12-WLAN Advanced Features Configuration Guide

HomeSupportConfigure & DeployConfiguration GuidesH3C Access Controllers Configuration Guides(R5426P02)-6W10412-WLAN Advanced Features Configuration Guide
02-Hotspot 2.0 configuration
Title Size Download
02-Hotspot 2.0 configuration 1.47 MB

Configuring Hotspot 2.0

About Hotspot 2.0

Hotspot 2.0, developed by the Wi-Fi Alliance, provides automatic network discovery, automated authentication, and seamless roaming for wireless clients.

Hotspot 2.0 contains two versions. Version 2 is fully compatible with version 1.

Hotspot 2.0 operating mechanism

Hotspot 2.0 operates as follows:

1.     A client performs wireless scanning to discover Hotspot 2.0 networks.

2.     The client exchanges Generic Advertisement Service (GAS) frames with APs to get Hotspot 2.0 information and select an optimal BSS.

3.     The client performs online signup. This step is required only for version 2 of Hotspot 2.0.

Scanning

The following scanning types are available:

·     Active scanning—Wireless clients scan surrounding wireless networks periodically by sending probe requests and obtain network information from received probe responses. See Figure 1.

Figure 1 Active scanning

·     Passive scanning—Wireless clients periodically listen for beacon frames sent by APs on their supported channels to get information about surrounding wireless networks as shown in Figure 2. Passive scanning is used when clients want to save power.

Figure 2 Passive scanning

GAS frame exchange

After discovering Hotspot 2.0 networks by active or passive scanning, a client exchanges GAS frames with APs to get APs' Hotspot 2.0 information. Based on the obtained Hotspot 2.0 information and local configuration, the client selects an optimal BSS.

As shown in Figure 3, a client exchanges GAS frames with an AP by using the following process:

1.     The client sends a GAS initial request.

2.     Upon receiving the request, the AP encapsulates Hotspot 2.0 information in a GAS initial response and examines the length of the response.

¡     If the length does not exceed the limit, the AP sends the GAS initial response to the client. The GAS frame exchange is complete and the client can send an authentication request.

¡     If the length exceeds the limit, the AP fragments the response and sends the first fragment in a GAS initial response to the client. The response notifies the client to request Hotspot 2.0 information after a comeback delay.

3.     The client sends a GAS comeback request to the AP after a comeback delay.

4.     The AP sends a GAS comeback response that carries the second fragment to the client.

5.     If the length of the response exceeds the limit, the client and the AP repeat steps 3 and 4 until all fragments are sent to the client.

Figure 3 GAS frame exchange

Online signup (for version 2)

After GAS frame exchange, a client connects to the Online Sign Up (OSU) server through the OSU AP to sign up online. A signed-up client gets a credential and can automatically access a Hotspot 2.0 network without being re-authenticated. A client can associate with an OSU AP by using the following methods:

·     Open OSU—No authentication.

·     OSEN OSU—Layer 2 authentication.

As shown in Figure 4, online signup operates as follows:

1.     The client obtains the OSU server list from the AP by exchanging GAS frames with the AP and selects an OSU server.

2.     The client associates with the OSU AP through open OSU or OSEN OSU.

3.     The OSU server sends a credential and authentication information to the client or updates the expired credential for the client.

4.     Using the newly provisioned credential, the client disassociates from the OSU AP and associates with the AP that provides Hotspot 2.0 services.

Figure 4 Online signup

Protocols and standards

·     IEEE Standard for Information technology—Telecommunications and information exchange between systems— Local and metropolitan area networks— Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 9: Interworking with External Networks

·     Wi-Fi Alliance Technical Committee Hotspot 2.0 Technical Task Group Hotspot 2.0 (Release 2)Technical Specification Version 3.04

Hotspot 2.0 tasks at a glance (for version 1)

To configure Hotspot 2.0 (version 1), perform the following tasks:

1.     Configuring a Hotspot 2.0 policy

a.     Creating a Hotspot 2.0 policy

b.     Configuring service provider information

c.     Configuring Hotspot 2.0 network parameters

d.     (Optional.) Configuring Hotspot 2.0 network optimization

e.     Binding a Hotspot 2.0 policy to a service template

2.     (Optional.) Configuring online signup services

Hotspot 2.0 tasks at a glance (for version 2)

To configure Hotspot 2.0 (version 2), perform the following tasks:

1.     Configuring a Hotspot 2.0 policy

a.     Creating a Hotspot 2.0 policy

b.     Configuring service provider information

c.     (Optional.) Configuring Hotspot 2.0 network parameters

d.     (Optional.) Configuring Hotspot 2.0 network optimization

e.     Binding a Hotspot 2.0 policy to a service template

2.     Configuring online signup services

a.     Configuring an OSU server

b.     Setting an SSID for online signup services

c.     Managing OSU server icons

d.     Binding an OSU server to a Hotspot 2.0 policy

3.     (Optional.) Configuring AP venue information

Configuring a Hotspot 2.0 policy

Prerequisites for configuring a Hotspot 2.0 policy

Hotspot 2.0 requires the 802.1X AKM mode, RSN IE, and AES-CCMP cipher suite.

