Confidential Wireless Network Designs WS-5000 / VLAN Capabilities

Embed Size (px)

Citation preview

  • Slide 1

Confidential Wireless Network Designs WS-5000 / VLAN Capabilities. Slide 2 Confidential Port Encapsulation Using Header 8783 00:A0:F8:53:B7:4C = 157.235.103.143 00:A0:F8:A2:42:22 Slide 3 Confidential = Data Path: Wireless Device to a Wired Server Server Farm Router WWW Intranet Wired Devices Yahoo.com 216.109.118.77 = ESS 101 -> Eth 2 802.11 Frame YahooMU DASA Data 802.3 Frame WS5000 Switch Access Port DMAC SMAC Data DA SA 802.3 Frame Yahoo Data DA SA DASA Data MU Data DA SA 00:A0:F8:3A:96:ED 157.235.103.140 00:A0:F8:A2:42:22 00:A0:F8:53:B7:4C Slide 4 Confidential Port Encapsulation Using Header 8783 Slide 5 Confidential VLAN Ethernet port Configuration 1.) Flat network 2.) Trunk and Flat 3.) Flat and Trunk 4.) Trunk and Trunk Eth1 = AP discovery (L2) Eth2 = RON (L3) Slide 6 Confidential Ethernet port Configuration Layer 2 / 8783 Frame only RON port Rest Of Network Layer 2 and 3 A user cannot send a L3 ICMP ping between ports 1 and 2 on the wire. but can do so over the wireless! Slide 7 Confidential Schematic of the WS-5000 Solution A wired network, separated by routers Router ARouter B WAN Ether-Switch A Ether-Switch B Network B - 10.92.25.X Network A - 10.93.10.X 10.93.10.10 Slide 8 Confidential Schematic of the WS-5000 Solution WS 5000 can extend a layer 2 tunnel through the A network and continue network Bs VLAN support without loop-back! WAN Ether-Switch A Ether-Switch B 10.93.10.10 10.92.25.10 10.92.25.11 10.92.25.15 10.92.25.16 Router BRouter A Network A - 10.93.10.X Network B - 10.92.25.X Slide 9 Confidential The wired Topology #1 Full redundant each access switch is its own VLAN for wired users. Access Plain Layer 2 Switch Distribution / Core Router WAN Slide 10 Confidential Warm Standby The wired Topology #1 Full redundant each access switch is its own VLAN. VLAN in a box (Eth 1 and 2 trunked) Distribution / Core Router WAN Four separate and unique VLANs over the air ! POTS Just add the number of switches need to support the application! Voice 3270/5250/ANSI Emulation Data Access Plain Layer 2 Switch Slide 11 Confidential The wired Topology #1 Full redundant each access switch is its own VLAN. VLAN in a box (Eth 1 trunked Eth 2 Flat) Distribution / Core Router WAN Warm Standby POTS Just add the number of switches need to support the application! 3270/5250/ ANSI Emulation Data 10.93.10.10 Access Plain Layer 2 Switch Slide 12 Confidential The wired Topology #2 Full redundant each access switch supporting all VLAN trunking. Access /VLAN Trunk supported Router WAN Fiber VLAN Trunks, etc. Distribution / Core Slide 13 Confidential The wired Topology #2 Each access switch supporting all VLAN trunking.(Eth1 Flat & Eth2 Trunked) Access /VLAN Trunk supported Router WAN Four separate and unique VLANs over the air ! POTS Voice 3270/5250/ANSI Emulation Data Ports are seen on one assigned VLANS but are sent out over the VLANs built for wireless Fiber VLAN Trunks, etc. Distribution / Core Slide 14 Confidential The wired Topology #2 Full redundant each access switch supporting all VLAN trunking..(Eth1 Flat & Eth2 Trunked) Access /VLAN Trunk supported Router WAN Four separate and unique VLANs over the air ! POTS Voice 3270/5250/ANSI Emulation Data Ports are seen on one assigned VLANS but are sent out over the VLANs built for wireless Fiber VLAN Trunks, etc. Distribution / Core Slide 15 Confidential Ciscos implementation: Standards Based Management Interfaces Does not roam across VLANs Must rely on software to keep roam alive Session failure. Must re-authenticate when roaming to new VLAN. Creates STP (Spanning Tree) issues. Defeats Ciscos VLAN in a box wired design. Must have supporting ethernet equipment to take advantage of AP feature sets. Slide 16 Confidential Wireless Demonstration Overview Slide 17 Confidential Wireless Demonstration Coverage Areas