- Table of Contents
-
- H3C Access Controllers and Access Points Configuration Examples(V7)-6W101
- 00-Preface
- 01-H3C Access Controllers AP's Association with the AC at Layer 2 Configuration Examples
- 02-H3C Access Controllers Comware 7 AP's Association with the AC at Layer 2 (IPv6) Configuration Examples
- 03-H3C Access Controllers AP's Association with the AC at Layer 3 Configuration Examples
- 04-H3C Access Controllers Comware 7 AP's Association with the AC at Layer 3 (IPv6) Configuration Examples
- 05-H3C Access Controllers Local MAC Authentication Configuration Examples (V7)
- 06-H3C Access Controllers MAC Authentication with Guest VLAN Assignment Configuration Examples (V7)
- 07-H3C Access Controllers Comware 7 MAC Authentication with Guest VLAN Assignment (IPv6) Configuration Examples
- 08-H3C Access Controllers MAC Authentication and PSK Authentication Configuration Examples (V7)
- 09-H3C Access Controllers Auto AP Configuration Examples (V7)
- 10-H3C Access Controllers WLAN Load Balancing Configuration Examples (V7)
- 11-H3C Access Controllers WEP Encryption Configuration Examples
- 12-H3C Access Controllers Local Forwarding Configuration Examples
- 13-H3C Access Controllers Layer 2 Static Aggregation Configuration Examples (V7)
- 14-H3C Access Controllers Remote 802.1X Authentication Configuration Examples (V7)
- 15-H3C Access Controllers Comware 7 Remote 802.1X Authentication (IPv6) Configuration Examples
- 16-H3C Access Controllers 802.1X Authentication with ACL Assignment Through IMC Server @CE@ (V7)
- 17-H3C Access Controllers 802.1X Authentication with User Profile Assignment Through IMC Server @CE@ (V7)
- 18-H3C Access Controllers EAD Authentication Configuration Examples (V7)
- 19-H3C Access Controllers Comware 7 EAD Authentication (IPv6) Configuration Examples
- 20-H3C Access Controllers Remote Portal Authenticaiton Configuration Examples (V7)
- 21-H3C Access Controllers Comware 7 Remote Portal Authenticaiton (IPv6) Configuration Examples
- 22-H3C Access Controllers Local Portal Authentication Configuration Examples (V7)
- 23-H3C Access Controllers Comware 7 Local Portal Authentication (IPv6) Configuration Examples
- 24-H3C Access Controllers Local Forwarding Mode Direct Portal Authentication Configuration Examples (V7)
- 25-H3C Access Controllers Local Forwarding Mode Direct Portal Authentication (IPv6) Configuration Examples(V7)
- 26-H3C Access Controllers Local Portal Authentication through LDAP Server Configuration Examples (V7)
- 27-H3C Access Controllers Local Portal Authentication through LDAP Server (IPv6) Configuration Examples(V7)
- 28-H3C Access Controllers MAC-based Portal Quick Authenticaiton Configuration Example (V7)
- 29-H3C Access Controllers Comware 7 MAC-based Quick Portal Authenticaiton (IPv6) Configuration Example
- 30-H3C Access Controllers SSH Configuration Examples (7)
- 31-H3C Access Controllers Internal-to-External Access Through NAT Configuration Examples (V7)
- 32-H3C Access Controllers Static Blacklist Configuration Examples
- 33-H3C Access Controllers Comware 7 WLAN Access (IPv6) Configuration Examples
- 34-H3C Access Controllers Inter-AC Roaming Configuration Examples (V7)
- 35-H3C Access Controllers Comware 7 Inter-AC Roaming (IPv6) Configuration Examples
- 36-H3C Access Controllers HTTPS Login Configuration Examples (V7)
- 37-H3C Access Controllers Client Rate Limiting Configuration Examples (V7)
- 38-H3C Access Controllers Client Quantity Control Configuration Examples
- 39-H3C Access Controllers Medical RFID Tag Management Configuration Examples (V7)
- 40-H3C Access Controllers iBeacon Management Configuration Examples (V7)
- 41-H3C Access Controllers Remote AP Configuration Examples (V7)
- 42-H3C Access Controllers PSK Encryption Configuration Examples
- 43-H3C Access Controllers WIPS Configuration Examples (V7)
- 44-H3C Access Controllers Layer 2 Multicast Configuration Example (V7)
- 45-H3C Access Controllers IRF Setup with Members Directly Connected Configuration Examples (V7)
- 46-H3C Access Controllers IRF Setup with Members Not Directly Connected Configuration Examples (V7)
- 47-H3C Access Controller Modules IRF Setup with Members in One Chassis Configuration Examples (V7)
- 48-H3C Access Controller Modules IRF Setup with Members in Different Chassis Configuration Examples (V7)
- 49-H3C Access Controllers Comware 7 IP Source Guard (IPv6) Configuration Examples
- 50-Policy-Based Forwarding with Dual Gateways Configuration Example
- 51-H3C Access Controllers Comware 7 Policy-Based Forwarding with Dual Gateways (IPv6) Configuration Example
- 52-Policy-Based Local Forwarding Configuration Examples
- Related Documents
-
Title | Size | Download |
---|---|---|
51-H3C Access Controllers Comware 7 Policy-Based Forwarding with Dual Gateways (IPv6) Configuration Example | 93.59 KB |
|
H3C Access Controllers |
Comware 7 Policy-Based Forwarding with Dual Gateways (IPv6) |
Configuration Examples |
Copyright © 2019 New H3C Technologies Co., Ltd. All rights reserved.
