05-20-2020 12:46 PM
Hi
I have a single AP that I want to be used to stage some devices from a public facing server we have.
I want to set the AP to give the devices a when they connect an ip using the onboard dhcp server
but the AP will have an IP from the range we have from ISP.
So the AP will be in the same VLAN as our WAN connection via a firewall.
I have tried to follow this guide: But I’m missing something as the wifi clients won’t connect
so the traffic will leave via vlan 2 ( wan ) Then I need to tie it down to the IP’s of the staging servers.
So the AP will be off the Corp network, then maybe do some firewall rule that would allow the AP to be manged using a port forward from our other leased line
The AP is running 5.9.2.1 The AP is in enterprise mode ( Virtual controller AP )
Its a bit long, but someone may see what is missing
Thanks in advance
Natting and Guest WLAN setup on a virtual controller:
For this setup the following are used:
Internal/Guest subnet 192.168.100.0/24
Internal/Guest VLAN: VLAN 100
Corp subnet 10.10.10.0/24
Corp VLAN: VLAN 1
Note: All settings must be configured on the VC.
1 – Create your inside (guest) and outside (corp) VLANs
Configuration >> Devices >> System Profile >> Select the AP profile >> Interfaces >> Virtual Interfaces >> Add >> VLAN ID: 100 >> Continue >> Exit >> Commit and Save
Configuration >> Devices >> Device Overrides >> Select the VC AP>> Interfaces >> Virtual Interfaces >> VLAN 100 >> IPv4 >> Primary IP address 192.168.100.1 >> Exit >> Commit and Save
Still in the VLAN setting, General tab, under Network Address Translation >> NAT direction: Inside
This AP is now the default gateway.
Configuration >> Devices >> Device Overrides >> Select the VC AP >> Interfaces >> Virtual Interfaces >> VLAN 1 >> General >> Network Address Translation >> NAT direction: Outside
2 – Allow these VLANs out of the ge1 port
IMPORTANT NOTE: Make sure that the switch port the APs are connected to are also configured to allow the same VLANs.
3 - Configure the DHCP server policy
4 – Enable the DHCP server policy
5 - Create NAT ACL
6 - Create NAT
GUEST WLAN SETUP:
If the guest WLAN is going to go through corp network you will have to configure an ACL rule to prevent guest users from accessing corp resources:
1 – Precedence 1
Action: Deny
Source: Network (enter IP of network subnet: Example 192.168.100.0/24 in this case)
Destination: Network (Enter IP of corp network: Example 10.10.10.0/24 in this case)
Protocol: IP
2 – Precedence 2
Action: Allow
Source: Network (enter IP of network subnet: Example 192.168.100.0/24 in this case)
Destination: Any
Protocol: IP
Solved! Go to Solution.
05-26-2020 08:55 PM
Hi Phil,
Sure, I’d love to give you another pair of eyes to look at it, not a business offer. This week mainly evenings in GMT time zone work for me. Please pm me and let me know when it’s feasible for you to connect.
Take care,
Tomasz
05-22-2020 09:23 AM
Hi Tomasz
thankyou for the reply, I’m going to work through the guide I was following, did that all look OK ? or is there bits missing, I have factoryReset the AP, I’ll try and report back later today
Phil
05-21-2020 04:22 PM
Hi Phil,
I see.
When you say the laptop can see the network but won’t associate, perhaps it’s too soon to say either DHCP/NAT is well done or with errors... IMHO something on WLAN configuration might have to be checked first: encryption, authentication, any side options and improvements that can cause issues with particular client hardware/software sometimes.
If it’s not an issue, please paste your WLAN config.
Also try to run packet capture and wireless debug. For wireless debug I use ‘remote-debug wireless’ command for that (like ‘remote-debug wireless rf-domain default clients aa:bb:cc:dd:ee:11 max-events 10000 duration 86400 events all’), but it’s especially useful for more than one AP (and running this for an entire site). You can also check ‘service show wireless log-internal’ or ‘show event-history’ if it shows you something relevant.
For packet capture, ‘remote-debug live-pktcap’ or ‘service pktcap’ commands may come in handy.
Just to give you some example, I had a problem with clients not being able to authenticate over 802.1X network and it turned out it was a driver issue on Intel AC card when it saw 802.11r and 11w over the air. Under packet capture I was able to see that WPA handshake is not complete, and in logs I could find some more descriptive message (that allowed me to google for the root cause with success :D).
Please see this for some reference on these debugging options in WiNG: https://1drv.ms/b/s!AvxWpCsRBHSfg0xyeFuPXn_B_m_u?e=0i4bQL
Hope that helps,
Tomasz
05-21-2020 07:32 AM
Hi Tomasz
the laptop can see the network but will not associate so can’t get an IP.
The AP will be connected to a non natted leased line via a network switch in vlan2 so the ap has a public facing IP 105.xxx.xxx.42/27 ( example ) the units to be staged will scan a QR code that has the wifi network and key embedded in the QR code along with details of the server it needs to connect to and the apps it needs to pull from the server.
At present the AP is on the bench, I set the wifi up and wanted to make sure the laptop would get an IP address from the AP dhcp server, so the internal 192.168.xxx.xxx traffic needs to get out on to the net, to get the apps/etc for staging
best regards
Phil
05-20-2020 10:13 PM
Hi Phil,
Quick question for clarity - they won’t connect ie. associate or no IP address is given to them on this guest VLAN? How is the WLAN configured? And is the traffic required to be NAT-ted or left in that guest VLAN?
Kind regards,
Tomasz