02-WLAN Configuration Guide

HomeSupportConfigure & DeployConfiguration GuidesH3C WX Series Access Controllers Configuration Guides(R3308 R2308)-6W10702-WLAN Configuration Guide
04-WLAN Roaming Configuration
Title Size Download
04-WLAN Roaming Configuration 356.20 KB

Configuring WLAN roaming

WLAN roaming overview

Inter AC Tunneling Protocol (IACTP) is a proprietary protocol of H3C which defines how access controllers (ACs) communicate with each other. Based on the standard TCP client/server model, this protocol generically encapsulates and transports communications securely between ACs.

You can use IACTP to create and maintain AC groups, termed mobility groups, which can include up to 8 ACs. IACTP provides a secure control tunnel for applications such as roaming that allow sharing and exchanging messages. IACTP can be used with either IPv4 or with IPv6.

When a station first associates with an AC in a mobility group, that AC becomes the station's Home-AC (HA). The connection request goes through 802.1X authentication followed by 11 Key exchange, and the station information is then synchronized across the other ACs in the mobility group.

When the station roams to another AC in the mobility group (a Foreign-AC (FA)), the HA information is used to fast-forward station authentication by skipping 802.1X authentication and performing only 802.11 key exchange. This method facilitates seamless roaming within a mobility group.

Terminology

·     HAThe AC to which a wireless station is connected by associating with an AP for the first time is the HA of the station.

·     FAAn AC that is other than the HA and to which a station is currently connected is an FA of the station.

·     Fast-roam capable stationA wireless station that associates to an AC in the mobility-group and supports fast roaming (only key caching is supported).

·     Roam-out stationA wireless station that has associated with an AC other than the HA in the mobility-group is a roam-out station at its HA.

·     Roam-in stationA wireless station that has associated with an AC other than the HA in the mobility-group is a roam-in station at the FA.

·     Intra-AC roamingA procedure where a wireless station roams from one AP to another AP, which are connected to the same AC.

·     Inter-AC roamingA procedure where a wireless station roams from one AP to another AP, which are connected to different ACs.

·     Inter-AC fast roaming capabilityIf a station uses 802.1X (RSN) authentication through negotiation and supports key caching, this station has inter-AC fast roaming capability.

WLAN roaming topologies

WLAN Roaming topologies consist of:

·     Intra-AC roaming topology

·     Inter-AC roaming topology

·     Intra-FA roaming topology

·     Inter-FA roaming topology

·     Roam-back topology

Intra-AC roaming

The figure below illustrates how a station can roam from one AP to another AP, through a connection to the same AC.

Figure 1 Intra-AC roaming

 

1.     A station is associated with AP 1, which is connected to an AC.

2.     The station disassociates with AP 1 and roams to AP 2 connected to the same AC.

3.     The station is associated with AP 2 through intra-AC roam association.

Inter-AC roaming

The figure below illustrates how a station can roam from one AP to another AP, through a connection to different ACs.

Figure 2 Inter-AC roaming

 

1.     A station is associated with AP 1, which is connected to AC 1.

2.     The station disassociates with AP 1 and roams to AP 2 connected to AC 2.

3.     The station is associated with AP 2 through inter-AC roam association. Prior to inter-AC roaming, AC 1 should synchronize the station information with AC 2 through an IACTP tunnel.

Intra-FA roaming

Figure 3 Intra-FA roaming

 

1.     A station is associated with AP 1, which is connected to AC 1.

2.     The station disassociates with AP 1 and roams to AP 2 connected to AC 2. Now AC 2 is the FA for the station.

3.     The station is associated with AP 2 through inter-AC roam association. Prior to inter-AC roaming, AC 1 should synchronize the station information with AC 2 through an IACTP tunnel.

4.     The station then disassociates with AP 2 and roams to AP 3 which is also connected to AC 2. The station is associated with AP 3 through intra-FA roam association.

