VLAN routing question
Our network uses vlans extensively to segregate traffic. I've been asked to create another, with a catch.
Our last audit pointed out that our conference rooms provide network access for both staff and visitors/vendors. Visitors/vendors, whether wired or wireless, get IP's on the same vlan as staff... potentially getting access to the same domain resources.
The new vlan is to be for any non-domain authenticated laptops, and is to only permit access to the internet. I've read about this, but never had to set up anything like it, so I have obvious questions.
For example, how do I use 8021x or taccacs to assign a vlan dynamically, ensuring that visitors are put into the restricted vlan, while domain-authenticated machines get the regular user vlan? Do I have to use an isolated vlan to control routing and ensure that the restricted vlan can reach the core, but from there, only the firewall? or would an acl / route-map suffice?
I would appreciate any thoughts from you techies who've rolled out something like this.
Much obliged,
Mike
Our last audit pointed out that our conference rooms provide network access for both staff and visitors/vendors. Visitors/vendors, whether wired or wireless, get IP's on the same vlan as staff... potentially getting access to the same domain resources.
The new vlan is to be for any non-domain authenticated laptops, and is to only permit access to the internet. I've read about this, but never had to set up anything like it, so I have obvious questions.
For example, how do I use 8021x or taccacs to assign a vlan dynamically, ensuring that visitors are put into the restricted vlan, while domain-authenticated machines get the regular user vlan? Do I have to use an isolated vlan to control routing and ensure that the restricted vlan can reach the core, but from there, only the firewall? or would an acl / route-map suffice?
I would appreciate any thoughts from you techies who've rolled out something like this.
Much obliged,
Mike
There are only 10 kinds of people... those who understand binary, and those that don't.
CCIE Studies: Written passed: Jan 21/12 Lab Prep: Hours reading: 385. Hours labbing: 110
Taking a time-out to add the CCVP. Capitalizing on a current IPT pilot project.
CCIE Studies: Written passed: Jan 21/12 Lab Prep: Hours reading: 385. Hours labbing: 110
Taking a time-out to add the CCVP. Capitalizing on a current IPT pilot project.
Comments
To dynamically assign a vlan, you would need some kind of vlan policy server, but even then you would probably need the MAC address or some kind of identifying info from the visitor laptop.
I would create a visitor vlan, and assign it to a couple switch ports for each conference room, and then use a Vlan map, or ACL to deny that subnet from getting anywhere besides a dhcp server and the internet.
With wireless, maybe you could put a WAP in the visitor vlan with all the same restrictions on the vlan. Make the new WAP have a Visitor SSID and isolate that wireless network from the rest of the network.
we currently use the vmps "fallback" vlan as our guest vlan.
this is implemented as a dmz on the firewall with internet access.
http://www.cisco.com/en/US/docs/switches/lan/catalyst3550/software/release/12.1_19_ea1/configuration/guide/Sw8021x.html#wp1065246
Hey NS... you have a good memory. I lasted 10 weeks at the college, and decided I wan't enjoying it. I did really like the wireless layout, and took advantage of the opportunity to learn all I could about Symbol/Motorola controllers. Other than that, it wasn't much fun... too much entry level work, despite the fancy title. So, I called Toyota Canada back up, and they hadn't yet filled my role, and what do ya know, they offered it back to me. Couple weeks now.
Anyway, 100% Cisco again. Ah, feels like home.
So I can pursue a pure cisco solution to the issue.
I was hoping to not have to set up a policy server... seems a lot of work for one vlan. Having said that, I'll do that over having to hardset switch ports to the restricted vlan... that has "problematic" written all over it. I'll be changing them daily to suit the people in the room.
I like your idea of the second wlan with a unique ssid. That'll work.
Guess I'll start reading up on policy server.
CCIE Studies: Written passed: Jan 21/12 Lab Prep: Hours reading: 385. Hours labbing: 110
Taking a time-out to add the CCVP. Capitalizing on a current IPT pilot project.
Are you looking for a pure Cisco solution to this problem?
It's quick and easy, but probably not as secure.
Thanks
Wireless ---Gateway---Tunnel----Firewall ----Internet
100% pure. Extra virgin, if possible.
CCIE Studies: Written passed: Jan 21/12 Lab Prep: Hours reading: 385. Hours labbing: 110
Taking a time-out to add the CCVP. Capitalizing on a current IPT pilot project.
Perfect. I like it. And it does sound easier than I expected. I'll look into the GRE tunnel. And it didn't need to be a super-secure solution... just get visitors off our production user vlan.
I'm back to wondering about the wired side of the equation.
CCIE Studies: Written passed: Jan 21/12 Lab Prep: Hours reading: 385. Hours labbing: 110
Taking a time-out to add the CCVP. Capitalizing on a current IPT pilot project.
mikearama,
Since I'm currently enrolled in the Cisco Networking Academy course called "Fundamentals of Wireless LANs" I'd like to help with the wireless part.
Based on what I've learned so far, you can configure a Cisco 1200 series Access Point to associate a certain SSID to a certain VLAN. So let's say you can associate the SSID of CORP to the VLAN for the Staff and the SSID of ANYONE to the VLAN for the Visitors/Vendors. Then you'd have to contain the second VLAN on the wired network so that the VLAN only has internet access as desired. Then you could freely let everyone know the SSID of "ANYONE" to, um, anyone.
It may very well be physically impossible to connect the vlan directly to the firewall. Therefore, the GRE tunnel will allow the guest traffic to traverse the entire network without showing a potential hacker hops it takes to get over to the firewall. I'm sure there are 1000 ways to set up this scenario, this is just my 2 cents.
The Cisco APs support multiple vlans with different SSIDs. The config is different if you are using Wireless Controllers and lightweight APs or Autonomous mode APs. Either way they support this and its used for this purpose.
So I would create a new vlan and add your guest network to it.
Then create a simple ACL that allows DHCP but blocks access to the rest of the network. I think its UDP Port 67.
ip access-list extended 100
permit udp any host DHCPSERVERIP bootpc or bootps I forget which one is the which.
deny ip any 10.0.0.0 0.255.255.255 log Assuming you use the 10.x.x.x network internally.
permit ip any any
This way the only traffic allowed out of the vlan is traffic destined for any network other than 10.x.x.x.
Then I would setup my DHCP server scope to hand out IPs in the 172.16 range so you can easily tell the traffic apart and use a public DNS server like www.opendns.com to serve DNS. You can even use your switch to serve DHCP so you don't have to allow anything to your internal network.
I'd then configure a few ports in the conference rooms and label them as internet only and put them in the same vlan as the guest AP Vlan. Enable DHCP Snooping, DAI, etc, etc, to keep the script kiddies at bay.....
I think for a quick and easy solution that works. I'd mess with it in a lab and try to break it before implementing.
If you want to make it complicated or don't have the budget for another internet connection put the AP into its own VLAN and use QoS to give that AP the lowest priority possible so that errant surfing doesn't grind your network down.
CCNA Security | GSEC |GCFW | GCIH | GCIA
[email protected]
http://twitter.com/paul_bosworth
Blog: http://www.infosiege.net/
CCNP Progress
ONT, ISCW, BCMSN - DONE
BSCI - In Progress
http://www.redwarriornet.com/ <--My Cisco Blog
We had a competitors version at the university I was at last, and it was a sweet ride. I'll just never get it approved for visitors internet access.
Mike
CCIE Studies: Written passed: Jan 21/12 Lab Prep: Hours reading: 385. Hours labbing: 110
Taking a time-out to add the CCVP. Capitalizing on a current IPT pilot project.