Professional Documents
Culture Documents
Audience
This documentation is intended for:
• Network planners.
• Field technical support and servicing engineers.
• Network administrators working with the H3C access controllers.
Conventions
The following information describes the conventions used in the documentation.
Command conventions
Convention Description
Boldface Bold text represents commands and keywords that you enter literally as shown.
Italic Italic text represents arguments that you replace with actual values.
[] Square brackets enclose syntax choices (keywords or arguments) that are optional.
Braces enclose a set of required syntax choices separated by vertical bars, from which
{ x | y | ... }
you select one.
Square brackets enclose a set of optional syntax choices separated by vertical bars,
[ x | y | ... ]
from which you select one or none.
Asterisk marked braces enclose a set of required syntax choices separated by vertical
{ x | y | ... } *
bars, from which you select a minimum of one.
Asterisk marked square brackets enclose optional syntax choices separated by vertical
[ x | y | ... ] *
bars, from which you select one choice, multiple choices, or none.
The argument or keyword and argument combination before the ampersand (&) sign
&<1-n>
can be entered 1 to n times.
# A line that starts with a pound (#) sign is comments.
GUI conventions
Convention Description
Window names, button names, field names, and menu items are in Boldface. For
Boldface
example, the New User window opens; click OK.
Convention Description
Multi-level menus are separated by angle brackets. For example, File > Create >
>
Folder.
Symbols
Convention Description
An alert that calls attention to important information that if not understood or followed
WARNING! can result in personal injury.
An alert that calls attention to important information that if not understood or followed
CAUTION: can result in data loss, data corruption, or damage to hardware or software.
Convention Description
Represents omnidirectional signals.
Documentation feedback
You can e-mail your comments about product documentation to info@h3c.com.
We appreciate your comments.
Contents
Configuring WLAN access ·································································1
About WLAN access ··················································································································· 1
WLAN access process ········································································································· 1
Scanning ··························································································································· 1
Association ························································································································ 3
Client access control··················································································································· 3
AP group-based access control ······························································································ 3
SSID-based access control ··································································································· 4
Whitelist- and blacklist-based access control ············································································· 5
ACL-based access control ····································································································· 5
Guest tunnel ····························································································································· 6
About guest tunnel··············································································································· 6
Guest tunnel establishment ··································································································· 6
Restrictions and guidelines: WLAN access configuration ···································································· 6
WLAN access tasks at a glance ···································································································· 7
Configuring region code settings ··································································································· 8
Specifying a region code ······································································································· 8
Including or excluding region codes in beacon frames and probe responses ···································· 9
Configuring wireless services ······································································································· 9
Configuring a service template ······························································································· 9
Configuring a description for a service template ······································································· 10
Setting an SSID ················································································································ 10
Setting the maximum number of associated clients for a service template ····································· 10
Enabling a service template ································································································· 11
Binding a service template to a radio ····················································································· 11
Configuring an AP to not inherit the specified service template from the AP group ··························· 12
Configuring client data forwarding································································································ 12
Specifying the client traffic forwarder ····················································································· 12
Enabling client traffic forwarding ··························································································· 13
Setting the encapsulation format for client data frames ······························································ 14
Specifying the method for APs to process traffic from unknown clients ·········································· 14
Configuring client management ··································································································· 15
Enabling client association at the AC or APs ··········································································· 15
Enabling quick association ·································································································· 15
Specifying the Web server to which client information is reported ················································ 16
Enabling generation of client logs in the specified format ··························································· 16
Setting the VLAN allocation method for clients ········································································· 17
Configuring clients to prefer the authorization VLAN after roaming ··············································· 17
Enabling immediate client association upon successful local authentication ··································· 18
Setting the aging timer for the cache of clients ········································································· 18
Setting the idle period before client reauthentication ································································· 18
Configuring differentiated accounting of client traffic·································································· 19
Enabling roaming enhancement ··························································································· 20
Configuring client maintenance ··································································································· 21
Setting the client idle timeout ······························································································· 21
Configuring client keepalive ································································································· 22
Performing a wireless link quality test ···················································································· 22
Configuring client statistics reporting······················································································ 22
Setting the NAS ID ············································································································ 23
Setting the NAS port type ···································································································· 24
Configuring client association ratio optimization ······································································· 24
Specifying an IMC server ···································································································· 25
Configuring VIP clients ·············································································································· 25
Configuring the VIP client group ··························································································· 25
Configuring non-VIP client rate limit ······················································································· 25
Configuring policy-based forwarding ···························································································· 26
Hardware compatibility with policy-based forwarding ································································· 26
i
Restrictions and guidelines for policy-based forwarding ····························································· 27
Prerequisites for policy-based forwarding ··············································································· 27
Configuring a forwarding policy ···························································································· 27
Enabling traffic forwarding to the external network in local forwarding mode ··································· 28
Applying a forwarding policy to a service template ···································································· 28
Applying a forwarding policy to a user profile ··········································································· 29
Configuring guest tunnels ·········································································································· 29
Hardware compatibility with guest tunnels··············································································· 29
Specifying an aggregation AC for an edge AC ········································································· 30
Specifying an edge AC for an aggregation AC ········································································· 31
Enabling guest tunnel flow distribution ··················································································· 32
Configuring client access control ································································································· 32
Specifying a permitted AP group for client association ······························································· 32
Specifying a permitted SSID for client association ···································································· 32
Adding a client to the whitelist ······························································································ 33
Adding a client to the static blacklist ······················································································ 33
Configuring the dynamic blacklist ·························································································· 33
Configuring ACL-based access control··················································································· 34
Disabling an AP from responding to broadcast probe requests ·························································· 34
Enabling SNMP notifications for WLAN access ·············································································· 35
Enabling smart client access ······································································································ 35
Display and maintenance commands for WLAN access ··································································· 36
WLAN access configuration examples ·························································································· 37
Example: Configuring WLAN access ····················································································· 37
Example: Configuring whitelist-based access control ································································ 39
Example: Configuring static blacklist-based access control ························································· 40
Example: Configuring ACL-based access control ····································································· 40
Example: Configuring guest tunnels ······················································································ 41
Example: Configuring IPsec guest tunnels ·············································································· 43
Example: Configuring IPsec guest tunnels over NAT ································································· 47
ii
Configuring WLAN access
About WLAN access
Wireless access is provided by APs deployed at the edge of a wired network. The APs connect to the
uplink through wired connections and provide wireless access services to downlink clients.
