I had to do a Motorola wireless bridge here recently from one building to another, probably about 200 yards from each other. I thought I'd post the Portal and Client config here below.
Topology:
Portal Config:
wlan P2PBridge
description Wireless bridge
ssid building2\ Bridge
vlan 3
bridging-mode local
encryption-type ccmp
authentication-type none
no broadcast-ssid
no answer-broadcast-probes
wpa-wpa2 psk 0 $BrideKey$
data-rates 2.4GHz gn
data-rates 5GHz an
use aaa-policy AAA_POLICY_P2PBridge
!
profile ap6532 P2P-Bridge
ip name-server 192.168.176.12
ip name-server 192.168.176.13
ip domain-name company.com
area building2
ip default-gateway 192.168.3.1
no autoinstall configuration
no autoinstall firmware
crypto ikev1 policy ikev1-default
isakmp-proposal default encryption aes-256 group 2 hash sha
crypto ikev2 policy ikev2-default
isakmp-proposal default encryption aes-256 group 2 hash sha
crypto ipsec transform-set default esp-aes-256 esp-sha-hmac
crypto ikev1 remote-vpn
crypto ikev2 remote-vpn
crypto auto-ipsec-secure
crypto load-management
interface radio1
shutdown
interface radio2
P2PBridge bss 1 primary
interface ge1
switchport mode trunk
switchport trunk native vlan 3
no switchport trunk native tagged
switchport trunk allowed vlan 1,2,3,4,5
ip dhcp trust
qos trust dscp
qos trust 802.1p
interface vlan3
interface pppoe1
use firewall-policy default
service pm sys-restart
router ospf
!
rf-domain P2P-Bridge
location building1\ and\ building2
timezone America/Chicago
country-code us
control-vlan 3
!
ap6532 11-22-33-44-55-66
radio-count 2
use profile P2P-Bridge
use rf-domain P2P-Bridge
hostname P2P-Bridge-Portal
license AP VIRTUAL_CONTROLLER_DEFAULT_AP_LICENSE
model-number AP-6532-66040-US
bridge vlan 3
bridging-mode tunnel
floor building1
interface radio1
shutdown
no mesh
interface radio2
power 27
mesh portal
mesh psk 0 $BrideKey$
P2PBridge bss 1 primary
aggregation amsdu tx-rx
rifs tx-rx
interface ge1
switchport mode trunk
switchport trunk native vlan 3
no switchport trunk native tagged
switchport trunk allowed vlan 1,2,3,4,5
interface vlan3
ip address 192.168.3.7/24
!
!
end
Client Config:
wlan P2PBridge
description Wireless bridge
ssid building2\ Bridge
vlan 3
bridging-mode local
encryption-type ccmp
authentication-type none
no broadcast-ssid
no answer-broadcast-probes
wpa-wpa2 psk 0 $BrideKey$
data-rates 2.4GHz gn
data-rates 5GHz an
use aaa-policy AAA_POLICY_P2PBridge
!
profile ap6532 P2P-Bridge
ip name-server 192.168.176.12
ip name-server 192.168.176.13
ip domain-name company.com
area building2
ip default-gateway 192.168.3.1
no autoinstall configuration
no autoinstall firmware
crypto ikev1 policy ikev1-default
isakmp-proposal default encryption aes-256 group 2 hash sha
crypto ikev2 policy ikev2-default
isakmp-proposal default encryption aes-256 group 2 hash sha
crypto ipsec transform-set default esp-aes-256 esp-sha-hmac
crypto ikev1 remote-vpn
crypto ikev2 remote-vpn
crypto auto-ipsec-secure
crypto load-management
interface radio1
shutdown
interface radio2
P2PBridge bss 1 primary
interface ge1
switchport mode trunk
switchport trunk native vlan 3
no switchport trunk native tagged
switchport trunk allowed vlan 1,2,3,4,5
ip dhcp trust
qos trust dscp
qos trust 802.1p
interface vlan3
interface pppoe1
use firewall-policy default
service pm sys-restart
router ospf
!
rf-domain P2P-Bridge
location building1\ and\ building2
timezone America/Chicago
country-code us
control-vlan 3
!
ap6532 77-88-99-11-22-33
radio-count 2
use profile P2P-Bridge
use rf-domain P2P-Bridge
hostname P2P-Bridge-Client
license AP VIRTUAL_CONTROLLER_DEFAULT_AP_LICENSE
model-number AP-6532-66040-US
bridge vlan 3
bridging-mode tunnel
floor building2
interface radio1
shutdown
no mesh
interface radio2
power 27
mesh client
mesh psk 0 $BrideKey$
P2PBridge bss 1 primary
aggregation amsdu tx-rx
rifs tx-rx
interface ge1
switchport mode trunk
switchport trunk native vlan 3
no switchport trunk native tagged
switchport trunk allowed vlan 1,2,3,4,5
interface vlan3
ip address 192.168.3.8/24
!
!
end
This is the retired Shane Killen personal blog, an IT technical blog about configs and topics related to the Network and Security Engineer working with Cisco, Brocade, Check Point, and Palo Alto and Sonicwall. I hope this blog serves you well. -- May The Lord bless you and keep you. May He shine His face upon you, and bring you peace.
Subscribe to:
Post Comments (Atom)
Where you able to get multiple VLAN across this link? We have this setup in WiNG4 but want to upgrade to 5 and I'm not having any luck getting anything across it except the Native VLAN.
ReplyDeleteI'm having that same issue. Only the native VLAN is being sent over the bridge.
ReplyDeleteI'm having that same issue. Only the native VLAN is being sent over the bridge.
ReplyDelete