EXTREME VALIDATED DESIGN Extreme Smart OmniEdge for Primary/Secondary Education Version 1.1 9035597-01 December 2018 Preface Contents Preface........................................................................................................................................5 Extreme Validated Designs ............................................................................................................... 5 Purpose of This Document ................................................................................................................ 5 Target Audience ................................................................................................................................ 6 Authors ............................................................................................................................................... 6 Document History .............................................................................................................................. 6 About Extreme Networks ................................................................................................................... 6 Introduction................................................................................................................................7 Technology Overview................................................................................................................8 Terminology ....................................................................................................................................... 8 Functional Components of Extreme Smart OmniEdge .................................................................... 9 ExtremeSwitching Edge ................................................................................................................... 9 Extreme Extended Edge .................................................................................................................. 9 ExtremeWireless .............................................................................................................................. 9 Network Management Policy and ExtremeControl ......................................................................... 10 Validated Designs – Infrastructure & Topology ......................................................................11 Extreme Smart OmniEdge for Primary/Secondary Education Deployment Model.......................... 11 Hardware and Software Matrix .......................................................................................................... 12 Smart OmniEdge for Primary/Secondary Education – Easy Config Tool ........................................ 12 Preconditions ..................................................................................................................................... 13 ExtremeSwitching Edge Auto-Configuration ..................................................................................... 14 VPEX Full Automation ..................................................................................................................... 14 VPEX Partial Automation ................................................................................................................. 14 MLAG Orchestration Mode .............................................................................................................. 15 District Office / School 1..................................................................................................................... 16 VLANs and Subnets at the District Office ........................................................................................ 17 District Office/School 1 – Configuration ........................................................................................... 19 Wired User Access........................................................................................................................... 39 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 2 Preface Wireless User Access ...................................................................................................................... 47 Authentication – RADIUS................................................................................................................. 50 Guest Access (Captive Portal)......................................................................................................... 55 Extreme Policy ................................................................................................................................. 56 ExtremeControl Configuration ......................................................................................................... 89 ExtremeWireless Controller Configuration ...................................................................................... 103 ExtremeAnalytics ............................................................................................................................. 140 Remote Site Connectivity via MAN .................................................................................................. 152 Authentication – Netlogin ................................................................................................................. 155 School 2 ............................................................................................................................................. 156 VLANs and Subnets at School 2 ..................................................................................................... 157 School 2 – Configuration.................................................................................................................. 158 Wired User Access........................................................................................................................... 172 Wireless User Access ...................................................................................................................... 178 Authentication – RADIUS................................................................................................................. 180 Remote Site Connectivity via MAN.................................................................................................. 181 Policy and Access Control ............................................................................................................... 184 Authentication – Netlogin ................................................................................................................. 184 School 3 ............................................................................................................................................. 185 VLANs and Subnets at School 3 ..................................................................................................... 186 School 3 – Configuration.................................................................................................................. 187 Wired User Access........................................................................................................................... 203 Wireless User Access ...................................................................................................................... 209 Authentication – RADIUS................................................................................................................. 212 Remote Site Connectivity via MAN .................................................................................................. 213 Policy, Access Control, and Analytics.............................................................................................. 217 Authentication – Netlogin ................................................................................................................. 217 School 4 ............................................................................................................................................. 218 VLANs and Subnets at School 4 ..................................................................................................... 218 School 4 – Base Configuration ........................................................................................................ 219 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 3 Preface Wired User Access........................................................................................................................... 221 Wireless User Access ...................................................................................................................... 223 Authentication – RADIUS................................................................................................................. 224 Remote Site Connectivity via MAN .................................................................................................. 224 Policy and Access Control ............................................................................................................... 226 Authentication – Netlogin ................................................................................................................. 226 RF-Planning ....................................................................................................................................... 227 Site Survey ....................................................................................................................................... 227 ExtremeWireless RF Planning Tool................................................................................................. 227 Visualization ..................................................................................................................................... 230 Sharing and Exporting...................................................................................................................... 231 Product Lifecycle – Exporting into Other Products .......................................................................... 233 RF Survey Tools .............................................................................................................................. 233 Extreme Management Center Configuration .................................................................................... 234 Adding a ExtremeControl Appliance to Extreme Management Center .......................................... 234 Adding Wireless Controllers to Extreme Management Center ....................................................... 236 Adding Analytics to Extreme Management Center ......................................................................... 238 Site Configuration ............................................................................................................................. 240 Design Considerations....................................................................................................................... 242 Network Time Protocol (NTP) .......................................................................................................... 242 BOOTP Relay Agent ........................................................................................................................ 253 Link Layer Discover Protocol (LLDP) .............................................................................................. 256 Simple Network Management Protocol (SNMPv3) ......................................................................... 257 Domain Name System (DNS).......................................................................................................... 269 RADIUS ............................................................................................................................................ 270 Secure Shell (SSH) .......................................................................................................................... 274 Multicast (IGMP and PIM-SM) ......................................................................................................... 276 Appendix ....................................................................................................................................286 VPEX (Extended Edge) Automation Highlights: ............................................................................... 286 References .................................................................................................................................287 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 4 Preface Preface This document provides design and guidance for implementing an Extreme Networks Smart OmniEdge access layer using Extreme Networks hardware and software. An Extreme Smart OmniEdge network consists of ExtremeSwitching products, ExtremeWireless, Extreme Management Center, ExtremeControl, and ExtremeAnalytics. Extreme Validated Designs Helping customers consider, select, and deploy network solutions for current and planned needs is our mission. Extreme Validated Designs offer a fast track to success by accelerating that process. Validated designs are repeatable reference network architectures that have been engineered and tested to address specific use cases and deployment scenarios. They document systematic steps and best practices that help administrators, architects, and engineers plan, design, and deploy physical and virtual network technologies. Leveraging these validated network architectures accelerates deployment speed, increases reliability and predictability, and reduces risk. Extreme Validated Designs incorporate network and security principles and technologies across the ecosystem of service provider, datacenter, campus, and wireless networks. Each Extreme Validated Design provides a standardized network architecture for a specific use case, incorporating technologies and feature sets across Extreme products and partner offerings. All Extreme Validated Designs follow best-practice recommendations and allow for customer-specific network architecture variations that deliver additional benefits. The variations are documented and supported to provide ongoing value, and all Extreme Validated Designs are continuously maintained to ensure that every design remains supported as new products and software versions are introduced. By accelerating time-to-value, reducing risk, and offering the freedom to incorporate creative, supported variations, these validated network architectures provide a tremendous value-add for building and growing a flexible network infrastructure. Purpose of This Document This Extreme validated design provides guidance for designing and implementing an Extreme Smart OmniEdge network using Extreme hardware and software. It details the Extreme reference architecture for Smart OmniEdge utilizing Extended Edge, stacked ExtremeSwitching switches, IdentiFi wireless, and the Extreme Management suite of applications. It should be noted that not all features such as automation practices, zero-touch provisioning, and monitoring are included in this document. The design practices documented here follow the best-practice recommendations but does not intend to cover other variations to the design that are supported in general by Extreme Networks. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 5 Preface Target Audience This document is written for Extreme systems engineers, partners, and customers who design, implement, and support campus networks. This document is intended for experienced network architects, engineers, and assumes that the reader has a good understanding of switching and routing features. Authors The authors have extensive experience testing Extreme Smart OmniEdge products and solutions. At Extreme, they focus on developing and validating solution architectures that customers can use in deployments. • Jason Carroll, Staff SQA Engineer • Filip Steiger, Staff SQA Engineer • Lon Weston, Staff SQA Engineer The authors would like to acknowledge the following individuals for their technical guidance in developing this validated design: • Paulo Francisco, Wireless Technical Product Manager • Donald Grosser, Distinguished Software Systems Engineer • Elangomaran Kathirvel, Director of QA Engineering • Roger Lapuh, Senior Principal Software Applications Engineer Document History Future revisions of this document will include upcoming Smart OmniEdge products and technologies. Date July 2018 Dec 2018 Part Number 9035597-00 9035597-01 Description 1.0 - Initial release 1.1 – VPEX Full Automation, VPEX Partial Automation, and VLAN name changes About Extreme Networks Extreme Networks® (NASDAQ: EXTR) networking solutions help the world’s leading organizations transition smoothly to a world where applications and information reside anywhere. This vision is designed to deliver key business benefits such as unmatched simplicity, non-stop networking, application optimization, and investment protection. Innovative Ethernet and storage networking solutions for datacenter, campus, and service provider networks help reduce complexity and cost while enabling virtualization and cloud computing to increase business agility. To help ensure a complete solution, Extreme Networks ( www.extremenetworks.com) partners with worldclass IT companies and provides comprehensive education, support, and professional services offerings. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 6 Introduction Introduction The Smart OmniEdge design detailed in this document is targeted for primary and secondary education campuses, both single and multi-site. The configurations and design practices documented here are fully validated and conform to Extreme Networks best practices and recommendations. The intention of this Extreme Validated Design document is to provide reference configurations and instruction for building a managed, secure campus network using ExtremeSwitching and Extended Edge switches and ExtremeWireless architectures. This document describes the following architectures: • Extreme Smart OmniEdge with Extreme Extended Edge in a fully redundant topology • Extreme Smart OmniEdge with Extreme Extended Edge in a cascaded topology • Extreme Smart OmniEdge with ExtremeSwitching switches utilizing stacking capabilities • ExtremeWireless • ExtremeManagement, ExtremeControl and ExtremeAnalytics Note Additional resources: • At-A-Glance, Smart OmniEdge for Primary/Secondary Education • Solutions Brief, Smart OmniEdge for Primary/Secondary Education Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 7 Technology Overview Technology Overview Terminology Term Description ACL AD AP ARP BPDU BSR CLI CoS C-RP DHCP EXOS FDB IGMP IP ISC ISL LACP LAG LDAP LLDP MAC MAN MLAG NTP OSPF PIM-SM PoE QoS sFlow SFP/SFP+ SNMP UDP VLAN VPEX VR VRRP 802.1BR Access Control List Active Directory Access Point Address Resolution Protocol Bridge Protocol Data Unit Bootstrap Router Command-Line Interface Class of Service for Layer 2 Candidate Rendezvous Point Dynamic Host Configuration Protocol Extreme Operating System (also ExtremeXOS) Filter Database Internet Group Management Protocol Internet Protocol Inter-Switch Connector Inter-Switch Link Link Aggregation Control Protocol Link Aggregation Lightweight Directory Access Protocol Link Layer Discovery Protocol Media Access Control Metropolitan Area Network Multi-Chassis Link Aggregation Network Time Protocol Open Shortest Path First Protocol Independent Multicast Sparse Mode Power over Ethernet Quality of Service Sampled Flow Optical Transceivers Simple Network Management Protocol User Datagram Protocol Virtual Local Area Network Virtual Port Extender Virtual Router Virtual Redundancy Protocol IEEE Standard to extend a bridge and its management beyond its physical enclosure IEEE Standard for port-based Network Access Control 802.1X Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 8 Technology Overview Functional Components of Extreme Smart OmniEdge The Extreme Smart OmniEdge Infrastructure provides the means of communication between users, applications, and devices. Applications such as web browsing, Unified Communications, email, video surveillance, and digital signage all require an infrastructure that is reliable. The Extreme Smart OmniEdge provides QOS, Bandwidth, POE, Network Access Control, Redundancy, and Visibility across local or remote geographical locations. This gives the IT operator an opportunity to provide appropriate levels of access for different user groups without spoiling connectivity on a shared network. An Extreme Networks Smart OmniEdge network consists of three main functional areas. These include: • Two Options for wired user connectivity: o Traditional ExtremeXOS switches o 802.1BR based Extended Edge switches (Bridge Port Extenders) • ExtremeWireless IdentiFi solution • Extreme Management Center providing Network Policy, Access Control and Analytics ExtremeSwitching Edge The ExtremeSwitching series is a scalable cost-effective family of edge switches powered by Extreme Networks ExtremeXOS, a highly resilient OS providing continuous uptime, manageability and operational efficiency. ExtremeSwitching provides high-performance routing and switching, flexible stacking, PoE-plus support and comprehensive security, while extending the benefits of ExtremeXOS to the campus edge. ExtremeSwitching also provide easy-to-use, yet powerful, management services which include role-based policies for controlled access to specific network applications. Extreme Extended Edge Rather than utilizing a traditional switch for user Access, Extreme Networks customers can use Controlling Bridges (CBs) to extend the existing port table to V400 Series Bridge Port Extenders (BPEs). This technology is defined in the IEEE 802.1BR specification. The BPE devices do not participate in the packet processing, forwarding, or filtering decisions. Instead, they simply forward packets to the CB, where switching functionality is provided. The BPE devices are managed like slots in a chassis under a single management domain. From a management perspective, multiple layers of a traditional network can be reduced, greatly simplifying the network operation. ExtremeWireless ExtremeWireless is simple, fast, and smart, delivering a user experience in unmatched scale and density at an exceptional level. Intuitive dashboards allow effortless management of the network: • With a single click, you can deliver services and new applications with ease. • Enable fast roaming with seamless mobility while delivering more throughput with fewer APs. • You can be agile through an advanced architecture that assures security with enforcement. • Through analytics, user experience can be measured in true detail. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 9 Technology Overview Access Points can initialize and configure themselves from a centralized appliance. APs can find the appliance through DHCP which then pushes configurations down. After configuration, each AP can run independently of an appliance if connectivity is lost. Policy and QoS are performed at the AP level for clients connecting to a SSID. RF Characteristics can be automatically configured by the AP through automatic power or channel selection. Band-Steering and Airtime Fairness are also controlled by the AP. The ExtremeWireless designs provides the same availability that everyone has come to expect with wired networks. Appliances have built-in resiliency through the ability to pair controllers together for full redundancy. If an appliance happens to fail, the second controller can take over the full load while maintaining connectivity through the APs. Network Management Policy and ExtremeControl The deployment of Extreme Networks Management and Access Control Appliances makes the Extreme Smart OmniEdge possible. These tools – consisting of Extreme Management Center, ExtremeControl, and ExtremeAnalytics – form the backbone to managing and configuring the functionality of the Extreme Smart OmniEdge solution. Extreme Management Center Extreme Management Center is a single pane of glass management system that provides wired/wireless visibility and control from the datacenter to the mobile edge. The intelligence, automation, and integration of this management software enables the IT organization to optimize the efficiency of network operations and reduce total cost of ownership. Most important, Extreme Management Center provides advanced network configuration and change management for the wired and wireless infrastructure and allows centralized creation of policies that follow users and devices across the network. These are not tied to the physical network and can change based on user, device, time of day, location, and connection type. ExtremeControl Extreme's Network Access Control engine, or ExtremeControl, lets you manage secure and automated access for both BYOD and IoT devices from one convenient dashboard. It makes it easy to roll out granular policies across your wired and wireless networks to meet industry and company compliance obligations. Identity-based network access control keeps unauthorized people and devices from accessing your network. ExtremeControl is integrated with Extreme Management Center to allow for simple and seamless authentication control and modification in one single application. ExtremeAnalytics ExtremeAnalytics lets you understand what applications are running on your network, who is using them and what the response time is for each application. It gives you granular visibility into network and application performance, users, locations, and devices. Information from the network and the applications empowers you to make data-driven decisions. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 10 Validated Designs – Infrastructure & Topology Validated Designs – Infrastructure & Topology The following sections describe the deployment model for the Extreme Smart OmniEdge for Primary/Secondary Education. The network components are spread across a primary location – known as District Office/School 1 – and three additional school locations (Schools 2, 3, and 4). Extreme Smart OmniEdge for Primary/Secondary Education Deployment Model District Office/School-1 Extended Edge with ExtremeXOS Stack ExtremeXOS Stack ExtremeWireless Bridge Port Extender Smart OmniEdge Applications Controlling Bridges Metropolitan Area Network (MAN) OSPF School-2 Extended Edge School-3 School-4 Cascaded Extended Edge ExtremeXOS Standalone Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 11 Validated Designs – Infrastructure & Topology Hardware and Software Matrix The following table shows the actual platforms and software applications used in the Validated Design. Utilizing other ExtremeSwitching hardware may offer different scale and feature capabilities. Product FW Version X690-48x-2q-4c 22.6.1.4patch1-1 Advanced Edge: VPEX Support Core: OSPF and PIM-SM Support 22.6.1.4patch1-1 Advanced Edge: VPEX Support Core: OSPF and PIM-SM Support 22.6.1.4patch1-1 Advanced Edge 22.6.1.4patch1-1 Advanced Edge 1.1.0.41 1.1.0.41 1.1.0.41 1.1.0.41 10.41.07.0014 10.41.07.0014 10.41.07.0014 10.41.07.0014 10.41.07.0014 10.41.07.0014 10.41.07.0014 10.41.07.0014 8.1.5.22 8.1.5.22 8.1.5.22 X590-24x-1q-2c X440-G2-48p-10G4 X440-G2-48t-10G4 V400-24p-10GE2 V400-24t-10GE2 V400-48p-10GE4 V400-48t-10GE4 Wireless Controller V2110 AP3912i-FCC AP3915e-FCC AP3915i-FCC AP3916ic-FCC AP3917e-FCC AP3935e-FCC AP3935i-FCC Extreme Management Center ExtremeControl ExtremeAnalytics Enabled License Level Enabled Feature Packs Quad 10G Uplink Quad 10G Uplink Smart OmniEdge for Primary/Secondary Education – Easy Config Tool An Easy Configuration tool is available to use alongside this Validated Design. This is a simple and efficient way to configure devices used throughout the deployment process. This tool will collect data from the user regarding their specific device information, such as IP addresses and login credentials. Based on this data collection, the tool will configure Edge devices and Extended Edge devices and wireless controllers in a way that replicates the configurations seen in this document. The devices configured, as well as the design template to follow, can be dictated by the user at runtime. As a prerequisite, each related device must be powered on and have management access via Telnet or SSH. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 12 Validated Designs – Infrastructure & Topology Preconditions Before beginning the configuration of any device in the Extreme Smart OmniEdge validated design, verify that the following preconditions have been met: Extended Edge Controlling Bridges VPEX x690-DO-Left.54 # show licenses Enabled License Level: Core Enabled Feature Packs: DirectAttach enable vpex Licensing requirements on ExtremeXOS Extended Edge controlling bridges. Only issue ‘enable vpex’ command if not using built in automated configuration processes and features. ExtremeSwitching Switches X440G2-48p-10G4.1 # show licenses Enabled License Level: Advanced Edge Enabled Feature Packs: DirectAttach Quad 10G Uplink Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 Licensing and Feature Pack requirements on ExtremeSwitching switch. 13 Validated Designs – Infrastructure & Topology ExtremeSwitching Edge Auto-Configuration The ExtremeSwitching Edge ExtremeXOS has provided three process/features which simplify the configuration. VPEX Full Automation Performs two functions: 1. Joins standalone switches to an existing stack once connected by dedicated stacking links or properly configured alternate stacking links. 2. Enables the VPEX feature if BPEs are connected to switches capable of being CBs. If two CBs are connected to each other and BPEs are connected to each CB, VPEX Full Automation will auto configure an MLAG and enable VPEX Partial Automation. Note The VPEX Full Automation process executes automatically if the following conditions are met; • The CB is being powered up for the first time and the configuration has never been saved. • The CB configuration has been reset to default and the configuration has never been saved. • The CB learns of connected BPE through LLDP while either of the above conditions are true. To use Smart OmniEdge Easy Configuration Tool or configure everything manually VPEX Full Automation will need to be suspended. The best way to suspend this process is not to connect any BPEs to a potential CB and save the base configuration as soon as possible. VPEX Partial Automation The Smart OmniEdge Easy Configuration Tool or VPEX Full Automation will enable VPEX Partial Automation without any user intervention. The VPEX Partial Automation feature will perfom the following functions: 1. Discovers BPE(s) using LLDP 2. Assigns a slot number to newly connected BPE based on slot availability. 3. Configures the BPE module type. 4. Configures the BPE ports to be LAGs. 5. Configures MLAG ports for dual-homed BPEs in an MLAG setup. If required, VPEX Partial Automation can be enabled manually with the following command: enable vpex auto-config Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 14 Validated Designs – Infrastructure & Topology MLAG Orchestration Mode In CB MLAG deployments, the CBs can be placed manually into orchestration mode. This is useful for BPE port configurations, which must be identical on both CBs. Any configuration commands will now be checkpointed to the MLAG peer switch. To enter orchestration mode, enter the following command: start orchestration mlag peer_name After entering orchestration mode, like the existing virtual-router mode, the configuration prompt changes indicating that commands issued are within this context: (orchestration DO_SC1_MLAG) Slot-1 VPEX X690-48x-2q-4c #start orchestration mlag peer_name To exit orchestration mode, use the following command: stop orchestration Since the commands are checkpointed to the other CB, use caution to only use with commands that needed to be executed on both sides. If the user is not careful, configuring an interface with the same IP addresses or other configuration issues might be encountered. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 15 Validated Designs – Infrastructure & Topology District Office / School 1 ExtremeXOS Stack District Office/School-1 Bridge Port Extenders Extreme Management Center ExtremeControl ExtremeWireless Controllers MLAGs ExtremeAnalytics Redundant Controlling Bridges Controlling Bridge 1 Controlling Bridge 2 In many school districts, the District Office is often a high school and is referred to as School 1 in this document. Here the District Office is shown to have a stack of ExtremeSwitching switches co-existing with Extreme Extended Edge. The District Office includes two controlling bridges(CB) and provides uplinks to every bridge port extender(BPE) in the topology. Because of this configuration, multi-chassis link aggregation (MLAG) can be used to provide redundancy to all network users. User access is also provided through an ExtremeSwitching access switch stack. MLAG is also used to provide full redundancy to network access users. ExtremeWireless access points can be connected to Power over Ethernet (PoE) capable BPEs and/or PoE capable stack members. All Extreme Smart OmniEdge virtual appliances; Extreme Management Center, ExtremeControl, ExtremeWireless Controllers, and ExtremeAnalytics are connected to the redundant controlling bridges. These applications are set up to serve the entire school district, while residing in the District Office/School 1. Controlling Bridge 1 and Controlling Bridge 2 also act as traditional switches when they are not interacting with Bridge Port Extenders. In this document, for simplicity reasons, we are referring to them as Controlling Bridge 1 and Controlling Bridge 2 even when they are acting as traditional switches. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 16 Validated Designs – Infrastructure & Topology Note Three other schools are described later in this document. Refer to their specific documentation for further detail about their configurations: • School 2 – Controlling bridges with bridge port extenders only with MLAG redundancy. • School 3 – Controlling bridges with bridge port extenders in a cascaded configuration with MLAG redundancy • School 4 – Standalone ExtremeSwitching access switch with a single uplink and no redundancy. VLANs and Subnets at the District Office Below is list and table grouping VLANs by functionality at the District Office. This functionality includes the following types: • Appliance - VLAN for Extreme Smart OmniEdge Appliances. • Management – Used to communicate with Extreme Smart OmniEdge Appliances and routing protocols. • Remote Site Connectivity- Point-to-point interfaces used for connectivity between the District Office/School 1 and other schools. • Local Site Connectivity - VLAN interfaces used to distribute static and directly interfaces into OSPF and provide OSPF services to the ExtremeWireless controllers. • Bridged at Controller – Used for OSPF adjacency between wireless controllers and the wired school district topology. • ISC – VLAN for the MLAG Interswitch Connection • Access VLAN - VLANs for wired users, wireless users, and networked devices Device VLAN Name Subnet Tag Purpose Controlling Bridge 1 Controlling Bridge 2 Controlling Bridge 1 Controlling Bridge 2 ExtremeXOS Stack Controlling Bridge 1 Controlling Bridge 2 Controlling Bridge 1 Controlling Bridge 2 Controlling Bridge 1 Controlling Bridge 2 Controlling Bridge 1 Controlling Bridge 2 Controlling Bridge 1 Controlling Bridge 2 VLAN_0109 VLAN_0109 Lo0 Lo0 Lo0 VLAN_0101 VLAN_0201 VLAN_0102 VLAN_0202 VLAN_0103 VLAN_0203 VLAN_0104 VLAN_0204 VLAN_0105 VLAN_0205 192.168.109.0/24 192.168.109.0/24 192.168.200.1/32 192.168.200.2/32 192.168.200.8/32 192.168.101.0/30 192.168.201.0/30 192.168.101.4/30 192.168.201.4/30 192.168.101.8/30 192.168.201.8/30 192.168.101.12/30 192.168.201.12/30 192.168.101.16/30 192.168.201.16/30 109 109 1001 1001 1001 101 201 102 202 103 203 104 204 105 205 Appliance Appliance Management Management Management Remote Site Connectivity Remote Site Connectivity Remote Site Connectivity Remote Site Connectivity Remote Site Connectivity Remote Site Connectivity Remote Site Connectivity Remote Site Connectivity Remote Site Connectivity Remote Site Connectivity Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 17 Validated Designs – Infrastructure & Topology Device VLAN Name Subnet Tag Purpose Controlling Bridge 1 Controlling Bridge 2 Controlling Bridge 1 Controlling Bridge 2 ExtremeXOS Stack Controlling Bridge 1 Controlling Bridge 2 Controlling Bridge 1 Controlling Bridge 2 Controlling Bridge 1 Controlling Bridge 2 ExtremeXOS Stack Controlling Bridge 1 Controlling Bridge 2 ExtremeXOS Stack Controlling Bridge 1 Controlling Bridge 2 ExtremeXOS Stack Controlling Bridge 1 Controlling Bridge 2 ExtremeXOS Stack Controlling Bridge 1 Controlling Bridge 2 ExtremeXOS Stack Controlling Bridge 1 Controlling Bridge 2 ExtremeXOS Stack VLAN_0060 192.168.60.0/24 60 Local Site Connectivity VLAN_0059 192.168.59.0/24 59 Local Site Connectivity VLAN_0070 VLAN_0070 vpexmlag 192.168.70.0/30 192.168.70.5/30 169.254.0.0/16 70 70 4089 Bridged at Controller Bridged at Controller ISC VLAN_1600 172.16.0.0/24 1600 Access VLAN VLAN_1900 172.19.128.0/27 1900 Access VLAN VLAN_1901 172.19.0.0/19 1901 Access VLAN VLAN_2200 172.21.0.0/22 2200 Access VLAN VLAN_1700 172.17.0.0/22 1700 Access VLAN VLAN_1800 172.18.0.0/19 1800 Access VLAN Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 18 Validated Designs – Infrastructure & Topology District Office/School 1 – Configuration 1. VPEX Full Automation determines if switches are CB capable and BPEs connected. If conditions are met, VPEX functionality is enabled and CBs are rebooted. 5. VPEX Full Automation enables VPEX Partial Automation. 6. VPEX Partial Automation configures a slot number for each attached BPE, configures the BPE module type, configures CB ports attached to BPEs as VPEX ports, and enables MLAG ports with appropriate port IDs. Bridge Port Extenders MLAGs Redundant Controlling Bridges Controlling Bridge 1 Controlling Bridge 2 2. VPEX Full Automation configures a LAG between CB1. 3. VPEX Full Automation creates and configures an ISC VLAN, add LACP port, and configures IP Interface. 4. VPEX Full Automation creates and configures an MLAG ISC, and configures CBs as peers. Extended Edge with MLAG Configuration In order to take advantage of VPEX Full Automation, the following cabling requirements should be met: • To create an MLAG for ISC CB1 and CB2 should be cabled together: • To enable VPEX mode, the CBs should be cabled to at least one BPE: Once cabled properly, power-on CB1, CB2, BPE1, and BPE2. After the switches finish running VPEX Full Automation and VPEX Partial Automation, verify the CBs have been properly configured and are functioning. Note To better control slot numbering, user may decide to allow the BPEs power on one at a time. If all BPEs are turned on at the same time, there is no mechanism to guarantee slot order. Slot order is determined by which BPE LLDP message is received first by the CBs. VPEX Full Automation and VPEX Partial Automation processes can take eight minutes or longer to complete. Please be patient. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 19 Validated Designs – Infrastructure & Topology 1. Verify VPEX support has been enabled by VPEX Full Automation. Controlling Bridge 1 and 2 Slot-1 VPEX X690-48x-2q-4c.38 # show vpex Virtual Port Extender: Enabled Auto-Configuration: Disabled Cascade Port Slot ============= - Verify VPEX is enabled • Prompt changes indicating VPEX is enabled. • Virtual Port Extender indicates enabled. 2. Verify VPEX Full Automation has created and configured a LAG between CB1 and CB2. Verify LAGs have been configured between the CBs and BPEs. Controlling Bridge 1 and 2 enable sharing 1:49 grouping 1:49,1:53 algorithm address-based custom lacp enable sharing 1:47 grouping 1:47 algorithm address-based custom lacp enable sharing 1:48 grouping 1:48 algorithm address-based custom lacp Controlling Bridge 1 and 2 Verify LACP configuration • Verify Agg MBR = Y • Verify Link State = A Slot-1 VPEX X690-48x-2q-4c.40 # show sharing Load Sharing Monitor Config Current Agg Min Ld Share Dist Ld Share Agg Link Link Up Master Master Control Active Algorithm Flags Group Mbr State Transitions ================================================================================ 1:47 1:47 LACP 1 custom A 1:47 Y A 1 1:48 1:48 LACP 1 custom A 1:48 Y A 2 1:49 1:49 LACP 1 custom A 1:49 Y A 2 custom 1:53 Y A 2 ================================================================================ … 3. Verify VPEX Full Automation has created and configured an ISC VLAN, added CB to CB LACP port, and configured IP interfaces. Controlling Bridge 1 create vlan "vpexmlag" configure vlan vpexmlag tag 4089 configure vlan vpexmlag add ports 1:49 tagged configure vlan vpexmlag ipaddress 169.254.0.1 255.255.0.0 Controlling Bridge 2 create vlan "vpexmlag" configure vlan vpexmlag tag 4089 configure vlan vpexmlag add ports 1:49 tagged configure vlan vpexmlag ipaddress 169.254.0.2 255.255.0.0 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 20 Validated Designs – Infrastructure & Topology Controlling Bridge 1 Slot-1 VPEX X690-48x-2q-4c.42 # show vlan vpexmlag VLAN Interface with name vpexmlag created by user Admin State: Enabled Tagging: 802.1Q Tag 4089 Description: None Virtual router: VR-Default IPv4 Forwarding: Disabled IPv4 MC Forwarding: Disabled Verify VPEX Full Automation Primary IP: 169.254.0.1/16 configured VLAN; • VLAN named vpexmlag created … • IP Address configured for VLAN Ports: 1. (Number of active ports=1) • LAG port added to VLAN. Tag: *1:49g • I Flag confirms ISC VLAN. … Slot-1 VPEX X590-24x-1q-2c.7 # show vlan Untagged ports auto-move: Inform ---------------------------------------------------------------------------------Name VID Protocol Addr Flags Proto Ports Virtual Active router /Total ---------------------------------------------------------------------------------vpexmlag 4089 169.254.0.1 /16 ------I--------------------- ANY 1 /1 Controlling Bridge 2 Slot-1 VPEX X690-48x-2q-4c.60 # show vlan vpexmlag VLAN Interface with name vpexmlag created by user Admin State: Enabled Tagging: 802.1Q Tag 4089 Description: None Virtual router: VR-Default IPv4 Forwarding: Disabled IPv4 MC Forwarding: Disabled Primary IP: 169.254.0.2/16 … Ports: 1. (Number of active ports=1) Tag: *1:49g … Slot-1 VPEX X590-24x-1q-2c.7 # show vlan Untagged ports auto-move: Inform ---------------------------------------------------------------------------------Name VID Protocol Addr Flags Proto Ports Virtual Active router /Total ---------------------------------------------------------------------------------vpexmlag 4089 169.254.0.2 /16 ------I--------------------- ANY 1 /1 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 21 Validated Designs – Infrastructure & Topology 4. Verify VPEX Full Automation has properly created and configured an MLAG which includes configuring the CBs as peers, adding the CB BPE LAGs as MLAG ports, and assigning appropriate MLAG IDs. Controlling Bridge 1 create mlag peer "vpexmlag" configure mlag peer "vpexmlag" ipaddress 169.254.0.2 vr VR-Default enable mlag port 1:47 peer "vpexmlag" id 5100 enable mlag port 1:48 peer "vpexmlag" id 5101 Controlling Bridge 2 create mlag peer "vpexmlag" configure mlag peer "vpexmlag" ipaddress 169.254.0.1 vr VR-Default enable mlag port 1:47 peer "vpexmlag" id 5100 enable mlag port 1:48 peer "vpexmlag" id 5101 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 22 Validated Designs – Infrastructure & Topology Controlling Bridge 1 Slot-1 VPEX X690-48x-2q-4c.46 # # show Multi-switch Link Aggregation Peers: MLAG Peer : VLAN : Local IP Address : MLAG ports : Checkpoint Status : Rx-Hellos : Rx-Checkpoint Msgs: Rx-Hello Errors : Hello Timeouts : Up Time : Local MAC : Config'd LACP MAC : Authentication : 1. Peer name and peer IP address are configured. 