Scanning
Active scanning
A wireless client periodically scans surrounding wireless networks by sending probe requests. It
obtains network information from received probe responses. Based on whether a probe request
carries an SSID, active scanning can be divided into the following types:
• Active scanning of all wireless networks.
As shown in Figure 2, the client periodically sends a probe request on each of its supported
channels to scan wireless networks. APs that receive the probe request send a probe response
that carries the available wireless network information. The client associates with the optimal
AP.
1
Figure 2 Scanning all wireless networks
ID)
n SS
ta AP 1
ou
i th
t (w
u es
req ns
e
be po
Pr o es
er
ob
Pr
Pr
ob
Client er
eq
ue
st
(w
i th
Pro ou
ta
be nS
res SID
po )
ns
e AP 2
Passive scanning
As shown in Figure 4, the clients periodically listen for beacon frames sent by APs on their supported
channels to get information about surrounding wireless networks. Then the clients select an AP for
association. Passive scanning is used when clients want to save power.
2
Figure 4 Passive scanning
Client
on
ac
Be
AP
Be
a co
n
Client
Association
A client sends an association request to the associated AP after passing date link layer
authentication. Upon receiving the request, the AP determines the capability supported by the
wireless client and sends an association response to the client. Then the client is associated with the
AP.
3
Figure 5 AP group-based access control
AP 1 Client 1
IP network
AC AP 2 Client 2
AP group 1
RADIUS server
AP 3 Client 3
AP group 2
4
Whitelist- and blacklist-based access control
You can configure the whitelist or blacklists to filter frames from clients for client access control.
Whitelist-based access control
The whitelist contains the MAC addresses of all clients allowed to access the WLAN. Frames from
clients not in the whitelist are discarded. This list is manually configured.
Blacklist-based access control
The following blacklists are available for access control:
• Static blacklist—Contains the MAC addresses of clients forbidden to access the WLAN. This
list is manually configured.
• Dynamic blacklist—Contains the MAC addresses of clients forbidden to access the WLAN.
An AP adds the MAC address of a client forbidden to access the WLAN to the list when WIPS is
configured or when URL redirection is enabled for WLAN MAC authentication clients. The
entries in the list are removed when the aging time expires. The dynamic blacklist can take
effect on the AC or on APs, depending on the configuration. For more information about WIPS,
see WLAN Security Configuration Guide. For more information about WLAN MAC
authentication, see User Access and Authentication Configuration Guide.
Working mechanism
When an AP receives an association request and sends an Add Mobile message to the AC, the AC
performs the following operations to determine whether to permit the client:
1. Searches the whitelist:
{ If the client MAC address does not match any entry in the whitelist, the client is rejected.
{ If a match is found, the client is permitted.
2. Searches the static and dynamic blacklists if no whitelist entries exist:
{ If the client MAC address matches an entry in either blacklist, the client is rejected.
{ If no match is found, or no blacklist entries exist, the client is permitted.
Figure 7 Whitelist- and blacklist-based access control
5
• Allows the client to access the WLAN if a match is found and the rule action is permit.
• Denies the client's access to the WLAN if no match is found or the matched rule has a deny
statement.
Guest tunnel
About guest tunnel
The guest tunnel feature enables the AC to forward guest traffic destined for the external network to
an AC in the external network through an isolated tunnel to secure the internal network.
As shown in Figure 8, guest tunnels are established between an edge AC in the internal network for
user access and authentication and aggregation ACs in an external network for data processing.
Guests can access the internal network only from specific guest VLANs, and the guest traffic is
forwarded to the aggregation ACs in the same VLAN as the guests.
Guest tunnel also supports IPsec for tunnel encryption and NAT traversal for tunnel establishment
over NAT.
Figure 8 Guest tunnel working mechanism
6
For an AP, the settings made in these views for the same parameter take effect in descending order
of AP view, AP group view, and global configuration view.
7
{ Configuring the VIP client group
{ Configuring non-VIP client rate limit
7. (Optional.) Configuring policy-based forwarding
8. (Optional.) Configuring guest tunnels
9. (Optional.) Configuring client access control
{ Specifying a permitted AP group for client association
{ Specifying a permitted SSID for client association
{ Adding a client to the whitelist
{ Adding a client to the static blacklist
{ Configuring the dynamic blacklist
{ Configuring ACL-based access control
10. (Optional.) Disabling an AP from responding to broadcast probe requests
11. (Optional.) Enabling SNMP notifications for WLAN access
8
{ In AP group view, the AP uses the configuration in global configuration view.
{ In global configuration view, no region code is specified.
{ In AP provision view, an AP uses the configuration in AP group provision view.
{ In AP group provision view, no region code is specified.
4. (Optional.) Lock the region code.
region-code-lock enable
By default:
{ In AP view, an AP uses the configuration in AP group view. If no region code exists in AP
group view, the AP uses the configuration in global configuration view.
{ In AP group view, an AP uses the configuration in global configuration view.
{ In global configuration view, the region code is not locked.
9
vlan vlan-id
By default, clients are assigned VLAN 1 after coming online through a service template.
Setting an SSID
About this task
APs advertise SSIDs in beacon frames. If the number of clients in a BSS exceeds the limit or the
BSS is unavailable, you can enable SSID-hidden to prevent clients from discovering the BSS. When
SSID-hidden is enabled, the BSS hides its SSID in beacon frames and does not respond to
broadcast probe requests. A client must send probe requests with the specified SSID to access the
WLAN. This feature can protect the WLAN from being attacked.
Procedure
1. Enter system view.
system-view
2. Enter service template view.
wlan service-template service-template-name
3. Set an SSID for the service template.
ssid ssid-name
By default, no SSID is set for a service template.
4. (Optional.) Enable SSID-hidden in beacon frames.
beacon ssid-hide
By default, beacon frames carry SSIDs.
10
3. Set the maximum number of associated clients for the service template.
client max-count max-number
By default, the number of associated clients for a service template is not limited.
11
For the hardware compatibility with the vlan-id2 argument, see the command reference for
the device.
12
Enabling client traffic forwarding
About this task
In an AC hierarchical network, disable this feature on the central AC and enable this feature on local
ACs if the client traffic forwarder is AC. This guarantees central AC's management performance in
case a local AC is down.
For more information about AC hierarchy, see WLAN Advanced Features Configuration Guide.