For a client that supports only version 1 to access the Hotspot 2.0 network, first configure network information, such as OI, NAI, and domain, on the client. Then save these configurations in the client's configuration file.

Creating a Hotspot 2.0 policy

About this task

A Hotspot 2.0 policy defines a set of Hotspot 2.0 parameters.

Procedure

1.     Enter system view.

system-view

2.     Create a Hotspot 2.0 policy and enter its view.

wlan hotspot-policy policy-number

3.     (Optional.) Specify a name for the Hotspot 2.0 policy.

policy-name name

By default, no name is specified for a Hotspot 2.0 policy.

Configuring service provider information

About this task

Hotspot 2.0 service provider information includes the following:

·     NAI realm and authentication type—NAI realm of the access network and the authentication type for the NAI realm.

·     Organization identifier (OI)—Roaming consortium identifier. If a client has the certificate to a roaming consortium, the client can roam to all wireless services provided by the roaming consortium.

·     3rd Generation Partnership Project (3GPP) information—Contains a country code and a network code. The country code identifies a country, and the network code identifies a service provider in the country.

·     ISP domain—ISP domain of clients.

·     Service provider name—Service provider name and the language code.

Procedure

1.     Enter system view.

system-view

2.     Enter Hotspot 2.0 policy view.

wlan hotspot-policy policy-number

3.     Create an NAI realm and specify an authentication type for the NAI realm.

nai-realm realm-name eap-method eap-method-id auth-method auth-method-id authentication authentication

By default, no NAI realm exists.

4.     Specify an OI.

roam-oi oi [ in-beacon ]

By default, no OI is specified.

This step is required only for version 2 of Hotspot 2.0.

5.     (Optional.) Configure 3GPP information.

3gpp-info country-code mobile-country-code network-code mobile-network-code

By default, no country code and network code are configured.

6.     Set the domain name.

domain-name domain-name

By default, the domain name is not set.

This step is required only for version 1 of Hotspot 2.0.

7.     (Optional.) Specify the service provider name.

operator-name operator-name lang-code lang-code

By default, no service provider name is specified.

Configuring Hotspot 2.0 network parameters

About this task

Hotspot 2.0 network parameters include the following:

·     Access network type—For more information, see WLAN Advanced Features Command Reference.

·     Homogeneous ESS identifier (HESSID)—An HESSID uniquely identifies a homogeneous ESS.

·     Network authentication type—For more information, see WLAN Command Reference.

·     IP address availability—Version and type of IP addresses assigned to associated clients.

·     WAN link status parameters—Contains speed and link status information. You can set the parameters to enable Hotspot 2.0 to advertise uplink and downlink speeds and link status such as closed, testing, and enabled of the WAN.

·     Port status for an IP protocol—Includes closed, open, and unknown.

Procedure

1.     Enter system view.

system-view

2.     Enter Hotspot 2.0 policy view.

wlan hotspot-policy policy-number

3.     Set the access network type.

network-type network-type [ access-internet ]

By default, no access network type is set.

4.     Set an HESSID.

hessid hessid

By default, no HESSID is set.

This step is required only for version 1 of Hotspot 2.0.

5.     (Optional.) Specify a network authentication type.

authentication-type { 0 [ redirect-url url ] | 1 | 2 redirect-url url | 3 }

By default, no network authentication type is specified.

6.     Configure IP address availability.

ip-type ipv4 ipv4-type ipv6 ipv6-type

By default, the availability is 1 for an IPv4 address and 2 for an IPv6 address.

7.     Set the port status for an IP protocol.

ip-protocol { esp | icmp | tcp | udp } port-number port-number { closed | open | unknown }

By default, no port status is set for an IP protocol.

8.     Set WAN link status parameters.

wan-metrics { link-down | link-test | link-up } [ asymmetric downlink-speed downlink-speed uplink-speed uplink-speed | symmetric link-speed link-speed ]

By default, no WAN link status parameters are set.

Configuring Hotspot 2.0 network optimization

About this task

The following network optimization features are available for Hotspot 2.0 networks:

·     Downstream Group-Addressed Forwarding (DGAF)—Enables an AP to forward all downstream wireless broadcast ARP packets and wireless multicast packets. To prevent spoofing attacks by using downstream multicasts, you can disable the DGAF feature for the AP.

·     Comeback delay—Prevents clients from frequently sending GAS comeback requests.

·     GAS initial request limit—Limits the maximum number of GAS initial requests that clients can send within the specified interval to ease the AC's burden.

Procedure

1.     Enter system view.

system-view

2.     Enter Hotspot 2.0 policy view.

wlan hotspot-policy policy-number

3.     Disable the DGAF feature.

undo dgaf enable

By default, the DGAF feature is enabled.

4.     Set the comeback delay.

comeback-delay value

By default, the comeback delay is 1 TU (1024 milliseconds).

