SonicPoint : SonicPoint > SonicPoints

SonicPoint Layer 3 Management
This section provides an introduction to the SonicPoint Layer 3 Management feature.
Topics:
What is SonicPoint Layer 3 Management?
In previous releases, the Dell SonicWALL security appliance and the SonicPoints that it manages had to be in the same Layer 2 network, which limits the scalability of networks, especially enterprise networks.
SonicPoint Layer 3 Management provides a wireless solution that can be easily scaled from small to large while maintaining the centralized SonicOS network security protection and providing flexible policy control.
Benefits
SonicPoint Layer 3 Management offers the following benefits:
Supported Platforms
SonicPoint Layer 3 Management is supported on all Dell SonicWALL security appliances that can provision SonicPoints.
Layer 3 Management Protocols
CAPWAP
The Controlling and Provisioning of Wireless Access Points (CAPWAP) protocol is a standard, interoperable protocol that enables an Access Controller (in our case, the Dell SonicWALL security appliance) to manage a collection of Wireless Termination Points (SonicPoints), independent of Layer 2 technology. CAPWAP is defined in RFC 5415:
http://www.ietf.org/rfc/rfc5415.txt
Dell SonicWALL CAPWAP supports both Layer 2 and Layer 3 management.
SAMP
The SonicWALL Advanced Management Protocol (SAMP) suite consists of these three protocols:
SonicWALL DHCP-based Discovery Protocol (SDDP) - SDDP enables the Dell SonicWALL security appliance and the SonicPoints to discover each other automatically across Layer 3 networks. The appliance acts as the DHCP server and the SonicPoint acts as the DHCP client, which allows the Dell sonicWALL . Any routers or other network devices between the appliance and the SonicPoint must be configured to allow DHCP relay.
SonicWALL Control and Provisioning Wireless Access Point (SCAPWAP) - SCAPWAP is a Dell SonicWALL extension of CAPWAP that is customized for Dell SonicWALL products. The Dell SonicWALL network security appliance gateway manages the SonicPoints using SCAPWAP, independent of Layer 2 and Layer 3 networks. The Dell SonicWALL security appliance and the SonicPoints must be configured to do mutual authentication using either a pre-shared key or a public key-based certificates.
SonicWALL SSLVPN-based Management Protocol (SSMP) - SSMP is based on the Dell SonicWALL SSL VPN infrastructure and enables the SonicPoints to be managed over the Internet by a Dell SonicWALL security appliance. In this case, a single NetExtender SSL VPN tunnel is established between the appliance and the SonicPoint. All of a user’s SonicPoint traffic to the appliance is tunneled over this single NetExtender session.
How SonicPoint Layer 3 Management Works
SonicPoint Layer 3 Management provides a broader wireless solution for both local and remote networks and for both small and large deployments—all with centralized SonicOS network security protection and flexible policy control.
The following three SonicPoint deployment scenarios are supported:
Local Layer 2 Management – When a Dell SonicWALL network security appliance and its SonicPoints are deployed in the same Layer 2 network, the existing Layer 2 discovery protocol, SDP, is used to manage the access points.
Local Layer 3 Management – When SonicPoints are deployed outside of the Layer 2 network, but within the same Intranet as the Dell SonicWALL security appliance (for example when there is a third-party router between the Dell SonicWALL security appliance and the SonicPoints), Layer 3 management protocols can be used to manage the access points.
Remote Layer 3 Management– When SonicPoints are deployed in a remote site across the Internet cloud, Layer 3 management can be used to manage the remote network access points. A single SSL VPN NetExtender tunnel is established between the SonicPoint and the remote the Dell SonicWALL security appliance. Each wireless client does not need to install and launch NetExtender to establish an SSL VPN tunnel. All the wireless clients share the same VPN tunnel. This reduces the number of NetExtender licenses required on the Dell SonicWALL security appliance. It also eliminates the need to establish individual tunnels for each SonicPoint.
Configuring SonicPoint Layer 3 Management
For a SonicPoint overview, see SonicPoint > SonicPoints .
Topics:
Configuring Basic SonicPoint Layer 3 Management
A basic SonicPoint Layer 3 Management scenario is shown in the graphic that follows. The SonicPoints are connected to a third-party router that is connected over the LAN zone to the Dell SonicWALL security appliance.
