APPLICATION NOTE - Configuring and Deploying the AX411 Wireless Access Point
wlan {
access-point <AP name> {
mac-address <ap mac address>; #This attribute is mandatory and can be found on rearlabel of AX411
description <AP description>;
location <AP location>;
external {
system {
console baudrate <console baudrate>;
ports {
ethernet {
management-vlan <vlan-id>;
untagged-vlan <vlan-id>;
static {
address <Access Point address>;
gateway <default gateway>;
}
}
}
}
dot1x-supplicant {
username <username>;
password <password>;
}
}
access-point options {
country <country where the AP is located>;
#This is used for regulatory purposes. #The AP will only transmit in the bands allowed
by each country
station-mac-lter {
#Allow and deny list of mac addresses, used for
local mac authentication
}
}
radio <1|2> {
quality-of-service {
#QoS conguration options
}
radio-options {
#Phy layer conguration options, such as transmit
power, channel, mode, etc
}
virtual-access-point <0..15> {
#virtual-access-point conguration options
including SSID, security
#and http redirect options
}
}
}
}
APPLICATION NOTE - Configuring and Deploying the AX411 Wireless Access Point
For completeness, security policies, Network Address Translation (NAT), and untrust interface configurations
required to allow traffic from the access points to the Internet are included in this configuration To avoid unnecessary
repetitions and unless explicitly noted, our next examples will omit these sections from the configuration.
#Enable PoE if you will be using that to power the AX411.
set poe interface all
#DHCP Server cong
set system services dhcp name-server 4.2.2.2
set system services dhcp pool 192.168.2.0/24 address-range low 192.168.2.2
set system services dhcp pool 192.168.2.0/24 address-range high 192.168.2.254
set system services dhcp pool 192.168.2.0/24 router 192.168.2.1
#Interface and VLAN Conguration
#Note how interface-ranges can be used to simplify the conguration when a large
number of APs are used
set interfaces interface-range APs member ge-0/0/1
set interfaces interface-range APs member fe-0/0/2
set interfaces interface-range APs member fe-0/0/3
set interfaces interface-range APs unit 0 family ethernet-switching vlan members
default
set interfaces ge-0/0/0 unit 0 family inet address 198.0.0.1/24
# Untrust Static IP
set interfaces vlan unit 2 family inet address 192.168.2.1/24
set vlans default vlan-id 2
set vlans default l3-interface vlan.2
#Routing is trivial, there is only a default route pointing to the Internet
set routing-options static route 0.0.0.0/0 next-hop 10.0.1.1
#NAT all traic from the WiNet to untrust. Use the IP address of the egress
interface as the new source.
set security nat source rule-set Internet-Access from zone WiFiNet
set security nat source rule-set Internet-Access to zone untrust
set security nat source rule-set Internet-Access rule nat-all match sourceaddress 0.0.0.0/0
set security nat source rule-set Internet-Access rule nat-all then source-nat
interface
#Security Zones and policies conguration. Please note that the vlan.0 interface
MUST be assigned to a zone
set security zones security-zone untrust interfaces ge-0/0/0.0
#It is important to allow both DHCP and PING otherwise the SRX will not discover
the APs
set security zones security-zone WiNet interfaces vlan.2 host-inbound-traic
system-services dhcp
set security zones security-zone WiNet interfaces vlan.2 host-inbound-traic
system-services ping
set security policies from-zone WiNet to-zone untrust policy allow-internetaccess match source-address any
set security policies from-zone WiNet to-zone untrust policy allow-internetaccess match destination-address any
set security policies from-zone WiNet to-zone untrust policy allow-internetaccess match application any
set security policies from-zone WiNet to-zone untrust policy allow-internetaccess then permit
APPLICATION NOTE - Configuring and Deploying the AX411 Wireless Access Point
#APs conguration. By default all traic not assigned to a VLAN is send untagged.
