02-WLAN Configuration Guide

HomeSupportConfigure & DeployConfiguration GuidesH3C Access Controllers Configuration Guides(E3703P61 R2509P61 R3709P61 R2609P61 R3509P61)-6W10202-WLAN Configuration Guide
04-IACTP Tunnel and WLAN Roaming Configuration
Title Size Download
04-IACTP Tunnel and WLAN Roaming Configuration 291.86 KB

Configuring IACTP tunnel and WLAN roaming

Support for this feature depends on the device model. For more information, see About the H3C Access Controllers Configuration Guides.

For a client to remain in the same VLAN during WLAN roaming, enable MAC VLAN.

IACTP tunnel

The Inter AC Tunneling Protocol (IACTP) is an H3C-proprietary protocol that provides a generic packet encapsulation and transport mechanism for ACs to securely communicate with each other.

IACTP provides a control tunnel to exchange control messages, and a data tunnel to transmit data packets between ACs. IACTP supports both IPv4 and IPv6.

WLAN roaming, AC backup, and AC-BAS collaboration must support IACTP for inter-AC communication.

WLAN roaming overview

WLAN roaming enables clients to roam between ACs in a mobility group or within an AC. ACs in a mobility group communicate with each other through IACTP tunnels.

When a client supporting fast roaming associates to one of the ACs in a mobility group for the first time, the AC (called the HA) performs 802.1X authentication and 11 Key exchange for the client. The client information is synchronized across ACs in the mobility group. When this client roams to another AC in the mobility group (called the FA), the FA uses stored client information to fast authenticate the client by skipping 802.1X authentication and performing only 802.11 key exchange and associates with the client.

Terminology

·     HAThe AC to which a wireless client is connected by associating with an AP for the first time is the HA of the client.

·     FAAn AC that is other than the HA and to which a client is currently connected is an FA of the client.

·     Fast-roam clientA wireless client that associates with an AC in the mobility-group and supports fast roaming (only key caching is supported).

·     Roam-out clientA wireless client that has associated with an AC other than the HA in the mobility-group is a roam-out client at its HA.

·     Roam-in clientA wireless client that has associated with an AC other than the HA in the mobility-group is a roam-in client at the FA.

·     Intra-AC roamingA procedure where a wireless client roams from one AP to another AP. The APs are connected to the same AC.

·     Inter-AC roamingA procedure where a wireless client roams from one AP to another AP. The APs are connected to different ACs.

·     Inter-AC fast roaming capabilityIf a client uses 802.1X (RSN) authentication through negotiation and supports key caching, this client has inter-AC fast roaming capability.

WLAN roaming topologies

WLAN roaming topologies contain the following types:

·     Intra-AC roaming topology

·     Inter-AC roaming topology

·     Intra-FA roaming topology

·     Inter-FA roaming topology

·     Roam-back topology

Intra-AC roaming

Figure 1 Intra-AC roaming

 

1.     A client is associated with AP 1, which is connected to an AC.

2.     The client disassociates with AP 1 and roams to AP 2 connected to the same AC.

3.     The client is associated with AP 2 through intra-AC roam association.

Inter-AC roaming

Figure 2 Inter-AC roaming

 

1.     A client is associated with AP 1, which is connected to AC 1.

2.     The client disassociates with AP 1 and roams to AP 2 connected to AC 2.

3.     The client is associated with AP 2 through inter-AC roam association. Before inter-AC roaming, AC 1 must synchronize the client information with AC 2 through an IACTP tunnel.

Intra-FA roaming

Figure 3 Intra-FA roaming

 

1.     A client associates with AP 1.

2.     The client disassociates with AP 1 and roams to AP 2 connected to AC 2. Now AC 2 is the FA for the client.

3.     The client is associated with AP 2 through inter-AC roam association. Before inter-AC roaming, AC 1 must synchronize the client information with AC 2 through an IACTP tunnel.

4.     The client then disassociates with AP 2 and roams to AP 3 which is also connected to AC 2. The client is associated with AP 3 through intra-FA roam association.

Inter-FA roaming

Figure 4 Inter-FA roaming

 

1.     A client is associated with AP 1, which is connected to AC 1.

2.     The client disassociates with AP 1 and roams to AP 2 connected to AC 2. Now AC 2 is the FA for the client.

3.     The client is associated with AP 2 through inter-AC roam association.

4.     The client then disassociates with AP 2 and roams to AP 3 which is connected to AC 3, which now is its FA. Before inter-AC roaming, AC 1 must synchronize the client information with AC 2 and AC 3 through IACTP tunnels.

Roam-back

Figure 5 Roam-back

 

1.     A client is associated with AP 1, which is connected to AC 1.

2.     The client disassociates with AP 1 and roams to AP 3 connected to AC 2. Now AC 2 is the FA for the client.

3.     The client is associated with AP 3 through inter-AC roam association. Before inter-AC roaming, AC 1 must synchronize the client information with AC 2 through an IACTP tunnel.

4.     The client then disassociates with AP 3 and roams back to AP 2 or AP 1 connected to AC 1, which is its HA.

Configuring a mobility group

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Create a mobility group and enter mobility group view.

wlan mobility-group name

ACs in the same mobility group must have the same group name.

3.     Set the IACTP tunnel protocol type.

mobility-tunnel { iactp | iactp6 }

Optional.

By default, the IACTP tunnel protocol type is IPv4.

4.     Set the tunnel source IP address.

source { ip ipv4-address | ipv6 ipv6-address }

By default, no source IP address is configured.

5.     Add a group member.

member { ip ipv4-address | ipv6 ipv6-address } [ vlan vlan-id-list ]

By default, no ACs exist in a mobility group.

6.     Configure the IACTP control message integrity authentication mode.

authentication-mode authentication-method [ cipher | simple ] authentication-key

Optional.

By default, IACTP control message integrity authentication is disabled.

7.     Enable the IACTP service for the group.

mobility-group enable

By default, IACTP service is disabled.

 

ACs in a mobility group must have the same user profile configurations. For more information about user profile, see Security Configuration Guide.

Isolating tunnels in a mobility group

This feature ensures that tunnels in a mobility group do not forward packets to each other.

To isolate tunnels in a mobility group:

 

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Isolate tunnels in a mobility group.

wlan mobility-group-isolation enable

By default, tunnel isolation in a mobility group is enabled.

 

Enabling WLAN roaming

To enable clients to roam between ACs, configure a mobility group and then enable WLAN roaming on the ACs.

To enable WLAN roaming:

 

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Enter mobility group view.

wlan mobility-group name

N/A

3.     Enable WLAN roaming.

roam enable

Optional.

By default, WLAN roaming is enabled.

Before you enable or disable WLAN roaming, make sure mobility group is disabled.

 

Displaying and maintaining WLAN roaming

Task

Command

Remarks

Display mobility group information.

display wlan mobility-group [ member { ip IPv4-address | ipv6 IPv6-address } ] [ | { begin | exclude | include } regular-expression ]

Available in any view.

Display the roam-track information of a client on the HA.

display wlan client roam-track mac-address mac-address [ | { begin | exclude | include } regular-expression ]

Available in any view.

Display the WLAN client roaming information.

display wlan client { roam-in | roam-out } [ member { ip IPv4-address | ipv6 IPv6-address } ] [ verbose ] [ | { begin | exclude | include } regular-expression ]

Available in any view.

 

WLAN roaming configuration examples

Intra-AC roaming configuration example

Network requirements

As shown in Figure 6, an AC has two APs associated and all of them are in VLAN 1. A client is associated with AP 1. Configure intra-AC roaming so that the client can associate with AP 2 when roaming to AP 2.

Figure 6 Network diagram

 

Configuration procedure

For wireless service configuration, see "Configuring WLAN access." A client has inter-AC fast roaming capability only if it uses 802.1X (RSN) authentication.

If you select an authentication mode involving remote authentication, configure the corresponding RADIUS server. For more information, see "Configuring WLAN security."