Configuring SonicPoint Layer 3 Management requires configurations across several pages of the SonicOS UI. Thus, to configure this scenario, the configuration is divided into the following steps:
1
2
3
4
5
6
Configuring the Access Controller Interface
To configure an interface on a Dell SonicWALL security appliance that is connected to a third-party router:
1
Navigate to the Network > Interfaces page.
2
Click the Configure icon for the X4 interface.
The Edit Interface window appears.
3
Select LAN from the Zone drop-down menu. More options appear.
4
From the Mode / IP Assignment drop-down menu, select Static IP Mode. This is the default value.
5
In the IP Address field, enter the IP address of the interface. For example, 10.10.10.1. A default value of 0.0.0.0 is displayed.
6
in the Subnet Mask field, enter the subnet mask for the interface. For example, 255.255.255.0 (this is the default value).
7
Optionally, enter a comment in the Comment field. This comment displays in the Comment column of the Interface Settings table of Network > Interfaces.
8
HTTPS – Enables remote management of the DELL SonicWALL through the HTTPS protocol.
TIP: If you select HTTPS, the Add rule to enable redirect from HTTP to HTTPS option is enabled automatically.
Ping – Enables remote management of the DELL SonicWALL through the Ping protocol.
SNMP – Enables remote management of the DELL SonicWALL through the SNMP protocol.
SSH – Enables remote management of the DELL SonicWALL through the SSH protocol.
9
Optionally, select HTTPS for User Login to enable users with management rights to log in to the DELL SonicWALL. The HTTP option is dimmed (unavailable).
10
If you did not select HTTPS for Management, but did select HTTPS for User Login, to enable users logging in from HTTP to be redirected to HTTPS, select Add rule to enable redirect from HTTP to HTTPS.
11
Configuring the DHCP Server
To configure a DHCP Option Object for CAPWAP and a DHCP pool of IP addresses for the SonicPoints behind a third-party router:
1
Navigate to the Network > DHCP Server page.
2
Click Advanced. The DHCP Advanced Settings window is displayed.
3
Click Add Option. The Add DHCP Option Object dialog appears.
4
In the Option Name field, enter a descriptive name for the DHCP option object, such as cap.
5
From the Option Number drop-down menu, select 138 (CAPWAP AC IPv4 Address List). The Option Array option becomes active, and the Option Type is set to IP Address.
6
Select the Option Array option. The Option Type drop-down menu is dimmed but displays IP Address.
7
In the Option Value field, enter the IP address for the X0 interface you configured in Configuring the Access Controller Interface . For example, 10.10.10.1.
8
Click OK. The new Option Object is displayed in the Option Objects section of the DHCP Advanced Settings window.
9
Configuring a DHCP Pool of Addresses
To configure a DHCP pool of addresses for the SonicPoints behind the router:
1
Navigate to the Network > DHCP Server page.
2
Under the DHCPv4 Server Lease Scopes table, click Add Dynamic. The Dynamic Range Configuration window appears.
3
Select the Enable this DHCP Scope option. This is selected by default.
4
Enter the appropriate IP addresses or values in the Range Start, Range End, Lease Time (minutes) (default is 1440 minutes), Default Gateway, and Subnet Mask boxes.
5
Click the Advanced tab.
6
In the DHCP Generic Option Group menu, select the DHCP Option Object you created in Configuring the DHCP Server .
7
Select the Send Generic options always option.
8
Click OK. The DHCPv4 Server Lease Scopes table is updated.
Configuring the WLAN Tunnel Interface
To configure a WLAN tunnel interface and assign it to the X4 interface:
1
Navigate to the Network > Interfaces page.
2
From the Add Interface drop-down menu, select Tunnel Interface. The Add Tunnel Interface window appears.
3
From the Zone menu, select WLAN. The options change.
4
Enter the Tunnel ID in the Tunnel ID field. The default is 0.
5
From the Tunnel Source Interface drop-down menu, select the interface, such as X4 in this scenario.
6
From the Mode / IP Assignment drop-down menu, select Static IP Mode. This is the default.
7
In the IP Address field, enter the IP address for the WLAN tunnel interface. For example, 172.17.31.1.
8
In the Subnet Mask box, enter the subnet mask. The default is 255.255.255.0.
9
From the SonicPoint Limit drop-down menu, select the maximum number of SonicPoints for this interface. The defaults are dependent upon the type of SonicPoints being used.
10
(Optional) In the Comment field, enter a descriptive comment. This comment is displayed in the Comment field.
