Networking | Cloud | DevOps | IaC

How to Provision 802.1 X Authentication Step By Step With Dynamic VLAN Assignment With Windows Radius Server For 802.1x Clients

IEEE 802.1X Authentication and Dynamic VLAN Assignment with NPS Radius Server

IEEE 802.1X Authentication and Dynamic VLAN Assignment with NPS Radius Server is an important element to networking in the real world. User location cannot be predicted as they may be at and out of a desk and up and about should they need to do so. Tying them to a local VLAN may only be helpful if they are bound to desks in those locations, although the most ideal outcome, it is not the most practical.

It is only wise to incorporate IEEE 802.1X Authentication and Dynamic VLAN Assignment with NPS Radius Server in areas where you expect different teams to come to. Meeting rooms could for a moment have the accounting group or the development group meeting there and based on the intelligent and dynamic vlan assignmnet with 802.1x authentication, users port-access are defined their appropriate vlans for their respective access to resources on the network.

How to Provision 802.1 X Authentication Step By Step With Dynamic VLAN Assignment With Windows Radius Server For 802.1x Clients.

A typical configuration for a system under IEEE 802.1x Authentication control is shown in the following figure.

In this scenario, “Lady Smith” wishes to use services offered by servers on the LAN behind the switch. There are multiple VLANs with resources available based on user vlan membership. Her laptop computer is connected to a port on the Aruba 2920 Edge Switch that has 802.1x port authentication control enabled.

The laptop computer must therefore act in a supplicant role. Message exchanges take place between the supplicant and the authenticator which is the Aruba 2920 Switch, and the authenticator passes the supplicant’s credentials which is her (Windows Active Directory User Account Credentials) to the authentication server for verification. The NPS Server which is the authentication server then informs the authenticator whether or not the authentication attempt succeeded, at which point “Lady Smith” is either granted or denied access to the LAN behind the switch.

Setup Structure for IEEE 802.1X Authentication and Dynamic VLAN Assignment with NPS Radius Server

  • Supplicant: Laptop running Microsoft Windows 10 or Windows 7
  • Authenticator: HP Aruba 2920 Edge Switch
  • Authentication Server: Microsoft NPS (Network Policy Server) running on Windows Server 2012 R2.
  • User Database : Active Directory

For Windows Infrastructure

Create NPS Server – Add Role on Windows Server 2012 R2

  • Create DHCP Scopes for VLANS

Create RADIUS Client on NAC using Network Policy Server

  • Create Network Policies
  • Configure a Network Policy for VLANs
  • Start Wired Auto-Config Service
  • Enable Network Authentication

Create the DHCP Scopes for VLAN100 and VLAN200 Groups

  • Development Group Scope – VLAN 100

SVI: ip address 172.16.80.254 255.255.255.0 Scope Subnet: 172.16.80.1/24

  • Accounting Group Scope – VLAN 200

SVI:ip address 172.16.70.254 255.255.255.0 Scope Subnet: 172.16.70.0/24

Secret Key: secret12

Add Edge Switch Management IP as the RADIUS Client

The Shared Secret Key: secret12 will be used in the Switch Configuration.

Create Network Policy Settings for Accounting Group for VLAN 200

Configuration Example

Here’s an example of how you might consider when configuring Microsoft NPS Server to assign users to a VLAN based on their user group, using NPS for the authentication and authorization of users. This configuration has worked flawlessly on the HP Aruba 2920 Switch. The key to getting this to work is the use of a RADIUS element called: ‘Tunnel-PVT-Group-ID’. This is a RADIUS attribute that may be passed back to the authenticator (i.e. the Aruba 2920 Switch) by the authentication server (i.e. Microsoft NPS Server) when a successful authentication has been achieved. There are a few other elements which need to accompany it, but this is the key element, as it specifies the VLAN number that the user should be assigned to.

The other elements that need to be returned by the NPS Server are as follows:

  • Tunnel-PVT-Group-ID: 200
  • Service-Type: Framed
  • Tunnel-Type: VLAN
  • Tunnel-Medium-Type: 802

For Client Infrastructure

On the Supplicant, Windows 7 or 10 configure the following steps on the Ethernet Adapter to enable IEEE 802.1X Authentication

For Network Infrastructure

Connect Server Infrastructure to VLAN 400

Create VLAN for Accounting Group

Create VLAN for Development Group

Create AAA Configuration on Switch for Radius Authentication

Download the Switch Configuration:

Test the IEEE 802.1X Authentication and Dynamic VLAN Assignment with NPS Radius Server

Verify Port-Access with the following user groups – VLAN 100 and VLAN 200

Think of what other clever things you can do from the information below;

Breakdown of Commands for RADIUS Authentication

Verification Commands

Thanks for reading. Please share your thoughts in the comment box below;

Published in Configuring , Design , Installing and Configuring , Networking , Security and Switching

  • 802.1 x authentication step by step aruba
  • 802.1 x authentication step by step cisco
  • 802.1 x wireless authentication step by step
  • 802.1x authentication process
  • 802.1x authentication windows 10
  • 802.1x authentication windows server 2012
  • 802.1x certificate authentication
  • assignment wlc
  • cisco dot1x
  • cisco ise dynamic vlan
  • cisco ise dynamic vlan assignment wlc
  • cisco wireless radius attributes
  • configuration example
  • dynamic vlan assignment cisco 2960 dynamic vlan configuration in packet tracer
  • dynamic vlan assignment with windows radius server
  • dynamic vlan cisco
  • dynamic vlan ruckus
  • meraki dynamic vlan assignment
  • nps mac authentication wired
  • nps policy for mac-based authentication
  • radius multiple vlans
  • vlan radius server
  • vlan steering
  • vmps server

integrating IT

ISE Dynamic VLAN assignment

Dynamic VLAN assignment by a RADIUS server (e.g. Cisco ISE) can be useful when you want to assign a specific VLAN to a user or group of users. In order to achieve this the VLANS configured on the switches must be configured with a name, this name must be consistent across multiple switches. However the VLAN number does not necessarily need to be the same across the switches.The scenario in this blog post will simply define 2 VLANS (ADMIN and USERS), members of the AD group Domain Admins will be assigned to a VLAN called ADMIN and members of the AD group Domain Users will be assigned to a VLAN called USERS.

The configuration of ISE in this post only describes the steps in order to configure Dynamic VLAN assignment. Refer to this previous post on how to configure Cisco ISE for 802.1x authentication.

Switch Configuration

Configure the name on the VLANS. These names must match the name specified in the Authorisation Profile on ISE.

ISE Configuration

Authorisation profiles.

  • Navigate to Policy > Policy Elements > Results > Authorisation > Authorisation Profiles
  • Create a new Authorisation Profile and name appropriately e.g VLAN_ADMIN
  • Under the Common Tasks section, tick VLAN
  • Enter the ID/Name of the Admin VLAN as ADMIN

cisco dynamic vlan assignment radius

  • Repeat the task and create another Authorisation Profile for the Standard Users e.g VLAN_USERS
  • Enter the correct ID/Name as USERS

cisco dynamic vlan assignment radius

Authorisation Policy

  • Navigate to Policy > Policy Set
  • Modify an existing Policy Set used for 802.1x
  • Ensure there are different Authorization Policy rules, for Admin Users and another for Standard Users
  • Assign the VLAN_ADMIN Authorisation Profile to the Admin rule Profiles
  • Assign the VLAN_USERS Authorisation Profile to the Standard Users rule Profiles
  • Save the policy

cisco dynamic vlan assignment radius

Verification

Before logging in as a user, confirm the configuration of the interface the test computer is plugged into. Notice the VLAN is set to VLAN 10.

cisco dynamic vlan assignment radius

  • Running the command show authentication sessions interface fastethernet 0/3 confirm the computer has a valid IP address in VLAN 10. Notice under Vlan Policy N/A, this means this interface was not dynamically assigned a VLAN.    

cisco dynamic vlan assignment radius

Login as a user that is a member of the AD group Domain Users.

  • Run the command show authentication sessions interface fastethernet 0/3
  • Compare the output this time with above. Notice the computer now has an IP address from the VLAN 11 DHCP Pool and Vlan Policy = 11, this confirms the computer has dynamically been assigned to VLAN 11.

cisco dynamic vlan assignment radius

  • Run the command debug radius whilst the users is logging on
  • You can confirm the VLAN name being returned by successful authorisation by the RADIUS server by the presence of Tunnel-Private-Group .

cisco dynamic vlan assignment radius

Logoff and log back in as a user in the Domain Admins AD group.

  • Compare the output this time with above. Notice the computer now has an IP address from the VLAN 12 DHCP Pool and Vlan Policy = 12

cisco dynamic vlan assignment radius

  • Running the command debug radius confirms the correct VLAN name ADMIN was sent by the RADIUS server.

cisco dynamic vlan assignment radius

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)

' src=

Published by integratingit

View all posts by integratingit

3 thoughts on “ ISE Dynamic VLAN assignment ”

  • Pingback: Initial Cisco ISE Configuration – integrating IT

Hi it is cool . What happend if some device has IP fix

If the device has a static IP address and is moved to a different VLAN, the user will not be able to communicate. It will only work if using DHCP.

Leave a comment Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed .

' src=

  • Already have a WordPress.com account? Log in now.
  • Subscribe Subscribed
  • Copy shortlink
  • Report this content
  • View post in Reader
  • Manage subscriptions
  • Collapse this bar

Network Guys

Share your knowledge!

How to use 802.1x/mac-auth and dynamic VLAN assignment

Hello guys! Today I want to show you how to secure your edge-switches with 802.1x and mac-authentication fallback in combination with HPE comware-based switches. The 802.1x protocol is used for network access control. For devices like printers, cameras, etc. we will use mac-authentication as a fallback. We will also use dynamic VLAN assignment for the connected ports.

Our radius server will be Microsoft NPS. You can activate this role on the Windows server:

cisco dynamic vlan assignment radius

After the installation, open the NPS console and register the radius server in your Active Directory:

cisco dynamic vlan assignment radius

add your switches or your management network as a radius-client:

cisco dynamic vlan assignment radius

the shared secret will be used in the switch configuration. In created two groups within my test environment:

  • “ VLAN2-802.1x ” containing computer accounts
  • “ VLAN3-MAC-Auth ” containing user accounts (username+password = mac-address of the device)

So we will now configure two network policies for our network access control:

cisco dynamic vlan assignment radius

I also configured a NAS Identifier so no other device can use the radius server. The clients will use their computer certificate so you will need a running internal certification authority. Choose PEAP only as the authentication method:

cisco dynamic vlan assignment radius

the next step is for our dynamic VLAN assignment. Dot1x devices are bound to VLAN 2:

cisco dynamic vlan assignment radius

the final dot1x configuration in the NPS:

cisco dynamic vlan assignment radius

the second network policy is for the mac-based authentication:

cisco dynamic vlan assignment radius

Comware switches are sending MAC-Auth-requests via PAP (maybe you know how to change it to CHAP):

cisco dynamic vlan assignment radius

final MAC auth profile:

cisco dynamic vlan assignment radius

for now we have built up our authentication server. Now let’s go to the switch configuration. You have global configuration parameters and parameters for each interface. The best way is to use interface-range command to be safe at your configuration. Users who cant authenticate, will be forced to VLAN 999 (quarantine VLAN with no gateway). Here are the global parameters with explanations inline:

now we will configure the interfaces: Added 2 entries

the last part is to configure all windows clients to send 802.1x auth data to the cable network. I’ve done this via a global group policy. You can find the settings under Computer Configuration / Policies / Windows Settings / Security Settings / Wired Network (IEEE 802.3) Policies:

cisco dynamic vlan assignment radius

So how does a working 802.1x-auth looks like?

%Jan 3 01:59:59:531 2013 edge-switch-01 DOT1X/6/DOT1X_LOGIN_SUCC: -IfName=GigabitEthernet1/0/10-MACAddr=0023-2415-42a3-AccessVLANID=1- AuthorizationVLANID=2 -Username= host/PC123.mycompany.local ; User passed 802.1X authentication and came online.

