The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This chapter describes the mesh deployment modes and contains the following sections:
Wireless Mesh Network
In a Cisco wireless outdoor
mesh network, multiple mesh access points comprise a network that provides
secure, scalable outdoor wireless LAN.
The three RAPs are connected
to the wired network at each location and are located on the building roof. All
the downstream access points operate as MAPs and communicate using wireless
links (not shown).
Both MAPs and RAPs can
provide WLAN client access; however, the location of RAPs are often not
suitable for providing client access. All the three access points in are
located on the building roofs and are functioning as RAPs. These RAPs are
connected to the network at each location.
Some of the buildings have
onsite controllers to terminate CAPWAP sessions from the mesh access points but
it is not a mandatory requirement because CAPWAP sessions can be back hauled to
a controller over a wide-area network (WAN).
Note
CAPWAP over CAPWAP
is not supported. AP in local mode connected on the RAP or MAP ethernet port is
not a supported configuration.
Wireless Backhaul
In a Cisco wireless backhaul network, traffic can be
bridged between MAPs and RAPs. This traffic can be from wired devices that are
being bridged by the wireless mesh or CAPWAP traffic from the mesh access
points. This traffic is always AES encrypted when it crosses a wireless mesh
link such as a wireless backhaul.
AES encryption is established
as part of the mesh access point neighbor relationship with other mesh access
points. The encryption keys used between mesh access points are derived during
the EAP authentication process.
Universal Access
You can configure the backhaul on mesh access points to
accept client traffic over its 802.11a radio. This feature is identified as
Backhaul Client Access in the controller GUI (Monitor > Wireless). When this
feature is disabled, backhaul traffic is transmitted only over the 802.11a or
802.11a/n radio and client association is allowed only over the 802.11b/g or
802.11b/g/n radio. For more information about the configuration, see the
“Configuring Advanced Features” section on page 159.
Point-to-Multipoint Wireless Bridging
In the
point-to-multipoint bridging scenario, a RAP acting as a root bridge connects
multiple MAPs as non-root bridges with their associated wired LANs. By default,
this feature is disabled for all MAPs. If Ethernet bridging is used, you must
enable it on the controller for the respective MAP and for the RAP.
Point-to-Point Wireless Bridging
In a point-to-point
bridging scenario, a 1500 Series Mesh AP can be used to extend a remote network
by using the backhaul radio to bridge two segments of a switched network. This
is fundamentally a wireless mesh network with one MAP and no WLAN clients. Just
as in point-to-multipoint networks, client access can still be provided with
Ethernet bridging enabled, although if bridging between buildings, MAP coverage
from a high rooftop might not be suitable for client access.
If you intend to use an
Ethernet bridged application, we recommend that you enable the bridging feature
on the RAP and on all MAPs in that segment. You must verify that any attached
switches to the Ethernet ports of your MAPs are not using VLAN Trunking
Protocol (VTP). VTP can reconfigure the trunked VLANs across your mesh and
possibly cause a loss in connection for your RAP to its primary WLC. An
incorrect configuration can take down your mesh deployment.
For security reasons the
Ethernet port on the MAPs is disabled by default. It can be enabled only by
configuring Ethernet bridging on the Root and the respective MAPs. To enable
Ethernet bridging using the controller GUI, choose
Wireless > All APs > Details for the
AP page, click the
Mesh tab, and then select the
Ethernet
Bridging check box.
Note
The overall
throughput of backhaul radio decreases by half for each hop of a mesh tree.
When the Ethernet-bridged clients are used in MAPs and heavy traffic is passed,
it may result in a high throughput consumption, which may cause the downlink
MAPs to disassociate from the network due to throughput starvation.
Ethernet bridging has to be
enabled for the following two scenarios:
When you want to use the mesh
nodes as bridges.
When you want to connect
Ethernet devices such as a video camera on the MAP using its Ethernet port.
Ensure that you enable
Ethernet bridging for every parent mesh AP taking the path from the mesh AP in
question to the controller. For example, if you enable Ethernet bridging on
MAP2 in Hop 2, then you must also enable Ethernet bridging on MAP1 (parent
MAP), and on the RAP connecting to the controller.
To configure range parameters
for longer links, choose
Wireless > Mesh. Optimum distance (in feet)
should exist between the root access point (RAP) and the farthest mesh access
point (MAP). Range from the RAP bridge to the MAP bridge has to be mentioned in
feet.
The following global
parameter applies to all mesh access points when they join the controller and
all existing mesh access points in the network:
Range: 150 to 132,000 feet
Configuring Mesh Range (CLI)
Procedure
To configure the distance
between the nodes doing the bridging, enter the
config mesh range command.
APs reboot after
you specify the range.
Note
To estimate the range and the
AP density, you can use range calculators that are available at: