[go: up one dir, main page]

Published using Google Docs
[Orion 2022 Guide] Cisco 9800 Initial Setup
Updated automatically every 5 minutes

Configure Cisco Catalyst 9800 Series
Wireless LAN Controller

This guide describes how to set up and test your environment so you can use it with radsecproxy and Orion Wifi:

Prerequisites

Log in to the Cisco Catalyst 9800 Series Wireless Controller Dashboard

Set up a secure RADIUS connection

Add RADIUS authentication and accounting servers

Add a RADIUS server group

Create Authentication Method List

Configure Hotspot 2.0

Configure ANQP Server Parameters

General/OpenRoaming settings

Server Settings

Configure the Wireless LAN Profile

Create the SSID

Associate the security profile and RADIUS servers with the wireless LAN

Configure Policy Profile

Configure Policy Tag

Assign Policy Tag

Troubleshoot the configuration

RCOI and EAP settings

RADIUS service

Prerequisites

Use Cisco IOS XE Amsterdam 17.3 or later for Orion Wifi.

Log in to the Cisco Catalyst 9800 Series Wireless Controller Dashboard

To start the configuration process, log in to the Cisco Catalyst 9800-CL Wireless Controller Dashboard as admin.  For existing environments with additional users, log in as a user with administrative privileges.

The Cisco Catalyst 9800-CL Wireless Controller Dashboard appears. Your access points are displayed.

Note: There are a number of options you can set. Only the options that require your input are shown. Default values are used for options that don’t need adjustment.

Set up a secure RADIUS connection

It’s important to set up a secure RADIUS connection between the wireless LAN controller and Orion Wifi.


Orion Wifi uses RADIUS over TLS (RadSec) to ensure end-to-end encryption of AAA traffic. Because the Cisco Catalyst 9800-CL wireless LAN controller doesn’t natively support RadSec, AAA traffic is directed to a RadSec proxy (radsecproxy) before the traffic is sent over the internet.

We recommend that you create a primary and a secondary RADIUS server for high availability. Then create a server group and add those servers to the group.  

Add RADIUS authentication and accounting servers

  1. Select Configuration > Security > AAA from the menu on the left side of the Dashboard.



    The
    AAA page appears.


  2. Make sure that RADIUS and Servers are selected.
  3. Click + Add under Servers/Groups.

    The
    Create AAA Radius Server dialog box appears.


  4. Enter a Name, such as “RadSec-1”.
  5. For the Server Address enter the IP address of the radsecproxy server.
  6. For Key, enter “radsec”, then enter the same value for Confirm Key.
  7. Verify that Auth Port is 1812 (RADIUS authentication) and Acct Port is 1813 (RADIUS accounting).
  8. For Server Timeout, enter “30” seconds. This is the maximum timeout as recommended in RFC 5080.
  9. Verify that Support for CoA is Enabled.
  10. Click Apply to Device on the bottom right.

    You return to the
    AAA page where the server you added is listed.



  11. To review or edit server values, select the server in the list.


  12. Repeat steps 3-10 to add a second (high-availability) RADIUS server.

Add a RADIUS server group

Using a server group, you can separate Orion Wifi authentication requests from the rest of your network. If you don’t create a server group, the controller will send authentication requests to the default server group, which might contain servers that aren’t associated with Orion Wifi.

  1. Navigate to Configuration > Security > AAA.
  2. On the AAA page, under Servers/Groups, select the Server Groups tab.
  3. Make sure that RADIUS and Server Groups are selected.
  4. Click + Add under Servers/Groups.

    The
    Create AAA Radius Server Group dialog box appears.


  5. Enter a Name, such as “RadSec-Proxy”.
  6. Select all of your RADIUS servers under Available Servers.
  7. Click > to move the servers to Assigned Servers.
  8. Click Apply to Device on the bottom right.

    You see a message indicating that the configuration was saved. You return to the
    AAA page where the server group you added is listed.


Create Authentication Method List

  1. Navigate to Configuration > Security > AAA > AAA Method List >+ Add

The Quick Setup : AAA Authentication box appears.

  1. Enter a Method List Name, such as “ml-radsec”.
  2. For the category Type select dot1x from the drop down menu.
  3. For the category Group Type select group from the drop down menu.
  4. Select all of your RADIUS servers under Available Servers.
  5. Click > to move the servers to Assigned Servers.
  6. Click Apply to Device on the bottom right.

Configure Hotspot 2.0

Hotspot 2.0 allows mobile devices to join a WiFi network automatically, including during roaming, when the devices enter the Hotspot 2.0 area.

Configure ANQP Server Parameters

Access Network Query Protocol (ANQP) provides a range of information, such as IP address type and availability, and roaming partners accessible through a hotspot.

  1. Select Configuration > Wireless > Hotspot/Openroaming from the menu on the left side of the Dashboard.



    The
    Hotspot/OpenRoaming page appears.


  2. Click + Add under ANQP Servers.

    The
    Add New ANQP Server dialog box appears. The General/OpenRoaming tab is selected.


General/OpenRoaming settings

  1. In the Add New ANQP Server dialog box, enter a Name for the server, such as “Orion”.
  2. Check the box next to Internet Access.
  3. For Network Type, select Chargeable Public.


  4. In the NAI Realms section on the bottom left, click + Add.

    The
    Add NAI Realm page appears.


  5. For NAI Realm Name, enter “orionwifi.com”.
  6. For EAP Method, select eap-tls.

    An EAP-TLS dialog box appears.
  7. For credential, select certificate. This is the EAP authentication method.
  8. Click Save at the bottom of the EAP-TLS dialog box.