Hardware and feature compatibility
13
Hardware series Model Product code Feature compatibility
WX1804H EWP-WX1804H-PWR
WX1810H EWP-WX1810H-PWR
WX1800H series Yes
WX1820H EWP-WX1820H
WX1840H EWP-WX1840H-GL
WX3820H EWP-WX3820H-GL
WX3800H series Yes
WX3840H EWP-WX3840H-GL
WX5800H series WX5860H EWP-WX5860H-GL Yes
14
2. Enter service template view.
wlan service-template service-template-name
3. Specify the method for APs to process traffic from unknown clients.
unknown-client [ deauthenticate | drop ]
By default, APs drop packets from unknown clients and deauthenticate these clients.
15
Specifying the Web server to which client information is
reported
About this task
Perform this task to enable the device to report client information, such as client MAC address,
associated AP, and association time, to the specified Web server through HTTP. The Web server
accepts client information only when the server's host name, port number, and path are specified.
Procedure
1. Enter system view.
system-view
2. Specify the host name and port number of the Web server.
wlan web-server host host-name port port-number
By default, the host name and port number of the Web server are not specified.
3. Specify the path of the Web server.
wlan web-server api-path path
By default, the path of the Web server is not specified.
4. (Optional.) Set the maximum number of client entries that can be reported at a time.
wlan web-server max-client-entry number
By default, a maximum of ten client entries can be reported at a time.
16
Setting the VLAN allocation method for clients
About this task
When a client comes online for the first time, the associated AP assigns a random VLAN to it. When
the client comes online again, the VLAN assigned to the client depends on the allocation method.
• Static allocation—The client inherits the VLAN that has been assigned to it. If the IP address
lease has not expired, the client will use the same IP address. This method helps save IP
addresses.
• Dynamic allocation—The AP re-assigns a VLAN to the client. This method balances clients in
all VLANs.
• Compatible static allocation—The client inherits the VLAN that has been assigned to it when
roaming between Comware 5 and Comware 7 ACs.
Restrictions and guidelines
After a client goes offline and comes online again, its VLAN might change in the following situations:
• In static or compatible static allocation mode, the AP will assign a new VLAN to the client if its
original VLAN has been removed from the VLAN group.
• If you change the VLAN allocation method from dynamic to static or compatible static, the AP
might assign the clients a different VLAN after they come online again.
Procedure
1. Enter system view.
system-view
2. Enter service template view.
wlan service-template service-template-name
3. Set the VLAN allocation method for clients.
client vlan-alloc { dynamic | static | static-compatible }
By default, the VLAN allocation method for clients is dynamic.
For the hardware compatibility with the static-compatible keyword, see the command
reference for the device.
17
3. Configure clients to prefer the authorization VLAN after roaming.
client preferred-vlan authorized
By default, clients prefer the authorization VLAN after roaming.
18
Clients passing Web authentication are logged off and must perform MAC reauthentication to come
online. However, MAC reauthentication fails if the IP addresses assigned to the clients have not
expired.
Perform this task to add these clients to the dynamic blacklist for the specified idle period after they
pass Web authentication to reduce reauthentication failures.
Procedure
1. Enter system view.
system-view
2. Set the idle period before client reauthentication.
wlan client reauthentication-period [ period-value ]
By default, the idle period is 10 seconds.
19
Enabling roaming enhancement
About this task
As shown in Figure 9, in an Automated Guided Vehicle (AGV) system, client-mode fat APs deployed
on the vehicles provide wireless access to onboard devices not equipped with a wireless NIC. In this
networking mode, each fat AP must scan the network for better links and transmit data at the same
time, which might cause packet loss.
To solve this issue, configure roaming enhancement for fit APs to add their channel, SSID, and
BSSID information to beacon frames and probe responses, helping fat APs to roam fast.
Figure 9 AGV system network diagram
20
• The 5G radio cannot operate in a radar channel. As a best practice, manually specify a
non-radar channel, enable auto channel selection, or configure the channel scanning whitelist
or blacklist for the 5G radio.
Procedure
1. Enter system view.
system-view
2. Enter AP view or an AP group's AP model view.
{ Enter AP view.
wlan ap ap-name
{ Execute the following commands in sequence to enter an AP group's AP model view:
wlan ap-group group-name
ap-model ap-model
3. Enter radio view.
radio radio-id
4. Enable roaming enhancement.
roam-enhance ssid ssid
By default:
{ In radio view, the configuration in an AP group's radio view is used.
{ In an AP group's radio view, roaming enhancement is disabled.
21
Configuring client keepalive
About this task
This feature enables an AP to send keepalive packets to clients at the specified interval to determine
whether the clients are online. If the AP does not receive any replies from a client within three
keepalive intervals, it logs off the client.
Procedure
1. Enter system view.
system-view
2. Enter AP view or AP group view.
{ Enter AP view.
wlan ap ap-name
{ Enter AP group view.
wlan ap-group group-name
3. Enable client keepalive.
client keep-alive enable
By default:
{ In AP view, an AP uses the configuration in AP group view.
{ In AP group view, client keepalive is disabled.
4. (Optional.) Set the client keepalive interval.
client keep-alive interval interval
By default:
{ In AP view, an AP uses the configuration in AP group view.
{ In AP group view, the client keepalive interval is 300 seconds.
22
Procedure
1. Enter system view.
system-view
2. Enter AP view or AP group view.
{ Enter AP view.
wlan ap ap-name
{ Enter AP group view.
wlan ap-group group-name
3. Configure client statistics reporting.
client-statistics-report { disable | enable [ interval interval ] }
By default:
{ In AP view, an AP uses the configuration in AP group view.
{ In AP group view, client statistics reporting is enabled.
23
{ In AP group view, an AP uses the configuration in global configuration view.
{ In global configuration view, no NAS ID is set.
5. Set the NAS port ID.
nas-port-id nas-port-id
By default:
{ In AP view, an AP uses the configuration in AP group view. If no NAS port ID is set in AP
group view, the AP uses the configuration in global configuration view.
{ In AP group view, an AP uses the configuration in global configuration view.
{ In global configuration view, no NAS port ID is set.
6. Set the NAS VLAN ID and enable the AC to encapsulate the VLAN ID in RADIUS requests.
nas-vlan vlan-id
By default, no NAS VLAN ID is set. Authentication requests sent to the RADIUS server do not
contain the NAS VLAN ID field.
This feature is supported only in AP view.