1.     Configure the AC:

# Set the port security mode for WLAN-ESS1 to userlogin-secure-ext, and enable the key negotiation function on the port.

<AC> system-view

[AC] interface wlan-ess 1

[AC-WLAN-ESS1] port-security port-mode userlogin-secure-ext

[AC-WLAN-ESS1] port-security tx-key-type 11key

# Disable the multicast trigger function and the online user handshake function.

[AC-WLAN-ESS1] undo dot1x multicast-trigger

[AC-WLAN-ESS1] undo dot1x handshake

[AC-WLAN-ESS1] quit

# Create service template 1 of crypto type, set its SSID to intra-roam, and bind WLAN-ESS1 to the service template.

[AC] wlan service-template 1 crypto

[AC-wlan-st-1] ssid intra-roam

[AC-wlan-st-1] bind wlan-ess 1

# Enable open system authentication and enable the CCMP cipher suite.

[AC-wlan-st-1] authentication-method open-system

[AC-wlan-st-1] cipher-suite ccmp

[AC-wlan-st-1] security-ie rsn

[AC-wlan-st-1] quit

# Enable port security.

[AC] port-security enable

# Set the 802.1X authentication method to EAP.

[AC] dot1x authentication-method eap

# Create a RADIUS scheme rad, and set the extended RADIUS server type.

[AC] radius scheme rad

[AC-radius-rad] server-type extended

# Set the IP addresses of the primary authentication server and accounting server to 10.18.1.5.

[AC-radius-rad] primary authentication 10.18.1.5

[AC-radius-rad] primary accounting 10.18.1.5

# Set the shared key for RADIUS authentication/accounting packets to 12345678.

[AC-radius-rad] key authentication 12345678

[AC-radius-rad] key accounting 12345678

# Set the source IP address of RADIUS packets sent by the AC to 10.18.1.1.

[AC-radius-rad] nas-ip 10.18.1.1

[AC-radius-rad] quit

# Create ISP domain cams and configure the ISP domain cams to use RADIUS scheme rad to implement authentication, authorization, and accounting for all types of users.

[AC] domain cams

[AC-isp-cams] authentication default radius-scheme rad

[AC-isp-cams] authorization default radius-scheme rad

[AC-isp-cams] accounting default radius-scheme rad

[AC-isp-cams] quit

# Configure the mandatory authentication domain cams for 802.1X users on WLAN-ESS1.

[AC] interface WLAN-ESS 1

[AC-WLAN-ESS1] dot1x mandatory-domain cams

[AC-WLAN-ESS1] quit

# Create an AP template named ap1, and specify the AP model and serial ID.

[AC] wlan ap ap1 model WA3628i-AGN

[AC-wlan-ap-ap1] serial-id 210235A045B05B1236548

[AC-wlan-ap-ap1] radio 1 type dot11an

# Bind service template 1 to radio 1.

[AC-wlan-ap-ap1-radio-1] service-template 1

[AC-wlan-ap-ap1-radio-1] radio enable

[AC-wlan-ap-ap1-radio-1] quit

[AC-wlan-ap-ap1] quit

# Enable service template 1.

[AC] wlan service-template 1

[AC-wlan-st-1] service-template enable

[AC-wlan-st-1] quit

# Create an AP template named ap2, and specify the AP model and serial ID.

[AC] wlan ap ap2 model WA3628i-AGN

[AC-wlan-ap-ap2] serial-id 210235A22W0076000103

[AC-wlan-ap-ap2] radio 1 type dot11an

# Bind service template 1 to radio 1 of AP 2. Intra-AC roaming requires consistent SSIDs of different APs. Therefore, radio 1 of AP 2 must be bound to service template 1.

[AC-wlan-ap-ap2-radio-1] service-template 1

[AC-wlan-ap-ap2-radio-1] radio enable

[AC-wlan-ap-ap2-radio-1] return

2.     Verify the configuration:

After the client roams to AP 2, use the display wlan client verbose command to display detailed client information. You should find that the AP name and BSSID fields have been changed to those of AP 2. You can also use the display wlan client roam-track mac-address command to view client roaming track information.

Inter-AC roaming configuration example

Network requirements

As shown in Figure 7, configure inter-AC roaming so that the client can associate with AP2 when roaming to it.

Figure 7 Network diagram

 

Configuration procedure

For wireless service configuration, see "Configuring WLAN access." A client has inter-AC fast roaming capability only if it uses 802.1X (RSN) authentication through negotiation.

