

ETHERNETLNK ACT4644424038363432302826242220181614121086420 48 56

52 60

SFP+

Force10 S4810P

2 tier (2 layer, full mesh)

2 layer (MLAG and VLT)

1 partner switch 3 partner switches

VLTi

2 partner switches

Figure 13 Examples of MLAG Topologies

Note: For details on deploying MLAG on Dell Networking N-series switches, refer to the following white

paper: Using MLAG in Dell Networks.

Figure 14 shows an example of MLAG configuration on the Core/Aggregation switches (Dell Networking

N4064F).

feature vpc vpc domain 1 peer-keepalive enable interface port-channel 1 description "MLAG-Peer-Link" spanning-tree disable switchport mode trunk switchport trunk native vlan 100 switchport trunk allowed vlan 1-172,174-4093 vpc peer-link exit ! interface port-channel 17 description "MLAG-Partner-Link" switchport mode trunk switchport trunk native vlan 100 switchport trunk allowed vlan 1-172,174-4093

Page 22: Dell Networking Campus Switching and Mobility Reference Architecture

22 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

vpc 17 exit interface Fo1/0/1 channel-group 1 mode active description "MLAG-Peer-Link" exit interface Te1/0/17 channel-group 17 mode active description "MLAG-Partner-link" switchport mode trunk switchport trunk native vlan 100 exit

Figure 14 MLAG Configuration

Note: Throughout this document, the configuration example will contain specific vlan, ip, or port

channel numbers. These specific settings were used to validate the network in a lab setting. The numbers

are included in the examples to allow the reader to follow the configurations.

4.1.2 Virtual LAN’s and Virtual LAN Routing Virtual LANs (VLANs) offer a method of dividing one physical network into multiple broadcast domains.

However, VLAN-enabled switches cannot forward traffic across VLAN’s by themselves. For VLAN to VLAN

communication, a Layer 3 switch/router is required. For this architecture, Dell Networking N4064Fs are

used as aggregation switches to handle all inter VLAN routing activities helping devices from two different

VLAN segments to communicate

In this reference architecture, several VLANs are configured to provide what a typical large campus might

need. Figure 15 shows an example of a VLAN configuration. To see the full configuration of the Dell

Networking N4064F used in this example, refer to the attachment.

vlan 5-7,57,100,173

exit

vlan 5

name "Engineering"

exit

vlan 6

name "Finance"

exit

vlan 7

name "Guest"

exit

vlan 57

name "NMS"

exit

vlan 100

name "General"

exit

vlan 173

Page 23: Dell Networking Campus Switching and Mobility Reference Architecture

23 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

name "Lab"

exit

interface vlan 5

ip address 10.1.5.1 255.255.255.0

exit

interface vlan 6

ip address 10.1.6.1 255.255.255.0

exit

interface vlan 7

ip address 10.1.7.1 255.255.255.0

exit

interface vlan 50

ip address 10.1.50.2 255.255.255.0

exit

interface vlan 57

ip address 10.1.57.1 255.255.255.0

exit

interface vlan 100

ip address 10.1.100.1 255.255.255.0

exit

interface vlan 173

ip address 172.25.173.145 255.255.255.0

exit

Figure 15 VLAN configuration example on the Core/Aggregation switches (Dell Networking N4064F)

4.1.3 Spanning Tree With MLAG enabled on the aggregation layer switches, network loops can be avoided since links from

partner switch thinks its lagged to one peer switch and partner switch do not think there is redundant links

To be safe and prevent any human error, spanning tree (RSTP) is enabled. N series switches support most

standard spanning tree protocols. It is recommended that Spanning tree be disabled on MLAG peer links.

MLAG based solution supports MSTP & RSTP but not RSTP-PV. The new RSTP-PV mode is particularly

helpful to interoperate with existing infrastructure.

4.1.4 Virtual Router Redundancy Protocol VRRP (Virtual Router Redundancy Protocol) eliminates the single point of failure associated with static

default routes by enabling a backup router to take over from a master router without affecting the end

stations using the route. In this design, the end stations use a VRRP defined virtual IP address as gateway.

VRRP is also helps to create redundancy and greater uptime by using secondary or backup L3

switch/router failover configuration.

Note: If VRRP is enabled on a VLAN that has an MLAG port as its member, both VRRP routers become

VRRP masters operationally in the VLAN. This allows load balancing of the northbound L3 traffic on the

MLAG

In this example, VRRP is configured between both Core/Aggregation layer switches (Dell Networking

N4064Fs) to provide for L3 redundancy in the event of any kind of default route single point failure. Figure

16 is an example of VRRP configured on the Core/Aggregation switches.

Page 24: Dell Networking Campus Switching and Mobility Reference Architecture

24 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

ip vrrp

interface vlan 5

vrrp 5

vrrp 5 mode

vrrp 5 ip 10.1.5.10

vrrp 5 accept-mode

exit

interface vlan 6

vrrp 6

vrrp 6 mode

vrrp 6 ip 10.1.6.10

vrrp 6 accept-mode

exit

interface vlan 7

vrrp 7

vrrp 7 mode

vrrp 7 ip 10.1.7.77

vrrp 7 accept-mode

exit

interface vlan 57

vrrp 57

vrrp 57 mode

vrrp 57 ip 10.1.57.10

vrrp 57 accept-mode

exit

interface vlan 100

vrrp 100

vrrp 100 mode

vrrp 100 ip 10.1.100.50

vrrp 100 accept-mode

exit

Figure 16 VRRP Configuration on Core/Aggregation switches (Dell Networking N4064F)

4.1.5 Security & Authentication 802.1x authentication enables the system users to be authenticated through a local internal server or an

external server. Only authenticated and approved system users can transmit and receive frames over the

port.

MAC-based authentication allows multiple supplicants connected to the same port to each authenticate

individually. For example, a system attached to the port might be required to authenticate in order to gain

access to the network, while a VoIP phone might not need to authenticate in order to send voice traffic

through the port.

If the port is in the authorized state, the port sends and receives normal traffic without client port-based

authentication. When a port is in an unauthorized state, it ignores supplicant authentication attempts and

does not provide authentication services to the client. By default, when 802.1X is globally enabled on the

switch, all ports are in Auto, which means the port will be unauthorized until a successful authentication

exchange has taken place.

Note: By default, all ports are in VLAN Access mode. A port that uses MAC based authentication should be

configured to be in General mode

Page 25: Dell Networking Campus Switching and Mobility Reference Architecture

25 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

In the CRA configuration, the following global commands and interface/port specific commands (Figure

17) need to be entered for each client port that needs to be authenticated.

authentication enable dot1x system-auth-control dot1x system-auth-control monitor aaa authentication dot1x default radius radius-server host auth 10.1.100.128 name "Default-RADIUS-Server" key "Dell1234$" exit interface Gi2/0/33 switchport mode general switchport general pvid 57 switchport general allowed vlan add 5,57 dot1x port-control mac-based dot1x reauthentication dot1x timeout guest-vlan-period 3 dot1x mac-auth-bypass authentication order dot1x mab exit

Figure 17 802.1x authentication on Access switches (Dell Networking N3048)

4.1.6 Stacking The Dell Networking N series switches include a stacking feature that allows up to 12 switches to operate

as a single unit. Switches of the same series are able to be stacked with other members of the same series,

i.e., N2000 series switches will stack with other N2000 switches, N3000 with other N3000, etc. The

N2000 and N3000 series switches have two fixed mini-SAS stacking connectors at the rear. Then N4000

series use user ports located on the front panel.

It is strongly recommended that the stacking bandwidth be kept equal across all stacking connections;

that is, avoid mixing single and double stacking connections within a stack.

Dell strongly recommends connecting the stack in a ring topology (Figure 18), so that each switch is

connected to two other switches. Using this topology allows the stack to utilize the redundant

communication path to each switch. If a switch in a ring topology fails, the stack can automatically

establish a new communications path to the other switches. Switches not stacked in a ring topology may

split into multiple independent stacks upon the failure of a single switch or stacking link.

Page 26: Dell Networking Campus Switching and Mobility Reference Architecture

26 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

Figure 18 Stacking in Ring Topology

The Nonstop Forwarding (NSF) feature allows the forwarding plane of stacked units to continue to forward

packets while the control and management planes restart as a result of a power failure, hardware failure,

or software fault on the stack master.

Keep in mind while designing the network, todays stack enabled switches do not support MLAG. MLAG

and stacking features are mutually exclusive.

Note: The following document details stacking on Dell Networking N-series switches. Stacking Dell

Networking Switches.

The CRA configuration example includes stacks of N3048P and N3048 series switches. The example

configuration below (Figure 19) shows the stacking of POE, copper & fiber switches.

slot 1/0 2 ! Dell Networking N3024F

slot 2/0 1 ! Dell Networking N3024

slot 3/0 7 ! Dell Networking N3048P

stack

member 1 2 ! N3024F

member 2 1 ! N3024

member 3 5 ! N3048P

exit

Figure 19 Stacking on Dell Networking N3048 Access layer Switches

Page 27: Dell Networking Campus Switching and Mobility Reference Architecture

27 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

4.1.7 Quality of Service The Quality of Service (QoS) Differentiated Services (DiffServ) feature allows traffic to be classified into

streams and given certain QoS treatment in accordance with defined per-hop behaviors

Class Of Service (CoS)

The Class of Service (CoS) queuing feature lets users directly configure certain aspects of switch queuing.

This allows the desired QoS behavior for different types of network traffic to be configured when the

complexities of DiffServ are not required. Minimum guaranteed bandwidth and transmission rate shaping

are configurable at the queue (or port) level.

