Pular para o conteúdo principal

Projetando uma Arquitetura WiFi Multi-Tenant para MDU

Este guia autorizado fornece um projeto arquitetônico para a implantação de redes WiFi escaláveis, seguras e isoladas em várias unidades em um MDU. Ele aborda considerações críticas, incluindo segmentação de VLAN, planejamento de RF, autenticação 802.1X e como equilibrar o isolamento de locatários com o gerenciamento centralizado para um ROI aprimorado.

📖 6 min de leitura📝 1,345 palavras🔧 2 exemplos práticos3 questões práticas📚 8 definições principais

Ouça este guia

Ver transcrição do podcast
Designing a Multi-Tenant WiFi Architecture for MDU — A Purple Technical Briefing. Welcome to the Purple Technical Briefing series. Today we're getting into the architecture that underpins some of the most complex WiFi deployments you'll encounter in enterprise environments — multi-tenant WiFi for multi-dwelling and multi-use buildings. Whether you're responsible for a 300-room hotel where guests, staff, and building management systems all share the same physical infrastructure, a mixed-use retail and office complex, or a student accommodation block with hundreds of independent tenants, the challenge is fundamentally the same: how do you deliver reliable, secure, isolated connectivity to multiple independent parties over a single shared physical network? This isn't a theoretical exercise. The decisions you make at the architecture stage will directly determine your security posture, your compliance exposure under GDPR and PCI DSS, and frankly, whether your support desk gets flooded with complaints six months after go-live. So let's get into it. The foundation of any multi-tenant WiFi architecture is network segmentation — and the primary mechanism for achieving that segmentation is VLAN tagging, defined under IEEE 802.1Q. The concept is straightforward: you assign each tenant, or each traffic class, to a distinct virtual LAN. Traffic on VLAN 10 cannot reach traffic on VLAN 20 unless you explicitly permit it through a routing or firewall policy. That logical isolation is your first line of defence. But here's where architects often make their first mistake: they conflate VLAN segmentation with security. VLANs provide isolation, not security. You still need firewall policies between VLANs, you still need access control lists, and you still need to think carefully about what inter-VLAN routing you permit. A misconfigured trunk port can collapse your entire segmentation model in seconds. Now, let's talk about the physical layer. In an MDU environment, you typically have a shared physical infrastructure — cabling, switch fabric, and access points — serving multiple tenants. The access points themselves broadcast multiple SSIDs, each mapped to a different VLAN. So Tenant A connects to their SSID, their traffic is tagged with VLAN 10 at the AP, traverses the shared switch fabric on a trunk port, and arrives at the distribution layer where it's routed into Tenant A's isolated subnet. Tenant B's traffic follows the same physical path but is completely isolated at layer 2. This is where your choice of access point platform matters enormously. You need APs that support multiple SSID-to-VLAN mappings, that can handle the radio frequency management across potentially dozens of units in close proximity, and that integrate with a centralised controller or cloud management platform. The controller is critical — it's what gives you the ability to push policy changes, monitor per-tenant throughput, and respond to incidents without touching individual APs. On the authentication side, the current standard for enterprise-grade multi-tenant deployments is IEEE 802.1X with RADIUS authentication. Each tenant authenticates against their own RADIUS server, or against a shared RADIUS infrastructure with per-tenant policy enforcement. WPA3-Enterprise is now the recommended encryption standard — it provides 192-bit security mode for high-sensitivity environments and eliminates the vulnerabilities associated with WPA2's four-way handshake. For guest WiFi segments — and in an MDU context, you'll almost always have at least one — you're typically looking at a captive portal model. The guest connects to an open or WPA2-Personal SSID, gets redirected to a splash page for authentication or terms acceptance, and is then granted internet-only access on an isolated VLAN. Critically, that guest VLAN must have no route to any tenant VLAN. Zero. That's non-negotiable from both a security and a GDPR perspective. Let's talk about the radio frequency environment for a moment, because this is where MDU deployments get genuinely complex. When you have multiple tenants in adjacent units — think a hotel corridor with rooms on both sides, or a retail mall with shops sharing walls — you have a high-density RF environment. Co-channel interference is your enemy. You need a proper RF planning exercise before deployment: a site survey that maps signal propagation, identifies interference sources, and informs your channel allocation strategy. The 2.4 GHz band gives you three non-overlapping channels in most regulatory domains — channels 1, 6, and 11. The 5 GHz band gives you significantly more, which is why modern deployments push clients to 5 GHz wherever possible. Wi-Fi 6 and Wi-Fi 6E extend this further into the 6 GHz band, giving you a clean spectrum largely free from legacy device interference. For new MDU deployments in 2025 and beyond, specifying Wi-Fi 6E capable APs is the right call — the additional spectrum headroom pays dividends in dense