5.     Set the maximum number of GAS initial requests that clients can send within the specified interval.

gas-limit number number interval interval

By default, the number of GAS initial requests that clients can send is not limited.

Binding a Hotspot 2.0 policy to a service template

About this task

You must bind a Hotspot 2.0 policy to a service template for an AP using the service template to build a Hotspot 2.0 network.

Procedure

1.     Enter system view.

system-view

2.     Enter service template view.

wlan service-template service-template-name

3.     Bind a Hotspot 2.0 policy to the service template.

hotspot-policy policy-number

By default, no Hotspot 2.0 policy is bound to a service template.

Configuring online signup services

Configuring an OSU server

1.     Enter system view.

system-view

2.     Create an OSU server and enter its view, or enter the view of an existing OSU server.

wlan osu-provider osu-provider-number

3.     Set a name for the OSU server.

friendly-name friendly-name lang-code lang-code

By default, no name is set for an OSU server.

4.     Specify the URI of the OSU server.

uri uri

By default, no URI is specified for an OSU server.

5.     Specify a protocol for clients to communicate with the OSU server.

method method-id

By default, no method is specified for clients to communicate with an OSU server.

6.     Specify an icon for the OSU server.

icon-file filename lang-code lang-code icon-type icon-type

By default, no icon is specified for an OSU server.

Before specifying an icon for an OSU server, make sure directory icon has been created by using the mkdir command in the root directory where the version files are saved. Then use FTP or TFTP to download icon files to the directory.

7.     (Optional.) Configure a description for the OSU server.

description description lang-code lang-code

By default, no description is configured for an OSU server.

8.     (Optional.) Configure a Network Access Identifier (NAI) for the OSU server.

nai nai

By default, no NAI is configured for an OSU server.

Setting an SSID for online signup services

Restrictions and guidelines

Make sure the configured SSID for online signup services is the same as the SSID for the online signup service template.

Procedure

1.     Enter system view.

system-view

2.     Enter Hotspot 2.0 policy view.

wlan hotspot-policy policy-number

3.     Set an SSID for online signup services.

osu-ssid ssid-name

By default, no SSID is set for online signup services.

Managing OSU server icons

About this task

This task allows you to load all icon files specified for an OSU server to validate the changes when icon file changes occur or to invalidate icon files.

Procedure

1.     Enter system view.

system-view

2.     Manage OSU server icon files.

¡     Load OSU server icon files.

wlan hotspot osu-icon upload

¡     Unload OSU server icon files.

wlan hotspot osu-icon unload

Binding an OSU server to a Hotspot 2.0 policy

Restrictions and guidelines

A Hotspot 2.0 policy can be bound to a maximum of 32 OSU servers.

Make sure all configuration required for an OSU server has been completed before binding the OSU server to a Hotspot 2.0 policy.

Procedure

1.     Enter system view.

system-view

2.     Enter Hotspot 2.0 policy view.

wlan hotspot-policy policy-number

3.     Bind an OSU server to the Hotspot 2.0 policy.

osu-provider osu-provider-number

By default, no OSU server is bound to a Hotspot 2.0 policy.

Configuring AP venue information

About this task

AP venue information indicates the location of APs and helps clients connect to an optimal AP.

Procedure

1.     Enter system view.

system-view

2.     Enter AP view.

wlan ap ap-name

3.     Specify the venue group and venue type for the AP.

venue group venue-group-number type venue-type-number

By default, no venue group and venue type are specified for an AP.

This step is required only for version 1 of Hotspot 2.0.

4.     Set a venue name for the AP.

venue name venue-name lang-code lang-code

By default, no venue name is set for an AP.

This step is required only for version 1 of Hotspot 2.0.

Display and maintenance commands for Hotspot 2.0

Execute display commands in any view. (for version 1)

 

Task

Command

Display service template information.

display wlan service-template [ service-template-name ] [ verbose ]

Execute display commands in any view. (for version 2)

 

Task

Command

Display all the loaded OSU server icon files.

display wlan hotspot uploaded-osu-icon

Display service template information.

display wlan service-template [ service-template-name ] [ verbose ]

Hotspot 2.0 configuration examples

The AP models and serial numbers in this document are used only as examples. Support for AP models and serial numbers depends on the AC model.

Example: Configuring Hotspot 2.0 iPhone application

Network configuration

As shown in Figure 5, configure Hotspot 2.0 to enable the phone to switch from the cellular network to the wireless network.

Figure 5 Network diagram

Prerequisites

For client authentication, authorization, and accounting to operate correctly, install certificates and create a user account on the RADIUS server. For more information about AAA, see User Access and Authentication Configuration Guide.