Auto Voice over IP (VoIP)

Auto Voice Over IP provides ease of when setting up VoIP for IP phones on a switch. This is accomplished

by enabling a VoIP profile (Figure 20) that a user can select on a per port basis.

configure

vlan 100,200

exit

interface vlan 100

ip address 192.168.1.2 255.255.255.0

exit

interface vlan 200

ip address 192.168.2.2 255.255.255.0

exit

voice vlan

!

interface Gi5/0/1

channel-group 2 mode active

exit

!

interface Gi5/0/2

channel-group 2 mode active

exit

!

interface Gi5/0/15

switchport mode general

switchport general pvid 200

switchport general allowed vlan add 200

switchport general allowed vlan add 100 tagged

voice vlan 100

voice vlan auth disable # optional #

exit

!

interface Gi5/0/16

switchport mode general

switchport general allowed vlan add 200

switchport general allowed vlan add 100 tagged

voice vlan 100

voice vlan auth disable # optional #

exit

Page 28: Dell Networking Campus Switching and Mobility Reference Architecture

28 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

!

interface Gi5/0/17

switchport mode general

switchport general pvid 200

switchport general allowed vlan add 200

switchport general allowed vlan add 100 tagged

voice vlan 100

voice vlan auth disable # optional #

exit

!

interface Gi5/0/18

switchport mode general

switchport general allowed vlan add 200

switchport general allowed vlan add 100 tagged

voice vlan 100

voice vlan auth disable # optional #

exit

!

interface port-channel 2

switchport mode trunk

switchport mode trunk allowed vlan 100,200

exit

exit

N-Series:POE#

Figure 20 VoIP Example Configuration

Page 29: Dell Networking Campus Switching and Mobility Reference Architecture

29 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

5 Campus Mobility Architecture Dell Networking provides a variety of products to help small to large businesses address their mobile

wireless infrastructure needs. The reference architecture shows how Dell Networking W-Series can be

used to deliver a feature rich mobile to users on the main campus, at remote branches and teleworkers.

Note: For more information on Dell W-Series Wireless Networking, see the Wireless Networking page at

http://www.dell.com/wireless.

5.1 W-Series Controller Based WLAN At the heart of the mobile solution are Dell Networking W-Series Mobility Controllers and wireless Access

Points (APs). The controller is the central point of all wireless traffic providing access, policy enforcement,

security, and traffic monitoring for wireless users. The controller is also the key integration point for W-

ClearPass to provide Policy Enforcement, Guest Access, BYOD and with W-Airwave for Network

Management features of the WLAN.

5.1.1 W-Series Controller Topology The medium to large campus uses the tiered architecture with an Core/Aggregation layer and access layer

as described in the Campus Reference Design and Campus Switching Architecture sections above. The W-

Series controllers are placed directly on the Core/Aggregation layer to provide the most effective

communication to the entire network. The controllers can be seen in the topology diagram below (Figure

21).

Figure 21 CRA 2.0 WLAN Topology

Page 30: Dell Networking Campus Switching and Mobility Reference Architecture

30 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

Each controller is lagged to the peered aggregation switches by active LACP using 10 GbE ports. This

arrangement provides the optimal resiliency and bandwidth for the wireless traffic.

The APs are placed throughout a campus building and connected to (and powered by) the N3000 stacked

switches which are typically located in wiring closets. The PoE+ access switches included in each access

stack are designed to accommodate the APs located near wiring closets on each floor. The W-Series W-

AP225 802.11ac access points are distributed on each floor of the building to provide a high capacity

wireless network.

5.1.2 WLAN Main Campus Configuration

5.1.2.1 WLAN Design and Controller Configuration The design and configuration of the WLAN can be categorized into two major aspects: access and

security. Users expect reliable access to the applications and resources needed to do their jobs. IT

managers require their networks to be secure and easy to maintain. This basic example applies key

features of both areas to show how Dell Networking can satisfy campus-networking deployments.

Note: The configurations in the following sections are from the W-Series controller's running

configuration that is also included as an attachment to this document. This section is not intended as a

step-by-step guide for configuring the W-Series controller. Not all settings are provided within the body

of this document.

Note: Many of the configurations from the Master controller are synchronized to the Standby controller.

Some of the following configurations only show the configuration from the Master controller, as it is

identical to the Standby. For those features that have significant differences, both configurations are

shown.

5.1.2.2 Master VRRP-Based Redundancy WLAN networks have transitioned to become critical systems in today’s work environment. One of the

main objectives of this reference architecture is to provide reliable connectivity through failure resistant

features and topologies.

W-Series Controllers accomplish redundancy through High Availability and VRRP-based redundancy.

While each type of failover has its advantages, this reference architecture uses VRRP-based redundancy in

order to support remote APs. Figure 22 shows the controllers and a representation of VRRP IP

configuration.

Page 31: Dell Networking Campus Switching and Mobility Reference Architecture

31 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

Figure 22 VRRP IP Configuration

The reference architecture utilizes two Master controllers, one active and one standby. The CLI

commands to configure the preferred Master for VRRP-based redundancy are shown in Figure 23.

master-redundancy

master-vrrp 99

peer-ip-address 10.1.100.12 ipsec

04e416a543f7b1018c15f886a0b3d54cd9898e4ed7932291

!

vrrp 99

priority 120

authentication password

ip address 10.1.100.3

description "Preferred-Master"

vlan 100

no shutdown

Figure 23 Configuring Preferred Master for VRRP

The CLI commands to configure the Standby for VRRP-based redundancy are shown in Figure 24.

master-redundancy

master-vrrp 99

peer-ip-address 10.1.100.11 ipsec

9231d00edf8b5207e5b982f3ce710c3f4b9a2c0a1080e496

!

vrrp 99

authentication password

ip address 10.1.100.3

description "Backup-Master"

vlan 100

no shutdown

Figure 24 Configuring Standby for VRRP

Page 32: Dell Networking Campus Switching and Mobility Reference Architecture

32 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

5.1.2.3 Centralized Licensing W-Series controllers feature the ability to use centralized licensing. This enables controllers to share a pool

of licenses installed on each controller in the network. In this reference architecture, there is only a single

active controller in operation at any given time. In the case of a failure, the standby controller is able to use

the licenses installed on the preferred Master. This feature reduces the cost of having to install licenses on

the standby. The command to enable centralize licensing is shown in Figure 25.

license profile

centralized-licensing-enable

Figure 25 Centralized Licensing

Note: For more information on centralized licensing see the AOS 6.3 User Guide at Dell’s Support Site

When the topology consists of dedicated active and redundant standby controllers, the primary and

backup licensing servers are automatically set.

5.1.2.4 LACP and Port Channels The W-Series controllers are attached to the Core/Aggregation layer via 10 GbE DAC or Optical cable.

Each controller has a connection to both Dell Networking N4000 switch MLAG peers. The MLAG

configuration of the two aggregation switches present themselves to the controller as a single switch.

Refer to Campus Switching Architecture section for more information on how MLAG enables reliable data

traffic in the presence of multiple failures.

The CLI configuration below (Figure 26) shows the interface configuration for the connections to the

aggregation layer. The Master and Standby controllers’ configuration are similar to each other.

interface gigabitethernet 0/0/2

description "GE0/0/2"

trusted

trusted vlan 1-4094

switchport mode trunk

switchport trunk native vlan 100

switchport trunk allowed vlan 1,5-7,57,100

lacp group 2 mode active

interface gigabitethernet 0/0/3

description "GE0/0/3"

trusted

trusted vlan 1-4094

switchport mode trunk

switchport trunk native vlan 100

switchport trunk allowed vlan 1,5-7,57,100

lacp group 2 mode active

interface port-channel 2

trusted

trusted vlan 1-4094

switchport mode trunk

Page 33: Dell Networking Campus Switching and Mobility Reference Architecture

33 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

switchport access vlan 99

switchport trunk native vlan 100

switchport trunk allowed vlan 1-172,174-4094

Figure 26 Configuration of Controller to Aggregation Switches Connection

5.1.2.5 VLAN assignments The configuration and method of assigning the VLANs is identical to the wired switches in Section 4. As

users connect to the network, roles are applied and VLANs are assigned through policy enforcement. In

this reference architecture, policy enforcement is accomplished through W-ClearPass and the W-Series

Controllers.

In the CRA VLANs are used to separate the traffic by a few pre-defined categories.

VLAN 5 – Engineering VLAN

VLAN 6 – Finance VLAN

VLAN 7 – Guest VLAN

VLAN 57 – Network Management and Windows Server VLAN

VLAN 100 – Native VLAN and W-ClearPass

Figure 27 shows the commands to configure and assign the VLANs.

vlan 5

vlan 6

vlan 7

vlan 57

vlan 100

interface vlan 100

ip address 10.1.100.11 255.255.255.0

interface vlan 1

ip address 10.1.1.3 255.255.255.0

interface vlan 57

ip address 10.1.57.4 255.255.255.0

interface vlan 5

ip address 10.1.5.4 255.255.255.0

interface vlan 6

ip address 10.1.6.4 255.255.255.0

interface vlan 7

ip address 10.1.7.4 255.255.255.0

Figure 27 VLAN Configuration

Page 34: Dell Networking Campus Switching and Mobility Reference Architecture

34 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

5.1.2.6 DHCP In this design, the DHCP server is configured within the W-Series controller. Figure 28 shows the DHCP

configurations for each subnet.

Note: The configuration and location of the DHCP server for this reference architecture is to support the

validation. Best practice is to utilize an external DHCP server. IT managers can deploy their own DHCP

server solution to fit within this topology, which satisfies their specific requirements and preferences.

ip dhcp pool Guest default-router 10.1.7.77

dns-server 10.1.57.127

domain-name cra.lab

lease 1 0 0 0

network 10.1.7.0 255.255.255.0

authoritative

!

ip dhcp pool Eng

default-router 10.1.5.10

dns-server 10.1.57.127 172.25.10.1

domain-name cra.lab

lease 1 0 0 0

network 10.1.5.0 255.255.255.0

authoritative

!

ip dhcp pool Finance

default-router 10.1.6.10

dns-server 10.1.57.127 172.25.10.1

domain-name cra.lab

lease 1 0 0 0

network 10.1.6.0 255.255.255.0

authoritative

!

ip dhcp pool CRA

default-router 10.1.100.3

dns-server 10.1.57.127 172.25.10.1

domain-name cra.lab

lease 1 0 0 0

network 10.1.100.0 255.255.255.0

authoritative

!

service dhcp

Figure 28 DHCP Configurations

5.1.2.7 WLAN AP Groups All APs that are deployed are provisioned by including them in AP Groups. An AP Group is a set of

configurations that contain the profiles to define how each AP in the group operates. Each AP can only be

assigned to one AP Group. This reference architecture contains a single AP Group named

“CRA_Employee”.

Page 35: Dell Networking Campus Switching and Mobility Reference Architecture

35 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

Many of the settings within the AP Group in this reference architecture are kept as default. This includes RF

Management, AP interface, Regulatory Domain, QOS, and IDS settings. These default settings can be

changed to suit your IT organization without affecting the interoperability of the features used in this

reference architecture.