No part of this manual may be reproduced or transmitted in any form or by any means without prior written consent of New H3C Technologies Co., Ltd.
Except for the trademarks of New H3C Technologies Co., Ltd., any trademarks that may be mentioned in this document are the property of their respective owners.
The information in this document is subject to change without notice.
Introduction
This document provides a configuration example for configuring policy-based forwarding with dual gateways.
Prerequisites
This document applies to Comware 7-based access controllers and access points. Procedures and information in the examples might be slightly different depending on the software or hardware version of the access controllers and access points.
The configuration examples were created and verified in a lab environment, and all the devices were started with the factory default configuration. When you are working on a live network, make sure you understand the potential impact of every command on your network.
The following information is provided based on the assumption that you have basic knowledge of WLAN access, AP management, and DHCPv6.
Example: Configuring policy-based forwarding with dual gateways
Network configuration
As shown in Figure 1, the AC is deployed at the headquarters and an AP is deployed at the branch. Router A and Router B act as the gateways for the branch and the headquarters, respectively. The AP associates with the AC across the Internet.
Configure network settings to meet the following requirements:
· Packets destined to the headquarters are forwarded by the AC and packets destined to the branch or Internet are forwarded by the AP.
· The AP obtains IPv6 addresses from Router A and the client obtains IPv6 addresses from the AC.
Analysis
· For the AP to discover the AC through the Internet, configure Option 52 and manually specify the IPv6 address of the AC on Router A.
· To simplify configurations when a large number of APs are deployed at branches, enable auto AP and auto AP conversion on the AC.
· For both the AP and the AC to forward packets, configure policy-based forwarding on the AC.