Inter-FA roaming

Figure 4 Inter-FA roaming

 

1.     A station is associated with AP 1, which is connected to AC 1.

2.     The station disassociates with AP 1 and roams to AP 2 connected to AC 2. Now AC 2 is the FA for the station.

3.     The station is associated with AP 2 through inter-AC roam association.

4.     The station then disassociates with AP 2 and roams to AP 3 which is connected to AC 3, which now is its FA. Prior to inter-AC roaming, AC 1 should synchronize the station information with AC 2 and AC 3 through IACTP tunnels.

Roam-back

Figure 5 Roam-back

 

1.     A station is associated with AP 1, which is connected to AC 1.

2.     The station disassociates with AP 1 and roams to AP 3 connected to AC 2. Now AC 2 is the FA for the station.

3.     The station is associated with AP 3 through inter-AC roam association. Prior to inter-AC roaming, AC 1 should synchronize the station information with AC 2 through an IACTP tunnel.

4.     The station then disassociates with AP 3 and roams back to AP 2 or AP 1 connected to AC 1, which is its HA.

Configuring an IACTP mobility group

The IACTP service is part of the WLAN system, and can be enabled only after a mobility group and the tunnel source IP address are configured.

An IACTP mobility group includes attributes such as the mobility tunnel protocol type, source IP address, authentication mode, and member IP addresses.

To configure a mobility group and enable IACTP service for it:

 

Step

Command

Remarks

1.     Enter system view.

system-view

N/A

2.     Create a mobility group with the specified name.

wlan mobility-group name

ACs in the same mobility group should have the same mobility group name.

3.     Specify the mobility tunnel protocol type.

mobility-tunnel { iactp | iactp6 }

Optional.

By default, the mobility tunnel protocol type is IPv4.

4.     Specify the tunnel source IP address.

source { ip ipv4-address | ipv6 ipv6-address }

Not configured by default

5.     Add a member.

member { ip ipv4-address | ipv6 ipv6-address } [ vlan vlan-id-list ]

By default, no member exists in a mobility group.

Members can be added dynamically irrespective of whether IACTP service is enabled or not.

6.     Specify an IACTP control message integrity authentication mode.

authentication-mode authentication-method [ cipher | simple ] authentication-key

Optional.

By default, IACTP control message integrity authentication is disabled.

7.     Enable the IACTP service for the group.

mobility-group enable

By default, IACTP service is disabled.

 

 

NOTE:

·     Do not configure ACs in a mobility group to back up each other.

·     ACs in a mobility group must have the same user profile configurations.

 

Displaying and maintaining WLAN roaming

 

Task

Command

Remarks

Display mobility group information.

display wlan mobility-group [ member { ip IPv4-address | ipv6 IPv6-address } ] [ | { begin | exclude | include } regular-expression ]

Available in any view

Display the roam-track information of a client on the HA.

display wlan client roam-track mac-address mac-address [ | { begin | exclude | include } regular-expression ]

Available in any view

Display the WLAN client roaming information.

display wlan client { roam-in | roam-out } [ member { ip IPv4-address  | ipv6 IPv6-address } ] [ verbose ] [ | { begin | exclude | include } regular-expression ]

Available in any view

 

WLAN roaming configuration examples

Intra-AC roaming configuration example

Network requirements

As shown in Figure 6, an AC has two APs associated and all of them are in VLAN 1. A client is associated with AP 1. Configure intra-AC roaming so that the client can associate with AP 2 when roaming to AP 2.

Figure 6 Network diagram

 

Configuration procedure

 

 

NOTE:

·     For wireless service configuration, see "Configuring WLAN services." A client has inter-AC fast roaming capability only if it uses 802.1X (RSN) authentication.

·     If you select an authentication mode involving remote authentication, you need to configure the corresponding RADIUS server. For more information, see "Configuring WLAN security."

 

1.     Configure the AC:

# On interface WLAN-ESS 1, configure port security mode as userlogin-secure-ext, and enable key negotiation of the 11key type.