The AP Group “CRA_Employee” includes the following configurations:

ap-group

The top level ap-group setting (Figure 29) defines two virtual APs, one for employee access,

“CRA_Employee”, and another for guest access, “CRA_Guest-vap_prof”.

ap-group "CRA_Employee"

virtual-ap "CRA_Employee"

virtual-ap "CRA_Guest-vap_prof"

Figure 29 ap-group Settings

Note: The “vap_prof” extension on the guest access virtual-ap variable is automatically appended when

the admin uses the AP wizard within the web GUI. The appended text is used to identify the type of

setting, and can be useful when reviewing the text based configuration file.

wlan virtual-ap The wlan virtual-ap settings (Figure 30) associate the profiles defined for SSID, AAA, and define the VLAN users will be assigned when connecting to the virtual APs.

wlan virtual-ap "CRA_Employee"

aaa-profile "CP_dot1x_profile"

ssid-profile "CRA_Employee"

vlan 100

!

wlan virtual-ap "CRA_Guest-vap_prof"

aaa-profile "CP_Guest_profile"

ssid-profile "CRA_Guest-ssid_prof"

vlan 7

Figure 30 wlan virtual ap Settings

wlan ssid-profile

The wlan ssid-profile settings (Figure 31) define the ESSID and authentication/encryption used for each

WLAN. This architecture uses WPA2-AES for 802.1x on the Employee SSID, while the Guest SSID is open.

wlan ssid-profile "CRA_Employee"

essid "CRA_Employee"

opmode wpa2-aes

wlan ssid-profile "CRA_Guest-ssid_prof"

essid "CRA_Guest"

Figure 31 wlan sid profile Settings

Page 36: Dell Networking Campus Switching and Mobility Reference Architecture

36 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

5.1.2.8 WLAN Security – AAA The W-Series controllers contain the profiles, user roles, and authentication settings to enable the policy

enforcement for all wireless users. In this reference architecture example, the W-Series controller utilizes

W-ClearPass as its authentication server. Other sources of authentication servers can also be used to

include, but not limited to; RADIUS, AD (Active Directory), LDAP (Lightweight Directory Access Protocol),

and TACACS.

User Roles are groups of firewall policies that are assigned based on the status and attributes of the user

and device used to access the network. The W-Series controller contains the user roles, while the W-

ClearPass policy manager assigns them.

In this section, the configuration of the W-Series controller will be shown. To get the entire picture of how

a user is evaluated and assigned a user role, see W-ClearPass Access Management.

aaa server settings

The aaa server settings in Figure 32 show the profile and server configurations to set W-ClearPass as the

802.1X and RADIUS servers in this example.

aaa authentication dot1x "cra-CRA_Employee"

timer reauth-period 32400

max-requests 2

timer wpa-key-period 3000

timer wpa2-key-delay 100

timer wpa-groupkey-delay 100

reauthentication

aaa authentication-server radius "cra-CRA_Employee"

host "10.1.100.128"

key 0a6efcd6079b7850ba2ea65c0a9ccff6c2ae8fa08960dae2

nas-identifier "CRAcontroller"

nas-ip 10.1.100.3

mac-lowercase

Figure 32 aaa Server Settings

dot1x aaa profiles, user roles, and access lists

The “CRA_Employee” SSID was assigned the aaa profile “CP_dot1x_profile” (Figure 31) described in the

wlan virtual-ap section. Here in Figure 33, the profile is seen. Note the initial-role setting under the aaa

profile. When a user logs into the network, they are assigned an initial-role, limiting their access until they

are authenticated. In this example, the initial-role is “CRA_Employee-logon”.

aaa profile "CP_dot1x_profile"

initial-role "CRA_Employee-logon"

authentication-dot1x "cra-CRA_Employee"

dot1x-server-group "clearpasscra"

radius-accounting "clearpasscra"

radius-interim-accounting

rfc-3576-server "10.1.100.128"

Page 37: Dell Networking Campus Switching and Mobility Reference Architecture

37 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

user-role CRA_Employee-logon

vlan 100

captive-portal "CRA_Employee"

access-list session ra-guard

access-list session CRA_Employee-logon-control

access-list session CRA_Employee-allow-external-captive-portal

access-list session CRA_Employee-allow-google-play

access-list session CRA_Employee-captiveportal

ip access-list session CRA_Employee-allow-external-captive-portal

user host 10.1.100.128 svc-http permit

user host 10.1.100.128 svc-https permit

user alias CRA_Employee-allow-external-captive-portal svc-http permit

user alias CRA_Employee-allow-external-captive-portal svc-https permit

Figure 33 dot1x aaa profiles, user roles and access lists

Further examination of the “CRA_Employee-logon”, shows an access list for an external captive portal.

This example is part of a BYOD configuration, where devices that have not been provisioned are directed

to a portal that enables a certificate to be installed. The provisioning feature used is part of W-ClearPass

Onboard, which will be discussed in a later section. Note that the access list for the external captive portal

only allows specific traffic to the W-ClearPass server.

There are several profiles, user-roles, and firewall rules that enable the features discussed in this reference

architecture. They can be seen in the controller configurations attached to this document.

5.1.2.9 Controller Configuration for Remote APs in a Branch The objective is to have the Remote Branch site be an extension of the Main Campus; that is, providing the

same type of access to Branch Office users as if they were in the Main Campus. This reference

architecture contains a remote Instant Access Point solution. To enable the users at the remote site to

access resources located at the corporate site, a VPN is established between the Instant AP and the W-

Series controller. Figure 34 shows the VPN connection represented by the padlock. The VPN tunnel is

established across the WAN (internet), through the firewall using NAT, and then routed by the aggregation

layer to the controller. Depending on the size of the Remote Branch, one or more Instant Access Points

and scalable number of wired ports will be required.

Page 38: Dell Networking Campus Switching and Mobility Reference Architecture

38 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

Figure 34 VPN Connection from Remote Branch office to the Main Campus

In this example, the vpn ipsec parameters, roles, and profiles are all kept at the default settings. No explicit

configuration is required except for the Access Points establishing a VPN connection to be added to the

Remote AP Whitelist in the Mobility Controller on the Main Campus.

Figure 35 shows the APs MAC addresses added to the Remote AP Whitelist. The IP address for the VPN

termination is set to 0.0.0.0 to enable an address pool to be utilized instead of static addresses.

Figure 35 Remote AP Whitelist

Figure 36shows the configuration of the address pool.

ip local pool "rappool" 10.1.100.82 10.1.100.84

Figure 36 Address Pool

Page 39: Dell Networking Campus Switching and Mobility Reference Architecture

39 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

5.1.2.10 Network Management The Network Management solution for both Open Manage Network Manager and W-Airwave require the

SNMP community strings to be setup (Figure 37). Additionally, W-Airwave requires a specific server IP

setting.

syslocation "austin-rr-campus"

syscontact "[email protected]"

snmp-server community "test123"

snmp-server enable trap

snmp-server host 10.1.57.100 version 2c test123 udp-port 162

Figure 37 SNMP Community Strings

5.2 W-Series Instant Access Point – Remote Deployments W-Series Instant Access Points provide enterprise level features through a built-in virtual controller. W-

Instant Access Points feature an easy to use interface with minimal IT deployment interaction. These

products are able to fulfill many of the IT manager’s requirements in any campus setting. This reference

architecture focuses on using W-Instant at remote sites or with teleworkers.

Replicating corporate resources is cost prohibitive, or not feasible due to the nature of the data and

services that need to be accessed. W-Instant can provide workers at these remote sites access to all the

corporate resources at the main facility. Dell Networking has two options to help solve the IT manager’s

requirements at remote sites and they are described in the next two sections.

5.2.1 W-Series Instant Access Point Networks Remote sites that desire to maintain separately managed wireless networks, but also require a connection

to the main corporate building can utilize W-Instant Access Points (W-IAPs). W-IAPs are full featured APs

that contain virtual controller technology built into each AP. When W-IAPs are used together on the same

subnet, they form clusters where a single IAP will assume control as the Master Virtual Controller. W-IAPs

are an easy way to deploy and scale at such sites.

W-IAPs contain a VPN that can be terminated at a W-Series controller located within the main campus.

The master virtual controller will establish a single VPN connection to the controller. This reference

architecture uses this VPN mechanism to allow users at the remote site to access resources within the

main corporate site. Key resources such as W-ClearPass and Active Directory can be used through the

VPN connection.

Instant configuration examples can be seen by accessing the attachment titled, Dell Networking W-Instant

Configuration.

5.2.2 W-Series Instant Access Points for Teleworkers Teleworkers require the same access to corporate resources that their co-workers have on the corporate

campus or branch offices. The growing trend of employees or contractors working from their home

offices makes this an important use case.

Page 40: Dell Networking Campus Switching and Mobility Reference Architecture

40 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

A historical solution was to install a VPN client on the user's PC and their mobile devices, and maintain a

VPN infrastructure at the offices. Dell Networking W-Series provides an easier to deploy solution that

avoids having to find VPN software for the different devices types, while providing a full context-aware

user policy managed solution.

W-Instant products provide an excellent solution to provide teleworkers with the same network access in

their home or while traveling. IT managers can use W-Instant products to significantly simplify and reduce

resources needed to manage and distribute access points to teleworkers.

W-Series controllers have an ability to manage APs at remote sites across the WAN. IPsec tunnels are used

for control traffic and the remote APs act very similar to APs within the local campus. The same SSIDs and

setting used for campus APs are available to the Remote APs.

Traditional APs and W-Instant APs have the ability to operate as controller based remote APs. However,

the W-Instant APs have an advantage in the ease of setup and deployment at the remote site. Since the

W-IAP can boot and become operational through its Instant Software without expert IT assistance, this

enables teleworkers to deploy a remote AP without a physical IT presence.

When a W-IAP is taken from its box, all that is needed is an AC power connection, and a wired network

connection to their cable/internet modem. These instructions are provided in the box, and are simple to

follow. With additional instructions from the teleworker’s IT department on converting the W-IAP to a

remote AP, teleworker can have corporate network access in no time.

In this Reference Architecture, the W-IAP155 is used as a teleworker solution, and it provides both wired

and wireless connectivity at the teleworker's location, including PoE Sourcing ports if needed. For a

travelling user, the IAP can be plugged into a hotel's Ethernet port and turn the hotel room into a fully

policy managed office.

An example covering the Conversion of a W-IAP into a Remote AP can be seen by accessing the

attachment titled, Dell Networking W-Instant Configuration.

5.3 W-ClearPass Access Management Dell Networking W-series ClearPass is the powerful solution for policy management, BYOD, and Guest

access. It integrates seamlessly with the W-Series Controller based products and W-Instant Access Points.

