www.networkbulls.com
Best Institute for CCNA CCNP CCSP CCIP CCIE Training in India
M-44, Old Dlf, Sector-14 Gurgaon, Haryana, India
Call: +91-9654672192
This section covers the Cisco UWN architecture, LWAPP, WLAN controller components, roaming, and mobility groups. Cisco UWN components provide scalable wireless LAN solutions using WLAN controllers to manage lightweight access points. The CCDA must understand how these components work with each other, how they scale, and how roaming and mobility groups work.
Cisco UWN Architecture
With the explosion of wireless solutions in and out of the enterprise, designers must create solutions that provide mobility and business services while maintaining network security. The Cisco Unified Wireless Network (UWN) architecture combines elements of wireless and wired networks to deliver scalable, manageable, and secure WLANs. As shown in Figure 4-2, the Cisco UWN architecture is composed of five network elements:
Figure 4-2. Cisco UWN Architecture
- Reduced Total Cost of Ownership (TCO)
- Enhanced visibility control
- Dynamic RF management
- WLAN security
- Unified wired and wireless network
- Enterprise mobility
- Enhanced productivity and collaboration
LWAPP
Lightweight Access Point Protocol (LWAPP) is a draft Internet Engineering Task Force (IETF) standard for control messaging for setup, authentication, and operations between access points (AP) and wireless LAN controllers (WLC).
With Cisco's UWN Split-MAC operation, the control and data messages are split. Lightweight Access Points (LWAP) communicate with the WLCs using control messages over the wired network. LWAPP data messages are encapsulated and forwarded to and from wireless clients. The WLC manages multiple APs, providing configuration information and firmware updates as needed.
- 802.11— Beacons, probe response
- 802.11e— Frame queuing and packet prioritization
- 802.11i— MAC layer data encryption/decryption
Controller MAC functions are
- 802.11 MAC Management— Association requests and actions
- 802.11e Resource Reservation— To reserve resources for specific applications
- 802.11i— Authentication and key management
In the LWAPP RFC draft, LWAPP control messages can be transported at Layer 2 tunnels or Layer 3 tunnels. Layer 2 LWAPP tunnels were the first method developed in which the APs did not require an IP address. The disadvantage of Layer 2 LWAPP was that the WLC needed to be on every subnet on which the AP resides. Layer 2 LWAPP is a deprecated solution for Cisco. Layer 3 LWAPP is the preferred solution.
Note
Layer 2 LWAPP tunnels use Ethertype code 0xBBBB.
As shown in Figure 4-3, Layer 3 LWAPP tunnels are used between the LWAP and the WLC. Messages from the WLC use UDP port 12223 for control and UDP port 12222 for data messages. In this solution, access points require an IP address, but the WLC does not need to reside on the same segment.
Figure 4-3. Layer 3 LWAPP

LWAPP Access Point Modes
- Monitor mode— Monitor mode is a feature designed to allow specified LWAPP-enabled APs to exclude themselves from handling data traffic between clients and the infrastructure. They instead act as dedicated sensors for location-based services (LBS), rogue access point detection, and intrusion detection (IDS). When APs are in Monitor mode, they cannot serve clients and continuously cycle through all configured channels, listening to each channel for approximately 60 ms.
- Rogue detector mode— LWAPs that operate in Rogue Detector mode monitor the rogue APs. They do not transmit or contain rogue APs. The idea is that the rogue detector (RD) should be able to see all the VLANs in the network, because rogue APs can be connected to any of the VLANs in the network (thus, we connect it to a trunk port). The switch sends all the rogue AP/client MAC address lists to the RD. The RD then forwards those to the WLC to compare with the MAC addresses of clients that the WLC APs have heard over the air. If the MAC addresses match, the WLC knows that the rogue AP to which those clients are connected is on the wired network.
- Sniffer mode— An LWAPP that operates in Sniffer mode functions as a sniffer and captures and forwards all the packets on a particular channel to a remote machine that runs AiroPeek. These packets contain information on the time stamp, signal strength, packet size, and so on. The Sniffer feature can be enabled only if you run AiroPeek, a third-party network analyzer software that supports decoding of data packets.
- Bridge mode— The Bridge mode feature on the Cisco 1030 (typically indoor usage) and 1500 access points (typically outdoor mesh usage) provides cost-effective, high-bandwidth wireless bridging connectivity. Applications supported are point-to-point bridging, point-to-multipoint bridging, point-to-point wireless access with integrated wireless backhaul, and point-to-multipoint wireless access with integrated wireless backhaul.
LWAPP Discovery
When LWAPs are placed on the network, they first perform DHCP discovery to obtain an IP address. Then Layer 3 LWAPP discovery is attempted. If there is no WLC response, the access point reboots and repeats this process. The Layer 3 LWAPP discovery algorithm is as follows:
- The AP compiles a list of WLCs.
- The AP selects a WLC based on certain criteria.
Layer 3 Discovery Requests are sent as listed:
- Local subnet broadcast
The selected WLC is based on the following:
- Previously configured primary, secondary, and/or tertiary WLCs
- The WLC configured as the Master controller
- The WLC with the most capacity for AP associations
WLAN Authentication
Wireless clients first associate to an access point. Then wireless clients need to authenticate with an authentication server before the access point allows access to services. As shown in Figure 4-4, the authentication server resides in the wired infrastructure. An EAP/RADIUS tunnel occurs between the WLC and the authentication server. Cisco's Secure Access Control Server (ACS) using EAP is an example of an authentication server.
Figure 4-4. WLAN Authentication

