<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: Wing RFS4000 Routing in ExtremeWireless (WiNG)</title>
    <link>https://community.extremenetworks.com/t5/extremewireless-wing/wing-rfs4000-routing/m-p/54228#M3401</link>
    <description>I haven't tried this, so I don't know if it will work, but here's what I would do...&lt;BR /&gt;
&lt;BR /&gt;
Create two "outside" VLANs:&lt;BR /&gt;
- VLAN100&lt;BR /&gt;
- VLAN200&lt;BR /&gt;
&lt;BR /&gt;
Enable dhcp in both of them and configure them as ip nat outside.&lt;BR /&gt;
config self  interface vlan100   ip address dhcp   ip nat outside  interface vlan200   ip address dhcp   ip nat outside exit&lt;BR /&gt;
Create your "inside" vlans:&lt;BR /&gt;
- VLAN10&lt;BR /&gt;
- VLAN40&lt;BR /&gt;
&lt;BR /&gt;
Configure their local IP addresses and configure them as ip nat inside&lt;BR /&gt;
config self  interface vlan10   ip address 192.168.10.1/24   ip nat inside  interface vlan40   ip address 192.168.40.1/24   ip nat inside exit&lt;BR /&gt;
Configure interface ge1 as trunk including vlans 100 &amp;amp; 200 tagged&lt;BR /&gt;
config self  interface ge1   switchport mode trunk   switchport trunk native vlan 1   no switchport trunk native tagged   switchport trunk allowed vlan 1,100,200 exit&lt;BR /&gt;
Create two Access lists:&lt;BR /&gt;
- nat1-rule: allows ip addresses from vlan 10&lt;BR /&gt;
- nat2-rule: allows ip addresses from vlan 40&lt;BR /&gt;
&lt;BR /&gt;
config ip access-list nat1-rule permit ip 192.168.10.0/24 any rule-precedence 10 ip access-list nat2-rule permit ip 192.168.40.0/24 any rule-precedence 10 exit&lt;BR /&gt;
Create a rule that allows nat from addresses in nat1-rule to vlan100&lt;BR /&gt;
Create a rule that allows nat from addresses in nat2-rule to vlan200&lt;BR /&gt;
&lt;BR /&gt;
config self  ip nat inside source list nat1-rule precedence 1 interface vlan100 overload  ip nat inside source list nat2-rule precedence 2 interface vlan200 overload exit&lt;BR /&gt;
If everything works as expected, vlan 10 addresses should nat using vlan 100 ip address, and addresses from vlan 40 should nat using vlan 200 ip address.&lt;BR /&gt;
&lt;BR /&gt;
Let me know if this works as expected.&lt;BR /&gt;
&lt;BR /&gt;
All CLI commands to do this:&lt;BR /&gt;
! ip access-list nat1-rule  permit ip 192.168.10.0/24 any rule-precedence 10 ! ip access-list nat2-rule  permit ip 192.168.40.0/24 any rule-precedence 10 ! vx9000 00-0C-29-CA-0E-38  interface ge1   switchport mode trunk   switchport trunk native vlan 1   no switchport trunk native tagged  switchport trunk allowed vlan 1,100,200  interface vlan1   ip address 10.1.1.70/24  interface vlan10   ip address 192.168.10.1/24   ip nat inside  interface vlan40   ip address 192.168.40.1/24   ip nat inside  interface vlan100   ip address dhcp   ip nat outside  interface vlan200   ip address dhcp   ip nat outside&lt;BR /&gt;
 ip nat inside source list nat1-rule precedence 1 interface vlan100 overload  ip nat inside source list nat2-rule precedence 2 interface vlan200 overload</description>
    <pubDate>Thu, 31 Aug 2017 04:22:00 GMT</pubDate>
    <dc:creator>dflouret</dc:creator>
    <dc:date>2017-08-31T04:22:00Z</dc:date>
    <item>
      <title>Wing RFS4000 Routing</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/wing-rfs4000-routing/m-p/54224#M3397</link>
      <description>Hi community&lt;BR /&gt;
&lt;BR /&gt;
I finally got my hands on some of the Wing products.&lt;BR /&gt;
I now have a requirement form a client and require some assistance. (Still new to the product)&lt;BR /&gt;
&lt;BR /&gt;
The Client currently has a RFS4000 with some AP's deployed.&lt;BR /&gt;
He is running a Corporate SSID that is natted to the "Uplink port" on the RFS4000&lt;BR /&gt;
The clients connecting to this Corporate SSID receives a IP from the RFS4000 in the VLAN.&lt;BR /&gt;
The RFS4000 then NATS the wireless client traffic to the internal LAN via the Uplink port on the RFS4000&lt;BR /&gt;