In this section, several examples are presented to show how W-ClearPass can be used to provide access

to network resources, to the approved personnel, using IT approved devices.

5.3.1 W-ClearPass Policy Manager Dell Networking W-ClearPass Access Management appliance can be divided into several modular pieces.

The base of the system is the ClearPass Policy Manager (CPPM). This is the main module that holds the

administrative server settings, RADIUS and other built-in databases, and the configured services.

Page 41: Dell Networking Campus Switching and Mobility Reference Architecture

41 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

W-ClearPass services are containers that hold the Identification, Authentication, Authorization, Role

Mapping, and Enforcement policies to accomplish a policy management task. Some examples of services

include 802.1x, MAC Authentication, and Web Authentication.

W-ClearPass provides administrators with templates (Figure 38) for many of the most common services

types. These templates include all the basic settings typically used for that service.

Figure 38 W-ClearPass Service Templates

Page 42: Dell Networking Campus Switching and Mobility Reference Architecture

42 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

Once a service has been configured it is placed into an ordered list. Authentication requests from Network

Authentication Devices are evaluated from the top down of the services list (Figure 39).

Figure 39 ClearPass Services List

The figure below (Figure 40) shows the first section of the server configuration screen. It’s the basic

settings for the W-ClearPass server to include network settings and joining a Windows Active Directory

domain.

Figure 40 Server Configuration Screen

Page 43: Dell Networking Campus Switching and Mobility Reference Architecture

43 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

W-ClearPass Policy Manager licensing capacity is determined by the appliance model purchased.

Licensing for W-ClearPass (Onboard, OnGuard, and Guest) is required for W-ClearPass to operate and

service clients for those add on features (Figure 41). Generally, licenses are based upon a per-endpoint

structure.

Note: For more information on W-ClearPass licensing see the W-ClearPass User’s Guides at Dell’s

Support Site

Figure 41 W-ClearPass Licensing

Monitoring of the network can be done through W-ClearPass Policy Manager (Figure 42). There are

several user-friendly interfaces to track the status of many predefined categories. The figure below shows

the Dashboard, and can be changed by a simple drag and drop action.

Figure 42 W-ClearPass Policy Manager

Page 44: Dell Networking Campus Switching and Mobility Reference Architecture

44 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

W-ClearPass has extensive graphical and logging abilities to monitor every authentication request. Figure

43 shows the Endpoint Profiler.

Figure 43 Endpoint Profiler

5.3.2 W-ClearPass Applications W-ClearPass Applications are used with the Policy Manger to enable key features and policies. In this

reference architecture, Onboard, Guest, and OnGuard are described and validated.

5.3.2.1 W-ClearPass Onboard for Employee Personal Devices The Onboard application within W-ClearPass enables IT managers to provide a BYOD service to their

users. Onboard helps to configure and provision the most popular devices and operating systems on the

market.

The key advantage to Onboard is the ability to use W-ClearPass and its built-in certificate authority. By

providing a self-service portal and application to provision the device, users obtain network access

without a complicated IT process.

This reference architecture has validated Onboarding through both the W-Series controller based and

Instant WLAN products. Users experience the same Onboarding process whether they are at the main

campus or at a remote site. In addition, users who registered their device at one site do not have to re-

register it at another site.

Onboarding examples can be seen by accessing the attachment titled, Dell Networking W-ClearPass

Configuration. This attachment will show configuration examples for both W-ClearPass Policy Manager

and Onboard.

Page 45: Dell Networking Campus Switching and Mobility Reference Architecture

45 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

5.3.2.2 W-ClearPass Guest The Guest application within W-ClearPass enables IT managers to provide a Guest access solution to

visitors on their campus. W-ClearPass Guest allows for a safe and effective way for IT administrators to

control network resources with a minimal amount of IT resources.

W-ClearPass Guest provides many options to the IT Manager. Guests can be approved and provided with

credentials through a Guest Administrator, typically at the front desk or reception. IT managers can also

allow for a guest self-registration portal, with automatic or sponsor initiated approval.

This reference architecture has validated Guest access through both the W-Series controller based and

Instant WLAN products. Users experience the same Guest access process whether they are at the main

campus or at a remote site.

Onboarding examples can be seen by accessing the attachment titled, Dell Networking W-ClearPass

Configuration. This attachment will show configuration examples for both W-ClearPass Policy Manager

and Guest.

Page 46: Dell Networking Campus Switching and Mobility Reference Architecture

46 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

6 Campus Network Management System

6.1 Open Manage Network Manager Initial planning should include management of your network devices. A NMS (Network Management

System) can manage either a large group of switches or the whole campus network. Dell Networking

OpenManage Network Manager (OMNM) is the Dell provided NMS for this solution. OpenManage Network

Manager makes it easy to automate labor-intensive tasks while monitoring and managing your entire Dell

network-switching infrastructure.

OpenManage Network Manager centralizes management for Dell networking environments by providing

discovery, monitoring, reporting and configuration management for the entire Dell Networking family of

products.

OMNM provides the following advantages:

Automates the discovery of network devices, and provides detailed information on the devices and

their connectivity, including the ability to draw physical and logical topology maps.

Provides the ability to easily configure and manage groups of Dell network devices; configuration

changes and firmware deployments can be made to multiple devices in one operation, and many

network operations can be scheduled for pre-determined times.

Enables the network administrator to monitor the health and performance of their Dell network,

allowing the creation of dashboards to capture important events and trends, and display them over

time.

Helps reduce Total Cost of Ownership by proactively monitoring for network problems, automating

common configuration actions and enabling easy firmware deployment, allowing network

administrators to focus on more activities that are critical.

Automating a wide range of tasks Dell OpenManage Network Manager (Figure 44) is designed to take the

complexity out of many administrative activities. First, a resource discovery wizard helps simplify discovery

of IP-based network elements. The wizard automates discovery of network devices, providing detailed

device information and customized reports (Figure 45) that administrators can use to create network

topology maps.

Page 47: Dell Networking Campus Switching and Mobility Reference Architecture

47 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

Figure 44 Managed Resources View

Figure 45 Customized Reports

Page 48: Dell Networking Campus Switching and Mobility Reference Architecture

48 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

After device discovery, administrators can view the managed resources and alarms (Figure 46) at a glance

from the OpenManage Network Manager console, with quick access to a menu of management actions.

By clicking on a network switch, administrators can easily view details such as performance alarms,

processor and memory utilization, learned Media Access Control (MAC) addresses, and an audit trail of

configuration changes. Details specific to each Dell PowerEdge server in the network can also be viewed,

such as information about the server’s memory, processor, BIOS and on-board network interface cards.

Active performance monitors enable network administrators to monitor the health and performance of

their Dell-based network with customizable dashboards for fault, availability, and performance monitoring

(Figure 47). A traffic flow analysis feature enables administrators to get detailed information on the

bandwidth consumption of key users, applications and devices.

Figure 46 Managed Resources and Alarms

Page 49: Dell Networking Campus Switching and Mobility Reference Architecture

49 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

Figure 47 Performance Monitoring

Note: For additional information on OMNM refer to the following:

OpenManage Network Manager WIKI

OpenManage Network Manager User Guide 5.3 SP1

Dell OpenManage Network Manager Release Notes 5.3 SP1

Dell OpenManage Network Manager Quick Start Guide 5.3 SP1

6.2 W-Airwave Dell Network W-Series Airwave is a Network Management product designed to provide deep visibility and

configuration for the entire Dell W-Series WLAN portfolio. W-Airwave is a powerful tool to enable both

device management and network monitoring of traffic and clients. This section of the reference

architecture will show many of the features and benefits W-Airwave provides in the campus environment.

6.2.1 W-Airwave Interface W-Airwave is accessed and configured by an administrator through a web GUI. Administrators can see an

overview of the network from the home tab. Figure 48 shows the home page for W-Airwave.

Page 50: Dell Networking Campus Switching and Mobility Reference Architecture

50 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

Figure 48 W-Airwave Home Page

Network devices can be grouped into any category per the administrator’s preference. Folders are used to

separate devices into groups to better monitor a select portion of the network. Figure 49 shows a status

view for a group of controllers and APs.

Figure 49 Status View

Page 51: Dell Networking Campus Switching and Mobility Reference Architecture

51 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

A client’s status is also a key feature of W-Airwave. Administrators are able to track and monitor clients

based on device type, access method, connection state, username, and user role to name a few. Figure 50

shows the overview page for clients.

Figure 50 Client Overview Page

A detailed list of the client attributes can be seen in table form in the Figure 51.

Figure 51 Client Attributes

6.2.2 W-Airwave Features W-Airwave has all the standard features you would expect in a Network Management System. These

features include device configuration, monitoring, firmware updates, alerts, and logging. W-Airwave has

many more tools to help businesses plan, secure, and maintain regulatory controls.

Planning for and maintaining network performance is a difficult task for wireless networks. W-Airwave

includes a powerful tool, VisualRF (Figure 52), to help with both planning and maintenance. By uploading a

floor plan into W-Airwave, VisualRF is able to overlay RF performance data to visually represent the RF

environment. The figure below shows two deployed access points on a floor plan. The heat map

produced shows the RF signal strength.

Page 52: Dell Networking Campus Switching and Mobility Reference Architecture

52 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

Figure 52 W-Airwave, VisualRF

The planning tools integrated within VisualRF allow the user to place simulated APs on the floor plan,

which represents the building. The user can improve the building model by entering specific building

materials and objects that can affect RF propagation. This tool is an excellent way to plan prior to an

expensive and time consuming site survey. Figure 53 shows a simulated AP being added to the heatmap

shown in the previous figure. Simulated APs can be used by themselves or intermixed with active deployed

APs.

Page 53: Dell Networking Campus Switching and Mobility Reference Architecture

53 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

Figure 53 Simulated AP Being Added to the Heatmap

Another important feature of W-Airwave is security. W-Airwave includes RAPIDS Rogue Detection and IDS.

Data from existing APs are used to secure the network from rougue and intrusion threats. Events can be

monitored through the RAPIDS tab and related status pages. RAPIDS can also display rogue devices within

VisualRF to give an estimated location of the threat.

Figure 54 below shows the overview pages for RAPIDS.

Page 54: Dell Networking Campus Switching and Mobility Reference Architecture

54 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

Figure 54 RAPIDS Overview Page

IDS events are shown in in table format in Figure 55.

