Extreme Automated Campus
Extreme Automated Campus
Version 1.0
9035775
October 2018
Preface
Contents
Preface ........................................................................................................................................5
Extreme Validated Designs ............................................................................................................ 5
Purpose of This Document ............................................................................................................. 5
Target Audience ........................................................................................................................... 6
Authors ........................................................................................................................................... 6
Document History ........................................................................................................................ 6
About Extreme Networks ................................................................................................................ 6
Introduction ................................................................................................................................7
Technology Overview ................................................................................................................8
Terminology .................................................................................................................................... 8
Extreme Automated Campus - Introduction ................................................................................... 9
Functional Components of Extreme Automated Campus ........................................................... 10
Extreme Fabric Connect: Core and Aggregation....................................................................... 10
Summit Access ........................................................................................................................... 18
ExtremeWireless ........................................................................................................................ 19
Extreme Management Center .................................................................................................... 19
Validated Designs – Infrastructure & Topology .................................................................... 20
Automated Campus Reference Topology .................................................................................... 20
Hardware and Software Matrix ..................................................................................................... 21
Preconditions ................................................................................................................................ 21
Campus VLAN/I-SID and Subnet Scheme .................................................................................. 22
I-SID scheme .............................................................................................................................. 22
Campus 1 (VLAN 1xx):............................................................................................................... 22
Campus 2 (VLAN 2xx):............................................................................................................... 23
Server Room (VLAN 9xx): .......................................................................................................... 23
Common Services: ..................................................................................................................... 24
Fabric Connect - Core Configuration ............................................................................................ 24
Overview ..................................................................................................................................... 24
BCB-930 Configuration .............................................................................................................. 25
BEB-910 Configuration............................................................................................................... 26
BEB-920 Configuration............................................................................................................... 27
2
Extreme Automated Campus
9035775
Preface
3
Extreme Automated Campus
9035775
Preface
4
Extreme Automated Campus
9035775
Preface
Preface
This document provides design and guidance for implementing an Extreme Networks Automated Campus
using Extreme Networks hardware and software. An Extreme Automated Campus consists of
ExtremeSwitching products, ExtremeWireless, Extreme Management, ExtremeControl, and
ExtremeAnalytics.
5
Extreme Automated Campus
9035775
Preface
Target Audience
This document is written for Extreme systems engineers, partners, and customers who design,
implement, and support campus networks. This document is intended for experienced network architects
and engineers. This document assumes that the reader has a good understanding of switching and
routing features.
Authors
The authors have extensive experience testing Extreme Automated Campus products and solutions. At
Extreme, they focus on developing and validating solution architectures that customers can use in
deployments.
• James Georgopoulos, Staff QA Software Engineer
• Stephen Colarusso, Senior QA Software Engineer
Document History
Future revisions of this document will include upcoming Automated Campus products and technologies.
Date Part Number Description
October 2018 9035775 1.0 - Initial release
6
Extreme Automated Campus
9035775
Introduction
Introduction
The Extreme Automated Campus design detailed in this document is targeted for both single and multi-
site campuses. The configurations and design practices documented here are fully validated and conform
to Extreme Best Practices and recommendations. The intention of this Extreme Validated Design
document is to provide reference configurations and instruction for building a managed, secure campus
network using Extreme Fabric Connect, Extreme Fabric Attach access switches, ExtremeWireless
architectures and Extreme Management.
Other reference materials should be reviewed for a deeper understanding of the concepts described in
this document.
Note
Refer to the Automated Campus At-A-Glance and Solutions Brief for overall solution information.
7
Extreme Automated Campus
9035775
Technology Overview
Technology Overview
Terminology
Term Description
802.1X IEEE Standard for port-based Network Access Control
AD Active Directory
AP Access Point
ARP Address Resolution Protocol
BCB Backbone Core Bridge
BEB Backbone Edge Bridge
B-VLAN/B-VID Backbone VLAN
CLI Command-Line Interface
CoS Class of Service for Layer 2
CVLAN Customer VLAN
DHCP Dynamic Host Configuration Protocol
DDD Domain Data Distribution
ECMP Equal Cost Multi-Path
EXOS Extreme eXtensible Operating System (also ExtremeXOS)
FDB Forwarding Database
GRT Global Routing Table
IGMP Internet Group Management Protocol
IP Internet Protocol
I-SID Individual Service Identifier
ISL Inter-Switch Link
L2VSN Layer 2 Virtual Service Network
L3VSN Layer 3 Virtual Service Network
LACP Link Aggregation Control Protocol
LAG Link Aggregation
LDAP Lightweight Directory Access Protocol
LLDP Link Layer Discovery Protocol
MAC Media Access Control
NAC Network Access Control
NNI Network to Network Interface
PoE Power over Ethernet
QoS Quality of Service
sFlow Sampled Flow
SNMP Simple Network Management Protocol
SNTP Simple Network Time Protocol
SPBM Shortest Path Bridging (MAC)
TCP Transmission Control Protocol
UDP User Datagram Protocol
UNI User to Network Interface
VLAN Virtual Local Area Network
VM Virtual Machine
VOSS Virtual Services Platform
VPN Virtual Private Network
VR Virtual Router
VRF Virtual Routing and Forwarding
8
Extreme Automated Campus
9035775
Technology Overview
9
Extreme Automated Campus
9035775
Technology Overview
Fabric Connect supports Layer 2 and Layer 3 virtualization. These virtualized Layer 2 (L2) and Layer 3
(L3) instances are referred to as Virtual Services Networks (VSNs). A Service Identifier (I-SID) is used to
uniquely identify each of these service instances in a Fabric Connect domain and a User Network
Interface (UNI) is the boundary or demarcation point between the “service layer” of traditional networks
i.e. VLANs, VRFs and the Fabric Connect “service layer” i.e. L2 & L3 VSNs.
• Layer 2 VSNs form a virtual broadcast domain between UNI members that share the same L2
VSN ISID. MAC learning/aging is applied to all L2 VSNs individually.
• Layer 3 VSNs form a virtual routed L3 network (L3 VPN) leveraging IS-IS as the routing
protocol between VRFs that share the same L3 VSN ISID.
10
Extreme Automated Campus
9035775
Technology Overview
Once the SPB infrastructure is created, the SPB network connectivity services (VLAN or VRF extensions)
are configured on the BEB’s at the edge of the network only. There is no provisioning required on the
core SPB switches for network connectivity services. This provides an architecture where the configuration
on the core switches never needs to be modified when adding any new services.
The boundary between the core SPB domain, which consist of Network-to-Network (NNI) interfaces and
the access interfaces, is handled by a so-called User Network Interface (UNI). UNI interfaces tie VLANs or
VRFs to Service Instance Identifier (I-SID). An I-SID is provisioned on the BEB UNI interface.
• VLAN UNI (CVLAN) a Platform VLAN-ID maps to a L2 VSN I-SID – all ports that are members
of the VLAN are associated with the UNI.
• CVLAN UNI interface can have an IPv4 or IPv6 address assigned to it to enable a
routing function.
• Switched UNI: maps a VLAN-ID on a given port (VID, port) into a L2 VSN ISID. With this
UNI type VLAN-IDs can be re-used on other ports and map to different ISIDs.
• Transparent Port UNI- a port maps to a L2 VSN I-SID (all traffic through that port, 802.1Q
tagged or untagged, ingress and egress is part of the I-SID).
11
Extreme Automated Campus
9035775
Technology Overview
Warning
All VLANs on a transparent port UNI interface share the same SINGLE MAC learning table of the
Transparent UNI ISID.
• E-Tree UNIs allow extending Private VLANs beyond one switch to form a network wide E-Tree
service infrastructure. An E-Tree UNI is a L2 VSN where traffic flows from hub to spokes and
from spokes to hubs, but not from spoke to spoke. E-Tree hub ports can be formed with a
CVLAN or Switched VLAN UNI. E-Tree spokes need to be configured as private VLAN UNIs.
• L3 VSN UNI - a VRF maps to an I-SID. A L3 I-SID identifies, in the control plane, all L3 routes
belonging to the same I-SID. All VRFs in a network sharing the same L3 I-SID form a L3 VSN.
L3 VSNs support IP Unicast as well as IP Multicast simultaneously if configured to do so. A
special case is VRF=0 which corresponds to the Global Routing Table (GRT), SPB based
routing for GRT is called IP Shortcut routing.
Figure 1 L3 VSN
I-SID configuration is required only for virtual services such as L2 VSN and L3 VSN. With IP Shortcuts, no
I-SID is required as forwarding is performed by utilizing the Global Routing Table (GRT).
There are multiple ways to provide default gateway redundancy to users and hosts.
- VRRP
- RSMLT
- Distributed Virtual Routing
12
Extreme Automated Campus
9035775
Technology Overview
Note
In this EVD we have chosen to use RSMLT and DVR. They provide optimized traffic flows and robust
deployment models, over a traditional chatty VRRP approach. But nothing is precluding the use of VRRP
instead of RSMLT or DVR, especially in smaller deployments.
In this document, two of the three core switches, are also configured as DVR Controllers which distribute
a routing instance to the switches in the server areas. Virtual machines, which can roam freely across any
server, use their first hop Top of the Rack (ToR) switches (DVR Leaf nodes) to be their default gateways.
In the wireless deployments, users can roam between “buildings” and each building provides default
gateway routing capabilities for the users, thus distributing the load and optimizing traffic patterns. DVR
avoids traffic “tromboning” and optimizes traffic paths and thus effectively reduces latency in real-time
applications such as voice and video.
Each server area is comprised of two VSP-7xxx ToR switches, which are directly connected to the
services required by all the clients connected to either campus. These services include production
servers, storage, video servers as well as DHCP/DNS servers. These units are also configured as DVR
Leaf nodes, which provide the flexible, low latency IP access roaming users require. In addition, this
segment of the testbed contains the management application for the entire testbed, which is performed by
XMC.
DVR controllers and DVR Leaf nodes can be extended based on port connectivity and bandwidth needs.
13
Extreme Automated Campus
9035775
Technology Overview
In addition, DVR optimizes traffic flows to avoid traffic "tromboning" due to inefficient routing, thereby
increasing the total routing throughput. DVR also simplifies large scale server room deployments by
introducing a Controller-Leaf architecture. In this architecture, Layer 3 IPv4 default gateway and VRF
configuration is required only on the Controller nodes, whereas the Leaf nodes require only Layer 2
configuration. All Layer 3 configuration, including IP multicast configuration, is automatically distributed to
the Leaf nodes by the Controller nodes.
DVR Domains
A DVR domain is a logical group of switches or nodes that are DVR enabled. These nodes are not
physically connected but are connected over the SPB Fabric such that each node is aware of the BMAC
addresses of all other nodes within the domain. A logical DVR domain cannot contain nodes that are not
DVR enabled. However, those nodes can co-exist with other DVR enabled nodes within the same SPB
Fabric network.
A common DVR domain ID is configured for all nodes belonging to a DVR domain. This domain ID
translates internally to a Domain Data Distribution (DDD) I-SID. All switch nodes that share the same DVR
domain ID or DDD ISID receive the Layer 3 information that is distributed from all other nodes belonging
to that DVR domain.
A DVR domain can contain multiple Layer 3 VSNs and Layer 2 VSNs. Layer 2 and Layer 3 VSNs can
span multiple DVR domains. DVR domains are typically introduced when multiple buildings come into
play. Typically, a DVR domain spans one building which includes an access and distribution layer, this
could be campus or data center. A remote building would be its own DVR domain. This ensures that the
DVR controllers are local to the building and thus only local DVR Leaf nodes are served by the controllers.
Up to 8 controllers can be used per domain. Up to 16 domains can be built with DVR. A DVR backbone is
automatically established between the DVR controllers and is responsible for traffic and host information
forwarding between domains.
14
Extreme Automated Campus
9035775
Technology Overview
Although not always, a DVR domain typically has the following components:
1. DVR Controllers
DVR Controller
In a DVR domain, the Controller nodes are the central nodes on which Layer 3 is configured. They own all
the Layer 3 configuration and push the configuration information to the Leaf nodes within the SPB
network. A DVR domain can have one or more controllers for redundancy and you must configure every
Layer 2 VSN (VLAN) and Layer 3 VSN within the domain, on the Controller(s). A node configured as a
DVR Controller is considered the controller for all the Layer 2 and Layer 3 VSNs configured in its DVR
domain. A Controller is configured with its own subnet IP address, for every DVR enabled Layer 2 VSN
within the domain.
All Layer 2 VSNs on a DVR Controller need not be DVR enabled. A controller can be configured with
individual Layer 2 VSNs that are DVR disabled and use VRRP for example. The Layer 3 configuration
data that is pushed to the Leaf nodes include the Layer 3 IP subnet information for all Layer 2 VSNs within
the DVR domain. Controllers also send information on whether Multicast is enabled on a specific DVR
enabled Layer 2 VSN, and the version of IGMP. A Controller can only belong to one DVR domain, based
on the domain ID configured on the node.
DVR Leaf
DVR Leaf nodes are typically data center top of the rack (ToR) Fabric switches that aggregate physical
and virtual servers or storage devices. DVR Leaf nodes operate in a reduced configuration mode, where
Layer 3 is not configured locally, but pushed to them from the DVR Controller(s) within the domain. You
need to configure only the IS-IS infrastructure and the Layer 2 VSNs on the Leaf nodes.
15
Extreme Automated Campus
9035775
Technology Overview
Once on a controller a DVR virtual default gateway IP address is configured for a L2 VSN, DVR Leaf
nodes monitor local host attachments and communicate updates about the current state of those host
attachments to the DVR domain. All DVR nodes exchange host attachment information using the DVR
host distribution protocol, which leverages a DVR domain ISID. DVR leaf nodes are managed in-band
through a local loopback address, and management traffic is IP Shortcut routed.
A Leaf node will also distribute host route information within the DVR domain that it owns (i.e. ARPs). A
Leaf node learns ARPs on its own UNI ports. It will own this locally learned ARP and will distribute those
as host routes to all other DVR enabled nodes (all Controller nodes and Leaf nodes) within the DVR
Domain. In this way, all the DVR enabled nodes will have all the L3 host reachability information of the
entire DVR Domain. Hosts connected to Leaf nodes (ToRs) will know how to reach all other hosts in the
DVR Domain directly via this distributed L3 data path. The Fabric is used to enable short cut routing.
Leaf nodes will have limited manual configuration. SPB infrastructure will be manually configured. ISIDs
will be manually configured for L2VSNs. There will be no platform VLANs configured on a Leaf that is
DVR enabled. L3 configuration data will be learned from the Controller for IPv4 Unicast and IPv4
Multicast. For every L2VSN configured on the Leaf, it must also be configured on the Controllers in that
DVR Domain.
DVR Backbone
The DVR backbone is automatically established between all DVR controllers in a fabric. The DVR
controllers exchange all host route information among themselves to ensure short-cut switching to the
domains and hosts wherever they might connect. DVR controllers either forward directly to their local Leaf
nodes, if the hosts are local to their domain, or forward traffic to the remote domain controllers, if the hosts
are remote. The leaf nodes in contrary only know about their local hosts in their domain and forward to
their controllers if traffic is not local to their domain.
The Automated Campus EVD has three DVR domains: one encompassing both server rooms and one in
each campus. As mentioned previously, it is best for creating DVR domains so that controllers for a
domain are local to their corresponding Leaf nodes if possible, such that in case of an isolation of a
building, controllers are local to the building.
16
Extreme Automated Campus
9035775
Technology Overview
The IoT, Administrator and Campus User wireless VLANs are members of the DVR domains in the
campuses. All subnets in the server rooms are members of the DVR Domain spanning across both
server room locations.