Set the NAS VLAN ID when a third-party Security Accounting Management (SAM) server is
used as the RADIUS server.
24
system-view
2. Enter global configuration view.
wlan association optimization value
By default, the index is 0. The device does not optimize client association ratios.
25
radio go offline, non-VIP clients are not rated limited. If a radio does not have associated VIP clients,
the non-VIP clients are not rate limited.
Restrictions and guidelines
You can rate limit both inbound and outbound traffic.
If you configure both radio-based client rate limit and non-VIP client rate limit, the rate of the non-VIP
clients takes the smaller value and the VIP clients are not rate limited.
Procedure
1. Enter system view.
system-view
2. Create the VIP client group and enter its view.
wlan vip-client-group
3. Configure non-VIP client rate limit.
non-vip limit rate { inbound | outbound } cir cir
By default, non-VIP client rate limit is configured.
26
Hardware series Model Product code Feature compatibility
WX5580H EWP-WX5580H
LSUM1WCME0 LSUM1WCME0
EWPXM1WCME0 EWPXM1WCME0
LSQM1WCMX20 LSQM1WCMX20
Access controller LSUM1WCMX20RT LSUM1WCMX20RT
Yes
modules LSQM1WCMX40 LSQM1WCMX40
LSUM1WCMX40RT LSUM1WCMX40RT
EWPXM2WCMD0F EWPXM2WCMD0F
EWPXM1MAC0F EWPXM1MAC0F
27
system-view
2. Create a forwarding policy and enter its view.
wlan forwarding-policy policy-name
3. Configure a forwarding rule.
classifier acl { acl-number | ipv6 ipv6-acl-number } behavior { local |
remote }
Repeat this command to configure more forwarding rules.
28
Applying a forwarding policy to a user profile
About this task
For the AC to perform policy-based forwarding for clients that use a user profile, apply a forwarding
policy to the user profile. After a client passes authentication, the authentication server sends the
user profile name specified for the client to the AC. The AC will forward traffic of the client based on
the forwarding policy applied to the user profile.
Restrictions and guidelines
If you modify or delete the applied forwarding policy, the change takes effect when the client comes
online again.
Procedure
1. Enter system view.
system-view
2. Enter user profile view.
user-profile profile-name
3. Apply a forwarding policy to the user profile.
wlan client forwarding-policy-name policy-name
By default, no forwarding policy is applied to a user profile.
For the forwarding policy applied to the user profile to take effect, you must enable policy-based
forwarding for the service template that the user profile uses.
4. Return to system view.
quit
5. Enter service template view.
wlan service-template service-template-name
6. Enable policy-based forwarding.
client forwarding-policy enable
By default, policy-based forwarding is disabled for a service template.
29
Feature
Hardware series Model Product code
compatibility
WX3024H EWP-WX3024H
WX3024H-L EWP-WX3024H-L-PWR
WX3024H-F EWP-WX3024H-F
WX3508H EWP-WX3508H
WX3510H EWP-WX3510H
WX3500H series WX3520H EWP-WX3520H Yes
WX3520H-F EWP-WX3520H-F
WX3540H EWP-WX3540H
WX5510E EWP-WX5510E
WX5500E series Yes
WX5540E EWP-WX5540E
WX5540H EWP-WX5540H
WX5500H series WX5560H EWP-WX5560H Yes
WX5580H EWP-WX5580H
LSUM1WCME0 LSUM1WCME0
EWPXM1WCME0 EWPXM1WCME0
LSQM1WCMX20 LSQM1WCMX20
Access controller LSUM1WCMX20RT LSUM1WCMX20RT
No
modules LSQM1WCMX40 LSQM1WCMX40
LSUM1WCMX40RT LSUM1WCMX40RT
EWPXM2WCMD0F EWPXM2WCMD0F
EWPXM1MAC0F EWPXM1MAC0F
Feature
Hardware series Model Product code
compatibility
WX1804H EWP-WX1804H-PWR
WX1810H EWP-WX1810H-PWR
WX1800H series Yes
WX1820H EWP-WX1820H
WX1840H EWP-WX1840H-GL
WX3820H EWP-WX3820H-GL
WX3800H series No
WX3840H EWP-WX3840H-GL
WX5800H series WX5860H EWP-WX5860H-GL No
30
Restrictions and guidelines
To change the role of an edge AC to aggregation, you must first restore the default AC role.
Restoring the default AC role removes all the guest tunnel settings on the AC.
An edge AC can establish guest tunnels with multiple aggregation ACs, but these tunnels must
belong to different VLANs.
An edge AC can establish multiple guest tunnels with an aggregation AC, but it must use different
source IP addresses to establish tunnels with different aggregation AC interfaces. If you specify
multiple IP addresses of an aggregation AC for the same edge AC IP address, the aggregation AC
uses only the IP address in the first received keepalive request for tunnel establishment.
Procedure
1. Enter system view.
system-view
2. Specify the AC as an edge AC and enter its view.
wlan guest-tunnel edge-ac
By default, an AC is neither an edge AC nor an aggregation AC.
3. Specify an aggregation AC for the edge AC.
aggregation-ac ip ipv4-address tunnel-source ip ipv4-address vlan
vlan-id-list
By default, no aggregation AC is specified for an edge AC.
4. (Optional.) Set the guest tunnel keepalive interval.
keep-alive interval interval
By default, the keepalive interval is 10 seconds.
31
edge-ac ip ipv4-address vlan vlan-id-list
By default, no edge AC is specified for an aggregation AC.
32
2. Enter user profile view.
user-profile profile-name
3. Specify a permitted SSID for client association.
wlan permit-ssid ssid-name
By default, no permitted SSID is specified for client association.
33
system-view
2. Choose one option as needed:
{ Configure the dynamic blacklist to take effect on APs.
wlan dynamic-blacklist active-on-ap
{ Configure the dynamic blacklist to take effect on the AC.
undo wlan dynamic-blacklist active-on-ap
By default, the dynamic blacklist takes effect on APs.
3. (Optional.) Set the aging timer for dynamic blacklist entries.
wlan dynamic-blacklist lifetime lifetime
By default, the aging timer is 300 seconds.
The aging timer for dynamic blacklist entries takes effect only on rogue client entries.
34
Procedure
1. Enter system view.
system-view
2. Enter AP view or AP group view.
{ Enter AP view.
wlan ap ap-name
{ Enter AP group view.
wlan ap-group group-name
3. Disable the AP from responding to broadcast probe requests.
broadcast-probe reply disable
By default:
{ In AP view, an AP uses the configuration in AP group view.
