Mobility, Anchor-Foreign

Tunnelling Wireless Client traffic between Controllers is very useful in some scenarios. Have used it for isolating Guest Traffic (typical in DMZ) and in Multi-Company facilities (Two or more companies sharing same locations and need their own Wireless infrastructure in shared areas).

Things to rember:

  • Foreign Wireless Controller are where AP’s terminate
  • Foreign Wireless Controller handles all radius
  • Anchor Wireless Controller are where WLAN are terminated
  • Anchor Wireless Controller handles Web-authentication (L3)
  • Anchor Wireless Controller handles DHCP (ex. if internal DHCP is needed)
  • Between Foreign and Anchor, the following needs to be able to communicate:
    • UDP 16666
      • Test connectivity with: mping <mobility_peer_IP>
    • IP protocol 97
      • Test connectivity with: eping <mobility_peer_IP>

From: https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/213912-configure-mobility-anchor-on-catalyst-98.html

Note (personally experience): When setup mobility between AOS and IOS-XE, you need to enable “data encryption” otherwise issues with ex. WiFi-Calling.

Note (personally experience): When Firewalls involved between Anchor/Foreign Controllers, and these are inspect tls 1.3, issues occur with ex. MS Teams (not possible to disable tls 1.3) and browsers which use tls 1.3 (possible to disable)