#Both radios are used (radio 1 in the 5hz band and radio 2 in the 2.4Ghzs band)
and broadcast the same SSID
#AP-1
set wlan access-point AP-1 mac-address 00:12:cf:c5:4a:40
set wlan access-point AP-1 access-point-options country US
set wlan access-point AP-1 radio 1 virtual-access-point 0 ssid WiNet
set wlan access-point AP-1 radio 1 virtual-access-point 0 security none
set wlan access-point AP-1 radio 2 virtual-access-point 0 ssid WiNet
set wlan access-point AP-1 radio 2 virtual-access-point 0 security none
#AP-2
set wlan access-point AP-2 mac-address 00:12:cf:c5:4b:40
set wlan access-point AP-2 access-point-options country US
set wlan access-point AP-2 radio 1 virtual-access-point 0 ssid WiNet
set wlan access-point AP-2 radio 1 virtual-access-point 0 security none
set wlan access-point AP-2 radio 2 virtual-access-point 0 ssid WiNet
#AP-3
set wlan access-point AP-3 mac-address 00:12:cf:c5:4c:40
set wlan access-point AP-3 access-point-options country US
set wlan access-point AP-3 radio 1 virtual-access-point 0 ssid WiNet
set wlan access-point AP-3 radio 1 virtual-access-point 0 security none
set wlan access-point AP-3 radio 2 virtual-access-point 0 ssid WiNet
The AX411 access points use the concept of a Virtual Access Point (VAP). A VAP appears to the wireless client as a
single independent access point, advertising a single service set identifier (SSID). In our first configuration, only a single
SSID is advertised and this signifies that a single VAP on each radio is being used.
L3 Management Mode
In this mode, each access point is connected to a different L3 interface. Since each interface belongs to a different
subnet, clients will get their addresses assigned from a pool based on the access point to which they are associated.
DHCP
Each interface handles out addresses from
a dierent pool
APPLICATION NOTE - Configuring and Deploying the AX411 Wireless Access Point
#Enable PoE if you will be using that to power the AX411.
set poe interface all
#DHCP Server cong. A dierent pool per (AP) interface is used
set system services dhcp name-server 4.2.2.2
set system services dhcp pool 192.168.1.0/24 address-range low 192.168.1.2
set system services dhcp pool 192.168.1.0/24 address-range high 192.168.1.254
set system services dhcp pool 192.168.1.0/24 router 192.168.1.1
set system services dhcp pool 192.168.2.0/24 address-range low 192.168.2.2
set system services dhcp pool 192.168.2.0/24 address-range high 192.168.2.254
set system services dhcp pool 192.168.2.0/24 router 192.168.2.1
set system services dhcp pool 192.168.3.0/24 address-range low 192.168.3.2
set system services dhcp pool 192.168.3.0/24 address-range high 192.168.3.254
set system services dhcp pool 192.168.3.0/24 router 192.168.3.1
#Interface congurations
set interfaces ge-0/0/1 unit 0 family inet address 192.168.1.1/24
set interfaces ge-0/0/2 unit 0 family inet address 192.168.2.1/24
set interfaces ge-0/0/3 unit 0 family inet address 192.168.3.1/24
#Security Zones and policies conguration.
#An intra-zone policy is added to allow traic between clients connected to
dierent APs
set security zones security-zone untrust interfaces ge-0/0/0.0
set security zones security-zone WiNet interfaces ge-0/0/1.0
set security zones security-zone WiNet interfaces ge-0/0/1.0 host-inbound-traic
system-services dhcp
set security zones security-zone WiNet interfaces fe-0/0/2.0
set security zones security-zone WiNet interfaces fe-0/0/2.0 host-inbound-traic
system-services dhcp
set security zones security-zone WiNet interfaces fe-0/0/3.0
set security zones security-zone WiNet interfaces fe-0/0/3.0 host-inbound-traic
system-services dhcp
set security policies from-zone WiNet to-zone WiNet policy permit-egress-traic
match source-address any
set security policies from-zone WiNet to-zone WiNet policy permit-egress-traic
match destination-address any
set security policies from-zone WiNet to-zone WiNet policy permit-egress-traic
match application any
set security policies from-zone WiNet to-zone WiNet policy permit-egress-traic
then permit
set security policies from-zone WiNet to-zone untrust policy allow-internetaccess match source-address any
set security policies from-zone WiNet to-zone untrust policy allow-internetaccess match destination-address any