{ In AP group view, an AP responds to broadcast probe requests.
35
Display and maintenance commands for WLAN
access
IMPORTANT:
• The WX1800H series, WX2500H series, and WX3000H series access controllers do not support
parameters or commands that are available only in IRF mode.
• Support for the display wlan forwarding-policy, display wlan guest-tunnel,
and reset wlan guest-tunnel commands depends on the device model. For more
information, see the command reference.
Execute display commands in any view and the reset command in user view.
Task Command
Display the number of online clients at
display wlan ap all client-number
both 2.4 GHz and 5 GHz bands.
Display the number of online clients and
display wlan ap all radio client-number
channel information for each radio.
36
Task Command
display wlan statistics client
Display client statistics.
[ mac-address mac-address ]
display wlan statistics connect-history
Display client connection history. { ap { all | name ap-name } | service-template
service-template-name }
display wlan statistics service-template
Display service template statistics
service-template-name
Display VIP client statistics that an AP
display wlan statistics vip-client
reports to the AC.
Procedure
1. Create VLAN 100, and assign an IP address to VLAN-interface 100.
<AC> system-view
[AC] vlan 100
[AC-vlan100]quit
[AC] interface vlan-interface 100
37
[AC-Vlan-interface100] ip address 10.1.9.58 16
2. Create the manual AP ap1, and specify the AP model and serial ID.
[AC] wlan ap ap1 model WA4320i-ACN
[AC-wlan-ap-ap1] serial-id 219801A0CNC138011454
3. Configure a service template and bind it to the AP radio:
# Create the service template service1, set the SSID to trade-off, assign clients coming online
through the service template to VLAN 100, and enable the service template.
<AC> system-view
[AC] wlan service-template service1
[AC-wlan-st-service1] ssid trade-off
[AC-wlan-st-service1] vlan 100
[AC-wlan-st-service1] service-template enable
[AC-wlan-st-service1] quit
# Set the working channel to channel 157 for radio 1 of the AP.
[AC] wlan ap ap1
[AC-wlan-ap-ap1] radio 1
[AC-wlan-ap-ap1-radio-1] channel 157
# Bind the service template service1 to radio 1.
[AC-wlan-ap-ap1-radio-1] radio enable
[AC-wlan-ap-ap1-radio-1] service-template service1
38
Intrusion protection mode : Temporary-block
Temporary block time : 180 sec
Temporary service stop time : 20 sec
Fail VLAN ID : 1
Critical VLAN ID : Not configured
802.1X handshake : Enabled
802.1X handshake secure : Disabled
802.1X domain : my-domain
MAC-auth domain : Not configured
Max 802.1X users per BSS : 4096
Max MAC-auth users per BSS : 4096
802.1X re-authenticate : Enabled
Authorization fail mode : Online
Accounting fail mode : Online
Authorization : Permitted
Key derivation : N/A
PMF status : Disabled
Hotspot policy number : Not configured
Forwarding policy status : Disabled
Forwarding policy name : Not configured
Forwarder : AC
FT status : Disabled
QoS trust : Port
QoS priority : 0
Procedure
# Add the MAC address 0000-000f-1211 to the whitelist.
<AC> system-view
39
[AC] wlan whitelist mac-address 0000-000f-1211
Procedure
# Add the MAC address 0000-000f-1211 to the static blacklist.
<AC> system-view
[AC] wlan static-blacklist mac-address 0000-000f-1211
40
Figure 13 Network diagram
Procedure
# Create Layer 2 ACL 4000, and create ACL rules to permit Client 1 and clients with the same OUI as
Client 2.
<Sysname> system-view
[Sysname] acl mac 4000
[Sysname-acl-mac-4000] rule 0 permit source-mac 0000-000f-1121 ffff-ffff-ffff
[Sysname-acl-mac-4000] rule 1 permit source-mac 000e-35b2-000e ffff-ff00-0000
[Sysname-acl-mac-4000] quit
41
Figure 14 Network diagram
Procedure
1. Configure AC 1:
# Configure IP addresses for AC interfaces. (Details not shown.)
# Specify the AC as an edge AC.
<AC1> system-view
[AC1] wlan guest-tunnel edge-ac
# Specify AC 2 as an aggregation AC for the edge AC and specify VLAN 5 as the guest VLAN.
[AC1-wlan-edge-ac] aggregation-ac ip 202.38.1.20 tunnel-source ip 192.168.2.1 vlan
5
[AC1-wlan-edge-ac] quit
# Create service template 1, set the SSID to guest, and enable the service template.
[AC1] wlan service-template 1
[AC1-wlan-st-1] ssid guest
[AC1-wlan-st-1] service-template enable
[AC1-wlan-st-1] quit
# Create AP ap1, and set the serial ID.
[AC1] wlan ap ap1 model WA4320i-ACN
[AC1-wlan-ap-ap1] serial-id 210235A35U007B000010
# Bind service template 1 to radio 2 of AP ap1, and assign clients coming online through the
service template to VLAN 5.