11
If you did not specify a web management protocol in Configuring the Access Controller Interface , select one or more Management options: HTTPS, Ping, SNMP, SSH.
TIP: If you select HTTPS, the Add rule to enable redirect from HTTP to HTTPS option is enabled automatically.
12
If you did not specify a login protocol in Configuring the Access Controller Interface , optionally select HTTPS for User Login to enable users with management rights to log in to the DELL SonicWALL. The HTTP option is dimmed (unavailable).
13
If you did not select HTTPS for Management, but did select HTTPS for User Login, to enable users logging in from HTTP to be redirected to HTTPS, select Add rule to enable redirect from HTTP to HTTPS.
14
Click OK. The Interface Settings table is updated.
15
To verify, navigate to the Firewall > Access Rules page. You should see a Layer 3 Management option in the Access Rules table.
Adding a Route Policy
To configure a route policy that forwards all packets intended for a Layer 3 SonicPoint network to the default gateway:
1
Navigate to the Network > Routing page.
2
In the Route Policies table, click Add…. The Add Route Policy window displays.
 
3
From the Source drop-down menu, select Any. This is the default.
4
From the Destination drop-down menu, select the address object of the default gateway. The default is Any.
5
From the Service drop-down menu, select a service object. The default is Any.
6
From the Gateway drop-down menu, select an address object. The default is 0.0.0.0.
7
From the Interface drop-down menu, select an interface. For this scenario, select X4.
8
In the Metric field, enter 1. The minimum value is 1, the maximum is 254, and the default is 1.
A metric is a weighted cost assigned to static and dynamic routes. Lower metric costs are considered better and take precedence over higher costs. SonicOS adheres to Cisco-defined metric values for directly connected interfaces, statically encoded routes, and all dynamic IP routing protocols.
9
Click OK. The Route Policies table is updated.
Configuring a Remote Router Connected to SonicPoints
To configure a third-party router that is connected to a Dell SonicWALL security interface at one end and to SonicPoints at the other end:
1
2
3
Configuring SonicPoint Virtual Access Points for Layer 3 Management
This scenario extends the previous example, Configuring Basic SonicPoint Layer 3 Management , by adding Virtual Access Points (VAPs) for the SonicPoints.
To configure VAPs for SonicPoint Layer 3 Management, complete the following steps:
1
2
3
4
For more information about VAPs and configuring them, see SonicPoint > Virtual Access Point .
Configuring a WLAN Interface for VAPs
To configure a WLAN interface for the VAPs:
1
Navigate to the Network > Interfaces page.
2
From the Add Interface drop-down menu, select Virtual Interface. The Add Interface dialog appears.
3
From the Zone drop-down menu, select WLAN. More options appear.
4
In the VLAN Tag field, enter 4. The default is 0. The VLAN Tag is used to identify the new VLAN.
5
From the Parent Interface drop-down menu, select WT0.
6
From the Mode / IP Assignment drop-down menu, select Static IP Mode. This is the default.
7
In the IP Address field, enter the IP address for the WLAN. For example, 172.4.1.1. The default is 0.0.0.0.
8
In the Subnet Mask field, enter the subnet mask. For example, 255.255.255.0. The default is 255.255.255.0.
9
From the SonicPoint Limit drop-down menu, select the maximum number of SonicPoints for this interface. For this scenario, select 48 SonicPoints. The default is 64 SonicPoints.
10
(Optional) In the Comment field, enter a descriptive comment. This comment is displayed in the Comment field.
11
If you did not specify a web management protocol in Configuring the Access Controller Interface , select one or more Management options: HTTPS, Ping, SNMP, SSH.
TIP: If you select HTTPS, the Add rule to enable redirect from HTTP to HTTPS option is enabled automatically.
12
If you did not specify a login protocol in Configuring the Access Controller Interface , optionally select HTTPS for User Login to enable users with management rights to log in to the DELL SonicWALL. The HTTP option is dimmed (unavailable).
13
If you did not select HTTPS for Management, but did select HTTPS for User Login, to enable users logging in from HTTP to be redirected to HTTPS, select Add rule to enable redirect from HTTP to HTTPS.
14
Click OK. The Interface Settings table is updated.
Configuring a VAP Object
To configure a VAP object on a Dell SonicWALL network security appliance:
1
Navigate to the SonicPoint > Virtual Access Point page.
2
In the Virtual Access Points table, click Add. The Add/Edit Virtual Access Point window displays.
3
In the Name field, enter a descriptive name for the VAP.