17
Extreme Automated Campus
9035775
Technology Overview
Fabric Extend
Fabric Extend provides the ability to extend the Fabric Connect Ethernet Fabric over an IP routed
network. This IP routed network can be any type of IP routed connectivity for example a campus router or
an MPLS IP VPN connectivity. What must be ensured is that this routed network supports larger IP
packets with minimum frame size of 1594 bytes. A good guidance is to ensure that minimum packet size
support is 1600 bytes. If a third-party device is used for connecting Fabric Connect over the internet, it
should support encryption as well as fragmentation and reassembly. It is necessary to ensure IP packets
are not only fragmented but also re-assembled after the secure tunnel to ensure that Fabric Connect
Ethernet packets are reconstructed after the secure tunnels.
Summit Access
The Access layer for the Automated Campus topology is comprised of Summit access switches in four
separate stack formations, two stacks for each of the two campus segments. A variety of stack-heights
were incorporated into the topology, including 7-switch, 3-switch, and 2-switch stacks, connected to form
a ring within each stack. Combining the switches in stack formation allowed for easier administration of
the switches.
Among other features, the Summit access switch can to efficiently handle Policy and Fabric Attach, both
of which are required in the overall functionality of this topology. With defined Policy roles, rules can be
created based upon up to 15 traffic classification types for traffic drop or forwarding. A CoS (Class of
Service) can be associated with each role for purposes of setting priority, forwarding queue, rate limiting,
and rate shaping. The Extreme Management Center is ideal for creating and maintaining Policy rules
within the access switches and is used in this topology. Fabric Attach facilitates automated network device
discovery and the automatic configuration and teardown of Network Services Identifier (NSI)/Individual
Service Identifier (ISID) to VLAN associations at the edge of the network, which eliminates time-
consuming hop-by-hop provisioning.
At least one switch in each stack is capable of PoE (Power over Ethernet). PoE supplies 48 VDC power
to certain types of powered devices through Category 5, Category 5E and Category 6 twisted pair
Ethernet cables. Devices such as wireless access points, IP telephones, laptop computers, and web
cameras do not require separate power cabling and supply with these PoE-capable switches.
18
Extreme Automated Campus
9035775
Technology Overview
ExtremeWireless
ExtremeWireless is simple, fast, and smart, delivering a user experience in unmatched scale and density
at an exceptional level. Intuitive Dashboards allow effortless management of the network. With a single
click, deliver services and new applications with ease. Enable fast roaming with seamless mobility while
delivering more throughput with fewer APs. Able to be agile through an advanced architecture that
assures security with enforcement. Through analytics, user experience can be measured in true detail.
Access Points can initialize and configure themselves from a centralized appliance. Deployed
APs automatically discover the appliance through DHCP and retrieve its configuration. Policy
and QoS are performed at the AP for clients connecting to a SSID. RF Characteristics can
be automatically configured by the AP through automatic power or channel selection. Band-Steering and
Airtime Fairness are also controlled by the AP.
The ExtremeWireless designs provide the same availability that everyone has come to expect with wired
networks. Appliances have built-in resiliency through the ability to pair controllers together for full
redundancy.
ExtremeControl
Extreme's Network Access Control engine, or ExtremeControl, lets you manage secure and automated
access for both BYOD and IoT devices from one convenient dashboard. It makes it easy to roll out
granular policies across your wired and wireless networks to meet industry and company compliance
obligations. Identity-based network access control keeps unauthorized users and devices from accessing
your network. ExtremeControl is integrated with Extreme Management Center to allow for
simple and seamless authentication control and modification in one single application.
ExtremeAnalytics
ExtremeAnalytics helps administrators understand what applications are running on the network, who is
using them and what the response time is for each application. It gives granular visibility into network and
application performance, users, locations, and devices. Information from the network and the applications
empowers you to make data-driven decisions.
19
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
The uplinks of the Summit access switches to the VSP BEB’s is accomplished via the configuration of link
aggregation. Fabric Attach technology fully automates the process of client authentication and service
(L2VSN/L3VSN) assignment. Routing redundancy is also enhanced via the use of both DVR (Distributed
Virtual Routing) as well as RSMLT (Routed Split Multilink Trunk).
The connectivity to the core on each campus varies and encompasses different Fabric Connect
capabilities. Campus 1 is linked to the core BCB switches via technology known as Fabric Extend, which
is in effect an L3 tunnel used to facilitate connectivity of two SPB networks over a traditional IP network.
The core area utilizes three VSP-8xxx units, configured as BCB’s and linked directly via point-to-point
40Gb connections, except for the L3 tunnel links to Campus 1 which are configured via 10Gb links. The
core topology can consist of any number of backbone nodes, depending on the actual fiber plant layout
and port count requirements. The three-node core setup has only been chosen to illustrate the topology
flexibility.
20
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
Preconditions
Before beginning the configuration of any device in the Extreme Automated Campus Validated Design,
verify that the following preconditions have been met:
21
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
I-SID scheme
It’s a good practice to have a VLAN/I-SID scheme that is logically laid out in a way that easily identifies the
network/services and allows growth. The 24-bit I-SID header field allows for 16 million services.
Digit 1: Campus System Identifier
- This Automated Campus EVD is designating the first digit to identify this particular autonomous
system or fabric (which includes both Server rooms and Campuses = 1).
- If another large campus is acquired or created, and some delineation wanted to be made between
them, this digit could be increased to “2” to identify it.
Digits 2-3: Service Type/Location
- Services tied to specific sites are denoted “0x” (campuses = 01/02, server rooms = 09).
o Services extending from the campuses to the Server Rooms (i.e. L2VSN, Guest) will use
the location id of the Server Room (09), as that is their common point.
- “Common” VLANs (existing in both campuses) as a result of DVR = 50.
- VRF I-SID = 80
Digits 4-7: VLAN id
- A 4-digit value was allocated for the VLAN.
- The VLAN IDs within a VRF I-SID will reflect the corresponding VLAN ID in the server rooms.
22
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
23
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
Common Services:
Role/Segment VLAN ISID Subnet Def Gateway VRF VRF ISID
The Fabric Connect switches are managed via XMC in-band through the default routing instance (GRT),
using configured loopback addresses, illustrated in the following sections. Network
discovery/management will be performed using these addresses, by means of the “clipId-topology-IP”
command.
Note
Please refer to Design Considerations for other features that are required or will enhance and optimize the Automated
Campus Solution.
24
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
BCB-930 Configuration
1. Globally enable ‘SPBM’, and configure a loopback interface used for in-band management of the
switch:
config terminal Globally enable SPBM.
prompt "CORE-8404-930"
spbm
ip-source-address 10.0.0.30
Enable IP on SPBM to allow IP Shortcut Set the switch’s sys-name and change
spbm 1 ip enable
routing across the GRT. the IS-IS system ID from the default B-
sys-name "CORE-8404-930" MAC value to a recognizable address
system-id 00bb.0000.3000 (format: xxxx.xxxx.xxxx).
manual-area 49.0000
exit Configure the SPBM autonomous system
number for this Fabric
3. Create a loopback interface which will be used for in-band management of the switch, and enable
IP Shortcut functionality:
Create and identify the Backbone VLANs
to be used for SPBM instance 1.
vlan create 4051 name “B-VLAN-1” type spbm-bvlan
vlan create 4052 name “B-VLAN-2” type spbm-bvlan Remove ISL interfaces from the default
vlan member remove 1 1/1-1/3 VLAN.
sys clipId-topology-ip 1
Sets loopback as the topology IP for
sys force-topology-ip-flag
XMC, and activating it via the flag setting,
25
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
BEB-910 Configuration
As noted in the overview, BEB-910 and BEB-920 will be configured identically, with the exception of
switch “identifiers” (sys-name, nick-name, IP addresses, etc.).
config terminal
prompt "CORE-8404-910"
spbm
interface loopback 1
ip address 1 10.0.0.10/255.255.255.255
exit
router isis
spbm 1
spbm 1 nick-name 0.09.10
spbm 1 b-vid 4051-4052 primary 4051
sys-name "CORE-8404-910"
system-id 00bb.0000.0910
manual-area 49.0000
ip-source-address 10.0.0.10
spbm 1 ip enable
exit
sys clipId-topology-ip 1
sys force-topology-ip-flag
26
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
BEB-920 Configuration
As noted in the overview, BEB-910 and BEB-920 will be configured identically, with the exception of
switch “identifiers” (sys-name, nick-name, IP addresses, etc.).
config terminal
prompt "BEB-8404-920"
spbm
interface loopback 1
ip address 1 10.0.0.20/255.255.255.255
exit
router isis
spbm 1
spbm 1 nick-name 0.09.20
sys-name "BEB-8404-920"
system-id 00bb.0000.0920
spbm 1 b-vid 4051-4052 primary 4051
manual-area 49.0000
ip-source-address 10.0.0.20
spbm 1 ip enable
exit
• Verification
When complete, the IS-IS adjacencies between the core devices should be up:
CORE-8404-930:1(config)#show isis adjacencies
================================================================================================
ISIS Adjacencies
================================================================================================
INTERFACE L STATE UPTIME PRI HOLDTIME SYSID HOST-NAME STATUS
------------------------------------------------------------------------------------------------
Port1/1 1 UP 04:40:30 127 23 00bb.0000.0920 BEB-8404-920 ACTIVE
Port1/3 1 UP 04:37:51 127 26 00bb.0000.0910 BEB-8404-910 ACTIVE
27
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Redistribution/routing policies.
Note
- An L2VSN will be used for the Wired IOT Bridged VLAN (907).
- L3VSNs will be used for the IoT and Surveillance VLANs.
- The remaining VLANs will be routed on the Global Routing Table via IP Shortcuts.
28
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
Common Services:
Role/Segment VLAN ISID Subnet Def Gateway VRF VRF ISID
BCB-930 Configuration:
Vlan member remove 1 1/2
interface GigabitEthernet 1/2
encapsulation dot1q
isis
isis spbm 1
isis enable
no shutdown
exit
29
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
BEB-920 Configuration:
Vlan member remove 1 1/4
interface GigabitEthernet 1/4
encapsulation dot1q
isis
isis spbm 1
isis enable
no shutdown
exit
BEB-210 Configuration
Note
An L2 VSN will be used for VLAN 907. The L2 VSN in the Automated Campus is created dynamically based on Fabric
Attach requests from the FA client, therefore no manual configuration is necessary on the BEBs. When an end-user
authenticates and is assigned to this VLAN/ISID, VLAN 907 will dynamically be added to the access and uplink ports.
As FA is not used in the server room, L2VSN configuration is required on those switches.
30
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
31
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
4. Create the VLANs and interfaces for networks that will use the Global Routing Table:
• The Device Mgmt (200), Administrator (202,1050) and Campus User (203,1051) VLANs are
created and I-SIDs assigned.
vlan create 200 type port-mstprstp 0
vlan i-sid 200 1020200
interface Vlan 200
ip address 172.20.10.1 255.255.255.0
exit
================================================================================================
Vlan I-SID
================================================================================================
VLAN_ID I-SID
------------------------------------------------------------------------------------------------
1
200 1020200
201 1020201
202 1020202
203 1020203
204 1020204
1050 1501050
1051 1501051
1052 1501052
4051
4052
32
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
RSMLT Configuration
• Configure RSMLT on BEB-210 to peer to BEB-211 in Campus2, forming a redundant router
gateway for the specified VLANs from the access switches.
router isis
Configure shared MLT virtual MAC (same
spbm 1 smlt-virtual-bmac 00:00:82:00:21:10
on both peers) and the MLT peer system
spbm 1 smlt-peer-system-id 00bb.0000.0211
id address of BEB-211.
exit
mlt 2 enable
mlt 2 member 1/2
mlt 2 encapsulation dot1q
Under each MLT interface, configure Split
interface mlt 1 multi-link trunking (smlt) to allow the LAG
smlt to be distributed across both BEBs to the
exit access switch.
interface mlt 2
smlt
exit
• Once the peer switch is also configured on the corresponding VLANs, they will communicate over
the vIST to discover the peer’s information:
BEB-8284-210:1(config)#show ip rsmlt local
================================================================================================
Ip Rsmlt Local Info - GlobalRouter
================================================================================================
VID SMLT ID
------------------------------------------------------------------------------------------------
----
200 1, 2
202 1, 2
203 1, 2
VID SMLT ID
------------------------------------------------------------------------------------------------
203 1, 2
================================================================================================
Ip Rsmlt Peer Info - GlobalRouter
===============================================================================================
200 60 infinity 1, 2
202 60 infinity 1, 2
203 60 infinity 1, 2
• Configure the DVR instance and enable DVR on the desired IP interfaces.
dvr controller 20
• Verification:
BEB-8284-210:1#show dvr interfaces
================================================================================================
DVR Interfaces
================================================================================================
Admin SPBMC IGMP
Interface Mask L3ISID VRFID L2ISID VLAN GW IPv4 State State
Version
------------------------------------------------------------------------------------------------
172.105.0.4 255.255.255.0 0 0 1501050 1050 172.105.0.1 enable disable
2
172.105.1.4 255.255.255.0 0 0 1501051 1051 172.105.1.1 enable disable
2
172.105.2.4 255.255.255.0 1800911 1 1501052 1052 172.105.2.1 enable disable
2
35
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
Note
Given the security and traffic isolation inherent in Fabric Connect, routing policy and redistribution are vital concepts in
allowing inter-domain communication and may require further research and assistance than the overview in this
document.
The GRT and VRF instances that are created become separate routing domains and therefore have
separate, isolated routing tables. DVR domains (which are created within one or both) also act as a
separate routing domain (i.e. a domain within a domain).
36
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
For example, the DVR domains created in the campuses and server rooms are separate domains, and by
default, do not share routing information. For the domains to exchange routing information, route-policies
must be configured to share them across the DVR backbone.
GRT Routing Policy:
1. The Global Routing Table on BEB-210 has the following requirements:
• Reachability to networks in VRFs requiring centralized services located in the GRT (DHCP,
production servers, etc.).
• The Wireless Administrator (1050) and Campus User (1051) VLANS, which have DVR
enabled, needs to be advertised to the DVR backbone, allowing route information to be
shared with other corresponding networks in the DVR backbone (in Campus 1, for
example).
2. Configure IS-IS Accept policies, to import routes from the specified VRFs:
router isis
accept i-sid 1800904 enable
accept i-sid 1800911 enable
exit Imports global I-SIDs for Surveillance and
IoT VRF. No route-map needed, as all
routes in these VRFs are being accepted.
37
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Reachability between all IoT VLANs in the campuses and server rooms. This is
accomplished when the IoT VLANs in these locations are added to the IoT VRF (L3VSN).
• Access to the Production Server network and the Network Management subnet (both in the
Server Room on the GRT).
• The Wireless IoT VLAN (1052) which has DVR enabled, needs to be advertised to VRF
IoT’s DVR backbone, allowing route information to be shared with other IoT networks in the
DVR backbone (in Campus 1, for example).
2. Within VRF iot, create prefix-lists identifying the routes above:
router vrf iot
ip prefix-list "GRT_mgmt" 172.9.99.0/24 id 1 ge 24 le 24
ip prefix-list "GRT_910" 172.90.1.0/24 id 2 ge 24 le 24
route-map "accept_GRT_mgmt" 2
no permit
enable
exit
4. Configure IS-IS Accept policies, importing specific GRT routes matching the route-map:
router vrf iot
isis accept i-sid 0 enable
isis accept i-sid 0 route-map "accept_GRT_mgmt"
exit
Imports the GRT_mgmt prefix-list from
GRT (I-SID 0).
38
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
2. Configure prefix-lists, route-maps and accept policies for the “surveillance” VRF:
router vrf surveillance
ip prefix-list "GRT_mgmt" 172.9.99.0/24 id 1 ge 24 le 24
ip prefix-list "GRT_stor" 172.90.3.0/24 id 2 ge 24 le 24 Define the routes to import from the GRT.
route-map "accept_GRT_mgmt" 1
permit
enable
Permit routes matching those prefix-lists.
match network "GRT_mgmt,GRT_stor"
route-map "accept_GRT_mgmt" 2
no permit
enable
exit
Accept the routes from the GRT defined
isis accept i-sid 0 enable in the route-map.
isis accept i-sid 0 route-map "accept_GRT_mgmt"
exit
isis apply accept Apply the accept policies to the GRT and
isis apply accept vrf iot both VRFs.
isis apply accept vrf surveillance
Fabric Attach
Fabric Attach uses the IEEE802.1ab LLDP (Link Layer Discovery Protocol) extensions to automatically
attach network devices to individual services in a Fabric Connect network. These network devices
typically do not support SPB, MAC-in-MAC (802.1ah) or Network Services Identifier (NSI)/Individual
Service Identifier (I-SID) usage, and therefore cannot easily take advantage of the Fabric infrastructure
without manual configuration of VLAN attachments to NSIs or ISIDs in multiple locations. Fabric Attach
deals with this issue by facilitating automated network device discovery and the automatic configuration
and teardown of NSI/ISID to VLAN associations at the edge of the network.