set security policies from-zone WiNet to-zone untrust policy allow-internetaccess match application any
set security policies from-zone WiNet to-zone untrust policy allow-internetaccess then permit
#APs conguration. The APs cong is identical to the one in our previous example
set wlan access-point AP-1 mac-address 00:12:cf:c5:4a:40
set wlan access-point AP-1 access-point-options country US
set wlan access-point AP-1 radio 1 virtual-access-point 0 ssid WiNet
set wlan access-point AP-1 radio 1 virtual-access-point 0 security none
set wlan access-point AP-1 radio 2 virtual-access-point 0 ssid WiNet
set wlan access-point AP-1 radio 2 virtual-access-point 0 security none
#AP-2
APPLICATION NOTE - Configuring and Deploying the AX411 Wireless Access Point
set wlan access-point AP-2 mac-address 00:12:cf:c5:4b:40
set wlan access-point AP-2 access-point-options country US
set wlan access-point AP-2 radio 1 virtual-access-point 0 ssid WiNet
set wlan access-point AP-2 radio 1 virtual-access-point 0 security none
set wlan access-point AP-2 radio 2 virtual-access-point 0 ssid WiNet
#AP-3
set wlan access-point AP-3 mac-address 00:12:cf:c5:4c:40
set wlan access-point AP-3 access-point-options country US
set wlan access-point AP-3 radio 1 virtual-access-point 0 ssid WiNet
set wlan access-point AP-3 radio 1 virtual-access-point 0 security none
set wlan access-point AP-3 radio 2 virtual-access-point 0 ssid WiNet
Segregating User and Management Trac
In this example, VLAN tags are used to separate management traffic from user traffic. This configuration can be
applied to both L2 and L3 deployment modes. From this example on, only the L2 mode will be shown (as it is the most
popular method) but it should be apparent from our previous example how to configure each scenario in L3 mode.
OFFICE
AP-1
Client
00:de:ad:10:75:00
AP-2
00:de:ad:10:76:00
AP-3
00:de:ad:10:77:00
ge-0/0/0.0
SRX
(untrust)
Series
198.0.0.1/24
vlan.1 (management)
10.0.0.1/24
vlan.2 (trust)
192.168.1.1/24-VLANID 2
INTERNET
CorpNet SSID
A single broadcast SSID is advertised
Figure 5: Segregating user and management traffic
#DHCP Server cong
set system services dhcp pool name-server 4.2.2.2
#This pool is used by the management vlan
set system services dhcp pool 192.168.1.0/24 address-range low 192.168.1.2
set system services dhcp pool 192.168.1.0/24 address-range high 192.168.1.254
set system services dhcp pool 192.168.1.0/24 router 192.168.1.1
#This pool is used by the WiNet vlan
set system services dhcp pool 192.168.2.0/24 address-range low 192.168.2.2
set system services dhcp pool 192.168.2.0/24 address-range high 192.168.2.254
set system services dhcp pool 192.168.2.0/24 router 192.168.2.1
#Interface and VLAN Conguration.
#Since all ports connected to an AP will have identical congs we will make use
of an interface ranges.
set interfaces interface-range APs member ge-0/0/1
set interfaces interface-range APs member-range fe-0/0/2 to fe-0/0/3
set interfaces interface-range APs unit 0 family ethernet-switching port-mode
trunk
set interfaces interface-range APs unit 0 family ethernet-switching vlan members
default
set interfaces interface-range APs unit 0 family ethernet-switching vlan members
WiNet
APPLICATION NOTE - Configuring and Deploying the AX411 Wireless Access Point
set interfaces interface-range APs unit 0 family ethernet-switching native-vlanid 1
set vlans WiNet vlan-id 2
set vlans WiNet l3-interface vlan.2
set interfaces vlan unit 2 family inet address 192.168.2.1/24
set vlans default vlan-id 1
set vlans default l3-interface vlan.1
set interfaces vlan unit 1 family inet address 192.168.1.1/24
#Security Zones and policies conguration. Please note that the vlan.0 interface
MUST be assigned to a zone
set security zones security-zone untrust interfaces ge-0/0/0.0
set security zones security-zone management interfaces vlan.1 host-inbound-traic
system-services dhcp
set security zones security-zone management interfaces vlan.1 host-inbound-traic
system-services ping
set security zones security-zone management interfaces vlan.1
#Note that ping is not required in the WiNet zone, as the keepalives are sent
only over the management vlan
set security zones security-zone trust interfaces vlan.2
#Note that no security policies are required for the management zone as no
through traic should be allowed from/to this zone.
