AP Deployment with Simple Roaming
To extend the range of an SSID over a larger physical area, you can assign the same SSID to multiple APs. When a wireless user moves to a different location on your physical network, the wireless client can automatically connect to a different AP that has a stronger signal for that SSID. This eliminates the need for users to manually reconnect when they move their wireless devices around your office. Simple roaming relies on the wireless client to switch between wireless access points.
For this deployment scenario, you can connect each AP directly to a trusted Firebox interface, or to a switch on the trusted network. As long as you connect all APs to interfaces in the same network security zone, wireless clients that connect to the SSID can roam between the APs.
The diagram below shows three APs connected to the trusted network, two connected to a switch, and one connected to a trusted interface on the Firebox. All APs use the same SSID.
AP Deployment and Firebox Policies
Note these policy requirements, which depend on how you connect the APs and other resources to your network.
- If you connect the AP directly to a Firebox interface, the wireless users do not automatically have access to trusted resources that connect to other trusted interfaces on the Firebox. You must configure policies to allow that traffic because the wireless users are on a separate trusted network. The default firewall policies only allow outbound traffic from trusted networks, but do not allow traffic between devices on different trusted networks.
- If you connect the AP to a switch on the trusted network, the wireless users can access other network resources on the network connected to the same interface. You do not need to create additional policies to allow access because the traffic does not go through the Firebox, but you do need to create policies for traffic to resources that connect to any other trusted interface.
Configure a Firebox Interface and Enable DHCP
To connect the AP directly to a Firebox interface, configure that interface as a Trusted or Optional interface. Enable the DHCP server or DHCP relay on that interface so that the Firebox can automatically assign an IP address to the AP and to wireless clients.
- Select Network > Interfaces.
- Select a network interface and click Edit.
- In the Interface Name (Alias) text box, type a name for this network.
For this example, type Trusted-Wireless. - (Optional) In the Interface Description text box, type a description of the interface.
- From the Interface Type drop-down list, select Trusted.
- In the IP Address text box, type the IP address for this interface in slash notation.
For this example, type 10.0.10.0/24. - Select DHCP Server.
- In the Address Pool section, click Add.
- In the Starting IP and Ending IP text boxes, type the IP addresses for the DHCP range.
For this example, type 10.0.10.2 and 10.0.10.100. - Click Save to save the interface settings.
- Select Network > Configuration.
The Network Configuration dialog box appears. - Select a network interface and click Configure.
- In the Interface Name (Alias) text box, type a name for this network.
For this example, type Trusted-Wireless. - (Optional) In the Interface Description text box, type a description of the interface.
- From the Interface Type drop-down list, select Trusted.
- In the IP Address text box, type the IP address for this interface in slash notation.
For this example, type 10.0.10.0/24. - Select Use DHCP Server.
- In the Address Pool section, click Add.
The Add Address Range dialog box appears. - In the Starting IP and Ending IP text boxes, type the IP addresses for the DHCP range.
For this example, type 10.0.10.2 and 10.0.10.100. - Click OK to save the DHCP configuration.
The IP address range appears in the Address Pool list. - Click OK to save the interface settings.
- Save the configuration file to your Firebox.
Add the SSID to the Gateway Wireless Controller
- Select Network > Gateway Wireless Controller.
- Select the Enable the Gateway Wireless Controller check box.
- On the SSIDs tab, click Add.
- In the Network Name (SSID) text box, type Trusted.
- In the Access Points tab, select the APs that will use this SSID.
If the APs have not been paired to the Firebox yet, you can assign this SSID to each AP after you add it to the Gateway Wireless Controller. - Select the Security tab.
- Configure your wireless encryption security settings for this SSID.
- Save the SSID configuration.
- Click Save to save the Gateway Wireless Controller configuration.
- Select Network > Gateway Wireless Controller.
The Gateway Wireless Controller dialog box appears, with the SSIDs tab selected. - Select the Enable the Gateway Wireless Controller check box.
- On the SSIDs tab, click Add.
The Add SSID dialog box appears, with the Settings tab selected.
- In the Network Name (SSID) text box, type Trusted.
- Make sure the Enable VLAN tagging check box is cleared.
VLANs are not required for this roaming deployment scenario. - In the Access Points tab, move the APs that you want to use this SSID from the Available list to the Member list.
If the APs have not been paired to the Firebox yet, you can assign this SSID to each AP after you add it to the Gateway Wireless Controller. - Select the Security tab.
- Configure your wireless encryption security settings for this SSID.
- Click OK to save the SSID configuration.
The Gateway Wireless Controller dialog box appears, with the Trusted SSID in the SSID list.
- Click OK to save the Gateway Wireless Controller configuration.
- Save the configuration file to your Firebox.
After you have configured the SSID, you can pair any additional APs with the Firebox, and assign this SSID to the radios on each AP.