environments. One architecture pattern that's gaining significant traction in large MDU deployments is the use of a Software-Defined Networking overlay — specifically SD-WAN or SD-LAN approaches where tenant policies are defined centrally and pushed to the edge. This decouples the policy layer from the physical infrastructure, which means you can onboard a new tenant, modify their bandwidth allocation, or revoke their access without touching a single switch command line. For venue operators managing dozens or hundreds of tenants, that operational efficiency is transformative. IoT is the other dimension you cannot ignore. In a modern MDU — whether that's a hotel, a retail complex, or a residential block — you have building management systems, HVAC controllers, smart lighting, access control, CCTV, and a growing range of other connected devices. These must be on their own isolated VLAN, completely separated from both tenant traffic and guest traffic. IoT devices are notoriously difficult to patch and represent a significant attack surface. Segment them, monitor them, and apply strict egress filtering so they can only communicate with their designated management platforms. Right, let's get practical. Here's how I'd approach a greenfield MDU deployment. Start with your logical design before you touch a single piece of hardware. Map out your tenant count, your traffic classes — management, corporate, guest, IoT, payment — and assign VLANs accordingly. Document your IP addressing scheme. Define your inter-VLAN routing policy: what can talk to what, and what is absolutely prohibited. Then do your RF planning. Commission a proper site survey. Don't rely on vendor coverage maps — they're optimistic at best. You need actual signal measurements in the physical space, accounting for wall materials, floor construction, and the RF environment from neighbouring buildings. When you're specifying hardware, prioritise platforms that support centralised cloud management. The operational overhead of managing a distributed AP estate without a controller is unsustainable at scale. Look for platforms that give you per-SSID bandwidth policies, per-tenant reporting, and integration with your RADIUS infrastructure. On the pitfalls: the most common failure mode I see is insufficient trunk port configuration. Architects design a beautiful VLAN scheme and then forget to explicitly permit the relevant VLANs on every trunk link in the path. Traffic silently drops, tenants complain, and the support team spends days tracing the issue. Document your trunk configurations meticulously and validate them during commissioning. The second pitfall is SSID proliferation. Every SSID you broadcast consumes airtime for beacon frames. In a dense environment, broadcasting eight or ten SSIDs per AP degrades performance for everyone. Keep your SSID count to the minimum necessary — typically no more than four per radio. Use dynamic VLAN assignment via RADIUS attributes rather than separate SSIDs to serve multiple tenants from a single SSID. The third pitfall is neglecting the management plane. Your management VLAN — the one your APs, switches, and controllers communicate on — must be completely isolated from all tenant and guest VLANs. If a tenant can reach your management plane, you have a critical security vulnerability. Use out-of-band management where possible, and apply strict ACLs to management traffic. Now let me run through a few questions that come up consistently in these deployments. How many tenants can a single AP support? Practically speaking, most enterprise APs can handle 20 to 30 concurrent active clients per radio before performance degrades. In a dense MDU, plan for one AP per 15 to 20 active devices, not per physical unit. Do I need a separate AP per tenant? No — that's the whole point of VLAN-based multi-tenancy. Multiple tenants share the same AP, with traffic isolation enforced at the network layer. What's the right bandwidth allocation per tenant? There's no universal answer, but a common starting point is 10 to 25 megabits per second guaranteed with burst capability up to the available uplink capacity. Use QoS policies to enforce this and prevent any single tenant from saturating the shared uplink. How do I handle a tenant who needs their own firewall? Provide them with a dedicated VLAN and a routed handoff point. They connect their own CPE or firewall to that handoff, and everything behind it is their responsibility. To bring this together: a well-designed multi-tenant WiFi architecture for an MDU is built on four pillars. First, rigorous VLAN segmentation with enforced firewall policies between segments. Second, centralised controller-based management that gives you operational visibility and policy control at scale. Third, a proper RF planning exercise that accounts for the physical environment and the density of the deployment. And fourth, a security model that addresses authentication, encryption, IoT isolation, and compliance requirements from day one. The organisations that get this right see measurable outcomes: reduced support overhead, faster tenant onboarding, demonstrable compliance posture for audits, and the ability to monetise connectivity as a service rather than treating it as a cost centre. If you're planning an MDU deployment and want to explore how Purple's platform can provide the analytics, guest WiFi management, and tenant-level reporting layer on top of your network infrastructure, the resources linked in the guide are a good starting point. Thanks for listening. Until next time.

