Correct. Not everyone drinks the procera koolaid however ;)

On Oct 21, 2016 4:41 PM, "Josh Reynolds" <j...@kyneticwifi.com> wrote:

> Unless you're not running BMUs :P
>
> Even if you were, you could run them in pairs. You know, just like a
> regular network service.
>
> On Oct 21, 2016 7:37 PM, "Chris Ruschmann" <ch...@scsalaska.net> wrote:
>
>> In the case of Powercode, if the BMU fails, you have more problems than
>> DHCP ;)
>>
>>
>>
>> *From:* wireless-boun...@wispa.org [mailto:wireless-boun...@wispa.org] *On
>> Behalf Of *Adair Winter
>> *Sent:* Friday, October 21, 2016 3:16 PM
>> *To:* WISPA General List <wireless@wispa.org>
>> *Subject:* Re: [WISPA] Network/infrastructure design for WISP's
>>
>>
>>
>> What happens when DHCP quits and you can't manage anything?
>>
>> Powercode assigns the next available management IP for whatever
>> tower/range and we statically assign to the CPE
>>
>>
>>
>> On Fri, Oct 21, 2016 at 6:13 PM, Ian Fraser <ian_fra...@gozoom.ca> wrote:
>>
>> Not sure how static would be safer than DHCP for CPE mgmt?
>>
>>
>>
>> Ian
>>
>>
>>
>> -------- Original message --------
>> From: Fred Goldstein <f...@interisle.net>
>> Date:10-21-2016 6:31 PM (GMT-05:00)
>> To: wireless@wispa.org
>> Cc:
>> Subject: Re: [WISPA] Network/infrastructure design for WISP's
>>
>> On 10/21/2016 5:55 PM, Ian Fraser wrote:
>> >
>> >
>> > PPPOE for Res traffic. VLAN's for Biz. Public IP's are statically
>> > assigned.  DHCP for CPE's MgMt IP assignment.  PPPOE session and CPE's
>> > connection to the AP authenticated by Radius. Radius Accounting  is
>> > used for traffic billing and session info.
>> >
>>
>> Wouldn't it be safer to use static IPs for CPE management? I'd do that,
>> private IPs of course on a management VLAN not visible to customers.
>>
>> > Per site: 2 VLANs for MgMt (1 for Tower/AP/UPS etc and 1 for CPEs) and
>> > 1 VLAN per AP for PPPOE or a dedicated VLAN per Biz. AP's are bridged
>> > for CPE's PPPOE to NAS.  uPnP enabled CPEs. Cust Routers are not
>> > allowed to initiate PPPOE.  PPPOE NAS's are mostly colocated tower
>> > sites so that backhauls can see QOS markers on traffic and not just a
>> > Tunnel.
>> >
>> > BGP Advertises IP range per Fibre POP and feeds 0.0.0.0/0 into OSPF
>> > for redistributing routes inside the AS.  Infrastructure MgMt is on
>> > RFC1918 and customers are Public IPs.  Firewall rules on
>> > NAS/Router/CPE prevent Customer IP's from reaching MgMt IP's.
>> >
>> Nice if you have enough public IPs for customers. I'm not sure BGP and
>> PPPOE are necessarily the easiest protocols for this purpose, but
>> definitely do use the VLANs and keep the routing out of the radios.
>>
>> > Mikrotik for all routing.  Netonix for most switching. Mikrotik for
>> > most PtMP (probably uncommon) but LTE is Telrad in areas where it is
>> > deployed, which skews the above architecture a bit :(  LTE is not for
>> > newbies though.... mind you maybe Mikrotik isn't either lol...  but in
>> > 13 years I've never been floored by a virus "infecting" my gear ;-)
>> >
>> You can't do 5 GHz with MikroTik in the US; they don't have valid FCC
>> approval any more. Not that they admit it, but the US isn't a big market
>> for them. The wireless design itself has to be based on the local
>> terrain, clutter (trees, etc.), subscriber density, and other conditions.
>>
>> You do want a nice SNMP monitoring system that allows you to pull
>> whatever parameters you want out of the MIB, not one that charges per
>> line item (like PRTG) or that only pulls a few selected details. I do
>> enjoy the detail I can get out of InterMapper, for instance. Where are
>> you (or your planned network) located, Jordan?
>>
>> > Cheers,
>> >
>> > Ian
>> >
>> >
>> >> On 10/21/2016 3:07 PM, Jordan de Geus wrote:
>> >>> Hey guys,
>> >>>
>> >>> I'm very new to the WISP industry and I've been curious to know how
>> >>> people are designing their WISP networks.
>> >>>
>> >>> Are you creating VLAN's for each connection point? So your backhauls
>> >>> are all in one VLAN, while all AP to client connections are in
>> >>> another VLAN?
>> >>>
>> >>> I had been thinking about how the above VLAN based design would be,
>> >>> in terms of security, and I realized that if all CPE's were in one
>> >>> VLAN together, wouldn't they be able to cross communicate? So an AP
>> >>> with 30 clients operating in VLANX, would essentially be able to
>> >>> communicate to each other, bring security as a major issue. I was
>> >>> thinking that you'd be able to do VLAN's for each customer, but
>> >>> doing a PTMP setup for residential purposes, I feel like the system
>> >>> would be quite bogged down with that amount of vlans?
>> >>>
>> >>> How are you authenticating and issuing IP's to clients? Are you
>> >>> doing PPPOE or DHCP? Is everything just in routed tables?
>> >>>
>> >>> What sort of hardware are you using for your network design and
>> >>> management?
>> >>>
>> >>> Kind Regards,
>> >>> Jordan
>> >>>
>>
>>
>> --
>>   Fred R. Goldstein      k1io    fred "at" interisle.net
>>   Interisle Consulting Group
>>   +1 617 795 2701
>>
>>
>> _______________________________________________
>> Wireless mailing list
>> Wireless@wispa.org
>> http://lists.wispa.org/mailman/listinfo/wireless
>>
>>
>> _______________________________________________
>> Wireless mailing list
>> Wireless@wispa.org
>> http://lists.wispa.org/mailman/listinfo/wireless
>>
>>
>>
>>
>>
>> --
>>
>> Adair Winter
>> VP, Network Operations / Co-Owner
>> Amarillo Wireless | 806.316.5071
>> C: 806.231.7180
>> http://www.amarillowireless.net
>> <http://www.amarillowireless.net>
>>
>>
>>
>> _______________________________________________
>> Wireless mailing list
>> Wireless@wispa.org
>> http://lists.wispa.org/mailman/listinfo/wireless
>>
>>
> _______________________________________________
> Wireless mailing list
> Wireless@wispa.org
> http://lists.wispa.org/mailman/listinfo/wireless
>
>
_______________________________________________
Wireless mailing list
Wireless@wispa.org
http://lists.wispa.org/mailman/listinfo/wireless

Reply via email to