2013 Ruckus Wireless, Inc. Wired Networks for Wi-Fi v1.3 1
Table of Contents !"#$%&'()*+")&,-*./0*1%"#%&-).%$*2/3"%4.)&"/*55555555555555555555555555555555555555555555555555555555555555555555555555555555*6! 2/)-/0-0*780&-/,-*5555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555*9! :;-%;&-<*55555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555*=! OSI ........................................................................................................................................................ 6! Wired Networks and OSI ................................................................................................. 7! Wi-Fi and the OSI Model ................................................................................................. 8! Common Wi-Fi Deployments .......................................................................................... 9! +-)<"%>*?"#"@"'$*A-B&'/B*5555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555*CD! Distributed Data Forwarding .............................................................................................................. 10! Advantages .................................................................................................................... 11! Disadvantages ............................................................................................................... 11! 802.1Q VLAN Tagging .................................................................................................. 11! Centralized/Tunneled Data Forwarding ............................................................................................. 12! Advantages .................................................................................................................... 12! Disadvantages ............................................................................................................... 13! 802.1Q VLAN Tagging .................................................................................................. 13! +-)<"%>*E@-4-/)*1@.,-4-/)*5555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555*C9! Physical Security ................................................................................................................................. 15! Access Points ................................................................................................................. 15! ZoneDirector .................................................................................................................. 15! Redundancy ........................................................................................................................................ 15! Access Points ................................................................................................................. 15! ZoneDirector .................................................................................................................. 15! Performance ....................................................................................................................................... 16! Access Points ................................................................................................................. 16! ZoneDirector .................................................................................................................. 16! ZoneDirector Discovery ...................................................................................................................... 17! +-)<"%>*F-,8%&)$*55555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555*CG! Network Port Access .......................................................................................................................... 18! Access Points ................................................................................................................. 18! ZoneDirector .................................................................................................................. 20! Firewalls .............................................................................................................................................. 21! ZoneDirector and Managed APs ................................................................................... 21! Standalone APs ............................................................................................................. 21! FlexMaster ..................................................................................................................... 21! Firewall Caveat .............................................................................................................. 22!
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 2
Management Access .......................................................................................................................... 22! Access Points ................................................................................................................. 22! ZoneDirector .................................................................................................................. 22! !"/3&'8%&/'*H/).''-0*IJ7+B*55555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555*KL! Note on VLAN 1 ................................................................................................................................. 23! Example .............................................................................................................................................. 23! Wired Configuration ........................................................................................................................... 24! ZoneDirector Configuration ............................................................................................................... 24! !"/3&'8%&/'*?.''-0*IJ7+B*5555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555*K=! Note on VLAN 1 ................................................................................................................................. 26! Example .............................................................................................................................................. 26! Wired Configuration ........................................................................................................................... 27! ZoneDirector Configuration ............................................................................................................... 27! Dynamic VLANs .................................................................................................................................. 28! Wired Configuration ........................................................................................................................... 29! ZoneDirector Configuration ............................................................................................................... 29! !"/3&'8%&/'*?8//-@-0*IJ7+B*55555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555*LD! Note on VLAN 1 ................................................................................................................................. 30! Example .............................................................................................................................................. 30! Wired Configuration ........................................................................................................................... 31! ZoneDirector Configuration ............................................................................................................... 31! MJ7+*:;-%%&0-B*55555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555*LL! ZoneDirector Configuration ............................................................................................................... 33! N./.'-4-/)*MJ7+B*555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555*L9! Note on VLAN 1 ................................................................................................................................. 35! Who Should Use Management VLANs ............................................................................................... 35! Example .............................................................................................................................................. 35! Wired Configuration ........................................................................................................................... 36! ZoneDirector Configuration ............................................................................................................... 36! AP Configuration ................................................................................................................................ 37! Recommendations .............................................................................................................................. 38! Switch Port Configuration .............................................................................................. 38! APs Can Discover the ZoneDirector .............................................................................. 39! APs First ......................................................................................................................... 39! !"/3&'8%&/'*O8.@&)$*"3*F-%;&,-*55555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555*6D! WMM, ToS and DSCP Support .......................................................................................................... 40! Other Classification Values ............................................................................................ 42! Modifying Traffic Classification ...................................................................................... 43!
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 3
Multicast and Broadcast Traffic .......................................................................................................... 43! ZoneDirector Directed Traffic Commands .................................................................... 43! AP Directed Traffic Commands ..................................................................................... 44! Configuring per-SSID Priority ............................................................................................................. 45! ZoneDirector-based SSID Prioritization ......................................................................... 45! ?%"8P@-B("")&/'*555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555*6Q! AP Cannot Connect to ZoneDirector ................................................................................................. 47! Discovery ....................................................................................................................... 47! VLANs and Connectivity ................................................................................................ 47! Model Support .............................................................................................................. 47! Firewalls ......................................................................................................................... 48! Captive Portal Fails to Redirect to Login Page ................................................................................... 48! 7##-/0&R*7S*T-,"44-/0-0*T-.0&/'*5555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555*6U! OSI Model .......................................................................................................................................... 49! Virtual LANs ........................................................................................................................................ 49! Cisco Wired Networking .................................................................................................................... 49! 7##-/0&R*VS*!"44"/*!&B,"*!"44./0B*55555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555*9D! Configuring an Access Port ................................................................................................................ 50! Configuring a Trunk Port .................................................................................................................... 50! Troubleshooting ................................................................................................................................. 51! Access Port .................................................................................................................... 51! Trunk Port ...................................................................................................................... 52! 7##-/0&R*!S*!"44"/*W1*!"44./0B*5555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555555*9L! Configuring a Port .............................................................................................................................. 53! 7##-/0&R*AS*!"44"/*ER)%-4-*!"44./0B*5555555555555555555555555555555555555555555555555555555555555555555555555555555555555*96! Configuring a Port .............................................................................................................................. 54! 7##-/0&R*ES*!"/3&'8%&/'*E/)-%.B$B*F<&),(-B*./0*T"8)-%B*555555555555555555555555555555555555555555555555555555555*99! Configuring a Port .............................................................................................................................. 55!
2013 Ruckus Wireless, Inc. Wired Networks for Wi-Fi v1.3 4
Copyiight Notice anu Piopiietaiy Infoimation Copyright 2013 Ruckus Wireless, Inc. All rights reserved. No part of this documentation may be reproduced, transmitted, or translated, in any form or by any means, electronic, mechanical, manual, optical, or otherwise, without prior written permission of Ruckus Wireless, Inc. (Ruckus), or as expressly provided by under license from Ruckus. Destination Control Statement Technical data contained in this publication may be subject to the export control laws of the United States of America. Disclosure to nationals of other countries contrary to United States law is prohibited. It is the readers responsibility to determine the applicable regulations and to comply with them. Disclaimer THIS DOCUMENTATION AND ALL INFORMATION CONTAINED HEREIN (MATERIAL) IS PROVIDED FOR GENERAL INFORMATION PURPOSES ONLY. RUCKUS AND ITS LICENSORS MAKE NO WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, WITH REGARD TO THE MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE, OR THAT THE MATERIAL IS ERROR-FREE, ACCURATE OR RELIABLE. RUCKUS RESERVES THE RIGHT TO MAKE CHANGES OR UPDATES TO THE MATERIAL AT ANY TIME. Limitation of Liability IN NO EVENT SHALL RUCKUS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL OR CONSEQUENTIAL DAMAGES, OR DAMAGES FOR LOSS OF PROFITS, REVENUE, DATA OR USE, INCURRED BY YOU OR ANY THIRD PARTY, WHETHER IN AN ACTION IN CONTRACT OR TORT, ARISING FROM YOUR ACCESS TO, OR USE OF, THE MATERIAL. Trademarks Ruckus Wireless is a trademark of Ruckus Wireless, Inc. in the United States and other countries. All other product or company names may be trademarks of their respective owners.