Successful Mac-Authentication of a printer:

%Jan 3 01:31:28:782 2013 de-pad-l19-edg01 MACA/6/MACA_LOGIN_SUCC: -IfName=GigabitEthernet1/0/9-MACAddr=0017-c82d-e9bf-AccessVLANID=1- AuthorizationVLANID=3 -Username= 0017c82de9bf -UsernameFormat=MAC address; User passed MAC authentication and came online.

I tried to draw a flow chart which shows the authentication process, I hope it’s ok for you :)

cisco dynamic vlan assignment radius

Do you have questions? Feel free to write them into the comments and I will try to answer.

Have a nice and sunny day!

/edit: If you can’t see success and failure events, follow this instruction:  NPS / Radius Server is not logging

/edit 2018-05-14: I corrected the global and interface configuration, we had problems with the old configuration

12 Responses

Thanks for this, I need to setup dynamic VLAN assignment in the near future but for Juniper equipment.

This at least gives me a good starting point, thanks for the write up.

Many thanks for the perfect tutorial on How to use 802.1x/Mac-Auth and dynamic VLAN assignment. Many of us can take help from it. Really nice.

Nice write-up. This was a great starting point for configuring the base for dynamic polices. Thanks!

hi Mike, how ‘s about hybrid port with voice-vlan? does it work?

thanks Tung Duong

we had several problems with this config, currently we are investigating hyprid ports with “port security” command. I will update this post if we have prooved this version.

Can you tell me why I would do this over conventional static VLANs? What are the benefits radius dynamic VLANs?

we have customers which want to divide the network for clients, printers and “special devices”. So you have different group/radius-policies to directly place the devices in the right VLAN. Dynamic VLAN is only a bonus feature which you can use. Of course, you can use only the 802.1x and Mac authentication for security purpose.

I’m on the desktop side of things, so apologies if I use any incorrect terminology here.

Our Infrastructure team are looking at introducing 8021x in our schools. They have a test setup where all 8021x devices pick up a data centre VLAN regardless of which building they’re in – eg 10.100.50.

Each building WIRED has its own unique IP – SchoolA=10.120, SchoolB = 10.130 and so on.

I’ve asked if the 8021x setup can be where 8021x devices in SchoolA will get 10.120.50; SchoolB will get 10.130.50

This would allow us to easily determine which building LaptopA actually is, in the same way as we can with our wired desktops. It also saves on SCCM boundary issues causing applications/updates to be pulled over the WAN rather than the LAN.

It’s been suggested that this may not be possible. Could someone confirm this?

Thanks in advance.

Hello! This is of course possible!

My idea (with examples):

SchoolA=10.120 (Location: Chicago) SchoolB=10.130 (Location: Dallas)

So at Chicago you will have VLAN 333, every device is getting an IP address with 10.120.x.x. At Dallas every device in VLAN 333 is getting an IP address with 10.130.x.x. So the VLAN ID “333” is the same at every school but the DHCP scope and default gateway has it’s own address. So the device is getting the VLAN 333 at every location but another IP address. It’s very simple.

It’s not working if all schools are connected via Layer2 so VLAN333 can’t be a “standalone VLAN” at each geographical location.

Ask me any questions, I will try to help you.

  • Pingback: 802.1x, MAC-Authentication and VLAN assignment at ProCurve/aruba Switches – Network Guy
  • Pingback: Port Auth, Dynamic VLAN and Radius | samuelnotes
  • Pingback: HPE Comware problem with mac authentication and printer - Network Guy

Leave a Reply Cancel reply

Click on the button to load the content from jetpack.wordpress.com.

Load content

This site uses Akismet to reduce spam. Learn how your comment data is processed .

Certificates

ekahau Certified Survey Engineer

Post Categories

Post archives, recent posts.

  • Sophos UTM 9.712-13 HA update problem 14. November 2022
  • Sophos UTM 9.712-12 update released 24. August 2022
  • Aruba OS Switch automatic vlan assignment for aruba APs 5. May 2022
  • Sophos UTM 9.711-5 update released 22. April 2022
  • Sophos UTM 9.710-1 update released 20. March 2022

Recent Comments

  • Sophos Ssl Vpn Client Anmeldung - Login and Portal on Auto-Logon with Sophos SSL VPN Client (OpenVPN)
  • Russell on Install Sophos UTM from USB Stick
  • arno on Problems with incoming mails
  • GigaTech IT on Installing Realtek Driver on ESXi 6.7
  • Sophos User Portal Login Ssl Vpn - Online Login on Auto-Logon with Sophos SSL VPN Client (OpenVPN)

Franky’s Web  Website from my friend Frank. News and Tricks about Microsoft products, primarly Exchange Server

Copyright by networkguy.de

Imprint · Privacy Policy

Stack Exchange Network

Stack Exchange network consists of 183 Q&A communities including Stack Overflow , the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.

Q&A for work

Connect and share knowledge within a single location that is structured and easy to search.

RADIUS VLAN Assignment with Cisco ISE

I am trying to install Cisco ISE 2.1 to be used as a RADIUS server with 802.1x on my switches. I want to dynamically assign a VLAN based to a user who connects on the switch port.

The problem is that, although my end client is authenticated and authorized by ISE, the VLAN id never gets received on the switch from ISE.

On ISE, I see my end user being authenticated with the correct policy, and authorized with the policy I created.

DOT1X config ISE

As seen on this image, I want to assign VLAN 56. However, my port does not get this information and stays in the hardcoded VLAN.

What could be the issue here?

Could it be that RADIUS options 064,065,081 are not forwarded from the ISE to the switch? I have a firewall between them.

Here is the configuration for dot1x on my switch :

And here is an output when the end user is authenticated through dot1x :

Here is the output of a debug dot1x all

Here is the output for "debug radius authentication"

Jeremy G.'s user avatar

  • You can try "debug radius authentication" or "debug dot1x all" on the switch to see what messages it is receiving. –  Ron Trunk Commented Jun 16, 2016 at 17:06
  • I did that, and edited my post to add the output above. I don't see anything really strange in the output though. –  Jeremy G. Commented Jun 16, 2016 at 17:15
  • 1 I don't either. How about the radius debug? –  Ron Trunk Commented Jun 16, 2016 at 17:18
  • 1 Great data, great question. +1 –  Citizen Commented Jun 17, 2016 at 8:57
  • 1 @Mr.lock : my switch is a 3560 and its version is 12.2(50r)SE. it could be a firmware issue, but the TAC did not think that way. I will try another switch ASAP though. –  Jeremy G. Commented Jun 28, 2016 at 11:54

2 Answers 2

I don't know if you've already done this, but you have to go a step further than just creating the Auth profile. You have to apply that auth profile with an auth policy. To create the auth policy do the following.

Go to Policy / Authorization Edit – profiles –standard, select your auth profile click Done click Save

BlackMagix's user avatar

  • You should edit your answer to explain it. –  Ron Maupin ♦ Commented Jul 19, 2016 at 21:51
  • @BlackMagix : I applied this Auth profile to an auth policy indeed. Moreover, I did a tcpdump on ISE during the authorization process, and i can see an "ACCESS-ACCEPT" frame sent by ISE with the correct VLAN ID. Therefore I think the issue is more on the switch than on ISE. –  Jeremy G. Commented Jul 22, 2016 at 6:47

For those still interested in this issue, I had to upgrade the IOS to 12.2(55)SE10. Now it's working with the initial configuration.

  • I would consider to upgrade to newer IOS version 15.*. Recommended version is marked as Golden image. –  Pawel Commented Jan 22, 2017 at 9:16

Your Answer

Sign up or log in, post as a guest.

Required, but never shown

By clicking “Post Your Answer”, you agree to our terms of service and acknowledge you have read our privacy policy .

Not the answer you're looking for? Browse other questions tagged cisco vlan radius cisco-ise or ask your own question .

  • The Overflow Blog
  • The evolution of full stack engineers
  • One of the best ways to get value for AI coding tools: generating tests
  • Featured on Meta
  • Join Stack Overflow’s CEO and me for the first Stack IRL Community Event in...
  • User activation: Learnings and opportunities

Hot Network Questions

  • Why is resonance such a widespread phenomenon?
  • Navigating career options after a disastrous PhD performance and a disappointed advisor?
  • Why is the area covered by 1 steradian (in a sphere) circular in shape?
  • Creating a global alias for a SQL Server Instance
  • Why are my empty files not being assigned the correct mimetype?
  • Book that features clones used for retirement
  • How can a microcontroller (such as an Arduino Uno) that requires 7-21V input voltage be powered via USB-B which can only run 5V?
  • Why would the GPL be viral, while EUPL isn't, according to the EUPL authors?
  • When deleting attribute from GDB file all the fields in the remaining attributes get deleted as well in QGIS
  • How do elected politicians get away with not giving straight answers?
  • Seeking Advice for Outdoor Junction Box
  • 4/4 time change to 6/8 time
  • What is a natural-sounding verb form for the word dorveille?
  • What prevents indoor climbing gyms from making a v18 boulder even if one hasn't been found outside?
  • The quest for a Wiki-less Game
  • Does Poincare recurrence show that Gibbs entropy is not strictly increasing?
  • Would it be illegal for Companies House to require a response to a letter on registration?
  • What are the pros and cons of the classic portfolio by Wealthfront?
  • Does my employer contributions count towards the Roth limit of $7k?Roth contributions
  • Assumptions of Linear Regression (homoscedasticity and normality of residuals)
  • What is the rationale behind 32333 "Technic Pin Connector Block 1 x 5 x 3"?
  • When should I put a biasing resistor - op-amps
  • Is Produce Flame a spell that the caster casts upon themself?
  • How does conservation of energy work with time dilation?

cisco dynamic vlan assignment radius

Meraki Community

  • Community Platform Help
  • Contact Community Team
  • Meraki Documentation
  • Meraki DevNet Developer Hub
  • Meraki System Status
  • Technical Forums

802.1x dynamic vlan

  • Subscribe to RSS Feed
  • Mark Topic as New
  • Mark Topic as Read
  • Float this Topic for Current User
  • Printer Friendly Page

markboh

  • Mark as New
  • Report Inappropriate Content

Solved! Go to solution.

ww

View solution in original post

  • All forum topics
  • Previous Topic

:winking_face:

  • New September 10: [CONTEST] Yo, Ho! Talk Like a Pirate Day It Be
  • September 4: Recognizing the August 2024 Members of the Month
  • August 26: [CONTEST ENDED] Celebrate IT Professionals Day
  • Interfaces 242
  • Layer 2 269
  • Layer 3 195
  • Community guidelines
  • Cisco privacy
  • Khoros privacy
  • Terms of service

Logo

Switch [Dynamic VLAN] - Configure RADIUS Server for dynamic VLAN Assignment

Print Friendly and PDF

Dynamic VLAN Assignment separates and isolates devices into different network segments based on the device or user authorization and their characteristics.

Scenario & Topology

Switch configuration, set up nps on windows server 2019, verification.

mceclip0.png

In most networks, administrators may have to restrict devices on a variety of networking devices for security purposes.

A common way to achieve this kind of network restriction is via static VLAN assignments. Administrators therefore create VLANs and configure the corresponding VLAN number to each switch port with access mode. Conversely, administrator only needs to set switch port as trunk and fixed port and a few policies on RADIUS server for Dynamic VLAN Assignment. It mitigates considerable actions/jobs for network administrator.

The purpose of this configuration guide demonstrates every step to configure Dynamic VLAN Assignment on both switch and RADIUS Server.

Configuration

The following steps are applicable for switches supported on compound authentication. Supported switch are GS2220 and XGS2210 in standalone mode and collocated with a RADIUS Server (Windows Server 2019).

  • Configure RADIUS IP address, Shared secret, and AAA settings at:

mceclip1.png

  • Configure 802.1x, MAC authentication, and Guest VLAN as well as Compound Authentication on client port at

mceclip2.png

  • Keep Compound Authentication Mode as strict for client port

Open Network Policy Server and right-click on RADIUS Clients > New, to configure Friendly name, IP address, and Shared secret.

mceclip3.png

Configure Connection Request Policies(CRP)

  • Right-click on  CRP > New
  • Specify CRP policy name
  • Specify Conditions

We suggest to use NAS Identifier (device hostname) and NAS IPv4 Address here if you are unfamiliar in this page. In addition, if you have a lot of devices that plans to be added into RADIUS clients, you can use symbol * to avoid adding many conditions for a CRP, for example, “GS22*” or “192.168*”.

mceclip4.png

  • Specify Connection Request Forwarding > Next
  • Specify Authentication Methods > Next
  • Configure Settings > Next
  • Check everything you just configure, and click Finish.