Authentication Options
Wireless clients communicate with the authentication server using EAP. Each EAP type has advantages and disadvantages. Trade-offs exist between the security provided, EAP type manageability, the operating systems supported, the client devices supported, the client software and authentication messaging overhead, certificate requirements, user ease of use, and WLAN infrastructure device support. The following summarizes the authentication options:
- Protected Extensible Authentication Protocol (PEAP) is a joint proposal by Cisco Systems, Microsoft, and RSA Security as an open standard. PEAP/MSCHAPv2 is the most common version, and it is widely available in products and widely deployed. It is similar in design to EAP-TTLS, requiring only a server-side PKI certificate to create a secure TLS tunnel to protect user authentication. PEAP-GTC allows more generic authentication to a number of databases such as Novell Directory Services (NDS).
- EAP-Flexible Authentication via Secure Tunneling (EAP-FAST) is a proposal by Cisco Systems to fix the weaknesses of LEAP. EAP-FAST uses a Protected Access Credential (PAC), and use of server certificates is optional. EAP-FAST has three phases. Phase 0 is an optional phase in which the PAC can be provisioned manually or dynamically. In Phase 1, the client and the AAA server use the PAC to establish the TLS tunnel. In Phase 2, the client sends user information across the tunnel.
WLAN Controller Components
- Wireless LANs
- Interfaces
- Ports
Wireless LANs are identified by unique SSID network names. The LAN is a logical entity. Each WLAN is assigned to an interface in the WLC. Each WLAN is configured with radio policies, QoS, and other WLAN parameters.
A WLC interface is a logical connection that maps to a VLAN on the wired network. Each interface is configured with a unique IP address, default gateways, physical ports, VLAN tag, and DHCP server.
The port is a physical connection to the neighboring switch or router. By default, each port is an IEEE 802.1Q trunk port. There may be multiple ports on a WLC into a single port-channel interface. These ports can be aggregated using Link Aggregation (LAG). Some WLCs have a service port that is used for out-of-band management. Figure 4-5 shows the WLC components.
Figure 4-5. WLAN Controller Components
WLC Interface Types
A WLC has five interface types:
- Virtual interface is used for Layer 3 security authentication, DHCP relay support, and mobility management.
AP Controller Equipment Scaling
Cisco provides different solutions to support the differing numbers of access points present in enterprise customers. Standalone devices, modules for integrated services routers (ISR), and modules for 6500 switches support numerous APs. Table 4-3 lists the platforms and the number of APs supported.
Roaming and Mobility Groups
The primary reason to have wireless networks is the ability to access network resources from common areas and in areas difficult to run cables. End clients might want to move from one location to another. Mobility allows users to access the network from several locations. Roaming occurs when the wireless client changes association from one access point to another. The challenge is to scale the wireless network to allow client roaming. Roaming can be intracontroller or intercontroller.
Intracontroller Roaming
Intracontroller roaming, shown in Figure 4-6, occurs when a client moves association from one AP to another AP that is joined to the same WLC. The WLC updates the client database with the new associated AP and does not change the client's IP address. If required, clients are reauthenticated, and a new security association is established. The client database remains on the same WLC.
Figure 4-6. Intracontroller Roaming

Layer 2 Intercontroller Roaming
Intercontroller roaming occurs when a client moves association from one AP to another AP that is joined to a different WLC. The Layer 2 roam occurs when the client traffic is bridged to the same IP subnet. Figure 4-7 shows Layer 2 intercontroller roaming. Traffic remains of the same IP subnet, and no IP address changes to the client occur. The client database is moved from WLC1 to WLC2. The client is reauthenticated, and a new security session is established.
Figure 4-7. Layer 2 Intercontroller Roaming

Layer 3 Intercontroller Roaming
With Layer 3 intercontroller roaming, shown in Figure 4-8, a client moves association from one AP to another AP that is joined to a different WLC. Then the traffic is bridged onto a different IP subnet. When the client associates to AP2, WLC2 then exchanges mobility messages with WLC1. The original client database is not moved to WLC. Instead, WLC1 marks the client with an "Anchor" entry in its database. The database entry is copied to WLC2's database and is marked as a "Foreign" entry. The wireless client maintains its original IP address and is reauthenticated. A new security session is then established.
Figure 4-8. Layer 3 Intercontroller Roaming

Client traffic then routes in an asymmetric manner. Traffic from the client is forwarded by the Foreign WLC, but traffic to the client arrives at the Anchor WLC, which forwards it through an Ethernet-in-IP (EtherIP) tunnel to the Foreign WLC. The Foreign WLC forwards the data traffic to the client.
Mobility Groups
When you assign WLCs to mobility groups, the WLCs dynamically exchange mobility messages and tunnel data via EtherIP. Mobility groups support up to 24 controllers. The upper limit of APs is bounded by the controller types and the number of APs supported by each controller. Each WLC is configured with a list of the members in the mobility group. The WLCs exchange messages using UDP port 16666 for unencrypted messages or UDP port 16667 for encrypted messages. As an example of the scalability, if 24 Cisco 2000 WLCs are used, 24 * 6 = 144 APs are supported.
Cisco recommends minimizing intercontroller roaming in the network. It is also recommended that there be less than 10 ms of round-trip time latency between controllers. Cisco also states that Layer 2 roaming is more efficient than Layer 3 roaming because of the asymmetric communication of Layer 3 roaming.
Hey Nice Blog!! Thanks For Sharing!!!Wonderful blog & good post.Its really helpful for me, waiting for a more new post. Keep Blogging!
ReplyDeleteNetworking training in Coimbatore
CCNA Training in Coimbatore