2013 Ruckus Wireless, Inc. Wired Networks for Wi-Fi v1.3 5
Intenueu Auuience There are many factors and concerns related to wired network support of Wi-Fi enterprise deployments. This document is written for and intended for use by technical engineers with some background in Wi-Fi design, Ethernet and 802.11/wireless engineering principles.
2013 Ruckus Wireless, Inc. Wired Networks for Wi-Fi v1.3 6
0veiview Most wireless networks are designed for wireless to wired communications. This requires a sound design both on the wireless and wired network. This document describes recommended practices for designing the wired side and the wireless side for seamless communication and application support. Several relevant topics are covered: OSI-level integration Network deployment models Network element placement within a deployment model Security Quality of Service Common issues and troubleshooting :F2* When discussing interactions between two types of networks, a good place to start is with the Open Systems Interconnection (OSI) model. This describes the functions of a network in terms of distinct layers. Each layer defines to a specific function required to transmit and receive data over a physical medium up to the end application.
Figure 1 - OSI Model
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 7
This uocument focuses on those between 8u2.11 (Wi-Fi) anu excellent iefeiences on the entiie 0SI mouel. Foi moie infoimation please see
2013 Ruckus Wireless, Inc. Wired Networks for Wi-Fi v1.3 8
Appendix A: Recommended Reading at the end of this document. Wiieu Netwoiks anu 0SI From the wired network perspective, the OSI frameworks is as follows: Layer 1 (physical) the physical medium for wired networks, it typically consists of copper or fiber optic cabling Layer 2 (data link) consists of the basic communications protocol to transmit frames, physical addressing, and access and flow control. For an Ethernet network this is defined in the IEEE 802.3 specification. Layer 2 assumes a single network in which all devices are reachable to each other. Layer 2 is often referred to as the MAC or IP layer as well 1 as a subnet Layer 3 (network) provides mechanisms to transport data (routing) from one network to another. Routers and Layer 3 Ethernet switches typically perform this. Layer 3 networks can use different protocols over the IP network such as UDP and TCP. Virtual LANs Virtual LANs (IEEE 802.1Q specification) are commonly deployed as part of a Layer 2 network. A VLAN is a way to logically create a Layer 2 network that mimics a physical Layer 2 network. Multiple VLANs can exist in a given infrastructure. VLANs are often referred to as broadcast domains meaning any device on a physical port that is configured to be part of that VLAN can reach each other but no other device. Two devices might be physically connected to the same Ethernet switch, but if they are members of different VLANs they will require a Layer 3 routing service to reach each other. VLANs work by modifying a frame to include a VLAN ID number. This is referred to as VLAN tagging. No number means a packet is untagged, i.e. it is part of the locally defined Layer 2 network for that physical port (called an access port). When a VLAN tag is inserted, the Ethernet switch must be configured to understand and use that VLAN tag. Not all Ethernet switches understand or honor VLAN tags; those that do support 802.1Q must be configured so they know what to do with it. Physical switch ports that understand 802.1Q are typically referred to as trunk ports they consist of a native VLAN (the untagged network) and one or more VLANs. Any packet that arrives with a VLAN tag is sent to any other physical ports that have that VLAN tag defined. The diagram below shows how VLAN tags work on a single switch and upstream to a second switch.
1 There are several other non-IP protocols that may be used, for the purposes of this document only IP is discussed
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 9
Figure 2 - VLAN Tagging Switch 1 (top) is configured with some ports (untagged) in the red VLAN and some in the blue VLAN. The gray ports are not configured for VLAN tagging. Note that the uplink port that connects it to Switch 2 is a trunk port that is configured for the red and blue VLANs. In this scenario, machine A can only communicate directly with machine C. The same is true for the devices on the blue VLAN B and D. If machine A needs to communicate with B or D the traffic must be routed. This can occur on these switches (if they are Layer 3) or via an external router that also has a trunk port configured with the red and blue VLANs. How a wired switch or router is configured to create these actions depends on the vendor but conceptually, they all follow the same behavior. In some cases, the same behavior can be achieved in multiple ways. Wi-Fi anu the 0SI Nouel A Wi-Fi network works within the OSI model as follows: Layer 1 (physical) the physical medium for wireless networks (also called the PHY layer), consisting of the RF signal from a radio, the spectrum and modulation used to transmit raw symbols. Examples of Layer 1 include 802.11a, 802.11g, etc.
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 10
Layer 2 (data link) consists of the basic communications protocol to transmit frames, physical addressing, and access and flow control. For a WI-FI network this is defined in numerous IEEE 802.11 specifications. Layer 2 assumes a single network in which all devices are reachable to each other. Because Wi-Fi is a shared medium (unlike most wired networks), collision detection and avoidance is extremely important. This is still the IP network layer for IP-based deployments Layer 3 (network) provides mechanisms to transport data (routing) from one network to another. Routers and Layer 3 Ethernet switches typically perform this. This function is unchanged from the wired model Common Wi-Fi Beployments Once a client connects to an AP, the traffic is usually transported from the AP to a wired network. Which network it goes to will depend on the configuration of the AP. Some common scenarios are: 1. All traffic for the SSID is untagged and goes to the native VLAN on that port 2. All traffic for the SSID is tagged for a specific VLAN (static or dynamic) 3. Traffic is tunneled from the AP to the controller and then onto the wired network Correctly designing and configuring the wired network is critical for a successful Wi-Fi deployment. The rest this document examines each of these points in-depth and offer guidelines and suggestions for optimized wired design configuration with Ruckus wireless equipment. Where needed, specific configuration commands are documented for step-by- step configuration instructions.
2013 Ruckus Wireless, Inc. Wired Networks for Wi-Fi v1.3 11
Netwoik Topology Besigns Most Wi-Fi equipment acts as an adjunct to an existing wired network; i.e. the Wi-Fi essentially functions as an extension of the wired network rather than self-contained. When designing for a Wi-Fi deployment, the first question is overall network topology. Its important to understand how and where the wireless client traffic will enter the wired network. There are common solutions to this: Di stri buted data forwardi ng Client traffic enters the network at the AP switch port Central i zed data forwardi ng Client traffic is tunneled to the ZoneDirector and enters the network from the ZoneDirectors switch port Both of these methods are supported by Ruckus Wireless equipment. Each option is configured on a per-SSID basis. The decision on which to use will depend on the local environment and usage requirements. A&B)%&P8)-0*A.).*X"%<.%0&/'* This model is the default configuration for Ruckus equipment. In this mode, the client traffic enters the wired network at the APs switch port. The ZoneDirector is not part of the data path and is not necessary for any traffic forwarding.
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 12
Figure 3 - Distributed Data Forwarding Topology Auvantages Distributed data forwarding offers the highest performance for a Wi-Fi network. The client traffic is immediately placed on the wired network at the AP switch port. There is no additional delay, latency or potential bottleneck to slow down throughput. Bisauvantages A large Wi-Fi network could potentially have the same WLAN (SSID) broadcast on APs on different networks. If two APs both have the same SSID but put clients on different subnets, the client will need to release its first IP address and request a new one. This can take time and delay data transmission from that device. This is normally not a problem for data traffic but it can cause issues for VoIP Wi-Fi devices, which can drop calls if transmission latency is over 150ms. For more information on how APs use different subnets for the same SSID, please see Dynamic VLANs and VLAN Overrides. 8u2.1Q vLAN Tagging In a distributed model, any network that is available on an APs wired port is available for the WLAN clients connected to that AP. If the switch port is unmanaged or has a default VLAN assigned, all AP traffic should be sent as untagged traffic to that port.