Configure Network Policies

  • Right-click on Network Policies > New
  • Specify Network Policy name
  • Specify Conditions > Add > choose Windows Groups

mceclip5.png

  • Specify Access Permission > Next
  • Configure Authentication Methods

mceclip6.png

  • Configure Constraints > Next
  • Configure Settings.

mceclip7.png

  • Check everything you configure, and click Finish.

Set up user/device account on Windows Server 2019

  • Open Active Directory Users and Computers
  • Right-click on domain > New > User
  • Create accounts for 802.1x and MAC authentication

Notice:  for MAC authentication user, the User logon name should be filled in exactly the same format as setting in switch MAC authentication page.

mceclip8.png

  • Plus, user password should be matched to switch setting as well.

mceclip9.png

  • Client passes compound authentication; it gets IP address of Data VLAN

mceclip10.png

  • Client fails compound authentication; it gets IP address of Guest VLAN

mceclip11.png

  • Make sure DHCP Server functions in the network.
  • L3 switch should enable DHCP Smart Relay and point to DHCP server.
  • If your NPS server is installed in VM, and NPS service is not functioning even it is running, you should STOP and START NPS service again.

cisco dynamic vlan assignment radius

Articles in this section

  • [FAQ] Switch
  • Zyxel Switch [User Privilege Level] - Configuring additional users with different rights
  • Zyxel Switch [Configuration File] - How to Backing Up and Restoring Configuration Files on your ZyXEL Switch
  • Zyxel Surge Protector [SUPERGO-GE] - Overview and Installation Guide for SUPERGO-GE
  • Zyxel Switch [restart/reboot] - procedure to reboot or restore your ZyXEL Switch
  • Network Switch [Connectivity] - Troubleshoot NTP issues (Nebula / Stand-alone)
  • VLAN Isolation [Network Switch] - Configure Layer 2 isolation except for Servers or Printers
  • Switch - Overview of Layer 3 (L3) Routing Features & Licensing
  • Switch - Configure Two ISPs in One Switch
  • GS1200/XGS1210/XGS1250 - Configure Basic Setup, VLAN, LAG, Firmware Upgrade

Please sign in to leave a comment.

Sign up for our newsletters to get the latest news!

This website uses cookies

Dear Valued Customer,

Thank you for being a part of the Zyxel family.

Although your product warranty has ended, we are pleased to offer you a special 15% discount for your next purchase on our Zyxel EU Store

Use the voucher code GEUO67B15 at checkout to enjoy this exclusive benefit. If your warranty concerns persist, please initiate a Return Merchandise Authorization (RMA) case with a copy of your invoice, and we'll gladly assist you further.

We're committed to your continued satisfaction with our products and services. Best regards,

The Zyxel Team

Zyxel France

Obadete se da govorite s predstavitel na uslugata. Stremim se da otgovorim na vsichki obazhdaniya v ramkite na 3 minuti no v natovareni vremena mozhe da ni tryabva malko poveche vreme Otvoreni rabotni dni 9: 00-17: 00 chasa

Call to speak with a service representative. We aim to answer all calls within 3 minutes but at busy times we might need a little longer Open workdays 9:00-17:00 (GMT +2)

Support utilisateur Horaires d'ouverture: Lun-Ven: 9h-13h et 14h-18h (GMT +2)

  • Skip to content
  • Skip to search
  • Skip to footer

2024 Template Guidelines and Instructions

Available languages, download options.

  • PDF (4.1 MB) View with Adobe Reader on a variety of devices
  • ePub (20.4 MB) View in various apps on iPhone, iPad, Android, Sony Reader, or Windows Phone
  • Mobi (Kindle) (5.8 MB) View on Kindle device or Kindle app on multiple devices

Bias-Free Language

The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.

  • Open a TAC Case Online
  • US/Canada 800-553-2447
  • Worldwide Support Phone Numbers

Feedback

Table of Contents

Definitions of Styles tags to use

Outcomes and Requirements

Design Approach

High Level Journey

“ As Is” vs “To Be”

Occupancy Reference Architecture

Network High Level Design

Physical Infrastructure Overview

OT PoE Network Design Overview

IoT Partner PoE Technology Solutions

Wireless Network Design Overview

Webex Control Hub Integration

IoT Wired Gateway

Smart Workspace Application

Energy Utilization Application (Beta)

Meraki MV12 Security Camera

Webex Collaboration Devices

Webex Room Hub

Device Management

PoE Analytics

Architecture

Deployment Architecture

High Availability Design

Identity Services Engine (ISE)

Cisco DNA Center

Cisco DNA Infrastructure

Cisco Spaces

Webex Control Hub, Meeting Site Creation, Call Setup

WLAN Controllers and Access Points

End User and Hybrid Work Device Onboarding

Physical Collab Device Setup

Cisco Spaces, Webex Control Hub Integration, and Signage (Rich Maps)

Guest Access

Connecting Systems and Data (API/SDK)

Monitoring and Troubleshooting

Voice Assistant

How to use the template

Title guidelines and best practices:

●      100 Character Maximum (this includes spaces)

●      Make sure that the title mentions Cisco technology first

●      Manager should propose the title

◦      Titles should be brief and convey specific coverage

◦      Should follow marketing guidelines for co-branded documents

●      Partners should agree to the title prior to final publication

●      There are never to be dates in the title

●      SW versions in the title should be included sparingly, and used as a differentiator from a previously published document

Related image, diagram or screenshot

Note:     All headings are followed by the Body style tag.

Use the following Style tags in your document. These are the approved Styles tags that have been incorporated into the AEM template for publication. Using style tags outside of the approved tags will result in rendition problems and possibly rendition failures.

For heading level 1 use ToC_Subhead1

For heading level 2 use ToC_Subhead2

For heading level 3 use ToC_Subhead3

For heading level 4 use the Body style tag and apply bold. Currently, Toc_Subhead4 hasn’t been integrated into the AEM template. Stay tuned.

Body Text Indent, Code

Bullet_Indent

Bullet2_Indent

CellBullet2

Confidentiality

FigureCaption

Numlist_Indent

Procedure Heading

Step_Indent

TableCaption

Title Headline

Title subhead

TOC 1 and ToC_Contents is used by AEM (publishing tool) and not to be applied in your document but is included in Styles

ToC_Subhead1

ToC_Subhead2

ToC-Subhead3

The following are examples of what some of the Style tags look like:

This is the Body tag.

●      Bullet

◦      Bullet2

Confidentiality is used for the text in the header.

Copyright is applied to the copyright at the end of a document.

Hyperlink is used when you link to an external document or web page, or a document cross-reference.

Note:     This is a Note.

Procedure 1.      This is Procedure Heading

Step 1.     This is Step1.

This is Step_Indent

Command (this is Body Text Indent,Code)

A yellow smiley face with blue eyes and a thumbs upDescription automatically generated

Note:     Apply the Body tag to images.

this is a Numlist_indent

Tech tip:    Use Tech tips sparingly, and don’t stack them. They are good for pointing out traps, things easily missed, or perhaps avoidance of DDTS and field problems where you don’t want to call competition attention to an actual bug, but you want to steer readers away from triggering a problem.

Table 1.         This is TableCaption

Header A (this is Cellhead1)

Header B

Header C

Header D

Header E

A1 (this is Chart_body)

This is CellBullet

    This is CellBullet2

B1

C1

D1

E1

A2

B2

C2

D2

E2

A3

B3

C3

D3

E3

A4

B4

C4

D4

E4

Copy and paste this table and add or delete cells as needed. Styles for header and body are “Cellhead1” and “Chart_body.” Why is the top-left cell dark blue? It doesn’t matter – ignore it and it will render correctly. It’s not WYSIWYG, unless you save as PDF, in which case people will ask that question, and you’ll have no good answer.

The following content is the template with sample content. This was used to publish the Cisco Penn 1 Hybrid Work from Office Case Study .

This concludes the guidelines and instructions section. Delete this section when the document is ready for publishing.

*********************************************************************************************************

Introduction

A sign on a buildingDescription automatically generated

Cisco’s PENN 1 office located in Midtown Manhattan, New York City is one of Cisco’s newly reimagined office spaces designed to provide the ultimate hybrid work experience for employees and visitors while also leveraging smart building technology to help reach Cisco’s sustainability goals and provide real estate and facilities teams the operational insights needed to understand how the space is being used. The PENN 1 office was the first of its kind at Cisco and as such, was a learning experience. This document provides a case study of how networking and collaboration technologies were deployed alongside smart building technology and sensors providing a sustainable hybrid work experience. This document attempts to highlight some of the lessons learned but is not intended to be a generic design guide and not all decisions made for this deployment will apply to all customer use-cases. Technology has also evolved since the office was open and when applicable, we will note changes that have been incorporated into newer offices.

For a quick video tour of the office, please visit this link . This document views the deployment of hybrid work technologies at PENN 1 from a more technical lens, highlighting some of the devices and design decisions that were made. For more detail into the spaces and some of the architectural design decisions made, please take a look through the look book here .

As is the case with any production deployment, implementing such a solution requires a phased execution approach. Phases of implementation and the realization of targeted outcomes and requirements at each phase result in a journey map to deliver on the expected end state outcomes and business impact. In addition to streamlining operations, after the execution of each phase, the team leveraged learnings as well as knowledge of capability roadmaps to identify and implement appropriate optimizations.

The PENN 1 office was initially created as a proof of concept and as such, many of the technologies used had no pre-existing IT standards for their deployment. Additionally, there was a desire to reimagine the purpose of the office which required rethinking how space was allocated. As a result, a virtual team was created of subject matter experts from Cisco’s IT, sales, and workplace resources organizations, who were responsible for designing and deploying the office and then taking the learnings to create new IT standards that could be leveraged for future offices. This effort took place through 2021 and early 2022, so design decisions made here should be viewed through the lens of the state of the art at that time. Additionally, supply chain issues at the time influenced some of the product choice decisions. The document will point out alternate product selections that have been used in newer offices that have been implemented since the opening of PENN 1.

The goal of the office was to deliver on the following outcomes:

●      Transform all office workspaces, from open area seating, quiet rooms, and huddle rooms all the way to large collaboration spaces, meetings rooms, and training rooms. The goal was to create an environment that was more conducive to collaborative experiences (“we” spaces).

●      Connect people in new ways when they are in the office while being inclusive of remote participants, recognizing that 98% of all meetings will have at least one remote participant.

●      Help Cisco reach its sustainability goals by leveraging low-voltage technologies and automation to power as much of the infrastructure as possible.

●      Enhance health and well-being as well as provide a safe workspace that employees can trust.

Requirements associated with solution deployment also mapped directly back to Cisco's external solution messaging. Therefore, it shouldn't be a surprise that solution requirements at a high level were inclusive of:

●      Frictionless Employee and Guest Experience

◦      Secure, high-performance, enterprise-grade connectivity (Wireless and Wired)

◦      Pervasive Video Collaboration for all workspaces (Desk, Conference, Huddle)

◦      Signage (Occupancy, Safety, Environment)

◦      Interactive Signage (Find Points of Interest, Workspaces, Conference Rooms)

◦      Ad-Hoc Room Booking / Hot-Desking

●      Smart Workspaces

◦      Reporting & Dashboards for Workspace Occupancy, Environment (Temperature / Humidity), and Safety (Air Quality)

◦      API integrations with building management systems

◦      Data Export to cloud storage for consumption of historical raw data

●      Facilities Management / Reporting

◦      Workspace Occupancy and Utilization Reporting / Dashboards

◦      Workspace Environment & Safety Reporting / Dashboards

◦      Occupancy and Environmental Data Pipeline for Building Management Systems / custom integrations.