2. Local IP address configured. mlag 3. Peerpeer IP address is known. vpexmlag vpexmlag Virtual Router : 169.254.0.1 Peer IP Address : 2 Tx-Interval : Up Peer Tx-Interval : 8346 Tx-Hellos : 1070 Tx-Checkpoint Msgs: 0 Tx-Hello Errors : 0 Checkpoint Errors : 0d:2h:16m:16s Peer Conn.Failures: 4. Checkpoint Status is UPPeer MAC 00:04:96:a4:e8:3e : 5. Hello and Checkpoint Messages incrementing. None Current LACP MAC : 6. Error messages are not incrementing but might None be present. VR-Default 169.254.0.2 1000 ms 1000 ms 8355 3320 0 0 0 00:04:96:a5:05:26 00:04:96:a5:05:26 Alternate path information: None Slot-1 VPEX X690-48x-2q-4c.45 # show mlag ports Local Local Remote MLAG Local Link Remote Peer Fail Fail Id Port State Link Peer Status Count Count ================================================================================ 5100 1:47 A Up vpexmlag Up 0 0 5101 1:48 A Up vpexmlag Up 0 0 ================================================================================ Local Link State: A - Active, D - Disabled, R - Ready, NP - Port not present Remote Link : Up - One or more links are active on the remote switch, Down - No links are active on the remote switch, N/A - The peer has not communicated link state foris Active this MLAG 1. Local Link State 2. Remote Link is UP. port Number of Multi-switch Link Aggregation Groups Convergence control Reload Delay Interval Reload Delay Link Up Isolation Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 : : : : : 3. Peer Status is UP 4. Local and Remote Fail Counts not 2 incrementing. Conserve Access Lists 30 seconds Disabled Off 23 Validated Designs – Infrastructure & Topology Controlling Bridge 2 Slot-1 VPEX X690-48x-2q-4c.62 # show mlag peer Multi-switch Link Aggregation Peers: MLAG Peer : VLAN : Local IP Address : MLAG ports : Checkpoint Status : Rx-Hellos : Rx-Checkpoint Msgs: Rx-Hello Errors : Hello Timeouts : Up Time : Local MAC : Config'd LACP MAC : Authentication : vpexmlag vpexmlag 169.254.0.2 2 Up 8506 3336 0 0 0d:2h:18m:54s 00:04:96:a5:05:26 None None Virtual Router : Peer IP Address : Tx-Interval : Peer Tx-Interval : Tx-Hellos : Tx-Checkpoint Msgs: Tx-Hello Errors : Checkpoint Errors : Peer Conn.Failures: Peer MAC : Current LACP MAC : VR-Default 169.254.0.1 1000 ms 1000 ms 8508 1085 0 0 0 00:04:96:a4:e8:3e 00:04:96:a5:05:26 Alternate path information: None Slot-1 VPEX X690-48x-2q-4c.63 # show mlag ports Local Local Remote MLAG Local Link Remote Peer Fail Fail Id Port State Link Peer Status Count Count ================================================================================ 5100 1:47 A Up vpexmlag Up 0 0 5101 1:48 A Up vpexmlag Up 0 0 ================================================================================ Local Link State: A - Active, D - Disabled, R - Ready, NP - Port not present Remote Link : Up - One or more links are active on the remote switch, Down - No links are active on the remote switch, N/A - The peer has not communicated link state for this MLAG port Number of Multi-switch Link Aggregation Groups Convergence control Reload Delay Interval Reload Delay Link Up Isolation Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 : : : : : 2 Conserve Access Lists 30 seconds Disabled Off 24 Validated Designs – Infrastructure & Topology 5. Verify VPEX Full Automation has enabled VPEX Partial Automation. Controlling Bridge 1 and 2 enable vpex auto-configuration Controlling Bridge 1 and 2 Slot-1 VPEX X690-48x-2q-4c.50 # show vpex Virtual Port Extender: Enabled Auto-Configuration: Enabled Cascade Port Slot ============= - Verify Auto-Configuration is enabled • Auto-Configuration indicator indicates enabled. 6. Verify the VPEX Partial Automation properly configures VPEX slots. Controlling Bridge 1 configure configure configure configure slot 100 module V400-24p-10GE2 sys-recovery-level slot 100 reset slot 101 module V400-24t-10GE2 sys-recovery-level slot 101 reset configure vpex port 1:47 slot 100 configure vpex port 1:48 slot 101 Controlling Bridge 2 configure configure configure configure slot 100 module V400-24p-10GE2 sys-recovery-level slot 100 reset slot 101 module V400-24t-10GE2 sys-recovery-level slot 101 reset configure vpex port 1:47 slot 100 configure vpex port 1:48 slot 101 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 25 Validated Designs – Infrastructure & Topology Controlling Bridge 1 Slot-1 VPEX X690-48x-2q-4c.52 # show vpex bpe 1. Module type configured. 2. Verify Port State is Enabled 3. Verify Link Sate is Active Casc PE Slot Port Model MAC Address Description ====================================================================================== =========================== 100 1:47 V400-24p-10GE2 d8:84:66:f2:af:f6 none 101 1:48 V400-24t-10GE2 d8:84:66:f2:e9:52 none Slot-1 VPEX X690-48x-2q-4c.53 # show vpex ports Port Cascade Ext Port Link PECSP PE CSPOpen CSP Role # Port Slot State State MAC Address MAC Address Loc Rem Flags ====================================================================================== ===== 1:47 1:47 100 E A d8:84:66:f2:b0:0f d8:84:66:f2:af:f6 1 1 1:48 1:48 101 E A d8:84:66:f2:e9:6b d8:84:66:f2:e9:52 1 1 ====================================================================================== ===== … Controlling Bridge 2 Verify MAC addresses for BPEs match on both CBs. Slot-1 VPEX X690-48x-2q-4c.70 # show vpex bpe Casc PE Slot Port Model MAC Address Description ====================================================================================== =========================== 100 1:47 V400-24p-10GE2 d8:84:66:f2:af:f6 none 101 1:48 V400-24t-10GE2 d8:84:66:f2:e9:52 none Slot-1 VPEX X690-48x-2q-4c.71 # show vpex ports Port Cascade Ext Port Link PECSP PE CSPOpen CSP Role # Port Slot State State MAC Address MAC Address Loc Rem Flags ====================================================================================== ===== 1:47 1:47 100 E A d8:84:66:f2:b0:0f d8:84:66:f2:af:f6 1 1 1:48 1:48 101 E A d8:84:66:f2:e9:6b d8:84:66:f2:e9:52 1 1 ====================================================================================== ===== … Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 26 Validated Designs – Infrastructure & Topology 7. Manually delete all ports from default VLAN, disable MSTP, and free up ACL resources. 8. Manually configure a loopback interface for routing and device management. 9. Manually configure a base OSPF configuration. 10. Manually configure VLAN for local site connectivity. 11. Manually configure VLAN for SmartOmniEdge Appliances 12. Manually configure VRRP for local site connectivity and SmartOmniEdge appliance VLANs. 13. Manually configure OSPF for local site connectivity and SmartOmniEdge appliance VLANs. Bridge Port Extenders MLAGs Redundant Controlling Bridges Controlling Bridge 1 Controlling Bridge 2 7. Remove ports from Default VLAN, disable MSTP, and free up ACL resources. The default VLAN will not be needed for this EVD so all ports will be removed from the VLAN. Because of this MSTP instance s0 will also be disabled. Controlling Bridge 1 and 2 configure configure configure configure vlan default delete ports all vr VR-Default delete ports 1:1-36,100:1-52,101:1-26 vr VR-Default add ports 1:1-36,100:1-52,101:1-26 vlan default delete ports 1:1-36,100:1-52,101:1-26 disable stpd s0 configure policy resource-profile default profile-modifier no-mac enable no-ipv6 enable Controlling Bridge 1 and 2 Slot-1 VPEX X690-48x-2q-4c.8 # show stpd s0 Stpd: s0 Stp: DISABLED Number of Ports: 0 Rapid Root Failover: Disabled Operational Mode: MSTP Default Binding Mode: 802.1D MSTI Instance: CIST 802.1Q Tag: (none) Ports: (none) Participating Vlans: (none) Verify the following STP variables for s0 Auto-bind Vlans: Default • STP is disabled • No Ports participating in STP … • No VLANs participating in STP Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 27 Validated Designs – Infrastructure & Topology 8. Configure Loopback VLAN and Interface The internal loopback interface serves as the primary interface for in-band management in this topology. It also serves as the interface between the Extreme Network appliances and the devices. Controlling Bridge 1 create vlan "lo0" configure vlan lo0 tag 1001 enable loopback-mode vlan lo0 configure vlan lo0 ipaddress 192.168.200.1 255.255.255.255 enable ipforwarding vlan lo0 Controlling Bridge 2 Configuring a system loopback interface involves creating a VLAN with a tag and enabled for the following IP services: loopback mode and IP forwarding. Loopback interface is configured with a /32 subnet mask. create vlan "lo0" configure vlan lo0 tag 1001 enable loopback-mode vlan lo0 configure vlan lo0 ipaddress 192.168.200.2 255.255.255.255 enable ipforwarding vlan lo0 9. Configure OSPF Base Configuration With the creation of the loopback interface, now is an appropriate time to create the base configuration for OSPF routing. OSPF will redistribute any directly connected interfaces and static routes into the routing table. This will be more critical later when remote schools are attached to the topology. Controlling Bridge 1 configure ospf routerid 192.168.200.1 enable ospf enable ospf export direct cost 0 type ase-type-1 enable ospf export static cost 0 type ase-type-1 configure ospf add vlan lo0 area 0.0.0.0 The loopback interface created in the previous step is configured as the OSPF Router-ID. Loopback interfaces is added to area 0.0.0.0 Controlling Bridge 2 configure ospf routerid 192.168.200.2 enable ospf enable ospf export direct cost 0 type ase-type-1 enable ospf export static cost 0 type ase-type-1 configure ospf add vlan lo0 area 0.0.0.0 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 28 Validated Designs – Infrastructure & Topology 10. Configure VLAN and Interface for Local Site Connectivity on controlling bridges. Configure two VLANs for local site connectivity on the controlling bridges These VLANs are used to redistribute directly connected and static routes into OSPF. They are also used by APs for connectivity to the wireless controllers. Controlling Bridge 1 Configure local-site VLANs VLAN_0060 and create vlan "VLAN_0060" VLAN_0059 with; configure vlan VLAN_0060 description "VPEX DO/SC1 Local Site Connectivity" 1. VLAN Descriptions 2. VLAN Tag configure vlan VLAN_0060 tag 60 3. LACP trunk port Added to VLAN configure vlan VLAN_0060 add ports 1:49 tagged 4. IP Address Configured configure vlan VLAN_0060 ipaddress 192.168.60.2 255.255.255.0 5. IP Forwarding Enabled for unicast routing enable ipforwarding vlan VLAN_0060 6. BOOTP Relay Enabled for DHCP enable bootprelay ipv4 vlan VLAN_0060 7. Iproute Sharing (ECMP) enable iproute sharing vr VR-Default create vlan "VLAN_0059" configure vlan VLAN_0059 description "Stack DO/SC1 Local Site Connectivity" configure vlan VLAN_0059 tag 59 configure vlan VLAN_0059 add ports 1:49 tagged configure vlan VLAN_0059 ipaddress 192.168.59.2 255.255.255.0 enable ipforwarding vlan VLAN_0059 enable bootprelay ipv4 vlan VLAN_0059 Controlling Bridge 2 create vlan "VLAN_0060" configure vlan VLAN_0060 description "VPEX DO/SC1 Local Site Connectivity" configure vlan VLAN_0060 tag 60 configure vlan VLAN_0060 add ports 1:49 tagged configure vlan VLAN_0060 ipaddress 192.168.60.3 255.255.255.0 enable ipforwarding vlan VLAN_0060 enable bootprelay ipv4 vlan VLAN_0060 enable iproute sharing vr VR-Default create vlan "VLAN_0059" configure vlan VLAN_0059 description "Stack DO/SC1 Local Site Connectivity" configure vlan VLAN_0059 tag 59 configure vlan VLAN_0059 add ports 1:49 tagged configure vlan VLAN_0059 ipaddress 192.168.59.3 255.255.255.0 enable ipforwarding vlan VLAN_0059 enable bootprelay ipv4 vlan VLAN_0059 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 29 Validated Designs – Infrastructure & Topology At the prompt issue show vlan VLAN_0060 (output truncated) and verify: Controlling Bridge 1 Slot-1 VPEX X690-48x-2q-4c.39 # show vlan VLAN_0060 VLAN Interface with name VLAN_0060 created by user Admin State: Enabled Tagging: 802.1Q Tag 60 Description: VPEX DO/SC1 Local Site Connectivity Virtual router: VR-Default IPv4 Forwarding: Enabled IPv4 MC Forwarding: Disabled Primary IP: 192.168.60.2/24 … Ports: 1. (Number of active ports=1) Tag: *1:49g … Slot-1 VPEX X690-48x-2q-4c.99 # show vlan VLAN_0059 VLAN Interface with name VLAN_0059 created by user Admin State: Enabled Tagging: 802.1Q Tag 59 Description: Stack DO/SC1 Local Site Connectivity Virtual router: VR-Default IPv4 Forwarding: Enabled IPv4 MC Forwarding: Disabled Primary IP: 192.168.59.2/24 … Ports: 1. (Number of active ports=2) Tag: *1:49g … Verify the following items: 1. VLAN Name, State and Tag 2. VLAN Description 3. LACP trunk port Added to VLAN 4. IP Address Configured 5. IP Forwarding Enabled for unicast routing Controlling Bridge 2 Slot-1 VPEX X690-48x-2q-4c.36 # show vlan VLAN_0060 VLAN Interface with name VLAN_0060 created by user Admin State: Enabled Tagging: 802.1Q Tag 60 Description: VPEX DO/SC1 Local Site Connectivity Virtual router: VR-Default IPv4 Forwarding: Enabled IPv4 MC Forwarding: Disabled Primary IP: 192.168.60.3/24 … Ports: 1. (Number of active ports=1) Tag: *1:49g … Slot-1 VPEX X690-48x-2q-4c.69 # show vlan VLAN_0059 VLAN Interface with name VLAN_0059 created by user Admin State: Enabled Tagging: 802.1Q Tag 59 Description: None Virtual router: VR-Default IPv4 Forwarding: Enabled IPv4 MC Forwarding: Disabled Primary IP: 192.168.59.3/24 … Ports: 1. (Number of active ports=2) Tag: *1:49g … Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 30 Validated Designs – Infrastructure & Topology 11. Configure and Interface for SmartOmniEdge Appliances on controlling bridges. Configure two VLANs for local site connectivity on the controlling bridges. These VLANs are used to redistribute directly connected and static routes into OSPF. They are also used by APs for connectivity to the wireless controllers. Controlling Bridge 1 create vlan "VLAN_0109" configure vlan VLAN_0109 description "SmartOmniEdge Appliances" configure vlan VLAN_0109 tag 109 configure vlan VLAN_0109 add ports 1:49 tagged configure vlan VLAN_0109 add ports 1:9,1:11,1:13,1:15,1:17,1:19 configure vlan VLAN_0109 ipaddress 192.168.109.2 255.255.255.0 enable ipforwarding vlan VLAN_0109 enable bootprelay ipv4 vlan VLAN_0109 Configure local-site VLANs VLAN_0060 and VLAN_0059 with; 1. VLAN Descriptions 2. VLAN Tag 3. LACP trunk port Added to VLAN 4. SmartOmniEdge Appl Ports added to VLAN 5. IP Address Configured 6. IP Forwarding Enabled for unicast routing 7. BOOTP Relay Enabled for DHCP untagged 8. Iproute Sharing (ECMP) Controlling Bridge 2 create vlan "VLAN_0109" configure vlan VLAN_0109 description "SmartOmniEdge Appliances" configure vlan VLAN_0109 tag 109 configure vlan VLAN_0109 add ports 1:49 tagged configure vlan VLAN_0109 add ports 1:9,1:11,1:13,1:15,1:17,1:19 untagged configure vlan VLAN_0109 ipaddress 192.168.109.3 255.255.255.0 enable ipforwarding vlan VLAN_0109 enable bootprelay ipv4 vlan VLAN_0109 At the prompt issue show vlan VLAN_0109 (output truncated) and verify: Controlling Bridge 1 Slot-1 VPEX X690-48x-2q-4c.39 # show vlan VLAN_0109 VLAN Interface with name VLAN_0109 created by user Admin State: Enabled Tagging: 802.1Q Tag 109 Description: SmartOmniEdgeAppliances Virtual router: VR-Default IPv4 Forwarding: Enabled IPv4 MC Forwarding: Disabled Primary IP: 192.168.109.2/24 … Ports: 7. (Number of active ports=1) Untag: *1:9, *1:11, *1:13, *1:15, *1:17, *1:19 Tag: *1:49g … Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 Verify the following items: 1. VLAN Name, State and Tag 2. VLAN Description 3. LACP trunk port Added to VLAN 4. SmartOmniEdge Appl ports added to VLAN 5. IP Address Configured 6. IP Forwarding Enabled for unicast routing 31 Validated Designs – Infrastructure & Topology Controlling Bridge 2 Slot-1 VPEX X690-48x-2q-4c.39 # show vlan VLAN_0109 VLAN Interface with name VLAN_0109 created by user Admin State: Enabled Tagging: 802.1Q Tag 109 Description: SmartOmniEdgeAppliances Virtual router: VR-Default IPv4 Forwarding: Enabled IPv4 MC Forwarding: Disabled Primary IP: 192.168.109.3/24 … Ports: 7. (Number of active ports=1) Untag: *1:9, *1:11, *1:13, *1:15, *1:17, *1:19 Tag: *1:49g … 12. Configure VRRP on Local Site Connectivity and SmartOmniEdge VLANs on the controlling bridges. Configure VRRP for the VLAN to provide the ExtremeWireless IdentiFi APs a common gateway to reach the ExtremeWireless Controllers. Controlling Bridge 1 create vrrp vlan VLAN_0060 vrid 60 configure vrrp vlan VLAN_0060 vrid 60 priority 254 configure vrrp vlan VLAN_0060 vrid 60 fabric-routing on configure vrrp vlan VLAN_0060 vrid 60 add 192.168.60.1 enable vrrp vlan VLAN_0060 vrid 60 create vrrp vlan VLAN_0059 vrid 59 configure vrrp vlan VLAN_0059 vrid 59 fabric-routing on configure vrrp vlan VLAN_0059 vrid 59 add 192.168.59.1 enable vrrp vlan VLAN_0059 vrid 59 VRRP instance ID for VLAN_0060 Priority is configured to make master election more reliable. Fabric-routing is enabled so that packets don’t have to be routed through the VRRP master if a more direct route exists on the receiving interface The VRRP virtual IP address create vrrp vlan VLAN_0109 vrid 1 configure vrrp vlan VLAN_0109 vrid 1 priority 254 configure vrrp vlan VLAN_0109 vrid 1 fabric-routing on configure vrrp vlan VLAN_0109 vrid 1 add 192.168.109.1 enable vrrp vlan VLAN_0109 vrid 1 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 32 Validated Designs – Infrastructure & Topology Controlling Bridge 2 create vrrp vlan VLAN_0060 vrid 60 configure vrrp vlan VLAN_0060 vrid 60 fabric-routing on configure vrrp vlan VLAN_0060 vrid 60 add 192.168.60.1 enable vrrp vlan VLAN_0060 vrid 60 create vrrp vlan VLAN_0059 vrid 59 configure vrrp vlan VLAN_0059 vrid 59 priority 254 configure vrrp vlan VLAN_0059 vrid 59 fabric-routing on configure vrrp vlan VLAN_0059 vrid 59 add 192.168.59.1 enable vrrp vlan VLAN_0059 vrid 59 create vrrp vlan VLAN_0109 vrid 1 configure vrrp vlan VLAN_0109 vrid 1 fabric-routing on configure vrrp vlan VLAN_0109 vrid 1 add 192.168.109.1 enable vrrp vlan VLAN_0109 vrid 1. At the prompt, issue show vrrp and verify vlan VLAN_0059, VLAN_0060, and VLAN_0109 configuration. Controlling Bridge 1 Slot-1 VPEX X690-48x-2q-4c.46 # show vrrp Virtual VLAN Name VRID Pri IP Address State VLAN_01(En) 0001 254 192.168.109.1 MSTR VLAN_00(En) 0060 254 192.168.60.1 MSTR VLAN_00(En) 0059 100 192.168.59.1 BKUP FR value must be Y on both VRRP master and backup Master MAC Address TP/TR/TV/P/T 00:00:5e:00:01:01 0 0 0 Y 1 00:00:5e:00:01:3c 0 0 0 Y 1 00:00:5e:00:01:3b 0 0 0 Y 1 /FR/G/HM Y N N Y N N Y N N En-Enabled, Ds-Disabled, Pri-Priority, T-Advert Timer, P-Preempt TP-Tracked Pings, TR-Tracked Routes, TV-Tracked VLANs, FR-Fabric Routing, G-Group, HM-Host Mobility … Controlling Bridge 2 The switch with the highest priority has MSTR state and the other one BKUP. Slot-1 VPEX X690-48x-2q-4c.41 # show vrrp Virtual Master VLAN Name VRID Pri IP Address State MAC Address TP/TR/TV/P/T VLAN_01(En) 0001 100 192.168.109.1 BKUP 00:00:5e:00:01:01 0 0 0 Y 1 VLAN_00(En) 0060 100 192.168.60.1 BKUP 00:00:5e:00:01:3c 0 0 0 Y 1 VLAN_00(En) 0059 254 192.168.59.1 MSTR 00:00:5e:00:01:3b 0 0 0 Y 1 En-Enabled, Ds-Disabled, Pri-Priority, T-Advert Timer, P-Preempt TP-Tracked Pings, TR-Tracked Routes, TV-Tracked VLANs, FR-Fabric Routing, G-Group, HM-Host Mobility … Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 /FR/G/HM Y N N Y N N Y N N 33 Validated Designs – Infrastructure & Topology 13. Configure OSPF Local Site Connectivity and SmartOmniEdge Appliance VLANs This interface will serve as the main routing aggregation point for all the user access VLANs. Therefore, it is very important that this interface has OSPF enabled. Controlling Bridge 1 configure ospf add vlan VLAN_0060 area 0.0.0.0 configure ospf vlan VLAN_0060 authentication encrypted md5 60 "#$9PzYK114lHuHzjGF1Dvl3GEu5uSEUA==" Connectivity VLANs added to area 0.0.0.0 MD5 Authentication was enabled to provide added security between OSPF adjacencies. configure ospf add vlan VLAN_0059 area 0.0.0.0 configure ospf vlan VLAN_0059 authentication encrypted md5 59 configure ospf add vlan VLAN_0109 area 0.0.0.0 configure ospf vlan VLAN_0109 authentication encrypted md5 109 "#$R0wiC0z7m+x9uimpk+s9Wze72v0JAg==" Controlling Bridge 2 configure ospf add vlan VLAN_0060 area 0.0.0.0 configure ospf vlan VLAN_0060 authentication encrypted md5 60 "#$UUFVAm9buaJUoNv0+9+SKU+c3RlK1A==" configure ospf add vlan VLAN_0059 area 0.0.0.0 configure ospf vlan VLAN_0059 authentication encrypted md5 59 configure ospf add vlan VLAN_0109 area 0.0.0.0 configure ospf vlan VLAN_0109 authentication encrypted md5 109 "#$lGsOEPnc72kkt/Xg8hKXwX0GAQQwrw==" Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 34 Validated Designs – Infrastructure & Topology At the prompt, issue show ospf neighbor (output truncated). Verify that routers see each other and that the state is FULL with MD5 encryption enabled. Controlling Bridge 1 Slot-1 VPEX X690-48x-2q-4c.53 # show ospf neighbor Adjacency state between neighbors should be Neighbor ID Pri State Up/Dead Time Address Full. OSPF router state should be DR or BDR. Interface BFD Session State ====================================================================================== ==== 192.168.200.2 1 FULL /DR 00:00:01:40/00:00:00:00 192.168.59.3 VLAN_0059 None 192.168.200.2 VLAN_0060 None 1 FULL /DR 00:00:01:52/00:00:00:02 192.168.60.3 192.168.200.2 VLAN_0109 None … 1 FULL /DR 00:03:46:48/00:00:00:08 192.168.109.3 Controlling Bridge 2 Slot-1 VPEX X690-48x-2q-4c.48 # show ospf neighbor Neighbor ID Pri State Up/Dead Time Address Interface BFD Session State ====================================================================================== ==== 192.168.200.1 1 FULL /BDR 00:00:01:46/00:00:00:01 192.168.59.2 VLAN_0059 None 192.168.200.1 VLAN_0060 None 1 FULL /BDR 00:00:01:58/00:00:00:02 192.168.60.2 192.168.200.1 VLAN_0109 None … 1 FULL /BDR 00:03:47:43/00:00:00:03 192.168.109.2 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 35 Validated Designs – Infrastructure & Topology ExtremeXOS Stacking Edge Configuration This document will not describe the procedure for creating an ExtremeXOS stack. This information can be found in existing GTAC Knowledgebase documentation at How to Create a Stack with ExtremeSwitching. Once the stack is configured, the process connecting to the Controlling Bridges is similar physically to connecting the virtual port extenders, but quite different operationally. In this case, there is no CB and BPE relationship. Any configurations will need to be executed on both the stack and the CBs. ExtremeXOS Stack 4. On stack remove all ports from default VLAN. 5. On stack disable policy for IPv6 and MAC. 6. Disable spanning tree. Bridge Port Extenders 1. LACP enabled on CBs and stack ports. MLAGs Redundant Controlling Bridges Controlling Bridge 1 Controlling Bridge 2 2. On CBs, add LACP port to Local Site VLAN. 3. On CBs, add LACP ports to MLAG configuration. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 36 Validated Designs – Infrastructure & Topology 1. Connecting the ExtremeSwitching Stack to the CBs with MLAG The stack will use the previously configured MLAG ISC. There is no need to create a new one. Unlike the Extended Edge solution, LACP will need to be enabled on the ExtremeSwitching Stack. A LAG will not form between the CBs and the ExtremeSwitching stack automatically. The last step is to configure a new MLAG peer ID when connecting as an MLAG. When complete, the configuration should look similar to the one below: Controlling Bridge 1 1. On each CB configure uplink to Stack with LACP. 2. Enable MLG on LACP port and assign unique ID. enable sharing 1:45 grouping 1:45 algorithm address-based L2 lacp enable mlag port 1:45 peer "vpexmlag" id 1965 Controlling Bridge 2 enable sharing 1:45 grouping 1:45 algorithm address-based L2 lacp enable mlag port 1:45 peer "vpexmlag" id 1965 ExtremeSwitching Stack Create a two port LACP LAG with each physical link going to each X690 switch. enable sharing 1:51 grouping 1:51,2:51 algorithm address-based L2 lacp At the prompt issue show sharing and verify: Controlling Bridge 1 On both X690 switches, verify ports are LACP members and the Link State is active. Slot-1 VPEX X690-48x-2q-4c.26 # show sharing Load Sharing Monitor Config Current Agg Min Ld Share Dist Ld Share Agg Link Link Up Master Master Control Active Algorithm Flags Group Mbr State Transitions ================================================================================ 1:45 1:45 LACP 1 L2 A 1:45 Y A 0 ================================================================================ … Note During these manual configuration steps, the user can choose to utilize mlag orchestration mode. This mode can be helpful to configure the exact same commands on both CBs. However, do not use this feature for configurations which need to be unique on CBs such as IP addresses, VRRP configurations, and OSPF configurations. To enable this mode, refer to mlag orchestration mode operation on Page 16. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 37 Validated Designs – Infrastructure & Topology Controlling Bridge 2 Slot-1 VPEX X690-48x-2q-4c.18 # show sharing Load Sharing Monitor Config Current Agg Min Ld Share Dist Ld Share Agg Link Link Up Master Master Control Active Algorithm Flags Group Mbr State Transitions ================================================================================ 1:45 1:45 LACP 1 L2 A 1:45 Y A 0 ================================================================================ On the ExtremeSwitching stack, verify a single LACP LAG with members each going to separate X690 switches. Verify that the Link State is active. ExtremeSwitching Stack Slot-1 Stack.5 # show sharing Load Sharing Monitor Config Current Agg Min Ld Share Dist Ld Share Agg Link Link Up Master Master Control Active Algorithm Flags Group Mbr State Transitions ================================================================================ 1:51 1:51 LACP 1 L2 A 1:51 Y A 1 L2 2:51 Y A 1 ================================================================================ 2. Remove ports from Default VLAN, disable MSTP, and free up ACL resources. The default VLAN will not be needed for this EVD so all ports will be removed from the VLAN. Because of this MSTP instance, s0 will also be disabled. Controlling Bridge 1 and 2 configure configure configure configure vlan default delete ports all vr VR-Default delete ports 1:1-52,2:1-52,3:1-52,4:1-52 vr VR-Default add ports 1:1-52,2:1-52,3:1-52,4:1-52 vlan default delete ports 1:1-52,2:1-52,3:1-52,4:1-52 disable stpd s0 configure policy resource-profile default profile-modifier no-mac enable no-ipv6 enable Controlling Bridge 1 and 2 Slot-1 Stack.51 # show stpd s0 Stpd: s0 Stp: DISABLED Rapid Root Failover: Disabled Operational Mode: MSTP MSTI Instance: CIST 802.1Q Tag: (none) Ports: (none) Participating Vlans: (none) Auto-bind Vlans: Default … Number of Ports: 0 Default Binding Mode: 802.1D Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 Verify the following STP variables for s0 • STP is disabled • No Ports participating in STP • No VLANs participating in STP 38 Validated Designs – Infrastructure & Topology Wired User Access All access VLANs offer redundancy to the network with the use of configured VRRP gateways. All users’ credentials are authenticated using authentication to ExtremeControl and RADIUS. The following VLAN types are available at the District Office/School 1: The Guest_Wired VLAN gives guest users access to the District Office/School 1. This VLAN will be configured at all schools. This access layer VLAN is typically the most restrictive of all VLANs. The Admin VLAN provides access layer connectivity to networks administrators. These users will be assigned an Admin role by Extreme Policy Manger and ExtremeControl. This access layer VLAN is typically the least restrictive of the access VLANs. The NonAdmin_Wired VLAN provides access layer connectivity to other authorized users. These users will be assigned a Student or Faculty role by Extreme Policy Manger and ExtremeControl. Roles can be more granular than the ones presented here. Most users will access the school district network through this VLAN. The Network_Devices VLAN provides access layer connectivity to common network devices such as printers, VoIP phones, and security cameras. 1. Configure four wired user access VLANs on X690 switches. 2. Configure four wired AP/user access VLANs on ExtremeSwitching stack. 3. Extended Local-Site VLAN_0059 to the stack. 4. Configure all user access ports to Guest_Wired PVID. ExtremeXOS Stack Bridge Port Extenders 6. Configure Loopback interface on ExtremeSwitching stack. 7. Configure static routes between the stack and X690 switches. MLAGs Redundant Controlling Bridges Controlling Bridge 1 Controlling Bridge 2 5. Configure IP Address and IP Services on wired User Access VLANs. 8. Configure VRRP on X690 switches for user access VLANs. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 39 Validated Designs – Infrastructure & Topology The process of adding an access VLAN to the CB/BPE topology involves several steps. First the user creates the access VLAN and tag on the CBs. After the VLAN is created the Local Site trunk port and MLAG ports are added as tag members of the access VLAN. Routing functionality will be configured including IP address, VRRP for a common gateway, and IP forwarding. For the ExtremeSwitching stack, the layer 2 configuration is also configured on the stack – not just on the CBs. This includes creating the VLAN with a tag and adding the MLAG port to the VLAN. Note During these manual configuration steps, the user can choose to utilize mlag orchestration mode. This mode can be helpful to configure the exact same commands on both CBs. However, do not use this feature for configurations which need to be unique on CBs such as IP addresses, VRRP configurations, and OSPF configurations. To enable this mode, refer to mlag orchestration mode operation on Page 16. 1. Configure four access VLAN and assign ports. Controlling Bridge 1 create vlan "VLAN_1900" configure vlan VLAN_1900 description "Wired Guest VLAN" configure vlan VLAN_1900 tag 1900 configure vlan VLAN_1900 add ports 1:45,1:49 tagged Four Wired Access VLANs created. Add LACP Trunk Port and created LACP Port to Stack to VLANs. create vlan "VLAN_1600" configure vlan VLAN_1600 description "Administrator Access VLAN" configure vlan VLAN_1600 tag 1600 configure vlan VLAN_1600 add ports 1:45,1:49 tagged create vlan "VLAN_2200" configure vlan VLAN_2200 description "Network Devices Access VLAN" configure vlan VLAN_2200 tag 2200 configure vlan VLAN_2200 add ports 1:45,1:49 tagged create vlan "VLAN_1700" configure vlan VLAN_1700 description "Wired Non Administrator Access VLAN" configure vlan VLAN_1700 tag 1700 configure vlan VLAN_1700 add ports 1:45,1:49 tagged Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 40 Validated Designs – Infrastructure & Topology Controlling Bridge 2 create vlan "VLAN_1900" configure vlan VLAN_1900 description "Wired Guest VLAN" configure vlan VLAN_1900 tag 1900 configure vlan VLAN_1900 add ports 1:45,1:49 tagged create vlan "VLAN_1600" configure vlan VLAN_1600 description "Administrator Access VLAN" configure vlan VLAN_1600 tag 1600 configure vlan VLAN_1600 add ports 1:45,1:49 tagged create vlan "VLAN_2200" configure vlan VLAN_2200 description "Network Devices Access VLAN" configure vlan VLAN_2200 tag 2200 configure vlan VLAN_2200 add ports 1:45,1:49 tagged create vlan "VLAN_1700" configure vlan VLAN_1700 description "Wired Non Administrator Access VLAN" configure vlan VLAN_1700 tag 1700 configure vlan VLAN_1700 add ports 1:45,1:49 tagged ExtremeSwitching Stack create vlan "VLAN_1900" configure vlan VLAN_1900 description "Wired Guest VLAN" configure vlan VLAN_1900 tag 1900 configure vlan VLAN_1900 add ports 1:51 tagged Four Wired Access VLANs created. Add created LACP ports to VLANs. create vlan "VLAN_1600" configure vlan VLAN_1600 description "Administrator Access VLAN" configure vlan VLAN_1600 tag 1600 configure vlan VLAN_1600 add ports 1:51 tagged create vlan "VLAN_2200" configure vlan VLAN_2200 description "Network Devices Access VLAN" configure vlan VLAN_2200 tag 2200 configure vlan VLAN_2200 add ports 1:51 tagged create vlan "VLAN_1700" configure vlan VLAN_1700 description "Wired Non Administrator Access VLAN" configure vlan VLAN_1700 tag 1700 A fifth VLAN is extended from the X690 configure vlan VLAN_1700 add ports 1:51 tagged switches to ExtremeSwitching stack for Layer 3 connectivity to the rest of the topology. create vlan "VLAN_0059" configure vlan VLAN_0059 description "Stack DO/SC1 Local Site Connectivity" configure vlan VLAN_0059 tag 59 configure vlan VLAN_0059 add ports 1:51 tagged Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 41 Validated Designs – Infrastructure & Topology After creating VLANs, any port to be used for user access should be configured to have a PVID of Guest_Wired as the native VLAN. When complete, the configuration should look similar to the one below: Controlling Bridge 1 All wired access ports are added to the Guest_Wired VLAN as untagged (PVID). configure vlan VLAN_1900 add ports 1:1-6,1:8,1:10,1:12,1:14,1:16,1:18,1:2044,1:46,1:51-52,1:54-56,1:58-72,100:1-24,101:1-24 untagged Controlling Bridge 2 configure vlan VLAN_1900 add ports 1:1-8,1:10,1:12,1:14,1:16,1:18,1:20-44,1:46,1:5052,1:54-56,1:58-72,100:1-24,101:1-24 untagged ExtremeSwitching Stack configure vlan VLAN_1900 add ports add ports 1:1-50,1:52,2:1-50,2:52,3:1-52,4:1-52 untagged Caution When assigning PVID of access ports to Guest_Wired, use caution that previously configured ports are not reconfigured. These ports might include the following: • Local Site LACP Trunk Port • Uplink ports between Controlling Bridges and Bridge Port Extenders • Uplink ports between the Controlling Bridges and the ExtremeSwitching stack • Controlling Bridge ports used for ExtremeWireless Appliance controller, Windows Server Backup Services. 2. Configure Access VLAN Interface and other routing services. Controlling Bridge 1 configure vlan VLAN_1900 ipaddress 172.19.128.2 255.255.255.224 enable ipforwarding vlan VLAN_1900 enable bootprelay ipv4 vlan VLAN_1900 configure vlan VLAN_1600 ipaddress 172.16.0.2 255.255.255.0 enable ipforwarding vlan VLAN_1600 enable bootprelay ipv4 vlan VLAN_1600 1. IP interface for four Wired Access VLANs configured. 2. IP Forwarding and BootP Relay enabled. configure vlan VLAN_1700 ipaddress 172.17.0.2 255.255.252.0 enable ipforwarding vlan VLAN_1700 enable bootprelay ipv4 vlan VLAN_1700 configure vlan VLAN_2200 ipaddress 172.21.0.2 255.255.252.0 enable ipforwarding vlan VLAN_2200 enable bootprelay ipv4 vlan VLAN_2200 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 42 Validated Designs – Infrastructure & Topology Controlling Bridge 2 configure vlan VLAN_1900 ipaddress 172.19.128.3 255.255.255.224 enable ipforwarding vlan VLAN_1900 enable bootprelay ipv4 vlan VLAN_1900 configure vlan VLAN_1600 ipaddress 172.16.0.3 255.255.255.0 enable ipforwarding vlan VLAN_1600 enable bootprelay ipv4 vlan VLAN_1600 configure vlan VLAN_1700 ipaddress 172.17.0.3 255.255.252.0 enable ipforwarding vlan VLAN_1700 enable bootprelay ipv4 vlan VLAN_1700 configure vlan VLAN_2200 ipaddress 172.21.0.3 255.255.252.0 enable ipforwarding vlan VLAN_2200 enable bootprelay ipv4 vlan VLAN_2200 3. Configure Layer-3 Access to ExtremeSwitching-Stack Currently, the stack has no Layer-3 connectivity to the District Office. This section will set up that connectivity. ExtremeSwitching Stack configure vlan VLAN_0059 ipaddress 192.168.59.254 255.255.255.0 enable ipforwarding vlan VLAN_0059 enable bootprelay ipv4 vlan VLAN_0059 1. Configure an IP address on the VLAN that was configured for Layer-3 connectivity. 2. Configure IP services ipforwarding and bootprelay. 3. Configure a default static route utilizing previously configured VRRP virtual gateway. configure iproute add default 192.168.59.1 The next step is to configure a loopback interface on the ExtremeSwitching stack for management from the ExtremeWireless Appliances Controller and enable IP forwarding. When complete, the configuration should look similar to the one below: ExtremeSwitching Stack create vlan "lo0" configure vlan lo0 tag 1008 enable loopback-mode vlan lo0 configure vlan lo0 ipaddress 192.168.200.8 255.255.255.255 1. Configure a loopback address for Extreme Management Center management. 2. Enable IP forwarding. enable ipforwarding lo0 The final step is to configure a static route to the ExtremeSwitching stack from the CBs. This static route will later be redistributed to OSPF for accessibility from the other schools. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 43 Validated Designs – Infrastructure & Topology When complete, the configuration should look similar to the one below: Controlling Bridge 1 configure iproute add 192.168.200.8 255.255.255.255 192.168.59.254 Configure a static route to ExtremeSwitching stack Loopback Interface using the L3-connectivity VLAN ExtremeSwitching stack IP address as the gateway. Controlling Bridge 2 configure iproute add 192.168.200.8 255.255.255.255 192.168.59.254 At the prompt for the stack, issue show vlan VLAN_0059 and verify. ExtremeSwitching Stack Verify that VLAN0059 has been extended to the ExtremeSwitching stack. Slot-1 Stack.24 # show VLAN_0059 VLAN Interface with name VLAN_0059 created by user Admin State: Enabled Tagging: 802.1Q Tag 59 Verify IP Services have been enabled Description: None on the ExtremeSwitching stack. Virtual router: VR-Default IPv4 Forwarding: Enabled IPv4 MC Forwarding: Disabled Primary IP: 192.168.59.254/24 Verify LACP port to X690 switches … added as tagged. Tag: *1:51g Flags: (*) Active, (!) Disabled, (g) Load Sharing port y … At the prompt for the stack, issue show vlan lo0 and verify (output truncated). ExtremeSwitching Stack Slot-1 Stack.25 # show vlan lo0 VLAN Interface with name lo0 created by user Admin State: Enabled Tagging: 802.1Q Tag 1008 Description: None Virtual router: VR-Default IPv4 Forwarding: Enabled IPv4 MC Forwarding: Disabled Primary IP: 192.168.200.8/32 … Loopback: Enabled … Ports: 0. (Number of active ports=0)… Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 Verify IP Services have been enabled on ExtremeSwitching stack. Verify /32 Loopback IP Address. Verify Loopback Mode enabled. 44 Validated Designs – Infrastructure & Topology At all three prompts, issue show iproute origin static and verify (output truncated). Controlling Bridge 1 Verify static route to stack from Controlling Bridges. x690-DO/SC1-Left.178 # show iproute origin static Ori Destination Gateway Mtr Flags VLAN #s 192.168.200.8/32 192.168.59.254 1 UG---S-um--f- VLAN_0059 … Duration 0d:0h:6m:54s Controlling Bridge 2 x690-DO/SC1-Right.114 # show iproute origin static Ori Destination Gateway Mtr Flags VLAN #s 192.168.200.8/32 192.168.59.254 1 UG---S-um--f- VLAN_0059 … ExtremeSwitching Stack Duration 0d:0h:7m:47s Verify default static route to rest of topology from Controlling Bridges. x440G2-DO/SC1-Stack.9 # show iproute origin static Ori Destination Gateway Mtr Flags VLAN #s Default Route 192.168.59.1 1 UG---S-um--f- VLAN_0059 0d:2h:51m:8s … Duration 0d:0h:19m:54s 4. Configure Access VLAN VRRP between the X690 switches. Configure VRRP for the access VLANs in order to provide access VLAN users a virtual gateway address. Controlling Bridge 1 create vrrp vlan VLAN_1900 vrid 193 configure vrrp vlan VLAN_1900 vrid 193 fabric-routing on configure vrrp vlan VLAN_1900 vrid 193 add 172.19.128.1 enable vrrp vlan VLAN_1900 vrid 193 create vrrp vlan VLAN_1600 vrid 160 configure vrrp vlan VLAN_1600 vrid 160 priority 254 configure vrrp vlan VLAN_1600 vrid 160 fabric-routing on configure vrrp vlan VLAN_1600 vrid 160 add 172.16.0.1 enable vrrp vlan VLAN_1600 vrid 160 create vrrp vlan VLAN_1700 vrid 170 configure vrrp vlan VLAN_1700 vrid 170 fabric-routing on configure vrrp vlan VLAN_1700 vrid 170 add 172.17.0.1 enable vrrp vlan VLAN_1700 vrid 170 VRRP instance id for wired access VLANs. Priority is configured to make master election more reliable. Fabric-routing is enabled so that packets don’t have to be routed through the VRRP master if a more direct route exists on the receiving interface The VRRP virtual IP address create vrrp vlan VLAN_2200 vrid 210 configure vrrp vlan VLAN_2200 vrid 210 priority 254 configure vrrp vlan VLAN_2200 vrid 210 fabric-routing on configure vrrp vlan VLAN_2200 vrid 210 add 172.21.0.1 enable vrrp vlan VLAN_2200 vrid 210 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 45 Validated Designs – Infrastructure & Topology Controlling Bridge 2 create vrrp vlan VLAN_1900 vrid 193 configure vrrp vlan VLAN_1900 vrid 193 priority 254 configure vrrp vlan VLAN_1900 vrid 193 fabric-routing on configure vrrp vlan VLAN_1900 vrid 193 add 172.19.128.1 enable vrrp vlan VLAN_1900 vrid 193 create vrrp vlan VLAN_1600 vrid 160 configure vrrp vlan VLAN_1600 vrid 160 fabric-routing on configure vrrp vlan VLAN_1600 vrid 160 add 172.16.0.1 enable vrrp vlan VLAN_1600 vrid 160 create vrrp vlan VLAN_1700 vrid 170 configure vrrp vlan VLAN_1700 vrid 170 priority 254 configure vrrp vlan VLAN_1700 vrid 170 fabric-routing on configure vrrp vlan VLAN_1700 vrid 170 add 172.17.0.1 enable vrrp vlan VLAN_1700 vrid 170 create vrrp vlan VLAN_2200 vrid 210 configure vrrp vlan VLAN_2200 vrid 210 fabric-routing on configure vrrp vlan VLAN_2200 vrid 210 add 172.21.0.1 enable vrrp vlan VLAN_2200 vrid 210 At the prompt, issue show vrrp and verify VRRP configuration (output truncated). Controlling Bridge 1 Slot-1 VPEX X690-48x-2q-4c.51 # show vrrp Virtual VLAN Name VRID Pri IP Address State VLAN_19(En) 0193 100 172.19.128.1 BKUP VLAN_16(En) 0160 254 172.16.0.1 MSTR VLAN_22(En) 0210 254 172.21.0.1 MSTR VLAN_17(En) 0170 100 172.17.0.1 BKUP FR value must be Y on both VRRP master and backup Master MAC Address TP/TR/TV/P/T 00:00:5e:00:01:c1 0 0 0 Y 1 00:00:5e:00:01:a0 0 0 0 Y 1 00:00:5e:00:01:d2 0 0 0 Y 1 00:00:5e:00:01:aa 0 0 0 Y 1 /FR/G/HM Y N N Y N N Y N N Y N N En-Enabled, Ds-Disabled, Pri-Priority, T-Advert Timer, P-Preempt TP-Tracked Pings, TR-Tracked Routes, TV-Tracked VLANs, FR-Fabric Routing, G-Group, HM-Host Mobility Controlling Bridge 2 The switch with the highest priority has MSTR state and the other one BKUP. Slot-1 VPEX X690-48x-2q-4c.21 # show vrrp Virtual Master VLAN Name VRID Pri IP Address State MAC Address TP/TR/TV/P/T VLAN_16(En) 0160 100 172.16.0.1 BKUP 00:00:5e:00:01:a0 0 0 0 Y 1 VLAN_22(En) 0210 100 172.21.0.1 BKUP 00:00:5e:00:01:d2 0 0 0 Y 1 VLAN_17(En) 0170 254 172.17.0.1 MSTR 00:00:5e:00:01:aa 0 0 0 Y 1 VLAN_19(En) 0193 254 172.19.128.1 MSTR 00:00:5e:00:01:c1 0 0 0 Y 1 /FR/G/HM Y N N Y N N Y N N Y N N En-Enabled, Ds-Disabled, Pri-Priority, T-Advert Timer, P-Preempt TP-Tracked Pings, TR-Tracked Routes, TV-Tracked VLANs, FR-Fabric Routing, G-Group, HM-Host Mobility Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 46 Validated Designs – Infrastructure & Topology Wireless User Access The Guest_Wireless VLAN gives guest users access to the District Office/School 1. This VLAN is not configured on the stack or the other schools since all guest wireless traffic is forwarded directly to the District Office with the Bridged-at-Controller feature in ExtremeWireless. This access layer VLAN is typically the most restrictive of all VLANs. The NonAdmin_Wireless VLAN provides access-layer connectivity to other authorized users. These users will be assigned a Student or Faculty role by Extreme Policy Manger and ExtremeControl. This VLAN will be bridged at the access point. ExtremeXOS Stack 1. Configure two wireless user access VLANs on CBs 2. Configure one wireless user access VLANs on ExtremeSwitching stack. Bridge Port Extenders MLAGs Redundant Controlling Bridges Controlling Bridge 1 Controlling Bridge 2 3. Configure IP Address and IP Services on wired User Access VLANs 4. Configure VRRP on Controlling Bridges for user access VLANs. Note During these manual configuration steps, the user can choose to utilize mlag orchestration mode. This mode can be helpful to configure the exact same commands on both CBs. However, do not use this feature for configurations which need to be unique on CBs such as IP addresses, VRRP configurations, and OSPF configurations. To enable this mode, refer to mlag orchestration mode operation on Page 16. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 47 Validated Designs – Infrastructure & Topology 1. Configure two wireless access VLANs and assign ports. Configure the two access VLANs for wireless users. VLAN_1901 will only be configured on CBs because it is utilized for Bridged-at-Controller for guest wireless access. In addition, a VLAN_1901 includes a port which is directly attached to each EWC. VLAN_1800 is configured on both CBs and the stack. The VLAN_1900 traffic is tunneled directly to the ExtremeWireless controllers. Controlling Bridge 1 create vlan "VLAN_1901" configure vlan VLAN_1901 description "Wireless Guest VLAN" configure vlan VLAN_1901 tag 1901 configure vlan VLAN_1901 add ports 1:19,1:45,1:49 tagged Verify the following; • Two Wireless Access VLANs created. • Add created LACP ports to VLANs. • For VLAN_1901 a tagged port is added to connect to wireless controller. create vlan "VLAN_1800" configure vlan VLAN_1800 description "Wireless Non Administrator Access VLAN" configure vlan VLAN_1800 tag 1800 configure vlan VLAN_1800 add ports 1:45,1:49 tagged Controlling Bridge 2 create vlan "VLAN_1901" configure vlan VLAN_1901 description "Wireless Guest VLAN" configure vlan VLAN_1901 tag 1901 configure vlan VLAN_1901 add ports 1:19,1:45,1:49 tagged create vlan "VLAN_1800" configure vlan VLAN_1800 description "Wireless Non Administrator Access VLAN" configure vlan VLAN_1800 tag 1800 configure vlan VLAN_1800 add ports 1:45,1:49 tagged ExtremeSwitching Stack create vlan "VLAN_1800" configure vlan VLAN_1800 description "Wireless Non Administrator Access VLAN" configure vlan VLAN_1800 tag 1800 configure vlan VLAN_1800 add ports 1:51 tagged Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 48 Validated Designs – Infrastructure & Topology 2. Configure Access VLAN Interface and other routing services. IP addresses for access VLANs are configured on both X690 switches. In addition to the IP address, IP forwarding and bootprelay are configured for the interfaces. Controlling Bridge 1 configure vlan VLAN_1901 ipaddress 172.19.0.2 255.255.224.0 enable ipforwarding vlan VLAN_1901 enable bootprelay ipv4 vlan VLAN_1901 configure vlan VLAN_1800 ipaddress 172.18.0.2 255.255.224.0 enable ipforwarding vlan VLAN_1800 enable bootprelay ipv4 vlan VLAN_1800 Two Wired Access VLANs created. Add created LACP ports to VLANs. IP Forwarding and BootP Relay enabled. Controlling Bridge 2 configure vlan VLAN_1901 ipaddress 172.19.0.3 255.255.224.0 enable ipforwarding vlan VLAN_1901 enable bootprelay ipv4 vlan VLAN_1901 configure vlan VLAN_1800 ipaddress 172.18.0.3 255.255.224.0 enable ipforwarding vlan VLAN_1800 enable bootprelay ipv4 vlan VLAN_1800 3. Configure Access VLAN VRRP between X690 switches. Configure VRRP for the access VLANs in order to provide access VLAN users a virtual gateway address. Controlling Bridge 1 create vrrp vlan VLAN_1901 vrid 190 configure vrrp vlan VLAN_1901 vrid 190 priority 254 configure vrrp vlan VLAN_1901 vrid 190 fabric-routing on configure vrrp vlan VLAN_1901 vrid 190 add 172.19.0.1 enable vrrp vlan VLAN_1901 vrid 190 create vrrp vlan VLAN_1800 vrid 180 configure vrrp vlan VLAN_1800 vrid 180 fabric-routing on configure vrrp vlan VLAN_1800 vrid 180 add 172.18.0.1 enable vrrp vlan VLAN_1800 vrid 180 VRRP instance id for wireless access VLANs. Priority is configured to make master election more reliable. Fabric-routing is enabled so that packets don’t have to be routed through the VRRP master if a more direct route exists on the receiving interface The VRRP virtual IP address Controlling Bridge 2 create vrrp vlan VLAN_1901 vrid 190 configure vrrp vlan VLAN_1901 vrid 190 fabric-routing on configure vrrp vlan VLAN_1901 vrid 190 add 172.19.0.1 enable vrrp vlan VLAN_1901 vrid 190 create vrrp vlan VLAN_1800 vrid 180 configure vrrp vlan VLAN_1800 vrid 180 priority 254 configure vrrp vlan VLAN_1800 vrid 180 fabric-routing on configure vrrp vlan VLAN_1800 vrid 180 add 172.18.0.1 enable vrrp vlan VLAN_1800 vrid 180 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 49 Validated Designs – Infrastructure & Topology At the prompt, issue show vrrp and verify VRRP configuration (output truncated). Controlling Bridge 1 VPEX x690-DO/SC1-Left.173 # show vrrp Virtual VLAN Name VRID Pri IP Address VLAN_19(En) 0190 254 172.19.0.1 VLAN_18(En) 0180 100 172.18.0.1 FR value must be Y on both VRRP master and backup Master State MAC Address TP/TR/TV/P/T MSTR 00:00:5e:00:01:be 0 0 0 Y 1 BKUP 00:00:5e:00:01:b4 0 0 0 Y 1 /FR/G/HM Y N N Y N N En-Enabled, Ds-Disabled, Pri-Priority, T-Advert Timer, P-Preempt TP-Tracked Pings, TR-Tracked Routes, TV-Tracked VLANs, FR-Fabric Routing, G-Group, HM-Host Mobility Controlling Bridge 2 The switch with the highest priority has MSTR state and the other one BKUP. VPEX x690-DO/SC1-Right.113 # show vrrp Virtual Master VLAN Name VRID Pri IP Address State MAC Address TP/TR/TV/P/T VLAN_19(En) 0190 100 172.19.0.1 BKUP 00:00:5e:00:01:be 0 0 0 Y 1 VLAN_18(En) 0180 254 172.18.0.1 MSTR 00:00:5e:00:01:b4 0 0 0 Y 1 En-Enabled, Ds-Disabled, Pri-Priority, T-Advert Timer, P-Preempt TP-Tracked Pings, TR-Tracked Routes, TV-Tracked VLANs, FR-Fabric Routing, G-Group, HM-Host Mobility /FR/G/HM Y N N Y N N Authentication – RADIUS Network login is a security feature that controls admission of user packets and access rights, preventing unauthorized access into the network. Netlogin offers three authentication types: MAC-based, dot1X and web-based. Mac-based authentication can be done locally or using a RADIUS server. Mac-based with RADIUS server and dot1x methods are implemented for this solution. By itself, netlogin actions consist of allowing or filtering traffic on the ports it is enabled on. Its functionality can be further enhanced by using policies, which offer a greater variety of actions and granular control of user packets access to the network. Netlogin dot1X authentication involves three parties: supplicant, authenticator and authentication server. The supplicant is the client machine, capable of running 802.1X authentication software. The authenticator is the network device the client is connected to, configured with netlogin. The authentication server is usually a third-party RADIUS server. For clients that can’t run authentication software – like printers, APs, and other wired devices connected to the network – MAC-based authentication can be used. In this case the supplicant is unware that the authentication is taking place. The authenticator will use the device’s MAC address to authenticate the user. In order for a user to authenticate, the following conditions must be met: 1. The Extreme device is added to Extreme Management Center. 2. Controllers are added to Extreme Management Center and are configured. 3. LDAP configurations are made. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 50 Validated Designs – Infrastructure & Topology 4. The device is added to the correct Control Domain. 5. Policies are created – roles and corresponding services are defined. 6. Policies are enforced on Extreme switches. 7. Access control rules and accept policies are defined. 8. Network devices are added as trusted RADIUS clients for ExtremeControl. 9. Access control settings are enforced on the controllers. Authentication Process XMC & NAC Radius Server Extreme Switch/Stack Netlogin Client Netlogin Client NAC with LDAP Radius Server 2. Send authentication credentials to NAC and try to authenticate user 3. Send authentication Request to Radius 4. Authentication Challenge 4. Authentication Challenge 4. Authentication Challenge 5. Challenge Reply 5. Challenge Reply 1. Request network access and send authentication credentials 5. Challenge Reply 6. Allow or deny Access 7. Assign policy to netlogin port on switch/stack 8. Allow or Deny traffic according to Policy settings Authentication steps: 1. A user connecting to the switch and requesting network access sends login credentials to the switch. 2. The switch sends the credentials in a RADIUS Request message to the ExtremeControl. Upon seeing the request, the ExtremeControl verifies its RADIUS server configuration. If a server is present, the authentication request is sent to it. If no server is found, the LDAP configuration conditions are verified. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 51 Validated Designs – Infrastructure & Topology If the conditions are all met, the authentication request is sent to the RADIUS server. At this point ExtremeControl/LDAP is acting as authenticator. 3. When the RADIUS server receives an authentication request it first verifies that the authenticator is in its trusted client list and that the shared secret received matches the locally configured one, to determine if it can accept an authentication request from the client. Next, if the client verification passes, the RADIUS server searches for a Network Access policy whose access conditions are passed by the Request packet. If an access policy is found, the authentication process can continue. If not, the user’s login attempt is rejected. 4. For PEAP and TLS authentication, a RADIUS Challenge message is sent to the user. 5. The user must respond to the challenge to complete the authentication process 6. The RADIUS server either allows or denies the user access and sends the response to the ExtremeControl server. 7. If the user passes authentication, ExtremeControl starts verifying the LDAP attributes and Access Control Rules one-by-one until the conditions of one of them are met. A Profile and an Accept Policy for the matched rule are returned for the authenticated user and applied on the switch port to which the user is connected. 8. All traffic generated by the user is treated according to the services configured for the Role corresponding to the Accept policy the user matched. RADIUS Configuration When user access control is done using policy and netlogin, at least one RADIUS server must be configured on the access switches. At the District Office/School 1 of the Smart OmniEdge solution, two RADIUS servers are configured—one primary and one secondary – for redundancy. If the primary server fails, the authentication requests will be sent to the second RADIUS server. On the switches, the ExtremeControl engines are configured as RADIUS servers. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 52 Validated Designs – Infrastructure & Topology When complete, the configuration should look similar to the one below: Controlling Bridge 1 configure radius 1 server 192.168.109.253 1812 client-ip 192.168.200.1 vr VR-Default configure radius 1 shared-secret encrypted "#$dZQZibeFVYfCltPMimy6+0KZIIbC/Q==" configure radius 2 server 192.168.109.248 1812 client-ip 192.168.200.1 vr VR-Default configure radius 2 shared-secret encrypted "#$iycnW0+5pRr4Pe2ff4X5uCt6m5JRGg==" configure radius-accounting 1 server 192.168.109.253 1813 client-ip 192.168.200.1 vr VR-Default configure radius-accounting 1 shared-secret encrypted "#$YM0NQLzqot8rYWopHhtQ5r1XKA6pnw==" configure radius-accounting 1 timeout 10 configure radius-accounting 2 server 192.168.109.248 1813 client-ip 192.168.200.1 vr VR-Default configure radius-accounting 2 shared-secret encrypted "#$nCogm5igQEhQpTnGP1xbU8JCAEj50g==" configure radius-accounting 2 timeout 10 enable radius enable radius mgmt-access enable radius netlogin configure radius timeout 15 configure radius mgmt-access timeout 15 configure radius netlogin timeout 15 enable radius-accounting enable radius-accounting mgmt-access enable radius-accounting netlogin Controlling Bridge 2 configure radius 1 server 192.168.109.253 1812 client-ip 192.168.200.2 vr VR-Default configure radius 1 shared-secret encrypted "#$kNgjkKrdw5Po81e0P2ze3fFcm7avFw==" configure radius 2 server 192.168.109.248 1812 client-ip 192.168.200.2 vr VR-Default configure radius 2 shared-secret encrypted "#$Yz7YSlLFNary8w+s+wMAC4wZJJCEQg==" configure radius-accounting 1 server 192.168.109.253 1813 client-ip 192.168.200.2 vr VR-Default configure radius-accounting 1 shared-secret encrypted "#$InzX+lRPtLgxk2e0qL10m72Q36hQeA==" configure radius-accounting 1 timeout 10 configure radius-accounting 2 server 192.168.109.248 1813 client-ip 192.168.200.2 vr VR-Default configure radius-accounting 2 shared-secret encrypted "#$COv+Ep5nDr+l1SVecObdKUGJVPKvdQ==" configure radius-accounting 2 timeout 10 enable radius enable radius mgmt-access enable radius netlogin configure radius timeout 15 configure radius mgmt-access timeout 15 configure radius netlogin timeout 15 enable radius-accounting enable radius-accounting mgmt-access enable radius-accounting netlogin Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 53 Validated Designs – Infrastructure & Topology ExtremeSwitching Stack configure radius 1 server 192.168.109.253 1812 client-ip 192.168.200.8 vr VR-Default configure radius 1 shared-secret encrypted "#$fj+WRDBSRHQmPck4VSz2ctesFSFT+A==" configure radius 2 server 192.168.109.248 1812 client-ip 192.168.200.8 vr VR-Default configure radius 2 shared-secret encrypted "#$OO+DQtUIKS6fQN7l/JTZ/k+cYqWdxA==" configure radius-accounting 1 server 192.168.109.253 1813 client-ip 192.168.200.8 vr VR-Default configure radius-accounting 1 shared-secret encrypted "#$ejlaJE6XrNzw8QWseSt/Qsmpj5li+w==" configure radius-accounting 1 timeout 10 configure radius-accounting 2 server 192.168.109.248 1813 client-ip 192.168.200.8 vr VR-Default configure radius-accounting 2 shared-secret encrypted "#$F6CW350vW+fSZgk2I9MXbhsO0HFGFA==" configure radius-accounting 2 timeout 10 enable radius enable radius mgmt-access enable radius netlogin configure radius timeout 15 enable radius-accounting enable radius-accounting mgmt-access enable radius-accounting netlogin Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 54 Validated Designs – Infrastructure & Topology Guest Access ( Captive Portal) Captive portal provides a way to allow unregistered users to connect to the network as guests. All guests are redirected to a registration page before being allowed access. For redirection to occur, the network must be able to identify a guest user’s traffic and assign a policy that triggers the redirection. In this instance, traffic is assigned the "Unregistered" policy, configured to redirect web traffic to a specific URL where the policy is applied. The DNS, DHCP, ARP, and http/https redirect rules for the “Unregistered” Role are configured in Extreme Management Center via Policy, then enforced onto the corresponding platform. When an unregistered user attempts to go to the internet, the http/https traffic is intercepted and redirected to the Extreme Access Control captive portal. In a wired environment, this is the physical switch port. In a wireless environment, this is either the AP or the controller, depending on the deployment. The user is then able to fill in the required information that will yield access to the network. Once the captive portal process is complete, the user is removed from the policy that triggered redirection and put into a new policy to allow normal traffic flow. General Flow required for captive portal redirection: Connect unregistered user to the network •All non-defined users are authenticated and assigned the Unregistered policy by default Unregistered policy causes redirection to occur •Unregistered policy is configured with services that trigger redirection and allow basic network connectivity services; all other traffic is denied User registers to captive portal •Captive portal registration page displayed automatically when user tries to connect to the internet Extreme Access Control reauthenticates user and assigns new policy Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 •New assigned policy allows user traffic to their allocated resources 55 Validated Designs – Infrastructure & Topology Extreme Policy Policy provides for the configuration of role-based profiles for securing and provisioning network resources based upon the role the user or device plays within the enterprise. By first defining the user or device role, network resources can be granularly tailored to a specific user, system, service, or port-based context by configuring and assigning rules to the policy role. A policy role can be configured for any combination of Class of Service, VLAN assignment, or default behavior based upon L2, L3, and L4 packet fields. Hybrid authentication allows either policy or dynamic VLAN assignment, or both, to be applied through RADIUS (Remote Authentication Dial In User Service) authorization. The configuration flow can be reduced to the steps below: 1. Create Domain • Multiple domains can be created. 2. Add devices to Domain • In order for a network device to receive the correct policy configuration from XMC the network device must be added to the correct domain. 3. Create Role • Roles usually model the function the user has. 4. Create Service • Skip to step 5 if using an existing service. 5. Add Services to Role • A role can have none or multiple services that define how user traffic is treated. 6. Save Domain • All unsaved changes will be lost. 7. Enforce Domain • The policy domain configuration is automatically created on the network devices. This section assumes that SNMPv3 has been configured. To configure SNMPV3 on the switches, wireless controllers, and ExtremeWireless appliances controller, refer to the Simple Network Management Protocol (SNMPv3) section in Design Considerations. Policy Domain Configuration The Smart OmniEdge Validated Design contains four main domains created with Extreme Management Center, each containing a subset of associated roles and sets of rules for each role. These four domains work to organize the network in an efficient manner, allowing specific policies and rules to apply only Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 56 Validated Designs – Infrastructure & Topology across desired domains. The domains are: Wired Smart OmniEdge, Wireless Smart OmniEdge, Wired Smart OmniEdge DO, and Wired Smart OmniEdge DO-Stack. The “Wired Smart OmniEdge DO” and “Wired Smart OmniEdge DO-Stack” enforce the roles and services assigned to the wired users accessing District Office/School 1. The “Wireless Smart OmniEdge” contains the roles and services enforced on the wireless controllers. 1. To create new domains, go to Control Policy Open/Manage Domains. Select Create Domain from the drop-down list and name the new domain: Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 57 Validated Designs – Infrastructure & Topology Create the four required domains for this validated design: Wired Smart OmniEdge, Wireless Smart OmniEdge, Wired Smart OmniEdge DO, and Wired Smart OmniEdge DO-Stack. Click OK to complete domain configuration. 2. To add a network device to a domain, go to Policy Devices, right click on the display criteria, and select Assign Device(s) to Domain: Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 58 Validated Designs – Infrastructure & Topology DO/SC1-Right and DO/SC1-Left are part of the Wired Smart OmniEdge DO policy domain. Assignment to a domain is done based on the VLAN requirements. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 59 Validated Designs – Infrastructure & Topology WC1 and WC2 are added to Wireless Smart OmniEdge policy domain. Assignment to a domain is done based on the VLAN requirements. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 60 Validated Designs – Infrastructure & Topology Role Configuration - Wired Domains Ten unique roles are configured for the District Office. The same roles and services are used by all the schools. The users connecting to the network belong to one of the following categories: administrators, nonadministrators, guests, or network devices. • Administrators, whether they use a wireless or a wired connection, are assigned the Administrator role and are moved to the Admin VLAN. • Faculty and student users are non-administrators. Both roles transmit traffic in the same VLAN, but the wireless traffic is isolated from the wired traffic by being separated into two different VLANs. The difference between the two non-administrator roles is determined by the policy configuration. • Wireless users connecting to the network through captive portal are assigned the Guest Access role. • VoIP phones, IP cameras, and printers are assigned their respective roles. A role has two components that define how user traffic is treated: The Default Actions and the Services. Only the Access Control, Class of Service, and AP Aware actions are configured in the roles defined for this solution. The configuration steps for the Administrator role are presented in this section. All roles are configured in the same manner. The following roles were created for the Wired Smart OmniEdge DO domain: 1. Administrator Role The Administrator role is intended for administrative users who have no limitations of services or network use. The Administrator role is important for allowing IT Administrators complete access to the network so that they can conduct the required analysis, development, and troubleshooting processes that belong to their role in the enterprise. There are no rules for this role. In addition, Class of Service (CoS) is untouched to provide administrators an unbiased network experience. If this were set to a high value, the Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 61 Validated Designs – Infrastructure & Topology administrator's monitoring tools may not reflect network latency accurately. If the administrators require a higher priority to ensure network access, then we recommend creating an additional Administrator role for that purpose. The services associated with the Administrator role are Active Directory Services, Deny Threats, and Network Management. This role is used by the Wireless Smart OmniEdge, Wired Smart OmniEdge, Wired Smart OmniEdgeDO, and Wired Smart OmniEdge-DO-Stack domains and is configured with the same services and Egress VLAN on all of them. Both wireless and wired users with the Administrator role will be added to VLAN Admin. a. To create a new role, go to Control Policy Roles/Services and right-click on Roles: Name Role and click Ok to complete role creation. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 62 Validated Designs – Infrastructure & Topology b. To configure the default actions for the Administrator role, go to Control Policy Roles/Services and select Role. If the options are not displayed, click Show All. The Contain to VLAN access control action is selected for the Administrator role. For this access control type the VLAN must be specified. c. Select the desired CoS value from the drop-down list: Priority 5 will be applied to traffic generated by Administrator users d. To add services to the Administrator role, click Add/Remove and select from the existing default services Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 63 Validated Designs – Infrastructure & Topology Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 64 Validated Designs – Infrastructure & Topology The final Default Actions and Services configuration for the Administrator role e. The Egress VLAN must also be configured for the roles that have access control set to Contain to VLAN and for roles applied to devices that have other users connected behind them, like an AP or a VoIP phone. To configure the Egress VLAN entries, go to the VLAN Egress tab and click Add. Select the desired VLAN and the forwarding state for the port from the drop-down lists. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 65 Validated Designs – Infrastructure & Topology 2. Access Point Role When this role is applied to the port, all other MACs are passed through without authentication. This is specifically useful when bridging wireless client traffic at the access point. Although the Access Point role does not contain any associated services, it does use the Class of Service role High Priority. This CoS value is the highest available in the network. For Bridged@AP wireless topologies, the AP switch port is used to forward user traffic into the network. The VLANs associated with the traffic can be assigned dynamically using the VLAN Egress functionality of the role. This role is used by the Wired Smart OmniEdge, Wired Smart OmniEdge-DO, and Wired Smart OmniEdge-DO-Stack domains and does not exist on the Wireless Smart OmniEdge domain. AP generated traffic is sent untagged in this VLAN. Traffic from Administrator users connecting to the wireless network is sent as tagged in the wired Admin VLAN, assigned with policy. Traffic from faculty and student users connecting to the wireless network is sent as tagged in the wired NonAdmin _Wireless VLAN, assigned with policy. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 66 Validated Designs – Infrastructure & Topology 3. Deny Access Role The Deny Access Role is used in ExtremeControl to assign to an end-system that has been denied access through MAC Registration. The definition of the Deny Access role may vary depending on the customer environment. This role is used by the Wireless Smart OmniEdge, Wired Smart OmniEdge, Wired Smart OmniEdge-DO, and Wired Smart OmniEdge-DO-Stack domains. By default, the Deny Access role will discard traffic. Basic connectivity services are allowed. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 67 Validated Designs – Infrastructure & Topology 4. Guest Access Role The Guest Access role is intended for guests or other unknown users connecting to the enterprise network infrastructure. The Guest Access role will be used to enforce the high security of IT assets and the limited availability of IT resources as determined by the business policy. This role is used by the Wireless Smart OmniEdge, Wired Smart OmniEdge, Wired Smart OmniEdge-DO, and Wired Smart OmniEdge-DO-Stack domains. CoS value 0 is assigned to Guest traffic Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 Only Guest traffic matching the defined Services is allowed 68 Validated Designs – Infrastructure & Topology 5. IP Camera Role The IP Camera role is simply used to define a subset of services that should be applied to any related IP camera devices on the network. It is used by the Wired Smart OmniEdge, Wired Smart OmniEdge-DO, and Wired Smart OmniEdge-DO-Stack domains. Role is configured with CoS value 6 and traffic is contained to Network_Devices VLAN. No services are defined for this role. Traffic generated by IP Camera devices is sent as untagged in Network_Devices wired VLAN. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 69 Validated Designs – Infrastructure & Topology 6. Printer Role The Printer Role is simply used to define a subset of services that should be applied to any related printer devices on the network. The role is used by the Wired Smart OmniEdge, Wired Smart OmniEdge-DO, and Wired Smart OmniEdge-DO-Stack domains. Role is configured with CoS value 3 and traffic is contained to Network_Devices VLAN. Services defined for this role. Traffic generated by Printer devices is sent as untagged in Network_Devices wired VLAN. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 70 Validated Designs – Infrastructure & Topology 7. Faculty Role The Faculty Role is used to define a subset of services that would be normally be applicable to a user with privileges pertaining to non-IT employees and personnel. Role is configured with CoS value 2 and traffic is contained to NonAdmin_Wired VLAN. Services defined for Faculty role. Traffic generated by Faculty users is sent as untagged in NonAdmin_Wired VLAN. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 71 Validated Designs – Infrastructure & Topology 8. Student Role The Student role is a non-default role created to define how student traffic is handled. Role is configured with CoS value 1 and traffic is contained to NonAdmin_Wired VLAN. Services defined for Student role. Traffic generated by Student users is sent as untagged in NonAdmin_Wired VLAN. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 72 Validated Designs – Infrastructure & Topology 9. Unregistered Role The Unregistered Role is used in ExtremeControl for end-systems that have yet to pass through MAC Registration. The definition of the Unregistered role may vary depending on the customer environment. This role is used by the Wireless Smart OmniEdge, Wired Smart OmniEdge, Wired Smart OmniEdgeDO, and Wired Smart OmniEdge-DO-Stack domains. By default, the Unregistered role will discard traffic. These services are allowed for the Unregistered role. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 73 Validated Designs – Infrastructure & Topology 10. VoIP Phone Role This role is applied to the VoIP phones connecting to the network. This role is used by the Wired Smart OmniEdge, Wired Smart OmniEdge-DO, and Wired Smart OmniEdge-DO-Stack domains. Voice traffic will be marked with CoS value 6 and contained to VLAN Network_Devices. Services configured for VoIP phones Traffic from Administrator users connecting behind the VoIP phone will be sent with tag in VLAN Admin Traffic from Faculty and Student users connecting behind the VoIP phone will be sent with tag in VLAN NonAdmin_Wired. Traffic from VoIP phones is sent without tag in VLAN Network_Devices. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 74 Validated Designs – Infrastructure & Topology Role Configuration – Wireless Domains The roles and services created on the wireless domain are enforced on the wireless controller. 1. Administrator Role The Administrator role is intended for administrative users who have no limitations of services or network use. The Administrator role is important for allowing IT administrators complete access to the network so that they can conduct the required analysis, development, and troubleshooting processes that belong to their role in the enterprise. Traffic generated by Administrator users is marked with CoS value 5 and will be contained to the wireless controller Administrator topology. Services defined for the Administrator Role. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 75 Validated Designs – Infrastructure & Topology 2. Deny Access Role The Deny Access role is used in ExtremeControl as a role to be assigned to an end-system that has been denied access through MAC Registration. The definition of the Deny Access role may vary depending on the customer environment. By default, the Deny Access role will discard traffic. Services defined for the Deny Access role. 3. Guest Access Role The Guest Access role is intended for guests or other unknown users connecting to the enterprise network infrastructure. The Guest Access role will be used to enforce the high security of IT assets and the limited availability of IT resources as determined by the business policy. All traffic except for traffic allowed by the service configuration is filtered. Services defined for the Guest Access role. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 76 Validated Designs – Infrastructure & Topology 4. Faculty Role The Faculty Role is used to define a subset of services that would be normally be applicable to a user with privileges pertaining to non-IT employees and personnel. Faculty role traffic is contained to wireless controller NonAdmin topology 1800 Services defined for the Faculty role. 5. Student Role The Student Role is used to define a subset of services that would be normally be applicable to a user with privileges pertaining to pupils attending the schools. Student role traffic is contained to wireless controller NonAdmin topology 1800 Services defined for the Student role. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 77 Validated Designs – Infrastructure & Topology 6. Unregistered Role The Unregistered Role is used in ExtremeControl for end-systems that have yet to pass through MAC Registration. The definition of the Unregistered role may vary depending on the customer environment. All traffic except for traffic allowed by the service configuration is filtered. Redirect function is enabled for this role and is used for captive portal guest access. Services defined for the Unregistered role. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 78 Validated Designs – Infrastructure & Topology 7. Captive Portal Redundancy To have Captive Portal Redundancy between two Access Controls, use a single FQDN address for the captive portal redirect configuration. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 79 Validated Designs – Infrastructure & Topology In the DNS server, add both ExtremeControl IPs to the FQDN address. Make sure that all hardware and applications use the DNS server where the entries reside. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 80 Validated Designs – Infrastructure & Topology Services Configurations Extreme Management Center provides a set of default services that cover a wide range of protocols and applications. Custom services can be added to match specific requirements, and rules can be added to the existing services. Creating a global role means it is visible and it can be used by all policy domains. The following non-default services were added for the District Office. Detailed configuration steps are added for the Deny Admin service. All services are configured in the same manner. 1. Deny Admin Service The purpose of this service is to deny all management traffic and applications and it is applied to nonadmin roles Faculty and Student. a. New services can be added from Policy tab Roles/Services Service Repository Local Services, right click on Services and select Create Service: Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 81 Validated Designs – Infrastructure & Topology b. Each service is formed of one or more rules. To add a rule to a service, right-click on the service name and select Create Rule. c. Once created, the rule appears under the service. To configure the rule, click on its name to open the configuration panel. Enable Rule for settings to take effect. Click Edit to define the type of traffic the rule will affect. Define the actions that will be taken when the user traffic matches the definition in the Traffic Description section. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 82 Validated Designs – Infrastructure & Topology Select Traffic Classification layer and Type. Select Traffic Classification Value. The Deny Admin service has the following rules defined: Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 83 Validated Designs – Infrastructure & Topology 2. Guest Access Service This service was created to allow DHCP, DNS, HTTP and ICMP traffic and it is assigned to Guest Access role in all domains. 3. Network Management Service This service is applied only to the Administrator role and allows management traffic with a destination of the network devices in the Smart OmniEdge Validated Design. 4. VoIP Phone Service The VoIP Phone service is created to allow certain L4 ports used by voice applications. This service is used by the VoIP Phone role. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 84 Validated Designs – Infrastructure & Topology Switch and Appliance Restricted Access Security of the network devices and appliances is of the utmost importance. With Web Services rules applied to Student and Faculty along with Guest Services applied to Guest Access, HTTP is allowed. To block access to the switches and appliances, a Global Security Services must be created with a rule to deny traffic to those particular devices. A subnet or single IP can be entered if a Layer 3 Traffic Classification is chosen. Layers 2, 4 and 7 can also be selected with the appropriate configuration. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 85 Validated Designs – Infrastructure & Topology Once the Rule is created, it must be added to the appropriate Roles within their respective Domains. To add to the appropriate Roles, right-click on the service and select add to roles. Multiple Roles can be selected as well. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 86 Validated Designs – Infrastructure & Topology Saving and Enforcing Domain 1. Go to the Control Policy tab and click Open/Manage Domain(s). Select Save Domain from the drop-down list. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 87 Validated Designs – Infrastructure & Topology 2. Enforce policy configuration on the domain member network devices. Policy settings are created automatically. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 88 Validated Designs – Infrastructure & Topology ExtremeControl Configuration The Access Control tab provides support for controlling user connection experience and network access based on a variety of criteria including authentication, user name, MAC-address, time of day, or location. LDAP Configuration This solution uses LDAP together with RADIUS and netlogin to control user access to network resources. LDAP is an application protocol used for accessing and maintaining distributed directory information. LDAP can be configured through Extreme Management Center via Control Access Control AAA LDAP Configurations. To display all the necessary LDAP configuration options, the Make Advanced option must be selected from the menu via the AAA dropdown in Extreme Management Center. To do this, right-click on the Default option and select Make Advanced. Click Add to add a new LDAP configuration. Click Add again to add a new LDAP URL. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 89 Validated Designs – Infrastructure & Topology Enter the information in the fields as shown below and click Save to finish the configuration: Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 90 Validated Designs – Infrastructure & Topology For redundancy, two LDAP configurations are made. Each entry points to a different third-party LDAP server, also called Directory System Agent (DSA) You can use the Test option to verify that the LDAP server is configured correctly and answering the request. To test an LDAP configuration, select the desired entry, click Edit, and then click Test. The test might take a few minutes to complete. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 91 Validated Designs – Infrastructure & Topology Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 92 Validated Designs – Infrastructure & Topology Next, configure ExtremeControl to use LDAP for interrogating user credentials. To accomplish this, you must create a new authentication rule to set LDAP as the authentication method. You can add an authentication rule from Control AAA Default by clicking Add in the Authentication Rules section. The rules for Smart OmniEdge were configured as shown in the following pictures. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 93 Validated Designs – Infrastructure & Topology Select LDAP authentication from the available options. Select NTLM authentication as LDAP Authentication method. Select the LDAP configuration previously created. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 94 Validated Designs – Infrastructure & Topology RADIUS Configuration Two RADIUS servers are configured for redundancy. In case the primary server fails, the second one is used for authentication. Both servers are connected to the District Office/School 1. The Timeout and Number of Retries have the default values. The shared secret must be configured and must be the same on ExtremeControl and on the RADIUS server. ExtremeControl will check that the RADIUS server is up at every check interval. Verification is done by using a dummy RADIUS request with a username and password. The username may or may not exist on the RADIUS server. The ExtremeControl considers the RADIUS server to be alive whenever the ExtremeControl receives a RADIUS response, either Reject or Accept. The Health Check parameters can be modified from the Advanced section of the RADIUS configuration window. The default values are used here. To configure a RADIUS server, go to Control Access Control Configuration AAA RADIUS Servers and click Add to create a new entry: Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 95 Validated Designs – Infrastructure & Topology Two RADIUS servers are added for redundancy. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 96 Validated Designs – Infrastructure & Topology ExtremeControl Engine Configuration Two ExtremeControl engines are connected to District Office in different switches. The use of two engines assures redundancy. Both ExtremeControl engines are configured identically, and if the primary ExtremeControl fails the secondary ExtremeControl will take over its attributions without affecting users. Both engines have authentication and assessment enabled. To configure ExtremeControl engines, go to Control Engines Engine Groups Default. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 97 Validated Designs – Infrastructure & Topology Trusted RADIUS Clients Configuration for Network Devices The network devices are acting as RADIUS clients and are configured to use ExtremeControl as RADIUS servers. The ExtremeControl engines will accept requests only from trusted clients. To be trusted clients, devices must be added to the Switches tab. Go to the Control Access Control Engines Engine Groups Default Switches tab and click Add to add a new client device. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 98 Validated Designs – Infrastructure & Topology Click Advanced Settings and select SNMP. This setting is necessary for dynamic authorization to work. Access the advanced settings to configure RADIUS Security shared secret and re-authentication type. After all network devices are added, the changes are enforced on both ExtremeControl engines. Wireless controllers should also be added as ExtremeControl-trusted RADIUS clients. This process is detailed in the next section. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 99 Validated Designs – Infrastructure & Topology Access Control Rule Configuration This solution requires the use of Extreme’s Network Access Control engines, which are configured with 18 unique rules for user authentication and traffic classification. Each rule consists of a name, a set of conditions, and a set of actions that associates it with an Accept policy. Each Accept policy is mapped to a role from the Policy tab. Multiple Accept policies can point to the same role. All conditions defined for a rule must be met; otherwise the rule is not matched. When ExtremeControl receives an authentication request, all rules are verified in order until one is matched. When a rule is matched, the existing RADIUS attributes are replaced with the rule’s Accept policy. The Unregistered rule is placed at the bottom of the access rules list and has a catch-all purpose. It will be matched by default by all traffic that doesn’t meet all conditions of any of the previous rules. To create a new rule, go to Control Access Control Configuration Rules and click Add. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 100 Validated Designs – Infrastructure & Topology After changes are made on the Access Control tab, the configuration must be enforced on the ExtremeControl engines. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 101 Validated Designs – Infrastructure & Topology The access control rules configuration for Smart OmniEdge looks like this: For Faculty and Student access, three rules are created: two for Wired and one for Wireless. Separate rules are needed because, in the Smart OmniEdge solution, traffic generated by wireless clients is separated from traffic generated by wired clients and authentication for wired clients can be done with Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 102 Validated Designs – Infrastructure & Topology 802.1x or based on MAC. Users match one of the rules based on authentication method (dot1x or MAC), group (Faculty or Student) and location. For Wired, the location is generally defined as being from the Access, whereas the Wireless location is determined by the actual SSID the user is currently connecting to. The Printer and VoIP phone roles are created for the printers and VoIP phones connected to the setup, authenticated by their MAC-addresses. They also must be a part of the defined Printer/VoIP Phones EndSystem group. All guest users authenticated with captive portal will match the Registered Guests rule. All users that will use their access credentials to authenticate to captive portal are caught by Web Authenticated Users and are given Guest access. ExtremeWireless Controller Configuration This section includes an easily implemented, efficient solution to service wireless users that require access to the network. The ExtremeWireless User Access uses two wireless controllers and multiple APs for redundancy. Each wireless controller is connected to a different ExtremeSwitching device at the District Office/School 1. This provides redundancy, so that if one of the DO-School 1 switches fails the other switch can assume control. At all locations, access points are connected to either the ExtremeSwitching bridge port extenders, stack or standalone switches. This architecture allows a pair of controllers to control many APs, making the administration and management of large networks much easier and adding a layer of protection for network availability. This solution implements two ExtremeWireless Controller virtual appliances, to maximize flexibility, ease of installation, and support for a wide variety of APs. Extreme’s virtual appliances have resiliency built in from the start. Running as active-active pairs, if an appliance happens to fail the other appliance can take over the full load while maintaining AP connectivity. Failover occurs within milliseconds; APs continue running without interruption to existing or new client connections. Virtual Wireless Controller Configuration Before you configure wireless network access, some basic accessibility settings must be made on the wireless controllers. The ExtremeWireless appliance can be managed from a console, from a graphical interface, and from Extreme Management Center. For this Validated Design, only the graphical interface and Extreme Management Center configurations are presented. After the initial installation, the management IP address must be configured from the console. For more details on how to configure the virtual wireless controller from the console, see the GTAC Knowledge documentation. To access the configuration graphical interface, enter the following address into the browser https://<ip_adddress>:5825 . All configurations are executed only on the primary wireless controller, they are automatically mirrored on the secondary wireless controller. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 103 Validated Designs – Infrastructure & Topology The NTP server must be configured to ensure that both wireless controllers have the same time. If the times are not synchronized, an error will be generated, and the pairing will not be completed. For details, refer to Network Time Protocol (NTP). Wireless controllers should be added to Extreme Management Center for Policy and ExtremeControl rules enforcement. Pairing Configuration To ensure redundancy, the two wireless controllers must maintain the same configuration. This is achieved by configuring pairing. To configure pairing, go to Controller Administration Availability. ExtremeWireless Controller 1 (EWC1): IP address of the Secondary Wireless Controller (EWC2) Primary EWC requires that this checkbox be selected. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 104 Validated Designs – Infrastructure & Topology ExtremeWireless Controller 2 (EWC2): IP address of the Primary Wireless Controller (EWC1) Secondary EWC requires that this checkbox not be selected. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 105 Validated Designs – Infrastructure & Topology Host Attributes Configurations The wireless controller’s DNS host name, default gateway, DNS server address(es), and domain name are configured on the Host Attributes page. The Smart OmniEdge solution uses two DNS servers for redundancy. The settings must be made on both wireless controllers because they are not automatically mirrored. The controller sends the host name query to the first DNS server in the list. If this is not reachable then the controller sends the host name query to the second DNS server. The Host Attributes page can be found under Controller Administration. EWC1 and EWC2 Configure Host Name and Domain Name. Add DNS server IP addresses. Assign a Default Gateway IP. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 106 Validated Designs – Infrastructure & Topology Routing Configuration The virtual wireless controllers are network devices which must be able to route user traffic to the different appliances and servers used in the Validated Design (ExtremeControl engines, DHCP, DNS, NTP servers) as well as to the internet. Also, the wireless controllers have networks directly connected that must be advertised to the rest of the setup. For the Smart OmniEdge solution, dynamic routing using OSPF was implemented. First the physical 1 interface must be created on both wireless controllers and on the DO-School 1 switches. This interface is the non-admin interface connecting to the setup, each controller is connected to different DO-School 1 switches for redundancy. On DO/SC1-Left and DO/SC1-Right vlan, VLAN_0070 was created to connect the wireless controllers to the setup. 