Our approach has been to keep the APs within the Class C of the building. We use Netreg to verify a user before they can actually get on the net. We have, however, moved to a system called Ruckus due to it's ability to work with a controller or to be autonomous. The system has 19 antennas of both a,b,g, and n in the 2.4 and 5 gHz range. Each antenna can be separately vlanned and isolated. Another nice feature is that it will mesh pretty painlessly for our use in campus-wide coverage.

We are planning to move to IPv6 and converting the entire wireless; this will give us a more pinpoint control about where the user is and what they are accessing since we will be able to track where they are on campus because of the meshing.

Harry Rauch Sr. Network Analyst Eckerd College 4200 - 54th Ave S St. Petersburg, FL 33711

On 6/10/11 7:39 AM, Osborne, Bruce W wrote:

John,

1.I believe most (all?) wireless systems can bridge at the AP. If you are using 802.1X, you would need to find some way to whitelist the AP traffic, though. I know that Aruba APs can run in bridged mode, but you lose some features because all enforcement occurs within the limited resources of the thin AP. It is generally preferred to tunnel the traffic back to the controller, when possible.

2.Whether you can block clients talking to each other depends on your wireless system. I know Aruba has a built-in firewall and you can block this traffic. I believe Cisco depends on the network infrastructure for firewalls. One challenge for the system is blocking peers talking to the same AP.

3.Roaming between APS and between buildings is very dependent on your wireless system. We here at Liberty University have not yet designed our mobility approach. Our current focus is implementing 802.1X (finally!) and replacing our NAC system.

Regards,

*Bruce Osborne*

/Wireless Network Engineer/

*IT Network Services*

*(434) 592-4229*

*LIBERTY UNIVERSITY*

/40 Years of Training Champions for Christ: 1971-2011/

*From:*John Kaftan [mailto:[email protected]]
*Sent:* Thursday, June 09, 2011 12:35 AM
*Subject:* Re: Wireless design

Can that system bridge at the AP? We are going to have a secure network and an open one. The secure network will be configured with 802.1x and will just dump people on the local VLAN of the building. Once we have the network fully secure we will be fine with this. I like this for performance reasons. The APs just become secure hubs.

We will also make sure that no clients can talk to each other on these networks. We will try to drive all users to the secure network. The secure network will also be NAC enabled.

The open network will tunnel back to the controller and bridge there which is required due to the captive portal.

The only possible snag here is roaming between buildings and between 802.1x APs. I have not tested and tweaked that yet.

John



----- Original Message -----
From: Mike King <[email protected]>
Date: Wednesday, June 8, 2011 9:29 pm
Subject: Re: [WIRELESS-LAN] Wireless design
To: [email protected]

> The real short answer is that it does not matter what the IP address of the AP is, as long as it has good stable communications with the controller.


> What I personally try to do is what you are proposing, put the APs for each building/floor it's own subnet.


> Good luck


> Mike

> On Wed, Jun 8, 2011 at 6:54 PM, Entwistle, Bruce <[email protected] <javascript:main.compose('new','[email protected]')>> wrote:

> We will soon be migrating our wireless network from Cisco autonomous 1231 APs to a combination of Cisco 3502i along with some of the existing 1231 APs converted to lightweight. As we prepare for this we are looking at how to best architect the new network. The new network will cover the entire campus which consists of approx 50 buildings, with each building having its' own VLAN.

> The initial idea was to install the APs so the IP address of the AP would be a part of the local building VLAN. This is the IP the AP would use to talk back to the controller. For user connections there would be two VLANs created which would be accessed through a single SSID. The users would then be dynamically assigned to one of the two VLANs based on their logon credentials. Currently all users are placed on the same VLAN after authentication, as our current installation is not capable of dynamic VLAN assignment. There is currently only a single SSID in place.

> I would be interested to know what other have done and how successful it was.

> Thank you

> Bruce Entwistle

> Network Manager

> University of Redlands



> ********** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.




> ********** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.

********** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.

********** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.


**********
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.

Reply via email to