[AC1-wlan-ap-ap1] radio 2
[AC1-wlan-ap-ap1-radio-2] service-template 1 vlan-id 5
# Enable radio 2.
[AC1-wlan-ap-ap1-radio-2] radio enable
[AC1-wlan-ap-ap1-radio-2] quit
[AC1-wlan-ap-ap1] quit
2. Configure AC 2:
# Configure IP addresses for AC interfaces. (Details not shown.)
# Specify the AC as an aggregation AC.
<AC2> system-view
[AC2] wlan guest-tunnel aggregation-ac
# Specify AC 1 as an edge AC and set the guest VLAN to VLAN 5.
[AC2-wlan-aggregation-ac] edge-ac ip 192.168.2.1 vlan 5
[AC2-wlan-aggregation-ac] quit
42
Verifying the configuration
# Verify that the guest tunnel is in up state on AC 1.
[AC1]display wlan guest-tunnel all
Guest access tunnel information
Local Mode: Edge AC Tunnel Count: 1
Peer IP Address Local IP Address VLANs State Interface
202.38.1.20 192.168.2.1 5 Up WLAN-Tunnel1
Procedure
1. Configure AC 1:
# Configure IP addresses for AC interfaces. (Details not shown.)
# Specify the AC as an edge AC.
<AC1> system-view
[AC1] wlan guest-tunnel edge-ac
# Specify AC 2 as an aggregation AC for the edge AC and specify VLAN 5 as the guest VLAN.
43
[AC1-wlan-edge-ac] aggregation-ac ip 202.38.1.20 tunnel-source ip 192.168.2.1 vlan
5
# Enable guest tunnel flow distribution.
[AC1-wlan-edge-ac] wlan guest-tunnel flow-distribute enable
[AC1-wlan-edge-ac] quit
# Create service template 1, set the SSID to guest, and enable the service template.
[AC1] wlan service-template 1
[AC1-wlan-st-1] ssid guest
[AC1-wlan-st-1] service-template enable
[AC1-wlan-st-1] quit
# Create AP ap1, and set the serial ID.
[AC1] wlan ap ap1 model WA4320i-ACN
[AC1-wlan-ap-ap1] serial-id 210235A35U007B000010
# Bind service template 1 to radio 2 of AP ap1, and assign clients coming online through the
service template to VLAN 5.
[AC1-wlan-ap-ap1] radio 2
[AC1-wlan-ap-ap1-radio-2] service-template 1 vlan-id 5
# Enable radio 2.
[AC1-wlan-ap-ap1-radio-2] radio enable
[AC1-wlan-ap-ap1-radio-2] quit
[AC1-wlan-ap-ap1] quit
2. Configure AC 2:
# Configure IP addresses for AC interfaces. (Details not shown.)
# Specify the AC as an aggregation AC.
<AC2> system-view
[AC2] wlan guest-tunnel aggregation-ac
# Specify AC 1 as an edge AC and set the guest VLAN to VLAN 5.
[AC2-wlan-aggregation-ac] edge-ac ip 192.168.2.1 vlan 5
# Enable guest tunnel flow distribution.
[AC2-wlan-aggregation-ac] wlan guest-tunnel flow-distribute enable
[AC2-wlan-aggregation-ac] quit
3. Configure IPsec:
# Create IPv4 advanced ACL 3111.
[AC1] acl advanced 3111
# Create an ACL rule to permit UDP traffic from port 18002 to port 18002.
[AC1-acl-ipv4-adv-3111] rule permit udp source-port eq 18002 destination-port eq
18002
# Create an ACL rule to permit UDP traffic from ports 60016 through 60031 to ports 60016
through 60031.
[AC1-acl-ipv4-adv-3111] rule permit udp source-port range 60016 60031
destination-port range 60016 60031
[AC1-acl-ipv4-adv-3111] quit
# Create IPsec transform set tran1.
[AC1] ipsec transform-set tran1
# Configure the IPsec transform set to use the tunnel mode for IP packet encapsulation
[AC1-ipsec-transform-set-tran1] encapsulation-mode tunnel
# Specify the ESP protocol for the IPsec transform set.
44
[AC1-ipsec-transform-set-tran1] protocol esp
# Configure the IPsec transform set to use the AES-CBC-128 algorithm as the ESP encryption
algorithm, and the HMAC-SHA1 algorithm as the ESP authentication algorithm.
[AC1-ipsec-transform-set-tran1] esp encryption-algorithm aes-cbc-128
[AC1-ipsec-transform-set-tran1] esp authentication-algorithm sha1
[AC1-ipsec-transform-set-tran1] quit
# Create IKE keychain keychain1.
[AC1] ike keychain keychain1
# Set the pre-shared key to be used for IKE negotiation with peer 202.38.1.20 to
123456TESTplat&!.
[AC1-ike-keychain-keychain1] pre-shared-key address 202.38.1.20 255.255.255.0 key
simple 123456TESTplat&!
[AC1-ike-keychain-keychain1] quit
# Create IKE profile profile1.
[AC1] ike profile profile1
# Specify keychain keychain1 for pre-shared key authentication.
[AC1-ike-profile-profile1] keychain keychain1
# Configure a peer ID with the identity type of IP address and the value of 202.38.1.20.
[AC1-ike-profile-profile1] match remote identity address 202.38.1.20 255.255.255.0
[AC1-ike-profile-profile1] quit
# Create IPsec policy with the name map1 and sequence number 10, and specify the policy to
set up SAs through IKE negotiation
[AC1] ipsec policy map1 10 isakmp
# Specify IPv4 advanced ACL 3111 for the IPsec policy.
[AC1-ipsec-policy-isakmp-map1-10] security acl 3111
# Specify IPsec transform set tran1 for the IPsec policy.
[AC1-ipsec-policy-isakmp-map1-10] transform-set tran1
# Configure local address 192.168.2.1 and remote IP address 202.38.1.20 for the IPsec tunnel.
[AC1-ipsec-policy-isakmp-map1-10] local-address 192.168.2.1
[AC1-ipsec-policy-isakmp-map1-10] remote-address 202.38.1.20
# Specify IKE profile profile1 for the IPsec policy.
[AC1-ipsec-policy-isakmp-map1-10] ike-profile profile1
[AC1-ipsec-policy-isakmp-map1-10] quit
# Assign IP address 192.168.2.1 and apply IPsec policy map1 to VLAN-interface 2.
[AC1] interface Vlan-interface 2
[AC1-Vlan-interface2] ip address 192.168.2.1 255.255.255.0
[AC1-Vlan-interface2] ipsec apply policy map1
[AC1-Vlan-interface2] quit
# Configure GigabitEthernet 1/0/1 as a trunk port, set its PVID to VLAN 2, and assign the port to
VLAN 2.
[AC1] interface GigabitEthernet 1/0/1
[AC1-GigabitEthernet 1/0/1] port link-type trunk
[AC1-GigabitEthernet 1/0/1] port trunk pvid vlan 2
[AC1-GigabitEthernet 1/0/1] port trunk permit vlan 2
[AC1-GigabitEthernet 1/0/1] quit
# Configure IPsec on AC 2 the same way IPsec is configured on AC 1. (Details not shown.)
45
Verifying the configuration
After the configuration is completed, an IPsec tunnel is established between AC 1 and AC 2. Traffic
between source port 18002 and destination port 18002 and traffic between source ports 60016
through 60031 and destination ports 60016 through 60031 are IPsec protected.