1. Create VLAN Interface for EWCs on each District Office/School 1 X690 switch. Controlling Bridge 1 create vlan "VLAN_0070" configure vlan VLAN_0070 configure vlan VLAN_0070 configure vlan VLAN_0070 configure vlan VLAN_0070 enable ipforwarding vlan Note VLAN tag assigned. tag 70 description "To EWC1" add ports 1:19 tagged ipaddress 192.168.70.1 255.255.255.252 VLAN_0070 Configure a /30 point to point IP interface. Controlling Bridge 2 create vlan "VLAN_0070" configure vlan VLAN_0070 configure vlan VLAN_0070 configure vlan VLAN_0070 configure vlan VLAN_0070 enable ipforwarding vlan tag 70 description "To EWC2" add ports 1:19 tagged ipaddress 192.168.70.5 255.255.255.252 VLAN_0070 2. Configure OSPF on created EWC VLANs with simple password authentication Controlling Bridge 1 Add interface to area 0.0.0.0. configure ospf add vlan VLAN_0070 area 0.0.0.0 configure ospf vlan VLAN_0070 authentication encrypted simple-password "#$vmahTN5PuAnn3IAcafb77+rja1ZXKg==" Controlling Bridge 2 Configure with a simple encrypted password. configure ospf add vlan VLAN_0070 area 0.0.0.0 configure ospf vlan VLAN_0070 authentication encrypted simple-password "#$YRT35jfu6pX6pHH8ifJyEcnP8NN+mQ==" Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 107 Validated Designs – Infrastructure & Topology 3. Configure an interface on Wireless Controllers to connect to the Controlling Bridges. To create the interface on the Wireless appliance, go to Controller Network and click New. EWC1 Configure interface name and set the Mode to Physical. Configure a /30 point to point IP interface.in same subnet as X69 Switch 1 Configure same tag as Controlling Bridge 1 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 Configure interface to be available for AP Registration and Management Traffic. 108 Validated Designs – Infrastructure & Topology EWC2 Configure interface name and set the Mode to Physical. Configure a /30 point to point IP interface.in same subnet as X69 Switch 1 Configure same tag as Controlling Bridge 1 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 Configure interface to be available for AP Registration and Management Traffic. 109 Validated Designs – Infrastructure & Topology 4. Enable OSPF on Wireless Controllers to form adjacency with Controlling Bridges. To enable OSPF globally and on the physical 1 interface go to Controller Network Routing Protocols OSPF. Set OSPF Status to ON to enable OSPF globally. Use the New button to make the OSPF interface configuration. EWC1 and EWC2 1. Set OSPF Status to On. 3. Change Authentication to Password. 4. Enter same password as Controlling Bridges. 5. Select Save. 2. Select New: above pop-up appears. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 110 Validated Designs – Infrastructure & Topology 5. Verify forwarding table on EWCs. To verify that the OSPF adjacencies were formed and routes are learned, check the forwarding table. A new browser page will open, and the routing table of the wireless controller is displayed. Controller Network Routing Protocols View Forwarding Table Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 111 Validated Designs – Infrastructure & Topology Wireless Controller Access Control Configuration The wireless controllers use the ExtremeControl servers to provide multiple services like authentication, role-based management for users, CoS marking, access control policies, and captive portal. Because of the VLAN’s role and policy requirements, the wireless controllers have their own domain. The wireless controllers will use the ExtremeControl engines as RADIUS servers, and both wireless controllers need to be added in the Switches list. This can be done from: Control Access Control Engines Engine Groups Default Switches Add 1. Expand to display the two EWC V2110 appliances and select. 2. 3. 4. 5. 6. Select from Switch Type: Layer 2 RADIUS Only Select from Primary Engine: IP Primary Engine Select from Secondary Engine: IP Secondary Engine Select from Auth. Access Type: Any Access Select from RADIUS Attributes to Send: Extreme IdentiFi Wireless 7. Select from RADIUS Accounting: Enabled 8. Select from Policy Domain: Wireless Smart OmniEdge Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 112 Validated Designs – Infrastructure & Topology Click Advanced Settings to open Advanced Switch Settings 1. Configure RADIUS Security Shared Secret. 2. Configure Reauthentication Type: RFC3576 – Extreme IdentiFi Wireless. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 113 Validated Designs – Infrastructure & Topology The wireless controllers will use the ExtremeControl engines as RADIUS servers, to authenticate users connecting to the secured wireless networks and for integration with DHCP. To define the ExtremeControl engines for DHCP integration go to VNS Global NAC Integration New and add both ExtremeControl engines: Configure DHCP Receiver Address for second NAC: NAC Server Name: enac2 Address for DHCP Traffic: 192.168.106.248 Both ExtremeControl engines are added, for redundancy. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 114 Validated Designs – Infrastructure & Topology To define the ExtremeControl engines as RADIUS servers, go to VNS Global Authentication RADIUS Servers New Both ExtremeControl engines are added, for redundancy. Configure RADIUS Server for second NAC: NAC Server Name: NAC_2 Hostname/IP: 192.168.106.248 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 115 Validated Designs – Infrastructure & Topology Captive Portal Configuration Captive portal is used by the wireless users connecting to the network as guests. Captive portal must be configured on the ExtremeControl engines. The <Default> captive portal profile is used for the Smart OmniEdge Validated Design and requires minimum configuration from the Extreme Management Center Control tab. Control Access Control Configuration Captive Portals Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 116 Validated Designs – Infrastructure & Topology Guest Web Access and Authenticated Web Access were selected. The default settings were used for the rest of the parameters. Enforce configuration on the ExtremeControl engines for the settings to take effect. Control Access Control Configuration Captive Portals Website Configuration Select: Guest Settings | Guest Web Access Select: Authentication Settings | Authenticated Web Access Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 117 Validated Designs – Infrastructure & Topology Wireless AP Discovery Ensure that the appropriate services on your enterprise network are prepared to support the discovery process. To use DHCP server for wireless AP discovery, ensure that it supports option 78 (DHCP for SLP RFC2610). The APs use this method to discover the controller, and option 78 must be set for the subnets connected to the ports of the controller and the subnets connected to the APs. Below is an example of how this might be configured in Windows Server 2008. To configure DHCP option 78 on the DHCP server, right-click on the Scope Options for the scope meant to service the APs and select Configure Options. Select option 78 and configure the IP addresses of both wireless controllers. Besides redundancy this also ensures load balancing between the two appliances. The first value introduced must be 1. This value announces that the following fields represent IP addresses for wireless controllers. Use the New Value box to enter the addresses, byte by byte. For the Smart OmniEdge solution the physical 1 interface is used for AP connection. The AP does not use the DNS information from the initial DHCP offer supplied from the DHCP server. After the IP setup stage, the AP decides whether to use the static controller IP or start its discovery methods. If SLP/DNS/VCI discovery is started, the AP sends periodic DHCP informs to get more data to complete its boot discovery methods. If the DHCP server does not reply to the inform, the process to contact the controller will fail and start over. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 118 Validated Designs – Infrastructure & Topology Wireless AP Registration When the discovery process is successful, the AP registers with the wireless controller. At this point the controller can be configured with one of the following security modes, which defines how the controller behaves when registering new/unknown devices: • Allow all Wireless APs to connect: If the controller does not recognize the registering serial number, a new registration record is automatically created for the AP and receives a default configuration. If the controller recognizes the serial number, it indicates that the registering device is pre-registered with the controller and uses the existing registration record to authenticate the AP and the existing configuration record to configure the AP • Allow only approved Wireless APs to connect (secure mode): If the controller does not recognize the AP, the AP's registration record is created in pending state and the administrator is required to manually approve a pending AP for it to provide active service. The pending AP receives minimum configuration only, which allows it to maintain an active link with the controller for future state change. AP Global Registration Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 119 Validated Designs – Infrastructure & Topology To verify the AP availability, go to Reports APs AP Availability Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 120 Validated Designs – Infrastructure & Topology Wireless Network Configuration For a wireless network to become accessible to users, configurations must be created in the following sections: Topologies, Roles, WLAN Services, Virtual Networks and Sites. There is a dependency between the sections and a configuration order must be followed. 1.Configure the topologies • Can be Bridged@ AP or Bridged@Controller.The VID used for the topologies must match the VID configured on the switches. 2. Enforce Policy configuration with NAC • Verify all Roles and associated policies were created. 3. Create WLANs • Maps topology to an SSID; the SSID is seen by the user. • Sites are used to group the APs based on their physical location. Add APs to sites and assign the WLAN services they will advertise. 4. Create sites 5. Create VNS Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 • Connects WLANs to Roles; defines wireless network access type and authentication 121 Validated Designs – Infrastructure & Topology 1. Topology Configuration In this section, the physical access provisioning for the user access is created. Every topology is essentially a VLAN. To add a new topology, go to VNS Topologies and click New. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 122 Validated Designs – Infrastructure & Topology For the topologies that wireless users will use to connect to the network, one of two modes must be selected: Bridge Traffic Locally at EWC or Bridge Traffic locally at AP. The topology mode dictates how the traffic from the clients is going to be treated. Bridge Traffic Locally at EWC – Users connecting to the wireless network send the traffic to the AP. The AP encapsulated the traffic and tunnels it to the controller. The controller de-encapsulates the traffic, processes it and sends to the network over the physical 1 interface in the user access VLAN. Bridge Traffic locally at AP - Users connecting to the wireless network send the traffic to the AP. The AP sends the traffic to the network over its management port in the user access VLAN. In the Smart OmniEdge solution, guest and authenticated wireless user access is possible from all schools. All Guest users are provisioned with a vlan Bridged@Controller and are placed in the same network. All authenticated users are provisioned with Bridged@AP vlans and are placed in different subnets, based on the school they are connected to. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 123 Validated Designs – Infrastructure & Topology The following user access topologies were configured for the solution: Administrator Topology Used by Administrator users connecting to the network and given the Administrator role. This topology corresponds to vlan Admin with vid 1600 and is configured on all switches. A different subnet is used, based on the location. The routing is done on the switch the AP is connected to. The Administrator topology is configured as: • Name: Administrator • Mode: Bridge Traffic Locally at AP • VLAN ID: 1600 Tagged Guest Topology Used by Guest users connecting to the network and given the Guest role. Access control is performed by the wireless controllers. User traffic is routed to the ExtremeWireless controllers and not forwarded at the switch. The Guest Wireless VLAN vid 1901 is only configured on DO/School1Left and DO/School1-Right. The Guest topology is configured as: • Name: Guest • Mode: Bridge Traffic Locally at EWC • VLAN ID: 1901 Tagged Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 124 Validated Designs – Infrastructure & Topology NonAdmin Topology Used by NonAdmin users connecting to the network and given the Student or Faculty role. This topology corresponds to vlan Wireless NonAdmin with a vid of 1800 and is configured on all switches. A different subnet is used, based on the location. The routing is done on the switch the AP is connected to. The Administrator topology is configured as: • Name: NonAdmin • Mode: Bridge Traffic Locally at AP • VLAN ID: 1800 Tagged 2. Role Verification The roles are used for Access Control and will be enforced when ExtremeControl is configured. The Wireless Smart OmniEdge domain contains the roles and services enforced on the wireless controllers. To verify the settings from Extreme Management Center after Policy Enforce completion, go to VNS Roles and click on each role for detailed configuration. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 125 Validated Designs – Infrastructure & Topology The following roles are used in the solution: Administrator Role This role is applied to the Administrator users connecting to the network. This role is assigned to users authenticated as Faculty. The access control is set to contain traffic to Administrator topology and to mark traffic with CoS priority 5. Configure in the following manner: • Role Name: Administrator • Access Control: Containment VLAN • VLAN: admin(1600) • Default CoS: Network Management Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 126 Validated Designs – Infrastructure & Topology Deny Access Role This role is assigned to users who fail authentication. All traffic is filtered, except for the traffic explicitly allowed by the policy rules. Configure in the following manner: • Role Name: Deny Access • Access Control: Deny • Default CoS: No Change Some traffic must be allowed, by the Deny Access rule, to permit Guest captive portal users to connect to the network. The services allowed for this role are defined in the Policy Rules section. All traffic, except for the traffic explicitly allowed by the policy rules, is filtered. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 127 Validated Designs – Infrastructure & Topology Faculty Role This role is assigned to users authenticated as Faculty. The access control is set to contain traffic to NonAdmin topology and to mark traffic with CoS priority 2. Configure in the following manner: • Role Name: Faculty • Access Control: Containment VLAN • VLAN: NonAdmin(1800) • Default CoS: Bulk Data Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 128 Validated Designs – Infrastructure & Topology Student Role This role is assigned to users authenticated as Student. The access control is set to contain traffic to NonAdmin topology and to mark traffic with CoS priority 1. Configure in the following manner: • Role Name: Student • Access Control: Containment VLAN • VLAN: NonAdmin(1800) • Default CoS: Best Effort Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 129 Validated Designs – Infrastructure & Topology Guest Access Role This role is assigned to users connecting to the network as Guests through captive portal. Access control is set containment to Guest topology and traffic is marked with CoS priority 0. Configure in the following manner: • Role Name: Guest Access • Access Control: Containment VLAN • VLAN: Guest(1901) • Default CoS: Scavenger Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 130 Validated Designs – Infrastructure & Topology Unregistered Role This is the initial role allocated by default to all wireless users. Users can move from this role to Administrator, Faculty or Student roles through 802.1X authentication, to Guest role through captive portal, or to Deny Access if authentication fails. A set of policies are configured to allow a user connecting to the network to obtain an IP address, to reach the DNS server, and to access the captive portal. Configure in the following manner: • Role Name: Unregistered • Access Control: Deny • Default CoS: No Change Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 131 Validated Designs – Infrastructure & Topology 3. WLAN Services Configuration The RF configuration, authentication settings, and QoS attributes for a wireless network can be managed under a WLAN service. For the Smart OmniEdge, each school provisions two WLANS identified by two SSIDs, one for Guest access and one for Administrator and NonAdmin access. The Guest SSIDs are set to disable authentication mode, which uses the captive portal registration through policies enforced from Extreme Management Center, and the NonAdmin SSIDs are configured for 802.1X authentication. To Add a new WLAN service, go to VNS WLAN Services and click New. The following WLAN services were configured for District Office/School 1. The WLAN services for Schools 2, 3, and 4 follow the same pattern. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 132 Validated Designs – Infrastructure & Topology DO/SC1-Guest This WLAN binds the DO/SC1-Guest SSID to the Guest topology and is intended to be used by Guest users connecting to the network. No privacy is provided, and access is through captive portal. Configure in the following manner: • Name: DO/SC1-Guest • SSID: DO/SC1-Guest • Default Topology: Guest(1901) • Default CoS: Best Effort Guest Access uses the captive portal through policies enforce from Extreme Management Center to initially register the device that is used to connect to the network. The Auth&Acct tab is configured in the following manner: • • • • • Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 Authentication mode: disabled Enable MAC-based authentication checkbox Enable RADIUS Accounting checkbox Add NAC_1 & NAC_2 for MAC-based Add NAC_1 & NAC_2 for Accounting 133 Validated Designs – Infrastructure & Topology DO/SC1-NonAdmin This WLAN binds the DO/SC1-NonAdmin SSID to the NonAdmin topology. Configure in the following manner: • Name: DO/SC1-NonAdmin • SSID: DO/SC1-NonAdmin • Default Topology: NonAdmin(1800) • Default CoS: No CoS WPA privacy is configured for this SSID. Configure in the following manner: • Select WPA radio button • Select WPA v.2 checkbox • Encryption: AES Only Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 134 Validated Designs – Infrastructure & Topology 802.1X authentication is configured for the DO/SC1NonAdmin SSID. The two NAC engines are configured as RADIUS servers. Configure in the following manner: • Select 802.1x authentication mode • Select no HTTP Redirection • Select RADIUS Accounting checkbox • Add NAC_1 & NAC_2 for Authentication • Add NAC_1 & NAC_2 for Accounting The VSA attributes can be used to customize Access Control rules (for example, the SSID or AP information can be sent in a TLV and used to match the location of a wireless client trying to authenticate). To configure the wireless controller to send VSA attributes in the Radius packet, edit Radius TLVs. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 135 Validated Designs – Infrastructure & Topology 4. Site Configuration A site provides a way to group Roles, WLANs, and APs under one logical entity for easier management. For the Smart OmniEdge solution, four sites were created based on location. To create a new site, go to VNS Sites and click New. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 136 Validated Designs – Infrastructure & Topology The DO-School 1 site was configured as below. School 2 through School 4 sites were configured the same way. All roles are selected to be downloaded to the APs connected to DO-School 1. Configure in following manner: the following manner: • Site Name: DO-School 1 • Select all the checkboxes: RolesAuthentication to download to Uncheck Local RADIUS member checkboxAPs • Select all checkboxes: Roles to download to member APs On the AP Assignments tab all APs physically connected to DO-School 1 are selected. This APs have the same role and WLAN settings. Configure in the following manner: • Select checkboxes of desired APs Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 137 Validated Designs – Infrastructure & Topology On the WLAN Assignments tab, select the WLAN services that are supposed to be accessible from DO-School 1. This selection also enables the APs selected the AP Assignments tab to advertise these WLANs. Configure in the following manner: • Select AP Radio Checkboxes • Select AP Port Checkboxes 5. Virtual Network Configuration The virtual network configuration binds together the WLANs and the roles, for access control. There are conceptually hierarchical dependencies on the configuration elements of a VNS and for service activation, all the pieces will need to be in place, or defined during VNS configuration. To create a new VNS entry, go to VNS Virtual Networks and click New. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 138 Validated Designs – Infrastructure & Topology The following virtual networks are configured for DO-School 1. For School 2 through School 4 the virtual networks are defined in the same way. DO/SC1-Guest-WiFi This VNS is bound to the DO/SC1-Guest WLAN. The default role for non-authenticated users is Unregistered. After users connect to captive portal, they are considered authenticated and the Guest Access role is assigned to them. Configure in the following manner: • VNS Name: DO/SC1-Guest-Wifi • WLAN Service: DO/SC1-Guest • Non-Authenticated: Unregistered • Authenticated: Guest Access • Enable Checkbox Checked DO/SC1-NonAdmin-WiFi This VNS is bound to the DO/SC1-NonAdmin WLAN. The default role for non-authenticated users is Unregistered. After authentication, a role is assigned by NAC, access control will be done on the switch because the topology is bridged@AP. Configure in the following manner: • VNS Name: DO/SC1-NonAdmin-Wifi • WLAN Service: DO/SC1-NonAdmin • Non-Authenticated: Unregistered • Authenticated: Same as non-auth • Enable Checkbox Checked Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 139 Validated Designs – Infrastructure & Topology ExtremeAnalytics ExtremeAnalytics will be configured to provide detailed flow information for the entire school district. Refer to the flowchart below: Add Analytics Engine to Extreme Management Center •Refer to the Extreme Management Center Configuration section. Configure Application Telemetry Sources •Configured on all CBs. Configures a mirror named EAN on all CBs, the mirror source are the switches' loopback addresses and the destination being the ExtremeAnalytics Engine IP Address. An ingress and egress telemetry policy file are created and applied as access lists. sFLOW enabled and configured on all ports. Configure NetFlow Flow on EWC •Configured on ExtremeWireless Controllers to send NetFlow/IpFix information to the ExtremeAnalytics Engine. Configure Flow Locations for ExtremeAnalytics •Configure locations and networks to collect analytics on and send to ExtremeAnalytics Engine. Enforce Analytics Engine •Enforce Analytics Engine. Flow collection on extended edge is done on the Controlling Bridges and forward to an ExtremeAnalytics engine. All access ExtremeSwitching hardware has the capability to utilize ExtremeAnalytics Application Telemetry feature. However, due to the use of policy, captive portal, and application telemetry, certain ExtremeSwitching hardware may not be capable of deploying all features simultaneously. Careful consideration must be given to determine that the appropriate hardware is selected. In scenarios where not enough resources are available, the upstream ExtremeSwitching switch can collect aggregated flow information for north-south traffic only. With BPEs north-south and east-west flow information can be collected at the upstream ExtremeSwitching hardware. Refer to product documentation to determine hardware capabilities of ExtremeSwitching switches. Note Due to hardware resource limitations ExtremeSwitching X440G2 will not support ExtremeAnalytics and wired captive portal simultaneously. Wireless captive portal is unaffected by these limitations. Consider another ExtremeSwitching edge solution to run both features simultaneously. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 140 Validated Designs – Infrastructure & Topology ExtremeAnalytics Application Telemetry Configuration In this section, add ExtremeSwitching switches as Mirror Sources for sending the flow information to the ExtremeAnalytics Engine. Go the following location and set the flow selection type to App Telemetry. Analytics Configuration Engines K-12 BR Analytics Configuration Next, each X690 District Office switch will be added as a mirror source, utilizing the switches loopback address as the source IP. The destination of the mirror will be the ExtremeAnalytics Engine. For ExtremeSwitching standalone or stack deployments, flow collection will be either handled locally or northsouth only flows can be aggregated at the upstream switches. The determining factor is whether the hardware selected has the necessary resources to deploy policy, captive portal, and application telemetry simultaneously. Analytics Configuration Engines K-12 BR Analytics Configuration Application Telemetry Sources Add Select All Device DO/SC1-Left Click OK Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 141 Validated Designs – Infrastructure & Topology Verify that Source IP address is the switch’s loopback address. Depending on port density, this process can take several minutes. After adding all X690/X590 switches in the school district, six Application Telemetry Sources should be configured. Final output should look something like this: Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 142 Validated Designs – Infrastructure & Topology ExtremeAnalytics NetFlow Configuration ExtremeAnalytics can also be configured for the ExtremeWireless controllers. In this case NetFlow is used to support both Application Telemetry and NetFlow simultaneously, Flow Collection Type is changed to Both. Analytics Configuration Engines K-12 BR Analytics Configuration After changing the Flow Sources, a dialog box should open within the Access Control Integration pane. Select Add. Analytics Configuration Engines K-12 BR Analytics Configuration Flow Sources Add Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 143 Validated Designs – Infrastructure & Topology Under Flow Source, click the ellipsis (…). Then navigate to My Network All Devices WC1 and click OK. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 144 Validated Designs – Infrastructure & Topology Select all of the WLANs and click OK. Notice that if a controller is paired to another controller it will perform the configuration in one step. You will not need to perform this step for the second controller. Once controllers are added, the Access Control Integration | Flow Sources pane should look like this. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 145 Validated Designs – Infrastructure & Topology ExtremeAnalytics Location Configuration Finally, you need to select exactly which networks you want to collect flow information for. This can be quite broad or narrow depending the school district’s requirements. The first step is to select a location. This is just a label and there is no requirement that it be a role. You can define this as you wish. In this example, it is simply identified as K-12 Faculty. Analytics Configuration Locations Add the subnets that flow collection should monitor. Analytics Configuration Locations Highlight Create Location Right Click Add Address Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 146 Validated Designs – Infrastructure & Topology After locations and subnets are added, you will have something that resembles the example below. Locations are based off roles. User could have created locations based of physical locations. The important thing to remember is that locations are just a group of subnets not an actual physical location. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 147 Validated Designs – Infrastructure & Topology ExtremeAnalytics Verification If everything was configured correctly, ExtremeAnalytics will begin collecting information. The polling interval is every five minutes. Be sure to give the dashboard enough time to begin populating information. Analytics Dashboard and select Insights from the pull down. Even though the dashboard might not be collecting information, the Application Flows window should begin to collect information. You can change the polling interval if you want to see updates in real time. Analytics Application Flows Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 148 Validated Designs – Infrastructure & Topology From the switch CLI, you can observe the App Telemetry mirror using the show mirror command. Controlling Bridges • • • • VPEX x690-DO/SC1-Right.8 # show mirror Tunnel EAN is enabled. Mirror to Remote IP = Analytic Engine IP From IP = Loopback address of the switch Status = Up DefaultMirror (Disabled) Description: Default Mirror Instance, created automatically Mirror to port: EAN (Enabled) Description: Mirror to remote IP: 192.168.109.252 From IP : 192.168.200.2 Status : Up VR : VR-Default Ping check: On Mirrors defined: 2 Mirrors enabled: 1 (Maximum 4) HW filter instances used: 0 (Maximum 128) HW mirror instances used: 0 ingress, 0 egress (Maximum 4 total, 2 egress) Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 149 Validated Designs – Infrastructure & Topology Below is an example of what the sFlow configuration might look like. Issue show conf etmon and show conf | include mirror display sFlow and ERSPAN configuration. Controlling Bridges configure sflow poll-interval 60 enable sflow configure sflow collector 192.168.109.252 port 6343 vr "VR-Default" configure sflow agent ipaddress 192.168.200.2 enable sflow ports 1:1 ingress enable sflow ports 1:2 ingress enable sflow ports 1:3 ingress enable sflow ports 1:4 ingress enable sflow ports 1:5 ingress … enable sflow ports 110:22 ingress enable sflow ports 110:23 ingress enable sflow ports 110:24 ingress enable sflow ports 110:25 ingress enable sflow ports 110:26 ingress create mirror "EAN" configure mirror EAN to remote-ip 192.168.109.252 from 192.168.200.1 enable mirror EAN When sFlow App Telemetry is configured in Extreme Management Center, two ACLs are configured and applied. Issue show config acl and verify that the two access-lists are applied. You can also verify the access-lists by issuing ls at the prompt. This lists the present file. Controlling Bridges configure access-list telemetry any ingress configure access-list telemetryegress any egress -rw-r--r--rw-r--r-- 1 admin 1 admin admin admin 33450 Jun 128 Jun 1 12:25 telemetry.pol 1 12:25 telemetryegress.pol User can also ssh into ExtremeAnalytics and verify that sFlow and GRE packets are being sent to Analytics Engine. You should see both sFlow and GRE packets being sent from all configured sFlow sources. ExtremeAnalytics Appliance root@EA.k12.edu:~$ tcpdump -i eth0 proto gre -n tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes 08:47:48.041661 IP 192.168.200.1 > 192.168.109.252: GREv0, length 64: gre-proto-0x88be root@EA.k12.edu:~$ tcpdump -i eth0 port 6343 -n tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes 08:49:10.516064 IP 192.168.109.2.56596 > 192.168.109.252.6343: sFlowv5, IPv4 agent 192.168.200.1, agent-id 0, length 1276 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 150 Validated Designs – Infrastructure & Topology Netflow configuration can be verified from the ExtremeWireless Controller graphical user interface. Within the wireless controller navigate to VNS Global Netflow/MirrorN. Verify that Netflow Export-Destination IP Address is set to ExtremeAnalytics Engine. User can also ssh into ExtremeAnalytics and verify that IPFIX packets are being sent to the Analytics Engine from the wireless controllers. ExtremeAnalytics Appliance root@EA.k12.edu:~$ tcpdump -i eth0 port 2095 -n tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes 11:38:05.144505 IP 192.168.70.2.2095 > 192.168.109.252.2095: UDP, length 1180 11:38:28.967082 IP 192.168.70.6.2095 > 192.168.109.252.2095: UDP, length 388 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 151 Validated Designs – Infrastructure & Topology Remote Site Connectivity via MAN In this section, VLAN interfaces will be configured to connect the District Office/School 1 to the other three schools. Since the other schools are not configured at this time, this section is a preparation for connectivity to the other schools. After the other schools are configured, these VLAN interfaces with protocols will become fully operational. Remote Site Connectivity Configuration In this section, VLAN interfaces will be configured to connect the District Office/School 1 to the other three schools. Each Controlling Bridge, in the District Office, will have a single port which will connect to a MAN with connectivity to all schools. Each port will have five point-to-point VLAN interfaces configured. The connectivity between the DO/SC1 and all schools will be fully meshed within the simulated WAN cloud. This configuration offers full redundancy for all schools to the DO/SC1. 1. Configure five VLANs for the remote schools. Refer to the VLAN names labeled for Remote Site Connectivity for VLAN names in the VLAN Subnet Matrix above. All port assignments will be tagged. Controlling Bridge 1 create vlan "VLAN_0101" configure vlan VLAN_0101 description "To SC2 Left" configure vlan VLAN_0101 tag 101 configure vlan VLAN_0101 add ports 1:57 tagged create vlan "VLAN_0102" configure vlan VLAN_0102 description "To SC3 Left" configure vlan VLAN_0102 tag 102 configure vlan VLAN_0102 add ports 1:57 tagged create vlan "VLAN_0103" configure vlan VLAN_0103 description "To SC4" configure vlan VLAN_0103 tag 103 configure vlan VLAN_0103 add ports 1:57 tagged create vlan "VLAN_0104" configure vlan VLAN_0104 description "To SC2 Right" configure vlan VLAN_0104 tag 104 configure vlan VLAN_0104 add ports 1:57 tagged create vlan "VLAN_0105" configure vlan VLAN_0105 description "To SC3 Right" configure vlan VLAN_0105 tag 105 configure vlan VLAN_0105 add ports 1:57 tagged Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 152 Validated Designs – Infrastructure & Topology Controlling Bridge 2 create vlan "VLAN_0201" configure vlan VLAN_0201 description "To SC2 Right" configure vlan VLAN_0201 tag 201 configure vlan VLAN_0201 add ports 1:57 tagged create vlan "VLAN_0202" configure vlan VLAN_0202 description "To SC3 Right" configure vlan VLAN_0202 tag 202 configure vlan VLAN_0202 add ports 1:57 tagged create vlan "VLAN_0203" configure vlan VLAN_0203 description "To SC4" configure vlan VLAN_0203 tag 203 configure vlan VLAN_0203 add ports 1:57 tagged create vlan "VLAN_0204" configure vlan VLAN_0204 description "To SC2 Left" configure vlan VLAN_0204 tag 204 configure vlan VLAN_0204 add ports 1:57 tagged create vlan "VLAN_0205" configure vlan VLAN_0205 description "To SC3 Left" configure vlan VLAN_0205 tag 205 configure vlan VLAN_0205 add ports 1:57 tagged 2. Configure ten point-to-point interfaces for the remote schools. Refer to the subnets labeled for Remote Site Connectivity for VLAN names in the VLAN Subnet Matrix above. All interfaces are configured as point-to-point interfaces /30 subnets. Controlling Bridge 1 configure configure configure configure configure enable enable enable enable enable vlan vlan vlan vlan vlan VLAN_0101 VLAN_0102 VLAN_0103 VLAN_0104 VLAN_0105 ipforwarding ipforwarding ipforwarding ipforwarding ipforwarding vlan vlan vlan vlan vlan ipaddress ipaddress ipaddress ipaddress ipaddress 192.168.101.1 255.255.255.252 192.168.101.5 255.255.255.252 192.168.101.9 255.255.255.252 192.168.101.13 255.255.255.252 192.168.101.17 255.255.255.252 VLAN_0101 VLAN_0102 VLAN_0103 VLAN_0104 VLAN_0105 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 153 Validated Designs – Infrastructure & Topology Controlling Bridge 2 configure configure configure configure configure enable enable enable enable enable vlan vlan vlan vlan vlan VLAN_0201 VLAN_0202 VLAN_0203 VLAN_0204 VLAN_0205 ipforwarding ipforwarding ipforwarding ipforwarding ipforwarding vlan vlan vlan vlan vlan ipaddress ipaddress ipaddress ipaddress ipaddress 192.168.201.1 255.255.255.252 192.168.201.5 255.255.255.252 192.168.201.9 255.255.255.252 192.168.201.13 255.255.255.252 192.168.201.17 255.255.255.252 VLAN_0201 VLAN_0202 VLAN_0203 VLAN_0204 VLAN_0205 3. Configure five OSPF instances for the remote schools. OSPF is used to distribute the routes from all subnets district wide. Every VLAN at each location should be advertised with these links. User access VLANs will be distributed as directly connected routes. The base OSPF configuration was previously executed in an earlier location in this document. Controlling Bridge 1 configure ospf add vlan VLAN_0101 area 0.0.0.0 configure ospf vlan VLAN_0101 authentication encrypted md5 101 "#$Gu149gIf1AYT3OwKOnDZtmS4px1XgA==" configure ospf add vlan VLAN_0102 area 0.0.0.0 configure ospf vlan VLAN_0102 authentication encrypted md5 102 "#$g0hMgvchaO3hswaAYVwljm8tzZex3Q==" configure ospf add vlan VLAN_0103 area 0.0.0.0 configure ospf vlan VLAN_0103 authentication encrypted md5 103 "#$wFxZ3OrhRTV1BSrMOkBmEKK7LtOl+A==" configure ospf add vlan VLAN_0104 area 0.0.0.0 configure ospf vlan VLAN_0104 cost 10 configure ospf vlan VLAN_0104 authentication encrypted md5 104 "#$KctAhEoGGuGlz5nHfwf6c3h43MPTfQ==" configure ospf add vlan VLAN_0105 area 0.0.0.0 configure ospf vlan VLAN_0105 cost 10 configure ospf vlan VLAN_0105 authentication encrypted md5 105 "#$TEXUCLXZYQxSpV3ckjeVUaGgKX0sNw==" Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 154 Validated Designs – Infrastructure & Topology Controlling Bridge 2 configure ospf add vlan VLAN_0201 area 0.0.0.0 configure ospf vlan VLAN_0201 authentication encrypted md5 201 "#$LaCI0HVIisZwGc6nHkVc/Hd/XZLlfA==" configure ospf add vlan VLAN_0202 area 0.0.0.0 configure ospf vlan VLAN_0202 authentication encrypted md5 202 "#$0Brc80HYFwOxrW+m6qd2ZxOC2SvYxw==" configure ospf add vlan VLAN_0203 area 0.0.0.0 configure ospf vlan VLAN_0203 authentication encrypted md5 203 "#$YzEfeBqJUkiBoVCplQPoII235wocEQ==" configure ospf add vlan VLAN_0204 area 0.0.0.0 configure ospf vlan VLAN_0204 cost 10 configure ospf vlan VLAN_0204 authentication encrypted md5 204 "#$Ebe2LNvTfKsRuEZpWm2DDZFai3jeyg==" configure ospf add vlan VLAN_0205 area 0.0.0.0 configure ospf vlan VLAN_0205 cost 10 configure ospf vlan VLAN_0205 authentication encrypted md5 205 "#$CPvdZXYXy4VzXrOu19rPOaShHzlJoQ==" Authentication – Netlogin At the District Office, authentication with netlogin dot1x and MAC is enabled on all ports except for the uplink and server ports. The authentication order is dot1x MAC. When complete the configuration should look similar to the one below: Controlling Bridge 1 and Controlling Bridge 2 enable netlogin dot1x mac configure netlogin authentication protocol-order dot1x mac web-based enable netlogin ports 1:1-4,1:6,1:8,1:10,1:14,1:16,1:18,1:20-44,1:50-52,1:54-56,1:5872,100:1-24,110:2-24 dot1x enable netlogin ports 1:1-4,1:6,1:8,1:10,1:14,1:16,1:18,1:20-44,1:50-52,1:54-56,1:5872,100:1-24,110:1-24 mac configure netlogin add mac-list ff:ff:ff:ff:ff:ff 48 ExtremeSwitching Stack enable netlogin dot1x mac configure netlogin authentication protocol-order dot1x mac web-based enable netlogin ports 1:1-50,2:1-50,3:1-50,4:1-50 dot1x enable netlogin ports 1:1-50,2:1-50,3:1-50,4:1-50 mac configure netlogin add mac-list ff:ff:ff:ff:ff:ff 48 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 155 Validated Designs – Infrastructure & Topology School 2 School-2 Bridge Port Extenders MLAGs Redundant Controller Bridges Controlling Bridge 1 Controlling Bridge 2 School 2 includes a pair of ExtremeSwitching X590 switches, which serve as the controlling bridges (CBs). The V400 devices serve as the bridge port extenders (BPEs). The two CBs provide uplinks to every BPE in the topology. Because of this configuration, multi-chassis link aggregation (MLAG) can be used to provide redundancy to all network users. ExtremeWireless access points can be connected to the ports of Power over Ethernet (PoE) capable BPEs and/or PoE ports in the stack. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 156 Validated Designs – Infrastructure & Topology VLANs and Subnets at School 2 Below is list and table grouping VLANs by functionality at School 2. This functionality includes the following types: • Appliance - VLAN for Extreme Smart OmniEdge appliances. • Management – Used to communicate with Extreme Smart OmniEdge appliances and routing protocols. • Remote Site Connectivity- Point to point interfaces used for connectivity between School 2 and the District Office/School 1. • Local Site Connectivity - VLAN interfaces used to distribute static and directly interfaces into OSPF and provide OSPF services to the ExtremeWireless controllers. • ISC – VLAN for the MLAG Interswitch Connection for the MLAG Interswitch Connection • Access VLAN - VLANs for wired users, wireless users, and networked devices. Device VLAN Name Subnet Tag Type Controlling Bridge 1 Controlling Bridge 2 Controlling Bridge 1 Controlling Bridge 2 Controlling Bridge 1 Controlling Bridge 2 Controlling Bridge 1 Controlling Bridge 2 Controlling Bridge 1 Controlling Bridge 2 Controlling Bridge 1 Controlling Bridge 2 Controlling Bridge 1 Controlling Bridge 2 Controlling Bridge 1 Controlling Bridge 2 Controlling Bridge 1 Controlling Bridge 2 Controlling Bridge 1 Controlling Bridge 2 Lo0 Lo0 VLAN_0101 VLAN_0201 VLAN_0204 VLAN_0104 VLAN_0060 192.168.200.3/32 192.168.200.4/32 192.168.101.0/30 192.168.201.0/30 192.168.201.12/30 192.168.101.12/30 192.168.61.0/24 1003 1004 101 201 204 104 60 Management Management Remote Site Connectivity Remote Site Connectivity Remote Site Connectivity Remote Site Connectivity Local Site Connectivity vpexmlag 169.254.0.0/16 4089 ISC VLAN_1600 172.16.10.0/24 1600 Access VLAN VLAN_1900 172.19.192.0/27 1900 Access VLAN VLAN_2200 172.21.4.0/22 2200 Access VLAN VLAN_1700 172.17.4.0/22 1700 Access VLAN VLAN_1800 172.18.32.0/19 1800 Access VLAN Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 157 Validated Designs – Infrastructure & Topology School 2 – Configuration 1. VPEX Full Automation determines if switches are CB capable and BPEs connected. If conditions are met, vpex functionality is enabled and CBs are rebooted. 5. VPEX Full Automation enables VPEX Partial Automation. 6. VPEX Partial Automation configures a slot number for each attached BPE, configures the BPE module type, configures CB ports attached to BPEs as VPEX ports, and enables MLAG ports with appropriate peer IDs. Bridge Port Extenders MLAGs Redundant Controlling Bridges Controlling Bridge 1 Controlling Bridge 2 2. VPEX Full Automation configures a LAG between CB1. 3. VPEX Full Automation creates and configures an ISC VLAN, add LACP port, and configures IP Interface. 4. VPEX Full Automation creates and configures an MLAG ISC, and configures CBs as peers. Extended Edge with MLAG Configuration In order to take advantage of VPEX Full Automation, the following cabling requirements need to be met: • To create an MLAG for ISC CB1 and CB2 should be cabled together: • To enable VPEX mode, the CBs should be cabled to at least one BPE: Once cabled properly, power-on CB1, CB2, BPE1, and BPE2. After switches are finished running VPEX Full Automation and VPEX Partial Automation, verify the CBs have been properly configured and functioning. Note To better control slot numbering, the user may decide to allow the BPEs power on one at a time. If all BPEs are turned on at the same time, there is no mechanism to guarantee slot order. Slot order is determined by which BPE LLDP message is received first by the CBs. VPEX Full Automation and VPEX Partial Automation processes can take eight minutes or longer to complete. Please be patient. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 158 Validated Designs – Infrastructure & Topology 1. Verify VPEX support has been enabled VPEX Full Automation. Controlling Bridge 1 and 2 Slot-1 VPEX X590-24x-1q-2c.16 # show vpex Virtual Port Extender: Enabled Auto-Configuration: Disabled Cascade Port Slot ============= - Verify VPEX is enabled • Prompt changes indicating VPEX is enabled. • Virtual Port Extender indicates enabled. 