TPS10-031_rev1.1_Section-8-Backend-Network-Planning

advertisement
Altai Super WiFi
Altai Super WiFi
Altai Certification Training
Backend Network Planning
Professional Services
Altai Technologies Limited
1
Not for Distribution – Altai Confidential
Module Outline
Altai Super WiFi
Altai Super WiFi
• Service Controller Solution
– Layer 2 Network Deployment Scenario
– Layer 3 Network Deployment Scenario
• A3 ACS Solution
2
Not for Distribution – Altai Confidential
Service Controller Solution
Altai Super WiFi
Altai Super WiFi
• RADIUS or Active Directory in the existing network
as authentication server
• Multiple SSID for different groups of client to
access; e.g. staff and guest
• Each group of client is only allowed to access
specific network subnets
• Different authentication method can be applied
to different SSID
3
www.altaitechnologies.com
Not for Distribution – Altai Confidential
Altai Super WiFi
Layer 2 Network Deployment Scenario
Altai Super WiFi
• Deployment scenario: Enterprise only one or
several buildings network based on layer 2
connection.
• Solution 1: SC internet port behavior as network
backhaul, and LAN port connect to AP.
• Solution 2: one of SC ports behavior as network
backhaul.
4
www.altaitechnologies.com
Not for Distribution – Altai Confidential
Layer 2 Network Design
Intranet for staff
Ingress VLAN 1
Egress VLAN 10
Client IP subnet
192.168.1.x
• AD or RADIUS
Authentication
• Allowed access
intranet and internet
•
•
•
•
Altai Super WiFi
Altai Super WiFi
Internet for guest
Ingress VLAN 2
Egress VLAN 10
Client IP subnet
192.168.2.x
• SC Local account
• HTML-Authentication
•
•
•
•
5
www.altaitechnologies.com
Not for Distribution – Altai Confidential
Layer 2 Network Solution I
DHCP
server
Altai Super WiFi
Altai Super WiFi
Intranet
Router
Firewall
Radius Server
VLAN 10
Internet
Active Directory
VLAN 20
Service Controller
Internet Port: VLAN 10 & 20
LAN Port: VLAN 1 & 2
Management Server
VLAN Switch
VLAN 100
VLAN 1, 2, 100
Altai AP
VLAN 1
Trunk Port
VLAN 2
Trunk Port
Trunk Port
VLAN 100
SSID_Intranet
SSID_Internet
Management SSID
192.168.1.x
192.168.2.x
192.168.100.x
VLAN 1
VLAN 2
VLAN 100
6
www.altaitechnologies.com
Not for Distribution – Altai Confidential
Layer 2 Network Solution II
DHCP
server
Altai Super WiFi
Altai Super WiFi
Intranet
Router
Firewall
VLAN 10
Radius Server
Internet
Active Directory
VLAN 20
Management Server
Egress: VLAN 10 & 20
VLAN 100
VLAN Switch
Network: VLAN 10,20
Ingress: VLAN 1 & 2
Service Controller
SC Port: VLAN 1, 2, 10, 20, 100
AP Port: VLAN 1,2, 100
Trunk Port
Trunk Port
Altai AP
VLAN 1
Trunk Port
VLAN 2
VLAN 100
SSID_Intranet
SSID_Internet
Management SSID
192.168.1.x
192.168.2.x
192.168.100.x
VLAN 1
VLAN 2
VLAN 100
7
www.altaitechnologies.com
Not for Distribution – Altai Confidential
Layer 2 Active Directory authentication
Altai Super WiFi
Altai Super WiFi
Procedure
User
User associate with
wireless network
AP
Service Controller
AD Server
DHCP server
EAPOL start
EAP Request/identity
EAP Response/identity
Redirect the request to
Service Controller
EAP Response/Identity
Over AD
EAP request
EAP response
EAP request over AD
EAP Response over AD
EAP success
EAP success over AD
and user configuration
DHCP request
Response DHCP request
Send IP address back
8
www.altaitechnologies.com
Not for Distribution – Altai Confidential
Altai Super WiFi
Layer 2 HTML authentication Procedure
Altai Super WiFi
User
User associate with
wireless network
AP
Send DHCP request
Redirect the request
to DHCP server
Service Controller
Local account
DHCP server
Response DHCP request
Send IP address back
User attempts to
browse an Web site
Redirect the request to
Service Controller
Request is intercepted
Login page is returned
User Login
User login info is
sent for authentication
Login approved.
User configuration
setting are returned
Transport page is sent
Transport page sends
request for session
and welcome page
Session and Welcome
pages are sent
9
www.altaitechnologies.com
Not for Distribution – Altai Confidential
Altai Super WiFi
Layer 3 Network Deployment Scenario
Altai Super WiFi
• Deployment scenario: University & enterprise
multiple buildings network based on layer 3
connection.
