02-WLAN

HomeSupportConfigure & DeployConfiguration GuidesH3C Access Controllers Configuration Guides(E5208P03 E5215P01 R5215P01)-6W10202-WLAN
16-Hotspot 2.0 configuration
Title Size Download
16-Hotspot 2.0 configuration 1.51 MB

Configuring Hotspot 2.0

Overview

Hotspot 2.0, developed by Wi-Fi Alliance, provides automatic network discovery, automated authentication, and seamless roaming for wireless clients.

Hotspot 2.0 contains two versions. Version 2 is fully compatible with version 1.

Hotspot 2.0 operating mechanism

Hotspot 2.0 operates as follows:

1.     A client performs wireless scanning to discover Hotspot 2.0 networks.

2.     The client exchanges Generic Advertisement Service (GAS) frames with APs to get Hotspot 2.0 information and select an optimal BSS.

3.     The client performs online signup. This step is required only for version 2 of Hotspot 2.0.

Scanning

Active scanning

A wireless client periodically scans surrounding wireless networks by sending probe requests. It obtains network information from probe responses.

As shown in Figure 1, the client periodically sends a probe request on each of its supported channels to scan wireless networks. APs that receive the probe request send a probe response that carries the available wireless network information.

Figure 1 Active scanning

 

Passive scanning

As shown in Figure 2, the clients periodically listen for beacon frames sent by APs on their supported channels to get information about surrounding wireless networks. Passive scanning is used when clients want to save power.

Figure 2 Passive scanning

 

GAS frame exchange

After discovering Hotspot 2.0 networks by active or passive scanning, a client exchanges GAS frames with APs to get APs' Hotspot 2.0 information. Based on the obtained Hotspot 2.0 information and local configuration, the client selects an optimal BSS.

As shown in Figure 3, a client exchanges GAS frames with an AP by using the following process:

1.     The client sends a GAS initial request.

2.     Upon receiving the request, the AP encapsulates Hotspot 2.0 information in a GAS initial response and examines the length of the response.

¡     If the length does not exceed the limit, the AP sends the GAS initial response to the client. The GAS frame exchange is complete and the client can send an authentication request.

¡     If the length exceeds the limit, the AP fragments the response and sends the first fragment in a GAS initial response to the client. The response notifies the client to request Hotspot 2.0 information after a comeback delay.

3.     The client sends a GAS comeback request to the AP after a comeback delay.

4.     The AP sends a GAS comeback response that carries the second fragment to the client.

5.     If the length of the response exceeds the limit, the client and the AP repeat steps 3 and 4 until all fragments are sent to the client.

Figure 3 GAS frame exchange

 

Online signup

After GAS frame exchange, a client connects to the Online Sign Up (OSU) server through the OSU AP to sign up online. A signed-up client gets a credential and can automatically access a Hotspot 2.0 network without being re-authenticated. A client can associate with an OSU AP by using the following methods:

·     Open OSU—No authentication.

·     OSEN OSU—Layer 2 authentication.

As shown in Figure 4, online signup operates as follows:

1.     The client obtains the OSU server list from the AP by exchanging GAS frames with the AP and selects an OSU server.

2.     The client associates with the OSU AP through open OSU or OSEN OSU.

3.     The OSU server sends a credential and authentication information to the client or updates the expired credential for the client.

4.     Using the newly provisioned credential, the client disassociates from the OSU AP and associates with the AP that provides Hotspot 2.0 services.

Figure 4 Online signup

 

Protocols and standards

·     IEEE Standard for Information technology—Telecommunications and information exchange between systems— Local and metropolitan area networks— Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 9: Interworking with External Networks

·     Wi-Fi Alliance Technical Committee Hotspot 2.0 Technical Task Group Hotspot 2.0 (Release 2)Technical Specification Version 3.04

Configuration task list

Tasks at a glance

Remarks

(Required.) Configuring a Hotspot 2.0 policy

N/A

(Optional.) Configuring 3GPP information

N/A

(Optional.) Setting an HESSID

Required for version 2 of Hotspot 2.0.

(Optional.) Setting the access network type

N/A

(Optional.) Specifying a network authentication type

N/A

(Optional.) Setting the domain name

Required for version 2 of Hotspot 2.0.

(Optional.) Specifying an OI

Required for version 2 of Hotspot 2.0.

(Optional.) Configuring IP address availability

N/A

(Optional.) Specifying an authentication type for an NAI realm

N/A

(Optional.) Setting service provider information

N/A

(Optional.) Setting the port status for an IP protocol

N/A

(Optional.) Setting WAN link status parameters

N/A

(Optional.) Disabling the DGAF feature

N/A

(Optional.) Managing GAS frames

N/A

(Optional.) Configuring AP venue information

N/A

(Required.) Configuring a OSU server

Required only for version 2 of Hotspot 2.0.

(Required.) Setting an SSID for online signup services

Required only for version 2 of Hotspot 2.0.

(Required.) Managing OSU server icons

Required only for version 2 of Hotspot 2.0.

(Required.) Binding an OSU server to a Hotspot 2.0 policy

Required only for version 2 of Hotspot 2.0.