Upon connection and detection of an FA Client, the FA Server (BEB) will advertise (via LLDP) the
management I-SID/VLAN to the FA-Proxy switch.
The FA Proxy on the access switch communicates directly with the FA server on the BEB to request
VLAN to I-SID mappings for user traffic.
Enter the following on BEB-210:
interface mlt 1
fa Under each MLT interface (connecting to
fa enable the access switches), enable Fabric
no fa message-authentication Attach.
fa management i-sid 1020200 c-vid 200
exit Set the Management I-SID and VLAN
that will be advertised to the FA client.
interface mlt 2
fa Feature disabled until released on EXOS.
fa enable
no fa message-authentication
fa management i-sid 1020200 c-vid 200
exit
39
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
interface loopback 1
ip address 1 10.0.0.211/255.255.255.255
ipv6 interface address 8200:0:0:0:0:0:0:211/128
exit
router isis
spbm 1
spbm 1 nick-name 0.02.11
spbm 1 b-vid 4051-4052 primary 4051
sys-name “BEB-8284-211”
system-id 00bb.0000.0211
ip-source-address 10.0.0.211
ipv6-source-address 8200:0:0:0:0:0:0:211
spbm 1 ip enable
spbm 1 ipv6 enable
manual-area 49.0000
exit
40
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
4. Create the VLANs and interfaces for networks that will use the Global Routing Table:
• The Device Mgmt (200), Administrator (202,1050) and Campus User (203,1051) VLANs are
created and I-SIDs assigned.
vlan create 200 type port-mstprstp 0
vlan i-sid 200 1020200
interface Vlan 200
ip address 172.20.10.2 255.255.255.0
exit
41
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
RSMLT Configuration
1. Configure RSMLT to peer the BEB-211 and -210 BEBs. Be sure to specify the -210 values where
called for.
vlan create 2 type port-mstprstp 0
vlan i-sid 2 2000
interface Vlan 2
ip address 2.1.1.2 255.255.255.0
exit
router isis
spbm 1 smlt-virtual-bmac 00:00:82:00:21:10
spbm 1 smlt-peer-system-id 00bb.0000.0210
exit
mlt 1 enable
mlt 1 member 1/1
mlt 1 encapsulation dot1q
mlt 2 enable
mlt 2 member 1/2
mlt 2 encapsulation dot1q
interface mlt 1
smlt
exit
interface mlt 2
smlt
exit
ip rsmlt edge-support
43
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
route-map "accept_GRT_mgmt" 1
permit
enable
match network "GRT_mgmt,GRT_910"
route-map "accept_GRT_mgmt" 2
no permit
enable
exit
route-map "accept_GRT_routes" 1
permit
enable
Fabric Attach
interface mlt 1
fa
fa enable
no fa message-authentication
fa management i-sid 1020200 c-vid 200
exit
interface mlt 2
fa
fa enable
no fa message-authentication
fa management i-sid 1020200 c-vid 200
exit
44
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
To illustrate this, the Automated Campus utilizes Fabric Extend, using two L3 tunnels, connecting the core
fabric nodes (BCB-930 and BEB-910) to the Campus-1 BEBs (-110 and -111) over an intermediate IP network.
The intermediate network can consist of any configuration if there is connectivity between the sites. This EVD
uses OSPF.
This deployment uses a separate VRF strictly for the tunneling, so the tunnel source IP address must be
present on the VRF.
name "OSPF_link_to_Cloud"
no shutdown
vrf tunnel Within vrf Tunnel, configure IP interface
brouter port 4/10 vlan 2501 subnet 197.1.2.4/255.255.255.0 connecting to OSPF network, and enable
no spanning-tree mstp OSPF.
yes
ip ospf enable
yes
exit
• Configure the L3 Tunnel to connect to Campus 1, BEB-111:
BCB-910 Configuration:
1. Configure IP interface and OSPF to peer with non-Fabric network:
46
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
BEB-111 Configuration
Campus 1 (VLAN 1xx):
Role/Segment VLAN ISID Subnet Def Gateway VRF VRF ISID
Common Services:
Role/Segment VLAN ISID Subnet Def Gateway VRF VRF ISID
47
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
IS-IS Configuration
BEB-111, the tunnel peer to BCB-930 will be configured similarly, except specifying the BCB-930 as its tunnel
end-point:
config terminal
prompt "BEB-8284-111"
spbm
interface loopback 1
ip address 1 10.0.0.111/255.255.255.255
ipv6 interface address 8200:0:0:0:0:0:0:111/128
exit
router isis
spbm 1
spbm 1 nick-name 0.01.11
spbm 1 b-vid 4051-4052 primary 4051
sys-name “BEB-8284-111”
system-id 00bb.0000.0111
ip-source-address 10.0.0.111
ipv6-source-address 8200:0:0:0:0:0:0:111
spbm 1 ip enable
spbm 1 ipv6 enable
manual-area 49.0000
exit
no spanning-tree mstp
yes
ip ospf enable
yes
exit
router isis
ip-tunnel-source-address 197.1.12.2 vrf tunnel
exit
• Verify that the tunnel to Campus1 is operational and Fabric Extend is working.
BEB-8284-111:1(config)#show isis logical-interface
============================================================================================================
ISIS Logical Interfaces
============================================================================================================
IFIDX NAME ENCAP L2_INFO TUNNEL L3_TUNNEL_NEXT_HOP_INFO
TYPE PORT/MLT VIDS(PRIMARY) DEST-IP PORT/MLT VLAN VRF
------------------------------------------------------------------------------------------------------------
255 Tunnel_to_Core IP -- -- 197.1.2.4 Port1/10 3501 tunnel
------------------------------------------------------------------------------------------------------------
1 out of 1 Total Num of Logical ISIS interfaces
VLANs and services for Campus 1 are configured in this section based on the VLAN/I-SID scheme
illustrated at the beginning of this section.
1. Create the VRFs and enable the L3VSN services:
ip vrf iot vrfid 1
ip vrf surveillance vrfid 2
router vrf iot
ipvpn
i-sid 1800911
ipvpn enable
exit
router vrf surveillance
ipvpn
i-sid 1800904
ipvpn enable
exit
49
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
3. Create the VLANs and interfaces for networks that will use the Global Routing Table:
• The Device Mgmt (100), Administrator (102,1050) and Campus User (103,1051) VLANs are
created and I-SIDs assigned.
vlan create 100 type port-mstprstp 0
vlan i-sid 100 1010100
interface Vlan 100
ip address 172.10.10.2 255.255.255.0
exit
50
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
RSMLT Configuration
• Configure RSMLT to peer the BEB-110 and -111 in Campus1, forming a redundant router
gateway for the specified VLANs from the access switches.
vlan create 2 type port-mstprstp 0
vlan i-sid 2 2200
interface Vlan 2
ip address 2.2.2.2 255.255.255.0 0
exit
router isis
spbm 1 smlt-virtual-bmac 00:bb:00:01:10:11
spbm 1 smlt-peer-system-id 00bb.0000.0110
exit
mlt 1 enable
mlt 1 member 1/1
mlt 1 encapsulation dot1q
mlt 2 enable
mlt 2 member 1/2
mlt 2 encapsulation dot1q
interface mlt 1
smlt
exit
interface mlt 2
smlt
exit
51
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
ip rsmlt edge-support
DVR Configuration
• Configure the DVR instance and enable DVR on the desired IP interfaces.
dvr controller 10
52
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• GRT Policy:
router isis
accept i-sid 1800904 enable
accept i-sid 1800911 enable
exit
route-map "accept_GRT_mgmt" 1
permit
enable
match network "GRT_mgmt,GRT_910"
route-map "accept_GRT_mgmt" 2
no permit
enable
exit
route-map "accept_GRT_mgmt" 1
permit
enable
match network "GRT_mgmt,GRT_stor"
route-map "accept_GRT_mgmt" 2
no permit
enable
exit
exit
53
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
Fabric Attach
• The FA management VLAN in Campus 1 is VLAN id 100
interface mlt 1
fa
fa enable
no fa message-authentication
fa management i-sid 1010100 c-vid 100
exit
interface mlt 2
fa
fa enable
no fa message-authentication
fa management i-sid 1010100 c-vid 100
exit
BEB-110 Configuration
IS-IS Configuration
BEB-110, the tunnel peer to BEB-910 will be configured similarly, except specifying the BEB-910 as its tunnel
end-point:
config terminal
prompt "BEB-8284-110"
spbm
interface loopback 1
ip address 1 10.0.0.110/255.255.255.255
ipv6 interface address 8200:0:0:0:0:0:0:110/128
exit
router isis
spbm 1
spbm 1 nick-name 0.01.10
spbm 1 b-vid 4051-4052 primary 4051
sys-name “BEB-8284-110”
system-id 00bb.0000.0110
ip-source-address 10.0.0.110
ipv6-source-address 8200:0:0:0:0:0:0:110
spbm 1 ip enable
spbm 1 ipv6 enable
manual-area 49.0000
exit
54
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
router isis
ip-tunnel-source-address 197.1.11.2 vrf tunnel
exit
• Once connected, ensure the OSPF neighbor state between the Campus BEBs and Core Fabric nodes
to their respective OSPF neighbors is established.
The OSPF state to the intermediate
BEB-8284-110:1(config)#show ip ospf neighbor vrf tunnel OSPF network router should be “FULL”.
.
================================================================================================
OSPF Neighbors - VRF tunnel
================================================================================================
INTERFACE NBRROUTERID NBRIPADDR PRIO STATE RTXQLEN PERM TTL
------------------------------------------------------------------------------------------------
197.1.11.2 82.60.189.0 197.1.11.3 1 Full 0 Dyn 35
• Verify that the tunnel to Campus1 is operational and Fabric Extend is working.
If the tunnel is operational, the interface
BEB-8284-110:1(config)#show isis logical-interface
will be listed. Otherwise, it will state
“NULL”.
============================================================================================================
ISIS Logical Interfaces
============================================================================================================
.
IFIDX NAME ENCAP L2_INFO TUNNEL L3_TUNNEL_NEXT_HOP_INFO
TYPE PORT/MLT VIDS(PRIMARY) DEST-IP PORT/MLT VLAN VRF
------------------------------------------------------------------------------------------------------------
255 Tunnel-8404-910 IP -- -- 197.1.1.2 Port1/10 3500 tunnel
55
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
3. Create the VLANs and interfaces for networks that will use the Global Routing Table:
• The Device Mgmt (100), Administrator (102,1050) and Campus User (103,1051) VLANs are
created and I-SIDs assigned.
vlan create 100 type port-mstprstp 0
vlan i-sid 100 1010100
interface Vlan 100
ip address 172.10.10.1 255.255.255.0
exit
56
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
RSMLT Configuration
• Configure RSMLT to peer the BEB-110 and -111 in Campus1, forming a redundant router
gateway for the specified VLANs from the access switches.
vlan create 2 type port-mstprstp 0
vlan i-sid 2 2200
interface Vlan 2
ip address 2.2.2.1 255.255.255.0 0
exit
router isis
spbm 1 smlt-virtual-bmac 00:bb:00:01:10:11
spbm 1 smlt-peer-system-id 00bb.0000.0111
exit
mlt 1 enable
mlt 1 member 1/1
mlt 1 encapsulation dot1q
mlt 2 enable
mlt 2 member 1/2
mlt 2 encapsulation dot1q
interface mlt 1
57
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
smlt
exit
interface mlt 2
smlt
exit
ip rsmlt edge-support
DVR Configuration
• Configure the DVR instance and enable DVR on the desired IP interfaces.
dvr controller 10
58
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
route-map "accept_GRT_mgmt" 1
permit
enable
match network "GRT_mgmt,GRT_910"
route-map "accept_GRT_mgmt" 2
no permit
enable
exit
59
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
route-map "accept_GRT_mgmt" 1
permit
enable
match network "GRT_mgmt,GRT_stor"
route-map "accept_GRT_mgmt" 2
no permit
enable
exit
exit
Fabric Attach
interface mlt 1
fa
fa enable
no fa message-authentication
fa management i-sid 1010100 c-vid 100
exit
interface mlt 2
fa
fa enable
no fa message-authentication
fa management i-sid 1010100 c-vid 100
exit
60
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
61
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
Common Services:
Role/Segment VLAN ISID Subnet Def Gateway VRF VRF ISID
62
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
VLAN Configuration
• Configure the Server VLANs hosted in the server rooms, residing on the GRT:
vlan create 900 type port-mstprstp 0
vlan i-sid 900 1090900
interface Vlan 900
ip address 172.90.1.2 255.255.255.0
exit
63
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
DVR Configuration
• Configure the DVR instance, and enable DVR on the desired IP interfaces, specifying the IP
that will act as default gateway for that VLAN. As VLAN 907 is an L2VSN, no default gateway
is configured.
dvr controller 90
64
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
Redistribution
• Redistribute directly connected networks and static routes for GRT and all VRFs present on the
controller into their respective IS-IS instances and apply.
router isis
redistribute direct
redistribute direct enable Redistribute direct routes into GRT ISIS
ipv6 redistribute direct enable Domain.
exit
65
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
VLAN Configuration
• Configure the Server VLANs hosted in the server rooms.
vlan create 900 type port-mstprstp 0
vlan i-sid 900 1090900
interface Vlan 900
ip address 172.90.1.3 255.255.255.0
exit
66
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
DVR Configuration
• Configure the DVR instance, and enable DVR on the desired IP interfaces, specifying the IP
that will act as default gateway for that VLAN. As VLAN 907 is an L2VSN, no default gateway
is configured.
dvr controller 90
exit
Redistribution
• Redistribute directly connected networks and static routes for GRT and all VRFs present on the
controller into their respective IS-IS instances and apply.
router isis
redistribute direct
redistribute direct enable Redistribute direct routes into GRT ISIS
ipv6 redistribute direct enable Domain.
exit
68
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
IS-IS Configuration
• Enable the DVR-leaf-mode flag.
Warning
Setting this flag will prompt the user to save the configuration and reboot the system. Much of the system’s current
configuration will be cleared, so its highly recommended to follow this step first.
router isis
spbm 1
spbm 1 nick-name 0.09.60
spbm 1 b-vid 4051-4052 primary 4051
sys-name "BEB-7254-960"
In DVR Leaf mode, setting the management
inband-mgmt-ip 10.0.9.60
IP address only requires the inband-mgmt-
system-id 00bb.0000.0960
ip command.
manual-area 49.0000
exit
sys force-topology-ip-flag
69
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• DVR Leaves in this EVD are configured as clusters (via a vIST), with one cluster of two Leaf nodes
in each server room. Both server rooms are configured in the same DVR domain.
router isis
spbm 1 smlt-virtual-bmac 00:bb:00:00:60:70
spbm 1 smlt-peer-system-id 00bb.0000.0970
Set shared SMLT gateway MAC and SMLT
exit
peer id.
dvr leaf 90
dvr leaf virtual-ist 90.90.90.1 255.255.255.0 peer-ip 90.90.90.2 cluster-id 90
mlt 3 enable
mlt 3 member 1/25
mlt 3 encapsulation dot1q
70
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
VLAN/I-SID Configuration
• Configure VLAN/I-SID to physical or logical port where server(s) are connected.
i-sid 1090900 elan
untagged-traffic port 1/13,1/22
exit I-SID mapping for untagged single stations
71
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
==========================================================================================
Isid Info Indicates the physical or MLT interface
bound to each I-SID
==========================================================================================
ISID ISID PORT MLT ORIGIN
ID TYPE VLANID INTERFACES INTERFACES
------------------------------------------------------------------------------------------
1090900 ELAN 2 u:1/22 - CONFIG
1090901 ELAN 3 c901:1/40 - CONFIG
1090902 ELAN 4 c902:1/41 - CONFIG
1090903 ELAN 5 c903:1/42 - CONFIG
1090904 ELAN 10 c904:1/33 - CONFIG
1090906 ELAN 6 - c906:2 CONFIG
1090911 ELAN 9 c911:1/13,1/33 - CONFIG
1090998 ELAN 7 - u:2 CONFIG
1090999 ELAN 8 - u:1,3 CONFIG
16677305 CVLAN 4002 - - CONFIG
16777001 ELAN N/A - - CONFIG
IS-IS Configuration
• Enable the DVR-leaf-mode flag.