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 13
If the wired switch is configured for VLAN tagging however, the AP may have several networks choices available: the untagged (default) VLAN on the port or it may include an 802.1Q tag on the client traffic and place it on a different VLAN. Client traffic can be tagged or untagged this refers to the network it will be placed into by the AP. !-/)%.@&Y-0Z?8//-@-0*A.).*X"%<.%0&/'* Client traffic can also be sent via an LWAPP tunnel from the AP to the ZoneDirector. In this mode, the traffic does not actually enter the network until it gets to, and flows through, the ZoneDirector. As the endpoint of the LWAPP tunnel from the AP, the ZoneDirector is in the data path and must be present for client traffic to get onto the network successfully.
Figure 4 - Centralized Data Forwarding Auvantages Tunneling is recommended when Layer 3 roaming latency is a concern, e.g. VoIP Wi-Fi clients. By tunneling all client traffic to the ZoneDirector, the handsets can stay on the same VLAN regardless of which AP they use. This is only an issue for roaming devices if they same SSID is broadcast with different VLANs on some APs. If all APs put clients for the
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 14
SSID on the same VLAN then tunneling is not required since there is no potential VLAN change. Tunneling is also useful when traffic must be broken out using the ZoneDirector is a terminator, e.g. hotels that want to only send encrypted POS traffic in a tunnel and all guest data distributed locally. Bisauvantages Sending all traffic through the ZoneDirector does make it a point of failure. It also limits the maximum throughput; the amount of data that can go through a single ZoneDirector with one Gigabit Ethernet port is far smaller than 10 APs all sending data locally (distributed) on their own Gigabit Ethernet ports. If throughput performance is a requirement, centralized data forwarding is not a good choice. The following table shows some estimates on tunneling throughput based on the ZoneDirector model. These are estimates only and may differ depending specific packet size and characteristics. ZoneDirector Model Unecrypted Throughput Encrypted Throughput ZD1100 598 Mbps 63 Mbps ZD3000 1893 Mbps 1208 Mbps ZD5000 1957 Mbps 1949 Mbps
*Numbers are based on the sum bi-directional throughput with 1518 byte packets and dual ports. 8u2.1Q vLAN Tagging In a centralized model, any network that is available on a ZoneDirectors wired port can be available for the WLAN clients. If the switch port is unmanaged or has a default VLAN assigned, all traffic should be sent as untagged traffic to that port. If VLAN tagging is used, the ZoneDirectors switch port must be configured as a trunk port NOT the AP. The AP will tag the traffic for the correct VLAN but that is not used until the traffic is outside the LWAPP tunnel. If the wired switch is configured for VLAN tagging however, several networks choices may be available: the untagged (default) VLAN on the port or it may include an 802.1Q tag on the client traffic and place it on a different VLAN.
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 15
Client traffic can be tagged or untagged this refers to the network it will be placed into by the AP.
2013 Ruckus Wireless, Inc. Wired Networks for Wi-Fi v1.3 16
Netwoik Element Placement There are many ways to place Ruckus ZoneDirectors and APs into a wired network topology. One or more of the following concerns can drive where these devices are installed: Physical security Redundancy Performance/efficiency 1($B&,.@*F-,8%&)$* Access Points In general, an AP is always physically located in the coverage area and homed out of a switch closet. It is possible to home run the AP to the data center, but is typically not required. Locking the switch closet is generally enough to secure the AP wired connection. This is especially true if the AP is hidden and not easily reachable (above the ceiling, etc.). In some cases however, an AP may be visible and possibly easily reachable. A Kensington lock is advised to prevent theft. ZoneBiiectoi A ZoneDirector is typically located in the data center or network core. These areas are usually tightly controlled and not subject to tampering. T-08/0./,$* Access Points All Ruckus APs have at least one port and, in some cases, more than one. Any of these may be used for network connectivity. However, only one Power Over Ethernet (POE) port is available. In the case of APs, the simplest redundancy plan is to ensure a client is always within reasonable performance range of at least two APs at any time. ZoneBiiectoi As the central point for management, monitoring and control, the ZoneDirector should be installed to minimize service interruptions. At the least, this should include uninterruptable power. It may also require redundant uplinks to the core network. The ZoneDirector also supports a couple variants on redundancy options:
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 17
Acti ve-Acti ve two ZoneDirectors are active at the same time and each supports approximately half of the APs Pri mary-Secondary each AP is given a primary ZoneDirector (preferred) and a secondary to contact if the primary is unreachable Smart Redundancy N+1 active-standby redundancy Pros and Cons of Redundancy Strategies Method Advantage Disadvantage Active-Active Simplest configuration, self-balances across all APs (no configuration necessary) -No automatic configuration updates between controllers (manual) -APs see a different controller at failover -L2 only Primary-Secondary -Simple to configure -L2 or L3 support -No automatic configuration synchronization between controllers -Network disruption could cause some APs to connect to primary and some on secondary at the same time -APs see a different controller at failover -If both controllers are unavailable, APs will not try to connect to a third controller Smart Redundancy -True N+1 redundancy -Automatic synchronization of configuration, databases -Transparent to APs -L2 or L3 support -More complex configuration -Network isolation could cause AP split across controllers (fixed when network converges)
In each case, redundant controllers must be the same model and software version. They must also be licensed for the same number of APs. Full coverage of all redundancy options is beyond the scope of this document. For more information on how to configure redundancy, please refer to the ZoneDirector User Guide. 1-%3"%4./,-* Access Points The distributed data-forwarding model is the highest performing deployment for a Ruckus AP. All user traffic enters the network at the APs wired port. This prevents potential bottlenecks and single points of failure at the core (ZoneDirector). This is the recommended deployment for most installations. ZoneBiiectoi In cases where centralized traffic forwarding is required, the amount of traffic should be matched with the capacity of the ZoneDirector. Each controller model offers a different amount of throughput capacity based on processing speed, etc. Performance is also
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 18
affected by packet size. The table below offers some guidelines on throughput capacity based on 1400 byte packets. ZoneDirector Model Unencrypted Tunnel Performance Encrypted Tunnel Performance ZD1100 ~300 Mbps ~62 Mbps ZD3000 ~900 Mbps ~580 Mbps ZD5000 ~957 Mbps ~297 Mbps
["/-A&%-,)"%*A&B,";-%$* The ZoneDirectors location can affect how APs discover and join the ZoneDirector. In particular, a Layer 3 deployment will require some additional configuration to ensure the APs can find the ZoneDirector. There are several options available: DHCP Option 43 DNS entry for zonedirector.<domain> Static configuration via the AP shell Pre-deployment configuration via Layer 2 to the ZoneDirector
2013 Ruckus Wireless, Inc. Wired Networks for Wi-Fi v1.3 19
Netwoik Secuiity Physical security is usually not sufficient to ensure the wireless network is tamper-proof. Securing the Wi-Fi devices should include: Network port access Firewalls Management access +-)<"%>*1"%)*7,,-BB* Access Points A Kensington lock on an AP may be not sufficient if the AP or its switch port connection is physically accessible. This type of vulnerability can potentially allow users to unplug the AP and use its cable for their own equipment or (if the AP has multiple Ethernet ports) plug their device into a second port on the AP itself. 802.1X Authentication In the case of a physically accessible wired port, the most secure solution is 802.1X wired security on the port. This assumes the following is true: 1. The AP uplink port is configured as an 802.1X supplicant 2. The AP uplink is configured as a trunk port 3. The wired switch port must be configured as a trunk port and as an 802.1X authenticator 4. The AP is configured for either MAC based authentication or with a user name and password 5. The wired ports 802.1X configuration does not allow a 3 rd party (i.e. anything other than the AP) to successfully authenticate via 802.1X.