 &lt;BR /&gt;
The client now wants to add another SSID for guests, this will be a open SSID with not authentication (The client will implement a upstream captive portal). The client wants to route the guest traffic over a completely seperate uplink (ge5) that will ge connected to the same router used for corporate but on a different interface.&lt;BR /&gt;
This wireless guest traffic must also be natted to this uplink (ge5).&lt;BR /&gt;
&lt;BR /&gt;
The network diagram below&lt;P class="fancybox-image"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="e72dff9040e54bff8d9d89636422ba99_RackMultipart20170829-96218-93e09w-Checkers_Wing_inline.jpg"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/73i2E4BC6862519E3FA/image-size/large?v=v2&amp;amp;px=999" role="button" title="e72dff9040e54bff8d9d89636422ba99_RackMultipart20170829-96218-93e09w-Checkers_Wing_inline.jpg" alt="e72dff9040e54bff8d9d89636422ba99_RackMultipart20170829-96218-93e09w-Checkers_Wing_inline.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;BR /&gt;
&lt;BR /&gt;
First question can I specify more than one interface as "NAT outside"?&lt;BR /&gt;
I have tested using PBR but it seems to always route via the uplink port vlan...&lt;BR /&gt;
&lt;BR /&gt;
Any suggestions/advice....</description>
      <pubDate>Tue, 29 Aug 2017 17:45:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/wing-rfs4000-routing/m-p/54224#M3397</guid>
      <dc:creator>Andre_Brits_Kan</dc:creator>
      <dc:date>2017-08-29T17:45:00Z</dc:date>
    </item>
    <item>
      <title>RE: Wing RFS4000 Routing</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/wing-rfs4000-routing/m-p/54225#M3398</link>
      <description>we have done it but by using a vlan, set the main lan port to a trunk, set the allowed Vlans&lt;BR /&gt;
create the new SSID and point it to vlan 20 or what ever, connect the adsl ( in our case to port on the network switch that has Vlan 20 and it should work.</description>
      <pubDate>Tue, 29 Aug 2017 18:20:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/wing-rfs4000-routing/m-p/54225#M3398</guid>
      <dc:creator>Phil_storey</dc:creator>
      <dc:date>2017-08-29T18:20:00Z</dc:date>
    </item>
    <item>
      <title>RE: Wing RFS4000 Routing</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/wing-rfs4000-routing/m-p/54226#M3399</link>
      <description>The main challenge is that the RFS does not have multiple virtual routers (Extreme: This would be an awesome add-on to the data-plane), meaning that all layer 3 traffic, unless prohibited by ACLs is visible between subnets.  (ie: vlan 10 and vlan 20 can "see" each other). &lt;BR /&gt;
This also explains why NAT outside doesn't do what you expect it to.  The router instance in the RFS can only have one default gateway, and PBR is just a kludge to get around the fact that there aren't multiple virtual-routers.&lt;BR /&gt;
&lt;BR /&gt;
There are several ways to tackle the problem, and Extreme has lots of docs about their captive portal functionality, etc, but personally, I find it much easier to treat any guest traffic as layer 2 only and allow other upstream devices (routers/firewalls/portals)  to take care of the nuts and bolts of the layer 3 portion (dhcp/dns/etc).  This way, it is completely isolated from the corporate environment.  Call me paranoid, but I don't trust the guests and don't want to offer them any exposure to the infrastructure, beyond transporting their traffic at layer 2.&lt;BR /&gt;
&lt;BR /&gt;
That being said, in your scenario, I would tackle it in one of two ways, preferring the second way as it does not create a bottleneck at the controller :&lt;BR /&gt;
&lt;OL&gt; 
&lt;LI&gt;Tunnel the guest SSID back to the RFS on its own VLAN, and then configure ge5 to be an access port on that particular vlan.  This will forward the layer 2 traffic out ge5 and into the router/portal/firewall which would provide the DHCP and NAT services. 