Warning
Setting this flag will prompt the user to save the configuration and reboot the system. Much of the system’s current
configuration will be cleared, so its highly recommended to follow this step first.
router isis
spbm 1
spbm 1 nick-name 0.09.70
spbm 1 b-vid 4051-4052 primary 4051
sys-name "BEB-7254-970"
In DVR Leaf mode, setting the management
inband-mgmt-ip 10.0.9.70
IP address only requires the inband-mgmt-
system-id 00bb.0000.0970
ip command.
manual-area 49.0000
exit
no shutdown
isis
isis spbm 1
isis enable
no spanning-tree mstp
yes
exit
sys force-topology-ip-flag
mlt 1 enable
mlt 1 member 1/3
mlt 1 encapsulation dot1q
Bind BEB-970’s MLT instances to physical
mlt 2 enable interfaces.
mlt 2 member 1/5
mlt 2 encapsulation dot1q
mlt 3 enable
mlt 3 member 1/25
mlt 3 encapsulation dot1q
73
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
VLAN/I-SID Configuration
• Configure VLAN/I-SID to physical or logical port where server(s) are connected.
i-sid 1090900 elan
untagged-traffic port 1/13,1/22
exit
74
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
==========================================================================================
Isid Info
==========================================================================================
ISID ISID PORT MLT ORIGIN
ID TYPE VLANID INTERFACES INTERFACES
------------------------------------------------------------------------------------------
1090900 ELAN 2 u:1/13,1/22 - CONFIG
1090901 ELAN 3 c901:1/35 - CONFIG
1090902 ELAN 4 c902:1/36 - CONFIG
1090903 ELAN 5 c903:1/37 - CONFIG
1090904 ELAN 10 c904:1/40 - CONFIG
1090906 ELAN 6 - c906:2 CONFIG
1090907 ELAN N/A u:1/20,1/40 - CONFIG
1090911 ELAN 9 c911:1/13 - CONFIG
1090998 ELAN 7 - u:2 CONFIG
1090999 ELAN 8 - u:1,3 CONFIG
16677305 CVLAN 4002 - - CONFIG
16777001 ELAN N/A - - CONFIG
c: customer vid u: untagged-traffic
IS-IS Configuration
• Set switch to DVR Leaf mode:
config terminal
boot config flags dvr-leaf-mode
save config
reset
75
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
router isis
spbm 1
spbm 1 nick-name 0.09.40
spbm 1 b-vid 4051-4052 primary 4051
sys-name "BEB-7254-940"
inband-mgmt-ip 10.0.9.40
system-id 00bb.0000.0940
manual-area 49.0000
exit
sys force-topology-ip-flag
router isis
spbm 1 smlt-virtual-bmac 00:bb:00:00:11:50
spbm 1 smlt-peer-system-id 00bb.0000.0950
exit
dvr leaf 90
dvr leaf virtual-ist 91.91.91.1 255.255.255.0 peer-ip 91.91.91.2 cluster-id 91
mlt 1 enable
mlt 1 member 1/5
mlt 1 encapsulation dot1q
mlt 2 enable
mlt 2 member 1/25
mlt 2 encapsulation dot1q
76
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
VLAN/I-SID Configuration
• Configure VLAN/I-SID to physical or logical port where server(s) are connected.
i-sid 1090900 elan
untagged-traffic port 1/13
exit
77
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
==========================================================================================
Isid Info
==========================================================================================
ISID ISID PORT MLT ORIGIN
ID TYPE VLANID INTERFACES INTERFACES
------------------------------------------------------------------------------------------
1090900 ELAN 10 u:1/13 - CONFIG
1090901 ELAN 11 c901:1/35 - CONFIG
1090902 ELAN 12 c902:1/36 - CONFIG
1090903 ELAN 13 c903:1/37 - CONFIG
1090904 ELAN 18 c904:1/20 - CONFIG
1090906 ELAN 14 - c906:1 CONFIG
1090907 ELAN N/A c907:1/20 - CONFIG
1090911 CVLAN 17 - - CONFIG
1090998 ELAN 15 - u:1 CONFIG
1090999 ELAN 16 - u:2 CONFIG
16677306 CVLAN 4002 - - CONFIG
16777001 ELAN N/A - - CONFIG
78
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
IS-IS Configuration
• Set switch to DVR Leaf mode:
config terminal
boot config flags dvr-leaf-mode
save config
reset
router isis
spbm 1
spbm 1 nick-name 0.09.50
spbm 1 b-vid 4051-4052 primary 4051
sys-name "BEB-7254-950"
In DVR Leaf mode, setting the management
inband-mgmt-ip 10.0.9.50
IP address only requires the inband-mgmt-
system-id 00bb.0000.0950
ip command.
manual-area 49.0000
exit
sys force-topology-ip-flag
router isis
spbm 1 smlt-virtual-bmac 00:00:00:00:11:50
spbm 1 smlt-peer-system-id 00bb.0000.0940
exit
79
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
dvr leaf 90
dvr leaf virtual-ist 91.91.91.2 255.255.255.0 peer-ip 91.91.91.1 cluster-id 91
mlt 1 enable
mlt 1 member 1/5
mlt 1 encapsulation dot1q
mlt 2 enable
mlt 2 member 1/25
mlt 2 encapsulation dot1q
VLAN/I-SID Configuration
• Configure VLAN/I-SID to physical or logical port where server(s) are connected.
i-sid i-sid 1090900 elan
c-vid 900 port 1/22
exit
==========================================================================================
Isid Info
==========================================================================================
ISID ISID PORT MLT ORIGIN
ID TYPE VLANID INTERFACES INTERFACES
------------------------------------------------------------------------------------------
1090900 ELAN 10 c900:1/22 - CONFIG
1090901 ELAN 11 c901:1/35 - CONFIG
1090902 ELAN 12 c902:1/36 - CONFIG
1090903 ELAN 13 c903:1/37 - CONFIG
1090904 ELAN 18 c904:1/13,1/20 - CONFIG
1090906 ELAN 14 - c906:1 CONFIG
81
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Confirm DVR Domain members. BEB-910 and -920 should show as controllers for the four leaves:
BEB-7254-950:1(config)#show dvr members
================================================================================================
DVR Members (Domain ID: 90)
================================================================================================
System Name Nick-Name Nodal MAC Role
------------------------------------------------------------------------------------------------------------
--
BEB-8404-910 0.09.10 00:bb:00:00:09:10 Controller
BEB-8404-920 0.09.20 00:bb:00:00:09:20 Controller
BEB-7254-940 0.09.40 00:bb:00:00:09:40 Leaf
BEB-7254-950 0.09.50 00:bb:00:00:09:50 Leaf
BEB-7254-960 0.09.60 00:bb:00:00:09:60 Leaf
BEB-7254-970 0.09.70 00:bb:00:00:09:70 Leaf
• Connect the Extreme Management Assets and network servers to their corresponding ports in the
server rooms.
82
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
45 out of 45 Total Num of Route Entries, 45 Total Num of Dest Networks displayed.
--------------------------------------------------------------------------------------------------
TYPE Legend:
I=Indirect Route, D=Direct Route, A=Alternative Route, B=Best Route, E=Ecmp Route,
U=Unresolved Route, N=Not in HW, F=Replaced by FTN, V=IPVPN Route, S=SPBM Route
PROTOCOL Legend:
v=Inter-VRF route redistributed
14 out of 14 Total Num of Route Entries, 14 Total Num of Dest Networks displayed.
------------------------------------------------------------------------------------------------
TYPE Legend:
I=Indirect Route, D=Direct Route, A=Alternative Route, B=Best Route, E=Ecmp Route,
As a Route,
U=Unresolved Route, N=Not in HW, F=Replaced by FTN, V=IPVPN result of route-map policies, BEB-
S=SPBM Route
PROTOCOL Legend: 210 has route information for the Network
As a result of redistribution within the
v=Inter-VRF route redistributed Mgmt network and the Production
VRF, BEB-210 has route information on Servers subnet in the GRT.
Campus1 and Server Room IOT subnets.
5 out of 5 Total Num of Route Entries, 5 Total Num of Dest Networks displayed.
As a result of route-map policies, BEB-
------------------------------------------------------------------------------------------------
210 has route information for the Network
--
Mgmt network and the Storage subnet in
TYPE Legend:
the Server Room GRT.
I=Indirect Route, D=Direct Route, A=Alternative Route, B=Best Route, E=Ecmp Route,
U=Unresolved Route, N=Not in HW, F=Replaced by FTN, V=IPVPN Route, S=SPBM Route
PROTOCOL Legend:
v=Inter-VRF route redistributed
83
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
============================================================================================================
DVR DATABASE
============================================================================================================
NEXT L3VSN L2VSN OUTGOING SPB PR
DEST MASK HOP VRFID ISID ISID INTERFACE COST COST
------------------------------------------------------------------------------------------------------------
0.0.0.0 0.0.0.0 BEB-8404-920 0 0 0 2/1 10 1
1 day(s), 02:12:30
0.0.0.0 0.0.0.0 BEB-8404-910 0 0 0 2/1 10 1
1 day(s), 02:12:30
0.0.0.0 0.0.0.0 BEB-8404-920 2 1800904 0 2/1 10 1
1 day(s), 02:12:30
0.0.0.0 0.0.0.0 BEB-8404-910 2 1800904 0 If unknown
2/1 packet that’s member10of the1
1 day(s), 02:12:30 GRT(0) or this VRF, its sent to DVR
0.0.0.0 0.0.0.0 BEB-8404-920 1 1800911 0 2/1
controller. 10 1
1 day(s), 02:12:30
0.0.0.0 0.0.0.0 BEB-8404-910 1 1800911 0 2/1 10 1
1 day(s), 02:12:30
172.9.98.0 255.255.255.0 BEB-8404-920 0 0 1090998 2/1 10 1
1 day(s), 02:12:30
172.9.98.0 255.255.255.0 BEB-8404-910 0 0 Known hosts
1090998
connected 2/1
to Leaf nodes, 10 1
1 day(s), 02:12:30
connected to specified port/MLT.
172.9.98.2 255.255.255.255 BEB-8404-910 0 0 1090998 2/1 10 1
1 day(s), 02:12:30
172.9.98.3 255.255.255.255 BEB-8404-920 0 0 1090998 2/1 10 1
1 day(s), 02:12:30
172.9.98.106 255.255.255.255 BEB-7254-970 0 0 1090998 MLT-2 10 1
1 day(s), 01:51:49
172.9.98.106 255.255.255.255 BEB-7254-960 0 0 1090998 MLT-2 10 1
1 day(s), 01:51:49
172.9.98.107 255.255.255.255 BEB-7254-950 0 0 1090998 2/1 10 1
0 day(s), 04:07:42
172.9.98.107 255.255.255.255 BEB-7254-940 0 0 1090998 2/1 10 1
0 day(s), 04:07:42
172.9.99.0 255.255.255.0 BEB-8404-920 0 0 1090999 2/1 10 1
1 day(s), 02:12:30 Known hosts learned from other Leaf
172.9.99.0 255.255.255.0 BEB-8404-910
nodes across0DVR domain.
0 1090999 2/1 10 1
1 day(s), 02:12:30
84
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Three sites were created in the Automated Campus to group devices based on their function.
85
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• The Campus Access site contains all the access switches deployed at the Campus edge:
86
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Enter the IP address of the engine. The Engine will also automatically be added to Devices with
the Add Engine to Devices check box. Select the desired SNMP profile:
87
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
88
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
Note
Refer to the Design Considerations for procedures on configuring an SNMPv3 profile in XMC.
• Repeat this process for the other VSP switches in the network. Check their status in the Devices
view:
89
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• The wireless controllers are added under the Network Management site.
• Ensure that the XMC and the Wireless Controllers are using the same Shared Secret to ensure a
secured connection for communication. This shared secret is a default value in XMC under
AdministrationOptionsWireless Manager:
90
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Log into the EWC and navigate to ControllerNetworkSecure Connections. Enter the XMC
IP address, and the same shared secret found in the XMC. Then click Add/Update:
91
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
Warning
Make note of the service rule limitations for each platform in the policy domain. If there is a set (or sets) of service rules
common to multiple roles, this quickly multiplies the total number of rules configured. One way to avoid this is to
create multiple policy domains.
This section assumes that SNMPv3 has been configured. To configure SNMPv3 on the switches, wireless
controllers, and Extreme Management appliances, refer to the Simple Network Management Protocol
(SNMPv3) section in Design Considerations.
92
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
The Automated Campus Validated Design contains three main domains created with Extreme
Management Center, each containing a subset of associated roles and sets of rules for each role. These
three domains work to organize the network in an efficient manner, allowing specific policies and rules to
apply only across desired domains. The domains are:
• Wired-Campus1 (Acc120, Acc121)
• Wired-Campus2 (Acc220, Acc221)
• Wireless-Campus (Wireless controllers in the server rooms, which push policies to the APs in the
campuses)
The “Wired-Campus” domains enforce the roles and services assigned to the wired users accessing the
campus access switches, with each campus its own domain. The “Wireless-Campus” domain contains
the roles and services enforced on the wireless controllers for the APs on the network.
• To create new domains, go to Control Policy Open/Manage Domain(s). Select Create
Domain from the drop-down list and name the new domain:
93
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Create the three required domains for this validated design: Wired-Campus1, Wired-Campus2
and Wireless-Campus.
Eight unique policy roles are configured for wired campus traffic.
A role has two components that define how user traffic is treated: The Default Actions and the Services.
Only the Access Control, Class of Service, and AP Aware actions are configured in the roles defined for
this solution. The configuration steps for the Administrator role are presented in this section. All roles are
configured in the same manner.
Note
The roles illustrated in this section are examples only. Policy roles are created specifically for the needs of each network
and can vary greatly.
94
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
95
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• To configure the default actions for the Administrator role, go to Control Policy
Roles/Services and select Role. If the options are not displayed, click Show All.
• If the VLAN doesn’t exist, click New VLAN in the drop-down, and enter VLAN name and ID:
• To add services to the Administrator role, click Add/Remove and select from the existing default
services. Click OK.
96
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
97
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• The Egress VLAN must also be configured for the roles that have access control set to Contain to
VLAN and for roles applied to devices that have other users connected behind them, like an AP or
a VoIP phone. To configure the Egress VLAN entries, go to the VLAN Egress tab and click Add.
Select the desired VLAN and the forwarding state for the port from the drop-down lists.
98
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
Note
This role is used by wired domains only and does not exist on the Wireless-Campus domain.
99
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
3. Deny Access
• The Deny Access Role is used in ExtremeControl to assign to an end-system that has been
denied access through MAC Registration. The definition of the Deny Access role may vary
depending on the customer environment.
100
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Give the CoS service a name, and click OK, which will assign it to this Role:
101
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• In the CoS drop-down menu, choose the gear icon next to the CoS profile created:
• Select the dot1p priority and DSCP values for this profile:
102
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Set the desired DSCP value (in this EVD, the DSCP will be AF42, DSCP 36):
• Navigate back to the Surveillance role, and add any services desired:
103
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
104
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• The Printer Role is simply used to define a subset of services that should be applied to any
related printer devices on the network.
