Free CCNA | Wireless Architectures | Day 56 | CCNA 200-301 Complete Course
Welcome to Jeremy’s IT Lab Introduction to CCNA Course
Overview of the Video Series
- The video is part of a free, complete course for the CCNA, encouraging viewers to subscribe and engage with the content.
- The focus of this video is on wireless LANs, building upon fundamental concepts discussed in previous videos.
Wireless Architectures
- This session will delve into specific wireless architectures within the broader network context, including wired infrastructure.
- Key exam topics covered include access points (1.1d), controllers (1.1e), and additional topics (2.6, 2.7, 2.8).
802.11 Frame Format
Understanding 802.11 Frames
- The video introduces the unique characteristics of 802.11 frames compared to Ethernet frames, noting their complexity.
- A high-level overview of frame fields is provided; not all fields are present in every message type.
Key Fields in 802.11 Frames
- Frame Control: A 2-byte field indicating message type and subtype.
- Duration/ID Field: Indicates transmission time or serves as an identifier for client association with AP.
- Address Fields: Up to four addresses can be included—Destination Address (DA), Source Address (SA), Receiver Address (RA), and Transmitter Address (TA).
Additional Frame Components
- Sequence Control: Used for reassembling fragments and eliminating duplicates.
- Quality of Service Control: Prioritizes certain traffic types; introduced in later standards like 802.11n and 802.11ac.
Association Process in Wireless Networks
Connection States Explained
- For a station to send traffic through an AP, it must go through three connection states: unassociated, authenticated but unassociated, and fully associated.
Scanning Methods
- Stations can discover available APs using two methods:
- Active Scanning: Sending probe requests and listening for responses from AP.
- Passive Scanning: Listening for periodic beacon messages sent by AP.
Connection States in Wireless Networks
Overview of Connection States
- The connection process begins with the station being aware of the Access Point (AP) and its Basic Service Set (BSS) through active or passive scanning, but it remains unauthenticated and unassociated.
- An authentication exchange occurs when the station sends a password to the AP; successful authentication leads to an "authenticated but not yet associated" state.
- The final step is an association request and response, which, if successful, results in the station being both authenticated and associated, allowing traffic to flow through the AP.
Types of 802.11 Messages
- There are three main types of 802.11 messages:
- Management Frames: Used for managing BSS; includes probe, beacon, authentication, and association messages.
- Control Frames: Control access to radio frequencies; examples include Request to Send (RTS), Clear to Send (CTS), and ACK messages.
- Data Frames: Carry actual data packets.
Wireless Access Point Deployment Methods
Autonomous Access Points
- Autonomous APs operate independently without relying on a Wireless LAN Controller (WLC); they are configured individually via console cable or remote connections like telnet or SSH.
- Each AP requires manual configuration for IP addresses, radio frequency parameters, security policies such as ACLs, and QoS settings; there is no central management.
Network Configuration with Autonomous APs
- In networks using autonomous APs, each should connect via trunk links due to multiple SSIDs mapped to VLANs; even single SSID setups require trunking for management traffic separation.
- Best practices dictate that management traffic should be kept separate from regular data traffic by placing it in distinct subnets and VLANs.
Challenges with Autonomous AP Deployment
- Data traffic flows directly between wireless clients and their respective AP without needing wired network intervention; this can lead to inefficient VLAN stretching across large networks.
- Issues arise from large broadcast domains caused by stretched VLAN configurations leading to excessive broadcast message flooding throughout the network.
Limitations of Autonomous Access Points
Scalability Concerns
- While suitable for small networks, autonomous AP deployment becomes impractical in medium-to-large environments due to challenges in configuring thousands of individual devices effectively.
Lightweight Access Points Overview
Functionality Split Between Devices
- Lightweight AP functions are divided between themselves and a WLC:
Wireless LAN Controller and Split-MAC Architecture
Overview of Split-MAC Architecture
- The Wireless LAN Controller (WLC) centrally manages multiple lightweight Access Points (APs) using a split-MAC architecture, which divides functions between the WLC and APs.
- WLC can be located in the same or different subnet/VLAN as the managed lightweight APs, facilitating flexible network design.
- Authentication between WLC and lightweight APs is secured through digital certificates following the X.509 standard, preventing unauthorized access.
Communication Protocol: CAPWAP
- Lightweight APs and WLC communicate via CAPWAP (Control and Provisioning of Wireless Access Points), which is based on LWAPP (Lightweight Access Point Protocol).
- Two separate tunnels are established for communication: a control tunnel using UDP port 5246 for management operations, and a data tunnel using UDP port 5247 for client traffic.
Traffic Flow in Split-MAC vs. Autonomous Architectures
- The control tunnel encrypts all traffic by default, ensuring secure management communications; however, the data tunnel does not encrypt traffic unless configured with DTLS.
- In split-MAC architecture, lightweight AP connects to switch access ports rather than trunk ports since all client traffic is tunneled to the WLC first.
- Unlike autonomous AP architectures where each SSID maps to a VLAN directly at the AP level, in split-MAC architecture, this role is taken over by the WLC.
Benefits of Using Split-MAC Architecture
- Scalability is enhanced with centralized management from WLC allowing support for thousands of AP deployments that would be unmanageable with autonomous systems.
- Dynamic channel assignment allows automatic selection of channels per AP without manual planning; transmit power adjustments ensure optimal coverage without interference.
Access Point Modes and Cloud-Based Architecture
Overview of Access Point (AP) Modes
- The standard operational mode of an AP is to offer one or more Basic Service Sets (BSSs) for clients.
- FlexConnect mode allows the AP to locally switch traffic between wired and wireless networks if connectivity to the Wireless LAN Controller (WLC) is lost, enabling local forwarding like an autonomous AP.
- Sniffer mode dedicates the AP to capturing 802.11 frames and sending them to packet capture software such as Wireshark, without offering a BSS for clients.
- Monitor mode also does not provide a BSS; instead, it focuses on detecting rogue devices by receiving 802.11 frames and can send de-authentication messages if a rogue device is identified.
- Rogue detector mode listens only on the wired network for ARP messages, correlating this data with suspected rogue client information from the WLC.
Additional Access Point Modes
- SE-connect (Spectrum Expert Connect) focuses on RF spectrum analysis across all channels, sending data to software like Cisco Spectrum Expert for interference detection.
- Bridge/Mesh mode allows lightweight APs to act as dedicated bridges over long distances or create mesh networks connecting multiple sites.
- Flex plus bridge combines FlexConnect functionality with bridge/mesh capabilities, allowing local traffic forwarding even when WLC connectivity is lost.
- Understanding these modes' basic purposes is essential for CCNA exam preparation; memorization isn't necessary but comprehension is key.
Cloud-Based Access Point Architecture
- Cloud-based architecture represents a middle ground between autonomous and split-MAC architectures, featuring centrally managed autonomous APs in the cloud.
- An example of this architecture is Cisco Meraki, which uses a web dashboard for configuration, monitoring, and performance reporting while managing channel usage and transmit power settings.
- Unlike traditional cloud models where all data might be sent to the cloud, only management or control traffic goes there; regular data traffic flows directly through the wired network.
- Meraki's management data travels to its cloud while user data remains direct between endpoints like PCs communicating with each other.
Wireless LAN Controller Deployment Models
- The discussion shifts towards WLC deployment models relevant only in split-MAC architecture contexts rather than autonomous or cloud-based architectures.
- Four main deployment models are outlined:
- Unified WLC deployment involves a hardware appliance located centrally within the network.
- Cloud-based WLC deployment runs as a VM in private clouds within data centers but utilizes lightweight AP configurations.
- Embedded WLC integrates into switches within the network infrastructure.
Unified Wireless LAN Controllers (WLC) Overview
Types of WLC Deployments
- A unified WLC is a separate hardware appliance that can support up to 6000 APs, suitable for large enterprise campuses. Additional WLCs can be added if more capacity is needed.
- Cloud-based WLC operates as a VM in a private cloud data center, supporting around 3000 APs. More VMs can be added for additional capacity. This differs from earlier discussed cloud-based AP deployments.
- Embedded WLCs are integrated within switches and support approximately 200 APs. To scale beyond this limit, more switches with embedded WLCs must be added, making them ideal for smaller campuses.
- Cisco Mobility Express integrates the WLC within an AP itself, allowing it to build internal CAPWAP tunnels. It supports about 100 APs and is suited for small branch offices.
Summary of Deployment Models
- The video summarizes four deployment types: unified, cloud-based, embedded, and Mobility Express along with their respective capacities for supporting access points (APs). Familiarity with these models is essential for exam preparation.
802.11 Messages and Frame Formats
Key Differences Between Wireless and Wired Networks
- The discussion begins with an introduction to various types of 802.11 messages and the frame formats used in wireless communication compared to wired networks (802.3 Ethernet frames).
Access Point Types
- Three main types of access points are covered: autonomous, lightweight, and cloud-based. Understanding their basic characteristics and differences is crucial.
Quiz Questions on Wireless Concepts
Quiz Question Insights
- The first quiz question asks about the type of message an 802.11 probe request represents; the answer is management.
- The second question focuses on which AP types are centrally managed; answers include lightweight and cloud-based AP types.
- The third question addresses which AP type utilizes the CAPWAP protocol; the correct answer is lightweight AP.
- Another quiz question explores which lightweight AP modes provide a BSS for clients; local mode (default operating mode) and FlexConnect are identified as correct answers.
This structured overview captures key concepts related to wireless LAN controllers, their deployment models, differences between wireless messaging protocols, as well as quiz questions designed to reinforce understanding of these topics.