The team leveraged an outcome focused design strategy while considering the following:

A checklist with green ticksDescription automatically generated

With a specific focus on Hybrid Work from Office, the customer journey of building the PENN 1 office included the following phases:

●      Modernizing the infrastructure

●      Designing for digital building/smart building capabilities

●      Automating the deployment of the required wireless and wired capabilities to accommodate the rollout of location analytics

●      Implementing integrated security leveraging Identity Services Engine (ISE) to ensure asset visibility and access control

●      Deployment of Webex collaboration devices and Cisco Spaces

●      Deployment of IoT technologies (Meraki cameras, Molex, Igor, and Mecho PoE lighting, shades, sensors, and controls)

In addition to IT operations related considerations, the design and implementation teams had to ensure that all technology decisions were aligned to overall architectural goals. This is different than having various technologies randomly added over time without end state outcomes and requirements guiding decisions. When optimizing for collaborative “we” spaces rather than the traditional “me” space, the team understood that collaboration is not a single activity. Sharing information, making decisions, and brainstorming each has a specific set of technology requirements (single or dual display, display size, video-centric vs. interactive board). Once defined, the team was able to focus on the details that supported the activity. They were able to work with facilities management to refine things like table shape and orientation, surface size, the posture of seating, as well as the overall layout of the space including ambiance, density, and acoustics. Additional details associated with the process to design for a unified collaborative experience are not included as part of this documented case study.

The As Is state was no different than any typical office with cubicles, private offices, and large conference rooms. The goal was to transform the large conference room spaces to spaces that would provide an immersive video conferencing experience built for the modern hybrid workforce. Instead of having a large footprint of private offices, there was an expectation to transform these areas into small huddle spaces to support ad-hoc collaborative engagements. Spaces occupied by cubicles would need to be transformed into areas available for hot-desking as well as provide enough of a footprint for a community lounge area.

In the end, the office was split into two distinct areas. One half of the office is considered open to customers and guests while the other half is employee-only space. Larger conference and collaboration spaces are all located in the customer side while smaller huddle spaces, open area seating, and quiet rooms are in the employee-only side.

A design decision was made to make only larger spaces bookable through the calendaring system while smaller spaces are available on a first-come, first-served basis to optimize space utilization. Cisco Spaces, covered later in this document, facilitates the ability for employees to find the spaces they need when they need them.

A diagram of a buildingDescription automatically generated

A variety of different spaces were created, each with a distinct purpose. For example, some spaces are designed to accommodate large meetings while others are designed for whiteboarding and real-time brainstorming activities.

A collage of a meeting roomDescription automatically generated

For a more in-depth look into how each of the individual spaces was built including CAD drawings of the spaces, furniture used, acoustic treatments, power, data wiring, and more, design guides are available for each type of room. Please visit this site and fill out the form to gain access to the detailed design documents.

The office had to be designed to capture and leverage occupancy data and integrations with Webex Control Hub and 3rd party systems to take advantage of that data in a way that delivered on the agreed upon outcomes and requirements previously specified.

A screenshot of a computerDescription automatically generated

The PENN 1 Environment

This section highlights details related to the topology, hardware, software, and design selections that were made as part of the PENN 1 Hybrid Work from Office deployment.

Cisco maintains a variety of network standards and the target network design for the deployment at PENN 1 is based on the Cisco “Gold” Topology standard.

A diagram of a computer networkDescription automatically generated

You may notice that the environment at PENN 1 isolates the IT and OT environments, keeping OT devices such as PoE lighting, shades, and IoT devices in a network outside the standard IT environment. Future deployments will converge the IT and OT stacks into a single infrastructure and eliminate the dedicated DC and OT gateways for easier manageability. The decision to keep IT and OT networks separate was purely one of roles and responsibilities of managing the networks as opposed to technical limitations.

The office also includes a small Hyperflex-based datacenter environment to host virtual machines needed to control/manage the low voltage and IoT systems needed to create a smart building. These applications are detailed later in this document.

Wired Design, Platforms, and Connectivity

Infrastructure Cabling

The PENN 1 office is 54,000 sq ft requiring 2 wiring closets [1 Building Distribution (BD) and 1 Floor Distribution (FD)] to meet the Ethernet distance requirements. The diagram below provides details on the fiber and copper infrastructure cabling between the Minimum Point of Entry (MPoE), 9.1 BD racks, 9.2 FD racks, and Customer Experience Center (CXC) rack.

A diagram of a computer networkDescription automatically generated

The PENN 1 cabling design separated the endpoint cabling drops so the Production IT Access Network drops for the production wired and wireless desktop networks were terminated in the 9.1 BD and 9.2 FD IT racks, and the Operational Technology PoE Network drops for the PoE lighting, shading and HVAC control were terminated in the 9.1 BD and 9.2 FD OT PoE racks.

A close-up of a computerDescription automatically generated

The brand new 23AWG yellow patch cables used for the OT PoE Network are made from recycled cables from the previous Cisco office deployment, helping to further Cisco’s sustainability goals through recycling.

UPS Strategy

There are many different strategies for providing backup power during power outages and one of the challenges with the addition of new POE powered IOT endpoints such POE lighting and shading is balancing the cost, size, and weight of the battery backup solution versus the desired runtime for various IT and OT POE powered endpoints.

A screenshot of a computer serverDescription automatically generated

PENN1 was originally deployed with the IT network leveraging the All on UPS strategy and the OT network leveraging the None on UPS strategy, but now with more insights into our energy usage we are moving towards a UPS strategy driven by our PoE endpoint Service Owners and their UPS runtime requirements. As shown in the table above, certain Service Owners might require a 60-minute runtime and other Service Owners might not care if their POE endpoints go down so with a converged network infrastructure the only differentiator is the UPS runtime requirement.

During a building power outage, Cisco workplace policy states that users should vacate the office and PENN 1 has a dual-feed POE and building power emergency lighting solution in case either service is disrupted.

In order to gain insights into energy usage and capture historical energy usage data Raritan PX3-5551V Smart PDUs were deployed in the OT PoE Network 9.1 BD and 9.2 FD racks.

A collage of several computer equipmentDescription automatically generated

The browser interface of the Raritan iX7 PDU controller module allows easy access to the configurations and to the power and monitoring data.

We are leveraging Sunbird Power IQ to capture the historical energy usage and manage the Smart PDUs.

A screenshot of a computerDescription automatically generated

Power IQ also allows us to generate various energy usage reports for offices, networks, racks, and IT devices such as Catalyst 9300 stacks, Catalyst 9400 chassis or Cisco UCS servers.

A screenshot of a white paperDescription automatically generated

You can't manage what you can't measure, and the Smart PDUs provide us with the insights into the energy coming into our racks to power our PoE network infrastructure equipment.

The OT network Raritan Smart PDU and the IT network Server Technology Smart PDU energy data is being integrated into the new Cisco Spaces Energy app.

OOB Console Network

Cisco’s standard is for all network devices to have out-of-band async console network connections for management and troubleshooting so all the PENN 1 Catalyst 9300 async management ports patched to the Catalyst 8300 console server.

A computer server with a cableDescription automatically generated with medium confidence

Catalyst 9300

The Catalyst 9300 series C9300-24H and C9300-48H are purpose built for smart building network deployments providing 24 or 48 ports of gigabit ethernet with 90W UPoE+. With 1900W Power supplies installed, the C9300-24H provides 24 ports of 90W UPoE+ and the C9300-48H provides 32 ports of 90W UPoE+. These Catalyst 9300 series switches provide power redundancy features (redundant power supplies, StackPower, Port Priorities), PoE redundancy features (Perpetual PoE, Fast PoE, 2-Event Classification) and PoE Assurance features (Telemetry, Analytics Widgets, Troubleshooting). The switches are IEEE 802.3bt compliant and backwards compatible with all PoE Standards and additional switching details for these models can be found by accessing this data sheet .

A close-up of a switchDescription automatically generated

For the PENN 1 deployment, the C9300-24H was chosen for supply chain availability and capability to provide 90W UPoE+ on all 24 ports. Now that the new C9300X models are available, future IT deployments will utilize the C9300X-48HX with 1900W power supplies which can provide 36 ports of 90W UPoE+.

HyperFlex M5 Edge with Intersight

The Cisco HyperFlex M5 Edge with Intersight was chosen for its high availability to provide the local onsite compute resources required by the PoE lighting and shading deployments. Lighting vendor motion/occupancy detection and action requires low-latency response from the lighting management applications to provide a good end-user experience. (i.e., user walks into a conference room and the lights turn on immediately instead of having a several second delay).

A blue rectangular box with several wiresDescription automatically generated with medium confidence

The required HyperFlex Edge VMs were configured according to the IoT partner published specifications.

A close-up of a computer programDescription automatically generated

The following is the PENN 1 as-built network overview diagram of the IT and OT networks. As mentioned earlier, the OT infrastructure at PENN 1 was built as a POC environment, so Cisco considered that part of the network to be a “lab” environment that must adhere to different requirements than a standard infrastructure. Although the “lab” nomenclature is used, this is indeed a production deployment.

A diagram of a networkDescription automatically generated

As previously mentioned in the Infrastructure Cabling section, the PENN 1 cabling design separated the IT and OT networks with the IT wired and wireless cabling drops terminating in the IT racks and the OT 90W PoE cabling drops terminating in the OT racks. Thirty C9300-24H were installed in the OT racks to support the Molex lighting/sensors, Igor lighting/sensors, Mecho shading/sensors, Teknion Connected Desks/sensors, Delta Controls VAV, Raritan PDUs, and Anker USB-C data/power adapters (all described in further detail later in this document).

The OT PoE access layer switches were deployed leveraging the Campus LAN Layer 2 Access with Simplified Distribution Cisco Validated Design (located here ).

The decision to use the Campus LAN Layer 2 Access with Simplified Distribution was driven by the desire to reduce complexity by running fewer protocols and increase resiliency. In the simplified distribution layer, the distribution-layer node consists of a single logical entity that can be implemented using a pair of physically separate switches via StackWise Virtual operating as one device or using a physical stack of switches using StackWise operating as one device. Resiliency is provided by physically redundant components like power supplies, supervisors, and modules, as well as stateful switchover to redundant logical control planes. Also, little or no tuning is required to provide near-second or sub-second convergence around failures or disruptions.

The OT PoE access layer switch ports were configured using the Deploying 90W Cisco UPoE+ with Cisco Catalyst 9000 Switches Deployment Guide and the guide can be found here .

For PENN 1, the decision was to allocate a dedicated a VLAN for each IoT partner. The IP subnet sizing was driven by the number of the IoT partner endpoints deployed in each VLAN. Some of the subnet sizing was also driven by limitations of IoT vendors’ devices (e.g., some vendors do not support subnets larger than a /23) and 4 of the VLANs were configured with Port-based DHCP.

A table with numbers and symbolsDescription automatically generated

To support the IoT partner lighting and shading IP network commissioning requirements, there are several DHCP IP address assignment options for the various 90W UPoE+ endpoints.

The first option is DHCP using DHCP server reservations which statically binds the endpoint MAC address to IP address so that the IP addressing remains consistent for lights and wall controllers placed together in rooms. The DHCP reservations are simple to implement but hard to scale and maintain because when a UPoE+ endpoint fails and must be replaced, the DHCP server reservation must also be manually updated for the new MAC address.

Port-based DHCP is the second option that assigns/binds a specific IP address to a specific switch port so that no matter what device/MAC address is connected to the switch port, it will always receive the same IP address. For example, if switch port gi1/0/1 is configured with port-based DHCP IP address 10.1.1.1, any device connected to this port will be assigned 10.1.1.1. Port-based DHCP can be configured on a C9300 switch stack using the IOS-XE DHCP Server and the main advantage is that no external DHCP Server is required, which is great for isolated deployments. The major disadvantage is if you have multiple switch stacks in your network, then each stack requires its’ own IOX-XE DHCP Server to be configured which limits the scalability of this DHCP option. Additional information on Port-based DHCP running on C9300 IOS-XE is located here .

The third option is DHCP Option 82 which is also known as the DHCP Relay Agent Information. DHCP Option 82 enables the DHCP server to allocate dynamic IP addresses based on the relay information inserted and sent by a relay agent. The C9300 switch stacks can be configured to insert relay information (Circuit ID and Remote ID) by enabling DHCP Snooping and the DHCP server can be configured to assign specific IP addresses based on the received relay information so that no matter what device/MAC address is connected to a specific switch port, it will always receive the same IP address.