# Use the display ipsec sa command to display IPsec SAs on AC1.
[AC1] display ipsec sa
-------------------------------
Interface: Vlan-interface5
-------------------------------
-----------------------------
IPsec policy: map1
Sequence number: 10
Mode: ISAKMP
-----------------------------
Tunnel id: 0
Encapsulation mode: tunnel
Perfect Forward Secrecy:
Inside VPN:
Extended Sequence Numbers enable: N
Traffic Flow Confidentiality enable: N
Path MTU: 1428
Tunnel:
local address: 192.168.2.1
remote address: 202.38.1.20
Flow:
sour addr: 0.0.0.0/0.0.0.0 port: 18002 protocol: udp
dest addr: 0.0.0.0/0.0.0.0 port: 18002 protocol: udp
46
UDP encapsulation used for NAT traversal: N
Status: Active
Procedure
1. Configure AC 1:
# Configure IP addresses for AC interfaces. (Details not shown.)
# Specify the AC as an edge AC.
<AC1> system-view
[AC1] wlan guest-tunnel edge-ac
# Specify AC 2 as an aggregation AC for the edge AC and specify VLAN 5 as the guest VLAN.
[AC1-wlan-edge-ac] aggregation-ac ip 202.38.1.21 tunnel-source ip 10.1.0.1 vlan 5
# Enable guest tunnel flow distribution.
47
[AC1-wlan-edge-ac] wlan guest-tunnel flow-distribute enable
[AC1-wlan-edge-ac] quit
# Create service template 1, set the SSID to guest, and enable the service template.
[AC1] wlan service-template 1
[AC1-wlan-st-1] ssid guest
[AC1-wlan-st-1] service-template enable
[AC1-wlan-st-1] quit
# Create AP ap1, and set the serial ID.
[AC1] wlan ap ap1 model WA4320i-ACN
[AC1-wlan-ap-ap1] serial-id 210235A35U007B000010
# Bind service template 1 to radio 2 of AP ap1, and assign clients coming online through the
service template to VLAN 5.
[AC1-wlan-ap-ap1] radio 2
[AC1-wlan-ap-ap1-radio-2] service-template 1 vlan-id 5
# Enable radio 2.
[AC1-wlan-ap-ap1-radio-2] radio enable
[AC1-wlan-ap-ap1-radio-2] quit
[AC1-wlan-ap-ap1] quit
2. Configure AC 2:
# Configure IP addresses for AC interfaces. (Details not shown.)
# Specify the AC as an aggregation AC.
<AC2> system-view
[AC2] wlan guest-tunnel aggregation-ac
# Specify AC 1 as an edge AC and set the guest VLAN to VLAN 5.
[AC2-wlan-aggregation-ac] edge-ac ip 10.1.0.1 vlan 5
# Enable guest tunnel flow distribution.
[AC2-wlan-aggregation-ac] wlan guest-tunnel flow-distribute enable
[AC2-wlan-aggregation-ac] quit
3. Configure NAT:
# Assign IP address 10.1.0.2 to GigabitEthernet 1/0/1.
<NAT> system-view
[NAT] interface GigabitEthernet 1/0/1
[NAT-GigabitEthernet 1/0/1] ip address 10.1.0.2 255.255.0.0
[NAT-GigabitEthernet 1/0/1] quit
# Create NAT address group 0, and add address 202.38.1.23 to the group.
[NAT] nat address-group 0
[NAT-address-group-0] address 202.38.1.23 202.38.1.23
[NAT-address-group-0] quit
# Create IPv4 basic ACL 2000, and create a rule to permit packets from subnet 10.1.0.3/16 to
pass through.
[NAT] acl basic 2000
[NAT-acl-ipv4-basic-2000] rule permit source 10.1.0.3 0.0.0.255
[NAT-acl-ipv4-basic-2000] quit
# Assign IP address 10.1.0.2 to GigabitEthernet 1/0/2.
[NAT] interface GigabitEthernet 1/0/2
[NAT-GigabitEthernet 1/0/2] ip address 202.38.1.20 255.255.0.0
48
# Enable outbound dynamic PAT on GigabitEthernet 1/0/2. The source IP addresses of the
packets permitted by the ACL rule are translated into the addresses in address group 0.
[NAT-GigabitEthernet 1/0/2] nat outbound 2000 address-group 0
[NAT-GigabitEthernet 1/0/2] quit
4. Configure IPsec on AC 1:
# Create IPv4 advanced ACL 3000.
[AC1] acl advanced 3000
# Create an ACL rule to permit UDP traffic from port 18002 to port 18002.
[AC1-acl-ipv4-adv-3000] rule permit udp source-port eq 18002 destination-port eq
18002
# Create an ACL rule to permit UDP traffic from ports 60016 through 60031 to ports 60016
through 60031.
[AC1-acl-ipv4-adv-3000] rule permit udp source-port range 60016 60031
destination-port range 60016 60031
[AC1-acl-ipv4-adv-3000] quit
# Create IPsec transform set tran1.
[AC1] ipsec transform-set tran1
# Configure the IPsec transform set to use the tunnel mode for IP packet encapsulation.
[AC1-ipsec-transform-set-tran1] encapsulation-mode tunnel
# Specify the ESP protocol for the IPsec transform set.
[AC1-ipsec-transform-set-tran1] protocol esp
# Configure the IPsec transform set to use the 3DES algorithm as the ESP encryption algorithm,
and the HMAC-MD5 algorithm as the ESP authentication algorithm.
[AC1-ipsec-transform-set-tran1] esp encryption-algorithm 3des-cbc
[AC1-ipsec-transform-set-tran1] esp authentication-algorithm md5
[AC1-ipsec-transform-set-tran1] quit
# Create IKE keychain keychain1.
[AC1] ike keychain keychain1
# Set the pre-shared key to be used for IKE negotiation with peer 202.38.1.21 to
123456TESTplat&!.
[AC1-ike-keychain-keychain1] pre-shared-key address 202.38.1.21 255.255.0.0 key
simple 123456TESTplat&!
[AC1-ike-keychain-keychain1] quit
# Create IKE profile profile1.
[AC1] ike profile profile1
# Specify keychain keychain1 for pre-shared key authentication.
[AC1-ike-profile-profile1] keychain keychain1
# Specify that IKE negotiation operates in aggressive mode.
[AC1-ike-profile-profile1] exchange-mode aggressive
# Set the local identity to FQDN name h3c.com.
[AC1-ike-profile-profile1] local-identity fqdn h3c.com
# Configure a peer ID with the identity type of IP address and the value of 202.38.1.21.
[AC1-ike-profile-profile1] match remote identity address 202.38.1.21 255.255.0.0
[AC1-ike-profile-profile1] quit
# Create IPsec policy with the name policy1 and sequence number 1, and specify the policy to
set up SAs through IKE negotiation.