#APs conguration.
set wlan access-point AP-1 mac-address 00:12:cf:c5:4a:40
set wlan access-point AP-1 access-point-options country US
set wlan access-point AP-1 radio 1 virtual-access-point 0 ssid WiNet
set wlan access-point AP-1 radio 1 virtual-access-point 0 vlan 2
set wlan access-point AP-1 radio 1 virtual-access-point 0 security none
set wlan access-point AP-1 radio 2 virtual-access-point 0 ssid WiNet
set wlan access-point AP-1 radio 2 virtual-access-point 0 vlan 2
set wlan access-point AP-1 radio 2 virtual-access-point 0 security none
#AP-2
#... All the other APs are congured the same way
MAC Authentication
Building on our previous scenario, we will now assume that some basic form of authentication is required. If the number
of devices in the network is small, and over the air confidentiality is not a requirement, MAC-based authentication
provides a simple access control method.
A local database of allowed and denied MAC addresses is created. Whenever a VAP is configured with MAC
authentication, the access point uses this database to determine if a particular association request will be granted.
Two mutually exclusive lists are provided—allow lists and deny lists. If the allow list is configured, any station with a
MAC address not on the list will be denied access. Similarly, if the deny list is configured, all stations will be allowed
with the exception of the ones present on the list.
#AP-1 conguration
set wlan access-point AP-1 mac-address 00:12:00:00:00:00
set wlan access-point AP-1 mac-address 00:12:00:00:00:01
…
set wlan access-point AP-1 access-point-options country US
set wlan access-point AP-1 mac-address 00:12:cf:c5:4a:40
set wlan access-point AP-1 access-point-options station-mac-lter allow-list macaddress 00:16:cb:05:1e:af
set wlan access-point AP-1 radio 1 virtual-access-point 0 ssid WiNet
APPLICATION NOTE - Configuring and Deploying the AX411 Wireless Access Point
set wlan access-point AP-1 radio 1 virtual-access-point 0 vlan 2
set wlan access-point AP-1 radio 1 virtual-access-point 0 security macauthentication-type local
set wlan access-point AP-1 radio 1 virtual-access-point 0 security none
set wlan access-point AP-1 radio 2 virtual-access-point 0 ssid WiNet
set wlan access-point AP-1 radio 2 virtual-access-point 0 vlan 2
set wlan access-point AP-1 radio 2 virtual-access-point 0 security macauthentication-type local
set wlan access-point AP-1 radio 2 virtual-access-point 0 security none
#All other APs are similarly congured
RADIUS-Based MAC Authentication
When the number of devices in the network is large, the MAC database becomes difficult to maintain. In these cases,
a RADIUS server can be used to centralize the database. When using MAC-based RADIUS authentication, association
requests trigger a RADIUS authentication request to be sent from the access point to the RADIUS server (these
requests can be forwarded by the SRX Series, but they will neither be generated nor proxied by it).
OFFICE
AP-1
Client
00:de:ad:10:75:00
AP-2
00:de:ad:10:76:00
SRX
ge-0/0/0.0 (untrust)
Series
198.0.0.1/24
ge-0/0/7.0 (trust)
192.198.254.1/24
INTERNET
AP-3
00:de:ad:10:77:00
Radius Server
192.168.254.2
CorpNet SSID
A single broadcast SSID is advertised
Radius-based MAC auth provides access control
Figure 6: RADIUS-based MAC authentication
This configuration, almost identical to the one in our previous example, specifies the MAC authentication type as
RADIUS (on a per VAP basis) and specifies the RADIUS parameters.