The following steps configure a ZoneDirector-managed AP or group of APs for 802.1X security: 1. Log onto the ZoneDirector and go to Configure->Access Points 2. Click Edit next to the AP or AP Group to be configured 3. Under Port Setting, choose Supplicant from the drop-down box for the uplink port 4. Make sure the Type is set to Trunk Port 5. Select the authentication credentials under Supplicant: MAC authentication or a user name and password
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 20
6. Click OK to save the changes NOTE: If 802.1X is not already configured correctly on the wired switch port, the AP will lose contact with the ZoneDirector. MAC Authentication (Wired Switch) If the wired switch supports it, the AP port may also be locked down to the specific APs MAC address. This is not as secure as 802.1X any device that can spoof the APs MAC can use the port. Untagged Traffic Another possibility is to deny network access to all untagged traffic for example, the untagged traffic might go to a non-routed subnet that has no connectivity, DHCP, DNS, etc. Since user devices would typically only transmit untagged traffic this would prevent them from gaining any useful network access. Using this solution however would require all other traffic (WLAN traffic and AP management traffic) use 802.1Q tags. In the case of additional Ethernet ports on the AP, if they are not used, the best practice is to disable them. The following steps configure a ZoneDirector-managed AP or group of APs for 802.1X security: 1. Log onto the ZoneDirector and go to Configure->Access Points 2. Click Edit next to the AP or AP Group to be configured 3. Under Port Setting, choose each the unused port 4. Make sure the Enable checkbox is unselected
5. Click OK to save the changes
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 21
ZoneBiiectoi A ZoneDirector is typically not physically accessible outside a locked data center. But management access should be locked down as well. There are several ways to do this: Configure ZoneDirector to deny management Web UI access to all but an exception list of allowed management devices or subnets (wired and wireless network devices) Place the ZoneDirector on an isolated management VLAN. For more information on management VLANs, please see section Management VLANs. Configure wired security (firewalls) to deny all traffic except permitted devices (see the next section) Block Management Access from the ZoneDirector The following steps configure a ZoneDirector to refuse management access to all but a specific list of devices or subnets: 1. Log onto the ZoneDirector and go to Configure->System 2. Click the Create New link under the Management Access Control section 3. Configure the allowed devices (single device, range or entire subnet)
4. Click OK to save the changes
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 22
X&%-<.@@B* The following ports should be configured on any firewall policies as per the usage indicated below: ZoneBiiectoi anu Nanageu APs Port Number Protocol Usage 80, 443, 22 TCP/UDP Management access to ZoneDirector (HTTP/HTTPS, SSH) 1222, 1223 UDP LWAPP management/tunnel between AP and ZoneDirector 20, 21 TCP ZoneDirector to AP firmware upgrade 443, 33003 TCP Smart Redundancy (ZoneDirectors) 18301 UDP SpeedFlex 9997/9998 TCP WISPr access
Stanualone APs Port Number Protocol Usage 80, 443, 22 TCP Management access to AP (HTTP/HTTPS, SSH) 3990, 3992 TCP WISPr access
FlexNastei Port Number Protocol Usage 443 TCP Web UI management access to FlexMaster 80 TCP FlexMaster to AP firmware upgrade 80, 443 TCP First time connection/registration of standalone AP to FlexMaster
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 23
80, 443 TCP FlexMaster to AP template/auto configuration 443 TCP ZoneDirector to FlexMaster registration/informs 443 TCP FlexMaster to ZoneDirector firmware upgrades 60010 TCP ZoneDirector template feature (FlexMaster) 8082 TCP FlexMaster to AP wake up 18301 UDP SpeedFlex Fiiewall Caveat If the ZoneDirector is used to provide captive portal authentication (internal or guest access), the ZoneDirector must be accessible via HTTP/HTTPS by user devices. If the ZoneDirector or AP is used to provide WISPr or Open Secure Hotspot, the external captive portal must have access to the ZoneDirector (refer to the table above for specific ports). N./.'-4-/)*7,,-BB* Access Points APs managed by a ZoneDirector, should be restricted to only allow HTTP/S, SSH and telnet traffic to a secure management network. The devices should not be accessible to connected users. Both standalone and managed APs support the use of a management VLAN to further restrict access. For more information, please see section Management VLANs. ZoneBiiectoi The controller should also be restricted to only be accessible by approved devices and networks. For more information, please see section Management VLANs.
2013 Ruckus Wireless, Inc. Wired Networks for Wi-Fi v1.3 24
Configuiing 0ntaggeu WLANs Once a client connects to an AP, the traffic is usually transported from the AP to a wired network. Which network it goes to will depend on the configuration of the AP. The simplest configuration is to instruct the AP to pass all client data as untagged to the wired network. +")-*"/*MJ7+*C* Ruckus equipment will always assume traffic should be untagged if VLAN 1 is specified. VLAN 1 traffic is never tagged. ER.4#@-* The following is an example of a Wi-Fi design with untagged client traffic on the employee network (VLAN 1). The example uses three networks: Name Network Usage VLAN 1 10.1.1.0 Employee VLAN 100 10.1.100.0 BYOD VLAN 200 10.1.200.0 Guest
The Ethernet switch is marked to show the default (untagged) VLAN for each port.
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 25
Figure 5 - Untagged WLAN Traffic To place employee Wi-Fi clients on VLAN 1 10.1.1.0 the AP must be configured to not tag client traffic for that SSID. NOTE: Although the ZoneDirector is shown also connected to VLAN 1 (untagged) this is not required. The ZoneDirector can be on any network provided it can communicate with the AP. I&%-0*!"/3&'8%.)&"/* The APs port on the Ethernet switch in this example must be configured such that VLAN 1 is available and untagged (access port). For examples of how to configure this on popular wired switches, please see the various appendixes at the end of this document. ["/-A&%-,)"%*!"/3&'8%.)&"/* Here are the steps to configure an SSID with untagged traffic on the ZoneDirector. 1. Log onto the ZoneDirector Web UI 2. Go to Configure->WLANs 3. Click Create New in the WLANs section
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 26
4. Enter the required information for the new SSID
5. Click the Advanced Options link at the bottom of the window 6. Make sure the VLAN ID under ACCESS VLAN is set to 1 (untagged)
7. Click OK to save the changes
2013 Ruckus Wireless, Inc. Wired Networks for Wi-Fi v1.3 27
Configuiing Taggeu WLANs Once a client connects to an AP, the traffic is usually transported from the AP to a wired network. Which network it goes to will depend on the configuration of the AP. An AP can add an 802.1Q VLAN tag if the device should be on a network other than the default. When a WLAN is configured with a specific VLAN tag, the client traffic is modified to include the VLAN tag in the frame. This means the Ethernet switch will keep the tag and use it to place the traffic on the correct network. If the Ethernet switch is not configured as a trunk port or it does not have the correct VLAN assigned it will ignore (drop) the client packets. +")-*"/*MJ7+*C* Ruckus equipment will always assume traffic should be untagged if VLAN 1 is specified. VLAN 1 traffic is never tagged. ER.4#@-* The following is an example of a Wi-Fi design with tagged client traffic on the guest network (VLAN 200). The example uses three networks: Name Network Usage VLAN 1 10.1.1.0 Employee VLAN 100 10.1.100.0 BYOD VLAN 200 10.1.200.0 Guest
The Ethernet switch is marked to show the default (untagged) VLAN for each port. Each port is also configured as a tagged/trunk port for other VLANs.
