D-Link DUA-2000 Policy Manager User Manual
9
5.
Network Configuration Example
The D-Link DUA-2000 Policy Manager is a highly integrated solution which requires access
to multiple services, such as Wireless Controllers, Unified Access Points (APs) and Layer 2
and 3 switches. This high level of integration requires careful planning and knowledge of
multiple products and technologies to implement. An example of how to configure the
network topology for use with the DUA-2000 is shown below.
NOTE:
This configuration applies to the network only and information for
configuring the Policy Manager follows later in the document. It is designed to
illustrate what is required to support a Wireless Controller with external
authentication and captive portal.
Network Requirements
In this example, the following elements are required:
Convention
Description
DHCP Server
This is a Dynamic Host Configuration Protocol (DHCP) server for
dynamically assigning IP addresses to wireless clients. In the
example below, a router is used for this function.
PoE Switch
This is a Layer 2 device that supplies Power over Ethernet (PoE) to
the Wireless APs and performs switching and VLAN tagging
functions.
Wireless AP
This advertises the two Service Set Identifiers (SSIDs) for the
wireless Employee (corporate) and Personal (BYOD) networks.
Wireless Controller
This controls access to wireless networks and manages wireless
clients and APs. Clients can be authenticated against a number of
sources, including the Policy Manager.
Policy Manager
This is responsible for serving the captive portal and providing a
RADIUS source to the Wireless Controller. It itself can be pointed
to a number of authentication sources, including RADIUS, AD
(LDAP), POP3 and RADIUS.
Table 6-1 – Network Requirements
The following are optional but useful for testing:
Convention
Description
Wireless device
(laptop, tablet or
smartphone)
This is used to join the wireless networks and test captive portal
and network functionality.
Internet access
This can be used to test Internet access for authenticated clients.
TFTP Server
This is used for testing the policy that has been applied to client
devices.
HTTP Server
This is used for testing the policy that has been applied to client
devices.
Table 6-2 – Optional Requirements