&lt;/LI&gt;&lt;LI&gt;Bridge the guest SSID into its own VLAN that is back-hauled through your infrastructure and configure an appropriate switch port in access mode on that VLAN and  connect it to the router/portal/firewall interface, which would provide the DHCP and NAT services.&lt;/LI&gt;&lt;/OL&gt;In both cases, because you are potentially setting up multiple layer 2 paths between two devices, be sure that spanning tree is not enabled on the RFS (default is off anyway).&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 29 Aug 2017 18:24:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/wing-rfs4000-routing/m-p/54226#M3399</guid>
      <dc:creator>Andrew_Webster</dc:creator>
      <dc:date>2017-08-29T18:24:00Z</dc:date>
    </item>
    <item>
      <title>RE: Wing RFS4000 Routing</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/wing-rfs4000-routing/m-p/54227#M3400</link>
      <description>Thx for the feedback Andrew&lt;BR /&gt;
I will play around any let you guys know how it goes.</description>
      <pubDate>Tue, 29 Aug 2017 19:03:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/wing-rfs4000-routing/m-p/54227#M3400</guid>
      <dc:creator>Andre_Brits_Kan</dc:creator>
      <dc:date>2017-08-29T19:03:00Z</dc:date>
    </item>
    <item>
      <title>RE: Wing RFS4000 Routing</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/wing-rfs4000-routing/m-p/54228#M3401</link>
      <description>I haven't tried this, so I don't know if it will work, but here's what I would do...&lt;BR /&gt;
&lt;BR /&gt;
Create two "outside" VLANs:&lt;BR /&gt;
- VLAN100&lt;BR /&gt;
- VLAN200&lt;BR /&gt;
&lt;BR /&gt;
Enable dhcp in both of them and configure them as ip nat outside.&lt;BR /&gt;
config self  interface vlan100   ip address dhcp   ip nat outside  interface vlan200   ip address dhcp   ip nat outside exit&lt;BR /&gt;
Create your "inside" vlans:&lt;BR /&gt;
- VLAN10&lt;BR /&gt;
- VLAN40&lt;BR /&gt;
&lt;BR /&gt;
Configure their local IP addresses and configure them as ip nat inside&lt;BR /&gt;
config self  interface vlan10   ip address 192.168.10.1/24   ip nat inside  interface vlan40   ip address 192.168.40.1/24   ip nat inside exit&lt;BR /&gt;
Configure interface ge1 as trunk including vlans 100 &amp;amp; 200 tagged&lt;BR /&gt;
config self  interface ge1   switchport mode trunk   switchport trunk native vlan 1   no switchport trunk native tagged   switchport trunk allowed vlan 1,100,200 exit&lt;BR /&gt;
Create two Access lists:&lt;BR /&gt;
- nat1-rule: allows ip addresses from vlan 10&lt;BR /&gt;
- nat2-rule: allows ip addresses from vlan 40&lt;BR /&gt;
&lt;BR /&gt;
config ip access-list nat1-rule permit ip 192.168.10.0/24 any rule-precedence 10 ip access-list nat2-rule permit ip 192.168.40.0/24 any rule-precedence 10 exit&lt;BR /&gt;
Create a rule that allows nat from addresses in nat1-rule to vlan100&lt;BR /&gt;
Create a rule that allows nat from addresses in nat2-rule to vlan200&lt;BR /&gt;
&lt;BR /&gt;
config self  ip nat inside source list nat1-rule precedence 1 interface vlan100 overload  ip nat inside source list nat2-rule precedence 2 interface vlan200 overload exit&lt;BR /&gt;
If everything works as expected, vlan 10 addresses should nat using vlan 100 ip address, and addresses from vlan 40 should nat using vlan 200 ip address.&lt;BR /&gt;
&lt;BR /&gt;
Let me know if this works as expected.&lt;BR /&gt;
&lt;BR /&gt;
All CLI commands to do this:&lt;BR /&gt;
! ip access-list nat1-rule  permit ip 192.168.10.0/24 any rule-precedence 10 ! ip access-list nat2-rule  permit ip 192.168.40.0/24 any rule-precedence 10 ! vx9000 00-0C-29-CA-0E-38  interface ge1   switchport mode trunk   switchport trunk native vlan 1   no switchport trunk native tagged  switchport trunk allowed vlan 1,100,200  interface vlan1   ip address 10.1.1.70/24  interface vlan10   ip address 192.168.10.1/24   ip nat inside  interface vlan40   ip address 192.168.40.1/24   ip nat inside  interface vlan100   ip address dhcp   ip nat outside  interface vlan200   ip address dhcp   ip nat outside&lt;BR /&gt;
 ip nat inside source list nat1-rule precedence 1 interface vlan100 overload  ip nat inside source list nat2-rule precedence 2 interface vlan200 overload</description>
      <pubDate>Thu, 31 Aug 2017 04:22:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/wing-rfs4000-routing/m-p/54228#M3401</guid>
      <dc:creator>dflouret</dc:creator>
      <dc:date>2017-08-31T04:22:00Z</dc:date>
    </item>
    <item>
      <title>RE: Wing RFS4000 Routing</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/wing-rfs4000-routing/m-p/54229#M3402</link>
      <description>Hi Daniel&lt;BR /&gt;
&lt;BR /&gt;
Thank you for the config this worked as expected.&lt;BR /&gt;
I then added a Policy based route to route both WLAN networks to different gateways.&lt;BR /&gt;
&lt;BR /&gt;
Thx for the feedback&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 05 Sep 2017 18:36:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/wing-rfs4000-routing/m-p/54229#M3402</guid>
      <dc:creator>Andre_Brits_Kan</dc:creator>
      <dc:date>2017-09-05T18:36:00Z</dc:date>
    </item>
  </channel>
</rss>