At the time of the PENN 1 deployment, Cisco’s global DHCP infrastructure did not support DHCP Option 82, so Port-based DHCP was configured on the 5 C9300 switch stacks in PENN 1. Since that time, the DHCP infrastructure has been upgraded so that our more recent Smart Building deployments are leveraging DHCP Option 82.

The HyperFlex Edge VM IP addressing was assigned for each of the IoT partner VLANs.

A table with numbers and linesDescription automatically generated

You should now have insight into the PENN 1 OT PoE network design, platforms, connectivity and VLAN and IP assignments. The next section provides a brief overview of the IoT Partner PoE Technology Solutions showcased at PENN 1.

Molex Lighting

The Molex PoE lighting solution installed in PENN 1 covers 60 percent of the 54,000 sq ft.

A close-up of a light switchDescription automatically generated

The Molex PoE lighting solution consists of both hardware and software. The following is the device count for the hardware installed in PENN 1:

●      107 - PoE Constant Voltage Gateways

●      336 - PoE Gateway 2.0

●      6 - PoE Wireless Gateways

●      746 - LED Drivers

●      87 - Wall Switches

●      121 - Advanced Lighting Sensors

●      13 - Advanced Environmental Sensors

The Molex PoE lighting solution software includes the following applications:

●      CoreSync Manager

●      API/BACnet Gateway

●      Design Tool (included with CoreSync Manager)

●      Facility Manager

●      MoDiag (included with CoreSync Manager)

Here is an overview diagram for how the Molex POE Gateway, LED Driver, Wireless Gateway, and Advanced Sensors are connected and deployed at PENN 1 with the goal to maximize the usage of each 90W UPoE+ port on the PoE Switch by daisy-chaining multiple fixtures:

A diagram of a light systemDescription automatically generated

The following is the Design Tool interface where all the physical lighting fixtures are added to the floorplan.

A computer screen shot of a blueprintDescription automatically generated

Once all the lighting fixtures have been added, user zones are created to group the fixtures into rooms or spaces and assign a lighting schedule or actions. A user zone can be programmed to turn on/off at specified times or triggered by activity detected by a motion sensor.

A computer screen shot of a blueprintDescription automatically generated

The Facility Manager is utilized by local support to monitor and manage the Molex PoE lighting solution.

A screenshot of a computerDescription automatically generated

Initial commissioning of the Molex POE lighting solution is performed using MoDiag and it also used for troubleshooting and upgrading Molex device firmware.

A screenshot of a computerDescription automatically generated

Igor Lighting

The Igor PoE lighting solution installed in PENN 1 covers the other 40 percent of the 54,000 sq ft space. Typically, an office space would only have one PoE lighting vendor, but with PENN 1 being a Smart Building showcase, a second PoE lighting vendor was chosen for the deployment to compare and contrast product capabilities and test interoperability with the Cisco network.

Note that as of this writing, Igor has gone out of business and their products are now being supported by Digital Building Solutions ; however we are still leaving the information regarding our deployment of the Igor solution here just to document the as-is state of PENN 1 and lessons learned. You will see how the solution is very similar to the Molex deployment.

Here is an overview of the Igor architecture and components with the sensors, luminaires, and wall controls connected to the Igor Network or Device Nodes. The Igor Network Nodes connect to the C9300 90W UPoE+ switches, and the Igor Gateway Software runs on the HyperFlex Edge VM, which communicates with the Igor Cloud Portal.

A diagram of a computer componentDescription automatically generated with medium confidence

The Igor PoE lighting solution consists of both hardware and software. The following is the device count for the hardware installed in Penn1:

●      27 - Rev 5 60W Standard Network Nodes

●      150 - Rev 6 90W Linear Network Nodes

●      46 - Rev 7 90W CV Network Nodes

●      61 - Device Nodes

●      39 - Light, motion, temperature sensors

●      16 - Wall Controls

The Igor PoE lighting solution software includes the following applications:

●      Gateway Software

●      Node Configuration Manager

●      Firmware Updater

Here is an overview diagram for how the Igor Network and Device Nodes are deployed at PENN 1:

A diagram of a systemDescription automatically generated

The C9300 switch port provides 90W UPoE+ to the Igor Network Node which is required for power and data negotiation with the C9300 switch. Depending on the wattage of the lighting fixtures, there could be one or more Device Nodes connected to the Network Node with the goal to fully utilize the 90W provided by each switch port.

The Igor Gateway Software Dashboard provides a web browser interface for configuration and monitoring of the Igor PoE lighting solution.

A screenshot of a computerDescription automatically generated

The Igor Nexos Cloud Portal provides a web browser interface for access to historical data, utilization, and insights; however, our design goal was to aggregate this data into Cisco Spaces along with other data points to have Cisco Spaces provide a holistic view of the building occupancy.

A screenshot of a graphDescription automatically generated

Mecho Shading

The Mecho PoE shading solution implemented in PENN 1 consists of PoE gateways, motors to raise/lower the shades, and the SolarTrac management system.

A grey rectangular object with a black borderDescription automatically generated with medium confidence

There are 39 Mecho motors powered by 39 NuLED PoE gateways and 4 Somfy motors powered by 4 Molex gateways. Typically, all the motors and gateways would be the same, but with PENN 1 being a Smart Building showcase, a second motor and PoE gateway was deployed in the office.

The Mecho SolarTrac management system provides a web browser interface for configuration and monitoring of the Mecho PoE shading solution. The physical PoE gateways with motors are added to the floorplan and indicated by the green circles. The blue triangles indicate the physical light sensors, and the green squares indicate the zones configured for the shades. The SolarTrac management system provides API for the programming of integrated outcomes and voice control of the shades.

A blueprint with green and blue arrowsDescription automatically generated

Delta Controls VAV

PENN 1 leverages building-provided HVAC and supplemental HVAC was added for several of the large conference rooms. An ABM System BMS was installed along with 7 PoE variable air volume controllers, 2 PoE room controllers, and 7 wireless wall controllers. The ABM Systems APIs allow for us to program integrated outcomes, such as adding additional cooling when conference room occupancy count provided by the Webex collaboration units exceeds predefined thresholds.

Several electronic componentsDescription automatically generated with medium confidence

Teknion Connected Desks

PENN 1 has several Teknion Connected Desks leveraging one 90W UPoE+ connection to the C9300 to provide 60W USB-C charging, 5W USB-A charging, and the motorized desk can be raised/lowered. The Teknion desk can also include occupancy, temperature, humidity, and air quality sensors that are integrated with Cisco Spaces and the Smart Workspaces application. The Teknion integrated occupancy sensor provides down to the desk occupancy data for open workspace hot-desking.

A desk with computers on itDescription automatically generated

Anker USB-C Power/Data Adapters

PENN 1 has several Anker USB-C adapters providing 60W of charging capacity and 10/100/1000 Mbps of wired Ethernet connectivity. This allows for desks to be completely powered by PoE, giving the workplace resources teams flexibility and agility to move desks around without having to re-run high voltage power lines.

A black box with a green wire next to itDescription automatically generated

Wireless Design, Platforms, and Connectivity

The wireless network provides ubiquitous data and voice connectivity for employees, guests, and connectivity for IoT devices and is the primary mode of network connectivity at PENN 1. With the emergence of high-density networks and the IoT, organizations are more dependent on wireless networks than ever before. Increasing numbers of devices connect to the network every year, ranging from high-performance client devices to low-bandwidth IoT devices.

Cisco wireless solutions are resilient, have the integrated security organizations need, and employ adaptive and insightful intelligence providing useful insight into the network. With intent-based networking built on Cisco Digital Network Architecture (Cisco DNA), Cisco’s wireless solutions go beyond the latest Wi-Fi 6 (802.11ax) standard and are ready for the growing user expectations, IoT devices, and next gen cloud-driven applications. With the ability to handle the increased mobile traffic (as well as support IoT at scale), Cisco’s first Wi-Fi 6 APs with superior RF innovations expand wireless access with intelligence and provide a secure, reliable high quality wireless experience for all networks.

The wireless network at PENN 1 was designed to scale to the bandwidth and density requirements necessary to support the increased data utilization of these next generation applications. The design and platform selection had to account for today's usage, as well as for additional future demands associated with the introduction of emerging technologies like virtual and augmented reality.

For the PENN 1 wireless network deployment, Cisco leveraged the Catalyst 9800 Series WLAN controllers and Catalyst 9130 Wi-Fi 6 APs. The Catalyst 9800 Series wireless controllers combine RF excellence with Cisco IOS-XE benefits. The Catalyst 9100 Series APs can handle the challenges of the next-generation network.

Two Cisco Catalyst 9800-L wireless LAN controllers are in use at PENN 1 to ensure high availability and sufficient throughput for client needs. Forty-four Cisco Catalyst 9130 Wi-Fi 6 APs are deployed in a high-density design to provide excellent coverage and seamless roaming for the 54,000 sq ft office space. The high-density AP placement also maximizes location capabilities in concert with Cisco Spaces.

At the time of the PENN 1 deployment, Wi-Fi 6E access points were not yet available, however newer offices are deploying the CW9166 access points with Wi-Fi 6E and environmental sensors.

A close up of a computerDescription automatically generated

AP Placement

A high-density wireless deployment was chosen to provide excellent coverage and seamless roaming. This is especially important in a hybrid work environment where users will often be using video streaming to connect with people outside the office. The demands of high throughput, low-latency video connections necessitate a high-density wireless deployment. AP placement was also designed to maximize location-detection capabilities to allow Cisco Spaces to monitor occupancy in different areas of the floor.

A map of a buildingDescription automatically generated

Cisco Spaces was integrated with Webex Control Hub to gather occupancy data from Webex devices located in the various collaboration spaces throughout the floor. This integration is a simple OAuth2 authentication to tie the Cisco Spaces account to the Webex Control Hub organization. Details on the integration are provided later in the document.

For Cisco Spaces to leverage the sensor data available on the OT PoE wired network from the Molex, Igor, Mecho and Teknion sensors at PENN 1, the IoT Wired Gateway is configured on the C9300 distribution-layer node which then communicates with the Cisco Spaces Connector to send the sensor data to Cisco Spaces for use by the Smart Workspaces application.

A diagram of a cloud computing systemDescription automatically generated

Here is example of the VLAN and IP address configuration required for configuring the IoT Wired Gateway, which runs on the C9300 in a Docker container.

A diagram of a networkDescription automatically generated

Logging into the Cisco Spaces Connector with a web browser provides access to view the status of the Connector.

A screenshot of a computerDescription automatically generated

Logging into Cisco Spaces with a web browser provides access to view the status of the IoT Wired Gateway.

A screenshot of a phoneDescription automatically generated

From Cisco Spaces you can also view the current sensor data from the POE powered sensors as shown here for the Molex Advanced Environment Sensor.

A screenshot of a computerDescription automatically generated

Here is the sensor data from a Teknion Connect Desk showing desk occupancy.

A screenshot of a computerDescription automatically generated

Here is an overview of the Cisco Spaces sensor and energy data flows from the various endpoints to the Connector up to Spaces.

A diagram of a computer networkDescription automatically generated

The Cisco Spaces Smart Workspace application provides the PENN 1 end users with a 3D floorplan enabling insight into occupancy, air quality, CO2 levels, temperature and humidity, and the ability to view and hold open workspaces and rooms.

A screenshot of a computer gameDescription automatically generated

The Smart Workspace application runs on Webex collaboration devices throughout PENN 1.

When employees and guests approach the sign, they are greeted with a 3D floor plan of the space which provides a quick view into the space utilization, with available rooms shown in green, occupied rooms in red, and booked, but empty, rooms in yellow. A room finder feature allows users to quickly find the space they need based on criteria such as number of seats and availability of video conferencing equipment. Users can simply tap the “Hold Room” button on the interface and head over to the room. When the room detects a person is present, the map is updated in real-time.

A screen on a wallDescription automatically generated

The Cisco Spaces Energy Utilization application provides data and insights into the energy usage as shown here for the C9300 switch stacks.

A screenshot of a graphDescription automatically generated

Cisco Spaces has integration with Raritan, Panduit, and Server Technology Smart PDUs and here is the output for the 8 Raritan PDUs in PENN 1.