set wlan access-point AP-1 mac-address 00:de:ad:10:75:00
#RADIUS conguration
set wlan access-point AP-1 radio 1 virtual-access-point 0 ssid WiNet
set wlan access-point AP-1 radio 1 virtual-access-point 0 vlan 2
set wlan access-point AP-1 radio 1 virtual-access-point 0 security macauthentication-type radius
set wlan access-point AP-1 radio 1 virtual-access-point 0 security none
set wlan access-point AP-1 radio 2 virtual-access-point 0 ssid WiNet
set wlan access-point AP-1 radio 2 virtual-access-point 0 vlan 2
set wlan access-point AP-1 radio 2 virtual-access-point 0 security macauthentication-type radius
set wlan access-point AP-1 radio 2 virtual-access-point 0 security none
APPLICATION NOTE - Configuring and Deploying the AX411 Wireless Access Point
#DHCP conguration
set system services dhcp name-server 4.2.2.2
#Pool used for the management network
set system services dhcp pool 192.168.1.0/24 address-range low 192.168.1.2
set system services dhcp pool 192.168.1.0/24 address-range high 192.168.1.254
set system services dhcp pool 192.168.1.0/24 router 192.168.1.1
#Pool used for WiNet
set system services dhcp pool 192.168.2.0/24 address-range low 192.168.2.2
set system services dhcp pool 192.168.2.0/24 address-range high 192.168.2.254
set system services dhcp pool 192.168.2.0/24 router 192.168.2.1
#Pool used for GuestNet
set system services dhcp pool 192.168.3.0/24 address-range low 192.168.3.2
set system services dhcp pool 192.168.3.0/24 address-range high 192.168.3.254
set system services dhcp pool 192.168.3.0/24 router 192.168.3.1
#Interfaces and VLANs
set interfaces interface-range APs member ge-0/0/1
set interfaces interface-range APs member-range fe-0/0/2 to fe-0/0/3
set interfaces interface-range APs unit 0 family ethernet-switching port-mode
trunk
set interfaces interface-range APs unit 0 family ethernet-switching vlan members
default
set interfaces interface-range APs unit 0 family ethernet-switching vlan members
WiNet
set interfaces interface-range APs unit 0 family ethernet-switching vlan members
GuestNet
set interfaces interface-range APs unit 0 family ethernet-switching native-vlanid default
set interfaces ge-0/0/0 unit 0 family inet address 198.0.0.1/24
set interfaces ge-0/0/7 unit 0 family inet address 192.168.254.1/24
set interfaces vlan unit 1 family inet address 192.168.2.1/24
set interfaces vlan unit 2 family inet address 192.168.2.1/24
set interfaces vlan unit 3 family inet address 192.168.3.1/24
set vlans WiNet vlan-id 2
set vlans WiNet l3-interface vlan.2
set vlans GuestNet vlan-id 3
set vlans GuestNet l3-interface vlan.3
set vlans default vlan-id 1
set vlans default l3-interface vlan.1
#Security Zones,It is required to allow DHCP traic into each zone and PING into
the management zone
set security zones security-zone untrust interfaces ge-0/0/0.0
set security zones security-zone management interfaces vlan.1 host-inbound-traic
system-services dhcp
set security zones security-zone management interfaces vlan.1 host-inbound-traic
system-services ping
set security zones security-zone WiNet interfaces vlan.2 host-inbound-traic
system-services dhcp
set security zones security-zone GuestNet interfaces vlan.3 host-inbound-traic
system-services dhcp
#The radius server is attached to the trust zone
set security zones security-zone trust address-book address radius
192.168.254.2/32
set security zones security-zone trust interfaces ge-0/0/7.0
APPLICATION NOTE - Configuring and Deploying the AX411 Wireless Access Point
#Security Policies
set security policies from-zone WiNet to-zone untrust policy permit-traic match
source-address any
set security policies from-zone WiNet to-zone untrust policy permit-traic match
destination-address any
set security policies from-zone WiNet to-zone untrust policy permit-traic match
application any
set security policies from-zone WiNet to-zone untrust policy permit-traic then
permit
set security policies from-zone WiNet to-zone untrust policy permit-traic then
count
set security policies from-zone GuestNet to-zone untrust policy allow-http-dns
match source-address any
set security policies from-zone GuestNet to-zone untrust policy allow-http-dns
match destination-address any
set security policies from-zone GuestNet to-zone untrust policy allow-http-dns
match application junos-http
set security policies from-zone GuestNet to-zone untrust policy allow-http-dns
match application junos-dns-udp
set security policies from-zone GuestNet to-zone untrust policy allow-http-dns
then permit
#Allow radius traic from the APs to the radius server
set security policies from-zone management to-zone trust policy allow-radius
match source-address any
set security policies from-zone management to-zone trust policy allow-radius