 

Configuring a Hotspot 2.0 policy

A Hotspot 2.0 policy defines a set of Hotspot 2.0 parameters.

To configure a Hotspot 2.0 policy:

 

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Create a Hotspot 2.0 policy and enter its view.

wlan hotspot-policy policy-number

By default, no Hotspot 2.0 policy exists.

3.     Specify a name for the Hotspot 2.0 policy.

policy-name name

By default, no name is specified for a Hotspot 2.0 policy.

 

Configuring 3GPP information

The 3rd Generation Partnership Project (3GPP) information contains a country code and a network code. The country code identifies a country, and the network code identifies a service provider in the country.

To configure 3GPP information:

 

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Enter service template view.

wlan service-template service-template-name

N/A

3.     Configure 3GPP information.

3gpp-info country-code mobile-country-code network-code mobile-network-code

By default, no country code and network code are configured.

 

Setting an HESSID

A homogenous ESS identifier (HESSID) and the SSID for the extended service set (ESS) together uniquely identify a WLAN. Set the HESSID to the same value as a BSSID in the ESS.

To set an HESSID:

 

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Enter Hotspot 2.0 policy view.

wlan hotspot-policy policy-number

N/A

3.     Set an HESSID.

hessid hessid

By default, no HESSID is set.

 

Setting the access network type

You can set the following access network types:

·     0Private network.

·     1Private network with guest access.

·     2Chargeable public network.

·     3Free public network.

·     4Personal device network.

·     5Emergency services only network.

·     14Test or experimental.

·     15Wildcard.

To set the access network type:

 

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Enter Hotspot 2.0 policy view.

wlan hotspot-policy policy-number

N/A

3.     Set the access network type.

network-type network-type [ access-internet ]

By default, no access network type is set.

 

Specifying a network authentication type

You can specify the following network authentication types:

·     0—Acceptance of terms and conditions.

·     1—On-line enrollment.

·     2HTTP/HTTPS redirection.

·     3DNS redirection.

To specify a network authentication type:

 

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Enter Hotspot 2.0 policy view.

wlan hotspot-policy policy-number

N/A

3.     Specify a network authentication type.

authentication-type { 0 [ redirect-url redirect-url ] | 1 | 2 redirect-url redirect -url | 3 }

By default, no network authentication type is specified.

 

Setting the domain name

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Enter Hotspot 2.0 policy view.

wlan hotspot-policy policy-number

N/A

3.     Set the domain name.

domain-name domain-name

By default, the domain name is not set.

 

Specifying an OI

An organization identifier (OI) identifies a roaming consortium. If a client has the certificate to a roaming consortium, the client can roam to all wireless services provided by the roaming consortium.

To specify an OI:

 

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Enter Hotspot 2.0 policy view.

wlan hotspot-policy policy-number

N/A

3.     Specify an OI.

roam-oi oi [ in-beacon ]

By default, no OI is specified.

 

Configuring IP address availability

Perform this task to configure IP address availability. IP address availability specifies the version and type of IP addresses that an AP assigns to associated clients.

·     IPv4 address availability.

¡     0Address type not available.

¡     1Public IPv4 address available.

¡     2Port-restricted IPv4 address available.

¡     3Single NATed private IPv4 address available.

¡     4Double NATed private IPv4 address available.

¡     5Port-restricted IPv4 address and single NATed IPv4 address available.

¡     6Port-restricted IPv4 address and double NATed IPv4 address available.

¡     7Availability of the address type is not known.

·     IPv6 address availability.

¡     0Address type not available.

¡     1Address type available.

¡     2Availability of the address type not known.

To configure IP address availability:

 

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Enter Hotspot 2.0 policy view.

wlan hotspot-policy policy-number

N/A

3.     Configure IP address availability.

ip-type ipv4 ipv4-type ipv6 ipv6-type

By default, the availability is 1 for an IPv4 address and 2 for an IPv6 address.

 

Specifying an authentication type for an NAI realm

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Enter Hotspot 2.0 policy view.

wlan hotspot-policy policy-number

N/A

3.     Create an NAI realm and specify an authentication type for the NAI realm.

nai-realm realm-name eap-method eap-method-id auth-method auth-method-id authentication authentication

By default, no NAI realm is created.

 

Setting service provider information

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Enter Hotspot 2.0 policy view.

wlan hotspot-policy policy-number

N/A

3.     Set service provider information.

operator-name operator-name lang-code lang-code

By default, no service provider information is set.

 

Setting the port status for an IP protocol

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Enter Hotspot 2.0 policy view.

wlan hotspot-policy policy-number

N/A

3.     Set the port status for an IP protocol.

ip-protocol { esp | icmp | tcp | udp } port-number port-number { closed | open | unknown }

By default, no port status is set for an IP protocol.

 

Setting WAN link status parameters

This feature enables Hotspot 2.0 to advertise uplink and downlink speeds and link status such as closed, testing, and enabled of the WAN.

To set WAN link status parameters:

 

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Enter Hotspot 2.0 policy view.

wlan hotspot-policy policy-number

N/A

3.     Set WAN link status parameters.

wan-metrics { link-down | link-test | link-up } [ asymmetric downlink-speed downlink-speed uplink-speed uplink-speed | symmetric link-speed link-speed ]

By default, no WAN link status parameters are set.