A screenshot of a computerDescription automatically generated

Meraki Security

The MV12 cloud-managed smart camera is part of the MV smart camera family which brings physical security and advanced analytics together in a compact form factor and currently there are 27 MV12 cameras in PENN 1 to provide physical safety and security and business intelligence and insights.

A close-up of a dome cameraDescription automatically generated

Webex Collaboration

The PENN 1 office has 92 Cisco Collaboration devices throughout the office. The goal was to make every space video-enabled to facilitate an inclusive hybrid work experience. The look book goes into detail on the devices used for each different type of space at PENN 1. Note that newer offices will be using the Room Kit series of devices as opposed to the integrated Room devices which have built-in screens. The Room Bar, Board Pro, and Room Kit EQ are the preferred devices in newer office spaces and have capabilities beyond the devices deployed at PENN 1.

Recognizing that employees need to collaborate not only with other employees, but also customers and outside vendors, these devices allow employees to join meetings on any meeting platform – Webex, Zoom, Microsoft Teams, or Google Meet – while incorporating advanced features such as noise removal and frames.

Wall-mounted Room Navigators mounted outside the doors of each meeting space are critical to the user experience.

A screen on a wallDescription automatically generated

With a simple glance down the hallway, employees can easily visualize room availability (which is updated in real-time based on detection of people in the rooms) making it very easy to find an available room. Running Ethernet cables to the door jambs to enable connecting and powering the Navigators was important and something that should be planned for in new construction, although retrofitting after the fact is possible as we have done in other offices.

Modern conference rooms typically have a touch-panel or other control system in the room to control things like lighting in the room, access to AV equipment, and more. Vendors such as Crestron and AMX are often used for these purposes. At PENN 1, we wanted to simplify the experience by providing a single interface to the room. This was accomplished using Webex Room Hub.

Webex Room Hub is an open-source project to control smart building features (such as lights and shades) in office buildings from the Webex Room devices. It consists of a lightweight middleware server, macros, and UI extensions that are installed on the Webex devices. Out of the box, it supports a couple of light and shade systems standard at Cisco, but it is easy to replace or add drivers for any HTTP based smart integration. The application enables both touch controls in the room using the existing Room Navigator panel as well as voice-enabled controls using the Webex Assistant Skills feature, which allows for extending the Webex Assistant. By leveraging the existing Room Navigator, PENN 1 does not require more traditional room control systems (e.g., Crestron) because the functionality can be fully implemented using the Room Hub application.

The project requires that the customer has:

●      Webex devices, such as Webex Room Kit, Webex Board, Webex Desk, etc.

●      A smart building setup

●      Access to install macros to the devices, either with Control Hub or local device access

●      A way to host a docker image that is reachable by video devices and the smart system integrations

These smart integrations are supported out of the box:

●      Igor lighting system

●      Molex lighting system

●      Philips Hue lighting system

●      SolarTrac 4 shades

●      Webex-based “Report Issue” feedback

PENN 1 has several conference rooms with voice control, allowing users to change lighting and shades without having to touch any controls in the room.

Global DNA Center Deployment

DNA Center Plug and Play was not leveraged for the OT PoE C9300 switch deployment due to lack of WAN network connectivity from PENN 1 to the Cisco internal network and global DNA Center servers at the time of the switch deployment. The required configuration and commissioning of the PoE lighting usually takes place very early in the construction process, so this required the installation and configuration of the 30 C9300s for the OT PoE network to take place prior to the office having WAN connectivity.

The 30 C9300s for the OT PoE network were later added to our global DNA Center Deployment for device management and other services provided by DNA Center.

For PENN 1, we are leveraging PoE Analytics to monitor the C9300 switch stack power budgets and gain insights into our PoE endpoints.

A screenshot of a computerDescription automatically generated

Global ISE Deployment

The deployment of ISE was part of broader ongoing initiative to rollout integrated security. Use cases are inclusive of asset visibility, access control, and authenticated guest access.

The production ISE deployment consists of 29 ISE Nodes and 20 Policy Server Nodes (PSNs) in 7 Server Node Groups all running as virtual instances and with one in each of the major data centers. The Server Node Groups represent a group of PSNs in the same location, behind Load-Balancers.

As can be seen from the diagram below, the primary Policy Administration Node (PAN) and Monitoring (MnT) servers are in Mountain View, California, and the Secondary PAN and MnT servers are in Allen, Texas. Initially the team had the Primary PAN & MnT ISE in Allen, but this caused issues with replications to Bangalore as a result of exceeding latency requirements. The team needed to keep latency below 200ms between PSN / PAN / MnT due to the amount of traffic to avoid issues.

A map of the world with different colored circlesDescription automatically generated

As part of the high availability design, the team leveraged Virtual IPs for the different Server Node Groups and the Services within those Node Groups, in addition to Radius Server Node Groups.

They considered 6 Radius Server groups on each of our NADS – Primary, Secondary, Tertiary, Quaternary, Quinary, Senary.

The Load Balancer is used to send a User-Probe/Synthetic Authentication to each of the PSN’s every 10 seconds, and if it receives a failed Auth, then it removes the PSN from that Server Node Group. The load balancer continues sending requests and adds back the PSN once authentication is successful.

The ISE deployment supports internal “Automatic” Failover, which is an optimization that was added over time due to the release and validation of new capabilities.

Each Service has a VIP – Wireless/Wired/VPN/CVO/Extranet as this provides flexibility to upgrade specific services without impacting others. This means the version of ISE used for VPN could be upgraded without impacting Wireless.

A diagram of a computerDescription automatically generated

The PENN 1 Deployment Journey

This section highlights the deployment of capabilities, targeted technical results, lessons learned, and recommendations captured as part of the team's journey to deploy the PENN 1 office. Deploying the cross-architectural solution inclusive of Cisco Spaces, Webex Suite, Wireless LAN Controllers, Cisco DNA Center, ISE, and ThousandEyes has many moving parts and engineering stakeholders will be able to benefit from Cisco’s experience as a frontrunner deploying the solution in production.

Preparing, Planning, Designing

In addition to the business outcomes and requirements focused on transforming the end user and facilities management experiences, workplace resources captured technical result requirements associated with various aspects of the design and deployment. This additional area of focus factored into the overall design strategy and represented an opportunity to measure IT operations success as part of an implementation governance plan. A sampling of some of the technical results that were highlighted as being important included:

●      Streamlined deployment of Hybrid Work from Office infrastructure and components

●      Simplified integration of key platforms and devices

●      Seamless device setup

●      Flexible, secure onboarding of new infrastructure and devices to deliver on the Hybrid Work from Office experience for end users and delivery of operational outcomes for Facilities Management

●      Maximizing the guest experience

●      Insight into employee and guest behavior

With the business and technical requirements in focus, the team went through the preparation, planning, and design phases.

The team had to establish the organizational requirements, develop a network strategy consistent with a wider scale rollout of capabilities, and draft a high-level conceptual architecture incorporating the technologies that best support the architecture. This was critical in terms of understanding scope, schedule, talent, and financial requirements to execute the Hybrid Work from Office network design and solution rollout strategy.

The team identified initial network requirements based on goals, the facility, user needs, and Facilities Management needs. The plan phase involved characterizing the site, assessing the existing network deployment, and performing a gap analysis to determine whether the existing system infrastructure, site configuration, and the operational environment could support the proposed design. A project plan was leveraged to help manage the tasks, responsibilities, critical milestones, and resources required to transform the office to a Hybrid Work from Office destination. The project plan aligned with the scope, cost, and resource parameters established as part of the original business requirements. Planning required executing on specific activities such as:

●      Leveraging Cisco DNA Center (rolled out during an earlier part of the journey) to create a 2D floor map with appropriate scale and highlighting AP placement.

●      Running a predictive site survey using Ekahau to ensure site-specific data is available for wireless design guidance (AP density, channel width, radio configuration, and benchmarks)

●      Reviewing existing segmentation and security access controls associated with device onboarding, profiling, as well as policy impacting firewall/internet connectivity to identify and plan for changes. 

●      Reviewing existing QoS configurations and preparing for the deployment of appropriate QoS considerations to accommodate user/device/IoT onboarding nuances associated with transforming the space to accommodate the rollout of Hybrid Work technology.

●      Creating a CAD file of the site to be used within Cisco Spaces to enable the creation of 2D maps as well as 3D rich maps for the Smart Workspaces application.

The initial requirements that were derived in the planning phase were used to drive network design activities. The team drafted the required network design specification to meet the Hybrid Work from Office business and technical requirements. The specification accounted for availability, reliability, security, scalability, and performance criteria. The design specification acted as the basis for the implementation activities covered below.

Table 2.         Lessons Learned and Recommendations

Focus

Lessons Learned

Recommendation

Physical Cabling and 90W UPOE+

90W UPOE+ enables new use cases in the office Cabling requirements for the IEEE 802.3bt standard IT and OT cabling convergence will be a journey Initial investment in higher grade cabling might provide better ROI over the long term Opportunities available for leveraging recycled cabling Account for FD/IDF cooling requirements

Become familiar with the " "

Compute Resources

Depending on the desired integrated outcomes, local on-premises compute might be required for low latency use cases such as motion detection lighting Research compute specifications provided by the lighting and shading vendors to make sure to meet or exceed their recommended requirements Compute resource required early in the construction phase for configuration and commissioning of lighting solutions Consider deploying UPS for any on-premises compute Invest in high availability compute to prevent single points of failure Create a support and maintenance plan for on-premises compute hardware and software Consider user access and security requirements for on-premises compute

Work with IOT vendors on the compute requirements to determine the best solution for the desired use case outcomes

UPS Strategy

Develop UPS strategy considering the desired runtime for the various IT and OT PoE powered endpoints versus the cost, size, and weight of the battery backup solution

Consider working with IT and OT service owners to right-size UPS for the desired runtimes

Smart PDUs

In addition to being able to remote power on/off devices, smart PDUs provide the ability to gain insight into energy consumption allowing you to measure and manage it

Consider the potential benefits and insights gained by deploying smart PDUs

Catalyst 90W UPOE+

The availability of 90W UPOE+ is enabling new use cases in the office environment 24-port model vs. 48-port model decision based on port density requirements and the willingness to manage switch power budget for the 48-port model The C9300 platforms support advanced POE features such as Perpetual POE, Fast POE, 2-Event Classification and StackPower, which are recommended for POE lighting deployments C9300X-24HX and C9300X-48HX were not available at time to deploy in PENN 1, but all future IT deployments will leverage the C9300X-48HX to provide 10 GE mGig and 90W UPOE+ and to enable converged IT and OT networks.

Become familiar with the " "

IP Addressing

Lighting and other IoT vendors can have subnet size restrictions so need to take this into account (e.g., Molex only supports /23 and smaller) Layer 2 Access using a Simplified Distribution Layer supports both VLAN per access switch and VLANs spanning multiple access switches so need to consider lighting and IoT vendor requirements Lighting and other IoT vendors can have DHCP requirements so need to consider (e.g., Molex requires the use of Port-based DHCP which ties an IP address to the physical switchport)

Work with IoT vendors on the IP addressing, VLAN sizing and DHCP requirements to determine the best solution for deployment

Network Protocols

LLDP protocol is required for POE power negotiation

POE Power negotiation " "

Network Security

Very few lighting gateways and other IoT devices support 802.1x (dot1x) so use of MAB (MAC Authentication Bypass) required in TrustSec deployments Some lighting vendors require Internet access for enhanced cloud features and functionality

Work with IoT vendors to understand their protocols and connectivity requirements

Implementation: Deployment of Fundamentals

The network was built (and additional components were incorporated by the team according to the design specifications) with the goal of integrating devices without disrupting the existing network or creating points of vulnerability. The deployment of the fundamentals required setting up all centralized management platforms and services that weren't already implemented. The team needed to ensure that if existing platforms weren't at the right versions of software that they were upgraded to accommodate the deployment of required capabilities. In some cases, upgrades were required to support integrations associated with the Hybrid Work from Office solution.