<AC> system-view

[AC] interface wlan-ess 1

[AC-WLAN-ESS1] port-security port-mode userlogin-secure-ext

[AC-WLAN-ESS1] port-security tx-key-type 11key

# Disable the multicast trigger function and the online user handshake function.

[AC-WLAN-ESS1] undo dot1x multicast-trigger

[AC-WLAN-ESS1] undo dot1x handshake

[AC-WLAN-ESS1] quit

# Create service template 1 of crypto type, configure its SSID as intra-roam, and bind WLAN-ESS1 to intra-roam.

[AC] wlan service-template 1 crypto

[AC-wlan-st-1] ssid intra-roam

[AC-wlan-st-1] bind wlan-ess 1

# Configure the authentication method as open-system, and use the CCMP cipher suite for frame encryption.

[AC-wlan-st-1] authentication-method open-system

[AC-wlan-st-1] cipher-suite ccmp

[AC-wlan-st-1] security-ie rsn

# Enable service template 1.

[AC-wlan-st-1] service-template enable

[AC-wlan-st-1] quit

# Enable port security.

[AC] port-security enable

# Configure the 802.1X authentication method as EAP.

[AC] dot1x authentication-method eap

# Create a RADIUS scheme rad, and specify the extended RADIUS server type.

[AC] radius scheme rad

[AC-radius-rad] server-type extended

# Configure the IP addresses of the primary authentication server and accounting server as 10.18.1.5.

[AC-radius-rad] primary authentication 10.18.1.5

[AC-radius-rad] primary accounting 10.18.1.5

# Configure the shared key for RADIUS authentication/accounting packets as 12345678.

[AC-radius-rad] key authentication 12345678

[AC-radius-rad] key accounting 12345678

# Configure the source IP address of RADIUS packets sent by the AC as 10.18.1.1.

[AC-radius-rad] nas-ip 10.18.1.1

[AC-radius-rad] quit

# Create ISP domain cams and configure the ISP domain cams to use RADIUS scheme rad to implement authentication, authorization, and accounting for all types of users.

[AC] domain cams

[AC-isp-cams] authentication default radius-scheme rad

[AC-isp-cams] authorization default radius-scheme rad

[AC-isp-cams] accounting default radius-scheme rad

[AC-isp-cams] quit

#Configure the 802.1X mandatory authentication domain as cams on interface WLAN-ESS 1.

[AC] interface WLAN-ESS 1

[AC-WLAN-ESS1] dot1x mandatory-domain cams

[AC-WLAN-ESS1] quit

# Configure AP 1: Create an AP template named ap1 and its model is WA2100, and configure the serial ID of AP 1 as 210235A045B05B1236548.

[AC] wlan ap ap1 model WA2100

[AC-wlan-ap-ap1] serial-id 210235A045B05B1236548

[AC-wlan-ap-ap1] radio 1 type dot11g

# Bind service template 1 to radio 1.

[AC-wlan-ap-ap1-radio-1] service-template 1

[AC-wlan-ap-ap1-radio-1] radio enable

[AC-wlan-ap-ap1-radio-1] quit

[AC-wlan-ap-ap1] quit

# Configure AP 2: Create an AP template named ap2 and its model is WA2100, and configure the serial ID of AP 2 as 2210235A22W0076000103.

[AC] wlan ap ap2 model WA2100

[AC-wlan-ap-ap2] serial-id 210235A22W0076000103

[AC-wlan-ap-ap2] radio 1 type dot11g

# Bind service template 1 to radio 1 of AP 2 (Intra-AC roaming requires consistent SSIDs of different APs. Therefore, radio 1 of AP 2 should be bound to service template 1.).

[AC-wlan-ap-ap2-radio-1] service-template 1

[AC-wlan-ap-ap2-radio-1] radio enable

[AC-wlan-ap-ap2-radio-1] return

2.     Verify the configuration:

After the client roams to AP2, use the display wlan client verbose command to display detailed client information. You should find that the AP name and BSSID fields have been changed to those of AP2. You can also use the display wlan client roam-track mac-address command to view client roaming track information.

Inter-AC roaming configuration example

Network requirements

As shown in Figure 7, a client associates with AP 1. Configure inter-AC roaming so that the client can associate with AP2 when roaming to it.

Figure 7 Network diagram

 

Configuration procedure

 

 

NOTE:

·     For wireless service configuration, see "WLAN service configuration." A client has inter-AC fast roaming capability only if it uses 802.1X (RSN) authentication through negotiation.