 

Disabling the DGAF feature

The Downstream Group-Addressed Forwarding (DGAF) feature enables an AP to forward all downstream wireless broadcast ARP packets and wireless multicast packets. To prevent spoofing attacks by using downstream multicasts, you can disable the DGAF feature for the AP.

To avoid packet loss, enable proxy ARP and multicast optimization before disabling DGAF. For more information about proxy ARP, see Layer 3—IP Services Configuration Guide.

To disable the DGAF feature:

 

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Enter Hotspot 2.0 policy view.

wlan hotspot-policy policy-number

N/A

3.     Disable the DGAF feature.

undo dgaf enable

By default, the DGAF feature is enabled.

Before disabling DGAF, make sure all service templates bound to the Hotspot 2.0 policy are disabled.

 

Managing GAS frames

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Enter Hotspot 2.0 policy view.

wlan hotspot-policy policy-number

N/A

3.     Set the comeback delay.

comeback-delay value

By default, the comeback delay is 1 TU (1024 milliseconds).

The comeback delay prevents clients from frequently sending GAS comeback requests.

4.     Set the maximum number of GAS initial requests that clients can send within the specified interval.

gas-limit number number interval interval

By default, the number of GAS initial requests that clients can send is not limited.

This command can ease the AC's burden.

 

Binding a Hotspot 2.0 policy to a service template

Before you bind a Hotspot 2.0 policy to a service template, make sure the following settings are configured for the service template:

·     802.1X authentication and key management mode.

·     RSN IE.

·     AES-CCMP cipher suite.

To bind a Hotspot 2.0 policy to a service template:

 

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Enter service template view.

wlan service-template service-template-name

N/A

3.     Bind a Hotspot 2.0 policy to the service template.

hotspot-policy policy-number

By default, no Hotspot 2.0 policy is bound to a service template.

 

Configuring AP venue information

AP venue information indicates the location of APs and helps clients connect to an optimal AP.

To configure AP venue information:

 

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Enter AP view.

wlan ap ap-name [ model model-name ]

N/A

3.     Specify the venue group and venue type for the AP.

venue group venue-group-number type venue-type-number

By default, no venue group and venue type are specified for an AP.

4.     Set a venue name for the AP.

venue name venue-name lang-code lang-code

By default, no venue name is set for an AP.

 

Configuring a OSU server

This task is required only for version 2 of Hotspot 2.0.

To configure an OSU server:

 

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Create an OSU server and enter its view, or enter the view of an existing OSU server.

wlan osu-provider osu-provider-number

By default, no OSU server exists.

3.     Set a name for the OSU server.

friendly-name friendly-name lang-code lang-code

By default, no name is set for an OSU server.

4.     Specify the URI of the OSU server.

uri uri

By default, no URI is specified for an OSU server.

5.     Specify a protocol for clients to communicate with the OSU server.

method method-id

By default, no method is specified for clients to communicate with an OSU server.

6.     Specify an icon for the OSU server.

icon-file filename lang-code lang-code icon-type icon-type

By default, no icon is specified for an OSU server.

Before specifying an icon for an OSU server, make sure directory icon has been created by using the mkdir command in the root directory where the version files are saved. Then use FTP or TFTP to download icon files to the directory.

7.     (Optional.) Configure a description for the OSU server.

description description lang-code lang-code

By default, no description is configured for an OSU server.

8.     (Optional.) Configure a Network Access Identifier (NAI) for the OSU server.

nai nai

By default, no NAI is configured for an OSU server.

 

Setting an SSID for online signup services

This task is required only for version 2 of Hotspot 2.0.

Hotspot 2.0 provides different SSIDs for online signup services and wireless services.

Make sure the configured SSID for online signup services is the same as the SSID for the online signup service template.

To set an SSID for online signup services:

 

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Enter Hotspot 2.0 policy view.

wlan hotspot-policy policy-number

N/A

3.     Set an SSID for online signup services.

osu-ssid ssid-name

By default, no SSID is set for online signup services.

 

Managing OSU server icons

This task is required only for version 2 of Hotspot 2.0.

Perform this task to load all icon files specified for an OSU server to validate the changes when icon file changes occur or to invalidate icon files.

To manage an OSU server icon:

 

Step

Command

1.     Enter system view.

system-view

2.     Manage OSU server icon files.

·     Load OSU server icon files:
wlan hotspot osu-icon upload

·     Unload OSU server icon files:
wlan hotspot osu-icon unload

 

Binding an OSU server to a Hotspot 2.0 policy

This task is required only for version 2 of Hotspot 2.0.

A Hotspot 2.0 policy can be bound to a maximum of 32 OSU servers.

Make sure all configuration required for an OSU server has been completed before binding the OSU server to a Hotspot 2.0 policy.

To bind an OSU server to a Hotspot 2.0 policy:

 

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Enter Hotspot 2.0 policy view.

wlan hotspot-policy policy-number

N/A

3.     Bind an OSU server to the Hotspot 2.0 policy.

osu-provider osu-provider-number

By default, no OSU server is bound to a Hotspot 2.0 policy.

 

Displaying and maintaining Hotspot 2.0

Execute display commands in any view.

