Wireless3Notes
Wireless3Notes
====================================================================
2. Static Routing
====================================================================
----------
CAT1
----------
----------
CAT2
----------
====================================================================
3. NTP
====================================================================
-----------
CAT1
-----------
-----------
CAT2
-----------
====================================================================
4. NTP
====================================================================
-----------
CAT1
-----------
====================================================================
5. WLC Initialization
====================================================================
-----------
WLC1
-----------
Enable HA [yes][NO]: no
Enter Country Code list (enter 'help' for a list of countries) [US]:
Configuration correct? If yes, system will save it and reset. [yes][NO]: yes
***************************************************************************
-----------
WLC2
-----------
***************************************************************************
System Name [Cisco_ac:2d:a5] (31 characters max): WLC2
Enter Administrative User Name (24 characters max): admin
Enter Administrative Password (3 to 24 characters): ********
Re-enter Administrative Password : ********
Enter Country Code list (enter 'help' for a list of countries) [US]:
Configuration correct? If yes, system will save it and reset. [yes][NO]: yes
====================================================================
6. ISE & WLC Integration
====================================================================
------
WLC1
------
IP: 10.0.1.5
Key: cisco123
authentication port: 1812
Timeout: 5
IP: 10.0.1.5
Key: cisco123
authentication port: 1812
Timeout: 5
====================================================================
7. Configuring the WLC for ISE-Based Authentication
====================================================================
------------------------------
1. Create the VLAN Interfaces
------------------------------
Name: execs
VLAN: 20
IP Address: 10.0.20.99
Subnet Mask: 255.255.255.0
Default Gateway: 10.0.20.11
DHCP Server: 10.0.13.11
Name: employees
VLAN: 30
IP Address: 10.0.30.99
Subnet Mask: 255.255.255.0
Default Gateway: 10.0.30.22
DHCP Server: 10.0.13.11
Name: guests
VLAN: 40
IP Address: 10.0.40.99
Subnet Mask: 255.255.255.0
Default Gateway: 10.0.40.22
DHCP Server: 10.0.13.11
------------------------------
2. Create the SSID
------------------------------
General
Security:
Layer2: WPA+WPA2
AAA Server:
Check RADIUS Server Overwrite Interface
Select the ISE as Authentication and Accounting
Advanced:
====================================================================
8. Configuring the ISE for WLC based Authentication
====================================================================
------------------------------
1. Create the Groups and Users
------------------------------
Administration -> Identity Management -> Groups -> User Identity Groups -> Add
Name: EXECS
Name: EMPLOYEES
Name: Exec1
Password: Ciso123*
Group: EXECS
Name: Employee1
Password: Ciso123*
Group: EMPLOYEES
--------------------------------------
2. Configure an Authorization Profile
--------------------------------------
Policy -> Policy Elements -> Results -> Authorization -> Authorization Profiles ->
Add
Name: EXECS-PROFILE
VLAN: 20
Name: EMPLOYEES-PROFILE
VLAN: 30
--------------------------------------
3. Configure an Authorization Policy
--------------------------------------
-----------------------------------
Name: EXECS-POLICY
Identity Group: EXECS
Conditions:
Wireless_802.1x
Device:Device-Type = HQ-WLCs
Radius:Called-Station endswith ABC
Permission:
Name: EXECS-PROFILE
-----------------------------------
-----------------------------------
Name: EMPLOYEE-POLICY
Identity Group: EMPLOYEES
Conditions:
Wireless_802.1x
Device:Device-Type = HQ-WLCs
Radius:Called-Station endswith ABC
Permission:
Name: EMPLOYEE-PROFILE
-----------------------------------
====================================================================
9. Downloadable ACLs
====================================================================
--------------------------------
1. Create the ACL on the WLC
--------------------------------
Name: EMP-ACL
Put the entries in
--------------------------------
2. Configure the ISE Profile
--------------------------------
Policy -> Policy Elements -> Results -> Authorization -> Authorization Profile ->
EMPLOYEE-PROFILE -> Edit
Verification/Logs:
===========================================================
9. Integrating AD with ISE
===========================================================
-----------------------------------------------------------------------------------
-------------
1. Importing the Root Certificate for the Company - Required if you are doing
Certificate based authentcation
-----------------------------------------------------------------------------------
-------------
Administration -> System -> Certificates -> Trusted Certificates -> Import
Save
------------------------------------------------------
2. Add Active Directory to ISE