  9. Click Apply to Device at the bottom of the Add NAI Realm dialog box.

    You see orionwifi.com listed as an NAI realm.


  10. In the Roaming OIs section on the top right, enter “f4f5e8f5f4” for Roaming OI.
  11. Click + Add.

    You see the RCOI under Assigned ROI :: Beacon State.
  12. Check the box next to Beacon State. This includes the RCOI in access point broadcasts.


  13. In the Domains section, enter “orionwifi.com” for Domain Name.
  14. Click + Add.

    You see the domain name in the Domain Name list.


Server Settings

  1. Still on the  Add New ANQP Server dialog box, select Server Settings at the top.

    The
    Server Settings page appears.


  2. In the WAN Metrics section, set the parameters as appropriate for your network. Don’t leave these values blank.
  3. Set Link Status to Up.
  4. Don’t enable Full Capacity Link unless you want to block devices from connecting. This setting tells devices that there’s no bandwidth available so devices will refuse to connect.


  5. Click Apply to Device at the bottom right.

    You see a message indicating that the configuration was saved. You return to the
    Hotspot/OpenRoaming page where the ANQP server you added is listed.


Configure the Wireless LAN Profile

To configure the wireless LAN, you create an SSID to identify the wireless LAN. Then you associate the security profile and RADIUS servers with the wireless LAN.

Create the SSID

  1. Select Configuration > Tags & Profiles > WLANs from the menu on the left side of the Dashboard.



    The
    WLANs page appears.


  2. Click + Add.

    The
    Add WLAN dialog box appears. The General tab is selected.


  3. Enter a Profile Name, such as, “Orion”.
  4. For SSID, enter “Orion”.
  5. Change Status to Enabled.
  6. Click Apply to Device on the bottom right.



    You see a message indicating that the configuration was saved. You return to the WLANs page where the wireless LAN you added is listed.


Associate the security profile and RADIUS servers with the wireless LAN

  1. Navigate to Configuration > Tags & Profiles > WLANs.
  2. Select the wireless LAN you added.

    The
    Edit WLAN page appears.



  3. Select Security at the top. The Layer2 tab is selected.


  4. For Layer 2 Security Mode, select WPA + WPA2 (default).
  5. Verify that the boxes next to these security options are checked:
    WPA2 Policy 
    WPA2 Encryption AES(CCMP128) 
    Auth Key Mgmt
     802.1x
  6. Select AAA at the top.
  7. Select the Authentication list created earlier from the drop down menu, “ml-radsec”.

  1. Click Apply to Device on the bottom right.

        

Configure Policy Profile

A Policy Profile enables you to assign parameters like VLAN, Access Controls List [ACLs], Quality of Service [QoS].

  1. Navigate to Configuration > Tags & Profiles > Policy  > ADD+
  2. The Add Policy Profile page appears.

        

  1. Enter a Policy Name, such as, “Orion”
  2. Enter a Policy Description, such as, “Orion”
  3. Enable the Status of this profile by clicking on the category.



  1. Still on the  Add Policy Profile dialog box, select Access Policies option at the top.

The Access Policies page appears as below:

  1. Enter the VLAN ID allocated for Orion WLAN, incase of default VLAN type the number 1. DO NOT leave this field blank or select default from the drop down menu.

        

  1. Still on the  Add Policy Profile dialog box, select Advanced option at the top.

The Advanced Option page appears:

  1. Under Hotspot Server option (Top right) select the Hotspot Server name configured earlier, “Orion”.
  2. Under AAA Policy (Bottom Left) check the box next to Allow AAA Override.

  1. Click Apply to Device at the bottom right.

Configure Policy Tag

A Policy tag is configured to connect the WLAN Profile to the Policy Profile.

  1. Navigate to Configuration > Tags & Profiles > Tags > Policy > ADD
  2. The Add Policy Tag dialogue box appears.


  1. Enter a Profile Name, such as, “Orion”.
  2. For Description, enter “Orion”.
  3. Click on ADD under WLAN-POLICY Maps

  1. Select the WLAN Profile configured earlier from the drop down menu option.
  2. Select the Policy Profile configured earlier from the drop down menu option.

  1. Click on the check mark below & Save & Apply to Device on the bottom right.

Assign Policy Tag

To deploy configured policies to the Access Points each Policy Tag should be attached to the required Access Point.

  1. Navigate to Configuration > Wireless Setup > Advanced > Start Now > Apply

        

  1. Click on Tag APs (Bottom Right) of the page

        

  1. Select the Access Points to be tagged and +Tag APs from the Top of the page
  2.  The Tag APs dialogue box appears

  1. For Policy select the Policy Tag configured earlier from the drop down menu.

  1. Click Save & Apply to Device on the bottom right.

Troubleshoot the configuration

RCOI and EAP settings

If the Roaming Consortium Unique Identifier (RCOI) and  EAP method aren’t set correctly, mobile devices can’t automatically connect (which is intended). If radsecproxy logs are showing an attempt to connect but failing, it means radsecproxy IP addresses are probably correct in the RADIUS authentication and accounting settings, but the EAP settings could be wrong.

Review General/OpenRoaming settings to make sure your configuration is correct.

RADIUS service

If the IP addresses or secrets used for the primary and secondary servers are wrong, the RADIUS server can’t be contacted.  In this situation, radsecproxy logs can’t be generated, because traffic isn’t passing to the wireless LAN controller from radsecproxy.  

If no new logs are coming in, it means the SSID isn’t passing traffic to radsecproxy. If this is the case, you should check the RADIUS configuration.