If you select an authentication mode involving remote authentication, configure the corresponding RADIUS server. For more information, see "Configuring WLAN security."

1.     Configure AC 1:

# Set the port security mode for WLAN-ESS1 to userlogin-secure-ext, and enable the key negotiation function on the port.

<AC1> system-view

[AC1] interface wlan-ess 1

[AC1-WLAN-ESS1] port-security port-mode userlogin-secure-ext

[AC1-WLAN-ESS1] port-security tx-key-type 11key

# Disable the multicast trigger function and the online user handshake function.

[AC1-WLAN-ESS1] undo dot1x multicast-trigger

[AC1-WLAN-ESS1] undo dot1x handshake

[AC1-WLAN-ESS1] quit

# Create service template 1 of crypto type, set its SSID to inter-roam, and bind WLAN-ESS1 to inter-roam.

[AC1] wlan service-template 1 crypto

[AC1-wlan-st-1] ssid inter-roam

[AC1-wlan-st-1] bind wlan-ess 1

# Enable open system authentication and enable the CCMP cipher suite.

[AC1-wlan-st-1] authentication-method open-system

[AC1-wlan-st-1] cipher-suite ccmp

[AC1-wlan-st-1] security-ie rsn

[AC1-wlan-st-1] quit

# Enable port security.

[AC1] port-security enable

# Set the 802.1X authentication method to EAP.

[AC1] dot1x authentication-method eap

# Create a RADIUS scheme rad, and set the extended RADIUS server type.

[AC1] radius scheme rad

[AC1-radius-rad] server-type extended

# Set the IP addresses of the primary authentication server and accounting server to 10.18.1.5.

[AC1-radius-rad] primary authentication 10.18.1.5

[AC1-radius-rad] primary accounting 10.18.1.5

# Set the shared key for RADIUS authentication/accounting packets to 12345678.

[AC1-radius-rad] key authentication 12345678

[AC1-radius-rad] key accounting 12345678

# Set the source IP address of RADIUS packets sent by the AC to 10.18.1.1.

[AC1-radius-rad] nas-ip 10.18.1.1

[AC1-radius-rad] quit

# Configure ISP domain cams to use RADIUS scheme rad to implement authentication, authorization, and accounting for all types of users.

