• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 1844
  • Last Modified:

Extending network to 2 new buildings using Aironet 1532Is

I'm looking for some guidance on configuring 3 autonomous Cisco
Aironet 1532Is. We have 2 new buildings at the corporate campus and we are trying to extend the corporate network to those 2 buildings with Wi-Fi (just want to use Wi-Fi as a layer 2 bridge to the new buildings). I should add that the 2 buildings have wired infrastructure we are just trying to span the distance from the main building with Wi-Fi and then the APs that are located in those buildings are going to be plugged into a Catalyst switch.
What's the best way to go about setting this up ?

thanks
0
aackar
Asked:
aackar
  • 6
  • 4
1 Solution
 
Craig BeckCommented:
This is simple in theory, but could be awkward depending on what you have at each side.

With a single VLAN this is easy.  You just configure a SSID on the 5GHz radio and set one AP to Root Bridge and the other AP to Non-Root Bridge mode.

However, with more than one VLAN you have to create each VLAN on the APs as well as on the switches.  They won't automatically be trunked across the link if the AP doesn't know about them.  This is obviously important if you have a lot of VLANs and it's an absolute nightmare to do in the CLI if you have more than a handful.

Have you already bought the 1532 APs?
0
 
aackarAuthor Commented:
I have already purchased 3 autonomous 1532 APs. I have 3 VLANs in total. I want to configure a point to multi-point Ethernet bridge. Any links you know off to any useful documents that could help me save some time on this?
0
 
aackarAuthor Commented:
I'm obviously reading a bunch of Cisco docs but any links to anything that goes step by step for configuring a point to multi-point Ethernet bridge on these APs?
0
Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

 
Craig BeckCommented:
Try this, substituting the <SSID> and <PRESHAREDKEY> with your own values...

Root Bridge

conf t
dot11 ssid <SSID>
 vlan 10
 authentication open
 authentication key-management wpa version 2
 wpa-psk ascii <PRESHAREDKEY>
!
interface Dot11Radio1
 encryption vlan 10 mode ciphers aes-ccm
 ssid <SSID>
 station-role root bridge
 no shutdown
!
interface Dot11Radio1.10
 encapsulation dot1q native 10
 bridge-group 1
!
interface Dot1Radio1.20
 encapsulation dot1q 20
 bridge-group 2
!
interface Dot11Radio1.30
 encapsulation dot1q 30
 bridge-group 3
!
interface GigabitEthernet0.10
 encapsulation dot1q 10 native
 bridge-group 1
!
interface GigabitEthernet0.20
 encapsulation dot1q 10
 bridge-group 2
!
interface GigabitEthernet0.30
 encapsulation dot1q 30
 bridge-group 3
!
interface BVI1
 ip address 10.0.0.1 255.255.255.0
 no shutdown
!
end

Open in new window


Non-Root Bridge

conf t
dot11 ssid <SSID>
 vlan 10
 authentication open
 authentication key-management wpa version 2
 wpa-psk ascii <PRESHAREDKEY>
!
interface Dot11Radio1
 encryption vlan 10 mode ciphers aes-ccm
 ssid <SSID>
 station-role non-root bridge
 no shutdown
!
interface Dot11Radio1.10
 encapsulation dot1q native 10
 bridge-group 1
!
interface Dot1Radio1.20
 encapsulation dot1q 20
 bridge-group 2
!
interface Dot11Radio1.30
 encapsulation dot1q 30
 bridge-group 3
!
interface GigabitEthernet0.10
 encapsulation dot1q 10 native
 bridge-group 1
!
interface GigabitEthernet0.20
 encapsulation dot1q 10
 bridge-group 2
!
interface GigabitEthernet0.30
 encapsulation dot1q 30
 bridge-group 3
!
interface BVI1
 ip address 10.0.0.2 255.255.255.0
 no shutdown
!
end

Open in new window

0
 
aackarAuthor Commented:
great. Let me ask you this, the root bridge in this scenario is going to be at the main building here at the corporate campus and will be directly attached to the wired Ethernet network where there are 3 VLANs. The other 2 APs in this point to multi-point configuration are going to be attached to wired networks as well but will only contain endpoints like laptops, desktops etc. so those 2 wired networks will all be in just one VLAN. Should I just configure one VLAN on 2 those 2 APs or should I still have all 3? It's layer 2 so  you would think it wouldn't matter as far as routing but I"m not sure.
0
 
aackarAuthor Commented:
I followed your suggestion and got 2 APs to associate with each other and one can ping the other but the remote one can't ping the default gateway which should be possible since this is a on layer 2. So from the remote AP I can ping the BVI1 interface on the one that's plugged into the corporate network but I can't ping anything else on the corporate network.
Any ideas?
0
 
Craig BeckCommented:
What configuration do you have on the switch at the root end?  Is the switchport where the root connects configured as a trunk?
0
 
aackarAuthor Commented:
it does connect to a trunk port. Other than that other ports have a data and voice vlan and are then there is a trunk port to the next switch.
0
 
Craig BeckCommented:
Can you post the config you've put on the root, and the switchport config?
0
 
aackarAuthor Commented:
ok, I have reloaded the AP and it works now.
0

Featured Post

Cyber Threats to Small Businesses (Part 2)

The evolving cybersecurity landscape presents SMBs with a host of new threats to their clients, their data, and their bottom line. In part 2 of this blog series, learn three quick processes Webroot’s CISO, Gary Hayslip, recommends to help small businesses beat modern threats.

  • 6
  • 4
Tackle projects and never again get stuck behind a technical roadblock.
Join Now