Configuring the AC

1.     Configure a Hotspot 2.0 policy:

# Create Hotspot 2.0 policy 1.

<AC> system-view

[AC] wlan hotspot-policy 1

# Configure EAP-TLS authentication.

[AC-wlan-hs-1] nai-realm name h3c.com eap-method 6 auth-method 2 authentication 4

# Set the domain name to h3c.com.

[AC-wlan-hs-1] domain-name h3c.com

# Set the HESSID to 1232-ff23-0123.

[AC-wlan-hs-1] hessid 1232-ff23-0123

[AC-wlan-hs-1] quit

2.     Configure 802.1X authentication and the RADIUS scheme:

# Configure the 802.1X authentication method as EAP.

[AC] dot1x authentication-method eap

# Create RADIUS scheme imcc.

[AC] radius scheme imcc

# Set the IP address and the port number of the primary authentication server to 10.18.1.88 and 1812, respectively.

[AC-radius-imcc] primary authentication 10.18.1.88 1812

# Set the IP address and the port number of the primary accounting server to 10.18.1.88 and 1813, respectively.

[AC-radius-imcc] primary accounting 10.18.1.88 1813

# Set the shared key for the AC to exchange packets with the authentication and accounting servers to 12345678.

[AC-radius-imcc] key authentication simple 12345678

[AC-radius-imcc] key accounting simple 12345678

# Configure the AC to remove the domain name in the username sent to the RADIUS servers.

[AC-radius-imcc] user-name-format without-domain

[AC-radius-imcc] quit

3.     Create domain imc and configure the domain to use RADIUS scheme imcc for authentication, authorization, and accounting.

[AC] domain imc

[AC-isp-imc] authentication lan-access radius-scheme imcc

[AC-isp-imc] authorization lan-access radius-scheme imcc

[AC-isp-imc] accounting lan-access radius-scheme imcc

[AC-isp-imc] quit

Configuring the AP

# Create service template service1.

<AC> system-view

[AC] wlan service-template service1

# Set the SSID to service.

[AC-wlan-st-service1] ssid service

# Bind the Hotspot 2.0 policy 1 to the service template.

[AC-wlan-st-service1] hotspot-policy 1

# Enable the RSN IE in beacons and probe responses.

[AC-wlan-st-service1] security-ie rsn

# Enable the AES-CCMP cipher suite.

[AC-wlan-st-service1] cipher-suite ccmp

# Set the authentication and key management mode to 802.1X.

[AC-wlan-st-service1] akm mode dot1x

# Set the authentication mode for WLAN clients to 802.1X.

[AC-wlan-st-service1] client-security authentication-mode dot1x

# Specify the domain imc as the authentication domain.

[AC-wlan-st-service1] dot1x domain imc

# Enable the service template.

[AC-wlan-st-service1] service-template enable

[AC-wlan-st-service1] quit

# Create AP ap1, and specify the AP model and serial ID.

[AC] wlan ap ap1 model WA4320i-ACN

[AC-wlan-ap-ap1] serial-id 219801A0CNC138011454

# Bind service template service1 to radio 2 of the AP.

[AC-wlan-ap-ap1] radio 2

[AC-wlan-ap-ap1-radio-2] radio enable

[AC-wlan-ap-ap1-radio-2] service-template service1

[AC-wlan-ap-ap1-radio-2] quit

[AC-wlan-ap-ap1] quit

Configuring the RADIUS server (IMCv7)

This example was created on IMC PLAT 7.1 and IMC UAM 7.1.

To configure the IMC server:

1.     Log in to the IMC platform.

2.     Click the User tab.

3.     Add an access device:

a.     From the navigation tree, select User Access Policy > Access Device Management > Access Device.

b.     On the access device configuration page, click Add.

c.     On the Add Access Device page, configure the following parameters:

-     Set the shared key to 12345678.

-     Select or manually add the device with the IP address 10.18.1.1 (IP address of the AC).

-     Use the default settings for other parameters.

d.     Click OK.

Figure 6 Adding an access device

英文增加接入设备图.jpg

4.     Add an access policy:

a.     From the navigation tree, select User Access Policy > Access Policy.

b.     On the access policy configuration page, click Add.

c.     On the Add Access Policy page, configure the following parameters:

-     Set the access policy name to 802.1X_policy.

-     Select EAP-PEAP Authentication from the Certificate Type list, and from the Certificate Sub-Type list, select the certificate sub-type, which must be the same as the authentication method for the client.

-     Use the default settings for other parameters.

Figure 7 Adding an access policy

5.     Add an access service:

a.     From the navigation tree, select User Access Policy > Access Service.

b.     On the access service configuration page, click Add.

c.     On the Add Access Service page, configure the service name as 802.1X_ser, and use the 802.1X policy you have created as the default access policy.

d.     Use the default settings for other parameters.

Figure 8 Adding an access service

6.     Add an access user:

a.     From the navigation tree, select Access User > All Access Users.

b.     On the access user configuration page, click Add.

c.     On the Add Access User page, click Add User.

d.     On the Add User window, configure the following parameters:

-     Set the username to admin.

-     Set the account name to admin.

-     Select the 802.1X user that you have configured in the Access Service area.

Figure 9 Adding an access user

Configuring the phone

This example was created using an iPhone 5S.