header_image.png

Resumo Executivo

Para CTOs e Arquitetos Líderes que gerenciam Unidades Multi-Residenciais (MDUs) — sejam complexos de hospitalidade expansivos, ambientes de varejo de uso misto ou habitação do setor público — o desafio é consistente: fornecer conectividade segura e de alto desempenho para locatários independentes em uma infraestrutura física compartilhada. Projetos de rede tradicionais de locatário único colapsam sob o peso dos requisitos de MDU, levando a vulnerabilidades de segurança, saturação de domínio de broadcast e sobrecarga de suporte incontrolável.

Projetar uma arquitetura WiFi multi-tenant exige uma mudança do isolamento físico para a segmentação lógica. Este guia de referência descreve o projeto arquitetônico definitivo para implantações de MDU. Examinaremos a implementação da marcação IEEE 802.1Q VLAN para isolamento rigoroso de tráfego, a necessidade de autenticação 802.1X RADIUS para controle de acesso e o papel crítico dos controladores de nuvem centralizados na manutenção da visibilidade operacional. Ao adotar esses princípios neutros em relação ao fornecedor, os operadores de locais podem mitigar riscos de conformidade (como PCI DSS e GDPR), reduzir despesas operacionais e transformar a conectividade de um centro de custo em uma camada de serviço monetizável.

Análise Técnica Aprofundada

A Base: Segmentação Lógica via VLANs

A pedra angular de qualquer arquitetura multi-tenant é a segmentação rigorosa da rede. Em um ambiente físico compartilhado, implantar switches e cabeamento separados para cada locatário é comercialmente inviável. Em vez disso, o isolamento é alcançado na Camada 2 usando Redes Locais Virtuais (VLANs) IEEE 802.1Q.

Neste modelo, um único ponto de acesso (AP) transmite múltiplos Service Set Identifiers (SSIDs), ou utiliza atribuição dinâmica de VLAN via RADIUS, para atender a diferentes perfis de locatários. Quando um cliente se associa à rede, seu tráfego é marcado com um ID de VLAN específico na borda do AP. Esta marcação persiste à medida que o quadro atravessa os links de tronco na malha de switch compartilhada, garantindo que o Locatário A (por exemplo, VLAN 10) permaneça totalmente isolado do Locatário B (por exemplo, VLAN 20) na camada de enlace de dados.