Figure 55 IDS Events

Page 55: Dell Networking Campus Switching and Mobility Reference Architecture

55 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

Legal and Regulatory compliance from industry standards is an important and necessary part of

maintaining a network. W-Airwave provides reporting functions to assist and provide evidence for those

standards. The figure below shows a list of common built-in reports generated by W-Airwave. New reports

can also be generated by specifying definitions within W-Airwave. Note the PCI Compliance Report with

the list below (Figure 56).

Figure 56 W-Airwave Reporting

W-Airwave is not exclusive to W-Series WLAN products. It also supports a wide variety of 3rd

party wired

switches and WLAN devices. Figure 57 shows a drop-down list used when adding new devices to W-

Airwave.

Page 56: Dell Networking Campus Switching and Mobility Reference Architecture

56 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

Figure 57 W-Airwave- Adding New Devices

Page 57: Dell Networking Campus Switching and Mobility Reference Architecture

57 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

7 Campus Firewall For this Campus Reference Architecture, the Dell SonicWALL Network Security Appliance (NSA) 6600

delivers security and performance without compromise (Figure 58). The NSA 6600 appliance offers an

extensive array of advanced security and networking features in an accessible and affordable platform that

is easy to deploy and manage in a wide variety of environments.

NSA 6600 comes with 4x10gig ports supports up to 4000 single sign on users. NSA6600 fully supports

high availability including active-active clustering. NSA6600 supports up to 90,000 connections per sec &

about 6000 site-to-site VPN connections. All these factors makes NSA6600 good match for large campus

architecture.

7.1 Best Practices & Important Features The following sections outline some of the features & guidelines to consider while designing network.

7.1.1 Active/Standby High Availability In this architecture, NSA6600s are used as high available devices providing seamless connectivity to

outside world. Two NSA6600’s are configured for Active/Standby HA pair to support campus reference

architecture needs. One firewall is the Active (primary) device, processing and handling all traffic. The

other firewall is in standby mode until a keep alive between the primary and standby expires, or a

monitored link goes down. The NSA6600 comes with 4x10GbE and 8x1GbE interfaces. 2x10GbE ports

from each device are static lagged to 2 N4064Fs. These interfaces will be monitored for any link failure or

link down. As shown in Figure 58, 10GbE ports are used for data link & 1GbE link are used for control link.

Figure 58 Firewall Aggregation Layer

Page 58: Dell Networking Campus Switching and Mobility Reference Architecture

58 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

NSA 6600 supports four operation modes in high availability namely Active/Standby, Active/Active DPI,

Active/Active Clustering, Active/Active DPI Clustering. Based on campus architecture needs NSA devices

are configured for Active/Standby mode. Figure 59 provides a snapshot of the HA status.

Note: The HA feature needs a single license to operate. Both devices share a single license once

configured as a HA pair in Active/Standby. SonicWall devices support static lag. Support for dynamic lag

(LACP) is planned for the near future.

Figure 59 Snap shot of working HA status

7.1.2 Security Services Licenses The Dell SonicWALL Comprehensive Gateway Security Suite is a powerful security solution for businesses

of all sizes, as it includes Gateway Anti-Virus, Anti-Spyware, Intrusion Prevention, Application Intelligence,

Control Services, Content Filtering Services, and 24x7 technical support.

Page 59: Dell Networking Campus Switching and Mobility Reference Architecture

59 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

Dell SonicWall Gateway Security Suite delivers intelligent, real-time network security protection against

sophisticated application layer and content-based attacks, including viruses, spyware and worms.

Configurable tools prevent data leakage and enable visualization of network traffic.

Dell SonicWALL Content Filtering Service provides granular controls and unequalled content filtering to

enforce Internet use policies and block access to websites containing information or images that are

objectionable or unproductive. Figure 60 provides a snapshot of an enabled license.

Figure 60 Snap shot of enabled license

7.1.3 NAT Policies, Zones & Firewall The Network Address Translation (NAT) engine in SonicOS allows users to define granular NAT polices for

their incoming and outgoing traffic. By default, the Dell SonicWALL Security Appliance has a preconfigured

NAT policy to allow all systems connected to the X0 interface to perform Many-to-One NAT using the IP

address of the X1 interface, and policy to not perform NAT when traffic crosses between the other

interfaces.

The packet contains (among other things) the requester’s IP address, the protocol information of the

requestor, and the destination’s IP address. The NAT Policies engine in SonicOS can inspect the relevant

Page 60: Dell Networking Campus Switching and Mobility Reference Architecture

60 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

portions of the packet and can dynamically rewrite the information in specified fields for incoming, as well

as outgoing traffic.

This reference architecture topology has remote APs deployed across the WAN. These remote APs and

networks utilize a VPN connection terminating on the W-Series controller within the campus network. In

order to support this communication between the remote APs and the controller, the SonicWall needs to

have appropriate NAT policies to convert a public address to a private address. The NAT policy table is

shown in Figure 60.

Topology has IAP sitting somewhere outside network, connected & managed from controller within the

network. In order to make this communication between IAP & controller, As show in Figure 61 SonicWall

needs to have appropriate NAT policies to convert the public address to private address vice versa.

Figure 61 Capture of Zones Enabled with Proper Security Services

A network security zone (Figure 62) is simply a logical method of grouping one or more interfaces with

friendly, user-configurable names, and applying security rules as traffic passes from one zone to another

zone. Security zones provide an additional, more flexible, layer of security for the firewall. With the zone-

based security, the administrator can group similar interfaces and apply the same policies to them, instead

of having to write the same policy for each interface. Best practice is to enable appropriate security

services for each zone.

Figure 62 Capture of Zones Enabled with Proper Security Services

Page 61: Dell Networking Campus Switching and Mobility Reference Architecture

61 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

A Resources and References

Support.Dell.com Dell’s Support Site – Manuals

DellTechCenter.com Dell IT Community for sharing knowledge, best practices, and information about Dell products and installations

Dell Networking Hardware and Devices Additional information on all Dell Networking products

Wireless Networking page Additional information on Dell W-Series Wireless Networking

W-Series Whitepapers and Validated Reference Designs VRDs and Whitepapers

Stacking Dell Networking Switches Document detailing stacking on Dell Networking N-Series switches

OpenManage Network Manager WIKI Videos and Documentation

OpenManage Network Manager User Guide 5.3 SP1

Dell OpenManage Network Manager Release Notes 5.3 SP1

Dell OpenManage Network Manager Quick Start Guide 5.3 SP1 OMNM Documentation

Page 62: Dell Networking Campus Switching and Mobility Reference Architecture

62 Dell Networking Campus Switching and Mobility Reference Architecture 2.0 –Version 1.0

B Attachments

This document includes the following attachments.

Access Switch Stack 1.txt

Access Switch Stack 2.txt

Aggregation Switch 1.txt

Dell Networking W-ClearPass Configuration.pdf

Dell Networking W-Instant Configuration.pdf

Instant AP225 Remote Site.txt

Master Controller.txt

Standby Controller.txt

Support and Feedback

Contacting Technical Support

Support Contact Information Web: http://Support.Dell.com/

Telephone: USA: 1-800-945-3355

Feedback for this document

We encourage readers of this publication to provide feedback on the quality and usefulness of this

deployment guide by sending an email to [email protected]

Page 63: Dell Networking Campus Switching and Mobility Reference Architecture

A Dell Reference Architecture

Dell Networking W-Instant Configuration Campus Switching and Mobility Reference Architecture 2.0

Dell Networking Solutions Engineering April 2014

Page 64: Dell Networking Campus Switching and Mobility Reference Architecture

2 Dell Networking W-Instant Configuration - Campus Switching and Mobility Reference Architecture 2.0

Revisions

Date Description

April 2014 Ver. 1.0 Initial Document Creation Colin King

©2014 Dell Inc., All rights reserved.

Except as stated below, no part of this document may be reproduced, distributed or transmitted in any form or by any

means, without express permission of Dell.

You may distribute this document within your company or organization only, without alteration of its contents.

THIS DOCUMENT IS PROVIDED “AS-IS”, AND WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED. IMPLIED

WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE SPECIFICALLY DISCLAIMED.

PRODUCT WARRANTIES APPLICABLE TO THE DELL PRODUCTS DESCRIBED IN THIS DOCUMENT MAY BE FOUND

AT: http://www.dell.com/learn/us/en/19/terms-of-sale-commercial-and-public-sector Performance of network

reference architectures discussed in this document may vary with differing deployment conditions, network loads, and

the like. Third party products may be included in reference architectures for the convenience of the reader. Inclusion

of such third party products does not necessarily constitute Dell’s recommendation of those products. Please consult

your Dell representative for additional information.

Trademarks used in this text:

Dell™, the Dell logo, Dell Boomi™, Dell Precision™ ,OptiPlex™, Latitude™, PowerEdge™, PowerVault™,

PowerConnect™, OpenManage™, EqualLogic™, Compellent™, KACE™, FlexAddress™, Force10™ and Vostro™ are

trademarks of Dell Inc. Other Dell trademarks may be used in this document. Cisco Nexus®, Cisco MDS®, Cisco NX-

0S®, and other Cisco Catalyst® are registered trademarks of Cisco System Inc. EMC VNX®, and EMC Unisphere® are

registered trademarks of EMC Corporation. Intel®, Pentium®, Xeon®, Core® and Celeron® are registered trademarks

of Intel Corporation in the U.S. and other countries. AMD®is a registered trademark and AMD Opteron™, AMD

Phenom™ and AMD Sempron™ are trademarks of Advanced Micro Devices, Inc. Microsoft®, Windows®, Windows

Server®, Internet Explorer®, MS-DOS®, Windows Vista® and Active Directory® are either trademarks or registered

trademarks of Microsoft Corporation in the United States and/or other countries. Red Hat® and Red Hat® Enterprise

Linux® are registered trademarks of Red Hat, Inc. in the United States and/or other countries. Novell® and SUSE® are

registered trademarks of Novell Inc. in the United States and other countries. Oracle® is a registered trademark of

Oracle Corporation and/or its affiliates. Citrix®, Xen®, XenServer® and XenMotion® are either registered trademarks

or trademarks of Citrix Systems, Inc. in the United States and/or other countries. VMware®, Virtual SMP®, vMotion®,

vCenter® and vSphere® are registered trademarks or trademarks of VMware, Inc. in the United States or other

countries. IBM® is a registered trademark of International Business Machines Corporation. Broadcom® and

NetXtreme® are registered trademarks of Broadcom Corporation. Qlogic is a registered trademark of QLogic

Corporation. Other trademarks and trade names may be used in this document to refer to either the entities claiming

the marks and/or names or their products and are the property of their respective owners. Dell disclaims proprietary

interest in the marks and names of others.