• Solution 1: Two buildings connect to each other
based on layer 3 connection (Traffic forwarding
based on IP address). Since SC establish
communication with AP only by VLAN, each SC
should be deployment for every building in such
case.
• Solution 2: Two building connect to each other
based on tunnel which support VLAN function. In
this case, only one Service Controller is needed
for the entire network.
10
www.altaitechnologies.com
Not for Distribution – Altai Confidential
Altai Super WiFi
Layer 3 Network Design Solution_I
Altai Super WiFi
Building 1
• Intranet for staff
• Ingress VLAN 1
• Egress VLAN 10
• Client IP subnet 192.168.1.x
• AD or RADIUS
Authentication
• Allowed access intranet
and internet
• Internet for guest
• Ingress VLAN 2
• Egress VLAN 10
• Client IP subnet 192.168.2.x
• SC Local account
• HTML-Authentication
Building 2
• Intranet for staff
• Ingress VLAN 3
• Egress VLAN 10
• Client IP subnet 192.168.3.x
• AD or RADIUS
Authentication
• Allowed access intranet
and internet
• Internet for guest
• Ingress VLAN 4
• Egress VLAN 10
• Client IP subnet 192.168.4.x
• SC Local account
• HTML-Authentication
11
www.altaitechnologies.com
Not for Distribution – Altai Confidential
Layer 3 Network Solution_I
DHCP
server
Altai Super WiFi
Altai Super WiFi
Intranet
Firewall
Radius Server
Router
VLAN 10 & 30
Internet
Active Directory
VLAN 20 & 40
Service Controller
Egress: VLAN 10 & 20
Ingress: VLAN 1 & 2
VLAN Switch
Service Controller
Egress: VLAN 30 & 40
Ingress: VLAN 3 & 4
VLAN Switch
Network: VLAN 10,20
Network: VLAN 30,40
SC Port: VLAN 1, 2, 10, 20
SC Port: VLAN 3, 4, 30, 40
AP Port: VLAN 1,2
AP Port: VLAN 3,4
Altai AP
Trunk Port
Trunk Port
Trunk Port
VLAN 1
Trunk Port
VLAN 2
Altai AP
VLAN 3
VLAN 4
SSID_Intranet
SSID_Internet
SSID_Intranet
SSID_Internet
192.168.1.x
192.168.2.x
192.168.3.x
192.168.4.x
VLAN 1
VLAN 2
VLAN 3
VLAN 4
www.altaitechnologies.com
Not for Distribution – Altai Confidential
12
Layer 3 Solution I AuthenticationAltai Super WiFi
Altai Super WiFi
Procedure
User
User associate with
wireless network
AP
Service Controller
In Builing 1
AD Server
DHCP server
EAPOL start
EAP Request/identity
EAP Response/identity
Redirect the request to
Service Controller
EAP Response/Identity
Over AD
EAP request
EAP response
EAP request over AD
EAP Response over AD
EAP success
EAP success over AD
and user configuration
DHCP request
Response DHCP request
Send IP address back
Building 1 for example
www.altaitechnologies.com
Not for Distribution – Altai Confidential
13
Altai Super WiFi
Case study: ASTRI Deployment Altai
Super WiFi
Intranet
Firewall
Router
VLAN 10
Active Directory
Internet
VLAN 20
Egress: VLAN 10 & 20
VLAN Switch
Network: VLAN 10,20
Ingress: VLAN 1 & 2
Service Controller
SC Port: VLAN 1, 2, 10, 20
DHCP server:192.168.0.x
AP Port: VLAN 1,2
Trunk Port
Trunk Port
Altai AP
VLAN 1
Trunk Port
VLAN 2
SSID_Intranet
SSID_Internet
192.168.0.x
192.168.0.x
VLAN 1
VLAN 2
AD authentication
HTML authentication
www.altaitechnologies.com
Not for Distribution – Altai Confidential
14
Wireless Network
Altai Super WiFi
Altai Super WiFi
Target Clients
SSID
VLAN
Authentication
Encryption
Intranet
Staff
1
Active Directory
WPA/WPA2
Internet
Guest
2
Captive Portal
WPA-PSK
15
www.altaitechnologies.com
Not for Distribution – Altai Confidential
VLAN Network
Altai Super WiFi
Altai Super WiFi
Client IP Address
SSID
VLAN_Ingress
Intranet
1
Internet
2
VLAN_Egress
Colubris
Interface IP address
192.168.0.x
10
10.6.11.2
192.168.0.x
20
10.6.12.2
16
www.altaitechnologies.com
Not for Distribution – Altai Confidential
Altai Super WiFi
Network configuration_ingress vlan
Altai Super WiFi
17
www.altaitechnologies.com
Not for Distribution – Altai Confidential
Altai Super WiFi
Network configuration_egress vlan
Altai Super WiFi
18
www.altaitechnologies.com
Not for Distribution – Altai Confidential
Network ports
Altai Super WiFi
Altai Super WiFi
19
www.altaitechnologies.com
Not for Distribution – Altai Confidential
DHCP server_1
Altai Super WiFi