Procedures
Configuring Router A
1. Configure interface IPv6 addresses:
# Create VLAN 10 and assign an IPv6 address to VLAN-interface 10.
<RouterA> system-view
[RouterA] vlan 10
[RouterA-Vlan10] quit
[RouterA] interface vlan-interface 10
[RouterA-Vlan-interface10] ipv6 address 2001::1/64
[RouterA-Vlan-interface10] quit
# Assign an IPv6 address to GigabitEthernet 1/0/1.
[RouterA] interface gigabitethernet 1/0/1
[RouterA-GigabitEthernet1/0/1] ipv6 address 3001::1/64
[RouterA-GigabitEthernet1/0/1] quit
# Enable RIPng on GigabitEthernet 1/0/1 and VLAN-interface 10.
[RouterA] ripng 1
[RouterA-ripng-1] quit
[RouterA] interface gigabitethernet 1/0/1
[RouterA-GigabitEthernet1/0/1] ripng 1 enable
[RouterA-GigabitEthernet1/0/1] quit
[RouterA] interface vlan-interface 10
[RouterA-Vlan-interface10] ripng 1 enable
[RouterA-Vlan-interface10] quit
2. Configure DHCPv6:
# Enable the DHCPv6 server on VLAN-interface 10 and apply address pool ap to the interface.
[RouterA] interface vlan-interface 10
[RouterA-Vlan-interface10] ipv6 dhcp select server
[RouterA-Vlan-interface10] ipv6 dhcp server apply pool ap
# Disable RA message suppression. Set both the M flag and O flag to 1 in RA advertisements to be sent.
[RouterA-Vlan-interface10] undo ipv6 nd ra halt
[RouterA-Vlan-interface10] ipv6 nd autoconfig managed-address-flag
[RouterA-Vlan-interface10] ipv6 nd autoconfig other-flag
[RouterA-Vlan-interface10] quit
# Create IPv6 address pool ap, specify the subnet for dynamic allocation, and specify the gateway address.
[RouterA] ipv6 dhcp pool ap
[RouterA-dhcp6-pool-ap] network 2001::0/64
[RouterA-dhcp6-pool-ap] gateway-list 2001::1
[RouterA-dhcp6-pool-ap] quit
# Configure Option 52 that specifies the AC's IPv6 address 4001::2/64.
[RouterA-dhcp6-pool-ap] option 52 hex 40010000000000000000000000000002
[RouterA-dhcp6-pool-ap] quit
Configuring Router B
1. Assign IPv6 addresses to GigabitEthernet 1/0/1 and GigabitEthernet 1/0/2.
[RouterB] interface gigabitethernet 1/0/1
[RouterB-GigabitEthernet1/0/1] ipv6 address 3002::2/64
[RouterB-GigabitEthernet1/0/1] quit
[RouterB] interface gigabitethernet 1/0/2
[RouterB-GigabitEthernet1/0/2] ipv6 address 4001::1/64
[RouterB-GigabitEthernet1/0/2] quit
2. Enable RIPng on GigabitEthernet 1/0/1, GigabitEthernet 1/0/2, and GigabitEthernet 1/0/3.
[RouterB] ripng 1
[RouterB-ripng-1] quit
[RouterB] interface gigabitethernet 1/0/1
[RouterB-GigabitEthernet1/0/1] ripng 1 enable
[RouterB-GigabitEthernet1/0/1] quit
[RouterB] interface gigabitethernet 1/0/2
[RouterB-GigabitEthernet1/0/2] ripng 1 enable
[RouterB-GigabitEthernet1/0/2] quit
[RouterB] interface gigabitethernet 1/0/3
[RouterB-GigabitEthernet1/0/3] ripng 1 enable
Configuring the AC
1. Configure interface IPv6 addresses and routes:
# Create VLAN 2 and assign an IPv6 address to VLAN-interface 2.
<AC> system-view
[AC] vlan 2
[AC-Vlan2] quit
[AC] interface vlan-interface 2
[AC-Vlan-interface2] ipv6 address 5001::1/64
[AC-Vlan-interface2] quit
# Assign an IPv6 address to GigabitEthernet 1/0/1.
[AC] interface gigabitethernet 1/0/1
[AC-GigabitEthernet1/0/1] ipv6 address 4001::2/64
[AC-GigabitEthernet1/0/1] quit
# Configure an IPv6 static route, with the destination address 3002::0 and next hop 4001::1.
[AC] ipv6 route-static 3002:: 64 4001::1
2. Configure DHCPv6 and DNS:
# Enable the DHCPv6 server on VLAN-interface 2 and apply address pool sta to the interface.
[AC] interface vlan-interface 2
[AC-Vlan-interface2] ipv6 dhcp select server
[AC-Vlan-interface2] ipv6 dhcp server apply pool sta
# Disable RA message suppression. Set both the M flag and O flag to 1 in RA advertisements to be sent.
[AC-Vlan-interface2] undo ipv6 nd ra halt
[AC-Vlan-interface2] ipv6 nd autoconfig managed-address-flag
[AC-Vlan-interface2] ipv6 nd autoconfig other-flag
[AC-Vlan-interface2] quit
# Create IPv6 address pool sta, specify the subnet for dynamic allocation, and specify the gateway address.
[AC] ipv6 dhcp pool sta
[AC-dhcp6-pool-sta] network 5001::0/64
[AC-dhcp6-pool-sta] gateway-list 5001::1
#Specify the DNS server address 6001::1/64.
[AC-dhcp6-pool-sta] dns-server 6001::1
[AC-dhcp6-pool-sta] quit
# Exclude IPv6 addresses 5001::1 through 5001::3 from dynamic assignment.
[AC] ipv6 dhcp server forbidden-address 5001::1 5001::3
3. Enable auto AP and auto AP conversion.
[AC] wlan auto-ap enable
[AC] wlan auto-persistent enable
4. Configure policy-based forwarding:
# Create IPv6 advanced ACL 3001, and configure ACL rules to permit DNS, BOOTPC, and BOOTPS packets and packets from 5001::0/64 to 5001::0/64.