Page 65: Dell Networking Campus Switching and Mobility Reference Architecture

3 Dell Networking W-Instant Configuration - Campus Switching and Mobility Reference Architecture 2.0

Table of contents Revisions ............................................................................................................................................................................................. 2

1 Introduction ................................................................................................................................................................................ 4

2 W-Instant Configuration Examples ........................................................................................................................................ 5

2.1 W-Series Instant Access Point Networks .................................................................................................................... 5

2.1.1 W-IAP System Configuration ........................................................................................................................................ 5

2.1.2 VPN Configuration .......................................................................................................................................................... 7

2.1.3 Supplementary Feature Configurations ...................................................................................................................... 8

2.1.4 W-IAP Employee Networks ......................................................................................................................................... 10

2.1.5 W-IAP Guest Networks ................................................................................................................................................ 16

2.2 W-Series Remote Access Points ................................................................................................................................ 20

2.2.1 Converting a W-IAP to a Remote AP ......................................................................................................................... 21

Page 66: Dell Networking Campus Switching and Mobility Reference Architecture

4 Dell Networking W-Instant Configuration - Campus Switching and Mobility Reference Architecture 2.0

1 Introduction This document serves as an addendum to the Dell Networking Campus Switching and Mobility reference

Architecture 2.0. It contains configuration examples and screenshots of the W-Instant interface. IT

managers can use this document to understand how the features described in the main reference

architecture are configured.

Note: This document is not a deployment guide. It is intended to provide a high-level overview to the

configuration methodology. For assistance with W-Instant, please see the User Guides located within

the product support pages on the Dell Support website.

Page 67: Dell Networking Campus Switching and Mobility Reference Architecture

5 Dell Networking W-Instant Configuration - Campus Switching and Mobility Reference Architecture 2.0

2 W-Instant Configuration Examples

2.1 W-Series Instant Access Point Networks The W-Instant APs are typically configured using the web GUI. Screenshots of the web GUI are shown

when describing the main features. A running configuration in a text file format is also attached to the

main document that contains the full configuration.

2.1.1 W-IAP System Configuration The following figures show the web GUI being used to configure the Instant Virtual Controller. The

example is kept basic and default settings are used whenever possible. In the example, all IP addresses are

static, but a DHCP server can be utilized.

Note: Static addresses are used to show configuration details. Typical deployments use DHCP to obtain

automatic address assignments for the W-IAPs and the Virtual Controller.

Figure 1 shows the overall administrative GUI.

Figure 1 Administrative GUI

Page 68: Dell Networking Campus Switching and Mobility Reference Architecture

6 Dell Networking W-Instant Configuration - Campus Switching and Mobility Reference Architecture 2.0

The System Settings are shown in the Figure 2. Most of the configuration windows include an option to

Show advanced options.

Figure 2 System Settings

The settings shown below (Figure 3) are specific to the W-IAP (W-Instant Access Point) itself. In this

example, there is only a single W-IAP in the network. Therefore, the W-IAP and Virtual Controller are both

located in this single W-IAP. For multi-IAP networks, the virtual controller will only be located on one

Master W-IAP. This Master election is done automatically. Any W-IAP added to the same subnet as this W-

IAP will automatically join the W-Instant network, and the configuration will be pushed to the new W-IAP.

Figure 3 Access Point Settings

Page 69: Dell Networking Campus Switching and Mobility Reference Architecture

7 Dell Networking W-Instant Configuration - Campus Switching and Mobility Reference Architecture 2.0

2.1.2 VPN Configuration Figure 4 shows the VPN Configuration window. The public facing IP address that is used translates to the

W-Series Controller within the corporate network at the main site. In this example, a Dell SonicWall

firewall is used to translate the public IP address shown above to the controller address. See the Campus

Firewall section of the main document for details on how the NAT policies are configured.

Figure 4 VPN Configuration

The Routing tab on the VPN configuration window (Figure 5) is used to configure the networks that are

allowed to be reached within the corporate network. In this example, all internal corporate networks are

allowed to be routed through the VPN tunnel. The destination IP address is split to accommodate the

Master and Standby controller IP address. These routes must point to a physical address, not a VRRP virtual

IP address.

Figure 5 VPN Configuration – Routing Tab

Page 70: Dell Networking Campus Switching and Mobility Reference Architecture

8 Dell Networking W-Instant Configuration - Campus Switching and Mobility Reference Architecture 2.0

2.1.3 Supplementary Feature Configurations Authentication Servers This example uses the W-ClearPass Server to enable the same Guest and BYOD features that are deployed

at the corporate site (Figure 6).

Figure 6 Authentication Servers

External Captive Portals External Captive Portals (Figure 7) are used for the Guest and BYOD web portals in W-ClearPass. The URL

field is configured with the portal URL defined in W-ClearPass. Two portals are used in this example. See

the attached W-Instant configuration file for details on both portals.

Page 71: Dell Networking Campus Switching and Mobility Reference Architecture

9 Dell Networking W-Instant Configuration - Campus Switching and Mobility Reference Architecture 2.0

Figure 7 External Captive Portals

Page 72: Dell Networking Campus Switching and Mobility Reference Architecture

10 Dell Networking W-Instant Configuration - Campus Switching and Mobility Reference Architecture 2.0

DHCP Servers W-Instant AP Networks can administer and provide their own IP addresses for clients. In this example

(Figure 8), local DHCP scopes are used with separate VLANs for Guest and Employee networks.

Figure 8 DHCP Servers

2.1.4 W-IAP Employee Networks W-Instant networks are categorized into three distinct types: Employee, Guest, and Voice. This section

describes the setup of an Employee WLAN, with support for the BYOD Onboard Application in W-

ClearPass.

Page 73: Dell Networking Campus Switching and Mobility Reference Architecture

11 Dell Networking W-Instant Configuration - Campus Switching and Mobility Reference Architecture 2.0

The Employee network type is chosen (Figure 9). All other default settings are left as default under the

advance options link.

Figure 9 WLAN Settings - Employee

Page 74: Dell Networking Campus Switching and Mobility Reference Architecture

12 Dell Networking W-Instant Configuration - Campus Switching and Mobility Reference Architecture 2.0

As discussed in the previous section, the IP assignment is kept local and to a specific VLAN (Figure 10). The

DHCP scopes setup previously are used here by specifying the static and VLAN ID selections.

Figure 10 VLAN Assignment - Employee

Page 75: Dell Networking Campus Switching and Mobility Reference Architecture

13 Dell Networking W-Instant Configuration - Campus Switching and Mobility Reference Architecture 2.0

Employee access is setup to be the same authentication type as the controller based deployment. WPA-2

Enterprise and the Authentication server are configured below (Figure 11).

Figure 11 Security - Employee

Page 76: Dell Networking Campus Switching and Mobility Reference Architecture

14 Dell Networking W-Instant Configuration - Campus Switching and Mobility Reference Architecture 2.0

The access rules required for initial logon are shown below (Figure 12). A captive portal enforcement is

required to direct users with non-provisioned devices to the W-ClearPass Onboard provisioning portal.

Figure 12 Access - Employee

A key Role Assignment Rule is shown below (Figure 13). This Rule is used to allow W-ClearPass to change

the user role from the initial default role to a new role assigned by W-ClearPass.

Figure 13 Role Assignment Rule

Page 77: Dell Networking Campus Switching and Mobility Reference Architecture

15 Dell Networking W-Instant Configuration - Campus Switching and Mobility Reference Architecture 2.0

The access rules, shown in the expanded view below (Figure 14), limit traffic only to W-ClearPass and the

internet locations where users can download the Onboard application.

Figure 14 Access Rules

Page 78: Dell Networking Campus Switching and Mobility Reference Architecture

16 Dell Networking W-Instant Configuration - Campus Switching and Mobility Reference Architecture 2.0

2.1.5 W-IAP Guest Networks Guest Networks follow the same configuration methodology as Employee Networks with changes to

support Guest specific Security and Access Rules.

The Guest network type is chosen. All advanced options are kept as default (Figure 15).

Figure 15 WLAN – Guest Network

Page 79: Dell Networking Campus Switching and Mobility Reference Architecture

17 Dell Networking W-Instant Configuration - Campus Switching and Mobility Reference Architecture 2.0

For the Guest network, the other DHCP scope is used with a different VLAN (Figure 16).

Figure 16 VLAN – Guest Network

Page 80: Dell Networking Campus Switching and Mobility Reference Architecture

18 Dell Networking W-Instant Configuration - Campus Switching and Mobility Reference Architecture 2.0

W-ClearPass is being used for the external captive portal, so External is chosen as the splash page type

(Figure 17). The same Authentication server setting is used to configure the W-ClearPass server located at

the main corporate site.

Figure 17 Security – Guest Network

Page 81: Dell Networking Campus Switching and Mobility Reference Architecture

19 Dell Networking W-Instant Configuration - Campus Switching and Mobility Reference Architecture 2.0

In this example (Figure 18), the default captive portal setting was modified to configure the proper URL and

IP hostname. The default in this case was modified and saved.

Figure 18 Default Captive Portal Setting

Page 82: Dell Networking Campus Switching and Mobility Reference Architecture

20 Dell Networking W-Instant Configuration - Campus Switching and Mobility Reference Architecture 2.0

The access rules are setup different for a Guest network than for an Employee (Figure 19). The captive

portal setting is built in to the Security Tab, so it is not needed here. There is also an option for a pre-

authentication role, which is shown below. This logon role only allows traffic to the W-ClearPass server.

Figure 19 Access – Guest Network

That completes the configuration for the W-Instant AP network. All other settings to make the

authentication and captive portals function are located within the W-ClearPass appliance. See the W-

ClearPass section for more information.

2.2 W-Series Remote Access Points W-Instant APs that are used to deploy Remote APs are sent to the teleworker as a W-Instant device. The

teleworker must power up, and login into the W-Instant GUI to convert the W-IAP into a Remote AP.

Page 83: Dell Networking Campus Switching and Mobility Reference Architecture

21 Dell Networking W-Instant Configuration - Campus Switching and Mobility Reference Architecture 2.0

2.2.1 Converting a W-IAP to a Remote AP After following the instructions to power up the W-IAP, the user connects to the provisioning SSID

instant”. Opening a browser redirects the user to the web GUI.

At this point, it’s typical for the user to be provided a set of instructions specifically written by their IT

department. It’s a simple 3-step process.