 

Task

Command

Display service template information.

display wlan service-template [ service-template-name ] [ verbose ]

Display all the loaded OSU server icon files.

display wlan hotspot uploaded-osu-icon

 

Hotspot 2.0 configuration examples

iPhone application

Network requirements

As shown in Figure 5, configure Hotspot 2.0 to enable the phone to switch from the cellular network to the wireless network.

Figure 5 Network diagram

 

Configuration restrictions and guidelines

Make sure you have installed certificates and created a user account on the RADIUS server, so that client authentication, authorization, and accounting can operate correctly.

For more information about AAA, see Security Configuration Guide.

Configuration procedures

Configuring the AC

1.     Configure a Hotspot 2.0 policy:

# Create the Hotspot 2.0 policy 1.

<AC> system-view

[AC] wlan hotspot-policy 1

# Configure EAP-TLS authentication.

[AC-wlan-hs-1] nai-realm h3c.com eap-method 6 auth-method 2 authentication 4

# Set the domain name to h3c.com.

[AC-wlan-hs-1] domain-name h3c.com

# Set the HESSID to 1232-ff23-0123.

[AC-wlan-hs-1] hessid 1232-ff23-0123

[AC-wlan-hs-1] quit

2.     Configure 802.1X authentication and the RADIUS scheme:

# Configure the 802.1X authentication method as EAP.

[AC] dot1x authentication-method eap

# Create RADIUS scheme imcc.

[AC] radius scheme imcc

# Set the IP address and the port number of the primary authentication server to 10.18.1.88 and 1812, respectively.

[AC-radius-imcc] primary authentication 10.18.1.88 1812

# Set the IP address and the port number of the primary accounting server to 10.18.1.88 and 1813, respectively.

[AC-radius-imcc] primary accounting 10.18.1.88 1813

# Set the shared key for the AC to exchange packets with the authentication and accounting servers to 12345678.

[AC-radius-imcc] key authentication simple 12345678

[AC-radius-imcc] key accounting simple 12345678

# Configure the AC to remove the domain name in the username sent to the RADIUS servers.

[AC-radius-imcc] user-name-format without-domain

[AC-radius-imcc] quit

3.     Create the domain imc and configure the domain to use the RADIUS scheme imcc for authentication, authorization, and accounting.

[AC] domain imc

[AC-isp-imc] authentication lan-access radius-scheme imcc

[AC-isp-imc] authorization lan-access radius-scheme imcc

[AC-isp-imc] accounting lan-access radius-scheme imcc

[AC-isp-imc] quit

Configuring the AP

# Create the service template service1.

<AC> system-view

[AC] wlan service-template service1

# Set the SSID to service.

[AC-wlan-st-service1] ssid service

# Bind the Hotspot 2.0 policy 1 to the service template.

[AC-wlan-st-service1] hotspot-policy 1

# Enable the RSN IE in beacons and probe responses.

[AC-wlan-st-service1] security-ie rsn

# Enable the AES-CCMP cipher suite.

[AC-wlan-st-service1] cipher-suite ccmp

# Set the authentication and key management mode to 802.1X.

[AC-wlan-st-service1] akm mode dot1x

# Set the authentication mode for WLAN clients to 802.1X.

[AC-wlan-st-service1] client-security authentication-mode dot1x

# Specify the domain imc as the authentication domain.

[AC-wlan-st-service1] dot1x domain imc

# Enable the service template.

[AC-wlan-st-service1] service-template enable

[AC-wlan-st-service1] quit

# Create the AP ap1, and specify the AP model and serial ID.

[AC] wlan ap ap1 model WA4320i-ACN

[AC-wlan-ap-ap1] serial-id 219801A0CNC138011454

# Bind the service template service1 to radio 2 of the AP.

[AC-wlan-ap-ap1] radio 2

[AC-wlan-ap-ap1-radio-2] radio enable

[AC-wlan-ap-ap1-radio-2] service-template service1

[AC-wlan-ap-ap1-radio-2] quit

[AC-wlan-ap-ap1] quit

Configuring the RADIUS server (IMCv7)

This example was created on IMC PLAT 7.1 and IMC UAM 7.1.

To configure the IMC server:

1.     Log in to the IMC platform.

2.     Click the User tab.

3.     Add an access device:

a.     From the navigation tree, select User Access Policy > Access Device Management > Access Device.

b.     On the access device configuration page, click Add.

c.     On the Add Access Device page, configure the following parameters:

-     Set the shared key to 12345678.

-     Select or manually add the device with the IP address 10.18.1.1 (IP address of the AC).

-     Use the default settings for other parameters.

d.     Click OK.

Figure 6 Adding an access device

英文增加接入设备图.jpg

 

4.     Add an access policy:

a.     From the navigation tree, select User Access Policy > Access Policy.

b.     On the access policy configuration page, click Add.

c.     On the Add Access Policy page, configure the following parameters:

-     Set the access policy name to 802.1X_policy.

-     Select EAP-PEAP Authentication from the Certificate Type list, and from the Certificate Sub-Type list, select the certificate sub-type, which must be the same as the authentication method for the client.

-     Use the default settings for other parameters.