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 28
Figure 6 - Tagged WLAN Traffic To place guest Wi-Fi clients on VLAN 200 10.1.200.0 the AP must be configured to tag client traffic for the Guest SSID. If the guest SSID is not tagged, these devices will be placed on the employee network (VLAN 1). NOTE: Although the ZoneDirector is shown also connected to VLAN 1 (untagged) this is not required. The ZoneDirector can be on any network provided it can communicate with the AP. I&%-0*!"/3&'8%.)&"/* The APs port on the Ethernet switch in this example must be configured such that VLAN 200 is available and tagged. For examples of how to configure this on popular wired switches, please see the various appendixes at the end of this document. ["/-A&%-,)"%*!"/3&'8%.)&"/* Here are the steps to configure a guest SSID with tagged traffic on the ZoneDirector. 1. Log onto the ZoneDirector Web UI 2. Go to Configure->WLANs
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 29
3. Click Create New in the WLANs section 4. Enter the required information for the new SSID
5. Click the Advanced Options link at the bottom of the window 6. Make sure the VLAN ID under ACCESS VLAN is set to 200 (tagged)
7. Click OK to save the changes
A$/.4&,*MJ7+B** If RADIUS authentication is used for clients, dynamic VLANs may also be used. The RADIUS server sends a specific VLAN assignment for that user as part of the Access-Accept message. The VLAN assignment could be different for other clients even though they are on the same SSID. In this case, the AP will make each clients traffic with the correct VLAN tag.
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 30
I&%-0*!"/3&'8%.)&"/* Dynamic VLANs are configured similarly to tagged traffic on a port. A wired switch port must be configured to allow all VLANs that might be assigned. ["/-A&%-,)"%*!"/3&'8%.)&"/* Here are the steps to configure a dynamic VLAN SSID with tagged traffic on the ZoneDirector. 1. Log onto the ZoneDirector Web UI 2. Go to Configure->WLANs 3. Click Create New in the WLANs section 4. Enter the required information for the new SSID note that Dynamic VLANs are only available for WLANS that use RADIUS authentication (MAC authentication or 802.1X) 5. Click the Advanced Options link at the bottom of the window 6. Make sure the VLAN ID under ACCESS VLAN is set to the default VLAN for the SSID it can be tagged or untagged (VLAN 1) 7. Check the Enable Dynamic VLAN box
8. Click OK to save the changes Note that a default VLAN must be specified for this SSID regardless of whether Dynamic VLANs are used or not. A default must always be specified in case the RADIUS server does not return a specific VLAN. RADIUS-assigned VLANs always override the default.
2013 Ruckus Wireless, Inc. Wired Networks for Wi-Fi v1.3 31
Configuiing Tunneleu WLANs Once a client connects to an AP, the traffic is usually transported from the AP to a wired network. Which network it goes to will depend on the configuration of the AP. Normally a Wi-Fi clients traffic enters the wired network at the APs switch port. But sometimes it is preferable to tunnel the traffic to the ZoneDirectors switch port instead. Traffic tunneling is usually used to allow more seamless roaming in certain conditions. For example, a Wi-Fi VoIP handset might roam from one AP to another. This is fine if both APs place it on the same subnet but if the second AP is configured to put the handset on a different network it must drop its IP address and acquire a new one. The time to do this will drop any active voice connections. To solve this, the handsets voice traffic is tunneled from the AP to the ZoneDirector. This means any handset, regardless of the AP it is connected to, will be assigned a network, address, etc. from the ZoneDirectors switch port instead of the AP. Handsets can then roam to any AP and never need to drop their connection to acquire a new address. Because the traffic is tunneled back to the ZoneDirector, the AP does not need to be connected to a trunk port or have the voice subnet available, it only needs to be able to reach the ZoneDirector. The ZoneDirector controller is the device that must be connected to a wired switch port with the voice VLAN not the AP. +")-*"/*MJ7+*C* Ruckus equipment will always assume traffic should be untagged if VLAN 1 is specified. VLAN 1 traffic is never tagged. ER.4#@-* The following is an example of a Wi-Fi design with tagged VoIP traffic on the voice network (VLAN 110). The example uses three networks: Name Network Usage VLAN 1 10.1.1.0 Employee VLAN 100 10.1.100.0 BYOD VLAN 222 10.1.222.0 Voice
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 32
The Ethernet switch is marked to show the default (untagged) VLAN for each port. Each port is also configured as a tagged/trunk port for other VLANs.
Figure 7 - Tunneled WLAN Traffic Voice clients must be placed on VLAN 222, but in this example the VLAN is not configured for the AP switch port. Instead, it will be tunneled via LWAPP over VLAN 1 to the ZoneDirector. The ZoneDirector is connected to a switch port that does have VLAN 222 available. I&%-0*!"/3&'8%.)&"/* The ZoneDirectors port on the Ethernet switch in this example must be configured such that VLAN 222 is available and tagged. For examples of how to configure this on popular wired switches, please see the various appendixes at the end of this document. ["/-A&%-,)"%*!"/3&'8%.)&"/* Here are the steps to configure a voice SSID with tunneled traffic on the ZoneDirector.
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 33
1. Log onto the ZoneDirector Web UI 2. Go to Configure->WLANs 3. Click Create New in the WLANs section 4. Enter the required information for the new SSID 5. Click the Advanced Options link at the bottom of the window 6. Make sure the VLAN ID under ACCESS VLAN is set to 222 (tagged) 7. Click the checkbox next to Tunnel Mode
8. Click OK to save the changes This configuration will cause the AP to tag all client traffic on the voice SSID with VLAN 222 and tunnel it to the ZoneDirector. The client traffic will enter the network at the ZoneDirectors switch port.
2013 Ruckus Wireless, Inc. Wired Networks for Wi-Fi v1.3 34
vLAN 0veiiiues Sometimes the default VLAN configuration for an SSID has to be changed for a subset of APs/locations. This commonly happens in very large deployments where many smaller subnets are used instead of one very large broadcast domain. It might also be used if the same SSID is configured on APs in different geographical locations, i.e. different campuses, offices, etc.
Figure 8 - VLAN Overrides WLAN Groups offer a way to change the VLAN assignment for an SSID broadcast by a group of APs. ["/-A&%-,)"%*!"/3&'8%.)&"/* Here are the steps to configure a WLAN group with VLAN override on the ZoneDirector. 1. Log onto the ZoneDirector Web UI 2. Go to Configure->WLANs 3. Click Create New in the WLAN Groups section 4. Select the WLANs an AP member of this group will broadcast
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 35
5. To the right of each WLAN, set VLAN override if the VLAN tag has changed (VLAN 1 = untagged)
6. Click Apply to save the changes 7. Assign this WLAN Group to each AP that will use this VLAN override
2013 Ruckus Wireless, Inc. Wired Networks for Wi-Fi v1.3 36
Nanagement vLANs A management VLAN is dedicated to monitoring and managing network equipment. It is also the subnet over which management control plane traffic is sent software upgrades, heartbeats, signaling, etc. This type of network is typically isolated and firewalled from the rest of the organization. Both Ruckus APs and ZoneDirectors can be configured to use a specific VLAN for management traffic. By default, they use the untagged network. Although both typically use the same management VLAN, a ZoneDirector and an AP can be configured to use different management VLANs as well. For this to work, the two management networks must be reachable with each other. Alternatively, just one device can be configured to tag management traffic. The other device must either be on a network that can reach the management subnet or connected to a port that is a member of that management VLAN by default (untagged). +")-*"/*MJ7+*C* Ruckus equipment will always assume traffic should be untagged if VLAN 1 is specified. VLAN 1 traffic is never tagged. I("*F("8@0*HB-*N./.'-4-/)*MJ7+B* Use of the untagged VLAN is recommended for most deployments. This is due to its simplicity and ease of recovery in case of misconfigured switch ports, APs or ZoneDirectors. If management a VLAN is required, please review the instructions below carefully. ER.4#@-* The following is an example of a Wi-Fi design in which APs and ZoneDirectors send management traffic on VLAN 33: Name Network Usage VLAN 1 10.1.1.0 Employee VLAN 33 10.1.33.0 Management VLAN 100 10.1.100.0 BYOD
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 37
The Ethernet switch is marked to show the default (untagged) VLAN for each port. Each port is also configured as a tagged/trunk port for other VLANs.