[AC] acl ipv6 advanced 3001
[AC-acl-ipv6-adv-3001] rule 0 permit udp source-port eq dns
[AC-acl-ipv6-adv-3001] rule 1 permit udp destination-port eq dns
[AC-acl-ipv6-adv-3001] rule 2 permit udp source-port eq bootpc
[AC-acl-ipv6-adv-3001] rule 3 permit udp destination-port eq bootps
[AC-acl-ipv6-adv-3001] rule 4 permit ipv6 source 5001::0/64 destination 5001::0/64
[AC-acl-ipv6-adv-3001] quit
# Create forwarding policy remote, and configure the forwarding policy to perform centralized forwarding on packets that match ACL 3001.
[AC] wlan forwarding-policy remote
[AC-wlan-fp-remote] classifier acl 3001 behavior remote
[AC-wlan-fp-remote] quit
# Create service template chn, set the SSID to CHN, and assign clients coming online through the service template to VLAN 2.
[AC] wlan service-template chn
[AC-wlan-st-chn] ssid CHN
[AC-wlan-st-chn] vlan 2
# Enable snooping DHCPv6 packets.
[AC-wlan-st-chn] client ipv6-snooping dhcpv6-learning enable
# Enable APs to forward client traffic, apply forwarding policy remote to the service template, and enable the forwarding policy.
[AC-wlan-st-chn] client forwarding-location ap
[AC-wlan-st-chn] client forwarding-policy-name remote
[AC-wlan-st-chn] client forwarding-policy enable
# Enable the service template.
[AC-wlan-st-chn] service-template enable
[AC-wlan-st-chn] quit
# Bind the service template to radio 1 and enable the radio.
[AC] wlan ap-group default-group
[AC-wlan-ap-group-default-group] ap-model WA4320i-ACN
[AC-wlan-ap-group-default-group-ap-model-WA4320i-ACN] radio 1
[AC-wlan-ap-group-default-group-ap-model-WA4320i-ACN-radio-1] service-template chn
