MSM7xx Controllers Configuration Guide v6.4.0

Single controller team operating with non-teamed controllers.................................................275
Multiple teamed and non-teamed controllers.......................................................................276
Guest access and teaming.....................................................................................................276
Guest access with teamed controllers using the same subnet..................................................280
15 Mobility traffic manager........................................................................285
Key concepts.......................................................................................................................285
The mobility domain.........................................................................................................287
Home networks...............................................................................................................288
Local networks.................................................................................................................289
Mobility controller discovery..................................................................................................289
Network requirements......................................................................................................290
Controller discovery and teaming.......................................................................................290
Configuring Mobility Traffic Manager......................................................................................290
Defining the mobility domain.............................................................................................291
Defining network profiles..................................................................................................292
Assigning a home network to a user...................................................................................292
Defining local networks on a controller...............................................................................293
Assigning local networks to an AP.....................................................................................293
Configuring the mobility settings for a VSC..........................................................................294
Binding a VSC to an AP...................................................................................................295
Monitoring the mobility domain..............................................................................................295
Controllers......................................................................................................................296
Networks in the mobility domain.......................................................................................296
Mobility clients................................................................................................................297
Forwarding table.............................................................................................................297
Mobility client event log....................................................................................................298
Scenario 1: Centralizing traffic on a controller..........................................................................299
How it works...................................................................................................................299
Configuration overview.....................................................................................................300
Scenario 2: Centralized traffic on a controller with VLAN egress.................................................301
How it works...................................................................................................................301
Configuration overview.....................................................................................................302
Scenario 3: Centralized traffic on a controller with per-user traffic routing.....................................304
How it works...................................................................................................................304
Configuration overview.....................................................................................................305
Scenario 4: Assigning home networks on a per-user basis..........................................................312
How it works...................................................................................................................312
Configuration overview.....................................................................................................313
Scenario 5: Traffic routing using VLANs...................................................................................316
How it works...................................................................................................................316
Configuration overview.....................................................................................................318
Scenario 6: Distributing traffic using VLAN ranges....................................................................323
How it works...................................................................................................................323
Configuration overview.....................................................................................................325
Subnet-based mobility...........................................................................................................330
16 User authentication, accounts, and addressing..........................................331
Introduction..........................................................................................................................331
Authentication support......................................................................................................331
Other access control methods............................................................................................332
Using more than one authentication type at the same time.....................................................332
User authentication limits..................................................................................................334
802.1X authentication...........................................................................................................334
Supported 802.1X protocols..............................................................................................335
Configuring 802.1X support on a VSC................................................................................336
8 Contents