·     If you select an authentication mode involving remote authentication, you need to configure the corresponding RADIUS server. For more information, see "WLAN security configuration."

 

1.     Configure AC 1:

# On interface WLAN-ESS 1, configure port security mode as userlogin-secure-ext, and enable key negotiation of the 11key type.

<AC1> system-view

[AC1] interface wlan-ess 1

[AC1-WLAN-ESS1] port-security port-mode userlogin-secure-ext

[AC1-WLAN-ESS1] port-security tx-key-type 11key

# Disable the multicast trigger function and the online user handshake function.

[AC1-WLAN-ESS1] undo dot1x multicast-trigger

[AC1-WLAN-ESS1] undo dot1x handshake

[AC1-WLAN-ESS1] quit

# Create service template 1 of crypto type, configure its SSID as inter-roam, and bind WLAN-ESS1 to inter-roam.

[AC1] wlan service-template 1 crypto

[AC1-wlan-st-1] ssid inter-roam

[AC1-wlan-st-1] bind wlan-ess 1

# Configure the authentication method as open-system, and use the CCMP cipher suite for frame encryption.

[AC1-wlan-st-1] authentication-method open-system

[AC1-wlan-st-1] cipher-suite ccmp

[AC1-wlan-st-1] security-ie rsn

# Enable service template 1.

[AC1-wlan-st-1] service-template enable

[AC1-wlan-st-1] quit

# Enable port security.

[AC1] port-security enable

# Configure the 802.1X authentication method as EAP.

[AC1] dot1x authentication-method eap

# Create a RADIUS scheme rad, and specify the extended RADIUS server type.

[AC1] radius scheme rad

[AC1-radius-rad] server-type extended

# Configure the IP addresses of the primary authentication server and accounting server as 10.18.1.5.

[AC1-radius-rad] primary authentication 10.18.1.5

[AC1-radius-rad] primary accounting 10.18.1.5

# Configure the shared key for RADIUS authentication/accounting packets as 12345678.

[AC1-radius-rad] key authentication 12345678

[AC1-radius-rad] key accounting 12345678

# Configure the source IP address of RADIUS packets sent by the AC as 10.18.1.1.

[AC1-radius-rad] nas-ip 10.18.1.1

[AC1-radius-rad] quit

# Configure ISP domain cams to use RADIUS scheme rad to implement authentication, authorization, and accounting for all types of users.

[AC1] domain cams

[AC1-isp-cams] authentication default radius-scheme rad

[AC1-isp-cams] authorization default radius-scheme rad

[AC1-isp-cams] accounting default radius-scheme rad

[AC1-isp-cams] quit

#Configure the 802.1X mandatory authentication domain as cams on interface WLAN-ESS 1.

[AC1] interface WLAN-ESS 1

[AC1-WLAN-ESS1] dot1x mandatory-domain cams

[AC1-WLAN-ESS1] quit

# Configure AP 1: Create an AP template named ap1 and its model is WA2100, and configure the serial ID of AP 1 as 210235A045B05B1236548.

[AC1] wlan ap ap1 model WA2100

[AC1-wlan-ap-ap1] serial-id 210235A045B05B1236548

[AC1-wlan-ap-ap1] radio 1 type dot11g

# Bind service template inter-roam to radio 1.

[AC1-wlan-ap-ap1-radio-1] service-template 1

[AC1-wlan-ap-ap1-radio-1] radio enable

[AC1-wlan-ap-ap1-radio-1] quit

[AC1-wlan-ap-ap1] quit

# Create mobility group roam, specify the tunnel source IP as 10.18.1.1, and specify a member with IP address 10.18.1.2.

[AC1] wlan mobility-group roam

[AC1-wlan-mg-roam] source ip 10.18.1.1

[AC1-wlan-mg-roam] member ip 10.18.1.2

[AC1-wlan-mg-roam] mobility-group enable

2.     Configure AC 2:

# On interface WLAN-ESS 1, configure port security mode as userlogin-secure-ext, and enable key negotiation of the 11key type.

