Point to Multipoint Authentication

Access PointClientAuthentication DBBeaconAssociation RequestRADIUS Access RequestMAC Known?YesNoRADIUS Access RejectAssociation Response (Reject)User CertificateUser IPs (create IPIP interface)User IPsec ConfigurationUser Firewall ConfigurationUser BGP ConfigurationRADIUS Access AcceptAssociation Response (Accept)ARP Request 100.64.0.1ARP Reply 100.64.0.1IPsec(AH) Establishment100.64.0.0/10 <-> 100.64.0.1BGP TCP over IPsec(AH) IPIP44.24.#.# <-> 44.24.255.255BGP Announce & Learn RoutesInternal OSPF PeersAnnounce User RoutesMain TrafficMain Traffic
WLAN HeaderSource MACDestination MACTunnel Outer IP HeaderTunnel Source IPTunnel Destination IPIPsec Authentication Header (AH)Integrity Check ValueTunnel Inner IP HeaderSource IPDestination IPData Payload (eg: TCP, UDP)

Notes from an ignoramus (aka Ryan)

Sectors need:

/interface wireless set default-forwarding=no 0
/ip ipsec proposal set enc-algorithm=null disabled=no 0

set up yo dhcp for 100.64.0.1/10

Let's assume our client has lan ip 100.64.0.2

Cell config

/ip ipsec peer add address=100.64.0.2/10 auth-method=rsa-signature certificate= enc-algorithm=null disabled=no comment=K0RET
/ip ipsec policy add src-address=0.0.0.0/0 dst-address=44.34.133.1 sa-src-address=100.64.0.1 sa-dst-address=100.64.0.2 tunnel=yes action=none proposal=default

Client config

/ip ipsec peer add address=100.64.0.1/10 auth-method=rsa-signature certificate= enc-algorithm=null disabled=no comment=K0RET
/ip ipsec policy add src-address=44.34.133.1 dst-address=0.0.0.0/0 sa-src-address=100.64.0.2 sa-dst-address=100.64.0.1 tunnel=yes action=none proposal=default

to-do: BGP config on both ends

to-do: script to create ipsec policy on client using the proper sa-src-address as assigned by dhcp

Attachments

Filename Size Modified
PtMP Encapsulation.svg 5.9KiB 2016-08-06 14:46:40
HamWAN Authentication Sequence.dia 3.4KiB 2016-08-06 14:46:40
HamWAN Authentication Sequence.svg 19KiB 2016-08-06 14:46:40
PtMP Encapsulation.dia 1.6KiB 2016-08-06 14:46:40