To configure the phone:

1.     Install the Apple Configurator App on the MacBook Air and connect iPhone 5S to the laptop.

Figure 10 Apply Configurator App

2.     Open the Apple Configurator App and select Supervise from the top menu. Then click + under the Profiles list and select Create New Profile.

Figure 11 Creating a new profile

3.     Click General on the left navigation tree, and enter h3c.com in the Name field. Other parameters are optional.

Figure 12 General settings

4.     Click Wi-Fi on the left navigation tree and click Configure from the menu. Then select Passpoint from the Network Type list.

Figure 13 Enabling passpoint

5.     On the page that appears, perform the following tasks:

¡     In the Accepted EAP Types area, select PEAP.

¡     Enter admin and 12345678 in the Username area and Password area, respectively.

¡     Select None from the Identity Certificate list.

¡     Enter admin in the Outer Identity area.

Figure 14 Configuring EAP-PEAP authentication

¡     Enter h3c.com in the Provider Display Name field and enter the domain name that you have configured in the hotspot policy on the AC.

Figure 15 Configuring the domain name

¡     Leave Roaming Consortium Ols, NAI Real Names, and MCC/MNC blank, or enter the values you have configured in the hotspot policy on the AC. Then click Save.

Figure 16 Configuring other options

6.     Click Prepare and then click Install Profiles on the Settings tab.

Figure 17 Installing profiles

7.     Click Next.

Figure 18 Installing profiles

8.     Select the profile h3c.com and click Next.

Figure 19 Selecting the created profile

9.     Click Install.

Figure 20 Installing the profile

After the installation is complete, the Apple Configurator page displays Install Succeeded and all configuration will be deployed to iPhone 5S. When the phone finds the service it needs, it automatically joins the WLAN.

Figure 21 Installation complete

Verifying the configuration

# Verify that the phone can automatically connect to WLAN service.

[AC] display wlan client verbose

Total number of clients: 1                                                     

                                                                               

 MAC address                       : 6021-c05d-19e0                            

 IPv4 address                      : 105.0.0.5                                 

 IPv6 address                      : N/A                                       

 Username                          : admin

 AID                               : 1                                         

 AP ID                             : 2                                         

 AP name                           : ap1                                       

 Radio ID                          : 2                                         

 SSID                              : service                                  

 BSSID                             : 70f9-6dd7-cfd0                            

 VLAN ID                           : 1                                         

 Sleep count                       : 0                                         

 Wireless mode                     : 802.11gn                                  

 Channel bandwidth                 : 20MHz                                     

 SM power save                     : Enabled                                   

 SM power save mode                : Static                                    

 Short GI for 20MHz                : Supported                                 

 Short GI for 40MHz                : Not supported                             

 STBC RX capability                : Not supported                              

 STBC TX capability                : Not supported                             

 LDPC RX capability                : Not supported                             

 Block Ack                         : TID 0  In                                  

 Support HT-MCS set                : 0, 1, 2, 3, 4, 5, 6, 7                    

 Supported rates                   : 1, 2, 5.5, 6, 9, 11,                      

                                     12, 18, 24, 36, 48, 54 Mbps                

 QoS mode                          : WMM                                       

 Listen interval                   : 10                                        

 RSSI                              : 49                                        

 Rx/Tx rate                        : 1/72.2 Mbps                               

 Speed                             : N/A

 Authentication method             : Open system                               

 Security mode                     : RSN                                        

 AKM mode                          : 802.1X                                    

 Cipher suite                      : CCMP                                      

 User authentication mode          : 802.1X                                    

 WPA3 status                       : N/A

 Authorization ACL ID              : N/A                                       

 Authorization user profile        : N/A                                        

 Roam status                       : N/A                                       

 Key derivation                    : SHA1                                      

 PMF status                        : N/A                                        

 Forwarding policy name            : N/A                                       

 Online time                       : 0days 0hours 0minutes 36seconds           

 FT status                         : Inactive  

Example: Configuring Hotspot 2.0 Samsung application

Network configuration

As shown in Figure 22, configure Hotspot 2.0 to enable the phone to switch from the cellular network to the wireless network.

Figure 22 Network diagram

Prerequisites

Before you configure Hotspot 2.0, complete the following tasks:

·     For client authentication, authorization, and accounting to operate correctly, install certificates and create a user account on the RADIUS server. For more information about AAA, see User Access and Authentication Configuration Guide.

·     Configure 802.1X and install the certificate on the phone.