[AC1] domain cams

[AC1-isp-cams] authentication default radius-scheme rad

[AC1-isp-cams] authorization default radius-scheme rad

[AC1-isp-cams] accounting default radius-scheme rad

[AC1-isp-cams] quit

# Configure the mandatory authentication domain cams for 802.1X users on WLAN-ESS1.

[AC1] interface WLAN-ESS 1

[AC1-WLAN-ESS1] dot1x mandatory-domain cams

[AC1-WLAN-ESS1] quit

# Create an AP template named ap1, and specify the AP model and serial ID.

[AC1] wlan ap ap1 model WA3628i-AGN

[AC1-wlan-ap-ap1] serial-id 210235A045B05B1236548

[AC1-wlan-ap-ap1] radio 1 type dot11an

# Bind service template inter-roam to radio 1.

[AC1-wlan-ap-ap1-radio-1] service-template 1

[AC1-wlan-ap-ap1-radio-1] radio enable

[AC1-wlan-ap-ap1-radio-1] quit

[AC1-wlan-ap-ap1] quit

# Enable service template 1.

[AC1] wlan service-template 1

[AC1-wlan-st-1] service-template enable

[AC1-wlan-st-1] quit

# Create mobility group roam, set the tunnel source IP to 10.18.1.1, and set the IP address for AC 2 to 10.18.1.2.

[AC1] wlan mobility-group roam

[AC1-wlan-mg-roam] source ip 10.18.1.1

[AC1-wlan-mg-roam] member ip 10.18.1.2

[AC1-wlan-mg-roam] mobility-group enable

# Enable WLAN roaming (by default, WLAN roaming is enabled, so this step is optional.).

[AC1-wlan-mg-roam] roam enable

# Enable mobility group.

[AC1-wlan-mg-roam] mobility-group enable

2.     Configure AC 2:

# Set the port security mode for WLAN-ESS1 to userlogin-secure-ext, and enable the key negotiation function on the port.

<AC2> system-view

[AC2] interface wlan-ess 1

[AC2-WLAN-ESS1] port-security port-mode userlogin-secure-ext

[AC2-WLAN-ESS1] port-security tx-key-type 11key

# Disable the multicast trigger function and the online user handshake function.

[AC2-WLAN-ESS1] undo dot1x multicast-trigger

[AC2-WLAN-ESS1] undo dot1x handshake

[AC2-WLAN-ESS1] quit

# Create service template 1 of crypto type, set its SSID to inter-roam, and bind WLAN-ESS1 to intra-roam.

[AC2] wlan service-template 1 crypto

[AC2-wlan-st-1] ssid inter-roam

[AC2-wlan-st-1] bind wlan-ess 1

# Enable open system authentication and enable the CCMP cipher suite.

[AC2-wlan-st-1] authentication-method open-system

[AC2-wlan-st-1] cipher-suite ccmp

[AC2-wlan-st-1] security-ie rsn

[AC2-wlan-st-1] quit

# Enable port security.

[AC2] port-security enable

# Set the 802.1X authentication method to EAP.

[AC2] dot1x authentication-method eap

# Create a RADIUS scheme rad, and set the extended RADIUS server type.

[AC2] radius scheme rad

[AC2-radius-rad] server-type extended

# Set the IP addresses of the primary authentication server and accounting server to 10.18.1.88.

[AC2-radius-rad] primary authentication 10.18.1.5

[AC2-radius-rad] primary accounting 10.18.1.5

# Set the shared key for RADIUS authentication/accounting packets to 12345678.

[AC2-radius-rad] key authentication 12345678

[AC2-radius-rad] key accounting 12345678

# Set the source IP address for the AC to send RADIUS packets to 10.18.1.2.

[AC2-radius-rad] nas-ip 10.18.1.2

[AC2-radius-rad] quit

# Configure AAA domain cams by referencing RADIUS scheme rad.

[AC2] domain cams

[AC2-isp-cams] authentication default radius-scheme rad

[AC2-isp-cams] authorization default radius-scheme rad

[AC2-isp-cams] accounting default radius-scheme rad

[AC2-isp-cams] quit

# Configure the 802.1X authentication domain by referencing AAA domain cams.

[AC2] interface WLAN-ESS 1

[AC2-WLAN-ESS1] dot1x mandatory-domain cams

[AC2-WLAN-ESS1] quit

# Create an AP template named ap2, and specify the AP model and serial ID.

[AC2] wlan ap ap2 model WA3628i-AGN

[AC2-wlan-ap-ap2] serial-id 210235A22W0076000103

[AC2-wlan-ap-ap2] radio 1 type dot11an

# Bind service template inter-roam to radio 1 of AP 2. (Inter-AC roaming requires consistent SSIDs of APs. Therefore, radio 1 of AP 2 must be bound to service template inter-roam.)

[AC2-wlan-ap-ap2-radio-1] service-template 1

[AC2-wlan-ap-ap2-radio-1] radio enable

[AC2-wlan-ap-ap2-radio-1] quit

[AC2-wlan-ap-ap2] quit

# Enable service template 1.

[AC2] wlan service-template 1

[AC2-wlan-st-1] service-template enable

[AC2-wlan-st-1] quit

# Create mobility group roam, set the tunnel source IP to 10.18.1.2, and set the IP address for AC 2 to 10.18.1.1.

[AC2] wlan mobility-group roam

[AC2-wlan-mg-roam] source ip 10.18.1.2

[AC2-wlan-mg-roam] member ip 10.18.1.1

[AC2-wlan-mg-roam] mobility-group enable

# Enable WLAN roaming (by default, WLAN roaming is enabled, so this step is optional.).

[AC2-wlan-mg-roam] roam enable

# Enable mobility group.

[AC2-wlan-mg-roam] mobility-group enable

3.     Verify the configuration:

You can use the display wlan client roam-out command on AC 1 to display roamed out client information, and use the display wlan client roam-in command on AC 2 to display roamed in client information. You can also use the display wlan client roam-track mac-address command to view client roaming track information on AC 1.

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网