Skip to content

This repository contains the configurations for a small office network with a standalone access point that broadcasts multiple SSIDs.

License

Notifications You must be signed in to change notification settings

101zh/StandaloneAccessPointLab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Standalone Access Point Configuration

This repository contains the configurations for a small office network with a standalone access point that broadcasts multiple SSIDs. Device configurations and other diagnostic information can be found in the corresponding folders.

Background information on lab concepts can be found here: https://101zh.github.io/networking/

Contents

Purpose

The purpose of this lab is to setup a standalone access point (AP) that broadcasts a 2.4GHz network using a pre-shared key to authenticate users; a 5GHz network also using a pre-shared key to authenticate users; and a 5GHz network with enterprise authentication using RADIUS. All these Wi-Fi networks will be secured using WPA2. Additionally, the other devices are configured to provide internet connectivity for any devices that connect to the AP by using various protocols.

Lab Summary

  • 3 wireless networks
    • One 2.4GHz with WPA2 pre-shared key (WPA2 PSK)
    • One 5 GHz with WPA2 PSK
    • One 5 GHz with WPA2 Enterprise, using RADIUS
  • Router: R1
    • Acts as a defaut gateway to the internet
    • Configured with NAT
    • Has DHCP configured for hosts that request an address
  • Switch: S1
    • Only trusted ports are trunked
    • Multiple VLAN interfaces for testing and debugging

A standalone access point was configured with a 2.4GHz network and 5GHz network using WPA2 and a pre-shared key to authenticate users; Additionally, the access point was also configured to broadcast a 5GHz network with enterprise authentication using RADIUS. As a result, there is a RADIUS server. Lastly there is a router that provides connectivity to the internet through DHCP and NAT for the AP and other connected wireless devices.

IPv4 Topology

This Topology is for IPv4. All 10.0.xx.xx addresses are within the network.

IPv4 Topology Image

Address Table

Device Name Interface IPv4 Address IPv4 Subnet Mask
R1 G0/0/1 DHCP DHCP
R1 G0/0/0.1 10.0.0.1 255.255.255.0
R1 G0/0/0.5 10.0.5.1 255.255.255.0
R1 G0/0/0.24 10.0.24.1 255.255.255.0
R1 G0/0/0.50 10.0.50.1 255.255.255.0
AP BVI 1 10.0.0.3 255.255.255.0
Server0 ethn0 10.0.0.2 255.255.255.0
S1 Vlan 1 10.0.0.4 255.255.255.0
S1 Vlan 5 10.0.5.4 255.255.255.0
S1 Vlan 24 10.0.24.4 255.255.255.0
S1 Vlan 50 10.0.50.4 255.255.255.0

Device Overview

  • One 4321 router running Cisco IOS XE Software, Version 16.9 Universal K9
  • One Cisco 3560 POE-38 running C3560-IPSERVICESK9-M Version 12.2(44)SE5
  • One Cisco Aironet AIR-LAP1042N-A-K9 Dual Band Access Point running k9w7 IOS
  • One server running Debian