Altai Super WiFi
20
www.altaitechnologies.com
Not for Distribution – Altai Confidential
DHCP server _2
Altai Super WiFi
Altai Super WiFi
21
www.altaitechnologies.com
Not for Distribution – Altai Confidential
DNS
Altai Super WiFi
Altai Super WiFi
22
www.altaitechnologies.com
Not for Distribution – Altai Confidential
Check IP routers
Altai Super WiFi
Altai Super WiFi
23
www.altaitechnologies.com
Not for Distribution – Altai Confidential
Join Active Directory
Altai Super WiFi
Altai Super WiFi
24
www.altaitechnologies.com
Not for Distribution – Altai Confidential
AD group configuration
Altai Super WiFi
Altai Super WiFi
25
www.altaitechnologies.com
Not for Distribution – Altai Confidential
Add RADIUS secret
Altai Super WiFi
Altai Super WiFi
26
www.altaitechnologies.com
Not for Distribution – Altai Confidential
Account Profiles_1
Altai Super WiFi
Altai Super WiFi
27
www.altaitechnologies.com
Not for Distribution – Altai Confidential
Account Profile_2
Altai Super WiFi
Altai Super WiFi
28
www.altaitechnologies.com
Not for Distribution – Altai Confidential
User account_1
Altai Super WiFi
Altai Super WiFi
29
www.altaitechnologies.com
Not for Distribution – Altai Confidential
User account _2
Altai Super WiFi
Altai Super WiFi
30
www.altaitechnologies.com
Not for Distribution – Altai Confidential
Access List
Altai Super WiFi
Altai Super WiFi
31
www.altaitechnologies.com
Not for Distribution – Altai Confidential
VSC AD authenticaton_1
Altai Super WiFi
Altai Super WiFi
32
www.altaitechnologies.com
Not for Distribution – Altai Confidential
VSC AD Authentication_2
Altai Super WiFi
Altai Super WiFi
33
www.altaitechnologies.com
Not for Distribution – Altai Confidential
VSC AD Authentication_3
Altai Super WiFi
Altai Super WiFi
34
www.altaitechnologies.com
Not for Distribution – Altai Confidential
VSC HTML Authentication_1
Altai Super WiFi
Altai Super WiFi
35
www.altaitechnologies.com
Not for Distribution – Altai Confidential
VSC HTML Authentication_2
Altai Super WiFi
Altai Super WiFi
36
www.altaitechnologies.com
Not for Distribution – Altai Confidential
Altai Super WiFi
Layer 3 Network Design Solution_II
Altai Super WiFi
Intranet for staff
Ingress VLAN 1
Egress VLAN 10
Client IP subnet 192.168.1.x
AD or RADIUS
Authentication
• Allowed access intranet
and internet
•
•
•
•
•
•
•
•
•
•
•
Internet for guest
Ingress VLAN 2
Egress VLAN 10
Client IP subnet 192.168.2.x
SC Local account
HTML-Authentication
37
www.altaitechnologies.com
Not for Distribution – Altai Confidential
Layer 3 Network Solution_II
DHCP
server
Altai Super WiFi
Altai Super WiFi
Intranet
Firewall
Radius Server
Router
VLAN 10 & 30
Internet
Active Directory
VLAN 20 & 40
Service Controller
Egress: VLAN 10 & 20
Ingress: VLAN 1 & 2
VLAN Switch
Network: VLAN 10,20
Multiple Layer3 tunnel
SC Port: VLAN 1, 2, 10, 20
AP Port: VLAN 1,2,
Altai AP
Trunk Port
Trunk Port
Trunk Port
VLAN 1
Trunk Port
Altai AP
VLAN 2
VLAN 1
VLAN 2
SSID_Intranet
SSID_Internet
SSID_Intranet
SSID_Internet
192.168.1.x
192.168.2.x
192.168.1.x
192.168.2.x
VLAN 1
VLAN 2
VLAN 1
VLAN 2
www.altaitechnologies.com
Not for Distribution – Altai Confidential
38
Layer 3 Solution II Authentication
Altai Super WiFi
Altai Super WiFi
Procedure
User
User associate with
wireless network
AP
Service Controller
AD Server
DHCP server
EAPOL start
EAP Response/identity
Redirect the request to
Service Controller
EAP request
EAP response
EAP success
DHCP request
Multiple Layer3 Tunnel
EAP Request/identity
EAP Response/Identity
Over AD
EAP request over AD
EAP Response over AD
EAP success over AD
and user configuration
Response DHCP request
Send IP address back
Building 1 for example
www.altaitechnologies.com
Not for Distribution – Altai Confidential
39
Case Study: Operator Network Altai Super WiFi
Altai Super WiFi
Deployment Solution
Tunneling Router
Standard DSL
Modem/Router
DSLAM
Tunneling Router
Eth
Eth
ADSL
TUNNEL
BAS
Metro
Ethernet
Network
IP Service with PPPoE (Internet or MPLS VPN)
¿Tunnel between AP and Controller?