[AC-wlan-ap-group-default-group-ap-model-WA4320i-ACN-radio-1] radio enable
[AC-wlan-ap-group-default-group-ap-model-WA4320i-ACN-radio-1] quit
[AC-wlan-ap-group-default-group-ap-model-WA4320i-ACN] quit
[AC-wlan-ap-group-default-group] quit
Verifying the configuration
# Verify that the AP has associated with the AC.
[AC] display wlan ap all
Total number of APs: 1
Total number of connected APs: 1
Total number of connected manual APs: 1
Total number of connected auto APs: 0
Total number of connected common APs: 1
Total number of connected WTUs: 0
Total number of inside APs: 0
Maximum supported APs: 2048
Remaining APs: 2047
Total AP licenses: 32
Remaining AP licenses: 31
AP information
State : I = Idle, J = Join, JA = JoinAck, IL = ImageLoad
C = Config, DC = DataCheck, R = Run, M = Master, B = Backup
AP name APID State Model Serial ID
ap1 2 R/M WA4320i-ACN 210235A1GQC149001806
# Verify that the AP is in Run state, the discovery type is DHCP, and the AP's IPv6 address is 2001::2.
[AC] display wlan ap name ap1 verbose
AP name : ap1
AP ID : 2
AP group name : default-group
State : Run
Backup type : Master
Online time : 0 days 1 hours 25 minutes 12 seconds
System up time : 0 days 2 hours 22 minutes 12 seconds
Model : WA4320i-ACN
Region code : CN
Region code lock : Disable
Serial ID : 210235A1GQC149001806
MAC address : 0AFB-423B-893C
IP address : 2001::2
UDP control port number : 18313
UDP data port number : N/A
H/W version : Ver.C
S/W version : E2321
Boot version : 1.01
USB state : N/A
Power level : N/A
Power info : N/A
Description : wtp1
Priority : 4
Echo interval : 10 seconds
Echo count : 3 counts
Keepalive interval : 10 seconds
Discovery-response wait-time : 2 seconds
Statistics report interval : 50 seconds
Fragment size (data) : 1500
Fragment size (control) : 1450
MAC type : Local MAC & Split MAC
Tunnel mode : Local Bridging & 802.3 Frame & Native Frame
CWPCAP data-tunnel status : Down
Discovery type : DHCP
Retransmission count : 3
Retransmission interval : 5 seconds
Firmware upgrade : Enabled
Sent control packets : 1
Received control packets : 1
Echo requests : 147
Lost echo responses : 0
Average echo delay : 3
Last reboot reason : User soft reboot
Latest IP address : 2001::2
Current AC IP : 5001::1
Tunnel down reason : Request wait timer expired
Connection count : 1
Backup Ipv4 : Not configured
Backup Ipv6 : Not configured
Ctrl-tunnel encryption : Disabled
Ctrl-tunnel encryption state : Not encrypted
Data-tunnel encryption : Disabled
Data-tunnel encryption state : Not encrypted
LED mode : Normal
Remote configuration : Enabled
Radio 1:
Basic BSSID : 70f9-6dd3-61e0
Admin state : Up
Radio type : 802.11ac
Antenna type : internal
Client dot11ac-only : Disabled
Client dot11n-only : Disabled
Channel band-width : 20/40/80MHz
Active band-width : 20/40/80MHz
Secondary channel offset : SCA
Short GI for 20MHz : Supported
Short GI for 40MHz : Supported
Short GI for 80MHz : Supported
Short GI for 160MHz : Not supported
A-MSDU : Enabled
A-MPDU : Enabled
LDPC : Not Supported
STBC : Supported
Operational VHT-MCS Set:
Mandatory : Not configured
Supported : NSS1 0,1,2,3,4,5,6,7,8,9
NSS2 0,1,2,3,4,5,6,7,8,9
Multicast : Not configured
Operational HT MCS Set:
Mandatory : Not configured
Supported : 0, 1, 2, 3, 4, 5, 6, 7, 8, 9,
10, 11, 12, 13, 14, 15
Multicast : Not configured
Channel : 149(auto)
Channel usage(%) : 0
Max power : 20 dBm
Operational rate:
Mandatory : 6, 12, 24 Mbps
Multicast : Auto