[AC1] ipsec policy policy1 1 isakmp
# Specify ACL 3000 for the IPsec policy.
49
[AC1-ipsec-policy-isakmp-policy1-1] security acl 3000
# Specify IPsec transform set tran1 for the IPsec policy.
[AC1-ipsec-policy-isakmp-policy1-1] transform-set tran1
# Configure remote IP address 202.38.1.21 for the IPsec tunnel.
[AC1-ipsec-policy-isakmp-policy1-1] remote-address 202.38.1.21
# Specify IKE profile profile1 for the IPsec policy.
[AC1-ipsec-policy-isakmp-policy1-1] ike-profile profile1
[AC1-ipsec-policy-isakmp-policy1-1] quit
# Assign IP address 10.1.0.1 and apply IPsec policy map1 to VLAN-interface 5.
[AC1] interface Vlan-interface 5
[AC1-Vlan-interface5] ip address 10.1.0.1 255.255.0.0
[AC1-Vlan-interface5] ipsec apply policy policy1
[AC1-Vlan-interface5] quit
# Configure GigabitEthernet 1/0/1 as a trunk port, set its PVID to VLAN 2, and assign the port to
VLAN 2.
[AC1] interface GigabitEthernet 1/0/1
[AC1-GigabitEthernet 1/0/1] port link-type trunk
[AC1-GigabitEthernet 1/0/1] port trunk pvid vlan 2
[AC1-GigabitEthernet 1/0/1] port trunk permit vlan 2
[AC1-GigabitEthernet 1/0/1] quit
# Configure DPD to be triggered every 10 seconds and every 5 seconds between retries if the
peer does not respond.
[AC1] ike dpd interval 10 retry 5 on-demand
# Configure a static route.
[AC1] ip route-static 0.0.0.0 0 10.1.0.2
# (Optional.) Enable IPsec redundancy if AC 1 is an IRF fabric.
[AC1] ipsec redundancy enable
5. Configure IPsec on AC 2:
# Create IPsec transform set tran1.
[AC2] ipsec transform-set tran1
# Configure the IPsec transform set to use the tunnel mode for IP packet encapsulation
[AC2-ipsec-transform-set-tran1] encapsulation-mode tunnel
# Specify the ESP protocol for the IPsec transform set.
[AC2-ipsec-transform-set-tran1] protocol esp
# Configure the IPsec transform set to use the 3DES algorithm as the ESP encryption algorithm,
and the HMAC-MD5 algorithm as the ESP authentication algorithm.
[AC2-ipsec-transform-set-tran1] esp encryption-algorithm 3des-cbc
[AC2-ipsec-transform-set-tran1] esp authentication-algorithm md5
[AC2-ipsec-transform-set-tran1] quit
# Create IKE keychain keychain1.
[AC2] ike keychain keychain1
# Set the pre-shared key to be used for IKE negotiation with peer 202.38.1.23 to
123456TESTplat&!.
[AC2-ike-keychain-keychain1] pre-shared-key address 202.38.1.23 255.255.0.0 key
simple 123456TESTplat&!
[AC2-ike-keychain-keychain1] quit
# Create IKE profile profile1.
[AC2] ike profile profile1
50
# Specify keychain keychain1 for pre-shared key authentication.
[AC2-ike-profile-profile1] keychain keychain1
# Specify that IKE negotiation operates in aggressive mode.
[AC2-ike-profile-profile1] exchange-mode aggressive
# Configure a peer ID with the identity type of FQDN and the value of h3c.com.
[AC2-ike-profile-profile1] match remote identity fqdn h3c.com
[AC2-ike-profile-profile1] quit
# Create an IPsec policy template with the name template1 and sequence number 1.
[AC2] ipsec policy-template template1 1
# Specify IPsec transform set tran1 for the IPsec policy template.
[AC2-ipsec-policy-template-template1-1] transform-set tran1
# Configure local address 202.38.1.21 for the IPsec tunnel.
[AC2-ipsec-policy-template-template1-1] local-address 202.38.1.21
# Specify IKE profile profile1 for the IPsec policy template.
[AC2-ipsec-policy-template-template1-1] ike-profile profile1
[AC2-ipsec-policy-template-template1-1] quit
# Create an IPsec policy entry by using IPsec policy template template1, and specify the IPsec
policy name as policy1 and the sequence number as 1.
[AC2] ipsec policy policy1 1 isakmp template template1
# Assign IP address 202.38.1.21 and apply IPsec policy policy1 to VLAN-interface 2.
[AC2] interface Vlan-interface 2
[AC2-Vlan-interface2] ip address 202.38.1.21 255.255.0.0
[AC2-Vlan-interface2] ipsec apply policy policy1
[AC2-Vlan-interface2] quit
# Configure GigabitEthernet 1/0/1 as a trunk port, set its PVID to VLAN 2, and assign the port to
VLAN 2.
[AC2] interface GigabitEthernet 1/0/1
[AC2-GigabitEthernet 1/0/1] port link-type trunk
[AC2-GigabitEthernet 1/0/1] port trunk pvid vlan 2
[AC2-GigabitEthernet 1/0/1] port trunk permit vlan 2
[AC2-GigabitEthernet 1/0/1] quit
# Configure DPD to be triggered every 10 seconds and every 5 seconds between retries if the
peer does not respond.
[AC2] ike dpd interval 10 retry 5 on-demand
# Configure a static route.
[AC2] ip route-static 0.0.0.0 0 10.2.0.3
# (Optional.) Enable IPsec redundancy if AC 2 is an IRF fabric.
[AC2] ipsec redundancy enable
51
-----------------------------
IPsec policy: policy1
Sequence number: 1
Mode: Template
-----------------------------
Tunnel id: 0
Encapsulation mode: tunnel
Perfect Forward Secrecy:
Inside VPN:
Extended Sequence Numbers enable: N
Traffic Flow Confidentiality enable: N
Path MTU: 1436
Tunnel:
local address: 10.1.0.1
remote address: 202.38.1.21
Flow:
sour addr: 0.0.0.0/0.0.0.0 port: 18002 protocol: udp
dest addr: 0.0.0.0/0.0.0.0 port: 18002 protocol: udp
52