2. Verify VPEX Full Automation has created and configured a LAG between CB1 and CB2. Verify LAGs have been configured between the CBs and BPEs. Controlling Bridge 1 and 2 enable sharing 1:29 grouping 1:29,1:33 algorithm address-based custom lacp enable sharing 1:23 grouping 1:23 algorithm address-based custom lacp enable sharing 1:24 grouping 1:24 algorithm address-based custom lacp Controlling Bridge 1 and 2 Verify LACP configuration • Verify Agg MBR = Y • Verify Link State = A Slot-1 VPEX X590-24x-1q-2c.10 # show sharing Load Sharing Monitor Config Current Agg Min Ld Share Dist Ld Share Agg Link Link Up Master Master Control Active Algorithm Flags Group Mbr State Transitions ================================================================================ 1:23 1:23 LACP 1 custom A 1:23 Y A 1 1:24 1:24 LACP 1 custom A 1:24 Y A 1 1:29 1:29 LACP 1 custom A 1:29 Y A 1 custom 1:33 Y A 1 ================================================================================ … 3. Verify VPEX Full Automation has created and configured an ISC VLAN, added aCB to CB LACP port, and configured IP interfaces. Controlling Bridge 1 create vlan "vpexmlag" configure vlan vpexmlag tag 4089 configure vlan vpexmlag add ports 1:29 tagged configure vlan vpexmlag ipaddress 169.254.0.1 255.255.0.0 Controlling Bridge 2 create vlan "vpexmlag" configure vlan vpexmlag tag 4089 configure vlan vpexmlag add ports 1:29 tagged configure vlan vpexmlag ipaddress 169.254.0.2 255.255.0.0 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 159 Validated Designs – Infrastructure & Topology Controlling Bridge 1 Slot-1 VPEX X590-24x-1q-2c.2 # show vlan vpexmlag VLAN Interface with name vpexmlag created by user Admin State: Enabled Tagging: 802.1Q Tag 4089 Description: None Virtual router: VR-Default IPv4 Forwarding: Disabled IPv4 MC Forwarding: Disabled Verify VPEX Full Automation Primary IP: 169.254.0.1/16 configured VLAN; • VLAN named vpexmlag created … • IP Address configured for VLAN Ports: 1. (Number of active ports=1) • LAG port added to VLAN. Tag: *1:29g • I Flag confirms ISC VLAN. … Slot-1 VPEX X590-24x-1q-2c.7 # show vlan Untagged ports auto-move: Inform ---------------------------------------------------------------------------------Name VID Protocol Addr Flags Proto Ports Virtual Active router /Total ---------------------------------------------------------------------------------vpexmlag 4089 169.254.0.1 /16 ------I--------------------- ANY 1 /1 Controlling Bridge 2 Slot-1 VPEX X590-24x-1q-2c.2 # show vlan vpexmlag VLAN Interface with name vpexmlag created by user Admin State: Enabled Tagging: 802.1Q Tag 4089 Description: None Virtual router: VR-Default IPv4 Forwarding: Disabled IPv4 MC Forwarding: Disabled Primary IP: 169.254.0.2/16 … Ports: 1. (Number of active ports=1) Tag: *1:29g … Slot-1 VPEX X590-24x-1q-2c.7 # show vlan Untagged ports auto-move: Inform ---------------------------------------------------------------------------------Name VID Protocol Addr Flags Proto Ports Virtual Active router /Total ---------------------------------------------------------------------------------vpexmlag 4089 169.254.0.2 /16 ------I--------------------- ANY 1 /1 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 160 Validated Designs – Infrastructure & Topology 4. Verify VPEX Full Automation has properly created and configured an MLAG which includes; configuring the CBs as peers, adding the CB to BPE LAGs as MLAG ports and assigning appropriate MLAG IDs. Controlling Bridge 1 create mlag peer "vpexmlag" configure mlag peer "vpexmlag" ipaddress 169.254.0.2 vr VR-Default enable mlag port 1:23 peer "vpexmlag" id 5101 enable mlag port 1:24 peer "vpexmlag" id 5100 Controlling Bridge 2 create mlag peer "vpexmlag" configure mlag peer "vpexmlag" ipaddress 169.254.0.1 vr VR-Default enable mlag port 1:23 peer "vpexmlag" id 5101 enable mlag port 1:24 peer "vpexmlag" id 5100 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 161 Validated Designs – Infrastructure & Topology Controlling Bridge 1 Slot-1 VPEX X590-24x-1q-2c.20 # show Multi-switch Link Aggregation Peers: MLAG Peer : VLAN : Local IP Address : MLAG ports : Checkpoint Status : Rx-Hellos : Rx-Checkpoint Msgs: Rx-Hello Errors : Hello Timeouts : Up Time : Local MAC : Config'd LACP MAC : Authentication : 1. Peer name and peer IP address are configured. 2. Local IP address configured. mlag peer 3. Peer IP address is known. vpexmlag vpexmlag Virtual Router : 169.254.0.1 Peer IP Address : 2 Tx-Interval : Up Peer Tx-Interval : 5720 Tx-Hellos : 896 Tx-Checkpoint Msgs: 0 Tx-Hello Errors : 0 Checkpoint Errors : 0d:1h:33m:11s Peer Conn.Failures: 4. Checkpoint Status is UPPeer MAC 00:04:96:a3:fa:cc : 5. Hello and Checkpoint Messages incrementing. None Current LACP MAC : 6. Error messages are not incrementing but might None be present. VR-Default 169.254.0.2 1000 ms 1000 ms 5731 6242 0 0 1 00:04:96:a3:fb:18 00:04:96:a3:fb:18 Alternate path information: None Slot-1 VPEX X590-24x-1q-2c.21 # show mlag ports Local Local Remote MLAG Local Link Remote Peer Fail Fail Id Port State Link Peer Status Count Count ================================================================================ 5101 1:23 A Up vpexmlag Up 0 0 5100 1:24 A Up vpexmlag Up 0 0 ================================================================================ Local Link State: A - Active, D - Disabled, R - Ready, NP - Port not present Remote Link : Up - One or more links are active on the remote switch, Down - No links are active on the remote switch, N/A - The peer has not communicated link state foris Active this MLAG 1. Local Link State 2. Remote Link is UP port Number of Multi-switch Link Aggregation Groups Convergence control Reload Delay Interval Reload Delay Link Up Isolation Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 : : : : : 3. Peer Status is UP 4. Local and Remote Fail Counts not 2 incrementing. Conserve Access Lists 30 seconds Disabled Off 162 Validated Designs – Infrastructure & Topology Controlling Bridge 2 Slot-1 VPEX X590-24x-1q-2c.15 # show mlag peer Multi-switch Link Aggregation Peers: MLAG Peer : VLAN : Local IP Address : MLAG ports : Checkpoint Status : Rx-Hellos : Rx-Checkpoint Msgs: Rx-Hello Errors : Hello Timeouts : Up Time : Local MAC : Config'd LACP MAC : Authentication : vpexmlag vpexmlag 169.254.0.2 2 Up 5777 6301 0 0 0d:1h:34m:6s 00:04:96:a3:fb:18 None None Virtual Router : Peer IP Address : Tx-Interval : Peer Tx-Interval : Tx-Hellos : Tx-Checkpoint Msgs: Tx-Hello Errors : Checkpoint Errors : Peer Conn.Failures: Peer MAC : Current LACP MAC : VR-Default 169.254.0.1 1000 ms 1000 ms 5813 905 0 0 1 00:04:96:a3:fa:cc 00:04:96:a3:fb:18 Alternate path information: None Slot-1 VPEX X590-24x-1q-2c.16 # show mlag ports Local Local Remote MLAG Local Link Remote Peer Fail Fail Id Port State Link Peer Status Count Count ================================================================================ 5101 1:23 A Up vpexmlag Up 0 0 5100 1:24 A Up vpexmlag Up 0 0 ================================================================================ Local Link State: A - Active, D - Disabled, R - Ready, NP - Port not present Remote Link : Up - One or more links are active on the remote switch, Down - No links are active on the remote switch, N/A - The peer has not communicated link state for this MLAG port Number of Multi-switch Link Aggregation Groups Convergence control Reload Delay Interval Reload Delay Link Up Isolation Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 : : : : : 2 Conserve Access Lists 30 seconds Disabled Off 163 Validated Designs – Infrastructure & Topology 5. Verify VPEX Full Automation has enabled VPEX Partial Automation. Controlling Bridge 1 and 2 enable vpex auto-configuration Controlling Bridge 1 and 2 Slot-1 VPEX X590-24x-1q-2c.16 # show vpex Virtual Port Extender: Enabled Auto-Configuration: Enabled Cascade Port Slot ============= - Verify Auto-Configuration is enabled • Auto-Configuration indicator indicates enabled. 6. Verify the VPEX Partial Automation properly configured the VPEX slots. Controlling Bridge 1 configure configure configure configure slot 100 module V400-48p-10GE4 sys-recovery-level slot 100 reset slot 101 module V400-24p-10GE2 sys-recovery-level slot 101 reset configure vpex port 1:23 slot 101 configure vpex port 1:24 slot 100 Controlling Bridge 2 configure configure configure configure slot 100 module V400-48p-10GE4 sys-recovery-level slot 100 reset slot 101 module V400-24p-10GE2 sys-recovery-level slot 101 reset configure vpex port 1:23 slot 101 configure vpex port 1:24 slot 100 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 164 Validated Designs – Infrastructure & Topology Controlling Bridge 1 Slot-1 VPEX X590-24x-1q-2c.25 # show vpex bpe 1. Module type configured. 2. Verify Port State is Enabled 3. Verify Link Sate is Active Casc PE Slot Port Model MAC Address Description ====================================================================================== =========================== 100 1:24 V400-48p-10GE4 d8:84:66:f2:d5:11 none 101 1:23 V400-24p-10GE2 d8:84:66:f2:ae:cd none Slot-1 VPEX X590-24x-1q-2c.26 # show vpex ports Port Cascade Ext Port Link PECSP PE CSPOpen CSP Role # Port Slot State State MAC Address MAC Address Loc Rem Flags ====================================================================================== ===== 1:23 1:23 101 E A d8:84:66:f2:ae:e6 d8:84:66:f2:ae:cd 1 1 1:24 1:24 100 E A d8:84:66:f2:d5:42 d8:84:66:f2:d5:11 1 1 ====================================================================================== ===== … Controlling Bridge 2 Verify MAC addresses for BPEs match on both CBs. Slot-1 VPEX X590-24x-1q-2c.19 # show vpex bpe Casc PE Slot Port Model MAC Address Description ====================================================================================== =========================== 100 1:24 V400-48p-10GE4 d8:84:66:f2:d5:11 none 101 1:23 V400-24p-10GE2 d8:84:66:f2:ae:cd none Slot-1 VPEX X590-24x-1q-2c.20 # show vpex ports Port Cascade Ext Port Link PECSP PE CSPOpen CSP Role # Port Slot State State MAC Address MAC Address Loc Rem Flags ====================================================================================== ===== 1:23 1:23 101 E A d8:84:66:f2:ae:e6 d8:84:66:f2:ae:cd 1 1 1:24 1:24 100 E A d8:84:66:f2:d5:42 d8:84:66:f2:d5:11 1 1 ====================================================================================== ===== … Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 165 Validated Designs – Infrastructure & Topology 7. Manually delete all ports from default VLAN, disable MSTP, and free up ACL resources. 8. Manually configure a loopback interface for routing and device management. 9. Manually configure a base OSPF configuration. 10. Manually configure VLAN for local site connectivity. 11. Manually configure VRRP for local site connectivity VLAN. 12. Manually configure OSPF for local site connectivity VLAN. Bridge Port Extenders MLAGs Redundant Controlling Bridges Controlling Bridge 1 Controlling Bridge 2 7. Remove ports from Default VLAN, disable MSTP, and free up ACL resources. The default VLAN will not be needed for this EVD so all ports will be removed from the VLAN. Because of this MSTP instance s0 will also be disabled. Controlling Bridge 1 and 2 configure configure configure configure vlan default delete ports all vr VR-Default delete ports 1:1-36,100:1-52,101:1-26 vr VR-Default add ports 1:1-36,100:1-52,101:1-26 vlan default delete ports 1:1-36,100:1-52,101:1-26 disable stpd s0 configure policy resource-profile default profile-modifier no-mac enable no-ipv6 enable Controlling Bridge 1 and 2 Slot-1 VPEX X590-24x-1q-2c.11 # show stpd s0 Stpd: s0 Stp: DISABLED Number of Ports: 0 Rapid Root Failover: Disabled Operational Mode: MSTP Default Binding Mode: 802.1D MSTI Instance: CIST 802.1Q Tag: (none) Ports: (none) Participating Vlans: (none) Auto-bind Vlans: Default … Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 Verify the following STP variables for s0: • STP is disabled • No Ports participating in STP • No VLANs participating in STP 166 Validated Designs – Infrastructure & Topology 8. Configure Loopback VLAN and Interface The internal loopback interface serves as the primary interface for in-band management in this topology. It also serves as the interface between the Extreme Network appliances and the devices. Controlling Bridge 1 create vlan "lo0" configure vlan lo0 tag 1001 enable loopback-mode vlan lo0 configure vlan lo0 ipaddress 192.168.200.3 255.255.255.255 enable ipforwarding vlan lo0 Controlling Bridge 2 Configuring system loopback interface involves creating a VLAN with a tag and enabled for the following IP services: loopback mode and IP forwarding. Loopback interface is configured with a /32 subnet mask. create vlan "lo0" configure vlan lo0-Right tag 1004 enable loopback-mode vlan lo0 configure vlan lo0 ipaddress 192.168.200.4 255.255.255.255 enable ipforwarding vlan lo0 9. Configure OSPF Base Configuration With the creation of the loopback interface, it is now possible to create the base configuration OSPF routing. OSPF will redistribute any directly connected interfaces and static routes into the routing table. This will be more critical later when remote schools are attached to the topology. Controlling Bridge 1 configure ospf routerid 192.168.200.3 enable ospf enable ospf export direct cost 0 type ase-type-1 enable ospf export static cost 0 type ase-type-1 configure ospf add vlan lo0 area 0.0.0.0 The loopback interface created in the previous step is configured as the OSPF Router-ID. Loopback interfaces is added to area 0.0.0.0 Controlling Bridge 2 configure ospf routerid 192.168.200.4 enable ospf enable ospf export direct cost 0 type ase-type-1 enable ospf export static cost 0 type ase-type-1 configure ospf add vlan lo0 area 0.0.0.0 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 167 Validated Designs – Infrastructure & Topology 10. Configure VLAN and Interface for Local Site Connectivity on Controlling Bridges. Configure a VLAN for local site connectivity on the controlling bridges This VLAN is used to redistribute directly connected and static routes into OSPF. It is also used by APs for connectivity to the wireless controllers. Controlling Bridge 1 Configure local-site VLAN_0060 with; create vlan "VLAN_0060" 1. VLAN Descriptions configure vlan VLAN_0060 description "School 2 Local Site Connectivity" 2. VLAN Tag 3. LACP trunk port Added to VLAN configure vlan VLAN_0060 tag 60 4. IP Address Configured configure vlan VLAN_0060 add ports 1:29 tagged 5. IP Forwarding Enabled for unicast routing configure vlan VLAN_0060 ipaddress 192.168.61.2 255.255.255.0 6. BOOTP Relay Enabled for DHCP enable ipforwarding vlan VLAN_0060 7. Iproute Sharing (ECMP) enable bootprelay ipv4 vlan VLAN_0060 enable iproute sharing vr VR-Default Controlling Bridge 2 create vlan "VLAN_0060" configure vlan VLAN_0060 description "School 2 Local Site Connectivity" configure vlan VLAN_0060 tag 60 configure vlan VLAN_0060 add ports 1:29 tagged configure vlan VLAN_0060 ipaddress 192.168.61.3 255.255.255.0 enable ipforwarding vlan VLAN_0060 enable bootprelay ipv4 vlan VLAN_0060 enable iproute sharing vr VR-Default At the prompt issue show VLAN_0060 (output truncated) and verify: Controlling Bridge 1 Slot-1 VPEX X590-24x-1q-2c.49 # show vlan VLAN_0060 VLAN Interface with name VLAN_0060 created by user Admin State: Enabled Tagging: 802.1Q Tag 60 Description: School 2 Local Site Connectivity Virtual router: VR-Default IPv4 Forwarding: Enabled IPv4 MC Forwarding: Disabled Primary IP: 192.168.61.2/24 … Ports: 1. (Number of active ports=1) Tag: *1:29g … Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 Verify the following items: 1. VLAN Name, State and Tag 2. VLAN Description 3. LACP trunk port Added to VLAN 4. IP Address Configured 5. IP Forwarding Enabled for unicast routing 168 Validated Designs – Infrastructure & Topology Controlling Bridge 2 Slot-1 VPEX X590-24x-1q-2c.35 # show vlan VLAN_0060 VLAN Interface with name VLAN_0060 created by user Admin State: Enabled Tagging: 802.1Q Tag 60 Description: School 2 Local Site Connectivity Virtual router: VR-Default IPv4 Forwarding: Enabled IPv4 MC Forwarding: Disabled Primary IP: 192.168.61.3/24 … Ports: 1. (Number of active ports=1) Tag: *1:29g … 11. Configure VRRP on Local Site Connectivity VLAN on the Controlling Bridges. Configure VRRP for the VLAN to provide the ExtremeWireless IdentiFi APs a common gateway to reach the ExtremeWireless Controllers. Controlling Bridge 1 create vrrp vlan VLAN_0060 vrid 60 configure vrrp vlan VLAN_0060 vrid 60 priority 254 configure vrrp vlan VLAN_0060 vrid 60 fabric-routing on configure vrrp vlan VLAN_0060 vrid 60 add 192.168.61.1 enable vrrp vlan VLAN_0060 vrid 60 Controlling Bridge 2 create vrrp vlan VLAN_0060 vrid 60 configure vrrp vlan VLAN_0060 vrid 60 fabric-routing on configure vrrp vlan VLAN_0060 vrid 60 add 192.168.61.1 enable vrrp vlan VLAN_0060 vrid 60 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 VRRP instance ID for VLAN_0060. Priority is configured to make master election more reliable. Fabric-routing is enabled so that packets don’t have to be routed through the VRRP master if a more direct route exists on the receiving interface The VRRP virtual IP address 169 Validated Designs – Infrastructure & Topology At the prompt, issue show vrrp and verify vlan VLAN_0060 configuration. FR value must be Y on both VRRP master and backup Controlling Bridge 1 Slot-1 VPEX X590-24x-1q-2c.7 # show vrrp Virtual Master VLAN Name VRID Pri IP Address State MAC Address TP/TR/TV/P/T VLAN_00(En) 0060 254 192.168.61.1 MSTR 00:00:5e:00:01:3c 0 0 0 Y 1 /FR/G/HM Y N N En-Enabled, Ds-Disabled, Pri-Priority, T-Advert Timer, P-Preempt TP-Tracked Pings, TR-Tracked Routes, TV-Tracked VLANs, FR-Fabric Routing, G-Group, HM-Host Mobility … Controlling Bridge 2 The switch with the highest priority has MSTR state and the other one BKUP. Slot-1 VPEX X590-24x-1q-2c.7# show vrrp Virtual Master VLAN Name VRID Pri IP Address State MAC Address TP/TR/TV/P/T VLAN_00(En) 0060 100 192.168.61.1 BKUP 00:00:5e:00:01:3c 0 0 0 Y 1 /FR/G/HM Y N N En-Enabled, Ds-Disabled, Pri-Priority, T-Advert Timer, P-Preempt TP-Tracked Pings, TR-Tracked Routes, TV-Tracked VLANs, FR-Fabric Routing, G-Group, HM-Host Mobility … 12. Configure OSPF Local Site Connectivity VLAN This interface will serve as the main routing aggregation point for all the user access VLANs. Therefore, it is very important that this interface has OSPF enabled. Controlling Bridge 1 configure ospf add vlan VLAN_0060 area 0.0.0.0 configure ospf vlan VLAN_0060 authentication encrypted md5 61 "#$9PzYK114lHuHzjGF1Dvl3GEu5uSEUA==" Connectivity VLANs added to area 0.0.0.0 MD5 Authentication was enabled to provide added security between OSPF adjacencies. Controlling Bridge 2 configure ospf add vlan VLAN_0060 area 0.0.0.0 configure ospf vlan VLAN_0060 authentication encrypted md5 61 "#$UUFVAm9buaJUoNv0+9+SKU+c3RlK1A==" Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 170 Validated Designs – Infrastructure & Topology At the prompt, issue show ospf neighbor (output truncated). Verify that routers see each other and that the state is FULL with MD5 encryption enabled. Controlling Bridge 1 Slot-1 VPEX X590-24x-1q-2c.8 # show ospf neighbor Adjacency state between neighbors should be Neighbor ID Pri State Up/Dead Time Address Full. OSPF router state should be DR or BDR. Interface BFD Session State ====================================================================================== ==== 192.168.200.4 1 FULL /DR 03:03:01:28/00:00:00:10 192.168.61.3 VLAN_0060 None … Controlling Bridge 2 Slot-1 VPEX X590-24x-1q-2c.8 # show ospf neighbor Neighbor ID Pri State Up/Dead Time Address Interface BFD Session State ====================================================================================== ==== 192.168.200.3 1 FULL /BDR 03:03:03:06/00:00:00:06 192.168.61.2 VLAN_0060 None … Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 171 Validated Designs – Infrastructure & Topology Wired User Access All access VLANs offer redundancy to the network with the use of configured VRRP gateways. All user credentials are authenticated using authentication to ExtremeControl and RADIUS. The following VLAN types are available at School 2: The Guest_Wired VLAN gives guest users access to School 2. This VLAN will be configured at all the schools. This access layer VLAN is typically the most restrictive of all VLANs. The Admin VLAN provides access layer connectivity to network administrators. These users will be assigned an Admin role by Extreme Policy Manger and ExtremeControl. This access layer VLAN is typically the least restrictive of the access VLANs. The NonAdmin_Wired VLAN provides access layer connectivity to other authorized users. These users will be assigned a Student or Faculty role by Extreme Policy Manger and ExtremeControl. Roles can be more granular than the ones presented here. Most users will access the school district network through this VLAN. The Network_Devices VLAN provides access layer connectivity to common network devices such as printers, VoIP phones, or security cameras. 1. Configure four wired user access VLANs on Controlling Bridges. 2. Configure all user access ports to Guest_Wired PVID. Bridge Port Extenders MLAGs Redundant Controlling Bridges Controlling Bridge 1 Controlling Bridge 2 3. Configure IP Address and IP Services on wired User Access VLANs 4. Configure VRRP on Controlling Bridges for user access VLANs. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 172 Validated Designs – Infrastructure & Topology The process of adding an access VLAN to the CB/BPE topology involves several steps. First, create the access VLAN and tag on the CBs. Then add the Local Site trunk port and MLAG ports as tag members of the access VLAN. Routing functionality will be configured including, IP address, VRRP for a common gateway, and IP forwarding. Note During these manual configuration steps, the user can choose to utilize mlag orchestration mode. This mode can be helpful to configure the exact same commands on both CBs. However, do not use this feature for configurations which need to be unique on CBs such as IP addresses, VRRP configurations, and OSPF configurations. To enable this mode, refer to mlag orchestration mode operation on Page 16. 1. Configure four access VLANs and assign ports. Controlling Bridge 1 create vlan "VLAN_1900" configure vlan VLAN_1900 description "Wired Guest VLAN" configure vlan VLAN_1900 tag 1900 configure vlan VLAN_1900 add ports 1:29 tagged Four Wired Access VLANs created with tag and description. Add LACP Trunk port. create vlan "VLAN_1600" configure vlan VLAN_1600 description "Administrator Access VLAN" configure vlan VLAN_1600 tag 1600 configure vlan VLAN_1600 add ports 1:29 tagged create vlan "VLAN_2200" configure vlan VLAN_2200 description "Network Devices Access VLAN" configure vlan VLAN_2200 tag 2200 configure vlan VLAN_2200 add ports 1:29 tagged create vlan " VLAN_1700" configure vlan VLAN_1700 description "Wired Non Administrator Access VLAN" configure vlan VLAN_1700 tag 1700 configure vlan VLAN_1900 add ports 1:29 tagged Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 173 Validated Designs – Infrastructure & Topology Controlling Bridge 2 create vlan "VLAN_1900" configure vlan VLAN_1900 description "Wired Guest VLAN" configure vlan VLAN_1900 tag 1900 configure vlan VLAN_1900 add ports 1:29 tagged create vlan "VLAN_1600" configure vlan VLAN_1600 description "Administrator Access VLAN" configure vlan VLAN_1600 tag 1600 configure vlan VLAN_1600 add ports 1:29 tagged create vlan "VLAN_2200" configure vlan VLAN_2200 description "Network Devices Access VLAN" configure vlan VLAN_2200 tag 2200 configure vlan VLAN_2200 add ports 1:29 tagged create vlan " VLAN_1700" configure vlan VLAN_1700 description "Wired Non Administrator Access VLAN" configure vlan VLAN_1700 tag 1700 configure vlan VLAN_1900 add ports 1:29 tagged After creating VLANs, any port to be used for user access should be configured to have a PVID of Guest_Wired as the native VLAN. When complete the configuration should look similar to the one below: Controlling Bridge 1 All wired access ports are added to the Guest_Wired VLAN as untagged (PVID). configure vlan VLAN_1900 add ports 1:2-22,100:1-48,101:1-24 untagged Controlling Bridge 2 configure vlan VLAN_1900 add ports 1:2-22,100:1-48,101:1-24 untagged Caution When assigning PVID of access ports to Guest_Wired, use caution that ports with previous configuration are not reconfigured. These ports might include the following: • Local Site LACP Trunk Port • Uplink ports between Controlling Bridges and Bridge Port Extenders • Uplink ports between X590/X690 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 174 Validated Designs – Infrastructure & Topology 2. Configure Access VLAN Interface and other routing services. Controlling Bridge 1 configure vlan VLAN_1900 ipaddress 172.19.192.2 255.255.255.224 enable ipforwarding vlan VLAN_1900 enable bootprelay ipv4 vlan VLAN_1900 configure vlan VLAN_1600 ipaddress 172.16.10.2 255.255.255.0 enable ipforwarding vlan VLAN_1600 enable bootprelay ipv4 vlan VLAN_1600 1. IP interface for four Wired Access VLANs configured. 2. IP Forwarding and BootP Relay enabled. configure vlan VLAN_1700 ipaddress 172.17.4.2 255.255.252.0 enable ipforwarding vlan VLAN_1700 enable bootprelay ipv4 vlan VLAN_1700 configure vlan VLAN_2200 ipaddress 172.21.4.2 255.255.252.0 enable ipforwarding vlan VLAN_2200 enable bootprelay ipv4 vlan VLAN_2200 Controlling Bridge 2 configure vlan VLAN_1900 ipaddress 172.19.192.3 255.255.255.224 enable ipforwarding vlan VLAN_1900 enable bootprelay ipv4 vlan VLAN_1900 configure vlan VLAN_1600 ipaddress 172.16.10.3 255.255.255.0 enable ipforwarding vlan VLAN_1600 enable bootprelay ipv4 vlan VLAN_1600 configure vlan VLAN_1700 ipaddress 172.17.4.3 255.255.252.0 enable ipforwarding vlan VLAN_1700 enable bootprelay ipv4 vlan VLAN_1700 configure vlan VLAN_2200 ipaddress 172.21.4.3 255.255.252.0 enable ipforwarding vlan VLAN_2200 enable bootprelay ipv4 vlan VLAN_2200 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 175 Validated Designs – Infrastructure & Topology 3. Configure Access VLAN VRRP between the X690 switches. Configure VRRP for the access VLANs to provide access VLAN users a virtual gateway address. Controlling Bridge 1 create vrrp vlan VLAN_1900 vrid 193 configure vrrp vlan VLAN_1900 vrid 193 fabric-routing on configure vrrp vlan VLAN_1900 vrid 193 add 172.19.192.1 enable vrrp vlan VLAN_1900 vrid 193 create vrrp vlan VLAN_1600 vrid 160 configure vrrp vlan VLAN_1600 vrid 160 priority 254 configure vrrp vlan VLAN_1600 vrid 160 fabric-routing on configure vrrp vlan VLAN_1600 vrid 160 add 172.16.10.1 enable vrrp vlan VLAN_1600 vrid 160 create vrrp vlan VLAN_1700 vrid 170 configure vrrp vlan VLAN_1700 vrid 170 fabric-routing on configure vrrp vlan VLAN_1700 vrid 170 add 172.17.4.1 enable vrrp vlan VLAN_1700 vrid 170 VRRP instance id for wired access VLANs. Priority is configured to make master election more reliable. Fabric-routing is enabled so that packets don’t have to be routed through the VRRP master if a more direct route exists on the receiving interface The VRRP virtual IP address create vrrp vlan VLAN_2200 vrid 210 configure vrrp vlan VLAN_2200 vrid 210 priority 254 configure vrrp vlan VLAN_2200 vrid 210 fabric-routing on configure vrrp vlan VLAN_2200 vrid 210 add 172.21.4.1 enable vrrp vlan VLAN_2200 vrid 210 Controlling Bridge 2 create vrrp vlan VLAN_1900 vrid 193 configure vrrp vlan VLAN_1900 vrid 193 priority 254 configure vrrp vlan VLAN_1900 vrid 193 fabric-routing on configure vrrp vlan VLAN_1900 vrid 193 add 172.19.192.1 enable vrrp vlan VLAN_1900 vrid 193 create vrrp vlan VLAN_1600 vrid 160 configure vrrp vlan VLAN_1600 vrid 160 fabric-routing on configure vrrp vlan VLAN_1600 vrid 160 add 172.16.10.1 enable vrrp vlan VLAN_1600 vrid 160 create vrrp vlan VLAN_1700 vrid 170 configure vrrp vlan VLAN_1700 vrid 170 priority 254 configure vrrp vlan VLAN_1700 vrid 170 fabric-routing on configure vrrp vlan VLAN_1700 vrid 170 add 172.17.4.1 enable vrrp vlan VLAN_1700 vrid 170 create vrrp vlan VLAN_2200 vrid 210 configure vrrp vlan VLAN_2200 vrid 210 fabric-routing on configure vrrp vlan VLAN_2200 vrid 210 add 172.21.4.1 enable vrrp vlan VLAN_2200 vrid 210 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 176 Validated Designs – Infrastructure & Topology At the prompt, issue show vrrp and verify VRRP configuration. Controlling Bridge 1 FR value must be Y on both VRRP master and backup Slot-1 VPEX X590-24x-1q-2c.82 # show vrrp Virtual Master VLAN Name VRID Pri IP Address State MAC Address TP/TR/TV/P/T VLAN_19(En) 0193 100 172.19.192.1 BKUP 00:00:5e:00:01:c1 0 0 0 Y 1 VLAN_16(En) 0160 254 172.16.10.1 MSTR 00:00:5e:00:01:a0 0 0 0 Y 1 VLAN_22(En) 0210 254 172.21.4.1 MSTR 00:00:5e:00:01:d2 0 0 0 Y 1 VLAN_17(En) 0170 100 172.17.4.1 BKUP 00:00:5e:00:01:aa 0 0 0 Y 1 /FR/G/HM Y N N Y N N Y N N Y N N En-Enabled, Ds-Disabled, Pri-Priority, T-Advert Timer, P-Preempt TP-Tracked Pings, TR-Tracked Routes, TV-Tracked VLANs, FR-Fabric Routing, G-Group, HM-Host Mobility Controlling Bridge 2 The switch with the highest priority has MSTR state and the other one BKUP. Slot-1 VPEX X590-24x-1q-2c.74 # show vrrp Virtual Master VLAN Name VRID Pri IP Address State MAC Address TP/TR/TV/P/T VLAN_19(En) 0193 254 172.19.192.1 MSTR 00:00:5e:00:01:c1 0 0 0 Y VLAN_16(En) 0160 100 172.16.10.1 BKUP 00:00:5e:00:01:a0 0 0 0 Y VLAN_22(En) 0210 100 172.21.4.1 BKUP 00:00:5e:00:01:d2 0 0 0 Y VLAN_17(En) 0170 254 172.17.4.1 MSTR 00:00:5e:00:01:aa 0 0 0 Y 1 1 1 1 /FR/G/HM Y N N Y N N Y N N Y N N En-Enabled, Ds-Disabled, Pri-Priority, T-Advert Timer, P-Preempt TP-Tracked Pings, TR-Tracked Routes, TV-Tracked VLANs, FR-Fabric Routing, G-Group, HM-Host Mobility Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 177 Validated Designs – Infrastructure & Topology Wireless User Access No Guest_Wireless VLAN is configured at School 2. Once a user is assigned the role of Guest, their traffic is directly tunneled to the controller. This bridging at controller functionality eliminates the need to configure a guest wireless VLAN at School 2. The NonAdmin_Wireless VLAN provides access layer connectivity to other authorized users. These users will be assigned Student or Faculty roles by Extreme Policy Manger and ExtremeControl. This VLAN will be bridged at the access point. Bridge Port Extenders MLAGs Redundant Controlling Bridges Controlling Bridge 1 Controlling Bridge 2 1. Configure NonAdmin wireless user access VLAN 2. Configure IP Address and IP Services for NonAdmin wireless user Access VLAN. 3. Configure VRRP for NonAdmin Wireless user access VLAN. Note During these manual configuration steps, user can choose to utilize mlag orchestration mode. This mode can be helpful to configure the exact same commands on both CBs. However, do not use this feature for configurations which need to be unique on CBs such as IP addresses, VRRP configurations, and OSPF configurations. To enable this mode, refer to mlag orchestration mode operation on Page 16. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 178 Validated Designs – Infrastructure & Topology 1. Configure the wireless access VLAN and assign ports. Configure the NonAdmin Wireless VLAN for wireless users. Controlling Bridge 1 Wireless Access VLAN created with tag and description. Add created create vlan "VLAN_1800" LACP ports to VLANs. configure vlan VLAN_1800 description "Wireless Non Administrator Access VLAN" configure vlan VLAN_1800 tag 1800 configure vlan VLAN_1800 add ports 1:29 tagged Controlling Bridge 2 create vlan "VLAN_1800" configure vlan VLAN_1800 description "Wireless Non Administrator Access VLAN" configure vlan VLAN_1800 tag 1800 configure vlan VLAN_1800 add ports 1:29 tagged 2. Configure Access VLAN Interface and other routing services. The IP address for the access VLAN will be configured on both X590 switches. In addition to the IP address, IP forwarding and bootprelay will be configured for the interfaces. Controlling Bridge 1 configure vlan VLAN_1800 ipaddress 172.18.32.2 255.255.224.0 enable ipforwarding vlan VLAN_1800 enable bootprelay ipv4 vlan VLAN_1800 Controlling Bridge 2 IP interface added to VLAN. IP Forwarding and BootP Relay enabled. configure vlan VLAN_1800 ipaddress 172.18.32.3 255.255.224.0 enable ipforwarding vlan VLAN_1800 enable bootprelay ipv4 vlan VLAN_1800 3. Configure Access VLAN VRRP. Configure VRRP for the access VLAN to provide access VLAN users a virtual gateway address. Controlling Bridge 1 create vrrp vlan VLAN_1800 vrid 180 configure vrrp vlan VLAN_1800 vrid 180 priority 254 configure vrrp vlan VLAN_1800 vrid 180 fabric-routing on configure vrrp vlan VLAN_1800 vrid 180 add 172.18.32.1 enable vrrp vlan VLAN_1800 vrid 180 VRRP instance id for wireless access VLAN. Priority is configured to make master election more reliable. Controlling Bridge 2 Fabric-routing is enabled so that packets don’t have to be routed through the VRRP master if a more direct route exists on the receiving interface create vrrp vlan VLAN_1800 vrid 180 configure vrrp vlan VLAN_1800 vrid 180 fabric-routing on configure vrrp vlan VLAN_1800 vrid 180 add 172.18.32.1 enable vrrp vlan VLAN_1800 vrid 180 The VRRP virtual IP address At the prompt, issue show vrrp and verify VRRP configuration (output truncated). Controlling Bridge 1 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 179 Validated Designs – Infrastructure & Topology FR value must be Y on both VRRP master and backup Slot-1 VPEX X590-24x-1q-2c.101 # show vrrp Virtual Master VLAN Name VRID Pri IP Address State MAC Address VLAN_18(En) 0180 254 172.18.32.1 MSTR 00:00:5e:00:01:b4 TP/TR/TV/P/T 0 0 Y 1 /FR/G/HM Y N N En-Enabled, Ds-Disabled, Pri-Priority, T-Advert Timer, P-Preempt TP-Tracked Pings, TR-Tracked Routes, TV-Tracked VLANs, FR-Fabric Routing, G-Group, HM-Host Mobility Controlling Bridge 2 Slot-1 VPEX X590-24x-1q-2c.91 # show vrrp Virtual Master VLAN Name VRID Pri IP Address State MAC Address VLAN_18(En) 0180 100 172.18.32.1 BKUP 00:00:5e:00:01:b4 The switch with the highest priority has MSTR state. The other switch has BKUP. TP/TR/TV/P/T 0 0 0 Y 1 /FR/G/HM Y N N En-Enabled, Ds-Disabled, Pri-Priority, T-Advert Timer, P-Preempt TP-Tracked Pings, TR-Tracked Routes, TV-Tracked VLANs, FR-Fabric Routing, G-Group, HM-Host Mobility Authentication – RADIUS At School 2, configure RADIUS on the controlling bridges. When complete, the configuration should look similar to the one below: Controlling Bridge 1 configure radius 1 server 192.168.109.253 1812 client-ip 192.168.200.3 vr VR-Default configure radius 1 shared-secret encrypted "#$FR2HspueIQEkIxIxySAINL4Nqavv7Q==" configure radius 2 server 192.168.109.248 1812 client-ip 192.168.200.3 vr VR-Default configure radius 2 shared-secret encrypted "#$nvW9HcCSK15MqhSjtzI3cCkl4szxxQ==" configure radius-accounting 1 server 192.168.109.253 1813 client-ip 192.168.200.3 vr VR-Default configure radius-accounting 1 shared-secret encrypted "#$BD4euxt8U8/XQtjXlQHSV5eoJLEIoQ==" configure radius-accounting 1 timeout 10 configure radius-accounting 2 server 192.168.109.248 1813 client-ip 192.168.200.3 vr VR-Default configure radius-accounting 2 shared-secret encrypted "#$hU4GHbjYuMuZxf5T4MYbDnNHC0JDkg==" configure radius-accounting 2 timeout 10 enable radius enable radius mgmt-access enable radius netlogin configure radius timeout 15 configure radius mgmt-access timeout 15 configure radius netlogin timeout 15 enable radius-accounting enable radius-accounting mgmt-access enable radius-accounting netlogin Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 180 Validated Designs – Infrastructure & Topology Controlling Bridge 2 configure radius 1 server 192.168.109.253 1812 client-ip 192.168.200.4 vr VR-Default configure radius 1 shared-secret encrypted "#$FR2HspueIQEkIxIxySAINL4Nqavv7Q==" configure radius 2 server 192.168.109.248 1812 client-ip 192.168.200.4 vr VR-Default configure radius 2 shared-secret encrypted "#$nvW9HcCSK15MqhSjtzI3cCkl4szxxQ==" configure radius-accounting 1 server 192.168.109.253 1813 client-ip 192.168.200.4 vr VR-Default configure radius-accounting 1 shared-secret encrypted "#$BD4euxt8U8/XQtjXlQHSV5eoJLEIoQ==" configure radius-accounting 1 timeout 10 configure radius-accounting 2 server 192.168.109.248 1813 client-ip 192.168.200.3 vr VR-Default configure radius-accounting 2 shared-secret encrypted "#$hU4GHbjYuMuZxf5T4MYbDnNHC0JDkg==" configure radius-accounting 2 timeout 10 enable radius enable radius mgmt-access enable radius netlogin configure radius timeout 15 configure radius mgmt-access timeout 15 configure radius netlogin timeout 15 enable radius-accounting enable radius-accounting mgmt-access enable radius-accounting netlogin Remote Site Connectivity via MAN In this section VLAN interfaces will be configured to connect School 2 to the District Office/School 1. Remote Site Connectivity Configuration 1. Configure VLANs for connectivity to District Office. Refer to the VLAN names labeled for Remote Site Connectivity for VLAN names in the VLAN Subnet Matrix above. All port assignments will be tagged. Controlling Bridge 1 create vlan "VLAN_0101" configure vlan VLAN_0101 description “To DO/SC1 Left” configure vlan VLAN_0101 tag 101 configure vlan VLAN_0101 add ports 1:1 tagged configure vlan default delete port 1:1 create vlan "VLAN_0204" configure vlan VLAN_0204 description “To DO/SC1 Right” configure vlan VLAN_0204 tag 204 configure vlan VLAN_0204 add ports 1:1 tagged configure vlan default delete port 1:1 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 181 Validated Designs – Infrastructure & Topology Controlling Bridge 2 create vlan "VLAN_0201" configure vlan VLAN_0201 description “To DO/SC1 Right” configure vlan VLAN_0201 tag 201 configure vlan VLAN_0201 add ports 1:1 tagged configure vlan default delete port 1:1 create vlan "VLAN_0104" configure vlan VLAN_0104 description “To DO/SC1 Left” configure vlan VLAN_0104 tag 104 configure vlan VLAN_0104 add ports 1:1 tagged configure vlan default delete port 1:1 2. Configure point-to-point interfaces to the District Office. Refer to the subnets labeled for Remote Site Connectivity for VLAN names in the VLAN Subnet Matrix above. All interfaces are configured as point-to-point interfaces /30 subnets. They are enabled for IP forwarding. Controlling Bridge 1 configure vlan VLAN_0101 ipaddress 192.168.101.2 255.255.255.252 enable ipforwarding vlan VLAN_0101 enable bootprelay ipv4 vlan VLAN_0101 configure vlan VLAN_0204 ipaddress 192.168.201.14 255.255.255.252 enable ipforwarding vlan VLAN_0204 enable bootprelay ipv4 vlan VLAN_0204 Controlling Bridge 2 configure vlan VLAN_0201 ipaddress 192.168.201.2 255.255.255.252 enable ipforwarding vlan VLAN_0201 enable bootprelay ipv4 vlan VLAN_0201 configure vlan VLAN_0104 ipaddress 192.168.101.14 255.255.255.252 enable ipforwarding vlan VLAN_0104 enable bootprelay ipv4 vlan VLAN_0104 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 182 Validated Designs – Infrastructure & Topology 3. Configure on OSPF instances at each Controlling Bridge. OSPF is used to distribute the routes from all subnets district wide. Every VLAN at each location should be advertised with these links. User access VLANs will be distributed as directly connected routes. The base OSPF configuration was previously executed in an earlier location in this document. Controlling Bridge 1 configure ospf add vlan VLAN_0101 area 0.0.0.0 configure ospf vlan VLAN_0101 authentication encrypted md5 101 "#$6dcVzX5McQOGcpgZuWCYPS6J+fGrKQ==" configure ospf add vlan VLAN_0204 area 0.0.0.0 configure ospf vlan VLAN_0204 cost 10 configure ospf vlan VLAN_0204 authentication encrypted md5 204 "#$KpzPgwPhMwS26VULvxdP7C+EIIMlZA==" Controlling Bridge 2 configure ospf add vlan VLAN_0201 area 0.0.0.0 configure ospf vlan VLAN_0201 authentication encrypted md5 201 "#$z8LiI9r7IalkdTOjeEXcBCHjp+9H+Q==" configure ospf add VLAN_0104 area 0.0.0.0 configure ospf vlan VLAN_0104 cost 10 configure ospf vlan VLAN_0104 authentication encrypted md5 104 "#$J6WZBUlHDyInR6OrL/Wv+/cLd9HCrQ==" At the prompt issue show ospf neighbor (output truncated). Verify that routers see each other and that the state is FULL with MD5 encryption enabled. Controlling Bridge 1 Slot-1 VPEX X590-24x-1q-2c.58 # show ospf neighbor ospf Show ospf ospfv3 OSPF for IPv6 (Software Update Required) Slot-1 VPEX x590-SC2-Left.6 # show ospf neighbor Adjacency state between neighbors should be Neighbor ID Pri State Up/Dead Time Address Full. OSPF router state should be DR or BDR. Interface BFD Session State ====================================================================================== ==== 192.168.200.1 1 FULL /DR 00:00:27:53/00:00:00:03 192.168.101.1 VLAN_0101 None 192.168.200.2 VLAN_0204 None … 1 FULL /DR 00:00:27:49/00:00:00:09 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 192.168.201.13 183 Validated Designs – Infrastructure & Topology Controlling Bridge 2 Slot-1 VPEX X590-24x-1q-2c.59 # show ospf neighbor Neighbor ID Pri State Up/Dead Time Address Interface BFD Session State ====================================================================================== ==== 192.168.200.1 1 FULL /DR 00:00:28:03/00:00:00:09 192.168.101.13 VLAN_0104 None 192.168.200.2 VLAN_0201 None … 1 FULL /DR 00:00:28:03/00:00:00:05 192.168.201.1 Policy and Access Control Extreme Management Center, Extreme Control, ExtremeAnalytics, and ExtremeWireless controller appliances located at the District Office/School 1 will serve School 2 for policy and ExtremeControl rules enforcement. All required Policy and Access Control configurations were performed as part of the District Office/School 1 and will apply to the entire school district. To configure ExtremeAnalytics, follow the same steps presented for District Office/School 1 to add switches to the Analytics Engine and location configurations. Authentication – Netlogin At School 2, authentication with netlogin dot1x and MAC is enabled on all ports except for the uplink and server ports. The authentication order is dot1x MAC. When complete the configuration should look similar to the one below: Controlling Bridge 1 and Controlling Bridge 2 enable netlogin dot1x mac configure netlogin authentication protocol-order dot1x mac web-based enable netlogin ports 1:2-22,1:25-28,1:30-32,1:34-36,100:1-48,100:51-52,110:1-24 dot1x enable netlogin ports 1:2-22,1:25-28,1:30-32,1:34-36,100:1-48,100:51-52,110:1-24 mac configure netlogin add mac-list ff:ff:ff:ff:ff:ff 48 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 184 Validated Designs – Infrastructure & Topology School 3 Bridge Port Extenders Cascade School-3 MLAG Redundant Controller Bridges Controlling Bridge 1 Controlling Bridge 2 School 3 includes a pair of ExtremeSwitching X590 switches, which serve as the controlling bridges (CBs). The V400 devices serve as the bridge port extenders (BPEs). The CBs connect only to the first BPE. The remaining BPEs connect to each other, via LACP, serially in what is referred to as a cascaded topology. Multi-chassis link aggregation (MLAG) connectivity to the CBs is used to provide redundancy to all network users. ExtremeWireless access points can be connected to the ports of Power over Ethernet (PoE) capable BPEs and/or PoE ports in the stack. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 185 Validated Designs – Infrastructure & Topology VLANs and Subnets at School 3 Below is a list and table grouping of VLANs by functionality at School 3. This functionality includes the following types: • Appliance - VLAN for Extreme Smart OmniEdge appliances. • Management – Used to communicate with Extreme Smart OmniEdge Appliances and routing protocols. • Remote Site Connectivity- Point to point interfaces used for connectivity between School 3 and the District Office/School 1. • Local Site Connectivity - VLAN interfaces used to distribute static and directly interfaces into OSPF and provide OSPF services to the ExtremeWireless controllers. • ISC – VLAN for the MLAG Interswitch Connection for the MLAG Interswitch Connection • Access VLAN - VLANs for wired users, wireless users, and networked devices Device Controlling Bridge 1 Controlling Bridge 2 Controlling Bridge 1 Controlling Bridge 2 Controlling Bridge 1 Controlling Bridge 2 Controlling Bridge 1 Controlling Bridge 2 Controlling Bridge 1 Controlling Bridge 2 Controlling Bridge 1 Controlling Bridge 2 Controlling Bridge 1 Controlling Bridge 2 Controlling Bridge 1 Controlling Bridge 2 Controlling Bridge 1 Controlling Bridge 2 Controlling Bridge 1 Controlling Bridge 2 VLAN Name Subnet Tag Type Lo0 Lo0 VLAN_0102 VLAN_0202 VLAN_0205 VLAN_0105 VLAN_0060 192.168.200.5/32 192.168.200.6/32 192.168.101.4/30 192.168.201.4/30 192.168.201.16/30 192.168.101.16/30 192.168.62.0/24 1005 1006 102 202 205 105 60 Management Management Remote Site Connectivity Remote Site Connectivity Remote Site Connectivity Remote Site Connectivity Local Site Connectivity vpexmlag 169.254.0.0/16 4089 ISC VLAN_1600 172.16.20.0/24 1600 Access VLAN VLAN_1900 172.19.160.0/27 1900 Access VLAN VLAN_2200 172.21.8.0/22 2200 Access VLAN VLAN_1700 172.17.8.0/22 1700 Access VLAN VLAN_1800 172.18.64.0/19 1800 Access VLAN Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 186 Validated Designs – Infrastructure & Topology School 3 – Configuration School-3 Bridge Port Extenders 1. VPEX Full Automation determines if switches are CB capable and BPEs are connected. If conditions are met, VPEX functionality is enabled and CBs are rebooted. 5. VPEX Full Automation enables VPEX Partial Automation. 6. VPEX Partial Automation configures a slot number for each attached BPE, configures the BPE module type, configures CB ports attached to BPEs as VPEX ports, enables MLAG ports with appropriate peer IDs, and ports to cascade LAGs as needed. MLAG Redundant Controller Bridges Controlling Bridge 1 Controlling Bridge 2 2. VPEX Full Automation configures a LAG between CB1 and CB2. 3. VPEX Full Automation creates and configures an ISC VLAN, adds an LACP port, and configures IP Interface. 