match destination-address radius
set security policies from-zone management to-zone trust policy allow-radius
match application junos-radius
set security policies from-zone management to-zone trust policy allow-radius then
permit
#AP-1 conguration, all the APs are identically congured
set wlan access-point AP-1 mac-address 00:12:cf:c5:4a:40
set wlan access-point AP-1 radio 1 virtual-access-point 0 ssid GuestNet
set wlan access-point AP-1 radio 1 virtual-access-point 0 vlan 3
set wlan access-point AP-1 radio 1 virtual-access-point 0 security none
set wlan access-point AP-1 radio 2 virtual-access-point 0 ssid WiNet
set wlan access-point AP-1 radio 2 virtual-access-point 0 vlan 2
set wlan access-point AP-1 radio 2 virtual-access-point 0 security wpa-enterprise
radius radius-server 192.168.254.2
set wlan access-point AP-1 radio 2 virtual-access-point 0 security wpa-enterprise
radius radius-key juniper
set wlan access-point AP-1 radio 2 virtual-access-point 0 security wpa-enterprise
radius session-key-refresh-rate 60
APPLICATION NOTE - Configuring and Deploying the AX411 Wireless Access Point
Creating a Guest Network Using Firewall Authentication
In our final example, we will use firewall authentication to authenticate users trying to access a guest network. New
users will be redirected to a local portal running in the SRX Series where they will be authenticated. The user database
can be local or, as in the previous examples, RADIUS authentication can be used. Firewall authentication will only be
used in the GuestNet; WifiNet will do RADIUS-based MAC authentication instead.
Firewall Auth
The GuestNet zone will do Firewall Authentication
and redirect the first HTTP requests to a local portal
OFFICE
AP-1
Client
00:de:ad:10:75:00
AP-2
00:de:ad:10:76:00
AP-3
00:de:ad:10:77:00
SRX
ge-0/0/0.0
(untrust)
Series
198.0.0.1/24
ge-0/0/7.0 (trust)
192.198.254.1/24
Radius Server
192.168.254.2
INTERNET
CorpNet and GuestNet SSIDs
Clients associated to CorpNet are tagged with VLAN tag 2
Clients associated to GuestNET are tagged with VLAN tag 3
Figure 8: Firewall authentication
In this example, both radios broadcast both SSIDs (WifiNet and GuestNet) simultaneously, so clients can associate
using either of the following protocols to any SSID 802.11a/b/g or n.
#Enable the http connections to the vlan.3 interface, where the captive portal
will be used
set system services web-management http interface vlan.3
set system services dhcp name-server 4.2.2.2
set system services dhcp pool 192.168.2.0/24 address-range low 192.168.2.2
set system services dhcp pool 192.168.2.0/24 address-range high 192.168.2.254
set system services dhcp pool 192.168.2.0/24 router 192.168.2.1
set system services dhcp pool 192.168.2.0/24 address-range low 192.168.2.2
set system services dhcp pool 192.168.2.0/24 address-range high 192.168.2.254
set system services dhcp pool 192.168.2.0/24 router 192.168.2.1
#The 192.168.3.2 address is used by the local portal, so it must be excluded from
the DHCP pool
set system services dhcp pool 192.168.3.0/24 address-range low 192.168.3.3
set system services dhcp pool 192.168.3.0/24 address-range high 192.168.3.254
set system services dhcp pool 192.168.3.0/24 router 192.168.3.1
#Interfaces and VLANs conguration is almost identical to the one shown in
previous examples
set interfaces interface-range APs member ge-0/0/1
set interfaces interface-range APs member-range fe-0/0/2 to fe-0/0/3
set interfaces interface-range APs unit 0 family ethernet-switching port-mode
trunk
set interfaces interface-range APs unit 0 family ethernet-switching vlan members
default
set interfaces interface-range APs unit 0 family ethernet-switching vlan members
APPLICATION NOTE - Configuring and Deploying the AX411 Wireless Access Point
WiNet
set interfaces interface-range APs unit 0 family ethernet-switching vlan members
GuestNet
set interfaces interface-range APs unit 0 family ethernet-switching native-vlanid default
set interfaces ge-0/0/0 unit 0 family inet address 198.0.0.1/24
set interfaces ge-0/0/7 unit 0 family inet address 192.168.254.1/24
set interfaces vlan unit 1 family inet address 192.168.2.1/24
set interfaces vlan unit 2 family inet address 192.168.2.1/24
set interfaces vlan unit 3 family inet address 192.168.3.1/24
set vlans WiNet vlan-id 2
set vlans WiNet l3-interface vlan.2
set vlans GuestNet vlan-id 3
set vlans GuestNet l3-interface vlan.3
set vlans default vlan-id 1
set vlans default l3-interface vlan.1
#The address 192.168.3.2 is where the local captive portal listens for http
requests
set interfaces vlan unit 3 family inet address 192.168.3.2/24 web-authentication
http
#Security Zones conguration.