The following is a sampling of the technical results associated with the deployment of the fundamentals and highlighted as being important:

●      Provide visibility into physical spaces to understand user and device behaviors based on location data

●      Visualize “right now” near-real-time metrics from location

●      Leverage custom reports based on location, SSID, time range, and other areas of focus to identify trends

●      Provide deeper insight into location metrics such as number of visitors, number of visits, dwell time/dwell time breakdown, and device location

●      Address safety and sustainability use cases (occupancy, environmental metrics, and energy monitoring)

●      Setup the infrastructure to allow end users to host or join a video meeting from any device (i.e., mobile, tablet, laptop, or video device) with one consistent experience

●      Enable call control capabilities that are easy to procure, onboard, and manage through a central management portal and manage migration strategies that can leverage on-premises investments

●      Simplify software and license management

The team performed ISE set up, provisioning, and DNA Center integration to accommodate asset visibility, access control, and authenticated guest access considerations. The implementation required active directory integration, AAA, and 802.1x setup. As a result of having ISE deployed, the team was able to gather contextual information associated with Who, What, When, Where & How. They were also able to take advantage of tagging to classify wired and wireless devices. Although the current deployment is focused primarily on admission control, there are plans to deliver on some of the more advanced security use cases associated with a Secure Access solution implementation in the future.

The team leveraged the shared instance of Cisco DNA Center for IT map (heat map) creation and to prepare for secure onboarding of switching infrastructure.

The Cisco DNA infrastructure (inclusive of wired and wireless) needed to be upgraded to the appropriate versions as indicated in the table below.

Device Type

Platform

Software Version

Switching

C9300-24H, C9500-40X, C9407/Sup1

IOS-XE 17.9.3

Routing

C8300-1N1S-4T2X, ISR4451-X, ISR4331

IOS-XE 17.9.3

WLC/APs

C9800-L, C9130AX

IOS-XE 17.9.3

Upgrading the infrastructure required referencing a compatibility matrix to ensure proper interoperability and the ability to accommodate the newer Access Points, sensors, as well as integration with Cisco Spaces to take advantage of the latest capabilities at the time. WLANs were confirmed to be deployed within relevant segments to accommodate both guest and corporate users and ensure they could continue to track and remove bad actors (e.g., rogue APs, rogue clients, and interferers).

Although there are many Cisco Spaces configuration guides available here, the team partnered very closely with the Cisco Spaces product team to provision the solution leveraging the process flow shown in the image below:

A diagram of a company's processDescription automatically generated

The team needed to provision the Cisco Spaces Connector on the network to import/sync the Cisco DNA Center map. The connector was installed on a local Hyperflex Edge along with 3rd party Light/Shade management software. Installation of the Cisco Spaces Connector was done to ensure that Cisco Spaces would work with Detect & Locate, IoT Explorer, and IoT Services capabilities seamlessly. The team determined that functionality provided through the integration was required to meet the overall design specifications.

The Webex Control Hub cloud-based management infrastructure and the creation of the org was already in place leveraging the corporate instance. As this was the case, the initial setup (inclusive of the following considerations) was performed and could be taken advantage of without the need for additional work:   

●      Domain claim

●      SSO

●      Hybrid Calendar (Initial integration and setup vs. mapping that will happen during device deployment evaluation)

●      Directory integration and user onboarding

Webex onboarding can be performed by using the resources linked off of the Get Started in Control Hub page . Authorization is required to access the WalkMe videos that map to the following deployment checklist:

A close-up of a phoneDescription automatically generated

All the foundational Webex Meeting Site and call setup requirements were in place and could be leveraged as part of the solution deployment. Although this case study will not address the specific details associated with this area of focus, the Hybrid Work from Office device onboarding and the integration with Cisco Spaces are covered as part of this documented case study.

Table 3.         Lessons Learned and Recommendations

Focus

Lessons Learned

Recommendations

ISE Skillset Requirements

ISE engineers must develop multiple skills:

ISE admin – health of the environment

    Install/replicate/patch

    Monitor health and take actions

Policy admin – configure security access policies in ISE

    700 access-policies

    Know scope policy for which domain

    Know traffic flow

    TrustSec

    Know scope policy for which domain

    Know traffic flow

    Deployment

    Troubleshooting

Dev/Ops skills

    Terraform and ansible (adapt BU scripts for migration)

    Python scripts to control TrustSec deployment

Troubleshooting

    On-call C2 app, a problem can extend globally, fast

Ensure the ISE Team has skills in the following areas:

App Middleware (compute) + NW background Integration: ISE-AD, ISE-Device Management Platform, ISE-Cloud Security: AAA, certificate management Splunk – data analysis DevOps – python, java, scripts, Self-service portal: updating infrastructure and config

DNA Center Plug-and-Play

Might not be option for the OT network as there might not be network connectivity to DNA Center infrastructure early in the construction phase CDP had to be enabled All connected switches had to have the PnP agent running and have no previous configuration

 

DNA Infrastructure

Network and compute resources required early in the construction phase for the configuration and commissioning of lighting solutions To capture ongoing energy usage data from Smart PDUs requires deployment of PDU management solution Optional deployment of OOB console solution allows remote access and troubleshooting of PDUs, switches and servers IP address to switch port assignment required for the commissioning of lighting and other IoT solutions Network devices configured according to the design guide standards specified on the Topology page Network devices configured for Smart Licensing and additional licensing might be required for advanced features and functionality Network and compute resources configured per corporate security standards and restricted user access LLDP protocol required for PoE power negotiation

Ensure DNA Infrastructure configured to support Cisco and IoT vendor solutions

Cisco Spaces

IOT Services (Wired) requires that switches must have Cisco DNA Advantage subscription The Map Service in Cisco Spaces includes features to keep Location Hierarchy in sync with the imported map data AAA configuration required on switches NTP synchronization required across controllers, connectors, and switches NETCONF must be enabled on switches IOT Wired Gateway requires the configuration of a new VLAN with IP subnet and address assignment

Become familiar with the " " and with the " "

Secure Onboarding

The WLAN controllers were used to deploy access points within the environment. All APs point back to DNA Center for proper AP group mapping, placement in DNA Center hierarchy, and placement on the map.

Accurate placement of APs on the map is critical to accurate location analytics in Cisco Spaces, so take the time to ensure the correct APs are placed in the correct locations of the 2D maps.

Onboarding devices leveraged the integration between Cisco DNA Center and ISE. The integration was used to automate the deployment of VLAN and VRF configurations and implement user/device policies to onboard users and devices into the appropriate network segments. As part of standard policy, devices are authenticated with 802.1x and AAA using Cisco Identity Services Engine (ISE) to provision access services via centrally configured policies. ISE also made it possible to profile non-802.1x devices using network telemetry, ISE data, and DNA Center’s cloud-based AI Endpoint Analytics. The onboarded Hybrid Work Devices included:

●      Desk Series

●      Room Series

●      Board Series

●      Signage

The team had to ensure the appropriate Internet connectivity, port access, and DNS resolution for the devices to function seamlessly.

The bulk of the setup for Hybrid Work Devices required accessing Webex Control Hub. As all the spaces in PENN 1 are shared spaces, all the devices were provisioned as shared workspaces in Webex. Once on the network, device onboarding was as simple as just entering an activation code on the device to associate the device with the workspace. Hot-desking capabilities and Hybrid Calendaring were also configured within Webex Control Hub where appropriate.

Physical device setup could not be overlooked as the setup of some Hybrid Work Devices is quite time consuming. The team had the overall goal of simplifying physical provisioning of various Hybrid Work devices. They leveraged previous experiences, learnings, and knowledge to connect ancillary offerings to Hybrid Work devices such as headsets, mics, speakers, touch controllers, etc.

Table 4.         Lessons Learned and Recommendations

Focus

Lessons Learned

Recommendations

Door Frame Design

Wall Mount Navigator requires thicker door frame siding PoE Network pass-through not supported with current door frames

Cisco Design Team to ensure Future Door Framing to accommodate Cisco Product Design (i.e., PoE and Navigators)

Shipping and Logistics

Managing logistics requires extensive off hour delivery Access to elevators is restricted to certain hours Higher costs will require off hour union and delivery labor Off-site shipping storage required to meet un-excepted delivery date changes Allocate more funding Allocate more timeline Identify external storage close to site (within city)

Construction Delivery Date / Go-Live Date

Room readiness changes due to many change requests

General contractors must do ample diligence

Hybrid Work from Office Integrations

The team was focused on delivering the following results as part of the various product integrations (inclusive of Cisco Spaces, DNA Center, Catalyst Wireless, Webex Control Hub, and Signage):

●      Provide data to partner applications to facilitate indoor wayfinding, conference room utilization tracking, asset tracking, and BLE-based engagement apps

●      Extend and enrich enterprise software applications with contextual location data (marketing automation, CRM, POS, building automation, HRMS, etc.)

●      Correlate data from Cisco Spaces Apps to create richer metrics

●      Ingest Presence, People Count, and environmental data in Smart Workspaces

The integration between Cisco Spaces and Webex Control Hub was required to perform rich map setup so that signage devices were able to display maps properly.

The high-level steps required for rich map set up and device integration included:

1.      Validating Cisco Spaces was set up properly

●      Account with correct license (ACT or Smart Workspaces license)

●      Locations added in location hierarchy (i.e., floor maps, floor numbers, AP placement) - this is part of DNAC to Cisco Spaces integration

●      Added correct metadata (manually) to each location (e.g., time zone, occupancy limits - building and floor level)

2.      Setting up Webex Control Hub

●      Enabled Workspace metrics at Webex Organization level during initial set up (had to revisit during device set up to enable per device)

●      Ensured devices are online and licensed (navigators)

●      During device provisioning, turned on device sensors to capture workspace metrics (presence, people count, environment, etc.) - The team was able to leverage pre-deployed template configurations

●      Configured Workspaces (calendar, map room types, and room level occupancy)

3.      Performing the Cisco Spaces to Control Hub integration

●      Activated Control Hub

●      Selected the workspaces where the information needed to be sent from

●      Generated token and pasted into Cisco Spaces. NOTE: This is now automated through an OAuth login flow directly from Webex Control Hub.

4.      Creating Rich Map

●      Uploaded CAD files to Cisco Spaces portal and ensured each file was associated with location hierarchy

●      Cisco Spaces took the CAD file, converted to a Rich Map, and admin notification occurred once the file was ready for use

●      Admin reviewed, requested changes, and accepted the file

●      Maps (bearing, zoom and pan) were edited and finalized

●      Webex devices were mapped to rich map IDs (i.e., Rooms). This is done from the Cisco Spaces Web UI.

Note:     At the time of configuration, the team's ability to configure independently was not possible and the capability was under development. All provisioning was handled by the Cisco Spaces team and was a manual process. This is no longer a limitation and can all be done by the customer inside of the space manager in Cisco Spaces.

5.      Creating signage

●      Created signage URLs for buildings and floors within Cisco Spaces (ability to configure was limited at the time of implementation and required provisioning to be handled by the Cisco Spaces team)

●      Enabled digital signage for Webex device in Control Hub leveraging created URLs

Table 5.         Lessons Learned and Recommendations

Focus

Lessons Learned

Recommendations

Signage Preparation

Enable WebGL and disable standby (to avoid sleep) on each device Can find WebGL under Web Engine Features

Location Accuracy

WAP location, height, and azimuth all need to be accurately captured for optimal location accuracy Floor maps "drift" over time More sources of location data mean better location data Use a tool like Ekahau to survey Verify, by sight, actual location of WAPs Ensure that maps are accurate and kept that way Leverage wi-fi, collaboration endpoint and other sensor data to build a comprehensive location data set

The team had multiple options when considering how they wanted to accommodate the seamless onboarding of visitors. They have traditionally deployed ISE at other locations. They were, however, very interested in Open Roaming functionality available with Cisco Spaces, which is not supported with ISE.

The decision came down to choosing between using authenticated or unauthenticated approaches. The Cisco Spaces Captive Portal did not support sponsored access at the time of deployment, but one could use access codes with proper permissions. Unfortunately, with no device security posturing capabilities offered as part of the Cisco Spaces solution, the team had to adhere to InfoSec requirements and continue leveraging ISE for this location.