Configuring the AC

1.     Configure a Hotspot 2.0 policy:

# Create Hotspot 2.0 policy 1.

<AC> system-view

[AC] wlan hotspot-policy 1

# Specify the authentication type for NAI realm abc.com.

[AC-wlan-hs-1] nai-realm name abc.com eap-method 6 auth-method 2 authentication 4

# Set the domain name to domain.abc.com.

[AC-wlan-hs-1] domain-name domain.abc.com

# Set the HESSID to 1232-ff23-0123, the MAC address of the AP.

[AC-wlan-hs-1] hessid 1232-ff23-0123

[AC-wlan-hs-1] quit

2.     Configure 802.1X authentication and the RADIUS scheme:

# Configure the 802.1X authentication method as EAP.

[AC] dot1x authentication-method eap

# Create RADIUS scheme imcc.

[AC] radius scheme imcc

# Set the IP address and the port number of the primary authentication server to 10.18.1.88 and 1812, respectively.

[AC-radius-imcc] primary authentication 10.18.1.88 1812

# Set the IP address and the port number of the primary accounting server to 10.18.1.88 and 1813, respectively.

[AC-radius-imcc] primary accounting 10.18.1.88 1813

# Set the shared key for the AC to exchange packets with the authentication and accounting servers to 12345678.

[AC-radius-imcc] key authentication simple 12345678

[AC-radius-imcc] key accounting simple 12345678

# Configure the AC to remove the domain name in the username sent to the RADIUS servers.

[AC-radius-imcc] user-name-format without-domain

[AC-radius-imcc] quit

3.     Create domain imc and configure the domain to use RADIUS scheme imcc for authentication, authorization, and accounting.

[AC] domain imc

[AC-isp-imc] authentication lan-access radius-scheme imcc

[AC-isp-imc] authorization lan-access radius-scheme imcc

[AC-isp-imc] accounting lan-access radius-scheme imcc

[AC-isp-imc] quit

Configuring the AP

# Create service template service1.

<AC> system-view

[AC] wlan service-template service1

# Set the SSID to service.

[AC-wlan-st-service1] ssid service

# Bind the Hotspot 2.0 policy 1 to the service template.

[AC-wlan-st-service1] hotspot-policy 1

# Enable the RSN IE in beacons and probe responses.

[AC-wlan-st-stname] security-ie rsn

# Enable the AES-CCMP cipher suite.

[AC-wlan-st-service1] cipher-suite ccmp

# Set the authentication and key management mode to 802.1X.

[AC-wlan-st-service1] akm mode dot1x

# Set the authentication mode for WLAN clients to 802.1X.

[AC-wlan-st-service1] client-security authentication-mode dot1x

# Specify the domain imc as the authentication domain.

[AC-wlan-st-service1] dot1x domain imc

# Enable the service template.

[AC-wlan-st-service1] service-template enable

[AC-wlan-st-service1] quit

# Create AP ap1, and specify the AP model and serial ID.

[AC] wlan ap ap1 model WA4320i-ACN

[AC-wlan-ap-ap1] serial-id 219801A0CNC138011454

# Bind service template service1 to radio 2 of the AP.

[AC-wlan-ap-ap1] radio 2

[AC-wlan-ap-ap1-radio-2] radio enable

[AC-wlan-ap-ap1-radio-2] service-template service1

[AC-wlan-ap-ap1-radio-2] quit

[AC-wlan-ap-ap1] quit

Configuring the RADIUS server (IMCv7)

This example was created on IMC PLAT 7.1 and IMC UAM 7.1.

To configure the IMC server:

1.     Log in to the IMC platform.

2.     Click the User tab.

3.     Add an access device:

a.     From the navigation tree, select User Access Policy > Access Device Management > Access Device.

b.     On the access device configuration page, click Add.

c.     On the Add Access Device page, configure the following parameters:

-     Set the shared key to 12345678.

-     Select or manually add the device with the IP address 10.18.1.1 (IP address of the AC).

-     Use the default settings for other parameters.

d.     Click OK.

Figure 23 Adding an access device

英文增加接入设备图.jpg

4.     Add an access policy:

a.     From the navigation tree, select User Access Policy > Access Policy.

b.     On the access policy configuration page, click Add.

c.     On the Add Access Policy page, configure the following parameters:

-     Set the access policy name to 802.1X_policy.

-     Select EAP-PEAP Authentication from the Certificate Type list, and from the Certificate Sub-Type list, select the certificate sub-type, which must be the same as the authentication method for the client.

-     Use the default settings for other parameters.

Figure 24 Adding an access policy

5.     Add an access service:

a.     From the navigation tree, select User Access Policy > Access Service.

b.     On the access service configuration page, click Add.

c.     On the Add Access Service page, configure the service name as 802.1X_ser, and use the 802.1X policy you have created as the default access policy.

d.     Use the default settings for other parameters.

Figure 25 Adding an access service

6.     Add an access user:

a.     From the navigation tree, select Access User > All Access Users.

b.     On the access user configuration page, click Add.

c.     On the Add Access User page, click Add User.

d.     On the Add User window, configure the following parameters:

-     Set the username to admin.

-     Set the account name to admin.

-     Select the 802.1X user that you have configured in the Access Service area.

Figure 26 Adding an access user

Configuring the phone

IMPORTANT

IMPORTANT:

·     Configure the same realm name and domain for both the phone and the Hotspot 2.0 policy on the AC.

·     Configure the same username and password for both the phone and the RADIUS server.

·     Configure the same authentication type for the phone, the Hotspot 2.0 policy on the AC, and the RADIUS server.

This example uses a Samsung S4 telephone.