Figure 7 Adding an access policy

 

5.     Add an access service:

a.     From the navigation tree, select User Access Policy > Access Service.

b.     On the access service configuration page, click Add.

c.     On the Add Access Service page, configure the service name as 802.1X_ser, and use the 802.1X policy you have created as the default access policy.

d.     Use the default settings for other parameters.

Figure 8 Adding an access service

 

6.     Add an access user:

a.     From the navigation tree, select Access User > All Access Users.

b.     On the access user configuration page, click Add.

c.     On the Add Access User page, click Add User.

d.     On the Add User window, configure the following parameters:

-     Set the username to admin.

-     Set the account name to admin.

-     Select the 802.1X user 802.1X_ser you have configured in the Access Service area..

Figure 9 Adding an access user

 

Configuring the phone

This example was created using an iPhone 5S.

To configure the phone:

1.     Install the Apple Configurator App on the MacBook Air and connect iPhone 5S to the laptop.

Figure 10 Apply Configurator App

 

2.     Open the Apple Configurator App and select Supervise from the top menu. Then click + under the Profiles list and select Create New Profile.

Figure 11 Creating a new profile

3.     Click General on the left navigation tree, and enter h3c.com in the Name field. Other parameters are optional.

Figure 12 General settings

 

4.     Click Wi-Fi on the left navigation tree and click Configure from the menu. Then select Passpoint from the Network Type list.

Figure 13 Enabling passpoint

 

5.     On the page that appears, perform the following tasks:

¡     In the Accepted EAP Types area, select PEAP.

¡     Enter admin and 12345678 in the Username area and Password area, respectively.

¡     Select None from the Identity Certificate list.

¡     Enter admin in the Outer Identity area.

Figure 14 Configuring EAP-PEAP authentication

 

¡     Enter h3c.com in the Provider Display Name field and enter the domain name that you have configured in the hotspot policy on the AC.

Figure 15 Configuring the domain name

 

¡     Leave Roaming Consortium Ols, NAI Real Names, and MCC/MNC blank, or enter the values you have configured in the hotspot policy on the AC. Then click Save.

Figure 16 Configuring other options

 

6.     Click Prepare and then click Install Profiles on the Settings tab.

Figure 17 Installing profiles

 

7.     Click Next.

Figure 18 Installing profiles

 

8.     Select the profile h3c.com and click Next.

Figure 19 Selecting the created profile

 

9.     Click Install.

Figure 20 Installing the profile

 

After the installation is complete, the Apple Configurator page displays Install Succeeded and all configuration will be deployed to iPhone 5S. When the phone finds the service it needs, it automatically joins the WLAN.

Figure 21 Installation complete

 

Verifying the configuration

# Verify that the phone can automatically connect to the WLAN service.

[AC] display wlan client verbose

Total number of clients: 1                                                     

                                                                               

 MAC address                       : 6021-c05d-19e0                            

 IPv4 address                      : 105.0.0.5                                 

 IPv6 address                      : N/A                                       

 Username                          : dongxixi                                  

 AID                               : 1                                         

 AP ID                             : 2                                         

 AP name                           : ap1                                       

 Radio ID                          : 2                                         

 SSID                              : dongxixi                                  

 BSSID                             : 70f9-6dd7-cfd0                            

 VLAN ID                           : 1                                         

 Sleep count                       : 0                                         

 Wireless mode                     : 802.11gn                                   

 Channel bandwidth                 : 20MHz                                     

 SM power save                     : Enabled                                   

 SM power save mode                : Static                                     

 Short GI for 20MHz                : Supported                                 

 Short GI for 40MHz                : Not supported                             

 STBC RX capability                : Not supported                              

 STBC TX capability                : Not supported                             

 LDPC RX capability                : Not supported                             

 Block Ack                         : TID 0  In                                 

 Support HT-MCS set                : 0, 1, 2, 3, 4, 5, 6, 7                    

 Supported rates                   : 1, 2, 5.5, 6, 9, 11,                      

                                     12, 18, 24, 36, 48, 54 Mbps               

 QoS mode                          : WMM                                       

 Listen interval                   : 10                                        

 RSSI                              : 49                                        

 Rx/Tx rate                        : 1/72.2 Mbps                               

 Authentication method             : Open system                               

 Security mode                     : RSN                                       

 AKM mode                          : 802.1X                                    

 Cipher suite                      : CCMP                                      

 User authentication mode          : 802.1X                                    

 Authorization ACL ID              : N/A                                       

 Authorization user profile        : N/A                                       

 Roam status                       : N/A                                       

 Key derivation                    : SHA1                                      

 PMF status                        : N/A                                       

 Forwarding policy name            : N/A                                       

 Online time                       : 0days 0hours 0minutes 36seconds           

 FT status                         : Inactive            

Samsung application

Network requirements

As shown in Figure 22, configure Hotspot 2.0 to enable the phone to switch from the cellular network to the wireless network.

Figure 22 Network diagram

 

Configuration restrictions and guidelines

When you configure Hotspot 2.0, follow these restrictions and guidelines:

·     Make sure you have installed certificates and created a user account on the RADIUS server, so that client authentication, authorization, and accounting can operate correctly.