1. Navigate to the Maintenance link at the top right hand corner of the GUI.

2. Select the Convert Tab with in the pop-up window.

3. Enter the IP address of the W-Series Controller and select Convert Now.

Figure 20 Converting a W-IAP to a Remote AP

Once the Remote AP completes the conversion process and reboots, it starts broadcasting the SSIDs from

the AP group for which it was provisioned. All corporate traffic is routed through the IPsec tunnel back to

the W-Series controller at the main site.

All W-IAPs can be converted in to Remote APs. For this campus reference, we have chosen the W-

IAP155/P because of its desktop form-factor.

Note: For the W-IAP to terminate and convert to a Remote AP, the W-Series controller must be

configured to allow the W-IAP to terminate. This configuration of the controller is discussed in the main

document.

Page 84: Dell Networking Campus Switching and Mobility Reference Architecture

A Dell Reference Architecture

Dell Networking W-ClearPass Campus Switching and Mobility Reference Architecture 2.0

Dell Networking Solutions Engineering April 2014

Page 85: Dell Networking Campus Switching and Mobility Reference Architecture

2 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Revisions

Date Description

April 2014 Ver. 1.0 Initial Document Creation Colin King

©2014 Dell Inc., All rights reserved.

Except as stated below, no part of this document may be reproduced, distributed or transmitted in any form or by any

means, without express permission of Dell.

You may distribute this document within your company or organization only, without alteration of its contents.

THIS DOCUMENT IS PROVIDED “AS-IS”, AND WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED. IMPLIED

WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE SPECIFICALLY DISCLAIMED.

PRODUCT WARRANTIES APPLICABLE TO THE DELL PRODUCTS DESCRIBED IN THIS DOCUMENT MAY BE FOUND

AT: http://www.dell.com/learn/us/en/19/terms-of-sale-commercial-and-public-sector Performance of network

reference architectures discussed in this document may vary with differing deployment conditions, network loads, and

the like. Third party products may be included in reference architectures for the convenience of the reader. Inclusion

of such third party products does not necessarily constitute Dell’s recommendation of those products. Please consult

your Dell representative for additional information.

Trademarks used in this text:

Dell™, the Dell logo, Dell Boomi™, Dell Precision™ ,OptiPlex™, Latitude™, PowerEdge™, PowerVault™,

PowerConnect™, OpenManage™, EqualLogic™, Compellent™, KACE™, FlexAddress™, Force10™ and Vostro™ are

trademarks of Dell Inc. Other Dell trademarks may be used in this document. Cisco Nexus®, Cisco MDS®, Cisco NX-

0S®, and other Cisco Catalyst® are registered trademarks of Cisco System Inc. EMC VNX®, and EMC Unisphere® are

registered trademarks of EMC Corporation. Intel®, Pentium®, Xeon®, Core® and Celeron® are registered trademarks

of Intel Corporation in the U.S. and other countries. AMD®is a registered trademark and AMD Opteron™, AMD

Phenom™ and AMD Sempron™ are trademarks of Advanced Micro Devices, Inc. Microsoft®, Windows®, Windows

Server®, Internet Explorer®, MS-DOS®, Windows Vista® and Active Directory® are either trademarks or registered

trademarks of Microsoft Corporation in the United States and/or other countries. Red Hat® and Red Hat® Enterprise

Linux® are registered trademarks of Red Hat, Inc. in the United States and/or other countries. Novell® and SUSE® are

registered trademarks of Novell Inc. in the United States and other countries. Oracle® is a registered trademark of

Oracle Corporation and/or its affiliates. Citrix®, Xen®, XenServer® and XenMotion® are either registered trademarks

or trademarks of Citrix Systems, Inc. in the United States and/or other countries. VMware®, Virtual SMP®, vMotion®,

vCenter® and vSphere® are registered trademarks or trademarks of VMware, Inc. in the United States or other

countries. IBM® is a registered trademark of International Business Machines Corporation. Broadcom® and

NetXtreme® are registered trademarks of Broadcom Corporation. Qlogic is a registered trademark of QLogic

Corporation. Other trademarks and trade names may be used in this document to refer to either the entities claiming

the marks and/or names or their products and are the property of their respective owners. Dell disclaims proprietary

interest in the marks and names of others.

Page 86: Dell Networking Campus Switching and Mobility Reference Architecture

3 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Table of contents Revisions ............................................................................................................................................................................................. 2

1 Introduction ................................................................................................................................................................................ 4

2 W-ClearPass Example Configurations ................................................................................................................................... 5

2.1 BYOD: W-ClearPass Onboard ..................................................................................................................................... 5

2.1.1 W- ClearPass Policy Manager Onboard Services ...................................................................................................... 5

2.1.2 Onboard Application Configuration .......................................................................................................................... 16

2.2 Guest Access: W-ClearPass Guest ............................................................................................................................. 33

2.2.1 W-ClearPass Policy Manager Guest Services .......................................................................................................... 34

2.2.2 Guest Application Configuration ................................................................................................................................ 37

2.3 Wired MAC Authentication ......................................................................................................................................... 40

2.3.1 MAC Authentication Service ....................................................................................................................................... 41

2.4 Health & Posture: W-ClearPass OnGuard ................................................................................................................ 43

2.4.1 OnGuard Policy Manager Service .............................................................................................................................. 43

2.4.2 OnGuard Posture Policy .............................................................................................................................................. 45

2.4.3 OnGuard Agent Settings .............................................................................................................................................. 47

Page 87: Dell Networking Campus Switching and Mobility Reference Architecture

4 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

1 Introduction This document serves as an addendum to the Dell Networking Campus Switching and Mobility reference

Architecture 2.0. It contains configuration examples and screenshots of the W-ClearPass interface. IT

managers can use this document to understand how the features described in the main reference

architecture are configured.

The first configuration example will contain brief descriptions on the W-ClearPass configuration

methodology. Subsequent configuration examples are provided without step-by-step comment.

Note: This document is not a deployment guide. It is intended to provide a high-level overview to the

configuration methodology. For assistance with W-ClearPass, please see the User Guides located within

the product support pages on the Dell Support website.

Page 88: Dell Networking Campus Switching and Mobility Reference Architecture

5 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

2 W-ClearPass Example Configurations

2.1 BYOD: W-ClearPass Onboard The following configuration example will show a single service configured to provision and authenticate

employees using the corporate SSID. Configurations for the W-Series controller can be found in the

configuration file attached to the main reference architecture document.

2.1.1 W- ClearPass Policy Manager Onboard Services From the Service Templates (Figure 1), choose Onboard Authorization.

Figure 1 Services Template

After selecting the Onboard Authorization Template, the form below (Figure 2) is provided to assist in

creating a personalized template for the network. From this template, two services are created, a

provisioning and an authorization service. For this example, only the provisioning service is documented.

Page 89: Dell Networking Campus Switching and Mobility Reference Architecture

6 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 2 Onboard Authorization

Once the service has been created, it is placed in the Service List (Figure 3). Select the service to configure

it.

Figure 3 Service List

Page 90: Dell Networking Campus Switching and Mobility Reference Architecture

7 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 4 shows the Summary tab. This tab can be used to review the configured options while creating the

service. Once the service has been created, the summary tab shows the details of each option configured

within the service.

Figure 4 Summary Tab

The Service tab (Figure 5) is used to select the service options and set the service rules that will identify the

authentication request as belonging to this service.

Page 91: Dell Networking Campus Switching and Mobility Reference Architecture

8 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 5 Summary Tab

The Authentication (Figure 6) tab contains the authentication settings. Both the Method and Source are

configured. All methods and sources for any device using this service should be added.

Figure 6 Authentication Tab

Figure 7 shows a list of possible authentication methods. Authentication methods can also be added,

imported, or exported.

Page 92: Dell Networking Campus Switching and Mobility Reference Architecture

9 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 7 Authentication Methods

Figure 8 shows a list of authentication sources. Authentication sources can also be added, imported, or

exported.

Page 93: Dell Networking Campus Switching and Mobility Reference Architecture

10 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 8 Authentication Sources

Figure 9 is an example of an authentication source that was added. This Active Directory source is located

on a Windows Server in the corporate domain. After specifying the hostname and password, the attributes

were automatically imported into W-ClearPass.

Page 94: Dell Networking Campus Switching and Mobility Reference Architecture

11 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 9 Authentication Source Example

Figure 10 shows the Role Mapping settings. Roles are created and listed with W-ClearPass, and can be

passed directly to the W-Series Controller. The controller then applies these roles to the user during the

authentication process.

Role Mapping is very flexible, applying a variety of conditions that can be used to apply one or multiple

roles to a single user. Several sources of information can be used to map roles, including fingerprint

information gathered from W-ClearPass and the W-Series Controller.

Page 95: Dell Networking Campus Switching and Mobility Reference Architecture

12 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 10 Roles Tab

A Role Mapping Policies can be added or modified directly from the service. The screenshot below (Figure

11) shows the configuration of just the Role Mapping Policy.

Figure 11 Role Mapping Policy

The Role Mapping policy contains a default Role (Figure 12) in case no Roles are be assigned to the user.

Best practice is to use a restrictive Role as the default.

Page 96: Dell Networking Campus Switching and Mobility Reference Architecture

13 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 12 Default Role

Mapping Rules (Figure 13) are used identify criteria to assign new roles to the user. Rules are evaluated

from the top down, with options to stop at the first match or all matches. Administrators can fine tune

policy based on the user, device type, the OS revision, and other information gathered from the device

fingerprinting process (Figure 14). The options for mapping conditions are extremely large, and it is one of

the features that make CPPM such a powerful tool.

Figure 13 Roles Mapping Evaluation

Page 97: Dell Networking Campus Switching and Mobility Reference Architecture

14 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 14 Rules Editor

In the Enforcement tab (Figure 15), the service is configured to direct the Network Access Device to apply

whatever action is required based on the entire policy decision. Enforcement policies consist of a type

(e.g. RADIUS or TACACS), and the value. The value could be a user role, VLAN assignment, or updating a

database. Values could be considered the action, whiles the type is how the action is applied.

Page 98: Dell Networking Campus Switching and Mobility Reference Architecture

15 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 15 Enforcement Tab

Figure 16 shows the Enforcement Policy. Just like the Role Mapping, it can be added or modified from the

service or outside the service.

Figure 16 Enforcement Policy

Figure 17 shows the setting for a default profile. A Deny Access Enforcement Profile is a typical choice if no

enforcement rule can be identified.