Figure 9 - Management VLAN Traffic I&%-0*!"/3&'8%.)&"/* The ZoneDirectors port on the Ethernet switch in this example must be configured such that VLAN 33 is available and tagged. For examples of how to configure this on popular wired switches, please see the various appendixes at the end of this document. ["/-A&%-,)"%*!"/3&'8%.)&"/* Here are the steps to configure a management VLAN on the ZoneDirector. 1. Log onto the ZoneDirector Web UI 2. Go to Configure->System 3. Go the Device IP Settings area 4. Set ACCESS VLAN to 33
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 38
5. Click Apply to save the changes This configuration will cause the ZoneDirector to immediately begin tagging all management traffic to VLAN 33. NOTE: You will likely be disconnected from the ZoneDirector after applying this change. This is because the ZoneDirectors switch port does not have VLAN tagging enabled for VLAN 33. To regain access to the ZoneDirector, reconfigure its switch port. 71*!"/3&'8%.)&"/* The management VLAN for an AP is configured on a global basis. Only one management VLAN can be configured for all APs. This VLAN can be different from the ZoneDirectors, but all APs must use the same management VLAN. Here are the steps to configure a management VLAN on the Ruckus AP.
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 39
1. Log onto the ZoneDirector Web UI 2. Go to Configure->Access Points 3. Go the Access Point Policies area 4. Next to Management LAN, click the radio button and enter the VLAN number (33)
5. Click Apply to save the changes This configuration will cause all APs to immediately begin tagging all management traffic to VLAN 33. NOTE: You will likely see the APs disconnect from the ZoneDirector after applying this change. This is because the APs switch port does not have VLAN tagging enabled for VLAN 33. To all the APs to gain access to the ZoneDirector, reconfigure each AP switch port. T-,"44-/0.)&"/B* Assigning management VLANs is a disruptive process and will typically cause some outage time. How much time depends on how smoothly the transition occurs. The following are some hints and tips to make this easier: Switch Poit Configuiation When moving from untagged to tagged management, its a good idea to make sure every switch port needed is configured as a trunk port with the management VLAN tagged. Doing this ahead of time reduces disruption since the port still works for untagged traffic but will instantly support the device when it starts tagging its traffic. Make a list of all ports that must be reconfigured before starting this should include all devices ZoneDirectors and APs that are being configured to use a tagged management VLAN.
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 40
APs Can Biscovei the ZoneBiiectoi Make sure there is a way for them to discover the controller after they move to the management VLAN. If the ZoneDirectors IP address has not changed, there is nothing to do the APs remember the last address used. If the IP address of the ZoneDirector changes during this process, the APs must have a way to find the controller again. There are several methods an AP can use; one of these must work on the new management VLAN: 1. Layer 2 broadcast discovery the AP and the ZoneDirector are on the same logical subnet (after both have been moved) 2. DHCP Option 43 the DHCP server for the management VLAN (if using one) is configured to give the ZoneDirectors IP address to the APs 3. DNS lookup the DNS server is configured to give the controllers IP address when queried for zonedirector.<local domain> 4. Static assignment if the controllers IP address is changing, the new address could be pre-loaded onto the APs by making it the secondary controller. Thus, when the APs move and cant find the primary address, they will try the second APs Fiist If changing both APs and ZoneDirectors, always change the management VLAN on the APs first. Doing the ZoneDirector first will prevent the APs from connecting at which point there will be no way to configure the APs with the new management VLAN since they cant connect.
2013 Ruckus Wireless, Inc. Wired Networks for Wi-Fi v1.3 41
Configuiing Quality of Seivice Quality of Service (QoS) refers to the capability of a wired or wireless network to provide differentiated priority services to selected network traffic over various network technologies. Delay or latency sensitive traffic such as video or voice sent from the wireless network to the wired network should always have the correct QoS maintained. Without QoS, an AP will not differentiate between the various traffic types (voice, video, data) on the network. All traffic is treated as equal, and thus the WLAN typically works in a first- come first-served fashion. Ruckus SmartCast QoS technology helps avoid this behavior by combining multicast traffic handling techniques, QoS and application-aware traffic classification capabilities to ensure the highest quality video transmissions over Wi-Fi. WMM and QoS are enabled by default on all Ruckus products. QoS and priority can also be configured on an administrative basis as well. Supported options include: Heuri sti cs - Ruckus equipment automatically detects the traffic type and assigns a QoS ToS ( Type of Servi ce) Cl assi fi cati on honor ToS bits set on the traffic ToS Marki ng allows the device to set the ToS of unmarked traffic Di rected Mul ti cast/Broadcast convert multi-media packets into unicast for each client I GMP Snoopi ng Mode selectively forward multicast frames to those devices subscribing to the multicast stream Wel l -Known Mul ti cast Forwardi ng for well-known protocols: UPnP, Bonjour and Link-Local Multicast Name Resolution (LLMNR) Per-SSI D pol i cy assigns a high or low priority over other SSIDs Per-VLAN pol i cy assigns a specific QoS for a VLAN Unknown Mul ti cast Drop multicast traffic that is not recognized INN\*?"F*./0*AF!1*F8##"%)* WMM is a Wi-Fi Alliance certification of support for a set of features from an 802.11e draft. This certification is for both clients and APs, and certifies the operation of WMM. The Wi-Fi Multimedia (WMM) specification lays out a method for Wi-Fi networks to also prioritize traffic according to four common classes of service, each known as an access category (AC). AC_VO - highest-priority voice traffic AC_VI - medium-priority video traffic AC_BE - standard-priority data traffic, also known as "best effort" AC_BK - background traffic, that may be dropped- when the network is congested
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 42
The access category for each packet is specified using either 802.1p tagging (when available and supported by the access point) or by the use of Diffserv Code Points (DSCP). DSCP tags are carried in the IP header of each packet and most often used on wired networks due to simplicity and Layer 2 capability. In other words, the DSCP tags survive crossing through every piece of network equipment that is not aware of DSCP tags, whereas 802.1p requires 802.1p-aware links (802.1Q) throughout the network, all carried over 802.1Q VLAN links. The 802.1p value is a field in the VLAN header that indicates the priority of the tagged packet. 802.1p classification is similar to ToS classification. However, while ToS values apply to any IP packet, 802.1p values only apply to traffic on a specified VLAN. 802.1p values range from 0 to 7 (0 is lowest and 7 is highest). NOTE: Note that if 802.1p classification and ToS classification are both enabled, 802.1p classification takes precedence. Therefore, if you want to use ToS classification, 802.1p classification should be disabled. There are eight DSCP tags, which map to the four access categories. The application that generates the traffic is responsible for filling in the DSCP tag. The standard mapping is as follows: Table 1 - DSCP and ToS to AC Mapping Traffic Type Priority ToS Value DSCP Value AC/802.11e Voice 7 0xE0 (224) 0x38 (56) AC_VO Voice 6 0xC0 (192) 0x30 (48) AC_VO Video 5 0xA0 (160) 0x28 (40) AC_VI Video 4 0x80 (128) 0x20 (32) AC_VI Best Effort 3 0x60 (96) 0x18 (24) AC_BE Background 2 0x40 (64) 0x10 (16) AC_BK Background 1 0x20 (32) 0x08 (8) AC_BK Best Effort 0 0x00 (0) 0x00 (0) AC_BE
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 43