#The host-inbound http must be allowed for the local captive portal
set security zones security-zone untrust host-inbound-traic system-services anyservice
set security zones security-zone untrust host-inbound-traic protocols all
set security zones security-zone untrust interfaces ge-0/0/0.0
set security zones security-zone WiNet interfaces vlan.2 host-inbound-traic
system-services dhcp
set security zones security-zone management interfaces vlan.1 host-inbound-traic
system-services dhcp
set security zones security-zone management interfaces vlan.1 host-inbound-traic
system-services ping
set security zones security-zone GuestNet interfaces vlan.3 host-inbound-traic
system-services dhcp
set security zones security-zone GuestNet interfaces vlan.3 host-inbound-traic
system-services http
set security zones security-zone trust address-book address radius
192.168.254.2/32
set security zones security-zone trust interfaces ge-0/0/7.0
#The Security policies conguration is identical to the one in our previous
example, with the exception of the
#GuestNet->Untrust policy that has rewall auth enabled which, as shown below
set security policies from-zone GuestNet to-zone untrust policy allow-egress
match source-address any
set security policies from-zone GuestNet to-zone untrust policy allow-egress
match destination-address any
set security policies from-zone GuestNet to-zone untrust policy allow-egress
match application junos-http
set security policies from-zone GuestNet to-zone untrust policy allow-egress
match application junos-dns-udp
set security policies from-zone GuestNet to-zone untrust policy allow-egress then
permit rewall-authentication pass-through access-prole fw-auth
set security policies from-zone GuestNet to-zone untrust policy allow-egress then
#The access prole conguration species the address and secret of the radius
server
set access prole fw-auth authentication-order radius
set access prole fw-auth radius-server 192.168.254.2 port 1812
set access prole fw-auth radius-server 192.168.254.2 secret “$9$lI6v87wYojHmVHmfT/9evW”
#FW Auth settings
set access rewall-authentication pass-through default-prole fw-auth
set access rewall-authentication web-authentication default-prole fw-auth
set access rewall-authentication web-authentication banner success “Welcome to
GuestNet”
#AP1 conguration
set wlan access-point AP-1 mac-address 00:12:cf:c5:4a:40
set wlan access-point AP-1 radio 1 virtual-access-point 0 ssid WiNet
set wlan access-point AP-1 radio 1 virtual-access-point 0 vlan 2
set wlan access-point AP-1 radio 1 virtual-access-point 0 security macauthentication-type radius
set wlan access-point AP-1 radio 1 virtual-access-point 0 security none
set wlan access-point AP-1 radio 1 virtual-access-point 1 ssid GuestNet
set wlan access-point AP-1 radio 1 virtual-access-point 1 vlan 3
set wlan access-point AP-1 radio 1 virtual-access-point 1 security none
set wlan access-point AP-1 radio 2 virtual-access-point 0 ssid WiNet
set wlan access-point AP-1 radio 2 virtual-access-point 0 vlan 2
set wlan access-point AP-1 radio 2 virtual-access-point 0 security macauthentication-type radius
set wlan access-point AP-1 radio 2 virtual-access-point 0 security none
set wlan access-point AP-1 radio 2 virtual-access-point 1 vlan 3
set wlan access-point AP-1 radio 2 virtual-access-point 1 security none
RADIUS-Based VLAN Assignment
When using RADIUS authentication, it is possible to send a RADIUS attribute to instruct each access point to tag the
traffic from the client with a VLAN tag. This allows segmentation of the network into multiple domains, while still
broadcasting a single SSID. Network administrators can give users access to each domain, while users do not have to
choose a particular SSID.
In this example, we will use 802.1X authentication with RADIUS-based VLAN assignment. The RADIUS attributes used
to signal which VLAN to use for a particular client are the following:
APPLICATION NOTE - Configuring and Deploying the AX411 Wireless Access Point
CorpNet SSID
A single SSID is transmitted by both radios.