4. VPEX Full Automation creates and configures an MLAG ISC, and configures CBs as peers. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 187 Validated Designs – Infrastructure & Topology Extended Edge Cascade with MLAG In order to take advantage of VPEX Full Automation, the following cabling requirements need to be met: • To create an MLAG for ISC, CB1 and CB2 should be cabled together. • To enable VPEX mode, the CBs should be cabled to the first BPE in the cascade. • To create cascade, continue to cable BPEs in serial manner. Up to 4 BPEs can be configured in the cascade. Once cabled properly, power-on CB1, CB2, BPE1, BPE2, BPE3, and BPE4. After the switches are finished running VPEX Full Automation and VPEX Partial Automation, verify the CBs have been properly configured and are functioning. Note To better control slot numbering, the user may decide to allow the BPEs power on one at a time. If all BPEs are turned on at the same time, there is no mechanism to guarantee slot order. Slot order is determined by the BPE LLDP message that is received first by the CBs. VPEX Full Automation and VPEX Partial Automation processes can take eight minutes or longer to complete. Please be patient. 1. Verify VPEX support has been enabled for VPEX Full Automation. Controlling Bridge 1 and 2 Slot-1 VPEX X590-24x-1q-2c.16 # show vpex Virtual Port Extender: Enabled Auto-Configuration: Disabled Cascade Port Slot ============= - Verify VPEX is enabled • Prompt changes indicating VPEX is enabled. • Virtual Port Extender indicates enabled. 2. Verify VPEX Full Automation has created and configured a LAG between CB1 and CB2. Verify LAGs have been configured between the CBs and BPEs. Controlling Bridge 1 and 2 enable enable enable enable enable sharing sharing sharing sharing sharing 1:29 grouping 1:29,1:33 algorithm address-based custom lacp 1:24 grouping 1:24 algorithm address-based custom lacp 100:52 grouping 100:51-52 algorithm address-based custom lacp 101:51 grouping 101:51-52 algorithm address-based custom lacp 102:51 grouping 102:51-52 algorithm address-based custom lacp Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 188 Validated Designs – Infrastructure & Topology Controlling Bridge 1 and 2 Verify LACP configuration Slot-1 VPEX X590-24x-1q-2c.10 # show sharing • Verify Agg MBR = Y • Verify Link State = A Load Sharing Monitor Config Current Agg Min Ld Share Dist Ld Share Agg Link Link Up Master Master Control Active Algorithm Flags Group Mbr State Transitions ================================================================================ 1:24 1:24 LACP 1 custom A 1:24 Y A 1 1:29 1:29 LACP 1 custom A 1:29 Y A 1 custom 1:33 Y A 1 100:52 100:51 LACP 1 custom A 100:51 Y A 1 custom 100:52 Y A 1 101:51 101:51 LACP 1 custom A 101:51 Y A 1 custom 101:52 Y A 1 102:51 102:51 LACP 1 custom A 102:51 Y A 1 custom 102:52 Y A 1 ================================================================================ … 3. Verify VPEX Full Automation has created and configured an ISC VLAN, added CB to CB LACP port, and configured IP interfaces. Controlling Bridge 1 create vlan "vpexmlag" configure vlan vpexmlag tag 4089 configure vlan vpexmlag add ports 1:29 tagged configure vlan vpexmlag ipaddress 169.254.0.1 255.255.0.0 Controlling Bridge 2 create vlan "vpexmlag" configure vlan vpexmlag tag 4089 configure vlan vpexmlag add ports 1:29 tagged configure vlan vpexmlag ipaddress 169.254.0.2 255.255.0.0 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 189 Validated Designs – Infrastructure & Topology Controlling Bridge 1 Slot-1 VPEX X590-24x-1q-2c.2 # show vlan vpexmlag VLAN Interface with name vpexmlag created by user Admin State: Enabled Tagging: 802.1Q Tag 4089 Description: None Virtual router: VR-Default IPv4 Forwarding: Disabled IPv4 MC Forwarding: Disabled Verify VPEX Full Automation Primary IP: 169.254.0.1/16 configured VLAN: • VLAN named vpexmlag created … • IP Address configured for VLAN Ports: 1. (Number of active ports=1) • LAG port added to VLAN. Tag: *1:29g • I Flag confirms ISC VLAN. … Slot-1 VPEX X590-24x-1q-2c.7 # show vlan Untagged ports auto-move: Inform ---------------------------------------------------------------------------------Name VID Protocol Addr Flags Proto Ports Virtual Active router /Total ---------------------------------------------------------------------------------vpexmlag 4089 169.254.0.1 /16 ------I--------------------- ANY 1 /1 Controlling Bridge 2 Slot-1 VPEX X590-24x-1q-2c.2 # show vlan vpexmlag VLAN Interface with name vpexmlag created by user Admin State: Enabled Tagging: 802.1Q Tag 4089 Description: None Virtual router: VR-Default IPv4 Forwarding: Disabled IPv4 MC Forwarding: Disabled Primary IP: 169.254.0.2/16 … Ports: 1. (Number of active ports=1) Tag: *1:29g … Slot-1 VPEX X590-24x-1q-2c.7 # show vlan Untagged ports auto-move: Inform ---------------------------------------------------------------------------------Name VID Protocol Addr Flags Proto Ports Virtual Active router /Total ---------------------------------------------------------------------------------vpexmlag 4089 169.254.0.2 /16 ------I--------------------- ANY 1 /1 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 190 Validated Designs – Infrastructure & Topology 4. Verify VPEX Full Automation has properly created and configured an MLAG which includes; configuring the CBs as peers, adding the CB to BPE LAGs as MLAG ports and assigning appropriate MLAG IDs. Controlling Bridge 1 create mlag peer "vpexmlag" configure mlag peer "vpexmlag" ipaddress 169.254.0.2 vr VR-Default enable mlag port 1:24 peer "vpexmlag" id 5100 Controlling Bridge 2 create mlag peer "vpexmlag" configure mlag peer "vpexmlag" ipaddress 169.254.0.1 vr VR-Default enable mlag port 1:24 peer "vpexmlag" id 5100 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 191 Validated Designs – Infrastructure & Topology Controlling Bridge 1 1. Peer name and peer IP address are configured. 2. Local IP address configured. 3. Peer IP address is known. Slot-1 VPEX X590-24x-1q-2c.20 # show mlag peer Multi-switch Link Aggregation Peers: MLAG Peer : VLAN : Local IP Address : MLAG ports : Checkpoint Status : Rx-Hellos : Rx-Checkpoint Msgs: Rx-Hello Errors : Hello Timeouts : Up Time : Local MAC : Config'd LACP MAC : Authentication : vpexmlag vpexmlag Virtual Router : 169.254.0.1 Peer IP Address : 1 Tx-Interval : Up Peer Tx-Interval : 5720 Tx-Hellos : 896 Tx-Checkpoint Msgs: 0 Tx-Hello Errors : 0 Checkpoint Errors : 0d:1h:33m:11s Peer Conn.Failures: 4. Checkpoint Status is UPPeer MAC 00:04:96:a3:fa:cc : 5. Hello and Checkpoint Messages incrementing. None Current LACP MAC : 6. Error messages are not incrementing but might None be present. VR-Default 169.254.0.2 1000 ms 1000 ms 5731 6242 0 0 1 00:04:96:a3:fb:18 00:04:96:a3:fb:18 Alternate path information: None Slot-1 VPEX X590-24x-1q-2c.21 # show mlag ports Local Local Remote MLAG Local Link Remote Peer Fail Fail Id Port State Link Peer Status Count Count ================================================================================ 5100 1:24 A Up vpexmlag Up 0 0 ================================================================================ Local Link State: A - Active, D - Disabled, R - Ready, NP - Port not present Remote Link : Up - One or more links are active on the remote switch, Down - No links are active on the remote switch, N/A - The peer has not communicated link state for this MLAG 1. Local Link State is Active port 2. Remote Link is UP. 3. Peer Status is UP Number of Multi-switch Link Aggregation Groups Convergence control Reload Delay Interval Reload Delay Link Up Isolation Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 : : : : : 4. Local and Remote Fail Counts not 1 Conserveincrementing. Access Lists 30 seconds Disabled Off 192 Validated Designs – Infrastructure & Topology Controlling Bridge 2 Slot-1 VPEX X590-24x-1q-2c.15 # show mlag peer Multi-switch Link Aggregation Peers: MLAG Peer : VLAN : Local IP Address : MLAG ports : Checkpoint Status : Rx-Hellos : Rx-Checkpoint Msgs: Rx-Hello Errors : Hello Timeouts : Up Time : Local MAC : Config'd LACP MAC : Authentication : vpexmlag vpexmlag 169.254.0.2 1 Up 5777 6301 0 0 0d:1h:34m:6s 00:04:96:a3:fb:18 None None Virtual Router : Peer IP Address : Tx-Interval : Peer Tx-Interval : Tx-Hellos : Tx-Checkpoint Msgs: Tx-Hello Errors : Checkpoint Errors : Peer Conn.Failures: Peer MAC : Current LACP MAC : VR-Default 169.254.0.1 1000 ms 1000 ms 5813 905 0 0 1 00:04:96:a3:fa:cc 00:04:96:a3:fb:18 Alternate path information: None Slot-1 VPEX X590-24x-1q-2c.16 # show mlag ports Local Local Remote MLAG Local Link Remote Peer Fail Fail Id Port State Link Peer Status Count Count ================================================================================ 5100 1:24 A Up vpexmlag Up 0 0 ================================================================================ Local Link State: A - Active, D - Disabled, R - Ready, NP - Port not present Remote Link : Up - One or more links are active on the remote switch, Down - No links are active on the remote switch, N/A - The peer has not communicated link state for this MLAG port Number of Multi-switch Link Aggregation Groups Convergence control Reload Delay Interval Reload Delay Link Up Isolation Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 : : : : : 2 Conserve Access Lists 30 seconds Disabled Off 193 Validated Designs – Infrastructure & Topology 5. Verify VPEX Full Automation has enabled VPEX Partial Automation. Controlling Bridge 1 and 2 enable vpex auto-configuration Controlling Bridge 1 and 2 Slot-1 VPEX X590-24x-1q-2c.16 # show vpex Virtual Port Extender: Enabled Auto-Configuration: Enabled Cascade Port Slot ============= - Verify Auto-Configuration is enabled • Auto-Configuration indicator indicates enabled. 6. Verify the VPEX Partial Automation properly configures VPEX slots. Controlling Bridge 1 configure configure configure configure configure configure configure configure slot 100 module V400-48p-10GE4 sys-recovery-level slot 100 reset slot 101 module V400-48p-10GE4 sys-recovery-level slot 101 reset slot 102 module V400-48t-10GE4 sys-recovery-level slot 102 reset slot 103 module V400-48t-10GE4 sys-recovery-level slot 103 reset configure configure configure configure vpex vpex vpex vpex port port port port 1:24 slot 100 100:52 slot 101 101:51 slot 102 102:52 slot 103 Controlling Bridge 2 configure configure configure configure configure configure configure configure slot 100 module V400-48p-10GE4 sys-recovery-level slot 100 reset slot 101 module V400-48p-10GE4 sys-recovery-level slot 101 reset slot 102 module V400-48t-10GE4 sys-recovery-level slot 102 reset slot 103 module V400-48t-10GE4 sys-recovery-level slot 103 reset configure configure configure configure vpex vpex vpex vpex port port port port 1:24 slot 100 100:52 slot 101 101:51 slot 102 102:52 slot 103 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 194 Validated Designs – Infrastructure & Topology Controlling Bridge 1 Slot-1 VPEX X590-24x-1q-2c.25 # show vpex bpe Module type configured. Casc PE lot Port Model MAC Address Description ====================================================================================== =========================== 100 1:24 V400-48p-10GE4 d8:84:66:f2:c3:43 none 101 100:52 V400-48p-10GE4 d8:84:66:f2:cb:8b none 102 101:51 V400-48t-10GE4 d8:84:66:f3:02:64 none 103 102:52 V400-48t-10GE4 d8:84:66:f3:09:39 none Verify MAC addresses for BPEs match on both CBs. Controlling Bridge 2 Slot-1 VPEX X590-24x-1q-2c.19 # show vpex bpe Casc PE Slot Port Model MAC Address Description ====================================================================================== =========================== 100 1:24 V400-48p-10GE4 d8:84:66:f2:c3:43 none 101 100:52 V400-48p-10GE4 d8:84:66:f2:cb:8b none 102 101:51 V400-48t-10GE4 d8:84:66:f3:02:64 none 103 102:52 V400-48t-10GE4 d8:84:66:f3:09:39 none Controlling Bridge 1 Slot-1 VPEX X590-24x-1q-2c.26 # show vpex ports 1. Verify Port State is Enabled 2. Verify Link Sate is Active Port Cascade Ext Port Link PECSP PE CSPOpen CSP Role # Port Slot State State MAC Address MAC Address Loc Rem Flags ====================================================================================== ===== 1:24 1:24 100 E A d8:84:66:f2:c3:74 d8:84:66:f2:c3:43 1 1 100:51 100:52 101 E A d8:84:66:f2:cb:bc d8:84:66:f2:cb:8b 1 1 MC 100:52 100:52 101 E A d8:84:66:f2:cb:bd d8:84:66:f2:cb:8b 1 1 MC 101:51 101:51 102 E A d8:84:66:f3:02:95 d8:84:66:f3:02:64 1 1 MC 101:52 101:51 102 E A d8:84:66:f3:02:96 d8:84:66:f3:02:64 1 1 MC 102:51 102:52 103 E A d8:84:66:f3:09:6b d8:84:66:f3:09:39 1 1 MC 102:52 102:52 103 E A d8:84:66:f3:09:6a d8:84:66:f3:09:39 1 1 MC ====================================================================================== ===== … Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 195 Validated Designs – Infrastructure & Topology Controlling Bridge 2 Verify MAC addresses for BPEs match on both CBs. Slot-1 VPEX X590-24x-1q-2c.20 # show vpex ports Port Cascade Ext Port Link PECSP PE CSPOpen CSP Role # Port Slot State State MAC Address MAC Address Loc Rem Flags ====================================================================================== ===== 1:24 1:24 100 E A d8:84:66:f2:c3:74 d8:84:66:f2:c3:43 1 1 100:51 100:52 101 E A d8:84:66:f2:cb:bc d8:84:66:f2:cb:8b 1 1 BC 100:52 100:52 101 E A d8:84:66:f2:cb:bd d8:84:66:f2:cb:8b 1 1 BC 101:51 101:51 102 E A d8:84:66:f3:02:95 d8:84:66:f3:02:64 1 1 BC 101:52 101:51 102 E A d8:84:66:f3:02:96 d8:84:66:f3:02:64 1 1 BC 102:51 102:52 103 E A d8:84:66:f3:09:6b d8:84:66:f3:09:39 1 1 BC 102:52 102:52 103 E A d8:84:66:f3:09:6a d8:84:66:f3:09:39 1 1 BC ====================================================================================== ===== … Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 196 Validated Designs – Infrastructure & Topology School-3 Bridge Port Extenders 7. Manually delete all ports from default VLAN, disable MSTP, and free up ACL resources. 8. Manually configure a loopback interface for routing and device management. 9. Manually configure a base OSPF configuration. 10. Manually configure VLAN for local site connectivity. 11. Manually configure VRRP for local site connectivity VLAN. 12. Manually configure OSPF for local site connectivity VLAN. MLAG Redundant Controller Bridges Controlling Bridge 1 Controlling Bridge 2 7. Remove ports from Default VLAN, disable MSTP, and free up ACL resources. The default VLAN will not be needed for this EVD so all ports will be removed from the VLAN. Because of this MSTP instance s0 will also be disabled. Controlling Bridge 1 and 2 configure configure configure configure vlan default delete ports all vr VR-Default delete ports 1:1-36,100:1-52,101:1-26 vr VR-Default add ports 1:1-36,100:1-52,101:1-26 vlan default delete ports 1:1-36,100:1-52,101:1-26 disable stpd s0 configure policy resource-profile default profile-modifier no-mac enable no-ipv6 enable Controlling Bridge 1 and 2 Slot-1 VPEX X590-24x-1q-2c.11 # show stpd s0 Stpd: s0 Stp: DISABLED Number of Ports: 0 Rapid Root Failover: Disabled Operational Mode: MSTP Default Binding Mode: 802.1D MSTI Instance: CIST 802.1Q Tag: (none) Ports: (none) Participating Vlans: (none) Verify the following STP variables for s0 Auto-bind Vlans: Default • STP is disabled … • No Ports participating in STP • No VLANs participating in STP Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 197 Validated Designs – Infrastructure & Topology 8. Configure Loopback VLAN and Interface The internal loopback interface serves as the primary interface for in-band management in this topology. It also serves as the interface between the Extreme Network appliances and the devices. Controlling Bridge 1 create vlan "lo0" configure vlan lo0 tag 1001 enable loopback-mode vlan lo0 configure vlan lo0 ipaddress 192.168.200.5 255.255.255.255 enable ipforwarding vlan lo0 Controlling Bridge 2 Configuring system loopback interface involves creating a VLAN with a tag and is enabled for the following IP services: loopback mode and IP forwarding. Loopback interface is configured with a /32 subnet mask. create vlan "lo0" configure vlan lo0 tag 1001 enable loopback-mode vlan lo0 configure vlan lo0 ipaddress 192.168.200.6 255.255.255.255 enable ipforwarding vlan lo0 9. Configure OSPF Base Configuration With the creation of the loopback interface, it is now possible to create the base configuration OSPF routing. OSPF will redistribute any directly connected interfaces and static routes into the routing table. This will be more critical later on when remote schools are attached to the topology. Controlling Bridge 1 configure ospf routerid 192.168.200.5 enable ospf enable ospf export direct cost 0 type ase-type-1 enable ospf export static cost 0 type ase-type-1 configure ospf add vlan lo0 area 0.0.0.0 The loopback interface created in the previous step is configured as the OSPF Router-ID. Loopback interfaces is added to area 0.0.0.0 Controlling Bridge 2 configure ospf routerid 192.168.200.6 enable ospf enable ospf export direct cost 0 type ase-type-1 enable ospf export static cost 0 type ase-type-1 configure ospf add vlan lo0 area 0.0.0.0 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 198 Validated Designs – Infrastructure & Topology 10. Configure VLAN and Interface for Local Site Connectivity on Controlling Bridges. Configure a VLAN for local site connectivity on the controlling bridges. This VLAN is used to redistribute directly connected and static routes into OSPF. It is also used by APs for connectivity to the wireless controllers. Controlling Bridge 1 Configure local-site VLAN_0060 with: create vlan "VLAN_0060" 1. VLAN Descriptions configure vlan VLAN_0060 description "School 3 Local Site Connectivity" 2. VLAN Tag 3. LACP trunk port Added to VLAN configure vlan VLAN_0060 tag 60 4. IP Address Configured configure vlan VLAN_0060 add ports 1:29 tagged 5. IP Forwarding Enabled for unicast routing configure vlan VLAN_0060 ipaddress 192.168.62.2 255.255.255.0 6. BOOTP Relay Enabled for DHCP enable ipforwarding vlan VLAN_0060 7. Iproute Sharing (ECMP) enable bootprelay ipv4 vlan VLAN_0060 enable iproute sharing vr VR-Default Controlling Bridge 2 create vlan "VLAN_0060" configure vlan VLAN_0060 description "School 3 Local Site Connectivity" configure vlan VLAN_0060 tag 60 configure vlan VLAN_0060 add ports 1:29 tagged configure vlan VLAN_0060 ipaddress 192.168.62.3 255.255.255.0 enable ipforwarding vlan VLAN_0060 enable bootprelay ipv4 vlan VLAN_0060 enable iproute sharing vr VR-Default At the prompt issue show vlan VLAN_0060 (output truncated) and verify: Controlling Bridge 1 Slot-1 VPEX X590-24x-1q-2c.49 # show vlan VLAN_0060 VLAN Interface with name VLAN_0060 created by user Admin State: Enabled Tagging: 802.1Q Tag 60 Description: School 3 Local Site Connectivity Virtual router: VR-Default IPv4 Forwarding: Enabled IPv4 MC Forwarding: Disabled Primary IP: 192.168.63.2/24 … Ports: 1. (Number of active ports=1) Tag: *1:29g … Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 Verify the following items: 1. VLAN Name, State and Tag 2. VLAN Description 3. LACP trunk port Added to VLAN 4. IP Address Configured 5. IP Forwarding Enabled for unicast routing 199 Validated Designs – Infrastructure & Topology Controlling Bridge 2 Slot-1 VPEX X590-24x-1q-2c.35 # show vlan VLAN_0060 VLAN Interface with name VLAN_0060 created by user Admin State: Enabled Tagging: 802.1Q Tag 60 Description: School 3 Local Site Connectivity Virtual router: VR-Default IPv4 Forwarding: Enabled IPv4 MC Forwarding: Disabled Primary IP: 192.168.62.3/24 … Ports: 1. (Number of active ports=1) Tag: *1:29g … 11. Configure VRRP on Local Site Connectivity VLAN on the Controlling Bridges. Configure VRRP for the VLAN to provide the ExtremeWireless IdentiFi APs a common gateway to reach the ExtremeWireless Controllers. Controlling Bridge 1 create vrrp vlan VLAN_0060 vrid 60 configure vrrp vlan VLAN_0060 vrid 60 priority 254 configure vrrp vlan VLAN_0060 vrid 60 fabric-routing on configure vrrp vlan VLAN_0060 vrid 60 add 192.168.62.1 enable vrrp vlan VLAN_0060 vrid 60 Controlling Bridge 2 create vrrp vlan VLAN_0060 vrid 60 configure vrrp vlan VLAN_0060 vrid 60 fabric-routing on configure vrrp vlan VLAN_0060 vrid 60 add 192.168.62.1 enable vrrp vlan VLAN_0060 vrid 60 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 VRRP instance ID for VLAN VLAN_0060 Priority is configured to make master election more reliable. Fabric-routing is enabled so that packets don’t have to be routed through the VRRP master if a more direct route exists on the receiving interface The VRRP virtual IP address 200 Validated Designs – Infrastructure & Topology At the prompt, issue show vrrp and verify vlan VLAN_0060 configuration. FR value must be Y on both VRRP master and backup Controlling Bridge 1 Slot-1 VPEX X590-24x-1q-2c.7 # show vrrp Virtual Master VLAN Name VRID Pri IP Address State MAC Address TP/TR/TV/P/T VLAN_00(En) 0060 254 192.168.62.1 MSTR 00:00:5e:00:01:3c 0 0 0 Y 1 /FR/G/HM Y N N En-Enabled, Ds-Disabled, Pri-Priority, T-Advert Timer, P-Preempt TP-Tracked Pings, TR-Tracked Routes, TV-Tracked VLANs, FR-Fabric Routing, G-Group, HM-Host Mobility … Controlling Bridge 2 The switch with the highest priority has MSTR state and the other one BKUP. Slot-1 VPEX X590-24x-1q-2c.7# show vrrp Virtual Master VLAN Name VRID Pri IP Address State MAC Address TP/TR/TV/P/T VLAN_00(En) 0060 100 192.168.62.1 BKUP 00:00:5e:00:01:3c 0 0 0 Y 1 /FR/G/HM Y N N En-Enabled, Ds-Disabled, Pri-Priority, T-Advert Timer, P-Preempt TP-Tracked Pings, TR-Tracked Routes, TV-Tracked VLANs, FR-Fabric Routing, G-Group, HM-Host Mobility … 12. Configure OSPF Local Site Connectivity VLAN This interface will serve as the main routing aggregation point for all the user access VLANs. Therefore, it is very important that this interface has OSPF enabled. Controlling Bridge 1 configure ospf add vlan VLAN_0060 area 0.0.0.0 configure ospf vlan VLAN_0060 authentication encrypted md5 62 "#$JFhyukUlMfW97SAiO7/iMLqPwEPirQ==" Connectivity VLANs added to area 0.0.0.0 MD5 Authentication was enabled to provide added security between OSPF adjacencies. Controlling Bridge 2 configure ospf add vlan VLAN_0060 area 0.0.0.0 configure ospf vlan VLAN_0060 authentication encrypted md5 62 "#$29ah8Mlb4X+FbErH8yoiW/nhP7kN8w==" Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 201 Validated Designs – Infrastructure & Topology At the prompt, issue show ospf neighbor (output truncated). Verify that routers see each other and that the state is FULL with MD5 encryption enabled. Controlling Bridge 1 Slot-1 VPEX X590-24x-1q-2c.8 # show ospf neighbor Adjacency state between neighbors should be Neighbor ID Pri State Up/Dead Time Address Full. OSPF router state should be DR or BDR. Interface BFD Session State ====================================================================================== ==== 192.168.200.6 1 FULL /DR 03:03:01:28/00:00:00:10 192.168.62.3 VLAN_0060 None … Controlling Bridge 2 Slot-1 VPEX X590-24x-1q-2c.8 # show ospf neighbor Neighbor ID Pri State Up/Dead Time Address Interface BFD Session State ====================================================================================== ==== 192.168.200.5 1 FULL /BDR 03:03:03:06/00:00:00:06 192.168.62.2 VLAN_0060 None … Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 202 Validated Designs – Infrastructure & Topology Wired User Access All access VLANs offer redundancy to the network with the use of configured VRRP gateways. All user credentials are authenticated using authentication to ExtremeControl and RADIUS. The following VLAN types are available at School 3: The Guest_Wired VLAN gives guest users access to School 3. This VLAN will be configured at all the schools. This access layer VLAN is typically the most restrictive of all VLANs. The Admin VLAN provides access layer connectivity to network administrators. These users will be assigned an Admin role by Extreme Policy Manger and ExtremeControl. This access layer VLAN is typically the least restrictive of the access VLANs. The NonAdmin_Wired VLAN provides access layer connectivity to other authorized users. These users will be assigned a Student or Faculty role by Extreme Policy Manger and ExtremeControl. Roles can be more granular than the ones presented here. Most users will access the school district network through this VLAN. The Network_Devices VLAN provides access layer connectivity to common network devices such as printers, VoIP phones, or security cameras. School-3 Bridge Port Extenders 1. Configure four wired user access VLANs switches. 2. Configure all user access ports to Guest_Wired PVID. MLAG Redundant Controller Bridges Controlling Bridge 1 Controlling Bridge 2 3. Configure IP Address and IP Services on wired User Access VLANs 4. Configure VRRP on for user access VLANs. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 203 Validated Designs – Infrastructure & Topology The process of adding an access VLAN to the CB/BPE topology involves several steps. First, create the access VLAN and tag on the CBs. Then add the Local Site trunk port and MLAG ports as tag members of the access VLAN. Routing functionality will be configured including, IP address, VRRP for a common gateway, and IP forwarding. Note During these manual configuration steps, the user can choose to utilize mlag orchestration mode. This mode can be helpful to configure the exact same commands on both CBs. However, do not use this feature for configurations which need to be unique on CBs such as IP addresses, VRRP configurations, and OSPF configurations. To enable this mode, refer to mlag orchestration mode operation on Page 16. 1. Configure four access VLAN and assign ports. Controlling Bridge 1 create vlan "VLAN_1900" configure vlan VLAN_1900 description "Wired Guest VLAN" configure vlan VLAN_1900 tag 1900 configure vlan VLAN_1900 add ports 1:29 tagged Four Wired Access VLANs created with tag and description. Add LACP Trunk. create vlan "VLAN_1600" configure vlan VLAN_1600 description "Administrator Access VLAN" configure vlan VLAN_1600 tag 1600 configure vlan VLAN_1600 add ports 1:29 tagged create vlan "VLAN_2200" configure vlan VLAN_2200 description "Network Devices Access VLAN" configure vlan VLAN_2200 tag 2200 configure vlan VLAN_2200 add ports 1:29 tagged create vlan "VLAN_1700" configure vlan VLAN_1700 description "Wired Non Administrator Access VLAN" configure vlan VLAN_1700 tag 1700 configure vlan VLAN_1700 add ports 1:29 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 204 Validated Designs – Infrastructure & Topology Controlling Bridge 2 create vlan "VLAN_1900" configure vlan VLAN_1900 description "Wired Guest VLAN" configure vlan Guest_Wired tag 1900 configure vlan Guest_Wired add ports 1:29 tagged create vlan "VLAN_1600" configure vlan VLAN_1600 description "Administrator Access VLAN" configure vlan VLAN_1600 tag 1600 configure vlan VLAN_1600 add ports 1:29 tagged create vlan "VLAN_2200" configure vlan VLAN_2200 description "Network Devices Access VLAN" configure vlan VLAN_2200 tag 2200 configure vlan VLAN_2200 add ports 1:29 tagged create vlan "VLAN_1700" configure vlan VLAN_1700 description "Wired Non Administrator Access VLAN" configure vlan VLAN_1700 tag 1700 configure vlan VLAN_1700 add ports 1:29 tagged After creating VLANs, any port which will be used for user access should be configured to have a PVID of Guest_Wired as the native. When complete, the configuration should look similar to the one below: Controlling Bridge 1 All wired access ports are added to the Guest_Wired VLAN as untagged (PVID). configure vlan VLAN_1900 add ports 1:2-23,100:1-48,101:1-48,102:1-48,103:1-48 untagged Controlling Bridge 2 configure vlan VLAN_1900 add ports 1:2-23,100:1-48,101:1-48,102:1-48,103:1-48 untagged Caution When assigning PVID of access ports to Guest_Wired, use caution that ports with previous configuration are not reconfigured. These ports might include the following: • Local Site LACP Trunk Port • Uplink ports between Controlling Bridges and Bridge Port Extenders • Uplink ports between X590/X690 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 205 Validated Designs – Infrastructure & Topology 2. Configure Access VLAN Interface and other routing services. Controlling Bridge 1 configure vlan VLAN_1900 ipaddress 172.19.160.2 255.255.255.224 enable ipforwarding vlan VLAN_1900 enable bootprelay ipv4 vlan VLAN_1900 configure vlan VLAN_1600 ipaddress 172.16.20.2 255.255.255.0 enable ipforwarding vlan VLAN_1600 enable bootprelay ipv4 vlan VLAN_1600 1. IP interface for four Wired Access VLANs configured. 2. IP Forwarding and BootP Relay enabled. configure vlan VLAN_1700 ipaddress 172.17.8.2 255.255.252.0 enable ipforwarding vlan VLAN_1700 enable bootprelay ipv4 vlan VLAN_1700 configure vlan VLAN_2200 ipaddress 172.21.8.2 255.255.252.0 enable ipforwarding vlan VLAN_2200 enable bootprelay ipv4 vlan VLAN_2200 Controlling Bridge 2 configure vlan VLAN_1900 ipaddress 172.19.160.3 255.255.255.224 enable ipforwarding vlan VLAN_1900 enable bootprelay ipv4 vlan VLAN_1900 configure vlan VLAN_1600 ipaddress 172.16.20.3 255.255.255.0 enable ipforwarding vlan VLAN_1600 enable bootprelay ipv4 vlan VLAN_1600 configure vlan VLAN_1700 ipaddress 172.17.8.3 255.255.252.0 enable ipforwarding vlan VLAN_1700 enable bootprelay ipv4 vlan VLAN_1700 configure vlan VLAN_2200 ipaddress 172.21.8.3 255.255.252.0 enable ipforwarding vlan VLAN_2200 enable bootprelay ipv4 vlan VLAN_2200 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 206 Validated Designs – Infrastructure & Topology 3. Configure Access VLAN VRRP between the X690 switches. Configure VRRP for the access VLANs in order to provide access VLAN users a virtual gateway address. Controlling Bridge 1 create vrrp vlan VLAN_1900 vrid 193 configure vrrp vlan VLAN_1900 vrid 193 fabric-routing on configure vrrp vlan VLAN_1900 vrid 193 add 172.19.160.1 enable vrrp vlan VLAN_1900 vrid 193 create vrrp vlan VLAN_1600 vrid 160 configure vrrp vlan VLAN_1600 vrid 160 priority 254 configure vrrp vlan VLAN_1600 vrid 160 fabric-routing on configure vrrp vlan VLAN_1600 vrid 160 add 172.16.20.1 enable vrrp vlan VLAN_1600 vrid 160 create vrrp vlan VLAN_1700 vrid 170 configure vrrp vlan VLAN_1700 vrid 170 fabric-routing on configure vrrp vlan VLAN_1700 vrid 170 add 172.17.8.1 enable vrrp vlan VLAN_1700 vrid 170 VRRP instance id for wired access VLANs. Priority is configured to make master election more reliable. Fabric-routing is enabled so that packets don’t have to be routed through the VRRP master if a more direct route exists on the receiving interface The VRRP virtual IP address create vrrp vlan VLAN_2200 vrid 210 configure vrrp vlan VLAN_2200 vrid 210 priority 254 configure vrrp vlan VLAN_2200 vrid 210 fabric-routing on configure vrrp vlan VLAN_2200 vrid 210 add 172.21.8.1 enable vrrp vlan VLAN_2200 vrid 210 Controlling Bridge 2 create vrrp vlan VLAN_1900 vrid 193 configure vrrp vlan VLAN_1900 vrid 193 priority 254 configure vrrp vlan VLAN_1900 vrid 193 fabric-routing on configure vrrp vlan VLAN_1900 vrid 193 add 172.19.160.1 enable vrrp vlan VLAN_1900 vrid 193 create vrrp vlan VLAN_1600 vrid 160 configure vrrp vlan VLAN_1600 vrid 160 fabric-routing on configure vrrp vlan VLAN_1600 vrid 160 add 172.16.20.1 enable vrrp vlan VLAN_1600 vrid 160 create vrrp vlan VLAN_1700 vrid 170 configure vrrp vlan VLAN_1700 vrid 170 priority 254 configure vrrp vlan VLAN_1700 vrid 170 fabric-routing on configure vrrp vlan VLAN_1700 vrid 170 add 172.17.8.1 enable vrrp vlan VLAN_1700 vrid 170 create vrrp vlan VLAN_2200 vrid 210 configure vrrp vlan VLAN_2200 vrid 210 fabric-routing on configure vrrp vlan VLAN_2200 vrid 210 add 172.21.8.1 enable vrrp vlan VLAN_2200 vrid 210 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 207 Validated Designs – Infrastructure & Topology At the prompt, issue show vrrp and verify VRRP configuration (output truncated). Controlling Bridge 1 FR value must be Y on both VRRP master and backup Slot-1 VPEX X590-24x-1q-2c.50 # show vrrp Virtual Master VLAN Name VRID Pri IP Address State MAC Address TP/TR/TV/P/T VLAN_19(En) 0193 100 172.19.160.1 BKUP 00:00:5e:00:01:c1 0 0 0 Y 1 VLAN_16(En) 0160 254 172.16.20.1 MSTR 00:00:5e:00:01:a0 0 0 0 Y 1 VLAN_22(En) 0210 254 172.21.8.1 MSTR 00:00:5e:00:01:d2 0 0 0 Y 1 VLAN_17(En) 0170 100 172.17.8.1 BKUP 00:00:5e:00:01:aa 0 0 0 Y 1 /FR/G/HM Y N N Y N N Y N N Y N N En-Enabled, Ds-Disabled, Pri-Priority, T-Advert Timer, P-Preempt TP-Tracked Pings, TR-Tracked Routes, TV-Tracked VLANs, FR-Fabric Routing, G-Group, HM-Host Mobility Controlling Bridge 2 The switch with the highest priority has MSTR state and the other one BKUP. Slot-1 VPEX X590-24x-1q-2c.49 # show vrrp Virtual Master VLAN Name VRID Pri IP Address State MAC Address TP/TR/TV/P/T VLAN_19(En) 0193 254 172.19.160.1 MSTR 00:00:5e:00:01:c1 0 0 0 Y VLAN_16(En) 0160 100 172.16.20.1 BKUP 00:00:5e:00:01:a0 0 0 0 Y VLAN_22(En) 0210 100 172.21.8.1 BKUP 00:00:5e:00:01:d2 0 0 0 Y VLAN_17(En) 0170 254 172.17.8.1 MSTR 00:00:5e:00:01:aa 0 0 0 Y 1 1 1 1 /FR/G/HM Y N N Y N N Y N N Y N N En-Enabled, Ds-Disabled, Pri-Priority, T-Advert Timer, P-Preempt TP-Tracked Pings, TR-Tracked Routes, TV-Tracked VLANs, FR-Fabric Routing, G-Group, HM-Host Mobility Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 208 Validated Designs – Infrastructure & Topology Wireless User Access No Guest_Wireless is configured at School 3. Once a user is assigned the role of Guest, their traffic is directly tunneled to the controller. This bridging at controller functionality eliminates the need to configure a guest wireless VLAN at School 3. The NonAdmin_Wireless VLAN provides access layer connectivity to other authorized users. These users will be assigned Student or Faculty roles by Extreme Policy Manger and ExtremeControl. This VLAN will be bridged at the access point. School-3 Bridge Port Extenders 1. Configure NonAdmin wireless user access VLAN. MLAG Redundant Controller Bridges Controlling Bridge 1 Controlling Bridge 2 2. Configure IP Address and IP Services for NonAdmin wireless user Access VLAN. 3. Configure VRRP for NonAdmin Wireless user access VLAN. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 209 Validated Designs – Infrastructure & Topology Note During these manual configuration steps, the user can choose to utilize mlag orchestration mode. This mode can be helpful to configure the exact same commands on both CBs. However, do not use this feature for configurations which need to be unique on CBs such as IP addresses, VRRP configurations, and OSPF configurations. To enable this mode, refer to mlag orchestration mode operation on Page 16. 1. Configure two wireless access VLAN and assign ports. Configure the NonAdmin Wireless VLAN for wireless users. Controlling Bridge 1 Wireless Access VLANs created. Add created LACP create vlan "VLAN_1800" ports to VLANs. configure vlan VLAN_1800 description "Wireless Non Administrator Access VLAN" configure vlan VLAN_1800 tag 1800 configure vlan VLAN_1800 add ports 1:29 tagged Controlling Bridge 2 create vlan "VLAN_1800" configure vlan VLAN_1800 description "Wireless Non Administrator Access VLAN" configure vlan VLAN_1800 tag 1800 configure vlan VLAN_1800 add ports 1:29 tagged 2. Configure Access VLAN Interface and other routing services. The IP address for the access VLAN will be configured on both X690 switches. In addition to the IP address, IP forwarding and bootprelay will be configured for the interfaces. Controlling Bridge 1 configure vlan VLAN_1800 ipaddress 172.18.64.2 255.255.224.0 enable ipforwarding vlan VLAN_1800 enable bootprelay ipv4 vlan VLAN_1800 Controlling Bridge 2 IP interface added to VLAN. IP Forwarding and BootP Relay enabled. configure vlan VLAN_1800 ipaddress 172.18.64.3 255.255.224.0 enable ipforwarding vlan VLAN_1800 enable bootprelay ipv4 vlan VLAN_1800 3. Configure Access VLAN VRRP. Configure VRRP for the access VLAN in order to provide access VLAN users a virtual gateway address. Controlling Bridge 1 create vrrp vlan VLAN_1800 vrid 180 configure vrrp vlan VLAN_1800 vrid 180 priority 254 configure vrrp vlan VLAN_1800 vrid 180 fabric-routing on configure vrrp vlan VLAN_1800 vrid 180 add 172.18.64.1 enable vrrp vlan VLAN_1800 vrid 180 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 VRRP instance id for wireless access VLANs. Priority is configured to make master election more reliable. Fabric-routing is enabled so that packets don’t have to be routed through the VRRP master if a more direct route exists on the receiving interface 210 The VRRP virtual IP address Validated Designs – Infrastructure & Topology Controlling Bridge 2 create vrrp vlan VLAN_1800 vrid 180 configure vrrp vlan VLAN_1800 vrid 180 fabric-routing on configure vrrp vlan VLAN_1800 vrid 180 add 172.18.64.1 enable vrrp vlan VLAN_1800 vrid 180 At the prompt, issue show vrrp and verify VRRP configuration (output truncated). Controlling Bridge 1 FR value must be Y on both VRRP master and backup Slot-1 VPEX X590-24x-1q-2c.26 # show vrrp Virtual Master VLAN Name VRID Pri IP Address State MAC Address TP/TR/TV/P/T VLAN_18(En) 0180 254 172.18.64.1 MSTR 00:00:5e:00:01:b4 0 0 0 Y 1 /FR/G/HM Y N N En-Enabled, Ds-Disabled, Pri-Priority, T-Advert Timer, P-Preempt TP-Tracked Pings, TR-Tracked Routes, TV-Tracked VLANs, FR-Fabric Routing, G-Group, HM-Host Mobility Controlling Bridge 2 The switch with the highest priority has MSTR state and the other one BKUP. Slot-1 VPEX X590-24x-1q-2c.81 # show vrrp Virtual Master VLAN Name VRID Pri IP Address State MAC Address TP/TR/TV/P/T VLAN_18(En) 0180 100 172.18.64.1 BKUP 00:00:5e:00:01:b4 0 0 0 Y 1 /FR/G/HM Y N N En-Enabled, Ds-Disabled, Pri-Priority, T-Advert Timer, P-Preempt TP-Tracked Pings, TR-Tracked Routes, TV-Tracked VLANs, FR-Fabric Routing, G-Group, HM-Host Mobility Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 211 Validated Designs – Infrastructure & Topology Authentication – RADIUS At School 3, configure RADIUS on the controlling bridges. When complete, the configuration should look similar to the one below: Controlling Bridge 1 configure radius 1 server 192.168.109.253 1812 client-ip 192.168.200.5 vr VR-Default configure radius 1 shared-secret encrypted "#$XGt37kRf8M8psbSvSiTubQCvyVWHBQ==" configure radius 2 server 192.168.109.248 1812 client-ip 192.168.200.5 vr VR-Default configure radius 2 shared-secret encrypted "#$G5lSW+rhL+xscD51ltcZ73VIhIcSNQ==" configure radius-accounting 1 server 192.168.109.253 1813 client-ip 192.168.200.5 vr VR-Default configure radius-accounting 1 shared-secret encrypted "#$R0rj9ahA9ZUQbTJQj3rgck+3KX4jaA==" configure radius-accounting 1 timeout 10 configure radius-accounting 2 server 192.168.109.248 1813 client-ip 192.168.200.5 vr VR-Default configure radius-accounting 2 shared-secret encrypted "#$CWMZWjXL8icEtXnuDadZlwI/S21INw==" configure radius-accounting 2 timeout 10 enable radius enable radius mgmt-access enable radius netlogin configure radius timeout 15 configure radius mgmt-access timeout 15 configure radius netlogin timeout 15 enable radius-accounting enable radius-accounting mgmt-access enable radius-accounting netlogin Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 212 Validated Designs – Infrastructure & Topology Controlling Bridge 2 configure radius 1 server 192.168.109.253 1812 client-ip 192.168.200.6 vr VR-Default configure radius 1 shared-secret encrypted "#$XGt37kRf8M8psbSvSiTubQCvyVWHBQ==" configure radius 2 server 192.168.109.248 1812 client-ip 192.168.200.6 vr VR-Default configure radius 2 shared-secret encrypted "#$G5lSW+rhL+xscD51ltcZ73VIhIcSNQ==" configure radius-accounting 1 server 192.168.109.253 1813 client-ip 192.168.200.6 vr VR-Default configure radius-accounting 1 shared-secret encrypted "#$R0rj9ahA9ZUQbTJQj3rgck+3KX4jaA==" configure radius-accounting 1 timeout 10 configure radius-accounting 2 server 192.168.109.248 1813 client-ip 192.168.200.5 vr VR-Default configure radius-accounting 2 shared-secret encrypted "#$CWMZWjXL8icEtXnuDadZlwI/S21INw==" configure radius-accounting 2 timeout 10 enable radius enable radius mgmt-access enable radius netlogin configure radius timeout 15 configure radius mgmt-access timeout 15 configure radius netlogin timeout 15 enable radius-accounting enable radius-accounting mgmt-access enable radius-accounting netlogin Remote Site Connectivity via MAN In this section, VLAN interfaces will be configured to connect School 3 to the District Office/School 1. Remote Site Connectivity Configuration 1. Configure VLANs for connectivity to District Office. Refer to the VLAN names labeled for Remote Site Connectivity for VLAN names in the VLAN Subnet Matrix above. All port assignments will be tagged. Controlling Bridge 1 create vlan "VLAN_0102" configure vlan VLAN_0102 description "To DO/SC1 Left" configure vlan VLAN_0102 tag 102 configure vlan VLAN_0102 add ports 1:1 tagged configure vlan default delete port 1:1 create vlan "VLAN_0205" configure vlan VLAN_0205 description "To DO/SC1 Right" configure vlan VLAN_0205 tag 205 configure vlan VLAN_0205 add ports 1:1 tagged configure vlan default delete port 1:1 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 213 Validated Designs – Infrastructure & Topology Controlling Bridge 2 create vlan "VLAN_0202" configure vlan VLAN_0202 description "To DO/SC1 Right" configure vlan VLAN_0202 tag 202 configure vlan VLAN_0202 add ports 1:1 tagged create vlan "VLAN_0105" configure vlan VLAN_0105 description "To DO/SC1 Left" configure vlan VLAN_0105 tag 105 configure vlan VLAN_0105 add ports 1:1 tagged configure vlan default delete port 1:1 2. Configure point-to-point interfaces to the District Office. Refer to the subnets labeled for Remote Site Connectivity for VLAN names in the VLAN Subnet Matrix above. All interfaces are configured as point-to-point interfaces /30 subnets. They are enabled for IP and IP forwarding. Controlling Bridge 1 configure vlan VLAN_0102 ipaddress 192.168.101.6 255.255.255.252 enable ipforwarding vlan VLAN_0102 enable bootprelay ipv4 vlan VLAN_0102 configure vlan VLAN_0205 ipaddress 192.168.201.18 255.255.255.252 enable ipforwarding vlan VLAN_0205 enable bootprelay ipv4 vlan VLAN_0205 Controlling Bridge 2 configure vlan VLAN_0202 ipaddress 192.168.201.6 255.255.255.252 enable ipforwarding vlan VLAN_0202 enable bootprelay ipv4 vlan VLAN_0202 configure vlan VLAN_0105 ipaddress 192.168.101.18 255.255.255.252 enable ipforwarding vlan VLAN_0105 enable bootprelay ipv4 vlan VLAN_0105 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 214 Validated Designs – Infrastructure & Topology 3. Configure on OSPF instances at each Controlling Bridge. OSPF is used to distribute the routes from all subnets district wide. Every VLAN at each location should be advertised with these links. User access VLANs will be distributed as directly connected routes. The base OSPF configuration was previously executed in an earlier location in this document. Controlling Bridge 1 configure ospf add vlan VLAN_0102 area 0.0.0.0 configure ospf vlan VLAN_0102 authentication encrypted md5 102 "#$lFLLiw5bwavpXepHbm0AAZ6L2Xe9Yg==" configure ospf add vlan VLAN_0205 area 0.0.0.0 configure ospf vlan VLAN_0205 cost 10 configure ospf vlan VLAN_0205 authentication encrypted md5 205 "#$JJcc9sJPReFCDZEEvS38p+lPG3IHRQ==" Controlling Bridge 2 configure ospf add vlan VLAN_0202 area 0.0.0.0 configure ospf vlan VLAN_0202 authentication encrypted md5 202 "#$YXsRU2vF0ItotbGAOewfdptE9e6Ccw==" configure ospf add vlan VLAN_0105 area 0.0.0.0 configure ospf vlan VLAN_0105 cost 10 configure ospf vlan VLAN_0105 authentication encrypted md5 105 "#$tYD/qqbf/7JSCSr/C4WnLGYBfgMfdA==" At the prompt issue show ospf neighbor (output truncated). Verify that routers see each other and that the state is FULL with MD5 encryption enabled. Controlling Bridge 1 Slot-1 VPEX X590-24x-1q-2c.56 # show ospf neighbor ospf Show ospf ospfv3 OSPF for IPv6 (Software Update Required) Slot-1 VPEX x590-SC2-Left.6 # show ospf neighbor Neighbor ID Pri State Up/Dead Time Address Interface Adjacency state between neighbors should be BFD Session State Full. OSPF router state should be DR or BDR. ====================================================================================== ==== 192.168.200.1 1 FULL /DR 00:00:00:27/00:00:00:07 192.168.101.5 VLAN_0102 None 192.168.200.2 VLAN_0205 None 1 FULL /DR 00:00:00:03/00:00:00:03 192.168.201.17 … Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 215 Validated Designs – Infrastructure & Topology Controlling Bridge 2 Slot-1 VPEX X590-24x-1q-2c.114 # show ospf neighbor Neighbor ID Pri State Up/Dead Time Address Interface BFD Session State ====================================================================================== ==== 192.168.200.1 1 FULL /DR 00:00:00:48/00:00:00:06 192.168.101.17 VLAN_0105 None 192.168.200.2 VLAN_0202 None 1 FULL /DR 00:00:01:12/00:00:00:02 192.168.201.5 … Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 216 Validated Designs – Infrastructure & Topology Policy, Access Control, and Analytics Extreme Management Center, ExtremeControl, ExtremeAnalytics, and ExtremeWireless controller appliances located at the District Office/School 1 will serve School 3 for policy and ExtremeControl rules enforcement. All required Policy and Access Control configurations were performed as part of the District Office/School 1 and will apply to the entire school district. To configure ExtremeAnalytics, follow the same steps presented for the District Office/School 1 to add switches to the Analytics Engine and location configurations. Authentication – Netlogin At School 2, authentication with netlogin dot1x and MAC is enabled on all ports except for the uplink and server ports. The authentication order is dot1x MAC. When complete, the configuration should look similar to the one below: Controlling Bridge 1 and Controlling Bridge 2 enable netlogin dot1x mac configure netlogin authentication protocol-order dot1x mac web-based enable netlogin ports 1:2-23,1:25-28,1:30-32,1:34-36,100:1-48,101:1-48,102:1-48,103:148 dot1x enable netlogin ports 1:2-23,1:25-28,1:30-32,1:34-36,100:1-48,101:1-48,102:1-48,103:148 mac configure netlogin add mac-list ff:ff:ff:ff:ff:ff 48 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 217 Validated Designs – Infrastructure & Topology School 4 School- 4 ExtremeXOS Standalone VLANs and Subnets at School 4 Below is a list and table grouping of VLANs by functionality at School 4. This functionality includes the following types: • Management – Used to communicate with Extreme Smart OmniEdge appliances and routing protocols. • Remote Site Connectivity- Point-to-point interfaces used for connectivity between School 4 and the District Office/School 1. • Local Site Connectivity - VLAN interfaces used to distribute static and directly interfaces into OSPF and provide OSPF services to the ExtremeWireless controllers. • Access VLAN - VLANs for wired users, wireless users, and networked devices Device ExtremeXOS Standalone ExtremeXOS Standalone ExtremeXOS Standalone ExtremeXOS Standalone ExtremeXOS Standalone ExtremeXOS Standalone ExtremeXOS Standalone ExtremeXOS Standalone ExtremeXOS Standalone VLAN Name Lo0 VLAN_0103 VLAN_0203 VLAN_0060 VLAN_1600 VLAN_1900 VLAN_2200 VLAN_1700 VLAN_1800 Subnet 192.168.200.7/32 192.168.101.8/30 192.168.201.8/30 192.168.63.0/24 172.16.30.0/24 172.19.224.0/27 172.21.16.0/22 172.17.16.0/22 172.18.96.0/19 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 Tag 1007 103 203 60 1600 1900 2200 1700 1800 Type Management Remote Site Connectivity Remote Site Connectivity Local Site Connectivity Access VLAN Access VLAN Access VLAN Access VLAN Access VLAN 218 Validated Designs – Infrastructure & Topology School 4 – Base Configuration ExtremeXOS Standalone 1. Configure Loopback Interface for Management with routing protocols. (OSPF) Loopback Interface Configuration 1. Configure Loopback VLAN and Interface The internal loopback interface serves as the primary interface for in-band management in this topology. It also serves as the interface between the Extreme Network appliances and the devices. Extreme Standalone Switch create vlan "lo0” configure vlan lo0 tag 1001 enable loopback-mode vlan lo0 configure vlan lo0 ipaddress 192.168.200.7 255.255.255.255 enable ipforwarding vlan lo0 2. Configure OSPF Base Configuration Configuring system loopback interface involves creating a VLAN with a tag and is enabled for the following IP services: loopback mode and IP forwarding. Loopback interface is configured with a /32 subnet mask. With the creation of the loopback interface, it is now possible to create the base configuration OSPF routing. OSPF will redistribute any directly connected interfaces and static routes into the routing table. This will be more critical later on when remote schools are attached to the topology. Extreme Standalone Switch configure ospf routerid 192.168.200.7 enable ospf enable ospf export direct cost 0 type ase-type-1 enable ospf export static cost 0 type ase-type-1 configure ospf add vlan lo0 area 0.0.0.0 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 The loopback interface created in the previous step is configured as the OSPF Router-ID. Loopback interfaces is added to area 0.0.0.0 219 Validated Designs – Infrastructure & Topology Local Site Connectivity Configuration 1. Configure VLAN and Interface for Local Site Connectivity. Used by APs for connectivity to the wireless controllers. No ports will be in this VLAN until APs are authenticated by RADIUS/netlogin. Extreme Standalone Switch create vlan "VLAN_0060" configure vlan VLAN_0060 tag 60 configure vlan VLAN_0060 ipaddress 192.168.63.1 255.255.255.0 enable ipforwarding vlan VLAN_0060 enable bootprelay ipv4 vlan VLAN_0060 enable iproute sharing vr VR-Default Like Previous VLANs, VLAN_0060 consists of the following: 1. VLAN Tag 2. IP Address Configured 3. IP Forwarding Enabled for unicast routing 4. BOOTP Relay Enabled for DHCP 5. Iproute sharing (ECMP) At the prompt, issue show vlan VLAN_0060 (output truncated) and verify: Extreme Standalone Switch VPEX x590-SC2-Left.14 # show vlan VLAN_0060 VLAN Interface with name VLAN_0060 created by user Admin State: Enabled Tagging: 802.1Q Tag 60 Description: None Virtual router: VR-Default IPv4 Forwarding: Enabled IPv4 MC Forwarding: Disabled Primary IP: 192.168.63.1/24 … Ports: 0. (Number of active ports=0) … Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 Verify the following items: 1. VLAN Name, State and Tag 2. IP Address Configured 3. IP Forwarding Enabled for unicast routing 220 Validated Designs – Infrastructure & Topology Wired User Access All user credentials are authenticated using authentication to ExtremeControl and RADIUS. The following VLAN types are available at School 4: The Guest_Wired VLAN gives guest users access to. This VLAN will be configured at all the schools. This access layer VLAN is typically the most restrictive of all VLANs. The Admin VLAN provides access layer connectivity to network administrators. These users will be assigned an Admin role by Extreme Policy Manger and ExtremeControl. This access layer VLAN is typically the least restrictive of the access VLANs. The NonAdmin_Wired VLAN provides access layer connectivity to other authorized users. These users will be assigned a Student or Faculty role by Extreme Policy Manger and ExtremeControl. Roles can be more granular than the ones presented here. Most users will access the school district network through this VLAN. The Network_Devices VLAN provides access layer connectivity to common network devices such as printers, VoIP phones, or security cameras. 