No entanto, as VLANs fornecem isolamento, não segurança inerente. Para evitar o movimento lateral entre redes de locatários, o roteamento inter-VLAN deve ser estritamente controlado por meio de políticas de firewall na camada de distribuição ou núcleo. Uma abordagem Zero Trust dita que o tráfego entre VLANs de locatários é implicitamente negado, a menos que explicitamente permitido para serviços específicos e necessários.

vlan_segmentation_diagram.png

Padrões de Autenticação e Criptografia

Para ambientes multi-tenant de nível empresarial, as Chaves Pré-Compartilhadas (PSKs) são inadequadas. Elas são facilmente compartilhadas, difíceis de rotacionar sem impactar todos os usuários e não oferecem responsabilidade individual. O padrão arquitetônico é IEEE 802.1X com autenticação RADIUS.

Sob o 802.1X, cada usuário ou dispositivo se autentica individualmente usando credenciais únicas ou certificados digitais. O servidor RADIUS não apenas valida a identidade, mas também pode passar atributos específicos do fornecedor (VSAs) de volta ao autenticador (o AP ou switch), atribuindo dinamicamente o usuário à sua VLAN designada, independentemente do SSID ao qual ele se conectou. Isso reduz significativamente a proliferação de SSID, o que é crítico para manter a eficiência do tempo de antena.

Para criptografia, WPA3-Enterprise é o mandato atual. Ele fornece suítes de segurança robustas de 192 bits para ambientes altamente sensíveis e mitiga os ataques de dicionário offline que assolaram o WPA2.

Isolamento de Convidados e IoT

Além do tráfego corporativo ou de locatários, as arquiteturas de MDU devem considerar dois perfis de tráfego distintos: Convidados e dispositivos de Internet das Coisas (IoT).

  1. Redes de Convidados: Os convidados exigem acesso à internet sem atrito, mas devem ser totalmente segregados dos dados dos locatários. Isso é tipicamente tratado via um captive portal. Para insights detalhados sobre como gerenciar esta camada e aproveitá-la para inteligência de negócios, consulte nossa visão geral abrangente de Guest WiFi e os recursos de WiFi Analytics associados.
  2. Dispositivos IoT: MDUs modernos são fortemente instrumentados com termostatos inteligentes, câmeras IP e sistemas de gerenciamento de edifícios. Esses dispositivos são frequentemente sem cabeça (headless), difíceis de corrigir e representam uma superfície de ataque significativa. Eles devem ser isolados em VLANs IoT dedicadas com filtragem de saída rigorosa, permitindo a comunicação apenas com servidores de gerenciamento específicos.

Guia de Implementação

A implantação desta arquitetura requer uma abordagem metódica, passando do design lógico para a validação física.

Fase 1: Design de Rede Lógica

Comece definindo o esquema de endereçamento IP e o mapeamento de VLAN. Uma abordagem estruturada evita sub-redes sobrepostas e simplifica o roteamento.

  • VLAN de Gerenciamento (por exemplo, VLAN 1): Estritamente para infraestrutura de rede (APs, switches). Sem acesso de usuário.
  • VLANs de Locatários (por exemplo, VLANs 100-199): Sub-redes dedicadas para locatários individuais ou unidades de negócios.
  • VLAN de Convidado (por exemplo, VLAN 200): Acesso apenas à internet, fortemente restrito.
  • VLAN de IoT/Instalações (por exemplo, VLAN 300): Para sistemas de gerenciamento de edifícios.

Fase 2: Planejamento de RF e Pesquisa de Local

Em ambientes de alta densidade como Hospitalidade ou Varejo , a Interferência de Co-Canal (CCI) é a principal causa de baixo desempenho. Uma pesquisa preditiva é insuficiente; uma pesquisa de RF ativa e no local é obrigatória para contabilizar a atenuação da parede e a interferência vizinha.