To configure the phone:

1.     Use a text editor to edit the Hotspot 2.0 configuration file and save it as cred.conf on a PC or on the phone.

cred={

realm="abc.com"

username="admin"

password="12345678"

domain="domain.abc.com"

eap=PEAP

phase2="auth=MSCHAPV2"

}

2.     Save the configuration file in the root directory of the phone:

¡     If you edit the configuration file on a PC, use either of the following methods to import the configuration file to the phone and save it in the root directory:

-     Connect the phone to a PC by using a USB cable, and copy cred.conf from the PC to the phone.

-     Send an email to the phone with cred.conf attached and save the file in the phone.

¡     If you edit the file on the phone by using a text editor, save it in the root directory of the phone.

3.     Turn on WLAN on the phone.

Figure 27 Turning on WLAN

4.     Click Advanced.

Figure 28 Configuring advanced WLAN settings

5.     On the Advanced page, enable Passpoint.

Figure 29 Enabling Passpoint

Verifying the configuration

# Verify that the phone can automatically connect to the WLAN service.

[AC] display wlan client verbose

Total number of clients: 1

 

MAC address                       : 000f-e265-6400

 IPv4 address                      : 10.1.1.114

 IPv6 address                      : 2001::1234:5678:0102:0304

 Username                          : admin

 AID                               : 1

 AP ID                             : 2

 AP name                           : ap1

 Radio ID                          : 2

 SSID                              : service

 BSSID                             : 0026-3e08-1150

 VLAN ID                           : 1

 Sleep count                       : 0

 Wireless mode                     : 802.11gn

 Channel bandwidth                 : 20MHz

 SM power save                     : Enabled

 SM power save mode                : Static

 Short GI for 20MHz                : Supported

 Short GI for 40MHz                : Not supported

 STBC RX capability                : Not supported

 STBC TX capability                : Not supported

 LDPC RX capability                : Not supported

 Block Ack                         : TID 0  In

 Support HT-MCS set                : 0, 1, 2, 3, 4, 5, 6, 7

 Supported rates                   : 1, 2, 5.5, 6, 9, 11,

                                     12, 18, 24, 36, 48, 54 Mbps

 QoS mode                          : WMM

 Listen interval                   : 10

 RSSI                              : 49

 Rx/Tx rate                        : 130/11 Mbps

 Speed                             : N/A

 Authentication method             : Open system

 Security mode                     : RSN

 AKM mode                          : 802.1X

 Cipher suite                      : CCMP

 User authentication mode          : 802.1X

 WPA3 status                       : N/A

 Authorization ACL ID              : N/A

 Authorization user profile        : N/A

 Roam status                       : N/A

 Key derivation                    : SHA1

 PMF status                        : N/A

 Forwarding policy name            : N/A

 Online time                       : 0days 0hours 0minutes 36seconds

 FT status                         : Inactive 

Example: Configuring Hotspot 2.0 (for version 2)

Network configuration

As shown in Figure 30, configure Hotspot 2.0 to enable the phone to switch from the cellular network to the wireless network.

Figure 30 Network diagram

Restrictions and guidelines

When you configure Hotspot 2.0, follow these restrictions and guidelines:

·     For more information about AAA, see User Access and Authentication Configuration Guide.

·     Before uploading the OSU server icon, make sure the icon file is in the root directory where the version files are saved. You can use FTP or TFTP to transmit the icon file.

Procedure

1.     Configure the OSU server:

# Create OSU server 1.

<AC> system-view

[AC] wlan osu-provider 1

# Set the name for the OSU server to osu_test.

[AC-wlan-osu-1] friendly-name osu_test lang-code eng

# Specify a URI for the OSU server.

[AC-wlan-osu-1] uri https://192.168.1.23:8088/service

# Set the protocol for clients to communicate with the OSU server to SOAP-XML SPP.

[AC-wlan-osu-1] method 1

# Specify an icon for the OSU server.

[AC-wlan-osu-1] icon-file test.png lang-code eng icon-type png

# Configure a description for the OSU server.

[AC-wlan-osu-1] description "The OSU provider." lang-code eng

# Configure the NAI.

[AC-wlan-osu-1] nai example.com

[AC-wlan-osu-1] quit

2.     Configure a Hotspot 2.0 policy:

# Create Hotspot 2.0 policy 1.

[AC] wlan hotspot-policy 1

# Specify the authentication type for NAI realm example.com.

[AC-wlan-hs-1] nai-realm name example.com eap-method 5 auth-method 2 authentication 4