4
in the SSID field, enter a SSID that represents the Layer 3 management network. For example, wirelessDev_L3_vap.
5
From the VLAN ID drop-down menu, select the VLAN Tag ID that you configured in Configuring a WLAN Interface for VAPs . For example, 4.
6
Select the Enable Virtual Access Point option. By default, this option is selected
7
Click OK. The virtual access points table is updated.
8
Configuring a VAP Group
To configure a VAP group:
1
Navigate to the SonicPoint > Virtual Access Point page.
2
In the Virtual Access Points Groups table, click Add Group. The Add Virtual Access Point Group window displays.
3
In the Virtual AP Group Name field, enter a name for the VAP group. For example, L3 VAP Group. The Available Virtual AP Objects box should be populated with the VAP objects you created in Configuring a VAP Object .
4
Move the VAP objects you want from the Available Virtual AP Objects box to the Member of Virtual AP Group box.
5
Click OK. The Virtual Access Point Groups table is updated.
Assigning a VAP Group to a SonicPoint
To assign a VAP group to a SonicPoint that is connected to a third-party router:
1
Navigate to the SonicPoint > SonicPoints page and scroll to the SonicPointN Provisioning Profiles section.
2
Click the Configure icon for the SonicPoint you want to configure. The Edit SonicPoint <type> Profile dialog appears.
3
Select the Enable SonicPoint option. This is selected by default.
4
From the <802.11n> Radio <0/1> Virtual AP Group drop-down menu in the Virtual Access Point Settings section, select the Virtual AP Group you created in Configuring a VAP Group . For example, L3 VAP Group.
5
Configuring Layer 3 Management over IPSec
In this example, the central IPSec gateway acts as the SonicPoint WLAN controller. The SonicPoint is deployed under the VPN local LAN subnet of the remote IPSec gateway. SonicPoint clients receive a DHCP client lease for the SonicPoint from the DHCP scope on the central gateway. The DHCP over VPN feature must be configured on the remote IPSec gateway.
To configure SonicPoint Layer 3 Management over IPSec, complete the following steps:
1
2
3
4
5
6
Configuring the VPN Tunnel on the Central Gateway
To configure the VPN tunnel on the Central Gateway:
1
2
Under the VPN Policies table, click Add. The VPN Policy, General tab dialog appears.
3
From the Policy Type drop-down menu, select Site to Site. This is the default.
4
From the Authentication Method drop-down menu, select the method you want. For example, IKE using Preshared Secret. This is the default.
5
In the Name field, enter a descriptive name for the VPN tunnel. For example, VPN to Central Gateway.
6
In the IPSec Primary Gateway Name or Address field, enter the IP address of the remote gateway. For example, 10.03.49.77.
7
8
Click the Network tab.
9
Under Local Networks, select the Choose local network from list option.
10
From the Choose local network from list drop-down menu, select X0 Subnet.
11
Under Remote Networks, select the option you want and, if applicable, and the network you want from the associated drop-down menu.
12
Click the Advanced tab.
13
Select the Allow SonicPoint N Layer 3 Management option.
14
Click OK. The VPN Policies table is updated.
15
Navigate to the VPN > DHCP over VPN page.
16
From the DHCP over VPN drop-down menu, select Central Gateway. This is the default.
17
Click Configure. The DHCP over VPN Configuration window appears.
18
19
Configuring the VPN Tunnel on the Remote Gateway
To configure the VPN tunnel on the remote gateway:
1
2
Under the VPN Policies table, click Add. The VPN Policy window displays.
3
From the Policy Type drop-down menu, select Site to Site. This is the default.
4
From the Authentication Method drop-down menu, select the appropriate method for your network. For example, IKE using Preshared Secret. This is the default.
5
In the Name field, enter a descriptive name for the VPN tunnel. For example, VPN to Remote Gateway.
6
In the IPSec Primary Gateway Name or Address field, enter the IP address of the remote gateway. For example, 10.03.49.79.
7
Click the Network tab.
8
Under Local Networks, select the Choose local network from list option. This is the default.
9
From the Choose local network from list drop-down menu, select X1 Subnet.
10
Under Remote Networks, select the option you want and, if appropriate, the network from the associated drop-down menu. This is the Choose destination network from list.
11
Under Remote Networks, select Create new address object from the appropriate menu. The Add Address Object window appears.
12
In the Name field, enter Remote Gateway X0 Subnet.
13
From the Zone Assignment drop-down, select LAN. This is the default.