·     Make sure you have configured 802.1X and installed the certificate on the phone.

·     For more information about AAA, see Security Configuration Guide.

Configuration procedures

Configuring the AC

1.     Configure the Hotspot 2.0 policy:

# Create the Hotspot 2.0 policy 1.

<AC> system-view

[AC] wlan hotspot-policy 1

# Configure EAP-TLS authentication.

[AC-wlan-hs-1] nai-realm abc.com eap-method 6 auth-method 2 authentication 4

# Set the domain name to domain.abc.com.

[AC-wlan-hs-1] domain-name domain.abc.com

# Set the HESSID to 1232-ff23-0123, the MAC address of the AP.

[AC-wlan-hs-1] hessid 1232-ff23-0123

[AC-wlan-hs-1] quit

2.     Configure 802.1X authentication and the RADIUS scheme:

# Configure the 802.1X authentication method as EAP.

[AC] dot1x authentication-method eap

# Create the RADIUS scheme imcc.

[AC] radius scheme imcc

# Set the IP address and the port number of the primary authentication server to 10.18.1.88 and 1812, respectively.

[AC-radius-imcc] primary authentication 10.18.1.88 1812

# Set the IP address and the port number of the primary accounting server to 10.18.1.88 and 1813, respectively.

[AC-radius-imcc] primary accounting 10.18.1.88 1813

# Set the shared key for the AC to exchange packets with the authentication and accounting servers to 12345678.

[AC-radius-imcc] key authentication simple 12345678

[AC-radius-imcc] key accounting simple 12345678

# Configure the AC to remove the domain name in the username sent to the RADIUS servers.

[AC-radius-imcc] user-name-format without-domain

[AC-radius-imcc] quit

3.     Create the domain imc and configure the domain to use the RADIUS scheme imcc for authentication, authorization, and accounting.

[AC] domain imc

[AC-isp-imc] authentication lan-access radius-scheme imcc

[AC-isp-imc] authorization lan-access radius-scheme imcc

[AC-isp-imc] accounting lan-access radius-scheme imcc

[AC-isp-imc] quit

Configuring the AP

# Create the service template service1.

<AC> system-view

[AC] wlan service-template service1

# Set the SSID to service.

[AC-wlan-st-service1] ssid service

# Bind the Hotspot 2.0 policy 1 to the service template.

[AC-wlan-st-service1] hotspot-policy 1

# Enable the RSN IE in beacons and probe responses.

[AC-wlan-st-stname] security-ie rsn

# Enable the AES-CCMP cipher suite.

[AC-wlan-st-service1] cipher-suite ccmp

# Set the authentication and key management mode to 802.1X.

[AC-wlan-st-service1] akm mode dot1x

# Set the authentication mode for WLAN clients to 802.1X.

[AC-wlan-st-service1] client-security authentication-mode dot1x

# Specify the domain imc as the authentication domain.

[AC-wlan-st-service1] dot1x domain imc

# Enable the service template.

[AC-wlan-st-service1] service-template enable

[AC-wlan-st-service1] quit

# Create the AP ap1, and specify the AP model and serial ID.

[AC] wlan ap ap1 model WA4320i-ACN

[AC-wlan-ap-ap1] serial-id 219801A0CNC138011454

# Bind the service template service1 to radio 2 of the AP.

[AC-wlan-ap-ap1] radio 2

[AC-wlan-ap-ap1-radio-2] radio enable

[AC-wlan-ap-ap1-radio-2] service-template service1

[AC-wlan-ap-ap1-radio-2] quit

[AC-wlan-ap-ap1] quit

Configuring the RADIUS server (IMCv7)

This example was created on IMC PLAT 7.1 and IMC UAM 7.1.

To configure the IMC server:

1.     Log in to the IMC platform.

2.     Click the User tab.

3.     Add an access device:

a.     From the navigation tree, select User Access Policy > Access Device Management > Access Device.

b.     On the access device configuration page, click Add.

c.     On the Add Access Device page, configure the following parameters:

-     Set the shared key to 12345678.

-     Select or manually add the device with the IP address 10.18.1.1 (IP address of the AC).

-     Use the default settings for other parameters.

d.     Click OK.

Figure 23 Adding an access device

英文增加接入设备图.jpg

 

4.     Add an access policy:

a.     From the navigation tree, select User Access Policy > Access Policy.

b.     On the access policy configuration page, click Add.

c.     On the Add Access Policy page, configure the following parameters:

-     Set the access policy name to 802.1X_policy.

-     Select EAP-PEAP Authentication from the Certificate Type list, and from the Certificate Sub-Type list, select the certificate sub-type, which must be the same as the authentication method for the client.

-     Use the default settings for other parameters.

Figure 24 Adding an access policy

 

5.     Add an access service:

a.     From the navigation tree, select User Access Policy > Access Service.

b.     On the access service configuration page, click Add.

c.     On the Add Access Service page, configure the service name as 802.1X_ser, and use the 802.1X policy you have created as the default access policy.

d.     Use the default settings for other parameters.

Figure 25 Adding an access service

 

6.     Add an access user:

a.     From the navigation tree, select Access User > All Access Users.

b.     On the access user configuration page, click Add.

c.     On the Add Access User page, click Add User.

d.     On the Add User window, configure the following parameters:

-     Set the username to admin.