Fase 3: Configuração da Infraestrutura

  1. Switch Fabric: Configure as portas trunk meticulosamente. Garanta que apenas as VLANs necessárias sejam permitidas nos uplinks entre os switches de acesso e o core.
  2. Access Points: Implante APs capazes de suportar múltiplos BSSIDs e integrar-se com um controlador em nuvem. Limite o número de SSIDs transmitidos a um máximo de 3-4 por rádio para preservar o tempo de transmissão.
  3. Políticas do Controlador: Defina limites de largura de banda por locatário ou por usuário para evitar que um único cliente agressivo sature o uplink WAN compartilhado.

architecture_overview.png

Melhores Práticas

  • Gerenciamento Centralizado na Nuvem: O custo operacional de gerenciar um ambiente MDU distribuído sem um painel único é insustentável. Um controlador em nuvem permite provisionamento zero-touch, gerenciamento de firmware e aplicação centralizada de políticas.
  • Atribuição Dinâmica de VLAN: Em vez de transmitir "Tenant_A_WiFi", "Tenant_B_WiFi", etc., transmita um único SSID "MDU_Secure" e use 802.1X/RADIUS para direcionar dinamicamente os usuários autenticados para a VLAN correta. Isso reduz drasticamente a sobrecarga de beacons.
  • Serviços Baseados em Localização: Aproveite o BLE (Bluetooth Low Energy) integrado em APs modernos para rastreamento de ativos ou orientação. Para saber mais, leia BLE Low Energy Explicado para Empresas .
  • Otimize para o Ambiente: O layout físico de um espaço de escritório MDU requer ajustes específicos. Consulte Wi-Fi para Escritório: Otimize Sua Rede Wi-Fi Moderna de Escritório para ajustes específicos do ambiente.

Solução de Problemas e Mitigação de Riscos

Modos de Falha Comuns

  1. Má Configuração da Porta Trunk: A causa mais frequente de "conectado, sem internet" em configurações multi-tenant. Se uma VLAN estiver faltando em um link trunk entre o AP e o gateway, as solicitações DHCP falharão.
    • Mitigação: Implemente auditoria de configuração automatizada e documente rigorosamente a topologia da spanning tree.
  2. Sobrecarga de SSID: Transmitir 10 SSIDs em um único AP significa que o rádio gasta uma porcentagem significativa de seu tempo apenas transmitindo frames de beacon, deixando pouco tempo de transmissão para dados reais.
    • Mitigação: Consolide os SSIDs e use a atribuição dinâmica de VLAN.
  3. Exposição do Plano de Gerenciamento: Se um locatário puder fazer ping ou acessar a interface de gerenciamento de um AP ou switch, a rede estará fundamentalmente comprometida.
    • Mitigação: Use uma VLAN de gerenciamento dedicada e fora de banda e aplique Listas de Controle de Acesso (ACLs) rigorosas, bloqueando todo o tráfego RFC 1918 das sub-redes dos locatários para a sub-rede de gerenciamento.

ROI e Impacto nos Negócios

A transição para uma arquitetura multi-tenant robusta transforma a rede de um mal necessário em um ativo estratégico.

  • OpEx Reduzido: O gerenciamento centralizado e a segmentação lógica reduzem a necessidade de deslocamentos técnicos. As equipes de suporte podem diagnosticar problemas remotamente, identificando se uma falha reside na infraestrutura compartilhada ou na configuração específica do locatário.
  • Conformidade e Redução de Riscos: Ao isolar dados da Indústria de Cartões de Pagamento (PCI) (por exemplo, em unidades de varejo) ou dados sensíveis de pacientes (por exemplo, em instalações de Saúde localizadas em edifícios de uso misto), o escopo das auditorias de conformidade é drasticamente reduzido, economizando taxas significativas de consultoria.
  • Monetização: Com uma arquitetura estável e segmentada, os operadores de locais podem oferecer pacotes de largura de banda em camadas aos locatários, gerando receita recorrente. Além disso, a rede de convidados pode ser aproveitada para captura de dados e marketing, transformando o fluxo de pessoas em inteligência acionável.

Ouça nosso podcast de briefing técnico abaixo para uma discussão aprofundada sobre esses princípios arquitetônicos:

Definições principais

VLAN (Virtual Local Area Network)

A logical grouping of network devices that appear to be on the same local LAN, regardless of their physical location.