<AC2> system-view

[AC2] interface wlan-ess 1

[AC2-WLAN-ESS1] port-security port-mode userlogin-secure-ext

[AC2-WLAN-ESS1] port-security tx-key-type 11key

# Disable the multicast trigger function and the online user handshake function.

[AC2-WLAN-ESS1] undo dot1x multicast-trigger

[AC2-WLAN-ESS1] undo dot1x handshake

[AC2-WLAN-ESS1] quit

# Create service template 1 of crypto type, configure its SSID as inter-roam, and bind WLAN-ESS1 to intra-roam.

[AC2] wlan service-template 1 crypto

[AC2-wlan-st-1] ssid inter-roam

[AC2-wlan-st-1] bind wlan-ess 1

# Configure the authentication method as open-system, use the CCMP cipher suite for frame encryption, and enable the RSN security IE to be carried in beacon and reply frames. .

[AC2-wlan-st-1] authentication-method open-system

[AC2-wlan-st-1] cipher-suite ccmp

[AC2-wlan-st-1] security-ie rsn

# Enable service template 1.

[AC2-wlan-st-1] service-template enable

[AC2-wlan-st-1] quit

# Enable port security.

[AC2] port-security enable

# Configure the 802.1X authentication method as EAP.

[AC2] dot1x authentication-method eap

# Create RADIUS scheme rad, and specify the server type as extended to exchange extended messages with the server.

[AC2] radius scheme rad

[AC2-radius-rad] server-type extended

# Specify the IP addresses of the primary authentication and accounting servers as 10.18.1.5.

[AC2-radius-rad] primary authentication 10.18.1.5

[AC2-radius-rad] primary accounting 10.18.1.5

# Configure the authentication and accounting keys as 12345678.

[AC2-radius-rad] key authentication 12345678

[AC2-radius-rad] key accounting 12345678

# Configure the source IP address of RADIUS packets as 10.18.1.2.

[AC2-radius-rad] nas-ip 10.18.1.2

[AC2-radius-rad] quit

# Create ISP domain cams, and use RADIUS scheme rad as the AAA methods.

[AC2] domain cams

[AC2-isp-cams] authentication default radius-scheme rad

[AC2-isp-cams] authorization default radius-scheme rad

[AC2-isp-cams] accounting default radius-scheme rad

[AC2-isp-cams] quit

# On interface WLAN-ESS 1, configure the 802.1X mandatory authentication domain as cams.

[AC1] interface WLAN-ESS 1

[AC1-WLAN-ESS1] dot1x mandatory-domain cams

[AC1-WLAN-ESS1] quit

# Configure AP 2: Create an AP template named ap2 and its model is WA2100, and configure the serial ID of AP 2 as 2210235A22W0076000103.

[AC2] wlan ap ap2 model WA2100

[AC2-wlan-ap-ap2] serial-id 210235A22W0076000103

[AC2-wlan-ap-ap2] radio 1 type dot11g

# Bind service template inter-roam to radio 1 of AP 2 (Inter-AC roaming requires consistent SSIDs of APs. Therefore, radio 1 of AP 2 should be bound to service template inter-roam.).

[AC2-wlan-ap-ap2-radio-1] service-template 1

[AC2-wlan-ap-ap2-radio-1] radio enable

[AC2-wlan-ap-ap2-radio-1] quit

[AC2-wlan-ap-ap2] quit

# Create mobility group roam, specify the tunnel source IP as 10.18.1.2, and specify a member with IP address 10.18.1.1.

[AC2] wlan mobility-group roam

[AC2-wlan-mg-roam] source ip 10.18.1.2

[AC2-wlan-mg-roam] member ip 10.18.1.1

[AC2-wlan-mg-roam] mobility-group enable

3.     Verify the configuration:

You can use the display wlan client roam-out command on AC 1 to display roamed out client information, and use the display wlan client roam-in command on AC 2 to display roamed in client information. You can also use the display wlan client roam-track mac-address command to view client roaming track information on AC 1.

 

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Intelligent Storage
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
  • Technical Blogs
All Support
  • Become A Partner
  • Partner Policy & Program
  • Global Learning
  • Partner Sales Resources
  • Partner Business Management
  • Service Business
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网