• The “Print Servers” service is predefined under Services. Under Network Resources, Print
Servers can be selected and edited, specifying the MAC or IP addresses of the servers in the
network to be included in this service and applied to this role.
105
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
8. Wired IoT Bridged Role (Legacy IoT - VLAN 907/ NSI: 1090907)
• This role is applied to devices that may not support newer authentication methods, network
addressing, etc, and require a Layer 2 connection across the fabric to its corresponding server.
When a client authenticates to this role, the access switch (FA client) will request this VLAN/NSI
value and is created dynamically on the FA Server as an L2VSN.
106
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
10. Save the policy domain and enforce to the access switches in this domain.
Although the role names between the wired campuses are the same, the actual VLAN and NSI values are
different and will be applied based on the policy domain the access switch is a member of.
Create the same roles as was in Wired-Campus1, editing the roles that require different network
parameters. To configure the roles, open the Wired-Campus2 policy domain:
107
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
1. Administrator Role
The Administrator role in Campus 2 uses VLAN 202/ NSI: 1020202.
108
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
109
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
110
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• The Surveillance role in Campus 2 will be configured in the same manner as Campus 1,
with the creation of a Class of Service for this role.
• Give the CoS service a name, and click OK, which will assign it to this Role:
111
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• In the CoS drop-down menu, choose the gear icon next to the CoS profile created:
• Select the dot1p priority and DSCP values for this profile:
112
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Set the desired DSCP value (in this EVD, the DSCP will be AF42, DSCP 36):
• Navigate back to the Surveillance role, and add any services desired:
113
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
114
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
115
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
10. Save the Policy Domain and enforce to the access switches in this domain.
116
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
As the two wireless controllers in this EVD are redundant, there will be one wireless domain covering both
campuses. Therefore, roles for both campuses will be created in this domain. The roles and services
created on the wireless domain are enforced on the wireless controllers, and subsequently pushed to the
Access Points.
Many of the roles defined in the Wireless-Campus policy domain are identical in purpose and
configuration to their wired version, however wireless networks are kept on a different vlan from the wired.
This is done to better allocate the number of supported rules per platform, as well as protecting the
wireless network from unnecessary broadcast/multicast traffic.
To allow for wireless roaming between the campuses, the wireless networks have been configured as part
of the Fabric Connect DVR domain spanning both campuses, so the same wireless VLAN and subnet is
used in both locations.
The roles configured for wireless networks are configured in the same way as for wired networks. To
configure the roles, open the Wireless-Campus policy domain:
117
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• The wireless Administrator role serves the same function as the wired Admin role.
118
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• The Guest Access role is intended for guests or other unknown users connecting to the
enterprise network infrastructure. The Guest Access role will be used to enforce the high
security of IT assets and the limited availability of IT resources as determined by the
business policy. No VLAN/NSI value is required for Guest, as this traffic will be tunneled
directly back to the EWC, based on the topology mode.
119
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• The wireless Campus User role serves the same function as the wired Campus role.
120
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
6. Unregistered Role
• The Unregistered Role is used in the Wireless-Campus policy domain for end-systems that
have joined the Guest wireless network and have yet to pass through authentication or
guest registration. The definition of the Unregistered role may vary depending on the
customer environment.
Redirect function is
enabled for this role and
it will be used for captive
portal guest access.
7. The final list for policy roles from the Wireless-Campus domain:
Services Configurations
Extreme Management Center provides a set of default services that cover a wide range of protocols and
applications. Custom services can be added to match specific requirements, and rules can be added to
the existing services. Creating a global role means it is visible and it can be used by all policy domains.
The following non-default services were added for Campus 1. Detailed configuration steps are added for
the Deny Admin service. All services are configured in the same manner.
121
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Each service is formed of one or more rules. To add a rule to a service, right click on the service
name and select Create Rule.
122
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Once created, the rule will appear under the service. To configure the rule, click on its name to
open the configuration panel.
123
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• The Deny Admin service has the following rules defined. In addition to specific applications
being blocked, entire subnets can also be denied access:
• This service was created to allow DHCP, DNS, HTTP and ICMP traffic and it is assigned to
Guest Access role.
124
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• This service is applied only to the Administrator role and allows management traffic having as its
destination the network devices in the Automated Campus Validated Design, and a CoS Priority 5.
125
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Redirect Web Services is used to redirect HTTP traffic of unregistered users to the Captive Portal
for authentication.
126
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Click Add Group Index Config. To have Captive Portal Redundancy between two
ExtremeControl engines, use a single FQDN address for the captive portal redirect configuration.
• In the DNS server(s), add both ExtremeControl IPs to the FQDN address. Make sure that all
hardware and applications use the DNS server where the entries reside.
127
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Security of the network devices and appliances is of the utmost importance. To block access to
the switches and appliances, a Global Security Service can be created with a rule to either deny or
allow limited access to those devices. A subnet or single IP can be entered if a Layer 3 Traffic
Classification is chosen. Layers 2, 4 and 7 can also be selected with the appropriate configuration.
• Once the Services and Rules are created, it must be added to the appropriate Roles within their
respective Domains. To add to the appropriate Roles, right-click on the Service and select add to
Roles. Multiple Roles can be selected as well.
128
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Once the access switches have been deployed (See Wired User Access), enforce policy
configuration on the domain member network devices. Policy settings will be created automatically.
Warning
If using more than one Policy Domain, ensure the proper Policy Domain is selected before enforcing the domain.
129
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
ExtremeControl Configuration
The Access Control tab provides support for controlling the user connection experience and network
access based on a variety of criteria including authentication, user name, MAC-address, time of day, or
location.
LDAP Configuration
This solution uses LDAP together with RADIUS and netlogin to control user access to network resources.
LDAP is an application protocol used for accessing and maintaining distributed directory information.
LDAP can be configured through Extreme Management Center via Control Access Control
Configuration AAA LDAP Configurations. To display all the necessary LDAP configuration
options, the Make Advanced option must be selected from the menu under the AAA drop-down menu, by
right-clicking on the Default profile option and select Make Advanced.
Note
Once selected, the “Make Advanced” option is no longer available, and the Default page will retain and display the
Advanced options.
1. Click Add to add a new LDAP configuration. Click Add again to add a new LDAP URL.
130
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
2. Fill in the rest of the fields as shown and click Save to finish the configuration:
131
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• You can use the Test option to verify that the LDAP server is configured correctly and answering
the request. One way to test an LDAP configuration is to select the desired entry, click Edit, and
then click Test. The test might take a few minutes to complete.
132
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
3. Configure ExtremeControl to use LDAP for interrogating user credentials. To accomplish this, you
must create a new authentication rule to set LDAP as the authentication method. You can add an
authentication rule from Control Access Control Configuration Configurations
Default AAA: Default by clicking Add in the Authentication Rules section. The rules for
Automated Campus were configured as shown in the following pictures.
NTLM authentication is
automatically selected as LDAP
Authentication method for
Microsoft Active directory
133
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
RADIUS Configuration
Two RADIUS servers are configured for redundancy. In case the primary server fails, the second one is
used for authentication. There’s a radius server connected in each server room.
The Timeout and Number of Retries have the default values. The shared secret must be configured and
must be the same on ExtremeControl and on the RADIUS server. ExtremeControl will check the RADIUS
server is up at every check interval. Verification is done by using a “fakeUser” RADIUS request with a
username and password. The username may or may not exist on the RADIUS server. The
ExtremeControl considers the RADIUS server to be alive whenever the ExtremeControl receives a
RADIUS response, either Reject or Accept. MS Radius servers may log an error for this process. The
Health Check parameters can be modified from the Advanced section of the RADIUS configuration
window. The default values are used here.
Note
To avoid accumulating log errors because of the Health Check process that may occur for topologies using a Microsoft-
based RADIUS server, the Health Check feature can be disabled by unchecking the Use Server-Status Request box and
the Use Access Request box, click OK, then Save. Alternatively, a replacement user already entered in the RADIUS
server can be configured to replace the fakeUser configuration.
134
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
135
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
Two ExtremeControl engines are in the server rooms connected to different switches. The use of two
engines assures redundancy. Both ExtremeControl engines are configured identically, and if the primary
ExtremeControl fails the secondary ExtremeControl will take over its attributions without affecting users.
Both engines have authentication and assessment enabled.
To configure ExtremeControl engines, go to Control Access Control Engines Engine Groups
Default, highlight an engine, and select Engine Settings:
136
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
ExtremeControl Profiles define the authorization requirements for the end-systems connecting to the
network. Each profile has an Accept Policy which is applied to an end-system when it has been
authorized locally by the ExtremeControl engine and authentication is configured to replace the attributes
returned from the RADIUS server with the Accept Policy.
Each Accept Policy is associated with a Policy Mapping, which defines exactly how end-system traffic is
handled on the network. Each mapping specifies a Policy Role (created in the Policy tab) and/or any
additional RADIUS attributes included as part of a response to a RADIUS client.
When an end-system authenticates to the network, the ExtremeControl profile is applied and the
appropriate RADIUS response attributes are extracted from the mapping and returned in the RADIUS
Accept response.
• When a Policy Role (ex: “Campus User”) is created in any Policy Domain, a corresponding Access
Control Profile is automatically created under ControlAccess Control
ConfigurationProfiles.
• From the Accept Policy drop-down, click on the gear icon for this Accept Policy to access the
Policy Mapping:
137
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• From the Policy Mapping Edit screen, ensure the Filter field has the exact Policy Role name
entered:
• For authenticated management access to network devices, a separate policy profile/mapping can
be created containing the necessary attributes for authenticated login. Some network devices in
this EVD require specific attributes for login access. Two such devices are highlighted below:
138
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
This solution requires the use of the ExtremeControl engines, which are configured with unique rules for
user authentication and traffic classification. Each rule consists of a name, a set of conditions, and a set of
actions that associates it with an Accept Policy. Each Accept Policy is mapped to a role from the Policy
tab. Multiple Accept Policies can point to the same role. All conditions defined for a rule must be met;
otherwise the rule is not matched.
When ExtremeControl receives an authentication request, all rules are verified in order until one is
matched. When a rule is matched, the existing RADIUS attributes are replaced with the rule’s Accept
policy. The Unregistered rule is placed at the bottom of the access rules list and has a catch-all purpose. It
will be matched by default by all traffic that doesn’t meet all conditions of any of the previous rules.
1. Before creating a rule, determine the conditions that must be met to assign a role to an end-system
attempting access. This can be one condition or several. For example, an end-system
authenticating must pass the following criteria:
Note
Rule Group creation is beyond the scope of this document. Please refer to ExtremeControl documentation for further
information on Group configuration.
139
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
3. To create a new rule, go to Control Access Control Configuration Rules and click Add:
4. After changes are made on the Access Control tab, the configuration must be enforced on the
ExtremeControl engines.
Indicates unsaved
changes.
140
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
5. The following are the ExtremeControl rules configuration for Automated Campus:
141
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Administrator: Three rules are created - two for Wired and one for Wireless. Wired users can
access the network through MAC authentication or 802.1X, whereas Wireless Administrator users
may only access via 802.1X. When the conditions of a rule are met the corresponding Profile
(which contains the Accept Policy Role) is assigned to that user.
• Campus User and IoT Campus: These rules are set up the same way as Administrator, with
three rules each, with successful matching of conditions resulting in assignment to their
corresponding Role and VLAN.
142
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• IoT-Legacy and Wired IoT Bridged MAC: These rules are for 3rd party or legacy devices that
may not be compatible with the supported authentication methods. In these cases, MAC
authentication is used to assign them to the appropriate Role.
• Surveillance MAC wired: MAC authentication is used to identify the Vendor OUI of the IP
Cameras.
• Netadmin: This is an 802.1X rule for administrators to authenticate when accessing network
devices via SSH. When administrators authenticate via the LDAPs User Group “Netadmin”, the
Netadmin Policy Mapping (noted in Profiles and Policy Mappings) is applied allowing CLI access.
• Unregistered: This rule is used as a catch-all for unauthenticated users, who are redirected to the
Captive Portal for Registration to the network.
• Registered Guests: Upon successful registration via the Portal, Guest Users then match this rule
and are assigned the Guest-Access Role.
6. Upon successful passing of an ExtremeControl rule, the corresponding Accept Policy is sent back
to the Radius Client (access switch or Access Point) to be applied to the end user.
143
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
144
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
Pairing Configuration
To ensure redundancy, the two wireless controllers must maintain the same configuration. This is
achieved by configuring pairing. To configure pairing, go to Controller Administration Availability.
ExtremeWireless Controller 1 (EWC1):
145
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
Routing Configuration
The virtual wireless controllers are network devices and must be able to route user traffic to the different
appliances and servers used in the Validated Design (ExtremeControl engines, DHCP, DNS, NTP
servers). Also, the wireless controllers have networks directly connected, that must be advertised to the
rest of the setup. For the Automated Campus solution, static routing was implemented.
First, the esa0 interface must be created on both wireless controllers and on the VSP7xxx switches.
Refer to the DVR Configuration (Leaf) section for the IP interface configuration to connect the wireless
controllers to the setup.
146
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
EWC2
147
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
4. Select Save.
Note
Due to the DVR Domain configuration in the server rooms, the next hop gateway IP address will be the same on each
EWC.
148
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
Note
To add the EWCs to the ExtremeControl engine, they must first be manageable via XMC.
149
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
1. The wireless controllers will use the ExtremeControl engines as RADIUS servers, to authenticate
users connecting to the secured wireless networks and for integration with DHCP. To define the
ExtremeControl engines for DHCP integration go to VNS Global NAC Integration New
and add both ExtremeControl engines:
150
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
151
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
Guest Web Access and Authenticated Registration were selected. The default settings were used for
the rest of the parameters. Enforce configuration on the ExtremeControl engines for the settings to take
effect.
Control Access Control Configuration Captive Portals Website Configuration
152
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
Wireless AP Discovery
Ensure that the appropriate services on your enterprise network are prepared to support the discovery
process. To use a DHCP server for wireless AP discovery, ensure that it supports option 78 (DHCP for
SLP RFC2610). The APs use this method to discover the controller(s), and option 78 must be set for the
subnets connected to the ports of the controller and the subnets connected to the APs.
Below is an example of how this might be configured in Windows Server 2008.
To configure DHCP option 78 on the DHCP server, right click on the Scope Options for the scope meant
to service the APs and select Configure Options. Select option 78 and configure the IP addresses of
both wireless controllers. Besides redundancy, this also ensures load balancing between the two
appliances. The first value introduced must be 1. This value announces that the following fields represent
IP addresses for wireless controllers. Use the New Value box to enter the addresses, byte by byte. For
the Automated Campus solution, the esa0 interface is used for AP connection.
The AP does not use the DNS information from the initial DHCP offer supplied from the DHCP server.
After the IP setup stage, the AP decides whether to use the static controller IP or start its discovery
methods. If SLP/DNS/VCI discovery is started, the AP sends periodic DHCP informs to get more data to
complete its boot discovery methods. If the DHCP server does not reply to the inform, the process to
contact the controller will fail and start over.
153
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
Wireless AP Registration
When the discovery process is successful, the AP registers with the wireless controller. At this point, the
controller can be configured with one of the following security modes, which defines how the controller
behaves when registering new/unknown devices:
• Allow all Wireless APs to connect: If the controller does not recognize the registering serial number, a
new registration record is automatically created for the AP and receives a default configuration. If the
controller recognizes the serial number, it indicates that the registering device is pre-registered with the
controller and uses the existing registration record to authenticate the AP and the existing configuration
record to configure the AP
• Allow only approved Wireless APs to connect (secure mode): If the controller does not recognize the AP,
the AP's registration record is created in pending state and the administrator is required to manually
approve a pending AP for it to provide active service. The pending AP receives minimum configuration
only, which allows it to maintain an active link with the controller for future state change.
AP Global Registration
154
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
For a wireless network to become accessible to users, configurations must be created in the following
sections: Topologies, Roles, WLAN Services, Virtual Networks and Sites. There is a dependency
between the sections and a configuration order must be followed.