Supported : 9, 18, 36, 48, 54 Mbps
Disabled : Not configured
Distance : 1 km
ANI : Enabled
Fragmentation threshold : 2346 bytes
Beacon interval : 100 TU
Protection threshold : 2346 bytes
Long retry threshold : 4
Short retry threshold : 7
Maximum rx duration : 2000 ms
Noise floor : -105 dBm
Smart antenna : Enabled
Smart antenna policy : Auto
Protection mode : cts-to-self
Continuous mode : N/A
HT protection mode : No protection
Radio 2:
Basic BSSID : 70f9-6dd3-61f0
Admin state : Down
Radio type : 802.11n(2.4GHz)
Antenna type : internal
Client dot11n-only : Disabled
Channel band-width : 20MHz
Active band-width : 20MHz
Secondary channel offset : SCN
Short GI for 20MHz : Supported
Short GI for 40MHz : Supported
A-MSDU : Enabled
A-MPDU : Enabled
LDPC : Not Supported
STBC : Supported
Operational HT MCS Set:
Mandatory : Not configured
Supported : 0, 1, 2, 3, 4, 5, 6, 7, 8, 9,
10, 11, 12, 13, 14, 15
Multicast : Not configured
Channel : 6(auto)
Channel usage(%) : 0
Max power : 20 dBm
Preamble type : Short
Operational rate:
Mandatory : 1, 2, 5.5, 11 Mbps
Multicast : Auto
Supported : 6, 9, 12, 18, 24, 36, 48, 54 Mbps
Disabled : Not configured
Distance : 1 km
ANI : Enabled
Fragmentation threshold : 2346 bytes
Beacon interval : 100 TU
Protection threshold : 2346 bytes
Long retry threshold : 4
Short retry threshold : 7
Maximum rx duration : 2000 ms
Noise floor : 0 dBm
Smart antenna : Enabled
Smart antenna policy : Auto
Protection mode : cts-to-self
Continuous mode : N/A
HT protection mode : No protection
Radio 1:
Basic BSSID : 7848-59f6-3940
Admin state : Up
Radio type : 802.11ac
Antenna type : internal
Client dot11ac-only : Disabled
Client dot11n-only : Disabled
Channel band-width : 20/40/80MHz
Active band-width : 20/40/80MHz
Secondary channel offset : SCB
Short GI for 20MHz : Supported
Short GI for 40MHz : Supported
Short GI for 80MHz : Supported
Short GI for 160MHz : Not supported
mimo : Not Config
Green-Energy-Management : Disabled
A-MSDU : Enabled
A-MPDU : Enabled
LDPC : Not Supported
STBC : Supported
Operational VHT-MCS Set:
Mandatory : Not configured
Supported : NSS1 0,1,2,3,4,5,6,7,8,9
NSS2 0,1,2,3,4,5,6,7,8,9
Multicast : Not configured
Operational HT MCS Set:
Mandatory : Not configured
Supported : 0, 1, 2, 3, 4, 5, 6, 7, 8, 9,
10, 11, 12, 13, 14, 15
Multicast : Not configured
Channel : 44(auto)
Channel usage(%) : 15
Max power : -102 dBm
Operational rate:
Mandatory : 6, 12, 24 Mbps
Multicast : Auto
Supported : 9, 18, 36, 48, 54 Mbps
Disabled : Not configured
Distance : 1 km
ANI : Enabled
Fragmentation threshold : 2346 bytes
Beacon interval : 100 TU
Protection threshold : 2346 bytes
Long retry threshold : 4
Short retry threshold : 7
Maximum rx duration : 2000 ms
Noise Floor : 5 dBm
Smart antenna : Enabled
Smart antenna policy : Auto
Protection mode : rts-cts
Continuous mode : N/A
HT protection mode : No protection
Radio 2:
Basic BSSID : 7848-59f6-3950
Admin state : Down
Radio type : 802.11b
Antenna type : internal
Client dot11n-only : Disabled
Channel band-width : 20MHz
Active band-width : 20MHz
Secondary channel offset : SCN
Short GI for 20MHz : Supported
Short GI for 40MHz : Supported
A-MSDU : Enabled
A-MPDU : Enabled
LDPC : Not Supported
STBC : Supported
Operational HT MCS Set:
Mandatory : Not configured
Supported : 0, 1, 2, 3, 4, 5, 6, 7, 8, 9,
10, 11, 12, 13, 14, 15
Multicast : Not configured
Channel : 5(auto)
Channel usage(%) : 0
Max power : 20 dBm
Preamble type : Short
Operational rate:
Mandatory : 1, 2, 5.5, 11 Mbps
Multicast : Auto
Supported : 6, 9, 12, 18, 24, 36, 48, 54 Mbps
Disabled : Not configured
Distance : 1 km
ANI : Enabled
Fragmentation threshold : 2346 bytes
Beacon interval : 100 TU
Protection threshold : 2346 bytes
Long retry threshold : 4
Short retry threshold : 7
Maximum rx duration : 2000 ms
Noise Floor : 0 dBm
Smart antenna : Enabled
Smart antenna policy : Auto
Protection mode : rts-cts
Continuous mode : N/A
HT protection mode : No protection
# Verify that the client has come online with an IPv6 address in subnet 5001::0/64, and the forwarding policy is remote.
[AC] display wlan client ipv6
Total number of clients: 1
MAC address User name AP name RID IPv6 address VLAN
0015-005e-9348 N/A ap1 1 5001::2 2
[AC] display wlan client verbose
Total number of clients: 1
MAC address : 0015-005e-9348
IPv4 address : N/A
IPv6 address : 5001::2
Username : N/A
AID : 1
AP ID : 2
AP name : ap1
Radio ID : 1
SSID : CHN
BSSID : 70f9-6dd3-61e0
VLAN ID : 2
Sleep count : 0
Wireless mode : 802.11an
Channel bandwidth : 40MHz
20/40 BSS Coexistence Management : Not supported
SM power save : Disabled
Short GI for 20MHz : Supported
Short GI for 40MHz : Supported
STBC RX capability : Supported
STBC TX capability : Not supported
LDPC RX capability : Not supported
Block Ack : N/A
Supported HT MCS set : 0, 1, 2, 3, 4, 5, 6, 7,
8, 9, 10, 11, 12, 13, 14,
15
Supported rates : 6, 9, 12, 18, 24, 36,
48, 54 Mbps
QoS mode : WMM
Listen interval : 100
RSSI : 0
Rx/Tx rate : 0/0
Authentication method : Open system
Security mode : PRE-RSNA
AKM mode : N/A
Cipher suite : N/A
User authentication mode : Bypass
Authorization ACL ID : N/A
Authorization user profile : N/A
Roam status : N/A
Key derivation : N/A
PMF status : N/A
Forwarding policy name : remote
Online time : 0days 0hours 0minutes 33seconds
FT status : Inactive
# Verify that IPv6 address 5001::2 in the headquarters' network can be pinged successfully.
C:\Users\h3c>ping ipv6 5001::2
Pinging 5001::2 with 32 bytes of data:
Reply from 5001::2: bytes=32 time=6ms TTL=255
Reply from 5001::2: bytes=32 time=3ms TTL=255
Reply from 5001::2: bytes=32 time=6ms TTL=255
Reply from 5001::2: bytes=32 time=1ms TTL=255
Ping statistics for 5001::2:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 1ms, Maximum = 6ms, Average = 4ms
# Verify that a website on the Internet (for example, www.baidu.com) can be pinged successfully.
C:\Users\h3c>ping www.baidu.com
Pinging www.baidu.com [202.202.1.188] with 32 bytes of data:
Reply from 202.202.1.188: bytes=32 time=7ms TTL=255
Reply from 202.202.1.188: bytes=32 time=3ms TTL=255
Reply from 202.202.1.188: bytes=32 time=3ms TTL=255
Reply from 202.202.1.188: bytes=32 time=2ms TTL=255
Ping statistics for 202.202.1.188:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 2ms, Maximum = 7ms, Average = 3ms
Configuration files
· Router A:
#
system-view
vlan 10
interface vlan-interface 10
ipv6 address 2001::1/64
#
#
interface gigabitethernet 1/0/1
ipv6 address 3001::1/64
#
#
ripng 1
#
#
interface gigabitethernet 1/0/1
ripng 1 enable
#
#
interface vlan-interface 10
ripng 1 enable
#
#
interface vlan-interface 10
ipv6 dhcp select server
ipv6 dhcp server apply pool ap
undo ipv6 nd ra halt
ipv6 nd autoconfig managed-address-flag
ipv6 nd autoconfig other-flag
#
#
ipv6 dhcp pool ap
network 2001::0/64
gateway-list 2001::1
option 52 hex 40010000000000000000000000000002
· Router B:
#
interface gigabitethernet 1/0/1
ipv6 address 3002::2/64
interface gigabitethernet 1/0/2
ipv6 address 4001::1/64
#
#
ripng 1
interface gigabitethernet 1/0/1
ripng 1 enable
interface gigabitethernet 1/0/2
ripng 1 enable
interface gigabitethernet 1/0/3
ripng 1 enable
#
· AC:
#
system-view
vlan 2
interface vlan-interface 2
ipv6 address 5001::1/64
#
#
interface gigabitethernet 1/0/1
ipv6 address 4001::2/64
#
#
ipv6 route-static 3002:: 64 4001::1
#
#
interface vlan-interface 2
ipv6 dhcp select server
ipv6 dhcp server apply pool sta
undo ipv6 nd ra halt
ipv6 nd autoconfig managed-address-flag
ipv6 nd autoconfig other-flag
#
#
ipv6 dhcp pool sta
network 5001::0/64
gateway-list 5001::1
dns-server 6001::1
#
#
ipv6 dhcp server forbidden-address 5001::1 5001::3
#
#
wlan auto-ap enable
wlan auto-persistent enable
acl ipv6 advanced 3001
rule 0 permit udp source-port eq dns
rule 1 permit udp destination-port eq dns
rule 2 permit udp source-port eq bootpc
rule 3 permit udp destination-port eq bootps
rule 4 permit ipv6 source 5001::0/64 destination 5001::0/64
#
#
wlan forwarding-policy remote
classifier acl 3001 behavior remote
#
#
wlan service-template chn
ssid CHN
vlan 2
client ipv6-snooping dhcpv6-learning enable
client forwarding-location ap
client forwarding-policy-name remote
client forwarding-policy enable
service-template enable
#
#
wlan ap-group default-group
ap-model WA4320i-ACN
radio 1
service-template chn
radio enable
Related documentation
· Security Command Reference in H3C Access Controllers Command References
· Security Configuration Guide in H3C Access Controllers Configuration Guides
· WLAN Command Reference in H3C Access Controllers Command References
· WLAN Configuration Guide in H3C Access Controllers Configuration Guides