Although ToS and DSCP support up to 8 distinct categories, WMM only mandates four queues for traffic: voice, video, best effort and background. 0thei Classification values Ruckus products set the following default classifications by traffic type: Type Voice Video Data Background ToS Marking 0x0 0xA0 0x0 0x0 Tunneled ToS Marking 0xA0 802.1p Classification None None None None Heuristic Classifier Voice Video Data Background
The current QoS values in use on a ZoneDirector can be seen via the following CLI command: ruckus(config)# services ruckus(config-sys)# qos ruckus(config-sys-qos)# show System QoS: ToS DATA TUNNEL = 0xA0 ToS CTRL TUNNEL = 0xA0 ToS Classification-Voice = 0xE0 0xC0 0xB8 ToS Classification-Video = 0xA0 0x80 ToS Classification-Data = 0x0 ToS Classification-Background = 0x0 Tx fail threshold = 50 heuristics inter-packet-gap Video = 0 65 heuristics inter-packet-gap Voice = 15 275 heuristics packet-length Video = 1000 1518 heuristics packet-length Voice = 70 400 heuristics classification Video = 50000 heuristics classification Voice = 600 heuristics no classification Video = 500000 heuristics no classification Voice = 10000 The current QoS values for a standalone AP are gathered as follows: rkscli: get qos Tx Failure Threshold: 50 Dead Station Count: 0 Directed DHCP: Enabled Directed ICMPv6 RA: Enabled
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 44
IGMP General Query V2/V3: Disabled/Disabled MLD General Query V1/V2: Disabled/Disabled
TOS Classification: Voice=0xE0,0xC0,0xB8, Video=0xA0,0x80, Data=0x0, Background=0x0 TOS marking: VoIP=0x0, Video=0xA0, Data=0x0, Background=0x0 Dot1p Classification: Voice=none, Video=none, Data=none, Background=none Dot1p marking: VoIP=0, Video=0, Data=0, Background=0 Tunnel TOS Marking: Data=0xA0 (static TOS), Ctrl=0xA0 Heuristic Classifier: VoIP Video Data Background Octet Count During Classify: 600 50000 0 0 Octet Count Between Classify: 10000 500000 0 0 Min/Max Avg Packet Length: 70/400 1000/1518 0/0 0/0 Min/Max Avg Inter Packet Gap: 15/275 0/65 0/0 0/0 Nouifying Tiaffic Classification Changing these values can impact existing application behavior. In general, this should not be modified from the default settings. For more information, please contact the Ruckus Technical Assistance Center. N8@)&,.B)*./0*V%".0,.B)*?%.33&,* Ruckus converts broadcast/multicast traffic to unicast by default. This is known as directed broadcast/multicast. The default setting converts traffic until there are 5 or more devices receiving the traffic. After this, conversion to unicast stops. This is done on the principle that having more devices reduces the utility of the unicast conversion. The directed threshold of clients or even the conversion itself can be modified or disabled/enabled completely. ZoneBiiectoi Biiecteu Tiaffic Commanus All QoS settings are configured from the command line interface (CLI) only. Directed Multicast To disable/enable directed multicast for a WLAN: ruckus(config)# wlan test-ssid ruckus(config-wlan)# no qos directed-multicast The command was executed successfully. To save the changes, type 'end' or 'exit'. ruckus(config-wlan)# qos directed-multicast The command was executed successfully. To save the changes, type 'end' or 'exit'
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 45
IGMP Snooping To disable/enable IGMP snooping for a WLAN: ruckus(config)# wlan test-ssid ruckus(config-wlan)# qos igmp-snooping ruckus(config-wlan)# no qos igmp-snooping MLD Snooping To disable/enable MLD snooping for a WLAN: ruckus(config)# wlan test-ssid ruckus(config-wlan)# no qos mld-snooping ruckus(config-wlan)# qos mld-snooping Directed Threshold To configure the maximum number of clients before unicast conversion stops for a WLAN: ruckus(config)# wlan test-ssid ruckus(config-wlan)# qos directed-threshold 10 AP Biiecteu Tiaffic Commanus All QoS settings are configured from the command line interface (CLI) only. Directed Multicast To disable/enable directed multicast for a WLAN: rkscli: set qos wlan0 directed multicast disabled Directed Multicast ingress packet processing is Disabled on interface wlan0 rkscli: set qos wlan0 directed multicast enabled Directed Multicast ingress packet processing is Enabled on interface wlan0d IGMP Snooping To disable/enable IGMP snooping for a WLAN: rkscli: set qos wlan0 igmp disable IGMP Snooping is Disabled on interface wlan0 OK rkscli: set qos wlan0 igmp enable IGMP Snooping is Enabled on interface wlan0 MLD Snooping To disable/enable MLD snooping for a WLAN: rkscli: set qos wlan0 mld disable MLD Snooping is Disabled on interface wlan0 rkscli: set qos wlan0 mld enable
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 46
MLD Snooping is Enabled on interface wlan0 Directed Threshold To configure the max rkscli: set directedthreshold wlan0 0 rkscli: set directedthreshold wlan0 0 OK rkscli: set directedthreshold wlan0 5 !"/3&'8%&/'*#-%]FF2A*1%&"%&)$* When an AP has traffic of the same from multiple WLANs, it uses a round robin method to determine which WLANs traffic is sent. This ensures all SSIDs get some airtime. If one of the WLANs has a higher priority traffic, this is always sent first. However, in the case of multiple WLANs with traffic of the same (high) priority, the AP will again treat these WLANs in a round-robin fashion. There are times when one WLANs traffic should be prioritized over another. For example, two SSIDs exist one is for voice devices and one is for guests. If high priority (voice) traffic is sent from both SSIDs, most organizations would prefer the internal voice SSID have preference over a guest network voice traffic. In this case, the internal SSID can be given a high priority and the guest network set to low. Note, that there are only two settings an SSID may have high or low. In the case of multiple SSIDs with high priority, it will again be round robin for higher priority traffic. Note: This feature is available on the ZoneDirector only. ZoneBiiectoi-baseu SSIB Piioiitization To configure SSID priority on a ZoneDirector via Web UI: 1. Log onto the ZoneDirector Web UI 2. Go to Configure->WLANs 3. Click Edit next to the WLAN to be configured 4. Select the priority in the Priority section (high or low)
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 47
5. Click Apply to save the changes To configure SSID priority on a ZoneDirector (CLI): ruckus(config)# wlan voice ruckus(config-wlan)# priority high
2013 Ruckus Wireless, Inc. Wired Networks for Wi-Fi v1.3 48
Tioubleshooting Integrated Wi-Fi into a wired network can be a simple as deployed on an untagged, L2 network or more complex with multiple tagged VLANs, redundancy, QoS and management VLANs. This section offers some common issues and resolutions. 71*!.//")*!"//-,)*)"*["/-A&%-,)"%* Biscoveiy One of the most basic issues is an AP that is unable to discover and connect to a ZoneDirector. This is typically because none of the supported discovery processes are in place. These include: ZoneDirector is not on the same Layer 2 network as the AP AP is on a different network and no Layer 3 discovery mechanism is setup (DHCP Option 43, DNS, static configuration of the AP with the ZoneDirectors IP address) Resolution To solve these problems, select the discovery process you are using (above) and verify it is working correctly. This can involve checking if the AP has a valid IP address, can reach (ping the ZoneDirector), there is a proper DHCP or DNS entry, etc. vLANs anu Connectivity AP does not have a valid address (no DHCP or misconfigured static IP address) AP or ZoneDirector are on a management VLAN that has no connectivity, DHCP, or is on an untagged port or a trunk port that does not allow that VLAN Resolution In the case of a misconfigured AP, if it is on the same Layer 2 network as the ZoneDirector it may still be able to discover the ZoneDirector (Layer 2 broadcast) but is unable to connect due to an invalid IP address. A management VLAN problem is more easily checked on the wired switch, as this is the most frequent root cause. In the cast of some switches, the port may need to be explicitly set to 802.1Q tagging. Nouel Suppoit An AP model may be installed that is not supported by the ZoneDirector firmware. This issue is typically due to an older version of software on the ZoneDirector.