Used in MDUs to logically separate traffic from different tenants sharing the same physical switches and APs, reducing broadcast traffic and improving performance.

IEEE 802.1Q

The networking standard that supports VLANs on an Ethernet network by inserting a 32-bit tag into the Ethernet frame.

This is the underlying protocol that allows a single trunk cable to carry traffic for multiple isolated tenant networks.

IEEE 802.1X

An IEEE standard for port-based network access control (PNAC), providing an authentication mechanism to devices wishing to attach to a LAN or WLAN.

Essential for enterprise MDU deployments, it allows individual user authentication (via RADIUS) rather than relying on a shared password, enabling dynamic VLAN assignment.

RADIUS (Remote Authentication Dial-In User Service)

A networking protocol that provides centralised Authentication, Authorization, and Accounting (AAA) management for users who connect and use a network service.

The server component in an 802.1X deployment that verifies credentials and tells the AP which VLAN to assign the tenant device to.

Trunk Port

A network switch port configured to carry traffic for multiple VLANs simultaneously, using 802.1Q tags to keep the traffic separated.

The critical link between access switches and the core network. Misconfiguring a trunk port is the most common cause of tenant connectivity failure.

Co-Channel Interference (CCI)

Interference that occurs when two or more access points are transmitting on the exact same frequency channel within hearing distance of each other.

A major issue in dense MDUs (like hotels or apartment blocks) that causes devices to wait for the channel to clear, drastically reducing network throughput.

Dynamic VLAN Assignment

The process where a RADIUS server instructs the network access device (AP or switch) to place an authenticated user into a specific VLAN based on their identity.

Allows venue operators to broadcast a single secure SSID for all tenants, assigning them to their isolated networks post-authentication, thereby saving RF airtime.

Captive Portal

A web page that the user of a public-access network is obliged to view and interact with before access is granted.

Used on the Guest VLAN in an MDU to enforce terms of service, collect marketing data, or process payments before granting internet access.

Exemplos práticos

A mixed-use retail and office complex (MDU) needs to provide secure WiFi for 15 independent retail tenants, a shared corporate office space, and public guest WiFi. The venue operator wants to use a single physical network infrastructure to reduce costs but must ensure PCI DSS compliance for the retailers.

  1. Deploy enterprise-grade APs managed by a central cloud controller.
  2. Create a 'Management' VLAN (VLAN 10) strictly for network devices.
  3. Create a 'Guest' VLAN (VLAN 20) with client isolation enabled and a captive portal. Route this traffic directly to the internet, bypassing internal networks.
  4. For the office space, create a 'Corporate' VLAN (VLAN 30) using 802.1X authentication.
  5. For the retail tenants, implement Dynamic VLAN Assignment. Broadcast a single 'Retail_Secure' SSID using 802.1X. When a retail device authenticates via the central RADIUS server, the server passes a Vendor-Specific Attribute (VSA) that assigns the device to its specific tenant VLAN (e.g., VLANs 101-115).
  6. Configure the core firewall to block all inter-VLAN routing between the retail VLANs, ensuring strict isolation required for PCI DSS.
Comentário do examinador: This approach satisfies all requirements while minimising hardware costs. By using Dynamic VLAN Assignment instead of broadcasting 15 separate SSIDs for the retailers, the architect preserves vital RF airtime, preventing performance degradation. The strict firewall rules at the core ensure that the PCI-compliant retail networks are completely isolated from the less secure Guest and Corporate networks.

A 400-room hotel ([Hospitality](/industries/hospitality)) is upgrading its network. They need to support guest devices, staff tablets for housekeeping, and new IoT smart thermostats in every room. They currently experience frequent dropouts during peak evening hours.