1. Configure four wired user access VLANs. 2. Configure all user access ports to Guest_Wired PVID. 3. Configure IP Address and IP Services on wired User Access VLAN. ExtremeXOS Standalone Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 221 Validated Designs – Infrastructure & Topology Four wired access VLANs will be configured on the standalone ExtremeSwitching Access switch. All user access ports will be assigned to the Guest_Wired VLAN. Finally, an IP interface will be created with routing services. 1. Configure four access VLAN and assign ports. Extreme Standalone Switch create vlan "VLAN_1900" configure vlan VLAN_1900 description "Wired Guest VLAN" configure vlan VLAN_1900 tag 1900 Four Wired Access VLANs created. create vlan "VLAN_1600" configure vlan VLAN_1600 description "Administrator Access VLAN" configure vlan VLAN_1600 tag 1600 create vlan "VLAN_2200" configure vlan VLAN_2200 description "Network Devices Access VLAN" configure vlan VLAN_2200 tag 2200 create vlan "VLAN_1700" configure vlan VLAN_1700 description "Wired Non Administrator Access VLAN" configure vlan VLAN_1700 tag 1700 After creating VLANs, any port which will be used for user access should be configured to have a PVID of Guest_Wired as the native VLAN. When complete, the configuration should look similar to the one below: Extreme Standalone Switch All wired access ports are added to the Guest_Wired VLAN as untagged (PVID). configure vlan Guest_Wired add ports 1-48,50-52 untagged 2. Configure Access VLAN Interface and other routing services. Extreme Standalone Switch configure vlan VLAN_1900 ipaddress 172.19.224.1 255.255.255.224 enable ipforwarding vlan VLAN_1900 enable bootprelay ipv4 vlan Guest_Wired configure vlan VLAN_1600 ipaddress 172.16.30.1 255.255.255.0 enable ipforwarding vlan VLAN_1600 enable bootprelay ipv4 vlan VLAN_1600 1. IP interface for four Wired Access VLANs configured. 2. IP Forwarding and BootP Relay.enabled. configure vlan VLAN_2200 ipaddress 172.17.16.1 255.255.252.0 enable ipforwarding vlan VLAN_2200 enable bootprelay ipv4 vlan VLAN_2200 configure vlan VLAN_1700 ipaddress 172.21.16.1 255.255.252.0 enable ipforwarding vlan VLAN_1700 enable bootprelay ipv4 vlan VLAN_1700 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 222 Validated Designs – Infrastructure & Topology Wireless User Access No Guest_Wireless is configured at School 4. Once a user is assigned the role of Guest, their traffic is directly tunneled to the controller. This bridging at controller functionality eliminates the need to configure a guest wireless VLAN at School 4. The NonAdmin_Wireless VLAN provides access layer connectivity to other authorized users. These users will be assigned Student or Faculty roles by Extreme Policy Manger and ExtremeControl. This VLAN will be bridged at the access point. 1. Configure NonAdmin wireless user access VLAN. 2. Configure IP Address and IP Services for NonAdmin wireless user Access VLAN. ExtremeXOS Standalone 1. Configure two wireless access VLAN and assign ports. Configure the NonAdmin Wireless VLAN for wireless users. Extreme Standalone Switch Wireless Access VLANs created. create vlan "VLAN_1800" configure vlan VLAN_1800 description "Wireless Non Administrator Access VLAN" configure vlan VLAN_1800 tag 1800 2. Configure Access VLAN Interface and other routing services. IP addresses for access VLANs will be configured on both X690 switches. In addition to the IP address, IP forwarding and bootprelay will be configured for the interfaces. Extreme Standalone Switch configure vlan VLAN_1800 ipaddress 172.18.96.1 255.255.224.0 enable ipforwarding vlan VLAN_1800 enable bootprelay ipv4 vlan VLAN_1800 IP interface added to VLAN. IP Forwarding and BootP Relay enabled. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 223 Validated Designs – Infrastructure & Topology Authentication – RADIUS At School 4, configure RADIUS on the standalone switch. When complete, the configuration should look similar to the one below: Extreme Standalone Switch configure radius 1 server 192.168.109.253 1812 client-ip 192.168.200.7 vr VR-Default configure radius 1 shared-secret encrypted "#$LRw0VJ5uiUiCft+sV6BvOeVCn2VCFQ==" configure radius 2 server 192.168.109.248 1812 client-ip 192.168.200.7 vr VR-Default configure radius 2 shared-secret encrypted "#$UUb+13H6Gkl6wNik4PI6T9SidnM/9g==" configure radius-accounting 1 server 192.168.109.253 1813 client-ip 192.168.200.7 vr VR-Default configure radius-accounting 1 shared-secret encrypted "#$J74EvAcCJinoBEhRJvEQ4rjTVAT/eQ==" configure radius-accounting 1 timeout 10 configure radius-accounting 2 server 192.168.109.248 1813 client-ip 192.168.200.7 vr VR-Default configure radius-accounting 2 shared-secret encrypted "#$6LZ9ileR2UEq/TtqfyZwbgzEFZ3roQ==" configure radius-accounting 2 timeout 10 enable radius enable radius mgmt-access enable radius netlogin configure radius timeout 15 enable radius-accounting enable radius-accounting mgmt-access enable radius-accounting netlogin Remote Site Connectivity via MAN In this section, VLAN interfaces will be configured to connect School 4 to the District Office/School 1. Remote Site Connectivity Configuration 1. Configure VLANs for connectivity to District Office. Refer to the VLAN names labeled for Remote Site Connectivity for VLAN names in the VLAN Subnet Matrix above. All port assignments will be tagged. Extreme Standalone Switch create vlan "VLAN_0103" configure vlan VLAN_0103 tag 103 configure vlan VLAN_0103 add ports 49 tagged configure vlan default delete port 49 create vlan "VLAN_0203" configure vlan VLAN_0203 tag 203 configure vlan VLAN_0203 add ports 49 tagged configure vlan default delete port 49 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 224 Validated Designs – Infrastructure & Topology 2. Configure point-to-point interfaces to the District Office. Refer to the subnets labeled for Remote Site Connectivity for VLAN names in the VLAN Subnet Matrix above. All interfaces are configured as point-to-point interfaces /30 subnets. They are enabled for IP forwarding. Extreme Standalone Switch configure vlan VLAN_0103 ipaddress 192.168.103.2 255.255.255.252 enable ipforwarding vlan VLAN_0103 enable bootprelay ipv4 vlan VLAN_0103 configure vlan VLAN_0203 ipaddress 192.168.201.10 255.255.255.252 enable ipforwarding vlan VLAN_0203 enable bootprelay ipv4 vlan VLAN_0203 3. Configure on OSPF instances at each Controlling Bridge. OSPF is used to distribute the routes from all subnets district wide. Every VLAN at each location should be advertised with these links. User access VLANs will be distributed as directly connected routes. The base OSPF configuration was previously executed in an earlier location in this document. Extreme Standalone Switch configure ospf add vlan VLAN_0103 area 0.0.0.0 configure ospf vlan VLAN_0103 authentication encrypted md5 103 "#$cQx/fkysLFXVdxPqX+wmjI3Cx8uTIA==" configure ospf add vlan VLAN_0203 area 0.0.0.0 configure ospf vlan VLAN_0203 authentication encrypted md5 203 "#$tQFlCFOsc5f7g+sN2rqeco7DeC5qSA==" At the prompt issue show ospf neighbor (output truncated). Verify that routers see each other and that the state is FULL with MD5 encryption enabled. Extreme Standalone Switch X440G2-SC4.16 # show ospf neighbor ospf Show ospf ospfv3 OSPF for IPv6 (Software Update Required) Slot-1 VPEX x590-SC2-Left.6 # show ospf neighbor Adjacency state between neighbors should be Neighbor ID Pri State Up/Dead Time Address Full. OSPF router state should be DR or BDR. Interface BFD Session State ====================================================================================== ==== 192.168.200.1 1 FULL /DR 02:13:54:19/00:00:00:07 192.168.101.9 VLAN_0103 None 192.168.200.2 VLAN_0203 None … 1 FULL /DR 01:20:08:39/00:00:00:03 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 192.168.201.9 225 Validated Designs – Infrastructure & Topology Policy and Access Control Extreme Management Center, ExtremeControl, ExtremeAnalytics, and ExtremeWireless controller appliances located at the District Office/School 1 will serve School 4 for policy and ExtremeControl rules enforcement. All required Policy and Access Control configurations were performed as part of the District Office/School 1 and will apply to the entire school district. To configure ExtremeAnalytics, follow the same steps presented for the District Office/School 1 to add switches to the Analytics Engine and location configurations. Authentication – Netlogin At School 4, authentication with netlogin dot1x and MAC is enabled on all ports except for the uplink and server ports. The authentication order is dot1x MAC. When complete, the configuration should look similar to the one below: Extreme Standalone Switch enable netlogin dot1x mac configure netlogin authentication protocol-order dot1x mac web-based enable netlogin ports 1-48,50-52 dot1x enable netlogin ports 1-48,50-52 mac configure netlogin add mac-list ff:ff:ff:ff:ff:ff 48 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 226 Validated Designs – Infrastructure & Topology RF-Planning When designing a wireless network, a thorough RF plan is vital to the success of the deployment. This process involves an extensive site survey and use of the Extreme Networks™ Planning Tool. Extreme Wireless RF-Planning can further be enhanced with the use of the Ekahau Site Survey tool and hardware. Site Survey Site Survey is perhaps the most important step in RF design. It validates the wireless deployment’s expected coverage experience. A thorough site survey analyzes sufficient signal strength throughout the covered area and allows for channel planning to reduce co-channel interference. Site Surveys are extremely important to new wireless deployments and when replacing or upgrading installed wireless gear. Products from different vendors or even across product generations of the same vendor often have different transmission characteristics. These changes can include technological advances, the number of transmit and receive chains, and differences in radiation pattern. Never assume that replacing one piece of equipment for another, at the same installation points, will result in the same experience as the previous install. An AP-on-a-stick physical site survey is the preferred method to thoroughly assess a site’s RF design requirements. Testing an AP’s proposed location provides true measurement and representation of the signal propagation and coverage to be expected. This method considers actual site characteristics such as obstructions to the RF signal, absorption by walls, and impact of any other architectural materials. If a physical site survey is not possible, at minimum, a predictive survey should be performed. The predictive model often provides a first-pass view of the number of APs required to cover a site or a firstpass validation of whether installing a target AP family in pre-existing spots will provide the required coverage. The predictive model also provides greater insight into proper channel configuration to obtain a performance optimized experience. ExtremeWireless RF Planning Tool The ExtremeWireless RF Planning Tool is a predictive survey tool made available to Extreme Network customers. The RF Planning tool is available online at https://wirelessplanner.extremenetworks.com. Access to the tool is free, but user registration is required. Users can create a set of access credentials for the tool. Registration provides storage of saved models for later reference. Once registered, the user is directed to provide the country of installation. Country selection is very important because the tool can customize requirements to applicable regulatory restrictions of the country identified. Regulatory restrictions can apply to channel availability, power levels, or even equipment availability. If country certification is required but not yet available for a device, it may not be available for selection. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 227 Validated Designs – Infrastructure & Topology After providing a few more details, you are provided with the working Canvas. Modeling steps include: 1. Floor Plan Outline and Scale a. You can either design a floor plan outline or upload a floor plan image representative of the site being designed. b. The tool allows for multi-floor designs within the same project, but note that it only considers one floor at a time. It does not consider or model cross-floor propagation. c. Scale can be defined by mapping a line of pixels into a corresponding distance. A simple way to determine an approximate scale is to determine the width of a doorway. In the United States the typical width of doorway is 3 feet, which can be used as reference for a 1-meter (3 ft.) line. 2. Identify and map any known RF obstructions. a. Consider include wall materials, escape routes (stairways), and restrooms (washrooms). b. The more detailed your model is, the more accurate the predictive model will be. c. Do not assume free-space (no walls) unless you are in fact planning for a true open area. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 228 Validated Designs – Infrastructure & Topology 3. Access Point Placement a. The tool support for the entire portfolio of Wave 1 and Wave 2 access points from ExtremeWireless and ExtremeWireless WiNG is available. (Due to regulatory restrictions, not all APs are available in all regions.) b. Placement is primarily assessed based on a coverage objective. c. Automatic AP placement is available for a set of devices, primarily internal-antenna models, using a set of heuristic algorithms to determine the best placement for the APs from an RF coverage perspective. Only one AP model type at a time can be selected for auto-placement, but models can share with other available AP models that already pre-determined (pinned). This method provides the simplest way to determine how many APs will be required to cover a floor-plan area. After the automatic wizard runs, APs locations can be manually adjusted to a more correct installation location. When this is done, the AP is pinned to the selected location. d. Manual placement provides a more fine-controlled method for AP placements; you individually place each AP into its corresponding installation point. This can be the starting step for a model that starts from an existing installation design. You can manually select from the available models to complete the coverage to the desired targets. e. Automatic AP placement can be rerun after APs are manually placed or pinned. This ensures that the proposed installation model does not require any additional devices for fine tuning. Alternatively, you can also define exclusion areas in which to the algorithm will not attempt to place APs. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 229 Validated Designs – Infrastructure & Topology Visualization Several visualization tools are available to help you visualize the resulting coverage on both 2.4GHz and 5.0Ghz frequencies: 1. RF Coverage Heatmap – provides assessment of signal strength coverage of the floor plan. 2. Channel Plan – provides an optimized view of a representative channel plan to reduce co-channel interference. 3. Location Visualization – provides an assessment of the deployment’s readiness to support fidelity in triangulation. The tool provides the ability to recommend where to install full-size sensors to improve location fidelity, augmenting without impacting the current deployment for coverage. The additional added benefit of full-time sensors is that they can perform double-duty by complementing optional Wireless Intrusion Detection and Prevention integration solutions. 4. Link Speed – provides a generalized link speed estimate for typical clients based on the signal coverage metrics. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 230 Validated Designs – Infrastructure & Topology 5. Provides visualization of the angle of orientation for the AP-Camera model (AP3916i). 6. Provides an assessment of Bluetooth Low Energy coverage for models that support iBeacon transmit functions (for example, AP391xx and AP7632/62). Sharing and Exporting After the model provides your desired coverage characteristics, installed devices, and placement suggestions, you can conveniently share this information – with a partner or customer, or for placing orders – by exporting the model as a PDF or as a Microsoft Word document. The resulting document includes all of the details provided in the model: the criteria used as input for the model, the representative floor plan of installation locations, the snapshot of RF coverage, and Channel Plan heatmaps. More important, these documents provide a summarized Bill of Materials (BOM) listing the corresponding types and number of APs determined for site coverage. The PDF document is Extreme Networks branded and can be shared directly with the customer or partner. The Microsoft Word document allows for editing, re-arranging, or even branding of the final report. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 231 Validated Designs – Infrastructure & Topology Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 232 Validated Designs – Infrastructure & Topology Product Lifecycle – Exporting into Other Products The model representation can be directly exported for use by ExtremeWireless management tools such as ExtremeCloud, ExtremeCloud Appliance, and Extreme Management Center. This capability allows reuse of a predictive model into an actual deployed model. This allows users to map actual deployed equipment into the predicted installation instances. The details of the floor plans are preserved – saving time in getting visibility of the actual installation deployment. RF Survey Tools Conducting a site survey with the ExtremeWireless™ RF Planning Tool can be enhanced with the use of third-party survey tools. The key part to a new deployment is providing a predictive or active survey assessment as part of the design. Predictive and active site surveys can be done using a variety of third-party tools such as Ekahau, Netscout’s AirMagnet tool, and others. Attributes from an Ekahau survey can be imported directly into the ExtremeWireless and ExtremeCloud products. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 233 Validated Designs – Infrastructure & Topology Extreme Management Center Configuration Adding a ExtremeControl Appliance to Extreme Management Center To add a new ExtremeControl engine to Extreme Management Center, go to Control Engines, rightclick on Default, and click Add Engine. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 234 Validated Designs – Infrastructure & Topology Enter the IP address of the engine. The Engine will also automatically be added to Devices with the Add Engine to Devices check box. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 235 Validated Designs – Infrastructure & Topology Adding Wireless Controllers to Extreme Management Center Like all network devices, the wireless controllers can be managed from Extreme Management Center. This step is necessary for the access control configuration. To add a device to Extreme Management Center, go to Network Devices Device Add Device. This step uses the same SNMPv3 profile you used previously. The wireless controllers are added under the Appliances site. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 236 Validated Designs – Infrastructure & Topology To discover a controller, navigate to Wireless Network Wireless Network Controllers and select Discover All Controllers from the drop-down list. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 237 Validated Designs – Infrastructure & Topology Adding Analytics to Extreme Management Center From Extreme Management Center, navigate to: Extreme Management Analytics Overview Add Engine Provide the IP address of the ExtremeAnalytics Engine, a user-friendly name, and configured SNMP profile. Click OK Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 238 Validated Designs – Infrastructure & Topology The ExtremeAnalytics engine appears in the Overview Pane. Locate the green indicator, confirming that the engine is operational. You should also see basic engine processing data. Click the Enforce button at the bottom of the web page to fully deploy the ExtremeAnalytics Engine. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 239 Validated Designs – Infrastructure & Topology Site Configuration Extreme Management Center provides the possibility to break a larger network into smaller, more manageable pieces by grouping switches under sites. This logical separation, which can be done based on physical location or purpose, can help users understand more complex networks by allowing them to concentrate on smaller segments. To create a site, go to the Devices tab, right-click on World site, go to Maps/Sites and select Create Site. Enter a site name and click OK. Five sites were created to group devices based on their physical locations. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 240 Validated Designs – Infrastructure & Topology Adding a Device to the Site Configuration To add a device to a site, right-click on the site name and select Add Device. The District Office-School 1 site contains all network devices placed in the area with the same name. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 241 Validated Designs – Infrastructure & Topology Design Considerations Network Time Protocol (NTP) Deploying the Extreme Networks’ Smart OmniEdge solution requires time synchronization between Extreme’s applications, switches, and other network components to function properly and communicate efficiently. Log and syslog events also benefit when all network applications and components are synchronized, along with synchronization of alarm events generated within Extreme Management Center. Effective synchronization often means faster and easier resolution of network problems. To maintain optimal synchronization within the ecosystem of Extreme’s Smart OmniEdge Solution, we recommend the use of NTP for Extreme Management Center, Extreme Access Control, ExtremeAnalytics, ExtremeWireless Controllers, Extreme switches, and any third-party servers (such as RADIUS servers). Note Configuration for third-party RADIUS servers is not documented in this section. Extreme Management Center Extreme Management Center NTP configuration is executed during installation using the command-line interface. Once the appliance is installed, log in to the console as root. The install process starts with a series of configuration questions. The administrator is prompted for NTP configuration under the <Configure Date and Time Settings> section of the install. If the administrator chooses to change the settings after install, a simple run of the dateconfig script can be executed. The dateconfig script is located in /usr/postinstall. Please enter a NTP Server IP Address (Required): <ntp_ip_address_2> Would you like to add another server (y/n) [n]? ============================================================================= NTP Servers ============================================================================= These are the currently specified NTP servers: <ntp_ip_address_1> <ntp_ip_address_2> Enter 0 or any key other than a valid selection to complete NTP configuration and continue. If you need to make a change, enter the appropriate number from the choices listed below. 0. Accept the current settings and continue 1. Restart NTP server selection 2. Set date and time manually ============================================================================= Enter selection [0]: ================================================================================ Set Time Zone Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 242 Validated Designs – Infrastructure & Topology ================================================================================ You will now be asked to enter the time zone information for this system. Available time zones are stored in files in the /usr/share/zoneinfo directory. Please select from one of the following example time zones: 1. US Eastern 2. US Central 3. US Mountain 4. US Pacific 5. Other - Shows a graphical list ================================================================================ Enter selection [1]: Current default time zone: 'America/New_York' Local time is now: Thu Jun 21 15:30:00 EDT 2018. Universal Time is now: Thu Jun 21 19:30:00 UTC 2018. Print the following to the console if synchronization is successful after the selection of the timezone with the post install script <dateconfig>: The time was successfully synchronized to the server at <ntp_ip_address_1> rsyslog start/running, process 21801 * Starting NTP server ntpd [ OK ] The command <ntpq -np> will also display pertinent information about NTP deamon operation and performance – including statistics about delay, offset, and jitter. root@XMC:/# ntpq -np remote refid st t when poll reach delay offset jitter ============================================================================== 0.ubuntu.pool.n .POOL. 16 p 64 0 0.000 0.000 0.000 1.ubuntu.pool.n .POOL. 16 p 64 0 0.000 0.000 0.000 2.ubuntu.pool.n .POOL. 16 p 64 0 0.000 0.000 0.000 3.ubuntu.pool.n .POOL. 16 p 64 0 0.000 0.000 0.000 ntp.ubuntu.com .POOL. 16 p 64 0 0.000 0.000 0.000 *<ntp_ip_address_1> 129.6.15.29 2 u 45 64 377 2.867 1.833 0.751 +<ntp_ip_address_2> 129.6.15.29 2 u 37 64 377 2.669 2.899 3.512 [ OK ] Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 243 Validated Designs – Infrastructure & Topology ExtremeControl ExtremeControl NTP configuration is executed during installation within the command-line interface. Once the appliance is installed, log in to the console as root. The install process starts with a series of configuration questions. The administrator is prompted for NTP configuration under the <Configure Date and Time Settings> section of the install. If the administrator chooses to change the settings after install, a simple run of the dateconfig script can be executed. The dateconfig script is located in /usr/postinstall. ================================================================================ Configure Date And Time Settings ================================================================================ The engine date and time can be set manually or using an external Network Time Protocol (NTP) server. It is strongly recommended that NTP is used to configure the date and time to ensure accuracy of time values for SNMP communications and logged events. Up to 5 server IP addresses may be entered if NTP is used. ================================================================================ Do you want to use NTP (y/n) [y]? y Please enter a NTP Server IP Address [<ntp_ip_address_1>]: <ntp_ip_address_1> Would you like to add another server (y/n) [y]? Please enter a NTP Server IP Address [<ntp_ip_address_2>]: <ntp_ip_address_2> Would you like to add another server (y/n) [n]? ============================================================================= NTP Servers ============================================================================= These are the currently specified NTP servers: <ntp_ip_address_1> <ntp_ip_address_2> Enter 0 or any key other than a valid selection to complete NTP configuration and continue. If you need to make a change, enter the appropriate number from the choices listed below. 0. Accept the current settings and continue 1. Restart NTP server selection 2. Set date and time manually ============================================================================= Enter selection [0]: ================================================================================ Set Time Zone ================================================================================ You will now be asked to enter the time zone information for this system. Available time zones are stored in files in the /usr/share/zoneinfo directory. Please select from one of the following example time zones: Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 244 Validated Designs – Infrastructure & Topology 1. US Eastern 2. US Central 3. US Mountain 4. US Pacific 5. Other - Shows a graphical list ================================================================================ Enter selection [1]: Current default time zone: 'America/New_York' Local time is now: Thu Jun 21 19:38:04 EDT 2018. Universal Time is now: Thu Jun 21 23:38:04 UTC 2018.d Print the following to the console if synchronization is successful after the selection of the timezone with the post install script <dateconfig>: The time was successfully synchronized to the server at <ntp_ip_address_1> rsyslog start/running, process 2123 * Starting NTP server ntpd [ OK ] The command <ntpq -np> will also display pertinent information about the NTP deamon operation and performance – including statistics about delay, offset, and jitter. root@NAC:/# ntpq -np remote refid st t when poll reach delay offset jitter ============================================================================== 0.ubuntu.pool.n .POOL. 16 p 64 0 0.000 0.000 0.000 1.ubuntu.pool.n .POOL. 16 p 64 0 0.000 0.000 0.000 2.ubuntu.pool.n .POOL. 16 p 64 0 0.000 0.000 0.000 3.ubuntu.pool.n .POOL. 16 p 64 0 0.000 0.000 0.000 ntp.ubuntu.com .POOL. 16 p 64 0 0.000 0.000 0.000 #<ntp_ip_address_1> 129.6.15.29 2 u 48 64 377 2.445 -11.077 0.910 #<ntp_ip_address_2> 129.6.15.29 2 u 42 64 377 2.715 -2.139 2.747 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 245 Validated Designs – Infrastructure & Topology ExtremeAnalytics ExtremeAnalytics NTP configuration is executed during installation within the command-line interface. Once the appliance is installed, log in to the console as root. The install process starts with a series of configuration questions. The administrator is prompted for NTP configuration under the <Configure Date and Time Settings> section of the install. If the administrator chooses to change the settings after install, a simple run of the dateconfig script can be executed. The dateconfig script is located in /usr/postinstall. Configure Date And Time Settings ================================================================================ The engine date and time can be set manually or using an external Network Time Protocol (NTP) server. It is strongly recommended that NTP is used to configure the date and time to ensure accuracy of time values for SNMP communications and logged events. Up to 5 server IP addresses may be entered if NTP is used. ================================================================================ Do you want to use NTP (y/n) [n]? y Please enter a NTP Server IP Address (Required): <ntp_ip_address_1> Would you like to add another server (y/n) [n]? y Please enter a NTP Server IP Address (Required): <ntp_ip_address_2> Would you like to add another server (y/n) [n]? ============================================================================= NTP Servers ============================================================================= These are the currently specified NTP servers: <ntp_ip_address_1> <ntp_ip_address_2> Enter 0 or any key other than a valid selection to complete NTP configuration and continue. If you need to make a change, enter the appropriate number from the choices listed below. 0. Accept the current settings and continue 1. Restart NTP server selection 2. Set date and time manually ============================================================================= Enter selection [0]: ================================================================================ Set Time Zone ================================================================================ You will now be asked to enter the time zone information for this system. Available time zones are stored in files in the /usr/share/zoneinfo directory. Please select from one of the following example time zones: 1. US Eastern 2. US Central Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 246 Validated Designs – Infrastructure & Topology 3. US Mountain 4. US Pacific 5. Other - Shows a graphical list ================================================================================ Enter selection [1]: Current default time zone: 'America/New_York' Local time is now: Thu Jun 21 21:10:23 EDT 2018. Universal Time is now: Fri Jun 22 01:10:23 UTC 2018. ================================================================================ Print the following to the console if synchronization is successful after the selection of the timezone with the post install script <dateconfig>: The time was successfully synchronized to the server at <ntp_ip_address_1> rsyslog start/running, process 27186 * Starting NTP server ntpd [ OK ] The command <ntpq -np> will also display pertinent information about the NTP daemon operation and performance – including statistics about delay, offset, and jitter. root@EA:/# ntpq -np remote refid st t when poll reach delay offset jitter ============================================================================== 0.ubuntu.pool.n .POOL. 16 p 64 0 0.000 0.000 0.000 1.ubuntu.pool.n .POOL. 16 p 64 0 0.000 0.000 0.000 2.ubuntu.pool.n .POOL. 16 p 64 0 0.000 0.000 0.000 3.ubuntu.pool.n .POOL. 16 p 64 0 0.000 0.000 0.000 ntp.ubuntu.com .POOL. 16 p 64 0 0.000 0.000 0.000 +<ntp_ip_address_1> 132.163.96.2 2 u 48 64 377 2.359 -26.569 8.534 *<ntp_ip_address_2> 132.163.96.2 2 u 37 64 377 2.530 -27.124 28.495 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 247 Validated Designs – Infrastructure & Topology ExtremeWireless Controllers ExtremeWireless Controller NTP configuration is accessed through the User Interface located at Controller Network Network Time. In the Network Time panel, the timezone and up to 3 NTP servers can be added. After filling in the fields, click Apply. To verify NTP server settings, log in to the console and enter the command <time>. Then enter the command <show ntpip>. The following output should be displayed: EWC1.SQA.net:time# show ntpip ntpip 1 <ntp_ip_address_1> ntpip 2 <ntp_ip_address_2> Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 248 Validated Designs – Infrastructure & Topology Extreme Switches Extreme Switch NTP configuration is executed through the command-line-interface. NTP is enabled on VLANs that provide access to the NTP servers and is also enabled on the VR associated with those VLANs. To enable on all VLANs simply enter the command enable ntp all. Following are examples of the NTP configuration within this Validated Design: District Office/School 1 Controlling Bridge 1 enable ntp vr VR-Default enable ntp broadcast-client vr VR-Default enable ntp vlan VLAN_0059 enable ntp vlan VLAN_0060 enable ntp vlan VLAN_0101 enable ntp vlan VLAN_0102 enable ntp vlan VLAN_0103 enable ntp vlan VLAN_0104 enable ntp vlan VLAN_0105 enable ntp vlan VLAN_0109 enable ntp vlan VLAN_1600 enable ntp vlan VLAN_1700 enable ntp vlan VLAN_1800 enable ntp vlan VLAN_1900 enable ntp vlan VLAN_1901 enable ntp vlan VLAN_2200 enable ntp vlan to_isp configure ntp server add <ntp_ip_address_1> vr VR-Default configure ntp server add <ntp_ip_address_2> vr VR-Default District Office/School 1 Controlling Bridge 2 enable ntp vr VR-Default enable ntp broadcast-client vr VR-Default enable ntp vlan VLAN_0059 enable ntp vlan VLAN_0060 enable ntp vlan VLAN_0201 enable ntp vlan VLAN_0202 enable ntp vlan VLAN_0203 enable ntp vlan VLAN_0204 enable ntp vlan VLAN_0205 enable ntp vlan VLAN_0109 enable ntp vlan VLAN_1600 enable ntp vlan VLAN_1700 enable ntp vlan VLAN_1800 enable ntp vlan VLAN_1900 enable ntp vlan VLAN_1901 enable ntp vlan VLAN_2200 configure ntp server add <ntp_ip_address_1> vr VR-Default configure ntp server add <ntp_ip_address_2> vr VR-Default Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 249 Validated Designs – Infrastructure & Topology District Office/School 1 ExtremeSwitching Stack enable ntp vr VR-Default enable ntp broadcast-client vr VR-Default enable ntp vlan VLAN_0059 configure ntp server add <ntp_ip_address_1> vr VR-Default configure ntp server add <ntp_ip_address_2> vr VR-Default School 2 Controlling Bridge 1 enable ntp vr VR-Default enable ntp broadcast-client vr VR-Default enable ntp vlan VLAN_0060 enable ntp vlan VLAN_0101 enable ntp vlan VLAN_0204 enable ntp vlan VLAN_1600 enable ntp vlan VLAN_1700 enable ntp vlan VLAN_1800 enable ntp vlan VLAN_1900 enable ntp vlan VLAN_2200 configure ntp server add <ntp_ip_address_1> vr VR-Default configure ntp server add <ntp_ip_address_2> vr VR-Default School 2 Controlling Bridge 2 enable ntp vr VR-Default enable ntp broadcast-client vr VR-Default enable ntp vlan VLAN_0060 enable ntp vlan VLAN_0104 enable ntp vlan VLAN_0201 enable ntp vlan VLAN_1600 enable ntp vlan VLAN_1700 enable ntp vlan VLAN_1800 enable ntp vlan VLAN_1900 enable ntp vlan VLAN_2200 configure ntp server add <ntp_ip_address_1> vr VR-Default configure ntp server add <ntp_ip_address_2> vr VR-Default Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 250 Validated Designs – Infrastructure & Topology School 3 Controlling Bridge 1 enable ntp vr VR-Default enable ntp broadcast-client vr VR-Default enable ntp vlan VLAN_0060 enable ntp vlan VLAN_0102 enable ntp vlan VLAN_0205 enable ntp vlan VLAN_1600 enable ntp vlan VLAN_1700 enable ntp vlan VLAN_1800 enable ntp vlan VLAN_1900 enable ntp vlan VLAN_2200 configure ntp server add <ntp_ip_address_1> vr VR-Default configure ntp server add <ntp_ip_address_2> vr VR-Default School 3 Controlling Bridge 2 enable ntp vr VR-Default enable ntp broadcast-client vr VR-Default enable ntp vlan VLAN_0060 enable ntp vlan VLAN_0105 enable ntp vlan VLAN_0202 enable ntp vlan VLAN_1600 enable ntp vlan VLAN_1700 enable ntp vlan VLAN_1800 enable ntp vlan VLAN_1900 enable ntp vlan VLAN_2200 configure ntp server add <ntp_ip_address_1> vr VR-Default configure ntp server add <ntp_ip_address_2> vr VR-Default School 4 – ExtremeSwitching Standalone enable ntp vr VR-Default enable ntp broadcast-client vr VR-Default enable ntp vlan lo0 enable ntp vlan VLAN_0060 enable ntp vlan VLAN_0103 enable ntp vlan VLAN_0203 enable ntp vlan VLAN_1600 enable ntp vlan VLAN_1700 enable ntp vlan VLAN_1800 enable ntp vlan VLAN_1900 enable ntp vlan VLAN_2200 configure ntp server add <ntp_ip_address_1> vr VR-Default configure ntp server add <ntp_ip_address_2> vr VR-Default Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 251 Validated Designs – Infrastructure & Topology To verify the NTP daemon is synched with the NTP server, enter the command <show ntp sysinfo>: Slot-1 VPEX x690-DO/SC1-Left.19 # show ntp sys-info System Peer : <ntp_ip_address_2> System Peer Mode : Client Leap Indicator : 00 Stratum : 3 Precision : -23 Root Distance : 0.04980 second Root Dipersion : 0.12390 second Reference ID : [<ntp_ip_address_2>] Referene Time : ded7ab3a.7a287160 Fri, Jun 22 2018 13:07:06.477 System Flags : Monitor, NTP, Kernel, Stats Jitter : 0.034592 second Stability : 0.000 ppm Broadcast Delay : 0.007996 second Auth Delay : 0.000000 second Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 252 Validated Designs – Infrastructure & Topology BOOTP Relay Agent The ExtremeXOS BootPRelay module is Extreme Networks’ DHCP Relay agent. It is now enhanced to optionally insert the secondary addresses of the interfaces. A DHCP Relay agent relays DHCP requests from the client to the DHCP server and relays the DHCP replies from the server to the client. It acts as a proxy and can reduce the number of DHCP servers required in the network. The DHCP relay agent inserts its own IP address in the giaddr field (gateway address) of the DHCP request. The DHCP server looks into this IP address, identifies the DHCP client’s subnet, and assigns an IP address accordingly. We recommend that BootPrelay be configured for both ExtremeControl engines and the redundant DHCP servers if redundancy with DHCP servers is present. BootPrelay must also be enabled on the VLANs in which DHCP packets will traverse. The following configuration is the bootPrelay configuration for this Validated Design: District Office/School 1 Controlling Bridge 1 configure bootprelay add 192.168.109.249 configure bootprelay add 192.168.109.253 configure bootprelay add 192.168.109.248 configure bootprelay add 192.168.109.247 enable bootprelay ipv4 vlan VLAN_0059 enable bootprelay ipv4 vlan VLAN_0060 enable bootprelay ipv4 vlan VLAN_0109 enable bootprelay ipv4 vlan VLAN_1600 enable bootprelay ipv4 vlan VLAN_1700 enable bootprelay ipv4 vlan VLAN_1800 enable bootprelay ipv4 vlan VLAN_1900 enable bootprelay ipv4 vlan VLAN_1901 enable bootprelay ipv4 vlan VLAN_2200 vr vr vr vr VR-Default VR-Default VR-Default VR-Default vr vr vr vr VR-Default VR-Default VR-Default VR-Default District Office/School 1 Controlling Bridge 2 configure bootprelay add 192.168.109.249 configure bootprelay add 192.168.109.253 configure bootprelay add 192.168.109.248 configure bootprelay add 192.168.109.247 enable bootprelay ipv4 vlan VLAN_0059 enable bootprelay ipv4 vlan VLAN_0060 enable bootprelay ipv4 vlan VLAN_0109 enable bootprelay ipv4 vlan VLAN_1600 enable bootprelay ipv4 vlan VLAN_1700 enable bootprelay ipv4 vlan VLAN_1800 enable bootprelay ipv4 vlan VLAN_1900 enable bootprelay ipv4 vlan VLAN_1901 enable bootprelay ipv4 vlan VLAN_2200 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 253 Validated Designs – Infrastructure & Topology District Office/School 1 ExtremeSwitching Stack configure bootprelay add 192.168.109.249 vr VR-Default configure bootprelay add 192.168.109.253 vr VR-Default configure bootprelay add 192.168.109.248 vr VR-Default enable bootprelay ipv4 vlan VLAN_0059 School 2 Controlling Bridge 1 configure bootprelay add 192.168.109.249 configure bootprelay add 192.168.109.253 configure bootprelay add 192.168.109.248 configure bootprelay add 192.168.109.247 enable bootprelay ipv4 vlan VLAN_0060 enable bootprelay ipv4 vlan VLAN_0101 enable bootprelay ipv4 vlan VLAN_0204 enable bootprelay ipv4 vlan VLAN_1600 enable bootprelay ipv4 vlan VLAN_1700 enable bootprelay ipv4 vlan VLAN_1800 enable bootprelay ipv4 vlan VLAN_1900 enable bootprelay ipv4 vlan VLAN_2200 vr vr vr vr VR-Default VR-Default VR-Default VR-Default vr vr vr vr VR-Default VR-Default VR-Default VR-Default vr vr vr vr VR-Default VR-Default VR-Default VR-Default School 2 Controlling Bridge 2 configure bootprelay add 192.168.109.249 configure bootprelay add 192.168.109.253 configure bootprelay add 192.168.109.248 configure bootprelay add 192.168.109.247 enable bootprelay ipv4 vlan VLAN_0060 enable bootprelay ipv4 vlan VLAN_0101 enable bootprelay ipv4 vlan VLAN_0204 enable bootprelay ipv4 vlan VLAN_1600 enable bootprelay ipv4 vlan VLAN_1700 enable bootprelay ipv4 vlan VLAN_1800 enable bootprelay ipv4 vlan VLAN_1900 enable bootprelay ipv4 vlan VLAN_2200 School 3 Controlling Bridge 1 configure bootprelay add 192.168.109.249 configure bootprelay add 192.168.109.253 configure bootprelay add 192.168.109.248 configure bootprelay add 192.168.109.247 enable bootprelay ipv4 vlan VLAN_0060 enable bootprelay ipv4 vlan VLAN_0102 enable bootprelay ipv4 vlan VLAN_0205 enable bootprelay ipv4 vlan VLAN_1600 enable bootprelay ipv4 vlan VLAN_1700 enable bootprelay ipv4 vlan VLAN_1800 enable bootprelay ipv4 vlan VLAN_1900 enable bootprelay ipv4 vlan VLAN_2200 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 254 Validated Designs – Infrastructure & Topology School 3 Controlling Bridge 2 configure bootprelay add 192.168.109.249 configure bootprelay add 192.168.109.253 configure bootprelay add 192.168.109.248 configure bootprelay add 192.168.109.247 enable bootprelay ipv4 vlan VLAN_0060 enable bootprelay ipv4 vlan VLAN_0105 enable bootprelay ipv4 vlan VLAN_0202 enable bootprelay ipv4 vlan VLAN_1600 enable bootprelay ipv4 vlan VLAN_1700 enable bootprelay ipv4 vlan VLAN_1800 enable bootprelay ipv4 vlan VLAN_1900 enable bootprelay ipv4 vlan VLAN_2200 vr vr vr vr VR-Default VR-Default VR-Default VR-Default School 4 – ExtremeSwitching Standalone configure bootprelay add 192.168.109.249 vr VR-Default configure bootprelay add 192.168.109.253 vr VR-Default configure bootprelay add 192.168.109.248 vr VR-Default enable bootprelay ipv4 vlan VLAN_0060 enable bootprelay ipv4 vlan VLAN_0103 enable bootprelay ipv4 vlan VLAN_0203 enable bootprelay ipv4 vlan VLAN_1600 enable bootprelay ipv4 vlan VLAN_1700 enable bootprelay ipv4 vlan VLAN_1800 enable bootprelay ipv4 vlan VLAN_1900 enable bootprelay ipv4 vlan VLAN_2200 To view statistics on requests relayed, enter the command <show bootprelay>: Slot-1 VPEX x690-DO/SC1-Left.47 # show bootprelay Bootprelay : Disabled on virtual router "VR-Default", but enabled on some VLANs Include Secondary : Disabled DHCP Relay Agent Information Option : Disabled on virtual router "VR-Default" Bootprelay servers for virtual router "VR-Default": Destination: 192.168.109.249 192.168.109.253 192.168.109.248 192.168.109.247 DHCP/BOOTP relay statistics for virtual router "VR-Default" Received from client = 3502 Received from server Requests relayed = 12 Responses relayed DHCP Discover = 1760 DHCP Offer DHCP Request = 2 DHCP Ack DHCP Decline = 0 DHCP NAck DHCP Release = 0 DHCP Inform = 1740 = = = = = 3 3 1 2 0 Note: Default Remote-ID : System MAC Address Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 255 Validated Designs – Infrastructure & Topology Link Layer Discover Protocol (LLDP) LLDP is enabled by default in ExtremeXOS and is an integral part of the process for the initial discovery of Extreme’s Bridge Port Extenders (BPEs). Each BPE will initially be discovered using a TLV extension to the LLDP protocol along with certain LLDP-MED TLVs that specify serial number, model name, hardware version, and firmware version. The Port Extension Control and Status Protocol (PE-CSP) is a simple request/response protocol that runs over ECP and is initiated upon detection of a bridge port extender via the LLDP protocol. The Link Layer Discovery Protocol (LLDP), defined by IEEE standard 802.1ab, provides a standard method for discovering physical network devices and their capabilities within a given network management domain. LLDP-enabled network devices include repeaters, bridges, access points, routers, and wireless stations, and LLDP enables these devices to do the following: • Advertise device information and capabilities to other devices in the management domain. • Receive and store device information received from other network devices in the management domain. LLDP-discovered information can be used to do the following: • Discover information from all LLDP-compatible devices in a multivendor environment. • Trigger universal port profiles that can configure a switch port for a remote device. • Supply identity information that can be used for authentication and identity management • Provide device information to SNMP (Simple Network Management Protocol) compatible network management systems such as Extreme Management Center or Ridgeline. These systems can present the information in inventory reports and topology maps. No additional steps are needed to configure LLDP for initial BPE discovery after slot and VPEX port configuration. To view LLDP neighbors, enter the command <show lldp neighbors>: Slot-1 VPEX x690-DO/SC1-Left.56 # show lldp neighbors Neighbor Neighbor Neighbor Port Chassis ID Port ID TTL Age System Name =============================================================================== 1:7 00:1F:45:FB:72:C2 ge.1.47 120 22 Not-Advertised 1:45 02:04:96:A0:A7:2E 1:51 120 21 x440G2-DO/SC1-Stack 1:46 64:6A:52:9E:0C:00 64:6A:52:9E:0C:64 120 6 VSP-8404 1:47 D8:84:66:88:98:44 25 120 1 V400-24p-10GE2 1:48 00:02:23:05:17:00 25 120 2 V400-24t-10GE2 1:49 00:04:96:A5:05:26 1:49 120 26 x690-DO/SC1-Right 1:53 00:04:96:A5:05:26 1:53 120 26 x690-DO/SC1-Right 1:57 64:6A:52:9E:0C:00 64:6A:52:9E:0C:00 120 6 VSP-8404 100:13 D8:84:66:E3:25:BC eth0 120 6 DO-SC1-AP2-AP3935i 100:14 B4:2D:56:25:72:27 eth0 120 1 DO-SC1-AP1-AP3917e =============================================================================== Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 256 Validated Designs – Infrastructure & Topology Simple Network Management Protocol (SNMPv3) SNMPv3 is an enhanced standard for SNMP that improves the security and privacy of SNMP access to managed devices and provides sophisticated control of access to the device MIB. The prior standard versions of SNMP, SNMPv1, and SNMPv2c, provided no privacy and little security. SNMPv3 is designed to be secure against: • Modification of information, where an in-transit message is altered. • Masquerades, where an unauthorized entity assumes the identity of an authorized entity. • Message stream modification, where packets are delayed and/or replayed. • Disclosure, where packet exchanges are sniffed (examined) and information is learned about the contents. You can use the access control subsystem to configure whether access to a managed object in a local MIB is allowed for a remote principal. The access control scheme allows you to define access policies based on MIB views, groups, and multiple security levels. In addition, the SNMPv3 target and notification MIBs provide a more procedural approach for generating and filtering of notifications. SNMPv3 objects are stored in non-volatile memory unless specifically assigned to volatile storage. Objects defined as permanent cannot be deleted. SNMP is disabled by default. If you choose to enable SNMP, the switch follows the interactive script asking you if you want to enable SNMPv1/v2c and/or SNMPv3. SNMP access for a VR has global SNMP status that includes all SNMPv1v2c, SNMPv3 default users and default group status. However, trap receiver configuration and trap enabling/disabling are independent of global SNMP access and are still forwarded on a VR that is disabled for SNMP access. For Extreme Management Center to take advantage of the more secure and robust SNMPv3 XMC, the controlling bridges and wireless controllers must be configured for the proper matching credentials and user name. In Extreme Management Center, administration profiles are required to communicate to the network devices and wireless controllers. The following steps are required to create an Administration Profile (CLI Credentials Profiles SNMP Credentials). Extreme Management Center Profile Configuration - Switching Profiles are used to define access to the devices in the network by creating identities used for authentication when performing SNMP queries and sets and identities for CLI operations. A profile can be configured with the SNMP version to be used and the read and write user and security level. It also points to a set of CLI credentials. In the Smart OmniEdge solution, a profile that uses SNMPv3 was created and is used by all network devices. For CLI, SSH access is enabled. Authentication for CLI is done via RADIUS server. A different SNMPv3 profile is used by the wireless controllers. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 257 Validated Designs – Infrastructure & Topology To create new CLI credentials, go to Administration CLI Credentials and click Add. Only SSH is permitted for management connections to the network devices. Telnet access is disabled. 1. 2. 3. 4. 5. 6. 7. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 Configure a Description Configure a User Name Configure SSH as the Type. Configure a Login Password. Configure an Enable Password. Configure a Configuration Password. Click Save 258 Validated Designs – Infrastructure & Topology To create a new profile, go to Administration Profiles and select Add to create a custom SNMP profile: 1. Configure a Profile Name 2. Select SNMP Version – SNMPv3 3. Select New… 4. Add SNMP Credential Window Appears. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 259 Validated Designs – Infrastructure & Topology 1. 2. 3. 4. 5. 6. 7. 8. Configure a Credential Name. Select from SNMP Version: SNMPv3. Configure a User Name. Select from Authentication Type: SHA. Configure an Authentication Password. Select form Privacy Type: AES. Configure a Privacy Password. Click Save. The same SNMPv3 user with the same authentication protocol and password and the same privacy protocol and password must be created on the network device. Configure the created profile with the new SNMP and CLI credential: Use the newly created xmc_snmpuser for Read/Write/Max Access. Use AuthPriv for Read Security/Write Security/Max Security. Use the newly created radiusmgmt CLI credentials. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 260 Validated Designs – Infrastructure & Topology Switch Configuration – Extreme Management Center Administration Profile After the administration profile is configured in Extreme Management Center, the same credentials must be configured on the device for Extreme Management Center to manage and configure the device. By default, the SNMPv3 engine-ID is present within the <snmpMaster configuration> module. To match the credentials configured within the Extreme Management Center administrative profile, enter the command <configure snmpv3 add user xmc_v3 authentication sha privacy aes 128>. You will be prompted with a series of password entries that must match the passwords within the administrator profile for Authentication and Privacy. (extreme1234 is the password used for this Validated Design.) After executing the above command, you should receive output similar to the following when you issue the command <show snmp configuration>: configure snmpv3 engine-id 03:00:04:96:a0:89:e8 configure snmpv3 add user "xmc_v3" engine-id 80:00:07:7c:03:00:04:96:a0:89:e8 authentication sha auth-encrypted localized-key 23:24:65:74:7a:6d:6b:74:34:34:61:65:50:54:42:4a:2f:30:78:32:59:72:53:72:43:44:33:4e:55 :42:35:59:56:41:35:72:30:66:39:65:53:53:6a:4e:38:4d:48:4d:38:33:39:30:77:3d privacy aes 128 privacy-encrypted localized-key 23:24:7a:6c:6b:67:50:5a:6c:64:75:51:71:41:76:2b:2b:4c:4b:4d:34:6e:33:56:45:67:37:49:30 :75:74:66:4a:71:71:39:57:51:70:43:72:44:41:42:67:6e:32:38:77:5a:32:78:34:3d Enter the following commands to complete the SNMPv3 configuration for this Validated Design. The following shows commands and their output. configure snmpv3 add group "v3group" user "xmc_v3" sec-model usm configure snmpv3 add access "v3group" sec-model usm sec-level priv read-view "defaultAdminView" write-view "defaultAdminView" notify-view "defaultAdminview" configure snmpv3 add community "private" name "private" user "v1v2c_rw" configure snmpv3 add community "public" name "public" user "v1v2c_ro" configure snmpv3 add target-addr "TVsnmpuser" param "TV1snmpuser" ipaddress 192.168.109.254 transport-port 162 tag-list "TVInformTag" configure snmpv3 add target-params "TV1snmpuser" user "snmpuser" mp-model snmpv3 secmodel usm sec-level priv configure snmpv3 add notify "TVInformTag" tag "TVInformTag" type inform enable snmp access disable snmp access snmp-v1v2c enable snmp access snmpv3 disable snmpv3 default-group Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 261 Validated Designs – Infrastructure & Topology To show SNMP configuration, enter the command <show configuration snmp>: # # Module snmpMaster configuration. # configure snmpv3 engine-id 03:00:04:96:a4:e8:3e configure snmpv3 add user "xmc_v3" engine-id 80:00:07:7c:03:00:04:96:a4:e8:3e authentication sha auth-encrypted localized-key 23:24:4d:42:76:43:6a:70:48:67:6b:59:6c:4f:4f:4b:59:59:70:74:71:37:55:70:69:77:2b:4e:4c :54:45:4e:66:66:4f:75:45:43:6a:39:61:6b:36:30:30:79:45:70:75:62:47:33:49:3d privacy aes 128 privacy-encrypted localized-key 23:24:56:50:74:30:33:37:33:66:74:75:4c:7a:65:37:2f:48:34:34:61:2b:6f:72:36:58:5a:52:57 :77:48:73:35:51:41:73:75:46:74:54:4a:6a:6e:6e:32:6a:58:57:71:76:38:73:51:3d configure snmpv3 add group "v3group" user "xmc_v3" sec-model usm configure snmpv3 add access "v3group" sec-model usm sec-level priv read-view "defaultAdminView" write-view "defaultAdminView" notify-view "defaultAdminview" configure snmpv3 add community "private" name "private" user "v1v2c_rw" configure snmpv3 add community "public" name "public" user "v1v2c_ro" configure snmpv3 add target-addr "TVsnmpuser" param "TV1snmpuser" ipaddress 192.168.109.254 transport-port 162 tag-list "TVInformTag" configure snmpv3 add target-params "TV1snmpuser" user "snmpuser" mp-model snmpv3 secmodel usm sec-level priv configure snmpv3 add notify "TVInformTag" tag "TVInformTag" type inform enable snmp access disable snmp access snmp-v1v2c enable snmp access snmpv3 disable snmpv3 default-group Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 262 Validated Designs – Infrastructure & Topology Extreme Management Center Profile Configuration - Wireless Controllers Profiles are used to define access to the wireless controllers in the network by creating identities used for authentication when performing SNMP queries and sets and identities for CLI operations. A profile can be configured with the SNMP version to be used for the read and write user and security level. It also points to a set of CLI credentials for the wireless controllers. In the Smart OmniEdge solution, a profile that uses SNMPv3 was created and is used by Extreme Management Center for the wireless controllers. For CLI, SSH access is enabled. Authentication for CLI is done via RADIUS server. To create new CLI credentials, go to Administration CLI Credentials and click Add. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 263 Validated Designs – Infrastructure & Topology Only SSH is permitted for management connections to the network devices. Telnet access is disabled. 1. 2. 3. 4. 5. 6. 7. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 Configure a Description Configure a User Name Configure SSH as the Type. Configure a Login Password. Configure an Enable Password. Configure a Configuration Password. Click Save 264 Validated Designs – Infrastructure & Topology To create a new Wireless Profile for the wireless controllers, go to Administration Profiles and click Add. 1. Configure a Profile Name 2. Select SNMP Version – SNMPv3 3. Select New… 4. Add SNMP Credential Window Appears. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 265 Validated Designs – Infrastructure & Topology 1. 2. 3. 4. 5. 6. 7. 8. Configure a Credential Name. Select from SNMP Version: SNMPv3. Configure a User Name. Select from Authentication Type: SHA. Configure an Authentication Password. Select form Privacy Type: DES. Configure a Privacy Password. Click Save. The same SNMPv3 user with the same authentication protocol and password and the same privacy protocol and password must be created on the ExtremeWireless Controllers. Configure the created profile with the new SNMP and CLI credential: Use the newly created snmpuserewc for Read/Write/Max Access. Use AuthPriv for Read Security/Write Security/Max Security. Use the newly created radiusmgmt CLI credentials. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 266 Validated Designs – Infrastructure & Topology ExtremeWireless Controller SNMPv3 Configuration Extreme Management Center uses non-default SNMPv3 credentials to manage wireless controllers. The same SNMPv3 user, password, authentication, and privacy protocols must be configured on both Extreme Management Center and on the wireless controllers. To configure SNMPv3 on the wireless controllers go to Controller Network SNMP SNMPv3 Add User Account. EWC1 and EWC2 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 267 Validated Designs – Infrastructure & Topology The Add SNMPv3 User Account window appears. Credentials must match those created in the Basic Extreme Management Center section of this document. Authentication Password: snmppasssha123 Privacy Password: snmppassdes456 SNMPv3 User Account Created and enabled. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 268 Validated Designs – Infrastructure & Topology Domain Name System (DNS) To obtain captive portal redundancy, DNS is used to provide one URL address for both ExtremeControl engines. If one engine is unreachable the second engine will take over because both are associated with the same FQDN. Essentially, both ExtremeControl engine IPs are added to the same FQDN within the domain of the DNS server. Additional configuration is required on the external DHCP server which is detailed in the Captive Portal Redundancy subsection in the section for the District Office/School 1. As an added layer of security, select the use Fully Qualified Domain Name checkbox to hide the IP addresses of the ExtremeControl servers when an unregistered user is redirected. This is located in Extreme Management Center: Access Control Configuration Captive Portals Network Settings. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 269 Validated Designs – Infrastructure & Topology RADIUS Login Management Configuration For full network administration security, we recommend RADIUS authentication for Extreme Management Center, ExtremeWireless Controllers, and Extreme device login. The use of an external RADIUS server is recommended to authenticate user access to Extreme’s appliances and switches for administrative purposes. To configure login authentication for Extreme Management Center, go to Administration Users, set the Authentication Method to RADIUS, and enter the IP addresses of the redundant RADIUS servers. RADIUS servers must be configured for the Extreme Management Center user in Active Directory. Set the Authentication Type to RADIUS in the Authentication Method panel and enter the primary and secondary IP addresses of the RADIUS servers. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 270 Validated Designs – Infrastructure & Topology When a new user is added, an associated Authorization Group – with the appropriate capabilities – must be created in the Authorization Groups window. To configure SSH access to Extreme Management Center, click Manage SSH Configuration under SSH Configuration. A popup will appear with appropriate fields to configure the port, primary and secondary RADIUS servers, and the SSH user that should have access. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 271 Validated Designs – Infrastructure & Topology ExtremeWireless Controllers Users connecting to the wireless controllers for management operations can be authenticated locally or by using a RADIUS server. To enable the use of a RADIUS server, go to Controller Administration Login Management. Click the Configure button and enable RADIUS. In the Login Authentication dialog, verify that RADIUS is enabled. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 272 Validated Designs – Infrastructure & Topology Go to the RADIUS Authentication tab to select the ExtremeControl engines as RADIUS servers. The NAS IP address is the address used by the wireless controller when sending RADIUS requests and is one of the wireless controller’s interfaces. This address must be in the Switch list on ExtremeControl. Select PAP as the authentication type. After configuring all fields, use the Test button to verify authentication. Configure RADIUS Authentication for a second NAC with the same values: NAS IP Address: 192.168.109.251 NAS identifier: EWC1 Auth Type: PAP To test RADIUS connectivity: Enter Credentials: User ID: admin Password: extreme Click Test Test of both RADIUS servers should return Successful. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 273 Validated Designs – Infrastructure & Topology ExtremeSwitching To configure login authentication on ExtremeSwitching, <mgmt-access> must be configured on the switch. With RADIUS <mgmt-access> enabled within the <aaa> module, any Administrator user that tries to connect to the network device via SSH, Telnet, or console will be authenticated first against the ExtremeControl configuration. Enter the command <enable radius mgmt-access>. The command should be present within the aaa configuration module after execution: configure radius 1 server 192.168.109.253 1812 client-ip 192.168.200.1 vr VR-Default configure radius 1 shared-secret encrypted "#$/ypcBfx8EIF2LWYdNI8s43RpczWx0Q==" configure radius 2 server 192.168.109.248 1812 client-ip 192.168.200.1 vr VR-Default configure radius 2 shared-secret encrypted "#$cru/E2aDkLExef/+GgdtIpPE8My86Q==" configure radius-accounting 1 server 192.168.109.253 1813 client-ip 192.168.200.1 vr VR-Default configure radius-accounting 1 shared-secret encrypted "#$ptyf4X9trw2v2vkohFGFy01cEnsiZw==" configure radius-accounting 1 timeout 10 configure radius-accounting 2 server 192.168.109.248 1813 client-ip 192.168.200.1 vr VR-Default configure radius-accounting 2 shared-secret encrypted "#$DxnMfpS4f7LKOUBJFkhjKWg9aRUVrg==" configure radius-accounting 2 timeout 10 configure radius dynamic-authorization 1 server 192.168.109.253 client-ip 192.168.200.1 vr VR-Default shared-secret encrypted "#$uvGqcNWvFXFKq03zFwcRRNc/t6pPZQ==" configure radius dynamic-authorization 2 server 192.168.109.248 client-ip 192.168.200.1 vr VR-Default shared-secret encrypted "#$+pEQhFKsrDP0VMCFdp3SxfcwuA0LzA==" enable radius enable radius mgmt-access enable radius netlogin configure radius timeout 15 configure radius mgmt-access timeout 15 configure radius netlogin timeout 15 enable radius-accounting enable radius-accounting mgmt-access enable radius-accounting netlogin enable radius dynamic-authorization Secure Shell (SSH) SSH is disabled by default. We recommend the disabling of Telnet access to network devices and enable SSH for security and authentication purposes. Secure Shell 2 (SSH2) is a feature of the ExtremeXOS software that enables you to encrypt session data between a network administrator using SSH2 client software and the switch, or to send encrypted data from the switch to an SSH2 client on a remote system. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 274 Validated Designs – Infrastructure & Topology Enter the command <enable ssh2>. The following output will be generated: enable ssh2 WARNING: Generating new server host key This could take up to 1 minute and cannot be cancelled. ..................... Key Generated. Enter the Design. configure configure configure configure configure configure configure configure configure configure configure configure configure configure configure configure configure configure configure configure configure Continue? (y/N) Yes following commands to complete the SSH configuration for this Validated ssh2 ssh2 ssh2 ssh2 ssh2 ssh2 ssh2 ssh2 ssh2 ssh2 ssh2 ssh2 ssh2 ssh2 ssh2 ssh2 ssh2 ssh2 ssh2 ssh2 ssh2 dh-group minimum 1 enable cipher aes128-cbc enable cipher 3des-cbc enable cipher blowfish-cbc enable cipher cast128-cbc enable cipher aes192-cbc enable cipher aes256-cbc enable cipher arcfour enable cipher rijndael-cbc@lysator.liu.se enable cipher arcfour256 enable cipher arcfour128 enable mac hmac-md5-etm@openssh.com enable mac hmac-ripemd160-etm@openssh.com enable mac hmac-sha1-96-etm@openssh.com enable mac hmac-md5-96-etm@openssh.com enable mac hmac-md5 enable mac hmac-ripemd160 enable mac hmac-ripemd160@openssh.com enable mac hmac-sha1-96 enable mac hmac-md5-96 enable pk-alg ssh-dss Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 275 Validated Designs – Infrastructure & Topology You should see the following output after entering the command <show config exsshd>: enable ssh2 configure ssh2 configure ssh2 configure ssh2 configure ssh2 configure ssh2 configure ssh2 configure ssh2 configure ssh2 configure ssh2 configure ssh2 configure ssh2 configure ssh2 configure ssh2 configure ssh2 configure ssh2 configure ssh2 configure ssh2 configure ssh2 configure ssh2 configure ssh2 configure ssh2 dh-group minimum 1 enable cipher aes128-cbc enable cipher 3des-cbc enable cipher blowfish-cbc enable cipher cast128-cbc enable cipher aes192-cbc enable cipher aes256-cbc enable cipher arcfour enable cipher rijndael-cbc@lysator.liu.se enable cipher arcfour256 enable cipher arcfour128 enable mac hmac-md5-etm@openssh.com enable mac hmac-ripemd160-etm@openssh.com enable mac hmac-sha1-96-etm@openssh.com enable mac hmac-md5-96-etm@openssh.com enable mac hmac-md5 enable mac hmac-ripemd160 enable mac hmac-ripemd160@openssh.com enable mac hmac-sha1-96 enable mac hmac-md5-96 enable pk-alg ssh-dss Multicast (IGMP and PIM-SM) Multicast has many applications. However, for most schools the primary use case is for video delivery and security camera applications. In this design, IGMP and IGMP snooping will be configured for Layer 2 multicast. PIM sparse mode will be used to route multicast routing. Internet Group Management Protocol IGMP and IGMP snooping should be enabled by default. If they are not enabled, you can enable them by issuing the following commands: All Controlling Bridges and ExtremeSwitching Access Switches enable igmp enable igmp snooping Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 276 Validated Designs – Infrastructure & Topology Enable IP Multicast Forwarding In order to route multicast traffic, IP Multicast Forwarding must be enabled on all forwarding VLANs in the school district. Configuration should resemble the following: District Office/School 1– Controlling Bridge 1 enable enable enable enable enable enable enable enable enable enable enable enable enable enable enable ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding vlan vlan vlan vlan vlan vlan vlan vlan vlan vlan vlan vlan vlan vlan vlan "VLAN_0059" "VLAN_0060" "VLAN_0101" "VLAN_0102" "VLAN_0103" "VLAN_0104" "VLAN_0105" "VLAN_0109" "VLAN_1600" "VLAN_1700" "VLAN_1800" "VLAN_1900" "VLAN_1901" "VLAN_2200" "lo0" District Office/School 1– Controlling Bridge 2 enable enable enable enable enable enable enable enable enable enable enable enable enable enable enable ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding vlan vlan vlan vlan vlan vlan vlan vlan vlan vlan vlan vlan vlan vlan vlan "VLAN_0059" "VLAN_0060" "VLAN_0201" "VLAN_0202" "VLAN_0203" "VLAN_0204" "VLAN_0205" "VLAN_0109" "VLAN_1600" "VLAN_1700" "VLAN_1800" "VLAN_1900" "VLAN_1901" "VLAN_2200" "lo0" District Office/School 1 – ExtremeSwitching Stack enable ipmcforwarding vlan "VLAN_0059" enable ipmcforwarding vlan "lo0" Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 277 Validated Designs – Infrastructure & Topology School 2 – Controlling Bridge 1 enable enable enable enable enable enable enable enable enable ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding vlan vlan vlan vlan vlan vlan vlan vlan vlan "VLAN_0060" "VLAN_0101" "VLAN_0204" "VLAN_1600" "VLAN_1700" "VLAN_1800" "VLAN_1900" "VLAN_2200" "lo0" School 2 – Controlling Bridge 2 enable enable enable enable enable enable enable enable enable ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding vlan vlan vlan vlan vlan vlan vlan vlan vlan "VLAN_0060" "VLAN_0104" "VLAN_0201" "VLAN_1600" "VLAN_1700" "VLAN_1800" "VLAN_1900" "VLAN_2200" "lo0" School 3 – Controlling Bridge 1 enable enable enable enable enable enable enable enable enable ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding vlan vlan vlan vlan vlan vlan vlan vlan vlan "VLAN_0060" "VLAN_0102" "VLAN_0205" "VLAN_1600" "VLAN_1700" "VLAN_1800" "VLAN_1900" "VLAN_2200" "lo0" School 3 – Controlling Bridge 2 enable enable enable enable enable enable enable enable enable ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding vlan vlan vlan vlan vlan vlan vlan vlan vlan "VLAN_0060" "VLAN_0105" "VLAN_0202" "VLAN_1600" "VLAN_1700" "VLAN_1800" "VLAN_1900" "VLAN_2200" "lo0" Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 278 Validated Designs – Infrastructure & Topology School 4 – ExtremeSwitching Standalone enable enable enable enable enable enable enable enable ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding ipmcforwarding vlan vlan vlan vlan vlan vlan vlan vlan "lo0" "VLAN_0060" "VLAN_0103" "VLAN_0203" "VLAN_1600" "VLAN_1700" "VLAN_1800" "VLAN_2200" Create Rendezvous Point Policy File Before PIM Sparse Mode can be enabled, an rp_list.pol file must be created for dynamic RP multicast group assignment. The steps below create a very simple CR-P file that covers the entire multicast group range. Create an rp_list.pol file on each District Office switch: 1. At the prompt issue vi rp_list.pol. 2. Press the ‘i’ key on the keyboard. 3. Enter the following RP District Office/School 1 - Controlling Bridges 1 and 2 entry rp_list { if match any { } then { nlri 224.0.0.0/4; } } 4. Press the Esc key on the keyboard. 5. Save the rp-list.pol file by entering wq!. 6. Verify that the file has been created by entering ls at the prompt. District Office/School 1 Controlling Bridges 1 and 2 Slot-1 VPEX x690-DO-Left.46 # ls -rw-r--r-1 admin admin 62 Jun 1 08:42 rp_list.pol PIM Sparse Mode C-BSR and C-RP Configuration The two District Office controlling bridges will serve as both candidate bootstrap routers and candidate rendezvous points. The CBSR and CRP should use the loopback interface created. PIM-SM will also be enabled on the VLAN_0060 VLAN to facilitate the BSR and RP election process. The rp_list.pol file should be referenced in the CRP configuration. When complete, the configuration should look similar to the one below: Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 279 Validated Designs – Infrastructure & Topology District Office/School 1 Controlling Bridge 1 configure pim add vlan "VLAN_0060" sparse configure pim add vlan "lo0" sparse configure pim crp vlan "lo0" "rp_list" 192 enable pim iproute sharing enable pim configure pim cbsr vlan "lo0" District Office/School 1 Controlling Bridge 2 configure pim add vlan "VLAN_0060" sparse configure pim add vlan "lo0" sparse configure pim crp vlan "lo0" "rp_list" 192 enable pim iproute sharing enable pim configure pim cbsr vlan "lo0" At the prompt, enter show pim (output truncated) and verify that the following things are true. District Office/School 1 Controlling Bridge 1 1. PIM is enabled. 2. PIM CRP is enabled and the ‘c’ flag is set on configured VLANs. 3. VLAN VLAN_0060 sees a neighbor. 4. VLAN s loO of CBs are BSR CANDIDATES. 5. Verify BSR is selected. Slot-1 VPEX X690-48x-2q-4c.180 # show pim PIM Enabled, Version 2 PIM CRP Enabled on 1 interfaces BSR state : CANDIDATE ; BSR Hash Mask : 255.255.255.252 Current BSR Info : 192.168.200.2 (Priority 0) expires after 103 sec Configured BSR Info : 192.168.200.1 (Priority 0) in vlan lo0 … VLAN Cid VLAN_0060 lo0 IP Address 2 192.168.60.2 3 192.168.200.1 Designated Router / 24 192.168.60.3 / 32 192.168.200.1 Flags Hello J/P Int Int rifms------- 30 60 rifmsc------ 30 60 Nbrs 1 0 District Office/School 1 Controlling Bridge 2 Slot-1 VPEX X690-48x-2q-4c.135 # show pim PIM Enabled, Version 2 PIM CRP Enabled on 1 interfaces BSR state : ELECTED ; BSR Hash Mask : 255.255.255.252 Current BSR Info : 192.168.200.2 (Priority 0) expires after 27 sec Configured BSR Info : 192.168.200.2 (Priority 0) in vlan lo0 … VLAN VLAN_0060 lo0 Cid IP Address 2 192.168.60.3 3 192.168.200.2 Designated Router / 24 192.168.60.3 / 32 192.168.200.2 Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 Flags Hello J/P Int Int rifms------- 30 60 rifmsc------ 30 60 Nbrs 1 0 280 Validated Designs – Infrastructure & Topology At the prompt, enter show pim rp-set and verify that both switches see each other as Candidate Rendezvous Points (C-RP). District Office/School 1 Controlling Bridge 1 1. Verify both C-RPs are configured to act as the RP Slot-1 VPEX X690-48x-2q-4c.181 # show pim rp-set for the entire 224.0.0.0/4 Multicast Address Range. Group Mask C-RP Origin 2.Priority Both C -RPs are Timeout seen on both routers. 224.0.0.0 240.0.0.0 192.168.200.1 Bootstrap 192 92 224.0.0.0 240.0.0.0 192.168.200.2 Bootstrap 192 92 District Office/School 1 Controlling Bridge 2 Slot-1 VPEX X690-48x-2q-4c.137 # Group Mask C-RP 224.0.0.0 240.0.0.0 192.168.200.1 224.0.0.0 240.0.0.0 192.168.200.2 Origin Priority Bootstrap 192 Bootstrap 192 Timeout 134 134 Configure PIM-SM Interfaces Like OSPF, these interfaces will act as the main aggregation point for routed multicast traffic. PIM-SM will be configured on all interfaces in the topology. PIM-SM has already been enabled at the District Office/School 1 and will be enabled at the remaining schools. When complete, the configuration should look similar to the one below: District Office/School 1– Controlling Bridge 1 configure configure configure configure configure configure configure configure configure configure configure configure configure configure configure pim pim pim pim pim pim pim pim pim pim pim pim pim pim pim add add add add add add add add add add add add add add add vlan vlan vlan vlan vlan vlan vlan vlan vlan vlan vlan vlan vlan vlan vlan "VLAN_0109" sparse "lo0" sparse "VLAN_0101" sparse "VLAN_0104" sparse "VLAN_0103" sparse "VLAN_0105" sparse "VLAN_0102" sparse "VLAN_0060" sparse "VLAN_0059" sparse "VLAN_1900" sparse "VLAN_1600" sparse "VLAN_2200" sparse "VLAN_1700" sparse "VLAN_1901" sparse "VLAN_1800" sparse Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 281 Validated Designs – Infrastructure & Topology District Office/School 1– Controlling Bridge 2 configure configure configure configure configure configure configure configure configure configure configure configure configure configure configure pim pim pim pim pim pim pim pim pim pim pim pim pim pim pim add add add add add add add add add add add add add add add vlan vlan vlan vlan vlan vlan vlan vlan vlan vlan vlan vlan vlan vlan vlan "VLAN_0109" sparse "lo0" sparse "VLAN_0204" sparse "VLAN_0201" sparse "VLAN_0203" sparse "VLAN_0205" sparse "VLAN_0202" sparse "VLAN_0060" sparse "VLAN_0059" sparse "VLAN_1600" sparse "VLAN_2200" sparse "VLAN_1700" sparse "VLAN_1900" sparse "VLAN_1901" sparse "VLAN_1800" sparse School 2 – Controlling Bridge 1 configure pim add vlan "VLAN_0060" sparse configure pim add vlan "VLAN_0101" sparse configure pim add vlan "VLAN_0204" sparse configure pim add vlan "VLAN_1600" sparse configure pim add vlan "VLAN_1700" sparse configure pim add vlan "VLAN_1800" sparse configure pim add vlan "VLAN_1900" sparse configure pim add vlan "VLAN_2200" sparse configure pim add vlan "lo0" sparse enable pim iproute sharing enable pim School 2 – Controlling Bridge 2 configure pim add vlan "VLAN_0060" sparse configure pim add vlan "VLAN_0104" sparse configure pim add vlan "VLAN_0201" sparse configure pim add vlan "VLAN_1600" sparse configure pim add vlan "VLAN_1700" sparse configure pim add vlan "VLAN_1800" sparse configure pim add vlan "VLAN_1900" sparse configure pim add vlan "VLAN_2200" sparse configure pim add vlan "lo0" sparse enable pim iproute sharing enable pim Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 282 Validated Designs – Infrastructure & Topology School 3 – Controlling Bridge 1 configure pim add vlan "VLAN_0060" sparse configure pim add vlan "VLAN_0102" sparse configure pim add vlan "VLAN_0205" sparse configure pim add vlan "VLAN_1600" sparse configure pim add vlan "VLAN_1700" sparse configure pim add vlan "VLAN_1800" sparse configure pim add vlan "VLAN_1900" sparse configure pim add vlan "VLAN_2200" sparse configure pim add vlan "lo0" sparse enable pim iproute sharing enable pim School 3 – Controlling Bridge 2 configure pim add vlan "VLAN_0060" sparse configure pim add vlan "VLAN_0105" sparse configure pim add vlan "VLAN_0202" sparse configure pim add vlan "VLAN_1600" sparse configure pim add vlan "VLAN_1700" sparse configure pim add vlan "VLAN_1800" sparse configure pim add vlan "VLAN_1900" sparse configure pim add vlan "VLAN_2200" sparse configure pim add vlan "lo0" sparse enable pim iproute sharing enable pim School 4 – ExtremeSwitching Standalone configure pim configure pim configure pim configure pim configure pim configure pim configure pim configure pim configure pim enable pim add add add add add add add add add vlan vlan vlan vlan vlan vlan vlan vlan vlan "VLAN_1600" sparse "VLAN_2200" sparse "VLAN_1700" sparse "VLAN_1800" sparse "VLAN_1900" sparse "VLAN_0060" sparse "lo0" sparse "VLAN_0103" sparse "VLAN_0203" sparse passive passive passive passive passive Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 283 Validated Designs – Infrastructure & Topology At the prompt, enter show pim (output truncated) and verify: District Office/School 1– Controlling Bridge 1 1. rifms flags set for all interfaces. 2. All interfaces see a neighbor except the loopback. 3. Loopback interface also has the c flag set. VPEX x690-DO/SC1-Left.46 # show pim PIM Enabled, Version 2 … VLAN_0109 1 192.168.109.2 / 24 192.168.109.3 rifms------- 30 60 lo0 3 192.168.200.1 / 32 192.168.200.1 rifmsc------ 30 60 VLAN_0101 5 192.168.101.1 / 30 192.168.101.2 rifms------- 30 60 VLAN_0104 8 192.168.101.13 / 30 192.168.101.14 rifms------- 30 60 VLAN_0103 7 192.168.101.9 / 30 192.168.101.10 rifms------- 30 60 VLAN_0105 9 192.168.101.17 / 30 192.168.101.18 rifms------- 30 60 VLAN_0102 6 192.168.101.5 / 30 192.168.101.6 rifms------- 30 60 VLAN_0060 2 192.168.60.2 / 24 192.168.60.3 rifms------- 30 60 VLAN_0059 4 192.168.59.2 / 24 192.168.59.3 rifms------- 30 60 VLAN_1900 13 172.19.128.2 / 27 172.19.128.3 rifms------- 30 60 VLAN_1600 10 172.16.0.2 / 24 172.16.0.3 rifms------- 30 60 VLAN_2200 15 172.21.0.2 / 22 172.21.0.3 rifms------- 30 60 VLAN_1700 11 172.17.0.2 / 22 172.17.0.3 rifms------- 30 60 VLAN_1901 14 172.19.0.2 / 19 172.19.0.3 rifms------- 30 60 VLAN_1800 12 172.18.0.2 / 19 172.18.0.3 rifms------- 30 60 … Flags : r - Router PIM Enabled, i - Interface PIM Enabled, f - Interface, Forwarding Enabled, m - Interface Multicast Forwarding Enabled, s - Sparse mode, d - Dense mode, c - CRP enabled, t - Trusted Gateway configured, n - Multinetted VLAN, p - Passive Mode, S - Source Specific Multicast, b - Border. R - State Refresh Enabled. … Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 1 0 1 1 1 1 1 1 1 1 1 1 1 1 1 284 Validated Designs – Infrastructure & Topology District Office/School 1– Controlling Bridge 2 VPEX x690-DO/SC1-Right.157 # show pim PIM Enabled, Version 2 … VLAN_0109 1 192.168.109.3 / 24 192.168.109.3 rifms------- 30 60 lo0 3 192.168.200.2 / 32 192.168.200.2 rifmsc------ 30 60 VLAN_0204 8 192.168.201.13 / 30 192.168.201.14 rifms------- 30 60 VLAN_0201 5 192.168.201.1 / 30 192.168.201.2 rifms------- 30 60 VLAN_0203 7 192.168.201.9 / 30 192.168.201.10 rifms------- 30 60 VLAN_0205 9 192.168.201.17 / 30 192.168.201.18 rifms------- 30 60 VLAN_0202 6 192.168.201.5 / 30 192.168.201.6 rifms------- 30 60 VLAN_0060 2 192.168.60.3 / 24 192.168.60.3 rifms------- 30 60 VLAN_0059 4 192.168.59.3 / 24 192.168.59.3 rifms------- 30 60 VLAN_1600 11 172.16.0.3 / 24 172.16.0.3 rifms------- 30 60 VLAN_2200 12 172.21.0.3 / 22 172.21.0.3 rifms------- 30 60 VLAN_1700 13 172.17.0.3 / 22 172.17.0.3 rifms------- 30 60 VLAN_1900 10 172.19.128.3 / 27 172.19.128.3 rifms------- 30 60 VLAN_1901 14 172.19.0.3 / 19 172.19.0.3 rifms------- 30 60 VLAN_1800 15 172.18.0.3 / 19 172.18.0.3 rifms------- 30 60 … Flags : r - Router PIM Enabled, i - Interface PIM Enabled, f - Interface, Forwarding Enabled, m - Interface Multicast Forwarding Enabled, s - Sparse mode, d - Dense mode, c - CRP enabled, t - Trusted Gateway configured, n - Multinetted VLAN, p - Passive Mode, S - Source Specific Multicast, b - Border. R - State Refresh Enabled. 1 0 1 1 1 1 1 1 1 1 1 1 1 1 1 … The same commands can also be issued at School 2, School 3, and School 4 to verify locally. Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 285 Appendix Appendix VPEX (Extended Edge) Automation Highlights: VPEX Full Automation terminates Yes No Start Is the switch VPEX capable? Yes No Does a configuraton exist? Is a BPE connected to the switch? No Yes After 4 minutes: • Delete VLAN vpexmlag (4089). • Disable sharing on any ports that were enabled. • Start VPEX Partial Automation feature. • VPEX Full Automation Terminates No Is a VPEX enabled neighbor present? • Enable VPEX mode on switch. • Reboot switch. • Create VLAN vpexmlag (4089). • Convert Links on CBs into a LAG. Yes Configures BPEs: • CBs discover BPEs via LLDP. • CB Configures BPE model and assigns a slot number. • CB configures LACP between CB. • CB enables MLAG ports with port IDs. • In cascaded topologies LACP is configured between BPEs. • In MLAG topologies CBs will have matching BPE configurations. Configures MLAG between the peers: • 169.254.0.1 is assigned to the MLAG peer losest MAC. • 169.254.0.2 is assigned to the MLAG peer with the highest MAC. • Enable the MLAG and wait for peer ‘UP’ • Start VPEX Partial Automation feature. • VPEX Full Automation termnates. End Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 286 References References 1. ExtremeSwitching Campus Switches https://www.extremenetworks.com/products/switching/campus-switching/ https://documentation.extremenetworks.com/exos_22.6/EXOS_User_Guide_22_6.pdf https://documentation.extremenetworks.com/exos_commands_22.6/EXOS_Command_Reference_22_6. pdf 2. ExtremeWireless Campus Solutions https://www.extremenetworks.com/products/wireless/ https://documentation.extremenetworks.com/wireless/v10_41/UG/Wireless_User_Guide.pdf https://documentation.extremenetworks.com/wireless/v10_41/CLI/Wireless/Open_Source_Declaration/c_ about-this-guide.shtml https://documentation.extremenetworks.com/wireless/v10_41/Integration_Guide/Wireless_Integration_G uide.pdf 3. Extreme Management Center https://www.extremenetworks.com/product/management-center/ https://documentation.extremenetworks.com/netsight/8.1/9035435_InstallationGuide.pdf https://documentation.extremenetworks.com/netsight/8.1/9035223-03_XMC.pdf 4. ExtremeControl https://www.extremenetworks.com/product/extremecontrol/ https://documentation.extremenetworks.com/netsight/8.1/9035440-01_ExtremeControl.pdf 5. ExtremeAnalytics https://www.extremenetworks.com/product/extremeanalytics/ https://documentation.extremenetworks.com/netsight/8.1/9035426_Analytics_Deployment.pdf https://documentation.extremenetworks.com/netsight/8.1/9035425-01_ExtremeAnalytics.pdf 6. Extreme Management Center, ExtremeControl, ExtremeAnalytics Virtual Engine Installation Guide https://documentation.extremenetworks.com/netsight/8.1/9035427_EMC_AC_AA_Virtual_Engine_Install _Guide.pdf 7. GTAC Knowledge https://gtacknowledge.extremenetworks.com/ Extreme Smart OmniEdge for Primary/Seconda ry Education 9035597-01 287