Chapter 4: Architecture Design

Typical system topology, device wiring, VLAN segmentation, and redundancy design for enterprise wireless security


4.1 Typical System Topology

The enterprise wireless security system follows a hierarchical three-tier switching architecture combined with a dedicated security services plane. The topology separates the data forwarding path (access → distribution → core) from the security services path (authentication, authorization, monitoring), ensuring that security infrastructure failures do not directly impact data forwarding, and vice versa. Four VRFs — Corp (VLAN 10), IoT (VLAN 20), Guest (VLAN 30), and Mgmt (VLAN 99) — are maintained from the access layer through the core, with firewall enforcement at zone boundaries.

The core firewall HA pair sits at the network perimeter, handling internet-bound traffic and enforcing zone policies between VRFs. The core switch HA pair provides high-bandwidth, low-latency switching between distribution zones and the security services plane. Distribution switches are logically separated by zone, reducing the blast radius of any single distribution failure. PoE access switches provide 802.3at/bt power to APs and enforce 802.1X port authentication for wired devices. The security services plane — WLAN Controller, RADIUS Cluster, PKI, NAC, and SIEM — is connected to the management VLAN with dedicated uplinks to the core.

Enterprise Wireless Security Topology Diagram
Figure 4.1: Enterprise Wireless Network Security — Typical System Topology with VRF Zones, Security Services Plane, and Traffic Flows

Traffic Flow Descriptions

Flow TypePathProtocolNotes
Authentication FlowAP → Controller → RADIUS → IdP/PKICAPWAP/TLS, RADIUS UDP 1812Dashed blue arrows; must complete before data flow permitted
Data Flow (Corp)AP → PoE Switch → Dist-SW-1 → Core → Firewall → Internet/DC802.1Q VLAN 10, encryptedSolid gray; firewall enforces zone policy
Data Flow (Guest)AP → PoE Switch → Dist-SW-3 → Core → Firewall → Internet only802.1Q VLAN 30No RFC1918 reachability; DNS filtering applied
Management FlowSIEM/NMS → Mgmt Switch → All devicesSNMP, Syslog, SSH, NTPDotted green; OOB management preferred
WIPS TelemetryAP/RF Sensor → Controller → SIEMCAPWAP, SyslogContinuous RF monitoring data stream

4.2 VLAN and Zone Design

Network segmentation is implemented through a combination of 802.1Q VLANs at the access and distribution layers, and VRF instances at the core and firewall. This dual-layer segmentation ensures that even if a VLAN misconfiguration occurs at the access layer, the VRF boundary at the core prevents cross-zone traffic from reaching unintended destinations. The firewall enforces explicit permit rules between zones, with an implicit deny-all default policy.

ZoneVLAN IDSubnetUsers/DevicesInternetCorp AccessIoT Access
Corp1010.10.0.0/22Managed staff, MDM devicesYes (filtered)FullNo
IoT2010.20.0.0/22Sensors, cameras, building systemsAllowlist onlyNoAllowlist
Guest3010.30.0.0/22Visitors, BYOD, contractorsYes (DNS filtered)NoNo
Mgmt9910.99.0.0/24Network devices, serversNoAdmin onlyNo
Dynamic VLAN Assignment: VLAN assignment is not static per port but dynamic per authenticated session. When a client successfully authenticates via 802.1X, the RADIUS server returns the Tunnel-Type=VLAN, Tunnel-Medium-Type=802, and Tunnel-Private-Group-ID=<VLAN-ID> attributes. The AP and switch enforce the assigned VLAN for that specific client session, enabling multiple VLANs to coexist on a single AP or switch port.

4.3 Redundancy and High Availability Design

Enterprise wireless security systems must maintain continuous operation despite hardware failures, software faults, and planned maintenance windows. Redundancy is implemented at every critical layer: controller HA, RADIUS cluster, core switch HA, firewall HA, and dual uplinks from APs to distribution. The redundancy design targets a Recovery Time Objective (RTO) of less than 30 seconds for controller failover and less than 5 seconds for RADIUS failover.

ComponentRedundancy ModelFailover TimeState SyncNotes
WLAN ControllerActive-Standby HA<30sFull session stateAPs rejoin standby automatically
RADIUS ServerActive-Active cluster (VIP)<5sSession database replicatedLoad balanced; failover transparent
Core SwitchVSS/HA stack<1sControl plane syncSingle logical switch to upstream
FirewallActive-Passive HA<3sSession table syncStateful failover preserves sessions
PKI/CAPrimary + Offline backupManual (RTO <4h)CRL/OCSP cachedOCSP caching reduces dependency
AP UplinksDual-home to two PoE switches<1s (STP/LACP)N/APrevents single switch failure from dropping APs

4.4 Equipment Rack and Device Wiring

Physical equipment is organized across three rack groups: the WLAN and Security rack (WLAN Controller, RADIUS, PKI), the Core and Distribution rack (core switch, distribution switches, PoE access switches), and the Edge and Management rack (firewall HA pair, management switch). Cable management follows color-coding conventions to facilitate troubleshooting and maintenance. All inter-rack connections use fiber SFP+ modules for high bandwidth and noise immunity.

Equipment Rack and Device Wiring Diagram
Figure 4.2: Equipment Rack Layout and Device Wiring — Three-Rack Architecture with Color-Coded Cable Management
Cable ColorConnection TypeMediaSpeed
BlueManagement (SNMP, SSH, Syslog)Cat6A RJ451GbE
OrangeInter-rack uplinks (Core ↔ Distribution)LC-LC OM4 Fiber10GbE SFP+
GreenAP downlinks (PoE Switch → APs)Cat6A RJ451GbE PoE+
RedWAN and firewall external linksCat6A RJ45 / SFP+1–10GbE