Table 6.         Lessons Learned and Recommendations

Focus

Lessons Learned

Recommendations

Security Policy

Security policy can dictate technology choices Legacy processes and infrastructure sometimes need to be leveraged Educate all stakeholders Understand security requirements Be operationally cost effective without compromising security

Implementation: Hybrid Work IoT and 3rd Party Integrations

The team was tasked with identifying and leveraging prebuilt integrations with validated partners to deliver on additional smart building business outcomes. This involved powering the building with PoE and integrating PoE powered lighting and shades. To further deliver on the Hybrid Work from Office user experience, they used Cisco native APIs/SDKs for lighting and shade controls (provided by 3rd party vendors) to integrate to collaboration in-room controls.

The implementation consisted of:

●      Deploying Webex devices (Webex Board, Webex Room and Webex Room Kit with touch panels, Desk Pros, etc.) found on projectworkplace.cisco.com/products

●      Leveraging macros to control lighting & shades

●      Leveraging RoomHub to implement middleware for communicating between video device and IoT)

●      Referencing documentation found on Igor light system for REST API integration

●      Referencing documentation found on SolarTrac shades for REST API integration

●      Leveraging Issue Reporting Tool (UI and macro) on all Webex devices and posting feedback to Webex spaces using Webex SDK / REST API

●      Enabling Voice-Assist for controlling lights and shades in a few demo rooms as a proof of concept of the capabilities of the Webex Assistant Skills features.

A diagram of a webex room hubDescription automatically generated

As part of connecting systems and data to make this possible, the team leveraged Cisco Spaces Meta API and open REST APIs to integrated with custom applications. This integration enabled them to provide presence, people count, and environmental data to 3rd party data consumers.

Table 7.         Lessons Learned and Recommendations

Focus

Lessons Learned

Recommendations

Integration Planning

Video devices and IoT devices were on the same network. That was a requirement for this to actually work, since the video device talks to the RoomHub server when the user presses the UI controls, which then directs the lights, shades, etc.

Ensure you have the appropriate IP addressing and subnetting plan to deploy video and IoT devices on the same network.

Comparing Experiences

Worked equally well on devices with touch screen (Webex Board) and Room devices with touch panels

Don't waste time validating differences as experiences are similar

Macro Bulk Provisioning

Bulk provisioning macros on video devices is not currently supported on Control Hub. Luckily the internal tools of Cisco made it easy to deploy (and update) the macro to all devices.

Build in-house automation skills to deal with API based approach to provisioning.

Operations: IT Observability, Management, and Assurance

Supporting Day 2 operations is critical, and the team is consistently looking for new ways to:

●      Improve visibility into the Health and Performance of Users, Devices, and Applications

●      Reduce Mean Time to Resolution of Reported Issues

●      Leverage alert notifications for network and client issues to proactively address impact to end user experiences

●      Ensure a clear line of sight between user locations and Webex services to optimize performance and ensure exceptional Webex user experiences

Identifying new ways to perform monitoring and troubleshooting using the tools available is critical, and the team is consistently working within Webex Control Hub, DNA Center, and ThousandEyes when troubleshooting site issues. They use Cisco DNA Center to discover wired and wireless network devices and immediately begin collecting telemetry. Cisco DNA Center automatically correlates telemetry data and creates automated baselines that provide context for network metrics and events. The team is effectively able to analyze the telemetry data to take advantage of insights and visibility into overall network, client, and application health. Identifying anomalous events by comparing telemetry data to established baselines has become a best practice. When device specific issues are encountered, the team uses the 360-degree views for each device connected to the network to understand anything that may potentially be impacting the device that is challenged. Comparing current and historical end-user location data enhances the team's ability to provide enhanced support.

Below is a table highlighting areas of consideration and the platforms used to support ongoing operations:

Consideration

Description

Platform

Monitor Infrastructure Health

Monitor the health of the overall infrastructure inclusive of Webex services

WIP

Troubleshooting Connectivity

Troubleshoot device connectivity issues

WIP

Monitor User Experience

Monitor experience from the user's perspective

WIP

Monitor Application Health

Monitor application performance issues

WIP

Monitor Hybrid Work Device Health

Monitor Webex device health

WIP

Alerts and Notifications

Send alerts and triggers based on a rule engine via multiple channels like email, Webex Teams, API, webhook

WIP

Enhance Webex Cloud Performance

Monitor, benchmark, and troubleshoot network to Webex cloud performance and perform root cause analysis via ThousandEyes integration

WIP

Table 8.         Lessons Learned and Recommendations

Focus

Lessons Learned

Recommendations

Signage Preparation

Enable WebGL and disable standby (to avoid sleep) on each device Can find WebGL under Web Engine Features

The team recognized the need to enable voice assistant functionality to enhance the user experience. They decided to create custom skills using the Webex Assistant SDK to further enhance integrations (voice activated lighting and shade control).  It was important to leverage 3rd party solution API documentation and work with the appropriate talent to develop the necessary skills.

Cisco’s PENN 1 office was the first of many Cisco offices that have been transformed from traditional workspaces to smart workspaces tailored to the demands of hybrid work. The office provides a variety of spaces that draw employees to the office for collaborative experiences that might not be as effective remotely, while still being inclusive of remote participants and allowing those who could not make the commute the opportunity to participate. The site is a showcase of how technology can make the office welcoming to hybrid workers while providing the visibility to IT and facilities staff and helping the company get closer to our net-zero goals. This deployment was a learning experience, and we hope our journey helps you achieve your hybrid work from office outcomes.

Copyright

IMAGES

  1. Configure Dynamic VLAN Assignment with NGWC and ACS 5.2

    cisco dynamic vlan assignment radius

  2. Configure Dynamic VLAN Assignment with ISE and Catalyst 9800 Wireless

    cisco dynamic vlan assignment radius

  3. IEEE 802.1X Authentication and Dynamic VLAN Assignment with NPS Radius

    cisco dynamic vlan assignment radius

  4. Configure a RADIUS Server and WLC for Dynamic VLAN Assignment

    cisco dynamic vlan assignment radius

  5. Configure a RADIUS Server and WLC for Dynamic VLAN Assignment

    cisco dynamic vlan assignment radius

  6. Configuration Guide on Dynamic VLAN with the VLAN Assignment function

    cisco dynamic vlan assignment radius

VIDEO

  1. Компьютерные сети с CISCO

  2. CCNP Security Eğitimi

  3. 【 Cisco ISE 攻略シリーズ 】Dynamic VLAN

  4. Dynamic VLAN Assignment with RADIUS and CAPsMAN Configuration Example

  5. Network Access

  6. OpenWiFi Dynamic VLAN assignment with Radius Server

COMMENTS

  1. Configure a RADIUS Server and WLC for Dynamic VLAN Assignment

    This procedure explains how to configure the users in the RADIUS server and the RADIUS (IETF) attributes used to assign VLAN IDs to these users. Complete these steps: From the ACS GUI, click User Setup. In the User Setup window, enter a username in the User field and click Add/Edit.

  2. Configure Dynamic VLAN Assignment with ISE and Catalyst 9800 ...

    Complete these steps: From the ISE GUI, navigate to Administration > Identity Management > Identities and select Add. Complete the configuration with the username, password, and user group as shown in the image: Step 3. Configure the RADIUS (IETF) attributes used for dynamic VLAN Assignment.

  3. IEEE 802.1X Authentication and Dynamic VLAN Assignment with NPS Radius

    How to Provision 802.1 X Authentication Step By Step With Dynamic VLAN Assignment With Windows Radius Server For 802.1x Clients. A typical configuration for a system under IEEE 802.1x Authentication control is shown in the following figure.

  4. ISE Dynamic VLAN assignment

    ISE Dynamic VLAN assignment. Dynamic VLAN assignment by a RADIUS server (e.g. Cisco ISE) can be useful when you want to assign a specific VLAN to a user or group of users. In order to achieve this the VLANS configured on the switches must be configured with a name, this name must be consistent across multiple switches.

  5. 802.1X /w Dynamic VLAN Assignment

    Dynamic VLAN Assignment In lieu of CoA, MS switches can still dynamically assign a VLAN to a device by assigned the VLAN passed in the Tunnel-Pvt-Group-ID attribute. It may be necessary to perform dynamic VLAN assignment on a per computer or per user basis. ... You need a RADIUS server that supports CoA (e.g. Cisco ISE, Aruba ClearPass) if you ...

  6. Configure Dynamic VLAN Assignment with NGWC and ACS 5.2

    These RADIUS attributes decide the VLAN ID that should be assigned to the wireless client. The SSID of the client (the WLAN, in terms of the WLC) does not matter because the user is always assigned to this predetermined VLAN ID. The RADIUS user attributes used for the VLAN ID assignment are: IETF 64 (Tunnel Type) - Set to VLAN.

  7. How to use 802.1x/mac-auth and dynamic VLAN assignment

    The 802.1x protocol is used for network access control. For devices like printers, cameras, etc. we will use mac-authentication as a fallback. We will also use dynamic VLAN assignment for the connected ports. Our radius server will be Microsoft NPS. You can activate this role on the Windows server:

  8. RADIUS VLAN Assignment with Cisco ISE

    4. I am trying to install Cisco ISE 2.1 to be used as a RADIUS server with 802.1x on my switches. I want to dynamically assign a VLAN based to a user who connects on the switch port. The problem is that, although my end client is authenticated and authorized by ISE, the VLAN id never gets received on the switch from ISE.

  9. Solved: 802.1x dynamic vlan

    Dynamic VLAN Assignment In lieu of CoA, MS switches can still dynamically assign a VLAN to a device by assigned the VLAN passed in the Tunnel-Pvt-Group-ID attribute. It may be necessary to perform dynamic VLAN assignment on a per computer or per user basis. This can be done on your wired network via 802.1x authentication (RADIUS).

  10. PDF Configure a RADIUS Server and WLC for Dynamic VLAN Assignment

    Go to the user1's Edit page. From the User Edit page, scroll down to the Cisco Airespace RADIUS Attributes section. Check the check box next to the Aire−Interface−Name attribute and specify the name of the dynamic interface to be assigned upon successful user authentication. This example assigns the user to admin VLAN.

  11. Configuring Dynamic VLAN Membership

    Configuring Dynamic Access Ports on a VMPS Client. To configure a dynamic access port on a VMPS client switch, perform this task: Enters global configuration mode. Enters interface configuration mode and specifies the port to be configured. Sets the port to access mode. Configures the port as eligible for dynamic VLAN access.

  12. How To Configure NPS and Active Directory For Dynamic Radius based Vlan

    How Configure NPS and Active Directory For Dynamic Radius based Vlan assignment ===== This document is to describe the steps to configure NPS(network policy servicer)server with below use case. Vlans need to be assigned based on different Radius group i.e Sales group to Vlan 10; Account group to Vlan 20. Steps:-Open Active directory Users and ...

  13. Switch [Dynamic VLAN]

    Administrators therefore create VLANs and configure the corresponding VLAN number to each switch port with access mode. Conversely, administrator only needs to set switch port as trunk and fixed port and a few policies on RADIUS server for Dynamic VLAN Assignment. It mitigates considerable actions/jobs for network administrator.

  14. FAQ How to configure dynamic vlan assignment via radius

    Add to Favorites. This case will reveal how to configure dynamic vlan assignment via radius. In some situation you would like to bind a mac-address to a specific VLAN and allow a host to get access the network only to a specific VLAN. You can use any Radius server, Huawei recommended solution is Agile Controller.

  15. Dynamic VLAN Assignment and Auto Smartport Configuration on a ...

    Navigate to VLAN Management > Create VLAN on the non-active switch to see if VLAN 10-20 has been created. Step 4. Navigate to Status and Statistics > View Log > RAM Memory and check to see if GVRP has created VLAN 10-20 for both of the non-active switches. Conclusion. You have now successfully configured Dynamic VLANs and Auto Smartport ...

  16. PDF IEEE 802.1X VLAN Assignment

    The IEEE 802.1X VLAN Assignment feature is automatically enabled when IEEE 802.1X authentication is configured for an access port, which allows the RADIUS server to send a VLAN assignment to the device port. This assignment configures the device port so that network access can be limited for certain users.

  17. 2024 Template Guidelines and Instructions

    How to use the template. Title guidelines and best practices: 100 Character Maximum (this includes spaces) Make sure that the title mentions Cisco technology first Manager should propose the title Titles should be brief and convey specific coverage Should follow marketing guidelines for co-branded documents Partners should agree to the title prior to final publication