2. Enforce Policy
configuration • Verify all Roles and associated policies were created.
with NAC
• Sites are used to group the APs based on their physical location. Add APs to
4. Create sites sites and assign the WLAN services they will advertise.
155
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
1. Topology Configuration
In this section, the physical access provisioning for the user access is created. Every topology is
essentially a VLAN. To add a new topology, go to VNS Topologies and click New.
For the topologies that wireless users will use to connect to the network, one of two modes must be
selected: Bridge Traffic Locally at EWC or Fabric Attach. The topology mode dictates how the
traffic from the clients is going to be treated.
Bridge Traffic Locally at EWC - Users connecting to the wireless network send the traffic to the AP.
The AP encapsulates the traffic and tunnels it to the controller. The controller de-encapsulates the
traffic, processes it and sends to the network over the physical 1 interface in the user access VLAN.
Fabric Attach - The Fabric Attach topology type is similar to B@AP with the added I-SID parameter.
Upon boot up with this topology mode set, the AP will send the configured VLAN/I-SID value to the FA
Proxy, informing its requirement for communication.
156
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
In the Automated Campus solution, Guest and authenticated wireless user access is possible from all
campuses. All Guest users are provisioned with a Bridged@EWC topology and are placed in the
same network. All authenticated users are provisioned with Fabric Attach topologies and are placed
in different VLAN/subnets, based on the campus they are connected to.
The following user access topologies were configured for the solution:
• 100-Campus1 Mgmt:
157
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• 200-Campus2 Mgmt:
• 1050-Administrator:
158
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• 1051-CampusUser:
• 1052-IOT:
159
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• WlessContr1:
160
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• To verify the settings from Extreme Management Center after Policy Enforce completion, go to
VNS Roles and click on each role for detailed configuration:
161
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
The following roles were created in XMC and enforced to the controllers:
• Administrator Role
162
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
Some traffic must be allowed, by the Deny Access rule, to permit Guest captive portal users to connect to
the network. The services allowed for this role are defined in the Policy Rules section. All traffic except for
the traffic explicitly allowed by the policy rules is dropped.
163
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
164
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Guest-Access Role
165
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
166
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Unregistered Role
167
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
168
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
169
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
170
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
171
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
4. Site Configuration
• A site provides a way to group Roles, WLANs, and APs under one logical entity for easier
management. For the Automated Campus solution, two sites were created based on location. To
create a new site, go to VNS Sites and click New.
172
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• The Campus 1 site was configured as below. The Campus 2 site was configured the same way.
• On the AP Assignments tab, all APs physically connected to Campus 1 are selected:
173
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• On the WLAN Assignments tab, select the WLAN services that are supposed to be accessible
from Campus 1. This selection also enables the APs selected in the AP Assignments tab to
advertise these WLANs:
174
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• To create a new VNS entry, go to VNS Virtual Networks and click New.
175
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
176
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
Extreme Access
Control re-
authenticates user •New assigned policy allows user traffic to
and assigns new their allocated resources
policy
177
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
The stack operates as if it were a single switch with a single IP address and a single point of
authentication. One switch – called the master switch – is responsible for running network protocols and
managing the stack. The master runs ExtremeXOS software and maintains all the software tables for all
the switches in the stack. All switches in the stack, including the master switch, are also referred to as
nodes.
The nodes can be physically connected within a server rack to create a stack in one of two ways:
• Native Stacking - switches are connected using either designated Ethernet data ports or dedicated
stacking connectors.
• Alternate Stacking - switches are connected using 10-Gbps Ethernet data ports that have been
configured for stacking. These ports are located either on the switch itself or on option cards
installed on the rear of the switch
Note that in this EVD, Alternate Stacking in a ring topology is used with 10-Gbps links connecting the
individual switches to form a stack. The high-speed stacking links function like the backplane links of a
chassis.
The procedure for creating a Summit access stack is outside the scope of this document. This information
can be found in existing GTAC knowledgebase articles and other CLI documentation. The GTAC
Knowledgebase documentation can be found at the following link below.
How to Create a Stack with Summit Switches
178
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
the master node fails. A standby node will take the place of the backup node if the backup node becomes
the master node.
In this EVD, the access switches are managed in-band via a static IP configured on the FA Management
VLAN for each campus.
Warning
To avoid potential network issues, it’s recommended to enter the base configuration below before connecting to the
network.
• Before deploying, configure the access switch with basic commands to establish initial IP and
SNMP connectivity to the XMC and allow network provisioning.
Configure the FA mgmt. VLAN, setting
create vlan 100 the IP address and gateway.
configure vlan 100 ipaddress 172.10.10.11 255.255.255.0
enable ipforwarding vlan 100
configure iproute add default 172.10.10.1
Configure uplink for static LAG.
enable sharing 1:50 grouping 1:50,2:50
config snmpv3 add user xmc_v3 authentication sha extreme11 privacy aes 128 extreme12extreme
config snmpv3 add group snmpv3group user xmc_v3 sec-model usm
config snmpv3 add access snmpv3group sec-model usm sec-level priv read-view defaultAdminView
write-view defaultAdminView notify-view defaultAdminView
configure snmpv3 add community "private" name "private" user "v1v2c_rw"
configure snmpv3 add community "public" name "public" user "v1v2c_ro"
enable snmp acc snmpv3
Configure SNMPv3 parameters.
Enable policy to allow dynamic Refer to Design Considerations for
enable policy more information.
save config Role assignment upon
authentication.
Note
For more information on the commands used below, including configuring an SNMPv3 profile in XMC, refer to Design
Considerations
179
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• In XMC, under NetworkDevices, right-click the Campus Access Site and choose Add Device:
• Repeat this for any other deployed access switches in this Policy Domain.
• To discover multiple access switches at once, an address range can be specified. Navigate
to NetworkDevicesSitesCampus AccessDiscover. Under Addresses, click
Add:
• Choose Address Range from the drop-down, and fill in parameters. Click OK:
180
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Under Profiles, check the desired SNMP profile to apply. Click Save, then Discover:
• When Discover complete, click Configure Devices. Highlight each of the newly discovered
switches, and give each a System Name and (under Device Annotation tab) a Nickname:
181
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
182
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Add the access switch(s) provisioned in Campus 1 from the left column to the policy domain, and
click OK:
• Once added, Save Domain, and then enforce/sync the current policy profiles to the switches in
this wired policy domain:
183
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Repeat the previous steps to add newly deployed switches to other Campus domain(s).
184
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Click on the Access Control tab and add the switch to the ExtremeControl engines:
• Enter the ExtremeControl parameters for the switch, and click Save:
185
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Upon prompt to enforce the domain to the new switch(es), click Yes:
• Click “Enforce” at the bottom left of the screen to enforce the current rule base to the
ExtremeControl Engine:
186
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Verify that the Fabric Attach Mgmt VLAN (from the FA Server) was assigned to the access switch:
(Private) Slot-1 Stack.2 # show fabric attach element
Fabric Attach Mode: Proxy
Mgmt Auto
System Id Port Type VLAN Tag Provision
----------------------------- ------- ---------------- ---- --- --------------
00-bb-00-01-10-11-30-02-00-02 1:50 Server (No Auth) 100 Mix Disabled
00-bb-00-01-10-11-30-02-00-02 2:50 Server (No Auth) 100 Mix Disabled
(Private) Slot-1 Stack.3 #
• Upon connection, wired user traffic will be authenticated via ExtremeControl, and the
corresponding Role will be sent to the access switch. The access switch will assign that role to the
end user via netlogin:
(Private) Slot-1 Stack.4 # show netlogin session port 1:3
Multiple authentication session entries
--------------------------------------- The end user
authenticated MAC.
Port : 1:3 Station address : 00:41:01:00:01:cd
Auth status : success Last attempt : Wed Aug 22 20:53:04 2018
Agent type : mac Session applied : true
Server type : radius VLAN-Tunnel-Attr : None
Policy index : 1 Policy name : IoT Campus (active)
Session timeout : 0 Session duration : 0:03:37 Assigned role
Idle timeout : 300 Idle time : 0:00:00
Auth-Override : disabled Termination time : Not Terminated
187
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
188
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
Authentication Process
Extreme Switch/Stack
Netlogin Client
Authentication Steps
1. A user connecting to the switch and requesting network access sends login credentials to the switch.
2. The switch sends the credentials in a RADIUS Request message to the ExtremeControl. Upon seeing
the request, the ExtremeControl verifies its RADIUS server configuration. If a server is present, the
authentication request is sent to it. If no server is found, the LDAP configuration conditions are verified.
If the conditions are all met, the authentication request is sent to the RADIUS server. At this point
ExtremeControl/LDAP is acting as authenticator.
3. When the RADIUS server receives an authentication request it first verifies that the authenticator is in
its trusted client list and that the shared secret received matches the locally configured one, to
determine if it can accept an authentication request from the client. Next, if the client verification
passes, the RADIUS server searches for a Network Access policy whose access conditions are
passed by the Request packet. If an access policy is found, the authentication process can continue. If
not, the user’s login attempt is rejected.
4. For PEAP and TLS authentication, a RADIUS Challenge message is sent to the user.
5. The user must respond to the challenge in order to complete the authentication process.
189
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
6. The RADIUS server either allows or denies the user access and sends the response to the
ExtremeControl server.
7. If the user passes authentication, ExtremeControl starts verifying the LDAP attributes and Access
Control Rules one by one until the conditions of one of them are met. A Profile and an Accept Policy
for the matched rule are returned for the authenticated user and applied on the switch port to which
the user is connected.
8. All traffic generated by the user will be treated according to the services configured for the Role
corresponding to the Accept policy the user matched.
RADIUS Configuration
When user access control is done using policy and netlogin, at least one RADIUS server must be
configured on the access switches. At the access layer of the Automated Campus solution, two RADIUS
servers are configured—one primary and one secondary – for redundancy. If the primary server fails, the
authentication requests will be sent to the second RADIUS server. On the switches, the ExtremeControl
engines are configured as RADIUS servers.
When the access switch is added as a Switch to ExtremeControl, the resulting auto-configuration should
look similar to the one below:
Campus Access switches:
Slot-1 Stack.1 # show config aaa
#
# Module aaa configuration.
#
configure radius 1 server 172.9.99.120 1812 client-ip 172.9.90.11 vr VR-Default
configure radius 1 shared-secret encrypted "#$PRLoiBq3oT81gwfTQRzSQhR8yaZhYQ=="
configure radius 2 server 172.9.99.121 1812 client-ip 172.9.90.11 vr VR-Default
configure radius 2 shared-secret encrypted "#$1XDtAvhCUB7v5akv9X97TG0r1VDK+Q=="
configure radius-accounting 1 server 172.9.99.120 1813 client-ip 172.9.90.11 vr VR-Default
configure radius-accounting 1 shared-secret encrypted "#$UriT+Zu2oRu4Yj6PA1Ss8lU/b/9a3Q=="
configure radius-accounting 1 timeout 10
configure radius-accounting 2 server 172.9.99.121 1813 client-ip 172.9.90.11 vr VR-Default
configure radius-accounting 2 shared-secret encrypted "#$t4+vv1g0kNXIq2X39Fmv5ONPXUP3RQ=="
configure radius-accounting 2 timeout 10
enable radius
enable radius mgmt-access
enable radius netlogin
configure radius timeout 10
configure radius mgmt-access timeout 15
configure radius netlogin timeout 15
enable radius-accounting
enable radius-accounting mgmt-access
enable radius-accounting netlogin
190
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
Netlogin Configuration
Authentication with netlogin dot1x and MAC is enabled on all ports except for the uplink and server ports.
The authentication order is dot1x MAC.
When complete, the configuration should look similar to the one below:
Campus Access switches
Slot-1 Stack.2 # show config netlogin
#
# Module netLogin configuration.
#
enable netlogin dot1x mac
configure netlogin authentication protocol-order dot1x mac web-based
enable netlogin ports 1:1-49,2:1-49,3:1-49 dot1x
enable netlogin ports 1:1-49,2:1-49,3:1-49 mac
configure netlogin add mac-list ff:ff:ff:ff:ff:ff 48
191
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
4. The AP will acquire an IP address (via DHCP) from the network server, along with DHCP scope
option 78, which provides the IP addresses for the EWCs.
5. The AP will then register with the EWCs, and its serial number will appear in its list:
192
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
7. On the EWC (VNSSites), add the AP to the appropriate site. This AP will inherit all the
configuration parameters (Roles, WLAN assignments, etc) associated with the Site. Click Save:
193
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
8. The “Access Point” Policy Role enforced to the access switches identifies the port the AP is
connected to based on its MAC OUI and applies the “AP Aware” rule, instructing the access switch
to forego any authentication of end users ingressing that port. The AP will process authentication
requests with ExtremeControl for connecting wireless users. The access switch will only have a
netlogin authentication entry for the AP off that port:
9. The AP (FA Client) will request to the access switch (FA Proxy) the required I-SID assignments
based on the configured wireless topologies:
194
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
ExtremeAnalytics Configuration
Adding Analytics to Extreme Management Center
From Extreme Management Center, navigate to:
• Provide the IP address of the ExtremeAnalytics Engine, a user-friendly name, and configured
SNMP profile. Click OK
-+-
195
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• The ExtremeAnalytics engine will appear in the Overview Pane. Locate the green indicator,
confirming that the engine is operational. You should also see basic engine processing data.
• Click the enforce button at the bottom of the web page to fully deploy the ExtremeAnalytics Engine.
196
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
ExtremeAnalytics Configuration
Extreme Analytics will be configured to provide detailed flow information. Refer to the flow chart below:
Flow collection in this topology is handled by the uplink ports to the Analytics engine. If an
ExtremeSwitching access switch is utilized, the ability to collect analytics at the stack or standalone switch
are dependent on the models utilized. Please refer to product documents to determine hardware
capabilities of the access switches.
Extreme Analytics SFLOW Configuration
In this section, the user will add Extreme Switches as Mirror Sources for sending the flow information to
the Extreme Analytics Engine.
197
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Each Access switch will be added as the mirror source. The source IP address will be the switch
management address, and the destination of the mirror will be the ExtremeAnalytics Engine. The
Access switch does not have the resources necessary to collect flow data for ExtremeAnalytics.
However, the flow data will be aggregated at the switch’s uplink ports.
Analytics Configuration Engines Analytics Configuration Application
Telemetry Sources Add
• Under Source field, click the ellipsis icon “…” to bring up Source Device view:
198
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Verify that Source IP address is the device management address. Optionally you can set Sample
Rate to a different setting, minimum rate is 256. Click OK:
• Depending on port density, this process can take several minutes. After adding all Access
switches, Application Telemetry Sources should be configured. Final output should look something
like below;
199
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
Extreme Analytics can also be configured for the ExtremeWireless controllers. In this case NetFlow is
utilized rather than sFlow. In order to support both sFlow and NetFlow simultaneously the Flow Collection
Type will need to be changed to Both.
Analytics Configuration Engines Analytics Configuration
• After changing the Flow Sources Dialog should open within the Access Control Integration pane.
Select Add.
Analytics Configuration Engines Analytics Configuration Application
Telemetry Sources Add
200
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Under Flow Source click “…” and navigate to My Network All Devices EWC1a, then click
OK.
• Select all the WLANs and click OK. Notice that if a controller is paired to another controller it will
perform the configuration in one step. There will be no need to perform this step for the second
controller.
201
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Once controllers are added, the Access Control Integration | Flow Sources pane should look like
the one below.
• Select a location. This is just a label and there is no requirement that it be a Role. Below it is
identified as Campus1 analytics.
Analytics Configuration Locations
202
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• After locations and subnets are added, user may have something that resembles below. Locations
are based off of roles. User could have created locations based on physical locations. The
important thing to remember is that locations are just a group of subnets, not an actual physical
location.
203
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
The Analytics will start collecting information. The polling interval is every 5 minutes. Be sure to give the
dashboard enough time to begin populating information.