Important Configuration Commands

AP Commands

  • aaa new-model
    • Enables authentication, authorization, and accounting control commands.
  • aaa group server radius [server-group-name]
    • Defines a radius server-group.
    • server [ip-address] auth-port [port-number] acct-port [port-number]
      • Specifies a radius server with the authentication and accounting ports for it.
  • aaa authentication login [named-authentication-list] group radius
    • Sets an authentication list for radius.
  • dot11 ssid [service-set-ID]
    • Enters the configuration mode for a service set ID.
    • vlan [vlan-number]
      • assigns the SSID to a VLAN.
    • authentication open
      • Configures the SSID to allow any device to authenticate and try and communicate with the access point.
    • authentication key-management wpa version 2
      • Configures the SSID to use WPA2 when a device attempts to authenticate with the access point.
    • mbssid guest-mode
      • Configures the SSID to allow for multiple SSIDs and to broadcast the SSID name.
    • wpa-psk ascii 0 [unencrypted-password]
      • Specifies a clear-text password for the SSID.
    • authentication open eap [eap-list-name]
      • Configures the SSID to use EAP, allowing other authentication methods to be used.
    • authentication network-eap [eap-list-name]
      • Configures the SSID to use radius for authentication.
  • bridge irb
    • Configures the access point to use integrated routing and bridging.
  • interface Dot11Radio0
    • Enters the interface configuration mode for the access point’s 2.4GHz radio.
    • encryption mode ciphers aes-ccm
      • Sets the 2.4 GHz radio to use AES-CCM for encryption
    • encryption vlan [vlan-number] mode ciphers aes-ccm
      • Configures AES-CCM encryption to be used for the specified vlan with the interface.
    • ssid [service-set-ID]
      • Specifies an SSID to be transmit on this radio.
    • antenna gain [resultant-antenna-gain-dB]
      • Sets a value for the antenna gain of the access point’s radio; the value determines how focused the signal is for the radio.
    • mbssid
      • Enables multiple BSSIDs on the 2.4GHz radio.
    • station-role root
      • Configures the access point to be a root, which is the starting point for the transmitting of a network.
  • interface [interface-name] . [subinterface-number]
    • Enters interface configuration mode for a subinterface
    • encapsulation dot1Q [vlan-ID] {native}
      • Configures the interface to encapsulate packets using 802.1Q
    • bridge-group [bridge-group-number]
      • Assigns the interface to a bridge group
  • interface Dot11Radio1
    • Enters the interface configuration mode for the access point’s 2.4GHz radio.
    • peakdetect
      • Tells the radio to avoid interfering with other wireless signals
    • dfs band [frequency-band-number] block
      • blocks a particular band of radio waves that the access point won’t use. (typically used because of laws that restrict which bands can be used in which areas)
    • channel dfs
      • Tells the AP to dynamically select what frequency to be on
  • interface [interface-name]
    • Enters interface configuration mode for any particular interface
    • mac-address [MAC-address]
      • Sets the mac-address of the interface
    • ip helper-address [ip-address]
      • Indicates a location for UDP broadcast packets. It is often used for DHCP, but there are other uses.
  • radius-server host [ip-address] auth-port [port-number] acct-port [port-number] key 0 [unencrypted-password]
    • Specifies a radius server IP, the authentication and accounting ports for it, and the clear-text password for communicating with the radius server.
  • bridge [bridge-group-number] route ip
    • Tells a particular bridge group to use IP to route in the group

Switch Commands

  • interface [interface-name]
    • Enters interface configuration mode for any particular interface
    • switchport trunk encapsulation dot1q
      • Tells the interface to use 802.1q trunking encapsulation when trunking
    • switchport mode trunk
      • Puts the interface in trunking mode, which allows multiple VLANs to go through one port.
    • spanning-tree portfast
      • Tells the interface to start forwarding packets the moment it is up

Router Commands

  • ip dhcp excluded-address [low-address] [high-address]
    • Excludes addresses from low address to the high address from being distributed to hosts.
  • ip dhcp pool [pool-name]
    • Defines a DHCP pool
    • network [network-number] [subnet-mask]
      • Sets the network for this DHCP pool
    • default-router [ip-address] [ip-address2 … ip-address8]
      • Defines the default gateway for host devices
    • dns-server [ip-address] [ip-address2 … ip-address8]
      • Defines the DNS server for host devices
  • interface [interface-name]
    • Enters interface configuration mode for any particular interface
    • ip nat {inside | outside}
      • Defines the interface for either “inside” or “outside” network address translation
  • ip nat inside source list [access-list-number] interface [interface-name] overload
    • Indicates a list of addresses to be translated on the inside to one interface with PAT (port address translation)
  • access-list [access-list-number] {deny|permit} [network-number] [wildcard-mask]
    • Denies or permits a range of IP addresses

Copyright

MIT License

Copyright (c) 2026 101zh

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.z

About

This repository contains the configurations for a small office network with a standalone access point that broadcasts multiple SSIDs.

Topics

Resources

License

Stars

Watchers

Forks