  1. Conduct an active RF site survey to identify interference and plan AP placement (likely moving from hallway deployments to in-room or every-other-room deployments to handle density).
  2. Segment traffic logically: Guest (VLAN 100), Staff (VLAN 200), IoT (VLAN 300).
  3. Implement per-user bandwidth limiting on the Guest SSID (e.g., 10 Mbps down / 5 Mbps up) to prevent a few heavy users from saturating the WAN link during peak hours.
  4. For the IoT thermostats, use a dedicated hidden SSID with WPA3-Personal (if supported) or MAC Authentication Bypass (MAB) if they lack advanced supplicants. Apply strict egress filtering on VLAN 300 so thermostats can only communicate with the specific cloud management server.
Comentário do examinador: This solution addresses both the capacity issue and the security requirements. Moving APs into rooms reduces Co-Channel Interference (CCI) common in hallway deployments. Bandwidth shaping ensures fair access during peak times. Crucially, isolating the IoT devices mitigates the risk of a compromised thermostat being used as a pivot point to attack the staff or guest networks.

Questões práticas

Q1. You are designing the WiFi architecture for a new 50-unit premium apartment complex. The developer wants to offer 'Included Gigabit WiFi' as a selling point. They propose installing a standard consumer-grade wireless router in the telecom closet of each apartment, all wired back to a central unmanaged switch. What are the primary architectural flaws with this proposal, and what is the enterprise alternative?

Dica: Consider RF interference, management overhead, and broadcast domain size.

Ver resposta modelo

The proposed design has severe flaws. 1) RF Interference: 50 independent consumer routers will cause massive Co-Channel Interference (CCI), severely degrading performance. 2) Management: There is no central visibility; troubleshooting requires accessing 50 individual routers. 3) Security: An unmanaged switch means all apartments share a single broadcast domain, allowing tenants to potentially intercept each other's traffic.

The enterprise alternative is to deploy centrally managed, enterprise-grade APs (e.g., Wi-Fi 6/6E) in the apartments, connected to managed PoE switches. Implement 802.1X authentication with Dynamic VLAN Assignment so each tenant is logically isolated on their own VLAN, regardless of which AP they connect to. This provides central visibility, RF coordination, and strict security isolation.

Q2. During the commissioning phase of a multi-tenant office building, Tenant A (on VLAN 10) reports they cannot access the internet. You verify that the AP is broadcasting the SSID, the client connects successfully, and 802.1X authentication passes. However, the client device is assigning itself an APIPA address (169.254.x.x). What is the most likely configuration error in the infrastructure?

Dica: Follow the path of the DHCP request from the AP to the DHCP server.

Ver resposta modelo

The most likely issue is a misconfigured trunk port between the Access Point and the Access Switch, or between the Access Switch and the Core/Distribution switch. Because the client receives an APIPA address, the DHCP Discover broadcast is not reaching the DHCP server. If authentication passes, the RADIUS server is correctly assigning VLAN 10, but if VLAN 10 is not explicitly permitted on the 802.1Q trunk links along the path, the traffic is dropped at the switch port. The engineer must verify the 'switchport trunk allowed vlan' configuration on all uplinks.

Q3. A stadium ([Transport](/industries/transport) hub / event space) requires a multi-tenant network for operations staff, ticketing vendors, and public guest WiFi. To save time, the junior engineer suggests creating three SSIDs using WPA2-PSK, with a different password for each group. Why is this unacceptable for the ticketing vendors, and what must be implemented instead?

Dica: Consider compliance requirements for processing payments.

Ver resposta modelo

Using WPA2-PSK is unacceptable for ticketing vendors because they process payments, making them subject to PCI DSS (Payment Card Industry Data Security Standard) compliance. PSKs offer weak security, are easily shared, and do not provide individual user accountability. Furthermore, a shared PSK network does not inherently prevent devices from communicating with each other (client isolation).

Instead, the architecture must implement 802.1X with RADIUS authentication (preferably using WPA3-Enterprise) to provide individual, auditable access. The ticketing vendors must be placed on a dedicated, strictly isolated VLAN, with core firewall rules explicitly denying any routing between the ticketing VLAN and the guest or operations VLANs.