AAA
IP
Backbone
Internet
Controller
GE
Wireless
Backhaul
WiFi
AP (Switch Mode)
Múltiple Access Point
www.altaitechnologies.com
Not for Distribution – Altai Confidential
40
Altai A3 ACS Solution
•
•
•
•
•
•
•
•
Altai Super WiFi
Altai Super WiFi
Deployment scenario: Hotzone whole network solution could be in one
box.
RADIUS or MAC in the existing network is authentication server, do not
need to integrate with Active Director server
Can use 3G as backhaul
Roaming across A3s is not supported
Local database is supported
Multiple SSID for different groups of client to access, like staff and guest
Each group of client is only allowed to access specific network subnets
Different authentication method can be applied to different SSID
41
www.altaitechnologies.com
Not for Distribution – Altai Confidential
ACS Network Design Solution
•
•
•
•
•
•
Intranet for staff
Intranet ACS Profile
Client IP subnet 192.168.0.x
RADIUS authentication
HTML-authentication
Allowed access intranet
and internet
•
•
•
•
•
Altai Super WiFi
Altai Super WiFi
Internet for guest
Internet ACS Profile
Client IP subnet 192.168.0.x
MAC authentication
Allowed access internet
only
42
www.altaitechnologies.com
Not for Distribution – Altai Confidential
Altai Super WiFi
Altai A3 Access Control SystemAltai
Super WiFi
Web Server
DHCP
server
Firewall
Router
Radius Server
Internet
Switch
A3_Gateway Mode
ACS Profile
SSID_Intranet
Intranet ACS Profile
SSID_Internet
Internet ACS Profile
43
www.altaitechnologies.com
Not for Distribution – Altai Confidential
ACS User Login Procedure
Altai Super WiFi
Altai Super WiFi
44
www.altaitechnologies.com
Not for Distribution – Altai Confidential
Case Study: Hotspot Operator ACS
Altai Super WiFi
Altai Super WiFi
Profile Configuration
Radius Server
3G network
3G backhaul
Web Server
A3_Gateway Mode
10.6.127.200
DHCP server:192.168.0.1
Hotspot Operator Noc
SSID_HTMLAuth
SSID_MACAuthrnet
45
www.altaitechnologies.com
Not for Distribution – Altai Confidential
Altai Super WiFi
Hotspot Operator Network Illustration
Altai Super WiFi
• 3G dongle as network backhaul
• A3 build-in DHCP server enabled
• Remote RADIUS server is for internal clients authentication
and accounting
• Remote Web server is for RADIUS server authentication.
• Access controlled list establish to define network access
difference for multiple kinds of clients
• Local account is for MAC authentication to clients who
could only access internet
46
www.altaitechnologies.com
Not for Distribution – Altai Confidential
ACS Profile
Altai Super WiFi
Altai Super WiFi
47
www.altaitechnologies.com
Not for Distribution – Altai Confidential
Local Account
Altai Super WiFi
Altai Super WiFi
48
www.altaitechnologies.com
Not for Distribution – Altai Confidential
RADIUS Server
Altai Super WiFi
Altai Super WiFi
49
www.altaitechnologies.com
Not for Distribution – Altai Confidential
Access Rules 1
Altai Super WiFi
Altai Super WiFi
50
www.altaitechnologies.com
Not for Distribution – Altai Confidential
Access Rules 2
Altai Super WiFi
Altai Super WiFi
51
www.altaitechnologies.com
Not for Distribution – Altai Confidential
Access Rules Profile
Altai Super WiFi
Altai Super WiFi
52
www.altaitechnologies.com
Not for Distribution – Altai Confidential
HTMLAuth Profile
Altai Super WiFi
Altai Super WiFi
53
www.altaitechnologies.com
Not for Distribution – Altai Confidential
MACAuth Profile
Altai Super WiFi
Altai Super WiFi
54
www.altaitechnologies.com
Not for Distribution – Altai Confidential
Export ACS profile
Altai Super WiFi
Altai Super WiFi
55
www.altaitechnologies.com
Not for Distribution – Altai Confidential
Altai Super WiFi
Altai Super WiFi
Thank You
56
www.altaitechnologies.com
Not for Distribution – Altai Confidential
Download