# Set the access network type to Wildcard.

[AC-wlan-hs-1] network-type 15

# Set the OI to 80F62E and add the OI to beacons.

[AC-wlan-hs-1] roam-oi 80F62E in-beacon

# Set the domain name to domain.com.

[AC-wlan-hs-1] domain-name domain.com

# Set the availability to 1 for both IPv4 addresses and IPv6 addresses.

[AC-wlan-hs-1] ip-type ipv4 1 ipv6 1

# Set the SSID for online signup services to osu-ssid.

[AC-wlan-hs-1] osu-ssid osu-ssid

# Bind OSU server 1 to Hotspot 2.0 policy 1.

[AC-wlan-hs-1] osu-provider 1

[AC-wlan-hs-1] quit

# Upload the specified OSU server icons if a specified icon file changes.

[AC] wlan hotspot osu-icon upload

3.     Configure a service template for online signup services:

# Create service template osu.

[AC] wlan service-template osu

# Set the SSID to osu-ssid.

[AC-wlan-st-osu] ssid osu-ssid

# Enable the service template.

[AC-wlan-st-osu] service-template enable

[AC-wlan-st-osu] quit

4.     Configure 802.1X authentication and the RADIUS server:

# Configure the 802.1X authentication method as EAP.

[AC] dot1x authentication-method eap

# Create RADIUS scheme imcc.

[AC] radius scheme imcc

# Set the IP address and the port number of the primary authentication server to 192.168.1.23 and 1813, respectively.

[AC-radius-imcc] primary authentication 192.168.1.23 1812

# Set the IP address and the port number of the primary accounting server to 192.168.1.23 and 1813, respectively.

[AC-radius-imcc] primary accounting 192.168.1.23 1813

# Set the shared key for the AC to exchange packets with the authentication and accounting server to 12345678.

[AC-radius-imcc] key authentication simple 12345678

[AC-radius-imcc] key accounting simple 12345678

# Configure the AC to remove the domain name in the username sent to the RADIUS servers.

[AC-radius-imcc] user-name-format without-domain

[AC-radius-imcc] quit

5.     Configure ISP domain:

# Create domain imc and configure the domain to use RADIUS scheme imcc for authentication, authorization, and accounting.

[AC] domain imc

[AC-isp-imc] authentication lan-access radius-scheme imcc

[AC-isp-imc] authorization lan-access radius-scheme imcc

[AC-isp-imc] accounting lan-access radius-scheme imcc

[AC-isp-imc] quit

6.     Configure a service template for wireless services:

# Create service template stname.

[AC] wlan service-template stname

# Set the SSID to service.

[AC-wlan-st-stname] ssid service

# Bind Hotspot 2.0 policy 1 to the service template.

[AC-wlan-st-stname] hotspot-policy 1

7.     Configure the AP:

# Create AP ap1, and specify the AP model and serial ID.

[AC] wlan ap ap1 model WA4320i-ACN

[AC-wlan-ap-ap1] serial-id 210235A1BSC123000050

# Set a venue name for the AP.

[AC-wlan-ap-ap1] venue name "H3C lab" lang-code eng

# Bind service template stname to radio 2 of the AP.

[AC-wlan-ap-ap1] radio 2

[AC-wlan-ap-ap1-radio-2] radio enable

[AC-wlan-ap-ap1-radio-2] service-template stname

[AC-wlan-ap-ap1-radio-2] service-template osu

[AC-wlan-ap-ap1-radio-2] quit

[AC-wlan-ap-ap1] quit

Verifying the configuration

# Verify that the OSU server icon has been loaded.

[AC] display wlan hotspot uploaded-osu-icon

Total number of icons: 1

Icon name                                                       Icon type

--------------------------------------------------------------------------------

test.png                                                        png

# Verify that the phone can automatically connect to the WLAN service.

[AC] display wlan client verbose

Total number of clients: 1

 

 MAC address                       : d022-bee8-a267

 IPv4 address                      : 192.168.1.52

 IPv6 address                      : N/A

 Username                          : abcd

 AID                               : 2

 AP ID                             : 1

 AP name                           : ap1

 Radio ID                          : 2

 SSID                              : service

 BSSID                             : 5866-ba74-e790

 VLAN ID                           : 1

 Sleep count                       : 37

 Wireless mode                     : 802.11gn

 Channel bandwidth                 : 20MHz

 SM power save                     : Disabled

 Short GI for 20MHz                : Supported

 Short GI for 40MHz                : Not supported

 STBC RX capability                : Supported

 STBC TX capability                : Not supported

 LDPC RX capability                : Not supported

 Block Ack                         : TID 0  Both

                                     TID 2  Out

 Supported HT MCS set              : 0, 1, 2, 3, 4, 5, 6, 7

 Supported rates                   : 1, 2, 5.5, 6, 9, 11,

                                     12, 18, 24, 36, 48, 54 Mbps

 QoS mode                          : WMM

 Listen interval                   : 10

 RSSI                              : 45

 Rx/Tx rate                        : 72.2/72.2 Mbps

 Speed                             : N/A

 Authentication method             : Open system

 Security mode                     : RSN

 AKM mode                          : 802.1X

 Cipher suite                      : CCMP

 User authentication mode          : 802.1X

 WPA3 status                       : N/A

 Authorization ACL ID              : N/A

 Authorization user profile        : N/A

 Roam status                       : N/A

 Key derivation                    : SHA1

 PMF status                        : N/A

 Forwarding policy name            : N/A

 Online time                       : 0days 0hours 1minutes 29seconds

 FT status                         : Inactive

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网