Analytics Dashboard
• Even though the dashboard might not be collecting information, the Application Flows window
should begin to collect information. You can change the polling interval if you want to see updates
in real time.
Analytics Application Flows
204
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• From the switch CLI the App Telemetry mirror can be observed with the show mirror command.
Verify the IP addresses for the Analytics Engine and the Switch Management and that the Status =
Up.
Summit Access Switch
Slot-1 Stack.1 # show mirror
• Tunnel EAN is enabled.
DefaultMirror (Disabled)
• Mirror to Remote IP = Analytic Engine IP
Description: Default Mirror Instance, created automatically
• From IP = Management address of the switch
Mirror to port: - • Status = Up
EAN (Enabled)
Description:
Mirror to remote IP: 172.9.99.122 VR : VR-Default
From IP : 172.20.10.11 Ping check: On
Status : Up
Mirrors defined: 2
Mirrors enabled: 1 (Maximum 4)
HW filter instances used: 0 (Maximum 128)
HW mirror instances used: 0 ingress, 0 egress (Maximum 4 total, 2 egress)
• Below is an example of an sflow configuration. Issue show conf etmon to display sflow
configuration.
Summit Access Switch
Slot-1 Stack.5 # show config etmon
#
# Module etmon configuration.
#
configure sflow sample-rate 256
configure sflow poll-interval 60
enable sflow
configure sflow collector 172.9.99.122 port 6343 vr "VR-Default"
configure sflow agent ipaddress 172.20.10.11
configure sflow ports 1:1 sample-rate 256
enable sflow ports 1:1 ingress
configure sflow ports 1:2 sample-rate 256
enable sflow ports 1:2 ingress
configure sflow ports 1:3 sample-rate 256
enable sflow ports 1:3 ingress
configure sflow ports 1:4 sample-rate 256
enable sflow ports 1:4 ingress
205
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• When SFLOW App Telemetry is configured in XMC, two ACLs are configured and applied. Issue
show config acl and verify the two access-lists are applied. Also, user can verify the access-
lists by issuing an ls at the prompt to list present file.
• User can also SSH into the Extreme Analytics and verify that SFLOW and GRE packets are being
sent to the Analytics Engine. User should see both SFLOW and GRE packets being sent from all
configured SFLOW sources.
Extreme Analytics Appliance
root@purviewnew813:~$ tcpdump -i eth0 proto gre -n
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
11:36:01.021962 IP 172.20.10.11 > 172.9.99.122: GREv0, length 64: gre-proto-0x88be
206
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Netflow configuration can be verified from the ExtremeWireless Controller graphical user interface.
Within the wireless controller navigate to;
VNS Global Netflow/MirrorN
• Verify: Netflow Export-Destination IP Address = Extreme Analytics Engine.
• User can also SSH into the Extreme Analytics and verify that IPFIX packets are being sent to the
Analytics Engine from the EWC controllers.
207
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
RF-Planning
When designing a wireless network, a thorough RF plan is vital to the success of the deployment. This
process involves an extensive site survey and use of the Extreme Networks™ Planning Tool. Extreme
Wireless RF-Planning can further be enhanced with the use of the Ekahau Site Survey tool and hardware.
Site Survey
Site Survey is perhaps the most important step in RF design. It validates the wireless deployment’s
expected coverage experience. A thorough site survey analyzes sufficient signal strength throughout the
covered area and allows for channel planning to reduce co-channel interference.
Site Surveys are extremely important to new wireless deployments and when replacing or upgrading
installed wireless gear. Products from different vendors or even across product generations of the same
vendor often have different transmission characteristics. These changes can include; technological
advances, the number of transmit and receive chains, and differences in radiation pattern. Never assume
that replacing one piece of equipment for another, at the same installation points, will result in the same
experience as the previous install.
An AP-on-a-stick physical site survey is the preferred method to thoroughly assess a site’s RF design
requirements. Testing an AP’s proposed location provides true measurement and representation of the
signal propagation and coverage to be expected. This method considers actual site characteristics such
as obstructions to the RF signal, absorption by walls, and impact of any other architectural materials.
If a physical site survey is not possible, at minimum, a predictive survey should be performed. The
predictive model often provides a first-pass view of the number of APs required to cover a site or a first-
pass validation of whether installing a target AP family in pre-existing spots will provide the required
coverage. The predictive model also provides greater insight into proper channel configuration, to obtain a
performance optimized experience.
208
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
After providing a few more details, you are provided with the working Canvas. Modeling steps include;
1. Floor Plan Outline and Scale
a. You can either design a floor plan outline or upload a floor plan image representative of the site
being designed.
b. The tool allows for multi-floor designs within the same project, but note that it only considers
one floor at a time. It does not consider or model cross-floor propagation.
c. Scale can be defined by mapping a line of pixels into a corresponding distance. A simple way
to determine an approximate scale is to determine the width of a doorway. In the United States
the typical width of doorway is 3 feet, which can be used as reference for a 1-meter (3 ft.) line.
209
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
Visualization
Several visualization tools are available to help you visualize the resulting coverage on both 2.4GHz and
5.0Ghz frequencies:
1. RF Coverage Heat map – provides assessment of signal strength coverage of the floor plan.
2. Channel Plan – provides an optimized view of a representative channel plan to reduce co-channel
interference.
210
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
5. Provides visualization of the angle of orientation for the AP-Camera model (AP3916i).
6. Provides an assessment of Bluetooth Low Energy coverage for models that support iBeacon transmit
functions (for example, AP391xx and AP7632/62).
211
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
RF Survey Tools
Conducting a site survey with the ExtremeWireless™ RF Planning Tool can be enhanced with the use of
third-party survey tools. The key part to a new deployment is providing a predictive or active survey
assessment as part of the design.
Predictive and active site surveys can be done using a variety of third-party tools such as Ekahau,
Netscout’s AirMagnet tool, and others. Attributes from an Ekahau survey can be imported directly into the
ExtremeWireless and ExtremeCloud products.
212
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
Design Considerations
Network Time Protocol (NTP)
Deploying the Extreme Networks’ Automated Campus solution requires time synchronization between
Extreme’s applications, switches, and other network components to function properly and communicate
efficiently. Log and syslog events also benefit when all network applications and components are
synchronized, along with synchronization of alarm events generated within Extreme Management Center.
Effective synchronization often means faster and easier resolution of network problems.
To maintain optimal synchronization within the ecosystem of Extreme’s Automated Campus Solution, we
recommend the use of NTP for Extreme Management Center, Extreme Access Control, ExtremeAnalytics,
ExtremeWireless Controllers, Extreme switches, and any third-party servers (such as RADIUS servers).
Note
Extreme Management Center NTP configuration is executed during installation using the command-line
interface. Once the appliance is installed, log in to the console as root. The install process starts with a
series of configuration questions. The administrator is prompted for NTP configuration under the
<Configure Date And Time Settings> section of the install. If the administrator chooses to change the
settings after install, a simple run of the dateconfig script can be executed. The dateconfig script is
located in /usr/postinstall.
Please enter a NTP Server IP Address (Required): <ntp_ip_address_2>
<ntp_ip_address_1>
<ntp_ip_address_2>
Enter 0 or any key other than a valid selection to complete NTP configuration and continue.
If you need to make a change, enter the appropriate number from the
choices listed below.
1. US Eastern
213
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
2. US Central
3. US Mountain
4. US Pacific
5. Other - Shows a graphical list
================================================================================
• Print the following to the console if synchronization is successful after the selection of the timezone
with the post install script <dateconfig>:
The time was successfully synchronized to the server at <ntp_ip_address_1>
rsyslog start/running, process 21801
* Starting NTP server ntpd [ OK ]
The command <ntpq -np> will also display pertinent information about NTP daemon operation and
performance – including statistics about delay, offset, and jitter.
root@XMC:/# ntpq -np
remote refid st t when poll reach delay offset jitter
==============================================================================
0.ubuntu.pool.n .POOL. 16 p - 64 0 0.000 0.000 0.000
1.ubuntu.pool.n .POOL. 16 p - 64 0 0.000 0.000 0.000
2.ubuntu.pool.n .POOL. 16 p - 64 0 0.000 0.000 0.000
3.ubuntu.pool.n .POOL. 16 p - 64 0 0.000 0.000 0.000
ntp.ubuntu.com .POOL. 16 p - 64 0 0.000 0.000 0.000
*<ntp_ip_address_1> 129.6.15.29 2 u 45 64 377 2.867 1.833 0.751
+<ntp_ip_address_2> 129.6.15.29 2 u 37 64 377 2.669 2.899 3.512
[ OK ]
ExtremeControl
ExtremeControl NTP configuration is executed during installation within the command-line interface. Once
the appliance is installed, log in to the console as root. The install process starts with a series of
configuration questions. The administrator is prompted for NTP configuration under the <Configure Date
And Time Settings> section of the install. If the administrator chooses to change the settings after install,
a simple run of the dateconfig script can be executed. The dateconfig script is located in /usr/postinstall.
================================================================================
Configure Date And Time Settings
================================================================================
The engine date and time can be set manually or using an external
Network Time Protocol (NTP) server. It is strongly recommended that
NTP is used to configure the date and time to ensure accuracy of time
values for SNMP communications and logged events. Up to 5
server IP addresses may be entered if NTP is used.
================================================================================
214
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
<ntp_ip_address_1>
<ntp_ip_address_2>
Enter 0 or any key other than a valid selection to complete NTP configuration and continue.
If you need to make a change, enter the appropriate number from the
choices listed below.
1. US Eastern
2. US Central
3. US Mountain
4. US Pacific
5. Other - Shows a graphical list
================================================================================
Print the following to the console if synchronization is successful after the selection of the timezone with
the post install script <dateconfig>:
The time was successfully synchronized to the server at <ntp_ip_address_1>
rsyslog start/running, process 2123
The command <ntpq -np> will also display pertinent information about the NTP daemon operation and
performance – including statistics about delay, offset, and jitter.
root@NAC:/# ntpq -np
remote refid st t when poll reach delay offset jitter
==============================================================================
0.ubuntu.pool.n .POOL. 16 p - 64 0 0.000 0.000 0.000
1.ubuntu.pool.n .POOL. 16 p - 64 0 0.000 0.000 0.000
2.ubuntu.pool.n .POOL. 16 p - 64 0 0.000 0.000 0.000
3.ubuntu.pool.n .POOL. 16 p - 64 0 0.000 0.000 0.000
ntp.ubuntu.com .POOL. 16 p - 64 0 0.000 0.000 0.000
#<ntp_ip_address_1> 129.6.15.29 2 u 48 64 377 2.445 -11.077 0.910
#<ntp_ip_address_2> 129.6.15.29 2 u 42 64 377 2.715 -2.139 2.747
215
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
ExtremeAnalytics
ExtremeAnalytics NTP configuration is executed during installation within the command-line interface.
Once the appliance is installed, log in to the console as root. The install process starts with a series of
configuration questions. The administrator is prompted for the NTP configuration under the <Configure
Date And Time Settings> section of the install. If the administrator chooses to change the settings after
install, a simple run of the dateconfig script can be executed. The dateconfig script is located in
/usr/postinstall.
Configure Date And Time Settings
================================================================================
The engine date and time can be set manually or using an external
Network Time Protocol (NTP) server. It is strongly recommended that
NTP is used to configure the date and time to ensure accuracy of time
values for SNMP communications and logged events. Up to 5
server IP addresses may be entered if NTP is used.
================================================================================
<ntp_ip_address_1>
<ntp_ip_address_2>
Enter 0 or any key other than a valid selection to complete NTP configuration and continue.
If you need to make a change, enter the appropriate number from the
choices listed below.
1. US Eastern
2. US Central
3. US Mountain
4. US Pacific
5. Other - Shows a graphical list
================================================================================
Enter selection [1]:
216
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
Print the following to the console if synchronization is successful after the selection of the timezone with
the post install script <dateconfig>:
The time was successfully synchronized to the server at <ntp_ip_address_1>
rsyslog start/running, process 27186
The command <ntpq -np> will also display pertinent information about the NTP daemon operation and
performance – including statistics about delay, offset, and jitter.
root@EA:/# ntpq -np
remote refid st t when poll reach delay offset jitter
==============================================================================
0.ubuntu.pool.n .POOL. 16 p - 64 0 0.000 0.000 0.000
1.ubuntu.pool.n .POOL. 16 p - 64 0 0.000 0.000 0.000
2.ubuntu.pool.n .POOL. 16 p - 64 0 0.000 0.000 0.000
3.ubuntu.pool.n .POOL. 16 p - 64 0 0.000 0.000 0.000
ntp.ubuntu.com .POOL. 16 p - 64 0 0.000 0.000 0.000
+<ntp_ip_address_1> 132.163.96.2 2 u 48 64 377 2.359 -26.569 8.534
*<ntp_ip_address_2> 132.163.96.2 2 u 37 64 377 2.530 -27.124 28.495
ExtremeWireless Controllers
ExtremeWireless Controller NTP configuration is accessed through the User Interface located at
Controller Network Network Time. In the Network Time panel, the timezone and up to 3 NTP
servers can be added. After filling in the fields, click Apply.
217
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
To verify NTP server settings, log in to the console and enter the command <time>. Then enter the
command <show ntpip>. The following output should be displayed:
Extreme Switches
Extreme Switch SNTP configuration is executed through the command-line-interface. SNTP is enabled on
the VR level. The following are examples of the SNTP configuration within this Validated Design:
Summit Access Switches
config timezone name EST -300 autodst
configure sntp-client primary <ntp_ip_address_1> vr VR-Default
configure sntp-client secondary <ntp_ip_address_2> vr VR-Default
configure sntp-client update-interval 60
enable sntp-client
To verify the SNTP daemon is synched with the NTP server, enter the command <show sntp>:
SNTPC Statistics:
Packets transmitted:
to primary server: 4923
to secondary server: 9
Packets received with valid time:
from Primary server: 4914
from Secondary server: 8
from Broadcast server: 0
Packets received without valid time:
from Primary server: 0
from Secondary server: 0
from Broadcast server: 0
Replies not received to requests:
from Primary server: 9
from Secondary server: 1
218
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
To verify the NTP daemon is synched with the NTP server, enter the command <show ntp>:
BEB-8284-50:1(config)#show ntp
======================================================================================
NTP
======================================================================================
Version Enabled Interval Last Update Time Synchronized To
-------------------------------------------------------------------------------------
3 True 60 Mon Jul 30 07:47:33 2018 EST <ntp_ip_address_1>
• Interface configuration:
interface vlan 200
ip dhcp-relay
exit
• Global configuration:
ip dhcp-relay fwd-path 172.20.10.2 172.9.99.105
ip dhcp-relay fwd-path 172.20.10.2 172.9.99.105 enable
ip dhcp-relay fwd-path 172.20.10.2 172.9.99.105 mode bootp_dhcp
ip dhcp-relay fwd-path 172.20.10.2 172.9.99.115
220
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Interface configuration:
interface vlan 200
ip dhcp-relay
exit
ip dhcp-relay
exit
• Interface configuration:
interface vlan 100
ip dhcp-relay
exit
223
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Global configuration:
ip dhcp-relay fwd-path 172.10.10.2 172.9.99.105
ip dhcp-relay fwd-path 172.10.10.2 172.9.99.105 enable
ip dhcp-relay fwd-path 172.10.10.2 172.9.99.105 mode bootp_dhcp
ip dhcp-relay fwd-path 172.10.10.2 172.9.99.115
ip dhcp-relay fwd-path 172.10.10.2 172.9.99.115 enable
ip dhcp-relay fwd-path 172.10.10.2 172.9.99.115 mode bootp_dhcp
ip dhcp-relay fwd-path 172.10.24.2 172.9.99.105
ip dhcp-relay fwd-path 172.10.24.2 172.9.99.105 enable
ip dhcp-relay fwd-path 172.10.24.2 172.9.99.105 mode bootp_dhcp
ip dhcp-relay fwd-path 172.10.24.2 172.9.99.115
224
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Interface configuration:
interface vlan 100
ip dhcp-relay
exit
• Interface Configuration:
interface Vlan 906
ip dhcp-relay
exit
225
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Global Configuration: As Guest traffic from the campuses egresses the EWC, the DVR controllers
need to be configured to relay the DHCP requests to the DHCP server:
ip dhcp-relay fwd-path 172.90.40.3 172.9.99.105
ip dhcp-relay fwd-path 172.90.40.3 172.9.99.105 enable
ip dhcp-relay fwd-path 172.90.40.3 172.9.99.105 mode bootp_dhcp
ip dhcp-relay fwd-path 172.90.40.3 172.9.99.115
ip dhcp-relay fwd-path 172.90.40.3 172.9.99.115 enable
ip dhcp-relay fwd-path 172.90.40.3 172.9.99.115 mode bootp_dhcp
• Interface Configuration:
interface Vlan 906
ip dhcp-relay
exit
• Verification: To view statistics on requests relayed, enter the command <show ip dhcp-relay
counters>:
================================================================================================
DHCP Counters - GlobalRouter
================================================================================================
INTERFACE IP_ADDRESS REQUESTS REPLIES
------------------------------------------------------------------------------------------------
----
Vlan200 172.20.10.1 86 161
Vlan202 172.20.24.1 6 12
Vlan203 172.20.28.1 0 0
Vlan1050 172.105.0.4 0 0
Vlan1051 172.105.1.4 47 0
• Access switches also support FA Proxy, allowing other FA clients (such as APs) to connect to the
FA server through it.
