<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vlaning across different sites in ZoneDirector</title>
    <link>https://community.ruckuswireless.com/t5/ZoneDirector/Vlaning-across-different-sites/m-p/19183#M4046</link>
    <description>Thanks for the answer, what I am trying to achieve is that all guest and BYOD access not be on the corporate network. I worked with support to get the BYOD authentication working using Zero-IT, but the IP the device gets is of the corporate network and I have run in to issues with running out of IP addresses. 
&lt;BR /&gt;
I have tried testing with vlan tagging by putting the AP on a trunked port and setting the vlan for the SSID but as soon as I do that it loses communication with the ZD at the other site. Not sure what I am missing.</description>
    <pubDate>Mon, 24 Mar 2014 21:06:01 GMT</pubDate>
    <dc:creator>scott_frasier</dc:creator>
    <dc:date>2014-03-24T21:06:01Z</dc:date>
    <item>
      <title>Vlaning across different sites</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Vlaning-across-different-sites/m-p/19181#M4044</link>
      <description>Not quite sure on how to configure the following:
&lt;BR /&gt;
Have one ZD3000 and 2 sites, more in the future.
&lt;BR /&gt;
Want to Vlan guest and BYOD traffic at both sites.
&lt;BR /&gt;
Each site has it's own DHCP server with different IP schemes.
&lt;BR /&gt;
Any in-site on how to make this work would be appreciated.</description>
      <pubDate>Mon, 24 Mar 2014 19:30:40 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Vlaning-across-different-sites/m-p/19181#M4044</guid>
      <dc:creator>scott_frasier</dc:creator>
      <dc:date>2014-03-24T19:30:40Z</dc:date>
    </item>
    <item>
      <title>Re: Vlaning across different sites</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Vlaning-across-different-sites/m-p/19182#M4045</link>
      <description>I assume you've got routers or VPN connections in-between your various sites, and no common subnets between them.
&lt;BR /&gt;&lt;BR /&gt;
In that case, you need to decide if you need/want to create a common set of wifi SSIDs and subnets between locations.
&lt;BR /&gt;&lt;BR /&gt;
For the moment, I'll assume not.
&lt;BR /&gt;
(I'm assuming your locations are far enough apart where a client would never "roam" between APs in different locations without dropping connectivity first)
&lt;BR /&gt;&lt;BR /&gt;
In that case, you can have different SSIDs in each location and a different subnet backing up each SSID.
&lt;BR /&gt;
(technically you could have the same VLAN number used for different subnets in different locations but that's conceptually less "clear")
&lt;BR /&gt;&lt;BR /&gt;
You have the option of using per-user authentication for the BYOD gear or (if you can accept less security) you could issue a single password for all employees.
&lt;BR /&gt;
Guest access is typically unauthenticated and on a subnet/VLAN that only provides internet access.
&lt;BR /&gt;&lt;BR /&gt;
I assume your remote site(s) have onsite network resources (like file servers, etc.) since you have DHCP servers in each location.
&lt;BR /&gt;
So you probably don't want to use tunneling but:
&lt;BR /&gt;
If you need/want to have wireless users in the same subnet(s) between locations for some reason, you could use tunneling for APs in the remote locations.
&lt;BR /&gt;
Caveat: You do *not* want to use AP tunneling if that would force a significant amount of traffic back to your central location just to get routed out again to to reach a (wired?) resource in that remote location.
&lt;BR /&gt;&lt;BR /&gt;
Also... There is overhead on your ZD3000 for each tunnel.
&lt;BR /&gt;
So.. you probably don't want a remote location with a large number of APs to tunnel all it's traffic back.</description>
      <pubDate>Mon, 24 Mar 2014 20:48:36 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Vlaning-across-different-sites/m-p/19182#M4045</guid>
      <dc:creator>bill_burns_6069</dc:creator>
      <dc:date>2014-03-24T20:48:36Z</dc:date>
    </item>
    <item>
      <title>Re: Vlaning across different sites</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Vlaning-across-different-sites/m-p/19183#M4046</link>
      <description>Thanks for the answer, what I am trying to achieve is that all guest and BYOD access not be on the corporate network. I worked with support to get the BYOD authentication working using Zero-IT, but the IP the device gets is of the corporate network and I have run in to issues with running out of IP addresses. 
&lt;BR /&gt;
I have tried testing with vlan tagging by putting the AP on a trunked port and setting the vlan for the SSID but as soon as I do that it loses communication with the ZD at the other site. Not sure what I am missing.</description>
      <pubDate>Mon, 24 Mar 2014 21:06:01 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Vlaning-across-different-sites/m-p/19183#M4046</guid>
      <dc:creator>scott_frasier</dc:creator>
      <dc:date>2014-03-24T21:06:01Z</dc:date>
    </item>
    <item>
      <title>Re: Vlaning across different sites</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/Vlaning-across-different-sites/m-p/19184#M4047</link>
      <description>See if this thread addresses your issue:
&lt;BR /&gt;
&lt;A href="https://forums.ruckuswireless.com/ruckuswireless/topics/cisco_switch_vlan_configuration_for_ruckus_wifi_network" rel="nofollow"&gt;https://forums.ruckuswireless.com/ruc...&lt;/A&gt;
&lt;BR /&gt;&lt;BR /&gt;
The AP has a management IP address.
&lt;BR /&gt;
Setting the vlan for an SSID is good, but it does not set the vlan for the APs management IP.
&lt;BR /&gt;&lt;BR /&gt;
If you're trunking traffic to your APs, you'll probably want to have a separate VLAN for management traffic to the AP.
&lt;BR /&gt;&lt;BR /&gt;
A separate wifi management VLAN is not mandatory but:
&lt;BR /&gt;
Whatever the APs management IP is, it should be in the native VLAN of your trunk.
&lt;BR /&gt;&lt;BR /&gt;
Once you've got your APs trunked (and working) you should be able to assign a different VLAN for your Corporate, Guest and BYOD SSIDs</description>
      <pubDate>Mon, 24 Mar 2014 21:21:23 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/Vlaning-across-different-sites/m-p/19184#M4047</guid>
      <dc:creator>bill_burns_6069</dc:creator>
      <dc:date>2014-03-24T21:21:23Z</dc:date>
    </item>
  </channel>
</rss>