-     Set the account name to admin.

-     Select the 802.1X user 802.1X_ser you have configured in the Access Service area..

Figure 26 Adding an access user

 

Configuring the phone

IMPORTANT

IMPORTANT:

·     Configure the same realm name and domain for both the phone and the Hotspot 2.0 policy on the AC.

·     Configure the same username and password for both the phone and the RADIUS server.

·     Configure the same authentication type for the phone, the Hotspot 2.0 policy on the AC, and the RADIUS server.

 

This example was created using Samsung S4.

To configure the phone:

1.     Use a text editor to edit the Hotspot 2.0 configuration file and save it with the name cred.conf on a PC or on the phone.

cred={

realm="abc.com"

username="admin"

password="12345678"

domain="domain.abc.com"

eap=PEAP

phase2="auth=MSCHAPV2"

}

2.     Save the configuration file in the root directory of the phone:

¡     If you edit the configuration file on a PC, use either of the following methods to import the configuration file to the phone and save it in the root directory:

-     Connect the phone to a PC by using a USB cable, and save the file cred.conf in the phone.

-     Send an email to the phone with the file cred.conf attached and save the file in the phone.

¡     If you edit the file on the phone by using a text editor, save it in the root directory of the phone.

3.     Turn on WLAN on the phone.

Figure 27 Turning on WLAN

 

4.     Click Advanced.

Figure 28 Configuring advanced WLAN settings

 

5.     On the Advanced page, enable Passpoint.

Figure 29 Enabling Passpoint

 

Verifying the configuration

# Verify that the phone can automatically connect to the WLAN service.

[AC] display wlan client verbose

Total number of clients: 1

 

MAC address                        : 000f-e265-6400

IPv4 address                       : 10.1.1.114

IPv6 address                       : 2001::1234:5678:0102:0304

Username                           : admin

AP ID                              : 1

AP name                            : ap1

Radio ID                           : 1

SSID                               : service

BSSID                              : 0026-3e08-1150

VLAN ID                            : 1

Power save mode                    : Active

Wireless mode                      : 802.11gn

Channel bandwidth                  : 20MHz

SM power save                      : Disabled

Short GI for 20MHz                 : Not supported

Short GI for 40MHz                 : Supported

Support MCS set                    : 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10

Block Ack (TID 0)                  : In

QoS mode                           : N/A

Listen interval                    : 10

RSSI                               : 62

Rx/Tx rate                         : 130/11 Mbps

Authentication method              : Open system

Hotspot 2.0 configuration examples (for version 2)

Network requirements

As shown in Figure 30, configure Hotspot 2.0 to enable the phone to switch from the cellular network to the wireless network.

Figure 30 Network diagram

 

Configuration restrictions and guidelines

When you configure Hotspot 2.0, follow these restrictions and guidelines:

·     For more information about AAA, see Security Configuration Guide.

·     Before uploading the OSU server icon, make sure the icon file is in the root directory where the version files are saved. You can use FTP or TFTP to transmit the icon file.