Page 99: Dell Networking Campus Switching and Mobility Reference Architecture

16 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 17 Enforcement Policy – Deny Access Profile

Figure 18 is an example of a set of rules for an enforcement policy. Multiple actions can be applied to a

single user or just a first match. Many options for conditions are available to pinpoint the appropriate

classification of the user. Note the actions in the right hand column; actions can be assigned to a role or

profile. They can also be RADIUS attributes. The custom Finance_VLAN action shown below is to force

users that are in the Finance department to a special VLAN reserved for only them.

Figure 18 Enforcement Policy Rules

Once the configuration is complete, the service is saved and placed into the service list. W-ClearPass

automatically requests the administrator to place the service using the Reorder Services page. This allows

the service to be moved above or below other services on the list.

2.1.2 Onboard Application Configuration The Service Example in the last section showed the process of configuring the service for Onboard

provisioning. The W-Series Controller configuration in the main document showed the settings required

to direct users to the captive provisioning page. This section will show the configuration of the Onboard

module to enable provisioning of select device types.

Page 100: Dell Networking Campus Switching and Mobility Reference Architecture

17 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Note: Certificate Authority Settings are an integral part of Onboard. For details on Certificate Authorities

and how they are configured within W-ClearPass Onboard, see the Dell Networking W-ClearPass Guest 6.2 Deployment Guide located within the product support pages on the Dell Support website.

Note: Provisioning of devices can include many different options and settings. This reference

architecture is focused on the network access functionality. Default settings are used in features not

related to network access.

The most important configuration for the W-ClearPass Onboard module is within the Network Settings.

The following screenshots (Figures 19-23) show a typical setup for Onboard with a controller based

campus WLAN.

Figure 19 Network Settings - Network Access

Page 101: Dell Networking Campus Switching and Mobility Reference Architecture

18 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 20 Network Settings – Enterprise Protocols

Figure 21 Network Settings – Enterprise Authentication

Page 102: Dell Networking Campus Switching and Mobility Reference Architecture

19 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 22 Network Settings – Enterprise Trust

Page 103: Dell Networking Campus Switching and Mobility Reference Architecture

20 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 23 Network Settings – Windows Network Settings

The Provisioning Settings (Figures 24-31) within Onboard is where the actual provisioning process is

defined. The web login landing page or captive portal is customized in this section. Administrators can

change the look and feel of the landing page, including use of a customized skin. Changes to this section

affect the client application that is downloaded during the provisioning process for Windows devices.

Android users must have a provisioning App installed through the Google Play store before attempting to

access the network. Apple products use native applications to assist in the provisioning.

Page 104: Dell Networking Campus Switching and Mobility Reference Architecture

21 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 24 Provisioning Settings

Page 105: Dell Networking Campus Switching and Mobility Reference Architecture

22 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 25 Supported Devices

Page 106: Dell Networking Campus Switching and Mobility Reference Architecture

23 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 26 Device Provisioning

Page 107: Dell Networking Campus Switching and Mobility Reference Architecture

24 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 26 Continued

Page 108: Dell Networking Campus Switching and Mobility Reference Architecture

25 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 27 IOS and OS X Provisioning

Page 109: Dell Networking Campus Switching and Mobility Reference Architecture

26 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 27 Continued

Page 110: Dell Networking Campus Switching and Mobility Reference Architecture

27 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 27 Continued

Page 111: Dell Networking Campus Switching and Mobility Reference Architecture

28 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 27 Continued

Page 112: Dell Networking Campus Switching and Mobility Reference Architecture

29 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 28 IOS and OS X Provisioning - Instructions

Page 113: Dell Networking Campus Switching and Mobility Reference Architecture

30 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 29 Windows Provisioning

Page 114: Dell Networking Campus Switching and Mobility Reference Architecture

31 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 30 Android Provisioning

Page 115: Dell Networking Campus Switching and Mobility Reference Architecture

32 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 30 Continued

Page 116: Dell Networking Campus Switching and Mobility Reference Architecture

33 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 31 Device Provisioning

2.2 Guest Access: W-ClearPass Guest The Guest feature within W-ClearPass has two parts, just like the Onboard example shown above. The first

section will detail the Policy Manager Service, while the second section shows the Guest Application

configuration.

This example (Figures 32-38) is for guest access through self-registration. The guest fills out a form, and

then receives a password through the captive web portal. The database used is the internal guest database

within W-ClearPass.

Note: Default values are used for the roles and enforcement profiles. IT managers should place addition

restriction per their security policy.

Page 117: Dell Networking Campus Switching and Mobility Reference Architecture

34 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Note: This example adds MAC caching to enable another service to authenticate known users through

MAC authentication. MAC caching is not part of the default template.

2.2.1 W-ClearPass Policy Manager Guest Services From the Service Templates, choose Guest Access.

Figure 32 Policy Manager Guest Services

Figure 33 Guest Access – Summary Tab

Page 118: Dell Networking Campus Switching and Mobility Reference Architecture

35 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 34 Guest Access – Service Tab

Figure 35 Guest Access – Authentication Tab

Note The W-ClearPass Insight database can be used to apply roles based on the analytics gathered in

Insight.

Page 119: Dell Networking Campus Switching and Mobility Reference Architecture

36 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 36 Guest Access - Authentication Source

Figure 37 Guest Access – Role Mapping

Figure 38 Guest Access – Enforcement Policy

Page 120: Dell Networking Campus Switching and Mobility Reference Architecture

37 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

2.2.2 Guest Application Configuration The Guest application can be used to provide local administrators an interface to manage accounts. It

also contains the configurations used to setup the captive web portal. For this example configuration, the

self-registration is setup.

Note: Many of the default settings are left as default. Screenshots with only default settings are not

shown below.

Figure 39 shows a visual representation of the guest portal, registration, receipt, and NAS settings.

Administrator can click on the area of the map to configure specific settings. By clicking on the Advanced

editor, all the settings can be displayed in a page view.

Figure 39 ClearPass - Customize Guest Self-Registration

Figures 38 thru 42 show a portion of the configuration setting pages.

Page 121: Dell Networking Campus Switching and Mobility Reference Architecture

38 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 40

Note: In the settings for NAS Login shown below, the IP address of the W-Series controller is used. For

an Instant network using a VPN to access ClearPass, the IP address field should be populated with

“securelogin.arubanetworks.com”

Page 122: Dell Networking Campus Switching and Mobility Reference Architecture

39 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 41 NAS Login

Page 123: Dell Networking Campus Switching and Mobility Reference Architecture

40 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 42 Self-Service Portal

2.3 Wired MAC Authentication It’s common for IT deployments to have non-802.1x capable devices. Typically, these are legacy devices,

or simple devices such as printers, cameras, or VoIP phones.

The configuration on the access switches is straightforward. MAC authentication with MAB (MAC

Authentication Bypass) is used on the ports to support non-802.1x devices. Standard settings for enabling

802.1x authentication on the switches can be seen in the configuration files attached to the main

document.

Below is the W-ClearPass Policy Manger service settings used to enable the MAC authentication with Dell

switches.

Note: Detailed step-by-step instructions for previous generation switches can be found in the MAC

Authentication and OnGuard Posture Enforcement using Dell W-Series ClearPass and Dell Networking

Switches whitepaper, which can be found at the Dell TechCenter Community. These instructions are still

applicable to current generation products.

Page 124: Dell Networking Campus Switching and Mobility Reference Architecture

41 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

2.3.1 MAC Authentication Service

Figure 43 MAC Authentication – Summary Tab

Figure 44 MAC Authentication – Service Tab

Note: The use of EAP MD5 is required for interoperability with Dell Networking switches.

Note: A customized list of MAC addresses are entered into a Host List located within W-ClearPass. This is

the database used for the authentication.

Page 125: Dell Networking Campus Switching and Mobility Reference Architecture

42 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 45 MAC Authentication – Authentication Tab

Figure 46 MAC Authentication – Roles Tab

Figure 47 MAC Authentication – Enforcement Tab

Page 126: Dell Networking Campus Switching and Mobility Reference Architecture

43 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

2.4 Health & Posture: W-ClearPass OnGuard OnGuard is an application within W-ClearPass used to check the health or posture of a device. To do this

W-ClearPass has two methods, a persistent client, and a dissolvable web-based portal. This example will

focus on the persistent client.

The persistent client can be downloaded directly from the W-ClearPass server through a URL. The install

package can also be pushed to the clients by standard device management methods (Group Policy). This

persistent client program must be installed before W-ClearPass can be utilized for health checks.

2.4.1 OnGuard Policy Manager Service OnGuard is web based and performs all checks through http.

The web-based Health Check Only Service Template is accessed through the Start Here configuration

screen (Figure 48).

Figure 48 Health Check Only Service Template

Figure 49 OnGuard – Summary Tab

Page 127: Dell Networking Campus Switching and Mobility Reference Architecture

44 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 50 OnGuard – Service Tab

Figure 51 OnGuard – Roles Tab

Figure 52 OnGuard – Posture Tab

Page 128: Dell Networking Campus Switching and Mobility Reference Architecture

45 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 53 OnGuard – Enforcement Tab

2.4.2 OnGuard Posture Policy The OnGuard settings are located in the OnGuard Posture Policy. IT admins can access this through the

service configuration or directly by the left-hand side navigation bar.

This example checks the client to ensure a firewall is enabled on the device. If the firewall is not enabled,

there are options to automatically enable (remediate) the firewall, or bounce the client.

Note: The web-based dissolvable health check is not able to remediate clients.

Figure 54 Posture Policies – Summary Tab

Page 129: Dell Networking Campus Switching and Mobility Reference Architecture

46 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 55 Posture Policies – Policy Tab

Figure 56 Posture Policies – Posture Plugins Tab

Selecting configure on the Plugin Configuration opens the settings for the OnGuard client. There are

many options for heath and posture that can be used in the same heath check.

Page 130: Dell Networking Campus Switching and Mobility Reference Architecture

47 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 57 System Health Validator

Figure 58 Posture Policies – Roles Tab

2.4.3 OnGuard Agent Settings The settings for the OnGuard agent are located within the Administration area of the Policy Manager

(Figure 59). The OnGuard Agent also has options for a VPN client and can be used for wired or wireless.

This example uses wireless without the VPN client.

Page 131: Dell Networking Campus Switching and Mobility Reference Architecture

48 Dell Networking W-ClearPass - Campus Switching and Mobility Reference Architecture 2.0

Figure 59 OnGuard Agent