• Both FA client and FA proxy functionality is enabled by default on the access switches.
226
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• To view LLDP neighbors on VSP, enter the command <show lldp neighbor summary>:
BEB-8284-50:1(config)#show lldp neighbor summ
============================================================================================================
LLDP Neighbor Summary
============================================================================================================
LOCAL IP CHASSIS REMOTE
PORT PROT ADDR ID PORT SYSNAME SYSDESCR
------------------------------------------------------------------------------------------------------------
1/1 LLDP 0.0.0.0 02:04:96:a1:bf:74 2:50 Campus1-Acc2 ExtremeXOS (Stack) version 22~
1/2 LLDP 0.0.0.0 02:04:96:a0:ad:fe 1:50 Stack ExtremeXOS (Stack) version 22~
1/10 LLDP 160.10.100.52 e4:5d:52:3c:bc:00 1/10 IP_CLOUD_1 VSP-8284XSQ (6.1.50.0)
1/41 LLDP 10.0.0.40 e4:5d:52:43:b8:00 1/41 BEB-8284-40 VSP-8284XSQ (7.1.0.0_B034) (P~
------------------------------------------------------------------------------------------------------------
Total Neighbors : 4
To view LLDP neighbors on Summit switches, enter the command <show lldp neighbor>:
Slot-1 Stack.1 # show lldp neighbor
227
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
Profiles are used to define access to the devices in the network by creating identities used for
authentication when performing SNMP queries and sets and identities for CLI operations.
A profile can be configured with the SNMP version to be used and the read and write user and security
level. It also points to a set of CLI credentials.
In the Automated Campus EVD, a profile that uses SNMPv3 was created and is used by all network
devices. For CLI, SSH access is enabled. Authentication for CLI is done via LDAP/RADIUS server. A
different SNMPv3 profile is used by the wireless controllers.
228
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• To create new CLI credentials, go to Administration Profiles CLI Credentials and click
Add.
• Only SSH is permitted for management connections to the network devices. Telnet access is
disabled.
1. Configure a Description
2. Configure a User Name
3. Configure SSH as the Type.
4. Configure a Login Password.
5. Configure an Enable Password.
6. Configure a Configuration Password.
7. Click Save
229
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• To create a new profile, go to Administration Profiles and select Add to create a custom
SNMP profile:
230
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• The same SNMPv3 user with the same authentication protocol and password and the same
privacy protocol and password must be created on the network device.
• Configure the created profile with the new SNMP and CLI credentials:
231
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
After the administration profile is configured in Extreme Management Center, the same credentials must
be configured on the device in order for Extreme Management Center to manage and configure the
device.
Summit Access Switch:
• By default, the SNMPv3 engine-ID is present within the <snmpMaster configuration> module. To
match the credentials configured within the Extreme Management Center administrative profile,
enter the command <configure snmpv3 add user xmc_v3 authentication sha
privacy aes 128>. You will be prompted with a series of password entries that must match the
passwords within the administrator profile for Authentication and Privacy.
Slot-1 Stack.3 #configure snmpv3 add user xmc_v3 authentication sha privacy aes 128
Authentication password: extreme11
Reenter authentication password: extreme11
Privacy password: extreme12extreme
Reenter privacy password: extreme12extreme
• After executing the above command, you should receive output similar to the following when you
issue the command <show configuration snmp>:
Slot-1 Stack.3 # show config snmp
#
# Module snmpMaster configuration.
#
configure snmpv3 engine-id 03:02:04:96:a1:bf:74
configure snmpv3 add user "xmc_v3" engine-id 80:00:07:7c:03:02:04:96:a1:bf:74 authentication sha
auth-encrypted localized-key
23:24:70:53:44:6f:42:4c:66:74:31:74:4b:35:68:7a:6a:63:39:42:56:58:4c:4a:61:56:6d:68:49:2f:47:42:
74:75:36:6c:31:4a:59:38:37:4d:78:33:4b:45:30:4c:6c:4a:54:6e:51:3d privacy aes 128 privacy-
encrypted localized-key
23:24:67:64:65:6f:79:41:45:2b:59:68:66:63:34:61:67:6a:67:33:44:62:78:6a:37:4e:4d:49:4f:6f:7a:46:
31:34:53:43:79:36:6b:79:44:71:52:71:33:30:4b:41:50:51:56:78:49:3d
• Enter the following commands to complete the SNMPv3 configuration for this Validated Design.
The following shows the commands and their output.
config snmpv3 add group snmpv3group user xmc_v3 sec-model usm
config snmpv3 add access snmpv3group sec-model usm sec-level priv read-view defaultAdminView
write-view defaultAdminView notify-view defaultAdminView
configure snmpv3 add community "private" name "private" user "v1v2c_rw"
configure snmpv3 add community "public" name "public" user "v1v2c_ro"
enable snmp acc snmpv3
disable snmp access snmp-v1v2c
disable snmpv3 default-group
232
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
Profiles are used to define access to the wireless controllers in the network by creating identities used for
authentication when performing SNMP queries and sets and identities for CLI operations.
A profile can be configured with the SNMP version to be used for the read and write user and security
level. It also points to a set of CLI credentials for the wireless controllers.
In the Automated Campus EVD, a profile that uses SNMPv3 was created and is used by Extreme
Management Center for the wireless controllers. For CLI, SSH access is enabled. Authentication for CLI is
done via RADIUS server.
233
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• To create new CLI credentials, go to Administration Profiles CLI Credentials and click
Add.
• Only SSH is permitted for management connections to the network devices. Telnet access is
disabled.
1. Configure a Description
2. Configure a User Name
3. Configure SSH as the Type.
4. Configure a Login Password.
5. Configure an Enable Password.
6. Configure a Configuration Password.
7. Click Save
234
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• To create a new Wireless Profile for the wireless controllers, go to Administration Profiles and
click Add.
3. Select New…
4. Add SNMP Credential Window Appears.
235
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• The same SNMPv3 user with the same authentication protocol and password and the same
privacy protocol and password must be created on the ExtremeWireless Controllers.
• Configure the created profile with the new SNMP and CLI credential:
236
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
237
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
238
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
239
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
240
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
241
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• The option to set the Authenticate to OS on Failure to Authorization Group checkbox allows
the XMC server to still be accessible to a configured Authorization Group if authentication fails.
• When a new user is added, an associated Authorization Group – with the appropriate capabilities –
must be created in the Authorization Groups window.
242
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
To configure SSH access to Extreme Management Center, click Manage SSH Configuration under SSH
Configuration. A popup will appear with appropriate fields to configure the port, primary and secondary
RADIUS servers, and the SSH user that should have access.
243
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
ExtremeWireless Controllers
Users connecting to the wireless controllers for management operations can be authenticated locally or by
using a RADIUS server; the example below shows RADIUS requests forwarded to NAC servers which
then uses LDAP to authenticate with the Active Directory server.
• To enable the use of a server, go to Controller Administration Login Management. Click
the Configure button and enable RADIUS.
244
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Go to the RADIUS Authentication tab to select the ExtremeControl engines as RADIUS servers.
The NAS IP address is the IP address the wireless controller will use as a source when sending
RADIUS requests. This address must be in the Switch list on ExtremeControl. Select the
appropriate Authentication type configured for your topology; MS-Chap2 is used in this example.
After configuring all fields, use the Test button to verify authentication.
• In ExtremeControl, ensure that the “mgmt=su:” attribute is added to the Netadmin Policy Mapping
(noted in Profiles and Policy Mappings).
• To test RADIUS connectivity:
245
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
Note
The resulting configuration below is added automatically to the access switch upon adding it to ExtremeControl.
This process is documented in the Wired User Access section.
• Configure the ExtremeControl appliances as the primary and secondary radius servers, along with
a secret key, for authenticated login:
radius server host 172.9.99.120 key ****** source-ip 10.0.0.210
radius server host 172.9.99.121 key ****** source-ip 10.0.0.210
radius enable
radius sourceip-flag
246
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
2. In XMC, add the VSP switches to the ExtremeControl engine and configure:
247
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• In the new Add RADIUS Attribute Configuration window, name your profile; in this instance we
used VSP Policy.
• Add the RADIUS attributes profile configuration. For the profile configuration, use the following
values, then click SAVE:
Filter-Id=Enterasys:version=1:%MANAGEMENT%policy=%POLICY_NAME%
Service-Type=%MGMT_SERV_TYPE%
Passport-Access-Priority=%CUSTOM1%
• You can set RADIUS Accounting to Enabled according to the needs of your topology.
• Subsequent fields can be configured to match your topology. In our topology:
o Management RADIUS Server 1 set to None since RADIUS requests are passed through
the NAC engines already configured.
o Policy Enforcement Point 1 and 2 set to None.
o Policy Domain set to Do Not Set since we are only configuring Management Access.
• Then click Save.
248
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
3. In XMC, the User profile needs to be edited with one or more custom entries that maps to the
RADIUS attribute values.
249
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Select the User profile/Policy mapping to be edited and click Edit. In this EVD, the Netadmin
(Administrator) policy mapping is used for RADIUS authentication for all network devices.
• Add/verify the following values in the listed fields and Save:
o Custom 1 is set to 6 (which is an Administrator privilege).
250
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
251
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
Multicast (IGMP)
Multicast has many applications. However, for most campuses the primary use case is for video
delivery and security camera applications. In this design, IGMP and IGMP snooping will be configured
for Layer 2 multicast.
SPB-Multicast Forwarding
In order to route multicast traffic through the Automated Campus, IP Multicast Forwarding must be
enabled on all forwarding VLANs in the campus.
Note
252
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
253
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
ip spb-multicast enable
exit
254
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• Display the status of the global IP Multicast over Fabric Connect configuration:
Specifies if multicast is enabled.
======================================================================================
SPB Multicast - Summary
======================================================================================
SCOPE SOURCE GROUP DATA LSP HOST
I-SID ADDRESS ADDRESS I-SID BVID FRAG NAME
------------------------------------------------------------------------------------------------
----
1800904 172.10.32.58 226.1.1.49 16000099 4052 0x7 BEB-8284-111
1800904 172.10.32.59 226.1.1.50 16000100 4052 0x7 BEB-8284-111
GRT 172.90.1.30 225.2.2.1 16000001 4052 0x3 BEB-7254-970
GRT 172.90.1.31 225.2.2.2 16000002 4052 0x3 BEB-7254-970
255
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
================================================================================================
Mroute Route - VRF surveillance
================================================================================================
====
GROUP SOURCE SRCMASK UPSTREAM_NBR IF EXPIR PROT
------------------------------------------------------------------------------------------------
----
226.1.1.1 172.10.32.50 255.255.255.255 0.0.0.0 Vlan104 163 spb
226.1.1.1 172.10.32.60 255.255.255.255 0.0.0.0 Vlan104 1755 spb
226.1.1.2 172.10.32.51 255.255.255.255 0.0.0.0 Vlan104 196 spb
226.1.1.2 172.10.32.61 255.255.255.255 0.0.0.0 Vlan104 1637 spb
226.1.1.3 172.10.32.52 255.255.255.255 0.0.0.0 Vlan104 111 spb
Indicates the IP multicast Indicates the sources for The upstream neighbor from which IP
group for this multicast this multicast route. datagrams are received. The field displays
route. the value of 0.0.0.0 if the (S,G) source is
local or if the RP is this router.
256
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
2. Either manually enter a custom multicast group, or choose from one of the Defined groups in the
drop-down, and click Add:
3. Determine whether wireless replication is required, then click Save. Repeat this on all topologies
requiring multicast support.
257
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
Loop Protection
A Loop Protection mechanism should be in place to prevent inadvertent Layer 2 loops from occurring at
the access layer.
An edge port configured with edge safeguard immediately enters the forwarding state and transmits
BPDUs. If a loop is detected, STP blocks the port. By default, an edge port without edge safeguard
configured immediately enters the forwarding state but does not transmit BPDUs unless a BPDU is
received by that edge port.
• To configure, enable Edge Safeguard on the switch’s access ports:
config stpd s0 ports link-type edge <access ports> edge-safeguard enable bpdu-restrict
258
Extreme Automated Campus
9035775
Validated Designs – Infrastructure & Topology
• When a loop is detected on enabled ports, the port that receives the BPDU is disabled:
Slot-1 Stack.22 # show stpd s0 ports 2:15,2:16
Port Mode State Cost Flags Priority Port ID Designated Bridge
2:15 802.1D FORWARDING 20000 eDee-m-GI- 128 808f 80:00:02:04:96:a1:bf:25
2:16 802.1D DISABLED 20000 e?ee-m-GI- 128 8090 00:00:00:00:00:00:00:00
Total Ports: 2
259
Extreme Automated Campus
9035775
References
References
1. ExtremeSwitching Campus Switches
https://www.extremenetworks.com/products/switching/campus-switching/
https://documentation.extremenetworks.com/exos_22.5/EXOS_User_Guide_22_5.pdf
https://documentation.extremenetworks.com/exos_commands_22.5/EXOS_Command_Reference_22_5.
pdf
2. ExtremeWireless Campus Solutions
https://www.extremenetworks.com/products/wireless/
https://documentation.extremenetworks.com/wireless/v10_41/UG/Wireless_User_Guide.pdf
https://documentation.extremenetworks.com/wireless/v10_41/CLI/Wireless/Open_Source_Declaration/c_
about-this-guide.shtml
https://documentation.extremenetworks.com/wireless/v10_41/Integration_Guide/Wireless_Integration_G
uide.pdf
3. Extreme Management Center
https://www.extremenetworks.com/product/management-center/
https://documentation.extremenetworks.com/netsight/8.1/9035435_InstallationGuide.pdf
https://documentation.extremenetworks.com/netsight/8.1/9035223-03_XMC.pdf
4. ExtremeControl
https://www.extremenetworks.com/product/extremecontrol/
https://documentation.extremenetworks.com/netsight/8.1/9035440-01_ExtremeControl.pdf
5. ExtremeAnalytics
https://www.extremenetworks.com/product/extremeanalytics/
https://documentation.extremenetworks.com/netsight/8.1/9035426_Analytics_Deployment.pdf
https://documentation.extremenetworks.com/netsight/8.1/9035425-01_ExtremeAnalytics.pdf
6. Extreme Management Center, ExtremeControl, ExtremeAnalytics Virtual Engine Installation Guide
https://documentation.extremenetworks.com/netsight/8.1/9035427_EMC_AC_AA_Virtual_Engine_Install
_Guide.pdf
7. GTAC Knowledge
https://gtacknowledge.extremenetworks.com/
260
Extreme Automated Campus
9035775