Configuration procedures

1.     Configure the OSU server:

# Create OSU server 1.

<AC> system-view

[AC] wlan osu-provider 1

# Set the name for the OSU server to osu_test.

[AC-wlan-osu-1] friendly-name osu_test lang-code eng

# Specify a URI for the OSU server.

[AC-wlan-osu-1] uri https://192.168.1.23:8088/service

# Set the protocol for clients to communicate with the OSU server to SOAP-XML SPP.

[AC-wlan-osu-1] method 1

# Specify an icon for the OSU server.

[AC-wlan-osu-1] icon-file test.png lang-code eng icon-type png

# Configure a description for the OSU server.

[AC-wlan-osu-1] description "The OSU provider." lang-code eng

# Configure the NAI.

[AC-wlan-osu-1] nai example.com

[AC-wlan-osu-1] quit

2.     Configure a Hotspot 2.0 policy:

# Create Hotspot 2.0 policy 1.

[AC] wlan hotspot-policy 1

# Specify the authentication type for NAI realm example.com.

[AC-wlan-hs-1] nai-realm example.com eap-method 5 auth-method 2 authentication 4

# Set the access network type to Wildcard.

[AC-wlan-hs-1] network-type 15

# Set the OI to 80F62E and add the OI to beacons.

[AC-wlan-hs-1] roam-oi 80F62E in-beacon

# Set the domain name to domain.com.

[AC-wlan-hs-1] domain-name domain.com

# Set the availability to 1 for both IPv4 addresses and IPv6 addresses.

[AC-wlan-hs-1] ip-type ipv4 1 ipv6 1

# Set the SSID for online signup services to osu-ssid.

[AC-wlan-hs-1] osu-ssid osu-ssid

# Bind OSU server 1 to Hotspot 2.0 policy 1.

[AC-wlan-hs-1] osu-provider 1

[AC-wlan-hs-1] quit

# Upload the specified OSU server icons if a specified icon file changes.

[AC] wlan hotspot osu-icon upload

3.     Configure a service template for online signup services:

# Create service template osu.

[AC] wlan service-template osu

# Set the SSID to osu-ssid.

[AC-wlan-st-osu] ssid osu-ssid

# Enable the service template.

[AC-wlan-st-osu] service-template enable

[AC-wlan-st-osu] quit

4.     Configure 802.1X authentication and the RADIUS server:

# Configure the 802.1X authentication method as EAP.

[AC] dot1x authentication-method eap

# Create RADIUS scheme imcc.

[AC] radius scheme imcc

# Set the IP address and the port number of the primary authentication server to 192.168.1.23 and 1813, respectively.

[AC-radius-imcc] primary authentication 192.168.1.23 1812

# Set the IP address and the port number of the primary accounting server to 192.168.1.23 and 1813, respectively.

[AC-radius-imcc] primary accounting 192.168.1.23 1813

# Set the shared key for the AC to exchange packets with the authentication and accounting server to 12345678.

[AC-radius-imcc] key authentication simple 12345678

[AC-radius-imcc] key accounting simple 12345678

# Configure the AC to remove the domain name in the username sent to the RADIUS servers.

[AC-radius-imcc] user-name-format without-domain

[AC-radius-imcc] quit

5.     Configure ISP domain:

# Create domain imc and configure the domain to use RADIUS scheme imcc for authentication, authorization, and accounting.

[AC] domain imc

[AC-isp-imc] authentication lan-access radius-scheme imcc

[AC-isp-imc] authorization lan-access radius-scheme imcc

[AC-isp-imc] accounting lan-access radius-scheme imcc

[AC-isp-imc] quit

6.     Configure a service template for wireless services:

# Create service template stname.

[AC] wlan service-template stname

# Set the SSID to service.

[AC-wlan-st-stname] ssid service

# Bind Hotspot 2.0 policy 1 to the service template.

[AC-wlan-st-stname] hotspot-policy 1

# Enable the RSN IE in beacons and probe responses.

[AC-wlan-st-stname] security-ie rsn

# Enable the AES-CCMP cipher suite.

[AC-wlan-st-stname] cipher-suite ccmp

[AC-wlan-st-stname] akm mode dot1x

# Set the authentication mode for WLAN clients to 802.1X.

[AC-wlan-st-stname] client-security authentication-mode dot1x

# Specify the domain imc as the authentication domain.

[AC-wlan-st-stname] dot1x domain imc

# Enable the service template.

[AC-wlan-st-stname] service-template enable

[AC-wlan-st-stname] quit

7.     Configure the AP:

# Create AP ap1, and specify the AP model and serial ID.

[AC] wlan ap ap1 model WA4320i-ACN

[AC-wlan-ap-ap1] serial-id 210235A1BSC123000050

# Set a venue name for the AP.

[AC-wlan-ap-ap1] venue name "H3C lab" lang-code eng

# Bind service template stname to radio 2 of the AP.

[AC-wlan-ap-ap1] radio 2

[AC-wlan-ap-ap1-radio-2] radio enable

[AC-wlan-ap-ap1-radio-2] service-template stname

[AC-wlan-ap-ap1-radio-2] service-template osu

[AC-wlan-ap-ap1-radio-2] quit

[AC-wlan-ap-ap1] quit

Verifying the configuration

# Verify that the OSU server icon has been loaded.

[AC] display wlan hotspot uploaded-osu-icon

Total number of icons: 1

Icon name                                                       Icon type

--------------------------------------------------------------------------------

test.png                                                        png

# Verify that the phone can automatically connect to the WLAN service.

[AC] display wlan client verbose

Total number of clients: 1

 

 MAC address                       : d022-bee8-a267

 IPv4 address                      : 192.168.1.52

 IPv6 address                      : N/A

 Username                          : abcd

 AID                               : 2

 AP ID                             : 1

 AP name                           : ap1

 Radio ID                          : 2

 SSID                              : service

 BSSID                             : 5866-ba74-e790

 VLAN ID                           : 1

 Sleep count                       : 37

 Wireless mode                     : 802.11gn

 Channel bandwidth                 : 20MHz

 SM power save                     : Disabled

 Short GI for 20MHz                : Supported

 Short GI for 40MHz                : Not supported

 STBC RX capability                : Supported

 STBC TX capability                : Not supported

 LDPC RX capability                : Not supported

 Block Ack                         : TID 0  Both

                                     TID 2  Out

 Supported HT MCS set              : 0, 1, 2, 3, 4, 5, 6, 7

 Supported rates                   : 1, 2, 5.5, 6, 9, 11,

                                     12, 18, 24, 36, 48, 54 Mbps

 QoS mode                          : WMM

 Listen interval                   : 10

 RSSI                              : 45

 Rx/Tx rate                        : 72.2/72.2 Mbps

 Authentication method             : Open system

 Security mode                     : RSN

 AKM mode                          : 802.1X

 Cipher suite                      : CCMP

 User authentication mode          : 802.1X

 Authorization ACL ID              : N/A

 Authorization user profile        : N/A

 Roam status                       : N/A

 Key derivation                    : SHA1

 PMF status                        : N/A

 Forwarding policy name            : N/A

 Online time                       : 0days 0hours 1minutes 29seconds

 FT status                         : Inactive

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网