Hi,
There are 2 ways to bring corporate users (not access-controlled) into vlans:
1/ via controller (need premium/mobility controller license) : Mobility Traffic Manager. This would be similar to what most vendors do, but is (in my opinion) a bit complicated to setup.
2/ via the APs (supported by all controllers) : my preferred method, simple and proven.
1/ traffic from the wireless client is sent to controller via a tunnel between AP and controller. Once traffic reaches the controller, admin must configure the controller, so it knows via which interface (LAN or INTERNET) the traffic must be tagged to the external wired network. AP will include the expected vlan in the tunneled traffic, so the controller will just respect what the AP tells it to do. Radius based vlans can be used as well, these steps only cover the manual config.
1.1 Add network profile
Controller - Network - Network Profiles : add profile "vlan 20" - vlan 20
1.2 Bind the network profile to a physical interface on the controller, so controller knows via which interface to transmit this vlan
Controller - Network - VLANs - Bind network profile "vlan 20" as tagged on LAN/INTERNET port
1.3 Configure switch with vlan tag on LAN/INTERNET port (sample for procurve switch)
vlan 20
tag x
1.4 Define VSC
Controller - VSCs - new VSC
Use controller for Auth: yes
Use controller for Access Control : no
Mobility Traffic Manager : yes
1.5 Bind VSC to AP Group. The egress binding here will be used by the APs for the tunneld traffic to be marked with this vlan. So when the controller gets the traffic marked with this vlan id, it will use the VLAN Mapping port (step 1.2) to forward the traffic tagged on that port.
Controller - Controlled APs - APGroupx - VSC Bindings
Add Binding - Egress : Network profile "vlan 20"
With this setup, the controller behaves like a L2 bridge between the wireless client and the wired network. All traffic will pass the controller, so CPU load on controller should be considered. The controller is NOT involved with L3/DHCP with this setup, so the upstream routing switch for vlan 20 must be the dhcp relay.
Controller is SPOF, when using teaming, failover can be done, but takes the discovery time of the AP (about 90seconds).
Advantage is that switch ports connecting the APs do not need to know the vlans.
2/ VSC is bound to the APs, and the APs will directly send the wireless traffic tagged on the ethernet port of the AP. The tunnel between AP and controller is only used for management/auth, not for data forwarding.
1.1 Add network profile
Controller - Network - Network Profiles : add profile "vlan 20" - vlan 20
1.2 Do not bind the network profile to a physical interface on the controller : traffic does not pass the controller.
1.3 Configure switch with vlan tag for EVERY AP switch port (sample for procurve switch)
vlan 20
tag x
Ensure the Access switches have their uplinks tagged as well to the core switch, which is doing L3 routing and dhcp relay for vlan 20.
1.4 Define VSC
Controller - VSCs - new VSC
Use controller for Auth: yes
Use controller for Access Control : no
Mobility Traffic Manager : no
1.5 Bind VSC to AP Group. The egress binding here will be used by the APs to send the traffic on the local AP ethernet port with this vlan tag.
Controller - Controlled APs - APGroupx - VSC Bindings
Add Binding - Egress : Network profile "vlan 20"
1.6 verify
on the switch port of the AP, verify mac-address of the wireless clients can be learned in the vlan 20
show mac-address x (x = AP interface port)
@Lemmy : I agree that the product can be challenging (specially for the access-controlled/mtm setups), but scenario 2 above is the most common used scenario, which just works.
Using Chrome/Firefox for management typically works better than IE for me.
If you post a bit more about your setup (VSC - access-control/MTM etc), we may be able to find a solution.
I hope this helps,
Best regards,Peter