14
From the Type drop-down menu, select Network. Another option appears.
15
In the Network field, enter the IP address of the remote gateway. For example, 192.168.168.0.
16
In the Netmask/Prefix Length field, enter the mask. For example, 255.255.255.0.
17
18
Click the Advanced tab.
19
Select the Allow SonicPoint N Layer 3 Management option.
20
Click OK. The VPN Policies table is updated.
21
Navigate to the VPN > DHCP over VPN page.
22
From the DHCP over VPN drop-down menu, select Remote Gateway.
23
Click Configure. The DHCP over VPN Configuration window appears.
24
From the DHCP lease bound to drop-down menu, select the interface that is connected to the SonicPoint. For example, Interface X4.
25
(Optional) Select the Accept DHCP Request from bridged WLAN interface option if you want it.
26
In the Relay IP Address field, enter the IP address of the interface connected to the SonicPoint. For example 30.30.30.1.
27
In the Remote Management IP Address field, enter the IP address that is used to manage this Dell SonicWALL security appliance remotely from behind the Central Gateway.
NOTE: This IP address was configured in Configuring the Access Controller Interface , and must be reserved in the DHCP scope on the DHCP server. In the example it is 10.10.10.1.
28
Select the Block traffic through tunnel when IP spoof detected option.
29
Select the Obtain temporary lease from local DHCP server if tunnel is down option.
30
In the Temporary Lease Time (minutes) field, leave the default value of 2.
31
Configuring the WT0 Interface on the Central Gateway
To configure the Wireless Tunnel interface (WT0) on the Central Gateway:
1
Navigate to the Network > Interfaces page.
2
From the Add Interface drop-down menu in the Interface Settings section, select Add WLAN Tunnel Interface. The Add WLAN Tunnel Interface window is displayed.
3
From the Zone drop-down menu, select WLAN. More options display.
4
In the Tunnel ID field, select 0. This is the default.
5
From the Tunnel Source Interface drop-down menu, select X0.
6
From the Mode / IP Assignment drop-down menu, select Static IP Mode. This is the default.
7
In the IP Address field, select 172.17.31.1.
8
In the Subnet Mask field, enter 255.255.255.0. This is the default.
9
From the SonicPoint Limit drop-down menu, select the maximum number of SonicPoints allowed on your network. For example, 48 SonicPoints. The default is 64 SonicPoints.
10
11
Click OK. The Interface Settings table is updated.
Configuring the CAPWAP DHCP Option Object on the Central Gateway
To configure the CAPWAP DHCP Option Object on the Central Gateway:
1
2
In the DHCP Server Settings section, click Advanced. The DCHP Advanced Settings window displays.
3
Click Add Option. The Add DHCP Option Object window displays.
4
In the Option Name field, enter a descriptive name, such as capwap or CAPWAP DHCP.
5
From the Option Number drop-down menu, select 138 (CAPWAP AC IPv4 Address List).
6
In the Option Value field, enter the IP address you want to use for the DHCP group. For example, 192.168.168.168.
7
Click OK to add the DHCP Option Object.
8
Click OK to close the DHCP Advanced Settings window and return to the Network > DHCP Server page.
Configuring the DHCP Scope on the Central Gateway
To configure the DHCP Scope on the Central Gateway:
1
Navigate to the Network > DHCP Server page.
2
Click Add Dynamic. The Dynamic Range Configuration window displays.
3
Select Enable this DHCP Scope.
4
In the Range Start field, enter the IP address at which to start the DHCP range; for example, 30.30.30.2. The range values must be within the same subnet as the Default Gateway; for example, 30.30.30.2 to 30.30.30.100.
5
In the Range End field, enter the IP address at which to end the DHCP range. For example, 30.30.30.100.
6
In the Lease Time (minutes) field, use the default value, 1440.
7
In the Default Gateway field, enter the IP address of the default gateway. This value is the IP address of the interface connected to the SonicPoint. For example, 30.30.30.1.
8
In the Subnet Mask field, enter the subnet mask of the default gateway. For example, 255.255.255.0.
9
Click the Advanced tab.
10
In the DHCP Generic Options section, from the DHCP Generic Option Group drop-down menu, select the CAPWAP DHCP option created in Configuring the CAPWAP DHCP Option Object on the Central Gateway .
11
Select the Send Generic options always option. This is the default.
12
Click OK. The DHCPv4 Server Lease Scopes table is updated.