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 49
Resolution To correct the problem, upgrade the ZoneDirector software. This can be verified in the ZoneDirector event log: Monitor->Access Points. If the AP is an unsupported model this will also generate an event log message. Fiiewalls Another basic issue is a firewall blocking required ports. This is especially true if the basic ports required for control and management are blocked. These ports are listed in section Firewalls. Resolution To solve these problems, make sure the necessary ports are unblocked between the AP and the ZoneDirector. !.#)&;-*1"%).@*X.&@B*)"*T-0&%-,)*)"*J"'&/*1.'-* There are many issues that can affect captive port redirections. These typically include: Firewall has blocked HTTP/S access to the ZoneDirector from the SSIDs subnet. This may be due to ACLs on the AP/WLAN or a 3 rd party firewall Client does not have DNS configured correctly Resolution To check firewall issues, make sure the ACLs (if configured) for the WLAN allow access to the ZoneDirectors login page. Since redirection occurs after the client does a DNS lookup/URL request, make sure the client has a DNS server configured. This can be checked via the client configuration or by attempting to access a URL with an IP address instead of a DNS name.
2013 Ruckus Wireless, Inc. Wired Networks for Wi-Fi v1.3 50
Appenuix A: Recommenueu Reauing :F2*N"0-@* OSI: A Model for Computer Communications Standards, Uyless D. Black M&%)8.@*J7+B* Virtual LANs: A Guide to Construction, Operation and Utilization, Marina Smith Network Warrior, Gary A. Donahue !&B,"*I&%-0*+-)<"%>&/'* Cisco Switched Internetworks: VLANs, ATM & Voice/Data Integration, Chris Lewis Cisco IOS Cookbook, Kevin Dooley, Ian Brown
2013 Ruckus Wireless, Inc. Wired Networks for Wi-Fi v1.3 51
Appenuix B: Common Cisco Commanus !"/3&'8%&/'*./*7,,-BB*1"%)* These are the Command Line Interface (CLI) commands to configure a port on a Cisco switch or router as an access port for VLAN 100 (red). The first command creates VLAN 100. interface vlan 100 description Red VLAN ip address 10.1.100.1 255.255.255.0 ! This command configures the 1/1 port as an access port on VLAN 100. All untagged traffic will go on this VLAN. Any tagged traffic will be ignored. interface GigabitEthernet1/1 description Red VLAN Access Port switchport mode access switchport access vlan 100 ! This command configures the 1/2 port as a trunk port with VLAN 100 as the native VLAN. All untagged traffic will go to VLAN 100. Any tagged traffic will be ignored unless it is tagged for VLAN 200 or 300. This configuration is essentially the same as that for port 1/1 as far as access to the red VLAN (100) is concerned. In both cases, the AP should be configured to send red network traffic as untagged only. interface GigabitEthernet1/2 description Native Red VLAN Trunk switchport trunk encapsulation dot1q switchport mode trunk switchport trunk native vlan 101 switchport trunk allowed vlan 200,300 ! !"/3&'8%&/'*.*?%8/>*1"%)* These are the CLI commands to configure a port on a Cisco switch or router as a trunk port for VLAN 100 (red). The first command creates the VLAN and the second configures port 1/1 as a trunk port that includes VLAN 100. Note that Cisco switches require the
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 52
encapsulation be explicitly set to dot1q. Failure to set this will prevent the switch from correctly interpreting tagged frames from the AP. The native VLAN for this port is VLAN 101. Any untagged traffic for this port will be assigned to VLAN 101. interface vlan 100 description Red VLAN ip address 10.1.100.1 255.255.255.0 !
interface GigabitEthernet1/1 description Red VLAN Trunk switchport trunk encapsulation dot1q switchport mode trunk switchport trunk native vlan 101 switchport trunk allowed vlan 100 ! Multiple VLANs may be configured for a single trunk port however only one native VLAN is allowed. ?%"8P@-B("")&/'* When troubleshooting with a Cisco switch, it may be useful to configure the switch to update the port status more quickly than the default of 30 seconds when the spanning tree protocol (STP) is enabled. The amount of time spanning tree takes to transition ports to a forwarding state can cause problems. This is especially true of an individual device such as an AP. It might consider itself in an up date, but the switch port has not switched back to forwarding yet which prevents it from getting a connection. The Cisco portfast command will speed convergence to help with this problem. NOTE: This command should only be used on ports connected to a single device that is not a switch or other Layer 2 device capable of causing spanning tree loops. Access Poit interface GigabitEthernet1/1 spanning-tree portfast !
2013 Ruckus Wireless, Inc. Wired Network Design v1.3 53
2013 Ruckus Wireless, Inc. Wired Networks for Wi-Fi v1.3 54
Appenuix C: Common BP Commanus !"/3&'8%&/'*.*1"%)* These are the Command Line Interface (CLI) commands to configure a port on an HP ProCurve switch or router. In HP terms, a trunk port is an aggregate of multiple ports, e.g. C1-C4 rather than the Cisco definition of a trunk as a port that understands 802.1Q tags. Therefore, configuring a port to support VLAN tagging simply entails added those ports as tagged to the VLAN configuration: The first command creates VLAN 100 with ports B10-B12 defined as untagged members of that VLAN. All untagged traffic will go on this VLAN. Any tagged traffic will be ignored. vlan 100 name Red VLAN ip address 10.1.100.1 255.255.255.0 untagged B10-B12 exit To support tagged VLANs add an additional line specifying the ports. vlan 100 name Red VLAN ip address 10.1.100.1 255.255.255.0 untagged B3-B9 tagged C10-C12 exit
vlan 200 name Blue VLAN ip address 10.1.200.1 255.255.255.0 untagged C10-C12 tagged B3-B9 exit The above configuration defines ports B3-B9 as untagged for VLAN 100 and tagged for VLAN 200. Therefore the ports will place untagged packets on the red VLAN 100. If it receives tagged traffic, only VLAN 200 will be honored and only for ports B3-B9.
2013 Ruckus Wireless, Inc. Wired Networks for Wi-Fi v1.3 55
Appenuix B: Common Extieme Commanus !"/3&'8%&/'*.*1"%)* These are the Command Line Interface (CLI) commands to configure a port on an ExtremeOS switch or router. In Extreme terms, a trunk port is configured by specifying which port is tagged or untagged as part of the VLAN command. The commands below create a VLAN called RedVLAN. This VLAN is assigned an ID of 100. Ports 7-24 are untagged members of this VLAN. vlan RedVLAN configure vlan RedVLAN tag 100 configure vlan RedVLAN add port 7:24 untagged To support tagged VLANs add an additional line specifying the tagged ports. vlan RedVLAN configure vlan RedVLAN tag 100 configure vlan RedVLAN add port 7:24 untagged configure vlan RedVLAN add port 5-6 tagged The above configuration defines ports 7-24 as untagged for VLAN 100 and tagged for ports 5-6. Therefore ports 7-24 will place all untagged traffic into VLAN 100 and ports 5-6 will only do so if the packet is specifically tagged for VLAN 100.
2013 Ruckus Wireless, Inc. Wired Networks for Wi-Fi v1.3 56
Appenuix E: Configuiing Enteiasys Switches anu Routeis !"/3&'8%&/'*.*1"%)* These are the Command Line Interface (CLI) commands to configure a port on an Enterasys switch or router. The commands below create a VLAN called RedVLAN. This VLAN is assigned an ID of 100. Port ge.1.10-12 are untagged members of this VLAN. set vlan create 100 set vlan name 100 RedVLAN set vlan create 200 set vlan name 200 BlueVLAN set port vlan ge.1.10-12 100 modify-egress To support tagged VLANs add an additional line specifying the tagged ports. set vlan egress 200 ge.1.10 The above command adds VLAN tagging for port ge.1.10 for VLAN 200.