------------------------------------------------------
Administration -> Identity Management -> External Identity Sources -> Active
Directory -> Add
Name: AD-ABC
Domain: networkdojo.local
Admin User: admin
Password: NDojo123
Administration -> Identity Management -> External Identity Sources -> Active
Directory -> AD-ABC -> Groups -> Import
ADgroup1
ADgroup2
DomainUsers
DomainAdmins
DomainGuest
----------------------------------------------------------------------------
3. Enable Certificates from AD - if using Certificate based Authentication
----------------------------------------------------------------------------
Administration -> Identity Management -> External Identity Sources -> Certificate
Authentication Profile -> Pre-Load ceritificate Profile -> Add AD-ABC to the
Identity Store
Save
----------------------------------------------------------------------------
4. Enable/Use AD based authentication
----------------------------------------------------------------------------
Save
====================================================================
10. Incorporating the AD Groups into your Policy
====================================================================
-----------------------------------
Name: AD-EXECS-POLICY
Conditions:
Wireless_802.1x
Device:Device-Type = HQ-WLCs
Radius:Called-Station endswith ABC
AD-ABC:ExternalGroups equal Networkdojo.local/Adgroup1
Permission:
Name: EXECS-PROFILE
-----------------------------------
-----------------------------------
Name: AD-EMP-POLICY
Conditions:
Wireless_802.1x
Device:Device-Type = HQ-WLCs
Radius:Called-Station endswith ABC
AD-ABC:ExternalGroups equal Networkdojo.local/Adgroup1
Permission:
Name: EMPLOYEE-PROFILE
-----------------------------------
=============================================
11. Ceritificate Based Authentication1
=============================================
-----------------------------------------------------------------------------------
--------------
1. Change the Condition such that Certificate based authentication becomes a
requirementfor Adgroup1.
-----------------------------------------------------------------------------------
--------------
-----------------------------------
Name: AD-EXECS-POLICY
Conditions:
Wireless_802.1x
Device:Device-Type = HQ-WLCs
Radius:Called-Station endswith ABC
AD-ABC:ExternalGroups equal Networkdojo.local/Adgroup1
Network Access:EAPAuthentication equals EAP-TLS
Permission:
Name: EXECS-PROFILE
-----------------------------------
===========================================================
12. Basic Guest Access - WEP
===========================================================
----------
CAT1
----------
----------
CAT2
----------
int loo0
ip address 199.1.1.1 255.255.255.0
!
access-list 101 permit ip any 199.1.1.0 0.0.0.255
access-list 101 permit udp any any eq bootps
access-list 101 permit udp any any eq bootpc
access-list 101 permit udp any any eq domain
!
Interface vlan 40
ip access-group 101 in
------------
WLC
------------
----------------------------
A. Create the VLAN Interface
----------------------------
Name: guests
VLAN: 40
IP Address: 10.0.40.99/24
Default Gateway: 10.0.40.22
DHCP: 10.0.13.11
----------------------------
B. Create the SSID
----------------------------
===========================================================
13. Basic Guest Access - Local Web Authentication
===========================================================
------
WLC1
------
----------------------------
1. Create the SSID
----------------------------
WLAN -> Create New
--------------------------
2. Create a Local NetUser
--------------------------
Username: khawar
Password: Cisco123
Guest user: Checked
WLAN: GUESTS-LWEB
===========================================================
14. Anchor Configuration
===========================================================
--------------------------------------------------
1. Configure a relationship between the WLCs
--------------------------------------------------
Copy and Paste the config from the partner WLCs adding the Group Name at the end
-----------------------------------------------------------------------------------
----
2. Configure the Interface and WLAN for Guest on the Anchor identical to the Main
WLC
-----------------------------------------------------------------------------------
----
----------------------------
A. Create the VLAN Interface
----------------------------
Name: guests
VLAN: 40
IP Address: 10.0.40.98/24
Default Gateway: 10.0.40.22
DHCP: 10.0.13.11
----------------------------
B. Create the SSID
----------------------------
-----------------------------------------------------------------------------------
----
3. Configure the Relationship of Anchor and Foreign WLC between WLC1 & WLC2
-----------------------------------------------------------------------------------
----
--------
WLC2
--------
WLANS -> Hover over the Blue Over next to the WLAN and select "Mobility Anchor"
WLANS -> Hover over the Blue Over next to the WLAN and select "Foreign Map"
Specify the MAC Address of the peer and the associated exit interface.
--------
WLC1
--------
WLANS -> Hover over the Blue Over next to the WLAN and select "Mobility Anchor"