Clients are assigned to a dierent
VLAN by the radius server
OFFICE
Client
Figure 9: RADIUS-based VLAN assignment
set interfaces interface-range APs member ge-0/0/1
set interfaces interface-range APs member-range fe-0/0/2 to fe-0/0/3
set interfaces interface-range APs unit 0 family ethernet-switching port-mode
trunk
set interfaces interface-range APs unit 0 family ethernet-switching vlan members
default
set interfaces interface-range APs unit 0 family ethernet-switching vlan members
WiNet
set interfaces interface-range APs unit 0 family ethernet-switching vlan members
GuestNet
set interfaces interface-range APs unit 0 family ethernet-switching native-vlanid default
set interfaces vlan unit 1 family inet address 192.168.2.1/24
set interfaces vlan unit 2 family inet address 192.168.2.1/24
set interfaces vlan unit 3 family inet address 192.168.3.1/24
VLAN
Each VLAN is mapped to a dierent zone
and has dierent access priviledges
AP-1
00:de:ad:10:75:00
AP-2
00:de:ad:10:76:00
AP-3
00:de:ad:10:77:00
Radius Server
It authenticates the user and returns
the VLAN tag used for that client
SRX
Series
ge-0/0/7.0 (trust)
192.198.254.1/24
Radius Server
192.168.254.2
ge-0/0/0.0
(untrust)
198.0.0.1/24
INTERNET
set wlan access-point AP-1 mac-address 00:12:cf:c5:4a:40
set wlan access-point AP-1 radio 1 virtual-access-point 0 ssid WiNet
set wlan access-point AP-1 radio 1 virtual-access-point 0 vlan 3
set wlan access-point AP-1 radio 1 virtual-access-point 0 security dot1x radiusserver 192.168.254.2
set wlan access-point AP-1 radio 1 virtual-access-point 0 security dot1x radiuskey juniper
set wlan access-point AP-1 radio 2 virtual-access-point 0 ssid WiNet
set wlan access-point AP-1 radio 2 virtual-access-point 0 vlan 3
set wlan access-point AP-1 radio 2 virtual-access-point 0 security dot1x radiusserver 192.168.254.2
set wlan access-point AP-1 radio 2 virtual-access-point 0 security dot1x radiuskey juniper
By default, users will be placed in vlan 3 (GuestNet), unless the RADIUS server assigns the VLAN ID 2, in which case the
APPLICATION NOTE - Configuring and Deploying the AX411 Wireless Access Point
00:24:01:dc:a2:7b On On 2.4 9 Mace Net
00:1e:52:7b:96:58 On On 2.4 7 Zippy’s Network
00:1d:7e:6e:69: On O 2.4 7 blitz
00:0c:41:f6:11:28 O O 2.4 6 Leadermed
00:12:17:29:70:d7 O O 2.4 6 linksys
00:16:b6:db:1e:7f On On 2.4 6 Crown Capital
Advisors
Use the “show wlan access-points AP-1 virtual-access-points” to display the list of configured VAPs and their
APPLICATION NOTE - Configuring and Deploying the AX411 Wireless Access Point
About Juniper Networks
Juniper Networks is in the business of network innovation. From devices to data centers, from consumers to cloud
providers, Juniper Networks delivers the software, silicon and systems that transform the experience and economics of
networking. The company serves customers and partners worldwide. Additional information can be found at
www.juniper.net.
Corporate and Sales Headquarters
Juniper Netwo rks, Inc.
1194 North Mathilda Avenue
Sunnyvale, CA 94089 USA
Phone: 888.JUNIPER (888.586.4737)
or 408.745.2000
Fax: 408.745.2100
www.juniper.net
Copyri ght 2011 Juniper Net works, Inc. All r ights reser ved. Junipe r Networks, t he Juniper Net works logo, Jun os,
NetScr een, and Screen OS are registere d trademarks o f Juniper Netw orks, Inc. in th e United States and ot her
countri es. All other trad emarks, se rvice marks , registered m arks, or regis tered serv ice marks are th e property o f
their re spective own ers. Junipe r Networks a ssumes no res ponsibilit y for any inaccurac ies in this docum ent. Juniper
Netwo rks reser ves the right to cha nge, modify, tran sfer, or otherw ise revise thi s publication w ithout notice.